In Observation of the Archive: A Specific Place with Specific Needs

It all starts at the Georgia Institute of Technology Archive. I was fortunate enough to get an observation with Jody Lloyd Thompson, Dept. Head of Archives and Records Management at the Georgia Tech Library. The Archive department consists of 4 ladies, 2 of which are certified Archivists and the other 2 have an MLIS.

During the first hour of my observation, Jody Lloyd Thompson took me on a tour of the Archive and the Special Collections of Rare Books. As we walked down the compact shelves, I learned that the archive is organized by format – paper (manuscripts and photographs), film, and architectural drawings. With the school’s enormous focus on Architecture, it comes as no surprise that the library acquires 200-400 linear feet of architectural collections yearly. The librarians brought this to my attention, due to the fact that all of the architectural materials require flat and horizontal storage cabinets. During the tour I was made aware of the elaborate climate control system that in the event of fire, locks the doors and eliminates oxygen from the room.

When it came time to explore the Rare Book Collection, we put on archive gloves and went straight for Georgia Tech’s most prized book. The university’s rare book collection began in the 1950’s with the acquisition of Sir Isaac Newton’s Philosophiae Naturalis Principia Mathematicaenglish title: Mathematical Principles of Natural Philosophy – published in 1687. The library owns a copy of each of the first three editions of the Principia Mathematica (1687, 1713, and 1726), all published during Newton’s lifetime. I was privileged to hold such an influential first edition rare book, and paid special attention to the publishers note by Edmund Halley (scientist / astronomer who discovered Halley’s Comet). I had the oportunity to handle all of Newton’s works featured in the university’s rare book archive. In addition to Principia, we thumbed through the first edition of Opticks: A Treatise of the Reflexions, Refractions, Inflexions, and Colours of Light (London, 1704), and A Treatise of Arithmetical Composition and Resolution (London, 1720). It makes sense that a university such as the Georgia Institute of Technology would be interested in the history of science and technology. As told from the archivist, the Institution has a “special strength in Newtoniana”. We briefly viewed other Newtoniana include works by such contemporaries of Newton as John Keill, Henry Pemberton, and Colin MacLaurin. Additionally we viewed the archives other treasures such as the nine-volume Dutch language edition of Joan Blaeu’s Grooten Atlas (or Grand Atlas), published in the 1660s.

During my three hour observation, the department head invited me into the Archive weekly meeting. The meeting agenda:

  1. Introductions
  2. Student Assistants
  3. Spring Semester Classes
  4. Annual Reviews
  5. GT Design Archives
  6. ArchivesSpace
  7. Interview Questions for Users (BrightSpot)
  8. LSC/Renewal (Library Service Center)
  9. Weekly Reports

I was introduced to the three other ladies working in the Archive: Christine De Cantanzaro (MLIS, Certified Archivist, PhD Music History), Mandi Johnson (Visual Materials Archivist, M.A. Public History), Wendy Hagenmaier (Digital Archives Specialist, MLIS). The renovation, expected finish in 2016, poses mostly issues in Preservation. The archivists are concerned with storage short-term and temporary, especially with their high valued Rare Books

and providing proper climate control. The proposed temporary storage at the Georgia (Atlanta) Archive brings additional problems to the university. It was proposed that they store the most valuable collections with the city of Atlanta, making them only available by appointment (off-campus), bringing transportation issues with insurance riders on automobiles. Throughout the weekly reports, ongoing projects were discussed with major “highlights” and updates. Currently, the Archivists are working in the Voyageur System to update barcodes on their Science Fiction collection. Georgia Tech has an extensive collection of Science Fiction, from valuable first editions to almost rare “unknowns”. The collection includes 10,000 science fiction and fantasy novels, over 1,000 periodical issues, all dates ranging from the 1950s up to the 1990s. I was told that the collection was started by a Georgia Tech professor and later donated to the university Archive.

Overall, my observation was an enormous learning experience and am grateful to have been invited to observe the Archivists in such a highly regarded institution. The Archive at Georgia Tech has come a long way since the department was reorganized in the early 2000s. I heard many stories the librarians shared with me. Before the re-org, the dean of the university Library “banished” anyone in the library she didn’t favor to the library. For decades, the Archive was operated by Librarians who were “punished” and unqualified. Unfortunately, many documents were lost because of the messy system. When Christine De Cantanzaro arrived over ten years ago, her and Jody Lloyd Thompson, created a plan that shut down the Archive for more than two months to organize the mess. Now, they have outgrown their basement Archive and will be moving into a bigger and better space – big happy news for the Archivists. At the end of the meeting, Christine De Cantanzaro said this;

The Archive is simply just a specific place with specific needs.

 

.

Usage Data and the Evolution of Libraries

The survival and utilization of libraries is in many ways interlinked with their visibility, or how much value and relevance they are seen as having within their wider communities. Proof of library value is in turn related to budgeting within institutions, how money is allocated, and to the general satisfaction of users at large. Digitization of records has created new issues for libraries, as circulation data can be used as an asset for demonstrating library value, or as a means for them to compete with other 21st century means of book/information retrieval. But as libraries find new ways to feel relevant to users, they must also face new challenges to their roles as centers of privacy.

Recently I did a field observation at the Humanities Campus Library at West 18th St, where I spoke with Campus Librarian Lisa Egan. Ms. Egan had been hired the previous school year, when the library re-opened after being closed for years. She has worked hard to develop the book collection almost entirely from scratch, a task complicated by the reality of the library being designated for serving the needs of six different schools, including Quest, James Baldwin, and Hudson- all different schools with varying age groups, curriculums, and teaching needs.
During a busy lunch period, as middle school aged students with lunch passes filed in, checked out books, and scrambled for computers, Ms. Egan explained the importance of circulation records. During the entirety of the first year it was re-opened, the number of books circulated by the library totaled 880, a fairly low number given the student population it serves numbers over 2,000, but this year it the number was already at 600. Although still low, this was a sign of higher student usage, and equally importantly, data that could be used to demonstrate the value of the library to the school and its community. And while Ms. Egan expressed gratitude for the funding and grants she received, she also said that she was struggling to attain what she considered to be a comprehensive non-fiction collection for the students.
Looking around the library, there was an impressive amount of students making use of its facilities (students have a choice during their post-lunch recess to go to the gym, hang out in a common area, or go to the library). Students of varying ages came to request books; some wanted dystopian novels like Hunger Games, some older students were looking for what Ms. Egan called “gritty urban romance novels.” Also in the library were parent volunteers, interested in getting involved and helping the library thrive. It seemed hard to imagine that there could be question marks surrounding the value of the library, but I as Joanna Fantozzi explained in “Clearing the Shelves,” at the moment there is lobbying in Albany to get waivers over the law necessitating libraries for all public schools in New York. I was also told that even if the importance of the library itself wasn’t in question, there were numerous other ways it could be encroached on, from giving up part of its space to a speech teacher, to principals using funds library funds to buy supplies for other teachers.

While it can be seen how circulation data is important to the visibility of the value of the library in the tough world of public schools and their funding, other ways in which libraries have attempted to use circulation data to increase visibility have been more problematic. In a November 5, 2012 article for The Chronicle of Higher Education, Marc Parry described the backlash felt by librarians at Harvard after a social media experiment with Twitter went wrong. The idea had been to set up Twitter feeds with the names of books being checked out from libraries on campus, complete with links to the book’s library catalog entry. Despite precautionary measures to protect privacy (checkout times were randomized by the Twitter stream, and the identities of the people checking items out were not given), the practice was controversial and quickly suspended.
The Harvard Library’s Twitter incident is a good example of what privacy-and-social-media scholar Michael Zimmer calls “a Faustian bargain” facing libraries as they expand into digital services. In order to make use of the internet as it has come to be, with all of sharing of social and personal information, libraries will have to make use of and encourage greater degrees of personal information from users. In order to make library catalogs more similar to online services like Amazon, with its ability to provide recommendations based on personalized taste, libraries would also have to track the browsing and borrowing habits of customers.
The idea of tracking users and their borrowing habits in this way may seem a mere theoretical problem; sure, the ideal of “privacy” might be sacrificed but wouldn’t this be made up for by libraries appealing to more people who, to be honest, already face this lack of privacy throughout their lives? Is this much different from Ms. Egan, the school librarian, suggesting books to her high school students based on her knowledge of their past likes and dislikes, or from her gentle suggestions to younger students who find their way into books meant for the older and more “mature” teenagers that there might be other books they’d like better instead? These are important considerations, but the centrality of user privacy at libraries should not be turned over so lightly. In his article, Mr. Parry describes how states had to pass laws requiring libraries to keep data private in response to attempts in the 70s and 80s by the FBI to spy on scholars by enticing library clerks to disclose information on their reading and borrowing habits. In the culture of surveillance and information flow we live in, there is a strong argument for the continuing practice of privacy by libraries.

Despite these dilemmas, new solutions have been explored as well. Harvard’s Library Innovation Lab developed LibraryCloud as a means for libraries to share metadata, with the idea that with metadata collected from different libraries developers could use them in the development of new services. Another project called StackLife shows users how books have been used in their communities by measuring “importance”- quantified using information like how many libraries own the book, how often it’s been checked out, etc.
It is clear from these examples that digital records hold a lot of potential for libraries to develop and evolve. What form this evolution will take remains open.

Sources

Fantozzi, Joanna. 2013. Clearing the Shelves. Nypress.com/clearing-the-shelves (accessed November 28, 2013).

Parry, Marc. 2012. As Libraries Go Digital, Sharing of Data Is at Odds With Tradition of Privacy. M.chronicle.com/article/As-Libraries-Go-Digital/135514/ (accessed November 28, 2013).

The Eye of Sauron

Eye_of_Sauron_by_ulstudor

 

Why should we care about whether we’re being watched or not? Most people would think that they’re not doing anything wrong but there are so many statutes and laws on the books they probably are. The National Security Agency (NSA) has run roughshod over our basic liberties, especially after 9/11 and the passing of the USA Patriot Act. According to the American Civil Liberties Union “The result is unchecked government power to rifle through individuals’ financial records, medical histories, Internet usage, bookstore purchases, library usage, travel patterns, or any other activity that leaves a record.”

Surveillance orders can be based in part on a person’s First Amendment activities, such as the books they read, the Web sites they visit, or a letter to the editor they have written. This has serious implications for libraries. Under the USA Patriot Act, if a library receives a formal request they are under a legal obligation to disclose the relevant information available. Additionally, under the act’s provisions, librarians who receive an order are prohibited from discussing the issue with anyone other than a library’s attorney and any staff who assist in fulfilling the request. Anyone who violates this could face severe penalties.

The U.S. Depart of Justice has put up a handy page that offers highlights of the law here.

Welcome to Panopticonia

“. . . supervision, control, correction—seems to be a fundamental and characteristic dimension of the power relations that exist in our society.” —Michel Foucault

The 18th century English philosopher Jeremey Bentham came up with a design for a circular prison, (the Panopticon), that in the 1970s the French philosopher Michel Foucault used to illustrate that constant surveillance can be used by the state as an means of control and disciplinary power. There are some theorists who reject Foucault’s premise and think we’re in a post-Panoptic world. One such argument is from the Polish sociologist Zygmunt Bauman who posits that we’ve moved beyond Panopticism to seduction. I see that as just another tool in the surveillance arsenal, (albeit a subtle one). Ubiquitous video cameras, smart phones and tablets that double as tracking devices, incredibly sophisticated tracking software—surveillance has become so pervasive that we’re not living in a post-Panoptic world but pan-Panoptic one. Besides for all this surreptitious surveillance most of us are willing participants in the amassing of all this information. Through Internet outlets such as social media and  consumer sites we’re happy to share information globally that previously would have been private or shared with just family or friends.

The enormous blanket of surveillance extracts a huge toll on us. Manipulation and distortion of news, self-policing and censorship of news organizations, threats to freedom of expression—these are all things that have been enforced since the law went into effect. This reinforces a Panopticonic ideal that whether you’re being watched or not you assume you are giving the watcher, (i.e. government), total control. A recent example of this: the writers’ organization, PEN American Center conducted a survey, Chilling Effects: NSA Surveillance Drives U.S. Writers to Self-Censor, which found a large majority of its members deeply concerned about the extent of government surveillance. Like the canary in the coalmine, if artists, writers, and journalists are feeling uneasy what are the implications for the rest of us?

The clip below is an apt visualization of our sense of fear and frustration in the face of this incessant surveillance. In this, is the final scene from Francis Ford Coppola’s 1974 film The Conversation, Gene Hackman plays a surveillance expert who finds out he himself may be under surveillance. He sets out to find the bug, destroying his apartment in the process. Not finding anything he ends up sitting in the wreckage playing his sax . . .

http://www.youtube.com/watch?v=uivHPkrlAPo

Archivists and the Records of Rights

The new David M. Rubenstein Gallery, part of the National Archives in Washington DC, will be opening an exhibit on December 10, 2013, called Records of Rights.  This will be a permanent exhibit of documents that are considered central to the history of civil rights in America. The press release about the exhibit states that it “showcases original and facsimile National Archives documents to illustrate how Americans throughout our history have debated and discussed issues such as citizenship, free speech, voting rights, and equal opportunity.” For example, it will include the Congressional resolution proposing the 14th Amendment in 1868, certification of the 26th Amendment, and the Americans with Disabilities Act of 1990. These documents illustrate America’s continual commitment to ensuring all citizens have their civil rights respected and their equality assured.

The exhibit presents the history of the United States as one of progress, moving ever forward from the unfulfilled promises of freedom and equality laid down in the Constitution and Bill of Rights towards true realization of them. It emphasizes three issues: slavery and racism of segregation after slavery; women’s suffrage and rights; and immigration restrictions and immigrant’s rights. While these are all important movements that have shaped our nation, the way they are presented must be delicate to ensure that the current state of affairs is not distorted. These fights for civil rights are not just part of our history, they’re part of our present. While there are multiple civil rights battles going on right now, such as the struggle for LGBT rights, the most prominent is the National Security Administration is violating the rights of Americans and people all over the world through their comprehensive surveillance and data collection programs. The information revealed over the summer by Edward Snowden detailing the extent of surveillance practices by the NSA has rightfully shaken beliefs in America’s respect for civil rights. As such, the opening of this exhibit raises some questions about the responsibilities archivists have to present as full of a record as possible in their collections. By presenting only civil rights victories of the past and not including an emphasis on current issues, this exhibit runs the risk of presenting a distorted view of American government.

The examination of the journey of how Americans have fought for civil rights does demonstrate that the nation has come a long way since it’s founding. However, while the victories of civil rights battles deserve to be commemorated, we should in no way encourage a view does not take into account current struggles over our rights. The NSA’s bulk collection of data is a violation of constitutional rights outlined in the fourth amendment, for privacy and freedom of association, all done in the name of protecting us from the great, nebulous threat of terrorism. These violations of privacy are not limited to Americans, but citizens of foreign countries and even other political leaders such as Angela Merkel. These programs, we are told, are to protect us from terrorist threats and that the information collected through them has been used to prevent attacks. Despite these claims, evidence suggests the information gathered has proven to be almost negligible in counter-terrorism operations.

David Lyon and Zygmunt Bauman discuss the role fear plays in getting people to accept such extreme measures in their book Liquid Surveillance, and the NSA’s stated justifications for their surveillance programs often exemplify these ideas. While the authors acknowledge that surveillance is not a new phenomenon, they discuss how it now permeates and seeps into our lives in previously unheard of ways. This, they argue, creates new and more intense feelings of insecurity. This sort of surveillance and the fight against terrorism forces people to conceptualize a nebulous Other, one who is not so easily identified as terrorists have no shared physical characteristics but come from a variety of backgrounds and locations. The sense of insecurity is increased as “there’s not knowing when the categories of risk may ‘accidentally’ include us,”[1] meaning that we begin to support more intense measures to catch the real threat out of fear that we will be somehow classed among their number. This sense of fear and insecurity has been an important tool in shaping the development of the state of surveillance, which is now a the forefront of the debate on civil rights.

The Society of American Archivists, in a statement on the Core Values of Archivists, asserts “By documenting institutional functions, activities, and decision-making, archivists provide an important means of ensuring accountability,” and that this accountability is “an essential hallmark of democracy.” In other words, preserving the historical record is essential to holding governments accountable and ensuring the future health of a democratic system. However, this same document says “archivists serve the needs and interests of their employers and institutions.” This Records of Rights exhibit presents some interesting questions about balancing these two responsibilities, as the archivists’ institution, in this case, is a federal institution. This exhibit has the potential to present a skewed picture of America’s commitment to civil rights, illustrating the extensions of rights through the country’s history while neglecting to account for the current state of affairs. The exhibit could potentially engender the idea that the struggle for civil rights is part of our past only and not an ongoing part of our present.  However, the archivists are serving the needs of their employer, and are therefore limited in their capabilities to make changes to the collection. Though, by serving their employer, they could be violating the mission of archivists “to preserve and make accessible a comprehensive and trustworthy American historical record.”

There are ways that the current rights issues could be incorporated into this collection. The press release details a digital, interactive section of the exhibit, which seems like the perfect place to produce a digital project that could detail current developments about this issue. Also, surveillance and privacy issues are not the only civil rights issues currently being debated, and another digital piece about the struggle for LGBT rights and the debate over healthcare, which is considered to be a right by some but not others. Additionally, as this is a permanent exhibition, this interactive area could be used to update new developments in these struggles as well as others as time goes on. While it is not possible to adequately represent every issue in one exhibit, the omission of current civil rights struggles, particularly over NSA surveillance programs, has a strong capability to skew the historical record. Archivists, as keepers of this record, should make an effort to include the information about the current state of affairs in any way they can in order to present a more comprehensive view of civil rights in America.


[1] Zygmunt Bauman and David Lyon, Liquid Surveillance. (Cambridge: Polity, 2013), 101.

Building the Future – Brooklyn Public Library and Y.A. Services

Nearly 30 years in the making, the building of the Central branch of Brooklyn Library that dominates a corner of Grand Army Plaza, went from ground first being broken for the building in 1912, to completed construction in 1941. In 1997 the Landmarks Preservation Commission declared it a landmark building and in 2013 the interior of the library, much like the concept of the Public Library itself, remains a work in progress. Walking into the Central branch is literally like walking into an open book, one that offers glimpses of how the public library of the past and present is actively repositioning itself for a future role as something much more than simply a repository of knowledge and information, accessible to all. On a recent visit, I decided to take myself on a tour of the two floors open to the public before settling into the Youth Wing for an afternoon of observation and a conversation with one of the library’s two children and young adult specialist librarians on duty that day. After the near complete silence in the adult/reference sections and the popular library upstairs, and the low buzz of the info-commons and the library café in the main lobby, the noise level goes up a notch or five as I opened the doors to the Youth Wing which is a world away from traditional notions of the public library as quiet space. And while there is certainly public debate and a lot of enthusiasm for having both types of environments, the palpable energy of the Youth Wing space certainly made for a lively library visit.

The first thing I’m told by Yesha, the Y.A. librarian, who is standing under a “Cats Against Cat Calls” banner (a visual medley of pink lettering and photos of cats in their best haughty feline pose) is that she herself was asked to be quiet recently  by a young patron for talking too loudly – so much for the mythical figure of the shushing librarian! While the main focus of the Youth Wing is still reading and study, how that reading and studying is undertaken is changing rapidly. Books are still central to the space but laptops are also available for checking out and there are eight desktop computers for use in the Y.A. area. Color printing, either from a library computer or a patron’s own electronic device, is available for a small fee and Yesha handles queries and facilitates various printing requests during the course of our conversation.

In addition to the computers in the Youth Wing, teens also have exclusive access to all the computers every Tuesday afternoon between 4.30pm and 6pm in the Info-Commons as part of the Teen Tech Time program. However, by far the most popular teen tech offering is the Active Gaming Arcade program on Saturdays providing access to games such as Minecraft, which hones players creative gaming skills, encourages them to explore new environments, collect resources to use in these spaces and adapt and protect the space from attack.

A downside Yesha mentions in terms of having the availability of online games is that the teens rarely play against each other but tend to retreat into the games by themselves and so another aim of teen programming at the library is to try and balance things out and encourage more interaction between patrons. To this end there is an art club, writing clinic, poetry workshop, book club and a Game On! board game challenge, there’s even a monthly open mic. session as part of the teen program. Programs are planned to run with 2-15 teens taking part and having eight or more participants is considered a success.

Not all the programs are instant hits and Yesha explained that a recent self-portrait program required the librarian to order teens in the tech lab off the computers and point blank refuse them further access until they tried drawing “for at least 10 minutes”! While most did their 10 minutes and fled, eight teens stayed and returned to complete the program the following week, small steps perhaps along the path to what Durrani and Smallwood have called creating the people orientated library service:

As custodians of information, librarians everywhere have a role to play in eliminating the root causes of poverty, illiteracy, unemployment, and inequality. It is no longer acceptable for libraries and librarians to refuse to acknowledge this social responsibility. The choice is simple: if the information profession does not acknowledge its social responsibility and act upon it, it will no longer have a social role. People will then develop alternative models of information and knowledge communication, which do meet their needs. There will then be no libraries as we know them today. The choice is our to make – today.

The location of the Central branch means that it services teen patrons across a broad demographic spectrum, from the relatively high-income area of Park Slope to the lower income areas of Crown Heights and Brownsville, as well as patrons who travel from further away to use the facilities unique to the Central branch. In turn this means there is a real opportunity to level the playing field of access, and in terms of teen patrons, by far one of the most effective and popular programs is T4 – today’s teens, tomorrow’s techies.

Previously, I’d spoken to a former participant of the program, now a librarian himself who explained that for him the program had given him an opportunity to take a different path to the one he’d been heading down as young man. While currently only offered at the Central branch of the Brooklyn Public Library, the program gives teens a chance to learn basic computer skills via an intensive summer workshop. This is then followed up with a minimum commitment of three hours per week for at least a 6-month period of volunteer work at the library, assisting librarians, and trouble shooting computer problems encountered by older patrons.

This intergenerational aspect and the social skills that are developed while carrying out a responsible volunteer role, as well as the varied practical skills that are learned, demonstrates the active way the library is fostering not just a community for its own future but make tangible what Dewey thought a “Great Community” might be.

Block quote: The Professional is Political: Redefining the Social Role of Public Libraries, Shiraz Durrani and Elizabeth Smallwood  – first appeared in Progressive Librarians, No. 27, Summer 2006. Republished in Questioning Library Neutrality, Alison Lewis Ed. Library Juice Press 2008.

The copyright in the Network Culture

Every generation will dream the following. Postmodernism’s dream was network culture. Today, digital technology is an undeniable presence in everyday life and is inseparable from mainstream social needs and conventions. Network culture is a broad cultural of social with no limited to technological developments and new media. Obviously, the Internet was not yet privatized or significantly colonized by capital and the nature of network culture is a big question, complicated and messy — for example, the growth of open source, the rise of knowledge workers, the widespread piracy of informational commodities, the importance of bottom-up production, and the rapid decline of traditional informational industries such as newspapers [1. Kazys Varnelis:The Immediated Now: Network Culture and the Poetics of Reality

http://varnelis.networkedbook.org/the-immediated-now-network-culture-and-the-poetics-of-reality/]. Does copyright really adapt to the network culture and what is the future of the network culture?

In the book of Free culture, professor Lessig pointed out that over years, music albums, movies and software of digital industry constantly tells us how digital network and technology caused the spread of piracy. But at the same time, they deliberately hide a fact that digital network and technology also play an important role in promoting the development of creative works[2. Lawrence Lessig, Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity http://www.free-culture.cc/].  It should not be ignored that the method they used to curb piracy also will limit the creative.

alg-love-statue-jpg

For example, we know the iconic Pop Art image of Love. It consists of the letters LO over the letters VE; the O is canted sideways so that its oblong negative space creates a line leading to the V. The original image, with green and blue spaces backing red lettering, served as a print image for a Museum of Modern Art Christmas card in 1964 (wikipedia). The designer is American artist Robert Indiana. He did register any copyright of the image. People are totally free to use this image. Now the image has been rendered and parodied in countless forms around the world. The image was designed as US postage stamp also parodied in many languages and the sculpture was created in many cities. This image becomes world popular. If Robert is the right holder, he will earn lots of money. The fashion industry also has little intellectual property protection. They have trademark protection, but no copyright protection and patern protection. However fashion industry is main consuming behavior target [3. Johanna Blakley: Lessons from fashion’s free culture, http://www.ted.com/talks/johanna_blakley_lessons_from_fashion_s_free_culture.html].

Professor Lessig also said that the copyright of  “anti-circumvention” regulations helps decrease the piracy, but it also damages the public’s right of “fair use”. Anti-circumvention prohibits any person to circumvent the copyright owner to control their works are used and taken contact with technology, so the interests of authors can be protected in the digital environments. These technologies include preventing piracy and prevent unauthorized reading, audiovisual and use and so on. If this provision is fully implemented, the fair use of the public will be compressed and exhausted which with great significance and is the fundamental right of the public.

Every time people upload their video to Youtube, the system will automatically analyze and compare the video with the copyright materials in their huge database even though most people didn’t know about this. And the scale and the speed of this system are truly breathtaking. Youtube have the policy with other company who hold the copyrights of the original videos and music such as Sony. When they find a match, they will apply the policy that the rights owner has set down [4. Margaret Gould Stewart: How YouTube thinks about copyright , http://www.ted.com/talks/margaret_stewart_how_youtube_thinks_about_copyright.html]. The right holder decides whether this video can be published which also based on this video will bring them benefits or damage. This definitely protects the right holder’s interest, but also limited everyone’s freedom of using those contents what are really easier to find out in the Internet context.

Professor Lessig’s main discussion is that if we are only interested in how to effectively curb piracy, regardless of other issues, the purpose of reaching the curb piracy, the free culture also will be die. Rights holders biggest blind spot, their only concern is to stop the piracy to carry of interests less than in the other. They also convince everyone to legislators in order to effectively curb piracy. But for the people who are not rights holders, we must also pay attention to the culture, information and freedom of speech issues and so on what the current copyright law mostly neglected.  We participate in the digital rights ecosystem everyday. Rights management is no longer simply a question of ownership.

Admittedly, digital technology enables individual easily copy the content on the Internet, causing serious damage to the authors. It is necessary to legislate to protect the author, but professor Lessig believes that we must think about how to make the rights of authors damage to a minimum while not destroy the good side of the network functions. Why he would be so concern about strict copyright laws will hinder the development of cultural freedom? The main key is when we use other’s works it is really difficult to obtain a license. For this, we certainly cannot ask the copyright holder totally free, with out the decisions of whether or not authorize the right. But how people can easily obtain the authorization for a reasonable price and the use of books, it is the copyright holder’s social responsibility concurrently in the pursuit to improve the standards of protection and enforcement of the law.

Many people think that the copyright contributed the creation. However, copyright protection is not the only virtue of cultural creation. Professor Lessig said that in Shakespeare’s time, there is no concept of copyright and legal. Shakespeare still completed a lot of works. So the copyright protection is not entirely unique incentive for cultural creation, there is many other factors that also encourage the creation. For copyright law, only when the benefits it brings more than harm it has the value, which is what we have to strive for.

Recently, the author of Out of Control, Kevin Kelly present that new revolution of technologies will out of the mainstream come from margin area and industries. The company Dropbox succeeds because it is outside the monopoly Internet groups such as Google, Amazon, twitter and Facebook. The copyright law may not protect them. Therefore, these low-quality, high-risk, low profit margins, small markets, and other non-market characteristics will be the key to power of future. The future will certainly be some things that change our lives.