17.01.2015 Views

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

156<br />

Solutions<br />

cessing un<strong>it</strong>, screen, and network connection—a rediscovery <strong>of</strong> <strong>the</strong> hobbyist<br />

PC and <strong>it</strong>s own modularization that made <strong>it</strong> better and cheaper than <strong>it</strong>s appliancized<br />

counterparts.<br />

There could be a spectrum <strong>of</strong> virtual PCs on one un<strong>it</strong>, one for each member<br />

<strong>of</strong> <strong>the</strong> family. Already, most consumer operating systems enable separate login<br />

names w<strong>it</strong>h cus<strong>to</strong>mized desk<strong>to</strong>p wallpaper and e-mail accounts for each user. 2<br />

If <strong>the</strong> divide were developed fur<strong>the</strong>r, a parent could confidently give her twelveyear-old<br />

access <strong>to</strong> <strong>the</strong> machine under her own account and know that nothing<br />

that <strong>the</strong> child could do—short <strong>of</strong> hurling <strong>the</strong> machine out <strong>the</strong> window—<br />

would hurt <strong>the</strong> data found w<strong>it</strong>hin <strong>the</strong> o<strong>the</strong>r virtual PCs. 3 (To be sure, this does<br />

not solve problems at <strong>the</strong> social layer—<strong>of</strong> what activ<strong>it</strong>ies children may undertake<br />

<strong>to</strong> <strong>the</strong>ir detriment once online.)<br />

Easy reversion, coupled w<strong>it</strong>h virtual PCs, seeks <strong>to</strong> balance <strong>the</strong> experimentalist<br />

spir<strong>it</strong> <strong>of</strong> <strong>the</strong> early <strong>Internet</strong> w<strong>it</strong>h <strong>the</strong> fact that <strong>the</strong>re are now important uses for<br />

those PCs that we do not want <strong>to</strong> disrupt. Still, this is not a complete solution.<br />

The Red PC, desp<strong>it</strong>e <strong>it</strong>s experimental purpose, might end up accumulating<br />

data that <strong>the</strong> user wants <strong>to</strong> keep, occasioning <strong>the</strong> need for what <strong>Internet</strong> arch<strong>it</strong>ect<br />

David Clark calls a “checkpoint Charlie” <strong>to</strong> move sens<strong>it</strong>ive data from Red<br />

<strong>to</strong> Green w<strong>it</strong>hout also carrying a virus or anything else undesirable that could<br />

hurt <strong>the</strong> Green PC. 4 There is also <strong>the</strong> question <strong>of</strong> what s<strong>of</strong>tware can be deemed<br />

safe for Green—which is just ano<strong>the</strong>r version <strong>of</strong> <strong>the</strong> question <strong>of</strong> what s<strong>of</strong>tware<br />

<strong>to</strong> run on <strong>to</strong>day’s single-ident<strong>it</strong>y PCs. If users could competently decide what<br />

should go on Red and what on Green, <strong>the</strong>n <strong>the</strong>y could competently decide<br />

what <strong>to</strong> run on <strong>to</strong>day’s simpler machines, partially obviating <strong>the</strong> need for <strong>the</strong><br />

virtual PC solution in <strong>the</strong> first place.<br />

Worse, an infected Red PC still might be capable <strong>of</strong> hurting o<strong>the</strong>r PCs across<br />

<strong>the</strong> network, by sending spam or viruses, or by becoming a zombie PC controlled<br />

from afar for any number <strong>of</strong> o<strong>the</strong>r bad purposes. Virtualization technology<br />

eases some <strong>of</strong> <strong>the</strong> sting <strong>to</strong> users <strong>of</strong> an experimental platform whose<br />

experiments sometimes go awry, but <strong>it</strong> does not do much <strong>to</strong> reduce <strong>the</strong> burdens—negative<br />

external<strong>it</strong>ies—that such failures can place on everyone else.<br />

Most fundamentally, many <strong>of</strong> <strong>the</strong> benef<strong>it</strong>s <strong>of</strong> generativ<strong>it</strong>y come precisely<br />

thanks <strong>to</strong> an absence <strong>of</strong> walls. We want our e-mail programs <strong>to</strong> have access <strong>to</strong><br />

any document on our hard drive, so that we can attach <strong>it</strong> <strong>to</strong> an e-mail and send<br />

<strong>it</strong> <strong>to</strong> a friend. We want <strong>to</strong> ed<strong>it</strong> music downloaded from a Web s<strong>it</strong>e w<strong>it</strong>h an audio<br />

mixing program and <strong>the</strong>n incorporate <strong>it</strong> in<strong>to</strong> a presentation. We want <strong>to</strong> export<br />

data from one desk<strong>to</strong>p calendar application <strong>to</strong> a new one that we might<br />

like better. The list goes on, and each <strong>of</strong> <strong>the</strong>se operations requires <strong>the</strong> abil<strong>it</strong>y <strong>to</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!