Bastard Culture! User Participation and the Extension of Cultural Industries by Mirko Tobias Schäfer

Total Page:16

File Type:pdf, Size:1020Kb

Bastard Culture! User Participation and the Extension of Cultural Industries by Mirko Tobias Schäfer Mirko Tobias Schäfer Bastard Culture! User participation and the extension of cultural industries by Mirko Tobias Schäfer This text is licensed under the Creative Commons Attribution-Non-Commercial- No Derivative Works 3.0 Unported License. You are free to share, copy, distribute, transmit the work. <http://creativecommons.org/licenses/by-nc-nd/3.0> Printed by All Print Utrecht, The Netherlands ISBN 978-90-393-4973-1 Bastard Culture! User participation and the extension of cultural industries User-Partizipation und die Ausweitung der Kulturindustrien (mit einer Zusammenfassung in deutscher Sprache) User-participatie en de uitbreiding van de culturele industrie. (met een samenvatting in het Nederlands) Proefschrift ter verkrijging van de graad van doctor aan de Universiteit Utrecht op gezag van de rector magnificus, prof. dr. J.C. Stoof, ingevolge het besluit van het college voor promoties in het openbaar te verdedigen op maandag 1 december 2008 des middags te 12.45 uur door Mirko Tobias Schäfer geboren op 15 maart 1974 te Tübingen am Neckar, Duitsland Promotor: Prof. dr. F. E. Kessler Co-promotor: Dr. J. F.F. Raessens Table of Contents Preface and Acknowledgments...............................................................7 Introduction........................................................................................13 Yet another media revolution?.........................................................13 Don't believe the hype!....................................................................21 Analyzing participatory culture.........................................................25 Structure........................................................................................38 1. Promising revolutionary change........................................................41 Cisco Systems: Empowering the Internet Generation..........................52 2. Cultural critique and media technology.............................................59 2.1 New Media, new participation?.................................................69 2.2 Domains of user participation....................................................77 2.3 Explicit and implicit participation................................................85 2.4 Tracking technology in media practice........................................89 3. Enabling/averting participation........................................................93 3.1 The Computer..........................................................................97 3.2 Software................................................................................109 Software is in-material..............................................................110 Software is modular.................................................................115 Software is tentative..................................................................118 3.3 The Internet...........................................................................125 4. Bastard Culture............................................................................135 4.1 Hacking electronic consumer goods.........................................139 The Trail of the XDK.................................................................144 A Penguin on Bill's black box: the Xbox Linux Project....................160 Hacking the AIBO and teaching Sony to back off........................167 Heterogeneous participation.....................................................178 4.2 Participation as default design.................................................183 Managing information and social interaction..............................188 Floating archives......................................................................198 Hybrid participation..................................................................209 5. The extension of the culture industry................................................215 5.1 Confrontation: Fighting participation........................................223 Modchips, gray markets and big business...................................233 Open-source software, from hobbyists to business.......................236 Music and movies, the unbearable lightness of P2P.....................242 5.2 Implementation: designing participation...................................255 Trapped on Death Star. Let the fans do the work.........................259 Hosting File Sharing, Thriving on Piracy......................................262 Participation inside: the Web 2.0...............................................264 5.3 Integration: embracing participation.........................................273 Developing software: Google Maps...........................................274 Spreading music: Last.fm..........................................................278 Creating knowledge: Wikipedia.................................................282 Conclusion: Challenges for a participatory culture.................................................289 Understanding Participation...........................................................289 Shaping Society............................................................................292 Resources........................................................................................299 Literature.........................................................................................301 Appendix A, Abbreviations.................................................................317 Appendix B, Glossary........................................................................319 Zusammenfassung............................................................................325 Samenvatting...................................................................................327 Curriculum Vitae...............................................................................331 6 Preface and Acknowledgments While being a freshman at Vienna University in 1996, where I had enrolled in theater and communication studies, I had to take up a job to pay my rent. After a while of doing construction work for a shady landlord, I was hired by a small advertising company that had just pulled in a contract from an uprising IT company. When meeting my future boss in the lobby of Vienna's World Trade Center at Vienna Airport, I had no idea that this job would profoundly change my life. Our task was nothing less than introducing Cisco Systems—the market leader in networking technologies—to the Austrian market, and explaining pretty much to every businessman and woman between Vienna and Salzburg what this thing called Internet was about. Back then we usually heard people ask, where this Internet was located, who was in charge of it, which company was running it, and how long we would estimate the Internet would be around. The folks at Cisco were professional enthusiasts, completely dedicated to bringing the Internet to each and every person on the planet. The planet? One day I saw a poster hanging in a Cisco office, displaying a stereotypical photo of a flying saucer. The caption on the poster said: If they have a router on board, we can talk to them! It was all about those routers, the network technology routing information packets from source to destination, from sender to receiver, and enabling to browse the Web, send e-mails, download music files or play games online. While moving along with the rising new economy, and literally moving from a make-shift office in an aircraft hangar to a posh outfit at the 24th floor of the new built Millennium Tower, I got sucked more and more deeply into the Internet, running up extremely high telephone bills when surfing the web from my student flat, and therefore spending more and more time at the company where I could use all the facilities for free. I had the feeling of witnessing history in the making, and I truly felt part of a revolutionary wave transforming society, communications and social relations on a global scale. However, in contrast to my employers, I thought there is more to the Internet than transforming each corner store into a web portal. And I could not swallow the hype without any second thoughts; I could never completely abandon my doubts when the IT crowd was partying hard and burning through their money. Unfortunately there were only few scholars in Austria who wanted to consider the Internet as a field of research or an object for developing cultural theories further. Luckily in 1999 I got the chance to join the recently established program for new media studies at Utrecht University, where my personal experi- ence of digital culture was confronted with analysis and further theorizing. I was also lucky to meet a bunch of geeks, nerds and fellow enthusiasts, in both countries, the Netherlands and Austria. We decided that our experience and knowledge needed a platform and together we founded [d]vision, the Vienna Festival for Digital Culture, a rogue undertaking, financed by shamelessly exploiting the resources of our new economy employers, and borrowing resources from unflinching or somehow pursued friendlies. And, of course, creative accounting, and slick Power Point presentations, as well as some influ- ential connections were helpful, too. Three years in a row we ran an almost no- budget festival on all subjects that mattered to us most in digital culture and we invited many of the interesting and inspiring people we ever wanted to talk to. We screened amazing films, hosted heated debates and unforgettable parties, while the new economy was crumbling apart in crashing stock markets. When the day jobs
Recommended publications
  • Computer Game Mods, Modders, Modding, and the Mod Scene
    Computer Game Mods, Modders, Modding, and the Mod Scene Walt Scacchi Institute for Software Research and Center for Computer Games and Virtual Worlds University of California, Irvine 92697-3455 USA March 2010 Abstract Computer games have increasingly been the focus of user-led innovations in the form of game mods. This paper examines how different kinds of socio-technical affordances serve to organize the actions of the people who develop and share their game mods. The affordances examined include customization and tailoring mechanisms, software and content copyright licenses, game software infrastructure and development tools, career contingencies and organizational practices of mod teams, and social worlds intersecting the mod scene. Numerous examples will be used to ground this review and highlight how such affordances can organize, facilitate or constrain what can be done. Overall, this study helps to provide a deeper understanding of how a web of associated affordances collectively serve to govern what mods get made, how modding practices emerge and flourish, and how modders and the game industry serve each others' interests, though not always in equivocal terms. Introduction Computer game mods are a leading form of user-led innovation in game design and game play experience. But modded games are not standalone systems, as they require the user to have an originally acquired or authorized copy of the unmodded game. Thus, there are questions of not only who creates what and who owns such modified games, but also whether or how the practice of game modding is controlled or governed by external parties to ultimately exploit the efforts of game modders.
    [Show full text]
  • Online Software Copyright Infringement and Criminal Enforcement
    Online Software Copyright Infringement and Criminal Enforcement Submitted: May 14, 2005 Randy K. Baldwin American University Washington College of Law What are Warez and Who Trades Them? This paper will discuss infringement of software copyrights with a focus on criminal ‘warez trading‘ of copyrighted software on the Internet. Warez are infringing electronic, digital copies of copyrighted works whose copy protection measures have been removed.1 Warez are most often ‘cracked’ software programs whose digital rights management (DRM) and copy control measures have been circumvented. Once DRM controls have been disabled, warez are subsequently distributed and traded on the Internet, usually without any direct financial gain to the distributors and traders.2 Distribution of warez usually starts as small-scale deployments from password- protected file transfer protocol (FTP) servers and encrypted and/or password-protected web sites run by warez groups. Warez are then traded on the Internet among broader groups via direct peer-to-peer (P2P) connections, and encrypted emails with warez attachments. Trading and downloading of warez is coordinated via closed, invite-only Internet Relay Chat (IRC) channels, Pretty Good Privacy (PGP) encrypted email, Instant Messaging (IM), private chat rooms, direct connect P2P networks, and messages posted to Usenet groups under pseudonyms.3 Servers and sites hosting warez and communications means used by warez traders are designed to avoid detection and identification by law enforcement.4 File and directory names are intentionally 1 Goldman, Eric, A Road to No Warez: The No Electronic Theft Act and Criminal Copyright Infringement. 82 Or. L. Rev. 369, 370-371 (2003). [hereinafter Road to No Warez], available at http://ssrn.com/abstract=520122 (last visited May 9, 2005) (on file with author) (Defines warez and warez trading.
    [Show full text]
  • Histories of Internet Games and Play: Space, Technique, and Modality Teodor E
    University of Wollongong Research Online Faculty of Law, Humanities and the Arts - Papers Faculty of Law, Humanities and the Arts 2017 Histories of internet games and play: space, technique, and modality Teodor E. Mitew University of Wollongong, [email protected] Christopher L. Moore University of Wollongong, [email protected] Publication Details Mitew, T. E. & Moore, C. L. "Histories of internet games and play: space, technique, and modality." The Routledge companion to global internet histories. Ed.G. Goggin & M. J. McLelland. London, United Kingdom: Routledge, 2017, 448-460. Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library: [email protected] Histories of internet games and play: space, technique, and modality Keywords space, play, histories, games, modality, internet, technique Disciplines Arts and Humanities | Law Publication Details Mitew, T. E. & Moore, C. L. "Histories of internet games and play: space, technique, and modality." The Routledge companion to global internet histories. Ed.G. Goggin & M. J. McLelland. London, United Kingdom: Routledge, 2017, 448-460. This book chapter is available at Research Online: https://ro.uow.edu.au/lhapapers/3657 HISTORIES OF INTERNET GAMES AND PLAY: SPACE, TECHNIQUE, AND MODALITY Teodor Mitew and Christopher Moore Introduction It would be a daunting task to attempt an authoritative history of the Internet and play, and it is not our intention to sketch such an account, in the singular, even if the space allowed for it. Rather, we have undertaken a preliminary mapping of those elements which, we argue, should participate in the telling of the histories of Internet games.
    [Show full text]
  • Succeeding in Mobile Application Markets
    Succeeding in Mobile Application Markets (From Development Point of View) by Ehsan Noei A thesis submitted to the Electrical and Computer Engineering Department in conformity with the requirements for the degree of Doctor of Philosophy Queen's University Kingston, Ontario, Canada September 2018 Copyright c Ehsan Noei, 2018 Abstract Mobile application (app) markets, such as Google Play Store, are immensely compet- itive for app developers. Receiving high star-ratings and achieving higher ranks are two important elements of success in the market. Therefore, developers continuously enhance their apps to survive and succeed in the competitive market of mobile apps. We investigate various artifacts, such as users' mobile devices and users' feedback, to identify the factors that are statistically significantly related to star-ratings and ranks. First, we determine app metrics, such as user-interface complexity, and device metrics, such as screen size, that share a significant relationship with star-ratings. Hence, developers would be able to prioritize their testing efforts with respect to cer- tain devices. Second, we identify the topics of user-reviews (i.e., users' feedback) that are statistically significantly related to star-ratings. Therefore, developers can narrow down their activities to the user-reviews that are significantly related to star-ratings. Third, we propose a solution for mapping user-reviews (from Google Play Store) to issue reports (from GitHub). The proposed approach achieves a precision of 79%. Fourth, we identify the metrics of issue reports prioritization, such as issue report title, that share a significant relationship with star-ratings. Finally, we determine the rank trends in the market.
    [Show full text]
  • Bibliography of Erik Wilde
    dretbiblio dretbiblio Erik Wilde's Bibliography References [1] AFIPS Fall Joint Computer Conference, San Francisco, California, December 1968. [2] Seventeenth IEEE Conference on Computer Communication Networks, Washington, D.C., 1978. [3] ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, Los Angeles, Cal- ifornia, March 1982. ACM Press. [4] First Conference on Computer-Supported Cooperative Work, 1986. [5] 1987 ACM Conference on Hypertext, Chapel Hill, North Carolina, November 1987. ACM Press. [6] 18th IEEE International Symposium on Fault-Tolerant Computing, Tokyo, Japan, 1988. IEEE Computer Society Press. [7] Conference on Computer-Supported Cooperative Work, Portland, Oregon, 1988. ACM Press. [8] Conference on Office Information Systems, Palo Alto, California, March 1988. [9] 1989 ACM Conference on Hypertext, Pittsburgh, Pennsylvania, November 1989. ACM Press. [10] UNIX | The Legend Evolves. Summer 1990 UKUUG Conference, Buntingford, UK, 1990. UKUUG. [11] Fourth ACM Symposium on User Interface Software and Technology, Hilton Head, South Carolina, November 1991. [12] GLOBECOM'91 Conference, Phoenix, Arizona, 1991. IEEE Computer Society Press. [13] IEEE INFOCOM '91 Conference on Computer Communications, Bal Harbour, Florida, 1991. IEEE Computer Society Press. [14] IEEE International Conference on Communications, Denver, Colorado, June 1991. [15] International Workshop on CSCW, Berlin, Germany, April 1991. [16] Third ACM Conference on Hypertext, San Antonio, Texas, December 1991. ACM Press. [17] 11th Symposium on Reliable Distributed Systems, Houston, Texas, 1992. IEEE Computer Society Press. [18] 3rd Joint European Networking Conference, Innsbruck, Austria, May 1992. [19] Fourth ACM Conference on Hypertext, Milano, Italy, November 1992. ACM Press. [20] GLOBECOM'92 Conference, Orlando, Florida, December 1992. IEEE Computer Society Press. http://github.com/dret/biblio (August 29, 2018) 1 dretbiblio [21] IEEE INFOCOM '92 Conference on Computer Communications, Florence, Italy, 1992.
    [Show full text]
  • An Analysis of the Dynamic Behavior of Javascript Programs
    An Analysis of the Dynamic Behavior of JavaScript Programs Gregor Richards Sylvain Lebresne Brian Burg Jan Vitek S3 Lab, Department of Computer Science, Purdue University, West Lafayette, IN {gkrichar,slebresn,bburg,jv}@cs.purdue.edu Abstract becoming a general purpose computing platform with office appli- The JavaScript programming language is widely used for web cations, browsers and development environments [15] being devel- programming and, increasingly, for general purpose computing. oped in JavaScript. It has been dubbed the “assembly language” of the Internet and is targeted by code generators from the likes As such, improving the correctness, security and performance of 2,3 JavaScript applications has been the driving force for research in of Java and Scheme [20]. In response to this success, JavaScript type systems, static analysis and compiler techniques for this lan- has started to garner academic attention and respect. Researchers guage. Many of these techniques aim to reign in some of the most have focused on three main problems: security, correctness and dynamic features of the language, yet little seems to be known performance. Security is arguably JavaScript’s most pressing prob- about how programmers actually utilize the language or these fea- lem: a number of attacks have been discovered that exploit the lan- tures. In this paper we perform an empirical study of the dynamic guage’s dynamism (mostly the ability to access and modify shared behavior of a corpus of widely-used JavaScript programs, and an- objects and to inject code via eval). Researchers have proposed ap- alyze how and why the dynamic features are used.
    [Show full text]
  • Android 2.X/3.X/4.X対応 アプリ開発tips
    Android 2.x/3.x/4.x対応 アプリ開発Tips 2012.3.24 @korodroid(神原 健一) 自己紹介 ■氏名:神原 健一(@korodroid) ■活動:iplatform.org(http://www.iplatform.org/) ■所属:NTTソフトウェア株式会社 ■主な活動(iplatform.org@プライベート) ■Google Play向けアプリ開発(現在18本) 9 10 ■Google Developer Day 2011 Tokyo 基調講演デモ ■Android Developer Lab Tokyo 2011 follow-up 5位入賞 i*deal Competition 2010 ファイナリスト ■ 2 本日のアジェンダ •本発表の題材とするアプリ •背景 •関連キーワードの復習 •開発時に特に考慮すべき点 3 本発表の題材とするアプリ 【セカイフォン】 4 セカイフォンとは? 6ヶ国語に対応した翻訳電話 (2010/01初版開発以降、20回以上のver.up.) 英語 ドイツ語 日本語 ○ イタリア語 フランス語 ○ 中国語○ ○ ○ 5 利用シーン① 通話モード【相手の母国語に自動変換】 英語 日本語 Hello! こんにちは 6 利用シーン② 1人通話モード【会話をその場で変換】 英語 日本語 7 アプリ画面例(Android 2.x) 縦画面 横画面 8 アプリ画面例(Android 3.x) 縦画面 横画面 9 アプリ画面例(Android 4.x) 縦画面 横画面 10 背景 11 背景 アプリ開発のターゲットは? ➡フル対応する場合、現時点では基本的に2.x/3.x/4.x フォン+ハンドセット 主にハンドセット タブレット+タブレット 2.x タブレット 4.x 3.x 12 背景 セカイフォンの2.x/3.x/4.x・マルチデバイス対応時に 気付いた点をお話します(1apkで実現)。 2.x 3.x 4.x 13 関連キーワードの復習 14 Fragmentとは? マルチPaneの画面構成時などに 役立つもの ハンドセットの1例 タブレットの1例 15 Fragmentとは? マルチPaneの画面構成時などに 役立つもの Fragment A Fragment B ハンドセットの1例 タブレットの1例 16 OptionMenuおよびActionBarとは? 「設定」「ヘルプ」など、同画面で 実行したい処理をまとめたもの 2.x 3.x以降 Option Menu Action Bar 17 開発時に特に考慮すべき点 1.UI(最適なレイアウト) 2.API(利用可能なAPI) 18 UI-実現方式① layout-small/normal/large/xlargeによる分離 ○ 1.6以降であれば、利用可能。 7”タブレットと5”ハンドセットが同じlargeに分類 × される場合あり。別レイアウトにしたい時に問題に。 3.0以前で適切なグループ分けされない場合あり。 × 19 UI-実現方式② sw<N>dp,w<N>dp,h<N>dpの利用 概要 補足 (a)layout-sw600dp 縦横ともに600dp以上 画面方向に非依存 (b)layout-w720dp 横が720dp以上 画面方向に依存 (c)layout-h480dp 縦が480dp以上 画面方向に依存 (a)false (a)false (a)true 400dp (b)true 960dp (b)false 720dp (b)true (c)false (c)true (c)true 960dp 1280dp 400dp
    [Show full text]
  • Are We a Bunch of Robin Hoods?” Filesharing As a Folk Tradition of Resistance Benjamin Staple
    Document generated on 09/27/2021 8:47 a.m. Ethnologies “Are We a Bunch of Robin Hoods?” Filesharing as a Folk Tradition of Resistance Benjamin Staple Crime and Folklore Article abstract Crime et folklore On the edge of the digital frontier, far from the oceans of their maritime Volume 41, Number 1, 2019 namesakes, pirate communities flourish. Called outlaws and thieves, these file-sharers practice a vernacular tradition of digital piracy in the face of URI: https://id.erudit.org/iderudit/1069852ar overwhelming state power. Based on ethnographic fieldwork conducted with DOI: https://doi.org/10.7202/1069852ar Warez Scene cracking groups and the Kickass Torrents community, this article locates piracy discourse as a site of contested identity. For file-sharers who embrace it, the pirate identity is a discursively-constructed composite that See table of contents enables users to draw upon (and create) outlaw folk hero traditions to express themselves and affect small-scale change in the world around them. This article argues that pirate culture is more nuanced than popularly depicted and Publisher(s) that, through traditional practice, piracy is a vernacular performance of resistance. Association Canadienne d’Ethnologie et de Folklore ISSN 1481-5974 (print) 1708-0401 (digital) Explore this journal Cite this article Staple, B. (2019). “Are We a Bunch of Robin Hoods?”: Filesharing as a Folk Tradition of Resistance. Ethnologies, 41(1), 197–224. https://doi.org/10.7202/1069852ar Tous droits réservés © Ethnologies, Université Laval, 2020 This document is protected by copyright law. Use of the services of Érudit (including reproduction) is subject to its terms and conditions, which can be viewed online.
    [Show full text]
  • Piracy Landscape Study
    Piracy Landscape Study: Analysis of Existing and Emerging Research Relevant to Intellectual Property Rights (IPR) Enforcement of Commercial-Scale Piracy Prepared for the U.S. Patent and Trademark Office Solicitation Number: 1333BJ19Q00142004 Brett Danaher Michael D. Smith Rahul Telang Chapman University Carnegie Mellon University Carnegie Mellon University This Version: March 20, 2020 Table of Contents Executive Summary ...................................................................................................................... 3 1. The Piracy Ecosystem........................................................................................................... 4 1.1 Piracy of Physical Goods................................................................................................ 6 1.1.1 Manufacturing......................................................................................................... 7 1.1.2 Discovery ................................................................................................................ 7 1.1.3 Distribution ............................................................................................................. 8 1.1.4 Communication, Payment Processing and Fulfillment ......................................... 11 1.2 Piracy of Digital Goods ................................................................................................ 11 1.2.1 Sources.................................................................................................................. 12 1.2.2
    [Show full text]
  • Innovating Through Standardization
    Association for Information Systems AIS Electronic Library (AISeL) Pacific Asia Conference on Information Systems PACIS 2018 Proceedings (PACIS) 6-26-2018 Innovating through standardization: How Google Leverages the Value of Open Digital Platforms Yoshiaki Fukami Rikkyo Business School, Keio Research Institute at SFC, [email protected] Takumi Shimizu McGill University, [email protected] Follow this and additional works at: https://aisel.aisnet.org/pacis2018 Recommended Citation Fukami, Yoshiaki and Shimizu, Takumi, "Innovating through standardization: How Google Leverages the Value of Open Digital Platforms" (2018). PACIS 2018 Proceedings. 208. https://aisel.aisnet.org/pacis2018/208 This material is brought to you by the Pacific Asia Conference on Information Systems (PACIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in PACIS 2018 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact [email protected]. Innovating through standardization Innovating through standardization: How Google Leverages the Value of Open Digital Platforms Completed Research Paper Yoshiaki Fukami Takumi Shimizu Rikkyo Business School, Desautels Faculty of Management, Keio Research Institute at SFC McGill University [email protected] [email protected] Abstract The purpose of this paper is to examine how an actor strategically develops and diffuses technology standards that align with innovation trajectories while maintaining a consensus with competitors.
    [Show full text]
  • 2 May 2008 Review of the National Innovation System
    Google Australia Pty Limited Tel: 02 9374-4000 ACN 102 417 032 Fax: 02 9374-4001 Level 18, Tower 1 Darling Park www.google.com.au 201 Sussex Street Sydney NSW 2000 2 May 2008 Review of the National Innovation System - Submission Secretariat to the Expert Panel Review of the National Innovation System Department of Innovation, Industry, Science and Research [email protected] Review of the National Innovation System Google welcomes the opportunity to provide a submission as part of the Review of the National Innovation System. Structure of this submission In this submission, we provide: • an overview of Google's activities; • an explanation of why Google believes that an open Internet is a key enabler of innovation in Australia; • comment on the issues of key importance in preserving an open Internet, including Internet and broadband policy and spectrum policy; • comment on the importance of reducing Australia's ICT deficit; and • comment on frameworks that promote an innovative culture, being one that enables Australians to utilise the open Internet to innovate, including: o the importance of education; o incentives to encourage research and investment; and o a copyright framework that promotes innovation. About Google Google Australia Pty Limited provides marketing and technical support and representation in Australia for Google corporations providing the Google family of services globally. These service provider entities relevantly include Google Inc and Google Ireland Limited. We use Google in this submission to refer to Google Inc and its subsidiaries, including Google Australia Pty Limited. Google initially became familiar to most Internet users as the provider of the Google search engine and subsequently as the provider of email, instant messaging and specialist search and information services, including Google News and Google Finance.
    [Show full text]
  • Sample Pages
    TitlePgsInternetRev 3/5/05 8:13 AM Page 3 Defining Moments the internet revolution Kevin Hillstrom 615 Griswold, Detroit MI 48226 DM - Internet FM 3/7/05 4:46 PM Page v Table of Contents Preface . .vii How to Use This Book . .xi Important People, Places, and Terms . .xiii Chronology . .xxi NARRATIVE OVERVIEW Prologue . .3 Chapter One: Early Origins of the Internet . .5 Chapter Two: Invention of the World Wide Web . .23 Chapter Three: How the Internet Works . .33 Chapter Four: Opening the Internet for Commerce . .45 Chapter Five: The “Dot.Com Boom” Goes Bust . .57 Chapter Six: The Societal Impact of the Internet . .67 Chapter Seven: The Future of the Internet . .89 BIOGRAPHIES Marc Andreessen . .103 Creator of the Netscape Navigator Web Browser Tim Berners-Lee . .107 Inventor of the World Wide Web Sergey Brin and Larry Page . .112 Co-Founders of Google v DM - Internet FM 3/7/05 4:46 PM Page vi Defining Moments: The Internet Revolution Steve Case . .115 Co-Founder of America Online (AOL) Vinton Cerf . .120 Developer of Early Internet Architecture David Filo and Jerry Yang . .124 Co-Founders of the Yahoo! Search Engine Robert Taylor . .129 Leading Scientist in the Development of the ARPANET PRIMARY SOURCES Vinton Cerf Recalls the Early Development of the Internet . .135 Steve Crocker Launches the “Request for Comments” Series . .144 A Computer Scientist Describes the Internet Worm of 1988 . .152 The First World Wide Web Page with Hypertext Links . .164 Tim Berners-Lee Remembers Inventing the World Wide Web . .166 A Librarian Shares the Joy of “Surfing” the Internet .
    [Show full text]