SlideShare una empresa de Scribd logo
1 de 29
The Economics of Networks ( and Beckstrom’s Law ) Rod Beckstrom CEO and President 29 July 2009 27Apr08
29Jul09 Addressing the Internet
29Jul09 Participating in the Internet eco-system and supporting it
Do network economics matter? Value of network to one user Total value of a network Security economics Security risk management Hacker economics Economics of deterrence Supply chain incentives Economics of Internet protocols (architecture) Economics of outages Economics of resiliency (correlation of losses) 29Jul09
Metcalfe’s Law 29Jul09 fax networks is larger today than ever, but less valuable because of substitutes such  as email, Fedex, UPS, PDF’s, web, etc., thus the model does not hold Where: V  = value of network  j n  = the number of end points or nodes p  = some constant V j   =  n 2  * p Historic Network Value Models
t  not  n ! 29Jul09
t  not  n ! 29Jul09
New Model: Beckstrom’s Law Economics of Networks 29Jul09 The value of a network equals the net value added to each user’s transactions, summed for all users.
V i,j   =  ΣB  - ΣC  Where: V  = value of network  j  to user  i B  = the benefit value of all transactions C  = the cost of all transactions Value of a Network to One User New Network Model 29Jul09
V  =  B  -  C V  = $26 - $16 V  = $10  If it costs $26 to buy the book in a store or $16 to buy it over the  Internet, including shipping, the net value is $10.  Online Book Purchase Case 29Jul09
V[j]  =  ΣV i,j   =  ΣB  - ΣC  Network Value is Summation of Value to All Users New Network Model 29Jul09
29J ul09 Where: ΣV i,j  = value of a network  j  to all users V i,j   = net present value of all transactions to user i  with respect  to network  j,  over any time period j   = identifies one network i   = one user of the network B i,k   = the benefit value of transaction  k  to individual  i C i,l   = the cost of transaction  l  to individual  i r k   and  r l   = the discount rate of interest to the time of transaction  k  or l t k  or  t l   = the elapsed time in years to transaction  k  or  l n,m,p   = maximum number of individuals  i  and transactions  k  and  l Beckstrom’s Law New Network Model
The “Network Effect” 29Jul09
For those networks where… The “Network Effect” 29Jul09 More users add to more total value
For those networks where… The “Inverse Network Effect” 29Jul09 More users reduce total value <
Private Golf Clubs  AARP Support groups  Costco FaceBook  Coops YPO  Your social networks Twitter Your customers Internet … Examples 29Jul09
Where: SI = Security Investments L  = Losses C’  = C – SI – L (all costs except SI & L) V  =  B  - C’ - SI  - L  Security  Model V  =  B  - C  Economics of Security Basic Model V  =  B  - C  29Jul09
Minimize Security Costs  =  SI  +  L  The Fundamental Security  Risk Management Function Economics of Security 29Jul09
Loss $ Security Investment $ 0 Pareto Chart of Best Security Investments Against Losses (hypothetical curve) Economics of Security 29Jul09
Loss $ Security Investment $ 0 Different security technology investments can be ranked in order of payoff (reduced losses per dollar of investment). IP Patch IDS DLP Economics of Security 29Jul09
Loss $ Better network protocols can drive  Loss function down for most or all users. Security Investment $ 0 Economics of Protocols 29Jul09
Minimize the Hacker’s Gain Minimize V  =  B  -  C’  - SI  - L  For example, by seeking to reduce their Benefit or take. Increase their operating costs (making stealing more difficult). Force them to invest more in their own Security Investments (making it harder for them not to get caught). Increase their losses by improving enforcement and increasing penalties and imprisonment, for example. Economics of Deterrence 29Jul09
Value of network to individuals Total value of a network Security economics Security risk management Hacker economics Economics of deterrence Supply chain incentives Economics of Internet protocols (architecture) Economics of outages Economics of resiliency (correlation of losses) Economics of Networks 29Jul09
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Model Can . . . 29Jul09
Granular Scalable Subset-able Accurate Similar to P&L concepts Leverages cost accounting techniques Testable As simple as it can be but no simpler A foundation for derivative models Beckstrom’s Law Benefits 29Jul09
You have to get the data or estimate it Beckstrom’s Law Downside 29Jul09
t  not  n ! 29Jul09
Questions 29Jul09
Thank You ! [email_address] 29Jul09

Más contenido relacionado

La actualidad más candente

CS8078-Green Computing Question Bank
CS8078-Green Computing Question BankCS8078-Green Computing Question Bank
CS8078-Green Computing Question BankGobinath Subramaniam
 
Green cloud computing
Green cloud computingGreen cloud computing
Green cloud computingRam kumar
 
Social network analysis part ii
Social network analysis part iiSocial network analysis part ii
Social network analysis part iiTHomas Plotkowiak
 
STUDENTS’ PERFORMANCE PREDICTION SYSTEM USING MULTI AGENT DATA MINING TECHNIQUE
STUDENTS’ PERFORMANCE PREDICTION SYSTEM USING MULTI AGENT DATA MINING TECHNIQUESTUDENTS’ PERFORMANCE PREDICTION SYSTEM USING MULTI AGENT DATA MINING TECHNIQUE
STUDENTS’ PERFORMANCE PREDICTION SYSTEM USING MULTI AGENT DATA MINING TECHNIQUEIJDKP
 
Netflix Recommender System : Big Data Case Study
Netflix Recommender System : Big Data Case StudyNetflix Recommender System : Big Data Case Study
Netflix Recommender System : Big Data Case StudyKetan Patil
 
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...Salah Amean
 
Anomaly detection with machine learning at scale
Anomaly detection with machine learning at scaleAnomaly detection with machine learning at scale
Anomaly detection with machine learning at scaleImpetus Technologies
 
Chapter 4 Classification
Chapter 4 ClassificationChapter 4 Classification
Chapter 4 ClassificationKhalid Elshafie
 
Social Media Mining - Chapter 8 (Influence and Homophily)
Social Media Mining - Chapter 8 (Influence and Homophily)Social Media Mining - Chapter 8 (Influence and Homophily)
Social Media Mining - Chapter 8 (Influence and Homophily)SocialMediaMining
 
Grid based method & model based clustering method
Grid based method & model based clustering methodGrid based method & model based clustering method
Grid based method & model based clustering methodrajshreemuthiah
 
Social Impacts & Trends of Data Mining
Social Impacts & Trends of Data MiningSocial Impacts & Trends of Data Mining
Social Impacts & Trends of Data MiningSushilDhakal4
 
Data, Text and Web Mining
Data, Text and Web Mining Data, Text and Web Mining
Data, Text and Web Mining Jeremiah Fadugba
 
Green cloud computing
Green cloud computingGreen cloud computing
Green cloud computingtalktorohit54
 
Cloud Standards and Virtualization
Cloud Standards and VirtualizationCloud Standards and Virtualization
Cloud Standards and VirtualizationPeter Tröger
 
Data Warehousing - in the real world
Data Warehousing - in the real worldData Warehousing - in the real world
Data Warehousing - in the real worldukc4
 
Edraw max Templates and Examples
Edraw max Templates and ExamplesEdraw max Templates and Examples
Edraw max Templates and ExamplesBoni Aditya
 

La actualidad más candente (20)

CS8078-Green Computing Question Bank
CS8078-Green Computing Question BankCS8078-Green Computing Question Bank
CS8078-Green Computing Question Bank
 
Green cloud computing
Green cloud computingGreen cloud computing
Green cloud computing
 
Data Mining: Data Preprocessing
Data Mining: Data PreprocessingData Mining: Data Preprocessing
Data Mining: Data Preprocessing
 
Social network analysis part ii
Social network analysis part iiSocial network analysis part ii
Social network analysis part ii
 
STUDENTS’ PERFORMANCE PREDICTION SYSTEM USING MULTI AGENT DATA MINING TECHNIQUE
STUDENTS’ PERFORMANCE PREDICTION SYSTEM USING MULTI AGENT DATA MINING TECHNIQUESTUDENTS’ PERFORMANCE PREDICTION SYSTEM USING MULTI AGENT DATA MINING TECHNIQUE
STUDENTS’ PERFORMANCE PREDICTION SYSTEM USING MULTI AGENT DATA MINING TECHNIQUE
 
Netflix Recommender System : Big Data Case Study
Netflix Recommender System : Big Data Case StudyNetflix Recommender System : Big Data Case Study
Netflix Recommender System : Big Data Case Study
 
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
Data Mining: Concepts and Techniques chapter 07 : Advanced Frequent Pattern M...
 
Anomaly detection with machine learning at scale
Anomaly detection with machine learning at scaleAnomaly detection with machine learning at scale
Anomaly detection with machine learning at scale
 
Data mining notes
Data mining notesData mining notes
Data mining notes
 
Chapter 4 Classification
Chapter 4 ClassificationChapter 4 Classification
Chapter 4 Classification
 
Anomaly detection
Anomaly detectionAnomaly detection
Anomaly detection
 
Data mining
Data mining Data mining
Data mining
 
Social Media Mining - Chapter 8 (Influence and Homophily)
Social Media Mining - Chapter 8 (Influence and Homophily)Social Media Mining - Chapter 8 (Influence and Homophily)
Social Media Mining - Chapter 8 (Influence and Homophily)
 
Grid based method & model based clustering method
Grid based method & model based clustering methodGrid based method & model based clustering method
Grid based method & model based clustering method
 
Social Impacts & Trends of Data Mining
Social Impacts & Trends of Data MiningSocial Impacts & Trends of Data Mining
Social Impacts & Trends of Data Mining
 
Data, Text and Web Mining
Data, Text and Web Mining Data, Text and Web Mining
Data, Text and Web Mining
 
Green cloud computing
Green cloud computingGreen cloud computing
Green cloud computing
 
Cloud Standards and Virtualization
Cloud Standards and VirtualizationCloud Standards and Virtualization
Cloud Standards and Virtualization
 
Data Warehousing - in the real world
Data Warehousing - in the real worldData Warehousing - in the real world
Data Warehousing - in the real world
 
Edraw max Templates and Examples
Edraw max Templates and ExamplesEdraw max Templates and Examples
Edraw max Templates and Examples
 

Destacado

Think bitcoin workshop slideshare
Think bitcoin workshop slideshareThink bitcoin workshop slideshare
Think bitcoin workshop slidesharethinkbitcoin
 
2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS
2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS
2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHSRodBeckstrom
 
Beckstrom's Law - The Economics Of Networks Defcon July 31, 2009
Beckstrom's Law - The  Economics Of Networks Defcon July 31, 2009Beckstrom's Law - The  Economics Of Networks Defcon July 31, 2009
Beckstrom's Law - The Economics Of Networks Defcon July 31, 2009RodBeckstrom
 
Law of supply and demand
Law of supply and demandLaw of supply and demand
Law of supply and demandmiko0421
 
Bitcoin- Technology beyond Politics
Bitcoin- Technology beyond PoliticsBitcoin- Technology beyond Politics
Bitcoin- Technology beyond PoliticsDr. Juan Trujillo
 
Externalities and network effects (examples, laws and interpretations)
Externalities and network effects (examples, laws and interpretations)Externalities and network effects (examples, laws and interpretations)
Externalities and network effects (examples, laws and interpretations)Sumant Kulkarni
 
AS Micro: Determinants of Supply
AS Micro: Determinants of SupplyAS Micro: Determinants of Supply
AS Micro: Determinants of Supplytutor2u
 
Law of.Supply
Law of.SupplyLaw of.Supply
Law of.SupplyMir Haris
 
Demand, Supply 2009 1
Demand, Supply 2009  1Demand, Supply 2009  1
Demand, Supply 2009 1siraj2762268
 
Thesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIA
Thesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIAThesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIA
Thesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIASeun Otukoya
 
Network Effects
Network EffectsNetwork Effects
Network Effectsa16z
 

Destacado (12)

Think bitcoin workshop slideshare
Think bitcoin workshop slideshareThink bitcoin workshop slideshare
Think bitcoin workshop slideshare
 
2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS
2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS
2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS
 
Beckstrom's Law - The Economics Of Networks Defcon July 31, 2009
Beckstrom's Law - The  Economics Of Networks Defcon July 31, 2009Beckstrom's Law - The  Economics Of Networks Defcon July 31, 2009
Beckstrom's Law - The Economics Of Networks Defcon July 31, 2009
 
Law of supply and demand
Law of supply and demandLaw of supply and demand
Law of supply and demand
 
Bitcoin- Technology beyond Politics
Bitcoin- Technology beyond PoliticsBitcoin- Technology beyond Politics
Bitcoin- Technology beyond Politics
 
economics supply
economics supplyeconomics supply
economics supply
 
Externalities and network effects (examples, laws and interpretations)
Externalities and network effects (examples, laws and interpretations)Externalities and network effects (examples, laws and interpretations)
Externalities and network effects (examples, laws and interpretations)
 
AS Micro: Determinants of Supply
AS Micro: Determinants of SupplyAS Micro: Determinants of Supply
AS Micro: Determinants of Supply
 
Law of.Supply
Law of.SupplyLaw of.Supply
Law of.Supply
 
Demand, Supply 2009 1
Demand, Supply 2009  1Demand, Supply 2009  1
Demand, Supply 2009 1
 
Thesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIA
Thesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIAThesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIA
Thesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIA
 
Network Effects
Network EffectsNetwork Effects
Network Effects
 

Similar a Beckstrom's Law & The Economics Of Networks - ICANN

081212d Economics Of Networks
081212d Economics Of Networks081212d Economics Of Networks
081212d Economics Of Networkslarryme38
 
Heuristics for Network Design with budget constraint
Heuristics for Network Design with budget constraintHeuristics for Network Design with budget constraint
Heuristics for Network Design with budget constraintlucpiz
 
Maurizio Pilu NextGen 09
Maurizio Pilu NextGen 09Maurizio Pilu NextGen 09
Maurizio Pilu NextGen 09Marit Hendriks
 
Green cloud computing
Green cloud computing Green cloud computing
Green cloud computing JauwadSyed
 
Switching perspectives nov10 s sh
Switching perspectives nov10 s shSwitching perspectives nov10 s sh
Switching perspectives nov10 s shJohn Juliano
 
IT Cyber Security
IT Cyber Security IT Cyber Security
IT Cyber Security Rod Delwar
 
High performance communication networkss
High performance communication networkssHigh performance communication networkss
High performance communication networkssHemaDarshana
 
Model-Based Optimization for Effective and Reliable Decision-Making
Model-Based Optimization for Effective and Reliable Decision-MakingModel-Based Optimization for Effective and Reliable Decision-Making
Model-Based Optimization for Effective and Reliable Decision-MakingBob Fourer
 
Lecture saracco
Lecture saraccoLecture saracco
Lecture saraccoongcs
 
Solent Cyber Security Cluster Event 2, ACE/UoS Presentation
Solent Cyber Security Cluster Event 2, ACE/UoS PresentationSolent Cyber Security Cluster Event 2, ACE/UoS Presentation
Solent Cyber Security Cluster Event 2, ACE/UoS PresentationNine23Ltd
 
Blockchain in Energy Forum
Blockchain in Energy ForumBlockchain in Energy Forum
Blockchain in Energy ForumJill Kirkpatrick
 
Josef Weber (Siemens): Scenarios for Future Internet Business@Energy
Josef Weber (Siemens): Scenarios for Future Internet Business@EnergyJosef Weber (Siemens): Scenarios for Future Internet Business@Energy
Josef Weber (Siemens): Scenarios for Future Internet Business@EnergyFIA2010
 
Blockchain in Energy Forum
Blockchain in Energy Forum Blockchain in Energy Forum
Blockchain in Energy Forum Jill Kirkpatrick
 
The GREDOR project. Redesigning the decision chain for managing distribution ...
The GREDOR project. Redesigning the decision chain for managing distribution ...The GREDOR project. Redesigning the decision chain for managing distribution ...
The GREDOR project. Redesigning the decision chain for managing distribution ...Université de Liège (ULg)
 
Sustainability Virtual Summits: Smart ICT 23-25 March 2010
Sustainability Virtual Summits: Smart ICT 23-25 March 2010Sustainability Virtual Summits: Smart ICT 23-25 March 2010
Sustainability Virtual Summits: Smart ICT 23-25 March 2010barounos
 
Globalization_of_Cleantech_Denesuk
Globalization_of_Cleantech_DenesukGlobalization_of_Cleantech_Denesuk
Globalization_of_Cleantech_Denesukdenesuk
 
"Next Gen Grid Tech Commercialization" for Duke University Energy Initiative ...
"Next Gen Grid Tech Commercialization" for Duke University Energy Initiative ..."Next Gen Grid Tech Commercialization" for Duke University Energy Initiative ...
"Next Gen Grid Tech Commercialization" for Duke University Energy Initiative ...Josh Gould
 
If you are not paying for it, you are the product: How much do advertisers p...
 If you are not paying for it, you are the product: How much do advertisers p... If you are not paying for it, you are the product: How much do advertisers p...
If you are not paying for it, you are the product: How much do advertisers p...Panagiotis Papadopoulos
 

Similar a Beckstrom's Law & The Economics Of Networks - ICANN (20)

081212d Economics Of Networks
081212d Economics Of Networks081212d Economics Of Networks
081212d Economics Of Networks
 
Heuristics for Network Design with budget constraint
Heuristics for Network Design with budget constraintHeuristics for Network Design with budget constraint
Heuristics for Network Design with budget constraint
 
Maurizio Pilu NextGen 09
Maurizio Pilu NextGen 09Maurizio Pilu NextGen 09
Maurizio Pilu NextGen 09
 
Green cloud computing
Green cloud computing Green cloud computing
Green cloud computing
 
Switching perspectives nov10 s sh
Switching perspectives nov10 s shSwitching perspectives nov10 s sh
Switching perspectives nov10 s sh
 
IT Cyber Security
IT Cyber Security IT Cyber Security
IT Cyber Security
 
High performance communication networkss
High performance communication networkssHigh performance communication networkss
High performance communication networkss
 
Model-Based Optimization for Effective and Reliable Decision-Making
Model-Based Optimization for Effective and Reliable Decision-MakingModel-Based Optimization for Effective and Reliable Decision-Making
Model-Based Optimization for Effective and Reliable Decision-Making
 
Lecture saracco
Lecture saraccoLecture saracco
Lecture saracco
 
Solent Cyber Security Cluster Event 2, ACE/UoS Presentation
Solent Cyber Security Cluster Event 2, ACE/UoS PresentationSolent Cyber Security Cluster Event 2, ACE/UoS Presentation
Solent Cyber Security Cluster Event 2, ACE/UoS Presentation
 
Blockchain in Energy Forum
Blockchain in Energy ForumBlockchain in Energy Forum
Blockchain in Energy Forum
 
Josef Weber (Siemens): Scenarios for Future Internet Business@Energy
Josef Weber (Siemens): Scenarios for Future Internet Business@EnergyJosef Weber (Siemens): Scenarios for Future Internet Business@Energy
Josef Weber (Siemens): Scenarios for Future Internet Business@Energy
 
Blockchain in Energy Forum
Blockchain in Energy Forum Blockchain in Energy Forum
Blockchain in Energy Forum
 
The GREDOR project. Redesigning the decision chain for managing distribution ...
The GREDOR project. Redesigning the decision chain for managing distribution ...The GREDOR project. Redesigning the decision chain for managing distribution ...
The GREDOR project. Redesigning the decision chain for managing distribution ...
 
Sustainability Virtual Summits: Smart ICT 23-25 March 2010
Sustainability Virtual Summits: Smart ICT 23-25 March 2010Sustainability Virtual Summits: Smart ICT 23-25 March 2010
Sustainability Virtual Summits: Smart ICT 23-25 March 2010
 
Globalization_of_Cleantech_Denesuk
Globalization_of_Cleantech_DenesukGlobalization_of_Cleantech_Denesuk
Globalization_of_Cleantech_Denesuk
 
"Next Gen Grid Tech Commercialization" for Duke University Energy Initiative ...
"Next Gen Grid Tech Commercialization" for Duke University Energy Initiative ..."Next Gen Grid Tech Commercialization" for Duke University Energy Initiative ...
"Next Gen Grid Tech Commercialization" for Duke University Energy Initiative ...
 
WSEAS2011
WSEAS2011WSEAS2011
WSEAS2011
 
If you are not paying for it, you are the product: How much do advertisers p...
 If you are not paying for it, you are the product: How much do advertisers p... If you are not paying for it, you are the product: How much do advertisers p...
If you are not paying for it, you are the product: How much do advertisers p...
 
Overview of CADI2 scope 24-03-11
Overview of CADI2 scope 24-03-11Overview of CADI2 scope 24-03-11
Overview of CADI2 scope 24-03-11
 

Último

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Último (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Beckstrom's Law & The Economics Of Networks - ICANN

  • 1. The Economics of Networks ( and Beckstrom’s Law ) Rod Beckstrom CEO and President 29 July 2009 27Apr08
  • 3. 29Jul09 Participating in the Internet eco-system and supporting it
  • 4. Do network economics matter? Value of network to one user Total value of a network Security economics Security risk management Hacker economics Economics of deterrence Supply chain incentives Economics of Internet protocols (architecture) Economics of outages Economics of resiliency (correlation of losses) 29Jul09
  • 5. Metcalfe’s Law 29Jul09 fax networks is larger today than ever, but less valuable because of substitutes such as email, Fedex, UPS, PDF’s, web, etc., thus the model does not hold Where: V = value of network j n = the number of end points or nodes p = some constant V j = n 2 * p Historic Network Value Models
  • 6. t not n ! 29Jul09
  • 7. t not n ! 29Jul09
  • 8. New Model: Beckstrom’s Law Economics of Networks 29Jul09 The value of a network equals the net value added to each user’s transactions, summed for all users.
  • 9. V i,j = ΣB - ΣC Where: V = value of network j to user i B = the benefit value of all transactions C = the cost of all transactions Value of a Network to One User New Network Model 29Jul09
  • 10. V = B - C V = $26 - $16 V = $10 If it costs $26 to buy the book in a store or $16 to buy it over the Internet, including shipping, the net value is $10. Online Book Purchase Case 29Jul09
  • 11. V[j] = ΣV i,j = ΣB - ΣC Network Value is Summation of Value to All Users New Network Model 29Jul09
  • 12. 29J ul09 Where: ΣV i,j = value of a network j to all users V i,j = net present value of all transactions to user i with respect to network j, over any time period j = identifies one network i = one user of the network B i,k = the benefit value of transaction k to individual i C i,l = the cost of transaction l to individual i r k and r l = the discount rate of interest to the time of transaction k or l t k or t l = the elapsed time in years to transaction k or l n,m,p = maximum number of individuals i and transactions k and l Beckstrom’s Law New Network Model
  • 14. For those networks where… The “Network Effect” 29Jul09 More users add to more total value
  • 15. For those networks where… The “Inverse Network Effect” 29Jul09 More users reduce total value <
  • 16. Private Golf Clubs AARP Support groups Costco FaceBook Coops YPO Your social networks Twitter Your customers Internet … Examples 29Jul09
  • 17. Where: SI = Security Investments L = Losses C’ = C – SI – L (all costs except SI & L) V = B - C’ - SI - L Security Model V = B - C Economics of Security Basic Model V = B - C 29Jul09
  • 18. Minimize Security Costs = SI + L The Fundamental Security Risk Management Function Economics of Security 29Jul09
  • 19. Loss $ Security Investment $ 0 Pareto Chart of Best Security Investments Against Losses (hypothetical curve) Economics of Security 29Jul09
  • 20. Loss $ Security Investment $ 0 Different security technology investments can be ranked in order of payoff (reduced losses per dollar of investment). IP Patch IDS DLP Economics of Security 29Jul09
  • 21. Loss $ Better network protocols can drive Loss function down for most or all users. Security Investment $ 0 Economics of Protocols 29Jul09
  • 22. Minimize the Hacker’s Gain Minimize V = B - C’ - SI - L For example, by seeking to reduce their Benefit or take. Increase their operating costs (making stealing more difficult). Force them to invest more in their own Security Investments (making it harder for them not to get caught). Increase their losses by improving enforcement and increasing penalties and imprisonment, for example. Economics of Deterrence 29Jul09
  • 23. Value of network to individuals Total value of a network Security economics Security risk management Hacker economics Economics of deterrence Supply chain incentives Economics of Internet protocols (architecture) Economics of outages Economics of resiliency (correlation of losses) Economics of Networks 29Jul09
  • 24.
  • 25. Granular Scalable Subset-able Accurate Similar to P&L concepts Leverages cost accounting techniques Testable As simple as it can be but no simpler A foundation for derivative models Beckstrom’s Law Benefits 29Jul09
  • 26. You have to get the data or estimate it Beckstrom’s Law Downside 29Jul09
  • 27. t not n ! 29Jul09
  • 29. Thank You ! [email_address] 29Jul09

Notas del editor

  1. Image from http://images.google.com/imgres?imgurl=http://www.caida.org/tools/measurement/skitter/Images/isps9808.gif&amp;imgrefurl=http://learn.caida.org/cds/traffic0202/Reading/Papers/Nae/index.html&amp;usg=__XLIkWQ8wac_eh6oWi-W0M3zbRYw=&amp;h=477&amp;w=745&amp;sz=193&amp;hl=en&amp;start=4&amp;tbnid=a8K1i3skHTS5WM:&amp;tbnh=90&amp;tbnw=141&amp;prev=/images%3Fq%3Dinternet%2Becosystem%26gbv%3D2%26hl%3Den