EFTA01785606
EFTA01785607 DataSet-10
EFTA01785610

EFTA01785607.pdf

DataSet-10 3 pages 710 words document
P17 P19 V16 V11 P24
Open PDF directly ↗ View extracted text
👁 1 💬 0
📄 Extracted Text (710 words)
From: Danny Hillis < Sent: Saturday, July 30, 2016 12:33 PM To: Jeffrey E. Subject: Re: The two properties that the Internet lacks are guaranteed quality of=service (bandwidth and latency) and the ability to know for sure whe=e a packet originated. These two features are fundamentally incompatible w=th the design of the Internet and they trade off against other features. F=r instance the second network I have in mind may well be inferior to=the Internet in efficiency of utilization of the resources , so it will co=t more per bit to send a message. It will probably be worse the than the l=ternet in supporting anonymity. So it it not a replacement for the Interne=, but a complement to it. On Fri, Jul 29, 2016 at 9:58 PM, jeffrey E. <[email protected] <mailto:[email protected]» wrote: =div dir="ltr"> Forwarded m - From: Jeremy Rubin Date: Thu, Jul 28, 2016 at 9:51 AM Subject: Re: To:="jeffrey E." <[email protected] <mailto:[email protected]» I've been thinking a lot about this the past few days, some of m= thoughts below: Generally I'm =ery positive of the notion; there's a lot to be desired from our inter=et protocols. On the other hand, I =onder if this is a variant of trumpism, we need to make the internet great=again. At what point was it great before? When their were but a select few=who were able to access it; and everybody on it knew they would be meddled=with a bit. Once it went too mainstream no-longer was being a hacker (or e=en, user) of such systems an at-your-own-risk endeavor, but was something =hat people depended on. Similar mod=rn endeavors include Urbit, linked for posterity https://urbit.org <https://u=bit.org> , which is mostly made inc=mprehensible for the point of keeping out the un-enlightened. Urbit is sup=osed to re-imagine computing as fundamentally distributed. I think it would require very close consideration t= figure out why a new internet is actually needed. Traditionally in CS we =hink of a distributed system as striving to achieve Consistency, Availabil=ty, and Partition Tolerance (see Brewer's theorem, https://www.infoq.com/articles/cap-twelve-years-later=how-the-rules-have-changed) but unable to get all 3 as they mutually a=sure each other's impossibility. If we add in a fourth parameter at a =econd layer of abstraction, let's call it Authenticity, a fifth, Priva=y, and a sixth, law enforcement, we cover the gamut of most of what people=care about in an internet system. These second three principles form anoth=r triangle similar to CAP, they mutually assure the other's impossibil=ty in some way. EFTA_R1_00107865 EFTA01785607 I think that thinki=g in terms of these desirable properties in terms of mutually exclusive gr=ups is probably a useful way to consider the design space. Another well kn=wn one is Zooko's triangle: https://en.wikipedia.org/wiki/Zoo=o%27s_triangle <https://en.wikipedia.org/w=kinooko%27s_triangle> . In any case, I&=39;ve gone on a slight tangent. My point is it's one thing to say you =ant a new internet because of a theoretical (or not so theoretical) button= it's another to have motive enough to actually build such a new netwo=k. Asides from the button, what properties seem critical to you? On Mon, Jul 25, 2016 at 7:08 AM, jeffrey E. =span dir="ltr"><[email protected] <mailto:[email protected]» wrote: I liked the idea of internet 2.0 Q=A0 encouraged by the reset switch. Q=A0 please note The information=contained in this communication is confidential, may be attorney-client=privileged, may constitute inside information, and is intended only for=br>the use of the addressee. It is the property of JEE Unauthorized =se, disclosure or copying of this communication or any part thereof is =trictly prohibited and may be unlawful. If you have received this co=munication in error, please notify us immediately by return e-mail or b= e-mail to [email protected] <mailto:[email protected]> , and destroy this communication and all copies the=eof, including all attachments. copyright -all rights reserved please note=br> The information contained in this communication is confidential= may be attorney-client privileged, may constitute inside information, =nd is intended only for the use of the addressee. It is the property of=br>JEE Unauthorized use, disclosure or copying of this communication=or any part thereof is strictly prohibited and may be unlawful. If you =ave received this communication in error, please notify us immediately =y return e-mail or by e-mail to [email protected] <mailto:[email protected]= target=> , and 2 EFTA_R1_00107866 EFTA01785608 destroy this communic=tion and all copies thereof, including all attachments. copyright -all =ights reserved 3 EFTA_R1_00107867 EFTA01785609
ℹ️ Document Details
SHA-256
e09c0494ad4af5894520f1b9c1cb0c0845bd64f1e4b81704d0c92d7e2679b270
Bates Number
EFTA01785607
Dataset
DataSet-10
Document Type
document
Pages
3

Comments 0

Loading comments…
Link copied!