Alarmed that Bell Canada is throttling and degrading P2P traffic, David Fewer and some of his friends have created a wiki to list "all of the legitimate things that P2P can and is doing. Kind of a one
stop shop for evidence of how this technology has the capacity to change the
world." The idea is that this can be used in regulatory proceedings and other policy fora to establish the legitimacy of P2P. They want your input!
Why peer-to-peer is efficient
When a user wishes to download a file from a website, the submit a HTTP GET request. This request for the file uses a single TCP socket, and communicates with a single server which transfers the entire file. By contrast, a P2P protocol creates TCP connections with multiple hosts and makes many small data requests to each. The P2P client then combines the chunks to recreate the file. A single file host will usually have limited upload capacity, but connecting to many servers simultaneously allows for higher file transfers, and disperses the costs associated with data transfers amongst many peers. Moreover, a client mid-way through downloading the file also acts as a server, hosting the bits to others which they have already downloaded. These differences from traditional HTTP GET requests allow for lower costs and higher redundancy since many people are sharing the files.
Charles Duan from Public Knowledge sends us “a video we put together for Fair Use Week about copyright and fair use, to the tune of ‘Let It Go’ from Frozen, and full of clips of other fair use videos.”
An excellent excerpt from Aaron Perzanowski and Jason Schultz’s The End of Ownership: Personal Property in the Digital Economy on Motherboard explains how Section 1201 of the 1998 Digital Millennium Copyright Act — which bans tampering with or bypassing DRM, even for legal reasons — has allowed corporations to design their products so that using […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]
Having a luxurious bed isn’t just a fairy tale from a catalog; it is a real, affordable possibility with offerings like this Olive+Owen bedroom set. If you’re thinking of doing some “spring cleaning”, this bed set is an easy way to completely upgrade your room in one purchase.This 20-piece collection has all of the expected slumberland elements, […]