Dan York

Just a guy in Vermont trying to connect all the dots...

Author's posts

For Immediate Release #3: People who don’t want Peeple

Welcome to episode #3 of For Immediate Release. This week’s panel includes Internet Society Senior Content Strategist Dan York (Dan is also the FIR Podcast Network’s tech correspondent), Scott Monty of Scott Monty Strategies, and 4L Strategies partner Jennifer Zingsheim Phillips. More details on the panel appear at the end of this post.

On today’s show, we explored the following topics:

  • Volkswagen has brought four PR agencies on board to help deal with its self-made emissions cheating scandal. Does VW need PR or do they just need to start behaving ethically? And are PR practitioners out of line for writing posts and commentaries about the crisis?
  • Peeple is an app due for release in November that will let people rate other people the way you can rate a restaurant on Yelp. The public response can be charitably described as outraged while the developers insist it’s nothing but positive.
  • Business Wire released a report on the convergence if PR and investor relations. Is this consolidation or just a preferable business practice?
  • It’s Breast Cancer Awareness Month and marketers everywhere are turning to pink to promote their brands’ solidarity. Most of it is just “pinkwashing,” though. How can brands be serious about their commitment to this (and, for that matter, any) cause?
  • Google is about to take the wraps off an open-source project to compete with Facebook’s Instant Articles (not to mention similar offerings from Snapchat and Apple). What does this mean for the news ecosystem in which PR plays such an important part?
  • Shot is a Kickstarter project that aims to make it easy for people with iPhones to create Virtual Reality (VR) photos and videos. In the meantime, newsrooms everywhere are gearing up to embrace VR.
  • Millennials are willing to pay for content — just not news.
  • ScottTrade is the latest institution to have to react to a data security breach. Shouldn’t any company that keeps customer data on servers be prepared to address an unwelcome intrusion?
  • PR StackBook version 2 is out, with 30 PR professionals contributing 48 practical guides to more than 250 digital tools we can use in content marketing, PR, and SEO.
  • Tumblr now lets you hide your Tumblr blog from the web. Some say this is creating yet another walled garden that is antithetical to the underlying philosophy of the Internet.
  • Facebook has revamped Notes to make it more of a blogging tool to compete with Medium and LinkedIn.
  • Beloved comic strip Bloom County is back after nearly 25 years. It’s on the Web only, and creator Berkeley Breathed is using it to attack the one-or-two-spaces-at-the-end-of-a-sentence controversy.

Links to the source material for this episode are on Delicious.

Special thanks to Jay Moonah for the opening and closing music.

Join us next week for our third episode. Joining me on the panel will be Mitchell Levy, Lynette Young, and Doug Haslam.

About this week’s panel:

scottmontyScott Monty is an internationally recognized leader in digital communications, digital transformation, social media and marketing. As principal of Scott Monty Strategies, he counsels brands and agencies on strategy, executive communications, influencer management, the customer experience, and digital initiatives.

Scott spent six years at Ford Motor Company, as a strategic advisor on crisis communications, influencer relations, digital customer customer service, innovative product launches and more. He is a board member of the American Marketing Association and an advisor for RPM Ventures, My Dealer Service, and Crowd Companies. He writes about the changing landscape of business, technology, communications, marketing and leadership at ScottMonty.com and is the executive editor and co-host of the Sherlock Holmes website and podcast I Hear of Sherlock Everywhere.

jenzJennifer Zingsheim Phillips has  worked in politics–many sides, including political party work, working for a state senator, and lobbying. She also has worked at Fleishman Hillard, one of the biggest PR firms in the  world, and she has also done a stint in retail, working in customer service at a well-known furniture and lifestyle store. Jen currently is a partner at 4L strategies, an online media analysis and monitoring firm.

Jen’s work has been published in business magazines. She also brings to the table web content creation experience, podcasting, and fiction writing.

Dan York, Host of FIR on TechnologyDan York, CISSP, is a passionate advocate for the open Internet focused on helping people understand the changes going on all around us within communication technology and practices. Dan currently serves the Internet Society as the Senior Content Strategist focused on the Deploy360 Programme – creating, curating and promoting online content that helps service providers, companies and individuals more quickly deploy Internet technologies such as IPv6 and DNSSEC. Separately, Dan is also the Chairman of the global Voice Over IP Security Alliance (VOIPSA). Dan is also active within the real-time communications area of the IETF.

Since the mid-1980’s Dan has been working with online communication technologies and helping businesses and organizations understand how to use and participate in those new media. An author of multiple books on networking, security, IPv6 and Linux, Dan is a dynamic and engaging speaker who frequently presents at industry conferences and events and has been blogging and writing online for over 12 years. His most recent books are “Migrating Applications to IPv6” and “The Seven Deadliest Unified Communications Attacks”.

 

The post FIR #3: People who don’t want Peeple appeared first on FIR Podcast Network.

5 Hours Left To Submit Comments on ICANN Design Team Review of Plan for DNS Root Zone KSK Change

ICANN.jpgDo you have any comments on the findings of the ICANN Design Team regarding the changing of the root zone key-signing key (KSK) for DNSSEC?  If so, you have about five hours left to submit your comments as the comment period ends at 23:59 UTC today, 5 October 2015. You can read the Design Team report and submit your own comments at:

https://www.icann.org/public-comments/root-ksk-2015-08-06-en

The comment period has been open since August 6, 2015, and the word has been distributed through multiple online mailing lists and other forums in the time since.  To date there have only been a few comments, although I’m seeing several (including my own) coming in today:

http://forum.icann.org/lists/comments-root-ksk-06aug15/index.html

You may recall that ICANN announced the members of this design team back in February 2015 and this was after a comprehensive public comment period back in 2013.  Here are some links that can provide some context:

As you will see in my own response, I am generally pleased with the findings of the Design Team but have a few points I wish to add.

NOW IS THE TIME TO SUBMIT YOUR COMMENTS… you have about five hours left!

P.S. And if you just want to learn what DNSSEC is all about, please visit our Start Here page to learn more!

Watch DNS-OARC Live This Weekend For DNSSEC, DANE, DNS Privacy and more

DNS-OARC logoThis weekend in Montreal the OARC Fall 2015 Workshop will take place filled with all sorts of excellent talks about DNSSEC, DANE, DNS privacy, DNS performance and much, much more.  The best part is that if you can’t get there in person, you can watch the live video stream on YouTube at:

https://plus.google.com/+DnsoarcNetPlus/

All the sessions will also be recorded for later viewing. The sessions most interesting to remote viewers start at 14:00 US EDT (UTC-4) on Saturday, October 3, 2015, and include these:

  • An Overview of DNS Privacy Mechanisms
  • Using TLS for DNS privacy in practice
  • Next Steps in DANE Adoption
  • Benchmarking of authoritative DNS servers and DNSSEC impact assessment

Sunday morning (October 4) brings a whole set of “DNS security” talks related to DDoS attacks and attacks against DNS servers.  There are performance-related talks, detailed research sessions, and a whole set of talks related to DNS resolvers, including an exploration of IPv6 vs IPv4 performance.

There were so many interesting proposals to DNS-OARC this time that some of them occupy the Monday DNS Track inside of NANOG 65.  Again there look to be some great DNSSEC topics including a session about the KSK Key Rollover. (One note: I’m not sure if the live stream on Monday will still be on the DNS-OARC YouTube channel – the NANOG agenda only says it will be “recorded”.)

All in all it looks to be a great event!  Due to a personal scheduling conflict, I won’t be there in person… but I intend to watch a few of the sessions, either live or later.

And if you want to get started NOW with deploying DNSSEC, please visit our Start Here page to learn more!

TDYR-267-Interview-with-Khyle-York-of-Dyn

After a few years of tweeting back and forth, Khyle York and I finally got a chance to meet! Two Yorks in NH... both involved with DNS and with marketing / communications. I spoke on a panel at Dyn's #TechToberfest event in Manchester, NH

Watch Live Oct 1 – Dyn’s Techtoberfest: Internet Trends, Security, Net Neutrality and More (Featured Blog)

On Thursday, Oct 1, 2015, from 9:30am-4:30pm US EDT (UTC-4), Dyn will be holding their "TechToberFest" event in Manchester, NH, and also streaming the video live for anyone interested. There are a great set of speakers and a solid agenda. As I wrote on the Internet Society blog, I'll be part of the security panel from 3-4pm US EDT... and we who are on the panel are excited to participate just for the conversation that we are going to have! It should be fun! More...

Watch Live Oct 1 – Dyn’s TechToberFest – Internet trends, security, net neutrality and more (Featured Blog)

More...

Slides: Intro to IPv6 by Olle Johansson

I noticed recently that my friend Olle Johansson had posted this nice intro to IPv6 from a presentation he gave back in March:

What I like about it is that he provides some of the motivation for why we need to care about IPv6.

Slides: Intro to IPv6 by Olle Johansson

I noticed recently that my friend Olle Johansson had posted this nice intro to IPv6 from a presentation he gave back in March:

What I like about it is that he provides some of the motivation for why we need to care about IPv6.

Keynote at AstriCon on Oct 14: Open Source And The Global Disruption Of Telecom – What Choices Will We Make?

Astricon danyork 660px

Two weeks from today I'll be in Orlando giving the opening keynote address at AstriCon 2015. The abstract of the session is:

Open Source And The Global Disruption Of Telecom - What Choices Will We Make?

Wednesday, October 14th, 2015 - 9:00 am to 9:45 am - Pacifica Ballroom 7

There is a battle raging for the global future of telecommunications and the Internet. Taking place in networks, board rooms and legislatures, the battle will determine how we all communicate and what opportunities will exist. Will telecom support innovation? Will it be accessible to all? Will it give us the level of security and privacy we need to have the open, trusted Internet? Or will it be restricted and limited by corporate or government gatekeepers?

The rise of voice-over-IP has fundamentally disrupted the massive global telecommunications industry, infrastructure and policies. Open source software such as Asterisk has been a huge driver of that disruption and innovation.. but now what? What role do platforms such as Asterisk play in this space? And what can be their role in a telecom infrastructure that is now mobile, increasingly embedded (Internet of Things) and more and more using proprietary walled gardens of communication?

Join the Internet Society's Dan York in an exploration of what the future holds for telecom infrastructure and policy - and how the choices we make will determine that future.

Sounds great, eh?

Now I just have to deliver on that lofty rhetoric! :-)

Seriously, though, I'm very much looking forward to giving this presentation and I'm delighted that the folks at Digium asked me to speak. We're at a critical time in the evolution of our global communications infrastructure... with everything moving to IP and also moving to mobile, there are incredibly important choices we have to make for our future.

In the talk, I'll be speaking about the scenarios we have for what our future Internet could look like. I'll be talking about the role of open source. I'll be challenging the audience with some questions to ponder. I'll touch on some of the incredibly important - yet hard to understand - global policy issues such as the upcoming WSIS+10 Review in December - and why an open source developer should even remotely care! I'll of course hit on security issues and the rise of mobile... and more...

I'm excited!

I'm also excited to finally attend an AstriCon event. I used to write about Asterisk a good bit and for a while was running my own server in my home office for VoIP... but in all that time I never was able to work in attending an AstriCon!

If you are going to be there in Orlando, please do say hello! (There's still time to register!)

P.S. And yes, Olle Johansson, I'll be sure to work in at least one reference to IPv6! And TLS, too! Don't worry! :-)

Traceroute to bad.horse provides amusing results

For network geeks, this is rather amusing… someone was obviously a bit bored some day and had a bit of fun! This was what it looked like on my Mac right now. (Hat tip to Michele Neylon for first pointing this out to me in some social media channel.)

$ traceroute bad.horse
traceroute to bad.horse (162.252.205.157), 64 hops max, 52 byte packets
1  172.20.12.100 (172.20.12.100)  0.663 ms  0.537 ms  0.277 ms
2  cpe-74-69-224-1.ne.res.rr.com (74.69.224.1)  34.913 ms  30.602 ms  28.762 ms
3  tge0-0-1.keennhfi02h.northeast.rr.com (24.31.152.17)  28.827 ms  30.120 ms  21.132 ms
4  agg47.sebgme0302r.northeast.rr.com (24.58.41.98)  19.262 ms  22.382 ms  19.438 ms
5  be25.rochnyei01r.northeast.rr.com (24.58.32.68)  30.941 ms  32.204 ms  36.969 ms
6  bu-ether35.chcgildt87w-bcr00.tbone.rr.com (107.14.19.104)  48.409 ms
bu-ether45.chcgildt87w-bcr00.tbone.rr.com (107.14.19.106)  45.363 ms  46.521 ms
7  0.ae1.pr1.chi10.tbone.rr.com (107.14.17.194)  44.828 ms  46.147 ms  46.715 ms
8  216.1.94.145 (216.1.94.145)  46.134 ms
216.1.94.65 (216.1.94.65)  44.569 ms  45.409 ms
9  207.88.13.249.ptr.us.xo.net (207.88.13.249)  102.968 ms  101.157 ms  99.935 ms
10  te-4-1-0.rar3.denver-co.us.xo.net (207.88.12.22)  99.752 ms  102.249 ms  100.301 ms
11  216.156.16.3.ptr.us.xo.net (216.156.16.3)  98.776 ms  97.968 ms  98.756 ms
12  216.156.1.128.ptr.us.xo.net (216.156.1.128)  97.956 ms  95.644 ms  96.459 ms
13  * * *
14  166-70-1-5.xmission.com (166.70.1.5)  96.024 ms  96.826 ms  97.406 ms
15  t01.saltv1.ut.us.sn11.net (162.252.204.163)  87.981 ms  97.264 ms  86.158 ms
16  sandwichnet.dmarc.lga1.atlanticmetro.net (208.68.168.214)  89.937 ms  86.768 ms  87.949 ms
17  bad.horse (162.252.205.130)  88.073 ms  87.895 ms  86.609 ms
18  bad.horse (162.252.205.131)  93.351 ms  92.933 ms  90.876 ms
19  bad.horse (162.252.205.132)  115.629 ms  96.391 ms  96.864 ms
20  bad.horse (162.252.205.133)  101.257 ms  102.472 ms  102.213 ms
21  he.rides.across.the.nation (162.252.205.134)  108.059 ms  107.064 ms  108.290 ms
22  the.thoroughbred.of.sin (162.252.205.135)  111.206 ms  110.611 ms  109.944 ms
23  he.got.the.application (162.252.205.136)  116.866 ms  117.842 ms  115.659 ms
24  that.you.just.sent.in (162.252.205.137)  120.375 ms  123.519 ms  121.631 ms
25  it.needs.evaluation (162.252.205.138)  127.377 ms  126.769 ms  127.779 ms
26  so.let.the.games.begin (162.252.205.139)  132.761 ms  132.705 ms  131.315 ms
27  a.heinous.crime (162.252.205.140)  136.769 ms  136.045 ms  137.322 ms
28  a.show.of.force (162.252.205.141)  141.842 ms  141.447 ms  148.635 ms
29  a.murder.would.be.nice.of.course (162.252.205.142)  146.332 ms  147.854 ms  146.570 ms
30  bad.horse (162.252.205.143)  149.928 ms  150.487 ms  152.083 ms
31  bad.horse (162.252.205.144)  157.190 ms  156.693 ms  155.737 ms
32  bad.horse (162.252.205.145)  160.201 ms  161.399 ms  159.623 ms
33  he-s.bad (162.252.205.146)  166.007 ms  165.738 ms  165.244 ms
34  the.evil.league.of.evil (162.252.205.147)  171.012 ms  170.984 ms  172.062 ms
35  is.watching.so.beware (162.252.205.148)  176.041 ms  174.358 ms  176.463 ms
36  the.grade.that.you.receive (162.252.205.149)  181.276 ms  178.815 ms  180.667 ms
37  will.be.your.last.we.swear (162.252.205.150)  188.481 ms  185.823 ms  188.627 ms
38  so.make.the.bad.horse.gleeful (162.252.205.151)  194.008 ms  189.161 ms  193.114 ms
39  or.he-ll.make.you.his.mare (162.252.205.152)  198.708 ms  195.870 ms  195.894 ms
40  o_o (162.252.205.153)  200.037 ms  200.691 ms  201.280 ms
41  you-re.saddled.up (162.252.205.154)  207.748 ms  206.896 ms  205.608 ms
42  there-s.no.recourse (162.252.205.155)  211.288 ms  219.062 ms  212.026 ms
43  it-s.hi-ho.silver (162.252.205.156)  216.961 ms  218.367 ms  216.492 ms
44  signed.bad.horse (162.252.205.157)  214.262 ms  218.125 ms  215.096 ms