Archive for the 'Review' Category

a part of hell breaks loose in the ARIN community

Monday, April 6th, 2009 by kc

[this thread on transfers is too painful to watch. here’s my take.]

Even if turning IP addresses into private property is the best policy decision of those available (which is far from demonstrated, since so little rigorous research of this question has actually occurred), executing such a policy by Board fiat while ARIN itself has no leadership is guaranteed to generate severe dissonance with ARIN’s organizational mission which includes forging public legitimacy entirely from its transparent, open processes.


an amazing trip talking IP in Santiago and Patagonia

Monday, January 5th, 2009 by kc

In November 2008 I had the honor of being invited to speak at the Chilean Computer Science Society Annual Meeting, this year at the Universidad de Magallanes in Punta Arenas, Chile. I followed a colleague who has been visiting CAIDA for the last two years, Sebastian Castro, back to his sponsoring institution, NIC Chile. We started out with an interesting meeting with a core of technical folk where I learned about the activities of NIC Chile’s recently established research arm (NIC Labs). We exchanged valuable information on the common (and less common) challenges of doing successful research in our respective environments.


another great meeting organized by DHS S&T

Sunday, November 2nd, 2008 by kc

Busy month. On 15 October I presented CAIDA’s analysis of the CAIDA/ARIN IPv6 survey at the ARIN meeting. More on that later.

The next day I presented to the DHS/SRI Infosec Technology Transition Council (ITTC), where “experts and leaders from the government, private, financial, IT, venture capitalist, and academia and science sectors come together to address the problem of identity theft and related criminal activity on the Internet.”

It is only a three-hour meeting, a few times a year (my first time), but intense. They had a timely panel first, “Integrity in Elections”, where they reviewed so many methodological flaws in voting procedures, they shed substantial doubt on the proposition of fair national elections anytime soon. John Sebes motivated the computational science challenge well: if we are not capable of building a trustworthy computational system to accomplish the conceptually simple task of tallying a vote, what can we expect to be capable of building trusted computational systems to do? And while there is inspirational work on documenting and proposing how to solve the technology issues that threaten election integrity, the bottom line is disheartening.


Internet2 launching its own “IRB”

Friday, October 10th, 2008 by kc

I (and others) have spent a bit of time over the last year encouraging Internet2 to take a more proactive role in supporting network research. So I was delighted to see the proposal of a new network research review council, which I reckon will amount to a network-research-dedicated IRB for Internet2.For most researchers, Internet2 has the closest they will get to real large-scale network operators. Internet2 operators are more willing to expose pain points and obstacles they encounter, and Internet2 provides more data about itself to the public, than any other network I know, public or private. Even better, Internet2 management is also more capable of fostering effective, cross-disciplinary, scientific Internet research than the private sector, simply by virtue of their incentive structure.


my 9/11/2008: DHS cybersecurity PI meeting

Thursday, September 25th, 2008 by kc

Last week I attended the biannual principal investigators (PI) meeting of DHS Science and Technology Directorate’s Cybersecurity program. I found myself assigned the speaking slot at 9:30am on September 11, on the 26th floor of an Arlington building with a more majestic view of the Pentagon than I’ve ever had. I spent the coffee breaks looking out the windows at commercial aircraft continually flying right by the Pentagon en route to DCA, an airport the feds bravely did not close down after 9/11/2001. (who says the terrorists won?)


learning the discipline of [marketing your] innovation

Saturday, August 30th, 2008 by kc

As part of our DHS-funded cybersecurity project on Internet topology mapping with CAIDA’s new Archipelago measurement infrastructure, DHS program manager Doug Maughan required a representative of each R&D project to attend a marketing workshop at SRI for some intense training on how to communicate the value of our specific projects to potential customers or sponsors. It was a 2-day format condensed from a typically week-long workshop based on (president of SRI) Curtis Carlson’s book on the discipline of innovation. I went in to the workshop somewhat skeptical it would be useful. However, I recognize I have weak marketing skills since the scientist in me always wants to point out the dozen caveats of anything I’m presenting before I focus on the contributions. So I acknowledged I was an ideal candidate for the workshop.


apostle of a new faith “whose miracles can be seen in front of people”

Sunday, August 24th, 2008 by kc

In April 2007 I was invited to David Isenberg’s Freedom to Connect (F2C) conference to participate on a panel about Yochai Benkler‘s new book, Wealth of Networks (amazon, pdf chapters). In Wealth of Networks, Yochai first observes that two phenomena — communication and computation — are becoming affordable and ubiquitous at the same time that they are each becoming fundamental as input as well as output to our economic systems. He then provides empirical evidence [wikipedia] that this ubiquitous availability of information technology (communication and computational resources, or in math speak, links and nodes) among actors enables forms of collaboration so enormously effective as to offer an alternative to traditional models of production, i.e., market-based or government-backed systems.