Ga naar 'Home'

Artikelen

615 artikelen

  1. Smart watches; disruptive innovation or temporary timekeepers?

    With the recent release of smart watches from established device manufacturers like Sony, Samsung, and Qualcomm I’m very interested in the potential use (or misuse) of this wearable technology in the field of higher education and research. What flavors are out there, what does it do, who is using it or will use it and can this technology enhance a field where the ink of the BYO(mobile)D policy document is still wet?
    Photo of a man wearing a watch with objects floating above it
  2. Damn you, single sign-on

    One of the best features of SURFconext is the support of single sign-on, which means that once you have entered your credentials to use a service connected to the SURFconext platform, you do not have to repeat this when you want to use another service that is also connected to SURFconext. This makes the user experience easier and faster.
    Schema of logging out from SURFconext
  3. The good, the bad and NAT

    Ik wil even een misverstand uit de weg ruimen. Iedereen heeft het over NAT en de problemen die daarbij optreden ten aanzien van het vinden van machines in het interne netwerk. Dat zou echter bij NAT niet het geval moeten zijn. NAT is namelijk Network Address Translation waarbij interne adressen 1-op-1 vertaald worden naar externe adressen. Als een extern adres, van de organisatie, bekend is, is uit de vertaaltabel te achterhalen wat het interne adres is.
    datacentrum-patchkabel-switch
  4. What is Green ICT?

    For most people, Green ICT is about reducing the impact of ICT on the environment. It is about reducing the energy use of computers, servers and data centers. You might even consider the whole life cycle of ICT equipment and look at the rare material use or think about e-waste and recycling. However, ICT is not only part of the problem of our environmental impact, it is also part of the solution.
    Grafiek The Impact of ICT
  5. Monitoring HSM memory usage

    If, like us, you use an HSM to store your DNSSEC key material you may know that it is important to monitor memory usage in your HSM; with a typical DNSSEC key management scheme you may have as many as 5 keys active per signed domain. This can be a burden on your HSM, especially if it has a limited amount of storage like ours do.
    RAM memory stick
  6. IRMA: privacy en authenticatie gaan prima samen!

    Wat is IRMA? Sinds begin 2012 werkt SURFnet samen met de Radboud Universiteit, TNO en SIDN in een project dat luistert naar de naam ‘IRMA’. In deze blogpost willen we wat meer vertellen over dit project en de onderliggende technologie.
    Student aan het werk op laptop
  7. SAML for dummies

    SURFconext combines all sorts of technologies in a single collaboration platform, and when all these technologies are working in concert, that’s when SURFconext really shines. But the interweaving of those technologies can also make SURFconext seem complex and daunting at times. In this post I’ll try to shed some light on one of the most important pieces of the SURFconext jigsaw: the Security Assertion Markup Language, or SAML for short.
    SAML Transaction Steps
  8. Stralingsniveau onderzocht op SURFnet-kantoor

    Als onderdeel van de LTE-activiteiten zijn in het kantoor van SURFnet zes antennes aangebracht die LTE-frequenties zenden en ontvangen op de frequentie 2.6Ghz. In de serverruimte op de vijfde verdieping staat een LTE-basisstation die aangestuurd wordt door LTE-apparatuur in de backend van KPN. Deze apparatuur is hardware matig ingesteld op het laagste niveau. Verder zijn er fysieke dempers aangebracht in de splitter van de antenne om het stralingsniveau te reduceren.
    Student aan het werk op laptop
  9. BGP route validation

    SURFnet and security are like Cain and Abel. That’s obvious to anybody who has been the subject of DDOS attacks or has been in contact with SURFcert. From the beginning, SURFnet has always paid a lot of attention to security in connection with the Internet, the SURFnet network, and the networks of its connected institutions.
    Graph of the number of prefixes in the routing table and the number of prefixes labelled with a validation state.
  10. Signer migration: a step-by-step guide (introduction)

    One of our goals with this blog has been to share what we have learned from our DNSSEC deployment with our constituency and the wider Internet community. Last month we performed a complicated operation on our DNSSEC signer deployment: we migrated from the existing signer setup to a completely independently running new signer. We had prepared this migration beforehand and the migration was a big success; all our signed domains were migrated safely while remaining secure.
    A goldfish jumping from a fishbowl into another one