ION Sri Lanka - IPv6 Deployment Update - Where are we now?
Two Years After World IPv6 Launch: Are We There Yet?
Vivek Nigam (APNIC)
June 2014 marked the 2nd anniversary of World IPv6 Launch, when thousands of Internet Service Providers, home networking equipment manufacturers, and web companies around the world came together to permanently enable IPv6 on their products and services. Where are we now on the path to full global IPv6 adoption? We’ll discuss the current state of IPv6 adoption, including statistics and lessons learned from and since World IPv6 Launch, and the next steps needed to move forward with IPv6 deployment.
MMNOG: Internet infrastructure comparisons in the Asia Pacific APNIC
Deputy Director General Sanjaya discusses how different networks within the region interconnect through the examination of different network topologies, and how Myanmar network operators can plan and grow the Internet in their economy at the first Myanmar Network Operators Group.
ION Sri Lanka - IPv6 Deployment Update - Where are we now?
Two Years After World IPv6 Launch: Are We There Yet?
Vivek Nigam (APNIC)
June 2014 marked the 2nd anniversary of World IPv6 Launch, when thousands of Internet Service Providers, home networking equipment manufacturers, and web companies around the world came together to permanently enable IPv6 on their products and services. Where are we now on the path to full global IPv6 adoption? We’ll discuss the current state of IPv6 adoption, including statistics and lessons learned from and since World IPv6 Launch, and the next steps needed to move forward with IPv6 deployment.
MMNOG: Internet infrastructure comparisons in the Asia Pacific APNIC
Deputy Director General Sanjaya discusses how different networks within the region interconnect through the examination of different network topologies, and how Myanmar network operators can plan and grow the Internet in their economy at the first Myanmar Network Operators Group.
An Update on Mobility in Today's Internet, by Geoff Huston.
Presented at the APNIC 40 "Internet – Mobility Nexus: Are We Ready for Real Mobile/Wireless Broadband?" session, Wed 9 Sep 2015.
Deputy Director General, Sanjaya, outlines Internet infrastructure in Taiwan, demonstrating how the BGP routing table can be used as a data source to visualise Internet infrastructure in an economy by mapping transit paths of Autonomous System Numbers delegated to that economy.
ITU-APNIC collaboration on the transition from IPv4 to IPv6APNIC
APNIC Development Director Duncan Macintosh presented on the collaboration activities between the ITU and APNIC on IPv6 capacity development in developing economies at the ICTs for smart, sustainable Asia Pacific in Manila, from 6 to 7 June 2016.
Uni papua jakarta city community doing exercise at flamboyan flatUni Papua Football
Uni Papua Jakarta City Community
Doing exercise at Flamboyan Flat
Material : Agility, ball possession, and game
Value : Discipline & good attitude
Coach : Laisina Yolanesha
http://unipapua.net/berita/uni-papua-jakarta-city-community-discipline-good-attitude/
UP JCC
-AH-
An Update on Mobility in Today's Internet, by Geoff Huston.
Presented at the APNIC 40 "Internet – Mobility Nexus: Are We Ready for Real Mobile/Wireless Broadband?" session, Wed 9 Sep 2015.
Deputy Director General, Sanjaya, outlines Internet infrastructure in Taiwan, demonstrating how the BGP routing table can be used as a data source to visualise Internet infrastructure in an economy by mapping transit paths of Autonomous System Numbers delegated to that economy.
ITU-APNIC collaboration on the transition from IPv4 to IPv6APNIC
APNIC Development Director Duncan Macintosh presented on the collaboration activities between the ITU and APNIC on IPv6 capacity development in developing economies at the ICTs for smart, sustainable Asia Pacific in Manila, from 6 to 7 June 2016.
Uni papua jakarta city community doing exercise at flamboyan flatUni Papua Football
Uni Papua Jakarta City Community
Doing exercise at Flamboyan Flat
Material : Agility, ball possession, and game
Value : Discipline & good attitude
Coach : Laisina Yolanesha
http://unipapua.net/berita/uni-papua-jakarta-city-community-discipline-good-attitude/
UP JCC
-AH-
Presentation given by Paul Wilson, Director General APNIC, at the 25th Latin America and Caribbean Network Information Centre Meeting, in Havana, Cuba, 2 to 6 May 2016
Cùng với niềm vui sum họp gia đình vào dịp Tết, nỗi lo thường gặp của các phụ huynh có con nhỏ là: "Cho bé ăn gì để bé không bị rối loạn tiêu hóa, không bị béo phì, không bị suy dinh dưỡng…?” Sức khỏe của trẻ nhỏ luôn là mối quan tâm lớn nhất trong gia đình, vì vậy nỗi lo của các bạn vào mỗi dịp tết đến là điều không thể tránh khỏi. Dinh dưỡng cho bé như thế nào giúp bé luôn có sức khỏe tốt để cả nhà cùng có một cái Tết thật vui!
Keynote presentation given by George Michaelson, APNIC's R&D Scientist at Cisco Network Innovation and Research Symposium held at Ecole Polytechnique de Paris, 8 March 2016
In this paper microstrip patch antenna is designed for 2.4GHz frequency. For the antenna miniaturization and bandwidth improvement H-shaped DGS on microstrip patch antenna (MSA) is used. The design of DGS has been analyzed for different dimensions of H-slot and achieved optimized dimensions.The simulation process has been done through Finite Element Machine (FEM) based software High Frequency Structure Simulator ( HFSS) software. The properties of antenna such as reflection co-efficient, bandwidth and gain are determined and compared with the properties of single element square patch antenna.Further proposed antennas performance is studied for different size of defect on the same patch antenna. Proposed antenna finds its application in wireless LAN protocols such as Bluetooth, IEEE 802.11 and in 2.4GHz ISM Band.
A implantação da República em Portugal tornou-se um campo propício para a penetração destas novas ideias e a consideração do papel fundamental na construção do homem novo que haveria que nascer com a REPÚBLICA.
Migrating from Instantis 8.0 to EnterpriseTrack 8.7 - A Customer Storyp6academy
Referenced: www.p6academy.com
Source: http://coll15.mapyourshow.com
BBCN recently completed a migration from Instantis 8.0 to EnterpriseTrack 8.7. This session steps through the process from the initial decision to upgrade to the planning, configuration and ultimate roll out. We will discuss the factors behind the decision to upgrade to Instantis EnterpriseTrack 8.7 and, once selected, the features and settings to implement. We'll outline the process used to perform the migration and provide lessons learned that can save you time and eliminate frustration.
These are my summarized notes from all the microservices session I attended at QCon 2015. These sessions had tons of learning around how to scale microservices and avoid common pitfalls
Kent Melville and Annie Wise from Inductive Automation, and water/wastewater controls professionals Henry Palechek and Jason Hamlin, cover 10 steps for building a sustainable SCADA system that survives and even thrives using only your operational expenditure budget.
You'll learn about:
• What type of hardware and operating systems to use
• Utilizing smart devices and MQTT
• The advantages of server-centric architecture and web-based deployment
• Rapid development with templates and UDTs
• Powerful alarming and reporting tools
• And more
Kent Melville and Annie Wise from Inductive Automation, and water/wastewater controls professionals Henry Palechek and Jason Hamlin, cover 10 steps for building a sustainable SCADA system that survives and even thrives using only your operational expenditure budget.
You'll learn about:
• What type of hardware and operating systems to use
• Utilizing smart devices and MQTT
• The advantages of server-centric architecture and web-based deployment
• Rapid development with templates and UDTs
• Powerful alarming and reporting tools
• And more
Get Loose! Microservices and Loosely Coupled Architectures DevOps.com
The recently published results from the 2017 State of DevOps Survey shows that loosely coupled architectures and teams are the strongest predictor of continuous delivery. Microservices and Containers are a great choice for creating these loosely coupled systems. But, many teams find it hard to decompose monolithic applications into Microservices, and they find it harder still to coordinate deployments and releases into the emergent “hyper-hybrid” operating environments.
Get Loose! Microservices and Loosely Coupled ArchitecturesDeborah Schalm
The recently published results from the 2017 State of DevOps Survey shows that loosely coupled architectures and teams are the strongest predictor of continuous delivery. Microservices and Containers are a great choice for creating these loosely coupled systems. But, many teams find it hard to decompose monolithic applications into Microservices, and they find it harder still to coordinate deployments and releases into the emergent “hyper-hybrid” operating environments.
TIM SA is the biggest Polish distributor of tech-‐ electro materials.
The mul(channel character of sale is crucial for us – says Krzysztof Folta, CEO in TIM SA.
Create and Manage a Micro-Segmented Data Center – Best PracticesAlgoSec
What links the Antwerp Diamond Heist, one of the world’s largest jewelry thefts and data center security? The famous heist was possible because there was no security within the safe deposit vault, enabling the criminals to stay inside undetected for days and steal items worth $100M.
Similarly, to help prevent serious breaches, data center networks must be internally segmented to stop hackers moving freely inside the network and exfiltrating data – but network segmentation must be designed and managed correctly if it’s to be successful. This webinar will examine how to create and manage a micro-segmented data center environment that truly protects your organization’s valuables.
In this webinar, Avivi-Siman-Tov, Product Manager at AlgoSec will cover:
• How to securely migrate applications to a micro-segmented data center
• Identifying and avoiding common network segmentation pitfalls
• Defining and enforcing effective security policies for the micro-segmented data center
• Managing micro-segmented data centers alongside traditional networks and devices
• Identifying and managing security risk and compliance in a micro-segmented data center
Presentation created for Third and Final Year students of , The Department of Information Technology, Bharati Vidyapeeth (Deemed to be University) College of Engineering, Pune. Collage has invited myself for a training program on “Recent Trends in Information Technology”. I presented on topic of "Serverless Microservices". It is Level-100 Session.
Travis Cox from Inductive Automation will go over the important questions you should ask when planning an enterprise solution. His presentation will help you start and maintain a smoother development process that results in an open, interoperable, standards-based, and secure enterprise solution.
Similar to Measuring latency from the browser (20)
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
Chimi Dorji, Internet Resource Analyst at APNIC, presented on Registry Data Accuracy Improvements at SANOG 41 jointly held with INNOG 7 in Mumbai, India from 25 to 30 April 2024.
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
Sunny Chendi, Senior Advisor, Membership and Policy at APNIC, presents 'APNIC Policy Roundup' at the 5th ICANN APAC-TWNIC Engagement Forum and 41st TWNIC OPM in Taipei, Taiwan from 23 to 24 April.
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
Dave Phelan, Senior Network Analyst/Technical Trainer at APNIC, presents 'DDoS In Oceania and the Pacific' at NZNOG 2024 held in Nelson, New Zealand from 8 to 12 April 2024.
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
Geoff Huston, Chief Scientist at APNIC deliver keynote presentation on the 'Future Evolution of the Internet' at the Everything Open 2024 conference in Gladstone, Australia from 16 to 18 April 2024.
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
Paul Wilson, Director General of APNIC delivers a presentation on IP addressing and IPv6 to the Policymakers Program during IETF 119 in Brisbane Australia from 16 to 22 March 2024.
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
Tom Harrison, Product and Delivery Manager at APNIC presents at the Registration Protocols Extensions working group during IETF 119 in Brisbane, Australia from 16-22 March 2024
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
Che-Hoo Cheng, Senior Director, Development at APNIC presents on the "Benefits of doing Internet peering and running an Internet Exchange (IX)" at the Communications Regulatory Commission of Mongolia's IPv6, IXP, Datacenter - Policy and Regulation International Trends Forum in Ulaanbaatar, Mongolia on 7 March 2024
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
APNIC Senior Advisor, Membership and Policy, Sunny Chendi presented on APNIC updates and RIR Policies for ccTLDs at APTLD 85 in Goa, India from 19-22 February 2024.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
2. @proyectosimonhttp://simon.lacnic.net
The project
The problem
• Connectivity in LAC is good
but not optimal
• Presence of IXPs, but inter-
country connectivity still has to
be improved
• Information about connectivity
is not easy to find or updated
The solution
• Objective
Provide representative and
up-to-date connectivity
measurements to anyone
interested in them
• How
Latency measurements from
many origins, to many
destinations, via different
protocols
3. @proyectosimonhttp://simon.lacnic.net
Why bother with the
browser?
Pros
• Standard and widely-used
technologies
• Ran at the end user
• Can trigger measurements
automatically
• Scales fast
Cons
• Browser and operating system
combination differences
- TCP connections are handled
differently by browser and OS
combination!
- Browser Javascript engines vary
- OSes handle processes
differently
• Need of normalising different
environments!
5. @proyectosimonhttp://simon.lacnic.net
Testing our tool in
Browserstack
• Cloud-based testing service aimed
at web developers to check the
look & feel and responsiveness of
their sites
• We use it to run our Javascript tool
over many different OS and
browser combination
• We used automated Selenium tests