80 research outputs found
Blown to Bits Project
The book, Blown to Bits, uncovers the many ways that the new digital world has changed and is changing our whole environment. Some changes are incremental but others are more revolutionary. Some of the changes that we welcome are slowly eroding our privacy and are changing the rules of ownership. This book illuminates the complexities of these changes. I have attempted to capture the central points in selected chapters, and in some cases I have added new material or new examples to replace dated material. I picked chapters to summarize that address the following topics (and more). There are many pieces of data that exist about each of us that aggregators can piece together often because we willingly give it up to receive some service. Because of that we have little privacy left. Ownership of digitized content is being redefined legally because digital copies are as good as the original and because those copies are difficult to control. The change from an analog world to a digital world is revolutionary, and the social customs and laws are slow to adapt to the change. Encryption now is generally accepted by legislators because it is necessary for banking transactions and other commercial activity, but it gives rise to activities such as the dark web (example, the Silk Road). How does the technology behind the dark web work? The pervasive nature of digital images, digital text, GPS data, metadata, and the nature of software applications makes inadvertent disclosure of information almost impossible to control. How can laws be fashioned to control predatory behavior on the web? The supplementary materials I have created unpacks the chapters that focus on these issues. In addition I have added other materials useful for instructors who choose to use the book (some technical material, assignments and rubrics).https://scholars.fhsu.edu/informatics_oer/1000/thumbnail.jp
Internet Predictions
More than a dozen leading experts give their opinions on where the Internet is headed and where it will be in the next decade in terms of technology, policy, and applications. They cover topics ranging from the Internet of Things to climate change to the digital storage of the future. A summary of the articles is available in the Web extras section
Recommended from our members
Heterogeneous Networking for Beyond 3G system in a High-Speed Train Environment. Investigation of handover procedures in a high-speed train environment and adoption of a pattern classification neural-networks approach for handover management
Based on the targets outlined by the EU Horizon 2020 (H2020) framework, it is expected that heterogeneous networking will play a crucial role in delivering seamless end-to-end ubiquitous Internet access for users. In due course, the current GSM-Railway (GSM-R) will be deemed unsustainable, as the demand for packet-oriented services continues to increase. Therefore, the opportunity to identify a plausible replacement system conducted in this research study is timely and appropriate.
In this research study, a hybrid satellite and terrestrial network for enabling ubiquitous Internet access in a high-speed train environment is investigated. The study focuses on the mobility management aspect of the system, primarily related to the handover management. A proposed handover strategy, employing the RACE II MONET and ITU-T Q.65 design methodology, will be addressed. This includes identifying the functional model (FM) which is then mapped to the functional architecture (FUA), based on the Q.1711 IMT-2000 FM. In addition, the signalling protocols, information flows and message format based on the adopted design methodology will also be specified. The approach is then simulated in OPNET and the findings are then presented and discussed.
The opportunity of exploring the prospect of employing neural networks (NN) for handover is also undertaken. This study focuses specifically on the use of pattern classification neural networks to aid in the handover process, which is then simulated in MATLAB. The simulation outcomes demonstrated the effectiveness and appropriateness of the NN algorithm and the competence of the algorithm in facilitating the handover process
Cracks in the internet's foundation: the future of the internet's infrastructure and global internet governance
The foundation of the Internet is showing cracks. Central elements of the Internet's infrastructure are the result of decisions made decades ago. Since then, however, the technical context has changed dramatically, as has the political significance of the Internet. Three conflicts over the future development of the Internet infrastructure are particularly important for German policy-makers. The first is about secuÂrity and privacy in the Internet’s addressing system, the so-called Domain Name System (DNS). Second, a conflict is building up over the security of the Border Gateway Protocol (BGP) - the protocol used to coordinate data traffic on the Internet. Third, the security and availability of submarine cables, which form the physical backbone of the global Internet, are proving inÂcreasingly problematic. If these conflicts remain unresolved, while at the same time the demands on the Internet continue to rise worldwide, the consequences for security, privacy, and economic development will be increasingly negative. Moreover, the Internet is in danger of being split, all the way to the infrastructure level. This multifaceted field of conflict demands a clear strategic approach from German policy-makers. In accordance with their own digital policy demands, they should at the same time pursue the goal of worldwide interÂoperability and address the issues described within a European framework. The challenge here is to shape the further development of the Internet infraÂtructure in Europe in such a way that it complements - and does not furÂther jeopardise - the shared global foundation of the Internet. (author's abstract
Desenvolvimento da governança da internet na China contemporânea : estratégia de autonomia e de expansão econômica-securitária?
O estudo objetiva compreender o papel do Estado ChinĂŞs na estruturação e consolidação da Internet Chinesa, mais especificamente na configuração do discurso da Governança da Internet com caracterĂsticas de ciber-soberania. Argumenta-se que o acirramento da competição interestatal pelo setor de tecnologia de ponta entre EUA e China apresenta raĂzes histĂłricas evidencializadas pelos diferentes discursos desses paĂses sobre a Governança da Internet: um baseado no modelo multissetorial, com caracterĂsticas neoliberais, e outro, no modelo cibersoberano, com caracterĂsticas nacionalistas. O trabalho enfoca no desenvolvimento do discurso chinĂŞs a partir da perspectiva da Economia PolĂtica CrĂtica, com a análise de documentos das agĂŞncias estatais, das unidades do capital a partir de 1994, quando a China se conecta pela primeira vez a Internet, atĂ© 2020. Argumenta-se que a Governança da Internet Chinesa se formulou das relações associativas com o capital nacional com foco no desenvolvimento de tecnologia autĂłctone, e menos como causa da estrutura polĂtica centralizada no Partido Comunista ChinĂŞs.This study aims to comprehend the Chinese State role on the Internet structuring and consolidation, more specifically at Internet Governance discourse with cyber-sovereignty characteristics. It argues that the enhanced of interstate competition at high technology sector between US and China is rooted on the historical background of Internet Governance: one of them, the multistakeholder model, with neoliberal traces, and the other, the cyber-sovereignty model, with nationalist traces. In this sense, this work focus on the Chinese discourse development from a Critical Political Economy perspective, it analyzes primary documents from state agencies and capital unities from 1994, when China has connected the first time to the Internet, to 2020. It argues that Chinese Internet Governance was formulated from the associative relations with the domestic capital, with more focus on the national technology development and less as cause of a political structure centered on Communist Chinese Party
Multi-Client Embedded Telemetry System (MCETS)
The Multi-Client Embedded Telemetry System (MCETS) is an ultra-low-power prototype data acquisition system developed in collaboration with MIT Lincoln Laboratory for testing components of the Ballistic Missile Defense System. Capable of collecting both atmospheric and kinematic data, the MCETS incorporates a network of small modular clients that stream data to a server in real-time. This project is concerned with all aspects of the system, including defining the system\u27s functionality, designing the client hardware, developing firmware, and writing server-control software
An Overview of Cryptography (Updated Version, 3 March 2016)
There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography...While cryptography is necessary for secure communications, it is not by itself sufficient. This paper describes the first of many steps necessary for better security in any number of situations.
A much shorter, edited version of this paper appears in the 1999 edition of Handbook on Local Area Networks published by Auerbach in September 1998
- …