Examples of Mainly Corporate Funded Think Tanks: Brookings Institution

With a budget of US$ 23 million and assets worth US$ 192 million the Brookings Institution, based in Washington D.C., in 1998 was funded by: Corporate and private donations (38 %), endowment (30 %), revenue from conferences and seminars (18 %), sales of publications (9 %), government support (2 %).

Among the 138 corporate donors are: Bell Atlantic, Citibank, J.P. Morgan, Goldman Sachs, NationsBank, Exxon, Chevron, Microsoft, Hewlett Packard, Toyota, Pfizer, Johnson & Johnson, Dupont, Mobil and Lockheed Martin, and the foundations of companies like American Express, Travelers, AT&T and McDonnell Douglas. A few media conglomerates, like Time Warner and the Washington Post Co.. Contributions of individual donors include executives from Visa, Procter and Gamble, BankAmerica and U.S. Airways.

TEXTBLOCK 1/2 // URL: http://world-information.org/wio/infostructure/100437611704/100438658213
 
Media Relations

Another difference that can be noted between right and left-wing think tanks concerns their media appearance and media relations. While in 1997 53 % of the U.S. media references made to think tanks involved conservative institutions, progressive think tanks accounted for only16 % of the media citations made to think tanks (32 % centrist institutions). This suggests that the media agenda is markedly influenced by conservative issues and ideology, and therefore leads to a considerable imbalance within the spectrum of political views.

On the other hand the financial resources of right- and left- wing media associated with think tanks also differ appreciably. While conservative foundations provided US$ 2,734,263 to four right-of-center magazines between 1990 and 1993 including The National Interest, The Public Interest, The New Criterion, and The American Spectator, over the same time period four left-of-center publications, namely The Nation, The Progressive, In These Times, and Mother Jones received only US$ 269,500 from foundations.

TEXTBLOCK 2/2 // URL: http://world-information.org/wio/infostructure/100437611704/100438658325
 
Vigenère tableau

a b c d e f g h i j k l m n o p q r s t u v w x y z
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
B C D E F G H I J K L M N O P Q R S T U V W X Y Z A
C D E F G H I J K L M N O P Q R S T U V W X Y Z A B
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
E F G H I J K L M N O P Q R S T U V W X Y Z A B C D
F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
H I J K L M N O P Q R S T U V W X Y Z A B C D E F G
I J K L M N O P Q R S T U V W X Y Z A B C D E F G H
J K L M N O P Q R S T U V W X Y Z A B C D E F G H I
K L M N O P Q R S T U V W X Y Z A B C D E F G H I J
L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
M N O P Q R S T U V W X Y Z A B C D E F G H I J K L
N O P Q R S T U V W X Y Z A B C D E F G H I J K L M
O P Q R S T U V W X Y Z A B C D E F G H I J K L M N
P Q R S T U V W X Y Z A B C D E F G H I J K L M N O
Q R S T U V W X Y Z A B C D E F G H I J K L M N O P
W X Y Z A B C D E F G H I J K L M N O P Q R S T U V
S T U V W X Y Z A B C D E F G H I J K L M N O P Q R
T U V W X Y Z A B C D E F G H I J K L M N O P Q R S
U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
V W X Y Z A B C D E F G H I J K L M N O P Q R S T U
W X Y Z A B C D E F G H I J K L M N O P Q R S T U V
X Y Z A B C D E F G H I J K L M N O P Q R S T U V W
Y Z A B C D E F G H I J K L M N O P Q R S T U V W X
Z A B C D E F C H I J K L M N O P Q R S T U V W X Y

source:
http://www-stud.fht-esslingen.de/projects/krypto/krypt_gesch/krypt_gesch-2.html

http://www-stud.fht-esslingen.de/projects/kry...
INDEXCARD, 1/10
 
David Kahn

David Kahn can be considered one of the most important historians on cryptography. His book The Codebreakers. The comprehensive history of secret Communication from Ancient Times to the Internet, written in 1996 is supposed to be the most important work on the history of cryptography.

INDEXCARD, 2/10
 
ciphertext

the enciphered/encoded and primarily illegible text

INDEXCARD, 3/10
 
Critical Art Ensemble

Critical Art Ensemble is a collective of five artists of various specializations dedicated to exploring the intersections between art, technology, radical politics, and critical theory. CAE have published a number of books and carried out innovative art projects containing insightful and ironic theoretical contributions to media art. Projects include Addictionmania, Useless Technology, The Therapeutic State, Diseases of Consciousness, Machineworld, As Above So Below, and Flesh Machine.

http://www.critical-art.net

INDEXCARD, 4/10
 
Binary number system

In mathematics, the term binary number system refers to a positional numeral system employing 2 as the base and requiring only two different symbols, 0 and 1. The importance of the binary system to information theory and computer technology derives mainly from the compact and reliable manner in which data can be represented in electromechanical devices with two states--such as "on-off," "open-closed," or "go-no go."

INDEXCARD, 5/10
 
Roberto d'Aubuisson

Roberto D'Aubuisson is another Salvadorian graduate of the SOA. In 1980 he organized the assassination of Archbishop Oscar Romero, voice of the poor and marginalized. In 1981 he founded the extreme right wing party ARENA as a weapon against the guerrilla. Between 1978 and 1992 he was the (not so) secret head of the Salvadorian Death Squads. He died of cancer in 1992, but his ideas are still followed by a new group of death squads, which was founded in 1996 (Fuerza Nacionalista Mayor Roberto D'Aubuisson = FURODA).

INDEXCARD, 6/10
 
to encipher/encode

to put a word or text into ciphers/codes

INDEXCARD, 7/10
 
Kosov@

The "word" Kosov@ is a compromise between the Serb name KosovO and the Albanian KosovA. It is mostly used by international people who want to demonstrate a certain consciousness about the conflict including some sort of neutrality, believing that neither the one side nor the other (and maybe not even NATO) is totally right. Using the word Kosov@ is seen as a symbol of peace.

For more explanations (in German) see: http://www.zivildienst.at/kosov@.htm

http://www.zivildienst.at/kosov@.htm
INDEXCARD, 8/10
 
Caching

Caching generally refers to the process of making an extra copy of a file or a set of files for more convenient retrieval. On the Internet caching of third party files can occur either locally on the user's client computer (in the RAM or on the hard drive) or at the server level ("proxy caching"). A requested file that has been cached will then be delivered from the cache rather than a fresh copy being retrieved over the Internet.

INDEXCARD, 9/10
 
Amazon.com

Amazon.com is an online shop that serves approx. 17 mn customers in 150 countries. Starting out as a bookshop, Amazon today offers a wide range of other products as well.

Among privacy campaigners, the company's name has become almost synonymous with aggressive online direct marketing practices as well as user profiling and tracking. Amazon and has been involved in privacy disputes at numerous occasions.

http://www.amazon.com/
http://www.computeruser.com/newstoday/00/01/0...
INDEXCARD, 10/10