Académique Documents
Professionnel Documents
Culture Documents
Vint Cerf
January 2010
1
940
#4 UTAH
360
PDP 10
Internet 1999
681,064,561
(ftp.isc.org/www/survey/reports/current/
Jul 2009)
Region Asia Europe North Am. LATAM/C Mid-East Oceania Africa TOTAL
Internet Population 738.3 Mil. 418.0 Mil. 252.9 Mil. 179.0 Mil. 57.4 Mil. 21.0 Mil. 67.4 Mil. 1,734.0 Mil.
10
Security
Spam Viruses/Worms/Trojan Horses
Infected websites Infected thumb drives Infected CD-ROMs, DVDs, etc.
DOS and DDOS attacks Social Engineering Poor passwords (re-usable especially) Phishing, Pharming(DNS compromise) IP address poaching Spectacular human error (configuration esp.)
11
12
Privacy
Lax user behaviors (social networking, unsafe configuration) Weak protection of personal data by business, government
Lost laptops, thumb drives Weak security configuration of servers Poor access controls Bad business practices (sharing personal information)
Invasive devices
Mobiles with cameras and sound recording capacity GPS tracking RFID tracking Closed Circuit TV surveillance (traffic, stores, public places)
13
Social Responsibility
>25% of the world uses Internet and a larger fraction depends on it indirectly The Internet of Things is at hand (smart grid, smart appliances, smart phones, etc.) Software is an endless frontier - there will always be more and different applications We face a fragile future if we dont pay more attention to our ability to produce reliable and trustworthy software (and dont forget hardware and firmware supply chain issues)
14
Improved cyber-hygiene Better programming languages Better analytical and debugging tools Better compromise detection (e.g. traffic audits)
15
Cloud Collaboration
Multiple Data Centers (replication, responsiveness) Dynamic capacity sharing Data sharing (latest copy is always in the cloud Video and audio conferencing with data sharing Inter-Cloud interactions (new research area!)
How to refer to other clouds? How to refer to data in other clouds? How to make data references persistent (unlike URLs)? How to protect Clouds from various forms of attack (inside, outside)? How to establish an access control regime (inside, between clouds)? What semantics can we rely on with inter-cloud data exchange? What notion of object would be useful for inter-cloud exchange?
16
18
(RFC 4838)
19
Policy Considerations
Broadband and wireless infrastructure Non-discriminatory access (net neutrality) Common Carriage style safe harbors regarding content Permissionless innovation Cloud computing efficiencies (note US CIO position) Multi-lateral ICANN Affirmations Continuation of IGF Containing the ITU Coping with TLD expansion
20
Semantic Web Complex objects that can only be rendered via computer
3D interactive objects Complex spreadsheets Interactive environments
BIT ROT!
Preserving interpretive programs (Windows 3000 and PPT 1997) And the operating systems that run them And the hardware that run the operating systems For thousands of years!!
21
APPLICATIONS
22
23
26
27
29
30
31
32
Google Moon
33
34
35
36
Accessibility
@Google: Accessibility Engineering and Capability Council
See www.google.com/accessibility
37
38
39
40
Internet-enabled Devices
41
42
43
InterPlaNetary Internet
44
45
46
47
(RFC 4838)
TDRSS and NASA in-space routing Delay and Disruption Tolerant Protocols
Tactical Mobile applications (DARPA) Civilian Mobile applications (SameNet!) Deep Impact Testing October 2008 Space Station Testing July 2009 EPOXI Testing October 2009
48
End-to-end information flow across the solar system Layered architecture for evolvability and interoperability IP-like protocol suite tailored to operate over long round trip light times Integrated communications and navigation services
49