Upgrade to Pro — share decks privately, control downloads, hide ads and more …

State of the Net 2015

State of the Net 2015

What the Internet is, how we use it, the decision points we face and the results of those decisions.

Ben Holt

June 30, 2015
Tweet

More Decks by Ben Holt

Other Decks in Technology

Transcript

  1. Organization • What is the ‘Net • How we interact

    with the ‘Net • Decision points that face us • What Future Awaits?
  2. If someone from the 1950s suddenly appeared today, what would

    be the most difficult thing to explain to them about life today? I possess a device, in my pocket, that is capable of accessing the entirety of information known to man. I use it to look at pictures of cats and get in arguments with strangers. -- /u/nuseramed on reddit
  3. Nearly 1 in 3 (32%) of people aged 18-24 use

    social networking in the bathroom State of the Media: The Social Media Report 2012, nielsen
  4. #4

  5. Preliminary Mobile Drive Test Results of LTE Service in Utah,

    The State of Utah Broadband Project, January 2014
  6. Preliminary Mobile Drive Test Results of LTE Service in Utah,

    The State of Utah Broadband Project, January 2014
  7. PlayStation 4 Tesla Model S Facebook jQuery Ubuntu (Linux) jQuery

    Lua C Language (GCC? Clang?) React SQLite Webkit? (probably) MySQL FreeBSD Kernel V8? (probably) Cassandra Webkit nginx / Proxygen OpenSSL CentOS
  8. Stoel – Rives Durham Jones & Pinegar utcourts.gov Federal District

    Courts of Utah TraskBritt jQuery jQuery jQuery (1.10.2) Apache jQuery util-functions Fancybox jQuery (not a typo, they load it twice, haha) (1.3.2) Linux (Red Hat) nginx clear-default-text PHP (Fixed - PHP) (Tables?!?) Linux ASP.NET Wordpress ASP.NET Script in Table Entry (invisible entry) colorbox
  9. Internet of Things • Thermostats • Fitness Devices (Fitbit, etc.)

    • Light bulbs • Internet enabled webcams • Smart phones • Smoke / CO 2 detectors • House alarms • Sprinkler systems • Home theaters • Door locks • Door bells
  10. Gemalto SIM Card Key Hack NSA Influence in NIST Cryptography

    (Dual_EC_DRBG) NSA Hard Drive Firmware Bulk Collection of Mobile Phone Locations Network Taps into Company Networks Boomerang Routing