Thursday, January 24, 2008

The Merchant of Venice

The Merchant of Venice

From Mani Kant

Jump to: navigation, search
Shylock and Portia (1835) by Thomas Sully
Shylock and Portia (1835) by Thomas Sully

The Merchant of Venice is a play written by William Shakespeare sometime between 1596 and 1598. Although classified as a comedy in the First Folio, and while it shares certain aspects with Shakespeare's other romantic comedies, the play is perhaps more remembered for its dramatic scenes (particularly the trial scene), and is best known for the character of Shylock.

The title character is the merchant Antonio, not the more famous villain, the Jewish moneylender Shylock, who is the play's most prominent figure. Although Shylock is a tormented character, he is also a tormentor, so whether he is to be viewed with disdain or sympathy is up to the audience (as influenced by the interpretation of the play's director and lead actors). As a result, The Merchant of Venice is often classified as one of Shakespeare's problem plays.

Contents

[hide]

[edit] Date and text

Title page of the first quarto (1600)
Title page of the first quarto (1600)

The date of composition for The Merchant of Venice is believed to be between 1596 and 1598. The play was mentioned by Francis Meres in 1598, so it must have been familiar on the stage by that date. Solanio's reference to his ship the "Andrew" (I,i,27) is thought to be an allusion to the Spanish ship St. Andrew captured by the English at Cadiz in 1596. A date of 1596–97 is considered consistent with the play's style.

The play was entered in the Register of the Stationers Company, the method at that time of obtaining copyright for a new play, by James Roberts on July 22, 1598 under the title The Merchant of Venice, otherwise called The Jew of Venice. On October 28, 1600 Roberts transferred his right to the play to the stationer Thomas Hayes; Hayes published the first quarto before the end of the year. It was printed again in a pirated edition in 1619, as part of William Jaggard's so-called False Folio. (Afterward, Thomas Hayes' son and heir Laurence Hayes asked for and was granted a confirmation of his right to the play, on July 8, 1619.) The 1600 edition is the basis of the text published in the First Folio (1623) and is regarded as being generally accurate and reliable.

No further performances are recorded between 1605 and 1701. In the latter year George Granville staged a successful adaptation, titled The Jew of Venice, with Thomas Betterton as Bassanio. This version (which featured a masque) was popular, and was acted for the next forty years. Granville cut the Gobbos in line with neoclassical decorum; he added a jail scene between Shylock and Antonio, and a more extended scene of toasting at a banquet scene. Thomas Doggett was Shylock, playing the role comically, perhaps even farcically. Rowe expressed doubts about this interpretation as early as 1709; however, Doggett's success in the role meant that later productions would feature the troupe clown as Shylock.

In 1741 Charles Macklin returned to the original text in a very successful production at Drury Lane, paving the way for Edmund Kean seventy years later (see below).[1]

[edit] Performance

[edit] Shylock on stage

Jacob Adler and others report that the tradition of playing Shylock sympathetically began in the first half of the 19th century with Edmund Kean[2], and that previously the role had been played "by a comedian as a repulsive clown or, alternatively, as a monster of unrelieved evil." Kean's Shylock established his reputation as an actor.[3]

From Kean's time forward, all of the actors who have famously played the role, with the exception of Edwin Booth, who played Shylock as a simple villain, have chosen a sympathetic approach to the character; even Booth's father, Junius Brutus Booth, played the role sympathetically. Henry Irving was among the most notable late 19th century Shylocks, and Jacob Adler certainly the most notable of the early 20th century. Adler played the role in Yiddish-language translation, first in Manhattan's Lower East Side, and later on Broadway, where, to great acclaim, he performed the role in Yiddish in an otherwise English-language production.[4]

Kean and Irving presented a Shylock justified in wanting his revenge; Adler's Shylock evolved over the years he played the role, first as a stock Shakespearean villain, then as a man whose better nature was overcome by a desire for revenge, and finally as a man who operated not from revenge but from pride. In a 1902 interview with Theater magazine, Adler pointed out that Shylock is a wealthy man, "rich enough to forego the interest on three thousand ducats" and that Antonio is "far from the chivalrous gentleman he is made to appear. He has insulted the Jew and spat on him, yet he comes with hypocritical politeness to borrow money of him." Shylock's fatal flaw is to depend on the law, but "would he not walk out of that courtroom head erect, the very apotheosis of defiant hatred and scorn?"[5]

Some modern productions take further pains to show how Shylock's thirst for vengeance has some justification. For instance in the 2004 film adaptation directed by Michael Radford and starring Al Pacino as Shylock, the film begins with text and a montage of how the Jewish community is cruelly abused by the bigoted Christian population of the city. One of the last shots of the film also brings attention to the fact that, as a convert, Shylock would have been cast out of the Jewish community in Venice, no longer allowed to live in the ghetto, and would still not be accepted by the Christians, as they would feel that Shylock was yet the Jew he once was.

[edit] Synopsis

Portia by Henry Woods
Portia by Henry Woods

Bassanio, a young Venetian, would like to travel to Belmont to woo the beautiful and wealthy heiress Portia. He approaches his friend Antonio, a merchant, for three thousand ducats needed to subsidize his traveling expenditures as a suitor for three months. As all of Antonio's ships and merchandise are busy at sea, Antonio approaches the Jewish moneylender/usurer Shylock for a loan.

Shylock, who hates Antonio because he had insulted and spat on him for being a Jew a week previously, proposes a condition. If Antonio is unable to repay the loan at the specified date, Shylock will be free to take a pound of Antonio's flesh closest to his heart. Although Bassanio does not want Antonio to accept such a risky condition, Antonio, surprised by what he sees as the moneylender's generosity (no "usance" — interest — is asked for), accedes and signs the contract. With money at hand, Bassanio leaves for Belmont with another friend Gratiano.

At Belmont, Portia has no lack of suitors. Portia's father, however, has left a will stipulating each of her suitors must choose correctly from one of three caskets – one each of gold, silver, and lead – before he could win Portia's hand. In order to be granted an opportunity to marry Portia, each suitor must agree in advance to live out his life as a bachelor were he to select wrongly. The suitor who correctly looks past the outward appearance of the caskets will find Portia's portrait inside and win her hand.

After two suitors, the Princes of Morocco and Aragon, choose incorrectly, Bassanio makes the correct choice, that of the leaden casket. The other two contain mocking verses, including the famous phrase all that glisters [glistens] is not gold.

At Venice, all ships bearing Antonio's goods are reported lost at sea, leaving him unable to satisfy the bond. Shylock is even more determined to exact revenge from Christians after his daughter Jessica flees his home to convert to Christianity and elope with the Christian Lorenzo, taking a substantial amount of Shylock's wealth with her. With the bond at hand, Shylock has Antonio arrested and brought before court.

At Belmont, Portia and Bassanio have just been married, along with his friend Gratiano and Portia's handmaid Nerissa. He receives a letter telling him that Antonio has defaulted on his loan from Shylock. Shocked, Bassanio and Gratiano leave for Venice immediately, with money from Portia, to save Antonio's life. Unknown to Bassanio and Gratiano, Portia and Nerissa leave Belmont to seek the counsel of Portia's cousin, Bellario, a lawyer, at Padua.

The dramatic center of the play comes in the court of the Duke of Venice. Shylock refuses Bassanio's offer, despite Bassanio increasing the repayment to 6000 ducats (twice the specified loan). He demands the pound of flesh from Antonio. The Duke, wishing to save Antonio but unwilling to set a dangerous legal precedent of nullifying a contract, refers the case to Balthasar, a young male "doctor of the law" who is actually Portia in disguise, with "his" lawyer's clerk, who is Nerissa in disguise. Portia asks Shylock to show mercy in a famous speech (The quality of mercy is not strained—IV,i,185), but Shylock refuses. Thus the court allows Shylock to extract the pound of flesh.

At the very moment Shylock is about to cut Antonio with his knife, Portia points out a flaw in the contract (see Quibble (plot device)). The bond only allows Shylock to remove the flesh, not blood, of Antonio. If Shylock were to shed any drop of Antonio's blood in doing so, his "lands and goods" will be forfeited under Venetian laws.

Defeated, Shylock accedes to accept monetary payment for the defaulted bond, but is denied. Portia pronounces none should be given, and for his attempt to take the life of a citizen, Shylock's property will be forfeited, half to the government and half to Antonio, and his life will be at the mercy of the Duke. The Duke pardons his life before Shylock can beg for it, and Antonio asks for his share "in use" (that is, reserving the principal amount while taking only the income) until Shylock's death, when the principal will be given to Lorenzo and Jessica. At Antonio's request, the Duke grants remission of the state's half of forfeiture, but in return, Shylock is forced to convert to Christianity and to make a will (or "deed of gift") bequeathing his entire estate to Lorenzo and Jessica (IV,i).

Bassanio does not recognize his disguised wife. He offers to give "him" a present. First she declines, but after he insists, Portia requests his ring and his gloves. He gives the gloves away without a second thought, but gives the ring only after much persuasion from Antonio, as earlier in the play he promised his wife never to lose, sell or give it away. Nerrisa also tries to retrieve her ring from Gratiano,

At Belmont, Portia and Nerissa taunt their husbands before revealing they were really the lawyer and his clerk in disguise.

After all the other characters make amends, all ends happily (except for Shylock) as Antonio learns that three of his ships were not stranded and have returned safely after all.

[edit] Themes

Shylock and Jessica by Maurycy Gottlieb
Shylock and Jessica by Maurycy Gottlieb

[edit] Shylock and the anti-Semitism debate

The play is frequently staged today, but is potentially troubling to modern audiences due to its central themes, which can easily appear anti-Semitic. Critics still argue over whether the play is itself anti-semitic, or that it is merely a play about anti-Semitism, or whether the foreign setting, including Shylock's ethnicity, is a literary device used to couch uncomfortable truths.

[edit] The anti-Semitic reading

English society in the Elizabethan era has been described as anti-Semitic.[6] English Jews had been expelled in the Middle Ages and were not permitted to return until the rule of Oliver Cromwell. Jews were often presented on the Elizabethan stage in hideous caricature, with hooked noses and bright red wigs, and were usually depicted as avaricious usurers; an example is Christopher Marlowe's play The Jew of Malta, which features a comically wicked Jewish villain called Barabas. They were usually characterized as evil, deceptive, and greedy.

During the 1600s in Venice and in some other places, Jews were required to wear a red hat at all times in public to make sure that they were easily identified. If they did not comply with this rule they could face the death penalty. Jews also had to live in a ghetto protected by Christians, supposedly for their own safety. The Jews were expected to pay their guards. [7]

Readers may see Shakespeare's play as a continuation of this anti-Semitic tradition. The title page of the Quarto indicates that the play was sometimes known as The Jew of Venice in its day, which suggests that it was seen as similar to Marlowe's The Jew of Malta. One interpretation of the play's structure is that Shakespeare meant to contrast the mercy of the main Christian characters with the vengefulness of a Jew, who lacks the religious grace to comprehend mercy. Similarly, it is possible that Shakespeare meant Shylock's forced conversion to Christianity to be a "happy ending" for the character, as it 'redeems' Shylock both from his unbelief and his specific sin of wanting to kill Antonio. This reading of the play would certainly fit with the anti-Semitic trends present in Elizabethan England.

[edit] The sympathetic reading

Many modern readers and theatregoers have read the play as a plea for tolerance as Shylock is a sympathetic character. Shylock's 'trial' at the end of the play is a mockery of justice, with Portia acting as a judge when she has no real right to do so. Thus, Shakespeare is not calling into question Shylock's intentions, but the fact that the very people who berated Shylock for being dishonest have had to resort to trickery in order to win. Shakespeare puts one of his most eloquent speeches into the mouth of this "villain":

Hath not a Jew eyes? Hath not a Jew hands, organs, dimensions, senses, affections, passions; fed with the same food, hurt with the same weapons, subject to the same diseases, heal'd by the same means, warm'd and cool'd by the same winter and summer as a Christian is? If you prick us, do we not bleed? If you tickle us, do we not laugh? If you poison us, do we not die? And if you wrong us, shall we not revenge? If we are like you in the rest, we will resemble you in that. If a Jew wrong a Christian, what is his humility? Revenge. If a Christian wrong a Jew, what should his sufferance be by Christian example? Why, revenge. The villainy you teach me, I will execute, and it shall go hard but I will better the instruction.

Act III, scene I

[edit] Influence on anti-semitism

Regardless of what Shakespeare's own intentions may have been, the play has been made use of by Anti-semites throughout history. One must note that the end of the title in the 1619 edition "With the Extreme Cruelty of Shylock the Jew…" must aptly describe how Shylock was viewed by the English public. The Nazis used the usurious Shylock for their propaganda. Shortly after Kristallnacht in 1938, "The Merchant of Venice" was broadcast for propagandistic ends over the German airwaves. Productions of the play followed in Lübeck (1938), Berlin (1940), and elsewhere within the Nazi Territory.[8]

The depiction of Jews in English Literature throughout the centuries bears the close imprint of Shylock. With slight variations much of English literature up until the 20th century depicts the Jew as "a monied, cruel, lecherous, avaricious outsider tolerated only because of his golden hoard". [9]

[edit] Character study

It is difficult to know whether the sympathetic reading of Shylock is entirely due to changing sensibilities among readers, or whether Shakespeare, a writer who clearly delighted in creating complex, multi-faceted characters, deliberately intended this reading.

One reason for this interpretation is that Shylock's painful status in Venetian society is emphasised. To some critics, Shylock's celebrated "Hath not a Jew eyes" speech (see above) redeems him and even makes him into something of a tragic figure. In the speech, Shylock argues that he is no different from the Christian characters. Detractors note that Shylock ends the speech with a tone of revenge: "if you wrong us, shall we not revenge?" However, those who see the speech as sympathetic point out that Shylock says he learned the desire for revenge from the Christian characters: "If a Christian wrong a Jew, what should his sufferance be by Christian example? Why, revenge. The villainy you teach me, I will execute, and it shall go hard but I will better the instruction."

Even if Shakespeare did not intend the play to be read this way, the fact that it retains its power on stage for audiences who may perceive its central conflicts in radically different terms is an illustration of the subtlety of Shakespeare's characterizations.

[edit] Religious interpretations

Sir Herbert Beerbohm Tree as Shylock, painted by Charles Buchel (1895–1935).
Sir Herbert Beerbohm Tree as Shylock, painted by Charles Buchel (1895–1935).

Sympathy for Shylock can be derived from an understanding of the difference between the concept of forgiveness of sins in Judaism and Christianity. In Christianity, like in Judaism, forgiveness comes only to those who "truly repent"; this repentance comes about through faith in Christ, and does not involve any specific ritual. (See Justification.) In Judaism, Jews who seek to atone for their sins (Teshuvah) are called to a deep reckoning and soul-searching, of which confession, though of paramount importance, is but one aspect. Judaism draws heavily on the exhortations of the prophets, most notably Isaiah and Jeremiah, that the repentance be an intensely personal experience; any and all associated ritual is but the means of formalizing the deeper, inner dimension of Teshuvah.[10] This theme is brought out with particular force in the ritual of Yom Kippur, the annual Day of Atonement.

According to this interpretation, Shylock is the most morally upright character (of the main characters) in the play. Supporters of this interpretation tend to describe the other main characters in negative terms: Antonio as a repressed homosexual (immoral by the standards of the day); Bassanio as a prodigal who does no work except capitalize on his looks and live off of other people, and who ends up with Portia, who, at the end, realizes that Bassanio only ever wanted her money despite all his charms; and Jessica as an ungrateful daughter who steals her father's possessions and runs away to marry Lorenzo, a proselytizing hypocrite.

Directors such as John Neville who support this interpretation tend to show the '"young love" story in which Jessica escapes her father to marry Lorenzo, ending unhappily, a reading that may be justified by careful reading of the text.

In this reading, though the play is light and funny on the surface, the Christian characters' lives are collapsing because of their immoral behavior and disrespect for duty to God and the law. Meanwhile, Shylock does not deceive, trick, lie, kill, steal, or do anything mischievous. The promise of a pound of flesh upon default of the loan was something Antonio freely agreed to. Still it can hardly be moral for Shylock to demand a pound of flesh from Antonio. Shylock knows this will kill Antonio, but according to this theory his desire for vengeance is not only justified but in a sense moral as well.

Some actors who are trained in early modern drama will, for the above reason, identify the Merchant of Venice as not an anti-Jewish play, but an anti-Christian play. This is not reflected in the history of the production and is a recent phenomenon. This does not necessarily mean that Shakespeare himself was anti-Christian, but rather that he was using the story of Shylock to attack prevailing hypocrisies.

[edit] A Catholic reading

In 2004 Clare Asquith published her analysis of Shakespeare's writing from the perspective of Catholics toiling under the nascent Reformation movement in England, in her book[11]Shadowplay. Asquith maintains that Shakespeare was a recusant Catholic whose sympathies are covertly woven within his works. Queen Elizabeth I was the third monarch to reign over the Church of England's split from Rome (succeeding her Catholic half-sister Queen Mary who had attempted to undo their younger half-brother Edward's consolidation of Henry VIII's original schism). Asquith's thesis posits that the dramatis personae mask actual persons in the politics of England at the end of the 16th century. Portia can be seen to represent Queen Elizabeth I herself, while Shylock represents a patriarch of the Puritan merchant classes who had suffered under Queen Mary's persecutions. The relevance of the legal setting to the plot calls to mind the conviction that Christ's new Law of Love fulfills the Old Covenant, the natural law revealed to Moses (defended by Shylock in the speech quoted above) whereby an eye-for-an-eye is a reasonable measure, superior to the lawlessness of barbarian rape and pillage, but inferior to peaceful reconciliation dispensed with Christ-like mercy.

The question remains, does Portia dispense a Christian portion of Divine mercy? The final act contains many allusions to Catholic rituals for the celebration of solemnities in the three days before Easter, the Triduum, banned in England at the time the play was published, but still celebrated elsewhere in Catholic Europe, certainly in Venice. As Asquith[11] points out

"The opening love-duet between Lorenzo and Jessica in Act V repeats the phrase "in such a night" eight times: exactly the same number that the phrase "this is the night" is repeated in the great Easter hymn, the Exultet. "

Catholics in England continued to be persecuted for more than two centuries before regaining their religious freedoms, albeit with concessions to the civil rights of their Irish brethren, under the second Catholic Relief Act. Antonio is reprieved by Portia's comprehension of the Christian Mystery: Christ the Pascal Lamb shed blood for us all, justice does not require a second blood-shedding.

[edit] Sexuality in the play

[edit] Antonio, Bassanio and homosexuality

Antonio's unexplained depression—"In sooth I know not why I am so sad"—and utter devotion to Bassanio has led some critics to theorize that he is suffering from unrequited love for Bassanio and is depressed because Bassanio is coming to an age where he will marry a woman. In his plays and poetry Shakespeare often depicted strong male bonds of varying homosociality, which has led some critics to infer that Bassanio returns Antonio's affections despite his obligation to marry[citation needed]:

ANTONIO: Commend me to your honorable wife:
Tell her the process of Antonio's end,
Say how I lov'd you, speak me fair in death;
And, when the tale is told, bid her be judge
Whether Bassanio had not once a love.
BASSANIO: But life itself, my wife, and all the world
Are not with me esteemed above thy life;
I would lose all, ay, sacrifice them all
Here to this devil, to deliver you. (IV,i)

In his essay "Brothers and Others", published in The Dyer's Hand, W.H. Auden describes Antonio as "a man whose emotional life, though his conduct may be chaste, is concentrated upon a member of his own sex." Antonio's feelings for Bassanio are likened to a couplet from Shakespeare's Sonnets: "But since she pricked thee out for women's pleasure,/ Mine be thy love, and my love's use their treasure." Antonio, says Auden, embodies the words on Portia's leaden casket: "Who chooseth me, must give and hazard all he hath." Antonio has taken this potentially fatal turn because he despairs, not only over the loss of Bassanio in marriage, but also because Bassanio cannot requite what Antonio feels for him. Antonio's frustrated devotion is a form of idolatry: the right to live is yielded for the sake of the loved one. There is one other such idolator in the play: Shylock himself. "Shylock, however unintentionally, did, in fact, hazard all for the sake of destroying the enemy he hated; and Antonio, however unthinkingly he signed the bond, hazarded all to secure the happiness of the man he loved." Both Antonio and Shylock, agreeing to put Antonio's life at a forfeit, stand outside the normal bounds of society. There was, states Auden, a traditional "association of sodomy with usury" with which Shakespeare was likely familiar. (Auden sees the theme of usury in the play as a comment on human relations in a mercantile society.)

Other interpreters of the play regard Auden's conception of Antonio's sexual desire for Bassanio as questionable. Michael Radford, director of the 2004 film version starring Al Pacino, explained that although the film contains a scene where Antonio and Bassanio actually kiss, the friendship between the two is platonic, in line with the prevailing view of male friendship at the time. Jeremy Irons, in an interview, concurs with the director's view and states that he did not "play Antonio as gay".

[edit] Bassanio, Portia and fidelity

Portia and Bassanio marry, with the promise that he will never give up her ring. The ring is a symbol of marital fidelity. The Elizabethans were obsessed with wifely fidelity, and a whole subgenre of jokes were devoted to the subject.[citation needed] An Elizabethan audience may have seen the significance of Bassanio giving Portia's "ring" back to her as an emblem of his potential for fidelity.

[edit] Adaptations and cultural references

[edit] Film adaptations

The Shakespeare play has inspired several movies.

[edit] Cultural references

Arnold Wesker's play The Merchant tells the same story from Shylock's point of view. In this retelling, Shylock and Antonio are fast friends, and make the bond as a joke against the Christian establishment. Shylock is manipulated into the position of having to enforce it, and is grateful when Portia cuts the knot by showing that the wording is ambiguous and unenforceable.

One of the four short stories comprising Alan Isler's Op Non Cit is also told from Shylock's point of view. In this story, Antonio was a boy of Jewish origin kidnapped at an early age by priests...

[edit] Pastime

  • The device of three caskets with riddles has been used for logic games in works like What is the name of this book? by Raymond Smullyan. The coffers make assertions about the truthfulness of their and the other inscriptions (e.g. the golden casket has the portrait, two of the caskets are lying"), to discover the portrait of Portia, and the reader of the pastime has to find which is telling truth.

[edit] Notes

  1. ^ F. E. Halliday, A Shakespeare Companion 1564–1964, Baltimore, Penguin, 1964; pp. 261, 311–12.
  2. ^ Adler erroneously dates this from 1847 (at which time Kean was already dead); the Cambridge Student Guide to The Merchant of Venice dates Kean's performance to a more likely 1814.
  3. ^ Adler 1999, 341.
  4. ^ Adler 1999, 342–44.
  5. ^ Adler 1999, 344–350
  6. ^ Philipe Burrin, Nazi Anti-Semitism: From Prejudice to Holocaust. The New Press, 2005, ISBN 1-56584-969-8, p. 17.

    It was not until the twelfth century that in northern Europe (England, Germany, and France), a region until then peripheral but at this point expanding fast, a form of Judeophobia developed that was considerably more violent because of a new dimension of imagined behaviors, including accusations that Jews engaged in ritual murder, profanation of the host, and the poisoning of wells. With the preduces of the day against Jews, atheists and non christians in general Jews found it hard to fit in with society. Some say that these attitudes provided the foundations of anti-semitism in the 20th century. "

  7. ^ http://www.jewishvirtuallibrary.org/jsource/vjw/Venice.html
  8. ^ Lecture by James Shapiro: "Shakespeare and the Jews"
  9. ^ The Fictive Jew in the Literature of England 1890-1920 David Mirsky in the Samuel K. Mirsky Memorial Volume.
  10. ^ http://www.crosscurrents.org/blumenthal.htm
  11. ^ a b ASQUITH, Clare, Shakespeare’s Catholic Code.
  12. ^ Chris Hastings. "The Merchant moves from Venice to Vegas", Daily Telegraph, 2005-08-07.

[edit] References

[edit] External links

Wikisource has original text related to this article:
Wikimedia Commons has media related to:
Wikiquote has a collection of quotations related to:
William Shakespeare and his works
General information Biography | Style | Influence | Reputation | Religion | Sexuality | Shakespeare authorship question
Tragedies Antony and Cleopatra | Coriolanus | Hamlet | Julius Caesar | King Lear | Macbeth | Othello | Romeo and Juliet | Timon of Athens | Titus Andronicus | Troilus and Cressida
Comedies All's Well That Ends Well | As You Like It | The Comedy of Errors | Cymbeline | Love's Labour's Lost | Measure for Measure | The Merchant of Venice | The Merry Wives of Windsor | A Midsummer Night's Dream | Much Ado About Nothing | Pericles, Prince of Tyre | The Taming of the Shrew | The Tempest | Twelfth Night | The Two Gentlemen of Verona | The Two Noble Kinsmen | The Winter's Tale
Histories King John | Richard II | Henry IV, Part 1 | Henry IV, Part 2 | Henry V | Henry VI, part 1 | Henry VI, part 2 | Henry VI, part 3 | Richard III | Henry VIII
Poems Sonnets | Venus and Adonis | The Rape of Lucrece | The Passionate Pilgrim | The Phoenix and the Turtle | A Lover's Complaint
Apocrypha and Lost Plays Edward III | Sir Thomas More | Cardenio (lost) | Love's Labour's Won (lost) | The Birth of Merlin | Locrine | The London Prodigal | The Puritan | The Second Maiden's Tragedy | Richard II, Part I: Thomas of Woodstock | Sir John Oldcastle | Thomas Lord Cromwell | A Yorkshire Tragedy | Fair Em | Mucedorus | The Merry Devil of Edmonton | Arden of Faversham | Edmund Ironside | Vortigern and Rowena
Other play information Shakespeare's plays | Shakespeare in performance | Chronology of Shakespeare plays | Oxfordian chronology | Shakespeare on screen | BBC Television Shakespeare | Titles based on Shakespeare | Lists of characters A-K · L-Z | Problem plays | List of historical characters | Ghost characters

Internet

Internet

From Mani Kant

Jump to: navigation, search
Visualization of the various routes through a portion of the Internet.
Visualization of the various routes through a portion of the Internet.

The Internet is a worldwide, publicly accessible series of interconnected computer networks that transmit data by packet switching using the standard Internet Protocol (IP). It is a "network of networks" that consists of millions of smaller domestic, academic, business, and government networks, which together carry various information and services, such as electronic mail, online chat, file transfer, and the interlinked web pages and other resources of the World Wide Web (WWW).

Contents

[hide]

Terminology

The International Network, or more commonly known as the Internet and the World Wide Web are not synonymous. The Internet is a collection of interconnected computer networks, linked by copper wires, fiber-optic cables, wireless connections, etc. In contrast, the Web is a collection of interconnected documents and other resources, linked by hyperlinks and URLs. The World Wide Web is one of the services accessible via the Internet, along with many others including e-mail, file sharing and others described below.

History

Growth

Although the basic applications and guidelines that make the Internet possible had existed for almost a decade, the network did not gain a public face until the 1990s. On August 6, 1991, CERN, which straddles the border between France and Switzerland, publicized the new World Wide Web project. The Web was invented by English scientist Tim Berners-Lee in 1989.

An early popular web browser was ViolaWWW based upon HyperCard. It was eventually replaced in popularity by the Mosaic web browser. In 1993, the National Center for Supercomputing Applications at the University of Illinois released version 1.0 of Mosaic, and by late 1994 there was growing public interest in the previously academic/technical Internet. By 1996 usage of the word "Internet" had become commonplace, and consequently, so had its misuse as a reference to the World Wide Web.

Meanwhile, over the course of the decade, the Internet successfully accommodated the majority of previously existing public computer networks (although some networks, such as FidoNet, have remained separate). During the 1990s, it was estimated that the Internet grew by 100% per year, with a brief period of explosive growth in 1996 and 1997.[1] This growth is often attributed to the lack of central administration, which allows organic growth of the network, as well as the non-proprietary open nature of the Internet protocols, which encourages vendor interoperability and prevents any one company from exerting too much control over the network.[citation needed]

University Students Appreciation and Contributions

New findings in the field of communications during the 1960s, 1970s and 1980s were quickly adopted by universities across the United States.

Examples of early university Internet communities are Cleveland FreeNet, Blacksburg Electronic Village and NSTN in Nova Scotia ( [1] ). Students took up the opportunity of free communications and saw this new phenomenon as a tool of liberation. Personal computers and the Internet would free them from corporations and governments (Nelson, Jennings, Stallman).

Graduate students played a huge part in the creation of ARPANET. In the 1960’s, the network working group, which did most of the design for ARPANET’s protocols was composed mainly of graduate students.

Today's Internet

The Opera Community rack. From the top, user file storage (content of files.myopera.com), "bigma" (the master MySQL database server), and two IBM blade centers containing multi-purpose machines (Apache front ends, Apache back ends, slave MySQL database servers, load balancers, file servers, cache servers and sync masters).
The Opera Community rack. From the top, user file storage (content of files.myopera.com), "bigma" (the master MySQL database server), and two IBM blade centers containing multi-purpose machines (Apache front ends, Apache back ends, slave MySQL database servers, load balancers, file servers, cache servers and sync masters).

Aside from the complex physical connections that make up its infrastructure, the Internet is facilitated by bi- or multi-lateral commercial contracts (e.g., peering agreements), and by technical specifications or protocols that describe how to exchange data over the network. Indeed, the Internet is essentially defined by its interconnections and routing policies.

As of September 30, 2007, 1.244 billion people use the Internet according to Internet World Stats. Writing in the Harvard International Review, philosopher N.J.Slabbert, a writer on policy issues for the Washington DC-based Urban Land Institute, has asserted that the Internet is fast becoming a basic feature of global civilization, so that what has traditionally been called "civil society" is now becoming identical with information technology society as defined by Internet use. Some suggest that as low as 2% of the World's population regularly accesses the internet.[2] "http://www.edchange.org/multicultural/quiz/quiz_key.pdf"

Internet protocols

For more details on this topic, see Internet Protocols.

In this context, there are three layers of protocols:

  • At the lower level (OSI layer 3) is IP (Internet Protocol), which defines the datagrams or packets that carry blocks of data from one node to another. The vast majority of today's Internet uses version four of the IP protocol (i.e. IPv4), and although IPv6 is standardized, it exists only as "islands" of connectivity, and there are many ISPs without any IPv6 connectivity. [2]. ICMP (Internet Control Message Protocol) also exists at this level. ICMP is connectionless; it is used for control, signaling, and error reporting purposes.
  • TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) exist at the next layer up (OSI layer 4); these are the protocols by which data is transmitted. TCP makes a virtual 'connection', which gives some level of guarantee of reliability. UDP is a best-effort, connectionless transport, in which data packets that are lost in transit will not be re-sent.
  • The application protocols sit on top of TCP and UDP and occupy layers 5, 6, and 7 of the OSI model. These define the specific messages and data formats sent and understood by the applications running at each end of the communication. Examples of these protocols are HTTP, FTP, and SMTP.

Internet structure

There have been many analyses of the Internet and its structure. For example, it has been determined that the Internet IP routing structure and hypertext links of the World Wide Web are examples of scale-free networks.

Similar to the way the commercial Internet providers connect via Internet exchange points, research networks tend to interconnect into large subnetworks such as:

These in turn are built around relatively smaller networks. See also the list of academic computer network organizations

In network diagrams, the Internet is often represented by a cloud symbol, into and out of which network communications can pass.

ICANN

ICANN headquarters in Marina Del Rey, California, United States
ICANN headquarters in Marina Del Rey, California, United States
For more details on this topic, see ICANN.

The Internet Corporation for Assigned Names and Numbers (ICANN) is the authority that coordinates the assignment of unique identifiers on the Internet, including domain names, Internet Protocol (IP) addresses, and protocol port and parameter numbers. A globally unified namespace (i.e., a system of names in which there is at most one holder for each possible name) is essential for the Internet to function. ICANN is headquartered in Marina del Rey, California, but is overseen by an international board of directors drawn from across the Internet technical, business, academic, and non-commercial communities. The US government continues to have the primary role in approving changes to the root zone file that lies at the heart of the domain name system. Because the Internet is a distributed network comprising many voluntarily interconnected networks, the Internet, as such, has no governing body. ICANN's role in coordinating the assignment of unique identifiers distinguishes it as perhaps the only central coordinating body on the global Internet, but the scope of its authority extends only to the Internet's systems of domain names, IP addresses, protocol ports and parameter numbers.

On November 16, 2005, the World Summit on the Information Society, held in Tunis, established the Internet Governance Forum (IGF) to discuss Internet-related issues.

Language

For more details on this topic, see English on the Internet.
Further information: Unicode

The prevalent language for communication on the Internet is English. This may be a result of the Internet's origins, as well as English's role as the lingua franca. It may also be related to the poor capability of early computers, largely originating in the United States, to handle characters other than those in the English variant of the Latin alphabet.

After English (31% of Web visitors) the most-requested languages on the World Wide Web are Chinese 16%, Spanish 9%, Japanese 7%, German 5% and French 5% (from Internet World Stats, updated June 30, 2007).

By continent, 37% of the world's Internet users are based in Asia, 27% in Europe, 19% in North America, and 9% in Latin America and the Carribean ([3] updated September 30, 2007).

The Internet's technologies have developed enough in recent years, especially in the use of Unicode, that good facilities are available for development and communication in most widely used languages. However, some glitches such as mojibake (incorrect display of foreign language characters, also known as kryakozyabry) still remain.

Internet and the workplace

The Internet is allowing greater flexibility in working hours and location, especially with the spread of unmetered high-speed connections and Web applications.

The Internet viewed on mobile devices

The Internet can now be accessed virtually anywhere by numerous means. Mobile phones, datacards, handheld game consoles and cellular routers allow users to connect to the Internet from anywhere there is a cellular network supporting that device's technology.

Common uses of the Internet

E-mail

For more details on this topic, see E-mail.

The concept of sending electronic text messages between parties in a way analogous to mailing letters or memos predates the creation of the Internet. Even today it can be important to distinguish between Internet and internal e-mail systems. Internet e-mail may travel and be stored unencrypted on many other networks and machines out of both the sender's and the recipient's control. During this time it is quite possible for the content to be read and even tampered with by third parties, if anyone considers it important enough. Purely internal or intranet mail systems, where the information never leaves the corporate or organization's network, are much more secure, although in any organization there will be IT and other personnel whose job may involve monitoring, and occasionally accessing, the email of other employees not addressed to them.

The World Wide Web

For more details on this topic, see World Wide Web.
Graphic representation of less than 0.0001% of the WWW, representing some of the hyperlinks
Graphic representation of less than 0.0001% of the WWW, representing some of the hyperlinks

Many people use the terms Internet and World Wide Web (or just the Web) interchangeably, but, as discussed above, the two terms are not synonymous.

The World Wide Web is a huge set of interlinked documents, images and other resources, linked by hyperlinks and URLs. These hyperlinks and URLs allow the web-servers and other machines that store originals, and cached copies, of these resources to deliver them as required using HTTP (Hypertext Transfer Protocol). HTTP is only one of the communication protocols used on the Internet.

Web services also use HTTP to allow software systems to communicate in order to share and exchange business logic and data.

Software products that can access the resources of the Web are correctly termed user agents. In normal use, web browsers, such as Internet Explorer and Firefox access web pages and allow users to navigate from one to another via hyperlinks. Web documents may contain almost any combination of computer data including photographs, graphics, sounds, text, video, multimedia and interactive content including games, office applications and scientific demonstrations.

Through keyword-driven Internet research using search engines, like Yahoo!, and Google, millions of people worldwide have easy, instant access to a vast and diverse amount of online information. Compared to encyclopedias and traditional libraries, the World Wide Web has enabled a sudden and extreme decentralization of information and data.

It is also easier, using the Web, than ever before for individuals and organisations to publish ideas and information to an extremely large audience. Anyone can find ways to publish a web page or build a website for very little initial cost. Publishing and maintaining large, professional websites full of attractive, diverse and up-to-date information is still a difficult and expensive proposition, however.

Many individuals and some companies and groups use "web logs" or blogs, which are largely used as easily-updatable online diaries. Some commercial organizations encourage staff to fill them with advice on their areas of specialization in the hope that visitors will be impressed by the expert knowledge and free information, and be attracted to the corporation as a result. One example of this practice is Microsoft, whose product developers publish their personal blogs in order to pique the public's interest in their work.

Collections of personal web pages published by large service providers remain popular, and have become increasingly sophisticated. Whereas operations such as Angelfire and GeoCities have existed since the early days of the Web, newer offerings from, for example, Facebook and MySpace currently have large followings. These operations often brand themselves as social network services rather than simply as web page hosts.

Advertising on popular web pages can be lucrative, and e-commerce or the sale of products and services directly via the Web continues to grow.

In the early days, web pages were usually created as sets of complete and isolated HTML text files stored on a web server. More recently, web sites are more often created using content management system (CMS) or wiki software with, initially, very little content. Users of these systems, who may be paid staff, members of a club or other organisation or members of the public, fill the underlying databases with content using editing pages designed for that purpose, while casual visitors view and read this content in its final HTML form. There may or may not be editorial, approval and security systems built into the process of taking newly entered content and making it available to the target visitors.

Remote access

Further information: Remote access

The Internet allows computer users to connect to other computers and information stores easily, wherever they may be across the world. They may do this with or without the use of security, authentication and encryption technologies, depending on the requirements.

This is encouraging new ways of working from home, collaboration and information sharing in many industries. An accountant sitting at home can audit the books of a company based in another country, on a server situated in a third country that is remotely maintained by IT specialists in a fourth. These accounts could have been created by home-working book-keepers, in other remote locations, based on information e-mailed to them from offices all over the world. Some of these things were possible before the widespread use of the Internet, but the cost of private, leased lines would have made many of them infeasible in practice.

An office worker away from his desk, perhaps the other side of the world on a business trip or a holiday, can open a remote desktop session into their normal office PC using a secure Virtual Private Network (VPN) connection via the Internet. This gives the worker complete access to all of their normal files and data, including e-mail and other applications, while away from the office.

This concept is also referred to by some network security people as the Virtual Private Nightmare, because it extends the secure perimeter of a corporate network into its employees' homes; this has been the source of some notable security breaches, but also provides security for the workers.

Collaboration

See also: Collaborative software

The low cost and nearly instantaneous sharing of ideas, knowledge, and skills has made collaborative work dramatically easier. Not only can a group cheaply communicate and test, but the wide reach of the Internet allows such groups to easily form in the first place, even among niche interests. An example of this is the free software movement in software development which produced GNU and Linux from scratch and has taken over development of Mozilla and OpenOffice.org (formerly known as Netscape Communicator and StarOffice). Films such as Zeitgeist, Loose Change and Endgame have had extensive coverage on the internet, while being virtually ignored in the mainstream media.

Internet 'chat', whether in the form of IRC 'chat rooms' or channels, or via instant messaging systems allow colleagues to stay in touch in a very convenient way when working at their computers during the day. Messages can be sent and viewed even more quickly and conveniently than via e-mail. Extension to these systems may allow files to be exchanged, 'whiteboard' drawings to be shared as well as voice and video contact between team members.

Version control systems allow collaborating teams to work on shared sets of documents without either accidentally overwriting each other's work or having members wait until they get 'sent' documents to be able to add their thoughts and changes.

File sharing

For more details on this topic, see File sharing.

A computer file can be e-mailed to customers, colleagues and friends as an attachment. It can be uploaded to a Web site or FTP server for easy download by others. It can be put into a "shared location" or onto a file server for instant use by colleagues. The load of bulk downloads to many users can be eased by the use of "mirror" servers or peer-to-peer networks.

In any of these cases, access to the file may be controlled by user authentication; the transit of the file over the Internet may be obscured by encryption and money may change hands before or after access to the file is given. The price can be paid by the remote charging of funds from, for example a credit card whose details are also passed—hopefully fully encrypted—across the Internet. The origin and authenticity of the file received may be checked by digital signatures or by MD5 or other message digests.

These simple features of the Internet, over a world-wide basis, are changing the basis for the production, sale, and distribution of anything that can be reduced to a computer file for transmission. This includes all manner of print publications, software products, news, music, film, video, photography, graphics and the other arts. This in turn has caused seismic shifts in each of the existing industries that previously controlled the production and distribution of these products.

Internet collaboration technology enables business and project teams to share documents, calendars and other information. Such collaboration occurs in a wide variety of areas including scientific research, software development, conference planning, political activism and creative writing.

Streaming media

Many existing radio and television broadcasters provide Internet 'feeds' of their live audio and video streams (for example, the BBC). They may also allow time-shift viewing or listening such as Preview, Classic Clips and Listen Again features. These providers have been joined by a range of pure Internet 'broadcasters' who never had on-air licenses. This means that an Internet-connected device, such as a computer or something more specific, can be used to access on-line media in much the same way as was previously possible only with a television or radio receiver. The range of material is much wider, from pornography to highly specialized technical Web-casts. Podcasting is a variation on this theme, where—usually audio—material is first downloaded in full and then may be played back on a computer or shifted to a digital audio player to be listened to on the move. These techniques using simple equipment allow anybody, with little censorship or licensing control, to broadcast audio-visual material on a worldwide basis.

Webcams can be seen as an even lower-budget extension of this phenomenon. While some webcams can give full frame rate video, the picture is usually either small or updates slowly. Internet users can watch animals around an African waterhole, ships in the Panama Canal, the traffic at a local roundabout or their own premises, live and in real time. Video chat rooms, video conferencing, and remote controllable webcams are also popular. Many uses can be found for personal webcams in and around the home, with and without two-way sound.

YouTube, sometimes described as an internet phenomenon because of the vast amount of users and how rapidly the sites popularity has grown. Youtube was founded in February 15, 2005. It is now the leading website for free streaming video. It uses a flash based web player which streams video files in the format FLV. Users are able to watch videos without signing up however if users do sign up they are able to upload an unlimited amount of videos and they are given their own personal profile. It is currently estimated that there are 64,000,000 videos on Youtube and it is also currently estimated that 825,000 new videos are uploaded every day.

Voice telephony (VoIP)

For more details on this topic, see VoIP.

VoIP stands for Voice over IP, where IP refers to the Internet Protocol that underlies all Internet communication. This phenomenon began as an optional two-way voice extension to some of the Instant Messaging systems that took off around the year 2000. In recent years many VoIP systems have become as easy to use and as convenient as a normal telephone. The benefit is that, as the Internet carries the actual voice traffic, VoIP can be free or cost much less than a normal telephone call, especially over long distances and especially for those with always-on Internet connections such as cable or ADSL.

Thus VoIP is maturing into a viable alternative to traditional telephones. Interoperability between different providers has improved and the ability to call or receive a call from a traditional telephone is available. Simple inexpensive VoIP modems are now available that eliminate the need for a PC.

Voice quality can still vary from call to call but is often equal to and can even exceed that of traditional calls.

Remaining problems for VoIP include emergency telephone number dialling and reliability. Currently a few VoIP providers provide an emergency service but it is not universally available. Traditional phones are line powered and operate during a power failure, VoIP does not do so without a backup power source for the electronics.

Most VoIP providers offer unlimited national calling but the direction in VoIP is clearly toward global coverage with unlimited minutes for a low monthly fee.

VoIP has also become increasingly popular within the gaming world, as a form of communication between players. Popular gaming VoIP clients include Ventrilo and Teamspeak, and there are others available also. The PlayStation 3 and Xbox 360 also offer VoIP chat features.

Censorship

For more details on this topic, see Internet censorship.

Some governments, such as those of Cuba, Iran, North Korea, Myanmar, the People's Republic of China, and Saudi Arabia, restrict what people in their countries can access on the Internet, especially political and religious content. This is accomplished through software that filters domains and content so that they may not be easily accessed or obtained without elaborate circumvention.

In Norway, Denmark, Finland and Sweden, major Internet service providers have voluntarily (possibly to avoid such an arrangement being turned into law) agreed to restrict access to sites listed by police. While this list of forbidden URLs is only supposed to contain addresses of known child pornography sites, the content of the list is secret.[citation needed]

Many countries, including the United States, have enacted laws making the possession or distribution of certain material, such as child pornography, illegal, but do not use filtering software.

There are many free and commercially available software programs with which a user can choose to block offensive Web sites on individual computers or networks, such as to limit a child's access to pornography or violence. See Content-control software.

Internet access

For more details on this topic, see Internet access.
Wikibooks
Wikibooks has a book on the topic of

Common methods of home access include dial-up, landline broadband (over coaxial cable, fiber optic or copper wires), Wi-Fi, satellite and 3G technology cell phones.

Public places to use the Internet include libraries and Internet cafes, where computers with Internet connections are available. There are also Internet access points in many public places such as airport halls and coffee shops, in some cases just for brief use while standing. Various terms are used, such as "public Internet kiosk", "public access terminal", and "Web payphone". Many hotels now also have public terminals, though these are usually fee-based. These terminals are widely accessed for various usage like ticket booking, bank deposit, online payment etc. Wi-Fi provides wireless access to computer networks, and therefore can do so to the Internet itself. Hotspots providing such access include Wi-Fi-cafes, where a would-be user needs to bring their own wireless-enabled devices such as a laptop or PDA. These services may be free to all, free to customers only, or fee-based. A hotspot need not be limited to a confined location. The whole campus or park, or even the entire city can be enabled. Grassroots efforts have led to wireless community networks. Commercial WiFi services covering large city areas are in place in London, Vienna, Toronto, San Francisco, Philadelphia, Chicago and Pittsburgh. The Internet can then be accessed from such places as a park bench.[3]

Apart from Wi-Fi, there have been experiments with proprietary mobile wireless networks like Ricochet, various high-speed data services over cellular phone networks, and fixed wireless services.

High-end mobile phones such as smartphones generally come with Internet access through the phone network. Web browsers such as Opera are available on these advanced handsets, which can also run a wide variety of other Internet software. More mobile phones have Internet access than PCs, though this is not as widely used. An Internet access provider and protocol matrix differentiates the methods used to get online.

Leisure

The Internet has been a major source of leisure since before the World Wide Web, with entertaining social experiments such as MUDs and MOOs being conducted on university servers, and humor-related Usenet groups receiving much of the main traffic. Today, many Internet forums have sections devoted to games and funny videos; short cartoons in the form of Flash movies are also popular. Over 6 million people use blogs or message boards as a means of communication and for the sharing of ideas.

The pornography and gambling industries have both taken full advantage of the World Wide Web, and often provide a significant source of advertising revenue for other Web sites. Although many governments have attempted to put restrictions on both industries' use of the Internet, this has generally failed to stop their widespread popularity.

One main area of leisure on the Internet is multiplayer gaming. This form of leisure creates communities, bringing people of all ages and origins to enjoy the fast-paced world of multiplayer games. These range from MMORPG to first-person shooters, from role-playing games to online gambling. This has revolutionized the way many people interact and spend their free time on the Internet.

While online gaming has been around since the 1970s, modern modes of online gaming began with services such as GameSpy and MPlayer, which players of games would typically subscribe to. Non-subscribers were limited to certain types of gameplay or certain games.

Many use the Internet to access and download music, movies and other works for their enjoyment and relaxation. As discussed above, there are paid and unpaid sources for all of these, using centralized servers and distributed peer-to-peer technologies. Discretion is needed as some of these sources take more care over the original artists' rights and over copyright laws than others.

Many use the World Wide Web to access news, weather and sports reports, to plan and book holidays and to find out more about their random ideas and casual interests.

People use chat, messaging and email to make and stay in touch with friends worldwide, sometimes in the same way as some previously had pen pals. Social networking Web sites like Myspace and Facebook many others like them also put and keep people in contact for their enjoyment.

The Internet has seen a growing number of Internet operating systems, where users can access their files, folders, and settings via the Internet. An example of an opensource webOS is Eyeos.

Cyberslacking has become a serious drain on corporate resources; the average UK employee spends 57 minutes a day surfing the Web at work, according to a study by Peninsula Business Services [4].

Complex architecture

Many computer scientists see the Internet as a "prime example of a large-scale, highly engineered, yet highly complex system".[4] The Internet is extremely heterogeneous. (For instance, data transfer rates and physical characteristics of connections vary widely.) The Internet exhibits "emergent phenomena" that depend on its large-scale organization. For example, data transfer rates exhibit temporal self-similarity. Further adding to the complexity of the Internet is the ability of more than one computer to use the Internet through only one node, thus creating the possibility for a very deep and hierarchal based sub-network that can theoretically be extended infinitely (disregarding the programmatic limitations of the IPv4 protocol). However, since principles of this architecture date back to the 1960s, it might not be a solution best suited to modern needs, and thus the possibility of developing alternative structures is currently being looked into.[5]

According to a June 2007 article in Discover Magazine, the combined weight of all the electrons moved within the internet in a day is 0.2 millionths of an ounce.[6] Others have estimated this at nearer 2 ounces (50 grams).[7]

Marketing

The Internet has also become a large market for companies; some of the biggest companies today have grown by taking advantage of the efficient nature of low-cost advertising and commerce through the Internet, also known as e-commerce. It is the fastest way to spread information to a vast number of people simultaneously. The Internet has also subsequently revolutionized shopping—for example; a person can order a CD online and receive it in the mail within a couple of days, or download it directly in some cases. The Internet has also greatly facilitated personalized marketing which allows a company to market a product to a specific person or a specific group of people more so than any other advertising medium.

Examples of personalized marketing include online communities such as MySpace, Friendster, Orkut, Facebook and others which thousands of Internet users join to advertise themselves and make friends online. Many of these users are young teens and adolescents ranging from 13 to 25 years old. In turn, when they advertise themselves they advertise interests and hobbies, which online marketing companies can use as information as to what those users will purchase online, and advertise their own companies' products to those users.

Further information: Disintermediation#Impact of Internet-related disintermediation upon various industries and Travel agency#The Internet threat

The name Internet

For more details on this topic, see Internet capitalization conventions.
Look up Internet, internet in Wiktionary, the free dictionary.

Internet is traditionally written with a capital first letter, as it is a proper noun. The Internet Society, the Internet Engineering Task Force, the Internet Corporation for Assigned Names and Numbers, the World Wide Web Consortium, and several other Internet-related organizations use this convention in their publications.

Many newspapers, newswires, periodicals, and technical journals capitalize the term (Internet). Examples include The New York Times, the Associated Press, Time, The Times of India, Hindustan Times, and Communications of the ACM.

Others assert that the first letter should be in lower case (internet), and that the specific article “the” is sufficient to distinguish “the internet” from other internets. A significant number of publications use this form, including The Economist, the Canadian Broadcasting Corporation, the Financial Times, The Guardian, The Times, and The Sydney Morning Herald. As of 2005, many publications using internet appear to be located outside of North America—although one U.S. news source, Wired News, has adopted the lower-case spelling.

Historically, Internet and internet have had different meanings, with internet meaning “an interconnected set of distinct networks,” and Internet referring to the world-wide, publicly-available IP internet. Under this distinction, "the Internet" is the familiar network via which websites exist, however "an internet" can exist between any two remote locations.[8] Any group of distinct networks connected together is an internet; each of these networks may or may not be part of the Internet. The distinction was evident in many RFCs, books, and articles from the 1980s and early 1990s (some of which, such as RFC 1918, refer to "internets" in the plural), but has recently fallen into disuse.[citation needed] Instead, the term intranet is generally used for private networks, whether they are connected to the Internet or not. See also: extranet.

Some people use the lower-case term as a medium (like radio or newspaper, e.g. I've found it on the internet), and first letter capitalized as the global network.

See also

Find more about Internet on Wikipedia's sister projects:
Dictionary definitions
Textbooks
Quotations
Source texts
Images and media
News stories
Learning resources

Major aspects and issues

Functions

Underlying infrastructure

Regulatory bodies

Notes

  1. ^ Coffman, K. G; Odlyzko, A. M. (1998-10-02). "The size and growth rate of the Internet". AT&T Labs. Retrieved on 2007-05-21.
  2. ^ Slabbert,N.J. The Technologies of Peace, Harvard International Review, June 2006.
  3. ^ "Toronto Hydro to Install Wireless Network in Downtown Toronto". Bloomberg.com. Retrieved 19-Mar-2006.
  4. ^ Walter Willinger, Ramesh Govindan, Sugih Jamin, Vern Paxson, and Scott Shenker (2002). Scaling phenomena in the Internet. In Proceedings of the National Academy of Sciences, 99, suppl. 1, 2573–2580.
  5. ^ "Internet Makeover? Some argue it's time". The Seattle Times, April 16, 2007.
  6. ^ "How Much Does The Internet Weigh?". Discover Magazine, June 2007.
  7. ^ How Much Does The Internet Weigh? - The Unbearable Lightness Of Fact Checking
  8. ^ What is the Internet?

References

External links