teaching

A game completely controlled by the players

From Ron Dulin’s “A Tale in the Desert“:

A Tale in the Desert is set in ancient Egypt. Very ancient Egypt: The only society to be found is that which has been created by the existing players. Your mentor will show you how to gather materials and show you the basics of learning and construction. These are the primary goals in the game–you learn from academies and universities, and then you use what you’ve learned to build things, such as structures and tools. As your character learns new skills, you can advance. …

Higher-level tests are much more complex and require you to enlist lower-level characters to help you complete them. Players are directly involved in almost all aspects of the game, from the introduction of new technologies to the game’s rules to the landscape itself. With a few exceptions, almost every structure you see in the game was built by a player or group of players. New technologies are introduced through research at universities, which is aided by players’ donations to these institutions. Most interestingly, though, the game rules themselves can be changed through the legal system. If you don’t like a certain aspect of the game, within reason, you can introduce a petition to have it changed. If you get enough signatures on your petition, it will be subject to a general vote. If it passes, it becomes a new law. This system is also used for permanently banning players who have, for some reason or another, made other players’ in-game lives difficult. …

The designers themselves have stated that A Tale in the Desert is about creating a society, and watching the experiment in action is almost as enjoyable as taking part.

A game completely controlled by the players Read More »

Computer commands as incantations

From Julian Dibbell’s “A Rape in Cyberspace: How an Evil Clown, a Haitian Trickster Spirit, Two Wizards, and a Cast of Dozens Turned a Database Into a Society“:

After all, anyone the least bit familiar with the workings of the new era’s definitive technology, the computer, knows that it operates on a principle impracticably difficult to distinguish from the pre-Enlightenment principle of the magic word: the commands you type into a computer are a kind of speech that doesn’t so much communicate as make things happen, directly and ineluctably, the same way pulling a trigger does. They are incantations, in other words, and anyone at all attuned to the technosocial megatrends of the moment — from the growing dependence of economies on the global flow of intensely fetishized words and numbers to the burgeoning ability of bioengineers to speak the spells written in the four-letter text of DNA — knows that the logic of the incantation is rapidly permeating the fabric of our lives.

Computer commands as incantations Read More »

10 early choices that helped make the Internet successful

From Dan Gillmor’s “10 choices that were critical to the Net’s success“:

1) Make it all work on top of existing networks.

2) Use packets, not circuits.

3) Create a ‘routing’ function.

4) Split the Transmission Control Protocol (TCP) and Internet Protocol (IP) …

5) The National Science Foundation (NSF) funds the University of California-Berkeley, to put TCP/IP into the Unix operating system originally developed by AT&T.

6) CSNET, an early network used by universities, connects with the ARPANET … The connection was for e-mail only, but it led to much more university research on networks and a more general understanding among students, faculty and staff of the value of internetworking.

7) The NSF requires users of the NSFNET to use TCP/IP, not competing protocols.

8) International telecommunications standards bodies reject TCP/IP, then create a separate standard called OSI.

9) The NSF creates an “Acceptable Use Policy” restricting NSFNET use to noncommercial activities.

10) Once things start to build, government stays mostly out of the way.

10 early choices that helped make the Internet successful Read More »

Early attempts to control phone usage

From R. W. Kostal’s Law and English Railway Capitalism, 1825-1875 (quoted in Andrew Odlyzko’s “Pricing and Architecture of the Internet: Historical Perspectives from Telecommunications and Transportation“):

In Britain in 1889, postal officials reprimanded a Leicester subscriber for using his phone to notify the fire brigade of a nearby conflagration. The fire was not on his premises, and his contract directed him to confine his telephone “to his own business and private affairs.” The Leicester Town Council, Chamber of Commerce, and Trade Protection Society all appealed to the postmaster-general, who ruled that the use of the telephone to convey intelligence of fires and riots would be permitted thenceforth.

Early attempts to control phone usage Read More »

Flat local calling rates in US helped grow the Net

From Andrew Odlyzko’s “Pricing and Architecture of the Internet: Historical Perspectives from Telecommunications and Transportation“:

Moreover, flat rates for local calling played a key role in the rise of the Internet, by promoting much faster spread of this technology in the U.S. than in other countries. (This, as well as the FCC decisions about keeping Internet calls free from access charges, should surely be added to the list of “the 10 key choices that were critical to the Net’s success,” that were compiled by Scott Bradner [28].)

Flat local calling rates in US helped grow the Net Read More »

Monopolies & Internet innovation

From Andrew Odlyzko’s “Pricing and Architecture of the Internet: Historical Perspectives from Telecommunications and Transportation“:

The power to price discriminate, especially for a monopolist, is like the power of taxation, something that can be used to destroy. There are many governments that are interested in controlling Internet traffic for political or other reasons, and are interfering (with various degrees of success) with the end-to-end principle. However, in most democratic societies, the pressure to change the architecture of the Internet is coming primarily from economic concerns, trying to extract more revenues from users. This does not necessarily threaten political liberty, but it does impede innovation. If some new protocol or service is invented, gains from its use could be appropriated by the carriers if they could impose special charges for it.

The power of price discrimination was well understood in ancient times, even if the economic concept was not defined. As the many historical vignettes presented before show, differential pricing was frequently allowed, but only to a controlled degree. The main con- cern in the early days was about general fairness and about service providers leveraging their control of a key facility into control over other businesses. Personal discrimination was particularly hated, and preference was given to general rules applying to broad classes (such as student or senior citizen discounts today). Very often bounds on charges were imposed to limit price discrimination. …

Openness, non-discrimination, and the end-to-end principle have contributed greatly to the success of the Internet, by allowing innovation to flourish. Service providers have traditionally been very poor in introducing services that mattered and even in forecasting where their profits would come from. Sometimes this was because of ignorance, as in the failure of WAP and success of SMS, both of which came as great surprises to the wireless industry, even though this should have been the easiest thing to predict [55]. Sometimes it was because the industry tried to control usage excessively. For example, services such as Minitel have turned out to be disappointments for their proponents largely because of the built-in limitations. We can also recall the attempts by the local telephone monopolies in the mid-to late-1990s to impose special fees on Internet access calls. Various studies were trotted out about the harm that long Internet calls were causing to the network. In retrospect, though, Internet access was a key source of the increased revenues and profits at the local telcos in the late 1990s. Since the main value of the phone was its accessibility at any time, long Internet calls led to installation of second lines that were highly profitable for service providers. (The average length of time that a phone line was in use remained remarkably constant during that period [49].)

Much of the progress in telecommunications over the last couple of decades was due to innovations by users. The “killer apps” on the Internet, email, Web, browser, search engines, and Napster, were all invented by end users, not by carriers. (Even email was specifically not designed into the ARPANET, the progenitor of the Internet, and its dominance came as a surprise [55].)

Monopolies & Internet innovation Read More »

Railroads & tolls

From Andrew Odlyzko’s “Pricing and Architecture of the Internet: Historical Perspectives from Telecommunications and Transportation“:

Railroads were the dominant industry of the 19th century. … Early railroad charters, in both England and the U.S., were modeled after canal and turnpike charters, and almost uniformly envisaged that railroad companies would not be carriers themselves. Instead, they were expected to offer their facilities for use by carriers that would carry goods and passengers in their own wagons over the rails. Still, these charters specified tolls that varied greatly depending on the nature of the cargo. … For example, the very first parliamentary act for a railway was enacted in 1801. (Previous railways had been on private property, but in this case, as in subsequent ones, promoters were asking for the right of eminent domain to acquire the necessary land.) Between the endpoints of the railway, “chalk, lime and other manures were charged at the rate of three-pence per ton per mile; coals, corn, potatoes, iron and other metals, fourpence; and all goods not specified, sixpence” (p. 45 of [13]). …

Although some railroads did operate with other companies’ equipment on their rails for decades (and modern ones do so extensively), there was a relatively quick shift in the 1830s and 1840s towards railroads being exclusive carriers. There were technical reasons promot- ing such a shift (safety was jeopardized with multiple operators and primitive technology), but there is evidence that desire for greater control over pricing by railroads was also a major consideration [64]. Once railroads became carriers, they could engage in much more extensive price discrimination than allowed by the toll structure in their charters. And, propelled by the economics of their industry, with high fixed costs, railroads did engage in massive price discrimination, including personal discrimination. The result was massive political movements leading to government regulation [62,65].

Railroads & tolls Read More »

Turnpikes, roads, & tolls

From Andrew Odlyzko’s “Pricing and Architecture of the Internet: Historical Perspectives from Telecommunications and Transportation“:

British turnpikes were a controversial response to a serious problem. Traditionally, the King’s Highway was open to all. The problem was how to keep it in good condition. As commerce grew, the need to maintain roads became acute. At first, in Elizabethan times, laws were enacted compelling all able-bodied commoner males to devote several days a year to labor on the highways. (See [1,66,80] for references for the background information as well as other items below that are not attributed otherwise.) The inequitable distribution of the burden this imposed and the lack of effective control mechanisms by the central government led to many complaints. As a result, in 1663, the first turnpike was authorized. A local group was authorized to create a turnpike trust that would borrow money to improve a section of a road, and then collect tolls from travelers for passage over that section of the road. This venture was set up (as were all subsequent turnpikes) as an ostensibly non-profit trust. (There were opportunities for profits there, for example in payment of above-market fees and other abuses, but those were illicit, and in any case were not the high profits that other, more private, enterprises, such as lighthouses and canals, offered.) The reason for the non-profit nature of turnpikes was presumably to allay concerns about a violation of the ancient principle that the King’s Highway was open to all. Still, this turnpike was very controversial (as were many later ones). Apparently largely for that reason, it took until 1695 before the next turnpike was set up [2].

In the early 18th century, the turnpike movement took off in earnest. Although there were frequent protests (sometimes violent, as in the burning of the toll gates around Bristol in 1727 and 1735), by mid-1830s there were over 20,000 miles of turnpikes in England. …

Tolls were usually doubled on Sundays for ordinary commercial traffic, but were eliminated for travel to or from church. They also “were never levied on foot passengers, and were thus unfelt by the labouring poor” (p. 124 of [80]). There were also options in many cases for a flat fee for annual access. Still, there were countless controversies about the toll, “the collection of which led to endless evasions, inequalities and favouritisms of all kinds, arbitrary exactions, and systematic petty embezzlements” (p. 136 of [80]). …

… road tolls are coming back as a result of growing congestion and improved technology. Unlike telecommunications, where technology is increasing capacity of fiber, coax, and radio transmissions, building new roads is increasingly difficult, and making existing ones carry more traffic can only be done to a limited extent. At the same time, electronic means for monitoring traffic and collecting tolls are improving, and we see central business districts in Norway, Singapore, and London imposing tolls. Most of these systems do raise privacy issues, too, since they are centralized ones with information about users, or at least cars. Still, there is a strong tendency to introduce ever more detailed monitoring of traffic, often with the explicit goal of charging users according to their level of activity (whether by governments or by insurance companies).

Turnpikes, roads, & tolls Read More »

Canals & tolls

From Andrew Odlyzko’s “Pricing and Architecture of the Internet: Historical Perspectives from Telecommunications and Transportation“:

The modern canal era can be said to start with the Duke of Bridgewater’s Canal in England. Originally it was just a means of connecting the Duke’s colliery to Manchester. The parliamentary charter (which enabled him to take over private property, with appropriate compensation) obliged the Duke to carry cargo to Manchester at a maximum charge of 30 pence a ton, and to sell his own coal in Manchester for no more than 80 pence a ton, about half the price that had prevailed before [38,68]. Parliament was determined to obtain substantial benefits for the public from the grant of government powers to the Duke. …

The great financial success of the Duke of Bridgewater’s Canal led to widespread attempts to emulate it. In the early 1790s, there was a canal mania, with a burst of construction that was never to be replicated in Britain. (The U.S. had its canal mania some decades later, following on the great success of the Erie Canal.) The charters of those canals show a general trend towards greater price discrimination. …

Similar toll schedules depending on cargo were also common in the United States. As an example, when parts of the still incomplete Erie Canal were opened in 1820, there was a long list of tolls, concluding with “All articles not enumerated, one cent, per ton, per mile” (Chapter 2 of [81]). The enumerated articles (among those that were measured by the ton) were charged tolls ranging from salt and gypsum at 0.5 cents per ton per mile, to 1 cent for flour, to 2 cents for merchandise, and nothing for fuel to be used in the manufacture of salt (so that it was necessary not only to know the nature of the cargo, but its ultimate use). …

While canal operators were trying to squeeze carriers (who were trying to squeeze merchants, in ways similar to those described below for turnpikes), carriers often attempted to evade tolls. They bribed toll-collectors, misrepresented what the cargo was, or how much there was of it, and in some cases even hid cargo with high toll charges under commodities such as sand for which the fees were low. The countermeasures, just as they are today, and would likely be in the future with electronic communications, were based on both technology and law. Measurements were taken (in many cases there were books available to canal operators, listing canal boats, and the weight of cargo aboard as a function of how deeply in the water they lay), and there were punitive penalties for evasion.

Canals & tolls Read More »

Big companies & their blind spots

From Paul Graham’s “Are Software Patents Evil?“:

Fortunately for startups, big companies are extremely good at denial. If you take the trouble to attack them from an oblique angle, they’ll meet you half-way and maneuver to keep you in their blind spot. To sue a startup would mean admitting it was dangerous, and that often means seeing something the big company doesn’t want to see. IBM used to sue its mainframe competitors regularly, but they didn’t bother much about the microcomputer industry because they didn’t want to see the threat it posed. Companies building web based apps are similarly protected from Microsoft, which even now doesn’t want to imagine a world in which Windows is irrelevant. …

Big companies & their blind spots Read More »

Paul Graham on software patents

From Paul Graham’s “Are Software Patents Evil?“:

The situation with patents is similar. Business is a kind of ritualized warfare. Indeed, it evolved from actual warfare: most early traders switched on the fly from merchants to pirates depending on how strong you seemed. In business there are certain rules describing how companies may and may not compete with one another, and someone deciding that they’re going to play by their own rules is missing the point. Saying “I’m not going to apply for patents just because everyone else does” is not like saying “I’m not going to lie just because everyone else does.” It’s more like saying “I’m not going to use TCP/IP just because everyone else does.” Oh yes you are.

A closer comparison might be someone seeing a hockey game for the first time, realizing with shock that the players were deliberately bumping into one another, and deciding that one would on no account be so rude when playing hockey oneself.

Hockey allows checking. It’s part of the game. If your team refuses to do it, you simply lose. So it is in business. Under the present rules, patents are part of the game. …

When you read of big companies filing patent suits against smaller ones, it’s usually a big company on the way down, grasping at straws. For example, Unisys’s attempts to enforce their patent on LZW compression. When you see a big company threatening patent suits, sell. When a company starts fighting over IP, it’s a sign they’ve lost the real battle, for users.

A company that sues competitors for patent infringement is like a defender who has been beaten so thoroughly that he turns to plead with the referee. You don’t do that if you can still reach the ball, even if you genuinely believe you’ve been fouled. So a company threatening patent suits is a company in trouble. …

In other words, no one will sue you for patent infringement till you have money, and once you have money, people will sue you whether they have grounds to or not. So I advise fatalism. Don’t waste your time worrying about patent infringement. You’re probably violating a patent every time you tie your shoelaces. At the start, at least, just worry about making something great and getting lots of users. If you grow to the point where anyone considers you worth attacking, you’re doing well.

We do advise the companies we fund to apply for patents, but not so they can sue competitors. Successful startups either get bought or grow into big companies. If a startup wants to grow into a big company, they should apply for patents to build up the patent portfolio they’ll need to maintain an armed truce with other big companies. If they want to get bought, they should apply for patents because patents are part of the mating dance with acquirers. …

Patent trolls are companies consisting mainly of lawyers whose whole business is to accumulate patents and threaten to sue companies who actually make things. Patent trolls, it seems safe to say, are evil. I feel a bit stupid saying that, because when you’re saying something that Richard Stallman and Bill Gates would both agree with, you must be perilously close to tautologies.

Paul Graham on software patents Read More »

Douglas Adams on information overload

From Douglas Adam’s “Is there an Artificial God?“:

Let me back up for a minute and talk about the way we communicate. Traditionally, we have a bunch of different ways in which we communicate with each other. One way is one-to-one; we talk to each other, have a conversation. Another is one-to-many, which I’m doing at the moment, or someone could stand up and sing a song, or announce we’ve got to go to war. Then we have many-to-one communication; we have a pretty patchy, clunky, not-really-working version we call democracy, but in a more primitive state I would stand up and say, ‘OK, we’re going to go to war’ and some may shout back ‘No we’re not!’ – and then we have many-to-many communication in the argument that breaks out afterwards!

In this century (and the previous century) we modelled one-to-one communications in the telephone, which I assume we are all familiar with. We have one-to-many communication—boy do we have an awful lot of that; broadcasting, publishing, journalism, etc.—we get information poured at us from all over the place and it’s completely indiscriminate as to where it might land. It’s curious, but we don’t have to go very far back in our history until we find that all the information that reached us was relevant to us and therefore anything that happened, any news, whether it was about something that’s actually happened to us, in the next house, or in the next village, within the boundary or within our horizon, it happened in our world and if we reacted to it the world reacted back. It was all relevant to us, so for example, if somebody had a terrible accident we could crowd round and really help. Nowadays, because of the plethora of one-to-many communication we have, if a plane crashes in India we may get terribly anxious about it but our anxiety doesn’t have any impact. We’re not very well able to distinguish between a terrible emergency that’s happened to somebody a world away and something that’s happened to someone round the corner. We can’t really distinguish between them any more, which is why we get terribly upset by something that has happened to somebody in a soap opera that comes out of Hollywood and maybe less concerned when it’s happened to our sister. We’ve all become twisted and disconnected and it’s not surprising that we feel very stressed and alienated in the world because the world impacts on us but we don’t impact the world. Then there’s many-to-one; we have that, but not very well yet and there’s not much of it about. Essentially, our democratic systems are a model of that and though they’re not very good, they will improve dramatically.

But the fourth, the many-to-many, we didn’t have at all before the coming of the Internet, which, of course, runs on fibre-optics. It’s communication between us …

Douglas Adams on information overload Read More »

Why businesses want RFID for inventory

From Technology Review‘s “Tracking Privacy“:

Technology Review: How would RFID work to track products?

Sandra Hughes [Global privacy executive, Procter and Gamble]: It’s a technology that involves a silicon chip and an antenna, which together we call a tag. The tags emit radio signals to devices that we call readers. One of the things that is important to know about is EPC. Some people use RFID and EPC interchangeably, but they are different. EPC stands for electronic product code; it’s really like an electronic bar code.

TR: So manufacturers and distributors would use EPCs encoded in RFID tags to mark and track products? Why’s that any better than using regular bar codes?

Hughes: Bar codes require a line of sight, so somebody with a bar code reader has to get right up on the bar code and scan it. When you’re thinking about the supply chain, somebody in the warehouse is having to look at every single case. With RFID, a reader should be able to pick up just by one swipe all of the cases on the pallet, even the ones stacked up in the middle that can’t be seen. So it’s much, much faster and more efficient and accurate.

TR: Why is that speed important?

Hughes: We want our product to be on the shelf for consumers when they want it. A recent study of retailers showed that the top 2,000 items in stores had a 12 percent out-of-stock rate on Saturday afternoons, the busiest shopping day. I think the industry average for inventory levels is 65 days, which means products sitting around, taking up space for that time, and that costs about $3 billion annually. Often a retail clerk can’t quickly find products in the crowded back room of a store to make sure that the shelves are filled for the consumer, or doesn’t know that a shelf is sitting empty because she hasn’t walked by lately. With RFID, the shelf can signal to the back room that it is empty, and the clerk can quickly find the product.

Why businesses want RFID for inventory Read More »

Arguments against the Web’s ungovernability

From Technology Review‘s “Taming the Web“:

Nonetheless, the claim that the Internet is ungovernable by its nature is more of a hope than a fact. It rests on three widely accepted beliefs, each of which has become dogma to webheads. First, the Net is said to be too international to oversee: there will always be some place where people can set up a server and distribute whatever they want. Second, the Net is too interconnected to fence in: if a single person has something, he or she can instantly make it available to millions of others. Third, the Net is too full of hackers: any effort at control will invariably be circumvented by the world’s army of amateur tinkerers, who will then spread the workaround everywhere.

Unfortunately, current evidence suggests that two of the three arguments for the Net’s uncontrollability are simply wrong; the third, though likely to be correct, is likely to be irrelevant. In consequence, the world may well be on the path to a more orderly electronic future-one in which the Internet can and will be controlled. If so, the important question is not whether the Net can be regulated and monitored, but how and by whom. …

As Swaptor shows, the Net can be accessed from anywhere in theory, but as a practical matter, most out-of-the-way places don’t have the requisite equipment. And even if people do actually locate their services in a remote land, they can be easily discovered. …

Rather than being composed of an uncontrollable, shapeless mass of individual rebels, Gnutella-type networks have identifiable, centralized targets that can easily be challenged, shut down or sued. Obvious targets are the large backbone machines, which, according to peer-to-peer developers, can be identified by sending out multiple searches and requests. By tracking the answers and the number of hops they take between computers, it is possible not only to identify the Internet addresses of important sites but also to pinpoint their locations within the network.

Once central machines have been identified, companies and governments have a potent legal weapon against them: their Internet service providers. …

In other words, those who claim that the Net cannot be controlled because the world’s hackers will inevitably break any protection scheme are not taking into account that the Internet runs on hardware – and that this hardware is, in large part, the product of marketing decisions, not technological givens.

Arguments against the Web’s ungovernability Read More »

Security will retard innovation

From Technology Review‘s “Terror’s Server“:

Zittrain [Jonathan Zittrain, codirector of the Berkman Center for Internet and Society at Harvard Law School] concurs with Neumann [Peter Neumann, a computer scientist at SRI International, a nonprofit research institute in Menlo Park, CA] but also predicts an impending overreaction. Terrorism or no terrorism, he sees a convergence of security, legal, and business trends that will force the Internet to change, and not necessarily for the better. “Collectively speaking, there are going to be technological changes to how the Internet functions — driven either by the law or by collective action. If you look at what they are doing about spam, it has this shape to it,” Zittrain says. And while technologi­cal change might improve online security, he says, “it will make the Internet less flexible. If it’s no longer possible for two guys in a garage to write and distribute killer-app code without clearing it first with entrenched interests, we stand to lose the very processes that gave us the Web browser, instant messaging, Linux, and e-mail.”

Security will retard innovation Read More »

Terrorist social networks

From Technology Review‘s “Terror’s Server“:

For example, research suggests that people with nefarious intent tend to exhibit distinct patterns in their use of e-mails or online forums like chat rooms. Whereas most people establish a wide variety of contacts over time, those engaged in plotting a crime tend to keep in touch only with a very tight circle of people, says William Wallace, an operations researcher at Rensselaer Polytechnic Institute.

This phenomenon is quite predictable. “Very few groups of people communicate repeatedly only among themselves,” says Wallace. “It’s very rare; they don’t trust people outside the group to communicate. When 80 percent of communications is within a regular group, this is where we think we will find the groups who are planning activities that are malicious.” Of course, not all such groups will prove to be malicious; the odd high-school reunion will crop up. But Wallace’s group is developing an algorithm that will narrow down the field of so-called social networks to those that warrant the scrutiny of intelligence officials. The algorithm is scheduled for completion and delivery to intelligence agencies this summer. …

Terrorist social networks Read More »

How terrorists use the Web

From Technology Review‘s “Terror’s Server“:

According to [Gabriel] Weimann [professor of communications at University of Haifa], the number of [terror-related] websites has leapt from only 12 in 1997 to around 4,300 today. …

These sites serve as a means to recruit members, solicit funds, and promote and spread ideology. …

The September 11 hijackers used conventional tools like chat rooms and e-mail to communicate and used the Web to gather basic information on targets, says Philip Zelikow, a historian at the University of Virginia and the former executive director of the 9/11 Commission. …

Finally, terrorists are learning that they can distribute images of atrocities with the help of the Web. … “The Internet allows a small group to publicize such horrific and gruesome acts in seconds, for very little or no cost, worldwide, to huge audiences, in the most powerful way,” says Weimann. …

How terrorists use the Web Read More »

The growth in data & the problem of storage

From Technology Review‘s “The Fading Memory of the State“:

Tom Hawk, general manager for enterprise storage at IBM, says that in the next three years, humanity will generate more data–from websites to digital photos and video–than it generated in the previous 1,000 years. … In 1996, companies spent 11 percent of their IT budgets on storage, but that figure will likely double to 22 percent in 2007, according to International Technology Group of Los Altos, CA.

… the Pentagon generates tens of millions of images from personnel files each year; the Clinton White House generated 38 million e-mail messages (and the current Bush White House is expected to generate triple that number); and the 2000 census returns were converted into more than 600 million TIFF-format image files, some 40 terabytes of data. A single patent application can contain a million pages, plus complex files like 3-D models of proteins or CAD drawings of aircraft parts. All told, NARA expects to receive 347 petabytes … of electronic records by 2022.

Currently, the Archives holds only a trivial number of electronic records. Stored on steel racks in NARA’s [National Archives and Records Administration] 11-year-old facility in College Park, the digital collection adds up to just five terabytes. Most of it consists of magnetic tapes of varying ages, many of them holding a mere 200 megabytes apiece–about the size of 10 high-resolution digital photographs.

The growth in data & the problem of storage Read More »