|
Late 1950s - Early 1960s: Second Generation Computers An important change in the development of computers occurred in 1948 with the invention of the Stretch by Throughout the early 1960s there were a number of commercially successful computers (for example the IBM 1401) used in business, universities, and government and by 1965 most large firms routinely processed financial information by using computers. Decisive for the success of computers in business was the stored program concept and the development of sophisticated high-level |
|
|
|
Timeline Cryptography - Introduction Besides oral conversations and written language many other ways of information-transport are known: like the bush telegraph, drums, smoke signals etc. Those methods are not cryptography, still they need en- and decoding, which means that the history of language, the history of communication and the history of cryptography are closely connected to each other The timeline gives an insight into the endless fight between enciphering and deciphering. The reasons for them can be found in public and private issues at the same time, though mostly connected to military maneuvers and/or political tasks. One of the most important researchers on Cryptography through the centuries is |
|
|
|
Legal Protection: National Legislation |
|
|
|
Atrocity Stories Atrocity stories are nothing else than lies; the two words "atrocity stories" simply pretend to be more diplomatic. The purpose is to destroy an image of the enemy, to create a new one, mostly a bad one. The story creating the image is not necessarily made up completely. It can also be a changed into a certain variable direction. The most important thing about atrocity stories is to follow the line of possibility. Even if the whole story is made up it must be probable or at least possible, following rumors. Most successful might it be if a rumor is spread on purpose, some time before the atrocity story is launched, because as soon as something seems to be familiar, it is easier to believe it. |
|
|
|
Instinet Instinet, a wholly owned subsidiary of |
|
|
|
IIPA The International |
|
|
|
Microsoft Network Microsoft Network is the online service from http://www.msn.com |
|
|
|
Cooperative Association of Internet Data Analysis (CAIDA) Based at the University of California's San Diego Supercomputer Center, CAIDA supports cooperative efforts among the commercial, government and research communities aimed at promoting a scalable, robust Internet infrastructure. It is sponsored by the |
|
|
|
WTO An international organization designed to supervise and liberalize world trade. The WTO (World Trade Organization) is the successor to the General Agreement on Tariffs and Trade (GATT), which was created in 1947 and liberalized the world's trade over the next five decades. The WTO came into being on Jan. 1, 1995, with 104 countries as its founding members. The WTO is charged with policing member countries' adherence to all prior GATT agreements, including those of the last major GATT trade conference, the Uruguay Round (1986-94), at whose conclusion GATT had formally gone out of existence. The WTO is also responsible for negotiating and implementing new trade agreements. The WTO is governed by a Ministerial Conference, which meets every two years; a General Council, which implements the conference's policy decisions and is responsible for day-to-day administration; and a director-general, who is appointed by the Ministerial Conference. The WTO's headquarters are in Geneva, Switzerland. |
|
|
|
Neighboring rights Copyright laws generally provide for three kinds of neighboring rights: 1) the rights of performing artists in their performances, 2) the rights of producers of phonograms in their phonograms, and 3) the rights of broadcasting organizations in their radio and television programs. Neighboring rights attempt to protect those who assist intellectual creators to communicate their message and to disseminate their works to the public at large. |
|
|