The Future of the Internet and How to Stop It the Harvard Community Has

Total Page:16

File Type:pdf, Size:1020Kb

The Future of the Internet and How to Stop It the Harvard Community Has The Future of the Internet and How to Stop It The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. Jonathan L. Zittrain, The Future of the Internet -- And How to Citation Stop It (Yale University Press & Penguin UK 2008). Published Version http://futureoftheinternet.org/ Accessed July 1, 2016 4:22:42 AM EDT Citable Link http://nrs.harvard.edu/urn-3:HUL.InstRepos:4455262 This article was downloaded from Harvard University's DASH Terms of Use repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http://nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms- of-use#LAA (Article begins on next page) YD8852.i-x 1/20/09 1:59 PM Page i The Future of the Internet— And How to Stop It YD8852.i-x 1/20/09 1:59 PM Page ii YD8852.i-x 1/20/09 1:59 PM Page iii The Future of the Internet And How to Stop It Jonathan Zittrain With a New Foreword by Lawrence Lessig and a New Preface by the Author Yale University Press New Haven & London YD8852.i-x 1/20/09 1:59 PM Page iv A Caravan book. For more information, visit www.caravanbooks.org. The cover was designed by Ivo van der Ent, based on his winning entry of an open competition at www.worth1000.com. Copyright © 2008 by Jonathan Zittrain. All rights reserved. Preface to the Paperback Edition copyright © Jonathan Zittrain 2008. Subject to the exception immediately following, this book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. The author has made an online version of this work available under a Creative Com- mons Attribution-Noncommercial-Share Alike 3.0 License. It can be accessed through the author’s Web site at http://www.jz.org. Set in Adobe Garamond type by The Composing Room of Michigan, Inc. Printed in the United States of America by R. R. Donnelley, Harrisonburg, Virginia. Library of Congress Control Number: 2008942463 ISBN 978-0-300-15124-4 (pbk. : alk. paper) A catalogue record for this book is available from the British Library. 10 9 8 7 6 5 4 3 2 1 YD8852.i-x 1/20/09 1:59 PM Page v Contents Foreword by Lawrence Lessig—vii Preface to the Paperback Edition—ix Introduction—1 Part I The Rise and Stall of the Generative Net—7 1 Battle of the Boxes—11 2 Battle of the Networks—19 3 Cybersecurity and the Generative Dilemma—36 Part II After the Stall—63 4 The Generative Pattern—67 5 Tethered Appliances, Software as Service, and Perfect Enforcement—101 6 The Lessons of Wikipedia—127 YD8852.i-x 1/20/09 1:59 PM Page vi vi Contents Part III Solutions—149 7 Stopping the Future of the Internet: Stability on a Generative Net—153 8 Strategies for a Generative Future—175 9 Meeting the Risks of Generativity: Privacy 2.0—200 Conclusion—235 Acknowledgments—247 Notes—249 Index—329 YD8852.i-x 1/20/09 1:59 PM Page vii Foreword by Lawrence Lessig It has been a decade since book-length writing about law and the Internet be- gan in earnest. Ethan Katsh’s wonderful book Law in a Digital World (1995) is just over a decade old, and anticipated the flood. My first book, Code and Other Laws of Cyberspace (1999), is just under. Most of these early books had a common character. We were all trying first to make the obscure understandable, and second, to draw lessons from the under- stood about how law and technology needed to interact. As obscurity began to fade (as the network became more familiar), a differ- ent pattern began to emerge: cheerleading. Many of us (or at least I) felt we had seen something beautiful in the Net, felt that something needed to be pro- tected, felt there were powerful interests that felt differently about all this, and thus felt we needed to make clear just how important it was to protect the Net of the present into the future. This cheerleading tended to obscure certain increasingly obvious facts (not features, more like bugs) of the Internet. Put most succinctly, there was a grow- ing and increasingly dangerous lot of stuff on the Net. The first notice of this crud pointed to pornography. In response, civil libertarians (the sort likely to love the Net anyway) launched a vigorous campaign to defend the rights of vii YD8852.i-x 1/20/09 1:59 PM Page viii viii Foreword porn on the Net. But as the crud got deeper and more vicious, the urge to de- fend it began to wane. Spam became an increasingly annoying burden. Viruses, and worse, became positively harmful. Like a family on a beach holiday not wanting to confront the fact that “yes, that is a sewage line running into the wa- ter just upstream from the house we have rented,” many of us simply turned a blind eye to this increasingly uncomfortable (and worse) fact: The Net was not in Kansas anymore. Jonathan Zittrain’s book is a much-needed antidote to this self-imposed blindness. It changes the whole debate about law and the Internet. It radically reorients the work of the Net’s legal scholars. Rather than trying to ignore the uncomfortable parts of what the Net has become, Zittrain puts the crud right in the center. And he then builds an understanding of the Net, and the com- puters that made the Net possible, that explains how so much good and so much awful could come through the very same wires, and, more important, what we must do to recapture the good. It is long past time for this understanding to become the focus, not just of le- gal scholars, but any citizen thinking about the future of the Net and its poten- tial for society. Indeed, it may well be too late. As Zittrain argues quite effec- tively, the Internet is destined for an i9/11 event—by which I don’t mean an attack by Al Qaeda, but rather a significant and fatally disruptive event that threatens the basic reliability of the Internet. When that happens, the passion clamoring for a fundamental reform of the Internet will be—if things stay as they are—irresistible. That reform, if built on the understanding that is com- monplace just now, will radically weaken what the Internet now is, or could be. If built upon the understanding Zittrain is advancing here, it could strengthen the very best of the Internet, and the potential that network offers. Zittrain doesn’t have all the answers, though the proposals he offers are bril- liant beginnings, and I think this powerfully argued book has more answers than even he suspects. But his aim is not to end a debate; it is to begin it. After providing an understanding of the great power this network promises, a power grounded in the “generativity” of the network, and the civic spirit of a critical mass of its users, he begins us on a path that might yet teach how to preserve the best of generativity, while protecting us from the worst. This is a debate that all of us need to engage soon. I know of no book that more powerfully and directly speaks to the most important issues facing the fu- ture of the Net. I can’t imagine a book that would speak to everyone more clearly and simply. You need know nothing about computers or the Internet to be inspired by this book. We need many more than the experts in computers and the Internet to preserve it. YD8852.i-x 1/20/09 1:59 PM Page ix Preface to the Paperback Edition The venerable Warner Brothers antagonist Wile E. Coyote famously demon- strates a law of cartoon physics. He runs off a cliff, unaware of its ledge, and continues forward without falling. The Coyote defies gravity until he looks down and sees there’s nothing under him. His mental gears turn as he contem- plates his predicament. Then: splat. Both the Internet and the PC are on a similar trajectory. They were designed by people who shared the same love of amateur tinkering as the enterprising Coyote. Both platforms were released unfinished, relying on their users to fig- ure out what to do with them—and to deal with problems as they arose. This kind of openness isn’t found in our cars, fridges, or TiVos. Compared to the rest of the technologies we use each day, it’s completely anomalous, even absurd. This openness, described and praised in this book in more detail as “genera- tivity,” allowed the Internet and PC to emerge from the realms of researchers and hobbyists and surprisingly win out over far more carefully planned and funded platforms. (They were certainly more successful than any of the Coy- ote’s many projects.) Today the very popularity and use of the Internet and PC are sorely testing that generativity. We wouldn’t want our cars, fridges, or TiVos to be altered by ix YD8852.i-x 1/20/09 1:59 PM Page x x Preface to the Paperback Edition unknown outsiders at the touch of a button—and yet this remains the pre- vailing way that we load new software on our PCs.
Recommended publications
  • ACM Bytecast Episode Title: Luis Von Ahn
    Podcast Title: ACM Bytecast Episode Title: Luis Von Ahn Welcome to the ACM Bytecast podcast, where researchers, practitioners, and innovators share about their experiences, lessons, and future visions in the field of computing research. In this episode, host Rashmi Mohan welcomes Luis Von Ahn—founder of Duolingo, the most popular foreign language learning app. The conversation starts off with a quick look at Luis’s background, what he does, and what drew him into this field as a whole. Luis’s mother began his interest in computers at 8 years old and he’s never looked back since. While he started off his training in the field of computer science, he has now started 3 businesses, one of which is Duolingo. Rashmi taps into the history on Luis’s first two businesses before jumping into Duolingo. Learn about the creation of CAPTCHA and re-CAPTCHA. While one of these is a challenge-response test to help computers determine whether the user on websites was human or not, the other protects website from spam. The cru- cial foundation for Luis’s businesses were simply real world problems that he sought to help fix. Luis integrated these real issues in the industry and worked on them from the academic world. Being used across countless websites today, Luis’s work proved pivotal. Rashmi asks Luis about his perspective on integrating academia and business more—don’t miss out on his thoughts! Rashmi shifts the conversation to learning the details involved in the transition from academia to actually running a business and the learning curve associated with this.
    [Show full text]
  • Strengthening and Unifying the Visual Identity of Wikimedia Projects: a Step Towards Maturity
    Strengthening and unifying the visual identity of Wikimedia projects: a step towards maturity Guillaume Paumier∗ Elisabeth Bauer [[m:User:guillom]] [[m:User:Elian]] Abstract In January 2007, the Wikimedian community celebrated the sixth birthday of Wikipedia. Six years of constant evolution have now led to Wikipedia being one of the most visited websites in the world. Other projects developing free content and supported by the Wikimedia Foundation have been expanding rapidly too. The Foundation and its projects are now facing some communication issues due to the difference of scale between the human and financial resources of the Foundation and the success of its projects. In this paper, we identify critical issues in terms of visual identity and marketing. We evaluate the situation and propose several changes, including a redesign of the default website interface. Introduction The first Wikipedia project was created in January 2001. In these days, the technical infrastructure was provided by Bomis, a dot-com company. In June 2003, Jimmy Wales, founder of Wikipedia and owner of Bomis, created the Wikimedia Foundation [1] to provide a long-term administrative and technical structure dedicated to free content. Since these days, both the projects and the Foundation have been evolving. New projects have been created. All have grown at different rates. Some have got more fame than the others. New financial, technical and communication challenges have risen. In this paper, we will first identify some of these challenges and issues in terms of global visual identity. We will then analyse logos, website layouts, projects names, trademarks so as to provide some hindsight.
    [Show full text]
  • Luis Von Ahn - Episode 14 Transcript
    ACM ByteCast Luis von Ahn - Episode 14 Transcript Rashmi Mohan: This is ACM ByteCast, a podcast series from the Association for Computing Machinery, the world's largest educational and scientific computing society. We talk to researchers, practitioners, and innovators who are at the intersection of computing research and practice. They share their experiences, the lessons they've learned, and their own visions for the future of computing. I am your host, Rashmi Mohan. Rashmi Mohan: If you want to boost your brain power, improve your memory, or enhance your multitasking skills, then you're often recommended to learn a foreign language. For many of us, that option has become a reality, thanks to our next guest and his creation. Luis von Ahn is a serial entrepreneur and Founder and CEO of Duolingo. An accomplished researcher and consulting professor of Computer Science at Carnegie Mellon University, he straddles both worlds seamlessly. He's a winner of numerous awards, including the prestigious Lemelson-MIT Prize and the MacArthur Fellowship often known as The Genius Grant. Louis, welcome to ACM ByteCast. Luis von Ahn: Thank you. Thank you for having me. Rashmi Mohan: Wonderful. I'd love to lead with a simple question that I ask all of my guests. If you could please introduce yourself and talk about what you currently do, and also give us some insight into what drew you into the field of computer science. Luis von Ahn: Sure. So my name is Luis. I am currently the CEO and co-founder of a company called Duolingo. Duolingo is a language learning platform.
    [Show full text]
  • SI 410 Ethics and Information Technology
    Author(s): Paul Conway, PhD, 2010 License: Unless otherwise noted, this material is made available under the terms of the Creative Commons Attribution Share Alike 3.0 License: http://creativecommons.org/licenses/by-sa/3.0/ We have reviewed this material in accordance with U.S. Copyright Law and have tried to maximize your ability to use, share, and adapt it. The citation key on the following slide provides information about how you may share and adapt this material. Copyright holders of content included in this material should contact [email protected] with any questions, corrections, or clarification regarding the use of content. For more information about how to cite these materials visit http://open.umich.edu/privacy-and-terms-use. Any medical information in this material is intended to inform and educate and is not a tool for self-diagnosis or a replacement for medical evaluation, advice, diagnosis or treatment by a healthcare professional. Please speak to your physician if you have questions about your medical condition. Viewer discretion is advised: Some medical content is graphic and may not be suitable for all viewers. Citation Key for more information see: http://open.umich.edu/wiki/CitationPolicy Use + Share + Adapt { Content the copyright holder, author, or law permits you to use, share and adapt. } Public Domain – Government: Works that are produced by the U.S. Government. (17 USC § 105) Public Domain – Expired: Works that are no longer protected due to an expired copyright term. Public Domain – Self Dedicated: Works that a copyright holder has dedicated to the public domain.
    [Show full text]
  • Trompe L'oeil and Financial Risk in The
    Carrington Bowles (publisher). The Bubblers Medley, or a Sketch of the Times: Being Europe’s Memorial for the Year 1720, 1721. Engraving. © Trustees of the British Museum. Carrington Bowles (publisher). The Bubblers Medley, or a Sketch of the Times: Being Europe’s Memorial for the Year 1720, 1721. Engraving. © Trustees of the British Museum. 6 https://doi.org/10.1162/grey_a_00287 Downloaded from http://www.mitpressjournals.org/doi/pdf/10.1162/grey_a_00287 by guest on 28 September 2021 Trompe L’oeil and Financial Risk in the Age of Paper MAGGIE M. CAO Three hundred years ago, in the summer of 1720, the bursting of the South Sea Bubble marked the first recorded stock market crash. The ensuing financial crisis provided great fodder for the British satirical press, which took to caricaturing both the company’s gullible victims and manipulative executives. Among the rich material trove of that historical moment are a pair of prints published by the London shop of John Bowles and Carington Bowles.1 Titled The Bubblers Medley, or A Sketch of the Times: Being Europe’s Memorial for the Year 1720, the prints depict a scattered array of paper artifacts in collage-like, random fashion. Sheets overlap and furl on the edges, creating a trompe l’oeil effect that encourages viewers to misread the artwork as a collection of the actual ephemera it represents. Trompe l’oeil–style prints like these, also called medley prints, developed in 1700s London, and in the century that followed they enjoyed episodic popularity, often at moments of fiscal uncertainty. As Mark Hallett argues, this print type, like other satirical images referencing public discourses and debates, was meant to be read as well as viewed.
    [Show full text]
  • History of the Internet-English
    Sirin Palasri Steven Huter ZitaWenzel, Ph.D. THE HISTOR Y OF THE INTERNET IN THAILAND Sirin Palasri Steven G. Huter Zita Wenzel (Ph.D.) The Network Startup Resource Center (NSRC) University of Oregon The History of the Internet in Thailand by Sirin Palasri, Steven Huter, and Zita Wenzel Cover Design: Boonsak Tangkamcharoen Published by University of Oregon Libraries, 2013 1299 University of Oregon Eugene, OR 97403-1299 United States of America Telephone: (541) 346-3053 / Fax: (541) 346-3485 Second printing, 2013. ISBN: 978-0-9858204-2-8 (pbk) ISBN: 978-0-9858204-6-6 (English PDF), doi:10.7264/N3B56GNC ISBN: 978-0-9858204-7-3 (Thai PDF), doi:10.7264/N36D5QXN Originally published in 1999. Copyright © 1999 State of Oregon, by and for the State Board of Higher Education, on behalf of the Network Startup Resource Center at the University of Oregon. This work is licensed under a Creative Commons Attribution- NonCommercial 3.0 Unported License http://creativecommons.org/licenses/by-nc/3.0/deed.en_US Requests for permission, beyond the Creative Commons authorized uses, should be addressed to: The Network Startup Resource Center (NSRC) 1299 University of Oregon Eugene, Oregon 97403-1299 USA Telephone: +1 541 346-3547 Email: [email protected] Fax: +1 541-346-4397 http://www.nsrc.org/ This material is based upon work supported by the National Science Foundation under Grant No. NCR-961657. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
    [Show full text]
  • Telecommunications Infrastructure for Electronic Delivery 3
    Telecommunications Infrastructure for Electronic Delivery 3 SUMMARY The telecommunications infrastructure is vitally important to electronic delivery of Federal services because most of these services must, at some point, traverse the infrastructure. This infrastructure includes, among other components, the Federal Government’s long-distance telecommunications program (known as FTS2000 and operated under contract with commercial vendors), and computer networks such as the Internet. The tele- communications infrastructure can facilitate or inhibit many op- portunities in electronic service delivery. The role of the telecommunications infrastructure in electronic service delivery has not been defined, however. OTA identified four areas that warrant attention in clarifying the role of telecommunications. First, Congress and the administration could review and update the mission of FTS2000 and its follow-on contract in the context of electronic service delivery. The overall perform- ance of FTS2000 shows significant improvement over the pre- vious system, at least for basic telephone service. FTS2000 warrants continual review and monitoring, however, to assure that it is the best program to manage Federal telecommunications into the next century when electronic delivery of Federal services likely will be commonplace. Further studies and experiments are needed to properly evaluate the benefits and costs of FTS2000 follow-on options from the perspective of different sized agencies (small to large), diverse Federal programs and recipients, and the government as a whole. Planning for the follow-on contract to FTS2000 could consider new or revised contracting arrangements that were not feasible when FTS2000 was conceived. An “overlapping vendor” ap- proach to contracting, as one example, may provide a “win-win” 57 58 I Making Government Work situation for all parties and eliminate future de- national infrastructure will be much stronger if bates about mandatory use and service upgrades.
    [Show full text]
  • Snapshot: a Self-Calibration Protocol for Camera Sensor Networks
    Snapshot: A Self-Calibration Protocol for Camera Sensor Networks Xiaotao Liu, Purushottam Kulkarni, Prashant Shenoy and Deepak Ganesan Department of Computer Science University of Massachusetts, Amherst, MA 01003 Email: {xiaotaol, purukulk, shenoy, dganesan}@cs.umass.edu Abstract— A camera sensor network is a wireless network of are based on the classical Tsai method—they require a set cameras designed for ad-hoc deployment. The camera sensors of reference points whose true locations are known in the in such a network need to be properly calibrated by determin- physical world and use the projection of these points on the ing their location, orientation, and range. This paper presents Snapshot, an automated calibration protocol that is explicitly camera image plane to determine camera parameters. Despite designed and optimized for camera sensor networks. Snapshot the wealth of research on calibration in the vision community, uses the inherent imaging abilities of the cameras themselves for adapting these techniques to sensor networks requires us to pay calibration and can determine the location and orientation of a careful attention to the differences in hardware characteristics camera sensor using only four reference points. Our techniques and capabilities of sensor networks. draw upon principles from computer vision, optics, and geometry and are designed to work with low-fidelity, low-power camera First, sensor networks employ low-power, low-fidelity cam- sensors that are typical in sensor networks. An experimental eras such as the CMUcam [16] or Cyclops [11] that have evaluation of our prototype implementation shows that Snapshot coarse-grain imaging capabilities; at best, a mix of low- yields an error of 1-2.5 degrees when determining the camera end and a few high-end cameras can be assumed in such orientation and 5-10cm when determining the camera location.
    [Show full text]
  • Wikipedia and Medicine: Quantifying Readership, Editors, and the Significance of Natural Language
    JOURNAL OF MEDICAL INTERNET RESEARCH Heilman & West Original Paper Wikipedia and Medicine: Quantifying Readership, Editors, and the Significance of Natural Language James M Heilman1, BSc, MD, CCFP(EM); Andrew G West2, PhD, MS Eng 1Faculty of Medicine, Department of Emergency Medicine, University of British Columbia, Vancouver, BC, Canada 2Verisign Labs (Verisign, Inc.), Reston, VA, United States Corresponding Author: James M Heilman, BSc, MD, CCFP(EM) Faculty of Medicine Department of Emergency Medicine University of British Columbia 2194 Health Sciences Mall, Unit 317 Vancouver, BC, V6T1Z3 Canada Phone: 1 4158306381 Fax: 1 6048226061 Email: [email protected] Abstract Background: Wikipedia is a collaboratively edited encyclopedia. One of the most popular websites on the Internet, it is known to be a frequently used source of health care information by both professionals and the lay public. Objective: This paper quantifies the production and consumption of Wikipedia's medical content along 4 dimensions. First, we measured the amount of medical content in both articles and bytes and, second, the citations that supported that content. Third, we analyzed the medical readership against that of other health care websites between Wikipedia's natural language editions and its relationship with disease prevalence. Fourth, we surveyed the quantity/characteristics of Wikipedia's medical contributors, including year-over-year participation trends and editor demographics. Methods: Using a well-defined categorization infrastructure, we identified medically pertinent English-language Wikipedia articles and links to their foreign language equivalents. With these, Wikipedia can be queried to produce metadata and full texts for entire article histories. Wikipedia also makes available hourly reports that aggregate reader traffic at per-article granularity.
    [Show full text]
  • The Creation of a Secular Inquisition in Early Modern Brabant
    Orthodoxy and Opposition: The Creation of a Secular Inquisition in Early Modern Brabant Item Type text; Electronic Dissertation Authors Christman, Victoria Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 10/10/2021 08:36:02 Link to Item http://hdl.handle.net/10150/195502 ORTHODOXY AND OPPOSITION: THE CREATION OF A SECULAR INQUISITION IN EARLY MODERN BRABANT by Victoria Christman _______________________ Copyright © Victoria Christman 2005 A Dissertation Submitted to the Faculty of the DEPARTMENT OF HISTORY In Partial Fulfillment of the Requirements For the Degree of DOCTOR OF PHILOSOPHY In the Graduate College THE UNIVERSITY OF ARIZONA 2 0 0 5 2 THE UNIVERSITY OF ARIZONA GRADUATE COLLEGE As members of the Dissertation Committee, we certify that we have read the dissertation prepared by Victoria Christman entitled: Orthodoxy and Opposition: The Creation of a Secular Inquisition in Early Modern Brabant and recommend that it be accepted as fulfilling the dissertation requirement for the Degree of Doctor of Philosophy Professor Susan C. Karant Nunn Date: 17 August 2005 Professor Alan E. Bernstein Date: 17 August 2005 Professor Helen Nader Date: 17 August 2005 Final approval and acceptance of this dissertation is contingent upon the candidate’s submission of the final copies of the dissertation to the Graduate College. I hereby certify that I have read this dissertation prepared under my direction and recommend that it be accepted as fulfilling the dissertation requirement.
    [Show full text]
  • Trojans and Malware on the Internet an Update
    Attitude Adjustment: Trojans and Malware on the Internet An Update Sarah Gordon and David Chess IBM Thomas J. Watson Research Center Yorktown Heights, NY Abstract This paper continues our examination of Trojan horses on the Internet; their prevalence, technical structure and impact. It explores the type and scope of threats encountered on the Internet - throughout history until today. It examines user attitudes and considers ways in which those attitudes can actively affect your organization’s vulnerability to Trojanizations of various types. It discusses the status of hostile active content on the Internet, including threats from Java and ActiveX, and re-examines the impact of these types of threats to Internet users in the real world. Observations related to the role of the antivirus industry in solving the problem are considered. Throughout the paper, technical and policy based strategies for minimizing the risk of damage from various types of Trojan horses on the Internet are presented This paper represents an update and summary of our research from Where There's Smoke There's Mirrors: The Truth About Trojan Horses on the Internet, presented at the Eighth International Virus Bulletin Conference in Munich Germany, October 1998, and Attitude Adjustment: Trojans and Malware on the Internet, presented at the European Institute for Computer Antivirus Research in Aalborg, Denmark, March 1999. Significant portions of those works are included here in original form. Descriptors: fidonet, internet, password stealing trojan, trojanized system, trojanized application, user behavior, java, activex, security policy, trojan horse, computer virus Attitude Adjustment: Trojans and Malware on the Internet Trojans On the Internet… Ever since the city of Troy was sacked by way of the apparently innocuous but ultimately deadly Trojan horse, the term has been used to talk about something that appears to be beneficial, but which hides an attack within.
    [Show full text]
  • Crowdsourcing
    Crowdsourcing reCAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart Luis von Ahn • Guatemalan entrepreneur • Consulting Professor at Carnegie Mellon University in Pittsburgh, Pennsylvania. • Known as one of the pioneers of crowdsourcing. The problem: "Anybody can write a program to sign up for millions of accounts, and the idea was to prevent that" Luis von Ahn Ealier CAPTCHAs 2010: Luis invents CAPTCHA Business model B2B/B2C: The Captcha company sells captchas for around 30 $ per 1000 of them The idea Situation before 2007: CAPTCHAs were many and working well The thought of Luis: • Hundreds of thousands of combined human hours were being wasted each day, 200 million captchas were solved daily • Book digitalisation: at the tim Optical Character Recognition (OCR) software couln’t solve 30 % of the ammount of words to be digitalized • A CAPTCHA could be used with the intention of exploiting that to digitalize old books and articles reCAPTCHAs 2007: reCAPTCHA is found and a partnership is established to digitized the previous 20 years of New York ? Times issues within a few months, 13 million articles RESCUED crowdsourcing CARPATHIA ICEBERG reCAPTCHAs In 2009, reCAPTCHA was purchased by Google for an undisclosed amount for Google Books library, which is now one of the largest digital libraries in the world, or identify street names and addresses from Google Maps Street View. If you are not paying for the product, you are the product. Before and after reCAPTCHA : The ESP game and duoligo First of von Ahn projects: giving a name After CAPTCHA: Duoligo to an image: 10 M people playing Providing translations for the web through bought by Google Images a free language learning program.
    [Show full text]