skip to main content
Skip header Section
Realizing the information future: the Internet and beyondSeptember 1994
Publisher:
  • National Academy Press
  • Div. of Natl. Academy of Sciences 2101 Constitution Ave. N.W. Washington, DC
  • United States
ISBN:978-0-309-05044-9
Published:01 September 1994
Pages:
301
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Ulset S (2007). Restructuring diversified telecom operators, Telecommunications Policy, 31:3-4, (209-229), Online publication date: 1-Apr-2007.
  2. Clark D, Wroclawski J, Sollins K and Braden R (2005). Tussle in cyberspace, IEEE/ACM Transactions on Networking (TON), 13:3, (462-475), Online publication date: 1-Jun-2005.
  3. Lippman A and Reed D (2004). Viral Radio, BT Technology Journal, 22:4, (13-24), Online publication date: 1-Oct-2004.
  4. Blumenthal M Communications and computers Encyclopedia of Computer Science, (243-250)
  5. ACM
    Clark D, Wroclawski J, Sollins K and Braden R Tussle in cyberspace Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications, (347-356)
  6. ACM
    Clark D, Wroclawski J, Sollins K and Braden R (2002). Tussle in cyberspace, ACM SIGCOMM Computer Communication Review, 32:4, (347-356), Online publication date: 1-Oct-2002.
  7. ACM
    Blumenthal M and Clark D (2001). Rethinking the design of the Internet, ACM Transactions on Internet Technology, 1:1, (70-109), Online publication date: 1-Aug-2001.
  8. Blumenthal M (2019). Unpredictable Certainty, Computer, 30:1, (50-56), Online publication date: 1-Jan-1997.
  9. ACM
    Garg P and Sankar S (2019). Fifth California software symposium, ACM SIGSOFT Software Engineering Notes, 21:1, (68-70), Online publication date: 1-Jan-1996.
  10. ACM
    Hasche L and Kiewit P Using continuing education programs to transfer campus Internet experience to the community Proceedings of the 23rd annual ACM SIGUCCS conference on User services: winning the networking game, (127-130)
  11. ACM
    Kleinrock L (2019). Nomadic computing—an opportunity, ACM SIGCOMM Computer Communication Review, 25:1, (36-40), Online publication date: 11-Jan-1995.
Contributors
  • National Research Council

Recommendations

Reviews

Richard Stuart Rosenberg

This timely book provides important technical information and valuable recommendations useful in penetrating the ever-increasing dust clouds generated by the information highway public relations machine. In 1988, the Computer Science and Telecommunications Board (CSTB) produced a study of the National Research and Education Network (NREN) program. Later, in the winter of 1990–1991, the National Science Foundation requested a new study from CSTB. For a variety of reasons, this study did not begin until 1993 and was conducted by the NRENAISSANCE Committee, composed of a distinguished group of scientists chaired by Leonard Kleinrock. It is obviously difficult to summarize such a book, given the wealth of detailed technical and historical information. Over one-third of the book, chapters 1 and 2 and appendices A and D, is devoted to an overview of networks past (ARPANET), present (Internet), and future (National Information Infrastructure—NII). The committee argues strongly for an Open Data Network as the best chance to fulfill the hopes invested by many in the NII. An Open Data Network must satisfy the following criteria (p. 44): Open to users: It does not force users into closed groups or deny access to any sectors of society, but permits universal connectivity, as does the telephone system. Open to service providers: It provides an open and accessible environment for competing commercial or intellectual interests. For example, it does not preclude competitive access for information providers. Open to network providers: It makes it possible for any network provider to meet the necessary requirements to attach and become a part of the aggregate of interconnected networks. Open to change: It permits the introduction of new applications and services over time. It is not limited to only one application, such as TV distribution. It also permits the introduction of new transmission, switching, and control technologies as these become available in the future. Such criteria must be translated into technical, operational, and organizational objectives, and the committee describes these in some detail. Among the many issues discussed are quality of service, standards, meeting NII requirements, security, and an adequate NII research agenda. The remainder of the book explores issues associated with possible applications of the NII, relevant social issues, funding, and the role of the federal government. Thus chapter 3 focuses on the benefits to be accrued by the research, education, and library communities. Chapter 5 describes a variety of funding strategies as well as associated access problems, and chapter 6 deals with the role of the federal government in providing leadership and vision, balancing competing interests, and influencing the “shape of the information infrastructure” (pp. 217–228). I have saved my discussion of chapter 4 for last, reflecting the typical evaluation process of far-reaching technological innovations—namely the relegation of the social impact study to a less-than-exalted position. In one chapter of 36 pages, titled “Principles and Practice,” the committee addresses such concerns as equitable access, information dissemination, privacy, free speech, intellectual property protection, and ethics, a full agenda by any measure. In addition, Appendix B lists several sets of principles of operation from such sources as the Information Infrastructure Task Force, the Telecommunications Roundtable, the Electronic Frontier Foundation, and Computer Professionals for Social Responsibility. While the committees statements in support of basic civil rights are laudable, their very brevity may limit their influence, compared to the lengthy treatment of technical issues. Nevertheless, the following examples are indicative of a strong commitment to basic principles that if followed would at least help to ensure a more equit able technological future. Access to networks should be equitable, affordable, and ubiquitous. Access to information through the infrastructure should be governed by rights and responsibilities relating to freedom of expression, intellectual property rights, individual privacy, and data and system security. The First Amendment suggests that government should permit no one to exercise monopoly over the content carried over the network; content determination and editorial control issues should be the province of computing information providers. Although the mention of the First Amendment suggests that free speech is to be valued, there is actually a noticeable lack of explicit defense of that much-debated but greatly valued concept. Indeed, the Internet is a living example of free speech in action in spite of numerous attempts to limit and actually abolish its exercise. The book opens with a summary and five recommendations related to leadership, technological deployment, transitional support, K–12 education, and network research. Thus the government is encouraged to support the development of the Open Data Network; to work with the private sector in implementing the network; to provide temporary subsidies to educational and research institutions; to ensure that the benefits of networks are made available in K– 12 education; and to support research in networks. In the present political environment, one can only wonder about the fate of recommendations that urge the government to increase its involvement in the private sector. The current expectation is that the governments role will be to provide a level playing field and to let the competing forces—cable, television, telephone, computer manufacturers, and entertainment producers—fight it out. This book may help to keep the technical issues straight, a not inconsequential achievement.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.