Forecasting Disk Resource Requirements for a Usenet Server
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Freedom of Speech at Risk in Cyberspace: Obscenity Doctrine and a Frightened University's Censorship of Sex on the Internet
NOTES THE FREEDOM OF SPEECH AT RISK IN CYBERSPACE: OBSCENITY DOCTRINE AND A FRIGHTENED UNIVERSITY'S CENSORSHIP OF SEX ON THE INTERNET JEFFREY E. FAUCETrE INTRODUcTION On November 8, 1994, Carnegie Mellon University (CMU) removed' a small handful of topics from among the thousands of Usenet newsgroups2 subscribed to by the university computer sys- tem and available on the Internet' .because they contained en- coded sexually explicit images Under the new policy announced by Erwin Steinberg, university vice provost for education, none of the university's 9,000 computers would list the approximately forty newsgroups.5 The newsgroups that were censored are all known as "binaries,"6 and they contain, among other things, encoded imag- 1. Despite the University's restriction on the sexually explicit newsgioups, techno- logically adept students can circumvent the policy by accessing the groups through other file servers. However, for the purposes of this Note, the efforts of these enterprising students are not important when compared with the symbolic effect of the censorship. 2. These newsgroups are "bulletin board-style discussion groups" that can be read from, responded to, and downloaded to an individual's computer. See David Landis, Ex- ploring the Online Universe, USA TODAY, Oct. 7, 1993, at 4D. The Usenet newsgroups are available worldwide via Internet. See id. 3. The Internet is the most commonly known "wide area network" (WAN). It "evolved from networks established by the Department of Defense and the National Science Foundation. [The] Internet connects various government, university, and corporate entities, spans 137 nations, and has at least fifteen million users." Eric Schlachter, Cyberspace, the Free Market and the Free Marketplace of Ideas: Recognizing Legal Differ- ences in Computer Bulletin Board Functions, 16 HASTINGS COMM. -
Cyber-Synchronicity: the Concurrence of the Virtual
Cyber-Synchronicity: The Concurrence of the Virtual and the Material via Text-Based Virtual Reality A dissertation presented to the faculty of the Scripps College of Communication of Ohio University In partial fulfillment of the requirements for the degree Doctor of Philosophy Jeffrey S. Smith March 2010 © 2010 Jeffrey S. Smith. All Rights Reserved. This dissertation titled Cyber-Synchronicity: The Concurrence of the Virtual and the Material Via Text-Based Virtual Reality by JEFFREY S. SMITH has been approved for the School of Media Arts and Studies and the Scripps College of Communication by Joseph W. Slade III Professor of Media Arts and Studies Gregory J. Shepherd Dean, Scripps College of Communication ii ABSTRACT SMITH, JEFFREY S., Ph.D., March 2010, Mass Communication Cyber-Synchronicity: The Concurrence of the Virtual and the Material Via Text-Based Virtual Reality (384 pp.) Director of Dissertation: Joseph W. Slade III This dissertation investigates the experiences of participants in a text-based virtual reality known as a Multi-User Domain, or MUD. Through in-depth electronic interviews, staff members and players of Aurealan Realms MUD were queried regarding the impact of their participation in the MUD on their perceived sense of self, community, and culture. Second, the interviews were subjected to a qualitative thematic analysis through which the nature of the participant’s phenomenological lived experience is explored with a specific eye toward any significant over or interconnection between each participant’s virtual and material experiences. An extended analysis of the experiences of respondents, combined with supporting material from other academic investigators, provides a map with which to chart the synchronous and synonymous relationship between a participant’s perceived sense of material identity, community, and culture, and her perceived sense of virtual identity, community, and culture. -
Against Cyberanarchy"
AGAINST "AGAINST CYBERANARCHY" By David G. Posit TABLE OF CONTENTS I. IN TRO DUCTION .....................................................................................................1365 II. UNEXCEPTIONALISM IN CYBERSPACE ................................................................... 1366 III. SETTLED PRINCIPLES ............................................................................................ 1371 IV . FUNCTIONAL IDENTITY ......................................................................................... 1373 V . SC A LE ...................................................................................................................1376 V I. E FFEC TS ................................................................................................................ 138 1 V II. CON SEN T ..............................................................................................................1384 V III. CONCLUDING THOUGHTS .....................................................................................1386 I. INTRODUCTION It makes me indignant when I hear a work Blamed not because it's crude or graceless but Only because it's new... Had the Greeks hated the new the way we do, Whatever would have been able to grow to be old?' Professor Jack Goldsmith's Against Cyberanarchy2 has become one of the most influential articles in the cyberspace law canon. The position he sets forth-what I call "Unexceptionalism"-rests on two main premises. The first is that activity in cyberspace is "functionally identical to -
Liminality and Communitas in Social Media: the Case of Twitter Jana Herwig, M.A., [email protected] Dept
Liminality and Communitas in Social Media: The Case of Twitter Jana Herwig, M.A., [email protected] Dept. of Theatre, Film and Media Studies, University of Vienna 1. Introduction “What’s the most amazing thing you’ve ever found?” Mac (Peter Riegert) asks Ben, the beachcomber (Fulton Mackay), in the 1983 film Local Hero. ”Impossible to say,” Ben replies. “There’s something amazing every two or three weeks.” Substitute minutes for weeks, and you have Twitter. On a good day, something amazing washes up every two or three minutes. On a bad one, you irritably wonder why all these idiots are wasting your time with their stupid babble and wish they would go somewhere else. Then you remember: there’s a simple solution, and it’s to go offline. Never works. The second part of this quote has been altered: Instead of “Twitter”, the original text referred to “the Net“, and instead of suggesting to “go offline”, author Wendy M. Grossman in her 1997 (free and online) publication net.wars suggested to “unplug your modem”. Rereading net.wars, I noticed a striking similarity between Grossman’s description of the social experience of information sharing in the late Usenet era and the form of exchanges that can currently be observed on micro-blogging platform Twitter. Furthermore, many challenges such as Twitter Spam or ‘Gain more followers’ re-tweets (see section 5) that have emerged in the context of Twitter’s gradual ‘going mainstream’, commonly held to have begun in fall 2008, are reminiscent of the phenomenon of ‘Eternal September’ first witnessed on Usenet which Grossman reports. -
Usenet News HOWTO
Usenet News HOWTO Shuvam Misra (usenet at starcomsoftware dot com) Revision History Revision 2.1 2002−08−20 Revised by: sm New sections on Security and Software History, lots of other small additions and cleanup Revision 2.0 2002−07−30 Revised by: sm Rewritten by new authors at Starcom Software Revision 1.4 1995−11−29 Revised by: vs Original document; authored by Vince Skahan. Usenet News HOWTO Table of Contents 1. What is the Usenet?........................................................................................................................................1 1.1. Discussion groups.............................................................................................................................1 1.2. How it works, loosely speaking........................................................................................................1 1.3. About sizes, volumes, and so on.......................................................................................................2 2. Principles of Operation...................................................................................................................................4 2.1. Newsgroups and articles...................................................................................................................4 2.2. Of readers and servers.......................................................................................................................6 2.3. Newsfeeds.........................................................................................................................................6 -
The Internet Is a Semicommons
GRIMMELMANN_10_04_29_APPROVED_PAGINATED 4/29/2010 11:26 PM THE INTERNET IS A SEMICOMMONS James Grimmelmann* I. INTRODUCTION As my contribution to this Symposium on David Post’s In Search of Jefferson’s Moose1 and Jonathan Zittrain’s The Future of the Internet,2 I’d like to take up a question with which both books are obsessed: what makes the Internet work? Post’s answer is that the Internet is uniquely Jeffersonian; it embodies a civic ideal of bottom-up democracy3 and an intellectual ideal of generous curiosity.4 Zittrain’s answer is that the Internet is uniquely generative; it enables its users to experiment with new uses and then share their innovations with each other.5 Both books tell a story about how the combination of individual freedom and a cooperative ethos have driven the Internet’s astonishing growth. In that spirit, I’d like to suggest a third reason that the Internet works: it gets the property boundaries right. Specifically, I see the Internet as a particularly striking example of what property theorist Henry Smith has named a semicommons.6 It mixes private property in individual computers and network links with a commons in the communications that flow * Associate Professor, New York Law School. My thanks for their comments to Jack Balkin, Shyam Balganesh, Aislinn Black, Anne Chen, Matt Haughey, Amy Kapczynski, David Krinsky, Jonathon Penney, Chris Riley, Henry Smith, Jessamyn West, and Steven Wu. I presented earlier versions of this essay at the Commons Theory Workshop for Young Scholars (Max Planck Institute for the Study of Collective Goods), the 2007 IP Scholars conference, the 2007 Telecommunications Policy Research Conference, and the December 2009 Symposium at Fordham Law School on David Post’s and Jonathan Zittrain’s books. -
Sending Newsgroup and Instant Messages
7.1 LESSON 7 Sending Newsgroup and Instant Messages After completing this lesson, you will be able to: Send and receive newsgroup messages Create and send instant messages Microsoft Outlook offers some alternatives to communicating via e-mail. With instant messages, you can connect with a client who is also using instant messaging to ask a simple question and get the answer immediately. On the other hand, Newsgroups allow you to communicate with a larger audience. When considering the purchase of a new graphics program, for example, you can solicit advice and recommendations by posting a message to a newsgroup for people interested in graphics. You don’t need any practice files to work through the exercises in this lesson. Sending and Receiving Newsgroup Messages A newsgroup is a collection of messages related to a particular topic that are posted by individuals to a news server . Newsgroups are generally focused on discussion of a particular topic, like a sports team, a hobby, or a type of software. Anyone with access to the group can post to the group and read all posted messages. Some newsgroups have a moderator who monitors their use, but most newsgroups are not overseen in this way. A newsgroup can be private, such as an internal company newsgroup, but there are newsgroups open to the public for practically every topic. You gain access to newsgroups through a news server maintained either on your organization’s network or by your Internet service provider (ISP). You use a newsreader program to download, read, and reply to news messages. -
Feed Your ‘Need to Read’ – an Explanation of RSS
by Jen Sharp, jensharp.com Feed your ‘Need To Read’ – an explanation of RSS here exists a useful informational tool so powerful that provides feeds. For example, USA Today has separate that the government of China has completely feeds in its different sections. You know that a page has the banned its use since 2007. Yet many people have capabilities for RSS subscriptions by looking for the orange Tnot even heard about it, despite its juxtaposition in chicklet in the toolbar of your browser. Clicking on the logo front of our attention during our experiences on the web. will start you in the process of seeing what the feed for that Recently I was visiting with my dad, who is well-informed page looks like. Then you can choose how to subscribe. and somewhat technically savvy. I asked him if he had ever Choosing a reader can seem overwhelming, as there are heard of RSS feeds. He hadn’t, so when I pointed out the thousands of readers available, most of them for free. To ever-present orange “chicklet,” he remarked, “Oh! I thought start, decide how you what to view the information. RSS that was the logo for Home Depot!” feeds can be displayed in many ways, including: Very simply, RSS feeds are akin to picking up your ■ sent to your email inbox favorite newspaper and scanning the headlines for a story ■ as a personal browser start page like igoogle.com or you are interested in. Items are displayed with a synopsis and my.yahoo.com links to the full page of information. -
RE-SONANCE---Inov-Em---Be-R-1-9
GENERAL I ARTICLE Web Search Engines How to Get What You Want from the World Wide Web T B Rajashekar The world wide web is emerging as an all-in-one infonnation source. Tools for searching web-based information includes search engines, subject directories and meta search tools. We take a look at the key features of these tools and suggest-practical hints for effective web searching. Introduction T B Rajashekar is with the National Centre for We have seen phenomenal growth in the quantity of published Science Information information (books, journals, conferences, etc.) since the (NCSI), Indian Institute of Science, Bangalore. industrial revolution. Varieties of print and electronicindices His interests include text have been developed to retain control over this growth and to retrieval, networked facilitate quick identification of relevant information. These information systems and include library catalogues (manual and computerised), services, digital collection development abstracting and indexing journals, directories and bibliographic and managment and databases. Bibliographic databases emerged in the 1970's as an electronic publishing. outcome ofcomputerised production of abstracting and indexing journals like Chemical Abstracts, Biological Abstracts and Physics Abstracts. They grew very rapidly, both in numbers and coverage (e.g. news, commercial, business, financial and technology information) and have been available for online access from database host companies like Dialog and STN International, and also delivered on electronic media like tapes, diskettes and CD-ROMs. These databases range in volume from a few thousand to several million records. Generally, content of these databases is of high quality, authoritative and edited. By employing specially developed search and retrieval programs, these databases could be rapidly scanned and relevant records extracted. -
Congressional Record—Senate S9017
June 26, 1995 CONGRESSIONAL RECORD — SENATE S9017 the problems of decolonization. It has After this history, the image of puter networks, I believe Congress outlived its purpose. Rather than President Nelson Mandela—a man im- must act and do so in a constitutional search for a new purpose for this Coun- prisoned for 27 years in his fight manner to help parents who are under cil, we should ask whether it should against apartheid—handing the World assault in this day and age. There is a exist at all. Cup trophy to the white captain of the flood of vile pornography, and we must Mr. President, the other major area rugby team is indeed a powerful sym- act to stem this growing tide, because, for reform is in our thinking about bol of the dramatic changes in South in the words of Judge Robert Bork, it what the United Nations is and what Africa. Throughout the country, whites incites perverted minds. I refer to its role should be in American foreign and blacks alike celebrated the victory Judge Bork from the Spectator article policy. We cannot expect the United of the Springboks, the mascot of the that I have permission to insert in the Nations to be clearer in purpose than is national team. RECORD. its most powerful member state. Mr. President, I join with the inter- My bill, again, is S. 892, and provides At its core, the United Nations is a national community in congratulating just this sort of constitutional, nar- collection of sovereign states and is be- the people of South Africa on winning rowly focused assistance in protecting holden to them for guidance, funding, the rugby World Cup. -
Newsreaders.Com: Getting Started: Netiquette
Usenet Netiquette NewsReaders.com: Getting Started: Netiquette I hope you will try Giganews or UsenetServer for your news subscription -- especially as a holiday present for your friends, family, or yourself! Getting Started (Netiquette) Consult various Netiquette links The Seven Don'ts of Usenet Google Groups Posting Style Guide Introduction to Usenet and Netiquette from NewsWatcher manual Quoting Style by Richard Kettlewell Other languages: o Voila! Francois. o Usenet News German o Netiquette auf Deutsch! Some notes from me: Read a newsgroup for a while before posting o By reading the group without posting (known as "lurking") for a while, or by reading the group archives on Google, you get a sense of the scope and tone of the group. Consult the FAQ before posting. o See Newsgroups page to find the FAQ for a particular group o FAQ stands for Frequently Asked Questions o a FAQ has not only the questions, but the answers! o Thus by reading the FAQ you don't post questions that have been asked (and answered) ad infinitum See the configuring software section regarding test posts (only post tests to groups with name ending in ".test") and not posting a duplicate post in the mistaken belief that your initial post did not go through. Don't do "drive through" posts. o Frequently someone who has an urgent question will post to a group he/she does not usually read, and then add something like "Please reply to me directly since I don't normally read this group." o Newsgroups are meant to be a shared experience. -
Back to the Future: Tracing the Roots and Learning Affordances of Social Software
1 Chapter 1 Back to the Future: Tracing the Roots and Learning Affordances of Social Software Nada Dabbagh George Mason University, USA Rick Reo George Mason University, USA ABSTRACT This chapter provides a developmental perspective on Web 2.0 and social software by tracing the historical, theoretical, and technological events of the last century that led to the emergence—or re- emergence, rather—of these powerful and transformative tools in a big way. The specific goals of the chapter are firstly, to describe the evolution ofsocial software and related pedagogical constructs from pre- and early Internet networked learning environments to current Web 2.0 applications, and secondly, to discuss the theoretical underpinnings of social learning environments and the pedagogical implica- tions and affordances of social software in e-learning contexts. The chapter ends with a social software use framework that can be used to facilitate the application of customized and personalized e-learning experiences in higher education. INTRODUCTION with their use to augment computational and com- munication capabilities and foster collaboration Is social software merely a continuation of a broad and social interaction, and progressing to their class of older computer-mediated communica- Web 2.0-enabled information aggregation capa- tion (CMC) and collaboration tools, or does it bilities. Throughout this chronological depiction, represent a significant transformation of social we emphasize the socio-pedagogic affordances interaction capabilities? In this chapter, we trace and implications of social software. We conclude the evolution of social software tools, beginning the chapter with a social software use continuum to guide the design of e-learning experiences in academic contexts.