|
Late 1960s - Early 1970s: Third Generation Computers One of the most important advances in the development of computer hardware in the late 1960s and early 1970s was the invention of the Another type of computer developed at the time was the minicomputer. It profited from the progresses in microelectronics and was considerably smaller than the standard mainframe, but, for instance, powerful enough to control the instruments of an entire scientific laboratory. Furthermore |
|
|
|
Enforcement: Copyright Management and Control Technologies With the increased ease of the reproduction and transmission of unauthorized copies of digital works over electronic networks concerns among the copyright holder community have arisen. They fear a further growth of copyright piracy and demand adequate protection of their works. A development, which started in the mid 1990s and considers the copyright owner's apprehensions, is the creation of |
|
|
|
Basics: Introduction Copyright law is a branch of |
|
|
|
Late 1950s - Early 1960s: Second Generation Computers An important change in the development of computers occurred in 1948 with the invention of the Stretch by Throughout the early 1960s there were a number of commercially successful computers (for example the IBM 1401) used in business, universities, and government and by 1965 most large firms routinely processed financial information by using computers. Decisive for the success of computers in business was the stored program concept and the development of sophisticated high-level |
|
|
|
Private data bunkers On the other hand are the data bunkers of the private sector, whose position is different. Although these are fast-growing engines of data collection with a much greater degree of dynamism, they may not have the same privileged position - although one has to differentiate among the general historical and social conditions into which a data bunker is embedded. For example, it can safely be assumed that the databases of a large credit card company or bank are more protected than the bureaucracies of small developing countries. Private data bunkers include
Credit bureaus Credit card companies Direct marketing companies Insurance companies Telecom service providers Mail order stores Online stores |
|
|
|
2000 A.D. 2000 Digital technologies are used to combine previously separated communication and media systems such as telephony, audiovisual technologies and computing to new services and technologies, thus forming extensions of existing communication systems and resulting in fundamentally new communication systems. This is what is meant by today's new buzzwords "multimedia" and "convergence". Classical dichotomies as the one of computing and telephony and traditional categorizations no longer apply, because these new services no longer fit traditional categories. Convergence and Regulatory Institutions Digital technology permits the integration of telecommunications with computing and audiovisual technologies. New services that extend existing communication systems emerge. The convergence of communication and media systems corresponds to a convergence of corporations. Recently, For further information on this issue see Natascha Just and Michael Latzer, The European Policy Response to Convergence with Special Consideration of Competition Policy and Market Power Control, http://www.soe.oeaw.ac.at/workpap.htm or |
|
|
|
Legal Protection: TRIPS (Trade-Related Aspects of Intellectual Property Rights) Another important multilateral treaty concerned with The complete TRIPS agreement can be found on: |
|
|
|
Another Question of Security Even with the best techniques it is impossible to invent a cryptographic system that is absolutely safe/unbreakable. To decipher a text means to go through many, sometimes nearly - but never really - endless attempts. For the computers of today it might take hundreds of years or even more to go through all possibilities of codes, but still, finally the code stays breakable. The much faster quantum computers will proof that one day. Therefore the decision to elect a certain method of enciphering finally is a matter of trust. For the average user of computers it is rather difficult to understand or even realize the dangers and/or the technological background of electronic transmission of data. For the majority thinking about one's own necessities for encryption first of all means to trust others, the specialists, to rely on the information they provide. The websites explaining the problems behind (and also the articles and books concerning the topic) are written by experts of course as well, very often in their typical scientific language, merely understandable for laymen. The introductions and other superficial elements of those articles can be understood, whereas the real background appears as untouchable spheres of knowledge. The fact that dangers are hard to see through and the need for security measures appears as something most people know from media reports, leads directly to the problem of an underdeveloped democracy in the field of cryptography. Obviously the connection between cryptography and democracy is rather invisible for many people. Those mentioned media reports often specialize in talking about the work computer hackers do (sometimes being presented as criminals, sometimes as heroes) and the danger to lose control over the money drawn away from one's bank account, if someone steals the credit card number or other important financial data. The term "security", surely connected to those issues, is a completely different one from the one that is connected to privacy. It is especially the latter that touches the main elements of democracy. for the question of security see: |
|
|
|
Advertising and the Media System Media systems (especially broadcasting) can be classified in two different types: Public Media Systems: Government control over broadcasting through ownership, regulation, and partial funding of public broadcasting services. Private Media System: Ownership and control lies in the hands of private companies and shareholders. Both systems can exist in various forms, according to the degree of control by governments and private companies, with mixed systems (public and private) as the third main kind. Whereas public media systems are usually at least partially funded by governments, private broadcasting solely relies on advertising revenue. Still also public media systems cannot exclude advertising as a source of revenue. Therefore both types are to a certain degree dependent on money coming in by advertisers. And this implies consequences on the content provided by the media. As the attraction of advertisers becomes critically important, interests of the advertising industry frequently play a dominant role concerning the structure of content and the creation of environments favorable for advertising goods and services within the media becomes more and more common. |
|
|
|
Feeding the data body |
|
|
|
In Search of Reliable Internet Measurement Data Newspapers and magazines frequently report growth rates of Internet usage, number of users, hosts, and domains that seem to be beyond all expectations. Growth rates are expected to accelerate exponentially. However, Internet measurement data are anything thant reliable and often quite fantastic constructs, that are nevertheless jumped upon by many media and decision makers because the technical difficulties in measuring Internet growth or usage are make reliable measurement techniques impossible. Equally, predictions that the Internet is about to collapse lack any foundation whatsoever. The researchers at the Size and Growth In fact, "today's Internet industry lacks any ability to evaluate trends, identity performance problems beyond the boundary of a single ISP (Internet service provider, M. S.), or prepare systematically for the growing expectations of its users. Historic or current data about traffic on the Internet infrastructure, maps depicting ... there is plenty of measurement occurring, albeit of questionable quality", says K. C. Claffy in his paper Internet measurement and data analysis: topology, workload, performance and routing statistics (http://www.caida.org/Papers/Nae/, Dec 6, 1999). Claffy is not an average researcher; he founded the well-known So his statement is a slap in the face of all market researchers stating otherwise. In a certain sense this is ridiculous, because since the inception of the So what are the reasons for this inability to evaluate trends, identity performance problems beyond the boundary of a single ISP? First, in early 1995, almost simultaneously with the worldwide introduction of the "There are many estimates of the size and growth rate of the Internet that are either implausible, or inconsistent, or even clearly wrong", K. G. Coffman and Andrew, both members of different departments of What is measured and what methods are used? Many studies are devoted to the number of users; others look at the number of computers connected to the Internet or count You get the clue of their focus when you bear in mind that the Internet is just one of many networks of networks; it is only a part of the universe of computer networks. Additionally, the Internet has public (unrestricted) and private (restricted) areas. Most studies consider only the public Internet, Coffman and Odlyzko consider the long-distance private line networks too: the corporate networks, the Hosts The Despite the small sample, this method has at least one flaw: Internet Weather Like daily weather, traffic on the Internet, the conditions for data flows, are monitored too, hence called Internet weather. One of the most famous Internet Hits, Page Views, Visits, and Users Let us take a look at how these hot lists of most visited Web sites may be compiled. I say, may be, because the methods used for data retrieval are mostly not fully disclosed. For some years it was seemingly common sense to report requested files from a Web site, so called "hits". A method not very useful, because a document can consist of several files: graphics, text, etc. Just compile a document from some text and some twenty flashy graphical files, put it on the Web and you get twenty-one hits per visit; the more graphics you add, the more hits and traffic (not automatically to your Web site) you generate. In the meantime page views, also called page impressions are preferred, which are said to avoid these flaws. But even page views are not reliable. Users might share computers and corresponding Especially the editors of some electronic journals (e-journals) rely on page views as a kind of ratings or circulation measure, Rick Marin reports in the More advanced, but just slightly better at best, is counting visits, the access of several pages of a Web site during one session. The problems already mentioned apply here too. To avoid them, newspapers, e.g., establish registration services, which require password authentication and therefore prove to be a kind of access obstacle. But there is a different reason for these services. For content providers users are virtual users, not unique persons, because, as already mentioned, computers and For If you like to play around with Internet statistics instead, you can use Robert Orenstein's Measuring the Density of Measuring the Density of Dodge and Shiode used data on the ownership of IP addresses from |
|
|
|
Timeline Cryptography - Introduction Besides oral conversations and written language many other ways of information-transport are known: like the bush telegraph, drums, smoke signals etc. Those methods are not cryptography, still they need en- and decoding, which means that the history of language, the history of communication and the history of cryptography are closely connected to each other The timeline gives an insight into the endless fight between enciphering and deciphering. The reasons for them can be found in public and private issues at the same time, though mostly connected to military maneuvers and/or political tasks. One of the most important researchers on Cryptography through the centuries is |
|
|
|
Who owns the Internet and who is in charge? The Internet/Matrix still depends heavily on public infrastructure and there is no dedicated owner of the whole Internet/Matrix, but the networks it consists of are run and owned by corporations and institutions. Access to the Internet is usually provided by Internet Service Providers (ISPs) for a monthly fee. Each network is owned by someone and has a network operation center from where it is centrally controlled, but the Internet/Matrix is not owned by any single authority and has no network operation center of its own. No legal authority determines how and where networks can be connected together, this is something the managers of networks have to agree about. So there is no way to ever gain ultimate control of the Matrix/Internet. The in some respects decentralized Matrix/Internet architecture and administration do not imply that there are no authorities for oversight and common standards for sustaining basic operations, for administration: There are authorities for IP number and domain name registrations, e.g. Ever since the organizational structures for Internet administration have changed according to the needs to be addressed. Up to now, administration of the Internet is a collaborative undertaking of several loose cooperative bodies with no strict hierarchy of authority. These bodies make decisions on common guidelines, as Amazingly, there seems to be an unspoken and uncodified consent of what is allowed and what is forbidden on the Internet that is widely accepted. Codifications, as the so-called Sometimes violations not already subject to law become part of governmental regulations, as it was the case with spamming, the unsolicited sending of advertising mail messages. But engineers proved to be quicker and developed software against spamming. So, in some respects, the Internet is self-regulating, indeed. For a detailed report on Internet governance, click here. |
|
|
|
Reuters Group plc Founded in 1851 in London, Reuters is the world's largest news and television agency with 1,946 journalists, photographers and camera operators in 183 bureaus serving newspapers, other news agencies, and radio and television broadcasters in 157 countries. In addition to its traditional news-agency business, over its network Reuters provides financial information and a wide array of electronic trading and brokering services to banks, brokering houses, companies, governments, and individuals worldwide. http://www.reuters.com |
|
|
|
Bruce Schneier Bruce Schneier is president of Counterpane Systems in Minneapolis. This consulting enterprise specialized in cryptography and computer security. He is the author of the book Applied Cryptography and inventor of the Blowfish and Twofish encryption algorithms. |
|
|
|
Network Information Center (NIC) Network information centers are organizations responsible for registering and maintaining the domain names on the |
|
|
|
Defense Advanced Research Project Agency (DARPA) DARPA (Defense Advanced Research Projects Agency) is the independent research branch of the U.S. Department of Defense that, among its other accomplishments, funded a project that in time was to lead to the creation of the Internet. Originally called ARPA (the "D" was added to its name later), DARPA came into being in 1958 as a reaction to the success of Sputnik, Russia's first manned satellite. DARPA's explicit mission was (and still is) to think independently of the rest of the military and to respond quickly and innovatively to national defense challenges. In the late 1960s, DARPA provided funds and oversight for a project aimed at interconnecting computers at four university research sites. By 1972, this initial network, now called the http://www.darpa.mil |
|
|
|
Aeneas Tacticus Supposedly his real name was Aeneas of Stymphalus. He was a Greek military scientist and cryptographer. He invented an optical system for communication similar to a telegraph: the |
|
|
|
Society for Worldwide Interbank Financial Telecommunication (SWIFT) Founded in 1973 by 239 banks from 15 countries, SWIFT is responsible for maintaining the world's most important network dedicated to financial transaction processing. Although facing competition from smart cards, e.g., SWIFT can rely on an increasing clientèle. In September 1999 SWIFT served 6,710 live users in 189 countries. |
|
|
|
Apple Founded by Steve Jobs and Steve Wozniak and headquartered in Cupertino, USA, Apple Computer was the first commercially successful personal computer company. In 1978 Wozniak invented the first personal computer, the Apple II. For more detailed information see the Encyclopaedia Britannica: http://www.britannica.com/bcom/eb/article/6/0,5716,115726+1+108787,00.html |
|
|
|
R.J. Reynolds American manufacturer of tobacco products. The origins of the R.J. Reynolds Tobacco Company date to the post-Civil War era, when Richard Joshua Reynolds (1850-1918) began trading in tobacco, first in his native Virginia and then in Winston, N.C., where in 1875 he established his first plug factory. The company began to diversify in the 1960s, acquiring chiefly food and oil concerns, and the tobacco concern became a subsidiary of R.J. Reynolds Industries, Inc., in 1970. |
|
|
|
America Online Founded in 1985, America Online is the world's biggest Internet service provider serving almost every second user. Additionally, America Online operates CompuServe, the Netscape Netcenter and several AOL.com portals. As the owner of Netscape, Inc. America Online plays also an important role in the Web browser market. In January 2000 America Online merged with Time Warner, the worlds leading media conglomerate, in a US$ 243,3 billion deal, making America Online the senior partner with 55 percent in the new company. |
|
|
|
Division of labor The term refers to the separation of a work process into a number of tasks, with each task performed by a separate person or group of persons. It is most often applied to |
|
|
|
Time Warner The largest media and entertainment conglomerate in the world. The corporation resulted from the merger of the publisher Time Inc. and the media conglomerate Warner Communications Inc. in 1989. It acquired the Turner Broadcasting System, Inc. (TBS) in 1996. Time Warner Inc.'s products encompass magazines, hardcover books, comic books, recorded music, motion pictures, and broadcast and cable television programming and distribution. The company's headquarters are in New York City. In January 2000 Time Warner merged with AOL (America Online), which owns several online-services like Compuserve, Netscape and Netcenter in a US$ 243,3 billion deal. |
|
|
|
Leni Riefenstahl Leni Riefenstahl (* 1902) began her career as a dancer and actress. Parallel she learnt how to work with a camera, turning out to be one of the most talented directors and cutters of her time - and one of the only female ones. |
|
|
|
Convergence, 2000- Digital technologies are used to combine previously separated communication and media systems as telephony, audiovisual technologies and computing to new services and technologies, thus forming extensions of existing communication systems and resulting in fundamentally new communication systems. This is what is meant by today's new buzzwords "multimedia" and "convergence". Classical dichotomies as the one of computing and telephony and traditional categorisations no longer apply, because these new services no longer fit traditional categories. |
|
|
|
John von Neumann b. December 3, 1903, Budapest, Hungary d. February 8, 1957, Washington, D.C., U.S. Mathematician who made important contributions in quantum physics, logic, meteorology, and computer science. His theory of games had a significant influence upon economics. In computer theory, von Neumann did much of the pioneering work in logical design, in the problem of obtaining reliable answers from a machine with unreliable components, the function of "memory," machine imitation of "randomness," and the problem of constructing automata that can reproduce their own kind. |
|
|
|
Kessler Marketing Intelligence (KMI) KMI is the leading source for information on fiber-optics markets. It offers market research, strategic analysis and product planning services to the opto-electronics and communications industries. KMI tracks the worldwide fiber-optic cable system and sells the findings to the industry. KMI says that every fiber-optics corporation with a need for strategic market planning is a subscriber to their services. |
|
|