Internet history header opt

Internet Evolution

  • ARPANet is Organized

    ARPANet is Organized
    Created to treat technology and military deficiencies. Enabled computer communication through the US. Back bone of the internet, core. Starts with a "four-node network" to gradually include universities and government institutions.
  • The first ever email is sent

    The first ever email is sent
    This email was sent from MIT from a super computer called the IBM-7094
  • Packet Computing for inter-connection is born

    Packet Computing for inter-connection is born
    Created for computer inter-connection by Len Lleinrock.
  • First Public demo of ARPANet by DOD and emails get popular demand

    First Public demo of ARPANet by DOD and emails get popular demand
    Presented at the ICC Conference featuring terminals that can access computers cross country. First internet app, Email integrated to the FTP.
  • Transmission Control Protocol/Internet Protocol Development

    Transmission Control Protocol/Internet Protocol Development
    TCP/IP development provides standards for error-free data transmission (TCP) and identifying networked destinations (IP). ARPANet gets popularized and divided from the military. Military goes to Milnet.
  • ARPANet switched to TCP/IP - NSF creates NSFnet

    ARPANet switched to TCP/IP - NSF creates NSFnet
    It establishes the fundamental standards that the internet still has up to date. Domain Name System is created to automate the managing of names and addresses on the network. NSFnet substitutes ARPAnet.
  • DNS creation

    DNS creation
    Internet hosts go above 10k, Paul Mockapetris creates DNS the online registry for computer domain.
  • Appearance of first computer worm

    Appearance of first computer worm
    This worm shows the vulnerability of the internet. It infects 10 percent of connected machines, slowing them down. Cybersecurity is now a global concern. CRT is created.
  • Internet grows out of control - America Online (AOL), CompuServe, and Prodigy emerge

    Internet grows out of control  - America Online (AOL), CompuServe, and Prodigy emerge
    The "Big Three" online service providers. The introduction to dial-up messaging, email, and web portals. There is 50 million networks, 4 million systems, 70 million users and the internet goes commercial.
  • ARPA no longer exists

    ARPA no longer exists
    ARPANet gets disconnected it get replaced by the WWW
  • World Wide Web prototype

    World Wide Web prototype
    Tim Berners develops the WWW prototype, an app layer that runs on top of the internet based on hypertext. It results in a system for accessing resources online using (web address URLs), the HyperText Transfer Protocol (HTTP), and HyperText Markup Language (HTML).
  • World Wide Web appears in the public domain

    World Wide Web appears in the public domain
    CERN officially publishes the WWW. It's the first web browser to display images next to text, letting users easily navigate between web pages.
  • Mosaic is created to later give birth to Nestcape

    Mosaic is created to later give birth to Nestcape
    Marc Andeersen creates Mosaic a program that lets you navigate internet easily. Later it transforms to Netscape the first internet navigator. Internic is also created, first internet administrator center.
  • Consumer web takes shape

    Consumer web takes shape
    Amazon - "first and biggest online store" (specializes in books at that time), Yahoo, and eBay - "first online bid market" launch. Microsoft introduces Internet Explorer, this creates the first browser war. Craigslist begins as an email distribution list.
  • JavaScript development

    JavaScript development
    Netscape develops JavaScript, a programming language that runs in browsers to display dynamic content, making interactive web pages possible.
  • Blogs are created

    Blogs are created
    First Blogs are created and published.
  • Communications Decency Act

    Communications Decency Act
    The US Congress passes the Act to regulate indecency and obscenity online. The act includes Section 230, which protects “interactive computer services” from being treated as the publisher of third-party content and grants immunity from civil liability if the services make a good faith effort to restrict prohibited material. No one can control the network.
  • Beijing implements various restrictive laws and technologies

    Beijing implements various restrictive laws and technologies
    This is to impose digital censorship within its borders, establishing a model for other national governments to claim sovereignty over the internet and attempt to limit the flow of information.
  • Mozilla project and Google foundation

    Mozilla project and Google foundation
    Netscape releases the source code of its browser suite, creating the Mozilla. This inspires open source software creation. Later that year, Google is founded, innovating the business of search and clicks.
  • Napster and Bittorrent are born

    Napster and Bittorrent are born
    Napster (1999)- the music giant is created and bit-torrent (2001) - the online powerhouse get published.
  • Advanced Encryption Standard (AES) is published

    Advanced Encryption Standard (AES) is published
    Symmetric key encryption algorithm that was created by Belgian cryptographers Vincent Rijmen and Joan Daemen. It replaces the Data Encryption Standard (DES), which was adopted in 1977 but had become vulnerable to attacks.
  • Wikipedia is created

    Wikipedia is created
    The biggest online encyclopedia gets created.
  • Friendster emerges

    Friendster emerges
    The first ever social media app in the world is created.
  • Facebook is created

    Facebook is created
    A new era of social media is created on the internet.
  • YouTube

    YouTube
    The biggest online video giant is first crafted. This is the biggest video and media content app in the internet to date.
  • Megaupload is created

    Megaupload is created
    The biggest company in archives and media transfer, download, upload is created. Their main office is in HK. Internet is now viewed as a threat by TV and Music industries because of the scope and content.
  • Amazon Web Services markets IT Infrastructure and Cloud computing emerges.

    Amazon Web Services markets IT Infrastructure and Cloud computing emerges.
    Cloud computing allows for easy data storage, access, and processing, supporting the mobile web revolution under way.
  • Google buys YouTube and Twitter is launched

    Google buys YouTube and Twitter is launched
    Data centralization brings security and privacy challenges also. YouTube was about a year old when it was bought by Google. Twitter launched means a whole new competition for social media acceptance and features implementation.
  • Twitter is funded

    Twitter is funded
    The biggest micro-blogger platform emerges.
  • Apple introduces the iPhone

    Apple introduces the iPhone
    This phone quickly evolves into a dominant platform of the mobile web. The transition to mobile creates more access, more apps, and more data; as well as increased privacy and surveillance issues.
  • Amazon creates Kindle

    Amazon creates Kindle
    Kindle is the biggest book manager ever created on that time. It is part of Amazon's retail efforts.
  • Millons of webpages co-exist

    Millons of webpages co-exist
    Up to this date there's 63 million web pages published in the WWW.
  • Net Neutrality Principles

    Net Neutrality Principles
    The FCC asserts these principles of an open internet, holding that internet service providers (ISPs) must offer equal access to all internet communications without favoring particular sites or services.
  • Internet Population Growth

    Internet Population Growth
    There are 1,966,000,000 active users on the internet on this date.
  • Facebook Growth Surges

    Facebook Growth Surges
    Facebook counts with 600 million accounts up to this date. It is now a social media giant.
  • IPv6 Introduced

    IPv6 Introduced
    IPv6 is officially on trials for protocol exchange. IPv6, the most current version of Internet Protocol, supports 340 undecillion unique IP addresses.
  • CIA subcontractor Edward Snowden leaks classified files

    CIA subcontractor Edward Snowden leaks classified files
    These files show how the NSA is monitoring the communications of US citizens with help from telecom firms, as well as surveilling online communications by tapping into the servers of internet companies like Google, Facebook, Microsoft, and Yahoo. The news also reveals the sharing of intercepted data across a global surveillance system.
  • On the NOW!

    On the NOW!
    Building on the growth of blockchain protocols, advanced networks and new media growth have the potential to foster new, user-oriented service models that can replace surveillance capitalism and create a more secure internet that redirects values and control to the public/ individuals.