- The document contains statistics and charts about the growth of internet and mobile networks in Japan from 2010 to 2017. It shows increasing trends in the number of broadband and mobile subscribers, and growth of download and upload traffic volumes. It also includes charts on internet exchange points and capacity of networks in the Asia Pacific region over time.
Keynote at ISCRAM-China2008: Next generation of Safety Networksglobal
The document discusses next generation safety networks and the transition from IPv4 to IPv6. It provides the following key points:
1) IPv6 is needed to power the next generation of smart transportation, e-society, e-commerce, and other advanced applications that require more addresses and capabilities than IPv4 can provide.
2) China has undertaken major initiatives like CNGI to build out IPv6 infrastructure nationwide in preparation for IPv4 address exhaustion and to promote next generation applications.
3) The 2008 Beijing Olympics demonstrated the first large-scale use of IPv6 for applications like visual surveillance and facility management across multiple venues.
The document analyzes global IPv6 deployment based on measurements from APNIC. It finds that worldwide IPv6 capability is around 6.5%, with some countries and networks higher. Indonesia has very low IPv6 capability currently around 0%, despite having adequate IPv4 and IPv6 address space assigned. The top Indonesian networks by sample size also show near 0% IPv6 capability.
Jose Luis Ayala is the Director of Government Relations for Latin America at Ericsson. Mobile broadband and data usage is growing exponentially in Latin America, with subscriptions expected to reach 900 million by 2018. Data traffic per device will increase 12 times from 2012 to 2018. To support this growth, operators need additional spectrum, especially the 700MHz digital dividend band, which allows for improved coverage compared to higher frequencies. Making this spectrum available through a harmonized plan across countries will help increase competitive mobile broadband adoption across both urban and rural areas of Latin America.
This document appears to be a collection of technical information related to learning technologies and standards. It includes descriptions of specifications such as SCORM, xAPI, IMS Caliper, and standards organizations like ISO/IEC and IMS Global. Sections cover topics including learning analytics, virtual reality, mobile learning, and predictions for the year 2030 related to artificial intelligence and personalized education. The document contains many copyright notices and does not provide any clear overall summary or context.
This document appears to be a collection of technical information related to learning technologies and standards. It includes descriptions of specifications such as SCORM, xAPI, IMS Caliper, and standards organizations like ISO/IEC and IMS Global. Sections cover topics including learning analytics, virtual reality, mobile learning, and predictions for the year 2030 related to artificial intelligence and personalized education. The document contains many copyright notices and does not provide any clear overall summary or context.
The document contains technical information and instructions related to continuous deployment and DevOps. It includes references to GitHub repositories, commands to clone repositories and deploy applications, as well as descriptions of DevOps tools and processes. Copyright information is displayed at the bottom of each page.
The document contains code snippets and configuration examples related to Spring Security OAuth 2.0 client integration for authenticating with external OAuth providers like Facebook and XXX. It includes dependency and configuration properties for OAuth client registration and authorization code grant flow. Code snippets show interfaces for CRUD repositories and examples of tailing MongoDB queries with reactive repositories.
Keynote at ISCRAM-China2008: Next generation of Safety Networksglobal
The document discusses next generation safety networks and the transition from IPv4 to IPv6. It provides the following key points:
1) IPv6 is needed to power the next generation of smart transportation, e-society, e-commerce, and other advanced applications that require more addresses and capabilities than IPv4 can provide.
2) China has undertaken major initiatives like CNGI to build out IPv6 infrastructure nationwide in preparation for IPv4 address exhaustion and to promote next generation applications.
3) The 2008 Beijing Olympics demonstrated the first large-scale use of IPv6 for applications like visual surveillance and facility management across multiple venues.
The document analyzes global IPv6 deployment based on measurements from APNIC. It finds that worldwide IPv6 capability is around 6.5%, with some countries and networks higher. Indonesia has very low IPv6 capability currently around 0%, despite having adequate IPv4 and IPv6 address space assigned. The top Indonesian networks by sample size also show near 0% IPv6 capability.
Jose Luis Ayala is the Director of Government Relations for Latin America at Ericsson. Mobile broadband and data usage is growing exponentially in Latin America, with subscriptions expected to reach 900 million by 2018. Data traffic per device will increase 12 times from 2012 to 2018. To support this growth, operators need additional spectrum, especially the 700MHz digital dividend band, which allows for improved coverage compared to higher frequencies. Making this spectrum available through a harmonized plan across countries will help increase competitive mobile broadband adoption across both urban and rural areas of Latin America.
This document appears to be a collection of technical information related to learning technologies and standards. It includes descriptions of specifications such as SCORM, xAPI, IMS Caliper, and standards organizations like ISO/IEC and IMS Global. Sections cover topics including learning analytics, virtual reality, mobile learning, and predictions for the year 2030 related to artificial intelligence and personalized education. The document contains many copyright notices and does not provide any clear overall summary or context.
This document appears to be a collection of technical information related to learning technologies and standards. It includes descriptions of specifications such as SCORM, xAPI, IMS Caliper, and standards organizations like ISO/IEC and IMS Global. Sections cover topics including learning analytics, virtual reality, mobile learning, and predictions for the year 2030 related to artificial intelligence and personalized education. The document contains many copyright notices and does not provide any clear overall summary or context.
The document contains technical information and instructions related to continuous deployment and DevOps. It includes references to GitHub repositories, commands to clone repositories and deploy applications, as well as descriptions of DevOps tools and processes. Copyright information is displayed at the bottom of each page.
The document contains code snippets and configuration examples related to Spring Security OAuth 2.0 client integration for authenticating with external OAuth providers like Facebook and XXX. It includes dependency and configuration properties for OAuth client registration and authorization code grant flow. Code snippets show interfaces for CRUD repositories and examples of tailing MongoDB queries with reactive repositories.
IRJET- Boat Localization and Warning System for Border IdentificationIRJET Journal
This document describes a boat localization and warning system to help identify national borders and prevent fishermen from unintentionally crossing into other countries' waters. The proposed system uses Received Signal Strength Indication (RSSI) and Zigbee technology to track the location and distance of boats from borders in real-time. It includes a transmitter section on boats with a microcontroller, RSSI module, voice playback, and motor, and a receiver section in a control room with an RSSI module and monitoring database. The system can alert fishermen via voice when a boat approaches a border and automatically turn off the motor. It can also send messages to fishermen's homes using GSM if a boat crosses a border. This aims to help
The document appears to be a technical document from NTT Corp containing copyright information and technical specifications. It includes repetitive sections with copyright notices and formatted text, numbers, and symbols that appear to be specifications or code but are difficult to interpret without more context. The document seems to provide technical information for an internal audience at NTT Corp. but lacks clear narrative or explanations.
Use Cases of the CPaaS.io project as presented at the first year review meeting in Tokyo on October 5, 2017.
Disclaimer:
This document has been produced in the context of the CPaaS.io project which is jointly funded by the European Commission (grant agreement n° 723076) and NICT from Japan (management number 18302). All information provided in this document is provided "as is" and no guarantee or warranty is given that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability. For the avoidance of all doubts, the European Commission and NICT have no liability in respect of this document, which is merely representing the view of the project consortium. This document is subject to change without notice.
This document discusses WebRTC and provides information about its capabilities and implementations. It covers topics like how WebRTC enables real-time communication directly in the browser between computers, mobile devices, and Internet of Things devices using APIs for audio/video streaming and peer-to-peer data sharing without plugins. It also discusses how WebRTC uses UDP and works around issues like NAT traversal using STUN, TURN, and ICE to establish connections.
APRICOT 2012 - Living with the ever-growing BGP table: an OCN storyChika Yoshimura
This document contains diagrams and descriptions of NTT Communications' global IP network and backbone infrastructure. The following key points are discussed:
- NTT has POPs and peering points across Asia, Europe, and North America that are connected by its global and regional backbones.
- The Japanese backbone connects 13 POPs across the country with capacities ranging from 1Gbps to 480Gbps.
- NTT's core routers in Tokyo and Osaka exchange traffic between Japan, Asia, Europe, and North America with capacities up to 560Gbps and 480Gbps respectively.
- Details are provided on NTT's transition to new backbone and peering technologies over time, including the initial backbone in 1996 and upgrades
APRICOT 2012 - Living with the ever-growing BGP table: an OCN story直樹 益子
This document contains diagrams and descriptions of NTT Communications' global IP network and backbone infrastructure. The following key points are discussed:
- NTT has POPs and peering points across Asia, Europe, and North America that are connected by its global and regional backbones.
- The Japanese backbone connects 13 POPs across the country with capacities ranging from 1Gbps to 480Gbps.
- NTT's core routers in Tokyo and Osaka exchange traffic between Japan, Asia, Europe, and North America with capacities up to 560Gbps and 480Gbps respectively.
- Details are provided on NTT's transition to new backbone and peering technologies over time, including the initial backbone in 1996 and upgrades
The document discusses utilizing spatiotemporal data from IoT devices in Redis. It proposes using a technique called "ST-coding" to encode location and timestamp data into a single code. This addresses two problems: 1) ST range queries were slow due to searching many keys; and 2) data insertion was inefficient due to load concentration on a single Redis server. By splitting the ST-code into a "PRE-code" and "SUF-code", ST range queries can be performed on a single key, avoiding use of the slow KEYS command. This improves query performance and distributes load across Redis servers.
This document discusses bi-directional access to live application, database, and web API data through standard drivers. It enables real-time data integration with hundreds of applications, databases, and web APIs. It also discusses drivers for NoSQL, big data, and SaaS connectivity that are embedded in leading business intelligence, extract-transform-load, data integration, data virtualization, and data warehousing tools. Finally, it discusses building REST APIs for databases with clicks to enable mobile and web applications to access database data.
This document summarizes a joint research project between JPRS and several Japanese ISPs to enhance DNS resiliency. The goals were to install DNS servers in multiple regions of Japan to distribute query load and ensure continuity of DNS services during natural disasters. ISPs configured their networks to direct queries to local DNS nodes hosted by JPRS within their networks. Evaluation found queries shifted towards local nodes, response times improved, and Internet services remained available within ISP networks even when other DNS sites were unreachable, demonstrating increased DNS resiliency.
The document discusses Oracle Blockchain Platform and Hyperledger Fabric. It describes how Oracle Blockchain Platform uses Hyperledger Fabric and can build consortium blockchain networks for enterprises. It allows companies to leverage blockchain for supply chain management, identity management, and other applications. The platform provides tools to simplify blockchain development, operations and governance to help businesses launch blockchain networks and applications.
The document discusses the limits of information and communication technologies (ICT) such as computing power, data storage, and network bandwidth. It proposes that future networks will need to scale in both size and functionality through approaches like federation of multiple networks. Cloud computing is presented as a potential approach to tackle these limits by providing on-demand access to shared computing resources over a network in a scalable and elastic manner. However, cloud computing is still associated with many marketing hype and open questions remain regarding its impact and how it can integrate with existing technologies.
Japan Container Days v18.12 1C5 Kubernetes+ロボット(ROS)アプリの連携パラダイムTatsuya Fukuta
The document discusses Robot Operating System (ROS) middleware and how it can be used with various hardware platforms like laptops, Raspberry Pi, and Arduino. It mentions that ROS works across operating systems and allows connecting different nodes over a network. The document also talks about deploying ROS applications on Amazon cloud infrastructure using containers, Kubernetes, and Docker. It describes using tools like Jenkins, Docker, and Kubernetes to build, test and deploy ROS applications on hardware like Raspberry Pi or in the cloud.
The document appears to be technical documentation or specifications that includes:
- Details about software or system components with references to things like classes, methods and APIs
- Software architecture diagrams and descriptions of interactions between components
- Implementation notes and instructions including references to tools, endpoints, URLs and programming concepts
The documentation is copyrighted and includes various technical specifications, software architectures and implementation notes for a system or software.
I have for some time worked on training notes (eventually a book) that particular targets the un-initiated or persons / companies interested in understanding how Telco works and thinks. Particular focusing on Economics and Business Models.
These notes where used in a recent training I gave in Myanmar and as such many of the examples are particular to Myanmar.
For the initiated this is likely going to be too easy and sometimes even feel like cheating (just a bit).
Stay tuned as I will be updating these particular slides frequently and as I tailor make them for particular requests or interests.
In case you are interested in the actual training get in touch.
IPv6 deployment experience in Japan has uncovered several key issues:
1. Early mobile networks using IPv4 experienced congestion due to limited wireless bandwidth, but IPv6 has alleviated this by allowing more efficient use of network resources.
2. Mobile carriers in Japan have taken two approaches to IPv6 deployment - some use NAT/firewalls to preserve wireless resources and protect users, while others offer a separate "pure IPv6" service for a fee.
3. A successful IPv6 rollout requires addressing challenges across many aspects of network operations, backend systems, customer support, and device compatibility to ensure a smooth transition.
The document provides an overview of Low Power Wide Area (LPWA) networks and technologies. It discusses that LPWA networks are needed to connect billions of low-power devices over long ranges using low-cost radio technologies. Examples of LPWA technologies include LoRa, SigFox, NB-IoT and EC-GPRS. The document also outlines potential use cases for LPWA networks in areas like smart cities, utilities, agriculture and more.
1. The document appears to be a report from Rist Inc. detailing developments in their deep learning research from 1991 to 2019.
2. It discusses various deep learning applications such as detecting diseases in medical images and generating videos.
3. The report also examines topics like deep safety and ensuring AI systems are beneficial to humanity.
The document discusses a GPU cluster configuration with compute nodes running the slurmd daemon and Nvidia Volta GPUs. A management node runs the slurmctld daemon to manage jobs in the queue across the cluster. A monitoring node runs tools like Prometheus to monitor the cluster.
The document discusses Amazon Web Services (AWS) Internet of Things (IoT) services including AWS IoT Core, AWS Greengrass, Amazon FreeRTOS, and AWS IoT Device Management. It provides overviews and descriptions of each service and how they relate to and interact with each other to support IoT solutions. Key capabilities covered include messaging, rules engines, device shadows, security, local execution, and over-the-air updates. Integration with other AWS services such as AWS Lambda and Amazon Alexa is also discussed.
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...APNIC
Adli Wahid, Senior Internet Security Specialist at APNIC, delivered a presentation titled 'Honeypots Unveiled: Proactive Defense Tactics for Cyber Security' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
More Related Content
Similar to Peering in Japan from JPNAP perspective
IRJET- Boat Localization and Warning System for Border IdentificationIRJET Journal
This document describes a boat localization and warning system to help identify national borders and prevent fishermen from unintentionally crossing into other countries' waters. The proposed system uses Received Signal Strength Indication (RSSI) and Zigbee technology to track the location and distance of boats from borders in real-time. It includes a transmitter section on boats with a microcontroller, RSSI module, voice playback, and motor, and a receiver section in a control room with an RSSI module and monitoring database. The system can alert fishermen via voice when a boat approaches a border and automatically turn off the motor. It can also send messages to fishermen's homes using GSM if a boat crosses a border. This aims to help
The document appears to be a technical document from NTT Corp containing copyright information and technical specifications. It includes repetitive sections with copyright notices and formatted text, numbers, and symbols that appear to be specifications or code but are difficult to interpret without more context. The document seems to provide technical information for an internal audience at NTT Corp. but lacks clear narrative or explanations.
Use Cases of the CPaaS.io project as presented at the first year review meeting in Tokyo on October 5, 2017.
Disclaimer:
This document has been produced in the context of the CPaaS.io project which is jointly funded by the European Commission (grant agreement n° 723076) and NICT from Japan (management number 18302). All information provided in this document is provided "as is" and no guarantee or warranty is given that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability. For the avoidance of all doubts, the European Commission and NICT have no liability in respect of this document, which is merely representing the view of the project consortium. This document is subject to change without notice.
This document discusses WebRTC and provides information about its capabilities and implementations. It covers topics like how WebRTC enables real-time communication directly in the browser between computers, mobile devices, and Internet of Things devices using APIs for audio/video streaming and peer-to-peer data sharing without plugins. It also discusses how WebRTC uses UDP and works around issues like NAT traversal using STUN, TURN, and ICE to establish connections.
APRICOT 2012 - Living with the ever-growing BGP table: an OCN storyChika Yoshimura
This document contains diagrams and descriptions of NTT Communications' global IP network and backbone infrastructure. The following key points are discussed:
- NTT has POPs and peering points across Asia, Europe, and North America that are connected by its global and regional backbones.
- The Japanese backbone connects 13 POPs across the country with capacities ranging from 1Gbps to 480Gbps.
- NTT's core routers in Tokyo and Osaka exchange traffic between Japan, Asia, Europe, and North America with capacities up to 560Gbps and 480Gbps respectively.
- Details are provided on NTT's transition to new backbone and peering technologies over time, including the initial backbone in 1996 and upgrades
APRICOT 2012 - Living with the ever-growing BGP table: an OCN story直樹 益子
This document contains diagrams and descriptions of NTT Communications' global IP network and backbone infrastructure. The following key points are discussed:
- NTT has POPs and peering points across Asia, Europe, and North America that are connected by its global and regional backbones.
- The Japanese backbone connects 13 POPs across the country with capacities ranging from 1Gbps to 480Gbps.
- NTT's core routers in Tokyo and Osaka exchange traffic between Japan, Asia, Europe, and North America with capacities up to 560Gbps and 480Gbps respectively.
- Details are provided on NTT's transition to new backbone and peering technologies over time, including the initial backbone in 1996 and upgrades
The document discusses utilizing spatiotemporal data from IoT devices in Redis. It proposes using a technique called "ST-coding" to encode location and timestamp data into a single code. This addresses two problems: 1) ST range queries were slow due to searching many keys; and 2) data insertion was inefficient due to load concentration on a single Redis server. By splitting the ST-code into a "PRE-code" and "SUF-code", ST range queries can be performed on a single key, avoiding use of the slow KEYS command. This improves query performance and distributes load across Redis servers.
This document discusses bi-directional access to live application, database, and web API data through standard drivers. It enables real-time data integration with hundreds of applications, databases, and web APIs. It also discusses drivers for NoSQL, big data, and SaaS connectivity that are embedded in leading business intelligence, extract-transform-load, data integration, data virtualization, and data warehousing tools. Finally, it discusses building REST APIs for databases with clicks to enable mobile and web applications to access database data.
This document summarizes a joint research project between JPRS and several Japanese ISPs to enhance DNS resiliency. The goals were to install DNS servers in multiple regions of Japan to distribute query load and ensure continuity of DNS services during natural disasters. ISPs configured their networks to direct queries to local DNS nodes hosted by JPRS within their networks. Evaluation found queries shifted towards local nodes, response times improved, and Internet services remained available within ISP networks even when other DNS sites were unreachable, demonstrating increased DNS resiliency.
The document discusses Oracle Blockchain Platform and Hyperledger Fabric. It describes how Oracle Blockchain Platform uses Hyperledger Fabric and can build consortium blockchain networks for enterprises. It allows companies to leverage blockchain for supply chain management, identity management, and other applications. The platform provides tools to simplify blockchain development, operations and governance to help businesses launch blockchain networks and applications.
The document discusses the limits of information and communication technologies (ICT) such as computing power, data storage, and network bandwidth. It proposes that future networks will need to scale in both size and functionality through approaches like federation of multiple networks. Cloud computing is presented as a potential approach to tackle these limits by providing on-demand access to shared computing resources over a network in a scalable and elastic manner. However, cloud computing is still associated with many marketing hype and open questions remain regarding its impact and how it can integrate with existing technologies.
Japan Container Days v18.12 1C5 Kubernetes+ロボット(ROS)アプリの連携パラダイムTatsuya Fukuta
The document discusses Robot Operating System (ROS) middleware and how it can be used with various hardware platforms like laptops, Raspberry Pi, and Arduino. It mentions that ROS works across operating systems and allows connecting different nodes over a network. The document also talks about deploying ROS applications on Amazon cloud infrastructure using containers, Kubernetes, and Docker. It describes using tools like Jenkins, Docker, and Kubernetes to build, test and deploy ROS applications on hardware like Raspberry Pi or in the cloud.
The document appears to be technical documentation or specifications that includes:
- Details about software or system components with references to things like classes, methods and APIs
- Software architecture diagrams and descriptions of interactions between components
- Implementation notes and instructions including references to tools, endpoints, URLs and programming concepts
The documentation is copyrighted and includes various technical specifications, software architectures and implementation notes for a system or software.
I have for some time worked on training notes (eventually a book) that particular targets the un-initiated or persons / companies interested in understanding how Telco works and thinks. Particular focusing on Economics and Business Models.
These notes where used in a recent training I gave in Myanmar and as such many of the examples are particular to Myanmar.
For the initiated this is likely going to be too easy and sometimes even feel like cheating (just a bit).
Stay tuned as I will be updating these particular slides frequently and as I tailor make them for particular requests or interests.
In case you are interested in the actual training get in touch.
IPv6 deployment experience in Japan has uncovered several key issues:
1. Early mobile networks using IPv4 experienced congestion due to limited wireless bandwidth, but IPv6 has alleviated this by allowing more efficient use of network resources.
2. Mobile carriers in Japan have taken two approaches to IPv6 deployment - some use NAT/firewalls to preserve wireless resources and protect users, while others offer a separate "pure IPv6" service for a fee.
3. A successful IPv6 rollout requires addressing challenges across many aspects of network operations, backend systems, customer support, and device compatibility to ensure a smooth transition.
The document provides an overview of Low Power Wide Area (LPWA) networks and technologies. It discusses that LPWA networks are needed to connect billions of low-power devices over long ranges using low-cost radio technologies. Examples of LPWA technologies include LoRa, SigFox, NB-IoT and EC-GPRS. The document also outlines potential use cases for LPWA networks in areas like smart cities, utilities, agriculture and more.
1. The document appears to be a report from Rist Inc. detailing developments in their deep learning research from 1991 to 2019.
2. It discusses various deep learning applications such as detecting diseases in medical images and generating videos.
3. The report also examines topics like deep safety and ensuring AI systems are beneficial to humanity.
The document discusses a GPU cluster configuration with compute nodes running the slurmd daemon and Nvidia Volta GPUs. A management node runs the slurmctld daemon to manage jobs in the queue across the cluster. A monitoring node runs tools like Prometheus to monitor the cluster.
The document discusses Amazon Web Services (AWS) Internet of Things (IoT) services including AWS IoT Core, AWS Greengrass, Amazon FreeRTOS, and AWS IoT Device Management. It provides overviews and descriptions of each service and how they relate to and interact with each other to support IoT solutions. Key capabilities covered include messaging, rules engines, device shadows, security, local execution, and over-the-air updates. Integration with other AWS services such as AWS Lambda and Amazon Alexa is also discussed.
Similar to Peering in Japan from JPNAP perspective (20)
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...APNIC
Adli Wahid, Senior Internet Security Specialist at APNIC, delivered a presentation titled 'Honeypots Unveiled: Proactive Defense Tactics for Cyber Security' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
Securing BGP: Operational Strategies and Best Practices for Network Defenders...APNIC
Md. Zobair Khan,
Network Analyst and Technical Trainer at APNIC, presented 'Securing BGP: Operational Strategies and Best Practices for Network Defenders' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
Chimi Dorji, Internet Resource Analyst at APNIC, presented on Registry Data Accuracy Improvements at SANOG 41 jointly held with INNOG 7 in Mumbai, India from 25 to 30 April 2024.
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
Sunny Chendi, Senior Advisor, Membership and Policy at APNIC, presents 'APNIC Policy Roundup' at the 5th ICANN APAC-TWNIC Engagement Forum and 41st TWNIC OPM in Taipei, Taiwan from 23 to 24 April.
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
Dave Phelan, Senior Network Analyst/Technical Trainer at APNIC, presents 'DDoS In Oceania and the Pacific' at NZNOG 2024 held in Nelson, New Zealand from 8 to 12 April 2024.
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
Geoff Huston, Chief Scientist at APNIC deliver keynote presentation on the 'Future Evolution of the Internet' at the Everything Open 2024 conference in Gladstone, Australia from 16 to 18 April 2024.
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
Paul Wilson, Director General of APNIC delivers a presentation on IP addressing and IPv6 to the Policymakers Program during IETF 119 in Brisbane Australia from 16 to 22 March 2024.
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
Tom Harrison, Product and Delivery Manager at APNIC presents at the Registration Protocols Extensions working group during IETF 119 in Brisbane, Australia from 16-22 March 2024
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
Che-Hoo Cheng, Senior Director, Development at APNIC presents on the "Benefits of doing Internet peering and running an Internet Exchange (IX)" at the Communications Regulatory Commission of Mongolia's IPv6, IXP, Datacenter - Policy and Regulation International Trends Forum in Ulaanbaatar, Mongolia on 7 March 2024
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
APNIC Senior Advisor, Membership and Policy, Sunny Chendi presented on APNIC updates and RIR Policies for ccTLDs at APTLD 85 in Goa, India from 19-22 February 2024.
HijackLoader Evolution: Interactive Process HollowingDonato Onofri
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe. This new approach, called "Interactive Process Hollowing", has the potential to make defense evasion stealthier.