Internet History

Author(s):  
Raphael Cohen-Almagor

This paper outlines and analyzes milestones in the history of the Internet. As technology advances, it presents new societal and ethical challenges. The early Internet was devised and implemented in American research units, universities, and telecommunication companies that had vision and interest in cutting-edge research. The Internet then entered into the commercial phase (1984-1989). It was facilitated by the upgrading of backbone links, the writing of new software programs, and the growing number of interconnected international networks. The author examines the massive expansion of the Internet into a global network during the 1990s when business and personal computers with different operating systems joined the universal network. The instant and growing success of social networking-sites that enable Netusers to share information, photos, private journals, hobbies, and personal as well as commercial interests with networks of mutual friends and colleagues is discussed.

2011 ◽  
Vol 2 (2) ◽  
pp. 45-64 ◽  
Author(s):  
Raphael Cohen-Almagor

This paper outlines and analyzes milestones in the history of the Internet. As technology advances, it presents new societal and ethical challenges. The early Internet was devised and implemented in American research units, universities, and telecommunication companies that had vision and interest in cutting-edge research. The Internet then entered into the commercial phase (1984-1989). It was facilitated by the upgrading of backbone links, the writing of new software programs, and the growing number of interconnected international networks. The author examines the massive expansion of the Internet into a global network during the 1990s when business and personal computers with different operating systems joined the universal network. The instant and growing success of social networking-sites that enable Netusers to share information, photos, private journals, hobbies, and personal as well as commercial interests with networks of mutual friends and colleagues is discussed.


Author(s):  
Chetan Kumar

The amount and range of information on the Internet is growing at a rapid pace. Cisco systems report (2008) expects Internet traffic growth to be spurred by video, social networking and collaboration applications collectively referred to as Web 2.0 technologies. The Cisco systems report (2008) forecasts that “global Internet Protocol (IP) traffic will increase by a factor of six from 2007 to 2012, reaching 44 exabytes per month in 2012, compared to fewer than 7 exabytes per month in 2007.” ComScore report (2009) estimates that the total global Internet audience has surpassed 1 billion visitors in December 2008. Magid Abraham, CEO of ComScore Inc., says “Surpassing one billion global users is a significant landmark in the history of the Internet. It is a monument to the increasingly unified global community in which we live and reminds us that the world truly is becoming more flat. The second billion will be online before we know it, and the third billion will arrive even faster than that, until we have a truly global network of interconnected people and ideas that transcend borders and cultural boundaries.” The increase in Internet traffic is aided because making information available online is becoming relatively inexpensive, and as more people have Internet access demand for information increases. The trend of increasing Internet traffic is likely to continue (Datta et al. 2003, Cisco systems report 2008).


2020 ◽  
Vol 8 (1) ◽  
pp. 37 ◽  
Author(s):  
Noel Packard

The Internet is a split civilian and military entity in physical and social construction. Investigating this split entity in all its manifestations is an important venture, but this study explores the split social construction of the ARPANET’s reported history. ARPANET/Internet literature shows a division between literature that does and does not include the history of the intelligence communities (IC) working relationship with the pre-privatized ARPANET. Two different genres of literature are discussed, charted in a Table and compared to aspects of the ARPANET’s known and reported developmental and privatization history. Different origin stories are discussed in a general way; then a pattern in the literature is explored, namely, how illegally and libelous spy data gathered in 1960s intelligence community (IC) operations and processed through the pre-privatized ARPANET, is acknowledged in indirect or secondhand ways, when ARPA demonstrated feasibility of the ARPANET ; while after pyritization the literature acknowledges IC spying through the commercialized Internet in firsthand and direct ways. The study examines how earlier and contemporary literature continues contesting the role that 1960s IC spy data played in demonstrating the feasibility of the ARPANET; a prerequisite test for the privatization of the ARPANET. Findings indicate ARPANET histories have excluded direct reporting about how ARPA and the IC demonstrated ARPANET’s feasibility prior to privatization. The conclusion is that understanding history about how ARPA and the IC demonstrated ARPANET’s feasibility, makes it easier to comprehend reports about how the Internet serves counterinsurgency purposes. The study confirms ongoing debates about the social construction of Internet history. 


Author(s):  
Elisabeth Jay Friedman

This book provides the first in-depth exploration of how Latin American feminist and queer activists have interpreted the internet, from its inception in the region through the explosion of social media. They have done so to support their counterpublics: the diverse and dynamic arenas in which they develop their identities, build their communities, and hone their strategies for social change. This region boasts a long history of gender- and sexuality-based counterpublic construction, supported by a range of alternative media. Since the 1990s, aided by a global network of women and men dedicated to establishing an accessible internet, activists have translated the internet into their own vernacular. Through an analysis of original research based on over 125 interviews and online evidence spanning fifteen years, this book advances three interrelated arguments. First, it supports the sociomaterial thesis that, as with all technologies, the internet is influenced by the social contexts in which it is embedded. But this influence changes over time and place. Second, the internet in itself offers no guarantee of social or political transformation. Instead, this book’s third argument is that the internet’s potential depends on the consciousness and creativity with which activists translate it into their own contexts, through adopting, sharing, and wielding it. In Latin America, feminist and queer counterpublic organizations have taken advantage of all three layers of the internet – physical, logical, and content – to extend and enrich their communities. And, led by their “keystone species” of early adopting, technologically savvy members, they have transformed applications from distribution lists to blogs in order to reflect their values.


Author(s):  
Dan Jerker B. Svantesson

Internet jurisdiction has emerged as one of the greatest and most urgent challenges online, severely affecting areas as diverse as e-commerce, data privacy, law enforcement, content take-downs, cloud computing, e-health, Cyber security, intellectual property, freedom of speech, and Cyberwar. In this innovative book, Professor Svantesson presents a vision for a new approach to Internet jurisdiction––for both private international law and public international law––based on sixteen years of research dedicated specifically to the topic. The book demonstrates that our current paradigm remains attached to a territorial thinking that is out of sync with our modern world, especially, but not only, online. Having made the claim that our adherence to the territoriality principle is based more on habit than on any clear and universally accepted legal principles, Professor Svantesson advances a new jurisprudential framework for how we approach jurisdiction. He also proposes several other reform initiatives such as the concept of ‘investigative jurisdiction’ and an approach to geo-blocking, aimed at equipping us to solve the Internet jurisdiction puzzle. In addition, the book provides a history of Internet jurisdiction, and challenges our traditional categorisation of different types of jurisdiction. It places Internet jurisdiction in a broader context and outlines methods for how properly to understand and work with rules of Internet jurisdiction. While Solving the Internet Puzzle paints a clear picture of the concerns involved and the problems that needs to be overcome, this book is distinctly aimed at finding practical solutions anchored in a solid theoretical framework.


Cryptography ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 14
Author(s):  
Xavier Boyen ◽  
Udyani Herath ◽  
Matthew McKague ◽  
Douglas Stebila

The conventional public key infrastructure (PKI) model, which powers most of the Internet, suffers from an excess of trust into certificate authorities (CAs), compounded by a lack of transparency which makes it vulnerable to hard-to-detect targeted stealth impersonation attacks. Existing approaches to make certificate issuance more transparent, including ones based on blockchains, are still somewhat centralized. We present decentralized PKI transparency (DPKIT): a decentralized client-based approach to enforcing transparency in certificate issuance and revocation while eliminating single points of failure. DPKIT efficiently leverages an existing blockchain to realize an append-only, distributed associative array, which allows anyone (or their browser) to audit and update the history of all publicly issued certificates and revocations for any domain. Our technical contributions include definitions for append-only associative ledgers, a security model for certificate transparency, and a formal analysis of our DPKIT construction with respect to the same. Intended as a client-side browser extension, DPKIT will be effective at fraud detection and prosecution, even under fledgling user adoption, and with better coverage and privacy than federated observatories, such as Google’s or the Electronic Frontier Foundation’s.


2021 ◽  
Vol 18 (1) ◽  
Author(s):  
Margo S. Harrison ◽  
Ana Garces ◽  
Lester Figueroa ◽  
Jamie Westcott ◽  
Michael Hambidge ◽  
...  

Abstract Objectives Our objectives were to analyze how pregnancy outcomes varied by cesarean birth as compared to vaginal birth across varying interpregnancy intervals (IPI) and determine if IPI modified mode of birth. Methods This secondary analysis used data from a prospective registry of home and hospital births in Chimaltenango, Guatemala from January 2017 through April 2020, through the Global Network for Women’s and Children’s Health Research. Bivariate comparisons and multivariable logistic regression were used to answer our study question, and the data was analyzed with STATA software v.15.1. Results Of 26,465 Guatemalan women enrolled in the registry, 2794 (10.6%) had a history of prior cesarean. 560 (20.1%) women delivered by vaginal birth after cesarean with the remaining 2,233 (79.9%) delivered by repeat cesarean. Repeat cesarean reduced the risk of needing a dilation and curettage compared to vaginal birth after cesarean, but this association did not vary by IPI, all p-values > p = 0.05. Repeat cesarean delivery, as compared to vaginal birth after cesarean, significantly reduced the likelihood a woman breastfeeding within one hour of birth (AOR ranged from 0.009 to 0.10), but IPI was not associated with the outcome. Regarding stillbirth, repeat cesarean birth reduced the likelihood of stillbirth as compared to vaginal birth (AOR 0.2), but again IPI was not associated with the outcome. Conclusion Outcomes by mode of delivery among a Guatemalan cohort of women with a history of prior cesarean birth do not vary by IPI.


2003 ◽  
Vol 28 (1) ◽  
pp. 10-14 ◽  
Author(s):  
Christian David ◽  
Catherine Granger ◽  
Nicole Picot

The French national museum libraries service comprises 21 libraries specialising in the history of western art and archaeology. The central library, which is at the head of the network, was automated first and has completed its retrospective conversion. At first this library catalogued the material acquired for all the others; then a number of them were able in their turn to computerise and thus contribute directly to the union catalogue of the national museum libraries. This can now be consulted on the internet site of the Ministry of Culture.


Sign in / Sign up

Export Citation Format

Share Document