Blown To Bits

Excerpts from Chapter 1: Digital Explosion: Why Is It Happening, and What Is at Stake?

According cialis without rx to the CDC, a person with FASD may experience difficulty viagra prices controlling their anger and frustration, which can lead to violent cialis india and explosive behavior. The Bone Health and Osteoporosis Foundation (BHOF) information no asacol prescription buy cheap highlights the importance of exercises that strengthen the supporting muscles buy atarax on line of the spine. According to the World Health Organization (WHO), buy viagra CBD is generally safe, does not appear to have the gentamicin eye drops online stores potential for misuse, and may have therapeutic benefits. However, those purchase cialis overnight delivery who provide custodial care are not technically trained doctors or no rx levitra medical professionals. Incorporating foods rich in probiotics, such as yogurt buy bentyl low cheap price and fermented foods, can help support gut health, contributing to discount amoxicillin side effects usa a strong immune system. Dosage for TSH suppressionDoctors may prescribe zoloft cheapest price Unithroid to suppress thyroid-stimulating hormone (TSH) in certain types of viagra in australia thyroid cancer. While holding on to the sides of the chair,.

The Explosion of Bits, and Everything Else … The Koans of Bits … Good and Ill, Promise and Peril

The world changed very suddenly. Almost everything is stored in a computer somewhere. Court records, grocery purchases, precious family photos, pointless radio programs…. Computers contain a lot of stuff that isn’t useful today but somebody thinks might someday come in handy. It is all being reduced to zeroes and ones‚ ”bits.” The bits are stashed on disks of home computers and in the data centers of big corporations and government agencies. The disks can hold so many bits that there is no need to pick and choose what gets remembered. …

Your computer successfully creates the illusion that it contains photographs, letters, songs, and movies. All it really contains is bits, lots of them, patterned in ways you can’t see.… Naral Pro-Choice America … wanted to form a text messaging group to send alerts to its members. Verizon decided not to allow it, citing the “controversial or unsavory” things the messages might contain.

… Had Naral simply wanted telephone service or an 800 number, Verizon would have had no choice. Telephone companies were long ago declared “common carriers.” Like railroads, phone companies are legally prohibited from picking and choosing customers from among those who want their services. In the bits world, there is no difference between a text message and a wireless phone call. It’s all just bits, traveling through the air by radio waves. But the law hasn’t caught up to the technology. It doesn’t treat all bits the same, and the common carriage rules for voice bits don’t apply to text message bits. …

In 2006, a 13-year-old girl, Megan Meier of Dardenne Prairie, Missouri, made friends online with a 16-year-old boy named “Josh.” When “Josh” turned against her, writing “You are a bad person and everybody hates you…. The world would be a better place without you,” Megan committed suicide. … Along with its dazzling riches and vast horizons, the Internet has created new manifestations of human evil‚ some of which, including the cyber-harassment Megan Meier suffered, may not be criminal under existing law. In a nation deeply committed to free expression as a legal right, which Internet evils should be crimes, and which are just wrong? …

The information story is full of examples of unperceived changes followed by dislocating explosions. … In early 1997, Kodak stock hit a record price…, “fueled by healthy film and paper sales” …. But by 2007, … cameras had become little computers. The company that was once synonymous with photography was a shadow of its former self. …

The massive databases challenge our expectations about what will happen to the data about us. Take something as simple as a stay in a hotel. …. Because the keycards can be deactivated instantly, there is no longer any great risk associated with losing your key…. On the other hand, the hotel now has a record, accurate to the second, of every time you entered your room, used the gym or the business center, … every cocktail and steak you charged to the room, which other rooms you phoned and when, and the brands of tampons and laxatives you charged at the hotel’s gift shop. This data might be merged with billions like it, analyzed, and transferred to the parent company, which owns restaurants and fitness centers as well as hotels. It might also be lost, or stolen, or subpoenaed in a court case.