I have learned many things in this course. Today I recycled all of my notes except for one page on which I condensed the things I wanted to take away with me. I will now list those here.
MOVIES TO SEE:
- Who killed the electric car?
- Quiz Show
- Battle Royale
- High Fidelity
- Control Room
BOOKS TO READ:
- The City of God
- Plato’s Republic
- Pirates Dilemma
WEBSITES TO VISIT:
- Malcom Gladwel’s Blog
- Stuff White People Like
- Lynchpin: the main point (it pins two things)
- Swansong: the most important and final act (or piece of work) a person completes
- The Forbidden Experiment: raising a child without language
TV SHOW TO WATCH: Tosh.O
SONG TO LISTEN TO: California by The Dead Kennedy’s
INTERESTING THING: Green College Residence at UBC
Thanks for a fun and interesting semester! I can now be found at my new blog : )
It is not unprecedented for trends to emerge in the span of world history. The copious system of peer-to-peer online file sharing is no different and has its own span of repeated evolution. The 1999 demise of the first site to popularize peer-to-peer sharing technology, Napster, is a memorable moment in tech history (Gowan, 2002). Napster was sued by the recording industry and subsequently changed the way it operated to appease the plaintiff. In 2009 the situation repeated itself only with popular BitTorrent site The Pirate Bay as the accused (Raphael, 2009). Both of these publicized trials have failed to cease online sharing and have forced P2P technology to shift and adapt to new regulations. At present the NDP is trying to pass a new Canadian levy on the sale of each iPod, similar to the levy currently present on CD’s and cassettes (Ditchburn, 2010). As legal trials progress, laws change and adapt to appease corporate officers. There is a vicious cycle of evolving technology, followed by copyright lawsuits, followed by new taxes, which has continued to repeat (note: the word followed is used loosely here, the actual order of these events is debatable). The question now is what form the next technological evolution will take.
Another emerging technology, darknets, offers a limited and closed network which also attempts to keep the authorities in the dark about which files and shared and to whom. Similarly, OneSwarm addresses the issue of preserving privacy. According to their website, “OneSwarm uses source address rewriting to protect user privacy. Instead of always transmitting data directly from sender to receiver (immediately identifying both), OneSwarm may forward data through multiple intermedaries, obscuring the identity of both sender and receiver.” (OneSwarm, n.d.). These applications promote limited “friend-to-friend” networks instead of the current standard “peer-to-peer” network. These services limit users. They force people to ask themselves if they are friends with the right people (or the people who give them what they want). Has the term “friend” not suffered enough because of facebook’s degradation? As an alternative solution, services like The Pirate Bay’s IPREDator (Ricknäs, 2009) allow users to be even more anonymous than before, preventing tracking of downloads by authoritative agencies. The key issue is privacy concerning piracy. Whatever the next widespread file sharing protocol is, it will have to address this problem.
2015: The First Milestone
In the past file sharing milestones have been marked by expensive lawsuits. 2015 will be no different. It will be remembered by future generations as the year encrypted file sharing was attacked. This new file sharing system will gain popularity and then the film and recording industries will look for ways to take it down. This system will employ encryption technology and will not keep any records of user information (for example ip addresses or logs of shared files). File sharing will occur on a separate and specific channel of Internet usage that will be virtually untraceable. This untraceable approach protects users but leaves the creators and distributors “free” to take the fall. The courts will rule in favor of the recording industry at first but this decision will be appealed and more legal wars will commence. As a result the government will begin working on an “Internet levy”. This fee will be charged along with regular Internet fees and proceeds will filter to the recording industry corporations.
2020: The Second Milestone
The government proposed Internet levy will spark major debates and discussions about freedom of information and record keeping. Certain groups will lobby towards having virtual audits concerning the web information one views and downloads throughout any given year. At first few politicians will support this movement but as it grows political and personal debates will spark. Bloggers will blame pirates (somewhat hypocritically) for the controversy. Untraceable file sharing will continue but users are forced to rethink virus protection. Untraceable files mean less reviews, making quality of content harder to gage. File integrity will also be harder to convey (how can a user be sure a file is what it is labeled as?).
2029: The Final Destination?
In 2029 P2P file sharing will spread even further. A new application called “peer-to-pod” will allow users to download files directly using their portable WiFi-enabled ipod and iphone style devices. The technology will be widespread in use and because of the encryption revolution of 2015, it will continue to be untraceable. The pirates will continue to spread viral content and the authorities will keep trying to shut them down, as is the cycle of life.
Ditchburn, J. (2010, March 17). Conservatives launch protest against proposed iPod levy. The Canadian Press. Retrieved from: http://www.ctvbc.ctv.ca/servlet/an/local/CTVNews/20100317/bc_ipod_conservatives_levy_100317/20100317?hub=BritishColumbia
Gowan, M. (2002, May 17). Requiem for napster. PCWorld.com. Retrieved from: http://www.pcworld.com/article/100004/requiem_for_napster.html?tk=rel_news?tk=rel_news
OneSawrm. (n.d.). OneSwarm: Privacy preserving P2P (Overview). Retrieved from: http://oneswarm.cs.washington.edu/index.html#overview
Parrack, D. (2009. March 6). Are darknets the future of online file-sharing. Tech.Blorge. Retrieved from: http://tech.blorge.com/Structure:%20/2009/03/06/are-darknets-the-future-of-online-file-sharing/
Raphael, J. (2009, April 7). The pirate bay verdict and the future of file sharing. PCWorld.com. Retrieved from: http://www.pcworld.com/article/163339/the_pirate_bay_verdict_and_the_future_of_file_sharing.html
Ricknäs, M. (2009, March 24). Pirate bay founders to launch new service. PCWorld.com. Retrieved from: http://www.pcworld.com/article/161859/pirate_bay_founders_to_launch_new_service.html?tk=rel_news
If Arthur C. Clarke had facebook…
The Arthur C. Clarke Foundation. (2008). Biography. Retrieved from: http://www.clarkefoundation.org
FantasticFiction. (2010). Arthur C Clarke. Retrieved from: http://www.fantasticfiction.co.uk/c/arthur-c-clarke/
Moncur, M. (2007). Quotations by author. Retrieved from: http://www.quotationspage.com/quotes/Arthur_C._Clarke/
Today we were talking about what would happen if the internet went down. This is a similar project focusing on oil. They created an alternate reality game to predict what would happen without oil.
This is a really unique new free application : )
“Auto Smiley is a computer vision application that runs in the background while you work. The software analyzes your face while you are working and if it detects a smile it sends the the ascii smiley face letters “: )” as keyboard presses to the front most application.”
For our group project we decided to look at the Student Learning Commons in the Surrey library. Out of the 4 unique qualities of mediated publics we chose to look at the replicability of information in the room. Replicability in the internet is traditionally the concept of copying information from one place and transporting it to another place. This poses problems for several reasons. One, the information is no longer privatly owned and is available to the general public. Secondly, information can be modified by the person transmitting it. Personal bais can shape the context and meaning of information making it drastically diferent from the original.
People choose to come to this space to learn writing stratigies and to get help from TAs. There are designated places to work on projects, show slides and write. We also noticed that by the windows there is confortable seatting so that studenst can relax. While we were observing the environment we noticed several things: it is a calm place that tends to be on the quiet side. It is tailored to small group working environments and one-to-one tutoring services. The layout is open so that everyone’s actions can be seen and privacy is limited.
Information in this room can be either passed by word of mouth and or handouts. For example, let’s say Sally came to the SLC to improve her writing skills. While here, she talks to several people who pass on to her techniques that would improve her writing style. After this experience she feels overly confident and decides to tell several of her friends the new writing rules she learned in hopes that she can help them. However since she did not have a hard copy of the information, she warps it and changes the meaning of a few of the rules. This scenario is similar to information posted online. A quote or fact can be changed to meet personal needs once it is put on the internet.
In order to fully explore the historical framework of file sharing it must be established that P2P file sharing serves a specific role in modern society. It allows us to quickly and easily spread information and entertainment. It could be classified as a “many to many” technology as users can easily interact with other users. Modern P2P networks have only existed for a short time in the span of world history. Before file sharing there were other technologies which allowed for the spread of knowledge and media. These forms of communication surfaced in the pre-industrial, industrial and post-industrial eras.