Feeds

Internet Governance Forum still searching for something to govern

In the beginning was the...uh...

3 Big data security analytics techniques

ICANN San Juan 2007 After a crazed American federal prosecutor wreaked havoc on the Puerto Rican roads by wiping out on his motorcycle at 3am doing 105 mph, immobilizing traffic for ten hours on a major highway, I walked four miles on Thursday morning along the beach to the site of the ICANN meeting. I made it just in time to the Caribe Hilton for the internet governance workshop.

Sure glad I caught this one.

In the beginning ... uh, were the critical...uh... internet resources... ahm well... we'll get back to that at the Rio conference in November. Sort of like Adam wandering around the garden labeling things, the Internet Governance Forum (IGF) is still working on its reason for being here.

The IGF was created out of whole cloth by the UN as a kind of internationalized counterweight to perceived excessive American influence at ICANN, and yet no one in attendance, even those who participate in the IGF, are quite sure what the IGF even does - apparently it's still defining its fundamentals. A good chunk of this mercifully short session consisted of participants half-heartedly trying to define what constitute "critical internet resources" - the protection of which they've decided is essential to their core mission, and which is topic numero uno at the upcoming Rio event.

The truth is really out there, right?

This session in theory was about more than the IGF, but in practice it consisted mostly of a discussion about the extent to which the IGF and ICANN serve overlapping or even contradictory purposes.

There seemed to be a rather diplomatic consensus that the two institutions complement each other, but after sitting through an hour of discussion on the subject, this correspondent still has absolutely no idea what the IGF actually does - or if it even has the power to do anything at all. Is it a gripe forum, kind of like those bitter websites American trademark attorneys are always trying to shut down? Is it just a glorified networking event? Who knows? If I make it to the Rio forum, I'll be sure to let everyone know.

Although this topic looked appetizing on the schedule, it's clear that the IGF has a lot of work to do if it is to be considered anything more than a highly vocal yet castrated version of ICANN. Indeed, the IGF bares an uncanny resemblance to that other impotent, internationalized and highly vocal institution, the UN General Assembly. That's not to say that it does not have value - it's just the political equivalent to a visit to the therapist's office. We all need to get stuff off our chest from time to time.

Top three mobile application threats

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.