This document discusses several topics related to internet governance and regulation. It begins by defining governance and international regimes. It then outlines some key international regimes for information and communication technologies, including the Domain Name System, e-commerce, intellectual property rights, and efforts to bridge the digital divide. It also discusses issues around these regimes, such as disputes over domain names, how to regulate e-commerce, and debates around intellectual property enforcement. The document then covers the history of file sharing technologies like Napster, Gnutella, BitTorrent, and related legal issues and crackdowns. It concludes by posing questions about media ownership concentration and how file sharing has impacted intellectual property.
Talk delivered on March 23, 2011, as part of the Speaker Series of the Rob Kling Center for Social Informatics at Indiana University, Bloomington, Indiana.
Glyn moody ethics of intellectual monopolies - fscons 2010FSCONS
FSCONS 2010 talk about how copyright and patents were created to deal with scarcity; in today's world of creative and inventive abundance, we need neither. Freeing up knowledge for all to use would cause a positive feedback loop of creativity and invention.
Talk delivered on March 23, 2011, as part of the Speaker Series of the Rob Kling Center for Social Informatics at Indiana University, Bloomington, Indiana.
Glyn moody ethics of intellectual monopolies - fscons 2010FSCONS
FSCONS 2010 talk about how copyright and patents were created to deal with scarcity; in today's world of creative and inventive abundance, we need neither. Freeing up knowledge for all to use would cause a positive feedback loop of creativity and invention.
lecture on the politics of net neutrality, to be delivered in Noriko Hara's graduate seminar at Indiana University, School of Library and Information Science, on November 12, 2013
Although the slides are from 1999, Mike O'Connor presented it to the Minnesota Broadband Task Force on Cot 24, 2008. Fun to see what remains salient. Also, great explanation of the layers of technology involved in providing Internet access.
On July 4, the European Parliament voted by a huge majority to reject the Anti-Counterfeiting Trade Agreement (ACTA) in one of the most bitterly-fought political battles in recent years. Why did an apparently obscure trade agreement about counterfeits turn into a fight for the soul of the Internet – and a key moment for the future of European democracy?
This talk examines the origins of ACTA, and how it forms part of a larger attack on the Internet and on online freedom. It considers what ACTA’s defeat means for the Internet, digital activism and European politics.
A presentation by SUI GENERIS GROUP
ATTY. ALDER K. DELLORO
MR. LUDOVICO K. DELLORO
ATTY. ANTON CARLO E. ESPINO
MS. AUREN GALANG
MR. CARLO MARTIN
MS. MARIA THERESA MIJARES
MR. ALBERT ONG
REP. WILLIAM IRWIN TIENG
lecture on the politics of net neutrality, to be delivered in Noriko Hara's graduate seminar at Indiana University, School of Library and Information Science, on November 12, 2013
Although the slides are from 1999, Mike O'Connor presented it to the Minnesota Broadband Task Force on Cot 24, 2008. Fun to see what remains salient. Also, great explanation of the layers of technology involved in providing Internet access.
On July 4, the European Parliament voted by a huge majority to reject the Anti-Counterfeiting Trade Agreement (ACTA) in one of the most bitterly-fought political battles in recent years. Why did an apparently obscure trade agreement about counterfeits turn into a fight for the soul of the Internet – and a key moment for the future of European democracy?
This talk examines the origins of ACTA, and how it forms part of a larger attack on the Internet and on online freedom. It considers what ACTA’s defeat means for the Internet, digital activism and European politics.
A presentation by SUI GENERIS GROUP
ATTY. ALDER K. DELLORO
MR. LUDOVICO K. DELLORO
ATTY. ANTON CARLO E. ESPINO
MS. AUREN GALANG
MR. CARLO MARTIN
MS. MARIA THERESA MIJARES
MR. ALBERT ONG
REP. WILLIAM IRWIN TIENG
30 C o M M u n i C at i o n s o f t h e a C M j A.docxtamicawaysmith
30 C o M M u n i C at i o n s o f t h e a C M | j A n U A R Y 2 0 1 2 | V O L . 5 5 | n O . 1
V
viewpoints
T
He eMeRGence of the Internet
has put enormous pressure
on the rights model of U.S.
copyright law. That model
is premised on the notion
that copyright holders are entitled to
control the making of copies of their
works, but technology has made that
control somewhere between fragile
and nonexistent. Content creators
have struggled to restore the control
assumed by copyright law. Two recent
developments, one pending federal
legislation and the second an industry-
wide agreement between Internet ser-
vice providers and content distributors,
provide new looks at this ongoing issue.
Technology and copyright have a
complex relationship. New waves of
technology have created novel expres-
sive opportunities and dramatic im-
provements in the ability to distribute
copyrighted works. But new technol-
ogy rarely asks permission, and with
each technical advance, we have seen
new opportunities and new clashes.
Perforated rolls for player pianos in
the early 1900s came from sheet mu-
sic and roll producers were not eager
to write checks to copyright holders.
Radio saw recorded music as a way to
fill the airways even though disks came
with a legend stating that the music
was not licensed for radio broadcast.
And the VCR introduced a new vocabu-
lary—time shifting—and the chance to
watch TV on your schedule, not broad-
casters’ schedules. It did so without of-
fering any compensation to broadcast-
ers or show producers and even created
the risk that the financing model for
free broadcast TV would be put at risk
by viewers with nimble fingers who
fast-forwarded through commercials.
Since at least the advent of Napster,
the music industry has struggled to find
a strategy to control illegal downloads
of music. Technology made it very easy
to rip CDs and share the results with the
world. The music industry responded
with lawsuits, first against Napster,
Aimster, and Grokster, and then against
individual consumers, leading to prom-
inent examples such as the ongoing
saga of Jammie Thomas-Rasset. The
suits have been on the whole quite suc-
cessful, at least as measured by the stan-
dards that lawyers use. Grokster lost 9-0
on the question of whether it might be
liable for inducing copyright infringe-
ment (there was much more division
on the question of how the U.S. Su-
preme Court’s prior Sony case should
apply to this situation). Thomas-Rasset
has faced juries multiple times and
each time jurors have come back with
damage awards—the first time $1.92
million and second time $1.5 million—
that judges found too high.
Notwithstanding all of that, the
Law and Technology
The Yin and Yang of
copyright and Technology
Examining the recurring conflicts between copyright
and technology from piano rolls to domain-name filtering.
DOI:10.1145/2063176.2063190 Randal C. Picker
...
Slides I used in a paper at the Centre for Research in Media & Cultural Studies (Dec 2010). Draws on my research and teaching into piracy over the last 18 months
Might need to update them at a later date with the references used, etc, and fix the image acknowledgements. Work in progress
Glyn moody: ethics of intellectual monopolies - fscons 2010glynmoody
FSCONS 2010 talk about how copyright and patents were created to deal with scarcity; in today’s world of creative and inventive abundance, we need neither. Freeing up knowledge for all to use would cause a positive feedback loop of creativity and invention.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
2. Governance
Governance is a service that
governments and other authoritative
bodies perform
Defined by Oran Young as “The
establishment and operation of social
institutions…capable of resolving
conflicts, facilitating cooperation, or, more
generally, alleviating collective action
problems.”
3. International Intergovernmental
Regimes
Defined as systems of rules, norms,
procedures, and informal practices that
constrain the behavior of governments of
nation-states.
International governance and international
intergovernmental regimes are not the same
because some international governance can
occur with only minimal involvement of
governments.
4. International Regimes for ICTs
The Domain Name System
E-Commerce
Intellectual Property Rights and Digital
Rights Management (DRM)
Bridging the Digital Divide (e.g. the DOT
Force)
WSIS and the Internet Governance
Forum
5. The Domain Name System
Origins in the system administered by
Jon Postel
Postel regime generalized into the Internet
Assigned Numbers Association (IANA) by the
Internet Society
IANA establishes ICANN in collusion with the
US Department of Commerce
ICANN comes under strong criticism for
Commerce veto (EU; Milton Mueller)
6. DNS-Specific Issues
Integrity of root server system
Global Top-level domains vs. country domains
Need to regulate registrar monopolies
(Network Solutions/Verisign) or make registry
industry more competitive
Cyber squatting vs. trademark and brand-name
protection of large firms (UDRP)
.xxx domain dispute
The Internet is for Porn video
7. E-Commerce Governance
Issues
Should there be policies to promote
migration from bricks and mortar to
bricks and clicks or just clicks?
How is e-commerce to be regulated?
Is there a geographic location where the
transaction takes place (for taxation
purposes) and if so what tax is to be
charged?
8. Increased Focus on Protecting
Intellectual Property
RIAA, MPAA attacks on file sharing
Counterarguments by scholars about the
negative aspects of overly ambitious
“digital rights management”
9.
10. Jar Jar Binks: The Phantom
Edit
Wikipedia story on it
2001 story in Salon.com
Jay and Silent Bob on the Phantom Edit
Initially George
Lucas supported the
phantom edit but
then reversed
himself
11. History of Copyright Act
1790 Congress passes copyright act
1830 Act expanded to published music
1856 Act extended to published plays
1870 Act extended to works of art. Library of
Congress become clearing house.
1897 Act extended to public performances
1909 Act extended to reproductions (piano rolls)
1912 Motion pictures added
1976 Sound recordings and unpublished works
1980 Computer programs
1992 Audio Home Recording Act
1998 Copyright Term Extension Act
12. Copyright Term Extension Act of
1988
The Copyright Act of 1976 set the term of copy as
the life of the author plus 50 years for individuals
and for the life of the author plus 70 years for
corporations or 95 years after publication.
The Copyright Term Extension Act of 1988
(sponsored by Sonny Bono) extended copyright
terms in the US by 20 years to 95 years after
publication.
Also called “The Mickey Mouse Protection Act.”
Rep. Sonny Bono (of Sonny and Cher fame)
14. Oswald the Lucky Rabbit and
Steamboat Willie
Oswald the Lucky Rabbit 1927
Steamboat Willie 1928
Disney worked on Oswald the Rabbit for
Charles Mintz of Universal Studios. When he
asked for more production money in 1928, Mintz
reminded Disney that Universal owned the rights
to Oswald the Rabbit. Disney quit and formed
his own studio and never again lost control of his
intellectual property.
15. More Recent Intellectual
Property Rights Legislation
Digital Millennium Copyright Act (DMCA)
of 1998
Inducing Infringement of Copyrights Act of
2004
16. DMCA authorized methods for
digital rights management
Licensing
Watermarking
Registerware
Tethering
Privacy tax
17. Other DMCA provisions
Limits on caching
Prohibits links to DMCA-illegal material
ISPs told to act expeditiously to block
illegal content or activity
Special leeway for libraries
Compulsory licensing to webcasters with
terms regulated by Library of Congress
18. File Sharing and Piracy
Digital files unlike analog content suffers
no loss in quality when copied
Recording Industry and Movie Industry
both worried about illegal copying of
copyrighted content (which they call
piracy)
MP3s for audio files more vulnerable
than video files because smaller in size,
but video file sharing is already
happening
19. Napster Shawn Fanning
Sean Parker
Founded in June 1999, Napster was one of the
first systems to utilize a large- scale the peer to
peer model of sharing files.
Peer to peer (P2P) sharing occurs when
computer networks when one Internet node
shares files with another node
The earliest peer to peer networks (e.g
Napster) were client-server based: a central
server tends to provide access to files that can
be shared.
20. Metallica Suit against Napster
Metallica discovered that a demo of their song ‘I
Disappear’ had been circulating across the
Napster network, even before it was released.
This eventually led to the song being played on
several radio stations across America, and also
brought to Metallica’s attention, was that their
entire back catalogue of studio material was also
available. The band responded in 2000 by filing a
lawsuit against Napster.
Napster Bad video
21. Napster shuts down
In November 1999, the RIAA filed suit against
Napster for copyright infringement.
The RIAA’s suit was successful and Napster had to
close down in July 2001.
By 2001, Napster had 26.4 Million users.
British icons Radiohead alluded to Napster as helping
their album “Kid A” debut at number 1 in America on
the Billboard charts its debut week, something the
English rockers had never come close to doing in
America, for they had never even been in the top
twenty.
22. Gnutella Networks
New P2P client software that did not rely
on a single server.
Examples: Grokster, Kazaa, LimeWire,
Morpheus, eDonkey and BearShare
By June 2005, 1.8 million nodes
By January 2006, 3 million nodes
MGM filed suit against Grokster in 2003
Grokster shut down in Nov. 2005.
23. How BitTorrents Work
BitTorrent networks were even
more decentralized than gnutella
networks. Rather than
downloading a file from a single
source server, the BitTorrent
protocol allowed users to join a
"swarm" of hosts to download
and upload from each other
simultaneously.
24. Bit Torrents Explained (continued)
As you are downloading this
Led Zeppelin song, or
whatever you would like to
download, other users can
simultaneously download what
you have completed of the Led
Zeppelin file even if it is not
fully completed. When another
user is downloading a piece of
one of your files, you become
a seeder, essentially the place
where the original file exists, or
the seed. Seeing as this is an
important concept, another
diagram illustrating a user’s
dual nature within each
network is necessary.
Azureus, now called Vuze : Bittorrent Client
25. Recent Actions against BitTorrents
By 2009, BitTorrent traffic accounted for 43-70
percent of all Internet traffic.
Comcast throttles BitTorrent traffic on its
network in 2008 (FCC intervenes to stop this).
October 2010: U.S. District Count judge files an
Injunction against Lime Wire, the company that
operated LimeWire file sharing software.
November 2010: Dept. of Homeland Security
crackdown on Torrent-Finder.
26. The Pirate Bay and the Pirate
Party
Founders of The Pirate Bay in
Sweden found guilty of assisting
with the violation of copyrights
and sentenced to serve prison
terms in 2009.
The Pirate Party was founded in
Sweden in 2006. It has become a
model for the global
International Pirate Movement.
The party’s main goal is to reform
patent and copyright laws.
27. Anti-Counterfeiting Trade Agreem
(ACTA)
Supported by the RIAA and the MPAA
Would exist outside the WTO, WIPO and
the UN
Begun in 2006
Secret negotiations criticized
Agreement signed October 2011 (by US)
and in January 2012 (by EU)
Video by Harold Feld
European protests
28. Three Guiding Questions
To what extent does the Internet media sector
mimic the long-established patters of
concentrated ownership in the broader print
and broadcast media?
To what extent has it altered the processes
shaping a central area of media content: news
production and distribution?
What has been the effect of the phenomenon
of file sharing, the rise of open-source
software, and other intellectual property
disputes? Chadwick, chap. 12, p. 289.
33. Key Scholarly Works on
Media Concentration
Ben Bagdikian, The Media Monopoly (6th
edn. 2000)
Eli Noam, Media Ownership and
Concentration in America (2009)
Robert McChesney, Rich Media, Poor
Democracy (2000)
Robert McChesney, The Political
Economy of Media (2008)
35. Okinawa Charter
G8 agree to it in June-July 2000 at the
Okinawa Summit
Puts forth principal of inclusion:
“..everyone everywhere should be enabled to
participate in and no one should be excluded from
the benefits of the global information society.”
States G8 commitment to bridging the global
digital divide
Establishes the Digital Opportunity Task Force
(DOTForce)
36. Four Areas of Action for DOTForce in
Okinawa Charter
Fostering policy, regulatory, and network
readiness
Improving connectivity, increasing
access, and lowering costs
Building human capacity
Encouraging participation in global e-
commerce and other e-Networks
37. 7 DOTForce Teams
National e-strategies
Access and connectivity
Human capacity building
Entrepreneurship
ICTs for health
Local content and applications
Global policy participation
38. Distinctive Features of DOT Force
Multi-stakeholder representation
G8 governments
Private firms
Non-profit 0rganizations
International organizations
Constitutes a response to criticisms
voiced in Seattle and elsewhere (G8 led
by Japan and Canada in 2000 and 2001)
39. DOT Force Results
Final report,
Report Card: Digital Opportunities for All,
presented to the G8 in Canada at Kananaskis
summit in June 2002
Variety of projects with a variety of funding
sources begun (see Appendix II in paper)
DOT Force formally ceased operations after
the Kananaskis summit
Hand off to UN ICT Task Force and the
World Summit on the Information Society in
2003
40. World Summit on the
Information Society (WSIS)
Direct follow-on to the DOT Force at
the United Nations Video about
WSIS 2010
in Geneva
Two big meetings
Geneva 2003
41. Internet Governance Forum
a multi-stakeholder forum for policy
dialogue on issues of Internet
governance. The establishment of the
IGF was formally announced by the
United Nations Secretary-General in July
2006 and it was first convened in October
/November 2006.
Video on cloud computing
at IGF in Vilnius, 2010