Evolution has its downsides… but maybe it’s inevitable?
How Darwin’s Theory of Evolution might apply to networking.
How Darwin’s Theory of Evolution might apply to networking.
Guest Post: Measuring HTTPS resource record adoption in the wild.
Is an alternative Trust Anchor structure for RPKI feasible?
Guest Post: New study shows that UTRS can be a useful tool in mitigating DDoS attacks, but it is not widely used.
Is it time to abandon the OSI seven-layer model?
Measuring QUIC (performance, spin bit, and ECN), transparent forwarders, and invalid prefix dropping.
Guest Post: Exploring the intricacies of intra and inter-GPU server traffic patterns, network topologies for large clusters, the latest methods for handling network congestion, and more.
How ICANN manages data capture from the IMRS (L Root) systems worldwide.
Guest Post: Researchers used real-time data to annotate network connections with carbon intensity, allowing digital infrastructure providers to relocate their compute workloads to more environmentally sustainable regions.
Guest Post: We’re running out of /24. Is now is the time to change this norm?