1970s: Computer-Integrated Manufacturing (CIM)

Since the 1970s there had been a growing trend towards the use of computer programs in manufacturing companies. Especially functions related to design and production, but also business functions should be facilitated through the use of computers.

Accordingly the CAD/CAM technology, related to the use of computer systems for design and production, was developed. CAD (computer-aided design) was created to assist in the creation, modification, analysis, and optimization of design. CAM (computer-aided manufacturing) was designed to help with the planning, control, and management of production operations. CAD/CAM technology, since the 1970s, has been applied in many industries, including machined components, electronics products, equipment design and fabrication for chemical processing.

To enable a more comprehensive use of computers in firms the CIM (computer-integrated manufacturing) technology, which also includes applications concerning the business functions of companies, was created. CIM systems can handle order entry, cost accounting, customer billing and employee time records and payroll. The scope of CIM technology includes all activities that are concerned with production. Therefore in many ways CIM represents the highest level of automation in manufacturing.

TEXTBLOCK 1/8 // URL: http://world-information.org/wio/infostructure/100437611663/100438659495
 
Commercial vs. Independent Content: Power and Scope

Regarding the dimension of their financial and human resources commercial media companies are at any rate much more powerful players than their independent counterparts. Still those reply with an extreme multiplicity and diversity. Today thousands of newsgroups, mailing-list and e-zines covering a wide range of issues from the environment to politics, social and human rights, culture, art and democracy are run by alternative groups.

Moreover independent content provider have started to use digital media for communication, information and co-ordination long before they were discovered by corporate interest. They regularly use the Internet and other networks to further public discourse and put up civic resistance. And in many cases are very successful with their work, as initiatives like widerst@ndMUND's (AT) co-ordination of the critics of the participation of the Freedom Party in the Austrian government via mailing-lists, an online-magazine and discussion forums, show.

TEXTBLOCK 2/8 // URL: http://world-information.org/wio/infostructure/100437611734/100438659198
 
Governmental Regulations

The new U.S. regulations are based on the Wassenaar Arrangement Revision of 1998, where exports without license of 56 bit DES and similar products are allowed after a technical review, just like encryption commodities and software with key lengths of 64-bits or less which meet the mass market requirements.
For more information see:
http://www.wassenaar.org/

Seven states stay excluded from the new freedom. These are states like Libya, Iraq, Iran, North Korea and Cuba, altogether states seen as terrorist supporting. No encryption tools may be exported into those countries.

This is, what happened in the USA, whereas in Germany the issue of a cryptography-law is still on the agenda. Until now, in Germany, everyone can decide by her-/himself, whether she/he wants to encrypt electronic messages or not. Some organizations fear that this could get changed soon. Therefore an urgent action was organized in February 2000 to demonstrate the government that people want the freedom to decide on their own. One governmental argument is that only very few people actually use cryptography. Therefore the urgent action is organized as a campaign for using it more frequently.

For more information on this see:
http://www.heise.de/ct/97/04/032/
http://www.fitug.de/ulf/krypto/verbot.html#welt

Other European countries have more liberate laws on cryptography, like France. Austria doesn't have any restrictions at all, probably because of a governmental lack of interest more than accepting freedom.
The (former) restrictions in the bigger countries influenced and hindered developments for safer key-systems, e.g. the key-length was held down extraordinarily.

"Due to the suspicious nature of crypto users I have a feeling DES will be with us forever, we will just keep adding keys and cycles (...). There is a parallel between designing electronic commerce infrastructure today that uses weak cryptography (i.e. 40 or 56 bit keys) and, say, designing air traffic control systems in the '60s using two digit year fields. (...) Just because you can retire before it all blows up doesn't make it any less irresponsible."
(Arnold G. Reinhold)


The Chinese State Encryption Management Commission (SEMC) announced in March 2000 that only strong encryption tools will have to be registered in the future. Which sounds so nice on first sight, does not mean a lot in reality: any kind of useful encryption technique, like the PGP, stay under governmental control.

The restrictions and prohibitions for cryptography are part of the states' wish to acquire more control - in the name of the battle against criminality, probably?
Due to the emerging organized criminality the governments want to obtain more freedom of control over citizens. Organizations like the NSA appear as the leaders of such demands.
What about civil rights or Human Rights?

TEXTBLOCK 3/8 // URL: http://world-information.org/wio/infostructure/100437611776/100438659135
 
biotechnology summary

The fusion of flesh and machine is trend which, although inscribed in the history of modern technology from its beginnings, has reached a unprecedented momentum in recent years as a result of crucial advances in information technology, biology, and the development of global networks. Consequently, doubts are emerging concerning the viability of a distinct and definable human nature. Historical and social theories and concepts are being unhinged by the spread hybrids and by new forms of artificial life which are likely to trigger social changes escaping the grip of calculation. Attempts to defend an essential human nature against technical hybridisation, rather than strengthening the human subject, may have further blurred the question of historical subjectivity. Large amounts of money are invested into research and development of artifical biology, making some of the predictions of AI and robotics experts about radical and far reaching changes a matter of time.

TEXTBLOCK 4/8 // URL: http://world-information.org/wio/infostructure/100437611777/100438658143
 
The Secret Behind

The secret behind all this is the conception that nothing bad could ever be referred to the own nation. All the bad words belong to the enemy, whereas the "we" is the good one, the one who never is the aggressor but always defender, the savior - not only for ones own sake but also for the others, even if they never asked for it, like the German population during World War I and II.
The spiritualization of such thinking leads to the point that it gets nearly impossible to believe that this could be un-true, a fake. To imagine injustice committed by the own nation gets more and more difficult, the longer the tactic of this kind of propaganda goes on. U.S.-Americans voluntarily believe in its politics, believing also the USA works as the police of the world, defending the morally good against those who just do not have reached the same level of civilization until today.
To keep up this image, the enemy must be portrayed ugly and bad, like in fairy-tales, black-and-white-pictures. Any connection between oneself and the enemy must be erased and made impossible. In the case of Slobodan Milosevic or Saddam Hussein this meant to delete the positive contact of the last years from the consciousness of the population. Both had received a high amount of money and material help as long as they kept to the rules of the Western game. Later, when the image of the friend/confederate was destroyed, the contact had to be denied. The media, who had reported that help, no longer seemed to remember and did not write anything about that strange change of mind. And if any did, they were not really listened to, because people tend to hear what they want to hear. And who would want to hear that high amounts of his taxes had formerly gone to "a man" (this personification of the war to one single man is the next disinformation) who now is the demon in one's mind.

All of this is no invention of several politicians. Huge think tanks and different governmental organizations are standing behind that. Part of their work is to hide their own work, or to deny it.

TEXTBLOCK 5/8 // URL: http://world-information.org/wio/infostructure/100437611661/100438658637
 
Advertisers and Marketers Perspective

With the rapid growth of the Internet and its audience advertisers now have a new medium at their disposal. The placement of the first banner ads in 1994 marks the birth of Internet advertising. Although the advertising industry at first hesitated to adopt the new medium, two facts brushed away their doubts:

Migrating Television Audiences: The increased use of the Internet led people to redistribute their time budget. Whereas some cut down on eating and sleeping, more than a third reduced watching television and instead uses the WWW.

Interesting Internet Demographics: While methodologies and approaches of research organizations studying the demographic composition of the Internet vary, the findings are relatively consistent: Internet users are young, well educated and earn high incomes.

Considering those findings, the Internet in the first place seems to become inevitable to be included in media planning, as part of the audience shifts from TV to the WWW, and secondly, because demographics of the Internet user population are irresistible for marketers.

TEXTBLOCK 6/8 // URL: http://world-information.org/wio/infostructure/100437611652/100438657907
 
Extract of Disney’s Content Production and Distribution Holdings

Although the traditional media companies first steps into the digital sphere were fairly clumsy, they have quickly learned from their mistakes and continued to enlarge their Internet presence. Time Warner now for instance operates about 130 Web-Sites (http://www.timewarner.com/corp/about/pubarchive/websites.html). Anyhow the stronger online-engagement of the big media conglomerates by 1998 has led to the establishment of a new pattern: "More than three-quarters of the 31 most visited news and entertainment websites were affiliated with large media firms, and most of the rest were connected to outfits like AOL and Microsoft." (Broadcasting and Cable, 6/22/98).

During the last years many of the smaller players in the field of digital media have been driven out of competition by the huge media conglomerates. This mainly is a result of the advantages that the commercial media giants have over their less powerful counterparts:

    As engagement in online activities mostly does not lead to quick profits, investors must be able to take losses, which only powerful companies are able to.



    Traditional media outlets usually have huge stocks of digital programming, which they can easily plug into the Internet at little extra cost.



    To generate audience, the big media conglomerates constantly promote their Websites and other digital media products on their traditional media holdings.



    As possessors of the hottest "brands" commercial media companies often get premier locations from browser software makers, Internet service providers, search engines and portals.



    Having the financial resources at their disposition the big media firms are aggressive investors in start-up Internet media companies.



Commercial media companies have close and long ties to advertisers, which enables them to seize most of these revenues.

TEXTBLOCK 7/8 // URL: http://world-information.org/wio/infostructure/100437611795/100438659167
 
Commercial vs. Independent Content: Human and Financial Resources

Concerning their human and financial resources commercial media and independent content provider are an extremely unequal pair. While the 1998 revenues of the world's leading media conglomerates (AOL Time Warner, Disney, Bertelsmann, Viacom and the News Corporation) amounted to US$ 91,144,000,000 provider of independent content usually act on a non-profit basis and to a considerable extent depend on donations and contributions.

Also the human resources they have at their disposal quite differ. Viacom for example employs 112,000 people. Alternative media conversely are mostly run by a small group of activists, most of them volunteers. Moreover the majority of the commercial media giants has a multitude of subsidiaries (Bertelsmann for instance has operations in 53 countries), while independent content provider in some cases do not even have proper office spaces. Asked about their offices number of square meters Frank Guerrero from RTMark comments "We have no square meters at all, because we are only on the web. I guess if you add up all of our servers and computers we would take up about one or two square meters."

TEXTBLOCK 8/8 // URL: http://world-information.org/wio/infostructure/100437611734/100438659145
 
Mark

A mark (trademark or service mark) is "... a sign, or a combination of signs, capable of distinguishing the goods or services of one undertaking from those of other undertakings. The sign may particularly consist of one or more distinctive words, letters, numbers, drawings or pictures, emblems, colors or combinations of colors, or may be three-dimensional..." (WIPO) To be protected a mark must be registered in a government office whereby generally the duration is limited in time, but can be periodically (usually every 10 years) renewed.

INDEXCARD, 1/11
 
Invention

According to the WIPO an invention is a "... novel idea which permits in practice the solution of a specific problem in the field of technology." Concerning its protection by law the idea "... must be new in the sense that is has not already been published or publicly used; it must be non-obvious in the sense that it would not have occurred to any specialist in the particular industrial field, had such a specialist been asked to find a solution to the particular problem; and it must be capable of industrial application in the sense that it can be industrially manufactured or used." Protection can be obtained through a patent (granted by a government office) and typically is limited to 20 years.

INDEXCARD, 2/11
 
MIT

The MIT (Massachusetts Institute of Technology) is a privately controlled coeducational institution of higher learning famous for its scientific and technological training and research. It was chartered by the state of Massachusetts in 1861 and became a land-grant college in 1863. During the 1930s and 1940s the institute evolved from a well-regarded technical school into an internationally known center for scientific and technical research. In the days of the Great Depression, its faculty established prominent research centers in a number of fields, most notably analog computing (led by Vannevar Bush) and aeronautics (led by Charles Stark Draper). During World War II, MIT administered the Radiation Laboratory, which became the nation's leading center for radar research and development, as well as other military laboratories. After the war, MIT continued to maintain strong ties with military and corporate patrons, who supported basic and applied research in the physical sciences, computing, aerospace, and engineering. MIT has numerous research centers and laboratories. Among its facilities are a nuclear reactor, a computation center, geophysical and astrophysical observatories, a linear accelerator, a space research center, supersonic wind tunnels, an artificial intelligence laboratory, a center for cognitive science, and an international studies center. MIT's library system is extensive and includes a number of specialized libraries; there are also several museums.

INDEXCARD, 3/11
 
Intellectual property

Intellectual property, very generally, relates to the output that result from intellectual activity in the industrial, scientific, literary and artistic fields. Traditionally intellectual property is divided into two branches: 1) industrial property (inventions, marks, industrial designs, unfair competition and geographical indications), and 2) copyright. The protection of intellectual property is guaranteed through a variety of laws, which grant the creators of intellectual goods, and services certain time-limited rights to control the use made of their products.

INDEXCARD, 4/11
 
CIM

To perform manufacturing firm's functions related to design and production the CAD/CAM technology, for computer-aided design and computer-aided manufacturing, was developed. Today it is widely recognized that the scope of computer applications must extend beyond design and production to include the business functions of the firm. The name given to this more comprehensive use of computers is computer-integrated manufacturing (CIM).

INDEXCARD, 5/11
 
Expert system

Expert systems are advanced computer programs that mimic the knowledge and reasoning capabilities of an expert in a particular discipline. Their creators strive to clone the expertise of one or several human specialists to develop a tool that can be used by the layman to solve difficult or ambiguous problems. Expert systems differ from conventional computer programs as they combine facts with rules that state relations between the facts to achieve a crude form of reasoning analogous to artificial intelligence. The three main elements of expert systems are: (1) an interface which allows interaction between the system and the user, (2) a database (also called the knowledge base) which consists of axioms and rules, and (3) the inference engine, a computer program that executes the inference-making process. The disadvantage of rule-based expert systems is that they cannot handle unanticipated events, as every condition that may be encountered must be described by a rule. They also remain limited to narrow problem domains such as troubleshooting malfunctioning equipment or medical image interpretation, but still have the advantage of being much lower in costs compared with paying an expert or a team of specialists.

INDEXCARD, 6/11
 
Richard Barbrook and Andy Cameron, The Californian Ideology

According to Barbrook and Cameron there is an emerging global orthodoxy concerning the relation between society, technology and politics. In this paper they are calling this orthodoxy the Californian Ideology in honor of the state where it originated. By naturalizing and giving a technological proof to a political philosophy, and therefore foreclosing on alternative futures, the Californian ideologues are able to assert that social and political debates about the future have now become meaningless and - horror of horrors - unfashionable. - This paper argues for an interactive future.

http://www.wmin.ac.uk/media/HRC/ci/calif.html

INDEXCARD, 7/11
 
Gottfried Wilhelm von Leibniz

b. July 1, 1646, Leipzig
d. November 14, 1716, Hannover, Hanover

German philosopher, mathematician, and political adviser, important both as a metaphysician and as a logician and distinguished also for his independent invention of the differential and integral calculus. 1661, he entered the University of Leipzig as a law student; there he came into contact with the thought of men who had revolutionized science and philosophy--men such as Galileo, Francis Bacon, Thomas Hobbes, and René Descartes. In 1666 he wrote De Arte Combinatoria ("On the Art of Combination"), in which he formulated a model that is the theoretical ancestor of some modern computers.

INDEXCARD, 8/11
 
World Wide Web (WWW)

Probably the most significant Internet service, the World Wide Web is not the essence of the Internet, but a subset of it. It is constituted by documents that are linked together in a way you can switch from one document to another by simply clicking on the link connecting these documents. This is made possible by the Hypertext Mark-up Language (HTML), the authoring language used in creating World Wide Web-based documents. These so-called hypertexts can combine text documents, graphics, videos, sounds, and Java applets, so making multimedia content possible.

Especially on the World Wide Web, documents are often retrieved by entering keywords into so-called search engines, sets of programs that fetch documents from as many servers as possible and index the stored information. (For regularly updated lists of the 100 most popular words that people are entering into search engines, click here). No search engine can retrieve all information on the whole World Wide Web; every search engine covers just a small part of it.

Among other things that is the reason why the World Wide Web is not simply a very huge database, as is sometimes said, because it lacks consistency. There is virtually almost infinite storage capacity on the Internet, that is true, a capacity, which might become an almost everlasting too, a prospect, which is sometimes consoling, but threatening too.

According to the Internet domain survey of the Internet Software Consortium the number of Internet host computers is growing rapidly. In October 1969 the first two computers were connected; this number grows to 376.000 in January 1991 and 72,398.092 in January 2000.

World Wide Web History Project, http://www.webhistory.org/home.html

http://www.searchwords.com/
http://www.islandnet.com/deathnet/
http://www.salonmagazine.com/21st/feature/199...
INDEXCARD, 9/11
 
cryptology

also called "the study of code". It includes both, cryptography and cryptoanalysis

INDEXCARD, 10/11
 
Defense Advanced Research Project Agency (DARPA)

DARPA (Defense Advanced Research Projects Agency) is the independent research branch of the U.S. Department of Defense that, among its other accomplishments, funded a project that in time was to lead to the creation of the Internet. Originally called ARPA (the "D" was added to its name later), DARPA came into being in 1958 as a reaction to the success of Sputnik, Russia's first manned satellite. DARPA's explicit mission was (and still is) to think independently of the rest of the military and to respond quickly and innovatively to national defense challenges.

In the late 1960s, DARPA provided funds and oversight for a project aimed at interconnecting computers at four university research sites. By 1972, this initial network, now called the ARPAnet, had grown to 37 computers. ARPANet and the technologies that went into it, including the evolving Internet Protocol (IP) and the Transmission Control Protocol (TCP), led to the Internet that we know today.

http://www.darpa.mil

INDEXCARD, 11/11