WEB TECHNOLOGIES

An Information Avalanche Vinton G. Cerf Google

We must harness the Internet’s energy before the information it has unleashed buries us.

A

s we reach the autumn years of the first decade of the 21st century, it is obvious to almost everyone that the Internet and especially the World Wide Web application have initiated a massive transformation in the discovery, distribution, and utilization of knowledge. In early antiquity, information passed orally among small groups of providers and consumers. The transition of oral tradition to written records was a huge technological and cultural leap forward, providing for communication not only among immediate contemporaries but preserving it for generations of descendents, at least as long as the writing endured. With the introduction of movabletype printing in the mid-15th century, Gutenberg launched another revolution that ultimately supplied enormous quantities of information at relatively low costs compared to the hand-copying of written material that had previously been the norm. Books greatly equalized access to knowledge, particularly as they accumulated in libraries. The invention of radio and TV facilitated the mass dissemination of

104

Computer

information in new forms. Indeed, these technologies have long since reached the point that no one can really consume all the printed and broadcast content now so widely available. The Internet has added yet another dimension to the production and consumption of information. Long merely consumers of content, Internauts are now also major producers of it. Search engines make it possible to sift through the enormous quantity of material that is finding its way into digital form. Going online has become an adventure in discovery for those who eagerly surf the billions of Web pages housed in the global Internet. Web-page editors, blogging software, image- and video-sharing services, Internet-enabled mobile devices with multimedia recording capability, and a host of other tools have given the general public nearly the same capacity to produce and share information that only major publishers and broadcasters once enjoyed. While we’re not likely to see full-length movies from the contributors to YouTube and Google Video anytime soon, innovative short videos can be viewed online or downloaded for later viewing.

Online content will likely become even more sophisticated, aided in part by increasingly powerful and easy-touse software that simplifies the tasks of production, editing, formatting, and distribution. This trend in turn presents major challenges to both users and suppliers of Internet-based content and services. Take, for example, the problem of intellectual property protection. The ease of copying digitized information, and the remarkable economy of storing and distributing it, have significantly impacted the music business and will have predictably similar effects on the movie and print media industries—newspaper and magazine publishers are already adapting their subscription and advertising models to the networked environment. As broadband Internet access spreads, more users are sharing, downloading, and viewing digital content. Because of its global reach, the Internet seriously threatens to undermine IP protection regimes that have long served copyright holders. The pendulum of such protection has arguably swung too far to one side. Under the Berne Convention, copyrights now last for 75 years beyond the life of the author, and various actions can extend protection even further. Earlier formulation of these rights conferred a much briefer period of protection in the belief that once this time expired, society would benefit from substantial amounts of material entering the so-called public domain. The Internet’s disruption of traditional content distribution practices is also evident. For example, movie studios once relied on a prescribed release schedule for most films: theaters, payper-view TV, prerecorded media, advertising-supported TV, and then syndicated TV. Such formulaic approaches are beginning to collapse under the pressure of online pirated content. Print publications likewise have found their way into the Internet in the form of online newspapers and magazines. While much of this content is restricted to paying customers,

a considerable amount is free. The situation with books is more complex. A modest number of books are available for free download—many are in the public domain and so do not pose IP licensing challenges. However, online access to books is changing as Google and other companies seek digital versions of printed material to facilitate full-text search. Digitization makes it theoretically possible to someday be able to search all of the world’s printed material. The Internet has revolutionized both the storage and distribution of content. Given the dramatic difference in cost between digitizing books for online access and printing and stockpiling them, books might never go “out of print” in the future. The same applies to video and audio content. There is an indisputable societal benefit to being able to easily access such vast and varied material, but for IP creators and owners it’s unclear how the emerging digital medium will permit compensation previously obtained through the sale of physical copies of their works. Online advertising and subscription revenues are examples of potential new income sources for authors and copyright holders. The production of content through blogging, video/audio uploading, and other Internet-based techniques has made the IP scene more complex. Most of these works are self-copyrighted and rarely formally registered, and authors can knowingly or unknowingly incorporate readily available but copyrighted online material. Identifying the holders of such rights is becoming increasingly difficult, and copyright holders might have trouble discovering inappropriate use of their works. The result is a formula for confusion, tension, and dispute in many domains. The interlinking of multiple online tools in mashups is symptomatic of the intense level of creative interest many users have in contributing to the Internet’s offerings. Although we are still far from fully understanding the ramifications of digitization, such fluid

mixing and permuting of online content will surely lead to many discussions about future IP mechanisms. One interesting possibility is that registering and recording the transfers of IP rights might become preferred and even required in the same way that real property is. Such a disciplined approach makes it much easier to identify the rights holder. With the

The Internet has revolutionized both the storage and distribution of content. help of online systems and databases, IP rights clearances could be vastly simplified—that alone merits serious consideration as a step toward adapting to the realities of online, digitized information production in all its varied forms.

I

ntellectual property protection is just one serious challenge we face today. The accumulation, indexing, and long-term storage of digital data poses yet another dilemma. As more, increasingly varied content disseminates through the Internet, we must remember that rendering these bits into meaningful forms requires soft-

ware. However, no reasonable mechanisms are currently in place to ensure that digital information will continue to be accessible and interpretable hundreds of years from now. Imagine, for example, in the year 3000 doing a Google search for a 1997 Microsoft PowerPoint presentation or rendering such a file using the latest version of Windows. Will we need to preserve the original software used to generate such information? Source code? Will it be necessary to retain access to older operating systems as well? Will we need machine emulators? We must think about these questions now; otherwise, we face a future in which information goes dark due to our inability to interpret it correctly. Predictions are always uncertain, but it seems likely that unless we learn to harness the energy unleashed by the Internet, we will soon be buried in an avalanche of information. ■

Vinton G. Cerf is vice president and chief Internet evangelist of Google. Contact him at [email protected].

Editor: Simon S.Y. Shim, Department of Computer Engineering, San Jose State University; [email protected]

Engineering and Applying the Internet IEEE Internet Computing reports emerging tools, technologies, and applications implemented through the Internet to support a worldwide computing environment.

www.computer.org/internet/ January 2007

105

An Information Avalanche - Research at Google

Web-page editors, blogging soft- ware, image- and video-sharing ser- vices, Internet-enabled mobile devices with multimedia recording capability, and a host of ...

1MB Sizes 3 Downloads 463 Views

Recommend Documents

Bringing Contextual Information to Google ... - Research at Google
search by voice, give specific voice commands, or ask general questions. The users expect their .... NAME” instead of being limited to simply biasing towards.

Photographing Information Needs: The Role of ... - Research at Google
May 1, 2014 - Android smartphones with more than 1,000 US .... We recruited more than 1,000 Android phone users across ...... Washington D.C., 2010. 26.

Weighted Proximity Best-Joins for Information ... - Research at Google
1Department of Computer Science, Duke University; {rvt,junyang}@cs.duke.edu. 2Google ... input to the problem is a set of match lists, one for each query term, which ... Two matchsets with different degrees of clusteredness but equal-size enclosing .

Understanding information preview in mobile ... - Research at Google
tail and writing responses to a computer [14]), a better un- derstanding of how to design ... a laptop or desktop is that the phone requires a lower level of engagement [7]: .... able, with a range of 10 to 100 emails per day (M = 44.4,. SD = 31.4).

Challenges in Building Large-Scale Information ... - Research at Google
Page 24 ..... Frontend Web Server query. Cache servers. Ad System. News. Super root. Images. Web. Blogs. Video. Books. Local. Indexing Service ...

Annotating Topic Development in Information ... - Research at Google
Application of NLP techniques on the domain of informa- tion seeking queries is well ... (i) to investigate the nature of topic development in discourse in a corpus.

Pay by the Bit: An Information-Theoretic Metric ... - Research at Google
Feb 23, 2013 - sourced online, such as the Galaxy Zoo project [19], is both crowdsourcing and .... Mohan [3] propose using mutual information in the evalua-.

Avalanche Presentation.pdf
Sign in. Loading… Page 1. Whoops! There was a problem loading more pages. Retrying... Avalanche Presentation.pdf. Avalanche Presentation.pdf. Open.

On the Protection of Private Information in ... - Research at Google
protecting the privacy of training data for machine learning systems, and comment ... to protection from programs [22]. When we discuss .... the best results. They lead, in .... noise to sensitivity in private data analysis,” in Theory of. Cryptogr

Exploiting Service Usage Information for ... - Research at Google
interconnected goals: (1) providing improved QoS to the service clients, and (2) optimizing ... to one providing access to a variety of network-accessible services.

Mathematics at - Research at Google
Index. 1. How Google started. 2. PageRank. 3. Gallery of Mathematics. 4. Questions ... http://www.google.es/intl/es/about/corporate/company/history.html. ○.

An information-theoretic look at MIMO energy-efficient ...
REFERENCES. [1] H. Kremling, “Making mobile broadband networks a success ... Globecom Technical Conf., San Francisco, California, USA,. Nov./Dec. 2006.

An Argument for Increasing TCP's Initial ... - Research at Google
3rd Quarter 2009. http://www.akamai.com/stateoftheinternet, 2009. [5] M. Allman, S. Floyd, and C. Partridge. Increasing TCP's. Initial Window. RFC 3390, 2002.

An Optimal Online Algorithm For Retrieving ... - Research at Google
Oct 23, 2015 - Perturbed Statistical Databases In The Low-Dimensional. Querying Model. Krzysztof .... The goal of this paper is to present and analyze a database .... applications an adversary can use data in order to reveal information ...

An interactive tutorial framework for blind users ... - Research at Google
technology, and 2) frequent reliance on videos/images to identify parts of web ..... the HTML tutorial, a participant was provided with two windows, one pointing to.

AUDIO SET: AN ONTOLOGY AND HUMAN ... - Research at Google
a hierarchy to contain these terms in a way that best agreed with our intuitive .... gory, “Bird vocalization, bird call, bird song”. 3. AUDIO SET DATASET. The Audio ...

Drac: An Architecture for Anonymous Low ... - Research at Google
(e.g., extracted from a social network web site [3],) but that relationships with ..... world network of 500 users, with 10 friends and 10 contacts each, and circuit.

Faucet - Research at Google
infrastructure, allowing new network services and bug fixes to be rapidly and safely .... as shown in figure 1, realizing the benefits of SDN in that network without ...

BeyondCorp - Research at Google
41, NO. 1 www.usenix.org. BeyondCorp. Design to Deployment at Google ... internal networks and external networks to be completely untrusted, and ... the Trust Inferer, Device Inventory Service, Access Control Engine, Access Policy, Gate-.

VP8 - Research at Google
coding and parallel processing friendly data partitioning; section 8 .... 4. REFERENCE FRAMES. VP8 uses three types of reference frames for inter prediction: ...

JSWhiz - Research at Google
Feb 27, 2013 - and delete memory allocation API requiring matching calls. This situation is further ... process to find memory leaks in Section 3. In this section we ... bile devices, such as Chromebooks or mobile tablets, which typically have less .

Yiddish - Research at Google
translation system for these language pairs, although online dictionaries exist. ..... http://www.unesco.org/culture/ich/index.php?pg=00206. Haifeng Wang, Hua ...

AES-VCM, AN AES-GCM CONSTRUCTION ... - Research at Google
We give a framework for construction and composition of univer- sal hash functions. Using this framework, we ... Informally, we give a result regarding the use of a universal hash function to construct a secure MAC. 1 ... The VMAC paper [3] gives a r