The Internet Governance Forum: Will Theory Lead To Action?
In This Issue:
1. Editor's Note: The Internet Governance Forum: Will Theory Lead To Action?
2. Today's Top Story
- Microsoft Responds To Vista License Concerns
- Standards Body Strengthens Office Open XML
3. Breaking News
- New From Cybercrooks: Fake Chrome, Pump-And-Dump
- Phishing Domain Resale Market Booms
- How To Avoid The Patent Trap
- Review: Netgear's Skype Phone Keeps You Connected
- Judge Mulls If Site Demoted By Google Was Defamed
- Big Ideas, Small Budgets
- Wal-Mart Takes Its Lumps Online, But Charges Ahead With Refreshed Site
- Federal Government Begins Rollout Of Smart Cards To Employees
- University Researchers Break Ground In Molecular Computing
- Jajah Offers VoIP Without The Internet
- Intel Shows Off Quad-Core Xeon
- Time To Teach Digital Etiquette, Experts Suggest
4. Grab Bag
- Copyright Office Delays Triennial DMCA Ruling (Public Knowledge)
- Under Fire, Soldiers Kill Blogs (Wired News)
- Can Wikipedia Ever Make the Grade? (The Chronicle Of Higher Education)
5. In Depth: China
- Chinese Companies Favoring Soft IP
- IBM, Lehman Bros. Launch China Investment Fund
- China May Require Bloggers To Register Under Their Real Names
- Microsoft Adding 500 Engineers In China
- Zilog To Increase Investment In China
6. Voice Of Authority
- Do You Use Vista Or Does Vista Use You, Continued
7. White Papers
- How Enterprise Single Sign-On Can Help You Survive A Sarbanes-Oxley Audit
8. Get More Out Of InformationWeek
9. Manage Your Newsletter Subscription
Quote of the day:
"Washing one's hands of the conflict between the powerful and the powerless means to side with the powerful, not to be neutral." -- Paulo Freire
1. Editor's Note: The Internet Governance Forum: Will Theory Lead To Action?
The first meeting of the U.N. Internet Governance Forum (IGF) began yesterday in Athens, and it's promoting a very worthy agenda. Some of the critical issues to be discussed include these: Who has access to the Internet? Who has control? What are the best ways to combat spam, phishing, and child pornography? How can we protect freedom of speech online--especially in countries with repressive regimes?
The biggest issue, of course, is whether the forum can move past the "town meeting" format, as chairman Nitin Desai has called it, to one that will actually result in action.
(You can watch the Webcast live--translated into English in real time--by going to the IGF's main Web site and clicking on the prominently displayed link there.)
The motivation for the forum is an urgent one. The Internet is now so socially, politically, and commercially important that it long ago outgrew its origins as a network run by and for computer specialists. It is now the very center of government administration, business operations, telecommunications, news distribution, and broadcasting of private opinion. The logical conclusion, according to the organizers: We can no longer trust scientists, technologists, and government organizations to manage it.
Thus the ongoing debate over whether ICANN can be trusted to continue with its oversight of the Internet is likely to be in the spotlight this week. In particular, one recent hot button is whether ICANN is dragging its feet on allowing non-Latin characters in domain names. The IGF is expected to spawn impassioned debate on this and other culturally and politically explosive issues.
So there will be a lot of talking. Will anyone actually be listening?
For starters, there are so many conflicting interests to appease. There are governments anxious about legal and regulatory issues. Private corporations determined to protect their commercial interests. Consumer groups advocating safeguards against corporate greed. Political activists urging protection of free speech. And, yes, there are still the all-important technologists and computer scientists concerned about security, protocols, and performance issues.
As Bill Thompson points out in his blog for the BBC, the language in the IGF's mandate is anything but action oriented. There are all sorts of squishy terms such as "facilitate discourse," "promote and assess," and "help to find solutions." In short, the IGF has no teeth.
Then there was the very ironic--and much blogged about--incident last week, in which Greek cybercrime authorities, apparently unaware that a global forum on Internet rights was about to convene in their back yard, arrested the Webmaster of a blog aggregation Web site simply because he had linked to a satirical blog.
What do you think? Have you been following the debate over the efficacy of the IGF? Do you believe the Internet is too America-centric? Does the United Nations have a prayer of wresting influence away from big business and politicians? Let me know what you think by responding to my blog entry.
Phishing Domain Resale Market Booms
Security researchers at F-Secure have identified more than 30 registered domain names for resale on Sedo that would be of interest only to the legitimate holder of the trademark or to phishers, F-Secure says.
How To Avoid The Patent Trap
IBM's lawsuit against Amazon highlights the need for patent reform and raises a question: Are big tech vendors using their massive patent portfolios to stifle innovation?
Big Ideas, Small Budgets
According to the InformationWeek 500, our list of the most effective users of IT, the stingiest industries in terms of tech budgets are construction and engineering, at 0.8% of revenue; metals and natural resources, at 1.0%; and chemicals, at 1.8%. But that doesn't mean they aren't innovating with technology.
Windows Vista: Ready, Set, Go?
Microsoft and its customers are gearing up for the release of Vista in November. But will the product ship as promised? Learn how nearly 700 business technology professionals are planning to adopt Vista in InformationWeek Research's report Windows Vista: Ready, Set, Go?
Subscribe To Your Favorite Authors
Are you a fan of Fred Langa? Are there other InformationWeek authors that you view as must-reads? Then check out our all-new author's directory; each author has his or her own page and RSS feed.
Under Fire, Soldiers Kill Blogs (Wired News)
Writers of popular "milblogs," which are blogs kept by current or former members of the U.S. military, seem to be doing some self-censorship in response to increasingly aggressive government monitoring of their content.
Chinese Companies Favoring Soft IP
As developers in China begin to favor soft IP blocks over hard cores, intellectual property vendors like MIPS and ARM are loosening up about delivering RTL code to Chinese customers.
Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.