Aaron, Craig. “A Scary Picture for the Future of the Wireless Web.” The Huffington Post. December 15, 2010. http://www.huffingtonpost.com/craig-aaron/a-scary-picture-for-the-f_b_796990.html.
Abbate, Janet. Inventing the Internet. Cambridge, Mass.: MIT Press, 1999.
Abbate, Janet. “Privatizing the Internet: Competing Visions and Chaotic Events, 1987–1995.” IEEE Annals of the History of Computing 32, no. 1 (2010): 10–22.
Abbate, Janet. Recoding Gender: Women’s Changing Participation in Computing. Cambridge, Mass.: MIT Press, 2012.
Abbott, Andrew. Time Matters: On Theory and Method. Chicago: University of Chicago Press, 2001.
Acland, Charles R. Swift Viewing: The Popular Life of Subliminal Influence. Durham, N.C.: Duke University Press, 2012.
Acland, Charles R. “Harold Innis, Cultural Policy, and Residual Media.” International Journal of Cultural Policy 12, no. 2 (2006): 171–85.
Adam, Barbara. “Time.” Theory, Culture & Society 23, no. 2–3 (2006): 119–26.
Adam, Barbara. Time and Social Theory. Cambridge, UK: Polity Press, 1990.
Akamai Technologies. “Akamai and JupiterResearch Identify ‘4 Seconds’ as the New Threshold of Acceptability for Retail Web Page Response Times.” Akamai, November 6, 2006. http://www.akamai.com/html/about/press/releases/2006/press_110606.html.
Alexander, Neta. “Rage against the Machine: Buffering, Noise, and Perpetual Anxiety in the Age of Connected Viewing.” Cinema Journal 56, no. 2 (2017): 1–24. DOI: 10.1353/cj.2017.0000.
Allot Communications. “VideoClass.” http://www.allotworks.com/datasheets/DS_VideoClass_rev2.1_A4_12-2013.pdf.
Allot Communications. “Allot Smart Pipe Management.” YouTube video, 1:01. June 29, 2011. https://www.youtube.com/watch?v=PpqdSnH8Tqg.
Amoore, Louise. The Politics of Possibility: Risk and Security beyond Probability. Durham, N.C.: Duke University Press, 2013.
Ananny, Mike, and Kate Crawford. “A Liminal Press: Situating News App Designers within a Field of Networked News Production.” Digital Journalism 3, no. 2 (March 4, 2015): 192–208. DOI: 10.1080/21670811.2014.922322.
Ananny, Mike, and Kate Crawford. “Seeing without Knowing: Limitations of the Transparency Ideal and Its Application to Algorithmic Accountability.” New Media & Society, December 13, 2016. DOI: 10.1177/1461444816676645.
Anderson, Benedict. Imagined Communities: Reflections on the Origin and Spread of Nationalism. New York: Verso, 1991.
Anderson, C. W. “Towards a Sociology of Computational and Algorithmic Journalism.” New Media & Society 15, no. 7 (November 1, 2013): 1005–21. DOI: 10.1177/1461444812465137.
Anderson, Nate. “AT&T Engineer: NSA Built Secret Rooms in Our Facilities.” Ars Technica, April 12, 2006. http://arstechnica.com/uncategorized/2006/04/6585-2/.
Anderson, Nate. “Canadian ISPs Furious about Bell Canada’s Traffic Throttling.” Ars Technica, March 26, 2008. http://arstechnica.com/uncategorized/2008/03/canadian-isps-furious-about-bell-canadas-traffic-throttling/.
Anderson, Nate. “Encrypted and Obfuscated? Your P2P Protocol Can Still Be IDed.” Ars Technica, August 25, 2010. http://arstechnica.com/tech-policy/news/2010/08/encrypted-and-obfuscated-your-p2p-protocol-can-still-be-ided.ars.
Anderson, Nate. “Peering Problems: Digging into the Comcast/Level 3 Grudgematch.” Ars Technica, December 9, 2010. http://arstechnica.com/tech-policy/news/2010/12/comcastlevel3.ars/.
Anderson, Nate. “Pirate Bay Moves to Decentralized DHT Protocol, Kills Tracker.” Ars Technica, November 17, 2009. http://arstechnica.com/tech-policy/news/2009/11/pirate-bay-kills-its-own-bittorrent-tracker.ars.
Andy. “Cisco Develops System to Automatically Cut-Off Pirate Video Streams.” TorrentFreak, October 21, 2016. https://torrentfreak.com/cisco-develops-system-automatically-cut-off-pirate-video-streams-161021/.
Angwin, Julia, Jeff Larson, Charlie Savage, James Risen, Henrik Moltke, and Laura Poitras. “NSA Spying Relies on AT&T’s ‘Extreme Willingness to Help.’” ProPublica, August 15, 2015. https://www.propublica.org/article/nsa-spying-relies-on-atts-extreme-willingness-to-help.
Anthony, Sebastian. “Google Teaches ‘AIs’ to Invent Their Own Crypto and Avoid Eavesdropping.” Ars Technica, October 28, 2016. http://arstechnica.com/information-technology/2016/10/google-ai-neural-network-cryptography/.
Aria Networks. “Aria Networks and TierOne Announce OEM Partnership.” Aria Networks Blog, March 22, 2016. http://www.aria-networks.com/news/aria-networks-tierone-announce-oem-partnership/.
Aria Networks. “Self-Optimising Networks.” Aria Networks. Accessed July 21, 2016. http://www.aria-networks.com/solutions/self-optimising-networks-son/.
Armitage, John, and Phil Graham. “Dromoeconomics: Towards a Political Economy of Speed.” Parallax 7, no. 1 (2001): 111–23.
Asghari, Hadi, Michel van Eeten, and Milton Mueller. Internet Measurements and Public Policy: Mind the Gap. Rochester, N.Y.: Social Science Research Network, 2013. http://papers.ssrn.com/abstract=2294456.
Aspray, William. “An Annotated Bibliography of Secondary Sources on the History of Software.” Annals of the History of Computing 9, no. 3/4 (1988): 291–343.
Austin, Graeme W. “Importing Kazza—Exporting Grokster.” Santa Clara Computer & High Technology Law Journal 22 (2006): 577.
Avgiris, Cathy. “Comcast to Replace Usage Cap with Improved Data Usage Management Approaches.” Comcast, May 17, 2012. http://corporate.comcast.com/comcast-voices/comcast-to-replace-usage-cap-with-improved-data-usage-management-approaches.
Avolio, Frederick. “Firewalls and Internet Security.” The Internet Protocol Journal 2, no. 2 (1999). http://www.cisco.com/web/about/ac123/ac147/ac174/ac200/about_cisco_ipj_archive_article09186a00800c85ae.html.
Ball, James, Julian Borger, and Glenn Greenwald. “Revealed: How US and UK Spy Agencies Defeat Internet Privacy and Security.” U.S. News, The Guardian, September 6, 2013. http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security.
Bamford, James. The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America. New York: Doubleday, 2008.
Bangeman, Eric. “Comcast Tweaks Terms of Service in Wake of Throttling Uproar.” Ars Technica, February 7, 2008. http://arstechnica.com/uncategorized/2008/02/comcast-tweaks-terms-of-service-in-wake-of-throttling-uproar/.
Barbrook, Richard, and Andy Cameron. “Californian Ideology.” In Crypto Anarchy, Cyberstates, and Pirate Utopias, edited by Peter Ludlow, 363–88. Cambridge, Mass.: MIT Press, 2001.
Bardini, Thierry. Bootstrapping: Douglas Engelbart, Coevolution, and the Origins of Personal Computing. Stanford, Calif.: Stanford University Press, 2000.
Barlow, John Perry. “A Declaration of the Independence of Cyberspace.” Electronic Frontier Foundation, February 8, 1996. https://www.eff.org/cyberspace-independence.
Barney, Darin. Prometheus Wired: The Hope for Democracy in the Age of Network Technology. Chicago: University of Chicago Press, 2000.
Barocas, Solon, Sophie Hood, and Malte Ziewitz. Governing Algorithms: A Provocation Piece. Rochester, N.Y.: Social Science Research Network, 2013. http://papers.ssrn.com/abstract=2245322.
Barzilai-Nahon, Karine. “Gaps and Bits: Conceptualizing Measurements for Digital Divide/S.” The Information Society 22, no. 5 (2006): 269–78. DOI: 10.1080/01972240600903953.
Bastian, C., T. Klieber, J. Livingood, J. Mills, R. Woundy, and Comcast. “RFC 6057: Comcast’s Protocol-Agnostic Congestion Management System.” Internet Engineering Task Force. Last updated October 14, 2015. http://datatracker.ietf.org/doc/rfc6057/?include_text=1.
Bauer, Steve, David D. Clark, and William H. Lehr. “Powerboost.” Toronto, 2011. http://mitas.csail.mit.edu/papers/homenets-bauer-2011.pdf.
Bazelon, Emily. “How to Stop the Bullies.” The Atlantic, February 20, 2013. http://www.theatlantic.com/magazine/archive/2013/03/how-to-stop-bullies/309217/.
Beckett, Andy. “Accelerationism: How a Fringe Philosophy Predicted the Future We Live In.” World News, The Guardian, May 11, 2017 https://www.theguardian.com/world/2017/may/11/accelerationism-how-a-fringe-philosophy-predicted-the-future-we-live-in.
Beer, David. “Power through the Algorithm? Participatory Web Cultures and the Technological Unconscious.” New Media & Society 11, no. 6 (September 1, 2009): 985–1002.
Bell Aliant. “Reply Comments on Public Notice 2008-19: Review of the Internet Traffic Management Practices of Internet Service Providers, Bell Aliant Regional Communications, Limited Partnership, and Bell Canada.” February 23, 2009. http://www.crtc.gc.ca/public/partvii/2008/8646/c12_200815400/1029804.zip.
Beller, Jonathan. The Cinematic Mode of Production: Attention Economy and the Society of the Spectacle. Lebanon, N.H.: Dartmouth College Press, 2006.
Bellovin, S. M., and W. R Cheswick. “Network Firewalls.” Communications Magazine, IEEE 32, no. 9 (1994): 50–57. https://crypto.stanford.edu/cs155old/cs155-spring09/papers/bellovin-cheswick.pdf.
Bendrath, Ralf, and Milton Mueller. “The End of the Net as We Know It? Deep Packet Inspection and Internet Governance.” New Media & Society 13, no. 7 (November 1, 2011): 1142–60.
Beniger, James R. The Control Revolution: Technological and Economic Origins of the Information Society. Cambridge, Mass.: Harvard University Press, 1986.
Benkler, Yochai. The Wealth of Networks: How Social Production Transforms Markets and Freedom. New Haven, Conn.: Yale University Press, 2006.
Bennett, Jane. Vibrant Matter: A Political Ecology of Things. Durham, N.C.: Duke University Press, 2010.
Bennett, W. Lance. “Communicating Global Activism: Strengths and Vulnerabilities of Networked Politics.” Information, Communication, and Society 6, no. 2 (2003): 143–68.
Beranek, Leo. “Roots of the Internet: A Personal History.” Massachusetts Historical Review 2 (January 1, 2000): 55–75.
BEREC (Body of European Regulators of Electronic Communications), and EC (the European Commission). A View of Traffic Management and Other Practices Resulting in Restrictions to the Open Internet in Europe: Findings from BEREC’s and the European Commission’s Joint Investigation. May 29, 2012. http://ec.europa.eu/digital-agenda/sites/digital-agenda/files/Traffic%20Management%20Investigation%20BEREC_2.pdf.
Berry, David M. Critical Theory and the Digital. Critical Theory and Contemporary Society. New York: Bloomsbury Academic, 2014.
Beyer, Jessica L., and Fenwick McKelvey. “You Are Not Welcome among Us: Pirates and the State.” International Journal of Communication 9 (March 26, 2015): 890–908.
Boczkowski, Pablo, and Leah A. Lievrouw. “Bridging STS and Communication Studies: Scholarship on Media and Information Technologies.” In The Handbook of Science and Technology Studies, edited by Edward J. Hackett, Olga Amsterdamska, Michael E. Lynch, Judy Wajcman, and Wiebe E Bijker, 3rd ed., 951–77. Cambridge, Mass.: MIT Press, 2008.
Bode, Karl. “CableOne Brags It Provides Worse Service to Bad Credit Customers.” DSLReports, May 27, 2016. http://www.dslreports.com/shownews/CableOne-Brags-It-Provides-Worse-Service-to-Bad-Credit-Customers-137070.
Boden, Margaret. Mind as Machine: A History of Cognitive Science. New York: Oxford University Press, 2006.
Bolt, Beranek, and Newman Inc. (BBN). Report No. 1763: Initial Design for Interface Message Processors for the ARPA Computer Network. January 1969. Sponsored by Advanced Research Projects Agency, Department of Defense: ARPA Order No. 1260. http://www.dtic.mil/dtic/tr/fulltext/u2/682905.pdf.
Bouch, Anna, Allan Kuchinsky, and Nina Bhatti. “Quality Is in the Eye of the Beholder: Meeting Users’ Requirements for Internet Quality of Service.” In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 297–304. New York: Association for Computing Machinery, 2000. http://dl.acm.org/citation.cfm?id=332447.
Bouwsma, O. K. “Descartes’ Evil Genius.” Philosophical Review 58, no. 2 (1949): 141–51. DOI: 10.2307/2181388.
Bowker, Geoffrey C. “The History of Information Infrastructures: The Case of the International Classification of Diseases.” Information Processing & Management 32, no. 1 (1996): 49–61.
boyd, danah, and Kate Crawford. “Critical Questions for Big Data: Provocations for a Cultural, Technological, and Scholarly Phenomenon.” Information, Communication & Society 15, no. 5 (June 2012): 662–79. DOI: 10.1080/1369118X.2012.678878.
Brabham, Daren C. “The Boston Marathon Bombings, 4Chan’s Think Tank, and a Modest Proposal for an Emergency Crowdsourced Investigation Platform.” Culture Digitally, April 17, 2013. http://culturedigitally.org/2013/04/boston-marathon-bombing-and-emergency-crowdsourced-investigation/.
Braman, Sandra. “Laying the Path: Governance in Early Internet Design.” Info 15, no. 6 (September 23, 2013): 63–83. DOI: 10.1108/info-07–2013–0043.
Braman, Sandra. “Posthuman Law: Information Policy and the Machinic World.” First Monday 7, no. 12 (December 2, 2002). http://firstmonday.org/ojs/index.php/fm/article/view/1011/932.
Braman, Sandra. “From the Modern to the Postmodern: The Future of Global Communications Theory and Research in a Pandemonic Age.” In International and Development Communication: A 21st-Century Perspective, edited by Bella Mody, 109–24. Thousand Oaks, Calif.: Sage, 2003.
Braman, Sandra. “The Framing Years: Policy Fundamentals in the Internet Design Process, 1969–1979.” Paper presented at the TPRC conference, 2010. Rochester, N.Y.: Social Science Research, 2012.
Braman, Sandra. “The Geopolitical vs. the Network Political: Internet Designers and Governance.” International Journal of Media & Cultural Politics 9, no. 3 (2013): 277–96. DOI: 10.1386/macp.9.3.277_1
Braun, Joshua. “Transparent Intermediaries: Building the Infrastructures of Connected Viewing.” In Holts and Sanson, Connected Viewing: Selling, Streaming, and Sharing Media in the Digital Age, edited by Jennifer Holt and Kevin Sanson, 121–43. New York: Routledge, 2014.
Brianl. Comment on Goldmonger, “Canada ISP Latency Issues.” World of Warcraft Forums, February 9, 2011. http://us.battle.net/forums/en/wow/topic/1965838937?page=29#post-573.
Brianl. Comment 1 on Tachion, “Outrageous Latency & Constant DC—Pre 4.0.3.” World of Warcraft Forums, November 16, 2011. http://us.battle.net/forums/en/wow/topic/1021053250?page=3#post-46.
Brianl. Comment 2 on Tachion, “Outrageous Latency & Constant DC—Pre 4.0.3.” World of Warcraft Forums, November 18, 2011. http://us.battle.net/forums/en/wow/topic/1021053250?page=10#post-188.
Brim, Scott W., and Brian E. Carpenter. “Middleboxes: Taxonomy and Issues.” Request for Comments 3234. Network Managing Group, 2002. https://tools.ietf.org/html/rfc3234.
Brodkin, Jon. “Netflix Packets Being Dropped Every Day Because Verizon Wants More Money.” Ars Technica, February 21, 2014. http://arstechnica.com/information-technology/2014/02/netflix-packets-being-dropped-every-day-because-verizon-wants-more-money/.
Brodkin, Jon. “Netflix Performance on Verizon and Comcast Has Been Dropping for Months.” Ars Technica, February 10, 2014. http://arstechnica.com/information-technology/2014/02/netflix-performance-on-verizon-and-comcast-has-been-dropping-for-months/.
Brodkin, Jon. “Verizon: We Throttle Unlimited Data to Provide an ‘Incentive to Limit Usage.’” Ars Technica, August 5, 2014. http://arstechnica.com/business/2014/08/verizon-we-throttle-unlimited-data-to-provide-an-incentive-to-limit-usage/.
Brose, Hanns-Georg. “An Introduction towards a Culture of Non-Simultaneity?” Time & Society 13, no. 1 (March 1, 2004): 5–26. DOI: 10.1177/0961463X04040740.
Brunton, Finn, and Helen Nissenbaum. “Vernacular Resistance to Data Collection and Analysis: A Political Theory of Obfuscation.” First Monday 16, no. 5 (2011). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/3493/2955.
Bucher, Taina. “A Technicity of Attention: How Software ‘Makes Sense.’” Culture Machine 13 (2012): 1–13.
Bucher, Taina. “The Algorithmic Imaginary: Exploring the Ordinary Affects of Facebook Algorithms.” Information, Communication & Society, February 25, 2016, 1–15. DOI: 10.1080/1369118X.2016.1154086.
Bucher, Taina. “Want to Be on the Top? Algorithmic Power and the Threat of Invisibility on Facebook.” New Media & Society 14, no. 7 (November 1, 2012): 1164–80. DOI: 10.1177/1461444812440159.
Bunnell, David, and Adam Brate. Making the Cisco Connection: The Story behind the Real Internet Superpower. New York: John Wiley and Sons, 2000.
Burkart, Patrick. “Cultural Environmentalism and Collective Action: The Case of the Swedish Pirate Party.” Paper presented at the International Communication Association Conference, Phoenix, Ariz., May 2012.
Burkart, Patrick. Pirate Politics: The New Information Policy Contests. Cambridge, Mass.: MIT Press, 2014.
Burroughs, William S. “The Limits of Control.” Semiotext(e): Schizo-Culture 3, no. 2 (1978): 38–42.
Busch, Lawrence. Standards: Recipes for Reality. Cambridge, Mass.: MIT Press, 2011.
Bush, Randy. “FidoNet: Technology, Tools, and History.” Communications of the ACM 36, no. 8 (1993): 31–35.
Callon, Michel, Pierre Lascoumes, and Yannick Barthe. Acting in an Uncertain World: An Essay on Technical Democracy. Cambridge, Mass.: MIT Press, 2009.
Calo, M. Ryan, Michael Froomkin, and Ian Kerr, eds. Robot Law. Cheltenham, UK: Edward Elgar, 2016.
Campbell-Kelly, Martin. “Data Communications at the National Physical Laboratory (1965–1975).” IEEE Annals of the History of Computing 9, no. 3/4 (1988): 221–47.
Campbell-Kelly, Martin. From Airline Reservations to Sonic the Hedgehog: A History of the Software Industry. Cambridge, Mass.: MIT Press, 2003.
Campbell-Kelly, Martin, and William Aspray. Computer: A History of the Information Machine. Boulder, Colo.: Westview Press, 2004.
Canadian Radio-Television and Telecommunications Commission (CRTC). Archived email from Andrea Rosen, CRTC Chief Compliance and Enforcement Officer, to Ken Englehart, Senior Vice President Regulatory, Rogers Communications Inc. “SUBJECT: File #545613, Internet Traffic Management Practices (‘ITMPs’), Section 36 of the Telecommunications Act, S.C.1993, c.38, as amended (‘Act’) and Paragraphs 126 and 127 of Telecom Regulatory Policy CRTC 2009-657 (‘TRP CRTC 2009-657’).” CRTC archive #545613. June 28, 2012. http://www.crtc.gc.ca/eng/archive/2012/lt120628.htm.
Cao, Yi, Christian Ritz, and Raad Raad. “How Much Longer to Go? The Influence of Waiting Time and Progress Indicators on Quality of Experience for Mobile Visual Search Applied to Print Media.” In Fifth International Workshop on Quality of Multimedia Experience (QoMEX), 2013, 112–17. New York: IEEE, 2013. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6603220.
Carey, James W. Communication as Culture: Essays on Media and Society. Revised edition. New York: Routledge, 2009.
Carey, John, and Martin C. J. Elton. “The Other Path to the Web: The Forgotten Role of Videotex and Other Early Online Services.” New Media & Society 11, no. 1–2 (February 1, 2009): 241–60.
Carey, Pete. “A Start-up’s True Tale.” San Jose Mercury News, December 1, 2001. http://pdp10.nocrew.org/docs/cisco.html.
Carr, C. Stephen, Stephen D. Crocker, and Vinton G. Cerf. “HOST-HOST Communication Protocol in the ARPA Network.” In Proceedings of the May 5–7, 1970, Spring Joint Computer Conference, 589–97. New York: Association for Computing Machines, 1970. http://dl.acm.org/citation.cfm?id=1477024.
CBC News. “ISPs Limit Access to CBC Download, Users Say.” CBC News, March 26, 2008. http://www.cbc.ca/news/arts/tv/story/2008/03/26/bittorrent-cbc.html.
CBC News. “Rogers Admits It May Be Throttling Games.” CBC News, September 6, 2011. http://www.cbc.ca/news/technology/rogers-admits-it-may-be-throttling-games-1.1057354.
Ceaparu, Irina, Jonathan Lazar, Katie Bessiere, John Robinson, and Ben Shneiderman. “Determining Causes and Severity of End-User Frustration.” International Journal of Human-Computer Interaction 17, no. 3 (2004): 333–56.
Cerf, Vinton G. Guidelines for Internet Measurement Activities. Internet Activities Board, October 1991. https://tools.ietf.org/pdf/rfc1262.pdf.
Cerf, Vinton G., and Robert E. Kahn. “A Protocol for Packet Network Intercommunication.” IEEE Transactions on Communications 22, no. 5 (May 1974): 637–48. DOI: 10.1109/TCOM.1974.1092259.
Ceruzzi, Paul E. A History of Modern Computing. Cambridge, Mass.: MIT Press, 1998.
Ceruzzi, Paul E. “The Internet before Commercialization.” In The Internet and American Business, edited by William Aspray and Paul E. Ceruzzi, 9–42. Cambridge, Mass.: MIT Press, 2008.
Chen, Adrian. “The Laborers Who Keep Dick Pics and Beheadings Out of Your Facebook Feed.” Wired, October 23, 2014. http://www.wired.com/2014/10/content-moderation/.
Chen, Angela. “Facebook Will Start Tracking Which Stores You Walk Into.” Gizmodo, June 15, 2016. http://gizmodo.com/facebook-will-start-tracking-which-stores-you-walk-into-1782022591.
Cheney-Lippold, J. “A New Algorithmic Identity: Soft Biopolitics and the Modulation of Control.” Theory, Culture & Society 28, no. 6 (November 1, 2011): 164–81. DOI: 10.1177/0263276411424420.
Chetty, Marshini, Richard Banks, A. J. Brush, Jonathan Donner, and Rebecca Grinter. “You’re Capped: Understanding the Effects of Bandwidth Caps on Broadband Use in the Home.” In Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems, 3021–30. New York: Association for Computing Machines, 2012. http://dl.acm.org/citation.cfm?id=2208714.
Chinneck, John W. “Practical Optimization: A Gentle Introduction.” Carleton University Faculty Page, December 16, 2015. http://www.sce.carleton.ca/faculty/chinneck/po.html.
Chun, Wendy Hui Kyong. “On ‘Sourcery,’ or Code as Fetish.” Configurations 16, no. 3 (2008): 299–324. DOI: 10.1353/con.0.0064.
Chung, Emily. “Rogers Throttling May Breach Net Neutrality Rules.” CBC News, October 25, 2011. http://www.cbc.ca/news/technology/rogers-throttling-may-breach-net-neutrality-rules-1.1055349.
Chung, Emily. “Bell Reveals Internet Throttling Details to CRTC.” CBC News, July 14, 2009. http://www.cbc.ca/news/technology/bell-reveals-internet-throttling-details-to-crtc-1.806898.
Cisco Systems. Cisco SCE 8000 Service Control Engine. August 28, 2008. http://www.cisco.com/c/en/us/products/collateral/service-exchange/sce-8000-series-service-control-engine/data_sheet_c78-492987.html.
Cisco Systems. Administration Guide VA1(7), Cisco ACE 4700 Series Application Control Engine Appliance—Configuring Class Maps and Policy Maps [Cisco ACE 4700 Series Application Control Engine Appliances]. 2007. http://www.cisco.com/c/en/us/td/docs/app_ntwk_services/data_center_app_services/ace_appliances/vA1_7_/configuration/administration/guide/admgd/mapolcy.html.
Cisco Systems. Cisco IOS CMTS Cable Software Configuration Guide, Release 12.2SC. February 15, 2015. http://www.cisco.com/web/techdoc/cable/Config/Sw_conf.html.
Cisco Systems. Cisco IOS Quality of Service Solutions Configuration Guide, Release 12.2: Configuring Class-Based Shaping [Cisco IOS Software Release 12.2]. January 30, 2014. http://www.cisco.com/c/en/us/td/docs/ios/12_2/qos/configuration/guide/fqos_c/qcfcbshp.html.
Cisco Systems. Cisco Wide Area Application Services Configuration Guide (Software Version 5.0.1). March 25, 2015. http://www.cisco.com/c/en/us/td/docs/app_ntwk_services/waas/waas/v501/configuration/guide/cnfg/servicescontroller.html.
Cisco Systems. What Is Administrative Distance? May 8, 2013. http://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/15986-admin-distance.html.
Clement, Andrew, Nancy Paterson, and David J. Phillips. “IXmaps: Interactively Mapping NSA Surveillance Points in the Internet ‘Cloud.’” Paper presented at “A Global Surveillance Society?” conference, City University, London, June 30, 2010. http://www.ixmaps.ca/documents/interactively_mapping_paper.pdf.
Clough, Patricia T. “The Affective Turn: Political Economy, Biomedia and Bodies.” Theory, Culture & Society 25, no. 1 (January 1, 2008): 1–22. DOI: 10.1177/0263276407085156.
Cohen, Bram. “Decentralization: Implications of the End-to-End Principle” [BitTorrent release announcement]. Yahoo group message, Yahoo Groups: P2P Talk, July 2, 2001. https://groups.yahoo.com/neo/groups/decentralization/conversations/topics/3160.
Cohen, Bram. “The BitTorrent Protocol Specification.” BitTorrent.org, 2008. http://www.bittorrent.org/beps/bep_0003.html.
Cohen-Almagor, Raphael. Confronting the Internet’s Dark Side: Moral and Social Responsibility on the Free Highway. New York: Cambridge University Press, 2015.
Coleman, Gabriella. Coding Freedom: The Ethics and Aesthetics of Hacking. Princeton, N.J.: Princeton University Press, 2013.
Comcast. Attachment A: Comcast Corporation Description of Current Network Management Practices. September 19, 2008. https://downloads.comcast.net/docs/Attachment_A_Current_Practices.pdf.
Comcast. Attachment B: Comcast Corporation Description of Planned Network Management Practices to Be Deployed Following the Termination of Current Practices. September 19, 2008. http://downloads.comcast.net/docs/Attachment_B_Future_Practices.pdf.
Comcast. “The Advantages of High Speed Internet: Why Invest in Faster Speed.” XFINITY Discovery Hub, July 6, 2017. https://www.xfinity.com/hub/internet/the-advantages-of-high-speed-internet.
Consalvo, Mia. Cheating: Gaining Advantage in Videogames. Cambridge, Mass.: MIT Press, 2009.
Cook, Gordon. “NSFnet Privatization: Policy Making in a Public Interest Vacuum.” Internet Research 3, no. 1 (1993): 3–8.
Copeland, Duncan G., Richard O. Mason, and James L. Mckenney. “SABRE: The Development of Information-Based Competence and Execution of Information-Based Competition.” Annals of the History of Computing 17, no. 3 (1995): 30–56.
Corbato, F. J., M. M. Daggett, R. C. Daley, R. J. Creasy, J. D. Hellwig, R. H. Orenstein, and L. K. Korn. Compatible Time-Sharing System: A Programmer’s Guide. 2nd edition. Cambridge, Mass.: MIT Press, 1963.
Cormen, Thomas H., Charles E. Leiserson, and Ronald L. Rivest. Introduction to Algorithms. 3rd ed. Cambridge, Mass.: MIT Press, 1990.
Cote, Mark, and Jennifer Pybus. “Learning to Immaterial Labour 2.0: MySpace and Social Networks.” Ephemera: Theory and Politics in Organization 7, no. 1 (2007): 88–106. http://ualresearchonline.arts.ac.uk/9014/1/7-1cote-pybus.pdf.
Couldry, Nick. “Mediatization or Mediation? Alternative Understandings of the Emergent Space of Digital Storytelling.” New Media & Society 10, no. 3 (June 1, 2008): 373–91. DOI: 10.1177/1461444808089414.
Crary, Jonathan. 24/7: Late Capitalism and the Ends of Sleep. New York: Verso, 2013.
Crary, Jonathan. Suspensions of Perception: Attention, Spectacle, and Modern Culture. Cambridge, Mass.: MIT Press, 1999.
Crawford, Kate. “The Hidden Biases in Big Data.” Harvard Business Review, April 1, 2013. https://hbr.org/2013/04/the-hidden-biases-in-big-data.
Crawford, Kate, and Tarleton L. Gillespie. “What Is a Flag For? Social Media Reporting Tools and the Vocabulary of Complaint.” New Media & Society 18, no. 3 (March 1, 2016): 410–28. http://papers.ssrn.com/abstract=2476464.
Crawford, Kate, and Catharine Lumby. “Networks of Governance: Users, Platforms, and the Challenges of Networked Media Regulation.” International Journal of Technology Policy and Law 2, no. 1 (2013): 270–82. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2246772.
Crawford, Susan P. “Internet Think.” Journal on Telecommunications and High Technology Law 5, no. 2 (2007): 467–86.
Crevier, Daniel. AI: The Tumultuous History of the Search for Artificial Intelligence. New York: Basic Books, 1993.
Crogan, Patrick. “Theory of State: Deleuze, Guattari and Virilio on the State, Technology and Speed.” Angelaki 4, no. 2 (1999): 137–48.
Cunningham, David. “A Marxist Heresy? Accelerationism and Its Discontents.” Radical Philosophy 191 (May/June 2015): 29–38.
CZ.NIC. “Turris Omnia: Hi-Performance & Open-Source Router.” Embedded YouTube video 4:29. Indiegogo. Accessed August 9, 2016. https://www.indiegogo.com/projects/1313392.
Daly, Steven. “Pirates of the Multiplex.” Vanity Fair, February 12, 2007. http://www.vanityfair.com/ontheweb/features/2007/03/piratebay200703.
Dante (Alighieri). Divine Comedy: The Inferno. New York: Harper & Brothers Publishers, 1851. http://books.google.ca/books?id=m5Sl7EpZsC8C.
Dantzig, George, Delbert Fulkerson, and Selmer Johnson, “Solution of a Large-Scale Traveling-Salesman Problem.” In 50 Years of Integer Programming 1958–2008, edited by M. Junger et al., 7–9. Berlin: Springer, 2010. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.606.2752&rep=rep1&type=pdf.
Davies, Donald Watts. “Proposal for a Digital Communication Network.” National Physical Laboratory, 1966. http://www.dcs.gla.ac.uk/~wpc/grcs/Davies05.pdf.
Davies, Donald Watts. “Report on a Visit to USA in May 1965.” The National Museum of Computing archives. http://www.tnmoc.org/explore/archive.
Davies, Donald Watts. “The Control of Congestion in Packet-Switching Networks.” IEEE Transactions on Communications 22, no. 3 (June 1972): 546–50. https://pdfs.semanticscholar.org/99ad/0c4ca20ae6289196441954cd266d0d3dd0c9.pdf.
Davies, Donald Watts. “Interview by M. Campbell-Kelly.” March 17, 1986. Oral History series. Charles Babbage Institute, Center for Information Processing, University of Minnesota. https://conservancy.umn.edu/handle/11299/107241.
Davies, Donald Watts, K. A. Bartlett, R. A. Scantlebury, and P. T. Wilkins. “A Digital Communication Network for Computers Giving Rapid Response at Remote Terminals.” In Proceedings of the First ACM Symposium on Operating System Principles, 1967, 2.1–2.7. New York: Association for Computing Machines, 1967.
Day, John D. Patterns in Network Architecture: A Return to Fundamentals. Upper Saddle River, N.J.: Prentice Hall, 2008.
Dayal, Geeta. “The Algorithmic Copyright Cops: Streaming Video’s Robotic Overlords.” Wired, September 9, 2012. http://www.wired.com/threatlevel/2012/09/streaming-videos-robotic-overlords-algorithmic-copyright-cops/.
Deibert, Ronald, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain, eds. Access Denied: The Practice and Policy of Global Internet Filtering. The Information Revolution and Global Politics. Cambridge, Mass.: MIT Press, 2008.
Deleuze, Gilles. “Control and Becoming [interview with Antonio Negri].” In Negotiations, 1972–1990, translated by Martin Joughin, 169–77. New York: Columbia University Press, 1995. Originally “Le devenir révolutionnaire et les créateurs politiques.” Futur Antérieur, no. 1 (1990): 100–107.
Deleuze, Gilles. “Having an Idea in Cinema (On the Cinema of Straub-Huillet).” In Deleuze & Guattari: New Mappings in Politics, Philosophy, and Culture, edited by Eleanor Kaufman and Kevin Jon Heller, 14–19. Minneapolis: University of Minnesota Press, 1998.
Deleuze, Gilles. “Mediators.” In Negotiations, 1972–1990, translated by Martin Joughin, 121–34. New York: Columbia University Press, 1995.
Deleuze, Gilles. “On Gilbert Simondon.” In Desert Islands and Other Texts: 1953–1974, edited by David Lapoujade, translated by Michael Taormina, 86–89. New York: Semiotext(e), 2004.
Deleuze, Gilles. “Postscript on the Societies of Control.” October 59, no. 1 (1992): 3–7.
Deleuze, Gilles, and Félix Guattari. Anti-Oedipus: Capitalism and Schizophrenia. Translated by Robert Hurley, Mark Seem, and Helen R. Lane. Minneapolis: University of Minnesota Press, 1983.
DeMaria, Michael J. “PacketShaper 8500: Traffic Management Gets Smart.” Network Computing, January 21, 2002.
DeNardis, Laura. “A History of Internet Security.” In The History of Information Security: A Comprehensive Handbook, edited by Karl de Leeuw and Jan Bergstra, 681–704. Amsterdam: Elsevier, 2007.
DeNardis, Laura, ed. Opening Standards: The Global Politics of Interoperability. The Information Society Series. Cambridge, Mass.: MIT Press, 2011.
DeNardis, Laura. Protocol Politics: The Globalization of Internet Governance. Cambridge, Mass.: MIT Press, 2009.
DeNardis, Laura. The Global War for Internet Governance. New Haven, Conn.: Yale University Press, 2014.
DerEngel (Ryan Harris). Hacking the Cable Modem: What Cable Companies Don’t Want You to Know. San Francisco, Calif.: No Starch Press, 2006.
Deseriis, Marco. “The General, the Watchman, and the Engineer of Control.” Journal of Communication Inquiry 35, no. 4 (October 1, 2011): 387–94. DOI: 10.1177/0196859911415677.
Dewey, John. The Public and Its Problems. Denver, Colo.: Swallow Press, 1927.
Diakopoulos, Nicholas. “Algorithmic Accountability: On the Investigation of Black Boxes.” Tow Center for Digital Journalism, December 3, 2014. https://towcenter.org/research/algorithmic-accountability-on-the-investigation-of-black-boxes-2/.
Dischinger, M., M. Marcon, S. Guha, K. P. Gummadi, R. Mahajan, and S. Saroiu. “Glasnost: Enabling End Users to Detect Traffic Differentiation.” In Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation. Berkeley, Calif.: USENIX Association, 2010.
Dix, John. “Router Man.” Network World, March 27, 2006. http://www.networkworld.com/article/2309917/lan-wan/lan-wan-router-man.html.
Doctorow, Cory. “‘Poor Internet for Poor People’: India’s Activists Fight Facebook Connection Plan.” Technology, The Guardian, January 15, 2016. https://www.theguardian.com/world/2016/jan/15/india-net-neutrality-activists-facebook-free-basics.
Dodge, Martin, and Rob Kitchin. Mapping Cyberspace. New York: Routledge, 2001.
Dorward, Sean M., Rob Pike, Dave L. Presotto, D. M. Ritchie, Howard W. Trickey, and Phil Winterbottom. “The Inferno Operating System.” Bell Labs Technical Journal 2, no. 1 (Winter 1997): 5–18. DOI: 10.1002/bltj.2028.
Dourish, Paul. “Protocols, Packets, and Proximity: The Materiality of Internet Routing.” In Parks and Starosielski, Signal Traffic, 183–204.
Dovrolis, Constantine, Krishna Gummadi, Aleksandar Kuzmanovic, and Sascha D. Meinrath. “Measurement Lab: Overview and an Invitation to the Research Community.” ACM SIGCOMM Computer Communication Review 40, no. 3 (2010): 53–56.
Driscoll, Kevin. “Hobbyist Inter-Networking and the Popular Internet Imaginary: Forgotten Histories of Networked Personal Computing, 1978–1998.” PhD diss., University of Southern California, 2014. http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/444362/rec/.
Driscoll, Kevin. “Social Media’s Dial-Up Ancestor: The Bulletin Board System.” IEEE Spectrum: Technology, Engineering, and Science News, October 24, 2016. http://spectrum.ieee.org/computing/networks/social-medias-dialup-ancestor-the-bulletin-board-system.
Duffy, Jim. “Cisco’s IOS vs. Juniper’s JUNOS.” Network World, April 17, 2008. https://www.networkworld.com/article/2278150/data-center/cisco-s-ios-vs--juniper-s-junos.html.
Dyer-Witheford, Nick. “E-Capital and the Many-headed Hydra.” In Elmer, Critical Perspectives on the Internet, 129–64.
Earman, John, and John D. Norton. “Exorcist XIV: The Wrath of Maxwell’s Demon Part I, From Maxwell to Szilard.” Studies in History and Philosophy of Science Part B: Studies in History and Philosophy of Modern Physics 29, no. 4 (1998): 435–71.
Eckersley, Peter, Fred von Lohmann, and Seth Schoen. “Packet Forgery by ISPs: A Report on the Comcast Affair.” Electronic Frontier Foundation, November 2007. https://www.eff.org/wp/packet-forgery-isps-report-comcast-affair.
Edwards, Paul N. “Infrastructure and Modernity: Force, Time, and Social Organization in the History of Sociotechnical Systems.” In Technology and Modernity: The Empirical Turn, edited by Thomas J. Misa, Philip Brey, and Andrew Feenberg, 185–226. Cambridge, Mass.: MIT Press, 2003.
Edwards, Paul N. “Some Say the Internet Should Never Have Happened.” In Media, Technology, and Society: Theories of Media Evolution, edited by W. Russell Neuman, 141–60. Ann Arbor: University of Michigan Press, 2010. http://pne.people.si.umich.edu/PDF/Edwards2010InternetShouldNeverHaveHappened.pdf.
Edwards, Paul N. The Closed World: Computers and the Politics of Discourse in Cold War America. Cambridge, Mass.: MIT Press, 1997.
Edwards, Paul N., Geoffrey C. Bowker, Steve J. Jackson, and Robin Williams. “Introduction: An Agenda for Infrastructure Studies.” Journal of the Association for Information Systems 10, no. 5 (2009): 364–74.
Egger, Sebastian, Tobias Hossfeld, Raimund Schatz, and Markus Fiedler. “Waiting Times in Quality of Experience for Web Based Services.” In Fourth International Workshop on Quality of Multimedia Experience (QoMEX), 2012, 86–96. New York: IEEE, 2012. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6263888.
Electronic Privacy Information Center (EPIC). “Deep Packet Inspection and Privacy.” Accessed July 5, 2016. https://epic.org/privacy/dpi/.
Ellis, David. “Why Is the CRTC Auditing the Gamers Instead of Rogers? (4).” Life on the Broadband Internet (blog), October 6, 2011. http://www.davidellis.ca/why-is-the-crtc-auditing-the-gamers-instead-of-rogers-4/.
Elmer, Greg. “A Diagram of Panoptic Surveillance.” New Media & Society 5, no. 2 (June 1, 2003): 231–47.
Elmer, Greg. Profiling Machines: Mapping the Personal Information Economy. Cambridge, Mass.: MIT Press, 2004.
Elmer, Greg. “The Vertical (Layered) Net.” In Critical Cyberculture Studies: New Directions, edited by A. Massanari and D. Silver, 159–67. New York: New York University Press, 2006.
Elmer, Greg, ed. Critical Perspectives on the Internet. Lanham, Md.: Rowman & Littlefield, 2002.
Elmer, Greg, and Andy Opel. “Pre-Empting Panoptic Surveillance: Surviving the Inevitable War on Terror.” In Theorizing Surveillance: The Panopticon and Beyond, edited by David Lyon, 139–60. Cullompton, UK: Willan, 2006. http://www.loc.gov/catdir/toc/fy0710/2007270291.html.
Emule. “Protocol Obfuscation.” EMule-Project.Net, September 16, 2006. http://www.emule-project.net/home/perl/help.cgi?l=1&rm=show_topic&topic_id=848.
EMule. “Disappearing Uploaders.” Official EMule-Board. Accessed September 6, 2016. http://forum.emule-project.net/index.php?showtopic=109705.
Enigmax. “RapidShare Slows Download Speeds to Drive Away Pirates.” TorrentFreak, February 24, 2012. http://torrentfreak.com/rapidshare-slows-download-speeds-to-drive-away-pirates-120224/#disqus_thread.
Eriksson, Magnus. “Speech for Piratbyrån @ Bzoom Festival in Brno, Czech Rep.” Fade to Grey (blog), October 14, 2006. http://fadetogrey.wordpress.com/2006/10/14/brno/.
Ernesto (Van der Sar). “BitTorrent’s Future: DHT, PEX, and Magnet Links Explained.” Lifehacker, November 24, 2009. http://lifehacker.com/5411311/bittorrents-future-dht-pex-and-magnet-links-explained.
Ernesto (Van der Sar). “Download a Copy of The Pirate Bay, It’s Only 90 MB.” TorrentFreak, February 9, 2012. http://torrentfreak.com/download-a-copy-of-the-pirate-bay-its-only-90-mb-120209/.
Ernesto (Van der Sar). “Pirate Bay Is the King of Torrents Once Again.” TorrentFreak, August 14, 2016. https://torrentfreak.com/pirate-bay-king-torrents-160814/.
Ernesto (Van der Sar). “Rogers’ BitTorrent Throttling Experiment Goes Horribly Wrong.” TorrentFreak, December 13, 2010. https://torrentfreak.com/rogers-bittorrent-throttling-experiment-goes-horribly-wrong-101213/.
Ernesto (Van der Sar). “TalkTalk’s P2P Throttling Kills OnLive Games.” TorrentFreak, September 29, 2011. http://torrentfreak.com/talktalks-p2p-throttling-kills-onlive-games-110929/.
Ernesto (Van der Sar). “The Pirate Bay Appeal Verdict: Guilty Again.” TorrentFreak, November 26, 2010. http://torrentfreak.com/the-pirate-bay-appeal-verdict-101126/.
Ernesto (Van der Sar). “The Pirate Bay Ships New Servers to Mountain Complex.” TorrentFreak, May 16, 2011. http://torrentfreak.com/the-pirate-bay-ships-new-servers-to-mountain-complex-110516/.
Ernesto (Van der Sar). “Top 10 Most Popular Torrent Sites of 2016.” TorrentFreak, June 2, 2016. https://torrentfreak.com/top-10-most-popular-torrent-sites-of-2016-160102/.
Ernesto (Van der Sar). “The Pirate Bay Turns 10 Years Old: The History.” TorrentFreak, August 10, 2013. https://torrentfreak.com/the-pirate-bay-turns-10-years-old-the-history-130810/.
European Commission. “Telecoms: Commission Steps up UK Legal Action over Privacy and Personal Data Protection.” European Commission Press Release Database, October 29, 2009. http://europa.eu/rapid/press-release_IP-09-1626_en.htm?locale=en.
Ezrahi, Yaron. “Dewey’s Critique of Democratic Visual Culture and Its Political Implications.” In Sites of Vision: The Discursive Construction of Sight in the History of Philosophy, edited by David Kleinberg-Levin, 315–36. Cambridge, Mass.: MIT Press, 1999.
Farrand, Benjamin, and Helena Carrapico. “Networked Governance and the Regulation of Expression on the Internet: The Blurring of the Role of Public and Private Actors as Content Regulators.” Journal of Information Technology & Politics 10, no. 4 (October 2013): 357–68. DOI: 10.1080/19331681.2013.843920.
Fault. Comment on Shifthead, “Rogers ISP, WoW, and You!” World of Warcraft Forums, December 19, 2010. http://us.battle.net/forums/en/wow/topic/1568009046?page=2#post-27.
Feamster, Nick, Jennifer Rexford, and Ellen Zegura. “The Road to SDN: An Intellectual History of Programmable Networks.” SIGCOMM Computer Communication Review 44, no. 2 (April 2014): 87–98. DOI: 10.1145/2602204.2602219.
Federal Communications Commission (FCC). Report and Order on Remand, Declaratory Ruling, and Order. Washington, D.C.: Federal Communications Commission, March 12, 2015. https://apps.fcc.gov/edocs_public/attachmatch/FCC-15-24A1.pdf.
Federal Trade Commission (FTC). Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers. Washington, D.C.: Federal Trade Commission, March 2012. https://www.ftc.gov/sites/default/files/documents/reports/federal-trade-commission-report-protecting-consumer-privacy-era-rapid-change-recommendations/120326privacyreport.pdf.
Feenberg, Andrew. Questioning Technology. New York: Routledge, 1999. http://www.loc.gov/catdir/enhancements/fy0649/98037421-d.html.
Feuz, Martin, Matthew Fuller, and Felix Stalder. “Personal Web Searching in the Age of Semantic Capitalism: Diagnosing the Mechanisms of Personalisation.” First Monday 16, no. 2 (2011). http://www.firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/3344/2766.
Fevolden, Arne Martin. “The Best of Both Worlds? A History of Time-Shared Microcomputers, 1977–1983.” IEEE Annals of the History of Computing 35, no. 1 (2013): 23–34.
Fichtner, Franco. “Bye Bye OpenDPI.” Lastsummer.de (blog), August 6, 2012. http://lastsummer.de/bye-bye-opendpi/.
Filip, Ondrej, Pavel Machek, Martin Mares, and Ondrej Zajicek. “The BIRD Internet Routing Daemon Project.” cz.nic. Accessed August 9, 2016. http://bird.network.cz/?get_doc&f=bird-1.html#ss1.1.
Finnie, Graham, and Heavy Reading (organization). ISP Traffic Management Technologies: The State of the Art. Ottowa, Ont.: Canadian Radio Television and Telecommunications Commission, 2009.
Fleischer, Rasmus. “Pirate Politics: From Accelerationism to Escalationism?” COPYRIOT (blog), January 13, 2010. http://copyriot.se/2010/01/13/pirate-politics-from-accelerationism-to-escalationism/.
Fleischer, Rasmus. “Piratbyran’s Speech at Reboot.” COPYRIOT (blog), June 3, 2006. http://copyriot.blogspot.com/2006/06/piratbyrans-speech-at-reboot.html.
Flyverbom, Mikkel. “Transparency: Mediation and the Management of Visibilities.” International Journal of Communication 10 (2016): 110–22.
Ford, L. R., and D. R. Fulkerson. “Maximal Flow through a Network.” Canadian Journal of Mathematics 8 (1956): 399–404. DOI: 10.4153/CJM-1956–045–5.
Foucault, Michel. Security, Territory, Population: Lectures at the College de France, 1977–1978. Edited by Michel Senellart. Translated by Graham Burchell. New York: Palgrave Macmillan, 2007.
Foucault, Michel. “Truth and Power.” In Power, edited by Paul Rabinow and James D. Faubion, 111–33. New York: New Press, 2000.
Frank, Howard. “Interview by Judy O’Neill.” March 30, 1990. Oral History series. Charles Babbage Institute, Center for the History of Information Processing, University of Minnesota. https://conservancy.umn.edu/handle/11299/107294.
Frank, Howard (principal investigator and project manager) and the National Analysis Corporation (NAC). First Annual Technical Report (15 October 1969 –15 June 1970) for the Project “Analysis and Optimization of Store-and-Forward Computer Networks.” October 15, 1970. Sponsored by Advanced Research Projects Agency, Department of Defense: ARPA Order No. 1523. http://www.dtic.mil/dtic/tr/fulltext/u2/707438.pdf.
Frank, Robert, Robert E. Kahn, and Leonard Kleinrock, “Computer Communication Network Design Experience with Theory and Practice.” 1972. https://archive.org/details/ComputerCommunicationNetworkDesignExperienceWithTheoryAndPractice.
Frank, Sam. “Come with Us If You Want to Live.” Harper’s Magazine, January 2015. http://harpers.org/archive/2015/01/come-with-us-if-you-want-to-live/.
FunChords [Robb Topolski]. “Comcast Is Using Sandvine to Manage P2P Connections.” DSL Reports Forums. Accessed September 6, 2016. https://www.dslreports.com/forum/r18323368-Comcast-is-using-Sandvine-to-manage-P2P-Connections.
Gabrys, Jennifer, Helen Pritchard, and Benjamin Barratt. “Just Good Enough Data: Figuring Data Citizenships through Air Pollution Sensing and Data Stories.” Big Data & Society 3, no. 2 (July–December 2016): 1–14. DOI: 10.1177/2053951716679677.
Galison, Peter Louis. “The Ontology of the Enemy: Norbert Wiener and the Cybernetic Vision.” Critical Inquiry 21, no. 1 (1994): 228–66.
Galison, Peter Louis. “War Against the Center.” Grey Room, no. 4 (Summer 2001): 5–33.
Galloway, Alexander. Protocol: How Control Exists After Decentralization. Cambridge, Mass.: MIT Press, 2004.
Galloway, Alexander, and Eugene Thacker. “Protocol, Control, and Networks.” Grey Room, no. 17 (Fall 2004): 6–29.
Galloway, Alexander, and Eugene Thacker. The Exploit: A Theory of Networks. Minneapolis: University of Minnesota Press, 2007.
Geere, Duncan. “Pirate Bay to Abandon .torrent Files for Magnet Links.” Ars Technica, January 13, 2012. http://arstechnica.com/tech-policy/news/2012/01/pirate-bay-to-abandon-torrent-files-for-magnet-links.ars.
Gehl, R. W. “The Archive and the Processor: The Internal Logic of Web 2.0.” New Media & Society 13, no. 8 (December 1, 2011): 1228–44. DOI: 10.1177/1461444811401735.
Gehl, Robert W. “Power/Freedom on the Dark Web: A Digital Ethnography of the Dark Web Social Network.” New Media & Society 18, no. 7 (August 1, 2016): 1219–35. DOI: 10.1177/1461444814554900.
Geist, Michael. “All Your Internets Belong to US, Continued: The Bodog.Com Case.” Michael Geist (blog), March 6, 2012. http://www.michaelgeist.ca/2012/03/bodog-case-column-post/.
Geist, Michael. “CRTC Issues Warning to Rogers: Address Throttling Concern or Face Public Hearing.” Michael Geist (blog), July 14, 2011. http://www.michaelgeist.ca/2011/07/crtc-warning-on-throttling/.
Geist, Michael. “CRTC Sets Net Neutrality Framework but Leaves Guarantees More Complaints.” Michael Geist (blog), October 21, 2009. http://www.michaelgeist.ca/content/view/4478/125/.
Geist, Michael. “Rogers Faces More Questions on World of Warcraft Throttling.” Michael Geist (blog), March 30, 2011. http://www.michaelgeist.ca/2011/03/rogers-wow-throttling/.
Georgescu-Roegen, Nicholas. “Entropy.” In The New Palgrave Dictionary of Economics, edited by Steven N. Durlauf and Lawrence E. Blume. 2nd ed. 8 vols. New York: Palgrave Macmillan, 2008. http://www.dictionaryofeconomics.com/article?id=pde1987_X000712.
Gerovitch, Slava. “InterNyet: Why the Soviet Union Did Not Build a Nationwide Computer Network.” History and Technology 24, no. 4 (2008): 335–50.
Gillespie, Tarleton. “Algorithms, Clickworkers, and the Befuddled Fury around Facebook Trends.” Culture Digitally, May 18, 2016. http://culturedigitally.org/2016/05/facebook-trends/.
Gillespie, Tarleton. “Designed to ‘Effectively Frustrate’: Copyright, Technology and the Agency of Users.” New Media & Society 8, no. 4 (August 1, 2006): 651–69.
Gillespie, Tarleton. “Engineering a Principle: ‘End-to-End’ in the Design of the Internet.” Social Studies of Science 36, no. 3 (2006): 427–57.
Gillespie, Tarleton. “The Politics of ‘Platforms.’” New Media & Society 12, no. 3 (May 1, 2010): 347–64.
Gillespie, Tarleton. “The Relevance of Algorithms.” In Media Technologies, edited by Tarleton Gillespie, Pablo Boczkowski, and Kirsten Foot, 167–94. Cambridge, Mass.: MIT Press, 2014.
Gillespie, Tarleton. Wired Shut: Copyright and the Shape of Digital Culture. Cambridge, Mass.: MIT Press, 2007.
Goldmonger. “Canada ISP Latency Issues.” World of Warcraft Forums, January 26, 2011. http://us.battle.net/forums/en/wow/topic/1965838937.
Goldsmith, Jack L., and Tim Wu. Who Controls the Internet? Illusions of a Borderless World. New York: Oxford University Press, 2006.
Goodin, Dan. “It Wasn’t Easy, but Netflix Will Soon Use HTTPS to Secure Video Streams.” Ars Technica, April 16, 2015. http://arstechnica.com/security/2015/04/it-wasnt-easy-but-netflix-will-soon-use-https-to-secure-video-streams/.
Google. “Load AMP Pages Quickly with Google AMP Cache.” Google Developers. Accessed June 16, 2016. https://developers.google.com/amp/cache/.
Grand View Research. Deep Packet Inspection (DPI) Market Analysis by Product (Standalone, Integrated), by Application (Government, Internet Service Provider, Enterprises, Education) and Segment Forecasts to 2020. June 2014. http://www.grandviewresearch.com/industry-analysis/deep-packet-inspection-market.
Grand View Research. Global Software Defined Networking (SDN) Market Analysis and Segment Forecasts to 2020: Software Defined Networking (SDN) Market Industry, Outlook, Size, Application, Product, Share, Growth Prospects, Key Opportunities, Dynamics, Trends, Analysis, Software Defined Networking (SDN) Report. April 2014. http://www.grandviewresearch.com/industry-analysis/software-defined-networking-sdn-market-analysis.
Greenberg, Andy. “Meet Telecomix, the Hackers Bent on Exposing Those Who Censor and Surveil the Internet.” Forbes, December 26, 2011. http://www.forbes.com/sites/andygreenberg/2011/12/26/meet-telecomix-the-hackers-bent-on-exposing-those-who-censor-and-surveil-the-internet/.
Greenberger, Martin, ed. Computers and the World of the Future. Cambridge, Mass.: MIT Press, 1964.
Greene, T., and L. Brown. “Route Control in AUTOVON Electronic Switching Centers.” IEEE Transactions on Communication Technology 17, no. 4 (1969): 442–46.
Greenwald, Glenn. “How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations.” The Intercept, February 24, 2014. https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/.
Greenwald, Glenn, and Ewen MacAskill. “NSA Prism Program Taps in to User Data of Apple, Google and Others.” The Guardian, June 7, 2013. http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data.
Gregg, Melissa, and Gregory J. Seigworth, eds. The Affect Theory Reader. Durham, N.C.: Duke University Press, 2010.
Grier, David Alan, and Mary Campbell. “A Social History of Bitnet and Listserv, 1985–1991.” IEEE Annals of the History of Computing 22, no. 2 (2000): 32–41.
Guenin, B., J. Könemann, and Levent Tuncel. A Gentle Introduction to Optimization. Cambridge: Cambridge University Press, 2014.
Guillory, John. “The Memo and Modernity.” Critical Inquiry 31, no. 1 (2004): 108–32.
Guins, Raiford. Edited Clean Version: Technology and the Culture of Control. Minneapolis: University of Minnesota Press, 2009.
Haakonii. Comment on Shifthead, “Rogers ISP, WoW, and You!” World of Warcraft Forums, December 22, 2010. http://us.battle.net/forums/en/wow/topic/1568009046?page=4#post-76.
Hafner, Katie, and Matthew Lyon, Where Wizards Stay Up Late: The Origins of the Internet. New York: Simon and Schuster, 1996.
Halliday, Josh. “British ISPs Will Block The Pirate Bay within Weeks.” Technology, The Guardian, April 30, 2012. http://www.guardian.co.uk/technology/2012/apr/30/british-isps-block-pirate-bay.
Hallinan, B., and T. Striphas. “Recommended for You: The Netflix Prize and the Production of Algorithmic Culture.” New Media & Society, 18, no. 1 (January 1, 2016): 117–37. DOI: 10.1177/1461444814538646.
Halsall, Andy. “The Pirate Bay Proxy, an Open Internet and Censorship.” Pirate Party UK, May 10, 2012. http://www.pirateparty.org.uk/blog/2012/may/10/pirate-bay-proxy-open-internet-and-censorship/.
Hamzeh, Kory, Gurdeep Singh Pall, William Verthein, Jeff Taarud, W. Andrew Little, and Glen Zorn. “RFC 2637—Point-to-Point Tunneling Protocol (PPTP) (RFC2637).” faqs.org, July, 1999. http://www.faqs.org/rfcs/rfc2637.html.
Haralanova, Christina, and Evan Light. “Enmeshed Lives? Examining the Potentials and the Limits in the Provision of Wireless Networks: The Case of Réseau Libre.” Journal of Peer Production, no. 9 (2016). http://peerproduction.net/issues/issue-9-alternative-internets/peer-reviewed-papers/enmeshed-lives/.
Haraway, Donna J. “Manifesto for Cyborgs: Science, Technology, and Socialist Feminism in the Late Twentieth Century.” In Simians, Cyborgs, and Women: The Reinvention of Nature, 149–82. New York: Routledge, 1991. Originally published in Socialist Review, no. 80 (1985): 65–108.
Harvey, David. “The Fetish of Technology: Causes and Consequences.” Macalester International 13, no. 1 (July 1, 2003), article 7. http://digitalcommons.macalester.edu/cgi/viewcontent.cgi?article=1411&context=macintl.
Hassan, Robert. Empires of Speed: Time and the Acceleration of Politics and Society. Leiden: Brill, 2009.
Hayles, N. Katherine. How We Became Posthuman: Virtual Bodies in Cybernetics, Literature, and Informatics. Chicago: University of Chicago Press, 1999.
Hayles, N. Katherine. “Print Is Flat, Code Is Deep: The Importance of Media-Specific Analysis.” Poetics Today 25, no. 1 (2004): 67–89.
Hayles, N. Katherine. “Self-Reflexive Metaphors in Maxwell’s Demon and Shannon’s Choice: Finding the Passages.” In Literature and Science: Theory & Practice, edited by Stuart Peterfreund, 209–38. Boston: Northeastern University Press, 1990.
Heart, Frank E., Robert E. Kahn, S. M. Ornstein, W. R. Crowther, and David C. Walden. “The Interface Message Processor for the ARPA Computer Network.” In Proceedings of the May 5–7, 1970, Spring Joint Computer Conference, 551–67. New York: Association for Computing Machinery, 1970. http://dl.acm.org/citation.cfm?id=1477021.
Helmond, Anne. “Adding the Bling: The Role of Social Media Data Intermediaries.” Culture Digitally (blog), May 7, 2014. http://culturedigitally.org/2014/05/adding-the-bling-the-role-of-social-media-data-intermediaries/.
Hicks, Marie. Programmed Inequality: How Britain Discarded Women Technologists and Lost Its Edge in Computing. History of Computing. Cambridge, Mass.: MIT Press. 2017.
Higginbotham, Stacey. “More Bad News about Broadband Caps: Many Meters Are Inaccurate.” GigaOM, February 7, 2013. http://gigaom.com/2013/02/07/more-bad-news-about-broadband-caps-many-meters-are-inaccurate/.
Hildebrandt, Amber, Michael Pereira, and Dave Seglins. “CSE Tracks Millions of Downloads Daily: Snowden Documents.” CBC News, January 27, 2015. http://www.cbc.ca/1.2930120.
Hogan, M. “Data Flows and Water Woes: The Utah Data Center.” Big Data & Society 2, no. 2 (August 10, 2015): 1–12. DOI: 10.1177/2053951715592429.
Holt, Jennifer. “Regulating Connected Viewing: Media Pipelines and Cloud Policy.” In Connected Viewing: Selling, Streaming, and Sharing Media in the Digital Age, edited by Jennifer Holt and Kevin Sanson, 19–39. New York: Routledge, 2014.
Hookway, Branden. Pandemonium: The Rise of Predatory Locales in the Postwar World. New York: Princeton Architectural Press, 1999.
Hörning, Karl H., Daniela Ahrens, and Anette Gerhard. “Do Technologies Have Time? New Practices of Time and the Transformation of Communication Technologies.” Time & Society 8, no. 2–3 (September 1, 1999): 293–308. DOI: 10.1177/0961463X99008002005.
Hossfeld, Tobias, Sebastian Egger, Raimund Schatz, Markus Fiedler, Kathrin Masuch, and Charlott Lorentzen. “Initial Delay vs. Interruptions: Between the Devil and the Deep Blue Sea.” In Fourth International Workshop on Quality of Multimedia Experience (QoMEX), 2012, 1–6. New York: IEEE, 2012. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6263849.
Howard, Philip N. Pax Technica: How the Internet of Things May Set Us Free or Lock Us Up. New Haven, Conn.: Yale University Press, 2015.
Hu, Tung-Hui. A Prehistory of the Cloud. Cambridge, Mass.: MIT Press. 2015.
Huston, Geoff. ISP Survival Guide: Strategies for Running a Competitive ISP. New York: Wiley, 1999. http://www.loc.gov/catdir/description/wiley033/98038660.html.
Ingham, Kenneth, and Stephanie Forrest. “Network Firewalls.” In Enhancing Computer Security with Smart Technology, edited by V. Rao Vemuri, 9–40. Boca Raton, Fla.: Auerbach, 2005.
Innis, Harold Adams. The Bias of Communication. 2nd ed. Toronto: University of Toronto Press, 1951.
Internet Corporation for Assigned Names and Numbers (ICANN). “First IDN CcTLDs Available.” ICANN, May 5, 2010. https://www.icann.org/news/announcement-2010-05-05-en.
Irix. Comment on Ressy, “Rogers Throttling/Deprioritizing World of Warcraft.” Rogers Community Forums, January 28, 2011. http://communityforums.rogers.com/t5/forums/forumtopicpage/board-id/Getting_connected/message-id/705#M705.
ISC8 Inc. “ISC8 Acquires Key Assets of Bivio Networks to Expand into ‘Big Data’ Network Cybersecurity Market.” Marketwired, September 4, 2012. http://www.marketwired.com/press-release/isc8-acquires-key-assets-bivio-networks-expand-into-big-data-network-cybersecurity-market-otcbb-isci-1696769.htm.
Isenberg, David S. “The Dawn of the ‘Stupid Network.’” NetWorker 2, no. 1 (1998): 24–31.
Jacobs, John E. “SAGE Overview.” Annals of the History of Computing 5, no. 4 (1983): 4.
Johns, Adrian. Piracy: The Intellectual Property Wars from Gutenberg to Gates. Chicago: University of Chicago Press, 2010.
Jones, Ben. “The Pirate Bay in the Hot Seat.” TorrentFreak, January 24, 2007. http://torrentfreak.com/the-pirate-bay-in-the-hot-seat/.
Julkunen, H., and C. E. Chow. “Enhance Network Security with Dynamic Packet Filter.” In Proceedings of the 7th International Conference on Computer Communications and Networks, 1998, 268–75. New York: IEEE, 1998. DOI: 10.1109/ICCCN.1998.998786.
Juniper Networks. “NorthStar Controller Web User Interface Guide.” July 13, 2016. http://www.juniper.net/techpubs/en_US/northstar2.1.0/information-products/pathway-pages/2.1/northstar-web-user-interface.pdf.
Juniper Networks. “NorthStar WAN SDN Network Controller.” Accessed July 21, 2016. https://www.juniper.net/us/en/products-services/sdn/northstar-network-controller/.
Kafka, Peter. “How One Company Figured Out How Many People Watch Netflix’s New Shows—And How Netflix Stopped Them.” Recode, August 8, 2014. http://www.recode.net/2014/8/8/11629692/how-one-company-figured-out-how-many-people-watch-netflixs-new-shows.
Kahn, Robert E. “Interview by Judy O’Neill.” April 24, 1990. Oral History series. Charles Babbage Institute, Center for the History of Information Processing, University of Minnesota. https://conservancy.umn.edu/handle/11299/107387.
Kaiser, Christian. “HTML5 and Video Streaming.” The Netflix Tech Blog, December 22, 2010. http://techblog.netflix.com/2010/12/html5-and-video-streaming.html.
Kakhki, Arash Molavi, Fangfan Li, David Choffnes, Ethan Katz-Bassett, and Alan Mislove. “BingeOn Under the Microscope: Understanding T-Mobiles Zero-Rating Implementation.” David Choffnes website. http://david.choffnes.com/pubs/bingeon_sigcomm16.pdf. DOI: 10.1145/2940136.2940140.
Kaplan, Steven M. Wiley Electrical and Electronics Engineering Dictionary. Hoboken, N.J.: Wiley-Interscience, 2004.
Karas, D. “Network Measurement Program (NMP).” June 30, 1970. Kleinrock Internet History Center. http://digital2.library.ucla.edu/viewItem.do?ark=21198/zz002dj6tj.
Karpf, David. The MoveOn Effect: The Unexpected Transformation of American Political Advocacy. New York: Oxford University Press, 2012.
Kelty, Christopher. Two Bits: The Cultural Significance of Free Software. Durham, N.C.: Duke University Press, 2008.
Kimball, Danny. “Wonkish Populism in Media Advocacy and Net Neutrality Policy Making.” International Journal of Communication 10 (2016): 5949–68.
KingNerd. Comment on Ressy, “Rogers Throttling/Deprioritizing World of Warcraft.” Rogers Community Forums, January 25, 2011. http://communityforums.rogers.com/t5/forums/forumtopicpage/board-id/Getting_connected/message-id/633#M633.
Kiss, Jemima. “The Pirate Bay Trial: Guilty Verdict.” The Guardian, April 17, 2009. http://www.guardian.co.uk/technology/2009/apr/17/the-pirate-bay-trial-guilty-verdict.
Kita, Chigusa Ishikawa. “J. C. R. Licklider’s Vision for the IPTO.” IEEE Annals of the History of Computing 25, no. 3 (July 2003): 62–77. DOI: 10.1109/MAHC.2003.1226656.
Kleinrock, Leonard. “An Early History of the ARPANET.” IEEE Communications Magazine 48, no. 8 (August 2010): 26–36. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5534584
Kleinrock, Leonard. “On Flow Control in Computer Networks.” In ConferenceRecord: 1978 International Conference on Communications, Toronto, Canada, June 4–7, 1978, 2:27.2.1–5. New York: IEEE, 1978. https://www.lk.cs.ucla.edu/data/files/Kleinrock/On%20Flow%20Control%20in%20Computer%20Networks.pdf.
Kleinrock, Leonard. “Principles and Lessons in Packet Communications.” Proceedings of the IEEE 66, no. 11 (1978): 1320–29.
Kleinrock, Leonard. Communication Nets: Stochastic Message Flow and Delay. New York: McGraw-Hill, 1964.
Kleinrock, Leonard. “Optimum Bribing for Queue Position.” Operations Research, April 1, 1967, 304–17. DOI: 10.1287/opre.15.2.304.
Kline, Stephen, Nick Dyer-Witheford, and Greig de Peuter. Digital Play: The Interaction of Technology, Culture, and Marketing. Montreal: McGill-Queen’s University Press, 2003.
Klose, Simon, dir. TPB AFK: The Pirate Bay Away from Keyboard. 2013. YouTube Video. 1:22:07. https://www.youtube.com/watch?v=eTOKXCEwo_8.
Krashinsky, Susan. “Rogers to Offer Promotional Ads by Text.” Globe and Mail, October 2, 2013. http://www.theglobeandmail.com/report-on-business/industry-news/marketing/rogers-to-offer-promotional-ads-by-text/article14646004/.
Kreiss, Daniel. Taking Our Country Back: The Crafting of Networked Politics from Howard Dean to Barack Obama. New York: Oxford University Press, 2012.
Krishnan, S. Shunmuga, and Ramesh K. Sitaraman. “Video Stream Quality Impacts Viewer Behavior: Inferring Causality Using Quasi-Experimental Designs.” In Proceedings of the 2012 ACM Conference on Internet Measurement Conference, 211–24. New York: Association for Computing Machines, 2012. http://people.cs.umass.edu/~ramesh/Site/PUBLICATIONS_files/imc208-krishnan.pdf.
Kuehn, Andreas, and Milton Mueller. Profiling the Profilers: Deep Packet Inspection and Behavioral Advertising in Europe and the United States. Rochester, N.Y.: Social Science Research Network, September 1, 2012. http://papers.ssrn.com/abstract=2014181.
Kuerbis, Brenden, and Milton Mueller. “Securing the Root.” In DeNardis, Opening Standards, 45–62.
Kupferman, Steve. “How World of Warcraft Players Got Rogers to Admit It Was Wrong.” Torontoist, April 5, 2011. http://torontoist.com/2011/04/how_world_of_warcraft_players_got_rogers_to_admit_it_was_wrong/.
Kurra, Babu. “Egypt Shut Down Its Net with a Series of Phone Calls.” Wired, January 28, 2011. http://www.wired.com/2011/01/egypt-isp-shutdown/.
Kurs, Simon. “Yo Ho Ho: Buccanerds Give Studios a Broadside.” Sunday Times, January 7, 2007. https://www.thetimes.co.uk/article/yo-ho-ho-buccanerds-give-studios-a-broadside-hshv9lcgw3x.
Lampland, Martha, and Susan Leigh Star, eds. Standards and Their Stories: How Quantifying, Classifying, & Formalizing Shape Everyday Life. Ithaca, N.Y.: Cornell University Press, 2009.
Land, Chris. “Flying the Black Flag: Revolt, Revolution and the Social Organization of Piracy in the ‘Golden Age.’” Management & Organizational History 2, no. 2 (2007): 169–92.
Langlois, Ganaele. “Meaning, Semiotechnologies and Participatory Media.” Culture Machine 12 (2011):1–27.
Langlois, Ganaele, and Greg Elmer. “Wikipedia Leeches? The Promotion of Traffic through a Collaborative Web Format.” New Media & Society 11, no. 5 (August 1, 2009): 773–94.
Langlois, Ganaele, Greg Elmer, Fenwick McKelvey, and Zachary Devereaux. “Networked Publics: The Double Articulation of Code and Politics on Facebook.” Canadian Journal of Communication 34, no. 3 (2009): 415–33.
Langlois, Ganaele, Fenwick McKelvey, Greg Elmer, and Kenneth Werbin. “Mapping Commercial Web 2.0 Worlds: Towards a New Critical Ontogenesis.” Fibreculture 14 (2009). http://fourteen.fibreculturejournal.org/fcj-095-mapping-commercial-web-2-0-worlds-towards-a-new-critical-ontogenesis/.
Lash, Scott. Critique of Information. Thousand Oaks, Calif.: SAGE, 2002.
Lash, Scott. “Power after Hegemony: Cultural Studies in Mutation?” Theory, Culture & Society 24, no. 3 (2007): 55–78.
Latham, Robert. “Border Formations: Security and Subjectivity at the Border.” Citizenship Studies 14, no. 2 (April 2010): 185–201. DOI: 10.1080/13621021003594858.
Latham, Robert. “Networks, Information, and the Rise of the Global Internet.” In Digital Formations: IT and New Architectures in the Global Realm, edited by Robert Latham and Saskia Sassen, 146–77. Princeton, N.J.: Princeton University Press, 2005.
Lawson, Stephen. “Blue Coat to Acquire Packeteer for $268 Million.” COMPUTERWORLD, April 22, 2008. https://www.computerworld.com/article/2536756/networking/blue-coat-to-acquire-packeteer-for--268m.html.
Lazar, Jonathan, Adam Jones, and Ben Shneiderman. “Workplace User Frustration with Computers: An Exploratory Investigation of the Causes and Severity.” Behaviour & Information Technology 25, no. 3 (May 2006): 239–51. DOI: 10.1080/01449290500196963.
Le, Tung M., and Jason But. Bittorrent Traffic Classification: Technical Report 91022A. Melbourne, Australia: Centre for Advanced Internet Architectures, Swinburne University of Technology, October 2009. https://www.researchgate.net/publication/228786640_BitTorrent_Traffic_Classification.
Lee, J. A. N. “Claims to the Term ‘Time-Sharing.’” IEEE Annals of the History of Computing 14, no. 1 (1992): 16–17.
Lee, Terence. “Internet Control and Auto-Regulation in Singapore.” Surveillance & Society 3, no. 1 (2005): 74–95.
Lee, Timothy B. “Report: NSA Can ‘Reach Roughly 75% of All U.S. Internet Traffic.’” Washington Post, August 20, 2013. http://www.washingtonpost.com/blogs/the-switch/wp/2013/08/20/report-nsa-can-reach-roughly-75-of-all-u-s-internet-traffic/.
Leff, Harvey S., and Andrew F. Rex. Maxwell’s Demon: Entropy, Information, Computing. Princeton, N.J.: Princeton University Press, 1990.
Legout, A., G. Urvoy-Keller, and P. Michiardi. “Understanding Bittorrent: An Experimental Perspective.” Technical Report for Inria Sophia Antipolis - Méditerrané, Iria Grenoble-Rhône-Alpes, and Institut Eurecom, November 9, 2005. http://www.eurecom.fr/en/publication/1933/download/ce-urvogu-051109.pdf.
Leiner et al. “The Past and Future History of the Internet.” Communications of the ACM 40, no. 2 (February 1997): 102–8.
Lessig, Lawrence. Code: Version 2.0. New York: Basic Books, 2006.
Levy, Steven. “(Some) Attention Must Be Paid!” Newsweek, March 26, 2006. http://www.newsweek.com/some-attention-must-be-paid-106439.
Lewis, Michael. “The Wolf Hunters of Wall Street: An Adaptation from ‘Flash Boys: A Wall Street Revolt,’ by Michael Lewis.” New York Times, March 31, 2014. http://www.nytimes.com/2014/04/06/magazine/flash-boys-michael-lewis.html.
Lewis, Michael. Flash Boys: A Wall Street Revolt. New York: W. W. Norton, 2014.
Leyshon, Andrew. “Time–Space (and Digital) Compression: Software Formats, Musical Networks, and the Reorganisation of the Music Industry.” Environment and Planning A: Economy and Space 33, no. 1 (2001): 49–77.
Li, Fangfan, Arash Molavi Kakhki, David Choffnes, Phillipa Gill, and Alan Mislove. “Classifiers Unclassified: An Efficient Approach to Revealing IP Traffic Classification Rules.” Paper presented at the 16th Annual Association for Computing Machines Internet Measuring Conference, Los Angeles, Calif., October 31 through November 2, 2016. http://david.choffnes.com/pubs/ClassifiersUnclassified-IMC16.pdf.
Libbenga, Jan. “The Pirate Bay Plans to Buy Sealand.” The Register, January 12, 2007. http://www.theregister.co.uk/2007/01/12/pirate_bay_buys_island/.
Licklider, Joseph Carl Robnett. “Man-Computer Symbiosis.” IRE Transactions on Human Factors in Electronics HFE-1, no. 1 (1960): 4–11.
Licklider, Joseph Carl Robnett. “Memorandum for Members and Affiliates of the Intergalactic Computer Network,” December 11, 2001. http://www.kurzweilai.net/memorandum-for-members-and-affiliates-of-the-intergalactic-computer-network.
Licklider, Joseph Carl Robnett, and Robert W. Taylor. “The Computer as a Communication Device.” Science and Technology for the Technical Men in Management, April 1968. http://memex.org/licklider.pdf.
Light, Jennifer S. “When Computers Were Women.” Technology and Culture 40, no. 3 (1999): 455–83.
Lindgren, Simon, and Jessica Linde. “The Subpolitics of Online Piracy: A Swedish Case Study.” Convergence: The International Journal of Research into New Media Technologies 18, no. 2 (March 1, 2012): 143–64. DOI: 10.1177/1354856511433681.
Lippmann, Walter. Public Opinion. New York: Macmillan, 1922. Reprint, New York: Free Press Paperbacks, 1997.
Löblich, Maria, and Francesca Musiani. “Network Neutrality and Communication Research: The Implications of Internet Infrastructure for the Public Sphere.” In Communication Yearbook 38, edited by Elisia L. Cohen, 339–68. New York: Routledge, 2014.
Lohr, Steve. “Impatient Web Users Flee Slow-loading Sites.” Technology, New York Times, February 29, 2012. http://www.nytimes.com/2012/03/01/technology/impatient-web-users-flee-slow-loading-sites.html.
Lukasik, Stephen J. “Why the ARPANET Was Built.” IEEE Annals of the History of Computing 33, no. 3 (2011): 4–21.
Lungu, Dov, and Zbigniew Stachniak. “Following TRACE: The Computer Hobby Movement in Canada.” Scientia Canadensis: Canadian Journal of the History of Science, Technology and Medicine 34, no. 1 (2011): 1. DOI: 10.7202/1006926ar.
MacAskill, Ewen, Julian Borger, Nick Hopkins, Nick Davies, and James Ball. “GCHQ Taps Fibre-Optic Cables for Secret Access to World’s Communications.” The Guardian, June 21, 2013. http://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa.
Mackay, Robin, and Armen Avanessian, eds. #Accelerate: The Accelerationist Reader. Falmouth, UK: Urbanomic, 2014.
Mackenzie, Adrian. “Java: The Practical Virtuality of Internet Programming.” New Media & Society 8, no. 3 (June 1, 2006): 441–65.
Mackenzie, Adrian. Wirelessness: Radical Empiricism in Network Cultures. Cambridge, Mass.: MIT Press, 2010.
Mackenzie, Adrian. Transductions: Bodies and Machines at Speed. Technologies: Studies in Culture & Theory. New York: Continuum, 2002.
Mager, Astrid. “Algorithmic Ideology: How Capitalist Society Shapes Search Engines.” Information, Communication & Society 15, no. 5 (June 2012): 769–87. DOI: 10.1080/1369118X.2012.676056.
Mailland, Julien, and Kevin Driscoll. Minitel: Welcome to the Internet. Platform Studies. Cambridge, Mass.: MIT Press, 2017.
Manjoo, Farhad. “Facebook’s Bias Is Built-In, and Bears Watching.” Technology, New York Times, May 11, 2016. http://www.nytimes.com/2016/05/12/technology/facebooks-bias-is-built-in-and-bears-watching.html.
Mansell, Robin. “From Digital Divides to Digital Entitlements in Knowledge Societies.” Current Sociology 50, no. 3 (May 1, 2002): 407–26. DOI: 10.1177/0011392102050003007.
Mansell, Robin. Imagining the Internet: Communication, Innovation, and Governance. New York: Oxford University Press, 2012.
Margonis, Frank. “John Dewey’s Racialized Visions of the Student and Classroom Community.” Educational Theory 59, no. 1 (February 1, 2009): 17–39. DOI: 10.1111/j.1741–5446.2009.00305.x.
Marill, Thomas, and Lawrence Roberts. “Toward a Cooperative Network of Time-Shared Computers.” In Proceedings of the November 7–10, 1966, Fall Joint Computer Conference, 425–31. New York: Association for Computing Machines, 1966
Marques, Eduardo, Lina de Bito, Paulo Sampaio, and Laura Rodriguez Peralta. “An Analysis of Quality of Service Architectures: Principles, Requirements, and Future Trends.” In Intelligent Quality of Service Technologies and Network Management: Models for Enhancing Communication, edited by Pattarasinee Bhattarakosol, 15–35. Hershey, Pa.: IGI Global, 2010.
Marquis-Boire, Morgan, Jakub Dalek, Sarah McKune, Matthew Carrieri, Masashi Crete-Nishihata, Ron Deibert, Saad Omar Khan, Helmi Noman, John Scott-Railton, and Greg Wiseman. Planet Blue Coat: Mapping Global Censorship and Surveillance Tools. Toronto, Ontario: The Citizen Lab, January 15, 2013. https://citizenlab.org/2013/01/planet-blue-coat-mapping-global-censorship-and-surveillance-tools/.
Marres, Noortje. “Front-Staging Nonhumans: Publicity as a Constraint on the Political Activity of Things.” In Political Matter: Technoscience, Democracy, and Public Life, edited by Bruce Braun and Sarah J. Whatmore, 177–210. Minneapolis: University of Minnesota Press, 2010.
Marsden, Christopher T. Network Neutrality: From Policy to Law to Regulation. Manchester, UK: Manchester University Press, 2017.
Massumi, Brian. “Potential Politics and the Primacy of Preemption.” Theory & Event 10, no. 2 (2007). http://muse.jhu.edu/journals/theory_and_event/v010/10.2massumi.html. DOI: 10.1353/tae.2007.0066
Massumi, Brian. The Power at the End of the Economy. Durham, N.C.: Duke University Press, 2015.
Massumi, Brian. “Translator’s Note.” In Deleuze and Guattari, A Thousand Plateaus, xvii–xix.
Mathison, Stuart L., Lawrence G. Roberts, and Philip M. Walker. “The History of Telenet and the Commercialization of Packet Switching in the U.S.” IEEE Communications Magazine 50, no. 5 (May 2012): 28–45. DOI: 10.1109/MCOM.2012.6194380.
Maxwell, James. Theory of Heat. New York: D. Appleton, 1872.
May, Jon, and Nigel Thrift, eds. TimeSpace: Geographies of Temporality. London: Routledge, 2001.
Mayer, Jonathan. “How Verizon’s Advertising Header Works.” Web Policy, October 24, 2014. http://webpolicy.org/2014/10/24/how-verizons-advertising-header-works/.
Mayr, Otto. The Origins of Feedback Control. Cambridge, Mass.: MIT Press, 1970.
McCormick, Rich. “4.6 Million Snapchat Phone Numbers and Usernames Leaked.” The Verge, January 1, 2014. http://www.theverge.com/2014/1/1/5262740/4-6-million-snapchat-phone-numbers-and-usernames-leaked.
McKelvey, Fenwick. “A Programmable Platform? Drupal, Modularity, and the Future of the Web.” Fibreculture, no. 18 (2011): 232–54.
McKelvey, Fenwick. “Ends and Ways: The Algorithmic Politics of Network Neutrality.” Global Media Journal—Canadian Edition 3, no. 1 (2010): 51–73.
McKelvey, Fenwick. “Openness Compromised? Questioning the Role of Openness in Digital Methods and Contemporary Critical Praxis.” In Compromised Data: From Social Media to Big Data, edited by Greg Elmer, Ganaele Langlois, and Joanna Redden, 126–46. New York: Bloomsbury Academic, 2015.
McKelvey, Fenwick. “We Like Copies, Just Don’t Let the Others Fool You: The Paradox of The Pirate Bay.” Television & New Media 16, no. 8 (2015): 734–50. DOI: 10.1177/1527476414542880.
McKelvey, Fenwick. “Algorithmic Media Need Democratic Methods: Why Publics Matter.” Canadian Journal of Communication 39, no. 4 (2014): 597–613. http://www.fenwickmckelvey.com/wp-content/uploads/2014/11/2746-9231-1-PB.pdf.
McKelvey, Fenwick, Matthew Tiessen, and Luke Simcoe. “A Consensual Hallucination No More? The Internet as Simulation Machine.” European Journal of Cultural Studies 18, no. 4–5 (2015): 577–94.
McMahon, Rob, Michael Gurstein, Brian Beaton, Susan O’Donnell, and Tim Whiteduck. “Making Information Technologies Work at the End of the Road.” Journal of Information Policy 4, no. 1 (May 27, 2014): 250–69. DOI: 10.5471/jip.v4i0.146.
McQuillan, John M. “The Birth of Link-State Routing.” IEEE Annals of the History of Computing 31, no. 1 (2009): 68–71.
McQuillan, John M., William R. Crowther, Bernard P. Cosell, David C. Walden, and Frank E. Heart. “Improvements in the Design and Performance of the ARPA Network.” In Proceedings of the December 5–7, 1972, Fall Joint Computer Conference, Part II, 741–54. New York: Association for Computing Machines, 1972. http://dl.acm.org/citation.cfm?id=1480096.
McStay, Andrew. “Profiling Phorm: An Autopoietic Approach to the Audience-as-Commodity.” Surveillance & Society 8, no. 3 (2010): 310–22.
Menn, Joseph, and Dustin Volz. “Google, Facebook Quietly Move toward Automatic Blocking of Extremist Videos.” Reuters, June 24, 2016. http://www.reuters.com/article/us-internet-extremism-video-exclusive-idUSKCN0ZB00M.
Menzies, Heather. No Time: Stress and the Crisis of Modern Life. Vancouver, British Columbia: Douglas & McIntyre, 2005.
Meyer, Robinson. “Everything We Know About Facebook’s Secret Mood Manipulation Experiment.” The Atlantic, June 28, 2014. http://www.theatlantic.com/technology/archive/2014/06/everything-we-know-about-facebooks-secret-mood-manipulation-experiment/373648/.
Miegel, Fredrik, and Tobias Olsson. “From Pirates to Politician: The Story of the Swedish File Sharers Who Became a Political Party.” In Democracy, Journalism and Technology: New Developments in an Enlarged Europe, edited by Nico Carpentier, Pille Pruulmann-Vengerfeldt, Kaarle Nordenstreng, Maren Hartmann, Peeter Vihalemm, Bart Cammaerts, Hannu Nieminen, and Tobias Olsson, 203–17. Tartu, Estonia: Tartu University Press, 2008.
Miller, Robert B. “Response Time in Man-Computer Conversational Transactions.” In Proceedings of the December 9–11, 1968, Fall Joint Computer Conference, Part I, 267–77. New York: Association for Computing Machines, 1968. DOI: 10.1145/1476589.1476628.
Mills, D. L. “The Fuzzball.” In SIGCOMM ’88: Proceedings of the ACM Symposium on Communications Architectures and Protocols, 115–22. New York: Association for Computing Machines, 1988. DOI: 10.1145/52324.52337.
Mindell, David A. Between Human and Machine: Feedback, Control, and Computing before Cybernetics. Baltimore, Md.: Johns Hopkins University Press, 2002.
Mirowski, Philip. Machine Dreams: Economics Becomes a Cyborg Science. New York: Cambridge University Press, 2002.
Mirowski, Philip, and Edward Nik-Khah. The Knowledge We Have Lost in Information: The History of Information in Modern Economics. New York: Oxford University Press, 2017.
Mittelstadt, B. D., P. Allo, M. Taddeo, S. Wachter, and L. Floridi. “The Ethics of Algorithms: Mapping the Debate.” Big Data & Society 3, no. 2 (December 1, 2016). DOI: 10.1177/2053951716679679.
Molyneux, Robert, and Robert Williams. “Measuring the Internet.” In Annual Review of Information Science and Technology 34 (1999): 287–339.
Moschovitis, Christos J. P. History of the Internet: A Chronology, 1843 to the Present. Santa Barbara, Calif.: ABC-CLIO, 1999.
Mosco, Vincent. The Digital Sublime: Myth, Power, and Cyberspace. Cambridge, Mass.: MIT Press, 2004.
Mosco, Vincent. The Political Economy of Communication: Rethinking and Renewal. 2nd ed. Thousand Oaks, Calif.: SAGE, 2009.
Moya, Jared. “Swedish Prosecutor Won’t Investigate Top Cop’s MPAA Ties.” ZeroPaid, July 9, 2008. http://www.zeropaid.com/news/9622/swedish_prosecutor_wont_investigate_top_cops_mpaa_ties/.
Mueller, Milton. Ruling the Root: Internet Governance and the Taming of Cyberspace. Cambridge, Mass.: MIT Press, 2002.
Mueller, Milton, and Hadi Asghari. “Deep Packet Inspection and Bandwidth Management: Battles over BitTorrent in Canada and the United States.” Paper presented at the Telecommunications Policy Research Conference, 2011. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1989644##.
Mueller, Milton, and Hadi Asghari. “Deep Packet Inspection and Bandwidth Management: Battles over BitTorrent in Canada and the United States.” Telecommunications Policy 36, no. 6 (July 2012): 462–75. DOI: 10.1016/j.telpol.2012.04.003.
Mueller, Milton, Andreas Kuehn, and Stephanie Michelle Santoso. “Policing the Network: Using DPI for Copyright Enforcement.” Surveillance & Society 9, no. 4 (2012): 348–64.
Mumford, Lewis. Technics and Civilization. New York: Harcourt, Brace, 1934.
Murphy, Brian Martin. “A Critical History of the Internet.” In Elmer, Critical Perspectives on the Internet, 27–45.
Muuss, Mike. “The Story of the PING Program.” Accessed March 31, 2014. http://ftp.arl.army.mil/~mike/ping.html.
Nagy, P., and G. Neff. “Imagined Affordances: Reconstructing a Keyword for Communication Theory.” Social Media + Society 1, no. 2 (2015): 1–9. DOI: 10.1177/2056305115603385.
Neilson, Brett, and Ned Rossiter. “Precarity as a Political Concept, or, Fordism as Exception.” Theory, Culture & Society 25, no. 7–8 (December 1, 2008): 51–72. DOI: 10.1177/0263276408097796.
NetFlix. 2012 Annual Report. Los Gatos, Calif.: Netflix, 2012. https://ir.netflix.com/static-files/96d37061-9312-4853-9a41-8c5df8efbca8.
Nhan, Johnny, Laura Huey, and Ryan Broll. “Digilantism: An Analysis of Crowdsourcing and the Boston Marathon Bombings.” British Journal of Criminology 57, no. 2 (March 1, 2017): 341–61. DOI: 10.1093/bjc/azv118.
Noam, Eli M. Interconnecting the Network of Networks. Cambridge, Mass.: MIT Press, 2001.
Norberg, Arthur L., and Judy E. O’Neill. Transforming Computer Technology: Information Processing for the Pentagon, 1962–1986. Baltimore, Md.: Johns Hopkins University Press, 1996.
Norris, Pippa. Digital Divide: Civic Engagement, Information Poverty, and the Internet Worldwide. Cambridge: Cambridge University Press, 2001.
Norton, Quinn. “Secrets of the Pirate Bay.” Wired, August 16, 2006. http://www.wired.com/science/discoveries/news/2006/08/71543.
Nowak, Peter. “CRTC Opens Net Neutrality Debate to Public,” Technology & Science, CBC News, May 15, 2008. http://www.cbc.ca/news/technology/story/2008/05/15/tech-internet.html.
Noys, Benjamin. Malign Velocities: Accelerationism and Capitalism. London: Zero Books, 2014.
Obar, Jonathan A. “Closing the Technocratic Divide? Activist Intermediaries, Digital Form Letters, and Public Involvement in FCC Policy Making.” International Journal of Communication 10 (November 8, 2016): 5865–88.
Office of the Privacy Commissioner of Canada, ed. Deep Packet Inspection Essay Project, March 28, 2013. https://www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy-research/?Page=9.
O’Neill, Judy. “The Role of ARPA in the Development of the ARPANET, 1961–1972.” IEEE Annals 17, no. 4 (1995): 76–81.
O’Neill, Megan. “YouTube Responds to Reply Girls, Changes Related & Recommended Videos Algorithm.” SocialTimes, March 13, 2012. http://www.adweek.com/socialtimes/youtube-reply-girls/92439.
Openwave Mobility. “Openwave Mobility First to Use Quality-Aware Optimization for Live Gaming Broadcasts.” Openwave Mobility Press Releases, October 15, 2015. https://owmobility.com/press-releases/openwave-mobility-first-use-quality-aware-optimization-live-gaming-broadcasts/.
Oram, Andrew, ed. Peer-to-Peer: Harnessing the Power of a Disruptive Technology. Sebastopol, Calif.: O’Reilly, 2001. http://library.uniteddiversity.coop/REconomy_Resource_Pack/More_Inspirational_Videos_and_Useful_Info/Peer_to_Peer-Harnessing_the_Power_of_Disruptive_Technologies.pdf.
Oxford English Dictionary. “Metastable, Adj.” OED Online. Oxford University Press. Accessed September 22, 2016. http://www.oed.com.
Paasonen, Susanna, Ken Hillis, and Michael Petit. “Introduction: Networks of Transmission: Intensity, Sensation, Value.” In Networked Affect, edited by Ken Hillis, Susanna Paasonen, and Michael Petit, 1–26. Cambridge: MIT Press, 2015.
Packeteer Inc. Packeteer’s PacketShaper/ISP. 2001. http://archive.icann.org/en/tlds/org/applications/unity/appendices/pdfs/packeteer/PSISP_colorB1101.pdf.
Packeteer Inc. Packetshaper Packetseeker Getting Started Guide. 2002. https://bto.bluecoat.com/packetguide/5.3.0/documents/PacketShaper_Getting_Started_v53.pdf.
Paine, Jeff. “50 Shades of Net Neutrality Is Here.” Saisei (blog), November 10, 2014. http://saisei.com/50-shades-net-neutrality/.
Papacharissi, Zizi. Affective Publics: Sentiment, Technology, and Politics. Oxford Studies in Digital Politics. New York: Oxford University Press, 2015.
Pargman, Daniel, and Jacob Palme. “ASCII Imperialism.” In Lampland and Star, Standards and Their Stories, 177–99.
Pariser, Eli. The Filter Bubble: What the Internet Is Hiding from You. New York: Penguin Press, 2011.
Parks, Lisa. “Infrastructure.” In Keywords for Media Studies, edited by Laurie Ouellette and Jonathan Gray, 106–7. New York: New York University Press, 2017.
Parks, Lisa, and Nicole Starosielski. “Introduction.” In Signal Traffic: Critical Studies of Media Infrastructures, edited by Lisa Parks and Nicole Starosielski, 1–30. Champaign: University of Illinois Press, 2015.
Parnell, Brid-Aine. “Epic Net Outage in Africa as FOUR Undersea Cables Chopped.” The Registrar, February 28, 2012. http://www.theregister.co.uk/2012/02/28/east_africa_undersea_cables_cut/.
Parsons, Christopher. Deep Packet Inspection in Perspective: Tracing Its Lineage and Surveillance Potentials. Kingston, Ont.: The New Transparency, Queens University Department of Sociology, January 10, 2008. https://qspace.library.queensu.ca/bitstream/1974/1939/1/WP_Deep_Packet_Inspection_Parsons_Jan_2008.pdf.
Parsons, Christopher. “Rogers, Network Failures, and Third-Party Oversight.” Technology, Thoughts & Trinkets (blog), December 2, 2010. https://www.christopher-parsons.com/rogers-network-failures-and-third-party-oversight/.
Parsons, Christopher. “The Politics of Deep Packet Inspection: What Drives Surveillance by Internet Service Providers?” PhD diss., University of Victoria, 2013.
Pasquale, Frank. The Black Box Society: The Secret Algorithms That Control Money and Information. Cambridge, Mass.: Harvard University Press, 2015.
Paterson, Nancy. “Bandwidth Is Political: Reachability in the Public Internet.” Rochester, N.Y.: Social Science Research Network, November 18, 2013. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2355762.
Paterson, Nancy. “End User Privacy and Policy-Based Networking.” Journal of Information Policy 4 (2014): 28–43. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2401834.
Patowary, Kaushik. “Security Flaw Makes PPTP VPN Useless for Hiding IP on BitTorrent.” Instant Fundas, June 18, 2010. http://www.instantfundas.com/2010/06/security-flaw-makes-pptp-vpn-useless.html.
Paul, Ryan. “Canadian ISP Tests Injecting Content into Web Pages.” Ars Technica, December 11, 2007. http://arstechnica.com/uncategorized/2007/12/canadian-isp-tests-injecting-content-into-web-pages/.
Paulsen, Gard. “When Switches Became Programs: Programming Languages and Telecommunications, 1965–1980.” IEEE Annals of the History of Computing 36, no. 4 (2014): 38–50.
Pearce, Katy E., and Jessica Vitak. “Performing Honor Online: The Affordances of Social Media for Surveillance and Impression Management in an Honor Culture.” New Media & Society 18, no. 11 (December 1, 2016): 2595–612. DOI: 10.1177/1461444815600279.
Peters, Benjamin. How Not to Network a Nation: The Uneasy History of the Soviet Internet. Cambridge, Mass.: MIT Press, 2016.
Peters, John Durham. The Marvelous Clouds: Toward a Philosophy of Elemental Media. Chicago: University of Chicago Press, 2015.
Peterson, Kim. “Speakeasy Founder Leaves for New Venture,” Business & Technology, Seattle Times, April 4, 2006. http://community.seattletimes.nwsource.com/archive/?date=20060404&slug=webookla04.
Pfaffenberger, Bryan. “‘If I Want It, It’s OK’: Usenet and the (Outer) Limits of Free Speech.” Information Society 12, no. 4 (November 1, 1996): 365–86. DOI: 10.1080/019722496129350.
Pickering, Andrew. “Cyborg History and the World War II Regime.” Perspectives on Science 3, no. 1 (1995): 1–48.
Pike, Rob. Systems Software Research Is Irrelevant. February 21, 2000. http://www.inf.ufes.br/~raulh/ufes/teaching/courses/sc/page/texts/utah200.pdf.
Pike, Rob, Dave Presotto, Sean Dorward, Bob Flandrenda, Ken Thompson, Howard Trickey, and Phil Winterbottom. “Plan 9 from Bell Labs.” Computer Systems 8, no. 3 (1995): 221–54.
Pirate Bay, The. “POwr, xxxx, Broccoli and KOPIMI.” February 25, 2009. http://cs.gettysburg.edu/~duncjo01/assets/writings/library/kopimi.html.
Plambeck, Joseph. “Court Rules That LimeWire Infringed on Copyrights.” New York Times, May 12, 2010. http://www.nytimes.com/2010/05/13/technology/13lime.html.
Poon, Martha A. “From New Deal Institutions to Capital Markets: Commercial Consumer Risk Scores and the Making of Subprime Mortgage Finance.” Accounting, Organizations and Society 34 (2009): 654–74. https://socfinance.files.wordpress.com/2010/01/poon_subprime_aos-2009.pdf.
Popper, Ben. “The Wireless and Cable Industries Just Sued to Kill Net Neutrality.” The Verge, April 14, 2015. http://www.theverge.com/2015/4/14/8411033/ctia-wireless-cable-sue-lawsuit-fcc-net-neutrality.
Price, W. L. “Simulation of Packet-Switching Networks Controlled on Isarithmic Principles.” In DATACOMM 1973: Proceedings of the Third ACM Symposium on Data Communications and Data networks: Analysis and Design, 44–49. New York: Association for Computing Machinery, 1973.
Procera Networks. PacketLogic Policy & Charging Control: 3GPP-Based Service Innovation. Accessed July 28, 2016. https://www.proceranetworks.com/hubfs/Datasheets/Procera_DS_3GPP_PCC.pdf.
Protalinski, Emil. “BitTorrent Performance Test Shows How Much Faster Sync Is Compared to Google Drive, OneDrive, and Dropbox.” Venture Beat, October 22, 2014. http://venturebeat.com/2014/10/22/bittorrent-performance-test-shows-how-much-faster-sync-is-compared-to-google-drive-onedrive-and-dropbox/.
Protalinski, Emil. “The Pirate Bay Criticizes Anonymous for DDoS Attack.” ZDNet, May 10, 2012. http://www.zdnet.com/blog/security/the-pirate-bay-criticizes-anonymous-for-ddos-attack/12072.
Quarterman, John S., and Josiah C. Hoskins. “Notable Computer Networks.” Communications of the ACM 29, no. 10 (1986): 932–71.
Raboy, Marc, and Jeremy Shtern, eds. Media Divides: Communication Rights and the Right to Communicate in Canada. Vancouver: University of British Columbia Press, 2010.
Rainie, Lee, Sara Kiesler, Ruogu Kang, and Mary Madden. “Anonymity, Privacy, and Security Online.” Pew Research Center: Internet, Science & Tech, September 5, 2013. http://www.pewinternet.org/2013/09/05/anonymity-privacy-and-security-online/.
Rainie, Lee, and Mary Madden. “Americans’ Privacy Strategies Post-Snowden.” Pew Research Center: Internet, Science & Tech, March 16, 2015. http://www.pewinternet.org/2015/03/16/americans-privacy-strategies-post-snowden/.
Randell, Brian. “An Annotated Bibliography of the Origins of Digital Computers.” Annals of the History of Computing 1, no. 2 (1979): 101–207.
Raymond, Eric S. The New Hacker’s Dictionary. Cambridge, Mass.: MIT Press, 1996.
Reagle, Joseph Michael, Jr. Good Faith Collaboration: The Culture of Wikipedia. Cambridge, Mass.: MIT Press, 2010.
Reddit. “Reflections on the Recent Boston Crisis.” Upvoted (blog), April 22, 2013. https://redditblog.com/2013/04/22/reflections-on-the-recent-boston-crisis/.
Redmond, Kent C., and Thomas Malcolm Smith. From Whirlwind to MITRE : The R&D Story of the SAGE Air Defense Computer. Cambridge, Mass.: MIT Press, 2000.
Rens, Andrew. “Open Document Standards for Government: The South African Experience.” In DeNardis, Opening Standards, 63–72.
Ressie. Comment on Goldmonger, “Canada ISP Latency Issues.” World of Warcraft Forums, February 23, 2011. http://us.battle.net/forums/en/wow/topic/1965838937?page=43#post-848.
Ressy [Teresa Murphy]. “Rogers Throttling/Deprioritizing World of Warcraft.” Rogers Community Forums, January 17, 2011. http://communityforums.rogers.com/t5/forums/forumtopicpage/board-id/Getting_connected/message-id/557#M557.
Rheingold, Howard. The Virtual Community: Homesteading on the Electronic Frontier. Cambridge, Mass.: MIT Press, 2000.
Roberts, Lawrence. “Multiple Computer Networks and Intercomputer Communication.” In SOSP 1967: Proceedings of the First ACM Symposium on Operating System Principles, 3.1–6. New York: Association for Computing Machines, 1967.
Roberts, Sara T. “Behind the Screen: The Hidden Digital Labor of Commercial Content Moderation.” PhD diss., University of Illinois at Urbana-Champaign, 2014. https://www.ideals.illinois.edu/handle/2142/50401.
Roderick, Ian. “(Out of) Control Demons: Software Agents, Complexity Theory and the Revolution in Military Affairs.” Theory & Event 10, no. 2 (2007). DOI: 10.1353/tae.2007.0070.
Rogers Communications. “Hi-Speed Internet.” http://www.rogers.com/web/link/hispeedBrowseFlowDefaultPlans.
Rogers Communications. Comment on Public Notice 2008–19—Review of the Internet Traffic Management Practices of Internet Service Providers. 2009. http://www.crtc.gc.ca/public/partvii/2008/8646/c12_200815400/1029665.zip.
Rogers Internet. “Rogers Network Management Policy.” Accessed October 29, 2016. http://www.rogers.com/web/content/network_management.
Rogers Internet. “Rogers Commercial.” YouTube video, 0:30. Posted by Hollerado. March 11, 2011.
RogersKeith. Comment on Vindari, “[Extreme Plus] Utorrent Settings and Rogers.” DSL Reports Forums, October 2010. http://www.dslreports.com/forum/r24994463-.
Rosa, Hartmut. “Social Acceleration: Ethical and Political Consequences of a Desynchronized High–Speed Society.” Constellations 10, no. 1 (March 1, 2003): 3–33. DOI: 10.1111/1467–8675.00309.
Rosa, Hartmut, and William E. Scheuerman, eds. High-Speed Society: Social Acceleration, Power, and Modernity. University Park, Pa.: Penn State University Press, 2008.
Rosen, E., A. Viswanathan, and R. Callon. RFC 3031: Multiprotocol Label Switching Architecture. January 2001. http://www.ietf.org/rfc/rfc3031.txt.
Rosenberg, Howard, and Charles S. Feldman. No Time to Think: The Menace of Media Speed and the 24-hour News Cycle. New York: Continuum, 2008.
Rosenzweig, Roy. “The Road to Xanadu: Public and Private Pathways on the History Web.” The Journal of American History 88, no. 2 (September 2001): 548. DOI: 10.2307/2675105.
Roth, Daniel. “The Dark Lord of Broadband Tries to Fix Comcast’s Image.” Wired, January 19, 2009. http://www.wired.com/2009/01/mf-brianroberts/.
Russell, Andrew L. Open Standards and the Digital Age: History, Ideology, and Networks. Cambridge: Cambridge University Press, 2014. http://www.cambridge.org/ca/academic/subjects/history/twentieth-century-american-history/open-standards-and-digital-age-history-ideology-and-networks.
Russell, Andrew L., and Valérie Schafer. “In the Shadow of ARPANET and Internet: Louis Pouzin and the Cyclades Network in the 1970s.” Technology and Culture 55, no. 4 (2014): 880–907. DOI: 10.1353/tech.2014.0096.
Rybczynski, Tony. “Commercialization of Packet Switching (1975–1985): A Canadian Perspective.” Communications Magazine, IEEE 47, no. 12 (2009): 26–31.
Saisei Networks. “Products: Every Flow Tells a Story.” Saisei. Accessed July 28, 2016. http://saisei.com/products/.
Saltzer, Jerome H., David P. Reed, and David D. Clark. “End-to-End Arguments in System Design.” ACM Transactions on Computer Systems 2, no. 4 (1984): 277–88.
Salus, Peter H. Casting the Net: From ARPANET to Internet and Beyond. Boston: Addison-Wesley, 1995.
Sandvig, Christian. “Network Neutrality Is the New Common Carriage.” Info: The Journal of Policy, Regulation, and Strategy 9, no. 2/3 (2007): 136–47.
Sandvig, Christian. “Shaping Infrastructure and Innovation on the Internet: The End-to-End Network That Isn’t.” In Shaping Science and Technology Policy: The Next Generation of Research, edited by David Guston and Daniel Sarewitz, 234–55. Madison: University of Wisconsin Press, 2006.
Sandvig, Christian. “The Internet as Infrastructure.” In The Oxford Handbook of Internet Studies, edited by William H. Dutton, 86–108. Oxford: Oxford University Press, 2013.
Sandvig, Christian, K. Hamilton, K. Karahalios, and C. Langbort. “An Algorithm Audit.” In Data and Discrimination: Collected Essays, edited by Seeta Peña Gangadharan, 6–10. Washington, D.C.: New America Foundation, 2014.
Sandvine Inc. Meeting the Challenge of Today’s Evasive P2P Traffic: Service Provider Strategies for Managing P2P Filesharing. 2004. http://www.larryblakeley.com/Articles/p2p/Evasive_P2P_Traffic.pdf.
Sandvine Inc. Sandvine Essentials Training (SET): Module 1: Overview and Platform Hardware. 2014. https://www.scribd.com/doc/281100047/Sandvine-Overview.
Sandvine Inc. Sandvine Policy Traffic Switch (PTS 8210): Characterize, Control and Secure Broadband Traffic. September 27, 2004. https://web.archive.org/web/20060325102059/http://www.sandvine.com/general/getfile.asp?FILEID=18.
Sandvine Inc. Session Management: BitTorrent Protocol: Managing the Impact on Subscriber Experience. December 2014. https://web.archive.org/web/20060325102710/http://www.sandvine.com/general/getfile.asp?FILEID=21.
Sauter, Molly. The Coming Swarm: DDOS Actions, Hacktivism, and Civil Disobedience on the Internet. New York: Bloomsbury Academic, 2014.
Schaffer, Simon. “Babagge’s Intelligence: Calculating Engines and the Factory System.” Critical Inquiry 21, no. 1 (1994): 203–27.
Scheuerman, William E. “Liberal Democracy and the Empire of Speed.” Polity 34, no. 1 (2001): 41–67.
Scheuerman, William E. Liberal Democracy and the Social Acceleration of Time. Baltimore, Md.: Johns Hopkins University Press, 2004.
Schneider, Christopher J., and Dan Trottier. “The 2011 Vancouver Riot and the Role of Facebook in Crowd-Sourced Policing.” BC Studies: The British Columbian Quarterly, no. 175 (July 26, 2012): 57–72. http://ojs.library.ubc.ca/index.php/bcstudies/article/view/182403.
Schoen, Seth. “Comcast and BitTorrent.” Electronic Frontier Foundation, September 13, 2007. https://www.eff.org/deeplinks/2007/09/comcast-and-bittorrent.
Schoen, Seth. “Detecting Packet Injection: A Guide to Observing Packet Spoofing by ISPs.” Electronic Frontier Foundation, November 28, 2007. https://www.eff.org/files/packet_injection_0.pdf.
Schoen, Seth. “EFF Tests Agree with AP: Comcast Is Forging Packets to Interfere with User Traffic.” Electronic Frontier Foundation, October 19, 2007. https://www.eff.org/deeplinks/2007/10/eff-tests-agree-ap-comcast-forging-packets-to-interfere.
Schrock, Andrew Richard. “HTML5 and Openness in Mobile Platforms.” Continuum, August 12, 2014, 1–15. DOI: 10.1080/10304312.2014.941333.
Schrock, Andrew, and Gwen Shaffer. “Data Ideologies of an Interested Public: A Study of Grassroots Open Government Data Intermediaries.” Big Data & Society 4, no. 1 (January–June 2017): 1–10. DOI: 10.1177/2053951717690750.
Schwarz, Jonas Andersson. Online File Sharing: Innovations in Media Consumption. Comedia. New York: Routledge, 2014.
Schwarz, Jonas Andersson (as “Jonas Andersson”). “For the Good of the Net: The Pirate Bay as a Strategic Sovereign.” Culture Machine 10 (2009): 64–108. http://wwwculturemachine.net/index.php/cm/article/view/346/349.
Scott, Jason, dir. BBS: The Documentary. 2004. DVD and Creative Commons Attribute-ShareAlike 2.0 License. http://www.bbsdocumentary.com.
Selfridge, Oliver. “Pandemonium: A Paradigm for Learning.” In Mechanisation of Thought Processes: Proceedings of a Symposium Held at the National Physical Laboratory on 24th, 25th, 26th and 27th November 1958, 511–29. London: Her Majesty’s Stationery Office, 1959.
Selfridge, Oliver, and Ulric Neisser. “Pattern Recognition by Machine.” Scientific American, August 1960, 60–68. DOI: 10.1038/scientificamerican0860–60. Reprinted in Computer and Thought, edited by Edward A. Feigenbaum and Julian Freedman, 237–50, Cambridge, Mass.: MIT Press, 1995.
Senft, Adam, Helmi Noman, Jakub Dalek, Masashi Crete-Nishihata, Matthew Carrieri, Ron Deibert, and Saad Omar Khan. Internet Filtering in a Failed State: The Case of Netsweeper in Somalia. Toronto: Citizen Lab, February 20, 2014. https://citizenlab.org/2014/02/internet-filtering-failed-state-case-netsweeper-somalia/.
Senft, Theresa M. “Bulletin-Board Systems.” In Encyclopedia of New Media: An Essential Reference to Communication and Technology, edited by Steve Jones. Thousand Oaks, Calif.: Sage, 2003.
Shade, Leslie Regan. “Computer Networking in Canada: From CAnet to CANARIE.” Canadian Journal of Communication 19, no. 1 (1994): 53–69.
Shade, Leslie Regan. “Public Interest Activism in Canadian ICT Policy: Blowing in the Policy Winds.” Global Media Journal—Canadian Edition 1, no. 1 (2008): 107–21.
Shade, Leslie Regan. “Roughing It in the Electronic Bush: Community Networking in Canada.” Canadian Journal of Communication 24, no. 2 (1999): 179–98.
Shahani, Aarti. “In Google Newsroom, Brazil Defeat Is Not a Headline.” NPR, July 9, 2014. http://www.npr.org/blogs/alltechconsidered/2014/07/09/330003058/in-google-newsroom-brazil-defeat-is-not-a-headline.
Shannon, Claude E. “A Mathematical Theory of Communication.” Bell System Technical Journal 27, no. 3 (July 1, 1948): 379–423. DOI: 10.1002/j.1538–7305.1948.tb01338.x.
Shannon, Claude E. “Programming a Computer for Playing Chess.” Philosophical Magazine 41, ser. 7, no. 314 (1950): 256–74. http://vision.unipv.it/IA1/aa2009-2010/ProgrammingaComputerforPlayingChess.pdf.
Sharma, Sarah. In the Meantime: Temporality and Cultural Politics. Durham, N.C.: Duke University Press, 2014.
Sharma, Sarah. “It Changes Space and Time: Introducing Power-Chronography.” In Communication Matters: Materialist Approaches to Media, Mobility, and Networks, edited by Jeremy Packer and Steve Wiley, 66–77. New York: Routledge, 2011.
Sharma, Sarah. “The Biopolitical Economy of Time.” Journal of Communication Inquiry 35, no. 4 (October 1, 2011): 439–44. DOI: 10.1177/0196859911417999.
Shifman, Limor. “An Anatomy of a YouTube Meme.” New Media & Society 14, no. 2 (March 1, 2012): 187–203. DOI: 10.1177/1461444811412160.
Shifthead. “Rogers ISP, WoW, and You!” World of Warcraft Forums, December 18, 2010. http://us.battle.net/forums/en/wow/topic/1568009046#post-1.
Shneiderman, Ben, and Catherine Plaisant. Designing the User Interface: Strategies for Effective Human-Computer Interaction. 5th ed. Boston: Addison-Wesley, 2010.
Simon, Herbert. “Reflections on Time Sharing from a User’s Point of View.” In Computer Science Research Review, edited by Joyce Nissenson, 43–52. Pittsburgh, Pa.: Carnegie Institute of Technology, 1966. http://www.dtic.mil/dtic/tr/fulltext/u2/645294.pdf.
Sinnreich, Aram. “Sharing in Spirit: Kopimism and the Digital Eucharist.” Information, Communication & Society 19, no. 4 (April 2, 2016): 504–17. DOI: 10.1080/1369118X.2015.1036766.
Smythe, Dallas Walker. Dependency Road: Communications, Capitalism, Consciousness and Canada. Norwood, N.J.: Ablex, 1981.
Snader, Jon C. VPNs Illustrated: Tunnels, VPNs, and IPsec. Boston: Addison-Wesley Professional, 2005.
Söderberg, Johan. “Misuser Inventions and the Invention of the Misuser: Hackers, Crackers and Filesharers.” Science as Culture 19, no. 2 (June 2010): 151–79. DOI: 10.1080/09505430903168177.
Spilker, Hendrik Storstein, and Svein Hoier. “Technologies of Piracy? Exploring the Interplay between Commercialism and Idealism in the Development of MP3 and DivX.” International Journal of Communication 7 (2013): 2067–86.
Sprenger, Florian. The Politics of Micro-Decisions: Edward Snowden, Net Neutrality, and the Architectures of the Internet. Translated by Valentine A. Pakis. Lüneburg, Germany: Meson Press, 2015.
Srnicek, Nick, and Alex Williams. Inventing the Future: Postcapitalism and a World Without Work. New York: Verso, 2015.
Starosielski, Nicole. “Fixed Flow: Undersea Network as Media Infrastructure.” In Parks and Starosielski, Signal Traffic, 53–70.
Starosielski, Nicole. The Undersea Network. Sign, Storage, Transmission, edited by Jonathan Sterne and Lisa Gitelman. Durham, N.C.: Duke University Press, 2015.
Stastna, Kazi. “Bell’s Discounting of Mobile TV against the Rules, Complaint Claims.” CBC News, December 16, 2013. http://www.cbc.ca/1.2445059.
Sterling, Bruce. The Hacker Crackdown: Law and Disorder on the Electronic Frontier. New York: Bantam Books, 1992.
Sterne, Jonathan. MP3: The Meaning of a Format. Sign, Storage, Transmission, edited by Jonathan Sterne and Lisa Gitelman. Durham, N.C.: Duke University Press, 2012.
Stevenson, John Harris. The Master Switch and the Hyper Giant: Google’s Infrastructure and Network Neutrality Strategy in the 2000s. Rochester, N.Y.: Social Science Research Network, August 14, 2014. https://papers.ssrn.com/abstract=2418784.
Striphas, Ted. The Late Age of Print: Everyday Book Culture from Consumerism to Control. New York: Columbia University Press, 2009.
Stuart, Tessa. “Megan Lee Heart and Reply Girls Game the System.” LA Weekly, June 27, 2012. http://www.laweekly.com/arts/megan-lee-heart-and-reply-girls-game-the-system-2371955.
Suarez, Daniel. DAEMON. New York: Signet Books, 2009.
Sunde, Peter. “The Pirate Bay Interview (Chaosradio International: CRI009).” Mp3 audio podcast, 43:16. Hosted by Tim Pritlove. February 6, 2006. Chaosradio. Accessed November 28, 2012. http://chaosradio.ccc.de/cri009.html.
Svensson, Peter. “Comcast Blocks Some Internet Traffic.” Associated Press, October 19, 2007. Archived at Wayback Machine, https://web.archive.org/web/20071101114042/http://news.yahoo.com/s/ap/20071019/ap_on_hi_te/comcast_data_discrimination.
Synergy Research Group. Cisco’s Dominant Share of Switching & Routers Holds Steady. February 24, 2016. https://www.srgresearch.com/articles/ciscos-dominant-share-switching-routers-holds-steady?ref=il.
Take Our Word for It. “Sez You . . . [email chain on ‘daemon’].” Take Our Word for It (blog), no. 146, 4. Accessed June 3, 2016. http://www.takeourword.com/TOW146/page4.html.
Tanenbaum, Andrew S. Computer Networks. 4th ed. Englewood Cliffs, N.J.: Prentice Hall, 2002.
Tay, Liz. “Pirate Bay’s IPREDator Not a Place to Hide.” ITnews, August 4, 2009. http://www.itnews.com.au/News/151988,pirate-bays-ipredator-not-a-place-to-hide.aspx.
Taylor, Astra. The People’s Platform: Taking Back Power and Culture in the Digital Age. Toronto: Random House Canada, 2014.
Tencer, David. “Gamers’ Group on Traffic Throttling: CRTC Ignoring Consumer Protection Laws.” Business, The Huffington Post, September 22, 2011. http://www.huffingtonpost.ca/2011/08/22/crtc-rogers-traffic-shaping_n_933370.html.
Tetzlaff, David. “Yo-Ho-Ho and a Server of Warez: Internet Software Piracy and the New Global Information Economy.” In The World Wide Web and Contemporary Cultural Theory: Magic, Metaphor, Power, edited by Andrew Herman and Thomas Swiss, 99–126. New York: Routledge, 2000.
Thaler, Richard H., and Cass R. Sunstein. Nudge: Improving Decisions About Health, Wealth, and Happiness. New York: Penguin Books, 2009.
Third Generation Partnership Project (3GPP). “Partners.” 3GPP: A Global Initiative. http://www.3gpp.org/about-3gpp/partners.
Tiessen, Matthew. “High-Frequency Trading and the Centering of the (Financial) Periphery.” The Trading Mesh (blog), 2013. http://www.thetradingmesh.com/pg/blog/mtiessen/read/70969.
Timberg, Craig. “NSA Slide Shows Surveillance of Undersea Cables.” Washington Post, July 10, 2013. http://www.washingtonpost.com/business/economy/the-nsa-slide-you-havent-seen/2013/07/10/32801426-e8e6-11e2-aa9f-c03a72e2d342_story.html.
Tkacz, Nathaniel. Wikipedia and the Politics of Openness. Chicago: University of Chicago Press, 2014.
Touloumis, Tara. “Buccaneers and Bucks from the Internet: Pirate Bay and the Entertainment Industry.” Seton Hall Journal of Sports and Entertainment Law 19 (2009): 253.
Turing, Alan M. “Computing Machinery and Intelligence.” Mind: A Quarterly Review of Psychology and Philosophy 59, no. 236 (1950): 433–60. DOI: 10.1093/mind/LIX.236.433.
Turkle, Sherry. Life on the Screen: Identity in the Age of the Internet. New York: Touchstone, 1997.
Turner, Fred. From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism. Chicago: University of Chicago Press, 2006.
Tutt, Andrew. “An FDA for Algorithms.” Administrative Law Review 69, no. 1 (Winter 2017): 83–124.. https://papers.ssrn.com/abstract=2747994.
Umeaenergi. “Living with Lag—an Oculus Rift Experiment.” YouTube video, 2:58. April 27, 2014. https://www.youtube.com/watch?v=_fNp37zFn9Q.
Umeaenergi. “Living with Lag—Lag View.” YouTube video, 2:58. April 27, 2014. https://www.youtube.com/watch?v=P2VMHzN-bq8.
United States Army, Department of the. “Request for Quotations—DAHC15 69 Q 0002,” Defense Supply Services, June 29, 1968.
Valentino-DeVries, Jennifer. “More Predictions on the Huge Growth of ‘Cloud Computing.’” Digits (Wall Street Journal blog), April 21, 2011. http://blogs.wsj.com/digits/2011/04/21/more-predictions-on-the-huge-growth-of-cloud-computing/.
Valley, George E., Jr. “How the SAGE Development Began.” Annals of the History of Computing 7, no. 3 (1985): 196–226.
Van Beijnum, Iljitsch. “Meet DOCSIS, Part 1: The Unsung Hero of High-Speed Cable Internet Access.” Ars Technica, May 5, 2011. http://arstechnica.com/business/news/2011/05/docsis-the-unsung-hero-of-high-speed-cable-internet-access.ars.
Van Dijck, Jose. “Datafication, Dataism and Dataveillance: Big Data between Scientific Paradigm and Ideology.” Surveillance & Society 12, no. 2 (May 9, 2014): 197–208.
Van Dijck, Jose. The Culture of Connectivity: A Critical History of Social Media. Oxford: Oxford University Press, 2013.
Van Eeten, Michel J. G., and Milton Mueller. “Where Is the Governance in Internet Governance?” New Media & Society 15, no. 5 (August 1, 2013): 720–36. DOI: 10.1177/1461444812462850.
Van Schewick, Barbara. Internet Architecture and Innovation. Cambridge, Mass.: MIT Press, 2010.
Van Schewick, Barbara. Network Neutrality and Quality of Service: What a Non-Discrimination Rule Should Look Like. Stanford, Calif.: Center for Internet & Society, June 11, 2012. http://cyberlaw.stanford.edu/downloads/20120611-NetworkNeutrality.pdf.
Varadhan, K. Request for Comments 1403: BGP OSPF Interaction. January 1993. https://www.rfc-editor.org/rfc/rfc1403.txt.
Vincent, James. “Google Received More than 345 Million Link Takedown Requests Last Year.” The Verge, January 6, 2015. http://www.theverge.com/2015/1/6/7500431/google-piracy-takedown-requests-345-million-2014.
Virilio, Paul. Speed & Politics. Translated by Mark Polizzotti. New York: Semiotext(e), 2006. Originally published 1997.
Virilio, Paul. The Art of the Motor. Translated by Julie Rose. Minneapolis: University of Minnesota Press, 1995.
Vuze. “Bad ISPs.” Accessed September 6, 2016. http://wiki.vuze.com/mediawiki/index.php?title=Bad_ISPs&oldid=5484.
Wajcman, J. “Life in the Fast Lane? Towards a Sociology of Technology and Time.” British Journal of Sociology 59, no. 1 (2008): 59–77.
Wakefield, Jane. “Rage against the Machine—Survey.” ZDNet, May 27, 1999. http://www.zdnet.com/article/rage-against-the-machine-survey/.
Walden, David. “The Arpanet IMP Program: Retrospective and Resurrection.” Annals of the History of Computing, IEEE 36, no. 2 (2014): 28–39.
Waldrop, M. Mitchell. The Dream Machine: J.C.R. Licklider and the Revolution That Made Computing Personal. New York: Penguin Books, 2002.
Warner, Michael. “Publics and Counterpublics.” Public Culture 14, no. 1 (2002): 49–90.
Webb, Adam. “Gamers vs. Rogers: One Month at a Time.” Open Media, May 24, 2011.
Wiener, Norbert. Cybernetics or, Control and Communication in the Animal and the Machine. New York: J. Wiley, 1948.
Wiener, Norbert. The Human Use of Human Beings. Cambridge, Mass.: Houghton Mifflin, 1950.
Wilkinson, Roger I. “Theories for Toll Traffic Engineering in the U.S.A.” Bell Systems Technical Journal [online] 35, no. 2 (July 2013) [originally 1956]. DOI: 10.1002/j.1538-7305.1956.tb02388.
Williams, Raymond. Keywords: A Vocabulary of Culture and Society. Revised edition. London: Fontana Paperbacks, 1983. Originally published 1976.
Williams, Raymond. Marxism and Literature. Marxist Introductions. Oxford: Oxford University Press, 1977.
Williamson, Wade. “A Revolutionary New Approach to Detecting Malicious Covert Communications.” Vectra (blog), October 28, 2015. http://blog.vectranetworks.com/blog/a-revolutionary-new-approach-to-detecting-malicious-covert-communications.
Winderans. Comment on Shifthead, “Rogers ISP, WoW, and You!” World of Warcraft Forums, December 19, 2010. http://us.battle.net/forums/en/wow/topic/1568009046#post-18.
Winner, Langdon. The Whale and the Reactor: A Search for Limits in an Age of High Technology. Chicago: University of Chicago Press, 1986.
Winseck, Dwayne. “Netscapes of Power: Convergence, Consolidation and Power in the Canadian Mediascape.” Media, Culture & Society 24, no. 6 (2002): 795–819.
Wise, John MacGregor. “Attention and Assemblage in a Clickable World.” In Communication Matters: Materialist Approaches to Media, Mobility and Networks, edited by Jeremy Packer and Steve Wiley, 159–72. New York: Routledge, 2011.
Wolin, Sheldon. “What Time Is It?” Theory & Event 1, no. 1 (1997). http://muse.jhu.edu/journals/theory_and_event/v001/1.1wolin.html.
Wood, D., V. Stoss, L. Chan-Lizardo, G. S. Papacostas, and M. E. Stinson. “Virtual Private Networks.” In International Conference on Private Switching Systems and Networks, 1988, 132–36. New York: IEEE, 1988.
Wood, Gaby. Edison’s Eve: A Magical History of the Quest for Mechanical Life. New York: Alfred A. Knopf, 2002.
Woolley, Samuel C. “Automating Power: Social Bot Interference in Global Politics.” First Monday 21, no. 4 (March 10, 2016). http://journals.uic.edu/ojs/index.php/fm/article/view/6161.
Woolley, Samuel C., and Philip N. Howard. “Political Communication, Computational Propaganda, and Autonomous Agents—Introduction.” International Journal of Communication 10 (October 12, 2016): 4882–90.
Wortham, Jenna. “Snapchat, a Growing App, Lets You See It, Then You Don’t.” Technology, New York Times, February 8, 2013. http://www.nytimes.com/2013/02/09/technology/snapchat-a-growing-app-lets-you-see-it-then-you-dont.html.
Wray, Stefan. “Electronic Civil Disobedience and the World Wide Web of Hacktivism: A Mapping of Extraparliamentarian Direct Action Net Politics.” Switch 4, no. 2 (1998). http://switch.sjsu.edu/web/v4n2/stefan/.
Wu, Tim. “Network Neutrality, Broadband Discrimination.” Journal on Telecommunication & High Technology Law 2 (2003): 141–79.
Wu, Tim. “When Code Isn’t Law.” Virginia Law Review 89, no. 4 (June 2003): 679–751. DOI: 10.2307/3202374.
Yates, JoAnne. Control through Communication: The Rise of System in American Management. Baltimore, Md.: Johns Hopkins University Press, 1989.
YouTube Help. “How Content ID Works.” YouTube video, 2:05. N.D. https://support.google.com/youtube/answer/2797370?hl=en.
Zittrain, Jonathan. The Future of the Internet and How to Stop It. New Haven, Conn.: Yale University Press, 2008.