Search (3 results, page 1 of 1)

  • × classification_ss:"SR 800 Informatik / Nachschlagewerke. Didaktik / Allgemeines, Nachschlagewerke, Ausbildung / Geschichte der Datenverarbeitung"
  1. Levinson, P.: ¬The soft edge : a natural history and future of the information revolution (1997) 0.01
    0.007762692 = product of:
      0.054338843 = sum of:
        0.04204743 = weight(_text_:elektronische in 342) [ClassicSimilarity], result of:
          0.04204743 = score(doc=342,freq=4.0), product of:
            0.14226305 = queryWeight, product of:
              4.728978 = idf(docFreq=1061, maxDocs=44218)
              0.030083254 = queryNorm
            0.29556113 = fieldWeight in 342, product of:
              2.0 = tf(freq=4.0), with freq of:
                4.0 = termFreq=4.0
              4.728978 = idf(docFreq=1061, maxDocs=44218)
              0.03125 = fieldNorm(doc=342)
        0.012291413 = weight(_text_:information in 342) [ClassicSimilarity], result of:
          0.012291413 = score(doc=342,freq=18.0), product of:
            0.052810486 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.030083254 = queryNorm
            0.23274568 = fieldWeight in 342, product of:
              4.2426405 = tf(freq=18.0), with freq of:
                18.0 = termFreq=18.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.03125 = fieldNorm(doc=342)
      0.14285715 = coord(2/14)
    
    Abstract
    According to Paul Levinson, it would be improper to portray information technology as the cause of change in our world. However, Levinson clarifies that its role in enabling change can hardly be overestimated. He also points out--through riveting examples--that inventions have unintended consequences and uses. Why is it, for example, that the move from polytheism to monotheism failed when attempted by the pharaoh Ikhnaton, yet took solid root among the Hebrews who were taken out of Egypt by Moses only about 150 years later? Levinson argues that communication technology played a key role: The awkward Egyptian hieroglyphics failed to carry the ideology as well as the Hebrew alphabetic system. From there, Levinson examines the early social changes that became possible because of what the author calls "the first digital medium"--the alphabet. He considers how the Reformation, economic and political movements, and the scientific revolution were largely enabled by the printing press. He then discusses the influence of photographic communications and electronic technology such as the telegraph, the telephone, and broadcasting. Levinson devotes the second half of the book to our present digital revolution, from word processing to the Internet and beyond. One of his key points is that new technology doesn't necessarily displace the old so much as it expands it. Therefore, he doesn't see any end to using paper anytime soon. However, he sees great need for changes in the way we view creative rights. He proposes what he calls an"electronic watermark" for intellectual property--a universal patent number that will be embedded in intellectual property and will notify users in any medium of the property's creators. Levinson puts forth his ideas in a manner that is both formal and engaging. He has a knack for making his reader feel intelligent and respected--and never more so than when he looks at issues of ethics and a speculative future.
    BK
    05.38 / Neue elektronische Medien <Kommunikationswissenschaft>
    Classification
    05.38 / Neue elektronische Medien <Kommunikationswissenschaft>
    Footnote
    Rez. in: Managing information 4(1997) no.11, S.41 (M. Duncan)
    LCSH
    Information technology / Social aspects
    Information technology / History
    Information technology / Forecasting
    Subject
    Information technology / Social aspects
    Information technology / History
    Information technology / Forecasting
  2. Heintz, B.: ¬Die Herrschaft der Regel : zur Grundlagengeschichte des Computers (1993) 0.00
    5.822665E-4 = product of:
      0.0081517305 = sum of:
        0.0081517305 = product of:
          0.024455192 = sum of:
            0.024455192 = weight(_text_:22 in 221) [ClassicSimilarity], result of:
              0.024455192 = score(doc=221,freq=2.0), product of:
                0.10534643 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.030083254 = queryNorm
                0.23214069 = fieldWeight in 221, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.046875 = fieldNorm(doc=221)
          0.33333334 = coord(1/3)
      0.071428575 = coord(1/14)
    
    Date
    22. 4.2007 12:26:52
  3. Schmeh, K.: ¬Die WeIt der geheimen Zeichen : die faszinierende Geschichte der Verschlüsselung (2004) 0.00
    1.8290794E-4 = product of:
      0.002560711 = sum of:
        0.002560711 = weight(_text_:information in 1445) [ClassicSimilarity], result of:
          0.002560711 = score(doc=1445,freq=2.0), product of:
            0.052810486 = queryWeight, product of:
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.030083254 = queryNorm
            0.048488684 = fieldWeight in 1445, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              1.7554779 = idf(docFreq=20772, maxDocs=44218)
              0.01953125 = fieldNorm(doc=1445)
      0.071428575 = coord(1/14)
    
    Footnote
    Das Buch beeindruckt durch eine große Vielfalt von Themen. So wird auch das Problem angesprochen, dass ein eigentlich sicheres Verfahren dadurch gefährdet sein kann, dass dem Angreifer Seitenkanäle der Information, wie etwa der Stromverbrauch einer Chipkarte, zur Verfügung stehen. Potenzielle Bedrohungen gegenwärtiger Verschlüsselungsverfahren sind der DNA-Computer und der Quantencomputer. Aber man hat die Aussicht, den Teufel mit dem Beelzebub auszutreiben, nämlich den Quantencomputer mit der Quantenkryptografie. Nicht ausdrücklich in dem Buch angesprochen ist das Problem der Authentifikation von Nachrichten. Der Empfänger einer Nachricht muss sich vergewissern, dass ihr Sender der ist, der er zu sein vorgibt. Sonst könnte sich ein Obeltäter bereits beim Schlüsselaustausch unbemerkt zwischen die beiden Parteien drängen und von da an jede Kommunikation unter ihnen unentdeckt verfälschen. Dagegen hilft auch das einzige nachweislich unknackbare Verschlüsselungsverfahren, der One-Time-Pad, nicht, da ein Angreifer gezielt »Bits kippen« und so die Nachricht, ohne sie zu entschlüsseln, verfälschen kann. Da selbst Fachbücher kaum auf dieses Problem hinweisen, wurde der One-Time-Pad bereits - nutzlos - in kommerzielle quantenkryptografische Programme eingebaut. Die in dem Buch besprochenen digitalen Signaturen können solche Probleme lösen, solange man nicht auf nachweislicher Unknackbarkeit besteht. Schmeh widmet sich auch den so genannten Hash-Funktionen, die aus einer großen Datei eine kurze Kennnummer errechnen und damit etwa Signaturverfahren beschleunigen können, da es genügt, diese Kennnummer zu signieren.

Languages