Convergence The convergence of biology and technology is not an entirely new phenomenon but and has its origin in the concept of modern technology itself. This concept understands technology as something bigger, stronger, and more reliable than ourselves. But, unlike human beings, technologies are always tied to specific men-defined purposes. In so far as men define purposes and build the technology to achieve those purposes, technology is smaller than ourselves. The understanding of technology as a man-controlled tool has been called the instrumental and anthropological understanding of technology. However, this understanding is becoming insufficient when technologies become fast and interdependent, i.e. when fast technologies form systems and global networks. Powerful modern technologies, especially in the field of informatics, have long ceased to be mere instruments and have created constraints for human action which act to predetermine activity and predefine purposes. As a consequence, the metaphysical distinction between subject and object has become blurred. In the 1950s Heidegger already speaks of modern technology not as the negation but as the culmination of metaphysical thought which provokes men to "overcome" metaphysics. The weakening of metaphysical determinations which occurs in the project of modern technology has also meant that it become impossible to clearly define what being human is, and to determine the line that separates non-human from human being. These changes are not progressing at a controllable rate, but they are undergoing constant acceleration. The very efficiency and power of calculation of modern technologies means that acceleration itself is being accelerated. Every new technological development produces new shortcuts in socio-technical systems and in communication. |
|
The Cassini Case In 1997 NASA's Cassini mission to Saturn and its moons led to heated controversies, because it was fueled by plutonium, a substance that could cause serious environmental and health problems if it were released into the atmosphere. Still no major U.S. news outlet in broadcasting or print reported in depth on the risks of the Cassini mission. Westinghouse-owned media like CBS and NBC (also partly owned by General Electric) for example had only reported that children were invited to sign a plaque inside Cassini. Not surprisingly Westinghouse and General Electric are two of the largest corporations with defense contracts and nuclear interests. |
|
Biotechnology: robotics and artificial intelligence |
|
Governmental Regulations The new U.S. regulations are based on the Wassenaar Arrangement Revision of 1998, where exports without license of 56 bit For more information see: Seven states stay excluded from the new freedom. These are states like Libya, Iraq, Iran, North Korea and Cuba, altogether states seen as terrorist supporting. No encryption tools may be exported into those countries. This is, what happened in the USA, whereas in Germany the issue of a cryptography-law is still on the agenda. Until now, in Germany, everyone can decide by her-/himself, whether she/he wants to encrypt electronic messages or not. Some organizations fear that this could get changed soon. Therefore an urgent action was organized in February 2000 to demonstrate the government that people want the freedom to decide on their own. One governmental argument is that only very few people actually use cryptography. Therefore the urgent action is organized as a campaign for using it more frequently. For more information on this see: Other European countries have more liberate laws on cryptography, like France. Austria doesn't have any restrictions at all, probably because of a governmental lack of interest more than accepting freedom. The (former) restrictions in the bigger countries influenced and hindered developments for safer key-systems, e.g. the key-length was held down extraordinarily. "Due to the suspicious nature of crypto users I have a feeling DES will be with us forever, we will just keep adding keys and cycles (...). There is a parallel between designing electronic commerce infrastructure today that uses weak cryptography (i.e. 40 or 56 bit keys) and, say, designing air traffic control systems in the '60s using two digit year fields. (...) Just because you can retire before it all blows up doesn't make it any less irresponsible." (Arnold G. Reinhold) The Chinese State Encryption Management Commission (SEMC) announced in March 2000 that only strong encryption tools will have to be registered in the future. Which sounds so nice on first sight, does not mean a lot in reality: any kind of useful encryption technique, like the The restrictions and prohibitions for cryptography are part of the states' wish to acquire more control - in the name of the battle against criminality, probably? Due to the emerging organized criminality the governments want to obtain more freedom of control over citizens. Organizations like the NSA appear as the leaders of such demands. What about civil rights or Human Rights? |
|
skytale The skytale (pronunciation: ski-ta-le) was a Spartan tool for encryption. It consisted of a piece of wood and a leather-strip. Any communicating party needed exactly the same size wooden stick. The secret message was written on the leather-strip that was wound around the wood, unwound again and sent to the recipient by a messenger. The recipient would rewound the leather and by doing this enciphering the message. |
|
Vinton Cerf Addressed as one of the fathers of the Internet, Vinton Cerf together with Robert Kahn developed the In 1992, he co-founded the Today, Vinton Cerf is Senior Vice President for Internet Architecture and Technology at Vinton Cerf's web site: http://www.wcom.com/about_the_company/cerfs_up/ |
|
The Rocky Horror Picture Show The story of Frank-N-furter, Brad and Janet ... Don't dream it, be it! http://www.rockyhorrorpictureshow.com/ |
|
Chappe's fixed optical network Claude Chappe built a fixed optical network between Paris and Lille. Covering a distance of about 240kms, it consisted of fifteen towers with semaphores. Because this communication system was destined to practical military use, the transmitted messages were encoded. The messages were kept such secretly, even those who transmit them from tower to tower did not capture their meaning, they just transmitted codes they did not understand. Depending on weather conditions, messages could be sent at a speed of 2880 kms/hr at best. Forerunners of Chappe's optical network are the For more information on early communication networks see |
|
Transmission Control Protocol/Internet Protocol (TCP/IP) TCP and IP are the two most important protocols and communication standards. TCP provides reliable message-transmission service; IP is the key protocol for specifying how packets are routed around the Internet. More detailed information can be found |
|