October 2016 archive

For Immediate Release #59: Kick Him in the (Virtual) Nuts!

Christopher Barger (Brain+Trust Partners), Gini Dietrich (Arment Dietrich Inc.), and Doug Haslam (Stone Temple Consulting) were on the FIR panel for some conversation about the following topics…

  • A study found a correlation between increased investment in CSR activities and profitability.
  • Ratings for National Football League broadcasts are way down and a lot of reasons are being cited. A lot of them come down to the NFL’s culture and values.
  • Sexism is alive and well — even at the PRSA conference.
  • PR agencies aren’t training their staffs to deliver the kind of digital services their clients want.
  • Dan York reports on the feud between Twitter and Facebook over live streaming enhancements.
  • Twitter is discontinuing Vine, and Vine producers aren’t happy. (Neither is one of Vine’s founders.)
  • A study finds CMOs believe Artificial Intelligence will be bigger than social media.
  • Apple has dropped a lot of ports customers are accustomed to on its latest MacBook Pro.

Connect with our panelists on Twitter at @cbarger, @ginidietrich, and @dough.

Doug Haslam’s jargon list from this episode:

  • Change Agent
  • Grok
  • Walk the talk
  • Talk the talk
  • Gak

Links to the source material for this episode are on Contentle.

Special thanks to Jay Moonah for the opening and closing music.

About today’s panel:

bargerChristopher Barger is a partner at Brain+Trust Partners, an executive consultancy helping leaders manage an evolving marketplace with common sense and strategic guidance. He was previously Senior Vice President of Global Programs at Voce Communications, a Porter Novelli company, helping clients around the world develop and execute social media strategies. Christopher has been in the Porter Novelli family since 2011, arriving after nearly seven years of leading social media programs at Fortune 50 companies, and has a decade and a half’s experience building corporate communications strategies. Before joining PN, Christopher was director of global social media at General Motors, building the company’s social media program and leading its presence across multiple social networks. Christopher also previously managed social media initiatives and corporate communications for IBM, serving from 2005-2007 as that company’s first “Blogger-in-Chief” and playing the pivotal role in the development of IBM’s social media program. Christopher is the author of the book “The Social Media Strategist” (McGraw Hill, 2012).

Gini DietrichGini Dietrich is the founder and CEO of Arment Dietrich, a Chicago-based integrated marketing communications firm.  She is the lead blogger at the PR and marketing blog, Spin Sucks, is co-author of Marketing In the Round, and is co-host of Inside PR, a weekly podcast about communications and social media.  Her second book, Spin Sucks, is now available! She speaks, she writes for Crain’s Chicago Business and other publications.

April 7, 2011 - Boston, MA - Radian6 Social 2011 user conference held at Renaissance Waterfront Hotel Boston. Photos by www.derekwilmot.com

Doug Haslam’s  career has spanned a variety of disciplines within the communications field: radio technology, editorial production, public relations, marketing, social media and digital. Currently a senior consultant with Stone Temple Consulting, Doug began with public radio, producing news and thoughtful sports programs, moving into technology public relations, and currently to social media and content strategy for brands of all sizes and industries. Doug’s love of media has come full circle, as his most recent positions have seen him taking full advantage of his content creation skills, managing social media and brand publishing programs for a wide variety of clients.



The post FIR #59: Kick Him in the (Virtual) Nuts! appeared first on FIR Podcast Network.

Watch Live TODAY – DNSSEC Root KSK Ceremony at 17:00 UTC

DNSSEC Key Ceremony 25

Today a critical part of DNS security – DNSSEC – will receive a major update, and you can watch it all live at starting at 17:00 UTC (1:00pm US EDT – local time) streaming out of ICANN’s data center in Virginia:


Olaf Kolkman, our CITO, will be in attendance as a “Crypto Officer” (key holder). Olaf wrote a post with info about the 25th key ceremony back in May 2016 and shared some of his photos.

The important step today is that this key ceremony will involve the creation of a new Key Signing Key (KSK) for the root of DNS. This begins what will be a year-long process of “rolling over” the cryptographic key at the heart of the DNSSEC system. ICANN has a page dedicated to the “Root KSK Rollover” explaining the details – and this “at-a-glance” PDF provides the key facts and dates.

This is a great step in making DNSSEC even more secure.

If you’re interested, ICANN posts the “script” that will be used to go through today’s key ceremony. All of the key ceremonies are streamed live and archived for later viewing.

If you want to learn more about DNSSEC in general, please visit our Start Here page to find resources to help!

Image credit – Olaf Kolkman on Flickr. Used with permission.

How To Survive A DNS DDoS Attack – Consider using multiple DNS providers

How can your company continue to make its website and Internet services available during a massive distributed denial-of-service (DDoS) attack against a DNS hosting provider? In light of last Friday’s attack on Dyn’s DNS infrastructure, many people are asking this question.

One potential solution is to look at using multiple DNS providers for hosting your DNS records. The challenge with Friday’s attack was that so many of the affected companies – Twitter, Github, Spotify, Etsy, SoundCloud and many more – were using ONLY one provider for DNS services. When that DNS provider, Dyn, Inc, then came under attack, people couldn’t get to the servers running those services.  It was a single point of failure.  

Dan York

Audio Interview: Mozilla’s Nils Ohlmeier about Firefox and WebRTC

Iit nils podcast

Want to learn the latest about WebRTC inside of Firefox? Nils Ohlmeier from Mozilla sat down for an interview at the IIT RTC Conference last week with Mark Fletcher of the Avaya Podcast Network. I found it quite a useful explanation of what Mozilla is doing with Firefox and how different aspects of WebRTC come into play in different parts of Firefox. Give it a listen...

How To Survive A DNS DDoS Attack – Consider using multiple DNS providers

How can your company continue to make its website and Internet services available during a massive distributed denial-of-service (DDoS) attack against a DNS hosting provider? In light of last Friday’s attack on Dyn’s DNS infrastructure, many people are asking this question.

One potential solution is to look at using multiple DNS providers for hosting your DNS records. The challenge with Friday’s attack was that so many of the affected companies – Twitter, Github, Spotify, Etsy, SoundCloud and many more – were using ONLY one provider for DNS services. When that DNS provider, Dyn, then came under attack, people couldn’t get to the servers running those services.  It was a single point of failure.  

You can see this yourself right now. If you go to a command line on a Mac or Linux system and type “dig ns twitter.com,”[1] the answer you will see is something like:

twitter.com.	10345  IN  NS   ns4.p34.dynect.net.
twitter.com.	10345  IN  NS   ns3.p34.dynect.net.
twitter.com.	10345  IN  NS   ns1.p34.dynect.net.
twitter.com.	10345  IN  NS   ns2.p34.dynect.net.

What this says is that Twitter is using only Dyn. (“dynect.net” is the domain name of Dyn’s “DynECT” managed DNS service.)

Companies using Dyn who also used another DNS provider, though, had less of an issue. Users may have experienced delays in initially connecting to the services, but they were still able to eventually connect.  Here is what Etsy’s DNS looks like after Friday (via “dig ns etsy.com”):

etsy.com.	9371  IN  NS   ns1.p28.dynect.net.
etsy.com.	9371  IN  NS   ns-870.awsdns-44.net.
etsy.com.	9371  IN  NS   ns-1709.awsdns-21.co.uk.
etsy.com.	9371  IN  NS   ns3.p28.dynect.net.
etsy.com.	9371  IN  NS   ns-1264.awsdns-30.org.
etsy.com.	9371  IN  NS   ns-162.awsdns-20.com.
etsy.com.	9371  IN  NS   ns4.p28.dynect.net.
etsy.com.	9371  IN  NS   ns2.p28.dynect.net.

Etsy is now using a combination of Dyn’s DynECT DNS services and Amazon’s Route 53 DNS services.

But wait, you say… shouldn’t this be “DNS 101”?

Aren’t you always supposed to have DNS servers spread out across the world?
Why don’t they have “secondary DNS servers”?
Isn’t that a common best practice?

Well, all of these companies did have secondary servers, and their DNS servers were spread out all around the world. This is why users in Asia, for instance, were able to get to Twitter and other sites while users in the USA and Europe were not able to do so.

So what happened? 

It gets a bit complicated.

20 Years Ago…

Jumping back, say, 20 years or so, it was common for everyone to operate their own “authoritative servers” in DNS that would serve out their DNS records. A huge strength of DNS that it is “distributed and de-centralized” and anyone registering a domain name is able to operate their own “authoritative servers” and publish all of their own DNS records. 

To make this work, you publish “name server” (“NS”) records for each of your domain names that list which DNS servers are “authoritative” for your domain. These are the servers that can answer back with the DNS records that people need to reach your servers and services. 

You need to have at least one authoritative server that would give out your DNS records. Of course, in those early days if there was a problem with that server and it went offline, people would not be able to get the DNS records that would get them to your other computers and services.  Similarly you could have a problem with your connection to the Internet and people could not get to your authoritative server.

For that reason the best practice emerged of having a “secondary” authoritative DNS server that contained a copy of all of the DNS records for your domain. The idea was to have this in a different geographic location and on a different network.

On the user end, we use what is called a “recursive DNS resolver” to send out DNS queries and get back the IP addresses that our computers need to connect. Our DNS resolvers will get the list of name servers (“NS records”) and choose one to connect to. If an answer doesn’t come back after some short period of time, the resolver will try the next NS record, and the next… until it runs out of NS records to try. 

Back in July 1997, the IETF published RFC 2821 dedicated to this topic: Selection and Operation of Secondary DNS Servers. It’s fun to go back and read through that document almost 20 years later as a great bit has changed. But back in the day, this was a common practice:

 The best approach is usually to find an organisation of similar size, and agree to swap secondary zones – each organization agrees to provide a server to act as a secondary server for the other organisation’s zones. 

As noted in RFC 2821, it was common for people to have 2, 3, 4 or even more authoritative servers. One would be the “primary” or master server where changes were made – the others would all be “secondary” servers grabbing copies of the DNS records from the primary server.

Over the years, companies and organizations would spend a great amount of time, energy and money building out their own DNS server infrastructure.  Having this kind of geographic and network resilience was critical to ensure that users and customers could get the DNS records that would get them to the organizations servers and services.

The Emergence of DNS Hosting Providers

But most people really didn’t want to run their own global infrastructure of DNS servers. They didn’t want to deal with all the headaches of establishing secondary DNS servers and all of that. It was costly and complicated – and just more than most companies wanted to deal with. 

Over time companies emerged that were called “DNS hosting providers” or “DNS providers” who would take care of all of that for you. You simply signed up and delegated operation of your domain name to them – and they did everything else. 

The advantages were – and are today – enormous. Instead of only a couple of secondary DNS servers, you could have tens or even hundreds.  Technologies such as anycast made this possible. The DNS hosting provider would take care of all the data center operation, the geographic diversity, the network diversity… everything.  And they provided you with all this capability on a global and network scale that very few companies could provide all by themselves. 

The DNS hosting providers gave you everything in the RFC 2821 best practices – and so much more!

And so over the past 10 years most companies and people moved to using DNS hosting providers of some form. Often individuals simply use the DNS hosting provided by whatever domain name registrar they use to register their domain name.  Companies have outsourced their DNS hosting to companies such as Dyn, Amazon’s Route 53, CloudFlare, Google’s Cloud DNS, UltraDNS, Verisign and so many more. 

It’s simple and easy … and probably 99.99% of the time it has “just worked”.

And you only needed one DNS provider because they were giving you all the necessary secondary DNS services and diversity protection.

Friday’s Attack

Until Friday. When for some parts of the Internet the DNS hosting services of Dyn didn’t work. 

It’s important to note that Dyn’s overall DNS network still worked. They never lost all their data centers to the attack. People in some parts of the world, such as Asia, continued to be able to get DNS records and connect to all the affected services without any issues.

But on Friday, all the many companies and services that were using Dyn as their only DNS provider suddenly found that a substantial part of the Internet’s user community couldn’t get to their sites. They found that they were sharing the same fate as their DNS provider in a way that would not have been true before the large degree of centralization with DNS hosting providers.

Some companies, like Twitter, stayed with Dyn through the entire process and weathered the storm. Others, like Github, chose to migrate their DNS hosting to another provider.  Still others chose to start using multiple DNS providers. 

Why Doesn’t Everyone Just Use Multiple DNS Providers? 

This would seem the logical question.  But think about that for a second – each of these major DNS providers already has a global, distributed DNS architecture that goes far beyond what companies could provide in the past.

Now we want to ask companies to use multiple of these large-scale DNS providers?

I put this question out in a number of social networks and a friend of mine whose company was affected nailed the issue with this comment:

Because one DNS provider, with over a dozen points-of-presence (POPs) all over the world and anycast, had been sufficient, up until this unprecedented DDoS. We had eight years of 100% availability from Dyn until Friday. Dealing with multiple vendors (and paying for it) didn’t have very good ROI (and I’m still not sure it does, but we’ll do it anyway). 

Others chimed in and I can summarize the answers as:

  • CDNs and GLBs – Most websites no longer sit on a single web server publishing a simple set of HTML files. They are large complex beasts pulling in data from many different servers and sites. And they very often sit behind content delivery networks (CDNs) that cache website content and make it available through “local” servers or global load balancers (GLBs) that redirect visitors to different servers. Most of these CDNs and GLBs work by using DNS to redirect people to the “closest” server (chosen by some algorithm). When using a CDN or GLB, you typically wind up having to use only that service for your DNS hosting.  I’ve found myself in this situation with a few of my own sites where I use a CDN.
  • Features – Many companies use more sophisticated features of DNS hosting providers such as geographic redirection or other mechanisms to manage traffic. Getting multiple providers to modify DNS responses in exactly the same way can be difficult or impossible.
  • Complexity – Beyond CDNs and features, multiple DNS providers simply adds complexity into IT infrastructure. You need to ensure both providers are publishing the same information, and getting that information out to providers can be tricky in some complex networks.
  • Cost – The convenience of using a DNS hosting provider comes at a substantial financial cost. For the scale needed by major Internet services, the DNS providers aren’t cheap. 

For all of these reasons and more, it’s not an easy decision for many sites to move to using multiple DNS providers.

It’s complicated.

And yet… 

And yet the type of massive DDoS attacks we saw on Friday may require companies and organizations to rethink their “DNS strategy”. With the continued deployment of the Internet of Insecure Things, in particular, these type of DDoS attacks may become worse before the situation can improve. (Please read Olaf Kolkman’s post for ideas about how we move forward.) There will be more of these attacks.

As my friend wrote in further discussion:

  These days you outsource DNS to a company that provides way more diversity than anyone could in the days before anycast, but the capacity of botnets is still greater than one of the biggest providers, and probably bigger than the top several providers combined.

 And even more to the point:

  The advantage of multiple providers on Friday wasn’t network diversity, it was target diversity.

The attackers targeted Dyn this time, so companies who use DNS services from Amazon, Google, Verisign or others were okay.  Next time the target might be one of the others. Or perhaps attackers may target several.

The longer-term solutions, as Olaf writes about, involve better securing all the devices connected to the Internet to reduce the potential of IoT botnets. They involve the continued work collaboratively to reduce the effects of malware and bad routing info (ex. MANRS).  They involve the continued and improved communication and coordination between network operators and so many others.

But in the meantime, I suspect many companies and organizations will be considering whether it makes sense to engage with multiple DNS providers.  For many, they may be able to do so. Others may need the specialized capabilities of specific providers and find themselves unable to use multiple providers. Some may not find the return on investment warrants it. While others may accept that they must do this to ensure that their services are always available.

Sadly, taking DNS resilience to an even higher level may be what is required for today.

What do you think? Do you use multiple DNS providers?  If so, what worked for you? If not, why not? I would be curious to hear from readers, either as comments here or out on social networks.


[1] Windows users do not have the ‘dig’ command by default. Instead you can type “nslookup -type=NS <domainname>”. The results may look different that what is shown here, but will have similar information.

NOTE: I want to thank the people who replied to threads on this topic on Hacker News, in the /r/DNS subreddit and on social media. The comments definitely helped in expanding my own understanding of the complexities of the way DNS providers operate today.

Image credit: a photo I took of a friend’s T-shirt at a conference.

The post How To Survive A DNS DDoS Attack – Consider using multiple DNS providers appeared first on Internet Society.

For Immediate Release #58: Attack of the Things

Two of our panelists this week have new employment gigs — Heidi Miller with TimeXtender and Olivier Blanchard with Futurum Research + Analysis — while Cyrus Mavalwala is still with Advantis Communications, the company he founded. Here’s the rundown of our topics of conversation:

  • Wells Fargo discussed its crisis management plans during an earnings call. We found a few things to talk about.
  • Twitter’s trolls are one of its biggest problems. What can they do (and why haven’t they done it)?
  • Press releases are still the best source of news and fact verification for journalists in Asia-Pacific. A survey also reports these APAC journalists are optimistic about the future of their jobs.
  • Facebook will allow more graphic or offensive content if it is newsworthy or serves the public interest.
  • Dan York devotes his tech report to last week’s cyberattack that closed off access to some of the world’s most popular sites. The panel uses Dan’s report as a launching point for more conversation about the security of the Internet of Things.
  • Let’s not talk about the age demographic of Millennials, but the age-spanning demographic of “Perennials.” And while we’re at it, did you know brands have started abandoning gender norms in their marketing and advertising?
  • The Harvard Business Review has created a Slack bot while VentureBeat shared 10 bots for office workers.
  • Robert Scoble thinks the next iPhone will be a clear glass Mixed Reality viewer. The panel says…well…maybe…

Connect with our panelists on Twitter at @CyrusMavalwala, @TheBrandBuilder, and @HeidiMiller.

Links to the source material for this episode are on Contentle.

Special thanks to Jay Moonah for the opening and closing music.

About today’s panel:

olivierOlivier Blanchard is a French-born, American-based Brand Management and Digital Marketing consultant, the author of two best-selling books, and an acclaimed keynote speaker. As a Senior Analyst with Futurum Research, Olivier helps organizations better understand the crucial ole that emerging technologies like Cloud computing, Big Data, Virtualization, Augmented Reality, Smart Automation, IoT and AI will play their industries and markets over the next 10 to 20 years. Though based in the US, his geographic range extends beyond North America to Europe, Latin America, the Middle East and Asia. Olivier is the author of the best-selling #1 social business desk reference for digital managers and business executives: Social Media ROI: Managing and Measuring Social Media Efforts In Your Organization (Que/Pearson). Olivier is also a sought-after subject-matter expert and corporate trainer.

CyrusMavalwalaHeadshotLiving at the intersection of business and communication, Cyrus Mavalwala, ABC is an award-winning communication strategist, trainer and speaker who has been helping organizations achieve their business objectives for 20 years. After leading teams at global agencies, Cyrus founded Advantis Communications, a B2B PR and content marketing agency that delivers measureable value by integrating traditional, video and social strategies. He also co-founded Act Like An Agency to train communicators on how to evolve from tacticians to strategists within their organization. At the University of Toronto School for Continuing Studies, Cyrus develops curriculum and teaches social media strategy and communications management.

heidimillerHeidi Miller is Digital Marketing Manager at TimeXtender – The Data Discovery Hub. Heidi is a Content marketing specialist who helps organizations achieve strategized communication and marketing goals by engaging online and offline communities. She is a frequent speaker and is the author of the blog, Talk It Up. Heidi is also a very early podcaster, hosting Diary of a Shameless Self Promoter back in the earliest days of podcasting.

The post FIR #58: Attack of the Things appeared first on FIR Podcast Network.

Still Struggling To Write Consistently…

I will write a blog post 776px

As a writer, it is incredibly frustrating when you find yourself NOT writing. It's hard to explain, but there's a kind of pressure that builds up inside you. It keeps building and building and building and BUILDING... and if the pressure is not released through writing then it comes out in other ways. The way you treat others. Your health. Depression. Frustration.

I'm in that state today - if you look at my danyork.me site pulling together all my writing and audio, the number of days I've been actually writing or creating audio is a bit sparse:

Danyork blogs oct18

This post will only be my second post - in the entire 18 days of October!

Across all my blog sites, including my work sites... where I am paid to write!

And yet... I have no one to blame but myself.

I have a loooooooooooonnnnnnnnggggggg list of topics I want to write about. There is no end. In fact there are several series of posts I want to get underway.

But it's that effort of putting words on the screen. It is starting the writing - and not being distracted. By appointments. By meetings. By email. By social media. By… life.

It’s also the finishing of the writing. I have all sorts of blog posts that I have started, but I haven’t made the time to go back and actually finish the posts. (And sometimes that means just saying they are “good enough” and hitting the publish button.)

It is the act of focusing. Of being present.

If writing is to be a priority for me, by my own choice - then it is the act of prioritizing writing.

This is not a new problem for me. I've in fact been writing about this issue for many years. Here's a sample:

And even though I write those “self-help” posts, primarily as a reminder to ME, if I’m honest about it… I’m still struggling with it.

We’ll see.  And hey… with this post at least I’ve written something today!

For Immediate Release #57: PR on TV

It’s a wide-ranging conversation this week with TopRank Marketing CEO Lee Odden, Bozell PR and Social Media Strategist Jennifer Stauss, and Zena Weist, director of Marketing and Media Relations for Catholic Charities of Northeast Kansas. Our topics included the following:

  • Google’s plan to introduce a mobile-only search index and its implications for content marketers
  • The further blurring of lines between delivery channels as Facebook enables you to watch Live videos on your TV, people watch presidential debates on Twitter and Facebook, and Twitter opens Periscope to any video feed (for approved publishers)
  • The increasing personalization of content, with examples including a campaign that delivers video based on your facial expressions and a patent for a technology that will display relevant billboards as you drive by
  • A Facebook post by a doctor who was prevented from helping a fellow passenger in distress because the cabin crew apparently couldn’t believe a black woman flying out of Detroit might actually be a doctor (and the problems it has created for the airline)
  • Dan York reports on communication implications of the Internet of Things
  • We had a slew of audio comments from listeners, including one wondering whether blockchain might play a role in political fact-checking
  • The exploding trend of brands producing entertainment content for delivery via online channels (the latest a reality show from the UPS Store)
  • The challenges and opportunities from repurposing content

Connect with our panelists on Twitter at @leeodden, @jenniferjstauss, and @zenaweist.

Links to the source material for this episode are on Contentle.

Special thanks to Jay Moonah for the opening and closing music.

About today’s panel:

lee-odden-nov2015-sa-squareCited by the Wall Street Journal, The Economist and Forbes for his marketing expertise, Lee Odden is the CEO of TopRank Marketing, an internationally respected digital marketing agency that provides consulting for some of the most successful companies in the world. Lee’s evangelism for an integrated approach to search, social media, influencer and content marketing has extended over 100 events in 12 different countries. He blogs at marketingblog.com and is the author of Optimize: How to Attract and Engage More Customers by Integrating SEO, Social Media and Content Marketing. Lee is least known for founding “Marketers with Beards” the most infamous Facebook group dedicated to marketers with beards.

jenniferstraussJennifer Stauss is public relations and social media strategist at Bozell, a creative marketing communications firm in Omaha, Nebraska.  Her work there encompasses public relations and social media strategy and execution, crisis communications as well as social media community development and management.  Jennifer founded SMAC!, which stands for Sock Monkeys Against Cancer – a social enterprise that encourages the giving of SMAC! monkeys – true “creature comforts” for those with or impacted by cancer – reminding them no one fights it alone. The creation of SMAC! was inspired by Jennifer’s mother’s battle with lung cancer (no, she never smoked) and their politically incorrect social media campaign called “WTF? (Where’s the Funding) for Lung Cancer,” that publicly chronicled her mom’s battle to educate the masses that ANYONE can get lung cancer and increase funding for the #1 cancer killer and the LEAST funded. The WTF? campaign gained national notoriety as a finalist in Mashable’s awards for most creative social media campaign.Before entering the cancer world, Jennifer did two stints in the agency world; served as press secretary for the then Omaha mayor and started her career and a television journalist at the CBS local affiliate in Omaha as well.

zena-weistZena Weist is a Digital Practitioner and Business Strategist with over 20 years of integrated marketing expertise including executive leadership in digital start-ups, account management with interactive agencies and client-side roles in brand engagement, communications, social media strategy and web implementation. Named one of the 25 Women Who Rock Social Media from TopRank in 2011, Zena shifted to Non-Profit work two years ago becoming the Marketing and Media Relations Director of Catholic Charities of Northeast Kansas. Her “For Purpose” gig has allotted her the opportunity to create and lead a “silo-bashing” integrated marketing and communication team for this over 250-person social service agency with 20 programs serving over 25,000 neighbors in need a month and partnering with over 1200 volunteers a month.

The post FIR #57: PR on TV appeared first on FIR Podcast Network.

Heading to Romania to ION Bucharest for DNSSEC, IPv6, routing security and more

ION Bucharest template 660px

This week I will briefly be in Bucharest, Romania, for the Internet Society's ION Bucharest conference. We've got a great set of sessions on the agenda, including:

  • Deploying DNSSEC
  • Romanian DNSSEC Case Study
  • Let's Encrypt & DANE
  • Mind Your MANRS & the Routing Resilience Manifesto
  • The Case for IPv6
  • IPv6 Success Stories
  • What's Happening at the IETF? Internet Standards and How To Get Involved

I will have two roles in the event tomorrow:

I enjoy doing the production of live video streams and so this should be a good bit of fun (it's also intense work in the midst of it).

You can WATCH LIVE starting at 14:00 EEST (UTC+3, or 7 hours ahead of the US East Coast where I live).

The sessions will also be recorded for later viewing.

It will be a short trip for me. I'm currently (Tuesday morning) writing this from the Munich airport. I land in Bucharest tonight. The event is tomorrow - and then I fly home Thursday afternoon.

Despite the short visit, I'm looking forward to it - it should be a great event!

An audio commentary on this topic is also available:

Photo credit: Nico Trinkhaus on Flickr - CC BY NC

TDYR 314 – On The Way To Romania for ION Bucharest

I am heading to Bucharest, Romania, to be part of the Internet Society's "ION Bucharest" conference on Wednesday, Oct 13. More info can be found at https://www.internetsociety.org/deploy360/ion/