Just a guy in Vermont trying to connect all the dots...
Author's posts
Jan 17
Testing 360 photos on WordPress
This is a 360-degree photo viewable via the Jetpack 4.5 plugin.
The shortcode I used to embed this photo here is:
[vr url=”https://danyork.me/testsite/files/2017/01/Church-360.jpeg” view=360]
This is a church in Helsinki, Finland. Photo taken using the Google Street View app on an iPhone.
Jan 17
Testing a 360 photo on WordPress
This should be a “360 photo” embedded using the latest (4.5) release of the Jetpack plugin:
Jan 16
Free webinar on DNS/Internet security – Thursday, 19 January, 18:00 UTC
Want to learn more about DNS security and the broader topic of Internet security? This Thursday, 19 January 2017, I will be speaking as part of a free webinar on the topic of “Visibility and Security – Two Sides of the Same Coin“. The panel will include:
- Cricket Liu, Executive VP, Infoblox
- Dave Lewis, Global Security Advocate, Akamai
- myself
This is part of ISC2’s “Think Tank” series of discussion webinars. There are no slides here, just a discussion and time to answer questions from participants. In the preparation call, we discussed potentially covering:
- DNS security and privacy issues, including DNSSEC
- the recent DDoS attacks and what can be done
- network analysis and threat mitigation
- … and many more topics!
It should be a fun and informative session and we’re looking forward to guiding off of the questions that attendees ask.
The webinar begins at 1:00pm US Eastern (18:00 UTC). You must register to attend. Registration is free, although you must sign up with BrightTalk’s system to participate. Whatever contact information you provide in the registration will also be given to ISC2 and the sponsor of the webinar, Infoblox.
FYI, if you hold one of the ISC2 certifications, such as the CISSP credential, this webinar is eligible for Continuing Professional Education (CPE) credits.
And if you want to learn more about DNS security – or any of the other security topics we cover here – please visit our Start Here page to begin!
Jan 16
For Immediate Release #70: Capitalizing on Insults
Chris Christensen and Jen Phillips joined host Shel Holtz to discuss these topics:
- Most employees don’t know what makes their company different from the competition — and can’t explain it to customers
- U.S. travelers make 140 different website visits (on average) before booking a trip. Do you know your customers’ path before they make a decision on your product or service?
- Some companies have turned insults and attacks by the President-elect into badges of honor — and merchandise for sale.
- Getting people to share your content isn’t as big a deal as some marketers think. What does it take to amplify your content (and what should we be measuring)?
- Tech correspondent Dan York follows up on the Amazon Echo ecosystem and reports on China’s notice to app developers, Facebook’s fake news filter rolling out in Germany, a change to then notification on Facebook that a post has been edited,
- The panel also discusses the Amazon Alexa’s dominance at CES (while VR struggled to capture marketers’ attention)
- Jen found an Alexa-like product in development aimed at seniors
- A study found investors pay attention to company tweets, and there’s a difference between how the react to good and bad news
- The Washington Post has introduced a newsletter that summarizes reader comments. There’s a business model there for brands and agencies.
Connect with our panelists on Twitter at @chris2x and @jenzings.
Links to the source material for this episode are on Contentle.
Special thanks to Jay Moonah for the opening and closing music.
FIR is usually recorded using Zencastr.
About today’s panel:
Chris Christensen is the CEO at BloggerBridge.com, a website that helps connect companies with relevant bloggers, writers, podcasters, videographers, and other content creators. He’s also the host of the Amateur Traveler Podcast, which he’s been producing almost as long as this show, since June 2005. Chris is also a coder; he was a director of Engineering for TripAdvisor, Executive VP of Engineering and Operations for LiveWorld, and a manager at Apple, designing and programming server solutions.
Jennifer Zingsheim Phillips is the principal at 4L Strategies, consulting and providing content development for a variety of industries. She has worked in communications and public affairs for 20 years. Her background includes work in electoral politics, government, lobbying, and public affairs PR work.
The post FIR #70: Capitalizing on insults appeared first on FIR Podcast Network.
Jan 09
New Report on “State of DNSSEC Deployment 2016” Shows Continued Growth (Featured Blog)
Jan 09
TDYR 320 – The State of DNSSEC Deployment 2016
Jan 09
For Immediate Release #69: Shut Up Already, Mariah Carey
Three IABC Fellows — Priya Bates, John Deveney, and Mark Schumann — joined Shel Holtz for this week’s FIR to talk about these topics:
- More on how companies can prepare for the prospect of a tweeted attack by the President of the United States
- Companies bucking the vitriol trend by creating TV commercials that spotlight inclusion of Muslims
- With Facebook Live gaining steam, some companies are expecting employees to know how to host a live video
- Mariah Carey’s handling of her lib-synching debacle on New Year’s Eve isn’t exactly a crisis communication case study (unless you want to stay in the story cycle)
- IBM’s Watson is replacing white-collar workers at a Japanese insurance company. The communication implications are coming for pretty much every company
- Is the PR/communication industry ready for voice to be the next big digital platform?
- Tech correspondent Dan York follows up on his participation as a panelist in last week’s show, including the unmasking of a Go champion as a Google AI program; he also reports on database security and Russia’s demand for Apple and Google to remove the LinkedIn app from their app stores
Connect with our panelists on Twitter at @priyabates, @johndeveney, and @dmarkschumann.
Links to the source material for this episode are on Contentle.
Special thanks to Jay Moonah for the opening and closing music.
FIR is usually recorded using Zencastr (but not this week, due to technical problems).
About today’s panel:
All of this week’s panelists are IABC Fellows who participate regularly in the Circle of Fellows broadcast/podcast here on the FIR Podcast Network.
Priya Bates is a senior communication executive who provides strategic internal communication counsel in order to ensure leaders, managers, and employees understand the strategy, believe in the vision, act in accordance to the values, and contribute to business results. She is president of Inner Strength Communications in Toronto, and previously served as senior director of Internal Communications at Loblaw Companies Limited.
In 1996, while on the fast track to a partnership in a growing PR agency, John Deveney opted to strike out on his own and form Deveney, a process and a practice that embraces the soundest principles, the newest media, and the most innovative technologies. Based in New Orleans, Deveney is particularly strong in the areas of crisis, healthcare, tourism, and hospitality. (After hurricanes Katrina and Rita, John led the only on-site communication operation and media center for both the City of New Orleans and the Louisiana Office of Tourism.)
Mark Schumann is the director of graduate business communication programs for the Zzicklin School of Business at Baruch College, City University of New York. He is also founder and principal of re-communicate. Most recently, he was VP of marketing and communications for Western Connecticut Health Network. He served as IABC’s chair in 2009-2010 and is currently IABC’s liaison to the Global Alliance. He was a managing principal and global communication practice leader at Towers Perrin for 26 years.
The post FIR #69: Shut Up Already, Mariah Carey appeared first on FIR Podcast Network.
Jan 04
New report: “State of DNSSEC Deployment 2016”
What is the current state of deployment of the DNS Security Extensions? (DNSSEC) How many domains are secured with DNSSEC? What actual usage are we seeing on the Internet? What software is available to help?
For years there have been many statistics about DNSSEC available, but it’s been hard to get an overall picture of deployment. To help with this, we’ve worked over the past few months to pull together as much information as possible into one document:
We encourage you to please read the document – and share it widely with people who need to understand more about the security of the Domain Name System.
We also welcome feedback on questions such as:
- How helpful did you find the report?
- What sections were particularly helpful? (or not?)
- Is there additional information you’d like to see included in a future report?
You can post the feedback here as a comment – or send it to me directly via email.
Our intent is that this will be the first in an ongoing annual series of reports for at least the next few years until DNSSEC is more widely deployed. Our goal is for the “State of DNSSEC Deployment 2017” report to be ready in time for the ICANN 60 DNSSEC Workshop happening in early November 2017 in Abu Dhabi.
I’d like to thank Chip Sharp for all his hard work assembling this report and incorporating feedback. I also want to thank the group of people who provided a quick final review and proofreading in the last weeks of December (noted in the final Acknowledgements section). And I want to thank everyone within the larger DNSSEC community who continue to share their information, statistics and more.
Please do share this State of DNSSEC Deployment 2016 report with others – and if you haven’t done anything with DNSSEC on your own networks or domains, please visit our Start Here pages to learn how you can begin! Together we can make the DNS – and through that the wider Internet – a bit more secure and trusted.
The post New report: “State of DNSSEC Deployment 2016” appeared first on Internet Society.
Jan 04
State of DNSSEC Deployment 2016 report shows over 89% of top-level domains signed
Did you know that 89% of top-level domains are now signed with DNSSEC? Or that over 88% of .GOV domains and over 50% of .CZ domains are signed? Were you aware that over 103,000 domains use DANE and DNSSEC to provide a higher level of security for email? Or that 80% of clients request DNSSEC signature records in DNS queries?
All these facts and much more are available in our new State of DNSSEC Deployment 2016 report.
Jan 04
New report: “State of DNSSEC Deployment 2016”
What is the current state of deployment of the DNS Security Extensions? (DNSSEC) How many domains are secured with DNSSEC? What actual usage are we seeing on the Internet? What software is available to help?
For years there have been many statistics about DNSSEC available, but it’s been hard to get an overall picture of deployment. To help with this, we’ve worked over the past few months to pull together as much information as possible into one document:
We encourage you to please read the document – and share it widely with people who need to understand more about the security of the Domain Name System.
We also welcome feedback on questions such as:
- How helpful did you find the report?
- What sections were particularly helpful? (or not?)
- Is there additional information you’d like to see included in a future report?
You can post the feedback here as a comment – or send it to me directly via email.
Our intent is that this will be the first in an ongoing annual series of reports for at least the next few years until DNSSEC is more widely deployed. Our goal is for the “State of DNSSEC Deployment 2017” report to be ready in time for the ICANN 60 DNSSEC Workshop happening in early November 2017 in Abu Dhabi.
I’d like to thank Chip Sharp for all his hard work assembling this report and incorporating feedback. I also want to thank the group of people who provided a quick final review and proofreading in the last weeks of December (noted in the final Acknowledgements section). And I want to thank everyone within the larger DNSSEC community who continue to share their information, statistics and more.
Please do share this State of DNSSEC Deployment 2016 report with others – and if you haven’t done anything with DNSSEC on your own networks or domains, please visit our Start Here pages to learn how you can begin! Together we can make the DNS – and through that the wider Internet – a bit more secure and trusted.