2,588 research outputs found

    Expanding Our Boundaries With Technology

    Full text link
    When Kate first came to speak at the ACL Conference at Lee University, I think I\u27m not exaggerating by saying we fell in love with her and she fell in love with us. We enjoyed her and her enthusiasm and she enjoyed us. I was trying to figure out what I was going to plan for another general session at this year\u27s conference and about that time Steve Preston sent me a note saying, \u27Just got a note from Kate, and she is so excited that ACL was coming back here and she wanted to come to the conference. Was there anything she could do?\u27 Our conference theme is about expanding our boundaries in the area of information literacy, which is certainly appropriate. We are also expanding our boundaries technologically. The two things go hand and hand. So, I asked her to come join us today. I\u27m sure all of you know by now, she is the head of SOLINET. For those of you not from this part of the country, it\u27s the largest of the OCLC networks and besides all the usual stuff, they are very well known especially in this part of the country for the wonderful workshops that they put on. So Kate, tell us what\u27s going on

    Governing by internet architecture

    Get PDF
    In the past thirty years, the exponential rise in the number of Internet users around the word and the intensive use of the digital networks have brought to light crucial political issues. Internet is now the object of regulations. Namely, it is a policy domain. Yet, its own architecture represents a new regulative structure, one deeply affecting politics and everyday life. This article considers some of the main transformations of the Internet induced by privatization and militarization processes, as well as their consequences on societies and human beings.En los últimos treinta años ha crecido de manera exponencial el número de usuarios de Internet alrededor del mundo y el uso intensivo de conexiones digitales ha traído a la luz cuestiones políticas cruciales. Internet es ahora objeto de regulaciones. Es decir, es un ámbito de la política. Aún su propia arquitectura representa una nueva estructura reguladora, que afecta profundamente la política y la vida cotidiana. Este artículo considera algunas de las principales transformaciones de Internet inducida por procesos de privatización y militarización, como también sus consecuencias en las sociedades y en los seres humanos

    TOWARDS ENHANCED E-COLLABORATION IN ACADEMIA A HOLISTIC MODEL FOR DEVELOPMENT OF E-COLLABORATION SOFTWARE

    Get PDF
    Henriksson, Aron. Neculau, Andrei. 2008. Towards Enhanced E-collaboration in Academia. A Holistic Model for Development E-collaboration Software. The Royal Institute of Technology, Stockholm, Sweden. Information and Communication Technology.E-collaboration is an inherently complex activity that encompasses many factors that supplement the pivotal technical elements. This paper investigates the various aspects of e-collaboration from an academic viewpoint, and reiterates the call for a holistic approach towards e-collaboration research and development. Moreover, the use of collaboration tools by IT students is surveyed, which substantiates the belief that e-collaboration needs to be further promoted in academia. We present a conceptual model that hopefully can provide some guidance for further research on e-collaboration and development of e-collaboration suites.E-collaboration, Academia, Requirements, Boundaries, Holistic

    The Beginnings and Prospective Ending of “End-to-End”: An Evolutionary Perspective On the Internet’s Architecture

    Get PDF
    The technology of “the Internet” is not static. Although its “end-to- end” architecture has made this “connection-less” communications system readily “extensible,” and highly encouraging to innovation both in hardware and software applications, there are strong pressures for engineering changes. Some of these are wanted to support novel transport services (e.g. voice telephony, real-time video); others would address drawbacks that appeared with opening of the Internet to public and commercial traffic - e.g., the difficulties of blocking delivery of offensive content, suppressing malicious actions (e.g. “denial of service” attacks), pricing bandwidth usage to reduce congestion. The expected gains from making “improvements” in the core of the network should be weighed against the loss of the social and economic benefits that derive from the “end-to-end” architectural design. Even where technological “fixes” can be placed at the networks’ edges, the option remains to search for alternative, institutional mechanisms of governing conduct in cyberspace.

    White paper: A plan for cooperation between NASA and DARPA to establish a center for advanced architectures

    Get PDF
    Large, complex computer systems require many years of development. It is recognized that large scale systems are unlikely to be delivered in useful condition unless users are intimately involved throughout the design process. A mechanism is described that will involve users in the design of advanced computing systems and will accelerate the insertion of new systems into scientific research. This mechanism is embodied in a facility called the Center for Advanced Architectures (CAA). CAA would be a division of RIACS (Research Institute for Advanced Computer Science) and would receive its technical direction from a Scientific Advisory Board established by RIACS. The CAA described here is a possible implementation of a center envisaged in a proposed cooperation between NASA and DARPA

    The Political Nature of TCP/IP

    Get PDF
    Despite the importance of the Internet in the modern world, many users and even policy makers don’t have a necessary historical or technical grasp of the technology behind it. In the spirit of addressing this issue, this thesis attempts to shed light on the historical, political, and technical context of TCP/IP. TCP/IP is the Internet Protocol Suite, a primary piece of Internet architecture with a well-documented history. After at technical overview, detailing the main function of TCP/IP, I examine aspects of the social and developmental record of this technology using STS theoretical approaches such as Hughesian systems theory, Social Construction of Technology (SCOT), and Langdon Winner’s brand of technological determinism. Key points in TCP/IP evolution, when viewed from an STS perspective, illuminate the varied reasons behind decisions and development of the technology. For example, as detailed in this paper, both technical and political motivations were behind the architectural politics built into TCP/IP in the 1970s, and similar motivations spurred the rejection of OSI protocols by Internet developers two decades later. Armed with resultant contextual understanding of previous TCP/IP developments, a few possible directions (both political and technical) in contemporary and future Internet development are then explored, such as the slow migration to IPv6 and the meaning of network neutrality

    (at)america.jp: Identity, nationalism, and power on the Internet, 1969-2000

    Get PDF
    america.jp explores identity, nationalism, and power on the Internet between 1969 and 2000 through a cultural analysis of Internet code and the creative processes behind it. The dissertation opens with an examination of a real-time Internet Blues jam that linked Japanese and American musicians between Tokyo and Mississippi in 1999. The technological, cultural, and linguistic uncertainties that characterized the Internet jam, combined with the inventive reactions of the musicians who participated, help to introduce the fundamental conceptual question of the dissertation: is code a cultural product and if so can the Internet be considered a distinctly American technology?;A comparative study of the Internet\u27s origins in the United States and Japan finds that code is indeed a cultural entity but that it is a product not of one nation, but of many. A cultural critique of the Internet\u27s domain name conventions explores the heavily-gendered creation of code and the institutional power that supports it. An ethnography of the Internet\u27s managing organization, The Internet Corporation for Assigned Names and Numbers (ICANN), investigates conflicts and identity formation within and among nations at a time when new Internet technologies have blurred humans\u27 understanding of geographic boundaries. In the year 2000, an effort to prevent United States domination of ICANN produced unintended consequences: disputes about the definition of geographic regions and an eruption of anxiety, especially in China, that the Asian seat on the ICANN board would be dominated by Japan. These incidents indicate that the Internet simultaneously destabilizes identity and ossifies it. In this paradoxical situation, cultures and the people in them are forced to reconfigure the boundaries that circumscribe who they think they are

    The Growth of Social Media Norms and the Governments\u27 Attempts at Regulation

    Get PDF

    The role of non-state actors in regime formation: Case study on Internet governance.

    Get PDF
    Many scholars argue that the Internet is a symbol of globalization and avoidance of state control. The Internet governance negotiations, which aims to establish an international regime for the Internet, is conducted through a multi-stakeholder setting associated with extensive involvement of non-state actors. This has been viewed as an indicator for a \u27diminishing state role\u27 in international relations; particularly, formation of international regimes. This study indicates that the role of states does not diminish in regime formation. States, especially great powers, are the main actors that set international principles, norms, rules and decision-making procedures. They create regimes in order to regulate international behavior as to global sectors, including the Internet. States deliberately enable certain non-state actors to participate in regime formation and governance of some global sectors, based on conscious perception of the utility and usefulness of such participation
    corecore