Bureaucratic data bunkers



Among the foremost of the data bunkers government bureaucracies. Bureaucracies are the oldest forms of bunkers and are today deeply engrained in modern societies. Bureaucracies have always had the function of collecting and administering the data of subjects. What make this process more problematic in the age of ICT is that a lot more data can be collected, they can be collected in clandestine ways (e.g. in surveillance situations), and the can be combined and merged using advanced data mining technologies. In addition, there is a greater rationale for official data collecting, as a lot more data is required for the functioning of public administration as in previous periods, as societies rush to adopt increasingly complex technologies, above all ICTs. The increasing complexity of modern societies means that an increasing number of bureaucratic decision is taken, all of which require a calculation process. Complexity, viewed through government spectacles, generates insecurity - a great deal of the bureaucratic activity therefore revolves around the topic of security.

In spite of the anti-bureaucratic rhetoric of most governments, these factors provides the bureaucracies with an increased hold on society. Foremost bureaucratic data bunkers include the following:

    Law enforcement agencies

    Fiscal agencies

    Intelligence agencies

    Social welfare agencies

    Social insurance institutions

    Public health agencies

    Educational institutions



These are agencies that enjoy the privileged protection of the state. Those among them that operate in the field of security are further protected against public scrutiny, as they operate in an area to which democratic reason has no access.

What makes the data repositories of these institutions different from private data bunkers is their "official", i.e. their politically binding and definitive character. CAE speak of the bureaucracy as a "concrete form of uninterruptible, official and legitimised memory."

TEXTBLOCK 1/13 // URL: http://world-information.org/wio/infostructure/100437611761/100438659721
 
Recent "Digital Copyright" Legislation: European Union

Directive on Copyright and Related Rights in the Information Society

In November 1996 the European Commission adopted a communication concerning the follow-up to the Green Paper on copyright and related rights in the information society. The proposed Directive aims at transposing into Community law the main international obligations arising from the two treaties on copyright and related rights adopted within the framework of the WIPO in December 1996 (WIPO Performances and Phonogram Treaty and WIPO Copyright Treaty). It applies to provisions relating to:

- the legal protection of computer programs

- rental right, lending right and certain rights related to copyright in the field of intellectual property

- copyright and related rights applicable to broadcasting of programs by satellite and cable retransmission

- the term of protection of copyright and certain related rights

- the legal protection of databases

The proposal was first presented by the Commission in January 1998, amended in May 1999 and currently is at second reading before the Parliament. Final adoption of the Directive could take place at the end of 2000 or the beginning of 2001 respectively.

A full-text version for download (pdf file) of the amended proposal for a Directive on copyright and related rights in the Information Society is available on the website of the European Commission (DG Internal Market): http://www.europa.eu.int/comm/internal_market/en/intprop/intprop/docs/index.htm

General critique concerning the proposed EU Directive includes:

- Open networks
The new law could require (technological) surveillance of communications to ensure enforcement. Also because Service Providers might be legally liable for transmitting unauthorized copies, the might in turn have to deny access to anybody who could not provide them with financial guaranties or insurance.

- Interoperable systems
The draft could negate the already established right in EU law for software firms to make their systems interoperable with the dominant copyright protected systems. This would be a threat to the democratic and economic rights of users.

- Publicly available information
It is yet unclear whether new legal protections against the bypassing of conditional access technology apply only for content with an exclusive right. If the content is already in the public domain, then there can be no possible violation of copyright law just from gaining access to it.

Comments from the library, archives and documentation community on the amended Directive embrace:

The Library Association
http://www.la-hq.org.uk/directory/prof_issues/dcrris2.html

EBLIDA (European Bureau of Library, Information and Documentation Associations)
http://www.eblida.org/lobby/position/ampos2fi.htm

Society of Archivists (U.K.) and Public Record Office (U.K.)
http://www.pro.gov.uk/about/copyright/copyrightdraft.htm

EFPICC (European Fair Practices In Copyright Campaign) http://www.eblida.org/efpicc/comments.htm

TEXTBLOCK 2/13 // URL: http://world-information.org/wio/infostructure/100437611725/100438659610
 
Problems of Copyright Management and Control Technologies

Profiling and Data Mining

At their most basic copyright management and control technologies might simply be used to provide pricing information, negotiate the purchase transaction, and release a copy of a work for downloading to the customer's computer. Still, from a technological point of view, such systems also have the capacity to be employed for digital monitoring. Copyright owners could for example use the transaction records generated by their copyright management systems to learn more about their customers. Profiles, in their crudest form consisting of basic demographic information, about the purchasers of copyrighted material might be created. Moreover copyright owners could use search agents or complex data mining techniques to gather more information about their customers that could either be used to market other works or being sold to third parties.

Fair Use

Through the widespread use of copyright management and control systems the balance of control could excessively be shifted in favor of the owners of intellectual property. The currently by copyright law supported practice of fair use might potentially be restricted or even eliminated. While information in analogue form can easily be reproduced, the protection of digital works through copyright management systems might complicate or make impossible the copying of material for purposes, which are explicitly exempt under the doctrine of fair use.

Provisions concerning technological protection measures and fair use are stated in the DMCA, which provides that "Since copying of a work may be a fair use under appropriate circumstances, section 1201 does not prohibit the act of circumventing a technological measure that prevents copying. By contrast, since the fair use doctrine is not a defense e to the act of gaining unauthorized access to a work, the act of circumventing a technological measure in order to gain access is prohibited." Also the proposed EU Directive on copyright and related rights in the information society contains similar clauses. It distinguishes between the circumvention of technical protection systems for lawful purposes (fair use) and the circumvention to infringe copyright. Yet besides a still existing lack of legal clarity also very practical problems arise. Even if the circumvention of technological protection measures under fair use is allowed, how will an average user without specialized technological know-how be able to gain access or make a copy of a work? Will the producers of copyright management and control systems provide fair use versions that permit the reproduction of copyrighted material? Or will users only be able to access and copy works if they hold a digital "fair use license" ("fair use licenses" have been proposed by Mark Stefik, whereby holders of such licenses could exercise some limited "permissions" to use a digital work without a fee)?

TEXTBLOCK 3/13 // URL: http://world-information.org/wio/infostructure/100437611725/100438659629
 
Databody economy and the surveillance state

Databody economy Surveillance state
Promise Reality Promise Reality
universal prosperity universal commercialisation total security total control
frictionless market pacified society political harmony death of democracy


The glamour of the data body economy clouds economic practices which are much less than glamorous. Through the seizure of the data body, practices that in the real political arena were common in the feudal age and in the early industrial age are being reconstructed. The data body economy digitally reconstructs exploitative practices such as slavery and wage labour. However, culturally the data body is still a very new phenomenon: mostly, people think if it does not hurt, it cannot be my body. Exploitation of data bodies is painless and fast. Nevertheless, this can be expected to change once the awareness of the political nature of the data body becomes more widespread. As more and more people routinely move in digitised environments, it is to be expected that more critical questions will be asked and claims to autonomy, at present restricted to some artistic and civil society groups trying to get heard amidst the deafening noise of the commercial ICT propaganda, will be articulated on a more general level.

The more problematic aspect of this development may be something else: the practices of the data body economy, themselves a reconstruction of old techniques of seizure, have begun to re-colonise real political space. Simon Davis, Director of the London-based privacy campaigners Privacy International, one of the foremost critics of modern-day technologies of surveillance and data capturing, has warned against the dangers of a loss of autonomy and undermining of civic rights that are being generated when workplaces are clogged with digital equipment allowing the constant monitoring and surveillance of workers. Unless current trends towards data capturing remain unchecked, the workplace of the future will have many features of the sinister Victorian workhouses that appear Charles Dickens novels, where any claims for autonomy were silenced with references to economic efficiency, and the required discipline imposed by a hierarchy of punishments.

The constant adaptation process required from the modern individual has anonymised and structuralized punishment, which now appears in the guise of error messages and the privatisation of risk.

TEXTBLOCK 4/13 // URL: http://world-information.org/wio/infostructure/100437611761/100438659784
 
Copyright Management and Control Systems: Pre-Infringement

Pre-infringement copyright management and control systems that inhibit or control infringement of intellectual property may be put into place by copyright owners before distributing their works. Examples are:

Contracts

Contracts are a pre-infringement control method, which very often is underestimated. Properly formed contracts enable copyright holders to restrict the use of their works in excess of the rights granted under copyright laws.

Copy Protection

This approach was standard in the 1980s, but rejected by consumers and relatively easy to break. Still copy protection, whereby the vendor limits the number of times a file can be copied, is used in certain situations.

Limited Functionality

This method allows copyright owners to provide a copy of the work, which is functionally limited. Software creators, for example, can distribute software that cannot print or save. A fully functional version has to be bought from the vendor.

Date Bombs

Here the intellectual property holder distributes a fully functional copy but locks off access at a pre-specified date or after a certain number of uses.

TEXTBLOCK 5/13 // URL: http://world-information.org/wio/infostructure/100437611725/100438659616
 
Internet services

The Internet can be used in in different ways: for distributing and retrieving information, for one-to-one, one-to-many and many-to-many communication, and for the access services. Accordingly, there are different services on offer. The most important of these are listed below.

Telnet

FTP (File Transfer Protocol)

Electronic Messaging (E-Mail)

World Wide Web (WWW)

Bulletin Board Systems (BBS)

Electronic Data Interchange (EDI)

Internet Relay Chat (IRC)

Multiple User Dimensions (MUDs)

Gopher

TEXTBLOCK 6/13 // URL: http://world-information.org/wio/infostructure/100437611791/100438659819
 
Operating the net: overview

The Net consists of thousands of thousands of governmental and private networks linked together. No legal authority determines how and where networks can be connected together, this is something the managers of networks have to agree about. So there is no way of ever gaining ultimate control of the Internet. Although each of these networks is operated and controlled by an organization, no single organization operates and controls the Net. Instead of a central authority governing the Net, several bodies assure the operability of the Net by developing and setting technical specifications for the Net and by the control of the technical key functions of the Net as the coordination of the domain name system and the allocation of IP numbers.

Originally, the Net was a research project funded and maintained by the US Government and developed in collaboration by scientists and engineers. As the standards developed for ensuring operability ensued from technical functionality, technical coordination gradually grew out of necessity and was restricted to a minimum and performed by volunteers.

Later, in the 1980s, those occupied with the development of technical specifications organized themselves under the umbrella of the Internet Society in virtual organizations as the Internet Engineering Task Force, which were neither officially established nor being based on other structures than mailing lists and commitment, but nonetheless still serve as task forces for the development of standards ensuring the interoperability on the Net.

Since the late 80s and the early 90s, with the enormous growth of the Net - which was promoted by the invention of Local Area Networks, the creation of the World Wide Web, the increased use of personal computers and the connecting of corporations to the Net, just to name a few - coordination of some technical key functions as the domain name system was handed over to corporations as Network Solutions Inc.

Since the year 2000, a new model for technical coordination has been emerging: Formerly performed by several bodies, technical coordination is transferred to a single non-governmental organization: the Internet Coordination of Assigned Numbers and Names.

TEXTBLOCK 7/13 // URL: http://world-information.org/wio/infostructure/100437611791/100438659824
 
Positions Towards the Future of Copyright in the "Digital Age"

With the development of new transmission, distribution and publishing technologies and the increasing digitalization of information copyright has become the subject of vigorous debate. Among the variety of attitudes towards the future of traditional copyright protection two main tendencies can be identified:

Eliminate Copyright

Anti-copyrightists believe that any intellectual property should be in the public domain and available for all to use. "Information wants to be free" and copyright restricts people's possibilities concerning the utilization of digital content. An enforced copyright will lead to a further digital divide as copyright creates unjust monopolies in the basic commodity of the "information age". Also the increased ease of copying effectively obviates copyright, which is a relict of the past and should be expunged.

Enlarge Copyright

Realizing the growing economic importance of intellectual property, especially the holders of copyright (in particular the big publishing, distribution and other core copyright industries) - and therefore recipients of the royalties - adhere to the idea of enlarging copyright. In their view the basic foundation of copyright - the response to the need to provide protection to authors so as to give them an incentive to invest the time and effort required to produce creative works - is also relevant in a digital environment.

TEXTBLOCK 8/13 // URL: http://world-information.org/wio/infostructure/100437611725/100438659711
 
Biometrics applications: privacy issues

All biometric technologies capture biometric data from individuals. Once these date have been captured by a system, they can, in principle, be forwarded to other locations and put to many different uses which are capable of compromising on an individuals privacy.

Technically it is easy to match biometric data with other personal data stored in government or corporate files, and to come a step closer to the counter-utopia of the transparent citizen and customer whose data body is under outside control.

While biometric technologies are often portrayed as protectors of personal data and safeguards against identity theft, they can thus contribute to an advance in "Big Brother" technology.

The combination of personalised data files with biometric data would amount to an enormous control potential. While nobody in government and industry would admit to such intentions, leading data systems companies such as EDS (Electronic Data Systems; http://www.eds.com) are also suppliers of biometric systems to the intelligence agencies of government and industry.

Biometric technologies have the function of identification. Historically, identification has been a prerequisite for the exercise of power and serves as a protection only to those who are in no conflict with this power. If the digitalisation of the body by biometric technologies becomes as widespread as its proponents hope, a new electronic feudal system could be emerging, in which people are reduced to subjects dispossessed of their to their bodies, even if these, unlike in the previous one, are data bodies. Unlike the gatekeepers of medieval towns, wear no uniforms by they might be identified; biometric technologies are pure masks.

TEXTBLOCK 9/13 // URL: http://world-information.org/wio/infostructure/100437611729/100438658826
 
Basics: Acquisition of Copyright

The laws of almost all countries provide that protection is independent of any formalities. Copyright protection then starts as soon as the work is created.

TEXTBLOCK 10/13 // URL: http://world-information.org/wio/infostructure/100437611725/100438659576
 
Copyright Management and Control Systems: Post-Infringement

Post-infringement technologies allow the owners of copyrighted works to identify infringements and thus enhance enforcement of intellectual property rights and encompass systems such as:

Steganography

Applied to electronic files, steganography refers to the process of hiding information in files that can not be easily detected by users. Steganography can be used by intellectual property owners in a variety of ways. One is to insert into the file a "digital watermark" which can be used to prove that an infringing file was the creation of the copyright holder and not the pirate. Other possibilities are to encode a unique serial number into each authorized copy or file, enabling the owner to trace infringing copies to a particular source, or to store copyright management information.

Agents

Agents are programs that can implement specified commands automatically. Copyright owners can use agents to search the public spaces of the Internet to find infringing copies. Although the technology is not yet very well developed full-text search engines allow similar uses.

Copyright Litigation

While not every infringement will be the subject of litigation, the threat of litigation helps keep large pirate operations in check. It helps copyright owners obtain relief for specific acts of infringement and publicly warns others of the dangers of infringement.

TEXTBLOCK 11/13 // URL: http://world-information.org/wio/infostructure/100437611725/100438659699
 
Copyright Management and Control Systems: Metering

Metering systems allow copyright owners to ensure payment to or at the time of a consumer's use of the work. Those technologies include:

Hardware Devices

Those have to be acquired and installed by the user. For example under a debit card approach, the user purchases a debit card that is pre-loaded with a certain amount of value. After installation, the debit card is debited automatically as the user consumes copyrighted works.

Digital Certificates

Hereby a certification authority issues to a user an electronic file that identifies the user as the owner of a public key. Those digital certificates, besides information on the identity of the holder can also include rights associated with a particular person. Vendors can so control access system resources, including copyrighted files, by making them available only to users who can provide a digital certificate with specified rights (e.g. access, use, downloading).

Centralized Computing

Under this approach all of the executables remain at the server. Each time the executable is used, the user's computer must establish contact with the server, allowing the central computer to meter access.

Access Codes

Access code devices permit users to "unlock" protective mechanisms (e.g. date bombs or functional limitations) embedded in copyrighted works. Copyright owners can meter the usage of their works, either by unlocking the intellectual property for a one-time license fee or by requiring periodic procurement of access codes.

Copyright Clearinghouses

Under this approach copyright owners would commission "clearinghouses" with the ability to license the use of their works. A user would pay a license fee to obtain rights concerning the intellectual property.


TEXTBLOCK 12/13 // URL: http://world-information.org/wio/infostructure/100437611725/100438659615
 
Intellectual Property and the "Information Society" Metaphor

Today the talk about the so-called "information society" is ubiquitous. By many it is considered as the successor of the industrial society and said to represent a new form of societal and economical organization. This claim is based on the argument, that the information society uses a new kind of resource, which fundamentally differentiates from that of its industrial counterpart. Whereas industrial societies focus on physical objects, the information society's raw material is said to be knowledge and information. Yet the conception of the capitalist system, which underlies industrial societies, also continues to exist in an information-based environment. Although there have been changes in the forms of manufacture, the relations of production remain organized on the same basis. The principle of property.

In the context of a capitalist system based on industrial production the term property predominantly relates to material goods. Still even as in an information society the raw materials, resources and products change, the concept of property persists. It merely is extended and does no longer solely consider physical objects as property, but also attempts to put information into a set of property relations. This new kind of knowledge-based property is widely referred to as "intellectual property". Although intellectual property in some ways represents a novel form of property, it has quickly been integrated in the traditional property framework. Whether material or immaterial products, within the capitalist system they are both treated the same - as property.

TEXTBLOCK 13/13 // URL: http://world-information.org/wio/infostructure/100437611725/100438659429
 
Microsoft Corporation

Founded by Bill Gates and Paul Allen and headquartered in Redmond, USA, Microsoft Corporation is today's world-leading developer of personal-computer software systems and applications. As MS-DOS, the first operating system released by Microsoft, before, Windows, its successor, has become the de-facto standard operating system for personal computer. According to critics and following a recent court ruling this is due to unfair competition.

http://www.microsoft.com

For more detailed information see the Encyclopaedia Britannica: http://www.britannica.com/bcom/eb/article/4/0,5716,1524+1+1522,00.html

http://www.microsoft.com/
http://www.britannica.com/bcom/eb/article/4/0...
INDEXCARD, 1/24
 
NATO

The North Atlantic Treaty was signed in Washington on 4 April 1949, creating NATO (= North Atlantic Treaty Organization). It was an alliance of 12 independent nations, originally committed to each other's defense. Between 1952 and 1982 four more members were welcomed and in 1999, the first ex-members of COMECON became members of NATO (the Czech Republic, Hungary and Poland), which makes 19 members now. Around its 50th anniversary NATO changed its goals and tasks by intervening in the Kosovo Crisis.

INDEXCARD, 2/24
 
Slobodan Milosevic

Slobodan Milosevic (* 1941) is a Serbian political leader.
As a young man S. Milosevic joined the Communist Party, in 1984 the banker became head of the local Communist Party of Belgrade, in 1987 head of the Serb CP. Since 1989 he has been president of Serbia (since 1997 president of the new Federal Republic of Yugoslavia). During his reign the Yugoslav Republic broke up, bringing about the independence of Slovenia and Croatia and the war in Bosnia. In 1998 the Kosovo Crisis started.

INDEXCARD, 3/24
 
Internet Protocol Number (IP Number)

Every computer using TCP/IP has a 32 bit-Internet address, an IP number. This number consists of a network identifier and of a host identifier. The network identifier is registered at and allocated by a Network Information Center (NIC), the host identifier is allocated by the local network administration.

IP numbers are divided into three classes. Class A is restricted for big-sized organizations, Class B to medium-sized ones as universities, and Class C is dedicated to small networks.

Because of the increasing number of networks worldwide, networks belonging together, as LANs forming a corporate network, are allocated a single IP number.

INDEXCARD, 4/24
 
Bandwidth

The bandwidth of a transmitted communications signal is a measure of the range of frequencies the signal occupies. The term is also used in reference to the frequency-response characteristics of a communications receiving system. All transmitted signals, whether analog or digital, have a certain bandwidth. The same is true of receiving systems.

Generally speaking, bandwidth is directly proportional to the amount of data transmitted or received per unit time. In a qualitative sense, bandwidth is proportional to the complexity of the data for a given level of system performance. For example, it takes more bandwidth to download a photograph in one second than it takes to download a page of text in one second. Large sound files, computer programs, and animated videos require still more bandwidth for acceptable system performance. Virtual reality (VR) and full-length three-dimensional audio/visual presentations require the most bandwidth of all.

In digital systems, bandwidth is data speed in bits per second (bps).

Source: Whatis.com

INDEXCARD, 5/24
 
Internet Societal Task Force

The Internet Societal Task Force is an organization under the umbrella of the Internet Society dedicated to assure that the Internet is for everyone by identifying and characterizing social and economic issues associated with the growth and use of Internet. It supplements the technical tasks of the Internet Architecture Board, the Internet Engineering Steering Group and the Internet Engineering Task Force.

Topics under discussion are social, economic, regulatory, physical barriers to the use of the Net, privacy, interdependencies of Internet penetration rates and economic conditions, regulation and taxation.

http://www.istf.isoc.org/

http://www.istf.isoc.org/
INDEXCARD, 6/24
 
NSFNet

Developed under the auspices of the National Science Foundation (NSF), NSFnet served as the successor of the ARPAnet as the main network linking universities and research facilities until 1995, when it was replaced it with a commercial backbone network. Being research networks, ARPAnet and NSFnet served as testing grounds for future networks.

INDEXCARD, 7/24
 
Defense Advanced Research Project Agency (DARPA)

DARPA (Defense Advanced Research Projects Agency) is the independent research branch of the U.S. Department of Defense that, among its other accomplishments, funded a project that in time was to lead to the creation of the Internet. Originally called ARPA (the "D" was added to its name later), DARPA came into being in 1958 as a reaction to the success of Sputnik, Russia's first manned satellite. DARPA's explicit mission was (and still is) to think independently of the rest of the military and to respond quickly and innovatively to national defense challenges.

In the late 1960s, DARPA provided funds and oversight for a project aimed at interconnecting computers at four university research sites. By 1972, this initial network, now called the ARPAnet, had grown to 37 computers. ARPANet and the technologies that went into it, including the evolving Internet Protocol (IP) and the Transmission Control Protocol (TCP), led to the Internet that we know today.

http://www.darpa.mil

INDEXCARD, 8/24
 
Liability of ISPs

ISPs (Internet Service Provider), BBSs (Bulletin Board Service Operators), systems operators and other service providers (in the U.S.) can usually be hold liable for infringing activities that take place through their facilities under three theories: 1) direct liability: to establish direct infringement liability there must be some kind of a direct volitional act, 2) contributory liability: a party may be liable for contributory infringement where "... with knowledge of the infringing activity, [it] induces, causes or materially contributes to the infringing activity of another." Therefore a person must know or have reason to know that the subject matter is copyrighted and that particular uses violated copyright law. There must be a direct infringement of which the contributory infringer has knowledge, and encourages or facilitates for contributory infringement to attach, and 3) vicarious liability: a party may be vicariously liable for the infringing acts of another if it a) has the right and ability to control the infringer's acts and b) receives a direct financial benefit from the infringement. Unlike contributory infringement, knowledge is not an element of vicarious liability.


INDEXCARD, 9/24
 
Polybius Checkerboard


 

1

2

3

4

5

1

A

B

C

D

E

2

F

G

H

I

K

3

L

M

N

O

P

4

Q

R

S

T

U

5

V

W

X

Y

Z



It is a system, where letters get converted into numeric characters.
The numbers were not written down and sent but signaled with torches.

for example:
A=1-1
B=1-2
C=1-3
W=5-2

for more information see:
http://www.ftech.net/~monark/crypto/crypt/polybius.htm

http://www.ftech.net/~monark/crypto/crypt/pol...
INDEXCARD, 10/24
 
National Science Foundation (NSF)

Established in 1950, the National Science Foundation is an independent agency of the U.S. government dedicated to the funding in basic research and education in a wide range of sciences and in mathematics and engineering. Today, the NSF supplies about one quarter of total federal support of basic scientific research at academic institutions.

http://www.nsf.gov

For more detailed information see the Encyclopaedia Britannica: http://www.britannica.com/bcom/eb/article/0/0,5716,2450+1+2440,00.html

http://www.nsf.gov/
INDEXCARD, 11/24
 
Newsgroups

Newsgroups are on-line discussion groups on the Usenet. Over 20,000 newsgroups exist, organized by subject into hierarchies. Each subject hierarchy is further broken down into subcategories. Covering an incredible wide area of interests and used intensively every day, they are an important part of the Internet.

For more information, click here ( http://www.terena.nl/libr/gnrt/group/usenet.html ).

http://www.terena.nl/libr/gnrt/group/usenet.h...
INDEXCARD, 12/24
 
Virtual Private Networks

Virtual Private Networks provide secured connections to a corporate site over a public network as the Internet. Data transmitted through secure connections are encrypted and therefore have to be encrypted before they can be read.
These networks are called virtual because connections are provided only when you connect to a corporate site; they do not rely on dedicated lines and support mobile use.

INDEXCARD, 13/24
 
Cooperative Association of Internet Data Analysis (CAIDA)

Based at the University of California's San Diego Supercomputer Center, CAIDA supports cooperative efforts among the commercial, government and research communities aimed at promoting a scalable, robust Internet infrastructure. It is sponsored by the Defense Advanced Research Project Agency (DARPA) through its Next Generation Internet program, by the National Science Foundation, Cisco, Inc., and Above.net.

INDEXCARD, 14/24
 
Microsoft Network

Microsoft Network is the online service from Microsoft Corporation. Although offering direct access to the Internet, mainly proprietary content for entertainment purposes is offered. Best viewed with Microsoft's Internet Explorer.

http://www.msn.com

INDEXCARD, 15/24
 
Proxy Servers

A proxy server is a server that acts as an intermediary between a workstation user and the Internet so that security, administrative control, and caching service can be ensured.

A proxy server receives a request for an Internet service (such as a Web page request) from a user. If it passes filtering requirements, the proxy server, assuming it is also a cache server, looks in its local cache of previously downloaded Web pages. If it finds the page, it returns it to the user without needing to forward the request to the Internet. If the page is not in the cache, the proxy server, acting as a client on behalf of the user, uses one of its own IP addresses to request the page from the server out on the Internet. When the page is returned, the proxy server relates it to the original request and forwards it on to the user.

Source: Whatis.com

INDEXCARD, 16/24
 
First Monday

An English language peer reviewed media studies journal based in Denmark.

http://firstmonday.dk

INDEXCARD, 17/24
 
Internet Relay Chat (IRC)

IRC is a text-based chat system used for live discussions of groups.

For a history of IRC see Charles A. Gimon, IRC: The Net in Realtime, http://www.skypoint.com/~gimonca/irc2.html

http://www.skypoint.com/~gimonca/irc2.html
INDEXCARD, 18/24
 
Network Information Center (NIC)

Network information centers are organizations responsible for registering and maintaining the domain names on the World Wide Web. Until competition in domain name registration was introduced, they were the only ones responsible. Most countries have their own network information center.

INDEXCARD, 19/24
 
Internet Engineering Steering Group

On behalf of the Internet Society, the Internet Engineering Steering Group is responsible for the technical management of the evolution of the architecture, the standards and the protocols of the Net.

http://www.ietf.org/iesg.html

http://www.ietf.org/iesg.html
INDEXCARD, 20/24
 
Total copyright industries

The total copyright industries encompass the "core copyright industries" and portions of many other industries that either create, distribute, or depend upon copyrighted works. Examples include retail trade (a portion of which is sales of video, audio, software, and books, for example), the doll and toy industry, and computer manufacturing.


INDEXCARD, 21/24
 
Terrestrial antennas

Microwave transmission systems based on terrestrial antennas are similar to satellite transmission system. Providing reliable high-speed access, they are used for cellular phone networks.

The implementation of the Wide Application Protocol (WAP) makes the wireless access to Internet services as E-Mail and even the World Wide Web via cellular phones convenient. Therefore microwave transmission systems become increasingly important.

INDEXCARD, 22/24
 
The Flesh Machine

This is the tile of a book by the Critical Art Ensemble which puts the development of artifical life into a critical historical and political context, defining the power vectors which act as the driving force behind this development. The book is available in a print version (New York, Autonomedia 1998) and in an online version at http://www.critical-art.net/fles/book/index.html

INDEXCARD, 23/24
 
National Laboratory for Applied Network Research

NLANR, initially a collaboration among supercomputer sites supported by the National Science Foundation, was created in 1995 to provide technical and engineering support and overall coordination of the high-speed connections at these five supercomputer centers.

Today NLANR offers support and services to institutions that are qualified to use high performance network service providers - such as Internet 2 and Next Generation Internet.

http://www.nlanr.net

INDEXCARD, 24/24