80 research outputs found

    Internet provision for universities in central Asia

    Get PDF

    Blown to Bits Project

    Get PDF
    The book, Blown to Bits, uncovers the many ways that the new digital world has changed and is changing our whole environment. Some changes are incremental but others are more revolutionary. Some of the changes that we welcome are slowly eroding our privacy and are changing the rules of ownership. This book illuminates the complexities of these changes. I have attempted to capture the central points in selected chapters, and in some cases I have added new material or new examples to replace dated material. I picked chapters to summarize that address the following topics (and more). There are many pieces of data that exist about each of us that aggregators can piece together often because we willingly give it up to receive some service. Because of that we have little privacy left. Ownership of digitized content is being redefined legally because digital copies are as good as the original and because those copies are difficult to control. The change from an analog world to a digital world is revolutionary, and the social customs and laws are slow to adapt to the change. Encryption now is generally accepted by legislators because it is necessary for banking transactions and other commercial activity, but it gives rise to activities such as the dark web (example, the Silk Road). How does the technology behind the dark web work? The pervasive nature of digital images, digital text, GPS data, metadata, and the nature of software applications makes inadvertent disclosure of information almost impossible to control. How can laws be fashioned to control predatory behavior on the web? The supplementary materials I have created unpacks the chapters that focus on these issues. In addition I have added other materials useful for instructors who choose to use the book (some technical material, assignments and rubrics).https://scholars.fhsu.edu/informatics_oer/1000/thumbnail.jp

    14th Five-Year Plan for National Informatization (2021)

    Get PDF

    Internet Predictions

    Get PDF
    More than a dozen leading experts give their opinions on where the Internet is headed and where it will be in the next decade in terms of technology, policy, and applications. They cover topics ranging from the Internet of Things to climate change to the digital storage of the future. A summary of the articles is available in the Web extras section

    Research @ FoCus it

    Get PDF

    Cracks in the internet's foundation: the future of the internet's infrastructure and global internet governance

    Full text link
    The foundation of the Internet is showing cracks. Central elements of the Internet's infrastructure are the result of decisions made decades ago. Since then, however, the technical context has changed dramatically, as has the political significance of the Internet. Three conflicts over the future development of the Internet infrastructure are particularly important for German policy-makers. The first is about secu­rity and privacy in the Internet’s addressing system, the so-called Domain Name System (DNS). Second, a conflict is building up over the security of the Border Gateway Protocol (BGP) - the protocol used to coordinate data traffic on the Internet. Third, the security and availability of submarine cables, which form the physical backbone of the global Internet, are proving in­creasingly problematic. If these conflicts remain unresolved, while at the same time the demands on the Internet continue to rise worldwide, the consequences for security, privacy, and economic development will be increasingly negative. Moreover, the Internet is in danger of being split, all the way to the infrastructure level. This multifaceted field of conflict demands a clear strategic approach from German policy-makers. In accordance with their own digital policy demands, they should at the same time pursue the goal of worldwide inter­operability and address the issues described within a European framework. The challenge here is to shape the further development of the Internet infra­tructure in Europe in such a way that it complements - and does not fur­ther jeopardise - the shared global foundation of the Internet. (author's abstract

    Desenvolvimento da governança da internet na China contemporânea : estratégia de autonomia e de expansão econômica-securitária?

    Get PDF
    O estudo objetiva compreender o papel do Estado Chinês na estruturação e consolidação da Internet Chinesa, mais especificamente na configuração do discurso da Governança da Internet com características de ciber-soberania. Argumenta-se que o acirramento da competição interestatal pelo setor de tecnologia de ponta entre EUA e China apresenta raízes históricas evidencializadas pelos diferentes discursos desses países sobre a Governança da Internet: um baseado no modelo multissetorial, com características neoliberais, e outro, no modelo cibersoberano, com características nacionalistas. O trabalho enfoca no desenvolvimento do discurso chinês a partir da perspectiva da Economia Política Crítica, com a análise de documentos das agências estatais, das unidades do capital a partir de 1994, quando a China se conecta pela primeira vez a Internet, até 2020. Argumenta-se que a Governança da Internet Chinesa se formulou das relações associativas com o capital nacional com foco no desenvolvimento de tecnologia autóctone, e menos como causa da estrutura política centralizada no Partido Comunista Chinês.This study aims to comprehend the Chinese State role on the Internet structuring and consolidation, more specifically at Internet Governance discourse with cyber-sovereignty characteristics. It argues that the enhanced of interstate competition at high technology sector between US and China is rooted on the historical background of Internet Governance: one of them, the multistakeholder model, with neoliberal traces, and the other, the cyber-sovereignty model, with nationalist traces. In this sense, this work focus on the Chinese discourse development from a Critical Political Economy perspective, it analyzes primary documents from state agencies and capital unities from 1994, when China has connected the first time to the Internet, to 2020. It argues that Chinese Internet Governance was formulated from the associative relations with the domestic capital, with more focus on the national technology development and less as cause of a political structure centered on Communist Chinese Party

    Multi-Client Embedded Telemetry System (MCETS)

    Get PDF
    The Multi-Client Embedded Telemetry System (MCETS) is an ultra-low-power prototype data acquisition system developed in collaboration with MIT Lincoln Laboratory for testing components of the Ballistic Missile Defense System. Capable of collecting both atmospheric and kinematic data, the MCETS incorporates a network of small modular clients that stream data to a server in real-time. This project is concerned with all aspects of the system, including defining the system\u27s functionality, designing the client hardware, developing firmware, and writing server-control software

    An Overview of Cryptography (Updated Version, 3 March 2016)

    Get PDF
    There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography...While cryptography is necessary for secure communications, it is not by itself sufficient. This paper describes the first of many steps necessary for better security in any number of situations. A much shorter, edited version of this paper appears in the 1999 edition of Handbook on Local Area Networks published by Auerbach in September 1998
    • …
    corecore