Hi all,
From the perspective of NSF development, if we want to improve I2NSF to
adapt new techs like security management automation and trusted
computing, I support the re-chartering text.
As a technology researcher I'm not sure if the current network of China
Mobile will deploy I2NSF technology directly. But in network security
area, I think at least I2NSF could provide a very useful guidance and
recommendation to design and implementation.
BR.
Penglin
On 11/7/2022 8:18 PM, Mr. Jaehoon Paul Jeong wrote:
Hi Linda,
Here is the Re-chartering Text and Slides for IETF-115 I2NSF Session.
I believe that Korea Telecom (KT), Telefonica, and China Mobile are
willing
to support this re-chartering to deploy the I2NSF technology into
their networks.
Thanks.
Best Regards,
Paul
--
===========================
Mr. Jaehoon (Paul) Jeong, Ph.D.
Associate Professor
Department Head
Department of Computer Science and Engineering
Sungkyunkwan University
Office: +82-31-299-4957
Email: [email protected], [email protected]
Personal Homepage: http://iotlab.skku.edu/people-jaehoon-jeong.php
<http://cpslab.skku.edu/people-jaehoon-jeong.php>
_______________________________________________
I2nsf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2nsf
_______________________________________________
I2nsf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2nsf