Producing the Future of IT at MIT
A powerful security standard and new Internet protocols are among the innovations being hatched at MIT.
Computerworld - IT pragmatists in the corporate world might wonder what they could learn from the eggheads in academia. The answer is, quite a lot such as how to secure systems from all sides says MIT's Jerry Grochow. He recently told Computerworld's Gary H. Anthes how MIT contributes to the future of IT.
What has MIT done for the computer world? Going back to the 1960s, Project MAC which I worked on as a grad student developed Multics, which spawned Unix. The principles of Multics exist in every major operating system today. MIT was one of the leaders in Arpanet technology and the invention of TCP/IP. Then there's Project Athena from the 1980s that developed Kerberos, a security protocol that Microsoft, Apple and Sun use. We have had some interest recently in our informal Kerberos alliance from a number of Wall Street firms.
What's happening on campus now that might have an effect on IT in the future? There's research going on in Internet protocols beyond TCP/IP. We may have IP forever, but there may be different things riding on top of it beyond TCP that have different characteristics for very low latency, which is a big issue when you ship big data around the network. We've got Dave Clark, who's been a senior researcher for many years in Internet protocols.
How will MIT deal with the information explosion? We are in the process of upgrading the network backbone on campus from a gigabit per second to 10Gbit/sec., the highest commercially viable speed at this point. Physicists are now doing experiments sending a half terabyte from here to CERN [in Geneva] and back again and wanting to do it in near real time.
What lessons might the corporate world draw from MIT? We are the ultimate in the heterogeneous environment. Maybe corporations think they can enforce being an all-Microsoft shop, for example, but there are always some Macs around and always some Unix machines around, and now, of course, there are a lot of Linux machines.
So how have you dealt with security, for example? Universities are not places where you put up a firewall on the front end of the network and assume you have security. Threats are as likely to come from the inside as the outside. We have ... intrusion-detection systems that, interestingly, point both ways outward but also inward. And that is what major corporations are finding they need to do. We have adopted security structures that are more application-based and role-based rather than firewall-based. We have Kerberos security, where every person on campus has a security ID that is recognized and interrogated by each application in a consistent way, and where people have different roles with regard to different applications. The Roles system is an additional capability that we developed on top of the basic Kerberos structure. Several other universities have expressed interest in that. CIOs also are looking at what will be the next generation in security architecture that will protect from the inside as well as the outside.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts