Just a guy in Vermont trying to connect all the dots...
Author's posts
Dec 18
Celebrating 10 Years of Blogging at Disruptive Telephony
Ten years ago today, on December 18, 2006, I launched this blog with a very short 1-paragraph post:
Welcome to Disruptive Telephony! For a number of years, I have been blogging about VoIP as part of my personal blog, "Blog.DanYork.com". However, I'm now in the process of splitting out some parts of my writing into separate blogs. This is one of those blogs. Right now... I'm just setting it up, so don't expect to see much here. Stay tuned, though... much will be happening soon.
At the time, I was living in Burlington, Vermont, and working remotely for the Office of the CTO at Mitel Networks back up in Ottawa, Ontario (where we lived from 2000-2005). Dave Edwards, a friend from Ottawa, left the only comment on that post.
In 2006, the "VoIP blogging" world was quite small - and we all pretty much knew other. Om Malik was writing on his own site (it was yet to become GigaOm). Andy Abramson had VoIPWatch. Jeff Pulver was writing on his sites. Tom Keating at his "VoIP and Gadgets blog" on TMC. Martin Geddes had his "Telepocalypse" site. Alec Saunders had "Saunderslog". And there were a few others...
This was back in the day when we read each others blog posts, commented on them, excerpted each other's posts, etc. And "social media" was not yet a big thing.
It's been a crazy 10 years since... being "restructured" out of a role at Mitel in 2007 after their merger with Inter-Tel, finding a role with Voxeo through this Disruptive Telephony blog (they read this post about telephony not mattering, and then my post about the role I was seeking)... moving to Keene, NH, in 2008... joining the Internet Society in September 2011... it's been a wild ride!
Along the way, I wrote a ton of articles about Skype, SIP, Google and many other VoIP technologies. MANY relating to security. At one point I seemed to have become Skype's receptionist since no one could find a phone number on Skype's (pre-Microsoft) web site. I wrote about startups that showed great promise, and also about when those promises faded. Many articles on many different topics...
I learned a huge amount and met many great people and made great connections from the writing on this site.
Over this decade of writing, TypePad gives me these stats:
- 1,209,851 Lifetime Pageviews
- 331.10 Pageviews/Day
- 800 Total Posts (including this post)
- 924 Total Comments
Very appropriately - and with no plan whatsoever - this is the 800th post on this site.
I started using Google Analytics on the site in October 2007 and it tells me I've had 1,817,045 pageviews since time, proving, once again, how difficult it is to track viewers, since the stats are different. More interestingly, GA shows me the top posts that have attracted interest over the years:
1. Google Voice Now Offers SIP Addresses For Calling Directly Over IP (March 2011)
2. Understanding Today's Skype Outage: Explaining Supernodes (December 2010)
3. Did Google Hang Up On Calling Google Voice Via SIP? (March 2011)
4. Will iOS 9 Make My iPad2 Usable Again? (June 2015)
5. What is an Over-The-Top (OTT) Application or Service? - A Brief Explanation (July 2012)
6. How To Set A Skype Chat So That New Arrivals See (Some) Chat History (March 2011)
7. You Can Now Call Into Google+ From Regular Phones - Google Connects Google Voice To Hangouts (May 2013)
8. UPDATE: Will iOS 9 Make My iPad2 Usable Again? (Reports after the upgrade.) (September 2015)
9. Why Is Skype Forcing A Software Upgrade On All Of Us? (Plus The Community Outrage) (August 2014)
10. Did Google REALLY Kill Off All XMPP/Jabber Support In Google+ Hangouts? It Still Seems To Partially Work (May 2013)
No real surprises there... my post about Google Voice and SIP addresses STILL receives a significant volume of interest, even though that capability died long ago. For a while, back in maybe 2009-2012, I was one of the main people writing about Skype, and so many of my posts of that era were highly viewed.
A few of my own favorite posts that aren't on that list include:
A. The Directory Dilemma - Why Facebook, Google and Skype May Win the Mobile App War (June 2015 and December 2014) - one of my longer pieces diving into what I see as the prime challenge for new entrants into VoIP / messaging. (The link is to the updated version on CircleID, but the original version was here on this site.)
B. Why The Opus Codec Matters - Even If You Don't Care About Audio (July 2013) - my thoughts on why people need to care about audio codecs.
C. Moving Beyond Telephone Numbers - The Need For A Secure, Ubiquitous Application-Layer Identifier (May 2013) - After SIPNOC 2013, I dove into the whole area around "What do we use as an application-layer identifier for Internet-connected devices?"
D. A Brief Primer on the Tech Behind Skype, P2PSIP and P2P Networks (November 2010) - I kept needing to explain peer-to-peer (P2P) networks to people, and Skype's setup in particular, that I felt compelled to do a deep dive and explain how P2P systems worked. Fun to write!
E. Hypervoice - The Fundamental Flaw In The Proposal (October 2012) - this piece analyzing a proposal from Martin Geddes and the ensuing comment trail make for good reading about different viewpoints on the future of telecommunications.
F. Ch-changes - Taking A New Job At The Internet Society To Join The Fight For The Open Internet (September 2011) - this one is of course a favorite as it explains why I am doing what I am doing now with the Internet Society.
There were many other favorites, like my rant about WebRTC and who we were building it for, but these were the main ones.
Of course, if you look at both of those lists you can notice that with the exception of the two iPad / iOS9 posts and the updated "Directory Dilemma" in 2015, all of these are older posts.
This shows, though, the decline I've had in posting here. Look at these numbers:
- 2016 - only 7 blog posts (including this one)
- 2015 - 25 blog posts
- 2014 - 28 blog posts
- 2013 - 30 blog posts
- 2012 - 40 blog posts
- 2011 - 154 blog posts
- 2010 - 90 blog posts
- 2009 - 52 blog posts
- 2008 - 110 blog posts
- 2007 - 234 blog posts
Clearly my velocity has decreased in a serious way, mostly as a result of new responsiblities with the Internet Society and a decreased amount of time for writing here.
I have a loooooonnnnnnnggggg queue of articles I want to write here. The reality is that while some things have changed over the 10 years, many of the same issues are still here.
We'll see where I go with this in 2017. I have a great amount of focus I'd like to give to messaging... let's see if I can make that happen!
Meanwhile... today I will just say THANK YOU TO ALL THE READERS OVER THE 10 YEARS! I'm glad to have helped many people along the way - and I'm glad to have been challenged by many people as well.
I'm looking forward to the next 10 years of writing here... because one thing is definitely for certain: telephony will continue to be disrupted!
Dec 12
For Immediate Release #65: The Inhuman Experience
Maris Callahan, Justin Goldsborough, and Tim Hayden join host Shel Holtz to talk about these topics:
- An update on the latest news about fake news, including a boycott of the new Star Wars movie, companies waking up to the threat, and data showing most Americans believe fake news headlines when they see them.
- PR is still saddled with a reputation as spin doctors, liars, and sharks circling startups in order to take a chunk of their flesh.
- As automated systems replace real people, what happens to the human-fueled customer experience?
- Do marketers need to move beyond branded content if they’re going to contribute to the company’s revenue stream?
- Corporate values used to be fairly mundane but today they can provoke partisan anger and blowback. “Pretty much every charitable donation, advertising dollar, and policy position has become a political statement with the potential to anger a sub-section of the company’s employee and customer base,” writes Paul Holmes.
- Advertiser excitement over Snapchat Live Stories is waning while Instagram Stories are producing massive swipe-throughs.
- One company has introduced a bot as an influencer while another is looking to a team of influencers with less klout than the big go-to celebrities. Is the shape of influencer marketing changing?
- In his Tech Report, Dan York looks at WordPress 4.7 and JetPack 4.4, as well as Telegram’s new “Telegraph” lightweight blogging service.
Connect with our panelists on Twitter at @MarisCallahan, @JGoldsborough, and @TheTimHayden.
Links to the source material for this episode are on Contentle.
Special thanks to Jay Moonah for the opening and closing music.
About today’s panel:
Maris Callahan is director of Public Relations at Donuts Inc., the world’s largest registry of new gTLD’s (or as the folks at Donuts call them, “not-com” domain name endings). With over 10 years of experience in public relations on the agency side and as an independent consultant, Maris is responsible for the planning and execution of Donuts’ B2C and B2B public relations strategy. Before Donuts, she was an independent consultant to small and mid-size businesses seeking brand awareness. She also worked for some of the top PR agencies in the world, including Edelman, Burson-Marsteller and Lippe Taylor. Maris is also the creator and writer of In Good Taste, a food and lifestyle blog founded in 2008.
Justin Goldsborough is a senior vice president and social media lead at FleishmanHillard Kansas City and is a member of the agency’s Social Innovation Leadership Team. During his 7.5 years at FH, he’s led communications strategy for clients such as Sleep Number, Hallmark Cards and Children’s Mercy Hospital. Before coming to FH, Justin was at Sprint for two years where he managed the company’s employee social network, Sprint Space, and led efforts to improve customer outreach via social media, specifically Twitter. Justin also spent some time in the food biz when he managed employee communications, including the company Intranet and initial social media efforts, for Applebee’s International. Justin is a past president of Kansas City IABC, where he led his local chapter to the highest honor IABC bestows – International Chapter of the Year. Justin is also a diehard Kansas City Royals fan and is much more eager to talk baseball these days than he was from 1986-2013.
Tim Hayden has two decades of experience in leading high-growth technology firms and marketing agencies. Before Brain+Trust, he was head of marketing at Zignal Labs, a real-time media intelligence platform, and produced marketing technology and process improvement programs for clients of TTH Strategy, a consultancy Tim founded. He is also former head of the Mobile program at Edelman Digital in North America, and been founder of agencies and technology ventures (NION Interactive, GamePlan, Captix) serving as a catalyst for innovative change in some of the world’s leading brands (CafePress, Dell, Bacardi, AMD,ExxonMobil, Hilton Worldwide, Kraft Foods, Edison Research and others). Tim serves on the advisory boards of Zignal Labs, Rivet Works, Wonder Technologies and Captix, and is co-author of The Mobile Commerce Revolution (QUE Biz Tech, October 2014).
The post FIR #65: The Inhuman Experience appeared first on FIR Podcast Network.
Dec 12
Call for Participation – ICANN DNSSEC Workshop at ICANN58 in Copenhagen (Featured Blog)
Dec 12
Call for Participation – ICANN DNSSEC Workshop at ICANN58 in Copenhagen
The DNSSEC Deployment Initiative and the Internet Society Deploy360 Programme, in cooperation with the ICANN Security and Stability Advisory Committee (SSAC), are planning a DNSSEC Workshop during the ICANN58 meeting held from 11-16 March 2017 in Copenhagen, Denmark. The DNSSEC Workshop has been a part of ICANN meetings for several years and has provided a forum for both experienced and new people to meet, present and discuss current and future DNSSEC deployments. For reference, the most recent session was held at the ICANN meeting in Hyderabad, India on 07 November 2016. The presentations and transcripts are available at:
https://icann572016.sched.org/event/8czs/dnssec-workshop-part-1,
https://icann572016.sched.org/event/8czt/dnssec-workshop-part-2, and
https://icann572016.sched.org/event/8czu/dnssec-workshop-part-3.
At ICANN58 we are particularly interested in live demonstrations of uses of DNSSEC or DANE. Examples might include:
- Email clients and servers using DNSSEC, OPENPGPKEY, or S/MIME for secure email.
- Tools for automating the generation of DNSSEC/DANE records.
- Services for monitoring or managing DNSSEC signing or validation.
- Tools or services for using DNSSEC/DANE along with other existing protocols and services such as SSH, XMPP, SMTP, S/MIME or PGP/GPG.
- Innovative uses of APIs to do something new and different using DNSSEC/DANE.
- S/MIME and Microsoft Outlook integration with active directory.
Our interest is to provide current examples of the state of development and to show real-world examples of how DNSSEC and DANE related innovation can be used to increase the overall security of the Internet.
We are open to presentations and demonstrations related to any topic associated with DNSSEC and DANE. Examples of the types of topics we are seeking include:
1. DNSSEC activities in Europe
For this panel we are seeking participation from those who have been involved in DNSSEC deployment in Europe and also from those who have not deployed DNSSEC but who have a keen interest in the challenges and benefits of deployment. In particular, we will consider the following questions: Are you interested in reporting on DNSSEC validation of your ISPs? What can DNSSEC do for you? What doesn’t it do? What are the internal tradeoffs to implementing DNSSEC? What did you learn in your deployment of DNSSEC? We are interested in presentations from both people involved with the signing of domains and people involved with the deployment of DNSSEC-validating DNS resolvers.
2. Preparation for Root Key Rollover
In preparation for the Root Key Rollover, we would like to bring together a panel of people who can talk about what the potential impacts may be to ISPs, equipment providers and end users, and also what can be done to potentially mitigate those issues. In particular, we are seeking participation from vendors, ISPs, and the community that will be affected by distribution of new root keys. We would like to be able to offer suggestions out of this panel to the wider technical community. If you have a specific concern about the Root Key Rollover, or believe you have a method or solution to help address impacts, we would like to hear from you.
3. Implementing DNSSEC validation at Internet Service Providers (ISPs)
Internet Service Providers (ISPs) play a critical role by enabling DNSSEC validation for the caching DNS resolvers used by their customers. We have now seen massive rollouts of DNSSEC validation within large North American ISPs and at ISPs around the world. We are interested in presentations on topics such as:
- Can you describe your experiences with negative Trust Anchors and operational realities?
- What does an ISP need to do to prepare its network for implementing DNSSEC validation?
- How does an ISP need to prepare its support staff and technical staff for the rollout of DNSSEC validation?
- What measurements are available about the degree of DNSSEC validation currently deployed?
- What tools are available to help an ISP deploy DNSSEC validation?
- What are the practical server-sizing impacts of enabling DNSSEC validation on ISP DNS Resolvers (ex. cost, memory, CPU, bandwidth, technical support, etc.)?
4. The operational realities of running DNSSEC
Now that DNSSEC has become an operational norm for many registries, registrars, and ISPs, what have we learned about how we manage DNSSEC? What is the best practice around key rollovers? How often do you review your disaster recovery procedures? Is there operational familiarity within your customer support teams? What operational statistics have we gathered about DNSSEC? Are there experiences being documented in the form of best practices, or something similar, for transfer of signed zones?
5. DANE and DNSSEC application automation
For DNSSEC to reach massive deployment levels it is clear that a higher level of automation is required than is currently available. There also is strong interest for DANE usage within web transactions as well as for securing email and Voice-over-IP (VoIP). We are seeking presentations on topics such as:
- What tools, systems and services are available to help automate DNSSEC key management
- Can you provide an analysis of current tools/services and identify gaps?
- Where are the best opportunities for automation within DNSSEC signing and validation processes?
- What are the costs and benefits of different approaches to automation?
- What are some of the new and innovative uses of DANE and other DNSSEC applications in new areas or industries?
- What tools and services are now available that can support DANE usage?
- How soon could DANE and other DNSSEC applications become a deployable reality?
- How can the industry use DANE and other DNSSEC applications as a mechanism for creating a more secure Internet?
We would be particularly interested in any live demonstrations of DNSSEC / DANE application automation and services. For example, a demonstration of the actual process of setting up a site with a certificate stored in a TLSA record that correctly validates would be welcome. Demonstrations of new tools that make the setup of DNSSEC or DANE more automated would also be welcome.
6. When unexpected DNSSEC events occur
What have we learned from some of the operational outages that we have seen over the past 18 months? Are there lessons that we can pass on to those just about to implement DNSSEC? How do you manage dissemination of information about the outage? What have you learned about communications planning? Do you have a route to ISPs and registrars? How do you liaise with your CERT community?
7. DNSSEC and DANE in the enterprise
Enterprises can play a critical role in both providing DNSSEC validation to their internal networks and also through signing of the domains owned by the enterprise. We are seeking presentations from enterprises that have implemented DNSSEC on validation and/or signing processes and can address questions such as:
- What are the benefits to enterprises of rolling out DNSSEC validation? And how do they do so?
- What are the challenges to deployment for these organizations and how could DANE and other DNSSEC applications address those challenges?
- How should an enterprise best prepare its IT staff and network to implement DNSSEC?
- What tools and systems are available to assist enterprises in the deployment of DNSSEC?
- How can the DANE protocol be used within an enterprise to bring a higher level of security to transactions using SSL/TLS certificates?
8. Hardware Security Modules (HSMs) use cases and innovation
We are interested in demonstrations of HSMs, presentations of HSM-related innovations and real world use cases of HSMs and key management.
In addition, we welcome suggestions for additional topics.
If you are interested in participating, please send a brief (1-2 sentence) description of your proposed presentation to dnssec-copenhagen@isoc.org by 15 January 2017.
We hope that you can join us.
Thank you,
Julie Hedlund
On behalf of the DNSSEC Workshop Program Committee:
Jean Robert Hountomey, AfricaCERT
Jacques Latour, .CA
Xiaodong Lee, CNNIC
Luciano Minuchin, NIC.AR
Russ Mundy, Parsons
Ondřej Filip, CZ.NIC
Yoshiro Yoneya, JPRS
Dan York, Internet Society
Dec 12
Call for Participation – ICANN DNSSEC Workshop at ICANN58 in Copenhagen
Do you have new information about DNSSEC or DANE that you would like to share with the wider community? Have you created a new tool or service? Have you found a way to use DNSSEC to secure some other service? Do you have new statistics about the growth or usage of DNSSEC, DANE or other related technology?
If so, and if you will be in Copenhagen, Denmark, for ICANN 58 in March 2017 (or can get there), please consider submitting a proposal to speak at the ICANN 58 DNSSEC Workshop! Please send a brief (1-2 sentence) description of your proposed presentation to dnssec-copenhagen@isoc.org by 15 January 2017.
The full Call for Participation with more information and examples is below.
The DNSSEC Deployment Initiative and the Internet Society Deploy360 Programme, in cooperation with the ICANN Security and Stability Advisory Committee (SSAC), are planning a DNSSEC Workshop during the ICANN58 meeting held from 11-16 March 2017 in Copenhagen, Denmark. The DNSSEC Workshop has been a part of ICANN meetings for several years and has provided a forum for both experienced and new people to meet, present and discuss current and future DNSSEC deployments. For reference, the most recent session was held at the ICANN meeting in Hyderabad, India on 07 November 2016. The presentations and transcripts are available at:
https://icann572016.sched.org/event/8czs/dnssec-workshop-part-1,
https://icann572016.sched.org/event/8czt/dnssec-workshop-part-2, and
https://icann572016.sched.org/event/8czu/dnssec-workshop-part-3.
At ICANN58 we are particularly interested in live demonstrations of uses of DNSSEC or DANE. Examples might include:
- Email clients and servers using DNSSEC, OPENPGPKEY, or S/MIME for secure email.
- Tools for automating the generation of DNSSEC/DANE records.
- Services for monitoring or managing DNSSEC signing or validation.
- Tools or services for using DNSSEC/DANE along with other existing protocols and services such as SSH, XMPP, SMTP, S/MIME or PGP/GPG.
- Innovative uses of APIs to do something new and different using DNSSEC/DANE.
- S/MIME and Microsoft Outlook integration with active directory.
Our interest is to provide current examples of the state of development and to show real-world examples of how DNSSEC and DANE related innovation can be used to increase the overall security of the Internet.
We are open to presentations and demonstrations related to any topic associated with DNSSEC and DANE. Examples of the types of topics we are seeking include:
1. DNSSEC activities in Europe
For this panel we are seeking participation from those who have been involved in DNSSEC deployment in Europe and also from those who have not deployed DNSSEC but who have a keen interest in the challenges and benefits of deployment. In particular, we will consider the following questions: Are you interested in reporting on DNSSEC validation of your ISPs? What can DNSSEC do for you? What doesn’t it do? What are the internal tradeoffs to implementing DNSSEC? What did you learn in your deployment of DNSSEC? We are interested in presentations from both people involved with the signing of domains and people involved with the deployment of DNSSEC-validating DNS resolvers.
2. Preparation for Root Key Rollover
In preparation for the Root Key Rollover, we would like to bring together a panel of people who can talk about what the potential impacts may be to ISPs, equipment providers and end users, and also what can be done to potentially mitigate those issues. In particular, we are seeking participation from vendors, ISPs, and the community that will be affected by distribution of new root keys. We would like to be able to offer suggestions out of this panel to the wider technical community. If you have a specific concern about the Root Key Rollover, or believe you have a method or solution to help address impacts, we would like to hear from you.
3. Implementing DNSSEC validation at Internet Service Providers (ISPs)
Internet Service Providers (ISPs) play a critical role by enabling DNSSEC validation for the caching DNS resolvers used by their customers. We have now seen massive rollouts of DNSSEC validation within large North American ISPs and at ISPs around the world. We are interested in presentations on topics such as:
- Can you describe your experiences with negative Trust Anchors and operational realities?
- What does an ISP need to do to prepare its network for implementing DNSSEC validation?
- How does an ISP need to prepare its support staff and technical staff for the rollout of DNSSEC validation?
- What measurements are available about the degree of DNSSEC validation currently deployed?
- What tools are available to help an ISP deploy DNSSEC validation?
- What are the practical server-sizing impacts of enabling DNSSEC validation on ISP DNS Resolvers (ex. cost, memory, CPU, bandwidth, technical support, etc.)?
4. The operational realities of running DNSSEC
Now that DNSSEC has become an operational norm for many registries, registrars, and ISPs, what have we learned about how we manage DNSSEC? What is the best practice around key rollovers? How often do you review your disaster recovery procedures? Is there operational familiarity within your customer support teams? What operational statistics have we gathered about DNSSEC? Are there experiences being documented in the form of best practices, or something similar, for transfer of signed zones?
5. DANE and DNSSEC application automation
For DNSSEC to reach massive deployment levels it is clear that a higher level of automation is required than is currently available. There also is strong interest for DANE usage within web transactions as well as for securing email and Voice-over-IP (VoIP). We are seeking presentations on topics such as:
- What tools, systems and services are available to help automate DNSSEC key management
- Can you provide an analysis of current tools/services and identify gaps?
- Where are the best opportunities for automation within DNSSEC signing and validation processes?
- What are the costs and benefits of different approaches to automation?
- What are some of the new and innovative uses of DANE and other DNSSEC applications in new areas or industries?
- What tools and services are now available that can support DANE usage?
- How soon could DANE and other DNSSEC applications become a deployable reality?
- How can the industry use DANE and other DNSSEC applications as a mechanism for creating a more secure Internet?
We would be particularly interested in any live demonstrations of DNSSEC / DANE application automation and services. For example, a demonstration of the actual process of setting up a site with a certificate stored in a TLSA record that correctly validates would be welcome. Demonstrations of new tools that make the setup of DNSSEC or DANE more automated would also be welcome.
6. When unexpected DNSSEC events occur
What have we learned from some of the operational outages that we have seen over the past 18 months? Are there lessons that we can pass on to those just about to implement DNSSEC? How do you manage dissemination of information about the outage? What have you learned about communications planning? Do you have a route to ISPs and registrars? How do you liaise with your CERT community?
7. DNSSEC and DANE in the enterprise
Enterprises can play a critical role in both providing DNSSEC validation to their internal networks and also through signing of the domains owned by the enterprise. We are seeking presentations from enterprises that have implemented DNSSEC on validation and/or signing processes and can address questions such as:
- What are the benefits to enterprises of rolling out DNSSEC validation? And how do they do so?
- What are the challenges to deployment for these organizations and how could DANE and other DNSSEC applications address those challenges?
- How should an enterprise best prepare its IT staff and network to implement DNSSEC?
- What tools and systems are available to assist enterprises in the deployment of DNSSEC?
- How can the DANE protocol be used within an enterprise to bring a higher level of security to transactions using SSL/TLS certificates?
8. Hardware Security Modules (HSMs) use cases and innovation
We are interested in demonstrations of HSMs, presentations of HSM-related innovations and real world use cases of HSMs and key management.
In addition, we welcome suggestions for additional topics.
If you are interested in participating, please send a brief (1-2 sentence) description of your proposed presentation to dnssec-copenhagen@isoc.org by 15 January 2017.
We hope that you can join us.
Thank you,
Julie Hedlund
On behalf of the DNSSEC Workshop Program Committee:
Jean Robert Hountomey, AfricaCERT
Jacques Latour, .CA
Xiaodong Lee, CNNIC
Luciano Minuchin, NIC.AR
Russ Mundy, Parsons
Ondřej Filip, CZ.NIC
Yoshiro Yoneya, JPRS
Dan York, Internet Society
Dec 11
TDYR 318 – Watching People Wave Back (Standing On The Side of the Road)
Dec 06
Over 50% of .CZ domains now signed with DNSSEC!
Congrats to the team at CZ.NIC and to Internet users within the Czech Republic – the number of .CZ domains signed with DNSSEC just passed over the 50% mark! It’s great to see so many businesses, organizations and individuals using .CZ domains now receiving the higher level of trust that comes with DNSSEC signatures.
CZ.NIC’s Ondrej Filip spread the news yesterday in a tweet:
More than 50% of Czech domains secured by DNSSEC! Finally. I thank all the participating registrars.
— Ondrej Filip (@ondrejfilip) December 5, 2016
This milestone fits well with other European country code top-level domains (ccTLDs) that also have significant signing of second-level domains, including: Norway’s .NO (58.2%), Sweden’s .SE (also 51.3%), the Netherland’s .NL (45%).
Congrats to Ondrej and the whole team at .CZ for achieving this milestone! Now on to the remaining 48.7%…
If you want the higher level of trust that comes with signing your domain with DNSSEC, please visit our “Start Here” page to find resources to help you begin!
Dec 05
For Immeediate Release #64: That’s Not Our Shark!
Chris Abraham, Cindy Crescenzo, and Steve Farnsworth join host Shel Holtz to talk about these topics:
- Breitbart News called for a boycott of Kellogg’s after the cereal company pulled its ads, then started publishing articles critical of the company after calling the decision to withdraw advertising “censorship.” Is this the new reality for companies making what used to be simple business decisions?
- Employee engagement surveys aren’t worth much anymore according to one expert, since people are more concerned about survey scores than addressing engagement issues. Is it time to stop measuring engagement?
- Virtual Reality headset sales aren’t setting any records. Can public relations help make it go mainstream?
- With the Amazon Echo and Google Home, along with Siri and Google Now, it’s fast becoming a voice-driven world. Brands and agencies will have to adapt.
- A lot has happened on the fake news front since we first reported on it, including a shooting in Washington, D.C. by a North Carolina man “self-investigating” a fake news story. We’ll bring you up to date.
- Brands have jumped on the emoji bandwagon, but audiences think they’re trying too hard.
- Figuring out what people are talking about using Google Trends is a better way to do real-time marketing.
- Dan York reports on the Internet Governance Forum this week in Mexico, a panel last week on Internet fragmentation (which communicators don’t want), and WordPress’s move toward promoting more SSL/TLS.
Connect with our panelists on Twitter at @ChrisAbraham, @CreativeComms, and @Stevology.
Links to the source material for this episode are on Contentle.
Special thanks to Jay Moonah for the opening and closing music.
About today’s panel:
Chris Abraham, digital strategist and technologist, is a leading expert in digital: search engine optimization (SEO), online relationship management (ORM), Internet privacy, and online public relations with a focus on blogger outreach, blogger engagement, and Internet crisis response. He operates his consultancy at Gerris Corp. A pioneer in online social networks and publishing, with a natural facility for anticipating the next big thing, Chris is an Internet analyst, web strategy consultant and adviser to the industries’ leading firms. He specializes in Web 2.0 technologies, including content syndication, online collaboration, blogging, and consumer generated media.
Cindy Crescenzo brings more than 15 years of research, measurement and planning expertise to the corporate communications world. Her passion for numbers and audience research have helped thousands of communicators all over the world transform the way they communicate, by teaching them the power of surveys, metrics, focus groups and executive interviews. She and her husband and business partner, Steve Crescenzo, founded Crescenzo Communications more than 20 years ago and together they have energized the communication industry with their proven tactics and strategies to combine research and strategy with creativity and best-practice
Steve Farnsworth has over 15 years as a senior digital marketing executive, and is currently the Chief Marketing Officer for the @Steveology Group, a content marketing for demand generation agency serving high tech B2B organizations. He works with mid-sized and large companies, and funded start-ups to develop and implement multimedia content marketing programs that increase inbound leads and grows brand reputation. Steve is a Forbes top 50 social media influencer. He is a digital marketing educator and has moderated panels, spoken at, or managed industry events at Google, Intel, PayPal, Yahoo!, Cisco, Adobe, Electronic Arts, HP, SAP, Wells Fargo, TEDx, Applied Materials, Symantec, NetApp, and Stanford on brand, social, digital, and content marketing.
The post FIR #64: That’s not our shark! appeared first on FIR Podcast Network.
Dec 05