peer-to-peer

129 results back to index


pages: 673 words: 164,804

Peer-to-Peer by Andy Oram

AltaVista, big-box store, c2.com, combinatorial explosion, commoditize, complexity theory, correlation coefficient, dark matter, Dennis Ritchie, fault tolerance, Free Software Foundation, Garrett Hardin, independent contractor, information retrieval, Kickstarter, Larry Wall, Marc Andreessen, moral hazard, Network effects, P = NP, P vs NP, p-value, packet switching, PalmPilot, peer-to-peer, peer-to-peer model, Ponzi scheme, power law, radical decentralization, rolodex, Ronald Coase, Search for Extraterrestrial Intelligence, semantic web, SETI@home, Silicon Valley, slashdot, statistical model, Tragedy of the Commons, UUNET, Vernor Vinge, web application, web of trust, Zimmermann PGP

This hybrid approach seems to scale well: the directory can be made efficient and uses low bandwidth, and the file sharing can happen on the edges of the network. In practice, some applications might work better with a fully centralized design, not using any peer-to-peer technology at all. One example is a search on a large, relatively static database. Current web search engines are able to serve up to one billion pages all from a single place. Search algorithms have been highly optimized for centralized operation; there appears to be little benefit to spreading the search operation out on a peer-to-peer network (database generation, however, is another matter). Also, applications that require centralized information sharing for accountability or correctness are hard to spread out on a decentralized network.

Many systems will partake of both models. In fact, I have avoided using the phrase “peer-to-peer model” in this book because such a variety of systems exist and so few can be considered pure peer-to-peer. The ones that are completely decentralized—Gnutella, Freenet, and Free Haven—are extremely valuable for research purposes in addition to the direct goals they were designed to meet. Whether or not other systems move in their direction, the viability of the most decentralized systems will help us judge the viability of peer-to-peer technology as a whole. Appendix A. Directory of Peer-to-Peer Projects This is a partial list of interesting projects, companies, and standards that could reasonably be considered examples of peer-to-peer technology.

–Social solutions: Engineer polite behavior, Strategic positioning and core competencies–Strategic positioning and core competencies, Gnutella’s effects governmental threats to privacy, Red Rover–Red Rover instant messaging and, Immediate information sharing: The new instant messaging services managing congestion to prevent bandwidth attacks, Moderating security levels: An accountability slider managing metadata and, Strategic positioning and core competencies meme map current, The current peer-to-peer meme map–The current peer-to-peer meme map new, The new peer-to-peer meme map–Peer-to-peer and devices micropayments economic impact of, General considerations in an economic analysis of micropayment design–General considerations in an economic analysis of micropayment design exchanging, The difficulty of distributed systems: How to exchange micropayments among peers–The difficulty of distributed systems: How to exchange micropayments among peers identity-based, Identity-based payment policies risks involved, Moderating security levels: An accountability slider usefulness of, The use and effectiveness of micropayments in peer-to-peer systems–Moderating security levels: An accountability slider models, A Network of Peers: Peer-to-Peer Models Through the History of the Internet–Conclusions, Peer-to-peer models and their impacts on accountability next-generation file sharing technologies, Next-generation peer-to-peer file-sharing technologies open source and, File sharing: Napster and successors problems with, A Network of Peers: Peer-to-Peer Models Through the History of the Internet, Decentralization is a tool, not a goal, Special problems posed by peer-to-peer systems protocol-centric addressing, Nothing succeeds like address, or, DNS isn’t the only game in town–An explosion of protocols remailer difficulties, General discussion reputation system, Central Reputation Server versus distributed Reputation Servers revisionist history of, A revisionist history of peer-to-peer (1969-1995)–DNS scalability and, Performance security provided by Groove, Security–Taxonomy of Groove keys SETI@home and, The peer-to-peer paradigm social and technical solutions to problems, Technical solutions: Return to the old Internet social impact of, Some context and a definition summit, Remaking the Peer-to-Peer Meme–A success story: From free software to open source meme map developed at, Remaking the Peer-to-Peer Meme, The new peer-to-peer meme map–Peer-to-peer and devices trust issues, Trust–Conclusions users donating resources, Freeloading using accountability to expand, Accountability using port 80, Abusing port 80 using RDF for applications, Foundations of resource description: Unique identifiers vs. client/server model, A Network of Peers: Peer-to-Peer Models Through the History of the Internet, Peer-to-peer is a horseless carriage, Peer-to-peer architecture and second-class status, The peer-to-peer paradigm, A clean sweep?


pages: 731 words: 134,263

Talk Is Cheap: Switching to Internet Telephones by James E. Gaskin

Debian, decentralized internet, end-to-end encryption, Ford Model T, packet switching, PalmPilot, peer-to-peer, peer-to-peer model, satellite internet, Silicon Valley, Skype, speech recognition, telemarketer

Many cooperative groups have collaborated to shuttle Internet calls to a public telephone network central office serving the telephone number you dial. And when you do have to pay, it's pennies per minute, and only when you use it. 2.2.4. Virtual Numbers Calling out from a peer-to-peer network to the public telephone network is one thing. But if your peer-to-peer service lists you as JamesGaskin inside the Skype user directory (well, yours doesn't, but mine does), how do outsiders dial that? How can they call you? Enter virtual numbers and the inbound side of the public phone to peer-to-peer network gateway. Virtual numbers are traditional telephone numbers that link the public telephone network into the broadband phone world. Vonage and their competitors with analog telephone adapters that plug into your broadband modem are providing virtual numbers as well, but they don't really say that.

Many cooperative groups have collaborated to shuttle Internet calls to a public telephone network central office serving the telephone number you dial. And when you do have to pay, it's pennies per minute, and only when you use it. 2.2.4. Virtual Numbers Calling out from a peer-to-peer network to the public telephone network is one thing. But if your peer-to-peer service lists you as JamesGaskin inside the Skype user directory (well, yours doesn't, but mine does), how do outsiders dial that? How can they call you? Enter virtual numbers and the inbound side of the public phone to peer-to-peer network gateway. Virtual numbers are traditional telephone numbers that link the public telephone network into the broadband phone world. Vonage and their competitors with analog telephone adapters that plug into your broadband modem are providing virtual numbers as well, but they don't really say that.

Just remember that in marketing, brand awareness wins, and having every user of your product (or free Skype software in this case) demand that all their friends get the product is a wonderful thing and much desired by marketing people. * * * Note: Name from Air"Skype" is a made-up word picked because it had an available web address, the ability to act as a noun and a verb, and no meaning in any language. * * * Peer-to-peer technologies that were developed for KaZaA and improved for Skype allow the two founders to claim that Skype is the third generation of peer-to-peer technology. That makes sense, and explains why Skype has an advantage over many of their competitors: they've been doing it longer and learning as they go. Starting August 29, 2003, Skype software rolled quickly across the Internet.


Smart Mobs: The Next Social Revolution by Howard Rheingold

"hyperreality Baudrillard"~20 OR "Baudrillard hyperreality", A Pattern Language, Alvin Toffler, AOL-Time Warner, augmented reality, barriers to entry, battle of ideas, Brewster Kahle, Burning Man, business climate, citizen journalism, computer vision, conceptual framework, creative destruction, Dennis Ritchie, digital divide, disinformation, Douglas Engelbart, Douglas Engelbart, experimental economics, experimental subject, Extropian, Free Software Foundation, Garrett Hardin, Hacker Ethic, Hedy Lamarr / George Antheil, Herman Kahn, history of Unix, hockey-stick growth, Howard Rheingold, invention of the telephone, inventory management, Ivan Sutherland, John Markoff, John von Neumann, Joi Ito, Joseph Schumpeter, Ken Thompson, Kevin Kelly, Lewis Mumford, Metcalfe's law, Metcalfe’s law, more computing power than Apollo, move 37, Multics, New Urbanism, Norbert Wiener, packet switching, PalmPilot, Panopticon Jeremy Bentham, pattern recognition, peer-to-peer, peer-to-peer model, pez dispenser, planetary scale, pre–internet, prisoner's dilemma, radical decentralization, RAND corporation, recommendation engine, Renaissance Technologies, RFID, Richard Stallman, Robert Metcalfe, Robert X Cringely, Ronald Coase, Search for Extraterrestrial Intelligence, seminal paper, SETI@home, sharing economy, Silicon Valley, skunkworks, slashdot, social intelligence, spectrum auction, Steven Levy, Stewart Brand, the Cathedral and the Bazaar, the scientific method, Tragedy of the Commons, transaction costs, ultimatum game, urban planning, web of trust, Whole Earth Review, Yochai Benkler, zero-sum game

My journey into the universe of peer-to-peer ad-hocracies that combine the powers of computation with the growth capabilities of online social networks started innocently enough, when I stumbled onto a plot to find life in outer space. 3 Computation Nations and Swarm Supercomputers Peer-to-peer networks are composed of personal computers tied together with consumer Internet connections, each node a quantum zone of uncertainty, prone to going offline whenever its owner closes his laptop and chucks it into a shoulder-bag. . . . Peer-to-peer networks aren’t owned by any central authority, nor can they be controlled, killed, or broken by a central authority. Companies and concerns may program and release software for peer-to-peer networking, but the networks that emerge are owned by everyone and no one. They’re faery infrastructure, networks whose maps form weird n-dimensional topologies of surpassing beauty and chaos; mad technological hairballs run by ad-hocracies whose members each act in their own best interests.

The power of peer-to-peer methodology is a human social power, not a mechanical one, rooted in the kind of passion that enthusiasts like Cory Doctorow demonstrate when he says: “In a nutshell, peer-to-peer technology is goddamn wicked. It’s esoteric. It’s unstoppable. It’s way, way cool.” Although Doctorow hadn’t been born when system administrators started receiving tapes in the mail, labeled “Love, Ken,” he was expressing the same spirit that drove Unix and the creation of the Internet and the Web. People don’t just participate in p2p—they believe in it. Hardware and software make it possible, but peer-to-peer technology is potent because it grows from the collective actions of large numbers of people.

Encryption is used to cover the tracks of people making requests and to make it impossible for participants to know exactly what content they are storing on their PCs as part of their contribution to the system. Mojo Nation ceased operations as a commercial enterprise in February 2002, replaced by the noncommercial Mnet project.32 The first peer-to-peer networks linked social networks into cooperative ventures that shared computing cycles, files, and bandwidth. The next generations of p2p sociotechnology include p2p systems that share decisions and judgments. Sheep That Shit Grass Cory Doctorow, thirty-year-old online auction addict, Internet jack-of-all-symbol-manipulating trades, and award-winning science fiction writer, is also the most enthusiastic p2p proponent I’ve met.


pages: 173 words: 14,313

Peers, Pirates, and Persuasion: Rhetoric in the Peer-To-Peer Debates by John Logie

1960s counterculture, Berlin Wall, book scanning, cuban missile crisis, dual-use technology, Fall of the Berlin Wall, Free Software Foundation, Hacker Ethic, Isaac Newton, Marshall McLuhan, moral panic, mutually assured destruction, peer-to-peer, plutocrats, pre–internet, publication bias, Richard Stallman, Search for Extraterrestrial Intelligence, search inside the book, SETI@home, Silicon Valley, slashdot, Steve Jobs, Steven Levy, Stewart Brand, Whole Earth Catalog

For this reason, the core conclusion of Eytan Adar and Bernardo Huberman’s 2000 study of the usage patterns of Gnutella users—that roughly 70 percent of Gnutella users distribute no files— is perhaps not surprising. Thus, while peer-to-peer technologies are rooted in the establishment of level relationships among networked computers (the “peers” in peer-to-peer) the people using peer-to-peer technologies typically pursue imbalanced relationships. As a result, a small subset of peer-to-peer users account for the bulk of the distribution of authorized and unauthorized files to peer-to-peer networks, thereby assuming the bulk of the risks associated with the transmission of these files. It is these users who have earned the right to frame arguments that their activities constitute “sharing.”

The content industries’ arguments to date threaten to disrupt growth and innovation in peer-to-peer technologies, which already offer computer users far more than free, easy access to the latest Top-40 hit. Peer-to-peer networks’ true potential will only be realized once U.S. culture settles on a means of expediting the movement of cultural artifacts into the public domain. The content industries’ continuing positioning of peer-to-peer as an assault on the producers of intellectual property will, inevitably, delay this realization. Too often, those who seek a more principled discussion of the power and potential of peer-to-peer technologies accept and perpetuate the framing of the peer-to-peer debates as war.

By contrast, peer- Pa r l orPr e s s 100 wwwww. p a r l or p r e s s . c om Peers, Pirates, and Persuasion to-peer users who scrupulously avoid making files available to others are not sharing, but taking. The uncritical maintenance of “sharing” as an overarching metaphor for peer-to-peer file transfers distorts the debate. Thus, while advocates of peer-to-peer technologies are right to reject formulations that position them as thieves or pirates by dint of their participation on peer-to-peer networks, they also should acknowledge that peer-topeer transfers are not a form of “sharing” as the term is conventionally understood. Yet the term “file sharing” has become so entrenched that it is used even by those who elsewhere demonstrate real sensitivity to the complexities of ownership and distribution in digital contexts.


pages: 494 words: 142,285

The Future of Ideas: The Fate of the Commons in a Connected World by Lawrence Lessig

AltaVista, Andy Kessler, AOL-Time Warner, barriers to entry, Bill Atkinson, business process, Cass Sunstein, commoditize, computer age, creative destruction, dark matter, decentralized internet, Dennis Ritchie, disintermediation, disruptive innovation, Donald Davies, Erik Brynjolfsson, Free Software Foundation, Garrett Hardin, George Gilder, Hacker Ethic, Hedy Lamarr / George Antheil, history of Unix, Howard Rheingold, Hush-A-Phone, HyperCard, hypertext link, Innovator's Dilemma, invention of hypertext, inventory management, invisible hand, Jean Tirole, Jeff Bezos, John Gilmore, John Perry Barlow, Joseph Schumpeter, Ken Thompson, Kenneth Arrow, Larry Wall, Leonard Kleinrock, linked data, Marc Andreessen, Menlo Park, Mitch Kapor, Network effects, new economy, OSI model, packet switching, peer-to-peer, peer-to-peer model, price mechanism, profit maximization, RAND corporation, rent control, rent-seeking, RFC: Request For Comment, Richard Stallman, Richard Thaler, Robert Bork, Ronald Coase, Search for Extraterrestrial Intelligence, SETI@home, Silicon Valley, smart grid, software patent, spectrum auction, Steve Crocker, Steven Levy, Stewart Brand, systematic bias, Ted Nelson, Telecommunications Act of 1996, the Cathedral and the Bazaar, The Chicago School, tragedy of the anticommons, Tragedy of the Commons, transaction costs, vertical integration, Yochai Benkler, zero-sum game

Even if you type two characters per second on your keyboard, you're using only a fraction of your machine's power. [Distributed computing bands together millions of computers] on the Net to create, with their downtime, ad hoc supercomputers.31 The potential of peer-to-peer technologies reaches far beyond simple file transfer or the sharing of processing cycles. Indeed, as researchers are coming to understand, the most important peer-to-peer technologies could be more efficient caching technologies. A “cache” is simply a copy of content kept close to the user, so that less time is needed to get access to that content. P2P caching solutions imagine using computers at the edge to more efficiently store data.

By increasing the demand for a diverse selection of content, and by enabling the cheaper identification of that demand, the Net widens the range of potential contributors. NEW PARTICIPATION: P2P FINALLY, CONSIDER an innovation that enables a new kind of participation that many have called the next great revolution for the Internet, and that in light of our discussion of e2e will be quite familiar: the emergence of peer-to-peer (P2P) networks.25 A peer-to-peer network is one where the content is being served not by a single central server, but by equal, or “peer,” machines linked across the network. Formally, “p2p is a class of applications that take advantage of resources—storage, cycles, content, human presence—available at the edges of the Internet.”26 In the sense I've described, this was the architecture of the original computers on the Internet—there wasn't a set of central servers that the machines connected to; instead, there was a set of e2e protocols that enabled data to be shared among the machines.

As machines have become more powerful, and as they have become more reliably and permanently connected to the Net, the possibility of using peers to process and forward data on the Net has increased. Peer-to-peer services are returning to the Internet as machines mature and are persistently on the Net. The character of what can happen is changing, and the potential—if left free to develop—is extraordinary. Napster is the most famous peer-to-peer technology, even though it is not exactly peer-to-peer. (There is a central server that keeps a database of who has what; the music itself is kept on other people's machines.) But Napster is the horse and buggy in this transportation system. It is only the beginning. Consider the SETI project. SETI—the Search for Extraterrestrial Intelligence—scans the radio waves for evidence of intelligent life somewhere else in the universe.


pages: 315 words: 93,522

How Music Got Free: The End of an Industry, the Turn of the Century, and the Patient Zero of Piracy by Stephen Witt

4chan, Alan Greenspan, AOL-Time Warner, autism spectrum disorder, barriers to entry, Berlin Wall, big-box store, cloud computing, collaborative economy, company town, crowdsourcing, Eben Moglen, game design, hype cycle, Internet Archive, invention of movable type, inventory management, iterative process, Jason Scott: textfiles.com, job automation, late fees, mental accounting, moral panic, operational security, packet switching, pattern recognition, peer-to-peer, pirate software, reality distortion field, Ronald Reagan, security theater, sharing economy, side project, Silicon Valley, software patent, Stephen Fry, Steve Jobs, Tipper Gore, zero day

See also chat rooms Interpol, 147–48, 213, 217 Interscope Records, 45–50, 73, 77–80, 112–13, 153, 189 Iovine, Jimmy, 45–48, 76–80, 92, 112, 191 IP addresses limits on for Scene members, 160–61, 180 traceability of, 70–71, 160–61, 250–52 iPod device, 155–57, 192–93, 202 iTunes Store, 132–33, 155–58, 189, 192, 205–6, 209, 235–36 Jackson, Michael, 84, 234 Japanese electronics industry, 93, 97, 127, 144 Jay-Z (artist), 103, 112–13, 125, 140, 177, 179, 201, 237–38, 260 Jobs, Steve, 132–33, 155–57, 189, 192–93, 227–28, 235–37 Johnston, James, 16–17, 20–21, 60, 96, 274n Juvenile (artist), 80–81, 200 “Kali” (RNS ringleader) as“Blazini,” “Death, ” 181 Glover’s association with, 108–9, 139–42, 145–46, 148–51, 215–22 law enforcement investigation of, 195–203, 248–52 leadership of RNS by, 106–8, 180–88, 217–20 paranoia of, 147, 217 post-RNS activities of, 251, 262 Saunders’ association with, 179 shutdown of RNS by, 218–22, 249–52 Tai’s association with, 143–45 Kaminska, Izabella, 244–45 Kazaa peer-to-peer network, 160, 165, 209, 225, 252 Knight, Suge, 46–50, 78, 81 KOSDK (RNS participant), 181–88, 220 Laurie Records, 38, 43–44, 199 Led Zeppelin (band), 39–41, 124, 199, 261 Level 3 encoder (L3Enc), 55–56, 62–63, 72–73, 88–89, 91 Lévy, Jean-Bernard, 155, 190 licensing agreements mp3 technology and, 56–58, 90–91, 94, 128–29 music publishing business and, 234 for streaming media, 261 Lil Wayne, 81, 140, 154, 179, 200–202, 226 LimeWire peer-to-peer network, 160, 165, 171, 184, 252 Limp Bizkit, 79, 112, 123 Linde, Henri, 57–63, 93–94, 96, 127–29, 133 “Little Bit O’ Soul” (song), 43–44 Ludacris (artist), 140, 143–44, 148–49, 153, 177 Macintosh systems, mp3 and, 62, 132–33 Mannie Fresh (artist), 81, 154 Marilyn Manson (artist), 77, 79 market research, Morris’s reliance on, 42–50, 156–57, 190, 198–99 Marshall Mathers LP (album), The, 124–25 Messier, Jean-Marie, 122, 155 Metallica (band), 73, 202 Microsoft, 87, 128–30, 133 Middelhoff, Thomas, 116–17, 119 mixtapes, Internet distribution of, 201–2 Mnookin, Seth, 227–29 Mohan, Edward, 248, 251 MojoNation peer-to-peer network, 166–67 Montejano, Richard (RickOne) (OSC leader), 221–22, 248–49 Morris, Doug advertising streaming revenue, 231–38 artists’ relationships with, 112–13, 120–21, 158–59, 191, 229–32 at Atlantic Records, 39–42 bootlegged music and, 84–85 Cash Money records and, 80, 113. 200, 202 earnings of, 189–90, 227, 260 Ertegun and, 39–42, 46, 48, 191, 199, 278n Iovine and, 45–47 Jay-Z and, 103, 237 Jobs and, 155–57, 192–93, 227–28, 235–37 market research skills of, 42–50, 156–57, 190, 198–99, 228–29 MCA Music Entertainment Group and, 75–79 Napster, reaction to, 117–20 payola scandal and, 196–98 PolyGram merger and, 102–3 Project Hubcap lawsuits and, 158–61, 193 rap music expansion and, 148–51, 154–55, 221 as Sony Music CEO, 260 Universal Music Group and, 79–85, 111–12, 153, 155 Vevo and, 232–38, 261 Vivendi merger and, 122–25, 158–59, 189–92, 225–38 as Warner Music Group CEO, 37–38, 42–46, 50–51 Wired magazine interview and, 227–30 Moving Picture Experts Group (MPEG) DVD technology and, 165 mp3 development and, 17–20, 61–62, 94, 97–98, 127, 134 organizational structure of, 274n Philips lobbying of, 20–21 psychoacoustic compression competition held by, 17–19, 53 support of mp2, 5–6, 20–25, 58 mp2 technology MPEG endorsement of, 20–25 popularity of, 5, 53, 192 mp3 technology bootlegged music using, 85, 88–89 Brandenburg’s development of, 2–6, 16, 18–21, 53–58, 128 commercial success of, 87 copy-protectable version of, 90 encoding process, 282n Morris’ reaction to, 117–18, 120–21, 193 MPEG endorsement of, 20 music piracy and, 72–73, 193 patents on, 56–58, 90–91, 93–96, 128–29 player development for, 58–60, 125–26 psychoacoustic research and, 7–16, 128 recording industry resistance to, 5–6, 56–57, 90–92 MPMan player, 97, 259 MTV, 40, 179, 192–93 Murphy, George, 255–58 MUSICAM, 18–21, 24–25, 55, 60–61, 94, 97, 128, 134 Music Explosion (band), 43–44, 123 music festivals, growth of, 233–38, 260–61 music retailers as prerelease source, 144–45, 176–77 price collusion and, 114 sales figures for, 43, 154 music videos, syndication of, 232–38, 260–61 Napster, 244 emergence of, 114–21 impact on recording industry of, 156–57, 244 mp3 technology and, 128, 130–31 peer-to-peer file-sharing and, 160, 165 portable player development and, 125–26 National Hockey League, 54–55 NEET demographic, 209–14 NetFraCk (piracy leader), 72–73 NFO files, Scene’s use of, 140–41, 182, 216, 219 Nicks, Stevie, 41, 45 Nine Inch Nails (band), 77, 208 No Doubt (band), 77, 79 Nominet domain name, 212–14 Ogg Vorbis, 132, 259 Oink’s Pink Palace, 170–74, 205–14, 239–43, 252, 263 Old Skool Classics (OSC) piracy group, 179, 220–22, 248–49 open-source software, 132, 168, 170–71, 259 Operation Buccaneer, 147–48, 162, 194 Operation Fastlink, 162–63, 182, 195, 203, 239, 257–58 organized crime, bootlegged music and, 67–68, 71–74, 83–85 Outkast, 108, 143–44, 148, 179 Pandora, 253, 261 Parker, Sean, 116–17 patent law, mp3 protections and, 95–96 PC systems, mp3 player development and, 55–56, 59, 62, 85 peer-to-peer file-sharing, 114–18, 121–22 lawsuits against, 158–61, 165, 225–26 Napster and, 160, 167 prerelease leaks and, 157–58 quality and distribution problems with, 165–67, 171–72 torrent technology and, 166–70, 226–27 Philips corporation format wars and, 19–20, 59, 67, 94, 97, 134 mp2 promotion by, 20–25, 53 PolyGram division of, 32–33, 78, 82 Seagram purchase of PolyGram from, 82–85, 101 Physical Graffiti (album), 48, 199 Pink Moon (album), 205–6, 240 piracy, origin of term, 278n Pirate Bay torrent site, 168–71, 173, 184, 207, 209, 240, 242–43, 252 Pirate Party, formation of, 242–45 PlayStation piracy, 108, 186 PolyGram division of Philips corporation, 32–33, 78, 82–85, 101, 111–12 EDC takeover of, 191–92, 215 marquee releases at, 136 PolyGram Kings Mountain manufacturing plant closing of, 253 compact disc production at, 27–29 Glover’s employment at, 32–33, 175–76 Interscope distribution deal with, 73, 78 “No Theft Tolerated” standard at, 32 security system at, 67–68, 103–5, 135–39 smuggling activity at, 35, 67, 103–8, 135, 149–51, 176–88 Universal’s acquisition of, 84–85, 101–3 polyphase quadrature filter bank, 19–21 Popp, Harald, 13, 53, 56–59, 88, 93–95, 97–98, 130–31, 134 portable music players, 125–27 Prabhu, Jay, 194–96, 203, 252, 257 prerelease leaks Oink’s Pink Palace and, 209–14 Scene involvement with, 72–73, 139–41, 144–45, 184–88 sources for, 144–45, 157–58, 176–77, 185–88 streaming technology and, 261–62 Pressplay online music store, 119, 157, 228 Project Hubcap lawsuits, 159–60, 166, 193, 225–26 psychoacoustic compression technology AAC applications, 60, 88, 96–98 Brandenburg’s development of, 60, 88 competing research in, 7–17, 128 human speech and, 16 mp2 use of, 5, 20–25 mp3 use of, 7–16, 53–58 MPEG evaluation of, 17–19, 53 studio engineers’ reaction to, 91–92 Zwicker’s contributions to, 7–16, 18–19 publishing rights as revenue stream, 234–38, 260–61 Rabid Neurosis.

The lawsuit sought to obtain an injunction prohibiting the sale of Diamond’s Rio portable digital audio device, and any others like it, suffocating the nascent mp3 player market in the cradle. The second lawsuit, A&M Records vs. Napster, was filed by 18 record companies, including Universal. The suit alleged that Napster was legally responsible for the copyright infringement occurring over its peer-to-peer network, and that the company was liable for damages. The two lawsuits wound through various civil courts and various stages of appeal. Napster peaked at sixty million users, while Diamond’s Rio player was plagued by various design flaws and sold poorly. The lawsuits had a chilling effect on industry R&D.

You could throw your CDs in the garbage and port everything to a pocket-sized hard drive. You’d never have to buy a compact disc again. It all depended on how RIAA vs. Diamond played out. After successive rounds of appeals and counterappeals, the lawsuits came to an end. It was a split decision, with a victory against Napster but a loss against Diamond. Peer-to-peer networks were driven underground, but the mp3 players remained on store shelves. Napster’s servers went offline in July 2001, and, following a mad rush of eleventh-hour downloading, the public had hundreds of millions of mp3 files stranded on their home computers, and no easy way to get them off. The stage was set for a remarkable upheaval, one that would permanently obsolesce the compact disc and catalyze the transformation of a niche technology player into the largest company on earth.


pages: 678 words: 216,204

The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler

affirmative action, AOL-Time Warner, barriers to entry, bioinformatics, Brownian motion, business logic, call centre, Cass Sunstein, centre right, clean water, commoditize, commons-based peer production, dark matter, desegregation, digital divide, East Village, Eben Moglen, fear of failure, Firefox, Free Software Foundation, game design, George Gilder, hiring and firing, Howard Rheingold, informal economy, information asymmetry, information security, invention of radio, Isaac Newton, iterative process, Jean Tirole, jimmy wales, John Markoff, John Perry Barlow, Kenneth Arrow, Lewis Mumford, longitudinal study, machine readable, Mahbub ul Haq, market bubble, market clearing, Marshall McLuhan, Mitch Kapor, New Journalism, optical character recognition, pattern recognition, peer-to-peer, power law, precautionary principle, pre–internet, price discrimination, profit maximization, profit motive, public intellectual, radical decentralization, random walk, Recombinant DNA, recommendation engine, regulatory arbitrage, rent-seeking, RFID, Richard Stallman, Ronald Coase, scientific management, search costs, Search for Extraterrestrial Intelligence, SETI@home, shareholder value, Silicon Valley, Skype, slashdot, social software, software patent, spectrum auction, subscription business, tacit knowledge, technological determinism, technoutopianism, The Fortune at the Bottom of the Pyramid, the long tail, The Nature of the Firm, the strength of weak ties, Timothy McVeigh, transaction costs, vertical integration, Vilfredo Pareto, work culture , Yochai Benkler

See blocked access financial reward, as demotivator, 187-190 Fine-grained goods, 221 First-best preferences, 355 large-audience programming, 355 power of mass media owners, 355 First-best preferences, mass media and, 297, 359, 366, 397, 423, 429, 463 concentration of mass-media power, 297, 397-402, 423, 429-436 large-audience programming, 366-375, 463-464 of mass media owners, 359-365 power of mass media owners, 397-402 Fisher, William (Terry), 40, 245, 498, 526, 720 Fiske, John, 262, 497, 526 Fixed costs, 216 Folding@home project, 168-170 Folk culture, 585 see culture food, commons-research based on, 585 Food security, commons-based research on, 586-608 Formal autonomy theory, 269-272 Formal instruction, 562 Fragmentation of communication, 41, 421, 459-460, 818-819 Franklin, Benjamin, 342 Franks, Charles, 165, 264 Free High School Science Texts (FHSST), 201, 582 Free software, 19-20, 37, 96, 125-132, 202, 247, 573, 762, 803 as competition to market-based business, 247 commons-based welfare development, 573-576 human development and justice, 37 policy on, 762-763 project modularity and granularity, 202 security considerations, 803-807 Freedom, 50, 122, 253, 273, 286, 316, 505, 532 behavioral options, 286-288, 316 cultural, 505-514, 532-533 of commons, 122 property and commons, 273-278 Freenet, 479 Frey, Bruno, 187-188 Friedman, Milton, 82 Friendships, virtual, 637-639 Friendster, 653 Froomkin, Michael, 727, 755 Future, 481, 531 participatory culture, 531-536 public sphere, 481-484 G GCP (Generation Challenge Program), 605 GE (General Electric), 346, 350-351 GM (genetically modified) foods, 590-597 GNU/Linux operating system, 128-131 GPL (General Public License), 126-130, 205 See Also free software, 205 GTLD-MoU document, 754 Games, immersive, 149-150, 263 General Public License (GPL), 126-130, 205 See also fre software, 205 Generation Challenge Program (GCP), 605 Genetically modified (GM) foods, 590-597 Genome@home project, 169 Ghosh, Rishab, 207 Gifts, 226-227 Gilmore, Dan, 393, 470 Glance, Natalie, 447, 461 Global development, 550-554, 584, 609, 627-628, 796 food and agricultural innovation, 584-608 international harmonization, 796-801 medical and pharmaceutical innovation, 609-623 Gnutella, 740 Godelier, Maurice, 215, 226 Golden rice, 599 Goods, information-embedded, 556-558 Google, 153 Gould, Stephen Jay, 64 Government, 52, 339, 356, 426, 473 authoritarian control, 426, 473-480 independence from control of, 339, 356 role of, 52-56 working around authorities, 473-480 Gramsci, Antonio, 506-507 Granovetter, Mark, 189, 638, 641 Granularity, 200-203, 221 of lumpy goods, 221-222 Granularity of participation and, 200-203 Green Revolution, 589-594 Grokster, 742 Growth rates of Web sites, 443, 446 H HDI (Human Development Index), 552-554 HHI (Herfindahl-Hirschman Index), 363 HIV/AIDS, 570-571, 585, 610 Habermas, Jurgen, 333, 338, 367, 508-509, 727 Hampton, Keith, 644 HapMap Project, 621 Hardware, 206, 220, 294, 718 as shareable, lumpy goods, 220-222 infrastructure ownership, 294-295 policy on physical devices, 718-725 Hardware regulations, 718-725 Harmonization, international, 796-801 Harris, Bev, 405, 408-409, 412 Hart, Michael, 164-165, 264 Hayek, Friedrich, 51, 274 Health effects of GM foods, 593-594 Hearst, William Randolph, 365 Heller, Michael, 558 High-production value content, 313, 528-530 Hollings, Fritz, 721-724 Home project, 168-170 Hoover, Herbert, 348 Hopkins Report, 408 Horner, Mark, 201 Huberman, Bernardo, 443, 446 Human Development Index (HDI), 552-554 Human Development Report, 552 Human affairs, technology and, 43-48 Human communicative capacity, 108-112, 194, 217 feasibility conditions for social production, 194-207 pricing, 217 Human community, coexisting with Internet, 664-666 Human contact, online vs. physical, 638-639 Human development and justice, 35-38, 537-628, 542, 550-554, 568, 820-821 commons-based research, 568-583 liberal theories of, 542-549 Human motivation, 21, 183-194, 189, 200, 221, 223 crowding out theory, 223 cultural context of, 189-191 granularity of participation and, 200-203, 221-222 Human welfare, 255, 297, 427, 542, 550, 555, 568 commons-based research, 568-583 commons-based strategies, 550-554 digital divide, 427 freedom from constraint, 297-299 information-based advantages, 555-562 liberal theories of justice, 542-549 Hundt, Reed, 398 Hyperlinking on the Web, 392, 437, 791 as trespass, 791-795 power law distribution of site connections, 437-466 I IAHC (International Ad Hock Committee), 754 IANA (Internet Assigned Numbers Authority), 754 IBM's business strategy, 96, 247-248 ICANN (Internet Corporation for Assigned Names and Numbers), 755 Iconic representations of opinion, 367, 373 Ideal market, 123 Immersive entertainment, 149-150, 263 Implicit knowledge, transfer of, 562 Incentives to produce, 21, 183-194, 189, 200, 221, 223 crowding out theory, 223 cultural context, 189-191 granularity of participation and, 200-203, 221-222 Independence from government control, 339, 356 Independence of Web sites, 203 Individual autonomy, 26-28, 51, 203, 258-322, 269, 278, 279, 309, 506, 815-819 culture and, 506-508 formal conception of, 269-272 independence of Web sites, 203 individual capabilities in, 51-56 information environment, structure of, 278, 279-303 mass media and, 309-310 Individual capabilities and action, 16, 43, 51-56, 108, 195, 238, 513, 545 as modality of production, 238-243 as physical capital, 195-196 coordinated effects of individual actions, 16-18 cultural shift, 513 economic condition and, 545 human capacity as resource, 108 technology and human affairs, 43-48 Individualist methodologies, 47-48 Industrial age, 73, 265 destabilization of, 73 reduction of individual autonomy, 265-266 Industrial ecology of digital environment, 356 emerging role of mass media, 356-358 Industrial model of communication, 16-17, 29, 31, 57-66, 120, 146, 208, 244, 309, 327, 340, 356, 539, 563, 611, 671, 674-807, 679, 685, 695, 803, 808, 825-826 autonomy and, 309-310 barriers to justice, 539-540 emerging role of mass media, 327-330, 340-341, 356-358 enclosure movement, 671-672 information industries, 563-565 mapping, framework for, 685-698 medical innovation and, 611 path dependency, 679-684 relationship with social producers, 244-250 security-related policy, 146-148, 695, 803-807 shift away from, 31-34 stakes of information policy, 808-829 structure of mass media, 327-330 transaction costs, 120, 208-224 Inefficiency of information regulation, 79-87, 100-104, 208-224, 221, 291, 571, 810-813 capacity reallocation, 221-224 property protections, 571 wireless communications policy, 291 Inertness, political, 355, 366-375 Influence exaction, 295-296, 298-300 Information appropriation strategies, 101-103 Information as nonrival, 79-83 Information economy, 11-66, 14, 24, 42, 57, 394, 542 democracy and liberalism, 24-39 effects on public sphere, 394-415 emergence of, 14-23 institutional ecology, 57-66 justice, liberal theories of, 542-549 methodological choices, 42-56 Information flow, 34, 281, 296, 355, 366, 463, 702 controlling with policy routers, 281-284, 296, 355-358, 702 large-audience programming, 355, 366-375, 463-464 limited by mass media, 355-358 Information industries, 563-565 Information overload and Babel objection, 31, 34, 314-323, 419, 424, 429-436, 818-819 Information production, 16, 79, 88, 174, 194, 403, 815 feasibility conditions for social production, 194-207 networked public sphere capacity for, 403-415 nonrivalry, 79-83, 174 physical constraints on, 16-17 strategies of, 88 Information production capital, 21-22, 73, 89, 120, 195, 216, 309 control of, 195-196 cost minimization and benefit maximization, 89 fixed and initial costs, 216 production costs as limiting, 309 transaction costs, 120 Information production economics, 77-117, 88, 100, 105, 114 current production strategies, 88-99 exclusive rights, 100-104, 114-117 production over computer networks, 105-112 Information production inputs, 81, 108, 135-148, 137, 140, 149, 214, 238, 281, 285, 296, 335, 355, 366, 397, 463, 531, 702 NASA Clickworkers project, 137-139 Wikipedia project, 140-148 existing information, 81-83, 108 immersive entertainment, 149-150 individual action as modality, 238-243 large-audience programming, 355, 366-375, 463-464 limited by mass media, 355-358 pricing, 214-219 propaganda, 285, 397-402, 531-536 systematically blocked by policy routers, 281-284, 296, 355-358, 702 universal intake, 335-336, 355-358 Information production, market-based, 83, 95, 120, 208, 244, 522, 529, 613 cultural change, transparency of, 522-526 mass popular culture, 529-530 relationship with social producers, 244-250 transaction costs, 120, 208-224 universities as, 613-616 without property protections, 83-87, 95-99 Information sharing, 175, 216, 218, 294 infrastructure ownership, 294 initial costs, 216 transaction costs, 218-223 Information, defined, 71, 559-560 Information, perfect, 364 Information-embedded goods, 556-558 Information-embedded tools, 558 Innovation, 37, 291, 586, 764 agricultural, commons-based, 586-608 human development, 37-38 software patents and, 764-766 wireless communications policy, 291 Innovation economics, 77-117, 88, 100, 100, 105, 114 current production strategies, 88 exclusive rights, 100-104, 100-104, 114-117 production over computer networks, 105-112 Inputs to production, 81, 108, 135-148, 137, 140, 149, 214, 238, 281, 285, 296, 335, 355, 366, 397, 463, 531, 702 NASA Clickworkers project, 137-139 Wikipedia project, 140-148 existing information, 81-83, 108 immersive entertainment, 149-150 individual action as modality, 238-243 large-audience programming, 355, 366-375, 463-464 limited by mass media, 355-358 pricing, 214-219 propaganda, 285, 397-402, 531-536 systematically blocked by policy routers, 281-284, 296, 355-358, 702 universal intake, 335-336, 355-358 Instant messaging, 647 Institute for One World Health, 619 Institutional ecology of digital environment, 6, 16-17, 27-28, 31, 57-66, 120, 146, 208, 244, 309, 327, 340, 539, 611, 671, 674-807, 679, 685, 695, 803, 808, 824-827 autonomy and, 309-310 barriers to justice, 539-540 emerging role of mass media, 327-330, 340-341 enclosure movement, 671-672 mapping, framework for, 685-698 medical innovation and, 611 path dependency, 679-684 relationship with social producers, 244-250 security-related policy, 146-148, 695, 803-807 shift away from, 31-34 stakes of information policy, 808-829 structure of mass media, 327-330 transaction costs, 120, 208-224 International HapMap Project, 621 International harmonization, 796-801 Internet, 377, 385, 416, 423, 429, 437, 448, 473, 515, 528, 535, 654, 664, 698, 753, 759, 791 Web addresses, 753-758 Web browsers, 759-761 as platform for human connection, 654-658 authoritarian control over, 473-480 centralization of, 423, 429-436 coexisting with human community, 664-666 democratizing effect of, 416-428 democratizing effects of, 377-384 globality of, effects on policy, 698 linking as trespass, 791-795 plasticity of culture, 528-530, 535 power law distribution of site connections, 437-466 strongly connected Web sites, 448-450 technologies of, 385-393 transparency of culture, 515-527 Internet Explorer browser, 759-761 Intrinsic motivations, 187-193 Introna, Lucas, 466 Isolation, 637-639 J Jackson, Jesse, 470 Jedi Saga, The, 261-262 Jefferson, Richard, 606 Joe Einstein model, 91-92, 98, 564 Johanson, Jon, 734 Journalism, undermined by commercialism, 355, 365-375 Justice and human development, 35-38, 537-628, 542, 550, 568, 820-821 commons-based research, 568 commons-based strategies, 550-554 liberal theories of, 542-549 K KDKA Pittsburgh, 345, 346-347 KaZaa, 741-742 Kant, Immanuel, 274 Karma (Slashdot), 157 Keillor, Garrison, 441 Kick, Russ, 203, 464 Know-How model, 95 Knowledge, defined, 562 Koren, Niva Elkin, 40 Kottke, Jason, 455 Kraut, Robert, 638, 644 Kumar, Ravi, 455 Kymlicka, Will, 508 L Laboratories, peer-produced, 622-623 Lakhani, Karim, 207 Lange, David, 63 Large-audience programming, 355, 366-375, 463 susceptibility of networked public sphere, 463-464 Large-circulation press, 342-343 Large-grained goods, 221 Last mile (wireless), 709-714 Layers of institutional ecology, 676-677, 685-698, 691, 696, 767, 823-825 content layer, 676-677, 691, 696, 767-802, 823-825 physical layer, 691, 823-825 see also logical layer of institutional ecology, 691 Learning networks, 91-92, 95, 218 Lemley, Mark, 705, 779 Lerner, Josh, 83, 207 Lessig, Lawrence (Larry), 40, 63, 434, 498, 501, 678, 705 Liberal political theory, 49-51, 502, 532 cultural freedom, 502-514, 532-533 Liberal societies, 24-39, 26, 31, 35, 40, 331, 542 autonomy, 26-29 critical culture and social relations, 40 design of public sphere, 331-339 justice and human development, 35 public sphere, shift from mass media, 31-34 theories of justice, 542-549 Licensing, 126, 205, 346, 598, 778 GPL (General Public License), 126-130, 205 agricultural biotechnologies, 598-608 radio, 346-349 shrink-wrap (contractual enclosure), 778-781 Limited intake of mass media, 355-358 Limited sharing networks, 91-92, 98-99 Limited-access common resources, 122 Lin, Nan, 189 Linking on the Web, 392, 437, 791 as trespass, 791-795 power law distribution of site connections, 437-466 Linux operating system, 130 Litman, Jessica, 63, 74, 501, 771 Local clusters in network topology, 34 Logical layer of institutional ecology, 171, 522, 671, 676, 691, 696, 726-766, 729, 737-752, 753, 759, 762, 782, 787, 796, 805, 823 DMCA (Digital Millennium Copyright Act), 671, 729-736 Web browsers, 759-761 database protection, 787-790 domain name system, 753-758 free software policies, 762-763 international harmonization, 796-801 peer-to-peer networks, 171-175, 805-806 recent changes, 696 trademark dilutation, 522, 782-786 Loneliness, 637-639 Loose affiliations, 27-28, 631, 642, 649-653 Los Alamos model, 91-92, 98 Lott, Trent, 461, 470 Lowest-common-denominator programming, 355, 367-375, 463-464 Lucas, George, 261-262 Luck, justice and, 543-545 Lumpy goods, 220-222 Luther, Martin, 64 M MIT's Open Courseware Initiative, 582 MMOGs (massive multiplayer online games), 149, 263 MP3.com, 739, 744 MSF (Medecins San Frontieres), 614 Mailing lists (electronic), 387 Management, changing relationships of, 247-250 Mangabeira Unger, Roberto, 266 Manipulating perceptions of others, 281-288, 285, 295, 298, 315-316, 397, 531 influence exaction, 295-296, 298-300 with propaganda, 285, 397-402, 531-536 Marconi, 346 Market reports, access to, 561 Market transactions, 211-214 Market-based information producers, 83, 95, 120, 208, 244, 522, 529, 529, 613 cultural change, transparency of, 522-526 mass popular culture, 529-530, 529-530 relationship with social producers, 244-250 transaction costs, 120, 208-224 universities as, 613-616 without property protections, 83-87, 95-99 Marshall, Josh, 398, 445, 470 Marx, Karl, 274, 505 Mass media, 327, 327, 340, 352, 353, 353, 397 as platform for public sphere, 327-330, 340-341, 352, 353-356 basic critiques of, 353-375 commercial platform for public sphere, 327-330 corrective effects of network environment, 397-402 structure of, 327-330 Mass media, political freedom and, 323-376, 331, 340, 353-375, 357 commercial platform for public sphere, 340-341, 357-358 design characteristics of liberal public sphere, 331-339 Massive multiplayer games, 149, 263 McChesney, Robert, 352 McHenry, Robert, 141 McLuhan, Marshall, 45 McVeigh, Timothy (sailor), 652 Medecins Sans Frontieres, 614 Media concentration, 297, 397, 423, 429-436 corrective effects of network environment, 397-402 Medicines, commons-based research on, 609-623 Medium of exchange, 214-219 Medium-grained goods, 221 Meetup.com site, 653 Metamoderation (Slashdot), 159-160 Methodological individualism, 48 Mickey model, 90-93 Microsoft Corporation, 759, 794 browser wars, 759-761 sidewalk.com, 794 Milgram, Stanley, 454 Misfortune, justice and, 543-545 Mobile phones, 393, 651, 709 open wireless networks, 709-714 Modularity, 200-203 Moglen, Eben, 20, 112, 748 Monetary constraints on information production, 21-23, 73, 89, 120, 195, 216, 309 control of, 195-196 cost minimization and benefit maximization, 89 fixed and initial costs, 216 production costs as limiting, 309 transaction costs, 120 Money, 89, 187, 214, 309, 420, 462 as demotivator, 187-190 as dominant factor, 420 centralization of communications, 462-466 cost minimization and benefit maximization, 89 cost of production as limiting, 309 crispness of currency exchange, 214-219 Monitoring, authoritarian, 426 Monopoly, 290, 345, 351, 371, 473, 611 authoritarian control, 473-480 breadth of programming under, 371 medical research and innovation, 611 radio broadcasting, 345, 351-352 wired environment as, 290 Moore, Michael, 360 Motivation to produce, 21-22, 183-194, 189, 200-203, 221, 223 crowding out theory, 223 cultural context, 189-191 granularity of participation and, 221-222 Moulitas, Markos, 398 Mumford, Lewis, 45 Municipal broadband initiatives, 715-717 Murdoch, Rupert, 365 Music industry, 106-107, 171, 733, 747-750, 777 DMCA violations, 733 digital sampling, 777 peer-to-peer networks and, 171-172 MyDD.com site, 398 N NASA Clickworkers, 137-139 NBC (National Broadcasting Company), 351 NIH (National Institutes of Health), 579 NSI (Network Solutions. Inc.), 754-755 Napster, 739-740 see also peer-to-peer networks, 739 Negroponte, Nicholas, 430 Neighborhood relations, strengthening of, 631, 642-647 Nelson, W. R., 367 Netanel, Neil, 425, 468 Netscape and browser wars, 760 Network topology, 171, 179, 278, 279, 319, 392, 437, 448, 451, 455, 737, 791, 805 autonomy and, 278, 279-303 emergent ordered structure, 455-460 linking as trespass, 791-795 moderately linked sites, 451 peer-to-peer networks, 171-175, 737-752, 805 power law distribution of site connections, 437-466 quoting on Web, 392 repeater networks, 179-180 strongly connected Web sites, 448-450 Networked environment policy, 14-66, 14, 24, 57, 394, 542 democracy and liberalism, 24-39 effects on public sphere, 394-415 emergence of, 14-23 institutional ecology, 57-66 justice, liberal theories of, 542-549 Networked environmental policy.

Using Networked Communication to Work Around Authoritarian Control Toward a Networked Public Sphere Chapter 8 - Cultural Freedom: A Culture Both Plastic and Critical Cultural Freedom in Liberal Political Theory The Transparency of Internet Culture The Plasticity of Internet Culture: the Future of High-Production-Value Folk Culture A Participatory Culture: Toward Policy Chapter 9 - Justice and Development Liberal Theories of Justice and the Networked Information Economy Commons-Based Strategies for Human Welfare and Development Information-Embedded Goods and Tools, Information, and Knowledge Industrial Organization of Hdi-Related Information Industries Toward Adopting Commons-Based Strategies for Development Software Scientific Publication Commons-Based Research for Food and Medicines Food Security: Commons-Based Agricultural Innovation Access to Medicines: Commons-Based Strategies for Biomedical Research Commons-Based Strategies for Development: Conclusion Chapter 10 - Social Ties: Networking Together From "Virtual Communities" to Fear of Disintegration A More Positive Picture Emerges over Time Users Increase Their Connections with Preexisting Relations Networked Individuals The Internet As a Platform for Human Connection The Emergence of Social Software The Internet and Human Community Part Three - Policies of Freedom at a Moment of Transformation Introduction Chapter 11 - The Battle Over the Institutional Ecology of the Digital Environment Institutional Ecology and Path Dependence A Framework for Mapping the Institutional Ecology The Physical Layer Transport: Wires and Wireless Devices The Logical Layer The Digital Millennium Copyright Act of 1998 The Battle over Peer-to-Peer Networks The Domain Name System: From Public Trust to the Fetishism of Mnemonics The Browser Wars Free Software Software Patents The Content Layer Copyright Contractual Enclosure: Click-Wrap Licenses and the Uniform Computer Information Transactions Act (UCITA) Trademark Dilution Database Protection Linking and Trespass to Chattels: New Forms of Information Exclusivity International "Harmonization" Countervailing Forces The Problem of Security Chapter 12 - Conclusion: The Stakes of Information Law and Policy Blurb Endnotes Index Copyright © 2006 Yochai Benkler.

These networks of sharing are much less "mysterious," in terms of understanding the human motivation behind participation. Nevertheless, they provide important lessons about the extent to which large-scale collaboration among strangers or loosely affiliated users can provide effective communications platforms. For fairly obvious reasons, we usually think of peer-to-peer networks, beginning with Napster, as a "problem." This is because they were initially overwhelmingly used to perform an act that, by the analysis of almost any legal scholar, was copyright infringement. To a significant extent, they are still used in this form. There were, and continue to be, many arguments about whether the acts of the firms that provided peer-to-peer software were responsible for the violations.


pages: 375 words: 88,306

The Sharing Economy: The End of Employment and the Rise of Crowd-Based Capitalism by Arun Sundararajan

"World Economic Forum" Davos, additive manufacturing, Airbnb, AltaVista, Amazon Mechanical Turk, asset light, autonomous vehicles, barriers to entry, basic income, benefit corporation, bike sharing, bitcoin, blockchain, book value, Burning Man, call centre, Carl Icahn, collaborative consumption, collaborative economy, collective bargaining, commoditize, commons-based peer production, corporate social responsibility, cryptocurrency, data science, David Graeber, distributed ledger, driverless car, Eben Moglen, employer provided health coverage, Erik Brynjolfsson, Ethereum, ethereum blockchain, Frank Levy and Richard Murnane: The New Division of Labor, future of work, general purpose technology, George Akerlof, gig economy, housing crisis, Howard Rheingold, independent contractor, information asymmetry, Internet of things, inventory management, invisible hand, job automation, job-hopping, John Zimmer (Lyft cofounder), Kickstarter, knowledge worker, Kula ring, Lyft, Marc Andreessen, Mary Meeker, megacity, minimum wage unemployment, moral hazard, moral panic, Network effects, new economy, Oculus Rift, off-the-grid, pattern recognition, peer-to-peer, peer-to-peer lending, peer-to-peer model, peer-to-peer rental, profit motive, public intellectual, purchasing power parity, race to the bottom, recommendation engine, regulatory arbitrage, rent control, Richard Florida, ride hailing / ride sharing, Robert Gordon, Ronald Coase, Ross Ulbricht, Second Machine Age, self-driving car, sharing economy, Silicon Valley, smart contracts, Snapchat, social software, supply-chain management, TaskRabbit, TED Talk, the long tail, The Nature of the Firm, total factor productivity, transaction costs, transportation-network company, two-sided market, Uber and Lyft, Uber for X, uber lyft, universal basic income, Vitalik Buterin, WeWork, Yochai Benkler, Zipcar

These include conversations with: Neha Gondal about the sociology of the sharing economy; Ravi Bapna, Verena Butt d’Espous, Juan Cartagena, Chris Dellarocas, Alok Gupta, and Sarah Rice about trust; Paul Daugherty, Peter Evans, Geoffrey Parker, Anand Shah, Marshall Van Alstyne, and Bruce Weinelt about platforms; Brad Burnham, Kanyi Maqubela, Simon Rothman, Craig Shapiro, and Albert Wenger about venture capital; Janelle Orsi, Nathan Schreiber, and Trebor Scholz about cooperatives; Umang Dua, Oisin Hanrahan, Micah Kaufmann, and Juho Makkonen about marketplace models; Gene Homicki about alternative rental models; Primavera De Filipi and Matan Field about the blockchain and decentralized peer-to-peer technologies; Ashwini Chhabra, Molly Cohen, Althea Erickson, David Estrada, Nick Grossman, David Hantman, Alex Howard, Meera Joshi, Veronica Juarez, Chris Lehane, Mike Masserman, Padden Murphy, Joseph Okpaku, Brooks Rainwater, April Rinne, Sofia Ranchordas, Michael Simas, Jessica Singleton, Adam Thierer, and Bradley Tusk about regulation; Elena Grewal, Kevin Novak, and Chris Pouliot about the use of data science in the sharing economy; Nellie Abernathy, Cynthia Estlund, Steve King, Wilma Liebman, Marysol McGee, Brian Miller, Michelle Miller, Caitlin Pearce, Libby Reder, Julie Samuels, Kristin Sharp, Dan Teran, Felicia Wong, and Marco Zappacosta about the future of work.

The “crowd”—manifested by a distributed and partially replicated index, and not a centralized server—matched a peer looking for a song with the peer who had the song. Every subsequent successful peer-to-peer filesharing network uses some variant of this decentralized, replicated indexing approach. And in 2009, the emergence of the digital currency Bitcoin demonstrated a significant step forward in decentralized peer-to-peer technology by decentralizing and distributing not merely an index but an actual anonymized ledger of financial transactions, the blockchain. When combined with peer-to-peer filesharing technologies, cryptographic techniques, and a novel incentive system, Bitcoin showed how a blockchain-based system could be used as the basis for trusted peer-to-peer transactions without a third-party intermediary, instead using the crowd—a decentralized network of “verifiers”—to clear transactions.

Owyang’s Collaborative Economy Honeycomb also clearly illustrates that as much as the sharing economy is being used to fuel pure sharing and micro-enterprises, larger corporations also embrace it. Today’s crowd-based capitalism appears to create new institutions for organizing economic activity that offer value for people across the economic spectrum both as consumers and producers. The same may be true for the new generation of decentralized peer-to-peer technologies that are the subject of our next chapter. Figure 3.3 Collaborative Economy Honeycomb. Notes 1. Thomas W. Malone, Joanne Yates, and Robert I. Benjamin, “Electronic Markets and Electronic Hierarchies,” Communications of the ACM 30, 6 (1987): 484–497. 2. I personally recall seeing the trade of cassette tapes with recordings of Bob Dylan concerts from the Usenet (now Google) group rec.music.dylan, mediated by influential group members who provided an early form of the idea of “peer regulation” that I discuss in chapter 6. 3.


pages: 568 words: 164,014

Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat by John P. Carlin, Garrett M. Graff

1960s counterculture, A Declaration of the Independence of Cyberspace, Aaron Swartz, air gap, Andy Carvin, Apple II, Bay Area Rapid Transit, bitcoin, Brian Krebs, business climate, cloud computing, cotton gin, cryptocurrency, data acquisition, Deng Xiaoping, disinformation, driverless car, drone strike, dual-use technology, eat what you kill, Edward Snowden, fake news, false flag, Francis Fukuyama: the end of history, Hacker Ethic, information security, Internet of things, James Dyson, Jeff Bezos, John Gilmore, John Markoff, John Perry Barlow, Ken Thompson, Kevin Roose, Laura Poitras, Mark Zuckerberg, Menlo Park, millennium bug, Minecraft, Mitch Kapor, moral hazard, Morris worm, multilevel marketing, Network effects, new economy, Oklahoma City bombing, out of africa, packet switching, peer-to-peer, peer-to-peer model, performance metric, RAND corporation, ransomware, Reflections on Trusting Trust, Richard Stallman, Robert Metcalfe, Ronald Reagan, Saturday Night Live, self-driving car, shareholder value, side project, Silicon Valley, Silicon Valley startup, Skype, Snapchat, South China Sea, Steve Crocker, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Stuxnet, The Hackers Conference, Tim Cook: Apple, trickle-down economics, Wargames Reagan, Whole Earth Catalog, Whole Earth Review, WikiLeaks, Y2K, zero day, zero-sum game

Infected machines kept a constantly updated list of other infected machines. If one device sensed that its connection with the command server had been interrupted, it relied on the peer-to-peer network to find a new command server. The network, in effect, was designed from the start to be takedown-proof; as soon as one command server was knocked offline, the botnet owner could just set up a new server somewhere else and redirect the peer-to-peer network to it. The new version became known as GameOver Zeus, after one of its file names, gameover2.php. The name also lent itself naturally to gallows humor: once this thing infected your computer, went a joke among security experts, it was game over for your bank accounts.

The solution to peer-to-peer file-sharing required the industry to look at their business model and figure out a way to use new technology to provide people what they wanted at a reasonable price and with a reasonable ease of use. What ultimately helped address—at least to an extent—the scourge of peer-to-peer networks was the arrival and growth of the iTunes store, a new tool that allowed users to securely buy music, television shows, and movies digitally with confidence that they were getting what they paid for. It’s a lesson that I carried forward over the next dozen years as I continued on in cybercrime and cybersecurity.

They carefully studied the previous European effort, identifying where it had failed, and spent a year preparing their offensive. In January 2013, they were ready: they stocked up on pizza, assuming they were in for a long siege against Slavik’s network. (When you go against a botnet, Werner says, “you have one shot. It either goes right or wrong.”) Their plan was to reroute GameOver’s peer-to-peer network, centralize it, and then redirect the traffic to a new server under their control—a process known as “sinkholing.” In doing so, they hoped to sever the botnet’s communication link to Slavik. And at first, everything went well. Slavik showed no signs of fighting back, and Werner and Stone-Gross watched as more and more infected computers connected to their sinkhole by the hour.


Bit by Bit: How P2P Is Freeing the World by Jeffrey Tucker

Affordable Care Act / Obamacare, Airbnb, airport security, altcoin, anti-fragile, bank run, bitcoin, blockchain, business cycle, crowdsourcing, cryptocurrency, disintermediation, distributed ledger, Dogecoin, driverless car, Fractional reserve banking, George Gilder, Google Hangouts, informal economy, invisible hand, Kickstarter, litecoin, Lyft, Money creation, obamacare, Occupy movement, peer-to-peer, peer-to-peer lending, public intellectual, QR code, radical decentralization, ride hailing / ride sharing, Ross Ulbricht, Satoshi Nakamoto, sharing economy, Silicon Valley, Skype, systems thinking, tacit knowledge, TaskRabbit, the payments system, uber lyft

Observe how central the payment system is to the monetary system he created: A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the doublespending problem using a peer-to-peer network. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power.

What if the traditional barriers of physical space can be gradually overcome so that we have to depend ever less on third-party legacy institutions to manage our lives and facilitate our associations? What if spontaneous individual associations come to replace nation-states as the organizing principle of the global economy? These are the core hopes of Jeffrey Tucker’s inspiring reflection on the theory, application, and meaning of peer-to-peer technology. He draws attention to the most impressive feature of the digital revolution: equipotency, or the equal distribution of power through technological innovation. Equipotency is an extension of the universal right to self-determination. It is necessarily disruptive to traditional forms of power.

If you are new to these concepts, this book is a great place to start, and if you have already been pondering this subject for a while, you will find lots of interesting new insights. It is fantastic for those who are new to bitcoin and early adopters alike. Either way, the reader is sure to be intrigued by what he or she finds in this book. Roger Ver Tokyo, Japan January 1, 2015 Credits This reflection on new trends in peer-to-peer technology and their relationship to human freedom consists of observations, reflections, anecdotes, and incomplete impressions based on what I’ve seen and experienced as a writer, editor, site builder, and consumer over the last few remarkable years. Many of the ideas were tested in venues such as FEE.org (the Foundation for Economic Education), Liberty.me (the liberty-minded social and publishing network), and emerge from two years of interacting with others through speaking events, social engagement, and interviews.


pages: 271 words: 52,814

Blockchain: Blueprint for a New Economy by Melanie Swan

23andMe, Airbnb, altcoin, Amazon Web Services, asset allocation, banking crisis, basic income, bioinformatics, bitcoin, blockchain, capital controls, cellular automata, central bank independence, clean water, cloud computing, collaborative editing, Conway's Game of Life, crowdsourcing, cryptocurrency, data science, digital divide, disintermediation, Dogecoin, Edward Snowden, en.wikipedia.org, Ethereum, ethereum blockchain, fault tolerance, fiat currency, financial innovation, Firefox, friendly AI, Hernando de Soto, information security, intangible asset, Internet Archive, Internet of things, Khan Academy, Kickstarter, Large Hadron Collider, lifelogging, litecoin, Lyft, M-Pesa, microbiome, Neal Stephenson, Network effects, new economy, operational security, peer-to-peer, peer-to-peer lending, peer-to-peer model, personalized medicine, post scarcity, power law, prediction markets, QR code, ride hailing / ride sharing, Satoshi Nakamoto, Search for Extraterrestrial Intelligence, SETI@home, sharing economy, Skype, smart cities, smart contracts, smart grid, Snow Crash, software as a service, synthetic biology, technological singularity, the long tail, Turing complete, uber lyft, unbanked and underbanked, underbanked, Vitalik Buterin, Wayback Machine, web application, WikiLeaks

The censorship issue is that in a URL such as google.com, centralized authorities control the top-level domain, the .com portion (the United States controls .com URLs), and therefore can potentially seize and redirect the URL. Centralized authorities control all top-level domains; for example, China controls all .cn domains. Therefore, a decentralized DNS means that top-level domains can exist that are not controlled by anyone, and they have DNS lookup tables shared on a peer-to-peer network. As long as there are volunteers running the decentralized DNS server software, alternative domains registered in this system can be accessed. Authorities cannot impose rules to affect the operation of a well-designed and executed global peer-to-peer top-level domain. The same Bitcoin structure is used in the implementation of a separate blockchain and coin, Namecoin, for decentralized DNS.

An interesting challenge for academic publishing on the blockchain is not just having an open-access, collaboratively edited, ongoing-discussion-forum journal per existing examples, or open-access, self-published blockchain white papers on GitHub, but to more fundamentally implement the blockchain concepts in blockchain journals. The consideration of what a decentralized direct peer-to-peer model for academic publishing could look like prompts the articulation of the functions that academic publishing provides and how, if these are still required, they might be provided in decentralized models. In terms of “publishing,” any manner of making content publicly available on the Web is publishing; one can easily self-publish on blogs, wikis, Twitter, Amazon, and the like.

In terms of “publishing,” any manner of making content publicly available on the Web is publishing; one can easily self-publish on blogs, wikis, Twitter, Amazon, and the like. A blockchain model in terms of decentralized peer-to-peer content would be nothing more than a search engine linking one individual’s interests with another’s published material. This is a decentralized peer-to-peer model in the blockchain sense. So, academic (and other publishers) might be providing some other value functions, namely vouching for content quality. Publishers provide content curation, discovery, “findability,” relevancy, advocacy, validation, and status ascribing, all of which might be useful attributes for content consumers.


pages: 515 words: 126,820

Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World by Don Tapscott, Alex Tapscott

"World Economic Forum" Davos, Airbnb, altcoin, Alvin Toffler, asset-backed security, autonomous vehicles, barriers to entry, behavioural economics, bitcoin, Bitcoin Ponzi scheme, blockchain, Blythe Masters, Bretton Woods, business logic, business process, buy and hold, Capital in the Twenty-First Century by Thomas Piketty, carbon credits, carbon footprint, clean water, cloud computing, cognitive dissonance, commoditize, commons-based peer production, corporate governance, corporate social responsibility, creative destruction, Credit Default Swap, crowdsourcing, cryptocurrency, currency risk, decentralized internet, digital capitalism, disintermediation, disruptive innovation, distributed ledger, do well by doing good, Donald Trump, double entry bookkeeping, driverless car, Edward Snowden, Elon Musk, Erik Brynjolfsson, Ethereum, ethereum blockchain, failed state, fiat currency, financial innovation, Firefox, first square of the chessboard, first square of the chessboard / second half of the chessboard, future of work, Future Shock, Galaxy Zoo, general purpose technology, George Gilder, glass ceiling, Google bus, GPS: selective availability, Hacker News, Hernando de Soto, Higgs boson, holacracy, income inequality, independent contractor, informal economy, information asymmetry, information security, intangible asset, interest rate swap, Internet of things, Jeff Bezos, jimmy wales, Kickstarter, knowledge worker, Kodak vs Instagram, Lean Startup, litecoin, Lyft, M-Pesa, Marc Andreessen, Mark Zuckerberg, Marshall McLuhan, means of production, microcredit, mobile money, money market fund, Neal Stephenson, Network effects, new economy, Oculus Rift, off grid, pattern recognition, peer-to-peer, peer-to-peer lending, peer-to-peer model, performance metric, Peter Thiel, planetary scale, Ponzi scheme, prediction markets, price mechanism, Productivity paradox, QR code, quantitative easing, radical decentralization, ransomware, Ray Kurzweil, renewable energy credits, rent-seeking, ride hailing / ride sharing, Ronald Coase, Ronald Reagan, Salesforce, Satoshi Nakamoto, search costs, Second Machine Age, seigniorage, self-driving car, sharing economy, Silicon Valley, Skype, smart contracts, smart grid, Snow Crash, social graph, social intelligence, social software, standardized shipping container, Stephen Hawking, Steve Jobs, Steve Wozniak, Stewart Brand, supply-chain management, systems thinking, TaskRabbit, TED Talk, The Fortune at the Bottom of the Pyramid, The Nature of the Firm, The Soul of a New Machine, The Wisdom of Crowds, transaction costs, Turing complete, Turing test, Tyler Cowen, Uber and Lyft, uber lyft, unbanked and underbanked, underbanked, unorthodox policies, vertical integration, Vitalik Buterin, wealth creators, X Prize, Y2K, Yochai Benkler, Zipcar

Traditionally, when making online payments, we solve the double-spend problem by clearing every transaction through the central databases of one or many third parties, such as a money transfer service (like Western Union), a commercial bank (Citicorp), a government body (Commonwealth Bank of Australia), a credit card company (Visa), or an online payment platform (PayPal). Settlement can take days or even weeks in some parts of the world. Breakthrough: Satoshi leveraged an existing distributed peer-to-peer network and a bit of clever cryptography to create a consensus mechanism that could solve the double-spend problem as well as, if not better than, a trusted third party. On the bitcoin blockchain, the network time-stamps the first transaction where the owner spends a particular coin and rejects subsequent spends of the coin, thus eliminating a double spend.

“Consensus is a social process,” blogged Vitalik Buterin, pioneer of the Ethereum blockchain. “Human beings are fairly good at engaging in consensus . . . without any help from algorithms.” He explained that, once a system scales beyond an individual’s ability to do the math, people turn to software agents. In peer-to-peer networks, the consensus algorithm divvies up the right to update the status of the network, that is, to vote on the truth. The algorithm doles out this right to a group of peers who constitute an economic set, a set that has skin in the game, so to speak. According to Buterin, what’s important about this economic set is that its members are securely distributed: no single member or cartel should be able to overtake a majority, even if they had the means and incentive to do so.7 To achieve consensus, the bitcoin network uses what’s called a proof of work (PoW) mechanism.

Where did these diamonds come from? Trust is the sine qua non of the digital economy, and a platform for secure and reliable mass collaboration holds many possibilities for a new kind of organization and society. 2. Distributed Power Principle: The system distributes power across a peer-to-peer network with no single point of control. No single party can shut the system down. If a central authority manages to black out or cut off an individual or group, the system will still survive. If over half the network attempts to overwhelm the whole, everyone will see what’s happening. Problem to Be Solved: In the first era of the Internet, any large institution with a large established base of users, be they employees, citizens, customers, or other organizations, thought little of their social contract.


pages: 332 words: 93,672

Life After Google: The Fall of Big Data and the Rise of the Blockchain Economy by George Gilder

23andMe, Airbnb, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, Albert Einstein, AlphaGo, AltaVista, Amazon Web Services, AOL-Time Warner, Asilomar, augmented reality, Ben Horowitz, bitcoin, Bitcoin Ponzi scheme, Bletchley Park, blockchain, Bob Noyce, British Empire, Brownian motion, Burning Man, business process, butterfly effect, carbon footprint, cellular automata, Claude Shannon: information theory, Clayton Christensen, cloud computing, computer age, computer vision, crony capitalism, cross-subsidies, cryptocurrency, Danny Hillis, decentralized internet, deep learning, DeepMind, Demis Hassabis, disintermediation, distributed ledger, don't be evil, Donald Knuth, Donald Trump, double entry bookkeeping, driverless car, Elon Musk, Erik Brynjolfsson, Ethereum, ethereum blockchain, fake news, fault tolerance, fiat currency, Firefox, first square of the chessboard, first square of the chessboard / second half of the chessboard, floating exchange rates, Fractional reserve banking, game design, Geoffrey Hinton, George Gilder, Google Earth, Google Glasses, Google Hangouts, index fund, inflation targeting, informal economy, initial coin offering, Internet of things, Isaac Newton, iterative process, Jaron Lanier, Jeff Bezos, Jim Simons, Joan Didion, John Markoff, John von Neumann, Julian Assange, Kevin Kelly, Law of Accelerating Returns, machine translation, Marc Andreessen, Mark Zuckerberg, Mary Meeker, means of production, Menlo Park, Metcalfe’s law, Money creation, money: store of value / unit of account / medium of exchange, move fast and break things, Neal Stephenson, Network effects, new economy, Nick Bostrom, Norbert Wiener, Oculus Rift, OSI model, PageRank, pattern recognition, Paul Graham, peer-to-peer, Peter Thiel, Ponzi scheme, prediction markets, quantitative easing, random walk, ransomware, Ray Kurzweil, reality distortion field, Recombinant DNA, Renaissance Technologies, Robert Mercer, Robert Metcalfe, Ronald Coase, Ross Ulbricht, Ruby on Rails, Sand Hill Road, Satoshi Nakamoto, Search for Extraterrestrial Intelligence, self-driving car, sharing economy, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, Singularitarianism, Skype, smart contracts, Snapchat, Snow Crash, software is eating the world, sorting algorithm, South Sea Bubble, speech recognition, Stephen Hawking, Steve Jobs, Steven Levy, Stewart Brand, stochastic process, Susan Wojcicki, TED Talk, telepresence, Tesla Model S, The Soul of a New Machine, theory of mind, Tim Cook: Apple, transaction costs, tulip mania, Turing complete, Turing machine, Vernor Vinge, Vitalik Buterin, Von Neumann architecture, Watson beat the top human players on Jeopardy!, WikiLeaks, Y Combinator, zero-sum game

All of them shared and re-enforced each other’s frustration with Silicon Valley’s software obsession and abandonment of manufacturing. And all of them soon came to see this abandonment as a gigantic opportunity. CHAPTER 11 The Heist In January 2009, Satoshi Nakamoto announced “the first release of Bitcoin, a new electronic cash system that uses a peer-to-peer network to prevent double-spending. It’s completely decentralized with no server or central authority.” He went on to specify: Total circulation will be 21,000,000 coins. It’ll be distributed to network nodes when they make blocks, with the amount cut in half every 4 years. first 4 years: 10,500,000 coins next 4 years: 5,250,000 coins next 4 years: 2,625,000 coins next 4 years: 1,312,500 coins etc . . .

If anyone is in control of bitcoin, its distributed security model fails. Satoshi would become just another dreaded “Trusted Third Party,” subject to subpoena by repressive governments or hacked by determined nerds or pirates. Satoshi explained: “Governments are good at cutting off the heads of centrally controlled networks like Napster, but pure peer-to-peer networks like Gnutella [music] and Tor [The Onion Router for encrypted email and video] seem to be holding their own.” Indeed, earlier in the century, the Tor system, originated in the NSA and developed by the entrepreneur Bram Cohen, comprised close to half of all Internet bits. Tor takes a video file, for example, and splits it up, peer to peer, across as many as seven thousand computers on the Net.

Having won more glowing recommendations, he then ascended to the summit of computer science studies in the United States—doctoral studies at Princeton during the school year and Stanford in the summers. Ali’s mentor at Princeton, the computer scientist-cryptographer Michael Freedman, had worked for two decades on the theory and practice of peer-to-peer networks. He was the co-author of two chapters in the standard textbook Peer to Peer,6 and, with Martin Casado, an author of the canonical “open-flow” software-defined networking (SDN) paper. Today he is chief technical officer of TimescaleDB, an acclaimed open-source time-series database. Ali thanks Freedman for “thinking through every detail of various distributed systems problems with me.


pages: 565 words: 151,129

The Zero Marginal Cost Society: The Internet of Things, the Collaborative Commons, and the Eclipse of Capitalism by Jeremy Rifkin

3D printing, active measures, additive manufacturing, Airbnb, autonomous vehicles, back-to-the-land, benefit corporation, big-box store, bike sharing, bioinformatics, bitcoin, business logic, business process, Chris Urmson, circular economy, clean tech, clean water, cloud computing, collaborative consumption, collaborative economy, commons-based peer production, Community Supported Agriculture, Computer Numeric Control, computer vision, crowdsourcing, demographic transition, distributed generation, DIY culture, driverless car, Eben Moglen, electricity market, en.wikipedia.org, Frederick Winslow Taylor, Free Software Foundation, Garrett Hardin, general purpose technology, global supply chain, global village, Hacker Conference 1984, Hacker Ethic, industrial robot, informal economy, information security, Intergovernmental Panel on Climate Change (IPCC), intermodal, Internet of things, invisible hand, Isaac Newton, James Watt: steam engine, job automation, John Elkington, John Markoff, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, Julian Assange, Kickstarter, knowledge worker, longitudinal study, low interest rates, machine translation, Mahatma Gandhi, manufacturing employment, Mark Zuckerberg, market design, mass immigration, means of production, meta-analysis, Michael Milken, mirror neurons, natural language processing, new economy, New Urbanism, nuclear winter, Occupy movement, off grid, off-the-grid, oil shale / tar sands, pattern recognition, peer-to-peer, peer-to-peer lending, personalized medicine, phenotype, planetary scale, price discrimination, profit motive, QR code, RAND corporation, randomized controlled trial, Ray Kurzweil, rewilding, RFID, Richard Stallman, risk/return, Robert Solow, Rochdale Principles, Ronald Coase, scientific management, search inside the book, self-driving car, shareholder value, sharing economy, Silicon Valley, Skype, smart cities, smart grid, smart meter, social web, software as a service, spectrum auction, Steve Jobs, Stewart Brand, the built environment, the Cathedral and the Bazaar, the long tail, The Nature of the Firm, The Structural Transformation of the Public Sphere, The Wealth of Nations by Adam Smith, The Wisdom of Crowds, Thomas Kuhn: the structure of scientific revolutions, Thomas L Friedman, too big to fail, Tragedy of the Commons, transaction costs, urban planning, vertical integration, warehouse automation, Watson beat the top human players on Jeopardy!, web application, Whole Earth Catalog, Whole Earth Review, WikiLeaks, working poor, Yochai Benkler, zero-sum game, Zipcar

The distributed and interconnected nature of the Internet of Things deepens individual entrepreneurial engagement in direct proportion to the diversity and strength of one’s collaborative relationships in the social economy. That’s because the democratization of communication, energy, and logistics allows billions of people to be individually “empowered.” But that empowerment is only achievable by one’s participation in peer-to-peer networks that are underwritten by social capital. A new generation is coming of age that is more entrepreneurially self-directed by means of being more socially embedded. It’s no surprise that the best and brightest of the Millennial Generation think of themselves as “social entrepreneurs.” For them, being both entrepreneurial and social is no longer an oxymoron, but rather, a tautology.

By eliminating virtually all of the remaining middlemen who mark up the transaction costs at every stage of the value chain, small- and medium-sized enterprises—especially cooperatives and other nonprofit businesses—and billions of prosumers can share their goods and services directly with one another on the Collaborative Commons—at near zero marginal cost. The reduction in both fixed and marginal costs dramatically reduces the entry costs of creating new businesses in distributed peer-to-peer networks. The low entry costs encourage more people to become potential entrepreneurs and collaborators, creating and sharing information, energy, and goods and services on the Commons. The changes brought on by the establishment of an IoT infrastructure and Collaborative Commons go far beyond the narrow confines of commerce.

Both capitalist and socialist regimes organize production in integrated, vertically scaled enterprises because of the increased efficiencies, despite their different patterns of ownership and distribution of earnings. But how do we go about organizing an economy where the entry costs in establishing a communication/energy matrix are substantially lower and paid for in large part by hundreds of millions of individuals in peer-to-peer networks, and where the marginal costs of generating, storing, and sharing communications, energy, and a growing number of products and services are heading to nearly zero? A new communication/energy matrix is emerging, and with it a new “smart” public infrastructure. The Internet of Things (IoT) will connect everyone and everything in a new economic paradigm that is far more complex than the First and Second Industrial Revolutions, but one whose architecture is distributed rather than centralized.


pages: 361 words: 81,068

The Internet Is Not the Answer by Andrew Keen

"World Economic Forum" Davos, 3D printing, A Declaration of the Independence of Cyberspace, Airbnb, AltaVista, Andrew Keen, AOL-Time Warner, augmented reality, Bay Area Rapid Transit, Berlin Wall, Big Tech, bitcoin, Black Swan, Bob Geldof, Boston Dynamics, Burning Man, Cass Sunstein, Charles Babbage, citizen journalism, Clayton Christensen, clean water, cloud computing, collective bargaining, Colonization of Mars, computer age, connected car, creative destruction, cuban missile crisis, data science, David Brooks, decentralized internet, DeepMind, digital capitalism, disintermediation, disruptive innovation, Donald Davies, Downton Abbey, Dr. Strangelove, driverless car, Edward Snowden, Elon Musk, Erik Brynjolfsson, fail fast, Fall of the Berlin Wall, Filter Bubble, Francis Fukuyama: the end of history, Frank Gehry, Frederick Winslow Taylor, frictionless, fulfillment center, full employment, future of work, gentrification, gig economy, global village, Google bus, Google Glasses, Hacker Ethic, happiness index / gross national happiness, holacracy, income inequality, index card, informal economy, information trail, Innovator's Dilemma, Internet of things, Isaac Newton, Jaron Lanier, Jeff Bezos, job automation, John Perry Barlow, Joi Ito, Joseph Schumpeter, Julian Assange, Kevin Kelly, Kevin Roose, Kickstarter, Kiva Systems, Kodak vs Instagram, Lean Startup, libertarian paternalism, lifelogging, Lyft, Marc Andreessen, Mark Zuckerberg, Marshall McLuhan, Martin Wolf, Mary Meeker, Metcalfe’s law, military-industrial complex, move fast and break things, Nate Silver, Neil Armstrong, Nelson Mandela, Network effects, new economy, Nicholas Carr, nonsequential writing, Norbert Wiener, Norman Mailer, Occupy movement, packet switching, PageRank, Panopticon Jeremy Bentham, Patri Friedman, Paul Graham, peer-to-peer, peer-to-peer rental, Peter Thiel, plutocrats, Potemkin village, power law, precariat, pre–internet, printed gun, Project Xanadu, RAND corporation, Ray Kurzweil, reality distortion field, ride hailing / ride sharing, Robert Metcalfe, Robert Solow, San Francisco homelessness, scientific management, Second Machine Age, self-driving car, sharing economy, Sheryl Sandberg, Silicon Valley, Silicon Valley billionaire, Silicon Valley ideology, Skype, smart cities, Snapchat, social web, South of Market, San Francisco, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, subscription business, TaskRabbit, tech bro, tech worker, TechCrunch disrupt, Ted Nelson, telemarketer, The future is already here, The Future of Employment, the long tail, the medium is the message, the new new thing, Thomas L Friedman, Travis Kalanick, Twitter Arab Spring, Tyler Cowen, Tyler Cowen: Great Stagnation, Uber for X, uber lyft, urban planning, Vannevar Bush, warehouse robotics, Whole Earth Catalog, WikiLeaks, winner-take-all economy, work culture , working poor, Y Combinator

It represented the logical conclusion to the Web’s Santa Claus economics, the Internet’s original sin, where “consumers” were treated as spoiled children and indulged with an infinite supply of free goodies in what the New York Times’ media columnist David Carr calls the “Something for Nothing” economy.5 Founded by Shawn Fanning and Sean Parker in 1999, Napster enabled what is euphemistically known as the peer-to-peer sharing of music. Fanning and Parker took Chris Anderson’s advice about the radical value of “free” to its most ridiculous conclusion. Not merely content to give their own stuff away for nothing, Napster gave away everybody else’s as well. Along with other peer-to-peer networks like Travis Kalanick’s Scour and later pirate businesses such as Megaupload, Rapidshare, and Pirate Bay, Napster created a networked kleptocracy, masquerading as the “sharing economy,” in which the only real abundance was the ubiquitous availability of online stolen content, particularly recorded music.

“You know, the thing that is illegal when the Mafia does it.”42 As Brad Stone notes, Amazon is becoming “increasingly monolithic in markets like books and electronics,” which is why he believes that antitrust authorities will inevitably come to scrutinize Amazon’s market power.43 Let’s hope that there will be politicians bold enough to take on Bezos before Amazon becomes, quite literally, the Everything Store. No, the Internet is not the answer, especially when it comes to the so-called sharing economy of peer-to-peer networks like Uber and Airbnb. The good news is that, as Wired’s Marcus Wohlsen put it, the “sun is setting on the wild west” of ride- and apartment-sharing networks.44 Tax collectors and municipalities from Cleveland to Hamburg are recognizing that many peer-to-peer rentals and ride-sharing apps are breaking both local and national housing and transportation laws.

Cloned to appear like Netflix, Popcorn Time has already been translated into thirty-two languages and offers what one analyst described as a “nightmare scenario” for the movie industry.13 The Buenos Aires–based makers of Popcorn Time claim to have invented the service for the convenience of consumers. But the more subscribers Popcorn Time steals from Hulu and Netflix, the fewer resources moviemakers will have to invest in their products. And, of course, the more we use peer-to-peer technologies like Popcorn Time, the emptier movie theaters will become. In 2013, there was a 21% drop in the number of what Variety calls the “all important” 18–24 age group buying tickets to watch movies.14 With the popularity of products like Popcorn Time, expect that number to plummet even more dramatically in the future.


Hacking Capitalism by Söderberg, Johan; Söderberg, Johan;

Abraham Maslow, air gap, Alvin Toffler, AOL-Time Warner, barriers to entry, Charles Babbage, collective bargaining, commoditize, computer age, corporate governance, creative destruction, Debian, deindustrialization, delayed gratification, Dennis Ritchie, deskilling, digital capitalism, digital divide, Donald Davies, Eben Moglen, Erik Brynjolfsson, Firefox, Free Software Foundation, frictionless, full employment, Garrett Hardin, Hacker Conference 1984, Hacker Ethic, Herbert Marcuse, Howard Rheingold, IBM and the Holocaust, informal economy, interchangeable parts, invention of radio, invention of the telephone, Jacquard loom, James Watt: steam engine, jimmy wales, John Markoff, John von Neumann, Joseph Schumpeter, Joseph-Marie Jacquard, Ken Thompson, knowledge economy, knowledge worker, labour market flexibility, late capitalism, Lewis Mumford, liberal capitalism, Marshall McLuhan, means of production, Mitch Kapor, mutually assured destruction, new economy, Norbert Wiener, On the Economy of Machinery and Manufactures, packet switching, patent troll, peer-to-peer, peer-to-peer model, planned obsolescence, post scarcity, post-Fordism, post-industrial society, price mechanism, Productivity paradox, profit motive, RFID, Richard Florida, Richard Stallman, Ronald Coase, safety bicycle, Search for Extraterrestrial Intelligence, SETI@home, Silicon Valley, Slavoj Žižek, software patent, Steven Levy, Stewart Brand, subscription business, tech worker, technological determinism, technoutopianism, the Cathedral and the Bazaar, The Nature of the Firm, the scientific method, The Theory of the Leisure Class by Thorstein Veblen, Thomas Davenport, Thorstein Veblen, tragedy of the anticommons, Tragedy of the Commons, transaction costs, Whole Earth Catalog, Yochai Benkler

Key to the privatisation of information is capital’s control over code architecture and over electronic, global communications. If the constituent power to write software remains out in the wild, capital faces an uphill battle when enclosing information commons. The sharing of music and films on peer-to-peer networks is only the beginning. To discern the complex symbiosis between capital and community, a closer look at the motivations and the business models are required. We must not get stuck in a black-and-white dramaturgy of profiteering villains exploiting unaware idealists. The hacker subculture has a pragmatic attitude in this regard.

With a norm system, a common identity, and a political profile, the FOSS development community gains some degree of independence visà-vis external forces, companies and governments in particular. This independence is demonstrated when the interests of the hacker movement and capital diverges, such as in the design of filesharing applications. Filesharing has mostly been debated from the standpoint of the alleged losses of the media industry. It is not pirate sharing that makes peer-to-peer networks subversive, though, but the peer-to-peer labour relations of which this technology is an example of. The application would never have seen the light of the day had software development been confined to the social division of labour, i.e. to professional researchers working in corporate laboratories or government institutions.

While the ‘library model’ thus tends to collapse rather than dichotomize the categories of gift and commodity, it does nevertheless represent a genuine alternative to the privatisation of the commons in information.28 The library analogy seems appropriate when referring to filesharing networks. Peer-to-peer networks involve users with even less personal ties than those bringing together two parts on the market. Indeed, the political relevance of filesharing rests on the fact that it can attract a mass of outsiders without asking them to commit to community bonding. Only then will the crowd grow to a size whose actions have an impact on the real world.


Speaking Code: Coding as Aesthetic and Political Expression by Geoff Cox, Alex McLean

4chan, Amazon Mechanical Turk, augmented reality, bash_history, bitcoin, Charles Babbage, cloud computing, commons-based peer production, computer age, computer vision, Computing Machinery and Intelligence, crowdsourcing, dematerialisation, Donald Knuth, Douglas Hofstadter, en.wikipedia.org, Everything should be made as simple as possible, finite state, Free Software Foundation, Gabriella Coleman, Gödel, Escher, Bach, Hacker Conference 1984, Ian Bogost, Jacques de Vaucanson, language acquisition, Larry Wall, late capitalism, means of production, natural language processing, Neal Stephenson, new economy, Norbert Wiener, Occupy movement, packet switching, peer-to-peer, power law, Richard Stallman, Ronald Coase, Slavoj Žižek, social software, social web, software studies, speech recognition, SQL injection, stem cell, Stewart Brand, systems thinking, The Nature of the Firm, Turing machine, Turing test, Vilfredo Pareto, We are Anonymous. We are Legion, We are the 99%, WikiLeaks, Yochai Benkler

Sovereignty is in effect enforced through the totality of the diverse opinions and is not in conflict with the operations of plural networks, as previously stated. If this is the case, and networked sovereignty operates through reciprocal relations, then we also need to critically review the oppositions that are perpetuated between free software initiatives and web platforms, between peer-to-peer networks and server-client architectures, as well as between public and private ownership regimes. These examples also demonstrate how sovereignty has been transferred to the market and its hold over telecommunications networks as a Coding Publics 95 new authoritarian voice of democracy. The market seemingly allows for diverse consumer choices and rights, in exchange for a strengthening of its own power and expanding consumption of technological devices that purport to allow for freedom of expression.

“Venture communism” is the ironic term Kleiner uses to evoke workers’ self-organization, to address the way that class conflict is conceived across telecommunications networks through the pervasive use of Internet and mobile technologies. This becomes the foundation for a critique of the rise of social media in particular as a project of venture capitalism that expropriates developments in the free software movement and commons-based peer-to-peer technologies.67 The point remains that ownership and property are core issues in these platforms; they are organized in ways that follow the logic of rent, to secure profit from immaterial assets. The owners profit through centralized control, whereas the distinctiveness of peer production lies in the relative independence of workers to control common productive assets and share the benefits.


Remix: Making Art and Commerce Thrive in the Hybrid Economy by Lawrence Lessig

Aaron Swartz, Amazon Web Services, Andrew Keen, Benjamin Mako Hill, Berlin Wall, Bernie Sanders, Brewster Kahle, carbon tax, Cass Sunstein, collaborative editing, commoditize, disintermediation, don't be evil, Erik Brynjolfsson, folksonomy, Free Software Foundation, Internet Archive, invisible hand, Jeff Bezos, jimmy wales, John Perry Barlow, Joi Ito, Kevin Kelly, Larry Wall, late fees, Mark Shuttleworth, Netflix Prize, Network effects, new economy, optical character recognition, PageRank, peer-to-peer, recommendation engine, revision control, Richard Stallman, Ronald Coase, Saturday Night Live, search costs, SETI@home, sharing economy, Silicon Valley, Skype, slashdot, Steve Jobs, the long tail, The Nature of the Firm, thinkpad, transaction costs, VA Linux, Wayback Machine, yellow journalism, Yochai Benkler

But the key to the efficiency of this Little Brother is that it builds upon a principle described best by VisiCalc co-inventor Dan Bricklin in an essay called “The Cornucopia of the Commons.”21 80706 i-xxiv 001-328 r4nk.indd 132 8/12/08 1:55:18 AM T W O EC O NO MIE S: C O MMERC I A L A ND SH A RING 133 Bricklin’s essay was inspired by a quibble he had with those who said Napster was so successful because it was a peer-to-peer technology. Napster’s success, he argued, had nothing to do with peer-to-peer. First, the system was not in fact a “peer-to-peer” technology. Second, not using a p2p architecture may well have been a better technical strategy to serving the ends that Napster sought. Bricklin argued that Napster’s success came not from a technical design, but from an architecture that produced value as a byproduct of people getting what they wanted.

In a time when there are so many options to amass a 80706 i-xxiv 001-328 r4nk.indd 284 8/12/08 1:56:14 AM REFORMING US 285 music collection, I take the way that is most convenient for me and most damaging to the artists. Much has been said in the justice system, in the media and online about the legality of these peer to peer networks, but the reality is that millions of people do it and only a few are ever stopped. I shamefully admit that, despite my sympathy for the artists and others who lose money from the filesharing, I consciously take part in it and I have no plans to stop in the near future. Some people can justify stealing music because they do not realize the consequences; that is not the case for me because I am fully aware of them.


pages: 373 words: 112,822

The Upstarts: How Uber, Airbnb, and the Killer Companies of the New Silicon Valley Are Changing the World by Brad Stone

Affordable Care Act / Obamacare, Airbnb, Amazon Web Services, Andy Kessler, autonomous vehicles, Ben Horowitz, Benchmark Capital, Boris Johnson, Burning Man, call centre, Chuck Templeton: OpenTable:, collaborative consumption, data science, Didi Chuxing, Dr. Strangelove, driverless car, East Village, fake it until you make it, fixed income, gentrification, Google X / Alphabet X, growth hacking, Hacker News, hockey-stick growth, housing crisis, inflight wifi, Jeff Bezos, John Zimmer (Lyft cofounder), Justin.tv, Kickstarter, Lyft, Marc Andreessen, Marc Benioff, Mark Zuckerberg, Menlo Park, Mitch Kapor, Necker cube, obamacare, PalmPilot, Paul Graham, peer-to-peer, Peter Thiel, power law, race to the bottom, rent control, ride hailing / ride sharing, Ruby on Rails, San Francisco homelessness, Sand Hill Road, self-driving car, semantic web, sharing economy, side project, Silicon Valley, Silicon Valley startup, Skype, SoftBank, South of Market, San Francisco, Startup school, Steve Jobs, TaskRabbit, tech bro, TechCrunch disrupt, Tony Hsieh, transportation-network company, Travis Kalanick, Uber and Lyft, Uber for X, uber lyft, ubercab, Y Combinator, Y2K, Zipcar

Despite that setback, Kalanick was ready to dust himself off and try again.19 He started talking to one of his Scour co-founders, Michael Todd, about redeveloping the technology behind Scour and selling it to media companies as a tool to help them distribute their material online. Bandwidth was expensive back then, around six hundred dollars per megabyte (as opposed to about a dollar per megabyte on a broadband internet line today), and peer-to-peer networking could reduce the cost. They called their new company Red Swoosh, after the twin half-moon insignias in the original Scour logo. Kalanick said it was “a revenge business” and recognized a satisfying irony: “The idea is the same peer-to-peer technology but I take those thirty-three litigants that sued me and turn them into customers,” he said. “Now those dudes who sued me are now paying me. It sounded good.”20 In practice, it didn’t work out as well.

Kalanick later said that Uber’s first fight in San Francisco added to his personal conviction about the company just as he was taking a more active leadership role. “For me that was the moment where I was like, for whatever reason, I knew this was the right battle to fight,” he told me in 2012. On a tech podcast, he added that the fight with the MTA recalled all the litigation and conflict of his decade in the world of peer-to-peer technology. “The great thing is I’ve seen this before,” he said. “I thought, Oh, man, I have a playbook for this. Let’s do this thing. When that happened, it felt like a homecoming.”28 After that first meeting with Hayashi, Kalanick spent weeks negotiating with Garrett Camp and angel investors Chris Sacca and Rob Hayes over his compensation as CEO.


pages: 525 words: 116,295

The New Digital Age: Transforming Nations, Businesses, and Our Lives by Eric Schmidt, Jared Cohen

access to a mobile phone, additive manufacturing, airport security, Amazon Mechanical Turk, Amazon Web Services, Andy Carvin, Andy Rubin, anti-communist, augmented reality, Ayatollah Khomeini, barriers to entry, bitcoin, borderless world, call centre, Chelsea Manning, citizen journalism, clean water, cloud computing, crowdsourcing, data acquisition, Dean Kamen, disinformation, driverless car, drone strike, Elon Musk, Evgeny Morozov, failed state, false flag, fear of failure, Filter Bubble, Google Earth, Google Glasses, Hacker Conference 1984, hive mind, income inequality, information security, information trail, invention of the printing press, job automation, John Markoff, Julian Assange, Khan Academy, Kickstarter, knowledge economy, Law of Accelerating Returns, market fundamentalism, Mary Meeker, means of production, military-industrial complex, MITM: man-in-the-middle, mobile money, mutually assured destruction, Naomi Klein, Nelson Mandela, no-fly zone, off-the-grid, offshore financial centre, Parag Khanna, peer-to-peer, peer-to-peer lending, personalized medicine, Peter Singer: altruism, power law, Ray Kurzweil, RFID, Robert Bork, self-driving car, sentiment analysis, Silicon Valley, Skype, Snapchat, social graph, speech recognition, Steve Jobs, Steven Pinker, Stewart Brand, Stuxnet, Susan Wojcicki, The Wisdom of Crowds, upwardly mobile, Whole Earth Catalog, WikiLeaks, young professional, zero day

Today, users already share their iTunes libraries with strangers over Wi-Fi networks, and in the future, they’ll be able to share much more. In places like Yemen, where socially conservative norms limit many teenagers’ ability to socialize with the opposite sex, young people may elect to hide their personal information on peer-to-peer networks when at home or at the mosque—who knows who could be looking?—but reveal it when in public parks and cafés, and at parties. Yet P2P technology is a limited replacement for the richness and convenience of the Internet, despite its myriad advantages. We often need stored and searchable records of our activities and communications, particularly if we want to share something or refer to it later.

“give the police the technology”: Rich Trenholm, “Cameron Considers Blocking Twitter, Facebook, BBM after Riots,” CNET, August 11, 2011, http://crave.cnet.co.uk/software/cameron-considers-blocking-twitter-facebook-bbm-after-riots-50004693/; Olivia Solon, “Cameron Suggests Blocking Potential Criminals from Social Media,” Wired UK, August 11, 2011, http://www.wired.co.uk/news/archive/2011-08/11/david-cameron-social-media. industry cooperation with law enforcement was sufficient: “Social Media Talks About Rioting ‘Constructive,’ ” BBC, August 25, 2011, http://www.bbc.co.uk/news/uk-14657456. Bitcoins: Bitcoin is the most successful experiment in digital currency today; it uses a mix of peer-to-peer networking and cryptographic signatures to process online payments. The value of the currency has fluctuated wildly since its inception; the first publicly traded Bitcoins went for 3 cents, and a little more than a year later they were valued at $29.57 apiece. Bitcoins are held in digital “wallets,” and are used to pay for a wide range of virtual and physical goods.

Contemporary mobile P2P technologies like Bluetooth allow two physical devices to speak directly to each other rather than having to communicate over the Internet. This is in contrast to P2P file-sharing networks such as BitTorrent, which operate over the Internet. Common to both forms of peer-to-peer technologies is that users connect to each other (acting as both suppliers and receivers) without using a fixed third-party service. For citizens in the future, P2P networking will offer an enticing combination of instant communication and independence from third-party controls or monitoring. All smart phones today are equipped with some form of peer-to-peer capability, and as the wave of cheap smart phones saturates the emerging markets in the next decade, even more people will be able to take advantage of these increasingly sophisticated tools.


pages: 308 words: 85,880

How to Fix the Future: Staying Human in the Digital Age by Andrew Keen

"World Economic Forum" Davos, 23andMe, Ada Lovelace, Affordable Care Act / Obamacare, Airbnb, Albert Einstein, AlphaGo, Andrew Keen, Apple's 1984 Super Bowl advert, augmented reality, autonomous vehicles, basic income, Bernie Sanders, Big Tech, bitcoin, Black Swan, blockchain, Brewster Kahle, British Empire, carbon tax, Charles Babbage, computer age, Cornelius Vanderbilt, creative destruction, crowdsourcing, data is the new oil, death from overwork, DeepMind, Demis Hassabis, Didi Chuxing, digital capitalism, digital map, digital rights, disinformation, don't be evil, Donald Trump, driverless car, Edward Snowden, Elon Musk, Erik Brynjolfsson, European colonialism, fake news, Filter Bubble, Firefox, fulfillment center, full employment, future of work, gig economy, global village, income inequality, independent contractor, informal economy, Internet Archive, Internet of things, invisible hand, Isaac Newton, James Watt: steam engine, Jane Jacobs, Jaron Lanier, Jeff Bezos, jimmy wales, job automation, Joi Ito, Kevin Kelly, knowledge economy, Lyft, Marc Andreessen, Marc Benioff, Mark Zuckerberg, Marshall McLuhan, Menlo Park, Mitch Kapor, move fast and break things, Network effects, new economy, Nicholas Carr, Norbert Wiener, OpenAI, Parag Khanna, peer-to-peer, Peter Thiel, plutocrats, post-truth, postindustrial economy, precariat, Ralph Nader, Ray Kurzweil, Recombinant DNA, rent-seeking, ride hailing / ride sharing, Rutger Bregman, Salesforce, Sam Altman, Sand Hill Road, Second Machine Age, self-driving car, sharing economy, Silicon Valley, Silicon Valley billionaire, Silicon Valley ideology, Silicon Valley startup, Skype, smart cities, Snapchat, social graph, software is eating the world, Stephen Hawking, Steve Jobs, Steve Wozniak, subscription business, surveillance capitalism, Susan Wojcicki, tech baron, tech billionaire, tech worker, technological determinism, technoutopianism, The Future of Employment, the High Line, the new new thing, Thomas L Friedman, Tim Cook: Apple, Travis Kalanick, Triangle Shirtwaist Factory, Uber and Lyft, Uber for X, uber lyft, universal basic income, Unsafe at Any Speed, Upton Sinclair, urban planning, WikiLeaks, winner-take-all economy, Y Combinator, Yogi Berra, Zipcar

Sunde was imprisoned for a year in Sweden for allegedly assisting Pirate Bay users with infringement of copyright. So his partnership with Adblock Plus is an attempt to reengineer a legal ecosystem for an online content industry that, in a previous life, he helped undermine. In my 2007 polemic, The Cult of the Amateur, I was extremely critical of the way in which peer-to-peer networks like The Pirate Bay were enabling the theft of online content and thus destroying the livelihood of musicians, photographers, writers, and filmmakers. And so, over the years, Sunde and I had often been on opposite sides of the piracy debate, sometimes even personally clashing in discussions about the need for copyright law and the (im)morality of online piracy.

You’ll remember there was even a parallel event in the same month as the Berlin conference—the “Decentralized Web Summit” at San Francisco’s Internet Archive, featuring many of the internet’s original architects, including the inventor Berners-Lee and the TCP/IP creator Vint Cerf. Everyone, it seems, on both sides of the Atlantic, is nostalgic for the future. “The web’s creator looks to reinvent it,” as the New York Times described this June 2016 event, which brought together privacy advocates and pioneers of such peer-to-peer technologies as blockchain to discuss a “new phase of the internet.”1 Brewster Kahle, the Internet Archive founder and summit organizer, believes that the time is now right for a radical re-decentralization of digital power. The future has finally caught up with us, he tells me when I visit him at his office in San Francisco’s Inner Richmond district.


pages: 629 words: 142,393

The Future of the Internet: And How to Stop It by Jonathan Zittrain

A Declaration of the Independence of Cyberspace, algorithmic bias, Amazon Mechanical Turk, Andy Kessler, barriers to entry, behavioural economics, book scanning, Brewster Kahle, Burning Man, c2.com, call centre, Cass Sunstein, citizen journalism, Citizen Lab, Clayton Christensen, clean water, commoditize, commons-based peer production, corporate governance, Daniel Kahneman / Amos Tversky, digital divide, disruptive innovation, distributed generation, en.wikipedia.org, end-to-end encryption, Firefox, folksonomy, Free Software Foundation, game design, Hacker Ethic, Howard Rheingold, Hush-A-Phone, illegal immigration, index card, informal economy, information security, Internet Archive, jimmy wales, John Markoff, John Perry Barlow, license plate recognition, loose coupling, mail merge, Morris worm, national security letter, old-boy network, One Laptop per Child (OLPC), OSI model, packet switching, peer-to-peer, post-materialism, pre–internet, price discrimination, profit maximization, radical decentralization, Ralph Nader, RFC: Request For Comment, RFID, Richard Stallman, Richard Thaler, risk tolerance, Robert Bork, Robert X Cringely, SETI@home, Silicon Valley, Skype, slashdot, software patent, Steve Ballmer, Steve Jobs, Ted Nelson, Telecommunications Act of 1996, the Cathedral and the Bazaar, the long tail, The Nature of the Firm, The Wisdom of Crowds, Tragedy of the Commons, web application, wikimedia commons, Yochai Benkler, zero-sum game

Instead, any improvements were orchestrated centrally. As the initial offerings of the proprietary networks plateaued, the Internet saw developments in technology that in turn led to developments in content and ultimately in social and economic interaction: the Web and Web sites, online shopping, peer-to-peer networking, wikis, and blogs. The hostility of AT&T toward companies like Hush-A-Phone and of the proprietary networks to the innovations of enterprising subscribers is not unusual, and it is not driven solely by their status as monopolists. Just as behavioral economics shows how individuals can consistently behave irrationally under particular circumstances,18 and how decision-making within groups can fall prey to error and bias,19 so too can the incumbent firms in a given market fail to seize opportunities that they rationally ought to exploit.

These remedies can apply to some units and not others, allowing regulators to winnow out bad uses from good ones on the basis of individual adjudication, rather than rely on the generalities of ex ante legislative-style drafting. For example, suppose a particular television broadcast were found to infringe a copyright or to damage someone’s reputation. In a world of old-fashioned televisions and VCRs, or PCs and peer-to-peer networks, the broadcaster or creator could be sued, but anyone who recorded the broadcast could, as a practical matter, retain a copy. Today, it is possible to require DVR makers to delete the offending broadcast from any DVRs that have recorded it or, perhaps acting with more precision, to retroactively edit out the slice of defamatory content from the recorded program.

Daniel Solove, for instance, has written extensively on emergent privacy concerns, but he has focused on the danger of “digital dossiers” created by businesses and governments.52 Likewise, Jerry Kang and Dana Cuff have written about how small sensors will lead to “pervasive computing,” but they worry that the technology will be abused by coordinated entities like shopping malls, and their prescriptions thus follow the pattern established by Privacy 1.0.53 Their concerns are not misplaced, but they represent an increasingly smaller part of the total picture. The essence of Privacy 2.0 is that government or corporations, or other intermediaries, need not be the source of the surveillance. Peer-to-peer technologies can eliminate points of control and gatekeeping from the transfer of personal data and information just as they can for movies and music. The intellectual property conflicts raised by the generative Internet, where people can still copy large amounts of copyrighted music without fear of repercussion, are rehearsals for the problems of Privacy 2.0.54 The Rodney King beating was filmed not by a public camera, but by a private one, and its novel use in 1991 is now commonplace.


pages: 52 words: 13,257

Bitcoin Internals: A Technical Guide to Bitcoin by Chris Clark

bitcoin, fiat currency, information security, peer-to-peer, Satoshi Nakamoto, transaction costs, Turing complete

Chapter 8 The Block Chain 8.1 The Byzantine Generals’ Problem After verification, transactions are relayed to other nodes in the peer-to-peer network. The other nodes will repeat the verification and relay the transaction to more nodes. Within seconds, the transaction should reach most of the nodes on the network. Transactions are then held in pools on the nodes awaiting insertion into the block chain, which is a public record of all transactions that have ever occurred in the Bitcoin network. The block chain is not just a simple list of transaction receipts though. It is specially designed to solve the double-spending problem for a peer-to-peer network of untrusted nodes. As discussed in the Double-Spending section, the goal is to determine the chronological ordering of transactions so that the first payment can be accepted and the second payment can be rejected.

However, if there are a large number of chunks, then there is a greater chance that some of the hash values will become corrupted. Furthermore, this is a lot of data for the trusted source to store. Ideally, a trusted source would only have to provide one hash, and the rest of the hashes could be downloaded from untrusted sources, such as peers in a peer-to-peer network. This can be accomplished using a top hash generated by hashing all of the hashes of the chunks. The resulting structure is called a hash list. If the number of chunks is very large, the list of hashes of all the chunks might also be quite large. In order to verify just one chunk against the trusted top hash, one would need to obtain all of the hashes in the hash list.

This idea was introduced by Nick Szabos in his digital currency proposal called Bit Gold, which was released between 1998 and 2005.[18] A proof of work chain provides additional security because each individual proof of work gets buried under the subsequent proofs of work. As the chain grows, it becomes more and more difficult to redo all the proofs of work. Chapter 6 Technical Overview 6.1 Architecture Bitcoin is run by a peer-to-peer network of computers called nodes. Nodes are responsible for processing transactions and maintaining all records of ownership. Anyone can download the free open-source Bitcoin software and become a node. All nodes are treated equally; no node is trusted. However, the system is based on the assumption that the majority of computing power will come from honest nodes (see Chapter 8).


pages: 606 words: 157,120

To Save Everything, Click Here: The Folly of Technological Solutionism by Evgeny Morozov

"World Economic Forum" Davos, 3D printing, algorithmic bias, algorithmic trading, Amazon Mechanical Turk, An Inconvenient Truth, Andrew Keen, augmented reality, Automated Insights, behavioural economics, Berlin Wall, big data - Walmart - Pop Tarts, Buckminster Fuller, call centre, carbon footprint, Cass Sunstein, choice architecture, citizen journalism, classic study, cloud computing, cognitive bias, creative destruction, crowdsourcing, data acquisition, Dava Sobel, digital divide, disintermediation, Donald Shoup, driverless car, East Village, en.wikipedia.org, Evgeny Morozov, Fall of the Berlin Wall, Filter Bubble, Firefox, Francis Fukuyama: the end of history, frictionless, future of journalism, game design, gamification, Gary Taubes, Google Glasses, Ian Bogost, illegal immigration, income inequality, invention of the printing press, Jane Jacobs, Jean Tirole, Jeff Bezos, jimmy wales, Julian Assange, Kevin Kelly, Kickstarter, license plate recognition, lifelogging, lolcat, lone genius, Louis Pasteur, machine readable, Mark Zuckerberg, market fundamentalism, Marshall McLuhan, moral panic, Narrative Science, Nelson Mandela, Nicholas Carr, packet switching, PageRank, Parag Khanna, Paul Graham, peer-to-peer, Peter Singer: altruism, Peter Thiel, pets.com, placebo effect, pre–internet, public intellectual, Ray Kurzweil, recommendation engine, Richard Thaler, Ronald Coase, Rosa Parks, self-driving car, Sheryl Sandberg, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, Skype, Slavoj Žižek, smart meter, social graph, social web, stakhanovite, Steve Jobs, Steven Levy, Stuxnet, surveillance capitalism, systems thinking, technoutopianism, TED Talk, the built environment, The Chicago School, The Death and Life of Great American Cities, the medium is the message, The Nature of the Firm, the scientific method, The Wisdom of Crowds, Thomas Kuhn: the structure of scientific revolutions, Thomas L Friedman, transaction costs, Twitter Arab Spring, urban decay, urban planning, urban sprawl, Vannevar Bush, warehouse robotics, WikiLeaks, work culture , Yochai Benkler

Internet-centric explanations, at least in their current form, greatly impoverish and infantilize our public debate. We ought to steer away from them as much as possible. If doing so requires imposing a moratorium on using the very term “Internet” and instead going for more precise terminology, like “peer-to-peer networks” or “social networks” or “search engines,” so be it. It’s the very possibility that the whole—that is, “the Internet”—is somehow spiritually and politically greater than the sum of these specific terms that exerts such a corrosive influence on how we think about the world. Hype and Consequences Ahistorical thinking in Internet debates is too ubiquitous and persistent to be written off as ignorance or laziness.

Once we move to a post-Internet world, there is a small chance that our technology pundits (and perhaps even some academics) will no longer get away with proclaiming something a revolution and then walking away without supplying good, empirical evidence—as if that revolution were so self-evident and no further proof was needed. I too used to be one of those people—albeit very briefly—sometime between 2005 and 2007. I remember perfectly the thrill that comes from thinking that the lessons of Wikipedia or peer-to-peer networking or Friendster or Skype could and should be applied absolutely everywhere. It’s a very powerful set of hammers, and plenty of people—many of them in Silicon Valley—are dying to hear you cry, “Nail!” regardless of what you are looking at. Thinking that you are living through a revolution and hold the key to how it will unfold is, I confess, rather intoxicating.

Close scrutiny of the quote in context, however, reveals how easily Lessig’s brand of Internet-centrism mutates into hopeless technological defeatism: “But the network is not going away. We are not going to kill the ‘darknet’ (as Microsoft called it in a fantastic paper about the inevitable survival of peer-to-peer technologies). We are not going to regulate access to news, or ads for free futons. We are not going back to the twentieth century.” In the context of challenges induced by transparency, Lessig proposes that it would be better to tinker with the laws and embrace publicly funded elections so that citizens wouldn’t even entertain the notion that politicians might be bought off.


Mastering Blockchain, Second Edition by Imran Bashir

3D printing, altcoin, augmented reality, autonomous vehicles, bitcoin, blockchain, business logic, business process, carbon footprint, centralized clearinghouse, cloud computing, connected car, cryptocurrency, data acquisition, Debian, disintermediation, disruptive innovation, distributed ledger, Dogecoin, domain-specific language, en.wikipedia.org, Ethereum, ethereum blockchain, fault tolerance, fiat currency, Firefox, full stack developer, general-purpose programming language, gravity well, information security, initial coin offering, interest rate swap, Internet of things, litecoin, loose coupling, machine readable, MITM: man-in-the-middle, MVC pattern, Network effects, new economy, node package manager, Oculus Rift, peer-to-peer, platform as a service, prediction markets, QR code, RAND corporation, Real Time Gross Settlement, reversible computing, RFC: Request For Comment, RFID, ride hailing / ride sharing, Satoshi Nakamoto, seminal paper, single page application, smart cities, smart contracts, smart grid, smart meter, supply-chain management, transaction costs, Turing complete, Turing machine, Vitalik Buterin, web application, x509 certificate

Consensus algorithms are discussed later in this chapter and throughout the book as appropriate. Blockchain can be thought of as a layer of a distributed peer-to-peer network running on top of the internet, as can be seen in the following diagram. It is analogous to SMTP, HTTP, or FTP running on top of TCP/IP. The network view of a blockchain At the bottom layer in the preceding diagram, there is the internet, which provides a basic communication layer for any network. In this case, a peer-to-peer network runs on top of the internet, which hosts another layer of blockchain. That layer contains transactions, blocks, consensus mechanisms, state machines, and blockchain smart contracts.

Transaction: A transaction is the fundamental unit of a blockchain. A transaction represents a transfer of value from one address to another. Block: A block is composed of multiple transactions and other elements, such as the previous block hash (hash pointer), timestamp, and nonce. Peer-to-peer network: As the name implies, a peer-to-peer network is a network topology wherein all peers can communicate with each other and send and receive messages. Scripting or programming language: Scripts or programs perform various operations on a transaction in order to facilitate various functions. For example, in Bitcoin, transaction scripts are predefined in a language called Script, which consist of sets of commands that allow nodes to transfer tokens from one address to another.

KYC-Chain This application provides the facility to manage Know Your Customer (KYC) data securely and conveniently based on smart contracts. OpenBazaar This is a decentralized peer-to-peer network that enables commercial activities directly between sellers and buyers instead of relying on a central party, such as eBay and Amazon. It should be noted that this system is not built on top of a blockchain; instead, DHTs are used in a peer-to-peer network to enable direct communication and data sharing among peers. It makes use of Bitcoin and various other cryptocurrencies as a payment method. Lazooz This is the decentralized equivalent of Uber.


pages: 161 words: 44,488

The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology by William Mougayar

Airbnb, airport security, Albert Einstein, altcoin, Amazon Web Services, bitcoin, Black Swan, blockchain, business logic, business process, centralized clearinghouse, Clayton Christensen, cloud computing, cryptocurrency, decentralized internet, disintermediation, distributed ledger, Edward Snowden, en.wikipedia.org, Ethereum, ethereum blockchain, fault tolerance, fiat currency, fixed income, Ford Model T, global value chain, Innovator's Dilemma, Internet of things, Kevin Kelly, Kickstarter, market clearing, Network effects, new economy, peer-to-peer, peer-to-peer lending, prediction markets, pull request, QR code, ride hailing / ride sharing, Satoshi Nakamoto, sharing economy, smart contracts, social web, software as a service, too big to fail, Turing complete, Vitalik Buterin, web application, Yochai Benkler

As cryptocurrency volatilities subside, these will become popular. Derivatives, options, swaps, synthetic instruments, investments, loans, and many other traditional instruments will have their cryptocurrency version, therefore creating a new financial services trading marketplace. 9. Peer-to-Peer Network There is nothing “central” about blockchains. Architecturally, the base layer of the blockchain is a peer-to-peer network. A blockchain pushes for decentralization via peer processing at its node locations. The network is really the computer. You verify each other transaction at the peer-to-peer level. In essence, a blockchain could be regarded as a thin computing cloud that is truly decentralized.

Use the blockchain in a more fundamental way, where the app would not function without the blockchain. Typically, you would set-up a specific peer-to-peer network with nodes, for example, OpenBazaar, as a decentralized e-commerce app. Use your own blockchain (could be shared with others), without an economic token or currency unit. This is where most of the permissioned blockchains play within enterprises. Use your own blockchain (or another blockchain), including a token or currency unit, to create an economic network of value, for example, MaidSafe,4 which creates a market for unused computing resources over a peer-to-peer network of users. 12 FEATURES OF A BLOCKCHAIN PLATFORM If you need to evaluate a given blockchain platform, the following features are important: 1.

Rather than simply hoping that the parties we interact with behave honorably, we are building technological systems that inherently build the desired properties into the system, in such a way that they will keep functioning with the guarantees that we expect, even if many of the actors involved are corrupt. All transactions under “crypto 2.0” come with auditable trails of cryptographic proofs. Decentralized peer-to-peer networks can be used to reduce reliance on any single server; public key cryptography could create a notion of portable user-controlled identities. More advanced kinds of math, including ring signatures, homomorphic encryption, and zero-knowledge proofs, guarantee privacy, allowing users to put all of their data in the open in such a way that certain properties of it can be verified, and even computed on, without actually revealing any private details.


pages: 379 words: 113,656

Six Degrees: The Science of a Connected Age by Duncan J. Watts

AOL-Time Warner, Berlin Wall, Bretton Woods, business process, corporate governance, Drosophila, Erdős number, experimental subject, fixed income, Frank Gehry, Geoffrey West, Santa Fe Institute, independent contractor, industrial cluster, invisible hand, it's over 9,000, Long Term Capital Management, market bubble, Milgram experiment, MITM: man-in-the-middle, Murray Gell-Mann, Network effects, new economy, Norbert Wiener, PalmPilot, Paul Erdős, peer-to-peer, power law, public intellectual, rolodex, Ronald Coase, Savings and loan crisis, scientific worldview, Silicon Valley, social contagion, social distancing, Stuart Kauffman, supply-chain management, The Nature of the Firm, the strength of weak ties, The Wealth of Nations by Adam Smith, Toyota Production System, Tragedy of the Commons, transaction costs, transcontinental railway, vertical integration, Vilfredo Pareto, Y2K

Because no one server knows where all the files are—because there is no central directory—every query becomes a broadcast search that effectively asks each and every node in the network, “Do you have this file?” So a peer-to-peer network like Gnutella, comprising ten thousand nodes, for example, will generate roughly ten thousand times as many messages as a Napster-like network of the same size, where each query is sent only to a single, high-capacity server. Because the aim of peer-to-peer networks is to become as large as possible (in order to increase the number of available files), and because the larger the network is, the worse its performance will be, could it be that truly peer-to-peer networks are inherently self-defeating? A hint of a Gnutella-like world was revealed by accident a year or so ago by Mrs.

But there is also a practical reason to understand directed searches in networks—namely, the process of finding a target person in a social network, through a chain of intermediate acquaintances, is essentially the same as finding a file or other piece of uniquely specified information in a distributed database. Quite a lot of attention has been paid recently to the potential of so-called peer-to-peer networks, particularly in the music industry. The first generation of such networks, the archetype of which is the infamous Napster, was actually only a peer-to-peer network in a limited sense. While the files themselves are located on individuals’ personal computers—called peers—and the file exchanges occur directly between peers, a complete directory of all available files (and their locations) is maintained on a central server.

D., and Bernard, H. R. The reverse small world experiment. Social Networks, 1, 159–192 (1978). Bernard, H. R., Killworth, P. D., Evans, M. J., McCarty, C., and Shelly, G. A. Studying relations cross-culturally. Ethnology, 27(2), 155–179 (1988). Search in Peer-to-Peer Networks A discussion of the problems facing peer-to-peer networks like Gnutella is Ritter, J. P. Why Gnutella can’t scale. No really (working paper, available on-line at http://www.darkridge.com/~jpr5/doc/gnutella.html, 2000). Two search algorithms that take advantage of Gnutella’s apparent scale-free character are presented in Adamic, L.


pages: 387 words: 112,868

Digital Gold: Bitcoin and the Inside Story of the Misfits and Millionaires Trying to Reinvent Money by Nathaniel Popper

4chan, Airbnb, Alan Greenspan, Apple's 1984 Super Bowl advert, banking crisis, Ben Horowitz, Benchmark Capital, bitcoin, Bitcoin Ponzi scheme, blockchain, Burning Man, buy and hold, capital controls, Colonization of Mars, crowdsourcing, cryptocurrency, David Graeber, Dogecoin, Edward Snowden, Elon Musk, Extropian, fiat currency, Fractional reserve banking, Jeff Bezos, Julian Assange, Kevin Roose, Kickstarter, life extension, litecoin, lone genius, low interest rates, M-Pesa, Marc Andreessen, Mark Zuckerberg, Max Levchin, Neal Stephenson, Occupy movement, off-the-grid, PalmPilot, peer-to-peer, peer-to-peer lending, Peter Thiel, Ponzi scheme, price stability, QR code, Ross Ulbricht, Satoshi Nakamoto, Silicon Valley, Simon Singh, Skype, slashdot, smart contracts, Startup school, stealth mode startup, the payments system, transaction costs, tulip mania, Tyler Cowen, Virgin Galactic, Vitalik Buterin, WikiLeaks

After Martti suggested his own changes, the final version made the more modest assertion that “the community is hopeful the currency will remain outside the reach of any government.” When the item went online, shortly after midnight in Helsinki, it wasn’t anything more than the single paragraph the Bitcoin team had submitted. “How’s this for a disruptive technology?” it began. “Bitcoin is a peer-to-peer, network-based digital currency with no central bank, and no transaction fees.” Despite the modesty of the item, the Internet chat channel that Martti had established for the Bitcoin community quickly lit up. NewLibertyStandard wrote: “FRONT PAGE!!!” Regulars like Laszlo made a point of being on the Bitcoin chat channel, to answer questions and serve as a tour guide of sorts for any newbies who checked in after reading the story.

Back when Satoshi had first launched the software, his writings were drily focused on the technical specifications of the programming. But after the first few weeks, Satoshi began emphasizing the broader ideological motivations for the software to help win over a broader audience, and privacy was only a part of it. In a February posting on the website of the P2P Foundation, a group dedicated to decentralized, peer-to-peer technology, Satoshi led off by talking about problems with traditional, or fiat, currencies, a term for money generated by government decree, or fiat. “The root problem with conventional currency is all the trust that’s required to make it work,” Satoshi wrote. “The central bank must be trusted not to debase the currency, but the history of fiat currencies is full of breaches of that trust.”


pages: 607 words: 133,452

Against Intellectual Monopoly by Michele Boldrin, David K. Levine

accounting loophole / creative accounting, agricultural Revolution, barriers to entry, business cycle, classic study, cognitive bias, cotton gin, creative destruction, David Ricardo: comparative advantage, Dean Kamen, Donald Trump, double entry bookkeeping, en.wikipedia.org, endogenous growth, Ernest Rutherford, experimental economics, financial innovation, Great Leap Forward, Gregor Mendel, Helicobacter pylori, independent contractor, informal economy, interchangeable parts, invention of radio, invention of the printing press, invisible hand, James Watt: steam engine, Jean Tirole, John Harrison: Longitude, Joseph Schumpeter, Kenneth Arrow, linear programming, market bubble, market design, mutually assured destruction, Nash equilibrium, new economy, open economy, PalmPilot, peer-to-peer, pirate software, placebo effect, price discrimination, profit maximization, rent-seeking, Richard Stallman, Robert Solow, seminal paper, Silicon Valley, Skype, slashdot, software patent, the market place, total factor productivity, trade liberalization, Tragedy of the Commons, transaction costs, Y2K

Within the book industry there is considerable evidence with which to answer this question, because, while most publishers have released electronic editions only in encrypted form, a few have sold unencrypted editions. Moreover, many books are currently available on peer-to-peer networks, and there have been lawsuits by a number of authors attempting to prevent this. So, we might expect relatively few sales of unencrypted electronic books because they will immediately appear for free on peer-to-peer networks, while encrypted books will sell better because they are not subject to “piracy.” Strikingly, the data shows exactly the opposite. The case of Fictionwise.com is an especially instructive natural experiment because, depending on the publisher and author, the site sells some books in encrypted form and others in unencrypted form.

Demand for Edison’s phonograph obviously increased as cheaper and more abundant recordings of music became available, which was facilitated by a weak enforcement of the composers’ monopoly power. Encrypted versus Unencrypted Sales The book, recorded music, and movie industries have been heavily influenced by the Napster experience, in which music has been given away for free over peer-to-peer networks. Consequently these industries have made a strong effort both to encrypt their products and to lobby the government to mandate encryption schemes. The Digital Millennium Copyright Act, for example, makes it a federal crime to reverse-engineer encryption schemes used to protect copyright. When it comes to competitive markets, P1: KNP head margin: 1/2 gutter margin: 7/8 CUUS245-02 cuus245 978 0 521 87928 6 May 28, 2008 10:35 Creation under Competition 35 the Napster experience is deceptive – the product distributed on Napster-like networks is not only cheaper than the commercial product but also is also better.

My friend Dave Drake has given me permission to let the public know that his best-earning book published by anyone other than Baen, in one reporting period, earned him $36,000 in royalties for the paper edition – and $28 for the electronic edition. And that’s about typical for even a successful book issued electronically [in encrypted form].32 Interestingly, searching the Gnutella peer-to-peer network on September 1, 2002, and on a number of subsequent occasions, the keyword e-book turns up several books released by Baen in electronic form. But they are legal copies of books given away by Baen for free – we found none of the books that Baen sells. In the end, it is difficult to avoid the conclusion that it is the unpopularity of the music industry with its customers, combined with the inferiority of the “legitimate” product, that has led to the widespread giving away of MP3s for the cost of personal time and bandwidth.


pages: 184 words: 53,625

Future Perfect: The Case for Progress in a Networked Age by Steven Johnson

Airbus A320, airport security, algorithmic trading, banking crisis, barriers to entry, Bernie Sanders, call centre, Captain Sullenberger Hudson, Cass Sunstein, Charles Lindbergh, classic study, cognitive dissonance, credit crunch, crowdsourcing, dark matter, Dava Sobel, David Brooks, Donald Davies, Evgeny Morozov, Fairchild Semiconductor, future of journalism, Great Leap Forward, high-speed rail, hive mind, Howard Rheingold, HyperCard, Jane Jacobs, John Gruber, John Harrison: Longitude, Joi Ito, Kevin Kelly, Kickstarter, lone genius, Mark Zuckerberg, mega-rich, meta-analysis, Naomi Klein, Nate Silver, Occupy movement, packet switching, peer-to-peer, Peter Thiel, planetary scale, pre–internet, private spaceflight, radical decentralization, RAND corporation, risk tolerance, seminal paper, shareholder value, Silicon Valley, Silicon Valley startup, social graph, SpaceShipOne, Steve Jobs, Steven Pinker, Stewart Brand, systems thinking, techno-determinism, The Death and Life of Great American Cities, the long tail, Tim Cook: Apple, urban planning, US Airways Flight 1549, WikiLeaks, William Langewiesche, working poor, X Prize, Yochai Benkler, your tax dollars at work

Lindahl himself ultimately stopped contributing to Wikipedia, driven off by what he called the “deletionistas.” But over time, the revisions tightened the prose and expanded the scope of the entry. The end result is a rich, informative, well-structured document that covers the technical elements of peer-to-peer networks, but also includes sections on their social and economic impact, and the historical context of their invention. Near the end of the entry, the text even suggests that peer-to-peer networks are increasingly being used to describe human-to-human interactions, including notions of peer governance and peer production. The media like to highlight stories of Wikipedia abuse: the scurrilous attack that a user has added to a rival’s biographical entry; the endless fighting over the content of the abortion entry, or the entry on the Iraq War.

Years after both Baran and Davies had published their seminal papers, Davies jokingly said to Baran, “Well, you may have got there first, but I got the name.” In the late 1960s, packet switching became the foundation of ARPANET, the research network that laid the groundwork for the Internet. The ARPANET design relied on several radical principles that broke with existing computing paradigms. ARPANET was what we would now call a peer-to-peer network, as opposed to a client-server or mainframe-terminal network. Traditionally, networks had involved centralized mainframes that contained far more processing power and storage capacity than the less advanced terminals connected to them. The intelligence in the network, in other words, was centralized; decisions about what kind of information should be prioritized in the network were executed in these dominant machines.

Bottom-up implies a top, a leadership that gets its support from below, a kind of reverse hierarchy. But the network that Baran, Cerf, and others designed was a network of peers, not a hierarchy. No single agency controlled it absolutely; everyone controlled it partially. Decentralization, peer-to-peer networks, gateways, platform stacks—the principles that Baran, Davies, Cerf, Kahn, and others hit upon together in the 1960s and 1970s provided a brilliant solution to the problem of sharing information on a planetary scale. Tellingly, the solution ultimately outperformed any rival approaches developed by the marketplace.


The Internet Trap: How the Digital Economy Builds Monopolies and Undermines Democracy by Matthew Hindman

A Declaration of the Independence of Cyberspace, accounting loophole / creative accounting, activist fund / activist shareholder / activist investor, AltaVista, Amazon Web Services, barriers to entry, Benjamin Mako Hill, bounce rate, business logic, Cambridge Analytica, cloud computing, computer vision, creative destruction, crowdsourcing, David Ricardo: comparative advantage, death of newspapers, deep learning, DeepMind, digital divide, discovery of DNA, disinformation, Donald Trump, fake news, fault tolerance, Filter Bubble, Firefox, future of journalism, Ida Tarbell, incognito mode, informal economy, information retrieval, invention of the telescope, Jeff Bezos, John Perry Barlow, John von Neumann, Joseph Schumpeter, lake wobegon effect, large denomination, longitudinal study, loose coupling, machine translation, Marc Andreessen, Mark Zuckerberg, Metcalfe’s law, natural language processing, Netflix Prize, Network effects, New Economic Geography, New Journalism, pattern recognition, peer-to-peer, Pepsi Challenge, performance metric, power law, price discrimination, recommendation engine, Robert Metcalfe, search costs, selection bias, Silicon Valley, Skype, sparse data, speech recognition, Stewart Brand, surveillance capitalism, technoutopianism, Ted Nelson, The Chicago School, the long tail, The Soul of a New Machine, Thomas Malthus, web application, Whole Earth Catalog, Yochai Benkler

China and, 178; Chrome and, 24–25, 145; Colossus and, 21; cost per thousand impressions (CPM) and, 69; dark fiber and, 21; data centers of, 2, 12, 15–16, 20–23, 54; DeepMind and, 23, 194n24; design advantages and, 25–28; Dremel and, 27; economic geography and, 68–69, 79–80; experiments and, 1–2, 25–26, 31, 55, 153, 158, 193n1; F1 and, 21, 23; Facebook duopoly and, 4, 30, 42, 68, 180; fast architecture of, 2, 21–25, 80, 144, 147, 176; fiber optic cables and, 2, 22; Gmail and, 21, 23; Hitwise and, 87; infrastructure and, 2, 21–22, 26, 28, 54, 158, 168, 176; MapReduce and, 21; market share of, 3, 24, 30–31, 173, 195, 195n63; nature of internet and, 164, 167–70, 179; news and, 32, 61, 102, 105, 108, 134–35, 143–48, 153, 156, 158; Page and, 27; page views and, 24, 108; peering and, 22, 164; Percolator and, 21; performance dashboards and, 24; personalization and, 39–40, 42, 53–55, 57, 61; Plus and, 174; power usage efficiency (PUE) and, 23; Project Kennedy and, 27; recommendation systems and, 53–55; revenue and, 2, 8, 28, 31, 68, 79, 143, 173–74, 179; routers of, 22; Russian hackers and, 178; Sawzall and, 27; Schmidt and, 37, 147; search results speed and, 1–2; server farms of, 15, 20, 28; Spanner and, 21, 23; stickiness and, 2, 24, 156, 167, 171; surveillance and, 176–77; TensorFlow and, 21; Tenzig and, 27; tilted playing field and, 15–16, 18, 20–32, 36–37, 194n24, 195n63; traffic and, 87, 90, 98; user affection for, 31; YouTube and, 21, 79, 145–46, 165 Google Docs, 18 Google File System, 20–21, 26 Google News, 39–40, 53–55, 61, 79, 148 Googlization of Everything, The (Vaidhyanathan), 39 governance, 105, 170–71 government subsidies, 133, 137, 140–42 Graepel, Thore, 59 Grateful Dead, 162 Gravity, 46–47 Groupon, 26 Guardian, 58, 147, 151, 158–59 hackers, 177–78 Hahn, Kyu, 32 Hale Global, 103 Hammerbacher, Jeff, 15 hardware, 22–23, 26–28, 31, 50, 54, 60, 147, 154, 164 Hargittai, Eszter, 31, 33–34 Häubl, Gerald, 34 Hauser Center, 119 headlines, 13, 32, 36, 38, 107, 147, 149–50, 154–57, 160–61 Here Comes Everybody (Shirky), 12 Herfindahl-Hirschman Index (HHI), 111, 115, 126, 127, 128, 130, 175, 200n18 Hill, Benjamin Mako, 170 Hispanics, 123–27, 191 Hitwise, 84, 87–88, 89 Hobbes, Thomas, 165–66 Hölzle, Urs, 24 Howard, Phil, 177 Huffington Post, 9, 19, 30, 102, 137, 145, 149–51, 168 Hundt, Reed, 18 hyperlocal sites, 68, 77–78, 81, 101–4, 119, 121, 130–37, 164, 180 hypertext, 3, 143 increasing returns, 36–37, 63–64, 80–81, 181, 184 information overload, 4 infrastructure: concentration and, 171 (see also concentration); Facebook and, 22, 168, 176; Google and, 2, 21–22, 26, 28, 54, 158, 168, 176; internet and, 2, 13, 21–29, 50, 54, 86, 152–54, 158–59, 168, 171, 176; news and, 152–54, 158–59; peer-to-peer networks and, 3, 19, 22, 37, 164; power laws and, 83, 86, 89, 93, 95–96, 184–85; stickiness and, 13, 23 innovation: attention economy and, 11; cloud computing and, 34, 153–54, 168, 203n28; evolution and, 13, 36, 60, 136–37, 148, 162, 164–73, 176–77, 180; experiments and, 11, 100, 133, 154; fiber optic cables and, 2, 22; hypertext and, 3; mobile devices and, 2–4, 13, 39, 69, 109, 137, 142–44, 147, 152, 160, 165, 167, 170, 179; nature of internet and, 163, 167, 170, 173, 175; news and, 11, 133, Index 139, 154; peer-to-peer networks and, 3, 19, 22, 37, 164; television and, 12; traffic and, 100 Institute for Interactive Journalism, 121 intellectual property, 8 international trade, 5, 62, 80 internet: browsers and, 2, 24–25, 34, 107, 143, 175, 195n63; concentration and, 171 (see also concentration); data centers and, 2, 12, 15–16, 20–23, 54; equality and, 3–4, 9, 13, 18–19, 22, 30, 64, 83–86, 96–101, 153, 164–69, 171, 198n41; founding myth of, 171; governance of, 170–75; hyperlocal sites and, 68, 77–78, 81, 101–4, 119, 121, 130–37, 164, 180; hypertext and, 3; imaginary, 163–64; infrastructure and, 2, 13, 21–29, 50, 54, 86, 152–54, 158–59, 168, 171, 176; lopsided understanding of, 5–8; nature of, 162–80; net neutrality and, 64, 84, 131, 170–72, 175; peer-to-peer networks and, 3, 19, 22, 37, 164; as postindustrial technology, 16, 163, 179; regulation and, 64, 104, 162, 172, 175, 177; search engines and, 168 (see also search engines); server farms and, 4, 15, 20, 28–29, 167; speed and, 1–2, 21–25, 30, 54, 81–82, 147–48, 166–67, 170, 190; surfing and, 77, 79, 107; World Wide Web and, 2–3, 83, 171 Intuit, 26 investment: attention economy and, 4, 9, 12–13; economic geography and, 73; increasing returns and, 36–37, 63–64, 80–81, 181, 184; methodology and, 183; nature of internet and, 169, 171, 174, 180; news and, 145, 148, 150–55, 158–60, 201n13; personalization and, 42, 50, 54; tilted playing field and, 15, 19–23, 28–29, 33; traffic and, 100 iOS, 18, 143, 168 iPad, 39, 142, 144 iPhone, 107, 142–43 Iyengar, Shanto, 32 Jansen, Bernard, 31 Java, 143 Johnson, Eric J., 34 journalism: attention economy and, 7, 10–13; best hope for, 160–61; Columbia Journalism Review and, 119, 148; cooperation and, 158–59; economic geography and, 78, 81; • 231 editors and, 29, 42, 48, 53, 70, 102–3, 132, 135, 149, 152, 155–61; government subsidies for, 133, 137, 140–42; hamster wheel, 148; headlines and, 13, 32, 36, 38, 107, 147, 149–50, 154–57, 160–61; hyperlocal sites and, 103–4, 119, 121, 130–37; Institute for Interactive Journalism and, 121; local, 104–5, 107, 118–21, 129–30; myth of monetization and, 134–35, 140, 145; nature of internet and, 179; nonprofit, 118, 133, 137, 140–42, 146, 160; personalization and, 39–40, 56; philanthropy and, 133, 137, 140–42; postindustrial, 179; profit and, 132–33; Project for Excellence in Journalism and, 107, 121; recommendation systems and, 40; reporters and, 10, 78, 132, 135, 145, 149–50, 156–61; Reynolds Journalism Institute and, 119; shortened articles and, 149; stickiness and, 132–37, 140–48, 152, 154, 157, 159–61; tilted playing field and, 35; traffic and, 101; unions and, 141 Karpf, David, 169 Kidder, Tracy, 82 Kimport, Katrina, 169 K-nearest neighbor algorithm, 44–45, 54 Knight Foundation, 159 Kogan, Aleksandr, 58–59 Kohavi, Ron, 28, 153 Koren, Yehuda, 44–49, 51, 196n15 Kosinski, Mikal, 59 Kovach, Bill, 160 Krugman, Paul, 6, 62–63, 80 Lake Wobegon effect, 187 Lank, Edward, 31–32 leakage, 88–89, 90, 92 legal issues: antitrust laws and, 42, 170, 172–75, 199n15; Campus Network and, 35; Congress and, 104, 141–42; courts and, 6, 129, 148; intellectual property and, 8; licenses and, 7, 30; Netflix Prize and, 47, 49; net neutrality and, 64, 84, 131, 170–72, 175; patents and, 16; Prometheus v.

Links within the hypertext could point to other relevant passages, definitions, graphics, tables, or even other documents on the same computer. The second technology was the internet, which by the 1980s had become ubiquitous in universities and research labs. The internet had been created as a peer-to-peer network, in which there were no central hubs: each computer could send and receive data with any other computer. Tim Berners-Lee, the creator of the web, saw that hypertext could piggyback on top of the internet. Instead of being sandboxed within a single computer, hypertext could link documents on computers continents apart.

Packets took fewer hops, and users saw their web pages and videos load faster, at least when they visited the largest sites. This shift of traffic to the edges is crucial for high-bandwidth, low-latency uses, like online video or interactive web applications. But it also challenges the notion that the internet is still a peer-to-peer network. Google might have its fiber hooked directly into Comcast’s network, but small sites do not. Google’s hardware, networking infrastructure, and software stack all show how big internet firms become more efficient as they scale up. Google or Facebook or Microsoft or Amazon can deploy more storage, more A Tilted Playing Field • 23 computing power, and more bandwidth per dollar than smaller firms.


pages: 239 words: 56,531

The Secret War Between Downloading and Uploading: Tales of the Computer as Culture Machine by Peter Lunenfeld

Albert Einstein, Andrew Keen, anti-globalists, Apple II, Berlin Wall, British Empire, Brownian motion, Buckminster Fuller, Burning Man, business cycle, business logic, butterfly effect, Charles Babbage, computer age, Computing Machinery and Intelligence, creative destruction, crowdsourcing, cuban missile crisis, Dissolution of the Soviet Union, don't be evil, Douglas Engelbart, Douglas Engelbart, Dynabook, East Village, Edward Lorenz: Chaos theory, Fairchild Semiconductor, Fall of the Berlin Wall, folksonomy, Francis Fukuyama: the end of history, Frank Gehry, Free Software Foundation, Grace Hopper, gravity well, Guggenheim Bilbao, Herman Kahn, Honoré de Balzac, Howard Rheingold, Ian Bogost, invention of movable type, Isaac Newton, Ivan Sutherland, Jacquard loom, Jane Jacobs, Jeff Bezos, John Markoff, John von Neumann, Jon Ronson, Kickstarter, Mark Zuckerberg, Marshall McLuhan, Mercator projection, Metcalfe’s law, Mother of all demos, mutually assured destruction, Neal Stephenson, Nelson Mandela, Network effects, new economy, Norbert Wiener, PageRank, pattern recognition, peer-to-peer, planetary scale, plutocrats, post-materialism, Potemkin village, RFID, Richard Feynman, Richard Stallman, Robert Metcalfe, Robert X Cringely, Schrödinger's Cat, Search for Extraterrestrial Intelligence, seminal paper, SETI@home, Silicon Valley, Skype, social bookmarking, social software, spaced repetition, Steve Ballmer, Steve Jobs, Steve Wozniak, technological determinism, Ted Nelson, the built environment, the Cathedral and the Bazaar, The Death and Life of Great American Cities, the medium is the message, Thomas L Friedman, Turing machine, Turing test, urban planning, urban renewal, Vannevar Bush, walkable city, Watson beat the top human players on Jeopardy!, William Shockley: the traitorous eight

Video games may have begun in arcades, but they are now exponentially more likely to be played in the home than outside it. As for the cinema, which was itself swallowed up by televisual prostheses like videocassette recorders (VCRs), DVRs, and DVDs, the computer simulates it, migrates it online, chops it into YouTube segments, has it pirated on peer-to-peer networks, and shoots, stores, and projects it digitally. When computers simulate telephones, everything becomes available from the free Internet calling on services like Skype to mobile tele/computing hybrids like the iPhone. When we are talking about communication devices, simulation engenders participation.

Bespoke futures might well restore some balance. The culture machine offers a growing capacity to create complex visualizations with digital systems and distribute them widely over high-speed networks, engaging with open-source cultural initiatives. We are now capable of taking advantage of peer-to-peer networking, file sharing, and massively scaled distributed computing to develop countervailing forces, or people’s rather than corporate scenario-building strategies. 116 BESPOKE FUTURES Bespoke Futures as Strange Attractors At an earlier cultural moment, we might have looked to the, or at least an, avant-garde for surplus futurity and to generate our bespoke futures.

Brenda Laurel once noted that “creating interactive simulations of complex systems is one of the most highly leveraged goals we can achieve with our burgeoning technological power. . . . Good simulations will not only help us learn about systems, they may help us evaluate policies and form political goals.”36 This new century brings new problems, as is always the case, but we would be foolish to not take advantage of peer-to-peer networking, file sharing, and massively scaled distributed computing to develop countervailing forces, from a truly populist scenario-building capacity to as yet unimaginable visualizations of change. Open-source cultural production challenges more than government and corporate centralization; it also serves to empower the citizenry.


pages: 412 words: 116,685

The Metaverse: And How It Will Revolutionize Everything by Matthew Ball

"hyperreality Baudrillard"~20 OR "Baudrillard hyperreality", 3D printing, Airbnb, Albert Einstein, Amazon Web Services, Apple Newton, augmented reality, Big Tech, bitcoin, blockchain, business process, call centre, cloud computing, commoditize, computer vision, COVID-19, cryptocurrency, deepfake, digital divide, digital twin, disintermediation, don't be evil, Elon Musk, en.wikipedia.org, Ethereum, ethereum blockchain, game design, gig economy, Google Chrome, Google Earth, Google Glasses, hype cycle, intermodal, Internet Archive, Internet of things, iterative process, Jeff Bezos, John Gruber, Kevin Roose, Kickstarter, lockdown, Mark Zuckerberg, Metcalfe’s law, Minecraft, minimum viable product, Neal Stephenson, Network effects, new economy, non-fungible token, open economy, openstreetmap, pattern recognition, peer-to-peer, peer-to-peer model, Planet Labs, pre–internet, QR code, recommendation engine, rent control, rent-seeking, ride hailing / ride sharing, Robinhood: mobile stock trading app, satellite internet, self-driving car, SETI@home, Silicon Valley, skeuomorphism, Skype, smart contracts, Snapchat, Snow Crash, social graph, social web, SpaceX Starlink, Steve Ballmer, Steve Jobs, thinkpad, TikTok, Tim Cook: Apple, TSMC, undersea cable, Vannevar Bush, vertical integration, Vitalik Buterin, Wayback Machine, Y2K

As anyone with a credit card knows, they are typically the least secure way to make a payment, and often suffer the most fraud. An estimated $6 trillion was spent via credit card in the US in 2021, with an average of $90 across more than 50 billion transactions. Finally, there are the digital payment networks (also known as peer-to-peer networks) such as PayPal and Venmo. Although users do not need bank accounts to open a PayPal or Venmo account, these accounts must be funded, with the money coming from an ACH payment (a bank account), credit card payment, or transfer from another user. Once funded, these platforms then serve as a centralized bank used by all accounts; transfers between users are effectively just reassignments of money held by the platform itself.

As of March 5, 2022, Helium’s network spanned more than 625,000 hot spots, up from fewer than 25,000 roughly a year earlier, distributed across nearly 50,000 cities in 165 countries.7 The total value of Helium’s tokens exceeds $5 billion.8 Notably, the company was founded in 2013, but struggled to gain adoption until it pivoted from a traditional (i.e., unpaid) peer-to-peer model to one which offered contributors direct compensation via cryptocurrency. The long-term viability and potential of Helium remains uncertain; most internet service providers (ISPs) prohibit their customers from rebroadcasting their internet connection, and while the ISPs typically have ignored such service violations as long as the connection was not resold and total data usage was low, there is no guarantee that the ISPs will continue to ignore such violations by users of Helium or any analogous system.


pages: 457 words: 128,838

The Age of Cryptocurrency: How Bitcoin and Digital Money Are Challenging the Global Economic Order by Paul Vigna, Michael J. Casey

Airbnb, Alan Greenspan, altcoin, Apple Newton, bank run, banking crisis, bitcoin, Bitcoin Ponzi scheme, blockchain, Bretton Woods, buy and hold, California gold rush, capital controls, carbon footprint, clean water, Cody Wilson, collaborative economy, collapse of Lehman Brothers, Columbine, Credit Default Swap, cross-border payments, cryptocurrency, David Graeber, decentralized internet, disinformation, disintermediation, Dogecoin, driverless car, Edward Snowden, Elon Musk, Ethereum, ethereum blockchain, fiat currency, financial engineering, financial innovation, Firefox, Flash crash, Ford Model T, Fractional reserve banking, Glass-Steagall Act, hacker house, Hacker News, Hernando de Soto, high net worth, informal economy, intangible asset, Internet of things, inventory management, Joi Ito, Julian Assange, Kickstarter, Kuwabatake Sanjuro: assassination market, litecoin, Long Term Capital Management, Lyft, M-Pesa, Marc Andreessen, Mark Zuckerberg, McMansion, means of production, Menlo Park, mobile money, Money creation, money: store of value / unit of account / medium of exchange, Nelson Mandela, Network effects, new economy, new new economy, Nixon shock, Nixon triggered the end of the Bretton Woods system, off-the-grid, offshore financial centre, payday loans, Pearl River Delta, peer-to-peer, peer-to-peer lending, pets.com, Ponzi scheme, prediction markets, price stability, printed gun, profit motive, QR code, RAND corporation, regulatory arbitrage, rent-seeking, reserve currency, Robert Shiller, Ross Ulbricht, Satoshi Nakamoto, seigniorage, shareholder value, sharing economy, short selling, Silicon Valley, Silicon Valley startup, Skype, smart contracts, special drawing rights, Spread Networks laid a new fibre optics cable between New York and Chicago, Steve Jobs, supply-chain management, Ted Nelson, The Great Moderation, the market place, the payments system, The Wealth of Nations by Adam Smith, too big to fail, transaction costs, tulip mania, Turing complete, Tyler Cowen, Tyler Cowen: Great Stagnation, Uber and Lyft, uber lyft, underbanked, Vitalik Buterin, WikiLeaks, Y Combinator, Y2K, zero-sum game, Zimmermann PGP

If a hallmark of a currency is utility, at this early point bitcoin had absolutely none. He had to get others to join. So, six days after the Genesis Block, Nakamoto went back to the same cryptography mailing list and told its readers that the program was ready: “Announcing the first release of bitcoin, a new electronic cash system that uses a peer-to-peer network to prevent double-spending.” And then the sales pitch: “It’s completely decentralized with no server or central authority.” The people on that list, who’d heard claims like this before, had no evidence yet that Nakamoto had overcome the challenge that had felled his predecessors: preventing fraudulent transactions—the so-called double-spending problem—when no central authority is charged with authenticating transactions.

Other investigators have gone off on interesting but equally fruitless tangents. Writing for The New Yorker, Joshua Davis fixated on some of the British spellings in Nakamoto’s writings and headed to the British Isles to find their author. He zeroed in on Michael Clear, a Dublin-based computer-science student who’d worked for Allied Irish Banks on peer-to-peer technology and who responded to Davis’s inquiries with the enticing line “I’m not Satoshi, but even if I was I wouldn’t tell you.” Davis’s work was inconclusive, but Clear’s comment, which he later said was intended as a harmless joke, meant the Irishman was inundated with e-mails. He has since vehemently denied creating bitcoin and has pleaded with people to leave him alone.


pages: 106 words: 22,332

Cancel Cable: How Internet Pirates Get Free Stuff by Chris Fehily

Firefox, patent troll, peer-to-peer, pirate software, power law, Silicon Valley, Skype, slashdot, WikiLeaks

The more popular the download, the more it costs the server in bandwidth charges. If the client or server has a problem mid-download (a power outage, lost connection, or system crash), then you’re stuck with an incomplete file and typically must restart the download — possibly a big download — from scratch. Peer-to-Peer Networks Adequate mirroring (use of cloned servers) alleviates some of the problems of client-server networks, but BitTorrent solves them outright by using a peer-to-peer (P2P) file-sharing network. Unlike a server-based network, where most of the resources lie with a few central servers, a P2P network has only peers, which are ordinary computers (like yours) that all act as equal points on the network.

Drag the program’s icon to the Applications folder or to your home folder, or follow the instructions in the installer window. In all cases, generate keys, apply cracks, and install and launch the program as the torrent instructs. Table of Contents Title Page Copyright Dedication 1: The Terrain Lawyers Victims Q&A Benefits About This Book 2: Understanding BitTorrent Client-Server Networks Peer-to-Peer Networks What You'll Need BitTorrent, Step by Step 3: File Types About File Types Hidden Extensions Unregistered Extensions Windows Tasks OS X Tasks 4: Malware About Malware Malicious Links Infected Files Vigilance Prevention Antimalware 5: Archives About Archives Types of Archives Working with Archives 6: Installing a BitTorrent Client About BitTorrent Clients Installing a Client Getting Help Limiting Upload Rates Other Settings 7: BitTorrent Search Engines Finding BitTorrent Search Engines Features to Look For Metasearch Sites Private Sites Google and Brethren Links to Torrents 8: Finding Torrents Search Tips Spotting Fakes 9: Customizing Your Client User Interface Main Window Torrent Jobs List 10: Downloading Torrents Finding a Torrent Reading a Torrent's Description and User Comments Downloading a .torrent File Selecting Content Files to Download Setting File Priorities Queueing a Torrent Starting a Torrent Waiting for the Download to Complete Removing a Torrent 11: Movies and TV Shows Movie Torrents Sources TV Torrents Video Formats Media Players Dubbing and Subtitles Other Videos 12: Pictures Image Formats 13: Music and Spoken Word Audio Formats 14: Books, Documents, and Fonts PDF Files Ebook Formats Other Document Formats Fonts 15: Applications and Games Archives Disk Images Executables Mounting Disk Images Burning Disks Keygens, Cracks, and Jailbreaks Installing Programs Table of Contents Title Page Copyright Dedication 1: The Terrain Lawyers Victims Q&A Benefits About This Book 2: Understanding BitTorrent Client-Server Networks Peer-to-Peer Networks What You'll Need BitTorrent, Step by Step 3: File Types About File Types Hidden Extensions Unregistered Extensions Windows Tasks OS X Tasks 4: Malware About Malware Malicious Links Infected Files Vigilance Prevention Antimalware 5: Archives About Archives Types of Archives Working with Archives 6: Installing a BitTorrent Client About BitTorrent Clients Installing a Client Getting Help Limiting Upload Rates Other Settings 7: BitTorrent Search Engines Finding BitTorrent Search Engines Features to Look For Metasearch Sites Private Sites Google and Brethren Links to Torrents 8: Finding Torrents Search Tips Spotting Fakes 9: Customizing Your Client User Interface Main Window Torrent Jobs List 10: Downloading Torrents Finding a Torrent Reading a Torrent's Description and User Comments Downloading a .torrent File Selecting Content Files to Download Setting File Priorities Queueing a Torrent Starting a Torrent Waiting for the Download to Complete Removing a Torrent 11: Movies and TV Shows Movie Torrents Sources TV Torrents Video Formats Media Players Dubbing and Subtitles Other Videos 12: Pictures Image Formats 13: Music and Spoken Word Audio Formats 14: Books, Documents, and Fonts PDF Files Ebook Formats Other Document Formats Fonts 15: Applications and Games Archives Disk Images Executables Mounting Disk Images Burning Disks Keygens, Cracks, and Jailbreaks Installing Programs

Table of Contents Title Page Copyright Dedication 1: The Terrain Lawyers Victims Q&A Benefits About This Book 2: Understanding BitTorrent Client-Server Networks Peer-to-Peer Networks What You'll Need BitTorrent, Step by Step 3: File Types About File Types Hidden Extensions Unregistered Extensions Windows Tasks OS X Tasks 4: Malware About Malware Malicious Links Infected Files Vigilance Prevention Antimalware 5: Archives About Archives Types of Archives Working with Archives 6: Installing a BitTorrent Client About BitTorrent Clients Installing a Client Getting Help Limiting Upload Rates Other Settings 7: BitTorrent Search Engines Finding BitTorrent Search Engines Features to Look For Metasearch Sites Private Sites Google and Brethren Links to Torrents 8: Finding Torrents Search Tips Spotting Fakes 9: Customizing Your Client User Interface Main Window Torrent Jobs List 10: Downloading Torrents Finding a Torrent Reading a Torrent's Description and User Comments Downloading a .torrent File Selecting Content Files to Download Setting File Priorities Queueing a Torrent Starting a Torrent Waiting for the Download to Complete Removing a Torrent 11: Movies and TV Shows Movie Torrents Sources TV Torrents Video Formats Media Players Dubbing and Subtitles Other Videos 12: Pictures Image Formats 13: Music and Spoken Word Audio Formats 14: Books, Documents, and Fonts PDF Files Ebook Formats Other Document Formats Fonts 15: Applications and Games Archives Disk Images Executables Mounting Disk Images Burning Disks Keygens, Cracks, and Jailbreaks Installing Programs Table of Contents Title Page Copyright Dedication 1: The Terrain Lawyers Victims Q&A Benefits About This Book 2: Understanding BitTorrent Client-Server Networks Peer-to-Peer Networks What You'll Need BitTorrent, Step by Step 3: File Types About File Types Hidden Extensions Unregistered Extensions Windows Tasks OS X Tasks 4: Malware About Malware Malicious Links Infected Files Vigilance Prevention Antimalware 5: Archives About Archives Types of Archives Working with Archives 6: Installing a BitTorrent Client About BitTorrent Clients Installing a Client Getting Help Limiting Upload Rates Other Settings 7: BitTorrent Search Engines Finding BitTorrent Search Engines Features to Look For Metasearch Sites Private Sites Google and Brethren Links to Torrents 8: Finding Torrents Search Tips Spotting Fakes 9: Customizing Your Client User Interface Main Window Torrent Jobs List 10: Downloading Torrents Finding a Torrent Reading a Torrent's Description and User Comments Downloading a .torrent File Selecting Content Files to Download Setting File Priorities Queueing a Torrent Starting a Torrent Waiting for the Download to Complete Removing a Torrent 11: Movies and TV Shows Movie Torrents Sources TV Torrents Video Formats Media Players Dubbing and Subtitles Other Videos 12: Pictures Image Formats 13: Music and Spoken Word Audio Formats 14: Books, Documents, and Fonts PDF Files Ebook Formats Other Document Formats Fonts 15: Applications and Games Archives Disk Images Executables Mounting Disk Images Burning Disks Keygens, Cracks, and Jailbreaks Installing Programs


pages: 571 words: 106,255

The Bitcoin Standard: The Decentralized Alternative to Central Banking by Saifedean Ammous

"World Economic Forum" Davos, Airbnb, Alan Greenspan, altcoin, bank run, banks create money, bitcoin, Black Swan, blockchain, Bretton Woods, British Empire, business cycle, capital controls, central bank independence, Charles Babbage, conceptual framework, creative destruction, cryptocurrency, currency manipulation / currency intervention, currency peg, delayed gratification, disintermediation, distributed ledger, Elisha Otis, Ethereum, ethereum blockchain, fiat currency, fixed income, floating exchange rates, Fractional reserve banking, full employment, George Gilder, Glass-Steagall Act, global reserve currency, high net worth, initial coin offering, invention of the telegraph, Isaac Newton, iterative process, jimmy wales, Joseph Schumpeter, low interest rates, market bubble, market clearing, means of production, military-industrial complex, Money creation, money: store of value / unit of account / medium of exchange, moral hazard, Network effects, Paul Samuelson, peer-to-peer, Peter Thiel, price mechanism, price stability, profit motive, QR code, quantum cryptography, ransomware, reserve currency, Richard Feynman, risk tolerance, Satoshi Nakamoto, scientific management, secular stagnation, smart contracts, special drawing rights, Stanford marshmallow experiment, The Nature of the Firm, the payments system, too big to fail, transaction costs, Walter Mischel, We are all Keynesians now, zero-sum game

All network members can verify the validity of the transaction by verifying that the transactions sending the money came from the owner of the right private key. In Bitcoin, the only form of ownership that exists is through the ownership of the private keys. Peer‐to‐peer network is a network structure in which all members have equal privileges and obligations toward one another. There are no central coordinators who can change the rules of the network. Node operators that disagree with how the network functions cannot impose their opinions on other members of the network or override their privileges. The most well‐known example of a peer‐to‐peer network is BitTorrent, a protocol for sharing files online. Whereas in centralized networks members download files from a central server that hosts them, in BitTorrent, users download files from each other directly, divided into small pieces.

In other words, Bitcoin would bring the desirable features of physical cash (lack of intermediaries, finality of transactions) to the digital realm and combine them with an ironclad monetary policy that cannot be manipulated to produce unexpected inflation to benefit an outside party at the expense of holders. Nakamoto succeeded in achieving this through the utilization of a few important though not widely understood technologies: a distributed peer‐to‐peer network with no single point of failure, hashing, digital signatures, and proof‐of‐work.2 Nakamoto removed the need for trust in a third party by building Bitcoin on a foundation of very thorough and ironclad proof and verification. It is fair to say that the central operational feature of Bitcoin is verification, and only because of that can Bitcoin remove the need for trust completely.3 Every transaction has to be recorded by every member of the network so that they all share one common ledger of balances and transactions.

ASIC chips are now specialized only in verifying transactions to receive reward coins (which is why they are commonly referred to as miners). Node operators can now generate unlimited wallets, allowing businesses to offer convenient wallets for users who can send and receive bitcoins without operating a node or spending processing power on verifying transactions. This has moved Bitcoin away from being a pure peer‐to‐peer network between identical nodes, but the main functional importance of the decentralized and distributed nature of the network has arguably remained intact, as a large number of nodes still exists and no single party is relied on to operate the network. Further, specialized mining has allowed for the processing power backing the network to grow to the astoundingly large size it has reached.


pages: 406 words: 88,820

Television disrupted: the transition from network to networked TV by Shelly Palmer

AOL-Time Warner, barriers to entry, call centre, commoditize, disintermediation, en.wikipedia.org, folksonomy, Golden age of television, hypertext link, interchangeable parts, invention of movable type, Irwin Jacobs: Qualcomm, James Watt: steam engine, Leonard Kleinrock, linear programming, Marc Andreessen, market design, Metcalfe’s law, pattern recognition, peer-to-peer, power law, recommendation engine, Saturday Night Live, shareholder value, Skype, spectrum auction, Steve Jobs, subscription business, Telecommunications Act of 1996, the long tail, There's no reason for any individual to have a computer in his home - Ken Olsen, Vickrey auction, Vilfredo Pareto, yield management

And, of utmost importance to this argument, most people cannot differentiate between the most expensive and the least expensive work product. Conversely, it takes an army of talented creative people to manufacture a professional television show or motion picture: writers, directors, producers, camera operators, Copyright © 2006, Shelly Palmer. All rights reserved. 5-Television.Chap Five v3.qxd 3/20/06 7:22 AM Page 71 Peer-to-Peer Networks 71 actors, art directors, wardrobe wranglers, set designers, set builders, script supervisors, hair, make-up, editors, graphic artists, composers, musicians, post-production supervisors… the list goes on and on. You might have all of the skills individually, but you probably don’t. And, even though you can make a video or a movie with a home video camera and the post-production suite of programs on your laptop, absolutely everyone who watches it will know it was “made with loving hands at home.”

There are already movies legally available for 99-cent downloads that are guaranteed to be virus-free and exactly as advertised. Again, respect for time, value and convenience is a good weapon against piracy. Is this to say that video and movies are not going to be pirated? Don’t be silly. People are going to trade them like baseball cards — but not all people, not every movie and not all of the time. Peer-to-Peer Networks It was easy to shut down Napster. All you had to do was disconnect the index server from the network and it was over. That’s because Napster was based upon a client-server network architecture where there was a central server with client “nodes” attached to it over the Internet, as in Figure 5.2.

As each peer is added to the network, it brings along computing power, bandwidth and storage that it can share with everyone, which increases the total capacity of the system as it expands. It is the distributed nature of P2P networks that make them powerful. Should a Copyright © 2006, Shelly Palmer. All rights reserved. 5-Television.Chap Five v3.qxd 3/20/06 7:22 AM Page 72 72 C H A P T E R 5 Emerging Networks FIGURE 5.2 Client-Server Network: FIGURE 5.3 Peer-to-peer networks do This type of network can be easily shut not have central file servers; since each down because each network node is con- node is connected to more than one other nected to a central server. node, they are very hard to shut down. single node fail, peers can find replicas of the data on multiple other peers.


pages: 801 words: 209,348

Americana: A 400-Year History of American Capitalism by Bhu Srinivasan

activist fund / activist shareholder / activist investor, American ideology, AOL-Time Warner, Apple II, Apple's 1984 Super Bowl advert, bank run, barriers to entry, Bear Stearns, Benchmark Capital, Berlin Wall, blue-collar work, Bob Noyce, Bonfire of the Vanities, British Empire, business cycle, buy and hold, California gold rush, Carl Icahn, Charles Lindbergh, collective bargaining, commoditize, Cornelius Vanderbilt, corporate raider, cotton gin, cuban missile crisis, Deng Xiaoping, diversification, diversified portfolio, Douglas Engelbart, Fairchild Semiconductor, financial innovation, fixed income, Ford Model T, Ford paid five dollars a day, global supply chain, Gordon Gekko, guns versus butter model, Haight Ashbury, hypertext link, Ida Tarbell, income inequality, information security, invisible hand, James Watt: steam engine, Jane Jacobs, Jeff Bezos, John Markoff, joint-stock company, joint-stock limited liability company, junk bonds, Kickstarter, laissez-faire capitalism, Louis Pasteur, Marc Andreessen, Menlo Park, Michael Milken, military-industrial complex, mortgage debt, mutually assured destruction, Norman Mailer, oil rush, peer-to-peer, pets.com, popular electronics, profit motive, punch-card reader, race to the bottom, refrigerator car, risk/return, Ronald Reagan, Sand Hill Road, self-driving car, shareholder value, side project, Silicon Valley, Silicon Valley startup, Steve Ballmer, Steve Jobs, Steve Wozniak, strikebreaker, Ted Nelson, The Death and Life of Great American Cities, the new new thing, The Predators' Ball, The Theory of the Leisure Class by Thorstein Veblen, The Wealth of Nations by Adam Smith, trade route, transcontinental railway, traveling salesman, Upton Sinclair, Vannevar Bush, Works Progress Administration, zero-sum game

As the record labels refused to sell music digitally, the technology for sharing music surpassed the music industry’s ability to invent a business model to keep up. This piracy was an early look into the next iteration of Internet technologies beyond simple Web sites. Peer-to-peer networks allowed a single individual’s computer to act as a server. Rather than have the entire library of millions of songs on a set of centralized servers controlled by one company, which would have made it easy for the courts and law enforcement to shut music sharing down, peer-to-peer technology now meant anyone could upload or download a song directly to or from another individual. With millions of people uploading songs, the entire recording industry’s catalog was dispersed across millions of computers for downloading by millions of others.

., 452 O’Banion, Dion, 316, 317 Occupy Wall Street, 487, 491 Ochs, Adolph, 237–39 Ogden, Aaron, 64, 65, 66 Ohio, 78, 118–19 Ohio and Erie Canal, 78 Ohio Company, 30–31 oil, 149–62, 490 crisis of 1973, 438 discovery in Pennsylvania of, 149–50 Drake’s technique for drilling for, 151 federal highway policy and, 406 pipeline companies and, 157 Rockefeller and, 154–56, 158–60 storage tanks for, 151–52 transportation of, 152–53, 156–58 Oldfield, Barney, 282 Olds, Ransom Eli, 279–80 Olds Motor Vehicle Company, 279–80, 286 Onitsuka, 457–58 Oregon country, 105 Organization Man, The (Whyte), 374, 428 Origin of Species (Darwin), 174 Other People’s Money (film), 444–45 Ottoman Empire, 296 Pabst, 179–80, 183, 184, 311 Pacific Railway Act, 147–48 Packard, 300 paddle wheel, 62 Paley, William, 306, 382–83 Panama Canal, 254 panics of 1837, 85, 87 of 1873, 169–71 of 1893, 226, 230–31 gold and, 229–30 papers, 226–39 Hearst and, 232–33, 239, 240–41 Ochs and, 237–39 patent medicine advertising and, 265–66 Pulitzer and, 226–29, 239, 241 Paramount, 341 Pasteur, Louis, 179 pasteurization, 179 patent medicines, 208–9, 262–66 patents, 51, 96, 189–90 Pearl Harbor bombing, 363 Pearl Jam, 454 peer-to-peer networks, 482 Pemberton, John, 263–65 Penn, William, 25, 32 Pennsylvania, 25, 32 Pennsylvania Gazette, 30 Pennsylvania Railroad, 140, 141, 164–65, 166 Pennsylvania Rock Oil Company (Seneca Oil Company), 150–51 Pennsylvania Transportation Company, 157 Perot, Ross, 418, 419, 420, 464 philanthropy, 219–20, 249 Philip Morris, 383 Philippines, 246, 247 Pilgrims/Plymouth Colony, 3–6, 8–17 buy-out of shares of Merchant Adventurers, 16–17 collective farming and, 15–16 contact and trade with Native Americans, 13–15 financing of Mayflower voyage, 5–6, 10–12, 425 in Holland, 3–4 loss of Fortune’s cargo, effects of, 15 mortality rates, of first winter, 13 patent to settle in New World granted to, 5 Pinkerton, Robert, 221 Pixar, 480, 482 Plain Facts for Old and Young (Kellogg), 260 Plains Indians, 175–77 Of Plymouth Plantation (Bradford), 12–13 Polk, James, 104, 106, 108 Pong (computer game), 427, 430–31 Post, Charles William, 259, 261–62 potato famine, 89 Potomac Canal Company, 71–72 Presidential elections of 1860, 137 of 1896, 235–37, 239, 240–41 of 1900, 246–47 of 1904, 265 of 1912, 296 of 1928, 321 of 1932, 330–31 of 1936, 335 of 1940, 359–60 of 1952, 389 of 1980, 433 of 1992, 463–64 Pretty Woman (film), 449 price fixing, 241 private equity (leverage buyouts), 448–49 privateering syndicates, 7–8 Prodigy, 465 Progressive Networks, 471 Progressives, 209 Prohibition, 307–19 bootlegging and, 315–19 cultural activity during, 313–15 Eighteenth Amendment and Volstead Act, passage of, 309 exemptions, 309–10, 312 grape growers and, 310–11 politics leading to, 307–9 property, slaves as, 44–45, 117–18 Prudential Insurance, 331 public/private partnerships, 81–82, 86 Puerto Rico, 246 Pulitzer, Joseph, 148, 226–29, 239, 241 Pullman Palace Car Company, 231 Pure Food and Drug Act, 208–9, 274–75 Quantum Computer Services, 465 radio, 292–96, 301–6 audio transmission and, 302–6 government regulation of, 295–96 Titanic sinking and, 293–94 World War I and, 301 Radio Corporation of America (RCA), 302–4, 305–6, 381 Radio Dealer, 304–5 railroads, 80–91 Civil War and, 140–42 coal and, 80–81 commercial trucking supplanting, 402 corporate entities and, 83–84, 85–86 eminent domain and, 84–85 first tracks and locomotives in U.S., 81–82 immigration and, 89–90 oil transportation and, 157–58 Plains Indians and, 176–77 slow growth of, in 1830s, 83, 85 stock financing of, 83–84 telegraph and, 100–101 transcontinental, 147–48 Vanderbilt and, 87–89 World War I and, 300 Rand, Ayn, 388 Randolph, William, 111 RCA, 438 Reagan, Ronald, 388–89, 433 acting and television career of, 385–87, 390 childhood and education of, 384–85 Remington, 181, 182 repeater, 189 Republican Party, 121, 183, 224 residential construction Great Depression and, 328–29 Levitt’s mass-manufacturing techniques for, 369, 370–72 returning World War II servicemen and, 368–69 retail, 198–210 catalogs and, 205–9 consumer protection laws, need for, 210 country stores, 205 department stores, 201–4 discount stores, 402–4 economies of scale in, 202–3 general stores, 201, 202 mom-and-pop shops, 404 specialty, 201, 202 U.S.


Americana by Bhu Srinivasan

activist fund / activist shareholder / activist investor, American ideology, AOL-Time Warner, Apple II, Apple's 1984 Super Bowl advert, bank run, barriers to entry, Bear Stearns, Benchmark Capital, Berlin Wall, blue-collar work, Bob Noyce, Bonfire of the Vanities, British Empire, business cycle, buy and hold, California gold rush, Carl Icahn, Charles Lindbergh, collective bargaining, commoditize, Cornelius Vanderbilt, corporate raider, cotton gin, cuban missile crisis, Deng Xiaoping, diversification, diversified portfolio, Douglas Engelbart, Fairchild Semiconductor, financial innovation, fixed income, Ford Model T, Ford paid five dollars a day, global supply chain, Gordon Gekko, guns versus butter model, Haight Ashbury, hypertext link, Ida Tarbell, income inequality, information security, invisible hand, James Watt: steam engine, Jane Jacobs, Jeff Bezos, John Markoff, joint-stock company, joint-stock limited liability company, junk bonds, Kickstarter, laissez-faire capitalism, Louis Pasteur, Marc Andreessen, Menlo Park, Michael Milken, military-industrial complex, mortgage debt, mutually assured destruction, Norman Mailer, oil rush, peer-to-peer, pets.com, popular electronics, profit motive, punch-card reader, race to the bottom, refrigerator car, risk/return, Ronald Reagan, Sand Hill Road, self-driving car, shareholder value, side project, Silicon Valley, Silicon Valley startup, Steve Ballmer, Steve Jobs, Steve Wozniak, strikebreaker, Ted Nelson, The Death and Life of Great American Cities, the new new thing, The Predators' Ball, The Theory of the Leisure Class by Thorstein Veblen, The Wealth of Nations by Adam Smith, trade route, transcontinental railway, traveling salesman, Upton Sinclair, Vannevar Bush, Works Progress Administration, zero-sum game

As the record labels refused to sell music digitally, the technology for sharing music surpassed the music industry’s ability to invent a business model to keep up. This piracy was an early look into the next iteration of Internet technologies beyond simple Web sites. Peer-to-peer networks allowed a single individual’s computer to act as a server. Rather than have the entire library of millions of songs on a set of centralized servers controlled by one company, which would have made it easy for the courts and law enforcement to shut music sharing down, peer-to-peer technology now meant anyone could upload or download a song directly to or from another individual. With millions of people uploading songs, the entire recording industry’s catalog was dispersed across millions of computers for downloading by millions of others.

., 452 O’Banion, Dion, 316, 317 Occupy Wall Street, 487, 491 Ochs, Adolph, 237–39 Ogden, Aaron, 64, 65, 66 Ohio, 78, 118–19 Ohio and Erie Canal, 78 Ohio Company, 30–31 oil, 149–62, 490 crisis of 1973, 438 discovery in Pennsylvania of, 149–50 Drake’s technique for drilling for, 151 federal highway policy and, 406 pipeline companies and, 157 Rockefeller and, 154–56, 158–60 storage tanks for, 151–52 transportation of, 152–53, 156–58 Oldfield, Barney, 282 Olds, Ransom Eli, 279–80 Olds Motor Vehicle Company, 279–80, 286 Onitsuka, 457–58 Oregon country, 105 Organization Man, The (Whyte), 374, 428 Origin of Species (Darwin), 174 Other People’s Money (film), 444–45 Ottoman Empire, 296 Pabst, 179–80, 183, 184, 311 Pacific Railway Act, 147–48 Packard, 300 paddle wheel, 62 Paley, William, 306, 382–83 Panama Canal, 254 panics of 1837, 85, 87 of 1873, 169–71 of 1893, 226, 230–31 gold and, 229–30 papers, 226–39 Hearst and, 232–33, 239, 240–41 Ochs and, 237–39 patent medicine advertising and, 265–66 Pulitzer and, 226–29, 239, 241 Paramount, 341 Pasteur, Louis, 179 pasteurization, 179 patent medicines, 208–9, 262–66 patents, 51, 96, 189–90 Pearl Harbor bombing, 363 Pearl Jam, 454 peer-to-peer networks, 482 Pemberton, John, 263–65 Penn, William, 25, 32 Pennsylvania, 25, 32 Pennsylvania Gazette, 30 Pennsylvania Railroad, 140, 141, 164–65, 166 Pennsylvania Rock Oil Company (Seneca Oil Company), 150–51 Pennsylvania Transportation Company, 157 Perot, Ross, 418, 419, 420, 464 philanthropy, 219–20, 249 Philip Morris, 383 Philippines, 246, 247 Pilgrims/Plymouth Colony, 3–6, 8–17 buy-out of shares of Merchant Adventurers, 16–17 collective farming and, 15–16 contact and trade with Native Americans, 13–15 financing of Mayflower voyage, 5–6, 10–12, 425 in Holland, 3–4 loss of Fortune’s cargo, effects of, 15 mortality rates, of first winter, 13 patent to settle in New World granted to, 5 Pinkerton, Robert, 221 Pixar, 480, 482 Plain Facts for Old and Young (Kellogg), 260 Plains Indians, 175–77 Of Plymouth Plantation (Bradford), 12–13 Polk, James, 104, 106, 108 Pong (computer game), 427, 430–31 Post, Charles William, 259, 261–62 potato famine, 89 Potomac Canal Company, 71–72 Presidential elections of 1860, 137 of 1896, 235–37, 239, 240–41 of 1900, 246–47 of 1904, 265 of 1912, 296 of 1928, 321 of 1932, 330–31 of 1936, 335 of 1940, 359–60 of 1952, 389 of 1980, 433 of 1992, 463–64 Pretty Woman (film), 449 price fixing, 241 private equity (leverage buyouts), 448–49 privateering syndicates, 7–8 Prodigy, 465 Progressive Networks, 471 Progressives, 209 Prohibition, 307–19 bootlegging and, 315–19 cultural activity during, 313–15 Eighteenth Amendment and Volstead Act, passage of, 309 exemptions, 309–10, 312 grape growers and, 310–11 politics leading to, 307–9 property, slaves as, 44–45, 117–18 Prudential Insurance, 331 public/private partnerships, 81–82, 86 Puerto Rico, 246 Pulitzer, Joseph, 148, 226–29, 239, 241 Pullman Palace Car Company, 231 Pure Food and Drug Act, 208–9, 274–75 Quantum Computer Services, 465 radio, 292–96, 301–6 audio transmission and, 302–6 government regulation of, 295–96 Titanic sinking and, 293–94 World War I and, 301 Radio Corporation of America (RCA), 302–4, 305–6, 381 Radio Dealer, 304–5 railroads, 80–91 Civil War and, 140–42 coal and, 80–81 commercial trucking supplanting, 402 corporate entities and, 83–84, 85–86 eminent domain and, 84–85 first tracks and locomotives in U.S., 81–82 immigration and, 89–90 oil transportation and, 157–58 Plains Indians and, 176–77 slow growth of, in 1830s, 83, 85 stock financing of, 83–84 telegraph and, 100–101 transcontinental, 147–48 Vanderbilt and, 87–89 World War I and, 300 Rand, Ayn, 388 Randolph, William, 111 RCA, 438 Reagan, Ronald, 388–89, 433 acting and television career of, 385–87, 390 childhood and education of, 384–85 Remington, 181, 182 repeater, 189 Republican Party, 121, 183, 224 residential construction Great Depression and, 328–29 Levitt’s mass-manufacturing techniques for, 369, 370–72 returning World War II servicemen and, 368–69 retail, 198–210 catalogs and, 205–9 consumer protection laws, need for, 210 country stores, 205 department stores, 201–4 discount stores, 402–4 economies of scale in, 202–3 general stores, 201, 202 mom-and-pop shops, 404 specialty, 201, 202 U.S.


The Smartphone Society by Nicole Aschoff

"Susan Fowler" uber, 4chan, A Declaration of the Independence of Cyberspace, Airbnb, algorithmic bias, algorithmic management, Amazon Web Services, artificial general intelligence, autonomous vehicles, barriers to entry, Bay Area Rapid Transit, Bernie Sanders, Big Tech, Black Lives Matter, blockchain, carbon footprint, Carl Icahn, Cass Sunstein, citizen journalism, cloud computing, correlation does not imply causation, crony capitalism, crowdsourcing, cryptocurrency, data science, deep learning, DeepMind, degrowth, Demis Hassabis, deplatforming, deskilling, digital capitalism, digital divide, do what you love, don't be evil, Donald Trump, Downton Abbey, Edward Snowden, Elon Musk, Evgeny Morozov, fake news, feminist movement, Ferguson, Missouri, Filter Bubble, financial independence, future of work, gamification, gig economy, global value chain, Google Chrome, Google Earth, Googley, green new deal, housing crisis, income inequality, independent contractor, Jaron Lanier, Jeff Bezos, Jessica Bruder, job automation, John Perry Barlow, knowledge economy, late capitalism, low interest rates, Lyft, M-Pesa, Mark Zuckerberg, minimum wage unemployment, mobile money, moral panic, move fast and break things, Naomi Klein, Network effects, new economy, Nicholas Carr, Nomadland, occupational segregation, Occupy movement, off-the-grid, offshore financial centre, opioid epidemic / opioid crisis, PageRank, Patri Friedman, peer-to-peer, Peter Thiel, pets.com, planned obsolescence, quantitative easing, Ralph Waldo Emerson, RAND corporation, Ray Kurzweil, RFID, Richard Stallman, ride hailing / ride sharing, Rodney Brooks, Ronald Reagan, Salesforce, Second Machine Age, self-driving car, shareholder value, sharing economy, Sheryl Sandberg, Shoshana Zuboff, Sidewalk Labs, Silicon Valley, single-payer health, Skype, Snapchat, SoftBank, statistical model, Steve Bannon, Steve Jobs, surveillance capitalism, TaskRabbit, tech worker, technological determinism, TED Talk, the scientific method, The Structural Transformation of the Public Sphere, TikTok, transcontinental railway, transportation-network company, Travis Kalanick, Uber and Lyft, Uber for X, uber lyft, upwardly mobile, Vision Fund, W. E. B. Du Bois, wages for housework, warehouse robotics, WikiLeaks, women in the workforce, yottabyte

Silicon Valley, we’re told, is building an architecture for inclusive growth. Its platforms promise to not only enhance connection but to bring a new world of interpersonal trust and innovation.16 Each of us can participate easily, seamlessly, through our phones. By creating online profiles, sharing, and connecting with others in new decentralized, peer-to-peer networks the individual can shine and thrive, gaining not only attention and followers but also power and potentially money. These networks of empowered individuals are creating something from nothing—new consumption experiences, new economic activity. We are growing the pie, making new space for individuals who were left out in neoliberalism.

Smartphones, which are “1 million times cheaper, 1000 times more powerful, and about 100,000 times smaller than one computer in MIT in 1965,” seem to exemplify this arrival.18 The explosive growth in connectivity at all scales over the past decade, in combination with advances in data collection and storage, computing power, and machine learning, have convinced many scholars that we’re on the precipice of something fundamentally different and new. Two MIT professors, Eric Brynjolfsson and Andrew McAfee, say we’ve reached the “second machine age.” Brynjolfsson and McAfee liken the impact of computers, big data, peer-to-peer networks, and other digital advances in our technological capabilities to the monumental societal impact of the steam engine and electricity: However, unlike the steam engine or electricity, second machine age technologies continue to improve at a remarkably rapid exponential pace, replicating their power with digital perfection and creating even more opportunities for combinatorial innovation. . . .

Perhaps following in the footsteps of Henry Ford’s model city, Fordlandia, built in the Brazilian state of Pará, Microsoft purchased twenty-five thousand acres in Arizona to build the City of the Future, while Page has invested in research on the feasibility of privately owned city-states.26 More recently Jeffrey Berns, a cryptocurrency millionaire, bought a chunk of land in Nevada bigger than Reno to build a Utopian blockchain community. Berns believes that blockchains—decentralized, distributed, public digital ledgers facilitated by autonomous, peer- to-peer networks—will give people rather than companies or governments power: “I don’t know why,” says Berns. I just—something inside me tells me this is the answer, that if we can get enough people to trust the blockchain, we can begin to change all the systems we operate by.”27 Blockchain Utopias and the Singularity are pretty far afield from phone apps and social networks, but the expansive simplicity of its vision is what makes the emergent Silicon Valley spirit of capitalism so appealing.


pages: 552 words: 143,074

Without Copyrights: Piracy, Publishing, and the Public Domain (Modernist Literature and Culture) by Robert Spoo

invisible hand, Network effects, New Journalism, peer-to-peer, Ronald Reagan, tragedy of the anticommons, transaction costs

Applied, as it often is today, to unauthorized file sharing by countless anonymous or pseudonymous users in decentralized peer-to-peer networks,17 the phrase conjures up conspiratorial intent to break the law—a gigantic, orchestrated music heist—when in fact the very nature of decentralized file sharing scatters concerted intent and mens rea over the vast reaches of the World Wide Web. This is why the music and movie industries have focused much of their litigation efforts on the purveyors of peer-to-peer technologies and services: Napster, Aimster, Grokster, Kazaa, LimeWire, BitTorrent, and, of course, The Pirate Bay.


pages: 189 words: 57,632

Content: Selected Essays on Technology, Creativity, Copyright, and the Future of the Future by Cory Doctorow

AltaVista, AOL-Time Warner, book scanning, Brewster Kahle, Burning Man, cognitive load, drop ship, en.wikipedia.org, general purpose technology, informal economy, information retrieval, Internet Archive, invention of movable type, Jeff Bezos, John Gilmore, John Perry Barlow, Law of Accelerating Returns, machine readable, Metcalfe's law, mirror neurons, Mitch Kapor, moral panic, mutually assured destruction, Neal Stephenson, new economy, optical character recognition, PalmPilot, patent troll, pattern recognition, peer-to-peer, Ponzi scheme, post scarcity, QWERTY keyboard, Ray Kurzweil, RFID, Sand Hill Road, Skype, slashdot, Snow Crash, social software, speech recognition, Steve Jobs, the long tail, Thomas Bayes, Turing test, Vernor Vinge, Wayback Machine

Seventy years later, Napster showed us that, as William Gibson noted, "We may be at the end of the brief period during which it is possible to charge for recorded music." Surely we're at the end of the period where it's possible to exclude those who don't wish to pay. Every song released can be downloaded gratis from a peer-to-peer network (and will shortly get easier to download, as hard-drive price/performance curves take us to a place where all the music ever recorded will fit on a disposable pocket-drive that you can just walk over to a friend's place and copy). But have no fear: the Internet makes it possible for recording artists to reach a wider audience than ever dreamt of before.

Having to compete with free copies handed from user to user makes life harder — hasn't it always? But it is most assuredly possible. Look at Apple's wildly popular iTunes Music Store, which has sold over one billion tracks since 2003. Every song on iTunes is available as a free download from user-to-user, peer-to-peer networks like Kazaa. Indeed, the P2P monitoring company Big Champagne reports that the average time-lapse between a iTunes-exclusive song being offered by Apple and that same song being offered on P2P networks is 180 seconds. Every iTunes customer could readily acquire every iTunes song for free, using the fastest-adopted technology in history.

[fn: My lifestyle is as gypsy and fancy-free as the characters in H2G2, and as a result my copies of the Adams books are thousands of miles away in storages in other countries, and this essay was penned on public transit and cheap hotel rooms in Chile, Boston, London, Geneva, Brussels, Bergen, Geneva (again), Toronto, Edinburgh, and Helsinki. Luckily, I was able to download a dodgy, re-keyed version of the Adams books from a peer-to-peer network, which network I accessed via an open wireless network on a random street-corner in an anonymous city, a fact that I note here as testimony to the power of the Internet to do what the Guide does for Ford and Arthur: put all the information I need at my fingertips, wherever I am. However, these texts are a little on the dodgy side, as noted, so you might want to confirm these quotes before, say, uttering them before an Adams truefan.]


pages: 319 words: 89,477

The Power of Pull: How Small Moves, Smartly Made, Can Set Big Things in Motion by John Hagel Iii, John Seely Brown

Albert Einstein, Andrew Keen, barriers to entry, Black Swan, business process, call centre, Clayton Christensen, clean tech, cloud computing, commoditize, corporate governance, creative destruction, disruptive innovation, Elon Musk, en.wikipedia.org, future of work, game design, George Gilder, intangible asset, Isaac Newton, job satisfaction, Joi Ito, knowledge economy, knowledge worker, loose coupling, Louis Pasteur, Malcom McLean invented shipping containers, Marc Benioff, Maui Hawaii, medical residency, Network effects, old-boy network, packet switching, pattern recognition, peer-to-peer, pre–internet, profit motive, recommendation engine, Ronald Coase, Salesforce, shareholder value, Silicon Valley, Skype, smart transportation, software as a service, supply-chain management, tacit knowledge, The Nature of the Firm, the new new thing, the strength of weak ties, too big to fail, trade liberalization, transaction costs, TSMC, Yochai Benkler

The team-and-leader dynamic will be familiar to fans of the Tour de France, where the team keeps its leader out of the wind for the first 100 miles of a mountain stage only to fall away as the leader rides the final 10 miles, up the steepest grade, battling mano a mano with the leaders from other teams. But teams can only get so big. One way to address this limitation is to design a space where large numbers of teams can operate in parallel. Creation spaces go one step further by introducing the opportunity to participate in peer-to-peer networks that cut across teams, leveraging their individual experiences and providing access to a much more diverse body of expertise than would otherwise exist. These learning networks organize around shared resources such as discussion boards, video repositories, and archives of previous contributions.

In some cases, they may also benefit from physical gatherings, such as conferences or competitions. Although much of the interaction at this level involves the transfer of knowledge, new knowledge is often generated as participants hold sustained discussions about their performance challenges. New knowledge also emerges as peer-to-peer networks like these apply innovations and new knowledge in diverse environments where they can be tested and improved. Environments Creation spaces need careful planning and design at their inception, but the organizers’ initial design often evolves rapidly thereafter as participants begin to make their own contributions.

To work successfully, the creation space must be designed to work at three levels, with the second level building on the first and the third building on the first two. First, the creation space must be designed to foster the formation of teams and interactions within each of the teams. Second, it must be designed to encourage the formation of robust and diverse peer-to-peer networks that expand knowledge-sharing and knowledge-creation activities across teams. Third, it must be designed to reach beyond the creation space and engage a broader set of participants in the products of the creation space, as when nightclub DJs play music created online at ccMixter, or when employees of other corporations participate in SAP’s Developer Network.


pages: 960 words: 125,049

Mastering Ethereum: Building Smart Contracts and DApps by Andreas M. Antonopoulos, Gavin Wood Ph. D.

air gap, Amazon Web Services, bitcoin, blockchain, business logic, continuous integration, cryptocurrency, Debian, digital divide, Dogecoin, domain-specific language, don't repeat yourself, Edward Snowden, en.wikipedia.org, Ethereum, ethereum blockchain, fault tolerance, fiat currency, Firefox, functional programming, Google Chrome, information security, initial coin offering, intangible asset, Internet of things, litecoin, machine readable, move fast and break things, node package manager, non-fungible token, peer-to-peer, Ponzi scheme, prediction markets, pull request, QR code, Ruby on Rails, Satoshi Nakamoto, sealed-bid auction, sharing economy, side project, smart contracts, transaction costs, Turing complete, Turing machine, Vickrey auction, Vitalik Buterin, web application, WebSocket

Mist was also the first wallet to introduce the camelCase checksum (EIP-55; see “Hex Encoding with Checksum in Capitalization (EIP-55)”). Mist runs a full node and offers a full DApp browser with support for Swarm-based storage and ENS addresses. Network Referring to the Ethereum network, a peer-to-peer network that propagates transactions and blocks to every Ethereum node (network participant). NFT A non-fungible token (also known as a “deed”). This is a token standard introduced by the ERC721 proposal. NFTs can be tracked and traded, but each token is unique and distinct; they are not interchangeable like ERC20 tokens.

While providing high availability, auditability, transparency, and neutrality, it also reduces or eliminates censorship and reduces certain counterparty risks. Compared to Bitcoin Many people will come to Ethereum with some prior experience of cryptocurrencies, specifically Bitcoin. Ethereum shares many common elements with other open blockchains: a peer-to-peer network connecting participants, a Byzantine fault–tolerant consensus algorithm for synchronization of state updates (a proof-of-work blockchain), the use of cryptographic primitives such as digital signatures and hashes, and a digital currency (ether). Yet in many ways, both the purpose and construction of Ethereum are strikingly different from those of the open blockchains that preceded it, including Bitcoin.

Ethereum’s founders were thinking about a blockchain without a specific purpose, that could support a broad variety of applications by being programmed. The idea was that by using a general-purpose blockchain like Ethereum, a developer could program their particular application without having to implement the underlying mechanisms of peer-to-peer networks, blockchains, consensus algorithms, etc. The Ethereum platform was designed to abstract these details and provide a deterministic and secure programming environment for decentralized blockchain applications. Much like Satoshi, Vitalik and Gavin didn’t just invent a new technology; they combined new inventions with existing technologies in a novel way and delivered the prototype code to prove their ideas to the world.


pages: 314 words: 69,741

The Internet Is a Playground by David Thorne

anti-globalists, Dunning–Kruger effect, Large Hadron Collider, late fees, Naomi Klein, peer-to-peer, Silicon Valley, Steve Jobs

I would no doubt find your ideas more “cutting edge” and original if I had traveled forward in time from the 1950s, but as it stands, your ideas for technology-based projects that have already been put into application by other people several years before you thought of them fail to generate the enthusiasm they possibly deserve. Having said that, though, if I had traveled forward in time, my time machine would probably put your peer-to-peer networking technology to shame, because it would have not only commercial viability but also an awesome logo and accompanying pie charts. Regardless, I have, as requested, attached a logo that represents the peer-to-peer-networking project you are currently working on and how it feels working with you in general. Regards, David From: Simon Edhouse Date: Tuesday 17 November 2009 11:07 a.m. To: David Thorne Subject: Re: Re: Re: Re: Logo Design You just crossed the line.

Not once did the secretary there call me a wanker or have her grotty old G-strings poking out the top of her fat arse every day, making me feel ill”—which I found much more entertaining than having to do the work that maintaining new clients would have entailed. From: Simon Edhouse Date: Monday 16 November 2009 2:19 p.m. To: David Thorne Subject: Logo Design Hello David, I would like to catch up as I am working on a really exciting project at the moment and need a logo designed. Basically something representing peer to peer networking. I have to have something to show prospective clients this week so would you be able to pull something together in the next few days? I will also need a couple of pie charts done for a 1 page website. If deal goes ahead there will be some good money in it for you. Simon From: David Thorne Date: Monday 16 November 2009 3:52 p.m.


pages: 371 words: 108,317

The Inevitable: Understanding the 12 Technological Forces That Will Shape Our Future by Kevin Kelly

A Declaration of the Independence of Cyberspace, Aaron Swartz, AI winter, Airbnb, Albert Einstein, Alvin Toffler, Amazon Web Services, augmented reality, bank run, barriers to entry, Baxter: Rethink Robotics, bitcoin, blockchain, book scanning, Brewster Kahle, Burning Man, cloud computing, commoditize, computer age, Computer Lib, connected car, crowdsourcing, dark matter, data science, deep learning, DeepMind, dematerialisation, Downton Abbey, driverless car, Edward Snowden, Elon Musk, Filter Bubble, Freestyle chess, Gabriella Coleman, game design, Geoffrey Hinton, Google Glasses, hive mind, Howard Rheingold, index card, indoor plumbing, industrial robot, Internet Archive, Internet of things, invention of movable type, invisible hand, Jaron Lanier, Jeff Bezos, job automation, John Markoff, John Perry Barlow, Kevin Kelly, Kickstarter, lifelogging, linked data, Lyft, M-Pesa, machine readable, machine translation, Marc Andreessen, Marshall McLuhan, Mary Meeker, means of production, megacity, Minecraft, Mitch Kapor, multi-sided market, natural language processing, Netflix Prize, Network effects, new economy, Nicholas Carr, off-the-grid, old-boy network, peer-to-peer, peer-to-peer lending, personalized medicine, placebo effect, planetary scale, postindustrial economy, Project Xanadu, recommendation engine, RFID, ride hailing / ride sharing, robo advisor, Rodney Brooks, self-driving car, sharing economy, Silicon Valley, slashdot, Snapchat, social graph, social web, software is eating the world, speech recognition, Stephen Hawking, Steven Levy, Ted Nelson, TED Talk, The future is already here, the long tail, the scientific method, transport as a service, two-sided market, Uber for X, uber lyft, value engineering, Watson beat the top human players on Jeopardy!, WeWork, Whole Earth Review, Yochai Benkler, yottabyte, zero-sum game

Second, even though a purely decentralized power won’t take us all the way, it is almost always the best way to start. It’s fast, cheap, and out of control. The barriers to start a new crowd-powered service are low and getting lower. A hive mind scales up wonderfully smoothly. That is why there were 9,000 startups in 2015 trying to exploit the sharing power of decentralized peer-to-peer networks. It does not matter if they morph over time. Perhaps a hundred years from now these shared processes, such as Wikipedia, will be layered up with so much management that they’ll resemble the old-school centralized businesses. Even so, the bottom up was still the best way to start. • • • We live in a golden age now.

There are websites today that feature only movie trailers or great commercials, but they don’t earn anything from the sources for hosting them. Soon enough they will. This arrangement completely reverses the power of the established ad industry. Like Uber and other decentralized systems, it takes what was once a highly refined job performed by a few professionals and spreads it across a peer-to-peer network of amateurs. No advertising professional in 2016 believes it could work, and even reasonable people think it sounds crazy, but one thing we know about the last 30 years is that seemingly impossible things can be accomplished by peers of amateurs when connected smartly. A couple of maverick startups in 2016 are trying to disrupt the current attention system, but it may take a number of tries before some of the radical new modes stick.

See also work environments on-demand expectations, 64–65, 114–17 OpenOffice, 151 open source industry, 135, 141–42, 143, 271 oral communication, 204 Oscar Awards, 187–88 overfitting, 170 ownership, 112–13, 117–18, 121–22, 124–25, 127, 138 Page, Larry, 36–37 Pandora, 169 parallel computation, 38–39, 40 passive archives, 249 passwords, 220, 235 patents, 283 PatientsLikeMe, 145 patronage, 71–72 PayPal, 65, 119–20, 124 pedometers, 238 peer-to-peer networks, 129–30, 184–85 Periscope, 76 “personal analytics” engine, 239 personalization, 68–69, 172–73, 175, 191, 240–41, 261–62 pharmaceutical research, 241–42 pharmacies, 50 phase transitions, 294–97 phones automatic updates of, 62 cameras in, 34 and clouds, 126 and decentralized communications, 129–31 and on-demand model of access, 114 directories, 285 and interactivity, 219 lifespan of apps for, 11 as reading devices, 91–92 in rural China, 56 and self-tracking technology, 239–40 and tracking technology, 239–40, 250, 253 and virtual reality technology, 215, 222 photography and images and artificial intelligence, 33–34 and classic film production, 198–99 and content recognition, 43, 203 and Creative Commons licensing, 139 democratization of, 77 and digital storage capacity, 266 and facial recognition, 39, 43 flexible images, 204 and Google Photo, 43 and lifelogging, 248–49 and new media genres, 195 and photo captioning, 51 and reproductive imperative, 87 sharing of, 140 Picard, Rosalind, 220 Picasso, Pablo, 288 Pichai, Sundar, 37 Pine, Joseph, 172–73 Pinterest, 32, 136, 139, 140, 183 piracy, 124 placebo effect, 242 platform synergy, 122–25, 131 PlayStation Now, 109 porn sites, 202–3 postal mail, 253 postindustrial economy, 57 “presence,” 216–17 printing, 85, 87.


pages: 661 words: 185,701

The Future of Money: How the Digital Revolution Is Transforming Currencies and Finance by Eswar S. Prasad

access to a mobile phone, Adam Neumann (WeWork), Airbnb, algorithmic trading, altcoin, bank run, barriers to entry, Bear Stearns, Ben Bernanke: helicopter money, Bernie Madoff, Big Tech, bitcoin, Bitcoin Ponzi scheme, Bletchley Park, blockchain, Bretton Woods, business intelligence, buy and hold, capital controls, carbon footprint, cashless society, central bank independence, cloud computing, coronavirus, COVID-19, Credit Default Swap, cross-border payments, cryptocurrency, deglobalization, democratizing finance, disintermediation, distributed ledger, diversified portfolio, Dogecoin, Donald Trump, Elon Musk, Ethereum, ethereum blockchain, eurozone crisis, fault tolerance, fiat currency, financial engineering, financial independence, financial innovation, financial intermediation, Flash crash, floating exchange rates, full employment, gamification, gig economy, Glass-Steagall Act, global reserve currency, index fund, inflation targeting, informal economy, information asymmetry, initial coin offering, Internet Archive, Jeff Bezos, Kenneth Rogoff, Kickstarter, light touch regulation, liquidity trap, litecoin, lockdown, loose coupling, low interest rates, Lyft, M-Pesa, machine readable, Mark Zuckerberg, Masayoshi Son, mobile money, Money creation, money market fund, money: store of value / unit of account / medium of exchange, Network effects, new economy, offshore financial centre, open economy, opioid epidemic / opioid crisis, PalmPilot, passive investing, payday loans, peer-to-peer, peer-to-peer lending, Peter Thiel, Ponzi scheme, price anchoring, profit motive, QR code, quantitative easing, quantum cryptography, RAND corporation, random walk, Real Time Gross Settlement, regulatory arbitrage, rent-seeking, reserve currency, ride hailing / ride sharing, risk tolerance, risk/return, Robinhood: mobile stock trading app, robo advisor, Ross Ulbricht, Salesforce, Satoshi Nakamoto, seigniorage, Sheryl Sandberg, Silicon Valley, Silicon Valley startup, smart contracts, SoftBank, special drawing rights, the payments system, too big to fail, transaction costs, uber lyft, unbanked and underbanked, underbanked, Vision Fund, Vitalik Buterin, Wayback Machine, WeWork, wikimedia commons, Y Combinator, zero-sum game

So how does Bitcoin accomplish the twin objectives of validation and immutability without relying on a trusted third party? The answer turns out to rely on a high degree of transactional transparency. Bitcoin’s elegant solution to the validation and immutability issues is to use a public consensus mechanism managed through a peer-to-peer network that alerts participants in a network to every transaction nearly in real time. Let us break down the elements of this process. A peer-to-peer network is essentially a large network of computers (nodes), none of which has any special status, that are linked through the internet and do not require a central server to distribute information to other members. The network is not managed or controlled by any official or private entity.

Thus, owners of Bitcoin wallets hold the keys to their own money and transact directly with each other. What happens when Jack sends a payment of one bitcoin to Jill? The proposed transaction, which involves the transfer of a digital coin using Jack’s and Jill’s public digital identities—their digital wallets—is broadcast on the peer-to-peer network. Transactions submitted to the network are not validated instantaneously. Rather, they are queued up and collated into a block. Every block contains a set of separate transactions, each of which has to be validated independently. That is, each transaction has to be validated as a legitimate one that does not involve double-spending of any coins that have already been spent.

The Bitcoin white paper argues that the blockchain obviates the need for trust: “We have proposed a system for electronic transactions without relying on trust. We started with the usual framework of coins made from digital signatures, which provides strong control of ownership, but is incomplete without a way to prevent double-spending. To solve this, we proposed a peer-to-peer network using proof-of-work to record a public history of transactions that quickly becomes computationally impractical for an attacker to change if honest nodes control a majority of CPU power. The network is robust in its unstructured simplicity. Nodes work all at once with little coordination.” A subtle but crucial feature of Bitcoin is that many of the parameters discussed above—block size, block rewards, cap on total stock of bitcoins—are in fact not immutable.


pages: 680 words: 157,865

Beautiful Architecture: Leading Thinkers Reveal the Hidden Beauty in Software Design by Diomidis Spinellis, Georgios Gousios

Albert Einstein, barriers to entry, business intelligence, business logic, business process, call centre, continuous integration, corporate governance, database schema, Debian, domain-specific language, don't repeat yourself, Donald Knuth, duck typing, en.wikipedia.org, fail fast, fault tolerance, financial engineering, Firefox, Free Software Foundation, functional programming, general-purpose programming language, higher-order functions, iterative process, linked data, locality of reference, loose coupling, meta-analysis, MVC pattern, Neal Stephenson, no silver bullet, peer-to-peer, premature optimization, recommendation engine, Richard Stallman, Ruby on Rails, semantic web, smart cities, social graph, social web, SPARQL, Steve Jobs, Stewart Brand, Strategic Defense Initiative, systems thinking, the Cathedral and the Bazaar, traveling salesman, Turing complete, type inference, web application, zero-coupon bond

It would be ridiculous to permanently attach a customer to a single workstation—not just unworkable for scheduling, but also risky. Workstations break! So any workstation in the studio must be interchangeable, but “interchangeable” presents some problems. The images for a single session can consume close to a gigabyte. We briefly contemplated building the workstations as a peer-to-peer network with distributed replication. Ultimately, we opted for a more traditional client-server model, as shown in Figure 4-5. Figure 4-5. Studio deployment The server is equipped with larger disks than the clients, and they are RAIDed for resilience. The server runs a MySQL database to hold structured data about customers, sessions, and orders.

Channels are a form of one-to-many communication. Conceptually, channels can be joined by any number of clients, and any message that is sent on the channel will be delivered to all of the clients that have been associated with the channel. This might seem to be a perfect place to utilize peer-to-peer technologies, allowing clients to directly communicate with other clients without adding any load to the server. However, these sorts of communications need to be monitored by some code that is trusted to ensure that neither inappropriate messages nor cheating can take place by utilizing different client implementations.


pages: 434 words: 77,974

Mastering Blockchain: Unlocking the Power of Cryptocurrencies and Smart Contracts by Lorne Lantz, Daniel Cawrey

air gap, altcoin, Amazon Web Services, barriers to entry, bitcoin, blockchain, business logic, business process, call centre, capital controls, cloud computing, corporate governance, creative destruction, cross-border payments, cryptocurrency, currency peg, disinformation, disintermediation, distributed ledger, Dogecoin, Ethereum, ethereum blockchain, fault tolerance, fiat currency, Firefox, global reserve currency, information security, initial coin offering, Internet of things, Kubernetes, litecoin, low interest rates, Lyft, machine readable, margin call, MITM: man-in-the-middle, multilevel marketing, Network effects, offshore financial centre, OSI model, packet switching, peer-to-peer, Ponzi scheme, prediction markets, QR code, ransomware, regulatory arbitrage, rent-seeking, reserve currency, Robinhood: mobile stock trading app, Ross Ulbricht, Satoshi Nakamoto, Silicon Valley, Skype, smart contracts, software as a service, Steve Wozniak, tulip mania, uber lyft, unbanked and underbanked, underbanked, Vitalik Buterin, web application, WebSocket, WikiLeaks

Hidden identities Participants on public blockchains are identified by their blockchain address, which can make many participants essentially pseudo-anonymous. Businesses want to know who they are transacting with. The Corda protocol was built to satisfy all those business requirements. The Corda network A Corda network is a peer-to-peer network of nodes. Each node represents a legal entity, and each runs an instance of Corda with one or more Corda applications. Figure 9-2 illustrates. Figure 9-2. Example of a Corda network Anyone can start their own Corda network, but every node in the network must receive permission by the network operator to join, and must also be identified to all participants in the network.

Trustless sidechains, still under development, use the concept of a “two-way peg,” which enables users to move funds from one chain to another in a more decentralized manner. Sharding A process to break up bigger chunks of data, sharding is used in database systems and is a proposed solution for scaling cryptocurrency networks. In peer-to-peer networks underpinned by blockchains, sharding would split datasets between nodes. The information would then be shared with other nodes on the network. Sharding on blockchain networks adds another layer of complexity since there has to be a secure communication protocol to share data. STARKs Scalable Transparent Arguments of Knowledge, or STARKs, takes advantage of the privacy-focused zk-SNARKs technology mentioned in previous chapters.

Privacy Privacy is expected to be one of the biggest growth areas for blockchain technology in the coming years. Developers and other stakeholders are realizing the need to not publicly transmit all data about transactions. Here are a few privacy-related projects that are in the works: Secret Network Originally an MIT-based project called Enigma, Secret Network is a type of peer-to-peer network enabling computation of data in private. A blockchain manages access control and identities, with the ERC-20 SCRT token used to compensate “secret nodes” for providing computing power to the network. This allows users to share data while keeping it private using cryptography, removing the need for a third party to store information for users (which can be susceptible to breaches).


pages: 524 words: 120,182

Complexity: A Guided Tour by Melanie Mitchell

Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, Albert Einstein, Albert Michelson, Alfred Russel Wallace, algorithmic management, anti-communist, Arthur Eddington, Benoit Mandelbrot, bioinformatics, cellular automata, Claude Shannon: information theory, clockwork universe, complexity theory, computer age, conceptual framework, Conway's Game of Life, dark matter, discrete time, double helix, Douglas Hofstadter, Eddington experiment, en.wikipedia.org, epigenetics, From Mathematics to the Technologies of Life and Death, Garrett Hardin, Geoffrey West, Santa Fe Institute, Gregor Mendel, Gödel, Escher, Bach, Hacker News, Hans Moravec, Henri Poincaré, invisible hand, Isaac Newton, John Conway, John von Neumann, Long Term Capital Management, mandelbrot fractal, market bubble, Menlo Park, Murray Gell-Mann, Network effects, Norbert Wiener, Norman Macrae, Paul Erdős, peer-to-peer, phenotype, Pierre-Simon Laplace, power law, Ray Kurzweil, reversible computing, scientific worldview, stem cell, Stuart Kauffman, synthetic biology, The Wealth of Nations by Adam Smith, Thomas Malthus, Tragedy of the Commons, Turing machine

“That territoriality favours cooperation”: Sigmund, K., On prisoners and cells, Nature, 359 (6398), 1992, p. 774. “John Holland has likened such models to ‘flight simulators’”: Holland, J. H., Emergence: From Chaos to Order. Perseus Books, 1998, p. 243. “proposals for improving peer-to-peer networks”: e.g., Hales, D. and Arteconi, S., SLACER: A Self-Organizing Protocol for Coordination in Peer-to-Peer Networks. IEEE Intelligent Systems, 21 (2), 2006, pp. 29–35. “preventing fraud in electronic commerce”: e.g., see Kollock, P., The production of trust in online markets. In E. J. Lawler, M. Macy, S. Thyne, and H. A. Walker (editors), Advances in Group Processes, Vol. 16.

John Holland has likened such models to “flight simulators” for testing one’s ideas and for improving one’s intuitions. Inspire new technologies. Results from the Prisoner’s Dilemma modeling literature—namely, the conditions needed for cooperation to arise and persist—have been used in proposals for improving peer-to-peer networks and preventing fraud in electronic commerce, to name but two applications. Lead to mathematical theories. Several people have used the results from Prisoner’s Dilemma computer simulations to formulate general mathematical theories about the conditions needed for cooperation. A recent example is work by Martin Nowak, in a paper called “Five Rules for the Evolution of Cooperation.”

The rise and fall of Darwin’s second theory. Journal of the History of Biology, 18(1), 1985, pp. 51–70. Grosshans, H. and Filipowicz, W. The expanding world of small RNAs. Nature, 451, 2008, pp. 414–416. Hales, D. and Arteconi, S. SLACER: A Self-Organizing Protocol for Coordination in Peer-to-Peer Networks. IEEE Intelligent Systems, 21(2), 2006, pp. 29–35. Hardin, G. The tragedy of the commons. Science, 162, 1968, pp. 1243–1248. Heims, S. The Cybernetics Group. Cambridge, MA: MIT Press, 1991. Heims, S. J. John von Neumann and Norbert Wiener: From Mathematics to the Technologies of Life and Death.


pages: 395 words: 116,675

The Evolution of Everything: How New Ideas Emerge by Matt Ridley

"World Economic Forum" Davos, adjacent possible, affirmative action, Affordable Care Act / Obamacare, Albert Einstein, Alfred Russel Wallace, AltaVista, altcoin, An Inconvenient Truth, anthropic principle, anti-communist, bank run, banking crisis, barriers to entry, bitcoin, blockchain, Boeing 747, Boris Johnson, British Empire, Broken windows theory, carbon tax, Columbian Exchange, computer age, Corn Laws, cosmological constant, cotton gin, creative destruction, Credit Default Swap, crony capitalism, crowdsourcing, cryptocurrency, David Ricardo: comparative advantage, demographic transition, Deng Xiaoping, discovery of DNA, Donald Davies, double helix, Downton Abbey, driverless car, Eben Moglen, Edward Glaeser, Edward Lorenz: Chaos theory, Edward Snowden, endogenous growth, epigenetics, Ethereum, ethereum blockchain, facts on the ground, fail fast, falling living standards, Ferguson, Missouri, financial deregulation, financial innovation, flying shuttle, Frederick Winslow Taylor, Geoffrey West, Santa Fe Institute, George Gilder, George Santayana, Glass-Steagall Act, Great Leap Forward, Greenspan put, Gregor Mendel, Gunnar Myrdal, Henri Poincaré, Higgs boson, hydraulic fracturing, imperial preference, income per capita, indoor plumbing, information security, interchangeable parts, Intergovernmental Panel on Climate Change (IPCC), invisible hand, Isaac Newton, Jane Jacobs, Japanese asset price bubble, Jeff Bezos, joint-stock company, Joseph Schumpeter, Kenneth Arrow, Kevin Kelly, Khan Academy, knowledge economy, land reform, Lao Tzu, long peace, low interest rates, Lyft, M-Pesa, Mahatma Gandhi, Mark Zuckerberg, means of production, meta-analysis, military-industrial complex, mobile money, Money creation, money: store of value / unit of account / medium of exchange, Mont Pelerin Society, moral hazard, Necker cube, obamacare, out of africa, packet switching, peer-to-peer, phenotype, Pierre-Simon Laplace, precautionary principle, price mechanism, profit motive, RAND corporation, random walk, Ray Kurzweil, rent-seeking, reserve currency, Richard Feynman, rising living standards, road to serfdom, Robert Solow, Ronald Coase, Ronald Reagan, Satoshi Nakamoto, scientific management, Second Machine Age, sharing economy, smart contracts, South Sea Bubble, Steve Jobs, Steven Pinker, Stuart Kauffman, tacit knowledge, TED Talk, The Wealth of Nations by Adam Smith, Thorstein Veblen, transaction costs, twin studies, uber lyft, women in the workforce

Take the example of Twister, a blockchain-based rival to Twitter, built entirely on a peer-to-peer network. If you live under a despotic regime, sending a message critical of your government on Twitter leaves you vulnerable to that government coercing Twitter, the company, into handing over your details. With Twister, that will not be possible. Then there is Namecoin, which aims to issue internet names in a decentralised, peer-to-peer fashion; Storj, which plans to allow cloud storage of files hidden inside blockchains; and Ethereum, which is a decentralised peer-to-peer network ‘designed to replace absolutely anything that can be described in code’, as Matthew Sparkes puts it.

The names would be different, and some of the procedures too, but an alternative internet would exist today whoever had lived. The true origin of the internet does not lie in brilliant individuals, nor in private companies, nor in government funding. It lies, as Steven Berlin Johnson has argued persuasively, in open-source, peer-to-peer networking of an almost hippie, sixties-California-commune kind. ‘Like many of the bedrock technologies that have come to define the digital age, the internet was created by – and continues to be shaped by – decentralised groups of scientists and programmers and hobbyists (and more than a few entrepreneurs) freely sharing the fruits of their intellectual labor with the entire world.’

The Constitution of Liberty. University of Chicago Press. On East German televisions, and telephones, Kupferberg, Feiwel 2002. The Rise and Fall of the German Democratic Republic. Transaction Publishers. On the Arpanet, Crovitz, Gordon 2012. Who really invented the internet?. Wall Street Journal 22 July 2012. On peer-to-peer networks, Johnson, Steven 2012. Future Perfect. Penguin. On the balkanisation of the web, Sparkes, Matthew 2014. The Coming Digital Anarchy. Daily Telegraph 9 June 2014. On Wikipedia editing, Scott, Nigel 2014. Wikipedia: where truth dies online. Spiked 29 April 2014. Filipachi, Amanda 2013. Sexism on Wikipedia is Not the Work of ‘a Single Misguided Editor’.


pages: 283 words: 85,824

The People's Platform: Taking Back Power and Culture in the Digital Age by Astra Taylor

"World Economic Forum" Davos, A Declaration of the Independence of Cyberspace, Aaron Swartz, Alan Greenspan, American Legislative Exchange Council, Andrew Keen, AOL-Time Warner, barriers to entry, Berlin Wall, big-box store, Brewster Kahle, business logic, Californian Ideology, citizen journalism, cloud computing, collateralized debt obligation, Community Supported Agriculture, conceptual framework, content marketing, corporate social responsibility, creative destruction, cross-subsidies, crowdsourcing, David Brooks, digital capitalism, digital divide, digital Maoism, disinformation, disintermediation, don't be evil, Donald Trump, Edward Snowden, Evgeny Morozov, Fall of the Berlin Wall, Filter Bubble, future of journalism, Gabriella Coleman, gentrification, George Gilder, Google Chrome, Google Glasses, hive mind, income inequality, informal economy, Internet Archive, Internet of things, invisible hand, Jane Jacobs, Jaron Lanier, Jeff Bezos, job automation, John Markoff, John Perry Barlow, Julian Assange, Kevin Kelly, Kickstarter, knowledge worker, Laura Poitras, lolcat, Mark Zuckerberg, means of production, Metcalfe’s law, Naomi Klein, Narrative Science, Network effects, new economy, New Journalism, New Urbanism, Nicholas Carr, oil rush, peer-to-peer, Peter Thiel, planned obsolescence, plutocrats, post-work, power law, pre–internet, profit motive, recommendation engine, Richard Florida, Richard Stallman, self-driving car, shareholder value, sharing economy, Sheryl Sandberg, Silicon Valley, Silicon Valley billionaire, Silicon Valley ideology, slashdot, Slavoj Žižek, Snapchat, social graph, Steve Jobs, Stewart Brand, technological solutionism, technoutopianism, TED Talk, the long tail, trade route, Tragedy of the Commons, vertical integration, Whole Earth Catalog, WikiLeaks, winner-take-all economy, Works Progress Administration, Yochai Benkler, young professional

Zeynep Tufekci, a sociologist at the University of Maryland, took issue with these claims in a fascinating post called “Can ‘Leaderless Revolutions’ Stay Leaderless?” Even if the democratic movement in Egypt had truly lacked leaders (a debatable assertion given the role trade unions played, for example), Tufekci argued that social media and peer-to-peer networks in no way guaranteed that the situation would stay that way. Social media, Tufekci explained, do not guard against the “iron law of oligarchy,” the tendency of even democratic groups to develop oligarchic characteristics—they may, in fact, facilitate it. “Networks which start out as diffuse can and likely will quickly evolve into hierarchies not in spite but because of their open and flat nature,” she explained.23 “Influence in the online world can actually spontaneously exhibit even sharper all-or-nothing dynamics compared to the off-line world, with everything below a certain threshold becoming increasingly weaker while those who first manage to cross the threshold becoming widely popular.”

We surf and skim, passing along songs instead of albums, quotes instead of essays, clips instead of films. Artists who share their work with the world (or find it leaked) see it repurposed in ways they didn’t anticipate. The minute a film is released or an essay is published, it begins to race around the Internet, passed through peer-to-peer networks, posted on personal Web sites, quoted in social media streams. In one sense, therefore, any ownership claim is purely theoretical, since, in practice, people’s creations circulate in ways they cannot control. In practice, though, the laws underpinning ownership are stronger than ever before, so strong that some experts warn we are living through a “second enclosure,” a reference to the eighteenth-century privatization of collectively managed fields and forests in England.

According to Mason’s Web site, his speaking performances have left Procter and Gamble “delighted,” struck the executives of Miller Genuine Draft as “amazing.” Disney, only slightly more restrained, found Mason “very stimulating!” Mason’s argument also holds true for most mainstream culture. The most downloaded files are, without fail, the biggest blockbusters and mainstream hits. While peer-to-peer networks can be used to share amateur and independent creativity, in practice they are more often used to trade Lady Gaga or Game of Thrones. Of course, big business is loath to lose potential sales to free distribution (the push for SOPA and PIPA in the United States and the draconian “three strikes” laws abroad, which can slow or suspend Internet access to repeat copyright infringers, prove as much), but pirate sites also increase the reach of American commercial culture, spreading it around to distant corners of the globe.


pages: 304 words: 91,566

Bitcoin Billionaires: A True Story of Genius, Betrayal, and Redemption by Ben Mezrich

airport security, Albert Einstein, bank run, Ben Horowitz, Big Tech, bitcoin, Bitcoin Ponzi scheme, blockchain, Burning Man, buttonwood tree, cryptocurrency, East Village, El Camino Real, Elon Musk, fake news, family office, fault tolerance, fiat currency, financial engineering, financial innovation, game design, information security, Isaac Newton, junk bonds, Marc Andreessen, Mark Zuckerberg, Max Levchin, Menlo Park, Metcalfe’s law, Michael Milken, new economy, offshore financial centre, paypal mafia, peer-to-peer, Peter Thiel, Ponzi scheme, proprietary trading, QR code, Ronald Reagan, Ross Ulbricht, Sand Hill Road, Satoshi Nakamoto, Savings and loan crisis, Schrödinger's Cat, self-driving car, Sheryl Sandberg, side hustle, side project, Silicon Valley, Skype, smart contracts, South of Market, San Francisco, Steve Jobs, Susan Wojcicki, transaction costs, Virgin Galactic, zero-sum game

Stranger still, Satoshi, who claimed to be a Japanese man in his midthirties, wrote his emails in perfect, idiomatic English. Once Charlie read the white paper, however, it was obvious that Satoshi was a polymath, a multidisciplinary genius who was an expert in cryptography, math, computer science, peer-to-peer networking, economics, and more. How could this person be that smart and accomplished and yet be a ghost to the internet, a complete phantom? How could Charlie not at least even know of him? Or her. Or them. Charlie would have gone on with his life, ignored the email and the white paper, if it wasn’t for the enthusiasm of a new, online friend he’d met while perusing crypto boards and forums under the handle “Yankee”: the autistic Welshman Gareth Nelson.

On October 31, 2008, Satoshi Nakamoto had published his famous white paper titled: Bitcoin: A Peer-to-Peer Electronic Cash System, to the Cryptography Mailing List—“a low-noise moderated mailing list devoted to cryptographic technology and its political impact,” laying out “a new electronic cash system that’s fully peer-to-peer, with no trusted third party.” The white paper detailed bitcoin’s specific features: • Double-spending is prevented with a peer-to-peer network. • No mint or other trusted parties. • Participants can be anonymous. • New coins are made from Hashcash-style proof-of-work. • The proof-of-work for new coin generation also powers the network to prevent double-spending. And then three months later, the first version of the Bitcoin software was released into the wild.

They were the engineering equivalent of the back office, not the shiny front office types. They were often called “neckbeards”—they weren’t exactly client-facing. But when people talked about someone being the smartest person in the room—well, this was a room full of them. They were intensely interested in cryptography, protocols, and peer-to-peer networking, and coding in lower-level languages like C and C++. They were close to the bare metal, the 1s and 0s, bits and bytes, not the more user-friendly, abstracted layers. Tyler certainly recognized brilliant billionaires among them, such as Max Levchin, who had cofounded PayPal with Thiel. Levchin was credited with decimating fraud on the network in the early days, and was a leading member of the PayPal Mafia.


pages: 831 words: 98,409

SUPERHUBS: How the Financial Elite and Their Networks Rule Our World by Sandra Navidi

"World Economic Forum" Davos, activist fund / activist shareholder / activist investor, Alan Greenspan, Anthropocene, assortative mating, bank run, barriers to entry, Bear Stearns, Bernie Sanders, Black Swan, Blythe Masters, Bretton Woods, butterfly effect, Capital in the Twenty-First Century by Thomas Piketty, Carmen Reinhart, central bank independence, cognitive bias, collapse of Lehman Brothers, collateralized debt obligation, commoditize, conceptual framework, corporate governance, Credit Default Swap, credit default swaps / collateralized debt obligations, crony capitalism, digital divide, diversification, Dunbar number, East Village, eat what you kill, Elon Musk, eurozone crisis, fake it until you make it, family office, financial engineering, financial repression, Gini coefficient, glass ceiling, Glass-Steagall Act, Goldman Sachs: Vampire Squid, Google bus, Gordon Gekko, haute cuisine, high net worth, hindsight bias, income inequality, index fund, intangible asset, Jaron Lanier, Jim Simons, John Meriwether, junk bonds, Kenneth Arrow, Kenneth Rogoff, Kevin Roose, knowledge economy, London Whale, Long Term Capital Management, longitudinal study, Mark Zuckerberg, mass immigration, McMansion, mittelstand, Money creation, money market fund, Myron Scholes, NetJets, Network effects, no-fly zone, offshore financial centre, old-boy network, Parag Khanna, Paul Samuelson, peer-to-peer, performance metric, Peter Thiel, plutocrats, Ponzi scheme, power law, public intellectual, quantitative easing, Renaissance Technologies, rent-seeking, reserve currency, risk tolerance, Robert Gordon, Robert Shiller, rolodex, Satyajit Das, search costs, shareholder value, Sheryl Sandberg, Silicon Valley, social intelligence, sovereign wealth fund, Stephen Hawking, Steve Jobs, subprime mortgage crisis, systems thinking, tech billionaire, The Future of Employment, The Predators' Ball, The Rise and Fall of American Growth, too big to fail, Tyler Cowen, women in the workforce, young professional

In 2014, Krawcheck gave it the clever moniker Ellevate and launched the Pax Ellevate Global Women’s Index Fund, which invests in companies highly rated in terms of advancing female leadership. The verdict on the Ellevate network’s effectiveness is still out, but it is a promising start. THE NETWORKING GAP: SCHMOOZE OR LOSE The comparative weakness of female networks also results from women’s dispositions. Studies show that women are more reluctant than men to use their peer-to-peer networks because they feel uncomfortable using connections opportunistically. Also, some argue that since women have had top job opportunities only for a few decades, they lack role models and are still learning practices that men have long internalized.15 Often women are hired for their soft skills to attract new clients, sell financial services, and maintain client relationships.

Shaw, 188 Dakota building, 199–200 Daley, William, 165 Dalio, Ray, xxvii Anthony Scaramucci and, 24 background on, 69–72 meditation by, 62, 70 net worth of, 88 Principles, 63, 71 Robin Hood Foundation and, 76 spouse of, 135 Dallara, Charles, 27, 107, 131–133 Dallara, Peixin, 131–133 D’Andrea Tyson, Laura, 185 Das, Satyajit, 210 Davos access to, 113 attendees of, 2, 4, 113–114 central bankers at, 33 critics of, 95 description of, 1–4, 96, 112–116 drawbacks of, 113 environment of, 2–3 hierarchy at, 114 hotels in, 2–3 networking at, 113–114 parties at, 114–116 peer-to-peer networking at, 5, 9 purpose of, 4 status markers at, 114 superhubs at, 8–12 Dealbreaker, 71 Debt, 210 Decision makers, proximity to, 42 Dell, Michael, 115 Democratic Party, 168 Den of Thieves, 190 Depression, 137 Deripaska, Oleg, 9, 69 Deutsche Bank, 27, 42, 101, 105, 118, 120–121, 131, 136, 141, 143, 176 Diamond, Bob, 43, 137, 205 Dijsselbloem, Jeroen, 121 DiMartino, Joseph, 199 Dimon, Jamie alma mater of, 174 as superhub, 11, 56 as type A personality, 56–57 background on, 55–58 charity by, 76 Elizabeth Warren and, 225 financial losses by, 23, 51 firings by, 140–141 general references to, xxv, 79 at JPMorgan, 9.

., 42, 88 Paulson, Hank AIG and, 183 Alan Greenspan and, 36 as U.S. treasury secretary, 36, 167 background on, 172 at Bilderberg conference, 121 networking by, 172–173, 182 personal relationships, 11 in public and private sectors, 165 revolving door phenomenon and, 165 Robert Rubin and, 167 Paulson, John, xxvii, 7, 82, 88, 129 Pax Ellevate Global Women’s Index Fund, 151 Peer-to-peer networking at Davos, 5, 9 by women, 151 P=EFT formula, 63–64, 192 Pelosi, Nancy, 27, 173 Peltz, Nelson, 154 People’s Bank of China, 209 Pepsi, 157 Perfectionism, 137 Performance-based assessments, 152 Performance-based compensation, 86 “Perma-bears,” 48 Perry, Richard, 170 Perry Capital, 170 Personal connections access and, 52 benefits of, 45–46 description of, 7–8, 10–12 in financial crisis of 2007–2008 resolution, 172–173 influence of, 41–42 information from, 41–42 leveraging of, 175 need for, 98 networking to create, 100–101 technology’s role in, 99–100 value of, 175 Peterson, Pete, 27, 30, 53, 61, 79, 124 Peterson Institute, 107 Petraeus, General David, 121 Petro Saudi, 170 “Philanthrocapitalism,” 128 Philanthropy, 17, 70, 75–76, 128, 129, 169, 171, 192, 199 Philippe, King of Belgium, 114 Picasso, Pablo, 124–125 Piketty, Thomas, 49 PIMCO, 42, 44, 53, 66–67, 69 Pinchuk, Victor, 195 Place Vendôme, 132 Plato, 79 Plaza Hotel, 158 Point72 Asset Management, 88 Policy makers, 85 Political capital, 169 Political protection, 175–176 Politics, finance and, 163 Ponzi schemes, 196, 201–202 Pool Room, 124 Pope, 220 Portugal, 177 “Positive linking,” 100 Potential versus performance, 152–153 Poverty, 213 Power network.


pages: 349 words: 102,827

The Infinite Machine: How an Army of Crypto-Hackers Is Building the Next Internet With Ethereum by Camila Russo

4chan, Airbnb, Alan Greenspan, algorithmic trading, altcoin, always be closing, Any sufficiently advanced technology is indistinguishable from magic, Asian financial crisis, Benchmark Capital, Big Tech, bitcoin, blockchain, Burning Man, Cambridge Analytica, Cody Wilson, crowdsourcing, cryptocurrency, distributed ledger, diversification, Dogecoin, Donald Trump, East Village, Ethereum, ethereum blockchain, Flash crash, Free Software Foundation, Google Glasses, Google Hangouts, hacker house, information security, initial coin offering, Internet of things, Mark Zuckerberg, Maui Hawaii, mobile money, new economy, non-fungible token, off-the-grid, peer-to-peer, Peter Thiel, pets.com, Ponzi scheme, prediction markets, QR code, reserve currency, RFC: Request For Comment, Richard Stallman, Robert Shiller, Sand Hill Road, Satoshi Nakamoto, semantic web, sharing economy, side project, Silicon Valley, Skype, slashdot, smart contracts, South of Market, San Francisco, the Cathedral and the Bazaar, the payments system, too big to fail, tulip mania, Turing complete, Two Sigma, Uber for X, Vitalik Buterin

The now-defunct website allowed users to share digital files among a web of participants, instantly making hundreds of thousands of MP3 songs available for free to anyone in the world. Then in 2001, BitTorrent was released, doing to movies and larger files what Napster had done with music. They arguably brought peer-to-peer (P2P) applications into the mainstream. Peer-to-peer networks interconnect equally privileged nodes with each other, allowing users to share and transfer data without the need of a centralized administrative entity. Systems using this architecture are resilient against censorship, attacks, and manipulation. Just like the mythological Hydra, there’s no one head that you can cut off to kill it, and it gets stronger after each attack.

Cypherpunks had continued incrementally improving past work until the major breakthrough came in October 2008, when an anonymous person or persons going by the name Satoshi Nakamoto emailed the group. “I’ve been working on a new electronic cash system that’s fully peer-to-peer, with no trusted third party,” the email began, and linked to a nine-page PDF that underlined how the system worked. He said he proposed solving the double-spend problem by using a “peer-to-peer network which timestamps transactions by linking them into an ongoing chain of hash-based proof-of-work.”3 In the paper titled “Bitcoin: A Peer-to-Peer Electronic Cash System,” Satoshi Nakamoto proposed a network of computers, where each computer holds the copy of the entire transaction history for the network, a ledger with what everyone owns.

This new internet is made up of concepts including the “semantic web,” or a web of data that can be processed by machines, artificial intelligence, machine learning, and data mining. When algorithms decide what to recommend someone should purchase on Amazon, that’s a glimpse of Web 3. Besides all those features, Gavin’s version of Web 3 would allow people to interact without needing to trust each other. It should be a peer-to-peer network with no servers and no authorities to manage the flow of information. Ethereum would be instrumental for this Web 3 vision to become a reality, and much of how the project was defined, with teams focusing on decentralized messaging, storage, and browsers, had the goal of helping shape this next version of the internet.


pages: 309 words: 54,839

Attack of the 50 Foot Blockchain: Bitcoin, Blockchain, Ethereum & Smart Contracts by David Gerard

altcoin, Amazon Web Services, augmented reality, Bernie Madoff, bitcoin, Bitcoin Ponzi scheme, blockchain, Blythe Masters, Bretton Woods, Californian Ideology, clean water, cloud computing, collateralized debt obligation, credit crunch, Credit Default Swap, credit default swaps / collateralized debt obligations, cryptocurrency, distributed ledger, Dogecoin, Dr. Strangelove, drug harm reduction, Dunning–Kruger effect, Ethereum, ethereum blockchain, Extropian, fiat currency, financial innovation, Firefox, Flash crash, Fractional reserve banking, functional programming, index fund, information security, initial coin offering, Internet Archive, Internet of things, Kickstarter, litecoin, M-Pesa, margin call, Neal Stephenson, Network effects, operational security, peer-to-peer, Peter Thiel, pets.com, Ponzi scheme, Potemkin village, prediction markets, quantitative easing, RAND corporation, ransomware, Ray Kurzweil, Ross Ulbricht, Ruby on Rails, Satoshi Nakamoto, short selling, Silicon Valley, Silicon Valley ideology, Singularitarianism, slashdot, smart contracts, South Sea Bubble, tulip mania, Turing complete, Turing machine, Vitalik Buterin, WikiLeaks

Mining benefits from economies of scale, so it’s progressed from mining on your PC, to graphics cards, to programmable chips (FPGAs), to ASICs. Nakamoto’s original Bitcoin white paper assumes a peer-to-peer network that anyone can join. In practice, the miners operate their own centralised communication pool, previously the Bitcoin Relay Network and now called the Fast Internet Bitcoin Relay Engine (FIBRE), as it’s more efficient. (This came close to being a single point of failure in January 2016, as the BRN was about to shut down from lack of funding, and the decentralised peer-to-peer network would not have been able to handle the traffic.) As of March 2017, three pools controlled over 50% and six pools over 75% of the hash rate, with the largest individual pool at 21.3%.135 There is no reason that multiple pools could not have a single owner.


pages: 171 words: 54,334

Barefoot Into Cyberspace: Adventures in Search of Techno-Utopia by Becky Hogge, Damien Morris, Christopher Scally

"World Economic Forum" Davos, A Declaration of the Independence of Cyberspace, back-to-the-land, Berlin Wall, Buckminster Fuller, Chelsea Manning, citizen journalism, cloud computing, corporate social responsibility, disintermediation, DIY culture, Douglas Engelbart, Douglas Engelbart, Electric Kool-Aid Acid Test, Evgeny Morozov, Fall of the Berlin Wall, game design, Hacker Conference 1984, Hacker Ethic, Hans Moravec, informal economy, information asymmetry, Jacob Appelbaum, jimmy wales, John Gilmore, John Markoff, John Perry Barlow, Julian Assange, Kevin Kelly, mass immigration, Menlo Park, military-industrial complex, Mitch Kapor, MITM: man-in-the-middle, moral panic, Mother of all demos, Naomi Klein, Nelson Mandela, Network effects, New Journalism, Norbert Wiener, off-the-grid, peer-to-peer, Richard Stallman, Silicon Valley, Skype, Socratic dialogue, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, systems thinking, technoutopianism, Telecommunications Act of 1996, The Hackers Conference, Vannevar Bush, Whole Earth Catalog, Whole Earth Review, WikiLeaks

I haven’t really come here to see art projects – cool as they may be. I want to find some cracking. The lightning talks offer up a couple of titbits. One talk, entitled “cache games”, shows how to manipulate someone else’s computer from afar using the web caching system. Another details how to launch a distributed denial of service (DDoS) attack using peer-to-peer networks. If this was the magician’s circle, then think of these guys as fairground conjurers. For the really good tricks, it’s clear I’m going to have to leave the sideshows. The main lecture hall is accessed from the first, and top floor of the Berliner. Its domed roof has something of the Biosphere 1 about it, but despite this, the lecture hall is pretty normal.

MIT: Massachusetts Institute of Technology n00bie: Hacker jargon for “newbie” NORAD: North American Aerospace Defense Command ONI: Open Net Initiative Open Rights Group (ORG): UK-based organisation that works to preserve digital rights and freedoms open source: Practices in production and development that promote access to the end products source materials ORG: See Open Rights Group paywall: A paywall blocks access to a webpage with a screen requiring payment. PDP11: 16-bit minicomputer sold by Digital Equipment Corporation (DEC) from 1970 into the 1990s peer-to-peer: A distributed application architecture that partitions tasks or workloads between equally privileged participants in the application which are said to form a peer-to-peer network of nodes. The peer-to-peer application structure was popularised by file sharing systems like Napster. phreaking: A slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks.


pages: 365 words: 56,751

Cryptoeconomics: Fundamental Principles of Bitcoin by Eric Voskuil, James Chiang, Amir Taaki

bank run, banks create money, bitcoin, blockchain, break the buck, cashless society, cognitive dissonance, cryptocurrency, delayed gratification, en.wikipedia.org, foreign exchange controls, Fractional reserve banking, Free Software Foundation, global reserve currency, Joseph Schumpeter, market clearing, Metcalfe’s law, Money creation, money market fund, Network effects, peer-to-peer, price stability, reserve currency, risk free rate, seigniorage, smart contracts, social graph, time value of money, Turing test, zero day, zero-sum game

To do this hash power must be distributed broadly among people so that it becomes difficult to co-opt . However pooling pressures inherent in the consensus work against this objective. As such the characteristic is termed a flaw, though no way to eliminate the flaw has been discovered. Relay Fallacy The peer-to-peer network disseminates blocks and unconfirmed transactions . The protocol itself allows nodes to protect against denial of service . Consequently this communication requires no identity . This protection is how the network avoids the need for permission to participate. However this protection comes at a cost in terms of announcement latency , and because of the advantage to proximity , lower latency translates into higher apparent hash power .

Therefore miners compete for reduced latency. One way to reduce latency is pooling , another is to use a more efficient dissemination network. Given that pooling surrenders power to the operator, presumably the latter option is preferable. One way to improve dissemination is to optimize the peer-to-peer network. The other is to join a distinct network, called a relay , that has lower latency due to elimination of denial-of-service protections, for example [408] : [T]he cmpctblock message format was designed to ensure it fits neatly into a UDP-FEC-based relay mechanism. The only difference is that we send it over UDP with FEC...


pages: 430 words: 68,225

Blockchain Basics: A Non-Technical Introduction in 25 Steps by Daniel Drescher

bitcoin, blockchain, business process, central bank independence, collaborative editing, cryptocurrency, disintermediation, disruptive innovation, distributed ledger, Ethereum, ethereum blockchain, fiat currency, job automation, linked data, machine readable, peer-to-peer, place-making, Satoshi Nakamoto, smart contracts, transaction costs

However, sending information through a network implies security concerns as untrustworthy entities may misuse the network in order to access and exploit information. Hence, any distributed system has to address security concerns. The less restricted the access to the network over which the distributed nodes communicate is, the higher the security concerns are for the distributed system. Distributed Peer-to-Peer Systems Peer-to-peer networks are a special kind of distributed systems. They consist of individual computers (also called nodes), which make their computational resources (e.g., processing power, storage capacity, data or network band- width) directly available to all other members of the network without having Blockchain Basics 15 any central point of coordination.

As a result, something as simple as transferring an amount of money from one bank account to another in a different country involves a long 1Hong, Seung-Hyun. The effect of Napster on recorded music sales: evidence from the consumer expenditure survey. Stanford Institute for Economic Policy Research Working Paper (2004): 3–18; Leyshon, Andrew. Scary monsters? Software formats, peer-to-peer networks, and the spectre of the gift. Environment and Planning D: Society and Space 21.5 (2003): 533–558. 22 Step 3 | Recognizing the Potential processing time and incurs high transactions costs. In a peer-to-peer system, the same transfer would be much simpler and it would take less time and costs since it could be processed as what it is: a transfer of bits and bytes between two peers or nodes, respectively.


pages: 561 words: 157,589

WTF?: What's the Future and Why It's Up to Us by Tim O'Reilly

"Friedman doctrine" OR "shareholder theory", 4chan, Affordable Care Act / Obamacare, Airbnb, AlphaGo, Alvin Roth, Amazon Mechanical Turk, Amazon Robotics, Amazon Web Services, AOL-Time Warner, artificial general intelligence, augmented reality, autonomous vehicles, barriers to entry, basic income, behavioural economics, benefit corporation, Bernie Madoff, Bernie Sanders, Bill Joy: nanobots, bitcoin, Blitzscaling, blockchain, book value, Bretton Woods, Brewster Kahle, British Empire, business process, call centre, Capital in the Twenty-First Century by Thomas Piketty, Captain Sullenberger Hudson, carbon tax, Carl Icahn, Chuck Templeton: OpenTable:, Clayton Christensen, clean water, cloud computing, cognitive dissonance, collateralized debt obligation, commoditize, computer vision, congestion pricing, corporate governance, corporate raider, creative destruction, CRISPR, crowdsourcing, Danny Hillis, data acquisition, data science, deep learning, DeepMind, Demis Hassabis, Dennis Ritchie, deskilling, DevOps, Didi Chuxing, digital capitalism, disinformation, do well by doing good, Donald Davies, Donald Trump, Elon Musk, en.wikipedia.org, Erik Brynjolfsson, fake news, Filter Bubble, Firefox, Flash crash, Free Software Foundation, fulfillment center, full employment, future of work, George Akerlof, gig economy, glass ceiling, Glass-Steagall Act, Goodhart's law, Google Glasses, Gordon Gekko, gravity well, greed is good, Greyball, Guido van Rossum, High speed trading, hiring and firing, Home mortgage interest deduction, Hyperloop, income inequality, independent contractor, index fund, informal economy, information asymmetry, Internet Archive, Internet of things, invention of movable type, invisible hand, iterative process, Jaron Lanier, Jeff Bezos, jitney, job automation, job satisfaction, John Bogle, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, John Zimmer (Lyft cofounder), Kaizen: continuous improvement, Ken Thompson, Kevin Kelly, Khan Academy, Kickstarter, Kim Stanley Robinson, knowledge worker, Kodak vs Instagram, Lao Tzu, Larry Ellison, Larry Wall, Lean Startup, Leonard Kleinrock, Lyft, machine readable, machine translation, Marc Andreessen, Mark Zuckerberg, market fundamentalism, Marshall McLuhan, McMansion, microbiome, microservices, minimum viable product, mortgage tax deduction, move fast and break things, Network effects, new economy, Nicholas Carr, Nick Bostrom, obamacare, Oculus Rift, OpenAI, OSI model, Overton Window, packet switching, PageRank, pattern recognition, Paul Buchheit, peer-to-peer, peer-to-peer model, Ponzi scheme, post-truth, race to the bottom, Ralph Nader, randomized controlled trial, RFC: Request For Comment, Richard Feynman, Richard Stallman, ride hailing / ride sharing, Robert Gordon, Robert Metcalfe, Ronald Coase, Rutger Bregman, Salesforce, Sam Altman, school choice, Second Machine Age, secular stagnation, self-driving car, SETI@home, shareholder value, Silicon Valley, Silicon Valley startup, skunkworks, Skype, smart contracts, Snapchat, Social Responsibility of Business Is to Increase Its Profits, social web, software as a service, software patent, spectrum auction, speech recognition, Stephen Hawking, Steve Ballmer, Steve Jobs, Steven Levy, Stewart Brand, stock buybacks, strong AI, synthetic biology, TaskRabbit, telepresence, the built environment, the Cathedral and the Bazaar, The future is already here, The Future of Employment, the map is not the territory, The Nature of the Firm, The Rise and Fall of American Growth, The Wealth of Nations by Adam Smith, Thomas Davenport, Tony Fadell, Tragedy of the Commons, transaction costs, transcontinental railway, transportation-network company, Travis Kalanick, trickle-down economics, two-pizza team, Uber and Lyft, Uber for X, uber lyft, ubercab, universal basic income, US Airways Flight 1549, VA Linux, warehouse automation, warehouse robotics, Watson beat the top human players on Jeopardy!, We are the 99%, web application, Whole Earth Catalog, winner-take-all economy, women in the workforce, Y Combinator, yellow journalism, zero-sum game, Zipcar

Yet over the next few years, Uber developed into a force that transformed the market for on-demand transportation, and today it has more drivers providing services than the entire previous taxi and limousine industry. How did this happen? The game changer came early in 2012 when two companies, Sidecar and Lyft, introduced a peer-to-peer model in which ordinary people, not just licensed limousine drivers, provided the service using their personal cars. It was this further innovation that reshaped the way we think about employment, with drivers who not only have no guaranteed work from the company, but also make no guarantees to the company about whether they will work when they are needed.

There are many historical examples of peer-to-peer public transportation. Zimride, Logan Green and John Zimmer’s predecessor to Lyft, was inspired by the informal jitney systems they observed in Zimbabwe. But using the smartphone to create a two-sided, real-time market in physical space was something profoundly new. After initial skepticism, Uber copied the peer-to-peer model a year later. Driven by an aggressive CEO, a stronger technical focus on logistics and marketplace incentives, a take-no-prisoners corporate culture, and huge amounts of capital, it has spent billions to outpace its rivals. Lyft is still a strong contender in the United States, gaining, but in distant second place.

Drivers Who Show Up When You Need Them. Transportation on demand for passengers requires a critical mass of drivers. Uber’s original vision of black car drivers on demand served only a narrow slice of the potential market. As their ambitions grew, they needed a much larger supply of drivers, which the peer-to-peer model supplied. Augmented Workers. GPS and automated dispatch technology inherently increase the supply of drivers because they make it possible for even part-time drivers to be successful at finding passengers and navigating to out-of-the-way locations. There was formerly an experience premium, whereby experienced taxi and limousine drivers knew the best way to reach a given destination or to avoid traffic.


pages: 420 words: 130,503

Actionable Gamification: Beyond Points, Badges and Leaderboards by Yu-Kai Chou

Apple's 1984 Super Bowl advert, barriers to entry, behavioural economics, bitcoin, Burning Man, Cass Sunstein, crowdsourcing, Daniel Kahneman / Amos Tversky, delayed gratification, Do you want to sell sugared water for the rest of your life?, don't be evil, en.wikipedia.org, endowment effect, Firefox, functional fixedness, game design, gamification, growth hacking, IKEA effect, Internet of things, Kickstarter, late fees, lifelogging, loss aversion, Maui Hawaii, Minecraft, pattern recognition, peer-to-peer, performance metric, QR code, recommendation engine, Richard Thaler, Silicon Valley, Skinner box, Skype, software as a service, Stanford prison experiment, Steve Jobs, TED Talk, The Wealth of Nations by Adam Smith, transaction costs

“Future of Retail: How Companies Can Employ Big Data to Create a Better Shopping Experience”. 08/31/2012.↩ Mangalindan, JP. Fortune. “Amazon’s Recommendation Secret”. 07/30/2012.↩ Yao Wang and Julita Vassileva. University of Saskatchewan. Trust and reputation model in peer-to-peer networks. 2003.↩ Minaxi Gupta, Paul Judge, and Mostafa Ammar. Georgia Institute of Technology. A Reputation System for Peer-to-Peer Networks. 2003.↩ David Vise & Mark Malseed. The Google Story. p42. Random House, New York, New York. 2005.↩ David Vise & Mark Malseed. The Google Story. p88. Random House, New York, New York. 2005.↩ Gareth Llewellyn. Quora.com: “Are Facebook and Twitter the best tools for social media marketing?”.

Of course, another “Social Influence & Relatedness” factor of Amazon that heavily contributed to its early success, was the millions of user reviews on books and other items. “My friend Bob says the doctor is wrong – and he reads a lot about health.” Studies on Trust and Reputation in Peer-to-Peer Networks by researchers like Yao Wang and Julita Vassileva of the University of Saskatchewan, as well as Minaxi Gupta, Paul Judge, and Mostafa Ammar of the Georgia Institute of Technology found that the average consumer prefers and trusts reviews by peers over those by professional critics78. This is somewhat odd, because professional critics have made it their life mission to distinguish the good from the bad.


pages: 422 words: 131,666

Life Inc.: How the World Became a Corporation and How to Take It Back by Douglas Rushkoff

Abraham Maslow, Adam Curtis, addicted to oil, affirmative action, Alan Greenspan, Amazon Mechanical Turk, An Inconvenient Truth, anti-globalists, AOL-Time Warner, banks create money, Bear Stearns, benefit corporation, big-box store, Bretton Woods, car-free, Charles Lindbergh, colonial exploitation, Community Supported Agriculture, complexity theory, computer age, congestion pricing, corporate governance, credit crunch, currency manipulation / currency intervention, David Ricardo: comparative advantage, death of newspapers, digital divide, don't be evil, Donald Trump, double entry bookkeeping, easy for humans, difficult for computers, financial innovation, Firefox, full employment, General Motors Futurama, gentrification, Glass-Steagall Act, global village, Google Earth, greed is good, Herbert Marcuse, Howard Rheingold, income per capita, invention of the printing press, invisible hand, Jane Jacobs, John Nash: game theory, joint-stock company, Kevin Kelly, Kickstarter, laissez-faire capitalism, loss aversion, market bubble, market design, Marshall McLuhan, Milgram experiment, military-industrial complex, moral hazard, multilevel marketing, mutually assured destruction, Naomi Klein, negative equity, new economy, New Urbanism, Norbert Wiener, peak oil, peer-to-peer, place-making, placebo effect, planned obsolescence, Ponzi scheme, price mechanism, price stability, principal–agent problem, private military company, profit maximization, profit motive, prosperity theology / prosperity gospel / gospel of success, public intellectual, race to the bottom, RAND corporation, rent-seeking, RFID, road to serfdom, Ronald Reagan, scientific management, short selling, Silicon Valley, Simon Kuznets, social software, Steve Jobs, Telecommunications Act of 1996, telemarketer, The Wealth of Nations by Adam Smith, Thomas L Friedman, too big to fail, trade route, trickle-down economics, union organizing, urban decay, urban planning, urban renewal, Vannevar Bush, vertical integration, Victor Gruen, white flight, working poor, Works Progress Administration, Y2K, young professional, zero-sum game

Instead of paying a record company to listen to their artists’ music on a CD player, we pay a computer company for the hardware, an Internet-access company for the bandwidth, and a software company for the media player to do all this. And that’s when we’re doing it illegally, instead of just paying ninety-nine cents to Apple’s iTunes. “Silicon Valley consultants call it Web 2.0, as if it were a new version of some old software. But it’s really a revolution,” Time enthused. Peer-to-peer networking is terrific, indeed, but revolutions are those moments in history when a mob storms the palace and cuts off the heads of the people who have been exploiting them. This is something else. Yes, bloggers and YouTubers have had many successes, particularly against government. They have brought down a Republican senator, an attorney general, and even made headway against the repressive net censorship of the Chinese.

The bias of the Internet for abundance over scarcity appeared to be taking its toll. Hollywood studios and record companies began lobbying Congress for laws and enforcement to prevent their entire libraries from becoming worthless. Comcast, a cable company that offers broadband Internet service, began blocking traffic from peer-to-peer networks in an effort to prevent losses to its corporate brethren and subsidiaries. Other corporations lobbied for changes to the way Internet access is billed, making it easier for large companies to support fast content distribution, but much harder for smaller groups or individuals to share their data.

This team-up is based on the premise that a group of small companies can outperform a single large contractor—doing large projects faster, cheaper, and better than the “big boys.” Big contractors form their own Contract Teaming Arrangements when necessary, but these teams are organized hierarchically, like a military unit, with the “prime” contractor commanding and controlling its subcontractors. A Super CTA is very different: It’s organized as a peer-to-peer network, like a modern software development team. It’s a partnership of equals; in a Super CTA, one company handles the team’s communication and coordination functions, but no company in the team dictates to any other. A Super CTA is a contracting democracy, and, like democracy in general, it requires checks, balances, and good communications to function well.


pages: 296 words: 86,610

The Bitcoin Guidebook: How to Obtain, Invest, and Spend the World's First Decentralized Cryptocurrency by Ian Demartino

3D printing, AltaVista, altcoin, bitcoin, Bitcoin Ponzi scheme, blockchain, buy low sell high, capital controls, cloud computing, Cody Wilson, corporate governance, crowdsourcing, cryptocurrency, decentralized internet, distributed ledger, Dogecoin, Edward Snowden, Elon Musk, Ethereum, ethereum blockchain, fiat currency, Firefox, forensic accounting, global village, GnuPG, Google Earth, Haight Ashbury, initial coin offering, Jacob Appelbaum, Kevin Kelly, Kickstarter, litecoin, M-Pesa, Marc Andreessen, Marshall McLuhan, Oculus Rift, peer-to-peer, peer-to-peer lending, Ponzi scheme, prediction markets, printed gun, QR code, ransomware, Ross Ulbricht, Salesforce, Satoshi Nakamoto, self-driving car, selling pickaxes during a gold rush, Skype, smart contracts, Steven Levy, the medium is the message, underbanked, WikiLeaks, Zimmermann PGP

Chapter 3: Precursors, History and Creation, Satoshi’s White Paper I’ve been working on a new electronic cash system that’s fully peer-to-peer, with no trusted third party. The paper is available at: http://www.bitcoin.org/bitcoin.pdf The main properties: Double-spending is prevented with a peer-to-peer network. No mint or other trusted parties. Participants can be anonymous. New coins are made from Hashcash style proof-of-work. The proof-of-work for new coin generation also powers the network to prevent double-spending. —Satoshi Nakamoto’s announcement of Bitcoin, The Cryptography and Cryptography Policy Mailing List, November 1, 2008 With this message, an anonymous person or group posting under the name Satoshi Nakamoto started the revolution known to the public as Bitcoin.

Farivar describes the process by which Arscoin turned from a hypothetical cryptocurrency into an actual one: I called Corallo, the Coingen creator, for some guidance. First, he said, I needed one of my colleagues to install the app as well so that person could be added as a peer. Soon Peter Bright joined the grand experiment, allowing me to open the Arscoin-qt console and type: “addnode [Peter’s IP address] add.” Bam! Suddenly there was an Arscoin peer-to-peer network of two. The next step was to begin mining with the command “setgenerate true.” In the Windows version of the Arscoin app, a pop-up soon flashed in the taskbar to denote a successfully mined block. The reward? Fifty Arscoins. Now Arscoin was officially born. While this might have been worthless mathematical crunching, the thrill of minting “coins” quickly attracted a host of other staffers.


pages: 340 words: 96,149

@War: The Rise of the Military-Internet Complex by Shane Harris

air gap, Amazon Web Services, barriers to entry, Berlin Wall, Brian Krebs, centralized clearinghouse, Citizen Lab, clean water, computer age, crowdsourcing, data acquisition, don't be evil, Edward Snowden, end-to-end encryption, failed state, Firefox, information security, John Markoff, Julian Assange, military-industrial complex, mutually assured destruction, peer-to-peer, Silicon Valley, Silicon Valley startup, Skype, Stuxnet, systems thinking, undersea cable, uranium enrichment, WikiLeaks, zero day

In 2013, LabMD, an Atlanta company that performs cancer diagnoses, filed a complaint accusing Tiversa of stealing patient information from it and other health care companies through peer-to-peer networks. LabMD had been under investigation by the Federal Trade Commission after a data breach allegedly exposed patient information. The company claimed that the government had hired Tiversa to take the documents without LabMD’s knowledge or consent. According to court documents, Tiversa found LabMD patient information on a peer-to-peer network and then allegedly made repeated phone calls and sent e-mails to the health care company trying to sell Tiversa’s cyber security services.


pages: 322 words: 88,197

Wonderland: How Play Made the Modern World by Steven Johnson

"hyperreality Baudrillard"~20 OR "Baudrillard hyperreality", Ada Lovelace, adjacent possible, Alfred Russel Wallace, Antoine Gombaud: Chevalier de Méré, Berlin Wall, bitcoin, Book of Ingenious Devices, Buckminster Fuller, Charles Babbage, Claude Shannon: information theory, Clayton Christensen, colonial exploitation, computer age, Computing Machinery and Intelligence, conceptual framework, cotton gin, crowdsourcing, cuban missile crisis, Drosophila, Edward Thorp, Fellow of the Royal Society, flying shuttle, game design, global village, Great Leap Forward, Hedy Lamarr / George Antheil, HyperCard, invention of air conditioning, invention of the printing press, invention of the telegraph, Islamic Golden Age, Jacquard loom, Jacques de Vaucanson, James Watt: steam engine, Jane Jacobs, John von Neumann, joint-stock company, Joseph-Marie Jacquard, land value tax, Landlord’s Game, Lewis Mumford, lone genius, mass immigration, megacity, Minecraft, moral panic, Murano, Venice glass, music of the spheres, Necker cube, New Urbanism, Oculus Rift, On the Economy of Machinery and Manufactures, pattern recognition, peer-to-peer, pets.com, placebo effect, pneumatic tube, probability theory / Blaise Pascal / Pierre de Fermat, profit motive, QWERTY keyboard, Ray Oldenburg, SimCity, spice trade, spinning jenny, statistical model, Steve Jobs, Steven Pinker, Stewart Brand, supply-chain management, talking drums, the built environment, The Great Good Place, the scientific method, The Structural Transformation of the Public Sphere, trade route, Turing machine, Turing test, Upton Sinclair, urban planning, vertical integration, Victor Gruen, Watson beat the top human players on Jeopardy!, white flight, white picket fence, Whole Earth Catalog, working poor, Wunderkammern

The migration to digital music is recent enough that most of us grasp its wider repercussions: think of the still-simmering debates over music in the post-Napster era, the challenges it has posed to our intellectual property laws and the economics of all creative industries. But, as always, what began with an attempt to create and share new kinds of sounds ended up triggering other revolutions in other domains. The first true peer-to-peer networks for sharing information were designed specifically for the swapping of musical files. It is still too early to tell, but this innovation may turn out to be as influential as those piano keyboards and pinned cylinders, if in fact peer-to-peer platforms like Bitcoin eventually become an important part of the global financial infrastructure, as many people believe.

It is entirely possible that the most significant advance in the history of money since the invention of a government-backed currency will end up having its roots in teenagers sharing Metallica songs. Whenever waves of new information technology have crested, music has been there to greet them. Music was among the first activities to be encoded, the first to be automated, the first to be programmed, the first to be digitized as a commercial product, the first to be distributed via peer-to-peer networks. There is something undeniably pleasing about that litany, something hopeful. Think about the history behind the most influential device of the modern age: a digital computer sharing information across wireless networks. What were the enabling technologies that made it possible to invent such a device in the first place?


pages: 135 words: 26,407

How to DeFi by Coingecko, Darren Lau, Sze Jin Teh, Kristian Kho, Erina Azmi, Tm Lee, Bobby Ong

algorithmic trading, asset allocation, Bernie Madoff, bitcoin, blockchain, buy and hold, capital controls, collapse of Lehman Brothers, cryptocurrency, distributed ledger, diversification, Ethereum, ethereum blockchain, fiat currency, Firefox, information retrieval, litecoin, margin call, new economy, passive income, payday loans, peer-to-peer, prediction markets, QR code, reserve currency, robo advisor, smart contracts, tulip mania, two-sided market

D Decentralized Finance (DeFi) DeFi is an ecosystem that allows for the utilization of financial services such as borrowing, lending, trading, getting access to insurance, and more without the need to rely on a centralized entity. Decentralized Applications (Dapps) Applications that run on decentralized peer-to-peer networks such as Ethereum. Decentralized Autonomous Organization (DAO) Decentralized Autonomous Organizations are rules encoded by smart contracts on the blockchain. The rules and dealings of the DAO are transparent and the DAO is controlled by token holders. Decentralized Exchange (DEX) Decentralized Exchange (DEX) allows for trading and direct swapping of tokens without the need to use a centralized exchange.


pages: 302 words: 95,965

How to Be the Startup Hero: A Guide and Textbook for Entrepreneurs and Aspiring Entrepreneurs by Tim Draper

3D printing, Airbnb, Apple's 1984 Super Bowl advert, augmented reality, autonomous vehicles, basic income, Berlin Wall, bitcoin, blockchain, Buckminster Fuller, business climate, carried interest, connected car, CRISPR, crowdsourcing, cryptocurrency, deal flow, Deng Xiaoping, discounted cash flows, disintermediation, Donald Trump, Elon Musk, Ethereum, ethereum blockchain, fake news, family office, fiat currency, frictionless, frictionless market, growth hacking, high net worth, hiring and firing, initial coin offering, Jeff Bezos, Kickstarter, Larry Ellison, low earth orbit, Lyft, Mahatma Gandhi, Marc Benioff, Mark Zuckerberg, Menlo Park, Metcalfe's law, Metcalfe’s law, Michael Milken, Mikhail Gorbachev, Minecraft, Moneyball by Michael Lewis explains big data, Nelson Mandela, Network effects, peer-to-peer, Peter Thiel, pez dispenser, Ralph Waldo Emerson, risk tolerance, Robert Metcalfe, Ronald Reagan, Rosa Parks, Salesforce, Sand Hill Road, school choice, school vouchers, self-driving car, sharing economy, Sheryl Sandberg, short selling, Silicon Valley, Skype, smart contracts, Snapchat, sovereign wealth fund, stealth mode startup, stem cell, Steve Jobs, Steve Jurvetson, Tesla Model S, Twitter Arab Spring, Uber for X, uber lyft, universal basic income, women in the workforce, Y Combinator, zero-sum game

The AT&T Friends and Family marketing program, the LinkedIn network and the Twitter hashtag are some obvious examples. Facebook and Snapchat use viral marketing to share photos. The founders of Skype implemented several viral elements in growing their audio business and even more when Skype video was introduced. The Skype Video Story I was fascinated by the new peer-to-peer technology that allowed people to share files. I met with Napster, Streamcast, and Grokster as I researched the industry. I had gotten the distinct impression that the file-sharing business was pretty much crushed by a powerful and litigious music industry, but I was pretty sure there would be other applications to this revolutionary technology.

The Hotmail founders first came to us pitching a lookup table for people’s personal and contact information on the Internet. It was only when they were walking out the door that Steve Jurvetson asked if they had any other ideas. It turned out that their riskier, less safe idea was free, web-based email. The Skype founders initially pitched me on using peer-to-peer technology to generate shared Wi-Fi, then changed course and took on the long-distance carriers with Skype. Google, Baidu, and Yahoo were only search tools that were growing but hemorrhaging money before they all got wind of what GoTo was doing with paid search. When they copied the GoTo model, they were able to build profitable business models.


pages: 353 words: 98,267

The Price of Everything: And the Hidden Logic of Value by Eduardo Porter

Alan Greenspan, Alvin Roth, AOL-Time Warner, Asian financial crisis, Ayatollah Khomeini, banking crisis, barriers to entry, behavioural economics, Berlin Wall, British Empire, capital controls, carbon tax, Carmen Reinhart, Cass Sunstein, clean water, Credit Default Swap, Deng Xiaoping, Easter island, Edward Glaeser, European colonialism, Fall of the Berlin Wall, financial deregulation, financial engineering, flying shuttle, Ford paid five dollars a day, full employment, George Akerlof, Glass-Steagall Act, Gordon Gekko, guest worker program, happiness index / gross national happiness, housing crisis, illegal immigration, immigration reform, income inequality, income per capita, informal economy, Intergovernmental Panel on Climate Change (IPCC), invisible hand, Jean Tirole, John Maynard Keynes: technological unemployment, Joshua Gans and Andrew Leigh, junk bonds, Kenneth Rogoff, labor-force participation, laissez-faire capitalism, longitudinal study, loss aversion, low skilled workers, Martin Wolf, means of production, Menlo Park, Mexican peso crisis / tequila crisis, Michael Milken, Monkeys Reject Unequal Pay, new economy, New Urbanism, peer-to-peer, pension reform, Peter Singer: altruism, pets.com, placebo effect, precautionary principle, price discrimination, price stability, rent-seeking, Richard Thaler, rising living standards, risk tolerance, Robert Shiller, Ronald Reagan, search costs, Silicon Valley, stem cell, Steve Jobs, Stewart Brand, superstar cities, The Spirit Level, The Theory of the Leisure Class by Thorstein Veblen, The Wealth of Nations by Adam Smith, Thomas Malthus, Thorstein Veblen, trade route, transatlantic slave trade, ultimatum game, unpaid internship, urban planning, Veblen good, women in the workforce, World Values Survey, Yom Kippur War, young professional, zero-sum game

Since most of what advanced economies produce is made of information, this could mean that much of the product of modern economic activity would inevitably become gratis. The dictum seems to be true. Retail sales of music in the United States—from CDs to ring tones—declined by about a fifth in 2008 to $8.5 billion, as consumers stopped buying music and turned to peer-to-peer networks, where it is available for free. Globally, wholesale shipments of recorded music fell by nearly a tenth, to $18.4 billion. This changed the very meaning of success. The biggest album of 2008, Lil Wayne’s Tha Carter III, sold 2.87 million copies in the United States, according to Nielsen SoundScan.

In 2005, a report commissioned by the Motion Picture Association of America found that piracy cost the movie industry worldwide $18.2 billion a year and online theft accounted for 39 percent of the total. These days, more people copy movies than go see them in theaters. In May of 2008 the French bought 12.2 million tickets to see films but downloaded 13.7 million free copies of movies online through peer-to-peer networks. In the summer of 2008 Warner Bros. made an impressive display of security to launch the hit Batman movie The Dark Knight, using technology that allowed it to track each and every copy of the film. A few months later I sat in Bryant Park, behind the New York Public Library with a lanky, twenty-four-year-old philosophy major from the State University of New York.


pages: 103 words: 32,131

Program Or Be Programmed: Ten Commands for a Digital Age by Douglas Rushkoff

Alan Greenspan, banking crisis, big-box store, citizen journalism, cloud computing, digital map, East Village, financial innovation, Firefox, Future Shock, hive mind, Howard Rheingold, invention of the printing press, Kevin Kelly, Marshall McLuhan, mirror neurons, peer-to-peer, public intellectual, Silicon Valley, statistical model, Stewart Brand, Ted Nelson, WikiLeaks

The truth about what they do and how well they do it is already a topic of conversation. The real way to “go social,” if they wanted to, would not be to accumulate more page friends or message followers, but rather to get their friends and followers to befriend and follow one another. That’s how to create a culture in a peer-to-peer, networked medium. Instead of looking to monetize or otherwise intercede between existing social connections, those promoting networks should be looking to foster connections between people who are as yet unknown to each other yet potentially in need of each other. And then let them go about their business—or their socializing.


pages: 377 words: 110,427

The Boy Who Could Change the World: The Writings of Aaron Swartz by Aaron Swartz, Lawrence Lessig

Aaron Swartz, affirmative action, Alfred Russel Wallace, American Legislative Exchange Council, Benjamin Mako Hill, bitcoin, Bonfire of the Vanities, Brewster Kahle, Cass Sunstein, deliberate practice, do what you love, Donald Knuth, Donald Trump, failed state, fear of failure, Firefox, Free Software Foundation, full employment, functional programming, Hacker News, Howard Zinn, index card, invisible hand, Joan Didion, John Gruber, Lean Startup, low interest rates, More Guns, Less Crime, peer-to-peer, post scarcity, power law, Richard Feynman, Richard Stallman, Ronald Reagan, school vouchers, semantic web, single-payer health, SpamAssassin, SPARQL, telemarketer, The Bell Curve by Richard Herrnstein and Charles Murray, the scientific method, Toyota Production System, unbiased observer, wage slave, Washington Consensus, web application, WikiLeaks, working poor, zero-sum game

Since the government can’t open the envelope (we use crypto to ensure this), they have no idea of knowing which gift certificate they signed, so they can’t associate you with it when you spend it later. Now, to anonymously submit the gift certificates to the government, you reuse the peer-to-peer network you downloaded the songs from as a remailer network. You encrypt your gift certificate so only the government can read it, then you pass it to a friend on the peer-to-peer network, who passes it to a friend, etc., until someone gives it to the government. The government publishes the list of identifiers for gift certificates they’ve received, so you can make sure it got through and resend it if it didn’t.


pages: 446 words: 102,421

Network Security Through Data Analysis: Building Situational Awareness by Michael S Collins

business process, cloud computing, create, read, update, delete, data science, Firefox, functional programming, general-purpose programming language, index card, information security, Internet Archive, inventory management, iterative process, operational security, OSI model, p-value, Parkinson's law, peer-to-peer, slashdot, statistical model, zero day

These attacks rely on a target clicking a link or accessing a file, which requires that the bait (the filename or story surrounding it) be attractive enough to merit a click. At the time of this writing, for example, there’s a spate of phishing attacks using credit ratings as the bait—the earliest informed me that my credit rating had risen and the latest batch is more ominously warning me of the consequences of a recently dropped credit rating. On peer-to-peer networks, attackers will drop Trojans with the names of current games or albums in order to attract victims. Even in this case, “surveillance” is still possible. The phishing attacks done in many APT attacks often depend on scouting out the population and posting habits of a site before identifying victims likely to respond to a crafted mail.

An SMTP client in one interaction may operate as a server for another interaction, and there should be interactions between each other. Spammers, however, operate effectively as superclients—they talk to servers, but never operate as a server for anyone else. This behavior manifests as a low clustering coefficient. Remove the spammers, and the SMTP network starts to look more like a peer-to-peer network and the clustering coefficent rises. Figure 13-3. Clustering coefficient and large email networks Analyzing Graphs Graph analysis can be used for a number of purposes. Centrality metrics are a useful tool both for engineering and for forensic analysis, while components and graph attributes can be used to generate a number of alarms.


pages: 629 words: 109,663

Docker in Action by Jeff Nickoloff, Stephen Kuenzli

air gap, Amazon Web Services, cloud computing, computer vision, continuous integration, database schema, Debian, end-to-end encryption, exponential backoff, fail fast, failed state, information security, Kubernetes, microservices, MITM: man-in-the-middle, peer-to-peer, software as a service, web application

If you need greater control over transport, storage, and artifact management, you should consider working directly with images in a manual distribution system. 9.4. Manual image publishing and distribution Images are files, and you can distribute them as you would any other file. It’s common to see software available for download on websites, File Transport Protocol (FTP) servers, corporate storage networks, or via peer-to-peer networks. You could use any of these distribution channels for image distribution. You can even use email or a USB drive in cases where you know your image recipients. Manual image distribution methods provide the ultimate in flexibility, enabling varied use cases such as distributing images to many people at an event simultaneously or to a secure air-gapped network.

imperative pattern import command, 2nd, 3rd indexes, 2nd info subcommand ingress network, 2nd, 3rd init command - -init option init systems initialization processes in-memory storage insecure.key inspect command, 2nd installing software Docker registries, working with from command line from Dockerfiles installation files and isolation container filesystem abstraction and isolation filesystem structure image layers layer relationships union filesystems, weaknesses of using alternative registries using Docker Hub from website working with images as files integrity, artifact - -interactive (-i) option interactive containers, running interfaces, network intermediate images interprocess communication (IPC) IP (Internet Protocol) IP address IPC (interprocess communication) - -ipc flag IPC namespace IPC primitives - -ipc=host option iptables rule ipvlan driver ipvs rule isolation, containers and J jail Jenkins JVM (Java Virtual Machine), 2nd K key/value pairs kill program, Linux Kubernetes, 2nd L label confinement, SELinux - -label flag LABEL instruction, 2nd LABEL maintainer Label Schema project, 2nd - -label-add option - -label-rm option LAMP (Linux, Apache, MySQL PHP) stack lamp-test container latest tag, 2nd, 3rd, 4th layer IDs layer relationships level label, SELinux LFTP client lighthouse container linting tool Linux Security Modules (LSM) Linux, Apache, MySQL PHP (LAMP) stack Linux’s user (USR) namespace lists (block sequences) load balancing, 2nd load command local value local volume driver local volume plugin localhost node logging service login command logs command longevity control loopback interface, 2nd low-level system services LSM (Linux Security Modules) M -m flag MAC_ADMIN capability macvlan driver mailer container, 2nd mailer program mailer-base image mailer-logging image Major.Minor.Patch scheme, 2nd make command manager1 node, 2nd, 3rd manager2 node, 2nd manager3 node manual image publishing mariadb container MariaDB database mariadb key, 2nd mariadb service maturity Maven tool Memcached - -memory flag memory limits Mercurial metaconflicts, eliminating container state and dependencies flexible container identification metadata naming Dockerfiles organizing metadata with labels overview record metadata at image build time, 2nd MNT namespaces, 2nd, 3rd mod_ubuntu container, 2nd MongoDB - -mount flag, 2nd - -mount option mount points blind shared multistage Dockerfile multi-tier-app_api, 2nd multi-tier-app_postgres multi-tier-app_private network, 2nd multi-tier-app_public mutable tags my-databases stack my-databases_default network my-databases_mariadb MySQL, 2nd, 3rd N - -name flag namespaces, Linux NAT (network address translation) nc client program - -net host flag NET namespace NET_ADMIN capability NET_RAW capability network address translation (NAT) - -network flag - -network host option network interface network-explorer container networks overview policies for, lack of with Compose networks property NGINX web server, 2nd, 3rd, 4th, 5th nginx:latest, 2nd, 3rd - -no-cache flag node.hostname attribute node.id attribute NodePort publishing node.role attribute - -no-healthcheck flagp none network, 2nd, 3rd - -no-trunc option npm package manager, 2nd nslookup lighthouse null driver O –o flag ONBUILD instruction onbuild suffixes - -output (-o) option overlay networks, 2nd discovering services on isolating service-to-service communication with OverlayFS P package managers passwd file - -password flag pause option peer-to-peer networks Permission denied message pg-data volume pgdata volume PID (process identifier) namespace, 2nd, 3rd PID, 2nd - -pid flag pip package manager placement constraints plain style plath container Play with Docker (PWD), 2nd polymorphic tools port conflict portability, improving ports ports property postgres database postgres key postgres service, 2nd, 3rd, 4th, 5th postgres user POSTGRES_* environment variable POSTGRES_DB variable POSTGRES_HOST variable POSTGRES_PASSWORD variable PostgreSQL database, 2nd postgresql driver POSTGRES_USER variable private hosted repositories private network, 2nd, 3rd private registries consuming images from registry performance of registry image, using private zone - -privileged flag process identifier (PID) namespace, 2nd, 3rd protecting computer protocols, network - -prune flag ps command public hosted repositories public network, 2nd, 3rd - -publish (-p) option PublishMode pull commands push command, 2nd PWD (Play with Docker), 2nd Q Quay.io, 2nd - -quiet (-q) flag R reader container read-only filesystems - -read-only flag readonly=true argument registries alternative working with from command line registry repository remove command replicas property replicated mode replicated services repositories reserved status resource controls adjusting OS feature access with capabilities allowances, setting access to devices CPU memory limits building use-case-appropriate containers applications high-level system services low-level system services running containers with full privileges sharing memory strengthening containers with enhanced tools users and Linux’s user (USR) namespace run-as users UID remapping volumes and - -restart flag, 2nd restart_policy REX-Ray, 2nd rm command - -rm flag rm operation - -rm option role label, SELinux roll forward command rollback - -rollback flag rollout, automated rsync tool rules run command, 2nd, 3rd, 4th RUN instruction, 2nd, 3rd, 4th, 5th run-as users runit, 2nd Running state Running x minutes ago state runtime stage, 2nd Rust programming language S scanners, using to identify vulnerabilities scope property, 2nd scp tooling scratch image, 2nd scratch repository $SECRET variable secrets, 2nd secrets key, 2nd security modules - -security-opt flag sed command SELinux semantic versioning Serverspec Service converged service create subcommand service rollback subcommand service-level agreement (SLA) services, 2nd, 3rd autoscaling declarative service environments with Compose collections of services YAML primer “Hello World” automated resurrection and replication automated rollout service health and rollback load balancing, service discovery, and networks with Compose placing service tasks on clusters constraining where tasks run deploying real applications onto real clusters replicating services using global services for one task per node running on Swarm cluster, communicating with load balancing overlay networks routing client requests to services by using Swarm routing mesh stateful services and preserving data services key services property - -ServiceV2 flag setgid attribute setuid attribute sh program shared mount points shell form shell variables shipping containers short-form flags SIG_HUP signal SIG_KILL signal Simple Email Service SLA (service-level agreement) software finding identifying installation files and isolation container filesystem abstraction and isolation filesystem structure image layers layer relationships union filesystems, weaknesses of installing from Dockerfiles using alternative registries using Docker Hub from website working with Docker registries from command line working with images as files Spring Boot framework src parameter SSH protocol stack deploy command stacks start period startup scripts and multiprocess containers, 2nd environmental preconditions validation health checks initialization processes stateful services STATUS column stop command storage in-memory mount points blind shared volume plugins volumes cleaning up container-independent data management using using with NoSQL databases - -storage-driver (-s) option subgid map subuid map success status SUID and SGID permissions suid-enabled program supervisord process, 2nd, 3rd swap space Swarm, 2nd, 3rd, 4th, 5th, 6th Swarm Admin Guide swarm value Swarm3K project SYS_ADMIN capability SYSLOG capability SYS_MODULE capability SYS_NICE capability SYS_RAWIO capability SYS_RESOURCE capability System up message systemd SYS_TIME capability SysV T -t option - -tag (-t) flag tag command tagging images, patterns for background configuration image per deployment stage continuous delivery with unique tags semantic versioning TAR archive files - -target option tasks TCP (Transmission Control Protocol) testing images in build pipelines time-out tini TLS (Transport Layer Security) tmpfs device tmpfs filesystem, 2nd tmpfs-mode option tmpfs-size option Tomcat top subcommand Transmission Control Protocol (TCP) Transport Layer Security (TLS) transportation speed, of distribution method Travis CI tree root point trusted repository - -tty (-t) option type label, SELinux type option type=bind option U Ubuntu image, 2nd ubuntu:latest ubuntu:latest image, 2nd ubuntu-git images, 2nd, 3rd ubuntu-git:removed image UDP (User Datagram Protocol) UFS (union filesystem), 2nd, 3rd, 4th UID (user ID) UID remapping unconfined value union filesystem (UFS), 2nd, 3rd, 4th unique ID (identifier) unique tags Unique Tags scheme update command update_config - -update-failure-action flag - -update-max-failure-ratio flag Upstart - -user (-u) flag user (USR) namespace, 2nd, 3rd User Datagram Protocol (UDP) user ID (UID) USER instruction, 2nd user label, SELinux user namespaces user permissions user space memory - -username flag username/repository pattern user-network userns-remap option, 2nd USR (Linux’s user) namespace USR (user) namespace, 2nd, 3rd UTS namespace V v option v2 tag, 2nd VCS (version-control system) version property VERSION variable, 2nd version-control system (VCS) versioning practices VIP (virtual IP) addresses, 2nd, 3rd vip endpoint mode virtual machine (VM), 2nd, 3rd, 4th VirtualIPs virtualization, containers different than visibility, of distribution method VM (virtual machine), 2nd, 3rd, 4th _vNNN character sequence - -volume flag VOLUME instruction volume plugins volumes, 2nd, 3rd, 4th cleaning up container-independent data management using using with NoSQL databases volumes key volumes property - -volumes-from flag vulnerabilities, using scanners to identify W watcher program web browsers WEB_HOST environment variable wget program whoami command Windows Subsystem for Linux (WSL) WordPress, 2nd, 3rd, 4th, 5th WORDPRESS_AUTH_KEY environment variable WORDPRESS_AUTH_SALT environment variable WORDPRESS_DB_HOST environment variable WORDPRESS_DB_NAME environment variable WORDPRESS_DB_PASSWORD environment variable WORDPRESS_DB_USER environment variable WORDPRESS_LOGGED_IN_KEY environment variable WORDPRESS_LOGGED_IN_SALT environment variable WORDPRESS_NONCE_KEY environment variable WORDPRESS_NONCE_SALT environment variable WORDPRESS_SECURE_AUTH_KEY environment variable WORDPRESS_SECURE_AUTH_SALT environment variable WORKDIR instruction wp container, 2nd WSL (Windows Subsystem for Linux) Y YAML (Yet Another Markup Language), 2nd YUM Z zone label, 2nd List of Figures Chapter 1.


pages: 403 words: 111,119

Doughnut Economics: Seven Ways to Think Like a 21st-Century Economist by Kate Raworth

"Friedman doctrine" OR "shareholder theory", 3D printing, Alan Greenspan, Alvin Toffler, Anthropocene, Asian financial crisis, bank run, basic income, battle of ideas, behavioural economics, benefit corporation, Berlin Wall, biodiversity loss, bitcoin, blockchain, Branko Milanovic, Bretton Woods, Buckminster Fuller, business cycle, call centre, Capital in the Twenty-First Century by Thomas Piketty, carbon tax, Cass Sunstein, choice architecture, circular economy, clean water, cognitive bias, collapse of Lehman Brothers, complexity theory, creative destruction, crowdsourcing, cryptocurrency, Daniel Kahneman / Amos Tversky, David Ricardo: comparative advantage, degrowth, dematerialisation, disruptive innovation, Douglas Engelbart, Douglas Engelbart, Easter island, en.wikipedia.org, energy transition, Erik Brynjolfsson, Ethereum, ethereum blockchain, Eugene Fama: efficient market hypothesis, experimental economics, Exxon Valdez, Fall of the Berlin Wall, financial deregulation, Financial Instability Hypothesis, full employment, Future Shock, Garrett Hardin, Glass-Steagall Act, global supply chain, global village, Henri Poincaré, hiring and firing, Howard Zinn, Hyman Minsky, income inequality, Intergovernmental Panel on Climate Change (IPCC), invention of writing, invisible hand, Isaac Newton, it is difficult to get a man to understand something, when his salary depends on his not understanding it, John Maynard Keynes: Economic Possibilities for our Grandchildren, Joseph Schumpeter, Kenneth Arrow, Kenneth Rogoff, Kickstarter, land reform, land value tax, Landlord’s Game, loss aversion, low interest rates, low skilled workers, M-Pesa, Mahatma Gandhi, market fundamentalism, Martin Wolf, means of production, megacity, Minsky moment, mobile money, Money creation, Mont Pelerin Society, Myron Scholes, neoliberal agenda, Network effects, Occupy movement, ocean acidification, off grid, offshore financial centre, oil shale / tar sands, out of africa, Paul Samuelson, peer-to-peer, planetary scale, price mechanism, quantitative easing, randomized controlled trial, retail therapy, Richard Thaler, Robert Solow, Ronald Reagan, Second Machine Age, secular stagnation, shareholder value, sharing economy, Silicon Valley, Simon Kuznets, smart cities, smart meter, Social Responsibility of Business Is to Increase Its Profits, South Sea Bubble, statistical model, Steve Ballmer, systems thinking, TED Talk, The Chicago School, The Great Moderation, the map is not the territory, the market place, The Spirit Level, The Wealth of Nations by Adam Smith, Thomas Malthus, Thorstein Veblen, too big to fail, Torches of Freedom, Tragedy of the Commons, trickle-down economics, ultimatum game, universal basic income, Upton Sinclair, Vilfredo Pareto, wikimedia commons

Fourth, publicly fund the set-up of community makerspaces – places where innovators can meet and experiment with shared use of 3D printers and essential tools for hardware construction. And lastly, encourage the spread of civic organisations – from cooperative societies and student groups to innovation clubs and neighbourhood associations – because their interconnections turn into the very nodes that bring such peer-to-peer networks alive. Going global Despite the importance of tackling national inequalities, global inequalities are still of great concern. Since 2000, global income inequality has narrowed slightly – largely thanks to poverty reduction in China – but the world as a whole still remains more unequal than any single country within it.85 And that extreme skew in global incomes helps to push humanity beyond both sides of the Doughnut.

., 6 micro-businesses, 9, 173, 178 microeconomics, 132–4 microgrids, 187–8 Micronesia, 153 Microsoft, 231 middle class, 6, 46, 58 middle-income countries, 90, 164, 168, 173, 180, 226, 254 migration, 82, 89–90, 166, 195, 199, 236, 266, 286 Milanovic, Branko, 171 Mill, John Stuart, 33–4, 73, 97, 250, 251, 283, 284, 288 Millo, Yuval, 101 minimum wage, 82, 88, 176 Minsky, Hyman, 87, 146 Mises, Ludwig von, 66 mission zero, 217 mobile banking, 199–200 mobile phones, 222 Model T revolution, 277–8 Moldova, 199 Mombasa, Kenya, 185–6 Mona Lisa (da Vinci), 94 money creation, 87, 164, 177, 182–8, 205 MONIAC (Monetary National Income Analogue Computer), 64–5, 75, 142, 262 Monoculture (Michaels), 6 Monopoly, 149 Mont Pelerin Society, 67, 93 Moral Consequences of Economic Growth, The (Friedman), 258 moral vacancy, 41 Morgan, Mary, 99 Morogoro, Tanzania, 121 Moyo, Dambisa, 258 Muirhead, Sam, 230, 231 MultiCapital Scorecard, 241 Murphy, David, 264 Murphy, Richard, 185 musical tastes, 110 Myriad Genetics, 196 N national basic income, 177 Native Americans, 115, 116, 282 natural capital, 7, 116, 269 Natural Economic Order, The (Gessel), 274 Nedbank, 216 negative externalities, 213 negative interest rates, 275–6 neoclassical economics, 134, 135 neoliberalism, 7, 62–3, 67–70, 81, 83, 84, 88, 93, 143, 170, 176 Nepal, 181, 199 Nestlé, 217 Netherlands, 211, 235, 224, 226, 238, 277 networks, 110–11, 117, 118, 123, 124–6, 174–6 neuroscience, 12–13 New Deal, 37 New Economics Foundation, 278, 283 New Year’s Day, 124 New York, United States, 9, 41, 55 Newlight Technologies, 224, 226, 293 Newton, Isaac, 13, 15–17, 32–3, 95, 97, 129, 131, 135–7, 142, 145, 162 Nicaragua, 196 Nigeria, 164 nitrogen, 49, 52, 212–13, 216, 218, 221, 226, 298 ‘no pain, no gain’, 163, 167, 173, 204, 209 Nobel Prize, 6–7, 43, 83, 101, 167 Norway, 281 nudging, 112, 113, 114, 123–6 O Obama, Barack, 41, 92 Oberlin, Ohio, 239, 240–41 Occupy movement, 40, 91 ocean acidification, 45, 46, 52, 155, 242, 298 Ohio, United States, 190, 239 Okun, Arthur, 37 onwards and upwards, 53 Open Building Institute, 196 Open Source Circular Economy (OSCE), 229–32 open systems, 74 open-source design, 158, 196–8, 265 open-source licensing, 204 Organisation for Economic Co-operation and Development (OECD), 38, 210, 255–6, 258 Origin of Species, The (Darwin), 14 Ormerod, Paul, 110, 111 Orr, David, 239 Ostrom, Elinor, 83, 84, 158, 160, 181–2 Ostry, Jonathan, 173 OSVehicle, 231 overseas development assistance (ODA), 198–200 ownership of wealth, 177–82 Oxfam, 9, 44 Oxford University, 1, 36 ozone layer, 9, 50, 115 P Pachamama, 54, 55 Pakistan, 124 Pareto, Vilfredo, 165–6, 175 Paris, France, 290 Park 20|20, Netherlands, 224, 226 Parker Brothers, 149 Patagonia, 56 patents, 195–6, 197, 204 patient capital, 235 Paypal, 192 Pearce, Joshua, 197, 203–4 peer-to-peer networks, 187, 192, 198, 203, 292 People’s QE, 184–5 Perseus, 244 Persia, 13 Peru, 2, 105–6 Phillips, Adam, 283 Phillips, William ‘Bill’, 64–6, 75, 142, 262 phosphorus, 49, 52, 212–13, 218, 298 Physiocrats, 73 Pickett, Kate, 171 pictures, 12–25 Piketty, Thomas, 169 Playfair, William, 16 Poincaré, Henri, 109, 127–8 Polanyi, Karl, 82, 272 political economy, 33–4, 42 political funding, 91–2, 171–2 political voice, 43, 45, 51–2, 77, 117 pollution, 29, 45, 52, 85, 143, 155, 206–17, 226, 238, 242, 254, 298 population, 5, 46, 57, 155, 199, 250, 252, 254 Portugal, 211 post-growth society, 250 poverty, 5, 9, 37, 41, 50, 88, 118, 148, 151 emotional, 283 and inequality, 164–5, 168–9, 178 and overseas development assistance (ODA), 198–200 and taxation, 277 power, 91–92 pre-analytic vision, 21–2 prescription medicines, 123 price-takers, 132 prices, 81, 118–23, 131, 160 Principles of Economics (Mankiw), 34 Principles of Economics (Marshall), 17, 98 Principles of Political Economy (Mill), 288 ProComposto, 226 Propaganda (Bernays), 107 public relations, 107, 281 public spending v. investment, 276 public–private patents, 195 Putnam, Robert, 76–7 Q quantitative easing (QE), 184–5 Quebec, 281 Quesnay, François, 16, 73 R Rabot, Ghent, 236 Rancière, Romain, 172 rating and review systems, 105 rational economic man, 94–103, 109, 111, 112, 126, 282 Reagan, Ronald, 67 reciprocity, 103–6, 117, 118, 123 reflexivity of markets, 144 reinforcing feedback loops, 138–41, 148, 250, 271 relative decoupling, 259 renewable energy biomass energy, 118, 221 and circular economy, 221, 224, 226, 235, 238–9, 274 and commons, 83, 85, 185, 187–8, 192, 203, 264 geothermal energy, 221 and green growth, 257, 260, 263, 264, 267 hydropower, 118, 260, 263 pricing, 118 solar energy, see solar energy wave energy, 221 wind energy, 75, 118, 196, 202–3, 221, 233, 239, 260, 263 rentier sector, 180, 183, 184 reregulation, 82, 87, 269 resource flows, 175 resource-intensive lifestyles, 46 Rethinking Economics, 289 Reynebeau, Guy, 237 Ricardo, David, 67, 68, 73, 89, 250 Richardson, Katherine, 53 Rifkin, Jeremy, 83, 264–5 Rise and Fall of the Great Powers, The (Kennedy), 279 risk, 112, 113–14 Robbins, Lionel, 34 Robinson, James, 86 Robinson, Joan, 142 robots, 191–5, 237, 258, 278 Rockefeller Foundation, 135 Rockford, Illinois, 179–80 Rockström, Johan, 48, 55 Roddick, Anita, 232–4 Rogoff, Kenneth, 271, 280 Roman Catholic Church, 15, 19 Rombo, Tanzania, 190 Rome, Ancient, 13, 48, 154 Romney, Mitt, 92 Roosevelt, Franklin Delano, 37 rooted membership, 190 Rostow, Walt, 248–50, 254, 257, 267–70, 284 Ruddick, Will, 185 rule of thumb, 113–14 Ruskin, John, 42, 223 Russia, 200 rust belt, 90, 239 S S curve, 251–6 Sainsbury’s, 56 Samuelson, Paul, 17–21, 24–5, 38, 62–7, 70, 74, 84, 91, 92, 93, 262, 290–91 Sandel, Michael, 41, 120–21 Sanergy, 226 sanitation, 5, 51, 59 Santa Fe, California, 213 Santinagar, West Bengal, 178 São Paolo, Brazil, 281 Sarkozy, Nicolas, 43 Saumweder, Philipp, 226 Scharmer, Otto, 115 Scholes, Myron, 100–101 Schumacher, Ernst Friedrich, 42, 142 Schumpeter, Joseph, 21 Schwartz, Shalom, 107–9 Schwarzenegger, Arnold, 163, 167, 204 ‘Science and Complexity’ (Weaver), 136 Scotland, 57 Seaman, David, 187 Seattle, Washington, 217 second machine age, 258 Second World War (1939–45), 18, 37, 70, 170 secular stagnation, 256 self-interest, 28, 68, 96–7, 99–100, 102–3 Selfish Society, The (Gerhardt), 283 Sen, Amartya, 43 Shakespeare, William, 61–3, 67, 93 shale gas, 264, 269 Shang Dynasty, 48 shareholders, 82, 88, 189, 191, 227, 234, 273, 292 sharing economy, 264 Sheraton Hotel, Boston, 3 Siegen, Germany, 290 Silicon Valley, 231 Simon, Julian, 70 Sinclair, Upton, 255 Sismondi, Jean, 42 slavery, 33, 77, 161 Slovenia, 177 Small Is Beautiful (Schumacher), 42 smart phones, 85 Smith, Adam, 33, 57, 67, 68, 73, 78–9, 81, 96–7, 103–4, 128, 133, 160, 181, 250 social capital, 76–7, 122, 125, 172 social contract, 120, 125 social foundation, 10, 11, 44, 45, 49, 51, 58, 77, 174, 200, 254, 295–6 social media, 83, 281 Social Progress Index, 280 social pyramid, 166 society, 76–7 solar energy, 59, 75, 111, 118, 187–8, 190 circular economy, 221, 222, 223, 224, 226–7, 239 commons, 203 zero-energy buildings, 217 zero-marginal-cost revolution, 84 Solow, Robert, 135, 150, 262–3 Soros, George, 144 South Africa, 56, 177, 214, 216 South Korea, 90, 168 South Sea Bubble (1720), 145 Soviet Union (1922–91), 37, 67, 161, 279 Spain, 211, 238, 256 Spirit Level, The (Wilkinson & Pickett), 171 Sraffa, Piero, 148 St Gallen, Switzerland, 186 Stages of Economic Growth, The (Rostow), 248–50, 254 stakeholder finance, 190 Standish, Russell, 147 state, 28, 33, 69–70, 78, 82, 160, 176, 180, 182–4, 188 and commons, 85, 93, 197, 237 and market, 84–6, 200, 281 partner state, 197, 237–9 and robots, 195 stationary state, 250 Steffen, Will, 46, 48 Sterman, John, 66, 143, 152–4 Steuart, James, 33 Stiglitz, Joseph, 43, 111, 196 stocks and flows, 138–41, 143, 144, 152 sub-prime mortgages, 141 Success to the Successful, 148, 149, 151, 166 Sugarscape, 150–51 Summers, Larry, 256 Sumner, Andy, 165 Sundrop Farms, 224–6 Sunstein, Cass, 112 supply and demand, 28, 132–6, 143, 253 supply chains, 10 Sweden, 6, 255, 275, 281 swishing, 264 Switzerland, 42, 66, 80, 131, 186–7, 275 T Tableau économique (Quesnay), 16 tabula rasa, 20, 25, 63, 291 takarangi, 54 Tanzania, 121, 190, 202 tar sands, 264, 269 taxation, 78, 111, 165, 170, 176, 177, 237–8, 276–9 annual wealth tax, 200 environment, 213–14, 215 global carbon tax, 201 global financial transactions tax, 201, 235 land-value tax, 73, 149, 180 non-renewable resources, 193, 237–8, 278–9 People’s QE, 185 tax relief v. tax justice, 23, 276–7 TED (Technology, Entertainment, Design), 202, 258 Tempest, The (Shakespeare), 61, 63, 93 Texas, United States, 120 Thailand, 90, 200 Thaler, Richard, 112 Thatcher, Margaret, 67, 69, 76 Theory of Moral Sentiments (Smith), 96 Thompson, Edward Palmer, 180 3D printing, 83–4, 192, 198, 231, 264 thriving-in-balance, 54–7, 62 tiered pricing, 213–14 Tigray, Ethiopia, 226 time banking, 186 Titmuss, Richard, 118–19 Toffler, Alvin, 12, 80 Togo, 231, 292 Torekes, 236–7 Torras, Mariano, 209 Torvalds, Linus, 231 trade, 62, 68–9, 70, 89–90 trade unions, 82, 176, 189 trademarks, 195, 204 Transatlantic Trade and Investment Partnership (TTIP), 92 transport, 59 trickle-down economics, 111, 170 Triodos, 235 Turkey, 200 Tversky, Amos, 111 Twain, Mark, 178–9 U Uganda, 118, 125 Ulanowicz, Robert, 175 Ultimatum Game, 105, 117 unemployment, 36, 37, 276, 277–9 United Kingdom Big Bang (1986), 87 blood donation, 118 carbon dioxide emissions, 260 free trade, 90 global material footprints, 211 money creation, 182 MONIAC (Monetary National Income Analogue Computer), 64–5, 75, 142, 262 New Economics Foundation, 278, 283 poverty, 165, 166 prescription medicines, 123 wages, 188 United Nations, 55, 198, 204, 255, 258, 279 G77 bloc, 55 Human Development Index, 9, 279 Sustainable Development Goals, 24, 45 United States American Economic Association meeting (2015), 3 blood donation, 118 carbon dioxide emissions, 260 Congress, 36 Council of Economic Advisers, 6, 37 Earning by Learning, 120 Econ 101 course, 8, 77 Exxon Valdez oil spill (1989), 9 Federal Reserve, 87, 145, 146, 271, 282 free trade, 90 Glass–Steagall Act (1933), 87 greenhouse gas emissions, 153 global material footprint, 211 gross national product (GNP), 36–40 inequality, 170, 171 land-value tax, 73, 149, 180 political funding, 91–2, 171 poverty, 165, 166 productivity and employment, 193 rust belt, 90, 239 Transatlantic Trade and Investment Partnership (TTIP), 92 wages, 188 universal basic income, 200 University of Berkeley, 116 University of Denver, 160 urbanisation, 58–9 utility, 35, 98, 133 V values, 6, 23, 34, 35, 42, 117, 118, 121, 123–6 altruism, 100, 104 anthropocentric, 115 extrinsic, 115 fluid, 28, 102, 106–9 and networks, 110–11, 117, 118, 123, 124–6 and nudging, 112, 113, 114, 123–6 and pricing, 81, 120–23 Veblen, Thorstein, 82, 109, 111, 142 Venice, 195 verbal framing, 23 Verhulst, Pierre, 252 Victor, Peter, 270 Viner, Jacob, 34 virtuous cycles, 138, 148 visual framing, 23 Vitruvian Man, 13–14 Volkswagen, 215–16 W Wacharia, John, 186 Wall Street, 149, 234, 273 Wallich, Henry, 282 Walras, Léon, 131, 132, 133–4, 137 Ward, Barbara, 53 Warr, Benjamin, 263 water, 5, 9, 45, 46, 51, 54, 59, 79, 213–14 wave energy, 221 Ways of Seeing (Berger), 12, 281 Wealth of Nations, The (Smith), 74, 78, 96, 104 wealth ownership, 177–82 Weaver, Warren, 135–6 weightless economy, 261–2 WEIRD (Western, educated, industrialised, rich, democratic), 103–5, 110, 112, 115, 117, 282 West Bengal, India, 124, 178 West, Darrell, 171–2 wetlands, 7 whale hunting, 106 Wiedmann, Tommy, 210 Wikipedia, 82, 223 Wilkinson, Richard, 171 win–win trade, 62, 68, 89 wind energy, 75, 118, 196, 202–3, 221, 233, 239, 260, 263 Wizard of Oz, The, 241 Woelab, 231, 293 Wolf, Martin, 183, 266 women’s rights, 33, 57, 107, 160, 201 and core economy, 69, 79–81 education, 57, 124, 178, 198 and land ownership, 178 see also gender equality workers’ rights, 88, 91, 269 World 3 model, 154–5 World Bank, 6, 41, 119, 164, 168, 171, 206, 255, 258 World No Tobacco Day, 124 World Trade Organization, 6, 89 worldview, 22, 54, 115 X xenophobia, 266, 277, 286 Xenophon, 4, 32, 56–7, 160 Y Yandle, Bruce, 208 Yang, Yuan, 1–3, 289–90 yin yang, 54 Yousafzai, Malala, 124 YouTube, 192 Yunnan, China, 56 Z Zambia, 10 Zanzibar, 9 Zara, 276 Zeitvorsoge, 186–7 zero environmental impact, 217–18, 238, 241 zero-hour contracts, 88 zero-humans-required production, 192 zero-interest loans, 183 zero-marginal-cost revolution, 84, 191, 264 zero-waste manufacturing, 227 Zinn, Howard, 77 PICTURE ACKNOWLEDGEMENTS Illustrations are reproduced by kind permission of: archive.org


pages: 302 words: 82,233

Beautiful security by Andy Oram, John Viega

Albert Einstein, Amazon Web Services, An Inconvenient Truth, Bletchley Park, business intelligence, business process, call centre, cloud computing, corporate governance, credit crunch, crowdsourcing, defense in depth, do well by doing good, Donald Davies, en.wikipedia.org, fault tolerance, Firefox, information security, loose coupling, Marc Andreessen, market design, MITM: man-in-the-middle, Monroe Doctrine, new economy, Nicholas Carr, Nick Leeson, Norbert Wiener, operational security, optical character recognition, packet switching, peer-to-peer, performance metric, pirate software, Robert Bork, Search for Extraterrestrial Intelligence, security theater, SETI@home, Silicon Valley, Skype, software as a service, SQL injection, statistical model, Steven Levy, the long tail, The Wisdom of Crowds, Upton Sinclair, web application, web of trust, zero day, Zimmermann PGP

., 30 Nimda virus, 248 NOC (National Office for Cyberspace), 201, 202 NTLM authentication, 6 O OCC, 191 off-the-shelf software (see software acquisition) Office Max, 50 online advertising advertisers as victims, 98–105 attacks on users, 89–98 CPA advertising, 102–103 CPC advertising, 100–101 CPM advertising, 100–103 creating accountability, 105 deceptive ads, 94–98 exploit-laden banner ads, 89–92 false impressions, 98–99 fighting fraud, 103–104 malvertisements, 92–94 special procurement challenges, 104 targeted, 250 online advertising, targeted, 249 online forums, 250 Open Security Foundation, 55 open source honeyclients, 133–135 Open Web Application Security Project (see OWASP) OpenID identity management, 154 OpenPGP standard/protocol background, 108 certification support, 111, 112 designated revokers, 122 direct trust, 109 exportable signatures, 125 extended introducers, 123 in-certificate preferences, 126 key support, 112 key-editing policies, 126 revoking certificates, 122 OpenSocial API, 159 operating systems, host logging, 232, 236 OptOut spyware removal tool, 251 Orange Book, 213 organizational culture, 200–202 outsourcing extending security initiative to, 190 trends in, 154 vulnerability research, 156 OWASP (Open Web Application Security Project) background, 159 CLASP methodology, 187 Top 10 list, 187 P P2P (peer-to-peer) networks botnet communication, 66 honeyclient considerations, 146 packet sniffers, 92 packets handshake, 28 SQL Slammer worm, 227 Pakistani Flu virus, 248 PAN (Primary Account Number), 77 Panda Labs, 69 PAR (Payer Authentication Request), 77 PARAM tag, 94 passive sniffing, 9 passphrases, 29 password grinding, 28 password-cracking tools L0phtCrack example, 3–6 passphrases and, 29 passwords authentication security, 7 identity theft and, 24 NTLM authentication and, 6 PATHSERVER, 129 Payer Authentication Request (PAR), 77 Payment Card Industry (see PCI) INDEX 277 PayPal, 79 PCI (Payment Card Industry) Data Security Standard, 75, 82, 159, 211, 214, 237 protecting credit card data, 44 peer-to-peer networks (see P2P networks) PEM (Privacy Enhanced Mail), 117 perma-vendors, 156 Personally Identifiable Information (PII), 180 Pezzonavante honeyclient, 144 PGP (Pretty Good Privacy), 111 (see also Web of Trust) background, 107, 108, 116 backward compatibility issues, 117 Crypto Wars, 118 designated revokers, 122 encryption support, 107, 116–120 key validity, 108 patent and export problems, 117 source download, 116 trust models, 109–116 trust relationships, 108 PGP Corporation, 108 PGP Global Directory, 127 pharmware, 68 phishing 3-D Secure protocol, 77 as information source, 68 botnet support, 66 challenges detecting, 231 spam and, 70 specialization in, 249 PhoneyC website, 145 PII (Personally Identifiable Information), 180 Piper, Fred, 168 PKI (Public Key Infrastructure) authoritative keys, 123 defined, 111 DSG support, 203 revoking certificates, 120 SET considerations, 79 PlexLogic, 45 Plumb, Colin, 119 port scanning, 231 pragmatic security, 200, 209 Pre-Shared Key (PSK), 28 Pretty Good Privacy (see PGP) Price, Will, 127 Primary Account Number (PAN), 77 Privacy Enhanced Mail (PEM), 117 proof-of-concept project, 191–193 Provos, Niels, 145 PSK (Pre-Shared Key), 28 psychological traps confirmation traps, 10–14 278 INDEX functional fixation, 14–20 learned helplessness, 2 public key cryptography cumulative trust systems, 111 key revocation, 121 PGP support, 107 RSA algorithm, 117 SET support, 78 steganographic applications, 245 validity, 108 Public Key Infrastructure (see PKI) Public Key Partners, 118 put options, 39 Q Qualys vulnerability management, 151 R Raduege, Harry, 201 Regular, Bob, 90 regulatory compliance (see legal considerations) Reiter, Mark, 129 Reliable Software Technologies, 171, 173 reputation economy, 167 resource dealers, 64 Return on Investment (ROI), 163, 205–207 Return on Security Investment (ROSI), 206 Returnil, 254, 255, 256, 257 revoking certificates, 120–122 RFC 1991, 108, 119 RFC 3156, 108 RFC 4880, 108 Right Media, 94 ROI (Return on Investment), 163, 205–207 root certificates defined, 109 direct trust, 110 rootkits example investigating, 220 Rustock.C, 252 specialization in, 249 ROSI (Return on Security Investment), 206 routers DDoS attacks on, 16 host logging, 232 watch lists, 231 Routh, Jim, 183–197 RSA Data Security Incorporated, 117 RSA public-key algorithm, 117 RSAREF library, 117 Rustock.C rootkit, 252 S Sabett, Randy V., 199–212 sandboxing functionality, 254 HIPS support, 253 need for new strategies, 248 Santa Fe Group, 44 Sarbanes-Oxley Act (SOX), 80, 214 SCADA systems, 18 Schoen, Seth, 127 SDLC (see software development lifecycle) Second Life virtual world, 159 Secret Service Shadowcrew network and, 65 TJX security breach and, 50 Secunia, 156 Secure Electronic Transaction (see SET) security breaches attorney involvement in investigating, 211 Barings Bank, 38–49 California data privacy law, 203–205 cyber underground and, 63–72 databases and, 239 impact of, 208 logs in investigating, 218–221 public data sources, 59 tiger team responses, 210–211 TJX, 49–59 security certificates defined, 22 encryption and, 22, 24 fundamental flaw, 25 paying attention to, 26 wireless access points, 26, 27 Security Event Managers (SEMs), 153 security metrics (see metrics) Security Metrics Catalog project, 54 security traps (see psychological traps) SecurityFocus database, 132 SecurityMetrics.org, 54 SEI (Software Engineering Institute), 176 Seifert, Christian, 138, 145 self-signed certificates, 109 SEMs (Security Event Managers), 153 separation of duties, 39 September 11, 2001, 249 server applications, host logging, 232 Service Set Identifier (SSID), 52 service-oriented architecture (SOA), 150 SET (Secure Electronic Transaction) background, 78 evaluation of, 79 protections supported, 78 transaction process, 79 SHA256 hash algorithm, 241 Shadowcrew network, 65 short straddle trading strategy, 39, 40 signature harassment, 125 Sinclair, Upton, 149 Skinner, B.

., 30 Nimda virus, 248 NOC (National Office for Cyberspace), 201, 202 NTLM authentication, 6 O OCC, 191 off-the-shelf software (see software acquisition) Office Max, 50 online advertising advertisers as victims, 98–105 attacks on users, 89–98 CPA advertising, 102–103 CPC advertising, 100–101 CPM advertising, 100–103 creating accountability, 105 deceptive ads, 94–98 exploit-laden banner ads, 89–92 false impressions, 98–99 fighting fraud, 103–104 malvertisements, 92–94 special procurement challenges, 104 targeted, 250 online advertising, targeted, 249 online forums, 250 Open Security Foundation, 55 open source honeyclients, 133–135 Open Web Application Security Project (see OWASP) OpenID identity management, 154 OpenPGP standard/protocol background, 108 certification support, 111, 112 designated revokers, 122 direct trust, 109 exportable signatures, 125 extended introducers, 123 in-certificate preferences, 126 key support, 112 key-editing policies, 126 revoking certificates, 122 OpenSocial API, 159 operating systems, host logging, 232, 236 OptOut spyware removal tool, 251 Orange Book, 213 organizational culture, 200–202 outsourcing extending security initiative to, 190 trends in, 154 vulnerability research, 156 OWASP (Open Web Application Security Project) background, 159 CLASP methodology, 187 Top 10 list, 187 P P2P (peer-to-peer) networks botnet communication, 66 honeyclient considerations, 146 packet sniffers, 92 packets handshake, 28 SQL Slammer worm, 227 Pakistani Flu virus, 248 PAN (Primary Account Number), 77 Panda Labs, 69 PAR (Payer Authentication Request), 77 PARAM tag, 94 passive sniffing, 9 passphrases, 29 password grinding, 28 password-cracking tools L0phtCrack example, 3–6 passphrases and, 29 passwords authentication security, 7 identity theft and, 24 NTLM authentication and, 6 PATHSERVER, 129 Payer Authentication Request (PAR), 77 Payment Card Industry (see PCI) INDEX 277 PayPal, 79 PCI (Payment Card Industry) Data Security Standard, 75, 82, 159, 211, 214, 237 protecting credit card data, 44 peer-to-peer networks (see P2P networks) PEM (Privacy Enhanced Mail), 117 perma-vendors, 156 Personally Identifiable Information (PII), 180 Pezzonavante honeyclient, 144 PGP (Pretty Good Privacy), 111 (see also Web of Trust) background, 107, 108, 116 backward compatibility issues, 117 Crypto Wars, 118 designated revokers, 122 encryption support, 107, 116–120 key validity, 108 patent and export problems, 117 source download, 116 trust models, 109–116 trust relationships, 108 PGP Corporation, 108 PGP Global Directory, 127 pharmware, 68 phishing 3-D Secure protocol, 77 as information source, 68 botnet support, 66 challenges detecting, 231 spam and, 70 specialization in, 249 PhoneyC website, 145 PII (Personally Identifiable Information), 180 Piper, Fred, 168 PKI (Public Key Infrastructure) authoritative keys, 123 defined, 111 DSG support, 203 revoking certificates, 120 SET considerations, 79 PlexLogic, 45 Plumb, Colin, 119 port scanning, 231 pragmatic security, 200, 209 Pre-Shared Key (PSK), 28 Pretty Good Privacy (see PGP) Price, Will, 127 Primary Account Number (PAN), 77 Privacy Enhanced Mail (PEM), 117 proof-of-concept project, 191–193 Provos, Niels, 145 PSK (Pre-Shared Key), 28 psychological traps confirmation traps, 10–14 278 INDEX functional fixation, 14–20 learned helplessness, 2 public key cryptography cumulative trust systems, 111 key revocation, 121 PGP support, 107 RSA algorithm, 117 SET support, 78 steganographic applications, 245 validity, 108 Public Key Infrastructure (see PKI) Public Key Partners, 118 put options, 39 Q Qualys vulnerability management, 151 R Raduege, Harry, 201 Regular, Bob, 90 regulatory compliance (see legal considerations) Reiter, Mark, 129 Reliable Software Technologies, 171, 173 reputation economy, 167 resource dealers, 64 Return on Investment (ROI), 163, 205–207 Return on Security Investment (ROSI), 206 Returnil, 254, 255, 256, 257 revoking certificates, 120–122 RFC 1991, 108, 119 RFC 3156, 108 RFC 4880, 108 Right Media, 94 ROI (Return on Investment), 163, 205–207 root certificates defined, 109 direct trust, 110 rootkits example investigating, 220 Rustock.C, 252 specialization in, 249 ROSI (Return on Security Investment), 206 routers DDoS attacks on, 16 host logging, 232 watch lists, 231 Routh, Jim, 183–197 RSA Data Security Incorporated, 117 RSA public-key algorithm, 117 RSAREF library, 117 Rustock.C rootkit, 252 S Sabett, Randy V., 199–212 sandboxing functionality, 254 HIPS support, 253 need for new strategies, 248 Santa Fe Group, 44 Sarbanes-Oxley Act (SOX), 80, 214 SCADA systems, 18 Schoen, Seth, 127 SDLC (see software development lifecycle) Second Life virtual world, 159 Secret Service Shadowcrew network and, 65 TJX security breach and, 50 Secunia, 156 Secure Electronic Transaction (see SET) security breaches attorney involvement in investigating, 211 Barings Bank, 38–49 California data privacy law, 203–205 cyber underground and, 63–72 databases and, 239 impact of, 208 logs in investigating, 218–221 public data sources, 59 tiger team responses, 210–211 TJX, 49–59 security certificates defined, 22 encryption and, 22, 24 fundamental flaw, 25 paying attention to, 26 wireless access points, 26, 27 Security Event Managers (SEMs), 153 security metrics (see metrics) Security Metrics Catalog project, 54 security traps (see psychological traps) SecurityFocus database, 132 SecurityMetrics.org, 54 SEI (Software Engineering Institute), 176 Seifert, Christian, 138, 145 self-signed certificates, 109 SEMs (Security Event Managers), 153 separation of duties, 39 September 11, 2001, 249 server applications, host logging, 232 Service Set Identifier (SSID), 52 service-oriented architecture (SOA), 150 SET (Secure Electronic Transaction) background, 78 evaluation of, 79 protections supported, 78 transaction process, 79 SHA256 hash algorithm, 241 Shadowcrew network, 65 short straddle trading strategy, 39, 40 signature harassment, 125 Sinclair, Upton, 149 Skinner, B.


Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems by Chris Sanders

Debian, OSI model, peer-to-peer, pirate software, RFC: Request For Comment

A quick search for this port number at http://www.iana.org will list the services associated with this port. Summary The Gnutella network is commonly used for the downloading and distribution of various file types. This idea may sound great at first, but unfortunately, it has resulted in a large peer-to-peer network of pornography as well as pirated software, movies, and music. In this scenario, it seems that Tina, or someone using Tina's computer, has installed some form of Gnutella client in order to download pornographic material. Final Thoughts If you look at way each of these scenarios was resolved, you will notice that most of the problems were not actually network related.


pages: 179 words: 42,081

DeFi and the Future of Finance by Campbell R. Harvey, Ashwin Ramachandran, Joey Santoro, Vitalik Buterin, Fred Ehrsam

activist fund / activist shareholder / activist investor, bank run, barriers to entry, bitcoin, blockchain, collateralized debt obligation, crowdsourcing, cryptocurrency, David Graeber, Ethereum, ethereum blockchain, fault tolerance, fiat currency, fixed income, Future Shock, initial coin offering, Jane Street, margin call, money: store of value / unit of account / medium of exchange, Network effects, non-fungible token, passive income, peer-to-peer, prediction markets, rent-seeking, RFID, risk tolerance, Robinhood: mobile stock trading app, Satoshi Nakamoto, seigniorage, smart contracts, transaction costs, Vitalik Buterin, yield curve, zero-coupon bond

In early 2001, a fintech startup offered the following idea.2 Instead of individual corporations querying various banks to get the best rate, why not have an electronic system match the buyers and sellers directly at an agreed upon price and no spread? Indeed, the bank could offer this service to its own customers and collect a modest fee (compared with the spread). Furthermore, given that some customers deal with multiple banks, it would be possible to connect customers at all banks participating in the peer-to-peer network. You can imagine the reception. The bank might say: “Are you telling me we should invest in an electronic system that will cannibalize our business and largely eliminate a very important profit center?” However, even 20 years ago, banks realized that their largest customers were very unhappy with the current system.


pages: 247 words: 43,430

Think Complexity by Allen B. Downey

Benoit Mandelbrot, cellular automata, Conway's Game of Life, Craig Reynolds: boids flock, discrete time, en.wikipedia.org, Frank Gehry, Gini coefficient, Guggenheim Bilbao, Laplace demon, mandelbrot fractal, Occupy movement, Paul Erdős, peer-to-peer, Pierre-Simon Laplace, power law, seminal paper, sorting algorithm, stochastic process, strong AI, Thomas Kuhn: the structure of scientific revolutions, Turing complete, Turing machine, Vilfredo Pareto, We are the 99%

A New Kind of Engineering I have been talking about complex systems in the context of science, but complexity is also a cause, and effect, of changes in engineering and the organization of social systems. Centralized decentralized Centralized systems are conceptually simple and easier to analyze, but decentralized systems can be more robust. For example, on the World Wide Web, clients send requests to centralized servers; if the servers are down, the service is unavailable. In peer-to-peer networks, every node is both a client and a server. To take down the service, you have to take down every node. Isolation interaction In classical engineering, the complexity of large systems is managed by isolating components and minimizing interactions. This is still an important engineering principle; nevertheless, the availability of cheap computation makes it increasingly feasible to design systems with complex interactions between components.


pages: 502 words: 132,062

Ways of Being: Beyond Human Intelligence by James Bridle

Ada Lovelace, Airbnb, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, Anthropocene, Any sufficiently advanced technology is indistinguishable from magic, autonomous vehicles, behavioural economics, Benoit Mandelbrot, Berlin Wall, Big Tech, Black Lives Matter, blockchain, Californian Ideology, Cambridge Analytica, carbon tax, Charles Babbage, cloud computing, coastline paradox / Richardson effect, Computing Machinery and Intelligence, corporate personhood, COVID-19, cryptocurrency, DeepMind, Donald Trump, Douglas Hofstadter, Elon Musk, experimental subject, factory automation, fake news, friendly AI, gig economy, global pandemic, Gödel, Escher, Bach, impulse control, James Bridle, James Webb Space Telescope, John von Neumann, Kickstarter, Kim Stanley Robinson, language acquisition, life extension, mandelbrot fractal, Marshall McLuhan, microbiome, music of the spheres, negative emissions, Nick Bostrom, Norbert Wiener, paperclip maximiser, pattern recognition, peer-to-peer, planetary scale, RAND corporation, random walk, recommendation engine, self-driving car, SETI@home, shareholder value, Silicon Valley, Silicon Valley ideology, speech recognition, statistical model, surveillance capitalism, techno-determinism, technological determinism, technoutopianism, the long tail, the scientific method, The Soul of a New Machine, theory of mind, traveling salesman, trolley problem, Turing complete, Turing machine, Turing test, UNCLOS, undersea cable, urban planning, Von Neumann architecture, wikimedia commons, zero-sum game

Both use the power of remote processors provided by volunteers – the computers of the general public, linked by the internet – to churn through complex calculations which would overburden any single supercomputer. It’s perhaps unsurprising that both these charismatic – and successful – examples of the form are concerned with life itself. Federated and peer-to-peer networks are a third example of decentralization. These are attempts to recreate the power and affordances of contemporary social networks, website hosts and even video calls, by allowing every user to build, host and control their own fragment of the wider network. In doing this, users actively reshape the network itself, transforming it from one centred around a few, privately owned hubs, to one in which users are directly connected to one another: a change in technology which results in a physical change to the topography and power relationships of the network itself.34 The project of decentralization also encompasses the process of decentring ourselves: the acknowledgement that humans are not the most important species on the planet, nor the hub around which everything else turns.

For an introduction to open-source philosophy, see Lawrence Lessig, ‘Open Code and Open Societies: Values of Internet Governance’, Sibley Lecture at the University of Georgia, 16 February 1999; or, for a fictional account of its actual implementation, I recommend Cory Doctorow, Walkaway (New York: Macmillan, 2017). For examples of distributed processing initiatives, see https://setiathome.berkeley.edu and https://foldingathome.org/. The social networks Mastodon and Scuttlebutt, the Beaker web browser and Jitsi.org web conferencing are good examples of federated and peer-to-peer network projects. 35. For a description of the Optometrist Algorithm, see E. A. Baltz, E. Trask, M. Binderbauer, et al., ‘Achievement of Sustained Net Plasma Heating in a Fusion Experiment with the Optometrist Algorithm’, Scientific Reports, 7(6425), 25 July 2017; https://doi.org/10.1038/s41598-017-06645-7.


pages: 280 words: 82,355

Extreme Teams: Why Pixar, Netflix, AirBnB, and Other Cutting-Edge Companies Succeed Where Most Fail by Robert Bruce Shaw, James Foster, Brilliance Audio

Airbnb, augmented reality, benefit corporation, Blitzscaling, call centre, cloud computing, data science, deliberate practice, Elon Musk, emotional labour, financial engineering, future of work, holacracy, inventory management, Jeff Bezos, job satisfaction, Jony Ive, karōshi / gwarosa / guolaosi, loose coupling, meta-analysis, nuclear winter, Paul Graham, peer-to-peer, peer-to-peer model, performance metric, Peter Thiel, sharing economy, Sheryl Sandberg, Silicon Valley, social intelligence, SoftBank, Steve Jobs, TED Talk, Tony Fadell, Tony Hsieh, work culture

The CEO of Airbnb, for example, wants people to consider what a competitor might do to undermine or even kill his firm’s business model.29 That is, he wants his people to actively envision products or services that would render Airbnb’s business model obsolete. The goal is to ensure that Airbnb innovates faster than the competition and, in so doing, prevents others from doing what Airbnb is now doing to traditional hotels with its peer-to-peer model. Airbnb is constantly testing new ideas within its current model, such as hosts picking up their guests at the airport or providing them with walking tours and other experiences (for example, dinners or cultural events). It has also considered other areas in the “sharing economy” outside of its current business.

CHAPTER 7 TEAMS AT THE EXTREMES Without Adventure, Teams Slowly Decay1 It’s no accident that the companies profiled in this book were all founded by extraordinary entrepreneurs.2 Their businesses were built on innovative ideas that overturned the existing order of things within their industries. Netflix is disrupting the media industry through its streaming service. Airbnb is disrupting the hospitality industry through its peer-to-peer model. Alibaba is disrupting the way business is done in China through its e-commerce sites. The leaders of these firms, however, realize that their long-term success requires more than groundbreaking products and services. They need their companies, as companies, to be equally innovative—workplaces that are challenging commonly accepted ways of operating.


pages: 165 words: 50,798

Intertwingled: Information Changes Everything by Peter Morville

A Pattern Language, Airbnb, Albert Einstein, Arthur Eddington, augmented reality, Bernie Madoff, bike sharing, Black Swan, business process, Cass Sunstein, cognitive dissonance, collective bargaining, Computer Lib, disinformation, disruptive innovation, folksonomy, holacracy, index card, information retrieval, Internet of things, Isaac Newton, iterative process, Jane Jacobs, Jeff Hawkins, John Markoff, Kanban, Lean Startup, Lyft, messenger bag, minimum viable product, Mother of all demos, Nelson Mandela, Paul Graham, peer-to-peer, Project Xanadu, quantum entanglement, RFID, Richard Thaler, ride hailing / ride sharing, Schrödinger's Cat, self-driving car, semantic web, sharing economy, Silicon Valley, Silicon Valley startup, single source of truth, source of truth, Steve Jobs, Stewart Brand, systems thinking, Ted Nelson, the Cathedral and the Bazaar, The Death and Life of Great American Cities, the scientific method, The Wisdom of Crowds, theory of mind, uber lyft, urban planning, urban sprawl, Vannevar Bush, vertical integration, zero-sum game

It’s hard to hold these truths to be self-evident in a ship of state that’s listing dangerously from democracy to capitalism to oligarchy. Ben Franklin stated in 1776 that “we must all hang together, or assuredly we shall all hang separately,” but what our culture says today is “every man for himself.” For a moment, the Internet was our hope. We thought we were building an information commons, a shared peer-to-peer network created by and accessible to all. But this place made of information became subject to the process of enclosure. Like our fields and forests and universities and hospitals, it was corporatized and commodified. Donella Meadows was right about technology. In the long run, it reflects and reinforces the dominant culture.


pages: 196 words: 54,339

Team Human by Douglas Rushkoff

1960s counterculture, Abraham Maslow, Adam Curtis, autonomous vehicles, basic income, Berlin Wall, big-box store, bitcoin, blockchain, Burning Man, carbon footprint, circular economy, clean water, clockwork universe, cloud computing, collective bargaining, Computing Machinery and Intelligence, corporate personhood, digital capitalism, disintermediation, Donald Trump, drone strike, European colonialism, fake news, Filter Bubble, full employment, future of work, game design, gamification, gig economy, Google bus, Gödel, Escher, Bach, hockey-stick growth, Internet of things, invention of the printing press, invention of writing, invisible hand, iterative process, John Perry Barlow, Kevin Kelly, Kevin Roose, knowledge economy, Larry Ellison, Lewis Mumford, life extension, lifelogging, Mark Zuckerberg, Marshall McLuhan, means of production, mirror neurons, multilevel marketing, new economy, patient HM, pattern recognition, peer-to-peer, Peter Thiel, planned obsolescence, power law, prosperity theology / prosperity gospel / gospel of success, Ray Kurzweil, recommendation engine, ride hailing / ride sharing, Ronald Reagan, Ronald Reagan: Tear down this wall, shareholder value, sharing economy, Silicon Valley, Silicon Valley billionaire, social intelligence, sovereign wealth fund, Steve Jobs, Steven Pinker, Stewart Brand, tech billionaire, technoutopianism, TED Talk, theory of mind, trade route, Travis Kalanick, Turing test, universal basic income, Vannevar Bush, We are as Gods, winner-take-all economy, zero-sum game

So what values can be retrieved by our renaissance? The values that were lost or repressed during the last one: environmentalism, women’s rights, peer-to-peer economics, and localism. The over-rationalized, alienating approach to science is now joined by the newly retrieved approaches of holism and connectedness. We see peer-to-peer networks and crowdfunding replacing the top-down patronage of the Renaissance, retrieving a spirit of mutual aid and community. Even the styles and culture around this activity, from Burning Man and craft beer to piercing and herbal potions, retrieve the human-scaled, medieval sensibilities repressed by the Renaissance.


pages: 562 words: 146,544

Daemon by Daniel Suarez

Berlin Wall, Burning Man, call centre, digital map, disruptive innovation, double helix, failed state, Fall of the Berlin Wall, game design, high net worth, invisible hand, McMansion, offshore financial centre, optical character recognition, peer-to-peer, plutocrats, RFID, satellite internet, SQL injection, Stewart Brand, tech worker, telemarketer, web application

The Mahogany Row conference room was dimly lit, and silhouettes of her audience were arrayed around a sizeable boardroom table. Military badges on the uniforms of some audience members reflected the light from the screen. Her title presentation slide was up: Viability of Daemon Construct Over Peer-to-Peer Networks She was already addressing the group. “…the feasibility of a narrow AI scripting application distributed over a peer-to-peer network architecture to avoid core logic disruption.” She clicked to the next slide. It bore the simple words: Distributed Daemon Viable A murmur went through her audience. “Our unequivocal findings are that a distributed daemon is not merely a potential threat but an inevitable one, given the standards unifying extant networked systems.


pages: 218 words: 44,364

The Starfish and the Spider: The Unstoppable Power of Leaderless Organizations by Ori Brafman, Rod A. Beckstrom

Atahualpa, barriers to entry, Burning Man, creative destruction, disintermediation, experimental economics, Firefox, Francisco Pizarro, jimmy wales, Kibera, Lao Tzu, Network effects, peer-to-peer, pez dispenser, shareholder value, Silicon Valley, Skype, The Wisdom of Crowds, union organizing

The answer turns out to be a surprising yes—if only they had asked the right questions. The record labels had long known that people like to copy music. More broadly, we have a natural human tendency to share information. That's why keeping government and corporate secrets is so difficult—people are apt to gab. Once the peer-to-peer technology was out there, the writing was on the wall. THE STARFISH AND THE SPIDER People's propensity to share music is precisely why the labels have fought for antipiracy laws and tried to block new technologies, like the CD burner, that make copying music easier. For a while, these measures sorta kinda worked.


pages: 187 words: 62,861

The Penguin and the Leviathan: How Cooperation Triumphs Over Self-Interest by Yochai Benkler

Abraham Maslow, Alan Greenspan, behavioural economics, business process, California gold rush, citizen journalism, classic study, Daniel Kahneman / Amos Tversky, do well by doing good, East Village, Everything should be made as simple as possible, experimental economics, experimental subject, framing effect, Garrett Hardin, informal economy, invisible hand, jimmy wales, job satisfaction, Joseph Schumpeter, Kaizen: continuous improvement, Kenneth Arrow, knowledge economy, laissez-faire capitalism, loss aversion, Murray Gell-Mann, Nicholas Carr, peer-to-peer, prediction markets, Richard Stallman, scientific management, Scientific racism, Silicon Valley, social contagion, Steven Pinker, telemarketer, Toyota Production System, Tragedy of the Commons, twin studies, ultimatum game, Washington Consensus, Yochai Benkler, zero-sum game, Zipcar

Magnatune is an online label that sells music of many artists, in each case releasing the music in a perfect digital format that users can copy flawlessly. They also release the music under a Creative Commons license that makes it perfectly legal for the fans to make as many copies as they wish. In other words, when a fan buys music from Magnatune, the fan can legally and easily make millions of copies and blanket them across peer-to-peer networks. And yet they don’t. After scouring the records from more than 75,000 transactions on the site, we found that although users were invited to pay between $5 and $18, at their discretion (in increments of 50 cents), 48 percent of users paid $8 per album, well within a range of what the industry would be thrilled to establish as standard practice for consumers.


pages: 237 words: 67,154

Ours to Hack and to Own: The Rise of Platform Cooperativism, a New Vision for the Future of Work and a Fairer Internet by Trebor Scholz, Nathan Schneider

1960s counterculture, activist fund / activist shareholder / activist investor, Airbnb, Amazon Mechanical Turk, Anthropocene, barriers to entry, basic income, benefit corporation, Big Tech, bitcoin, blockchain, Build a better mousetrap, Burning Man, business logic, capital controls, circular economy, citizen journalism, collaborative economy, collaborative editing, collective bargaining, commoditize, commons-based peer production, conceptual framework, content marketing, crowdsourcing, cryptocurrency, data science, Debian, decentralized internet, deskilling, disintermediation, distributed ledger, driverless car, emotional labour, end-to-end encryption, Ethereum, ethereum blockchain, food desert, future of work, gig economy, Google bus, hiring and firing, holacracy, income inequality, independent contractor, information asymmetry, Internet of things, Jacob Appelbaum, Jeff Bezos, job automation, Julian Assange, Kickstarter, lake wobegon effect, low skilled workers, Lyft, Mark Zuckerberg, means of production, minimum viable product, moral hazard, Network effects, new economy, offshore financial centre, openstreetmap, peer-to-peer, planned obsolescence, post-work, profit maximization, race to the bottom, radical decentralization, remunicipalization, ride hailing / ride sharing, Rochdale Principles, SETI@home, shareholder value, sharing economy, Shoshana Zuboff, Silicon Valley, smart cities, smart contracts, Snapchat, surveillance capitalism, TaskRabbit, technological solutionism, technoutopianism, transaction costs, Travis Kalanick, Tyler Cowen, Uber for X, uber lyft, union organizing, universal basic income, Vitalik Buterin, W. E. B. Du Bois, Whole Earth Catalog, WikiLeaks, women in the workforce, workplace surveillance , Yochai Benkler, Zipcar

Seen in this light, the call for blockchains forms part of a line of informational and administrative technologies such as punch cards, electronic ledgers, and automated record keeping systems that work to administrate populations and to make politics disappear. ASSUMPTION #2: THE TECHNICAL CAN INSTANTIATE NEW SOCIAL OR POLITICAL PROCESSES Like a lot of peer-to-peer networks, blockchain applications conflate a technical architecture with a social or political mode of organization. We can see this kind of ideology at work when the CEO of Bitcoin Indonesia argues, “In its purest form, blockchain is democracy.” From this perspective, what makes Uber Uber and La’Zooz La’Zooz comes down to technical differences at the level of topology and protocol.


pages: 265 words: 69,310

What's Yours Is Mine: Against the Sharing Economy by Tom Slee

4chan, Airbnb, Amazon Mechanical Turk, asset-backed security, barriers to entry, Benchmark Capital, benefit corporation, Berlin Wall, big-box store, bike sharing, bitcoin, blockchain, Californian Ideology, citizen journalism, collaborative consumption, commons-based peer production, congestion charging, Credit Default Swap, crowdsourcing, data acquisition, data science, David Brooks, democratizing finance, do well by doing good, don't be evil, Dr. Strangelove, emotional labour, Evgeny Morozov, gentrification, gig economy, Hacker Ethic, impact investing, income inequality, independent contractor, informal economy, invisible hand, Jacob Appelbaum, Jane Jacobs, Jeff Bezos, John Zimmer (Lyft cofounder), Kevin Roose, Khan Academy, Kibera, Kickstarter, license plate recognition, Lyft, machine readable, Marc Andreessen, Mark Zuckerberg, Max Levchin, move fast and break things, natural language processing, Netflix Prize, Network effects, new economy, Occupy movement, openstreetmap, Paul Graham, peer-to-peer, peer-to-peer lending, Peter Thiel, pre–internet, principal–agent problem, profit motive, race to the bottom, Ray Kurzweil, recommendation engine, rent control, ride hailing / ride sharing, sharing economy, Silicon Valley, Snapchat, software is eating the world, South of Market, San Francisco, TaskRabbit, TED Talk, the Cathedral and the Bazaar, the long tail, The Nature of the Firm, Thomas L Friedman, transportation-network company, Travis Kalanick, Tyler Cowen, Uber and Lyft, Uber for X, uber lyft, ultimatum game, urban planning, WeWork, WikiLeaks, winner-take-all economy, Y Combinator, Yochai Benkler, Zipcar

The related idea of social entrepreneurship uses markets to scale up efforts to create social good. Groups such as Markets for Good (a wing of the Bill and Melinda Gates Foundation) and Google.org, the charitable arm of Google, put these ideas into practice. Steven Berlin Johnson’s idea of “peer progressives” was mentioned in Chapter 1. It highlights both for-profit and not-for-profit peer-to-peer networks as a framework for solving social problems, and seeks to position digital platforms and their communities for social good.2 Pierre Omidyar is one of the most vocal proponents of the social enterprise model. Omidyar founded eBay, one of the direct ancestors of the Sharing Economy. EBay took what was a neighborhood activity (the yard sale) and scaled it up by putting it on the Internet, with massive success.


pages: 295 words: 66,912

Walled Culture: How Big Content Uses Technology and the Law to Lock Down Culture and Keep Creators Poor by Glyn Moody

Aaron Swartz, Big Tech, bioinformatics, Brewster Kahle, connected car, COVID-19, disinformation, Donald Knuth, en.wikipedia.org, full text search, intangible asset, Internet Archive, Internet of things, jimmy wales, Kevin Kelly, Kickstarter, non-fungible token, Open Library, optical character recognition, p-value, peer-to-peer, place-making, quantitative trading / quantitative finance, rent-seeking, text mining, the market place, TikTok, transaction costs, WikiLeaks

In 2007, she was found liable for $222,000 in damages for sharing twenty-four songs on the P2P service Kazaa.279 The judge, ordering a new trial for Thomas, called ‘the award of hundreds of thousands of dollars in damages unprecedented and oppressive’, and took the opportunity to ‘implore Congress to amend the Copyright Act to address liability and damages in peer-to-peer network cases such as the one currently before this Court.’280 On retrial, Thomas was found liable for even more: $1.92 million.281 When even judges call for a reform of the ‘oppressive’ copyright system, it is evident that something is deeply wrong. Moreover, the punishments in these cases were so manifestly disproportionate that the recording industry began to suffer serious reputational damage for bullying single mothers and grandmothers over the download of a few files.


Engineering Security by Peter Gutmann

active measures, address space layout randomization, air gap, algorithmic trading, Amazon Web Services, Asperger Syndrome, bank run, barriers to entry, bitcoin, Brian Krebs, business process, call centre, card file, cloud computing, cognitive bias, cognitive dissonance, cognitive load, combinatorial explosion, Credit Default Swap, crowdsourcing, cryptocurrency, Daniel Kahneman / Amos Tversky, Debian, domain-specific language, Donald Davies, Donald Knuth, double helix, Dr. Strangelove, Dunning–Kruger effect, en.wikipedia.org, endowment effect, false flag, fault tolerance, Firefox, fundamental attribution error, George Akerlof, glass ceiling, GnuPG, Google Chrome, Hacker News, information security, iterative process, Jacob Appelbaum, Jane Jacobs, Jeff Bezos, John Conway, John Gilmore, John Markoff, John von Neumann, Ken Thompson, Kickstarter, lake wobegon effect, Laplace demon, linear programming, litecoin, load shedding, MITM: man-in-the-middle, Multics, Network effects, nocebo, operational security, Paradox of Choice, Parkinson's law, pattern recognition, peer-to-peer, Pierre-Simon Laplace, place-making, post-materialism, QR code, quantum cryptography, race to the bottom, random walk, recommendation engine, RFID, risk tolerance, Robert Metcalfe, rolling blackouts, Ruby on Rails, Sapir-Whorf hypothesis, Satoshi Nakamoto, security theater, semantic web, seminal paper, Skype, slashdot, smart meter, social intelligence, speech recognition, SQL injection, statistical model, Steve Jobs, Steven Pinker, Stuxnet, sunk-cost fallacy, supply-chain attack, telemarketer, text mining, the built environment, The Death and Life of Great American Cities, The Market for Lemons, the payments system, Therac-25, too big to fail, Tragedy of the Commons, Turing complete, Turing machine, Turing test, Wayback Machine, web application, web of trust, x509 certificate, Y2K, zero day, Zimmermann PGP

No PKI of any kind is necessary. The advantage of these self-authenticating bindings is that they’re fully compatible with older applications, which can still use the URL, just with weaker security guarantees. A similar sort of mechanism is used in the distributed hash tables (DHTs) that are typically used in peer-to-peer networks, where the cryptographic hash of a data item is used to uniquely identify it, creating self-certifying named objects [606]. The hashing that’s used for DHTs can be applied both forwards (“get me the data item identified by this hash”) and in reverse (“does the returned data item correspond to this hash”) [607], and as with self-authenticating URLs the problem of secure distribution of content is reduced to the far simpler problem of secure distribution of hashes.

id=377245. [574] “Metalink 3.0 Specification (Second Edition)”, Anthony Bryan, 7 July 2007, http://www.metalinker.org/Metalink_3.0_Spec.pdf. [575] “The Metalink Download Description Format”, RFC 5854, Anthony Bryan, Tatsuhiro Tsujikawa, Neil McNab and Peter Poeml, June 2010. [576] “Metalink/HTTP: Mirrors and Hashes”, RFC 6249, Anthony Bryan, Tatsuhiro Tsujikawa, Neil McNab and Peter Poeml, June 2011. [577] “Bringing Tahoe ideas to HTTP”, Brian Warner, posting to the cryptography@metzdowd.com mailing list, message-ID 4A970144.8020709@lothar.com, 27 August 2009. [578] “Child-proof authentication for MIPv6 (CAM)”, Greg O’Shea and Michael Roe, Computer Communications Review, Vol.31, No.2 (April 2001), p.4. [579] “Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses”, Gabriel Montenegro and Claude Castelluccia, Proceedings of the 9th Network and Distributed System Security Symposium (NDSS’02), February 2002, http://www.isoc.org/isoc/conferences/ndss/02/proceedings/papers/monten.pdf. [580] “Securing IPv6 neighbor discovery and router discovery”, Jari Arkko, Tuomas Aura, James Kempf, Vesa-Matti Mäntylä, Pekka Nikander and Michael Roe, Proceedings of the Workshop on Wireless Security (WiSe’02), September 2002, p.77. [581] “Cryptographically Generated Addresses (CGA)”, Tuomas Aura, Proceedings of the 6th Information Security Conference (ISC’03), October 2003, p.29. [582] “Crypto-Based Identifiers (CBIDs): Concepts and Applications”, Gabriel Montenegro and Claude Castelluccia, Transactions on Information and System Security, Vol.7, No.1 (February 2004), p.97. [583] “Cryptographically Generated Addresses for Constrained Devices”, Claude Castelluccia, Wireless Personal Communications, Vol.29, No.3-4 (June 2004), p.221. [584] “SEcure Neighbor Discovery (SEND)”, RFC 3971, Jari Arkko, James Kempf, Brian Zill and Pekka Nikander, March 2005. [585] “Cryptographically Generated Addresses (CGA)”, RFC 3972, Tuomas Aura, March 2005. [586] “An improved address ownership in mobile IPv6”, Min-Shiang Hwang, Cheng-Chi Lee and Song-Kong Chong, Computer Communications, Vol.31, No.14 (5 September 2008), p.3250. [587] “Analysis and Optimisation of Cryptographically Generated Addresses”, Joppe Bos, Onur Özen and Jean-Pierre Hubaux, Proceedings of the 12th Information Security Conference (ISC’09), Springer-Verlag LNCS No.5735, September 2009, p.17. [588] “Not One Click for Security”, Alan Karp, Marc Stiegler and Tyler Close, Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS’09), July 2009, Paper 19. [589] “An IPv6 Prefix for Overlay Routable Cryptographic Hash Identifiers (ORCHID)”, RFC 4843, Pekka Nikander, Julien Laganier and Francis Dupont, April 2007. [590] “Peer Name Resolution Protocol”, Microsoft Corporation, 27 September 2006, http://technet.microsoft.com/en-us/library/bb726971.aspx. [591] “Host Identity Protocol (HIP) Architecture”, Robert Moskowitz and Pekka Nikander, RFC 4423, May 2006. [592] “Host Identity Protocol”, Robert Moskowitz, Pekka Nikander, Petri Jokela and Thomas Henderson, RFC 5201, April 2008. [593] “Using the Encapsulating Security Payload (ESP) Transport Format with the Host Identity Protocol (HIP)”, Petri Jokela, Robert Moskowitz and Pekka Nikander, RFC 5202, April 2008. 438 Design [594] “Host Identity Protocol (HIP) Registration Extension”, Julien Laganier, Teemu Koponen and Lars Eggert, RFC 5203, April 2008. [595] “Host Identity Protocol (HIP) Rendezvous Extension”, Julien Laganier and Lars Eggert, RFC 5204, April 2008. [596] “Host Identity Protocol (HIP) Domain Name System (DNS) Extension”, Pekka Nikander and Julien Laganier, RFC 5205, April 2008. [597] “End-Host Mobility and Multihoming with the Host Identity Protocol”, Pekka Nikander, Thomas Henderson, Christian Vogt and Jari Arkko, RFC 5206, April 2008. [598] “NAT and Firewall Traversal Issues of Host Identity Protocol (HIP) Communication”, Martin Stiemerling, Juergen Quittek and Lars Eggert, RFC 5207, April 2008. [599] “Using the Host Identity Protocol with Legacy Applications”, Thomas Henderson, Pekka Nikander and Miika Komu, RFC 5338, September 2008. [600] “Basic Host Identity Protocol (HIP) Extensions for Traversal of Network Address Translators”, Miika Komu, Thomas Henderson, Hannes Tschofenig, Jan Melen and Ari Keranen, RFC 5770, April 2010. [601] “Host Identity Protocol (HIP) Multi-Hop Routing Extension”, Gonzalo Camarillo and Ari Keranen, RFC 6028, October 2010. [602] “Host Identity Protocol (HIP) Immediate Carriage and Conveyance of UpperLayer Protocol Signaling (HICCUPS)”, Gonzalo Camarillo and Jan Melen, RFC 6078, January 2011. [603] “HIP BONE: Host Identity Protocol (HIP) Based Overlay Networking Environment (BONE)”, Gonzalo Camarillo, Pekka Nikander, Jani Hautakorpi, Ari Keranen and Alan Johnston, RFC 6079, January 2011. [604] “Host Identity Protocol (hip)”, 2011, http://datatracker.ietf.org/wg/hip/. [605] “Host Identity Protocol Research Group (HIPRG)”, 2011, http://www.irtf.org/hiprg. [606] “Peer-to-Peer Systems”, Rodrigo Rodrigues and Peter Druschel, Communications of the ACM, Vol.53, No.10 (October 2010), p.72. [607] “Pollution in P2P File Sharing Systems”, Jian Liang, Rakesh Kumar, Yongjian Xi and Keith Ross, Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’05), March 2005, p.1174. [608] “A Survey of Peer-to-Peer Security Issues”, Dan Wallach, Proceedings of the 2002 International Symposium on Software Security (ISSS’02), SpringerVerlag LNCS No.2609, November 2002, p.42. [609] “Eclipse Attacks on Overlay Networks: Threats and Defenses”, Atul Singh, Tsuen-Wan Ngan, Peter Druschel and Dan Wallach, Proceedings of the 25th International Conference on Computer Communications (INFOCOM’06), April 2006, [610] “The Index Poisoning Attack in P2P File Sharing Systems”, Jian Liang, Naoum Naoumov and Keith Ross, Proceedings of the 25th Conference on Computer Communications (INFOCOM’06), April 2006, p.1737. [611] “Exploiting KAD: Possible Uses and Misuses”, Moritz Steiner, Taoufik EnNajjary and Ernst Biersack, Computer Communication Review, Vol.37, No.5 (October 2007), p.65. [612] “Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network”, Michael Kohnen, Mike Leske and Erwin Rathgeb, Proceedings of the 8th IFIP-TC 6 Networking Conference (Networking’09), Springer-Verlag LNCS No.5550, May 2009, p.104. [613] “Combating Index Poisoning in P2P File Sharing”, Lingli Deng, Yeping He and Ziyao Xu, Proceedings of the 3rd Conference and Workshops on Advances in Information Security and Assurance (ISA’09), Springer-Verlag LNCS No.5576, June 2009, p.358. [614] “Hashing it out in public: Common failure modes of DHT-based anonymity schemes”, Andrew Tran, Nicholas Hopper and Yongdae Kim, Proceedings of the 8th Workshop on Privacy in the Electronic Society (WPES’09), November 2009, p.71.

This functionality is quite contrary to conventional PKI dogma, but that’s because the code signing mechanism was designed to fit a particular purpose while generalpurpose PKI was designed for… well, it must have been designed for something. What this is in effect doing is layering custom security controls on top of the generalpurpose PKI, in the same way that an overlay network like a peer-to-peer network adds additional functionality on top of the existing Internet protocols. So don’t be afraid to overlay your own functionality on top of the basic X.509 facilities, assuming that you have sufficient control over the implementation to make it do what you need. This approach leverages existing investment in PKI software while providing add-on capabilities that provides the services and functionality that you need.


pages: 246 words: 70,404

Come and Take It: The Gun Printer's Guide to Thinking Free by Cody Wilson

3D printing, 4chan, Aaron Swartz, active measures, Airbnb, airport security, Any sufficiently advanced technology is indistinguishable from magic, assortative mating, bitcoin, Chelsea Manning, Cody Wilson, digital rights, disintermediation, DIY culture, Evgeny Morozov, fiat currency, Google Glasses, gun show loophole, jimmy wales, lifelogging, Mason jar, means of production, Menlo Park, Minecraft, national security letter, New Urbanism, peer-to-peer, Peter Thiel, printed gun, Richard Stallman, ride hailing / ride sharing, Skype, Streisand effect, thinkpad, WikiLeaks, working poor

“And in the event the states move in for some final shutdown, only then do they release the password. The copies were already distributed. The damage sits waiting to be done. Maybe the files had been seeded for months, maybe years. You can’t pull them all down. The threat is credible because everyone has a computer. Every computer is always already on the Internet.” “Peer-to-peer technology gives you leverage, sure. So, what are you saying?” “What I’m saying is you can leak more than emails and cables. There are new machines—networked, material printers. They use complex and evolving materials. Into this budding universe of digital production . . . you leak a gun.” I liked to watch the realization come to people in stages.


pages: 612 words: 187,431

The Art of UNIX Programming by Eric S. Raymond

A Pattern Language, Albert Einstein, Apple Newton, barriers to entry, bioinformatics, Boeing 747, Clayton Christensen, combinatorial explosion, commoditize, Compatible Time-Sharing System, correlation coefficient, David Brooks, Debian, Dennis Ritchie, domain-specific language, don't repeat yourself, Donald Knuth, end-to-end encryption, Everything should be made as simple as possible, facts on the ground, finite state, Free Software Foundation, general-purpose programming language, George Santayana, history of Unix, Innovator's Dilemma, job automation, Ken Thompson, Larry Wall, level 1 cache, machine readable, macro virus, Multics, MVC pattern, Neal Stephenson, no silver bullet, OSI model, pattern recognition, Paul Graham, peer-to-peer, premature optimization, pre–internet, publish or perish, revision control, RFC: Request For Comment, Richard Stallman, Robert Metcalfe, Steven Levy, the Cathedral and the Bazaar, transaction costs, Turing complete, Valgrind, wage slave, web application

But as the designers of BeOS noticed, the requirements of pervasive networking cannot be met without implementing something very close to general-purpose timesharing. Single-user client operating systems cannot thrive in an Internetted world. This problem drove the reconvergence of client and server operating systems. The first, pre-Internet attempts at peer-to-peer networking over LANs, in the late 1980s, began to expose the inadequacy of the client-OS design model. Data on a network has to have rendezvous points in order to be shared; thus, we can't do without servers. At the same time, experience with the Macintosh and Windows client operating systems raised the bar on the minimum quality of user experience customers would tolerate.

Incomplete library implementations (especially older JDK 1.1 versions that don't support the newer JDK 1.2) can be an issue. Java's best side is that it comes close enough to achieving write-once-run-anywhere to be useful as an OS-independent environment of its own. Its worst side is that the Java 1/Java 2 split compromises that goal in deeply frustrating ways. Case Study: FreeNet Freenet is a peer-to-peer networking project that is intended to make censorship and content suppression impossible.[127] Freenet developers envision the following applications: Uncensorable dissemination of controversial information: Freenet protects freedom of speech by enabling anonymous and uncensorable publication of material ranging from grassroots alternative journalism to banned exposés.


pages: 144 words: 43,356

Surviving AI: The Promise and Peril of Artificial Intelligence by Calum Chace

3D printing, Ada Lovelace, AI winter, Airbnb, Alvin Toffler, artificial general intelligence, augmented reality, barriers to entry, basic income, bitcoin, Bletchley Park, blockchain, brain emulation, Buckminster Fuller, Charles Babbage, cloud computing, computer age, computer vision, correlation does not imply causation, credit crunch, cryptocurrency, cuban missile crisis, deep learning, DeepMind, dematerialisation, Demis Hassabis, discovery of the americas, disintermediation, don't be evil, driverless car, Elon Musk, en.wikipedia.org, epigenetics, Erik Brynjolfsson, everywhere but in the productivity statistics, Flash crash, friendly AI, Geoffrey Hinton, Google Glasses, hedonic treadmill, hype cycle, industrial robot, Internet of things, invention of agriculture, job automation, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, John von Neumann, Kevin Kelly, life extension, low skilled workers, machine translation, Mahatma Gandhi, means of production, mutually assured destruction, Neil Armstrong, Nicholas Carr, Nick Bostrom, paperclip maximiser, pattern recognition, peer-to-peer, peer-to-peer model, Peter Thiel, radical life extension, Ray Kurzweil, Robert Solow, Rodney Brooks, Second Machine Age, self-driving car, Silicon Valley, Silicon Valley ideology, Skype, South Sea Bubble, speech recognition, Stanislav Petrov, Stephen Hawking, Steve Jobs, strong AI, technological singularity, TED Talk, The future is already here, The Future of Employment, theory of mind, Turing machine, Turing test, universal basic income, Vernor Vinge, wage slave, Wall-E, zero-sum game

Peer-to-peer A new business model which is generating a lot of column inches for the idea of digital disruption is peer-to-peer commerce, the leading practitioners of which are AirBnB and Uber. Both were founded in San Francisco, of course – in 2008 and 2009 respectively. The level of investor enthusiasm for the peer-to-peer model is demonstrated by comparing AirBnB’s market cap of $20bn in March 2015 with Hyatt’s market cap of $8.4bn. Hyatt has over 500 hotels around the world and revenues of $4bn. AirBnB, with 13 members of staff, owns no hotels and its revenues in March 2015 were around $250m. Uber’s rise has been even more dramatic: its market cap reached $50bn in May 2015.


pages: 254 words: 76,064

Whiplash: How to Survive Our Faster Future by Joi Ito, Jeff Howe

3D printing, air gap, Albert Michelson, AlphaGo, Amazon Web Services, artificial general intelligence, basic income, Bernie Sanders, Big Tech, bitcoin, Black Lives Matter, Black Swan, Bletchley Park, blockchain, Burning Man, business logic, buy low sell high, Claude Shannon: information theory, cloud computing, commons-based peer production, Computer Numeric Control, conceptual framework, CRISPR, crowdsourcing, cryptocurrency, data acquisition, deep learning, DeepMind, Demis Hassabis, digital rights, disruptive innovation, Donald Trump, double helix, Edward Snowden, Elon Musk, Ferguson, Missouri, fiat currency, financial innovation, Flash crash, Ford Model T, frictionless, game design, Gerolamo Cardano, informal economy, information security, interchangeable parts, Internet Archive, Internet of things, Isaac Newton, Jeff Bezos, John Harrison: Longitude, Joi Ito, Khan Academy, Kickstarter, Mark Zuckerberg, microbiome, move 37, Nate Silver, Network effects, neurotypical, Oculus Rift, off-the-grid, One Laptop per Child (OLPC), PalmPilot, pattern recognition, peer-to-peer, pirate software, power law, pre–internet, prisoner's dilemma, Productivity paradox, quantum cryptography, race to the bottom, RAND corporation, random walk, Ray Kurzweil, Ronald Coase, Ross Ulbricht, Satoshi Nakamoto, self-driving car, SETI@home, side project, Silicon Valley, Silicon Valley startup, Simon Singh, Singularitarianism, Skype, slashdot, smart contracts, Steve Ballmer, Steve Jobs, Steven Levy, Stewart Brand, Stuxnet, supply-chain management, synthetic biology, technological singularity, technoutopianism, TED Talk, The Nature of the Firm, the scientific method, The Signal and the Noise by Nate Silver, the strength of weak ties, There's no reason for any individual to have a computer in his home - Ken Olsen, Thomas Kuhn: the structure of scientific revolutions, Two Sigma, universal basic income, unpaid internship, uranium enrichment, urban planning, warehouse automation, warehouse robotics, Wayback Machine, WikiLeaks, Yochai Benkler

It started on November 1, 2008, when someone calling himself Satoshi Nakamoto posted “Bitcoin: A Peer-to-Peer Electronic Cash System” to a cryptography mailing list.20 In his introduction, he wrote, “I’ve been working on a new electronic cash system that’s fully peer-to-peer, with no trusted third party.… The main properties: Double-spending is prevented with a peer-to-peer network. No mint or other trusted parties. Participants can be anonymous. New coins are made from Hashcash style proof-of-work. The proof-of-work for new coin generation also powers the network to prevent double-spending.” Unless you’re a cryptographer, much of that may fly well over your head. So let’s bring it down to ground level.


pages: 273 words: 72,024

Bitcoin for the Befuddled by Conrad Barski

Airbnb, AltaVista, altcoin, bitcoin, blockchain, buttonwood tree, cryptocurrency, Debian, en.wikipedia.org, Ethereum, ethereum blockchain, fiat currency, Isaac Newton, MITM: man-in-the-middle, money: store of value / unit of account / medium of exchange, Network effects, node package manager, p-value, peer-to-peer, price discovery process, QR code, radical decentralization, Satoshi Nakamoto, self-driving car, SETI@home, software as a service, the payments system, Yogi Berra

In this decentralized model, a software application finds other “like-minded” peer applications on the Internet and connects with these peers to operate the application. Early applications that used this approach include BitTorrent (for movie downloading) and Gnutella (for music discovery/downloading). Bitcoin also uses a peer-to-peer network in its design. Peer-to-peer systems have many advantages over traditional client-server systems, including improved durability and performance. Because of these advantages, it is likely that these systems will become increasingly ubiquitous. One benefit of using peer-to-peer systems over traditional architectures is their indestructibility: As long as a peer-to-peer app user can find other peers to connect to, the network will continue to exist, and it can do so without any central point of failure.


pages: 290 words: 72,046

5 Day Weekend: Freedom to Make Your Life and Work Rich With Purpose by Nik Halik, Garrett B. Gunderson

Airbnb, bitcoin, Buckminster Fuller, business process, clean water, collaborative consumption, cryptocurrency, delayed gratification, diversified portfolio, do what you love, drop ship, en.wikipedia.org, estate planning, Ethereum, fear of failure, fiat currency, financial independence, gamification, glass ceiling, Grace Hopper, Home mortgage interest deduction, independent contractor, initial coin offering, Isaac Newton, Kaizen: continuous improvement, litecoin, low interest rates, Lyft, market fundamentalism, microcredit, minimum viable product, mortgage debt, mortgage tax deduction, multilevel marketing, Nelson Mandela, passive income, peer-to-peer, peer-to-peer rental, planned obsolescence, Ponzi scheme, quantitative easing, Ralph Waldo Emerson, ride hailing / ride sharing, selling pickaxes during a gold rush, sharing economy, side project, Skype, solopreneur, subscription business, TaskRabbit, TED Talk, traveling salesman, uber lyft

DogVacay DogVacay connects dog owners with hosts who will take care of their dogs while they are away. Love dogs? Become a host and earn some money doing something you love. Spinlister Spinlister allows you to rent things such as bikes, surfboards, canoes, or snowboards to or from neighbors. Lending Club Lending Club is a peer-to-peer network for lending and borrowing cash. It’s cheaper than credit cards for borrowers and provides better interest rates than savings accounts for investors. Online Opportunities There’s no shortage of people promoting ways to make money online. Much of it is garbage, some of it is legitimate.


pages: 243 words: 76,686

How to Do Nothing by Jenny Odell

Airbnb, Anthropocene, augmented reality, back-to-the-land, Big Tech, Burning Man, collective bargaining, congestion pricing, context collapse, death from overwork, Donald Trump, Filter Bubble, full employment, gentrification, gig economy, Google Earth, Ian Bogost, Internet Archive, James Bridle, Jane Jacobs, Jaron Lanier, Kickstarter, late capitalism, Mark Zuckerberg, market fundamentalism, means of production, Minecraft, Patri Friedman, peer-to-peer, Peter Thiel, Plato's cave, Port of Oakland, Results Only Work Environment, Rosa Parks, Salesforce, Sand Hill Road, Silicon Valley, Silicon Valley startup, Skinner box, Snapchat, source of truth, Steve Jobs, strikebreaker, techno-determinism, technoutopianism, union organizing, white flight, Works Progress Administration

As Oliver Leistert puts it in “The Revolution Will Not Be Liked,” for social media companies, “the public sphere is an historically elapsed phase from the twentieth century they now exploit for their own interests by simulating it.”16 * * * — WRITING IN THE ATLANTIC about a nascent decentralized network called Scuttlebutt, Ian Bogost gives us an image for this absurd situation: “Facebook and Twitter are only like water coolers if there were one, giant, global water cooler for all workplaces everywhere.”17 Dissatisfaction with this standard-issue water cooler has fueled the movement toward a decentralized web, which instead of private companies and servers makes use of peer-to-peer networks and open-source software. The goal is not only for users to own their own data, but to shift that data and software closer to their end points of use. Mastodon, for example, is a federated social network of “instances,” each using free software on a community-run server whose users can nonetheless communicate with those in other instances.


Raw Data Is an Oxymoron by Lisa Gitelman

23andMe, collateralized debt obligation, computer age, continuous integration, crowdsourcing, disruptive innovation, Drosophila, Edmond Halley, Filter Bubble, Firefox, fixed income, folksonomy, Google Earth, Howard Rheingold, index card, informal economy, information security, Isaac Newton, Johann Wolfgang von Goethe, knowledge worker, Large Hadron Collider, liberal capitalism, lifelogging, longitudinal study, Louis Daguerre, Menlo Park, off-the-grid, optical character recognition, Panopticon Jeremy Bentham, peer-to-peer, RFID, Richard Thaler, Silicon Valley, social graph, software studies, statistical model, Stephen Hawking, Steven Pinker, text mining, time value of money, trade route, Turing machine, urban renewal, Vannevar Bush, WikiLeaks

Combating or otherwise responding to a control system dependent on computing power requires the design of a counter-system, a rather modest example of which is Diaspora, an open-source, privacy-aware, distributed do-it-yourself social network that eliminates the hub of a social media conglomerate in favor of a peer-to-peer network in which each individual is a node.53 Without a hub or central server, data encrypted with GNU Privacy Guard is sent directly to one’s friends rather than stored and hence mined. True peer-to-peer communication—that is, that which is not routed through a central hub—would need to move to a network such as Diaspora because the controlled application programming interface (API) of social networks such as Facebook means that Dataveillance and Countervailance hacking a hub-based network in order to convert it to peer-to-peer is difficult if not impossible.


pages: 269 words: 79,285

Silk Road by Eileen Ormsby

4chan, bitcoin, blockchain, Brian Krebs, corporate governance, cryptocurrency, disinformation, drug harm reduction, Edward Snowden, fiat currency, Firefox, incognito mode, Julian Assange, litecoin, Mark Zuckerberg, Network effects, off-the-grid, operational security, peer-to-peer, Ponzi scheme, power law, profit motive, Right to Buy, Ross Ulbricht, Satoshi Nakamoto, stealth mode startup, Ted Nelson, trade route, Turing test, web application, WikiLeaks

Their morale regarding fighting SR and BC is very low at the moment, mainly because very few LEO have the capacity to comprehend how the whole system works, but unfortunately, recent media coverage demands some kind of action, so they are going to have to show the public they are doing something to combat SR, they just aren’t sure what yet. The report was an extensive critique of and response to Silk Road, well researched and referenced. It described anonymity and encryption, darknets, PGP, Tor and peer-to-peer technologies. It explained what hidden services were and listed those that could be found on the Hidden Wiki at the time. It discussed the security features and vulnerabilities of Tor, illustrating these with the story of Anonymous’ takedown of Lolita City. The report concluded that the main vulnerability of Tor and the hidden services was not the technology, but the user.


pages: 721 words: 197,134

Data Mining: Concepts, Models, Methods, and Algorithms by Mehmed Kantardzić

Albert Einstein, algorithmic bias, backpropagation, bioinformatics, business cycle, business intelligence, business process, butter production in bangladesh, combinatorial explosion, computer vision, conceptual framework, correlation coefficient, correlation does not imply causation, data acquisition, discrete time, El Camino Real, fault tolerance, finite state, Gini coefficient, information retrieval, Internet Archive, inventory management, iterative process, knowledge worker, linked data, loose coupling, Menlo Park, natural language processing, Netflix Prize, NP-complete, PageRank, pattern recognition, peer-to-peer, phenotype, random walk, RFID, semantic web, speech recognition, statistical model, Telecommunications Act of 1996, telemarketer, text mining, traveling salesman, web application

Intelligent Machines http://www.damienfrancois.be/blog/ This blog is dedicated to artificial intelligence and machine learning, and focuses on applications in business, science and every-day life. 10. Mininglabs http://www.mininglabs.com/ This blog is established by a group of French independent researchers in the field of data mining, analyzing and data visualization. They are mostly interested in analyzing data coming from the internet at large (Web, peer-to-peer networks). 11. Machine Learning (Theory) http://hunch.net/ A blog dedicated to the various aspects of machine learning theory and applications. A.4 DATA SETS This section describes a number of freely available data sets ready for use in data-mining algorithms. We selected a few examples for students who are starting to learn data mining and they would like to practice traditional data-mining tasks.

Trunfio, Service-Oriented Middleware for Distributed Data Mining on the Grid, Journal of Parallel and Distributed Computing, Vol. 68, No. 1, 2008, pp. 3–15. Copp, C., Data Mining and Knowledge Discovery Techniques, Defence Today, NCW 101, 2008, http://www.ausairpower.net/NCW-101-17.pdf. Datta, S., K. Bhaduri, C. Giannella, R. Wolff, H. Kargupta, Distributed Data Mining in Peer-to-Peer Networks, IEEE Internet Computing, Vol. 10, No. 4, 2006, pp. 18–26. Ester, M., H.-P. Kriegel, J. Sander, Spatial Data Mining: A Database Approach, Proceedings of 5th International Symposium on Advances in Spatial Databases, 1997, pp. 47–66. Faloutsos, C., Mining Time Series Data, Tutorial ICML 2003, Washington, DC, August 2003.


pages: 677 words: 206,548

Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It by Marc Goodman

23andMe, 3D printing, active measures, additive manufacturing, Affordable Care Act / Obamacare, Airbnb, airport security, Albert Einstein, algorithmic trading, Alvin Toffler, Apollo 11, Apollo 13, artificial general intelligence, Asilomar, Asilomar Conference on Recombinant DNA, augmented reality, autonomous vehicles, Baxter: Rethink Robotics, Bill Joy: nanobots, bitcoin, Black Swan, blockchain, borderless world, Boston Dynamics, Brian Krebs, business process, butterfly effect, call centre, Charles Lindbergh, Chelsea Manning, Citizen Lab, cloud computing, Cody Wilson, cognitive dissonance, computer vision, connected car, corporate governance, crowdsourcing, cryptocurrency, data acquisition, data is the new oil, data science, Dean Kamen, deep learning, DeepMind, digital rights, disinformation, disintermediation, Dogecoin, don't be evil, double helix, Downton Abbey, driverless car, drone strike, Edward Snowden, Elon Musk, Erik Brynjolfsson, Evgeny Morozov, Filter Bubble, Firefox, Flash crash, Free Software Foundation, future of work, game design, gamification, global pandemic, Google Chrome, Google Earth, Google Glasses, Gordon Gekko, Hacker News, high net worth, High speed trading, hive mind, Howard Rheingold, hypertext link, illegal immigration, impulse control, industrial robot, information security, Intergovernmental Panel on Climate Change (IPCC), Internet of things, Jaron Lanier, Jeff Bezos, job automation, John Harrison: Longitude, John Markoff, Joi Ito, Jony Ive, Julian Assange, Kevin Kelly, Khan Academy, Kickstarter, Kiva Systems, knowledge worker, Kuwabatake Sanjuro: assassination market, Large Hadron Collider, Larry Ellison, Laura Poitras, Law of Accelerating Returns, Lean Startup, license plate recognition, lifelogging, litecoin, low earth orbit, M-Pesa, machine translation, Mark Zuckerberg, Marshall McLuhan, Menlo Park, Metcalfe’s law, MITM: man-in-the-middle, mobile money, more computing power than Apollo, move fast and break things, Nate Silver, national security letter, natural language processing, Nick Bostrom, obamacare, Occupy movement, Oculus Rift, off grid, off-the-grid, offshore financial centre, operational security, optical character recognition, Parag Khanna, pattern recognition, peer-to-peer, personalized medicine, Peter H. Diamandis: Planetary Resources, Peter Thiel, pre–internet, printed gun, RAND corporation, ransomware, Ray Kurzweil, Recombinant DNA, refrigerator car, RFID, ride hailing / ride sharing, Rodney Brooks, Ross Ulbricht, Russell Brand, Salesforce, Satoshi Nakamoto, Second Machine Age, security theater, self-driving car, shareholder value, Sheryl Sandberg, Silicon Valley, Silicon Valley startup, SimCity, Skype, smart cities, smart grid, smart meter, Snapchat, social graph, SoftBank, software as a service, speech recognition, stealth mode startup, Stephen Hawking, Steve Jobs, Steve Wozniak, strong AI, Stuxnet, subscription business, supply-chain management, synthetic biology, tech worker, technological singularity, TED Talk, telepresence, telepresence robot, Tesla Model S, The future is already here, The Future of Employment, the long tail, The Wisdom of Crowds, Tim Cook: Apple, trade route, uranium enrichment, Virgin Galactic, Wall-E, warehouse robotics, Watson beat the top human players on Jeopardy!, Wave and Pay, We are Anonymous. We are Legion, web application, Westphalian system, WikiLeaks, Y Combinator, you are the product, zero day

As a result, the plans and defensive security features of the military helicopter that shuttles the president from the White House to Air Force One leaked to P2P music-sharing networks around the world, including those in Iran. For the want of free music, a billion-dollar military project was compromised, and the blueprints for the president’s Sikorsky VH-3D helicopter ended up on a peer-to-peer network in Iran, hosted next to the pirated songs of both Michael Jackson and Shadmehr Aghili, the undisputed king of Persian pop. The former military contractor, interrogated by both the FBI and the Department of Defense, admitted his error, but by then the damage had been one. Our global interconnections and never-ending storage of more and more data mean leaks are inevitable.

Download Download software only from official sites (such as Apple’s App Store or directly from a company’s own verified Web site). Be highly skeptical of unofficial app stores and third-party sites hosting “free” software. In addition, avoid pirated media and software widely available on peer-to-peer networks, which frequently contain malware and viruses. Settings in both the Windows and the Mac operating systems can help you “white list” so that only approved software from identified vendors is allowed to run on your machine. While doing so will not guarantee software safety, it can greatly reduce the risk of infection.


pages: 411 words: 80,925

What's Mine Is Yours: How Collaborative Consumption Is Changing the Way We Live by Rachel Botsman, Roo Rogers

"World Economic Forum" Davos, Abraham Maslow, Airbnb, Apollo 13, barriers to entry, behavioural economics, Bernie Madoff, bike sharing, Buckminster Fuller, business logic, buy and hold, carbon footprint, Cass Sunstein, collaborative consumption, collaborative economy, commoditize, Community Supported Agriculture, credit crunch, crowdsourcing, dematerialisation, disintermediation, en.wikipedia.org, experimental economics, Ford Model T, Garrett Hardin, George Akerlof, global village, hedonic treadmill, Hugh Fearnley-Whittingstall, information retrieval, intentional community, iterative process, Kevin Kelly, Kickstarter, late fees, Mark Zuckerberg, market design, Menlo Park, Network effects, new economy, new new economy, out of africa, Paradox of Choice, Parkinson's law, peer-to-peer, peer-to-peer lending, peer-to-peer rental, planned obsolescence, Ponzi scheme, pre–internet, public intellectual, recommendation engine, RFID, Richard Stallman, ride hailing / ride sharing, Robert Shiller, Ronald Coase, Search for Extraterrestrial Intelligence, SETI@home, Simon Kuznets, Skype, slashdot, smart grid, South of Market, San Francisco, Stewart Brand, systems thinking, TED Talk, the long tail, The Nature of the Firm, The Spirit Level, the strength of weak ties, The Theory of the Leisure Class by Thorstein Veblen, The Wealth of Nations by Adam Smith, The Wisdom of Crowds, Thorstein Veblen, Torches of Freedom, Tragedy of the Commons, transaction costs, traveling salesman, ultimatum game, Victor Gruen, web of trust, women in the workforce, work culture , Yochai Benkler, Zipcar

Chesky later realized that his parents grew up in the hotel generation, whereas his grandfather and his friends would stay on farms and in little houses during their travels. Airbnb is not very different from that experience. “We are not the modern invention, hotels are.” Indeed, prior to the 1950s, staying with friends or friends of friends was a common way to travel. Airbnb is an old idea, being replicated and made relevant again through peer-to-peer networks and new technologies. There is now an unbounded marketplace for efficient peer-to-peer exchanges between producer and consumer, seller and buyer, lender and borrower, and neighbor and neighbor. Online exchanges mimic the close ties once formed through face-to-face exchanges in villages, but on a much larger and unconfined scale.


pages: 247 words: 81,135

The Great Fragmentation: And Why the Future of All Business Is Small by Steve Sammartino

3D printing, additive manufacturing, Airbnb, augmented reality, barriers to entry, behavioural economics, Bill Gates: Altair 8800, bitcoin, BRICs, Buckminster Fuller, citizen journalism, collaborative consumption, cryptocurrency, data science, David Heinemeier Hansson, deep learning, disruptive innovation, driverless car, Dunbar number, Elon Musk, fiat currency, Frederick Winslow Taylor, game design, gamification, Google X / Alphabet X, haute couture, helicopter parent, hype cycle, illegal immigration, index fund, Jeff Bezos, jimmy wales, Kickstarter, knowledge economy, Law of Accelerating Returns, lifelogging, market design, Mary Meeker, Metcalfe's law, Minecraft, minimum viable product, Network effects, new economy, peer-to-peer, planned obsolescence, post scarcity, prediction markets, pre–internet, profit motive, race to the bottom, random walk, Ray Kurzweil, recommendation engine, remote working, RFID, Rubik’s Cube, scientific management, self-driving car, sharing economy, side project, Silicon Valley, Silicon Valley startup, skunkworks, Skype, social graph, social web, software is eating the world, Steve Jobs, subscription business, survivorship bias, The Home Computer Revolution, the long tail, too big to fail, US Airways Flight 1549, vertical integration, web application, zero-sum game

Step forward crypto currencies such as bitcoin, which are the next evolution in how we trade. Bitcoin Bitcoin was the first fully implemented and distributed crypto currency. It works in much the same way as other emerging crypto currencies. Crypto currencies are simply decentralised electronic cash systems. The ‘money’ is created by using peer-to-peer networking, digital signatures and cryptography to generate a currency. Bitcoins are mined out of a digital network by computers plugged into a system trying to figure out a 64-digit code that unlocks 50 bitcoins at a time. The money, or bitcoins, is generally traded within the system by using specific peer-to-peer software.


pages: 282 words: 85,658

Ask Your Developer: How to Harness the Power of Software Developers and Win in the 21st Century by Jeff Lawson

Airbnb, AltaVista, Amazon Web Services, barriers to entry, big data - Walmart - Pop Tarts, Big Tech, big-box store, bitcoin, business process, call centre, Chuck Templeton: OpenTable:, cloud computing, coronavirus, COVID-19, create, read, update, delete, cryptocurrency, data science, David Heinemeier Hansson, deep learning, DevOps, Elon Musk, financial independence, global pandemic, global supply chain, Hacker News, Internet of things, Jeff Bezos, Kanban, Lean Startup, loose coupling, Lyft, Marc Andreessen, Marc Benioff, Mark Zuckerberg, microservices, minimum viable product, Mitch Kapor, move fast and break things, Paul Graham, peer-to-peer, ride hailing / ride sharing, risk tolerance, Ruby on Rails, Salesforce, side project, Silicon Valley, Silicon Valley startup, Skype, social distancing, software as a service, software is eating the world, sorting algorithm, Startup school, Steve Ballmer, Steve Jobs, Telecommunications Act of 1996, Toyota Production System, transaction costs, transfer pricing, two-pizza team, Uber and Lyft, uber lyft, ubercab, web application, Y Combinator

All of my entrepreneurial energy could then focus on the thing that matters the most: the customer, and what problem I could solve for them. There were a bunch of ideas floating in my head. One was for a new way of doing computer backups. Another idea would help people stream video from far parts of the globe via peer-to-peer networking. I had to decide what idea to pursue next, and talking to prospective customers was the way I made the decision. When you pitch a new product idea to potential customers, one of two things happens, especially when they’re an acquaintance. If they genuinely like the idea and it seems to solve a pain point in their life, they ask you questions.


pages: 270 words: 79,992

The End of Big: How the Internet Makes David the New Goliath by Nicco Mele

4chan, A Declaration of the Independence of Cyberspace, Airbnb, Amazon Web Services, Andy Carvin, Any sufficiently advanced technology is indistinguishable from magic, Apple's 1984 Super Bowl advert, barriers to entry, Berlin Wall, big-box store, bitcoin, bread and circuses, business climate, call centre, Cass Sunstein, centralized clearinghouse, Chelsea Manning, citizen journalism, cloud computing, collaborative consumption, collaborative editing, commoditize, Computer Lib, creative destruction, crony capitalism, cross-subsidies, crowdsourcing, David Brooks, death of newspapers, disruptive innovation, Donald Trump, Douglas Engelbart, Douglas Engelbart, en.wikipedia.org, Evgeny Morozov, Exxon Valdez, Fall of the Berlin Wall, Filter Bubble, Firefox, global supply chain, Google Chrome, Gordon Gekko, Hacker Ethic, Ian Bogost, Jaron Lanier, Jeff Bezos, jimmy wales, John Markoff, John Perry Barlow, Julian Assange, Kevin Kelly, Khan Academy, Kickstarter, Lean Startup, lolcat, machine readable, Mark Zuckerberg, military-industrial complex, minimum viable product, Mitch Kapor, Mohammed Bouazizi, Mother of all demos, Narrative Science, new economy, Occupy movement, off-the-grid, old-boy network, One Laptop per Child (OLPC), peer-to-peer, period drama, Peter Thiel, pirate software, public intellectual, publication bias, Robert Metcalfe, Ronald Reagan, Ronald Reagan: Tear down this wall, satellite internet, Seymour Hersh, sharing economy, Silicon Valley, Skype, social web, Steve Jobs, Steve Wozniak, Stewart Brand, Stuxnet, Ted Nelson, Ted Sorensen, Telecommunications Act of 1996, telemarketer, the Cathedral and the Bazaar, the long tail, The Wisdom of Crowds, transaction costs, uranium enrichment, Whole Earth Catalog, WikiLeaks, Zipcar

You can drive your car to the commuter rail station, and, thirty minutes after you park it, someone else picks it up to commute to work, sharing the car by preset agreement. Money is under assault from more directions than just barter. A host of alternative currencies are blossoming on the Internet, and one in particular—an open-source project called Bitcoin—appears to be gaining steam. Bitcoin uses peer-to-peer technology to operate with no central authority, allowing anyone to send “money” (the Bitcoin currency) to anyone, anywhere, at any time, and beyond the reach of governments. Bitcoin enlists participants in the community to manage transactions and issue money; the network, rather than a central bank, collectively creates the money.


pages: 285 words: 86,853

What Algorithms Want: Imagination in the Age of Computing by Ed Finn

Airbnb, Albert Einstein, algorithmic bias, algorithmic management, algorithmic trading, AlphaGo, Amazon Mechanical Turk, Amazon Web Services, bitcoin, blockchain, business logic, Charles Babbage, Chuck Templeton: OpenTable:, Claude Shannon: information theory, commoditize, Computing Machinery and Intelligence, Credit Default Swap, crowdsourcing, cryptocurrency, data science, DeepMind, disruptive innovation, Donald Knuth, Donald Shoup, Douglas Engelbart, Douglas Engelbart, Elon Musk, Evgeny Morozov, factory automation, fiat currency, Filter Bubble, Flash crash, game design, gamification, Google Glasses, Google X / Alphabet X, Hacker Conference 1984, High speed trading, hiring and firing, Ian Bogost, industrial research laboratory, invisible hand, Isaac Newton, iterative process, Jaron Lanier, Jeff Bezos, job automation, John Conway, John Markoff, Just-in-time delivery, Kickstarter, Kiva Systems, late fees, lifelogging, Loebner Prize, lolcat, Lyft, machine readable, Mother of all demos, Nate Silver, natural language processing, Neal Stephenson, Netflix Prize, new economy, Nicholas Carr, Nick Bostrom, Norbert Wiener, PageRank, peer-to-peer, Peter Thiel, power law, Ray Kurzweil, recommendation engine, Republic of Letters, ride hailing / ride sharing, Satoshi Nakamoto, self-driving car, sharing economy, Silicon Valley, Silicon Valley billionaire, Silicon Valley ideology, Silicon Valley startup, SimCity, Skinner box, Snow Crash, social graph, software studies, speech recognition, statistical model, Steve Jobs, Steven Levy, Stewart Brand, supply-chain management, tacit knowledge, TaskRabbit, technological singularity, technological solutionism, technoutopianism, the Cathedral and the Bazaar, The Coming Technological Singularity, the scientific method, The Signal and the Noise by Nate Silver, The Structural Transformation of the Public Sphere, The Wealth of Nations by Adam Smith, transaction costs, traveling salesman, Turing machine, Turing test, Uber and Lyft, Uber for X, uber lyft, urban planning, Vannevar Bush, Vernor Vinge, wage slave

The entire Bitcoin marketplace is an open book, from the darkest recesses of terrorism financing to booking hotel rooms, purchasing virtual goods from Zynga, and ordering marijuana from the infamous digital marketplace Silk Road.25 But how does this actually work? Since the Bitcoin network has no central authority, anyone completing a transaction announces it through a peer-to-peer network. The decentralized nature of the system is meant to account for the problem that information may flow unevenly across the network, that some nodes may suddenly appear or disappear, and for the intentional design constraint of abolishing the central bank or switching station to correlate and sequence all financial activity.


Refuge: Transforming a Broken Refugee System by Alexander Betts, Paul Collier

Alvin Roth, anti-communist, centre right, charter city, corporate social responsibility, Donald Trump, failed state, Filter Bubble, global supply chain, informal economy, it's over 9,000, Kibera, mass immigration, megacity, middle-income trap, mobile money, Mohammed Bouazizi, mutually assured destruction, open borders, Peace of Westphalia, peer-to-peer, race to the bottom, randomized controlled trial, rising living standards, risk/return, school choice, special economic zone, structural adjustment programs, tail risk, trade route, urban planning, zero-sum game

The internet in particular offers the chance to create footloose and highly mobile livelihoods. Value chains can be disaggregated in ways that allow people in one part of the world to contribute on the basis of their particular comparative advantage. New financing opportunities, including crowdfunding, peer-to-peer networks, and mobile money, may offer ways in which even remote communities can be connected to the global economy. Business – from multinational corporations to small and medium-sized enterprises to social enterprise – is engaging with refugee issues more than it has in the past.20 There is every reason to believe that a development toolbox should offer even greater prospects than was the case even two decades ago.


Industry 4.0: The Industrial Internet of Things by Alasdair Gilchrist

3D printing, additive manufacturing, air gap, AlphaGo, Amazon Web Services, augmented reality, autonomous vehicles, barriers to entry, business intelligence, business logic, business process, chief data officer, cloud computing, connected car, cyber-physical system, data science, deep learning, DeepMind, deindustrialization, DevOps, digital twin, fault tolerance, fulfillment center, global value chain, Google Glasses, hiring and firing, industrial robot, inflight wifi, Infrastructure as a Service, Internet of things, inventory management, job automation, low cost airline, low skilled workers, microservices, millennium bug, OSI model, pattern recognition, peer-to-peer, platform as a service, pre–internet, race to the bottom, RFID, Salesforce, Skype, smart cities, smart grid, smart meter, smart transportation, software as a service, stealth mode startup, supply-chain management, The future is already here, trade route, undersea cable, vertical integration, warehouse robotics, web application, WebRTC, Y2K

For 915MHz (North America), there are 10 channels available and the standard supports a maximum data rate of 40Kbps, while at 868MHz (Europe), there is only one channel and this can support data transfer at up to 20Kbps. ZigBee supports three network topologies—the star, mesh, and cluster tree or hybrid networks. The star network is commonly used, as it is the simplest to deploy. However, the mesh or peer-to-peer network configurations enable high degrees of reliability to be obtained. Messages may be routed across the network using the different stations as relays. There is usually a choice of routes that can be used and this makes the network very robust. If interference is present on one section of a network, another section can be used instead.


Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems by Martin Kleppmann

active measures, Amazon Web Services, billion-dollar mistake, bitcoin, blockchain, business intelligence, business logic, business process, c2.com, cloud computing, collaborative editing, commoditize, conceptual framework, cryptocurrency, data science, database schema, deep learning, DevOps, distributed ledger, Donald Knuth, Edward Snowden, end-to-end encryption, Ethereum, ethereum blockchain, exponential backoff, fake news, fault tolerance, finite state, Flash crash, Free Software Foundation, full text search, functional programming, general-purpose programming language, Hacker News, informal economy, information retrieval, Internet of things, iterative process, John von Neumann, Ken Thompson, Kubernetes, Large Hadron Collider, level 1 cache, loose coupling, machine readable, machine translation, Marc Andreessen, microservices, natural language processing, Network effects, no silver bullet, operational security, packet switching, peer-to-peer, performance metric, place-making, premature optimization, recommendation engine, Richard Feynman, self-driving car, semantic web, Shoshana Zuboff, social graph, social web, software as a service, software is eating the world, sorting algorithm, source of truth, SPARQL, speech recognition, SQL injection, statistical model, surveillance capitalism, systematic bias, systems thinking, Tragedy of the Commons, undersea cable, web application, WebSocket, wikimedia commons

., an aircraft crashing and killing everyone on board, or a rocket colliding with the International Space Station), flight control systems must tolerate Byzan‐ tine faults [81, 82]. • In a system with multiple participating organizations, some participants may attempt to cheat or defraud others. In such circumstances, it is not safe for a node to simply trust another node’s messages, since they may be sent with mali‐ cious intent. For example, peer-to-peer networks like Bitcoin and other block‐ chains can be considered to be a way of getting mutually untrusting parties to agree whether a transaction happened or not, without relying on a central authority [83]. However, in the kinds of systems we discuss in this book, we can usually safely assume that there are no Byzantine faults.

This is why input validation, sani‐ tization, and output escaping are so important: to prevent SQL injection and crosssite scripting, for example. However, we typically don’t use Byzantine fault-tolerant protocols here, but simply make the server the authority on deciding what client behavior is and isn’t allowed. In peer-to-peer networks, where there is no such cen‐ tral authority, Byzantine fault tolerance is more relevant. A bug in the software could be regarded as a Byzantine fault, but if you deploy the same software to all nodes, then a Byzantine fault-tolerant algorithm cannot save you. Most Byzantine fault-tolerant algorithms require a supermajority of more than twothirds of the nodes to be functioning correctly (i.e., if you have four nodes, at most one may malfunction).


pages: 1,237 words: 227,370

Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems by Martin Kleppmann

active measures, Amazon Web Services, billion-dollar mistake, bitcoin, blockchain, business intelligence, business logic, business process, c2.com, cloud computing, collaborative editing, commoditize, conceptual framework, cryptocurrency, data science, database schema, deep learning, DevOps, distributed ledger, Donald Knuth, Edward Snowden, end-to-end encryption, Ethereum, ethereum blockchain, exponential backoff, fake news, fault tolerance, finite state, Flash crash, Free Software Foundation, full text search, functional programming, general-purpose programming language, Hacker News, informal economy, information retrieval, Infrastructure as a Service, Internet of things, iterative process, John von Neumann, Ken Thompson, Kubernetes, Large Hadron Collider, level 1 cache, loose coupling, machine readable, machine translation, Marc Andreessen, microservices, natural language processing, Network effects, no silver bullet, operational security, packet switching, peer-to-peer, performance metric, place-making, premature optimization, recommendation engine, Richard Feynman, self-driving car, semantic web, Shoshana Zuboff, social graph, social web, software as a service, software is eating the world, sorting algorithm, source of truth, SPARQL, speech recognition, SQL injection, statistical model, surveillance capitalism, systematic bias, systems thinking, Tragedy of the Commons, undersea cable, web application, WebSocket, wikimedia commons

., an aircraft crashing and killing everyone on board, or a rocket colliding with the International Space Station), flight control systems must tolerate Byzantine faults [81, 82]. In a system with multiple participating organizations, some participants may attempt to cheat or defraud others. In such circumstances, it is not safe for a node to simply trust another node’s messages, since they may be sent with malicious intent. For example, peer-to-peer networks like Bitcoin and other blockchains can be considered to be a way of getting mutually untrusting parties to agree whether a transaction happened or not, without relying on a central authority [83]. However, in the kinds of systems we discuss in this book, we can usually safely assume that there are no Byzantine faults.

This is why input validation, sanitization, and output escaping are so important: to prevent SQL injection and cross-site scripting, for example. However, we typically don’t use Byzantine fault-tolerant protocols here, but simply make the server the authority on deciding what client behavior is and isn’t allowed. In peer-to-peer networks, where there is no such central authority, Byzantine fault tolerance is more relevant. A bug in the software could be regarded as a Byzantine fault, but if you deploy the same software to all nodes, then a Byzantine fault-tolerant algorithm cannot save you. Most Byzantine fault-tolerant algorithms require a supermajority of more than two-thirds of the nodes to be functioning correctly (i.e., if you have four nodes, at most one may malfunction).


Alpha Girls: The Women Upstarts Who Took on Silicon Valley's Male Culture and Made the Deals of a Lifetime by Julian Guthrie

"Susan Fowler" uber, "World Economic Forum" Davos, Airbnb, Alan Greenspan, Andy Rubin, Apollo 11, Apple II, barriers to entry, Bear Stearns, Benchmark Capital, blockchain, Bob Noyce, call centre, cloud computing, credit crunch, deal flow, disruptive innovation, Elon Musk, equal pay for equal work, Fairchild Semiconductor, fear of failure, game design, Gary Kildall, glass ceiling, hiring and firing, information security, Jeff Bezos, Larry Ellison, Louis Pasteur, Lyft, Marc Benioff, Mark Zuckerberg, Menlo Park, Mitch Kapor, new economy, PageRank, peer-to-peer, pets.com, phenotype, place-making, private spaceflight, retail therapy, ROLM, Ronald Reagan, Rosa Parks, Salesforce, Sand Hill Road, Sheryl Sandberg, Silicon Valley, Silicon Valley startup, Skype, Snapchat, software as a service, South of Market, San Francisco, stealth mode startup, Steve Jobs, Steve Jurvetson, Steve Wozniak, Susan Wojcicki, TaskRabbit, Teledyne, Tim Cook: Apple, Timothy McVeigh, Travis Kalanick, uber lyft, unpaid internship, upwardly mobile, urban decay, UUNET, web application, William Shockley: the traitorous eight, women in the workforce

Part of Golden’s job was to evaluate the risks with every deal: What were the risks within the team? Were there technology risks? Were there competitive risks? Were there unique intellectual property risks? “This company has every one of those risks—and more,” Golden told Theresia and Efrusy. Golden had discovered that the core peer-to-peer technology behind Skype was licensed via a company that Zennström and Friis partially controlled. This meant that Skype could not entirely control its own destiny and potentially created conflicts of interest. For Skype not to own or fully control its core intellectual property at this stage was highly unusual for this kind of investment.


pages: 374 words: 97,288

The End of Ownership: Personal Property in the Digital Economy by Aaron Perzanowski, Jason Schultz

3D printing, Airbnb, anti-communist, barriers to entry, behavioural economics, bitcoin, blockchain, carbon footprint, cloud computing, conceptual framework, crowdsourcing, cryptocurrency, Donald Trump, Eben Moglen, Edward Snowden, en.wikipedia.org, endowment effect, Firefox, Free Software Foundation, general purpose technology, gentrification, George Akerlof, Hush-A-Phone, independent contractor, information asymmetry, intangible asset, Internet Archive, Internet of things, Isaac Newton, it's over 9,000, loss aversion, Marc Andreessen, means of production, minimum wage unemployment, new economy, Open Library, Paradox of Choice, peer-to-peer, price discrimination, Richard Thaler, ride hailing / ride sharing, rolodex, self-driving car, sharing economy, Silicon Valley, software as a service, software patent, software studies, speech recognition, Steve Jobs, subscription business, telemarketer, the long tail, The Market for Lemons, Tony Fadell, transaction costs, winner-take-all economy

In the 1990s, this small-scale arms race began to heat up as copying and storing large numbers of software titles became easier because of vast improvements in storage capacity and disk speeds. Coupled with the increasing ease of data transmission over the newly popular Internet and the introduction of peer-to-peer networks like Napster, designed for sharing files with a global community, the perceived need for DRM increased dramatically. Soon copyright holders, who now included Hollywood and the music industry in addition to software makers, invested more and more resources in the hopes of finding a technological fix to the problem of unauthorized copying.


pages: 260 words: 40,943

Hacking Exposed: Network Security Secrets and Solutions by Stuart McClure, Joel Scambray, George Kurtz

AltaVista, bash_history, Dennis Ritchie, end-to-end encryption, information security, Ken Thompson, Larry Wall, MITM: man-in-the-middle, Morris worm, Multics, peer-to-peer, remote working, systems thinking, web application

This information was POSTed to a Perl CGI script that invoked Dan’s custom Java classes to share out the specified folder and to create the listening port linked to it on the client side. Showing his sense of humor, Dan promoted the Napster-like features of this technique to allow users to share files via the peer-to-peer network created by millions of users sharing out their drives over HTTP. In all seriousness, though, this problem should not be downplayed simply because it only allows read access to data. Dan’s exploit is quite generous, allowing users to specify what directory they wish to share. Malicious applets could work much more stealthily, exposing anyone who uses Netscape to possible disclosure of sensitive information.


RDF Database Systems: Triples Storage and SPARQL Query Processing by Olivier Cure, Guillaume Blin

Amazon Web Services, bioinformatics, business intelligence, cloud computing, database schema, fault tolerance, folksonomy, full text search, functional programming, information retrieval, Internet Archive, Internet of things, linked data, machine readable, NP-complete, peer-to-peer, performance metric, power law, random walk, recommendation engine, RFID, semantic web, Silicon Valley, social intelligence, software as a service, SPARQL, sparse data, web application

., Naeve, A., Nilsson, M., Palmer, M., Risch, T., 2002. Edutella: a P2P networking infrastructure based on RDF. WWW, pp. 604–615. Nejdl, W., Wolpers, M., Siberski, W., Schmitz, C., Schlosser, M., Brunkhorst, I., Löser, A., 2003. Super-­ peer-based routing and clustering strategies for RDF-based peer-to-peer networks. In: Proceedings of the 12th International Conference on World Wide Web. ACM Press, New York, pp. 536–543. Neumann, T., Weikum, G., 2008. RDF-3X: a RISC-style engine for RDF. Proceedings of VLDB ­Endowment 1 (1), 647–659. Neumann, T., Weikum, G., 2009. Scalable join processing on very large RDF graphs.


Beautiful Visualization by Julie Steele

barriers to entry, correlation does not imply causation, data acquisition, data science, database schema, Drosophila, en.wikipedia.org, epigenetics, global pandemic, Hans Rosling, index card, information retrieval, iterative process, linked data, Mercator projection, meta-analysis, natural language processing, Netflix Prize, no-fly zone, pattern recognition, peer-to-peer, performance metric, power law, QR code, recommendation engine, semantic web, social bookmarking, social distancing, social graph, sorting algorithm, Steve Jobs, the long tail, web application, wikimedia commons, Yochai Benkler

Far too many applications simply borrow the worst of PowerPoint, flying data points across the screen with no clear purpose; elements sweep and grow and rotate through meaningless spaces, and generally only cause confusion. I have had several occasions to build animated visualizations. In 2000, I worked with fellow grad students building GnuTellaVision, which visualized the growing Gnutella peer-to-peer network. Since then, I have been involved in a variety of projects that have shed light on animated visualization: for example, I worked on a project that explored animated scatterplots, and I was a close bystander on the DynaVis project, which looked at transitions between different visualizations.


pages: 407 words: 103,501

The Digital Divide: Arguments for and Against Facebook, Google, Texting, and the Age of Social Netwo Rking by Mark Bauerlein

Alvin Toffler, Amazon Mechanical Turk, Andrew Keen, business cycle, centre right, citizen journalism, collaborative editing, computer age, computer vision, corporate governance, crowdsourcing, David Brooks, digital divide, disintermediation, folksonomy, Frederick Winslow Taylor, Future Shock, Hacker News, Herbert Marcuse, Howard Rheingold, invention of movable type, invention of the steam engine, invention of the telephone, Jaron Lanier, Jeff Bezos, jimmy wales, Kevin Kelly, knowledge worker, late fees, Lewis Mumford, Mark Zuckerberg, Marshall McLuhan, means of production, meta-analysis, moral panic, Network effects, new economy, Nicholas Carr, PageRank, PalmPilot, peer-to-peer, pets.com, radical decentralization, Results Only Work Environment, Saturday Night Live, scientific management, search engine result page, semantic web, Silicon Valley, slashdot, social graph, social web, software as a service, speech recognition, Steve Jobs, Stewart Brand, technology bubble, Ted Nelson, the long tail, the strength of weak ties, The Wisdom of Crowds, Thorstein Veblen, web application, Yochai Benkler

Likewise, as headlines panicked investors about the failure of broadband, the massive communities built on IRC chat channels and other early live networking platforms were finding new, more advanced avenues for social and intellectual exchange. For-profit streaming media companies like Icebox may have failed, but the streaming technologies they used have survived and flourished as social tools such as iVisit and NetMeeting. And while the client lists of business-to-business service companies have shrunk, peer-to-peer networks, from Napster to Hotline, still grow in popularity and resist all efforts to quell the massive exchange of data, illegal or not. In fact, the average American home now has more information and broadcast resources than a major television network newsroom did in the ’70s. A single Apple laptop is a video production studio, allowing even for the complex editing of independent films.


The Pirate's Dilemma by Matt Mason

Albert Einstein, augmented reality, barriers to entry, blood diamond, citizen journalism, creative destruction, digital divide, don't be evil, Donald Trump, Douglas Engelbart, East Village, Firefox, Free Software Foundation, future of work, glass ceiling, global village, Hacker Ethic, haute couture, Howard Rheingold, Internet of things, invisible hand, Isaac Newton, jimmy wales, job satisfaction, John Markoff, John Perry Barlow, Joseph Schumpeter, Kickstarter, Lao Tzu, Marshall McLuhan, means of production, Naomi Klein, new economy, New Urbanism, patent troll, peer-to-peer, prisoner's dilemma, public intellectual, RAND corporation, RFID, Richard Florida, Richard Stallman, SETI@home, side hustle, Silicon Valley, South China Sea, Stephen Hawking, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, the long tail, Tim Cook: Apple, urban sprawl, Whole Earth Catalog

It’s April 2003, and you, along with Madonna fans worldwide, hit KaZaA to download some tracks from her latest album, American Life. Instead, you get spoof MP3 files: the material girl verbally bitch-slapping 68 We Invented the Remix | 69 the file-sharing community. It’s her and Warner Bros.’ latest bid to thwart Internet piracy by fighting fire with fire, acting like a pirate herself. Madonna flooded peer-to-peer networks with digital decoys that appeared to be tracks from the new album but were actually recordings of her cursing and snarling at would-be illegal downloaders everywhere. Intended as another genius publicity stunt by one of the smartest women in music, this turned out to be one of the biggest blunders of her career, right up there with Evita, Sean Penn, and Shanghai Surprise.


pages: 340 words: 101,675

A New History of the Future in 100 Objects: A Fiction by Adrian Hon

Adrian Hon, air gap, Anthropocene, augmented reality, blockchain, bounce rate, call centre, carbon credits, carbon tax, Cepheid variable, charter city, Clayton Christensen, clean water, cognitive dissonance, congestion charging, creative destruction, CRISPR, crowdsourcing, cryptocurrency, deepfake, defense in depth, discrete time, disinformation, disintermediation, driverless car, drone strike, food desert, game design, gamification, gravity well, hive mind, hydroponic farming, impulse control, income inequality, job automation, Kickstarter, Kim Stanley Robinson, knowledge worker, life extension, lifelogging, low earth orbit, machine translation, MITM: man-in-the-middle, moral panic, Neal Stephenson, no-fly zone, off grid, offshore financial centre, oil shale / tar sands, orbital mechanics / astrodynamics, peak oil, peer-to-peer, phenotype, planned obsolescence, post scarcity, precariat, precautionary principle, prediction markets, rewilding, Silicon Valley, skeuomorphism, Skype, smart contracts, social graph, South Sea Bubble, speech recognition, stem cell, Stewart Brand, synthetic biology, technoutopianism, telepresence, transfer pricing, tulip mania, Turing test, urban sprawl, Vernor Vinge, VTOL, working-age population

There was a group there helping calm things down, restoring order, distributing supplies, getting electricity back up. And you could see that they were all wearing these chunky earloops made for the emergency services—long-life, practically indestructible hardware, capable of setting up ad hoc long-distance peer-to-peer networks. They let people coordinate. These people weren’t experts. They were volunteers. It was inspiring. First in Banda Aceh and then across the world, people began to recognize the earloops and trust their wearers to do the right thing—intervening in riots, carrying the sick and wounded, guarding essential medical supplies.


pages: 903 words: 235,753

The Stack: On Software and Sovereignty by Benjamin H. Bratton

1960s counterculture, 3D printing, 4chan, Ada Lovelace, Adam Curtis, additive manufacturing, airport security, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, algorithmic trading, Amazon Mechanical Turk, Amazon Robotics, Amazon Web Services, Andy Rubin, Anthropocene, augmented reality, autonomous vehicles, basic income, Benevolent Dictator For Life (BDFL), Berlin Wall, bioinformatics, Biosphere 2, bitcoin, blockchain, Buckminster Fuller, Burning Man, call centre, capitalist realism, carbon credits, carbon footprint, carbon tax, carbon-based life, Cass Sunstein, Celebration, Florida, Charles Babbage, charter city, clean water, cloud computing, company town, congestion pricing, connected car, Conway's law, corporate governance, crowdsourcing, cryptocurrency, dark matter, David Graeber, deglobalization, dematerialisation, digital capitalism, digital divide, disintermediation, distributed generation, don't be evil, Douglas Engelbart, Douglas Engelbart, driverless car, Edward Snowden, Elon Musk, en.wikipedia.org, Eratosthenes, Ethereum, ethereum blockchain, Evgeny Morozov, facts on the ground, Flash crash, Frank Gehry, Frederick Winslow Taylor, fulfillment center, functional programming, future of work, Georg Cantor, gig economy, global supply chain, Google Earth, Google Glasses, Guggenheim Bilbao, High speed trading, high-speed rail, Hyperloop, Ian Bogost, illegal immigration, industrial robot, information retrieval, Intergovernmental Panel on Climate Change (IPCC), intermodal, Internet of things, invisible hand, Jacob Appelbaum, James Bridle, Jaron Lanier, Joan Didion, John Markoff, John Perry Barlow, Joi Ito, Jony Ive, Julian Assange, Khan Academy, Kim Stanley Robinson, Kiva Systems, Laura Poitras, liberal capitalism, lifelogging, linked data, lolcat, Mark Zuckerberg, market fundamentalism, Marshall McLuhan, Masdar, McMansion, means of production, megacity, megaproject, megastructure, Menlo Park, Minecraft, MITM: man-in-the-middle, Monroe Doctrine, Neal Stephenson, Network effects, new economy, Nick Bostrom, ocean acidification, off-the-grid, offshore financial centre, oil shale / tar sands, Oklahoma City bombing, OSI model, packet switching, PageRank, pattern recognition, peak oil, peer-to-peer, performance metric, personalized medicine, Peter Eisenman, Peter Thiel, phenotype, Philip Mirowski, Pierre-Simon Laplace, place-making, planetary scale, pneumatic tube, post-Fordism, precautionary principle, RAND corporation, recommendation engine, reserve currency, rewilding, RFID, Robert Bork, Sand Hill Road, scientific management, self-driving car, semantic web, sharing economy, Silicon Valley, Silicon Valley ideology, skeuomorphism, Slavoj Žižek, smart cities, smart grid, smart meter, Snow Crash, social graph, software studies, South China Sea, sovereign wealth fund, special economic zone, spectrum auction, Startup school, statistical arbitrage, Steve Jobs, Steven Levy, Stewart Brand, Stuxnet, Superbowl ad, supply-chain management, supply-chain management software, synthetic biology, TaskRabbit, technological determinism, TED Talk, the built environment, The Chicago School, the long tail, the scientific method, Torches of Freedom, transaction costs, Turing complete, Turing machine, Turing test, undersea cable, universal basic income, urban planning, Vernor Vinge, vertical integration, warehouse automation, warehouse robotics, Washington Consensus, web application, Westphalian system, WikiLeaks, working poor, Y Combinator, yottabyte

Whereas the nested hierarchies of postal addressing (e.g., name, building, street, city) refer to specific locations within a natural geography, such that the physical proximity or distance of one addressee versus another might be deduced from their addresses, Internet addressing follows no such geographic conventions, and peer-to-peer networking is all but agnostic as to the territorial origins and outcomes of packet flows. Instead, the accumulation of Internet addresses in certain areas, such as New York and Palo Alto, and the density of relations between those accumulations produce durable patterns of information communicated through the world.28 Globally our regular networks of bundled addressors and addresses wear grooves into information channels, sometimes aligning with geopolitical borders and interests and sometimes perforating them.

Manuel de la Pila housing block, 312 opinionlessness, state of, 240–241, 426n47 O’Reilly, Tim, 121 Oreskes, Naomi, 457n10 Organized Chaos, forces of, 445n37 Ouroboros energy grid, 92–96, 294–295 Outer Space Treaty, 456n7 “Outline of a Doctrine of French Policy” (Kojève), 109 “Overexposed City, The” (Virilio), 155 ownership competitive, 332 of data, 203, 285, 345–346 economics of, 282 owner-Users, 285–286, 345–346 Page, Larry, 134, 139, 281, 315 Page Mill Road, 57 “PageRank” (Franceschet), 332 PageRank algorithm, 134, 332 Pakistan-India border, 97, 309 Palace of the Soviets, 181 Palantir, 121, 287, 360, 459n20 Palestine, 120 Panopticon effect, 363 paper envelope, 46 parametricism, 160–161, 162–163 parastates, 446n39 Parker, Sean, 126 Parnet, Clare, 393n50 Parsons, Talcott, 385n25 partition in architecture, 391n30 Patriot Act, US, 120, 363 peer-to-peer networking, 206, 215 Peirce, Charles Sanders, 211, 223 Perec, Georges, 75 persona design, 254, 255 personality, 277–278 personal mapping technologies, 86, 236, 243, 431n70 personal mobility systems. See cars: driverless personal rapid transit (PRT) systems, 282 personhood, 173–175, 271, 439n65 persuasive interfaces, 224, 430n65 pervasive computing, 113, 172, 301–302 petroglyphs, 309 phone-car interface, 280 physicalization of abstraction, 29, 33 physical-to-virtual binary opposition, 19 Pinochet, Augusto, 59, 385n25 piracy, 380n15 pirate radio, 244–245 placebo interfaces, 224 placefulness, 16, 29, 155 place-making, 84, 149–150, 310 planetary computational economy, 92 planetary data infrastructure, 267 planetary photography, 150, 300, 354 planetary-scale computation architecture, 5, 197 assignment claimed by, 122 cartographic imperative of, 191 client-side versus server-side critique, 356–357 climactic impact of, 92–93, 96 design and, 192, 356 divides crossed, 27–28 ecological governance convergence, 98 economic geography, effect on, 199 elements of, 5 emergence of, 3, 13, 55 energy footprint, 82–83, 92–96, 106–107, 113, 140–141, 258–260, 303–304 forms taken, 4–5 future of, 351, 356 Google's occupation of, 34–40 governance and, 27 jurisdictions, 357 limits to growth, 93–94 at microlevel of the object, 191–192 neoliberalism and, 21 physical world, relation to, 358 political geography and, 6, 11 real project of, 404n11 space of, 34–40, 303 technologies’ alignment into, 4–5 urban design for, 160 Planetary Skin Institute, 88–90, 92, 97–98, 106, 180, 336, 392n42, 452n67 planetary supersurfaces, 188–189 planetary visualization, 452n69 Planet of the Apes, 182 planetology, comparative, 300–302, 333, 353, 360 plan of action, 43, 342 platform architecture, ideal, 49–50 platform-as-state, 7–8, 42, 48–50, 120–123, 140, 295, 315–316, 319, 327, 335, 341 platform-based robotics, 138–139 platform cities, 183–189 platform design, 44, 48, 51 platform economics network value, 159 platform surplus value, 48, 137, 159, 309, 374 User platform value, 309, 375–376 User surplus, 48 value versus price, indexing of, 336 platforms accidents of, 51 authority, 57 autonomy, 136, 282, 339 centralization versus decentralization, 48 characteristics of, 47–51, 214 City layer, designs for, 177 competition between, 50 component standardization, 47–48 control-decontrol paradox in, 46 decision-making, 44, 341–342 defined, 42, 328, 374, 383n4 diagrams ensnaring actors in, 44 economically sustainable, 48 etymology, 43 exchange value, 51 functions of, 19, 41, 119, 328, 342 future of, 117, 141–145, 244, 295, 315–316 genealogy of, 42 generic universality, 49 geography, 110–112 governing, 109, 119, 143 identity, 42 information mediated, 46 institutional forms, 44 introduction, 41–46 logic, 19, 44, 314 mechanics, 44–51 model-to-real correlation, 387n33 network effects, 48 neutrality, 44 origins, 46 overview of, 41–46 physicality and tactility of, 129–130 platform of platforms, 332–333 platform-within-a-platform principle, 284 plots in, 44 as remedy and poison, 5, 133 robotics, shift to, 362 service infrastructures, 116 as stacks, 7–8, 42–43 standardization, 44–46 theory, 41, 47 wars, 110, 123–125, 295 platform sovereignty activist stance on, 312 architectural surface interfaciality in, 166–167 City layer infrastructures role in, 151–153 constitutional violence of, 155 deciding exceptions in, 21 decision-making, 32–33, 44 defined, 374 derivation of, 37 design, 87–88 emergence of, 33, 152 grid programmability providing, 38 guarantees, 151 of nonhuman User, 273 overview of, 51 paradoxes of, 37 principle of, 36 productive accidents of, 37 reversibility, 22, 152–153 states, 339 urban envelopes, 159, 258 platform surplus value, 38, 48, 137, 159, 309, 374 platform totalities, 297 plot, 43–44 Plug-In City (Archigram), 179 pluralism, 302–303 polis, segmentation of, 241 political, the, 6, 30, 379n10 political agency, 173–175, 250, 258 political-geographic order, 26, 56 political identity of the User, 260, 347 political machine, stack as, 55–58 political philosophy, 20 political rights of the User, 285 political subjectivity, 21, 136, 152, 258, 260, 268 political technology, territory as, 335 political theology, 105, 236, 243, 297, 426n46 politico-theological geographies, 242, 248, 320–322 politics agonistic logics of, 180, 247 architectural, 166–167 interfacial, 244–246 of Internet of Things, 204 norms of, 39 Schmittian, spatial dimension of, 381n24 of ubiquitous computing, 203 “Politics of the Envelope, The” (Zaera-Polo), 166 Pontecorvo, Gillo, 244 poor doors, 311 pop futurist media, 432n71 Popper, Karl, 459n19 popular ecology movement, 86 Portzamparc, Christian de, 311 postage stamps, 194 postal identity, 193–196, 206 postal system, 132, 153–154, 195 post-Anthropocenic geopolitics, 285 post-Anthropocenic User, 264 Postel, John, 319 post-Fordism, 231 posthumanism, 275 post-human User, 285, 287–288 “Postscript on Societies of Control” (Deleuze), 157–158 Pourparlers (Deleuze), 147 Pouzin, Louis, 41 poverty ending, 303, 443n23 interiority/exteriority of, 311–312 politics of, 312, 444n30 of working poor, 331 power architecture symbolizing, 325 cultural legitimacy of exercise of, 424n41 of extralegal violence, 317 monopolizing, 308–309 shifts in, 233, 312–313 power-knowledge asymmetries, 454n75 power of brand, 128, 130 “Powers of Ten” (Eames and Eames), 52 power tools, 438n59 preagricultural societies, 149 presence, 205 Price, Cedric, 179, 201 Princeton Radio Project, 254 Prism, 9, 121, 320 privacy axiomatization of individual, 409n42 biopolitics of, 159, 360 cost of, 136, 285, 445n37 expectations of, 346 meta-metadata recursivity for, 287 right to, 270, 285 sacralization through encryption, 347 privacy markets, 285, 445n37 private human User, dissolution of, 289 private versus public space, 159 production labor.


pages: 385 words: 111,113

Augmented: Life in the Smart Lane by Brett King

23andMe, 3D printing, additive manufacturing, Affordable Care Act / Obamacare, agricultural Revolution, Airbnb, Albert Einstein, Amazon Web Services, Any sufficiently advanced technology is indistinguishable from magic, Apollo 11, Apollo Guidance Computer, Apple II, artificial general intelligence, asset allocation, augmented reality, autonomous vehicles, barriers to entry, bitcoin, Bletchley Park, blockchain, Boston Dynamics, business intelligence, business process, call centre, chief data officer, Chris Urmson, Clayton Christensen, clean water, Computing Machinery and Intelligence, congestion charging, CRISPR, crowdsourcing, cryptocurrency, data science, deep learning, DeepMind, deskilling, different worldview, disruptive innovation, distributed generation, distributed ledger, double helix, drone strike, electricity market, Elon Musk, Erik Brynjolfsson, Fellow of the Royal Society, fiat currency, financial exclusion, Flash crash, Flynn Effect, Ford Model T, future of work, gamification, Geoffrey Hinton, gig economy, gigafactory, Google Glasses, Google X / Alphabet X, Hans Lippershey, high-speed rail, Hyperloop, income inequality, industrial robot, information asymmetry, Internet of things, invention of movable type, invention of the printing press, invention of the telephone, invention of the wheel, James Dyson, Jeff Bezos, job automation, job-hopping, John Markoff, John von Neumann, Kevin Kelly, Kickstarter, Kim Stanley Robinson, Kiva Systems, Kodak vs Instagram, Leonard Kleinrock, lifelogging, low earth orbit, low skilled workers, Lyft, M-Pesa, Mark Zuckerberg, Marshall McLuhan, megacity, Metcalfe’s law, Minecraft, mobile money, money market fund, more computing power than Apollo, Neal Stephenson, Neil Armstrong, Network effects, new economy, Nick Bostrom, obamacare, Occupy movement, Oculus Rift, off grid, off-the-grid, packet switching, pattern recognition, peer-to-peer, Ray Kurzweil, retail therapy, RFID, ride hailing / ride sharing, Robert Metcalfe, Salesforce, Satoshi Nakamoto, Second Machine Age, selective serotonin reuptake inhibitor (SSRI), self-driving car, sharing economy, Shoshana Zuboff, Silicon Valley, Silicon Valley startup, Skype, smart cities, smart grid, smart transportation, Snapchat, Snow Crash, social graph, software as a service, speech recognition, statistical model, stem cell, Stephen Hawking, Steve Jobs, Steve Wozniak, strong AI, synthetic biology, systems thinking, TaskRabbit, technological singularity, TED Talk, telemarketer, telepresence, telepresence robot, Tesla Model S, The future is already here, The Future of Employment, Tim Cook: Apple, trade route, Travis Kalanick, TSMC, Turing complete, Turing test, Twitter Arab Spring, uber lyft, undersea cable, urban sprawl, V2 rocket, warehouse automation, warehouse robotics, Watson beat the top human players on Jeopardy!, white picket fence, WikiLeaks, yottabyte

You may choose to store your key, or keys if you have multiple addresses, in a number of places including a paper printout, a metal coin, a hard drive or via an online service. Some have even tattooed their Bitcoin wallet address on their person. The banking system of 2025 will need to work more like an IP, or peer-to-peer, network than the current centralised banking networks that we have today; and the blockchain is a better, future-proof example of that. We are moving to a world where smart devices can have a value store or multiple value stores and can act as agents transacting on our behalf or on behalf of a group of people.


pages: 406 words: 105,602

The Startup Way: Making Entrepreneurship a Fundamental Discipline of Every Enterprise by Eric Ries

activist fund / activist shareholder / activist investor, Affordable Care Act / Obamacare, Airbnb, AOL-Time Warner, autonomous vehicles, barriers to entry, basic income, Ben Horowitz, billion-dollar mistake, Black-Scholes formula, Blitzscaling, call centre, centralized clearinghouse, Clayton Christensen, cognitive dissonance, connected car, corporate governance, DevOps, Elon Musk, en.wikipedia.org, fault tolerance, financial engineering, Frederick Winslow Taylor, global supply chain, Great Leap Forward, hockey-stick growth, index card, Jeff Bezos, Kickstarter, Lean Startup, loss aversion, machine readable, Marc Andreessen, Mark Zuckerberg, means of production, minimum viable product, moral hazard, move fast and break things, obamacare, PalmPilot, peer-to-peer, place-making, rent-seeking, Richard Florida, Sam Altman, Sand Hill Road, scientific management, secular stagnation, shareholder value, Sheryl Sandberg, Silicon Valley, Silicon Valley startup, six sigma, skunkworks, Steve Jobs, TechCrunch disrupt, the scientific method, time value of money, Toyota Production System, two-pizza team, Uber for X, universal basic income, web of trust, Y Combinator

To get there, they’ve assembled an amazing team of creative, technical, and business professionals from around the world. They love building products and creating experiences that benefit individuals, organizations, and society. Corporate Entrepreneur Community: corpentcom.com The Corporate Entrepreneur Community (CEC) is a peer-to-peer network of large enterprises sharing best practices and challenges to drive real entrepreneurial growth. The CEC facilitates the development of entrepreneurial skills through a vetted community of innovation leaders at distinguished organizations. APPENDIX 2: A CATALOG OF MVPs MVP METHODS at INTUIT For a downloadable PDF including examples for each MVP method, visit thestartupway.com/​bonus.


pages: 364 words: 99,897

The Industries of the Future by Alec Ross

"World Economic Forum" Davos, 23andMe, 3D printing, Airbnb, Alan Greenspan, algorithmic bias, algorithmic trading, AltaVista, Anne Wojcicki, autonomous vehicles, banking crisis, barriers to entry, Bernie Madoff, bioinformatics, bitcoin, Black Lives Matter, blockchain, Boston Dynamics, Brian Krebs, British Empire, business intelligence, call centre, carbon footprint, clean tech, cloud computing, collaborative consumption, connected car, corporate governance, Credit Default Swap, cryptocurrency, data science, David Brooks, DeepMind, Demis Hassabis, disintermediation, Dissolution of the Soviet Union, distributed ledger, driverless car, Edward Glaeser, Edward Snowden, en.wikipedia.org, Erik Brynjolfsson, Evgeny Morozov, fiat currency, future of work, General Motors Futurama, global supply chain, Google X / Alphabet X, Gregor Mendel, industrial robot, information security, Internet of things, invention of the printing press, Jaron Lanier, Jeff Bezos, job automation, John Markoff, Joi Ito, Kevin Roose, Kickstarter, knowledge economy, knowledge worker, lifelogging, litecoin, low interest rates, M-Pesa, machine translation, Marc Andreessen, Mark Zuckerberg, Max Levchin, Mikhail Gorbachev, military-industrial complex, mobile money, money: store of value / unit of account / medium of exchange, Nelson Mandela, new economy, off-the-grid, offshore financial centre, open economy, Parag Khanna, paypal mafia, peer-to-peer, peer-to-peer lending, personalized medicine, Peter Thiel, precision agriculture, pre–internet, RAND corporation, Ray Kurzweil, recommendation engine, ride hailing / ride sharing, Rubik’s Cube, Satoshi Nakamoto, selective serotonin reuptake inhibitor (SSRI), self-driving car, sharing economy, Silicon Valley, Silicon Valley startup, Skype, smart cities, social graph, software as a service, special economic zone, supply-chain management, supply-chain management software, technoutopianism, TED Talk, The Future of Employment, Travis Kalanick, underbanked, unit 8200, Vernor Vinge, Watson beat the top human players on Jeopardy!, women in the workforce, work culture , Y Combinator, young professional

From the start, e-commerce has grappled with the question of trust—first in getting users to trust that online companies like Amazon would safely fulfill their credit card purchases, then in getting users to trust one another without ever meeting or talking to or seeing one another. When it comes to coded trust, eBay offered the first major breakthrough. eBay was created in 1995, shortly after the birth of the commercial Internet, to be an online marketplace based on trust. It is a peer-to-peer network where buyers and sellers engage in commerce directly, exchanging money for goods between themselves. eBay makes its money by taking a commission fee on each transaction, and each of those transactions will occur only if buyer and seller are confident of a good outcome. According to eBay founder Pierre Omidyar, people on eBay “learned how to trust a complete stranger. eBay’s business is based on enabling someone to do business with another person, and to do that, they first have to develop some measure of trust, either in the other person or the system.”


pages: 388 words: 106,138

The Song Machine: Inside the Hit Factory by John Seabrook

AOL-Time Warner, barriers to entry, financial independence, game design, peer-to-peer, Ponzi scheme, Russell Brand, Saturday Night Live, Steve Jobs, technoutopianism, the long tail, trade route

He told his lead engineer, Ludvig Strigeus, a brilliant programmer he had worked with before, “I don’t accept anything that isn’t below two hundred milliseconds.” Strigeus responded, “It can’t be done. The Internet isn’t built like that.” “You have to figure it out,” Ek insisted. The solution involved designing a streaming protocol that worked faster than the standard one, as well as building their own peer-to-peer network, a decentralized architecture in which all the computers on it can communicate with one another. In four months, they had a working prototype. “And I knew when we had it that it was going to be very special,” Ek says. Ek’s original idea was to launch Spotify in the United States at the same time that he launched the service in Europe.


pages: 379 words: 109,612

Is the Internet Changing the Way You Think?: The Net's Impact on Our Minds and Future by John Brockman

A Declaration of the Independence of Cyberspace, Albert Einstein, AltaVista, Amazon Mechanical Turk, Asperger Syndrome, availability heuristic, Benoit Mandelbrot, biofilm, Black Swan, bread and circuses, British Empire, conceptual framework, corporate governance, Danny Hillis, disinformation, Douglas Engelbart, Douglas Engelbart, Emanuel Derman, epigenetics, Evgeny Morozov, financial engineering, Flynn Effect, Frank Gehry, Future Shock, Google Earth, hive mind, Howard Rheingold, index card, information retrieval, Internet Archive, invention of writing, Jane Jacobs, Jaron Lanier, John Markoff, John Perry Barlow, Kevin Kelly, Large Hadron Collider, lifelogging, lone genius, loss aversion, mandelbrot fractal, Marc Andreessen, Marshall McLuhan, Menlo Park, meta-analysis, Neal Stephenson, New Journalism, Nicholas Carr, One Laptop per Child (OLPC), out of africa, Paul Samuelson, peer-to-peer, pneumatic tube, Ponzi scheme, power law, pre–internet, Project Xanadu, Richard Feynman, Rodney Brooks, Ronald Reagan, satellite internet, Schrödinger's Cat, search costs, Search for Extraterrestrial Intelligence, SETI@home, Silicon Valley, Skype, slashdot, smart grid, social distancing, social graph, social software, social web, Stephen Hawking, Steve Wozniak, Steven Pinker, Stewart Brand, synthetic biology, Ted Nelson, TED Talk, telepresence, the medium is the message, the scientific method, the strength of weak ties, The Wealth of Nations by Adam Smith, theory of mind, trade route, upwardly mobile, Vernor Vinge, Whole Earth Catalog, X Prize, Yochai Benkler

The Internet brought with it the exhilaration and abundance of a frontierless commons, along with the fractious and debilitating intensity of depersonalized disputes in electronic discussion lists. It demonstrated the possibilities of extraordinary feats of electronic generosity and altruism, with people sharing enormous quantities of information on peer-to-peer networks, and at the same time it provided early exposure to, and warnings about, the relentless narcissism of vanity blogging. It changed the ways in which the world became present to us and the ways in which we became present to the world, forever. The Internet expands the horizon of every utterance or expressive act to a potentially planetary level.


pages: 390 words: 109,519

Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media by Tarleton Gillespie

4chan, A Declaration of the Independence of Cyberspace, affirmative action, Airbnb, algorithmic bias, algorithmic management, AltaVista, Amazon Mechanical Turk, borderless world, Burning Man, complexity theory, conceptual framework, crowdsourcing, deep learning, do what you love, Donald Trump, drone strike, easy for humans, difficult for computers, Edward Snowden, eternal september, fake news, Filter Bubble, Gabriella Coleman, game design, gig economy, Google Glasses, Google Hangouts, hiring and firing, Ian Bogost, independent contractor, Internet Archive, Jean Tirole, John Gruber, Kickstarter, Mark Zuckerberg, mass immigration, Menlo Park, Minecraft, moral panic, multi-sided market, Netflix Prize, Network effects, pattern recognition, peer-to-peer, power law, real-name policy, recommendation engine, Rubik’s Cube, Salesforce, sharing economy, Silicon Valley, Skype, slashdot, Snapchat, social graph, social web, Steve Jobs, Stewart Brand, TED Talk, Telecommunications Act of 1996, two-sided market, WikiLeaks, Yochai Benkler

The Digital Millennium Copyright Act, also passed in 1996, offered ISPs and search engines protection against liability for their users’ copyright infringement as well, but this safe harbor comes with some obligations, the most notable being that intermediaries must comply with “notice and takedown” requests from copyright owners who have identified their work as being circulated through their service. In court cases that followed, peer-to-peer networks and other online services found they did not enjoy the DMCA safe harbor when they had “materially” contributed to the circulation of pirated content, when they enjoyed some financial benefit from it, or even when they had “induced” it by promoting their service as designed for piracy. See Fifer and Carter, “A Tale of Two Safe Harbors.” 36This was before innovations such as digital fingerprinting and other forms of automated content identification, techniques that now make it possible for platforms and ISPs to “know” of illicit content on their service, even in real time. 37Bankston, Sohn, and McDiarmid, “Shielding the Messengers.” 38Horwitz, “The First Amendment Meets Some New Technologies.” 39Horwitz, The Irony of Regulatory Reform; Streeter, Selling the Air. 40Balkin, “Digital Speech and Democratic Culture,” 21. 41MacKinnon et al., “Fostering Freedom Online,” 40–42. 42Lobel, “The Law of the Platform.” 43Note: the 230 definition of “interactive computer service” includes “access software provider,” which does expand the definition a bit, and there have been cases where CDA was extended to include MySpace and others.


pages: 446 words: 109,157

The Constitution of Knowledge: A Defense of Truth by Jonathan Rauch

2021 United States Capitol attack, 4chan, active measures, affirmative action, Albert Einstein, Ayatollah Khomeini, Black Lives Matter, centre right, classic study, Climategate, company town, coronavirus, COVID-19, critical race theory, deplatforming, disinformation, disintermediation, Donald Trump, experimental subject, facts on the ground, fake news, Filter Bubble, framing effect, hive mind, illegal immigration, information asymmetry, invention of movable type, Isaac Newton, jimmy wales, Jon Ronson, Louis Pasteur, market bubble, meta-analysis, microaggression, mirror neurons, Peace of Westphalia, peer-to-peer, post-truth, profit motive, QAnon, race to the bottom, RAND corporation, Russian election interference, social software, Steve Bannon, Steven Pinker, technoutopianism, TED Talk, the scientific method, The Wealth of Nations by Adam Smith, Thomas Kuhn: the structure of scientific revolutions, Tragedy of the Commons, yellow journalism, Yochai Benkler, zero-sum game

Even truth-seeking individuals who cherish rigor and accuracy are likely to go unheard amid the din. The reality-based network’s institutional nodes—its filtering and pumping stations—are what give the system its positive epistemic valence. The techno-utopians of the information revolution assumed that knowledge would spontaneously emerge from unmediated interactions across a sprawling peer-to-peer network, with predictably disappointing results. Without the places where professionals like experts and editors and peer reviewers organize conversations and compare propositions and assess competence and provide accountability—everywhere from scientific journals to Wikipedia pages—there is no marketplace of ideas; there are only cults warring and splintering and individuals running around making noise.


pages: 416 words: 106,532

Cryptoassets: The Innovative Investor's Guide to Bitcoin and Beyond: The Innovative Investor's Guide to Bitcoin and Beyond by Chris Burniske, Jack Tatar

Airbnb, Alan Greenspan, altcoin, Alvin Toffler, asset allocation, asset-backed security, autonomous vehicles, Bear Stearns, bitcoin, Bitcoin Ponzi scheme, blockchain, Blythe Masters, book value, business cycle, business process, buy and hold, capital controls, carbon tax, Carmen Reinhart, Clayton Christensen, clean water, cloud computing, collateralized debt obligation, commoditize, correlation coefficient, creative destruction, Credit Default Swap, credit default swaps / collateralized debt obligations, cryptocurrency, disintermediation, distributed ledger, diversification, diversified portfolio, Dogecoin, Donald Trump, Elon Musk, en.wikipedia.org, Ethereum, ethereum blockchain, fiat currency, financial engineering, financial innovation, fixed income, Future Shock, general purpose technology, George Gilder, Google Hangouts, high net worth, hype cycle, information security, initial coin offering, it's over 9,000, Jeff Bezos, Kenneth Rogoff, Kickstarter, Leonard Kleinrock, litecoin, low interest rates, Marc Andreessen, Mark Zuckerberg, market bubble, money market fund, money: store of value / unit of account / medium of exchange, moral hazard, Network effects, packet switching, passive investing, peer-to-peer, peer-to-peer lending, Peter Thiel, pets.com, Ponzi scheme, prediction markets, quantitative easing, quantum cryptography, RAND corporation, random walk, Renaissance Technologies, risk free rate, risk tolerance, risk-adjusted returns, Robert Shiller, Ross Ulbricht, Salesforce, Satoshi Nakamoto, seminal paper, Sharpe ratio, Silicon Valley, Simon Singh, Skype, smart contracts, social web, South Sea Bubble, Steve Jobs, transaction costs, tulip mania, Turing complete, two and twenty, Uber for X, Vanguard fund, Vitalik Buterin, WikiLeaks, Y2K

We suspect that as opposed to these reports remaining proprietary, as is currently the case with much of the research on equities and bonds, many of these reports will become open-source and widely accessible to all levels of investors in line with the ethos of cryptoassets. GET TO KNOW THE COMMUNITY AND THE DEVELOPERS After a valuation analysis is done, or at the very least current value is contemplated, the best thing the innovative investor can do is to know and understand the cryptoasset developers and surrounding community. As peer-to-peer technologies, all cryptoassets have social networks. Reddit, Twitter, and Slack groups are valuable information channels, though we hesitate to give more guidance than that as each community is different, and communication channels are always changing. Another extremely valuable and often underappreciated or unknown resource is Meetup.com groups.


pages: 426 words: 105,423

The 4-Hour Workweek: Escape 9-5, Live Anywhere, and Join the New Rich by Timothy Ferriss

Abraham Maslow, Albert Einstein, Amazon Mechanical Turk, Apollo 13, call centre, clean water, digital nomad, Donald Trump, drop ship, en.wikipedia.org, Firefox, fixed income, follow your passion, Ford Model T, fulfillment center, game design, global village, Iridium satellite, knowledge worker, language acquisition, late fees, lateral thinking, Maui Hawaii, oil shock, paper trading, Paradox of Choice, Parkinson's law, passive income, peer-to-peer, pre–internet, Ralph Waldo Emerson, remote working, risk tolerance, Ronald Reagan, side project, Silicon Valley, Silicon Valley startup, Skype, Steve Jobs, Vilfredo Pareto, wage slave, William of Occam

Buzzing with a smile and his coffee mug in hand, he ambled over to his Mac to check on personal e-mail first. There were 32 messages and all brought good news. One of his friends and business partners, also a cofounder of Limewire, had an update: Last Bamboo, their start-up poised to reinvent peer-to-peer technology, was rounding the final corners of development. It could be their billion-dollar baby, but Doug was letting the engineers run wild first. Samson Projects, one of the hottest contemporary art galleries in Boston, had compliments for Doug’s latest work and requests for expanded involvement with new exhibits as their sound curator.


pages: 398 words: 107,788

Coding Freedom: The Ethics and Aesthetics of Hacking by E. Gabriella Coleman

activist lawyer, Benjamin Mako Hill, commoditize, Computer Lib, crowdsourcing, Debian, disinformation, Donald Knuth, dumpster diving, Eben Moglen, en.wikipedia.org, financial independence, Free Software Foundation, Gabriella Coleman, ghettoisation, GnuPG, Hacker Conference 1984, Hacker Ethic, Hacker News, Herbert Marcuse, informal economy, information security, Jacob Appelbaum, Jaron Lanier, Jason Scott: textfiles.com, Jean Tirole, knowledge economy, laissez-faire capitalism, Larry Wall, Louis Pasteur, machine readable, means of production, Multics, Neal Stephenson, Paul Graham, peer-to-peer, pirate software, popular electronics, RFC: Request For Comment, Richard Stallman, rolodex, Ronald Reagan, Silicon Valley, Silicon Valley startup, slashdot, software patent, software studies, Steve Ballmer, Steven Levy, tacit knowledge, technological determinism, Ted Nelson, the Cathedral and the Bazaar, The Hackers Conference, the scientific method, The Soul of a New Machine, The Structural Transformation of the Public Sphere, web application, web of trust, Yochai Benkler

The politics of intellectual property law have over the past ten years reached a contentious point—a political debate that cannot fully or at least comfortably rely on abstractions, universal principles, or naturalized rationalities but instead must entertain more local, pragmatic stakes along with the reality of what people do, can do, or desire to do. Under threat, these principles may clamor for more attention. For example, in March 2005, on the eve of an important Supreme Court deliberation over the legality of peer-to-peer technologies, the New York Times ran an editorial stating its position on intellectual property law by way of arguments couched in a vocabulary of doom, liberal progress, and naturalization: “If their work is suddenly made ‘free,’ all of society is likely to suffer. [ … ] The founders wrote copyright protections into the Constitution because they believed that they were necessary for progress.”19 By invoking the country’s founders and tropes of progress, this message sought to reassert the naturalness of these propositions precisely when they were most under threat.


pages: 309 words: 114,984

The Digital Doctor: Hope, Hype, and Harm at the Dawn of Medicine’s Computer Age by Robert Wachter

activist fund / activist shareholder / activist investor, Affordable Care Act / Obamacare, AI winter, Airbnb, Atul Gawande, Captain Sullenberger Hudson, Checklist Manifesto, Chuck Templeton: OpenTable:, Clayton Christensen, cognitive load, collapse of Lehman Brothers, computer age, creative destruction, crowdsourcing, deep learning, deskilling, disruptive innovation, driverless car, en.wikipedia.org, Erik Brynjolfsson, everywhere but in the productivity statistics, Firefox, Frank Levy and Richard Murnane: The New Division of Labor, general purpose technology, Google Glasses, human-factors engineering, hype cycle, Ignaz Semmelweis: hand washing, Internet of things, job satisfaction, Joseph Schumpeter, Kickstarter, knowledge worker, lifelogging, Marc Benioff, medical malpractice, medical residency, Menlo Park, minimum viable product, natural language processing, Network effects, Nicholas Carr, obamacare, pattern recognition, peer-to-peer, personalized medicine, pets.com, pneumatic tube, Productivity paradox, Ralph Nader, RAND corporation, Richard Hendricks, Robert Solow, Salesforce, Second Machine Age, self-driving car, seminal paper, Silicon Valley, Silicon Valley startup, six sigma, Skype, Snapchat, software as a service, Steve Jobs, Steven Levy, TED Talk, The future is already here, the payments system, The Wisdom of Crowds, Thomas Bayes, Toyota Production System, Uber for X, US Airways Flight 1549, Watson beat the top human players on Jeopardy!, Yogi Berra

There will also be easy-to-use tools to allow patients to search for the best and least expensive hospitals and doctors—again, customized for their condition and preferences.41 The latter is important: for some patients, the surgeon’s technical skill trumps the fact that he lacks a winning personality; for others, bedside manner is more important than surgical dexterity. Just as one can refine a Yelp search by adding filters, patients will be able to filter results not just by proximity, quality, and cost, but also by personal preferences and values. Many patients will want to be educated and supported through peer-to-peer networks, and there will be many to choose from—no longer operating parallel to the traditional healthcare system, but now integrated into it. When a patient on such a network wants a peer to see part of his medical record, it will be easy to import the data from the EHR. The reverse will also be true: the patient who wants his doctor to see a portion of a peer-to-peer conversation will be able to move that into the EHR.


pages: 292 words: 85,151

Exponential Organizations: Why New Organizations Are Ten Times Better, Faster, and Cheaper Than Yours (And What to Do About It) by Salim Ismail, Yuri van Geest

23andMe, 3D printing, Airbnb, Amazon Mechanical Turk, Amazon Web Services, anti-fragile, augmented reality, autonomous vehicles, Baxter: Rethink Robotics, behavioural economics, Ben Horowitz, bike sharing, bioinformatics, bitcoin, Black Swan, blockchain, Blue Ocean Strategy, book value, Burning Man, business intelligence, business process, call centre, chief data officer, Chris Wanstrath, circular economy, Clayton Christensen, clean water, cloud computing, cognitive bias, collaborative consumption, collaborative economy, commoditize, corporate social responsibility, cross-subsidies, crowdsourcing, cryptocurrency, dark matter, data science, Dean Kamen, deep learning, DeepMind, dematerialisation, discounted cash flows, disruptive innovation, distributed ledger, driverless car, Edward Snowden, Elon Musk, en.wikipedia.org, Ethereum, ethereum blockchain, fail fast, game design, gamification, Google Glasses, Google Hangouts, Google X / Alphabet X, gravity well, hiring and firing, holacracy, Hyperloop, industrial robot, Innovator's Dilemma, intangible asset, Internet of things, Iridium satellite, Isaac Newton, Jeff Bezos, Joi Ito, Kevin Kelly, Kickstarter, knowledge worker, Kodak vs Instagram, Law of Accelerating Returns, Lean Startup, life extension, lifelogging, loose coupling, loss aversion, low earth orbit, Lyft, Marc Andreessen, Mark Zuckerberg, market design, Max Levchin, means of production, Michael Milken, minimum viable product, natural language processing, Netflix Prize, NetJets, Network effects, new economy, Oculus Rift, offshore financial centre, PageRank, pattern recognition, Paul Graham, paypal mafia, peer-to-peer, peer-to-peer model, Peter H. Diamandis: Planetary Resources, Peter Thiel, Planet Labs, prediction markets, profit motive, publish or perish, radical decentralization, Ray Kurzweil, recommendation engine, RFID, ride hailing / ride sharing, risk tolerance, Ronald Coase, Rutger Bregman, Salesforce, Second Machine Age, self-driving car, sharing economy, Silicon Valley, skunkworks, Skype, smart contracts, Snapchat, social software, software is eating the world, SpaceShipOne, speech recognition, stealth mode startup, Stephen Hawking, Steve Jobs, Steve Jurvetson, subscription business, supply-chain management, synthetic biology, TaskRabbit, TED Talk, telepresence, telepresence robot, the long tail, Tony Hsieh, transaction costs, Travis Kalanick, Tyler Cowen, Tyler Cowen: Great Stagnation, uber lyft, urban planning, Virgin Galactic, WikiLeaks, winner-take-all economy, X Prize, Y Combinator, zero-sum game

., higher than zero) is considered good, and an NPS of +50 is excellent. The NPS is largely based on a single, direct question: How likely is it that you would recommend our company/product/service to a friend or colleague? If you have a high NPS, then your sales function is free. If you are using peer-to-peer models, your service costs can also essentially be free. Using crowdsourcing and community ideation (such as Quirky or Gustin), your R&D and product development costs can also approach zero. And it doesn’t stop there. What we’re now seeing with ExOs—and this is tremendously important—is that the marginal cost of supply goes to zero.


pages: 443 words: 123,526

Glasshouse by Charles Stross

air gap, cognitive dissonance, experimental subject, gravity well, lateral thinking, loose coupling, military-industrial complex, operational security, peer-to-peer, phenotype, prisoner's dilemma, sensible shoes, theory of mind, white picket fence

Lauro had perfect manners but lost it when making love with us. Iambic-18 was a radical xenomorph, sometimes manifesting in more than one body at the same time when the fancy took it. Our children . . . Are all dead, and it is unquestionably my fault. The nature of Curious Yellow is that it propagates stealthily between A-gates, creating a peer-to-peer network that exchanges stegged instructions using people as data packets. If you have the misfortune to be infected, it installs its kernel in your netlink, and when you check into an A-gate for backup or transport—which proceeds through your netlink—CY is the first thing to hit the gate's memory buffer.


pages: 330 words: 91,805

Peers Inc: How People and Platforms Are Inventing the Collaborative Economy and Reinventing Capitalism by Robin Chase

Airbnb, Amazon Web Services, Andy Kessler, Anthropocene, Apollo 13, banking crisis, barriers to entry, basic income, Benevolent Dictator For Life (BDFL), bike sharing, bitcoin, blockchain, Burning Man, business climate, call centre, car-free, carbon tax, circular economy, cloud computing, collaborative consumption, collaborative economy, collective bargaining, commoditize, congestion charging, creative destruction, crowdsourcing, cryptocurrency, data science, deal flow, decarbonisation, different worldview, do-ocracy, don't be evil, Donald Shoup, Elon Musk, en.wikipedia.org, Ethereum, ethereum blockchain, Eyjafjallajökull, Ferguson, Missouri, Firefox, Free Software Foundation, frictionless, Gini coefficient, GPS: selective availability, high-speed rail, hive mind, income inequality, independent contractor, index fund, informal economy, Intergovernmental Panel on Climate Change (IPCC), Internet of things, Jane Jacobs, Jeff Bezos, jimmy wales, job satisfaction, Kickstarter, Kinder Surprise, language acquisition, Larry Ellison, Lean Startup, low interest rates, Lyft, machine readable, means of production, megacity, Minecraft, minimum viable product, Network effects, new economy, Oculus Rift, off-the-grid, openstreetmap, optical character recognition, pattern recognition, peer-to-peer, peer-to-peer lending, peer-to-peer model, Post-Keynesian economics, Richard Stallman, ride hailing / ride sharing, Ronald Coase, Ronald Reagan, Salesforce, Satoshi Nakamoto, Search for Extraterrestrial Intelligence, self-driving car, shareholder value, sharing economy, Silicon Valley, six sigma, Skype, smart cities, smart grid, Snapchat, sovereign wealth fund, Steve Crocker, Steve Jobs, Steven Levy, TaskRabbit, The Death and Life of Great American Cities, The Future of Employment, the long tail, The Nature of the Firm, Tragedy of the Commons, transaction costs, Turing test, turn-by-turn navigation, Uber and Lyft, uber lyft, vertical integration, Zipcar

Spotify and Pandora, however, advanced the business model yet again. Not only do I not need to buy a whole album when I only want one song, but since I can listen to any song I want at any time through a subscription service, I don’t feel the need to own music at all. Jeremiah Owyang, formerly an analyst at Forrester Research covering peer-to-peer models and how companies respond, is now founder of Crowd Companies, a brand council that offers research and strategic advice to companies seeking to become part of the collaborative economy. He has a simple four-phase circular path that explains the transition from the old industrial approach to the new one: Product → Service → Marketplace → Platform.


pages: 382 words: 120,064

Bank 3.0: Why Banking Is No Longer Somewhere You Go but Something You Do by Brett King

3D printing, Abraham Maslow, additive manufacturing, Airbus A320, Albert Einstein, Amazon Web Services, Any sufficiently advanced technology is indistinguishable from magic, Apollo 11, Apollo 13, Apollo Guidance Computer, asset-backed security, augmented reality, barriers to entry, behavioural economics, bitcoin, bounce rate, business intelligence, business process, business process outsourcing, call centre, capital controls, citizen journalism, Clayton Christensen, cloud computing, credit crunch, crowdsourcing, disintermediation, en.wikipedia.org, fixed income, George Gilder, Google Glasses, high net worth, I think there is a world market for maybe five computers, Infrastructure as a Service, invention of the printing press, Jeff Bezos, jimmy wales, Kickstarter, London Interbank Offered Rate, low interest rates, M-Pesa, Mark Zuckerberg, mass affluent, Metcalfe’s law, microcredit, mobile money, more computing power than Apollo, Northern Rock, Occupy movement, operational security, optical character recognition, peer-to-peer, performance metric, Pingit, platform as a service, QR code, QWERTY keyboard, Ray Kurzweil, recommendation engine, RFID, risk tolerance, Robert Metcalfe, self-driving car, Skype, speech recognition, stem cell, telepresence, the long tail, Tim Cook: Apple, transaction costs, underbanked, US Airways Flight 1549, web application, world market for maybe five computers

Virtual economies are becoming increasingly important, says Wharton legal studies professor Dan Hunter, adding that they could redefine the concept of work, help test economic theories and contribute to the gross domestic product. “Increasingly, these virtual economies are leading to real money trades,” notes Hunter, one of a handful of academics closely following this trend. Bitcoin is an experimental new digital currency that enables instant payments to anyone, anywhere in the world. It uses peer-to-peer technology to operate, with no central authority, managing transactions and issuing money are carried out collectively by the network. Bitcoin is also the name of the open-source software that enables the use of this innovative virtual currency. Over the past few years, the peer-to-peer currency it has created has gained a surprising foothold in the global market.


Producing Open Source Software: How to Run a Successful Free Software Project by Karl Fogel

active measures, AGPL, barriers to entry, Benjamin Mako Hill, collaborative editing, continuous integration, Contributor License Agreement, corporate governance, Debian, Donald Knuth, en.wikipedia.org, experimental subject, Firefox, Free Software Foundation, GnuPG, Hacker Ethic, Hacker News, intentional community, Internet Archive, iterative process, Kickstarter, natural language processing, off-by-one error, patent troll, peer-to-peer, pull request, revision control, Richard Stallman, selection bias, slashdot, software as a service, software patent, SpamAssassin, the Cathedral and the Bazaar, Wayback Machine, web application, zero-sum game

As a project becomes more complex, an increasing proportion of the work becomes about managing people and information flow. There is no reason not to share that burden, and sharing it does not necessarily require a top-down hierarchy either. In fact, what happens in practice tends to be more of a peer-to-peer network topology than a military-style command structure. Sometimes management roles are formalized and sometimes they happen spontaneously. In the Subversion project, we have a patch manager, a translation manager, documentation managers, issue managers (albeit unofficial), and a release manager.


pages: 474 words: 130,575

Surveillance Valley: The Rise of the Military-Digital Complex by Yasha Levine

23andMe, activist fund / activist shareholder / activist investor, Adam Curtis, Airbnb, AltaVista, Amazon Web Services, Anne Wojcicki, anti-communist, AOL-Time Warner, Apple's 1984 Super Bowl advert, bitcoin, Black Lives Matter, borderless world, Boston Dynamics, British Empire, Californian Ideology, call centre, Charles Babbage, Chelsea Manning, cloud computing, collaborative editing, colonial rule, company town, computer age, computerized markets, corporate governance, crowdsourcing, cryptocurrency, data science, digital map, disinformation, don't be evil, Donald Trump, Douglas Engelbart, Douglas Engelbart, Dr. Strangelove, drone strike, dual-use technology, Edward Snowden, El Camino Real, Electric Kool-Aid Acid Test, Elon Musk, end-to-end encryption, fake news, fault tolerance, gentrification, George Gilder, ghettoisation, global village, Google Chrome, Google Earth, Google Hangouts, Greyball, Hacker Conference 1984, Howard Zinn, hypertext link, IBM and the Holocaust, index card, Jacob Appelbaum, Jeff Bezos, jimmy wales, John Gilmore, John Markoff, John Perry Barlow, John von Neumann, Julian Assange, Kevin Kelly, Kickstarter, Laura Poitras, life extension, Lyft, machine readable, Mark Zuckerberg, market bubble, Menlo Park, military-industrial complex, Mitch Kapor, natural language processing, Neal Stephenson, Network effects, new economy, Norbert Wiener, off-the-grid, One Laptop per Child (OLPC), packet switching, PageRank, Paul Buchheit, peer-to-peer, Peter Thiel, Philip Mirowski, plutocrats, private military company, RAND corporation, Ronald Reagan, Ross Ulbricht, Satoshi Nakamoto, self-driving car, sentiment analysis, shareholder value, Sheryl Sandberg, side project, Silicon Valley, Silicon Valley startup, Skype, slashdot, Snapchat, Snow Crash, SoftBank, speech recognition, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Susan Wojcicki, Telecommunications Act of 1996, telepresence, telepresence robot, The Bell Curve by Richard Herrnstein and Charles Murray, The Hackers Conference, Tony Fadell, uber lyft, vertical integration, Whole Earth Catalog, Whole Earth Review, WikiLeaks

It had about a $2 million annual budget, a half dozen full-time employees, and a small group of dedicated volunteer coders around the world who helped develop, test, and release its product: a free cloaking app that worked on the basis of a technique called “onion routing.” Users downloaded and launched a specialized Tor Internet browser that redirected their traffic onto a parallel volunteer peer-to-peer network, bouncing it around randomly before sending it off to its final destination. This trick disconnected the origin and destination of a person’s Internet browsing stream and theoretically made it impossible for cops, spies, hackers, or anyone else monitoring Internet traffic to observe where users were coming from and where they were going.


pages: 538 words: 141,822

The Net Delusion: The Dark Side of Internet Freedom by Evgeny Morozov

"World Economic Forum" Davos, A Declaration of the Independence of Cyberspace, Alvin Toffler, Ayatollah Khomeini, Berlin Wall, borderless world, Buckminster Fuller, Californian Ideology, Cass Sunstein, citizen journalism, cloud computing, cognitive dissonance, Columbine, computer age, conceptual framework, crowdsourcing, digital divide, disinformation, Dissolution of the Soviet Union, don't be evil, Evgeny Morozov, failed state, Fall of the Berlin Wall, Francis Fukuyama: the end of history, global village, Google Earth, Herbert Marcuse, illegal immigration, invention of radio, invention of the printing press, invisible hand, John Markoff, John Perry Barlow, John von Neumann, lolcat, Marshall McLuhan, Mitch Kapor, Naomi Klein, Network effects, new economy, New Urbanism, off-the-grid, Panopticon Jeremy Bentham, peer-to-peer, pirate software, pre–internet, Productivity paradox, public intellectual, RAND corporation, Robert Solow, Ronald Reagan, Ronald Reagan: Tear down this wall, Silicon Valley, Silicon Valley startup, Sinatra Doctrine, Skype, Slavoj Žižek, social graph, Steve Jobs, Streisand effect, technological determinism, technoutopianism, TED Talk, The Wisdom of Crowds, urban planning, Washington Consensus, WikiLeaks, women in the workforce

Cut from hours of video footage that Georgian soldiers themselves had supposedly shot on their mobile phones—later confiscated by Russians—the film analyzed the war from a highly ideological position, portraying Georgians in the worst possible light imaginable. The film quickly became a viral sensation, with 2.5 million people watching it online. The success of the online campaign owes much to the zeal with which producers of the film embraced all forms of digital distribution, putting it on all important peer-to-peer networks and encouraging piracy. Putting the film on Russia.ru helped to make it visible. The film made a smooth transition to TV screen, too: On the first anniversary of the war, the film was shown on one of Russia’s national patriotic channels. And to ensure absolute media dominance, it was followed up by a book, which was well received by Russian bloggers and journalists.


pages: 452 words: 134,502

Hacking Politics: How Geeks, Progressives, the Tea Party, Gamers, Anarchists and Suits Teamed Up to Defeat SOPA and Save the Internet by David Moon, Patrick Ruffini, David Segal, Aaron Swartz, Lawrence Lessig, Cory Doctorow, Zoe Lofgren, Jamie Laurie, Ron Paul, Mike Masnick, Kim Dotcom, Tiffiniy Cheng, Alexis Ohanian, Nicole Powers, Josh Levy

4chan, Aaron Swartz, Adam Curtis, Affordable Care Act / Obamacare, Airbnb, Bernie Sanders, Big Tech, Burning Man, call centre, Cass Sunstein, Chelsea Manning, collective bargaining, creative destruction, crony capitalism, crowdsourcing, digital rights, disinformation, don't be evil, dual-use technology, facts on the ground, Firefox, Free Software Foundation, Hacker News, hive mind, hockey-stick growth, immigration reform, informal economy, jimmy wales, John Perry Barlow, Julian Assange, Kickstarter, liquidity trap, lolcat, machine readable, Mark Zuckerberg, obamacare, Occupy movement, offshore financial centre, Overton Window, peer-to-peer, plutocrats, power law, prisoner's dilemma, radical decentralization, rent-seeking, Silicon Valley, Skype, Streisand effect, technoutopianism, The future is already here, WikiLeaks, Y Combinator, Yochai Benkler

Kickstarter, a crowd-funding network, launched only a few years ago, will provide more support for creators this year than the National Endowment for the Arts. In the UK, lawmakers are just as frustrated as we are that banks are still not lending to small businesses, but the irregulatory framework has allowed FundingCircle, a peer-to-peer network of lenders and borrowers, to flourish. Lawmakers have begun encouraging their constituents not just to “shop local” and “eat local.” They are asking them to “lend local,” creating a brand new source of working capital for small businesses and an emotional and financial return for lenders. There are many other examples of networks making a difference in civil society from mapping slums in Kenya, to getting at-risk kids in New York to take better care of their health, to empowering mothers in Boston to take on gang violence.


pages: 349 words: 98,309

Hustle and Gig: Struggling and Surviving in the Sharing Economy by Alexandrea J. Ravenelle

active transport: walking or cycling, Affordable Care Act / Obamacare, air traffic controllers' union, Airbnb, Amazon Mechanical Turk, barriers to entry, basic income, Broken windows theory, call centre, Capital in the Twenty-First Century by Thomas Piketty, cashless society, Clayton Christensen, clean water, collaborative consumption, collective bargaining, company town, creative destruction, crowdsourcing, digital divide, disruptive innovation, Downton Abbey, East Village, Erik Brynjolfsson, full employment, future of work, gentrification, gig economy, Howard Zinn, income inequality, independent contractor, informal economy, job automation, John Zimmer (Lyft cofounder), low skilled workers, Lyft, minimum wage unemployment, Mitch Kapor, Network effects, new economy, New Urbanism, obamacare, Panopticon Jeremy Bentham, passive income, peer-to-peer, peer-to-peer model, performance metric, precariat, rent control, rent stabilization, ride hailing / ride sharing, Ronald Reagan, scientific management, sharing economy, side hustle, Silicon Valley, strikebreaker, TaskRabbit, TED Talk, telemarketer, the payments system, The Theory of the Leisure Class by Thorstein Veblen, Tim Cook: Apple, transaction costs, Travis Kalanick, Triangle Shirtwaist Factory, Uber and Lyft, Uber for X, uber lyft, ubercab, universal basic income, Upton Sinclair, urban planning, vertical integration, very high income, white flight, working poor, Zipcar

That type of advance planning is challenging enough for people with steady white-collar employment. But for workers who find themselves in a variety of workplaces and dealing with different “bosses” daily, such planning is nearly impossible. For TaskRabbit workers, especially, this can be a problem. Under the peer-to-peer model, workers are often hired by individuals who may not fully understand what they’re asking them to do, or who may downplay the description to avoid scaring off a potential worker. Natasha, twenty-eight, tries to weed out work that she’s uncomfortable with, but sometimes clients aren’t forthcoming with details.


pages: 444 words: 127,259

Super Pumped: The Battle for Uber by Mike Isaac

"Susan Fowler" uber, "World Economic Forum" Davos, activist fund / activist shareholder / activist investor, Airbnb, Albert Einstein, always be closing, Amazon Web Services, Andy Kessler, autonomous vehicles, Ayatollah Khomeini, barriers to entry, Bay Area Rapid Transit, Benchmark Capital, Big Tech, Burning Man, call centre, Cambridge Analytica, Chris Urmson, Chuck Templeton: OpenTable:, citizen journalism, Clayton Christensen, cloud computing, corporate governance, creative destruction, data science, Didi Chuxing, don't be evil, Donald Trump, driverless car, Elon Musk, end-to-end encryption, fake news, family office, gig economy, Google Glasses, Google X / Alphabet X, Greyball, Hacker News, high net worth, hockey-stick growth, hustle culture, impact investing, information security, Jeff Bezos, John Markoff, John Zimmer (Lyft cofounder), Kevin Roose, Kickstarter, Larry Ellison, lolcat, Lyft, Marc Andreessen, Marc Benioff, Mark Zuckerberg, Masayoshi Son, mass immigration, Menlo Park, Mitch Kapor, money market fund, moral hazard, move fast and break things, Network effects, new economy, off grid, peer-to-peer, pets.com, Richard Florida, ride hailing / ride sharing, Salesforce, Sand Hill Road, self-driving car, selling pickaxes during a gold rush, shareholder value, Shenzhen special economic zone , Sheryl Sandberg, side hustle, side project, Silicon Valley, Silicon Valley startup, skunkworks, Snapchat, SoftBank, software as a service, software is eating the world, South China Sea, South of Market, San Francisco, sovereign wealth fund, special economic zone, Steve Bannon, Steve Jobs, stock buybacks, super pumped, TaskRabbit, tech bro, tech worker, the payments system, Tim Cook: Apple, Travis Kalanick, Uber and Lyft, Uber for X, uber lyft, ubercab, union organizing, upwardly mobile, Vision Fund, WeWork, Y Combinator

Almost immediately after Scour closed its doors, Kalanick started brainstorming with Michael Todd, one of his Scour co-founders. In relatively short order, the two of them dreamed up what Kalanick called his “revenge business,” a way to get back at the RIAA and MPAA, and the other companies who sued the partners and torpedoed Scour. That company was called Red Swoosh. “We basically took our expertise in peer-to-peer technology, took those thirty-three litigants, and turned them into customers,” Kalanick said. The new idea was similar to Scour: Red Swoosh would use connected “peer” computers in a network to transfer files between systems in a more efficient way. This time, however, those files weren’t going to be illegal downloads; the media companies were going to supply the files themselves.


pages: 478 words: 149,810

We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency by Parmy Olson

4chan, Asperger Syndrome, bitcoin, call centre, Chelsea Manning, corporate governance, crowdsourcing, disinformation, Firefox, Gabriella Coleman, hive mind, it's over 9,000, Julian Assange, lolcat, Minecraft, MITM: man-in-the-middle, Occupy movement, off-the-grid, peer-to-peer, pirate software, side project, Skype, speech recognition, SQL injection, Stephen Hawking, Stuxnet, We are Anonymous. We are Legion, We are the 99%, web application, WikiLeaks, zero day

Topiary started requesting donations for LulzSec and used Twitter and Pastebin to provide the thirty-one-digit number that acted as the group’s new Bitcoin address. Anyone could anonymously donate to their anonymous account if he converted money into the Bitcoin currency and made a transfer. Bitcoin was a digital currency that used peer-to-peer networking to make anonymous payments. It became increasingly popular around the same time LulzSec started hacking. By May, the currency’s value was up by a dollar from where it had been at the start of the year, to $8.70. A few days after soliciting donations, Topiary jokingly thanked a “mysterious benefactor who sent us 0.02 BitCoins.


Active Measures by Thomas Rid

1960s counterculture, 4chan, active measures, anti-communist, back-to-the-land, Berlin Wall, Bernie Sanders, bitcoin, Black Lives Matter, call centre, Charlie Hebdo massacre, Chelsea Manning, continuation of politics by other means, cryptocurrency, cuban missile crisis, disinformation, Donald Trump, dual-use technology, East Village, Edward Snowden, en.wikipedia.org, end-to-end encryption, facts on the ground, fake news, Fall of the Berlin Wall, false flag, guest worker program, information security, Internet Archive, Jacob Appelbaum, John Markoff, Julian Assange, kremlinology, Mikhail Gorbachev, military-industrial complex, Norman Mailer, nuclear winter, operational security, peer-to-peer, Prenzlauer Berg, public intellectual, Ronald Reagan, Russian election interference, Silicon Valley, Stewart Brand, technoutopianism, We are Anonymous. We are Legion, Whole Earth Catalog, WikiLeaks, zero day

Another decade after that, Edward Snowden, the iconic intelligence leaker who likewise combined a belief in the power of encryption with far-out libertarian ideas, also appeared wrapped in the American flag on the cover of Wired. The movement’s breathless optimism expressed itself in slogans and themes: that information wanted to be free, sources open, anonymity protected, and personal secrets encrypted by default, yet government secrets could be exposed by whistle-blowers, preferably anonymously, on peer-to-peer networks. Much of this idealism was and is positive, and in many ways, activist projects have helped strengthen information security and internet freedom. And yet, at the fringes, this emerging subculture embraced a combination of radical transparency and radical anonymity, along with hacking-and-leaking, stealing-and-publishing—and thus created what had existed only temporarily before: the perfect cover for active measures, and not only thanks to the white noise of anonymous publication activity, from torrents to Twitter.


pages: 501 words: 145,943

If Mayors Ruled the World: Dysfunctional Nations, Rising Cities by Benjamin R. Barber

"World Economic Forum" Davos, Aaron Swartz, Affordable Care Act / Obamacare, American Legislative Exchange Council, Berlin Wall, bike sharing, borderless world, Boris Johnson, Bretton Woods, British Empire, car-free, carbon footprint, Cass Sunstein, Celebration, Florida, classic study, clean water, congestion pricing, corporate governance, Crossrail, crowdsourcing, David Brooks, desegregation, Detroit bankruptcy, digital divide, digital Maoism, digital rights, disinformation, disintermediation, edge city, Edward Glaeser, Edward Snowden, Etonian, Evgeny Morozov, failed state, Fall of the Berlin Wall, feminist movement, Filter Bubble, gentrification, George Gilder, ghettoisation, global pandemic, global village, Hernando de Soto, Howard Zinn, illegal immigration, In Cold Blood by Truman Capote, income inequality, informal economy, information retrieval, Jane Jacobs, Jaron Lanier, Jeff Bezos, Lewis Mumford, London Interbank Offered Rate, Mark Zuckerberg, market fundamentalism, Marshall McLuhan, Masdar, megacity, microcredit, Mikhail Gorbachev, mortgage debt, mutually assured destruction, new economy, New Urbanism, Nicholas Carr, Norman Mailer, nuclear winter, obamacare, Occupy movement, off-the-grid, Panopticon Jeremy Bentham, Peace of Westphalia, Pearl River Delta, peer-to-peer, planetary scale, plutocrats, Prenzlauer Berg, profit motive, Ralph Waldo Emerson, RFID, Richard Florida, Ronald Reagan, self-driving car, Silicon Valley, SimCity, Skype, smart cities, smart meter, Steve Jobs, Stewart Brand, technological determinism, technological solutionism, TED Talk, Telecommunications Act of 1996, The Death and Life of Great American Cities, The Fortune at the Bottom of the Pyramid, The future is already here, The Wealth of Nations by Adam Smith, Tobin tax, Tony Hsieh, trade route, UNCLOS, UNCLOS, unpaid internship, urban sprawl, Virgin Galactic, War on Poverty, zero-sum game

See Inequality Plastic grocery bag ban, 149 Plasticity, 218 Police collaboration, 107–108 Polis, 3, 14, 164 Polling, deliberative, 257, 308, 350, 390n28 Pontiac, Michigan, emergency managers, 321 Pooled sovereignty, 156 Popular sovereignty, 155 Population: of cities, 35, 55, 361n3; of slums, 178–179, 183 Portland, Oregon, bike-share program, 137 Porto Alegre, Brazil, participatory budgeting in, 304–306, 395n6 Poverty, 19–20; amelioration of, 216–224; as fact of life, 180. See also Inequality Power: of nation-states, 9–11, 147; participation vs., 5 Pragmatism: of cities, 6, 13–14, 23–24, 215; of mayors, 90–92 Prahalad, C. K., 229 Prison population racial differences, 185 Privacy International, 258 Problem solving, 13, 70–71, 90 P2P (peer-to-peer) technology, 266 Public sector jobs, 199–201 Public spaces, 44–48, 71; and culture, 273, 274–280 Public transportation inequality, 195–197 “Push” technology, 253, 257 Race and inequality, 182, 185, 186 Rama, Edi, 86 Rape in India, 181, 201, 204, 382n69 “Rebel towns,” 324 Redlining, 198 Refugee camps, 16 Regional representation, 345–347 Representation, 342–348; challenges of, 342–344; of commuters, 345; and electoral district, 346; and failure of nationality, 156; and opt-in/opt-out rights, 346; on parliament of mayors, 346–347, 352–355; of regions, 345–347; as trusteeship, 347–348 Republican class in U.S., 34–35 413 RFID tags, 243 Rio Conventions, 134 Rio de Janeiro, inequalities in transportation, 195–196 Romney, Mitt, 218, 322 Rousseau, Jean-Jacques, 7, 32–34, 161, 283, 299 Ruble, Blair, 173 Rural life.


pages: 339 words: 57,031

From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism by Fred Turner

"World Economic Forum" Davos, 1960s counterculture, A Declaration of the Independence of Cyberspace, Alan Greenspan, Alvin Toffler, Apple's 1984 Super Bowl advert, back-to-the-land, Bill Atkinson, bioinformatics, Biosphere 2, book value, Buckminster Fuller, business cycle, Californian Ideology, classic study, Claude Shannon: information theory, complexity theory, computer age, Computer Lib, conceptual framework, Danny Hillis, dematerialisation, distributed generation, Douglas Engelbart, Douglas Engelbart, Dr. Strangelove, Dynabook, Electric Kool-Aid Acid Test, Fairchild Semiconductor, Ford Model T, From Mathematics to the Technologies of Life and Death, future of work, Future Shock, game design, George Gilder, global village, Golden Gate Park, Hacker Conference 1984, Hacker Ethic, Haight Ashbury, Herbert Marcuse, Herman Kahn, hive mind, Howard Rheingold, informal economy, intentional community, invisible hand, Ivan Sutherland, Jaron Lanier, John Gilmore, John Markoff, John Perry Barlow, John von Neumann, Kevin Kelly, knowledge economy, knowledge worker, Lewis Mumford, market bubble, Marshall McLuhan, mass immigration, means of production, Menlo Park, military-industrial complex, Mitch Kapor, Mondo 2000, Mother of all demos, new economy, Norbert Wiener, peer-to-peer, post-industrial society, postindustrial economy, Productivity paradox, QWERTY keyboard, Ralph Waldo Emerson, RAND corporation, reality distortion field, Richard Stallman, Robert Shiller, Ronald Reagan, Shoshana Zuboff, Silicon Valley, Silicon Valley ideology, South of Market, San Francisco, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, systems thinking, technoutopianism, Ted Nelson, Telecommunications Act of 1996, The Hackers Conference, the strength of weak ties, theory of mind, urban renewal, Vannevar Bush, We are as Gods, Whole Earth Catalog, Whole Earth Review, Yom Kippur War

More recently, analysts of digital utopianism have dated the communitarian rhetoric surrounding the introduction of the Internet to what they have imagined to be a single, authentically revolutionary social movement that was somehow crushed or co-opted by the forces of capitalism.75 By confusing the New Left with the counterculture, and the New Communalists with both, contemporary theorists of digital media have often gone so far as to echo the utopians of the 1990s and to reimagine its peer-to-peer technologies as the rebirth in hardware [ 34 ] Chapter 1 and software of a single, “free” culture that once stood outside the mainstream and can do so again.76 A closer look at the New Left and the New Communalists, however, reveals critical differences between the two movements and suggests that neither achieved a complete break with the society it aimed to change.


pages: 611 words: 188,732

Valley of Genius: The Uncensored History of Silicon Valley (As Told by the Hackers, Founders, and Freaks Who Made It Boom) by Adam Fisher

adjacent possible, Airbnb, Albert Einstein, AltaVista, An Inconvenient Truth, Andy Rubin, AOL-Time Warner, Apple II, Apple Newton, Apple's 1984 Super Bowl advert, augmented reality, autonomous vehicles, Bill Atkinson, Bob Noyce, Brownian motion, Buckminster Fuller, Burning Man, Byte Shop, circular economy, cognitive dissonance, Colossal Cave Adventure, Computer Lib, disintermediation, Do you want to sell sugared water for the rest of your life?, don't be evil, Donald Trump, Douglas Engelbart, driverless car, dual-use technology, Dynabook, Elon Musk, Fairchild Semiconductor, fake it until you make it, fake news, frictionless, General Magic , glass ceiling, Hacker Conference 1984, Hacker Ethic, Henry Singleton, Howard Rheingold, HyperCard, hypertext link, index card, informal economy, information retrieval, Ivan Sutherland, Jaron Lanier, Jeff Bezos, Jeff Rulifson, John Markoff, John Perry Barlow, Jony Ive, Kevin Kelly, Kickstarter, knowledge worker, Larry Ellison, life extension, Marc Andreessen, Marc Benioff, Mark Zuckerberg, Marshall McLuhan, Maui Hawaii, Menlo Park, Metcalfe’s law, Mondo 2000, Mother of all demos, move fast and break things, Neal Stephenson, Network effects, new economy, nuclear winter, off-the-grid, PageRank, Paul Buchheit, paypal mafia, peer-to-peer, Peter Thiel, pets.com, pez dispenser, popular electronics, quantum entanglement, random walk, reality distortion field, risk tolerance, Robert Metcalfe, rolodex, Salesforce, self-driving car, side project, Silicon Valley, Silicon Valley startup, skeuomorphism, skunkworks, Skype, Snow Crash, social graph, social web, South of Market, San Francisco, Startup school, Steve Jobs, Steve Jurvetson, Steve Wozniak, Steven Levy, Stewart Brand, Susan Wojcicki, synthetic biology, Ted Nelson, telerobotics, The future is already here, The Hackers Conference, the long tail, the new new thing, Tim Cook: Apple, Tony Fadell, tulip mania, V2 rocket, We are as Gods, Whole Earth Catalog, Whole Earth Review, Y Combinator

Steven Johnson: At the time, the web was fundamentally a literary metaphor: “pages”—and then these hypertext links between pages. There was no concept of the user; that was not part of the metaphor at all. Mark Pincus: I mark Napster as the beginning of the social web—people, not pages. For me that was the breakthrough moment, because I saw that the internet could be this completely distributed peer-to-peer network. We could disintermediate those big media companies and all be connected to each other. Steven Johnson: To me it really started with blogging in the early 2000s. You started to have these sites that were oriented around a single person’s point of view. It suddenly became possible to imagine, Oh, maybe there’s another element here that the web could also be organized around?


pages: 834 words: 180,700

The Architecture of Open Source Applications by Amy Brown, Greg Wilson

8-hour work day, anti-pattern, bioinformatics, business logic, c2.com, cloud computing, cognitive load, collaborative editing, combinatorial explosion, computer vision, continuous integration, Conway's law, create, read, update, delete, David Heinemeier Hansson, Debian, domain-specific language, Donald Knuth, en.wikipedia.org, fault tolerance, finite state, Firefox, Free Software Foundation, friendly fire, functional programming, Guido van Rossum, Ken Thompson, linked data, load shedding, locality of reference, loose coupling, Mars Rover, MITM: man-in-the-middle, MVC pattern, One Laptop per Child (OLPC), peer-to-peer, Perl 6, premature optimization, recommendation engine, revision control, Ruby on Rails, side project, Skype, slashdot, social web, speech recognition, the scientific method, The Wisdom of Crowds, web application, WebSocket

Both of these used leased lines from the phone companies; in the US that speed was 56 Kbps. Probably the most successful network of the time, in terms of numbers of computers and people connected, was the UUCP network, which was unusual in that it had absolutely no central authority. It was, in some sense, the original peer-to-peer network, which ran over dialup phone lines: 9600 bps was about the fastest available for some time. The fastest network (at 3 Mbps) was based on the Ethernet from Xerox, which ran a protocol called XNS (Xerox Network Systems)—but it didn't work outside of a local installation. The environment of the time was rather different than what exists today.


Version Control With Git: Powerful Tools and Techniques for Collaborative Software Development by Jon Loeliger, Matthew McCullough

continuous integration, Debian, distributed revision control, GnuPG, Larry Wall, peer-to-peer, peer-to-peer model, pull request, revision control, Snow Crash, web application, web of trust

Unlike CVS, SVN committed changes atomically and had significantly better support for branches. BitKeeper and Mercurial were radical departures from all the aforementioned solutions. Each eliminated the central repository; instead, the store was distributed, providing each developer with his own shareable copy. Git is derived from this peer-to-peer model. Finally, Mercurial and Monotone contrived a hash fingerprint to uniquely identify a file’s content. The name assigned to the file is a moniker and a convenient handle for the user and nothing more. Git features this notion as well. Internally, the Git identifier is based on the file’s contents, a concept known as a content-addressable file store.


pages: 700 words: 201,953

The Social Life of Money by Nigel Dodd

"hyperreality Baudrillard"~20 OR "Baudrillard hyperreality", accounting loophole / creative accounting, bank run, banking crisis, banks create money, behavioural economics, Bernie Madoff, bitcoin, Bitcoin Ponzi scheme, blockchain, borderless world, Bretton Woods, BRICs, business cycle, capital controls, capitalist realism, cashless society, central bank independence, collapse of Lehman Brothers, collateralized debt obligation, commoditize, computer age, conceptual framework, credit crunch, cross-subsidies, currency risk, David Graeber, debt deflation, dematerialisation, disintermediation, Dogecoin, emotional labour, eurozone crisis, fiat currency, financial engineering, financial exclusion, financial innovation, Financial Instability Hypothesis, financial repression, floating exchange rates, Fractional reserve banking, gentrification, German hyperinflation, Goldman Sachs: Vampire Squid, Herbert Marcuse, Hyman Minsky, illegal immigration, informal economy, interest rate swap, Isaac Newton, John Maynard Keynes: Economic Possibilities for our Grandchildren, joint-stock company, Joseph Schumpeter, Kickstarter, Kula ring, laissez-faire capitalism, land reform, late capitalism, liberal capitalism, liquidity trap, litecoin, London Interbank Offered Rate, M-Pesa, Marshall McLuhan, means of production, mental accounting, microcredit, Minsky moment, mobile money, Modern Monetary Theory, Money creation, money market fund, money: store of value / unit of account / medium of exchange, mortgage debt, National Debt Clock, Neal Stephenson, negative equity, new economy, Nixon shock, Nixon triggered the end of the Bretton Woods system, Occupy movement, offshore financial centre, paradox of thrift, payday loans, Peace of Westphalia, peer-to-peer, peer-to-peer lending, Ponzi scheme, post scarcity, post-Fordism, Post-Keynesian economics, postnationalism / post nation state, predatory finance, price mechanism, price stability, quantitative easing, quantitative trading / quantitative finance, remote working, rent-seeking, reserve currency, Richard Thaler, risk free rate, Robert Shiller, Satoshi Nakamoto, scientific management, Scientific racism, seigniorage, Skype, Slavoj Žižek, South Sea Bubble, sovereign wealth fund, special drawing rights, The Wealth of Nations by Adam Smith, too big to fail, trade liberalization, transaction costs, Veblen good, Wave and Pay, Westphalian system, WikiLeaks, Wolfgang Streeck, yield curve, zero-coupon bond

Such arguments place a different complexion on the question of monetary sovereignty, shifting attention away from the national state (money)–global market (finance) dichotomy favored by Strange and others, toward a set of richer and more nuanced questions about how money and finance map onto diffuse configurations of economic and political agents, as well as economic forms such as peer-to-peer networks. The multitude is not a social body: it cannot be sovereign (Hardt and Negri 2005: 330). It cannot be reduced to a unity, and it does not submit to a unity.30 If the age of Empire is the age of the multitude, this is because there is no unitary political subject, such as a party, people, or nation (Hardt and Negri 2005: 331).


pages: 562 words: 201,502

Elon Musk by Walter Isaacson

4chan, activist fund / activist shareholder / activist investor, Airbnb, Albert Einstein, AltaVista, Apollo 11, Apple II, Apple's 1984 Super Bowl advert, artificial general intelligence, autism spectrum disorder, autonomous vehicles, basic income, Big Tech, blockchain, Boston Dynamics, Burning Man, carbon footprint, ChatGPT, Chuck Templeton: OpenTable:, Clayton Christensen, clean tech, Colonization of Mars, computer vision, Computing Machinery and Intelligence, coronavirus, COVID-19, crowdsourcing, cryptocurrency, deep learning, DeepMind, Demis Hassabis, disinformation, Dogecoin, Donald Trump, Douglas Engelbart, drone strike, effective altruism, Elon Musk, estate planning, fail fast, fake news, game design, gigafactory, GPT-4, high-speed rail, hiring and firing, hive mind, Hyperloop, impulse control, industrial robot, information security, Jeff Bezos, Jeffrey Epstein, John Markoff, John von Neumann, Jony Ive, Kwajalein Atoll, lab leak, large language model, Larry Ellison, lockdown, low earth orbit, Marc Andreessen, Marc Benioff, Mars Society, Max Levchin, Michael Shellenberger, multiplanetary species, Neil Armstrong, Network effects, OpenAI, packet switching, Parler "social media", paypal mafia, peer-to-peer, Peter Thiel, QAnon, Ray Kurzweil, reality distortion field, remote working, rent control, risk tolerance, Rubik’s Cube, Salesforce, Sam Altman, Sam Bankman-Fried, San Francisco homelessness, Sand Hill Road, Saturday Night Live, self-driving car, seminal paper, short selling, Silicon Valley, Skype, SpaceX Starlink, Stephen Hawking, Steve Jobs, Steve Jurvetson, Steve Wozniak, Steven Levy, Streisand effect, supply-chain management, tech bro, TED Talk, Tesla Model S, the payments system, Tim Cook: Apple, universal basic income, Vernor Vinge, vertical integration, Virgin Galactic, wikimedia commons, William MacAskill, work culture , Y Combinator

So he had no desire to meet with Bankman-Fried. When Michael Grimes persisted by texting that Bankman-Fried “could do $5bn if everything vision lock,” Musk responded with a “dislike” button. “Blockchain Twitter isn’t possible, as the bandwidth and latency requirements cannot be supported by a peer to peer network.” He said he might at some point meet with Bankman-Fried, “so long as I don’t have to have a laborious blockchain debate.” Bankman-Fried then texted Musk directly to say he was “really excited about what you’ll do with TWTR.” He said he had $100 million of Twitter stock that he’d like to “roll,” meaning that his Twitter stock would be converted into a stake in the new company once Musk took it private.


pages: 669 words: 210,153

Tools of Titans: The Tactics, Routines, and Habits of Billionaires, Icons, and World-Class Performers by Timothy Ferriss

Abraham Maslow, Adam Curtis, Airbnb, Alexander Shulgin, Alvin Toffler, An Inconvenient Truth, artificial general intelligence, asset allocation, Atul Gawande, augmented reality, back-to-the-land, Ben Horowitz, Bernie Madoff, Bertrand Russell: In Praise of Idleness, Beryl Markham, billion-dollar mistake, Black Swan, Blue Bottle Coffee, Blue Ocean Strategy, blue-collar work, book value, Boris Johnson, Buckminster Fuller, business process, Cal Newport, call centre, caloric restriction, caloric restriction, Carl Icahn, Charles Lindbergh, Checklist Manifesto, cognitive bias, cognitive dissonance, Colonization of Mars, Columbine, commoditize, correlation does not imply causation, CRISPR, David Brooks, David Graeber, deal flow, digital rights, diversification, diversified portfolio, do what you love, Donald Trump, effective altruism, Elon Musk, fail fast, fake it until you make it, fault tolerance, fear of failure, Firefox, follow your passion, fulfillment center, future of work, Future Shock, Girl Boss, Google X / Alphabet X, growth hacking, Howard Zinn, Hugh Fearnley-Whittingstall, Jeff Bezos, job satisfaction, Johann Wolfgang von Goethe, John Markoff, Kevin Kelly, Kickstarter, Lao Tzu, lateral thinking, life extension, lifelogging, Mahatma Gandhi, Marc Andreessen, Mark Zuckerberg, Mason jar, Menlo Park, microdosing, Mikhail Gorbachev, MITM: man-in-the-middle, Neal Stephenson, Nelson Mandela, Nicholas Carr, Nick Bostrom, off-the-grid, optical character recognition, PageRank, Paradox of Choice, passive income, pattern recognition, Paul Graham, peer-to-peer, Peter H. Diamandis: Planetary Resources, Peter Singer: altruism, Peter Thiel, phenotype, PIHKAL and TIHKAL, post scarcity, post-work, power law, premature optimization, private spaceflight, QWERTY keyboard, Ralph Waldo Emerson, Ray Kurzweil, recommendation engine, rent-seeking, Richard Feynman, risk tolerance, Ronald Reagan, Salesforce, selection bias, sharing economy, side project, Silicon Valley, skunkworks, Skype, Snapchat, Snow Crash, social graph, software as a service, software is eating the world, stem cell, Stephen Hawking, Steve Jobs, Stewart Brand, superintelligent machines, TED Talk, Tesla Model S, The future is already here, the long tail, The Wisdom of Crowds, Thomas L Friedman, traumatic brain injury, trolley problem, vertical integration, Wall-E, Washington Consensus, We are as Gods, Whole Earth Catalog, Y Combinator, zero-sum game

This new technology permits creators to maintain relationships so that the customer can become a fan, and so that the creator keeps the total amount of payment, which reduces the number of fans needed. This new ability for the creator to retain the full price is revolutionary, but a second technological innovation amplifies that power further. A fundamental virtue of a peer-to-peer network (like the web) is that the most obscure node is only one click away from the most popular node. In other words, the most obscure, under-selling book, song, or idea is only one click away from the best-selling book, song, or idea. Early in the rise of the web, the large aggregators of content and products, such as eBay, Amazon, Netflix, etc., noticed that the total sales of *all* the lowest-selling obscure items would equal, or in some cases exceed, the sales of the few best-selling items.


pages: 843 words: 223,858

The Rise of the Network Society by Manuel Castells

air traffic controllers' union, Alan Greenspan, Apple II, Asian financial crisis, barriers to entry, Big bang: deregulation of the City of London, Bob Noyce, borderless world, British Empire, business cycle, capital controls, classic study, complexity theory, computer age, Computer Lib, computerized trading, content marketing, creative destruction, Credit Default Swap, declining real wages, deindustrialization, delayed gratification, dematerialisation, deskilling, digital capitalism, digital divide, disintermediation, double helix, Douglas Engelbart, Douglas Engelbart, edge city, experimental subject, export processing zone, Fairchild Semiconductor, financial deregulation, financial independence, floating exchange rates, future of work, gentrification, global village, Gunnar Myrdal, Hacker Ethic, hiring and firing, Howard Rheingold, illegal immigration, income inequality, independent contractor, Induced demand, industrial robot, informal economy, information retrieval, intermodal, invention of the steam engine, invention of the telephone, inventory management, Ivan Sutherland, James Watt: steam engine, job automation, job-hopping, John Markoff, John Perry Barlow, Kanban, knowledge economy, knowledge worker, labor-force participation, laissez-faire capitalism, Leonard Kleinrock, longitudinal study, low skilled workers, manufacturing employment, Marc Andreessen, Marshall McLuhan, means of production, megacity, Menlo Park, military-industrial complex, moral panic, new economy, New Urbanism, offshore financial centre, oil shock, open economy, packet switching, Pearl River Delta, peer-to-peer, planetary scale, popular capitalism, popular electronics, post-Fordism, post-industrial society, Post-Keynesian economics, postindustrial economy, prediction markets, Productivity paradox, profit maximization, purchasing power parity, RAND corporation, Recombinant DNA, Robert Gordon, Robert Metcalfe, Robert Solow, seminal paper, Shenzhen special economic zone , Shoshana Zuboff, Silicon Valley, Silicon Valley startup, social software, South China Sea, South of Market, San Francisco, special economic zone, spinning jenny, statistical model, Steve Jobs, Steve Wozniak, Strategic Defense Initiative, tacit knowledge, technological determinism, Ted Nelson, the built environment, the medium is the message, the new new thing, The Wealth of Nations by Adam Smith, Thomas Kuhn: the structure of scientific revolutions, total factor productivity, trade liberalization, transaction costs, urban renewal, urban sprawl, vertical integration, work culture , zero-sum game

Oxford Dictionary of Current English Ozaki, Muneto p2p networks Packard, David Pahl, Ray Pain, Kathy Paris, El Paris, El/World Media Palo Alto Research Center, Xerox Panofsky, Erwin Paraguay parenthood Paris: Belleville; service center; Villejuif Park, Young-bum Parkinson, G. H. R. Parsons, Carol part-time work Patel, S. J. patriarchalism patrilineal/patrimonial logic Paugham, S. Payr, Sabine Pearl River Delta peer-to-peer networks: see p2p networks pension funds perestroika Perez, Carlotta Perlman, Janice Personal Computer personal services personalized devices Peru Peter the Great Peterson, Chris Petrella, Ricardo Pettersson, L. O. Pfeffer, Jeffrey pharmaceutical industry Philippe, J. Picciotto, Sol Piller, Charles Piore, Michael J.


pages: 879 words: 233,093

The Empathic Civilization: The Race to Global Consciousness in a World in Crisis by Jeremy Rifkin

Abraham Maslow, agricultural Revolution, Albert Einstein, animal electricity, back-to-the-land, British Empire, carbon footprint, classic study, collaborative economy, death of newspapers, delayed gratification, distributed generation, emotional labour, en.wikipedia.org, energy security, feminist movement, Ford Model T, global village, Great Leap Forward, hedonic treadmill, hydrogen economy, illegal immigration, income inequality, income per capita, interchangeable parts, Intergovernmental Panel on Climate Change (IPCC), Internet Archive, invention of movable type, invention of the steam engine, invisible hand, Isaac Newton, James Watt: steam engine, Johann Wolfgang von Goethe, Lewis Mumford, Mahatma Gandhi, Marshall McLuhan, means of production, megacity, meta-analysis, Milgram experiment, mirror neurons, Nelson Mandela, new economy, New Urbanism, Norbert Wiener, off grid, off-the-grid, out of africa, Peace of Westphalia, peak oil, peer-to-peer, planetary scale, Recombinant DNA, scientific management, scientific worldview, Simon Kuznets, Skype, smart grid, smart meter, social intelligence, supply-chain management, surplus humans, systems thinking, the medium is the message, the scientific method, The Wealth of Nations by Adam Smith, The Wisdom of Crowds, theory of mind, Tragedy of the Commons, transaction costs, upwardly mobile, uranium enrichment, working poor, World Values Survey

Williams, in their book Wikinomics , make the point that the collaborative human potential, when connected by way of distributed-computing technology, takes the economy beyond business-as-usual operating assumptions into new territory based on “openness, peering, sharing, and acting globally.”21 Third Industrial Revolution peer-to-peer technologies give rise to “distributed capitalism” and, in the process, make many of the central assumptions of market capitalism outmoded and irrelevant. For example, consider Adam Smith’s firm belief that human nature predisposes each individual to pursue his own self- interest in the marketplace, against the interests of others.