Telecommunication is the transmission of signs, messages, writings and sounds or information of any nature by wire, optical or other electromagnetic systems. Telecommunication occurs when the exchange of information between communication participants includes the use of technology, it is transmitted either electrically over physical media, such as cables, or via electromagnetic radiation. Such transmission paths are divided into communication channels which afford the advantages of multiplexing. Since the Latin term communicatio is considered the social process of information exchange, the term telecommunications is used in its plural form because it involves many different technologies. Early means of communicating over a distance included visual signals, such as beacons, smoke signals, semaphore telegraphs, signal flags, optical heliographs. Other examples of pre-modern long-distance communication included audio messages such as coded drumbeats, lung-blown horns, loud whistles. 20th- and 21st-century technologies for long-distance communication involve electrical and electromagnetic technologies, such as telegraph and teleprinter, radio, microwave transmission, fiber optics, communications satellites.
A revolution in wireless communication began in the first decade of the 20th century with the pioneering developments in radio communications by Guglielmo Marconi, who won the Nobel Prize in Physics in 1909, other notable pioneering inventors and developers in the field of electrical and electronic telecommunications. These included Charles Wheatstone and Samuel Morse, Alexander Graham Bell, Edwin Armstrong and Lee de Forest, as well as Vladimir K. Zworykin, John Logie Baird and Philo Farnsworth; the word telecommunication is a compound of the Greek prefix tele, meaning distant, far off, or afar, the Latin communicare, meaning to share. Its modern use is adapted from the French, because its written use was recorded in 1904 by the French engineer and novelist Édouard Estaunié. Communication was first used as an English word in the late 14th century, it comes from Old French comunicacion, from Latin communicationem, noun of action from past participle stem of communicare "to share, divide out.
Homing pigeons have been used throughout history by different cultures. Pigeon post had Persian roots, was used by the Romans to aid their military. Frontinus said; the Greeks conveyed the names of the victors at the Olympic Games to various cities using homing pigeons. In the early 19th century, the Dutch government used the system in Sumatra, and in 1849, Paul Julius Reuter started a pigeon service to fly stock prices between Aachen and Brussels, a service that operated for a year until the gap in the telegraph link was closed. In the Middle Ages, chains of beacons were used on hilltops as a means of relaying a signal. Beacon chains suffered the drawback that they could only pass a single bit of information, so the meaning of the message such as "the enemy has been sighted" had to be agreed upon in advance. One notable instance of their use was during the Spanish Armada, when a beacon chain relayed a signal from Plymouth to London. In 1792, Claude Chappe, a French engineer, built the first fixed visual telegraphy system between Lille and Paris.
However semaphore suffered from the need for skilled operators and expensive towers at intervals of ten to thirty kilometres. As a result of competition from the electrical telegraph, the last commercial line was abandoned in 1880. On 25 July 1837 the first commercial electrical telegraph was demonstrated by English inventor Sir William Fothergill Cooke, English scientist Sir Charles Wheatstone. Both inventors viewed their device as "an improvement to the electromagnetic telegraph" not as a new device. Samuel Morse independently developed a version of the electrical telegraph that he unsuccessfully demonstrated on 2 September 1837, his code was an important advance over Wheatstone's signaling method. The first transatlantic telegraph cable was completed on 27 July 1866, allowing transatlantic telecommunication for the first time; the conventional telephone was invented independently by Alexander Bell and Elisha Gray in 1876. Antonio Meucci invented the first device that allowed the electrical transmission of voice over a line in 1849.
However Meucci's device was of little practical value because it relied upon the electrophonic effect and thus required users to place the receiver in their mouth to "hear" what was being said. The first commercial telephone services were set-up in 1878 and 1879 on both sides of the Atlantic in the cities of New Haven and London. Starting in 1894, Italian inventor Guglielmo Marconi began developing a wireless communication using the newly discovered phenomenon of radio waves, showing by 1901 that they could be transmitted across the Atlantic Ocean; this was the start of wireless telegraphy by radio. Voice and music had little early success. World War I accelerated the development of radio for military communications. After the war, commercial radio AM broadcasting began in the 1920s and became an important mass medium for entertainment and news. World War II again accelerated development of radio for the wartime purposes of aircraft and land communication, radio navigation and radar. Development of stereo FM broadcasting of radio
The public domain consists of all the creative works to which no exclusive intellectual property rights apply. Those rights may have been forfeited, expressly waived, or may be inapplicable; the works of William Shakespeare and Beethoven, most early silent films, are in the public domain either by virtue of their having been created before copyright existed, or by their copyright term having expired. Some works are not covered by copyright, are therefore in the public domain—among them the formulae of Newtonian physics, cooking recipes, all computer software created prior to 1974. Other works are dedicated by their authors to the public domain; the term public domain is not applied to situations where the creator of a work retains residual rights, in which case use of the work is referred to as "under license" or "with permission". As rights vary by country and jurisdiction, a work may be subject to rights in one country and be in the public domain in another; some rights depend on registrations on a country-by-country basis, the absence of registration in a particular country, if required, gives rise to public-domain status for a work in that country.
The term public domain may be interchangeably used with other imprecise or undefined terms such as the "public sphere" or "commons", including concepts such as the "commons of the mind", the "intellectual commons", the "information commons". Although the term "domain" did not come into use until the mid-18th century, the concept "can be traced back to the ancient Roman Law, as a preset system included in the property right system." The Romans had a large proprietary rights system where they defined "many things that cannot be owned" as res nullius, res communes, res publicae and res universitatis. The term res nullius was defined as things not yet appropriated; the term res communes was defined as "things that could be enjoyed by mankind, such as air and ocean." The term res publicae referred to things that were shared by all citizens, the term res universitatis meant things that were owned by the municipalities of Rome. When looking at it from a historical perspective, one could say the construction of the idea of "public domain" sprouted from the concepts of res communes, res publicae, res universitatis in early Roman law.
When the first early copyright law was first established in Britain with the Statute of Anne in 1710, public domain did not appear. However, similar concepts were developed by French jurists in the 18th century. Instead of "public domain", they used terms such as publici juris or propriété publique to describe works that were not covered by copyright law; the phrase "fall in the public domain" can be traced to mid-19th century France to describe the end of copyright term. The French poet Alfred de Vigny equated the expiration of copyright with a work falling "into the sink hole of public domain" and if the public domain receives any attention from intellectual property lawyers it is still treated as little more than that, left when intellectual property rights, such as copyright and trademarks, expire or are abandoned. In this historical context Paul Torremans describes copyright as a, "little coral reef of private right jutting up from the ocean of the public domain." Copyright law differs by country, the American legal scholar Pamela Samuelson has described the public domain as being "different sizes at different times in different countries".
Definitions of the boundaries of the public domain in relation to copyright, or intellectual property more regard the public domain as a negative space. According to James Boyle this definition underlines common usage of the term public domain and equates the public domain to public property and works in copyright to private property. However, the usage of the term public domain can be more granular, including for example uses of works in copyright permitted by copyright exceptions; such a definition regards work in copyright as private property subject to fair-use rights and limitation on ownership. A conceptual definition comes from Lange, who focused on what the public domain should be: "it should be a place of sanctuary for individual creative expression, a sanctuary conferring affirmative protection against the forces of private appropriation that threatened such expression". Patterson and Lindberg described the public domain not as a "territory", but rather as a concept: "here are certain materials – the air we breathe, rain, life, thoughts, ideas, numbers – not subject to private ownership.
The materials that compose our cultural heritage must be free for all living to use no less than matter necessary for biological survival." The term public domain may be interchangeably used with other imprecise or undefined terms such as the "public sphere" or "commons", including concepts such as the "commons of the mind", the "intellectual commons", the "information commons". A public-domain book is a book with no copyright, a book, created without a license, or a book where its copyrights expired or have been forfeited. In most countries the term of protection of copyright lasts until January first, 70 years after the death of the latest living author; the longest copyright term is in Mexico, which has life plus 100 years for all deaths since July 1928. A notable exception is the United States, where every book and tale published prior to 1924 is in the public domain.
The United States of America known as the United States or America, is a country composed of 50 states, a federal district, five major self-governing territories, various possessions. At 3.8 million square miles, the United States is the world's third or fourth largest country by total area and is smaller than the entire continent of Europe's 3.9 million square miles. With a population of over 327 million people, the U. S. is the third most populous country. The capital is Washington, D. C. and the largest city by population is New York City. Forty-eight states and the capital's federal district are contiguous in North America between Canada and Mexico; the State of Alaska is in the northwest corner of North America, bordered by Canada to the east and across the Bering Strait from Russia to the west. The State of Hawaii is an archipelago in the mid-Pacific Ocean; the U. S. territories are scattered about the Pacific Ocean and the Caribbean Sea, stretching across nine official time zones. The diverse geography and wildlife of the United States make it one of the world's 17 megadiverse countries.
Paleo-Indians migrated from Siberia to the North American mainland at least 12,000 years ago. European colonization began in the 16th century; the United States emerged from the thirteen British colonies established along the East Coast. Numerous disputes between Great Britain and the colonies following the French and Indian War led to the American Revolution, which began in 1775, the subsequent Declaration of Independence in 1776; the war ended in 1783 with the United States becoming the first country to gain independence from a European power. The current constitution was adopted in 1788, with the first ten amendments, collectively named the Bill of Rights, being ratified in 1791 to guarantee many fundamental civil liberties; the United States embarked on a vigorous expansion across North America throughout the 19th century, acquiring new territories, displacing Native American tribes, admitting new states until it spanned the continent by 1848. During the second half of the 19th century, the Civil War led to the abolition of slavery.
By the end of the century, the United States had extended into the Pacific Ocean, its economy, driven in large part by the Industrial Revolution, began to soar. The Spanish–American War and World War I confirmed the country's status as a global military power; the United States emerged from World War II as a global superpower, the first country to develop nuclear weapons, the only country to use them in warfare, a permanent member of the United Nations Security Council. Sweeping civil rights legislation, notably the Civil Rights Act of 1964, the Voting Rights Act of 1965 and the Fair Housing Act of 1968, outlawed discrimination based on race or color. During the Cold War, the United States and the Soviet Union competed in the Space Race, culminating with the 1969 U. S. Moon landing; the end of the Cold War and the collapse of the Soviet Union in 1991 left the United States as the world's sole superpower. The United States is the world's oldest surviving federation, it is a representative democracy.
The United States is a founding member of the United Nations, World Bank, International Monetary Fund, Organization of American States, other international organizations. The United States is a developed country, with the world's largest economy by nominal GDP and second-largest economy by PPP, accounting for a quarter of global GDP; the U. S. economy is post-industrial, characterized by the dominance of services and knowledge-based activities, although the manufacturing sector remains the second-largest in the world. The United States is the world's largest importer and the second largest exporter of goods, by value. Although its population is only 4.3% of the world total, the U. S. holds 31% of the total wealth in the world, the largest share of global wealth concentrated in a single country. Despite wide income and wealth disparities, the United States continues to rank high in measures of socioeconomic performance, including average wage, human development, per capita GDP, worker productivity.
The United States is the foremost military power in the world, making up a third of global military spending, is a leading political and scientific force internationally. In 1507, the German cartographer Martin Waldseemüller produced a world map on which he named the lands of the Western Hemisphere America in honor of the Italian explorer and cartographer Amerigo Vespucci; the first documentary evidence of the phrase "United States of America" is from a letter dated January 2, 1776, written by Stephen Moylan, Esq. to George Washington's aide-de-camp and Muster-Master General of the Continental Army, Lt. Col. Joseph Reed. Moylan expressed his wish to go "with full and ample powers from the United States of America to Spain" to seek assistance in the revolutionary war effort; the first known publication of the phrase "United States of America" was in an anonymous essay in The Virginia Gazette newspaper in Williamsburg, Virginia, on April 6, 1776. The second draft of the Articles of Confederation, prepared by John Dickinson and completed by June 17, 1776, at the latest, declared "The name of this Confederation shall be the'United States of America'".
The final version of the Articles sent to the states for ratification in late 1777 contains the sentence "The Stile of this Confederacy shall be'The United States of America'". In June 1776, Thomas Jefferson wrote the phrase "UNITED STATES OF AMERICA" in all capitalized letters in the headline of his "original Rough draught" of the Declaration of Independence; this draft of the document did not surface unti
General Services Administration
The General Services Administration, an independent agency of the United States government, was established in 1949 to help manage and support the basic functioning of federal agencies. GSA supplies products and communications for U. S. government offices, provides transportation and office space to federal employees, develops government-wide cost-minimizing policies and other management tasks. GSA employs about 12,000 federal workers and has an annual operating budget of $20.9 billion. GSA oversees $66 billion of procurement annually, it contributes to the management of about $500 billion in U. S. federal property, divided chiefly among 8,700 owned and leased buildings and a 215,000 vehicle motor pool. Among the real estate assets managed by GSA are the Ronald Reagan Building and International Trade Center in Washington, D. C. – the largest U. S. federal building after the Pentagon – and the Hart-Dole-Inouye Federal Center. GSA's business lines include the Federal Acquisition Service and the Public Buildings Service, as well as several Staff Offices including the Office of Government-wide Policy, the Office of Small Business Utilization, the Office of Mission Assurance.
As part of FAS, GSA's Technology Transformation Services helps federal agencies improve delivery of information and services to the public. Key initiatives include FedRAMP, Cloud.gov, the USAGov platform, Data.gov, Performance.gov, Challenge.gov. GSA is a member of the Procurement G6, an informal group leading the use of framework agreements and e-procurement instruments in public procurement. In 1947 President Harry Truman asked former President Herbert Hoover to lead what became known as the Hoover Commission to make recommendations to reorganize the operations of the federal government. One of the recommendations of the commission was the establishment of an "Office of the General Services." This proposed office would combine the responsibilities of the following organizations: U. S. Treasury Department's Bureau of Federal Supply U. S. Treasury Department's Office of Contract Settlement National Archives Establishment All functions of the Federal Works Agency, including the Public Buildings Administration and the Public Roads Administration War Assets AdministrationGSA became an independent agency on July 1, 1949, after the passage of the Federal Property and Administrative Services Act.
General Jess Larson, Administrator of the War Assets Administration, was named GSA's first Administrator. The first job awaiting Administrator Larson and the newly formed GSA was a complete renovation of the White House; the structure had fallen into such a state of disrepair by 1949 that one inspector of the time said the historic structure was standing "purely from habit." Larson explained the nature of the total renovation in depth by saying, "In order to make the White House structurally sound, it was necessary to dismantle, I mean dismantle, everything from the White House except the four walls, which were constructed of stone. Everything, except the four walls without a roof, was stripped down, that's where the work started." GSA worked with President Truman and First Lady Bess Truman to ensure that the new agency's first major project would be a success. GSA completed the renovation in 1952. In 1986 GSA headquarters, U. S. General Services Administration Building, located at Eighteenth and F Streets, NW, was listed on the National Register of Historic Places, at the time serving as Interior Department offices.
In 1960 GSA created the Federal Telecommunications System, a government-wide intercity telephone system. In 1962 the Ad Hoc Committee on Federal Office Space created a new building program to address obsolete office buildings in Washington, D. C. resulting in the construction of many of the offices that now line Independence Avenue. In 1970 the Nixon administration created the Consumer Product Information Coordinating Center, now part of USAGov. In 1974 the Federal Buildings Fund was initiated, allowing GSA to issue rent bills to federal agencies. In 1972 GSA established the Automated Data and Telecommunications Service, which became the Office of Information Resources Management. In 1973 GSA created the Office of Federal Management Policy. GSA's Office of Acquisition Policy centralized procurement policy in 1978. GSA was responsible for emergency preparedness and stockpiling strategic materials to be used in wartime until these functions were transferred to the newly-created Federal Emergency Management Agency in 1979.
In 1984 GSA introduced the federal government to the use of charge cards, known as the GMA SmartPay system. The National Archives and Records Administration was spun off into an independent agency in 1985; the same year, GSA began to provide governmentwide policy oversight and guidance for federal real property management as a result of an Executive Order signed by President Ronald Reagan. In 2003 the Federal Protective Service was moved to the Department of Homeland Security. In 2005 GSA reorganized to merge the Federal Supply Service and Federal Technology Service business lines into the Federal Acquisition Service. On April 3, 2009, President Barack Obama nominated Martha N. Johnson to serve as GSA Administrator. After a nine-month delay, the United States Senate confirmed her nomination on February 4, 2010. On April 2, 2012, Johnson resigned in the wake of a management-deficiency report that detailed improper payments for a 2010 "Western Regions" training conference put on by the Public Buildings Service in Las Vegas.
In July 1991 GSA contractors began the excavation of what is now the Ted Weiss Federal Building in New York City. The planning for that buildin
In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot. Encryption does not itself prevent interference, but denies the intelligible content to a would-be interceptor. In an encryption scheme, the intended information or message, referred to as plaintext, is encrypted using an encryption algorithm – a cipher – generating ciphertext that can be read only if decrypted. For technical reasons, an encryption scheme uses a pseudo-random encryption key generated by an algorithm, it is in principle possible to decrypt the message without possessing the key, for a well-designed encryption scheme, considerable computational resources and skills are required. An authorized recipient can decrypt the message with the key provided by the originator to recipients but not to unauthorized users. In symmetric-key schemes, the encryption and decryption keys are the same. Communicating parties must have the same key.
An example of a symmetric key scheme would be the one used by the German Enigma Machine that sent information from a central location to troops in various other locations in secret. When the Allies captured one of these machines and figured out how it worked, they were able to decipher the information encoded within the messages as soon as they could discover the encryption key for a given day's transmissions. In public-key encryption schemes, the encryption key is published for anyone to use and encrypt messages. However, only the receiving party has access to the decryption key. Public-key encryption was first described in a secret document in 1973. Although published subsequently, the work of Diffie and Hellman, was published in a journal with a large readership, the value of the methodology was explicitly described and the method became known as the Diffie Hellman key exchange. A publicly available public key encryption application called Pretty Good Privacy was written in 1991 by Phil Zimmermann, distributed free of charge with source code.
Encryption has long been used by governments to facilitate secret communication. It is now used in protecting information within many kinds of civilian systems. For example, the Computer Security Institute reported that in 2007, 71% of companies surveyed utilized encryption for some of their data in transit, 53% utilized encryption for some of their data in storage. Encryption can be used to protect data "at rest", such as information stored on computers and storage devices. In recent years, there have been numerous reports of confidential data, such as customers' personal records, being exposed through loss or theft of laptops or backup drives. Digital rights management systems, which prevent unauthorized use or reproduction of copyrighted material and protect software against reverse engineering, is another somewhat different example of using encryption on data at rest. In response to encryption of data at rest, cyber-adversaries have developed new types of attacks; these more recent threats to encryption of data at rest include cryptographic attacks, stolen ciphertext attacks, attacks on encryption keys, insider attacks, data corruption or integrity attacks, data destruction attacks, ransomware attacks.
Data fragmentation and active defense data protection technologies attempt to counter some of these attacks, by distributing, moving, or mutating ciphertext so it is more difficult to identify, corrupt, or destroy. Encryption is used to protect data in transit, for example data being transferred via networks, mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. There have been numerous reports of data in transit being intercepted in recent years. Data should be encrypted when transmitted across networks in order to protect against eavesdropping of network traffic by unauthorized users. Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed to protect the integrity and authenticity of a message. Standards for cryptographic software and hardware to perform encryption are available, but using encryption to ensure security may be a challenging problem. A single error in system design or execution can allow successful attacks.
Sometimes an adversary can obtain unencrypted information without directly undoing the encryption. See, e.g. traffic analysis, TEMPEST, or Trojan horse. Digital signature and encryption must be applied to the ciphertext when it is created to avoid tampering. Encrypting at the time of creation is only secure if the encryption device itself has not been tampered with. Conventional methods for deleting data permanently from a storage device involve overwriting its whole content with zeros, ones or other patterns – a process which can take a significant amount of time, depending on the capacity and the type of the medium. Cryptography offers a way of making the erasure instantaneous; this method is called crypto-shredding. An example implementation of this method can be found on iOS devices, where the cryptographic key is kept in a dedicated'Effaceable Storage'; because the