[Newsclips] IETF SYN-ACK Newspack 2020-10-26

David Goldstein <david@goldsteinreport.com> Sun, 25 October 2020 15:12 UTC

Return-Path: <david@goldsteinreport.com>
X-Original-To: newsclips@ietfa.amsl.com
Delivered-To: newsclips@ietfa.amsl.com
Received: from localhost (localhost []) by ietfa.amsl.com (Postfix) with ESMTP id 0D8103A0A2C for <newsclips@ietfa.amsl.com>; Sun, 25 Oct 2020 08:12:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.182
X-Spam-Level: *
X-Spam-Status: No, score=1.182 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FSL_BULK_SIG=0.001, HTML_MESSAGE=0.001, HTML_OBFUSCATE_05_10=0.26, LOTS_OF_MONEY=0.001, RAZOR2_CF_RANGE_51_100=1.886, RAZOR2_CHECK=0.922, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id QWMOo3-DfkMt for <newsclips@ietfa.amsl.com>; Sun, 25 Oct 2020 08:12:29 -0700 (PDT)
Received: from karkinos.atomiclayer.com (karkinos.atomiclayer.com []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4C9863A0A2B for <newsclips@ietf.org>; Sun, 25 Oct 2020 08:12:29 -0700 (PDT)
Received: from DGSurfaceBook (unknown []) by karkinos.atomiclayer.com (Postfix) with ESMTPSA id 3C0DA280B19 for <newsclips@ietf.org>; Sun, 25 Oct 2020 11:12:19 -0400 (EDT)
Authentication-Results: karkinos.atomiclayer.com; spf=pass (sender IP is smtp.mailfrom=david@goldsteinreport.com smtp.helo=DGSurfaceBook
Received-SPF: pass (karkinos.atomiclayer.com: connection is authenticated)
From: "David Goldstein" <david@goldsteinreport.com>
To: <newsclips@ietf.org>
Date: Mon, 26 Oct 2020 02:12:14 +1100
Message-ID: <026401d6aae1$3cfc0080$b6f40180$@goldsteinreport.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0265_01D6AB3D.706E2630"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: Adaq4SUjwaqANJGCQuCNf/xu65MauQ==
Content-Language: en-au
X-PPP-Message-ID: <20201025151226.403376.81032@karkinos.atomiclayer.com>
X-PPP-Vhost: goldsteinreport.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/newsclips/27Zy7wbhU7SpMkVmf9dc0JTUpbI>
Subject: [Newsclips] IETF SYN-ACK Newspack 2020-10-26
X-BeenThere: newsclips@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF News Clips <newsclips.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/newsclips>, <mailto:newsclips-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/newsclips/>
List-Post: <mailto:newsclips@ietf.org>
List-Help: <mailto:newsclips-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/newsclips>, <mailto:newsclips-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 25 Oct 2020 15:12:34 -0000

The IETF SYNACK Newspack collects IETF-related items from a variety of news outlets and other online publications. They do not represent the views of the IETF and are not checked for factual accuracy.





Call for Feedback on the ICANN Technical Liaison Group Appointment

On behalf of the IETF, the IAB names two technical experts to the ICANN Technical Liaison Group (TLG). The current IETF-selected members of the TLG are Warren Kumari (term ends 2021) and Petr Špaček (term ends 2022). Warren has indicated that he is willing to continue in this role another term. The IAB is now soliciting input from the community on this incumbent.

< <https://www.iab.org/2020/10/23/call-for-feedback-on-the-icann-technical-liaison-group-appointment/> https://www.iab.org/2020/10/23/call-for-feedback-on-the-icann-technical-liaison-group-appointment/>


India Internet Engineering Society (IIESoc) receives a prestigious grant from the Information Society Innovation Fund (ISIF Asia) to help with IPv6 Deployment

... The grant was given to the India Internet Engineering Society (IIESoc), a non-profit that brings together different stakeholders from the computer networking community across industry, academia, service providers, and government. It exists to further the adoption of IETF standards and increase awareness and participation in the IETF process from the subcontinent. IIESoc has been organizing an annual pre-IETF event in India called Connections and regular meetups called RFCsWeLove. IIESoc has signed an MoU with a US-based non-profit Industry Network Technology Council (INTC) working on a similar goal in the North America region.

< <https://indiaeducationdiary.in/india-internet-engineering-society-iiesoc-receives-a-prestigious-grant-from-the-information-society-innovation-fund-isif-asia-to-help-with-ipv6-deployment/> https://indiaeducationdiary.in/india-internet-engineering-society-iiesoc-receives-a-prestigious-grant-from-the-information-society-innovation-fund-isif-asia-to-help-with-ipv6-deployment/>


Das kommende IETF-Treffen 110 ist als Präsenzveranstaltung im März 2021 geplant [The upcoming IETF meeting 110 is planned as a face-to-face event in March 2021]

Die Internet Engineering Task Force (IETF), deren 108. und 109. Treffen online stattfanden, plant für das 110. Treffen wieder eine Präsenzveranstaltung. Das 110. Meeting der Organisation zur Weiterentwicklung des Internets, in dem es führende Internetingenieure zusammenbringt, wird voraussichtlich vom 06. bis 12. März 2021 in Prag stattfinden.

< <https://domain-recht.de/domain-events/sonstige-events/prag-das-kommende-ietf-treffen-110-ist-als-praesenzveranstaltung-im-maerz-2021-geplant-67647.html> https://domain-recht.de/domain-events/sonstige-events/prag-das-kommende-ietf-treffen-110-ist-als-praesenzveranstaltung-im-maerz-2021-geplant-67647.html>





A Last Call for QUIC, a giant leap for the Internet

QUIC is a new Internet transport protocol for secure, reliable and multiplexed communications. HTTP/3 builds on top of QUIC, leveraging the new features to fix performance problems such as Head-of-Line blocking. This enables web pages to load faster, especially over troublesome networks.

< <https://blog.cloudflare.com/last-call-for-quic/> https://blog.cloudflare.com/last-call-for-quic/>


Facebook nutzt mehrheitlich Quic und HTTP/3 [Facebook mostly uses Quic and HTTP / 3]

... Zwar sind die beiden Protokolle noch nicht offiziell standardisiert, die Arbeiten dazu bei der IETF sind jedoch schon sehr weit fortgeschritten und immer mehr Unternehmen wechseln auf die fast fertige Technik. Vor allem, wenn sie selbst große Infrastruktur betreiben wie eben Facebook.

< <https://www.golem.de/news/internetprotokoll-facebook-nutzt-mehrheitlich-quic-und-http-3-2010-151659.html> https://www.golem.de/news/internetprotokoll-facebook-nutzt-mehrheitlich-quic-und-http-3-2010-151659.html>


HTTP/3-mal és npm 7.0-val érkezik az új Node.js 15 [New Node.js 15 arrives with HTTP/3 and npm 7.0]

A Node.js fejlesztői kedden jelentették be, hogy elérhetővé tették jól ismert JavaScript-alapú keretrendszerük legújabb verzióját. A Node.js 15 átveszi a 14-es vonal szerepét a folyamatosan fejlesztések tekintetében, míg utóbbi ezzel átkerül a hosszan támogatott (LTS) állapotba. Az új verzió számos ponton lép előre a korábbiakhoz képest. Így például ez képezi a Node.js első olyan kiadását, ami már képes a HTTP/3 alapját képező QUIC protokollal is működni - igaz, ez a fejlesztés egyelőre csak kísérleti módban van, és külön kell még bekapcsolni benne.

< <https://prog.hu/hirek/5610/http-3-mal-es-npm-7-0-val-erkezik-az-uj-node-js-15> https://prog.hu/hirek/5610/http-3-mal-es-npm-7-0-val-erkezik-az-uj-node-js-15>


Facebookは次世代プロトコル「QUIC」をどのように導入しサービスを高速化したのか? [How did Facebook implement the next-generation protocol "QUIC" to speed up its services?]

... そもそも「QUIC」とは、トランスポート層のプロトコルであり最も有名な通信規格のひとつであるTCPを置き換える次世代のプロトコルを指します。QUICはもともとGoogleによって開発されましたが、2015年からはインターネットの標準化団体・IETFによる開発・標準化も進められています。UDPを用いることで従来のネットワーク機器にも対応した柔軟性と、TCPにはない暗号化機能といった高機能性を両立しているQUICは、未来のインターネットを支える通信規格として注目されています。

< <https://gigazine.net/news/20201024-facebook-quic-replacement/> https://gigazine.net/news/20201024-facebook-quic-replacement/>

< <https://article.auone.jp/detail/1/3/7/48_7_r_20201024_1603519382736118> https://article.auone.jp/detail/1/3/7/48_7_r_20201024_1603519382736118>


世界でたったひとつの識別子として活用される「UUID」はどのように生成されているのか [How is the "UUID" used as the only identifier in the world generated?]

... 世界中で重複がないユニークな値を実現する方法は多数存在していますが、現代の多くのUUIDの実装はIETFのRFC 4122に基づいており、このRFC 4122では5つの異なる生成方法が定義されています。ここで定義されたUUIDは128ビットのビット列となっており、一般的にはこのビット列を16進数表記して、8-4-4-4-12の形式で表示します。

< <https://gigazine.net/news/20201019-uuid-randomness/> https://gigazine.net/news/20201019-uuid-randomness/>


臉書大部分流量皆已使用新協定QUIC和HTTP/3 [Most of Facebook's traffic already uses the new protocols QUIK and HTTP/3]

... 廣義的來說,QUIC是一個用來代替TCP的協定,最初由Google開發,在之後Google將其提交給IETF,經過IETF重新設計與改進,成為了目前最終的QUIC版本,HTTP/3則是最新的HTTP版本,而QUIC和HTTP/3結合,能在網際網路中引入最新的功能。

< <https://www.ithome.com.tw/news/140687> https://www.ithome.com.tw/news/140687>


全景解密量子信息技术:高层集中学习,国家战略,三大领域一文看懂 [Panoramic decryption of quantum information technology: high-level concentrated learning, national strategy, three major areas in one article]

... 国际标准化组织和国际电工委员会的第一联合技术委员会(ISO/IEC JTC1)成立了有我国专家参与的量子计算研究组(SG2)和咨询组(AG),发布量子计算研究报告和技术趋势报告,同时在信息安全分技术委员会(SC27)立项由我国专家牵头的QKD安全需求与测评方法标准项目。国际电气和电子工程师协会(IEEE)启动了量子技术术语定义、量子计算性能指标和软件定义量子通信协议等3个研究项目。国际互联网工程任务组(IETF)成立量子互联网研究组(QIRG)开展量子互联网路由、资源分配、连接建立、互操作和安全性等方面的初步研究。

< <http://news.rfidworld.com.cn/2020_10/4ae4e4b17ad7eda6.html> http://news.rfidworld.com.cn/2020_10/4ae4e4b17ad7eda6.html>


G-SRv6重大突破背后:产业链凸显中国力量 [Behind the G-SRv6 major breakthrough: the industrial chain highlights China's power]

... SRv6技术虽然先进,但是由于采用了IPv6 128bit格式的SID(Segment ID),存在报文头开销大、网络链路带宽利用率低、现网设备难以平滑升级部署的问题。为此,中国移动牵头联合中兴通讯等厂商,2019年在IETF提出了SRv6头压缩方面的问题和Unified SID草案,并最终形成了创新的G-SRv6头压缩方案。

< <http://news.tom.com/202010/1286410549.html> http://news.tom.com/202010/1286410549.html>


เฟซบุ๊กใช้ HTTP/3 เกิน 75% แล้ว แอปหน่วงน้อยลง, วิดีโอโหลดเร็วขึ้น [Facebook is using over 75% of HTTP / 3, the app has less lag, the video loads faster]

เฟซบุ๊กรายงานถึงการย้ายโปรโตคอลไปยัง HTTP/3 หรือ QUIC ระบุว่าตอนนี้ทราฟิกของเฟซบุ๊กที่เชื่อมต่อผ่านอินเทอร์เน็ตเป็น HTTP/3 มากกว่า 75% แล้ว หลังจากเฟซบุ๊กย้ายแอปให้เชื่อมต่อผ่าน HTTP/3 แทน

< <https://www.blognone.com/node/119159> https://www.blognone.com/node/119159>


地球上のインターネットの基礎を作った「インターネットの父」が「惑星間インターネット」について語る ["Father of the Internet" who made the basis of the Internet on Earth talks about "Interplanetary Internet"]


< <https://gigazine.net/news/20201023-vint-cerfs-internet-in-space/> https://gigazine.net/news/20201023-vint-cerfs-internet-in-space/>






ENISA Threat Landscape 2020: Cyber Attacks Becoming More Sophisticated, Targeted, Widespread and Undetected

Threat landscape maps Malware standing strong as #1 Cyber Threat in the EU, with an increase in Phishing, Identity Theft, Ransomware; Monetisation holding its place as cyber criminals’ top motivation; and the COVID-19 environment fuelling attacks on homes, businesses, governments and critical infrastructure.

< <https://www.enisa.europa.eu/news/enisa-news/enisa-threat-landscape-2020> https://www.enisa.europa.eu/news/enisa-news/enisa-threat-landscape-2020>


EU Threat Landscape Report: Cyber attacks are becoming more sophisticated, targeted and widespread

The European Union Agency for Cybersecurity (ENISA) has published the yearly report summarising the main cyber threats encountered between 2019 and 2020.

< <https://ec.europa.eu/digital-single-market/en/news/eu-threat-landscape-report-cyber-attacks-are-becoming-more-sophisticated-targeted-and> https://ec.europa.eu/digital-single-market/en/news/eu-threat-landscape-report-cyber-attacks-are-becoming-more-sophisticated-targeted-and>


Rising to meet the INTERPOL Digital Security Challenge

Imagine that a well-known company has been hit by a cyberattack – criminals have conducted a business email compromise (BEC) scam against the company, compromising the email of the CEO to trick an employee into making a payment of USD 100 million to an account controlled by the criminals.

< <https://www.interpol.int/News-and-Events/News/2020/Rising-to-meet-the-INTERPOL-Digital-Security-Challenge> https://www.interpol.int/News-and-Events/News/2020/Rising-to-meet-the-INTERPOL-Digital-Security-Challenge>


The Cybersecurity Skills Gap Is Swelling at a Frightening Pace

By technology industry standards, the phrase “cybersecurity workforce development” has a promising ring, suggests cybersecurity skills can always be improved and might be expected to help attract qualified young cyber-workers interested in a bright future.

< <https://www.rsaconference.com/industry-topics/blog/the-cybersecurity-skills-gap-is-swelling-at-a-frightening-pace> https://www.rsaconference.com/industry-topics/blog/the-cybersecurity-skills-gap-is-swelling-at-a-frightening-pace>


BGP Security Efforts Aim to Protect Key Internet Protocol

Border Gateway Protocol (BGP) is a vital cog in the machinery that makes the internet work. But it's also the internet's soft underbelly that hackers can and do exploit to wreak havoc, intercept data, and steal money. Puny humans have been spectacularly bad at protecting this soft underbelly, but the good news is that robots can help us.

< <https://www.enterprisenetworkingplanet.com/datacenter/datacenter-blog/bgp-security-efforts-to-protect-key-internet-protocol.html> https://www.enterprisenetworkingplanet.com/datacenter/datacenter-blog/bgp-security-efforts-to-protect-key-internet-protocol.html>


How to upgrade to TLS 1.2 and why it’s crucial for Bitdefender Endpoint Security Tools functionality

Starting with November release, Bitdefender GravityZone Cloud will no longer support Transport Layer Security (TLS) 1.0 or 1.1 protocols due to known security vulnerabilities. In keeping with industry standards and best practices, Bitdefender will migrate to TLS 1.2 and disable all insecure ciphers for all agent communications with the console.

< <https://www.bitdefender.com/support/how-to-upgrade-to-tls-1-2-and-why-its-crucial-for-bitdefender-endpoint-security-tools-functionality-2627.html> https://www.bitdefender.com/support/how-to-upgrade-to-tls-1-2-and-why-its-crucial-for-bitdefender-endpoint-security-tools-functionality-2627.html>


GÉANT and Cyber Security Month with Security awareness at the Paul Scherrer Institute

The European data network for the research and education community GÉANT interconnects national research and education networks (NRENs) like SWITCH across Europe, enabling collaboration virtually and accelerate research, drive innovation and enrich education.

< <https://securityblog.switch.ch/2020/10/20/geant-and-cyber-security-month-with-security-awareness-at-the-paul-scherrer-institute/> https://securityblog.switch.ch/2020/10/20/geant-and-cyber-security-month-with-security-awareness-at-the-paul-scherrer-institute/>


U.S. Charges Russian Intelligence Officers in Major Cyberattacks

The Justice Department on Monday unsealed charges accusing six Russian military intelligence officers of an aggressive worldwide hacking campaign that caused mass disruption and cost billions of dollars by attacking targets like a French presidential election, the electricity grid in Ukraine and the opening ceremony of the 2018 Winter Olympics.

< <https://www.nytimes.com/2020/10/19/us/politics/russian-intelligence-cyberattacks.html> https://www.nytimes.com/2020/10/19/us/politics/russian-intelligence-cyberattacks.html>


Russia planned cyber-attack on Tokyo Olympics, says UK

Russian military intelligence services were planning a cyber-attack on the Japanese-hosted Olympics and Paralympics in Tokyo this summer in an attempt to disrupt the world’s premier sporting event, the UK National Cyber Security Centre has revealed, disclosing a joint operation with the US intelligence agencies.

< <https://www.theguardian.com/world/2020/oct/19/russia-planned-cyber-attack-on-tokyo-olympics-says-uk> https://www.theguardian.com/world/2020/oct/19/russia-planned-cyber-attack-on-tokyo-olympics-says-uk>


Russia's cyber-attack plan for Olympics part of a familiar pattern

In the aftermath of Moscow’s hacking of the 2016 US election, many analysts expected the GRU to be punished. After all, Russia’s powerful military spy agency had been caught red-handed. The FBI indicted several GRU hackers in humiliating fashion. The spies who stole Democratic party emails – tens and thousands of them – were named and shamed.

< <https://www.theguardian.com/world/2020/oct/19/russias-cyber-attack-plan-for-olympics-part-of-a-familiar-pattern> https://www.theguardian.com/world/2020/oct/19/russias-cyber-attack-plan-for-olympics-part-of-a-familiar-pattern>


State-Sponsored Hackers and Ransomware Gangs Are Diversifying Tactics to Inflict More Harm, According to Accenture Report

Some of the world’s most skilled nation-state cyber adversaries and notorious ransomware gangs are deploying an arsenal of new open-sourced tools, actively exploiting corporate email systems and using online extortion to scare victims into paying ransoms, according to the 2020 Cyber Threatscape Report from Accenture.

< <https://newsroom.accenture.com/news/state-sponsored-hackers-and-ransomware-gangs-are-diversifying-tactics-to-inflict-more-harm-according-to-accenture-report.htm> https://newsroom.accenture.com/news/state-sponsored-hackers-and-ransomware-gangs-are-diversifying-tactics-to-inflict-more-harm-according-to-accenture-report.htm>


Cybercriminals Step Up Their Game Ahead of U.S. Elections

Ahead of the November U.S. elections, cybercriminals are stepping up their offensive in both attacks against security infrastructure and disinformation campaigns – but this time, social media giants, the government and citizens are more prepared.

< <https://threatpost.com/cybercriminals-step-up-game-us-elections/160373/> https://threatpost.com/cybercriminals-step-up-game-us-elections/160373/>





No such thing as the internet

Six decades after the Advanced Research Projects Agency of America's Defence Department (ARPA) began funding research on time-sharing between computers, which led eventually to the revolutionary technology we call the internet, the time has come to drop the definite article. Just as the claim that politicians are merely following "the science" when it comes to the pandemic is an attempt to create the illusion of consensus, so talk of "the internet" now refers to a phantom. Today there is no such thing as the internet.

< <https://www.bbc.com/news/entertainment-arts-54514574> https://www.bbc.com/news/entertainment-arts-54514574>


To Boldly Go Where No Internet Protocol Has Gone Before

Space exploration is hard, not least because of how difficult it is to communicate. Astronauts need to talk to mission control, ideally by video communication, and space vehicles need to send back data they gather, preferably at high speed and with little delay as possible. At first, space missions designed and carried their own distinct communications systems; that worked well enough, but it wasn’t exactly a paragon of efficiency. Then one day in 1998, the internet pioneer Vinton Cerf imagined a network that could offer a richer capacity to serve the growing number of people and vehicles in space. The dream of an interplanetary internet was born.

< <https://www.quantamagazine.org/vint-cerfs-plan-for-building-an-internet-in-space-20201021/> https://www.quantamagazine.org/vint-cerfs-plan-for-building-an-internet-in-space-20201021/>


Early View Article - Internet Fragmentation, Political Structuring, and Organizational Concentration in Transnational Engineering Networks

Is the internet at risk of fragmentation? Whereas the literature has examined this question with a focus on domestic policies, communication standards, and internet governance institutions, we analyze fragmentation and alternative outcomes in transnational engineering networks. These networks constitute the social foundations of the unified or ‘global’ internet. Our contributions include: (1) broadening the debate beyond fragmentation‐related network outcomes to include political structuring and organizational concentration; and (2) new evidence from an important engineering network around the Internet Engineering Task Force comprising thousands of participants and over four decades. Our analyses reveal fast and continuous network growth as well as clear signs of growing concentration of the network around a few major companies. A key implication is that, at the level of engineering networks, concerns about internet fragmentation might be unfounded and might distract from more salient developments such as organizational concentration.

< <https://www.globalpolicyjournal.com/articles/science-and-technology/early-view-article-internet-fragmentation-political-structuring-and> https://www.globalpolicyjournal.com/articles/science-and-technology/early-view-article-internet-fragmentation-political-structuring-and>


Queueing analysis of DTN protocols in deep-space communications

Abstract: Delay/disruption tolerant networking (DTN) is proposed as an internetworking architecture for reliable data delivery despite a long propagation delay and/or lengthy link disruptions. DTN targets challenging networking environments where traditional networking protocols such as the terrestrial Transmission Control Protocol/Internet Protocol (TCP/IP) typically do not work effectively. The challenging problem of mission control and data delivery in space communications is a typical application scenario of the DTN technology.

< <https://ieeexplore.ieee.org/abstract/document/8650570> https://ieeexplore.ieee.org/abstract/document/8650570>


Talking on the moon: Nasa and Nokia to install 4G on lunar surface

With competition among Earth’s telecoms providers as fierce as ever, equipment maker Nokia has announced its expansion into a new market, winning a deal to install the first cellular network on the moon.

< <https://www.theguardian.com/science/2020/oct/20/talking-on-the-moon-nasa-and-nokia-to-install-4g-on-lunar-surface> https://www.theguardian.com/science/2020/oct/20/talking-on-the-moon-nasa-and-nokia-to-install-4g-on-lunar-surface>


Nokia selected by NASA to build first ever cellular network on the Moon

Nokia has announced further details after being named by NASA as a partner to advance “Tipping Point” technologies for the Moon, deploying the first LTE/4G communications system in space and helping pave the way towards sustainable human presence on the lunar surface.

< <https://www.nokia.com/about-us/news/releases/2020/10/19/nokia-selected-by-nasa-to-build-first-ever-cellular-network-on-the-moon/> https://www.nokia.com/about-us/news/releases/2020/10/19/nokia-selected-by-nasa-to-build-first-ever-cellular-network-on-the-moon/>


Developing global standards for radio-based telecommunications

Radiocommunication systems are fundamental to monitoring the climate and to helping countries mitigate and adapt to the effects of climate change, and to address its major challenges. Effective and prudent management of allocated frequency bands is therefore paramount to maintaining and enhancing the quality and accuracy of weather and weather-related predictions.

< <https://news.itu.int/developing-global-standards-radio-based-telecommunications/> https://news.itu.int/developing-global-standards-radio-based-telecommunications/>


OECD Global Blockchain Policy Forum 2020

The Global Blockchain Policy Forum is the leading international event focused on the policy implications of this technology and its applications, led by the OECD’s Blockchain Policy Centre. Following the second edition of the Forum in 2019, which was attended by more than 1 600 people, the third edition of the Global Blockchain Policy Forum in 2020 will convene government ministers and senior policy makers, industry leaders, academics and other stakeholders to:

< <http://www.oecd.org/finance/blockchain/oecd-blockchain-policy-forum.htm> http://www.oecd.org/finance/blockchain/oecd-blockchain-policy-forum.htm>


Book: Next-Generation Ethics: Engineering a Better Society

Many of the significant developments of our era have resulted from advances in technology, including the design of large-scale systems; advances in medicine, manufacturing, and artificial intelligence; the role of social media in influencing behaviour and toppling governments; and the surge of online transactions that are replacing human face-to-face interactions. These advances have given rise to new kinds of ethical concerns around the uses (and misuses) of technology. This collection of essays by prominent academics and technology leaders covers important ethical questions arising in modern industry, offering guidance on how to approach these dilemmas. Chapters discuss what we can learn from the ethical lapses of #MeToo, Volkswagen, and Cambridge Analytica, and highlight the common need across all applications for sound decision-making and understanding the implications for stakeholders. Technologists and general readers with no formal ethics training and specialists exploring technological applications to the field of ethics will benefit from this overview.

< <https://www.cambridge.org/us/academic/subjects/computer-science/computing-and-society/next-generation-ethics-engineering-better-society> https://www.cambridge.org/us/academic/subjects/computer-science/computing-and-society/next-generation-ethics-engineering-better-society>



David Goldstein

email:  <mailto:david@goldsteinreport.com> david@goldsteinreport.com

web:  <http://goldsteinreport.com/> http://goldsteinreport.com/

Twitter:  <https://twitter.com/goldsteinreport> https://twitter.com/goldsteinreport

phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home