|
Economic structure; digital euphoria The dream of a conflict-free capitalism appeals to a diverse audience. No politician can win elections without eulogising the benefits of the information society and promising universal wealth through informatisation. "Europe must not lose track and should be able to make the step into the new knowledge and information society in the 21st century", said Tony Blair. The US government has declared the construction of a fast information infrastructure network the centerpiece of its economic policies In Lisbon the EU heads of state agreed to accelerate the informatisation of the European economies The German Chancellor Schröder has requested the industry to create 20,000 new informatics jobs. The World Bank understands information as the principal tool for third world development Electronic classrooms and on-line learning schemes are seen as the ultimate advance in education by politicians and industry leaders alike. But in the informatised economies, traditional exploitative practices are obscured by the glamour of new technologies. And the nearly universal acceptance of the ICT message has prepared the ground for a revival of 19th century "adapt-or-perish" ideology. "There is nothing more relentlessly ideological than the apparently anti-ideological rhetoric of information technology" (Arthur and Marilouise Kroker, media theorists) |
|
|
|
Challenges for Copyright by ICT: Introduction Traditional copyright and the practice of paying Yet again new technologies have altered the way of how (copyrighted) works are produced, copied, made obtainable and distributed. The emergence of global electronic networks and the increased availability of digitalized intellectual property confront existing copyright with a variety of questions and challenges. Although the combination of several types of works within one larger work or on one data carrier, and the digital format (although this may be a recent development it has been the object of detailed legal scrutiny), as well as networking (telephone and cable networks have been in use for a long time, although they do not permit interactivity) are nothing really new, the circumstance that recent technologies allow the presentation and storage of text, sound and visual information in digital form indeed is a novel fact. Like that the entire information can be generated, altered and used by and on one and the same device, irrespective of whether it is provided online or offline. |
|
|
|
Virtual cartels; mergers In parallel to the deregulation of markets, there has been a trend towards large-scale mergers which ridicules dreams of increased competition. Recent mega-mergers and acquisitions include SBC Communications - Ameritech, $ 72,3 bn Bell Atlantic - GTE, $ 71,3 AT&T - Media One, $ 63,1 AOL - Time Warner, $ 165 bn MCI Worldcom - Spring, $ 129 bn The total value of all major mergers since the beginnings of the 1990s has been 20 trillion Dollars, 2,5 times the size of the USA's GIP. The AOL- Time Warner reflects a trend which can be observed everywhere: the convergence of the ICT and the content industries. This represents the ultimate advance in complete market domination, and a alarming threat to independent content. "Is TIME going to write something negative about AOL? Will AOL be able to offer anything other than CNN sources? Is the Net becoming as silly and unbearable as television?" (Detlev Borchers, journalist) |
|
|
|
More and more, faster and faster, but... Since the invention of appropriate means and technologies, communication no longer requires face-to-face meetings. From writing and reading to using computers, expanding and exhausting one's possibilities to communicate relies more and more on the application of skills we have to learn. With the increasing importance of communication technologies, learning to apply them properly becomes a kind of rite of passage. A Small World From the very beginning - the first Sumerian pictographs on clay tablets - to today's state of the art technologies - broadband communication via Since the invention of the electrical telegraph, but especially with today's growing digital communication networks, every location on earth seems to be close, however distant it may be, and also time no longer remains a significant dimension. Threatened Cultural Memory More and more information is transmitted and produced faster and faster, but the shelf life of information becomes more and more fragile. For more than 4500 years Sumerian pictographs written on clay tablets remained intact, but newspapers and books, printed some decades ago, crumble into pieces; film reels, video tapes and cassettes corrode. Digitalization of information is not a cure; on the contrary it even intensifies the danger of destroying cultural heritage. Data increasingly requires specific software and hardware, but to regularly convert all available digitized information is an unexecutable task. Compared to the longevity of pictographs on clay tablets, digitized information is produced for instant one-time use. The increasing production and processing of information causes a problem hitherto unknown: the loss of our cultural memory. For further information see For another history of communication systems see |
|
|
|
1000 B.C. - 0 900 B.C. A postal service is used for governmental purposes in China. 500 B.C. In ancient Greece trumpets, drums, shouting, beacon, fires, smoke signals, and mirrors are used for message transmission. 4th century B.C. Aeneas Tacitus, a Greek military scientist and cryptographer, invented an optical communication system that combines water and beacon telegraphy. Torches indicated the beginnings and the ends of a message transmission while water jars were used to transmit the messages. These jars had a plugged standard-size hole drilled on the bottom side and were filled with water. As those who sent and those who received the message unplugged the jars simultaneously, the water drained out. Because the transmitted messages corresponded to water levels, the sender indicated by a torch signal that the appropriate water level had been reached. The methods disadvantage was that the possible messages were restricted to a given code, but as the system was mainly used for military purposes, this was offset by the advantage that it was almost impossible for outsiders to understand the messages unless they possessed the codebook. With communication separated from transportation, the distant became near. Tacitus' telegraph system was very fast and not excelled until For further information see Joanne Chang & Anna Soellner, Decoding Device, 3rd century B.C. Wax tablets are used as writing material in Mesopotamia, ancient Greece, and Etruria. 2nd century B.C. In China paper is invented. 1st century B.C. The use of codices instead of scrolls - basically the hardcover book as we know it today - is an essential event in European history. To quote accurately by page number, to browse through pages and to skip chapters - things that were impossible when reading scrolls - becomes possible. In the computer age we are witnesses to a kind of revival of the scrolls as we scroll up and down a document. The introduction of hypertext possibly marks the beginning of a similar change as has taken place with the substitution of scrolls with codices. |
|
|
|
The Secret Behind The secret behind all this is the conception that nothing bad could ever be referred to the own nation. All the bad words belong to the enemy, whereas the "we" is the good one, the one who never is the aggressor but always defender, the savior - not only for ones own sake but also for the others, even if they never asked for it, like the German population during World War I and II. The spiritualization of such thinking leads to the point that it gets nearly impossible to believe that this could be un-true, a fake. To imagine injustice committed by the own nation gets more and more difficult, the longer the tactic of this kind of propaganda goes on. U.S.-Americans voluntarily believe in its politics, believing also the USA works as the police of the world, defending the morally good against those who just do not have reached the same level of civilization until today. To keep up this image, the enemy must be portrayed ugly and bad, like in fairy-tales, black-and-white-pictures. Any connection between oneself and the enemy must be erased and made impossible. In the case of All of this is no invention of several politicians. Huge think tanks and different governmental organizations are standing behind that. Part of their work is to hide their own work, or to deny it. |
|
|
|
Legal Protection: TRIPS (Trade-Related Aspects of Intellectual Property Rights) Another important multilateral treaty concerned with The complete TRIPS agreement can be found on: |
|
|
|
Racism on the Internet The internet can be regarded as a mirror of the variety of interests, attitudes and needs of human kind. Propaganda and disinformation in that way have to be part of it, whether they struggle for something good or evil. But the classifications do no longer function. During the last years the internet opened up a new source for racism as it can be difficult to find the person who gave a certain message into the net. The anarchy of the internet provides racists with a lot of possibilities to reach people which they do not possess in other media, for legal and other reasons. In the 1980s racist groups used mailboxes to communicate on an international level; the first ones to do so were supposedly the A complete network of anti-racist organizations, including a high number of websites are fighting against racism. For example: |
|
|
|
Basics: Rights Recognized Copyright protection generally means that certain uses of a work are lawful only if they are done with the authorization of the owner of the copyright. The most typical are the following: - copying or reproducing a work - performing a work in public - making a sound recording of a work - making a motion picture of a work - broadcasting a work - translating a work - adapting a work Under certain national laws, some of these rights, which are referred to, as "economic rights'" are not exclusive rights of authorization but in specific cases, merely rights to remuneration. Some strictly determined uses (for example quotations or the use of works by way of illustration for teaching) are completely free, that is, they require neither authorization of, nor remuneration for, the owner of the copyright. This practice is described as In addition to economic rights, authors enjoy "moral rights" on the basis of which they have the right to claim their authorship and require that their names be indicated on the copies of the work and in connection with other uses thereof. They also have the right to oppose the mutilation or deformation of their creations. The owner of a copyright may usually transfer his right or may license certain uses of his work. Moral rights are generally inalienable and remain with the creator even after he has transferred his economic rights, although the author may waive their exercise. Furthermore there exist rights related to copyright that are referred to as "neighboring rights". In general there are three kinds of neighboring rights: 1) the rights of performing artists in their performances, 2) the rights of producers of phonograms in their phonograms, and 3) the rights of broadcasting organizations in their radio and television programs. Neighboring rights attempt to protect those who assist intellectual creators to communicate their message and to disseminate their works to the public at large. |
|
|
|
Public Relations and Propaganda Public relations usually is associated with the influencing of public opinion. Therefore it has subsequently been linked with propaganda. Using one of the many definitions of propaganda "... the manipulation of symbols as a means of influencing attitudes on controversial matters" (Harold D. Lasswell), the terms propaganda and PR seem to be easily interchangeable. Still many authors explicitly distinguish between public relations, advertising and propaganda. Unlike PR, which is often described as objective and extensive information of the public, advertising and propaganda are associated with manipulative activities. Nevertheless to treat public relations and propaganda as equivalents stands in the tradition of PR. Also institutions like the |
|
|
|
World War II ... Never before propaganda had been as important as in the 2nd World War. From now on education was one more field of propaganda: its purpose was to teach how to think, while pure propaganda was supposed to show what to think. Every nation founded at least one ministry of propaganda - of course without calling it that way. For example the British called it the Ministry of Information (= MOI), the U.S. distinguished between the Office of Strategic Services (= OSS) and the Office of War Information (= OWI), the Germans created a Ministry of Propaganda and Public Enlightenment (= RMVP) and the Japanese called their disinformation and propaganda campaign the "Thought War". British censorship was so strict that the text of an ordinary propaganda leaflet, that had been dropped from planes several million times, was not given to a journalist who asked for it. Atrocity stories were no longer used the same way as in the 1st World War. Instead, German war propaganda had started long before the war. In the middle of the 1930s Some of the pictures of fear, hatred and intolerance still exist in people's heads. Considering this propaganda did a good job, unfortunately it was the anti-national-socialist propaganda that failed at that time. |
|
|
|
Internet, Intranets, Extranets, and Virtual Private Networks With the rise of networks and the corresponding decline of mainframe services computers have become communication devices instead of being solely computational or typewriter-like devices. Corporate networks become increasingly important and often use the Internet as a public service network to interconnect. Sometimes they are Software companies, consulting agencies, and journalists serving their interests make some further differences by splitting up the easily understandable term Cable TV networks and online services as Especially for financial transactions, secure proprietary networks become increasingly important. When you transfer funds from your banking account to an account in another country, it is done through the SWIFT network, the network of the Electronic Communications Networks as |
|
|
|
Eliminating online censorship: Freenet, Free Haven and Publius Protecting speech on the global data networks attracts an increasing attention. The efforts and the corresponding abilities of governmental authorities, corporations and copyright enforcement agencies are countered by similar efforts and abilities of researchers and engineers to provide means for anonymous and uncensored communication, as Freenet, Free Haven and Publius. All three of them show a similar design. Content is split up and spread on several servers. When a file is requested, the pieces are reassembled. This design makes it difficult to censor content. All of these systems are not commercial products. The most advanced system seems to be Publius. Because of being designed by researchers and engineers at the prestigious For more information on Publius, see John Schwartz, Online and Unidentifiable? in: The Washington Post, June 30, 2000, Freenet web site: Free Haven web site: Publius web site: |
|
|
|
Timeline 1970-2000 AD 1971 IBM's work on the Lucifer cipher and the work of the NSA lead to the U.S. Data Encryption Standard (= 1976 1977/78 the 1984 Congress passes Comprehensive Crime Control Act - The Hacker Quarterly is founded 1986 Computer Fraud and Abuse Act is passed in the USA - Electronic Communications Privacy Act 1987 Chicago prosecutors found Computer Fraud and Abuse Task Force 1988 U.S. Secret Service covertly videotapes a hacker convention 1989 NuPrometheus League distributes Apple Computer software 1990 - - Charles H. Bennett and Gilles Brassard publish their work on Quantum Cryptography - Martin Luther King Day Crash strikes AT&T long-distance network nationwide 1991 - one of the first conferences for Computers, Freedom and Privacy takes place in San Francisco - AT&T phone crash; New York City and various airports get affected 1993 the U.S. government announces to introduce the 1994 - the 1990s work on quantum computer and quantum cryptography - work on biometrics for authentication (finger prints, the iris, smells, etc.) 1996 France liberates its cryptography law: one now can use cryptography if registered - OECD issues Cryptography Policy Guidelines; a paper calling for encryption exports-standards and unrestricted access to encryption products 1997 April European Commission issues Electronic Commerce Initiative, in favor of strong encryption 1997 June PGP 5.0 Freeware widely available for non-commercial use 1997 June 56-bit DES code cracked by a network of 14,000 computers 1997 August U.S. judge assesses encryption export regulations as violation of the First Amendment 1998 February foundation of Americans for Computer Privacy, a broad coalition in opposition to the U.S. cryptography policy 1998 March 1998 April NSA issues a report about the risks of key recovery systems 1998 July 1998 October Finnish government agrees to unrestricted export of strong encryption 1999 January RSA Data Security, establishes worldwide distribution of encryption product outside the USA - National Institute of Standards and Technologies announces that 56-bit - 56-bit DES code is cracked in 22 hours and 15 minutes 1999 May 27 United Kingdom speaks out against key recovery 1999 Sept: the USA announce to stop the restriction of cryptography-exports 2000 as the German government wants to elaborate a cryptography-law, different organizations start a campaign against that law - computer hackers do no longer only visit websites and change little details there but cause breakdowns of entire systems, producing big economic losses for further information about the history of cryptography see: for information about hacker's history see: |
|
|
|
Palm recognition In palm recognition a 3-dimensional image of the hand is collected and compared to the stored sample. Palm recognition devices are cumbersome artefacts (unlike fingerprint and iris recognition devices) but can absorb perform a great amount of identification acts in a short time. They are therefore preferably installed in situations where a large number of people is identified, as in airports. |
|
|
|
The Egyptians ... Besides ordinary religious manipulation-tools the Egyptians were masters of using architecture for propaganda. In Egypt, most of all, architecture was used as a media to demonstrated power, whereas the Greek and Romans used other types of art, like statues, for political propaganda. The pyramids, palaces, tombs became tools for power demonstrations. Paintings and carvings (like on obelisks) proved the might of the rulers. All those signs of power were done to make people compare their ruling dynasty to gods and keep them politically silent, because religion was used for justifying mortal power. Marble, gold, jewelry and artists were the tools for those maneuvers. Whereas questions for the truth were not even asked or listened to. Finally it was the masses who were used for propaganda, when they were not only forced to work as slaves on those signs of power but also were abused for those power demonstrations, when they had to accompany the dead king into his tomb - dying of hunger, thirst, lack of oxygen and in darkness. The more religious disinformation the more luxury. The more luxury the better. The more luxury the more power. |
|
|
|
Biometric applications: surveillance Biometric technologies are not surveillance technologies in themselves, but as identification technologies they provide an input into surveillance which can make such as face recognition are combined with camera systems and criminal data banks in order to supervise public places and single out individuals. Another example is the use of biometrics technologies is in the supervision of probationers, who in this way can carry their special hybrid status between imprisonment and freedom with them, so that they can be tracked down easily. Unlike biometric applications in access control, where one is aware of the biometric data extraction process, what makes biometrics used in surveillance a particularly critical issue is the fact that biometric samples are extracted routinely, unnoticed by the individuals concerned. |
|
|
|
The North against the South? "Faced with this process of globalization, most governments appear to lack the tools required for facing up to the pressure from important media changes. The new global order is viewed as a daunting challenge, and it most often results in reactions of introversion, withdrawal and narrow assertions of national identity. At the same time, many developing countries seize the opportunity represented by globalization to assert themselves as serious players in the global communications market." (UNESCO, World Communication Report) The big hope of the South is that the Internet will close the education gap and economic gap, by making education easier to achieve. But in reality the gap is impossible to close, because the North is not keeping still, but developing itself further and further all the time; inventing new technologies that produce another gap each. The farmer's boy sitting in the dessert and using a cellular telephone and a computer at the same time is a sarcastic picture - nothing else. Still, the so called developing countries regard modern communication technologies as a tremendous chance - and actually: which other choice is there left? |
|
|
|
The "Corpse-Conversion Factory"-rumor Supposedly the most famous British atrocity story concerning the Germans during World War I was the "Corpse-Conversion Factory"-rumor; it was said the Germans produced soap out of corpses. A story, which got so well believed that it was repeated for years - without a clear evidence of reality at that time. ( |
|
|
|
The Tools of Disinformation and Propaganda "In wartime they attack a part of the body that other weapons cannot reach in an attempt to affect the way which participants perform on the field of battle." ( Therefore the demonstrated tools refer to political propaganda in the two World Wars. Propaganda has the ability to change a war, a natural evil, into a so-called "just" war. Violence then is supposedly defense, no more aggression. |
|
|
|
1980s: Artificial Intelligence (AI) - From Lab to Life Following the commercial success of New technologies were being invented in Japan. |
|
|
|
Content as Transport Medium for Values and Ideologies With the dissemination of their content commercial media are among other things also able to transport values and ideologies. Usually their programming reflects society's dominant social, political, ethical, cultural and economical values. A critical view of the prevalent ideologies often is sacrificed so as not to offend the existing political elites and corporate powers, but rather satisfy shareholders and advertisers. With most of the worlds content produced by a few commercial media conglomerates, with the overwhelming majority of companies (in terms of revenue generation) concentrated in Europe, the U.S., Japan and Australia there is also a strong flow of content from the 'North-West' to the 'South-East'. Popular culture developed in the world's dominant commercial centers and Western values and ideologies are so disseminated into the most distant corners of the earth with far less coming back. |
|
|
|
Biometrics applications: physical access This is the largest area of application of biometric technologies, and the most direct lineage to the feudal gate keeping system. Initially mainly used in military and other "high security" territories, physical access control by biometric technology is spreading into a much wider field of application. Biometric access control technologies are already being used in schools, supermarkets, hospitals and commercial centres, where the are used to manage the flow of personnel. Biometric technologies are also used to control access to political territory, as in immigration (airports, Mexico-USA border crossing). In this case, they can be coupled with camera surveillance systems and artificial intelligence in order to identify potential suspects at unmanned border crossings. Examples of such uses in remote video inspection systems can be found at A gate keeping system for airports relying on digital fingerprint and hand geometry is described at An electronic reconstruction of feudal gate keeping capable of singling out high-risk travellers from the rest is already applied at various border crossing points in the USA. "All enrolees are compared against national lookout databases on a daily basis to ensure that individuals remain low risk". As a side benefit, the economy of time generated by the inspection system has meant that "drug seizures ... have increased since Inspectors are able to spend more time evaluating higher risk vehicles". However, biometric access control can not only prevent people from gaining access on to a territory or building, they can also prevent them from getting out of buildings, as in the |
|
|
|
History: Communist Tradition Following the communist revolutions of the 20th century all "means of production" became the property of the state as representative of "the masses". Private property ceased to exist. While moral rights of the creator were recognized and economic rights acknowledged with a one-time cash award, all subsequent rights reverted to the state. With the transformation of many communist countries to a market system most of them have now introduced laws establishing markets in intellectual property rights. Still the high rate of piracy reflects a certain lack of legal tradition. |
|
|
|
Timeline 1900-1970 AD 1913 the wheel cipher gets re-invented as a strip 1917 - an AT&T-employee, Gilbert S. Vernam, invents a polyalphabetic cipher machine that works with random-keys 1918 the Germans start using the ADFGVX-system, that later gets later by the French Georges Painvin - Arthur Scherbius patents a ciphering machine and tries to sell it to the German Military, but is rejected 1919 Hugo Alexander Koch invents a rotor cipher machine 1921 the Hebern Electric Code, a company producing electro-mechanical cipher machines, is founded 1923 Arthur Scherbius founds an enterprise to construct and finally sell his late 1920's/30's more and more it is criminals who use cryptology for their purposes (e.g. for smuggling). Elizabeth Smith Friedman deciphers the codes of rum-smugglers during prohibition regularly 1929 Lester S. Hill publishes his book Cryptography in an Algebraic Alphabet, which contains enciphered parts 1933-1945 the Germans make the Enigma machine its cryptographic main-tool, which is broken by the Poles Marian Rejewski, Gordon Welchman and Alan Turing's team at Bletchley Park in England in 1939 1937 the Japanese invent their so called Purple machine with the help of Herbert O. Yardley. The machine works with telephone stepping relays. It is broken by a team of 1930's the Sigaba machine is invented in the USA, either by W.F. Friedman or his colleague Frank Rowlett - at the same time the British develop the Typex machine, similar to the German Enigma machine 1943 Colossus, a code breaking computer is put into action at Bletchley Park 1943-1980 the cryptographic Venona Project, done by the NSA, is taking place for a longer period than any other program of that type 1948 Shannon, one of the first modern cryptographers bringing mathematics into cryptography, publishes his book A Communications Theory of Secrecy Systems 1960's the Communications-Electronics Security Group (= CESG) is founded as a section of Government Communications Headquarters (= GCHQ) late 1960's the IBM Watson Research Lab develops the Lucifer cipher 1969 James Ellis develops a system of separate public-keys and private-keys |
|
|
|
Artificial intelligence approaches Looking for ways to create intelligent machines, the field of |
|
|
|
Charles Babbage b. December 26, 1791, London, England d. October 18, 1871, London, England English mathematician and inventor who is credited with having conceived the first automatic digital computer. The idea of mechanically calculating mathematical tables first came to Babbage in 1812 or 1813. Later he made a small |
|
|
|
Network Information Center (NIC) Network information centers are organizations responsible for registering and maintaining the domain names on the |
|
|
|
Richard Barbrook and Andy Cameron, The Californian Ideology According to Barbrook and Cameron there is an emerging global orthodoxy concerning the relation between society, technology and politics. In this paper they are calling this orthodoxy the Californian Ideology in honor of the state where it originated. By naturalizing and giving a technological proof to a political philosophy, and therefore foreclosing on alternative futures, the Californian ideologues are able to assert that social and political debates about the future have now become meaningless and - horror of horrors - unfashionable. - This paper argues for an interactive future. http://www.wmin.ac.uk/media/HRC/ci/calif.html |
|
|
|
Convergence, 2000- Digital technologies are used to combine previously separated communication and media systems as telephony, audiovisual technologies and computing to new services and technologies, thus forming extensions of existing communication systems and resulting in fundamentally new communication systems. This is what is meant by today's new buzzwords "multimedia" and "convergence". Classical dichotomies as the one of computing and telephony and traditional categorisations no longer apply, because these new services no longer fit traditional categories. |
|
|
|
Edward L. Bernays Born 1891 in Vienna, Bernays was one of the founders of modern public relations. An enigmatic character, he was a master of mise en scène with far-reaching contacts in the world of business and politics. The nephew of Sigmund Freund and related with Heinrich Heine, he was also among the first to pursue PR for governments and to produce pseudo-events. Bernays considered the manipulation of public opinion as an important element of mass democracies and was of the opinion that only through PR a society's order can be kept. |
|
|
|
Theoedore Roosevelt With the assassination of President McKinley, Theodore Roosevelt (1858-1919), not quite 43, became the youngest President in the Nation's history. Roosevelt's youth differed sharply from that of the log cabin Presidents. He was born in New York City in 1858 into a wealthy family. Roosevelt steered the United States more actively into world politics. He liked to quote a favorite proverb, "Speak softly and carry a big stick. . . . " He won the Nobel Peace Prize for mediating the Russo-Japanese War. for more information see the official website: |
|
|
|
International Standardization Organization ISO (International Organization for Standardization), founded in 1946, is a worldwide federation of national standards bodies from some 100 countries, one from each country. Among the standards it fosters is Source: Whatis.com |
|
|
|
Amazon.Com Amazon.Com was one of the first online bookstores. With thousands of books, CDs and videos ordered via the Internet every year, Amazon.Com probably is the most successful Internet bookstore. |
|
|
|
Friedrich Kittler, The History of Communication Media In this essay, Friedrich Kittler, one of the world's leading media theorists and media historicist, offers a concise and fascinating history of communication technologies in general terms from its beginnings up to now, provoking new insights by showing interesting interdependencies. http://www.ctheory.com/ga1.14.html |
|
|
|
Disney American corporation that became the best-known purveyor of child and adult entertainment in the 20th century. Its headquarters are in Burbank, Calif. The company was founded in 1929 and produced animated motion-picture cartoons. In 1955 the company opened the Disneyland amusement park, one of the world's most famous. Under a new management, in the 1980s, Disney's motion-picture and animated-film production units became among the most successful in the United States. In 1996 the Disney corporation acquired Capital Cities/ABC Inc., which owned the ABC television network. The Disney Company also operates the Disney Channel, a pay television programming service. |
|
|
|
Joseph Stalin Joseph Stalin (1879-1953): After Lenin's death he took over and became a dictator without any limits of power. Everyone who dared to talk or act against him or was in suspicion of doing so, got killed. Millions were murdered. His empire was one made out of propaganda and fear. As long as he was in power his picture had to be in every flat and bureau. Soon after his death the cult was stopped and in 1956 the De-Stalination was started, though he was partly rehabilitated in 1970. |
|
|
|
Extranet An Extranet is an Intranet with limited and controlled access by authenticated outside users, a business-to-business Intranet, e.g. |
|
|
|
The Internet Engineering Task Force The Internet Engineering Task Force contributes to the evolution of the architecture, the protocols and technologies of the Net by developing new Internet standard specifications. The directors of its functional areas form the Internet Society: |
|
|
|
Proprietary Network Proprietary networks are computer networks with standards different to the ones proposed by the |
|
|
|
Intelsat Intelsat, the world's biggest communication satellite services provider, is still mainly owned by governments, but will be privatised during 2001, like http://www.intelsat.int/index.htm |
|
|
|
Defense Advanced Research Project Agency (DARPA) DARPA (Defense Advanced Research Projects Agency) is the independent research branch of the U.S. Department of Defense that, among its other accomplishments, funded a project that in time was to lead to the creation of the Internet. Originally called ARPA (the "D" was added to its name later), DARPA came into being in 1958 as a reaction to the success of Sputnik, Russia's first manned satellite. DARPA's explicit mission was (and still is) to think independently of the rest of the military and to respond quickly and innovatively to national defense challenges. In the late 1960s, DARPA provided funds and oversight for a project aimed at interconnecting computers at four university research sites. By 1972, this initial network, now called the http://www.darpa.mil |
|
|
|
Internet Societal Task Force The Internet Societal Task Force is an organization under the umbrella of the Internet Society dedicated to assure that the Internet is for everyone by identifying and characterizing social and economic issues associated with the growth and use of Internet. It supplements the technical tasks of the Topics under discussion are social, economic, regulatory, physical barriers to the use of the Net, privacy, interdependencies of Internet penetration rates and economic conditions, regulation and taxation. |
|
|
|
Caching Caching is a mechanism that attempts to decrease the time it takes to retrieve data by storing a copy at a closer location. |
|
|
|
Kosov@ The "word" Kosov@ is a compromise between the Serb name KosovO and the Albanian KosovA. It is mostly used by international people who want to demonstrate a certain consciousness about the conflict including some sort of neutrality, believing that neither the one side nor the other (and maybe not even For more explanations (in German) see: |
|
|
|
Barnes and Noble Massive online retail bookstore housing more than a million titles. Includes a book recommendation "personalizer,", a comprehensive list of The New York Times bestsellers, a "live" community events calendar with a daily survey and several forums, "highlighted" books from 19 subject areas, browsable categories such as antiques, ethnic studies, and pop culture, Books in the News, and weekly features such as reviews, excerpts, recommendations, interviews, events, "roundups" of popular titles, and quizzes. |
|
|
|
Enochian alphabet Also "Angelic" language. Archaic language alphabet composed of 21 letters, discovered by John Dee and his partner Edward Kelley. It has its own grammar and syntax, but only a small sample of it has ever been translated to English. |
|
|
|
Gaius Julius Caesar Gaius Julius Caesar (100-44 BC) was a Roman Statesman who came to power through a military career and by buying of votes. His army won the civil war, run over Spain, Sicily and Egypt, where he made Cleopatra a Queen. For reaching even more power he increased the number of senators. But he also organized social measures to improve the people's food-situation. In February 44 BC he did not accept the kingship offered by Marc Anthony, which made him even more popular. One month later he was murdered during a senate sitting. |
|
|
|
User tracking User tracking is a generic term that covers all the techniques of monitoring the movements of a user on a web site. User tracking has become an essential component in online commerce, where no personal contact to customers is established, leaving companies with the predicament of not knowing who they are talking to. Some companies, such as Whenever user tracking is performed without the explicit agreement of the user, or without laying open which data are collected and what is done with them, considerable |
|
|
|
Machine vision A branch of |
|
|
|
Reuters Group plc Founded in 1851 in London, Reuters is the world's largest news and television agency with 1,946 journalists, photographers and camera operators in 183 bureaus serving newspapers, other news agencies, and radio and television broadcasters in 157 countries. In addition to its traditional news-agency business, over its network Reuters provides financial information and a wide array of electronic trading and brokering services to banks, brokering houses, companies, governments, and individuals worldwide. http://www.reuters.com |
|
|
|
CIM To perform manufacturing firm's functions related to design and production the CAD/CAM technology, for computer-aided design and computer-aided manufacturing, was developed. Today it is widely recognized that the scope of computer applications must extend beyond design and production to include the business functions of the firm. The name given to this more comprehensive use of computers is computer-integrated manufacturing (CIM). |
|
|
|
Copyright management information Copyright management information refers to information which identifies a work, the author of a work, the owner of any right in a work, or information about the terms and conditions of the use of a work, and any numbers or codes that represent such information, when any of these items of information are attached to a copy of a work or appear in connection with the communication of a work to the public. |
|
|
|
Optical communication system by Aeneas Tacitus, 4th century B.C. Aeneas Tacitus, a Greek military scientist and cryptographer, invented an optical communication system that combines water and beacon telegraphy. Torches indicated the beginnings and the ends of message transmissions while water jars were used to transmit the messages. These jars had a plugged standard-size hole drilled on the bottom side and were filled with water. As those who sent and those who received the message unplugged the jars simultaneously, the water drained out. Because the transmitted messages corresponded to water levels, the sender indicated by torch signal that the appropriate water level has been reached. It is a disadvantage that the possible messages are restricted to a given code, but as this system was mainly used for military purposes, this was offset by the advantage that it was almost impossible for outsiders to understand these messages unless they possessed the codebook. With communication separated from transportation, the distant became near. Tacitus' telegraph system was very fast and not excelled until For further information see Joanne Chang & Anna Soellner, Decoding Device, |
|
|
|
Society for Worldwide Interbank Financial Telecommunication (SWIFT) Founded in 1973 by 239 banks from 15 countries, SWIFT is responsible for maintaining the world's most important network dedicated to financial transaction processing. Although facing competition from smart cards, e.g., SWIFT can rely on an increasing clientèle. In September 1999 SWIFT served 6,710 live users in 189 countries. |
|
|
|
German Bundeswehr The German contribution to the Western defence system, apart from playing host and contributing to the continued presence of allied troops on its soil, takes the form of its combined arm of defence known as the Federal Armed Forces (Bundeswehr). Constituting the largest contingent of NATO troops in Europe, the armed forces are divided into an army, navy, and air force. From its inception it was envisioned as a "citizens' " defence force, decisively under civilian control through the Bundestag, and its officers and soldiers trained to be mindful of the role of the military in a democracy. Conscription for males is universal, the military liability beginning at 18 and ending at 45 years of age. |
|
|
|
Terrestrial antennas Microwave transmission systems based on terrestrial antennas are similar to satellite transmission system. Providing reliable high-speed access, they are used for cellular phone networks. The implementation of the |
|
|
|
Newsgroups Newsgroups are on-line discussion groups on the Usenet. Over 20,000 newsgroups exist, organized by subject into hierarchies. Each subject hierarchy is further broken down into subcategories. Covering an incredible wide area of interests and used intensively every day, they are an important part of the Internet. For more information, click here ( |
|
|
|
Medieval universities and copying of books The first of the great medieval universities was established at Bologna. At the beginning, universities predominantly offered a kind of do-it-yourself publishing service. Books still had to be copied by hand and were so rare that a copy of a widely desired book qualified for being invited to a university. Holding a lecture equaled to reading a book aloud, like a priest read from the Bible during services. Attending a lecture equaled to copy a lecture word by word, so you had your own copy of a book, thus enabling you to hold a lecture, too. For further details see History of the Idea of a University, |
|
|
|
1896 1896 The Daily Mail was published in Great Britain. It was the first newspaper for the masses. With the emerging of newspapers the manner how politics was perceived by the public changed completely. It became more difficult to keep secrets, while at the same time there was suddenly a new and nearly perfect tool for manipulation. |
|
|
|
Saddam Hussein Saddam Hussein joined the revolutionary Baath party when he was a university student. In 1958 he had the head of Iraq, Abdul-Karim Qassim, killed. Since 1979 he has been President of Iraq. Under his reign Iraq fought a decade-long war with Iran. Because of his steady enmity with extreme Islamic leaders the West supported him first of all, until his army invaded Kuwait in August 1990, an incident that the USA led to the Gulf War. Since then many rumors about a coup d'état have been launched, but Saddam Hussein is still in unrestricted power. |
|
|
|
Division of labor The term refers to the separation of a work process into a number of tasks, with each task performed by a separate person or group of persons. It is most often applied to |
|
|
|
Seneca Lucius Annaeus Seneca (~4 BC - 65 AD), originally coming from Spain, was a Roman philosopher, statesman, orator and playwright with a lot of influence on the Roman cultural life of his days. Involved into politics, his pupil |
|
|
|
Europe Online Established in 1998 and privately held, Europe Online created and operates the world's largest broadband "Internet via the Sky" network. The Europe Online "Internet via the Sky" service is available to subscribers in English, French, German, Dutch and Danish with more languages to come. http://www.europeonline.com |
|
|
|
General Motors American corporation that was the world's largest automotive manufacturer and perhaps the largest industrial corporation throughout most of the 20th century. It was founded in 1908 to consolidate several motorcar companies and today operates manufacturing and assembly plants and distribution centers throughout the United States and Canada and many other countries. Its major products include automobiles and trucks, a wide range of automotive components, engines, and defense and aerospace material. In 1996 it sold Electronic Data Systems, and in 1997 it sold the defense units of its Hughes Electronics subsidiary to the Raytheon Company, thus leaving the computer-services and defense-aerospace fields in order to concentrate on its automotive businesses. The company's headquarters are in Detroit, Michigan. |
|
|