SlideShare a Scribd company logo
1 of 36
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Photo by asadal · Licensed under  CC Attribution-ShareAlike 2.0  ·  http://flickr.com/photos/68242677@N00/2117153416/
Original photo by Brooke Novak · Licensed under  CC BY  ·  http://flickr.com/photos/brookenovak/337889974/ I AM NOT A
... and this is a little far afield from a normal CC presentation. The most important (and CC-relevant) takeaway is that building the commons now is critical to the future of techno-politics turning out well ... as opposed to Orwell!
“Napster politics are brutally boring” Lucas Gonze
So let’s talk about a crusade for the soul of techno-politics, not a battle over bits.
Example threats and fears
Cyber terrorism
Cyber terrorism (Cyber terror war on)
Cyber terrorism (Cyber terror war on) Privacy breaches
Cyber terrorism (Cyber terror war on) Privacy breaches Loss of Generativity
Cyber terrorism (Cyber terror war on) Privacy breaches Loss of Generativity Lock-in
Cyber terrorism (Cyber terror war on) Privacy breaches Loss of Generativity Lock-in Surveillance
Cyber terrorism (Cyber terror war on) Privacy breaches Loss of Generativity Lock-in Surveillance DRM
Cyber terrorism (Cyber terror war on) Privacy breaches Loss of Generativity Lock-in Surveillance DRM Censorship
Cyber terrorism (Cyber terror war on) Privacy breaches Loss of Generativity Lock-in Surveillance DRM Censorship Suppression of innovation
Cyber terrorism (Cyber terror war on) Privacy breaches Loss of Generativity Lock-in Surveillance DRM Censorship Suppression of innovation Electoral fraud
Threat categories ,[object Object],[object Object],[object Object],[object Object]
Healthy techno-politics ,[object Object],[object Object],[object Object]
How building the commons (free software, free culture, and friends) helps
Security ,[object Object],[object Object],[object Object],[object Object]
Protectionism ,[object Object],[object Object]
Politics and power ,[object Object],[object Object],[object Object]
Security theater and fear ,[object Object],[object Object]
What about network services?  The Commons Lost ? ,[object Object],[object Object],[object Object],[object Object]
Autonomy in a network services environment ,[object Object],[object Object],[object Object],[object Object]
Network services freedom: early efforts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Some network services open issues ,[object Object],[object Object],[object Object]
Photo by RocketRaccoon · Licensed under  CC BY  ·  http://flickr.com/photos/rocketraccoon/227241974/
Nagging question relevant to the development of techno-politics over last ~10 years: To what extent has the attempt to suppress P2P negatively impacted the development of completely decentralized applications, shaped “Web 2.0”, and added to the network services challenge?
Can the success of the (digital) commons alter how we view freedom and power generally?
[object Object],[object Object]
[object Object],[object Object]
 
What is the future of techno-politics? ,[object Object],[object Object],[object Object]
So Create! (and learn/experience so you can teach/recommend free software and free culture when appropriate)
Building the commons is key to the future of healthy network politics ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Pennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingPennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud Computing
Nicole Black
 
Children and Online Safety
Children and Online SafetyChildren and Online Safety
Children and Online Safety
alandang
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracy
guesteb94797
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
Brian Rowe
 

What's hot (20)

Pennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingPennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud Computing
 
Chapter 2 presentation
Chapter 2 presentationChapter 2 presentation
Chapter 2 presentation
 
Chapter 2 presentation
Chapter 2 presentationChapter 2 presentation
Chapter 2 presentation
 
Chapter 2 presentation
Chapter 2 presentationChapter 2 presentation
Chapter 2 presentation
 
Chapter 2 presentation
Chapter 2 presentationChapter 2 presentation
Chapter 2 presentation
 
The Future of the Internet
The Future of the InternetThe Future of the Internet
The Future of the Internet
 
Children and Online Safety
Children and Online SafetyChildren and Online Safety
Children and Online Safety
 
Community of Practice Innovatie
Community of Practice InnovatieCommunity of Practice Innovatie
Community of Practice Innovatie
 
Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015
 
Polinter02
Polinter02Polinter02
Polinter02
 
Developers can Change The World
Developers can Change The WorldDevelopers can Change The World
Developers can Change The World
 
Polinter02
Polinter02Polinter02
Polinter02
 
The internet’s turbulent next decade
The internet’s turbulent next decadeThe internet’s turbulent next decade
The internet’s turbulent next decade
 
Future Of Internet Presentation
Future Of Internet PresentationFuture Of Internet Presentation
Future Of Internet Presentation
 
Future opportunities in social communications
Future opportunities in social communicationsFuture opportunities in social communications
Future opportunities in social communications
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracy
 
Thom’s top ten
Thom’s top tenThom’s top ten
Thom’s top ten
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
 
Enhancing the Web Experience
Enhancing the Web ExperienceEnhancing the Web Experience
Enhancing the Web Experience
 
Group 1 Project
Group 1 Project Group 1 Project
Group 1 Project
 

Viewers also liked

The Impact of Communication Technology on Politics
The Impact of Communication Technology on PoliticsThe Impact of Communication Technology on Politics
The Impact of Communication Technology on Politics
crhogan
 
Role of technology in business communication 2
Role of technology in business communication 2Role of technology in business communication 2
Role of technology in business communication 2
mehwish88
 

Viewers also liked (14)

The Impact of Communication Technology on Politics
The Impact of Communication Technology on PoliticsThe Impact of Communication Technology on Politics
The Impact of Communication Technology on Politics
 
tracys resume 2014
tracys resume 2014tracys resume 2014
tracys resume 2014
 
Globalization
GlobalizationGlobalization
Globalization
 
Tech City - NOAH15 London
Tech City - NOAH15 LondonTech City - NOAH15 London
Tech City - NOAH15 London
 
Tech City: How London became a tech power hub
Tech City: How London became a tech power hubTech City: How London became a tech power hub
Tech City: How London became a tech power hub
 
Intro to Tech City
Intro to Tech CityIntro to Tech City
Intro to Tech City
 
The New York City Tech Ecosystem
The New York City Tech EcosystemThe New York City Tech Ecosystem
The New York City Tech Ecosystem
 
The #StartupStack
The #StartupStackThe #StartupStack
The #StartupStack
 
Role of technology in business communication 2
Role of technology in business communication 2Role of technology in business communication 2
Role of technology in business communication 2
 
Role of Information Technology in Business
Role of Information Technology in BusinessRole of Information Technology in Business
Role of Information Technology in Business
 
Power and Politics in an Organization
Power and Politics in an OrganizationPower and Politics in an Organization
Power and Politics in an Organization
 
Impact of information technology in business perspective
Impact of information technology in business perspectiveImpact of information technology in business perspective
Impact of information technology in business perspective
 
Uses of technology in business communication
Uses of technology in business communicationUses of technology in business communication
Uses of technology in business communication
 
IMPACT OF TECHNOLOGY ON BUSINESS COMMUNICATION
IMPACT OF TECHNOLOGY ON BUSINESS COMMUNICATIONIMPACT OF TECHNOLOGY ON BUSINESS COMMUNICATION
IMPACT OF TECHNOLOGY ON BUSINESS COMMUNICATION
 

Similar to The Commons - Networked Politics & Technology Seminar

The Future of Digital Freedom
The Future of Digital FreedomThe Future of Digital Freedom
The Future of Digital Freedom
Mike Linksvayer
 
Program For The Future: The Commons as a collective intelligence meta-innovation
Program For The Future: The Commons as a collective intelligence meta-innovationProgram For The Future: The Commons as a collective intelligence meta-innovation
Program For The Future: The Commons as a collective intelligence meta-innovation
Mike Linksvayer
 
Regulating the Network
Regulating the NetworkRegulating the Network
Regulating the Network
Mathias Klang
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
whittemorelucilla
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
Leslie Lee
 
Assignment DetailsSmartphones, the Internet, and rapid advance
Assignment DetailsSmartphones, the Internet, and rapid advanceAssignment DetailsSmartphones, the Internet, and rapid advance
Assignment DetailsSmartphones, the Internet, and rapid advance
AbramMartino96
 

Similar to The Commons - Networked Politics & Technology Seminar (20)

The Future of Digital Freedom
The Future of Digital FreedomThe Future of Digital Freedom
The Future of Digital Freedom
 
Program For The Future: The Commons as a collective intelligence meta-innovation
Program For The Future: The Commons as a collective intelligence meta-innovationProgram For The Future: The Commons as a collective intelligence meta-innovation
Program For The Future: The Commons as a collective intelligence meta-innovation
 
Cc singularity u-panel_on_open_source
Cc singularity u-panel_on_open_sourceCc singularity u-panel_on_open_source
Cc singularity u-panel_on_open_source
 
Collaboration for Good Futures
Collaboration for Good FuturesCollaboration for Good Futures
Collaboration for Good Futures
 
Singularity University Open Source Panel
Singularity University Open Source PanelSingularity University Open Source Panel
Singularity University Open Source Panel
 
Who's Who in Internet Politics
Who's Who in Internet PoliticsWho's Who in Internet Politics
Who's Who in Internet Politics
 
Democratic Participation in the Technological Design Process
Democratic Participation in the Technological Design ProcessDemocratic Participation in the Technological Design Process
Democratic Participation in the Technological Design Process
 
Regulating the Network
Regulating the NetworkRegulating the Network
Regulating the Network
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 
Polinter11
Polinter11Polinter11
Polinter11
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Assignment DetailsSmartphones, the Internet, and rapid advance
Assignment DetailsSmartphones, the Internet, and rapid advanceAssignment DetailsSmartphones, the Internet, and rapid advance
Assignment DetailsSmartphones, the Internet, and rapid advance
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 

More from Mike Linksvayer

Leave it to the Experts: Leveraging Archive.org and Creative Commons for PEG ...
Leave it to the Experts: Leveraging Archive.org and Creative Commons for PEG ...Leave it to the Experts: Leveraging Archive.org and Creative Commons for PEG ...
Leave it to the Experts: Leveraging Archive.org and Creative Commons for PEG ...
Mike Linksvayer
 
Software Eats the (Commons/Public Licensing) World (It Should!)
 Software Eats the (Commons/Public Licensing) World (It Should!) Software Eats the (Commons/Public Licensing) World (It Should!)
Software Eats the (Commons/Public Licensing) World (It Should!)
Mike Linksvayer
 
Open data policy for scientists as citizens and for citizen science
Open data policy for scientists as citizens and for citizen scienceOpen data policy for scientists as citizens and for citizen science
Open data policy for scientists as citizens and for citizen science
Mike Linksvayer
 
Mass Collaboration [Policy]: What, Why, and Choices
Mass Collaboration [Policy]: What, Why, and ChoicesMass Collaboration [Policy]: What, Why, and Choices
Mass Collaboration [Policy]: What, Why, and Choices
Mike Linksvayer
 
Open World Forum: 'require knowledgecommons' # This currently fails
Open World Forum: 'require knowledgecommons' # This currently failsOpen World Forum: 'require knowledgecommons' # This currently fails
Open World Forum: 'require knowledgecommons' # This currently fails
Mike Linksvayer
 
The definition and future of noncommercial
The definition and future of noncommercialThe definition and future of noncommercial
The definition and future of noncommercial
Mike Linksvayer
 
"Opening" the Special Library: Open Source, Open Content, Open Data and More
"Opening" the Special Library: Open Source, Open Content, Open Data and More"Opening" the Special Library: Open Source, Open Content, Open Data and More
"Opening" the Special Library: Open Source, Open Content, Open Data and More
Mike Linksvayer
 
Global Copyright Challenges: 2011 Special Libraries Association Conference
Global Copyright Challenges: 2011 Special Libraries Association ConferenceGlobal Copyright Challenges: 2011 Special Libraries Association Conference
Global Copyright Challenges: 2011 Special Libraries Association Conference
Mike Linksvayer
 
Webmission.be visits Creative Commons
Webmission.be visits Creative CommonsWebmission.be visits Creative Commons
Webmission.be visits Creative Commons
Mike Linksvayer
 
New and Emerging Legal Infrastructures Conference (NELIC): Creative Commons ...
New and Emerging Legal Infrastructures Conference (NELIC):  Creative Commons ...New and Emerging Legal Infrastructures Conference (NELIC):  Creative Commons ...
New and Emerging Legal Infrastructures Conference (NELIC): Creative Commons ...
Mike Linksvayer
 
HOLLAND=OPEN trade mission visits Creative Commons
HOLLAND=OPEN trade mission visits Creative CommonsHOLLAND=OPEN trade mission visits Creative Commons
HOLLAND=OPEN trade mission visits Creative Commons
Mike Linksvayer
 
eval("freedom_stack.push(culture)"); // The Creative Commons Solution?
eval("freedom_stack.push(culture)"); // The Creative Commons Solution?eval("freedom_stack.push(culture)"); // The Creative Commons Solution?
eval("freedom_stack.push(culture)"); // The Creative Commons Solution?
Mike Linksvayer
 
Emerging Issues 2010: Whose Big Idea?
Emerging Issues 2010: Whose Big Idea?Emerging Issues 2010: Whose Big Idea?
Emerging Issues 2010: Whose Big Idea?
Mike Linksvayer
 

More from Mike Linksvayer (20)

Citizen Science and Collaborative Data Crosswalks
Citizen Science and Collaborative Data CrosswalksCitizen Science and Collaborative Data Crosswalks
Citizen Science and Collaborative Data Crosswalks
 
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
Open Source Hardware and Developments in Creative Commons Licenses, Compatibi...
 
Leave it to the Experts: Leveraging Archive.org and Creative Commons for PEG ...
Leave it to the Experts: Leveraging Archive.org and Creative Commons for PEG ...Leave it to the Experts: Leveraging Archive.org and Creative Commons for PEG ...
Leave it to the Experts: Leveraging Archive.org and Creative Commons for PEG ...
 
Software Eats the (Commons/Public Licensing) World (It Should!)
 Software Eats the (Commons/Public Licensing) World (It Should!) Software Eats the (Commons/Public Licensing) World (It Should!)
Software Eats the (Commons/Public Licensing) World (It Should!)
 
Open data policy for scientists as citizens and for citizen science
Open data policy for scientists as citizens and for citizen scienceOpen data policy for scientists as citizens and for citizen science
Open data policy for scientists as citizens and for citizen science
 
Mass Collaboration [Policy]: What, Why, and Choices
Mass Collaboration [Policy]: What, Why, and ChoicesMass Collaboration [Policy]: What, Why, and Choices
Mass Collaboration [Policy]: What, Why, and Choices
 
Digital Commons Meetup at Wikimania 2012
Digital Commons Meetup at Wikimania 2012Digital Commons Meetup at Wikimania 2012
Digital Commons Meetup at Wikimania 2012
 
FOSDEM 2012 Legal Devroom: ⊂ (FLOSS legal/policy ∩ CC [4.0])
FOSDEM 2012 Legal Devroom: ⊂ (FLOSS legal/policy ∩ CC [4.0])FOSDEM 2012 Legal Devroom: ⊂ (FLOSS legal/policy ∩ CC [4.0])
FOSDEM 2012 Legal Devroom: ⊂ (FLOSS legal/policy ∩ CC [4.0])
 
Open World Forum [Followup]: 'require knowledgecommons' # bugfix
Open World Forum [Followup]: 'require knowledgecommons' # bugfixOpen World Forum [Followup]: 'require knowledgecommons' # bugfix
Open World Forum [Followup]: 'require knowledgecommons' # bugfix
 
Open World Forum: 'require knowledgecommons' # This currently fails
Open World Forum: 'require knowledgecommons' # This currently failsOpen World Forum: 'require knowledgecommons' # This currently fails
Open World Forum: 'require knowledgecommons' # This currently fails
 
The definition and future of noncommercial
The definition and future of noncommercialThe definition and future of noncommercial
The definition and future of noncommercial
 
Learning Resource Metadata Initiative: Vocabulary Development Best Practices
Learning Resource Metadata Initiative: Vocabulary Development Best PracticesLearning Resource Metadata Initiative: Vocabulary Development Best Practices
Learning Resource Metadata Initiative: Vocabulary Development Best Practices
 
"Opening" the Special Library: Open Source, Open Content, Open Data and More
"Opening" the Special Library: Open Source, Open Content, Open Data and More"Opening" the Special Library: Open Source, Open Content, Open Data and More
"Opening" the Special Library: Open Source, Open Content, Open Data and More
 
Global Copyright Challenges: 2011 Special Libraries Association Conference
Global Copyright Challenges: 2011 Special Libraries Association ConferenceGlobal Copyright Challenges: 2011 Special Libraries Association Conference
Global Copyright Challenges: 2011 Special Libraries Association Conference
 
Webmission.be visits Creative Commons
Webmission.be visits Creative CommonsWebmission.be visits Creative Commons
Webmission.be visits Creative Commons
 
Towards License Interoperability: Patterns of Sustainable Sharing Policy
Towards License Interoperability: Patterns of Sustainable Sharing PolicyTowards License Interoperability: Patterns of Sustainable Sharing Policy
Towards License Interoperability: Patterns of Sustainable Sharing Policy
 
New and Emerging Legal Infrastructures Conference (NELIC): Creative Commons ...
New and Emerging Legal Infrastructures Conference (NELIC):  Creative Commons ...New and Emerging Legal Infrastructures Conference (NELIC):  Creative Commons ...
New and Emerging Legal Infrastructures Conference (NELIC): Creative Commons ...
 
HOLLAND=OPEN trade mission visits Creative Commons
HOLLAND=OPEN trade mission visits Creative CommonsHOLLAND=OPEN trade mission visits Creative Commons
HOLLAND=OPEN trade mission visits Creative Commons
 
eval("freedom_stack.push(culture)"); // The Creative Commons Solution?
eval("freedom_stack.push(culture)"); // The Creative Commons Solution?eval("freedom_stack.push(culture)"); // The Creative Commons Solution?
eval("freedom_stack.push(culture)"); // The Creative Commons Solution?
 
Emerging Issues 2010: Whose Big Idea?
Emerging Issues 2010: Whose Big Idea?Emerging Issues 2010: Whose Big Idea?
Emerging Issues 2010: Whose Big Idea?
 

Recently uploaded

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

The Commons - Networked Politics & Technology Seminar

  • 1.
  • 2. Original photo by Brooke Novak · Licensed under CC BY · http://flickr.com/photos/brookenovak/337889974/ I AM NOT A
  • 3. ... and this is a little far afield from a normal CC presentation. The most important (and CC-relevant) takeaway is that building the commons now is critical to the future of techno-politics turning out well ... as opposed to Orwell!
  • 4. “Napster politics are brutally boring” Lucas Gonze
  • 5. So let’s talk about a crusade for the soul of techno-politics, not a battle over bits.
  • 8. Cyber terrorism (Cyber terror war on)
  • 9. Cyber terrorism (Cyber terror war on) Privacy breaches
  • 10. Cyber terrorism (Cyber terror war on) Privacy breaches Loss of Generativity
  • 11. Cyber terrorism (Cyber terror war on) Privacy breaches Loss of Generativity Lock-in
  • 12. Cyber terrorism (Cyber terror war on) Privacy breaches Loss of Generativity Lock-in Surveillance
  • 13. Cyber terrorism (Cyber terror war on) Privacy breaches Loss of Generativity Lock-in Surveillance DRM
  • 14. Cyber terrorism (Cyber terror war on) Privacy breaches Loss of Generativity Lock-in Surveillance DRM Censorship
  • 15. Cyber terrorism (Cyber terror war on) Privacy breaches Loss of Generativity Lock-in Surveillance DRM Censorship Suppression of innovation
  • 16. Cyber terrorism (Cyber terror war on) Privacy breaches Loss of Generativity Lock-in Surveillance DRM Censorship Suppression of innovation Electoral fraud
  • 17.
  • 18.
  • 19. How building the commons (free software, free culture, and friends) helps
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. Photo by RocketRaccoon · Licensed under CC BY · http://flickr.com/photos/rocketraccoon/227241974/
  • 29. Nagging question relevant to the development of techno-politics over last ~10 years: To what extent has the attempt to suppress P2P negatively impacted the development of completely decentralized applications, shaped “Web 2.0”, and added to the network services challenge?
  • 30. Can the success of the (digital) commons alter how we view freedom and power generally?
  • 31.
  • 32.
  • 33.  
  • 34.
  • 35. So Create! (and learn/experience so you can teach/recommend free software and free culture when appropriate)
  • 36.