IXP from scratch: Part 3 — The peering LAN
Guest Post: How we connected our two PoPs and which security and safety mechanisms (L2 and L3) we configured to ensure reliable operation.
Guest Post: How we connected our two PoPs and which security and safety mechanisms (L2 and L3) we configured to ensure reliable operation.
Understanding and managing changes in IoT device behaviour to make network traffic predictions more reliable.
Guest Post: How might a student cheat during a supervised in-person online exam in a BYOD environment?
What IPv4 and IPv6 addressing in 2024 tells us about the changing nature of the network.
Deprecating SHA-256, RSA, ECDSA, and ECDH key usage ahead of quantum computing?
Guest Post: An industry-academic analysis on trends in direct-path and reflection-amplification attacks to encourage greater common understanding of the DDoS landscape.
Did the stability of the routing system change in 2024?
Geoff Huston’s analysis of BGP routing table growth for 2024 and some projections.
Here are APNIC Blog’s top three posts related to security for 2024.
‘How to’ posts are a great way to learn how to use a new tool, troubleshoot problems, or perform advanced tasks. Here are three of 2024’s best.