Author Archives: Meredith Thompson's Blog

Blog Post #19 Lawrence Lessig TED talk

Lawrence Lessig started off his talk opening up with 3 user generated content stories. The first story was about John Phillips Susa (spelling might be incorrect-sorry its my weakness) who went to the United States capital about talking machines. He claimed they would ruin music development in the future. Susa’s fear was we would lose creativeness in our culture because of the talking machines. Susa was definitely right. Looking on today’s society, we are losing our culture due to these machines who can write music for us. The second story was about land and trespassing and tying in airplanes. Were airplanes trustpassers was the biggest question in 1945.  This issue was taken to the Supreme Court but was turned down because if every plane had to get permission to fly over farms there would be tons of lawsuits suing airplane flyers and companies. This story tied into common sense. It said it should be common sense we should be allowed to fly over land without always having to get permission. The third story was about terror and content industry creating by the broadcast industry. ASCAP was the regulator who would broadcast and control content. They had licensing of all the content. BMI was then started and took public domain works that was given away for free (7:10-7:25 of video). ASCAP doubled its rates and claiming people would revolt. They would start using user generated content (ugc) on sites like YouTube  because it was amateur culture. “For the love of what they are doing not the money” (8:45 of video). Remixing has started to become a very popular thing especially among children. Its not piracy, anyone with computer access can do it. Laws make this thing illegal, technically. You are a trustpasser if you don’t have permission. Two extremes have come about from this: 1. Auto takedown – YouTube does it. Unfair use so YouTube takes it down 2. Extremism to fight the law and this should be allowed. We need to make a solution and it needs to be down now. I agree with Lessig. I think his idea about having a BMI again. This allows for everyone to be free with use of music to remix for example. Getting artist and business to agree on this is going to be hard, but it needs to be done.

Blog Post #14 “Where Wizards Stay Up Late” Chapter 8

In the final chapter of the book, Hafner and Lyon talked about the military and army and their use with computers and networks. In the early 1970s, most military satellites were in orbit (Hafner and Lyon 221).  While sitting at a conference Cerf and Kahn had drawn up an idea for the internet design. They came up with the idea how to connect from ARPANET to Satnet and a Prnet. Ethernet was also discussed in this chapter. Ethernet allowed for one to be sitting at lets say a desktop computer and send information to a printer connected to the desktop, to print off a document. This chapter also discusses things such as CDNETT and BITNET. Its fascinating to read about all the different communication systems they were able to come up with. In 1989, the internet was officially working for everyone. It is fascinating to think that the internet is really not that old at all.

Blog Post #13 “Where Wizards Stay Up Late” Chapter 7

Finally something I have always wanted to learn more about, the invention of E-mail. Not that I don’t find the internet interesting, I do. I just find email fascinating and the things we are now able to do with it. Between the years 1972-1980, email was referred to as network mail by the thousands of users that had access to it.The first email was sent in 1972 at BBN. Email was actually an art and lucky accident that happened (Hafner and Lyon 189). One problem that occurred with emailing was headers. Header sometimes would appear to the receiver of an email with everything misconstrued in the message. Email at first was almost like asking someone on a date at first because you had to ask someone if you could send them a message. In 1975, Steve Walker came up with the idea Message Service Group, MsgGroup. MsgGroup was a tool used so multiple people could message each other through a mailing list. The idea of free speech also came about with the email. People were allowed to speak and say whatever they wanted too, but it was in writing. People quickly became comfortable with this notion.

Blog Post #12 “Where Wizards Stay Up Late” Chapter 6

As lame as this is about to sound, I was really excited this chapter started with pictures. Hafner and Lyon have dropped so many names in this book. It was nice to finally put names to faces so readers kind of knew who they were talking about. Back to the actual content, loop test became important because it provided a way to isolate the source of many troubles with the IMP (Hafner and Lyon 162). This chapter goes on about the different issues they were still having and which team member was trying to fix them. Robert’s threatened to cancel BBN’s contract with Honeywell due to constant failures and the lack of cooperation from their engineers. It seems they worked out their differences and issues. Heart’s team and Roberts discussed the possibility of connecting many new users to the net without going through a host computer (Hafner and Lyon 171). This is where the idea for the internet began. In the fall of 1971, BBN finally got a prototype up and successfully running after years of failures. I found the information on page 182-183 about the program called the Doctor. The program, from what I understood, allowed one to mimic a conversation one would have with a Doctor.  What an interesting fact to find out about how people were first able to interact virtually.

Blog Post #11 “Where Wizards Stay Up Late” Chapter 5

This chapter begins talking about Steve Crocker and Vint Cerf and how they grew up as best friends. They drifted in and out of each other’s lives, but then in the summer of 1968  the two were reunited at UCLA working for Estrin and the super computer project. The next part of this chapter talked about the search for protocols. I thought the part that talked about RFC-1 also known as Request for Comments. Reid talked about how it made him feel like he could “play in this club too” (Hafner and Lyon 144). Kind of reminds me of a present day Facebook group message. Back to the chapter, the most difficult part everyone faced that was involved was designing the host-to-host protocol. By the end of 1969, a host-to-host protocol still hadn’t been successfully created. Although in the end, the first ARPA network map was designed, which was a huge success.

Blog Post #10 Social, Economic, and Cultural Impacts Article #3

Title: How Does The Internet Actually Work?

Authors: Peter W. Singer and Allan Friedman

This article starts off talking about an incident that happened in Pakistan back in 2008. The Pakistani Government tried to hold its citizens from viewing explicit content on the popular video site, YouTube. The government tried to make a fake IP address, Pakistan Telecom. If any Pakistani attempted to log onto Youtube, they were redirected to a fake site. This quickly failed when too many users logged on to the fake site and crashed their server. Singer and Friedman then talked about how the Pakistani Government and the people in charge of Pakistan Telecom didn’t quite know how the internet worked, so they give readers a breakdown.

Blog Post #9 Social, Economic, and Cultural Impacts Article #2

Title: Cyberbullying: Prevention and Intervention to Protect Our Children and Youth

Authors: John Snakenborg, Richard Van Acker, and Robert A. Gable

Article Location: Preventing School Failure, Volume 55, No. 2, 2011

Bullying is a big issue among America’s youth. These children today are growing up in the social media era. They are exposed to the same trends adults are seeing. They have access to social media sites. These children do not exactly know how to use these sites properly, leading to cyberbullying. Cyberbullying affects more people because one can be as violent and mean as they want, without having to personally say the things they say over the internet to someone’s face. Prevention and intervention programs across the country are being implemented in school’s across the nation to try and help stop this growing problem. Children are also being taught how to learns sign they might be targets of cyberbullying. Many states have written legislation to help address  and prohibit cyberbullying as well.