|
Commercial vs. Independent Content: Power and Scope Regarding the dimension of their financial and human resources commercial media companies are at any rate much more powerful players than their independent counterparts. Still those reply with an extreme multiplicity and diversity. Today thousands of newsgroups, mailing-list and e-zines covering a wide range of issues from the environment to politics, social and human rights, culture, art and democracy are run by alternative groups. Moreover independent content provider have started to use digital media for communication, information and co-ordination long before they were discovered by corporate interest. They regularly use the Internet and other networks to further public discourse and put up civic resistance. And in many cases are very successful with their work, as initiatives like widerst@ndMUND's (AT) co-ordination of the critics of the participation of the Freedom Party in the Austrian government via mailing-lists, an online-magazine and discussion forums, show. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
The Piracy "Industry" Until recent years, the problem of piracy (the unauthorized reproduction or distribution of copyrighted works (for commercial purposes)) was largely confined to the copying and physical distribution of tapes, disks and CDs. Yet the emergence and increased use of global data networks and the WWW has added a new dimension to the piracy of This new development, often referred to as Internet piracy, broadly relates to the use of global data networks to 1) transmit and download digitized copies of pirated works, 2) advertise and market pirated intellectual property that is delivered on physical media through the mails or other traditional means, and 3) offer and transmit codes or other technologies which can be used to circumvent Lately the Table: IIPA 1998 - 1999 Estimated Trade Loss due to Copyright Piracy (in millions of US$)
| |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Timeline 1900-1970 AD 1913 the wheel cipher gets re-invented as a strip 1917 - an AT&T-employee, Gilbert S. Vernam, invents a polyalphabetic cipher machine that works with random-keys 1918 the Germans start using the ADFGVX-system, that later gets later by the French Georges Painvin - Arthur Scherbius patents a ciphering machine and tries to sell it to the German Military, but is rejected 1919 Hugo Alexander Koch invents a rotor cipher machine 1921 the Hebern Electric Code, a company producing electro-mechanical cipher machines, is founded 1923 Arthur Scherbius founds an enterprise to construct and finally sell his late 1920's/30's more and more it is criminals who use cryptology for their purposes (e.g. for smuggling). Elizabeth Smith Friedman deciphers the codes of rum-smugglers during prohibition regularly 1929 Lester S. Hill publishes his book Cryptography in an Algebraic Alphabet, which contains enciphered parts 1933-1945 the Germans make the Enigma machine its cryptographic main-tool, which is broken by the Poles Marian Rejewski, Gordon Welchman and Alan Turing's team at Bletchley Park in England in 1939 1937 the Japanese invent their so called Purple machine with the help of Herbert O. Yardley. The machine works with telephone stepping relays. It is broken by a team of 1930's the Sigaba machine is invented in the USA, either by W.F. Friedman or his colleague Frank Rowlett - at the same time the British develop the Typex machine, similar to the German Enigma machine 1943 Colossus, a code breaking computer is put into action at Bletchley Park 1943-1980 the cryptographic Venona Project, done by the NSA, is taking place for a longer period than any other program of that type 1948 Shannon, one of the first modern cryptographers bringing mathematics into cryptography, publishes his book A Communications Theory of Secrecy Systems 1960's the Communications-Electronics Security Group (= CESG) is founded as a section of Government Communications Headquarters (= GCHQ) late 1960's the IBM Watson Research Lab develops the Lucifer cipher 1969 James Ellis develops a system of separate public-keys and private-keys | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Beautiful bodies However, artificial beings need not be invisible or look like Arnold Schwarzenegger in "Terminator". "My dream would be to create an artificial man that does not look like a robot but like a beautiful, graceful human being. The artificial man should be beautiful". While in Hindu mythology, | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Znet ZNet provides forum facilities for online discussion and chatting on various topics ranging from culture and ecology to international relations and economics. ZNet also publishes daily commentaries and maintains a Web-zine, which addresses current news and events as well as many other topics, trying to be provocative, informative and inspiring to its readers. Strategies and Policies Daily Commentaries: Znet's commentaries address current news and events, cultural happenings, and organizing efforts, providing context, critique, vision, and analysis, but also references to or reviews of broader ideas, new books, activism, the Internet, and other topics that strike the diverse participating authors as worthy of attention. Forum System: Znet provides a private (and soon also a public) forum system. The fora are among others concerned with topics such as: activism, cultural, community/race/religion/ethnicity, ecology, economics/class, gender/kinship/sexuality, government/polity, international relations, ParEcon, vision/strategy and popular culture. Each forum has a set of threaded discussions, also the fora hosted by commentary writers like Chomsky, Ehrenreich, Cagan, Peters and Wise. ZNet Daily WebZine: ZNet Daily WebZine offers commentaries in web format. Z Education Online (planned): The Z Education Online site will provide instructionals and courses of diverse types as well as other university-like, education-aimed features. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Operating system An operating system is software that controls the many different operations of a computer and directs and coordinates its processing of programs. It is a remarkably complex set of instructions that schedules the series of jobs (user applications) to be performed by the computer and allocates them to the computer's various hardware systems, such as the | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
International Cable Protection Committee (ICPC) The ICPC aims at reducing the number of incidents of damages to submarine telecommunications cables by hazards. The Committee also serves as a forum for the exchange of technical and legal information pertaining to submarine cable protection methods and programs and funds projects and programs, which are beneficial for the protection of submarine cables. Membership is restricted to authorities (governmental administrations or commercial companies) owning or operating submarine telecommunications cables. As of May 1999, 67 members representing 38 nations were members. http://www.iscpc.org | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
International Standardization Organization ISO (International Organization for Standardization), founded in 1946, is a worldwide federation of national standards bodies from some 100 countries, one from each country. Among the standards it fosters is Source: Whatis.com | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
The Spot | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Vladimir Putin Vladimir Putin is Russian President, | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Fuzzy logic A superset of Boolean logic ( | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
Virtual Marylin Monroe This is the story of the virtual Marylyn Monroe created by MRALab in Switzerland. The biography features her personal and professional stories. This being the biography of a virtual being, it does not end with the present and includes, instead, a chapter on her destiny. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
plaintext the original, legible text | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
cryptoanalysis the study of breaking others' codes to transform a message back into a legible form without knowing the key from the beginning | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||
|
codes an algorithm for bringing a legible message into an illegible form. There has to exist some sort of code book to encode/decode it. | |||||||||||||||||||||||||||||||||||
|
| |||||||||||||||||||||||||||||||||||