Edward Felten

Edward Felten
Edward William Feltenis a Professor of Computer Science and Public Affairs at Princeton University. On November 4, 2010, he was named the Chief Technologist for the Federal Trade Commission, a position he officially assumed January 3, 2011. On May 11, 2015, he was named the Deputy U.S. Chief Technology Officer...
NationalityAmerican
ProfessionScientist
Date of Birth25 March 1963
CountryUnited States of America
needs manage reasonable
Network operators need reasonable leeway to manage their networks.
dream google generations
The next generation of innovators, who need neutrality the most, are not at the bargaining table. They're hard at work in their labs or classrooms, dreaming of the next big thing, and hoping that the Internet is as open to them as it was to the founders of Google.
want problem casts
The problem - when you cast your net that wide - is you inevitably catch something you don't want to catch.
government giving want
The question is not whether we want to keep this open, neutral Internet - we do, or should - but whether government rulemaking can give us the result we want.
secret internet openness
The secret of the Internet's success has been its openness to new services.
moving thinking important
Vigorous enforcement of copyrights themselves is an important part of the picture. But I don't think that expanding the legal definition of copyright outside of actual copyright infringement is the right move.
two not-good-enough three
We're in a situation where the solutions that we have are not good enough. The way to improve anything is to have a discussion about its flaws. To understand what the one or two or three things are about it that would help fix it. The DMCA makes it dangerous to have that conversation.
healthy atmosphere growth
Growth comes out of a healthy competitive atmosphere, not trying to choose a particular path forward.
pigs dancing choices
Given a choice between dancing pigs and security, users will pick dancing pigs every time.
change publishing technology weaknesses widely
We are not going to change the weaknesses in the technology by publishing the paper, ... The technology is weak. It would be widely defeated, quickly.
desire files hiding legitimate programs secure system undermine
It is not legitimate to undermine the user's desire to secure their own computer. I don't think they should be hiding files and programs and registry entries from the system administrator, ever.
discuss normal papers strengths types weaknesses
it is normal for these types of papers to be presented, which discuss the strengths and weaknesses of the technologies.
besides cast catch computer net security seems wide
The DMCA seems to cast a very wide net and will catch a lot of things besides computer security,
concerned paper particular presenting
I am not concerned about presenting this paper on this particular day.