Wednesday, April 28

Vint Cerf WWW 2010 Keynote

Here are the notes that Michael sent me on the Vint Cerf keynote address at WWW 2010.

“Everything is Connected” by Vint Cerf

Note: the slides from the talk are available online and you can watch a video of the talk via Wayne Sutton's livestream.

  • “I’m the guy behind the underlying plumbing, not the applications. So this talk is going to be about the plumbing not the applications built upon this plumbing”

  • Internet is a network of autonomous, independent systems

  • Internet Statistics
    • 1.8B people (26% of the world population)
    • 4.2B mobiles and 1.3B PC’s
    • Asia 770M (20% penetration)
      (Half of users in China)
    • Europe 425M (53% penetration)
    • N. America 260M (76% penetration)
    • Rapid drop of available IP’s (Sometimes in 2012 IPv4 will run out)

  • Major Near Term Changes
    (Nothing too surprising)
    • Introducing IPv6
    • Digitally Signed Address
      Registration to prevent fraud
    • Sensor Networks
    • Smart Grid – Appliances on the Net
    • Mobiles
    • Cloud Computing
    • Social Networks

  • Mobility
    • Persistent state, disrupted connectivity (transactions mode)
    • Multiple types of networks (Wifi, 3G, 4G)
    • New sensory inputs from the mobiles: sound, speech, video --- Everyone can report almost everything
      in real time

  • Beyond text search (Mainly
    Google applications)
    • Image Search --- Google
    • Speech recognition --- Easier
      for some tasks
    • Gestures controlling the
      device (Patti Maes – see a TED talk)
    • Semantic Web
      • Still, a lot of dark information
        in the web
      • Web “publishing” ---
        not just making the raw data available, making it available for use
        and consumption by some other applications
      • Semantic “printing”
        --- Information Representations
      • Creating Persistent Object
        • What is an object?
        • Uniqueness of the object
        • Interpretation “ “ “
        • Authenticity “ “ “
          --- Digital Signatures (and supporting laws)
  • Security Issues – both
    system and user issues
    • Spam
    • Viruses/Trojans
    • Re-use of (poor) password
    • Social Engineering – phishing,
      deceiving emails
    • Human Errors (how to detect bad configurations) – incident of marking every website as malware
      in Google search for 15 minutes
    • organization
      – non-profit organization that detecting sites that carry malware.

  • Privacy
    • Lax user behavior
    • Weak protection of personal
      data by businesses and government
    • Invasive devices: every
      mobile device has a potential for privacy invasion

  • New Technologies
    • Flow routers
    • Massive data correlation
      • Map/Reduce
      • Every datum is a query –
        everything is related to the everything
    • Cloud Collaboration
      • So far, there are only “autonomous
        proprietary clouds”
      • How can they be connected
        – “inter-cloud interactions”
        • Send/Receive data/meta-data
          between clouds
      • How to get the data “out
        of the cloud”?
    • Innovative Storage
      • Mixing SSD’s, RAM and
        hard drives
    • Devices
      • Phones, picture frames
      • Internet-enabled surf board
        (true story)
      • Sensor data from buildings
        and houses / smart grid

  • Research Problems on the
    Internet (just a few select ones)
    • Broadcast/Multicast utilization
      vs. point-to-point delivery
    • Distributed/Multi-Core Algorithms
    • Authentication & Identity
    • Integration of Apps
    • Intellectual Property Protection
    • Rotten Bits: Archiving digital
      information for (very) long range --- Opening a PowerPoint’97 slide
      deck in a year 3000

  • Whole lot still to be done
    (with potentially disruptive results) on the lower levels of the
    network, not just on the application level
Thanks again to Michael, and you can follow others tweeting

No comments:

Post a Comment