2001
DOI: 10.1093/combul/43.5.31-b
|View full text |Cite
|
Sign up to set email alerts
|

Review: Peer-to-Peer: Harnessing the Power of Disruptive Technologies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2002
2002
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(20 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…It gains popularity also due to its emphasis on equality. Peer-to-Peer Computing relies on a distributed network architecture to equally distribute tasks to each peer node, with the goal of maximizing the use of network bandwidth, storage space, idle processor cycles, and other resources at the network edge [2]. Peer-to-Peer Computing possesses three important characteristics [3]: service tasks such as calculation and file sharing are performed on the network edge (e.g., via personal computers); network resources including bandwidth, storage, CPUs, and user contents are shared across the entire network; and an overlay network is created among peer nodes.…”
Section: Desktop Computing and Peer-to-peer Computingmentioning
confidence: 99%
See 1 more Smart Citation
“…It gains popularity also due to its emphasis on equality. Peer-to-Peer Computing relies on a distributed network architecture to equally distribute tasks to each peer node, with the goal of maximizing the use of network bandwidth, storage space, idle processor cycles, and other resources at the network edge [2]. Peer-to-Peer Computing possesses three important characteristics [3]: service tasks such as calculation and file sharing are performed on the network edge (e.g., via personal computers); network resources including bandwidth, storage, CPUs, and user contents are shared across the entire network; and an overlay network is created among peer nodes.…”
Section: Desktop Computing and Peer-to-peer Computingmentioning
confidence: 99%
“…Specifically, at the back-end the continuous development of high performance clusters has resulted in the creation of petascale supercomputing centers and cloud computing services [1]; at the front-end the performance of personal computers has been significantly improved with the fast-growing user base, and distributed *Corresponding author: Minghui Xu (mhxu@sdu.edu.cn). peer-to-peer networking [2], [3] for resource sharing among desktop computers has become popular; and at the terminalend sensing devices have become smaller and smaller in size and larger and larger in quantity, facilitated with the advances in communication technologies, gradually establishing the IoT Computing paradigm [4]. The computing power of the highperformance back-end and personal computer front-end has established the digital infrastructure for the cyber world, while IoT terminal equipment is connected to not only the cyber world, but also the physical world to continuously collect real-time data.…”
Section: Introductionmentioning
confidence: 99%
“…For example, aside from relying on the internet, modern credit cards would not be possible without elements, such as chip miniaturization, advances in plastics and fiber science, artificial intelligence programming and purpose built proprietary computational and storage infrastructure (Chan et al, 1999;Davenport et al, 2012;Ngai et al, 2011). Hence, it has been observed that disruptive technology contributes to the creation of new economic sectors and motivates incipient entrepreneurs who replace their predecessors (Oram, 2001;Spulber, 2007). The digital age is replete with examples of such restructuring.…”
Section: Sizzle Without the Steakmentioning
confidence: 99%
“…According to O'Reilly, the open source strategy was developed in response to potential misconceptions provoked by ambiguity between "free as in gratis" versus "free as in freedom," as well as the perception that "free software" is strictly made by and for hackers and thus dif cult for the average user to handle. A marketing campaign built around the new term "open source" sought to position free software as a more attractive idea from a business standpoint (O'Reilly 2001, Stallman 2007b.…”
Section: From Free Software To Free Culturementioning
confidence: 99%
“…the fact that source code in large-scale open source projects is subject to the examination of hundreds of people, all presumably on the lookout for technical  aws (Raymond 2000b). Table 2.1 highlights the key differences between the free software and open source doctrines, based on literature that is representative of each side (Raymond 2000aand 2000b, O'Reilly 2001, Stallman 2007a.…”
Section: From Free Software To Free Culturementioning
confidence: 99%