SlideShare a Scribd company logo
1 of 28
What’s Next for the Net?
Michael R. Nelson Martin Levy
Tech Strategy Network Strategy
MNELSON@CLOUDFLARE.COM MARTIN@CLOUDFLARE.COM
Twitter: @MikeNelson Twitter: @mahtin
My Background
• 5 years as Senator Gore's science advisor
• 4 years as IT policy advisor in the Clinton White House
• 1998-1999 -- Technologist at FCC
• 9+ years at IBM
• Joined Georgetown faculty, Jan. 2008
• Principal Technology Policy Analyst, Microsoft Tech. Policy Group
• Public Policy, Cloudflare (in Washington, DC)
• Tech Strategy, Cloudflare (in Cyprus)
What Do Professors Do?
• Provide a framework
• Tell stories
• Assign readings
• Start a discussion
• Require term papers
• Grade students
What Do Professors Do?
• Provide a framework
• Tell stories
• Assign readings
• Start a discussion
• Require term papers
• Grade students
We are helping build a better Internet
Cloudflare is an Edge Service Provider that provides performance, security,
reliability, and insights to anything connected to the Internet.
5
153+
Data centers globally
Cloudflare’s Global Anycast Network
15 Tbps
Network capacity
10%
Global HTTP
Internet requests
10M
Requests/second
Infinite scalability is the future of the Internet
6
Live Data Center
In Progress/Planned
95%of internet users will live in a country
with a Cloudflare data center
Upcoming Data Centers in 2018
A VERY Short History of the early Internet
1) “Dumb pipes” (text and IP addresses)
2) Domain Name System (Paul Mockapetris, 1983)
3) World Wide Web (Tim Berners-Lee, 1989)
4) Graphical web browser, MOSAIC (at NCSA UIUC, 1992)
5) Secure Socket Layer (Netscape, 1994)
6) Grid computing (early 1990s)
7) Content Distribution Networks (MIT + Akamai, 1998)
8) “Cloud computing” + Amazon Web Services (2000-2003)
Two useful guides
“Control Point Analysis”
2012 TRPC conference
David D. Clark
MIT CSAIL
https://ssrn.com/abstract=2032124
The Internet, circa 2000
What’s Next?
1) Connectivity AND Compute almost EVERYWHERE
2) Edge services for the masses
3) Faster, simpler encryption
4) Security for the Internet of Things
5) The programmable Cloud (e.g. Cloudflare Workers)
Essential
Reading
12
Cloudflare caches your content across our global network, bringing it closer to visitors from every region
Power of Content Distribution Networks
14
Origin
Connection Reuse
Minimize latency imposed by
TCP connection-setup
Congestion Avoidance
Routing decisions using real-world
network conditions
15
A Short Cut for the Net: Argo Smart Routing
Congested
Network Path
Unreliable
Connection
Faster Loading Times
Cloudflare routes over 10% of all HTTP Internet traffic
providing Argo with real world intelligence on the
fastest network paths.
Internet node / hop
Cloudflare Data Centers
Cloudflare’s private network
15Tbps throughput, with 118+ PoPs in 58+ countries
Further Reading
16
Trends for the Cloud
17
Replacing Hardware with
Cloud Service
● Provision only what you
need
● Pay only for what you
use
● Zero downtime
Less to manage
at your site
● Cloud WAF and DDoS act
as reverse proxies, provide
equivalent protection lower
costs with less complexity
● No “failover” to occur
● Bad traffic never reaches
the origin’s network
Simplify!
One integrated package of
Cloud services
● Single pane of glass
● Rapid on-boarding of the
integrated offering
Multi-Cloud: Provider
Independence
● Independence & choice
● Consistent control plane
● Best of breed capabilities
Concluding Tweets (from @MikeNelson)
1) The Internet is changing faster than ever!
2) But it’s hard to see changes in the infrastructure
3) Don’t focus on the network; focus on the data
4) The edge is where the action is
5) Prototype, Prototype, Prototype
18
Thank You!
19
When things were simple
Looking Forward
Developer Ecosystem
● Implementing new
technologies and protocols
in simple, scalable way for
customers of all sizes
● Extend same performance
and security to all
protocols, all content and
all devices
Intelligent Edge
● Robust performance
through data optimized
routing
● Simple security through
threat based firewall
configuration
● Rich insights and
actionable guidance
Democratizing the Web
● Innovation and customization
on the edge
● Bring audience and
opportunity with App Store
22
Cloudflare Workers
23
● Respond dynamically when the origin
server is unreachable.
● Implement custom load balancing and
failover logic.
● Deploy fast fixes to a site in seconds,
without having to update the origin
server.
● Custom logic for cacheable requests and
improved cache hit rate.
● Expand HTML templates to fetch only
dynamic content from the origin.
● Dynamically respond to requests without
contacting the origin server.
● Create custom security rules and filters to
block unwanted visitors and bots.
● Implement custom authentication and
authorization mechanisms.
● Perform data sanitization and validation
before sending it to the origin.
Cloudflare Workers let developers run JavaScript Service Workers in Cloudflare's 151 data centers in 70 countries
Models Matter!
Innovation>>>
24
SCoT
Secure Cloud of Things
CoVET
Cloud of VERY
Expensive Things
IoT
Internet of Things
CoST
Cloud of Shoddy Things
Less Regulation More
Innovation>>>
25
CoAT
Cloud of ALL Things
SCoT
Secure Cloud of Things
CoVET
Cloud of VERY
Expensive Things
IoT
Internet of Things
CoST
Cloud of Shoddy Things
Less Regulation More
Vision Matters - Visions of the Digital Economy in the
1990s
National Information Infrastructure
Agenda for Action
1993
Global Information Infrastructure
Agenda for Cooperation
1995
Framework for Global Electronic Commerce
The “Magaziner Report”
1997
National Research Council, Computer Science and Telecommunications Board (CSTB):
(1) Realizing the Information Future; (2) The Unpredictable Certainty; (3) The Internet’s Coming of Age
Pew Internet and American Life and Elon University: Imagining the Internet
Today’s Vision
(from XKCD)
Policy Matters - Smart Policy; Dumb Policy
What Helps:
Competition
Transparency
Smart Government
Buying
Strong Encryption
What Hurts:
Data Localization
Limits on Encryption
Monopolies
Protectionism
Restrictive Standards
28

More Related Content

What's hot

How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
How to Meet FFIEC Regulations and Protect Your Bank from Cyber AttacksHow to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
How to Meet FFIEC Regulations and Protect Your Bank from Cyber AttacksCloudflare
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsCloudflare
 
Hardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense StrategyHardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense StrategyCloudflare
 
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlareSurviving A DDoS Attack: Securing CDN Traffic at CloudFlare
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlareCloudflare
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersCloudflare
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCCloudflare
 
How Greta uses NATS to revolutionize data distribution on the Internet
How Greta uses NATS to revolutionize data distribution on the InternetHow Greta uses NATS to revolutionize data distribution on the Internet
How Greta uses NATS to revolutionize data distribution on the InternetApcera
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondCloudflare
 
Stopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaStopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaCloudflare
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cloudflare
 
What You're Missing With Your Current WAF Provider
What You're Missing With Your Current WAF ProviderWhat You're Missing With Your Current WAF Provider
What You're Missing With Your Current WAF ProviderCloudflare
 
Filling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation StrategyFilling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation StrategyCloudflare
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaCloudflare
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksCloudflare
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionAPNIC
 
Infoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security toolInfoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security toolJisc
 
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest SpeakerWeb Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest SpeakerCloudflare
 
Identifier Systems Security, Stability and Resiliency by Champika Wijayatunga
Identifier Systems Security, Stability and Resiliency by Champika WijayatungaIdentifier Systems Security, Stability and Resiliency by Champika Wijayatunga
Identifier Systems Security, Stability and Resiliency by Champika WijayatungaMyNOG
 
Authentication, Security, and Performance for the Internet of Things
Authentication, Security, and Performance for the Internet of ThingsAuthentication, Security, and Performance for the Internet of Things
Authentication, Security, and Performance for the Internet of ThingsCloudflare
 

What's hot (20)

How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
How to Meet FFIEC Regulations and Protect Your Bank from Cyber AttacksHow to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
How to Meet FFIEC Regulations and Protect Your Bank from Cyber Attacks
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teams
 
Hardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense StrategyHardening Microservices Security: Building a Layered Defense Strategy
Hardening Microservices Security: Building a Layered Defense Strategy
 
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlareSurviving A DDoS Attack: Securing CDN Traffic at CloudFlare
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDCThe Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
The Morphing DDoS and Bot Landscape: Featuring Guest Speaker from IDC
 
How Greta uses NATS to revolutionize data distribution on the Internet
How Greta uses NATS to revolutionize data distribution on the InternetHow Greta uses NATS to revolutionize data distribution on the Internet
How Greta uses NATS to revolutionize data distribution on the Internet
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respond
 
Stopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaStopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South Africa
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 
What You're Missing With Your Current WAF Provider
What You're Missing With Your Current WAF ProviderWhat You're Missing With Your Current WAF Provider
What You're Missing With Your Current WAF Provider
 
Filling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation StrategyFilling the Gaps in Your DDoS Mitigation Strategy
Filling the Gaps in Your DDoS Mitigation Strategy
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North America
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
 
Hashgraph as Code
Hashgraph as CodeHashgraph as Code
Hashgraph as Code
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
 
Infoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security toolInfoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security tool
 
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest SpeakerWeb Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
Web Performance Without Sacrificing Security: Featuring Forrester Guest Speaker
 
Identifier Systems Security, Stability and Resiliency by Champika Wijayatunga
Identifier Systems Security, Stability and Resiliency by Champika WijayatungaIdentifier Systems Security, Stability and Resiliency by Champika Wijayatunga
Identifier Systems Security, Stability and Resiliency by Champika Wijayatunga
 
Authentication, Security, and Performance for the Internet of Things
Authentication, Security, and Performance for the Internet of ThingsAuthentication, Security, and Performance for the Internet of Things
Authentication, Security, and Performance for the Internet of Things
 

Similar to 21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Performance, Flexibility and More[0]

Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformationCloudflare
 
All Things Open SDN, NFV and Open Daylight
All Things Open SDN, NFV and Open Daylight All Things Open SDN, NFV and Open Daylight
All Things Open SDN, NFV and Open Daylight Mark Hinkle
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaCodeOps Technologies LLP
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsGordon Haff
 
How Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITHow Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITPeter HJ van Eijk
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04Avinaba Basu
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudZscaler
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloudcentralohioissa
 
"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013Ryan Koop
 
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareCloudflare
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentJean Ryu
 
Risc and velostrata 2 28 2018 lessons_in_cloud_migration
Risc and velostrata  2 28 2018 lessons_in_cloud_migrationRisc and velostrata  2 28 2018 lessons_in_cloud_migration
Risc and velostrata 2 28 2018 lessons_in_cloud_migrationRISC Networks
 
Unit 1.2 move to cloud computing
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computingeShikshak
 
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014Exponential_e
 
Harness the Power of Microsoft Azure
Harness the Power of Microsoft AzureHarness the Power of Microsoft Azure
Harness the Power of Microsoft AzureRBA
 
A non-technical introduction to Cloud Computing
A non-technical introduction to Cloud ComputingA non-technical introduction to Cloud Computing
A non-technical introduction to Cloud ComputingWilliam Pourmajidi
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemInductive Automation
 
Gitex journey to the cloud
Gitex journey to the cloudGitex journey to the cloud
Gitex journey to the cloudJorge Sebastiao
 
WWTC Office Layout Diagram.htmlAmerican State & Local Po.docx
WWTC Office Layout Diagram.htmlAmerican State & Local Po.docxWWTC Office Layout Diagram.htmlAmerican State & Local Po.docx
WWTC Office Layout Diagram.htmlAmerican State & Local Po.docxericbrooks84875
 

Similar to 21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Performance, Flexibility and More[0] (20)

Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
 
All Things Open SDN, NFV and Open Daylight
All Things Open SDN, NFV and Open Daylight All Things Open SDN, NFV and Open Daylight
All Things Open SDN, NFV and Open Daylight
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
Devising a practical approach to the Internet of Things
Devising a practical approach to the Internet of ThingsDevising a practical approach to the Internet of Things
Devising a practical approach to the Internet of Things
 
How Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITHow Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run IT
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloud
 
"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013
 
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with Cloudflare
 
Introduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile PaymentIntroduction of Cloudflare Solution for Mobile Payment
Introduction of Cloudflare Solution for Mobile Payment
 
Risc and velostrata 2 28 2018 lessons_in_cloud_migration
Risc and velostrata  2 28 2018 lessons_in_cloud_migrationRisc and velostrata  2 28 2018 lessons_in_cloud_migration
Risc and velostrata 2 28 2018 lessons_in_cloud_migration
 
Unit 1.2 move to cloud computing
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computing
 
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014
Exponential-e | Cloud Revolution Seminar at the Ritz, 20th November 2014
 
Harness the Power of Microsoft Azure
Harness the Power of Microsoft AzureHarness the Power of Microsoft Azure
Harness the Power of Microsoft Azure
 
A non-technical introduction to Cloud Computing
A non-technical introduction to Cloud ComputingA non-technical introduction to Cloud Computing
A non-technical introduction to Cloud Computing
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA System
 
Gitex journey to the cloud
Gitex journey to the cloudGitex journey to the cloud
Gitex journey to the cloud
 
WWTC Office Layout Diagram.htmlAmerican State & Local Po.docx
WWTC Office Layout Diagram.htmlAmerican State & Local Po.docxWWTC Office Layout Diagram.htmlAmerican State & Local Po.docx
WWTC Office Layout Diagram.htmlAmerican State & Local Po.docx
 

More from Center for Entrepreneurship (C4E), University of Cyprus

More from Center for Entrepreneurship (C4E), University of Cyprus (20)

Startup Financing and Crowdfunding Lecture
Startup Financing and Crowdfunding LectureStartup Financing and Crowdfunding Lecture
Startup Financing and Crowdfunding Lecture
 
C4E_EcosystemReport_FINAL.pdf
C4E_EcosystemReport_FINAL.pdfC4E_EcosystemReport_FINAL.pdf
C4E_EcosystemReport_FINAL.pdf
 
Business ideas are easy implementation is the difficult part
Business ideas are easy implementation is the difficult partBusiness ideas are easy implementation is the difficult part
Business ideas are easy implementation is the difficult part
 
Pavlos Christoforou
Pavlos ChristoforouPavlos Christoforou
Pavlos Christoforou
 
Digital Utopia Digital Dystopia
Digital Utopia Digital DystopiaDigital Utopia Digital Dystopia
Digital Utopia Digital Dystopia
 
GEM 2019-2020 Presentation of Results
GEM 2019-2020 Presentation of ResultsGEM 2019-2020 Presentation of Results
GEM 2019-2020 Presentation of Results
 
The new enterprise model and the startup ecosystem during the crisis in Greece
The new enterprise model and the startup ecosystem during the crisis in GreeceThe new enterprise model and the startup ecosystem during the crisis in Greece
The new enterprise model and the startup ecosystem during the crisis in Greece
 
PwC Lecture: ‘Introduction to Negotiation Skills’
PwC Lecture: ‘Introduction to Negotiation Skills’PwC Lecture: ‘Introduction to Negotiation Skills’
PwC Lecture: ‘Introduction to Negotiation Skills’
 
Developing great ideas for startups
Developing great ideas for startupsDeveloping great ideas for startups
Developing great ideas for startups
 
Design Thinking
Design ThinkingDesign Thinking
Design Thinking
 
Understanding the Gaming Industry and working in a truly global corporation
Understanding the Gaming Industry and working in a truly global corporationUnderstanding the Gaming Industry and working in a truly global corporation
Understanding the Gaming Industry and working in a truly global corporation
 
Introduction to business plan
Introduction to business planIntroduction to business plan
Introduction to business plan
 
‘How to video interview 101’ by Katia Kyriakoudes
‘How to video interview 101’ by Katia Kyriakoudes‘How to video interview 101’ by Katia Kyriakoudes
‘How to video interview 101’ by Katia Kyriakoudes
 
PwC Workshop: ‘Introduction to Negotiation Skills’
PwC Workshop: ‘Introduction to Negotiation Skills’PwC Workshop: ‘Introduction to Negotiation Skills’
PwC Workshop: ‘Introduction to Negotiation Skills’
 
IEF 2019 Blue Island
IEF 2019 Blue IslandIEF 2019 Blue Island
IEF 2019 Blue Island
 
IEF2019 Infocredit
IEF2019 InfocreditIEF2019 Infocredit
IEF2019 Infocredit
 
IEF2019 OCL Oceanic Catering Ltd
IEF2019 OCL Oceanic Catering LtdIEF2019 OCL Oceanic Catering Ltd
IEF2019 OCL Oceanic Catering Ltd
 
IEF 2019 Nicolaides & Kountouris Metal Company LTD
IEF 2019 Nicolaides & Kountouris Metal Company LTDIEF 2019 Nicolaides & Kountouris Metal Company LTD
IEF 2019 Nicolaides & Kountouris Metal Company LTD
 
IEF2019 Thanos Hotels
IEF2019 Thanos HotelsIEF2019 Thanos Hotels
IEF2019 Thanos Hotels
 
The Future of Automation and Its Implications for Educational Systems
The Future of Automation and Its Implications for Educational SystemsThe Future of Automation and Its Implications for Educational Systems
The Future of Automation and Its Implications for Educational Systems
 

Recently uploaded

Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceBangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Pooja Nehwal
 
Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceSohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceLucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Famedesired Project portfolio1 . Fullsail
Famedesired Project portfolio1 . FullsailFamedesired Project portfolio1 . Fullsail
Famedesired Project portfolio1 . Fullsailfergusonamani
 
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Dàni Velvet Personal Brand Exploration (1).pptx
Dàni Velvet Personal Brand Exploration (1).pptxDàni Velvet Personal Brand Exploration (1).pptx
Dàni Velvet Personal Brand Exploration (1).pptxdmtillman
 
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...StartupSprouts.in
 
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceHyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceTirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceSangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.inEV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.inStartupSprouts.in
 

Recently uploaded (12)

Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceBangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Bangalore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323Call girls in Andheri with phone number 9892124323
Call girls in Andheri with phone number 9892124323
 
Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceSohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Sohna Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceLucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Lucknow Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Famedesired Project portfolio1 . Fullsail
Famedesired Project portfolio1 . FullsailFamedesired Project portfolio1 . Fullsail
Famedesired Project portfolio1 . Fullsail
 
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Dehradun Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Dàni Velvet Personal Brand Exploration (1).pptx
Dàni Velvet Personal Brand Exploration (1).pptxDàni Velvet Personal Brand Exploration (1).pptx
Dàni Velvet Personal Brand Exploration (1).pptx
 
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
Shareholders Agreement Template for Compulsorily Convertible Debt Funding- St...
 
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceHyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Hyderabad Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceTirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Tirupati Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceSangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Sangareddy Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.inEV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
EV Electric Vehicle Startup Pitch Deck- StartupSprouts.in
 

21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Performance, Flexibility and More[0]

  • 1. What’s Next for the Net? Michael R. Nelson Martin Levy Tech Strategy Network Strategy MNELSON@CLOUDFLARE.COM MARTIN@CLOUDFLARE.COM Twitter: @MikeNelson Twitter: @mahtin
  • 2. My Background • 5 years as Senator Gore's science advisor • 4 years as IT policy advisor in the Clinton White House • 1998-1999 -- Technologist at FCC • 9+ years at IBM • Joined Georgetown faculty, Jan. 2008 • Principal Technology Policy Analyst, Microsoft Tech. Policy Group • Public Policy, Cloudflare (in Washington, DC) • Tech Strategy, Cloudflare (in Cyprus)
  • 3. What Do Professors Do? • Provide a framework • Tell stories • Assign readings • Start a discussion • Require term papers • Grade students
  • 4. What Do Professors Do? • Provide a framework • Tell stories • Assign readings • Start a discussion • Require term papers • Grade students
  • 5. We are helping build a better Internet Cloudflare is an Edge Service Provider that provides performance, security, reliability, and insights to anything connected to the Internet. 5
  • 6. 153+ Data centers globally Cloudflare’s Global Anycast Network 15 Tbps Network capacity 10% Global HTTP Internet requests 10M Requests/second Infinite scalability is the future of the Internet 6
  • 7. Live Data Center In Progress/Planned 95%of internet users will live in a country with a Cloudflare data center Upcoming Data Centers in 2018
  • 8. A VERY Short History of the early Internet 1) “Dumb pipes” (text and IP addresses) 2) Domain Name System (Paul Mockapetris, 1983) 3) World Wide Web (Tim Berners-Lee, 1989) 4) Graphical web browser, MOSAIC (at NCSA UIUC, 1992) 5) Secure Socket Layer (Netscape, 1994) 6) Grid computing (early 1990s) 7) Content Distribution Networks (MIT + Akamai, 1998) 8) “Cloud computing” + Amazon Web Services (2000-2003)
  • 9. Two useful guides “Control Point Analysis” 2012 TRPC conference David D. Clark MIT CSAIL https://ssrn.com/abstract=2032124
  • 11. What’s Next? 1) Connectivity AND Compute almost EVERYWHERE 2) Edge services for the masses 3) Faster, simpler encryption 4) Security for the Internet of Things 5) The programmable Cloud (e.g. Cloudflare Workers)
  • 13.
  • 14. Cloudflare caches your content across our global network, bringing it closer to visitors from every region Power of Content Distribution Networks 14
  • 15. Origin Connection Reuse Minimize latency imposed by TCP connection-setup Congestion Avoidance Routing decisions using real-world network conditions 15 A Short Cut for the Net: Argo Smart Routing Congested Network Path Unreliable Connection Faster Loading Times Cloudflare routes over 10% of all HTTP Internet traffic providing Argo with real world intelligence on the fastest network paths. Internet node / hop Cloudflare Data Centers Cloudflare’s private network 15Tbps throughput, with 118+ PoPs in 58+ countries
  • 17. Trends for the Cloud 17 Replacing Hardware with Cloud Service ● Provision only what you need ● Pay only for what you use ● Zero downtime Less to manage at your site ● Cloud WAF and DDoS act as reverse proxies, provide equivalent protection lower costs with less complexity ● No “failover” to occur ● Bad traffic never reaches the origin’s network Simplify! One integrated package of Cloud services ● Single pane of glass ● Rapid on-boarding of the integrated offering Multi-Cloud: Provider Independence ● Independence & choice ● Consistent control plane ● Best of breed capabilities
  • 18. Concluding Tweets (from @MikeNelson) 1) The Internet is changing faster than ever! 2) But it’s hard to see changes in the infrastructure 3) Don’t focus on the network; focus on the data 4) The edge is where the action is 5) Prototype, Prototype, Prototype 18
  • 21.
  • 22. Looking Forward Developer Ecosystem ● Implementing new technologies and protocols in simple, scalable way for customers of all sizes ● Extend same performance and security to all protocols, all content and all devices Intelligent Edge ● Robust performance through data optimized routing ● Simple security through threat based firewall configuration ● Rich insights and actionable guidance Democratizing the Web ● Innovation and customization on the edge ● Bring audience and opportunity with App Store 22
  • 23. Cloudflare Workers 23 ● Respond dynamically when the origin server is unreachable. ● Implement custom load balancing and failover logic. ● Deploy fast fixes to a site in seconds, without having to update the origin server. ● Custom logic for cacheable requests and improved cache hit rate. ● Expand HTML templates to fetch only dynamic content from the origin. ● Dynamically respond to requests without contacting the origin server. ● Create custom security rules and filters to block unwanted visitors and bots. ● Implement custom authentication and authorization mechanisms. ● Perform data sanitization and validation before sending it to the origin. Cloudflare Workers let developers run JavaScript Service Workers in Cloudflare's 151 data centers in 70 countries
  • 24. Models Matter! Innovation>>> 24 SCoT Secure Cloud of Things CoVET Cloud of VERY Expensive Things IoT Internet of Things CoST Cloud of Shoddy Things Less Regulation More
  • 25. Innovation>>> 25 CoAT Cloud of ALL Things SCoT Secure Cloud of Things CoVET Cloud of VERY Expensive Things IoT Internet of Things CoST Cloud of Shoddy Things Less Regulation More
  • 26. Vision Matters - Visions of the Digital Economy in the 1990s National Information Infrastructure Agenda for Action 1993 Global Information Infrastructure Agenda for Cooperation 1995 Framework for Global Electronic Commerce The “Magaziner Report” 1997 National Research Council, Computer Science and Telecommunications Board (CSTB): (1) Realizing the Information Future; (2) The Unpredictable Certainty; (3) The Internet’s Coming of Age Pew Internet and American Life and Elon University: Imagining the Internet
  • 28. Policy Matters - Smart Policy; Dumb Policy What Helps: Competition Transparency Smart Government Buying Strong Encryption What Hurts: Data Localization Limits on Encryption Monopolies Protectionism Restrictive Standards 28