Personal Computing in the Soviet Era

Total Page:16

File Type:pdf, Size:1020Kb

Personal Computing in the Soviet Era Contents | Zoom in | Zoom out For navigation instructions please click here Search Issue | Next Page Volume 37 Number 1 January–March 2015 www.computer.org Red Clones: Personal Computing in the Soviet Era Contents | Zoom in | Zoom out For navigation instructions please click here Search Issue | Next Page qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Qmags THE WORLD’S NEWSSTAND® IEEE Annals of the History of Computing Vol. 37, No. 1 Contentswww.computer.org/annals January–March 2015 From the Editor’s Desk 2 Nathan Ensmenger, Editor in Chief Red Clones: The Soviet Computer Hobby Movement 12 of the 1980s Zbigniew Stachniak History of Computing in India: 1955–2010 24 Vaidyeswaran Rajaraman Useful Instruction for Practical People: Early Printed 36 Discussions of the Slide Rule in the US Peggy Aldrich Kidwell The Production and Interpretation of ARPANET Maps 44 Bradley Fidler and Morgan Currie “There Is No Saturation Point in Education”: Inside IBM’s 56 Sales School, 1970s–1980s James W. Cortada For more information on computing topics, visit the Computer Society Digital Library at www.computer.org/csdl. Sergey Popov operating a Micro-80 computer at the Moscow Institute of Electronic Engineering in 1979. (Photograph courtesy of Sergey Popov.) Published by the IEEE Computer Society ISSN 1058-6180 qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Qmags THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Qmags THE WORLD’S NEWSSTAND® Departments Editor in Chief Nathan Ensmenger 4 Interviews Associate Editors Dag Spicer David Hemmendinger, Marie Hicks Interview with Gordon Bell Christian Sandstrom,€ Jeffrey R. Yost 67 Biographies Department Editors Jack Copeland and Andre A. Haeff Luanne Johnson, Chigusa Kita, Irina Nikivincze, Andrew V. Haeff: Enigma of the Tube Era and Forgotten Andrew Russell, Dag Spicer, David Walden Computing Pioneer Editorial Board 75 Anecdotes Atsushi Akera, Gerard Alberts, William Aspray, Dan Murphy Martin Campbell-Kelly, Paul Ceruzzi, James W. Cortada, Peter Denning, TENEX and TOPS-20 David Alan Grier, Thomas Haigh, 83 Events and Sightings Ulf Hashagen, Peggy Aldrich Kidwell, Jennifer Light, Brian Randell, Thomas J. Misa Keith Smillie CBI–NSF Computer Security History Workshop Beatrice Choi Editorial Management: Cheryl Baltes SIGCIS at the 2014 SHOT Annual Meeting Director of Products and Services: Evan Butterfield Pierre Mounier-Kuhn Sr. Mgr., Editorial Services: Robin Baldwin History and Philosophy of Computing: New Seminars in France Editorial Product Lead: Bonnie Wylie Sr. Business Development Mgr.: Sandra Brown 87 Reviews Sr. Advertising Coordinator: Marian Anderson Digital State: The Story of Minnesota’s Computing Industry Magazine Operations Committee (reviewed by David C. Brock) Forrest Shull (chair), Brian Blake, Maria Ebling, Lieven Game After: A Cultural Study of Video Game Afterlife Eeckhout, Miguel Encarnacao, Nathan Ensmenger, Sumi Helal, (reviewed by Itamar Friedman) San Murugesan, Shari Lawrence Pfleeger, Yong Rui, Diomidis Spinellis, George K. Thiruvathukal, Mazin Yousif, Daniel Zeng Life Out of Sequence: A Data-Driven History of Bioinformatics (reviewed by Giuditta Parolini) Publications Board De la logique cable^ ´e au calculateur industriel. Une aventure du Jean-Luc Gaudiot (VP for Publications), Alain April, Alfredo Laboratoire d’Automatique de Grenoble Benso, Laxmi Bhuyan, Greg Byrd, Robert Dupuis, David S. (reviewed by Pierre Mounier-Kuhn) Ebert, Ming C. Lin, Linda I. Shafer, Forrest Shull, H.J. Siegel Submissions 96 Think Piece See Author Resources at Meryl Alper www.computer.org/annals/author.htm Augmentative, Alternative, and Assistive: Reimagining the History of Mobile Computing and Disability Ad Index, p. 82 Computer Society Information, p. 95 ______ IEEE Annals of the History of Computing (ISSN 1058-6180) is published quarterly by the posted copy. An accepted manuscript is a version that has been revised by the the IEEE Computer Society, 10662 Los Vaqueros Circle, P.O. Box 3014, Los Alamitos, author to incorporate review suggestions, but not the published version with CA 90720-1314, USA; phone +1 714 821 8380. IEEE Computer Society Headquarters, copyediting, proofreading, and formatting added by IEEE. For more information, 1730 Massachusetts Ave. NW, Washington, D.C. 20036-4928, USA; IEEE Headquarters, please go to www.ieee.org/publications_standards/publications/rights/ 345 East 47th St., New York, NY 10017, USA. Subscribe to IEEE Annals by visiting ______________paperversionpolicy.html. Permission to reprint/republish this material www.computer.org/annals. for commercial, advertising, or promotional purposes or for creating new collective works for resale or redistribution must be obtained from IEEE by writing to the IEEE Postmaster. Send undelivered copies to IEEE Annals of the History of Computing, Intellectual Property Rights Office, 445 Hoes Lane, Piscataway, NJ 08854-4141 or IEEE, Membership Processing Dept., 445 Hoes Lane, Piscataway, NJ 08855, USA. [email protected]. Copyright # 2015 IEEE. All rights reserved. Periodicals postage paid at New York, NY, and at additional mailing offices. Canadian GST Registration No. 125634188. Canada Post Publications Mail Abstracting and Library Use: Abstracting is permitted with credit to the source. Agreement Number 0487880. Return undeliverable Canadian addresses to P.O. Box Libraries are permitted to photocopy for private use of patrons, provided the per- 122, Niagara Falls, ON L2E 658. Printed in the United States. copy fee indicated in the code at the bottom of the first page is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. Reuse Rights and Reprint Permissions: Educational or personal use of this material is permitted without fee, provided such use 1) is not made for profit, 2) includes this Editorial: Unless otherwise stated, bylined articles, as well as product and service notice and a full citation to the original work on the first page of the copy, and 3) does descriptions, reflect the author’s or firm’s opinion. Inclusion in IEEE Annals of the not imply IEEE endorsement of any third-party products or services. Authors and History of Computing does not necessarily constitute endorsement by the IEEE or the their companies are permitted to post the accepted version of IEEE-copyrighted IEEE Computer Society. All submissions are subject to editing for style, clarity, and material on their own Web servers without permission, provided that the IEEE length. IEEE prohibits discrimination, harassment, and bullying. For more copyright notice and a full citation to the original work appear on the first screen of information, visit www.ieee.org/web/aboutus/whatis/policies/p9-26.html. qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Qmags THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Qmags THE WORLD’S NEWSSTAND® From the Editor’s Desk Most histories of the personal computer have tradition- that slides rules became an important part of American ally focused on the United States (and to a much lesser mathematical practices. As with all of the history of degree Western Europe), but as Zbigniew Stachniak computing, the technology alone was not enough to reminds us in his cover article “Red Clones: Soviet Com- drive history: equally important were schools, text- puter Hobby Movement of the 1980s,” the personal books, educators, and manufacturers. computer attracted the attention of enthusiasts around The sketch map of the early ARPANET that first the globe. In the Soviet Union, electronics hobbyists appeared in 1969 has assumed iconic status among his- discovered the computer later than in the West, but torians and the public alike. It features in many a book, once they did they embraced it with enthusiasm. Fortu- website, documentary, and museum exhibit illustrating nately for them, the Soviet government approved of, the “origins of the Internet.” In their article on the pro- and in fact supported, microcomputer-oriented groups duction and interpretation of this and other ARPANET and publications, and by the early 1980s, there was a maps, Bradley Fidler and Morgan Currie trace the thriving computer hobbyist community in the USSR. assumptions, strategies, and meanings associated with In tracing the shift from indigenous, Soviet-built such representations. Like all maps, the ARPANET maps machines such as the Radio-86RK to the mass appeal of are historically situated documents; they cannot be ZX Spectrum clones, Stachniak provides an important seen as merely descriptive, but are intentionally contribution to the growing literature on the global his- designed to highlight and reinforce certain values. In tory of the personal computer. the case of the 1969 ARPANET map, for example, the In his overview of the history of computing in India visual representation emphasized decentralization and in the period 1955—2010, Vaidyeswaran Rajaraman equality among nodes, and it concealed hierarchies of extends our global perspective in a different direction. login access and the directionality of communications. His careful attention to the larger political economic There is a growing literature on the material culture of context of technological innovation reminds us that, as information, software, and other
Recommended publications
  • Defense Industry Restructuring in Russia
    S t a n f o r d U n i v e r s i t y C I S A C Center for International Security and Arms Control The Center for International Security and Arms Control, part of Stanford University’s Institute for International Studies, is a multidisciplinary community dedicated to research and train- ing in the field of international security. The Center brings together scholars, policymakers, scientists, area specialists, members of the business community, and other experts to examine a wide range of international security issues. CISAC publishes its own series of working papers and reports on its work and also sponsors a series, Studies in International Se- curity and Arms Control, through Stanford University Press. Center for International Security and Arms Control Stanford University 320 Galvez Street Stanford, California 94305-6165 (415) 723-9625 http://www-leland.stanford.edu/group/CISAC/ Contents Acknowledgments iv Executive Summary v I Introduction 1 Section One: Case Studies II The Central Aerohydrodynamic Research Institute (TsAGI) 9 III ELVIS+ and The Moscow Center for SPARC Technology (MCST) 28 IV Impuls 45 V The Mashinostroenie Enterprise 59 VI The Saratov Aviation Plant 79 Section Two: Analysis VII Privatization at Four Enterprises 111 VIII Organizational Restructuring 137 IX Principal Differences in Accounting Systems in Russia 163 and the United States X Reallocation of the Social Services 183 XI Conclusion 207 Glossary 216 1 Acknowledgments Many people have contributed to this report, and still more have contributed to the research leading up to it. In writing this report, we have not attempted to reach consensus among the authors on the interpretations to be drawn from the data.
    [Show full text]
  • ••••It•• G981 &911651, Elateferyl
    DOC~D:j 4009J726 TOP SICRIT WaJUOl!JWaJl1 t?l!CBl!JrnVU~ £iJl]l!WIB~ (r(!JllJU ~(51]Uj~(5 ~" W15allDl5 f WaJUJ~l1wrnlD J / P . L . 86-36 . WHEN CENSORSHIP BACKFIRES ....... ; .. ;~ .... James Killough .. ,/. , 0 ••••• 1 IDESKPAD: A PROGRAMMER' s TOOL •••• _1:: :\ :: ,_,------!: <:; ·::::: ~ ,________ __, ,; .••••• 9 IN PRAISE OF SOLITS ..................... Louis C. Grant .... •...... 12 NOTES ON BLUE RUSSIAN .................. ~ f ...... 12 NATIONAL CRYPTOLOGIC SCHOOL OFFERS COURSE-EQUIVALENCY TESTS ..................................... 13 'f'lllS B00tiM~N'f eoN'FAtlNS CJOBIW9RB MAt'l'IRIAtL et J2 J t.1 BlltN8A/elle88 (N81'/e88M 111-1) ••••It•• G981 &911651, Elateferyl .TOP SECRET Bedawif) tfpou Nuliluiliw b1 tile 81 .... eclassified and Approved for Release by NSA on -10--1-1-20'1.2 pursuant to E.O. '13526. vlDR Case# 54778 DOCID: 4009726 TOP SECRET Published Monthly by Pl, Techniques and Standards, for the Personnel of Operations VOL . II , No • 11 NOVEMBER 1975 PUBLISHER WILLIAM LUTWINIAK BOARD OF EDITORS Editor in Chief ............ Arthur J. Salenune (5642s) Cryptanalysis ...•.......... .__ ______.ltlW25s} · · P.L. 86- 36 Language .•.....••.......... Emery W. Tetrault (5236s) Machine Support. ......... · I t33zl.~) Special Research ........... Vera R. Filby (7119s) Traffic Analysis .•.••..•••• Frederic 0. Mason, Jr. (4142s) For individual subscriptions send name and organizational designator to: CRYPTOLOG, Pl TOP SECRET DOCID: 4009726 'fOP SECRET t:rl'.4RRA Jiitt;J. GIZll!ll bww. 86-36 Theodore Shabad is one of the preeminent Ameri­ "director of a-plant," and another was a per­ can experts on Soviet physical and economic geogra­ son identified as First Secretary of "a City phy. He is the author of Geogruphy of the USSR Committee of the Communist Party." Both were (1951), Basia Industr>ial Resources of the USSR members of the Central Committee of the Tadzhik (1969), and China's Changing Map (1972).
    [Show full text]
  • Getting Started Computing at the Al Lab by Christopher C. Stacy Abstract
    MASSACHUSETTS INSTITUTE OF TECHNOLOGY ARTIFICIAL INTELLI..IGENCE LABORATORY WORKING PAPER 235 7 September 1982 Getting Started Computing at the Al Lab by Christopher C. Stacy Abstract This document describes the computing facilities at the M.I.T. Artificial Intelligence Laboratory, and explains how to get started using them. It is intended as an orientation document for newcomers to the lab, and will be updated by the author from time to time. A.I. Laboratory Working Papers are produced for internal circulation. and may contain information that is, for example, too preliminary or too detailed for formal publication. It is not intended that they should be considered papers to which reference can be made in the literature. a MASACHUSETS INSTITUTE OF TECHNOLOGY 1982 Getting Started Table of Contents Page i Table of Contents 1. Introduction 1 1.1. Lisp Machines 2 1.2. Timesharing 3 1.3. Other Computers 3 1.3.1. Field Engineering 3 1.3.2. Vision and Robotics 3 1.3.3. Music 4 1,3.4. Altos 4 1.4. Output Peripherals 4 1.5. Other Machines 5 1.6. Terminals 5 2. Networks 7 2.1. The ARPAnet 7 2.2. The Chaosnet 7 2.3. Services 8 2.3.1. TELNET/SUPDUP 8 2.3.2. FTP 8 2.4. Mail 9 2.4.1. Processing Mail 9 2.4.2. Ettiquette 9 2.5. Mailing Lists 10 2.5.1. BBoards 11 2.6. Finger/Inquire 11 2.7. TIPs and TACs 12 2.7.1. ARPAnet TAC 12 2.7.2. Chaosnet TIP 13 3.
    [Show full text]
  • Annual Report of S.P
    ANNUAL REPORT OF S.P. KOROLEV ROCKET AND SPACE PUBLIC CORPORATION ENERGIA FOR 2019 This Annual Report of S.P.Korolev Rocket and Space Public Corporation Energia (RSC Energia) was prepared based upon its performance in 2019 with due regard for the requirements stated in the Russian Federation Government Decree of December 31, 2010 No. 1214 “On Improvement of the Procedure to Control Open Joint-Stock Companies whose Stock is in Federal Ownership and Federal State Unitary Enterprises”, and in accordance with the Regulations “On Information Disclosure by the Issuers of Outstanding Securities” No. 454-P approved by the Bank of Russia on December 30, 2014 Accuracy of the data contained in this Annual Report, including the Report on the interested-party transactions effected by RSC Energia in 2019, was confirmed by RSC Energia’s Auditing Committee Report as of 01.06.2020. This Annual Report was preliminary approved by RSC Energia’s Board of Directors on August 24, 2020 (Minutes No. 31). This Annual Report was approved at RSC Energia’s General Shareholders’ Meeting on September 28, 2020 (Minutes No 40 of 01.10.2020). 2 TABLE OF CONTENTS 1. BACKGROUND INFORMATION ABOUT RSC ENERGIA ............................. 6 1.1. Company background .........................................................................................................................6 1.2. Period of the Company operation in the industry ...............................................................................6 1.3. Information about the purchase and sale contracts for participating interests, equities, shares of business partnerships and companies concluded by the Company in 2019 ..............................................7 1.4. Information about the holding structure and the organizations involved ...........................................8 2. PRIORITY DIRECTIONS OF RSC ENERGIA OPERATION ........................ 11 2.1.
    [Show full text]
  • A Brief History of the Russian Spectrum Demoscene
    A BRIEF HISTORY OF THE RUSSIAN Allegedly, engineers from the Ukrainian city Lvov, were the first to succeed with this challenge and built a working machine SPECTRUM DEMOSCENE in August 1985. Their own designed schematics became very BY ELFH OF INWARD AND CYBERPUNKS UNITY valuable information, so they could trade it to the researchers in other cities for knowledge on other topics. Still, this remained Relations between Soviet Russia and computers were always nents – more than 200 to be precise. This fact complicated the unknown to the wider public and only a limited amount of peo- a bit obscure, especially when it comes to foreign models that possibility for average Radio readers to build the “Micro-80”, ple actually knew about the existence of a cheap home com- were not officially imported here. But, if one wants to trace the because a lot of elements were hard to find in normal stores, puter with colourful graphics, which any Radio amateur could roots of the Russian demoscene, especially on the Spectrum, and in most cases could only be found on the black market. easily build at home. For example, in 1986 “Radio” magazine you must dig deep into the 1980’s, when the first generation of was still publishing the schematics of the Radio-86RK compu- radio amateurs built their first machines themselves. ter, which consisted of 29 parts, but had only a black and white A LOT OF ELEMENTS WERE HARD text mode display. CONTRABAND COMPUTERS TO FIND IN NORMAL STORES, ONLY The main role in this development was played by a very popu- ON THE BLACK MARKET Despite this, it first became a very popular machine in Rus- lar magazine named “Radio”, which gathered a lot of talented sia.
    [Show full text]
  • Small Computer Monitor User Guide
    SmallSmall ComputerComputer MonitorMonitor UserUser GuideGuide Monitor version 1.0 for the Z80 CPU Software and Documentation by Stephen C Cousins Edition 1.0.0 CONTENTS OVERVIEW................................................................................................................4 Conventions....................................................................................................... 4 Serial port.......................................................................................................... 5 LiNC80 systems.................................................................................................. 5 RC2014 systems................................................................................................. 6 COMMANDS..............................................................................................................7 ? or Help............................................................................................................ 7 API function call................................................................................................. 8 Assemble instructions...................................................................................... 10 Baud rate setting............................................................................................. 13 Breakpoint set or clear..................................................................................... 13 Console...........................................................................................................
    [Show full text]
  • Storage Organization and Management in TENEX I. Introduction
    Storage Organization and Management in TENEX http://www.linique.com/dlm/tenex/fjcc72/ Storage Organization and Management in TENEX by Daniel L. Murphy Presented at the Fall Joint Computer Conference, 1972. Originally published in AFIPS Conference Proceedings Volume 41. I. Introduction In early 1969, BBN began an effort aimed at developing a new time-shared operating system. It was felt at the time that none of the commercially available systems could meet the needs of the research planned and in progress at BBN. The foremost requirement of the desired operating system was that it support a directly addressed process memory in which large list-processing computations could be performed. The cost of core storage prohibited the acquisition of sufficient memory for even one such process, and the problems of swapping such very large processes in a time-sharing environment made that solution technically infeasible as well. Paging was therefore the logical alternative, and our study and experience with list processing systems(1,2) led us to believe that using a demand-paged virtual memory system for such computations was a feasible approach. With demand paged process virtual memory added to our requirements, we found no existing system which could adequately meet our needs. Our approach was to take an existing system which was otherwise appropriate and add the necesary hardware to support paging. The system chosen was the DEC PDP-10 (3), which, although not paged, was available with a time-shared operating system and substantial support software. Consideration was given to modifying the existing PDP-10 operating system to support demand paging, but that approach was rejected because of the substantial amount of work which would be required, because of the inherent constraints imbedded in the architecture of any large system, and because development of a new operating system would allow the inclusion of a great many other features and facilities which were judged desirable.
    [Show full text]
  • 1. Introduction
    Network Operating Systems Partha Dasgupta Department of Computer Science and Engineering Arizona State University Tempe AZ 85287-5406 USA [email protected] [Note: Written in 1997, Appeared in Encyclopedia of Electrical Engineering] 1. Introduction Network Operating Systems extend the facilities and services provided by computer operating systems to support a set of computers, connected by a network. The environment managed by a network operating system consists of an interconnected group of machines that are loosely connected. By loosely connected, we mean that such computers possess no hardware connections at the CPU – memory bus level, but are connected by external interfaces that run under the control of software. Each computer in this group run an autonomous operating system, yet cooperate with each other to allow a variety of facilities including file sharing, data sharing, peripheral sharing, remote execution and cooperative computation. Network operating systems are autonomous operating systems that support such cooperation. The group of machines comprising the management domain of the network operating system is called a distributed system. A close cousin of the network operating system is the distributed operating system. A distributed operating system is an extension of the network operating system that supports even higher levels of cooperation and integration of the machines on the network (features include task migration, dynamic resource location, and so on) (1,2). An operating system is low-level software controlling the inner workings of a machine. Typical functions performed by an operating system include managing the CPU among many concurrently executing tasks, managing memory allocation to the tasks, handling of input and output and controlling all the peripherals.
    [Show full text]
  • NWG/RFC# 752 MRC 2-Jan-79 01:22 Nnnnn a Universal Host Table
    NWG/RFC# 752 MRC 2-Jan-79 01:22 nnnnn A Universal Host Table Network Working Group Mark Crispin Request for Comments 752 SU-AI NIC nnnnn 2 January 1979 A Universal Host Table ABSTRACT: The network host table in use at MIT and Stanford is described. This host table is superior to the NIC and Tenex host tables in several ways. A binary file, compiled from this host table, is also described. This file is used by subsystems on MIT's ITS and Stanford's WAITS timesharing systems for efficiency in host and network lookups. HISTORY: As with many other sites on the Arpanet, we found the NIC's host table unsuited to our needs. Part of the problem was because the NIC host table was often inaccurate and all too often failed to include several nicknames in common usage in our communities. In addition, the NIC host table's format was awkward for user programs to use, especially those which wanted to have the host table mapped into memory in some sort of structured binary form for efficient lookups. Finally, the NIC host table neglects to include some essential information. The ITS host table was originally designed to be compiled along with a network handling program (MIDAS, the PDP-10 assembler used, has a pseudo-op to insert a file into an assembly). In order to make the host table palatable to the assembler, every comment line began with a semicolon, and every actual data line began with the word HOST. Each program which used the host table defined HOST as an assembly macro before inserting the host table into the assembly.
    [Show full text]
  • USSR: First Computers and Evaluation of Cybernetics Points of This Papers
    Dr.Vladimir Kitov Russian Plekhanov university of economics USSR: First Computers and Evaluation of Cybernetics Points of this papers Part 1. • USSR: First Computers and Evaluation of Cybernetics. Part 2. • Several key moments of the Soviet informatics. Part 1. USSR: First Computers and Evaluation of Cybernetics. • 1.1. The first soviet computers "MESM", "M-1" and "Strela". • 1.2. The most important seven organizations of the USSR, where the first serial computers "Strela" were established. • 1.3. Difficult fate of cybernetics in the USSR. • 1.4. The first courses of lectures on computers and programming in three Soviet universities. • 1.5. The first Soviet books on programming, computers and applications and their significant role in several foreign countries. Part 2. Several key moments of the Soviet informatics. • 2.1. About the following computers after "MESM", "M-1" and "Strela. • 2.2 The first in the world project of The Nationwide computer network for the control of Economy and Military Forces of the USSR. • 2.3 The application of computers for the economy and the creation of automated management systems (AMS) for different levels and purposes. • 2.4 Soviet computers “ES EVM” are the clones of IBM/360 computers . The beginning of the end of Soviet computers. 1.1. The first soviet computers "MESM", "M-1" and "Strela". • The first official step in computer industry in the USSR was patent number 10475 for the invention of "Automatic digital computer" registered on December 4, 1948 by prominent Soviet scientists Isaak Bruk and Bashir Rameev. It was the USSR first officially registered invention in the field of electronic digital computers.
    [Show full text]
  • The Future of the Internet and How to Stop It the Harvard Community Has
    The Future of the Internet and How to Stop It The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. Citation Jonathan L. Zittrain, The Future of the Internet -- And How to Stop It (Yale University Press & Penguin UK 2008). Published Version http://futureoftheinternet.org/ Accessed February 18, 2015 9:54:33 PM EST Citable Link http://nrs.harvard.edu/urn-3:HUL.InstRepos:4455262 Terms of Use This article was downloaded from Harvard University's DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http://nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms- of-use#LAA (Article begins on next page) YD8852.i-x 1/20/09 1:59 PM Page i The Future of the Internet— And How to Stop It YD8852.i-x 1/20/09 1:59 PM Page ii YD8852.i-x 1/20/09 1:59 PM Page iii The Future of the Internet And How to Stop It Jonathan Zittrain With a New Foreword by Lawrence Lessig and a New Preface by the Author Yale University Press New Haven & London YD8852.i-x 1/20/09 1:59 PM Page iv A Caravan book. For more information, visit www.caravanbooks.org. The cover was designed by Ivo van der Ent, based on his winning entry of an open competition at www.worth1000.com. Copyright © 2008 by Jonathan Zittrain. All rights reserved. Preface to the Paperback Edition copyright © Jonathan Zittrain 2008. Subject to the exception immediately following, this book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S.
    [Show full text]
  • A Hypothesis-Based Approach to Digital Forensic Investigations (Brian D. Carrier)
    CERIAS Tech Report 2006-06 A HYPOTHESIS-BASED APPROACH TO DIGITAL FORENSIC INVESTIGATIONS by Brian D. Carrier Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, IN 47907-2086 A HYPOTHESIS-BASED APPROACH TO DIGITAL FORENSIC INVESTIGATIONS A Thesis Submitted to the Faculty of Purdue University by Brian D. Carrier In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy May 2006 Purdue University West Lafayette, Indiana ii To my parents, Gerry and Suzanne. iii ACKNOWLEDGMENTS I would first like to thank my advisor, Eugene Spafford (spaf). His advice and guidance helped to shape and direct this work. I would also like to thank my com- mittee for their helpful ideas and comments: Cristina Nita-Rotaru, Sunil Prabhakar, Marc Rogers, and Sujeet Shenoi (University of Tulsa). The Center for Education and Research in Information Assurance and Security (CERIAS) provided me with a great environment and the resources needed to complete this work and my appreciation goes to the faculty and staff. Thanks to the many people in the digital forensics community that have assisted me over the years. Special thanks to Dan Kalil, Chet Maciag, Gary Palmer, and others at the Air Force Research Labs for the creation of the annual Digital Foren- sic Research Workshop (DFRWS). This work is based on concepts from the initial DFRWS Research Roadmap and the framework discussions at DFRWS 2004 helped to direct this work. Simson Garfinkel provided many helpful comments during his review of this document. Lastly, thanks to my family. My parents have always supported my endeavors (and gently guided me towards a degree in engineering instead of one in music).
    [Show full text]