[Newsclips] IETF SYN-ACK Newspack 2021-07-19

David Goldstein <david@goldsteinreport.com> Mon, 19 July 2021 13:36 UTC

Return-Path: <david@goldsteinreport.com>
X-Original-To: newsclips@ietfa.amsl.com
Delivered-To: newsclips@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6C05A3A33EE for <newsclips@ietfa.amsl.com>; Mon, 19 Jul 2021 06:36:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.288
X-Spam-Level:
X-Spam-Status: No, score=-1.288 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001, URIBL_SBL=0.5, URIBL_SBL_A=0.1] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S1RvMXKcEBHM for <newsclips@ietfa.amsl.com>; Mon, 19 Jul 2021 06:36:02 -0700 (PDT)
Received: from karkinos.atomiclayer.com (karkinos.atomiclayer.com [96.125.178.142]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 735333A33ED for <newsclips@ietf.org>; Mon, 19 Jul 2021 06:36:02 -0700 (PDT)
Received: from DavidDesktop2019 (unknown [1.123.139.73]) by karkinos.atomiclayer.com (Postfix) with ESMTPSA id D6A36280814 for <newsclips@ietf.org>; Mon, 19 Jul 2021 09:35:57 -0400 (EDT)
Authentication-Results: karkinos.atomiclayer.com; spf=pass (sender IP is 1.123.139.73) smtp.mailfrom=david@goldsteinreport.com smtp.helo=DavidDesktop2019
Received-SPF: pass (karkinos.atomiclayer.com: connection is authenticated)
From: David Goldstein <david@goldsteinreport.com>
To: newsclips@ietf.org
Date: Mon, 19 Jul 2021 23:35:55 +1000
Organization: Goldstein Report
Message-ID: <012d01d77ca3$0355b120$0a011360$@goldsteinreport.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_012E_01D77CF6.D5040B10"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: Add8ovvRz8y5pI1oQoiMWmkTv4LKBw==
Content-Language: en-au
X-PPP-Message-ID: <20210719133559.2765995.40658@karkinos.atomiclayer.com>
X-PPP-Vhost: goldsteinreport.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/newsclips/TxebSbhbdKDP9_7XpmQlDYIdYyY>
Subject: [Newsclips] IETF SYN-ACK Newspack 2021-07-19
X-BeenThere: newsclips@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF News Clips <newsclips.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/newsclips>, <mailto:newsclips-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/newsclips/>
List-Post: <mailto:newsclips@ietf.org>
List-Help: <mailto:newsclips-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/newsclips>, <mailto:newsclips-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Jul 2021 13:36:09 -0000

The IETF SYN-ACK Newspack collects IETF-related items from a variety of news outlets and other online publications. They do not represent the views of the IETF and are not checked for factual accuracy.

 

**********************

IETF IN THE NEWS

**********************

Call for volunteers or nominations for the IETF Delegate to the ICANN 2022 Nominating Committee

The IAB (on behalf of the IETF) has been asked to supply a member to the 2022 ICANN Nominating Committee (NomCom). Peter Koch has filled this role for the IETF community for the past two years and cannot seek another term due to term limits; the IAB thanks him for his service. The IAB would therefore like to ask the community for volunteers to serve on the ICANN NomCom. The IAB will appoint one person for a one-year term (renewable for one additional one-year term).

< <https://www.iab.org/2021/07/12/call-for-volunteers-or-nominations-for-the-ietf-delegate-to-the-icann-2022-nominating-committee/> https://www.iab.org/2021/07/12/call-for-volunteers-or-nominations-for-the-ietf-delegate-to-the-icann-2022-nominating-committee/>

 

RPKI ReadTheDocs

Looking at the Resource Public Key Infrastructure (RPKI) landscape today, it is vastly different from two to three years ago. At the time, resource holders around the world had created a considerable amount of Route Origin Authorization (ROAs), but actually using RPKI data to perform Route Origin Validation (ROV) was only done by a handful of networks. As the interest in RPKI was ramping up in leaps and bounds, I noticed during meetings and online conversations there were a lot of misconceptions about what RPKI can and cannot do. The more than 40 Requests For Comment (RFCs) that describe RPKI aren’t always helpful in this regard, as they will just give you the idea that it’s an X.509 PKI in which certificates and other signed objects that make use of Cryptographic Message Syntax (CMS) using an ASN.1 profile are published, without even mentioning it’s for routing security. This is to be expected of an IETF document of course, as the RFCs naturally focus on intricate details of the syntax and encoding of data needed by implementers.

< <https://blog.apnic.net/2021/07/13/readthedocs/> https://blog.apnic.net/2021/07/13/readthedocs/>

 

ZTE's BIERin6 multicast solution approved by IETF

ZTE Corporation (0763.HK / 000063.SZ), a major international provider of telecommunications, enterprise and consumer technology solutions for the mobile internet, today announced that the BIERin6 (BIER in IPv6 Networks) multicast solution led by ZTE has been approved as Proposed Standard by the IETF.

< <https://www.zte.com.cn/global/about/news/20210714e1.html> https://www.zte.com.cn/global/about/news/20210714e1.html>

 

ZTE’s BIERin6 multicast approved by IEFT

ZTE Corporation announced that the BIERin6 (BIER in IPv6 Networks) multicast solution led by ZTE has been approved as Proposed Standard by the IETF.

< <https://www.retailnews.asia/ztes-bierin6-multicast-approved-by-ieft/> https://www.retailnews.asia/ztes-bierin6-multicast-approved-by-ieft/>

 

Massive IoT Interop Fuels Protocol Battle

... While it may have been easy conceptually to rally around an IP-based network, there were still many concerns that needed to be addressed in order for things to operate smoothly on a large scale. “802 15.4g is the underlying radio technology,” said Beecher. “And then we took a number of IPv6-type standards from the IETF, including the routing layer and security standards, and we integrated all of them into a single specification.”

< <https://semiengineering.com/massive-iot-interop-fuels-protocol-battle/> https://semiengineering.com/massive-iot-interop-fuels-protocol-battle/>

 

Poor Connector and Cable Choices Cause Failures. Here's how to Avoid That Fate

... An essential part of any hardware and software standards activity is the demonstration, testing, and verification of critical portions of the specification. Examples of such demonstration activities include the telecom community’s IETF Hackathon and the BBF Interoperability PlugFest, among many others. Without ways to test software security or physically test interoperability between hardware, engineers and product vendors won’t be sure if the new or updated standard specifications will work.

< <https://www.designnews.com/electronics/poor-connector-and-cable-choices-cause-failures-heres-how-avoid-fate> https://www.designnews.com/electronics/poor-connector-and-cable-choices-cause-failures-heres-how-avoid-fate>

 

With colorful logos against phishing: Gmail receives BIMI

... No changes are necessary on the user side. BIMI saw the light of day a long time ago and should also become a standard of the IETF – but failed with this project in 2019 because the approach is only worthwhile for large companies and there were also fears that users would be tracked via the graphics.

< <https://marketresearchtelecast.com/with-colorful-logos-against-phishing-gmail-receives-bimi/102114/> https://marketresearchtelecast.com/with-colorful-logos-against-phishing-gmail-receives-bimi/102114/>

 

Open Caching: Erholung für überlastete Netze [Open Caching: Recovery for Congested Networks]

... Zwar arbeitet die IETF an einheitlichen Spezifikationen für die Verknüpfung von CDNs, ihr Ansatz ist allerdings sehr breit angelegt und für einige Einsatzbereiche wie Videostreaming nicht besonders gut geeignet. Die Streaming Video Alliance (SVA), in der sich Content-Provider, ISPs, Cloud-Spezialisten, CDN-Betreiber und Software-Anbieter zusammengeschlossen haben, entwickelt deshalb in ihrer Open Caching Working Group eigene Spezifikationen für die standardisierte Verbindung von CDNs für das Streaming von Videos.

< <https://www.film-tv-video.de/technology/2021/07/13/open-caching-erholung-fuer-ueberlastete-netze/> https://www.film-tv-video.de/technology/2021/07/13/open-caching-erholung-fuer-ueberlastete-netze/>

 

Mit bunten Logos gegens Phishing: Gmail erhält BIMI

... Auf Nutzerseite sind keine Änderungen notwendig. BIMI erblickte schon vor längerer Zeit das Licht der Welt und sollte auch schon ein Standard der IETF werden – scheiterte mit diesem Vorhaben 2019 jedoch, weil sich der Ansatz ausschließlich für große Unternehmen lohnt und außerdem ein Tracking der Nutzer über die Grafik befürchtet wurde.

< <https://www.heise.de/news/Mit-bunten-Logos-gegens-Phishing-Gmail-erhaelt-BIMI-6136372.html> https://www.heise.de/news/Mit-bunten-Logos-gegens-Phishing-Gmail-erhaelt-BIMI-6136372.html>

 

Missing Link: Vom RIPE-Architekten zum Protokollkrieger (Daniel Karrenberg) [Missing Link: From RIPE Architect to Protocol Warrior (Daniel Karrenberg)]

... heise online: Würden heute andere Protokolle herauskommen? Daniel Karrenberg: Was ich heute anders machen würde, ich hätte in der IETF und an anderen Stellen, wo ich ein bisschen Einfluss hatte, viel mehr auf Sicherheit drängen müssen. Das sagen heute alle. Das Problem ist aber, wenn du etwas Neues ausrollen willst, darfst du es nicht schwierig machen – weder für die Anwender, noch für die Hardware.

< <https://www.heise.de/hintergrund/Missing-Link-Opa-erzaehl-nicht-wieder-vom-Protokollkrieg-Daniel-Karrenberg-6133539.html?seite=2> https://www.heise.de/hintergrund/Missing-Link-Opa-erzaehl-nicht-wieder-vom-Protokollkrieg-Daniel-Karrenberg-6133539.html?seite=2>

 

Pone las reglas en internet, y, aun así, para muchas personas es una auténtica desconocida: qué es IETF y por qué es tan influyente [It sets the rules on the internet, and yet for many people it's a real unknown: what is IETF and why it's so influential]

Internet es una de las creaciones más rupturistas del ser humano. Su enorme utilidad, su amplísimo alcance y el profundo impacto que tiene en nuestras vidas han cambiado irreversiblemente no solo cómo nos relacionamos entre nosotros; también cómo nos relacionamos con el mundo.

< <https://www.xataka.com/investigacion/pone-reglas-internet-asi-para-muchas-personas-autentica-desconocida-que-ietf-que-influyente> https://www.xataka.com/investigacion/pone-reglas-internet-asi-para-muchas-personas-autentica-desconocida-que-ietf-que-influyente>

 

¿Quién es el dueño de Internet? [Who owns the Internet?]

... También existe la Asociación de Números Asignados de Internet (IANA), el Grupo de Trabajo de Ingeniería de Internet (IETF), la Junta de Arquitectura de Internet (IAB), el Grupo de Trabajo de Investigación de Internet (IRTF) y la Asociación de Estándares de IEEE. Cada una de estas organizaciones juega un papel en la regulación de Internet en forma de estándares de desarrollo, supervisando directamente roles cruciales o manteniendo bases de datos que son fundamentales para el funcionamiento continuo de Internet.

< <https://www.periodismo.com/2021/07/12/quien-es-el-dueno-de-internet/> https://www.periodismo.com/2021/07/12/quien-es-el-dueno-de-internet/>

 

Hologram, la rete per l’IoT Cellular Connectivity [Hologram, the network for IoT Cellular Connectivity]

... Come osservato: “I tag RFID hanno rappresentato uno dei primi esempi in tale ambito. Tuttavia, nel tempo sono emerse nuove tecnologie in grado di rendere più efficiente la comunicazione tra gli oggetti. Tra esse spicca lo standard IEEE 802.15.4 e, soprattutto, il suo recente emendamento IEEE 802.15.4e, in grado di incrementare notevolmente l’affidabilità dei collegamenti a radio frequenza e l’efficienza energetica, grazie all’adozione del meccanismo di accesso al mezzo Time Slotted Channel Hopping. Queste tecnologie di più basso livello, quando integrate in architetture protocollari basate sul protocollo IP, possono dar concretamente vita alla visione dell’Internet delle cose, essendo in grado di dialogare con i nodi della rete Internet. In tal senso, è importante menzionare i protocolli IETF 6LoWPAN, RPL, e CoAP, in grado di creare operativamente una rete IP di oggetti che può dialogare con la rete Internet per creare nuovi servizi in molteplici domini applicativi”.

< <https://www.internet4things.it/iot-library/hologram-la-rete-per-liot-cellular-connectivity/> https://www.internet4things.it/iot-library/hologram-la-rete-per-liot-cellular-connectivity/>

 

IPv6部署应用提速 相关概念迎发展机遇(附股) [IPv6 deployment and application speed up related concepts welcome development opportunities (with stock)]

... IPv6是互联网工程任务组(IETF)设计的用于替代IPv4的下一代IP协议,其地址数量号称可以为全世界的每一粒沙子编上一个地址。据了解,由于IPv4最大的问题在于网络地址资源不足,严重制约了互联网的应用和发展。IPv6的使用,不仅能解决网络地址资源数量的问题,而且也解决了多种接入设备连入互联网的障碍。目前,我国网络基础设施方面已全部支持IPv6,应用基础设施方面也初步具备全国全网IPv6的支持服务能力。

< <http://stock.jrj.com.cn/2021/07/12074533080739.shtml> http://stock.jrj.com.cn/2021/07/12074533080739.shtml>

 

**********************

SECURITY & PRIVACY

**********************

us: CIS Podcast: Cybersecurity Where You Are Ep.11

Zero trust is an important information security architectural shift. Cyber breaches have increased in intensity, frequency and most alarmingly, impact, causing many organizations to try to figure out how to manage continuous cyber threats, while still communicating and maintaining trust to their stakeholders. Attestation can provide system-level remediation and resiliency, while ensuring transparency of compliance with industry security controls and benchmarks.

< <https://www.cisecurity.org/blog/cis-podcast-cybersecurity-where-you-are-ep-11/> https://www.cisecurity.org/blog/cis-podcast-cybersecurity-where-you-are-ep-11/>

 

How African states can tackle state-backed cyber threats

At first glance, the ability of most African states to prevent or respond to a cyberattack by state-backed hackers would appear limited. African countries tend to have low levels of cyber maturity and possess limited offensive and defensive cyber capabilities. Virtually all rely on foreign actors to supply critical information infrastructure and manage data using cloud technologies.

< <https://www.brookings.edu/techstream/how-african-states-can-tackle-state-backed-cyber-threats/> https://www.brookings.edu/techstream/how-african-states-can-tackle-state-backed-cyber-threats/>

 

**********************

INTERNET OF THINGS

**********************

5G and the future of the internet: 5G isn't just for streaming Netflix without buffering – it could change the way we interact with tech and the world around us.

5G is here, and it has the potential to transform the tech around us in profound ways. There’s the obvious stuff: responsive online gaming wherever you are, speedy downloads on the go and ultra-high-definition streaming straight your phone. But it’s the slightly less obvious stuff that’s really exciting…

< <https://www.sciencefocus.com/advertisement-feature/5g-and-the-future-of-the-internet/> https://www.sciencefocus.com/advertisement-feature/5g-and-the-future-of-the-internet/>

 

Internet of Things devices major source of security compromise - report

Internet of Things devices are a major source of security compromise, according to a new study from Zscaler. The cloud security provider released its IoT in the Enterprise: Empty Office Edition, which analysed over 575 million device transactions and 300,000 IoT-specific malware attacks blocked by Zscaler over the course of two weeks in December 2020. It found a 700% increase when compared to pre-pandemic findings.

< <https://itbrief.com.au/story/internet-of-things-devices-major-source-of-security-compromise-report> https://itbrief.com.au/story/internet-of-things-devices-major-source-of-security-compromise-report>

 

Zscaler Study Confirms IoT Devices A Major Source of Security Compromise, Reinforces Need for Zero Trust Security

Zscaler, Inc. ... released a new study examining the state of IoT devices left on corporate networks during a time when businesses were forced to move to a remote working environment. The new report, “IoT in the Enterprise: Empty Office Edition,” analyzed over 575 million device transactions and 300,000 IoT-specific malware attacks blocked by Zscaler over the course of two weeks in December 2020 – a 700% increase when compared to pre-pandemic findings.

< <https://www.zscaler.com/press/zscaler-study-confirms-iot-devices-major-source-security-compromise-reinforces-need-zero> https://www.zscaler.com/press/zscaler-study-confirms-iot-devices-major-source-security-compromise-reinforces-need-zero>

 

The Internet of Things is a Complete Mess (and how to Fix it)

I've spent more time IoT'ing my house over the last year than any sane person ever should. But hey, it's been strange times for all of us and it's kept me entertained whilst no longer travelling. Plus, it's definitely added to our lives in terms of the things it enables us to do; see them in part 5 of my IoT unravelled blog series. But it also remains a complete mess and I want to demonstrate why based on some recent experiences:

< <https://www.troyhunt.com/the-internet-of-things-is-a-complete-mess-and-how-to-fix-it/> https://www.troyhunt.com/the-internet-of-things-is-a-complete-mess-and-how-to-fix-it/>

 

As cities fill tech gaps, power of smart cities unleashes, report finds

Governing Smart Cities, a report released today by the World Economic Forum, provides a benchmark for the ethical and responsible use of smart city technologies by looking into the inner workings of 36 Pioneer Cities. The authors of the report seek to help city leaders identify gaps, protect long-term interests and keep up with the pace of technology.

< <https://www.weforum.org/press/2021/07/as-cities-fill-tech-gaps-power-of-smart-cities-unleashes-report-finds-779b925a12> https://www.weforum.org/press/2021/07/as-cities-fill-tech-gaps-power-of-smart-cities-unleashes-report-finds-779b925a12>

 

Autonomous vehicles as a “killer app” for AI

Artificial intelligence (AI) is used in a wide variety of products and services, including maps embedded on our smart phones and “chat bots” that help answer our questions on websites. Many hope that AI will transform our economy in ways that drive growth, similar to how steam engines did in the late 19th century and electricity did in the early 20th century. But it is hard to imagine that maps on smart phones, chatbots, and other existing AI-enabled services will drive the type of economic growth we saw from stream and electricity. What we need to see are some dramatic new AI-enabled products and services that transform our way of life—in short, we are waiting for an AI “killer app.”

< <https://www.brookings.edu/research/autonomous-vehicles-as-a-killer-app-for-ai/> https://www.brookings.edu/research/autonomous-vehicles-as-a-killer-app-for-ai/>

 

au: Canberra proposes IoT 'star' ratings and mandatory cyber standards for big business

The federal government wants to strengthen Australia's cybersecurity regulations and has suggested seven areas for policy reform, including the introduction of mandatory governance standards for larger businesses, a code for how personal information is handled, and a system for regulating smart devices.

< <https://www.zdnet.com/article/canberra-proposes-iot-star-ratings-and-mandatory-cyber-standards-for-big-business/> https://www.zdnet.com/article/canberra-proposes-iot-star-ratings-and-mandatory-cyber-standards-for-big-business/>

 

**********************

NEW TRANSPORT PROTOCOLS

**********************

Langsames WLAN? Diese kostenlose Software findet die Ursache [Slow Wi-Fi? This free software finds the cause]

... Das Tool hat vor einiger Zeit auch einen neuen Installer, einen aufpolierten Dark Mode sowie unter macOS Auto-Updates spendiert gekriegt. Per [STRG] + [C] können Windows-Nutzer mehrere Pakete gleichzeitig auswählen und exportieren. Außerdem gibt es eine breitere Protokoll-Unterstützung, mit dabei sind jetzt unter anderem QUIC und HTTP/2. Vorgefertigte Profile lassen sich aus Zip-Dateien importieren und das Anlegen von Filtern klappt jetzt auch per Drag-and-Drop.

< <https://www.chip.de/news/Langsames-WLAN-Gratis-Tool-findet-jede-Ursache_163067735.html> https://www.chip.de/news/Langsames-WLAN-Gratis-Tool-findet-jede-Ursache_163067735.html>

 

**********************

OTHERWISE NOTEWORTHY

**********************

Standards Take Online Gaming to the Next Level: Guidelines are in the works for e-sports and cloud gaming

It’s no surprise that with people staying home more because of the COVID-19 pandemic, the global online gaming market, including e-sports and cloud gaming, has grown by record amounts. The industry grew nearly 22 percent last year and generated more than US $21 billion in revenue, according to Statista. The consumer data company estimates there are currently 981 million online gamers and forecasts that number to surpass 1 billion by next year.

< <https://spectrum.ieee.org/the-institute/ieee-products-services/standards-take-online-gaming-to-the-next-level> https://spectrum.ieee.org/the-institute/ieee-products-services/standards-take-online-gaming-to-the-next-level>

 

RPKI invalids are not going away

Over the last couple of years, there has been great progress in terms of RPKI ROA adoption by network operators across the world. While analyzing the BGP prefixes of nine South Asian economies (AF, BD, BT, IN, LK, MM, MV, NP and PK), notable growth of RPKI valid BGP prefixes can be observed in recent years.

< <https://blog.apnic.net/2021/07/16/rpki-invalids-are-not-going-away/> https://blog.apnic.net/2021/07/16/rpki-invalids-are-not-going-away/>

 

Does training impact RPKI usage?

APNIC conducts a lot of Resource Public Key Infrastructure (RPKI) training. It’s a pretty important part of our mission to provide a global, open, stable, and secure Internet, with an emphasis here on the ‘secure’.

< <https://blog.apnic.net/2021/07/14/does-training-impact-rpki-usage/> https://blog.apnic.net/2021/07/14/does-training-impact-rpki-usage/>

 

Data transmission speed record clocks blistering 319 Terabits per second

The world record for fastest internet speed has been utterly shattered as Japanese engineers have demonstrated a data transmission rate of 319 Terabits per second (Tb/s) through optical fibers. The record was set over more than 3,000 km (1,864 miles) of fibers, and is apparently compatible with existing cable infrastructure.

< <https://newatlas.com/telecommunications/data-transmission-speed-record-319-terabits-second/> https://newatlas.com/telecommunications/data-transmission-speed-record-319-terabits-second/>

 

Japan Transfers 319 Terabits Per Second, Setting Internet Speed Record

Researchers at Japan’s National Institute of Information and Communications Technology (NICT) have broken the internet speed record with a stunning 319 terabits per second. That’s double the previous record of 178 Tb/s set a year ago by engineers in Japan and the U.K.

< <https://www.vice.com/en/article/bvz5kd/japan-transfers-319-terabits-per-second-setting-internet-speed-record> https://www.vice.com/en/article/bvz5kd/japan-transfers-319-terabits-per-second-setting-internet-speed-record>

 

Demonstration of World Record: 319 Tb/s Transmission over 3,001 km with 4-core optical fiber

Researchers from the National Institute of Information and Communications Technology (NICT, President: TOKUDA Hideyuki, Ph.D.), Network Research Institute, succeeded the first S, C and L-bands transmission over long-haul distances in a 4-core optical fiber with standard outer diameter (0.125 mm). The researchers, lead by Benjamin J. Puttnam, constructed a transmission system that makes full use of wavelength division multiplexing technology by combining different amplifier technologies, to achieve a transmission demonstration with date-rate of 319 terabits per second, over a distance of 3,001 km.

< <https://www.nict.go.jp/en/press/2021/07/12-1.html> https://www.nict.go.jp/en/press/2021/07/12-1.html>

 

Should Europe mandate IPv6 to accelerate adoption? by Marco Hogewoning, Manager of Public Policy and Internet Governance, RIPE NCC

June marked the 9th anniversary of “IPv6 Launch Day”, a global effort on 6th June 2012 in which leading Internet companies and access providers, including Google and Facebook, switched on IPv6 for their services. The idea was not only to lead by example, but also to make clear the migration to IPv6 was feasible and had limited risks to the stability of the networks and services that make up the Internet.

< <https://www.itproportal.com/features/should-europe-mandate-ipv6-to-accelerate-adoption/> https://www.itproportal.com/features/should-europe-mandate-ipv6-to-accelerate-adoption/>

 

ITU Telecom celebrates its 50th anniversary

World TELECOM 71, as it was called, launched a regular series of key global gatherings of the ITU family. Governments, industry, academia and international organizations came together to trade insights, showcase and share technological innovations, exchange knowledge – and work together to ensure everyone, everywhere could benefit from technology’s enormous potential.

< <https://www.itu.int/en/myitu/News/2021/07/14/09/31/ITU-Telecom-celebrates-its-50th-anniversary> https://www.itu.int/en/myitu/News/2021/07/14/09/31/ITU-Telecom-celebrates-its-50th-anniversary>

------

David Goldstein

email:  <mailto:david@goldsteinreport.com> david@goldsteinreport.com

web:  <http://goldsteinreport.com/> http://goldsteinreport.com/

Twitter:  <https://twitter.com/goldsteinreport> https://twitter.com/goldsteinreport

phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home