The Digital Big Bang. Phil Quade

Чтение книги онлайн.

Читать онлайн книгу The Digital Big Bang - Phil Quade страница 18

The Digital Big Bang - Phil Quade

Скачать книгу

domain was transformed in several important ways.

      Second, communications were stored for later retrieval by intended recipients or as “on the web” resources for the sender. Some readers may recall that the initial novelty of email was less in the fact that it connected two people living great distances from each other than in the fact that it allowed people to communicate without both having to be “on line” at the same time. The communication would simply wait for the intended recipient to request access to the stored communication—forever, if necessary.

      Finally, the richness of communications steadily increased to the point that a given communication began to represent more than a simple reflection of thoughts or values held outside the domain. The communication, in transit or stored, began to be valuable in its own right, often as a unique representation of thoughts, wealth, and treasure. Financial transfers, cash accounts, corporate secrets, and pictures are now all stored, often with no backup in the physical world, in cyberspace. Gone are the days when colored rectangles of paper, printed stock certificates, and passbooks served as the primary means to represent financial assets (it is likely that the term passbook, in wide use throughout the 1970s, is completely unknown to those born thereafter). Passbooks have been replaced by ones and zeros that are stored, traded, earned, and lost in cyberspace alone.

      The Control Logic Layer

      The control logic layer represents the logic embedded in the billions of devices, computers, and other smart components comprising the physical infrastructure of cyberspace. While the spread and ubiquitous presence of this logic make it impossible to literally observe a physical manifestation of this layer, its effect is no less real and is, more importantly, essential to an understanding of the behaviors of cyberspace's fundamental properties. Indeed, the extraordinary efficiency of cyberspace in routing, storing, correlating, and rerouting increasingly massive and complex flows of information is almost wholly dependent on the delegation of these tasks to the logic embedded in this layer.

      The Device Layer

      The device layer completes the model. This is perhaps the most visible component of cyberspace, since devices connect users to the services available within and from cyberspace. They include personal computing devices, smartphones, desktops, tablets, and navigation units—an ever increasing and diverse mix of hardware, software, and ubiquitous apps. Their role is to capture, present, and manipulate information according to the user's preferences and the designer's specifications. Importantly, the latter of these two influences is not always evident, as these devices capture and transmit information far beyond the communications themselves in order to better enable the routing, storage, and recovery of the data entrusted to them by their owners (for instance, the so-called metadata, which includes routing information and other attributes such as geolocation, the specifications of operating and system software being employed, and so forth).

      THE IMPORTANCE OF THE VERTICAL AND THE VIDEO

      As imperfect as any static representation of cyberspace might be, the model is now complete. The components of the model have been layered in a manner that presents the whole of cyberspace as if captured in a still photograph. But although it is useful to consider any particular layer in isolation in understanding the building blocks of cyberspace, its operations can only be understood by analyzing the interaction of and between the layers as users and processes leverage cyberspace to achieve their end purposes. To wit, whereas it is easy to perceive that cyberspace enables one user to communicate directly with another (an activity that may be perceived to take place horizontally across the people layer of this model), the reality is that users interact with their devices. Those devices connect to one another using communication pathways heavily influenced by controlling logic and so forth, thus effecting a flow of data and actions that is more vertical than it is horizontal—up and down the layered stack. And although it is tempting to consider cyberspace as being principally comprised of the technology components of the stack (the middle three layers), the whole can only be understood by considering these layers and their intimate relationship with the outer two layers: People and geography.

      IMPLICATIONS

      When considered as a whole, the model offers a means to understand properties that derive from the interaction of the constituent pieces. Four key attributes come immediately to the fore:

      More than Technology

      As tempting as it is to think of cyberspace as technology alone, it is impossible to understand, predict, or meaningfully influence its operations without considering the impact of people, geography, and the policies and practices that attend to them.

      Characterized by Convergence

Скачать книгу