SETI@home

back to index

38 results

Peer-to-Peer

by Andy Oram  · 26 Feb 2001  · 673pp  · 164,804 words

choice: after the initial search for material, clients connect to each other and exchange data directly from one system’s disk to the other. SETI@home This project attracted the fascination of millions of people long before the Napster phenomenon, and it brought to public attention the promising technique of distributing

which exploited the enormous amounts of idle time going to waste on PCs, had been used before in projects to crack encryption challenges, but after SETI@home began, a number of companies started up with the goal of making the technique commercially viable. Freenet Several years before the peer-to-peer mania

systems use this trick. Gnutella and Freenet, for example, bypass DNS the old-fashioned way, by relying on numeric IP addresses. United Devices and SETI@home bypass it by giving the nodes scheduled times to contact fixed addresses, at which times they deliver their current IP addresses.) A run of whois

way flow of tasks and compute cycles? Further, many of the key principles of Napster are also at play in distributed computation. Both Napster and SETI@home need to create and manage metadata about a large community of distributed participants. Both need to make it incredibly simple to participate. Finally, both

Napster and SETI@Home have tried to exploit what Clay Shirky (who contributed Chapter 2, to this book) memorably called “the dark matter of the Internet”—the hundreds

some identifier that allows the distributed data elements to be reassembled, and the address of the user who is working on a particular segment. SETI@home tracks user identity as a way of providing a game-like environment in which users and companies compete to contribute the most cycles. Startups aiming

a look at several current systems, giving a sense of what actual peer-to-peer systems look like and how they behave. Chapter 5. SETI@home David Anderson, SETI@home It was January 1986, and I was sitting in a cafe on Berkeley, California’s Telegraph Avenue. Looking up, I recognized a student in

common interests, both within and outside of computer science. This chance meeting led, twelve years later, to a project that may revolutionize computing and science: SETI@home. Gedye and I became running partners. Our long forays into the hills above the Berkeley campus occasioned many far-ranging discussions about the universe and

or even if radio signals are the right thing to look for. The best bet, SETI experts agree, is to try everything. How SETI@home works We decided that SETI@home would use SERENDIP’s antenna. Like all previous radio SETI projects, SERENDIP analyzes its signal using a dedicated supercomputer at the telescope; it

doesn’t record the signal. For SETI@home, we needed to digitally record the signal and transport it to our computers at Berkeley. The network connection from Arecibo to the mainland is too

tremendous load on it. Although we have spread it across two large server machines, it is frequently a performance bottleneck. The most visible component of SETI@home is the client program. For Windows and Macintosh users, this program is a screensaver: it only does its work when the computer isn’t

sky position, but at different times. Man-made interference changes from one month to the next, but (hopefully) alien signals will remain unchanged. So SETI@home’s detection of an extraterrestrial signal, if it happens, will show up first on a computer screen at Berkeley, sometime towards the end of the

teams, ordered by number of work units completed. These pages are generated by programs that obtain the latest information from the database. Trials and tribulations SETI@home has faced many difficulties and challenges. Server performance, for example, has been a major problem. As more and more people downloaded and ran the client

many areas (for example, there is no customer support), and some tasks have fallen far behind schedule. Another problem area involved processor-specific optimizations. The SETI@home client is written in C++, and we compile it using standard compilers such as Microsoft VC++ and Gnu’s gcc. Performance-conscious users disassembled the

to maintain lots of processor-specific versions of the code. However, several people figured out how to replace the FFT routine at the heart of SETI@home with a faster routine. Some of them did this incorrectly, producing clients that returned incorrect results. Doctored versions of the program were just one

more secure version of the client, which uses cryptographic checksumming to detect tampering with result files and with the program itself. Some people feel that SETI@home should be an “open source” project, that we should distribute the source code and solicit the help of volunteer programmers to fix bugs and

floating-point operations. We believe that this is the largest computation ever performed. And in terms of the potential of the Internet for scientific computing, SETI@home is the tip of the iceberg. There are projected to be one billion Internet-connected computers by 2003. If 10% of them participate in

distributed computing projects, there will be enough computing power for 100 projects the size of SETI@home. To what range of problems is this power applicable? Certainly not all problems. It must be possible to factor the problem into a large

research to the public and argue the merit of the research. This, I believe, is a worthwhile goal and will be a significant accomplishment for SETI@home even if no extraterrestrial signal is found. Chapter 6. Jabber: Conversational Technologies Jeremie Miller, Jabber Conversations are an important part of our daily lives.

mediated by a central server, although peers may later act on information received from the central server to contact one another directly. Napster and SETI@home fall into this category. A hierarchical peer-to-peer system devolves some or all of the coordination responsibility down from the center to a tree

. The Cypherpunks (Type I) and Mixmaster (Type II) remailers for anonymous email are run and maintained for free from around the globe. Processing for SETI@home and Distributed.net is also performed without compensation, other than the possibility of fame for finding an alien signature or cracking a key. Unfortunately, not

, we expect that a large amount of resources in peer-to-peer systems will be donated by users: people donate otherwise unused CPU cycles to SETI@home calculations, unused bandwidth to forward Mixmaster anonymous email, and unused storage for Free Haven data shares. For these situations, the sole role of micropayments

’98, pp. 236-250. [84] Colin Boyd and Chris Pavlovski (2000), “Attacking and Repairing Batch Verification Schemes,” ASIACRYPT 2000. [85] David Molnar (September 2000), “The SETI@home Problem,” ACM Crossroads, http://www.acm.org/crossroads/columns/onpatrol/september2000.html. [86] D. Chaum, “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms,” op. cit

dHTTP (Distributed HTTP) Endeavors Technology, Inc. Jini Distributed Computation 2AM Applied MetaComputing Centrata Datasynapse Distributed.net DistributedScience Entropia Parabon Computation Popular Power Porivo Technologies, Inc. SETI@home: The Search for Extraterrestrial Intelligence Ubero United Devices, Inc.: Individuals Accelerating Science Distributed Search Engines gonesilent.com (aka InfraSearch) OpenCOLA Plebio WebV2 File Sharing CuteMX

Gnutella’s first breath amortized pairwise payment model, The difficulty of distributed systems: How to exchange micropayments among peers Anderson, David, Contents of this book, SETI@home–The peer-to-peer paradigm, Contributors Anderson, Ross, Document revocation , The Eternity Service anonymity analysis of, An analysis of anonymity–An analysis of anonymity attacks

Haven, Elements of the system, Communications channel, Micropayments in the Free Haven context computational anonymity, An analysis of anonymity–An analysis of anonymity computations, SETI@home, How SETI@home works confidence values of Free Haven servers, Reputation systems for scores, Personalizing reputation searches congestion management micropayments and, General considerations in an economic analysis of

story: From free software to open source distributed computation, Maximizing use of far-flung resources: Distributed computation managing metadata and, Strategic positioning and core competencies SETI@home and, SETI@home–The peer-to-peer paradigm distributed denial of service (DDoS) attacks parallel solutions overwhelmed by, Nonparallelizable work functions resource allocation and, Conclusion using Publius

Gnutella network, Ethernet EUROCRYPT conference, Anonymous macropayment digital cash schemes Evans, Philip, Long-term vision expiration dates of shares (Free Haven), Share expiration extraterrestrial signals (SETI@home), SETI@home, How SETI@home works F fanout, message, Message fanout–Message fanout Fast Fourier Transform (FFT) algorithm, Radio SETI fault tolerance, Performance simulating in Freenet, Simulating fault tolerance

analysis of micropayment design flat-fee methods vs. pay-per-use methods, General considerations in an economic analysis of micropayment design floating-point operations and SETI@home, The world’s most powerful computer flooding attacks, Attacks on documents or the servnet common methods for dealing with, Common methods for dealing with flooding

revisionist history of, A revisionist history of peer-to-peer (1969-1995)–DNS scalability and, Performance security provided by Groove, Security–Taxonomy of Groove keys SETI@home and, The peer-to-peer paradigm social and technical solutions to problems, Technical solutions: Return to the old Internet social impact of, Some context and

censor retrieving a, Retrieve operation–Retrieve operation tamper-check mechanism, Publius and other systems in this book, Retrieve operation updating, Update operation pulses (signals), How SETI@home works PUSH REQUEST packet type, Reducing broadcasts makes a significant impact puzzles client (see client puzzles) time-lock (see time-lock puzzles) PWS (Personal Web

systems based on IP addresses, Quota systems R Rabin, Michael O., Publication Rabin, Tal, Other considerations from the case study radio frequency interference (RFI), How SETI@home works radio SETI, Radio SETI random graphs, The small-world model ratings collecting, Collecting ratings of eBay trades, Reputations worth real money: eBay fairness of

revocation keys (web of trust), Codifying reputation on a wide scale: The PGP web of trust Rewebber.de, Anonymizing proxies RFI (radio frequency interference), How SETI@home works Rich Site Summary (RSS) and content syndication, Web services and content syndication Rifkin, Adam, Codifying reputation on a wide scale: The PGP web of

servers) servnet, Free Haven (see Free Haven, servnet) SETI@home, Some context and a definition, Maximizing use of far-flung resources: Distributed computation, SETI@home–The peer-to-peer paradigm client program of, How SETI@home works computations, How SETI@home works data distribution server, How SETI@home works detecting signals, How SETI@home works difficulties and challenges, Trials and tribulations drift

rates and, How SETI@home works floating-point operations and, The world’s most

powerful computer how it began, SETI@home–Radio SETI how it works, How SETI@home works–How SETI@home works peer-to

to avoid, Collecting ratings Shirky, Clay, Contents of this book, Listening to Napster–New winners and losers, Contributors Shostack, Adam, Communications channel signals, detecting (SETI@home), How SETI@home works Signature Verification Keys (SVKs), Signature Verification Keys (SVKs) signature/verification key pairs, Anatomy of a mutually-trusting shared space, Taxonomy of Groove keys signatures

Return to the old Internet Sokol-Margolis, Joseph, Acknowledgments spam (see junk mail) spent-coin database, Varieties of micropayments or digital cash spikes (signals), How SETI@home works SSL (Secure Sockets Layer) encrypting traffic between Publius client/server, SSL hub/client relationship in Red Rover, Putting low-tech “weaknesses” into perspective protecting

nonfungible micropayments, Moderating security levels: An accountability slider subscribers (Red Rover), The subscribers risks involved in becoming, Putting low-tech “weaknesses” into perspective Sullivan, Woody, SETI@home Sun Microsystems and revocation of browser certificates, Codifying reputation on a wide scale: The PGP web of trust super peers Gnutella and, File sharing: Napster

theory Freenet case study, Case study 1: Freenet transmission loss over TCP (Gnutella), Lossy transmission over reliable TCP Trellix, The writable Web triplets (signals), How SETI@home works true names vs. pseudonyms, Reliability with anonymity trust, Trust–Conclusions bottlenecks, A reputation system that resists pseudospoofing: Advogato in the physical world, Trust in

Peer-to-peer is a horseless carriage filling shared databases, Ways to fill shared databases–Napster: Harnessing the power of personal selfishness intense interest in SETI@home, Human factors maximizing contributions from, The Cornucopia of the Commons–The commons preferring HTML over CD-ROMs, Users reward simplicity refusing to accept per-unit

web site for Publius, Publius in a nutshell Website web server, The writable Web Werbach, Kevin, Napster: Harnessing the power of personal selfishness Werthimer, Dan, SETI@home Whitten, Alma, Future work Wiki, The writable Web Wiley, Brandon, Contents of this book, Interoperability Through Gateways–Acknowledgments, Contributors Winamp, Gnutella’s first breath Winer

Smart Mobs: The Next Social Revolution

by Howard Rheingold  · 24 Dec 2011

were banding together. When nobody was using them, the PCs were swarming with other computers around the world in an amateur cooperative venture known as SETI@home—a collective supercomputer spread all over the Net. “What are they computing?” I asked. They’re searching for extraterrestrial communications,” he replied. He wasn’t

into the power to analyze, simulate, calculate, search, sift, recognize, render, predict, communicate, and control. By the spring of 2000, millions of people participating in SETI@home were contributing their PCs’ processors to crunch radio astronomy data.1 They did it voluntarily, because finding life in outer space would be “way, way

pulls down about 50 billion bytes of data per day, far more than SETI’s servers can analyze. That’s where community computing comes in. SETI@home participants install client software (a program they download from the Net and run on their home computer; the client communicates automatically with the central “server

radio telescope signals and processes it, looking for interesting patterns consistent with intelligent life. When the task is complete, the program uploads the results to SETI@home headquarters and collects a new chunk of digitized space signal to search. When the computer’s user logs into the machine, the

SETI@home client goes dormant, awakening again when the human user pauses for more than a few minutes. It was a sunny day, so Anderson and I

of a long-distance runner, takes his time thinking about a response and then tends to speak in perfectly formed paragraphs. I asked him how SETI@home started. “In 1995,” Anderson recalled, “I was contacted by a former Berkeley grad student named David Gedye. Inspired by documentaries about the Apollo moon landing

a similar impact and hit upon the idea of harnessing the public’s fascination with both the Internet and the SETI program.” In mid-1999, SETI@home clients were made available online for free downloading. “It’s been a wild ride since then,” says Anderson. “We were hoping for at least 100

week, we had 200,000 participants, after four or five months it broke through a million, and now it’s past 2 million.”4 Although SETI@home put distributed computing on the map, it wasn’t the first such attempt to link computers into a cooperating network. In the early 1980s, I

promising pharmaceuticals has been prohibitively slow. A variety of voluntary and for-profit distributed computation enterprises are addressing the computational needs of “rational drug design.” SETI@home instigator David Anderson became Chief Technology Officer of a for-profit enterprise, United Devices, which offers incentives such as frequent flier miles and sweepstakes prizes

much, but it hooked me into the bidding patterns of people who bid on vintage railroad stuff, which I found quite charming and beautiful. Like SETI@home, OpenCOLA requires a population of volunteers. While you put documents in a folder on your computer, waiting for similar documents to appear, others must do

cooperation for the fun of it finds its own channels. After the dotcom and telecom bubbles burst, the emergence of new voluntary community resources, from SETI@home to blogging, made it clear again that the big IPO is not the only reason people decide to work together. Is the kind of return

, “My Date with the Gnomes of San Jose,” Mindjack, 15 October 2000.http://www.mindjack.com/feature/p2p.html. (25 January 2002). 1. Charlene Anderson, “SETI@home and the Planetary Society: A Reminiscence and a Hope for the Future,” May 2000, <http://www.planetary.org/UPDATES/seti

/seti@home_and_planetary_society.html > (20 January 2002). See also: Roving Mouse, “SETI@home Stats,” <http://www.roving-mouse.com/setiath-ome/> (25 January 2002). 2. Robert Wright, Nonzero: The Logic of Human Destiny

, the Environment, and Homeland Defense" conference "Servant" software Servers and CoolTown defined and Napster and p2p networking and SETI SETI (Search for Extraterrestrial Intelligence) project SETI@home SFLan Shardanand, Upendra Sharing: files food forestry resources knowledge public goods Shibuya Crossing (Tokyo) and distributed computing and mesh networks Shipley, Peter Shoch, John F

The Future of Ideas: The Fate of the Commons in a Connected World

by Lawrence Lessig  · 14 Jul 2001  · 494pp  · 142,285 words

computer along with a program to be run; that program would run on the data and send it back to the mother ship. When the SETI@home project first began, within ten days it had 350,000 participants in 203 countries. In four months, it broke a million users. The service grew

the equivalent of 280,000 years of processing time devoted to the SETI mission.29 Just as Napster had latched on to unused disk space, SETI@home had latched on to unused computer cycles living at the edge of the Net. Idle machines could be turned to large-scale cooperative projects. OTHERS

, and other factors). 28 For background on SETI, see “History of SETI,” at http://www.seti-inst.edu/ general/history.html; Eric Korpela et al., “SETI@home: Massively Distributed Computing for SETI,” at http://www.computer.org/cise/articles/seti.htm. 29 Howard Rheingold, “You Got the Power,” Wired (August 2001), at

The Wealth of Networks: How Social Production Transforms Markets and Freedom

by Yochai Benkler  · 14 May 2006  · 678pp  · 216,204 words

and give it away for free? Why do 4.5 million volunteers contribute their leftover computer cycles to create the most powerful supercomputer on Earth, SETI@Home? Without a broadly accepted analytic model to explain these phenomena, we tend to treat them as curiosities, perhaps transient fads, possibly of significance in one

. They produce economic, not public, goods--computation, storage, and communications capacity. 168 As of the middle of 2004, the fastest supercomputer in the world was SETI@home. It ran about 75 percent faster than the supercomputer that [pg 82] was then formally known as "the fastest supercomputer in the world": the IBM

Blue Gene/L. And yet, there was and is no single SETI@home computer. Instead, the SETI@home project has developed software and a collaboration platform that have enabled millions of participants to pool their computation resources into a single powerful computer

project must download a small screen saver. When a user's personal computer is idle, the screen saver starts up, downloads problems for calculation--in SETI@home, these are radio astronomy signals to be analyzed for regularities--and calculates the problem it has downloaded. Once the program calculates a solution, it automatically

the fastest supercomputers in the world that private firms, using full-time engineers, developed for the largest and best-funded government laboratories in the world. SETI@home is the most prominent, but is only one among dozens of similarly structured Internet-based distributed computing platforms. Another, whose structure has been the subject

, is Folding@home. As of mid-2004, Folding@home had amassed contributions of about 840,000 processors contributed by more than 365,000 users. 169 SETI@home and Folding@home provide a good basis for describing the fairly common characteristics of Internet-based distributed computation projects. First, these are noncommercial projects, engaged

in pursuits understood as scientific, for the general good, seeking to harness contributions of individuals who wish to contribute to such larger-than-themselves goals. SETI@home helps in the search for extraterrestrial intelligence. Folding@home helps in protein folding research. Fightaids@home is dedicated to running models that screen compounds for

a few of these is the ability to create "teams" of users, who in turn compete on who has provided more cycles or work units. SETI@home in particular taps into ready-made nationalisms, by offering country-level statistics. Some of the team names on Folding@home also suggest other, out-of

chapter 3) and rendering them in small segments with a simple marking tool is a way of modularizing the task of mapping craters. In the SETI@home project (see chapter 3), the task of scanning radio astronomy signals is broken down into millions of little computations as a way of modularizing the

other. 203 The characteristics of planned modularization of a problem are highly visible and explicit in some peer-production projects--the distributed computing projects like SETI@home are particularly good examples of this. However, if we were to step back and look at the entire phenomenon of Web-based publication from a

like surviving medieval Spanish irrigation regions or the shores of Maine's lobster fishing grounds, or even to the ubiquitous phenomenon of the household. As SETI@home and Slashdot suggest, it is not necessarily limited to stable communities of individuals who interact often and know each other, or who expect to continue

of the day, prove true. However, this was also thought of complex software projects or of supercomputing, until free software and distributed computing projects like SETI@Home and Folding@Home came along and proved them wrong. The basic point is to see how distributed nonmarket efforts are organized, and to see how

to help them decipher messages of senders, without anyone having exclusive use of the spectrum. Just as PCs can cooperate to create a supercomputer in SETI@Home by sharing their computation, and a global-scale, peer-to-peer data-storage and retrieval system by sharing their hard drives, computationally intensive radios can

and final economic observation describes and analyzes the rise of peer production. This cluster of phenomena, from free and open-source software to Wikipedia and SETI@Home, presents a stark challenge to conventional thinking about the economics of information production. Indeed, it challenges the economic understanding of the relative roles of marketbased

flow with, 281-284, 296, 298, 355-358, 702 influence exaction, 296, 298-300 Rubin, Aviel, 408 S SBG (Sinclair Broadcast Group), 360, 396-402 SETI@home project, 168-170 Sabel, Charles, 123, 218, 266 Saltzer, Jerome, 705 Sampling, digital (music), 777 Samuelson, Pamela, 63, 730 Sarnoff, David, 351 Scholarly Lawyers model

The Art of Scalability: Scalable Web Architecture, Processes, and Organizations for the Modern Enterprise

by Martin L. Abbott and Michael T. Fisher  · 1 Dec 2009

offices where personal computers are used after hours for parallel computing. One of the most well known public network examples of grid computing is the SETI@home project. This project uses computers connected to the Internet in the Search for Extraterrestrial Intelligence (SETI). Individuals can participate by running a program on their

. For grids that are utilizing surplus capacity, this approach is known as CPU scavenging. One of the most well-known grid scavenging programs has been SETI@home that utilizes unused CPU cycles on volunteers’ computers in a search for extraterrestrial intelligence in radio telescope data. There are obviously drawbacks of utilizing spare

other advantage in terms of cost can come from scavenging spare cycles on desktops or other servers, as described in the previous paragraph referencing the SETI@home program. Pros of Grid Computing We have identified three major benefits of grid computing. These are listed in no particular order and are not all

networks, 429 Grid computing, uses for back office grid, 464 build grid, 462–463 data warehouse grid, 463–464 MapReduce, 464 production grid, 461–462 SETI@home project, 429 Grids, cons complexity, 459–460 monolithic applications, 459 not shared simultaneously, 459 summary of, 460 Grids, pros cost, 457–458 high computational rates

environments, saving, 403–404 Session storage avoiding, 403–404, 405 centralizing, 404, 405 decentralizing, 404, 405 Set method, 382 SETI (Search for Extraterrestrial Intelligence), 429 SETI@home project, 429 Sharding, definition, 311 Shards, definition, 311 Shared infrastructure, grid benefit, 457 Shareholder test, 24 Shareholder value, dilution by data cost, 415 Shareholder values

Hadoop: The Definitive Guide

by Tom White  · 29 May 2009  · 933pp  · 205,691 words

16. Volunteer Computing When people first hear about Hadoop and MapReduce, they often ask, “How is it different from SETI@home?” SETI, the Search for Extra-Terrestrial Intelligence, runs a project called SETI@home in which volunteers donate CPU time from their otherwise idle computers to analyze radio telescope data for signs of intelligent

life outside earth. SETI@home is the most well-known of many volunteer computing projects; others include the Great Internet Mersenne Prime Search (to search for large prime numbers) and

problem they are trying to solve into chunks called work units, which are sent to computers around the world to be analyzed. For example, a SETI@home work unit is about 0.35 MB of radio telescope data, and takes hours or days to analyze on a typical home computer. When the

precaution to combat cheating, each work unit is sent to three different machines and needs at least two results to agree to be accepted. Although SETI@home may be superficially similar to MapReduce (breaking a problem into independent pieces to be worked on in parallel), there are some significant differences. The

SETI@home problem is very CPU-intensive, which makes it suitable for running on hundreds of thousands of computers across the world,[9] since the time to

run jobs that last minutes or hours on trusted, dedicated hardware running in a single data center with very high aggregate bandwidth interconnects. By contrast, SETI@home runs a perpetual computation on untrusted machines on the Internet with highly variable connection speeds and no data locality. * * * [6] In January 2007, David J

://mahout.apache.org/) is a project to build machine learning libraries (such as classification and clustering algorithms) that run on Hadoop. [9] In January 2008, SETI@home was reported at http://www.planetary.org/programs/projects/setiathome/setiathome_20080115.html to be processing 300 gigabytes a day, using 320,000 computers (most

of which are not dedicated to SETI@home; they are used for other things, too). A Brief History of Hadoop Hadoop was created by Doug Cutting, the creator of Apache Lucene, the widely

Blockchain: Blueprint for a New Economy

by Melanie Swan  · 22 Jan 2014  · 271pp  · 52,814 words

for safely sharing unused hard disk space have been developed by other community computing models like Folding@Home and BOINC, whose software is used by SETI@Home. Of course, as with any distributed project that involves opening your computer to others’ use, caveat emptor applies, and participants in Storj or any similar

to peer-to-peer distributed computing projects for which individual volunteers provide unused computing cycles to Internet-based distributed computing projects. Two notable projects are SETI@home (the Search for Extraterrestrial Intelligence, which uses contributed computing cycles to help analyze radio signals from space, searching for signs of extraterrestrial intelligence), and Folding

computational drug design and other molecular dynamics problems). Per blockchain technology, remunerative coin has been set up to reward participants in both the SETI@home and Folding@home projects. For SETI@home, there is Gridcoin, which is the remunerative coin available to all BOINC (Berkeley Open Infrastructure for Network Computing) projects, the infrastructure upon

which SETI@home runs. For Folding@home, there is FoldingCoin, a Counterparty token that runs and is exchangeable to the more liquid XCP cryptocurrency (and therefore out to

maintain the blockchain, and 3.0 innovations could be expected. One response is cryptocurrencies that are apparently more energy efficient, such as Mintcoin. Community Supercomputing SETI@home and Folding@home are community supercomputing projects in the sense that a community of individual volunteers contributes the raw resource of computing cycles; they are

Challenges self-bootstrapped organizations, DASs and Self-Bootstrapped Organizations self-directing assets, Automatic Markets and Tradenets self-enforced code, Smart Property self-sufficiency, Smart Contracts SETI@home, Blockchain Science: Gridcoin, Foldingcoin, Community Supercomputing size and bandwidth, Technical Challenges smart contracts, Smart Contracts-Smart Contracts, Smart Contract Advocates on Behalf of Digital Intelligence

Hacking Capitalism

by Söderberg, Johan; Söderberg, Johan;

for variable capital (i.e. living labour), but also to cheapen constant capital (infrastructure, machineries etc.). That could be the deeper implication of the SETI@home project. SETI@home is a favourite example in hacker literature, mingling high technology with fascination for science fiction. SETI stands for: Search for Extraterrestrial Intelligence. SETI searches for

personal computers. For a succession of years the project has out-performed state-of-the-art supercomputers at a fraction of the cost.21 The SETI@home project is not as dramatic as the controversies surrounding filesharing networks, nor does it have the zeal of grassroots journalism. Nonetheless, peer-to-peer computing

, 2006). 20. Eben Moglen, “Anarchism Triumphant, Free Software and the Death of Copyright”, First Monday, vol.4, no.8 (August 1999). 21. See David Anderson, “SETI@home” in Andy Oram, Peer-to-Peer—Harnessing the Benefits of a Disruptive Technology, (Sebastopol: O’Reilly, 2001), 2001. 22. Mark Poster, What’s the Matter

23, 10, 154, 160–163, 184 Schumpeterian competition state 143 Schumpeter, Joseph 30 SCO/Caldera 43–44, 87 Self-administrated poverty 172 Sennett, Richard 45 SETI@home 127 Sham property 141 Shiva, Vandana 209 n.45 Shrinkwrap license 21 Shy, Oz 122, 143–144 Silicon Valley 44, 180 Simputer 210 n.54

The Future of the Internet: And How to Stop It

by Jonathan Zittrain  · 27 May 2009  · 629pp  · 142,393 words

or barter computing cycles or bandwidth for causes they care about by simply installing a small piece of software.58 This could be something like SETI@home, through which astronomers can distribute voluminous data from radio telescopes to individual PCs,59 which then look for patterns that might indicate the presence of

: “Donate the time your computer is turned on, but is idle, to projects that benefit humanity!” Id. 59. See SETI@home, http://setiathome.berkeley.edu (last visited Dec. 1, 2007); see also Wikipedia, SETI@home, http://en.wikipedia.org/wiki/Seti_at_home (as of May 12, 2007, 02:06 GMT). 60. BitTorrent allows

visited June 1, 2007); Rosetta@home, What is Rosetta@home?, http://boinc.bakerlab.org/rosetta/rah_about.php (last visited June 1, 2007); SETI@home, The Science of SETI@home, http://setiathome.berkeley.edu/sah_about.php (last visited June 1, 2007); World Community Grid, About Us, http://www.worldcommunitygrid.org/about_us/viewAboutUs

semiotic democracy, 147 Sender ID, 193–94 sensors: cheap, 206, 208–9, 210, 221; ubiquitous, 212–13 September 11 attacks and PATRIOT Act, 186–87 SETI@home, 90 ShotSpotter, 314n43 signal neutrality, 182 Simpson, Jessica, 53 Skype, 56–57, 58, 59, 60, 102, 113, 178, 180, 182 Slashdot, 217 smoking bans, 118

As the Future Catches You: How Genomics & Other Forces Are Changing Your Work, Health & Wealth

by Juan Enriquez  · 15 Feb 2001  · 239pp  · 45,926 words

MICROSYSTEMS Hewlett-Packard. Those who founded Search for Extraterrestrial Intelligence (SETI) hoped 100,000 global citizens would sign up … More than two million did. And SETI@home is now the world’s largest community computer project … With 280,000 years of processing time available … And a network that grows every week.10

Accelerando

by Stross, Charles  · 22 Jan 2005  · 489pp  · 148,885 words

Peers, Pirates, and Persuasion: Rhetoric in the Peer-To-Peer Debates

by John Logie  · 29 Dec 2006  · 173pp  · 14,313 words

Statistics hacks

by Bruce Frey  · 9 May 2006  · 755pp  · 121,290 words

Remix: Making Art and Commerce Thrive in the Hybrid Economy

by Lawrence Lessig  · 2 Jan 2009

Space Chronicles: Facing the Ultimate Frontier

by Neil Degrasse Tyson and Avis Lang  · 27 Feb 2012  · 476pp  · 118,381 words

What's Mine Is Yours: How Collaborative Consumption Is Changing the Way We Live

by Rachel Botsman and Roo Rogers  · 2 Jan 2010  · 411pp  · 80,925 words

The Human Age: The World Shaped by Us

by Diane Ackerman  · 9 Sep 2014  · 380pp  · 104,841 words

C++ Concurrency in Action: Practical Multithreading

by Anthony Williams  · 1 Jan 2009  · 818pp  · 153,952 words

The Secret War Between Downloading and Uploading: Tales of the Computer as Culture Machine

by Peter Lunenfeld  · 31 Mar 2011  · 239pp  · 56,531 words

The Pirate's Dilemma: How Youth Culture Is Reinventing Capitalism

by Matt Mason

Is the Internet Changing the Way You Think?: The Net's Impact on Our Minds and Future

by John Brockman  · 18 Jan 2011  · 379pp  · 109,612 words

WTF?: What's the Future and Why It's Up to Us

by Tim O'Reilly  · 9 Oct 2017  · 561pp  · 157,589 words

Protocol: how control exists after decentralization

by Alexander R. Galloway  · 1 Apr 2004  · 287pp  · 86,919 words

Ours to Hack and to Own: The Rise of Platform Cooperativism, a New Vision for the Future of Work and a Fairer Internet

by Trebor Scholz and Nathan Schneider  · 14 Aug 2017  · 237pp  · 67,154 words

Ways of Being: Beyond Human Intelligence

by James Bridle  · 6 Apr 2022  · 502pp  · 132,062 words

The Metaverse: And How It Will Revolutionize Everything

by Matthew Ball  · 18 Jul 2022  · 412pp  · 116,685 words

Turing's Cathedral

by George Dyson  · 6 Mar 2012

Utopia Is Creepy: And Other Provocations

by Nicholas Carr  · 5 Sep 2016  · 391pp  · 105,382 words

Reality Is Broken: Why Games Make Us Better and How They Can Change the World

by Jane McGonigal  · 20 Jan 2011  · 470pp  · 128,328 words

Beautiful security

by Andy Oram and John Viega  · 15 Dec 2009  · 302pp  · 82,233 words

Alex's Adventures in Numberland

by Alex Bellos  · 3 Apr 2011  · 437pp  · 132,041 words

Whiplash: How to Survive Our Faster Future

by Joi Ito and Jeff Howe  · 6 Dec 2016  · 254pp  · 76,064 words

Bitcoin for the Befuddled

by Conrad Barski  · 13 Nov 2014  · 273pp  · 72,024 words

Designing Social Interfaces

by Christian Crumlish and Erin Malone  · 30 Sep 2009  · 518pp  · 49,555 words

Hacker, Hoaxer, Whistleblower, Spy: The Story of Anonymous

by Gabriella Coleman  · 4 Nov 2014  · 457pp  · 126,996 words

The Mysterious Mr. Nakamoto: A Fifteen-Year Quest to Unmask the Secret Genius Behind Crypto

by Benjamin Wallace  · 18 Mar 2025  · 431pp  · 116,274 words

Multitool Linux: Practical Uses for Open Source Software

by Michael Schwarz, Jeremy Anderson and Peter Curtis  · 7 May 2002

The Big Nine: How the Tech Titans and Their Thinking Machines Could Warp Humanity

by Amy Webb  · 5 Mar 2019  · 340pp  · 97,723 words