The 18th Century: Powered Machines and the Industrial Revolution The invention of the steam engine by James Watt in 1776 represented a major advance in the development of powered machines. It was first applied to an industrial operation - the spinning of cotton - in 1785. A new kind of work-slave it not only marked the beginning of the Industrial Revolution, but also the coming age of mass production. In the England of the 18th century five important inventions in the textile industry advanced the automation of work processes. 1) John Kay's flying shuttle in 1733 , which permitted the weaving of larger widths of cloth and significantly increased weaving speed, 2) Edmund Cartwright's power loom in 1785, which increased weaving speed still further, 3) James Hargreaves' spinning jenny in 1764, 4) Richard Arkwright's water frame and 5) Samuel Crompton's spinning mule in 1779, whereby the last three inventions improved the speed and quality of thread-spinning operations. Those developments, combined with the invention of the steam engine, in short time led to the creation of new machine-slaves and the mechanization of the production of most major goods, such as iron, paper, leather, glass and bricks. Large-scale machine production was soon applied in many manufacturing sectors and resulted in a reduction of production costs. Yet the widespread use of the novel work-slaves also led to new demands concerning the work force's qualifications. The utilization of machines enabled a differentiated kind of division of labor and eventuated in a (further) specialization of skills. While before many goods were produced by skilled craftsmen the use of modern machinery increased the demand for semiskilled and unskilled workers. Also, the nature of the work process altered from one mainly dependent on physical power to one primarily dominated by technology and an increasing proportion of the labor force employed to operate machines. |
TEXTBLOCK 1/4 // URL: http://world-information.org/wio/infostructure/100437611663/100438659368 |
Timeline 1970-2000 AD 1971 IBM's work on the Lucifer cipher and the work of the NSA lead to the U.S. Data Encryption Standard (= DES) 1976 Whitfield Diffie and Martin Hellman publish their book New Directions in Cryptography, playing with the idea of public key cryptography 1977/78 the RSA algorithm is developed by Ron Rivest, Adi Shamir and Leonard M. Adleman and is published 1984 Congress passes Comprehensive Crime Control Act - The Hacker Quarterly is founded 1986 Computer Fraud and Abuse Act is passed in the USA - Electronic Communications Privacy Act 1987 Chicago prosecutors found Computer Fraud and Abuse Task Force 1988 U.S. Secret Service covertly videotapes a hacker convention 1989 NuPrometheus League distributes Apple Computer software 1990 - IDEA, using a 128-bit key, is supposed to replace DES - Charles H. Bennett and Gilles Brassard publish their work on Quantum Cryptography - Martin Luther King Day Crash strikes AT&T long-distance network nationwide 1991 PGP (= Pretty Good Privacy) is released as freeware on the Internet, soon becoming worldwide state of the art; its creator is Phil Zimmermann - one of the first conferences for Computers, Freedom and Privacy takes place in San Francisco - AT&T phone crash; New York City and various airports get affected 1993 the U.S. government announces to introduce the Clipper Chip, an idea that provokes many political discussions during the following years 1994 Ron Rivest releases another algorithm, the RC5, on the Internet - the blowfish encryption algorithm, a 64-bit block cipher with a key-length up to 448 bits, is designed by Bruce Schneier 1990s work on quantum computer and quantum cryptography - work on biometrics for authentication (finger prints, the iris, smells, etc.) 1996 France liberates its cryptography law: one now can use cryptography if registered - OECD issues Cryptography Policy Guidelines; a paper calling for encryption exports-standards and unrestricted access to encryption products 1997 April European Commission issues Electronic Commerce Initiative, in favor of strong encryption 1997 June PGP 5.0 Freeware widely available for non-commercial use 1997 June 56-bit DES code cracked by a network of 14,000 computers 1997 August U.S. judge assesses encryption export regulations as violation of the First Amendment 1998 February foundation of Americans for Computer Privacy, a broad coalition in opposition to the U.S. cryptography policy 1998 March PGP announces plans to sell encryption products outside the USA 1998 April NSA issues a report about the risks of key recovery systems 1998 July DES code cracked in 56 hours by researchers in Silicon Valley 1998 October Finnish government agrees to unrestricted export of strong encryption 1999 January RSA Data Security, establishes worldwide distribution of encryption product outside the USA - National Institute of Standards and Technologies announces that 56-bit DES is not safe compared to Triple DES - 56-bit DES code is cracked in 22 hours and 15 minutes 1999 May 27 United Kingdom speaks out against key recovery 1999 Sept: the USA announce to stop the restriction of cryptography-exports 2000 as the German government wants to elaborate a cryptography-law, different organizations start a campaign against that law - computer hackers do no longer only visit websites and change little details there but cause breakdowns of entire systems, producing big economic losses for further information about the history of cryptography see: http://www.clark.net/pub/cme/html/timeline.html http://www.math.nmsu.edu/~crypto/Timeline.html http://fly.hiwaay.net/~paul/cryptology/history.html http://www.achiever.com/freehmpg/cryptology/hocryp.html http://all.net/books/ip/Chap2-1.html http://cryptome.org/ukpk-alt.htm http://www.iwm.org.uk/online/enigma/eni-intro.htm http://www.achiever.com/freehmpg/cryptology/cryptofr.html http://www.cdt.org/crypto/milestones.shtml for information about hacker's history see: http://www.farcaster.com/sterling/chronology.htm: |
TEXTBLOCK 2/4 // URL: http://world-information.org/wio/infostructure/100437611776/100438658960 |
Positions Towards the Future of Copyright in the "Digital Age" With the development of new transmission, distribution and publishing technologies and the increasing digitalization of information copyright has become the subject of vigorous debate. Among the variety of attitudes towards the future of traditional copyright protection two main tendencies can be identified: Eliminate Copyright Anti-copyrightists believe that any intellectual property should be in the public domain and available for all to use. "Information wants to be free" and copyright restricts people's possibilities concerning the utilization of digital content. An enforced copyright will lead to a further digital divide as copyright creates unjust monopolies in the basic commodity of the "information age". Also the increased ease of copying effectively obviates copyright, which is a relict of the past and should be expunged. Enlarge Copyright Realizing the growing economic importance of intellectual property, especially the holders of copyright (in particular the big publishing, distribution and other core copyright industries) - and therefore recipients of the royalties - adhere to the idea of enlarging copyright. In their view the basic foundation of copyright - the response to the need to provide protection to authors so as to give them an incentive to invest the time and effort required to produce creative works - is also relevant in a digital environment. |
TEXTBLOCK 3/4 // URL: http://world-information.org/wio/infostructure/100437611725/100438659711 |
Challenges for Copyright by ICT: Introduction Traditional copyright and the practice of paying royalties to the creators of intellectual property have emerged with the introduction of the printing press (1456). Therefore early copyright law has been tailored to the technology of print and the (re) production of works in analogue form. Over the centuries legislation concerning the protection of intellectual property has been adapted several times in order to respond to the technological changes in the production and distribution of information. Yet again new technologies have altered the way of how (copyrighted) works are produced, copied, made obtainable and distributed. The emergence of global electronic networks and the increased availability of digitalized intellectual property confront existing copyright with a variety of questions and challenges. Although the combination of several types of works within one larger work or on one data carrier, and the digital format (although this may be a recent development it has been the object of detailed legal scrutiny), as well as networking (telephone and cable networks have been in use for a long time, although they do not permit interactivity) are nothing really new, the circumstance that recent technologies allow the presentation and storage of text, sound and visual information in digital form indeed is a novel fact. Like that the entire information can be generated, altered and used by and on one and the same device, irrespective of whether it is provided online or offline. |
TEXTBLOCK 4/4 // URL: http://world-information.org/wio/infostructure/100437611725/100438659517 |
Assembly line An assembly line is an industrial arrangement of machines, equipment, and workers for continuous flow of workpieces in mass production operations. An assembly line is designed by determining the sequences of operations for manufacture of each product component as well as the final product. Each movement of material is made as simple and short as possible with no cross flow or backtracking. Work assignments, numbers of machines, and production rates are programmed so that all operations performed along the line are compatible. |
INDEXCARD, 1/4 |
VISA Visa International's over 21,000 member financial institutions have made VISA one of the world's leading full-service payment network. Visa's products and services include Visa Classic card, Visa Gold card, Visa debit cards, Visa commercial cards and the Visa Global ATM Network. VISA operates in 300 countries and territories and also provides a large consumer payments processing system. |
INDEXCARD, 2/4 |
Mark A mark (trademark or service mark) is "... a sign, or a combination of signs, capable of distinguishing the goods or services of one undertaking from those of other undertakings. The sign may particularly consist of one or more distinctive words, letters, numbers, drawings or pictures, emblems, colors or combinations of colors, or may be three-dimensional..." (WIPO) To be protected a mark must be registered in a government office whereby generally the duration is limited in time, but can be periodically (usually every 10 years) renewed. |
INDEXCARD, 3/4 |
Industrial design Industrial design refers to the ornamental aspect of a useful article which may constitute of two or three-dimensional elements. To be qualified for intellectual property protection the design must be novel or original. Protection can be obtained through registration in a government office and usually is given for 10 to 15 years. |
INDEXCARD, 4/4 |