<HTML><BODY style="word-wrap: break-word; -khtml-nbsp-mode: space; -khtml-line-break: after-white-space; "><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;">Hi Trebor,</SPAN></FONT><DIV><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;"><BR class="khtml-block-placeholder"></SPAN></FONT></DIV><DIV><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;">I like that line, as I like my Nietzsche.</SPAN></FONT><DIV><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;"><BR class="khtml-block-placeholder"></SPAN></FONT></DIV><DIV><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;">Yes,</SPAN></FONT></DIV><DIV><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;"><BR class="khtml-block-placeholder"></SPAN></FONT></DIV><BLOCKQUOTE type="cite"><DIV style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;">Cooperation, networking, and participation are key. </SPAN></FONT></DIV></BLOCKQUOTE><DIV><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;"><BR class="khtml-block-placeholder"></SPAN></FONT></DIV><DIV><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;">Therefore, we are in a team here working towards more balance in organic, analog and digital ecologies ( I bluntly state). And in a team there's goalies, defenders, attackers and what have you. I agree you need all the positions and you need to take them all serious, from ludic sousveillanc, to hacking consoles, to rfid performances dressed up in aluminium foil, to design strategies for locative media departments that will spring up (one coming in HKU this year), and grand narrative counter strategies alongside new visions of new territories.</SPAN></FONT></DIV><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;"><BR></SPAN></FONT><DIV><DIV><BLOCKQUOTE type="cite"><DIV style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;">Internet2 is centrally controlled. </SPAN></FONT></DIV></BLOCKQUOTE><DIV><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;"><BR class="khtml-block-placeholder"></SPAN></FONT></DIV><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;">Exactly. I wonder what can one do about it, but experience it? I have no clue as to where the agency for citizens lies in this. As for the universities capacity and ability to rethink its intellectual output to which it holds some quality control - text - so seriously to actually start questioning itself I don't think that will happen and so it will blunder on into new Blackboard adventures and closed environments, only this time in gigabytes.</SPAN></FONT></DIV><DIV><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;"><BR class="khtml-block-placeholder"></SPAN></FONT></DIV><DIV><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;">On Slashdot; from the-never-saw-it-coming-dept:</SPAN></FONT></DIV><DIV><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;"><BR class="khtml-block-placeholder"></SPAN></FONT></DIV><DIV><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;">An anonymous reader writes "We've always know that Trusted Computing is really about DRM, but computer makers always denied it. Now that their Trusted Computing chips are standard on most new PCs, they've decided to come clean. According to Information Week, Lenovo has demonstrated a Thinkpad with </SPAN></FONT><A href="http://www.informationweek.com/blog/main/archives/2006/02/yes_trusted_com.html"><FONT class="Apple-style-span" color="#55341D"><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;">built-in Microsoft and Adobe DRM</SPAN></FONT></FONT></A><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;"> that uses a Trusted Computing chip with a fingerprint sensor. Even worse: 'The system is also aimed at tracking who reads a document and when, because the chip can report back every access attempt. If you access the file, your fingerprint is recorded.'"</SPAN></FONT><DIV style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; font: normal normal normal 16px/normal Times; min-height: 19px; "><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;"><BR style=""></SPAN></FONT></DIV><DIV style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "><A href="http://yro.slashdot.org/article.pl?sid=06/02/19/070202&from=rss"><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;">http://yro.slashdot.org/article.pl?sid=06/02/19/070202&from=rss</SPAN></FONT></A></DIV><DIV style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;"><BR class="khtml-block-placeholder"></SPAN></FONT></DIV><DIV style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;">Which is probably how you are going to acces Internet 2, and which is how off course Internet 2 will access you.</SPAN></FONT></DIV><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;"><BR></SPAN></FONT><BLOCKQUOTE type="cite"></BLOCKQUOTE><BLOCKQUOTE type="cite"><DIV style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;">Which values run our networks?</SPAN></FONT></DIV></BLOCKQUOTE><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;"><BR>yes, indeed the question- and whic h protocols - as you yourself point out, as these values are the key to the protocols, based on patents and copyright notions still favouring a kind of belief in individual genius as we move into a folksonomy,</SPAN></FONT></DIV><DIV><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;"><BR class="khtml-block-placeholder"></SPAN></FONT></DIV><DIV><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;">Greetings, Rob</SPAN></FONT></DIV><DIV><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;"><BR class="khtml-block-placeholder"></SPAN></FONT></DIV><DIV style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; "><FONT class="Apple-style-span" face="Palatino" size="3"><SPAN class="Apple-style-span" style="font-size: 13px;"><BR class="khtml-block-placeholder"></SPAN></FONT></DIV></DIV></DIV></BODY></HTML>