Definition

During the last 20 years the old Immanuel Wallerstein-paradigm of center - periphery and semi-periphery found a new costume: ICTs. After Colonialism, Neo-Colonialism and Neoliberalism a new method of marginalization is emerging: the digital divide.

"Digital divide" describes the fact that the world can be divided into people who
do and people who do not have access to (or the education to handle with) modern information technologies, e.g. cellular telephone, television, Internet. This digital divide is concerning people all over the world, but as usually most of all people in the formerly so called third world countries and in rural areas suffer; the poor and less-educated suffer from that divide.
More than 80% of all computers with access to the Internet are situated in larger cities.

"The cost of the information today consists not so much of the creation of content, which should be the real value, but of the storage and efficient delivery of information, that is in essence the cost of paper, printing, transporting, warehousing and other physical distribution means, plus the cost of the personnel manpower needed to run these `extra' services ....Realizing an autonomous distributed networked society, which is the real essence of the Internet, will be the most critical issue for the success of the information and communication revolution of the coming century of millennium."
(Izumi Aizi)

for more information see:
http://www.whatis.com/digital_divide.htm

TEXTBLOCK 1/14 // URL: http://world-information.org/wio/infostructure/100437611730/100438659300
 
1900 - 2000 A.D.

1904
First broadcast talk

1918
Invention of the short-wave radio

1929
Invention of television in Germany and Russia

1941
Invention of microwave transmission

1946
Long-distance coaxial cable systems and mobile telephone services are introduced in the USA.

1957
Sputnik, the first satellite, is launched by the USSR
First data transmissions over regular phone circuits.

At the beginning of the story of today's global data networks is the story of the development of satellite communication.

In 1955 President Eisenhower announced the USA's intention to launch a satellite. But it in the end it was the Soviet Union, which launched the first satellite in 1957: Sputnik I. After Sputnik's launch it became evident that the Cold War was also a race for leadership in the application of state-of-the-art technology to defense. As the US Department of Defense encouraged the formation of high-tech companies, it laid the ground to Silicon Valley, the hot spot of the world's computer industry.

The same year as the USA launched their first satellite - Explorer I - data was transmitted over regular phone circuits for the first time, thus laying the ground for today's global data networks.

Today's satellites may record weather data, scan the planet with powerful cameras, offer global positioning and monitoring services, and relay high-speed data transmissions. Yet up to now, most satellites are designed for military purposes such as reconnaissance.

1969
ARPAnet online

ARPAnet was the small network of individual computers connected by leased lines that marked the beginning of today's global data networks. An experimental network it mainly served the purpose of testing the feasibility of wide area networks and the possibility of remote computing. It was created for resource sharing between research institutions and not for messaging services like E-mail. Although US military sponsored its research, ARPAnet was not designed for directly martial use but to support military-related research.

In 1969 ARPANET went online and linked the first two computers, one located at the University of California, Los Angeles, the other at the Stanford Research Institute.

Yet ARPAnet did not become widely accepted before it was demonstrated in action to a public of computer experts at the First International Conference on Computers and Communication in Washington, D. C. in 1972.

Before it was decommissioned in 1990, NSFnet, a network of scientific and academic computers funded by the National Science Foundation, and a separate new military network went online in 1986. In 1988 the first private Internet service providers started offering access to NSFnet to a general public. After having become the backbone of the Internet in the USA, in 1995 NSFnet was turned into a consortium of commercial backbone providers. This and the launch of the World Wide Web added to the success of the global data network we call the Net.

In the USA it was already in 1994 that commercial users outnumbered military and academic users.

Despite the rapid growth of the Net, most computers linked to it are still located in the United States.

1971
Invention of E-Mail

1979
Introduction of fiber-optic cable systems

1992
Launch of the World Wide Web

TEXTBLOCK 2/14 // URL: http://world-information.org/wio/infostructure/100437611796/100438659828
 
Steganography

Ciphers as well as codes are transmitted openly. Everyone can see that they exist. Not so with steganograms.
Steganography is the art and science of communicating in a way which hides the existence of the secret part in that communication. During the Italian Renaissance and the time of the Elizabethan Age in England cryptography was very popular, for political reasons as well as for amusements (see John Dee).
In literature steganography played an important role. Many steganographs of that period have only been deciphered recently like some of the Shakespearean sonnets, which now seem to proof that the actor William Shakespeare was not the author of the famous poems and dramas, but that the latter' name was, and Francis Bacon, or even Francis Tudor, as some ciphers and other sources talk of him as Queen Elisabeth I.'s secret son.

for further details see:
http://home.att.net/~tleary/
http://www.thur.de/ulf/stegano/
http://www2.prestel.co.uk/littleton/gm2_rw.htm

One kind of steganogram is digital watermarking:
Watermarks protect digital images, videos, but also audio and multimedia products. They are made out of digital signals, put into other digital signals. They try to be invisible on first sight and should be nearly impossible to remove. The process of producing watermarks is to overlay some sort of identifying image over the original image (non-digital watermarks, like on money can be seen by holding the paper against light). Copying the image destroys the watermark, which cannot be copied. Any alteration of the original destroys the watermark, too.

Watermarking is one of the typical inventions of cryptography to assist the biggest content owners, but advertised as something necessary and helpful for everybody. Who in fact gets any advantage out of watermarking? The private user most of the time will not really need it except for small entities of pictures maybe.
But the big enterprises do. There is a tendency to watermark more and more information in the Internet, which until now was considered as free and as a cheap method to receive information. Watermarking could stop this democratic development.

for further information see:
http://www.isse.gmu.edu/~njohnson/Steganography

TEXTBLOCK 3/14 // URL: http://world-information.org/wio/infostructure/100437611776/100438659021
 
B2-92

B2-92 is an independent FM radio station based in Belgrade, which has won a number of international press and media awards. Their broadcasts and music and uncensored news heard across Serbia through a network of local partner stations. Their signal was also picked up by the BBC World Service and retransmitted via satellite around the world. In December 1996, B2-92 began using technology to stream live audio broadcasts and short video clips over the Internet.

Strategies and Policies

From its start as a terrestrial broadcaster B2-92 has been a respected source of independent news in the Balkans. Although B2-92 has been constantly subjected to repression and threat by government authorities it continued to provide music and news. When in December 1996 B2-92 was banned from broadcasting it began to distribute its content via streaming audio and video on its website. A web savvy support group was formed helping B2-92 to continue its distribution of news. Anonymous e-mail lists were developed to protect the identity of those wishing to express their views about the war, as well as a message boards linking to the Help B2-92 Campaign site. Furthermore encrypted e-mail services were provided for journalists and others in the former Yugoslavia who found themselves under threat. B2-92 also co-operates with various media activists and support groups and networks, which help B2-92 to continue its content distribution.

TEXTBLOCK 4/14 // URL: http://world-information.org/wio/infostructure/100437611734/100438659212
 
The Concept of the Public Sphere

According to social critic and philosopher Jürgen Habermas "public sphere" first of all means "... a domain of our social life in which such a thing as public opinion can be formed. Access to the public sphere is open in principle to all citizens. A portion of the public sphere is constituted in every conversation in which private persons come together to form a public. They are then acting neither as business or professional people conducting their private affairs, nor as legal consociates subject to the legal regulations of a state bureaucracy and obligated to obedience. Citizens act as a public when they deal with matters of general interest without being subject to coercion; thus with the guarantee that they may assemble and unite freely, and express and publicize their opinions freely."

The system of the public sphere is extremely complex, consisting of spatial and communicational publics of different sizes, which can overlap, exclude and cover, but also mutually influence each other. Public sphere is not something that just happens, but also produced through social norms and rules, and channeled via the construction of spaces and the media. In the ideal situation the public sphere is transparent and accessible for all citizens, issues and opinions. For democratic societies the public sphere constitutes an extremely important element within the process of public opinion formation.

TEXTBLOCK 5/14 // URL: http://world-information.org/wio/infostructure/100437611734/100438658403
 
Pressures and Attacks against Independent Content Providers: Serbia

The independent Belgrade based FM radio-station B2-92, which from December 1996 on also broadcasts over the Internet, repeatedly has been the target of suppression and attacks by the Serbian government.

B2-92 offices have been raided on numerous occasions and members of staff have been repeatedly harassed or arrested. In March 1999 the transmitter of radio B2-92 was confiscated yet again by the Serbian authorities and editor-in-chief, Veran Matic, was taken and held in custody at a police station. Ten days after the confiscation of B2-92's transmitter, Serbian police entered and sealed their offices. All members of staff were sent home and a new General Manager was appointed by Serbian officials. Although by closing B2-92, the Serbian regime may have succeeded in softening the voice of the independent content provider, with the distributive nature of the Internet and the international help of media activists, the regime will have little chance of silencing the entire flood of independent content coming out of former Yugoslavia.

TEXTBLOCK 6/14 // URL: http://world-information.org/wio/infostructure/100437611734/100438659225
 
Internet Content Providers Perspective

As within the traditional media landscape, Internet content providers have two primary means of generating revenue: Direct sales or subscriptions, and advertising. Especially as charging Internet users for access to content - with all the free material available - has proven problematic, advertising is seen as the best solution for creating revenues in the short term. Therefore intense competition has started among Internet content providers and access services to attract advertising money.

Table: Web-Sites Seeking Advertising


Period

Number of Web-Sites

June 1999

2111

July 1999

2174

August 1999

2311

September 1999

2560



Source: Adknowledge eAnalytics. Online Advertising Report

TEXTBLOCK 7/14 // URL: http://world-information.org/wio/infostructure/100437611652/100438657986
 
Product Placement

With television still being very popular, commercial entertainment has transferred the concept of soap operas onto the Web. The first of this new species of "Cybersoaps" was "The Spot", a story about the ups and downs of an American commune. The Spot not only within short time attracted a large audience, but also pioneered in the field of online product placement. Besides Sony banners, the companies logo is also placed on nearly every electronic product appearing in the story. Appearing as a site for light entertainment, The Spots main goal is to make the name Sony and its product range well known within the target audience.

TEXTBLOCK 8/14 // URL: http://world-information.org/wio/infostructure/100437611652/100438658026
 
acceleration

TEXTBLOCK 9/14 // URL: http://world-information.org/wio/infostructure/100437611777/100438658418
 
Another Question of Security

Even with the best techniques it is impossible to invent a cryptographic system that is absolutely safe/unbreakable. To decipher a text means to go through many, sometimes nearly - but never really - endless attempts. For the computers of today it might take hundreds of years or even more to go through all possibilities of codes, but still, finally the code stays breakable. The much faster quantum computers will proof that one day.
Therefore the decision to elect a certain method of enciphering finally is a matter of trust.

For the average user of computers it is rather difficult to understand or even realize the dangers and/or the technological background of electronic transmission of data. For the majority thinking about one's own necessities for encryption first of all means to trust others, the specialists, to rely on the information they provide.
The websites explaining the problems behind (and also the articles and books concerning the topic) are written by experts of course as well, very often in their typical scientific language, merely understandable for laymen. The introductions and other superficial elements of those articles can be understood, whereas the real background appears as untouchable spheres of knowledge.

The fact that dangers are hard to see through and the need for security measures appears as something most people know from media reports, leads directly to the problem of an underdeveloped democracy in the field of cryptography. Obviously the connection between cryptography and democracy is rather invisible for many people. Those mentioned media reports often specialize in talking about the work computer hackers do (sometimes being presented as criminals, sometimes as heroes) and the danger to lose control over the money drawn away from one's bank account, if someone steals the credit card number or other important financial data. The term "security", surely connected to those issues, is a completely different one from the one that is connected to privacy.
It is especially the latter that touches the main elements of democracy.

for the question of security see:
http://www-db.stanford.edu/pub/gio/CS99I/security.html

TEXTBLOCK 10/14 // URL: http://world-information.org/wio/infostructure/100437611776/100438658850
 
Cryptography's Terms and background

"All nature is merely a cipher and a secret writing."
Blaise de Vigenère

In the (dis-)information age getting information but at the same time excluding others from it is part of a power-game (keeping the other uneducated). The reason for it eventually has found an argument called security.
Compared to the frequency of its presence in articles, the news and political speeches security seems to be one of the most popular words of the 90's. It must be a long time ago when that word was only used for and by the military and the police. Today one can find it as part of every political issue. Even development assistance and nutrition programs consider it part of its work.
The so-called but also real need for information security is widespread and concerning everybody, whether someone uses information technology or not. In any case information about individuals is moving globally; mostly sensitive information like about bank records, insurance and medical data, credit card transactions, and much much more. Any kind of personal or business communication, including telephone conversations, fax messages, and of course e-mail is concerned. Not to forget further financial transactions and business information. Almost every aspect of modern life is affected.
We want to communicate with everybody - but do not want anybody to know.

Whereas the market already depends on the electronic flow of information and the digital tools get faster and more sophisticated all the time, the rise of privacy and security concerns have to be stated as well.
With the increase of digital communication its vulnerability is increasing just as fast. And there exist two (or three) elements competing and giving the term digital security a rather drastic bitter taste: this is on the one hand the growing possibility for criminals to use modern technology not only to hide their source and work secretly but also to manipulate financial and other transfers. On the other hand there are the governments of many states telling the population that they need access to any kind of data to keep control against those criminals. And finally there are those people, living between enlightening security gaps and at the same time harming other private people's actions with their work: computer hackers.
While the potential of global information is regarded as endless, it is those elements that reduce it.

There is no definite solution, but at least some tools have been developed to improve the situation: cryptography, the freedom to encode those data that one does not want to be known by everybody, and give a possibility to decode them to those who shall know the data.

During the last 80 years cryptography has changed from a mere political into a private, economic but still political tool: at the same time it was necessary to improve the tools, eventually based on mathematics. Hence generally cryptography is regarded as something very complicated. And in many ways this is true as the modern ways of enciphering are all about mathematics.

"Crypto is not mathematics, but crypto can be highly mathematical, crypto can use mathematics, but good crypto can be done without a great reliance on complex mathematics." (W.T. Shaw)

For an introduction into cryptography and the mathematical tasks see:
http://www.sbox.tu-graz.ac.at/home/j/jonny/projects/crypto/index.htm
http://www.ccc.de/CCC-CA/policy.html

TEXTBLOCK 11/14 // URL: http://world-information.org/wio/infostructure/100437611776/100438658895
 
Satyrs, Frankenstein, Machine Men, Cyborgs

The idea of hybrid beings between man and non-human entities can be traced back to mythology: mythologies, European and non-European are populated with beings which are both human and non-human, and which, because of this non-humanness, have served as reference points in the human endeavour of understanding what it means to be human. Perhaps "being human" is not even a meaningful phrase without the possibility to identify ourselves also with the negation of humanness, that is, to be human through the very possibility of identification with the non-human.

While in classical mythology, such being were usually between the man and animal kingdoms, or between the human and the divine, the advent of modern technology in the past two centuries has countered any such irrational representations of humanness. The very same supremacy of rationality which deposited the hybrid beings of mythology (and of religion) on the garbage heap of the modern period and which attempted a "pure" understanding of humanness, has also been responsible for the rapid advance of technology and which in turn prepared a "technical" understanding of the human.

The only non-human world which remains beyond the animal and divine worlds is the world of technology. The very attempt of a purist definition of the human ran encountered difficulty; the theories of Darwin and Freud undermined the believe that there was something essentially human in human beings, something that could be defined without references to the non-human.

Early representations of half man - half machine creatures echo the fear of the violent use of machinery, as in wars. Mary Shelley published Frankenstein in 1818, only a few years after the end of the Napoleonic wars. But machines are not only a source of fear exploited in fiction literature, their power and makes their non-humanness super-humanness. The French philosopher and doctor Julien de La Mettrie argues in his famous Machine Man that human beings are essentially constructed like machines and that they obey to the same principles. Machine Man provides a good example of how the ideas of the Enlightenment of human autonomy are interwoven with a technical discourse of perfection.

What human minds have later dreamed up about - usually hostile - artificial beings has segmented in the literary genre of science fiction. Science fiction seems to have provided the "last" protected zone for the strong emotions and hard values which in standard fiction literature would relegate a story into the realm of kitsch. Violent battles, strong heroes, daring explorations, infinity and solitude, clashes of right and wrong and whatever else makes up the aesthetic repertoire of metaphysics has survived unscathed in science fiction.

However, science fiction also seems to mark the final sequence of pure fiction: the Cyborg heroes populating this genre have transcended the boundary between fact and fiction, ridiculing most established social theories of technology based on technological instrumentalism. Donna Haraway has gone a long way in coming to terms with the cultural and social implications of this development. "By the late twentieth century, our time, a mythic time, we are all chimeras, theorized and fabricated hybrids of machine and organism; in short, we are cyborgs", Haraway states in her Cyborg Manifesto. In cyber culture, the boundaries between organisms and machines, between nature and culture become as ambivalent as the borderline between he physical and the non-physical: "Our best machines are made of sunshine; they are all light and clean because they are nothing but signals".

In the Flesh Machine the Critial Art Ensemble analyses the mapping of the body, as in genetics, as one aspect of keeping state power in place, the other two aspects being the "war machine" and the "sight machine". The mapping of the flesh machine is a logical and necessary consequence of the development of the other two "machines". Cyborgisation is in the words of CEA, the "coming of age of the flesh machine", which, although it has "intersected both the sight and war machine since ancient times ... is the slowest to develop. " Representation is a necessary preliminary to violence, since "Any successful offensive military action begins with visualization and representation. The significant principle here .... is that vision equals control."

TEXTBLOCK 12/14 // URL: http://world-information.org/wio/infostructure/100437611777/100438658891
 
Individualized Audience Targeting

New opportunities for online advertisers arise with the possibility of one-to-one Web applications. Software agents for example promise to "register, recognize and manage end-user profiles; create personalized communities on-line; deliver personalized content to end-users and serve highly targeted advertisements". The probably ultimate tool for advertisers. Although not yet widely used, companies like Amazon.Com have already started to exploit individualized audience targeting for their purposes.

TEXTBLOCK 13/14 // URL: http://world-information.org/wio/infostructure/100437611652/100438658450
 
Missing Labeling of Online Ads

One of the most crucial issues in on-line advertising is the blurring of the line between editorial content and ads. Unlike on TV and in the print media, where guidelines on the labeling of advertisements, which shall enable the customer to distinguish between editorial and ads, exist, similar conventions have not yet evolved for Internet content. Labeling of online advertisement up to now has remained the rare exception, with only few sites (e.g. http://www.orf.at) explicitly indicating non-editorial content.

TEXTBLOCK 14/14 // URL: http://world-information.org/wio/infostructure/100437611652/100438657963
 
Bulletin Board Systems

A BBS (bulletin board system) is a computer that can be reached by computer modem dialing (you need to know the phone number) or, in some cases, by Telnet for the purpose of sharing or exchanging messages or other files. Some BBSs are devoted to specific interests; others offer a more general service. The definitive BBS List says that there are 40,000 BBSs worldwide.

Bulletin board systems originated and generally operate independently of the Internet.

Source: Whatis.com

INDEXCARD, 1/18
 
Human Genome Project

The Human Genome Project is an international colaborative research project that aims to map the human genome. It's goal is to idenitfy the 100,000 genes of the human DNA as well as to sequence the 3 billion chemical base pairs that make up the DNA. The HGP is designed on an open source basis, i.e. the information that is obtained and stored in databases should, in principle, be available to researchers and businesses all over the world. However, the HGP's work has been challenged by private businesses such as Celera whose objective is the private exploitation of genome information.

INDEXCARD, 2/18
 
ciphers

the word "cipher" comes from the Hebrew word "saphar", meaning "to number". Ciphers are mere substitutions. Each letter of the alphabet gets substituted; maybe by one letter or two or more.

an example:
PLAINTEXT a b c d e f g h i j k l m n o p q r s t u v w x y z
CIPHERTEXT D E F G H I J K L M N O P Q R S T U V W X Y Z A B C

INDEXCARD, 3/18
 
Virtual Marylin Monroe

This is the story of the virtual Marylyn Monroe created by MRALab in Switzerland. The biography features her personal and professional stories. This being the biography of a virtual being, it does not end with the present and includes, instead, a chapter on her destiny.

http://www.miralab.unige.ch/MARILYN/VIRTUAL/virtual.html

http://www.miralab.unige.ch/MARILYN/VIRTUAL/v...
INDEXCARD, 4/18
 
Fiber-optic cable networks

Fiber-optic cable networks may become the dominant method for high-speed Internet connections. Since the first fiber-optic cable was laid across the Atlantic in 1988, the demand for faster Internet connections is growing, fuelled by the growing network traffic, partly due to increasing implementation of corporate networks spanning the globe and to the use of graphics-heavy contents on the World Wide Web.

Fiber-optic cables have not much more in common with copper wires than the capacity to transmit information. As copper wires, they can be terrestrial and submarine connections, but they allow much higher transmission rates. Copper wires allow 32 telephone calls at the same time, but fiber-optic cable can carry 40,000 calls at the same time. A capacity, Alexander Graham Bell might have not envisioned when he transmitted the first words - "Mr. Watson, come here. I want you" - over a copper wire.

Copper wires will not come out of use in the foreseeable future because of technologies as DSL that speed up access drastically. But with the technology to transmit signals at more than one wavelength on fiber-optic cables, there bandwidth is increasing, too.

For technical information from the Encyclopaedia Britannica on telecommunication cables, click here. For technical information from the Encyclopaedia Britannica focusing on fiber-optic cables, click here.

An entertaining report of the laying of the FLAG submarine cable, up to now the longest fiber-optic cable on earth, including detailed background information on the cable industry and its history, Neal Stephenson has written for Wired: Mother Earth Mother Board. Click here for reading.

Susan Dumett has written a short history of undersea cables for Pretext magazine, Evolution of a Wired World. Click here for reading.

A timeline history of submarine cables and a detailed list of seemingly all submarine cables of the world, operational, planned and out of service, can be found on the Web site of the International Cable Protection Committee.

For maps of fiber-optic cable networks see the website of Kessler Marketing Intelligence, Inc.

http://www.britannica.com/bcom/eb/article/4/0...
http://www.britannica.com/bcom/eb/article/4/0...
http://www.wired.com/wired/archive/4.12/ffgla...
http://www.pretext.com/mar98/features/story3....
INDEXCARD, 5/18
 
Defense Advanced Research Project Agency (DARPA)

DARPA (Defense Advanced Research Projects Agency) is the independent research branch of the U.S. Department of Defense that, among its other accomplishments, funded a project that in time was to lead to the creation of the Internet. Originally called ARPA (the "D" was added to its name later), DARPA came into being in 1958 as a reaction to the success of Sputnik, Russia's first manned satellite. DARPA's explicit mission was (and still is) to think independently of the rest of the military and to respond quickly and innovatively to national defense challenges.

In the late 1960s, DARPA provided funds and oversight for a project aimed at interconnecting computers at four university research sites. By 1972, this initial network, now called the ARPAnet, had grown to 37 computers. ARPANet and the technologies that went into it, including the evolving Internet Protocol (IP) and the Transmission Control Protocol (TCP), led to the Internet that we know today.

http://www.darpa.mil

INDEXCARD, 6/18
 
Expert system

Expert systems are advanced computer programs that mimic the knowledge and reasoning capabilities of an expert in a particular discipline. Their creators strive to clone the expertise of one or several human specialists to develop a tool that can be used by the layman to solve difficult or ambiguous problems. Expert systems differ from conventional computer programs as they combine facts with rules that state relations between the facts to achieve a crude form of reasoning analogous to artificial intelligence. The three main elements of expert systems are: (1) an interface which allows interaction between the system and the user, (2) a database (also called the knowledge base) which consists of axioms and rules, and (3) the inference engine, a computer program that executes the inference-making process. The disadvantage of rule-based expert systems is that they cannot handle unanticipated events, as every condition that may be encountered must be described by a rule. They also remain limited to narrow problem domains such as troubleshooting malfunctioning equipment or medical image interpretation, but still have the advantage of being much lower in costs compared with paying an expert or a team of specialists.

INDEXCARD, 7/18
 
Celera

Celera is an American company dedicated to the full sequencing and exploitation of the humane genome according to private business criteria. The company whose slogan is "Speed matters", is run by the Vietnam veteran Craig Ventor, whose declarations and business practices have given rise to widespread criticism. Unlike the Humane Genome Project, which is mapping the entire genome, Dr Ventor's method focuses on the genome information contained in messenger molecules. In keeping with Celera's slogan, this allows a much faster sequencing rate. The aggressive manoeuvring of Celera, coupled with Dr Ventor's unchecked self-esteem which lead him to compare himself to Nobel Prize winners, has meant that Dr. Ventor has been ostracised within the scientific community. James Watson, the co-discoverer of DNA, refers to Dr. Ventor's fast but relatively crude results as work that "any monkey could do" (source: BBC)

http://www.celera.com

INDEXCARD, 8/18
 
Newsgroups

Newsgroups are on-line discussion groups on the Usenet. Over 20,000 newsgroups exist, organized by subject into hierarchies. Each subject hierarchy is further broken down into subcategories. Covering an incredible wide area of interests and used intensively every day, they are an important part of the Internet.

For more information, click here ( http://www.terena.nl/libr/gnrt/group/usenet.html ).

http://www.terena.nl/libr/gnrt/group/usenet.h...
INDEXCARD, 9/18
 
CNN

CNN is a U.S.-TV-enterprise, probably the world's most famous one. Its name has become the symbol for the mass-media, but also the symbol of a power that can decide which news are important for the world and which are not worth talking about. Every message that is published on CNN goes around the world. The Gulf War has been the best example for this until now, when a CNN-reporter was the one person to do the countdown to a war. The moments when he stood on the roof of a hotel in Baghdad and green flashes surrounded him, went around the world.

INDEXCARD, 10/18
 
Electronic Messaging (E-Mail)

Electronic messages are transmitted and received by computers through a network. By E-Mail texts, images, sounds and videos can be sent to single users or simultaneously to a group of users. Now texts can be sent and read without having them printed.

E-Mail is one of the most popular and important services on the Internet.

INDEXCARD, 11/18
 
Digital Subscriber Line (DSL)

DSL connections are high-speed data connections over copper wire telephone lines. As with cable connections, with DSL you can look up information on the Internet and make a phone call at the same time but you do not need to have a new or additional cable or line installed. One of the most prominent DSL services is ISDN (integrated services digital network, for more information click here ( http://www.britannica.com/bcom/eb/article/4/0,5716,129614+15,00.html )).

http://www.britannica.com/bcom/eb/article/4/0...
INDEXCARD, 12/18
 
skytale

The skytale (pronunciation: ski-ta-le) was a Spartan tool for encryption. It consisted of a piece of wood and a leather-strip. Any communicating party needed exactly the same size wooden stick. The secret message was written on the leather-strip that was wound around the wood, unwound again and sent to the recipient by a messenger. The recipient would rewound the leather and by doing this enciphering the message.

INDEXCARD, 13/18
 
Louis Braille

b. Jan. 4, 1809, Coupvray, near Paris, France
d. Jan. 6, 1852, Paris, France

Educator who developed a system of printing and writing that is extensively used by the blind and that was named for him. Himself blind Braille became interested in a system of writing, exhibited at the school by Charles Barbier, in which a message coded in dots was embossed on cardboard. When he was 15, he worked out an adaptation, written with a simple instrument, that met the needs of the sightless. He later took this system, which consists of a six-dot code in various combinations, and adapted it to musical notation. He published treatises on his type system in 1829 and 1837.

INDEXCARD, 14/18
 
Wide Area Network (WAN)

A Wide Area Network is a wide area proprietary network or a network of local area networks. Usually consisting of computers, it may consist of cellular phones, too.

INDEXCARD, 15/18
 
Sputnik

At the beginning of the story of today's global data networks is the story of the development of satellite communication.

In 1955 President Eisenhower announced the USA's intention to launch a satellite. But it was the Soviet Union, which launched the first satellite in 1957: Sputnik I. After Sputnik's launch it became evident that the Cold War was also a race for leadership in the application of state-of-the-art technology to defence. As the US Department of Defence encouraged the formation of high-tech companies, it laid the ground to Silicon Valley, the hot spot of the world's computer industry.

In the same year the USA launched their first satellite - Explorer I - data were transmitted over regular phone circuits for the first time, thus laying the ground for today's global data networks.

Today's satellites may record weather data, scan the planet with powerful cameras, offer global positioning and monitoring services, and relay high-speed data transmissions. But up to now, most satellites are designed for military purposes such as reconnaissance.

INDEXCARD, 16/18
 
Braille

Universally accepted system of writing used by and for blind persons and consisting of a code of 63 characters, each made up of one to six raised dots arranged in a six-position matrix or cell. These Braille characters are embossed in lines on paper and read by passing the fingers lightly over the manuscript. Louis Braille, who was blinded at the age of three, invented the system in 1824 while a student at the Institution Nationale des Jeunes Aveugles (National Institute for Blind Children), Paris.

INDEXCARD, 17/18
 
NSFNet

Developed under the auspices of the National Science Foundation (NSF), NSFnet served as the successor of the ARPAnet as the main network linking universities and research facilities until 1995, when it was replaced it with a commercial backbone network. Being research networks, ARPAnet and NSFnet served as testing grounds for future networks.

INDEXCARD, 18/18