It’s alive! Blinkenlights in CrypTech, IETF93
Read about GGM’s experience playing with a development system during IETF93 CrypTech project workshop in Prague.
Read about GGM’s experience playing with a development system during IETF93 CrypTech project workshop in Prague.
George Michealson shares a few observations about his years attending RIR, IETF, and various NOG meetings around the world.
Cyber Secure Pakistan 2015 (CSP2015) was a fantastic five day event – here’s some of my thoughts from the week.
ICANN signed the Root Zone of the DNS in 2010. Five years on, it’s time to update the Key-Signing Key – and it isn’t a trivial exercise.
Jim Martin, ISC presented on the end-of-life issues of DLV.
Are we going about protecting ourselves from malicious DNS activity in the right way?
The huge changes which the DNS has had to accommodate were highlighted at the DNS-OARC Workshop on the weekend.
As the dust settled from the Global Conference on Cyber Security, four APNIC staff members recorded a podcast discussing APNIC’s work in cyber security.
Some of the the “things” that are connected to the Internet are stupid and toxic. What are we going to do about it?
Can’t attend a live APNIC Training eLearning class? There is another way you can take advantage of this free training.