{"id":633206,"date":"2023-04-21T09:56:08","date_gmt":"2023-04-21T14:56:08","guid":{"rendered":"https:\/\/news.sellorbuyhomefast.com\/index.php\/2023\/04\/21\/beyond-web-2-0-a-computer-weekly-downtime-upload-podcast\/"},"modified":"2023-04-21T09:56:08","modified_gmt":"2023-04-21T14:56:08","slug":"beyond-web-2-0-a-computer-weekly-downtime-upload-podcast","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2023\/04\/21\/beyond-web-2-0-a-computer-weekly-downtime-upload-podcast\/","title":{"rendered":"Beyond Web 2.0: A Computer Weekly Downtime Upload podcast"},"content":{"rendered":"<div id=\"content-header\">\n<p><span>By<\/span><\/p>\n<ul>\n<li>\n\t\t\t\t<a href=\"https:\/\/www.techtarget.com\/contributor\/Cliff-Saran\">Cliff Saran<\/a>,<span> Managing Editor<\/span>\n\t\t\t\t\t<\/li>\n<\/ul><\/div>\n<div id=\"content-center\">\n<ul>\n<li><i data-icon=\"1\"><\/i><\/li>\n<li><i data-icon=\"2\"><\/i><\/li>\n<\/ul>\n<section id=\"content-body\">\n<div>\n<p><img decoding=\"async\" alt src=\"https:\/\/cdn.ttgtmedia.com\/rms\/computerweekly\/CWPodcast_DownTimeUpload.jpg\"><\/p>\n<div>\n<p><span>Listen to this podcast<\/span><\/p>\n<p>Like others who have developed technology that powers the internet, David Holtzman, chief strategist at decentralised cyber security network Naoris Protocol, has an unusual background<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div>\n<p>David Holtzman, who previously worked as chief scientist at IBM, is the designer of the <a href=\"https:\/\/www.techtarget.com\/searchnetworking\/definition\/domain-name-system\">global DNS<\/a> registration system used by the <a href=\"https:\/\/www.computerweekly.com\/news\/252458460\/Icann-calls-for-community-collaboration-to-protect-the-internet\">Internet Corporation for Assigned Names and Numbers (ICANN)<\/a>, and now works as chief strategist at decentralised cyber security network Naoris Protocol.<\/p>\n<p>Armed with a degree in philosophy, Holtzman began his career as a philosophy teacher. When he decided there wasn\u2019t enough money in teaching, he got involved with the US military. He worked as a US intelligence agent during the Cold War, during which time he became a cryptographer and learnt Russian.<\/p>\n<p>\u201cI was a submariner and spent quite a few years travelling to unusual places on submarines, doing what you may think Russian-speaking cryptographers might do on a submarine,\u201d he says.<\/p>\n<p>After submarines, he joined the National Security Agency as a cosmonaut analyst.<\/p>\n<p>Looking back on this stage in his career, Holtzman says: \u201cThe common element in all this was information and computers. It was the early 80s at this point, and I got fascinated with computers. I left everything I was doing and started working for computer companies in the Washington, DC area.\u201d<\/p>\n<p>Holtzman learned to program in a number of computer languages and worked as a systems analyst, before joining a research group at Booz Allen, where he designed and built a <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/access-control\">heterogeneous data access<\/a> system on a NeXT computer. \u201cIt\u2019s still the most beautiful computer I\u2019ve ever used,\u201d he says. \u201cI was at a trade show and Steve Jobs walked by. He was impressed with what I had done and his guys grabbed my computer, brought it on the stage, and I became part of a televised keynote.\u201d<\/p>\n<p>Holtzman later joined Network Solutions, the world\u2019s first domain registrar, as its chief technology officer. At the time, there were about 50,000 to 60,000 domain names, but this was set to explode. Holtzman\u2019s job was to manage the internet\u2019s master root server. By the time he left in 2001, there were already 10 million domain names.<\/p>\n<p>During his time there, Network Solutions went public. \u201cWe were in the middle of the maelstrom of all the controversy involving the .com world. So I got a taste of all this, and I got to know a lot of the people, and I made a little bit of money,\u201d he says.<\/p>\n<p>\u201cOne of the things I got out of that experience was that the internet was about to become a bit of a scary place, and the scary part for me was the desire of people who didn\u2019t know what they were doing to regulate something that they didn\u2019t understand.\u201d<\/p>\n<p>He says there is a lack of privacy and understanding of what security means in the US. The fines imposed on companies for data losses are so insignificant that there is little incentive to improve security. For instance, <a href=\"https:\/\/www.computerweekly.com\/news\/252440794\/Equifax-breach-lessons-not-learned\">pointing to Equifax<\/a>, Holtzman says that one in every three Americans was affected by its data breach yet it received a minimal fine, so the downside of a data breach is trivial.<\/p>\n<p>Holtzman says company executives simply do not want to spend that extra money needed to fix internet security. \u201cWhy would you spend half a billion dollars to improve your security? That\u2019s actually an issue for the regulators.\u201d<\/p>\n<p>The other big challenge is that protocols last an awfully long time and there is a reluctance to make changes in case these changes break legacy code. For instance, he says, a quarter of a century ago, the people behind the internet agreed on an improved DNS \u2013 DNSSec \u2013 to carry cryptographic identification information at each node on the DNS tree.<\/p>\n<p>\u201cYou know what? That\u2019s still not being used. The <a href=\"https:\/\/www.computerweekly.com\/news\/252499233\/Millions-of-devices-at-risk-from-NAMEWRECK-DNS-bugs\">DNS system has fundamentally no security<\/a> whatsoever, even today. If you had even the remotest idea what you were doing, you could sit in a hotel room with a laptop and take an entire country off the internet,\u201d says Holtzman.<\/p>\n<p>The same, he says, is true of TCP\/IP. In spite of efforts to <a href=\"https:\/\/www.techtarget.com\/searchnetworking\/answer\/IPv4-vs-IPv6-Whats-the-difference\">migrate from IPv4 to IPv6<\/a>, the majority of the internet is still running the older version of the protocol. There are also years of legacy protocols, which will still exist 50 years from now.<\/p>\n<p>\u201cDo I think we\u2019re going to throw all this stuff out and start over? There\u2019s not a chance in hell. We\u2019re stuck with what we have, and people 50 years from now will have all kinds of weird protocols and they won\u2019t understand where these things came from.\u201d<\/p>\n<p>For Holtzman, the internet requires innovators to push the boundaries with creativity. But these innovations risk being stifled or limited by backwards compatibility and by policymakers who lack even the most basic understanding of computer science.<\/p>\n<\/p><\/div>\n<\/section>\n<\/div>\n<p><a href=\"https:\/\/www.computerweekly.com\/podcast\/Beyond-Web-2-A-Computer-Weekly-Downtime-Upload-podcast\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Augustine Klemp<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Cliff Saran, Managing Editor Listen to this podcast Like others who have developed technology that powers the internet, David Holtzman, chief strategist at decentralised cyber security network Naoris Protocol, has an unusual background David Holtzman, who previously worked as chief scientist at IBM, is the designer of the global DNS registration system used by<\/p>\n","protected":false},"author":1,"featured_media":633207,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4679,3665,46],"tags":[],"class_list":{"0":"post-633206","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-beyond","8":"category-computer","9":"category-technology"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/633206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=633206"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/633206\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/633207"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=633206"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=633206"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=633206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}