The Underground battles over the future of the Internet, and what You can do.

459 views
402 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
459
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

The Underground battles over the future of the Internet, and what You can do.

  1. 1. The Underground battles over the future of the Internet, and what You can do.
  2. 2. Quick Facts <ul><li>1982: The CIA used the Internet to blow up one of the biggest pipeline in Russia. </li></ul>
  3. 3. Quick Facts <ul><li>May 2007, Estonia Banks and telecom systems were disrupted for several days (cyber attack). </li></ul>
  4. 4. Quick Facts <ul><li>October 2007 IBM and Google announced the area of Cloud computing. </li></ul>
  5. 5. Quick Facts <ul><li>November 5, 2007: Google announced Android and founded the Open Handset Alliance </li></ul>
  6. 6. Quick Facts <ul><li>May 2008: USA government announced $30 billion effort to better prep for battle online </li></ul>
  7. 7. Quick Facts <ul><li>2008: Several countries (France, Germany, etc.) claimed “National” Internet as a sovereign territory </li></ul><ul><li>Internet was added as the 5 th battlefield for war (after land, air, sea, space) in many major countries </li></ul><ul><li>Quick definition : “ sovereign means the only final authority in a territory” </li></ul>
  8. 8. Quick Facts <ul><li>Sept. 2008: 3 millions people in Brazilian city Spirito Santos were totally plunged in Darkness because of cyber-attack </li></ul>
  9. 9. Quick Facts <ul><li>June 16, 2009: The USA government asked Twitter to delay a due maintenance during Iran Election. </li></ul>
  10. 10. Quick Facts <ul><li>March 23, 2010: Google shut down its search service in China </li></ul>
  11. 11. Quick Fack <ul><li>January 2009: NATO opened a cyber Defense school in Tallinn (Estonia) </li></ul>
  12. 12. The Internet today.
  13. 13. The Perfect Internet.
  14. 14. Repetition of the same <ul><li>« Nature is an endeless combination and repetition of a very few laws . » </li></ul><ul><li>Ralph Waldo Emerson </li></ul><ul><li>« The farther backward you can look, the farther forward you are likely to see » </li></ul><ul><li>Winston Churchill </li></ul>
  15. 15. Back to the 80s The Network battle
  16. 16. The Internet vs ALL Internet Versus Compuserve Prodigy Aol Genie MCI Mail Public Network, based on the “Procrastination principle” Commercial networks, organized, Smart, Clean, Family friendly, Safe, well funded, and huge.
  17. 17. Typical Commercial Network <ul><li>Proprietary: The owner is the Master. </li></ul><ul><li>App store (only approved applications) </li></ul><ul><li>A list of approved providers </li></ul><ul><li>All users need a personal ID </li></ul>
  18. 18. How the Internet Prevailed? <ul><li>The intelligence of the Network will be at the ends, not at the center. (No Center) </li></ul><ul><li>Only one function: package data and send it. (No Control over the data) </li></ul><ul><li>Everyone is equal, We trust people, no need to control people (No ID necessary). </li></ul><ul><li>Everyone can connect & create without asking permission to anyone (No limitation to access). </li></ul>
  19. 19. The September 11 of the Internet
  20. 20. What if ? <ul><li>General William T. Lord of the USA Army said: </li></ul><ul><li>“ You don’t need anymore an army, planes, ships, marines to attack the USA, a single computer could cause several September 11” </li></ul>
  21. 21. Back to the 70s The Box battle
  22. 22. The IBM Model <ul><li>1960s: IBM dominate business computing </li></ul><ul><li>IBM Provide everything: hardware, software, maintenance, and training </li></ul><ul><li>Business model: Computing as a service based on leasing for monthly fee </li></ul><ul><li>Clients can’t repurpose the machines, add in-house software or install third party software. </li></ul>
  23. 23. IBM Anti-trust Suit <ul><li>1969: under anti-trust suit, IBM liberated the computer </li></ul><ul><li>The owner of a computer could do what he or she wants. </li></ul><ul><li>Computer manufacturers are in hardware business. </li></ul>
  24. 24. The Free Box started a Revolution <ul><li>Hardware innovation: The Apple II </li></ul><ul><li>Software innovation: Visicalc starts the personal computer revolution. </li></ul>
  25. 25. The Open source mobile phone <ul><li>Nice : Iphone </li></ul><ul><li>Ugly : TuxPhone </li></ul>http://opencellphone.org http://wiki.openmoko.org
  26. 26. Back to the 90s The code battle (proprietary code vs open source)
  27. 27. Microsoft Model <ul><li>The control of the Box software </li></ul><ul><li>Proprietary code. No one could see what is behind it and customize it. </li></ul><ul><li>Collective security and innovation depend on one company. </li></ul><ul><li>The Microsoft Tax: everyone buying a PC is forced into Microsoft. </li></ul>
  28. 28. The Open source Model <ul><li>The source code is available to all </li></ul><ul><li>You can use it for free, and innovate around it. </li></ul><ul><li>You can improve it and give back to the community </li></ul><ul><li>Vulnerabilities are found and patched quickly and efficiently </li></ul>
  29. 29. Baby, Think! <ul><li>Most of you will not be here if not the open source movement </li></ul><ul><li>Mysql / php </li></ul><ul><li>Tomcat/apache </li></ul><ul><li>Postgress </li></ul><ul><li>Wordpress </li></ul><ul><li>Firefox </li></ul><ul><li>… </li></ul>
  30. 30. Back to the 00s The content battle (Who owns the content?)
  31. 31. Who owns the content? <ul><li>The copyright vs the Collective commons. </li></ul><ul><li>P2P content distribution </li></ul><ul><li>Who owns user generated content </li></ul><ul><li>News aggregators, search engines use of third party contents. </li></ul>
  32. 32. Understanding A theoretical model to understand
  33. 33. The network Layers Level Layer What is it. The battle The winner Top Content Layer The content War Stuff & Service (text, video, voice, etc.) <ul><li>Top-down / bottom up content </li></ul><ul><li>Copyright </li></ul>YOU (Person of the year 2006) Middle Logical layer The Soft-War Code and application that run the machines and the stuff Proprietary vs open source Open source Bottom Physical layer The Hard-War Wires, computers, hardware that make the transmissions <ul><li>PC vs Information appliance </li></ul><ul><li>the Internet vs the smart network </li></ul>The PC & The Internet
  34. 34. Present and Future battles <ul><li>The Network (controlled vs Open) </li></ul><ul><ul><li>Id (mandatory iD) vs anonymity </li></ul></ul><ul><ul><li>Net neutrality (Send and pray vs Priority packet/QoS) </li></ul></ul><ul><ul><li>P2P netwokr vs Server/Client Network </li></ul></ul><ul><li>The Box (Information appliance vs platform) </li></ul><ul><ul><li>Proprietary vs Open </li></ul></ul><ul><ul><li>Closed Architecture vs open architecture </li></ul></ul><ul><li>Content access (search engines vs Social search) </li></ul><ul><ul><li>Free access to information vs controlled access </li></ul></ul><ul><ul><li>Copyright vs commons </li></ul></ul>
  35. 35. Contact me <ul><ul><ul><li>Mawuna KOUTONIN </li></ul></ul></ul><ul><ul><ul><li>Founder & CEO of Linkcrafter.com </li></ul></ul></ul><ul><ul><ul><li>Email: mk@linkcrafter.com </li></ul></ul></ul><ul><ul><ul><li>Twitter: @linkcrafter </li></ul></ul></ul><ul><ul><ul><li>Mobile: +370 60 86 82 27 </li></ul></ul></ul>

×