INTERNET - What It Is Now
The 9th Wonder of the World
2015 Etherium the utopia algorithm offers Encrypted P2P Networks. Ethereum is an open-source project which is available to everyone that does two things. It's building 'deep infrastructure' Ethereum links all that spare power and space and allows people to build apps, websites and software that other users can access. Because it runs with strong encryption and the network is 'distributed' across all those individual computers, it's more or less impossible for anyone to censor or control what's on it. Second, it allows people to create immutable, public transaction records. Borrowing the idea from the digital currency bitcoin, Ethereum uses something called a 'block chain' to record information on a public database in a chronological way that prevents copying, tampering, fraud or deletion. It's a new anonymous, decentralised, uncensored internet, and a new way of controlling and storing information. This will change the internet.
2014 The New Editors of the Internet
In a small number of Silicon Valley conference rooms, decisions are being made about what people should and
shouldn't see online—without the accountability or culture that has long accompanied that responsibility. By
Dan Gillmor
theatlantic.com/
Bowing to their better civic natures, and the pleas of James Foley's family, Twitter and YouTube have pulled
down videos and photos of his murder. They had every right to do so, and in my view they did the right
thing.
So why am I so uncomfortable with this? Because it's not clear what's too vile to host. And, even more,
because Twitter and YouTube are among a tiny group of giant companies with greater and greater power—and
less
and less accountability—over what we read, hear, and watch online.
Who gave them this power? We did. And if we don't take back what we've given away—and
what's
being taken away—we'll deserve what we get: a concentration of media power that will damage, if not
eviscerate, our tradition of free expression.
For the moment, it's reasonable to dismiss the widely repeated accusation that removing the Foley videos was
an act of censorship. When Twitter worked with the Turkish regime to remove certain accounts, that was
censorship, if by proxy, because it was done on the orders of a government. And, of course, when governments
directly block Twitter, YouTube, Facebook, and other services, as some do, that is direct censorship. But
when
Twitter and YouTube took down a murder-as-propaganda video, that was editing. (Show me evidence that the
U.S.
government persuaded Twitter and YouTube to do this, as it almost certainly did when the major payment
systems
cut off Wikileaks' funding several years ago, and I'll revise that view.)
Editing, yes, but on an epic scale—and critics are absolutely right to raise some stark questions. What
precedent does this set? What actual policies are at work? Are the policies being applied consistently? If
it's appropriate to take down these videos and pictures, why not the images of so many others who've been
the
victims of ISIS and other criminals?
All are important questions, but the reason they're so important, again, is the clout these services exert
in
the information marketplace. There was little uproar, after all, when the anything-goes LiveLeak—which hosts
videos that most others find beyond the pale—vowed not to post any ISIS beheading videos, on the reasonable
grounds that it's wrong to help murderers do public relations.
What makes so many free-speech protectors fret in the current situation, again, is not the instinct to
protect
an unwary public from encountering the worst of humanity, or to avoid helping barbarian propagandists. It is
the slippery slope issue, and this is getting more worrisome every day with the growing domination of
Facebook, Google, and Twitter over our media flow.
They're dominant not because they've taken control, but because we've given them control—and not for all bad
reasons. These services are enormously useful and convenient. But because we aren't paying for these
services,
we users are, as the saying goes, the products being sold to advertisers. We have no rights beyond what the
companies give us in their terms of service, where quaint ideas like the First Amendment have no
application.
When Facebookdecides what you see in your timeline, you have no recourse—because you “agreed” to terms of
service that are grossly one-sided and not constrained by the Bill of Rights.
I'm a frequent Twitter user, in part because the company has for the most part been a strong protector of
free
speech. I confess to some misgivings about my own tendency to put so much of what I do into a proprietary
service that increasingly makes clear that it controls the experience. Even as it was taking down the Foley
videos, Twitter was expanding its unilateral tweaking of users' timelines,inserting posts that the users did
not ask for—a major breach in the bargain Twitter made with us from its early days. (I don't trust Facebook
at
all, and use it rarely, and have been using DuckDuckGo, which doesn't track users, as an alternative search
engine—though I do use some Google services.)
Journalists have been especially short-sighted in their eagerness to use social networks, feeding enormous
amounts of content into third-party services they do not in any way control and which get, by far, the best
of
the bargain in the long run. Guess what, journalism companies? Facebook is going to be your biggest
competitor
in the long run. Twitter is a media company, too. And Google's eating your lunch every day.
[snip]
2014 This Map Shows Every Connected Device On The Internet
Shodan, a search engine for connected devices. brought
to you by Earth System Research Laboratory
Global Monitoring Division
2014 Here is an archive of email header list discussions from 1979. I don't know whether
to
be impressed or depressed by the degree to which it is the same people who are still discussing the same kind of issues now as was discussed 35 years ago !!!!!
The first
file starts with complaining about a 64K [actually (2**19-1)/9 characters] limit on messages message
imposed by Multics FTP.
2014 China bans use of Microsoft's Windows 8 on government computers and According to StatCounter, IE is used more than 25% of the time worldwide. Chrome is at about 40%, and Firefox is in third at about 20%. In the U.S. specifically, IE is about 30% and FF is about 15%. Source: http://gs.statcounter.com/
2014 EU Pushes to Globalize Internet Governance
Everybody demands their divine right for a monopoly whether its domestic FonHedz or Soluable States, er, "Soverign" States.
It's the "Tooltime School of Political Sociology".
The only thing Power wants is... "MORE POWER!" and to expect any other behavior is either irrational or delusional, depending on where you're standing.
CHANGE THE WORLD
We are all sitting on the cusp between the old physical and new virtual worlds of information.
2013 The Internet in general and "big data" is like a "planetary" or "global" nervous system. Can you believe the weakness in stupid password identity protocols? Can you believe they built up a whole digital society that rested on such a weak foundation? Can you believe the flow of power plants, electricity, water, weapons systems, healthcare services, money, and social interaction were built on top of protocols that were easily spoofed, stolen and replayed?
2014 On October 30-31, 2013, The New York Review of Books held a conference, “Power, Privacy, and the Internet,” at Scandinavia House in
New
York City, with generous support from The Fritt Ord Foundation of Oslo, PEN America, Sarah and Landon
Rowland,
The Europaeum of Oxford, The Lead Bank of Kansas City, and the Institute for Public Knowledge at New York
University.
Simon Head, director of programs for The New York Review of Books Foundation, addressed the theme of the
conference:
The Internet is a transformative technology of our times and it is changing our lives as perhaps nothing
else
has done since the coming of the telephone, the telegraph, and the mass production automobile a century and
more ago. Where the Internet surpasses these earlier technologies is in the speed with which its reach is
expanding—in our contacts with one another through Twitter and Facebook, in what we read, hear, and buy; in
our dealings with business, government, colleges and schools, and they in their dealings with us. Whether we
like it or not we are caught up in these flows of technology and as we are carried along by the flows, some
barely visible to us, it becomes increasingly difficult to stand back and distinguish between what is good
about these innovations and what is not.
"If my thought dreams could be seen,
they'd probably put my head in a guillotine"...
Power And The
Internet by Bruce Schneier
All disruptive technologies upset traditional power balances, and the Internet is no exception. The standard
story is that it empowers the powerless, but that's only half the story. The Internet empowers everyone.
Powerful institutions might be slow to make use of that new power, but since they are powerful, they can use
it more effectively. Governments and corporations have woken up to the fact that not only can they use the
Internet, they can control it for their interests. Unless we start deliberately debating the future we want
to
live in, and information technology in enabling that world, we will end up with an Internet that benefits
existing power structures and not society in general. <snip>
2012 Internet Society Board of Trustees Election Results 6/19/12
Subject: [ISOC] ANNOUNCEMENT: 2012 Internet Society Board of Trustees Election Results
To: isoc-members-announce@elists.isoc.org
isoc-members-announce@elists.isoc.org
Message from Jason Livingood, Chair of Internet Society Election Committee:
On behalf of the Internet Society's Election Committee, I wish to extend our appreciation and thanks to all
of
the nominees and final candidates for the Board of Trustees. We are quite honoured to have such
well-qualified
people so interested in serving the Internet Society!
The election results were certified on 24 May 2012 and the challenge period concluded 10 June 2012. The
process ran smoothly and the Election Committee does not have any issues or concerns to report. The new
Trustees will be seated at the Internet Society Board Meeting in Vancouver, Canada, on 4 August 2012.
CHAPTERS
In the Chapter membership election, we had three candidates:
1. Gihan Dias
2. Sala Tamanikaiwaimaro
3. Rudi Vansnick
55 out of the 86 Chapters voted, which is a vote participation rate of 63.95%. In the previous election, the
vote participation was 79.49%.
Rudy Vansnick received the highest number of the votes and has been elected for a three-year term.
ORGANISATIONS
In the Organisation membership election, we had six candidates:
1. Keith Davidson
2. Marshall Eubanks
3. David Farber
4. Demi Getschko
5. Byron Holland
6. Bevil Wooding
52 of the 109 Organisation Members, or 47.71%, voted. They had the opportunity to vote for up to two
candidates, with votes weighted by the class of membership. In the previous election the vote participation
was 50.47%, on a group size of 107 organizations.
Keith Davidson and David Farber, receiving the largest
weighted vote counts, have been elected for three-year terms.
INTERNET ENGINEERING TASK FORCE (IETF)
Using the process documented in RFC 3677, the IAB has re-appointed Eric Burger as the IETF appointee to the
ISOC Board.
We congratulate all of the new and returning trustees and look forward to working with them soon on the
Board
of Trustees. We also thank all nominees and final candidates for their participation, as well as ISOC staff
for their support of this critical process.
Respectfully submitted,
Jason Livingood, Chair
Alain Aina and Theresa Swinehart, Election Committee Members
--
What the Internet Is and How to Stop Mistaking It for Something Else By Doc Searls and David Weinberger March 10, 2003 http://worldofends.com
There are mistakes and there are mistakes. Some mistakes we learn from. For example: Thinking that selling toys for pets on the Web is a great way to get rich. We're not going to do that again. Other mistakes we insist on making over and over.
For example, thinking that:
the Web, like television, is a way to hold eyeballs still while advertisers spray them with messages....the Net is something that telcos and cable companies should filter, control and otherwise "improve."
it's a bad thing for users to communicate between different kinds of instant messaging systems on the Net.
the Net suffers from a lack of regulation to protect industries that feel threatened by it.
When it comes to the Net, a lot of us suffer from Repetitive Mistake Syndrome. This is especially true for magazine and newspaper publishing, broadcasting, cable television, the record industry, the movie industry, and the telephone industry, to name just six.
Thanks to the enormous influence of those industries in Washington, Repetitive Mistake Syndrome also afflicts lawmakers, regulators and even the courts. Last year Internet radio, a promising new industry that threatened to give listeners choices far exceeding anything on the increasingly variety-less (and technologically stone-age) AM and FM bands, was shot in its cradle. Guns, ammo and the occasional "Yee-Haw!" were provided by the recording industry and the Digital Millennium Copyright Act, which embodies all the fears felt by Hollywood's alpha dinosaurs when they lobbied the Act through Congress in 1998.
"The Internet interprets censorship as damage and routes around it," John Gilmore famously said. And it's true. In the long run, Internet radio will succeed. Instant messaging systems will interoperate. Dumb companies will get smart or die. Stupid laws will be killed or replaced. But then, as John Maynard Keynes also famously said, "In the long run, we're all dead.
"All we need to do is pay attention to what the Internet really is. It's not hard. The Net isn't rocket science. It isn't even 6th grade science fair, when you get right down to it. We can end the tragedy of Repetitive Mistake Syndrome in our lifetimes — and save a few trillion dollars' worth of dumb decisions — if we can just remember one simple fact: the Net is a world of ends. You're at one end, and everybody and everything else are at the other ends.
Sure, that's a feel-good statement about everyone having value on the Net, etc. But it's also the basic rock-solid fact about the Net's technical architecture. And the Internet's value is founded in its technical architecture. Fortunately, the true nature of the Internet isn't hard to understand. In fact, just a fistful of statements stands between Repetitive Mistake Syndrome and Enlightenment...
--
"The Internet is a way for all the things that call themselves networks to coexist and work together. It's an inter-network. Literally. What makes the Net inter is the fact that it's just a protocol — the Internet Protocol, to be exact. A protocol is an agreement about how things work together." [SOURCE]
Despite all of our high-tech stuff, some basic truths remain unchanged.
PEERING TECHNOLOGY
Peering economics is an interesting discipline with a wide variety of literature backing it.
This 1999 paper by Geoff Huston, now chief scientist at APNIC, is the most cogent explanation your readers
will ever get about the issue.
http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_2-1/peering_and_settlements.html
and
http://www.cisco.com/
The paper is summarized in this presentation http://www.potaroo.net/presentations/1999-07-05-peering.pdf
the 3 pillars of privacy (consent, notice, and de-identification)
Control over the access to information, whether on scrolls, in books, or flashing onto computer screens, is power. And those persons and organizations who would restrict such access are always the first to realize and manipulate this fact -- to the detriment of society at large. This has been true all throughout human history, and our fancy machines and networks have not made us immune to the same dark traps.
THE FIRST ARCHIVE OF K-12 SCHOOL SITES
In1991 when I started out on the net.
Before there were websites, before it went commercial, before you could buy anything on it, and way before regular people ever heard of it, I was there. We are known as "netizens", a citizen of the net. The internet is the biggest playground in the history of the world because there are no walls, where there should be no boundaries of any kind.
Meet some of the other K - 12 Teachers who were internet pioneers here on the Educational CyberPlayGround responsible for getting schools wired.
SCHOOL DIRECTORY ©1993 K-12 SCHOOLS GO ONLINE
Educational CyberPlayGround hosts the School Directory
Look up Arbor Heights Elementary in Seattle, Washington. One of the first 9 or 10 elementary schools in the US
with a web site. Until the summer of 1995, all pages were all written and maintained on a 386-33, 4mb RAM,
110mb
HD computer using a 14,400 bps modem for file uploads to the server. The browsers used to check this page were
NCSA Mosaic, Cello, and Lynx - Netscape and Internet Explorer weren't around yet.
TEACHERS
How do you
want to teach?
We learn by imitation. We want to integrate technology into the classroom, so Teachers Must Model what we want future teachers to be able to do in their classrooms. This is a perfect example of ideas and concepts put into present day action. Watch an Old style Talk and Chalk video lesson now distributed on the net. Then discuss the changes in the medium, storage and delivery differences from 1972 compared to 2007 and how the ideas and concepts discussed in the film came true or not.
WHAT DO YOU NEED TO KNOW RIGHT NOW
- HOW TO PROTECT THE KIDS INTERNET SAFETY RULES
- ABOUT DISTANCE LEARNING
- ABOUT DOMAINS AND DOMAIN NAMES
- ABOUT EMAIL, MAILING LISTS, SPAM
- ABOUT INTERNET2
- Glossary of Distance Learning Acronyms and definitions
HOW TO FIND
- MUST SEE SEARCH ENGINE FOR DIFFERENT LEARNING STYLES
- ENGINES FOR TEACHERS AND CHILDREN
- SPECIALIZED SEARCH ENGINES
- SEARCH ENGINE SYNTAX, TIPS, RESOURCES
- META GLOSSARY
- Glossary of Distance Learning Acronyms and definitions
- PERMISSION FORM
HOW WE THINK ABOUT THE INTERNET TODAY
Shaping the Web: Why the politics
of search engines matters PDF
This article argues that search engines raise not merely technical issues but also political ones. Our study
of search engines suggests that they systematically exclude (in some cases by design and in
some accidentally) certain sites, and certain types of sites, in favor of others, systematically give
prominence to some at the expense of others.
GFS: Evolution on Fast-forward by
Marshall Kirk McKusick, Sean Quinlan | August 7, 2009 PDF
A discussion between Kirk McKusick and Sean Quinlan about the origin and evolution of the Google File
System.
During the early stages of development at Google, the initial thinking did not include plans for building a
new file system. While work was still being done on one of the earliest versions of the company's crawl
and indexing system, however, it became quite clear to the core engineers that they really had no other
choice, and GFS (Google File System) was born.
It's Silicon Valley vs. Telcos in Battle for Wireless Spectrum
If you want to carry a television signal over a long distance then use that darn Internet. The problem is
that
we have layers upon layers of simplifying assumptions and we pile them on instead of rethinking. This is a
key
point in Robert Laughlin's "A Different Universe".
We tend to solve problems as if they exist in isolation. We do need to decompose problems in order to deal
with them but there isn't a unique decomposition and we have to be open to rethinking the
decomposition.
In the early 1900's the first decomposition was to assume that
"communications" is a unit. We then decomposed that into voice and video. We also
had wired vs wireless. The accidental properties of wires led us to use them for one-to-one communications
because they were point to point connections. Wireless signals couldn't be contained hence they were
broadcast to all. It doesn't help that "radio" and
"telephony" are now used to describe business rather than technologies thus
making it hard to talk about the basic assumptions separate from the market assumptions.
This is why TV over wires is not treated as a point to point medium -- it was originally implemented as
shared
antenna system and our policies continue to make that implicit assumption.
Today this decomposition is extremely dysfunctional. We now understand the concept of bits as a common
representation for information and that is a very effective point of decoupling as we've seen with the
Internet.
We can then use packets to organize the bit transports.
This decoupling of the communications from the bit transport (as in TCP/UDP vs IP) is very hard for
people to accept because we base our understanding on the nave assumption that we are simply relaying
sound
waves through electronic tubes. There is assumption that you must preserve the relationships
between the bits as in isochronous and QoS models. This was a defining assumption for analog telephony and
the
solution, eventually, was digital telephony and then packet telephony. We treated the answer as way to make
analog telephony work better without using the new understanding to question whether we were asking the
right
question in light of our understanding. Digital technology freed us from the constraint of isochronicity and
thus allowed us to get many orders of magnitude in improvement (by various measures). But it was an
answer the put a lie to the decomposition that defined the industry that asked the question in the first
place and thus they had a stake in failing to understand the answer they got.
Once you decouple the bits from the interpretation you can view wired and wireless bits indifferently and
can
dispense with the complexity and expense of slicing and dicing the transports and the use of special kinds
of
wires and gear for each particular message.
Yet we continue to argue as if it is still 1934 and every bit is special - sort of like the $100 Japanese
Honeydew Melons but far pricier.
These concepts extend far beyond "telecom" into our basic understanding of how systems work. The
isochronous assumption has a parallel in the assumption that we have to solve problems as stated and that if
any component fails the system fails. Thus the Y2K scare and the presumption that we must
govern systems lest people do things the "wrong" way -- alas wrong often means finding that
we've solved far more interesting problems -- we may have wanted a guidance system for airplanes but we
got digital computers instead. We presume music comes from record companies and not musicians and
thus
we preserve a particular industry structure rather than allowing for musicians to be heard.
Telecom is useful case study because it's a simple problem and the price of continuing to live in 1900
is
higher than we should have to bear.
Too bad this fight over slivers of spectrum is treated as if it were any more real than the rest of
professional wrestling. The entertainment value doesn't make up for the collateral damage.
New Academic Ideas ~ Noel Chiappa MIT
All this neat packet networking stuff only exists now (2007) because for many years (during Baran's
first
RAND work ca. 1960-64, then during the ARPANet development in the late 60's-early-70's, and then the
early internet work in the 1975-1982 time-frame) this stuff was all funded by "bureaucrats in
DC".
There was *no* commercial market for any of this stuff back then, so there was no other way to make it
happen.
(A fact of which I am well aware, because I was one of the first people - maybe the first, actually - to
make
money selling IP routers commercially - and that was in 1984 or so, almost 10 years after the bureacrats
starting putting money into TCP/IP.)
In fact, to add a nice topping of irony, many commercial communications people of the day (circa 1980) said
much the same things about TCP/IP that they are now saying about other efforts: I distinctly recall the
TCP/IP
people being told to "roll up our toy academic network" (and yes, they explicitly and definitely
used the work "academic") and go home.
THE COMMERCIAL INTERNET
The Commercial Internet Exchange and the Board Members
Protecting your IP, your website content: How do you keep it from being copied - NO STORE: Cache Control, the Cache busting Option.
Google is Big Brother:
- Spent about 1 billion dollars on infrastructure (think disk storage)
- A monopoly with a vast trove of world wide search data..
- Knows everything about you and can PREDICT behavior, that is the real value.
- Can sell that information to any business, or government.
- Laws restrict government from collecting it themselves.
- Won't tell anyone about their own "secrets".
- Worldview: content is individually valueless.
- Corporate philosophy: organizing and giving away other people's content, creating space for advertisements in the process, but won't discuss specifically how it detects bad clicks or what percent it deems fraudulent.
- Google's Gmail spook heaven?
- Security Tools you need to know about and use.
When the Net became commercial Cash became more important
than
cooperation. Unrestricted information flow soon stopped. The culture of the Net was the
culture of science, like science, information was shared; the technology was more important than the
credentials of who invented it; rewards came mostly through the recognition of your peers and money was the
last thing on anyone's mind.
THE EARLY DAYS OF THE COMMERCIAL INTERneT
WHAT DID
THEY LOOK LIKE?
Read the December 1993
article John Markoff wrote about the Web and Mosaic in "The New York Times" (US) business
section; "The Guardian" (UK) publishes a page on the Web; "The Economist" (UK) analyses
both the Internet and the Web.
Feb. 4 1994 "Newsday" (US), a Long Island, NY, newspaper, publishes this
sentence:
"Following the lead of their sister in the motion-picture business, "content providers" like
Paramount Publishing are aggressively seeking to buy up electronic rights and submarkets." Guy Jackson,
Editor of "The Cambridge International Dictionary of English," finds this the earliest U.S.
citation
for "content provider" in the Cambridge International corpus, noting "the use of quotation
marks, which indicates that the term was not yet widely known."
March 1994 Marc Andreessen and colleagues leave NCSA to form "Mosaic Communications
Corp" (now Netscape).
Founded in 1994, World Wide Web Consortium http://www.w3.org/ has been primarily concerned with developing protocols and guidelines that ensure long-term growth for the Web. To do so, they draw on a set of international professionals and experts throughout the field of computer science and related fields. The W3C is led by Tim Berners-Lee, who directs the project and who was also responsible for inventing the World Wide Web. Carbon-dating the Internet
This anti-authoritarian impulse is a Hippie trait.
OSI Open Source Indicators Program
The all seeing surveillance state
Primary Point of Contact:
Jason Matheny
Program Manager
dni-iarpa-baa-11-11@ugov.gov
LARPA defines public data as “lawfully obtained data available to any member of the general
public, to include by purchase, subscription or registration.” The intelligence community can and does
register a fake profile on Facebook, in order to “friend” people and obtain more information.
Intelligence Community Wants to Monitor Social Media. Intelligence Advanced Research Projects Activity, or
Iarpa, a relatively new part of the spy community that's supposed to help investigate breakthrough
technologies and wants to sweep up public data to predict the future. The idea is to use automated analysis
to
sift through publicly available data such as web search queries, blogs, micro-blogs, internet traffic,
financial markets, traffic webcams, Wikipedia edits, andto help predict significant societal events, like a
popular revolution, early detection of events such as disease outbreaks, political crises, and macroeconomic
trends.
Richard Stallman is the father of "copyleft", which he called "a mirror image" of copyright. Stallman points out how Net culture has strayed far from its early days of open software to closed, proprietary systems like Microsoft Windows and suggests the Linux operating system as a free alternative. "What Stallman means by free: you can charge money to cover your distribution costs, but the software itself carries no charge, and the recipient is free to pass it on. Because the software comes with its source code, the user can make any modifications he pleases. If and when he passes on the software and its modifications, he must also pass along the source code. Free does not mean that no money changes hands at all, but it does mean free from the external control of the software police, or of the government. Hippie sentiments." [1]
1994 Revolution and Craigslist Culture of Trust one of the few people who remains true to some of the earliest ideals of the Internet. "It's good to make a good living. It's good to do well for your staff. I feel that one of the best things a person can do for another is to create a job. So you do OK commercially, and then you try to make a difference of some sort. We're still looking for new and other ways of doing that." Nerd values are simple. Doing Well by Doing Good, we don't think of ourselves as being owned. We're like a commons in the sense that we're providing a public service.
August 9, 1995 -- Netscape IPO'd, and ushered in the Dot Com Boom that has brought us to where we are today.
Mar. 1 1995 "The Daily Telegraph" (UK) quotes a Mr. Connell that "People want better control over their lives, they want to see things when it's convenient for them, and we will give time and attention to linking up with existing content providers." Guy Jackson finds this the earliest British citation for "content provider" in the Cambridge International corpus.
- The Ulitmate
Band List 1996
Summer of 1994 at Caltech U., UBL, originally known as the Web Wide World of Music, or WWWOM - Amazon in 1996 National Center for Supercomputer Applications aka NCSA 1997
- The Well 1997
- 1998 The Beginning of the Erate -
Schools and libraries have requested $2.02 billion in the discounted hookups to the Internet that are becoming available under a new government program.
WHO IS
ONLINE - STATISTICS FROM 2002
A nation online - How Americans are expanding their use of the internet.
2005 INTERNET STATS
Google has the largest share of U.S. Web searches with 46 percent, according to November 2005 figures from
Nielsen//NetRatings. Yahoo is second with 23 percent, and MSN third with 11 percent. [Please note that each
reduction is by just about eactly half!]
46% Google -- 23% Yahoo -- 11% MSN = 80% Top 3
From "Estimating the number of Internet users:"
Using this technique, the author computes a total of 471 million internet users. This is the average who are
online in a particular day, and represents 7.2% of the world population.
Using different methods, http://www.nielsen-netratings.com/ estimates a total of 880+ million users, or 13.6% of
the world population.
Top 12 Languages Used on the Internet
11/9/06 In 10 years, the U.S. share of the world's online population reportedly has fallen from 64 percent to less than 25 percent, although U.S. Web surfers evidently visit more pages each. More than three-fourths of Web visitors to large U.S. Web sites such as Google, Microsoft, and Yahoo come from overseas. The three companies are among 14 of the top 25 U.S. Web sites that draw more foreign traffic than U.S.-based traffic, according to market research company ComScore Networks.
Daily Internet and demographics Dump A collection of Web sites that track statistical data about the Internet. Internet Traffic statistics include reports on the current speed of the Internet. Specialty Internet Statistics contains links to data-based surveys of servers, domains and search engines on the Internet. Statistics Portals link to other extensive lists of Internet statistics and Market Research connects to e-commerce research firms which make some of their data publicly available.
SOCIAL NETWORKING
2009 Corporate's bastardization of social media and marketing's poor use of what
could
be a great conversational media form. "Social BS" corporate marketing has beaten us into
submission
as the social media sphere simply moves on and finds more interesting content rather than voicing distrust.
SECURITY
WE ALL NEED TO KNOW HOW TO PROTECT OUR COMPUTERS
INTERNET SECURITY TOOLS
Security by Obscurity
People have turnedfrom consumers of the Internet into participants in it—whether they're publishing
websites, or teenagers sharing their cell phone numbers in MySpace. The problem with the super-connected, Web-centered
world
we live in is that we have made it easier to share information than to share it right. We've
made
it easier to post information on websites than to take it down. We've made it easier to open online
accounts than to close them. We've made it easier to reveal our mother's maiden names, our
elementary
schools, our first pets, our favorite color or our childhood street than to keep track of who knows what
information and how long it will stay on servers located who knows where. We've made it easier to be
fast
than good and we've lost control of our privacy.
Hundreds of thousands if not millions of machines are "owned" by someone other that the user sitting in front of the keyboard and monitor. These bad people control your PC, grab your passwords, and get lots of machines together to organize DDOS attacks and jump from machine to machine to machine in order to hide their tracks. Trojans are also used to mess with you. You MIGHT actually be using a zombie machine, a vicious cracker be able to surreptitiously turn on your Webcam on your computer if you have one in order to watch you work, or watch what you type on your computer screen and then send you popup messages insulting you. These Are The Rules ~ From Internet Rules
"The rules are subject to change, but you are always advised to follow the current set of rules. They are not all of the rules. They are some of the rules. The absence in this list of a particular rule does not mean you don't have to follow it, if indeed it is a rule. These are intended to be a simple set of general rules for dealing with the kinds of interactions that are prevalent on the internet (web/email). Some of them also apply to the telephone. Use of the rules is at your own risk (as is use of the internet).
But you do have to follow these, even if you've lost your rulebook under the stack of AOL CDs. Remember, there are lots of people out there trying to scam you. Don't make it easier for them. These rules derive from the core principles of "don't execute untrusted code" and "verify your contacts"."
Watch the Chain of Trust
Do not ever give out any information to anyone who contacts you first, no matter how inconspicuous it seems. Find an alternate way to find out their contact information (or use contact information you already have, which has been verified), and contact them yourself. For example, if you get a voicemail from your credit card company telling you to contact them about some suspected fraud, don't use the number they leave. Call the number on the back of your card instead.
You don't control the links
If you're going to give out any information - financial info, username / password, etc..., even if it seems like inconspicuous information - do not click on links that are emailed to you. Always type in URLs by hand (or use bookmarks that you saved from typing URLs in by hand).
You don't control attachments
Do not open attachments unless you are expecting the specific attachment and you know what it is. Even then, this is risky. If you're not expecting that specific attachment, it's probably an email worm or something else bad. Even if you are expecting the attachment, rather than clicking on it directly to run it, you're much better off saving it to disk, opening the program you think it should be run with, and then opening it manually. This takes a bit more time, but think of the time you save by not having your data randomly deleted by malicious attachments.
HTML can be used to hide things from you
If you can, use a plaintext mailreader. HTML mail is fraught with all sorts of security problems.
Do not use Microsoft products to browse random websites or read random emails. In a controlled environment, these products do have advantages. When used with untrusted content, they behave badly and will run code without your permission or knowledge. This includes all versions of Internet Explorer, Outlook, and Outlook Express.
Instead, use Mozilla/Firefox/Thunderbird, Opera, http://www.scroogle.org/
http://www.scroogle.org/cgi-bin/scraper.htm
And source: http://www.scroogle.org/changes.html
products that are better about executing (or not) untrusted system code - If you absolutely must use Microsoft products, make sure they are up to date with the latest patches.