Blog

Workshop – East Zone

Workshop date: 24th September 2024 Workshop venue: Heritage Institute of Technology, Kolkata, West Bengal Agenda link: Program Schedule – Kolkata – AIORI Key speakers:  Mr. Anand Raje, CTO- AIORI & Trustee – IIFON Anand Raje | LinkedIn Mr. Anupam Agrawal, Chair, India Internet Foundation Anupam Agrawal | LinkedIn Mr. Abhijan

Read More »

Workshop – West Zone

Workshop date: 19th September 2024 Workshop venue: Sardar Patel Institute of Technology, Mumbai, Maharashtra Agenda link: Program Schedule – Mumbai – AIORI Key speakers:  Mr. Anand Raje, CTO- AIORI & Trustee – IIFON Anand Raje | LinkedIn Mr. Manikandan K, Director, BIS (Bureau of Indian Standards) Manikandan K | LinkedIn

Read More »

Workshop North East Zone

Workshop date: 26th September 2024 Workshop venue: Royal Global University, Guwahati, Assam Agenda link: Program Schedule – Guwahati – AIORI Key speakers: Mr. Anand Raje, CTO- AIORI & Trustee – IIFON, Anand Raje | LinkedIn Mr. Anupam Agrawal, Chair, India Internet Foundation Anupam Agrawal | LinkedIn Dr. John Jose, Vice

Read More »

Workshop – North Zone

Workshop date: 21st September 2024 Workshop venue: Sharda University, Greater Noida, UP Agenda link: Program Schedule – Delhi – AIORI Key speakers: Mr. Anand Raje, CTO- AIORI & Trustee – IIFON Anand Raje |LinkedIn Ms Pimmy Gandotra, Pimmy gandotra | LinkedIn Mr. Amitabh Singhal, Director Designate ICANN Amitabh Singhal |LinkedIn

Read More »

Workshop – South Zone

Workshop date: 18th September 2024 Workshop venue: St. Joseph College of Engineering, Chennai, Tamil Nadu Agenda link: Program Schedule – Chennai – AIORI Key speakers:  Mr. Anand Raje, CTO- AIORI & Trustee – IIFON Anand Raje |LinkedIn Ms. T R Ramya, CeWIT Ramya T. R. | LinkedIn Dr. N. Sudha

Read More »

Asymmetric Cryptography vs. Symmetric Cryptography in the Quantum Era

Quantum computing promises to revolutionize many fields, but it also poses significant challenges to current cryptographic systems. One of the key differences in how quantum computing impacts these systems lies in the distinction between asymmetric and symmetric cryptography. While asymmetric cryptography is particularly vulnerable to quantum attacks, symmetric cryptography can

Read More »

Mitigating DDoS attacks using BGP configurations

In today’s interconnected world, Distributed Denial of Service (DDoS) attacks are a growing threat to the stability and availability of online services. These attacks aim to overwhelm network resources, rendering services inaccessible to legitimate users. One of the most effective strategies to mitigate such attacks involves leveraging Border Gateway Protocol

Read More »