11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

248 Internettransmission <strong>of</strong> a message, e-mail today has a highdegree <strong>of</strong> reliability (see e-mail).• Netnews (also called Usenet, for UNIX User Network)is in effect the world’s largest computer bulletinboard. It began in 1979, when Duke University<strong>and</strong> the University <strong>of</strong> North Carolina set up a simplemechanism for “posting” text files that could be readby other users. Today there are tens <strong>of</strong> thous<strong>and</strong>s <strong>of</strong>topical “newsgroups” <strong>and</strong> millions <strong>of</strong> messages (calledarticles). Although still impressive in its quantity <strong>of</strong>content, many Web users now rely more on discussionforums based on Web pages (see netnews <strong>and</strong>newsgroups).• Ftp (File Transport Protocol) enables the transfer <strong>of</strong>one or more files between any two machines connectedto the Internet. This method <strong>of</strong> file transferhas been largely supplanted by the use <strong>of</strong> downloadlinks on Web pages, except for high-volume applications(where an ftp server is <strong>of</strong>ten operated “behindthe scenes” <strong>of</strong> a Web link). FTP is also used by Webdevelopers to upload files to a Web site (see filetransfer protocols).• Telnet is another fundamental service that broughtthe Internet much <strong>of</strong> its early utility. Telnet allows auser at one computer to log into another machine <strong>and</strong>run a program there. This provided an early means forusers at PCs or workstations to, for example, accessthe Library <strong>of</strong> Congress catalog online. However, ifprogram <strong>and</strong> file permissions are not set properly onthe “host” system, telnet can cause security vulnerabilities.The telnet user is also vulnerable to havingIDs <strong>and</strong> passwords stolen, since these are transmittedas clear (unencrypted) text. As a result, some onlinesites that once supported telnet access now limitaccess to Web-based forms. (Another alternative is touse a program called “secure shell” or ssh, or to use atelnet client that supports encryption.)• gopher was developed at the University <strong>of</strong> Minnesota<strong>and</strong> named for its mascot. Gopher is a system <strong>of</strong> serversthat organize documents or other files througha hierarchy <strong>of</strong> menus that can be browsed by theremote user. Gopher became very popular in the late1980s, only to be almost completely supplanted bythe more versatile World Wide Web.• WAIS (Wide Area Information Service) is a gatewaythat allows databases to be searched over the Internet.WAIS provided a relatively easy way to bringlarge data resources online. It, too, has largely beenreplaced by Web-based database services.• The World Wide Web as mentioned above, is nowthe main means for displaying <strong>and</strong> transferring information<strong>of</strong> all kinds over the Internet. Its flexibility,relative ease <strong>of</strong> use, <strong>and</strong> ubiquity (with Web browsersavailable for virtually all platforms) has caused it tosubsume most earlier services. The utility <strong>of</strong> the Webhas been further enhanced by the development <strong>of</strong>many search engines that vary in thoroughness <strong>and</strong>sophistication (see World Wide Web <strong>and</strong> searchengine).• Streaming Media protocols allow for a flow <strong>of</strong> video<strong>and</strong>/or audio content to users. Player applications forWindows <strong>and</strong> other operating systems, <strong>and</strong> growinguse <strong>of</strong> high-speed consumer Internet connections (seebroadb<strong>and</strong>) have made it possible to present “live”TV <strong>and</strong> radio shows over the Internet.• E-commerce, having boomed in the late 1990s <strong>and</strong>crashed in the early 2000s, continued to grow <strong>and</strong>proliferate later in the decade, finding new markets<strong>and</strong> applications <strong>and</strong> spreading into the developingworld (see e-commerce).• Blogs <strong>and</strong> other forms <strong>of</strong> online writing have becomeprevalent among people ranging from elementaryschool students to corporate CEOs (see blogs <strong>and</strong>blogging).• Social networking sites such as MySpace <strong>and</strong> Facebookare also very popular, particularly among youngpeople (see social networking).• Wikis have become an important way to share <strong>and</strong>build on knowledge bases (see wikis <strong>and</strong> Wikipedia).• The integration <strong>of</strong> the Internet with traditional channels<strong>of</strong> communications is proceeding rapidly (seepodcasting, Internet radio, <strong>and</strong> VoIP).Even as it begins to level <strong>of</strong>f in the United States, worldwideInternet usage continues to grow rapidly. Asia now hasmore than twice as many users as North America, althoughthe latter still has more than five times the penetration(percentage <strong>of</strong> population).In the United States more than half <strong>of</strong> Internet usershave high-speed Internet connections (see broadb<strong>and</strong>), <strong>and</strong>the trend in other developed countries is similar. Broadb<strong>and</strong>is both required by <strong>and</strong> contributes to the appetite <strong>of</strong>Web users for music, streaming video, <strong>and</strong> other rich mediacontent (see streaming <strong>and</strong> music <strong>and</strong> video distribution,online).Now in its fourth decade, the Internet is not withoutdaunting challenges. A major one is security—see computercrime <strong>and</strong> security, computer virus, cyberterrorism,<strong>and</strong> information warfare. Users also wantprotection from privacy abusers <strong>and</strong> online predators (seeprivacy in the digital age, identity theft, phishing<strong>and</strong> spo<strong>of</strong>ing, <strong>and</strong> cyberstalking <strong>and</strong> harassment).For other issues <strong>and</strong> challenges involving the Internet,see censorship <strong>and</strong> the Internet, Internet architecture<strong>and</strong> governance, Internet access policy, <strong>and</strong>digital divide.In the longer term what we call the Internet today islikely to become so ubiquitous that people will no longerthink <strong>of</strong> it as a separate system or entity. Household appliances,cars, cell phones, televisions, <strong>and</strong> virtually everyother device used in daily life will communicate with otherdevices <strong>and</strong> with control systems using Internet protocols.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!