N G I Z e r o : y e a r 0 Come work for the internet on privacy, trust, search & discovery Powered by the European Commission Directorate-General for Communications Networks Content and Technology 825322 / 825310 F O S D E M 2 0 1 9 1 2 0 1 9 - 0 2 - 0 3
“ F r o m u t o p i a t o d y s t o p i a i n j u s t 2 9 s h o r t y e a r s ” “We demonstrated that the Web had failed instead of served humanity, as it was supposed to have done, and failed in many places. The increasing centralization of the Web ended up producing—with no deliberate action of the people who designed the platform—a large-scale emergent phenomenon which is anti-human.” Tim Berners-Lee 3 F O S D E M 2 0 1 9 2 0 1 9 - 0 2 - 0 3
A n e n g i n e e r i n g r a c e w i t h h i g h s t a k e s Wernher von Braun Robert Oppenheimer 4 F O S D E M 2 0 1 9 2 0 1 9 - 0 2 - 0 3
NGI is a moonshot efgort + + ● The internet is the l and mo a r g e s t s t p e r v a s i v e technical construct ever made by humans ● And we need to change it with 3.8+ billion people ‘on board’. ● High political stakes. High economic stakes. Highly critical users users. Overloaded with expectations. From everybody. ● Work consistent and forward-thinking. No time to lose. 5 F O S D E M 2 0 1 9 2 0 1 9 - 0 2 - 0 3
Next Generation Internet 7 F O S D E M 2 0 1 9 2 0 1 9 - 0 2 - 0 3
Next Generation Internet u m e c t r d s p n e s s i g u n a 5 G u r e a n i n i n m f a i l R e t m a i t e d o s y s b l i c e o f p u c a d f o r C a s "Greening" internet g e o n a Public Procurement s p i i a l e u s t r I n d Pervasive surveillance e technology u l t u r n o c m o o m y f r w a Redesign insecure standards e r a Open (user-defined and S t e Background process Cyber warfare/conflicts n d controlled) security n a a t i o transparency e g r n i n t Eng ngine neering ng u t i o l i n g S o l u n d v e b Abuse handling t i t i Sensor data firewalling m p e Solving scalability issues c o Trustworthine ness p r e Transport layer security Lack of isolation Numbering d i v e s a n Partitioning/scope isolation v a s n e s Domain isolation r - i n b u s t N A T o v e r o i s e n f o r Confidentiality d e r n w s i g Decentralised internet-wide M o l l o D e m y g o a o n o p i n g h t t n c y a u t s h a p y r i g e r g e fg i c c o a r n i e m Naming system alternatives T r a l s h a s e identity mechanisms r c i a c r e Alterna native c y m e I n e s r e s n s c o m v e s n p a i f l e o n - o n s r i a n p r o n e s i p t y t e n t e r c u r o n t Packet interference S inf nfrastructure e element nts e ) c a t a s s i v i g d ( p a u s b S a e f c i o M a l i m s n i s h a m e c End to end confidentiality of n g o n p o r t r i p t i n s i t i s u p / s c Man-made t r a u a l w a r e s t i c i n g y o fu e a l i u l t l i i a l i t High availability Real-time measurement data u r e s t i n g R g m d e n t trafgic metadata S e c p d a v i n o n f i n d u Distributed reputation p r o r c Scalability Lack of transparency of t y n a I m l a y e Protecting users during i n r a l i u t i o i n g Open (user-defined and v e r r . t . N e u t r i b Verifiability of routing paths o u t f s i l l o e w . Improve limited upgrade e t d i s t R r o o l s p e n c N mechanism(s) t y p g i t a S S g l i g environmental cost c u r i n d i nomadic access (e.g. wifi) e e c c h n e L L e e controlled) security S e n t a i d u u r r w i t t h e capabilities g g i i s s l l a a t t C o w o r l i i n n n Industrial sabotage g Legacy hardware t t o i i v v e e Programmes exposed by a a s s e s a l e a g l g i h r e a p p e e c c t t s s n c i y s i c D t t h h a t n d e p h e e e a s Management of high volume of e p e Improving low-level discovery e e a n u c u s s t t y d n n v v t e n e e e m m e n p a r m i i r a r i n r r y s t o n 3 r d o o n n c o s n v i r Strenghten encryption whistle blowers Tamper proof m m o l e e e r e i t i e s Right to be IoT ofgline Firewalls w e e h o w s a b i l Follow best practices w.r.t. n n t t B r updates/ changes c a p Stricter maintaining of existing e r y w n Antagonistic (legacy) s c o v k n o d d i U n (including environment) Safeguarding a n ng o openne nness Unlocking verticals 5G standardisation issues (Hardware) Isolation of overall system impact r c h laws and regulations s m Addressing v e ng t r threat S e a h a n i p i l l o m e c Mandatory hard switches for a l s Lead by example s t o n t middleware Declarative interaction t r u cryptographic material o r i z to ne new e ent ntrant nts m u t e d protecting users n g h e r u r i b embedded cameras and other n t i categories Disaster s i z p e c D t i s t e v e Asset distribution b l e n s P r Improving deployability Passive observation g t a O p e Data retention u t i n Trafgic loss l r o Legacy hardware o b a Redundancy Right to encryption G l Lack of isolation Need to improve efgiciency End-user service deployability and maintainability devices b i g i n t o g h t n s i v e i o h a h t t n g m s R i g e r i t e Natural Best practises and bundled a t h s y s t a g i n g d a e r a t Duty to update/mandatory 8 o p b i l e expertise M o open sourcing at EOL F O S D E M 2 0 1 9 2 0 1 9 - 0 2 - 0 3
T h e l a r g e r e c o s y s t e m 9 F O S D E M 2 0 1 9 2 0 1 9 - 0 2 - 0 3
N G I V i s i o n “The overall mission of the Next Generation Internet initiative is to re-imagine and re- engineer the Internet for the third millennium and beyond. W e e n v i s i o n t h e i n f o r ma t i o n a g e w i l l b e a n e r a t h a t We want b r i n g s o u t t h e b e s t i n a l l o f u s . to enable human potential and creativity at the largest possible scale. In order to preserve and expand the European way of life, we shape a value-centric, human and inclusive Internet for all.” R e a d f u l l t e x t a t h t t p s : / / n g i . e u / v i s i o n 1 0 F O S D E M 2 0 1 9 2 0 1 9 - 0 2 - 0 3
F a c i l i t a t e i n c r e m e n t a l i n n o v a t i o n a s t e c h c o m m o n s 'R&I Actions' should encourage, when relevant, o p e n s o u r c e sofuware and o p e n h a r d w a r e design, access to d , a t a activities, access s t a n d a r d i s a t i o n to testing and operational infrastructure as well as an IPR regime ensuring lasting impact and r of results. e u s a b i l i t y 1 1 F O S D E M 2 0 1 9 2 0 1 9 - 0 2 - 0 3
O n e y e a r a g o i n a r o o m r a t h e r c l o s e t o t h i s o n e . . . 1 2 F O S D E M 2 0 1 9 2 0 1 9 - 0 2 - 0 3
F a s t - f o r w a r d . . . 1 3 F O S D E M 2 0 1 9 2 0 1 9 - 0 2 - 0 3
P r o j e c t - c e n t r i c 1 7 F O S D E M 2 0 1 9 2 0 1 9 - 0 2 - 0 3
O u r a p p r o a c h Design a light-weight and confidential application procedure providing adequate insight into technical capabilities as well as the urgency, relevance and relative cost efgectiveness of the projects proposed at a low cost to the a . p p l i c a n t s W e i g h t C r i t e r i o n 3 0 % T e c h n i c a l e x c e l l e n c e / f e a s i b i l i t y 4 0 % R e l e v a n c e / I m p a c t / S t r a t e g i c p o t e n t i a l 3 0 % C o s t e fg e c t i v e n e s s / V a l u e f o r mo n e y 1 8 F O S D E M 2 0 1 9 2 0 1 9 - 0 2 - 0 3
I m p r o v e i d e a s w h e r e n e e d e d .. we use a staged approach which identifies and amends missing or inadequate aspects of the proposals prior (and conditional) to the start of a project. … and guide and support projects with essential QA and strategic aspects that require additional expertise 1 9 F O S D E M 2 0 1 9 2 0 1 9 - 0 2 - 0 3
Recommend
More recommend