Radia Perlman well known as "as the 'Mother of the Internet" will be in Madrid, 30th Mar.
We are glad to have the opportunity to meet her at Complutense University in Madrid, where we attent to some speaks from her most representative researchs. Moreover (very cool) we are going to broadcast the session to internet : details.
Sort bio of her (more at Wiki) : "
Radia Perlman is a Fellow at Sun Microsystems. She is known for
invention of the spanning tree algorithm used by bridges/switches in today's networks, as well as the fundamental
algorithms that make link state protocols robust and scalable. Her current research interests include assured delete, making large
networks robust against Byzantine failures, and replacing bridges/switch with
technology which is upwardly compatible, but more robust, flexible, and scalable. She is author of "Interconnections: Bridges, Routers, Switches, and
Internetworking Protocols", and coauthor of "Network Security: Private
Communication in a Public World", which are widely used both as
textbooks in universities and for engineers to learn the field. She
holds over 90 patents, a PhD in computer science from MIT, and an
honorary doctorate from KTH, the Royal Institute of Technology, Sweden.
She recently was given a lifetime achievement award by Usenix, and
named SVIPLA (Silicon Valley Intellectual Property Law Association)
Inventor of the year."
The session is arranged Mar 30th at Complutense University into the Computer Science Building in the "Salón de Grados" room from 16.00 to 18.300 (GMT+1).
16.00-16.55 "Data: Making it be there when you want it and go away when you
want it gone"
There are certain types of data that must be reliably retained for some
time, and then deleted.
But it is difficult to assure that deleted data is really gone.
In order not to prematurely lose data, copies should be kept in lots of
locations. That makes it
difficult to really delete the data, since the backup copies can be
stolen or copied, making
it impractical to be assured that all copies have been deleted.
The obvious solution is to encrypt the data, and then discard the keys
that is to be destroyed. However, reliably keeping, then reliably
destroying all copies
of deleted keys has the same problem.
This talk describes a system that solves the problem of having data be
lost after it is intended to be deleted, while still allowing
arbitrarily many backup copies
to be made, in a way that is easy and inexpensive to manage, and with only
a trivial performance overhead over a traditional encrypted file system.
16.55-17.10 <<<< Break >>>
17.10-17.45 "Myths, Missteps, and Folklore of Network Protocol Design"
Network protocol design is not a nice, clean science, where what gets
deployed is the best possible design. Instead, designs are influenced by
issues such as politics, general confusion, and backward compatibility.
Statements get made, and repeated, until it never occurs to anyone to
question whether they're true. Mistakes get made, and rather than
backing up and fixing them, kludges are introduced to make things sort
of work. This talk discusses how some of the odder things we live with
(e.g., bridges) came about, and interesting bad protocol designs that
have been standardized and/or deployed. It also discusses "obvious"
protocol design issues that somehow get overlooked, such as designing
for future evolution, and ability to change parameters, node by node,
without disrupting a network. The talk is intended to be provocative,
making people question the things they have always taken for
granted. It is also a plea to teach the subject in a way that empowers
students to think critically about protocol designs, rather than simply
memorizing the current standards in order to implement them.
17.45-18.30 "Routing without tears, bridging without danger"
Why is route calculation done at both layers 2 and 3 of networking? Is
one better? Do we need both? This talk explains the historical accident
by which bridging was conceived and the properties that make it
attractive, and dangerous, today. The talk discusses new work being done
in IETF known as TRILL (TRansparent Interconnection of Lots of Links),
which combines the advantages of bridges (layer 2 forwarding devices)
and routers (layer 3 forwarding devices).
She was in Madrid last year and she left us this interview.
Also you can read the spanish version of her bio on the wiki.
I hope see you all there !!!