1,823 research outputs found

    Hail to the thief: a tribute to Kazaa

    Get PDF
    THIS PAPER CONSIDERS THE ONGOING LITIGATION against the peer-to-peer network KaZaA. Record companies and Hollywood studios have faced jurisdictional and legal problems in suing this network for copyright infringement. As Wired Magazine observes: “The servers are in Denmark. The software is in Estonia. The domain is registered Down Under, the corporation on a tiny island in the South Pacific. The users—60 million of them—are everywhere around the world.” In frustration, copyright owners have launched copyright actions against intermediaries—like against Internet Service Providers such as Verizon. They have also embarked on filing suits against individual users of file-sharing programs. In addition, copyright owners have called for domestic- and international-law reform with respect to digital copyright. The Senate Committee on Government Affairs of the United States Congress has reviewed the controversial use of subpoenas in suits against users of file-sharing peer-to-peer networks. The United States has encouraged other countries to adopt provisions of the Digital Millennium Copyright Act 1998 in bilateral and regional free-trade agreements

    A schema-based P2P network to enable publish-subscribe for multimedia content in open hypermedia systems

    No full text
    Open Hypermedia Systems (OHS) aim to provide efficient dissemination, adaptation and integration of hyperlinked multimedia resources. Content available in Peer-to-Peer (P2P) networks could add significant value to OHS provided that challenges for efficient discovery and prompt delivery of rich and up-to-date content are successfully addressed. This paper proposes an architecture that enables the operation of OHS over a P2P overlay network of OHS servers based on semantic annotation of (a) peer OHS servers and of (b) multimedia resources that can be obtained through the link services of the OHS. The architecture provides efficient resource discovery. Semantic query-based subscriptions over this P2P network can enable access to up-to-date content, while caching at certain peers enables prompt delivery of multimedia content. Advanced query resolution techniques are employed to match different parts of subscription queries (subqueries). These subscriptions can be shared among different interested peers, thus increasing the efficiency of multimedia content dissemination

    Caring About the Plumbing: On the Importance of Architectures in Social Studies of (Peer-to-Peer) Technology

    No full text
    International audienceThis article discusses the relevance, for scholars working on social studies of network media, of "caring about the plumbing" (to paraphrase Bricklin, 2001), i.e., addressing elements of application architecture and design as an integral part of their subject of study. In particular, by discussing peer-to-peer (P2P) systems as a technical networking model and a dynamic of social interaction that are inextricably intertwined, the article introduces how the perspective outlined above is particularly useful to adopt when studying a promising area of innovation: that of "alternative" or "legitimate" (Verma, 2004) applications of P2P networks to search engines, social networks, video streaming and other Internet-based services. The article seeks to show how the Internet's current trajectories of innovation increasingly suggest that particular forms of architectural distribution and decentralization (or their lack), impact specific procedures, practices and uses. Architectures should be understood an "alternative way of influencing economic systems" (van Schewick, 2010), indeed, the very fabric of user behavior and interaction. Most notably, the P2P "alternative" to Internet-based services shows how the status of every Internet user as a consumer, a sharer, a producer and possibly a manager of digital content is informed by, and shapes in return, the technical structure and organization of the services (s)he has access to: their mandatory passage points, places of storage and trade, required intersections. In conclusion, this article is a call to study the technical architecture of networking applications as a "relational property" (Star & Ruhleder, 1996), and integral part of human organization. It suggests that such an approach provides an added value to the study of those communities, groups and practices that, by leveraging socio-technical dynamics of distribution, decentralization, collaboration and peer production, are currently questioning more traditional or institutionalized models of content creation, search and sharing

    The political imaginaries of blockchain projects: discerning the expressions of an emerging ecosystem

    Get PDF
    There is a wealth of information, hype around, and research into blockchain’s ‘disruptive’ and ‘transformative’ potential concerning every industry. However, there is an absence of scholarly attention given to identifying and analyzing the political premises and consequences of blockchain projects. Through digital ethnography and participatory action research, this article shows how blockchain experiments personify ‘prefigurative politics’ by design: they embody the politics and power structures which they want to enable in society. By showing how these prefigurative embodiments are informed and determined by the underlying political imaginaries, the article proposes a basic typology of blockchain projects. Furthermore, it outlines a frame to question, cluster, and analyze the expressions of political imaginaries intrinsic to the design and operationalization of blockchain projects on three analytic levels: users, intermediaries, and institutions.</p

    Practices of Using Blockchain Technology in ICT under the Digitalization of the World Economy

    Get PDF
    Abstract. Pursuing the purpose of effective functioning in today's conditions, the business is forced to transform rapidly, to modernize at all levels. The world is changing, erasing the limits of its certainty. Companies need quality transformations and strategies that are effective in the face of rapid change towards "deep" digitization. Massive corporate management systems increasingly need the flexibility to keep pace with change. And companies with an innovative culture are more in need of creative tasks than implementing detailed regulations. In the post-industrial time of digital economy, issues related to the development of the information sphere, the media and communications, the usage of modern information systems to develop the economy and stabilize social development as a whole, come first. The basic principles of practical application of Blockchain are investigated in the work. The stages of development of Blockchain technology, the stages of development of Blockchain technologies by time, the application of distributed registry technology in Blockchain applications, the principles of construction and operation of Blockchain have been specified. The benefits of using NEM for business are substantiated and the components of Proxima X technology, protocols and service layers, on-line and off-line protocols, decentralized applications are exposed

    The Competition for Shortest Paths on Sparse Graphs

    Get PDF
    Optimal paths connecting randomly selected network nodes and fixed routers are studied analytically in the presence of non-linear overlap cost that penalizes congestion. Routing becomes increasingly more difficult as the number of selected nodes increases and exhibits ergodicity breaking in the case of multiple routers. A distributed linearly-scalable routing algorithm is devised. The ground state of such systems reveals non-monotonic complex behaviors in both average path-length and algorithmic convergence, depending on the network topology, and densities of communicating nodes and routers.Comment: 4 pages, 4 figure

    The Social Influence Model of Technology Adoption

    Get PDF
    Human innovation, in combination with the internet, networking, and communications technologies have produced a new platform for social and business networking, formation of community, and communication. This emerging phenomenon is generally known as social computing. While there is no widely accepted definition of social computing, we define it as: intra -group social and business actions practiced through group consensus, group cooperation, and group authority, where such actions are made possible through the mediation of information technologies, and where group interaction causes members to conform and influences others to join the group

    Reading Intellectual Property Reform Through the Lens of Constitutional Equality

    Get PDF
    Reviewing Bill D. Herman, The Fight Over Digital Rights: The Politics of Copyright and Technology; Aram Sinnreich, The Piracy Crusade: How the Music Industry’s War on Sharing Destroys Markets and Erodes Civil Liberties; and Robert Spoo, Without Copyrights: Piracy, Publishing, and the Public Domain

    Cr/Hacking the (Gendered) System: Breaking Down Barriers to Women’s Empowerment in STEM: A Manifesto

    Get PDF
    This manifesto re-envisions Alice Rossi’s (1964) “immodest proposal” to reignite the spark of suffrage and connect it to a revolution that breaks down the barriers to women’s empowerment in STEM-related careers. This is a decisive moment in time and transformation is within reach because there are two generations of women and minorities working in STEM-related fields, and the technology culture is changing the image of the hacker from the lone male to collaborating women. My goal is to motivate these cr/hackers to push beyond pipeline initiatives, and acknowledge that we are also a powerful institution. We will revolutionize STEM culture using three strategies: iNfIl7R@ti0n, dI$rUp7i0N, and eNG@G3Ment
    corecore