|
Iris recognition Iris recognition relies upon the fact that every individuals retina has a unique structure. The iris landscape is composed of a corona, crypts, filaments, freckles, pits radial furrows and striatations. Iris scanning is considered a particularly accurate identification technology because the characteristics of the iris do not change during a persons lifetime, and because there are several hundred variables in an iris which can be measured. In addition, iris scanning is fast: it does not take longer than one or two seconds. These are characteristics which have made iris scanning an attractive technology for high-security applications such as prison surveillance. Iris technology is also used for online identification where it can substitute identification by password. As in other biometric technologies, the use of iris scanning for the protection of privacy is a two-edged sword. The prevention of identity theft applies horizontally but not vertically, i.e. in so far as the data retrieval that accompanies identification and the data body which is created in the process has nothing to do with identity theft. | |||||||||||||||||||
|
| |||||||||||||||||||
|
1940s - Early 1950s: First Generation Computers Probably the most important contributor concerning the theoretical basis for the digital computers that were developed in the 1940s was The onset of the Second World War led to an increased funding for computer projects, which hastened technical progress, as governments sought to develop computers to exploit their potential strategic importance. By 1941 the German engineer Konrad Zuse had developed a computer, the Z3, to design airplanes and missiles. Two years later the British completed a secret code-breaking computer called Colossus to Also spurred by the war the Electronic Numerical Integrator and Computer (ENIAC), a general-purpose computer, was produced by a partnership between the U.S. government and the University of Pennsylvania (1943). Consisting of 18.000 Concepts in computer design that remained central to computer engineering for the next 40 years were developed by the Hungarian-American mathematician Characteristic for first generation computers was the fact, that instructions were made-to-order for the specific task for which the computer was to be used. Each computer had a different | |||||||||||||||||||
|
| |||||||||||||||||||
|
Gait recognition The fact that an individual's identity is expressed not only by the way he/she looks or sounds, but also by the manner of walking is a relatively new discovery of in biometrics. Unlike the more fully developed biometric technologies whose scrutiny is directed at stationary parts of the body, gait recognition has the added difficulty of having to sample and identify movement. Scientists at the University of Southampton, UK ( Another model considers the shape and length of legs as well as the velocity of joint movements. The objective is to combine both models into one, which would make gait recognition a fully applicable biometric technology. Given that gait recognition is applied to "moving preambulatory subjects" it is a particularly interesting technology for surveillance. People can no longer hide their identity by covering themselves or moving. Female shop lifters who pretend pregnancy will be detected because they walk differently than those who are really pregnant. Potential wrongdoers might resort walking techniques as developed in Monty Pythons legendary "Ministry of Silly Walks" ( | |||||||||||||||||||
|
| |||||||||||||||||||
|
Commercial vs. Independent Content: Power and Scope Regarding the dimension of their financial and human resources commercial media companies are at any rate much more powerful players than their independent counterparts. Still those reply with an extreme multiplicity and diversity. Today thousands of newsgroups, mailing-list and e-zines covering a wide range of issues from the environment to politics, social and human rights, culture, art and democracy are run by alternative groups. Moreover independent content provider have started to use digital media for communication, information and co-ordination long before they were discovered by corporate interest. They regularly use the Internet and other networks to further public discourse and put up civic resistance. And in many cases are very successful with their work, as initiatives like widerst@ndMUND's (AT) co-ordination of the critics of the participation of the Freedom Party in the Austrian government via mailing-lists, an online-magazine and discussion forums, show. | |||||||||||||||||||
|
| |||||||||||||||||||
|
The Big Five of Commercial Media After a number of mergers and acquisitions five powerful media conglomerates lead the world's content production and distribution. They operate on an international basis with subsidiaries all around the globe and engage in every imaginable kind of media industry. Table: The World's Leading Media Companies
(* Revenues of Time Warner only (merger with AOL took place in January 2000) | |||||||||||||||||||
|
| |||||||||||||||||||
|
The 2nd Chechnya-War In the summer of 1999 between 1.200 and 2.000 Muslim rebels from Chechnya fell into Dagestan. Rumors say that Russian soldiers closed their eyes pretending not to see anything. During the fightings that started soon, many persons got killed. The hole issue was blamed on Chechnya. At that time there were rumors that there would be heavy bombing in Moscow in September. And there was. Those two things together brought back the hatred against the Chechnya rebels. The 2nd War between Russia and the Muslim country began. While the first war was lost at home, because the Russians, especially mothers, did not understand why their sons should fight against Chechnya, this time the atmosphere was completely different. In the cities 85% and all over Russia 65% of the Russian population agreed with the war. This time the war was a national issue, a legitimate defense. The media emphasized this. Alexander Zilin, a journalist, found out that the truth was far from the one presented in the media: First of all there was no evidence that the Moscow-bombings were organized by Chechnyans. On the contrary it is more than probable that the crimes were organized by a governmental institution for national security. The disinformation was part of the strategy to make the population support another war with Chechnya. The media were part of the story, maybe without knowing. They kept on the government's and army's side, showing only special and patriotic parts of the war. For example the number of dead Russian soldiers was held back. The U.S.-behavior on this: The USA would like to intervene but they are afraid of ruining the weak relation to Russia. For years the main topic of U.S.-politics has been the struggle against terrorism. Now Russia pretends to be fighting terrorism. How could it be criticized for that? The reason for this war is rather cynical: it worked as a public relations-campaign for At the same time a propaganda-campaign against his rival Y. Primakov (98), formerly the most popular candidate, was spreading lies and bad rumors. Opinion-polls showed very fast that he had lost the elections because of this black propaganda, even before the elections took place. | |||||||||||||||||||
|
| |||||||||||||||||||
|
Biometric technologies In what follows there is a brief description of the principal biometric technologies, whose respective proponents - producers, research laboratories, think tanks - mostly tend to claim superiority over the others. A frequently used definition of "biometric" is that of a "unique, measurable characteristic or trait of a human being for automatically recognizing or verifying identity" ( All biometric technologies are made up of the same basic processes: 1. A sample of a biometric is first collected, then transformed into digital information and stored as the "biometric template" of the person in question. 2. At every new identification, a second sample is collected and its identity with the first one is examined. 3. If the two samples are identical, the persons identity is confirmed, i.e. the system knows who the person is. This means that access to the facility or resource can be granted or denied. It also means that information about the persons behaviour and movements has been collected. The system now knows who passed a certain identification point at which time, at what distance from the previous time, and it can combine these data with others, thereby appropriating an individual's data body. | |||||||||||||||||||
|
| |||||||||||||||||||
|
Introduction: The Substitution of Human Faculties with Technology: Computers and Robots With the development of modern computing, starting in the 1940s, the substitution of human abilities with technology obtained a new dimension. The focus shifted from the replacement of pure physical power to the substitution of mental faculties. Following the early 1980s personal computers started to attain widespread use in offices and quickly became indispensable tools for office workers. The development of powerful computers combined with progresses in | |||||||||||||||||||
|
| |||||||||||||||||||
|
Changes Still, disinformation and propaganda are nothing magic. They can change things, but supposedly only if those things/meanings/opinions are not fixed completely. It is never just a single idea that changes. Society is following the changes. Thinking about disinformation brings us to the word truth, of course, and to the doubt that there is no definite truth. And truth can easily be manipulated to another truth. Just present some facts that seem to be logic and there you've got a new truth. And if the facts can supposedly be proved by empirical studies then the quality of the truth definitely rises. That's what ideologies do all the time. And the media like to do the same thing - as a game with power or mere presentation of power? But of course there also exist bits of disinformation which are more amusing than evil or dangerous: - the theory of the celestro-centric world/"Hohlwelttheorie" - the story of the German philosopher who invented an Italian philosopher, wrote books about him, even reprinted "his" texts, which had gone lost pretendedly 100 years ago - and finally lost his job and all his career when other scientists found out that everything had been made up. | |||||||||||||||||||
|
| |||||||||||||||||||
|
Advertising Advertising as referred to in most economic books is part of the marketing mix. Therefore advertising usually is closely associated with the aim of selling products and services. Still, developments like "branding" show a tendency towards the marketing of not only products and services, but of ideas and values. While advertising activities are also pursued by political parties, politicians and governmental as well as non-governmental organizations, most of the money flowing into the advertising industry comes from corporations. Although these clients come from such diverse fields, their intentions hardly differ. Attempting to influence the public, their main goal is to sell: Products, services, ideas, values and (political) ideology. | |||||||||||||||||||
|
| |||||||||||||||||||
|
Media Giants Online The following selection does not claim to present an exhaustive listing, but rather picks some of the company's most important assets. Due to the rapid developments in the world of media giants the list is also subject to changes. Broadcasting ABC TV Network with 223 affiliated TV stations covering the entire U.S. ABC Radio Network, with 2,900 affiliated stations throughout the U.S. Owner of 9 VHF TV stations Owner of 11 AM and 10 FM stations Cable TV Systems and Channels/Networks 80 % of ESPN cable TV channel and ESPN International 50 % of Lifetime cable TV channel Internet/Interactive Disney Interactive - entertainment and educational computer software and video games, plus development of content for on-line services. Partnership with 3 phone companies to provide video programming and interactive services. ABC Online TV Production, Movies, Video, Music Disney Television Production studios and Walt Disney Pictures movie studio Buena Vista Television production company Buena Vista Home Video Miramax and Touchstone movie production companies Buena Vista Pictures Distribution and Buena Vista International, distributors for Disney and Touchstone movies Walt Disney Records, and Hollywood Records Publishing 6 daily newspapers About 40 weekly magazines, including: Discover, Women's Wear Daily, Los Angeles and Institutional Investor. Chilton Publications Guilford Publishing Co. Hitchcock Publishing Co. Theme Parks, Resorts, and Travel Disneyland Disney World and Disney World Resort Part owner of Disneyland-Paris and Tokyo Disneyland 12 resort hotels Disney Vacation Club Cruise Lines International TV, Film, and Broadcasting 50 % owner of Tele-München Fernseh GmbH & Co. 50 % owner of RTL Disney Fernseh GmbH & Co. 23 % owner of RTL 2 Fernseh GmbH & Co. 37,5 % owner of TM3 Fernseh GmbH & Co. 20-33 % stake in Eurosport network, Spanish Tesauro SA TV company, and Scandinavian Broadcasting System SA 20 % owner of TVA Other Over 500 Disney Stores, and licensing of Disney products The Mighty Ducks professional hockey team 25 % ownership of California Angels major league baseball team Business Connections with Other Media Companies Joint ventures, equity interests, or major arrangements with | |||||||||||||||||||
|
| |||||||||||||||||||
|
Beautiful bodies However, artificial beings need not be invisible or look like Arnold Schwarzenegger in "Terminator". "My dream would be to create an artificial man that does not look like a robot but like a beautiful, graceful human being. The artificial man should be beautiful". While in Hindu mythology, | |||||||||||||||||||
|
| |||||||||||||||||||
|
1980s: Artificial Intelligence (AI) - From Lab to Life Following the commercial success of New technologies were being invented in Japan. | |||||||||||||||||||
|
| |||||||||||||||||||
|
Identity vs. Identification It has become a commonplace observation that the history of modernity has been accompanied by what one might call a general weakening of identity, both as a theoretical concept and as a social and cultural reality. This blurring of identity has come to full fruition in the 20th century. As a theoretical concept, identity has lost its metaphysical foundation of "full correspondence" following the destruction of metaphysics by thinkers such as Nietzsche, Heidegger, Witgenstein or Davidson. Nietzsche's "dead god", his often-quoted metaphor for the demise of metaphysics, has left western cultures not only with the problem of having to learn how to think without permanent foundations; it has left them with both the liberty of constructing identities, and the structural obligation to do so. The dilemmas arising out of this ambivalent situation have given rise to the comment that "god is dead, and men is not doing so well himself". The new promise of freedom is accompanied by the threat of enslavement. Modern, technologically saturated cultures survive and propagate and emancipate themselves by acting as the gatekeepers of their own technological prisons. On the social and cultural levels, traditional clear-cut identities have become weakened as traditional cultural belonging has been undermined or supplanted by modern socio-technological structures. The question as to "who one is" has become increasingly difficult to answer: hybrid identities are spreading, identities are multiple, temporary, fleeting rather than reflecting an inherited sense of belonging. The war cry of modern culture industry "be yourself" demands the impossible and offers a myriad of tools all outcompeting each other in their promise to fulfil the impossible. For many, identity has become a matter of choice rather than of cultural or biological heritage, although being able to chose may not have been the result of a choice. A large superstructure of purchasable identification objects caters for an audience finding itself propelled into an ever accelerating and vertiginous spiral of identification and estrangement. In the supermarket of identities, what is useful and cool today is the waste of tomorrow. What is offered as the latest advance in helping you to "be yourself" is as ephemeral as your identification with it; it is trash in embryonic form. Identity has become both problematic and trivial, causing modern subjects a sense of thrownness and uprootedness as well as granting them the opportunity of overcoming established authoritarian structures. In modern, technologically saturated societies, the general weakening of identities is a prerequisite for emancipation. The return to "strong" clear-cut "real" identities is the way of new fundamentalism demanding a rehabilitation of "traditional values" and protected zones for metaphysical thought, both of which are to be had only at the price of suppression and violence. It has become difficult to know "who one is", but this difficulty is not merely a private problem. It is also a problem for the exercise of power, for the state and other power institutions also need to know "who you are". With the spread of weak identities, power is exercised in a different manner. Power cannot be exercised without being clear who it addresses; note the dual significance of "subject". A weakened, hybrid undefined subject (in the philosophical sense) cannot be a "good" subject (in the political sense), it is not easy to sub-ject. Without identification, power cannot be exercised. And while identification is itself not a sufficient precondition for authoritarianism, it is certainly a necessary one. Identities are therefore reconstructed using technologies of identification in order to keep the weakened and hence evasive subjects "sub-jected". States have traditionally employed bureaucratic identification techniques and sanctioned those who trying to evade the grip of administration. Carrying several passports has been the privilege of spies and of dubious outlaws, and not possessing an "ID" at all is the fate of millions of refugees fleeing violence or economic destitution. Lack of identification is structurally sanctioned by placelessness. The technisised acceleration of societies and the weakening of identities make identification a complicated matter. On the one hand, bureaucratic identification techniques can be technologically bypassed. Passports and signatures can be forged; data can be manipulated and played with. On the other hand, traditional bureaucratic methods are slow. The requirements resulting from these constraints are met by biometric technology. | |||||||||||||||||||
|
| |||||||||||||||||||
|
MIRALab MIRALab is a research laboratory attached to the University of Geneva. Its motto is "where research meets creativity". MIRAlab's objective is to model human functionalities, such as movement or facial expression, in a realistic way. | |||||||||||||||||||
|
| |||||||||||||||||||
|
Nadia Thalman Nadia Thalman is director of | |||||||||||||||||||
|
| |||||||||||||||||||
|
Charles Babbage b. December 26, 1791, London, England d. October 18, 1871, London, England English mathematician and inventor who is credited with having conceived the first automatic digital computer. The idea of mechanically calculating mathematical tables first came to Babbage in 1812 or 1813. Later he made a small | |||||||||||||||||||
|
| |||||||||||||||||||
|
New World Order | |||||||||||||||||||
|
| |||||||||||||||||||
|
National Association of Securities Dealers Automated Quotation (NASDAQ) Incepted in 1971, The NASDAQ Stock Market was the world's first electronic stock market and has since attracted many technology companies from countries all over the world, some of them as legendary as NASDAQ is the largest stock market in the world. | |||||||||||||||||||
|
| |||||||||||||||||||
|
Avatar Traditionally, an avatar is a mythical figure half man half god. In Hindu mythology, avatars are the form that deities assume when they descend on earth. Greek and Roman mythologies also contain avatars in animal form or half animal, half man. In virtual space, the word avatar refers to a "virtual identity" that a user can construct for him / herself, e.g. in a chat-room. Avatars have also been a preferred object of media art. | |||||||||||||||||||
|
| |||||||||||||||||||
|
Punch card, 1801 Invented by Joseph Marie Jacquard, an engineer and architect in Lyon, France, the punch cards laid the ground for automatic information processing. For the first time information was stored in binary format on perforated cardboard cards. In 1890 Hermann Hollerith used Joseph-Marie Jacquard's punch card technology for processing statistical data retrieved from the US census in 1890, thus speeding up data analysis from eight to three years. His application of Jacquard's invention was also used for programming computers and data processing until electronic data processing was introduced in the 1960's. - As with Paper tapes are a medium similar to Jacquard's punch cards. In 1857 Sir Charles Wheatstone applied them as a medium for the preparation, storage, and transmission of data for the first time. By their means, telegraph messages could be prepared off-line, sent ten times quicker (up to 400 words per minute), and stored. Later similar paper tapes were used for programming computers. | |||||||||||||||||||
|
| |||||||||||||||||||
|
Archbishop Oscar Arnulfo Romero Archbishop Oscar Arnulfo Romero († 1980) was elected archbishop because he was very conservative. But when he saw how more and more priests and definitely innocent people were murdered, he changed his attitudes and became one of the sharpest critics of the government. He gave shelter to those in danger, never stopped talking against violence and his Sunday sermons on the radio where moments to tell the truth to the Salvadorians, also mentioning the names of the disappeared or killed persons. As Romero got extremely popular and dangerous for the population he was killed by death squads, while reading a sermon. | |||||||||||||||||||
|
| |||||||||||||||||||
|
General Electric GE is a major American corporation and one of the largest and most diversified corporations in the world. Its products include electrical and electronic equipment, plastics, aircraft engines, medical imaging equipment, and financial services. The company was incorporated in 1892, and in 1986 GE purchased the RCA Corporation including the RCA-owned television network, the National Broadcasting Company, Inc. In 1987, however, GE sold RCA's consumer electronics division to Thomson SA, a state-owned French firm, and purchased Thomson's medical technology division. In 1989 GE agreed to combine its European business interests in appliances, medical systems, electrical distribution, and power systems with the unrelated British corporation General Electric Company. Headquarters are in Fairfield, Conn., U.S. | |||||||||||||||||||
|
| |||||||||||||||||||
|
blowfish encryption algorithm Blowfish is a symmetric key block cipher that can vary its length. The idea behind is a simple design to make the system faster than others. | |||||||||||||||||||
|
| |||||||||||||||||||