Home / Blogs

Thinking Outside the Internet

Below is a talk I gave at Google in Cambridge January 6, 2014. Some may know this as Ambient or Borderless Connectivity, but I’m titling this post as “Thinking Outside the Internet.” It builds on my Three Stages of Digital theme, outlining how we are shifting from a telecom-centric framing with meaning and value inside the wire to today’s Internet in which meaning and value are no longer contained within channels.

In this article I go into more detail about the distinction between connectivity and the message passing that makes devices like cell phones gatekeeping intermediaries.

The talk builds on the ideas in Refactoring CE and other writings. I’m now using the term “Borderless connectivity” which may work better than “Permissionless Ambient Connectivity” to emphasize the theme of thinking outside the Internet.

Below is the video recording followed by the first few slides from the presentation:



By Bob Frankston, IEEE Fellow

Bob Frankston is best known for writing VisiCalc, the first electronic spreadsheet. While at Microsoft, he was instrumental in enabling home networking. Today, he is addressing the issues associated with coming to terms with a world being transformed by software.

Visit Page

Filed Under

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Comments

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

Related

Topics

Threat Intelligence

Sponsored byWhoisXML API

Domain Management

Sponsored byMarkMonitor

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byAppdetex

IPv4 Markets

Sponsored byIPXO