Pre-class Discussion for Jan 18

From Cyberlaw: Internet Points of Control Course Wiki
Jump to navigation Jump to search
  • Totally unrelated tribute to trivia team Bacon: Bacon Salt, whose is quest is to make everything taste like bacon is making $2m in revenue and is just 6 months old. NB: the vegetarian, the card carrying carnivore and the kids love it.

Zittrain, The Future of the Internet, Conclusion

Frank Bajak, Laptop project enlivens Peruvian village

For those interested, I found a link on YouTube that shows the laptop and explains its use. OLPC One Laptop per Child KStanfield 20:24, 17 January 2008 (EST)

  • I had the opportunity to experiment with an XO during a class on Science, Technology and Public Policy last semester. Kenyan-born Calestous Juma, the Director of Science, Technology and Innovation at the Kennedy School's Belfer Center was a guest speaker and he brought in an XO laptop for everyone to try out. Prof. Juma has devoted his professional career to sustainable development in the 3rd world and is a member of the board developing the XO's software. If you're interested in learning more about this impressive man, see the rather chatty Guardian story about Prof. Juma For Juma's thoughts on the problems of marketing the XO in Africa see Business Daily Africa article --Tseiver 21:51, 17 January 2008 (EST)
  • Here's a video review of the XO from a NY Times Technology writer. It shows its capabilities in more detail - and better resolution - than the item cited above by KStanfield. See NY Times XO review Yet another clip has a developer talking about it at a tech conference. See XO at tech fair --Tseiver 22:15, 17 January 2008 (EST)
  • One last video reference. This one is the slickest, produced artfully by the Red Hat development team for the XO. Quite informative. See Red Hat on XO The clip even ends with a Creative Commons message. --Tseiver 22:30, 17 January 2008 (EST)
  • I have a concern related to the kill switch. See details on the wiki referenced in the JZ chapter here. Even if thieves couldn't work around it, couldn't they just threaten the owner with violence if it is deactivated? I can imagine a sad child coming to school without their laptop - the teacher wants to report it as stolen so it can be deactivated if it is in range of a wireless access point, but the student is scared of reprisal. In other words, the thieves might not be able to break the technological layer of anti-theft, but they can substitute a social/physical technique. Anyone see a solution to this? I realize that it's not a critical problem with the program, rather something that should fall under the procrastination principle. WillM 23:22, 17 January 2008 (EST)
    • I guess one solution would be to make the laptop permanently keyed to the child (perhaps through a biometric like a fingerprint scanner) although this would make the computer significantly, if not prohibitively, expensive. The manufacturers did put in some level of theft-protection, at least from adults - the keys are so small that it would be difficult for anyone but a child to type on it. There may also be other enforcement mechanisms. The police might confiscate the laptop if they saw it in an adult's hands or social pressure from the community might be brought to bear on such an individual. Anna 01:16, 18 January 2008 (EST)

Stecklow & Bandler, A Little Laptop With Big Ambitions

Link to the 60 minutes piece referenced in the article. WillM 23:56, 17 January 2008 (EST)

Palfrey & Gasser, Born Digital (Optional)

John Perry Barlow A Declaration of Independence for Cyberspace

  • Apparently Barlow has tempered his optimism regarding cyberspace becoming a sort of left-libertarian utopia. See towards the bottom of this 2004 interview in Reason here. Saying of his earlier writing on cyberspace and presumably this declaration in particular, "We all get older and smarter." WillM 13:48, 17 January 2008 (EST)
  • I think it would be a mistake to take this declaration too literally, much like Barlow's earlier appearance in the material related to copyright (i.e., bands should all tour for their revenue and not worry about piracy). Nonetheless, I'll take the argument seriously:
    • Barlow consents to government control over our bodies in the physical world, but not in cyberspace, "Ours is a world that is both everywhere and nowhere, but it is not where bodies live." Is this a good justification for cyberspace being entirely free from real-world governments? Cyberspace might not be a place where bodies live, but what goes on there (e.g., child pornography) can have very real effects IRL. So then it becomes a sort of jurisdiction question: should real-world institutions ever have jurisdiction over a cyber-event? Barlow says no, but I would argue the answer is yes when the actions in cyberspace have directed effects at that other jurisdiction, the real world. WillM 22:38, 17 January 2008 (EST)
      • I felt that the tone of this piece was less of a declaration and more of a call to arms. It didn't seem like he was saying that this had already occurred or that this was inevitable, but rather that this was a possibility and the one that he wanted to encourage others to fight for. Anna 01:25, 18 January 2008 (EST)
        • Also, does Godwin have a corollary for child pornography? Anna 01:26, 18 January 2008 (EST)