Timeline BC
~ 1900 BC: Egyptian writers use non-standard Hieroglyphs in inscriptions of a royal tomb; supposedly this is not the first but the first documented example of written cryptography
1500 an enciphered formula for the production of pottery is done in Mesopotamia
parts of the Hebrew writing of Jeremiah's words are written down in " atbash", which is nothing else than a reverse alphabet and one of the first famous methods of enciphering
4th century Aeneas Tacticus invents a form of beacons, by introducing a sort of water-clock
487 the Spartans introduce the so called " skytale" for sending short secret messages to and from the battle field
170 Polybius develops a system to convert letters into numerical characters, an invention called the Polybius Chequerboard.
50-60 Julius Caesar develops an enciphering method, later called the Caesar Cipher, shifting each letter of the alphabet an amount which is fixed before. Like atbash this is a monoalphabetic substitution.
|
TEXTBLOCK 1/2 // URL: http://world-information.org/wio/infostructure/100437611776/100438659084
|
| |
Internet, Intranets, Extranets, and Virtual Private Networks
With the rise of networks and the corresponding decline of mainframe services computers have become communication devices instead of being solely computational or typewriter-like devices. Corporate networks become increasingly important and often use the Internet as a public service network to interconnect. Sometimes they are proprietary networks.
Software companies, consulting agencies, and journalists serving their interests make some further differences by splitting up the easily understandable term "proprietary networks" into terms to be explained and speak of Intranets, Extranets, and Virtual Private Networks.
Cable TV networks and online services as Europe Online, America Online, and Microsoft Network are also proprietary networks. Although their services resemble Internet services, they offer an alternative telecommunication infrastructure with access to Internet services for their subscribers.
America Online is selling its service under the slogan "We organize the Web for you!" Such promises are more frightening than promising because "organizing" is increasingly equated with "filtering" of seemingly objectionable messages and "rating" of content. For more information on these issues, click here If you want to know more about the technical nature of computer networks, here is a link to the corresponding article in the Encyclopaedia Britannica.
Especially for financial transactions, secure proprietary networks become increasingly important. When you transfer funds from your banking account to an account in another country, it is done through the SWIFT network, the network of the Society for Worldwide Interbank Financial Telecommunication (SWIFT). According to SWIFT, in 1998 the average daily value of payments messages was estimated to be above U$ 2 trillion.
Electronic Communications Networks as Instinet force stock exchanges to redefine their positions in trading of equities. They offer faster trading at reduced costs and better prices on trades for brokers and institutional investors as mutual funds and pension funds. Last, but not least clients are not restricted to trading hours and can trade anonymously and directly, thereby bypassing stock exchanges.
|
TEXTBLOCK 2/2 // URL: http://world-information.org/wio/infostructure/100437611791/100438658384
|
| |
Blue Box
The blue box-system works with a special blue colored background. The person in front can act as if he/she was filmed anywhere, also in the middle of a war.
|
INDEXCARD, 1/2
|
| |
Sun Microsystems
Founded in 1982 and headquartered in Palo Alto, USA, Sun Microsystems manufactures computer workstations, servers, and software.
http://www.sun.com
For more detailed information see the Encyclopaedia Britannica: http://www.britannica.com/bcom/eb/article/9/0,5716,108249+1+105909,00.html .
http://www.sun.com/
http://www.britannica.com/bcom/eb/article/9/0...
|
INDEXCARD, 2/2
|
| |