Return to Video

Dr. Vint Cerf on "Reinvinting the Internet"

  • 0:00 - 0:04
    evening thank you for coming out to dc
    acm's may presentation
  • 0:04 - 0:06
    on reinventing the Internet
  • 0:06 - 0:08
    i'm andrew conkland cherokee cac_ m
  • 0:08 - 0:15
    it's my pleasure to welcome you to
    google dc
  • 0:16 - 0:19
    I'd like to take a moment here to think
    that people in the dissident possible
  • 0:19 - 0:23
    starting with the car let anthony's and
    google pc
  • 0:23 - 0:27
    I'd also like to think the chapter board
    for helping to put this on and
  • 0:27 - 0:29
    all the communication they did
  • 0:29 - 0:31
    in fact that lake all of them
  • 0:31 - 0:32
    stand up right now
  • 0:32 - 0:36
    to show who they are
  • 0:36 - 0:44
    so feel free a
  • 0:44 - 0:49
    uh... please be sure to grab one of a
    man to chat with him after this is over
  • 0:49 - 0:51
    also that the bank Internet Society for
  • 0:51 - 0:53
    uh... the live stream tonight
  • 0:53 - 0:55
    and of course uh... the Internet
  • 0:55 - 0:58
    for making this possible
  • 0:58 - 1:01
    if not for the Internet we would be a
    running events through large
  • 1:01 - 1:03
    bureaucratic committees
  • 1:03 - 1:04
    snail mail
  • 1:04 - 1:06
    and we would more than
  • 1:06 - 1:10
    close we've more closely adhered to the
    by-laws of dc a cm
  • 1:10 - 1:16
    uh... that's a half joke
  • 1:16 - 1:20
    uh... the association for computing
    machinery or a cm dot org is an
  • 1:20 - 1:24
    educational scientific computing society
    for academics and practitioners in
  • 1:24 - 1:25
    computing
  • 1:25 - 1:28
    it consists of international chapters
    conferences workshops
  • 1:28 - 1:31
    special interest groups
  • 1:31 - 1:35
    uh... professional development resources
    an additional library of white papers
  • 1:35 - 1:36
    uh... our chapter
  • 1:36 - 1:38
    are chapters focus is
  • 1:38 - 1:41
    presented appear which is
  • 1:41 - 1:44
    bringing uh... presentations from
    academic institutions
  • 1:44 - 1:46
    uh... into the community
  • 1:46 - 1:48
    professional development for appears
  • 1:48 - 1:55
    and participation in the in our local
    community
  • 2:01 - 2:02
    for the party
  • 2:02 - 2:06
    term is almost up uh... this year and i
    want to talk a couple of couple
  • 2:06 - 2:07
    highlights
  • 2:07 - 2:10
    we've had some very interesting
    presentations in the past year
  • 2:10 - 2:13
    here's a short list of them
  • 2:13 - 2:14
    most recently computer vision with
  • 2:14 - 2:18
    docked with doctor larry davis at the
    university of maryland
  • 2:18 - 2:20
    very good talk uh... soft
  • 2:20 - 2:24
    cleansing intrusion tolerance wasn't the
    one i had no idea about and that was
  • 2:24 - 2:25
    about uh...
  • 2:25 - 2:27
    virtual machines flops within
  • 2:27 - 2:30
    within minutes and then it within forty
    five seconds
  • 2:30 - 2:36
    with data persistence it was a very very
    compelling taught
  • 2:36 - 2:39
    and then there's a couple others here
    knowledge discovery now analysis
  • 2:39 - 2:41
    organizational social capital
  • 2:41 - 2:45
    we also a little while back we had a
    dinner with richard solomon
  • 2:45 - 2:47
    of the free software foundation
  • 2:47 - 2:54
    that was so sick at dinner
  • 2:54 - 2:59
    and now here's a couple of stats so the
    species yummy dot group we started about
  • 2:59 - 3:02
    a year ago we now have forty porn twenty
    eight members
  • 3:02 - 3:05
    there's another meet up group we've been
    running called bcn idols which is an
  • 3:05 - 3:06
    after-hours
  • 3:06 - 3:08
    working community
  • 3:08 - 3:10
    self-starter meets once a week
  • 3:10 - 3:15
    about a forty attendees we had a a
    congressman come out couple weeks ago
  • 3:15 - 3:19
    is having us into uh... the capitol
    building com complex for core concession
  • 3:19 - 3:22
    and there's a lot of interesting doers
    and salsa orders that are building
  • 3:22 - 3:25
    business ventures
  • 3:25 - 3:27
    hobbyists freelance
  • 3:27 - 3:29
    and other committee other every week
  • 3:29 - 3:34
    recommend checking it out
  • 3:34 - 3:38
    and then from i three and a half years
    here helping with the cac_ emma have a
  • 3:38 - 3:41
    couple of takeaways
  • 3:41 - 3:44
    very obvious ones it would seem on paper
  • 3:44 - 3:46
    uh... the first one is
  • 3:46 - 3:48
    helped many people around you
  • 3:48 - 3:50
    uh... through putting on talks in
    putting on professional development
  • 3:50 - 3:53
    courses
  • 3:53 - 3:54
    a lot of people benefit from it
  • 3:54 - 3:58
    and you can do that through this chapter
  • 3:58 - 4:03
    the more people people to help
  • 4:03 - 4:04
    and you grow because of it
  • 4:04 - 4:08
    suv that leads into the next slide
  • 4:08 - 4:09
    which is
  • 4:09 - 4:10
    called for
  • 4:10 - 4:13
    she sees him board numbers candidates
  • 4:13 - 4:15
    that santa and in a couple days
  • 4:15 - 4:19
    and we are going to have our elections
    next month month as well
  • 4:19 - 4:22
    and I'd like to take a moment here to
    secretly have a community announcement
  • 4:22 - 4:29
    they'd like to make
  • 4:30 - 4:31
    extender
  • 4:31 - 4:34
    i put flyers out on the table out front
    this is for the
  • 4:34 - 4:39
    university of maryland human-computer
    interaction a lab thirty s annual
  • 4:39 - 4:45
    symposium coming up next week in college
    park ec aisles been doing leading edge
  • 4:45 - 4:49
    interface work for decades ob engine
    item and found that the the lab it's now
  • 4:49 - 4:53
    on its third fourth director it's a
    great event and the flyers out there if
  • 4:53 - 5:00
    you can't get a flyer disability i olson
    posey 'em and you'll find a link to it
  • 5:05 - 5:06
    administers the keller
  • 5:06 - 5:09
    amanda ceo_ and founder of programming
  • 5:09 - 5:10
    uh... it's a new
  • 5:10 - 5:14
    all-female software training program in
    dc
  • 5:14 - 5:17
    uh... cell and going to be hosting
    workshops
  • 5:17 - 5:20
    and a full ten week uh... programming
    fellowship
  • 5:20 - 5:21
    for women's learn
  • 5:21 - 5:25
    on how to code in python so if anyone is
    interested in that town looking for
  • 5:25 - 5:27
    supporters
  • 5:27 - 5:34
    uh... hiring organizations and student
    self company after its just
  • 5:36 - 5:39
    and jeff alexander i'm actually on the
    board all of the um... technology
  • 5:39 - 5:41
    transfer society of dc
  • 5:41 - 5:45
    and we're actually having an event at
    lunch on wednesday called code breakers
  • 5:45 - 5:50
    include makers john hume into is a long
    time and please now as i will talk about
  • 5:50 - 5:54
    those and other people involved in world
    war two
  • 5:54 - 5:59
    code development and code breaking uh...
    in the war if that the nazis
  • 5:59 - 6:03
    uh... lessons we can learn about how to
    manage innovation from that experience
  • 6:03 - 6:07
    so it sat down southeast universe user
    universities association which is just
  • 6:07 - 6:11
    over here up on a block away out google
    tech transfer society dc chapter no
  • 6:11 - 6:18
    find thanks
  • 6:21 - 6:24
    payments to a breeze a massive from dc
    government
  • 6:24 - 6:27
    dc more nurses that helped support
    tech sector
  • 6:27 - 6:31
    public original basin is that we've got
    to work with some terms here
  • 6:31 - 6:33
    let me know if you have in a bit company
    or if you
  • 6:33 - 6:34
    and
  • 6:34 - 6:41
    sobered by the sponsors
  • 6:47 - 6:51
    i'm mike nelson slumber government and
    i'm also very involved in society dc
  • 6:51 - 6:52
    chapter
  • 6:52 - 6:54
    we're very glad to be
  • 6:54 - 6:57
    providing live streaming here but we're
    also wanted to announce that next
  • 6:57 - 7:01
    thursday twenty-third morning we're
    doing an event at the center for
  • 7:01 - 7:06
    strategic and international studies
    geopolitics Internet governance
  • 7:06 - 7:13
    why other people want to take that away
    from us
  • 7:20 - 7:24
    higham shown themselves and you know
    it's uh... to the community dc adjust
  • 7:24 - 7:28
    general announcements we have some very
    interesting things going on one were
  • 7:28 - 7:29
    working with
  • 7:29 - 7:32
    uh... teach you to reduce so it's kind
    of exciting to do that
  • 7:32 - 7:36
    and uh... we also have some interesting
    things going on we're working with
  • 7:36 - 7:38
    partnering with the smithsonian soon
  • 7:38 - 7:41
    uh... we uh... have a couple of that's
    coming up soon
  • 7:41 - 7:45
    visit our data kennedy dc dot org page
  • 7:45 - 7:48
    uh... we'd have
  • 7:48 - 7:51
    so if i feel like the governor from
    texas
  • 7:51 - 7:53
    i forgot
  • 7:53 - 8:00
    but there's a lot of great lots going on
    there like you to check it
  • 8:04 - 8:05
    pickett
  • 8:05 - 8:09
    without a for the delay in its my own
    urge introduce tonight speaker
  • 8:09 - 8:12
    dr irvine surface served as vice
    president chief Internet evangelists for
  • 8:12 - 8:14
    google since october two thousand five
  • 8:14 - 8:19
    surf is a former senior vice president
    technology strategy for mci_
  • 8:19 - 8:22
    widely known as one of the fathers of
    the Internet surf is the code designer
  • 8:22 - 8:26
    of the t cpi_ p protocols in the
    architecture of the Internet
  • 8:26 - 8:30
    he performed this work during his tenure
    with the us department of defense is
  • 8:30 - 8:32
    advanced research projects agency
  • 8:32 - 8:35
    surface acquired numerous uh...
    accolades over the years in ninety four
  • 8:35 - 8:39
    he was listed in people magazine's
    twenty five most intriguing people
  • 8:39 - 8:42
    ninety seven you received the us
    national medal of technology by
  • 8:42 - 8:43
    president clinton
  • 8:43 - 8:45
    two thousand for the cm
  • 8:45 - 8:46
    during award
  • 8:46 - 8:51
    two thousand five the presidential medal
    of freedom by president bush
  • 8:51 - 8:54
    and twenty thirteen years appointed by
    president obama to serve on the national
  • 8:54 - 8:55
    science port
  • 8:55 - 8:59
    that doctor men served has either
    started chairs or is currently a fellow
  • 8:59 - 9:03
    at virtually every reputable Internet
    technology related association on the
  • 9:03 - 9:06
    planet
  • 9:06 - 9:11
    if you're looking for a conversation
    starter ask him about leonard nimoy
  • 9:11 - 9:13
    jet propulsion laboratory
  • 9:13 - 9:18
    and what it's like to be married before
    the Internet existed
  • 9:18 - 9:21
    ladies and gentlemen it's with great
    privilege
  • 9:21 - 9:24
    i ask you please join me in welcoming
    the president of the association for
  • 9:24 - 9:25
    computing machinery
  • 9:25 - 9:32
    doctor vincent
  • 9:34 - 9:39
    well thank you welcome to the uh...
    google bc daycare center coffee knows
  • 9:39 - 9:41
    all the primary colors everything else
  • 9:41 - 9:47
    uh... it's really pressure to really is
    it's a story for me started please that
  • 9:47 - 9:49
    the uh... htm chapter
  • 9:49 - 9:52
    came to us and yesterday was that
    possible
  • 9:52 - 9:55
    and i certainly appreciate Internet
    society sound
  • 9:55 - 9:57
    strain of this uh... activity
  • 9:57 - 10:00
    uh... this is a special kind of event
    for me in a way because three of the
  • 10:00 - 10:04
    organizations that i care a great deal
    about are represented here high stock
  • 10:04 - 10:06
    service
  • 10:06 - 10:07
    first president
  • 10:07 - 10:10
    pcm racers current president
  • 10:10 - 10:14
    uh... where i served as one of the past
    presidents of uh... means a lot to me to
  • 10:14 - 10:16
    see all three of these organizations
  • 10:16 - 10:19
    uh... collaborating together tonight's
    event
  • 10:19 - 10:23
    uh... i thought i would mention one
    thing before the committee formal
  • 10:23 - 10:24
    presentation
  • 10:24 - 10:28
    uh... that nineteen ninety-four of
    people magazine thing was a bit of a
  • 10:28 - 10:32
    surprise to me i don't quite know how
    the figured out that that was because
  • 10:32 - 10:37
    Internet was not terribly widely known
    the general public it was
  • 10:37 - 10:40
    this is world wide web site show up
  • 10:40 - 10:44
    but uh... the irony of all this is that
    my wife
  • 10:44 - 10:46
    lost her she was three
  • 10:46 - 10:51
    got to call their implants won in ninety
    six and one in two thousand six ten
  • 10:51 - 10:52
    years later
  • 10:52 - 10:56
    her story a soldier manickam wonderfully
    compelling that they sent the photos
  • 10:56 - 11:01
    came out for three days traffickers he
    got sixties people
  • 11:01 - 11:03
    in nineteen ninety eight and that's
    always been the source of your
  • 11:03 - 11:09
    suggestion in the house alone i haven't
    been able to get back in again
  • 11:09 - 11:11
    seconds and what to do it
  • 11:11 - 11:14
    mission is that uh... that you'll be
    pleased i hope to know
  • 11:14 - 11:18
    that Internet and the world wide web
    have been rescued
  • 11:18 - 11:19
    it's bright store
  • 11:19 - 11:23
    uh... source as a major engineering
    achievement
  • 11:23 - 11:27
    dot that we think of the ec internal
    organs being nobel prize in computer
  • 11:27 - 11:30
    science but there isn't anything for
    engineering
  • 11:30 - 11:32
    well system
  • 11:32 - 11:36
    there is a queen elizabeth props for
    engineering it was uh... established
  • 11:36 - 11:38
    last year
  • 11:38 - 11:39
    is warranted
  • 11:39 - 11:41
    every two years to uh...
  • 11:41 - 11:45
    obtuse now up to five people originally
    up to three
  • 11:45 - 11:48
    uh... but now it's up to five it's a one
    million pound crimes that's about a
  • 11:48 - 11:50
    million and a half dollars
  • 11:50 - 11:54
    by honda conversely mark increasing
  • 11:54 - 11:55
    uh...
  • 11:55 - 11:57
    leaders are
  • 11:57 - 12:00
    all were announces winners of the first
  • 12:00 - 12:01
    team field uh...
  • 12:01 - 12:03
    hearing his
  • 12:03 - 12:05
    and what is done
  • 12:05 - 12:06
    very ironic is that
  • 12:06 - 12:12
    my wife and are moving to london for six
    months it for uh... some work for global
  • 12:12 - 12:12
    and
  • 12:12 - 12:14
    less than a week
  • 12:14 - 12:17
    after we arrived in
  • 12:17 - 12:20
    we won't have lunch with the lord mayor
    of london
  • 12:20 - 12:24
    we will go on it and still line with the
    prime minister
  • 12:24 - 12:26
    then we will go house where we
  • 12:26 - 12:29
    need queen elizabeth and she will be and
    each of us a check for two hundred
  • 12:29 - 12:31
    thousand pairs
  • 12:31 - 12:34
    and that's all
  • 12:34 - 12:34
    threat
  • 12:34 - 12:41
    is it work
  • 12:42 - 12:46
    fun tonight when i thought i would do is
    just give you a sense for database of
  • 12:46 - 12:49
    the current state of the Internet which
    most of you if you are very familiar
  • 12:49 - 12:50
    with
  • 12:50 - 12:54
    so the transit we can already see are
    happy to its only if occasions of those
  • 12:54 - 12:55
    trends
  • 12:55 - 13:00
    and then some of the problems places
    that we all have with him
  • 13:00 - 13:04
    not only in interest and i feel
    responsible for pursuing
  • 13:04 - 13:07
    let's let's start this was some simple
    statistics
  • 13:07 - 13:12
    uh... these data rather out of date I'd
    andy organizations that have been
  • 13:12 - 13:16
    producing them had not pleased to my
    knowledge produced anything more reason
  • 13:16 - 13:20
    although the last time i was a couple
    weeks ago so that i could be wrote about
  • 13:20 - 13:21
    that
  • 13:21 - 13:25
    but the on nine hundred million devices
    that are visible on the net with uh...
  • 13:25 - 13:29
    domain names and generally speaking
    fixed ip addresses are the servers
  • 13:29 - 13:33
    that are on the system they don't count
    their laptops desktops and other things
  • 13:33 - 13:37
    that are episodic reconnected if you add
    all those
  • 13:37 - 13:40
    uh... then you're getting close to the
    two-and-a-half three billion devices of
  • 13:40 - 13:44
    others in any way for us to actually you
    know that for sure there's no central
  • 13:44 - 13:48
    registry for many that in terms of the
    number of users in mid year last year
  • 13:48 - 13:52
    was two point four billion my guess is
    it could be easy to argue that there are
  • 13:52 - 13:54
    three billion users now behind
  • 13:54 - 13:58
    uh... it's all part of town because the
    six-and-a-half billion role models that
  • 13:58 - 13:59
    are out there
  • 13:59 - 14:03
    uh... some fraction may be on the order
    of twenty percent today and probably
  • 14:03 - 14:06
    fifty or hundred-percent figures from
    them
  • 14:06 - 14:10
    uh... will that help and support from
    capability and they'll be able to reach
  • 14:10 - 14:12
    unity and so a lot of people
  • 14:12 - 14:15
    are getting onto the Internet with their
    first experience
  • 14:15 - 14:18
    from a while and for many of them may
    stay that way
  • 14:18 - 14:23
    although as time goes on has cost them
    their as new technologies arise more and
  • 14:23 - 14:28
    more people have multiple devices they
    can use to interact with the network
  • 14:28 - 14:32
    so one meaning that I'd like to leave
    you with tonight is that i believe that
  • 14:32 - 14:32
    our
  • 14:32 - 14:37
    early uh... experience interacting with
    that one device at the time
  • 14:37 - 14:42
    will change over time and that we will
    be using mobile devices concurrently
  • 14:42 - 14:43
    to make use of the net i'm wearing blue
  • 14:43 - 14:47
    glass today last is connected to the
    Internet
  • 14:47 - 14:53
    uh... actor and often display keep being
    distracted but if i cap it on the side
  • 14:53 - 14:57
    uh... it says uh... is waiting for me to
    say something so i'll say okay class
  • 14:57 - 14:59
    take a picture
  • 14:59 - 15:02
    it just took the pictures from the
    people here this is a voice-activated
  • 15:02 - 15:05
    device intracranial read about it
  • 15:05 - 15:09
    uh... we expect to have about with two
    thousand mountain news today were
  • 15:09 - 15:13
    wrapping up to ten thousand by the end
    the year
  • 15:13 - 15:16
    and then we don't
  • 15:16 - 15:20
    they're not being sold directly people
    have to apply it may have to offer a a a
  • 15:20 - 15:24
    description of what it is a proposed new
    what we're interested in doing is
  • 15:24 - 15:28
    getting these in the hands of people
    actually investigators say applications
  • 15:28 - 15:33
    uh... this week so essendon pay for the
    use of the fifteen hundred dollars each
  • 15:33 - 15:34
    today
  • 15:34 - 15:37
    I'd have no clue what it's going to look
    like in two thousand fourteen to one
  • 15:37 - 15:41
    posted as the quantities increase the
    price p
  • 15:41 - 15:42
    potentially come down
  • 15:42 - 15:46
    so these are yet again another time
    device connected to the net and one
  • 15:46 - 15:52
    thing and tonight's discussion is
    increasing number of m
  • 15:52 - 15:56
    propriety of devices that are part of
    the Internet environment
  • 15:56 - 15:59
    interesting statistic again this
    familiar last year
  • 15:59 - 16:02
    is where people are we're using the net
  • 16:02 - 16:07
    uh... ten years ago north america was
    absolutely gorgeous number of users and
  • 16:07 - 16:10
    as penetration of stalinist penetration
  • 16:10 - 16:13
    at slightly under uh... eighty percent
  • 16:13 - 16:17
    but he said has the absolute large
    number of users in china has the largest
  • 16:17 - 16:21
    number users pretty in any one country
    they have five hundred billion flight
  • 16:21 - 16:22
    five hundred million people
  • 16:22 - 16:24
    half a billion people
  • 16:24 - 16:29
    are our online in china today that's the
    only on the order
  • 16:29 - 16:31
    maybe four percent population
  • 16:31 - 16:34
    so you can imagine what that look like
    when we get to
  • 16:34 - 16:37
    eighty percent of several uh... more
    than a billion people
  • 16:37 - 16:43
    on their china so it's interesting you
    know we hear all these stories about
  • 16:43 - 16:46
    the chinese eh... attacks on the napkin
  • 16:46 - 16:49
    sa which are presumably on true
  • 16:49 - 16:53
    but at the same time is fair to note
    that the
  • 16:53 - 16:57
    country is making a huge investment in
    building Internet infrastructure
  • 16:57 - 17:00
    so one interesting question from the
    sociological point of view was what
  • 17:00 - 17:01
    happens
  • 17:01 - 17:05
    when they have this enormous fraction of
    the population although i know he will
  • 17:05 - 17:08
    use the system it will be exchange
    information with each other
  • 17:08 - 17:10
    how does that change
  • 17:10 - 17:14
    the machines view and i don't know the
    answer to that but think this is and
  • 17:14 - 17:17
    we're watching it very very interesting
  • 17:17 - 17:21
    sociological experiment with technology
    taking place before our eyes this decade
  • 17:21 - 17:22
    unfolds
  • 17:22 - 17:26
    i think this is going to be among the
    more interesting affect student
  • 17:26 - 17:28
    observed
  • 17:28 - 17:32
    europe is the next four just in absolute
    number of users although you know
  • 17:32 - 17:36
    there's a penetration rate is uh...
    below the north america
  • 17:36 - 17:40
    but i've given up making any predictions
    about europe because they keep getting
  • 17:40 - 17:42
    countries to the definition of europe
  • 17:42 - 17:45
    change and i don't know what it looks
    like two years ago
  • 17:45 - 17:46
    and the other side
  • 17:46 - 17:47
    those who are the
  • 17:47 - 17:48
    you can see
  • 17:48 - 17:51
    that in africa we're still
  • 17:51 - 17:55
    uh... only modestly penetrated this
    numbers is misleading though because i
  • 17:55 - 17:59
    think that that we have seen a very
    rapid growth of mobile homes
  • 17:59 - 18:03
    in africa i don't know what fraction of
    them are Internet cable
  • 18:03 - 18:07
    probably cell fraction twenty percent
    thirty percent or something
  • 18:07 - 18:09
    and what we're seeing is uh...
  • 18:09 - 18:12
    individuals or small samples
  • 18:12 - 18:17
    uh... willing to pay get on and network
    or at least again
  • 18:17 - 18:21
    which is a significant fraction bearer
    monthly income
  • 18:21 - 18:25
    and yet they they do this because of the
    time
  • 18:25 - 18:28
    and so when people who make up stories
    about what people do with mobile phones
  • 18:28 - 18:29
    in africa
  • 18:29 - 18:33
    and they have things like you're getting
    prices in the city certainly figure
  • 18:33 - 18:35
    hours starcraft best
  • 18:35 - 18:36
    you know asap
  • 18:36 - 18:40
    fact is that they're just slightly
    higher european social networking review
  • 18:40 - 18:42
    all the other things we do
  • 18:42 - 18:45
    of all the data rates that they have
    available or more limited so some things
  • 18:45 - 18:47
    they don't drive streaming video
  • 18:47 - 18:49
    until the data rates are adequate
  • 18:49 - 18:53
    but their use is not terribly different
    than ours except order patients are on
  • 18:53 - 18:55
    the whole conditions
  • 18:55 - 18:59
    well this look now at the current
    Internet and see what's happening to
  • 18:59 - 19:03
    uh... everybody determines well aware
    that we ran out of uh... conversion for
  • 19:03 - 19:05
    interest rates
  • 19:05 - 19:08
    in february of two thousand one
  • 19:08 - 19:10
    and uh... that uh... was sort of um...
  • 19:10 - 19:14
    i don't know that it was an
    embarrassment for box i mean there was a
  • 19:14 - 19:16
    interesting surprised
  • 19:16 - 19:20
    weblink refers to in the design in
    nineteen seventy three forty years ago
  • 19:20 - 19:23
    and the question came up how how many
    addresses should be out on this
  • 19:23 - 19:25
    experimental Internet
  • 19:25 - 19:29
    it we didn't know the answer to that so
    we said well let's see
  • 19:29 - 19:32
    how many computers will there be a per
    country
  • 19:32 - 19:36
    at the time we were doing this machines
    we are using were big drinker machines
  • 19:36 - 19:40
    we thought we could meet into any of
    those they take a boiler room in there
  • 19:40 - 19:42
    expensive but we said let's go
  • 19:42 - 19:46
    be crazy about we allocate twenty four
    bits of address space for the machine
  • 19:46 - 19:47
    sixteen million
  • 19:47 - 19:51
    you know what we thought was mainframes
    per country croats overjoyed
  • 19:51 - 19:53
    billy said how many countries are there
  • 19:53 - 19:56
    we didn't know there was no need to look
    it up
  • 19:56 - 19:58
    sold stuff
  • 19:58 - 20:02
    itself the weekly guest company cartoon
  • 20:02 - 20:05
    so uh... added that he said well i mean
  • 20:05 - 20:08
    it's already per country and i thought
    well just got the organ it wasn't
  • 20:08 - 20:10
    exactly expensive yet
  • 20:10 - 20:12
    so maybe they'll be cooper country
  • 20:12 - 20:17
    you know it's worked for competition so
    we said twenty taxes two fifty six i
  • 20:17 - 20:19
    take this plus twenty four
  • 20:19 - 20:20
    thirty two-bit
  • 20:20 - 20:24
    we actually debated late nineteen
    seventy seven just as the Internet
  • 20:24 - 20:28
    protocols were being standardized
    whether we expanded our space what we
  • 20:28 - 20:32
    wanted very awake addresses in the
    programmers hated the idea to sing waste
  • 20:32 - 20:35
    computer seconds finding difficult in
    the packet because the gurgling
  • 20:35 - 20:36
    to india
  • 20:36 - 20:39
    uh... then somebody said how about our
    twenty-two
  • 20:39 - 20:43
    address space at the time we were on a
    fifty to a bit backbone
  • 20:43 - 20:47
    and the band frankly an awful lot of
    these changes were fully flex
  • 20:47 - 20:50
    interactions character a character a
    complex
  • 20:50 - 20:52
    it over again
  • 20:52 - 20:55
    one character going back forth with two
    hundred fifty six bases source and
  • 20:55 - 20:57
    destination address
  • 20:57 - 21:00
    investment semi
  • 21:00 - 21:04
    there was not there to visit enough we
    all have scared in the mid-nineteen
  • 21:04 - 21:08
    ninety houston started uh... work on
    what was going to be calling png_ for
  • 21:08 - 21:09
    next year
  • 21:09 - 21:11
    eventually that uh...
  • 21:11 - 21:15
    produce the ideally six address please
    bob blendon others has developed
  • 21:15 - 21:18
    one hundred twenty eight bits and pieces
    sell in a very far away
  • 21:18 - 21:20
    has been using
  • 21:20 - 21:21
    are no Internet
  • 21:21 - 21:25
    and tone down the production version is
    now open for any officially released on
  • 21:25 - 21:27
    june sixth two thousand twelve
  • 21:27 - 21:31
    i have favored a list of everyone of you
    if you will go to whichever eyes pe
  • 21:31 - 21:36
    surprising with Internet address please
    and ask them what the jury piece explain
  • 21:36 - 21:38
    when can i get i could be six this is
    important
  • 21:38 - 21:40
    because it's very very slow
  • 21:40 - 21:44
    in terms of penetration mostly because
    the irs_ user about terror
  • 21:44 - 21:47
    a lot of their software is already
    capable routers havent
  • 21:47 - 21:52
    ups_ devices have hiking he sticks to
    the ice peter turning out there saying
  • 21:52 - 21:52
    in
  • 21:52 - 21:53
    disingenuous
  • 21:53 - 21:59
    nobody's asking for course and asking
    for ordered users don't know what he for
  • 21:59 - 22:00
    eighty six it is
  • 22:00 - 22:01
    mission hefty
  • 22:01 - 22:06
    when you do and so if you will help us
    embarrass them or force in the too many
  • 22:06 - 22:09
    people were asking for anything you want
    to thank you for that
  • 22:09 - 22:11
    yeah uh...
  • 22:11 - 22:14
    does try to explain what the
    implications of a hundred and twenty
  • 22:14 - 22:18
    eight two dresses are remember saying
    time that that every electronic universe
  • 22:18 - 22:20
    could have its own web page
  • 22:20 - 22:24
    until somebody from cal tech blog
    renouncing got cancer futures teddy
  • 22:24 - 22:29
    electrons in the universe in europe by
    fifty orders of magnitude
  • 22:29 - 22:31
    so i don't say that anymore
  • 22:31 - 22:31
    uh... yeah
  • 22:31 - 22:35
    thing is happening is that the maintains
    its been bitten in latin characters you
  • 22:35 - 22:36
    know
  • 22:36 - 22:38
    can be written in dot characters in it
  • 22:38 - 22:40
    using the income
  • 22:40 - 22:43
    carousel which coming two hundred
    thousand more characters
  • 22:43 - 22:49
    that same universities using html amex
    and all four of the web so that makes
  • 22:49 - 22:53
    weapons meaning system much more
    compatible
  • 22:53 - 22:58
    i cut hike in the Internet corporation
    for signings and overseas and initiated
  • 22:58 - 23:01
    program of expansion of the generic
    top-level domains
  • 23:01 - 23:04
    over two thousand applications were
    received
  • 23:04 - 23:09
    for these units many or conflict because
    people saint martin's
  • 23:09 - 23:13
    but uh... certainly on the order of
    fifteen hundred of them
  • 23:13 - 23:14
    uh... are unique
  • 23:14 - 23:18
    and the question you know it's which
    ones will actually become all registered
  • 23:18 - 23:21
    as top-level domains that process is
    simple
  • 23:21 - 23:23
    so this is a major expansion
  • 23:23 - 23:25
    uh... the namespace
  • 23:25 - 23:30
    belly all the standard any system has a
    number of or abilities
  • 23:30 - 23:33
    uh... one of which is uh... poisoning of
    the uh...
  • 23:33 - 23:35
    nameserver cash
  • 23:35 - 23:39
    and so in order to get rid of borja
    geetac and inhibit out the effects of
  • 23:39 - 23:41
    that kind of poison
  • 23:41 - 23:43
    database system security uh...
  • 23:43 - 23:48
    uh... architecture's being deployed
    basically it's just been reciting abhi
  • 23:48 - 23:51
    binding between the two main ninety
    address
  • 23:51 - 23:57
    so when you look up to translate you
    dress you can ask for site response
  • 23:57 - 23:59
    if you get a correct response back
  • 23:59 - 24:01
    such exim in cricket jackson
  • 24:01 - 24:03
    uh... is uh...
  • 24:03 - 24:05
    uh... matches what you expect
  • 24:05 - 24:09
    then at least you have some confidence
    in the integrity of the bundy someone
  • 24:09 - 24:10
    hasn't gone in
  • 24:10 - 24:14
    modified that binding or factored into
    claims
  • 24:14 - 24:17
    because they don't have the private tv
    would have been used to sign
  • 24:17 - 24:21
    that cancer that's being deployed around
    the entire rooms and is signed
  • 24:21 - 24:25
    and a number of the second radio talk
    over the means
  • 24:25 - 24:26
    ourself
  • 24:26 - 24:28
    and some of the second your side as well
  • 24:28 - 24:33
    a similar idea uh... has come up with
    regard to the routing system
  • 24:33 - 24:36
    no remember that this whole thing was
    developed in a time when it was mostly
  • 24:36 - 24:39
    geeks who are doing work in a trust each
    other
  • 24:39 - 24:42
    now we're in an environment where you
    can't do that anymore so it would have
  • 24:42 - 24:43
    to retrofit
  • 24:43 - 24:45
    mechanisms that will deal with
  • 24:45 - 24:47
    possible components
  • 24:47 - 24:52
    indication running system basically in
    order to become part of the net
  • 24:52 - 24:54
    dissonant notes that you have
  • 24:54 - 24:58
    you're responsible for keeping track of
    the address space total system number
  • 24:58 - 24:59
    or
  • 24:59 - 25:02
    and uh... my idea of this uh...
  • 25:02 - 25:04
    spaces this
  • 25:04 - 25:07
    and that propagates around through the
    routing system the problem is you come
  • 25:07 - 25:08
    on
  • 25:08 - 25:12
    and when you lie about this and you look
    like a somebody says estates
  • 25:12 - 25:16
    in order to defend against that it has
    been proposed that night it implemented
  • 25:16 - 25:19
    there we go with a similar kind of
    digital binding doing some reading
  • 25:19 - 25:21
    between the eco-system number
  • 25:21 - 25:25
    in the idea just based which it is
    responsible for
  • 25:25 - 25:27
    so that when you're doing well and
    updates you can actually check to see
  • 25:27 - 25:32
    where the parties use animals in the
    states actually has the authority
  • 25:32 - 25:35
    there's some complexity this because not
    all routing announcements come from the
  • 25:35 - 25:36
    edge
  • 25:36 - 25:40
    they propagated through the net so some
    of the announcements are coming from
  • 25:40 - 25:43
    and so you have to be able to verify
    that the whole chain
  • 25:43 - 25:45
    announcement is actually down
  • 25:45 - 25:49
    and so that makes it somewhat more
    complicated which is why hasn't been
  • 25:49 - 25:50
    deployed yet
  • 25:50 - 25:53
    it's in the process of being
  • 25:53 - 25:56
    now i'm going to talk more about sensor
    networks
  • 25:56 - 26:00
    the smartly program and mobile devices
    so this is just a reminder again
  • 26:00 - 26:04
    in our Internet environment these
    treatments are rapidly
  • 26:04 - 26:06
    uh... filling up
  • 26:06 - 26:07
    system
  • 26:07 - 26:11
    now we all anchor recognize that devices
    are showing up on the net i certainly
  • 26:11 - 26:13
    had anticipated
  • 26:13 - 26:17
    uh... he's actually uh... this is an
    order striking out the picture larry
  • 26:17 - 26:21
    page where you go class as another
    Internet enabled device
  • 26:21 - 26:25
    but i can remember being very surprised
    if somebody came in and said to me
  • 26:25 - 26:28
    they had just ended an animal picture
    frame
  • 26:28 - 26:31
    yet and i couldn't imagine what would
    that mean all i think it was it sounds
  • 26:31 - 26:35
    as useless as a electric for kickball
  • 26:35 - 26:40
    uh... but in fact it's obviously uh...
    very useful and many of us at the gym
  • 26:40 - 26:44
    we have a wellesley upload or pictures
    to website pictures are downloaded into
  • 26:44 - 26:45
    the
  • 26:45 - 26:46
    with the end of the uh...
  • 26:46 - 26:48
    Internet naval picture frame
  • 26:48 - 26:52
    and we have an opportunity to watch
    what's going on in the family so it's
  • 26:52 - 26:57
    kind of a crude form of uh... a little
    closer face book inouye insist personal
  • 26:57 - 27:00
    its opponents actually rather nice for
    the grandparents because he can upload
  • 27:00 - 27:02
    pictures of the grandchildren
  • 27:02 - 27:03
    nieces and nephews
  • 27:03 - 27:07
    and see what they're doing bellevue way
    this works you know who is in the
  • 27:07 - 27:11
    downloads the frame down those images
    from some website so now securities
  • 27:11 - 27:15
    issue because of the website gets hacked
    the grandparents may see pictures of
  • 27:15 - 27:17
    what we hope is not the grand jury
  • 27:17 - 27:22
    so now we have to worry about insecurity
    at home as well as it org
  • 27:22 - 27:25
    uh... there are things that look like
    telephones that are really voice over at
  • 27:25 - 27:27
    the devices
  • 27:27 - 27:31
    uh... the guy in the middle has built an
    Internet enabled surfboard
  • 27:31 - 27:35
    uh... i don't know about how did it and
    send him water waiting for the next wave
  • 27:35 - 27:39
    thinking you know i had a laptop myself
    or it could be surfing the Internet away
  • 27:39 - 27:42
    let's let's do it as a laptop in this
    report
  • 27:42 - 27:46
    and uh... and then go for the wifi
    service back to the rescue check on the
  • 27:46 - 27:46
    beach
  • 27:46 - 27:48
    myself as a surprise
  • 27:48 - 27:52
    so if you want to go surf the net while
    you're aware this is for you
  • 27:52 - 27:55
    paisa tells us that everyone over the
    world will someday have an idea dress
  • 27:55 - 27:59
    and i can tell jokes about that anymore
    because somebody sent me and ideally six
  • 27:59 - 28:01
    radio naval
  • 28:01 - 28:03
    led_ whitehall
  • 28:03 - 28:04
    uh... and works
  • 28:04 - 28:08
    uh... i have a a tv sets at work
    writing in the house and you can turn
  • 28:08 - 28:10
    the lights are but that will get it
  • 28:10 - 28:13
    uh... the interesting thing is that
    uh...
  • 28:13 - 28:14
    this
  • 28:14 - 28:17
    no one can you turn it off green collars
    programmer
  • 28:17 - 28:19
    you can interrogate find out
  • 28:19 - 28:22
    so these sorts of things are becoming
    reality
  • 28:22 - 28:24
    so if you on
  • 28:24 - 28:28
    have only imagine this is a science
    fiction of speculation it is not
  • 28:28 - 28:31
    are in fact uh... you know i just
    realized something
  • 28:31 - 28:36
    he'd seen inside hiding behind it
  • 28:36 - 28:39
    okay hiking
  • 28:39 - 28:40
    uh...
  • 28:40 - 28:43
    so uh... this is my sense is that at
    home
  • 28:43 - 28:47
    uh... this is an iv six radio net it's
    uh... commercial pops is not mean that
  • 28:47 - 28:50
    in the garage over the side of him
  • 28:50 - 28:52
    uh... the communities is on trial
  • 28:52 - 28:55
    which is a partner at cisco systems a
    couple of years ago
  • 28:55 - 28:59
    scissor site all wingers
  • 28:59 - 29:00
    their sampling
  • 29:00 - 29:02
    the uh...
  • 29:02 - 29:03
    uh... like level
  • 29:03 - 29:06
    humidity and temperature in each room in
    the house
  • 29:06 - 29:07
    every five minutes
  • 29:07 - 29:12
    and that is propagated through this
    network sensors so the sensors are
  • 29:12 - 29:14
    actually store forward realize
  • 29:14 - 29:15
    they're running six votes
  • 29:15 - 29:18
    and i i p e six on top of that
  • 29:18 - 29:22
    and so the date is accumulated in the
    server an interactive based
  • 29:22 - 29:26
    so you're only he can do this right dot
    and my father once that is the end of
  • 29:26 - 29:30
    the year i will have very good
    information about how well he had been
  • 29:30 - 29:32
    awake and air conditioning
  • 29:32 - 29:35
    instead of anecdotal information may
    have
  • 29:35 - 29:37
    real uh... engineering data story
  • 29:37 - 29:39
    is an engineering like that
  • 29:39 - 29:41
    now one of the house is the one side
  • 29:41 - 29:46
    so that one is a log as the temperature
    goes above sixty degrees fahrenheit
  • 29:46 - 29:49
    i get 'em uh... nasa now some of the
    laptop
  • 29:49 - 29:51
    what is warming up
  • 29:51 - 29:53
    i remember going into love
  • 29:53 - 29:56
    lawrence not little argonne national
    laboratory
  • 29:56 - 29:59
    effort three day visit just as i was
    walking into the building all of those
  • 29:59 - 30:02
    opportunities dot com
  • 30:02 - 30:06
    uh... you know that you just broke into
    the sixties resign barrier no one was
  • 30:06 - 30:07
    home at the time
  • 30:07 - 30:11
    and so every five minutes for the next
    three days i kept getting this little
  • 30:11 - 30:13
    message the airline is winding up
  • 30:13 - 30:17
    so i called your truck guys they said
    you have remote actuators he said yes
  • 30:17 - 30:20
    they say they have strong authentication
    on them because i have a
  • 30:20 - 30:23
    fifteen-year-old next door to go on and
    messing with my
  • 30:23 - 30:27
    wine cellar and he said yes so that's
    the weekend project to install
  • 30:27 - 30:30
    benedetto thinking you know i can
    probably tell somebody has gone into the
  • 30:30 - 30:33
    winds are blowing away cuz i can see the
    lexicon of her
  • 30:33 - 30:36
    but i don't know what they didn't care
  • 30:36 - 30:38
    so ok solution to this
  • 30:38 - 30:41
    is to put our fit_ chips on the spot
  • 30:41 - 30:46
    what then i can do an instantaneous
    inventory to see that is why it is what
  • 30:46 - 30:48
    the seller without my permission
  • 30:48 - 30:50
    and down I'd miss it
  • 30:50 - 30:54
    describing this look brilliant design
    you and your friends and he told me
  • 30:54 - 30:55
    there was about
  • 30:55 - 30:58
    i said winning is about to see what you
    can go into the wine cellar red wine and
  • 30:58 - 31:04
    leave the bob so now we have to put
    sensors in the court
  • 31:04 - 31:07
    and if i was reading that we might as
    well sent esters to find out whether one
  • 31:07 - 31:11
    is ready to drink so before you on the
    bottle he would carry the court
  • 31:11 - 31:15
    and if that's the bala got thirty year
    issue something that's the one that
  • 31:15 - 31:19
    you're doing awesome cuz he doesn't know
    the difference
  • 31:19 - 31:23
    not actually out this sort of thing is
    going to be very common
  • 31:23 - 31:25
    not so everyone's on the part
  • 31:25 - 31:29
    although if i i i had someone come out
    with in prime time
  • 31:29 - 31:31
    are fit_ done
  • 31:31 - 31:36
    uh... yeah apa spartan tanks and we
    actually wandered around my cell and we
  • 31:36 - 31:39
    picked up every single lots of exactly
  • 31:39 - 31:41
    this is not it's not a crazy idea
  • 31:41 - 31:45
    uh... the thing is that we will have
    sensor networks and use them for
  • 31:45 - 31:47
    environmental control isn't for security
  • 31:47 - 31:51
    will use them for variety of things to
    only
  • 31:51 - 31:54
    residence or business or manufacturing
    facility
  • 31:54 - 31:57
    jimmy management control
  • 31:57 - 32:02
    some of these things will be very much a
    part of the union
  • 32:02 - 32:07
    now there's an interesting question i'm
    going to use the sensor network
  • 32:07 - 32:10
    as it's cool
  • 32:10 - 32:12
    walking us through bunch of questions
  • 32:12 - 32:15
    now the questions are very specific to
  • 32:15 - 32:17
    the notion of sensor network
  • 32:17 - 32:21
    architecture m large numbers of devices
    that have to be configured and access
  • 32:21 - 32:23
    control
  • 32:23 - 32:24
    but i want to as we go through
  • 32:24 - 32:26
    this particular
  • 32:26 - 32:29
    discussion i want you to be thinking
    generally about
  • 32:29 - 32:32
    Internet enable appliances are all kinds
  • 32:32 - 32:35
    having maybe managed and controlled
  • 32:35 - 32:38
    and wanting them to be
  • 32:38 - 32:44
    isolated from parties to might want to
    use them for and nefarious purposes
  • 32:44 - 32:47
    anything that we don't want is the
    headline that says
  • 32:47 - 32:51
    that there was a get distributed denial
    of service attack
  • 32:51 - 32:55
    against bank of america by every
    refrigerator in america
  • 32:55 - 32:59
    accel we need to be able to think of
    ways through
  • 32:59 - 33:02
    how he will configure install
  • 33:02 - 33:03
    offering
  • 33:03 - 33:04
    protect
  • 33:04 - 33:05
    uh... and also move
  • 33:05 - 33:09
    move from one place and others to
    imagine that you take your places with
  • 33:09 - 33:10
    you
  • 33:10 - 33:12
    they have idea dresses and
  • 33:12 - 33:15
    meeting that will be a new life he
    addresses when they were installed new
  • 33:15 - 33:19
    residents how we do all of that
  • 33:19 - 33:22
    expecting every single
  • 33:22 - 33:23
    could become an expert
  • 33:23 - 33:27
    in configuring nike devices they
    shouldn't have to do that you have to
  • 33:27 - 33:29
    know anything about
  • 33:29 - 33:30
    and so
  • 33:30 - 33:34
    what they remove series of design and
    operational should there be single
  • 33:34 - 33:35
    controller
  • 33:35 - 33:39
    for all the devices should there be a
    controller for each class of the bonds
  • 33:39 - 33:43
    how should we in device u
  • 33:43 - 33:45
    connect up with the poultry controller
  • 33:45 - 33:50
    one of your apartment building and
    endure controller detects devices that
  • 33:50 - 33:52
    are in the into an apartment
  • 33:52 - 33:56
    this is certainly a great we probably
    have with that
  • 33:56 - 34:00
    uh... electric blanket where the two
    parties have the control switch
  • 34:00 - 34:04
    was turning up to get warmer the others
    turning down a bit cooler aggressive
  • 34:04 - 34:05
    across the net
  • 34:05 - 34:09
    uh... so this is their these questions
    that are actually pretty hard
  • 34:09 - 34:13
    and i think some of us are going to have
    to figure out what's the right way to do
  • 34:13 - 34:13
    it
  • 34:13 - 34:15
    problem for the on wireless
  • 34:15 - 34:19
    well depending on where they were
    installed you may or may not have been
  • 34:19 - 34:22
    radio connectivity even just inside the
    house
  • 34:22 - 34:25
    so some of them i have to be wired
    summary wireless employees different
  • 34:25 - 34:27
    frequencies
  • 34:27 - 34:29
    now this is easy and every device
  • 34:29 - 34:33
    that is sold to be part of the sensor s
  • 34:33 - 34:36
    so i have to be adaptable to different
    conditions depending
  • 34:36 - 34:39
    once found a place for install
  • 34:39 - 34:40
    uh... on the factory floor
  • 34:40 - 34:44
    uh... there are similar kinds of scale
    questions that occurred once again very
  • 34:44 - 34:45
    important
  • 34:45 - 34:47
    to make sure that the user
  • 34:47 - 34:50
    control only by parties that have the
    authority to do that you don't want
  • 34:50 - 34:54
    some random person halfway around the
    world turned on
  • 34:54 - 34:57
    in manufacturing device and possibly or
  • 34:57 - 34:58
    one of the workers
  • 34:58 - 35:01
    uh... they are the question is whether
    the devices interact with each other
  • 35:01 - 35:05
    whether they'll be directly nationalized
  • 35:05 - 35:08
    and here we get into the interesting
    example one of the art rock system where
  • 35:08 - 35:10
    the devices are released for jun
  • 35:10 - 35:11
    in addition
  • 35:11 - 35:13
    providing uh...
  • 35:13 - 35:15
    censored
  • 35:15 - 35:17
    census data
  • 35:17 - 35:18
    process today
  • 35:18 - 35:21
    uh... and then uh... providing it to
    some
  • 35:21 - 35:22
    king lear
  • 35:22 - 35:25
    but they also are part of that work
    which is something to happen
  • 35:25 - 35:28
    uh... to uh... local radio condition
  • 35:28 - 35:29
    so on
  • 35:29 - 35:30
    this is an d
  • 35:30 - 35:33
    the questions or almost endless
  • 35:33 - 35:35
    here's some more here
  • 35:35 - 35:37
    and decide what ideas
  • 35:37 - 35:41
    they should have you generate the state
    using ninety b six presumably because
  • 35:41 - 35:43
    before useful
  • 35:43 - 35:44
    but there is a
  • 35:44 - 35:47
    a question about previous should be
  • 35:47 - 35:49
    what you have this is the
  • 35:49 - 35:51
    another remembered
  • 35:51 - 35:55
    we're out of discovery online discover
    other devices that are part of the
  • 35:55 - 35:56
    system
  • 35:56 - 36:00
    uh... some of you will know a little bit
    about convoluted system works if you use
  • 36:00 - 36:02
    it you know that we can devices are
  • 36:02 - 36:04
    in close enough proximity
  • 36:04 - 36:06
    uh... one of them were
  • 36:06 - 36:07
    present
  • 36:07 - 36:11
    which you you enter into the other one
    in order to confirm that you want to do
  • 36:11 - 36:12
    my cv
  • 36:12 - 36:17
    connected now the question is whether
    every device in this garment is uh...
  • 36:17 - 36:19
    hazardous waste even though we were not
  • 36:19 - 36:22
    and if it doesn't mean we start thinking
    or hawaii
  • 36:22 - 36:26
    how to manage these things and it could
    be the journal while becomes the devices
  • 36:26 - 36:31
    used not only to control and that also
    to configure
  • 36:31 - 36:35
    and so I'd be in the possibilities here
    are fairly uh...
  • 36:35 - 36:36
    complex
  • 36:36 - 36:39
    and we're gonna have to figure out how
    to make that work
  • 36:39 - 36:44
    what about what to it's very attracted
    to be a little website
  • 36:44 - 36:49
    and say i would like to using uh...
    webpage diminish my devices
  • 36:49 - 36:51
    and if we standardize things properly
  • 36:51 - 36:55
    then third parties will be able to offer
    service to manager systems fourteen
  • 36:55 - 36:58
    think about entertainment you know about
    you
  • 36:58 - 37:02
    i have lots of boxes at home and have
    infrared controllers for
  • 37:02 - 37:05
    and usually i fumble around for a while
    trying to figure out which controllers
  • 37:05 - 37:07
    the right one for which box
  • 37:07 - 37:10
    and when i finally got that right that's
    the controller that bad
  • 37:10 - 37:13
    so if we put all of them are going well
    network
  • 37:13 - 37:17
    and we use the mobile which is also a
    little old man is the controller of the
  • 37:17 - 37:19
    things that happen can be in court
  • 37:19 - 37:24
    uh... then that means third parties
    intervenes english if you'll allow them
  • 37:24 - 37:27
    would be the manager of the devices and
    all you do is go to the web sites and
  • 37:27 - 37:31
    what the sound of movies please populate
    all various devices
  • 37:31 - 37:33
    which is entertainment country
  • 37:33 - 37:34
    is of interest to me
  • 37:34 - 37:38
    so out is just incredibly uh...
  • 37:38 - 37:40
    rich character what about state
    information
  • 37:40 - 37:43
    if you have uh...
  • 37:43 - 37:45
    things that are are gathering data about
  • 37:45 - 37:50
    the temperature humidity levels in my
    case or other things about house
  • 37:50 - 37:52
    you may be able to infer whether
    anybody's at home
  • 37:52 - 37:54
    how many people were home
  • 37:54 - 37:55
    uh... went up
  • 37:55 - 37:58
    in the morning on active depending on
    what information is available
  • 37:58 - 38:02
    that could pose a security hazard
  • 38:02 - 38:04
    especially if they can't figure out
    nobody's home
  • 38:04 - 38:08
    so again this is a question of what
    information should be available
  • 38:08 - 38:11
    who should have access to it and control
    that
  • 38:11 - 38:17
    so there's just goes it's a long long
    listed updates that we're cope with
  • 38:17 - 38:20
    here's another interesting things that
    are part of
  • 38:20 - 38:24
    uh... typically cable provider
    configures these things up for you
  • 38:24 - 38:27
    uh... and it operates the controller
    forty
  • 38:27 - 38:31
    and offers web access is uh... sheila to
    control the system
  • 38:31 - 38:35
    and if so how boxes of these on american
    interact with each other like charity
  • 38:35 - 38:36
    art
  • 38:36 - 38:41
    so that's a common example but one thing
    what happens if we transform decency
  • 38:41 - 38:43
    devices there i could be sixty
  • 38:43 - 38:46
    and they have the ability to reach out
    and use the Internet in addition to
  • 38:46 - 38:47
    everything else
  • 38:47 - 38:48
    now they become
  • 38:48 - 38:53
    since it could be streaming video from
    other sources sending cable television
  • 38:53 - 38:53
    company
  • 38:53 - 38:57
    and that interestingly enough creates a
    conflict right because the cable tv
  • 38:57 - 39:00
    guide supplying him with broadband
    access to the Internet
  • 39:00 - 39:02
    discovers that
  • 39:02 - 39:05
    you're using the broadband Internet to
    get access to somebody else's video
  • 39:05 - 39:07
    which messes up your business model
  • 39:07 - 39:11
    which leads to a possible or desire to
    prevent you from getting video from
  • 39:11 - 39:13
    anybody but damn
  • 39:13 - 39:17
    back isn't in the calendar dates and
    everything else is a very quickly
  • 39:17 - 39:20
    as we pursue these technical problems we
    also cover
  • 39:20 - 39:22
    uh... an honors
  • 39:22 - 39:25
    various policy issues that have to be
    resolved
  • 39:25 - 39:28
    uh... and i've already talked about your
    chocolate
  • 39:28 - 39:30
    so uh... or the other
  • 39:30 - 39:33
    question is diversity in uniformity
  • 39:33 - 39:36
    uh... one uniformity is really helpful
    because it allows you to your
  • 39:36 - 39:37
    opportunity
  • 39:37 - 39:41
    diversity dot is important because you
    want to be able to trying new things and
  • 39:41 - 39:44
    figuring out how to cope with both of us
    at the same time
  • 39:44 - 39:46
    up to be true
  • 39:46 - 39:50
    this part of it is a program was started
    by the department of commerce department
  • 39:50 - 39:52
    of energy about four years ago
  • 39:52 - 39:57
    and their initial focus was to create
    margaret interoperability panel
  • 39:57 - 39:59
    to encourage
  • 39:59 - 40:02
    standards for the devices that are part
    of a smart grid
  • 40:02 - 40:06
    so they can be managed to they could
    respond for example to it by saying
  • 40:06 - 40:08
    that uh...
  • 40:08 - 40:12
    the uh... power grid was reaching people
    and would you please let me go water
  • 40:12 - 40:14
    earlier condition for a while
  • 40:14 - 40:18
    this is important because the ability to
    control world was not billed
  • 40:18 - 40:22
    capacity excess capacity that's only a
    small percentage of time
  • 40:22 - 40:25
    and so that's a good or thrilled
  • 40:25 - 40:28
    capability disability sake please don't
    use electricity
  • 40:28 - 40:32
    but you also have the opportunity to get
    to report back on which devices were
  • 40:32 - 40:35
    used during the course in montana
    element
  • 40:35 - 40:38
    now tell you something about my record
    that was what it is and that feedback
  • 40:38 - 40:39
    loop
  • 40:39 - 40:43
    is what helps us decide whether we
    change our lifestyle
  • 40:43 - 40:46
    possibly for economic reasons are really
    just care about the environment we want
  • 40:46 - 40:48
    to change or
  • 40:48 - 40:49
    abuse
  • 40:49 - 40:51
    electricity for example
  • 40:51 - 40:55
    so again a whole series of issues
    associated with smartly program that or
  • 40:55 - 40:56
    not
  • 40:56 - 40:59
    uh... once was the sensor networks
    except one thing you should really
  • 40:59 - 41:00
    different
  • 41:00 - 41:02
    up until uh... recently
  • 41:02 - 41:06
    most of the car generated in the united
    states essentially generated in
  • 41:06 - 41:08
    distributed over collins
  • 41:08 - 41:12
    without reaching a point where we are
    capable putting generation capability to
  • 41:12 - 41:14
    be adjusted
  • 41:14 - 41:18
    and he gets even more dramatic when you
    go from this photovoltaic candidate
  • 41:18 - 41:20
    manpower possibly view
  • 41:20 - 41:21
    thermal
  • 41:21 - 41:25
    uh... as a generators of electricity in
    your home
  • 41:25 - 41:28
    now it's more again electric cars
  • 41:28 - 41:29
    make began
  • 41:29 - 41:33
    so now you have the possibility no
    holding power out of the system recharge
  • 41:33 - 41:37
    cars were pushing power into the system
    that i want to think about control
  • 41:37 - 41:39
    theory if you put it in school
  • 41:39 - 41:43
    it gets more complicated systems that
    will push and pull at the city
  • 41:43 - 41:46
    at you know at the same time
  • 41:46 - 41:47
    problem that we are
  • 41:47 - 41:49
    independently
  • 41:49 - 41:52
    uh... every or every household united
    states is either generating electricity
  • 41:52 - 41:54
    reporting electricity
  • 41:54 - 41:56
    hideouts assistant like that
  • 41:56 - 41:59
    and so if you're interested in some of
    the thinking about that look at my
  • 41:59 - 42:00
    grades
  • 42:00 - 42:04
    uh... google search on that because the
    ideas artists consider actually just
  • 42:04 - 42:05
    really
  • 42:05 - 42:07
    electrical power generation farther
  • 42:07 - 42:09
    so that we live so dependent on one
  • 42:09 - 42:12
    uh... singles samples solely
  • 42:12 - 42:18
    in a particular area simply right before
    it was in all kinds of people here
  • 42:18 - 42:21
    this vote leads me to one other thing
    about uh...
  • 42:21 - 42:25
    Internet him thing that uh... like uh...
    mentioned earlier about
  • 42:25 - 42:27
    policy
  • 42:27 - 42:29
    for the big issues that we have today
  • 42:29 - 42:30
    is that
  • 42:30 - 42:31
    there are
  • 42:31 - 42:32
    countries
  • 42:32 - 42:36
    this see how important the Internet is
    but they're nervous about it because
  • 42:36 - 42:37
    they have since
  • 42:37 - 42:40
    democratic ability to let people share
    information
  • 42:40 - 42:41
    and for some data
  • 42:41 - 42:44
    authoritarian regimes that's a threat
  • 42:44 - 42:47
    we've seen the outcomes for example in
    europe spring
  • 42:47 - 42:50
    I'd like to emphasize something for you
    mean some people were pounding their
  • 42:50 - 42:54
    chests and looking uh... Internet was
    that part of or face book and others
  • 42:54 - 42:55
    were
  • 42:55 - 42:57
    part of the air strain is wonderful
  • 42:57 - 43:01
    except the outcomes revolutions don't
    always come out where you would like
  • 43:01 - 43:04
    and right now we're seeing some pretty
    difficult problems in egypt for example
  • 43:04 - 43:08
    in libya for example in syria for
    example
  • 43:08 - 43:10
    uh... he changes of the
  • 43:10 - 43:12
    places where the
  • 43:12 - 43:17
    the arabs friends started teenage is
    probably one which is happy
  • 43:17 - 43:21
    i don't use the word placid exactly but
    it was more stable
  • 43:21 - 43:24
    regime change for the others have been
    very very difficult
  • 43:24 - 43:29
    so i want to be careful not to
  • 43:29 - 43:33
    the role of the Internet analysts as if
    it is uniformly positive
  • 43:33 - 43:38
    you have to be really thoughtful about
    how you recover from major rethinking
  • 43:38 - 43:40
    but what this is like to
  • 43:40 - 43:41
    is a real debate about
  • 43:41 - 43:42
    uh... what
  • 43:42 - 43:45
    role governments have in the control of
    the Internet
  • 43:45 - 43:48
    for all of us uh... in the Internet
    world
  • 43:48 - 43:52
    uh... historically we've seen this is a
    very violent thing multiple stakeholders
  • 43:52 - 43:53
    are
  • 43:53 - 43:54
    interested him
  • 43:54 - 43:56
    making decisions about policy
  • 43:56 - 43:59
    they're the ones that are affected by
    whether it's a technical community the
  • 43:59 - 44:01
    general public
  • 44:01 - 44:02
    civil society
  • 44:02 - 44:04
    the government's the private sector
  • 44:04 - 44:07
    are all having equal state
  • 44:07 - 44:10
    him what happens in the policy many
  • 44:10 - 44:13
    and yet many of the intergovernmental
    institutions like the international
  • 44:13 - 44:15
    telecommunications union
  • 44:15 - 44:18
    see this is the province of governments
    to make policy
  • 44:18 - 44:23
    and uh... this is a place where there's
    plenty of opportunity for intervention
  • 44:23 - 44:27
    they world summit on the information
    society which began in two thousand
  • 44:27 - 44:28
    three
  • 44:28 - 44:31
    began with the premise that there would
    be an information society and we were
  • 44:31 - 44:36
    seen emerge of its own when did it mean
    firmly
  • 44:36 - 44:37
    policy point of view
  • 44:37 - 44:40
    and the first thing that these
    government officials where this is a
  • 44:40 - 44:41
    intergovernmental
  • 44:41 - 44:42
    discussion
  • 44:42 - 44:46
    first thing that they asked was what
    information society
  • 44:46 - 44:47
    ends there
  • 44:47 - 44:49
    people said well the Internet is an
    example
  • 44:49 - 44:52
    so they said what was in charge of the
    Internet
  • 44:52 - 44:55
    not nothing could possibly be tuesday
  • 44:55 - 44:59
    if it was essentially mentioned we said
    well nobody is a distributed system and
  • 44:59 - 45:01
    they didn't believe this
  • 45:01 - 45:03
    so then they discovered that i can
  • 45:03 - 45:07
    because i can't has responsibility for
    idea dress allocations and meeting
  • 45:07 - 45:08
    management
  • 45:08 - 45:11
    and they decided and i can this be a
    tragedy
  • 45:11 - 45:15
    and then they said it wasn't right if i
    can they decided i cant government
  • 45:15 - 45:18
    contract with the department of commerce
    twenty nine and must be in charge of
  • 45:18 - 45:20
    either
  • 45:20 - 45:23
    that us is in terms of the Internet
    patents sit well with some of the
  • 45:23 - 45:27
    country set back pain us attorney unit
    has been
  • 45:27 - 45:29
    uh... a persistent uh...
  • 45:29 - 45:32
    issue since two thousand three
  • 45:32 - 45:37
    Internet governance forum was created
    out of the world somebody information
  • 45:37 - 45:41
    society as a place where we could talk
    about issues arising in the inner it's a
  • 45:41 - 45:43
    very important multi stakeholder
  • 45:43 - 45:45
    system or
  • 45:45 - 45:46
    function
  • 45:46 - 45:48
    it doesn't make decisions
  • 45:48 - 45:50
    this turns out to be really important
  • 45:50 - 45:54
    because he'd make decisions if you're if
    you drafts uh...
  • 45:54 - 45:55
    communiques
  • 45:55 - 45:59
    or make recommendations you have to
    argue with each other you end up doing
  • 45:59 - 46:01
    uh... you know these little words
    missing things
  • 46:01 - 46:04
    in the end what we want is people going
    away understanding what are the issues
  • 46:04 - 46:08
    like facing Internet how should they be
    dressed in battle
  • 46:08 - 46:14
    but not by idea atf_ is their as a way
    of surfacing problems helping people
  • 46:14 - 46:16
    figure u
  • 46:16 - 46:21
    i'm ireland let me just get through
    organ international talks non-stop about
  • 46:21 - 46:24
    some of you follow the world conference
    on
  • 46:24 - 46:28
    information technology know that there
    was a major earthquake
  • 46:28 - 46:32
    this was intended to revise the
    international talk on regulations
  • 46:32 - 46:35
    which had been touched his nineteen
    eighty eight and at that point poorest
  • 46:35 - 46:36
    people
  • 46:36 - 46:39
    government officials especially when
    thinking about you know
  • 46:39 - 46:43
    so they didn't take into account what
    unit was like and what he could do
  • 46:43 - 46:45
    how could subsumed mobile solely
  • 46:45 - 46:48
    earlier telecommunications applications
  • 46:48 - 46:49
    system
  • 46:49 - 46:50
    which it has done
  • 46:50 - 46:55
    so they try to revise these things and
    the uh... countries that were most
  • 46:55 - 46:57
    interested in finding ways to control
  • 46:57 - 47:02
    Internet wanted to use the international
    telecom regulation revision as a way of
  • 47:02 - 47:02
    gaining
  • 47:02 - 47:04
    authority over the net
  • 47:04 - 47:09
    so they try to put language into a high
    tea arms that uh... spoke of spam for
  • 47:09 - 47:10
    example
  • 47:10 - 47:12
    spoke with security
  • 47:12 - 47:13
    smoker
  • 47:13 - 47:17
    viruses worms and source well those are
    applications that country
  • 47:17 - 47:21
    and never in history international talk
    i mean you know her
  • 47:21 - 47:22
    dot hunt and he was
  • 47:22 - 47:24
    it was standardizing telephone
  • 47:24 - 47:28
    uh... interaction and originally
    delaware interactions
  • 47:28 - 47:30
    but it was never responsible for content
  • 47:30 - 47:33
    they didn't control what he did say on
    the phone
  • 47:33 - 47:36
    they only trying to make sure you can
    make a phone call
  • 47:36 - 47:40
    well i think the Internet to be the same
    way that these guys concede that way
  • 47:40 - 47:42
    the result of the debate
  • 47:42 - 47:45
    was that uh... of the hundred and forty
    seven countries
  • 47:45 - 47:47
    that attended
  • 47:47 - 47:50
    eighty-nine signed the resulting
    treating fifty-five walk away including
  • 47:50 - 47:53
    the united states which is the right
    thing to do
  • 47:53 - 47:57
    so if that is the biggest schism
    international
  • 47:57 - 48:01
    negotiations regarding telecom that's
    ever happened in history the iq
  • 48:01 - 48:04
    i think it's a very important uh... data
    point
  • 48:04 - 48:08
    and i think that which actually kind of
    take advantage of the fact that there is
  • 48:08 - 48:09
    disagreeing
  • 48:09 - 48:11
    in order to force people to face it
  • 48:11 - 48:13
    at the Internet is different
  • 48:13 - 48:15
    approval via the telephone system
  • 48:15 - 48:17
    we've been dealt with in the past
  • 48:17 - 48:21
    skip over to privacy and safety
  • 48:21 - 48:26
    you hear security security security is
    an issue on the Internet
  • 48:26 - 48:29
    what I'd like to suggest to use that
    word causes people to think too much
  • 48:29 - 48:30
    about uh...
  • 48:30 - 48:33
    national security and think about
  • 48:33 - 48:35
    nation state tax and so what would
    happen
  • 48:35 - 48:37
    cases is not argue that they don't
  • 48:37 - 48:39
    but the general public
  • 48:39 - 48:41
    goes this way
  • 48:41 - 48:44
    at the point where we're talking actual
    security
  • 48:44 - 48:45
    what they don't
  • 48:45 - 48:49
    it fully appreciate is that they are
    also part of the problem
  • 48:49 - 48:51
    but its safety daycare
  • 48:51 - 48:55
    they would like to be feel like they're
    safe on the Internet and they don't give
  • 48:55 - 48:58
    us a fight because orders policy of
    reported
  • 48:58 - 48:59
    so i'm
  • 48:59 - 49:00
    thinking that we should be
  • 49:00 - 49:04
    working out uh... kind of cyber fire
    depart
  • 49:04 - 49:08
    velvet model i have in my head into
    somebody standing in front of his uh...
  • 49:08 - 49:11
    his house was burning down and he's got
    a garden hose
  • 49:11 - 49:15
    and he's taking any somebody with the
    rows and more water
  • 49:15 - 49:18
    in order for this out in the first thing
    the comes to mind is not to call the
  • 49:18 - 49:19
    police department
  • 49:19 - 49:21
    you call firepower
  • 49:21 - 49:25
    so we don't have a sucker for apartment
    in for a lot of individuals
  • 49:25 - 49:28
    households and small businesses and
    everything else they don't have the
  • 49:28 - 49:31
    expertise to put out a certified
  • 49:31 - 49:34
    they don't know what to do about being
    infected within a matter of fact that
  • 49:34 - 49:37
    they don't know what to do about cyber
    tackled
  • 49:37 - 49:42
    and what they have cyber for in incall
  • 49:42 - 49:45
    as a business or vigil
  • 49:45 - 49:48
    but the rules may have to be different
    from what we did when we actually caught
  • 49:48 - 49:51
    fire department your neighbor can call
    fire department to be seizure house on
  • 49:51 - 49:52
    fire
  • 49:52 - 49:55
    the fire department feels free to come
    in and broke windows in the rules in
  • 49:55 - 49:58
    order for the fire because the
    neighborhood it is addressed
  • 49:58 - 49:59
    so far is out
  • 49:59 - 50:02
    but now they have in your competitor
    calls a cyber fire department says
  • 50:02 - 50:06
    you're under attack cases are fire
    department comes out break settling down
  • 50:06 - 50:09
    for three days trying to figure out what
    the problem is in wilder out of business
  • 50:09 - 50:11
    and your competitors flailing
  • 50:11 - 50:13
    so the rules for
  • 50:13 - 50:19
    uh... indeed start for artwork the
    different media before
  • 50:19 - 50:20
    for example
  • 50:20 - 50:23
    i think it's important in this analogy
    is
  • 50:23 - 50:26
    the fire department aptly put out the
    fire try to figure out why the fire
  • 50:26 - 50:27
    started
  • 50:27 - 50:32
    interviews are some and suddenly the
    police department of the heroes on for
  • 50:32 - 50:33
    some gets the ball
  • 50:33 - 50:35
    you can imagine a similar kind of
    scenario
  • 50:35 - 50:39
    something else happens the fire
    department economic inspector building
  • 50:39 - 50:41
    to see whether or not meet parker
  • 50:41 - 50:43
    and we have fire codes for buildings
  • 50:43 - 50:45
    and and that you can imagine
  • 50:45 - 50:47
    looking for
  • 50:47 - 50:51
    advice and even some rules for designing
    systems that are safer
  • 50:51 - 50:52
    than others
  • 50:52 - 50:56
    just like we have rules for doing
    buildings that are safer examples forget
  • 50:56 - 51:00
    multiple exits entrances for for
    safety's sake
  • 51:00 - 51:04
    so i think that we are at a period of
    time worthless consider
  • 51:04 - 51:05
    uh... me
  • 51:05 - 51:08
    invention of the summer for a car
  • 51:08 - 51:10
    their country of the things here that
  • 51:10 - 51:11
    dimension
  • 51:11 - 51:14
    i have a few other things to talk about
    it also no
  • 51:14 - 51:15
    vietnam
  • 51:15 - 51:16
    pretty close to having
  • 51:16 - 51:20
    borden vols or i can't believe it
  • 51:20 - 51:22
    here's the problem
  • 51:22 - 51:24
    digital signatures are really attractive
    right
  • 51:24 - 51:27
    significance and usually sign things
    anywhere
  • 51:27 - 51:29
    the question is legally
  • 51:29 - 51:32
    is is it is a digital signature binding
  • 51:32 - 51:36
    and it's not percent clear right now
    especially international business
  • 51:36 - 51:41
    whether or not a contract has been
    signed usually it has weighed in court
  • 51:41 - 51:45
    and so there's eighteen missing uh...
  • 51:45 - 51:46
    assessment
  • 51:46 - 51:49
    uh... either there is legislation does
    require
  • 51:49 - 51:54
    or the international treaties required
    in order to determine whether or not
  • 51:54 - 51:56
    digital signature on a contract is
    binding
  • 51:56 - 52:00
    we don't have uh... agreements yet
    cleaning up but i think you would you
  • 52:00 - 52:01
    wouldn't have
  • 52:01 - 52:02
    words but
  • 52:02 - 52:05
    come to some agreement about that
  • 52:05 - 52:08
    i'm sure all of you are aware of the
    current state of debate on intellectual
  • 52:08 - 52:10
    property
  • 52:10 - 52:11
    on the path inside
  • 52:11 - 52:14
    software patents to turn out to be a
    nightmare
  • 52:14 - 52:17
    and uh... i think all those who
    recognize what that is
  • 52:17 - 52:22
    the best example i can give you a wild
    and this is important for creativity and
  • 52:22 - 52:23
    innovation
  • 52:23 - 52:24
    is html
  • 52:24 - 52:26
    when the first browsers for me
  • 52:26 - 52:28
    even when the timbers needed
  • 52:28 - 52:32
    uh... they had to feature the you can
    actually asking to show you the html
  • 52:32 - 52:33
    source
  • 52:33 - 52:35
    and you could figure out how do they do
    that
  • 52:35 - 52:39
    and then they copied each other and it
    was great because you know webmasters
  • 52:39 - 52:40
    learn from each other
  • 52:40 - 52:44
    they develop new ideas everybody got to
    try new things out and give them the
  • 52:44 - 52:45
    evolution
  • 52:45 - 52:47
    the webpage was pretty dramatic
  • 52:47 - 52:51
    over a very short period of time because
    people share each other's ideas and use
  • 52:51 - 52:51
    it
  • 52:51 - 52:53
    of html
  • 52:53 - 52:57
    uh... in that's just one example of the
    reason why open this has been so
  • 52:57 - 53:00
    valuable that's why google makes
    open-source available creme brulee
  • 53:00 - 53:06
    increment croats for the same reasons
    but right now there's a lot of attention
  • 53:06 - 53:07
    comes to copyright
  • 53:07 - 53:09
    it's a whole other story
  • 53:09 - 53:12
    uh... some of you will remember the
    uh...
  • 53:12 - 53:13
    uh... in the
  • 53:13 - 53:14
    our constitution
  • 53:14 - 53:17
    the notion of copyright was installed in
    there
  • 53:17 - 53:19
    as for two reasons
  • 53:19 - 53:22
    to benefit the party who had created a
    work
  • 53:22 - 53:24
    for a limited period of time
  • 53:24 - 53:27
    originally was fourteen years
  • 53:27 - 53:30
    and if you were the author of something
    that you could control who can make
  • 53:30 - 53:32
    copies of it for that period of time
  • 53:32 - 53:35
    if you were still alive after fourteen
    years ago actually had an option to
  • 53:35 - 53:38
    extend the copyright again for another
    fourteen years
  • 53:38 - 53:41
    i think you had to make the payment to
    do that
  • 53:41 - 53:43
    well what has happened over the whole
    and then
  • 53:43 - 53:45
    after that period had expired
  • 53:45 - 53:48
    the work became part of the public
    domain
  • 53:48 - 53:51
    intent here to benefit the population
  • 53:51 - 53:52
    in the words are in there
  • 53:52 - 53:56
    exactly that way what has happened over
    the course of a couple of years
  • 53:56 - 53:59
    is that the intellectual property
    community has extended
  • 53:59 - 54:01
    the lifetime
  • 54:01 - 54:03
    for but the copyright holder s
  • 54:03 - 54:07
    seventy five years after the death of
    the office
  • 54:07 - 54:11
    this feels a little excessive to me
    because it seems to have left out
  • 54:11 - 54:14
    the idea that things in the public
    domain would benefit the general public
  • 54:14 - 54:17
    i think we've been waiting for
  • 54:17 - 54:20
    we're seeing similar problems with
    passed because we have people fighting
  • 54:20 - 54:21
    overpass
  • 54:21 - 54:24
    that expanding billions of dollars
  • 54:24 - 54:28
    things it probably should have been
    patented in the first place i think this
  • 54:28 - 54:31
    is a largely approval of software
  • 54:31 - 54:35
    so uh... this is a big problem in some
    of us into technical world were about
  • 54:35 - 54:37
    do indeed with the legal people
  • 54:37 - 54:41
    in order to work through the
    implications of changing
  • 54:41 - 54:42
    love the way these things work
  • 54:42 - 54:46
    and final thing i wanted to mention on
    the slide has to do with the problem
  • 54:46 - 54:47
    that
  • 54:47 - 54:50
    uh... we are increasingly creating
    digital content
  • 54:50 - 54:55
    every day when we use word processing
    programs that were used for entry to usa
  • 54:55 - 54:58
    uh... presentation software kind or
    another
  • 54:58 - 55:00
    we create fairly complex digital files
  • 55:00 - 55:04
    say this is the big business in those
    files were only meaningful with the
  • 55:04 - 55:06
    software that created them is available
  • 55:06 - 55:10
    and one of the problems that arise this
    is an overtime
  • 55:10 - 55:13
    that's offering up the executed
  • 55:13 - 55:15
    on the machines that you have available
  • 55:15 - 55:18
    and so if you carefully stored the bits
    and you've moved them from the five
  • 55:18 - 55:23
    quarter-inch floppy do the three and a
    half incentive you know the uh... dvds
  • 55:23 - 55:24
    or cds
  • 55:24 - 55:29
    to any and seller if you move the dates
    from one begin to another if there is no
  • 55:29 - 55:33
    guarantee that the software that created
    them will still be money machine that
  • 55:33 - 55:34
    you're currently
  • 55:34 - 55:37
    using or the operating system that we
    currently using
  • 55:37 - 55:39
    uh... the uh...
  • 55:39 - 55:41
    lol might uh...
  • 55:41 - 55:43
    experiment i remember whose
  • 55:43 - 55:45
    what happens in this year's three
    thousand
  • 55:45 - 55:47
    and you've got a google search
  • 55:47 - 55:51
    and in turn up in nineteen ninety seven
    qar point five
  • 55:51 - 55:54
    the question suppose you're running
    windows three thousand images for the
  • 55:54 - 55:55
    sake of argument
  • 55:55 - 55:58
    and the question is will the windows
    three thousand package interpreting
  • 55:58 - 56:02
    nineteen ninety-seven powerpoint file
    correctly answered probably no
  • 56:02 - 56:06
    and this is not a gratuitous vega
    microsoft even if you're using open
  • 56:06 - 56:07
    source
  • 56:07 - 56:09
    mechanisms that the other
    hundred-percent through the open source
  • 56:09 - 56:13
    programs would continue to be compiled
    worry machine
  • 56:13 - 56:14
    up until the year three thousand
  • 56:14 - 56:18
    so there's a real challenge their which
    is maintaining the ability to interpret
  • 56:18 - 56:19
    the debts
  • 56:19 - 56:22
    in scientific data it's even worse
  • 56:22 - 56:23
    because he he
  • 56:23 - 56:27
    uh... track not only in the distant
    cells from in san diego calibration
  • 56:27 - 56:28
    instruments
  • 56:28 - 56:31
    uh... in the conditions under which the
    data was collected
  • 56:31 - 56:35
    we don't have a bridging right now
  • 56:35 - 56:40
    either a few more that we can retain
    information or even that we can get
  • 56:40 - 56:41
    access to software
  • 56:41 - 56:43
    when the company goes out of business
  • 56:43 - 56:45
    or when they with lisa
  • 56:45 - 56:49
    a new version is not compatible with the
    previous one how do we get access to the
  • 56:49 - 56:51
    previous of software
  • 56:51 - 56:55
    there are there is no current regime
    which recognizes the importance of
  • 56:55 - 56:56
    retaining
  • 56:56 - 56:58
    uh... access to the scheduled days
  • 56:58 - 57:00
    some of you probably saw the movie
    lincoln
  • 57:00 - 57:02
    and you've ever reading a book
  • 57:02 - 57:03
    called
  • 57:03 - 57:06
    a team of rivals by doris kearns good
  • 57:06 - 57:09
    one of the interesting things about
    herblock usage fee reconstructed the
  • 57:09 - 57:11
    dialogue with the time
  • 57:11 - 57:14
    by going to a hundred different
    libraries and finding the lenders
  • 57:14 - 57:17
    principles in that uh... story
  • 57:17 - 57:18
    had said to each other
  • 57:18 - 57:22
    she was able to reconstruct dialogue
    based on their imagine the june twenty
  • 57:22 - 57:26
    second century and trying to reproduce
    what life was like in are twenty first
  • 57:26 - 57:27
    century
  • 57:27 - 57:31
    everything we've done is scheduled it's
    all done it's unacceptable they will
  • 57:31 - 57:33
    never be at the moment we work
  • 57:33 - 57:37
    we we will not be good ancestors we will
    be invisible ancestors
  • 57:37 - 57:40
    so we can not this would have to figure
    out how to do background
  • 57:40 - 57:41
    ocampo
  • 57:41 - 57:43
    team well
  • 57:43 - 57:45
    you know what
  • 57:45 - 57:48
    through getting lazy
  • 57:48 - 57:49
    i really feel
  • 57:49 - 57:52
    compelled to tell you some of this is it
    ok
  • 57:52 - 57:54
    uh... so
  • 57:54 - 57:57
    this is the thing that's interesting
    about the Internet is that despite the
  • 57:57 - 57:59
    fact that bomb in a local celebrate
  • 57:59 - 58:03
    the fortieth anniversary of the design
  • 58:03 - 58:06
    paper was published in may of seventy
    four of the original papers written in
  • 58:06 - 58:08
    september of seventy three
  • 58:08 - 58:10
    and we turn the system on
  • 58:10 - 58:12
    on january one nineteen eighty three
  • 58:12 - 58:16
    sows an operational for thirty years in
    spite of this age
  • 58:16 - 58:19
    uh... it has a long pretty dramatically
    and there are lots of things that are
  • 58:19 - 58:23
    still going on there could be done with
    the open flow idea stanford university
  • 58:23 - 58:27
    and it begins with is a particularly
    interesting example
  • 58:27 - 58:29
    you know when we don't balance
  • 58:29 - 58:31
    with cisco another still drives
  • 58:31 - 58:33
    big is the address base
  • 58:33 - 58:36
    on the packets to figure out where they
    should welcome so you look at the
  • 58:36 - 58:39
    destination addressing look it up in a
    cable news where doctor replied the
  • 58:39 - 58:41
    cable companies
  • 58:41 - 58:43
    fourteen thousand you do that
  • 58:43 - 58:47
    mitnick in his guys said wildly limiting
    ourselves to the end respects
  • 58:47 - 58:51
    it why can't use other events in the
    packet to tell us where out things what
  • 58:51 - 58:55
    we did look at the other states at all
    just look at the content decided how to
  • 58:55 - 58:56
    wrap based on that
  • 58:56 - 58:59
    as a slightly multitask like ring to it
    at that because you can imagine
  • 58:59 - 59:00
    announcing
  • 59:00 - 59:02
    you were interested in this kind of
    content
  • 59:02 - 59:06
    and everybody knows that i'm interested
    in that kind of content would get copies
  • 59:06 - 59:09
    of the package because the drowning
    people would say anybody that said they
  • 59:09 - 59:09
    wanted
  • 59:09 - 59:12
    that content we were back to that
    smoking yes
  • 59:12 - 59:16
    so what what they have done basically is
    open up the notion of routing too much
  • 59:16 - 59:18
    broader range possibilities
  • 59:18 - 59:20
    this is really powerful stuff
  • 59:20 - 59:24
    and i don't have time to go to all the
    details of the global
  • 59:24 - 59:26
    decided to build an hour
  • 59:26 - 59:30
    wide area network backbone that connects
    all of our data centers together using
  • 59:30 - 59:31
    open flow
  • 59:31 - 59:34
    so over a period of about eighteen
    months aboard where we work with the
  • 59:34 - 59:35
    overflow team
  • 59:35 - 59:36
    we actually implemented
  • 59:36 - 59:40
    and open for hours and we build
    ourselves and we put into operation in
  • 59:40 - 59:43
    the backbone latino business together
  • 59:43 - 59:44
    it's given us
  • 59:44 - 59:47
    substantially better performance in
    terms of uh... your station of the
  • 59:47 - 59:48
    optical
  • 59:48 - 59:51
    uh... network that links are data
    centers
  • 59:51 - 59:55
    so have very ambitious thing to do
    identity do with it some thought that i
  • 59:55 - 60:00
    can taken credit don't want you earth
    also as our senior vp for information
  • 60:00 - 60:01
    for infrastructure
  • 60:01 - 60:04
    and his team just landed
  • 60:04 - 60:05
    and it's really impressive
  • 60:05 - 60:10
    uh... so this is an example of breaking
    uh... out over donor card it will
  • 60:10 - 60:13
    emulate everything literary robert do
  • 60:13 - 60:16
    because use text of the actors
  • 60:16 - 60:19
    but the fact is is like any technology
    worded
  • 60:19 - 60:21
    does the previous thing
  • 60:21 - 60:24
    and then because you using new
    technology to do the previous thing you
  • 60:24 - 60:27
    can send you step in the body of your
    life you can do it
  • 60:27 - 60:29
    uh... that's very
  • 60:29 - 60:32
    uh... another we talked about
    configuration management and the
  • 60:32 - 60:34
    Internet things
  • 60:34 - 60:37
    problem certificates and certification
  • 60:37 - 60:40
    a lot of people thought that issuing
    certificates should be greatly reduced
  • 60:40 - 60:41
    authentication
  • 60:41 - 60:45
    but that assumes you can trust you to
    get it for recent issues a certificate
  • 60:45 - 60:46
    in the first place
  • 60:46 - 60:48
    problems you can do you know if you
  • 60:48 - 60:52
    isn't the issue where the certificate
    can have any string they want to
  • 60:52 - 60:54
    associated with the public key
  • 60:54 - 60:56
    there was no concern
  • 60:56 - 60:59
    and so if you in fact were able to call
    wears
  • 60:59 - 61:03
    uh... a certificate authority by the
    certificate authority over break into a
  • 61:03 - 61:06
    certificate is already in generate fall
    certificate
  • 61:06 - 61:11
    with more microsoft word himself for
    providers namely in that certificate and
  • 61:11 - 61:12
    then somehow
  • 61:12 - 61:14
    issue software
  • 61:14 - 61:17
    associated that certificate you can
    cause people to mistakenly download and
  • 61:17 - 61:19
    install
  • 61:19 - 61:21
    well the problem here is
  • 61:21 - 61:23
    trust every certificate corey
  • 61:23 - 61:26
    now you can try to uh... thought to that
  • 61:26 - 61:30
    if you look at your browser and you see
    how many certificate authorities are
  • 61:30 - 61:32
    uh... are trusted outfits
  • 61:32 - 61:35
    it's only and self control
  • 61:35 - 61:39
    sold by the other alternative india
    atf_ right now is to look at the
  • 61:39 - 61:41
    possibility of installing certificates
  • 61:41 - 61:43
    intervening system
  • 61:43 - 61:45
    using insect
  • 61:45 - 61:46
    as a tool
  • 61:46 - 61:49
    for making sure that everything going
    down to the place where the certificate
  • 61:49 - 61:54
    is being installed has been digitally
    signed so there's a change dress on top
  • 61:54 - 61:54
    of that
  • 61:54 - 62:00
    is usually is related to refer to
    strings that are related to me
  • 62:00 - 62:03
    in which that coddling inserted interest
    on
  • 62:03 - 62:04
    so if you're
  • 62:04 - 62:06
    google dot com
  • 62:06 - 62:10
    the only certificates that i could have
    a good in cool dot com the second level
  • 62:10 - 62:11
    domain
  • 62:11 - 62:14
    with her third level domains inside
    google dot com
  • 62:14 - 62:20
    any other attempts to for certificate
    out of that part of the uh... demeaning
  • 62:20 - 62:21
    zone
  • 62:21 - 62:24
    we have to be rejected out of him
    because he
  • 62:24 - 62:26
    strain was accredited
  • 62:26 - 62:28
    wasn't from its own
  • 62:28 - 62:31
    so that's an example of a way of
    responding to this story
  • 62:31 - 62:32
    let me just mention
  • 62:32 - 62:35
    one of the things i want to give you a
    quick summary of the year planetary
  • 62:35 - 62:36
    system
  • 62:36 - 62:38
    uh... p
  • 62:38 - 62:42
    uh... those of you who study the history
    of competing here remember project
  • 62:42 - 62:44
    activity back in the nineteen sixties
  • 62:44 - 62:48
    one of the interesting things they did
    was to modify and she knows ge six
  • 62:48 - 62:50
    thirty five thirty to six forty five
  • 62:50 - 62:54
    that had it brings a protection and
    their management
  • 62:54 - 62:58
    it reads a protection were triggered
    whenever you executed as sensitive
  • 62:58 - 62:59
    instruction
  • 62:59 - 63:03
    that instruction tracked down to the
    colonel software and said who r u what
  • 63:03 - 63:06
    are you doing here when instruction he
    tried to execute and what makes you
  • 63:06 - 63:08
    think you have the authority to do that
  • 63:08 - 63:11
    and all the colonel would decide whether
    or not you were actually allowed to
  • 63:11 - 63:15
    execute the instruction in place in the
    appropriate reign of control so as you
  • 63:15 - 63:20
    got down to ring zero who have more more
    control over machine this is an example
  • 63:20 - 63:24
    of hardware and software working
    together to reinforce security
  • 63:24 - 63:27
    we actually have that capability in the
    x_-eighty six trips but nobody's
  • 63:27 - 63:28
    programming
  • 63:28 - 63:31
    and they should be good to know so
    that's one example of hardware
  • 63:31 - 63:32
    reinforcing security
  • 63:32 - 63:34
    with software
  • 63:34 - 63:37
    um... the same thing is just happened
    recently with uh... violence with
  • 63:37 - 63:39
    digitally signed by house
  • 63:39 - 63:43
    we can execute people program comes in
    the operating system and less
  • 63:43 - 63:46
    the digital signature on the five scone
  • 63:46 - 63:47
    checks out with her
  • 63:47 - 63:50
    it's another example of getting more
    reinforcements
  • 63:50 - 63:54
    okay hundred skip down to the
    interplanetary Internet so we've heard
  • 63:54 - 63:56
    about this it was just an update on the
    status
  • 63:56 - 64:01
    when we started we were interested in
    providing better networking for
  • 64:01 - 64:03
    uh... exploring mars
  • 64:03 - 64:06
    this was in nineteen ninety just after
    the pathfinder project
  • 64:06 - 64:10
    waited smallholder on mars very
    successfully
  • 64:10 - 64:13
    the information that was coming back
    with strip directly from apple or over a
  • 64:13 - 64:16
    wave after through the deep space
    network
  • 64:16 - 64:19
    and so my colleagues and i had the jet
    propulsion laboratory ki
  • 64:19 - 64:21
    what should we be doing
  • 64:21 - 64:24
    and we will need twenty five years from
    now in order to provide better
  • 64:24 - 64:26
    networking for uh... p
  • 64:26 - 64:27
    uh... space
  • 64:27 - 64:28
    faring nations
  • 64:28 - 64:33
    and out we very quickly concluded we
    should use rich networking like Internet
  • 64:33 - 64:36
    no we said well maybe we can use the
    cpi_ p hearts on earth so maybe work
  • 64:36 - 64:38
    on mars too
  • 64:38 - 64:41
    and of course i will work on mars but it
    doesn't work between the planets
  • 64:41 - 64:44
    because of the variable delay which
    could be up to twenty minutes one way
  • 64:44 - 64:47
    forty minutes roundtrip and also
    destruction
  • 64:47 - 64:51
    in the plan is a rotating we have
    figured out how to stop that
  • 64:51 - 64:55
    sup so if you're talking to something on
    the surface of the planet rotates or
  • 64:55 - 64:56
    maybe there's an order
  • 64:56 - 64:59
    you can talk a little it comes back
    around again
  • 64:59 - 65:03
    so we end up with this variable the land
    destruction environment pcp_ is broke
  • 65:03 - 65:04
    in that regard
  • 65:04 - 65:08
    so we developed a new initially
    protocols we call the bottle protocol
  • 65:08 - 65:12
    in recent years we didn't come up with
    very beautifully done kentucky fried
  • 65:12 - 65:17
    chicken noodle called hotbed birds
    period
  • 65:17 - 65:22
    just not really giving some final phone
    call isn't your planetary world unit
  • 65:22 - 65:25
    protocol is winter
  • 65:25 - 65:28
    it'll run on basically anything that
    moves a packet of dates from one place
  • 65:28 - 65:32
    to another runs on top of pcp_ dealers
    on top of the vp hearings and cut by p
  • 65:32 - 65:35
    was on top of point-to-point links
  • 65:35 - 65:39
    do we get after looking for a regions of
    the design of the system
  • 65:39 - 65:45
    we install it uh... for experimental
    purposes uh... but let me go back
  • 65:45 - 65:48
    there there was you know in two thousand
    four
  • 65:48 - 65:50
    over several and in order to him
  • 65:50 - 65:52
    very successfully spirit and opportunity
  • 65:52 - 65:56
    one of them I'd forget which fear is has
    died
  • 65:56 - 66:00
    i can read one of his dad the other one
    is uh... still producing data
  • 66:00 - 66:04
    but when they were uh... first landed
    they were supposed to transmit data
  • 66:04 - 66:07
    directly back to earth away pathfinder
    did
  • 66:07 - 66:10
    but those radios overheat
  • 66:10 - 66:13
    and the result is that they needed to
    reduce the duty cycle to keep it from
  • 66:13 - 66:17
    armenia itself or any other equipment
    was originally rated at twenty eight
  • 66:17 - 66:18
    august second
  • 66:18 - 66:22
    and that was nearly scientists were not
    happy about that
  • 66:22 - 66:25
    when we told we have to reduce the duty
    cycle they worry more than happy about
  • 66:25 - 66:26
    that
  • 66:26 - 66:29
    and so one of the engineer said well
    there's an expand radio on the rover
  • 66:29 - 66:33
    there's an expand radio on orders which
    have been put in place in orders
  • 66:33 - 66:36
    uh... certainly the planet to decide
    where the rover should go but they
  • 66:36 - 66:38
    finish that tested evidence in orbit
  • 66:38 - 66:42
    and they had available communications
    can computing in memory
  • 66:42 - 66:47
    so the the orders and the rover
    reprogrammed
  • 66:47 - 66:50
    to take data that you collected squared
    up to the order when i got into
  • 66:50 - 66:54
    with replacement ball into the data for
    the transmitted data back
  • 66:54 - 66:57
    uh... to the deep space network
  • 66:57 - 67:01
    the data rate going on the expand radial
    isn't when he told it's the second
  • 67:01 - 67:03
    pakistan grading and two fifty six
  • 67:03 - 67:07
    and uh... the orders since they have a
    large solar arrays and didn't have any
  • 67:07 - 67:08
    problem
  • 67:08 - 67:10
    even within rowers atmosphere
  • 67:10 - 67:14
    could transmit data back it more than
    two hundred twenty kept a second
  • 67:14 - 67:18
    so all the data that was coming back
    from our school in store for
  • 67:18 - 67:20
    packet switching
  • 67:20 - 67:24
    today demonstration of how well that
    could work
  • 67:24 - 67:27
    dirt that landed in the year two
    thousand eight was in the north pole
  • 67:27 - 67:30
    didn't have a configuration of three
    factors so they went through the relay
  • 67:30 - 67:31
    again
  • 67:31 - 67:36
    belly-up the protocols to be a proxy
    spacecraft which is in order in the sun
  • 67:36 - 67:38
    that had wonderful with two counts
  • 67:38 - 67:41
    it was called deep impact originally in
    the new new mission bringing to the
  • 67:41 - 67:42
    party
  • 67:42 - 67:45
    so if as the protocols on board
  • 67:45 - 67:48
    rovers at the protocols board your
    orders at the protocols word
  • 67:48 - 67:52
    international space station has
    protocols work
  • 67:52 - 67:56
    we're operating basically rudimentary
    interplanetary network now
  • 67:56 - 67:59
    and so what's happening is that at nasa
  • 67:59 - 68:02
    efforts to standardize these protocols
  • 68:02 - 68:05
    internationally through the consul
    canadian space data systems
  • 68:05 - 68:10
    were hoping that everybody will adopt
    the protocols use them in their missions
  • 68:10 - 68:13
    or even if they don't use among the
    nations of the salmon on board so when
  • 68:13 - 68:15
    those missions are done
  • 68:15 - 68:19
    purpose those devices is known as an
    interplanetary back and so we might
  • 68:19 - 68:21
    actually see something
  • 68:21 - 68:22
    like that
  • 68:22 - 68:25
    uh... over you know many decades
  • 68:25 - 68:29
    now some people said well you know why
    are you doing supports one answers
  • 68:29 - 68:32
    provide which options for more complex
    missions with multiple
  • 68:32 - 68:37
    uh... spacecraft in orbit intend on
    foreign you know in orbit
  • 68:37 - 68:40
    around the sun for example were flying
    out of the solar system
  • 68:40 - 68:44
    or possibly on the surface in fact we
    get into example of that
  • 68:44 - 68:48
    a couple of months ago out of the
    european space agency in cooperation
  • 68:48 - 68:50
    with the uh... us
  • 68:50 - 68:54
    did may test from the uh...
    international space station
  • 68:54 - 68:58
    using the interplanetary protocols to
    control the rover on the ground in
  • 68:58 - 68:59
    germany
  • 68:59 - 69:02
    so while we were demonstrating is one of
    the white if you were in orbit around
  • 69:02 - 69:03
    mars
  • 69:03 - 69:06
    and you need to control over remotely
  • 69:06 - 69:09
    it was close enough to was real-time
    interaction so the protocols
  • 69:09 - 69:13
    although they can deal with uh...
    variable delay are also perfectly ok
  • 69:13 - 69:15
    disliking vp
  • 69:15 - 69:16
    fine
  • 69:16 - 69:19
    so you have a wonder will go right so
    that might help build more complex
  • 69:19 - 69:20
    missions
  • 69:20 - 69:22
    but i have one of the reason for doing
    this
  • 69:22 - 69:26
    barbour released a contract last year
    for half a million dollars
  • 69:26 - 69:29
    to a consortium to design a spacecraft
    they can get to the nearest star in a
  • 69:29 - 69:31
    hundred years
  • 69:31 - 69:34
    that's for reflectors away alpha
    centauri
  • 69:34 - 69:39
    and so uh... i'm lucky to be part of
    that consortium in their three problems
  • 69:39 - 69:41
    problem number one is propulsion
  • 69:41 - 69:45
    uh... it turns out that uh... the
    current propulsion systems would take
  • 69:45 - 69:45
    about
  • 69:45 - 69:49
    sixty five thousand years to get from
    earth to alpha centauri
  • 69:49 - 69:51
    which is a little won't even for a
    darker project
  • 69:51 - 69:56
    so the question is how do i get up to
    about twenty percent the speed of light
  • 69:56 - 70:01
    an ally the way we need to william
    slowdown before we get together and
  • 70:01 - 70:04
    otherwise we'll get one image in indian
    than expected
  • 70:04 - 70:09
    so the idea of what you saw them in
    going forward so we have to reaches
  • 70:09 - 70:13
    speed of about twenty percent speed of
    light midpoint fifty years and then be
  • 70:13 - 70:15
    able to console them
  • 70:15 - 70:17
    to get to work at the evidence that's
    one problem
  • 70:17 - 70:19
    navigation is another problem
  • 70:19 - 70:24
    uh... imagine you know that when we do
    interplanetary projects now
  • 70:24 - 70:27
    usually the spacecraft get to a certain
    point in the mission and you have to do
  • 70:27 - 70:30
    in the course sections and we do that is
    interactively
  • 70:30 - 70:34
    not not not literally real-time we send
    the correction information we get back
  • 70:34 - 70:36
    to information about the change in me
  • 70:36 - 70:38
    uh... flight path
  • 70:38 - 70:42
    now imagined for doing this for the
    space craft that's not what your way
  • 70:42 - 70:45
    so it takes a year for the information
    you get there another year for you to
  • 70:45 - 70:47
    find out whether or not worker
  • 70:47 - 70:50
    instant feel like it was real
    interactive on
  • 70:50 - 70:54
    so i got worried about that until
    somebody pointed out that ecom proper
  • 70:54 - 70:57
    motion stars that are within about ten
    litres of
  • 70:57 - 71:00
    our solar system was actually pretty
    woman
  • 71:00 - 71:05
    which means that we can do in homestead
    additional slightly
  • 71:05 - 71:07
    as we can use stars there much farther
    away
  • 71:07 - 71:10
    as a way of calibrating where we are and
    then use that to make a mid-course
  • 71:10 - 71:11
    corrections
  • 71:11 - 71:14
    so that i was easy that this
    communication
  • 71:14 - 71:17
    how big the generators signal it would
    be detectable order
  • 71:17 - 71:19
    from for your support
  • 71:19 - 71:23
    uh... you know and also you have to
    deliver the equipment to for lives away
  • 71:23 - 71:26
    so you have some limitations on message
    you can send
  • 71:26 - 71:31
    so i've been thinking well maybe eh...
    femtosecond lasers mentioned you have a
  • 71:31 - 71:32
    hundred what
  • 71:32 - 71:36
    power supply and compress a hundred one
    signals ten minus fifteen seconds and
  • 71:36 - 71:37
    should give you pretty good
  • 71:37 - 71:38
    since then
  • 71:38 - 71:42
    without even if it's a laser beam isn't
    being spread
  • 71:42 - 71:46
    over four lightyear distance and i get
    this very attenuated bohat false
  • 71:46 - 71:50
    attenuated downsizings sewer systems and
    now you know i need the interplanetary
  • 71:50 - 71:51
    backbone
  • 71:51 - 71:54
    is so i can do the synthetic aperture
    receiver to detect the signal coming
  • 71:54 - 71:56
    from an office in time
  • 71:56 - 72:02
    one of the physicist said wait a minute
    there's another when it is that
  • 72:02 - 72:07
    you know that he that he will be online
    stone figure some serious right
  • 72:07 - 72:11
    so he said if you go fired fifty
    astronomical units away from the senate
  • 72:11 - 72:15
    you begin to get the point where the
    gravity will form a focal point
  • 72:15 - 72:16
    fulfilling
  • 72:16 - 72:20
    so we can just get equipment five and
    fifty a year out from her
  • 72:20 - 72:25
    then we can use the focal uh...
    gravitational lands of the sun in order
  • 72:25 - 72:28
    to focus the signal is coming office in
    time
  • 72:28 - 72:32
    so that certain current idea building
    planetary
  • 72:32 - 72:33
    answered style
  • 72:33 - 72:36
    system intergalactic it's somebody
    else's trial
  • 72:36 - 72:39
    file i i'm sorry when i sent him a
    little bit
  • 72:39 - 72:42
    speaking talent dizzy and sick about
    this
  • 72:42 - 72:46
    i happen to spend some time in two and a
    biol forgive you if you all the center
  • 72:46 - 72:46
    of the way
  • 72:46 - 72:53
    but i think in any case for coming to
    google c
  • 73:03 - 73:07
    mister thank you so much prestige for
    another great speech you gave last year
  • 73:07 - 73:10
    uh... presented by
  • 73:10 - 73:14
    you'll stop
  • 73:14 - 73:21
    understand you're and said sorry start
    work here
  • 73:21 - 73:25
    those are are real meals problems a real
    problem is that we can find in our
  • 73:25 - 73:26
    discussion
  • 73:26 - 73:32
    to those words we actually banda
    thinking in uh... in ways that general
  • 73:32 - 73:37
    solely anyone masses espy's march
  • 73:37 - 73:40
    urich
  • 73:40 - 73:47
    uh... if metallic style security xy i
    have actually has interactions with the
  • 73:48 - 73:51
    department of homeland security which is
    actually doing an experiment with the
  • 73:51 - 73:53
    sacristy
  • 73:53 - 73:54
    notion
  • 73:54 - 73:58
    so that i don't know how far they've
    gotten into releasing
  • 73:58 - 74:02
    functionality to make it available but
    my understanding is that they see the
  • 74:02 - 74:04
    need for
  • 74:04 - 74:06
    uh... the order to avoid the
  • 74:06 - 74:09
    small businesses to have a place to go
    home to get help
  • 74:09 - 74:12
    because the building helped me get today
    tends to be
  • 74:12 - 74:17
    antivirus operating download which does
    help to some degree but all of you sure
  • 74:17 - 74:18
    very familiar with
  • 74:18 - 74:21
    daisy row attacks which are increasingly
    common
  • 74:21 - 74:25
    and the other thing i worry about
    specifically is the response to suffer
  • 74:25 - 74:26
    tak
  • 74:26 - 74:32
    if you have a young uh... an attack
    wishing let's take it distributed in the
  • 74:32 - 74:34
    home services
  • 74:34 - 74:37
    uh... if you're interested in responses
    i'm going to wipe out this drives a
  • 74:37 - 74:40
    volvo machines that are attacking me
  • 74:40 - 74:43
    turns out those machines are probably
    owned by citizens
  • 74:43 - 74:46
    who don't know their machines are
    infected
  • 74:46 - 74:49
    and be able to wipe out this transit you
    know a million people
  • 74:49 - 74:53
    some of those uh... machines were
    important for daily operation
  • 74:53 - 74:55
    and suddenly we have found ourselves and
    for
  • 74:55 - 74:58
    so that can't be right answers so we
    have to think our way through our
  • 74:58 - 75:01
    carefully about how we attribute the
    source
  • 75:01 - 75:04
    and what we do about the case where
  • 75:04 - 75:08
    the actual attacking devices are not
    under the control actually abusers
  • 75:08 - 75:12
    that is still a lot of work to be done
  • 75:12 - 75:15
    saying yeah i think in the beginning you
    mentioned uh... the next big thing
  • 75:15 - 75:19
    possibly people using a device is used
    to do
  • 75:19 - 75:22
    xyz_ likely music on the same room
  • 75:22 - 75:26
    uh... play video record surveillance is
    tough on you use your more thoughts
  • 75:26 - 75:29
    about about that i'm market myself
  • 75:29 - 75:31
    what he said that though
  • 75:31 - 75:35
    so what you know one of the things that
    i find interesting different one figure
  • 75:35 - 75:37
    question suggest
  • 75:37 - 75:39
    imagine you're driving in the car
  • 75:39 - 75:44
    and uh... you are asking questions like
    how do i get to this destination
  • 75:44 - 75:48
    uh... the voice message may go to a
    speech understanding system
  • 75:48 - 75:52
    but the answer may come back on the
    navigational display on the car everyone
  • 75:52 - 75:55
    that using two devices at the same time
  • 75:55 - 75:58
    the way that the system navigational
    system
  • 75:58 - 76:03
    knows uh... what is the address of the
    occasional displays that the system is
  • 76:03 - 76:07
    taking her voice is also telling the
    destination here the other devices in
  • 76:07 - 76:08
    the car
  • 76:08 - 76:10
    how about you walk into a hotel room
  • 76:10 - 76:11
    animal that was turned on
  • 76:11 - 76:15
    animal well discovers a high-resolution
    display that below instead of showing
  • 76:15 - 76:18
    everything on the train eagle's wing of
    the mobile now suddenly put it up on a
  • 76:18 - 76:20
    large high-resolution
  • 76:20 - 76:24
    so these are all kinds things that i'm
    imagine we could do
  • 76:24 - 76:28
    access control is clearly an issue do
    you want to be lady do that the other
  • 76:28 - 76:32
    dining room next door doesn't want to
    look at what's on his mama
  • 76:32 - 76:36
    uh... on your high-resolution display so
    it's clear that we have to do something
  • 76:36 - 76:37
    make sure
  • 76:37 - 76:39
    uh... things are promptly control
  • 76:39 - 76:43
    weird question over here but i a north
    microphone just a minute
  • 76:43 - 76:46
    thank you for being here and thank you
    for your contributions mister sir
  • 76:46 - 76:52
    uh... my questions pertaining to see and
    following
  • 76:52 - 76:56
    seeing ccp underlying sockets interested
  • 76:56 - 76:58
    two point
  • 76:58 - 77:00
    seriously
  • 77:00 - 77:05
    single stream transport consistent
    inorder messaging astrology field is the
  • 77:05 - 77:12
    right choice speed communicate so first
    of all answers
  • 77:12 - 77:17
    that one of the reasons that insulin
    saying is you can't intended for
  • 77:17 - 77:23
    and so and many party p has one for
    example http city and town at pcp
  • 77:23 - 77:26
    but others are just you pcp
  • 77:26 - 77:30
    so committed question no i don't think
    the pcp_ is the only thing she begins
  • 77:30 - 77:34
    it's a astonishing to me that it has
    actually serviced us as well as it
  • 77:34 - 77:35
    happens
  • 77:35 - 77:38
    when you think about it's set of
    constraints and everything else
  • 77:38 - 77:43
    but a lot of what happens on the net is
    uh... that that uses pcp
  • 77:43 - 77:47
    does not necessarily use it for
    subsequent actions so they're uniquely
  • 77:47 - 77:48
    streams
  • 77:48 - 77:53
    party p streams that are activated by
    the web based http
  • 77:53 - 77:58
    uh... activates a string delivery which
    is not over jcp it may be over different
  • 77:58 - 77:59
    protocol
  • 77:59 - 78:01
    and that's all the right thing
  • 78:01 - 78:04
    here i think here is to have protocols
    that are
  • 78:04 - 78:07
    appropriate to the application that
    you're looking for
  • 78:07 - 78:10
    uh... so i'm actually encourage people
  • 78:10 - 78:14
    to i'll take advantage of fact the
    Internet is so open to try things out
  • 78:14 - 78:18
    there's nothing that's not to directly
    from on building a whole new set of
  • 78:18 - 78:19
    applications
  • 78:19 - 78:23
    and we see this kind there's a good
    example of that where they simply
  • 78:23 - 78:24
    download an application
  • 78:24 - 78:26
    when you use it
  • 78:26 - 78:27
    instead of
  • 78:27 - 78:29
    you know anything else in mind that mail
  • 78:29 - 78:33
    uh... so handing out frankly I'd be
    happy to see people invented protocols
  • 78:33 - 78:37
    and do a better job for something soon
    ccp candy
  • 78:37 - 78:43
    is so amazing to me and it's been so
    robust orchestrated time
  • 78:43 - 78:45
    out
  • 78:45 - 78:47
    action how do you think about privacy
  • 78:47 - 78:49
    like well all
  • 78:49 - 78:52
    hard times used he he
  • 78:52 - 78:57
    in the future is party can be the most
    valuable assets
  • 78:57 - 79:04
    and that using a commonweal percentages
    stations to the usage of the state
  • 79:04 - 79:06
    so is it that well first of all we are
    intent
  • 79:06 - 79:10
    we aware of the importance of preserving
    priority and privacy and weak
  • 79:10 - 79:13
    paid dearly for a couple of mistakes
    that happen
  • 79:13 - 79:17
    elected incidental collection of
    information when we were doing street
  • 79:17 - 79:19
    view
  • 79:19 - 79:23
    i think though that privacy is becoming
    increasingly hard to protect
  • 79:23 - 79:27
    the reason is not because who has
    information we will fight very hard for
  • 79:27 - 79:30
    to maintain your privacy we have
    resisted government demand
  • 79:30 - 79:34
    for information more actively and many
    other companies and also a whole
  • 79:34 - 79:36
    a lot of information
  • 79:36 - 79:39
    but we do it ourselves and we take
    pictures of them allows we upload onto
  • 79:39 - 79:41
    the website
  • 79:41 - 79:45
    some people are discovered being in
    places where they were doing the people
  • 79:45 - 79:48
    you put the pictures that we do this to
    every friend but it isn't your friend
  • 79:48 - 79:49
    somebody
  • 79:49 - 79:50
    was not a
  • 79:50 - 79:54
    on your facebook or something somebody
    else's fault jobs at a party said he
  • 79:54 - 79:58
    wasn't there america's in trouble
    because picture a
  • 79:58 - 80:03
    so the issue here is learning what part
    social conventions should be
  • 80:03 - 80:07
    to deal with the fact that we have said
    privacy invasion
  • 80:07 - 80:09
    uh... teja lodging available to us
  • 80:09 - 80:10
    on the google site
  • 80:10 - 80:14
    we do use the data to help figure out
    how to target as we're very up front
  • 80:14 - 80:15
    about that
  • 80:15 - 80:17
    but we don't give the day than anybody
    else
  • 80:17 - 80:21
    some people nationally our business
    model is saldana value to somebody else
  • 80:21 - 80:23
    is not needed
  • 80:23 - 80:26
    your data is inside our system and it
    stays there you can get all the data
  • 80:26 - 80:27
    back if you want to
  • 80:27 - 80:32
    but what is important is that we use the
    information to deliver advertising
  • 80:32 - 80:34
    which is our business model and
    everybody knows that
  • 80:34 - 80:38
    hoping that that information to guess
    you will actually be of interest to you
  • 80:38 - 80:41
    so the purpose behind the information
    that we're
  • 80:41 - 80:42
    accumulating
  • 80:42 - 80:47
    uh... is to deliver advertising which is
    more over to you then than just build
  • 80:47 - 80:48
    blanket at
  • 80:48 - 80:51
    and for many people that kind of
    advertising is actually don't you think
  • 80:51 - 80:56
    that like advertising it feels like
    useful
  • 80:56 - 80:58
    and say
  • 80:58 - 81:00
    i can't hear it
  • 81:00 - 81:03
    hoboken given the microphone
  • 81:03 - 81:09
    thank you it's a good sense of those
    data using honest i think i think it was
  • 81:09 - 81:12
    well let's see if i were politician i
    would say that's a hypothetical and i
  • 81:12 - 81:14
    don't wanna go ahead
  • 81:14 - 81:19
    but it seems to me that that uh... the
    data is so important and so uh...
  • 81:19 - 81:24
    resilient reviews firstly mystery
    present
  • 81:24 - 81:27
    uh... that we would in one trial
  • 81:27 - 81:31
    if we did that i don't think company
    would survive the trip response
  • 81:31 - 81:33
    so i'm doubtful certainly the current
  • 81:33 - 81:35
    absolutely record
  • 81:35 - 81:37
    okay we have time for just or more
  • 81:37 - 81:41
    still ahead is that none of them
  • 81:41 - 81:42
    uh... thanks again for the talks
  • 81:42 - 81:46
    juggle is always of my partner should
    actually follows up with a couple go of
  • 81:46 - 81:50
    regarding uh... that the future of sort
    of uh... Internet protocols at best but
  • 81:50 - 81:52
    dynamic nishant works
  • 81:52 - 81:56
    uh... certainly you know we have muscles
    of mobile phones here but if the gs
  • 81:56 - 82:01
    ever wifi goes down the kind of useless
    um... and certainly for places where
  • 82:01 - 82:04
    sat_ jeopardy and that you know
    backbone was ticket down toward a crisis
  • 82:04 - 82:07
    situation where the infrastructure has
    available the phones and most of these
  • 82:07 - 82:11
    devices are not programs to talk to
    things that aren't next to so uh... i
  • 82:11 - 82:13
    mean yet from what they've done uh...
  • 82:13 - 82:17
    standpoint you know what was said to be
    involved in giving them so i really love
  • 82:17 - 82:18
    the idea
  • 82:18 - 82:23
    but while i was still fairly visiting
    many dancing on the s
  • 82:23 - 82:27
    we prepared a report on public safety
    networking and that was exactly one of
  • 82:27 - 82:28
    the things we pointed out
  • 82:28 - 82:31
    this type of a safety net actors to use
    ltv_
  • 82:31 - 82:34
    and when things are normally okay that's
    probably all right
  • 82:34 - 82:38
    but at some point when you have to train
    our you know sandy here we have some
  • 82:38 - 82:39
    other kind of that
  • 82:39 - 82:41
    man made or otherwise
  • 82:41 - 82:45
    infrastructure may not be there are all
    than for example made even his air can't
  • 82:45 - 82:49
    get any of the gasoline or daniel or
    what have you the diesel fuel
  • 82:49 - 82:50
    direct generators
  • 82:50 - 82:54
    i would really love the idea that our
    devices could be linked together in a
  • 82:54 - 82:56
    message that were
  • 82:56 - 82:59
    i think that that's helped the system
    argues that homework citizen mesh
  • 82:59 - 83:02
    network it's automatically some format
  • 83:02 - 83:07
    i'm a big fan cooperating that
    capability into on our devices now
  • 83:07 - 83:11
    keep in mind that privacy suggest that
    we should be encrypting anyway and in
  • 83:11 - 83:12
    order to take advantage of that
  • 83:12 - 83:15
    you certainly don't want to use a mesh
    network in which everybody gets taken by
  • 83:15 - 83:18
    a hot dogs and mixed metaphors
  • 83:18 - 83:19
    when you try to get one
  • 83:19 - 83:20
    at the baseball game
  • 83:20 - 83:24
    so uh... you really want to be able to
    use and doing capability that i would
  • 83:24 - 83:27
    really like the idea incorporating that
  • 83:27 - 83:31
    that would make for much more resilient
    system
  • 83:31 - 83:33
    selling the picture
  • 83:33 - 83:40
    okay maybe two more than that i'm ready
    to go who's got the money
  • 83:41 - 83:42
    following up on that
  • 83:42 - 83:45
    uh... it seems that most of our
    programming languages ritually
  • 83:45 - 83:49
    antiquated their dirtier towards
    programming a single clock misco
  • 83:49 - 83:50
    computer
  • 83:50 - 83:53
    and not on the distributed uh... not not
    about
  • 83:53 - 83:56
    taking advantage of distribution and
    that's
  • 83:56 - 83:59
    patents levels of complex and what do
    you see I'd heard of a great language
  • 83:59 - 84:03
    today bloom coming up quickly
  • 84:03 - 84:06
    experimental in which a morning what
    else and i personally a big banner
  • 84:06 - 84:09
    relying which is twenty years old
  • 84:09 - 84:14
    uh... and everybody sees between ketchup
    relying so wbc so i don't actually see a
  • 84:14 - 84:16
    number of things going on first of all
  • 84:16 - 84:20
    we have program on what the court
    systems
  • 84:20 - 84:23
    m that in itself is a challenge
  • 84:23 - 84:26
    uh... the clock speeds are not to keep
    going up in the otherwise chips a little
  • 84:26 - 84:28
    because too much power goes into them so
  • 84:28 - 84:33
    uh... we have to deal with that already
    have a google was well that other thing
  • 84:33 - 84:35
    is that uh...
  • 84:35 - 84:39
    i really like the idea doing parallel
    processing
  • 84:39 - 84:41
    but look at what we've been able to do
    in a very
  • 84:41 - 84:45
    on way where we split some tests out
  • 84:45 - 84:47
    usable parallel strains
  • 84:47 - 84:52
    that doesn't require any special
    programming to do that seti at home
  • 84:52 - 84:53
    and the protein folding
  • 84:53 - 84:56
    uh... activity who simply parity of
    simple
  • 84:56 - 84:58
    single processor
  • 84:58 - 85:03
    software insists it is being executed
    simultaneously allied member systems
  • 85:03 - 85:05
    a lot of our applications at the same
  • 85:05 - 85:09
    we we taped testimony waited up into
    large numbers of karo
  • 85:09 - 85:11
    uh... processes
  • 85:11 - 85:16
    that don't require simultaneously is of
    course each corresponding in some
  • 85:16 - 85:17
    operation
  • 85:17 - 85:20
    we've been able to get away with that
    for the kinds of applications that we
  • 85:20 - 85:20
    had
  • 85:20 - 85:23
    but when we start getting into
    large-scale simulations now it is to be
  • 85:23 - 85:26
    very different because then you end up
  • 85:26 - 85:32
    having uh... either single instruction
    stream running against a over i a m data
  • 85:32 - 85:35
    that's uh... seven s i n d
  • 85:35 - 85:37
    sings traffic stream oracle data stream
  • 85:37 - 85:44
    or what you're thinking family more
    structures statement strings there are
  • 85:44 - 85:45
    languages for that
  • 85:45 - 85:50
    but some of them are really archaic one
    of those called put near the grand
  • 85:50 - 85:53
    amelia four back in the nineteen
    seventies
  • 85:53 - 85:56
    nobody can figure out how to program
    usually hard goodyear sounds like
  • 85:56 - 85:59
    something that very few people couldn't
    even speak
  • 85:59 - 86:01
    seven or something
  • 86:01 - 86:03
    thousand a day
  • 86:03 - 86:05
    uh... so i suspect that there is real
  • 86:05 - 86:09
    for serious sulfur language development
  • 86:09 - 86:14
    and it's a challenge for a cm its
    members to start pushing direction
  • 86:14 - 86:17
    someone actually uh... hope for
  • 86:17 - 86:21
    that platforms that are going to become
    available will return with force us into
  • 86:21 - 86:24
    thinking new kinds of programming
    parents
  • 86:24 - 86:27
    some of them are result her a-level
    languages
  • 86:27 - 86:31
    which highlights some of the underlying
    simplicity complexity
  • 86:31 - 86:32
    of the systems
  • 86:32 - 86:34
    so idea
  • 86:34 - 86:38
    and maybe you have some ideas to pursue
    that better but if you go and others do
  • 86:38 - 86:42
    it sure hope that you make a note to the
    competency cm
  • 86:42 - 86:43
    so we can
  • 86:43 - 86:45
    one morning and we really need a break
  • 86:45 - 86:49
    his uh... you can follow up on some of
    the things you mentioned about ah...
  • 86:49 - 86:51
    intellectual property and and
  • 86:51 - 86:55
    i'm curious about your views on the
    roles of accuser of the government
  • 86:55 - 86:58
    releasing you know more of its own
    essentially
  • 86:58 - 87:02
    uh... at peak is that there is this new
    is yet another ticket order about uh...
  • 87:02 - 87:04
    that came from the white house about
  • 87:04 - 87:08
    releasing opened it and through the
    economic potential molly options roundup
  • 87:08 - 87:11
    in data uh... hasn't been a lot of
    activity a on that front and there's a
  • 87:11 - 87:14
    lot more activity on open source in
    government as well combat but it can be
  • 87:14 - 87:18
    kind of nixon's uh... um... basis
  • 87:18 - 87:22
    uh... you know as an example i was i was
    reading at some history uh... of arpan
  • 87:22 - 87:24
    and there is an example of
  • 87:24 - 87:27
    um... bbn which i guess was one of those
    who've been companies involved being
  • 87:27 - 87:29
    hesitant release
  • 87:29 - 87:33
    the uh... stars could i'm behind the
    uh... i decided to use the packet
  • 87:33 - 87:37
    switching computers um... and eventually
    that you know that uh... turn around and
  • 87:37 - 87:39
    and stands up and
  • 87:39 - 87:42
    but i'm curious to know what if you're
    the government what it would really you
  • 87:42 - 87:45
    know how do you find the balance between
    whose opportunist to use it as
  • 87:45 - 87:50
    established in open platform that people
    can bowl economic you know
  • 87:50 - 87:54
    cap on top of and abductees verses he
    did something small you just you know
  • 87:54 - 87:57
    it's just a quality piece of software
    it's less important what you see of the
  • 87:57 - 88:01
    sort of opportunities the bounce
    immigration well at first of all a
  • 88:01 - 88:05
    little in this uh... big failure opening
  • 88:05 - 88:10
    uh... access to publications opening
    sister gave reducing
  • 88:10 - 88:15
    it was a stiffer and ways to do that not
    just a city cm properties
  • 88:15 - 88:18
    uh... also in the big thing
  • 88:18 - 88:21
    of trying to preserve information i
    mentioned that earlier the digital no
  • 88:21 - 88:24
    ideas is that one of those
  • 88:24 - 88:27
    uh... i think the increasingly
  • 88:27 - 88:31
    we're going to find people and capable
    of writing their own software we
  • 88:31 - 88:35
    wouldn't have remember when spreadsheets
    came out way back when they're in their
  • 88:35 - 88:37
    yes in the early eighties
  • 88:37 - 88:40
    everybody became programmers of
    spreadsheets and they had been formally
  • 88:40 - 88:42
    trained to write software
  • 88:42 - 88:46
    don't go to imagine that as we work our
    way up into higher higher level and
  • 88:46 - 88:49
    which is that more and more people will
    have the ability to either to write
  • 88:49 - 88:51
    their own software or share
  • 88:51 - 88:52
    with each other
  • 88:52 - 88:59
    out so if i think that unless we get
    into this uh... dabbled
  • 88:59 - 89:04
    preventing people from sharing their
    software work sharing what they their
  • 89:04 - 89:06
    their intellectual property
  • 89:06 - 89:09
    uh... we'll have a higher probability of
    uh...
  • 89:09 - 89:11
    being able to take advantage of
    everybody's
  • 89:11 - 89:13
    skills
  • 89:13 - 89:15
    via writing software that's open this
    more likely
  • 89:15 - 89:22
    you source models i don't know whether
    they disagree organic
  • 89:26 - 89:27
    anderson companies that
  • 89:27 - 89:31
    uh... that right software that are
    largely funded by government and it's
  • 89:31 - 89:36
    and and the softer is not open uh...
    over in the same is not open right so so
  • 89:36 - 89:40
    well i can tell you that distant cut
    this short to the records get outta here
  • 89:40 - 89:43
    the government's already spoken at least
    itself
  • 89:43 - 89:45
    and the white house
  • 89:45 - 89:46
    well sdp_ saying
  • 89:46 - 89:48
    the government sponsored stuff
  • 89:48 - 89:50
    needs to be system
  • 89:50 - 89:54
    well you know there are a whole bunch of
    questions about winners of the excessive
  • 89:54 - 89:56
    over the world to take the get to retain
    the data
  • 89:56 - 89:59
    per period of time for you start your
    own
  • 89:59 - 90:02
    but commercial rights are argument
  • 90:02 - 90:04
    that shows up
  • 90:04 - 90:06
    uh... when you have government contracts
  • 90:06 - 90:10
    and grants and things of that kind and
    that's a negotiated side if these
  • 90:10 - 90:14
    government goes the way it seems to be
    in eight years in prison
  • 90:14 - 90:17
    for people who were working under
    government grant to make available with
  • 90:17 - 90:18
    them
  • 90:18 - 90:21
    if the general public will still be an
    argument over commercial lines
  • 90:21 - 90:25
    and so this is not a trivial thing to
    respond to that certainly the trend
  • 90:25 - 90:27
    right now sockets and her
  • 90:27 - 90:31
    okay that's all the time we got a
    ninety-two students but thank you very
  • 90:31 - 90:31
    much
Title:
Dr. Vint Cerf on "Reinvinting the Internet"
Description:

This ACM DC Chapter event on May 13, 2013, featured one of the Fathers of the Internet, Google VP and President of ACM, Dr. Vinton Cerf, speaking on the Internet's design, age, and future prospects.

more » « less
Video Language:
English
Duration:
01:22:35
ISOC-NY edited English subtitles for Dr. Vint Cerf on "Reinvinting the Internet"
ISOC-NY added a translation

English subtitles

Incomplete

Revisions