Feeds

Future of the net to be decided tomorrow

Washington pow-wow will be webcast

High performance access to file storage

The future of the internet and the US government's role within it will be debated at a public meeting tomorrow in Washington DC.

Starting at 1.30pm local time, officials from the National Telecommunications and Information Administration (NTIA) will discuss "issues associated with the continuation of the transition of the technical coordination and management of the internet domain name and addressing system (internet DNS) to the private sector".

What that means is that NTIA will debate what changes should be made to the contract the US government has with internet overseeing organisation ICANN when the existing contract ends on 30 September.

The public meeting follows a consultation exercise last month which saw 632 emailed comments outlingin ideas and reservations about the current state of internet governance.

The agenda for the meeting has been posted and will also be webcast.

Department of Commerce assistant secretary John Kneuer, the US government's man in charge, will be speaking and will also chair one of the two discussions. ICANN CEO Paul Twomey is also scheduled to speak. DoC senior adviser Meredith Attwell Baker will be chairing the other discussion.

The NTIA hopes to keep a tight rein on discussions, and in particular steer clear of the growing calls for the US government itself to transition its role to an international body as soon as possible.

ICANN carried out its own consultation exercise for the meeting on Friday where it lined up a series of speakers to give their opinion on what changes ICANN needs to make for the future.

The most controversial aspect in that consultation was the fact ICANN remains a US company and so exists within the highly litigious American system. There was also some discussion about ICANN's failure to include everyday internet users in its decision-making processes.

There will two periods of 15 minutes for public questions at the end of two sessions, but otherwise speakers have been chosen by the NTIA, and Twomey and Kneuer will be given 10 minutes without questions to end the meeting. ®

Related links

Meeting agenda
Webcast link [RealPlayer]

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.