Radia Perlman in Madrid !!!

Radia Perlman well known as "as the 'Mother of the Internet" will be in Madrid, 30th Mar.

We are glad to have the opportunity to meet her at Complutense University in Madrid, where we attent to some speaks from her most representative researchs. Moreover (very cool) we are going to broadcast the session to internet : details.

 Sort bio of her (more at Wiki) : " Radia Perlman is a Fellow at Sun Microsystems. She is known for invention of the spanning tree algorithm used by bridges/switches in today's networks, as well as the fundamental algorithms that make link state protocols robust and scalable. Her current research interests include assured delete, making large networks robust against Byzantine failures, and replacing bridges/switch with technology which is upwardly compatible, but more robust, flexible, and scalable. She is author of "Interconnections: Bridges, Routers, Switches, and Internetworking Protocols", and coauthor of "Network Security: Private Communication in a Public World", which are widely used both as textbooks in universities and for engineers to learn the field. She holds over 90 patents, a PhD in computer science from MIT, and an honorary doctorate from KTH, the Royal Institute of Technology, Sweden. She recently was given a lifetime achievement award by Usenix, and named SVIPLA (Silicon Valley Intellectual Property Law Association) Inventor of the year."

 The session is arranged Mar 30th at Complutense University into the Computer Science Building in the "Salón de Grados" room from 16.00 to 18.300 (GMT+1).

Agenda :

16.00-16.55 "Data: Making it be there when you want it and go away when you want it gone"

Abstract:

There are certain types of data that must be reliably retained for some time, and then deleted.
But it is difficult to assure that deleted data is really gone.
In order not to prematurely lose data, copies should be kept in lots of locations. That makes it
difficult to really delete the data, since the backup copies can be stolen or copied, making
it impractical to be assured that all copies have been deleted.
The obvious solution is to encrypt the data, and then discard the keys of data
that is to be destroyed. However, reliably keeping, then reliably destroying all copies
of deleted keys has the same problem.
This talk describes a system that solves the problem of having data be irretrievably
lost after it is intended to be deleted, while still allowing arbitrarily many backup copies
to be made, in a way that is easy and inexpensive to manage, and with only
a trivial performance overhead over a traditional encrypted file system.

16.55-17.10  <<<< Break >>>

17.10-17.45 "Myths, Missteps, and Folklore of Network Protocol Design"

Network protocol design is not a nice, clean science, where what gets deployed is the best possible design. Instead, designs are influenced by issues such as politics, general confusion, and backward compatibility. Statements get made, and repeated, until it never occurs to anyone to question whether they're true.  Mistakes get made, and rather than backing up and fixing them, kludges are introduced to make things sort of work. This talk discusses how some of the odder things we live with (e.g., bridges) came about, and interesting bad protocol designs that have been standardized and/or deployed. It also discusses "obvious" protocol design issues that somehow get overlooked, such as designing for future evolution, and ability to change parameters, node by node, without disrupting a network. The talk is intended to be provocative, making people question the things they have always taken for granted.  It is also a plea to teach the subject in a way that empowers students to think critically about protocol designs, rather than simply memorizing the current standards in order to implement them.

17.45-18.30 "Routing without tears, bridging without danger"

Abstract:

Why is route calculation done at both layers 2 and 3 of networking? Is one better? Do we need both? This talk explains the historical accident by which bridging was conceived and the properties that make it attractive, and dangerous, today. The talk discusses new work being done in IETF known as TRILL (TRansparent Interconnection of Lots of Links), which combines the advantages of bridges (layer 2 forwarding devices) and routers (layer 3 forwarding devices).

She was in Madrid last year and she left us this interview.

Also you can read the spanish version of her bio on the wiki.

Enjoy !!!

I hope see you all there !!!

Comments:

Post a Comment:
  • HTML Syntax: NOT allowed
About

General discussion in English and/or Spanish mainly about life in a new feeling and SOA, JES components and Java in general in the software arena.

Search

Archives
« May 2015
SunMonTueWedThuFriSat
     
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
      
Today