[Newsclips] IETF SYN-ACK Newspack 2022-02-21

David Goldstein <david@goldsteinreport.com> Mon, 21 February 2022 04:06 UTC

Return-Path: <david@goldsteinreport.com>
X-Original-To: newsclips@ietfa.amsl.com
Delivered-To: newsclips@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7D5BF3A09A5 for <newsclips@ietfa.amsl.com>; Sun, 20 Feb 2022 20:06:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.888
X-Spam-Level:
X-Spam-Status: No, score=-5.888 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, GB_AFFORDABLE=1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oLs0sALbFZpc for <newsclips@ietfa.amsl.com>; Sun, 20 Feb 2022 20:06:37 -0800 (PST)
Received: from karkinos.atomiclayer.com (karkinos.atomiclayer.com [96.125.178.142]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6EBAD3A099F for <newsclips@ietf.org>; Sun, 20 Feb 2022 20:06:37 -0800 (PST)
Received: from David2019Desktop (unknown [144.136.3.82]) by karkinos.atomiclayer.com (Postfix) with ESMTPSA id 7338E298286 for <newsclips@ietf.org>; Sun, 20 Feb 2022 23:06:31 -0500 (EST)
Authentication-Results: karkinos.atomiclayer.com; spf=pass (sender IP is 144.136.3.82) smtp.mailfrom=david@goldsteinreport.com smtp.helo=David2019Desktop
Received-SPF: pass (karkinos.atomiclayer.com: connection is authenticated)
From: David Goldstein <david@goldsteinreport.com>
To: newsclips@ietf.org
Date: Mon, 21 Feb 2022 15:06:27 +1100
Message-ID: <006901d826d8$6a10ffc0$3e32ff40$@goldsteinreport.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_006A_01D82734.9D83C1B0"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: Adgm2GBPNqAFamLdSIuTAj6rsyIOXQ==
Content-Language: en-au
X-PPP-Message-ID: <20220221040633.111091.94670@karkinos.atomiclayer.com>
X-PPP-Vhost: goldsteinreport.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/newsclips/-AA4pUIlFTZoZPZxaMPDfSJnC4E>
Subject: [Newsclips] IETF SYN-ACK Newspack 2022-02-21
X-BeenThere: newsclips@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF News Clips <newsclips.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/newsclips>, <mailto:newsclips-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/newsclips/>
List-Post: <mailto:newsclips@ietf.org>
List-Help: <mailto:newsclips-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/newsclips>, <mailto:newsclips-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Feb 2022 04:06:46 -0000

The IETF SYN-ACK Newspack collects IETF-related items from a variety of news outlets and other online publications. They do not represent the views of the IETF and are not checked for factual accuracy.

 

 

**********************

IETF IN THE NEWS

**********************

BEN ROBERTS: At the cusp of change, the IETF adds an African voice to the institution

The IETF has recently announced the appointment of Andrew Alston to the position of Routing Area Director. Andrew, born in South Africa and now settled in Kenya becomes the first African resident to be appointed to a senior management position at this esteemed institution.

< <https://techtrendske.co.ke/ben-roberts-at-the-cusp-of-change-the-internet-engineering-task-force-ietf-adds-an-african-voice-to-the-institution/> https://techtrendske.co.ke/ben-roberts-at-the-cusp-of-change-the-internet-engineering-task-force-ietf-adds-an-african-voice-to-the-institution/>

 

South African joins IETF steering group

African Internet industry luminary Andrew Alston has been appointed to the Internet Engineering Steering Group (IESG).

< <https://mybroadband.co.za/news/internet/434056-south-african-joins-internet-engineering-task-force-steering-group.html> https://mybroadband.co.za/news/internet/434056-south-african-joins-internet-engineering-task-force-steering-group.html>

 

What’s Really Going On In The Privacy Sandbox?

... As a cooperative venture, the Web relies on the goodwill of participants to survive. The W3C and its nerdier cousin, the IETF, are certainly doing their jobs.

< <https://www.adexchanger.com/data-driven-thinking/whats-really-going-on-in-the-privacy-sandbox/> https://www.adexchanger.com/data-driven-thinking/whats-really-going-on-in-the-privacy-sandbox/>

 

IPv4 Vs IPv6

... IPv6 is more secure than its forerunner. IPv6 supports a team of security protocols called IP Security, which in turn secures network communications at the IP level. Authentication headers help the network validate the source of each and every packet, protecting against fraudulent data packets. Encapsulating security payloads provide extra encryption and authentication towards the packets, adding an extra part of security. The Internet System Task Drive (IETF) decide to introduce IPv6 in 1999 to satisfy this need.

< <http://andrekruger.bookslive.co.za/blog/2022/02/13/ipv4-vs-ipv6/> http://andrekruger.bookslive.co.za/blog/2022/02/13/ipv4-vs-ipv6/>

 

ICANN Virtual Meetings: A Newcomer’s Reflections for the Future Newcomers

... With that in mind, last summer (2021), I applied for the Internet of Rights Fellowship, hosted by global non-profit ARTICLE 19, which aim is, among others, to provide insights into the chief Internet governance bodies such as the ICANN, the IETF, the World Wide Web Consortium (W3C), the Institute for Electrical and Electronics Engineers (IEEE), the 3rd Generation Partnership Project (3GPP), the International Telecommunication Union Development Sector (ITU-D), International Organization for Standardization (ISO), the ITU Technical Sector (ITU-T), and oneM2M. My body of choice was ICANN due to its policy-setting role in the DNS management: a topic closest connected to my research on website blocking and content moderation.

< <https://circleid.com/posts/20220217-icann-virtual-meetings-a-newcomeras-reflections-for-the-future-newcomers> https://circleid.com/posts/20220217-icann-virtual-meetings-a-newcomeras-reflections-for-the-future-newcomers>

 

UN Committee To Begin Negotiating New Cybercrime Treaty Amid Disagreement Among States Over Its Scope

... A number of states, including Brazil, Dominican Republic, the European Union (EU), Liechtenstein, Norway, Switzerland, the UK, and the USA, are particularly advocating for a narrower crime-related focus, warning against the use of this treaty to impose broader controls on the internet. At the global level, technical and policy coordination of the internet currently occurs through a range of multi-stakeholder bodies such as the IETF, ICANN, and the Internet Governance Forum. Past attempts to “take over” control over these multi-stakeholder bodies have proven schismatic, and it appears these divisions are alive and well.

< <https://www.eff.org/deeplinks/2022/02/un-committee-begin-negotiating-new-cybercrime-treaty-amid-disagreement-among> https://www.eff.org/deeplinks/2022/02/un-committee-begin-negotiating-new-cybercrime-treaty-amid-disagreement-among>

 

Spintly Wins the Thread Innovation Enabler Award [news release]

... Thread is a low-power wireless mesh networking protocol built on open and proven IETF and IEEE standards aimed at simplifying and standardizing IoT solutions. The Thread protocol enables direct, end-to-end, secure, and scalable connectivity between IoT devices, mobile devices, and the internet.

< <https://spintly.com/press-room/> https://spintly.com/press-room/>

 

Securing an RDAP service with OpenID Connect and Keycloak

This post summarizes our experiences securing the Registration Data Access Protocol (RDAP) service of ccTLD .it by integrating with OpenID Connect (OIDC). Integration is achieved by using one of the most well-known open-source identity and access managers: Keycloak. Access to the RDAP server by human users is provided through a web client or a browser. Automated clients are allowed access via both ‘Basic’ and ‘Bearer’ HTTP authorization schemes. End users are handled through Keycloak and grouped according to different categories, each one assigned with specific access grants. ... An IETF draft describing a federated authentication system for RDAP based on OIDC has been proposed to reduce client credential management complexity.

< <https://blog.apnic.net/2022/02/17/securing-an-rdap-service-with-openid-connect-and-keycloak/> https://blog.apnic.net/2022/02/17/securing-an-rdap-service-with-openid-connect-and-keycloak/>

 

The Building Blocks of the Metaverse

Long before mainstream media latched onto the metaverse, companies like Magic LEAP, Invidia, and Huawei were already trying to build it. In fact, it could have been called the Magicverse, the Omniverse, or the Cyberverse. Others conceptualized it as Planet-Scale AR, the AR Cloud, and the Mirrorworld. Mark Zuckerberg, the name now most closely associated with the metaverse, characterized it as "the embodied internet." ... Standardization Task Force: Sweeney thinks a collaboration is needed, similar to how the IETF formed to develop and promote internet standards in 1986. "You need an entire suite of standards, and the web is based on several [like HTML]," he says. "The metaverse will require a lot of them, file formats for describing a 3-D scene, networking protocols for describing how players are interacting in real time. Every multiplayer game has a networking protocol of some sort. They don't all agree, but eventually they ought to be lined up and made to communicate."

< <https://www.streamingmedia.com/Articles/ReadArticle.aspx?ArticleID=151453> https://www.streamingmedia.com/Articles/ReadArticle.aspx?ArticleID=151453>

 

**********************

SECURITY & PRIVACY

**********************

ICANN Publishes Paper on How Quantum Computing Will Affect the DNS in the Future by Paul Hoffman

The topic of quantum computing has appeared more often in the past few years because more people are concerned about its possible effects on security and privacy. If someone can build a very large quantum computer, it would completely undermine the cryptography that is used in digital signatures (such as those used in DNSSEC) and key exchanges for privacy (such as those used in TLS).

< <https://www.icann.org/en/blogs/details/icann-publishes-paper-on-how-quantum-computing-will-affect-the-dns-in-the-future-17-2-2022-en> https://www.icann.org/en/blogs/details/icann-publishes-paper-on-how-quantum-computing-will-affect-the-dns-in-the-future-17-2-2022-en>

 

ICANN Conducts its First Key Ceremony of 2022 to Secure the Internet

ICANN is pleased to announce that it will conduct its 44th key signing ceremony at 21:00 UTC on 16 February 2022. This important operational procedure helps secure the DNS against several security vulnerabilities. The DNS is a crucial piece of Internet infrastructure used by over 4.5 billion people every day.

< <https://www.icann.org/en/announcements/details/icann-conducts-its-first-key-ceremony-of-2022-to-secure-the-internet-15-2-2022-en> https://www.icann.org/en/announcements/details/icann-conducts-its-first-key-ceremony-of-2022-to-secure-the-internet-15-2-2022-en>

 

de: Call for Papers for the Internet Security Days 2022 – Submit Presentations Now

On 29 and 30 September 2022, the Internet Security Days (ISD) will take place once again in Phantasialand near Cologne, Germany. eco and heise Events invite IT security experts, security managers and user companies to exchange views on current threats and security strategies at the 12th ISD.

< <https://international.eco.de/presse/call-for-papers-for-the-internet-security-days-2022-submit-presentations-now/> https://international.eco.de/presse/call-for-papers-for-the-internet-security-days-2022-submit-presentations-now/>

 

Inside Ukraine’s Cybercommand Center, Hours Before Attack [video]

A day before Ukraine announced its Defense Ministry and banking servers had been hacked, our video team toured the country’s Cybercommand Center, where officials have been preparing for this scenario for years.

< <https://www.nytimes.com/video/world/europe/100000008210902/inside-ukraines-cybercommand-center-hours-before-attack.html> https://www.nytimes.com/video/world/europe/100000008210902/inside-ukraines-cybercommand-center-hours-before-attack.html>

 

France launches “Cyber Campus” to boost cybersecurity strategy

One year after France’s cybersecurity strategy launch, the Cyber Campus opened its doors on Tuesday (15 February). It aims to become an innovation hotspot to improve the country’s resilience and accelerate its ecosystem.

< <https://www.euractiv.com/section/cybersecurity/news/france-launches-new-cyber-campus-to-boost-cybersecurity-strategy/> https://www.euractiv.com/section/cybersecurity/news/france-launches-new-cyber-campus-to-boost-cybersecurity-strategy/>

 

ETSI releases Report on Coordinated Vulnerability Disclosure

ETSI has released on 27 January a Guide to Coordinated Vulnerability Disclosure. The Technical Report ETSI TR 103 838 will help companies and organizations of all sizes to implement a vulnerability disclosure process and fix vulnerability issues before they’re publicly disclosed.

< <https://www.etsi.org/newsroom/press-releases/2029-2022-02-etsi-releases-report-on-coordinated-vulnerability-disclosure> https://www.etsi.org/newsroom/press-releases/2029-2022-02-etsi-releases-report-on-coordinated-vulnerability-disclosure>

 

Joint Publication – Boosting your Organisation’s Cyber Resilience

The European Union Agency for Cybersecurity (ENISA) and CERT- EU publish today a joint set of cybersecurity best practices for public and private organisations in the EU.

< <https://www.enisa.europa.eu/news/enisa-news/joint-publication-boosting-your-organisations-cyber-resilience> https://www.enisa.europa.eu/news/enisa-news/joint-publication-boosting-your-organisations-cyber-resilience>

 

MANRS in 2021: A Year of Growth and Change

The world needs a secure and resilient Internet, especially in the face of an ongoing pandemic still driving more activity and more people online. Here, we’ll share a few highlights from the MANRS Community Report 2021 and outline some of our plans for 2022.

< <https://www.internetsociety.org/blog/2022/02/manrs-in-2021-a-year-of-growth-and-change/> https://www.internetsociety.org/blog/2022/02/manrs-in-2021-a-year-of-growth-and-change/>

 

US Government sets forth Zero Trust architecture strategy and requirements

To help protect the United States from increasingly sophisticated cyber threats, the White House issued Executive Order (EO) 14028 on Improving the Nation’s Cybersecurity, which requires US Federal Government organizations to take action to strengthen national cybersecurity. Section 3 of EO 14028 specifically calls for federal agencies and their suppliers “to modernize [their] approach to cybersecurity” by accelerating the move to secure cloud services and implementing a Zero Trust architecture.

< <https://www.microsoft.com/security/blog/2022/02/17/us-government-sets-forth-zero-trust-architecture-strategy-and-requirements/> https://www.microsoft.com/security/blog/2022/02/17/us-government-sets-forth-zero-trust-architecture-strategy-and-requirements/>

 

us: Our Quest: Advancing Product Labels to Help Consumers Consider Cybersecurity

For many decades, consumers have relied on labels to help them make decisions about which products to buy. Sometimes the labels make assertions about what ingredients or components the product uses. (What’s in that peanut butter?) Other times labels claim a level of performance. (How much storage does that laptop have?) These statements may come from the manufacturer or from a third party who has reviewed and perhaps tested the product. (This appliance has been tested to meet specific electrical safety standards) Labels have assisted manufacturers and retailers to help consumers make more informed purchasing choices. Presumably, labels also have improved the quality and performance of available products by upping the ante for manufacturers and retailers who compete for consumers’ business.

< <https://www.nist.gov/blogs/cybersecurity-insights/our-quest-advancing-product-labels-help-consumers-consider> https://www.nist.gov/blogs/cybersecurity-insights/our-quest-advancing-product-labels-help-consumers-consider>

 

us: CISA Releases New Insight to Help Critical Infrastructure Owners Prepare for and Mitigate Foreign Influence Operations

The Cybersecurity and Infrastructure Security Agency (CISA) released a new CISA Insight today, Preparing for and Mitigating Foreign Influence Operations Targeting Critical Infrastructure, which provides critical infrastructure owners and operators with guidance on how to identify and mitigate the risks of influence operations that use mis-, dis-, and malinformation (MDM) narratives.

< <https://www.cisa.gov/news/2022/02/18/cisa-releases-new-insight-help-critical-infrastructure-owners-prepare-and-mitigate> https://www.cisa.gov/news/2022/02/18/cisa-releases-new-insight-help-critical-infrastructure-owners-prepare-and-mitigate>

 

us: NIST Publishes New Recommended Criteria for Cybersecurity Labeling for Consumer Internet of Things (IoT) Products

On February 4, 2022, the National Institute of Standards and Technology (“NIST”) published its Recommended Criteria for Cybersecurity Labeling for Consumer Internet of Things (IoT) Products. These criteria make recommendations for cybersecurity labeling of consumer IoT products, i.e., those IoT products intended for personal, family, or household use.

< <https://www.natlawreview.com/article/nist-publishes-new-recommended-criteria-cybersecurity-labeling-consumer-internet> https://www.natlawreview.com/article/nist-publishes-new-recommended-criteria-cybersecurity-labeling-consumer-internet>

 

us: NIST wants public input on updates to Cybersecurity Framework, supply chain security

The National Institute for Standards and Technology (NIST) is asking for help from the public to update one of its flagship cybersecurity guidelines and inform a new initiative on supply chain security.

< <https://www.scmagazine.com/analysis/policy/nist-wants-public-input-on-updates-to-cybersecurity-framework-supply-chain-security> https://www.scmagazine.com/analysis/policy/nist-wants-public-input-on-updates-to-cybersecurity-framework-supply-chain-security>

 

us: CISA Compiles Free Cybersecurity Services and Tools for Network Defenders

CISA has compiled and published a list of free cybersecurity services and tools to help organizations reduce cybersecurity risk and strengthen resiliency. This non-exhaustive living repository includes services provided by CISA, widely used open source tools, and free tools and services offered by private and public sector organizations across the cybersecurity community. Before turning to the free offerings, CISA strongly recommends organizations take certain foundational measures to implement a strong cybersecurity program:

< <https://www.cisa.gov/uscert/ncas/current-activity/2022/02/18/cisa-compiles-free-cybersecurity-services-and-tools-network> https://www.cisa.gov/uscert/ncas/current-activity/2022/02/18/cisa-compiles-free-cybersecurity-services-and-tools-network>

 

us: CISA Launches New Catalog of Free Public and Private Sector Cybersecurity Services

The  Cybersecurity and Infrastructure Security Agency (CISA) published the “Free Cybersecurity Services and Tools” webpage intended to be a one-stop resource where organizations of all sizes can find free public and private sector resources to reduce their cybersecurity risk. The catalog published today is a starting point. Going forward, CISA will incorporate other free services into the catalog.

< <https://www.cisa.gov/news/2022/02/18/cisa-launches-new-catalog-free-public-and-private-sector-cybersecurity-services> https://www.cisa.gov/news/2022/02/18/cisa-launches-new-catalog-free-public-and-private-sector-cybersecurity-services>

 

Disaster recovery with DNSSEC

In 2021, we at SIDN replaced our Hardware Security Modules (HSMs) and during the changeover project wanted to get a better understanding of what to do in case of an emergency. So, we created some ‘what if’ scenarios. One of those scenarios was:

< <https://blog.apnic.net/2022/02/14/disaster-recovery-with-dnssec/> https://blog.apnic.net/2022/02/14/disaster-recovery-with-dnssec/>

 

US Government sets forth Zero Trust architecture strategy and requirements

To help protect the United States from increasingly sophisticated cyber threats, the White House issued Executive Order (EO) 14028 on Improving the Nation’s Cybersecurity, which requires US Federal Government organizations to take action to strengthen national cybersecurity. Section 3 of EO 14028 specifically calls for federal agencies and their suppliers “to modernize [their] approach to cybersecurity” by accelerating the move to secure cloud services and implementing a Zero Trust architecture.

< <https://www.microsoft.com/security/blog/2022/02/17/us-government-sets-forth-zero-trust-architecture-strategy-and-requirements/> https://www.microsoft.com/security/blog/2022/02/17/us-government-sets-forth-zero-trust-architecture-strategy-and-requirements/>

 

**********************

INTERNET OF THINGS

**********************

Global Consensus Emerges to Secure Internet-Connected Home and Wearable Devices

The consumer internet of things (IoT) global market size is forecast to grow from $45 billion today to $154 billion by 2028. Whereas early adoption of smart wearables, home electronics and appliances was concentrated in North America and Western Europe, China is projected to overtake the United States as the largest market by the end of 2024.

< <https://www.weforum.org/press/2022/02/global-consensus-emerges-to-secure-internet-connected-home-and-wearable-devices> https://www.weforum.org/press/2022/02/global-consensus-emerges-to-secure-internet-connected-home-and-wearable-devices>

 

pk: PTA releases Internet of Things framework

The Pakistan Telecommunication Authority (PTA) has issued a regulatory framework for Short Range Devices (SRD) and internet of things (IoT) services.

< <https://tribune.com.pk/story/2343875/pta-releases-internet-of-things-framework> https://tribune.com.pk/story/2343875/pta-releases-internet-of-things-framework>

 

Thread + Matter - The Future Of Home Automation [Spintly blog]

We are all moving towards an automated world as automation is becoming more affordable, relevant and functional in solving everyday problems. As the use of the Internet of Things (IoT) and AI is becoming more common, the automation of a household is becoming more advanced and smart.

< <https://spintly.com/thread-matter-the-future-of-home-automation/> https://spintly.com/thread-matter-the-future-of-home-automation/>

 

**********************

NEW TRANSPORT PROTOCOLS

**********************

Google, Netflix, Facebook, Apple, Amazon y Microsoft acaparan el 57% del tráfico de la red de las operadoras

... El informe de Sandvine también señala una tendencia impulsada por los grandes con el que las operadoras están especialmente molestas. Se trata del uso cada vez más popular de nuevos protocolos de transporte como QUIC, HTTP/3 y sistemas como Private Relay de Apple, que crea una VPN que oculta el tráfico al operador. El cifrado de la información impide a las compañías inspeccionar el contenido de la comunicación para clasificar el tráfico, un paso básico para la gestión óptima de la red estableciendo prioridades para evitar que servicios críticos se degraden cuando hay saturación.

< <https://bandaancha.eu/articulos/google-netflix-facebook-apple-amazon-10169> https://bandaancha.eu/articulos/google-netflix-facebook-apple-amazon-10169>

 

**********************

OTHERWISE NOTEWORTHY

**********************

Web standards makers share their thoughts on W3C TPAC 2021

W3C’s annual conference is the Technical Plenary and Advisory Committee meeting, or TPAC. This event brings together a global community of more than a thousand software engineers, architects, web developers, and product teams to advance standards development on emerging web technologies.

< <https://www.w3.org/blog/2022/02/web-standards-makers-share-their-thoughts-on-w3c-tpac-2021/> https://www.w3.org/blog/2022/02/web-standards-makers-share-their-thoughts-on-w3c-tpac-2021/>

 

IPv6+: The Connectivity Foundation of the Digital Economy by Li Hongkun, Senior Marketing Expert, Data Communication Product Line, Huawei

IP addresses are a key basic resource for the Internet and are the foundation for identifying and data transmission between Internet systems. IPv4 has been in use for more than 30 years, and the IPv4-based Internet has carried a great majority of applications. When the Internet was being designed, the global reach achieved by the technology today wasn’t considered, nor was IPv4 address exhaustion, which is becoming an increasing problem. On February 3, 2011, the Internet Assigned Numbers Authority (IANA) announced that the global central pool of available IPv4 addresses was exhausted. The inventory of IPv4 addresses of the five Regional Internet Registries (RIRs) has been declining ever since.

< <https://www.huawei.com/us/technology-insights/publications/huawei-tech/93/ipv6-connectivity-foundation-digital-economy> https://www.huawei.com/us/technology-insights/publications/huawei-tech/93/ipv6-connectivity-foundation-digital-economy>

 

Europe’s bid for AI standard faces long road, EU lawmakers say

Europe’s effort to set a standard for artificial intelligence will likely take more than a year, with the debate focusing on whether facial recognition should be banned and who should enforce the rules, two key lawmakers said on Wednesday (16 February).

< <https://www.euractiv.com/section/digital/news/europes-bid-for-ai-standard-faces-long-road-eu-lawmakers-say/> https://www.euractiv.com/section/digital/news/europes-bid-for-ai-standard-faces-long-road-eu-lawmakers-say/>

 

IEEE’s Volunteer Recruitment Website Adds New Features: Opportunities can now be shared on Facebook, LinkedIn, and Twitter

Several features have been added to the IEEE Volunteering Platform. The website enables members to search for opportunities across the organization, be it short- or long-term, local or remote. Those looking for helpers can post positions they need to fill.

< <https://spectrum.ieee.org/new-features-on-volunteering-platform> https://spectrum.ieee.org/new-features-on-volunteering-platform>

 

Update on IEEE’s Diversity and Inclusion Efforts: IEEE policies have been changed and new partnerships have formed

IEEE continues its effort to further strengthen diversity and inclusiveness across the organization and in support of the broader technological community. This year it formed the IEEE Diversity and Inclusion Committee, which is a standing committee of the IEEE Board of Directors.

< <https://spectrum.ieee.org/ieee-diversity-and-inclusion-efforts> https://spectrum.ieee.org/ieee-diversity-and-inclusion-efforts>

 

Internet Pioneer Vint Cerf Says Digital Inclusion is More Than Just Access

Vint Cerf, a vice president at Google and an early developer of the internet, said more data should be collected to get a better sense of internet performance across the country.

< <https://broadbandbreakfast.com/2022/02/internet-pioneer-vint-cerf-says-digital-inclusion-is-more-than-just-access/> https://broadbandbreakfast.com/2022/02/internet-pioneer-vint-cerf-says-digital-inclusion-is-more-than-just-access/>

 

Online event: Does AI advance gender equality?

The discussion will be based on the new joint report from UNESCO, OECD and IDB “The Effects of AI on the Working Lives of Women”.

< <https://oecd.ai/en/women-event-2022> https://oecd.ai/en/women-event-2022>

 

Why are authentication and authorization so difficult?

Let’s say you’re tasked with selecting a strong authentication solution for your organization. Where do you begin? This blog functions as an introduction to this topic and provides additional resources for further learning.

< <https://blog.apnic.net/2022/02/16/why-are-authentication-and-authorization-so-difficult/> https://blog.apnic.net/2022/02/16/why-are-authentication-and-authorization-so-difficult/>

 

Three policy proposals up for community discussion at APNIC 53

The Open Policy Meeting at APNIC 53 will be held on 2 March 2022. Here is a snapshot of the three new policy proposals up for discussion.

< <https://blog.apnic.net/2022/02/15/three-policy-proposals-apnic-53/> https://blog.apnic.net/2022/02/15/three-policy-proposals-apnic-53/>

 

PeeringDB’s 2021 user survey results and 2022 product roadmap

Last September, we at PeeringDB asked you for input through our anonymous satisfaction survey, so we could use it to guide our product roadmap for 2022. Last month, we shared an update on what we delivered in 2021. Today, we are sharing what you told us through the survey and how we’ll be improving PeeringDB and your experience of it in 2022.

< <https://blog.apnic.net/2022/02/18/peeringdbs-2021-user-survey-results-and-2022-product-roadmap/> https://blog.apnic.net/2022/02/18/peeringdbs-2021-user-survey-results-and-2022-product-roadmap/>

 

OMNI: An adaptation layer for the Internet

This is the first post in a series that will discuss a new layer in Internet architecture known as the adaptation layer, including the related cost-benefit implications of its introduction.

< <https://blog.apnic.net/2022/02/18/omni-an-adaptation-layer-for-the-internet/> https://blog.apnic.net/2022/02/18/omni-an-adaptation-layer-for-the-internet/>

 

Journeying into XDP: Fully-fledged DNS service augmentation

In our previous post on using eXpress Data Path (XDP) for DNS, we discussed how a new XDP rate-limiting queries feature can augment a DNS service running in user space (with common DNS software) to deal with denial of service (DoS) attacks.

< <https://blog.apnic.net/2022/02/15/journeying-into-xdp-fully-fledged-dns-service-augmentation/> https://blog.apnic.net/2022/02/15/journeying-into-xdp-fully-fledged-dns-service-augmentation/>

 

The impact of digital technology on the green economy

A report from European innovation engine EIT Digital explores whether digital transformation helps reduce non-green energy use or enhance consumption of non-green energy in the overall economy.

< <https://www.smartcitiesworld.net/policymaking/the-impact-of-digital-technology-on-the-green-economy> https://www.smartcitiesworld.net/policymaking/the-impact-of-digital-technology-on-the-green-economy>

------

David Goldstein

email:  <mailto:david@goldsteinreport.com> david@goldsteinreport.com

web:  <http://goldsteinreport.com/> http://goldsteinreport.com/

Twitter:  <https://twitter.com/goldsteinreport> https://twitter.com/goldsteinreport

phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home