Tuesday, April 5, 2011

Who is a hacker? Explain what is meant by “the hacker ethic” with the help of a contemporary example.

Hacker is a term that has been used to mean a variety of different things in computing. Depending on the context, the term could refer to a person in any one of several distinct (but not completely disjoint) communities and subcultures: A community of enthusiast computer programmers and systems designers, originated in the 1960s around the Massachusetts Institute of Technology's (MIT's) Tech Model Railroad Club (TMRC) and MIT Artificial Intelligence Laboratory. This community is notable for launching the free software movement. The World Wide Web and the Internet itself are also hacker artifacts. The Request for Comments RFC 1392 amplifies this meaning as "[a] person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks...

Hacker & hacker ethics

Who is hacker?The word “hacker” refers to someone who breaks into systems to damage it, or for the purpose of getting illegitimate access to resources.It can also be defined as a person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. The Hacker's Ethics The idea of a "hacker ethic" is perhaps best formulated in Steven Levy's 1984 book, Hackers: Heroes of the Computer Revolution. Levy came up with six tenets: Access to computers - and anything which might teach you something about the way the world works - should be unlimited and total. Always yield to the Hands-On imperative! All information should be free. Mistrust authority - promote decentralization....

Who is a hacker? Discussed with help of a contemporary example – Tim Berners-Lee

Hacker is a term that has been used to mean a variety of different things in computing. Depending on the context, the term could refer to a person in any one of several distinct (but not completely disjoint) communities and subcultures. Today, mainstream usage of “hacker” mostly refers to computer criminals, due to the mass media usage of the word since the 1980s. This includes what hacker slang calls “script kiddies,” people breaking into computers using programs written by others.Hacker ethic is the generic phrase which describes the values and philosophy that are standard in the hacker community. The early hacker culture and resulting philosophy originated at the Massachusetts Institute of Technology (MIT) in the 1950s and 1960s. The term 'hacker ethic'...

Who is a hacker? Explain what is meant by “the hacker ethic” with the help of a contemporary example.

Abstract:This Post deals with defining a Hacker and the meaning of “Hacker Ethic” by taking into example of the -the face behind the facebook – MARK ZUCKERBERGIntroduction:Are Hackers good or hacker’s are bad? Why do any one hack? The answer swiftly comes saying to “learn more about the system”, to know how the system really works, or sometimes to find out the loop holes in the system or to steal something. Each hacker wants to have recognition.Are the ethics which they follow,does they go on with the normal world ?Who is a Hacker?Hacker is a term that has been used to mean a variety of different things in computing. A community of enthusiast computer programmers and system designers, originated in the 1960s...

Who is a HACKER ??

Hacker Defination  In the media the word "hacker" is often used, for what I would call a "cracker", someone that breaks into systems to damage it, or for the purpose of getting illegitimate access to resources. A definition for hacker is found in The Hacker FAQ by Peter Seebs. Ari Lukumies wrote: As far as my terminology serves, crackers are those who give hackers a bad name (because most of the people cannot distinguish the two). Somebody who breaks into other's computer systems, or digs into their code (in order to make a copy-protected program run, for example) is a cracker. Then, someone who's really good at what he does with computers, is called a hacker. A hack, in software circles, is a quickly written short piece of code that makes something work. It may not be beautiful to...

Thursday, March 31, 2011

Information Panopticon & The Development and Convergence of ICTs in The Organization of Work

Abstract:               I argue in this blog about Information Panopticon & the development and convergence of information and communication technologies(ICT),how its use in the organization of work as an example, is creating a global network of surveillance capabilities which affect the traveller. These surveillance capabilities are reminiscent of 18th century philosopher Jeremy Bentham’s panopticon, and as such the emerging global surveillance network has been referred to as the ‘travel panopticon’.History of Information Panopticon – Some Important Aspects:                       ...

"What is the Information Panopticon? Discussed with reference to the use of ICT in the organization of work since the 80's." – survellience state

Information panopticon represents a form of centralized power that uses information and communication technology (ICT) as observational tools and control mechanisms. It has originated from the term Panopticon, a type of prison building designed by English philosopher and social theorist Jeremy Bentham. The concept of the design is to allow an observer to observe (-opticon) all (pan-) prisoners without the incarcerated being able to tell whether they are being watched. Within The Information Panopticon, Zuboff uses the architectural strategies of the panopticon as a metaphor to describe how information systems translate, record, and display human behavior.  The information panopticon critiques how technological systems use transparency to assert...

Information Panopticon

The information panopticon represents a form of centralized power that uses information and communication technology (ICT) as observational tools and control mechanisms. English philosopher and social theorist Jeremy Bentham developed the original architecture of the panopitcon as a prison. The idea was that "total" surveillance would eventually eliminate undesired behaviour. While Bentham's idea was literal, it has since become a metaphor for any type of system in which surveillance can or is total. The information panopticon represents a form of centralized power that uses information and communication technology (ICT) as observational tools and control mechanisms. The combination of information and communication technology used in call centres means it is possible for managers to monitor...

Information Panopticon

At the end of World War II, the electronic digital computer technology we take for granted today was still in its earliest infancy. It was expensive, failureprone,and ill-understood. Digital computers were seen as calculators, useful primarily for accounting and advanced scientific research.The information panopticon represents a form of centralized power that uses information and communication technology (ICT) as observational tools and control mechanisms. English philosopher and social theorist Jeremy Bentham developed the original architecture of the panopitcon as a prison. Be it a personal computer or a database system, both promote forms of interconnectivity that require a centralized control centre. The physical location of this centre is analogous to the central surveillance tower...

"What is the Information Panopticon? Explain with reference to the use of ICT in the organization of work since the 80's."

ABSTRACT:This article Discuses about Information Panopticon and enhances the knowledge by taking the example of surveillance of speeding vehicles by using of cameras by the police.INTRODUCTION:The information panopticon represents a form of centralized power that uses information and communication technology (ICT) as observational tools and control mechanisms HISTORY:Prisons were the nucleus of the present surveillance system. Prisons were built to confine “criminals” which were defined by their judiciary. These prisoners should be under scan every time,so surveillance was inevitable. Also to remove the dishonesty, idleness of human agents, the surveillance has even entered industries. Slowly it had entered...

Wednesday, March 23, 2011

Risks and Responsibilities

   Whirlwind, under the direction of engineer Jay Forrester, actually began in 1944 as an analog computer for use in a flight simulator, funded by the Navy. News about the ENIAC and EDVAC digital computer projects led Forrester to abandon the analog approach in early 1946.But the original application goal of a flight simulator remained.In theory flight simulators were, and remain, what is known as a “dual-use” technology, equally useful for training military and civilian pilots.It is important to emphasize that at this historical juncture these were not obvious goals for a digital computer. Analog computers and control mechanisms(servomechanisms) were well-developed, with sophisticated theoretical underpinnings. (Indeed, Forrester began his work at MIT as a graduate student in Gordon...

Monday, March 21, 2011

Need of National Security during the Cold War period - Risks & Responsibilities with the Space Race

INTRODUCTION:Computers were used for various operations in terms of extensive calculations (incybernics) during World-War 2, and US became the super power by this very idea of anti-aircraft weaponry and artillery after the World War 2 CLOSED WORLD DISCOURSES & CYBORG’S DISCOURSES:After World War 2 there created a closed world which was like putting every thought, word and action into reaching a central goal, which was regarding the national security during the cold war period.Cold War was referred to as the period after the World War 2 which was a silent conflict between the US and USSR regarding the military and the technology and science that determined their supremacy over the nations.During this very period, digital computers were developed and were extensively used for the fast calculations...

The development and further research on computer was associated with perceived need of national security during the cold war. Discussed with contemporary example of cyber war - hacking – wikileaks.

After world war II there was a period of tension, proxy wars between the new superpowers of the world.  During this period one has to keep eye on the other in order to be alert and secured and be prepared for whatever the comes.With the development in aircraft and submarines, an attack was possible through any way.  The radars, tracking devices, warning system were installed all over these countries to keep an eye on possibility of an enemy attack. All these system generated lots of data which need it be viewed and analyzed.  The human computers were not capable of handling these huge amount of data. So some one came up with ideas handling these data with a mechanical/digital computer.We clearly see that SAGE project which needed analysis of...

Risks and Responsibilities in ATC

The development and further research on Computers was associated with the perceived need of national security during the Cold War period. Discuss, with contemporary examples some of the risks and responsibilities involved with such justifications. After the World War II, USA and Russia raised as the new Super Powers and in the name of National Security conducted further research in the field of science, and created many weapons, thus raising the tensions between the two countries resulting in Cold War. As a result, America invented the SAGE system,which detects any hostile aircrafts in the borders of the nation and immediately able to send recruits to counter them.All this was done by the use of double-computers,the other one is used for backup in the case where one computer fails.This system...

Pages 111234 »

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Powered by Blogger | Printable Coupons