Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Sars to give every taxpayer a digital identity in sweeping tech overhaul

      Sars to give every taxpayer a digital identity in sweeping tech overhaul

      1 April 2026
      R12.1-billion wasted as government IT projects collapse - Sita

      R12.1-billion wasted as government IT projects collapse

      1 April 2026
      DStv 4K streaming launch is not imminent

      R99 DStv deal to keep Showmax subscribers from bolting

      1 April 2026
      TCS | MTN's Divysh Joshi on the strategy behind Pi - Divyesh Joshi

      TCS | MTN’s Divyesh Joshi on the strategy behind Pi

      1 April 2026
      The biggest untapped EV market on Earth is hiding in plain sight

      The biggest untapped EV market on Earth is hiding in plain sight

      1 April 2026
    • World

      Apple plans to open Siri to rival AI services

      27 March 2026
      It's official: ads are coming to ChatGPT

      It’s official: ads are coming to ChatGPT

      23 March 2026
      Mystery Chinese AI model revealed to be Xiaomi's

      Mystery Chinese AI model revealed to be Xiaomi’s

      19 March 2026
      A mystery AI model has developers buzzing

      A mystery AI model has developers buzzing

      18 March 2026
      Samsung's trifold gamble ends in retreat

      Samsung’s trifold gamble ends in retreat

      17 March 2026
    • In-depth
      The R18-billion tech giant hiding in plain sight - Jens Montanana

      The R16-billion tech giant hiding in plain sight

      26 March 2026
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
    • TCS
      Anoosh Rooplal

      TCS | Anoosh Rooplal on the Post Office’s last stand

      27 March 2026
      Meet the CIO | HealthBridge CTO Anton Fatti on the future of digital health

      Meet the CIO | Healthbridge CTO Anton Fatti on the future of digital health

      23 March 2026
      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses - Clare Loveridge and Jason Oehley

      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses

      19 March 2026
      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience - Theo van Zyl

      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience

      13 March 2026
      TCS+ | Flipping the narrative on AI in the Global South - Josefin Rosén

      TCS+ | Flipping the narrative on AI in the Global South

      13 March 2026
    • Opinion
      The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

      The conflict of interest at the heart of PayShap’s slow adoption

      26 March 2026
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • BBD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • Kaspersky
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Telviva
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » In-depth » 5 milestones that created the Internet

    5 milestones that created the Internet

    By The Conversation26 October 2019
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Fifty years ago, a University of California Los Angeles computer science professor and his student sent the first message over the predecessor to the Internet, a network called Arpanet.

    On 29 October 1969, Leonard Kleinrock and Charley Kline sent Stanford University researcher Bill Duval a two-letter message: “lo.” The intended message, the full word “login”, was truncated by a computer crash.

    Much more traffic than that travels through the Internet these days, with billions of e-mails sent and searches conducted daily. As a scholar of how the Internet is governed, I know that today’s vast communications web is a result of governments and regulators making choices that collectively built the Internet as it is today.

    Here are five key moments in this journey.

    1978: Encryption failure

    Early Internet pioneers, in some ways, were remarkably farsighted. In 1973, a group of high school students reportedly gained access to Arpanet, which was supposed to be a closed network managed by the Pentagon.
    Computer scientists Vinton Cerf and Robert Kahn suggested building encryption into the Internet’s core protocols, which would have made it far more difficult for hackers to compromise the system.

    But the US intelligence community objected, though officials didn’t publicly say why. The only reason their intervention is public is because Cerf hinted at it in a 1983 paper he co-authored.

    As a result, basically all of today’s Internet users have to handle complex passwords and multi-factor authentication systems to ensure secure communications. People with more advanced security needs often use virtual private networks or specialised privacy software like Tor to encrypt their online activity.

    However, computers may not have had enough processing power to effectively encrypt Internet communications. That could have slowed the network, making it less attractive to users — delaying, or even preventing, wider use by researchers and the public.

    Vinton Cerf and Robert Kahn with President George W Bush at the ceremony where Cerf and Kahn were given the Presidential Medal of Freedom for their contributions to developing the Internet. Paul Morse/White House/Wikimedia Commons

    1983: ‘The Internet’ is born

    For the Internet to really be a global entity, all kinds of different computers needed to speak the same language to be able to communicate with each other — directly, if possible, rather than slowing things down by using translators.

    Hundreds of scientists from various governments collaborated to devise what they called the Open Systems Interconnection standard. It was a complex method that critics considered inefficient and difficult to scale across existing networks.

    Cerf and Kahn, however, proposed another way, called Transmission Control Protocol/Internet Protocol. TCP/IP worked more like the regular mail — wrapping up messages in packages and putting the address on the outside. All the computers on the network had to do was pass the message to its destination, where the receiving computer would figure out what to do with the information. It was free for anyone to copy and use on their own computers.

    TCP/IP — given that it both worked and was free — enabled the rapid, global scaling of the Internet. A variety of governments, including the US, eventually came out in support of OSI but too late to make a difference. TCP/IP made the Internet cheaper, more innovative and less tied to official government standards.

    1996: Online speech regulated

    By 1996, the Internet boasted more than 73 000 servers, and 22% of surveyed Americans were going online. What they found there, though, worried some members of congress and their constituents — particularly the rapidly growing amount of pornography.

    In response, congress passed the Communications Decency Act, which sought to regulate indecency and obscenity in cyberspace.

    The supreme court struck down portions of the law on free-speech grounds the next year, but it left in place Section 230, which stated: “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.”

    Those 26 words, as various observers have noted, released Internet service providers and Web-hosting companies from legal responsibility for information their customers posted or shared online. This single sentence provided legal security that allowed the US technology industry to flourish. That protection let companies feel comfortable creating a consumer-focused Internet, filled with grassroots media outlets, bloggers, customer reviews and user-generated content.

    Critics note that section 230 also allows social media sites like Facebook and Twitter to operate largely without regulation.

    1998: US government steps up

    The TCP/IP addressing scheme required that every computer or device connected to the Internet have its own unique address — which, for computational reasons, was a string of numbers like “192.168.2.201”.

    But that’s hard for people to remember — it’s much easier to recall something like “indiana.edu”. There had to be a centralised record of which names went with which addresses, so people didn’t get confused, or end up visiting a site they didn’t intend to.

    Originally, starting in the late 1960s, that record was kept on a floppy disk by a man named Jon Postel. By 1998, though, he and others were pointing out that such a significant amount of power shouldn’t be held by just one person. That year saw the US department of commerce lay out a plan to transition control to a new private non-profit organisation, the Internet Corporation for Assigned Names and Numbers — better known as Icann — that would manage Internet addresses around the world.

    For nearly 20 years, Icann did that work under a contract from the commerce department, though objections over US government control grew steadily. In 2016, the commerce department contract expired, and Icann’s governance shifted to a board of representatives from more than 100 countries.

    Other groups that manage key aspects of Internet communications have different structures. The Internet Engineering Task Force, for instance, is a voluntary technical organisation open to anyone. There are drawbacks to that approach, but it would have lessened both the reality and perception of US control.

    2010: War comes online

    In June 2010, cybersecurity researchers revealed the discovery of a sophisticated cyber weapon called Stuxnet, which was designed specifically to target equipment used by Iran’s effort to develop nuclear weapons. It was among the first known digital attacks that actually caused physical damage.

    Almost a decade later, it’s clear that Stuxnet opened the eyes of governments and other online groups to the possibility of wreaking significant havoc through the Internet. These days, nations use cyberattacks with increasing regularity, attacking a range of military and even civilian targets.

    There’s certainly cause for hope for online peace and community, but these decisions — along with many others — have shaped cyberspace and with it millions of people’s daily lives. Reflecting on those past choices can help inform upcoming decisions — such as how international law should apply to cyberattacks, or whether and how to regulate artificial intelligence.

    Maybe 50 years from now, events in 2019 will be seen as another key turning point in the development of the Internet.The Conversation

    • Written by Scott Shackelford, associate professor of business law and ethics; director, Ostrom Workshop Programme on Cybersecurity and Internet Governance; cybersecurity programme chair, IU-Bloomington, Indiana University
    • This article is republished from The Conversation under a Creative Commons licence
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Bill Duval Charley Kline Icann Jon Postel Leonard Kleinrock Robert Kahn top Vint Cerf
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleStop laughing at the SABC – its video streaming plan makes sense
    Next Article Twitter co-founder Biz Stone envisages ‘new type of media’

    Related Posts

    MTN Group hires Mike Silber in senior regulatory role

    MTN Group hires Mike Silber in senior regulatory role

    28 March 2024
    Price hikes looming for .za internet domains

    Icann wants new internet domains for South Africa

    1 November 2023

    18GW in unplanned breakdowns cripple Eskom

    2 November 2021
    Company News
    Mining's problem isn't output, it's execution - Workday

    Mining’s problem isn’t output, it’s execution – Workday

    1 April 2026
    Paratus launches Starlink-powered connectivity for Africa's essential services - Paratus Essential Access

    Paratus launches Starlink-powered connectivity for Africa’s essential services

    1 April 2026
    How consumers can identify a true QLED TV

    How consumers can identify a true QLED TV

    30 March 2026
    Opinion
    The conflict of interest at the heart of PayShap's slow adoption - Cheslyn Jacobs

    The conflict of interest at the heart of PayShap’s slow adoption

    26 March 2026
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Sars to give every taxpayer a digital identity in sweeping tech overhaul

    Sars to give every taxpayer a digital identity in sweeping tech overhaul

    1 April 2026
    R12.1-billion wasted as government IT projects collapse - Sita

    R12.1-billion wasted as government IT projects collapse

    1 April 2026
    DStv 4K streaming launch is not imminent

    R99 DStv deal to keep Showmax subscribers from bolting

    1 April 2026
    TCS | MTN's Divysh Joshi on the strategy behind Pi - Divyesh Joshi

    TCS | MTN’s Divyesh Joshi on the strategy behind Pi

    1 April 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}