Internet2 Spring 2004.pptApril 2004 Napster University Program Elements of Success W. Pence Chief Technology Officer Napster LLC.

Slides:



Advertisements
Similar presentations
DCIA P2P Media Summit Stephen Condon Vice President, Marketing Broadband Content Services.
Advertisements

Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Some Open Problems in Publish/Subscribe Networking David S. Rosenblum Chief Technology Officer PreCache Inc.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Audible Magic Corporation 985 University Avenue #35 Los Gatos, CA USA x145 Tools to Help Universities.
Penn State Steve Kellogg Penn State University 4/20/2004.
1 Content Delivery Networks iBAND2 May 24, 1999 Dave Farber CTO Sandpiper Networks, Inc.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
# Idowu Samuel O. # Kashif Shahzad # Arif Kamal M7001E - Multimedia systems [ltu.se] ©2011.
Does "The Cloud" Fit Into Your Organization? Tom Horan Meridian IT Inc. VP, Strategic Markets (847)
Digital Rights Management 5th Annual Wireless Java Conference January 21-23, 2004 Kevin Mowry, Motorola Chair, OMA Download and DRM group.
ORACLE APPLICATION SERVER BY PHANINDER SURAPANENI CIS 764.
1 Enabling Secure Internet Access with ISA Server.
Raising awareness in relation to copyright – Facing piracy Christian Sommer Chairman of the Board German Federation against Copyright Theft (GVU)
Introduction What is Corporate Communications Screensaver? - Revolutionary tool for communications. - Secure and Easy broadcast technology - Turns existing.
Your storage on the ground; Your files in the cloud.
© 2009 Level 3 Communications, LLC. All Rights Reserved. Level 3 Communications, Level 3, the red 3D brackets and the Level 3 Communications logo are service.
Making the Internet a Better Place for Business NIST PKI Steering Committee March 14, 2002.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Web Resources Caroline Pierce CSC 101 Spring 2008.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Department of Information Engineering The Chinese University of Hong Kong A Framework for Monitoring and Measuring a Large-Scale Distributed System in.
Peer-to-Pee Computing HP Technical Report Chin-Yi Tsai.
Penn State/Napster 2.0 Trial Russell S. Vaught Associate Vice Provost Information Technology.
Presentation to France Telecom Ashwin Navin Co-Founder, Chief Operating Officer bittorrent.com.
Internet2 Spring 2004.pptApril 2004 Napster University Program Elements of Success W. Pence Chief Technology Officer Napster LLC.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
Kiew-Hong Chua a.k.a Francis Computer Network Presentation 12/5/00.
1 Management Information Systems NYC Human Resources Administration Richard Siemer – Deputy Commissioner MIS.
Chris Pannozzo September 20,2007 CSC 101 Asssignment 2 Web Resources.
EDUCAUSE 2005 Annual Conference October 19, 2005.
Identity and Access Management Siddharth Karnik. Identity Management -> Oracle Identity Management is a product set that allows enterprises to manage.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Information Worker Effective, consistent interface across business applications Immediate productivity Flexible, consistent user access IT Management.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Bruce Maggs Duke University Akamai Technologies Carnegie Mellon University delivering content to the next billion.
Network Reliability and Interoperability Council VII NRIC Council Meeting Focus Group 1B Network Architectures for Emergency Communications in 2010 September.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Penn State Napster 2.0 Trial1 Penn State/Napster 2.0 Trial Russ Vaught.
Peer-to-Peer (P2P) Networks By Bongju Yu. Contents  What is P2P?  Features of P2P systems  P2P Architecture  P2P Protocols  P2P Projects  Reference.
Content Delivery Networks: Status and Trends Speaker: Shao-Fen Chou Advisor: Dr. Ho-Ting Wu 5/8/
Axis AI Solves Challenges of Complex Data Extraction and Document Classification through Advanced Natural Language Processing and Machine Learning MICROSOFT.
Built on the Powerful Microsoft Azure Platform, Forensic Advantage Helps Public Safety and National Security Agencies Collect, Analyze, Report, and Distribute.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
OMA Secure Content Delivery for the Mobile World ODRL Workshop, Vienna Dr. Willms Buhse Vice Chair, OMA Download and DRM group.
Welcome to ucview If you are serious about building a successful digital signage software deployment - UCView can tailor a system to meet all.
2016 Citrix presentation.
Federated IdM Across Heterogeneous Clouding Environment
Securing the Network Perimeter with ISA 2004
Living in a Network Centric World
Living in a Network Centric World
NTC 324 RANK Education for Service-- ntc324rank.com.
11/23/2018 3:03 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Who We Are – Brief History
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
System Center Marketing
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
The Weather Company, an IBM Business
Living in a Network Centric World
Cloud Computing for Wireless Networks
Presentation transcript:

Internet2 Spring 2004.pptApril 2004 Napster University Program Elements of Success W. Pence Chief Technology Officer Napster LLC

Internet2 Spring 2004.pptApril Challenges Facing Universities  providing a safe and secure computing environment  managing the cost of file sharing/network management  educating students on copyright and piracy and establishing appropriate policies  offering compelling, legitimate music service to students  developing next generation educational tools and programs around digital content Napster has developed a program tailored to help Universities address all these challenges

Internet2 Spring 2004.pptApril Technical Program Goals  provide seamless integration, including authentication  demonstrate appeal and sustained usage  demonstrate bandwidth cost savings  demonstrate improvements in network congestion  leverage feedback and expand the program Note: Napster rollout is not tied to enforcement policies

Internet2 Spring 2004.pptApril Deployment Shib Origin Super Peer Napster data center Internet User Firewall University User blade server + storage Shib Target Sub Mgmt Media Delivery LDAP, etc.

Internet2 Spring 2004.pptApril Napster Super-Peer Technology Super Peer Super Peer Super Peer Napster data center(s) Internet User Firewall University Enterprise ISP User Best of Both Worlds: Centrally Served Quality + Distributed Delivery streams, downloads active cache management client caching

Internet2 Spring 2004.pptApril Feedback  Initial Learning -- Penn State –Initial rollout spring ’04 to residence hall students; rolls to 80K students in Fall ’04 –Tremendous demand: 10,000 students joined in 6 weeks! –Persistent, heavy usage indicates a change in behavior away from p2p –Frequency of RIAA compliance letters has dropped dramatically –90% of all downloads delivered within the network – tremendous bandwidth savings

Internet2 Spring 2004.pptApril Usage and Performance Sustained, heavy usage K downloads/streams per day Cache hit rate > 90%

Internet2 Spring 2004.pptApril Lessons Learned  positive student response validates service model –in discussion with over 100 schools –enhancements and local content under discussion  caching is even more critical then we thought –every school has expressed interest –we are working with IBM to scale the program  collaboration with University on all aspects of rollout is critical to success –from student government to the IT departments