Реферат: CyberCommunism The New Threat In The New

Реферат: CyberCommunism The New Threat In The New




⚡ 👉🏻👉🏻👉🏻 ИНФОРМАЦИЯ ДОСТУПНА ЗДЕСЬ ЖМИТЕ 👈🏻👈🏻👈🏻




























































Cyber-Communism: The New Threat In The New Millennium Essay, Research Paper
My expedition into cyber-communism began when I read Brock Meeks’ “Hackers Stumble Toward Legitimacy”[1]. The article addressed a recent hackers’ convention. Interestingly, the keynote speaker was Eric Boucher[2] (alias Jello Biafra[3]), a rock star with no technical background. Numerous questions ensue. Who is Eric Boucher (alias Jello Biafra)? What does he believe? More importantly, why schedule someone with no technical background to speak at a hackers’ convention? Addressing his beliefs, his proposed Green Party platform[4] is not inconsistent with the “Manifesto of Libertarian Communism”[5]. This answer produces a more troubling question. Was his speech against corporate America mere socialist babbling or was his speech part of something more sinister, a subversive cyber-communist movement?
I am not the first to see possible communist subversion of the digerati[6]. Corey Winesett’s “Are Linux Users Really Communists?”[7] questions the nature of the relationship, if any, between open source and communism. Scott Billings’ “Heresy and Communism”[8] ponders that the Linux community’s knee-jerk reaction to negative opinions about Linux could be the result of being “under the [communists'] spell.” Before I can evaluate cyber-communism’s merits, I must define communism’s true nature and communism’s real threat to America.
Theoretical communism and practical communism have long been held as different political sociologies. Despite Marx’s call for the working class to revolt, the communist revolution’s leaders always ascend from the intelligentsia. John Stormer’s “None Dare Call It Treason” supports this fact saying:
“Fidel Castro was a product, not of the cane fields of Cuba, but of the halls of Havana University.”
“Joseph Stalin was not a simple peasant rebelling at the oppression of the Czar. He became a communist while studying for the priesthood in a Russian Orthodox seminary.”
“The membership of the first Communist spy ring uncovered in the U.S. Government was not spawned in the sweat shops of New York’s lower east side or the tenant farms of the South. [The conspirators] came to high government posts from Harvard Law School.”
Communism’s fallacy is the belief in everyone’s benevolence; yet, human nature proves otherwise. Communism cannot create a perfect society with imperfect people. Hence, to direct Utopia, communism produces a totalitarian government over the less-perfect people, ruled by the perfect people – communists. Thus, communism’s true nature creates a controlling government in the name of a better world.
Not every supporter needs be a knowing conspirator. Supporters could be “under the [communists'] spell.” Therefore, the true communist threat comes from people who can be deluded into supporting a controlling government in the name of a better world. John Stormer’s “None Dare Call It Treason” concurs with this conclusion saying:
“Communism is a disease of the intellect. It promises universal brotherhood, peace and prosperity to lure humanitarians and idealists into participating in a conspiracy which gains power through deceit and deception and stays in power with brute force.”
Richard Barbrook’s “The::Cyber.Com/Munist::Manifesto”[9] and “Cyber-Communism: How Americans are Superseding Capitalism in Cyberspace” (parts 1[10], 2[11], 3[12], 4[13]) draw parallels between communism and cyber-communism. He associates the Soviet Union’s gift/communist economy, where people freely exchange material goods, with the open source gift/cyber-communist economy, where people freely exchange source code. He concludes that cyber-communism promises a digital Utopia.
However, like communism’s promises, cyber-communism’s promises are not manifesting themselves. Monty Manley’s “Be an Engineer, Not an Artist”[14] cites poorly designed code to assert that unpaid programmers will work only on “sexy” projects. Scott Billings’ “Where’s the Creativity?”[15] challenges Linux supporters to show one original idea in Linux, reminding us that Linux itself is not an original idea.
Now, I am not condemning open source itself. Cyber-communism’s fallacy is funding the open source development method. Xavier Basora’s “Open Source and Nag Screens: Contradictions of the Bazaar”[16] mentions a shareware open source program to demonstrate the difficulty of funding “free” software. Eric Raymond’s “The Magic Cauldron”[17] provides many theoretical economic models, but he fails to provide any case studies to demonstrate their practicality. Red Hat follows Eric Raymond’s economic model and still suffers fiscal losses. Richard Stallman’s “The GNU Manifesto”[18] admits programmers will “not [be] paid as much as now.” Therefore, cyber-communism’s true nature moves software development to an unfeasible economic model. Andrew Leonard’s “The Cybercommunist Manifesto”[19] concurs with this conclusion in his critique of Richard Barbrook saying:
“Barbrook’s analysis does jibe well with fears expressed by some software programmers concerning the possibility that free software could prove to be an economic disaster for the software industry.”
Cyber-communism, like communism, is about control. John Zedlewski’s “Winning the Open-Source Support Game”[20] proposes that one company provide technical support for all open source software. Instead, his plan would only create an open source support monopoly. Liviu Andreescu’s “What to do about Monopolies?”[21] says, “Communism has nothing to do with turning… [Microsoft's] code in open source.” To the contrary, cyber-communism wants all products to move into open source to shift control from the corporation to the digerati. Thus, the true cyber-communist threat comes from the digerati’s members who can be duped into supporting an economically unfeasible development method.
Subversion is already in progress. “Hacker”[22] originally meant highly skilled programmer. Eric Raymond’s “How to Become a Hacker”[23] redefines “hacker” as a programmer who supports open source. Robert Lemos’ “The New Age of Hacktivism”[24] observes hacking being done for political reasons. Still, halting cyber-communism is not difficult.
Stopping cyber-communism is simple. We need only break the cyber-communists’ source of control. End-users depend on the digerati/hackers to provide technical support. To break the dependency, we need to made technology so easy that everyone can use it, as said in John Holmes’ “The Age of Everyman Tech: The End of Geekdom As We Know It”[25]. However, Michael Kellen’s “Death to Wizards!”[26] illustrates that some, mostly cyber-communists, will oppose easy-to-use. Besides, an easy-to-use program translates into little technical support revenue for an already failing economic model.
1 http://www.msnbc.com/news/435153.asp
2 http://music.excite.com/artist/biography/2089
3 http://www.ipass.net/~jthrush/biafra.htm
4 http://www.angelfire.com/punk/jello2000/platform.html
5 http://flag.blackened.net/daver/anarchism/mlc/mlc1.html
6 http://www.techweb.com/encyclopedia/defineterm?term=digerati
7 http://www.osopinion.com/Opinions/CoreyWinesett/CoreyWinesett2.html
8 http://www.osopinion.com/Opinions/ScottBillings/ScottBillings5.html
9 http://www.nettime.org/nettime.w3archive/199912/msg00146.html
10 http://www.nettime.org/nettime.w3archive/199909/msg00046.html
11 http://www.nettime.org/nettime.w3archive/199909/msg00047.html
12 http://www.nettime.org/nettime.w3archive/199909/msg00049.html
13 http://www.nettime.org/nettime.w3archive/199909/msg00045.html
14 http://www.osopinion.net/Opinions/MontyManley/MontyManley17.html
15 http://www.osopinion.com/Opinions/ScottBillings/ScottBillings3.html
16 http://www.osopinion.net/Opinions/XavierBasora/XavierBasora80.html
17 http://www.tuxedo.org/~esr/writings/magic-cauldron/magic-cauldron.html
18 http://www.gnu.org/gnu/manifesto.html
19 http://www.salon.com/tech/log/1999/09/10/cybercommunism/
20 http://www.osopinion.net/Opinions/JohnZedlewski/JohnZedlewski4.html
21 http://www.osopinion.com/Opinions/LiviuAndreescu/LiviuAndreescu2.html
22 http://www.techweb.com/encyclopedia/defineterm?term=hacker
23 http://www.tuxedo.org/~esr/faqs/hacker-howto.html
24 http://www.zdnet.com/zdnn/stories/news/0,4586,2651320,00.html
25 http://www.osopinion.com/Opinions/JohnHolmes/JohnHolmes3.html
26 http://www.osopinion.com/perl/story/6123.html

Название: CyberCommunism The New Threat In The New
Раздел: Топики по английскому языку
Тип: реферат
Добавлен 04:23:27 01 ноября 2010 Похожие работы
Просмотров: 2
Комментариев: 14
Оценило: 2 человек
Средний балл: 5
Оценка: неизвестно   Скачать

Срочная помощь учащимся в написании различных работ. Бесплатные корректировки! Круглосуточная поддержка! Узнай стоимость твоей работы на сайте 64362.ru
Привет студентам) если возникают трудности с любой работой (от реферата и контрольных до диплома), можете обратиться на FAST-REFERAT.RU , я там обычно заказываю, все качественно и в срок) в любом случае попробуйте, за спрос денег не берут)
Да, но только в случае крайней необходимости.

Реферат: CyberCommunism The New Threat In The New
Реферат: Финансы и кредит (МГТУ Станкин)
Сочинение По Сказке Колобок
Курсовая работа: Основные правила оформления схем
Контрольная работа по теме Концепция устойчивого развития экономики Украины
Реферат: Who Is To Blame For The Downfall
Сочинение В Форме Огэ
Отчет По Производственной Практике Автомеханика
Правапіс не,ня,ні з рознымі часцінамі мовы
Курсовая работа: Формы правления в США, Франции, Японии. Скачать бесплатно и без регистрации
Курсовая работа: Методи розв’язування раціональних нерівностей вищих степенів
Реферат по теме А.И. Солженицын и А.Д. Сахаров: общественно-политические взгляды и правозащитная деятельность
Фипи Егэ 2022 Обществознание Эссе Примеры
Сочинение На Тему Описание Митрофанушки
Особенности Школьной Социализации В Сельской Школе Диссертация
Ответ на вопрос по теме Экзаменационные ответы по философии
Трудовой Договор Реферат
Винтовые Насосы Реферат
Дипломная работа по теме Договор аренды и найма жилых помещений
Реферат по теме Социальная реабилитация детей инвалидов
Курсовая работа по теме Особенности хронографов XVI-XVII веков
Реферат: Advanced Artificial Intelligence Essay Research Paper Artificial
Реферат: Инновации в туризме 3
Курсовая работа: Разработка устройства, предназначенного для формирования импульсных сигналов с заданным периодом и скважностью - ШИМ-регулятор

Report Page