Summary 6: Network protocols

In the article Network Protocols, Brad Gilmer basically gives a run down on network protocols. These are critical in running some computer networks throughout the internet. He explains some of those like ethernet, IP, User Data protocol, and the Real Time Transport protocol. Ethernet is a way to connect to the internet but it is also a protocol. IP is responsible for transporting the data from one device to another. The User data protocol is used to send data from one application that is up and running on a computer to that same application up and running on another computer....Read More

Summary 5: Code is Speech

In the article Code is Speech, Gabriella Coleman explains in great detail about coding, the language of computer programs. Now I’m not that into the technical side of computers and coding, but I found this article to be very interesting. Coleman does a great job in explaining how coding works and what it does. She also explains how, based on Seth Schoen’s view point, code is speech. I agree with her, code truly is speech. Its a way for computer programmers and app developers to communicate and create new things. Coleman does a great job tying in many examples and...Read More

Summary 3: Big Brother versus anonymity on the Internet

Big Brother versus anonymity on the Internet: implications for Internet service providers, libraries and individuals since 9/11, is about how anonymity is changing with the internet. Jelke Nijboer, explains how anonymity in the real world was better, where you could just have a conversation with a person at the bus stop with out giving them most of your information. However, in the internet, you have no idea who has your personal information. Although this article was written ten years ago I think this has a lot of information that is still pertinent today. For example, Nijober, touches on cyber bullying,...Read More