62,900 research outputs found

    Clustering in ICT: From Route 128 to Silicon Valley, from DEC to Google, from Hardware to Content

    Get PDF
    One of the pioneers in academic entrepreneurship and high-tech clustering is MIT and the Route 128/Boston region. Silicon Valley centered around Stanford University was originally a fast follower and only later emerged as a scientific and industrial hotspot. Several technology and innovation waves, have shaped Silicon Valley over all the years. The initial regional success of Silicon Valley started with electro-technical instruments and defense applications in the 1940s and 1950s (represented by companies as Litton Engineering and Hewlett & Packard). In the 1960s and 1970s, the region became a national and international leader in the design and production of integrated circuit and computer chips, and as such became identified as Silicon Valley (e.g. Fairchild Semiconductor, and Intel). In the 1970s and 1980s, Silicon Valley capitalised further on the development, manufacturing and sales of the personal computer and workstations (e.g. Apple, Silicon Graphics and SUN), followed by the proliferation of telecommunications and Internet technologies in the 1990s (e.g. Cisco, 3Com) and Internet-based applications and info-mediation services (e.g. Yahoo, Google) in the late 1990s and early 2000s. When the external and/or internal conditions of its key industries change, Silicon Valley seemed to have an innate capability to restructure itself by a rapid and frequent reshuffling of people, competencies, resources and firms. To characterise the demise of one firm leading, directly or indirectly, to the formation of another and the reconfiguration of business models and product offerings by the larger companies in emerging industries, Bahrami & Evans (2000) introduced the term `flexible recycling.ñ€ℱ This dynamic process of learning by doing, failing and recombining (i.e. allowing new firms to rise from the ashes of failed enterprises) is one of the key factors underlying the dominance of Silicon Valley in the new economy.ICT;Clusters;Networks;Academic entrepreneurship;MIT;Silicon Valley;Stanford University;Flexible recycling;Route 128

    The ISIS Project: Real Experience with a Fault Tolerant Programming System

    Get PDF
    The ISIS project has developed a distributed programming toolkit and a collection of higher level applications based on these tools. ISIS is now in use at more than 300 locations world-wise. The lessons (and surprises) gained from this experience with the real world are discussed

    Web Tracking: Mechanisms, Implications, and Defenses

    Get PDF
    This articles surveys the existing literature on the methods currently used by web services to track the user online as well as their purposes, implications, and possible user's defenses. A significant majority of reviewed articles and web resources are from years 2012-2014. Privacy seems to be the Achilles' heel of today's web. Web services make continuous efforts to obtain as much information as they can about the things we search, the sites we visit, the people with who we contact, and the products we buy. Tracking is usually performed for commercial purposes. We present 5 main groups of methods used for user tracking, which are based on sessions, client storage, client cache, fingerprinting, or yet other approaches. A special focus is placed on mechanisms that use web caches, operational caches, and fingerprinting, as they are usually very rich in terms of using various creative methodologies. We also show how the users can be identified on the web and associated with their real names, e-mail addresses, phone numbers, or even street addresses. We show why tracking is being used and its possible implications for the users (price discrimination, assessing financial credibility, determining insurance coverage, government surveillance, and identity theft). For each of the tracking methods, we present possible defenses. Apart from describing the methods and tools used for keeping the personal data away from being tracked, we also present several tools that were used for research purposes - their main goal is to discover how and by which entity the users are being tracked on their desktop computers or smartphones, provide this information to the users, and visualize it in an accessible and easy to follow way. Finally, we present the currently proposed future approaches to track the user and show that they can potentially pose significant threats to the users' privacy.Comment: 29 pages, 212 reference
    • 

    corecore