somehow
The Future of the Internet-And How to Stop It » Chapter 2: Battle of the Netw... - 1 views
-
-
one another.
-
connect to it.
- ...54 more annotations...
-
networking
-
Hush-A-Phone, which was invented in 1921 as a way to have a conversation without others nearby overhearing it
-
were sold.
-
The court drolly noted, “[AT&T does] not challenge the subscriber’s right to seek privacy. They say only that he should achieve it by cupping his hand between the transmitter and his mouth and speaking in a low voice into this makeshift muffler
-
small ways.
-
phone network.
-
The physical layer had become generative, and this generativity meant that additional types of activity in higher layers were made possible.
-
services business
-
themselves
-
unchanged
-
tinkering
-
Why would the proprietary services not harness the potential generativity of their offerings by making their own servers more open to third-party coding?
-
model prevailed.
-
shopping
-
free-for-all
-
who built them.
-
possible.
-
Jennings’s work
-
annoyed person.
-
the world
-
FIDOnet
-
services
-
message
-
points
-
billion
-
from them.
-
network work.
-
controlling it.
-
tryout period
-
access
-
code for it.
-
harmful code.
-
rust that at least some third-party software writers will write good and useful code, and trust that users of the device will be able to access and sort out the good and useful code from the bad
-
approach
-
requirements
-
Its origins can be found in a 1984 paper by Internet architects David Clark, David Reed, and Jerry Saltzer.
-
The people using this network of networks and configuring its endpoints had to be trusted to be more or less competent and pure enough at heart that they would not intentionally or negligently disrupt the network.
-
persists today.
-
Yet the assumption that network participants can be trusted, and indeed that they will be participants rather than customers, infuses the Internet’s design at nearly every level.
-
an outsider.
-
the IDs.
-
contents
-
User identification is left to individual Internet users and servers to sort out if they wish to demand credentials of some kind from those with whom they communicate.
-
regulation
-
The person at the endpoint must instead rely on falling dominos of trust. The Internet is thus known as a “best efforts” network, sometimes rephrased as “Send it and pray” or “Every packet an adventure.”
-
chapter
-
environment
-
dead end.
-
ignore
-
what cheap processors would small firms and mainstream consumers be using today? One possibility is a set of information appliances.
-
-
I'm not convinced of the direction here -- the Brother or Smith-Corona appliance typewriter was supplanted not by a generative product, per se, but by Word Perfect, WordStar, Microsoft Word, and other competitors. No open-system revolution brought this about, only high-stakes competitive market cannibalism. It was not the open programmability of the PC and Mac that inaugurated the market, but the plug-and-play capability of the new product, coupled with the price point.
-
-
dial-up modem
-
minicomputer