Welcome to the CS3043 group project site for Ready Player One!
Scroll down to learn more about Ready Player One and its relation to computing technologies.

Computing Technologies

Existing

Future

Emerging

Impossible


Topics Covered

Networked Communications - Ch.3

Let’s talk…

Intellectual Property - Ch.4

If a user creates something in the OASIS, do they own that or does the OASIS own it. Do users own their avatars?? If so, what if they are knockoffs of copyrighted characters or universes? People paid for their services and creations within the OASIS. H makes money off repairing and building items.

Information Property - Ch.5

Players preserve their identity in the OASIS by using aliases. Information only gets out if people reveal their identity. Wade reveals his real name putting him and his family in danger. Someone was tracked easily by first name without government resources.

Privacy and the Government - Ch.6

This chapter is not relevant to the movie because the movie doesn’t focus or spend time on how the government works and its relation to OASIS.

Computer and Network Security - Ch.7

The virtual currencies in the movie could be stolen if the server operating OASIS was attacked. A security flaw in OASIS log off protocol allowed for “hackers” to prevent users from logging off. OASIS only uses 1 factor authentication allowing for susceptibility and account loss.

Computer Reliability - Ch.8

Let’s talk…

Work and Wealth - Ch.10

Let’s talk…


Plot Time Line

1990

Person wakes up

2000

Person almost dies

2001

Person wins


Movie Makers’ Intent in Regards to Computing

Words from movie people about computing and their movie…


Societal Conclusions

  1. Conclusion 1
  2. Conclusion 2
  3. Conclusion 3

Meeting Minutes


Resources

Made with love by broke college students.