لخّصلي

خدمة تلخيص النصوص العربية أونلاين،قم بتلخيص نصوصك بضغطة واحدة من خلال هذه الخدمة

نتيجة التلخيص (50%)

based on peer-to-peer (P2P) technologies developed by Gnutella.Spinello (2008) notes that the methods for indexing the files that are exchanged in P2P systems comprise three categories: (a) a centralized indexing system (such as in the original Napster site), (b) a decentralized indexing system, and (c) a supernode system (where a group of computers can act as indexing servers).Legisla- tion introduced in 2007 to amend and extend the Higher Education Bill of 1965 included the controversial Section 494, entitled Campus-based digital theft prevention.And in what could be viewed as an even more aggressive attempt to prevent students from freely downloading copyrighted music on university campuses, the RIAA tried to tie the unauthorized downloading of files by college students to a loss of financial aid.As P2P file-sharing sites have evolved, they have become increasingly decentralized.


النص الأصلي

based on peer-to-peer (P2P) technologies developed by Gnutella. As P2P file-sharing sites have evolved, they have become increasingly decentralized.
Spinello (2008) notes that the methods for indexing the files that are exchanged in P2P systems comprise three categories: (a) a centralized indexing system (such as in the original Napster site), (b) a decentralized indexing system, and (c) a supernode system (where a group of computers can act as indexing servers). Another P2P protocol is Bit Torrent, which enables large files, such entire music CDs, to be exchanged more efficiently through a system of networked computers designated as “peers” and “seeds.” Whereas KaZaA used the supernode system, the Pirate Bay service used the Bit Torrent protocol. (We briefly examined the outcome of the trial involving the Pirate Bay site in Chapter 7.)
The recording industry, in its effort to crack down on illicit file sharing, has not been deterred by the fact that later P2P systems were able to avoid the legal pitfalls surrounding the centralized indexing method used by Napster. Alternatively, the recording industry employed some new strategies and techniques in the ongoing battle with file-sharing sites. For example, it began to track down individuals that it suspected of exchanging proprietary music online. In 2003, the recording industry issued court subpoenas to Internet service providers (ISPs) such as Comcast and Verizon, as well as to major universities, for the names of users who it suspected of downloading and exchanging large volumes of copyrighted music via those online services. While many ISPs and universities complied with the recording industry’s request, Verizon challenged the RIAA in court on the grounds that complying with such requests violated specific articles of the U.S. Constitution (Verizon v. RIAA, 2003). Since that time, most universities have developed strict policies that prohibit the use of their networks to exchange copyrighted music; some have even disabled their P2P file-sharing systems altogether.12
The recording industry has also taken other tacks in its efforts to deter the unauthorized sharing of copyrighted music files online. For example, one way it fought back was by uploading “corrupted” music files onto the popular P2P sites, so that users downloading these files would be discouraged from using those sites again. And in what could be viewed as an even more aggressive attempt to prevent students from freely downloading copyrighted music on university campuses, the RIAA tried to tie the unauthorized downloading of files by college students to a loss of financial aid. Legisla- tion introduced in 2007 to amend and extend the Higher Education Bill of 1965 included the controversial Section 494, entitled Campus-based digital theft prevention. Kalara (2007) points out that under this controversial section of the bill, eligible institutions that participate in the federal aid program would be required to provide “annual disclosure/ warnings to the students applying for or receiving financial aid,” which inform them that “P2P file sharing may subject them to civil and criminal liability.” The bill also would require that the universities offer subscription services to their student bodies, giving them an alternative to illegal file sharing. This legislation was opposed by the American Association of Universities, who worried that many innocent students could be deprived of financial aid, if universities did not comply.13
The debate over sharing copyrighted material in P2P systems has not been limited to copyrighted music files. The motion picture industry has also been concerned about the ease with which copyrighted movies can be freely exchanged in file-sharing systems. In 2003, Metro-Goldwyn-Mayer (MGM) Studies Inc. sued two P2P file-sharing services.


تلخيص النصوص العربية والإنجليزية أونلاين

تلخيص النصوص آلياً

تلخيص النصوص العربية والإنجليزية اليا باستخدام الخوارزميات الإحصائية وترتيب وأهمية الجمل في النص

تحميل التلخيص

يمكنك تحميل ناتج التلخيص بأكثر من صيغة متوفرة مثل PDF أو ملفات Word أو حتي نصوص عادية

رابط دائم

يمكنك مشاركة رابط التلخيص بسهولة حيث يحتفظ الموقع بالتلخيص لإمكانية الإطلاع عليه في أي وقت ومن أي جهاز ماعدا الملخصات الخاصة

مميزات أخري

نعمل علي العديد من الإضافات والمميزات لتسهيل عملية التلخيص وتحسينها


آخر التلخيصات

INTRODUCTION : ...

INTRODUCTION : Un état de complet bien-être physique, mental et social, ne consiste pas seulement en...

لماذا نشغل بالن...

لماذا نشغل بالنا ببداية القيادة ونشأتها؟ وفي الواقع، ما الذي يعد بداية؟ حسنًا يمكننا البدء بأن نفترض...

تُعتبر السياسة ...

تُعتبر السياسة من الأمور والموضوعات التي اهتمّ بها الفلاسفة نظراً لأنها تتناول التنظيم الاجتماعي ووض...

شاركت ألعاب الق...

شاركت ألعاب القوى في الألعاب الأولمبية القديمة الأولى، وتعتبر احدى أقدم الرياضات في التاريخ، الذي يُ...

ـ حفظ النظام دا...

ـ حفظ النظام داخل الصف: يحتاج المعلم والتلاميذ إلى جو يتسم بالهدوء، حتى يتم التفاعل المثمر بني المع...

)     ...

)      )$   ) $7$   )   $7 $  ...

وثَمَّة تأكيد ع...

وثَمَّة تأكيد على أنَّ إحدى نقاط القوة الرئيسية للنظام المزدوج تتمثل في الدرجة العالية من المشاركة و...

• السيطرة على ا...

• السيطرة على العواطف دائم ً ا • تقديم النفس بشكل احترافي • جمع المعلومات من العميل • التحدث مباشرة...

المنتج الإبداعي...

المنتج الإبداعي: إن المنتج هو الأساس الذي يحافظ على حيوية وتجدد المؤسسات ويعبر عن قدراتها الإنتاجية ...

Now begin the p...

Now begin the process of turning the requirements into functional models • Models are logical; i.e.,...

عناصر حق الملكٌ...

عناصر حق الملكٌة: ٌقصد بها السلطات التً ٌخولها هذا الحق لصاحبه على ملكه، وهً ثلاث كماٌلً: أــ سلطة ...

Communication l...

Communication languages ​​are considered one of the oldest means of communication in human history a...