1913: Henry Ford and the Assembly Line

Realizing that he'd need to lower costs Henry Ford (Ford Motor Company) was inspired to create a more efficient way to produce his cars. Looking at other industries he and his team found four principles, which furthered their goal: interchangeable parts, continuous flow, division of labor, and reducing wasted effort.

The use of interchangeable parts meant making the individual pieces of the car the same every time. Therefore the machines had to be improved, but once they were adjusted, they could be operated by a low-skilled laborer. To reduce the time workers spent moving around Ford refined the flow of work in the manner that as one task was finished another began, with minimum time spent in set-up. Furthermore he divided the labor by breaking the assembly of the legendary Model T in 84 distinct steps. Frederick Taylor, the creator of "scientific management" was consulted to do time and motion studies to determine the exact speed at which the work should proceed and the exact motions workers should use to accomplish their tasks.

Putting all those findings together in 1913 Ford installed the first moving assembly line that was ever used for large-scale manufacturing. His cars could then be produced at a record-breaking rate, which meant that he could lower the price, but still make a good profit by selling more cars. For the first time work processes were largely automated by machinery.

TEXTBLOCK 1/7 // URL: http://world-information.org/wio/infostructure/100437611663/100438659335
 
The Egyptians ...

Besides ordinary religious manipulation-tools the Egyptians were masters of using architecture for propaganda. In Egypt, most of all, architecture was used as a media to demonstrated power, whereas the Greek and Romans used other types of art, like statues, for political propaganda.
The pyramids, palaces, tombs became tools for power demonstrations. Paintings and carvings (like on obelisks) proved the might of the rulers.
All those signs of power were done to make people compare their ruling dynasty to gods and keep them politically silent, because religion was used for justifying mortal power. Marble, gold, jewelry and artists were the tools for those maneuvers. Whereas questions for the truth were not even asked or listened to.
Finally it was the masses who were used for propaganda, when they were not only forced to work as slaves on those signs of power but also were abused for those power demonstrations, when they had to accompany the dead king into his tomb - dying of hunger, thirst, lack of oxygen and in darkness. The more religious disinformation the more luxury. The more luxury the better. The more luxury the more power.

TEXTBLOCK 2/7 // URL: http://world-information.org/wio/infostructure/100437611661/100438658370
 
Asymmetric or Public-Key-Cryptosystems

Here the keys for encryption and decryption differ. There needs to exist a private key, which is only known to the individual, and a public key, which is published. Every person has her or his own private key that is never published. It is used for decrypting only. Mathematically the different keys are linked to each other, still it is nearly impossible to derive the private key from the public one.
For sending a message to someone, one has to look up the other's public key and encrypt the message with it. The keyholder will use his/her private key to decrypt it. While everybody can send a message with the public key, the private key absolutely has to stay secret - and probably will.

"The best system is to use a simple, well understood algorithm which relies on the security of a key rather than the algorithm itself. This means if anybody steals a key, you could just roll another and they have to start all over." (Andrew Carol)

very famous examples for public-key systems are:

· RSA:
The RSA is probably one of the most popular public-key cryptosystems. With the help of RSA, messages can be encrypted, but also digital signatures are provided.
The mathematics behind are supposedly quite easy to understand (see: http://world.std.com/~franl/crypto/rsa-guts.html.

· PGP:
PGP is a public key encryption program. Most of all it is used for e-mail encryption.
It is supposed to be quite safe - until now.

· PGPi is simply the international variation of PGP.

for further information about the RSA and other key-systems visit the RSA homepage:
http://www.rsa.com/rsalabs/faq/
http://www.rsa.com/rsalabs/faq/questions.html
or:
http://www.pgpi.org

All of those tools, like hash functions, too, can help to enhance security and prevent crime.
They can theoretically, but sometimes they do not, as the example of the published credit card key of France in March 2000 showed.
For more information see:
http://news.voila.fr/news/fr.misc.cryptologie

Still, cryptography can help privacy.
On the other hand cryptography is only one element to assure safe transport of data. It is especially the persons using it who have to pay attention. A key that is told to others or a lost cryptographic key are the end of secrecy.

TEXTBLOCK 3/7 // URL: http://world-information.org/wio/infostructure/100437611776/100438659074
 
The 19th Century: Machine-Assisted Manufacturing

Eli Whitney's proposal for a simplification and standardization of component parts marked a further milestone in the advance of the automation of work processes. In 1797 he suggested the manufacture of muskets with completely interchangeable parts. As opposed to the older method under which each gun was the individual product of a highly skilled gunsmith and each part hand-fitted, his method permitted large production runs of parts that were readily fitted to other parts without adjustment and could relatively easy be performed by machines.

By the middle of the 19th century the general concepts of division of labor, assembly of standardized parts and machine-assisted manufacture were well established. On both sides of the Atlantic large factories were in operation, which used specialized machines to improve costs, quality and quantity of their products.

TEXTBLOCK 4/7 // URL: http://world-information.org/wio/infostructure/100437611663/100438659364
 
Doubls Bind Messages

Double bind messages are extremely effective.
For example in Nicaragua the Sandinistas were seen as the personification of the evil. Demonization was the tool to make the U.S.-population to believe that. And the propaganda, called "Operation Truth", succeeded - and is successful until today. The Sandinistas are still considered an enemy in the head of the people. The media played the role of spreading propaganda - nearly without any criticism.
By the end of the 1980s the USA even paid Nicaraguans for voting other parties than the Sandinistas.

El Salvador was a similar case. Again the guerrilla got demonized. The difference was the involvement of the Catholic Church, which was highly fought against by the ruling parties of El Salvador - and those again were financially and organizationally supported by the USA. The elections in the 1980s were more or less paid by the USA.
U.S.-politicians were afraid El Salvador could end up being a second Cuba or Nicaragua. Every means was correct to fight this tendency, no matter what it cost.
On the 21st of September 1996, the Washington Post published several documents proofing an old rumor: not only that Central American soldiers had been educated in a U.S.-army school (the SOA), they also were taught to use torture as a method against revolutionaries. Some of the Salvadorian "students" of that school became very famous for being extremely cruel, one of them being General Roberto d'Aubuisson (35), the person who ordered the killing of Archbishop Oscar Romero in 1980.

TEXTBLOCK 5/7 // URL: http://world-information.org/wio/infostructure/100437611661/100438658752
 
Beautiful bodies

However, artificial beings need not be invisible or look like Arnold Schwarzenegger in "Terminator". "My dream would be to create an artificial man that does not look like a robot but like a beautiful, graceful human being. The artificial man should be beautiful". Nadia Thalman's hopes for beautiful robots may become reality in the work of MIRALab, a research laboratory attached to the University of Geneva dedicated to realistic modelling of human functionalities. The laboratory has produced an artificial Marylyn Monroe showing just how beautiful artificial creatures can be, and there is a biography featuring details of her career and her - however virtual - love life. Yet beautiful creatures have been made before, at leas on the movie screen. Frank-N-furter, the protagonist of the Rocky Horror picture show ("I've been making a man / with blond hair and a tan / and he is good for relieving my /tension) did set remakrable esthetic standards.

While in Hindu mythology, avatars are bodies chosen by gods for their representation on earth, often animals such as swans or horses, the avatars populating cyberspace have a different function. The cyber bodies of real people, often 3 dimensional images of creatures whose aesthetics reflects both the tastes prevalent in the entertainment and advertising industries as the state of art in visual representation.

TEXTBLOCK 6/7 // URL: http://world-information.org/wio/infostructure/100437611777/100438658861
 
Media Giants Online

The following selection does not claim to present an exhaustive listing, but rather picks some of the company's most important assets. Due to the rapid developments in the world of media giants the list is also subject to changes.

Broadcasting

ABC TV Network with 223 affiliated TV stations covering the entire U.S.

ABC Radio Network, with 2,900 affiliated stations throughout the U.S.

Owner of 9 VHF TV stations

Owner of 11 AM and 10 FM stations

Cable TV Systems and Channels/Networks

Disney Channel

80 % of ESPN cable TV channel and ESPN International

50 % of Lifetime cable TV channel

Internet/Interactive

Disney Interactive - entertainment and educational computer software and video games, plus development of content for on-line services.

Partnership with 3 phone companies to provide video programming and interactive services.

ABC Online

TV Production, Movies, Video, Music

Disney Television Production studios and Walt Disney Pictures movie studio

Buena Vista Television production company

Buena Vista Home Video

Miramax and Touchstone movie production companies

Buena Vista Pictures Distribution and Buena Vista International, distributors for Disney and Touchstone movies

Walt Disney Records, and Hollywood Records

Publishing

6 daily newspapers

About 40 weekly magazines, including: Discover, Women's Wear Daily, Los Angeles and Institutional Investor.

Chilton Publications

Guilford Publishing Co.

Hitchcock Publishing Co.

Theme Parks, Resorts, and Travel

Disneyland

Disney World and Disney World Resort

Part owner of Disneyland-Paris and Tokyo Disneyland

12 resort hotels

Disney Vacation Club

Cruise Lines

International TV, Film, and Broadcasting

50 % owner of Tele-München Fernseh GmbH & Co.

50 % owner of RTL Disney Fernseh GmbH & Co.

23 % owner of RTL 2 Fernseh GmbH & Co.

37,5 % owner of TM3 Fernseh GmbH & Co.

20-33 % stake in Eurosport network, Spanish Tesauro SA TV company, and Scandinavian Broadcasting System SA

20 % owner of TVA

Other

Over 500 Disney Stores, and licensing of Disney products

The Mighty Ducks professional hockey team

25 % ownership of California Angels major league baseball team

Business Connections with Other Media Companies

Joint ventures, equity interests, or major arrangements with Bertelsmann, TCI, Hearst Corp., Kirch, and various other media and telephone companies.

TEXTBLOCK 7/7 // URL: http://world-information.org/wio/infostructure/100437611795/100438659155
 
Avatar

Traditionally, an avatar is a mythical figure half man half god. In Hindu mythology, avatars are the form that deities assume when they descend on earth. Greek and Roman mythologies also contain avatars in animal form or half animal, half man. In virtual space, the word avatar refers to a "virtual identity" that a user can construct for him / herself, e.g. in a chat-room. Avatars have also been a preferred object of media art.

INDEXCARD, 1/7
 
Louis Braille

b. Jan. 4, 1809, Coupvray, near Paris, France
d. Jan. 6, 1852, Paris, France

Educator who developed a system of printing and writing that is extensively used by the blind and that was named for him. Himself blind Braille became interested in a system of writing, exhibited at the school by Charles Barbier, in which a message coded in dots was embossed on cardboard. When he was 15, he worked out an adaptation, written with a simple instrument, that met the needs of the sightless. He later took this system, which consists of a six-dot code in various combinations, and adapted it to musical notation. He published treatises on his type system in 1829 and 1837.

INDEXCARD, 2/7
 
Richard Barbrook and Andy Cameron, The Californian Ideology

According to Barbrook and Cameron there is an emerging global orthodoxy concerning the relation between society, technology and politics. In this paper they are calling this orthodoxy the Californian Ideology in honor of the state where it originated. By naturalizing and giving a technological proof to a political philosophy, and therefore foreclosing on alternative futures, the Californian ideologues are able to assert that social and political debates about the future have now become meaningless and - horror of horrors - unfashionable. - This paper argues for an interactive future.

http://www.wmin.ac.uk/media/HRC/ci/calif.html

INDEXCARD, 3/7
 
Netiquette

Although referred to as a single body of rules, there is not just one Netiquette, but there are several, though overlapping largely. Proposing general guidelines for posting messages to newsgroups and mailing lists and using the World Wide Web and FTP, Netiquettes address civility topics (i.e., avoiding hate speech) and comprise technical advises (i.e., using simple and platform-independent file formats).
Well-known Netiquettes are the Request for Comment #1855 and The Net: User Guidelines and Netiquette by Arlene H. Rinaldi.

ftp://ftp.isi.edu/in-notes/rfc1855.txt
http://www.fau.edu/netiquette/net/index.html
INDEXCARD, 4/7
 
blowfish encryption algorithm

Blowfish is a symmetric key block cipher that can vary its length.
The idea behind is a simple design to make the system faster than others.

http://www.counterpane.com/blowfish.html
http://www.counterpane.com/bfsverlag.html

http://www.counterpane.com/blowfish.html
http://www.counterpane.com/blowfish.html
INDEXCARD, 5/7
 
Henry Ford

b. July 30, 1863, Wayne County, Michigan, U.S.
d. April 7, 1947, Dearborn, Michigan, U.S.

American industrialist who revolutionized factory production with his assembly-line methods. Celebrated as both a technological genius and a folk hero, Ford was the creative force behind an industry of unprecedented size and wealth that in only a few decades permanently changed the economic and social character of the United States. Once Ford realized the tremendous part he and his Model T automobile had played in bringing about this change, he wanted nothing more than to reverse it, or at least to recapture the rural values of his boyhood. Henry Ford, then, is an apt symbol of the transition from an agricultural to an industrial America.

INDEXCARD, 6/7
 
Sony Corporation

Japanese SONY KK, major Japanese manufacturer of consumer electronics products. Headquarters are in Tokyo. The company was incorporated in 1946 and spearheaded Japan's drive to become the world's dominant consumer electronics manufacturer in the late 20th century. The company was one of the first to recognize the potential of the consumer videotape market. In 1972 it formed an affiliate to market its Betamax colour videocassette system. In 1987-88 Sony purchased the CBS Records Group from CBS Inc., thus acquiring the world's largest record company. It followed that purchase with the purchase in 1989 of Columbia Pictures Entertainment Inc.

INDEXCARD, 7/7