Learn how the computers that generate and keep safe the cryptographic material required for signing the DNS root are dealt with when made redundant.
Paul Wilson clarifies how bad IPv4 address exhaustion is and what people can do to obtain public address space.
APNIC is working on a collaborative project to develop a full-featured RDAP search facility using POSIX Extended Regular Expressions to query registry data.
RIPE NCC will soon close off the creation of new foreign ROUTE and ROUTE6 objects in their database. Read why.
Guest Post: Addressing the obstacles network operators face when deploying BCP38 will help with reducing spoofing incidents.
Spring’s @Transactional appears simple on the surface, but is hiding complex mechanisms that can come unstuck
Guest Post: Authentication and encryption should start at the edge of the network, with the end user.
Guest Post: Implementation of aggressive NSEC caching in BIND 9.12 should reduce the amount of traffic sent to root servers.
Guest Post: NAT over IPv6 is possible, but it’s messy and could be so easily avoided.
Guest Post: Read how an IPv6 deployment project turned into an overdue network overhaul to simplify one popular gaming business’s network.