Information to Users

Total Page:16

File Type:pdf, Size:1020Kb

Information to Users INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely afreet reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand corner and continuing from left to right in equal sections with small overlaps. Each original is also photographed in one exposure and is included in reduced form at the back of the book. Photographs included in the original manuscript have been reproduced xerographically in this copy. Higher quality 6" x 9" black and white photographic prints are available for any photographs or illustrations appearing in this copy for an additional charge. Contact UMI directly to order. UMI A Bell & Howell Information Company 300 North Zeeb Road, Ann Arbor MI 48106-1346 USA 313/761-4700 800/521-0600 IMPLEMENTING A TECHNOLOGICAL INNOVATION IN SMALL BUSINESS CENTERS IN KENYA: BARRIERS AND USER CONCERNS BY JASON MUNYIRIGITHEKO B. Engr., South Gujarat University, 1990 Ed. M., University of Illinois, 1992 THESIS Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Education in the Graduate College of the University of Illinois at Urbana-Champaign, 1996 Urbana, Illinois UMI Number: 9712283 UMI Microform 9712283 Copyright 1997, by UMI Company. All rights reserved. This microform edition is protected against unauthorized copying under Title 17, United States Code. UMI 300 North Zeeb Road Ann Arbor, MI 48103 © Copyright by Jason Munyiri Githeko, 1996 UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN THE GRADUATE COLLEGE MAY 1996 WE HEREBY RECOMMEND THAT THE THESIS BY JASON MUNYIRI GITHEKO IMPLEMENTING A TECHNOLOGICAL INNOVATION IN SMALL BUSINESS ENTITLED. CENTERS IN KENYA: BARRIERS AND USER CONCERNS BE ACCEPTED IX PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF_ DOCTOR OF PHILOSOPHY Js*#<?. Director of Thesis Research J Head of Department Committee on Final Examination^ Required for doctor's degree but not for master's. ABSTRACT IMPLEMENTING A TECHNOLOGICAL INNOVATION IN SMALL BUSINESS CENTERS IN KENYA: BARRIERS AND USER CONCERNS Jason Munyiri Githeko, Ph.D. Graduate College University of Illinois at Urbana-Champaign, 1996 Dr. Scott D. Johnson, Advisor Problem. The performance African institutions has been negatively affected by the difficulty of communicating with other institutions. Despite several attempts to use low- cost computer networks to alleviate this problem, little is known about the factors that influence the success of implementation. Purpose. This study aimed to examine the process of implementing a FidoNet Bulletin Board System (BBS) in Kenya with a focus on: (a) factors that should be considered; (b) barriers to implementation; (c) changes in the concerns of BBS users; and (d) change in BBS users' perceptions regarding the utility of the BBS. The Concerns- Based Adoption Model developed by G. E. Hall and colleagues and E. M. Rogers' diffusion of innovations model constituted the conceptual framework. Method. A case study approach was adopted with the case consisting of four Small Business Centers (SBC) and a network services provider. Observations and interviews were conducted during site visits over a four-month period. Concurrently, modems and communication software were installed and SBC staff trained in their use. Two questionnaires were pre- and post-administered to participants to measure changes in user concerns and in their perception of the BBS' utility. Results and Conclusions. The categories of factors that need to be considered were: (a) effective promotion of networking; (b) the nature and reliability of telephone services; (c) computer systems maintenance; (d) security of equipment; (e) human resource concerns: (0 communication and coordination with project participants; (g) finance and budgetary iii priorities; (h) cooperation among networking service providers; and (d) government procedures and regulations. The categories of barriers identified were: (a) interpersonal and inter-organizational conflicts; (b) technical difficulties; (c) financial constraints; (d) regulatory problems; (e) skill and motivational problems; and (f) inadequate decision support systems. At the end of the study, users still displayed the profiles of new or non-users of the innovation (BBS) and their perception of utility of the BBS showed no change; consequently, it was concluded that substantial change in user concerns and perception of utility may take much more than four months. A number of recommendations are made and several areas of further study suggested. iv DEDICATION To my wife Nduta and children, Mithamo and Wamuyu also; to my dear parents who have passed on. But his delight is in the law of the Lord; and in the law doth meditate day and night. And he shall be like a tree planted by the rivers of water that bringeth forth fruit in due season; his leaf also shall not wither; and whatsoever he doeth shall prosper. Psalms 1:2-3 ACKNOWLEDGMENTS I would like to express a special thanks to my dissertation committee Dr. Scott D. Johnson; Dr. Mildred Griggs; Dr. Robert Nelson; and Dr. Michael Waugh for their valuable critiques and recommendations. As my academic advisor and thesis director. Dr. Johnson was instrumental in steering me towards my present focus. He found new ways of doing things when I thought I had run out of viable options. Dr. Johnson's own achievements as a teacher, researcher, and writer will continue motivate and inspire me. To Dr. Mildred Griggs who provided me an opportunity to be directly involved in research and to acquire some of the skills that I needed for my own work, I have the deepest gratitude. Her research project also provided me financial support for the two of the three years I spent as a full time student at the University of Illinois. I will be forever grateful for her concern and support especially at those crucial moments of crisis. Dr. Robert Nelson was instrumental in initiating the entrepreneurs hip and small enterprise movement in Kenya and in my enrollment at the University of Illinois. He has continued to be a visionary always seeking new frontiers in entrepreneurship development and always encouraging those in this field to aim for bigger goals. I acknowledge the financial support provided by the UNDP/ILO Entrepreneurship Education Project in Kenya and by the Center for Africa Studies at the University of Illinois. I owe an irredeemable debt to my wife Nduta my children Mithamo and Wamuyu who provided a refuge and fulfillment beyond the world of academic pursuits. I thank many other people for friendship, prayers, and encouragement. They include my extended family in Kenya and members of Champaign Alliance Church. Finally, I must acknowledge the ultimate source of strength and be thankful for the privilege of a personal knowledge of He who has made abundant provisions in the last four years. He has faithfully provided as He promised: "Delight thyself also in the Lord; and he shall give thee the desires of thine heart" (Psalms 37:4). vi TABLE OF CONTENTS CHAPTER PAGE 1 INTRODUCTION 1 Purpose of the Study 2 Research Questions 3 Significance of the Study 3 Assumptions 4 Limitations of the Study 4 Definitions 4 Summary 7 2 REVIEW OF THE LITERATURE 8 National Development in Kenya 8 Small Enterprise Development 9 Entrepreneurship Development 10 Entrepreneurship Education 10 Communication and Development 11 Information 12 Innovation 15 Technology 16 Technological Innovation 17 Social Interaction Models 18 Research, Development, and Diffusion Model 18 Problem-Solver Model 18 Stage Models 19 Implementation Models 22 Diffusion of Innovations Models 22 Concerns-Based Adoption Model 26 Bulletin Board Systems 31 History 31 Utility 32 Implementation Considerations 34 Summary 35 3 METHODOLOGY 36 The Case 38 vu TABLE OF CONTENTS (CONTINUED) CHAPTER PAGE Selection of the Four Sites 40 Selection of BBS Provider 41 Site Profiles 42 Data Organizing Elements 51 Instrumentation 53 Stages of Concern Questionnaire 53 BBS Utility Questionnaire 54 Document Review, Observation, and Interview Guide 54 BBS Operator's Interview Guide 55 Data Collection 55 The Network Service Center 58 Data Analysis 59 Summary 61 4 RESULTS 62 Events and Experiences in the Field 62 Week 1 (August 24-27) 62 " 2 63 " 3 64 " 4 68 " 5 69 " 6 72 " 7 76 " 8 80 " 9 83 " 10 84 " 11 87 " 12 89 " 15 92 " 16 93 " 17 94 " 18 95 vui TABLE OF CONTENTS (CONTINUED) CHAPTER PAGE Perceived Utility of the BBS 96 Factors to Consider When Implementing a BBS 103 Promotion of Networking 104 Telephone Services 106 Computer System Maintenance 108 Security 109 Human Resource Concerns 110 Communication and Coordination 114 Finance and Budgetary Priorities 116 Cooperation Between Network Service Providers 117 Government 117 Barriers and Problems During Implementation 118 Interpersonal and Inter-Organizational Conflicts 120 Technical Difficulties 121 Financial Constraints 125 Regulatory Problems 126 Skill and Motivational Problems 127 Inadequate Decision Support Systems 130 Other Issues 130 Concerns of Users About the Innovation 131 Implications of the Concerns-Based Adoption Model 136 Summary 142 5 DISCUSSION 143 Factors to Consider When Implementing a BBS and Barriers to Implementation 143 Perception of BBS Utility 147 User Concerns About the Innovation 149 Participant Observer Effect 150 Innovation Champions and Facilitators 154 The Role of Vision 155 Conclusions 157 IX TABLE OF CONTENTS (CONTINUED) CHAPTER PAGE Recommendations 158 Suggestions for Further Research 161 Summary 163 REFERENCES 167 APPENDIX A: DOCUMENT REVIEW, INFORMAL INTERVIEWS.
Recommended publications
  • History of the Internet-English
    Sirin Palasri Steven Huter ZitaWenzel, Ph.D. THE HISTOR Y OF THE INTERNET IN THAILAND Sirin Palasri Steven G. Huter Zita Wenzel (Ph.D.) The Network Startup Resource Center (NSRC) University of Oregon The History of the Internet in Thailand by Sirin Palasri, Steven Huter, and Zita Wenzel Cover Design: Boonsak Tangkamcharoen Published by University of Oregon Libraries, 2013 1299 University of Oregon Eugene, OR 97403-1299 United States of America Telephone: (541) 346-3053 / Fax: (541) 346-3485 Second printing, 2013. ISBN: 978-0-9858204-2-8 (pbk) ISBN: 978-0-9858204-6-6 (English PDF), doi:10.7264/N3B56GNC ISBN: 978-0-9858204-7-3 (Thai PDF), doi:10.7264/N36D5QXN Originally published in 1999. Copyright © 1999 State of Oregon, by and for the State Board of Higher Education, on behalf of the Network Startup Resource Center at the University of Oregon. This work is licensed under a Creative Commons Attribution- NonCommercial 3.0 Unported License http://creativecommons.org/licenses/by-nc/3.0/deed.en_US Requests for permission, beyond the Creative Commons authorized uses, should be addressed to: The Network Startup Resource Center (NSRC) 1299 University of Oregon Eugene, Oregon 97403-1299 USA Telephone: +1 541 346-3547 Email: [email protected] Fax: +1 541-346-4397 http://www.nsrc.org/ This material is based upon work supported by the National Science Foundation under Grant No. NCR-961657. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
    [Show full text]
  • Telecommunications Infrastructure for Electronic Delivery 3
    Telecommunications Infrastructure for Electronic Delivery 3 SUMMARY The telecommunications infrastructure is vitally important to electronic delivery of Federal services because most of these services must, at some point, traverse the infrastructure. This infrastructure includes, among other components, the Federal Government’s long-distance telecommunications program (known as FTS2000 and operated under contract with commercial vendors), and computer networks such as the Internet. The tele- communications infrastructure can facilitate or inhibit many op- portunities in electronic service delivery. The role of the telecommunications infrastructure in electronic service delivery has not been defined, however. OTA identified four areas that warrant attention in clarifying the role of telecommunications. First, Congress and the administration could review and update the mission of FTS2000 and its follow-on contract in the context of electronic service delivery. The overall perform- ance of FTS2000 shows significant improvement over the pre- vious system, at least for basic telephone service. FTS2000 warrants continual review and monitoring, however, to assure that it is the best program to manage Federal telecommunications into the next century when electronic delivery of Federal services likely will be commonplace. Further studies and experiments are needed to properly evaluate the benefits and costs of FTS2000 follow-on options from the perspective of different sized agencies (small to large), diverse Federal programs and recipients, and the government as a whole. Planning for the follow-on contract to FTS2000 could consider new or revised contracting arrangements that were not feasible when FTS2000 was conceived. An “overlapping vendor” ap- proach to contracting, as one example, may provide a “win-win” 57 58 I Making Government Work situation for all parties and eliminate future de- national infrastructure will be much stronger if bates about mandatory use and service upgrades.
    [Show full text]
  • SCHEDULE H – SERVICE DESCRIPTIONS 1. in Accordance with the Agreement, TELUS Will As of the Effective Date Make Available to T
    SCHEDULE H – SERVICE DESCRIPTIONS 1. In accordance with the Agreement, TELUS will as of the Effective Date make available to the GPS Entities the Available Services described in the following Attachments to this Schedule H: a) Attachment H1 - Long Distance Services; i) Attachment H1-A – Outbound Long Distance Services; ii) Attachment H1-B – Calling Card Services; and iii) Attachment H1-C – Toll-Free Services; b) Attachment H2 – Conferencing Services; i) Attachment H2-A - Reservation-less Conferencing Services; ii) Attachment H2-B - Operator Assisted Conferencing Services; iii) Attachment H2-C - Event Conferencing Services; iv) Attachment H2-D - Web Conferencing Services; and v) Attachment H2-E – Crisis Management Conferencing Services; c) Attachment H3 – Voice Services; i) Attachment H3-A – Hosted Telephony Services; ii) Attachment H3-B – Exchange Services; and iii) Attachment H3-C - Hosted IVR Services; d) Attachment H5 – Data Services; i) Attachment H5-A – Initial Data Services ii) Attachment H5-B – Internet and Security Services; iii) Attachment H5-C – Optical Ethernet Service; and iv) Attachment H5-E – STS WAN L3 VPN Services; and e) Attachment H9 – Cellular Services; i) Attachment H9-A – Standard Cellular Services; and ii) Attachment H9-B – iDEN Network (Mike) Services; and f) Attachment H10 – Hardware and Software Procurement Services. 1 Telecommunications Services Master Agreement 2. TELUS will provide the Available Services described in the Attachments to this Schedule if and when requested by a GPS Entity pursuant to a Service Order or Service Change Order, subject to section 7.4.3 of the main body of this Agreement, in each case entered into in accordance with the terms of this Agreement, for the applicable Fees as set out in the Price Book and/or, subject to section 1.3.3 of the main body of this Agreement, the applicable Service Order or Service Change Order and as such Available Services are delivered in accordance with the terms of the Agreement including, without limitation, the Service Levels for such Services.
    [Show full text]
  • The Future of the Internet and How to Stop It the Harvard Community Has
    The Future of the Internet and How to Stop It The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. Jonathan L. Zittrain, The Future of the Internet -- And How to Citation Stop It (Yale University Press & Penguin UK 2008). Published Version http://futureoftheinternet.org/ Accessed July 1, 2016 4:22:42 AM EDT Citable Link http://nrs.harvard.edu/urn-3:HUL.InstRepos:4455262 This article was downloaded from Harvard University's DASH Terms of Use repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http://nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms- of-use#LAA (Article begins on next page) YD8852.i-x 1/20/09 1:59 PM Page i The Future of the Internet— And How to Stop It YD8852.i-x 1/20/09 1:59 PM Page ii YD8852.i-x 1/20/09 1:59 PM Page iii The Future of the Internet And How to Stop It Jonathan Zittrain With a New Foreword by Lawrence Lessig and a New Preface by the Author Yale University Press New Haven & London YD8852.i-x 1/20/09 1:59 PM Page iv A Caravan book. For more information, visit www.caravanbooks.org. The cover was designed by Ivo van der Ent, based on his winning entry of an open competition at www.worth1000.com. Copyright © 2008 by Jonathan Zittrain. All rights reserved. Preface to the Paperback Edition copyright © Jonathan Zittrain 2008. Subject to the exception immediately following, this book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S.
    [Show full text]
  • TELUS Corporation Annual Information Form for the Year Ended
    TELUS Corporation annual information form for the year ended December 31, 2005 March 20, 2006 FORWARD LOOKING STATEMENTS.................................................................................................2 TELUS .........................................................................................................................................................2 OPERATIONS, ORGANIZATION AND CORPORATE DEVELOPMENTS ...................................5 EMPLOYEE RELATIONS .....................................................................................................................14 CAPITAL ASSETS AND GOODWILL.................................................................................................15 ALLIANCES .............................................................................................................................................17 LEGAL PROCEEDINGS ........................................................................................................................20 FOREIGN OWNERSHIP RESTRICTIONS.........................................................................................22 REGULATION .........................................................................................................................................23 COMPETITION .......................................................................................................................................32 DIVIDENDS DECLARED.......................................................................................................................35
    [Show full text]
  • Application Research and Evaluation Methods of Instant Messaging Software
    International Journal of Multimedia and Ubiquitous Engineering Vol.11, No.7 (2016), pp.279-290 http://dx.doi.org/10.14257/ijmue.2016.11.7.28 Application Research and Evaluation Methods of Instant Messaging Software Sun Beibei Zibo Vocational Institute, Zibo, China, 255314 [email protected] Abstract With the rapid development of computer and communication technology, instant messaging software has become more and more important communication platform, but because of the diversity of the instant communication software, there have not unified specification management, lack of evaluation research for the system. Aiming at finding instant messaging software how to affect the use factors of the user, this paper uses the hierarchy analytic process (hap) and Delphi method, established the application evaluation system of instant messaging software, the usage of instant messaging software and services function be researched. Keywords: Instant messaging software; Delphi method; Hierarchy Analytic process (hap); Evaluation system 1. Introduction Instant messaging (IM) refers to a business that can carry on the Internet information to send and receive instantly, communication instantly [1]. Since 1998, IM obtained the swift and violent development, its function also more and more perfect, such as have blogs, search, music, games, etc. IM started only simple chat, now it has developed into a comprehensive information platform, integrated with news and information, communication, electronic commerce, entertainment, search, office collaboration and enterprise customer service, etc. all kinds of information. E-mail as a communication tool, but it has its own disadvantages, such as ductility flawed, however IM just make up for the shortcomings, makes the terminal capable of communications at any time, contact at any time to view the status information.
    [Show full text]
  • Free Chat Application for Mobile
    Free Chat Application For Mobile Well-defined Dimitrios sometimes ruralized his coercionists expressively and coze so unmeasurably! Falconine and possessive Ambrose typecast her Cantab dig treacherously or forge seasonably, is Dave foveate? Marko withdrawing binocularly while silty Rad citrate lowest or clapboard conversely. As free chat application for mobile and only LiveChat Applications Live Chat App. Line application for free to choose the pro features are a welcome back. Olark is a seamless process. Very informative article tuition is. Chat app store that you can plug it offers basic visitor behavior or business with a popular than one place for hcl including text? Can I use it pinch my desktop? Look for free to use the application in addition of. Crisp free chat with the app will not just one for mobile application enables you are. Please publish an employee account may be rotten to mark statistics as favorites. You for free by providing fast. The developer will be required to enjoy privacy details when they submit or next app update. Free version covers most basic requirements Live chat support apps for mobile devices Gorgeous multi-language chat widgets Analytics and. Allows for free and chats with a free plan to extend or pwas are many online project supported for you can keep yourself how? Slack his work happens. Free 14-day trial your plan features No credit card required Desktop Apps. Chat App Maker Mobile app builder Shoutem. Best live Chat Software 2021 Reviews of agriculture Most Popular. Keep sharing more interesting posts. Hire a Zapier Expert to help someone improve processes and automate workflows.
    [Show full text]
  • Trojans and Malware on the Internet an Update
    Attitude Adjustment: Trojans and Malware on the Internet An Update Sarah Gordon and David Chess IBM Thomas J. Watson Research Center Yorktown Heights, NY Abstract This paper continues our examination of Trojan horses on the Internet; their prevalence, technical structure and impact. It explores the type and scope of threats encountered on the Internet - throughout history until today. It examines user attitudes and considers ways in which those attitudes can actively affect your organization’s vulnerability to Trojanizations of various types. It discusses the status of hostile active content on the Internet, including threats from Java and ActiveX, and re-examines the impact of these types of threats to Internet users in the real world. Observations related to the role of the antivirus industry in solving the problem are considered. Throughout the paper, technical and policy based strategies for minimizing the risk of damage from various types of Trojan horses on the Internet are presented This paper represents an update and summary of our research from Where There's Smoke There's Mirrors: The Truth About Trojan Horses on the Internet, presented at the Eighth International Virus Bulletin Conference in Munich Germany, October 1998, and Attitude Adjustment: Trojans and Malware on the Internet, presented at the European Institute for Computer Antivirus Research in Aalborg, Denmark, March 1999. Significant portions of those works are included here in original form. Descriptors: fidonet, internet, password stealing trojan, trojanized system, trojanized application, user behavior, java, activex, security policy, trojan horse, computer virus Attitude Adjustment: Trojans and Malware on the Internet Trojans On the Internet… Ever since the city of Troy was sacked by way of the apparently innocuous but ultimately deadly Trojan horse, the term has been used to talk about something that appears to be beneficial, but which hides an attack within.
    [Show full text]
  • Copyrighted Material
    Index AAAS (American Association for adolescence Mali; Mauritania; the Advancement of Science), identity development among, Mozambique; Namibia; 91 306 Nigeria; Rwanda; Senegal; Aakhus, M., 178 identity practices of boys, 353 South Africa; Tanzania; Aarseth, Espen, 292n revelation of personal Uganda; Zambia abbreviations, 118, 120, 121, 126, information by, 463 African-Americans, 387 127, 133, 134 psychological framework of, 462 identity practices of adolescent ABC (American Broadcasting advertising, 156, 329, 354, 400, boys, 353 Company), 413, 416 415, 416, 420–1 political discussion, 174 ABC (Australian Broadcasting banner, 425 African Global Information Commission), 420 elaborate and sophisticated, 409 Infrastructure Gateway Aboriginal people, 251, 253, porn, 428 Project, see Leland 257–8, 262, 263 revenues, 417, 418, 419, 435 age, 280, 431, 432 abusive imageries, 431 Advertising Age, 417 porn images, 433 accessibility, 13, 50–1, 53, 424 aesthetics, 391, 425, 428, 430, agency, 44, 53, 55, 62, 312 balancing security and, 278 434 conditioned and dominated by control of, 388 alternative, 427 profit, 428 increasing, 223 digital, 407 technologically enhanced, 195 limited, 26 familiar, 435 AHA (American Historical private, 94 games designer, 75 Association), 86 public, 94, 95 play and, 373 Ahmed, Sara, 286–7, 288 see also Internet access promotional, 409 AILLA (Archive of the Indigenous accountability, 151, 191, 199, Afghanistan, 205 Languages of Latin America), 207, 273, 276, 277 AFHCAN (Alaska Federal 263 balancing privacy and, 278 Healthcare
    [Show full text]
  • A Peer-To-Peer Internet for the Developing World SAIF, CHUDHARY, BUTT, BUTT, MURTAZA
    A Peer-to-Peer Internet for the Developing World SAIF, CHUDHARY, BUTT, BUTT, MURTAZA Research Article A Peer-to-Peer Internet for the Developing World Umar Saif Abstract [email protected] Users in the developing world are typically forced to access the Internet at a Associate Professor fraction of the speed achievable by a standard v.90 modem. In this article, we Department of Computer Science, LUMS present an architecture to enable ofºine access to the Internet at the maxi- Opposite Sector U, DHA mum possible speed achievable by a standard modem. Our proposed architec- Lahore 54600 ture provides a mechanism for multiplexing the scarce and expensive interna- Pakistan tional Internet bandwidth over higher bandwidth P2P (peer-to-peer) dialup ϩ92 04 205722670, Ext. 4421 connections within a developing country. Our system combines a number of architectural components, such as incentive-driven P2P data transfer, intelli- Ahsan Latif Chudhary gent connection interleaving, and content-prefetching. This article presents a Research Associate detailed design, implementation, and evaluation of our dialup P2P data trans- Department of Computer fer architecture inspired by BitTorrent. Science, LUMS Opposite Sector U, DHA Lahore 54600 Pakistan 1. Introduction The “digital divide” between the developed and developing world is un- Shakeel Butt derscored by a stark discrepancy in the Internet bandwidth available to Research Associate end-users. For instance, while a 2 Mbps ADSL link in the United States Department of Computer costs around US$40/month, a 2 Mbps broadband connection in Pakistan Science, LUMS costs close to US$400/month. Opposite Sector U, DHA The reasons for the order of magnitude difference in end-user band- Lahore 54600 Pakistan width in the developed and the developing world are threefold: • Expensive International Bandwidth: Developing countries often Nabeel Farooq Butt have to pay the full cost of a link to a hub in a developed country, Research Associate making the cost of broadband Internet connections inherently ex- Department of Computer pensive for ISPs.
    [Show full text]
  • Copyrighted Material
    1 Evolution from 2G over 3G to 4G In the past 15 years, fixed line and wireless telecommunication as well as the Internet have developed both very quickly and very slowly depending on how one looks at the domain. To set current and future developments into perspective, the first chapter of this book gives a short overview of major events that have shaped these three sectors in the previous one-and-a-half decades. While the majority of the developments described below took place in most high-tech countries, local factors and national regulation delayed or accelerated events. Therefore, the time frame is split up into a number of periods and specific dates are only given for country-specific examples. 1.1 First Half of the 1990s – Voice-centric Communication Fifteen years ago, in 1993, Internet access was not widespread and most users were either studying or working at universities or in a few select companies in the IT industry. At this time, whole universities were connected to the Internet with a data rate of 9.6 kbit/s. Users had computers at home but dial-up to the university network was not yet widely used. Distributed bulletin board networks such as the Fidonet [1] were in widespread use by the few people who were online then. It can therefore be said that telecommunication 15 years ago was mainly voice-centric from a mass market point of view. An online telecom news magazine [2] gives a number of interesting figures on pricing around that time, when the telecom monopolies where still in place in most European countries.
    [Show full text]
  • History of the Emergency Communications Center
    History of the Emergency Communications Center Station X in 1964 The Emergency Communications Center, as it is known today, was first established in 1931 as "Station X" inside Cincinnati's City Hall; that marks the first time the city's responders were dispatched by radio to emergencies. Over the years, ECC's operations and technology have evolved significantly. The center has moved physically from City Hall to Eden Park, on to Police Headquarters and finally to "Knob Hill" in South Fairmont, where it overlooks Union Terminal and the city's downtown. The name of the center has changed several times - but the mission of ECC, getting help to people in Cincinnati, has been a constant for 90 years. Emergency Communications Before ECC The Cincinnati Police Department dates back to a night watch established in 1802, with the police force being organized in 1859. Shortly after the Civil War, in 1866, a telegraph system replaced the need for messengers running between police stations. This system linked stations and some public locations in the city. Telephones were adopted in 1879, which allowed for the installation of the Police Call Box in locations around the city. It also enabled officers to periodically check in with their station while out on patrol. The Greater Cincinnati Police Museum has call boxes on display and a history of their use on the museum website. The Cincinnati Fire Department was established in 1853, and in the late 1800s, a fire watchtower was manned to spot fires and ring bells to alert the city's firefighters. A Fire Alarm Telegraph Office served the city in the early 1900s, receiving alarms and signaling fire companies.
    [Show full text]