IPv6 security on the stack level
Guest Post: What does a ‘secure’ IPv6 stack look like/incorporate?
Guest Post: What does a ‘secure’ IPv6 stack look like/incorporate?
Opinion: It’s challenging to apply governance concepts to the vague and insubstantive digital environment, especially given its deregulation-born origins.
The final Networking from Home event attracted 226 participants from 35 economies.
The APNIC Foundation’s Annual Report for 2019 highlights another busy and productive year for the organization.
Guest Post: A major CDN reduced its median latency by more than half during study into use of Bidirectional Anycast/Unicast Probing.
Retrofitting existing IXPs with SDN could provide benefits for smaller IXPs in emerging economies
Guest Post: Canonical Name (CNAME) cloaking is a new measurement technique to circumvent third-party browser extensions.
APNIC now has a formal process for security researchers to notify us of any bugs or weaknesses.
Guest Post: The Internet has never spoken just one protocol; it has always been a hairy mess of routers, bridges, and gateways, running many protocols at many layers. IPv6 is one of them.
APNIC participated in the PhNOG Virtual 2020 meeting on 13 July 2020.