1,823 research outputs found
Hail to the thief: a tribute to Kazaa
THIS PAPER CONSIDERS THE ONGOING LITIGATION against the peer-to-peer network KaZaA. Record
companies and Hollywood studios have faced jurisdictional and legal problems in suing this network
for copyright infringement. As Wired Magazine observes: “The servers are in Denmark. The software
is in Estonia. The domain is registered Down Under, the corporation on a tiny island in the South Pacific.
The users—60 million of them—are everywhere around the world.” In frustration, copyright owners
have launched copyright actions against intermediaries—like against Internet Service Providers such as
Verizon. They have also embarked on filing suits against individual users of file-sharing programs. In
addition, copyright owners have called for domestic- and international-law reform with respect to digital
copyright. The Senate Committee on Government Affairs of the United States Congress has
reviewed the controversial use of subpoenas in suits against users of file-sharing peer-to-peer networks.
The United States has encouraged other countries to adopt provisions of the Digital Millennium
Copyright Act 1998 in bilateral and regional free-trade agreements
A schema-based P2P network to enable publish-subscribe for multimedia content in open hypermedia systems
Open Hypermedia Systems (OHS) aim to provide efficient dissemination, adaptation and integration of hyperlinked multimedia resources. Content available in Peer-to-Peer (P2P) networks could add significant value to OHS provided that challenges for efficient discovery and prompt delivery of rich and up-to-date content are successfully addressed. This paper proposes an architecture that enables the operation of OHS over a P2P overlay network of OHS servers based on semantic annotation of (a) peer OHS servers and of (b) multimedia resources that can be obtained through the link services of the OHS. The architecture provides efficient resource discovery. Semantic query-based subscriptions over this P2P network can enable access to up-to-date content, while caching at certain peers enables prompt delivery of multimedia content. Advanced query resolution techniques are employed to match different parts of subscription queries (subqueries). These subscriptions can be shared among different interested peers, thus increasing the efficiency of multimedia content dissemination
Caring About the Plumbing: On the Importance of Architectures in Social Studies of (Peer-to-Peer) Technology
International audienceThis article discusses the relevance, for scholars working on social studies of network media, of "caring about the plumbing" (to paraphrase Bricklin, 2001), i.e., addressing elements of application architecture and design as an integral part of their subject of study. In particular, by discussing peer-to-peer (P2P) systems as a technical networking model and a dynamic of social interaction that are inextricably intertwined, the article introduces how the perspective outlined above is particularly useful to adopt when studying a promising area of innovation: that of "alternative" or "legitimate" (Verma, 2004) applications of P2P networks to search engines, social networks, video streaming and other Internet-based services. The article seeks to show how the Internet's current trajectories of innovation increasingly suggest that particular forms of architectural distribution and decentralization (or their lack), impact specific procedures, practices and uses. Architectures should be understood an "alternative way of influencing economic systems" (van Schewick, 2010), indeed, the very fabric of user behavior and interaction. Most notably, the P2P "alternative" to Internet-based services shows how the status of every Internet user as a consumer, a sharer, a producer and possibly a manager of digital content is informed by, and shapes in return, the technical structure and organization of the services (s)he has access to: their mandatory passage points, places of storage and trade, required intersections. In conclusion, this article is a call to study the technical architecture of networking applications as a "relational property" (Star & Ruhleder, 1996), and integral part of human organization. It suggests that such an approach provides an added value to the study of those communities, groups and practices that, by leveraging socio-technical dynamics of distribution, decentralization, collaboration and peer production, are currently questioning more traditional or institutionalized models of content creation, search and sharing
The political imaginaries of blockchain projects: discerning the expressions of an emerging ecosystem
There is a wealth of information, hype around, and research into blockchain’s ‘disruptive’ and ‘transformative’ potential concerning every industry. However, there is an absence of scholarly attention given to identifying and analyzing the political premises and consequences of blockchain projects. Through digital ethnography and participatory action research, this article shows how blockchain experiments personify ‘prefigurative politics’ by design: they embody the politics and power structures which they want to enable in society. By showing how these prefigurative embodiments are informed and determined by the underlying political imaginaries, the article proposes a basic typology of blockchain projects. Furthermore, it outlines a frame to question, cluster, and analyze the expressions of political imaginaries intrinsic to the design and operationalization of blockchain projects on three analytic levels: users, intermediaries, and institutions.</p
Practices of Using Blockchain Technology in ICT under the Digitalization of the World Economy
Abstract. Pursuing the purpose of effective functioning in today's conditions, the business is forced to transform rapidly, to modernize at all levels. The world
is changing, erasing the limits of its certainty. Companies need quality transformations and strategies that are effective in the face of rapid change towards
"deep" digitization. Massive corporate management systems increasingly need the flexibility to keep pace with change. And companies with an innovative culture
are more in need of creative tasks than implementing detailed regulations.
In the post-industrial time of digital economy, issues related to the development
of the information sphere, the media and communications, the usage of modern
information systems to develop the economy and stabilize social development
as a whole, come first. The basic principles of practical application of Blockchain
are investigated in the work. The stages of development of Blockchain
technology, the stages of development of Blockchain technologies by time, the
application of distributed registry technology in Blockchain applications, the
principles of construction and operation of Blockchain have been specified. The
benefits of using NEM for business are substantiated and the components of
Proxima X technology, protocols and service layers, on-line and off-line protocols,
decentralized applications are exposed
The Competition for Shortest Paths on Sparse Graphs
Optimal paths connecting randomly selected network nodes and fixed routers
are studied analytically in the presence of non-linear overlap cost that
penalizes congestion. Routing becomes increasingly more difficult as the number
of selected nodes increases and exhibits ergodicity breaking in the case of
multiple routers. A distributed linearly-scalable routing algorithm is devised.
The ground state of such systems reveals non-monotonic complex behaviors in
both average path-length and algorithmic convergence, depending on the network
topology, and densities of communicating nodes and routers.Comment: 4 pages, 4 figure
The Social Influence Model of Technology Adoption
Human innovation, in combination with the internet, networking, and communications technologies have produced a new platform for social and business networking, formation of community, and communication. This emerging phenomenon is generally known as social computing. While there is no widely accepted definition of social computing, we define it as: intra -group social and business actions practiced through group consensus, group cooperation, and group authority, where such actions are made possible through the mediation of information technologies, and where group interaction causes members to conform and influences others to join the group
Reading Intellectual Property Reform Through the Lens of Constitutional Equality
Reviewing Bill D. Herman, The Fight Over Digital Rights: The Politics of Copyright and Technology; Aram Sinnreich, The Piracy Crusade: How the Music Industry’s War on Sharing Destroys Markets and Erodes Civil Liberties; and Robert Spoo, Without Copyrights: Piracy, Publishing, and the Public Domain
Cr/Hacking the (Gendered) System: Breaking Down Barriers to Women’s Empowerment in STEM: A Manifesto
This manifesto re-envisions Alice Rossi’s (1964) “immodest proposal” to reignite the spark of suffrage and connect it to a revolution that breaks down the barriers to women’s empowerment in STEM-related careers. This is a decisive moment in time and transformation is within reach because there are two generations of women and minorities working in STEM-related fields, and the technology culture is changing the image of the hacker from the lone male to collaborating women. My goal is to motivate these cr/hackers to push beyond pipeline initiatives, and acknowledge that we are also a powerful institution. We will revolutionize STEM culture using three strategies: iNfIl7R@ti0n, dI$rUp7i0N, and eNG@G3Ment
- …