Constitution in Cyberspace: Cases and Materials

Total Page:16

File Type:pdf, Size:1020Kb

Constitution in Cyberspace: Cases and Materials The Constitution in Cyberspace Cases & Materials James Boyle Spring 2001 Constitution in Cyberspace Professor James Boyle Spring 2001 Table of Contents INTRODUCTION James Boyle, Net Total: Law Politics and Property in Cyberspace ............. 1 Nathan Newman, Net Loss: Government, Technology and the Political Economy of Community in the Age of the Internet ............................. 125 A Brief History of the Internet by Barry Leiner et al. ....................... 132 Cyberspace and the American Dream: A Magna Carta for the Knowledge Age by Esther Dyson, George Gilder, George Keyworth, and Alvin Toffler . 151 John Perry Barlow, A Cyberspace Compendium .......................... 165 Law And Borders--The Rise of Law in Cyberspace ........................ 176 David R. Johnson\*\ and David G. Post\**\ ........................... 176 Conceptual Background ............................................... 197 Lawrence Tribe, "The Constitution in Cyberspace: ................... 198 I The Public Private Distinction in Internet Governance i; Introduction to State Action ........................................... 213 Allen S. Hammond, Private Networks, Public Speech ................ 214 Marsh v. Alabama .............................................. 218 SHELLEY V. KRAEMER , 334 U.S. 1 (1948) 334 U.S. 1 ........... 220 FLAGG BROS., INC. v. BROOKS, 436 U.S. 149 (1978) 436 U.S. 149 . 231 Jackson v. Metropolitan Edison, Co. .............................. 249 America Online Inc. v.Cyber Promotions Inc.C.A. NO. 96-5213 ....... 254 I The Public Private Distinction in Internet Governance ii; Private non-delegation doctrine ........................................ 266 A. MICHAEL FROOMKIN,Wrong Turn in Cyberspace: Using Icann to Route Around the APA and the Constitution ....................................... 266 II Free Speech in Cyberspace ............................................ 297 II A. Communications Decency Act ..................................... 297 The CDA, 47 U.S.C.A. §§ 223, 230 ............................... 299 § 230. Protection for private blocking and screening of offensive material307 II B. 1 The First Amendment ........................................... 312 William Van Alstyne, A Graphic Review of the Free Speech Clause, ... 313 Frederick Schauer, The Second-best First Amendment, .............. 333 CHAPLINSKY ................................................ 342 AMERICAN MINI THEATRES, INC. .............................. 345 William M. BROADRICK et al., Appellants, v. State of OKLAHOMA et al. ii ....................................................... 351 II B. 2 The First Amendment. Pornography and Obscenity .................. 356 Marvin MILLER, Appellant,v. State of CALIFORNIA ................ 357 Ginsberg v. State of New York ................................... 366 AMERICAN BOOKSELLERS ASSOCIATION, INC.,v. William H. HUDNUT,386 III UNITED STATES of America, v. Robert Alan THOMAS (94-6648) and Carleen Thomas ................................................ 392 II B. 3 The First Amendment in Different Media .......................... 410 FCC v. Pacifica ................................................ 411 RED LION BROADCASTING CO ................................ 433 SABLE COMMUNICATIONS ................................... 437 TURNER BROADCASTING SYSTEM ............................ 445 Cass R. Sunstein, The First Amendment in Cyberspace, .............. 454 TALLEY V. CALIFORNIA ...................................... 506 MCINTYRE V. OHIO ........................................... 512 Joshua Quittner, “Requiem for a Go-Between,” ..................... 526 C. Case Study: The Communications Decency Act ........................ 528 ACLU V. RENO (3 JUDGE PANEL) .............................. 529 Statement by President Clinton in reaction to Court Decision ......... 619 RENO V. ACLU (questions presented) ............................ 620 Un-RENO v. ACLU ............................................ 621 Reno v. ACLU 117 S. Ct 2329 ................................... 655 C. 2) Case Study -- Child On-Line Protection Act ........................ 688 TITLE XIV--CHILD ONLINE PROTECTION ....................... 689 Reed, TRO Memorandum ....................................... 699 B. Privacy .......................................................... 706 Who Owns Personal Information? Anatomy of a Privacy Case ........ 707 Avrahami Motion .............................................. 709 Avrahami Letter to DMA ........................................ 713 Opt-In is Absolutely Unworkable ................................. 715 Anonymously Yours -- Part 1 .................................... 716 David Chaum, Achieving Electronic Privacy ........................ 720 A Cypherpunk´s Manifesto ...................................... 729 THE PRIVATE AND OPEN SOCIETY BY JOHN GILMORE ......... 731 C. Copyright and Civil Liberties ....................................... 735 Church in Cyberspace; Its Sacred Writ Is on the Net ................. 736 Scientology Reined In; Church May Have to Return Computer Files .... 745 RELIGIOUS TECHNOLOGY CENTER, Plaintiff, v. ARNALDO PAGLIARINA LERMA ................................................ 747 iii RELIGIOUS TECHNOLOGY CENTER, Plaintiff, v. ARNALDO PAGLIARINA LERMA, ............................................... 753 Scientology Battle ............................................. 757 NETCOM ON-LINE COMMUNICATION SERVICES, INC .......... 758 iv James Boyle, Net Total: Law Politics and Property in Cyberspace (unpublished draft 2000 – please do not quote or cite without permission) Net Total LAW, POLITICS AND PROPERTY IN CYBERSPACE James Boyle v Contents chapter 1 — Telephone Cults and Mail Murders ................ < The Telephone Test .......................................... < Internet Realism .............................................. < Shibboleth and Anathema in Net Policy ............................ chapter 2 — Libertarianism, Property and Harm ............... < Baseline Problems and Nonsense-on-Stilts ......................... < Positivism and the Civics Class ................................... < Making Rights Naturally ........................................ < Property as a Solving Idea chapter 3 — The Internet Trinity .................................. < “The Net Treats Censorship as a Malfunction...” .................... < “In Cyberspace , the First Amendment is a Local Ordinance..” ......... < “Information Wants to Be Free..” ................................ chapter 4 — Foucault in Cyberspace .............................. < Surveillance, Discipline and Architecture ........................... < Safe Harbours and Unintended Consequences ...................... chapter 5 — Privatised Panopticons and Digital Enclosures ... chapter 6 — State Action and Private Action ................. chapter 7 — Environmentalism for the Public Domain? ......... chapter 8— Antitrust and Microsoft: The Economics of Networks ............................................... chapter 9 — Conclusion .............................................. -i- Telephone Cults and Mail Murders chapter 1 here are many uninteresting things to say about cyberspace. The newspapers prove it every day. Here we have a set of Ttechnological, economic and cultural changes that occasionally merit even the burbling enthusiasm of the Internet’s devotees. Yet the newspaper coverage of the subject concentrates largely on things that have absolutely nothing to do with the Net itself. Some time ago, for my sins, I got into some journalists’ Rolodexes as a law professor who knew something about the Net. Now, whenever a web-designing cult commits collective suicide, a child is accosted by a pervert in a chat room, or a murderer persuades his victim to turn up by sending an e-mail message, I get a flood of calls looking for the “Internet angle.” The trouble is that there rarely is an Internet angle. The murderers, sexual predators and crackpot religions are largely independent of the communications technology they happened to use. One reporter was particularly persistent in trying to get me to cough up an appropriate sound-bite. Searching for an analogy, I asked her whether, if I called her up and asked her out on a blind date and murdered her, she would think it was a “telephone- related murder”? She rang off shortly thereafter, probably more convinced of my emotional instability than by my argument. But the 1 2 44 Net Total analogy is worth pursuing and it has something to teach the technophiles as well as the tabloids. In the early ‘90's — before “.com” could be found plastered all over the backs of buses — I went to a conference at Duke University devoted to explaining the technological wonders that lay in wait for us. At the culmination of the presentation one of the panelists said that, with access to better technology, we could actually have ordered a pizza on-line and had it delivered to us right in this classroom. There was a reverential pause at this piece of information, then a North Carolina voice spoke up hesitantly from the back of the room. “There’s a phone on the wall, you know.” Imagine a really revolutionary communications technology. Imagine a future in which we have a communications system with unprecedented market penetration, reaching more than 94% of the families in the United States, the majority of households in the developed world and a substantial chunk of the entire world’s population.1 Imagine that the system would allow real-time communication, point to point, with terminals everywhere; so that in many cases you could
Recommended publications
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • Annual Report
    2015 Annual Report ANNUAL 2015 REPORT CONTENTS i Letter from the President 4 ii NYSERNet Names New President 6 iii NYSERNet Members Institutions 8 iv Membership Update 9 v Data Center 10 vi VMWare Quilt Project 11 vii Working Groups 12 viii Education Services 13 ix iGlass 14 x Network 16 xi Internet Services 17 xii Board Members 18 xiii Our Staff 19 xiv Human Face of Research 20 LETTER FROM THE PRESIDENT Dear Colleagues, I am pleased to present to you NYSERNet’s 2015 Annual Report. Through more than three decades, NYSERNet’s members have addressed the education and research community’s networking and other technology needs together, with trust in each other guiding us through every transition. This spring inaugurates more change, as City. The terrible attack of Sept. 11, 2001, we welcome a new president and I will step complicated achievement of that goal, made down from that position to focus on the it more essential, and taught a sobering research community’s work and needs. lesson concerning the importance of communication and the need to harden the By itself, working with NYSERNet’s infrastructure that supports it. We invested extraordinary Board and staff to support in a wounded New York City, deploying fiber and building what today has become a global exchange point at “ These two ventures formed pieces 32 Avenue of the Americas. In the process, we forged partnerships in a puzzle that, when assembled, that have proved deep and durable. benefited all of New York and beyond.” Despite inherent risks, and a perception that New York City the collective missions of our members institutions might principally benefit, for the past 18 years has been a privilege NYSERNet’s Board unanimously supported beyond my imagining.
    [Show full text]
  • 9/8/19 Date: 9/10/19 Article Title: Brief History of the Internet Autho
    ● Name: John Church ● Abstract Due Date: 9/8/19 ● Date: 9/10/19 ● Article Title: Brief History of the Internet ● Author: Barry M. Leiner, Vinton G. Cerf, David D. Clark, Robert E. Kahn, Leonard Kleinrock, Daniel C. Lynch, Jon Postel, Larry G. Roberts, Stephen Wolf. ● Journal: Internet Society “Brief History of the Internet” provides the reader with a cursory overview of the organizations, motivations, and pivotal moments behind the creation of the internet and its existence up to the date of publication, in 1997. The paper begins by recounting the parties and organization that began the creation of the first networks, and their motivations. The article notes the formation of key organizations and the parties involved in the creation of key technologies over the years following the Internet's inception. The article does not delve into the details of new improvements or the stories behind certain pivotal moments, but instead focuses on giving a brief overview of the parties, technologies, and events largely by name alone. One interesting aspect of the internet's inception that I did not realize until reading the article, was the largely decentralized nature from the beginning. For example, the article mentions that routers were designed to be “black box gateways” that did not hold on to any information. This was likely in line with DARPA’s goals (preventing sensitive military information fro sitting in places it shouldn’t.) as well as technical limitations of the time (the cost of memory in routers.) I wonder, though, that if the US government knew what the internet would become, if they would have insisted on more centralized control measures and less decentralization.
    [Show full text]
  • Core Magazine February 2002
    FEBRUARY 2002 CORE 3.1 A PUBLICATION OF THE COMPUTER HISTORY MUSEUM WWW.COMPUTERHISTORY.ORG PAGE 1 February 2002 OUR ACTIONS TODAY COREA publication of the Computer History3.1 Museum IN THIS MISSION ISSUE TO PRESERVE AND PRESENT FOR POSTERITY THE ARTIFACTS AND STORIES OF THE INFORMATION AGE INSIDE FRONT COVER VISION OUR ACTIONS TODAY The achievements of tomorrow must be was an outstanding success, and I simply doesn’t exist anywhere else in TO EXPLORE THE COMPUTING REVOLUTION AND ITS John C Toole rooted in the actions we take today. hope you caught the impact of these the world. With your sustained help, our IMPACT ON THE HUMAN EXPERIENCE Many exciting and important events announcements that have heightened actions have been able to speak much 2 THE SRI VAN AND COMPUTER have happened since our last CORE awareness of our enterprise in the louder than words, and it is my goal to INTERNETWORKING publication, and they have been community. I’m very grateful to Harry see that we are able to follow through Don Nielson carefully chosen to strategically shape McDonald (director of NASA Ames), Len on our dreams! EXECUTIVE STAFF where we will be in five years. Shustek (chairman of our Board of 7 John C Toole David Miller Trustees), Donna Dubinsky (Museum This issue of CORE is loaded with THE SRI VAN AND EARLY PACKET SPEECH EXECUTIVE DIRECTOR & CEO VICE PRESIDENT OF DEVELOPMENT 2 Don Nielson First, let me officially introduce our Trustee and CEO of Handspring), and technical content and information about Karen Mathews Mike Williams new name and logo to everyone who Bill Campbell (chairman of Intuit) who our organization—from a wonderful EXECUTIVE VICE PRESIDENT HEAD CURATOR 8 has not seen them before.
    [Show full text]
  • I: the Conception
    Excerpt from: Mayo, Keenan and Newcomb, Peter. “How the Web Was Won,” Vanity Fair, July 2008. I: The Conception Paul Baran, an electrical engineer, conceived one of the Internet’s building blocks—packet switching— while working at the Rand Corporation around 1960. Packet switching breaks data into chunks, or “packets,” and lets each one take its own path to a destination, where they are re-assembled (rather than sending everything along the same path, as a traditional telephone circuit does). A similar idea was proposed independently in Britain by Donald Davies. Later in his career, Baran would pioneer the airport metal detector. Paul Baran: It was necessary to have a strategic system that could withstand a first attack and then be able to return the favor in kind. The problem was that we didn’t have a survivable communications system, and so Soviet missiles aimed at U.S. missiles would take out the entire telephone- communication system. At that time the Strategic Air Command had just two forms of communication. One was the U.S. telephone system, or an overlay of that, and the other was high-frequency or shortwave radio. So that left us with the interesting situation of saying, Well, why do the communications fail when the bombs were aimed, not at the cities, but just at the strategic forces? And the answer was that the collateral damage was sufficient to knock out a telephone system that was highly centralized. Well, then, let’s not make it centralized. Let’s spread it out so that we can have other paths to get around the damage.
    [Show full text]
  • Features of the Internet History the Norwegian Contribution to the Development PAAL SPILLING and YNGVAR LUNDH
    Features of the Internet history The Norwegian contribution to the development PAAL SPILLING AND YNGVAR LUNDH This article provides a short historical and personal view on the development of packet-switching, computer communications and Internet technology, from its inception around 1969 until the full- fledged Internet became operational in 1983. In the early 1990s, the internet backbone at that time, the National Science Foundation network – NSFNET, was opened up for commercial purposes. At that time there were already several operators providing commercial services outside the internet. This presentation is based on the authors’ participation during parts of the development and on literature Paal Spilling is studies. This provides a setting in which the Norwegian participation and contribution may be better professor at the understood. Department of informatics, Univ. of Oslo and University 1 Introduction Defense (DOD). It is uncertain when DoD really Graduate Center The concept of computer networking started in the standardized on the entire protocol suite built around at Kjeller early 1960s at the Massachusetts Institute of Technol- TCP/IP, since for several years they also followed the ogy (MIT) with the vision of an “On-line community ISO standards track. of people”. Computers should facilitate communica- tions between people and be a support for human The development of the Internet, as we know it today, decision processes. In 1961 an MIT PhD thesis by went through three phases. The first one was the Leonard Kleinrock introduced some of the earliest research and development phase, sponsored and theoretical results on queuing networks. Around the supervised by ARPA. Research groups that actively same time a series of Rand Corporation papers, contributed to the development process and many mainly authored by Paul Baran, sketched a hypotheti- who explored its potential for resource sharing were cal system for communication while under attack that permitted to connect to and use the network.
    [Show full text]
  • Smith 1 CINE-GT 1807 Fall 2019 Madeline Smith December 13
    Smith 1 CINE-GT 1807 Fall 2019 Madeline Smith December 13, 2019 Assignment 2: Final Research Paper The History of Web Archiving and the Evolution of Archive-It’s Brozzler Since the beginning of the Internet and the World Wide Web in 1991, an unimaginable amount of data and content has been created, shared, posted, and stored on the World Wide Web. When the World Wide Web began, there was no system in place to archive and preserve the Web content, as no one could imagine how massive the infrastructure would become. It was not until the 1990s that users began to recognize the gravity of archiving and preserving all the incredibly diverse born-digital data and content on the Web. Web crawlers are a key component in accomplishing the mission to archive Web content before it is lost for good. While there have been advancements in web archiving over the years, considering the speed at which digital technology and the varied uses of the Internet are changing, there is still work to be done. One of the more recent web crawling technologies is Archive-It’s Brozzler. This report aims to frame Brozzler within the larger landscape of web archiving and web crawler technology. The report will attempt to answer whether Brozzler as a web archiving tool is effective for capturing dynamic websites and the rapidly evolving content of the modern web. The end of this report will be an examination of my own experience attempting to use Brozzler. In order to understand web archiving and web crawling, a few terms used in describing the evolution of the Internet and the World Wide Web need to be defined.
    [Show full text]
  • The People Who Invented the Internet Source: Wikipedia's History of the Internet
    The People Who Invented the Internet Source: Wikipedia's History of the Internet PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 22 Sep 2012 02:49:54 UTC Contents Articles History of the Internet 1 Barry Appelman 26 Paul Baran 28 Vint Cerf 33 Danny Cohen (engineer) 41 David D. Clark 44 Steve Crocker 45 Donald Davies 47 Douglas Engelbart 49 Charles M. Herzfeld 56 Internet Engineering Task Force 58 Bob Kahn 61 Peter T. Kirstein 65 Leonard Kleinrock 66 John Klensin 70 J. C. R. Licklider 71 Jon Postel 77 Louis Pouzin 80 Lawrence Roberts (scientist) 81 John Romkey 84 Ivan Sutherland 85 Robert Taylor (computer scientist) 89 Ray Tomlinson 92 Oleg Vishnepolsky 94 Phil Zimmermann 96 References Article Sources and Contributors 99 Image Sources, Licenses and Contributors 102 Article Licenses License 103 History of the Internet 1 History of the Internet The history of the Internet began with the development of electronic computers in the 1950s. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks. In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced.
    [Show full text]
  • Coronavirus Community Member Survey Appendix
    Billings Community Coronavirus Assessment CORONAVIRUS COMMUNITY MEMBER SURVEY APPENDIX December 2020 AmeriCorps VISTAs: Blake Matthew & Amber Nichols Page 1 of 173 V12/14/202020 INDEX Q1. How has the coronavirus pandemic impacted you and/or your family since April 1, 2020? Check all that apply. 3 Q2. To what degree were/are you and or your family impacted by the following? 9 Q3. If you lost income, or lost your job, what is/was your job title or job type? 12 Q5. To what degree do you have a support system in each of the following areas? 19 Q7. How aware are you of the following resources available through the State of Montana? 20 Q8. Please provide the degree to which you and your family have CURRENT access to the following resources. 21 Q9. Did you, or anyone in your household, apply for public assistance BEFORE April 1, 2020? 22 Q10. Did you, or anyone in your household, apply for public assistance AFTER April 1, 2020? 23 Q13. Did your total household members, or household makeup, change AFTER April 1, 2020? 24 Q14. Please share the race / ethnicity with which you and your household members identify. Please select the number of household members in each race(s) line AND select yes or no within the Hispanic or Latino column. 30 Q19. What is your household's greatest need relative to the coronavirus pandemic? 31 Q20. What do you believe is the Billings community's greatest need related to the coronavirus pandemic? 79 Q21. Is there anything else you would like to say regarding coronavirus impact(s) or how the Billings community should respond? 134 Page 2 of 173 V12/14/202020 CORONAVIRUS COMMUNITY MEMBER SURVEY Community Comments from Survey Questions This document contains comments from the Coronavirus Community Member Survey of Fall 2020.
    [Show full text]
  • Computer Viruses and Malware Advances in Information Security
    Computer Viruses and Malware Advances in Information Security Sushil Jajodia Consulting Editor Center for Secure Information Systems George Mason University Fairfax, VA 22030-4444 email: [email protected] The goals of the Springer International Series on ADVANCES IN INFORMATION SECURITY are, one, to establish the state of the art of, and set the course for future research in information security and, two, to serve as a central reference source for advanced and timely topics in information security research and development. The scope of this series includes all aspects of computer and network security and related areas such as fault tolerance and software assurance. ADVANCES IN INFORMATION SECURITY aims to publish thorough and cohesive overviews of specific topics in information security, as well as works that are larger in scope or that contain more detailed background information than can be accommodated in shorter survey articles. The series also serves as a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook treatment. Researchers, as well as developers, are encouraged to contact Professor Sushil Jajodia with ideas for books under this series. Additional tities in the series: HOP INTEGRITY IN THE INTERNET by Chin-Tser Huang and Mohamed G. Gouda; ISBN-10: 0-387-22426-3 PRIVACY PRESERVING DATA MINING by Jaideep Vaidya, Chris Clifton and Michael Zhu; ISBN-10: 0-387- 25886-8 BIOMETRIC USER AUTHENTICATION FOR IT SECURITY: From Fundamentals to Handwriting by Claus Vielhauer; ISBN-10: 0-387-26194-X IMPACTS AND RISK ASSESSMENT OF TECHNOLOGY FOR INTERNET SECURITY.'Enabled Information Small-Medium Enterprises (TEISMES) by Charles A.
    [Show full text]
  • Internet Hall of Fame Announces 2013 Inductees
    Internet Hall of Fame Announces 2013 Inductees Influential engineers, activists, and entrepreneurs changed history through their vision and determination Ceremony to be held 3 August in Berlin, Germany [Washington, D.C. and Geneva, Switzerland -- 26 June 2013] The Internet Society today announced the names of the 32 individuals who have been selected for induction into the Internet Hall of Fame. Honored for their groundbreaking contributions to the global Internet, this year’s inductees comprise some of the world’s most influential engineers, activists, innovators, and entrepreneurs. The Internet Hall of Fame celebrates Internet visionaries, innovators, and leaders from around the world who believed in the design and potential of an open Internet and, through their work, helped change the way we live and work today. The 2013 Internet Hall of Fame inductees are: Pioneers Circle – Recognizing individuals who were instrumental in the early design and development of the Internet: David Clark, David Farber, Howard Frank, Kanchana Kanchanasut, J.C.R. Licklider (posthumous), Bob Metcalfe, Jun Murai, Kees Neggers, Nii Narku Quaynor, Glenn Ricart, Robert Taylor, Stephen Wolff, Werner Zorn Innovators – Recognizing individuals who made outstanding technological, commercial, or policy advances and helped to expand the Internet’s reach: Marc Andreessen, John Perry Barlow, Anne-Marie Eklund Löwinder, François Flückiger, Stephen Kent, Henning Schulzrinne, Richard Stallman, Aaron Swartz (posthumous), Jimmy Wales Global Connectors – Recognizing individuals from around the world who have made significant contributions to the global growth and use of the Internet: Karen Banks, Gihan Dias, Anriette Esterhuysen, Steven Goldstein, Teus Hagen, Ida Holz, Qiheng Hu, Haruhisa Ishida (posthumous), Barry Leiner (posthumous), George Sadowsky “This year’s inductees represent a group of people as diverse and dynamic as the Internet itself,” noted Internet Society President and CEO Lynn St.
    [Show full text]
  • Abbate Ch1-2
    6 Introductum Wide Web are prominent examples of informally created applications that became popular, not as the result of some central agency's mar­ Heat and ,-,UIH..4< keting plan, but through the spontaneous decisions of thousands of a.ndMeanings of Hacket(Switching independent users. In reconstructing the history of the Internet, I have been struck time and again by. the unexpected twists and turns its development has taken. Often a well-laid plan was abandoned after a short time and replaced by a new approach from an unexpected quarter..Rapid advances, such as the introduction of personal computers and the invention of local-area networks, continually threatened to make existing network technologies obsolete. In addition, responsibility for operating the Internet changed hands several times over the course Of all the ARPANET's technical innovations, perhaps the most cele­ of its first thirty years or so. How, in the face of all this change and brated was packet switching. Packet switching was an experimental, uncertainty, did the system survive and even flourish? I believe that even controversial method for transmitting data across a network. Its the key to the Internet's success was a commitment to flexibility and proponents claimed that it would increase the efficiency, reliability, and diversity, both in technical design and in organizational culture. No speed of data communications, butit was also quite complex to imple­ one could predict the specific changes that would revolutionize the ment, and some communications experts argued that the technique computing and communications industries at the end of the twentieth would never work.
    [Show full text]