ARIN 34 IANA Stewardship Transition Planning Process Session by John Curran. Presentation at: https://www.arin.net/participate/meetings/reports/ARIN_34/ppm.html
Presentations on the Local Waste Service Standards Project - objectives, the project roadmap, deliverables, building the case for business standards, and next steps. Presented by Linda O'Halloran, Product Owner for the Waste Service Standards Project at the Local Digital Waste Standards Future Planning Roundtable held on 13 January 2016.
Presentations on the Local Waste Service Standards Project - objectives, the project roadmap, deliverables, building the case for business standards, and next steps. Presented by Linda O'Halloran, Product Owner for the Waste Service Standards Project at the Local Digital Waste Standards Future Planning Roundtable held on 13 January 2016.
Presentation given by Paul Wilson, Director General APNIC, at the 25th Latin America and Caribbean Network Information Centre Meeting, in Havana, Cuba, 2 to 6 May 2016
APNIC Director General Paul Wilson gives an update on APNIC's activities and new service initiatives at AIS 2018, held alongside AFRINIC 28 in Dakar, Senegal, from 29 April to 11 May 2018.
Presentation given by Paul Wilson, Director General APNIC, at the 25th Latin America and Caribbean Network Information Centre Meeting, in Havana, Cuba, 2 to 6 May 2016
APNIC Director General Paul Wilson gives an update on APNIC's activities and new service initiatives at AIS 2018, held alongside AFRINIC 28 in Dakar, Senegal, from 29 April to 11 May 2018.
Introduction to IANA Stewardship Transition SessionAPNIC
Introduction to IANA Stewardship Transition Session, by Craig Ng.
A presentation given at APRICOT 2016’s IANA Stewardship Transition session on 22 February 2016.
To reach another person on the Internet you have to type an address into your computer - a name or a number. That address has to be unique so computers know where to find each other. ICANN coordinates these unique identifiers across the world. Without that coordination we wouldn't have one global Internet. Why is ICANN important? What is its mission?
Learn more about ICANN operations here: http://www.icann.org/en/about
Just what does it mean to be the IANA functions operator? An approachable session aimed at outlining the scope of the role and busting a few of the myths circulating in the community. We’ll explain the types of requests the IANA department processes and the procedures used to fulfill them.
Karen Rose, ISOC The IANA FUnctions and Stewardship TransitionGlenn McKnight
Session 2: ICANN Accountability and the Transition of IANA Stewardship
This session will examine the work that is currently being done to make ICANN more accountable to its stakeholders and to transition the IANA function stewardship away from the US National Telecommunications and Information Administration (“NTIA”) and why these issues matter to everyone. The session will start with a description of the structure and functions performed by ICANN, including the IANA function. The role of ICANN in the Internet multi-stakeholder governance model will be discussed, and the involvement of governments in Internet governance will be addressed. This background will then be used as the launching point for a discussion of how the evolution of ICANN and the transition of the IANA function can affect the openness, security, stability and resiliency of the Internet.
18 September 2017 - At ION Malta, Adam Peake discusses the IANA transition:
The IANA transition was successfully completed in October 2016 creating strengthened relationships between the IETF (Internet protocols and standards), Regional Internet Registries RIRs (IP addresses), and ccTLD and gTLD operators and TLD community and ICANN. A new organisation, Public Technical Identifiers (PTI), an affiliate of ICANN, is now responsible for performing the IANA functions and delivering the IANA Services on behalf of ICANN. The session will discuss these new arrangements and how they have enhanced ICANN’s accountability and transparency to the global Internet community. The session will also describe how ICANN is preparing for the Root KSK Rollover.
NRO Activities Report by Axel Pawlik at ARIN 36. Presentation and video archives at: https://www.arin.net/participate/meetings/reports/ARIN_36/ppm.html
See how the Internet has grown and how several major companies are leading us into a brighter IPv6-enabled future. For more info visit: http://teamarin.net/2016/02/17/growing-the-internet-with-ipv6/
CES 2016 Panel: Your Customers Are on the New Internet – Are you?ARIN
Slides from CES 2016 Panel: Your Customers Are on the New Internet – Are you? The new Internet, built on IPv6, is the only way to reach the 30 billion new IoT devices and the next 1 billion people that will be connected. Learn how this shift will positively impact your business and your customers.
Moderator:
Brian Markwalter, Sr. VP, Research & Standards, Consumer Technology Association
Panelists:
Samir Vaidya, Director, Device Technology, Verizon Wireless
John Curran, President and CEO, ARIN
Paul Saab, Software Engineer, Facebook
John Jason Brzozowski, Fellow and Chief IPv6 Architect, Comcast Cable
Limor Schafman, Chair Emeritus and Director of Content Development, IPv6 Forum Israel, TIA
IETF IPv6 Activities Report by Cathy Aronson at ARIN 36. Presentation and webcast archive available at: https://www.arin.net/participate/meetings/reports/ARIN_36/ppm.html
Registration Services Report by Richard Jimmerson at ARIN 36. Presentation and video archives at: https://www.arin.net/participate/meetings/reports/ARIN_36/mem.html
ARIN 36 Advisory Council Report by Dan Alexander. Presentation and video archives at: https://www.arin.net/participate/meetings/reports/ARIN_36/ppm.html
Board of Trustees Report by Vint Cerf at ARIN 36. Presentation and video archives at: https://www.arin.net/participate/meetings/reports/ARIN_36/ppm.html
ARIN 35: Internet Number Resource Status ReportARIN
ARIN 35: Internet Number Resource Status Report by Leslie Nobile. Video archives at: https://www.arin.net/participate/meetings/reports/ARIN_35/ppm.html
ARIN 35: CRISP Panel by Michael Abejuela, John Sweeting, and Bill Woodcock. Video archives available at: https://www.arin.net/participate/meetings/reports/ARIN_35/ppm.html
ARIN 35 Tutorial: How to certify your ARIN resources with RPKIARIN
ARIN 35 Tutorial: How to certify your ARIN resources with RPKI by Andy Newton. Presentation at: https://www.arin.net/participate/meetings/reports/ARIN_35/premeeting.html
ARIN 35 Tutorial: Life after IPv4 depletion by Leslie Nobile. Leslie talks about the various options for obtaining IP address space as we near full IPv4 address depletion: check the available ARIN inventory; go on the waiting list, explore transfers, request IPv6. Video archives at: https://www.arin.net/participate/meetings/reports/ARIN_35/premeeting.html
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
2. IANA Governance Changes
• “Throughout its entire history, the Internet
system has employed a central Internet
Assigned Numbers Authority (IANA)”
• IANA handles the central registries for the
Internet –
– “Names” (The DNS root zone)
– “Numbers” (The IPv4, IPv6, ASN global free pools)
– “Protocol Parameters” (port numbers, type codes, etc.)
• IANA services are provided under two agreements:
– USG NTIA IANA Functions Contract with ICANN
– RFC 2860 MOU between IAB/IETF and ICANN
3. IANA Governance Changes
Globalization of IANA
Functions
• US Govt announced
plan to transition
oversight of the IANA
functions contract
from NTIA to the “global
multistakeholder community”
4. IANA Governance Changes
NTIA Conditions for Transition
Proposal
• Support and enhance the
multistakeholder model
• Maintain the security, stability, and
resiliency of the Internet DNS
• Meet the needs and expectation of
the global customers and partners of
the IANA services
• Maintain the openness of the Internet
7. IANA Governance Changes
IANA Stewardship Transition Coordination
Group (ICG) Mission
• To coordinate the development of a
proposal among the communities
affected by the IANA functions
• Charter:
– https://www.icann.org/news/announcement-2014-08-27-
en
12. IANA Governance Changes
ARIN Region Process
1) Discussion in the ARIN community will take place during ARIN 34 and
through a mailing list consultation from 13 October to 27 October.
1) ARIN will conduct a community survey and publish the results to aid in the
discussion. The survey will be open for one week, 13 – 20 October, and
those results will be posted by 24 October 2014.
1) After the initial community discussion ends on 27 October, the ARIN staff
will produce a draft summary document by 3 November for community
review. The document will note consensus positions and any significant
points where consensus could not be achieved
1) After community review, a final document (including any material
comments from the review) will be sent to the Number Resource
Organization for compilation into a single RIR community input to the ICG.
13. IANA Governance Changes
ARIN Region Process
1. Is the process outlined above for response development in the ARIN region
sufficient or are any changes needed?
1. Do we need a dedicated mailing list in the ARIN region for conducting the
community discussion on this topic, or does an existing ARIN list such as
arin-consult, arin-discuss, or PPML suffice? If a new list is created for this
purpose, should it be prepopulated with subscribers from another list?
2. ARIN intends to conduct a community survey from October 13 to October
20th to aid in development of a response - please review the three draft
survey questions (attached) and provide any suggestions or comments for
improvement.
Please provide comments on the above points to arin-consult@arin.net.
15. IANA Governance Changes
ARIN Survey Questions
Survey Question 1 – Do you agree that the following points are the primary
priorities for the ARIN community?
• There should be minimal operational change – the current processes for
IANA operation and related policy-making are effective and allow for the
participation of all interested parties.
• Any new oversight mechanism should incorporate and build on the
existing RIR community, policy-making processes.
• The RIR communities are ultimately accountable for the management of
those IANA functions relating to management of the global Internet
number resource pools, and this should be reflected in any new oversight
mechanisms.
16. IANA Governance Changes
ARIN Survey Questions
Survey Question 2 – Do you agree that a model for IANA oversight
endorsed by the ARIN community should include the following elements?
• ICANN has historically managed operation of the IANA functions well, and
should continue to do so at this time.
• The IANA functions operator must be answerable and accountable to the
communities that it serves. The number resource community is represented
in such accountability processes by the membership-based Regional
Internet Registry organizations.
• Funding arrangements to cover the staff, equipment and other
operational costs associated with operation of the IANA functions should
be transparent and stable.
17. IANA Governance Changes
ARIN Survey Questions
Survey Question 3 –Does this community feel that it has no position, per
se, on ICANN accountability mechanisms? (other than the principle that
DNS community must be satisfied with that process before any IANA
transition)
“Throughout its entire history, the Internet system has employed a central Internet Assigned Numbers Authority (IANA)” - http://tools.ietf.org/html/rfc1174
The US government announced its plan transition oversight of the Internet Assigned Numbers Authority (IANA) functions contract from the National Telecommunications and Information Administration (NTIA) to the global multistakeholder community on 14 March 2013. Historically managed by the Internet Corporation for Assigned Names and Numbers (ICANN), IANA functions are part of Internet infrastructure and include responsibility for allocating and maintaining the unique codes and numbering systems used in Internet technical standards. Announcement at: http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions
The NTIA has communicated to ICANN that the transition proposal must have broad community support and address the following four principles:
Support and enhance the multistakeholder model;
Maintain the security, stability, and resiliency of the Internet DNS;
Meet the needs and expectation of the global customers and partners of the IANA services; and,
Maintain the openness of the Internet.
Infographic courtesy of ICANN: https://www.icann.org/resources/pages/process-next-steps-2014-06-06-en