|
2000 A.D. 2000 Digital technologies are used to combine previously separated communication and media systems such as telephony, audiovisual technologies and computing to new services and technologies, thus forming extensions of existing communication systems and resulting in fundamentally new communication systems. This is what is meant by today's new buzzwords "multimedia" and "convergence". Classical dichotomies as the one of computing and telephony and traditional categorizations no longer apply, because these new services no longer fit traditional categories. Convergence and Regulatory Institutions Digital technology permits the integration of telecommunications with computing and audiovisual technologies. New services that extend existing communication systems emerge. The convergence of communication and media systems corresponds to a convergence of corporations. Recently, For further information on this issue see Natascha Just and Michael Latzer, The European Policy Response to Convergence with Special Consideration of Competition Policy and Market Power Control, http://www.soe.oeaw.ac.at/workpap.htm or |
|
|
|
Like that car? The tricks of the data body industry 2. Like that car? The tricks of the data body industry In the New Economy, data have become a primary resource. Businesses unable to respond to the pressure of informatisation are quickly left behind. "Information is everything" has become the war-cry of the New Economy. More than ever, business companies now collect data related to their customers, their competitors, economic indicators, etc., and compile them in However, there are also many companies that specialise in data body economics as the main line of business. They collect huge amount of data process and enhance them (thereby increasing the value of the data) and offer them on to other companies. For example, somebody who has been attracted by a car on display in an airport terminal and completes a card with name and address to participate in a draw reveals a lot of economically valuable information about him / herself. Apart from name and address, and other data that is completed on the card, this person also can be assumed to be a potential car buyer (evidently he / she wants a car) and to be relatively affluent (the poor do not normally travel by plane). The time when you complete the card also provides information: in July and August, you are more likely to be a holiday maker than in November. Possibly in small print somewhere on the ticket you complete you agree to receive more information about this and other products, and you agree also that your data are "electronically processed". The data acquired this way can normally be expected to be much more valuable than the car the is offered in the draw. Most people who completed the cards will not win in the draw, but instead end up on directs marketing data warehouses and one day receive offers of products and services which they never knew they wanted. |
|
|
|
Advertising and the Content Industry - The Coca-Cola Case Attempts to dictate their rules to the media has become a common practice among marketers and the advertising industry. Similar as in the According to a memo published by the New York Post, Coca-Cola demands a free ad from any publication that publishes a Coke ad adjacent to stories on religion, politics, disease, sex, food, drugs, environmental issues, health, or stories that employ vulgar language. "Inappropriate editorial matter" will result in the publisher being liable for a "full make good," said the memo by Coke advertising agency (Source: Odwyerpr.com: Coke Dictates nearby Editorial. |
|
|
|
Governmental Regulations The new U.S. regulations are based on the Wassenaar Arrangement Revision of 1998, where exports without license of 56 bit For more information see: Seven states stay excluded from the new freedom. These are states like Libya, Iraq, Iran, North Korea and Cuba, altogether states seen as terrorist supporting. No encryption tools may be exported into those countries. This is, what happened in the USA, whereas in Germany the issue of a cryptography-law is still on the agenda. Until now, in Germany, everyone can decide by her-/himself, whether she/he wants to encrypt electronic messages or not. Some organizations fear that this could get changed soon. Therefore an urgent action was organized in February 2000 to demonstrate the government that people want the freedom to decide on their own. One governmental argument is that only very few people actually use cryptography. Therefore the urgent action is organized as a campaign for using it more frequently. For more information on this see: Other European countries have more liberate laws on cryptography, like France. Austria doesn't have any restrictions at all, probably because of a governmental lack of interest more than accepting freedom. The (former) restrictions in the bigger countries influenced and hindered developments for safer key-systems, e.g. the key-length was held down extraordinarily. "Due to the suspicious nature of crypto users I have a feeling DES will be with us forever, we will just keep adding keys and cycles (...). There is a parallel between designing electronic commerce infrastructure today that uses weak cryptography (i.e. 40 or 56 bit keys) and, say, designing air traffic control systems in the '60s using two digit year fields. (...) Just because you can retire before it all blows up doesn't make it any less irresponsible." (Arnold G. Reinhold) The Chinese State Encryption Management Commission (SEMC) announced in March 2000 that only strong encryption tools will have to be registered in the future. Which sounds so nice on first sight, does not mean a lot in reality: any kind of useful encryption technique, like the The restrictions and prohibitions for cryptography are part of the states' wish to acquire more control - in the name of the battle against criminality, probably? Due to the emerging organized criminality the governments want to obtain more freedom of control over citizens. Organizations like the NSA appear as the leaders of such demands. What about civil rights or Human Rights? |
|
|
|
Educational Programs As the dissemination of ideologies and ideas is crucial to think tanks they apply different strategies to reach as many audiences as possible. Therefore also the concept of education plays an important role. Educational and training programs are aimed at the influencers and future influencers of public opinion and shall lead to the acceptance of think tanks respective social, economical and political ideas. The label "educational activities" thus very often stands for nothing less than the dissemination of ideology. Most think tanks regularly organize conferences, symposia and seminars to deliver their findings and ideas to a broader audience. RAND for example also runs a Ph.D. program at its Graduate School. |
|
|
|
Media Relations Another difference that can be noted between right and left-wing think tanks concerns their media appearance and media relations. While in 1997 53 % of the U.S. media references made to think tanks involved conservative institutions, progressive think tanks accounted for only16 % of the media citations made to think tanks (32 % centrist institutions). This suggests that the media agenda is markedly influenced by conservative issues and ideology, and therefore leads to a considerable imbalance within the spectrum of political views. On the other hand the financial resources of right- and left- wing media associated with think tanks also differ appreciably. While conservative foundations provided US$ 2,734,263 to four right-of-center magazines between 1990 and 1993 including The National Interest, The Public Interest, The New Criterion, and The American Spectator, over the same time period four left-of-center publications, namely The Nation, The Progressive, In These Times, and Mother Jones received only US$ 269,500 from foundations. |
|
|
|
WIPO The World Intellectual Property Organization is one of the specialized agencies of the United Nations (UN), which was designed to promote the worldwide protection of both industrial property (inventions, trademarks, and designs) and copyrighted materials (literary, musical, photographic, and other artistic works). It was established by a convention signed in Stockholm in 1967 and came into force in 1970. The aims of WIPO are threefold. Through international cooperation, WIPO promotes the protection of intellectual property. Secondly, the organization supervises administrative cooperation between the Paris, Berne, and other intellectual unions regarding agreements on trademarks, patents, and the protection of artistic and literary work and thirdly through its registration activities the WIPO provides direct services to applicants for, or owners of, industrial property rights. |
|
|
|
Neighboring rights Copyright laws generally provide for three kinds of neighboring rights: 1) the rights of performing artists in their performances, 2) the rights of producers of phonograms in their phonograms, and 3) the rights of broadcasting organizations in their radio and television programs. Neighboring rights attempt to protect those who assist intellectual creators to communicate their message and to disseminate their works to the public at large. |
|
|
|
Moral rights Authors of copyrighted works (besides |
|
|
|
cryptology also called "the study of code". It includes both, cryptography and cryptoanalysis |
|
|
|
MIT The MIT (Massachusetts Institute of Technology) is a privately controlled coeducational institution of higher learning famous for its scientific and technological training and research. It was chartered by the state of Massachusetts in 1861 and became a land-grant college in 1863. During the 1930s and 1940s the institute evolved from a well-regarded technical school into an internationally known center for scientific and technical research. In the days of the Great Depression, its faculty established prominent research centers in a number of fields, most notably analog computing (led by |
|
|
|
blowfish encryption algorithm Blowfish is a symmetric key block cipher that can vary its length. The idea behind is a simple design to make the system faster than others. |
|
|
|
Java Applets Java applets are small programs that can be sent along with a Web page to a user. Java applets can perform interactive animations, immediate calculations, or other simple tasks without having to send a user request back to the server. They are written in Java, a platform-independent computer language, which was invented by Source: Whatis.com |
|
|
|
Memex Animation by Ian Adelman and Paul Kahn |
|
|
|
The World Wide Web History Project The ongoing World Wide Web History Project was established to record and publish the history of the World Wide Web and its roots in hypermedia and networking. As primary research methods are used archival research and the analysis of interviews and talks with pioneers of the http://www.webhistory.org/home.html |
|
|
|
Server A server is program, not a computer, as it sometimes said, dedicated to store files, manage printers and network traffic, or process database queries. Web sites, the nodes of the |
|
|
|
Internet Software Consortium The Internet Software Consortium (ISC) is a nonprofit corporation dedicated to the production of high-quality reference implementations of Internet standards that meet production standards. Its goal is to ensure that those reference implementations are properly supported and made freely available to the Internet community. http://www.isc.org |
|
|
|
Gerard J. Holzmann and Bjoern Pehrson, The Early History of Data Networks This book gives a fascinating glimpse of the many documented attempts throughout history to develop effective means for long distance communications. Large-scale communication networks are not a twentieth-century phenomenon. The oldest attempts date back to millennia before Christ and include ingenious uses of homing pigeons, mirrors, flags, torches, and beacons. The first true nationwide data networks, however, were being built almost two hundred years ago. At the turn of the 18th century, well before the electromagnetic telegraph was invented, many countries in Europe already had fully operational data communications systems with altogether close to one thousand network stations. The book shows how the so-called information revolution started in 1794, with the design and construction of the first true telegraph network in France, Chappe's fixed optical network. http://www.it.kth.se/docs/early_net/ |
|
|