Skip to main contentdfsdf

Joanne S's List: WEB101 Reading List

  • Feb 24, 13

    "0:05The Internet in the year 2009.
    0:09We send e-mails, make calls over the internet
    0:12and discuss topics we take an interest in.
    0:15Even our banking is going virtual.
    0:18But what we take for granted today
    0:20was only a vague idea fifty years ago.
    0:24In order to understand how we got this far
    0:27let's go back to 1957, when everything began.
    0:32Before 1957 computers only worked on one task at a time.
    0:36This is called batch processing.
    0:38Of course, this was quite ineffective.
    0:42With computers getting bigger and bigger
    0:44they had to be stored in special cooled rooms.
    0:47But then the developers couldn't work directly on the computers anymore -
    0:51specialists had to be called in to connect them.
    0:54Programming at that time meant a lot of manual work
    0:57and the indirect connection to the computers led to
    1:00a lot of bugs, wasting time and fraying the developers´ nerves.
    1:06The year 1957 marked a big change.
    1:09A remote connection had to be installed
    1:12so the developers could work directly on the computers.
    1:16At the same time the idea of time-sharing came up.
    1:20This is the first concept in computer technology
    1:23to share the processing power of one computer with multiple users.
    1:32On October 4th 1957, during the Cold War
    1:35the first unmanned satellite, Sputnik 1, was sent into orbit by the Soviet Union.
    1:41The fear of a "Missile Gap" emerged.
    1:45In order to secure America's lead in technology,
    1:48the US founded the "Defense Advanced Research Project Agency" in February 1958.
    1:55At that time, knowledge was only transferred by people.
    1:59The DARPA planned a large-scale computer network
    2:03in order to accelerate knowledge transfer and avoid the doubling up
    2:07of already existing research.
    2:10This network would become the Arpanet.
    2:12Furthermore three other concepts were to be developed,
    2:15which are fundamental for the history of the Internet:
    2:18The concept of a military network by the RAND Corporation in America.
    2:23The commercial network of the National Physical Laboratory in England.
    2:28And the scientific network, Cyclades, in France.
    2:32The scientific, military and commercial approaches of these concepts
    2:37are the foundations for our modern Internet.
    2:43Let's begin with the Arpanet, the most familiar of these networks.
    2:47Its development began in 1966.
    2:50Universities were generally quite cautious about sharing their computers.
    2:55Therefore small computers were put on front of the mainframe.
    2:58This computer, the Interface Message Processor, took over control of the network actvitities,
    3:04while the mainframe was only in charge of the initialization of programs and data files.
    3:09At the same time, the IMP also served as interface for the mainframe.
    3:13Since only the IMPs were interconnected in a network
    3:17this was also called IMP-subnet.
    3:19For the first connections between the computers
    3:22the Network Working Group developed the Network Control Protocol [Network Control Program].
    3:27Later on, the NCP was replaced by the more efficient Transmission Control Protocol.
    3:32The specific feature of the TCP is the verification of the file transfer.
    3:37Let's take a short detour to England.
    3:40Since the NPL network was designed on a commercial basis
    3:44a lot of users and file transfer were expected.
    3:48In order to avoid congestion of the lines, the sent files were divided into smaller packets
    3:54which were put together again at the receiver.
    3:58"Packet Switching" was born!
    4:06In 1962 American ferret aircrafts discovered middle and long range range missiles in Cuba,
    4:12which were able to reach the United States.
    4:15This stoked fear of an atomic conflict.
    4:19At that time information systems had a centralized network architecture.
    4:25To avoid the breakdown during an attack,
    4:28a decentralized network architecture had to be developed,
    4:32which in case of loss of a node would still be operative.
    4:37Communication still used to work through radio waves,
    4:41that would have caused problems in case of an atomic attack:
    4:46the ionosphere would be affected and the long-wave radio waves wouldn't work anymore.
    4:51Therefore they had to use direct waves, which, however, don't have a long range.
    4:57A better solution was the model of a distributed network.
    5:01Thus long distances could be covered with a minimum of interference.
    5:07Another milestone followed with the development of the French network "Cyclades".
    5:11Since Cyclades had a far smaller budget than Arpanet and thus also fewer nodes
    5:17the focus was layed on the communication with other networks.
    5:22In this way the term "inter-net" was born.
    5:27Moreover, Cyclades´ concept went further than ARPA's and the NPL's.
    5:32During communication between sender and receiver the computers were not to intervene anymore,
    5:38but simply serve as a transfer node.
    5:41Cyclades´ protocol went through all machines using a physical layer
    5:46that was implemented into the hardware,
    5:48providing a direct connection with the receiver - an end-to-end structure.
    5:54Inspired by the Cyclades network and driven by the incompatibility between the networks,
    5:59their connection gained in importance everywhere.
    6:04The phone companies developed the X.25 protocol which enabled communication
    6:09through their servers - in exchange for monthly basic charge of course.
    6:15DARPA's Transmission Control Protocol was to connect the computers through gateways...
    6:22and the International Organization for Standardization designed the OSI Reference Model.
    6:30The innovation of OSI was the attempt to standardize the network from its ends
    6:35and the channel's division into separate layers.
    6:39Finally, the TCP assimilated the preferences of the OSI Reference Model
    6:44and gave way to the TCP/IP protocol -
    6:48a standard which guaranteed compatibility between networks
    6:52and finally merged them, creating the Internet.
    6:57By February 28, 1990 the ARPANET hardware was removed, but the Internet...
    7:04... was up and running.
    7:08Subtitles by HackJack (aka StevXtreme)"

  • Feb 24, 13

    "0:11the
    1:04for the first time in history
    1:07people and machinery are working together realizing dream
    1:13uniting force that knows no geographical boundaries without regard to race creed
    1:18or color
    1:20new hero
    1:21or communication truly brings people together
    1:25this is something
    1:26the dawn mentioned
    1:32one of the works
    1:34click here
    1:35to begin your journey into
    1:38booths
    1:42know exactly what happened when you click on that later
    1:45the start of flow of information
    1:47disinformation travels down at your own personal mail room
    1:50for mister yankee packages
    1:53and sends it on its way
    1:56each packet is limited centers
    1:58mailroom
    1:59must decide how to divide the information packages
    2:04major label
    2:05containing important information such as singers address receivers address
    2:10ever type of packet mediators
    2:23the
    2:29because of this particular packet is going out onto the internet
    2:32it also gets an address for the proxy server and which has a special function
    2:36as we'll see you later
    2:39looked like it is now launched onto your local they re network or lam this
    2:44network he's used to connect all the local computers routers printers
    2:49etcetera
    2:49for information exchange within the physical walls of the building
    2:53the land is a pretty uncontrolled place and unfortunately
    2:58accidents can happen
    3:09highway of the land is packed with all types of information
    3:12these are people kits norville packets
    3:15appletalk packets
    3:16they're going against traffic as usual
    3:18the local
    3:19boundary street address and if necessary
    3:22lifts the packet onto
    3:23another network
    3:26the router
    3:27a symbol of control of the seemingly disorganized world
    3:36i'm children
    3:38that
    3:42the reviews systematic
    3:45uncaring
    3:47methodical conservative and sometimes not quite up to speed hillside but at
    3:51least his exact
    3:53for the most part
    3:56considering the circumstances
    3:59time
    4:09has the capacity of the router they make their way into the corporate
    4:13introduction and head for
    4:15the router switch
    4:18a bit more efficient than the router
    4:20the router switch please fast and loose with five p packets
    4:23deftly running them along the way
    4:26additional pinball wizard if you would
    4:33land
    4:35yeah
    4:37here
    4:40here why don't you know when you really
    4:47this country to run to third installation
    4:49they've picked up by the network interface
    4:52ready to be sent to the next level
    4:55in this case
    4:56the proxy
    4:58the proxy is used by many companies as sort of a middleman in order to lessen
    5:03the load on the internet connection
    5:05and for security reasons as well
    5:09as you can see
    5:10the packets are all of various incisors
    5:13depending upon the contents
    5:32the proxy corpuz packet
    5:35and looks for the world and for a sport
    5:39depending upon what the address is acceptable
    5:42the packet is sent onto the internet
    5:51there are however
    5:53summer dresses which do not meet with the approval
    5:56of the proxy
    5:57that is to say corporate board
    5:59management guidelines
    6:03these order
    6:05summarily dealt with
    6:08will have none of that
    6:09for those who make it
    6:11it's on the road again
    6:24next up
    6:26firewall
    6:30their corporate
    6:31for wall
    6:32serves two purposes
    6:35prevention
    6:35rather nasty things from the internet from coming into the intranet
    6:40aniket also prevents into the corporate information from being sent out
    6:44onto the internet
    6:47once through the firewall router picks up the packet and places it on to a much
    6:51narrower road four bandwidth as we say
    6:55obviously
    6:57condemned roadies not broad enough to take them all
    7:01now you might wonder what happens to all those packets which
    7:04don't make it along the way
    7:07when mister i p doesn't receive an acknowledgement that the packet has been
    7:11received in due time
    7:12he simply sends a replacement packet
    7:17we are now ready to eat ur the world of the internet
    7:22a spider web of
    7:24interconnected networks which spent our entire globe here routers and switches
    7:30establish links between networks
    7:33now the men is an entirely deferred environment and you'll find within the
    7:37protective walls of your land
    7:39out here fits the wild west plenty of space plenty of opportunities plenty of
    7:44things to explore and places to go
    7:47thanks to very little control and regulation new ideas find brutal
    7:52slaughter pushed the envelope of their possibilities but because of this
    7:56freedom certain dangers also learning
    7:59we'll never know when you meet the dreaded pina of death
    8:05special version of a normal requesting
    8:07which some mediocre thought upton mosser unsuspecting hosts
    8:13but that's our package take
    8:15maybe via satellite telephone lines wireless or even transpose c_n_n_ cable
    8:20they don't always take the fastest or shortest responsible
    8:24they will get there
    8:26eventually
    8:28maybe that's why it's sometimes called
    8:30the worldwide weight but when everything is working smoothly you can circumvent
    8:36the globe five times over at the drop of a hat
    8:40literally at all for the cost of a local call or less
    8:45near the end of our destination
    8:48will find
    8:49another firewall
    8:53depending upon your perspective as a data packets
    8:55the firewall could be a best your honor security or dreaded adversary
    9:01it all depends on which side you're on the of what your intentions are
    9:06the firewall thing is designed to lift in the only those packets that means
    9:10criteria
    9:12this fire was operating on woods eighty
    9:14and twenty five
    9:16all attempts to get you through other ports
    9:19are closed for business
    9:35port twenty five
    9:36is used for meal packets
    9:41port eighty is the entrance for package from the internet to the web server
    9:48inside the firewall
    9:50packages screams more thoroughly
    9:52some package mickey peacefully through customs quote
    9:57just a bit devious
    9:58a firewall officers not easily
    10:01such as we missed being a bit baggage
    10:05tries to discourage itself
    10:07as a normal piano package
    10:14for those packets lucky enough to make it this far
    10:18the journey
    10:19is almost over
    10:23it's just a line up on the interface
    10:25to be taken out into
    10:27the web server
    10:29melodies webserver can run on many things
    10:33from a mainframe to a webcam to the computer on your desk why not your
    10:37refrigerator
    10:39with a proper setup
    10:40you can find out if you have the makings for chicken category or if you have to
    10:44go shopping
    10:46remember
    10:47visitors
    10:47the dawn of the net
    10:50anything's possible
    10:55one-by-one
    10:56the packets are received
    10:59and unpacked
    11:03the information they contain
    11:06your request for information
    11:08is sent on to the web server application
    11:19the packet itself
    11:20is recycled
    11:24ready to be used again
    11:26benfield
    11:27who requested information
    11:35address
    11:36and self-help on its way back to you
    11:41that passed the firewall
    11:43winters
    11:44at all and through to the internet http
    11:49one
    11:50back through your corporate firewall
    11:58then all to you were interested
    12:01ready to supply your web browser with the information you requested
    12:08that is
    12:17pleased with their efforts entrusting her
    12:21our trusty data packets rudolph blissfully into the sunset governor of
    12:26the day knowing fully they have susan masters as well
    12:34values that
    12:36a happy ending"

  • Feb 24, 13

    (2007). Doug Engelbart 1968 Demo - 3 of 9. Retrieved April 1st, 2009, from http://youtu.be/mT_PhstIBIA

  • Feb 24, 13

    (2007). GoogleTech Talks 'The Web That Wasn't'. Retrieved February 24th, 2013, from http://www.youtube.com/watch?v=72nfrhXroo8

  • Apr 15, 13

    Chen, G. M. (2011). Tweet this: A uses and gratifications perspective on how active Twitter use gratifies a need to connect with others. Computers in Human Behavior, 27(2), 755-762. doi: http://dx.doi.org/10.1016/j.chb.2010.10.023

    • This research asks: Does active use of Twitter gratify a need to feel connected to other people on Twitter?
    • As a result, I posit that those who spend the most time Twitter would be most likely to gratify this need to connect with other people compared with those who are less active. Gratification of the need to connect with others on Twitter is a process gratification, where the individual “receives gratification only or mainly from being involved in the process of communication behavior, rather than from message content” (Cutler & Danowski, 1980, p. 270). In other words, it is by using Twitter and its functions that people gratify their need to connect with others.

    2 more annotations...

  • Apr 18, 13

    Title: Social interaction via new social media: (How) can interactions on Twitter affect effectual thinking and behavior?
    Author/Creator: Fischer, Eileen ; Reuber, A. Rebecca
    Subjects: Effectuation ; Social media ; Twitter
    Is Part Of: Journal of Business Venturing, 2011, Vol.26(1), pp.1-18 [Peer Reviewed Journal] 
    Description: Social interaction plays a central role in effectuation processes, yet we know little about the implications for effectuation when an entrepreneur interacts via particular channels such as social media. To address this gap, our paper uses an inductive, theory-building methodology to develop propositions regarding how effectuation processes are impacted when entrepreneurs adopt Twitter. Twitter is a microblogging platform that can facilitate a marked increase in interaction. We posit that Twitter-based interaction can trigger effectual cognitions, but that high levels of interaction via this medium can lead to effectual churn. We also posit that there is one factor, perceived time affordability, that predicts the level of social interaction in which an entrepreneur engages via Twitter. Further, we propose two factors that moderate the consequences of social interaction through Twitter. These factors are community orientation and community norm adherence. Implications for our understanding of effectuation, of social interaction, and of the impact of social media on entrepreneurial firms are discussed.

    • Twitter Inc. was founded in 2006
    • social interaction is facilitated by social media

    10 more annotations...

  • Apr 22, 13

    Mathes, A. (2004). Folksonomies – Cooperative Classification and Communication Through Shared Metadata.

    • he overall costs for users of the system in terms of  time and effort are far lower than systems that rely on complex  hierarchal classification and categorization schemes. In  addition to this structural difference, the context of the use  in these systems is not just one of personal organization, but  of communication and sharing. The near instant feedback in these  systems leads to a communicative nature of tag use.
    • Many young people have a questionable online presence.
    • My generation isn't as afraid of public opinion as his was. We face it head-on and know how to manage it.

    2 more annotations...

  • May 03, 13

    msporny. (2007). Intro to the Semantic Web. Retrieved June 14th, 2009, from http://www.youtube.com/watch?v=OGg8A2zfWKg.

  • May 05, 13

    Qian, H., & Scott, C. R. (2007). Anonymity and self-disclosure on weblogs. Journal of Computer-Mediated Communication, 12(4), article 14. 
    Available: http://onlinelibrary.wiley.com/doi/10.1111/j.1083-6101.2007.00380.x/full

  • May 05, 13

    Papacharissi, Z. (2010). Conclusion: A Networked Self. In Z. Papacharissi (Ed.), A Networked Self: Identity, Community, and Culture on Social Network Sites (pp. 304-318). Routledge. [Via Curtin Library eReserve]

  • May 06, 13

    Future of Reputation: Gossip, Rumor and Privacy on the Internet.
    Available: http://docs.law.gwu.edu/facweb/dsolove/Future-of-Reputation/text/futureofreputation-ch2.pdf

  • May 06, 13

    boyd, danah (2008). "Facebook's Privacy Trainwreck: Exposure, Invasion, and Social Convergence."Convergence, 14 (1), http://www.danah.org/papers/FacebookPrivacyTrainwreck.pdf.

1 - 15 of 15
20 items/page
List Comments (0)