►
From YouTube: COINRG Interim Meeting, 2021-02-09
Description
COINRG Interim Meeting, 2021-02-09
B
A
Four
presentations
and
mine
will
be
shorter,
shorter.
I
don't
know
how
I'm
going
to
deal
with
the
nsf
thing,
but
anyway,
we've
been
very
lucky
that
we
were
asked
by
rakuten
the
the
cloud
operator
to
maybe
collaborate
to
their
initiative
on
autonomous
networks
that
they
want
to
start
at
itu.
A
Because
of
that,
I
asked
leon
wong
who's,
going
to
lead
that
effort
to
present
this
morning
or
whatever
time
the
day
it.
B
A
Then
we
have
professor
alex
gallis,
whom
a
lot
of
you
know
from
his,
I
would
say,
stellar
experience
and
you
know
everything
he
did
and
he's
going
to
review.
A
40
years
of
network
programmability-
and
I
myself
am
looking
forward
to
this
because
I
met
alex
last
year
when
I
was
doing
a
keynote
in
a
conference.
No
another
keynote.
I
was
on
a
panel
in
a
conference
and
alex
had
a
lot
of
very
good
background
on
a
ton
of
stuff
that
was
done
in
the
past
in
network
programmability
and
how
maybe
what
is
happening
right
now
is
going
to
be
different
from
the
outcomes
of
the
previous
attempts.
A
At
doing
that,
then
we're
going
to
have
a
presentation
from
edgar
ramos
from
ericsson,
it's
a
paper
that
we
did
together
on
descriptor
for
intelligence
services
and,
as
you
know
in
this
group,
there's
been
a
lot
of
discussion
on
the
use
of
discovery
and
data
discovery
to
allow
network
programmability
and
allow
intelligent
services
inside
networks.
So
I'm
sure
it's
going
to
be.
You
know
it's
probably
going
to
give
rise
to
a
lot
of
questions.
A
Then
we
have
a
paper
from
radistan
in
cambridge.
So
I
think
we
have
a
uk
dominated
meeting
today
on
montana
programmable
switches,
which
is
work
that
he's
done
with
noah
zilberman,
who
have
a
lot
of
you
know,
because
she
is
a
participant
in
this
group
and
she's
been
very
supportive.
A
And
then
I
don't
have
a
lot
of
slides.
But
I
will
talk
to
you
about
a
workshop
that
henry
schultz
in
a
well
a
series
of
workshops
that
henning
should
have
colombia
and
I
hosted
on
behalf
of
nsf
on
the
future
of
broadband
research
for
the
next
five
years.
A
I
can
talk
about
it,
but
the
report
hasn't
been
published
yet
so
I'm
going
to
be
short,
so
probably
not
20
minutes,
but
I
think
it's
interesting
for
this
group,
because
it
doesn't
actually
addresses
a
lot
of
the
topics
we've
been
discussing
and
then
we're
going
to
talk
a
little
bit
about
the
itf
110
preparation
and
the
fact
that
we're
on
the
last
session
of
the
last
day,
this
is
an
official
irtf.
A
C
A
Okay,
so
welcome
leon,
welcome
to
our
group
and
I
will
stop
sharing
so
you
can
start
sharing.
C
C
C
Yes,
yes,
perfectly
good!
Well,
first
of
all,
thank
you
for
having
us
here
today
to
speak
here.
We
are
the
lucky
ones
to
be
able
to
speak
here
so
good
day,
everyone
so
to
do
it
itu
way.
We
said
good
morning
good
afternoon,
good
evening,
everyone,
depending
on
where
you
are
so
here.
C
Let
me
quickly
introduce
myself
so
my
name
is
leon,
I'm
from
rock
dam
mobile.
So,
together
with
me
today,
we
have
paul
harvey
he's
our
lead
research
scientist,
so
we
belong
to
rock
dan
mobile's
innovation
studio.
So
this
is
just
a
fancy
name
for
our
research
and
innovation
departments
for
racket
mobile.
C
So
so
thank
you
again
for
having
us
here
today.
So,
let's
quickly
go
to
what
we
want
to
talk
about
today,
so
I
just
want
to
start
by
sharing,
basically
my
perspective
on
the
authors
autonomous
network,
so
so
yeah,
just
just
as
aeroplanes
don't
take
us
into
space.
We
don't
believe
that
existing
technologies
alone
are
enough
to
achieve
the
higher
layers
of
autonomy,
so
so
in
order,
what
you
see
here
is
basically,
where
we're
trying
to
give
everyone
a
bit
of
perspective.
C
So
what
we,
what
we
are
trying
to
do
here
is
basically
basically
to
see
how
how
we
can
achieve
how
we
can
achieve
this
autonomy
so
as
we
as
the
role
of
human
is
reduced
in
the
higher
layer.
The
challenge,
the
challenges
that
we
face
become
basically
exponentially
other.
So
this
is
the
reason
that
multiverse
motivates
us
to
approach,
motivates
our
approach
of
evolutionary
driven
autonomy,
but
we
know
that
we
know
that
we
cannot
achieve
autonomy
alone.
C
So
I
apologize
for
this
boring
slide.
It's
a
very
standard
slice
with
too
many
words
I'll
explain
briefly
to
everyone
the
overview,
so
just
a
quick
background
on
itu-t
so
itu
is,
is
the
international
telecommunication
union,
where
the
t
at
the
end
stands
for
standardizations.
C
C
So,
although
explain,
only
i2t
is
supposed
to
focus
on
standard
standardizations
but
to
accelerate
the
study
and
works
on
specific
areas.
C
So
pre-standardization
works
can
be
done
in
focus
group,
so
the
concept
of
this
focus
group
is
meant
to
be
open
to
all,
so
it's
free
for
free
for
everyone
to
join.
So
every
anyone
can
join
from
any
organizations
whether
you're,
you're,
you're,
you're,
part
of
an
industry,
you're
part
of
operator
you're
already
a
part
of
academia
university
or
you
can.
C
You
can
even
be
an
individual
expert
that
is
interested
to
this
topic,
so
anyone
can
basically
join
this
this
group,
so
so
a
few
of
us
point
me
basically
so
enthusiastic
about
pushing
this
topic
forward
and
creating
an
ecosystem
to
work
on
this
topic
together.
So
we
pitch
this
idea
to
itu
somewhere
ahead
of
last
year
with
support
from
about
30
entities,
a
mix
of
industry,
academias,
some
universities,
government
bodies
and
we
focus
group
on
autonomous
network.
C
C
Because
different
spectrum,
you
can,
you
can
be
from
industry,
academia
or
you
can
be
from
sdos
anywhere,
so
allow
us
allowing
us
to
synergize
the
the
right
talent,
knowledge
and
experience
to
see
how
we
can
achieve
autonomous
network
together.
So
what
fgn?
What
what
our
group
will
explore
and
study
is.
Basically,
we
will
study
the
approaches
on
some
key
concepts
such
as
exploratory
evolutions,
real-time,
responsive
experimentations
and
dynamic
adaptations,
so
I
will
cover
them.
C
So
in
achieving
autonomous
network,
we
are
looking
to
progressively
give
more
control
and
responsibility
to
the
software
so
which
includes
not
just
operations
of
the
known,
but
also
adaptations
to
the
unknown
so
to
structure
our
approach
to
this
challenge.
Our
focus
group
will
try
and
achieve
this
goal
through.
Basically,
these
three
key
concepts
here
you
see
so
first
one
exploratory
evolution
and
then
real-time
responsive
experimentation,
nicely
dynamic
adaptation.
C
So
the
first
one
is
about
typing.
In
simple
words,
the
first
one
is
about
making
or
creating
logic.
So
the
second
one
is
about
how
we
validate
it
and
then
the
third
one
is
the
necessary,
tooling
and
technologies
to
apply
the
logic.
So
I
mean
logic
might
not
be
the
right
term.
You
can
replace
logic
with
solutions
like
basically
creating
solutions,
validating
solution,
applying
solutions,
but
but
depending
on
the
solution
situations,
I'm
happy
to
hear
your
opinions
or
suggestions
here
so
quickly
go
into
these
key
concepts.
C
So
at
the
moment,
such
challenge
requires
a
human
being
to
be
involved
so
and
to
craft
a
new
or
better
approach
using
their
creativity
each
time
when
something
comes
out.
So
our
challenge
here
is
basically
is
how
to
achieve
this
with
minimal
human
involvement,
so
evolution
evolutionary
computing
represents
a
codifiable
way
to
achieve
some
form
of
creativity,
so,
in
other
words,
evolutionary
computing
is
a
way
to
write
down
the
process
of
creativity.
C
So
what
you
can
see
on
the
right
side
is
basically
an
example
from
auto
ml0
by
google,
so
the
end
result
of
which
was
a
better
approach
than
is
currently
known
to
human
for
a
particular
problem,
so
nasa
and
nasa.
Basically,
you
see
the
space
space
shuttle
that
we
are
trying
to
build.
Nasa
nasa
has
used
the
same
evolutionary
search,
similar
average
search
techniques
to
design
a
radio
antenna
that
would
basically
cheaper,
lighter
and
more
effective.
C
Than
human
equivalence
can
produce
so,
but
this
sounds
great,
I
know
yeah.
It
sounds
like
the
the
secret
sauce
and
it's
like
holy
grail,
but
but
but
there
are
still
a
lot
of
challenge
challenge
to
overcome,
so
so
the
questions
we
are
trying
to
ask
ourselves
like
how
how
long
does
it
take?
We
don't
have
a
million
years
to
figure
it
out
for
for
this
kind
of
emergence
behavior.
So
what
is
the
right?
What
is
the
right
form
of
evolutions
to
use?
Can
evolution
be
applied
to
all
use
cases?
C
Probably
not,
maybe
only,
but
only
few
or
maybe
a
handful,
but
maybe
a
lot
generate
cases
as
well,
but
but
I
think
we
can
only
figure
it
out.
We
can
only
answer
all
these
questions
when
we
try
it
out
yeah
for
real,
so
in
zipper
words,
evaluation.
This
is
about
how
making
or
creating
logic
to
improve
operations
of
unknown
situations
or
to
adapt
to
the
unknown.
C
C
C
So
this
is
also
the
way
that
that
we
can
provide
relativity
and
trust
in
the
mechanisms
that
is
generating
the
controllers
itself.
So
so
the
experimentation
we
are
talking
about
is
actually
a
spectrum
encompasses
fractional
stuff,
so
so
from
sanity
checking.
So
the
processor
falls
process
of
statically
checking
controllers,
whether
they
are
reasonable,
for
example,
the
critical
path
of
this
controller.
Is
it
too
long?
Is
it
too
short?
The
optimization
controller
can
only
turn
on
a
light
switch
on
and
off,
which
makes
no
sense.
If
that's
the
case.
C
So
then
we
talk
about
the
next
one.
We
talk
about
simulations,
how
we
can
using
simulations
tracers
or
test
bay
to
test
the
correctness
or
effectiveness
of
close
loop
controllers,
or
that
the
new
controller
is
better
than
the
current
one
or
not.
So,
on
the
other
end
of
spectrum,
you
have
the
canary
testing
you
see
progressively
larger
integrations
into
the
real
production
network.
We
want
to
see
how
we
can
do
that
as
well
and
how
we
want
to
push
this
to
the
real
production
level
as
well.
C
So
so
the
concept
of
such
testing
has
already
been
shown.
For
example,
I'm
not
sure.
Maybe
some
of
you
are
familiar
with
the
other
works
from
itu
focus
group
on
machine
learning,
so
machine
learning
for
5g,
so
they
they
have
this
framework
for
sandboxings
which
touch
upon
this
concept
as
well.
So
so
it's
nothing
new,
it's
a
it's,
nothing,
really
new
or
but
we're
trying
to
see
how
we
can
apply
this
in
in
the
sense
of
autonomy.
C
How
how
and
to
what
extent,
can
digital
twins
be
used
to
create
experimentation
environments,
how
to
effectively
effectively
create
a
testing
environment
that
allows
us
to
trust
the
ai
created
controllers
and
what
kind
of
safety
measures
must
be
in
place
to
do?
Production
chemist,
testings
and
then
also,
I
think
this
we
have
to
ask
ourselves
at
what
point
is
something
considered
validated
so
so
the
trust
level
of
the
the
things
that
is
being
created
so
yeah.
So
that
brings
us
to
the
next
one.
C
So
so
now
we
have
the
newly
new
or
create
newly
created
or
improved
logic.
We've
validated
it.
The
next
questions
we
ask
ourselves
now
is:
how
can
we
apply
it?
How
can
we
realize
it
so
creating
and
validating
new
logics
or
solutions,
but
never
being
able
to
do
anything
with
it
is
well,
basically,
I
guess
useless,
so
so,
virtualizations
and
clouds.
C
You
heard
this
a
lot
has
given
a
lot
of
flexibility
in
architecture
and
deployments.
Well,
especially
in
the
telco
industry.
They
are
doing
a
bit
of
catch
up
here,
so
so,
augmented
by
these
disaggregations
of
telco
functions,
open
architectures,
the
open
runs
that
you
see.
You
heard
a
lot,
so
the
the
openness
opportunities
now
presents
to
how
to
dynam
dynamically
adapt
architectures
to
future
environments,
future
technologies
or
future
uk
use
cases.
C
So
now,
with
this
opportunity
with
other
things,
what
other
things
we
are
trying
to
answer
is
what
other
things
needs
to
be
in
place
to
enable
machines
to
do
this
instead
of
humans,
so
to
realize
this
dynamic
adaptation,
so
so
what
kind
of
technologies,
what
kind
of
interfaces?
What
kind
of
specifications,
data
models?
Ontology
taxonomies
semantics
yeah.
So
this
this?
These
are
the
questions
we
are
asking
ourselves
so
so
so
imagine
now
we
have
a
close
look
controllers.
C
Everyone
is
trying
to
build
at
least
at
least
everyone
in
the
telco
is
trying
to
build
a
ai
ml
and
enabled
closed
loop
controllers.
So
now,
let's
take
a
step
back
and
see
how
these
closed-loop
controllers
can
be
decomposed
into
a
smaller
function
of
building
blocks.
That's
modularizations!
You
can
see
in
the
slides
so
and
that's
nothing
new
as
well.
I
think
it's
been
discussed
for
a
long
time.
So
now
now
take
one
step
backward
again,
one
more
step
backward.
C
So
we
are
asking:
how
can
we
basically
describe
this
functional
building
blocks
so
that
not
just
for
the
sake
of
describing
so
so
we
have
you
see
we
want
to.
We
ask
ourselves
how
we
can
describe
these
blocks
so
that
it
can
be
later
consumed
for
evolutionary
compositions,
so
in
the
first
we'll
talk
about
the
creating
the
logic.
So
so,
how
can
all
these
building
blocks
be?
Decomposed
like
like
lego
blocks
and
then
the
the
the
first,
the
first
actions,
the
the
first
concept
of
the
the
creating
logic?
C
How
can
they
pick
up
all
these
different
different
blocks
and
see
how
you
can
compose
it
and
create
basically
new
unknown
controllers,
just
like
what
nasa
update
of
creating
a
basically
out
of
the
world
antenna
that,
basically
it's
just
if
you,
if
you
google,
the
picture
the
antenna
shape,
is
just
out
of
this
world
that
I
maybe
maybe,
at
least
for
me-
I
would
not
be
able
to
think
of
that
kind
of
design.
So
so
this
is.
C
This
is
pretty
interesting,
so
so
I
saw
on
the
agenda
as
well
the
presentations
by
aggar
from
erickson's
on
semantic
descriptors
for
intelligent
services.
C
I
think
this
is
also
very
relevant
to
this,
so
how
we
can
describe
a
lot
of
different
different
intelligence
services
as
well
yeah,
so
so
these
are
the
questions
we
are
trying
to
ask
ourselves
and
trying
to
address
in
the
focus
groups
so
also
existing
specification
language,
the
data
models
or
taxonomies
are
these
sufficients
to
realize
to
to
realize
autonomous
networks
to
realize
that
the
evolutions
needed
to
achieve
alternate
network
so
so,
based
on
the
the
all
the
mirrors
of
use
cases,
so
1001
use
cases
out
there
existing
interfaces,
the
protocols,
the
programming
languages?
C
Is
it
sufficient,
rich
and
expressive
enough
to
achieve
autonomous
networks?
So
so
yeah
it's
a
lot
of
questions,
so
we
are
trying
to
ask.
We
don't
have
all
the
answers
and
we
don't
know
what
other.
Basically,
there
are
new
things
that
is
required,
but
we
don't
know
at
this
point
that
we
need
them
at
all,
so
so
how
and
yeah
these
are
the
all
this.
Basically
how
this
can
be
applied
to
all
the
use
cases
at
this
point.
So
so
this
this.
These
are
all
the
things
that
we
are
trying
to
ask
ourselves.
C
Well,
we
happily
went
on
to
have
our
first
meeting
last
week,
so
we
received
around
35
contributions
for
the
for
the
focus
group
first
meeting,
so
so
basically
contribution
means
input,
documents
or
papers
or
anything
to
to
discuss
various
topics
that
people
from
different
backgrounds
they
want
to
discuss
about.
So
the
meeting
itself
we
had
about
toronto
registrations.
We
have
around
100
participants
each
day
we
spent
lasted
for
three
days.
C
So
what
I
want
to
say
highlight
here
is
basically
the
people,
the
crowd
is
it's
a
balanced
crowd
of
people,
so
so
it's
not
heavily
tutored
to
any
specific
spectrum
of
people.
It's
like
it's
not
heavily
due
to
the
operators.
It's
not
heavily
the
industry
side,
no,
it's
not
happily
to
that
just
on
the
research
site.
So
so
you
can
see
we
have.
We
have
a
well-balanced
people
from
operators,
industry,
government
bodies,
ministry
of
communications
and
so
off
and
standardization
standardizations
bodies.
So
we
also
have
a
lot
of
universities.
C
We
have
a
lot
of
professors
coming
and
talk
about.
This
thought
this
topic
and
there's
also
a
lot
of
research
organizations,
so
so
we
invited
irtf's
nmrg
as
well,
which
gave
us
a
very,
very
good
retrospective
view
of
the
autonomous
network
and
basically
the
challenges
that
they
see
that's
the
hit.
I
think
this
is
very,
very
good
for
the
group,
so
so
so
out
of
this
first
meeting,
we
we
formed
seriously
try
to
help.
C
We
have
a
work
group
structure
to
discuss
all
these
questions
that
we
have
in
mind
in
a
more
structured
way.
I
will
not
deep
dive
into
this
today.
It's
a
bit
boring
part
of
this
is
so
but
yeah.
We
can
discuss
this.
C
Furthermore,
if
you're
interested
so
yeah
a
lot
of
these
questions
that
that
I
ask
is,
are
basically
research
questions
so
and-
and
we
are
here
today
in
this
meeting,
to
ask
everyone
here
in
this
meeting
everyone
here-
if
if
any
of
these
strikes
are
caught,
if
you
think
you
are
working
on
topic
related
to
us,
we
are
happy
to
sit
down
and
discuss
basically
discuss
more
and
hopefully
hopefully
maybe
you
can
help
us
to
answer
some
of
these
questions.
C
So
yep,
that's
yeah.
So
for
the
standard
closing
for
more
information,
please
visit
our
website.
You
can
join
our
mailing
list
ins
from
from
our
website.
You
we
have
a
mailing
list,
so
you
can
join
the
mailing
list
to
to
to
to
join
our
discussions.
C
We
have
weekly
meetings
as
well
the
the
agenda,
the
the
timing
for
the
weekly
meeting
is
there
if
you
have
any
questions,
feel
free
to
contact
us
talk
to
us
anytime,
oh
yeah,
so
this
I
just
say
we
we
hope
not
not
not
from
just
raqqa
mobile,
but
we
from
the
focus
group
itself.
We
hope
to
collaborate
and
learn
more
from
coin
rj
in
the
future.
A
Thank
you
looks
like
we
have
a
question
from
dirk.
Yes,
actually
I
was
going
to
say
a
lot
of
time
for
questions.
B
Okay,
yeah
thanks
a
lot
leon
for
your
presentation.
B
I
have
one
question
so
as
far
as
I
remember
so
in
autonomous
networking
or
self-organized,
networking
has
been
around
for
quite
some
time,
so
I
remember,
for
example,
in
the
phase
where
the
research
for
lte
was
done
so
self-organized
networking
for
interference
management,
these
kind
of
things,
and
so
I
wanted
a
bit.
What
is
now
so
I
knew
from
your
perspective.
B
So
at
that
time
it
was
almost
very
always
seen
as
a
kind
of
management
approach,
and
so
I'm
I'm
kind
of
wondering
what
is
the
new
research
in
your
point
of
view,
and
so
do
you
see
any
connection
to
the
computing
in
the
network
topic
that
this
loop
is
researching.
C
C
B
C
No,
no,
you
are,
you
are,
as
you
are
exactly
correct.
It's
nothing
new,
don't
tell
the
telco
peoples
but
yeah,
it's
nothing
new,
but
but
but
the
thing
is
like
I
say
so:
the
telco
we
from
at
least
from
from
an
operator
point
of
view.
So
so
we
did
a
lot
of
catch
up.
So
what
happened
here
is
basically
I'm
not
trying
to
boost
here,
but
basically
roclet
mobile.
C
We
we
managed
to
deploy
it
was
I
don't
know
how
about
we
managed
to
deploy
a
sort
of
end-to-end
cloud
native
telco
network,
so
this
basically
unblocks
a
lot
of
new
opportunities,
so
alternate
network
in
computing
itself
is
not
nothing
new
but
but
in
telco
itself.
This
this
this.
This
creates
new
opportunities
to
to
look
at
this
area,
so
so
so,
basically
open
up
new
new
doors.
C
How
we
can
achieve
this
in
telco
and
basically
yeah
it's
nothing
new,
but
it's
something
something
that
something
is
something
new
for
for
the
for
the
telco
industry
and-
and
this
is
something
that
we
can
actually.
I
think
that
the
telco
telco
industry
can
actually
benefit
a
lot
from
this.
Considering
the
the
massive
amount
of
the
massive
amount
of
devices
and
things
we
need
to
to
manage
now
with
5g,
taking
the
place
iots
and
everything
so
so,
like
I
said
it's
nothing
new,
but
to
from
a
telcos
perspective.
D
Other
questions,
I
have
a
question.
This
is
eve
schuler
from
intel,
and
I
guess
my
question
leon.
First.
Thank
you
as
well
for
a
very
interesting
talk.
D
I
know
that
you
said
that
you
don't
think
that
there's
anything
new,
but
when
I
you
know
wearing
the
the
glasses
that
are,
you
know
through
the
lens
of
coin
rg.
I
wonder
if
you
know
speaking
to
your
point
that
maybe
this
is
an
introduction
to
the
telcos.
D
It
raises
the
question
of
given
the
networks
and
the
infrastructure
that
exists
already.
If
the
deployment
of
the
compute
and
the
I
mean.
So
we
you
didn't
talk
that
much
about
the
compute.
D
You
talked
kind
of
indirectly
about
the
composition,
which
I
do
think
has
some
relevance
to
the
activities
going
on
in
the
1dm
world,
where
there's
a
working
group
in
the
itf
called
astl
a
s
karsten,
please
correct
me,
but
the
a
semantic
definition
format
asdf,
which
does
look
at
a
language
if
you
will
for
how
things
interact
with
each
other,
and
so
it
would
be
interesting
to
understand
how
those
sorts
of
function
blocks
come
together.
D
But,
additionally,
some
of
those
properties
of
those
objects
are
the
kinds
of
operations
they
support
in
their
interactions,
and
and
for
that
I
do
think
that
there
may
be
not
just
you
know
what
operation
should
support
but
where
to
run
those
operations,
given
that
there
are
many
that
the
location
of
what
it
is
you're
trying
to
do
may
not
be
on
a
single
host
that
it's
potentially
across
many
collections
of
resources.
D
So
I
know
I'm
rambling
here
a
bit,
but
I
I'm
hoping
that
the
conversation
going
forward
in
the
new
itu
group
will
comprehend
that
kind
of
discussion.
And
so
you
have
have
you
seen
hints
of
that
or
have
you
seen
organization,
other
organizations
that
are
touching
on
those
kinds
of
questions
about
where
to
run
the
compute?
That's
going
to
help
with
the
evolution
and
the
composition
that
it
isn't
just
a
centralized
activity.
C
Thank
you
eve.
Well,
if
I
understand
correctly,
yes,
we
have
collaborations
basically
on
edge
computing,
so
we
have.
We
have
people
from
universities
trying
to
working
on
the
distributed
computing
as
well
on
this
so
again,.
C
Again,
if
you
think
this
is,
I.
C
Yeah
well
again,
I
don't.
I
don't,
have
all
the
answers.
So
if
you
think
this
is
something
worth
pursuing
in
in
terms
of
work,
I
mean
this.
This
is
the
something
that
we're
pursuing
together.
C
A
I
was
I
was
going
to
say:
I
was
going
to
say
that
I
think
that
aspect
would
be
a
common
interest
for
both
coin
rg
and
the
itu
group,
and
I
think,
we've
agreed
to
to
talk
about
it
so
and
we
should
continue
so
we're
we're
now
going
into.
A
Other
questions?
You
can
go
to
the
list
leon
and
your
colleague
wait.
Don't
remember
the
name.
Please
join
the
the
failing
list,
the
mailing
list,
because
if
there's
other
questions
it
could
go
there
and
there
could
be
more
discussion
on
the
list
also
about
how
these
two
initiatives.
A
Overlap
and
could
eventually
yeah
collaborate
or
actually
move
together
and
towards
a
few
common
common
goals.
Research
goals.
E
A
Well,
it-
and
I
think
it
goes
back
to
some
of
you-
may
know
the
the
eu's
also
looking
at
creating
operating
systems
for
iot
distributed
networks-
and
you
know,
we've
had
this
idea
that
a
network
now
is
much
more
like
a
a
computer
board
than
a
a
series
of
telephone
interconnections.
A
So
yeah,
I
think,
there's
going
to
be
potential
cool
work
to
be
done.
Moving
on.
Actually
it's
interesting
because
the
next
presentation
is
from
alex
and
leon
started.
Some
of
the
things
saying:
there's
nothing
new.
Well,
I
think
there
are
things
new,
but
alex
will
tell
us
what
is
not
new
and
what
could
be
new
so
alex.
Please
start
your
presentation.
D
F
It
just
happened
that
I
have
published
more
or
the
same
number
of
papers,
research
papers
in
programmability
and
autonomousities.
If
I
will
try
to
make
more
links
between
the
two
area.
However,
just
to
study
autonomicity
is
ten
years
younger
than
programmability
in
networks.
It's
1971
the
first
good
paper
all
right.
F
I
have
a
substantial
number
of
content
which
I'm
going
to
go
very
quickly
through
and
not
to
deal
with
in
too
many
topics.
However,
I'll
concentrate
on
some
suggestions
about
what
could
be
new
and
important
for
the
future.
F
I
will
go
through
some
sort
of
content
list,
starting
with
very
important
the
key
con
concepts,
the
terms
used
for
the
last
40
years
in
this
field
and
I'll
conclude
with
some
suggestions
for
the
future.
Now
the
key
terms
in
this
area
are
related
to
programmability,
which
is
in
simple
terms.
Is
it
refers
to
executable
code,
which
is
activated
or
injected
in
some
sort
of
computing
execution
environment
in
network
elements
of
different
kind?
F
However,
it
has
to
be
anchored
in
a
lot
of
security
environment
in
order
not
to
allow
this
is
such
a
code
to
create
havoc
or
problems
to
the
networking
in
general
or
in
particular,
to
some
parts
of
it
in
any
form
of
shape.
So
the
two
parts
are
absolutely
hand
behind.
No
one
will
use
programmability
if
their
security
are
not
extremely
highly
defined
architecturally,
as
well
as
implementation.
Wise,
very
importantly,
to
look
at
the
concept
of
in-network
computing
and
programmability
is
the
fact
that
it
allows
definitely
the
network
elements
to
dynamically
be
changed.
F
However,
this
also
raise
opportunity
to
link
it
with
a
network
services
either
one
way
or
the
other
way
in
such
a
way
that
basically
making
the
network
services
being
network
aware
and
the
other
way
around.
Something
which
is
important
in
these
days
to
minimize
enormous
cost
which
exists
in
terms
of
dealing
with
with
these
subjects
for
the
operators
and
others.
F
And
these
are
basically
the
terms
used,
maybe
different
terminology-
I
I
looked
at
the
coin
terms
and
also
it's
their
line
of
this
part
and
we
can
move
forward
now.
There
are
a
number
of
lessons
already,
which
I
want
to
draw
your
attention.
F
F
A
lot
of
new
platforms
are
dealing
with
components
and
system
issues
at
the
software
level
and
obviously
programmability
or
and
analysis
about
software.
So
it's
an
opportunity
to
piggyback.
In
this
sense,
that's
the
first
lesson
take
advantage.
There
is
no
need
to
invent
massive
platforms
which
an
operator
will
accept,
and
I'm
pretty
sure
that
you
understand
that
this
is
quite
a
big
undertaking
and
there
is
no
need
to
do
it,
provided
that
programmability
and
autonomicity
in
particular.
These
two
elements
could
be
added
and
tested
an
existing,
let's
say
successful
platform.
F
F
Programmability
in
particular
requires
a
change
in
the
network
devices
and
as
such,
if
you
propose
something
to
massively
change
the
current
devices,
the
cost
of
doing
that
is
prohibited
and
therefore,
as
a
result,
any
solution
will
not
be
usable.
So
it's
a
time
to
look
always
for
a
delivery
mechanism
for
such
programmabilities.
So
it's
important
to
do
it.
F
One
of
the
systemic
way
to
is
now
everywhere
is
about
slicing,
which
is
now
fully
researched
and
a
lot
of
system
organized
and
in
such
a
way
that
programmability,
based
on
a
slice,
has
a
better
chance
to
be
deployed.
Bearing
in
mind
that
another
slice
there
could
be
other
techniques
applied
and
different,
and
so
on,
and
in
this
way
you
don't
assume
that
it
will
be
deployed
at
large,
which
is
impossible.
F
Now,
in
the
past,
in
programmability
terms,
there
were
tons
of
research
results.
The
bottom
corner
from
the
left
includes,
let's
say,
activities
where
millions
of
papers
were
produced,
for
example
a
routine
packet
forwarding,
but
also
on
the
other
side,
node
operating
systems,
programming
languages
and
so
on.
F
F
F
What
are
the
key
results,
mainly
from
standard
groups,
one
of
the
early
one
which
quite
early
in
is
called
project
p
1520,
I
travelly
20
and
it's
more
than
20
years
old,
but
it's
the
first
one
which
defines
a
way
in
which
precursor
of
the
existing
today
devops
autonomic
devops,
which
is
applied
to
network
or
service
chaining.
But
in
principle
it
created
a
suggestion.
A
number
of
interfaces
by
which
network
services
could
be
composed
from
pre-compiled
building
blocks,
which
are
composed
in
you,
know
particular
logic
and
then
deployed.
F
So
the
idea
is
more
or
less
the
same
like
in
today's
devops,
but
the
original
one
is
iso,
and
this
is
a
substantial
way
to
move
forward
on
this
subject,
even
a
level
of
programmability
the
second
one.
Very
importantly,
it's
an
iltf
forces
group,
which
I
notice
that
van
gaalios
is
on
the
line.
F
Just
was
one
of
the
people
waiting
on
this,
and
that
group
is
relatively
old
as
well
nearly
20
years
old,
but
it
reached
a
level
of
success
in
terms
of
proposing
a
separation
between
forwarding
and
control
elements
in
the
network
elements,
and
this
is
now,
in
my
view,
applied
to
most,
if
not
all
the
current
network
devices,
although
not
using
the
protocols
and
methods
proposed
by
forces,
but
it
helped
the
lower
level
environment.
If
you
want
like
this
to
move
forward
in
terms
of
what
it
need
to
be
looked
at
another.
F
F
F
In
the
network,
currently,
in
my
view
as
a
whole,
is
not
necessarily
very
successful,
it's
always
dying
and
will
be
replaced
over
all
those
other
scenes,
but
at
least
this
should
be
mentioned
now.
If
you
look
to
the
whole
scenario
of
all
the
current
research
results,
hopefully
I
didn't
miss
too
many.
F
F
F
Let's
say
blueprint
for
programmer
devices
and
which
could
be
applied
to
access
core
and
edge,
in
particular,
a
variety
of
possibilities.
However,
some
of
this-
let's
say
research
survey
in
detail,
were
part
of
a
book
which
was
dedicated
to
programmability
on
network,
which
I
published
some
times
ago.
I
updated
this
slide
based
on
other
things,
but
just
a
little
bit
of
warning.
That
book
has
around
600
pages.
F
A
Alex
do
you
have
still
a
lot
of,
because
I
think
this
this
could
be
a
a
full
day
tutorial
and
we
could
think
about
it.
Do
you
still
have
a
lot
of
material?
I.
F
F
Another
group
of
management
related
challenges
for
this
programity
is
listed
here.
I'm
not
going
to
go
through
it,
but
a
few
things
which
are
important,
triggering
programmability
in
a
network
is
as
important
as
a
network
is
so
the
two
should
be
hand
in
hand
both
will
create
problems
or
solutions,
and
without
them
together
they
will
have
massive
massive
issues
now.
F
F
To
solve
problems
which
are
now
identifying
new
requirements
in
the
next
generation
of
networks
as
a
way
to
be
accepted.
Obviously
there
are
some
benefits
which
are
described
here
and
also
it
will
help
the
network
services
to
explore.
So
that
concludes
my
short
presentation,
which
I
hope
that
also
links
with
the
previous
question
from
the
previous
presenter.
A
Thank
you.
Thank
you
very
much.
I
I
it's
time
for
maybe
a
few
questions.
If
not
nobody
else
has.
When
I
do,
I
thought
well,
I
saw
you
were
mentioning
that
net
2030,
which
has
been
mentioned
in
in
many
irtf
forum
before,
and
I
think
everybody
took
notice
of
it.
A
My
question,
however,
is
that
I
think
that
and-
and
I
hope
the
rakuten
people
are
still
online-
I
will
paul
is
there
is
what
one
thing
we
tried
to
do
in
coin
is
not
have
that
much
of
a
operator
focused
and
look
at
it
more
as
a
functionality
of
networking
in
general
and
also
to
encourage
what
I
call
the
new
operators,
the
people
like
rakuten,
who
come
from
the
the
data
centers
and
the
the
cloud
infrastructure
more
than
the
traditional
operator
in
infrastructure.
A
F
Hi.
Thank
you
very
much
for
the
second
answer.
It's
already
answered
in
my
presentation.
If
you
pay
attention
but
I'll
repeat
it,
a
lot
of
activities
done
in
the
last
40
years
and
in
particular
last
period
with
a
view
of
how
to
improve
programmability
for
clouds
computing
and
so
on.
The
techniques
are
excellent,
but.
F
F
Drafts
or
activities
should
also
cover
explicit,
is
a
one
which
should
be
deployed
easily
and
use,
presumably
in
a
network
or
cloud
just
a
new
technology
or
new
research
and
technology
is
just
the
first
step,
which
may
not
be
sufficient
to
convince
other
people
to
move
forward.
Therefore,
that's
basically
the
answer
for
network
2030
was
not
used
only
from
the
operating
point
of
view.
It's
also
a
list
of
new
characteristics
which
need
to
be
achieved,
but
of
all
the
same
applies
to
6g
networking,
which
I'm
I'm
also
starting
to
understand
better.
F
A
E
Thank
you
very
much.
Thank
you
alex
for
an
interesting
presentation.
My
background
is
actually
programmability
for
heterogeneous
distributed
systems,
so
it
was
really
nice
to
see
a
lot
of
familiar
names
and
things
popping
up,
and
I
think
I
agree
and
then
to
blend
that
with
the
chairs
comment
to
bring
this
to
a
conclusive
point.
I
think
it's
an
interesting
time.
We've
all
heard
about
the
virtualization
of
all
the
different
networking
functionality
to
turn
telcos
into
typical
clouds,
and
at
least
the
way
waxton's
looking
at
it
is
quite
like
the
sharepoint
is.
E
It
is
a
collection
of
distributed
system
or
distributed
elements
bringing
together
to
operate
the
network,
with
the
caveat
that
you
still
need
to
provide
all
the
connectivity
that's
happening,
but
as
you
move
more
towards
software-based
systems,
all
these
interesting
questions
that
are
being
asked
is
that
what
is
the
right
way
to
represent
it?
What
is
good
research,
and
how
can
we
use
this
to
effectively
operate?
Of
course,
I
speak
from
the
operator
perspective
not
to
plug
it
too
much,
but
I
think
that's
what
leon
was
getting
about
is
like
in
the
autonomous
network
focus
group.
E
That's
the
place
where
we're
looking
to
try
to
ask
these
questions
and
because
the
truth
is
no
one
knows
right.
We
talk
about
autonomous
networks.
No
one
knows
really
what
it
means
and
it's
an
opportunity
to
bring
all
the
different
perspectives
to
the
table.
Put
it
on
in
front
of
everyone
and
say
well
what
makes
sense.
Well,
it
doesn't
make
sense
and
what
are
the
wonderful
ideas
from
research
we
can
take
and
apply
and
what
are
the
terrible
ones
that
we
throw
away
so
yeah.
A
Okay,
thank
you.
We
will
move
other
questions
to
the
the
list.
If
there
are
some
the
next
presenter
is.
I
I
remember
my
agenda
so
now
I'm
loading
it
okay.
Next
one
is
alex.
I
was
wondering
I
think
we
kept.
We
kept
the
best,
the
best
the
best
for
the
last
now
I
I
thank
you
rajasthan
for
your
your
patience.
Next
one
is
edgar
from
erickson
and
again,
like
leon
was,
was
mentioning.
A
A
Presentations,
they're
they're
a
little
bit,
I
would
say
a
dusting
of
a
ton
of
different
topics
that
were
addressed
on
the
list
and
in
previous
presentations
and
in
previous
meetings,
and
I
think
it
was
the
start
of
this
new
model
modality
that
we
want
to
have,
which
is
more
focused
on
papers,
presentation
and
less
on
drafts,
and
we
will
continue
that
at
the
at
the
ietf
as
it's
coming,
and
I
think
you
have
to
to
bear
with
us
that
we're
starting
this
new
model.
A
So,
of
course,
we're
going
to
have
to
you
know,
tune
it
to
the
audience
so
edgar
again
for
people.
It
is
not
I'm
the
co-author
of
that
paper.
It's
not
exactly
about
computing
in
a
network,
but
it's
it
presents
something
that
is
very
important
for
computing
in
a
network
which
is
finding
what
you
need
and
finding
it
in
a
way
that
you
can
actually
share
it
with
other
people
and
using
a
common
language
to
essentially
be
able
to
share
that
information.
G
So
I
guess,
as
mary
jose
has
said,
this
was
a
part
of
her
work
that
I
have
been
doing
together
with
her
and
also
a
couple
of
other
authors,
timoth
schneider
from
the
university
of
alto,
which
is
now
in
in
the
netherlands,
back
and
being
the
master
who
is
from
the
again
university
of
belgium
who
had
worked
a
lot
also
with
semantic
descriptions
of
functions.
G
So
then
the
idea
was
like:
how
can
we
actually
do
something
that
could
serve
also
for
the
iot
or
not
only
try
to
do
something
that
that
it's
only
for
let's
say,
machine
learning
in
general
in
cloud?
So
basically,
this
is
where
the
networking
aspect
comes
into
play.
So
since
there
is
iot
devices,
so
the
iot
device
is
going
to
be
connected.
So
what
I'm
going
to
talk
is
a
little
bit
about.
G
G
We
have
been
talking
that
in
order
modify
or
or
let's
say,
handle
intelligence
prices,
it
would
be
needed
not
only
in
devices
I
mean
in
infrastructure
in
general,
in
the
edge,
so
we
would
need
to
to
add
some
sort
of
abstraction
that
you
can.
Actually
you
could
actually
operate
to
so
that
attract
abstraction
would
have
their
own
layer
today
that
we
found
it
together
with
the
application.
G
So,
basically,
every
application
have
an
api,
have
some
services,
and
then
it
might
have
a
machine
learning
model,
for
example,
and
then
that
all
is
packed
in
an
application
they
down
down
thing
of
this
is
that
if
you
want
to
reuse
that
model,
let's
call
it
a
system,
a
model
for
a
speech
recognition
and
you
have
other
applications
in
the
same
device
or
in
the
same
system.
You
basically
cannot
reuse
it,
because
unless
that
application
has
an
api
that
explicitly
allows
you
to
use
that
that
model,
then
you
cannot
actually
use
it
for
something
else.
G
G
So
then
an
idea
is
that,
can
we
actually
create
this
abstraction
layer
that
we
can
call
it
intelligence
layer
if
we
want-
or
we
have
been
talking
here
in
coin,
before
of
about
the
the
data,
the
data
layer?
Our
I
mean
we
can't
give
it
any
name,
but
the
idea
is
that
this
layer
would
be
basically
very
similar
to
an
operative
system.
You,
when
you
are
writing
an
application.
G
You
don't
think
in
the
application
how
to
send
a
packet
over
tcp
you
basic
line
of
code
that
allows
you
to
send
that
rig
to
the
operating
system
and
the
operating
system
take
care
of
delivering
those
packets
or
that
object.
It
will
do
the
segmentation.
It
will
do
everything
for
you
so
why
we
cannot
do
something
similar
here
in
the
devices
where
we
actually
abstract
this
layer
of
intelligence,
where
we
have
all
these
services,
like
recognition,
prediction,
anomaly,
detection
or
even
generation
of
synthetic
data
that
the
applications
could
ask
hey.
G
I
want
some
recognition
of
of
the
camera
image
that
I
have
here
and
then
you
get
an
answer.
This
is
a
an
elephant
or
this
is
a
traffic
sign
and
so
on.
So
then,
this
is
the
idea.
The
intelligent
services
would
be
these
kind
of
exposed
models,
ai
models
that
would
be
running
in
this
kind
of
abstraction
layer
called
intelligence
layer
now.
G
But
if
we
think
about
this
kind
of
model,
when
we
are
saying
that
we
put
things
in
the
devices
and
then
the
devices
become
suddenly
italian,
we
have
to
think
about
the
context
that
that
the
iot
has
as
such,
with
when
he's
trying
to
to
address
a
use
case,
and
also,
we
have
to
think
about
iot
as
a
device,
a
heterogeneity
as
such
and
then
also
the
context
where
actually
you
want
to
solve
or
how
you
want
to
solve
this
problem.
G
Each
of
the
use
cases
will
have
their
own
requirements,
so
if
you
have
a
for
agriculture
most
probably
you
want
to
know
if
this
apple
is
sick,
or
is
it
actually
healthy
for
the
suplate
supply
chain?
You
want
to
know
if
this
is
really
an
apple
or
it's
an
orange.
You
didn't
want
to
know
anything
else,
but
that
you
can
sort
it
in
the
right
place
and
for
diagnostics.
It
might
be
that
you
want
to
know
if
this
is
growing.
G
Let's
say
accordingly
to
the
to
the
standards
that
were
supposed
to
to
have
this
kind
of
apple.
G
You
wouldn't
like
that
the
decision
is
going
to
a
data
center
somewhere
in
the
u.s
when
you
are
driving
in
germany
and
then
deciding
if
you
should
stop
or
not.
You
will
like
that
that
processing
happens
in
your
car
and
also
the
different
type
of
processing
environments
might
be
more
complicated
or
less
complicated
according
to
what
is
the
capabilities
of
those
devices.
And
finally,
the
solution
context
is
like:
how
does
it
look
the
algorithm
or
whatever
you
are
using
in
order
to
to
do
this
recognition?
So
can
you
recognize
a
apple
from
the
smell?
G
G
That
is
not
only
a
picture
like
with
what
you
would
expect,
then
the
the
the
thing
is
that
why
you
want
to
have
this
is
because,
when
you
are
creating,
let's
say
systems
like
a
smart
home
where
you
are
having
an
application
developer,
building
applications
on
top
of
your
system
and
when
we
are
talking
about
a
home
is
something
that
is
expected
to
last
100
years.
G
And
then
you
have
a
speech,
recognition
service
for
that,
and
then
imagine
that
can
you
I
don't
know,
change
that
system
depending
of
the
what
is
needed
for
the
persons
that
are
going
to
live
there.
It
might
be
that
I
already
have
train
and
speech
recognition
system
why?
I
cannot
use
that
one
instead
of
the
one
that
the
maybe
the
application
developer
has
a
deal
with.
Can
I
interoperate
that
service
and
say,
like
you
know,
instead
of
having
this
I
don't
know
marcus.
G
G
Also,
I
mean
for
the
for
the
application
developers
themselves-
it's
quite
nice
because
they
don't
have
to
care
what
would
be
this
service
service
that
is
being
connected
with
your
software,
but
then
this
connection,
how
you
actually
map
what
the
person
is
talking
to
what
the
system
should
do.
So
that
is
a
semantic
problem
and
there
is
where
we
are
trying
to
to
address
it
with
this
solution.
G
Another
thing
is,
as
I
was
saying,
there
are
software
dependencies
from
the
solution
so
many
times
they
they
have
been.
They
have
been
written
in
some
programming
language
or
they
have
an
execution
environment
that
the
one
for
the
model
that
that
is
provisioned
to
you
and
then
also
there
could
be
hardware
dependencies
due
to
either
acceleration,
because
you
will
require
this
kind
of
more
specific
soft
hardware.
G
For
for
doing
the
the
instructions,
execution
faster
or
then
memory
or
then
sometimes
also
even
network
connectivity,
then
another
thing
to
take
in
account
is
the
policies
not
the
whole
story
of
intelligence
comes
from
what
the
device
supposed
to
do,
but
also
what
are
the
business
relationships
behind
those
and
then
it
might
be
that
you
have
certain
requirements
from
security
from
networking
and
from
performance.
G
Other
requirements
like
well.
I
want
my
bananas
to
be
50
degrees,
the
whole
time
they
have
been
in
the
logistic
chain,
so
how
these
kind
of
policies
can
populate
all
the
way
down
to
the
devices
so
that
they
can
understand
what
part
of
that
policy
corresponds
to
me
and
that's
another
topic
of
research
on
looking
how
these
semantics
should
be
expressed
and
then
populated
all
the
way
down
the
stack.
G
Then,
if
we
talk
about
intelligent
service,
we
can
think
of
intelligent
services
as
having
data.
That
is
input.
It
is
processed
like
any
any
any
system,
and
then
it
is
actually
output.
Then
this
input
we
can
think
about
multiple
contexts
that
this
input
can
have.
So
let's
say
that
one
content,
the
data
is
coming
from
the
device.
G
Another
context
could
be
that
the
data
is
being
feeded
by
an
external
system
or
the
data
could
be
fetch
from
a
pop
subscribe
system
and
the
same
thing
happened
with
the
output.
The
output
could
be
that
well.
This
is
a
result
that
I'm
getting
every,
I
don't
know
every
50
milliseconds
and
then
this
the
other
stream
might
be
results
that
are
consolidated
over
one
day.
G
Then
another
thing
is
that
we
could
define
in
these
streams
of
data,
something
that
we
call
tensors
in
the
machine.
Learning
world
is
well
known.
This
word
tensor,
which
is
basically
trying
to
address
a
multiple
domain
that
one
data
object
could
have
so
one
one
example
is
a
picture.
So
if
you
have
a
picture,
you
will
have
a
rgb
mattress
and
those
will
be
atomic
objects,
so
you
will
hit.
G
You
will
have
the
the
the
blue,
the
red
and
the
and
the
green
values,
and
then
they
are
together
with,
let's
say
the
picture.
What
is
the
resolution,
and
then
they
have
a
mattress
that
that
make
compose
this
kind
of
data
and
then
also
in
the
output.
You
might
have
similar
things,
for
example,
for
machine
learning
functions.
You
might
have
a
classification
mattress
coming
out
of
that
of
that
intelligence
service.
G
So
the
idea
we
have
with
these
semantic
descriptors
is:
how
can
we
how
we
can
describe
data
and
describe
these
services
that
is
being
input
in
one
hand
and
also
what
is
supposed
to
be
doing
so?
What
I'm
presenting?
You
is
basically
how
we
have
thought
that
this
data
input
and
output
could
be
described,
semantically
in
a
structure,
then
this
has
a
total.
I
mean
total
one-to-one
match
to
any
of
the
data
models
that
already
exist.
G
So
basically
you
could
actually
map
any
of
the
data
models
to
something
that
could
fit
into
this
kind
of
format.
So
it's
not
something
perpendicular
to
anything
is
something
that
can
be
adapted
and
also
they
might
be
domain
ontologies
and
vocabularies
and
even
custom
things
that
that
can't
be
adapted
in
this
kind
of
data
structure,
and
the
idea
is
that
whenever
you
get
these
services,
you
can
use
them
to
create
pipelines.
G
So
you
can
take
these
services
and
then
put
them
together
and
create
more
complex
services,
and
these
more
complex
services
might
be
even
customized
to
a
certain
transformation
so
that
you
can
serve
other
services
or
even
store
the
data.
For
example,
then
these
transformation
functions
could
be
also
something
that
resembles
a
service,
but
it
will
be
much
more
simple,
so
it
will
be
something
that
basically
do
a
service
for
the
service
that
is
is
making
or
preparing
the
data
so
that
the
service
can
be
used.
G
This
is
what
we
come
as
a
taxonomy
here,
of
course
it
looks
like
it's
a
lot
of
stuff,
but
then
what
I
want
to
just
highlight
from
here
is
maybe
the
the
left
part
where
mostly
all
of
the
things
are,
are
being
instantiated
as
some
kind
of
domain,
specific
description
in
ontology,
which
means
that
you
can
describe
the
service
in
the
same
way
but
using
multiple
domains.
So
you
could
have
an
ontology
that
it
specified
things.
G
For
I
don't
know
gardening,
and
then
you
could
have
a
vocabulary
for
gardening
and
then
you
could
actually
explain
that
service
from
the
garden
in
perspective.
It
is
a
service
that
applies
for
that,
but
then
it
might
be
that
you
have
a
similar
ontology
that
that
could
describe
things
for
a
data
center
and
then
there
you
can
actually
do
this
kind
of
abstractions
from
a
data
center
perspective,
but
the
same
service
could
be
described
then
use
it
that
different
domain.
And
then
here
we
have
multiple
entities.
G
I
I
will
start,
maybe
with
the
abstract
classes
very
fast.
So
then
this
was
what
I
just
talked
about
the
domain
specific
and
then
they
are.
These
unique
classes,
so
that's
something
that
cannot
be
repeat
so
in
some
of
the
services
you
can
have.
This
can
can
have
this
kind
of
many
domains
and
there
are
certain
things
which
are
unique.
G
G
It's
missing
some
some
letters
here,
but
then
the
idea
is
that
this
service
has
a
version,
and
then
this
version
solves
one
or
many
problems,
and
then
these
problems
are
also
domain
specific,
but
if
the
problem
is
described
mainly
as
a
goal,
so
what
is
the
goal
of
this
service?
What
it
tried
to
to
to
solve-
and
it
might
be-
that
is
a
apple
recognition
for
somebody
else
is
fruit.
Recognition
for
somebody
else
is
just
object,
recognition,
but
then
what
is
the
actual
objects
that
are
being
recognized?
That's
a
different
thing,
then.
G
Here
I
am
mentioning
policies,
although
we
didn't
do
work
in
policies
yet,
but
we
think
that
the
the
the
server
will
have
in
the
future.
This
kind
of
descriptive
policies
that
up
to
this
service
and
also
maybe
to
the
data
that
the
services
is
being
processing,
but
then
this
is
for
future
work.
The
other
part
is
the
implementation,
and
implementation
has
a
lot
of
things.
So
here
is
where
we
see
the
data
structure.
G
Part
where
you
have
the
streams,
then
you
have
the
data,
the
data
tensors
and
then
the
data
objects,
and
then
all
of
them
has
a
data
label
which
can
be
annotated
in
any
domain.
Another
thing
we
have
is
the
data
sets,
because
the
data
set
is
data
that
not
necessarily
is
being
input
or
output,
but
is
necessary
to
understand
that
data
service,
for
example,
training
data.
What
was
the
data
set
that
was
used
for
training,
a
machine
learning
model,
or
what
is
the
data
set?
G
Use
it
for
the
mapping
of
the
post
processing
of
that
of
that
and
services
is
the
classification
algorithm.
Then,
if
there
are
some
dependencies,
so
it
is
needed
if
you
require
any
execution
environment
or
you
require
a
specific
hardware
and
then
here
we
have
the
pipeline,
which
basically
is
a
composition
of
these
streams
and
and
and
and
other
intelligent
services.
And
then
we
call
something
atomic
service
to
those
services
that
can
be
can
be
orchestrated
in
the
same
pipeline
together.
A
Far
edgar
are
you
at
the
end,
because
you're
way
over
again.
G
I'm
over
time
already.
Okay,
then
let
me
just
show
that
we
did
something
similar
like
that
with
this
model
mobile
net,
which
what
it
does
is
basically
a
object
recognition
and
we
I'm
not
gonna,
go
through
the
details,
but
basically
we
we
were
able
to
delete
and
then
have
some,
for
example,
domain
specific
descriptors.
G
They
are
machine,
learning,
neural
network
methods
here
that
were
used
for
the
implementation
description,
for
example,
and
then
also
there
were
certain
annotations
for
the
data
data
labels
like,
for
example,
how
to
describe
the
the
rgb
channels
using
just
basic
rdf
and
then
some
some
other
domains
like
exif
that
are
used
for
gpec,
for
example,
and
then
we
also
put
on
top
of
that
a
pre
preprocessing,
a
preprocessing
function
that
was
basically
doing
a
normalization
of
the
data
we
added
to
the
model
with
the
pipeline
with
the
pipeline
feature,
but
well
to
conclude.
G
So
the
idea
of
this
semantic
description
is
is
basically
trying
to
provide
an
some
kind
of
structure
so
and
describe
this
intelligent
services
in
a
way
that
can
be
interoperably
it.
The
devices
need
to
have
the
full
domains,
the
everything
all
the
whole
information,
but
the
platforms
which
can
have
access
to
any
kind
of
database
and
or
any
kind
of
domain.
Specific
information
could
actually
do
this
translation
and
then
send
to
the
devices
what
they
can
understand.
G
The
same
thing:
it
provides
possibilities
to
extend
these
policies
and
then
also
the
data
set
information
to
understand
from
where
the
decisions
has
been
taken,
how
the
things
are
being
operated,
and
then
this
is
one
step
just
in
this
automation
of
intelligent
services,
so
try
to
get
machines
to
talk
to
machines,
understand
each
other.
A
Interesting,
thank
you
very
much.
I
I
think,
there's
there's
a
few
questions
and
I
think
carson
had
a
comment
and
I
think.
A
So
we
maybe
we
can
start
with
the
question
which
is
again
from
paul
and
then
we
can
move
to
the
comment
from
carson
and
maybe
the
comment
from
dirk
and
phil
paul.
You
can
ask
your
question.
E
Very
much
thank
you
for
the
very
interesting
presentation.
I
think
there's
a
lot
of
alignment
with
some
of
the
things
leon
was
talking
about
before
my
question
is
basically
so:
okay
introducing
an
abstraction
layer
to
represent
all
the
different
data
sets
that
you
have
is
super
important
have,
but
one
of
the
key
purposes
of
doing
it
is
for
reuse.
So
I
saw
in
the
examples
you
gave
you
showed
how
it
could
be
applied
to
different
areas,
but
have
you
tried
to
reuse
those
semantic
descriptions
for
like
a
secondary
domain
after
the
initial
example?
E
G
Not
yet,
but
I
have
been
thinking
of
examples
of
that,
but
we
haven't
experimented
yet
with
that
secondary
domains,
but
we
have
doing
panama
charges.
That's
what
I
can
say.
A
Okay,
carson
well
carson.
You
want
to
talk
about
your
question.
I
think
carson
and
turk
are
both
in
the
same
direction.
That
girl
is
that.
How
is
that?
G
Yeah-
and
I
think
it
was
a
bit
into
what
I
was
saying
in
the
end-
one
of
the
things
is
like
the
network
can
be
this
kind
of
translator
between
domains,
so
you
might
have
a
refrigerator
which
have
a
domain,
a
specific
description
of
what
the
server
I
mean,
what
what
is
the
refrigerator
and
what
services
this
refrigerator
requires.
G
The
the
refrigerator
will
have
an
application.
This
might
be,
I
don't
know,
planning
the
food
of
the
week
for
the
family
and
then
in
the
in
this
planning
of
the
food,
there
will
be
multiple
steps
which
are
basically
a
pipeline
of
different
services
and
atomic
services.
So
then,
how
you
are,
first
of
all
acquire
those
models,
how
you
actually
get
the
data
for
for
a
process,
not
only
the
data
that
the
refrigerator
has,
but
also
most
probably
from
other
devices
that
are
over
the
house.
G
So
then,
how
you
actually
get
the
data
to
to
be
processed
in
your
refrigerator,
so
it
has
to
be
forwarded
from
somewhere,
and
so
all
those
things
are
services
that
the
network
could
provide
the
discovery
where
I
can
find
them
find
this,
and
then
you
give
your
requirements.
This
is
the
type
of
data
I
can.
G
I
can
give
or
I
need,
and
then,
where
is
the
service
that
I
can
use
that
that
accomplished
that
for
me
from
the
point
of
view
of
the
player,
so
I
think
that
those
are
things
and,
of
course
the
pipelining
thing
is
inherent
something
that
could
go
over
devices.
Not
not
necessarily
the
service
might
be
in
one
device,
but
I
can
think
of
certain
pipelines
that
could
go
to
the,
for
example
cloud
and
come
back
and
then
continue
in
the
device.
For
example,.
A
Okay,
we're
out
of
time,
and
we
still
have
one
presentation
so
thank
you
very
much.
A
F
Yes,
very
good
presentation,
interesting
one
comment:
the
main
diagram
defining
the
architecture
where
you
introduce
a
new
network
services
is
sound
and
good.
However,
there
are
missing
elements
here
in
order
to
make
it
usable
number.
One
is
adaptation
to
the
lower
level
environments,
because
you'll
be
many
types
of
devices
numbers.
F
Two
very
importantly,
some
sort
of
management
function
to
allow
new
network
or
many
services
to
be
added
or
new
functionality,
be
added
or
changed,
without
which
the
whole
thing
is
static,
and
it
has
to
be
a
show
how
it
expands
and
also,
very
importantly,
to
distribute
to
to
define
where
this
network
service
resides.
Is
it
in
a
network
of
mini
clouds
or
it
is
in
in
one
cloud
or
both?
F
These
are
the
issues
which
need
to
be
looked
at,
but
the
question
is
very
simple:
there
are
eight
to
my
knowledge,
standardized,
fully
developed
data
models
which
have
also
mapping
between
themselves.
One
of
it
is
from
itf
group
so
for
the
issue
is
not
to
develop
another
data
model,
because
this
is
going
to
be
more
difficult
than
you
expected
in
order
for
acceptance
looks
to
me
that
you
already
said
that
this
is
not
the
same
is
similar
to
others.
What
is
needed?
F
What-
and
this
is
my
question-
are
the
information
systems
which
enable
data
to
be
collected,
distributed
and
consumed
by
the
network
services?
That's
where
it's
missing,
which
is
not
part
of
a
data
model.
It's
about
the
use
of
data
model
for
a
purpose,
and
that's
where
please
provide
some
suggestion.
What
to
do,
because
currently
it
doesn't
show
it
another
data
model
does
not
do
too
much.
To
be
honest,
although
it's
similar
to
the
other.
G
I
mean
you,
you
put
several
things
here
in
context
and
the
one
thing
that
is
important
to
have
in
mind
is
not
a
data
model.
It's
a
taxonomy
to
annotate
data
models,
so
you
will
need
data
models
to
connect
them
to
this.
What
it
tried
to
do
is
to
bring
out
a
description
of
a
service
and
as
a
description
of
the
server
you
you
mentioned,
you
need
to
have
a,
I
mean
the
environment
where
it's
executed.
We
try
to
bring
it
to
the
highest
level
possible
and
then
that
might
be
that
description
itself
it.
G
G
So
what
we
are
trying
to
do
is
like
actually
trying
to
make
possible
that
you
can
use
whatever
is
preferred
for
you
and
use
the
network
as
the
facilitator
to
find
what
is
the
best
or
what
are
the
best
services
that
match
so
that
you
can
do
life
cycle
management
of
those
services.
So
exactly
what
you
say:
you
want
to
update
a
service
so
how
you
update
it,
I'm
finding
right
match.
A
I
will
stop
this
this,
actually,
maybe
we
can
take
again.
We
can
take
that
discussion
to
the
list
because,
frankly,
we
have
rather
stint
who's,
been
waiting
and
would
really
like.
A
To
to
present
so
radish,
then
please,
okay,
so
rajasthan
is
presenting
a
paper
that
he
already
has
published
in
a
conference,
and
it
is
very
much
after
about
the
implementation
of
computing
on
switches
and
in
that
case
multi-tenant.
So
now
we're
going
to
we're
moving
from
data
abstractions
into
really
hardware.
D
Radistan,
am
I
correct
to
say
that
you
won
the
best
paper
award
for
this
paper.
A
And
again
I
I
really
I
don't
know
noah
is
not
online,
but
thank
you
very
much
to
noah
for
having
introduced
this
work
to
us.
So
please,
rather
than
please
please
present.
I
Thank
you
I'll
try
to
share
my
screen
and
see
if
that
works.
I
Okay,
thank
you
so
hello,
everyone.
First,
I
would
like
to
thank
the
organizers
for
inviting
me
here
today
and
for
giving
me
this
opportunity
to
present
our
work
on
multitank
programmable
switches.
I
I
In
recent
years,
many
applications
have
been
developed
for
in-network
computing.
Some
examples
include
inbound
network
gallery
used
to
collect
and
report
network
state
consensus
protocols,
significantly
increasing
throughput
and
reducing
latency
stateful
load,
balancers
capable
of
replacing
hundreds
of
software
instances
with
single
switch
key
value
stores,
providing
high
throughput
and
low
latency
with
rapidly
changing
workloads.
I
However,
today
data
centers
are
shared
by
many
organizations
that
don't
necessarily
have
the
same
requirements
in
terms
of
availability
and
security,
and
what,
if
you
want
to
run
in
network
applications
as
a
service
while
programmable
date,
plan
virtualization
allows
us
to
run
multiple
intel,
in-network
applications
simultaneously
on
a
single
network
device.
The
code
synthesis
of
multiple
tenants
on
a
programmable
switch
has
some
additional
requirements.
I
In
particular,
mechanisms
for
security,
performance
and
resource
installation
are
needed
to
compartmentalize
the
network
device,
while
multi-tenancy
allows
multiple
users
to
share
the
same
physical
data
plan.
There
are
several
aspects
we
need
to
consider
in
terms
of
security
when
reusing
memory,
for
example,
for
packet
gaming.
We
need
to
ensure
that
one
user
cannot
infer
the
data
from
the
traffic
of
other
users.
I
I
I
Where
the
queue
size
is
carried
over,
the
metadata
bus
is
an
attacker
that
has
been
has
deployed
a
malicious
malicious
program
and
he
could
attempt
to
modify
the
queue
size
on
the
on
the
metadata
bus
by
setting
it
to
zero
or
maximum,
which
could
lead
to
incorrect
congestion
control.
I
It
could
also
deploy
a
program
that
could
attempt
to
change
the
header
information,
such
as
priority
and
attempt
in
an
attempt
to
cause
a
packet
to
be
dropped
to
prevent
this
type
of
attacks,
and
a
network
operator
should
be
able
to
control
what
capabilities
are
available
to
user
programs.
I
This
approach
allows
not
only
to
programmatically
configure
the
assignment
of
packets
to
each
program,
but
also
to
limit
the
amount
of
outcome
track.
Traffic
protocols
such
as
vxlan
can
be
used
to
encapsulate
packets
to
enable
users
to
modify
inner
packet
headers,
while
the
outer
headers
are
used
to
forward
the
packet
to
the
correct
destination
device.
This
method
can
be
used
to
abstract
the
underlying
hardware
infrastructure
and
provide
the
ability
to
users
to
perform
arbitrary
packet
processing,
for
example,
to
modify
ethernet
headers.
I
To
manage
multi-tenant
data
plane,
a
network
administrator
can
can
apply
rows
and
permissions
to
define
the
level
of
access
available
to
each
program.
A
super
user
role
can
be
used
to
define
how
packets
are
processed
before
and
after
user
programs,
while
a
user
role
represents
all
capabilities
available
to
user
programs.
I
I
We
implemented
the
prototype
of
mtpsa
on
the
psa
bmw
software
switch
using
the
p46
firework
and,
as
you
can
see,
a
supervisor
program
is
used
to
define
the
ingress
and
egress
pipelines,
while
user
programs
are
similar
to
the
simple
sim
switch
architecture,
they
consist
of
programmable
parser,
match
action,
control
block
and
a
d
parser.
I
The
super
user
ingress
pipeline
assigns
user
identifier
to
each
packet.
It
corresponds
to
switch
context
where
the
user
program
is
installed
by
default.
The
user
identifier
is
set
to
0
and
the
context
corresponding
to
this
is
reserved
as
a
control
context.
Control
context
is
used
to
process
unexpected
packets,
for
example,
when
no
programs
have
been
installed
or
the
received
packet
cannot
be
associated
with
any
user.
I
I
I
I
In
summary,
we
propose
a
methodology
for
multi-tenancy
and
programmable
data
plan
data,
plane,
virtualization,
providing
performance,
security
and
resource
installation
capable
of
processing
buckets
outline
rate.
Our
implementation
is
open,
source
and
available
on
github.
Thank
you
for
your
attention
and
happy
to
answer
any
questions.
A
Thank
you,
rajasthan.
Is
there
a
question,
I
think,
for
the
people
on
on
this
group
who
are
not
too
familiar
with
with
b4?
Actually,
we've
had
a
a
really
wide
range
of
topics
today,
which
is
good
for
people
who
are
not
too
familiar
for
with
p4.
A
Can
you
tell
why
multi-tenancy
has
not
that
much
been
used
in
p4,
especially
if
you
consider
the
problems
that
are
related
to
security
encryption?
All
of
these
things.
I
I
think
it's
because
it's
still
an
early
project,
the
language
itself
has
the
p416
version,
which
was
which
is
still
in
development
and
the
portable
switch
architecture.
Psa
is
also
a
new
proposal.
The
specification
itself
and
the
new
work
that
is
coming
up,
the
portable
nic
architecture
is
also
very
interesting.
I
think
there
are
a
few
papers
about
discussing
how
virtually
virtualization
can
be
supported,
and
this
is
basically
divided
into
three
three
categories,
so
the
first
category
is
power
level.
I
I
The
second
category
is
a
hypervisor
based
where
there
is
a
specific
p4
program
that
can
basically
do
everything,
but
it
can
be
configured
through
the
match
action
tables.
So
basically,
this
this
approach
is
using
a
special
compiler
that
transforms
the
p4
program
into
configuration
that
can
be
deployed
at
runtime
and
the
last
one
is
basically
when
we
have
an
architecture
that
supports
multi-tenancy.
I
The
difference
is
basically
the
first
two
approaches:
don't
actually
provide
performance
installation.
So
if
you
merge
a
large
program
with
the
small
one,
the
latency
will
be
the
same
for
both
of
them
that
the
second
approach
has
a
downside
that
it
consumes
a
lot
of
resources,
even
though
not
everything
is
being
used
and
the
architecture
approach
is
still
something
new.
A
Yeah
I'm
on
mute
because
it
seems
somebody's
doing
some
repairs
upstairs
and
now
I
don't
hear
myself.
Are
there
any
other
questions.
A
Okay,
we
still
have
a
few
minutes.
Do
you
you
hear
that
noise
behind?
Well?
If
they
stop
there,
I
think
they're
sanding,
the
floors,
no
worries
whatever
it's
a
nice
background
information.
I
can
take
just
a
few
seconds
to
talk
about
the
the
nsf
workshop.
I
can
share
some.
I
can
share
at
least
the
picture
that
we
had.
A
So
please
please
stop
sanding
the
floors,
so
essentially,
I
just
wanted
to
tell
this
group
that
we
had
with
again
henning
schulzrin
of
columbia
university.
These
three
workshops.
In
november,
we
went
across
the
u.s
elections,
which
was
interesting
where
we
looked
at
the
future
of
research
in
broadband
and
nsf.
Does
that
every
four
years
to
see
where
the
we're,
through
four
or
five
years,
to
see
what
is
the
status
of
research?
A
In
broadband?
We
had
three
workshops:
one
on
technology,
one
on
economics
and
one
on
digital
inclusion
and,
of
course,
for
this
group.
It's
mostly
the
technology
part
that
is
important.
A
I
have
to
say
that
the
report
is
being
published.
It's
going
to
be
public,
so
when
it
is
issued,
I
will
make
sure
to
post
the
the
link
to
this
group.
A
A
There
was
a
recognition
that
you
know
there's
not
that
much
broadband
research
as
there
was
before
and
a
lot
of
it
has
been
allotted
to
like
optimizing
data
centers
and
making
sure
that
you
know
cloud
infrastructure
works
well,
but
that
there
could
be
other
interesting
approaches
as
we
go
into
more
in
artificial
intelligence
and
networks
and
as
also
broadband
is
more
and
more
wireless
and
not
and
not
wired.
A
We
had
in
our
group
of
panelists,
which
were
invited
the
people
from
princeton
the
group
from
jennifer
redford
rexford,
who
are
doing
a
lot
of
in-network
computing.
So
there
was
a
little
bit
of
a,
I
would
say,
a
a
discussion
about
the
use
of
in-network
computing.
A
There
was
also
the
idea
that
there's
a
lot
of
new
satellite
networks
that
are
going
up
and
these
satellite
networks
will
be
connected
also
to
data
collection,
data
distribution
and
computing
centers,
so
that
was
actually
also
part
of
the
discussion
and
who
talks
data
talks
also
metrics
the
metrics
needed
to
actually
direct
the
data
acquisition
and
the
metrics
that
are
used
to
evaluate
the
data.
A
So
there
was
strangely
enough
not
a
lot
of
discussion
and,
I
would
say,
fundamental
network
research
in
terms
of
what
has
happened
in
the
fa
in
the
past,
like
you
know,
in
terms
of
more
advanced
antennas
and
stuff
like
that,
but
there
was
a
lot
about
again
how
broadband
research
and
network
research
in
particular
is
moving
to
be
very
much
data
oriented
and,
to
a
lesser
extent,
but
also
related
to
the
topics
that
were
addressed
by
our
colleagues
in
economics
and
in
digital
inclusion.
A
This
aspect
of
broadband,
not
now
just
just
not
being
having
a
fiber
industry,
but
how
people
can
actually
use
that
fiber,
which
of
course,
is
being
now
experienced
by
everybody
on
this
call
that
we're
working
from
home
and
I
have
a
lot
of
broadband,
but
I
have
standing
upstairs.
So
how
do
you
deal
with
all
the
socioeconomic
and
geographical
relations
to
access
to
broadband?
A
A
Meeting
is
in
the
last
session
of
the
friday,
which
I
think
is
afternoon
for
me-
is
probably
middle
of
the
night
in
asia
and
in
in
the
rest
of
the
world.
Probably
california.
This
time
is
in
a
good
way,
is
in
the
good
shape,
we're
going
to
have
the
same
type
of
format
that
we
had
today,
which
is
research
papers
or
research
updates,
and
if
I
have
a
better
update
on
the
nsf
I'm
going
to,
I
think
the
the
report
should
be
ready
by
then
and
again.
A
If
you
have
presentations,
we've
already
had
two
people
asking
for
presentation
and
we're
we're
obviously
asking
for
for
more
again
we're
not
going
to
concentrate
on
the
drafts.
We
would
love,
however,
to
remind
some
people
on
this
call
that
your
drafts
are
expired,
and
so
please
decide
what
you
want
to
do
with
them
and
move
again
the
discussions
on
on
drafts
to
the
list.
A
This
was
the
or
like
some
kind
of
our
first
trial
at
doing
this
more
into
like
a
technical
kneading
of
some
sorts
and
again,
I
think,
we'll
have
to
sort
out
how
we
want
to
continue
that
model.
But
I
think
it's
it's.
What
we
decided
would
be
the
most
research
in
the
irtf
and
a
little
bit
less
a
bunch
of
drops
presentations
which
we've
been
very
lucky,
because
we
have
a
lot
of
them.
But
again,
this
is
for
research
and-
and
we
want
to
really
focus
on
that.
D
What
I
wanted
to
say
was
that
you
know
we
recognize
that
there's
probably
some
balance
between
all
drafts
or
all
research
proposals,
and
so
ideas
around
how
to
organize
would
be
very
well
appreciated.
D
I
in
particular
like
sitting
here
you
know,
as
we
ask
each
of
the
presenters
you
know
like
how
does
this
revert
or
relate
back
to
coin
rg,
or
maybe
you
know,
having
dedicated
sessions
to
a
particular
topic
or
part
of
the
architectural
space,
or
you
know
focusing
in
on
the
different
flavors
of
compute
in
the
network.
You
know
organizing
principles
like
that,
so
we're
absolutely
open
to
you
know
best
practices
or
requests
that
you
might
have
to
help
us.
D
You
know
balance
the
the
dynamic
in
the
group
towards
the
pragmatics
of
drafts
versus
the.
How
do
we
progress
the
area
and
really
work
towards
our
objective
to
organize
the
research
group
going
forward
or
whether
that
organization
means
scoping
it
differently
or
directing
it
in
some
new
way?
So
your
ideas
are
very
much
appreciated
and
solicited.
A
Yeah
again,
I
think
we're
we're
we're
finding
our
our
footing
and
I
think
yeah
we
we
we
tried
to
take
into
account
a
lot
of
the
comments
we've
had
before,
but
obviously
new
comments
are
also
welcome,
so
we're
going
to
finish
on
time,
which
is
really
great.
I
would
like
to
thank
all
the
presenters
alex
leon
and
paul
edgar
and
radistan
for
their
efforts
and
helping
us
put
this
together.
A
We
will
of
course,
produce
some
minutes
when
they're
finished
doing
the
sanding
upstairs
and
oh,
my
god,
this
is
horrible
and
we
will
hopefully
see
you
virtually
on
march
12th.
Thank
you
so
very
much.
D
D
A
Some
stores
now
everything
was
closed
for
since
december
24th
and
I
think
I'm
just
going
to
to
go.
Do
some
shopping
while
they're
doing
that,
because
you
know
I
won't
be
able
to
work
here.
That's
terrible!
A
Thank
you
so
much
everyone
and
yeah.
Hopefully
I
figured
out
colin
and
even
company.
You
know
that
it's
been
a
year
since
we
actually
met
in
person.
H
A
Phillip,
I'm
sorry
to
have
to
tell
you
this,
but
the
british,
the
british
well
colin.
You
were
in
the
british
trials
too
the
british
version
of
this
being
now
propagating
through
north
america.
D
So
colin,
we
would
especially
appreciate
your
wisdom
about
you
know
how
to
take
the
this
idea
of
research
discussion
and
maybe
even
more
pointed
research
discussion
where
we
cluster
some
of
the
topics
yeah
with
different
meetings.
A
Having
themed
themed
meeting
could
be
good,
I
think
today
we
were
just
about
four
teams
yeah.
I
thought.