{"id":130,"date":"2016-03-07T15:17:31","date_gmt":"2016-03-07T15:17:31","guid":{"rendered":"https:\/\/www.enog.org\/enog-10\/ru\/?page_id=130"},"modified":"2016-05-18T14:33:21","modified_gmt":"2016-05-18T14:33:21","slug":"presentations","status":"publish","type":"page","link":"https:\/\/localhost.ripe.net\/enog-10\/ru\/archives\/presentations\/","title":{"rendered":"\u041f\u0440\u0435\u0437\u0435\u043d\u0442\u0430\u0446\u0438\u0438"},"content":{"rendered":"

\u041f\u043e\u0436\u0430\u043b\u0443\u0439\u0441\u0442\u0430 \u043f\u0440\u0438\u043c\u0438\u0442\u0435 \u043a \u0441\u0432\u0435\u0434\u0435\u043d\u0438\u044e, \u0447\u0442\u043e \u043fe\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u0430\u044f \u0432\u0435\u0440\u0441\u0438\u044f \u043f\u0440\u0435\u0437\u0435\u043d\u0442\u0430\u0446\u0438\u0438 \u201cRegional Internet Data Analysis\u201d \u0412\u0438\u043a\u0442\u043e\u0440\u0430 \u041d\u0430\u0443\u043c\u043e\u0432\u0430 \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u043b\u0430 \u0433\u0440\u0430\u0444\u0438\u043a \u0441 \u043d\u0435\u0432\u0435\u0440\u043d\u044b\u043c\u0438 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u044f\u043c\u0438 \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u0430 RIR \u0432 ENOG \u0440\u0435\u0433\u0438\u043e\u043d\u0435. \u0412 \u0432\u0435\u0440\u0441\u0438\u0438 \u043e\u0442 15 \u043e\u043a\u0442\u044f\u0431\u0440\u044f \u0434\u0430\u043d\u043d\u044b\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b.<\/p>\n\n\n\n\n\n\n<\/colgroup>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
Presenter Name<\/th>\nSession<\/th>\nPresentation Title<\/th>\nType<\/th>\nDate Added<\/th>\n<\/tr>\n<\/thead>\n
Alexey Semenyaka<\/td>\nTutorial<\/td>\nDDoS attacks: why they are possible and how to mitigate them<\/a><\/td>\n<\/i><\/a><\/td>\n2015-10-13<\/td>\n<\/tr>\n
Anton Baskov, Alexey Semenyaka<\/td>\nBirds of a Feather<\/td>\nWorking Groups at ENOG<\/a><\/td>\n<\/i><\/a><\/td>\n2015-10-14<\/td>\n<\/tr>\n
Axel Pawlik<\/td>\nPlenary<\/td>\nRIPE NCC Update<\/a><\/td>\n<\/i><\/a><\/td>\n2015-10-19<\/td>\n<\/tr>\n
Dmitry Kohmanyuk<\/td>\nPlenary<\/td>\nInternet Around the Black Sea<\/a><\/td>\n<\/i><\/a><\/td>\n2015-10-13<\/td>\n<\/tr>\n
Dmitry Kohmanyuk<\/td>\nOpening Plenary<\/td>\nA Quick Zone Scan of .UA<\/a><\/td>\n<\/i><\/a><\/td>\n2015-10-13<\/td>\n<\/tr>\n
Ivan Pietuchov<\/td>\nBirds of a Feather<\/td>\n\u041d\u043e\u0432\u044b\u0439 \u0442\u0435\u043d\u0434\u0435\u043d\u0446\u0438\u0438 \u0437\u0430\u043a\u043e\u043d\u043e\u0434\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0430 \u0423\u043a\u0440\u0430\u0438\u043d\u044b, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u043e\u043c. \u0412\u043b\u0438\u044f\u043d\u0438\u0435 \u043d\u043e\u0432\u043e\u0432\u0432\u0435\u0434\u0435\u043d\u0438\u0439 \u043d\u0430 \u0442\u0435\u043b\u0435\u043a\u043e\u043c\u043c\u0443\u043d\u0438\u043a\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0439 \u0440\u044b\u043d\u043e\u043a<\/a><\/td>\n<\/i><\/a><\/td>\n2015-10-19<\/td>\n<\/tr>\n
Jaap Akkerhuis<\/td>\nPlenary<\/td>\nRoot Zone KSK Maintenance<\/a><\/td>\n<\/i><\/a><\/td>\n2015-10-19<\/td>\n<\/tr>\n
Jan Zorz<\/td>\nPlenary<\/td>\nRemoving IPv6 speed bumps: How to talk to your vendor and how to troubleshoot users IPv6 issues<\/a><\/td>\n<\/i><\/a><\/td>\n2015-10-19<\/td>\n<\/tr>\n
Jan Zorz<\/td>\nPlenary<\/td>\nDANE\/DNSSEC and TLS for email testing in the Go6lab<\/a><\/td>\n<\/i><\/a><\/td>\n2015-10-19<\/td>\n<\/tr>\n
Jim Cowie <\/td>\nOpening Plenary<\/td>\nGlobal Routing Incidents and the Need for Good MANRS<\/a><\/td>\n<\/i><\/a><\/td>\n2015-10-13<\/td>\n<\/tr>\n
Maarit Palovirta<\/td>\nClosing Plenary<\/td>\nCollaborative Security & MANRS<\/a><\/td>\n<\/i><\/a><\/td>\n2015-10-19<\/td>\n<\/tr>\n
Marco Schmidt<\/td>\nPlenary<\/td>\nPolicy Development \u2013 It\u2019s Easy!<\/a><\/td>\n<\/i><\/a><\/td>\n2015-10-19<\/td>\n<\/tr>\n
Maxim Burtikov<\/td>\nClosing Plenary<\/td>\nIANA Transition Overview<\/a><\/td>\n<\/i><\/a><\/td>\n2015-10-14<\/td>\n<\/tr>\n
Michael Yakushev<\/td>\nPlenary<\/td>\nMultilayer Internet Governance …<\/a><\/td>\n<\/i><\/a><\/td>\n2015-10-19<\/td>\n<\/tr>\n
Nathalie Trenaman<\/td>\nPlenary<\/td>\nIPv6 News<\/a><\/td>\n<\/i><\/a><\/td>\n2015-10-19<\/td>\n<\/tr>\n
Svitlana Tkachenko<\/td>\nOpening Plenary<\/td>\nIPv6 and DNSSEC technologies in .UA<\/a><\/td>\n<\/i><\/a><\/td>\n2015-10-13<\/td>\n<\/tr>\n
Timothy Denton<\/td>\nPlenary<\/td>\nHE’s observations on internet exchange point management<\/a><\/td>\n<\/i><\/a><\/td>\n2015-10-10<\/td>\n<\/tr>\n
Vadim Getmanshchuk<\/td>\nPlenary<\/td>\nDemystifying CDN<\/a><\/td>\n<\/i><\/a><\/td>\n2015-10-14<\/td>\n<\/tr>\n
Viktor Naumov<\/td>\nClosing Plenary<\/td>\nRegional Internet Data Analysis<\/a><\/td>\n<\/i><\/a><\/td>\n2015-10-15<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n
<\/div>
This text is also available in English<\/a><\/div>","protected":false},"excerpt":{"rendered":"

\u041f\u043e\u0436\u0430\u043b\u0443\u0439\u0441\u0442\u0430 \u043f\u0440\u0438\u043c\u0438\u0442\u0435 \u043a \u0441\u0432\u0435\u0434\u0435\u043d\u0438\u044e, \u0447\u0442\u043e \u043fe\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u0430\u044f \u0432\u0435\u0440\u0441\u0438\u044f \u043f\u0440\u0435\u0437\u0435\u043d\u0442\u0430\u0446\u0438\u0438 \u201cRegional Internet Data Analysis\u201d \u0412\u0438\u043a\u0442\u043e\u0440\u0430 \u041d\u0430\u0443\u043c\u043e\u0432\u0430 \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u043b\u0430 \u0433\u0440\u0430\u0444\u0438\u043a \u0441 \u043d\u0435\u0432\u0435\u0440\u043d\u044b\u043c\u0438 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u044f\u043c\u0438 \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u0430 RIR \u0432 ENOG \u0440\u0435\u0433\u0438\u043e\u043d\u0435. \u0412 \u0432\u0435\u0440\u0441\u0438\u0438 \u043e\u0442 15 \u043e\u043a\u0442\u044f\u0431\u0440\u044f \u0434\u0430\u043d\u043d\u044b\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b. Presenter Name Session Presentation Title Type Date Added Alexey Semenyaka Tutorial DDoS attacks: why they are possible and how to mitigate them 2015-10-13 Anton […]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":126,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_links_to":"","_links_to_target":""},"_links":{"self":[{"href":"https:\/\/localhost.ripe.net\/enog-10\/ru\/wp-json\/wp\/v2\/pages\/130"}],"collection":[{"href":"https:\/\/localhost.ripe.net\/enog-10\/ru\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/localhost.ripe.net\/enog-10\/ru\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/localhost.ripe.net\/enog-10\/ru\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/localhost.ripe.net\/enog-10\/ru\/wp-json\/wp\/v2\/comments?post=130"}],"version-history":[{"count":3,"href":"https:\/\/localhost.ripe.net\/enog-10\/ru\/wp-json\/wp\/v2\/pages\/130\/revisions"}],"predecessor-version":[{"id":234,"href":"https:\/\/localhost.ripe.net\/enog-10\/ru\/wp-json\/wp\/v2\/pages\/130\/revisions\/234"}],"up":[{"embeddable":true,"href":"https:\/\/localhost.ripe.net\/enog-10\/ru\/wp-json\/wp\/v2\/pages\/126"}],"wp:attachment":[{"href":"https:\/\/localhost.ripe.net\/enog-10\/ru\/wp-json\/wp\/v2\/media?parent=130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}