Download - Future of the Internet â And how to stop it.
Download - Future of the Internet â And how to stop it.
Download - Future of the Internet â And how to stop it.
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Index 335<br />
compared <strong>to</strong>, 73–76; lim<strong>it</strong>ations <strong>of</strong>,<br />
177; and network neutral<strong>it</strong>y, 178–85;<br />
PCs as, 4, 59–61, 102, 185–88; PCs<br />
vs., 18, 29, 57–59; and perfect enforcement,<br />
161; and privacy, 185–88;<br />
regula<strong>to</strong>ry interventions in, 103–7,<br />
125, 197; remote control <strong>of</strong>, 161; remote<br />
updates <strong>of</strong>, 106–7, 176; secur<strong>it</strong>y<br />
dilemma <strong>of</strong>, 42, 106–7, 123–24, 150,<br />
176–88; specific injunction, 108–9;<br />
variety <strong>of</strong> designs for, 20; Web 2.0 and,<br />
102; See also specific information appliances<br />
information overload, 230<br />
information services, early forms, 9<br />
InnoCentive, 246<br />
innovation: blending models for, 86–90;<br />
generativ<strong>it</strong>y as parent <strong>of</strong>, 80–84, 90;<br />
group, 94; and idiosyncrasy, 90–91;<br />
inertia vs., 83–84; “sustaining” vs.<br />
“disruptive,” 83–84, 87, 97<br />
intellectual property: and code thickets,<br />
188–92; and contraband rules, 103–<br />
4; cross-licensing <strong>of</strong>, 190; fair use defense,<br />
115, 121–22; illegal online file<br />
sharing, 111–12, 197; inadequate protection<br />
for, 217; licensing <strong>of</strong>, 79; and<br />
patent thicket, 190–92; principle <strong>of</strong><br />
<strong>to</strong>lerated uses, 119–22, 190–91; and<br />
privacy law, 210; statutes <strong>of</strong> lim<strong>it</strong>ations,<br />
191; value <strong>of</strong>, 98. See also cyberlaw<br />
Interface Message Processors (IMPs), 27<br />
<strong>Internet</strong>: application layer, 67–69; assumption<br />
<strong>of</strong> equal<strong>it</strong>y in, 33–34; assumptions<br />
<strong>of</strong> user trustworthiness, 20–<br />
21, 30–32, 130, 227; as “best efforts”<br />
network, 33; browsers, 121; bundled<br />
proprietary model defeated by, 30;<br />
channels <strong>of</strong> communication and control<br />
in, 42; collaboration in design <strong>of</strong>,<br />
34; competi<strong>to</strong>rs, 9; connectiv<strong>it</strong>y <strong>of</strong>, 32;<br />
consumer applications <strong>of</strong>, 28; content<br />
layer <strong>of</strong>, 67; design <strong>of</strong>, 27–28, 30–35,<br />
41, 130, 243; economic value as a<br />
commons, 79, 85; entrance <strong>of</strong>, 26–30;<br />
expansion and growth <strong>of</strong>, 43, 102; first<br />
message on, 27; flexibil<strong>it</strong>y vs. secur<strong>it</strong>y<br />
<strong>of</strong>, 9, 40, 42–43; generative technology<br />
<strong>of</strong>, 3, 5, 8, 34, 72, 152, 178, 242;<br />
goodwill subsidy assumed, 9; hourglass<br />
arch<strong>it</strong>ecture <strong>of</strong>, 67–69; and market<br />
forces, 20–21; modular<strong>it</strong>y <strong>of</strong>, 41; motives<br />
<strong>of</strong> crea<strong>to</strong>rs, 28; numbers <strong>of</strong> users,<br />
36, 157–58; outside code on, 4; personal<br />
ident<strong>it</strong>y management on, 32–33;<br />
physical layer <strong>of</strong>, 67–69; Postel’s Law,<br />
134; pro<strong>to</strong>col compatibil<strong>it</strong>y in, 28–29;<br />
pro<strong>to</strong>col layer <strong>of</strong>, 39, 67–69; and qual<strong>it</strong>y<br />
<strong>of</strong> service, 33; quiet development<br />
<strong>of</strong>, 7–8, 243; regulabil<strong>it</strong>y <strong>of</strong>, 8, 9, 103,<br />
105, 107, 196–97; regula<strong>to</strong>ry interventions<br />
<strong>of</strong>, 20, 98, 103, 245; research<br />
environment as source <strong>of</strong>, 34, 38–39;<br />
RFCs for, 243; secur<strong>it</strong>y problems <strong>of</strong>,<br />
97, 130, 168, 195; shared access <strong>to</strong>, 32;<br />
simplic<strong>it</strong>y as core value <strong>of</strong>, 31–32, 33;<br />
social layer <strong>of</strong>, 67; standards <strong>of</strong>, 39,<br />
224, 225; as terrorist recru<strong>it</strong>ing <strong>to</strong>ol,<br />
198; and te<strong>the</strong>red appliances, 8–9;<br />
transmission speed <strong>of</strong>, 32, 33; trusted<br />
systems in, 105; unexpected success <strong>of</strong>,<br />
7, 20, 33, 34; untenable status quo <strong>of</strong>,<br />
43–51; users as consumers vs. participants,<br />
161; as what we make <strong>it</strong>, 242,<br />
244–46; wireless access points <strong>of</strong>, 69,<br />
179–80, 194; worms and viruses in,<br />
36–54<br />
<strong>Internet</strong> Engineering Task Force (IETF),<br />
39, 141, 148; RFC 1135 on Morris<br />
worm, 60, 151<br />
<strong>Internet</strong> Governance Forum, 242–43<br />
iPhone, 1, 2–3, 5, 101, 106, 182<br />
iPod, 1, 101, 233<br />
Iran, censorship in, 114–15<br />
ISPs (<strong>Internet</strong> Service Providers): and<br />
Dig<strong>it</strong>al Millennium Copyright Act,<br />
119–20; early on-ramps <strong>to</strong>, 29, 30;