Encyclopedia of Computer Science and Technology
Encyclopedia of Computer Science and Technology
Encyclopedia of Computer Science and Technology
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
copy protection 117out to the volunteers. When a given unit has been analyzedby the program on the user’s machine, the results are sentback to the central server <strong>and</strong> a new work unit is sent.Although no evidence <strong>of</strong> extraterrestrial intelligencehad been found as <strong>of</strong> mid-2008, SETI@Home’s more than 5million participants have contributed more than 2 millionyears <strong>of</strong> CPU time, <strong>and</strong> can process at the collective rate <strong>of</strong>256 TeraFLOPS (trillion floating point operations per second),comparable with the fastest single supercomputers.There are currently a number <strong>of</strong> other cooperative distributedcomputing projects underway. Many <strong>of</strong> them arepart <strong>of</strong> the Berkeley Open Infrastructure for Network Computing(BOINC), which includes SETI@Home, Proteins@home (protein folding), <strong>and</strong> the World Community Grid(humanitarian projects).Ad hoc cooperative processing is not suitable for alltypes <strong>of</strong> projects. There must be a way to break the datainto batches that can be separately processed. The projectis also dependent on the number <strong>of</strong> volunteers <strong>and</strong> theirdegree <strong>of</strong> commitment.Cooperative processing can be seen as part <strong>of</strong> a spectrum<strong>of</strong> emerging ways in which the line between producers<strong>and</strong> consumers <strong>of</strong> data is being blurred. Other examplesinclude media-sharing services such as Gnutella (see filesharing<strong>and</strong> p2p networks). Cooperative programs canalso be used to gather information about s<strong>of</strong>tware use <strong>and</strong>bugs from thous<strong>and</strong>s <strong>of</strong> users to allow for faster debugging<strong>and</strong> optimization.People can do more than passively share their computer’sprocessors—they can add their own brains tothe effort. Some <strong>of</strong> the most effective spam filters (seespam) use the “collective intelligence” <strong>of</strong> users by havingthem identify <strong>and</strong> mark spam messages, which can thenbe used by the s<strong>of</strong>tware as a template for automaticallyrejecting similar messages. Another interesting applicationby the Carnegie Mellon Human Computation programuses a computer game where a pair <strong>of</strong> r<strong>and</strong>omlyselected volunteers assigns keywords to an image. Forthe players, the object <strong>of</strong> the game is to come up withmatching keywords, thereby scoring points. However, thereal work that is being accomplished is that thous<strong>and</strong>s <strong>of</strong>previously uncategorized images are receiving appropriatekeywords to enable them to be retrieved. In effect,the system is taking advantage <strong>of</strong> an image-recognitiondevice that is far more capable than any computer algorithm—thehuman brain! (One might call this synergistichuman–computer processing.)Further ReadingBerkeley Open Infrastructure for Network Computing. Availableonline. URL: http://boinc.berkeley.edu/. Accessed September4, 2007.DeHon, Andre, et al. “Global Cooperative Computing.” Availableonline. URL: http://www.ai.mit.edu/projects/iiip/colab/gcc-abstract.html. Accessed September 4, 2007.Gomes, Lee. “<strong>Computer</strong> Scientists Pull a Tom Sawyer.” WallStreet Journal (June 27, 2007): p. B1. Available online. URL:http://online.wsj.com/article/SB118288538741648871.html.Accessed September 4, 2007.SETI@Home. Available online. URL: http://setiathome.berkeley.edu/. Accessed September 4, 2007.Shankl<strong>and</strong>, Stephen. “Cooperative Computing Finds Top PrimeNumber.” ZDNet. Available online. URL: http://news.zdnet.com/2100-9584_22-5112827.html. Accessed September 4,2007.Taylor, Ian J. From P2P to Web Services <strong>and</strong> Grids: Peers in a Client/Server World. New York: Springer, 2004.copy protectionCompanies that produce s<strong>of</strong>tware have had to cope withs<strong>of</strong>tware that is expensive to develop, while the disks onwhich it is distributed are inexpensive to reproduce. Themaking <strong>and</strong> swapping <strong>of</strong> “pirated” copies <strong>of</strong> s<strong>of</strong>tware isjust about as old as the personal computer itself. S<strong>of</strong>twarepiracy has taken a number <strong>of</strong> forms, ranging from teenagedhackers making extra copies <strong>of</strong> games to factories (<strong>of</strong>ten inAsia) that stamp out thous<strong>and</strong>s <strong>of</strong> bogus copies <strong>of</strong> Windowsoperating systems <strong>and</strong> programs that would cost hundreds<strong>of</strong> dollars apiece if legitimate (see s<strong>of</strong>tware piracy <strong>and</strong>counterfeiting).To prevent such copying, s<strong>of</strong>tware producers in the1980s <strong>of</strong>ten recorded the programs on floppy disks in a specialformat that made them hard to copy successfully. Oneway to do this is to record key information on disk tracksthat are not normally read by the operating system <strong>and</strong> thusnot reproduced by an ordinary copy comm<strong>and</strong>. When sucha program runs, it can use a special device control routineto read the “hidden” track. If it does not find the identifyinginformation there, it knows the disk is not a legitimate copy.Another way to do copy protection is by having theprogram look for a small hardware device called a “dongle”connected to the computer, usually to the parallel printerport. Since the dongle is distributed only with the legitimateprogram, it can serve as an effective form <strong>of</strong> copyprotection. (Encryption can also be used to render copiesunusable without the key.)Decline <strong>of</strong> Copy ProtectionCopy protection has a number <strong>of</strong> drawbacks. Because diskbasedcopy protection writes on nonst<strong>and</strong>ard tracks, evenlegitimate programs may not work with certain models <strong>of</strong>disk or CD drive. And because the legitimate user is unableto make a backup copy <strong>of</strong> the disk, if it is damaged, the userwill be unable to use the program. Dongles, on the otherh<strong>and</strong>, can interfere with the operation <strong>of</strong> other devices connectedto the port, <strong>and</strong> a user might be required to use multipledongles for multiple programs.During the 1990s, copy protection was generally phasedout, except for some games. A variety <strong>of</strong> other strategies areused against s<strong>of</strong>tware piracy. The S<strong>of</strong>tware Publishers Association(SPA) maintains a program in which disgruntledusers can report unauthorized copying <strong>of</strong> s<strong>of</strong>tware at theirworkplace. Companies that allow unauthorized copying <strong>of</strong>s<strong>of</strong>tware can be sued for violating the terms <strong>of</strong> their s<strong>of</strong>twarelicense. International trade negotiations can includeprovisions for cracking down on the massive “cloning” <strong>of</strong>major s<strong>of</strong>tware packages abroad.With modern s<strong>of</strong>tware, “s<strong>of</strong>t” copy protection generallystill exists in the form <strong>of</strong> requiring the typing in <strong>of</strong> aserial number from the CD, <strong>of</strong>ten combined with online