A complete history and theory of internet daemons brings these little-known—but very consequential—programs into the spotlight. We're used to talking about how tech giants like Google, Facebook, and Amazon rule the internet, but what about daemons? Ubiquitous programs that have colonized the Net's infrastructure—as well as the devices we use to access it—daemons are little known. Fenwick McKelvey weaves together history, theory, and policy to give a full account of where daemons come from and how they influence our lives—including their role in hot-button issues like network neutrality. Going back to Victorian times and the popular thought experiment Maxwell's Demon, McKelvey charts how daemons evolved from concept to reality, eventually blossoming into the pandaemonium of code-based creatures that today orchestrates our internet. Digging into real-life examples like sluggish connection speeds, Comcast's efforts to control peer-to-peer networking, and Pirate Bay's attempts to elude daemonic control (and skirt copyright), McKelvey shows how daemons have been central to the internet, greatly influencing everyday users. Internet Daemons asks important questions about how much control is being handed over to these automated, autonomous programs, and the consequences for transparency and oversight.
Author(s): Fenwick McKelvey
Series: Electronic Mediations 56
Publisher: University of Minnesota Press
Year: 2018
Language: English
Pages: 336
Tags: Internet, Network Neutrality, Piracy, Copyright
Cover......Page 1
Half Title......Page 2
Title......Page 4
Copyright......Page 5
Contents......Page 6
Abbreviations and Technical Terms......Page 8
Introduction......Page 14
1 The Devil We Know: Maxwell’s Demon, Cyborg Sciences, and Flow Control......Page 36
2 Possessing Infrastructure: Nonsynchronous Communication, IMPs, and Optimization......Page 58
3 IMPs, OLIVERs, and Gateways: Internetworking before the Internet......Page 84
4 Pandaemonium: The Internet as Daemons......Page 106
5 Suffering from Buffering? Affects of Flow Control......Page 148
6 The Disoptimized: The Ambiguous Tactics of The Pirate Bay......Page 174
7 A Crescendo of Online Interactive Debugging? Gamers, Publics, and Daemons......Page 198
Conclusion......Page 222
Acknowledgments......Page 242
Appendix: Internet Measurement and Mediators......Page 246
Notes......Page 252
Bibliography......Page 280
A......Page 322
C......Page 323
D......Page 324
F......Page 325
I......Page 326
M......Page 327
O......Page 328
P......Page 329
R......Page 330
S......Page 331
W......Page 332
Z......Page 333