An Oral History of the Internet How the Web Was Won
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
(Hardening) De Navegadores Web Más Utilizados
UNIVERSIDAD DON BOSCO VICERRECTORÍA DE ESTUDIOS DE POSTGRADO TRABAJO DE GRADUACIÓN Endurecimiento (Hardening) de navegadores web más utilizados. Caso práctico: Implementación de navegadores endurecidos (Microsoft Internet Explorer, Mozilla Firefox y Google Chrome) en un paquete integrado para Microsoft Windows. PARA OPTAR AL GRADO DE: MAESTRO EN SEGURIDAD Y GESTION DEL RIESGO INFORMATICO ASESOR: Mg. JOSÉ MAURICIO FLORES AVILÉS PRESENTADO POR: ERICK ALFREDO FLORES AGUILAR Antiguo Cuscatlán, La Libertad, El Salvador, Centroamérica Febrero de 2015 AGRADECIMIENTOS A Dios Todopoderoso, por regalarme vida, salud y determinación para alcanzar un objetivo más en mi vida. A mi amada esposa, que me acompaño durante toda mi carrera, apoyó y comprendió mi dedicación de tiempo y esfuerzo a este proyecto y nunca dudó que lo concluiría con bien. A mis padres y hermana, que siempre han sido mis pilares y me enseñaron que lo mejor que te pueden regalar en la vida es una buena educación. A mis compañeros de trabajo, que mediante su esfuerzo extraordinario me han permitido contar con el tiempo necesario para dedicar mucho más tiempo a la consecución de esta meta. A mis amigos de los que siempre he tenido una palabra de aliento cuando la he necesitado. A mi supervisor y compañeros de la Escuela de Computación de la Universidad de Queens por facilitarme espacio, recursos, tiempo e información valiosa para la elaboración de este trabajo. A mi asesor de tesis, al director del programa de maestría y mis compañeros de la carrera, que durante estos dos años me han ayudado a lograr esta meta tan importante. Erick Alfredo Flores Aguilar INDICE I. -
La Protección De La Intimidad Y Vida Privada En Internet La Integridad
XIX Edición del Premio Protección de Datos Personales de Investigación de la Agencia Española de Protección de Datos PREMIO 2015 Las redes sociales se han convertido en una herramienta de comu- nicación y contacto habitual para millones de personas en todo el La protección de la intimidad mundo. De hecho, se calcula que más de un 75% de las personas Amaya Noain Sánchez que se conectan habitualmente a Internet cuentan con al menos un y vida privada en internet: la perfil en una red social. La autora plantea en el texto si las empre- sas propietarias de estos servicios ofrecen una información sufi- integridad contextual y los flujos de ciente a los usuarios sobre qué datos recogen, para qué los van a información en las redes sociales utilizar y si van a ser cedidos a terceros. En una reflexión posterior, propone como posibles soluciones el hecho de que estas empresas (2004-2014) pudieran implantar directrices técnicas compartidas y una adapta- ción normativa, fundamentalmente con la privacidad desde el di- seño, la privacidad por defecto y el consentimiento informado. Así, Amaya Noain Sánchez el resultado sería un sistema de información por capas, en el que el usuario fuera conociendo gradualmente las condiciones del trata- miento de su información personal. Este libro explica el funcionamiento de una red social, comenzan- do por la creación del perfil de usuario en el que se suministran datos, y analiza cómo la estructura del negocio está basada en la monetización de los datos personales, con sistemas como el targe- ting (catalogando al usuario según sus intereses, características y predilecciones) y el tracking down (cruzando información dentro y fuera de la red). -
Download the Paper (PDF)
Joan Shorenstein Center on the Press, Politics and Public Policy Discussion Paper Series Leading the Way to Better News: The Role of Leadership in a World Where Most of the “Powers That Be” Became the “Powers That Were” By Geoffrey Cowan Shorenstein Center Fellow, Fall 2007 University Professor and Annenberg Family Chair in Communication Leadership, University of Southern California February 15, 2008 #D-44 © 2008 President and Fellows of Harvard College. All rights reserved. Abstract During the past several years, as traditional news operations have faced sharp declines in circulation, advertising, viewership, and audiences, and as they have begun to make a seemingly unrelenting series of cuts in the newsroom budgets, scholars and professionals have been seeking formulas or models designed to reverse the trend. During those same years, many of the major news organizations that dominated the landscape a generation ago, those that David Halberstam called “The Powers That Be,” have lost their leadership role and been absorbed by other companies. This paper argues that while there is good reason to worry about the decline in what might be called “boots-on-the-ground” journalism, there are reasons to be hopeful. While most of those concerned with the topic have urged structural changes in ownership, this paper argues that the key is leadership. To understand the demands on leaders, it is essential to understand which of three motives is most important to the publication’s owners: profits, influence, or personal prestige. Each motive presents distinct challenges and opportunities. Looking at the fate of a number of large media organizations over the past decade, the paper argues that the most important model for success is outstanding leadership that combines a talent for business, entrepreneurship and innovation with a profound commitment to great journalism. -
Marconi Society - Wikipedia
9/23/2019 Marconi Society - Wikipedia Marconi Society The Guglielmo Marconi International Fellowship Foundation, briefly called Marconi Foundation and currently known as The Marconi Society, was established by Gioia Marconi Braga in 1974[1] to commemorate the centennial of the birth (April 24, 1874) of her father Guglielmo Marconi. The Marconi International Fellowship Council was established to honor significant contributions in science and technology, awarding the Marconi Prize and an annual $100,000 grant to a living scientist who has made advances in communication technology that benefits mankind. The Marconi Fellows are Sir Eric A. Ash (1984), Paul Baran (1991), Sir Tim Berners-Lee (2002), Claude Berrou (2005), Sergey Brin (2004), Francesco Carassa (1983), Vinton G. Cerf (1998), Andrew Chraplyvy (2009), Colin Cherry (1978), John Cioffi (2006), Arthur C. Clarke (1982), Martin Cooper (2013), Whitfield Diffie (2000), Federico Faggin (1988), James Flanagan (1992), David Forney, Jr. (1997), Robert G. Gallager (2003), Robert N. Hall (1989), Izuo Hayashi (1993), Martin Hellman (2000), Hiroshi Inose (1976), Irwin M. Jacobs (2011), Robert E. Kahn (1994) Sir Charles Kao (1985), James R. Killian (1975), Leonard Kleinrock (1986), Herwig Kogelnik (2001), Robert W. Lucky (1987), James L. Massey (1999), Robert Metcalfe (2003), Lawrence Page (2004), Yash Pal (1980), Seymour Papert (1981), Arogyaswami Paulraj (2014), David N. Payne (2008), John R. Pierce (1979), Ronald L. Rivest (2007), Arthur L. Schawlow (1977), Allan Snyder (2001), Robert Tkach (2009), Gottfried Ungerboeck (1996), Andrew Viterbi (1990), Jack Keil Wolf (2011), Jacob Ziv (1995). In 2015, the prize went to Peter T. Kirstein for bringing the internet to Europe. Since 2008, Marconi has also issued the Paul Baran Marconi Society Young Scholar Awards. -
Tim Berners-Lee, Lauréat Du Prix Turing 2016 Pour Avoir Inventé... Le Web Fabien Gandon
Pour tout le monde : Tim Berners-Lee, lauréat du prix Turing 2016 pour avoir inventé... le Web Fabien Gandon To cite this version: Fabien Gandon. Pour tout le monde : Tim Berners-Lee, lauréat du prix Turing 2016 pour avoir inventé... le Web. 1024 : Bulletin de la Société Informatique de France, Société Informatique de France, 2017, <http://www.societe-informatique-de-france.fr/bulletin/1024-numero-11/>. <hal-01623368> HAL Id: hal-01623368 https://hal.inria.fr/hal-01623368 Submitted on 25 Oct 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. PRIX ET DISTINCTIONS Pour tout le monde : Tim Berners-Lee, lauréat du prix Turing 2016 pour avoir inventé... le Web Fabien Gandon 1 Introduction « Je suis moi et mes circonstances. » – Jose Ortega Quel pourrait être un point commun entre se renseigner à propos d’un concert, effectuer un virement depuis son compte bancaire, publier une base de données gé- nomiques, échanger avec ses enfants à l’autre bout du monde et accéder aux données de sa voiture [1] ? Le fait de pouvoir le faire à travers le Web. Il est en effet difficile de trouver une activité humaine qui n’ait pas été impactée par le Web et, alors que j’écris cet article en avril 2017, on estime que le Web compte plus de trois milliards d’uti- lisateurs directs de par le monde. -
I: the Conception
Excerpt from: Mayo, Keenan and Newcomb, Peter. “How the Web Was Won,” Vanity Fair, July 2008. I: The Conception Paul Baran, an electrical engineer, conceived one of the Internet’s building blocks—packet switching— while working at the Rand Corporation around 1960. Packet switching breaks data into chunks, or “packets,” and lets each one take its own path to a destination, where they are re-assembled (rather than sending everything along the same path, as a traditional telephone circuit does). A similar idea was proposed independently in Britain by Donald Davies. Later in his career, Baran would pioneer the airport metal detector. Paul Baran: It was necessary to have a strategic system that could withstand a first attack and then be able to return the favor in kind. The problem was that we didn’t have a survivable communications system, and so Soviet missiles aimed at U.S. missiles would take out the entire telephone- communication system. At that time the Strategic Air Command had just two forms of communication. One was the U.S. telephone system, or an overlay of that, and the other was high-frequency or shortwave radio. So that left us with the interesting situation of saying, Well, why do the communications fail when the bombs were aimed, not at the cities, but just at the strategic forces? And the answer was that the collateral damage was sufficient to knock out a telephone system that was highly centralized. Well, then, let’s not make it centralized. Let’s spread it out so that we can have other paths to get around the damage. -
Wrong Turn in Cyberspace: Using ICANN to Route Around the APA and the Constitution A
University of Miami Law School University of Miami School of Law Institutional Repository Articles Faculty and Deans 2000 Wrong Turn in Cyberspace: Using ICANN to Route Around the APA and the Constitution A. Michael Froomkin University of Miami School of Law, [email protected] Follow this and additional works at: https://repository.law.miami.edu/fac_articles Part of the Constitutional Law Commons, and the Internet Law Commons Recommended Citation A. Michael Froomkin, Wrong Turn in Cyberspace: Using ICANN to Route Around the APA and the Constitution, 50 Duke L.J. 17 (2000). This Article is brought to you for free and open access by the Faculty and Deans at University of Miami School of Law Institutional Repository. It has been accepted for inclusion in Articles by an authorized administrator of University of Miami School of Law Institutional Repository. For more information, please contact [email protected]. WRONG TURN IN CYBERSPACE: USING ICANN TO ROUTE AROUND THE APA AND THE CONSTITUTION A. MICHAEL FROOMKINt ABSTRACT The Internet relies on an underlying centralized hierarchy built into the domain name system (DNS) to control the routing for the vast majority of Internet traffic. At its heart is a single data file, known as the "root." Control of the root provides singular power in cyber- space. This Article first describes how the United States government found itself in control of the root. It then describes how, in an attempt Copyright © 2000 by A. Michael Froomkin. t Professor, University of Miami School of Law. E-mail: [email protected]. Research and writing of this Article was supported by a Summer Grant from the University of Miami School of Law. -
China in the Era of the Netizen by Ronda Hauben, Feb. 14, 2010 I
China in the Era of the Netizen by Ronda Hauben, Feb. 14, 2010 I recently returned home from a trip to China. Back in New York City, I was left with the feeling that there is something significant happening in China. Some have referred to Beijing as the equivalent in the 21st century of the interesting environment that Prague symbolized for the 1990s. In the air in Beijing one senses that something new is emerging, something that must build on the old but will emerge with its new characteristics. In Beijing, I had many interesting conversations trying to understand the significance of what is happening there. One was with a friend who is from China but who has lived outside of China over 20 years. She was back visiting China for a special event and also planned to visit her parents who live in China, as she does every year. Comparing current day Beijing with the Beijing she knew as a university student, she observed that Beijing, as a world class city, has grown and developed in the Era of the Internet. Her observation helped me to realize that not only was Beijing being developed as a world class city with the benefit of the Internet's contribution, but also that Beijing is a world class city developing in the Era of the Netizen. Some notes I wrote as I left Beijing observed, "The insight of the trip was that Beijing is a city being developed in the Netizen Era. It is perhaps one of the first world class cities of the Netizen Era. -
Program on Information Resources Policy
INCIDENTAL PAPER Growing Up With the Information Age John C. B. LeGates April 2011 Program on Information Resources Policy Center for Information Policy Research Harvard University The Program on Information Resources Policy is jointly sponsored by Harvard University and the Center for Information Policy Research. Chairman Managing Director Anthony G. Oettinger John C. B. LeGates John LeGates began his career as an entrepreneur in the earliest days of computer communications and networking. He was the first to put computers in schools and later in hospitals. He built the first academic computer-resource-sharing network and was a member of the Arpanet NWG, the original Internet design team. Since 1973 he has been a member of the Harvard faculty, where he co-founded the Program on Information Resources Policy. Copyright © 2011 by the President and Fellows of Harvard College. Not to be reproduced in any form without written consent from the Program on Information Resources Policy, Harvard University, Maxwell Dworkin Bldg. 125, 33 Oxford St., Cambridge MA 02138. 617-495-4114 E-mail: [email protected] URL: http://www.pirp.harvard.edu ISBN 0-9798243-3-8 I-11-3 LeGates Life and Times DRAFT February 1, 1998 NOTES ON GROWING UP WITH THE INFORMATION AGE John C. B. LeGates WHAT IS THIS DOCUMENT? In 1997 I was approached by a writer for The New Yorker magazine, who asked if they could do a "life and times" article about me. It would be the feature article in one of their issues - a minimum of twenty pages. Alternatively it might be longer, and be serialized over several issues. -
October 14 2010 the Facebook Story and the Future of the Social Web, Chris Hughes
October 14 2010 The Facebook story and the future of the social web, Chris Hughes The social networking site Facebook may have been one of the biggest developments in business and society in recent years, but it was just a natural outgrowth of existing Internet trends, Facebook cofounder Chris Hughes said at the World Knowledge Forum Thursday. “It was a natural extension of what was required to enable everyday people to connect and share with their friends,” Hughes said. Hughes spoke to large audience on various aspects of social media, including the genesis of Facebook, the core values that allowed it to develop, his role in Barack Obama’s online campaign, his current ‘Jumo’ project and the future of social media in general. He said the creation of Facebook was not about magic or secrets. “The birth of any cultural phenomenon almost always comes with myth- making,” Hughes said, beginning his presentation by debunking some of preconceptions about the founding of Facebook. He debunked the image of Facebook as having been founded by a lone genius who turned an idea into a multi-billion-dollar operation. “I have news - it’s not true,” he said, explaining that Facebook was founded by himself, Mark Zuckerberg and Dustin Muskovitz in a spirit of scepticism of the control that Harvard and other institutions had over the control of information. He explained that authorities at Harvard, where he was a student, shut down two earlier attempts by Hughes and his partners to start social networking sites. So the partners decided to make Facebook more independent. -
Combating Global White Supremacy in the Digital Era
City University of New York (CUNY) CUNY Academic Works Publications and Research CUNY Graduate Center 2009 Combating Global White Supremacy in the Digital Era Jessie Daniels CUNY Hunter College How does access to this work benefit ou?y Let us know! More information about this work at: https://academicworks.cuny.edu/gc_pubs/197 Discover additional works at: https://academicworks.cuny.edu This work is made publicly available by the City University of New York (CUNY). Contact: [email protected] 09_120_Ch09.qxd 4/21/09 5:31 AM Page 159 CHAPTER NINE Combating Global White Supremacy in the Digital Era In cyberspace the First Amendment is a local ordinance. —John Perry Barlow In 2002 Tore W. Tvedt, founder of the hate group Vigrid and a Norwegian cit- izen, was sentenced to time in prison for posting racist and anti-Semitic propa- ganda on a website. The Anti-Racism Center in Oslo filed a police complaint against Tvedt. On Vigrid’s website, Tvedt puts forward an ideology that mixes neo-Nazism, racism, and religion. Tvedt was tried and convicted in the Asker and Baerum District Court on the outskirts of Oslo. The charges were six counts of violating Norway’s antiracism law and one count each of a weapons violation and interfering with police. He was sentenced to seventy-five days in prison, with forty-five days suspended, and two years’ probation. Activists welcomed this as the first conviction for racism on the Internet in Norway. Following Tvedt’s release from prison, his Vigrid website is once again online.1 In contrast to the Norwegian response, many Americans seem to view white supremacy online as speech obviously protected under the First Amendment. -
La Protección De La Intimidad Y Vida Privada En Internet La Integridad
XIX Edición del Premio Protección de Datos Personales de Investigación de la Agencia Española de Protección de Datos PREMIO 2015 Las redes sociales se han convertido en una herramienta de comu- nicación y contacto habitual para millones de personas en todo el La protección de la intimidad mundo. De hecho, se calcula que más de un 75% de las personas Amaya Noain Sánchez que se conectan habitualmente a Internet cuentan con al menos un y vida privada en internet: la perfil en una red social. La autora plantea en el texto si las empre- sas propietarias de estos servicios ofrecen una información sufi- integridad contextual y los flujos de ciente a los usuarios sobre qué datos recogen, para qué los van a información en las redes sociales utilizar y si van a ser cedidos a terceros. En una reflexión posterior, propone como posibles soluciones el hecho de que estas empresas (2004-2014) pudieran implantar directrices técnicas compartidas y una adapta- ción normativa, fundamentalmente con la privacidad desde el di- seño, la privacidad por defecto y el consentimiento informado. Así, Amaya Noain Sánchez el resultado sería un sistema de información por capas, en el que el usuario fuera conociendo gradualmente las condiciones del trata- miento de su información personal. Este libro explica el funcionamiento de una red social, comenzan- do por la creación del perfil de usuario en el que se suministran datos, y analiza cómo la estructura del negocio está basada en la monetización de los datos personales, con sistemas como el targe- ting (catalogando al usuario según sus intereses, características y predilecciones) y el tracking down (cruzando información dentro y fuera de la red).