Basics: Acquisition of Copyright
The laws of almost all countries provide that protection is independent of any formalities. Copyright protection then starts as soon as the work is created.
|
TEXTBLOCK 1/5 // URL: http://world-information.org/wio/infostructure/100437611725/100438659576
|
| |
Acessing the Internet
The Net connections can be based on wire-line and wireless access technolgies.
Usually several kinds of network connections are employed at once. Generally speaking, when an E-mail message is sent it travels from the user's computer via copper wires or coaxial cables ISDN lines, etc., to an Internet Service Provider, from there, via fibre-optic cables, to the nearest Internet exchange, and on into a backbone network, tunneling across the continent und diving through submarine fibre-optic cables across the Atlantic to another Internet exchange, from there, via another backbone network and across another regional network to the Internet Service Provider of the supposed message recipient, from there via cables and wires of different bandwidth arriving at its destination, a workstation permanently connected to the Internet. Finally a sound or flashing icon informs your virtual neighbor that a new message has arrived.
Satellite communication
Although facing competition from fiber-optic cables as cost-effective solutions for broadband data transmission services, the space industry is gaining increasing importance in global communications. As computing, telephony, and audiovisual technologies converge, new wireless technologies are rapidly deployed occupying an increasing market share and accelerating the construction of high-speed networks.
Privatization of satellite communication
Until recently transnational satellite communication was provided exclusively by intergovernmental organizations as Intelsat, Intersputnik and Inmarsat.
Scheduled privatization of intergovernmental satellite consortia:
Satellite consortia
| Year of foundation
| Members
| Scheduled date for privatization
| Intelsat
| 1964
| 200 nations under the leadership of the USA
| 2001
| Intersputnik
| 1971
| 23 nations under the leadership of Russia
| ?
| Inmarsat
| 1979
| 158 nations (all members of the International Maritime Organization)
| privatized since 1999
| Eutelsat
| 1985
| Nearly 50 European nations
| 2001
| |
When Intelsat began to accumulate losses because of management failures and the increasing market share of fiber-optic cables, this organizational scheme came under attack. Lead by the USA, the Western industrialized countries successfully pressed for the privatization of all satellite consortia they are members of and for competition by private carriers.
As of February 2000, there are 2680 satellites in service. Within the next four years a few hundred will be added by the new private satellite systems. Most of these systems will be so-called Low Earth Orbit satellite systems, which are capable of providing global mobile data services on a high-speed level at low cost.
Because of such technological improvements and increasing competition, experts expect satellite-based broadband communication to be as common, cheap, and ubiquitous as satellite TV today within the next five or ten years.
Major satellite communication projects
Project name
| Main investors
| Expected cost
| Number of satellites
| Date of service start-up
| Astrolink
| Lockheed Martin, TRW, Telespazio, Liberty Media Group
| US$ 3.6 billion
| 9
| 2003
| Globalstar
| 13 investors including Loral Space & Communications, Qualcomm, Hyundai, Alcatel, France Telecom, China Telecom, Daimler Benz and Vodafone/Airtouch
| US$ 3.26 billion
| 48
| 1998
| ICO
| 57 investors including British Telecom, Deutsche Telecom, Inmarsat, TRW and Telefonica
| US$ 4.5 billion
| 10
| 2001
| Skybridge
| 9 investors including Alcatel Space, Loral Space & Communications, Toshiba, Mitsubishi and Sharp
| US$ 6.7 billion
| 80
| 2002
| Teledesic
| Bill Gates, Craig McCaw, Prince Alwaleed Bin Talal Bin Abdul Aziz Alsaud, Abu Dhabi Investment Company
| US$ 9 billion
| 288
| 2004
| |
Source: Analysys Satellite Communications Database
|
TEXTBLOCK 2/5 // URL: http://world-information.org/wio/infostructure/100437611791/100438659839
|
| |
Problems of Copyright Management and Control Technologies
Profiling and Data Mining
At their most basic copyright management and control technologies might simply be used to provide pricing information, negotiate the purchase transaction, and release a copy of a work for downloading to the customer's computer. Still, from a technological point of view, such systems also have the capacity to be employed for digital monitoring. Copyright owners could for example use the transaction records generated by their copyright management systems to learn more about their customers. Profiles, in their crudest form consisting of basic demographic information, about the purchasers of copyrighted material might be created. Moreover copyright owners could use search agents or complex data mining techniques to gather more information about their customers that could either be used to market other works or being sold to third parties.
Fair Use
Through the widespread use of copyright management and control systems the balance of control could excessively be shifted in favor of the owners of intellectual property. The currently by copyright law supported practice of fair use might potentially be restricted or even eliminated. While information in analogue form can easily be reproduced, the protection of digital works through copyright management systems might complicate or make impossible the copying of material for purposes, which are explicitly exempt under the doctrine of fair use.
Provisions concerning technological protection measures and fair use are stated in the DMCA, which provides that "Since copying of a work may be a fair use under appropriate circumstances, section 1201 does not prohibit the act of circumventing a technological measure that prevents copying. By contrast, since the fair use doctrine is not a defense e to the act of gaining unauthorized access to a work, the act of circumventing a technological measure in order to gain access is prohibited." Also the proposed EU Directive on copyright and related rights in the information society contains similar clauses. It distinguishes between the circumvention of technical protection systems for lawful purposes (fair use) and the circumvention to infringe copyright. Yet besides a still existing lack of legal clarity also very practical problems arise. Even if the circumvention of technological protection measures under fair use is allowed, how will an average user without specialized technological know-how be able to gain access or make a copy of a work? Will the producers of copyright management and control systems provide fair use versions that permit the reproduction of copyrighted material? Or will users only be able to access and copy works if they hold a digital "fair use license" ("fair use licenses" have been proposed by Mark Stefik, whereby holders of such licenses could exercise some limited "permissions" to use a digital work without a fee)?
|
TEXTBLOCK 3/5 // URL: http://world-information.org/wio/infostructure/100437611725/100438659629
|
| |
Legal Protection: WIPO (World Intellectual Property Organization)
Presumably the major player in the field of international intellectual property protection and administrator of various multilateral treaties dealing with the legal and administrative aspects of intellectual property is the WIPO.
Information on WIPO administered agreements in the field of industrial property (Paris Convention for the Protection of Industrial Property (1883), Madrid Agreement Concerning the International Registration of Marks (1891) etc.) can be found on: http://www.wipo.org/eng/general/index3.htm
Information on treaties concerning copyright and neighboring rights (Berne Convention for the Protection of Literary and Artistic Works (1886) etc.) is published on: http://www.wipo.org/eng/general/index5.htm
The most recent multilateral agreement on copyright is the 1996 WIPO Copyright Treaty. Among other things it provides that computer programs are protected as literary works and also introduces the protection of databases, which "... by reason of the selection or arrangement of their content constitute intellectual creations." Furthermore the 1996 WIPO Copyright Treaty contains provisions concerning technological measures, rights management information and establishes a new "right of communication to the public". It is available on: http://www.wipo.org/eng/diplconf/distrib/treaty01.htm
|
TEXTBLOCK 4/5 // URL: http://world-information.org/wio/infostructure/100437611725/100438659588
|
| |
How the Internet works
On the Internet, when you want to retrieve a document from another computer, you request a service from this computer. Your computer is the client, the computer on which the information you want to access is stored, is called the server. Therefore the Internet's architecture is called client-server architecture.
A common set of standards allows the exchange of data and commands independent from locations, time, and operating systems through the Internet. These standards are called communication protocols, or the Internet Protocol Suite, and are implemented in Internet software. Sometimes the Internet Protocol Suite is erroneously identified with TCP/IP (Transmission Control Protocol / Internet Protocol).
Any information to be transferred is broken down into pieces, so-called packets, and the Internet Protocol figures out how the data is supposed to get from A to B by passing through routers.
Each packet is "pushed" from router to router via gateways and might take a different route. It is not possible to determine in advance which ways these packets will take. At the receiving end the packets are checked and reassembled.
The technique of breaking down all messages and requests into packets has the advantage that a large data bundle (e.g. videos) sent by a single user cannot block a whole network, because the bandwidth needed is deployed on several packets sent on different routes. Detailed information about routing in the Internet can be obtained at http://www.scit.wlv.ac.uk/~jphb/comms/iproute.html.
One of the Internet's (and of the Matrix's) beginnings was the ARPANet, whose design was intended to withstand any disruption, as for example in military attacks. The ARPANet was able to route data around damaged areas, so that the disruption would not impede communication. This design, whith its origin in strategic and military considerations, remained unchanged for the Internet. Yet the design of the ARPANet's design cannot be completely applied to the Internet.
Routing around depends on the location of the interruption and on the availability of intersecting points between networks. If, for example, an E-mail message is sent from Brussels to Athens and in Germany a channel is down, it will not affect access very much, the message will be routed around this damage, as long as a major Internet exchange is not affected. However, if access depends on a single backbone connection to the Internet and this connection is cut off, there is no way to route around.
In most parts of the world the Internet is therefore vulnerable to disruption. "The idea of the Internet as a highly distributed, redundant global communications system is a myth. Virtually all communications between countries take place through a very small number of bottlenecks, and the available bandwidth isn't that great," says Douglas Barnes. These bottlenecks are the network connections to neighboring countries. Many countries rely on a one single connection to the Net, and in some places, such as the Suez Canal, there is a concentration of fiber-optic cables of critical importance.
|
TEXTBLOCK 5/5 // URL: http://world-information.org/wio/infostructure/100437611791/100438659870
|
| |
UNIVAC
Built by Remington Rand in 1951 the UNIVAC I (Universal Automatic Computer) was one of the first commercially available computers to take advantage of the development of the central processing unit (CPU). Both the U.S. Census bureau and General Electric owned UNIVACs. Speed: 1,905 operations per second; input/output: magnetic tape, unityper, printer; memory size: 1,000 12-digit words in delay line; technology: serial vacuum tubes, delay lines, magnetic tape; floor space: 943 cubic feet; cost: F.O.B. factory U.S.$ 750,000 plus U.S.$ 185,000 for a high speed printer.
|
INDEXCARD, 1/6
|
| |
Alan Turing
b. June 23, 1912, London, England d. June 7, 1954, Wilmslow, Cheshire
English mathematician and logician who pioneered in the field of computer theory and who contributed important logical analyses of computer processes. Many mathematicians in the first decades of the 20th century had attempted to eliminate all possible error from mathematics by establishing a formal, or purely algorithmic, procedure for establishing truth. The mathematician Kurt Gödel threw up an obstacle to this effort with his incompleteness theorem. Turing was motivated by Gödel's work to seek an algorithmic method of determining whether any given propositions were undecidable, with the ultimate goal of eliminating them from mathematics. Instead, he proved in his seminal paper "On Computable Numbers, with an Application to the Entscheidungsproblem [Decision Problem]" (1936) that there cannot exist any such universal method of determination and, hence, that mathematics will always contain undecidable propositions. During World War II he served with the Government Code and Cypher School, at Bletchley, Buckinghamshire, where he played a significant role in breaking the codes of the German " Enigma Machine". He also championed the theory that computers eventually could be constructed that would be capable of human thought, and he proposed the Turing test, to assess this capability. Turing's papers on the subject are widely acknowledged as the foundation of research in artificial intelligence. In 1952 Alan M. Turing committed suicide, probably because of the depressing medical treatment that he had been forced to undergo (in lieu of prison) to "cure" him of homosexuality.
|
INDEXCARD, 2/6
|
| |
Augustus
Gaius Julius Caesar Octavian Augustus (63 BC - 14 AD) was adopted by Julius Caesar and became the first Roman Emperor. While he was very successful in military affairs abroad, he tried to bring back law and order to the Roman population. He was most interested in arts and philosophy.
|
INDEXCARD, 3/6
|
| |
Theoedore Roosevelt
With the assassination of President McKinley, Theodore Roosevelt (1858-1919), not quite 43, became the youngest President in the Nation's history. Roosevelt's youth differed sharply from that of the log cabin Presidents. He was born in New York City in 1858 into a wealthy family. Roosevelt steered the United States more actively into world politics. He liked to quote a favorite proverb, "Speak softly and carry a big stick. . . . "
He won the Nobel Peace Prize for mediating the Russo-Japanese War.
for more information see the official website:
http://www.whitehouse.gov/WH/glimpse/presidents/html/tr26.html
http://www.whitehouse.gov/WH/glimpse/presiden...
|
INDEXCARD, 4/6
|
| |
Themistocles
Themistocles, a Greek politician and general, conquered the Persians in the battle of Salamis, in 480 BC. The Persians, under their King Xerxes, who were on the edge of winning the battle, got defeated by a propaganda campaign that Themistocles launched, telling the Persians that he was on their side and willing to let them win the battle; his argument was that the Greek were so busy with their quarrels that they were not prepared to fight an aggressive battle and a lot of them would change sides if the power of the Persians was shown in a short and cruel fight. In the end Xerxes got the message that parts of the Greek army were fleeing the battlefield. This disinformation lead to a wrong assessment of Xerxes, which made it easy for the Greek to win the war.
For further details see:
http://www.optonline.com/comptons/ceo/31900_Q.html
http://ds.dial.pipex.com/kitson/ESSAYS/Them.htm
http://www.eptonline.com/comptons/ceo/31900_Q...
http://ds.dial.pipex.com/kitson/ESSAYS/Them.h...
|
INDEXCARD, 5/6
|
| |
Kosov@
The "word" Kosov@ is a compromise between the Serb name KosovO and the Albanian KosovA. It is mostly used by international people who want to demonstrate a certain consciousness about the conflict including some sort of neutrality, believing that neither the one side nor the other (and maybe not even NATO) is totally right. Using the word Kosov@ is seen as a symbol of peace.
For more explanations (in German) see: http://www.zivildienst.at/kosov@.htm
http://www.zivildienst.at/kosov@.htm
|
INDEXCARD, 6/6
|
| |