[Newsclips] IETF SYN-ACK Newspack 2022-02-14

David Goldstein <david@goldsteinreport.com> Mon, 14 February 2022 09:14 UTC

Return-Path: <david@goldsteinreport.com>
X-Original-To: newsclips@ietfa.amsl.com
Delivered-To: newsclips@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 12E673A0CFB for <newsclips@ietfa.amsl.com>; Mon, 14 Feb 2022 01:14:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.789
X-Spam-Level:
X-Spam-Status: No, score=-6.789 tagged_above=-999 required=5 tests=[ACT_NOW_CAPS=0.1, BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e6UNNpcsrwYi for <newsclips@ietfa.amsl.com>; Mon, 14 Feb 2022 01:14:44 -0800 (PST)
Received: from karkinos.atomiclayer.com (karkinos.atomiclayer.com [96.125.178.142]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7354A3A0CFD for <newsclips@ietf.org>; Mon, 14 Feb 2022 01:14:40 -0800 (PST)
Received: from DGSurfaceBook (unknown [121.209.8.240]) by karkinos.atomiclayer.com (Postfix) with ESMTPSA id B00D82975E5 for <newsclips@ietf.org>; Mon, 14 Feb 2022 04:14:35 -0500 (EST)
Authentication-Results: karkinos.atomiclayer.com; spf=pass (sender IP is 121.209.8.240) smtp.mailfrom=david@goldsteinreport.com smtp.helo=DGSurfaceBook
Received-SPF: pass (karkinos.atomiclayer.com: connection is authenticated)
From: David Goldstein <david@goldsteinreport.com>
To: newsclips@ietf.org
Date: Mon, 14 Feb 2022 20:14:32 +1100
Message-ID: <008701d82183$49f9ce10$dded6a30$@goldsteinreport.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0088_01D821DF.7D6BF3C0"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: Adghg0O5SAbZ2+iYTuS6V55+xrQdxQ==
Content-Language: en-au
X-PPP-Message-ID: <20220214091437.3430639.67317@karkinos.atomiclayer.com>
X-PPP-Vhost: goldsteinreport.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/newsclips/eBmV2rVT4iitJj2xj0IunADSRPY>
Subject: [Newsclips] IETF SYN-ACK Newspack 2022-02-14
X-BeenThere: newsclips@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF News Clips <newsclips.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/newsclips>, <mailto:newsclips-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/newsclips/>
List-Post: <mailto:newsclips@ietf.org>
List-Help: <mailto:newsclips-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/newsclips>, <mailto:newsclips-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Feb 2022 09:14:52 -0000

The IETF SYN-ACK Newspack collects IETF-related items from a variety of news outlets and other online publications. They do not represent the views of the IETF and are not checked for factual accuracy.

 

 

**********************

IETF IN THE NEWS

**********************

About this canvassing of experts

This report shares the second of two sets of results emerging from a series of questions posed in the 13th “Future of the Internet” canvassing by Pew Research Center and Elon University’s Imagining the Internet Center. The first report covered expert responses to the question of whether online spaces can be improved by 2035. ... Among those invited were researchers, developers and business leaders from leading global organizations, including Oxford, Cambridge, MIT, Stanford and Carnegie Mellon universities; Google, Microsoft, Amazon, Facebook, Apple and Twitter; leaders active in the advancement of and innovation in global communications networks and technology policy, such as the IETF, ICANN, ISOC, ITU, Association of Internet Researchers (AoIR) and the OECD. Invitees were encouraged to share the survey link with others they believed would have an interest in participating, thus there may have been somewhat of a “snowball” effect as some invitees welcomed others to weigh in.

< <https://www.pewresearch.org/internet/2022/02/07/about-this-canvassing-of-experts-3/> https://www.pewresearch.org/internet/2022/02/07/about-this-canvassing-of-experts-3/>

 

Visions of the Internet in 2035

Asked to ‘imagine a better world online,’ experts hope for a ubiquitous – even immersive – digital environment that promotes fact-based knowledge, offers better defense of individuals’ rights, empowers diverse voices and provides tools for technology breakthroughs and collaborations to solve the world’s wicked problems

< <https://www.pewresearch.org/internet/2022/02/07/visions-of-the-internet-in-2035/> https://www.pewresearch.org/internet/2022/02/07/visions-of-the-internet-in-2035/>

 

Visions of the Internet in 2035

A new report by Imagining the Internet and Pew Research examines ways to improve digital platforms and build a better online world.

< <https://www.elon.edu/u/news/2022/02/07/visions-of-the-internet-in-2035/> https://www.elon.edu/u/news/2022/02/07/visions-of-the-internet-in-2035/>

 

The race to save the Internet from quantum hackers

In cybersecurity circles, they call it Q-day: the day when quantum computers will break the Internet. Almost everything we do online is made possible by the quiet, relentless hum of cryptographic algorithms. These are the systems that scramble data to protect our privacy, establish our identity and secure our payments. And they work well: even with the best supercomputers available today, breaking the codes that the online world currently runs on would be an almost hopeless task. ... More recently, the Internet has been transitioning away from RSA, which is vulnerable even to classical — as opposed to quantum — attacks. In 2018, the Internet Engineering Task Force (IETF), a consensus-based virtual organization that steers the adoption of security standards on a global scale, endorsed another public-key system to replace it. That system is called elliptic-curve cryptography, because its mathematics grew out of a branch of nineteenth-century geometry that studies objects called elliptic curves.

< <https://www.nature.com/articles/d41586-022-00339-5> https://www.nature.com/articles/d41586-022-00339-5>

 

RFC Editor Model (Version 3) out for community review

The Internet Architecture Board (IAB) is requesting comment on an update to the model for organizing the RFC Editor function. The RFC Editor comprises the set of functions that serve the Internet technical community in editing, publishing, and archiving RFCs. Discussion of changes to how the RFC Editor function is managed, staffed, and overseen have been part of the IAB RFC Editor Future Development (rfcefdp) program.

< <https://www.iab.org/2022/02/09/rfc-editor-model-version-3-out-for-community-review/> https://www.iab.org/2022/02/09/rfc-editor-model-version-3-out-for-community-review/>

 

Messaging Layer Security is coming of age: That’s good news for privacy lovers everywhere

Messaging Layer Security (MLS) has been in gestation for some eight years. A cryptographic key establishment protocol designed to ensure forward secrecy and post-compromise security in group chats, MLS was born over an informal discussion in a Berlin restaurant back in 2016 and grew into an IETF workgroup featuring members from Cisco, Facebook, Google, INRIA, Mozilla, Twitter, and the University of Oxford among others, along with founding member Wire – which has announced that its messenger platform cab now support voice and video calls for up to 100 people, fully end-to-end-encrypted, using MLS in a “first” for a federated environment.

< <https://thestack.technology/messaging-layer-security-is-coming-of-age/> https://thestack.technology/messaging-layer-security-is-coming-of-age/>

 

Google’s Topics API announcement—what does this mean for the industry?

It’s been six months since the IETF 111 when Google engineers first announced their vision of a new iteration of FLoC built from site topics. Now, we finally have more details, with Google Chrome revealing its new Topics API system. The high-level, technical overview released by Google explains that through using this system, each website’s hostname will be categorised from an overall list of 350 topics.

< <https://whatsnewinpublishing.com/googles-topics-api-announcement-what-does-this-mean-for-the-industry/> https://whatsnewinpublishing.com/googles-topics-api-announcement-what-does-this-mean-for-the-industry/>

 

IIESoc to launch a new round of IPv6 &IoT training, thanks to ISIF Asia grant

The India Internet Engineering Society (IIESoc) is set to expand a series of webinars that will support enterprises and organizations seeking to understand and implement IPv6 in the Asia Pacific. ... IIESoc is a non-profit working towards increasing the awareness, participation, and adoption of Internet Engineering Task Force (IETF) standards. IIESoc has anMoU with a US-based non-profit Industry Network Technology Council (INTC) working on a similar goal in the North American region.

< <https://theprint.in/ani-press-releases/iiesoc-to-launch-a-new-round-of-ipv6-iot-training-thanks-to-isif-asia-grant/828697/> https://theprint.in/ani-press-releases/iiesoc-to-launch-a-new-round-of-ipv6-iot-training-thanks-to-isif-asia-grant/828697/>

< <https://www.business-standard.com/content/press-releases-ani/iiesoc-to-launch-a-new-round-of-ipv6-iot-training-thanks-to-isif-asia-grant-122021200783_1.html> https://www.business-standard.com/content/press-releases-ani/iiesoc-to-launch-a-new-round-of-ipv6-iot-training-thanks-to-isif-asia-grant-122021200783_1.html>

 

4 alternatives to encryption backdoors, but no silver bullet

... The first step in solving this dilemma is defining end-to-end encryption, Mallory Knodel, CTO at the Center for Democracy and Technology (CDT), said. “What is end-to-end encryption is surprisingly not agreed upon. There is some agreement or some convergence around the use of end-to-end encrypted messaging, for example, the use of the Signal protocol. There’s an effort in the IETF to standardize something called the Messaging Layer Security protocol, which can be used in messaging, and in video and a variety of contexts.”

< <https://www.csoonline.com/article/3649198/alternatives-to-encryption-backdoors.html> https://www.csoonline.com/article/3649198/alternatives-to-encryption-backdoors.html>

 

Why Companies Must Act Now To Prepare For Post-Quantum Cryptography

... This is where the preparation is required and certificates, most particularly the long-lived trust anchors, will need to be updated. Key sizes for public-key algorithms will most certainly change. Organizations could discover it is not possible to change over all their infrastructure at once; in these instances, it is acceptable to implement a transition strategy. They also will have to decide on whether to migrate to PQC via hybrid and the traditional X.509 single-key certificate formats. There are pros and cons to both: Hybrid certificates contain a sequence of both traditional and PQC public keys and signatures. While there is no standard for these yet, there is an RFC standard currently progressing through the IETF, which should arrive before the new NIST PQC standards do.

< <https://www.forbes.com/sites/forbestechcouncil/2022/02/11/why-companies-must-act-now-to-prepare-for-post-quantum-cryptography/> https://www.forbes.com/sites/forbestechcouncil/2022/02/11/why-companies-must-act-now-to-prepare-for-post-quantum-cryptography/>

 

Everything You Need to Know About ORCA Token

In the crypto world, this is a day of firsts. Orca tokens have taken a wild trip as a result of a crucial announcement. ORCA has increased by nearly 45 percent in the last week, sparking strong speculation about Orca price forecasts and where this cryptocurrency may be headed. ... Since 2004, HOTP OATH has been developing OTP algorithms. The Hash-based Message Authentication Code OTP method — HOTP — was the first result of their efforts, and it was published as an IETF (Internet Engineering Task Force) project in 2005.

< <https://techstory.in/everything-you-need-to-know-about-orca-token/> https://techstory.in/everything-you-need-to-know-about-orca-token/>

 

Internet-Spezifikationen: IETF streitet um Fortentwicklung der DNS-Auflösung [Internet specifications: IETF argues about further development of DNS resolution]

Sollen verschlüsselnde DNS-Abfragen interne Belange ignorieren und nur öffentliche DNS befragen, oder die nur im internen Netz vorhandenen Domains über einen internen DNS-Resolver auflösen? Darüber sind sich die Experten der IETF uneins.

< <https://www.heise.de/news/Internet-Spezifikationen-IETF-streitet-um-Fortentwicklung-der-DNS-Aufloesung-6357826.html> https://www.heise.de/news/Internet-Spezifikationen-IETF-streitet-um-Fortentwicklung-der-DNS-Aufloesung-6357826.html>

 

Die IETF trifft sich im März in Wien zum 113. Mal [The IETF meets in Vienna for the 113th time in March]

Das 113. Treffen der IETF findet im März 2022 als Präsenzveranstaltung unter dem Titel »IETF 113 VIENNA« in Wien statt. Es ist seit ihrem 108. Treffen im Juli 2020 das erste Präsenztreffen der IETF.

< <https://domain-recht.de/domain-events/sonstige-events/event-die-internet-engineering-task-force-trifft-sich-im-maerz-in-wien-zum-113-mal-68268.html> https://domain-recht.de/domain-events/sonstige-events/event-die-internet-engineering-task-force-trifft-sich-im-maerz-in-wien-zum-113-mal-68268.html>

 

Donnerstag: Starlink-Satelliten im Sonnensturm, Uber erholt sich von Corona [Thursday: Starlink satellites in solar storm, Uber recovers from Corona]

... Sollen verschlüsselnde DNS-Abfragen interne Belange ignorieren und nur öffentliche Domain Name Server (DNS) befragen, oder die nur im internen Netz vorhandenen Domains über einen internen DNS-Resolver auflösen? Darüber sind sich die Experten der Internet Engineering Task Force (IETF) uneins. Verschlüsseltes DNS verbirgt Internet-Ziele der Nutzer vor neugierigen Augen. Zugleich schneidet es sie vom Intranet ab. Die IETF ringt um Lösungen und streitet um die Fortentwicklung der DNS-Auflösung.

< <https://www.heise.de/news/Donnerstag-Starlink-Satelliten-im-Sonnensturm-Uber-erholt-sich-von-Corona-6368225.html> https://www.heise.de/news/Donnerstag-Starlink-Satelliten-im-Sonnensturm-Uber-erholt-sich-von-Corona-6368225.html>

 

Schutz vor Quantenhackern [Protection against quantum hackers]

... In jüngster Zeit ist man vom RSA-Verfahren abgerückt, das inzwischen selbst für klassische Angriffe (also ohne Quantencomputer) anfällig ist. 2018 hat die auf Konsens basierende virtuelle Organisation »Internet Engineering Task Force« (IETF), welche die Annahme von Sicherheitsstandards auf globaler Ebene steuert, ein anderes Public-Key-System als Ersatz vorgeschlagen: die elliptische Kurven-Kryptografie. Sie basiert auf einem Zweig der Geometrie des 19. Jahrhunderts, der sich mit elliptischen Kurven beschäftigt.

< <https://www.spektrum.de/news/kryptografie-schutz-vor-quantenhackern/1986373> https://www.spektrum.de/news/kryptografie-schutz-vor-quantenhackern/1986373>

 

Post Quantum Cryptography sichert die Security-Zukunft [Post Quantum Cryptography Secures the Security Future]

... Die Standardisierung der PQC-Systeme ist ein wesentlicher Schritt zu einer sichereren, zuverlässigeren und weit verbreiteten PQC. Führende Institutionen wie das Europäische Institut für Telekommunikationsnormen (ETSI), die Internationale Fernmeldeorgansiation (ITU-T), IETF (Internet Engineering Task Force) und NIST haben bereits verschiedene Standardisierungsprozesse gestartet, deren Ergebnisse erst in einigen Jahren erwartet werden. NIST hat 2016 einen Aufruf zur Einreichung von Vorschlägen für Kryptosysteme veröffentlicht, die gegen Quantencomputer sicher sind. Die eingereichten Algorithmen werden bewertet und einige von ihnen sollen standardisiert werden. Es wurden 69 Vorschläge eingereicht. In der Zwischenzeit haben es sieben Finalisten und acht Alternativkandidaten in die dritte Auswahlrunde geschafft. ETSI hat ebenfalls mit der Forschung in diesem Bereich begonnen und einige vorläufige Veröffentlichungen publiziert. Auch die IETF hat bereits einen Standard für das Post-Quantum Hash-basierte Signaturverfahren XMSS bekannt gegeben und plant die baldige Veröffentlichung weiterer Standards.

< <https://www.all-electronics.de/automotive-transportation/mit-post-quantum-cryptography-schon-jetzt-die-security-zukunft-sichern-141.html> https://www.all-electronics.de/automotive-transportation/mit-post-quantum-cryptography-schon-jetzt-die-security-zukunft-sichern-141.html>

 

El Metaverso será posible gracias al IPv6 [The Metaverse will be possible thanks to IPv6]

... Para garantizar una transición transparente para los usuarios y que garantice un tiempo prudencial para que los fabricantes incorporen la nueva tecnología y los proveedores de Internet la implementen en sus propias redes, la organización encargada de la estandarización de los protocolos de Internet (IETF, Internet Engineering Task Force), diseñó junto con el mismo protocolo IPV6, una serie de mecanismos que se denominan de transición y coexistencia.

< <https://proceso.hn/el-metaverso-sera-posible-gracias-al-ipv6/> https://proceso.hn/el-metaverso-sera-posible-gracias-al-ipv6/>

 

**********************

SECURITY & PRIVACY

**********************

eco topDNS Initiative Fights DNS Abuse

The eco initiative topDNS wants to protect the DNS even better from abuse in the future. Leading companies in the industry – including VeriSign, CentralNic, Public Interest Registry, IQ Global AS, Leaseweb and Realtime Register – are among the first supporters of the initiative. They have joined forces under the umbrella of the eco Association to increase the security of the DNS. Their common goal is a stable and secure operation of the DNS, promoting existing activities to combat DNS abuse, and educating about which measures are effective and appropriate.

< <https://international.eco.de/presse/eco-topdns-initiative-fights-dns-abuse-2/> https://international.eco.de/presse/eco-topdns-initiative-fights-dns-abuse-2/>

 

Why Security Concerns Drive Customers Towards Public DNS Resolvers

The European Union Agency for Cybersecurity (ENISA) analyses the security pros and cons of using public DNS resolvers.

< <https://www.enisa.europa.eu/news/enisa-news/why-security-concerns-drive-customers-towards-public-dns-resolvers> https://www.enisa.europa.eu/news/enisa-news/why-security-concerns-drive-customers-towards-public-dns-resolvers>

 

Stopping DNS-based DDoS attacks in their tracks

Since its inception, the DNS has been susceptible to spoofing attacks. Despite many advances in DNS security and privacy, DDoS attacks can still use spoofed DNS queries for overwhelming their victim today.

< <https://blog.apnic.net/2022/02/10/stopping-dns-based-ddos-attacks-in-their-tracks/> https://blog.apnic.net/2022/02/10/stopping-dns-based-ddos-attacks-in-their-tracks/>

 

How the metaverse could shape cybersecurity in 2022

“Metaverse” is a much-hyped concept that is being mentioned more and more frequently in conversations regarding technology and development. Although the idea has recently gained popularity, it is not entirely new. It first made an appearance in Neal Stephenson’s science fiction novel Snow Crash and since then, there have been many versions of the metaverse, especially as the gaming industry caught on to it. These versions have nurtured the idea, as evident through games like Second Life, Eve Online, or even GTA and Red Dead Online.

< <https://venturebeat.com/2022/02/12/how-the-metaverse-could-shape-cybersecurity-in-2022/> https://venturebeat.com/2022/02/12/how-the-metaverse-could-shape-cybersecurity-in-2022/>

 

Thousands of domains hit by downtime after DNSSEC error

Sweden saw thousands of domains go down for hours on Friday, after DNSSEC errors were introduced to the .se zone file.

< <https://domainincite.com/27492-thousands-of-domains-hit-by-downtime-after-dnssec-error> https://domainincite.com/27492-thousands-of-domains-hit-by-downtime-after-dnssec-error>

 

eco topDNS Initiative Fights DNS Abuse

The eco initiative topDNS wants to protect the DNS even better from abuse in the future. Leading companies in the industry – including VeriSign, CentralNic, Public Interest Registry, IQ Global AS, Leaseweb and Realtime Register – are among the first supporters of the initiative. They have joined forces under the umbrella of the eco Association to increase the security of the DNS. Their common goal is a stable and secure operation of the DNS, promoting existing activities to combat DNS abuse, and educating about which measures are effective and appropriate.

< <https://international.eco.de/presse/eco-topdns-initiative-fights-dns-abuse-2/> https://international.eco.de/presse/eco-topdns-initiative-fights-dns-abuse-2/>

 

Verisign and PIR join new DNS abuse group

The domain name industry has just got its fourth (by my count) DNS abuse initiative, with plans for work on “trusted notifier” programs and Public Interest Registry and Verisign as members.

< <https://domainincite.com/27497-verisign-and-pir-join-new-dns-abuse-group> https://domainincite.com/27497-verisign-and-pir-join-new-dns-abuse-group>

 

DNSAI Newsletter February 2022

Today, February 8th, is ‘Safer Internet Day‘, which nicely reinforces the importance of our work, but also provides an opportunity to reflect. I am very excited to share how 2022 is shaping up, but before we look forward though, a brief look back:

< <https://dnsabuseinstitute.org/dnsai_newsletter_february_2022/> https://dnsabuseinstitute.org/dnsai_newsletter_february_2022/>

 

DDoS attacks hit a record high in Q4 2021

Compared to Q3 2021, the total number of DDoS attacks in Q4 shows an increase of 52%. This is 4.5 times more than the same time last year. These and other findings were published in the new Kaspersky DDoS attacks in Q4 2021 report.

< <https://www.kaspersky.com/about/press-releases/2022_ddos-attacks-hit-a-record-high-in-q4-2021> https://www.kaspersky.com/about/press-releases/2022_ddos-attacks-hit-a-record-high-in-q4-2021>

 

DDoS Attacks on a Tear in Q4 2021

Nearly half of all DDoS attacks in the fourth quarter of 2021 hit organizations in the US during an extremely active period for the disruptive attacks, new data shows.

< <https://www.darkreading.com/attacks-breaches/ddos-attacks-jumped-by-52-in-q4-2021> https://www.darkreading.com/attacks-breaches/ddos-attacks-jumped-by-52-in-q4-2021>

 

**********************

INTERNET OF THINGS

**********************

The Internet of Things will dominate applied Artificial Intelligence

New forecasts from Transforma Insights point at an explosion in the use of Artificial Intelligence for improving enterprise processes and critical systems. The devil is, as ever, in the detail, but the headline is that adoption of AI, measured in ‘instances’ is set to grow ten-fold in the next decade.

< <https://www.linkedin.com/pulse/internet-things-dominate-applied-artificial-matt-hatton> https://www.linkedin.com/pulse/internet-things-dominate-applied-artificial-matt-hatton>

 

A Survey Report on: Security & Challenges in Internet of Things

I. INTRODUCTION: The Internet of Things increasing preponderance of entities which is going to transform the real world objects into intelligent virtual and physical objects. In the era of present technology, the main aim of IoT is to unify everything in our real world under a common infrastructure and keeping us informed of the state of the things. IoT devices include personal computers, PDAs, laptops, watches, tablets, smart phones and other hand-held embedded devices.

< <https://www.linkedin.com/pulse/survey-report-security-challenges-internet-things-alikhani> https://www.linkedin.com/pulse/survey-report-security-challenges-internet-things-alikhani>

 

**********************

NEW TRANSPORT PROTOCOLS

**********************

Here’s why QUIC is still worrying mobile operators (Reader Forum)

Google’s QUIC made its debut a few years ago and it quickly became a headache for operators. Why? QUIC is an encryption-based protocol and many types of traffic become invisible. Operators struggled to deliver content and manage subscriber Quality of Experience (QoE).

< <https://www.rcrwireless.com/20220211/opinion/readerforum/heres-why-quic-is-still-worrying-mobile-operators-reader-forum> https://www.rcrwireless.com/20220211/opinion/readerforum/heres-why-quic-is-still-worrying-mobile-operators-reader-forum>

 

**********************

OTHERWISE NOTEWORTHY

**********************

us: Federal IPv6 Task Force preparing transition plan guidance

The Federal IPv6 Task Force will offer agencies tips on developing IPv6 transition plans in guidance set for release within the next month, said Chair Robert Sears, during a virtual conference Thursday.

< <https://www.fedscoop.com/task-force-ipv6-transition-guidance/> https://www.fedscoop.com/task-force-ipv6-transition-guidance/>

 

A renewed partnership for the future of European Standardisation

European standards are what makes the European Single Market possible. Even if they might be invisible, standards are all around us: from toys to cars, from our phones to our homes, standards make the products we use daily safer, trustworthy, and sustainable. Standards also ensure that everywhere in Europe, consumers have access to the same – high – levels of quality.

< <https://www.euractiv.com/section/digital/opinion/a-renewed-partnership-for-the-future-of-european-standardization/> https://www.euractiv.com/section/digital/opinion/a-renewed-partnership-for-the-future-of-european-standardization/>

 

ETSI launches new education programme for the next generation of ICT standards professionals

ICT standardization plays an important role for interoperability and innovation and its practice remains a topic that is not easily accessible. To try to remedy this situation and prepare the next generation of standards professionals, ETSI has developed comprehensive teaching materials on education about ICT standardization. With this programme ETSI leads ICT standardization education, bringing the expertise of its global membership from various sectors.

< <https://www.etsi.org/newsroom/press-releases/2026-2022-02-etsi-launches-new-education-programme-for-the-next-generation-of-ict-standards-professionals> https://www.etsi.org/newsroom/press-releases/2026-2022-02-etsi-launches-new-education-programme-for-the-next-generation-of-ict-standards-professionals>

 

DNS4EU

The last few decades have not been a story of unqualified success for European technology enterprises. The European industrial giants of the old telephone world have found it to be extraordinarily difficult to translate their former dominant positions in the telco world into the Internet world. To be brutally frank, none of the current generation of major players in the digital environment are European. The concern is that if today’s technology world equates to the previous world of far-flung colonial empires then relative national wealth and prosperity appear to be linked to the ability to master, or preferably dominate, critical aspects of the sector. And in this respect Europe appears to have been left behind.

< <https://www.potaroo.net/ispcol/2022-02/dns4eu.html> https://www.potaroo.net/ispcol/2022-02/dns4eu.html>

 

Beyond 5G: what would 6G look like — and do we need it?

In 2019, engineers from telecommunication companies around the world sat in a large conference hall in Geneva, trying to conceptualise how people will live and communicate in a decade’s time.

< <https://www.ft.com/content/74699854-3590-4245-a052-487bdda33a07> https://www.ft.com/content/74699854-3590-4245-a052-487bdda33a07>

 

mimik Executive Chairman Siavash Alamouti Awarded Prestigious 2022 Marconi Prize [news release]

mimik Technology, Inc., a pioneer in hybrid edge cloud technology and business solutions, today announced that Siavash Alamouti, Co-Founder and Executive Chairman of the Board and former President and CEO of mimik, has been awarded the prestigious 2022 Marconi Prize in recognition of his contribution to global wireless device accessibility. The outspoken innovator, who is most well known as the inventor of the Alamouti Code, has dedicated his career to developing and promoting technologies that enhance people’s lives. His namesake invention underpins modern wireless technology standards and can be found in billions of devices around the world.

< <https://mimik.com/mimik-executive-chairman-siavash-alamouti-awarded-prestigious-2022-marconi-prize/> https://mimik.com/mimik-executive-chairman-siavash-alamouti-awarded-prestigious-2022-marconi-prize/>

 

BIRD Journey to Threads. Chapter 3: Parallel execution and message passing.

Parallel execution in BIRD uses an underlying mechanism of dedicated IO loops and hierarchical locks. The original event scheduling module has been converted to do message passing in multithreaded environment. These mechanisms are crucial for understanding what happens inside BIRD and how its internal API changes.

< <https://en.blog.nic.cz/2022/02/09/bird-journey-to-threads-chapter-3-parallel-execution-and-message-passing/> https://en.blog.nic.cz/2022/02/09/bird-journey-to-threads-chapter-3-parallel-execution-and-message-passing/>

------

David Goldstein

email:  <mailto:david@goldsteinreport.com> david@goldsteinreport.com

web:  <http://goldsteinreport.com/> http://goldsteinreport.com/

Twitter:  <https://twitter.com/goldsteinreport> https://twitter.com/goldsteinreport

phone: +61 418 228 605 - mobile; +61 2 9663 3430 - office/home