11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

copy protection 117out to the volunteers. When a given unit has been analyzedby the program on the user’s machine, the results are sentback to the central server <strong>and</strong> a new work unit is sent.Although no evidence <strong>of</strong> extraterrestrial intelligencehad been found as <strong>of</strong> mid-2008, SETI@Home’s more than 5million participants have contributed more than 2 millionyears <strong>of</strong> CPU time, <strong>and</strong> can process at the collective rate <strong>of</strong>256 TeraFLOPS (trillion floating point operations per second),comparable with the fastest single supercomputers.There are currently a number <strong>of</strong> other cooperative distributedcomputing projects underway. Many <strong>of</strong> them arepart <strong>of</strong> the Berkeley Open Infrastructure for Network Computing(BOINC), which includes SETI@Home, Proteins@home (protein folding), <strong>and</strong> the World Community Grid(humanitarian projects).Ad hoc cooperative processing is not suitable for alltypes <strong>of</strong> projects. There must be a way to break the datainto batches that can be separately processed. The projectis also dependent on the number <strong>of</strong> volunteers <strong>and</strong> theirdegree <strong>of</strong> commitment.Cooperative processing can be seen as part <strong>of</strong> a spectrum<strong>of</strong> emerging ways in which the line between producers<strong>and</strong> consumers <strong>of</strong> data is being blurred. Other examplesinclude media-sharing services such as Gnutella (see filesharing<strong>and</strong> p2p networks). Cooperative programs canalso be used to gather information about s<strong>of</strong>tware use <strong>and</strong>bugs from thous<strong>and</strong>s <strong>of</strong> users to allow for faster debugging<strong>and</strong> optimization.People can do more than passively share their computer’sprocessors—they can add their own brains tothe effort. Some <strong>of</strong> the most effective spam filters (seespam) use the “collective intelligence” <strong>of</strong> users by havingthem identify <strong>and</strong> mark spam messages, which can thenbe used by the s<strong>of</strong>tware as a template for automaticallyrejecting similar messages. Another interesting applicationby the Carnegie Mellon Human Computation programuses a computer game where a pair <strong>of</strong> r<strong>and</strong>omlyselected volunteers assigns keywords to an image. Forthe players, the object <strong>of</strong> the game is to come up withmatching keywords, thereby scoring points. However, thereal work that is being accomplished is that thous<strong>and</strong>s <strong>of</strong>previously uncategorized images are receiving appropriatekeywords to enable them to be retrieved. In effect,the system is taking advantage <strong>of</strong> an image-recognitiondevice that is far more capable than any computer algorithm—thehuman brain! (One might call this synergistichuman–computer processing.)Further ReadingBerkeley Open Infrastructure for Network Computing. Availableonline. URL: http://boinc.berkeley.edu/. Accessed September4, 2007.DeHon, Andre, et al. “Global Cooperative Computing.” Availableonline. URL: http://www.ai.mit.edu/projects/iiip/colab/gcc-abstract.html. Accessed September 4, 2007.Gomes, Lee. “<strong>Computer</strong> Scientists Pull a Tom Sawyer.” WallStreet Journal (June 27, 2007): p. B1. Available online. URL:http://online.wsj.com/article/SB118288538741648871.html.Accessed September 4, 2007.SETI@Home. Available online. URL: http://setiathome.berkeley.edu/. Accessed September 4, 2007.Shankl<strong>and</strong>, Stephen. “Cooperative Computing Finds Top PrimeNumber.” ZDNet. Available online. URL: http://news.zdnet.com/2100-9584_22-5112827.html. Accessed September 4,2007.Taylor, Ian J. From P2P to Web Services <strong>and</strong> Grids: Peers in a Client/Server World. New York: Springer, 2004.copy protectionCompanies that produce s<strong>of</strong>tware have had to cope withs<strong>of</strong>tware that is expensive to develop, while the disks onwhich it is distributed are inexpensive to reproduce. Themaking <strong>and</strong> swapping <strong>of</strong> “pirated” copies <strong>of</strong> s<strong>of</strong>tware isjust about as old as the personal computer itself. S<strong>of</strong>twarepiracy has taken a number <strong>of</strong> forms, ranging from teenagedhackers making extra copies <strong>of</strong> games to factories (<strong>of</strong>ten inAsia) that stamp out thous<strong>and</strong>s <strong>of</strong> bogus copies <strong>of</strong> Windowsoperating systems <strong>and</strong> programs that would cost hundreds<strong>of</strong> dollars apiece if legitimate (see s<strong>of</strong>tware piracy <strong>and</strong>counterfeiting).To prevent such copying, s<strong>of</strong>tware producers in the1980s <strong>of</strong>ten recorded the programs on floppy disks in a specialformat that made them hard to copy successfully. Oneway to do this is to record key information on disk tracksthat are not normally read by the operating system <strong>and</strong> thusnot reproduced by an ordinary copy comm<strong>and</strong>. When sucha program runs, it can use a special device control routineto read the “hidden” track. If it does not find the identifyinginformation there, it knows the disk is not a legitimate copy.Another way to do copy protection is by having theprogram look for a small hardware device called a “dongle”connected to the computer, usually to the parallel printerport. Since the dongle is distributed only with the legitimateprogram, it can serve as an effective form <strong>of</strong> copyprotection. (Encryption can also be used to render copiesunusable without the key.)Decline <strong>of</strong> Copy ProtectionCopy protection has a number <strong>of</strong> drawbacks. Because diskbasedcopy protection writes on nonst<strong>and</strong>ard tracks, evenlegitimate programs may not work with certain models <strong>of</strong>disk or CD drive. And because the legitimate user is unableto make a backup copy <strong>of</strong> the disk, if it is damaged, the userwill be unable to use the program. Dongles, on the otherh<strong>and</strong>, can interfere with the operation <strong>of</strong> other devices connectedto the port, <strong>and</strong> a user might be required to use multipledongles for multiple programs.During the 1990s, copy protection was generally phasedout, except for some games. A variety <strong>of</strong> other strategies areused against s<strong>of</strong>tware piracy. The S<strong>of</strong>tware Publishers Association(SPA) maintains a program in which disgruntledusers can report unauthorized copying <strong>of</strong> s<strong>of</strong>tware at theirworkplace. Companies that allow unauthorized copying <strong>of</strong>s<strong>of</strong>tware can be sued for violating the terms <strong>of</strong> their s<strong>of</strong>twarelicense. International trade negotiations can includeprovisions for cracking down on the massive “cloning” <strong>of</strong>major s<strong>of</strong>tware packages abroad.With modern s<strong>of</strong>tware, “s<strong>of</strong>t” copy protection generallystill exists in the form <strong>of</strong> requiring the typing in <strong>of</strong> aserial number from the CD, <strong>of</strong>ten combined with online

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!