Satyrs, Frankenstein, Machine Men, Cyborgs The idea of hybrid beings between man and non-human entities can be traced back to mythology: mythologies, European and non-European are populated with beings which are both human and non-human, and which, because of this non-humanness, have served as reference points in the human endeavour of understanding what it means to be human. Perhaps "being human" is not even a meaningful phrase without the possibility to identify ourselves also with the negation of humanness, that is, to be human through the very possibility of identification with the non-human. While in classical mythology, such being were usually between the man and animal kingdoms, or between the human and the divine, the advent of modern technology in the past two centuries has countered any such irrational representations of humanness. The very same supremacy of rationality which deposited the hybrid beings of mythology (and of religion) on the garbage heap of the modern period and which attempted a "pure" understanding of humanness, has also been responsible for the rapid advance of technology and which in turn prepared a "technical" understanding of the human. The only non-human world which remains beyond the animal and divine worlds is the world of technology. The very attempt of a purist definition of the human ran encountered difficulty; the theories of Darwin and Freud undermined the believe that there was something essentially human in human beings, something that could be defined without references to the non-human. Early representations of half man - half machine creatures echo the fear of the violent use of machinery, as in wars. Mary Shelley published What human minds have later dreamed up about - usually hostile - artificial beings has segmented in the literary genre of science fiction. Science fiction seems to have provided the "last" protected zone for the strong emotions and hard values which in standard fiction literature would relegate a story into the realm of kitsch. Violent battles, strong heroes, daring explorations, infinity and solitude, clashes of right and wrong and whatever else makes up the aesthetic repertoire of metaphysics has survived unscathed in science fiction. However, science fiction also seems to mark the final sequence of pure fiction: the In the Flesh Machine the |
|
Another Question of Security Even with the best techniques it is impossible to invent a cryptographic system that is absolutely safe/unbreakable. To decipher a text means to go through many, sometimes nearly - but never really - endless attempts. For the computers of today it might take hundreds of years or even more to go through all possibilities of codes, but still, finally the code stays breakable. The much faster quantum computers will proof that one day. Therefore the decision to elect a certain method of enciphering finally is a matter of trust. For the average user of computers it is rather difficult to understand or even realize the dangers and/or the technological background of electronic transmission of data. For the majority thinking about one's own necessities for encryption first of all means to trust others, the specialists, to rely on the information they provide. The websites explaining the problems behind (and also the articles and books concerning the topic) are written by experts of course as well, very often in their typical scientific language, merely understandable for laymen. The introductions and other superficial elements of those articles can be understood, whereas the real background appears as untouchable spheres of knowledge. The fact that dangers are hard to see through and the need for security measures appears as something most people know from media reports, leads directly to the problem of an underdeveloped democracy in the field of cryptography. Obviously the connection between cryptography and democracy is rather invisible for many people. Those mentioned media reports often specialize in talking about the work computer hackers do (sometimes being presented as criminals, sometimes as heroes) and the danger to lose control over the money drawn away from one's bank account, if someone steals the credit card number or other important financial data. The term "security", surely connected to those issues, is a completely different one from the one that is connected to privacy. It is especially the latter that touches the main elements of democracy. for the question of security see: |
|
Punch card, 1801 Invented by Joseph Marie Jacquard, an engineer and architect in Lyon, France, the punch cards laid the ground for automatic information processing. For the first time information was stored in binary format on perforated cardboard cards. In 1890 Hermann Hollerith used Joseph-Marie Jacquard's punch card technology for processing statistical data retrieved from the US census in 1890, thus speeding up data analysis from eight to three years. His application of Jacquard's invention was also used for programming computers and data processing until electronic data processing was introduced in the 1960's. - As with Paper tapes are a medium similar to Jacquard's punch cards. In 1857 Sir Charles Wheatstone applied them as a medium for the preparation, storage, and transmission of data for the first time. By their means, telegraph messages could be prepared off-line, sent ten times quicker (up to 400 words per minute), and stored. Later similar paper tapes were used for programming computers. |
|
Optical communication system by Aeneas Tacitus, 4th century B.C. Aeneas Tacitus, a Greek military scientist and cryptographer, invented an optical communication system that combines water and beacon telegraphy. Torches indicated the beginnings and the ends of message transmissions while water jars were used to transmit the messages. These jars had a plugged standard-size hole drilled on the bottom side and were filled with water. As those who sent and those who received the message unplugged the jars simultaneously, the water drained out. Because the transmitted messages corresponded to water levels, the sender indicated by torch signal that the appropriate water level has been reached. It is a disadvantage that the possible messages are restricted to a given code, but as this system was mainly used for military purposes, this was offset by the advantage that it was almost impossible for outsiders to understand these messages unless they possessed the codebook. With communication separated from transportation, the distant became near. Tacitus' telegraph system was very fast and not excelled until For further information see Joanne Chang & Anna Soellner, Decoding Device, |
|