ISIF Asia is proud to announce its four inaugural IPv6 Deployment Grant recipients.
The 2022 ISIF Asia awards recognize Swiss German University and the University of Auckland. They will be presented at the APNIC54 conference during the APNIC Foundation conference session. Come join us!
This project investigated the remote powering of the Internet using quasi-passive network nodes, where the power required for the providing Internet in remote network nodes without local power supply is remotely provided optically.
This project is to improve network operations in Asia Pacific in the area of Lawful Intercept, using OpenLI.
IPv6 adoption at large, brick-and-mortar enterprises has lagged. Many feel that unless this issue is addressed, the Internet as a whole will stall at an IPv6 adoption rate of about 60%. IIESoc, a nonprofit based in India, would like to begin to address this issue.
ISIF Asia is now accepting applications for the 2022 funding cycle. ISIF Asia empowers organizations across the Asia Pacific region to research, design, and implement Internet-based solutions to solve Internet development challenges that support community development and growth. Since 2008, ISIF Asia has supported 99 grants and 29 awards, allocating over USD 5.4 million to 128 innovative initiatives across 27 economies. Applications are open to public and private sector organizations, academia, non-profits, … Continue reading 2022 ISIF Asia Grants now open for applications
ISIF Asia has released its full list of 2021 grantees. Find out more about this record list of 22 projects.
Despite exhaustion of the IPv4 address space commencing in 2011, the Internet has largely not transitioned to IPv6, and in fact the rate of IPv6 diffusion has recently begun to slow down (Huston, 2018). The IPv6 transition is expected to take decades and hence problems stemming from issues the lack of scalability of IPv4 will … Continue reading Report available! Modelling and identifying IP address space fragmentation pressure points
With the continuous rise of cyber security threats, monitoring security potential threats and attacks become essential to plan for cyber defense. Honeypot, a decoy system designed to lure attackers, has been used to track and learn attacker’s behavior. Collecting attacker’s interactions with honeypot at different locations inside different organization’s premises provide useful and more complete … Continue reading Report available! Collaborative Honeynet Threat Sharing Platform
The TellTale project was conceived with aim of addressing the problem of measurement and projection of the power uptime duration of wireless internet relays. In rural areas and in areas where such projections are not available, operators often fail to address downtimes in a timely manner, thereby increasing the number and duration of downtimes and/or … Continue reading Report available! Telemetering the telltale signs of power issues of wireless internet relays