Hi all,

From the perspective of NSF development, if we want to improve I2NSF to adapt new techs like security management automation and trusted computing, I support the re-chartering text.

As a technology researcher I'm not sure if the current network of China Mobile will deploy I2NSF technology directly. But in network security area, I think at least I2NSF could provide a very useful guidance and recommendation to design and implementation.

BR.
Penglin


On 11/7/2022 8:18 PM, Mr. Jaehoon Paul Jeong wrote:
Hi Linda,
Here is the Re-chartering Text and Slides for IETF-115 I2NSF Session.

I believe that Korea Telecom (KT), Telefonica, and China Mobile are willing to support this re-chartering to deploy the I2NSF technology into their networks.

Thanks.

Best Regards,
Paul
--
===========================
Mr. Jaehoon (Paul) Jeong, Ph.D.
Associate Professor
Department Head
Department of Computer Science and Engineering
Sungkyunkwan University
Office: +82-31-299-4957
Email: [email protected], [email protected]
Personal Homepage: http://iotlab.skku.edu/people-jaehoon-jeong.php <http://cpslab.skku.edu/people-jaehoon-jeong.php>

_______________________________________________
I2nsf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2nsf
_______________________________________________
I2nsf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to