How should we defend the DNS?
Are we going about protecting ourselves from malicious DNS activity in the right way?
Are we going about protecting ourselves from malicious DNS activity in the right way?
Some of the the “things” that are connected to the Internet are stupid and toxic. What are we going to do about it?
The Mobile World Congress in Barcelona used to be a big event for the telephone companies, but these days its a big event for the Internet as well.
Geoff Huston explores the bigger picture of DDoS attacks and what network operators need to consider.
Geoff Huston outlines some examples of route hijacks from a presentation by Andree Toonk at NANOG 63.
APNIC Chief Scientist, Geoff Huston, comments on the NANOG 63 IANA transition update.
What is the role of a technology standards body? Should it try and be all things to all people? Or should it try and maintain focus and resist pressures for change?
The days when the Internet was touted as a poster child of disruption are long since over
No doubt we have all heard that the Internet is really quite big. Is there anyway to “see” the entirety of this network?
The Internet’s Border Gateway Protocol (BGP) is one of the most critical components of today’s Internet. However, it does not just work all by itself, and within each network the configuration and operation of the routing system are of critical importance.