Global Information Society Watch 2013 Women’S Rights, Gender and Icts

Total Page:16

File Type:pdf, Size:1020Kb

Global Information Society Watch 2013 Women’S Rights, Gender and Icts Global InformatIon SocIety Watch 2013 Women’s rights, gender and ICTs AssociAtion for Progressive communicAtions (APc) And HumAnist institute for cooPerAtion witH develoPing countries (Hivos) Global Information Society Watch 2013 Global Information Society Watch 2013 Steering committee Anriette Esterhuysen (APC) Loe Schout (Hivos) Coordinating committee Janine Moolman (APC) Monique Doppert (Hivos) Valeria Betancourt (APC) Mallory Knodel (APC) Project coordinator Valeria Betancourt Editor Alan Finlay Assistant editor Lori Nordstrom Publication production Mallory Knodel Proofreading Valerie Dee Lori Nordstrom Graphic design Monocromo [email protected] Phone: +598 2400 1685 Cover illustration Matías Bervejillo Financial support provided by Humanist Institute for Cooperation with Developing Countries (Hivos) Ministry of Foreign Affairs of the Netherlands Funding Leadership and Opportunities for Women (FLOW) Global Information Society Watch Published by APC and Hivos 2013 Creative Commons Attribution 3.0 Licence ‹creativecommons.org/licenses/by-nc-nd/3.0› Some rights reserved. ISSN: 2225-4625 ISBN: 978-92-95102-06-4 APC-201310-CIPP-R-EN-DIGITAL-197 Table of contents Preface . 6 Institutional overview Edwin Huizing executive director, hivos Whose internet is it anyway? Shaping Anriette Esterhuysen the internet – feminist voices in governance executive director, apc decision making . 55 Heike Jensen Introduction: The online terrain for women’s rights. 7 Whose internet is it anyway? Shaping Joanne Sandler the internet – women’s voices i n governance gender at work decision making in the Middle East and North Africa. 61 Thematic reports Hanane Boujemi humanist institute for co-operation with developing countries Accessing infrastructure. 16 Mariama Deen-Swarray and Mpho Moyo Country reports research ict africa Introduction. 64 Participatory citizenship: Tracing the impact of ICTs on the social and political Argentina. 66 participation of women . 25 Nodo TAU Anita Gurumurthy Bangladesh . 70 it for change Bytes for All Bangladesh Sexuality and the internet: Sexual rights and Bolivia. 73 internet regulation . 32 REDES Foundation Bruno Zilli and Horacio Sívori latin american center on sexuality and human rights, Brazil. 76 state university of rio de janeiro Instituto Nupef Violence against women online . 38 Bulgaria . 80 Jan Moolman BlueLink association for progressive communications (apc) Cameroon. 84 Digital security online . 43 PROTEGE QV Mary Lawlor front line defenders Canada. 88 Association for Progressive Communications (APC) Online disobedience. 47 Nadine Moawad China . 93 association for progressive communications (apc) Danwei and Media Monitor for Women Network From string theory to clothes wringers: Colombia . 97 A historical map of women shaping science Colnodo and technology . 50 Congo, Democratic Republic of . 101 Compiled by Sonia Randhawa Si Jeunesse Savait Congo, Republic of . 103 AZUR Développement Cook Islands . 107 Pan Pacific and Southeast Asia Women’s Association (PPSEAWA) Costa Rica. .111 New Zealand . 179 Cooperativa Sulá Batsú APC (New Zealand) Côte d’Ivoire. .113 Nigeria . 183 Nnenna.org Fantsuam Foundation Ecuador. 118 Pakistan. 187 CIESPAL Bytes for All Pakistan Egypt. 122 Peru. 191 ArabDev Red Científica Peruana and Pontificia Universidad Católica del Perú Ethiopia . 125 Ethiopian Free and Open Source Software Network Philippines. 195 (EFOSSNET) Foundation for Media Alternatives (FMA) India. 129 Romania. 200 Digital Empowerment Foundation StrawberryNet Foundation and Sapientia – Hungarian University of Transylvania Indonesia. 134 Nieke Jahja Rwanda. 204 HeHe Limited Iran. 136 Volunteer Activists South Africa. 208 Right2Know and Women’sNet Iraq. 139 Richmond University in London Spain. 211 Pangea Italy. 142 Lea Melandri and Giacomo Mazzone (with the support Switzerland . 214 of Centro Nexa and Arturo di Corinto) Comunica-ch Jamaica . 146 Syria. 218 Institute for Gender and Development Studies Mona Unit, Hanadi Traifeh University of the West Indies and Mona ICT Policy Centre, University of the West Indies Tanzania. 222 Collaboration on International ICT Policy in East Japan. .151 and Southern Africa (CIPESA) Japan Computer Access for Empowerment (JCAFE) Thailand. 225 Jordan. 156 Thai Netizen Network Alarab Alyawm Uganda. 229 Kenya . 159 Women of Uganda Network (WOUGNET) Kenya ICT Action Network (KICTANet) United States. 231 Korea, Republic of . 164 Association for Progressive Communications (APC) Korean Progressive Network Jinbonet and May First/People Link Mexico . 168 Uruguay. 234 Association for Progressive Communications (APC) ObservaTIC, Universidad de la República Nepal. .171 Venezuela. 237 Development Knowledge Management and Innovation EsLaRed Services Private Limited Netherlands . 175 NETSHEILA Preface At the Fourth World Conference on Women This edition of GISWatch examines how the in Beijing in 1995, ICTs were recognised as internet and other ICTs have extended the critical for achieving women’s empowerment public sphere and created new opportunities and gender equality. In 2003, the World and freedoms for women. It highlights the Summit on the Information Society threats to these freedoms and explores the reinforced that the development of ICTs role of technology in resistance to these will provide opportunities for women’s full threats. and equal participation in all spheres of life. Since then the internet has become a No struggle for social justice is a better critical global resource that enables women measure of success than that for women’s to exercise their right to speak, impart rights and gender equality. This can also be opinions, share ideas, build knowledge applied to the internet. A truly free internet and access information. Access to the that fulfils its potential as a tool for social internet enables women to participate in the justice is an internet that is not just used by information economy, exercise citizenship women, but also shaped by them through rights, get access to health information and their involvement in its governance and other services, form communities, engage in development. It is an internet on which formal and informal processes to determine women have the freedom and capacity to their social, cultural and political life and actively tell their stories, participate in social, more. By the end of 2013, 1.3 billion women political and economic life, and claim their are expected to be online. We believe this rights to be empowered, equal citizens of the increase in the number of connected women world who can live free from discrimination must be, and can be, accompanied by and the fear of violence. ■ greater empowerment of women and more widespread gender equality. However, human rights online are connected with human rights offline, and to achieve these goals we need to combat discrimination and gender-based violence. Online harassment, cyber stalking and other ICT- enabled violations are on the increase, as are shutdowns of networks by governments, and censorship of sexual rights and reproductive health websites and other content that is Edwin Huizing particularly relevant to women. The very ExEcutivE DirEctor, Hivos spaces that allowed women to increase their participation in the public sphere and amplify Anriette Esterhuysen their demands for justice are under threat. ExEcutivE DirEctor, APc 6 / Global Information Society Watch Introduction Our dilemma ended because of serendipity. An Joanne Sandler Gender at Work anonymous donor bought the URL and donated it www.genderatwork.org to us, paying USD 400 into an account in Russia. We learned, of course, to never let bureaucracy in- terfere with expeditious renewals of our URLs. But The online terrain for women’s rights something changed forever: we braced ourselves I remember vividly the day, in 2003, that the name for the next attack. Given the pace of technologi- of the United Nations Development Fund for Women cal innovation and the profitability and impunity (UNIFEM) was stolen online by a pornographer. I for perpetrators, there was a feeling of inevitability was the deputy director of UNIFEM and the head about it. of our communications division came running into Many individuals and organisations work- my office, frantic, and told me to search online for ing at the intersection of feminism, social justice, “www.unifem.com”. Pornographic images filled my human rights, and information technology echo screen and it created a loop that took many tense the observations in a recent report: “If we agree moments to close. that the online world is socially constructed, then I remember the feelings of violation and horror. gender norms, stereotypes and inequality that ex- 1 And, as we tried, largely with futility, to find out if ist offline… can be replicated online.” This is not we had any rights to reclaim our identity, I recall our necessarily at the forefront of thinking when one’s frustration and helplessness. It didn’t matter that business is expanding because of online sales, this had also happened to UNICEF. It didn’t matter when telemedicine brings powerful diagnostic tools that unifem.com was not our main website, but a to rural areas to save lives, or when online activ- URL that we bought precisely to avoid it being used ism helps to unite the opposition and bring down by others, nor that our frustrated web manager was a dictator, as we saw in the Egyptian and Tunisian unable to get a bureaucratic administration to pay uprisings in 2011. But as we laud the power of the the USD 65 needed to renew it
Recommended publications
  • Claudia Friedetzky Saturday, February 21, 10 Am Braddock Supervisor's
    FOCUS February 2015 Volume 41, No. 5 Our Troubled Waters Speaker: Claudia Friedetzky Saturday, February 21, 10 a.m. Braddock Supervisor’s Office, Kings Park Library Water is our most precious resource, and Environmental Leadership program and we take it for granted that when we turn on Public Policy Fellowship program at the the tap, it's always going to be there. In Center for Women in Government. places such as California; however, supplies This is a joint meeting with the Springfield- are running dangerously low. The old Annandale branch. The Braddock struggle between the cowhands and the Supervisor’s Office is located at the back of farmers is being updated to the suburbs the Kings Park Library, 9000 Burke Lake with their golf courses and the commercial Road, Burke, near the intersection with farms that supply all of us with our food. Rolling Road. What role is climate change having in Directions: accelerating the shortages that are forecast From Braddock Road: Turn south on Burke Lake Road. Go one block. Kings Park Library will be on your right. around the globe? And what about our own From Fairfax County Parkway: Turn north on Burke Lake water supplies, both with regard to purity Road. Kings Park Library will be on your left, just past Lake Braddock Secondary School. and supply? If, as proposed, fracking is permitted in the George Washington In this issue: National Forest, what risk will that bring? Vision to Reality ......................................... 2 Why Join AAUW? ....................................... 2 Our guest, Claudia Friedetzky, a climate Book & Author Update .............................. 3 activist with the Maryland Chapter of the STEMtastics ...............................................
    [Show full text]
  • Use Style: Paper Title
    International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 4 Issue: 6 494 - 497 ____________________________________________________________________________________________________________________ Study of Manga, Animation and Anime as an Art Form Steena. J. Mathews Department of Master Of Computer Application(MCA) University Of Mumbai Dr.G.D.Pol Foundation YMT College of Management Sector-4 Kharghar, Navi Mumbai-410210, India [email protected] ne 1 (of Affiliation): dept. name of organization Abstract—Manga is from Japanese for comics or whimsical images. Manga grow from combining of Ukiyo-e and from Western style drawing and it’s currently soon after World War II. Part from Manga's covers which is usually issued in black and white. But it is usual to find introductions to chapters to be in color and is read from top to bottom and then right to left, alike to the layout of a Japanese basic text. Anime relates to the animation style developed in Japan. It is characterized by particular characters and backgrounds which are hand drawn or computer generated that visually and confined set it apart from other forms of animation. Plots may include a variety of imaginary or ancient characters, events and settings. Anime is a complex art form that includes various themes, animation styles, messages, and aspects of Japanese culture. Each member will understand the differences in theme, style, animation, and cultural influences between Anime, Manga and American animation. As mass- produced art, anime has a stature and recognition even American animated films, long accepted as a respectable style of film making, have yet to achieve.
    [Show full text]
  • Solving the Equation
    SOLVING THE EQUATION The Variables for Women’s Success in Engineering and Computing EXECUTIVE SUMMARY To download a free copy of the full report, Solving the Equation: The Variables for Women’s Success in Engineering and Computing, go to www.aauw.org/what-we-do/research. More than ever before in history, girls are studying and excelling in science and mathematics. Yet the dramatic increase in girls’ educational achieve- ments in scientific and mathematical subjects has not been matched by similar increases in the representation of women working as engineers and computing professionals. Women made up just 26 percent of computing professionals in 2013, a substantially smaller portion than 25 years ago and about the same percentage as in 1960. In engineering, women are even less well represented, making up just 12 percent of working engineers in 2013. The representation of women in engineering and computing occupations matters. Diversity in the workforce contributes to creativity, productivity, and innovation. Women’s experiences—along with men’s experiences— should inform and guide the direction of engineering and technical innova- tion. We simply can’t afford to ignore the perspectives of half the population in future engineering and technical designs. Advocates have long extolled the importance of advancing girls and women in science, technology, engineering, and mathematics (STEM). WOMEN IN SELECTED STEM OCCUPATIONS, 1960–2013 60 53% 50 46% 44% 42% 39% 40 35% 35% 34% 33% 32% 28% 30 26% 27% 26% 30% 27% 20% 26% 20 20% Percentage of women of Percentage 12% 11% 11% 12% 9% 10 8% 5% 1% 2% 0 1960 1970 1980 1990 2000 2010 2013 Engineers Chemists and Computer and mathematical Biological scientists material scientists occupations Sources: AAUW analysis of data from U.S.
    [Show full text]
  • Ada Lovelace Katherine Johnson
    Who is thought to be the first computer Ada Lovelace programmer? Henrietta Swan Leavitt’s discovery of cepheid variable the expansion of the stars was used as evidence to universe prove what? What was the name given to Refrigerator Ladies or ENIAC the women who worked as girls, because they worked on computer programmers during the ENIAC computer. But WWII for the U.S. military? they were actually engineers and computer programmers. Because of this person, many key space missions were successful for the United Katherine Johnson States. Prioritizing tasks and monitoring call center activity Erna Schneider Hoover’s are the components of what telephone switching system system? In addition to pioneering computer programming languages, this person spent Grace Hopper their career in the United States Navy. Today, we have microprocessors because of Lynn Conway this person’s book on VLSI design. The Roomba, a small automated vacuum cleaner, a small multi-rotor drone is an example of what? In addition to being a remarkable inventor, this person also starred in films such as, Algiers (1938), Come Live With Me (1941), and Hedy Lamarr Samson and Delilah (1949). Thelma Estrin introduced the use of computer technology into what field? biomedical research Grace Hopper was the first person to do this when she “debug” a computer removed a moth from the Harvard Mark Icomputer. What was Erna Schneider given for her computerized the first patent for telephone switching system? computer software You can watch netflix on your laptop using an internet Radia Perlman connection because of this person’s invention of STP.
    [Show full text]
  • The Uses of Animation 1
    The Uses of Animation 1 1 The Uses of Animation ANIMATION Animation is the process of making the illusion of motion and change by means of the rapid display of a sequence of static images that minimally differ from each other. The illusion—as in motion pictures in general—is thought to rely on the phi phenomenon. Animators are artists who specialize in the creation of animation. Animation can be recorded with either analogue media, a flip book, motion picture film, video tape,digital media, including formats with animated GIF, Flash animation and digital video. To display animation, a digital camera, computer, or projector are used along with new technologies that are produced. Animation creation methods include the traditional animation creation method and those involving stop motion animation of two and three-dimensional objects, paper cutouts, puppets and clay figures. Images are displayed in a rapid succession, usually 24, 25, 30, or 60 frames per second. THE MOST COMMON USES OF ANIMATION Cartoons The most common use of animation, and perhaps the origin of it, is cartoons. Cartoons appear all the time on television and the cinema and can be used for entertainment, advertising, 2 Aspects of Animation: Steps to Learn Animated Cartoons presentations and many more applications that are only limited by the imagination of the designer. The most important factor about making cartoons on a computer is reusability and flexibility. The system that will actually do the animation needs to be such that all the actions that are going to be performed can be repeated easily, without much fuss from the side of the animator.
    [Show full text]
  • From the Woman Question in Technology to the Technology Question in Feminism
    05 Henwood (mh/d) (EJWS) 28/3/00 9:32 am Page 209 From the Woman Question in Technology to the Technology Question in Feminism Rethinking Gender Equality in IT Education Flis Henwood UNIVERSITY OF EAST LONDON ABSTRACT There have, by now, been a number of thorough-going critiques of what has variously been called the ‘equality’, ‘equity’ or ‘liberal’ approach to understanding ‘the woman problem in technology’ by those who would prefer to focus on ‘the technology question in feminism’. Most of these critiques adopt deconstructivist techniques to expose the limitations of equality approaches, including, most centrally, their assumptions about the neutrality of technology and the limited nature of equality programmes designed simply to increase access for women to that technology. However, the critiques themselves have so far failed to come up with convincing alternative interventionist strategies, either because the universalizing tendency of their theoretical perspective gives rise to interventions that fail to deal with the diverse and fragmented nature of women’s experiences and needs, or because recognition of this diversity and fragmentation leaves very little common ground on which to build successful intervention strategies. This article addresses this dilemma in the context of computing and IT education and draws on empirical research on women’s experiences of computing and IT in two different educational settings where issues of gender difference and equality were managed in very contrasting ways. It then offers some suggestions for how both a critical and constructivist discourse on technology might be made to coexist in educational programmes designed to promote gender equality. KEY WORDS computing ◆ education ◆ equality ◆ gender ◆ technology The European Journal of Women’s Studies Copyright © SAGE Publications (London, Thousand Oaks and New Delhi), Vol.
    [Show full text]
  • Mutilation and Killing for Muslim "Honor" - Part 2 of 3
    June 25, 2007 Mutilation And Killing For Muslim "Honor" - Part 2 of 3 This article by Adrian Morgan (Giraldus Cambrensis of Western Resistance) appeared earlier today in Family Security Matters and is reproduced with their permission. Mutilation And Killing For Muslim "Honor" In Three Parts Part Two: A Family Affair In Part One, a few British honor killing cases were described. The phenomenon of killing for "honor" has become a problem wherever large concentrations of migrant Muslims have settled in ghettoes within Western cultures. Families choose to live in the West, but insist on following narrow cultural traditions. Their children are trapped between two cultures. In Germany, there is a community of 3 million Muslims, most of whom are migrant workers from Turkey. In Berlin, there are 200,000 Turks living in run down suburbs. Hatun Surucu was a young woman of Turkish Kurdish origins. On February 7, 2005, when she was aged 23, Hatun was waiting at a bus stop in the Tempelhof district of Berlin. Her 18-year old brother Ayhan approached her and shot her three times in the head. Hatun's death was certainly not the first case of honor killing in Germany, but the media was shocked by the reactions of her family and members of the local community. At a nearby school, filled with children of immigrant families, 14-year old Turkish boys applauded Hatun's killing. One boy said: "She only had herself to blame". Another argued: "She deserved what she got. The whore lived like a German". The media would have sidelined Hatun's case, were it not for the school's director, who sent letters to parents, and copied these to other teachers across Germany.
    [Show full text]
  • 1 “We Are Ewits
    “WE ARE EWITS - HEAR US ROAR!”: EMPOWERING WOMEN IN TECHNOLOGY STARTUPS (EWITS) AS AN EXPERIENTIAL LEARNING MODEL TO CHALLENGE GENDERED SOCIAL NORMS IN THE FIELD By CHERYL D. CALHOUN A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY UNIVERSITY OF FLORIDA 2017 1 © 2017 Cheryl D. Calhoun 2 To my wife and family 3 ACKNOWLEDGMENTS First, I would like to thank my wife, Ester, for her support and encouragement throughout this process. She provided many hours of reflection, including some challenging debate, about my ideas and understanding of my work. She was also patient, and incredibly supportive, when I just needed space to work things out for myself. I would also like to thank my children, Sean, and Jessica, who supported me along the way and never doubted that I would accomplish this goal. I would like to thank my Santa Fe College family. The incredible professionals at the educational centers and throughout the college who provided support and understanding while I juggled a full-time academic career along with a full-time pursuit of a PhD. I thank the faculty at the University of Florida, who challenged me in the classroom, and worked with me as I integrated my classroom learning into my years of experience in academia. I thank my committee members, Dr. Kara Dawson, Dr. Rosana Resende, and Dr. Andy Naranjo, who provided challenging feedback and pushed me to refine my thinking and align my research goals. I would like to thank my chair, Dr.
    [Show full text]
  • Workshop Virginia Soldino 'Understanding
    First CEP Conference on Sex Offender Management 22-23 November 2018 Riga, Latvia UNDERSTANDING AND WORKING WITH PEOPLE WHO USE CHILD SEXUAL ABUSE MATERIAL VIRGINIA SOLDINO UNIVERSITY RESEARCH INSTITUTE OF CRIMINOLOGY AND CRIMINAL SCIENCE UNIVERSITY OF VALENCIA (SPAIN) 1. CHILD SEXUAL ABUSE MATERIAL • ILLEGAL MATERIAL CHILD PORNOGRAPHY (DIRECTIVE 2011/93/EU) • With real children (< 18): i. Any material that visually depicts a child engaged in real or simulated sexually explicit conduct; ii. Any depiction of the sexual organs of a child for primarily sexual purposes; 1. CHILD SEXUAL ABUSE MATERIAL • ILLEGAL MATERIAL CHILD PORNOGRAPHY (DIRECTIVE 2011/93/EU) • Pornography allusive to children (technical and virtual CP): iii. Any material that visually depicts any person appearing to be a child engaged in real or simulated sexually explicit conduct or any depiction of the sexual organs of any person appearing to be a child, for primarily sexual purposes; or iv. Realistic images of a child engaged in sexually explicit conduct or realistic images of the sexual organs of a child, for primarily sexual purposes. 1. CHILD SEXUAL ABUSE MATERIAL • LEGAL MATERIAL • With real children: • Non-erotic and non-sexualized images of fully or partially clothed or naked children, from commercial sources, family albums or legitimate sources COPINE levels 1,2,3 (Quayle, 2008). • Allusive to children: • Narratives: written stories or poems, sometimes recorded as audio tapes or depicted as cartoons (lolicon/shotacon/yaoi), describing sexual encounters involving minors (Merdian, 2012). 2. OFFENCES CONCERNING CHILD PORNOGRAPHY • Directive 2011/93/UE, article 5: • Acquisition or possession • Knowingly obtaining access • Distribution, dissemination or transmission • Offering, supplying or making available • Production 3.
    [Show full text]
  • Early Forms of Long-Distance Communication
    EARLY FORMS OF LONG-DISTANCE COMMUNICATION In this material, you will learn about Telegraphy, Telephone and GSM architecture Before the development of the electric telegraph in the 19th century revolutionized how information was transmitted across long distances, ancient civilizations such as those in China, Egypt and Greece used drumbeats or smoke signals to exchange information between far-flung points. However, such methods were limited by the weather and the need for an uninterrupted line of sight between receptor points. These limitations also lessened the effectiveness of the semaphore, a modern precursor to the electric telegraph. Developed in the early 1790s, the semaphore consisted of a series of hilltop stations that each had large movable arms to signal letters and numbers and two telescopes with which to see the other stations. Like ancient smoke signals, the semaphore was susceptible to weather and other factors that hindered visibility. A different method of transmitting information was needed to make regular and reliable long-distance communication workable. Did You Know? SOS, the internationally recognized distress signal, does not stand for any particular words. Instead, the letters were chosen because they are easy to transmit in Morse code: "S" is three dots, and "O" is three dashes. The Electric Telegraph In the early 19th century, two developments in the field of electricity opened the door to the production of the electric telegraph. First, in 1800, the Italian physicist Alessandro Volta (1745-1827) invented the battery, which reliably stored an electric current and allowed the current to be used in a controlled environment. Second, in 1820, the Danish physicist Hans Christian Oersted (1777-1851) demonstrated the connection between electricity and magnetism by deflecting a magnetic needle with an electric current.
    [Show full text]
  • Chip Company AMD Pursues Rival for $30 Billion Tie-Up
    P2JW283000-5-A00100-17FFFF5178F ***** FRIDAY,OCTOBER 9, 2020 ~VOL. CCLXXVI NO.85 WSJ.com HHHH $4.00 DJIA 28425.51 À 122.05 0.4% NASDAQ 11420.98 À 0.5% STOXX 600 368.31 À 0.8% 10-YR. TREAS. (Re-opening) , yield 0.764% OIL $41.19 À $1.24 GOLD $1,888.60 À $5.00 EURO $1.1761 YEN 106.03 Conflicts in Russia’s Orbit Intensify, Upending Kremlin Plans Stimulus What’s News Talks Are On Again, Business&Finance But Deal MD is in advanced talks Ato buy Xilinx in adeal that could be valued at Is Elusive morethan $30 billion and mark the latest big tie-up in the rapidly consolidating Negotiations show semiconductor industry. A1 signs of life after AT&T’s WarnerMedia is Pelosi ties airline aid restructuring itsworkforce as it seeks to reducecostsby S to broad agreement as much as 20% as the pan- PRES demic drains income from TED BY KRISTINA PETERSON movie tickets, cable sub- CIA AND ALISON SIDER scriptions and TV ads. A1 SO AS MorganStanleysaid it is RE/ WASHINGTON—Demo- buying fund manager Eaton LU cratic and WhiteHouse negoti- TO Vancefor $7 billion, continu- atorsresumed discussions over ing the Wall Street firm’s N/PHO acoronavirus relief deal Thurs- shifttoward safer businesses YA day, but gavenoindication AR likemoney management. B1 AS they were closer to resolving GHD deep-seated disputes that led IBM plans itsbiggest- BA President Trump to end negoti- ever businessexit, spinning AM ationsearlier this week. off amajor part of itsinfor- HR FewonCapitol Hill were op- mation-technologyservices VA SHATTERED:Armenia accused Azerbaijan on Thursday of shelling ahistoric cathedral in the separatistterritory of Nagorno- timistic that Congressand the operations as the company Karabakh.
    [Show full text]
  • Introduction to Telecommunication Network
    Pilsung Taegyun AB A Fathur Afif Hari Gary Dhika April Mulya Yusuf AB A A A AB AB AB AB Anin Rizka A B Dion Siska Mirel Hani Airita AB AB AB AB AB www.telkomuniversity.ac.id Stored Program Control Course Number : TTH2A3 CLO : 3 Week : 8 www.telkomuniversity.ac.id Media Gateway on NGN • Media Gateway (MG) – On Transport plane that connects different type of network – Trunk Gateway, connects packet-based network with trunk network from PSTN or ISDN – Access Gateway, provides services to CPE – Residential Gateway, connects packet-based network with analog network • Signaling Gateway (SG) – Transforming signaling format, ex. SIP SS7 • Media Gateway Controller (MGC) – Control Media Gateway and Signaling Gateway – aka. Soft Switch (call setup for multimedia communication, detect and manage events, and manage media gateway based on configuration) – Use MGCP (MGC Protocol) from ITU-T or Megaco from IETF www.telkomuniversity.ac.id Layers in NGN 4 www.telkomuniversity.ac.id Crossbar Switch • Electro-mechanical switch by using relay contact • Numbers are stored in register to establish a call by activating several relay. This activation is done by marker • Marker will become SPC (Stored Program Control) www.telkomuniversity.ac.id Unit Interface for Digital SPC www.telkomuniversity.ac.id What is SPC? SPC (Stored program control) is: • a telecommunications technology used for telephone exchanges • controlled by a computer program stored in the memory of the switching system • SPC was the enabling technology of electronic switching systems (ESS) developed
    [Show full text]