Usenet、Netnews
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Usenet News HOWTO
Usenet News HOWTO Shuvam Misra (usenet at starcomsoftware dot com) Revision History Revision 2.1 2002−08−20 Revised by: sm New sections on Security and Software History, lots of other small additions and cleanup Revision 2.0 2002−07−30 Revised by: sm Rewritten by new authors at Starcom Software Revision 1.4 1995−11−29 Revised by: vs Original document; authored by Vince Skahan. Usenet News HOWTO Table of Contents 1. What is the Usenet?........................................................................................................................................1 1.1. Discussion groups.............................................................................................................................1 1.2. How it works, loosely speaking........................................................................................................1 1.3. About sizes, volumes, and so on.......................................................................................................2 2. Principles of Operation...................................................................................................................................4 2.1. Newsgroups and articles...................................................................................................................4 2.2. Of readers and servers.......................................................................................................................6 2.3. Newsfeeds.........................................................................................................................................6 -
Eszter Babarczy: Community Based Trust on the Internet
PTE BTK Nyelvtudományi Doktori Iskola Kommunikáció Doktori Program Babarczy Eszter: Community Based Trust on the Internet Doktori értekezés Témavezető: Horányi Özséb egyetemi tanár 2011. 1 Community-based trust on the internet Tartalom Introduction .................................................................................................................................................. 3 II. A very brief history of the internet ........................................................................................................... 9 Early Days ............................................................................................................................................... 11 Mainstream internet .............................................................................................................................. 12 The internet of social software .............................................................................................................. 15 III Early trust related problems and solutions ............................................................................................ 20 Trading .................................................................................................................................................... 20 Risks of and trust in content ....................................................................................................................... 22 UGC and its discontents: Wikipedia ...................................................................................................... -
The Internet Is a Semicommons
GRIMMELMANN_10_04_29_APPROVED_PAGINATED 4/29/2010 11:26 PM THE INTERNET IS A SEMICOMMONS James Grimmelmann* I. INTRODUCTION As my contribution to this Symposium on David Post’s In Search of Jefferson’s Moose1 and Jonathan Zittrain’s The Future of the Internet,2 I’d like to take up a question with which both books are obsessed: what makes the Internet work? Post’s answer is that the Internet is uniquely Jeffersonian; it embodies a civic ideal of bottom-up democracy3 and an intellectual ideal of generous curiosity.4 Zittrain’s answer is that the Internet is uniquely generative; it enables its users to experiment with new uses and then share their innovations with each other.5 Both books tell a story about how the combination of individual freedom and a cooperative ethos have driven the Internet’s astonishing growth. In that spirit, I’d like to suggest a third reason that the Internet works: it gets the property boundaries right. Specifically, I see the Internet as a particularly striking example of what property theorist Henry Smith has named a semicommons.6 It mixes private property in individual computers and network links with a commons in the communications that flow * Associate Professor, New York Law School. My thanks for their comments to Jack Balkin, Shyam Balganesh, Aislinn Black, Anne Chen, Matt Haughey, Amy Kapczynski, David Krinsky, Jonathon Penney, Chris Riley, Henry Smith, Jessamyn West, and Steven Wu. I presented earlier versions of this essay at the Commons Theory Workshop for Young Scholars (Max Planck Institute for the Study of Collective Goods), the 2007 IP Scholars conference, the 2007 Telecommunications Policy Research Conference, and the December 2009 Symposium at Fordham Law School on David Post’s and Jonathan Zittrain’s books. -
Internet... the Final Frontier. Eine Ethnographie. Schlußbericht Des Projekts 'Interaktionsraum Internet. Netzkultur Und Ne
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Research Papers in Economics econstor www.econstor.eu Der Open-Access-Publikationsserver der ZBW – Leibniz-Informationszentrum Wirtschaft The Open Access Publication Server of the ZBW – Leibniz Information Centre for Economics Helmers, Sabine; Hoffmann, Ute; Hofmann, Jeanette Working Paper Internet... the final frontier: Eine Ethnographie. Schlußbericht des Projekts Interaktionsraum Internet. Netzkultur und Netzwerkorganisation Schriftenreihe der Abteilung Organisation und Technikgenese des Forschungsschwerpunktes Technik-Arbeit-Umwelt am Wissenschaftszentrum Berlin für Sozialforschung, No. FS II 98-112 Provided in cooperation with: Wissenschaftszentrum Berlin für Sozialforschung (WZB) Suggested citation: Helmers, Sabine; Hoffmann, Ute; Hofmann, Jeanette (1998) : Internet... the final frontier: Eine Ethnographie. Schlußbericht des Projekts Interaktionsraum Internet. Netzkultur und Netzwerkorganisation, Schriftenreihe der Abteilung Organisation und Technikgenese des Forschungsschwerpunktes Technik-Arbeit- Umwelt am Wissenschaftszentrum Berlin für Sozialforschung, No. FS II 98-112, http:// hdl.handle.net/10419/49813 Nutzungsbedingungen: Terms of use: Die ZBW räumt Ihnen als Nutzerin/Nutzer das unentgeltliche, The ZBW grants you, the user, the non-exclusive right to use räumlich unbeschränkte und zeitlich auf die Dauer des Schutzrechts the selected work free of charge, territorially unrestricted and beschränkte einfache Recht ein, das ausgewählte Werk im Rahmen within the time limit of the term of the property rights according der unter to the terms specified at → http://www.econstor.eu/dspace/Nutzungsbedingungen → http://www.econstor.eu/dspace/Nutzungsbedingungen nachzulesenden vollständigen Nutzungsbedingungen zu By the first use of the selected work the user agrees and vervielfältigen, mit denen die Nutzerin/der Nutzer sich durch die declares to comply with these terms of use. -
Jargon File, Version 4.0.0, 24 Jul 1996
JARGON FILE, VERSION 4.0.0, 24 JUL 1996 This is the Jargon File, a comprehensive compendium of hacker slang illuminating many aspects of hackish tradition, folklore, and humor. This document (the Jargon File) is in the public domain, to be freely used, shared, and modified. There are (by intention) no legal restraints on what you can do with it, but there are traditions about its proper use to which many hackers are quite strongly attached. Please extend the courtesy of proper citation when you quote the File, ideally with a version number, as it will change and grow over time. (Examples of appropriate citation form: "Jargon File 4.0.0" or "The on-line hacker Jargon File, version 4.0.0, 24 JUL 1996".) The Jargon File is a common heritage of the hacker culture. Over the years a number of individuals have volunteered considerable time to maintaining the File and been recognized by the net at large as editors of it. Editorial responsibilities include: to collate contributions and suggestions from others; to seek out corroborating information; to cross-reference related entries; to keep the file in a consistent format; and to announce and distribute updated versions periodically. Current volunteer editors include: Eric Raymond [email protected] Although there is no requirement that you do so, it is considered good form to check with an editor before quoting the File in a published work or commercial product. We may have additional information that would be helpful to you and can assist you in framing your quote to reflect not only the letter of the File but its spirit as well. -
Handling Information Overload on Usenet
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by NORA - Norwegian Open Research Archives UNIVERSITY OF OSLO Department of Informatics Handling Information Overload on Usenet Advanced Caching Methods for News Jan Ingvoldstad Cand Scient Thesis 4th August 2001 Abstract Usenet is the name of a world wide network of servers for group communica- tion between people. From 1979 and onwards, it has seen a near exponential growth in the amount of data transported, which has been a strain on band- width and storage. There has been a wide range of academic research with focus on the WWW, but Usenet has been neglected. Instead, Usenet’s evolu- tion has been dominated by practical solutions. This thesis describes the history of Usenet in a growth perspective, and introduces methods for collection and analysis of statistical data for testing the usefulness of various caching strategies. A set of different caching strategies are proposed and examined in light of bandwidth and storage demands as well as user perceived performance. I have shown that advanced caching methods for news offers relief for reading servers’ storage and bandwidth capacity by exploiting usage patterns for fetching or prefetching articles the users may want to read, but it will not solve the problem of near exponential growth nor the problems of Usenet’s backbone peers. Preface When I first started my studies at the University in Oslo in the autumn of 1991, I thought I was going to be a mathematician, and followed my first class in university level mathematics with vigor. -
Feminist Counter-Publicity in the Digital Age
Strange Spaces & Stranger Sensibilities: Feminist Counter-Publicity in the Digital Age by Bonnie Marilyn Washick A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Political Science) in the University of Michigan 2016 Doctoral Committee: Professor Elizabeth R. Wingrove (Chair) Assistant Professor André L. Brock Professor Lisa J. Disch Professor Don Herzog Associate Professor Mika LaVaque-Manty © Bonnie Marilyn Washick 2016 ACKNOWLEDGEMENTS In undertaking this project, it often seemed that writing was a brutal thing. There’s always more that could be said and, one suspects, more that is worth exploring before committing words to the page. What a pleasure, then, to write with such blistering certainty: I could not have done this without the guidance, advocacy, and support of many people. A thousand thanks are owed; I am grateful for the space to pay some small portion of that debt. I must begin by thanking my committee: Lisa Disch, André Brock, Don Herzog, Mika LaVaque-Manty, and my Dissertation Chair, Elizabeth Wingrove. I am so appreciative of Lisa Disch’s incisive reading and productively challenging feedback. André’s in-depth knowledge and experience with the study of digital media was invaluable, and I’m certain will continue to be so. Many thanks to Don Herzog for his willingness to go over my work with a fine-tooth comb, or simply riff on a theme over coffee. I probably should have taken you up more on the former, but it was the latter that made me excited about work. Thanks to Mika LaVaque-Manty for serving as my teaching mentor in addition to serving on my committee, and modeling an enthusiastic, inquisitive, and student-like (in the best of ways) approach to innovation in the classroom. -
Online Identifiers in Everyday Life
© 2010 by Benjamin M. Gross. All rights reserved. ONLINE IDENTIFIERS IN EVERYDAY LIFE BY BENJAMIN M. GROSS DISSERTATION Submied in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Library and Information Science in the Graduate College of the University of Illinois at Urbana-Champaign, 2010 Urbana, Illinois Doctoral Commiee: Associate Professor Michael Twidale, Chair Professor Geof Bowker, University of Pisburgh Professor Chip Bruce Associate Professor Ann Bishop Abstract Identifiers are an essential component of online communication. Email addresses and instant messenger usernames are two of the most common online identi- fiers. is dissertation focuses on the ways that social, technical and policy fac- tors affect individual’s behavior with online identifiers. Research for this dissertation was completed in two parts, an interview-based study drawn from two populations and an examination of the infrastructure for managing identifiers in two large consumer services. e exploratory study ex- amines how individuals use online identifiers to segment and integrate aspects of their lives. e first population is drawn from employees of a financial ser- vice firm with substantial constraints on communication in the workplace. e second population is drawn from a design firm with minimal constraints on com- munication. e two populations provide the opportunity to explore the social, technical, and policy issues that arise from diverse communication needs, uses, strategies, and technologies. e examination of systems focuses on the infras- tructure that Google and Yahoo! provide for individuals to manage their iden- tifiers across multiple services, and the risks and benefits of employing single sign-on systems. -
³5Hjxodwlqj´
29th November 2002 ,,,³5HJXODWLQJ´ $EXVH%XONHPDLO&U\SWRJUDSK\ 'HIDPDWLRQDQG(YHU\WKLQJHOVH WK-DQXDU\ 5LFKDUG&OD\WRQ These lecture notes were specially prepared for the Cambridge University Computer Science “Additional Topics” course, Michaelmas Term 2002. © Richard Clayton 2002 [email protected] Regulating rnc1 1 29th November 2002 2XWOLQH 7KHFODVVLFVHOIUHJXODWLRQDSSURDFK &KLOGSRUQRJUDSK\DQGRWKHUQDVW\WKLQJV 8QVROLFLWHGEXONHPDLO 6SDPRQ8VHQHW 5HJXODWLQJFU\SWRJUDSK\ 'DWDSUHVHUYDWLRQ :KDWDERXWQDWLRQDOERUGHUV" 'HIDPDWLRQ 7KH(&RPPHUFH'LUHFWLYH 29th November 2002 Regulating The slides give the broad outline of the lectures and the notes ensure that the details are properly recorded, lest they be skipped over on the day. However, it is at least arguable that it will be far more interesting to take notice of what I say off-the-cuff rather than relying on this document as an accurate rendition of what the lecture was really about! Also, please note that “IANAL” (I am not a lawyer). Consult a professional if you wish to receive accurate advice about the law! Regulating rnc1 2 29th November 2002 )XUWKHU5HDGLQJ (3ROLF\ ± 6HFXULW\(QJLQHHULQJ$QGHUVRQ ± &U\SWR6WHYHQ/HY\ ± KWWSZZZHIIRUJ ± KWWSZZZILSURUJ 1DVW\WKLQJV ± KWWSZZZLZIRUJXN ± KWWSZZZF\EHUULJKWVRUJ ± KWWSZZZILDZROGHPRQFRXN)$&EDFNKWP ³6SDP´ ± KWWSZZZFDXFHRUJ 29th November 2002 Regulating Since almost everything covered in this lecture has happened in the past six years it probably isn’t surprising to find very few books on the topic. However, almost all the original documents are still available online along with detailed records of the many discussions through which people came to understand the meaning of what was happening. Ross Anderson’s book covers slightly different areas than this lecture, reflecting in each case where we each had first hand experience. -
Democratic Participation in the Discursive Management of Usenet
Proceedings of the 35th Hawaii International Conference on System Sciences - 2002 1 Democratic Participation in the Discursive Management of Usenet John C. Paolillo, SLIS and Informatics and David Heald, Computer Science Indiana University, Bloomington <[email protected]> <[email protected]> voters can take advantage of the increased information Abstract available to them, and the greater freedom (i.e., the ability to “vote in one’s pajamas”) and lower costs [11] Internet voting, sometimes proposed as a means of afforded by online voting will thereby ameliorate past enhancing democratic participation, is partly inspired problems of potentially uninformed, apathetic elector- by the democratic process of newsgroup creation on ates and limited access to the polls on account of loca- Usenet. To better understand how online voting might tion, disability, race, etc. These forecasts raise the ex- influence democratic participation more generally, we pectation of higher election turnouts, including among conducted an empirical investigation into the voting traditionally disenfranchised groups. activity on newsgroups in the comp hierarchy of Use- In much this spirit of optimism, the Spring 2000 net since 1989. Counter to expectation, participation Arizona Democratic Party primary offered voters the does not appear to be organized into factions or interest option of casting online and mail-in ballots in addition groups, but rather there are distinct, individualized pat- to more traditional voting options. This experiment terns of voting. At a coarser level of analysis, some was not entirely successful, however, and it was chal- interest-based patterns do emerge, but these appear to lenged early on by voting-rights groups who feared that correspond to frequent individual voters instead of co- problems of differential access to the Internet could lead herent groups of voters. -
PKI Endbericht 24.05.13 12:28
PKI Endbericht 24.05.13 12:28 Startseite Über uns Endbericht (Hyper-)Texte Allerlei Interaktionen Sitemap Internet... the Final Frontier: eine Ethnographie Captain's Log Kulturraum Internet Regierende Techniken und Techniken des Regierens: zur Politik im Netz Hello Usenet - Good-bye? Über das Rauschen eines Mediums 'Last Chance for Common Sense': Interaktionsraum Internet in der Zusammenschau Literaturliste Akronyme und Abkürzungen Zusammenfassung Das im Herbst 1998 abgeschlossene Forschungsprojekt "Interaktionsraum Internet" hat sich mit den konstitutiven Merkmalen der Netzkultur und Netzwerkorganisation beschäftigt. Im Vordergrund des Interesses stand das dynamische Zusammenspiel technischer und gesellschaftlicher Konventionen in der Organisation wie auch im Wandel des Netzes. Die ethnographisch angeleitete Binnenperspektive auf das Internet konzentrierte sich auf drei ausgewählte Bereiche, um Prozesse der Institutionenbildung und die Formen ihrer Transformation zu studieren: die hegemoniale Betriebstechnik der Netzknoten (UNIX), die grundlegende Übertragungstechnik im Netz (das Internet Protokoll IP) und einen populären Kommunikationsdienst (Usenet). Der Schlußbericht des Projekts enthält die Ergebnisse der drei Untersuchungsstränge. Gezeigt wird anhand der Entwicklung in den drei Feldern, daß sich der Wandel des Netzes weder beliebig noch anarchisch vollzieht. Das dezentral organisierte Internet beruht vielmehr auf technisch wie http://duplox.wzb.eu/endbericht/index.html Seite 1 von 7 PKI Endbericht 24.05.13 12:28 organisatorisch verteilten Formen der Koordination, in denen individuelle Handlungspräferenzen kollektiv definitionsmächtig werden. Abstract The research project "Interaktionsraum Internet", which completed its mission in Autumn 1998, studied the constitutive features of network culture and network organization. Special emphasis was given to the dynamic interplay of technical and social conventions regarding both the Net's organization as well as its change. -
"A Shadow History of the Internet", Finn Brunton
SPAM INFRASTRUCTURES SERIES EDITED BY GEOFFREY BOWKER AND PAUL N. EDWARDS Paul N. Edwards, A Vast Machine: Computer Models, Climate Data, and the Politics of Global Warming Lawrence M. Busch, Standards: Recipes for Reality Lisa Gitelman, ed., “ Raw Data ” Is an Oxymoron Finn Brunton, Spam: A Shadow History of the Internet Nil Disco and Eda Kranakis, eds., Cosmopolitan Commons: Sharing Resources and Risks across Borders SPAM A SHADOW HISTORY OF THE INTERNET FINN BRUNTON THE MIT PRESS CAMBRIDGE, MASSACHUSETTS LONDON, ENGLAND © 2013 Massachusetts Institute of Technology All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or informa- tion storage and retrieval) without permission in writing from the publisher. MIT Press books may be purchased at special quantity discounts for business or sales promotional use. For information, please email [email protected] or write to Special Sales Department, The MIT Press, 55 Hayward Street, Cam- bridge, MA 02142. This book was set in Engravers Gothic and Bembo by Toppan Best-set Premedia Limited, Hong Kong. Printed and bound in the United States of America. Library of Congress Cataloging-in-Publication Data Brunton, Finn, 1980 – Spam : a shadow history of the Internet / Finn Brunton. pages cm. — (Infrastructures) Includes bibliographical references and index. ISBN 978-0-262-01887-6 (hardcover : alk. paper) 1. Spam (Electronic mail)— History. I. Title. HE7553.B78 2013 384.3 ' 4 — dc23 2012034252 10 9 8 7 6 5 4 3 2 1 This book is dedicated to the memory of Gunard Solberg, dear friend and inspiration, deeply missed.