Book Read Free

No Better Time

Page 23

by Molly Knight Raskin


  Paramount Digital Entertainment,

  89–90

  Pardes, Anne. See Lewin, Anne

  Pasko, Chris, 172–175

  Pathfinder, 105, 133

  PC. See Personal computers

  Penenberg, Adam L., 158

  Perot Systems, 152

  Personal computers (PC), 26

  Playboy, 116

  Akamai and, 121–122

  Poduska, J. William, 78

  Polaris Venture Partners, 107, 149, 153

  Conrades at, 151

  Polaroid, 12, 65, 68

  Pollack, Andrew, 158

  Pony Express, 17–18

  Pornography, 121–122

  Porter, Bill, 81

  Postal service, 152

  President’s Information Technology Advisory Committee, 217

  Preston, John, 70

  Price Waterhouse Coopers, 147–148

  Prime Computer, 78

  Princeton University, 46–47

  Probabilistically checkable proofs, 83–84

  Project Mathematics and Computation (Project MAC), 7–8

  Prospectus drafting, 173

  Protekzia, 28

  Public relations, 160

  Publicity, 134

  Public-key encryption, 3, 11

  Publishing

  Dodis on, 55

  Lewin, D., on, 55–56

  Qualcomm, 11

  QuickTime III, 128

  QuickTime player, 164

  QuickTime TV, 137, 163

  Ramat Gan, 39

  Rand Corporation, 7n

  Random trees, 83

  Randomized algorithms, 12–13

  Real Player, 164

  RealNetwork, 164

  Reform Judaism, 25

  Rephen, Brad, 33

  on Lewin, D., 30–31

  Rhode Island, 54

  Rickover, Hyman, 45

  Riders, 18–19

  Riemann Hypothesis, 45

  Rivest, Ron, 8, 11

  Roadrunner, 105

  Rockefeller family, 107n

  RSA Data Security, 8

  Saatchi & Saatchi, 217

  Sagan, Carl, 106

  Sagan, Paul, 104–105, 122, 159, 165–166, 208, 222

  at Akamai, 106, 124

  on CNN, 188

  Galleher and, 167, 178

  Gassel and, 133

  on Lewin, D., 213

  media savvy of, 119

  on news business, 131–132

  on 9/11, 210

  on Yahoo, 129–130

  Sahai, Amit, 48, 49, 55

  on Leighton, T., 50

  Salomon Smith Barney, 93, 189

  Samson’s Gym, 30–33

  Sandpiper, 122, 166

  Akamai and, 157–158

  Sarig, Ronen, 31

  on Lewin, D., 33

  SAS. See Special Air Service

  SATs, 10

  Sayeret Matkal, 23, 40

  history of, 34–35

  Lewin, D., in, 34, 37–38

  recruitment process, 35–36

  Schvimmer, Eric, 133

  Scientific American (magazine), 26

  Sconyers, John, 120, 193

  at Akamai, 122, 123, 146

  SCUD-B missiles, 39

  Securities and Exchange Commission (SEC), 171, 173, 178

  Seelig, Jonathan, 77, 81, 89, 100, 103, 116, 195

  at Akamai, 94–95, 108, 112

  infrastructure focus of, 124

  on Lewin, D., 71–72, 199

  servers installed by, 112, 124

  Senor, Dan, 41

  September 11, 2001. See 9/11 attacks

  Sequoia Capital, 90, 103, 129, 130

  Servers

  acquisition of, 124

  costs of, 111–112

  installation of, 112, 124

  problems with, 117

  Service-Level Agreement (SLA), 126–127

  Shabbat, 37

  Shamir, Adi, 11

  Sherman, Alex, 77

  Shiva, 213–214

  Shouk, 33

  Silicon Spice, 70

  Silicon Valley, 9, 180

  Singer, Saul, 41

  Sitara Networks, 77, 79

  SLA. See Service-Level Agreement

  Sloan School of Business, 55, 67, 70, 71, 122

  Spacewar, 48

  Special Air Service (SAS), 35

  “Speed Racer” (Penenberg), 158

  Speedera, 157

  Spinard, Paul, 165–166

  SportsLine USA, 127

  Sprint, 158

  SRI. See Stanford Research Institute

  Sri Lanka, 125

  Staehle, Wolfgang, 183

  Stanford, 4, 9, 129

  Stanford Research Institute (SRI), 77

  Star Trek (television show), 89–90

  Star Wars (film), 114

  Star Wars, Episode I: The Phantom Menace (film), 128

  Starr, Kenneth W., 99, 118

  Start-Up Nation (Senor and Singer), 41

  Starwars.com, 128

  Starwave Corp., 125

  Sting, 102

  Stylus Innovation, Inc., 70, 80

  Sullivan, Andrew, 61

  SunAmerica, 74, 100, 154

  al-Suqami, Satam, 203, 218

  Swart, Andrew, 157

  Sweeney, Madeline, 202, 218

  Symposium on Discreet Algorithms, 68

  TCP/IP. See Transmission Control Protocol/Internet Protocol

  TCS. See Theoretical computer science

  Tech Square, 13, 49, 92

  Technion, 13–14

  Lewin, D., at, 41

  Technology Licensing Office, MIT, 70, 74

  Tel Aviv, 4, 33, 214

  attacks on, 39–40

  Temple Sinai, 25

  Teradyne, 81

  Terrorism, 3, 28, 33, 39–40, 202–203

  Thau, Robert, 77

  Theoretical computer science (TCS)

  algorithms in, 60–61

  as discipline, 10

  Leighton, T., on, 10–11, 47–48

  Theory Jeopardy, 52

  Thomas Weisel Partners LLC, 173

  Ticketmaster, 190

  Time Inc. New Media, 105, 131

  Time sharing, 3

  Time Warner, 105

  Times Mirror Corp., 157

  Tobin, Scott, 77, 93, 106

  Transmission Control Protocol/Internet Protocol (TCP/IP), 8

  True Solutions, 111–112, 117

  Turing, Alan, 47

  algorithms used by, 60

  Turing machine, 60

  Tzanhanim, 36

  UC Santa Barbara, 7

  Uganda, 35

  Ulpan, 28

  the Unit. See Sayeret Matkal

  Universal, 116, 123, 185

  Universal Music Group, 184

  University of California Los Angeles, 32

  University of Chicago School of Business, 150

  University of Michigan Business School, 141

  University of Southern California, 11

  University of Utah, 7

  URLs, 20

  Vadhan, Salil, 48, 51, 55

  Vanity Fair (magazine), 38

  Veblen, Oswald, 47

  Venrock, 108

  Akamai invested in by, 107

  Vermont, 54

  Vezza, Albert, 77

  Viant, 9

  Victoria’s Secret, 190

  Virtual handshakes, 8

  Visa, 131

  Viterbi, Andrew James, 11

  Viterbi algorithm, 11

  Volunteer Community Connection, 82

  von Neumann, John, 1, 47

  Vonnegut, Kurt, 109

  W3C. See World Wide Web Consortium

  Wall Street, 134, 141, 186

  Wall Street Journal (newspaper), 154, 155, 158

  Walt Disney Internet Group, 126

  Walt Disney Television, 152

  Waltham, 112

  Warner Brothers, 116

  Washington Post (newspaper), 99, 133,

  211

  Was
hington-Lee High School, 45–46

  WCBS-TV, 105

  WebRadio.com, 158

  WeddingBell.com, 81

  Weinbaum, Jake, 125

  Weise, Elizabeth, 20

  Weller, Tim, 210

  Wenner, Jann, 103, 176

  Wesleyan University, 149

  Westinghouse Science Talent Search, 46

  What Can Be Automated? (research study), 47

  Wilson Sonsini Goodrich & Rosati , 77

  WIRED (magazine), 165–166

  Word games, 54–55

  World Economic Forum, 104–105

  World Trade Center, ix, 203, 207, 217

  World Wide Web. See Internet

  World Wide Web Consortium (W3C), 8, 20, 160

  Wozniak, Steve, 26

  Wynkoop, Melanie, 147–148

  Yahoo, 116, 122, 123, 137, 160, 161

  Akamai and, 129–130, 171

  history of, 129

  Sagan, P., on, 129–130

  Yang, Jerry, 129

  Yerushalmi, Yoav, 77

  Young, Jeff, 144

  at Akamai, 160–161

  Young, Steve, 120

  Ziegler’s Giant Bar, 61

  Ziner, Wendy, 160

  Zionism, 26–27

  Copyright

  Da Capo Press

  A Member of the Perseus Books Group

  Copyright © 2013 by Molly Knight Raskin

  All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher.

  Printed in the United States of America.

  For information, address Da Capo Press, 44 Farnsworth Street, 3rd Floor, Boston, MA 02210.

  Cataloging-in-Publication data for this book is available from the Library of Congress.

  First Da Capo Press edition 2013

  ISBN: 978-0-306-82167-7 (e-book)

  Published by Da Capo Press

  A Member of the Perseus Books Group

  www.dacapopress.com

  Da Capo Press books are available at special discounts for bulk purchases in the U.S. by corporations, institutions, and other organizations. For more information, please contact the Special Markets Department at the Perseus Books Group, 2300 Chestnut Street, Suite 200, Philadelphia, PA, 19103, or call (800) 810-4145, ext. 5000, or e-mail special.markets@perseusbooks.com.

  10 9 8 7 6 5 4 3 2 1

  {*} In 2003, MIT’s Laboratory for Computer Science (LCS) merged with the Artificial

  Intelligence (AI) Lab to form the MIT Computer Science and Artificial Intelligence

  Laboratory, or CSAIL.

  {†} *A number of scientists pioneered aspects of packet switching, including Paul Baran at Rand Corporation, who developed the architecture of packet networks, and Donald Davies at England’s National Physics Laboratory, who coined the term “packet.”

  {‡} *Here, the term “hackers” refers to a community of computer programming and systems design enthusiasts that originated out of MIT in the 1960s. This definition exists separately from today’s mainstream usage of the word “hacker” to refer to cybercriminals.

  {§} *Venrock, founded in 1969, is the Rockefeller family’s venture fund with offices in Massachusetts, New York, and California.

  {**} *GTE Corporation was formerly General Telephone & Electronics Corporation (1959-1982).

  {1} Barry M. Leiner,Vinton G. Cerf, David D. Clark, Robert R. Kahn, Leonard Kleinrock, Daniel C. Lynch, Jon Postel, Lawrence G. Roberts, Stephen S. Wolff, The Past and Future History of the Internet, Communications of the ACM, February 1997, Vol. 40, No. 2.

  {2} Katie Hafner and Matthew Lyon, Where Wizards Stay Up Late: The Origins of the Internet, (New York, Simon & Schuster, 1996).

  {3} Charles Haddad, “Boston: City thrives on ideas. Education complex drives booming software, biotech industries,” The Atlanta Journal and Constitution, High-Tech Hot Cities section, October 6, 1993.

  {4} Farhad Manjoo, “Jurassic Web: The Internet of 1996 is almost unrecognizable compared with what we have today,” Slate, February 24, 2009.

  {5} Elizabeth Weise, “Is the Internet Poised to Collapse? Some Say Yes, Some Say No,” Associated Press, October 9, 1999.

  {6} Neal Sandler, “Ex-Monopoly Battles Competitors: Bezeq Israel Faces Realities of Market,” New York Times. October 8, 1999.

  {7} David Ivanovich, “Residents Keep Watch for Terrorist Bombs,” Associated Press, September 12, 1984. International News.

  {8} Rich Cohen, Brotherhood of Warriors. (New York: Harper Collins, 2009).

  {9} Rich Cohen, “Stealth Warriors,” Vanity Fair, 496 (December, 2001): 284.

  {10} Samuel M. Katz, The Elite: The True Story of Israel’s Secret Counter-terrorism Unit: The Most Deadly Fighting Force in the World. (New York, Pocket Books, 1996).

  {11} “Israeli premier turns to former commando comrades for top government leadership positions,” Associated Press. August 29, 2012.

  {12} Muki Betser, with Robert Rosenberg, Secret Soldier: The True Life Story of Israel’s Greatest Commando, (New York, Atlantic Monthly Press, 1996).

  {13} Rich Cohen, “Stealth Warriors,” Vanity Fair, 496 (December 2001): 284.

  {14} By Joshua Hammer, et al., “Will Israel Hit Back?” Newsweek, February 11, 1991.

  {15} Patrick Tyler, “US Tells of Retaliatory Plan the Israelis Abandoned,” New York Times, March 7, 1991.

  {16} Dan Senor and Saul Singer, Start-Up Nation (New York: Hachette, 2009), 74.

  {17} “The History of Computing at Princeton,” Princeton University. http://

  www.princeton.edu/oit/about/history.

  {18} Bruce Arden, What Can Be Automated? The Computer Science and Engineering Research Study (Cambridge, MA: MIT Press, 1980).

  {19} J. M. Graetz, “The Origin of Spacewar,” Creative Computing (August 1981), 56–67.

  {20} David Karger later came to appreciate consistent hashing, expanding on the idea with his own research and supervising a seminal paper on its merits (co-authored by Lewin, Lehman et al.): Consistent Hashing and Random Trees: Distributed caching protocols for relieving hot spots on the World Wide Web.

  {21} David Berlinski, The Advent of the Algorithm: The 300-Year Journey from an Idea to the Computer (Orlando, Florida: Mariner Books, 2001), xii.

  {22} F. Thomson Leighton, On Theory (Forthcoming).

  {23} Knuth, Donald Ervin. “The Art of Computer Programming (TAOCP)” . Retrieved 2012-05-20.

  {24} Leslie Walker, Business at Cyberspeed; Brainstorm Becomes Quick Internet Hit, The Washington Post, January 24, 1999, A01.

  {25} Marc Ballon, MIT Springboard Sends Internet Company Aloft, Inc.com, December, 1998, Pg. 23.

  {26} MIT 50 K Press Release, 1998, MIT Newsroom: http://mitsloan.mit.edu/newsroom/50k/50kfunfacts.php

  {27} Leslie Walker, Business at Cyberspeed, Washington Post, January 24, 1999, A01.

  {28} Daniel M. Lewin, Consistent Hashing and Random Trees: Algorithms for Caching in Distributed Networks, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, May 1998.

  {29} United States Patent and Trade Office, Patent # US6108703 A, Inventors: Leighton, F. Thomson, Lewin, Daniel, Assignee: Massachusetts Institute of Technology, filed July 1998.

  {30} Jon Gertner, The Idea Factory: Bell Labs and the Great Age of American Innovation, (New York, Penguin Press, 2012).

  {31} Bart Ziegler, Thomas E. Weber, and Michael W. Miller, “Starr Report Makes History And Marks Web’s Emergence,”Wall Street Journal, Monday, September 14, 1998.

  {32} David Kravets, “Starr Report Showcases Net’s Speed: September 11, 1998,” Wired, September 11, 2009.

  {33} “Exodus Communication Annual Report 1999,” Internet Corporation for Assigned Names and Numbers, https://archive.icann.org/en/tlds/i1/REGOP/Exodus%20proposal.htm

  {34} Robert Lenzner, “Personality Change,”
Forbes (April 3, 2000): P074–P080.

  {35} Akamai Press Release: http://www.akamai.com/html/about/press/releases/1999

  /press_011499.htmlhttp://www.akamai.com/html/about/press/releases/1999/press_011499.html

  {36} John F. Thorsberg, “Sports Sidelines: NCAA’s March (Cyber) Madness,” CBS Marketwatch, March 11, 1999.

  {37} Bob Longino, “ ‘Star Wars’ Fans Turn to Web for Trailer,” Cox News Service, March 11, 1999.

  {38} Doreen Carvajal, “Amazon Surge May Reflect the New Math of the Internet,” New York Times, January 11, 1999, Late Edition—Final.

  {39} John Cassidy, Dot.Con: How America Lost its Mind and Money in the Internet Era (New York: HarperCollins, 2002).

  {40} “IBM 650,” Wikipedia, last modified February 26, 2013, http://en.wikipedia.org/wiki/IBM_650

  {41} Julie Pitta and Bruce Upbin, “The Dark Side of Options,” Forbes, 163, no. 10 (May 17, 1999) 210–213.

  {42} Bradley Spirrison, “Akamai Uses Force to Raise $35M Round,” Private Equity Week, May 24, 1999.

  {43} Suein Hwang, Rebecca Blumenstein, Ann Grimes and Andrea Petersen, “Digits,” The Wall Street Journal, December 23, 1999. B, 6:1.

  {44} “1999 Internet Caching Report Reveals Strong Market Growth,” Emerging New Applications, PR Newswire, August 17, 1999.

  {45} David Strom, “The Caching Question,” Internet World, September 15, 1999

  {46} Andrew Pollack. “Web-Page Distribution Could Unclog Internet Traffic Jams,” New York Times, April 26, 1999.

  {47} Nick Wingfield, “Sandpiper Aims to Prevent Event-Driven Web Pileups,” Wall Street Journal, June 17, 1999, B10.

  {48} Adam L. Penenberg. “Speed Racer,” Forbes, 164, no. 7 (September 20, 1999): 200–202.

  {49} Regina Joseph, “Aloha Akamai,” Forbes, June 18, 1999.

  {50} “Apple and Akamai Reveal Apple Investment to Cement Strategic Agreement,” Akamai, August 18, 1999, http://www.akamai.com/html/about/press/releases/1999/press_081899c.html. Press release.

  {51} David Frith, “Tuesday Jobs to get real in QuickTime,” Australian, August 17, 1999.

  {52} Margo Lipschitz Sugarman, “The Brain that Beat the World Wide Wait,” Jerusalem Report, July 5, 1999, 38.

  {53} Paul Spinard, The New Cool: Akamai overcomes the Internet’s hot spot problem, WIRED, August 8, 1999.

  {54} Akamai Technologies Inc., SEC filing form S-1/A, September 27, 1999. EDGAR online.

  {55} Pete Barlas, “This Year’s Internet IPOs Want To Party Like 1999,” Investor’s Business Daily (Los Angeles, CA), January 12, 2000, A06.

 

‹ Prev