17.01.2015 Views

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Index 335<br />

compared <strong>to</strong>, 73–76; lim<strong>it</strong>ations <strong>of</strong>,<br />

177; and network neutral<strong>it</strong>y, 178–85;<br />

PCs as, 4, 59–61, 102, 185–88; PCs<br />

vs., 18, 29, 57–59; and perfect enforcement,<br />

161; and privacy, 185–88;<br />

regula<strong>to</strong>ry interventions in, 103–7,<br />

125, 197; remote control <strong>of</strong>, 161; remote<br />

updates <strong>of</strong>, 106–7, 176; secur<strong>it</strong>y<br />

dilemma <strong>of</strong>, 42, 106–7, 123–24, 150,<br />

176–88; specific injunction, 108–9;<br />

variety <strong>of</strong> designs for, 20; Web 2.0 and,<br />

102; See also specific information appliances<br />

information overload, 230<br />

information services, early forms, 9<br />

InnoCentive, 246<br />

innovation: blending models for, 86–90;<br />

generativ<strong>it</strong>y as parent <strong>of</strong>, 80–84, 90;<br />

group, 94; and idiosyncrasy, 90–91;<br />

inertia vs., 83–84; “sustaining” vs.<br />

“disruptive,” 83–84, 87, 97<br />

intellectual property: and code thickets,<br />

188–92; and contraband rules, 103–<br />

4; cross-licensing <strong>of</strong>, 190; fair use defense,<br />

115, 121–22; illegal online file<br />

sharing, 111–12, 197; inadequate protection<br />

for, 217; licensing <strong>of</strong>, 79; and<br />

patent thicket, 190–92; principle <strong>of</strong><br />

<strong>to</strong>lerated uses, 119–22, 190–91; and<br />

privacy law, 210; statutes <strong>of</strong> lim<strong>it</strong>ations,<br />

191; value <strong>of</strong>, 98. See also cyberlaw<br />

Interface Message Processors (IMPs), 27<br />

<strong>Internet</strong>: application layer, 67–69; assumption<br />

<strong>of</strong> equal<strong>it</strong>y in, 33–34; assumptions<br />

<strong>of</strong> user trustworthiness, 20–<br />

21, 30–32, 130, 227; as “best efforts”<br />

network, 33; browsers, 121; bundled<br />

proprietary model defeated by, 30;<br />

channels <strong>of</strong> communication and control<br />

in, 42; collaboration in design <strong>of</strong>,<br />

34; competi<strong>to</strong>rs, 9; connectiv<strong>it</strong>y <strong>of</strong>, 32;<br />

consumer applications <strong>of</strong>, 28; content<br />

layer <strong>of</strong>, 67; design <strong>of</strong>, 27–28, 30–35,<br />

41, 130, 243; economic value as a<br />

commons, 79, 85; entrance <strong>of</strong>, 26–30;<br />

expansion and growth <strong>of</strong>, 43, 102; first<br />

message on, 27; flexibil<strong>it</strong>y vs. secur<strong>it</strong>y<br />

<strong>of</strong>, 9, 40, 42–43; generative technology<br />

<strong>of</strong>, 3, 5, 8, 34, 72, 152, 178, 242;<br />

goodwill subsidy assumed, 9; hourglass<br />

arch<strong>it</strong>ecture <strong>of</strong>, 67–69; and market<br />

forces, 20–21; modular<strong>it</strong>y <strong>of</strong>, 41; motives<br />

<strong>of</strong> crea<strong>to</strong>rs, 28; numbers <strong>of</strong> users,<br />

36, 157–58; outside code on, 4; personal<br />

ident<strong>it</strong>y management on, 32–33;<br />

physical layer <strong>of</strong>, 67–69; Postel’s Law,<br />

134; pro<strong>to</strong>col compatibil<strong>it</strong>y in, 28–29;<br />

pro<strong>to</strong>col layer <strong>of</strong>, 39, 67–69; and qual<strong>it</strong>y<br />

<strong>of</strong> service, 33; quiet development<br />

<strong>of</strong>, 7–8, 243; regulabil<strong>it</strong>y <strong>of</strong>, 8, 9, 103,<br />

105, 107, 196–97; regula<strong>to</strong>ry interventions<br />

<strong>of</strong>, 20, 98, 103, 245; research<br />

environment as source <strong>of</strong>, 34, 38–39;<br />

RFCs for, 243; secur<strong>it</strong>y problems <strong>of</strong>,<br />

97, 130, 168, 195; shared access <strong>to</strong>, 32;<br />

simplic<strong>it</strong>y as core value <strong>of</strong>, 31–32, 33;<br />

social layer <strong>of</strong>, 67; standards <strong>of</strong>, 39,<br />

224, 225; as terrorist recru<strong>it</strong>ing <strong>to</strong>ol,<br />

198; and te<strong>the</strong>red appliances, 8–9;<br />

transmission speed <strong>of</strong>, 32, 33; trusted<br />

systems in, 105; unexpected success <strong>of</strong>,<br />

7, 20, 33, 34; untenable status quo <strong>of</strong>,<br />

43–51; users as consumers vs. participants,<br />

161; as what we make <strong>it</strong>, 242,<br />

244–46; wireless access points <strong>of</strong>, 69,<br />

179–80, 194; worms and viruses in,<br />

36–54<br />

<strong>Internet</strong> Engineering Task Force (IETF),<br />

39, 141, 148; RFC 1135 on Morris<br />

worm, 60, 151<br />

<strong>Internet</strong> Governance Forum, 242–43<br />

iPhone, 1, 2–3, 5, 101, 106, 182<br />

iPod, 1, 101, 233<br />

Iran, censorship in, 114–15<br />

ISPs (<strong>Internet</strong> Service Providers): and<br />

Dig<strong>it</strong>al Millennium Copyright Act,<br />

119–20; early on-ramps <strong>to</strong>, 29, 30;

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!