Tutorial: Internet Resource Management by Champika Wijayatunga, APNICFebrian
This training introduces, highlights, and explains the key essentials of Internet resource management. It focuses on understanding the structures, processes, procedures, and policies involved in requesting, allocating, and managing Internet addresses (IPv4 and IPv6) and Autonomous System (AS) numbers.
The course also includes aspects of the APNIC Whois Database, Reverse DNS delegations, and MyAPNIC address management tool.
Course outline
* Introduction to APNIC
* Internet registry policies
* Requesting IP addresses
* IP address management
* APNIC Whois Database
* MyAPNIC
* Autonomous System Numbers
* Reverse DNS delegations
* IPv6 overview
Tutorial: Internet Resource Management by Champika Wijayatunga, APNICFebrian
This training introduces, highlights, and explains the key essentials of Internet resource management. It focuses on understanding the structures, processes, procedures, and policies involved in requesting, allocating, and managing Internet addresses (IPv4 and IPv6) and Autonomous System (AS) numbers.
The course also includes aspects of the APNIC Whois Database, Reverse DNS delegations, and MyAPNIC address management tool.
Course outline
* Introduction to APNIC
* Internet registry policies
* Requesting IP addresses
* IP address management
* APNIC Whois Database
* MyAPNIC
* Autonomous System Numbers
* Reverse DNS delegations
* IPv6 overview
Abitcool - A vast array of small-scale service providers with gigabit access,...APNIC
Abitcool - A vast array of small-scale service providers with gigabit access, by Tony Hain. A presentation given at APNIC 38 during the APOPS 3 session.
Presentation given by Srinivas (Sunny) Chendi, APNIC's Senior Internet Development Advisor, at the 3rd Open Policy meeting held by the Indian Registry for Internet Names and Numbers (IRINN) 24 November 2015
Welcome to the APNIC Member Gathering, MongoliaAPNIC
Services Director George Kuo presents on IPv6 deployment in the region; IPv6 in broadband networks, getting more IPv4 address space; APNIC whois data quality, and routing security at a Member Gathering in Mongolia from 13 to 14 June 2017.
CommunicAsia 2017: IPv6 deployment architecture for IoTAPNIC
APNIC Training and Technical Assistance Manager Nurul Islam discusses the design options for IPv6 in a broadband access network and the impact that IoT will have on this in order to support future growth at CommunicAsia 2017.
Abitcool - A vast array of small-scale service providers with gigabit access,...APNIC
Abitcool - A vast array of small-scale service providers with gigabit access, by Tony Hain. A presentation given at APNIC 38 during the APOPS 3 session.
Presentation given by Srinivas (Sunny) Chendi, APNIC's Senior Internet Development Advisor, at the 3rd Open Policy meeting held by the Indian Registry for Internet Names and Numbers (IRINN) 24 November 2015
Welcome to the APNIC Member Gathering, MongoliaAPNIC
Services Director George Kuo presents on IPv6 deployment in the region; IPv6 in broadband networks, getting more IPv4 address space; APNIC whois data quality, and routing security at a Member Gathering in Mongolia from 13 to 14 June 2017.
CommunicAsia 2017: IPv6 deployment architecture for IoTAPNIC
APNIC Training and Technical Assistance Manager Nurul Islam discusses the design options for IPv6 in a broadband access network and the impact that IoT will have on this in order to support future growth at CommunicAsia 2017.
This presentation describes the impending depletion of Internet Protocol version 4 (IPv4) and the importance of adopting the next version of the Internet Protocol, Internet Protocol version 6 (IPv6). This issue impacts everyone and must be understood and acted upon to ensure the continued growth and operation of the Internet. More educational materials from ARIN are available at: https://www.arin.net/knowledge/general.html
IPv6 Deployment in the Middle East - Amman, Jordan 2013kleknes
Update as per November 2013 of deployment in IPv6, the new internet protocol, in the Middle East. By Kjell Leknes, RIPE NCC, Internet Registry of Europe, Middle East and Central ASIA.
23rd PITA AGM and Conference: Key business drivers for IPv6APNIC
Senior Internet Resource Analyst Elly Tawhai gives a presentation on the key drivers for IPv6, covering how IPv6 enables the sustainable growth of the Internet, and the possibility for new services and business opportunities on large-scale IP installations.
ION Trinidad and Tobago, 5 February 2015 - Beyond the Tipping Point: Global Connectivity Three Years After World IPv6 Launch
Kevon Swift (LACNIC)
June 2015 marks the 3rd anniversary of World IPv6 Launch, when thousands of Internet Service Providers, home networking equipment manufacturers, and web companies around the world came together to permanently enable IPv6 on their products and services. Where are we now on the path to full global IPv6 adoption? We’ll discuss the current state of IPv6 adoption, including statistics and lessons learned from and since World IPv6 Launch, and the next steps needed to move forward with IPv6 deployment.
Similar to IPv4 depletion & IPv6 deployment in the RIPE NCC service region (20)
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
IPv4 depletion & IPv6 deployment in the RIPE NCC service region
1. IPv4 depletion & IPv6 deployment
in the RIPE NCC service region
Kjell Leknes - June 2010
2. Outline
• About RIPE and RIPE NCC
• IPv4 depletion
• IPv6 deployment
• Engaging the community
- RIPE NCC and the RIPE community
- Training courses
- IPv6 Act Now
2
3. RIPE NCC
• Since 1992 in Amsterdam
• Independent not-for-profit organisation
• 6500+ members in 75 countries
• One of five Regional Internet Registries (RIRs)
• Does not make policies
3
5. IP address distribution
/0 IANA
/8 RIR
/21 LIR
/23 /25 /25 End User
Allocation PA Assignment PI Assignment
5
6. RIPE NCC services
• Distribute resources • Database Reverse DNS
- IPv4 • ENUM
- IPv6
• K-root name server
- AS numbers
• E-learning
• Training courses
- LIR • RIPE Labs
- Routing Registry • IPv6 Act Now website
- DNS for LIRs
- IPv6
6
7. RIPE community
• Policy forum
- Not a legal entity
- No official membership
- Open to everyone
• One RIPE chairman and working group chairs
• No voting --> consensus
• Work done on mailing lists and at meetings by:
- Working groups
- Task forces
7
8. RIPE meetings
• Two RIPE meetings per year
• Plenary discussions
- Wide ranging topics
• Working group meetings
- More specific focus
• Policy discussions
• Exchange of views and information
• Interaction with other internet stakeholders
8
9. RIPE policy development
• Open
- Anyone can participate
- Policy meetings
- Mailing lists
• Transparent
- List discussions archived publicly
- Meetings transcribed
• Bottom-up process
- By the Internet community
9
10. Global policy development
AfriNIC RIPE NCC ARIN APNIC LACNIC
AfriNIC RIPE ARIN APNIC LACNIC
community community community community community
proposal proposal proposal proposal proposal
10
11. Global policy development
ICANN / IANA
ASO
AfriNIC Reach consensusARIN
RIPE NCC across communities
APNIC LACNIC
AfriNIC RIPE ARIN APNIC LACNIC
community community community community community
proposal proposal Global proposal
Policy Proposal proposal proposal
10
13. IPv4 address pool - June 2005
Other
Central
Registry
25%
available
APNIC
RIPE NCC
LACNIC AfriNIC
ARIN
12
14. IPv4 address pool - Now Various
Other
RIPE NCC
6% AfriNIC
available
APNIC
ARIN
LACNIC
13
15. What we know
• RIRs are in total consistently consuming around
10 /8s each year
• There are 16 /8 blocks remaining in the global
free pool in June 2010
• Projected exhaustion of the global IPv4 free pool
August 2011
• IPv6 adoption is the only way to ensure
continued Internet growth
14
16. IPv4 address pool projections
IANA Pool RIR Allocations Advertised RIR Pool
Today
256
Data Projection
220
192
128
64
0
1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012
15
17. IPv4 allocation reduction
• RIPE NCC currently allocates up to 12 months
• As of 1 July 2010 - 9 months
• As of 1 January 2011 - 6 months
• As of 1 July 2011 - 3 months
16
18. IPv4 reclamation
• RIPE NCC reclaim addressing based on:
- Non payment
- Returned by LIR
- LIRs pending closure
• RIPE NCC has so far reclaimed 5,730,304 IPs
17
19. The last /8
• LIRs may receive only one allocation
• Max allocation size /22 (1024 IPs)
• Only available to LIRs having an IPv6 allocation
• /16 (65 536 IPs) will be reserved for unforeseen
circumstances
18
21. Getting an IPv6 allocation
• Must be an LIR
• LIR must plan to deploy IPv6 within 2 years
• Minimum allocation size /32
- 65536 /48’s
• Customer assignments (end sites) between:
- /64 (1 subnet)
- /48 (65536 subnets)
• Every subnet should be a /64
• Announce as single prefix recommended
20
22. Getting IPv6 provider independent (PI) space
• To qualify you must:
- Demonstrate you will multihome
- Meet the contractual requirements
• Minimum assignment size /48
• Can only be used for infrastructure
21
26. Engaging the community
• RIPE / RIPE NCC events
- RIPE IPv6 working groups
- RIPE cooperation working group
- RIPE NCC government roundtables
• Other fora:
- Internet Governance Forum (IGF)
- OECD
- ITU events
- European Commission (EC)
• IPv6 Act Now website
23