Censorship and Free Speech There is no society - in the past or in the present - free of censorship, the enforced restriction of speech. It is not restricted to authoritarian regimes. Democratic societies too aim at the control of the publication and distribution of information in order to prevent unwanted expressions. In every society some expressions, ideas or opinions are feared. Censored are books, magazines, films and videos, and computer games, e.g. In defence of its monopoly of truth, the Catholic Church published a blacklist of books not allowed to be read: the Index librorum prohibitorum. As indicated by the fact that every declaration of human rights - including the United Nations' Declaration of Human Rights and the To a high degree the Protestant Reformation was made possible by the invention of the printing press. Now those who were capable of writing and reading no longer needed to rely on the priests to know what is written in the Bible. They could compare the Bible with the sermons of the priests. This may be one of the reasons why especially in countries with a strong Protestant or otherwise anti-catholic tradition (with the exception of Germany), free speech is held in such high esteem. There seems to be no alternative: free speech without restriction or censorship. But censorship is not the only kind of restriction of speech. Speech codes as politically correct speech are restrictions, sometimes similar to censorship; copyright, accessibility and affordability of means of communication are other ones. Because of such restrictions different to censorship, we cannot think coherently about free speech independently of issues about social justice. Many campaigns for free speech, the right of free expression are backed by the concept of free speech as unconstrained speech. That is perfectly well understood under the auspices of regimes prominently, which try to silence their critics and restrict access to their publications. But the concept of free speech should not solely focus on such constrains. Thinking of free speech as unconstrained speech, we tend to forget to take into account - to campaign against - these other restrictions. Additionally, free expression understood in that way offers no clue how to practice this freedom of expression and what free speech is good for. In liberal democratic societies censorship is not justified by recurring to absolute truth. Its necessity is argued by referring to personal integrity. Some kind of expression might do harm to individuals, especially to children, by traumatize them or by disintegrating personal morality. Some published information, such as the names of rape victims, might infringe some people's right on privacy or some, as others say, such as pornographic images or literature, e.g., infringes some people's right on equality (how?). For more information on the history of censorship see |
|
Late 1970s - Present: Fourth Generation Computers Following the invention of the first Also, ensuing the introduction of the minicomputer in the mid 1970s by the early 1980s a market for personal computers (PC) was established. As computers had become easier to use and cheaper they were no longer mainly utilized in offices and manufacturing, but also by the average consumer. Therefore the number of personal computers in use more than doubled from 2 million in 1981 to 5.5 million in 1982. Ten years later, 65 million PCs were being used. Further developments included the creation of mobile computers (laptops and palmtops) and especially networking technology. While mainframes shared time with many terminals for many applications, networking allowed individual computers to form electronic co-operations. |
|
Biotechnology: robotics and artificial intelligence |
|
Advertising and the Media System Media systems (especially broadcasting) can be classified in two different types: Public Media Systems: Government control over broadcasting through ownership, regulation, and partial funding of public broadcasting services. Private Media System: Ownership and control lies in the hands of private companies and shareholders. Both systems can exist in various forms, according to the degree of control by governments and private companies, with mixed systems (public and private) as the third main kind. Whereas public media systems are usually at least partially funded by governments, private broadcasting solely relies on advertising revenue. Still also public media systems cannot exclude advertising as a source of revenue. Therefore both types are to a certain degree dependent on money coming in by advertisers. And this implies consequences on the content provided by the media. As the attraction of advertisers becomes critically important, interests of the advertising industry frequently play a dominant role concerning the structure of content and the creation of environments favorable for advertising goods and services within the media becomes more and more common. |
|
Content Choice and Selective Reporting Media as today's main information sources unarguably have the power to influence political agenda-setting and public opinion. They decide which topics and issues are covered and how they are reported. Still, in many cases those decisions are not primarily determined by journalistic criteria, but affected by external factors. The importance of shareholders forces media to generate more profit every quarter, which can chiefly be raised by enlarging audiences and hence attracting more advertising money. Therefore the focus of media's programming in many cases shifts towards audience alluring content like entertainment, talk-shows, music and sports. Further pressure regarding the selection of content occurs from advertisers and marketers, who often implicitly or explicitly suggest to refrain from programming which could show them or their products and services (e.g. tobacco) in an unfavorable light. Interlocking directorships and outright ownerships can moreover be responsible for a selective coverage. Financial connections with defense, banking, insurance, gas, oil, and nuclear power, repeatedly lead (commercial) media to the withholding of information, which could offend their corporate partners. In totalitarian regimes also pressure from political elites may be a reason for the suppression or alteration of certain facts. |
|
Convergence The convergence of biology and technology is not an entirely new phenomenon but and has its origin in the concept of modern technology itself. This concept understands technology as something bigger, stronger, and more reliable than ourselves. But, unlike human beings, technologies are always tied to specific men-defined purposes. In so far as men define purposes and build the technology to achieve those purposes, technology is smaller than ourselves. The understanding of technology as a man-controlled tool has been called the instrumental and anthropological understanding of technology. However, this understanding is becoming insufficient when technologies become fast and interdependent, i.e. when fast technologies form systems and global networks. Powerful modern technologies, especially in the field of informatics, have long ceased to be mere instruments and have created constraints for human action which act to predetermine activity and predefine purposes. As a consequence, the metaphysical distinction between subject and object has become blurred. In the 1950s Heidegger already speaks of modern technology not as the negation but as the culmination of metaphysical thought which provokes men to "overcome" metaphysics. The weakening of metaphysical determinations which occurs in the project of modern technology has also meant that it become impossible to clearly define what being human is, and to determine the line that separates non-human from human being. These changes are not progressing at a controllable rate, but they are undergoing constant acceleration. The very efficiency and power of calculation of modern technologies means that acceleration itself is being accelerated. Every new technological development produces new shortcuts in socio-technical systems and in communication. |
|
Pressures and Attacks against Independent Content Providers: Pakistan The Pakistan Telecommunication Authority (PTA), the licensing authority for electronic services, has imposed a number of restrictions of the use of the Internet. Licenses to ISPs (Internet Service Provider) will be issued under the terms of the highly restrictive Telephone and Telegraph Act of 1885. Under the terms of the agreement, users are prohibited from using any sort of data encryption and have to agree that their electronic communications may be monitored by government agencies. Transmission or reception of obscene or objectionable material is also prohibited and may lead not only to immediate disconnection of service but also to prosecution by authorities. Users of electronic services will also have to submit to service provider's copies of the National Identity Card. According to the terms of issuance of licenses, service providers will also be responsible for ensuring that the programs and information provided through electronic services do not "come into direct clash with accepted standards of morality and social values in Pakistan." |
|
Economic structure; digital euphoria The dream of a conflict-free capitalism appeals to a diverse audience. No politician can win elections without eulogising the benefits of the information society and promising universal wealth through informatisation. "Europe must not lose track and should be able to make the step into the new knowledge and information society in the 21st century", said Tony Blair. The US government has declared the construction of a fast information infrastructure network the centerpiece of its economic policies In Lisbon the EU heads of state agreed to accelerate the informatisation of the European economies The German Chancellor Schröder has requested the industry to create 20,000 new informatics jobs. The World Bank understands information as the principal tool for third world development Electronic classrooms and on-line learning schemes are seen as the ultimate advance in education by politicians and industry leaders alike. But in the informatised economies, traditional exploitative practices are obscured by the glamour of new technologies. And the nearly universal acceptance of the ICT message has prepared the ground for a revival of 19th century "adapt-or-perish" ideology. "There is nothing more relentlessly ideological than the apparently anti-ideological rhetoric of information technology" (Arthur and Marilouise Kroker, media theorists) |
|
some essential definitions some essential definitions in the field of cryptography are: - - - "Few false ideas have more firmly gripped the minds of so many intelligent men than the one that, if they just tried, they could invent a cipher that no one could break." (David Kahn) The variants of encryption systems are endless. For deciphering there exists always the same game of trial and error (first guessing the encryption method, then the code). A help to do so is pruning. Once, after a more or less long or short period a code/cipher breaks. Monoalphabetic ciphers can be broken easily and of course are no longer used today but for games. for further information on codes and ciphers etc. see: |
|
ZaMir.net ZaMir.net started in 1992 trying to enable anti-war and human rights groups of former Yugoslavia to communicate with each other and co-ordinate their activities. Today there are an estimated 1,700 users in 5 different Bulletin Board Systems (Zagreb, Belgrade, Ljubljana, Sarajevo and Pristiana). Za-mir Transnational Network (ZTN) offers e-mail and conferences/newsgroups. The ZTN has its own conferences, which are exchanged between the 5 BBS, and additionally offers more than 150 international conferences. ZTN aim is to help set up systems in other cities in the post-Yugoslav countries that have difficulty connecting to the rest of the world. History With the war in Yugoslavia anti-war and human rights groups of former Yugoslavia found it very difficult to organize and met huge problems to co-ordinate their activities due to immense communication difficulties. So in 1992 foreign peace groups together with Institutions in Ljubljana, Zagreb and Belgrade launched the Communications Aid project. Modems were distributed to peace and anti-war groups in Ljubljana, Zagreb, Belgrade and Sarajevo and a BBS (Bulletin Board System) installed. As after spring 1992 no directs connections could be made they were done indirectly through Austria, Germany or Britain, which also enabled a connection with the worldwide networks of BBS's. Nationalist dictators therefore lost their power to prevent communication of their people. BBS were installed in Zagreb and Belgrade and connected to the APC Network and associated networks. Za-mir Transnational Network (ZTN) was born. Strategies and Policies With the help of ZaMir's e-mail network it have been possible to find and coordinate humanitarian aid for some of the many refugees of the war. It has become an important means of communication for humanitarian organizations working in the war region and sister organizations form other countries. It helps co-ordinate work of activists form different countries of former Yugoslavia, and it also helps to coordinate the search for volunteers to aid in war reconstruction. ZTN also helped facilitate exchange of information undistorted by government propaganda between Croatia, Serbia and Bosnia. Independent magazines like Arkzin (Croatia) and Vreme (Serbia) now publish electronic editions on ZTN. |
|
Eliminating online censorship: Freenet, Free Haven and Publius Protecting speech on the global data networks attracts an increasing attention. The efforts and the corresponding abilities of governmental authorities, corporations and copyright enforcement agencies are countered by similar efforts and abilities of researchers and engineers to provide means for anonymous and uncensored communication, as Freenet, Free Haven and Publius. All three of them show a similar design. Content is split up and spread on several servers. When a file is requested, the pieces are reassembled. This design makes it difficult to censor content. All of these systems are not commercial products. The most advanced system seems to be Publius. Because of being designed by researchers and engineers at the prestigious For more information on Publius, see John Schwartz, Online and Unidentifiable? in: The Washington Post, June 30, 2000, Freenet web site: Free Haven web site: Publius web site: |
|
RTMark RTMark is a group of culture jammers applying a brokerage-system that benefits from "limited liability" like any other corporation. Using this principle, RTMark supports the sabotage (informative alternation) of corporate products, from dolls and children's learning tools to electronic action games, by channeling funds from investors to workers. RTMark searches for solutions that go beyond public relations and defines its "bottom line" in improving culture. It seeks cultural and not financial profit. Strategies and Policies RTMark is engaged in a whole lot of projects, which are designed to lead to a positive social change. Projects with roughly similar intent, risk, or likelihood of accomplishment are grouped into "fund families", like for example "The Frontier Fund". This fund is dedicated to challenge naive, utopic visions of the "global village", focusing on the implications of allowing corporations and other multinational interests to operate free of social context. RTMark pursues its projects through donations by individuals, which can invest in a certain fund, whereby an exact specification of how the donated money should be used can be made. RTMark has repeatedly gained attention through its projects, especially with its spoof websites, like the ones of Rudy Giuliani and the WTO, or its campaign against eToys, which prevents the Internet art group etoy from using the domain etoy.com. |
|
The Cassini Case In 1997 NASA's Cassini mission to Saturn and its moons led to heated controversies, because it was fueled by plutonium, a substance that could cause serious environmental and health problems if it were released into the atmosphere. Still no major U.S. news outlet in broadcasting or print reported in depth on the risks of the Cassini mission. Westinghouse-owned media like CBS and NBC (also partly owned by General Electric) for example had only reported that children were invited to sign a plaque inside Cassini. Not surprisingly Westinghouse and General Electric are two of the largest corporations with defense contracts and nuclear interests. |
|
Advertising Advertising as referred to in most economic books is part of the marketing mix. Therefore advertising usually is closely associated with the aim of selling products and services. Still, developments like "branding" show a tendency towards the marketing of not only products and services, but of ideas and values. While advertising activities are also pursued by political parties, politicians and governmental as well as non-governmental organizations, most of the money flowing into the advertising industry comes from corporations. Although these clients come from such diverse fields, their intentions hardly differ. Attempting to influence the public, their main goal is to sell: Products, services, ideas, values and (political) ideology. |
|
Beautiful bodies However, artificial beings need not be invisible or look like Arnold Schwarzenegger in "Terminator". "My dream would be to create an artificial man that does not look like a robot but like a beautiful, graceful human being. The artificial man should be beautiful". While in Hindu mythology, |
|
Institute for Global Communications (IGC) IGC's vision is to actively promote change toward a healthy society, which is founded on the principals of social justice, broadly shared economic opportunity, a robust democratic process, and sustainable environmental practices. IGC believes that healthy societies rely fundamentally on respect for individual rights, the vitality of communities and diversity. IGC's aim is to advance the work of progressive organizations and individuals for peace justice economic opportunity, human rights, democracy and environmental sustainability through strategic use of online technologies. History In 1987 the Institute for Global Communications was officially formed to manage PeaceNet and the newly acquired EcoNet, which was the world's first computer network dedicated to environmental preservation and sustainability. In 1988 IGC began to collaborate with like-minded organizations outside the states and in partnership with six international organizations, IGC co-founded the Association of Progressive Communications (APC). ConflictNet, incorporated by IGC in 1989, to provide information and communications for people by promoting the constructive resolution of conflicts is now enfolded in the PeaceNet network. LaborNet, a full network of IGC from 1992 through August 1999, serves the labor community by working for the human rights and economic justice of workers. WomensNet, launched in 1995 is an online community of individuals and organizations who use computer technology to advance the interests of women worldwide. Also the Anti-racism.Net forms part of IGC network family. Strategies and Policies IGC's aim is to offer progressive individuals and groups a place on the Internet to learn, meet and organize. IGC focuses on content, information sharing and collaborative tools and provides Internet access services, e-mail discussions and newsletters. The Institute for Global Communications aims at bringing Internet tools and online services to organizations and activists working on peace, economic and social justice, human rights, environmental protection, labor issues and conflict resolution. IGC also provides alternative news and political analysis as well as information about other progressive organizations. |
|
c2o (Community Communications Online) c2o, founded in 1997, provides consultancy, training and web hosting services to community-based organizations in the Australasian region. c2o's focus lies on addressing the issues and needs that have arisen from the transition from connectivity to information management. Strategies and Policies Content and Delivery: c2o focuses on the development and maintenance of content delivery services that assist in the publication and dissemination of information, particularly that of community interest including environment, social development, human rights and social justice. Publishing Support: c2o designs online publishing systems that provide a means for user maintenance and tools that enhance an organizations existing information systems. c2o seeks seamless integration and user empowerment. Asia-Pacific Networking: c2o supports networking initiatives throughout Australia and the Asia Pacific region. It promotes and encourages public and equitable access to networking technologies. |
|
1970s: Computer-Integrated Manufacturing (CIM) Since the 1970s there had been a growing trend towards the use of computer programs in manufacturing companies. Especially functions related to design and production, but also business functions should be facilitated through the use of computers. Accordingly the CAD/CAM technology, related to the use of computer systems for design and production, was developed. CAD (computer-aided design) was created to assist in the creation, modification, analysis, and optimization of design. CAM (computer-aided manufacturing) was designed to help with the planning, control, and management of production operations. CAD/CAM technology, since the 1970s, has been applied in many industries, including machined components, electronics products, equipment design and fabrication for chemical processing. To enable a more comprehensive use of computers in firms the |
|
Epilogue As scientists are working hard on a quantum computer and also on quantum cryptography one can imagine that another revolution in the study of encryption has to be expected within the next years. By then today's hardware and software tools will look extraordinary dull. At the moment it is impossible to foresee the effects on cryptography and democratic developments by those means; the best and the worst can be expected at the same time. A certain ration of pessimism and prosecution mania are probably the right mixture of emotions about those tendencies, as the idea of big brother has come into existence long ago. At the same time it will - in part - be a decision of the people to let science work against them or not. Acceleration of data-transmission calls for an acceleration of encryption-methods. And this again falls back on us, on an acceleration of daily life, blurring the private and the public for another time. We live in an intersection, job and private life growing together. Cryptography cannot help us in that case. The privacy in our mind, the virtuality of all private and public lies in the field of democracy, or at least what is - by connection to the Human Rights - regarded as democracy. |
|
Censored links: Linking as a crime The World Wide Web is constituted by documents linked with other documents, thus allowing access to referred documents. Censorship affects hyperlinks as well. Say, you publish an essay on racist propaganda on the Net and make link references to neo-nazi web sites. It goes without saying that you do not endorse neo-nazi pamphlets. By linking to these web sites you want your readers to get an idea of what you are writing about. Linking does not necessarily mean approving. Is this not evident? According to Swiss and German prosecuting attorneys you may have committed a crime without having illegal intentions. From his web site Thomas Stricker, director of the Institute of Computer Systems at the ETH Zurich, has linked to an anti-racist web site with links to racist content in order to draw the attention to the difficulties legal regulation of the Net has to face. Neglecting his intentions, Swiss authorities instituted a criminal action against Stricker. Another case, reported by the Global Internet Liberty Campaign, proves that not just links to racist resources or to resources with links to such resources are under prosecution. The Motion Picture Association of America sued to prevent Internet users from linking to websites that have DeCSS, a program helping Linux users play DVDs on their computers. The trial is scheduled for December. References: Global Internet Liberty Campaign, Hollywood wants end to links, in: GILC Alert 4,4, April 24, 2000, http://www.gilc.org/alert/alert44.html Wolfgang Näser, Allgemeines zum Thema "Homepage", Florian Rötzer, Ab wann ist ein externer Link auf strafrechtlich relevante Inhalte selbst strafbar?, in: Florian Rötzer, Strafverfahren gegen ETH-Professor wegen Links zu rassistischen Websites, in: Florian Rötzer, Ab wievielen Zwischenschritten ist ein Link auf eine rechtswidrige Website strafbar, in: |
|
Commercial vs. Independent Content: Human and Financial Resources Concerning their human and financial resources commercial media and independent content provider are an extremely unequal pair. While the 1998 revenues of the world's leading media conglomerates (AOL Time Warner, Disney, Bertelsmann, Viacom and the News Corporation) amounted to US$ 91,144,000,000 provider of independent content usually act on a non-profit basis and to a considerable extent depend on donations and contributions. Also the human resources they have at their disposal quite differ. Viacom for example employs 112,000 people. Alternative media conversely are mostly run by a small group of activists, most of them volunteers. Moreover the majority of the commercial media giants has a multitude of subsidiaries (Bertelsmann for instance has operations in 53 countries), while independent content provider in some cases do not even have proper office spaces. Asked about their offices number of square meters Frank Guerrero from RTMark comments "We have no square meters at all, because we are only on the web. I guess if you add up all of our servers and computers we would take up about one or two square meters." |
|
Advertising and the Content Industry - The Coca-Cola Case Attempts to dictate their rules to the media has become a common practice among marketers and the advertising industry. Similar as in the According to a memo published by the New York Post, Coca-Cola demands a free ad from any publication that publishes a Coke ad adjacent to stories on religion, politics, disease, sex, food, drugs, environmental issues, health, or stories that employ vulgar language. "Inappropriate editorial matter" will result in the publisher being liable for a "full make good," said the memo by Coke advertising agency (Source: Odwyerpr.com: Coke Dictates nearby Editorial. |
|
Governmental Influence Agencies like the NSA are currently able to eavesdrop on anyone with few restrictions only - though other messages are spread by the NSA. Theoretically cryptography can make that difficult. Hence those agencies speak up for actions like introducing trapdoors to make it possible to get access to everybody's data. See the U.S. discussion about the Clipper Chip some years ago: While encryption offers us privacy for the transmission of data, we do not only wish to have it but also need it if we want to transport data which shall not be seen by anyone else but the recipient of our message. Given this, the governments and governmental institutions/organizations fear to lose control. Strict laws are the consequence. The often repeated rumor that the Internet was a sphere of illegality has been proven wrong. Some parts are controlled by law very clearly. One of them is cryptography. Prohibition of cryptography or at least its restriction are considered an appropriate tool against criminality. Or one should say: had been considered that. In the meantime also governmental institutions have to admit that those restrictions most of all work against the population instead against illegal actors. Therefore laws have been changed in many states during the last five years. Even the USA, the Master of cryptography-restriction, liberated its laws in December 1999 to be more open-minded now. for an insight into the discussion having gone on for years see: the final text of the new U.S. Encryption Regulations you will find under: an explanation of the regulations can be found under: |
|
The Flesh Machine This is the tile of a book by the |
|
Nadia Thalman Nadia Thalman is director of |
|
Sun Microsystems Founded in 1982 and headquartered in Palo Alto, USA, Sun Microsystems manufactures computer workstations, For more detailed information see the Encyclopaedia Britannica: |
|
Enigma Device used by the German military command to encode strategic messages before and during World War II. The Enigma code was broken by a British intelligence system known as Ultra. |
|
Blaise Pascal b. June 19, 1623, Clermont-Ferrand, France d. August 19, 1662, Paris, France French mathematician, physicist, religious philosopher, and master of prose. He laid the foundation for the modern theory of probabilities, formulated what came to be known as Pascal's law of pressure, and propagated a religious doctrine that taught the experience of God through the heart rather than through reason. The establishment of his principle of intuitionism had an impact on such later philosophers as Jean-Jacques Rousseau and Henri Bergson and also on the Existentialists. |
|
Coca-Cola Company American corporation founded in 1892 and today engaged primarily in the manufacture and sale of syrup and concentrate for Coca-Cola, a sweetened, carbonated beverage that is a cultural institution in the United States and a symbol around the world of American tastes. The company also produces and sells other soft drinks and citrus beverages. Corporate headquarters are in Atlanta, Ga. The post-World War II years saw diversification in the packaging of Coca-Cola and also in the development or acquisition of new products. In 1946 the company purchased rights to the Fanta soft drink, previously developed in Germany. It introduced the lemon-lime drink Sprite in 1961 and the sugar-free cola Tab in 1963. By purchase of Minute Maid Corporation in 1960, it entered the citrus beverage market. In 1982 the company acquired a controlling interest in Columbia Pictures, a motion picture and entertainment company, but sold its interest to Sony Corporation in 1989. |
|
PGP A |
|
AT&T Labs-Research The research and development division of http://www.research.att.com/ |
|
Internet Research Task Force Being itself under the umbrella of the |
|
plaintext the original, legible text |
|
Polybius Polybius was one of the greatest historians of the ancient Greek. he lived from 200-118 BC. see: |
|
Celera Celera is an American company dedicated to the full sequencing and exploitation of the humane genome according to private business criteria. The company whose slogan is "Speed matters", is run by the Vietnam veteran Craig Ventor, whose declarations and business practices have given rise to widespread criticism. Unlike the Humane Genome Project, which is mapping the entire genome, Dr Ventor's method focuses on the genome information contained in messenger molecules. In keeping with Celera's slogan, this allows a much faster sequencing rate. The aggressive manoeuvring of Celera, coupled with Dr Ventor's unchecked self-esteem which lead him to compare himself to Nobel Prize winners, has meant that Dr. Ventor has been ostracised within the scientific community. James Watson, the co-discoverer of DNA, refers to Dr. Ventor's fast but relatively crude results as work that "any monkey could do" (source: BBC) http://www.celera.com |
|
Internet Society Founded in 1992, the Internet Society is an umbrella organization of several mostly self-organized organizations dedicated to address the social, political, and technical issues, which arise as a result of the evolution and the growth of the Net. Its most important subsidiary organizations are the Its members comprise companies, government agencies, foundations, corporations and individuals. The Internet Society is governed by elected trustees. |
|
Internet Societal Task Force The Internet Societal Task Force is an organization under the umbrella of the Internet Society dedicated to assure that the Internet is for everyone by identifying and characterizing social and economic issues associated with the growth and use of Internet. It supplements the technical tasks of the Topics under discussion are social, economic, regulatory, physical barriers to the use of the Net, privacy, interdependencies of Internet penetration rates and economic conditions, regulation and taxation. |
|
Human Genome Project The Human Genome Project is an international colaborative research project that aims to map the human genome. It's goal is to idenitfy the 100,000 genes of the human DNA as well as to sequence the 3 billion chemical base pairs that make up the DNA. The HGP is designed on an open source basis, i.e. the information that is obtained and stored in databases should, in principle, be available to researchers and businesses all over the world. However, the HGP's work has been challenged by private businesses such as |
|
Invention According to the |
|
Wide Application Protocol (WAP) The WAP (Wireless Application Protocol) is a specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access, including While Internet access has been possible in the past, different manufacturers have used different technologies. In the future, devices and service systems that use WAP will be able to interoperate. Source: Whatis.com |
|
atbash Atbash is regarded as the simplest way of encryption. It is nothing else than a reverse-alphabet. a=z, b= y, c=x and so on. Many different nations used it in the early times of writing. for further explanations see: |
|
Economic rights The economic rights (besides |
|
Donna Haraway Ever since the publication of her Cyborg Manifesto Donna Haraway has been providing widely received theoretical contributions to the debate around artificial life. In the "Manifesto" she considers the political and social implications of the advent of artificial beings. A radical feminist, Haraway combines in her theoretical approach philosophy, cultural studies and gender studies. Hyperlink to Donna Haraway: |
|
Neighboring rights Copyright laws generally provide for three kinds of neighboring rights: 1) the rights of performing artists in their performances, 2) the rights of producers of phonograms in their phonograms, and 3) the rights of broadcasting organizations in their radio and television programs. Neighboring rights attempt to protect those who assist intellectual creators to communicate their message and to disseminate their works to the public at large. |
|
Cisco, Inc. Being the worldwide leader in networking for the Internet, Cisco Systems is one of the most prominent companies of the Internet industry. http://www.cisco.com |
|
Gottfried Wilhelm von Leibniz b. July 1, 1646, Leipzig d. November 14, 1716, Hannover, Hanover German philosopher, mathematician, and political adviser, important both as a metaphysician and as a logician and distinguished also for his independent invention of the differential and integral calculus. 1661, he entered the University of Leipzig as a law student; there he came into contact with the thought of men who had revolutionized science and philosophy--men such as |
|
Defense Advanced Research Project Agency (DARPA) DARPA (Defense Advanced Research Projects Agency) is the independent research branch of the U.S. Department of Defense that, among its other accomplishments, funded a project that in time was to lead to the creation of the Internet. Originally called ARPA (the "D" was added to its name later), DARPA came into being in 1958 as a reaction to the success of Sputnik, Russia's first manned satellite. DARPA's explicit mission was (and still is) to think independently of the rest of the military and to respond quickly and innovatively to national defense challenges. In the late 1960s, DARPA provided funds and oversight for a project aimed at interconnecting computers at four university research sites. By 1972, this initial network, now called the http://www.darpa.mil |
|
The European Convention on Human Rights and its Five Protocols As can be read in the Convention's preamble, the member states of the Council of Europe, the European Convention on Human Rights is intended as a follow-up of the Universal Declaration of Human Rights proclaimed by the General Assembly of the United Nations on 10 December 1948 and as an official act of "securing the universal and effective recognition and observance of the Rights therein declared." Because it is stated "that the aim of the Council of Europe is the achievement of greater unity between its Members and that one of the methods by which the aim is to be pursued is the maintenance and further realization of Human Rights and Fundamental Freedoms", the European Convention on Human Rights can be read as the political sibling to the biblical Ten Commandments on which effective and legitimate European democratic government are based. The European Convention on Human Rights is intended to represent the essence of the common heritage of European political traditions and ideals. Signed in Rome on November 4, 1950, the Convention is supplemented by five protocols dated from March 20, 1952 (Paris), May 6, 1963, September 16, 1963, and January 20, 1966 (Strasbourg). http://www.hri.org/docs/ECHR50.html |
|
Chrysler Corporation American automotive company first incorporated in 1925 and reorganized and newly incorporated in 1986. It has long been the third largest automaker in the United States (after General Motors and the Ford Motor Company). Founded by Walter P. Chrysler, it took over the business and properties of Maxwell Motor Company, Inc. (first formed in 1913). Today its major subsidiaries include Chrysler Automotive Operations, Inc., which manufactures Plymouth, Dodge, and Chrysler passenger cars, Dodge trucks, and auto parts and accessories; and the Chrysler Financial Corporation. Headquarters are in Highland Park, Mich., U.S. |
|
Wide Area Network (WAN) A Wide Area Network is a wide area proprietary network or a network of local area networks. Usually consisting of computers, it may consist of cellular phones, too. |
|
Internet Engineering Steering Group On behalf of the |
|
Gateway A gateway is a computer supplying point-to-multipoint connections between computer networks. |
|
Gaius Julius Caesar Gaius Julius Caesar (100-44 BC) was a Roman Statesman who came to power through a military career and by buying of votes. His army won the civil war, run over Spain, Sicily and Egypt, where he made Cleopatra a Queen. For reaching even more power he increased the number of senators. But he also organized social measures to improve the people's food-situation. In February 44 BC he did not accept the kingship offered by Marc Anthony, which made him even more popular. One month later he was murdered during a senate sitting. |
|
Sony Corporation Japanese SONY KK, major Japanese manufacturer of consumer electronics products. Headquarters are in Tokyo. The company was incorporated in 1946 and spearheaded Japan's drive to become the world's dominant consumer electronics manufacturer in the late 20th century. The company was one of the first to recognize the potential of the consumer videotape market. In 1972 it formed an affiliate to market its Betamax colour videocassette system. In 1987-88 Sony purchased the CBS Records Group from CBS Inc., thus acquiring the world's largest record company. It followed that purchase with the purchase in 1989 of Columbia Pictures Entertainment Inc. |
|