Wednesday, February 18, 2026

History and Evolution of Instant Messaging

 Instant messaging, which we use now to send a quick text to a friend or family on a handheld device, used to be on large computers and was only available to the government. 


Instant messaging was invented in 1971 for governmental chat use in emergencies. Invented by
Murray Turoff, originally created for IM for (EMISARI) Emergency Management Information System and Reference Index for the Office of Emergency Preparedness. Its first use was to allow communication among different government officials to facilitate the anti-inflation wage and price controls of the Nixon Administration. This system is connected to a teletypewriter terminal that is in turn connected to a central computer.

 But before it was strictly for government, there was (CTSS) Compatible Time Sharing Systems created in 1961 at the Massachusetts Institute of Technology 1961. It started as ppl in the college sending messages to each other, then expanded to people from all different colleges by 1965. 

Another chat software was available (UNIX). Founded by Kenneth Tompson, Dennis Ritchie, and others at AT&T, allowed people to chat with each other, but only if they were on the same computer brand.

Once open to the public, the top Instant Messaging system wars started. 


1994 PowWOw, created by John McAfee's company, was a chat for Windows devices made by a company, Tribal Voice Inc. This was considered the first social network and "pushed the boundaries of the early dial-up internet era."


1996 ICQ emerged as an Israeli company, Mirabilis, made by developers Yair Goldfinger, Arik Vardi, Sefi Vigiser, and Amnon Amir. ICQ, meaning I seek you, is a cross-platform system allowing people of all different systems and devices to communicate. After their release, it grew dramatically with millions of users around the world. It was the first available personal computer compatible with Microsoft, Windows, and Apple devices.


Later, ICQ was bought for $287 million in 1998 and merged with AOL American Online. By the 2000's it was the largest network provider and worth $125 billion

Instant Messaging became the main way of communication in 1990 due to battles between commercial ventures.

2000 was the start of multiple IM systems and multiple versions, depending on the computer or device.

Then, in 2006, Instant Messaging was linked to social media via Myspace, then Facebook, and Facebook Messenger in 2011.


Originally,
a system for government communication has transformed into a space to connect with family and friends. It allows people to communicate in real time instead of having to wait for a person to be free to talk or whenever you see them again in person

and different social media apps to stay up to date with people in your community but also across the globe, uniting everyone.

Monday, February 2, 2026

Ted talk Video Review

Privacy, Online and Off

Video 1 Juan Enriquez

Big data, Tattoos, Immorality, and Greeks. How do they relate to internet safety?

Tattoos tell a lot of stories, such as what you believe in, intimate moments of your life, and ///. Technology is electronic tattoos saying who and what you are, just like tattoos. They are easy to abandon the recolection?? of consequences, and both will never fully be deleted or gone.


An important theory Mr. Enriquez speaks about was the Andy theory relating to today's day in age due to social media and technology monitoring: In the future, everybody in the future will be famous for 15 minutes.


In relation to the Greeks, Mr. Enriquez has 4 theories:

1. Sisyphus did a bad thing, causing the rock to roll up but then back down, relating to reputations going up and down.

2. Orpheus party singer, charmed his way to the underworld, and was released because of his beauty, but couldn't look at Eurydice until he was out of the underworld, correlating that you should not look too far into the past of those you love.

3. Atlanta was the greatest runner, and challenged anyone; if you beat her, you could marry her, but if you lost, you would die. One challenger ran behind her but rolled apples, in front of her to distract her and then won the race. Golden apples come when you want to repost, tweet, or send a text to someone, but sometimes the best thing is to do nothing because what you do can cause you to lose a race.

4. Narcissus: don't fall in love with your own reflection. Yes, you may be gorgeous or handsome or think a picture's "post worthy" but remember whatever you put onto the internet will be there forever.

Video 2


In the second video we learned how advanced military weapons are being used by police and surveillance equipment to gain sensitive info from the people. Satelights and street cameras track how your driving and can always tell you what to do or where u go, and they base the kind of person they think you are based on where you go.

Even police cars keep records of every car plate that passes by. Why can the gov track us without permission? The gov deletes the data later, but the police department keeps it.

The ending question of this video was, what we should do about this, and is it a civil security threat. 

Video 3

In this Ted talk video we learned about the wire tapping assistance to government. 

Most governments build surveillance features into the core of the network as time has progressed, no call is private now, someone is always listening or hacking into the system later.


Silicon Valley companies build strong encryption tech in products to make it difficult to survey iPhone texts that can't be easily tapped. 

Government officials aren't happy that it's harder to tap into phones, and tech companies definitely encryp the info. 

While in the United States we might be more protected officials in the United Kingdom think phone message should be official to the government. 


Video 4

This ted talk was about a missed call from an ex-husband and was told to go to website and found her leaked naked photos. Her stalker ex bf made a website with her name and her naked photos while she was sleeping.


1/25 women are impacted by revenge porn, 1/10 under 30 women has been put through this. The Enough Act Senator Kamala Harris criminalizes revenge porn, but still has not been passed. Only 40 states and DC have fines for revenge porn about $500. And 51% of women have consider suicide because of this.

Because he was stalking and harassing from another country,  it made the process harder to get the photos leaked removed and sue him. Regardless of boarders and restrictions therer should be laws against it. 

To simply have her own photos that were stolen removed she had 3 occasions of invasion through America and Jamacia embassy and go through her electronics to remove photos. 

In the end the ex husband got charged and can face thousands of dollars in fines and 10 years in jail.

What are your thoughts does the governmtn need more access to our peresonal date and information or less?


History and Evolution of Instant Messaging

  Instant messaging , which we use now to send a quick text to a friend or family on a handheld device, used to be on large computers and wa...