_____________________________________________________________________
APNIC 54 Conference - Call for Papers
_____________________________________________________________________
The APNIC Program Committee is seeking presentations for the APNIC 54
Conference in Singapore (13-15 September 2022). We are looking for
content that would suit technical sessions, tutorials, lightning talks,
and panel discussions.
Please note, the program committee is working to early deadlines so
the APNIC 54 conference program can be announced.
Speakers may present on stage in Singapore or remotely. APNIC 54
conference registration is free for all, however speakers must fund
their own travel if presenting in-person.
Key Dates
Call for Presentations Opens 20 May 2022
First Round Acceptance 10 June 2022
Final Deadline for Submissions 01 July 2022
Final Round Acceptance 29 July 2022
Topics for conference sessions must be relevant to Internet operations
and technologies. For possible areas of topics and submission details,
please visit:
https://conference.apnic.net/54/program/call-for-papers/
Prospective presenters should note that the majority of speaking slots
will be filled well before the final submission deadline. The PC will
retain a limited number of slots up to the final submission deadline
for presentations that are exceptionally timely, important, or of
critical operational importance.
If you have any other ideas or proposals for panel or BoF sessions,
please feel free to submit your ideas via the submission system.
If you have any questions, please email the Program Committee at:
apnic-pc(a)apnic.net
The Program Committee members are:
- Afifa Abbas, Banglalink
- Achie Atienza, Globe Telecom
- Cong Jen Ooi, MyNOG
- Dave Phelan, APNIC
- GZ Kabir, BDCOM
- Kittinan Sriprasert, BKNIX
- Masataka Matawari, JPIX
- Minh Lay, KHNOG
- Muhammad Moinur Rahman
- Rahul Makhija, Esto Internet
- Sanjeev Gupta, IPv6 Forum
- Saqib Ali, University of Agriculture Faisalabad
- Seung Lee, NTT Ltd. Australia
- Sheryl (Shane) Hermoso, APNIC
- Terence Sweetser, IO Networks, QUT, ISOC
For more information about APNIC 54, please visit:
https://conference.apnic.net/54
Regards,
Muhammad Moinur Rahman, Chair
Sheryl Hermoso, Co-Chair
On behalf of
APNIC 54 Program Committee
Dear relation,
We are happy to invite you to our annual community event on Wednesday June 1st & Thursday June 2nd.
This year's agenda includes presentations on topics such as Quantum Encryption, the fight against disinformation, the impact of IXP outages and many more. Throughout the event, there will be plenty of time for networking.
At the end of the first day, we will have a nice dinner at a restaurant close-by.
Please register here<https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.more-…>.
For the agenda, speakers and other details, please visit our website<https://eur03.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.more-i…>.
Don't forget to keep an eye on our social media channels for first-hand MORE-IP updates.
We look forward to seeing you in Amsterdam on June 1 and 2!
Kind regards,
Team AMS-IX
Hi all,
Last year at the 2021 NLNOG event we announced the release of the new version of IRR explorer. We've published an article on RIPE Labs now on how to read IRR explorer output by looking at some examples. You can find it here: https://labs.ripe.net/author/teun/an-introduction-to-irr-explorer/
If you haven't used IRR explorer before, check it out at https://irrexplorer.nlnog.net!
Cheers,
Teun
In response to feedback from operational security communities,
CAIDA's source address validation measurement project
(https://spoofer.caida.org) is automatically generating monthly
reports of ASes originating prefixes in BGP for systems from which
we received packets with a spoofed source address.
We are publishing these reports to network and security operations
lists in order to ensure this information reaches operational
contacts in these ASes.
This report summarises tests conducted within nld.
Inferred improvements during Apr 2022:
none inferred
Source Address Validation issues inferred during Apr 2022:
ASN Name First-Spoofed Last-Spoofed
8587 Infracom 2019-10-28 2022-04-11
211501 2022-01-18 2022-04-20
62068 SpectraIP 2022-04-12 2022-04-12
Further information for these tests where we received spoofed
packets is available at:
https://spoofer.caida.org/recent_tests.php?country_include=nld&no_block=1
Please send any feedback or suggestions to spoofer-info(a)caida.org