Tackling the Catch-22 of IPv6 enterprise uptake
Guest Post: Enterprises are only willing to adopt IPv6 once they see it working, but that can’t happen until they have the necessary expertise. What can be done?
Guest Post: Enterprises are only willing to adopt IPv6 once they see it working, but that can’t happen until they have the necessary expertise. What can be done?
Guest post: Where does DNS spoofing occur? How often? Is it increasing? Researchers examined six years of data to find out.
Guest Post: Mongolia is the second economy in the world to achieve 100% Route Origin Validation (ROV) coverage.
Guest post: There is a tradeoff between achievable throughput and coverage of wireless signals — using multiple channels can deliver better results.
Guest Post: New tool KADABRA can help monitor Internet resources growth, check for incidents, and analyze RPKI data for Indonesia.
Guest Post: Most WiFi devices are designed to acknowledge all packets received — this poses security risks.
Geoff Huston reports on IPv4 and IPv6 addressing in 2020 and makes some predictions for the future.
Guest Post: How do cloud networks affect the services that RIRs provide?
Guest Post: A common assumption is that popular resources tend to be hosted locally, and submarine cables are for backend traffic. Is this accurate?
An IPv6 deployment that began with a series of relatively isolated IPv6 metro area networks (MANs) has begun to take off.