Humanities and Arts: Sharing Center Stage on the Internet
draft-ietf-harts-guide-02
The information below is for an old version of the document that is already published as an RFC.
Document | Type |
This is an older version of an Internet-Draft that was ultimately published as RFC 2150.
|
|
---|---|---|---|
Authors | Walter Stickle, Janet L. Max | ||
Last updated | 2013-03-02 (Latest revision 1997-05-14) | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | Informational | ||
Formats | |||
Additional resources | ftp%3A//nfs/ftp/harts/harts.mail | ||
Stream | WG state | (None) | |
Document shepherd | (None) | ||
IESG | IESG state | Became RFC 2150 (Informational) | |
Consensus boilerplate | Unknown | ||
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
draft-ietf-harts-guide-02
quot;, or the MacIntosh ".au" format, these files typically take a very long time to download even a few seconds of audio. The size of these formats makes them too inefficient for widespread use on the net today. It is however possible to do "useful" audio over the net. The emerging "de facto" standard seems to be _RealAudio_, based on the freely distributable server/player application, _RealAudio_ version 2.0, developed by the Seattle based company Progressive Networks. First released in 1995, RealAudio allows useable digital audio in realtime over a 28.8 kB line, and has already been put into service on the home pages of most major record companies as well as in many niche applications. In addition, RealAudio provides a "Voice mode" optimized for understandable speech transmission over a 14.4kB line. Unfortunately the quality of _RealAudio_ leaves much to be desired. In particular, the sample rate in Music Mode is only 8Khz (as compared to CD quality 44.1 Khz), meaning that all high frequencies above 4khz are simply missing. The resulting audio is still pleasing to listen to, but sounds very dull and dark. More information about RealAudio can be found at www.RealAudio.com. Humanities and Arts [draft-ietf-harts-guide-02.txt] [Page 25] INTERNET-DRAFT Sharing Center Stage on the Internet Clearly Digital Audio is the way of the future, but until more bandwidth is available to the average person, it may not be the way of the present. Fortunately, at least in the area of music, there is an interesting alternative. MIDI (the Musical Instrument Digital Interface), as developed for electronic musical instruments (keyboards, samplers, drum machines, etc.) works well for certain kinds of music over the net. It involves sending no sound sources at all, just the description of the music -- kind of like the score, without the instruments. If the receiver has the right instruments on their computer (such as the sounds defined in the General Midi soundset found on many soundcards), they can play back the musical score. The big disadvantage to using MIDI is that other than the limited selection of sounds in the General Midi set, it is extremely difficult to make sure the music sounds more than approximately like the original. And there is no way to handle non-MIDI instruments such as guitar or voice, so it is useless to hear the new song by your favorite rock and roll band. The big advantage to MIDI is how fast it works over slow net connections. For example, five minutes of music, fits in a mere 30k file, and usually will not take more than a few seconds even on the slowest of dialup connections! This makes it ideal for applications such as networked games, or music to go along with a web page. There are many ways of embedding MIDI files into HTML documents, for WWW distribution. Anyone who wants to add MIDI to a page can choose to use existing public access MIDI file banks, of which there are many, or to produce new MIDI themselves. Crescendo is one package available for embedding MIDI files in HTML http://www.liveupdate.com Crescendo works for both MacIntosh and Windows. Helpful Links: Publicly Available Audio and Music Applications http://reality.sgi.com/employees/cook/audio.apps/public.html Music of J.S. Bach for keyboard ftp://ftp.cs.ruu.nl/pub/MIDI/SONGS/CLASSICAL/BACH/HARPSICHORD/ RISM (repertoire of manuscript sources), plus other access to online scholarly music resources. http://rism.harvard.edu/RISM/ Crescendo is used in the web pages at http://mcentury.citi.doc.ca along with a growing number of others. One very interesting use of Crescendo occurs on the Music Theory Online publication, a serious scholarly site for publishing and debating musicology and music theory. Articles there now routinely include short musical examples, a great sign of the future of scholarly publishing in the age of Humanities and Arts [draft-ietf-harts-guide-02.txt] [Page 26] INTERNET-DRAFT Sharing Center Stage on the Internet dynamic, interactive content. http://boethius.music.ucsb.edu/mto/issues/mto.96.2.4/ Formerly, debate on musical form and structure occurred in the pages of journals, referring usually to music examples in terms of its visual notation. This notation requires a certain degree of training to decode, effectively restricting the potential readership to those with this professional training. With sound examples embedded directly in the text, at least the aural effect of the music comes across, even to those unable to read the notation accurately. This shift is appropriate to the newer trends in music scholarship, which talk about music in terms of its social and cultural context, instead of only in formal terms. 5.6 Content Design Issues Know your intended audience. If you want more people to see your work, you'll need to make it more accessible. Many sites are very careful about what content they will allow access to. If you want all audiences to be able to view your work, make sure you are careful about your content and language. Another content design issue is tool friendliness. Some machines have limitations which will not allow them to see or hear what you'd like them to. For example, older or less expensive models of monitors may have monochrome, or one-color displays, or display only 16 colors, or 256 colors. If you create and view images which look fabulous with a 64,000 color display, you may want to test them using a 16 color display to see what the effect is. Sometimes you can modify your image slightly to get a wider audience while only having a minor impact on the effect. The following sites give you pointers on what to consider when designing a web page that is content- rich: - Sun's Guide to Web Style - http://www.sun.com/styleguide/ - Yale C/AIM Web Style Guide - http://info.med.yale.edu/caim/manual/ - Web Development - http://www.december.com/web/develop.html - A Guide to Creating a Successful Web Site = http://www.hooked.net/~larrylin/web.htm - Bandwidth Conservation Society - http://www.infohiway.com/faster/ This is resource for web developers with an interest in optimizing performance. See Section 6 for other issues and challenges relating to content. 5.7 Publicizing your work ++ advertising on the net. point to Sally's doc. Humanities and Arts [draft-ietf-harts-guide-02.txt] [Page 27] INTERNET-DRAFT Sharing Center Stage on the Internet 6. Issues and Challenges The Internet has many issues and challenges, among which are security, privacy, property rights, copyrights and freedom of speech. Security issues involve both the security of your data, as well as your image. Viruses can be transmitted easily over the net, and precautions should always be taken. If you choose to keep your own information available on the net it can be the subject of vandalism and theft. You may also find yourself being persecuted for the information you provide as more and more people join the Internet community and feel the need to impose their morality upon it. This is no different from any society. We must draw our own lines, and our own conclusions. This section is terribly brief, and entirely summary in nature, and is in no way intended to be comprehensive. It is intended to warn you and advise you. If you have real concerns about your property rights, copyrights, and/or personal rights, please do your own research. Internet laws are in such a state of flux that they are changing as I write this, and they will be changing as you read it. At last check, however, freedom of speech was prevailing in the United States, and so far the government has not upheld any laws prohibiting the exhibition of anything on the Internet. Support your local constitutional rights. 6.1 Security Issues ++ See Section 10. but describe here also. ++ Security of content, site, ownership. 6.2 Viruses A "virus" is a program that modifies other programs by placing a copy of itself inside them. It cannot run independently. It requires that its host program be run to activate it. The damage caused by a virus may consist of the deletion of data or programs, maybe even reformatting of the hard disk, but more subtle damage is also possible. Some viruses may modify data or introduce typing errors into text. Other viruses may have no intentional effects other than replicating itself. Viruses can be transmitted over the Internet inside other programs, but usually they are transmitted by floppy disk. Your best bet is to purchase a really versatile and up-to-date virus checking program from your local software retailer, and run it over every floppy you plan to read, and every program you plan to run, as well as periodically over the entire machine. Humanities and Arts [draft-ietf-harts-guide-02.txt] [Page 28] INTERNET-DRAFT Sharing Center Stage on the Internet Computer viruses are enough like organic viruses that many of the same precautions apply. Early detection is key. Diligence will mitigate potential damage, but frequent incremental backups are your best strategy for recovery. 6.3 Rights ++ Intro to protecting your copyright on the Internet. ++ References: Copyright law, cases, etc. ** Remember Laws on Intellectual property are constantly changing! ++ examples of: copyright, trademark, disclaimers, international ++ concerns big issue re: other countries who do not recognize US law ++ goes both ways... respecting others copyrights ++ The implications of the Telecom Reform Bill with regard to ++ Freedom of Speech. ++ Censorship issues, need *your* help. ++ INTERNATIONALIZE: ie: Canada will not allow the import of anything ++ that is "degrading" to women. Etc. 6.4 Conducting Business over the Internet ++ Secure transaction are possible, pointers to pgp, etc. 6.5 Netiquette ++ The Responsible Use of the Network document outline, and pointers. ++ ie: AVOID SHOUTING FYI 28 "Netiquette Guidelines", (Also RFC 1855), October 1995. ++ It never hurts to keep silent until you know your audience better. ++ Not being offended by others, ie: don't take it personally ++ keeping in mind international cultural differences, etc. 7. Glossary ++ point to userglos, trainmat, and useful stuff that needs to be on ++ the same doc. for ease of use FYI 29 "Catalogue of Network Training Materials", (Also RFC 2007), October 1996. FYI 22 "Frequently Asked Questions for Schools", (Also RFC 1941), May 1996. FYI 18 "Internet Users' Glossary", (Also RFC 1983), August 1996. Humanities and Arts [draft-ietf-harts-guide-02.txt] [Page 29] INTERNET-DRAFT Sharing Center Stage on the Internet ** words contained within this document which need to be defined for ** the audience: Boolean, 8. Resources ++ Places to find more information of use and interest. ++ specific arts and humanities studies, projects, programs, getty Much of the information provided by this document was gathered from other documents. Wherever important to the discussion, a pointer to the document was given, however, many more documents are available on many other topics. 8.1 Request for Comment One of the most important collections of informational documents about the Internet are written as Requests for Comment by the Internet Engineering Task Force. The name Request for Comment is historical, as these documents are submitted by their authors' for the approval of the Internet community as Internet Standards, and valid Informational RFCs called FYIs, of which this document is one. Basically, if the IETF collective uses a tool or resource, they document its use in an RFC so that there is no mystery to its functionality, uses, designations, specifications, or purposes. More information on RFCs, FYIs, the IETF, and its organizations, documents, policies and purposes can be found in the RFCs themselves, by a number of means. 8.1.1 The ISI RFC-INFO service There are many way to get copies of RFCs over the Internet (see ConneqXions, Vol.6,No.1, January 1992). Most of these simply access a directory of files where each RFC is in a file. The searching capability (if any) is limited to the filename recognition features of that system. The ISI RFC-INFO server is a system you can search for an RFC by author, date, or keyword (all title words are automatically keywords). RFC-INFO is an e-mail based service to help in locating and retrieval of RFCs and FYIs. Users can ask for "lists" of all RFCs and FYIs having certain attributes ("filters") such as their ID, keywords, title, author, issuing organization, and date. Once an RFC is uniquely identified (e.g., by its RFC number) it may also be retrieved. To use the service send e-mail to RFC-INFO@ISI.EDU with your requests in the body of the message. Feel free to put anything in the SUBJECT, the system ignores it. (All is case independent.) Humanities and Arts [draft-ietf-harts-guide-02.txt] [Page 30] INTERNET-DRAFT Sharing Center Stage on the Internet See Appendix C. Examples for using the RFC server RFC-INFO@ISI.EDU 9. References ++ should we create [#] footnotes?? i.e.: ISN doc, etc. ++ reference the publications and/or sites of key ++ arts and humanities organizations (e.g. Getty, NINCH) 10. Security Considerations ** jkrey points to site sec. handbook: ** "The "current" Work in Progress for the Site Security Handbook WG ** is the I-D - draft-ietf-ssh-handbook-03.txt. This group is ** working on a companion document for the "user". Stay tuned for ** the I-D. They should have that out before San Jose." There are a wide variety of ways in which systems can be violated, some intentional, some accidental. Of the intentional attacks, a portion may be exploratory, others simply abusive of your resources (using up your CPU time) but many are actively malicious. No system is 100% safe, but there are steps you can take to protect against misconfigured devices spraying packets, casual intruders, and a variety of focused assaults. Your best defense is to educate yourself on the subject of security. There are places on the net devoted to teaching users about security - most prominently, the CERT Coordination Center located at the Software Engineering Institute at Carnegie Mellon university. You can point your web browser (or direct your ftp connection) to ftp://info.cert.org/pub/cert_faq to start. This is a frequently asked questions guide and general overview on CERT. It includes a bibliography of suggested reading and a variety of sources to find more information. Next, you should probably read ftp://info.cert.org/pub/tech_tips/security_info which contains a (primarily based on the UNIX operating system) checklist to help you determine whether you're site has suffered a security breach. You can use it to guide you through handling a specific incident if you think your system has been compromised or you can use it as a list of common vulnerabilities. CERT also maintains a wide variety of bulletins, software patches, and tools to help you keep up to date and secure. Before you are even online, you should consider some basic steps: 10.1 Formulate a security policy. It should include policies regarding physical access procedures, Humanities and Arts [draft-ietf-harts-guide-02.txt] [Page 31] INTERNET-DRAFT Sharing Center Stage on the Internet security incident response, online privileges and back-up media. Put a message at the login to establish your policy clearly. An example: "This system is for the use of authorized users only. It may be monitored in the course of routine operation to detect unauthorized use. Evidence of unauthorized use or criminal activity may result in legal prosecution." 10.1.1. Talk to your Internet Service Provider. Depending upon your provider and router management situation, there are a number of things your ISP should be able to do for you to make your site more secure. Foremost, packet filtering on the router that connects you to the internet. You will want to consider IP filters to allow specific types of traffic (web, ftp, mail, etc.) to certain machines (the mailhost, the web server, etc.) and no others. Other filters can block certain types of IP spoofing where the intruder masks his or her identity using an IP address from inside your network to defeat your filters. Discuss your concerns and questions with your provider - the company may have standards or tools they can recommend. 10.1.2. Make sure your systems are up to date. A significant number of incidents happen because older versions of software have well-known weaknesses that can be exploited from almost anywhere on the internet. CERT provides a depository for software patches designed by concerned net.citizens, CERT's engineers and by the vendors themselves. 10.1.3. Use the tools available. Consider recording MD5 checksums on read-only media (the MD5-digest algorithm determines an electronic "fingerprint" for files to indicate their uniqueness -comparing more recent checksums to older ones can alert you to changes in important system files), installing tripwire on your systems (notes size and MD5 checksum changes, among other sanity checks), and periodically testing the integrity of your machines with programs an intruder might use, like SATAN and crack. [Details on MD5 are contained in RFC 1321.] Most files and fixes go through the basics before leaving you to figure things out on your own, but security can be a complicated issue, both technically and morally. When good security is implemented, no one really notices. Unfortunately, no one notices when it's not taken care of either. That is until the system crashes, your data gets corrupted, or you get a phone call from an irate company whose site was cracked from your machines. It doesn't matter if you carry only public information. It doesn't matter if you think you're too small or unimportant to be noticed. No one is Humanities and Arts [draft-ietf-harts-guide-02.txt] [Page 32] INTERNET-DRAFT Sharing Center Stage on the Internet too small or too big, no site is immune. Take precautions and be prepared. 11. Acknowledgments Joseph Aiuto Sepideh Boroumand Michael Century Kelly Cooper Lile Elam Dan Harrington Julie Jensen Walter Stickle 12. Authors' Address Janet Max jlm@rainfarm.com Scott Stoner stoner@artsedge.kennedy-center.org Humanities and Arts [draft-ietf-harts-guide-02.txt] [Page 33] INTERNET-DRAFT Sharing Center Stage on the Internet Appendix A. ++humanities computing projects, research projects, ++text encoding project (michael century) need to maintain perspective ++of the historic art archives and the "current" art in culture ++AHIB? Marty Harris, Susan Sigfried NIDGE? Examples of Projects on the Internet of Interest to the Arts and Humanities Communities The commonplace insight about the web as a new distribution channel for cultural products is that it effaces the traditional border between producer and consumer. Publishers exploit two-way interactivity by re-designing the editorial mix to include reader response. Here follows some examples of the way creative artists attempt to design structures flexible enough for significant viewer input. RENGA (http://renga.ntticc.or.jp) - An inspired transposition of a traditional collaborative writing practice into the realm of digital media supported by the NTT InterCommunication Centre in Tokyo. Renga means linked-image or linked-poem, and draws on the Japanese tradition of collaboration which effaces the unique notion of original author. PING (http://www.artcom.de/ping/mapper) - by Art+Com, a Berlin based media centre and thinktank. Art+Com is a leader in producing high-end net visualization projects. Ping lets the browser add a link, which then becomes a part of the ongoing visual structure. It is similar, in this sense, to the Toronto Centre for Landscape Architecture's OASIS site. Art+Com's T-Vision project (http://www.artcom.de/projects/terra) which uses satellites and networked VR computers to permit an astonishing fly-in to earth from space: acclaimed as one of the most imaginative realizations of the potential of networked computing. OASIS(Image)INTERNET-DRAFT Toronto Centre for Landscape Architecture's OASIS site requires a specialized browser, but from a standard Netscape connection, you can view stills that give a sense of the beautiful images produced by the collaborative "design process". It is introduced by its designers as follows: Oasis is a shared 3-Dimensional navigational environment for the world wide web. This virtual landscape allows one to bury their own information links throughout the terrain or to discover and connect to new information left by others. TechnoSphere (http://www.lond-inst.ac.uk/TechnoSphere/) Is TechnoSphere a Game? Yes and no. It's an experiment on a global scale, a chance to Humanities and Arts [draft-ietf-harts-guide-02.txt] [Page 34] INTERNET-DRAFT Sharing Center Stage on the Internet develop complex artificial life on digital networks. TechnoSphere is interactive like a game, but transgresses the linear boundaries of branching and hierarchical games narrative to enable freer movement. TechnoSphere is designed to encourage a non-linear experiential exploration. Body Missing (http://yorku.ca/BodyMissing/index.html) Toronto artist Vera Frenkel created this richly evocative site on the disappearance of art and memory as an extension of her Transit Bar installation. It is conceived as a site open to new 'reconstructions' of the artworks confiscated during the Third Reich. First opened to the public as part of the ISEA95 exhibition in Montreal, it has since earned widespread critical comment and praise. Molecular Clinic 1.0 (http://sc_web.cnds.canon.co.jp/molecular_clinic/artlab_bionet) Molecular Clinic 1.0 ' is an art project realized through a collaboration between ARTLAB and Seiko Mikami, and is one of the most elaborate custom designed art projects yet created for the Web. During their initial visit users should download the MOLECULAR ENGINE VIEWER, which is a type of molecular laboratory for their computer. What they will see on the web site after this initial download is a virtual space containing a three dimensional computer generated Spider and Monolith object. The user will be able to navigate through and into this virtual space and can zoom into the spider all the way to the molecular level. File Room (http://fileroom.aaup.uic.edu/FILEROOM.html) - Cumulative database info on Censorship, hosted in Chicago but conceived by Spanish artist Antoni Muntadas. Idea Futures (http://if.arc.ab.ca/~jamesm/IF/IF.html) - Winner of the grand prize at the 1995 Ars Electronica competition for Web Sites, Idea Futures is a stock market of ideas, based on the theories of mathematical economist Robin Hanson. The 'truth' of any claim is assigned a weight calculated by the amount of virtual cash which members of the exchange are willing to bet. The scheme leads might lead toward a radical democratization of academic discourse, but just as easily, toward the trivialization of thought. See the following for a philosophical critique of the system. (http://merzbau.citi.doc.ca/~henry/Matrix/Erewhon.html) Firefly (http://www.agents-inc.com/) also a prize winner at Ars Electronica in 1995, Firefly is an prototypical example of what enthusiasts call a "personal music recommendation agent", which makes suggestions for what you might like to listen to, based on a stored profile of your own likes and dislikes, and the evolving ratings submitted to the system by other members. Worth visiting, if only to understand what all the fashionable hype about 'intelligent agents' Humanities and Arts [draft-ietf-harts-guide-02.txt] [Page 35] INTERNET-DRAFT Sharing Center Stage on the Internet is all about; skeptics should know that even the promoters of these services admit the circularity of their systems: they're capable of reinforcing existing taste, but little else. Humanities and Arts [draft-ietf-harts-guide-02.txt] [Page 36] INTERNET-DRAFT Sharing Center Stage on the Internet Appendix B: Some other URL's of interest Art on the Net http://www.art.net/Welcome.html Artist Memorials http://www.cascade.net/kahlo.html Writers http://the-tech.mit.edu/Shakespeare/ http://www.rain.org/~da5e/tom_robbins.html Photography http://www.nyip.com/ Personal Journals http://grateful.dead.net/RobertHunterArchive.html http://www.cjnetworks.com/~jessa/ Musical Groups http://www.dead.net (Grateful Dead) http://www.netspace.org/phish/ (Phish) Humanities and Arts [draft-ietf-harts-guide-02.txt] [Page 36] INTERNET-DRAFT Sharing Center Stage on the Internet Appendix C: To get started you may send a message to RFC-INFO@ISI.EDU with requests such as in the following examples (without the explanation between []): Help: Help [to get this information] List: FYI [list the FYI notes] List: RFC [list RFCs with window as keyword or in title] keywords: window List: FYI [list FYIs about windows] Keywords: window List: * [list both RFCs and FYIs about windows] Keywords: window List: RFC [list RFCs about ARPANET, ARPA NETWORK, etc.] title: ARPA*NET List: RFC [list RFCs issued by MITRE, dated 1989-1991] Organization: MITRE Dated-after: Jan-01-1989 Dated-before: Dec-31-1991 List: RFC [list RFCs obsoleting a given RFC] Obsoletes: RFC0010 List: RFC [list RFCs by authors starting with "Bracken"] Author: Bracken* [* is a wild card matches everything] List: RFC [list RFCs by both Postel and Gillman] Authors: J. Postel [note, the "filters" are ANDed] Authors: R. Gillman List: RFC [list RFCs by any Crocker] Authors: Crocker Humanities and Arts [draft-ietf-harts-guide-02.txt] [Page 37]