Just a guy in Vermont trying to connect all the dots...
Author's posts
Oct 05
For Immediate Release #3: People who don’t want Peeple
Welcome to episode #3 of For Immediate Release. This week’s panel includes Internet Society Senior Content Strategist Dan York (Dan is also the FIR Podcast Network’s tech correspondent), Scott Monty of Scott Monty Strategies, and 4L Strategies partner Jennifer Zingsheim Phillips. More details on the panel appear at the end of this post.
On today’s show, we explored the following topics:
- Volkswagen has brought four PR agencies on board to help deal with its self-made emissions cheating scandal. Does VW need PR or do they just need to start behaving ethically? And are PR practitioners out of line for writing posts and commentaries about the crisis?
- Peeple is an app due for release in November that will let people rate other people the way you can rate a restaurant on Yelp. The public response can be charitably described as outraged while the developers insist it’s nothing but positive.
- Business Wire released a report on the convergence if PR and investor relations. Is this consolidation or just a preferable business practice?
- It’s Breast Cancer Awareness Month and marketers everywhere are turning to pink to promote their brands’ solidarity. Most of it is just “pinkwashing,” though. How can brands be serious about their commitment to this (and, for that matter, any) cause?
- Google is about to take the wraps off an open-source project to compete with Facebook’s Instant Articles (not to mention similar offerings from Snapchat and Apple). What does this mean for the news ecosystem in which PR plays such an important part?
- Shot is a Kickstarter project that aims to make it easy for people with iPhones to create Virtual Reality (VR) photos and videos. In the meantime, newsrooms everywhere are gearing up to embrace VR.
- Millennials are willing to pay for content — just not news.
- ScottTrade is the latest institution to have to react to a data security breach. Shouldn’t any company that keeps customer data on servers be prepared to address an unwelcome intrusion?
- PR StackBook version 2 is out, with 30 PR professionals contributing 48 practical guides to more than 250 digital tools we can use in content marketing, PR, and SEO.
- Tumblr now lets you hide your Tumblr blog from the web. Some say this is creating yet another walled garden that is antithetical to the underlying philosophy of the Internet.
- Facebook has revamped Notes to make it more of a blogging tool to compete with Medium and LinkedIn.
- Beloved comic strip Bloom County is back after nearly 25 years. It’s on the Web only, and creator Berkeley Breathed is using it to attack the one-or-two-spaces-at-the-end-of-a-sentence controversy.
Links to the source material for this episode are on Delicious.
Special thanks to Jay Moonah for the opening and closing music.
Join us next week for our third episode. Joining me on the panel will be Mitchell Levy, Lynette Young, and Doug Haslam.
About this week’s panel:
Scott Monty is an internationally recognized leader in digital communications, digital transformation, social media and marketing. As principal of Scott Monty Strategies, he counsels brands and agencies on strategy, executive communications, influencer management, the customer experience, and digital initiatives.
Scott spent six years at Ford Motor Company, as a strategic advisor on crisis communications, influencer relations, digital customer customer service, innovative product launches and more. He is a board member of the American Marketing Association and an advisor for RPM Ventures, My Dealer Service, and Crowd Companies. He writes about the changing landscape of business, technology, communications, marketing and leadership at ScottMonty.com and is the executive editor and co-host of the Sherlock Holmes website and podcast I Hear of Sherlock Everywhere.
Jennifer Zingsheim Phillips has worked in politics–many sides, including political party work, working for a state senator, and lobbying. She also has worked at Fleishman Hillard, one of the biggest PR firms in the world, and she has also done a stint in retail, working in customer service at a well-known furniture and lifestyle store. Jen currently is a partner at 4L strategies, an online media analysis and monitoring firm.
Jen’s work has been published in business magazines. She also brings to the table web content creation experience, podcasting, and fiction writing.
Dan York, CISSP, is a passionate advocate for the open Internet focused on helping people understand the changes going on all around us within communication technology and practices. Dan currently serves the Internet Society as the Senior Content Strategist focused on the Deploy360 Programme – creating, curating and promoting online content that helps service providers, companies and individuals more quickly deploy Internet technologies such as IPv6 and DNSSEC. Separately, Dan is also the Chairman of the global Voice Over IP Security Alliance (VOIPSA). Dan is also active within the real-time communications area of the IETF.
Since the mid-1980’s Dan has been working with online communication technologies and helping businesses and organizations understand how to use and participate in those new media. An author of multiple books on networking, security, IPv6 and Linux, Dan is a dynamic and engaging speaker who frequently presents at industry conferences and events and has been blogging and writing online for over 12 years. His most recent books are “Migrating Applications to IPv6” and “The Seven Deadliest Unified Communications Attacks”.
The post FIR #3: People who don’t want Peeple appeared first on FIR Podcast Network.
Oct 05
5 Hours Left To Submit Comments on ICANN Design Team Review of Plan for DNS Root Zone KSK Change
Do you have any comments on the findings of the ICANN Design Team regarding the changing of the root zone key-signing key (KSK) for DNSSEC? If so, you have about five hours left to submit your comments as the comment period ends at 23:59 UTC today, 5 October 2015. You can read the Design Team report and submit your own comments at:
https://www.icann.org/public-comments/root-ksk-2015-08-06-en
The comment period has been open since August 6, 2015, and the word has been distributed through multiple online mailing lists and other forums in the time since. To date there have only been a few comments, although I’m seeing several (including my own) coming in today:
http://forum.icann.org/lists/comments-root-ksk-06aug15/index.html
You may recall that ICANN announced the members of this design team back in February 2015 and this was after a comprehensive public comment period back in 2013. Here are some links that can provide some context:
- Background information on the Root KSK Rollover process
- March 2013 ICANN Consultation on Root Zone KSK Rollover
- Public responses to the March 2013 consultation
- Internet Society response to the March 2013 consultation (submitted by myself and Andrei Robachevsky)
As you will see in my own response, I am generally pleased with the findings of the Design Team but have a few points I wish to add.
NOW IS THE TIME TO SUBMIT YOUR COMMENTS… you have about five hours left!
P.S. And if you just want to learn what DNSSEC is all about, please visit our Start Here page to learn more!
Oct 02
Watch DNS-OARC Live This Weekend For DNSSEC, DANE, DNS Privacy and more
This weekend in Montreal the OARC Fall 2015 Workshop will take place filled with all sorts of excellent talks about DNSSEC, DANE, DNS privacy, DNS performance and much, much more. The best part is that if you can’t get there in person, you can watch the live video stream on YouTube at:
https://plus.google.com/+DnsoarcNetPlus/
All the sessions will also be recorded for later viewing. The sessions most interesting to remote viewers start at 14:00 US EDT (UTC-4) on Saturday, October 3, 2015, and include these:
- An Overview of DNS Privacy Mechanisms
- Using TLS for DNS privacy in practice
- Next Steps in DANE Adoption
- Benchmarking of authoritative DNS servers and DNSSEC impact assessment
Sunday morning (October 4) brings a whole set of “DNS security” talks related to DDoS attacks and attacks against DNS servers. There are performance-related talks, detailed research sessions, and a whole set of talks related to DNS resolvers, including an exploration of IPv6 vs IPv4 performance.
There were so many interesting proposals to DNS-OARC this time that some of them occupy the Monday DNS Track inside of NANOG 65. Again there look to be some great DNSSEC topics including a session about the KSK Key Rollover. (One note: I’m not sure if the live stream on Monday will still be on the DNS-OARC YouTube channel – the NANOG agenda only says it will be “recorded”.)
All in all it looks to be a great event! Due to a personal scheduling conflict, I won’t be there in person… but I intend to watch a few of the sessions, either live or later.
And if you want to get started NOW with deploying DNSSEC, please visit our Start Here page to learn more!
Oct 01
TDYR-267-Interview-with-Khyle-York-of-Dyn
Sep 30
Watch Live Oct 1 – Dyn’s Techtoberfest: Internet Trends, Security, Net Neutrality and More (Featured Blog)
Sep 30
Slides: Intro to IPv6 by Olle Johansson
I noticed recently that my friend Olle Johansson had posted this nice intro to IPv6 from a presentation he gave back in March:
What I like about it is that he provides some of the motivation for why we need to care about IPv6.
Sep 30
Slides: Intro to IPv6 by Olle Johansson
I noticed recently that my friend Olle Johansson had posted this nice intro to IPv6 from a presentation he gave back in March:
What I like about it is that he provides some of the motivation for why we need to care about IPv6.
Sep 30
Keynote at AstriCon on Oct 14: Open Source And The Global Disruption Of Telecom – What Choices Will We Make?
Two weeks from today I'll be in Orlando giving the opening keynote address at AstriCon 2015. The abstract of the session is:
Open Source And The Global Disruption Of Telecom - What Choices Will We Make?
Wednesday, October 14th, 2015 - 9:00 am to 9:45 am - Pacifica Ballroom 7
There is a battle raging for the global future of telecommunications and the Internet. Taking place in networks, board rooms and legislatures, the battle will determine how we all communicate and what opportunities will exist. Will telecom support innovation? Will it be accessible to all? Will it give us the level of security and privacy we need to have the open, trusted Internet? Or will it be restricted and limited by corporate or government gatekeepers?
The rise of voice-over-IP has fundamentally disrupted the massive global telecommunications industry, infrastructure and policies. Open source software such as Asterisk has been a huge driver of that disruption and innovation.. but now what? What role do platforms such as Asterisk play in this space? And what can be their role in a telecom infrastructure that is now mobile, increasingly embedded (Internet of Things) and more and more using proprietary walled gardens of communication?
Join the Internet Society's Dan York in an exploration of what the future holds for telecom infrastructure and policy - and how the choices we make will determine that future.
Sounds great, eh?
Now I just have to deliver on that lofty rhetoric! :-)
Seriously, though, I'm very much looking forward to giving this presentation and I'm delighted that the folks at Digium asked me to speak. We're at a critical time in the evolution of our global communications infrastructure... with everything moving to IP and also moving to mobile, there are incredibly important choices we have to make for our future.
In the talk, I'll be speaking about the scenarios we have for what our future Internet could look like. I'll be talking about the role of open source. I'll be challenging the audience with some questions to ponder. I'll touch on some of the incredibly important - yet hard to understand - global policy issues such as the upcoming WSIS+10 Review in December - and why an open source developer should even remotely care! I'll of course hit on security issues and the rise of mobile... and more...
I'm excited!
I'm also excited to finally attend an AstriCon event. I used to write about Asterisk a good bit and for a while was running my own server in my home office for VoIP... but in all that time I never was able to work in attending an AstriCon!
If you are going to be there in Orlando, please do say hello! (There's still time to register!)
P.S. And yes, Olle Johansson, I'll be sure to work in at least one reference to IPv6! And TLS, too! Don't worry! :-)
Sep 30
Traceroute to bad.horse provides amusing results
For network geeks, this is rather amusing… someone was obviously a bit bored some day and had a bit of fun! This was what it looked like on my Mac right now. (Hat tip to Michele Neylon for first pointing this out to me in some social media channel.)
$ traceroute bad.horse traceroute to bad.horse (162.252.205.157), 64 hops max, 52 byte packets 1 172.20.12.100 (172.20.12.100) 0.663 ms 0.537 ms 0.277 ms 2 cpe-74-69-224-1.ne.res.rr.com (74.69.224.1) 34.913 ms 30.602 ms 28.762 ms 3 tge0-0-1.keennhfi02h.northeast.rr.com (24.31.152.17) 28.827 ms 30.120 ms 21.132 ms 4 agg47.sebgme0302r.northeast.rr.com (24.58.41.98) 19.262 ms 22.382 ms 19.438 ms 5 be25.rochnyei01r.northeast.rr.com (24.58.32.68) 30.941 ms 32.204 ms 36.969 ms 6 bu-ether35.chcgildt87w-bcr00.tbone.rr.com (107.14.19.104) 48.409 ms bu-ether45.chcgildt87w-bcr00.tbone.rr.com (107.14.19.106) 45.363 ms 46.521 ms 7 0.ae1.pr1.chi10.tbone.rr.com (107.14.17.194) 44.828 ms 46.147 ms 46.715 ms 8 216.1.94.145 (216.1.94.145) 46.134 ms 216.1.94.65 (216.1.94.65) 44.569 ms 45.409 ms 9 207.88.13.249.ptr.us.xo.net (207.88.13.249) 102.968 ms 101.157 ms 99.935 ms 10 te-4-1-0.rar3.denver-co.us.xo.net (207.88.12.22) 99.752 ms 102.249 ms 100.301 ms 11 216.156.16.3.ptr.us.xo.net (216.156.16.3) 98.776 ms 97.968 ms 98.756 ms 12 216.156.1.128.ptr.us.xo.net (216.156.1.128) 97.956 ms 95.644 ms 96.459 ms 13 * * * 14 166-70-1-5.xmission.com (166.70.1.5) 96.024 ms 96.826 ms 97.406 ms 15 t01.saltv1.ut.us.sn11.net (162.252.204.163) 87.981 ms 97.264 ms 86.158 ms 16 sandwichnet.dmarc.lga1.atlanticmetro.net (208.68.168.214) 89.937 ms 86.768 ms 87.949 ms 17 bad.horse (162.252.205.130) 88.073 ms 87.895 ms 86.609 ms 18 bad.horse (162.252.205.131) 93.351 ms 92.933 ms 90.876 ms 19 bad.horse (162.252.205.132) 115.629 ms 96.391 ms 96.864 ms 20 bad.horse (162.252.205.133) 101.257 ms 102.472 ms 102.213 ms 21 he.rides.across.the.nation (162.252.205.134) 108.059 ms 107.064 ms 108.290 ms 22 the.thoroughbred.of.sin (162.252.205.135) 111.206 ms 110.611 ms 109.944 ms 23 he.got.the.application (162.252.205.136) 116.866 ms 117.842 ms 115.659 ms 24 that.you.just.sent.in (162.252.205.137) 120.375 ms 123.519 ms 121.631 ms 25 it.needs.evaluation (162.252.205.138) 127.377 ms 126.769 ms 127.779 ms 26 so.let.the.games.begin (162.252.205.139) 132.761 ms 132.705 ms 131.315 ms 27 a.heinous.crime (162.252.205.140) 136.769 ms 136.045 ms 137.322 ms 28 a.show.of.force (162.252.205.141) 141.842 ms 141.447 ms 148.635 ms 29 a.murder.would.be.nice.of.course (162.252.205.142) 146.332 ms 147.854 ms 146.570 ms 30 bad.horse (162.252.205.143) 149.928 ms 150.487 ms 152.083 ms 31 bad.horse (162.252.205.144) 157.190 ms 156.693 ms 155.737 ms 32 bad.horse (162.252.205.145) 160.201 ms 161.399 ms 159.623 ms 33 he-s.bad (162.252.205.146) 166.007 ms 165.738 ms 165.244 ms 34 the.evil.league.of.evil (162.252.205.147) 171.012 ms 170.984 ms 172.062 ms 35 is.watching.so.beware (162.252.205.148) 176.041 ms 174.358 ms 176.463 ms 36 the.grade.that.you.receive (162.252.205.149) 181.276 ms 178.815 ms 180.667 ms 37 will.be.your.last.we.swear (162.252.205.150) 188.481 ms 185.823 ms 188.627 ms 38 so.make.the.bad.horse.gleeful (162.252.205.151) 194.008 ms 189.161 ms 193.114 ms 39 or.he-ll.make.you.his.mare (162.252.205.152) 198.708 ms 195.870 ms 195.894 ms 40 o_o (162.252.205.153) 200.037 ms 200.691 ms 201.280 ms 41 you-re.saddled.up (162.252.205.154) 207.748 ms 206.896 ms 205.608 ms 42 there-s.no.recourse (162.252.205.155) 211.288 ms 219.062 ms 212.026 ms 43 it-s.hi-ho.silver (162.252.205.156) 216.961 ms 218.367 ms 216.492 ms 44 signed.bad.horse (162.252.205.157) 214.262 ms 218.125 ms 215.096 ms