Yesterday I recieved my copy of Jonathan Zittrain’s book The Future of the Internet and How to Stop It. Zittrain is a Professor of Law at Harvard Law School. When I first saw the title, I wondered why anyone would want to stop it? So, I decided to read the book and find out.
Chapter 1 details the birth of the PC and its development. PCs are distinguished by their programmability; they can run software written by other parties. This is compared to the information appliance, an end-point box that the owner/user cannot modify and that only runs software controlled by one manufacturer.
Chapter 2 is entitled “The Battle of the Networks” The early years of the telephony system are used as a comparison point. AT&T began with a monopoly over equipment and infrastructure. AT&T tried to prevent other devices from using their network, and this battle was lost in court. The floodgates were opened for all sorts of other devices using the telephone network. This then evolved into services like CompuServe, AOL and Prodigy. Before the Internet there were bulletin board systems (BBS), turning any PC into an information system. These BBS systems were connected via software called FIDOnet. These amateur innovations produced surprisingly functional results. Next step – enter the Internet.
The Internet was designed by academics and engineers who had little concern for controlling users. It was started as a “for non-commercial purposes” enterprise, but began accepting commercial interconnections in 1991. A hobbyist wrote software for PC users to connect their computers to the Internet, called Winsock. With Windows 95, anyone with a PC could connect to the Internet. The Internet was owned by no one and anyone could use it.
Zittrain calls the principles that the Internet was built on “the procrastination principle” and the “trust your neighbor principle”. The procastination principle assumes that the problems of the network will be solved by others LATER. The trust comes into play as we are trusting the people using this network to not negligently or intentionally disrupt it. Like leaving the front door unlocked… Users of the internet travel around with obscured identities. No data transmission is prioritized over any other. The problems arise when this network designed by academics and purists is now used by the general populace who may not share the same ideals.
To be continued…