The use of UTRS in combating DDoS attacks
Guest Post: New study shows that UTRS can be a useful tool in mitigating DDoS attacks, but it is not widely used.
Guest Post: New study shows that UTRS can be a useful tool in mitigating DDoS attacks, but it is not widely used.
Is it time to abandon the OSI seven-layer model?
Measuring QUIC (performance, spin bit, and ECN), transparent forwarders, and invalid prefix dropping.
Guest Post: Exploring the intricacies of intra and inter-GPU server traffic patterns, network topologies for large clusters, the latest methods for handling network congestion, and more.
How ICANN manages data capture from the IMRS (L Root) systems worldwide.
Guest Post: Researchers used real-time data to annotate network connections with carbon intensity, allowing digital infrastructure providers to relocate their compute workloads to more environmentally sustainable regions.
Guest Post: We’re running out of /24. Is now is the time to change this norm?
Much more than a registry — NOGs, IXPs and CERTs.
Guest Post: A trick to help reduce bandwidth and CPU cycles for both RPKI Publication Point servers and RPKI validators when switching between RRDP and RSYNC transports.
Guest Post: Making the case for sensible defaults.