| |
compos mentis. Concision. Media. Clarity. Memes. Context. Melange. Confluence. Mishmash. Conflation. Mellifluous. Conviviality. Miscellany. Confelicity. Milieu. Cogent. Minty. Concoction. |
|
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment [PDF] |
|
|
Topic: Intellectual Property |
12:23 am EDT, May 14, 2003 |
Abstract: The entertainment industry, facing a formidable threat from peer-to-peer piracy networks, is exploring every possible means to attack these networks. The industry is also employing defensive strategies to protect media and media players from those who would extract and copy their content. These content protection systems depend on the computer industrys newly announced trusted computing technologies. While "trusted computing" technologies may better protect media and media players from content extraction by pirates, we assert that the very same technologies can be employed to better protect pirates and their peer-to-peer distribution networks from the entertainment industry. Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment [PDF] |
|
Reputation in P2P Anonymity Systems [PDF] |
|
|
Topic: Technology |
6:20 pm EDT, May 3, 2003 |
Decentralized anonymity systems tend to be unreliable, because users must choose paths through the network without knowing the entire state of the network. Reputation systems can improve reliability by predicting the state of the network. In this paper we focus on anonymous remailers and anonymous publishing, explain why the systems can benefit from reputation, and describe our experiences designing reputation systems for them while still ensuring anonymity. We find that in each example we first must redesign the underlying anonymity system to support verifiable transactions. Reputation in P2P Anonymity Systems [PDF] |
|
Topic: Software Development |
11:08 am EDT, Apr 20, 2003 |
We propose a trade group of social software developers and other interested parties who work together to create and promote open standards for the social software community. Social software blends tools and modes for richer online social environments and experiences. Some examples of social software are weblogs, wikis, forums, chat environments, or instant messaging, and related tools and data structures for identity, integration, interchange and analysis. Social software is a dynamic and constantly evolving environment, rich with possibilities to create better connections between people. With a growing number of active developers, we need a central nexus to help drive the process of coordination and interoperability between different developers' products. Founding members include Ross Mayfield, Clay Shirky, and David Weinberger. Howard Rheingold also participated in the most recent Happening. Social Software Alliance |
|
DRM {and, or, vs.} the Law |
|
|
Topic: Intellectual Property |
7:39 pm EDT, Apr 19, 2003 |
Though mandates for ubiquitous DRM are unlikely to be legislated soon, the threat of DRM mandates should be taken seriously. The main purpose of DRM is not to prevent copyright infringement but to change consumer expectations about what they are entitled to do with digital content. The DMCA impedes the progress of science, is economically unjustifiable, and lacks the balance the Constitution requires of intellectual property legislation. Pamela Samuelson of UC Berkeley writes about DRM in the April 2003 issue of Communications of the ACM. She has made the article freely available from her web site; no subscription is required. Note: the linked document has no DRM :) DRM {and, or, vs.} the Law |
|
Topic: Technology |
11:00 pm EDT, Apr 16, 2003 |
Katie Hafner writes about "Net evaders" -- people who steer clear of the Internet and its services despite being in close proximity to connected computers and other avid Internet users. The article is based on survey research by the Pew Trust. As a bit of a "cellular evader" myself, I would submit that this phenomenon is not specific to the Internet. Eluding the Web's Snare |
|
Defending Against an Internet-based Attack on the Physical World [PDF] |
|
|
Topic: Computer Security |
6:39 am EDT, Apr 16, 2003 |
We discuss the dangers that scalable Internet functionality may present to the real world, focusing on a simple yet impactful attack that we believe may occur quite soon. We offer and critique various solutions to this class of attack and hope to provide a warning to the Internet community of what is currently possible. The attack is, to some degree, a consequence of the availability of private information on the Web, and the increase in the amount of personal information that users must reveal to obtain Web services. Avi Rubin's latest effort; this paper is profiled in today's NYT. Defending Against an Internet-based Attack on the Physical World [PDF] |
|
Unweaving the Web: Deception and Adaptation in Future Urban Operations | RAND |
|
|
Topic: Military Technology |
12:38 am EDT, Apr 15, 2003 |
Deception is a powerful yet understudied instrument of war. Using the extensive literature on deception in the animal kingdom, where ruses of near-infinite variety are applied to offense, defense, and intelligence gathering, the authors delve into the theory of deception to reveal new avenues of experimentation. These pathways may lead to new technologies or training techniques and provoke a new look at deception doctrine applicable at every level of war. Unweaving the Web: Deception and Adaptation in Future Urban Operations | RAND |
|
A Social Network Caught in the Web [PDF] |
|
|
Topic: Technology |
3:24 pm EDT, Apr 12, 2003 |
We present an analysis of Club Nexus, an online community at Stanford University. Through the Nexus site we were able to study a reflection of the real world community structure within the student body. We observed and measured social network phenomena such as the small world effect, clustering, and the strength of weak ties. Using the rich profile data provided by the users we were able to deduce the attributes contributing to the formation of friendships, and to determine how the similarity of users decays as the distance between them in the network increases. This research is a collaboration between HP Labs and Google. It will appear in a future issue of First Monday. A Social Network Caught in the Web [PDF] |
|
NYT Archive Policy Gets More Aggressive |
|
|
Topic: Intellectual Property |
2:52 pm EDT, Apr 12, 2003 |
Try to visit this URL for an NYT article by Amy Harmon entitled, "More Than Just a Game, But How Close to Reality?" It's from April 3, 2003 -- only nine days ago, and yet NYT has already moved the article into its pay-per-view archive. Lame. Even articles from April 4 have already been moved to the archive. NYT Archive Policy Gets More Aggressive |
|
Topic: Business |
1:54 am EDT, Apr 12, 2003 |
"There were about 20 people in the room, and each one of us had to introduce ourselves and talk about our most recent position. There was a cashier from McDonald's, a woman who had worked at Baby Gap, a ticket collector from Loews, a gift wrapper from Barnes & Noble. Then it came to me. I said I used to be an executive vice president and a director of interactive marketing for Rapp Digital, a digital media company with 300 employees and a P. and L. of $40 million." Commute to Nowhere |
|