Positions Towards the Future of Copyright in the "Digital Age"

With the development of new transmission, distribution and publishing technologies and the increasing digitalization of information copyright has become the subject of vigorous debate. Among the variety of attitudes towards the future of traditional copyright protection two main tendencies can be identified:

Eliminate Copyright

Anti-copyrightists believe that any intellectual property should be in the public domain and available for all to use. "Information wants to be free" and copyright restricts people's possibilities concerning the utilization of digital content. An enforced copyright will lead to a further digital divide as copyright creates unjust monopolies in the basic commodity of the "information age". Also the increased ease of copying effectively obviates copyright, which is a relict of the past and should be expunged.

Enlarge Copyright

Realizing the growing economic importance of intellectual property, especially the holders of copyright (in particular the big publishing, distribution and other core copyright industries) - and therefore recipients of the royalties - adhere to the idea of enlarging copyright. In their view the basic foundation of copyright - the response to the need to provide protection to authors so as to give them an incentive to invest the time and effort required to produce creative works - is also relevant in a digital environment.

TEXTBLOCK 1/12 // URL: http://world-information.org/wio/infostructure/100437611725/100438659711
 
Copyright Management and Control Systems: Pre-Infringement

Pre-infringement copyright management and control systems that inhibit or control infringement of intellectual property may be put into place by copyright owners before distributing their works. Examples are:

Contracts

Contracts are a pre-infringement control method, which very often is underestimated. Properly formed contracts enable copyright holders to restrict the use of their works in excess of the rights granted under copyright laws.

Copy Protection

This approach was standard in the 1980s, but rejected by consumers and relatively easy to break. Still copy protection, whereby the vendor limits the number of times a file can be copied, is used in certain situations.

Limited Functionality

This method allows copyright owners to provide a copy of the work, which is functionally limited. Software creators, for example, can distribute software that cannot print or save. A fully functional version has to be bought from the vendor.

Date Bombs

Here the intellectual property holder distributes a fully functional copy but locks off access at a pre-specified date or after a certain number of uses.

TEXTBLOCK 2/12 // URL: http://world-information.org/wio/infostructure/100437611725/100438659616
 
Recent "Digital Copyright" Legislation: U.S.

DMCA (Digital Millennium Copyright Act)

The debates in the House and Senate preceding the signing into law of the DMCA by U.S. President Clinton in October 1998 indicated that the principal object of the Act is to promote the U.S. economy by establishing an efficient Internet marketplace in copyrighted works. The DMCA implements the two 1996 WIPO treaties (WIPO Performances and Phonograms Treaty and WIPO Copyright Treaty) and addresses a variety of issues that arose with the increased availability of content in digital form. The Act 1) creates a series of "safe harbor" defenses (which are subject to a variety of conditions that must be met) for certain common activities of ISPs (Internet Service Provider), 2) bars the circumvention of technological protection measures that protect copyrighted works, 3) prohibits the distribution or provision of false copyright management information with the intent to induce or conceal infringement, 4) establishes an exemption for making a copy of a computer program for purposes of maintenance or repair, and 5) contains provisions concerning the "webcasting" of sound recordings on the Internet and the making of (digital) copies of copyrighted works by nonprofit libraries and archives.

A full-text version of the DMCA is available from:
The Library of Congress: Thomas (Legislative Information on the Internet): http://thomas.loc.gov/cgi-bin/cpquery/z?cp105:hr796:

Moreover the U.S. Copyright Office provides a memorandum, which briefly summarizes each of the five titles of the DMCA (pdf format): http://lcweb.loc.gov/copyright/legislation/dmca.pdf

The DMCA has been criticized for not clarifying the range of legal principles on the liability of ISPs and creating exceptions to only some of the provisions; therefore giving copyright owners even more rights.

Among the variety of comments on the DMCA are:

Lutzker, Arnold P.: Primer on the Digital Millennium: What the Digital Millennium Copyright Act and the Copyright Term Extension Act Mean for the Library Community. http://www.arl.org/info/frn/copy/primer.html

Lutzker & Lutzker law firm and the Association of Research Libraries: The Digital Millennium Copyright Act: Highlights of New Copyright Provision Establishing Limitation of Liability for Online Service Providers. http://www.arl.org/info/frn/copy/osp.html

TEXTBLOCK 3/12 // URL: http://world-information.org/wio/infostructure/100437611725/100438659614
 
Operating the net: overview

The Net consists of thousands of thousands of governmental and private networks linked together. No legal authority determines how and where networks can be connected together, this is something the managers of networks have to agree about. So there is no way of ever gaining ultimate control of the Internet. Although each of these networks is operated and controlled by an organization, no single organization operates and controls the Net. Instead of a central authority governing the Net, several bodies assure the operability of the Net by developing and setting technical specifications for the Net and by the control of the technical key functions of the Net as the coordination of the domain name system and the allocation of IP numbers.

Originally, the Net was a research project funded and maintained by the US Government and developed in collaboration by scientists and engineers. As the standards developed for ensuring operability ensued from technical functionality, technical coordination gradually grew out of necessity and was restricted to a minimum and performed by volunteers.

Later, in the 1980s, those occupied with the development of technical specifications organized themselves under the umbrella of the Internet Society in virtual organizations as the Internet Engineering Task Force, which were neither officially established nor being based on other structures than mailing lists and commitment, but nonetheless still serve as task forces for the development of standards ensuring the interoperability on the Net.

Since the late 80s and the early 90s, with the enormous growth of the Net - which was promoted by the invention of Local Area Networks, the creation of the World Wide Web, the increased use of personal computers and the connecting of corporations to the Net, just to name a few - coordination of some technical key functions as the domain name system was handed over to corporations as Network Solutions Inc.

Since the year 2000, a new model for technical coordination has been emerging: Formerly performed by several bodies, technical coordination is transferred to a single non-governmental organization: the Internet Coordination of Assigned Numbers and Names.

TEXTBLOCK 4/12 // URL: http://world-information.org/wio/infostructure/100437611791/100438659824
 
Think Tanks and Corporate Money

Looking at the financial situation of think tanks, different funding patterns can be found. While financial contributions from foundations play an important role especially for conservative think tanks, also contributions from governments are made to certain institutions. Yet one of the most important funding sources are corporate donors and individual contributors. Although the extent to which - in most cases conservative - think tanks rely on corporate funding varies, from the US$ 158 million spent by the top 20 conservative think tanks, more than half of it was contributed by corporations or businessmen.

TEXTBLOCK 5/12 // URL: http://world-information.org/wio/infostructure/100437611704/100438658207
 
History: European Tradition

Only in Roman times the first rights referring to artistic works appeared. Regulations resembling a lasting exclusive right to copy did not occur until the 17th century. Before copyright was a private arrangement between guilds able to reproduce copies in commercial quantities.

In France and Western European countries "droits d'auteur" or author's rights is the core of what in the Anglo-American tradition is called copyright. Such rights are rooted in the republican revolution of the late 18th century, and the Rights of Man movement. Today in the European system the creator is front and center; later exploiters are only secondary players.

France

During the 18th century France gradually lost the ability to restrict intellectual property. Before the Revolution, all books, printers and booksellers had to have a royal stamp of approval, called a "privilege". In return for their lucrative monopoly, the French guild of printers and booksellers helped the police to suppress anything that upset royal sensibilities or ran contrary to their interests. Still there were also a whole lot of underground printers who flooded the country with pirated, pornographic and seditious literature. And thousands of writers, most at the edge of starvation.

In 1777 the King threatened the monopoly by reducing the duration of publisher's privileges to the lifetime of the authors. Accordingly a writer's work would go into the public domain after his death and could be printed by anyone. The booksellers fought back by argumenting that, no authority could take their property from them and give it to someone else. Seven months later, in August 1789, the revolutionary government ended the privilege system and from that time on anyone could print anything. Early in 1790 Marie-Jean-Antoine-Nicolas de Caritat, Marquis de Condorcet proposed giving authors power over their own work lasting until ten years after their deaths. The proposal - the basis for France's first modern copyright law - passed in 1793.

TEXTBLOCK 6/12 // URL: http://world-information.org/wio/infostructure/100437611725/100438659414
 
Databody economy and the surveillance state

Databody economy Surveillance state
Promise Reality Promise Reality
universal prosperity universal commercialisation total security total control
frictionless market pacified society political harmony death of democracy


The glamour of the data body economy clouds economic practices which are much less than glamorous. Through the seizure of the data body, practices that in the real political arena were common in the feudal age and in the early industrial age are being reconstructed. The data body economy digitally reconstructs exploitative practices such as slavery and wage labour. However, culturally the data body is still a very new phenomenon: mostly, people think if it does not hurt, it cannot be my body. Exploitation of data bodies is painless and fast. Nevertheless, this can be expected to change once the awareness of the political nature of the data body becomes more widespread. As more and more people routinely move in digitised environments, it is to be expected that more critical questions will be asked and claims to autonomy, at present restricted to some artistic and civil society groups trying to get heard amidst the deafening noise of the commercial ICT propaganda, will be articulated on a more general level.

The more problematic aspect of this development may be something else: the practices of the data body economy, themselves a reconstruction of old techniques of seizure, have begun to re-colonise real political space. Simon Davis, Director of the London-based privacy campaigners Privacy International, one of the foremost critics of modern-day technologies of surveillance and data capturing, has warned against the dangers of a loss of autonomy and undermining of civic rights that are being generated when workplaces are clogged with digital equipment allowing the constant monitoring and surveillance of workers. Unless current trends towards data capturing remain unchecked, the workplace of the future will have many features of the sinister Victorian workhouses that appear Charles Dickens novels, where any claims for autonomy were silenced with references to economic efficiency, and the required discipline imposed by a hierarchy of punishments.

The constant adaptation process required from the modern individual has anonymised and structuralized punishment, which now appears in the guise of error messages and the privatisation of risk.

TEXTBLOCK 7/12 // URL: http://world-information.org/wio/infostructure/100437611761/100438659784
 
Recent "Digital Copyright" Legislation: European Union

Directive on Copyright and Related Rights in the Information Society

In November 1996 the European Commission adopted a communication concerning the follow-up to the Green Paper on copyright and related rights in the information society. The proposed Directive aims at transposing into Community law the main international obligations arising from the two treaties on copyright and related rights adopted within the framework of the WIPO in December 1996 (WIPO Performances and Phonogram Treaty and WIPO Copyright Treaty). It applies to provisions relating to:

- the legal protection of computer programs

- rental right, lending right and certain rights related to copyright in the field of intellectual property

- copyright and related rights applicable to broadcasting of programs by satellite and cable retransmission

- the term of protection of copyright and certain related rights

- the legal protection of databases

The proposal was first presented by the Commission in January 1998, amended in May 1999 and currently is at second reading before the Parliament. Final adoption of the Directive could take place at the end of 2000 or the beginning of 2001 respectively.

A full-text version for download (pdf file) of the amended proposal for a Directive on copyright and related rights in the Information Society is available on the website of the European Commission (DG Internal Market): http://www.europa.eu.int/comm/internal_market/en/intprop/intprop/docs/index.htm

General critique concerning the proposed EU Directive includes:

- Open networks
The new law could require (technological) surveillance of communications to ensure enforcement. Also because Service Providers might be legally liable for transmitting unauthorized copies, the might in turn have to deny access to anybody who could not provide them with financial guaranties or insurance.

- Interoperable systems
The draft could negate the already established right in EU law for software firms to make their systems interoperable with the dominant copyright protected systems. This would be a threat to the democratic and economic rights of users.

- Publicly available information
It is yet unclear whether new legal protections against the bypassing of conditional access technology apply only for content with an exclusive right. If the content is already in the public domain, then there can be no possible violation of copyright law just from gaining access to it.

Comments from the library, archives and documentation community on the amended Directive embrace:

The Library Association
http://www.la-hq.org.uk/directory/prof_issues/dcrris2.html

EBLIDA (European Bureau of Library, Information and Documentation Associations)
http://www.eblida.org/lobby/position/ampos2fi.htm

Society of Archivists (U.K.) and Public Record Office (U.K.)
http://www.pro.gov.uk/about/copyright/copyrightdraft.htm

EFPICC (European Fair Practices In Copyright Campaign) http://www.eblida.org/efpicc/comments.htm

TEXTBLOCK 8/12 // URL: http://world-information.org/wio/infostructure/100437611725/100438659610
 
Biometrics applications: privacy issues

All biometric technologies capture biometric data from individuals. Once these date have been captured by a system, they can, in principle, be forwarded to other locations and put to many different uses which are capable of compromising on an individuals privacy.

Technically it is easy to match biometric data with other personal data stored in government or corporate files, and to come a step closer to the counter-utopia of the transparent citizen and customer whose data body is under outside control.

While biometric technologies are often portrayed as protectors of personal data and safeguards against identity theft, they can thus contribute to an advance in "Big Brother" technology.

The combination of personalised data files with biometric data would amount to an enormous control potential. While nobody in government and industry would admit to such intentions, leading data systems companies such as EDS (Electronic Data Systems; http://www.eds.com) are also suppliers of biometric systems to the intelligence agencies of government and industry.

Biometric technologies have the function of identification. Historically, identification has been a prerequisite for the exercise of power and serves as a protection only to those who are in no conflict with this power. If the digitalisation of the body by biometric technologies becomes as widespread as its proponents hope, a new electronic feudal system could be emerging, in which people are reduced to subjects dispossessed of their to their bodies, even if these, unlike in the previous one, are data bodies. Unlike the gatekeepers of medieval towns, wear no uniforms by they might be identified; biometric technologies are pure masks.

TEXTBLOCK 9/12 // URL: http://world-information.org/wio/infostructure/100437611729/100438658826
 
Who owns the Internet and who is in charge?

The Internet/Matrix still depends heavily on public infrastructure and there is no dedicated owner of the whole Internet/Matrix, but the networks it consists of are run and owned by corporations and institutions. Access to the Internet is usually provided by Internet Service Providers (ISPs) for a monthly fee. Each network is owned by someone and has a network operation center from where it is centrally controlled, but the Internet/Matrix is not owned by any single authority and has no network operation center of its own. No legal authority determines how and where networks can be connected together, this is something the managers of networks have to agree about. So there is no way to ever gain ultimate control of the Matrix/Internet.
The in some respects decentralized Matrix/Internet architecture and administration do not imply that there are no authorities for oversight and common standards for sustaining basic operations, for administration: There are authorities for IP number and domain name registrations, e.g.
Ever since the organizational structures for Internet administration have changed according to the needs to be addressed. Up to now, administration of the Internet is a collaborative undertaking of several loose cooperative bodies with no strict hierarchy of authority. These bodies make decisions on common guidelines, as communication protocols, e.g., cooperatively, so that compatibility of software is guaranteed. But they have no binding legal authority, nor can they enforce the standards they have agreed upon, nor are they wholly representative for the community of Internet users. The Internet has no official governing body or organization; most parts are still administered by volunteers.
Amazingly, there seems to be an unspoken and uncodified consent of what is allowed and what is forbidden on the Internet that is widely accepted. Codifications, as the so-called Netiquette, are due to individual efforts and mostly just expressively stating the prevailing consent. Violations of accepted standards are fiercely rejected, as reactions to misbehavior in mailing lists and newsgroups prove daily.
Sometimes violations not already subject to law become part of governmental regulations, as it was the case with spamming, the unsolicited sending of advertising mail messages. But engineers proved to be quicker and developed software against spamming. So, in some respects, the Internet is self-regulating, indeed.
For a detailed report on Internet governance, click here.

TEXTBLOCK 10/12 // URL: http://world-information.org/wio/infostructure/100437611791/100438658447
 
Copyright Management and Control Systems: Metering

Metering systems allow copyright owners to ensure payment to or at the time of a consumer's use of the work. Those technologies include:

Hardware Devices

Those have to be acquired and installed by the user. For example under a debit card approach, the user purchases a debit card that is pre-loaded with a certain amount of value. After installation, the debit card is debited automatically as the user consumes copyrighted works.

Digital Certificates

Hereby a certification authority issues to a user an electronic file that identifies the user as the owner of a public key. Those digital certificates, besides information on the identity of the holder can also include rights associated with a particular person. Vendors can so control access system resources, including copyrighted files, by making them available only to users who can provide a digital certificate with specified rights (e.g. access, use, downloading).

Centralized Computing

Under this approach all of the executables remain at the server. Each time the executable is used, the user's computer must establish contact with the server, allowing the central computer to meter access.

Access Codes

Access code devices permit users to "unlock" protective mechanisms (e.g. date bombs or functional limitations) embedded in copyrighted works. Copyright owners can meter the usage of their works, either by unlocking the intellectual property for a one-time license fee or by requiring periodic procurement of access codes.

Copyright Clearinghouses

Under this approach copyright owners would commission "clearinghouses" with the ability to license the use of their works. A user would pay a license fee to obtain rights concerning the intellectual property.


TEXTBLOCK 11/12 // URL: http://world-information.org/wio/infostructure/100437611725/100438659615
 
Data bunkers

Personal data are collected, appropriated, processed and used for commercial purposes on a global scale. In order for such a global system to operate smoothly, there a server nodes at which the data streams converge. Among the foremost of these are the data bases of credit card companies, whose operation has long depended on global networking.

On top of credit card companies such as Visa, American Express, Master Card, and others. It would be erroneous to believe that the primary purpose of business of these companies is the provision of credit, and the facilitation of credit information for sale transactions. In fact, Information means much more than just credit information. In an advertisement of 1982, American Express described itself in these terms: ""Our product is information ...Information that charges airline tickets, hotel rooms, dining out, the newest fashions ...information that grows money funds buys and sells equities ...information that pays life insurance annuities ...information that schedules entertainment on cable television and electronically guards houses ...information that changes kroners into guilders and figures tax rates in Bermuda ..."

Information has become something like the gospel of the New Economy, a doctrine of salvation - the life blood of society, as Bill Gates expresses it. But behind information there are always data that need to be generated and collected. Because of the critical importance of data to the economy, their possession amounts to power and their loss can cause tremendous damage. The data industry therefore locates its data warehouses behind fortifications that bar physical or electronic access. Such structures are somewhat like a digital reconstruction of the medieval fortress

Large amounts of data are concentrated in fortress-like structures, in data bunkers. As the Critical Art Ensemble argue in Electronic Civil Disobedience: "The bunker is the foundation of homogeneity, and allows only a singular action within a given situation." All activities within data bunker revolve around the same principle of calculation. Calculation is the predominant mode of thinking in data-driven societies, and it reaches its greatest density inside data bunkers. However, calculation is not a politically neutral activity, as it provides the rational basis - and therefore the formal legitimisation most every decision taken. Data bunkers therefore have an essentially conservative political function, and function to maintain and strengthen the given social structures.

TEXTBLOCK 12/12 // URL: http://world-information.org/wio/infostructure/100437611761/100438659754
 
Braille

Universally accepted system of writing used by and for blind persons and consisting of a code of 63 characters, each made up of one to six raised dots arranged in a six-position matrix or cell. These Braille characters are embossed in lines on paper and read by passing the fingers lightly over the manuscript. Louis Braille, who was blinded at the age of three, invented the system in 1824 while a student at the Institution Nationale des Jeunes Aveugles (National Institute for Blind Children), Paris.

INDEXCARD, 1/18
 
Louis Braille

b. Jan. 4, 1809, Coupvray, near Paris, France
d. Jan. 6, 1852, Paris, France

Educator who developed a system of printing and writing that is extensively used by the blind and that was named for him. Himself blind Braille became interested in a system of writing, exhibited at the school by Charles Barbier, in which a message coded in dots was embossed on cardboard. When he was 15, he worked out an adaptation, written with a simple instrument, that met the needs of the sightless. He later took this system, which consists of a six-dot code in various combinations, and adapted it to musical notation. He published treatises on his type system in 1829 and 1837.

INDEXCARD, 2/18
 
Boris Yeltsin

Boris Yeltsin was Russian President until the end of 1999. After many years of work for the Communist Party, he joined the Politburo in 1986. His sharp critique on Mikhail Gorbachev forced that one to resign. Yeltsin won the 1990 election into Russian presidency and quit the Communist Party. Quarrels with the Parliament could not destroy his popularity until the secession war with Chechnya. When the Russian economy collapsed in 1998, he dismissed his entire government. In the end the sick old man of Russian politics had lost all his popularity as a president and resigned for the benefit of his political son Vladimir Putin.

INDEXCARD, 3/18
 
Expert system

Expert systems are advanced computer programs that mimic the knowledge and reasoning capabilities of an expert in a particular discipline. Their creators strive to clone the expertise of one or several human specialists to develop a tool that can be used by the layman to solve difficult or ambiguous problems. Expert systems differ from conventional computer programs as they combine facts with rules that state relations between the facts to achieve a crude form of reasoning analogous to artificial intelligence. The three main elements of expert systems are: (1) an interface which allows interaction between the system and the user, (2) a database (also called the knowledge base) which consists of axioms and rules, and (3) the inference engine, a computer program that executes the inference-making process. The disadvantage of rule-based expert systems is that they cannot handle unanticipated events, as every condition that may be encountered must be described by a rule. They also remain limited to narrow problem domains such as troubleshooting malfunctioning equipment or medical image interpretation, but still have the advantage of being much lower in costs compared with paying an expert or a team of specialists.

INDEXCARD, 4/18
 
Intellectual property

Intellectual property, very generally, relates to the output that result from intellectual activity in the industrial, scientific, literary and artistic fields. Traditionally intellectual property is divided into two branches: 1) industrial property (inventions, marks, industrial designs, unfair competition and geographical indications), and 2) copyright. The protection of intellectual property is guaranteed through a variety of laws, which grant the creators of intellectual goods, and services certain time-limited rights to control the use made of their products.

INDEXCARD, 5/18
 
Technological measures

As laid down in the proposed EU Directive on copyright and related rights in the information society technological measures mean "... any technology, device, or component that, in the normal course of its operations, is designed to prevent or inhibit the infringement of any copyright..." The U.S. DMCA (Digital Millennium Copyright Act) divides technological measures in two categories: 1) measures that prevent unauthorized access to a copyrighted work, and 2) measures that prevent unauthorized copying of a copyrighted work. Also the making or selling of devices or services that can be used to circumvent either category of technological measures is prohibited under certain circumstances in the DMCA. Furthermore the 1996 WIPO Copyright Treaty states that the "... contracting parties shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors..."

INDEXCARD, 6/18
 
Copyright management information

Copyright management information refers to information which identifies a work, the author of a work, the owner of any right in a work, or information about the terms and conditions of the use of a work, and any numbers or codes that represent such information, when any of these items of information are attached to a copy of a work or appear in connection with the communication of a work to the public.

INDEXCARD, 7/18
 
Newsgroups

Newsgroups are on-line discussion groups on the Usenet. Over 20,000 newsgroups exist, organized by subject into hierarchies. Each subject hierarchy is further broken down into subcategories. Covering an incredible wide area of interests and used intensively every day, they are an important part of the Internet.

For more information, click here ( http://www.terena.nl/libr/gnrt/group/usenet.html ).

http://www.terena.nl/libr/gnrt/group/usenet.h...
INDEXCARD, 8/18
 
RSA

The best known of the two-key cryptosystems developed in the mid-1980s is the Rivest-Shamir-Adleman (RSA) cryptoalgorithm, which was first published in April, 1977. Since that time, the algorithm has been employed in the most widely-used Internet electronic communications encryption program, Pretty Good Privacy (PGP). It is also employed in both the Netscape Navigator and Microsoft Explorer web browsing programs in their implementations of the Secure Sockets Layer (SSL), and by Mastercard and VISA in the Secure Electronic Transactions (SET) protocol for credit card transactions.

INDEXCARD, 9/18
 
Core copyright industries

Those encompass the industries that create copyrighted works as their primary product. These industries include the motion picture industry (television, theatrical, and home video), the recording industry (records, tapes and CDs), the music publishing industry, the book, journal and newspaper publishing industry, and the computer software industry (including data processing, business applications and interactive entertainment software on all platforms), legitimate theater, advertising, and the radio, television and cable broadcasting industries.

INDEXCARD, 10/18
 
Local Area Network (LAN)

A Local Area Network is an office network, a network restricted to a building area.

INDEXCARD, 11/18
 
World Wide Web (WWW)

Probably the most significant Internet service, the World Wide Web is not the essence of the Internet, but a subset of it. It is constituted by documents that are linked together in a way you can switch from one document to another by simply clicking on the link connecting these documents. This is made possible by the Hypertext Mark-up Language (HTML), the authoring language used in creating World Wide Web-based documents. These so-called hypertexts can combine text documents, graphics, videos, sounds, and Java applets, so making multimedia content possible.

Especially on the World Wide Web, documents are often retrieved by entering keywords into so-called search engines, sets of programs that fetch documents from as many servers as possible and index the stored information. (For regularly updated lists of the 100 most popular words that people are entering into search engines, click here). No search engine can retrieve all information on the whole World Wide Web; every search engine covers just a small part of it.

Among other things that is the reason why the World Wide Web is not simply a very huge database, as is sometimes said, because it lacks consistency. There is virtually almost infinite storage capacity on the Internet, that is true, a capacity, which might become an almost everlasting too, a prospect, which is sometimes consoling, but threatening too.

According to the Internet domain survey of the Internet Software Consortium the number of Internet host computers is growing rapidly. In October 1969 the first two computers were connected; this number grows to 376.000 in January 1991 and 72,398.092 in January 2000.

World Wide Web History Project, http://www.webhistory.org/home.html

http://www.searchwords.com/
http://www.islandnet.com/deathnet/
http://www.salonmagazine.com/21st/feature/199...
INDEXCARD, 12/18
 
Electronic Messaging (E-Mail)

Electronic messages are transmitted and received by computers through a network. By E-Mail texts, images, sounds and videos can be sent to single users or simultaneously to a group of users. Now texts can be sent and read without having them printed.

E-Mail is one of the most popular and important services on the Internet.

INDEXCARD, 13/18
 
IIPA

The International Intellectual Property Alliance formed in 1984 is a private sector coalition and represents the U.S. copyright-based industries. It is comprised of seven trade associations: Association of American Publishers, AFMA, Business Software Alliance, Interactive Digital Software Association, Motion Picture Association of America, National Music Publishers' Association and Recording Industry Association of America. IIPA and its member's track copyright legislative and enforcement developments in over 80 countries and aim at a legal and enforcement regime for copyright that deters piracy. On a national level IIPA cooperates with the U.S. Trade Representative and on the multilateral level has been involved in the development of the TRIPS (Trade-Related Aspects of Intellectual Property Rights) agreement of the WTO (World Trade Organization) and also participates in the copyright discussion of the WIPO (World Intellectual Property Organization).

INDEXCARD, 14/18
 
Java Applets

Java applets are small programs that can be sent along with a Web page to a user. Java applets can perform interactive animations, immediate calculations, or other simple tasks without having to send a user request back to the server. They are written in Java, a platform-independent computer language, which was invented by Sun Microsystems, Inc.

Source: Whatis.com

INDEXCARD, 15/18
 
Electronic Data Interchange (EDI)

EDI is an international standard relating to the exchange of trade goods and services. It enables trading partners to conduct routine business transactions, such as purchase orders, invoices and shipping notices independent of the computer platform used by the trading partners. Standardization by EDI translation software assures the correct interpretation of data.

EDI might become increasingly important to electronic commerce.

INDEXCARD, 16/18
 
Mass production

The term mass production refers to the application of the principles of specialization, division of labor, and standardization of parts to the manufacture of goods. The use of modern methods of mass production has brought such improvements in the cost, quality, quantity, and variety of goods available that the largest global population in history is now sustained at the highest general standard of living. A moving conveyor belt installed in a Dearborn, Michigan, automobile plant in 1913 cut the time required to produce flywheel magnetos from 18 minutes to 5 and was the first instance of the use of modern integrated mass production techniques.

INDEXCARD, 17/18
 
Royalties

Royalties refer to the payment made to the owners of certain types of rights by those who are permitted by the owners to exercise the rights. The rights concerned are literary, musical, and artistic copyright and patent rights in inventions and designs (as well as rights in mineral deposits, including oil and natural gas). The term originated from the fact that in Great Britain for centuries gold and silver mines were the property of the crown and such "royal" metals could be mined only if a payment ("royalty") were made to the crown.

INDEXCARD, 18/18