Reading10

Internet service providers (ISPs) such as AT&T and Comcast are able to actively censor certain contents by slowing down their access. Many people, with support from content providers such as Google and Apple, are seeking to prevent the ISPs from exercising their selective power. The principle is called Net Neutrality. According to the article What is net neutrality and what does it mean for me?, net neutrality states that “Internet service providers (ISPs) should give consumers access to all legal content and applications on an equal basis, without favoring some sources or blocking others. It prohibits ISPs from charging content providers for speedier delivery of their content on “fast lanes” and deliberately slowing the content from content providers that may compete with ISPs.” With the support from the government, supporters of net neutrality hope to create an Internet environment where all resources are equally accessible.

Many people support net neutrality because of their belief that it will help protect the openness of the Internet. They do not want to grant the ISPs the power of censorship over contents. They believe that such power can be easily abused. For obvious reasons, content providers support net neutrality. They argue that the consumers have the right to access content since they have already paid for connectivity. And the responsibility of providing a quality Internet access lies with the ISPs. Additionally, without net neutrality, content provider will have to answer to the ISPs as well as their costumers. This can lead to the problem of unfair competition. As stated in the article An Introduction to Net Neutrality: What It Is, What It Means for You, and What You Can Do About It, “while big services like Netflix could, in theory, afford to pay Comcast for using extra bandwidth, the small, lesser-known services—that could be big one day but aren’t yet—can’t.”

People against net neutrality are mainly concern with the restriction it puts on innovation and investment. They argue that ISPs have the right to distribute their network differently for different contents. In particular, video-streaming websites such as Netflix uses up a lot of Internet resource. Anti-net neutrality activists believe that the cost for upgrades needed to support the heavy traffic should be shared by content providers or their access should be restricted. Also, net neutrality is not welcomed among free market proponents. They believe that content providers should be able to compete freely for the limited Internet resource. The innovations resulting from the free competition could lead to more efficient use of the Internet.

I am against net neutrality because I don’t think it could lead to the kind of Internet environment its proponents dream of. I agree with the statement that “the Internet is a public service and fair access should be a basic right”. However, “fair access” does not mean “equal access”. If Netflix is taking up more resources than other content provider, it is fair for the ISPs to charge them more or slow down its delivery. In this case, forcing the idea of equal access would be considered unfair. Instead of asking ISPs to hand over the complete control over Internet accessing speed, the government should pass regulations and guidelines on criteria for slowing down content delivery. This way, ISPs are unable to exercise unfair discrimination for their own gain. Content providers will have to work hard on innovations in order to avoid being slowed down. Therefore, we could have a much better Internet environment for the consumers.

 

Project 3 discussion

The link to our radio ad is here:

 

Is encryption a fundamental right? Should citizens of the US be allowed to have a technology that completely locks out the government? 

I think encryption is a fundamental right. The purpose of encryption is to block unauthorized access to private information and thus defend the fundamental right to privacy. Technology has greatly improved our lives and we should be able to use it without compromising our private information. However, the idea of privacy is fundamental but not absolute. In another word I don’t think that the right to privacy is the foundational principle of the society and basis for all of our decisions. Facing with today’s complex and sometimes hostile global political landscape, I don’t feel comfortable agreeing to the statement that people should be allowed to have a technology that COMPLETELY locks out the government.

How important of an issue is encryption to you? Does it affect who you support politically? financially? socially? Should it?

The issue of encryption is moderately important to me. I believe that it is a fundamental right but the situation surrounding it can be incredibly complex. The issue will not have a huge effect on my decision about who to support politically, financially or socially. However, I would be more likely to support someone who believe that encryption and privacy is a fundamental right and acknowledge that the real world is far from black and white so more discussion is needed when there needs to be a compromise between national security and personal privacy. 

In the struggle between national security and personal privacy, who will win? Are you resigned to a particular future or will you fight for it?

On this issue, I think neither side will gain a complete victory. The struggle between national security and personal privacy parallels the struggle between collectivism and individualism. It is important to understand that neither end of the spectrum is good for us. What is important is that we find a balance between the two. As long as the debate is ongoing, we will be able to discuss different situations independently instead of applying a rigid rule to all.

Reading 09

Digital Millennium Copyright Act, or DMCA, is a law aiming at protecting intellectual properties in digital forms by regulating their usages. As stated in the article EFF – Digital Millennium Copyright Act, DMCA consists of two main sections: the “anti-circumvention” section prevents users from using or developing tools that can circumvent the digital locks such as “access controls and technical protection measures”. The “safe harbor” section protects service providers from “monetary damages for the infringing activities of their users and other third parties on the net”. When found in violation against this act, a user will be asked to takedown the material to avoid lawsuits, which can lead to sever civil and criminal penalties.

Specifically, DMCA prohibits the use and manufacturing of devices that circumvent DRM schemes. I think it is ethical for companies to use these DRM schemes because they have the right to protect their intellectual properties with their own means. There is no difference between using DRM schemes and installing clothing store security doors in malls. Therefore, it is unethical for end users to circumvent these DRM schemes. Using the same analogy, circumventing these schemes would be the same as attempting to shoplift. The reason why people tend to be more ok with copyright infringement than shoplifting is their false idea about the Internet and sharing software products. It is true that Internet was built to facilitate sharing on a global scale. But sharing does not equal to getting and using things for free. People often confused the idea of readily available with the idea of easily produced or manufactured. There are free resources and open-source software on the Internet, which are designed to be freely used by everyone. It is important to recognize the fundamental differences between these products and the ones that are copyrighted.

However, many recent stories have indicated that DMCA is not quite effective at educating people about the value of copyrighted digital products. Instead, it is overreaching into other aspects of Internet usage, generating resentment and even more circumventing and pirating. The “notice and takedown” approach imposes restrictions on users’ freedom of expression. The example of this restriction is shown in the article The Tyranny of Copyright, which tells the story of students at Swarthmore College being asked to take down their posts that were found to be in violation of DMCA.

On the other hand, although there is no explicit mentioning of reverse engineering in DMCA, many court rulings have been in favor of using DMCA to restrict it, regardless of the purpose. The act made the assumption of any attempt at reverse engineering is aimed at finding loopholes and take advantage of them. It completely ignores the many valid reasons for performing reverse engineering. The article Software, reverse engineering and the law lists three of these legitimate reasons: first, reverse engineering is needed if the programmers of the product are no longer accessible, and reverse engineering can give us answers about the technology. Second, programmers planning on developing software that can interoperate with the one being studied may wish to use reverse engineering. Third, reverse engineering is a powerful method to study the software and probe for bugs and security flaws. All these uses are beneficial to the software company and the programming community. Therefore, whether reverse engineering should be permitted depends on why it is performed. For example unlocking a contract phone should not be permitted but personalizing software in vehicles or probing software for security bugs to enhance security should. It is important that DMCA remains flexible enough so that it does not destroy the collaborative environment vital to advances in the technology industry.

Reading 08

With numerous innovations in technological and scientific fields, people become increasingly aware of the importance and power of patent and its contributions to protecting intellectual property. Patent is defined in the article WIPO – What is IP? as “an exclusive right granted for an invention – a product or process that provides a new way of doing something, or that offers a new technical solution to a problem.” There are many reasons for granting patents. From a moral and ethical perspective, the society has the obligation to protect its members’ belongings and intellectual properties or the creations of the minds are as valuable as any physical properties. Socially, granting patents praises creativity and encourages innovations, which has the potential to improve the quality of life for all human beings.

In principle, patent is given as a form of recognition for inventions and contributions to the society. Granting patents can be beneficial for the society but can also be prone to certain problems. Patent acts as an incentive for innovations but also promote fierce and sometimes unhealthy competitions among inventors that could destroy the collaborative environment, which is essential for technological and scientific advances. Therefore, patent should be granted but should also be tightly regulated to minimize its adverse effects.

Even with an agreement on the legitimacy of granting patents, there is still a more specific debate on whether software products are patentable. The article named “The History of Software Patents” recounts the history of software patent laws. Supreme court has been going back and forth on its decision on this issue, which can be attributed to the difficulties in reconciling the difference between software products and the more traditional physical inventions. According to the article The Supreme Court doesn’t understand software, and that’s a problem, “The Supreme Court complained that in the process described in the patent, ‘each step does no more than require a generic computer to perform generic computer functions.’ Such a generic patent, the court said, isn’t eligible for patent protection. ‘The mathematical formula involved here has no substantial practical application except in connection with a digital computer’.”

The article then argues that in its creative process, programming is more similar to writing a novel than building a car, which means that as a novel, software products are meant to be shared among people and are thus not patentable. However, in my opinion, this is not a valid reason for denying patent protection to software products. First of all, all the benefits of patent protection are applicable to software products: programmers have the right to protect their inventions just as any other manufacturers and it is quite obvious that incentive for innovations is important to the field of software engineering. Second, although the process of producing computer software is similar to writing novels, the usage of computer software is more similar to a car or a drug. Computer software provides a service that is not inherently unique. In another word, when a plagiarized novel is worthless, a duplicated computer software is not. This is another reason why intellectual property in the form of computer software should be protected.

The existence of patent trolls points to the problems with the current existing system. According to the article Jury: Apple must pay $626 million to patent troll VirnetX, patent trolls are companies that have no products and make their money solely through patent litigation. In recent years we see a raise in patent litigation from the 11% in 2014 to 35% in 2015, and patent trolls are responsible for up to 62% of all of these litigations. The behaviors of patent trolls are highly unethical since they are exploiting the system for personal financial gains. However, with many of the benefits of granting patents in mind, we should advocate for a reform of the system instead of calling for an end to granting patents.

Reading07

Cloud computing is the raising star in computer science. It harbors enormous potential and attracts some of the field’s most brilliant minds. The term cloud computing is often used broadly. Cloud computing is a type of computing that provides shared computing resources and data on demands. As explained in the article The era of cloud computing, “cloud computing refers to an efficient method of managing lots of computer servers, data storage and networking.” Compared to the long-existing idea of shared resources in computer science, cloud computing has three new aspects: the appearance of infinite computing resources, the elimination of upfront commitments of cloud users and cloud users’ ability to pay for the service on demand and for short periods of times.

Cloud computing is an incredibly powerful tool for developers. It allows them to gain access to a vast amount of storage and computing power. The parallel nature of cloud computing also contributes to speedup and higher efficiency. Cloud computing is especially beneficial to individuals and small companies. The company called SynapDx, which analyzes the genetics of autism, mentioned in the article The era of cloud computing is a perfect example of how cloud computing makes it possible for small company to work on big data projects. On the other hand, cloud computing does not beat local computing in all categories. The overhead of cloud computing can be significant if the dataset is small. And the communications among machines using and maintaining the cloud service is not completely fault tolerant. As a result, there is a tradeoff in cloud computing between data size and the problem of overhead and fault tolerance. Developers should consider if cloud computing is appropriate for their projects.

Cloud computing also offers many perks to consumers. Like developers, they are able to access large amount of data, including movies, tv shows, music and games. With large storage provided on cloud service, the need for personal physical storage devices such as CDs, DVDs and USB drives is diminished. This centralized storage is also better managed and organized. The disadvantages of cloud computing from a consumer’s perspective are issues with data security. A cloud service I frequently use is iCloud, and in 2014 there were issues with their data security when hackers leaked private photos of many celebrities. Therefore, the tradeoff in cloud computing for consumers is between the ease of storing and accessing large amount of data and the risk of having their privacy violated due to security risks in the cloud.

With the rapid advances in cloud computing, many of its ethical issues become apparent. A major concern is data security. The more connected the machines are in the cloud network, the more cautious we have to be about blocking unauthorized access within the network. According to the article Computing goes to the Cloud. So does crime, “Just as recent hacks reached critical information through innocuous-seeming things like heating and air-conditioning systems that were networked to other computers, cloud systems may have even more pathways in, and a greater number of potential targets out — basically, any connected devices.” However, security issue is not a unique problem for cloud computing, and the problem cannot mask its many benefits. The discussion on the ethics of cloud computing should focus on how to accommodate the storage of sensitive information on a platform that encourages sharing resources, in another word, how to give consumers the choice to control their degree of sharing. Cloud service companies need to ensure the security of the data their customers entrusted them.

As mentioned in the beginning, cloud computing is a relatively new field of computer science. Researchers are still working on fixing many of its issues. As mentioned in the article Computing goes to cloud. So does crime, “While caution is necessary, not all is doom and gloom. For one thing, the concentration of core computing systems into clouds means that computers are likely to be better managed, security flaws more frequently and thoroughly patched, and devices inspected in a more uniform way. All of those things are improvements over the current state of affairs.” Cloud computing technology will become increasingly mature and find its applications in many areas.