Cyberlibertarian Dreams: Producing Privilege and Power in Journalistic Discourses of the Internet

Total Page:16

File Type:pdf, Size:1020Kb

Cyberlibertarian Dreams: Producing Privilege and Power in Journalistic Discourses of the Internet CYBERLIBERTARIAN DREAMS: PRODUCING PRIVILEGE AND POWER IN JOURNALISTIC DISCOURSES OF THE INTERNET A Dissertation Submitted to The Temple University Graduate Board In Partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY by Michael Buozis May 2020 Examining Committee Members: Brian Creech, Advisory Chair, Media and Communication Fabienne Darling-Wolf, Media and Communication Devon Powers, Media and Communication Sean Phelan, Massey University, New Zealand ABSTRACT Since the 1990s, when the Internet emerged as a focus of popular discourse, through the early 21st century as the Internet became a dominant communication technology, cyberlibertarianism—a combination of absolutist free speech and free market ideals—has shaped popular conceptions of what freedom means on the Internet. Journalism has served to reify these values over the last three decades, adopting cyberlibertarian precepts as common sense in debates about issues such as government regulation, the privatization of cyberspace, and the moderation of content on platforms. This dissertation develops a critical genealogy of cyberlibertarianism revealing how this ideology helped perpetuate the very forms of power and privilege—based on race, gender, and class—it promised the Internet would erase. Through discourse analysis of popular and tech journalism over the last three decades, this dissertation first explores how journalists used two public figures to make common sense of cyberlibertarian ideals in their respective historical contexts: John Perry Barlow in the 1990s and early-2000s and Aaron Swartz in the 2000s and early-2010s. Shifting to a contemporary context, this dissertation then explores how journalists have relied on cyberlibertarian ideals to make sense of tensions between free speech and hate speech and harassment online and of the increasing power tech corporations exert over the public regulation of speech. This analysis shows that journalistic practice has reified the cyberlibertarian ideals which underpin much public policy and corporate practice regarding how speech on the Internet ought to be regulated. This research asserts the need for more concerted critical journalistic discourses that dislodge the cyberlibertarian common sense which has naturalized the power of tech corporations over so much public life. ii For Alison, Eliza, and Sadie, who bring me joy. iii ACKNOWLEDGMENTS Without the unending commitment of time, energy, and thought from my advisor, Brian Creech, this project and all my scholarly pursuits would have been impossible. Thank you for listening and reading with patience and care. Your mentorship has not only guided my research but has also served as a model for kindness, humility, and professionalism. I am endlessly grateful to my committee members, Fabienne Darling-Wolf and Devon Powers, and my external reader, Sean Phelan. Thank you, Fab, for encouraging my engagement with critical theory and journalism studies and for supporting my work from the very first semester I entered the program. Thank you, Devon, for bringing enthusiasm and rigor to this project and for encouraging me to think practically about how to get it finished. And thank you, Sean, for offering valuable insights on this work at a time when the world was, to put it mildly, distracting. My deepest gratitude to Carolyn Kitch, who sparked my interest in research way back when I was a student in the M.J. program and has never hesitated to offer support ever since. I really wouldn’t have done this without you. Thank you to the many faculty mentors I’ve worked with along the way, who have shaped my teaching and scholarship, especially Aryeh Botwinick, Bruce Hardy, Magda Konieczna, George Miller, Nancy Morris, and Nicole Gonzalez Van Cleve. And thank you to Nicole McKenna, for making it all possible. iv To the friends I’ve made at Temple, there’s no way I can do justice to the support each of you have shown. Thank you especially to Urszula Pruchniewska and Shannon McLaughlin Rooney for the solidarity and commiseration in tough times, and for good humor and cheer always. Thank you to Emil Steiner for the enthusiasm and energy and constant presence across the aisle in the PhD office. Thank you to everyone from my cohort: especially to Diantha Vliet, for the essential gift of good conversation and to Lee Tae Cobb, for reminding me, and the rest of us, to take a deep breath and remember what’s important. Many thanks to the old friends who suffered me when I was insufferable through this process. Spare yourself what follows! Eternal thanks to my family: Alison, Eliza, and Sadie, who have sacrificed the most and whose love has kept me sane; Bob and Debbie, who have been endlessly generous in so many ways, especially in caregiving and encouragement; Dad, Meg, and Devin, who have always been there to share the good things in life; and the memory of my mother, who would have been proudest of all. v TABLE OF CONTENTS ABSTRACT ........................................................................................................................ ii DEDICATION ................................................................................................................... iii ACKNOWLEDGMENTS ................................................................................................. iv CHAPTER 1. INTRODUCTION .......................................................................................................... 1 Disrupting the Common Sense of Cyberlibertarianism .................................................. 5 A Journalistic Genealogy of Cyberlibertarian Doxa ..................................................... 10 2. THEORY: CYBERLIBERTARIAN IDEOLOGY AND INTERNET FREEDOM .... 20 Cyberlibertarianism and Negative Freedom ................................................................. 21 Doxa, Ideology, and Discourse ..................................................................................... 30 Journalistic Affinities with Cyberlibertarianism ........................................................... 45 Conclusion .................................................................................................................... 48 3. LITERATURE AND HISTORY: A GENEALOGY OF CYBERLIBERTARIAN INTERNET FREEDOM ................................................................................................... 50 Internet Freedom and the Ideology of Cyberlibertarianism .......................................... 52 The Idealization of Freedom in the History of the Internet .......................................... 57 Cyberlibertarianism: What and Who is Internet Freedom For?.................................... 73 Privilege and Cyberlibertarian Ideology ....................................................................... 79 Cyberlibertarianism’s Contemporary Discursive Reach .............................................. 87 vi Alternative Visions of Internet Freedom ...................................................................... 94 Conclusion .................................................................................................................. 101 4. METHODOLOGY: JOURNALISTIC GENEALOGY ............................................. 102 Normativity and Reflexivity ....................................................................................... 105 Genealogical Archives ................................................................................................ 107 Analytical Archives .................................................................................................... 110 Conclusion .................................................................................................................. 116 5. MAKING COMMON SENSE OF THE CYBERLIBERTARIAN IDEAL: THE JOURNALISTIC CONSECRATION OF JOHN PERRY BARLOW ........................... 117 Journalism, Barlow, and Cyberlibertarian Ideals ........................................................ 120 Barlow’s Declaration and its Legacy .......................................................................... 125 The Popular Press Consecrates Barlow ...................................................................... 132 The Rugged Cowboy Hipster of Internet Freedom..................................................... 139 Interpreting a Cyberlibertarian Internet for Mass Consumption ................................. 146 Complicating Internet Freedom in the Tech Press ...................................................... 154 Conservative Unorthodoxy and the Depoliticization of Internet Freedom ................. 160 Keeping the Legacy Alive: The EFF Remembers Barlow ......................................... 165 Conclusion .................................................................................................................. 168 6. INTERNET FREEDOM, FREE CULTURE, AND FREE INFORMATION: AARON SWARTZ AND CYBERLIBERTARIANISM’S NEOLIBERAL TURN ..................... 171 The Internet’s Boy Genius Next Door ........................................................................ 175 Granting the Coder Ethical, Political, and Cultural Expertise .................................... 178 Politics by Proxy and by Code .................................................................................... 181 vii United States v. the Robin Hood of Internet Freedom................................................ 184 The Boy who Would Have Saved the Internet and the World ................................... 188 For the Sake of a Technocratic Public .......................................................................
Recommended publications
  • Reddit, Google Crack Down on Posting Nude Pics SAN FRANCISCO — Feb 24, 2015, 8:03 PM ET by MICHAEL LIEDTKE AP Technology Writer
    HOME> TECHNOLOGY Reddit, Google Crack Down on Posting Nude Pics SAN FRANCISCO — Feb 24, 2015, 8:03 PM ET By MICHAEL LIEDTKE AP Technology Writer S hare 0 Share on email 5 Comments Reddit and Google are taking a tougher stance against nudity to prevent their services from turning into online peep shows. Social-networking and news site Reddit says it will remove photos, videos and links with explicit content if the person in the image hasn't given permission for it to be posted. Google Inc., the Internet's most powerful company, is going to ban most nude photos and video from publicly accessible sites on its popular Blogger service. The crackdown marks a shift in attitude for two services that have traditionally been freewheeling forums where users could literally let it all hang out. The lax approach has opened the door for nude and sexually explicit photos and video to be posted on Reddit and Blogger, even if the subjects featured in the images intended them to remain private. Until now, Reddit has had a hands-off approach to privacy, largely allowing its 160 million users to police their own forums within certain guidelines such as no child pornography or spam. The change comes about six months after hackers obtained nude photos of Jennifer Lawrence and other celebrities and posted them to social media sites including Reddit and Twitter. Without specifically calling out Reddit or Twitter, Lawrence lashed out at the sites that permitted nude photos to be posted of her. She likened the unauthorized use of photos of her body as a "sex crime." A Tuesday posting signed by Reddit interim CEO Ellen Pao and other company executives said the shift is an effort to help grow the site "for the next 10 years and beyond." Effective March 10, Reddit will prohibit any photograph, video or digital image of a person who is nude or engaged in a sexual act if the subject hasn't given permission for it to be used.
    [Show full text]
  • Cancel Culture: Posthuman Hauntologies in Digital Rhetoric and the Latent Values of Virtual Community Networks
    CANCEL CULTURE: POSTHUMAN HAUNTOLOGIES IN DIGITAL RHETORIC AND THE LATENT VALUES OF VIRTUAL COMMUNITY NETWORKS By Austin Michael Hooks Heather Palmer Rik Hunter Associate Professor of English Associate Professor of English (Chair) (Committee Member) Matthew Guy Associate Professor of English (Committee Member) CANCEL CULTURE: POSTHUMAN HAUNTOLOGIES IN DIGITAL RHETORIC AND THE LATENT VALUES OF VIRTUAL COMMUNITY NETWORKS By Austin Michael Hooks A Thesis Submitted to the Faculty of the University of Tennessee at Chattanooga in Partial Fulfillment of the Requirements of the Degree of Master of English The University of Tennessee at Chattanooga Chattanooga, Tennessee August 2020 ii Copyright © 2020 By Austin Michael Hooks All Rights Reserved iii ABSTRACT This study explores how modern epideictic practices enact latent community values by analyzing modern call-out culture, a form of public shaming that aims to hold individuals responsible for perceived politically incorrect behavior via social media, and cancel culture, a boycott of such behavior and a variant of call-out culture. As a result, this thesis is mainly concerned with the capacity of words, iterated within the archive of social media, to haunt us— both culturally and informatically. Through hauntology, this study hopes to understand a modern discourse community that is bound by an epideictic framework that specializes in the deconstruction of the individual’s ethos via the constant demonization and incitement of past, current, and possible social media expressions. The primary goal of this study is to understand how these practices function within a capitalistic framework and mirror the performativity of capital by reducing affective human interactions to that of a transaction.
    [Show full text]
  • Libertarian Marxism Mao-Spontex Open Marxism Popular Assembly Sovereign Citizen Movement Spontaneism Sui Iuris
    Autonomist Marxist Theory and Practice in the Current Crisis Brian Marks1 University of Arizona School of Geography and Development [email protected] Abstract Autonomist Marxism is a political tendency premised on the autonomy of the proletariat. Working class autonomy is manifested in the self-activity of the working class independent of formal organizations and representations, the multiplicity of forms that struggles take, and the role of class composition in shaping the overall balance of power in capitalist societies, not least in the relationship of class struggles to the character of capitalist crises. Class composition analysis is applied here to narrate the recent history of capitalism leading up to the current crisis, giving particular attention to China and the United States. A global wave of struggles in the mid-2000s was constituitive of the kinds of working class responses to the crisis that unfolded in 2008-10. The circulation of those struggles and resultant trends of recomposition and/or decomposition are argued to be important factors in the balance of political forces across the varied geography of the present crisis. The whirlwind of crises and the autonomist perspective The whirlwind of crises (Marks, 2010) that swept the world in 2008, financial panic upon food crisis upon energy shock upon inflationary spiral, receded temporarily only to surge forward again, leaving us in a turbulent world, full of possibility and peril. Is this the end of Neoliberalism or its retrenchment? A new 1 Published under the Creative Commons licence: Attribution-Noncommercial-No Derivative Works Autonomist Marxist Theory and Practice in the Current Crisis 468 New Deal or a new Great Depression? The end of American hegemony or the rise of an “imperialism with Chinese characteristics?” Or all of those at once? This paper brings the political tendency known as autonomist Marxism (H.
    [Show full text]
  • Tech Workplaces-Based on a Case Study of Ellen Pao V. Kleiner
    Advances in Economics, Business and Management Research, volume 118 International Conference on Management Science and Industrial Economy (MSIE 2019) Asian American Women Face the Bamboo Ceiling in American High- Tech Workplaces-Based on a case study of Ellen Pao v. Kleiner Perkins Leyi Cao Nanjing Foreign Language School, Nanjing, Jiangsu Province, 210000, China [email protected] Keywords: Asian American women, Bamboo ceiling, US high-tech workplaces, Intersectionality. Abstract. In the 21st century, Asian American women, as a group, are considered to face certain barriers-the bamboo ceiling in US high-tech workplaces specifically. The existence of such barriers and the choice of action toward the barriers become what people concern most about. Based on these issues, this paper first analyzes data to reveal the overview of the current situation of Asian American women in American High-Tech workplaces and are shown from comparisons between different social groups. Moreover, the paper also discusses a specific case raised by an individual Asian American Women against her employer company. Based on further analysis of the case, which is combined with the concept of intersectionality, the paper suggests more considerations of intersectionality and encourages more actions of Asian American women fighting for equality. 1.Introduction The glass ceiling faced by Asian Americans in current US workplaces is often recognized as the bamboo ceiling, referring to the practices that keep Asians from entering higher-paying, and more prominent jobs. By further considering Asian American women as a social group, intersectionality, in this paper, is employed to recognizing the intersection of race and gender in this issue.
    [Show full text]
  • The Only Ones Free Encyclopedia
    FREE THE ONLY ONES PDF Carola Dibbell | 344 pages | 10 Mar 2015 | Two Dollar Radio | 9781937512279 | English | Canada The Only Ones - Wikipedia More Images. Please enable Javascript to take full advantage of our site features. Edit Artist. The Only Ones were an influential British rock and roll band in The Only Ones late s who were associated with punk rock, yet straddled the musical territory in between punk, power pop and hard rock, with noticeable influences from psychedelia. They are best known for the song " Another Girl, Another Planet ". Viewing All The Only Ones. Data Quality Correct. Show 25 50 Refresh. Reviews Add Review. Artists I The Only Ones seen live by lancashirearab. Artists in My LP Collection by sillypenta. Master Release - [Help] Release Notes: optional. Submission Notes: optional. Save Cancel. Contained Releases:. The Only Ones Album 20 versions. Sell This Version. Even Serpents Shine Album 15 versions. Baby's Got A Gun Album 24 versions. Remains Comp, EP 6 versions. Closer Records. Live Album 8 versions. Mau Mau Records. The Peel Sessions Album Album 8 versions. Strange Fruit. The Big Sleep Album 5 versions. Jungle Records. Windsong International. Live In Chicago Album 2 versions. Alona's Dream RecordsRegressive Films. Lovers Of Today 2 versions. Vengeance Records 2. Another Girl, Another Planet Single 5 versions. You've Got To Pay Single 3 versions. Fools Single 5 versions. Trouble In The World The Only Ones 8 versions. Special View Comp, Album 11 versions. Alone In The Night Comp 2 versions. The The Only Ones Story Comp 5 versions. ColumbiaColumbia. Hux Records.
    [Show full text]
  • Sociotechnical Security As an Analytic Framework
    Entanglements and Exploits: Sociotechnical Security as an Analytic Framework Data & Society Research Institute Columbia University Matt Goerzen, ​ ​Elizabeth Anne Watkins, ​ Open Technology Fund Research Fellow Gabrielle Lim, ​ Abstract Unfortunately, platform-linked violence like the incidents in The rise of social media platforms has produced novel Christchurch and San Diego are not uncommon and are security threats and vulnerabilities. Malicious actors can unlikely to subside in the near future. Other forms of now exploit entanglements of once disparate technical and problematic and potentially dangerous content also social systems to target exposed communities. These proliferate. False and misleading content distributed on exploits pose a challenge to legacy security frameworks Whatsapp in India led to the murders of over two dozen drawn from technical and state-based conceptions of people in 2018 (Goel et al., 2018). The genocide of the referent objects and bounded information systems. In this Rohyinga in Myanmar was partially incited by the military paper we propose a new framework of analysis to meet this through disinformation and false accounts on Facebook challenge, Sociotechnical Security (STsec), which (Mozur, 2018). Facebook usage may also correlate with acknowledges how the interplay between actors produces higher rates of anti-refugee attacks in Germany (Müller and emergent threats to participant communities. This Schwarz 2018). Meanwhile, targeted harassment has been exploratory paper offers an overview of sociotechnical linked to self-censorship and a chilling effect on systems, explains why these threats and vulnerabilities internet-based communications (UN Office of the High require us to expand our understanding of security with Commissioner, 2017). Amnesty International in 2018, for regards to participatory technology, and how sociotechnical example, declared Twitter trolling of women a human rights security can be operationalized as a framework for analysis.
    [Show full text]
  • From Atoms to Bits
    Identity and Privacy in a Globalized Community By Joichi Ito June 17, 2002 Version 1.0 See http://www.neoteny.com/jito/english/notebook/privars.html for updates From atoms to bits In his Wired Magazine column of January 1, 1995 “Bits and Atoms” Nicholas Negroponte’ describes the shift in focus from atoms to bits.1 The shift from atoms to bits is still one of the most significant shifts impacting society today. As with most technical trends, people have over-anticipated the short term impact (the dot-com bubble) but have severely under-estimated the long term impact. The impact of digital communication networks and globalization on identities and nations The industrial revolution triggered a cultural shift causing nations to become powerful entities in a globalized geo-political world. The world began to focus on the products of mass production and the world began to focus mostly on the “atoms”. Individuals became able to travel easily and individuals began to be identified and tracked as physical units and physical borders rigorously managed. Digital communication technology and cyberspace has increased greatly the power and value of the non-physical world and is affecting the nature of national borders and identity. Here I would like to explore some of the changes facing an era of digital transnational communications, focusing on value shifting to cyberspace and its impact on identity, authentication and privacy. Scalability of communications as profound as mass production Although cyberspace and bits are rather new, non-physical space is an old idea. A major step toward large-scale shared virtual communities and the scalability of communications was the creation of the printing press and the public.
    [Show full text]
  • Toward a Broadband Public Interest Standard
    University of Miami Law School University of Miami School of Law Institutional Repository Articles Faculty and Deans 2009 Toward a Broadband Public Interest Standard Anthony E. Varona University of Miami School of Law Follow this and additional works at: https://repository.law.miami.edu/fac_articles Part of the Communications Law Commons, and the Law and Society Commons Recommended Citation Anthony E. Varona, Toward a Broadband Public Interest Standard, 61 Admin. L. Rev. 1 (2009). This Article is brought to you for free and open access by the Faculty and Deans at University of Miami School of Law Institutional Repository. It has been accepted for inclusion in Articles by an authorized administrator of University of Miami School of Law Institutional Repository. For more information, please contact [email protected]. University of Miami Law School University of Miami School of Law Institutional Repository Articles Faculty and Deans 2009 Toward a Broadband Public Interest Standard Anthony E. Varona Follow this and additional works at: https://repository.law.miami.edu/fac_articles Part of the Communications Law Commons, and the Law and Society Commons ARTICLES TOWARD A BROADBAND PUBLIC INTEREST STANDARD ANTHONY E. VARONA* TABLE OF CONTENTS Introduction ............................................................................................. 3 1. The Broadcast Public Interest Standard ............................................ 11 A. Statutory and Regulatory Foundations ...................................... 11 B. Defining "Public Interest" in Broadcasting .......................... 12 1. 1930s Through 1960s-Proactive Regulation "to Promote and Realize the Vast Potentialities" of B roadcasting .................................................................. 14 a. Attempts at Specific Requirements: The "Blue Book" and the 1960 Programming Statement ........... 16 b. More Specification, the Fairness Doctrine, and Noncommercial Broadcasting ................................... 18 c. Red Lion BroadcastingCo.
    [Show full text]
  • [Comments] International Internet Policy (NTIA)
    Regulatory Comment Comments submitted to the National Telecommunications and Information Administration in the Matter of: INTERNATIONAL INTERNET POLICY PRIORITIES Ryan Hagemann Alec Stapp Senior Director for Policy Technology Policy Fellow Niskanen Center Niskanen Center Submitted: July 17, 2018 Docket Number: 180124068-8068-01 EXECUTIVE SUMMARY One of the primary challenges to the continued free flow of information and speech online is the potential for a “control-driven model” of global Internet governance to supplant the existing American-inspired order. National laws and regulations, promulgated by countries around the world, could potentially impede cross- border information flows, to the significant detriment of not only U.S. companies and private sector interests, but free expression and human rights as well. But the threats to the current paradigm of multistakeholder-driven Internet governance do not spring only from nation-states. The emerergence of advanced technologies, such as automated botnets, hold the potential to devolve considerable power over the globally-networked digital ecosystem into the hands of non-state actors. It is a fragile time for the Internet. To combat these many emerging threats, it is imperative that the United States continue to play a leading role in defending the existing order for Internet governance. Digital commerce and trade requires a consistent, predictable, and simple legal environment to maximize the benefits to human beings worldwide. The right to freedom of expression, similarly, requires certainty and trust in an online environment made possible by a consensus-driven model of governance, led by stakeholders from industry and civil society capable of equitably balancing the complicated trade-offs that no single nation-state can do by fiat.
    [Show full text]
  • Reusdigital.Cat Us Porta Cultura
    Cap de Setmana | Reusdigital.cat | Actualitzat el 20/08/2021 a les 08:00 Reusdigital.cat us porta cultura Kalifat és la recomanació d'Adrià de las Heras per al cap de setmana | Netflix Com cada cap de setmana, els periodistes de Reusdigital.cat hem seleccionat per a tots vosaltres, amics i lectors, un tast de la cultura que aquests dies ens fa gaudir a redacció. Parlem, com és habitual, de llibres, de discos i de pel·lícules. Esperem que siguin del vostre gust i que, si us complauen, les feu córrer. Alba Cartanyà recomana "El secret del meu turbant" Davant la greu situació que està vivint l'Afganistan amb el retorn dels talibans, m'ha vingut al cap un llibre que vaig llegir ja fa un temps. Es tracta d'El secret del meu turbant, de l'escriptora Nadia Ghulam (Kabul, 1985), que explica la història real (i dura) de l'autora. Amb tan sols vuit anys, va quedar malferida per l'impacte d'una bomba i en sortir de l'hospital, dos anys més tard, el règim talibà s'havia instaurat al seu país. Per fer front a totes les prohibicions a què estava subjecta pel fet de ser dona, Ghulam es va fer passar per un noi durant deu anys per poder portar un sou a casa. El podeu adquirir aquí (https://www.grup62.cat/llibre-el-secret-del-meu-turbant/96140) . https://www.reusdigital.cat/noticia/86789/reusdigital-us-porta-cultura Pagina 1 de 4 Marc Busquets recomana la sèrie "Homecoming" Un cop l'espectador descobreix que rere Homecoming hi ha els responsables de l'estimulant Mr.
    [Show full text]
  • Trump's Disinformation 'Magaphone'. Consequences, First Lessons and Outlook
    BRIEFING Trump's disinformation 'magaphone' Consequences, first lessons and outlook SUMMARY The deadly insurrection at the US Capitol on 6 January 2021 was a significant cautionary example of the offline effects of online disinformation and conspiracy theories. The historic democratic crisis this has sparked − adding to a number of other historic crises the US is currently battling − provides valuable lessons not only for the United States, but also for Europe and the democratic world. The US presidential election and its aftermath saw domestic disinformation emerging as a more visible immediate threat than disinformation by third countries. While political violence has been the most tangible physical effect of manipulative information, corrosive conspiracy theories have moved from the fringes to the heart of political debate, normalising extremist rhetoric. At the same time, recent developments have confirmed that the lines between domestic and foreign attempts to undermine democracy are increasingly blurred. While the perceived weaknesses in democratic systems are − unsurprisingly − celebrated as a victory for authoritarian state actors, links between foreign interference and domestic terrorism are under growing scrutiny. The question of how to depolarise US society − one of a long list of challenges facing the Biden Administration − is tied to the polarised media environment. The crackdown by major social media platforms on Donald Trump and his supporters has prompted far-right groups to abandon the established information ecosystem to join right-wing social media. This could further accelerate the ongoing fragmentation of the US infosphere, cementing the trend towards separate realities. Ahead of the proposed Democracy Summit − a key objective of the Biden Administration − tempering the 'sword of democracy' has risen to the top of the agenda on both sides of the Atlantic.
    [Show full text]
  • TECHNOLOGY TOOLS of Thetrade
    TECHNOLOGY TOOLS of theTRADE ing wirelessly from your PC, and Pogoplug Biz you can plug in up to four stor- you’ll be able to stream and Pogoplug from Cloud Engines, age devices (thumb drives, hard download from Windows Mar- Inc., functions like a mini server drives), and each will be visible ketplace. Windows Live will help back home that delivers files to from home and away via Safari, manage pictures, and Windows you through your browser con- Firefox 3, IE 8, and Chrome Live Calendar and Office nection on the Internet. The browsers. There’s also an iPhone OneNote Mobile round out the company calls its device your app that offers access to the Windows portfolio of applica- own personal cloud because it storage devices from your tions. The general hardware delivers services like those from iPhone and iPad. There are three requirements for the different sites like DropBox—with one kinds of Pogoplugs—Pogoplug, manufacturers include five hard- major exception. When you’ve Pogoplug Pro (includes Wi-Fi ware buttons, including start, reached your limit of free stor- support), and Pogoplug Biz. The back, search, camera button, age space on DropBox, you start Biz version has usage statistics and power. The large screens will paying monthly storage rates. and auditing so you can see Windows 7 be multitouch capacitive with a With Pogoplug, the space is at how many times a file or folder Smartphone built-in accelerometer for shift- home on your own device,so has been viewed, streamed, or In mid-October, Microsoft had ing between portrait and land- there’s no additional cost to downloaded.
    [Show full text]