The third industiral revolution. Life as a product. Many years ago, the German philosopher The "third industrial revolution" is characterized by men becoming the "raw material" of their own industries. Product and producer, production and consumption, technology and nature are no longer meaningful pairs of opposites. The third is also the last revolution, as it is difficult to think of further revolutions when the distinction between subject and object becomes blurred. The world is becoming a Bestand and the human body and mind are no protected zones. They are something like the last safety zone of human being which is now itself becoming a basis for technological innovation. When the subject is weakened by its technical environment, the use of technical crooks for body and mind becomes an obvious "solution", even if the technically strengthened subject is strengthened at the cost of no longer being a "subject" in the traditional, metaphysical sense. Biological processes are dissected and subjected to technical control. This technical control is technical in two senses: it is not only control through technology but by ttechnology itsself, since it is not carried out by unaided human minds, but increasingly by intelligent machines. The point where this Andersian third industrial revolution reaches an unprecedented logic seems to lie within the realm of genetic engeneering. This example shows that the dissection of humanness - the decoding of genetic information - is tantamount to commodification. The purpose of the commercial genetic research projects is the use of genetic information as a resource for the development of new products, e.g. in pharmaceutics. Genetic products carry the promise of offering a solution to so-far uncurable diseases such as cancer, Alzeheimer, heart disorders, schizophrenia, and others, but they also open up the possibility of "breaking the chains of evolution", of actively manipulating the genetic structure of human beings and of "designing" healthy, long-living, beautiful, hard-working etc. beings. Here, the homo creator and the homo materia finally become indistinguishable and we are being to merge with our products in such a way that it "we" loses the remains of its meaning. Since 1990 research on human genetics is organised in the But exactly this patentising is of paramount importance in the emerging "post-industrial" society where knowledge becomes the most important resource. A patent is nothing else than a property title to a piece of "know-how", and an necessary consequence commodification. When life no longer simply a natural creation but a product, it, too, will be patented and becomes a commodity. Against the idea of the human genome as a public good, or an "open source", there is a growing competion on the part of private industry. Companies such as But the commodification of life is not limited ot the human species. Genetically altered animals and plants are also suffering the same fate, and in most industrialised nations it is now possible to patent genetically engeneered species and crops. The promises of the "Green Revolution" of the 1960s are now repeated in the genetic revolution. Genetic engeneering, so it is argued, will be able to breed animals and plants which resist disease and yield more "food" and will therfore help to tackle problems of undernutrition and starvation. Companies such as | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
Missing Labeling of Online Ads One of the most crucial issues in on-line advertising is the blurring of the line between editorial content and ads. Unlike on TV and in the print media, where guidelines on the labeling of advertisements, which shall enable the customer to distinguish between editorial and ads, exist, similar conventions have not yet evolved for Internet content. Labeling of online advertisement up to now has remained the rare exception, with only few sites (e.g. | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
On-line Advertising Revenues Although Internet advertising only really started in 1994, revenues showed a steady and fast growth. In 1997 US$ 906.5 million were spent on on-line advertising. Compared with advertising revenue for the television industry in equivalent dollars for its third year, the Internet was slightly ahead, at US$ 907 million compared to television's US$ 834 million. 1998 on-line advertising grew by 112 percent to US$ 1.92 billion in revenues, and is on track to hit US$ 4 billion in 1999, which would put Internet advertising at about 2 percent of the U.S. ad market. Table: Spending on On-Line Advertising by Category (first quarter 1999)
Table: Types of On-Line Advertising (first quarter 1999)
Source: Internet Advertising Bureau (IAB). | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
1900 - 2000 A.D. 1904 First broadcast talk 1918 Invention of the short-wave radio 1929 Invention of television in Germany and Russia 1941 Invention of microwave transmission 1946 Long-distance coaxial cable systems and mobile telephone services are introduced in the USA. 1957 First data transmissions over regular phone circuits. At the beginning of the story of today's global data networks is the story of the development of In 1955 President Eisenhower announced the USA's intention to launch a satellite. But it in the end it was the Soviet Union, which launched the first satellite in 1957: Sputnik I. After Sputnik's launch it became evident that the Cold War was also a race for leadership in the application of state-of-the-art technology to defense. As the US Department of Defense encouraged the formation of high-tech companies, it laid the ground to Silicon Valley, the hot spot of the world's computer industry. The same year as the USA launched their first satellite - Explorer I - data was transmitted over regular phone circuits for the first time, thus laying the ground for today's global data networks. Today's satellites may record weather data, scan the planet with powerful cameras, offer global positioning and monitoring services, and relay high-speed data transmissions. Yet up to now, most satellites are designed for military purposes such as reconnaissance. 1969 ARPAnet was the small network of individual computers connected by leased lines that marked the beginning of today's global data networks. An experimental network it mainly served the purpose of testing the feasibility of In 1969 ARPANET went online and linked the first two computers, one located at the University of California, Los Angeles, the other at the Stanford Research Institute. Yet ARPAnet did not become widely accepted before it was demonstrated in action to a public of computer experts at the First International Conference on Computers and Communication in Washington, D. C. in 1972. Before it was decommissioned in 1990, In the USA it was already in 1994 that commercial users outnumbered military and academic users. Despite the rapid growth of the Net, most computers linked to it are still located in the United States. 1971 Invention of 1979 Introduction of 1992 Launch of the | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
Another Question of Security Even with the best techniques it is impossible to invent a cryptographic system that is absolutely safe/unbreakable. To decipher a text means to go through many, sometimes nearly - but never really - endless attempts. For the computers of today it might take hundreds of years or even more to go through all possibilities of codes, but still, finally the code stays breakable. The much faster quantum computers will proof that one day. Therefore the decision to elect a certain method of enciphering finally is a matter of trust. For the average user of computers it is rather difficult to understand or even realize the dangers and/or the technological background of electronic transmission of data. For the majority thinking about one's own necessities for encryption first of all means to trust others, the specialists, to rely on the information they provide. The websites explaining the problems behind (and also the articles and books concerning the topic) are written by experts of course as well, very often in their typical scientific language, merely understandable for laymen. The introductions and other superficial elements of those articles can be understood, whereas the real background appears as untouchable spheres of knowledge. The fact that dangers are hard to see through and the need for security measures appears as something most people know from media reports, leads directly to the problem of an underdeveloped democracy in the field of cryptography. Obviously the connection between cryptography and democracy is rather invisible for many people. Those mentioned media reports often specialize in talking about the work computer hackers do (sometimes being presented as criminals, sometimes as heroes) and the danger to lose control over the money drawn away from one's bank account, if someone steals the credit card number or other important financial data. The term "security", surely connected to those issues, is a completely different one from the one that is connected to privacy. It is especially the latter that touches the main elements of democracy. for the question of security see: | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
Sponsorship Models With new sponsorship models being developed, even further influence over content from the corporate side can be expected. Co-operating with | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
Steganography Ciphers as well as codes are transmitted openly. Everyone can see that they exist. Not so with steganograms. Steganography is the art and science of communicating in a way which hides the existence of the secret part in that communication. During the Italian Renaissance and the time of the Elizabethan Age in England cryptography was very popular, for political reasons as well as for amusements (see John Dee). In literature steganography played an important role. Many steganographs of that period have only been deciphered recently like some of the Shakespearean sonnets, which now seem to proof that the actor William Shakespeare was not the author of the famous poems and dramas, but that the latter' name was, and Francis Bacon, or even Francis Tudor, as some ciphers and other sources talk of him as Queen Elisabeth I.'s secret son. for further details see: One kind of steganogram is digital watermarking: Watermarks protect digital images, videos, but also audio and multimedia products. They are made out of digital signals, put into other digital signals. They try to be invisible on first sight and should be nearly impossible to remove. The process of producing watermarks is to overlay some sort of identifying image over the original image (non-digital watermarks, like on money can be seen by holding the paper against light). Copying the image destroys the watermark, which cannot be copied. Any alteration of the original destroys the watermark, too. Watermarking is one of the typical inventions of cryptography to assist the biggest content owners, but advertised as something necessary and helpful for everybody. Who in fact gets any advantage out of watermarking? The private user most of the time will not really need it except for small entities of pictures maybe. But the big enterprises do. There is a tendency to watermark more and more information in the Internet, which until now was considered as free and as a cheap method to receive information. Watermarking could stop this democratic development. for further information see: | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
Economic structure; transparent customers Following the dynamics of informatised economies, the consumption habits and lifestyles if customers are of great interest. New technologies make it possible to store and combine collected data of an enormous amount of people. User profiling helps companies understand what potential customers might want. Often enough, such data collecting takes place without the customer's knowledge and amounts to spying. "Much of the information collection that occurs on the Internet is invisible to the consumer, which raises serious questions of fairness and informed consent." (David Sobel, Electronic Privacy Information Center) | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
Nadia Thalman Nadia Thalman is director of | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
NSFNet Developed under the auspices of | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
Alexander Graham Bell b., March 3, 1847, Edinburgh d. Aug. 2, 1922, Beinn Bhreagh, Cape Breton Island, Nova Scotia, Canada American audiologist and inventor wrongly remembered for having invented the telephone in 1876. Although Bell introduced the first commercial application of the telephone, in fact a German teacher called Reiss invented it. For more detailed information see the Encyclopaedia Britannica: http://www.britannica.com/bcom/eb/article/1/0,5716,15411+1+15220,00.html | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
AT&T AT&T Corporation provides voice, data and video communications services to large and small businesses, consumers and government entities. AT&T and its subsidiaries furnish domestic and international long distance, regional, local and wireless communications services, cable television and Internet communications services. AT&T also provides billing, directory and calling card services to support its communications business. AT&T's primary lines of business are business services, consumer services, broadband services and wireless services. In addition, AT&T's other lines of business include network management and professional services through AT&T Solutions and international operations and ventures. In June 2000, AT&T completed the acquisition of MediaOne Group. With the addition of MediaOne's 5 million cable subscribers, AT&T becomes the country's largest cable operator, with about 16 million customers on the systems it owns and operates, which pass nearly 28 million American homes. (source: Yahoo) Slogan: "It's all within your reach" Business indicators: Sales 1999: $ 62.391 bn (+ 17,2 % from 1998) Market capitalization: $ 104 bn Employees: 107,800 Corporate website: | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
Expert system Expert systems are advanced computer programs that mimic the knowledge and reasoning capabilities of an expert in a particular discipline. Their creators strive to clone the expertise of one or several human specialists to develop a tool that can be used by the layman to solve difficult or ambiguous problems. Expert systems differ from conventional computer programs as they combine facts with rules that state relations between the facts to achieve a crude form of reasoning analogous to | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
Fiber-optic cable networks Fiber-optic cable networks may become the dominant method for high-speed Internet connections. Since the first fiber-optic cable was laid across the Atlantic in 1988, the demand for faster Internet connections is growing, fuelled by the growing network traffic, partly due to increasing implementation of corporate networks spanning the globe and to the use of graphics-heavy contents on the Fiber-optic cables have not much more in common with copper wires than the capacity to transmit information. As copper wires, they can be terrestrial and submarine connections, but they allow much higher transmission rates. Copper wires allow 32 telephone calls at the same time, but fiber-optic cable can carry 40,000 calls at the same time. A capacity, Copper wires will not come out of use in the foreseeable future because of technologies as For technical information from the Encyclopaedia Britannica on telecommunication cables, click An entertaining report of the laying of the FLAG submarine cable, up to now the longest fiber-optic cable on earth, including detailed background information on the cable industry and its history, Neal Stephenson has written for Wired: Mother Earth Mother Board. Click Susan Dumett has written a short history of undersea cables for Pretext magazine, Evolution of a Wired World. Click A timeline history of submarine cables and a detailed list of seemingly all submarine cables of the world, operational, planned and out of service, can be found on the Web site of the For maps of fiber-optic cable networks see the website of | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
Wide Area Network (WAN) A Wide Area Network is a wide area proprietary network or a network of local area networks. Usually consisting of computers, it may consist of cellular phones, too. | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
Avatar Traditionally, an avatar is a mythical figure half man half god. In Hindu mythology, avatars are the form that deities assume when they descend on earth. Greek and Roman mythologies also contain avatars in animal form or half animal, half man. In virtual space, the word avatar refers to a "virtual identity" that a user can construct for him / herself, e.g. in a chat-room. Avatars have also been a preferred object of media art. | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
Censorship of Online Content in China During the Tian-an men massacre reports and photos transmitted by fax machines gave notice of what was happening only with a short delay. The Chinese government has learned his lesson well and "regulated" Internet access from the beginning. All Internet traffic to and out of China passes through a few Users are expected not to "harm" China's national interests and therefore have to apply for permission of Internet access; Web pages have to be approved before being published on the Net. For the development of measures to monitor and control Chinese content providers, China's state police has joined forces with the MIT. For further information on Internet censorship, see Human Rights Watch, | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||