[Podcast] Post-Quantum Cryptography
Geoff Huston discusses Post-Quantum Cryptography in Internet protocols and the DNS in particular.
Geoff Huston discusses Post-Quantum Cryptography in Internet protocols and the DNS in particular.
Guest Post: How to calculate theoretical optical power estimates at various ingress/egress points of a DWDM system before field validation.
Guest Post: How to build an IPv6-only IXP from grassroots including technical design decisions.
Guest Post: MPLS has become unnecessarily complex. Here’s how to make it simpler.
A friendly how to guide for network operators.
Guest Post: A walkthrough of an issue involving NTP interactions that resulted in severely incorrect dates.
APNIC extends its IPv6 resources with a second /12 allocation from IANA.
Using Moore’s Law, a computer 20 years into the future is predicted to be around 10,000 times more capable than today’s computation capabilities. Geoff Huston explores some practical implications.
An analysis of CDS and CDNSKEY records looking at mismatches between child and parent, and the nameservers for the zone.
Guest post: How Starlink could make your Internet faster.