Source
Automatically imported from: https://pages.gseis.ucla.edu/faculty/agre/notes/00-6-12.html
Content
``` A few notes on the Microsoft decision and educational technology, plus some follow-ups mostly on security and privacy issues, recommendations, and the usual outstanding batch of URL's.
We should congratulate the government on its clear-cut victory in the Microsoft case. The pundits have swung into action, of course, and they would have us believe that it's now illegal to be successful and have popular products. But that's silly. The great majority of successful companies are not facing antitrust suits, and the market is full of products that are a lot more popular than Microsoft's. That such arguments are even made tells us something.
In fact, the government's victory is all the more impressive for the obstacles it was up against. You will recall that the viability of the government's case was long in doubt because most of the potential witnesses refused to testify for fear of retribution. It's a good thing that Microsoft's executives put their evil intentions down in e-mail that the government could subpoena. But the case was still limited, and this trial should just be the beginning. The government should now turn the case over to the Justice Department's organized crime unit, which should start perjury investigations against the Microsoft executives who were caught lying under oath. Once Microsoft executives start going to prison, perhaps the software industry's code of silence will finally crack. Then we can have a proper trial on all of the issues that this trial left out. Microsoft's claims to support innovation are already absurd, given that the company's whole modus operandi is to prevent innovation. But in a real trial perhaps we can finally "get" the extent to which Microsoft has used its ill-gained monopoly power to stifle progress.
Having said all this, I thought you might enjoy hearing some of the rhetoric from Microsoft's supporters, all of it from the editorial pages of the Wall Street Journal. Here are some passages from a Journal editorial of 5/2/00:
Perhaps the least appetizing part of the Microsoft spectacle is all the college professors crawling out from under the ivy saying they "know" what to do with Microsoft now that a solitary judge's ruling has made it vulnerable to their hatchets and hacksaws. We suppose every ecosystem has its hyenas, but the swarm of academics trying to get in on the kill is a reminder that education and wisdom are two different things.
The academics whose analyses supported the government's remedies are likened to violent criminals and scavenging animals. Very nice.
... the idea that Microsoft's shareholders have any rights at all has been tossed out in the enthusiasm of Washington's parasite class to leave its toothmarks on the company, while politicians nod their heads sympathetically even as they relieve Bill Gates and his executives of millions in "donations" to their political campaigns.
Note the pattern in the first half of this: Microsoft's shareholders are being deprived of future profits gained through illegal activities (not even of the past profits), and so they have no rights at all. This is the usual confusion between "some" and "all", plus the idea that profiting from illegal behavior is a "right". I have to admit that the second half is more plausible, given that Republican legislators have been open for years about their intentions to freeze out or take revenge against businesses that do not contribute to them, or that contribute to their opponents, or that hire their opponents as lobbyists.
As the Journal reported yesterday, Justice suddenly tilted toward a breakup after being alerted by somebody that Microsoft was trying to make its Office applications work well with the industrial-strength version of its operating system. Hmm, don't users want Microsoft's products to work well together?
This is another myth of the Microsoft case that we have to set straight. Even though I am not an enthusiast of the breakup, it is a non-starter to say that only an integrated company could make the operating system and the applications "work well together". As anybody who has taken computer science classes knows, the right way to make things work well at all is to construct cleanly defined and well-documented modularity boundaries. In fact the judge has found it necessary to order Microsoft to do just this. Once you have clear modularity boundaries, it does not matter whether the modules are produced by one company or by two.
Here is the first sentence from a 6/9/00 article on the Wall Street Journal's editorial page by a conservative legal scholar named Richard Epstein:
To no one's surprise, an angry and distrustful Judge Thomas Penfield Jackson adopted almost word for word the final judgement against Microsoft proposed by the US Justice Department and state attorneys general.
In a normal world, the fact that a conservative, Reagan-appointed, pro-business judge accepted the government's remedy whole would count as evidence for its moderation. But in this world, the judge is "angry and distrustful". Observe the fancy ambiguity in this phrase. The judge certainly did express anger and distrust when Microsoft employees defied his orders, introduced faked evidence, made numerous false statements, claimed at length not to remember or understand their own words, and so on. But here, as very often, the phrase "angry and distrustful" insinuates that the judge has some sort of emotional problem, that he is an angry and distrustful person. Richard Epstein is not a hack, and it is depressing to see him using this sort of language, which in the old days was routinely used to mock people who were remonstrating against an injustice. I guess the traditional values are coming back.
Here we have some passages from the Journal's editorial of 6/9/00:
The media reports reflexively fastened on Judge Jackson's use of the word "untrustworthy", though what provoked this sermonette seems to have been Microsoft's successful appeal of one of the judge's earlier injunctions.
Notice, obviously, the word "seems". Could the copious documentation of Microsoft's mendacity have anything to do with the judge's use of the word "untrustworthy"? The rhetorical device works by simply not mentioning the reasons that the judge gives, and instead claiming to read his mind. Then notice the phrase "reflexively fastened". The word "reflexively" is easy to say, and because it again claims to read minds it cannot easily be refuted. And the word "fastened" also demonstrates how easy it is to make insinuations about motive, the suggestion (against all evidence) being that the media are dying to find something bad to say about Microsoft. The alternative hypothesis, that it's newsworthy when a judge makes such a strong statement about a prominent company, again need not be considered. Finally, notice the religious metaphor.
The company's graver sin appeared a few sentences later -- being "convinced of its own innocence" and unwilling to let its rights and property be stripped away without a fight. Just possibly when Bill Gates says he sees a principle at stake, he actually mentions it. Oh dear. Why couldn't he just mouth a few insincere Hail Marys and settle when he had the chance?
Here we have another version of the same tactic. The singular form -- "[t]he company's graver sin" -- simply passes by the vast selection of sins on the court record. The same sentence also puts a tendentious paraphrase into the judge's mouth. But what's really striking is the double standard. When courts find common people guilty of illegal behavior, they are normally expected to express contrition, and they receive heavier sentences when they do not. But none of this applies to the Journal's constituency. Then another religious metaphor. What is with this constant disparagement of religion from the right?
Next (and we're almost done), this passage from Paul Gigot's column of 6/9/00:
Joel Klein and his antitrust division, so irrelevant for so long, saw a chance to get back into the limelight.
The court record is full of evidence about Microsoft's motivations, not least their contempt of the consent decree that they themselves signed. Microsoft's behavior supplies a perfectly parsimonious explanation of Joel Klein's motivations, not to mention those of the "hyenas" of academia. If the Journal has any evidence to support another theory, it should bring that evidence forward. Meanwhile it should calm down.
The point of Gigot's column is that Microsoft hadn't been "playing by Beltway rules".
The Microsoft chairman didn't bow enough to bureaucrats, or canoodle enough with politicians. He gave away too little money too late, when it only looked cynical. His e-mails were too tart, or too honest, or something.
Our nerve endings are sufficiently numb that it's probably hard to appreciate the magnitude of this. The central conceit of the article (and of much other commentary) is that it's all a game, and that the government's goal was to compel the company to play the game, and that the company was now being punished for not playing the game. The government wants companies to hide evidence of their crimes! This is so backward that it makes one's head spin. Here on earth, Microsoft was sued because it broke the law. It's true that many companies that break the law are not prosecuted because they expend money and strategy subverting the legal system. Microsoft did this too, of course, for example trying to get the Congress to cut its prosecutor's budget, but that's evidently a small thing.
The rhetorical strategy here is of a piece with the associationism of public relations in general. Wrongdoers play games and manipulate the system, and so an association has arisen in the popular mind between these wrongdoers and their manipulations. The obvious PR response is to break that association, and to create another association between the manipulations and the party being manipulated. It's the Beltway's game, not the wrongdoers! The wrongdoers are just dragged into it. This is not to say that the Beltway plays no games. When a political party threatens an interest for hiring the opposition's guy as its lobbyist then you do have extortion, no doubt about it. But the way PR works, things aren't analyzed case by case. Associations are blobs of thought formed by shearing the logic and moral reason away from particular cases, so producing stereotypes. We are well shorn by now.
A few old-timers have written to temper my glowing memories of the security of such ancient operating systems as that of the Univac 1100 series machines. You will recall that, in my last great adventure in systems programming before going to graduate school, I built a virtual memory system for a Univac 1100/43 in 1978. Well, my correspondents have pointed out that the Univac was prone to resource-exhaustion attacks: you could crash the machine by forking too many processes. Of course, the same thing is still true on Unix, and I could crash the Unix machine where I read my e-mail in thirty seconds if I wanted to.
My point was not really about denial-of-service attacks, but rather about the old operating system concept of keeping different users from harming one another using a thought-out system of permissions. Personal computers should have such a thing. I know that the problem of protecting a user when executing code that's been downloaded from the Internet is somewhat different from the problem of protecting users from harming one another when running applications on a non- networked machine. Still, I find it completely amazing that the world is proceeding to build serious infrastructures on top of operating systems that do not provide this most fundamental level of protection.
One Linux person was upset that, in sending out the message about the Standard and Poor's security nightmare, I chose a Linux-based system to make my point about the kinds of security issues one encounters out there. It's true, we all tend to focus on the operating system or the programming language and neglect the hundred "soft" factors that make anything really work. When we say that Microsoft products are insecure and that Linux is somewhat better, it does not follow that every Linux-based service is more secure than every Microsoft- based service. In the case at hand, we had a service that was based on an archaic release of Linux and that violated every rule in the security book. In any event, I meant no aspersion against Linux.
Speaking of Microsoft security, here is the best of several jokes that I received after the most recent Microsoft virus:
YOU HAVE NOW RECEIVED THE UNIX VIRUS
This virus works on the honor system:
If you're running a variant of Unix or Linux, please forward this message to everyone you know and delete a bunch of your files at random.
Pass it on.
Let's get rid of the phrase "Internet privacy". Why? Five reasons:
(1) As the Internet increasingly suffuses everything, most privacy issues involve the Internet in some way. So just call it "privacy".
(2) "Internet privacy" is often used to mean something narrower: "privacy of consumer information on electronic commerce Web sites". I've even seen Web sites that invite consumers to download networked software to their computer, whose privacy policy covers the Web site but not the software! There's more to the Internet than the Web.
(3) Privacy issues involving the Internet are diverse enough that "Internet privacy" is not a natural category. Medical Internet privacy is different from financial Internet privacy. What's most significant is not the technology but the industry sector. Privacy policy should have a common conceptual foundation -- such as the default rule of "opt in" -- that is then adapted to the particulars of each sector. Specific technologies hardly enter into it.
(4) Internet privacy issues are not importantly different from a hundred kinds of privacy issues that have been debated and analyzed for a long time. Every couple of years the traffickers in personal information have to come up with a new gimmick to postpone common- sense regulation. The trick is always to make the issue of privacy seem brand new, so that yet another round of redundant studies and empty promises can be "given time to work". This has been going on for decades, and "Internet privacy" is simply the latest iteration.
(5) Saying "Internet privacy" makes privacy problems sound like the Internet's fault, so that the people who are running insecure sites and misdirecting personal information can present themselves as victims of the technology.
In the end, the notion of "Internet privacy" is nothing but a leftover from the old idea that the Internet is separate from the real world. It's just not true.
We should also get rid of phrases such as "regulating the Internet". People keep asking "should we regulate the Internet?", as if the question meant something. It doesn't, for three reasons:
First of all, in most cases the issue is not one of regulating the Internet, but of regulating activities or entities that happen to be using the Internet. It's not the Internet's fault if someone uses it to commit fraud, and regulations narrowly tailored to preventing fraud on the Internet have no effect on the Internet itself.
Second, "regulating the Internet" is an impossibly broad and vague category, so that it makes no sense either to agree with it or to disagree with it. Thus, people who claim to dislike "regulation" are usually happy when "regulation" prevents other people from stealing their stuff. Regulation comes in many shapes and sizes, and the arguments that bear on the various categories of regulation are quite diverse. Some regulations are unconstitutional, or inefficient, or unenforceable, or counterproductive. Others are not. You can't generalize.
Third, most problems cannot be solved by regulation alone, and many problems cannot be solved without some degree of regulation. It's a matter of interactions. The question is which combination of methods -- criminal laws, civil causes of action, technologies, consumer education, competition, custom, and so on -- best addresses a given problem. But we can hardly start to answer this question so long as "regulation" remains a big conceptual blob.
Good old Bruce Schneier made fun of me for sending out the issue of his newsletter in which he included my close readings of Microsoft's virus doubletalk. "Quoting me quoting you, huh?" Yeah, okay. It seemed a little weird, but cutting out my article seemed even weirder. In any event, Bruce's online newsletter, whose circulation is 43,000, is a must for everyone with an interest in computer security issues.
In response to my fancy theory about the reason why the media have increasingly confused the words "Internet" and "Web", one smart guy pointed out (duh) that the English words "net" and "web" have similar meanings. That one got right by me. I hope the Wall Street Journal (the example I cited) would be a little faster, but maybe not.
In one of my truth-tellings about the returning conservative culture of deference I spoke of "the strange and archaic custom of addressing people by title", but a few people pointed out that the problem is not with titles as such, just with hierarchical titles. There is a long history -- though not in the United States -- of egalitarian formality. It has a bad name through examples such as "Citizen" and "Comrade", but there's nothing intrinsically wrong with it. In fact, African- American culture puts great weight on titles because of the depraved custom, thankfully now rare, of addressing white people by title and black people by their first names. And some languages mark family relationships in a hierarchical way in their grammar; this isn't as bad as the feudal-type hierarchy of conservatism, and I didn't mean to disparage it either.
For an entertaining study in how complicated these things can be, see Paul Friedrich, Social context and semantic feature: The Russian pronominal usage, in John J. Gumperz and Dell Hymes, eds, Directions in Sociolinguistics: The Ethnography of Communication, Blackwell, 1986 (originally published in 1972). It's an accessible paper about the Russian formal and informal pronouns (vy and ty, by analogy to vous and tu in French) and the infinite variety of social distinctions that this grammatical contrast used been used to mark at various times and places in Russian literature.
Recommended: Melissa A. Schilling, Toward a general modular systems theory and its application to interfirm product modularity, Academy of Management Review 25(2), 2000, pages 312-334. This is an ambitious general theory of product modularity that presents a long series of testable generalizations about the conditions under which products are and are not made of compatible parts that can be bought from different suppliers. I don't know if it's right, and it doesn't have the depth of grounding in either case studies or math of other, simpler models. Nonetheless it ought to raise the level of debate.
Recommended: Thomas Ertman, Birth of the Leviathan: Building States and Regimes in Medieval and Early Modern Europe, Cambridge: Cambridge University Press, 1997. You only have to read Chapter 1 of this great book to really learn something about the historical paths that lead different countries to different kinds of institutions. Just to take one striking example, Ertman argues that England arrived at its system of common law and parliamentary democracy through a very contigent series of historical experiences: first domination by Rome, which imposed a uniform set of institutions on the whole country; then the dark ages, in which centralized power collapsed, leaving the uniform local governments and legal systems to strengthen and grow; then the return of centralized government, which could administer the country because of the uniformity of its local institutions, but which also had to contend with the strength of those same institutions; leading to a balance of power and an evolution, albeit a turbulent one, toward constitutional monarchy. I find this story so interesting because of what it says about the inadequate categories of "centralized" and "decentralized". Much current political theory would have you believe that any random jumble of human beings will form themselves into a functioning society, just so long as government doesn't stick its big feet in. But the evidence suggests something more complicated: that decentralized systems work when their elements have a deep commonality that renders them innately compatible with one another. The Hobbesian image of government as the ongoing provider of order has no place in this story: the deep commonality cannot be imposed by force, and once established, it can be reproduced in large part through socialization and mutual feedback. But the commonality has to come from somewhere. And not just any commonality will do, but (at a minimum) one based on the expectation of equality and the assertion of rights. A perfectly uniform chauvinistic nationalism, for example, won't do it, much less an ethnic or racial identity. Because institutions are ultimately made of ideas, and of the embodiment of those ideas in practices and artifacts and relationships, an awful lot depends on the cultural "software" that results from a never-ending dialectic of collective memory and contemporary propaganda. And in this era of deep-rooted institutional change, our cultural software is especially up for grabs. The traditional conservative position was that the more fundamental strata of cultural software had to remain unquestioned, because only that way could the more fundamental institutions of society remain stable. This view depends on a view of institutional legitimacy for which stability is the highest value. But if a functioning society depends on ideas of equality and rights, then a society's institutions will not achieve legitimacy until they live up to those ideals. That is the underlying shape of the fight over institutions in the English tradition, and the fight is sharpened in times like these.
Not recommended: This American Life's 5/19/00 show entitled "Character Assassination", on RealAudio at . This American Life is a great show, but they're out of their depth with this one. It's about "negative campaigning", and it never emerges from the media's own echo-chamber discourse on the subject. Even David Foster Wallace's excerpts from his celebrated Rolling Stone article on John McCain's campaign were disappointing -- conventional media talk with subgonzo stylings. If you want a fresh angle on this stuff that get out of the media box, see the outstanding Daily Howler .
The Chronicle of Higher Education's daily summary included a blurb that read as follows:
Computer technology can improve instruction by giving students new opportunities to learn through activities, rather than through simply listening to lectures, says Richard H. Hall, a professor at the University of Missouri at Rolla.
The URL for the article was
http://chronicle.com/free/2000/05/2000053001u.htm
What bothers me about this is the strange yet widespread idea that college classes as they exist now consist of no other activities than simply listening to lectures. Even at the most demoralized colleges, in the United States at least, most classes include activities such as reading and writing, discussion, exams, and so on. Many include much more. The educational theorists who drive this anti-lecture discourse believe that students should be "learning from one another", or interacting with multimedia material -- anything but listen to a teacher explain the ideas. The theorists often claim that students are demanding this more enlightened approach. But when I've tried to get rid of lectures, I've encountered rebellions from students who felt strongly that I was no longer teaching them. The matter needs closer study.
Here's another enthusiasts' myth about technology in higher education that we need to confront:
As distributed virtual environments become more common, there may come a time when the classroom experience itself becomes a true commodity product, provided to anyone, anywhere, anytime -- for a price. If students could actually obtain the classroom experience provided by some of the most renowned teachers in the world, why would they want to take classes from the local professor (or, in many cases, the local teaching assistant)? In such a commodity market, the role of the faculty member would change substantially. Rather than developing content and transmitting it in a classroom environment, a faculty member might instead have to manage a learning process in which students use an educational commodity -- for example, the Microsoft Virtual "Life of Earth" Course, starring Stephen J. Gould. This would require a shift from the skills of intellectual analysis and classroom presentation to those of motivation, consultation, and inspiration. Welcome back, Mr. Chips!
James J. Duderstadt, Can colleges and universities survive in the information age?, in Richard N. Katz, ed, Dancing With the Devil: Information Technology and the New Competition in Higher Education, Jossey-Bass, 1999. (The passage that I quoted is on page 15.)
I should emphasize that the author of this passage is not a fringe futurist but the president emeritus of the University of Michigan, and by all accounts a serious person. The passage, which reflects themes found throughout this literature, repays close reading. It is usefully divided into two parts. Here, again, is the first part:
As distributed virtual environments become more common, there may come a time when the classroom experience itself becomes a true commodity product, provided to anyone, anywhere, anytime -- for a price. If students could actually obtain the classroom experience provided by some of the most renowned teachers in the world, why would they want to take classes from the local professor (or, in many cases, the local teaching assistant)?
The fallacy here is straightforward. If millions of students all join the class run by the most renowned teacher, then they obviously won't get a "classroom experience" in any familiar sense of the word. And if a "classroom experience" implies any synchronous interaction with the teacher then that experience won't be available "anytime" either. Now, one could redefine "classroom experience" so that it includes radio call-in shows or their future multimedia equivalents. But that's a major redefinition. Surely one defining element of the "classroom experience" is that you can get your questions answered. But with millions of students that won't happen. This is not to say that the call-in format is without value. But it's not the "classroom experience", and it is only by calling it the "classroom experience" that the comparison in the final rhetorical question makes any sense.
Then the second half:
In such a commodity market, the role of the faculty member would change substantially. Rather than developing content and transmitting it in a classroom environment, a faculty member might instead have to manage a learning process in which students use an educational commodity -- for example, the Microsoft Virtual "Life of Earth" Course, starring Stephen J. Gould. This would require a shift from the skills of intellectual analysis and classroom presentation to those of motivation, consultation, and inspiration. Welcome back, Mr. Chips!
Once again, Professor Duderstadt is using words in fancy ways to make different things seem substitutable, for example glossing a lecture in a classroom as "transmitting content". But notice the major shift that has taken place here from the first half of the paragraph. Before we had the "classroom experience", but now we have something quite different: students learning on their own by interacting with "content". Teachers no longer teach; they "manage a learning process" in which "intellectual analysis" is no longer a necessary skill! And the claim that teaching in the present day involves no skills of motivation and inspiration was surely made in the heat of the moment. I know that it does not reflect Professor Duderstadt's own teaching.
The real shift in Professor Duderstadt's picture, then, is from "classroom presentation" to "consultation". And the most important problem again relates to economies of scale. Synchronous lecturing is bad when done badly, but you discover its virtues as soon as you move to an asynchronous model: students who are following your lesson synchronously are on the same page; they are likely to have similar and related questions; and they are all equally primed to understand the questions and the answers. Question-answering achieves economies of scale in the synchronous model, and not in the asynchronous model of individual students interacting with "commodities" on their own. It is easy enough to relabel that activity as "consultation", but if we're imagining thousands or millions of students all being taught by the most renowned teachers then we're going to need some mighty economies of scale indeed in this "consultation". What has really happened is that the role of the "renowned teacher" in the first part of the paragraph has split: Stephen Jay Gould, renowned teacher, is captured on an "educational commodity" while some other teacher, not remotely as renowned I should think, "manages" the "learning process" by engaging in "consultation". Quite a different picture.
The point here, it is always necessary to reiterate, is not about technology. I do not "resist technology", "fear change", or any of that. I am a computer scientist. The point is that technology is highly malleable, and the design space of potential educational technologies is enormous. The technology itself has few opinions about how it will be used, and so we need some informed opinions of our own. What concerns me is that so many of the most widely received opinions on the subject -- even the opinions of informed and thoughtful commentators -- make little sense, and fall apart at the slightest touch. Part of the problem is that rhetoric is substituting for analysis. We can talk easily about a "shift from teaching to learning" (a common trope in this literature), but that's all it is -- easy talk. It's meaningless. At best it encodes a kind of hostility, a presupposition of warfare between the enlightened and the resistant. That's most unfortunate, and the promise and danger of the current moment are calling us to do better.
Best theory of the month: I was discussing the problem of spam from Argentina with a noted spam expert, and he offered the following speculation about it. The Internet is organized for most purposes as a hub-and-spokes, with the United States as the hub. This is changing in Europe, but it is still very much the case in Latin America and Asia. Thus a packet between two Latin American countries, or between two Asian countries, is very likely to pass through the United States. Furthermore, most countries receive many more Internet packets from the United States -- mostly Web pages and downloads -- than they send back. Yet international telecommunications tariffs typically compel a place like Argentina to buy a two-way link to the United States. A great deal of return capacity goes unused, and so ISP's have little or no incentive to police their outgoing spam. Their tolerance for this no-cost spam may even serve as retribution for the dysfunctional tariff structure.
Here are five verbs that are found routinely in the newspaper and rarely found anywhere else: bolster, garner, glean, revamp, and tout. They don't mean anything. Let's get rid of them.
One attentive reader pointed out that I was inadvertently unfair in my brief summary of Mary Anne Moser and Douglas MacLeod's edited volume, "Immersed in Technology: Art and Virtual Environments". I had said, "this is the standard text about environments that are immersive in the sense that I am sort of deprecating", but I didn't mean to imply that the authors in that volume are uncritical about the potential meanings of the word "immersive". To the contrary, some of the authors in that volume, such as Margaret Morse and Michael Naimark, are serious people who do serious work.
You may recall that I maintain a Web page of all the books that I have found interesting enough to write down citations for over the last ten years. The URL is:
http://dlis.gseis.ucla.edu/people/pagre/interesting.html
I posted this page as a public service and nothing more. But I have encountered an unexpected side-effect: authors who type their own names into search engines come up with my list (or with one of the periodic e-mailed lists that I have merged into this big list). They then send me messages, and we have nice online chats. Because my list of books covers so many fields, I meet people this way that I would never have met otherwise.
In accumulating URL's for the list, my practice is to send out batches of three dozen. That seems like a good number. Or if I have a batch of "notes and recommendations" written up then I'll send out whatever URL's I have as part of that. I'll confess that I get an embarrassing amount of pleasure out of watching the URL's pile up. I get a few each day, and I can usually tell you within two or three how many of them I have. It's easier, of course, now that I'm including newspaper articles. Nonetheless, the amount of useful stuff on the Web really seems to have increased this year. Or maybe it's that the "culture" of the list -- my own practices together with the expectations of the people who subscribe to it -- has evolved. In any case, I keep wanting to make a hokey challenge out of it by posting the number of days it took to accumulate the most recent batch of three dozen URL's. The batch that I sent out on June 4th, for example, took 15 days, whereas the batch that I sent out on May 20th only took a week. The enclosed batch took eight days. I bet we could keep it at a week if we wanted.
Some URL's.
Microsoft wars
Microsoft Spending Millions on Ads and Lobbying Efforts http://www.nytimes.com/library/tech/00/06/biztech/articles/12lobby.html
Falsus in Omnibus http://www.boston.com/dailyglobe2/163/business/Falsus_in_omnibus%2b.shtml
judgement against Microsoft http://www.nytimes.com/library/tech/00/06/biztech/articles/08soft-text1.html http://www.nytimes.com/library/tech/00/06/biztech/articles/08soft-text2.html
Microsoft's final reply to the government's proposed remedies http://www.microsoft.com/presspass/trial/jun00/06-06reply.asp
Ubiquitousness of Microsoft Opens Window to Trouble http://www.latimes.com/business/20000605/t000053189.html
privacy wars
misuses of data protection in Sweden http://www.dsv.su.se/jpalme/society/eu-data-directive-freedom.html
Your Privacy Ends Here http://www.observer.co.uk/focus/story/0,6903,328071,00.html
Radio-Frequency Tags Could Pierce Some of the Fog of War http://www.nytimes.com/library/tech/00/06/circuits/articles/08next.html
How to Fight Privacy Looters http://www.cnn.com/2000/TECH/computing/05/31/privacy.law.idg/
spam wars
story about hacking into spammers' computers http://belps.freewebsites.com/index2.htm
Spam Laws http://www.spamlaws.com/
DMA to Internet: Shut Up and Eat Your Spam http://maps.vix.com/rbl/anti-dma.htm
briefs in Intel vs Hamidi email-as-trespass case http://www.intelhamidi.com/amicusbrief.htm http://www.intelhamidi.com/intelrespondent.htm
intellectual property wars
CNET Patents Banner Advertising Networks http://slashdot.org/article.pl?sid=00/06/07/1656216&mode=thread http://www.patents.ibm.com/details?&pn=US06073241__
Web "Pirates" Unearth Treasure: Hit Films http://washingtonpost.com/wp-dyn/articles/A9978-2000Jun6.html
another Napster clone, this one supposedly legit http://www.spinfrenzy.com/
technology
Fathering XML http://www.javaworld.com/javaworld/javaone00/j1-00-bosak.html
interesting collaborative Web site development tool http://manila.userland.com/
When Viruses Fail http://www.securityfocus.com/templates/article.html?id=43
The End of Moore's Law http://www.techreview.com/articles/may00/mann.htm
Excite to Operate Its High-Speed Network as "Fast-Lane Toll Road" http://www.mercurycenter.com/svtech/news/indepth/docs/excite060100.htm
New Versions of Ethernet Promise Swift Improvements in Communications http://www.nytimes.com/library/tech/00/06/biztech/articles/05net.html
other stuff
"news from 1500 online sources" http://w.moreover.com/
CornCam http://www.iowafarmer.com/corncam/corn.html
Bush's Death Penalty Dodge http://www.salon.com/politics/feature/2000/06/12/death/
Cheating Report Renews Debate Over Use of Tests to Evaluate Schools http://www.nytimes.com/library/national/061200potomac-edu.html
The Potential Consequences of Climate Variability and Change http://www.nacc.usgcrp.gov/
The New Wealth of Nations http://www.treas.gov/press/releases/ps617.htm
online newspaper in Zimbabwe http://www.dailynews.co.zw/
Principles for Emerging Systems of Scholarly Publishing http://chronicle.com/weekly/v46/i40/40a02401.htm
Civilian Deaths in the NATO Air Campaign http://www.hrw.org/reports/2000/nato/
Invisible Man http://www.salon.com/ent/music/feature/2000/06/07/eminem/
Digital Economy 2000 http://www.esa.doc.gov/de2000.pdf
Webzine 2000 http://www.webzine2000.com
The Man from Nowhere http://eXaminer.com/000528/0528clinton.html
article on a failed Web site for connecting scripts to producers http://www.newtimesla.com/issues/2000-06-01/feature.html/page1.html
end ```