340 Index s<strong>of</strong>tware (continued ) 77, 94, 131–32, 189, 191–92; installation <strong>of</strong>, 14, 16, 18; interoperabil<strong>it</strong>y <strong>of</strong>, 176, 184; patents <strong>of</strong>, 190; poor decisions about, 55; programmers <strong>of</strong>, 14, 15, 16; <strong>of</strong> proprietary networks, 82, 189; reconfigurabil<strong>it</strong>y <strong>of</strong>, 14; source code <strong>of</strong>, 189, 192; and statute <strong>of</strong> lim<strong>it</strong>ations, 191; trusted systems, 105; unbundled from hardware, 12, 14; updates <strong>of</strong>, 176; user-wr<strong>it</strong>ten, 85; wr<strong>it</strong>ten by amateurs, 89; wr<strong>it</strong>ten by third parties, 14, 16–17, 18, 180, 183, 192–93 Solove, Daniel, 210 Sony, Mylo, 58 Spafford, Gene, 37, 240 spam, 99, 130, 137, 166; anonymous, 194; from au<strong>to</strong>mated robots, 207–8; blocks <strong>of</strong>, 111, 194; filters, 46; and link farms, 207; MAPS vs., 168–70; Nigerian “419,” 240; ORBS vs., 169; and viruses, 170–73 specific injunction, 108–9 speech: anonymous, 213; freedom <strong>of</strong>, 114, 230; “more speech” approach, 230; and prior restraints, 122 speed bumps, 108 spreadsheets, 15, 88 spyware, 53, 130, 172 Stallman, Richard, 77, 131–32, 190 “Star Wars Kid,” 211–12, 213, 234 State Department, U.S., computer virus spread in, 47 statutes <strong>of</strong> lim<strong>it</strong>ations, 191 Sterling, Bruce, 239 S<strong>to</strong>pBadware.org, 52, 159, 170–72 s<strong>to</strong>rage: miniaturization <strong>of</strong>, 155–56; third-party, 185–88 S<strong>to</strong>red Communications Act, 186 Strahilev<strong>it</strong>z, Lior, 118, 219, 220 Stuntz, William, 112, 117 subsidiar<strong>it</strong>y, 143 Sunstein, Cass, 213 Supreme Court, U.S.: on gag order, 116; on privacy, 185, 188; on search and seizure, 188 surveillance: and censorship, 113; cheap cameras, 206; and false pos<strong>it</strong>ives, 116– 17; and government power, 117–19, 175, 187; by law enforcement <strong>of</strong>ficers, 4–5, 109–10, 113, 117, 118, 209– 10, 215–16; “mass dataveillance,” 208; mistakes locked in, 116–17; by mobile phones, 4, 110, 117, 210–14; and PATRIOT Act, 186–87; in te<strong>the</strong>red appliances, 109–10, 116, 117; and third-party s<strong>to</strong>rage, 186–88; at traffic lights, 116–17; ubiqui<strong>to</strong>us, 109–10, 206, 209–16 Sut<strong>to</strong>n, Willie, 55 Swiss Army knife, 72, 73 Symantec Corp., 46, 159 tabulation, punch card system <strong>of</strong>, 11 TamTam (and XO project), 237 Tattam, Peter, 29, 85 technical protection measures, 105 technology: and au<strong>to</strong>mation, 92; cheap networks, 205–6, 210, 214, 216, 221; cheap processors, 205, 210, 216, 221; cheap sensors, 206, 208–9, 210, 216, 221; expansion <strong>of</strong>, 34, 150; facial recogn<strong>it</strong>ion, 214–15; functional<strong>it</strong>y <strong>of</strong>, 105; image recogn<strong>it</strong>ion, 215–16; international exportation <strong>of</strong>, 5; Moore’s Law in, 205; participa<strong>to</strong>ry, 206; peer production, 206–16; pressure for change in, 175; regula<strong>to</strong>rs <strong>of</strong>, 4, 8, 35, 105, 175; secur<strong>it</strong>y vs. freedom in, 3–5, 155; social liberalization and progress in, 113–14; user ID, 32, 195; virtualization, 155, 156. See also generative technology telephone industry: 7, 304–5n28. See also AT&T Texas Instruments TI-99/4A, 13 <strong>the</strong>ories <strong>of</strong> <strong>the</strong> commons, 78–79 Ticketmaster.com, 207
Index 341 Timex/Sinclair Z-1000, 13 TiVo, 59, 64, 71, 77, 101, 123, 162, 184; and preemption, 108; and regula<strong>to</strong>r control, 107; and surveillance, 109 TiVo v. EchoStar, 103–4, 107, 108 <strong>to</strong>lerated uses, 119–22, 190–91 traffic lights: cameras at, 116–17; and verkeersbordvrij, 127–28 tragedies <strong>of</strong> <strong>the</strong> commons, 158 transclusion, use <strong>of</strong> term, 226–27 transferabil<strong>it</strong>y, 73 transmission speed, irregular<strong>it</strong>y <strong>of</strong>, 32 trial and error, learning by, 236 Trumpet Winsock, 29 trust: assumptions <strong>of</strong>, 20–21, 30–32, 39–40, 134, 135, 147; trade-<strong>of</strong>fs w<strong>it</strong>h, 33 trusted systems, 105 Tushman, Michael, 24 Twain, Mark (Samuel Clemens), 212, 213 two-fac<strong>to</strong>r au<strong>the</strong>ntication, 53 typewr<strong>it</strong>ers, “smart,” 15, 19, 20, 34 un<strong>it</strong>ary rights holder, 189 Un<strong>it</strong>ed States v. Am. Library Ass’n, 282– 83n62 Unix operating system, 39, 132, 190 U.S. Census, 11 user-generated content, 146, 147 user ID, 32, 195 U.S. General Accounting Office (GAO), 38–39 U.S. government, research funding from, 27, 28 U.S. Telecommunications Act (1996), 304–5n28 values, 79 VCRs, 121 verkeersbordvrij (“free <strong>of</strong> traffic signs” experiment), 127–28, 130; lessons <strong>of</strong>, 128, 211, 228; “unsafe as safe” experiment, 129; Wikipedia experiment w<strong>it</strong>h, 133–34, 144, 146 video games: emergence <strong>of</strong>, 15; as information appliances, 20, 57, 58, 101; licensing <strong>of</strong>, 58, 177; remote updating <strong>of</strong>, 176; third-party code for, 183; Xbox, 3–4, 184 video rental industry, 121, 202 virtual machine technology, 155, 156 virtual worlds, 47 viruses. See worms and viruses VisiCalc, 2 Vixie, Paul, 168–69, 172, 173 VNC, 54 Von Ahn, Luis, 206–7 Wales, Jimbo: and Bomis search engine, 133, 289n19; and Essjay, 141; and MyWikiBiz, 140; and Nupedia, 133; and Wikia, 141; and Wikipedia, 133, 136, 138, 139, 142, 145, 147–48 Warhol, <strong>And</strong>y, 214 warranty, law <strong>of</strong>, 162 Warshak v. Un<strong>it</strong>ed States, 188 Web 2.0: bot<strong>to</strong>m-up tagging on, 214; decision-making control ceded <strong>to</strong>, 167; and end <strong>of</strong> generativ<strong>it</strong>y, 123–26; and peer production, 206–16; usabil<strong>it</strong>y <strong>of</strong> older versions w<strong>it</strong>h, 125; use <strong>of</strong> term, 102, 123 webcams, 158, 210–12 Web s<strong>it</strong>es: accessibil<strong>it</strong>y <strong>of</strong>, 4; blacklists <strong>of</strong>, 114–15; fake “link farms,” 207; and information appliances, 102; and privacy, 177, 203, 226; and spam, 170– 72; surveillance <strong>of</strong>, 109 Weinberger, David, 214 Westlaw, 89 whistleblowers, 118 wi-fi access points, 69, 179–80, 194 Wikipedia, 74, 130, 226; barnstar awards, 136, 145; biographies <strong>of</strong> living persons in, 138; blocks <strong>of</strong>, 136, 140; “Bureaucrats” <strong>of</strong>, 135–36; as centralized service, 157; commun<strong>it</strong>y-developed standards <strong>of</strong>, 139, 143, 146–48,
- Page 2:
The Future of the Internet— And H
- Page 5 and 6:
A Caravan book. For more informatio
- Page 7 and 8:
vi Contents Part III Solutions—14
- Page 9 and 10:
viii Foreword porn on the Net. But
- Page 11 and 12:
x Preface to the Paperback Edition
- Page 13 and 14:
Introduction On January 9, 2007, St
- Page 15 and 16:
Introduction 3 Jobs was not shy abo
- Page 17 and 18:
Introduction 5 some might welcome t
- Page 19 and 20:
I The Rise and Stall of the Generat
- Page 21 and 22:
The Rise and Stall of the Generativ
- Page 23 and 24:
1 Battle of the Boxes Herman Holler
- Page 25 and 26:
Battle of the Boxes 13 Rethreading
- Page 27 and 28:
Battle of the Boxes 15 The business
- Page 29 and 30:
Battle of the Boxes 17 writing new
- Page 31 and 32:
2 Battle of the Networks As the pri
- Page 33 and 34:
Battle of the Networks 21 sumptions
- Page 35 and 36:
Battle of the Networks 23 collectin
- Page 37 and 38:
Battle of the Networks 25 expense o
- Page 39 and 40:
Battle of the Networks 27 The Inter
- Page 41 and 42:
Battle of the Networks 29 compatibi
- Page 43 and 44:
Battle of the Networks 31 cess and
- Page 45 and 46:
Battle of the Networks 33 tance. Be
- Page 47 and 48:
Battle of the Networks 35 proved by
- Page 49 and 50:
Cybersecurity and the Generative Di
- Page 51 and 52:
Cybersecurity and the Generative Di
- Page 53 and 54:
Cybersecurity and the Generative Di
- Page 55 and 56:
Cybersecurity and the Generative Di
- Page 57 and 58:
Cybersecurity and the Generative Di
- Page 59 and 60:
Cybersecurity and the Generative Di
- Page 61 and 62:
Table 3.1. Rankings of malicious ac
- Page 63 and 64:
Cybersecurity and the Generative Di
- Page 65 and 66:
Cybersecurity and the Generative Di
- Page 67 and 68:
Cybersecurity and the Generative Di
- Page 69 and 70:
Cybersecurity and the Generative Di
- Page 71 and 72:
Cybersecurity and the Generative Di
- Page 73 and 74:
Cybersecurity and the Generative Di
- Page 75 and 76:
II After the Stall In Part I of thi
- Page 77 and 78:
After the Stall 65 systems function
- Page 79 and 80:
4 The Generative Pattern Anyone can
- Page 81 and 82:
The Generative Pattern 69 themselve
- Page 83 and 84:
The Generative Pattern 71 istics, b
- Page 85 and 86:
The Generative Pattern 73 is. Barri
- Page 87 and 88:
Table 4.1. Examples of generative t
- Page 89 and 90:
The Generative Pattern 77 GENERATIV
- Page 91 and 92:
The Generative Pattern 79 Creative
- Page 93 and 94:
The Generative Pattern 81 We have a
- Page 95 and 96:
The Generative Pattern 83 machines
- Page 97 and 98:
The Generative Pattern 85 even smal
- Page 99 and 100:
The Generative Pattern 87 pipes to
- Page 101 and 102:
The Generative Pattern 89 work, 46
- Page 103 and 104:
The Generative Pattern 91 But indep
- Page 105 and 106:
The Generative Pattern 93 PowerPoin
- Page 107 and 108:
The Generative Pattern 95 RECURSION
- Page 109 and 110:
The Generative Pattern 97 adaptable
- Page 111 and 112:
The Generative Pattern 99 chained u
- Page 113 and 114:
5 Tethered Appliances, Software as
- Page 115 and 116:
Perfect Enforcement 103 wish to ope
- Page 117 and 118:
Perfect Enforcement 105 for when we
- Page 119 and 120:
Perfect Enforcement 107 for which o
- Page 121 and 122:
Perfect Enforcement 109 specific, u
- Page 123 and 124:
Perfect Enforcement 111 by purchase
- Page 125 and 126:
Perfect Enforcement 113 Governments
- Page 127 and 128:
Perfect Enforcement 115 ernment, th
- Page 129 and 130:
Perfect Enforcement 117 cle cannot
- Page 131 and 132:
Perfect Enforcement 119 text, but b
- Page 133 and 134:
Perfect Enforcement 121 party innov
- Page 135 and 136:
Perfect Enforcement 123 very least,
- Page 137 and 138:
Perfect Enforcement 125 Continuous
- Page 139 and 140:
6 The Lessons of Wikipedia The Dutc
- Page 141 and 142:
The Lessons of Wikipedia 129 alized
- Page 143 and 144:
The Lessons of Wikipedia 131 THE RI
- Page 145 and 146:
The Lessons of Wikipedia 133 “not
- Page 147 and 148:
The Lessons of Wikipedia 135 decidi
- Page 149 and 150:
The Lessons of Wikipedia 137 Qualit
- Page 151 and 152:
The Lessons of Wikipedia 139 does l
- Page 153 and 154:
The Lessons of Wikipedia 141 der th
- Page 155 and 156:
The Lessons of Wikipedia 143 text,
- Page 157 and 158:
The Lessons of Wikipedia 145 trator
- Page 159 and 160:
The Lessons of Wikipedia 147 “sem
- Page 161 and 162:
III Solutions This book has explain
- Page 163 and 164:
Solutions 151 make it more difficul
- Page 165 and 166:
7 Stopping the Future of the Intern
- Page 167 and 168:
Stability on a Generative Net 155 o
- Page 169 and 170:
Stability on a Generative Net 157 c
- Page 171 and 172:
Stability on a Generative Net 159 g
- Page 173 and 174:
Stability on a Generative Net 161 n
- Page 175 and 176:
Stability on a Generative Net 163 d
- Page 177 and 178:
Stability on a Generative Net 165 e
- Page 179 and 180:
Stability on a Generative Net 167 e
- Page 181 and 182:
Stability on a Generative Net 169 a
- Page 183 and 184:
Stability on a Generative Net 171 G
- Page 185 and 186:
Stability on a Generative Net 173 m
- Page 187 and 188:
8 Strategies for a Generative Futur
- Page 189 and 190:
Strategies for a Generative Future
- Page 191 and 192:
Strategies for a Generative Future
- Page 193 and 194:
Strategies for a Generative Future
- Page 195 and 196:
Strategies for a Generative Future
- Page 197 and 198:
Strategies for a Generative Future
- Page 199 and 200:
Strategies for a Generative Future
- Page 201 and 202:
Strategies for a Generative Future
- Page 203 and 204:
Strategies for a Generative Future
- Page 205 and 206:
Strategies for a Generative Future
- Page 207 and 208:
Strategies for a Generative Future
- Page 209 and 210:
Strategies for a Generative Future
- Page 211 and 212:
Strategies for a Generative Future
- Page 213 and 214:
Meeting the Risks of Generativity:
- Page 215 and 216:
Meeting the Risks of Generativity:
- Page 217 and 218:
Meeting the Risks of Generativity:
- Page 219 and 220:
Meeting the Risks of Generativity:
- Page 221 and 222:
Meeting the Risks of Generativity:
- Page 223 and 224:
Meeting the Risks of Generativity:
- Page 225 and 226:
Meeting the Risks of Generativity:
- Page 227 and 228:
Meeting the Risks of Generativity:
- Page 229 and 230:
Meeting the Risks of Generativity:
- Page 231 and 232:
Meeting the Risks of Generativity:
- Page 233 and 234:
Meeting the Risks of Generativity:
- Page 235 and 236:
Meeting the Risks of Generativity:
- Page 237 and 238:
Meeting the Risks of Generativity:
- Page 239 and 240:
Meeting the Risks of Generativity:
- Page 241 and 242:
Meeting the Risks of Generativity:
- Page 243 and 244:
Meeting the Risks of Generativity:
- Page 245 and 246:
Meeting the Risks of Generativity:
- Page 247 and 248:
Conclusion Nicholas Negroponte, for
- Page 249 and 250:
Conclusion 237 dren in the developi
- Page 251 and 252:
Conclusion 239 ture, and they are a
- Page 253 and 254:
Conclusion 241 can convincingly put
- Page 255 and 256:
Conclusion 243 niqués that emerge
- Page 257 and 258:
Conclusion 245 education project, a
- Page 259 and 260:
Acknowledgments Many people helped
- Page 261 and 262:
Notes INTRODUCTION 1. Steve Jobs, C
- Page 263 and 264:
Notes to Pages 11-13 251 CHAPTER 1.
- Page 265 and 266:
Notes to Pages 17-21 253 States v.
- Page 267 and 268:
Notes to Pages 23-26 255 General El
- Page 269 and 270:
Notes to Pages 28-29 257 approach,
- Page 271 and 272:
Notes to Pages 32-36 259 47. See, e
- Page 273 and 274:
Notes to Pages 38-42 261 of cyber a
- Page 275 and 276:
Notes to Pages 45-47 263 .org/pdfs/
- Page 277 and 278:
Notes to Pages 51-54 265 84. See Pa
- Page 279 and 280:
Notes to Pages 61-72 267 111. U.S.
- Page 281 and 282:
Notes to Pages 82-88 269 havioral A
- Page 283 and 284:
Notes to Page 89 271 tor, http://so
- Page 285 and 286:
Notes to Pages 91-95 273 62. Id. 63
- Page 287 and 288:
Notes to Pages 96-102 275 (last vis
- Page 289 and 290:
Notes to Pages 104-5 277 ality in y
- Page 291 and 292:
Notes to Pages 108-10 279 sion, Sec
- Page 293 and 294:
Notes to Pages 111-13 281 and simpl
- Page 295 and 296:
Notes to Pages 115-17 283 on Our Na
- Page 297 and 298:
Notes to Pages 119-22 285 88. See,
- Page 299 and 300:
Notes to Pages 124-28 287 available
- Page 301 and 302: Notes to Pages 130-33 289 11. Norma
- Page 303 and 304: Notes to Pages 137-40 291 See Nate
- Page 305 and 306: Notes to Page 143 293 cal Foundatio
- Page 307 and 308: Notes to Pages 146-52 295 81. But s
- Page 309 and 310: Notes to Pages 157-62 297 6. See Wi
- Page 311 and 312: Notes to Pages 169-71 299 31. Paul
- Page 313 and 314: Notes to Page 178 301 6. Wikipedia
- Page 315 and 316: Notes to Pages 179-81 303 13. One s
- Page 317 and 318: Notes to Pages 182-84 305 delays wi
- Page 319 and 320: Notes to Pages 187-90 307 Secret Co
- Page 321 and 322: Notes to Pages 192-96 309 laches de
- Page 323 and 324: Notes to Pages 197-202 311 96. See
- Page 325 and 326: Notes to Pages 204-7 313 uncommon.
- Page 327 and 328: Notes to Pages 209-12 315 a Real Bu
- Page 329 and 330: Notes to Pages 214-15 317 idence in
- Page 331 and 332: Notes to Pages 217-18 319 sored lin
- Page 333 and 334: Notes to Pages 224-25 321 1, 2007);
- Page 335 and 336: Notes to Pages 227-30 323 avoided w
- Page 337 and 338: Notes to Pages 232-34 325 something
- Page 339 and 340: Notes to Pages 237-44 327 7. See, e
- Page 341 and 342: Index accessibility, 29, 72-73, 77,
- Page 343 and 344: Index 331 15; and endpoint control,
- Page 345 and 346: Index 333 EMI (music company), 121
- Page 347 and 348: Index 335 compared to, 73-76; limit
- Page 349 and 350: Index 337 Microsoft Windows, 3, 4;
- Page 351: Index 339 for other limitations, 11