Extract of Disney’s Content Production and Distribution Holdings Although the traditional media companies first steps into the digital sphere were fairly clumsy, they have quickly learned from their mistakes and continued to enlarge their Internet presence. During the last years many of the smaller players in the field of digital media have been driven out of competition by the huge media conglomerates. This mainly is a result of the advantages that the commercial media giants have over their less powerful counterparts:
Commercial media companies have close and long ties to advertisers, which enables them to seize most of these revenues. |
|
Digital Signatures, Timestamps etc Most computer systems are far from being secure. A lack of security - it is said - might hinder the developments of new information technologies. Everybody knows electronic transactions involve a more or less calculated risk. Rumors about insecurity let consumers doubt whether the commodity of e-commerce is bigger or its risks. First of all the market depends on the consumer's confidence. To provide that another application for public key cryptography gets essential: the digital signature, which is used to verify the authenticity of the sender of certain data. It is done with a special private key, and the public key is verifying the signature. This is especially important if the involved parties do not know one another. The DSA (= Digital Signature Algorithm) is a public-key system which is only able to sign digitally, not to encrypt messages. In fact digital signature is the main-tool of cryptography in the private sector. Digital signatures need to be given for safe electronic payment. It is a way to protect the confidentiality of the sent data, which of course could be provided by other ways of cryptography as well. Other security methods in this respect are still in development, like digital money (similar to credit cards or checks) or digital cash, a system that wants to be anonymous like cash, an idea not favored by governments as it provides many opportunities for money laundry and illegal transactions. If intellectual property needs to be protected, a digital signature, together with a digital timestamp is regarded as an efficient tool. In this context, the difference between identification and authentication is essential. In this context smartcards and firewalls are relevant, too. A lot of digital transactions demand for passwords. More reliable for authentication are biometric identifiers, full of individual and unrepeatable codes, signatures that can hardly be forged. For more terms of cryptography and more information see: |
|
Legal Protection: National Legislation |
|
CNN CNN is a U.S.-TV-enterprise, probably the world's most famous one. Its name has become the symbol for the mass-media, but also the symbol of a power that can decide which news are important for the world and which are not worth talking about. Every message that is published on CNN goes around the world. The Gulf War has been the best example for this until now, when a CNN-reporter was the one person to do the countdown to a war. The moments when he stood on the roof of a hotel in Baghdad and green flashes surrounded him, went around the world. |
|
T. Matthew Ciolek, Global Networking: A Timeline This document, intended as a reliable electronic reference tool, provides a timeline for three types of developments and milestones: (1) advances in long distance person-to-person communication; (2) advances in storage, replication, cataloguing, finding, and retrieval of data; and (3) standardization of concepts and tools for long distance interaction. The advancements may have a technical (hardware), conceptual (software), or an organizational aspect, or represent an important milestone in the history of a given invention, and are annotated as such in the timeline. The period covered ranges from 30000 BC up to now. http://www.ciolek.com/PAPERS/milestones.html |
|
Robot Robot relates to any automatically operated machine that replaces human effort, though it may not resemble human beings in appearance or perform functions in a humanlike manner. The term is derived from the Czech word robota, meaning "forced labor." Modern use of the term stems from the play R.U.R., written in 1920 by the Czech author Karel Capek, which depicts society as having become dependent on mechanical workers called robots that are capable of doing any kind of mental or physical work. Modern robot devices descend through two distinct lines of development--the early |
|
Core copyright industries Those encompass the industries that create copyrighted works as their primary product. These industries include the motion picture industry (television, theatrical, and home video), the recording industry (records, tapes and CDs), the music publishing industry, the book, journal and newspaper publishing industry, and the computer software industry (including data processing, business applications and interactive entertainment software on all platforms), legitimate theater, advertising, and the radio, television and cable broadcasting industries. |
|