Skip to main content

Home/ oD Digest - Future of the Internet Annotation/ Group items tagged computer

Rss Feed Group items tagged

Jay Ryan Dee

Online Threats and Dangers - 1 views

I downloaded an audio file from an unpopular website, when I opened it my computer crashed and since then, I have troubles turning it on because it would no longer display the correct desktop setti...

desktop computer support

started by Jay Ryan Dee on 12 May 11 no follow-up yet
Peter Zelchenko

The Future of the Internet-And How to Stop It » Chapter 1: Battle of the Boxes - 0 views

shared by Peter Zelchenko on 29 Apr 08 - Cached
  • went wrong.
    • tony curzon price
       
      The first computer company, Tabulating Machine Company, (1890) leased machines and operated them for clients (gvt, big business) and offered a service, not a piece of equipment.
  • from scratch
    • tony curzon price
       
      TMC becmae IBM and retained the model; the downside was that innovation was negotiated and slow, and new vendors found it very hard to enter the market.
  • purposes
    • tony curzon price
       
      The threat of anti-trust forced IBM to unbundle, allowing third party and in-house software in ... but large firms mainly maintained the old model nevetheless.
  • ...19 more annotations...
  • Cutting and pasting different pieces of Flexowriter tape together allowed the user to do mail merges about as easily as one can do them today with Microsoft Word or its rivals.
  • reprogram them.
    • tony curzon price
       
      '60s corporate comp[uting was IBM or single purpose appliances
  • problems
    • tony curzon price
       
      PCs come out of a hobbyist branch, not a corporate branch---they were "solutions waiting for problems".
  • tabulators
    • tony curzon price
       
      Watch and calculator are the consumer equivalent of the information appliance --- and at heart this has got to do with having someone to blame when it doesn't work.
  • springy posts.
  • revolution
    • tony curzon price
       
      PCs were always expected to run s/w written by authors other than the manufacturer ... but the PC, until the early 80s, was still considered a hobbyist toy.
  • a university
    • tony curzon price
       
      Corporate computing moved to the mini-computer - still a dumb-terminal system that ran entreprise specific tasks and some general buisness functions.
  • no more.
    • tony curzon price
       
      Un-networked, hobbyist nature of PC made it particularly lax about security.
  • opponent
    • tony curzon price
       
      The PC started winning through its killer business apps - wordprocessor, spreadsheet and relational database, while the hobbyist uses led to the development of games.
  • or the Web.
    • tony curzon price
       
      Business adopted the PC for cost reasons, despite its basic unsuitability to group work; homes bought the PC for one thing and discovered many things they could do with it.
  • PCs can run.
    • tony curzon price
       
      Microsoft genuinely wanted an open PC running many companies' code, not a s/w monopoly for itself.
  • installed
    • tony curzon price
       
      A vast network of PCs ready to run new s/w offered a market for new s/w, a market that only grew as the Internet eliminated the cost of the transaction.
  • themselves
    • tony curzon price
       
      The core of Apple's and MS's business was in making attractive Operating Systems rather than in creating applications themselves, pace the MS antitrust cases of the 1990s that were precisely about such moves.
  • parties’ code
    • tony curzon price
       
      The backwater of hobbyist computing environemnt was essential to the experimentation & risk-taking that made the PC.
  • by others
    • tony curzon price
       
      But the PC revolution went beyond the tinkerers to the non-technical user because of the ease with which PC h/w can be re-used for other purposes.
  • supremacy there.
    • tony curzon price
       
      Here is the typical pattern: creative amateur chaos -> successful product -> market take-over -> risk to interests from original chaos --> temptation to lock it all down.
  • invent entirely new appliances from scratch as long as they had the ideas and the patience to attach lots of wires to springy posts.
    • Peter Zelchenko
       
      Actually, this product rarely encouraged developing new products from scratch. While it was possible to do with difficulty, by that skill level it would be much easier to use a protoboard and discrete components. Any level of structural control will limit the user to some degree from the freedom to create. This is actually a very good example, and a survey of the various products and their creative possibilities would make for an interesting way to explore this question of flexibility and generativity.
  • Radio Shack’s “75-in-1 Electronic Project Kit,”
    • Peter Zelchenko
       
      Abraham's new Lego-style electronic project kit is much more "controlled" than my old Radio Shack one -- and he will get less out of it, though it may be easier and more satisfying in some ways, he won't understand discrete components. Compare Ted Kilpin's e-mail about PIC controllers.
  • But PCs were still firmly grounded in the realm of hobbyists, alongside 75-in-1 Project Kit designs.
    • Peter Zelchenko
       
      The fundamental threshold difference was the ease of transporting functionality with the floppy drive. This gave the Apple II a first opportunity to allow this kind of conspiring. Other platforms (Imsai, Altair, Compucolor, etc.) all had, or eventually supported, floppy drives, and there was some conspiracy, but the Apple's was the most plug-and-play of them all.
tony curzon price

The Future of the Internet-And How to Stop It » Chapter 3: Cybersecurity and ... - 0 views

shared by tony curzon price on 04 May 08 - Cached
  • computer
    • tony curzon price
       
      Nov 2nd 1988 - First Internet Worm launched from Princeton ... just looked through directories on a machine for addresses to send itself to and do the same... Internet almost crawls to a halt.
  • count
  • digital nose count.
    • tony curzon price
       
      Morris' code contained a bug that made it proliferate - the intent had been the harmelss one to count machines on network.
  • ...34 more annotations...
  • from afar.
    • tony curzon price
       
      worm shows danger of generativity: ease of reprogramming could be dangerous.
  • and less-skilled users.
    • tony curzon price
       
      Situation is worse today than in 1988 - network bigger and faster, processors more powerful and users less skilled.
  • threats
    • tony curzon price
       
      Public reaction to worm: other Interent engineers thought it was a challenge; govt set up an enquiry and a program at Carnegie that still today is a clearing-house for info on network security, viruses, etc.
  • at MIT
    • tony curzon price
       
      Fairy story ending to the fate of Morris, the first worm-maker, dot com millionaire, and now tenured professor at MIT.
  • Internet
    • tony curzon price
       
      The Internet Engineering Task Force, the de facto UNIX gods of the Internet, published a report ("The Helminthiasis of the Internet" :) describing the technology of the worm, and recommending some ethics training for new comers on the Net. ..
  • retool them.
    • tony curzon price
       
      Naivety of Internet's response has to be understood in relation to logic of computer architectures.
  • Urging users to patch their systems and asking hackers to behave more maturely might, in retrospect, seem naïve.
  • operations
    • tony curzon price
       
      Original ATT crack at 2600Hz : ATT, because it controlled a centralised network, could change the architecture to close-down the backdoor.
  • enforced
    • tony curzon price
       
      Compuserve similarly adopted post Cap'n Crunch rule: "do not let the paths that carry data also carry code."
  • Internet
    • tony curzon price
       
      the networks evolved slowly and with few surprises either good or bad. This made them both secure and sterile
  • the Internet.
    • tony curzon price
       
      Security = slow to change, sterile
  • responsibility
    • tony curzon price
       
      1988 internet had no ways to control spread of morris worm
  • attack
    • tony curzon price
       
      endpoint machines were disparate and open - no single way to secure them against morris attack
  • the Internet.
    • tony curzon price
       
      Insecurity of Internet - allowing code to be run on end-poitns, eg, - is critical to its creative potential
  • considered
    • tony curzon price
       
      Post Morris, no one really offered to solve the problem, because there was no non-transforming solution ,,,
  • The decentralized, nonproprietary ownership of the Internet and the computers it linked made it difficult to implement any structural revisions to the way it functioned, and, more important, it was simply not clear what curative changes could be made that did not entail drastic, wholesale, purpose-altering changes to the very fabric of the Internet.
  • Then it stalls.
    • tony curzon price
       
      generative is good: great products, and also great opportunities for self-expression.
  • generativity
    • tony curzon price
       
      generative systems require trust; trust gets abused; if it is abused enough, people choose security over generativity.
  • password security.
    • tony curzon price
       
      Remarkable scalability of Internet, especially given new demographic of users in 1990s
  • a set time.
    • tony curzon price
       
      hacker non-malevolence has slowed the issue of bad code from getting out of hand.
  • syndicates
    • tony curzon price
       
      graffiti vs. drugs trade - where is the pay-off to bad code ... we can now see one
  • happening
    • tony curzon price
       
      organised crime apparently controls 1 in 10 home pcs through botnets.
  • money
    • tony curzon price
       
      spam, ddos ($50k per day), gaming passwords, private infrmation -- all are biz model for malware
  • orbit
    • tony curzon price
       
      malware has become very sophisticated, with recovery essentially impossible against the worst infections
  • Internet
    • tony curzon price
       
      generativity is put at risk - either from death by 1000 cuts, or by watershed security moment.
  • globe
    • tony curzon price
       
      Wipe the world's drives - the watershed scenario.
  • starts
    • tony curzon price
       
      Badware subterfuge examples
  • compromised
    • tony curzon price
       
      Badware or not is subjective, in the eye of the installer - see VNC
  • appliancized
    • tony curzon price
       
      Frustrated consumers, their machines getting infected and mis-performing, will go for appliances
  • decisions
    • tony curzon price
       
      consumers will increasingly to use the XBOX that works over the PC that crashes.
  • device
    • tony curzon price
       
      appliances clip the wings of invention
  • the fore
    • tony curzon price
       
      Vital function of PC is to keep the appliance honest - it is general purpose, and so can be reconfigured into the appliance; but this insurance policy is not WHY the PC is bought, it is unintended social benefit.
  • gatekeeper
    • tony curzon price
       
      PCs that are shared are getting appliantised by various restrictions.
  • f the user is allowed to make exceptions, the user can and will make the wrong exceptions, and the security restrictions will too often serve only to limit the deployment of legitimate software that has not been approved by the right gatekeepers.
Jay Ryan Dee

Quality Computer Help Desk Support Services - 1 views

I am so thankful with HelpVirtualDeskSupport help desk support services. They help me fixed my computer. Their PC help desk support specialists really know what they are doing. HelpVirtualDeskSupp...

help desk support

started by Jay Ryan Dee on 12 May 11 no follow-up yet
Peter Zelchenko

The Future of the Internet-And How to Stop It » Chapter 2: Battle of the Netw... - 1 views

shared by Peter Zelchenko on 30 Apr 08 - Cached
  • somehow
    • tony curzon price
       
      Everyone - even the appliance - needs a network
  • one another.
    • tony curzon price
       
      But imagine the cost and inconvenience of every appliance having its own network ... so the ability of th enetwork to re-purpose itself is also important to diffusion of technology.
  • connect to it.
    • tony curzon price
       
      Network architectures and protocols work in an environment in which certain behaviors are assumed ... and new assumptions on behavior lead to new desires for network configuration; trustworthiness is an important such behavioral dimension.
  • ...54 more annotations...
  • networking
    • tony curzon price
       
      Regulation, not jsut technology, made it hard to make the telephone network useful for anything apart from telephoning.
  • Hush-A-Phone, which was invented in 1921 as a way to have a conversation without others nearby overhearing it
  • were sold.
    • tony curzon price
       
      ATT had control of network adn devices attached to it
  • The court drolly noted, “[AT&T does] not challenge the subscriber’s right to seek privacy. They say only that he should achieve it by cupping his hand between the transmitter and his mouth and speaking in a low voice into this makeshift muffler
  • small ways.
    • tony curzon price
       
      Courts forced ATT to accept non-ATT devices on phone system
  • phone network.
    • tony curzon price
       
      Court principle in 1940s: "as long as network is not harmed, 3rd parties can hook up to it".
  • The physical layer had become generative, and this generativity meant that additional types of activity in higher layers were made possible.
  • services business
    • tony curzon price
       
      The modem on the "open" ATT network was first generative opportunity for hobbyists and businesses
  • THE PROPRIETARY NETWORK MODEL
  • themselves
    • tony curzon price
       
      Firt online services were along IBM model but consumer-facing; one company supplied the lot.
  • unchanged
    • tony curzon price
       
      In 10 years of business, between 1984 & 2004, Compuserve hardly changed its array of offerings.
  • tinkering
    • tony curzon price
       
      Compuserve piggy-backed on ATT network, phy layer generativity, but did ot itself offer 3rd party acces for generativity.
  • Why would the proprietary services not harness the potential generativity of their offerings by making their own servers more open to third-party coding?
  • model prevailed.
    • tony curzon price
       
      Information service companies were charging by the minute - so why didn't they want to cultivate 3rd party apps?
  • shopping
    • tony curzon price
       
      Probably no one actually saw the commercial potential.
  • free-for-all
    • tony curzon price
       
      By early 90s, a small umber of networks offered slightly differentiated, closed, monolithic services.
  • who built them.
    • tony curzon price
       
      The answer is probably deep in organisational behavior: mature markets encourage exploitation of niches, not radical exploration of new models.
  • possible.
    • tony curzon price
       
      Hobbyist BBS encouraged the opposite incentive of proprietary netowrk: bandwidth limitation meant that users had to be as quick as possible.
  • Jennings’s work
    • tony curzon price
       
      FIDOnet - the original p2p file sharing system - got over some of the bandwidth limitations.
  • annoyed person.
    • tony curzon price
       
      FIDOnet was a great kludge, but had some real issues - like wrong numbers in the call list ... and irate humans at the end of them.
  • the world
    • tony curzon price
       
      FIDOnet problems were exactly the problems that ATT worried about when it wanted to limit 3rd party appliances on the network - who was to blame for quality of service.
  • FIDOnet
    • tony curzon price
       
      Internet offered flexibility of FIDOnet with robustness of proprietary network.
  • services
    • tony curzon price
       
      PC Internet analogy: Internet connects to proprietary networks and eventually replaces them
  • message
    • tony curzon price
       
      From the first, Internet is designed to pass information along diverse computer platforms by defining protocols.
  • points
    • tony curzon price
       
      Internet was low level: allow 2 nodes to exchange information ... and that is all; no prejudgement of what people want to do with that information.
  • billion
    • tony curzon price
       
      Internet builders were academics who could devote time to the project and yet were doing it for the innate interest; $10m or so spent on Internet between 1969 and 1990 --- great return on investment, from a social point of view.
  • from them.
    • tony curzon price
       
      Environment of creation is critical in determining the nature of the system: Internet pioneers were trying to get the most out of existing infrastructure and diverse netwroks; contrast business logic of FedEx network.
  • network work.
    • tony curzon price
       
      The motto among Internet pioneers was, "We reject: kings, presidents, and voting. We believe in: rough consensus and running code;" they were building it for themselves, in a sort of Kantian environment of universalisability of the user.
  • controlling it.
    • tony curzon price
       
      1991, backbone privatisation context also allowed for decentralisation of network ownership and operation.
  • tryout period
    • tony curzon price
       
      Internet -> Windows PC link built by a single academic hobbyist
  • access
    • tony curzon price
       
      1991, first opening of Internet to non-research uses; by mid 90s, proprietary networks were branding mainly as ISPs --- generative boom was gathering unbelievable speed.
  • code for it.
    • tony curzon price
       
      Internet was built away from commercial logic, no trying to guess what the conusmer wanted; just like the hobbyist PC.
  • harmful code.
    • tony curzon price
       
      Basic trade-off: consistency, quality and reliability of service (closed systems) versus breadth of uses, trust of open systems.
  • rust that at least some third-party software writers will write good and useful code, and trust that users of the device will be able to access and sort out the good and useful code from the bad
  • approach
    • tony curzon price
       
      Intenret design choices made sense given a sociology, not just an negineering environment.
  • requirements
    • tony curzon price
       
      Procrastination principle: 1984 Internet engineer academics formuilate argument that only universally useful features should be built into the network, with other specific work being done at the end-points.
  • Its origins can be found in a 1984 paper by Internet architects David Clark, David Reed, and Jerry Saltzer.
  • The people using this network of networks and configuring its endpoints had to be trusted to be more or less competent and pure enough at heart that they would not intentionally or negligently disrupt the network.
  • persists today.
    • tony curzon price
       
      Internet design assumed basic trustworthiness and competence.
  • Yet the assumption that network participants can be trusted, and indeed that they will be participants rather than customers, infuses the Internet’s design at nearly every level.
  • an outsider.
    • tony curzon price
       
      Banks are built for robbers, airports for terrorists ... the Internet was built for colleagues.
  • the IDs.
    • tony curzon price
       
      AOL/CompServe had identity management built-in: wanted to know who you were for marketing purposes ... good for accountability, too.
  • contents
    • tony curzon price
       
      On Internet, identity-management was left to specific service providers or apps to choose.
  • User identification is left to individual Internet users and servers to sort out if they wish to demand credentials of some kind from those with whom they communicate.
  • regulation
    • tony curzon price
       
      There's good and bad in internet's anonymity -- can't pursue bad behavers, but can't get the freedom fighters against oppressive governments either -- but an engineering decision has ended up havign huge social impacts.
  • The person at the endpoint must instead rely on falling dominos of trust. The Internet is thus known as a “best efforts” network, sometimes rephrased as “Send it and pray” or “Every packet an adventure.”
    • tony curzon price
       
      Internet as "network of networks" loosely cobbled together entails the inability to develop quality of service, or bandwidth agreements, that apply between any 2 points.
  • chapter
    • tony curzon price
       
      "bit egalitarianism" is assumed in the network, and fixes have been found along the way (eg Akamai & network caching).
  • environment
    • tony curzon price
       
      Crucible of development - collaborativ academis -- strangely made something that thrived beyond it and gave world this wildly generative environment.
  • dead end.
    • tony curzon price
       
      Is the appliance and the proprietary network an evolutionary dead-end?
  • ignore
    • tony curzon price
       
      The generational pattern of generative technology: small-world success, big-world expansion through commercial forces, limitations of the model; limitations now may threaten the ethos that amde it so good, but limitations are real.
  • what cheap processors would small firms and mainstream consumers be using today? One possibility is a set of information appliances.
    • Peter Zelchenko
       
      That is proven, with cell phones, iPods, calculators. More broadly, it can be said that nongenerative appliances coexist with generative devices. It's not so clear whether one subverts the other without a lot of force behind it.
    • Peter Zelchenko
       
      I'm not convinced of the direction here -- the Brother or Smith-Corona appliance typewriter was supplanted not by a generative product, per se, but by Word Perfect, WordStar, Microsoft Word, and other competitors. No open-system revolution brought this about, only high-stakes competitive market cannibalism. It was not the open programmability of the PC and Mac that inaugurated the market, but the plug-and-play capability of the new product, coupled with the price point.
  • dial-up modem
    • Peter Zelchenko
       
      Better known as the "acoustic coupler," which gives the layman a better idea of its shape and function.
  • minicomputer
    • Peter Zelchenko
       
      You mean mainframe, correct? Also worth a mention is CBBS and the other hobbyist networks that predate CompuServe, et al.
Ako Z°om

The Future of the Internet-And How to Stop It » Introduction - 0 views

shared by Ako Z°om on 27 Apr 08 - Cached
  • to the Web.
    • tony curzon price
       
      iPhone is object of desire
  • very fast.
    • tony curzon price
       
      Apple II was a generative box whose success depended on others' additions to it, like VisiCalc
  • computer crashes
    • tony curzon price
       
      Apple II was open for tinkerers and hobbyists, unlike the iPhone
  • ...11 more annotations...
  • permission
    • tony curzon price
       
      iPhone needs Apple permission before you can tinker; Apple can remote modify it; it is a controlled system.
    • Ako Z°om
       
      ahah ! - sterile the iphone ?... not so... it has now many app. done free, as the next widgetbox web2 ways - and it is a very great inspiration too, an industrial asian has produced a similar product better...and of course as usual, protections attract hackers to modify or to use free: it's done...
  • give up that freedom.
    • tony curzon price
       
      The dark side of openness - viruses, spam, crashes - makes the closed philosophy of the iPhone attractive to consumers.
    • Yule Heibel
       
      generative creativity = dangerous; closed consumption = "safe"
    • Jeremy Price
       
      This is a very important tension to consider, and one that will take time to work through.
  • network of control
    • tony curzon price
       
      iPhone / Apple II story is representative of the Internet: it is moving form the open to the tethered, the generative to the controlled.
  • of its use.
    • tony curzon price
       
      The original PC is a blank slate.
    • Yule Heibel
       
      Apple II is a user object; iPhone is a consumer object (open / closed)
  • things
    • tony curzon price
       
      Boxed appliances are fine, but they endanger the NEXT ROUND of innovation --- innovation-types they themselves were dependent on in the past.
    • Yule Heibel
       
      If the generative aspect is ursurped by closed appliances, the ecosystem dies as a productive source of further innovation
  • discover
    • tony curzon price
       
      When there is separation of PC ownership and use, interests diverge: stability versus "wilderness"
  • heartbeat
    • tony curzon price
       
      As long as a PC can run code it is given, and especially with broadband connectivity, the dangers are there, and are serious.
    • Yule Heibel
       
      like a natural ecosystem, open and generative platforms can provide habitat for dangerous pathogens (viruses, invaders, etc.)
  • exported
    • tony curzon price
       
      These dangers add support for lockdown and interference by the surveiling centre --- with all the dangers this implies in authoritarian states.
    • Yule Heibel
       
      lockdowns as monoculture... safe, but sterile
  • or private
    • tony curzon price
       
      Lockdowns and box-appliances will destroy the creativity of IT, and to stop this happening we'll need new technologies, communities that sustain the right ethos and a sense of public purpose.
  • pressure them
    • tony curzon price
       
      The everlasting battle will be between open, Web 2.0 systems and services and "bottled power" as exemplified by the iPhone.
    • Yule Heibel
       
      - users (vs. consumers?) stay in the generative loop via Web 2.0 applications
    • Ako Z°om
       
      free services and ...ware = battle for money may change to battle for communities influences and direct human exchanges
  • groups with shared norms and a sense of public purpose
1 - 6 of 6
Showing 20 items per page