Saturday, May 31, 2008
Cisco TrustSec @ Stanford Networking Seminar
TrustSec is a fundamental change in the way enterprise network security is implemented. architecture builds on top of a strong identity framework to provide authentication for each network device and a centralized Role Based Access Control. All network entities including switches and routers, in addition to users and hosts, are identified and strongly authenticated to build a trusted network infrastructure. Identities are then mapped onto topology-independent Security Groups by a centralized Attribute Based Access Control policy engine, and carried within each packet through the network. Access control policies are no longer expressed in term of IP addresses, but simply in term of Security Groups.
To protect the integrity of the Security Group Tag each frame is encrypted at the egress port of every network device and decrypted at the next ingress port using the IEEE 802.1AE standard frame format (draft standards 802.1af and 802.1AR will also be supported).
By encrypting packets at every hop of the network user-data are protected over the entire enterprise network, preserving the capability to provide added-value services in the network (such as netflow, quality of service, load balancing, application-level caching,intrusion prevention).
Essentially TrustSec adds a layer of indirection to accomplish its goals. When I get a moment I'll add a simple diagram that expresses the layer of indirection.
Saturday, May 24, 2008
Microsoft Research Silicon Valley Roadshow
To start, Rick Rashid, the senior vice president of Microsoft Research, gave a short presentation about the company’s different areas of research. Rashid said “The reason you do basic research is for survival, it gives you the ability to change when change is critical... that is true for society and humanity more broadly, like if something really bad happens--war, famine, Google--you can respond.” He prefaced this by saying "...it's not because research can lead to profitable, innovative products although that’s a nice consequence."
Roy Levin who directs the research group in Mountain View indicated they focus on distributed computing and work on improving the delivery of Web search results and the sponsored links that are associated with the to search results.
Botnet Detection for Microsoft's Hotmail
This facility is a target for Botnet attacks. The researchers, Yinglian Xie and Fang Yu developed a technique for automatically detecting servers, or dynamic IP addresses, that send spam by focusing on addresses which change frequently (a traditional email server would have a more or less stable IP address). Their research suggests that 96% of mail servers on dynamic IP addresses actually send only spam.
InkSeine
Raman Sarin demonstrated the InkSeine (not the river, instead the fishing net) software that lets tablet computers be controlled pens instead of keyboards or a mouse and at the same time completely rethinks the user interface. The software and a tutorial can be downloaded from http://research.microsoft.com/inkseine/ .
LaserTouch
LaserTouch uses an overhead infrared camera and two laser to enable surface computing on any flat screen which could potentially make it more affordable than other solutions in this realm. Andy Wilson developed the sensing software than enables the interface; it is the same technology as the TouchWall, a surface computing whiteboard that MSFT introduced to the market earlier this month. There are no plans as of this time to commercialize the prototype seen here.
Translation Technology
Andrea Jessee demonstrated a Windows Live application of their language translation technology. I've used it several times, from Japanese to English or from German to English and it works better than others that I have tried. Also the user interface is quite good. It works very well for reading news stories and has a feature where you can tell it that you are translating something "technical". You can try it at translator.live.com . Remember that text embedded in a graphic does not translate!
Boku is a lightweight programming language for children (it's being tested by 9-12 year age group). It is carried out on the Xbox 360 3D gaming environment and controlled by the Xbox game controller and should be available sometime in 2009.
Several projects addressed parallel programming and multicore computing challenges including DryadLINQ - a programming environment for large scale data parallel computing. It combines .NET Language Integration Query (LINQ) and the Dryad distribution engine engine and Automatic Mutual Exclusion employing a new technique, "transactional memory" to help manage execution threads and simplify the process of writing synchronized concurrent programs.
The goal of Keyword Generation and Query Classification is to produce a list of keywords associated with specific topics. Applications include improving ranking and relevance for search and presenting more relevant online advertising associated with a query.
The WOW project is the WorldWide Telescope, a rich visualization environment that functions as a virtual telescope and integrates imagery collected from the best ground- and space-based telescopes in order to create guided explorations of the universe, The Visual Experience Engine which enables seamless panning and zooming allows anyone to create and present media-rich immersive experiences to share with others.
Other projects of a more academic nature include Chuck Thacker's BEE3 to revitalize architecture research in chip design at the university level and Catherine van Ingen's E-Science in the Cloud to help eco-science researchers deal with the massive amounts of data that is and will be generated by ubiquitous sensors.
Friday, May 16, 2008
10 Top Trends from the VC Community Perspective
Data stored by different service providers will be combined to create more intelligent services.
Oil will have increasing difficulty competing with biofuels made from cheap nonfood crops for transportation.
Water technology will replace abating global warming as a global priority.
The mobile device industry's migration to smart phones will produce great disruption for big industry players.
Booming market for healthy aging technologies.
Four-fifths of the world population will carry mobile Internet devices within five to 10 years.
Algorithms will be constructed to develop new industrial chemicals, new biofuels and eventually artificial intelligence.
The mobile phone is your most important device.
There is going to be a venture capital shakeout.
Within five years everything that matters to you will be available on a device that fits on your belt or in your purse.
Thursday, May 8, 2008
Juniper Networks Network Endpoint Assessment @ Stanford Networking Seminar
What would happen when some or many integrated components applied to the public internet? For example, if one were to assess endpoints (think about who would be responsible for the assessment function) -and disallow vulnerable end-user devices, how many disenfranchised netizens would there be world-wide. A secure (and botnet-free) internet is desireable from many perspectives, but how is it to be accomplished short of "clean slate" initiatives?
PDF of Presentation Slides can be found at http://netseminar.stanford.edu/seminars/05_08_08.pdf (right click then save...).