|
Operating the net: overview The Net consists of thousands of thousands of governmental and private networks linked together. No legal authority determines how and where networks can be connected together, this is something the managers of networks have to agree about. So there is no way of ever gaining ultimate control of the Internet. Although each of these networks is operated and controlled by an organization, no single organization operates and controls the Net. Instead of a central authority governing the Net, several bodies assure the operability of the Net by developing and setting technical specifications for the Net and by the control of the technical key functions of the Net as the coordination of the domain name system and the allocation of IP numbers. Originally, the Net was a research project funded and maintained by the US Government and developed in collaboration by scientists and engineers. As the standards developed for ensuring operability ensued from technical functionality, technical coordination gradually grew out of necessity and was restricted to a minimum and performed by volunteers. Later, in the 1980s, those occupied with the development of technical specifications organized themselves under the umbrella of the Internet Society in virtual organizations as the Internet Engineering Task Force, which were neither officially established nor being based on other structures than mailing lists and commitment, but nonetheless still serve as task forces for the development of standards ensuring the interoperability on the Net. Since the late 80s and the early 90s, with the enormous growth of the Net - which was promoted by the invention of Since the year 2000, a new model for technical coordination has been emerging: Formerly performed by several bodies, technical coordination is transferred to a single non-governmental organization: the Internet Coordination of Assigned Numbers and Names. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
Databody economy and the surveillance state
The glamour of the data body economy clouds economic practices which are much less than glamorous. Through the seizure of the data body, practices that in the real political arena were common in the feudal age and in the early industrial age are being reconstructed. The data body economy digitally reconstructs exploitative practices such as slavery and wage labour. However, culturally the data body is still a very new phenomenon: mostly, people think if it does not hurt, it cannot be my body. Exploitation of data bodies is painless and fast. Nevertheless, this can be expected to change once the awareness of the political nature of the data body becomes more widespread. As more and more people routinely move in digitised environments, it is to be expected that more critical questions will be asked and claims to autonomy, at present restricted to some artistic and civil society groups trying to get heard amidst the deafening noise of the commercial ICT propaganda, will be articulated on a more general level. The more problematic aspect of this development may be something else: the practices of the data body economy, themselves a reconstruction of old techniques of seizure, have begun to re-colonise real political space. Simon Davis, Director of the London-based privacy campaigners The constant adaptation process required from the modern individual has anonymised and structuralized punishment, which now appears in the guise of error messages and the privatisation of risk. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Recent "Digital Copyright" Legislation: U.S. DMCA (Digital Millennium Copyright Act) The debates in the House and Senate preceding the signing into law of the DMCA by U.S. President Clinton in October 1998 indicated that the principal object of the Act is to promote the U.S. economy by establishing an efficient Internet marketplace in copyrighted works. The DMCA implements the two 1996 A full-text version of the DMCA is available from: The Library of Congress: Thomas (Legislative Information on the Internet): Moreover the U.S. Copyright Office provides a memorandum, which briefly summarizes each of the five titles of the DMCA (pdf format): The DMCA has been criticized for not clarifying the range of legal principles on the liability of ISPs and creating exceptions to only some of the provisions; therefore giving copyright owners even more rights. Among the variety of comments on the DMCA are: Lutzker, Arnold P.: Primer on the Digital Millennium: What the Digital Millennium Copyright Act and the Copyright Term Extension Act Mean for the Library Community. Lutzker & Lutzker law firm and the Association of Research Libraries: The Digital Millennium Copyright Act: Highlights of New Copyright Provision Establishing Limitation of Liability for Online Service Providers. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Positions Towards the Future of Copyright in the "Digital Age" With the development of new transmission, distribution and publishing technologies and the increasing digitalization of information copyright has become the subject of vigorous debate. Among the variety of attitudes towards the future of traditional copyright protection two main tendencies can be identified: Eliminate Copyright Anti-copyrightists believe that any Enlarge Copyright Realizing the growing economic importance of intellectual property, especially the holders of copyright (in particular the big publishing, distribution and other | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Think Tanks and Corporate Money Looking at the financial situation of think tanks, different funding patterns can be found. While financial contributions from foundations play an important role especially for conservative think tanks, also contributions from governments are made to certain institutions. Yet one of the most important funding sources are corporate donors and individual contributors. Although the extent to which - in most cases conservative - think tanks rely on corporate funding varies, from the US$ 158 million spent by the top 20 conservative think tanks, more than half of it was contributed by corporations or businessmen. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
History: European Tradition Only in Roman times the first rights referring to artistic works appeared. Regulations resembling a lasting exclusive right to copy did not occur until the 17th century. Before copyright was a private arrangement between guilds able to reproduce copies in commercial quantities. In France and Western European countries "droits d'auteur" or author's rights is the core of what in the Anglo-American tradition is called copyright. Such rights are rooted in the republican revolution of the late 18th century, and the Rights of Man movement. Today in the European system the creator is front and center; later exploiters are only secondary players. France During the 18th century France gradually lost the ability to restrict In 1777 the King threatened the monopoly by reducing the duration of publisher's privileges to the lifetime of the authors. Accordingly a writer's work would go into the public domain after his death and could be printed by anyone. The booksellers fought back by argumenting that, no authority could take their property from them and give it to someone else. Seven months later, in August 1789, the revolutionary government ended the privilege system and from that time on anyone could print anything. Early in 1790 Marie-Jean-Antoine-Nicolas de Caritat, Marquis de Condorcet proposed giving authors power over their own work lasting until ten years after their deaths. The proposal - the basis for France's first modern copyright law - passed in 1793. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Copyright Management and Control Systems: Pre-Infringement Pre-infringement Contracts Contracts are a pre-infringement control method, which very often is underestimated. Properly formed contracts enable copyright holders to restrict the use of their works in excess of the rights granted under copyright laws. Copy Protection This approach was standard in the 1980s, but rejected by consumers and relatively easy to break. Still copy protection, whereby the vendor limits the number of times a file can be copied, is used in certain situations. Limited Functionality This method allows copyright owners to provide a copy of the work, which is functionally limited. Software creators, for example, can distribute software that cannot print or save. A fully functional version has to be bought from the vendor. Date Bombs Here the intellectual property holder distributes a fully functional copy but locks off access at a pre-specified date or after a certain number of uses. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Definition During the last 20 years the old "Digital divide" describes the fact that the world can be divided into people who do and people who do not have access to (or the education to handle with) modern information technologies, e.g. cellular telephone, television, Internet. This digital divide is concerning people all over the world, but as usually most of all people in the formerly so called third world countries and in rural areas suffer; the poor and less-educated suffer from that divide. More than 80% of all computers with access to the Internet are situated in larger cities. "The cost of the information today consists not so much of the creation of content, which should be the real value, but of the storage and efficient delivery of information, that is in essence the cost of paper, printing, transporting, warehousing and other physical distribution means, plus the cost of the personnel manpower needed to run these `extra' services ....Realizing an autonomous distributed networked society, which is the real essence of the Internet, will be the most critical issue for the success of the information and communication revolution of the coming century of millennium." (Izumi Aizi) for more information see: | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Legal Protection: European Union Within the EU's goal of establishing a European single market also An overview of EU activities relating to intellectual property protection is available on the website of the European Commission (DG Internal Market): | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Copyright Management and Control Systems: Metering Hardware Devices Those have to be acquired and installed by the user. For example under a debit card approach, the user purchases a debit card that is pre-loaded with a certain amount of value. After installation, the debit card is debited automatically as the user consumes copyrighted works. Digital Certificates Hereby a certification authority issues to a user an electronic file that identifies the user as the owner of a public key. Those digital certificates, besides Centralized Computing Under this approach all of the executables remain at the server. Each time the executable is used, the user's computer must establish contact with the server, allowing the central computer to meter access. Access Codes Access code devices permit users to "unlock" protective mechanisms (e.g. date bombs or functional limitations) embedded in copyrighted works. Copyright owners can meter the usage of their works, either by unlocking the Copyright Clearinghouses Under this approach copyright owners would commission "clearinghouses" with the ability to license the use of their works. A user would pay a license fee to obtain rights concerning the intellectual property. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Recent "Digital Copyright" Legislation: European Union Directive on Copyright and Related Rights in the Information Society In November 1996 the European Commission adopted a communication concerning the follow-up to the Green Paper on - the legal protection of computer programs - rental right, lending right and certain rights related to copyright in the field of - copyright and related rights applicable to broadcasting of programs by satellite and cable retransmission - the term of protection of copyright and certain related rights - the legal protection of databases The proposal was first presented by the Commission in January 1998, amended in May 1999 and currently is at second reading before the Parliament. Final adoption of the Directive could take place at the end of 2000 or the beginning of 2001 respectively. A full-text version for download (pdf file) of the amended proposal for a Directive on copyright and related rights in the Information Society is available on the website of the European Commission (DG Internal Market): General critique concerning the proposed EU Directive includes: - Open networks The new law could require (technological) surveillance of communications to ensure enforcement. Also because Service Providers might be legally liable for transmitting unauthorized copies, the might in turn have to deny access to anybody who could not provide them with financial guaranties or insurance. - Interoperable systems The draft could negate the already established right in EU law for software firms to make their systems interoperable with the dominant copyright protected systems. This would be a threat to the democratic and economic rights of users. - Publicly available information It is yet unclear whether new legal protections against the bypassing of Comments from the library, archives and documentation community on the amended Directive embrace: The Library Association EBLIDA (European Bureau of Library, Information and Documentation Associations) Society of Archivists (U.K.) and Public Record Office (U.K.) EFPICC (European Fair Practices In Copyright Campaign) | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
The Piracy "Industry" Until recent years, the problem of piracy (the unauthorized reproduction or distribution of copyrighted works (for commercial purposes)) was largely confined to the copying and physical distribution of tapes, disks and CDs. Yet the emergence and increased use of global data networks and the WWW has added a new dimension to the piracy of This new development, often referred to as Internet piracy, broadly relates to the use of global data networks to 1) transmit and download digitized copies of pirated works, 2) advertise and market pirated intellectual property that is delivered on physical media through the mails or other traditional means, and 3) offer and transmit codes or other technologies which can be used to circumvent Lately the Table: IIPA 1998 - 1999 Estimated Trade Loss due to Copyright Piracy (in millions of US$)
| |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Internet services The Internet can be used in in different ways: for distributing and retrieving information, for one-to-one, one-to-many and many-to-many communication, and for the access services. Accordingly, there are different services on offer. The most important of these are listed below. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
File Transfer Protocol (FTP) FTP enables the transfer of files (text, image, video, sound) to and from other remote computers connected to the Internet. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Mobil One of the largest of American holding companies, primarily engaged in petroleum operations but having major interests in chemical products and retailing. It was formed in 1976 to be the parent company in the merger of Mobil Oil Corporation and Marcor Inc. Mobil Oil Corporation carries on a full range of petroleum operations from exploration to marketing, with major production in the Gulf of Mexico, California, the Atlantic coast, the Alaskan North Slope, the North Sea, and Saudi Arabia. Headquarters for Mobil Corporation (and Mobil Oil Corporation) are in Fairfax, Va. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Automation Automation is concerned with the application of machines to tasks once performed by humans or, increasingly, to tasks that would otherwise be impossible. Although the term mechanization is often used to refer to the simple replacement of human labor by machines, | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
The Spot | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Bandwidth The bandwidth of a transmitted communications signal is a measure of the range of frequencies the signal occupies. The term is also used in reference to the frequency-response characteristics of a communications receiving system. All transmitted signals, whether analog or digital, have a certain bandwidth. The same is true of receiving systems. Generally speaking, bandwidth is directly proportional to the amount of data transmitted or received per unit time. In a qualitative sense, bandwidth is proportional to the complexity of the data for a given level of system performance. For example, it takes more bandwidth to download a photograph in one second than it takes to download a page of text in one second. Large sound files, computer programs, and animated videos require still more bandwidth for acceptable system performance. Virtual reality (VR) and full-length three-dimensional audio/visual presentations require the most bandwidth of all. In digital systems, bandwidth is data speed in bits per second (bps). Source: Whatis.com | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Wide Application Protocol (WAP) The WAP (Wireless Application Protocol) is a specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access, including While Internet access has been possible in the past, different manufacturers have used different technologies. In the future, devices and service systems that use WAP will be able to interoperate. Source: Whatis.com | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
The World Wide Web History Project The ongoing World Wide Web History Project was established to record and publish the history of the World Wide Web and its roots in hypermedia and networking. As primary research methods are used archival research and the analysis of interviews and talks with pioneers of the http://www.webhistory.org/home.html | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Vladimir Putin Vladimir Putin is Russian President, | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Hill & Knowlton John W. Hill opened the doors of his first public relations office in 1927 in Cleveland, Ohio. His early clients were banks, steel manufacturers, and other industrial companies in the Midwest. Hill managed the firm until 1962, and remained active in it until shortly before his death in New York City in 1977. In 1952, Hill and Knowlton became the first American public relations consultancy to recognize the business communication implications engendered by formation of the European Economic Community. Hill and Knowlton established a network of affiliates across Europe and by the middle of the decade had become the first American public relations firm to have wholly-owned offices in Europe. Hill and Knowlton, a member of the WPP Group integrated communications services family, has extensive resources and geographic coverage with its 59 offices in 34 countries. Hill and Knowlton is known for its hard-hitting tactics and said to have connections with intelligence services. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Slobodan Milosevic Slobodan Milosevic (* 1941) is a Serbian political leader. As a young man S. Milosevic joined the Communist Party, in 1984 the banker became head of the local Communist Party of Belgrade, in 1987 head of the Serb CP. Since 1989 he has been president of Serbia (since 1997 president of the new Federal Republic of Yugoslavia). During his reign the Yugoslav Republic broke up, bringing about the independence of Slovenia and Croatia and the war in Bosnia. In 1998 the Kosovo Crisis started. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Server A server is program, not a computer, as it sometimes said, dedicated to store files, manage printers and network traffic, or process database queries. Web sites, the nodes of the | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Industrial design Industrial design refers to the ornamental aspect of a useful article which may constitute of two or three-dimensional elements. To be qualified for | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Network Information Center (NIC) Network information centers are organizations responsible for registering and maintaining the domain names on the | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Critical Art Ensemble Critical Art Ensemble is a collective of five artists of various specializations dedicated to exploring the intersections between art, technology, radical politics, and critical theory. CAE have published a number of books and carried out innovative art projects containing insightful and ironic theoretical contributions to media art. Projects include Addictionmania, Useless Technology, The Therapeutic State, Diseases of Consciousness, Machineworld, As Above So Below, and http://www.critical-art.net | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Mass production The term mass production refers to the application of the principles of specialization, | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Satellites Communications satellites are relay stations for radio signals and provide reliable and distance-independent high-speed connections even at remote locations without high-bandwidth infrastructure. On point-to-point transmission, the transmission method originally employed on, satellites face increasing competition from In the future, satellites will become stronger, cheaper and their orbits will be lower; their services might become as common as satellite TV is today. For more information about satellites, see How Satellites Work ( | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
ARPAnet ARPAnet was the small network of individual computers connected by leased lines that marked the beginning of today's global data networks. Being an experimental network mainly serving the purpose to test the feasibility of In 1969 ARPANET went online and links the first two computers, one of them located at the University of California, Los Angeles, the other at the Stanford Research Institute. But ARPAnet has not become widely accepted before it was demonstrated in action to a public of computer experts at the First International Conference on Computers and Communication in Washington, D. C. in 1972. Before it was decommissioned in 1990, In the USA commercial users already outnumbered military and academic users in 1994. Despite the rapid growth of the Net, most computers linked to it are still located in the United States. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Internet Societal Task Force The Internet Societal Task Force is an organization under the umbrella of the Internet Society dedicated to assure that the Internet is for everyone by identifying and characterizing social and economic issues associated with the growth and use of Internet. It supplements the technical tasks of the Topics under discussion are social, economic, regulatory, physical barriers to the use of the Net, privacy, interdependencies of Internet penetration rates and economic conditions, regulation and taxation. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
William Gibson American science fiction author. Most famous novel: Neuromancer. For resources as writings and interviews available on the Internet see http://www.lib.loyno.edu/bibl/wgibson.htm | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||