Homepage of Boris Haase

Radio Computing • Internet and Co • Programming with Stair • Sorting and Searching  (Previous | Next)

Internet and Co

Internet and Co


To guaranty the authenticity of information (e.g. for exams), appropriate safety mechanisms are necessary. The authentication can be done by biometric procedures. Supervised computers are suitable as the only foreseeable inexpensive solutions. Unsupervised computers can be easily outwitted since information can be channelled in from unwanted side (e.g. human or computer).

The supervised computers must be able to identify, store and display for usage the brought along allowed additive information as such and to prevent or to channel the access to the internet specifically. For this purpose, both appropriate standards and intelligent verification methods are to develop if one wants to accomplish a certain comfort.

A simple way is to specify the allowed URLs for the browser. Automatic image recognition procedures that can filter out undesirable sites are not suitable because the sites can be coded and the velocity of decoding is the problem. Thus, only sites that have a fixed incorruptible authorship and no hidden areas come into question.

A reliable control can only be ensured if the assignment of URL and content can not be manipulated (beware of generic URLs). The brought along additional information may be protected by appropriate passwords (exam on the internet) and decrypted before the exam. The customising of programs for additional information must not take up too much time.

For this purpose, profiles of the programs should be able to be safely stored password-protected that will only need to be imported (requires appropriate programming of the programmes). If the internet should evolve to the extent that there every program is available, this problem is omitted. This is certainly desirable since special knowledge is to test as a rule by special programmes, too.

Programmes that cannot be called up via internet may, however, be called up via appropriate controlled remote connections (velocity should be no longer a problem in the future). It is more difficult when the exam situation requires special hardware (such as surgery). There will always be exams that are to be conducted only at certain places. Most exams can be yet realised with standard equipment.

Is knowledge from certain time units in demand, a questionnaire is appropriate that, varied at given times, the examinees have to answer at the same time. For the success, a certain percentage of correct answers for individual fields may be demanded, which can vary depending on the field. Multiple-choice questions facilitate the evaluation on the computer, as long as the automatic language comprehension is limited.

For exams via internet, the result of the automatic evaluation can be made public immediately after the end of the exam time. The exam possibilities and fairness require in any case sometime the internet: Nobody can be expected to have retained all needed knowledge in memory. The irreplaceable accomplishment of man is in the creative and information connecting field.

To protect the personality of the examinee, it may be necessary to conduct exams on the internet anonymously. For this purpose, the testing centre should offer signatures on the internet that are available after selection by the examinee only to this to identify himself. Furthermore, the testing centre should offer anonymous (temporary) email accounts under that the examinee can view the exam result with the signature and a password.


Votings on the internet are also easily possible if the identity of the voter can be uniquely clarified. Everybody should get assigned at birth a free e-mail account to that all emails are sent, needing a unique identification of the recipient. This email account would have even a higher status than the letterbox, concerning security aspects.

It could be (also) managed till the early infancy by the legal guardians. For this purpose, every person would have to have internet access in case of need. This could be installed in public authorities. Their employees would then have to help those in the operating that alone are not in a position to do so. The operating must be possible voice-operated in the future without a keyboard having to be used.

Each person should also be assigned at birth a worldwide unique identification (number) that can be pronounced as a name (see linguistics) and serves officially as such. This also serves as a signature of important documents. It is to consider whether this ID is uniquely generated from biometric data that do not change during life. Simpler is the query in a safe database.

The consequential use of the ID also allows finding certain contents about oneself quickly and reliably on the internet. With increasing improvement of spam protection the email account assigned at birth can be linked to the ID uniquely and for everybody recognisably: e.g. [ID]@mail.world. Each person should be provided with a free web space where ze can present zerself.


This should, for example, be accessible at www.[ID].net.world and free of unwanted content. Over this administrators watch that are appointed by the future world government. Each presentation should be drafted in the future world language, so that everybody can easily and quickly get an idea. For the official part an obligatory profile can be made. It may be linked to unobjectionable private home pages.

People who do not want to position own content are represented by minimal content as they among others e. g. can be found in an identity card. Everybody is to be enlightened about zis stored data and their location. When creating one’s own content the authorities assist within their means. What can be listed by a uniform questionnaire everybody can demand (even in part) as content.

A worldwide valid law determines the volume of the minimum contents. It is conceivable, for example, that publicly only ID and nationality may be published. Since nationality in the future plays a less and less important role in view of the world civil society, it is quite conceivable that the law only the ID views as liable to publication. One only knows then that this ID exists, but no more.

The principle of equality has no bite here since each person must be able to determine by himself to what extent ze wants to represent zerself in the public. Authorities are entitled to attend their duties by storing much more data concerning an ID. Everybody can only demand within the valid laws to view the data stored about zer. Sufficient data privacy is always to guarantee.

Who publishes data on www.[ID].net.world assents explicitly that the data may be used for all legal purposes. This includes in particular the automated processing. Each person is to be informed about what can be done with zis data theoretically and practically, so that ze receives a comprehensive idea and can realise the scope of zis decision.

The right to freedom of self-expression includes that the published data have not to be truthful. This should be clear to everybody. Nobody can demand a correction. Nobody can also demand that somebody corrects the truthful data published elsewhere if the privacy rights of the described are not violated.

Is somebody public figure, ze can defend zerself to a lesser extent against depictions of zerself since the legitimate interest of the general public can conflict with zis personality rights. A core of individual rights but always remains inviolable since the dignity of man must be respected. The laws of world government regulate particulars and this is not to be subject here.

A person may reply fictitious statements about facts concerning zerself with a counter statement, which has to be published also on the internet, regardless of its truthfulness at the place of its occurrence. It does not matter how many times the homepage is called. Will the depiction be sufficiently corrected or be withdrawn, the right to publish the counter statement expires.

The freedom of publication allows that publications about a described person have not to be notified to this person, since ze can easily browse the internet because of zis ID for depictions of zis person by zerself. If the described person wants to be informed about this, one should be in keeping with this wish by mailing to zis wished email address since this does not represent a significant expense.

Mobile internet reception should be possible: via satellite or sufficiently densely distributed hotspots etc. The control of the internet should be possible by language (headset), data gloves and eye movements. The monitor is replaced by semi-transparent to switch data glasses (with prompter), whereby for each eye contents of various kinds can be seen - even for 3D representations of the same content.

On the internet one can arrange radio broadcasts in future on one’s own. Newscasts can be specifically read to (by a female, male or child's voice). In so doing, one can select specifically the speaker's voice (e.g. of the partner). Pieces of music can be selected specifically or pools. The cost is comparable to that of sound radio or television broadcasting. One can create programs for others.

These can be combined with own broadcasts (going live with a microphone or webcam). Examples are own concerts or play stagings, art exhibitions with virtual tours and explanations, (collective) karaoke, commercial spots for own products, workshops or conference circuits. Since the future on the internet is multimedia, much is thinkable right up to the 3D film.

With the increasing development of speech recognition and translation programs automatic simultaneous translations via internet are imaginable – by being delayed introduction of the worldwide uniform planned language. The more intelligent the programs are, the more likely they can correct an error in speaking, and, if necessary, interpose explanations. It remains of course reserved to the internet user what ze permits or initiates autonomously.

In order to simplify the search processes, the existing idea of autonomously seeking agents is extended to (standardised) information user profiles that specify the wishes of the user for a site, and to which then each site can react by corresponding queries and displaying only or primarily the desired contents. For this purpose, the programming language PHP, for example, or the browser could be extended.

The web site content would be to categorise smartly and could be queried by these categories. The browser should be able to summarise the contents that are scattered across several sites, on one site to obtain a clear representation. Ontology concepts should be included meaningfully (e.g. through on terms formulated query rules that browser and PHP then evaluate).

The advantages of this approach are in the free determination of categories that have not to occur in the site and also can consist of whole sentences and of rules that can be complex, without extending the search time significantly. Since queries are based on searching in sorted data, suitable data storage is to choose, as sorting and reference theory with substances and references suggest.

Strap, clothes and virtual reality

Portable computers can be connected to the so-called strap, which as a multi-function device serves for authentication, is worn like a watch and takes over whose functions with display, option to telephone and key function. The functions of the strap can be currently (partly) enabled or disabled: through language or touch. The strap has integrated a simple computer.

It works even without a computer connection, replacing an implanted chip. When it is laid down, an alarm can be prepared that is triggered when it is not activated in a specified period again in a certain way. Certain functions should be always disabled for security reasons if the strap is laid down. The alarm can let send the integrated transmitter messages to the security forces.

One can also justify the strap so that the events of the last few hours around its wearer are recorded (black-box function). This recording can be sent out when an alarm occurs or at the request of the wearer. In order that criminals have no possibility to stop the transfer process, a running transfer to a secure computer can happen or the transmission must be sufficiently quick.

Since the coordinates of the wearer are also transferred, the last place of residence prior to a possible kidnapping is always known. Versions of the strap may also be used as an electronic tag. Everyone should consider precisely what functions of the strap are enabled or disabled, since many conclusions regarding his behaviour are possible – be the (encrypted) transfer even so secure.

Modern clothes can also contribute to the information transfer: So information can be absorbed with the body surface as a pattern of different pressures or different temperatures. Thus, images and language become easily transferable to deafblind. If the habiliment is connected with rangefinder or correspondent image analysis software, even the white cane can be dropped.

Connecting the habiliment with other measuring devices, e.g. magnetic fields, pollutant concentrations can be inconspicuously evaluated and everything else, what can be measured as scaled substance or evaluated by programmes (for example fluctuations in the voice or skin or eye contact of the counterpart, which can give hints on certain emotional states).

If the habiliment is programmable - input via voice, touch or evaluation of the viewing direction, the measured variables can be easily changed. Imagination about what can be measured has no limits. A connection to the internet and databases increases the information available again. However, prices also will rise with the requirements - and decrease with a high number of units again.

The path to virtual reality can lead in rooms (CAVE) in addition to projection procedures onto suitable coated surfaces - whereby a computer computes the image to project for objects existing in the room (compensation of distortion) - also via programmable wallpaper that can be operated like the clothes above. Even 3D effects can be achieved by this (higher dimensions as a projection).

The surfaces of the room can be segmented at work for different contents and can be individually addressed. Given these possibilities, the inability of man for parallel processing becomes displeasingly noticeable. As long as ze is not a cyborg, ze remains reliant on computer assistance. Direct influence on the brain is therefore so attractive because impressions have not to be communicated materially (sensory organs).

Transport and machines

In order to transport goods quickly and reliably from warehouses and collecting points to the consumers, partly underground express connections are established. The volume of goods is not more than 0.125 cubic metres (0.5 m)3 since bigger goods can be transported slower. Computers compute optimal network utilisation and collision avoidance. They also inform technicians about occurred jams.

Type of transport could be for example magnetic suspension technology in combination with vacuum tunnels. The goods may be collected and posted at easily accessible shipping points. Whether will be transported partly (with a different technology) to the households must be reconsidered. Foods can be, for example, centrally prepared at the collecting points. By centralising also unusual wishes can be fulfilled.

The individual containers for the transport can be streamlined. Integrated chips control the unmanned system. Only a few minutes pass by between order and delivery. The transport fees are low in relation to the value of the goods if the containers are filled well: driving should be more expensive. Many occupations that we know today will vanish or are performed by robots or computers.

Only where complicated conversations with people arise, where creative performance, years of experience and special skills are needed, where must be complexly organised and coordinated, man is still in demand. Physical work and everything, for what rules can be laid down, is vulnerable to replacement. Our world will be to manage with much less people. However, the needs will considerable increase.

The differences between man and machine will wane more and more: human beings will have properties of machines and vice versa. Man will die if ze wants to: to get into the subsequent world - at a point of time which ze has chosen. Fatal accidents will continue to occur - but more rarely. The question for the domination through the machines will arise: concerning this, man, however, will find a solution.

The solution is control and monitoring. The information that accumulates in a machine is checked by appropriate programs. Certain functions in a machine may not be disabled without disabling the machine itself. With this, an interdiction of coding in certain areas is associated, respectively that what is coded, must be able to be decoded simultaneously by certain programs.

Machines need a central, unforgeable and by rota to renew approval that can be checked up at any time - like the overall status of the machine. Simpler checkups must be possible by owner and police, complex ones may be reserved for specialists. There have to be enacted laws against criminality committed by machines that hold manipulators and owners responsible.

© 2008 by Boris Haase

Valid XHTML 1.0 • disclaimer • mail@boris-haase.de • pdf-version • bibliography • subjects • definitions • statistics • php-code • rss-feed • top