Digital Commercial Content

Starting in the mid 1990s today most traditional media can also be found online. The overwhelming majority of bigger newspapers and periodicals, but also radio and TV stations now complement their classic media formats with digital programming. For the most part they transform existing analogue information in digital form, with some additional features.

Especially the big media conglomerates, having realized the economic potential of the Internet, have started to get into the business of digital content. Not surprisingly their engagement in the virtual sphere has not brought much new concerning their programming. They offer entertainment, music, sports and some news channels. One of the reasons for this development might be, that the big commercial media companies are able to re-use already existing programming from their other ventures. Examples are Viacom's MTV Network, which now has a twin online or Time Warner's CNN, which on the Web is called CNN Interactive. Considering business economic factors this move suggests itself as hardly any further resources are needed and the already existing programming can be put in the Internet at little extra cost. Also, regarding the undeniable success of their traditional content in terms of revenue generation the digital reproduction of their classic programming concept seems to be an obvious step.

TEXTBLOCK 1/3 // URL: http://world-information.org/wio/infostructure/100437611795/100438658958
 
The 19th Century: Machine-Assisted Manufacturing

Eli Whitney's proposal for a simplification and standardization of component parts marked a further milestone in the advance of the automation of work processes. In 1797 he suggested the manufacture of muskets with completely interchangeable parts. As opposed to the older method under which each gun was the individual product of a highly skilled gunsmith and each part hand-fitted, his method permitted large production runs of parts that were readily fitted to other parts without adjustment and could relatively easy be performed by machines.

By the middle of the 19th century the general concepts of division of labor, assembly of standardized parts and machine-assisted manufacture were well established. On both sides of the Atlantic large factories were in operation, which used specialized machines to improve costs, quality and quantity of their products.

TEXTBLOCK 2/3 // URL: http://world-information.org/wio/infostructure/100437611663/100438659364
 
Asymmetric or Public-Key-Cryptosystems

Here the keys for encryption and decryption differ. There needs to exist a private key, which is only known to the individual, and a public key, which is published. Every person has her or his own private key that is never published. It is used for decrypting only. Mathematically the different keys are linked to each other, still it is nearly impossible to derive the private key from the public one.
For sending a message to someone, one has to look up the other's public key and encrypt the message with it. The keyholder will use his/her private key to decrypt it. While everybody can send a message with the public key, the private key absolutely has to stay secret - and probably will.

"The best system is to use a simple, well understood algorithm which relies on the security of a key rather than the algorithm itself. This means if anybody steals a key, you could just roll another and they have to start all over." (Andrew Carol)

very famous examples for public-key systems are:

· RSA:
The RSA is probably one of the most popular public-key cryptosystems. With the help of RSA, messages can be encrypted, but also digital signatures are provided.
The mathematics behind are supposedly quite easy to understand (see: http://world.std.com/~franl/crypto/rsa-guts.html.

· PGP:
PGP is a public key encryption program. Most of all it is used for e-mail encryption.
It is supposed to be quite safe - until now.

· PGPi is simply the international variation of PGP.

for further information about the RSA and other key-systems visit the RSA homepage:
http://www.rsa.com/rsalabs/faq/
http://www.rsa.com/rsalabs/faq/questions.html
or:
http://www.pgpi.org

All of those tools, like hash functions, too, can help to enhance security and prevent crime.
They can theoretically, but sometimes they do not, as the example of the published credit card key of France in March 2000 showed.
For more information see:
http://news.voila.fr/news/fr.misc.cryptologie

Still, cryptography can help privacy.
On the other hand cryptography is only one element to assure safe transport of data. It is especially the persons using it who have to pay attention. A key that is told to others or a lost cryptographic key are the end of secrecy.

TEXTBLOCK 3/3 // URL: http://world-information.org/wio/infostructure/100437611776/100438659074
 
Comsat

The Communications Satellite Cooperation provides international communications solutions via the global, 17-satellite INTELSAT system and 4-satellite INMARSAT satellite systems. Calls are beamed up to the satellite and back down to Earth, where special gateway land earth stations re-route them through the appropriate local or international telephone network.

COMSAT operates Earth Stations in each part of the world to route calls efficiently within each ocean region. Earth Stations are located in Santa Paula, California; Southbury, Connecticut; Ankara, Turkey; and Kuantan, Malaysia.

http://www.comsat.com/default.htm

INDEXCARD, 1/2
 
Neural network

A bottom-up artificial intelligence approach, a neural network is a network of many very simple processors ("units" or "neurons"), each possibly having a (small amount of) local memory. The units are connected by unidirectional communication channels ("connections"), which carry numeric data. The units operate only on their local data and on the inputs they receive via the connections. A neural network is a processing device, either an algorithm, or actual hardware, whose design was inspired by the design and functioning of animal brains and components thereof. Most neural networks have some sort of "training" rule whereby the weights of connections are adjusted on the basis of presented patterns. In other words, neural networks "learn" from examples and exhibit some structural capability for generalization.

INDEXCARD, 2/2