1 Introduction 2 International Relations Meets Technology Theory

Total Page:16

File Type:pdf, Size:1020Kb

1 Introduction 2 International Relations Meets Technology Theory Notes 1 Introduction 1. A recent example from September 2010 involves an online attack on an Iranian nuclear reactor. A purpose-built computer worm caused the reactor to spin too quickly resulting in system failure and lasting physical damage. While there has been some speculation that the United States and Israel were behind this attack, it has not been possible to trace its origins (Beaumont, 2010; Seltzer, 2010). 2. This debate was initiated by the Evgeny Morozov’s observation that those who comment on the politics of the Internet tend to fall into ‘utopian’ or ‘dystopian’ camps. This was later articulated in the publication of Morozov’s book, The Net Delusion: The Dark Side of Internet Freedom (2011). Clay Shirky responded arguing that despite its pitfalls, the Internet remains a ‘posi- tive force for democracy’ (2009). These two views formed the poles of an ongoing debate which heightened during the events of the ‘Middle East Spring’. 2 International Relations Meets Technology Theory 1. Within realist thought, there are a range of views on how power should be defined, that is, whether as a means to an end or an end in itself. This book will not provide a comprehensive catalogue of variations in realist approaches to power. Here, it is concerned only with understandings of the relationship between technology and power in IR and as such is proposing two broad con- ceptual approaches – the first of which – the nation-state power view – is most closely associated with a broadly realist approach. 2. Employing a Fordist approach, Alastair Buchan wrote of the decline of ter- ritory and population as a form of power with emphasis instead placed on states’ technical and scientific base. In his view, ‘power, influence, or pres- tige can now be increased by the better organization of existing domestic resources and the application of science and technology to them’ (Buchan, 1972, p. 177). Richard Rosecrance also makes an argument for the declining relevance of territory in The Rise of the Virtual State: Wealth and Power in the Coming Century (1999). 3. In an example of US vulnerability, for at least a year during the lead up and execution of Operation Desert Storm in the Persian Gulf war, a group of Dutch hackers probed 34 different American military computer systems, gathering information on weapons systems, troop deployments and even battle orders. They amassed a significant quantity of sensitive data and then attempted to negotiate a sale to the Baathist regime. The Iraqis, taking the offer to be a hoax, did not respond but the vulnerability was clearly demonstrated (Markoff, 1991; Christensen, 1999). 191 192 Notes 4. Probably the most evolved of these is the Council of Europe’s Convention on Cybercrime (also referred to as the ‘Budapest Convention’), which is a multilateral treaty drafted by the Council of Europe with four observer states: Canada, the United States, Japan and South Africa. The full text can be found at http://www.coe.int/t/dc/files/themes/cybercrime/ default_en.asp. 3 A (Select) Political History of the Internet 1. For an institutional history, see Over the Years, on the DARPA website which is available at http://www.darpa.mil/body/overtheyears.html. For commen- tary, see Leslie (1993, p. 120) and Edwards (1997, p. 260). 2. Note that this is a much abbreviated version of events. There are many excel- lent accounts of the development of Internet technology. For further and more detailed information, see, for example, Abbate (2000). Also, there were alternatives to TCP/IP (Clark, 1988, pp. 106–14). 3. The bill would eventually be passed in 1991 as The High Performance Com- puting Act of 1991 (http://www.thomas.gov/cgi-bin/query/F?c102:20:./temp/ ∼ mdbsTGH4wS:e37166:). For a summary of this legislation, see the National Coordination Office for Networking and Information Technology Research and Development. Available online at http://www.nitrd.gov/congressional/ laws/pl_102-194.html. 4. Hypertext refers to using a visual identifier (such as blue, underlined text) to indicate that there is more information associated with that text. Hypertext technology itself was not new when Berners Lee applied it to the Internet. Indeed it has a long and interesting history of its own but conceptually, it is generally credited to two Americans, Ted Nelson and Douglas Englebart. There was considerable activity around hypertext technology throughout the 1970s and 1980s but it was Berners Lee (with Robert Cailliau) who suc- cessfully married it to the Internet. A range of accounts can be found in Gilles and Cailliau (2000), Berners Lee (2000) and Abbate (2000). 5. In September 1993, President Clinton gave a speech to the United Nations General Assembly outlining this strategic framework which was reiterated in several subsequent speeches by senior officials including the Secretary of State and the National Security Advisor (Christopher, 1993; Clinton, 1993; Lake, 1993). 6. Although it is rarely discussed in these terms, the privatization and commer- cialization of the Internet was, in large part, a political development – not a technological one. Some accounts go as far as to suggest that the Inter- net was ‘wrested’ from the grip of American politics by the overwhelming force of the private sector. However, as stated above, policy documents from 10 years prior clearly state that the intention of the US government was to privatize and commercialize the network in order to maximize the poten- tial for contributing to US economic growth and improve its international standing. 7. H.R. 775: The Y2K Dispute Resolution Act was signed into law by President Clinton on 20 July 1999. In addition, there was a House Resolution: H.R. 775 to establish certain procedures for civil actions brought for damages relating to the failure of any device or system to process or otherwise deal with the Notes 193 transition from the year 1999 to the year 2000, and for other purposes. This was agreed to on 11 May 1999. 8. This communication failure is tragically ironic, given that some of the origi- nal developmental research for the Internet took place within the context of a programme aimed at establishing a secure communications system capable of withstanding a nuclear attack. Senator Ron Wyden, Chairman Subcom- mittee on Science, Technology and Space, Response of the Technology Sector in Times of Crisis, hearing before the Committee on Commerce, Science, and Transportation, US Senate, 5 December 2001, p. 20. 9. The FCC was established by the Communications Act of 1934. It is directed by five commissioners appointed by the president and confirmed by the Senate for five-year terms. In addition, the president designates one of the commissioners to serve as chairperson. Only three commissioners may be members of the same political party. None of them can have a financial interest in any commission-related business. For more information, see the FCC website at http://fcc.gov/aboutus.html. 10. The 2002 ruling applied to cable services but in 2005 this was extended to DSL services. For the complete ruling, see FCC 02–77, Declaratory Ruling and Notice of Proposed Rulemaking, in the Matter of Inquiry Concerning High- Speed Access to the Internet Over Cable and Other Facilities/Internet Over Cable Declaratory Order Proceeding/Appropriate Regulatory Treatment for Broadband Access to the Internet Over Cable Facilities, GN Docket 00–185, 15 March 2002, www.fcc.gov. 4 Cyber Security 1. This is distinct from the ‘security dilemma’. The security dilemma suggests that if states acquire a surfeit of military capabilities, their peers will be compelled to follow suit. In this paradox, the states which have most com- prehensively engaged with Internet technology do not prompt their peers to do so – although the economic benefits may attract them. Rather, those states which have not been able to develop Internet technology have also not become dependent upon an insecure system. This is the paradox. If the Inter- net suffered a major disruption, it might have almost no impact on many third-world states whereas it would have major consequences in the United States. 2. Her views will be elaborated on in the chapter but see this speech for a specific reference to this point (Clinton, 2011). 3. It is possible that Mandiant does not provide more substantive or compelling evidence in order to protect their practices and sources, but it is not possible to determine if this is the case or if the report really is as circumstantial as it appears. 4. Senator Robert Bennett chaired the Y2K Committee established to address the potential disruption of the global date change on computers from 1999 to 2000. It is regarded in US political circles as having been a successful interven- tion of an Internet security threat and is often held up as an example of what government can do. Partly as a consequence of the success of that operation, Senator Bennett is a highly respected voice in government approaches to cyber security. See the executive summary of Clinton (2000, p. vi). 194 Notes 5. Technology journalist Scott Berinato traces the use of this term back to 1991 when it was used by D. James Bidzos, the president of a computer security firm. However, the term had become common amongst policymakers by the late 1990s (Berinato, 2003). 6. This is discussed during the hearing in the context of the Presidential Decision Directive issued by President Clinton in 1998. PDD-63 ruled that federal agen- cies were to achieve ‘reliable, interconnected, and secure information system infrastructure’. However, as Willemssen testified ‘weaknesses continued to be reported in each of the 24 agencies covered by our review’ (Willemssen, 2001, p. 4). 7. This bill was introduced to the 107th Congress as HR 5524.
Recommended publications
  • Update 6: Internet Society 20Th Anniversary and Global INET 2012
    Update 6: Internet Society 20th Anniversary and Global INET 2012 Presented is the latest update (edited from the previous “Update #6) on the Global INET 2012 and Internet Hall of Fame. Executive Summary By all accounts, Global INET was a great success. Bringing together a broad audience of industry pioneers; policy makers; technologists; business executives; global influencers; ISOC members, chapters and affiliated community; and Internet users, we hosted more than 600 attendees in Geneva, and saw more than 1,300 participate from remote locations. Global INET kicked off with our pre‐conference programs: Global Chapter Workshop, Collaborative Leadership Exchange and the Business Roundtable. These three programs brought key audiences to the event, and created a sense of energy and excitement that lasted through the week. Of key importance to the program was our outstanding line‐up of keynotes, including Dr. Leonard Kleinrock, Jimmy Wales, Francis Gurry, Mitchell Baker and Vint Cerf. The Roundtable discussions at Global INET featured critical topics, and included more than 70 leading experts engaged in active dialogue with both our in‐room and remote audiences. It was truly an opportunity to participate. The evening of Monday 23 April was an important night of celebration and recognition for the countless individuals and organizations that have dedicated time and effort to advancing the availability and vitality of the Internet. Featuring the Internet Society's 20th Anniversary Awards Gala and the induction ceremony for the Internet Hall of Fame, the importance of the evening cannot be understated. The media and press coverage we have already received is a testament to the historic nature of the Internet Hall of Fame.
    [Show full text]
  • August 6Th Addresses to Distributed Name Word Document to a Record
    Service (DNS), which delegated has a glorious Web interface, the responsibility of assigning and a user can even attach a August 6th addresses to distributed name Word document to a record. servers. In its present form the system Postel’s law is "Be conservative manages roughly $1.3 trillion in Peter Jay in what you do; be liberal in obligations and 340,000 what you accept from others." It contracts. It runs on an IBM Weinberger comes from RFC 761 , where he 2098 model E-10 mainframe, Born: Aug. 6, 1942; summarized desirable that can carry out 398 million Pennsylvania (??) interoperability criteria for the instructions per second. Internet Alfred Aho [Aug 9], Weinberger, There have been several and Brian Kernighan [Jan 1] Postel attended the same high attempts to replace MOCAS, but developed the AWK language school (Van Nuys in Los they’ve floundered due to cost, (he's the “W”) in 1977, which Angeles) as two other Internet complexity, and transition was first distributed in UNIX pioneers, Steve Crocker [Oct 15] planning. Version 7. The acronym is and Vint Cerf [June 23]. pronounced in the same way as the "auk " bird, which also acts The WWW Virtual as the language's emblem. In 1985 they extended the Library language, most significantly by adding user-defined functions. Aug. 6, 1991 This version is sometimes called “new awk” or nawk. The WWW Virtual Library ( http://vlib.org/) is the When Weinberger was oldest Web directory, able to promoted to be the head of trace its venerable heritage back Computer Science Research at to Tim Berners-Lee’s [June 8] Bell Labs [Jan 1], his picture was WWW overview page [next merged with the AT&T “death entry] at CERN.
    [Show full text]
  • List of Internet Pioneers
    List of Internet pioneers Instead of a single "inventor", the Internet was developed by many people over many years. The following are some Internet pioneers who contributed to its early development. These include early theoretical foundations, specifying original protocols, and expansion beyond a research tool to wide deployment. The pioneers Contents Claude Shannon The pioneers Claude Shannon Claude Shannon (1916–2001) called the "father of modern information Vannevar Bush theory", published "A Mathematical Theory of Communication" in J. C. R. Licklider 1948. His paper gave a formal way of studying communication channels. It established fundamental limits on the efficiency of Paul Baran communication over noisy channels, and presented the challenge of Donald Davies finding families of codes to achieve capacity.[1] Charles M. Herzfeld Bob Taylor Vannevar Bush Larry Roberts Leonard Kleinrock Vannevar Bush (1890–1974) helped to establish a partnership between Bob Kahn U.S. military, university research, and independent think tanks. He was Douglas Engelbart appointed Chairman of the National Defense Research Committee in Elizabeth Feinler 1940 by President Franklin D. Roosevelt, appointed Director of the Louis Pouzin Office of Scientific Research and Development in 1941, and from 1946 John Klensin to 1947, he served as chairman of the Joint Research and Development Vint Cerf Board. Out of this would come DARPA, which in turn would lead to the ARPANET Project.[2] His July 1945 Atlantic Monthly article "As We Yogen Dalal May Think" proposed Memex, a theoretical proto-hypertext computer Peter Kirstein system in which an individual compresses and stores all of their books, Steve Crocker records, and communications, which is then mechanized so that it may Jon Postel [3] be consulted with exceeding speed and flexibility.
    [Show full text]
  • What It Is How It Started How It Works
    Robert Cailliau CERN What it is be consulted from a computer in Chicago, the SLAC pre­ The World-Wide Web is a client-server information print database could be interrogated from your desk in system on the Internet. Conceived as a unique way to Geneva, all without having to know anything whatsoever give particle physicists easy access to their data wherever about the remote computer systems. they worked, the Web, or W3, has grown into something much bigger. It now disseminates information from In 1993 NCSA, the US National Center for Supercom­ businesses, government agencies, universities, schools puting Applications, produced the X-Mosaic browser. and even individuals. This software allowed the display of coloured images, giving to the Unix platform a glamorous window on the Instead of just a single local disk, the Web has the whole Web. It stirred the exhibitionist in many Unix/Internet world as its library. programmers, and drove them to set up a Web server Documents are linked to each other, forming a single showing off scenes of the local site. NCSA also global network of information. produced versions for Apple Macintosh and Microsoft Windows, thus opening the Web to a large audience. Traffic evolution (NFS backbone, USA) The European Commission approved its first Web project (WISE) at the end of the same year, with CERN as one of 2oook r Characters the partners. I per second Prodigy& - America On Line 1994 reaiiy was rhe "Year of the -W"eb". Tne worid's First International World-Wide Web conference was held at CERN in May.
    [Show full text]
  • COMP 516 Research Methods in Computer Science Research Methods in Computer Science Lecture 3: Who Is Who in Computer Science Research
    COMP 516 COMP 516 Research Methods in Computer Science Research Methods in Computer Science Lecture 3: Who is Who in Computer Science Research Dominik Wojtczak Dominik Wojtczak Department of Computer Science University of Liverpool Department of Computer Science University of Liverpool 1 / 24 2 / 24 Prizes and Awards Alan M. Turing (1912-1954) Scientific achievement is often recognised by prizes and awards Conferences often give a best paper award, sometimes also a best “The father of modern computer science” student paper award In 1936 introduced Turing machines, as a thought Example: experiment about limits of mechanical computation ICALP Best Paper Prize (Track A, B, C) (Church-Turing thesis) For the best paper, as judged by the program committee Gives rise to the concept of Turing completeness and Professional organisations also give awards based on varying Turing reducibility criteria In 1939/40, Turing designed an electromechanical machine which Example: helped to break the german Enigma code British Computer Society Roger Needham Award His main contribution was an cryptanalytic machine which used Made annually for a distinguished research contribution in computer logic-based techniques science by a UK based researcher within ten years of their PhD In the 1950 paper ‘Computing machinery and intelligence’ Turing Arguably, the most prestigious award in Computer Science is the introduced an experiment, now called the Turing test A. M. Turing Award 2012 is the Alan Turing year! 3 / 24 4 / 24 Turing Award Turing Award Winners What contribution have the following people made? The A. M. Turing Award is given annually by the Association for Who among them has received the Turing Award? Computing Machinery to an individual selected for contributions of a technical nature made Frances E.
    [Show full text]
  • World Wide Web - Wikipedia, the Free Encyclopedia
    World Wide Web - Wikipedia, the free encyclopedia http://en.wikipedia.org/w/index.php?title=World_Wide_Web&printabl... World Wide Web From Wikipedia, the free encyclopedia The World Wide Web , abbreviated as WWW and commonly known as The Web , is a system of interlinked hypertext documents contained on the Internet. With a web browser, one can view web pages that may contain text, images, videos, and other multimedia and navigate between them by using hyperlinks. Using concepts from earlier hypertext systems, British engineer and computer scientist Sir Tim Berners Lee, now the Director of the World Wide Web Consortium, wrote a proposal in March 1989 for what would eventually become the World Wide Web. [1] He was later joined by Belgian computer scientist Robert Cailliau while both were working at CERN in Geneva, Switzerland. In 1990, they proposed using "HyperText [...] to link and access information of various kinds as a web of nodes in which the user can browse at will",[2] and released that web in December. [3] "The World-Wide Web (W3) was developed to be a pool of human knowledge, which would allow collaborators in remote sites to share their ideas and all aspects of a common project." [4] If two projects are independently created, rather than have a central figure make the changes, the two bodies of information could form into one cohesive piece of work. Contents 1 History 2 Function 2.1 What does W3 define? 2.2 Linking 2.3 Ajax updates 2.4 WWW prefix 3 Privacy 4 Security 5 Standards 6 Accessibility 7 Internationalization 8 Statistics 9 Speed issues 10 Caching 11 See also 12 Notes 13 References 14 External links History Main article: History of the World Wide Web In March 1989, Tim BernersLee wrote a proposal [5] that referenced ENQUIRE, a database and 1 of 13 2/7/2010 02:31 PM World Wide Web - Wikipedia, the free encyclopedia http://en.wikipedia.org/w/index.php?title=World_Wide_Web&printabl..
    [Show full text]
  • The Generative Internet
    The Generative Internet The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Jonathan Zittrain, The Generative Internet, 119 Harvard Law Review 1974 (2006). Published Version doi:10.1145/1435417.1435426;doi:10.1145/1435417.1435426 Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:9385626 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA ARTICLE THE GENERATIVE INTERNET Jonathan L. Zittrain TABLE OF CONTENTS I. INTRODUCTION..............................................................................................................................1975 II. A MAPPING OF GENERATIVE TECHNOLOGIES....................................................................1980 A. Generative Technologies Defined.............................................................................................1981 1. Capacity for Leverage .........................................................................................................1981 2. Adaptability ..........................................................................................................................1981 3. Ease of Mastery....................................................................................................................1981 4. Accessibility...........................................................................................................................1982
    [Show full text]
  • Vision and Reality of Hypertext and Graphical User Interfaces
    Universität Hamburg Fachbereich Informatik Vogt-Kölln-Str. 30 D-22527 Hamburg Germany Bericht 237 Vision and Reality of Hypertext and Graphical User Interfaces FBI-HH-B-237/02 Matthias Müller-Prove [email protected] In die Reihe der Berichte des Fachbereichs Informatik aufgenommen durch Prof. Dr. Horst Oberquelle Prof. Dr. Christopher Habel Februar 2002 Abstract The World Wide Web took off ten years ago. Its tremendous success makes it easy to forget the more than forty years of hypertext development that preceded the Web. Similarly, modern graphical user interfaces have drawn attention away from the many compelling ideas behind earlier user interface designs. In the present thesis, numerous early hypertext and graphical user interface systems are presented and contrasted with today's Web and desktop interfaces. The designers of early hypertext and graphical user interface systems shared a common objective: the development of a personal dynamic medium for creative thought. Not very much is left from this original vision. Retrospect reveals promising insights that might help to reconcile the desktop environment with the Web in order to design a consistent and powerful way to interact with the computer. Zusammenfassung Das World Wide Web hat vor nunmehr über zehn Jahren seinen unvergleichlichen Siegeszug begonnen. Dabei wird oft übersehen, daß die Idee des Hypertexts eine bereits über vierzigjährige Geschichte hinter sich hat. Die Arbeit zeigt diese Entwicklung anhand der verschiedenen Hypertextsysteme auf und kontrastiert sie mit dem Web. Die Betrachtung der Grafischen Benutzungsoberflächen zeigt ganz ähnlich, daß auch hier viele gute Ideen auf dem Wege zu den heute dominierenden Fenstersystemen verloren gegangen sind.
    [Show full text]
  • From Webspace to Cyberspace
    From Webspace to Cyberspace Kevin Hughes Enterprise Integration Technologies July 1995 From Webspace to Cyberspace Version 1.0: December 1994 Version 1.1: July 1995 Copyright 1995 by Kevin Hughes The opinions stated in this document are solely those of the author and do not necessarily represent the views of Enterprise Integration Technologies. This document as a whole may be redistributed freely in any format for non-commercial purposes only. Comments, questions, corrections, and suggestions relating to this document are welcomed and can be sent to [email protected]. Trademarked names are used throughout this document; the trademark sym- bols have been omitted for editorial convenience with no intention of trade- mark infringement. Where such omissions exist the trademarked name has been printed with initial capitals. About the Author Kevin Hughes designs hypermedia products for EIT and is their webmaster. He has written Entering the World-Wide Web: A Guide to Cyberspace, an introduction to the World-Wide Web that has been used as training material in numerous companies and universities, and is a member of the World-Wide Web Hall of Fame. Enterprise Integration Technologies 800 El Camino Real Menlo Park, CA • 94025 Lobby: (415) 617-8000 Fax: (415) 617-8019 World-Wide Web: http://www.eit.com/ Thus science may implement the ways in which man produces, stores, and consults the record of the race. Vannevar Bush As We May Think Atlantic Monthly, July 1945 The trouble with the future is that it usually arrives when you least expect it. Arnold H. Glasow Foreword and Preface 5 of 254 Foreword and May 1993 was a quiet month, and it was business as usual on the Preface Internet.
    [Show full text]
  • From 99% to 99% SERGIO LOPEZ-PINEIRO Temple University
    310 THE ART OF ARCHITECTURE/THE SCIENCE OF ARCHITECTURE From 99% to 99% SERGIO LOPEZ-PINEIRO Temple University This work analyzes how the world’s computer net- cific location and at any given moment. The world’s work changed in a 15-year period, from 1977 to computer network has now been commonly ac- 1992. In 1977, 99 percent of the world’s comput- cepted and constitutes a new landscape definitively ing power resided on mainframes. By 1992, the added to our environment. For this reason, our percentages had flipped: 99 percent of computing everyday life is to some extent influenced—in some power sat collectively on the world’s desktop and places more than in others and some times more laptop computers. 1 than others—by the structural qualities defined by this network. As previously mentioned, its influ- At a certain moment in time, between 1977 and ence will be rendered visible by the analyses of 1992, the world’s computer network ‘exploded’, four different aspects: Time Attributes, Spatial shifting from total concentration into complete dis- Qualities, Social Networks, and Control Tactics. persion. This shift from one intensity to another brought along new space-time relationships alter- TIME ATTRIBUTES ing our social networks and their ordering prin- From Time Slots to Time Vectors ciples. By doing so, it defined a new landscape. In picturing it, this paper will map out the above- On June 27th 1962, Ross Perot founded Electronic mentioned shift by analyzing the following aspects Data Systems (EDS). of each of these moments in time: • Time Attributes or how geographically located “EDS began by doing business on other computer-time, back in the 70’s, has been con- people’s computers.
    [Show full text]
  • From Webspace to Cyberspace
    From Webspace to Cyberspace Kevin Hughes Enterprise Integration Technologies July 1995 From Webspace to Cyberspace Version 1.0: December 1994 Version 1.1: July 1995 Copyright 1995 by Kevin Hughes The opinions stated in this document are solely those of the author and do not necessarily represent the views of Enterprise Integration Technologies. This document as a whole may be redistributed freely in any format for non-commercial purposes only. Comments, questions, corrections, and suggestions relating to this document are welcomed and can be sent to [email protected]. Trademarked names are used throughout this document; the trademark sym- bols have been omitted for editorial convenience with no intention of trade- mark infringement. Where such omissions exist the trademarked name has been printed with initial capitals. About the Author Kevin Hughes designs hypermedia products for EIT and is their webmaster. He has written Entering the World-Wide Web: A Guide to Cyberspace, an introduction to the World-Wide Web that has been used as training material in numerous companies and universities, and is a member of the World-Wide Web Hall of Fame. Enterprise Integration Technologies 800 El Camino Real Menlo Park, CA • 94025 Lobby: (415) 617-8000 Fax: (415) 617-8019 World-Wide Web: http://www.eit.com/ Thus science may implement the ways in which man produces, stores, and consults the record of the race. Vannevar Bush As We May Think Atlantic Monthly, July 1945 The trouble with the future is that it usually arrives when you least expect it. Arnold H. Glasow Foreword and Preface 5 of 254 Foreword and May 1993 was a quiet month, and it was business as usual on the Preface Internet.
    [Show full text]
  • Weaving a Better Tomon
    WORLD WIDE WEB Weaving a better tomon The World Wide Web is 10 years old, but it is only just beginning to fulfil its potential. At the eighth World Wide Web conference in Toronto in May, James Gillies learned what the next decade might have in store. "It was a weird conference," said Ethernet inventor and self-styled technology pundit, Bob Metcalfe, summing up the eighth World Wide Web conference (WWW8). "Imagine," he continued, "sitting there lis­ tening to a senior executive of IBM wearing a tee-shirt and a beard." Appearances were not deceptive as Big Blue's vice president for Internet Technology, John Patrick, captured the spirit of the confer­ ence. "Power to the people," he said, would be the driving force behind the computing industry as we enter the new millennium. For if one thing is abundantly clear, it's that the political geography of information technology has been turned on its head by personal Technical support at the World Wide Web conferences is traditionally s< computing and the World Wide Web. "Stand aside, besuited corpo­ wall, assembled during the conference to mark the Web's 10th anniver rate executives", came the message. Make way for the altruistic work, just for the pleasure of being there. geeks: the future belongs to them. It's rare to find such an optimistic bunch of people.The pony-tail count may have been way above average and the word "cool" still cool, but WWW8 delegates have their hearts in the right place.They are the ones who have made the Web, motivated only by the fun of playing with computers and the belief that the Web can make the world a better place.
    [Show full text]