Late 1950s - Early 1960s: Second Generation Computers

An important change in the development of computers occurred in 1948 with the invention of the transistor. It replaced the large, unwieldy vacuum tube and as a result led to a shrinking in size of electronic machinery. The transistor was first applied to a computer in 1956. Combined with the advances in magnetic-core memory, the use of transistors resulted in computers that were smaller, faster, more reliable and more energy-efficient than their predecessors.

Stretch by IBM and LARC by Sperry-Rand (1959) were the first large-scale machines to take advantage of the transistor technology (and also used assembly language instead of the difficult machine language). Both developed for atomic energy laboratories could handle enormous amounts of data, but still were costly and too powerful for the business sector's needs. Therefore only two LARC's were ever installed.

Throughout the early 1960s there were a number of commercially successful computers (for example the IBM 1401) used in business, universities, and government and by 1965 most large firms routinely processed financial information by using computers. Decisive for the success of computers in business was the stored program concept and the development of sophisticated high-level programming languages like FORTRAN (Formular Translator), 1956, and COBOL (Common Business-Oriented Language), 1960, that gave them the flexibility to be cost effective and productive. The invention of second generation computers also marked the beginning of an entire branch, the software industry, and the birth of a wide range of new types of careers.

TEXTBLOCK 1/5 // URL: http://world-information.org/wio/infostructure/100437611663/100438659439
 
Product Placement

With television still being very popular, commercial entertainment has transferred the concept of soap operas onto the Web. The first of this new species of "Cybersoaps" was "The Spot", a story about the ups and downs of an American commune. The Spot not only within short time attracted a large audience, but also pioneered in the field of online product placement. Besides Sony banners, the companies logo is also placed on nearly every electronic product appearing in the story. Appearing as a site for light entertainment, The Spots main goal is to make the name Sony and its product range well known within the target audience.

TEXTBLOCK 2/5 // URL: http://world-information.org/wio/infostructure/100437611652/100438658026
 
Public Relations and the Advertising Industry

The public relations industry, the same as advertising, is concentrated in the hands of few dominant firms. Still, the striking element about corporate public relations is that PR firms are tightly related to advertising companies. Nine out of the ten biggest international PR agencies have close ties with the advertising industry. Also, looking at the largest acquisitions involving U.S. PR firms from 1997 to 1999 it is apparent that money coming from advertising agencies has played an important role.


Table: Top 10 PR Firms 1998


Rank 1998

PR Firm

Advertising Agency Related

1998 Net Fees (in U.S. $)

1997 - 1998 % Change

1

Burson-Marsteller

yes

258,417,000

4.2

2

Hill and Knowlton

yes

206,000,000

8.9

3

Porter Novelli Int.

yes

183,050,000

23.6

4

Shandwick

yes

170,300,000

7.3

5

Fleishman-Hillard

yes

160,692,000

19.1.

6

Edelman PR Worldwide

no

157,840,530

18.1

7

Ketchum

yes

125,248,000

29.6

8

BSMG Worldwide

yes

118,963,000

93.0

9

Weber PR Worldwide

yes

83,166,000

36.2

10

GCI/APCO

yes

79,667,957

28.4




With many PR agencies sold to advertising companies, the advertising industry's influence further increases; enabling them to offer their clients not only advertising services, but also know-how in marketing, public opinion, crisis and issues management and political lobbying.

Table: Acquisition of PR Agencies (1997 - 1999)

Acquired Company

Buyer

Buyers Industry

Estimated Purchase Price (in millions of U.S. $)

International PR

Interpublic Group of Cos.

Advertising

230

Fleishman-Hillard

Omicom Group

Advertising

85

Ketchum

Omnicom Group

Advertising

60

Dewe Rogerson

Incepta

Advertising

40

Financial Rel. Bd.

BSMG/TN

Public Relations

33

Weber PR

Interpublic Group of Cos.

Advertising

15

Alexander

WPP Group

Advertising

15

Charles Barker

BSMG/TN

Public Relations

15



Source: Odwyerpr.com.

TEXTBLOCK 3/5 // URL: http://world-information.org/wio/infostructure/100437611652/100438658092
 
Biometrics applications: privacy issues

All biometric technologies capture biometric data from individuals. Once these date have been captured by a system, they can, in principle, be forwarded to other locations and put to many different uses which are capable of compromising on an individuals privacy.

Technically it is easy to match biometric data with other personal data stored in government or corporate files, and to come a step closer to the counter-utopia of the transparent citizen and customer whose data body is under outside control.

While biometric technologies are often portrayed as protectors of personal data and safeguards against identity theft, they can thus contribute to an advance in "Big Brother" technology.

The combination of personalised data files with biometric data would amount to an enormous control potential. While nobody in government and industry would admit to such intentions, leading data systems companies such as EDS (Electronic Data Systems; http://www.eds.com) are also suppliers of biometric systems to the intelligence agencies of government and industry.

Biometric technologies have the function of identification. Historically, identification has been a prerequisite for the exercise of power and serves as a protection only to those who are in no conflict with this power. If the digitalisation of the body by biometric technologies becomes as widespread as its proponents hope, a new electronic feudal system could be emerging, in which people are reduced to subjects dispossessed of their to their bodies, even if these, unlike in the previous one, are data bodies. Unlike the gatekeepers of medieval towns, wear no uniforms by they might be identified; biometric technologies are pure masks.

TEXTBLOCK 4/5 // URL: http://world-information.org/wio/infostructure/100437611729/100438658826
 
Biometrics applications: gate keeping

Identity has to do with "place". In less mobile societies, the place where a person finds him/herself tells us something about his/her identity. In pre-industrial times, gatekeepers had the function to control access of people to particular places, i.e. the gatekeepers function was to identify people and then decide whether somebody's identity would allow that person to physically occupy another place - a town, a building, a vehicle, etc.

In modern societies, the unambiguous nature of place has been weakened. There is a great amount of physical mobility, and ever since the emergence and spread of electronic communication technologies there has been a "virtualisation" of places in what today we call "virtual space" (unlike place, space has been a virtual reality from the beginning, a mathematical formula) The question as to who one is no longer coupled to the physical abode. Highly mobile and virtualised social contexts require a new generation of gatekeepers which biometric technology aims to provide.

TEXTBLOCK 5/5 // URL: http://world-information.org/wio/infostructure/100437611729/100438658757
 
Operating system

An operating system is software that controls the many different operations of a computer and directs and coordinates its processing of programs. It is a remarkably complex set of instructions that schedules the series of jobs (user applications) to be performed by the computer and allocates them to the computer's various hardware systems, such as the central processing unit, main memory, and peripheral systems. The operating system directs the central processor in the loading, storage, and execution of programs and in such particular tasks as accessing files, operating software applications, controlling monitors and memory storage devices, and interpreting keyboard commands. When a computer is executing several jobs simultaneously, the operating system acts to allocate the computer's time and resources in the most efficient manner, prioritizing some jobs over others in a process called time-sharing. An operating system also governs a computer's interactions with other computers in a network.

INDEXCARD, 1/5
 
Microsoft Corporation

Founded by Bill Gates and Paul Allen and headquartered in Redmond, USA, Microsoft Corporation is today's world-leading developer of personal-computer software systems and applications. As MS-DOS, the first operating system released by Microsoft, before, Windows, its successor, has become the de-facto standard operating system for personal computer. According to critics and following a recent court ruling this is due to unfair competition.

http://www.microsoft.com

For more detailed information see the Encyclopaedia Britannica: http://www.britannica.com/bcom/eb/article/4/0,5716,1524+1+1522,00.html

http://www.microsoft.com/
http://www.britannica.com/bcom/eb/article/4/0...
INDEXCARD, 2/5
 
Censorship of Online Content in China

During the Tian-an men massacre reports and photos transmitted by fax machines gave notice of what was happening only with a short delay. The Chinese government has learned his lesson well and "regulated" Internet access from the beginning. All Internet traffic to and out of China passes through a few gateways, a few entry-points, thus making censorship a relatively easy task. Screened out are web sites of organizations and media which express dissident viewpoints: Taiwan's Democratic Progress Party and Independence Party, The New York Times, CNN, and sites dealing with Tibetan independence and human rights issues.

Users are expected not to "harm" China's national interests and therefore have to apply for permission of Internet access; Web pages have to be approved before being published on the Net. For the development of measures to monitor and control Chinese content providers, China's state police has joined forces with the MIT.

For further information on Internet censorship, see Human Rights Watch, World Report 1999.

http://www.dpp.org/
http://www.nytimes.com/
http://www.hrw.org/worldreport99/special/inte...
INDEXCARD, 3/5
 
Central processing unit

A CPU is the principal part of any digital computer system, generally composed of the main memory, control unit, and arithmetic-logic unit. It constitutes the physical heart of the entire computer system; to it is linked various peripheral equipment, including input/output devices and auxiliary storage units...

INDEXCARD, 4/5
 
Amazon.Com

Amazon.Com was one of the first online bookstores. With thousands of books, CDs and videos ordered via the Internet every year, Amazon.Com probably is the most successful Internet bookstore.

INDEXCARD, 5/5