pirate software

31 results back to index

pages: 340 words: 91,387

Stealth of Nations by Robert Neuwirth

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

accounting loophole / creative accounting, big-box store, British Empire, call centre, collective bargaining, corporate governance, full employment, Hernando de Soto, illegal immigration, income inequality, informal economy, invisible hand, Jane Jacobs, jitney, joint-stock company, Joseph Schumpeter, megacity, microcredit, New Urbanism, pirate software, profit motive, Shenzhen was a fishing village, Simon Kuznets, special economic zone, The Wealth of Nations by Adam Smith, thinkpad, upwardly mobile

It didn’t matter that some of the instructions and copyright information were written in Cyrillic, as long as I could figure out how to use it. But once I got a new computer, and the pirated software was no longer compatible with the new operating system, I didn’t go out and buy Quark. Instead, I made do without it. Many computer users work like this. The genuine programs are simply too expensive to be a reasonable option. This means that that figure of $53 billion lost to piracy is unreliable at best. Finally, buried in the fine print of the group’s statistics, there’s this: “Businesses, schools, and government entities tend to use more pirated software on new computers than ordinary consumers do.” This is an extraordinary statement—because it means that the biggest consumers of pirated programs on new computers have nothing to do with System D.

This is an extraordinary statement—because it means that the biggest consumers of pirated programs on new computers have nothing to do with System D. Instead, they are legal companies, doing legal work. Indeed, as the report suggests, the government—the same entity that the industry is calling upon to police piracy—is actually one of the largest patrons of pirated software. I had a small run-in with this kind of semiofficial piracy in one of my early jobs in journalism. The publication where I worked—a formal, incorporated, taxpaying entity—composed its pages using what was then a popular text layout program. But the owners had ordered the IT staff to save money by purchasing just a single licensed copy of the program. Even so, it was installed on as many as fifty different workstations. After a few weeks of heavy use, the program crashed and the publisher had to bring in some techies from the manufacturer to fix the problem.

., street market in, 8.1–8.2 children, 2.1, 8.1, 12.1–12.2, 12.3 China African smuggling from, 4.1, 10.1–10.2 African trade with, 4.1, 4.2, 4.3–4.4, 4.5, 4.6, 4.7, 5.1, 10.1–10.2, 12.1–12.2 child labor in, 12.1 consumerism in, 4.1, 5.1, 6.1 corporate crime in, 12.1 dominant business model in, 5.1–5.2 economic policy in, 5.1, 5.2 employment in, 2.1 factory work in, 4.1 high-end brand production in, 5.1 language in, 6.1 mobile phone exports from, 5.1 Nigerian trade with, 3.1, 3.2, 4.1–4.2, 4.3, 4.4, 4.5, 4.6–4.7, 4.8, 5.1–5.2, 5.3, 5.4, 10.1–10.2 piracy in, 5.1, 5.2–5.3, 5.4–5.5, 5.6, 5.7, 5.8 public health system in, 4.1 recycling industry in, 12.1 Rua 25 de Março merchants from, 1.1–1.2 smuggling from, 6.1–6.2 smuggling into, 6.1–6.2 System D’s role in, 2.1 tax paying in, 4.1, 4.2–4.3, 4.4, 5.1 technology retailing in, 6.1, 6.2 toxic dumping in, 12.1 2008/2009 financial crisis effects in, 5.1, 5.2 U.S. trade with, 4.1 see also specific cities China Plaza, 5.1, 5.2 China Southern Airlines, 4.1 Chinee Water, 3.1 Chinese University of Hong Kong, 6.1 Chintan, 12.1 cigarettes, smuggling of, 6.1 Ciudad del Este, Paraguay, 6.1–6.2, 6.3–6.4 business formalization in, 11.1, 11.2–11.3, 11.4 computer and electronic trade in, 6.1, 11.1–11.2, 11.3–11.4, 12.1 crime in, 12.1, 12.2, 12.3 currency trading in, 6.1–6.2 economic activity in, 6.1, 6.2, 6.3–6.4, 11.1, 12.1 Lebanese community in, 12.1, 12.2, 12.3, 12.4 money transfers in, 12.1 policing in, 6.1–6.2, 6.3 street market in, 6.1 System D in, 2.1 taxation in, 6.1, 11.1–11.2 terrorism allegations against, 12.1–12.2 Clinton, Hillary, 12.1 Computer and Allied Products Dealers Association of Nigeria, 3.1 computer industry Chinese trade in, 6.1–6.2 falling prices in, 6.1, 11.1 illegal dumping in, 12.1–12.2 Nigerian trade in, 3.1–3.2, 10.1 Paraguayan trade in, 6.1–6.2, 11.1–11.2, 11.3–11.4 poor workmanship in, 4.1 smuggling in, 6.1–6.2, 6.3, 6.4–6.5, 11.1–11.2, 11.3, 11.4, 11.5 see also Ikeja Computer Village computer software, piracy of, 5.1–5.2 conflict resolution, 12.1–12.2 Connecticut Courant, 12.1 construction industry, 8.1 cooperative development, 12.1, 12.2, 12.3–12.4 limits of, 12.1 criticism of, 9.1 Cooper-Glicério, 12.1–12.2 copyrights, 8.1 Correct Technologies, 3.1, 3.2 Cotonou, Republic of Benin, 3.1, 4.1, 5.1, 10.1, 10.2, 11.1 courts, as an institution in street markets, 12.1–12.2 crime, 2.1, 2.2, 12.1, 12.2, 12.3, 12.4, 12.5, 12.6, 12.7, 12.8–12.9 Cross, John, 9.1–9.2 Crusades, 4.1 currency, see exchange rate Dairo, Ogun, 3.1–3.2 danfo, see bus system, Lagos Dattora, Édison Ramos, 1.1–1.2, 1.3, 1.4, 1.5, 7.1 Davidson, Basil, 3.1–3.2 débrouillards, 2.1 Deleuze, Gilles, 11.1 de Soto, Hernando, 11.1–11.2, 11.3, 11.4, 11.5, 11.6 Deutsche Bank, 2.1 developed world economic inequality in, 9.1 economic model in, 3.1, 7.1, 9.1, 9.2, 9.3, 9.4, 11.1–11.2 developing world business model in, 7.1–7.2, 10.1, 10.2, 11.1 economic growth of, 9.1–9.2, 9.3, 9.4, 11.1, 12.1–12.2 infrastructure in, 9.1, 12.1 System D growth in, 2.1, 2.2 water shortage in, 7.1 wealth gap in, 9.1–9.2, 9.3, 12.1 see also Africa; Asia; Latin America; specific countries Devil’s Dictionary, The (Bierce), 5.1–5.2 Diamond Bank, 7.1 Dias, Sonia Maria, 12.1 Diggers, 9.1 Digital Millennium Copyright Act, 8.1 dollar, as global currency, 4.1–4.2 Domestic Workers’ Bill of Rights, 12.1–12.2 Donizetti, Gaetano, 12.1 Downy, 7.1–7.2 Drake, Francis, 5.1, 5.2 drugs discount, 6.1–6.2 illegal, 12.1 DVDs, pirated, 1.1–1.2, 1.3–1.4, 1.5, 6.1 eBay, 8.1 Ebeyenoku, John, 12.1, 12.2 economic development, 2.1, 2.2 as a human right, 12.1 redefinition of, 9.1–9.2 economics Aristotle’s definition of, 5.1 efficiency in, 9.1, 9.2 80/20 conundrum in, 5.1 modern definition of, 2.1 wealth gap in, 9.1–9.2, 9.3, 12.1 see also business; free market system Economic Times, 12.1 economists, System D’s assessment by, 1.1, 2.1–2.2, 3.1, 7.1, 9.1, 9.2, 10.1, 11.1, 12.1 education, 10.1, 12.1, 12.2 “Eighteenth Brumaire of Louis Bonaparte, The” (Marx), 9.1 Eleazars, Ugochukwu, 3.1 electricity, 4.1, 4.2, 12.1–12.2 electronics industry gray-market, 8.1 Nigerian trade in, 3.1–3.2, 3.3–3.4 smuggling in, 6.1, 11.1–11.2, 11.3, 11.4, 12.1 see also computer industry; mobile phone industry Eleshin, Omotola, 3.1–3.2, 7.1 Emirates, 4.1 employment business tax breaks and, 10.1 System D’s provision of, 2.1, 9.1, 9.2, 9.3, 12.1–12.2, 12.3 21st century, 2.1 Encore Technical Sales, 11.1 Encyclopedia Britannica, 5.1 entrepreneurialism, 2.1, 2.2, 2.3, 12.1 environmental issues, 3.1, 3.2, 3.3, 12.1, 12.2–12.3 Enzensberger, Hans Magnus, 5.1 Ethiopian Airlines, 4.1 Europe literacy growth in, 5.1 Nigerian trade with, 3.1 post–World War II economic development in, 11.1–11.2 16th-century economic transition in, 8.1, 8.2–8.3 smuggling into, 6.1 System D in, 2.1, 3.1, 8.1–8.2 2008/2009 financial crisis effects in, 2.1–2.2 see also specific cities and countries EVGA, 11.1 e-waste, 12.1–12.2 exchange rate importance to System D trade, 4.1–4.2, 12.1 Eze, Sunday, 3.1 Ezeagu, Charles, 2.1 Ezeifeoma, James, 4.1, 4.2, 7.1, 9.1–9.2, 9.3, 12.1 Fable of the Bees, The (Mandeville), 5.1, 5.2 Fanon, Frantz, 9.1 fashion industry, 4.1–4.2, 4.3–4.4 labor issues in, 7.1, 12.1–12.2 piracy in, 5.1, 5.2–5.3, 7.1–7.2 Fashola, Babatunde, 10.1, 10.2, 10.3, 10.4, 10.5, 10.6, 10.7 Feiyang, 5.1–5.2 Festac Town, Lagos, Nigeria, 3.1, 3.2, 3.3 Festac United Okada Riders, 3.1 feudalism, 8.1 financial crisis of 2008/2009 in China, 5.1, 5.2 System D resilience to, 2.1–2.2 in United States, 8.1, 8.2 Financial Mail, 12.1 flea market, 8.1, 12.1 Fontaine, Laurence, 6.1 food industry formalization in, 8.1, 8.2–8.3, 8.4, 8.5, 12.1 street peddling in, 1.1, 1.2, 1.3, 3.1, 3.2, 8.1–8.2, 8.3–8.4, 12.1 System D producers in, 8.1–8.2, 8.3–8.4 formal businesses, relationship with informal firms, 1.1–1.2, 7.1–7.2, 7.3–7.4 formalization bureaucracy in, 8.1, 8.2, 8.3, 11.1 in computer industry, 11.1, 11.2–11.3 costs and benefits of, 11.1–11.2, 11.3, 11.4, 11.5 degrees of, 12.1–12.2, 12.3 effects of, 11.1–11.2 in food industry, 8.1, 8.2–8.3, 8.4, 8.5, 12.1 obstacles to, 11.1, 11.2 419 Advance Fee Fraud, 3.1, 10.1 Fox, Paul, 7.1 Foz do Iguaçu, Brazil, 6.1, 6.2, 6.3, 6.4, 12.1 France, System D in, 8.1 “Fraternity of Vagabonds, The” (Awdeley), 8.1 free market system, 2.1–2.2, 9.1, 9.2, 9.3, 12.1, 12.2 Gafunk Nigeria Limited, 3.1 Gala sausage roll, 7.1 Galatzer, Natalie, 8.1 Galeria Pagé (Ciudad del Este), 12.1–12.2 Galeria Pagé (São Paulo), 1.1, 1.2, 10.1 garage sales, 8.1 garbage recycling, in Brazil, 12.1–12.2 in China, 9.1–9.2 in Nigeria, 3.1, 3.2–3.3 gasoline, smuggling of, 6.1 Gates, Bill, 5.1, 9.1 General Theory of Employment, Interest and Money, The (Keynes), 9.1 generators, 4.1 George II, King of England, 9.1 Germany, System D in, 8.1 Gesell, Silvio, 9.1 Glissant, Edouard, 9.1 globalization, 4.1–4.2, 12.1 peddlers as agents of, 4.1–4.2 see also System D, global trade in Gomorrah (Saviano), 5.1 Gonçalves, Reginaldo, 1.1 Goodluck, Akinwale, 7.1, 7.2, 7.3, 7.4 Gould, Jay, 9.1 government economic regulation by, 2.1 privatization in, 2.1 System D interaction with, 3.1, 3.2, 3.3, 3.4, 3.5, 4.1–4.2, 4.3–4.4, 5.1–5.2, 6.1, 6.2, 10.1–10.2, 11.1, 12.1, 12.2, 12.3, 12.4, 12.5, 12.6, 12.7, 12.8, 12.9–12.10, 12.11–12.12, 12.13–12.14 use of pirated software in, 5.1 Gramsci, Antonio, 2.1 Granta, 5.1 gray market, 2.1 Great Britain historical conflict resolution in, 12.1–12.2 historical wealth gap in, 9.1–9.2 System D criticism in, 8.1–8.2 see also London, England Great Transformation, The (Polanyi), 2.1–2.2 Greece, ancient, conflict resolution in, 12.1 Grimmelshausen, Hans Jakob Christoffel von, 5.1–5.2 growth, 2.1, 2.2, 2.3, 9.1–9.2, 10.1–10.2 Grumbling Hive, The (Mandeville), 5.1, 5.2 Guangzhou, China, 2.1 African traders in, 4.1, 4.2, 4.3–4.4, 4.5–4.6, 4.7, 4.8, 5.1–5.2, 5.3, 12.1–12.2 business regulations in, 4.1, 4.2 international population in, 4.1 policing of, 5.1, 9.1, 12.1, 12.2 recycling in, 9.1–9.2 smuggled computers in, 6.1 Guangzhou Dashatou Second Hand Trade Center, 5.1, 5.2–5.3 Guarda Municipal, 1.1, 1.2 guarda-roupas, 6.1–6.2 Guattari, Félix, 11.1 Gudeman, Stephen, 9.1–9.2 gun running, 2.1 Guys and Dolls, 8.1 Gypsies, 8.1 Hammoud family, 12.1, 12.2 Hancock, John, 12.1 Harare, Zimbabwe, 12.1 Harlem, N.Y.


pages: 252 words: 75,349

Spam Nation: The Inside Story of Organized Cybercrime-From Global Epidemic to Your Front Door by Brian Krebs

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

barriers to entry, bitcoin, Brian Krebs, cashless society, defense in depth, Donald Trump, employer provided health coverage, mutually assured destruction, offshore financial centre, payday loans, pirate software, placebo effect, ransomware, Silicon Valley, Stuxnet, the payments system, transaction costs, web application

And one network above all paved the way for the rise of McColo, the Pharma Wars, and many of the junk email and cybercrime practices that threaten us and our online security today. By the middle of 2007, the Russian Business Network (RBN)—a shadowy web hosting conglomerate based in St. Petersburg, Russia—had cemented its reputation among security experts as the epicenter of cybercriminal activity on the Internet. In case after case, when computer crime investigators followed the trail of money and evidence from sites selling child pornography or pirated software, web properties at RBN were somehow always involved. When cyber sleuths sought to shutter sites that were pumping out colonies of computer viruses and “phishing” scams that use email to impersonate banks and lure people into entering account passwords at fake bank sites, more often than not, the offending site was a customer of RBN. RBN epitomized the early bulletproof hosting providers, virtual safe houses where web hosting customers could display and offer practically any online content—no matter how illegal or offensive—as long as they kept paying exorbitant hosting fees that were prone to increase without notice.

Also, the new documents explicitly call out examples of illegal transactions including “unlawful sale of prescription drugs” and “sale of counterfeit or trademark-infringing products or services,” among others. Finally, these changes include more aggressive fine schedules for noncompliance. Some of the best evidence of the success of the test-buy strategy comes directly from the folks operating the affiliate programs that reward spammers and miscreants for promoting fake antivirus and pirated software and dodgy pill sites. In June 2012, a leader of one popular pharmacy affiliate program posted a lengthy message to gofuckbiz.com, a Russian language forum that caters to a variety of such affiliate programs. In that discussion thread, which is now more than 250 pages in length, the affiliate program manager explains to a number of mystified forum members why the pharmacy programs have had so much trouble maintaining reliable credit card processing.

“Much like the Inuit Eskimos made sure to use every piece of the whale, we’re seeing an evolution now where botmasters are carefully mining infected systems and monetizing the data they can find,” Savage said. “The mantra these days seems to be, ‘Why leave any unused resources on the table’?” While some are using ransomware and data harvesting, Savage said, many other former affiliates and managers of failed scareware, pharma, and pirated software partnerkas are casting about for the next big thing. “It’s a period of innovation, and people clearly are looking around for another sweet spot that’s as good as pharma, which made more money more reliably than anything else out there,” he said. “A few affiliate programs are trying to peddle pirated e-books and movies; others are getting into [advertising] payday loans. There are now tons of programs that will write term papers for students.


pages: 345 words: 105,722

The Hacker Crackdown by Bruce Sterling

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

Apple II, back-to-the-land, game design, ghettoisation, Haight Ashbury, Howard Rheingold, HyperCard, index card, informal economy, Jaron Lanier, pirate software, Plutocrats, plutocrats, Silicon Valley, Steve Wozniak, Steven Levy, Stewart Brand, the scientific method, Whole Earth Catalog, Whole Earth Review

The first police sting-boards were established in 1985: "Underground Tunnel" in Austin, Texas, whose sysop Sgt. Robert Ansley called himself "Pluto"—"The Phone Company" in Phoenix, Arizona, run by Ken MacLeod of the Maricopa County Sheriff's office—and Sgt. Dan Pasquale's board in Fremont, California. Sysops posed as hackers, and swiftly garnered coteries of ardent users, who posted codes and loaded pirate software with abandon, and came to a sticky end. Sting boards, like other boards, are cheap to operate, very cheap by the standards of undercover police operations. Once accepted by the local underground, sysops will likely be invited into other pirate boards, where they can compile more dossiers. And when the sting is announced and the worst offenders arrested, the publicity is generally gratifying.

But anti-hacker police point out that magazines and newspapers (more traditional forms of free expression) never publish stolen telephone codes (even though this might well raise their circulation). Stolen credit card numbers, being riskier and more valuable, were less often publicly posted on boards—but there is no question that some underground boards carried "carding" traffic, generally exchanged through private mail. Underground boards also carried handy programs for "scanning" telephone codes and raiding credit card companies, as well as the usual obnoxious galaxy of pirated software, cracked passwords, blue-box schematics, intrusion manuals, anarchy files, porn files, and so forth. But besides their nuisance potential for the spread of illicit knowledge, bulletin boards have another vitally interesting aspect for the professional investigator. Bulletin boards are cram-full of EVIDENCE. All that busy trading of electronic mail, all those hacker boasts, brags and struts, even the stolen codes and cards, can be neat, electronic, real-time recordings of criminal activity.

Now, at last, we were getting to the real nitty-gritty here, real political horse-trading. The audience listened with close attention, angry mutters rising occasionally: "He's trying to teach us our jobs!" "We've been thinking about this for years! We think about these issues every day!" "If I didn't seize the works, I'd be sued by the guy's victims!" "I'm violating the law if I leave ten thousand disks full of illegal PIRATED SOFTWARE and STOLEN CODES!" "It's our job to make sure people don't trash the Constitution—we're the DEFENDERS of the Constitution!" "We seize stuff when we know it will be forfeited anyway as restitution for the victim!" "If it's forfeitable, then don't get a search warrant, get a forfeiture warrant," Godwin suggested coolly. He further remarked that most suspects in computer crime don't WANT to see their computers vanish out the door, headed God knew where, for who knows how long.


pages: 315 words: 93,522

How Music Got Free: The End of an Industry, the Turn of the Century, and the Patient Zero of Piracy by Stephen Witt

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

4chan, barriers to entry, Berlin Wall, big-box store, cloud computing, collaborative economy, crowdsourcing, game design, Internet Archive, invention of movable type, inventory management, iterative process, Jason Scott: textfiles.com, job automation, late fees, mental accounting, packet switching, pattern recognition, pirate software, Ronald Reagan, security theater, sharing economy, side project, Silicon Valley, software patent, Steve Jobs, zero day

Probably it was late in 1996, or maybe early in 1997, when Glover first heard the good news: not only was there a brisk trade in pirated software, but there existed a growing channel for pirated music as well. This perplexed Glover, who knew from memory that a compact disc held more than 700 megabytes of data. Doing the mental arithmetic, he figured that it would take nearly an hour to download a CD, and the resulting file would take up more than 70 percent of his computer’s storage. Trading pirated music was a technical possibility, he supposed, but an impractical one. But Glover was directed to a new IRC channel: #mp3. There, among thousands upon thousands of users, engaged in complex technical chatter and trading profane, often racially charged insults, he found CD music files that had somehow been shrunk to one-twelfth of their original size. Those warez guys, it turned out, didn’t just pirate software. Music, games, magazines, pictures, pornography, fonts—they pirated anything that could be compressed.

Getting a disk in the mail—or, less commonly, in a hand-to-hand transfer—was like Christmas morning, with royalty-free versions of Duke Nukem and Wing Commander under the tree. Now, on IRC, every day was Christmas, with a preprogrammed script known as a “bot” playing the role of automated Santa, instantly filling your wish list of cracked files on demand. With satellite download, you could fill your 1-gigabyte hard drive with pirated software in a matter of hours. The cracked files were known as “warez,” an ironic derivation of “software.” Warez was a singular term; it was also a plural one, and a subculture, and a lifestyle. Soon Glover was spending a lot of time in IRC’s #warez channel—too much time, as he later would admit. Before it became a widespread phenomenon, Glover was addicted to the Internet. In addition to the street bikes and the pit bulls and the Quad Squad, there were now the continuing online adventures of ADEG.


pages: 106 words: 22,332

Cancel Cable: How Internet Pirates Get Free Stuff by Chris Fehily

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

Firefox, patent troll, pirate software, Silicon Valley, Skype, slashdot, WikiLeaks

Chapter 15 – Applications and Games A sampling of software that you can download: Business and home — accounting, communication, database, flowcharting, networking, personal finance, presentation, project management, reports and forms, schedule and contact management, spreadsheet, tax prep, training, travel, word processing Children — activities, art, early learning, games, interactive books, literature, math, nature, reading, reference, science, socialization, parental controls, problem solving, virtual pets Creative — 3D, animation, clip art, cooking, fashion, hobbies, illustration, music and audio, photo and video editing, publishing Education and reference — arts, culture, dictionaries, encyclopedias, foreign languages, geography, history, literature, mapping, religion, science, script and screen writing, secondary education, sound libraries, test prep, typing, writing Games — all operating systems, mobile devices, and consoles Operating systems and servers Professional — 3D modeling, architecture, drafting/CAD, forensics, IDEs and compilers, engineering, legal, mapping/GIS, mathematics, medical, statistics, virtualization, web development Utility — antimalware, archivers, backup, disk authoring, drive partitioning, file conversion, firewalls, image mounting, privacy, screen capture, security, text editors, voice recognition Pirating software is dicier than pirating media (movies, music, and so on) because the former must be installed and poses a greater threat of malware (Chapter 4). When browsing for software torrents, look for popular releases by reputable piracy groups. Some installations are easy, but you’re usually at the mercy of the torrent’s installation instructions. These instructions come in a separate .txt, .nfo, .rtf, or .html file and range from lucidly comprehensive to cryptically terse.


pages: 500 words: 146,240

Gamers at Work: Stories Behind the Games People Play by Morgan Ramsay, Peter Molyneux

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

Any sufficiently advanced technology is indistinguishable from magic, augmented reality, collective bargaining, game design, index card, Mark Zuckerberg, oil shock, pirate software, RAND corporation, risk tolerance, Silicon Valley, Skype, Steve Jobs, Von Neumann architecture

When EA and Trip decided to reverse engineer the Sega Master System, and started doing sports games for the system, EA really took off. He asked MicroProse to join him in that effort, and I decided it was not the right thing to do. I missed a real opportunity there to combine with EA. Ramsay: He didn’t mention that in his interview. Stealey: No, he wouldn’t. I tell you, the first few games on the Apple by EA were not giant sellers. There were some real classics, but Apple users were notorious for pirating software rather than buying. The Sega deal was their big breakout effort. Ramsay: You were trying to set up an office for MicroProse in Europe. Weren’t you racing against EA to do that? Stealey: You should have seen us. Trip and I were sitting at a trade show in 1988, trying to convince each other to close down each other’s European operations. We beat EA to Europe. We were already in Europe selling products in 1986.

Index 1st Playable Productions, Tobi Saulnier, 261–280 3D gameplay, 302 3D Home Architect, Doug and Gary Carlston, 127, 129 3DO Company, 1, 10–12 989 Studios, 169–170 1830 board game, Avalon Hill, 50 2600 console, 17, 33–34 A Able, Robert, 243 acquisitions of Sierra On-Line, 201–206 by SOE, 191 Activision, 6, 100, 103 Adam, Phil, 96 addiction, to EverQuest game, 177–178 Adventure International, Doug and Gary Carlston, 122–123 advertising, Darkwatch game, 253–254 advisors external, 28, 111 Tobi Saulnier, 266 Age of Empires, Tony Goodman, 67–68, 70–73, 76–77 Air Force Academy, Wild Bill Stealey, 37 Air Warrior, Don Daglow, 157 alarm clock, in EverQuest game, 177 Albanian American Development Foundation, 132 Albanian American Enterprise Fund, 132 algorithms, 40 Alpha Protocol, 87 Altman, Robert, 281, 291 Ampex Corporation, 18, 21 Ancient Art of War, Doug and Gary Carlston, 129 Anderson, Jason, 94–97, 100, 104 Andretti Racing, Don Daglow, 160 anti-indulgence system, 178 Antic Magazine, 41 AOL, Don Daglow, 144, 150 Apple, 258–259 Trip Hawkins' time at, 2, 7–8 users, pirating software, 47 apps, game, 257–259 Appy Entertainment, Chris Ulm, 251–260 arcade games, 13 Arcanum, Tim Cain, 96–100 Archon game, 5 artists, software, 4–5 assets, reusing, 88–89 Atari, 7, 197 acquisition by Warner Communications, 32–35 Bushnell's leaving, 34–35 buying out of Dabney, 32 competition, 31 culture at, 31 Doug and Gary Carlston, 126 growth of, 24–27, 29–30 licensing with Nutting Associates, 22–23 location of, 23 Nolan Bushnell, 17–36 online game business, 31–32 overview, 17 Pong, 27–28 role in market crash, 33 startup of, 18–22 Tim Cain, 100–101 AtariTel, 31–32 Avalon Hill, 50–51 Avellone, Chris, 80, 85, 96 B Baer, Ralph, 28 Bally Manufacturing, 24, 26, 30 Balsam, David, 128 Bank Street Writer, Doug and Gary Carlston, 127, 129 BannerMania, Doug and Gary Carlston, 129 Barnett, Mike, 287 Bayne, Gresham, 316 Becker, Alan, 308 benefits, employee 1st Playable, 264, 280 Naughty Dog, 311 Bennette, David, 154 Bethesda Softworks, 89, 281–295 Bigham, Dane, 129 Billings, Joel, 144 BioWare, 85–86 Black Isle Studios, closure of, 79 Blackley, Seamus, 112 Blair, Gerry, 50 Boog-Scott, John, 61–62, 67 books, written by Ken Williams, 206 The Bourne Conspiracy game, 256 Boyarsky, Leonard, 94–97, 100, 104 brand extension, focus on at Sierra On-Line, 200 Brathwaite, Brenda, 149 Braun, Jeff, 237 Bricklin, Dan, 39 Bröderbund, 6 Don Daglow, 133, 135–137, 144 Doug and Gary Carlston, 122, 132 Brubaker, Lars, 82 Buchignani, Mark, 141 Budge, Bill, 5 budgets, for Sierra On-Line projects, 203–204 building engines, 87 Bunnett, David, 141 Bunten, Dan, 5–6 Burr, Egan, Deleage ' Co, Doug and Gary Carlston, 131 Busch, Kurt, 234 Bushnell, Nolan, 241 business aspects, Verant Interactive, 173–174 business is war philosophy, 196 business planning Atari, 20 Oddworld Inhabitants, 223–225 Verant Interactive, 172 Wild Bill Stealey, 44–45 ByVideo, 17 C CAA (Creative Artists Agency), 109–110 Cabbage Patch Kids, 268–269 Cain, Tim, cofounder of Troika Games, 93–105 Calhoun, John, 62 Call Doctor service, 316 Cameron, James, 216–217, 238 capability, 1st Playable, 277 Capcom, 254 capitalism, Lorne Lanning comments on, 221–222 Carbine Studios, Tim Cain, 105 career path Christopher Weaver, 282–283 Lorne Lanning, 209–218 Ted Price, 316–317 Tobi Saulnier, 261–263 Carlston, Cathy, 125, 130, 133 Carlston, Doug, 132–133, 135–136 Carlston Family Foundation, 132 Carlston, Gary, 132–133 Carmack, John, 149 Carmen Sandiego Don Daglow, 134 Doug and Gary Carlston, 127–128 Case, Steve, 144 cash flow, Don Daglow, 151–153 Catalyst Technologies, 17 CBS Software, 42 Cerny, Mark, 303–304, 306–307, 318–319 Chaimowitz, Ron, 233 Chapman, Thad, 62 The Chicago Coin Speedway, 24 Chicago, manufacturing in, 23 Chopper Rescue, Sid Meier, 42 Christian, Brian, 269 Chuck E.

See also EverQuest game Mattel Don Daglow, 136 Doug and Gary Carlston, 132 Maxis, Don Daglow, 134 Maxwell, Robert, 55 McDonagh, Bill, 125 McKenna, Sherry, 209, 220 career, 219 recruitment of, 210 McKinsey ' Company, 38 McNamara, Andy, 308 Media Technology, 282 medical insurance, 82 Meier, Sid, 39 Chopper Rescue, 42 Civilization, 51 cofounder of MicroProse Software, 37 F-15 Strike Eagle, 43 famous software star, 49 financial investments, 45 Floyd of the Jungle, 42 M1 Tank Platoon, 48 one-on-one selling, 43 Railroad Tycoon, 50 Silent Service, 48 Solo Flight, 43 mentoring, Don Daglow, 141–142 mentorship program, 1st Playable, 277 mergers and acquisitions, Doug and Gary Carlston, 130 MicroProse history of company name, 41 self-publishing, 47 Wild Bill Stealey, 37–57 Microsoft Flight Simulator, 44 Tony Goodman, 68–77 microtransactions, at SOE, 183–184, 191 middleware, licensing, 87 military duty, of Wild Bill Stealey, 38 Min, Art, 111 mission statement, Juntion Point Studios, 117 mobile devices, games for, 257–259 mobile games Digital Chocolate, 12–15 overview, 190 Molder, Stuart, 70, 73 Molyneux, Peter, 219 Monahan, Darren, 81 Morby, Jacqui, 197 MoveOn.org, 132 MPS Software, 41 M.U.L.E. game, 5–6 multilevel pinball machine, 27 multiplayer games, Digital Chocolate, 12–13 multiproject studios, 81 Myst, 129, 135 Mystery House game, 193, 195–196 N Nakazawa, Minoru, 123–124, 234 name recognition, Don Daglow, 153–155 Namuonglo, Thonny, 67 NanoStar platform, 13 Napster, 211 NASCAR, Don Daglow, 158–162 Naughty Dog, cofounder Jason Rubin, 297–313 Needham, John, 174 Neverwinter Nights, 144, 151, 154, 157 Neverwinter Nights 2, 87 NGE (New Game Enhancements), Star Wars Galaxies, 181–182 Nintendo, 8, 11 Nolan Bushnell, 17–36 NOVA, 132 Noyce, Bob, 28 Nutting Associates, 20, 22, 24, 30 O Obsidian Entertainment early challenges, 82–83 expansion, 81 Feargus Urquhart, 79–91 funding, 81 future of, 90 hands-on leadership, 83–84 overview, 79 owners of, 80–81 Star Wars, Knights of the Old Republic II, 84 start up of, 80 technology challenges, 86–87 Obsidian, Tim Cain, 105 Oddmob, 249 Oddworld Inhabitants, Lorne Lanning, 209, 250 Ohmert, Steve, 129 Old Time Baseball, Don Daglow, 156 Olds, Steve, 230 On Balance, Doug and Gary Carlston, 129 On-Line Systems, 193–195 One on One game, 5 one-on-one selling, 43 Origin Systems, 50 Orr, Bobby, 287 Outpost game, 200–201 Overstrike, 324 Ozark Softscape, 5 P Paradox, Tony Goodman, 61–62 parents, and violent games, 182 Park Place Productions, 170 Parker, Chris, 80 payrolls, 81 PC Globe, 131 Perry, Dave, 246 personnel, hiring and management Don Daglow, 158 Doug and Gary Carlston, 125–126, 129 Tim Cain, 98–100 Tony Goodman, 64 Peters, Tom, 137 Phantasmagoria game series, 201–203 Piehl, Hudson, 141 Pillow Pets, 273 Pinball Construction Set game, 5 pinball machines, multilevel, 27 Pinkalicious, 273 Pirates!, Sid Meier, 37, 48 pirating software, Apple users, 47 Planescape, Torment, 86 PlanetSide game, 172, 184 platform development, 10–12 Platform Publishing label, 184 platforms, working with different, 186–188 PlayStation, 186–188, 319 playtesters, 50 Ploughshares Fund, 132 Pong, 25, 27–28, 30, 122 Presage, Doug and Gary Carlston, 129 price of 3DO hardware, 11 Price, Ted, founder of Insomniac Games, 315–328 Print Master, 131 Print Shop, 127–128, 131, 133 Program Store, Doug and Gary Carlston, 123 projects selection of at SOE, 179–180 selection of at Verant Interactive, 175 walking away from, 90 public company, Electronic Arts as, 8–9 publisher-developer industry, 24 publishers, Darkwatch game, 253–254 publishing games, Don Daglow, 134–136 publishing process, at Electronic Arts, 4–5, 9 Q quality of life 1st Playable, 278 Bethesda Softworks, 294 Quantum Computer Services, Don Daglow, 144 R Railroad Tycoon, 37, 50 Ratchet ' Clank, Going Commando, 322–323 rating system, 182–183 Raymo, Rick, 234 recruiting development talent Christopher Weaver, 293 Oddworld Inhabitants, 230–231 Tobi Saulnier, 265–266 Red Baron game, 39 Rein, Mark, 248 Reiner, Andy, 308 reinforcement, variable-ratio, 14 Renaissance, Tony Goodman, 63 research, at Verant Interactive, 176 Resistance, Fall of Man, 323–324 rest system, 178 retail distribution of online games, 188 retail experience, Apple, 259 reusable code, Tony Goodman, 61 reusing technology, 88–89 reviews of games, 89, 115 Rhythm and Hues, 210–211 Rings of Power, 299 Rise of Rome, 70 risk, reducing from publishers perspective, 91 Roberts, Chris, 246 Roberts, Ty, 154 Robot Entertainment, Tony Goodman, 77–78 Rolie Polie Olie, 269 Romero, John, 149 royalties Doug and Gary Carlston, 126–129 Tony Goodman, 72 Rubin, Jason, 297–313 S sale, of Sierra On-Line, 197–199 Salzburg Seminar, 132 Sammy Studios, 251–252 SCEA (Sony Computer Entertainment America), 169 Schilling, Curt, 51 Schlichting, Mark, 128 Schmidt, Fred, 50 Schram, Scott, 129 security of game business, 111 Sega, 9–11, 47 self-publishing MicroProse, 47 Tony Goodman, 62–63, 68 Shanks, Russell, 170, 173–174 Shannon, Lorelei, 201 sharing technology, 86 Shelley, Bruce, 67, 71 shopping experience, Apple, 259 Sierra On-Line, 126, 193–207 Sierra, Tim Cain, 98, 100 Silent Service, 37, 48 SimCity, 134, 248 Sirius Software, 126 Ski Stud, 298 skin in the game, 284 Lorne Lanning, 223–224 Tobi Saulnier, 271 Skyrim, 281 Smedley, John, cofounder of Verant Interactive, 169–191 Smith, Jay, 5 Smith, Rob, 177 Smuggers group, 39 social games, 12–14, 189–190, 257 SOE (Sony Online Entertainment), 169–175, 178–191 SoftKey (The Learning Company), Doug and Gary Carlston, 131–132 SoftSel, 7 software artists, at Electronic Arts, 4–5 cost of, 217 legitimate, 81 Software Development Corporation, 2 Software Publishers Association, 49, 53 Solo Flight, 43–44 Meier, Sid, 43 Sony, 11 Sony Computer Entertainment America (SCEA), 169 Sony Imagesoft, 170 Sony Online Entertainment (SOE), 169–175, 178–191 Sony PlayStation, 302, 319 Sovereign game, 172 Spector, Caroline, 110 Spectrum Holobyte, 37, 54 Spinnaker company, 197–199 sports games, 170 SportsDashboards, 132 Spyro, 320–321 Squad Leader, Avalon Hill, 51 Square, 188 SSI, Don Daglow, 144, 149–150 St.


pages: 528 words: 146,459

Computer: A History of the Information Machine by Martin Campbell-Kelly, William Aspray, Nathan L. Ensmenger, Jeffrey R. Yost

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

Ada Lovelace, air freight, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, Apple's 1984 Super Bowl advert, barriers to entry, Bill Gates: Altair 8800, borderless world, Buckminster Fuller, Build a better mousetrap, Byte Shop, card file, cashless society, cloud computing, combinatorial explosion, computer age, deskilling, don't be evil, Douglas Engelbart, Dynabook, fault tolerance, Fellow of the Royal Society, financial independence, Frederick Winslow Taylor, game design, garden city movement, Grace Hopper, informal economy, interchangeable parts, invention of the wheel, Jacquard loom, Jacquard loom, Jeff Bezos, jimmy wales, John von Neumann, linked data, Mark Zuckerberg, Marshall McLuhan, Menlo Park, natural language processing, Network effects, New Journalism, Norbert Wiener, Occupy movement, optical character recognition, packet switching, PageRank, pattern recognition, pirate software, popular electronics, prediction markets, pre–internet, QWERTY keyboard, RAND corporation, Robert X Cringely, Silicon Valley, Silicon Valley startup, Steve Jobs, Steven Levy, Stewart Brand, Ted Nelson, the market place, Turing machine, Vannevar Bush, Von Neumann architecture, Whole Earth Catalog, William Shockley: the traitorous eight, women in the workforce, young professional

Besides acting as a swap shop for computer components and programming tips, it provided a forum for the computer-hobbyist and computer-liberation cultures to meld. During the first quarter of 1975, MITS received over $1 million in orders for the Altair 8800 and launched its first “worldwide” conference. Speakers at the conference included Ed Roberts, Gates and Allen as the developers of Altair BASIC, and the computer-liberation guru Ted Nelson. At the meeting Gates launched a personal diatribe against hobbyists who pirated software. This was a dramatic position: he was advocating a shift in culture from the friendly sharing of free software among hobbyists to that of an embryonic branch of the software-products industry. Gates encountered immense hostility—his speech was, after all, the very antithesis of computer liberation. But his position was eventually accepted by producers and consumers, and over the next two years it was instrumental in transforming the personal computer from a utopian ideal into an economic artifact.

It was around this time that he teamed up with Steve Jobs, five years his junior, and together they went into business making “blue boxes”—gadgets that mimicked dial tones, enabling telephone calls to be made for free. While blue boxes were not illegal to make and sell, using them was illegal, as it defrauded the phone companies of revenues; but many of these hobbyists regarded it as a victimless crime—and in the moral climate of the West Coast computer hobbyist, it was pretty much on a par with pirating software. This in itself is revealing of how far cultural attitudes would shift as the personal computer made the transition from hobby to industry. Despite his lack of formal qualifications, Wozniak’s engineering talent was recognized and he found employment in the calculator division of Hewlett-Packard (HP) in 1973; were it not for what amounted to a late-twentieth-century form of patronage that prevailed in the California electronics industry, Wozniak might have found his career confined to that of a low-grade technician or repairman.


pages: 190 words: 53,970

Eastern standard tribe by Cory Doctorow

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

airport security, call centre, forensic accounting, high net worth, offshore financial centre, pirate software, Silicon Valley, the payments system

I refrain from mentioning Alphie's propensity for lapses in judgment. "Wow," Alphie said. "That's a bummer. We should do something, you know, Audie?" "Not really my area of expertise," Audie said in clipped tones. "I would if I could, you know that, right Art? We're family, after all." "Oh, sure," I say magnanimously. But now that I'm looking at them, my cousins who got into a thousand times more trouble than I ever did, driving drunk, pirating software, growing naughty smokables in the backyard, and got away from it unscathed, I feel a stirring of desperate hope. "Only..." "Only what?" Alphie said. "Only, maybe, Audie, do you think you could, that is, if you've got the time, do you think you could have a little look around and see if any of your contacts could maybe set me up with a decent lawyer who might be able to get my case reheard?


Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems by Chris Sanders

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

Debian, pirate software, RFC: Request For Comment

Looking at the port number is a good way to identify the type of traffic. A quick search for this port number at http://www.iana.org will list the services associated with this port. Summary The Gnutella network is commonly used for the downloading and distribution of various file types. This idea may sound great at first, but unfortunately, it has resulted in a large peer-to-peer network of pornography as well as pirated software, movies, and music. In this scenario, it seems that Tina, or someone using Tina's computer, has installed some form of Gnutella client in order to download pornographic material. Final Thoughts If you look at way each of these scenarios was resolved, you will notice that most of the problems were not actually network related. This is pretty common when it comes to complaints about a slow network.


pages: 172 words: 54,066

The End of Loser Liberalism: Making Markets Progressive by Dean Baker

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

Asian financial crisis, banking crisis, Bernie Sanders, collateralized debt obligation, collective bargaining, corporate governance, currency manipulation / currency intervention, Doha Development Round, financial innovation, full employment, Home mortgage interest deduction, income inequality, inflation targeting, invisible hand, manufacturing employment, market clearing, market fundamentalism, medical residency, patent troll, pets.com, pirate software, price stability, quantitative easing, regulatory arbitrage, rent-seeking, Robert Shiller, Robert Shiller, Silicon Valley, too big to fail, transaction costs

[97] The “say on pay” provision of the Dodd-Frank financial reform bill requires companies to have nonbinding shareholder votes on executive compensation packages. This is a step forward that will at least call greater attention to outlandish pay packages, but by itself is likely to have little effect on CEO pay. [98] This figure is derived from the industry’s claim that the value that it assigns to “pirated” software was $59 billion in 2010 and that this was equal to 42 percent of total software shipments; see Business Software Alliance (2011). [99] Milliot (2010). [100] Newzoo (2011). [101] There is a whole industry of “patent trolls,” individuals or firms that buy up patents with the hope of finding a major innovation that is arguably derivative of the patent in question. The profit comes from filing a patent infringement suit.


pages: 264 words: 79,589

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

Apple II, Brian Krebs, Burning Man, corporate governance, dumpster diving, Exxon Valdez, Hacker Ethic, hive mind, index card, McMansion, Mercator projection, offshore financial centre, packet switching, pirate software, Ponzi scheme, Robert Hanssen: Double agent, Saturday Night Live, Silicon Valley, Steve Jobs, Steve Wozniak, Steven Levy, traffic fines, web application, WikiLeaks, zero day, Zipcar

BSU professor Alexander Feldman discussed Max’s computer ban in an interview and said Max had probed other computers. 6 The sheriff called BSU’s network administrator at two in the morning: Interview with Greg Jahn, a former BSU system administrator responsible for locking down Max’s account and preserving his files. Chapter 3: The Hungry Programmers 1 Idaho’s Supreme Court ruled: State v. Townsend, 124 Idaho 881, 865 P.2d 972 (1993). 2 Max found an unprotected FTP file server: Cinco Network, Inc. v. Max Butler, 2:96-cv-1146, U.S. District Court, Western District of Washington. Max confirms this account but says he was primarily interested in distributing music files, not pirated software. 3 Chris Beeson, a young agent: The details of Max’s assistance to the FBI come from court filings by the defense attorney in his subsequent criminal case, USA v. Max Ray Butler, 5:00-cr-20096, U.S. District Court, Northern District of California. Details of his recruitment and his relationship with the agents come from interviews with Max and Max’s Internet writings immediately following his guilty plea.


pages: 270 words: 79,992

The End of Big: How the Internet Makes David the New Goliath by Nicco Mele

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

3D printing, 4chan, A Declaration of the Independence of Cyberspace, Airbnb, Amazon Web Services, Any sufficiently advanced technology is indistinguishable from magic, Apple's 1984 Super Bowl advert, barriers to entry, Berlin Wall, big-box store, bitcoin, business climate, call centre, Cass Sunstein, centralized clearinghouse, Chelsea Manning, citizen journalism, cloud computing, collaborative consumption, collaborative editing, crony capitalism, cross-subsidies, crowdsourcing, David Brooks, death of newspapers, Donald Trump, Douglas Engelbart, en.wikipedia.org, Exxon Valdez, Fall of the Berlin Wall, Filter Bubble, Firefox, Galaxy Zoo, global supply chain, Google Chrome, Gordon Gekko, Hacker Ethic, Jaron Lanier, Jeff Bezos, jimmy wales, Julian Assange, Kevin Kelly, Khan Academy, Kickstarter, Lean Startup, Mark Zuckerberg, minimum viable product, Mohammed Bouazizi, Mother of all demos, Narrative Science, new economy, Occupy movement, Peter Thiel, pirate software, Ronald Reagan, Ronald Reagan: Tear down this wall, sharing economy, Silicon Valley, Skype, social web, Steve Jobs, Steve Wozniak, Stewart Brand, Stuxnet, Ted Nelson, Telecommunications Act of 1996, telemarketer, The Wisdom of Crowds, transaction costs, uranium enrichment, Whole Earth Catalog, WikiLeaks, Zipcar

Some of its more famous members included the Apple founders Steve Jobs and Steve Wozniak.14 Gates drew the ire of the Homebrew Computer Club by selling something that had previously been given away free—a terrible development for hobbyists. Microsoft’s first software product, Altair BASIC, was sold at a time that software was generally bundled with a hardware purchase. Homebrew members famously started to circulate illegal copies of the software at the group’s meetings—arguably the first instance of pirating software. The Homebrew members were annoyed by a young Gates trying to sell software—it should be free! An angry Gates published an “Open Letter to Hobbyists” in the Homebrew Computer Club’s newsletter, writing, “As the majority of Hobbyists must be aware, most of you steal your software.”15 Jobs and Wozniak, born of the Homebrew Computer Club, took a different approach. The ads that appeared in 1976 for their first Apple computer announced that “our philosophy is to provide software for our machines free or at minimal cost” and “yes folks, Apple BASIC is Free.”16 1984 During the decade after Computer Lib, as personal computers became fixtures in American homes and as computer companies became established organizations in their own right, the notion that personal computers represented a naked challenge to the centralized power of both computing and larger institutions persisted.


pages: 281 words: 95,852

The Googlization of Everything: by Siva Vaidhyanathan

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

1960s counterculture, AltaVista, barriers to entry, Berlin Wall, borderless world, Burning Man, Cass Sunstein, choice architecture, cloud computing, computer age, corporate social responsibility, correlation does not imply causation, data acquisition, death of newspapers, don't be evil, Firefox, Francis Fukuyama: the end of history, full text search, global village, Google Earth, Howard Rheingold, informal economy, information retrieval, Joseph Schumpeter, Kevin Kelly, knowledge worker, libertarian paternalism, market fundamentalism, Marshall McLuhan, means of production, Mikhail Gorbachev, Naomi Klein, Network effects, new economy, Nicholas Carr, PageRank, pirate software, Ray Kurzweil, Richard Thaler, Ronald Reagan, side project, Silicon Valley, Silicon Valley ideology, single-payer health, Skype, social web, Steven Levy, Stewart Brand, technoutopianism, The Nature of the Firm, The Structural Transformation of the Public Sphere, Thorstein Veblen, urban decay, web application

Radical Hindu fundamentalism, which has contributed to the rapes and deaths of thousands of Muslim Indians in the past two decades, has been aided greatly by the rise of global Internet communities devoted to developing a “pure” and portable sense of Hindu identity and thus eroding the eclectic and tolerant traditions of India. The Internet has thus fomented political and religious hatred and violence. Millions of poor people have been able to access Internet services in recent years, thanks to the proliferation of cafes and hot spots in urban India, and they have generated what Liang calls significant “illegal information cities” by using pirated software, discarded or hacked hardware, and stolen electricity. But the marginal improvements to their lives have been trivial compared with the environmental and civic costs they THE GOOGL IZAT I ON OF T HE WORL D 141 have incurred and the outlandish benefits rendered to the elites. The major effects of the Internet on India thus far have been incivility and inequality, not the makings of a global civil society.62 Linguistic differences are, or course, another barrier to the creation of a genuinely global civil society.


pages: 342 words: 95,013

The Zenith Angle by Bruce Sterling

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

airport security, Burning Man, cuban missile crisis, glass ceiling, Grace Hopper, half of the world's population has never made a phone call, Iridium satellite, market bubble, new economy, packet switching, pirate software, profit motive, RFID, Richard Feynman, Richard Feynman, Richard Feynman: Challenger O-ring, Ronald Reagan, Silicon Valley, Steve Jobs, thinkpad, V2 rocket, Y2K

Fawn was a practiced eBay hand. Fawn bought most of her clothes there, from tiny New Age retailers who made anti-allergenic clothing. Now Fawn bought herself a set of fake eBay IDs for “security reasons.” Soon she was elbow-deep in a web of electronic transactions that Van had no time or energy to oversee. The 350 used PCs showed up very quickly. Most of their hard disks were crammed with pirate software, viruses, and pornography, but that posed no problems. Van stuck the 350 PC motherboards into hand-welded frames. He installed a completely new operating system that turned them all into small components of a monster system. Grendel was installed in a spare Internet rack in the bowels of the Vault, directly connected to all-powerful servers in the NSA’s Fort Meade. Days later, Van’s office furniture arrived.


pages: 398 words: 107,788

Coding Freedom: The Ethics and Aesthetics of Hacking by E. Gabriella Coleman

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

Benjamin Mako Hill, crowdsourcing, Debian, dumpster diving, en.wikipedia.org, financial independence, ghettoisation, Hacker Ethic, informal economy, Jacob Appelbaum, Jaron Lanier, Jason Scott: textfiles.com, Jean Tirole, knowledge economy, laissez-faire capitalism, Louis Pasteur, means of production, Paul Graham, pirate software, popular electronics, RFC: Request For Comment, Richard Stallman, rolodex, Ronald Reagan, Silicon Valley, Silicon Valley startup, slashdot, software patent, software studies, Steve Ballmer, Steven Levy, Ted Nelson, the scientific method, The Structural Transformation of the Public Sphere, web application, web of trust

When a little older, perhaps during adolescence, he may have sequestered himself in his bedroom, where he read every computer manual he could get his hands on and—if he was lucky enough to own a modem—connected to a bulletin board system (BBS). Thanks to the holy trinity of a computer, modem, and phone line, he began to dabble in a wider networked world where there was a real strange brew of information and software to ingest. He could not resist. He began to drink himself silly with information on UFOs, bomb building, conspiracies, and other oddities, downloading different categories of software, shareware, sometimes warez (pirated software), and eventually free software.2 Initially he spent so much time chatting he would “pass out on his keyboard, multiple times.” The parents, confusing locked doors and nocturnal living with preteen angst and isolation, wondered whether they should send their son to a psychologist. Once he met like-minded peers in high school, college, or online, the boy’s intellectual curiosity ballooned. He initiated a quest to master all the ins and outs of a technical architecture like the Linux OS, one or two computer languages, and the topographical terrain and protocols of a really cool new virtual place called the Internet.


pages: 346 words: 101,763

Confessions of a Microfinance Heretic by Hugh Sinclair

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

accounting loophole / creative accounting, Bernie Madoff, colonial exploitation, en.wikipedia.org, financial innovation, financial intermediation, Gini coefficient, high net worth, illegal immigration, inventory management, microcredit, Northern Rock, peer-to-peer lending, pirate software, Ponzi scheme, principal–agent problem, profit motive

After the pleasantries Weng had a look through the databases and began: “How many branch you have, please?” “Now LAPO has sixty-three branches.” Weng seemed puzzled. “Sixty-three branches? All using M2 software?” “It is as you say.” “But you only bought twenty-eight licenses.” “Oh, sorry. LAPO has twenty-eight branches.” Weng had a sniff through the databases, and saw sixty-three separate files, one per branch as would be expected. This was mainly pirate software. Weng had perhaps sold only 200 or 300 licenses of his software ever, worldwide, and LAPO had apparently stolen 35 already, and according to their aggressive expansion plan were intending to steal one more license a fortnight. Weng was clearly annoyed, but I pleaded with him to continue working on the condition that I would confront the CEOs of LAPO, Grameen Foundation USA, and Triple Jump to ensure that he would be fully reimbursed for all licenses (which did in fact happen some months later), and Weng reluctantly agreed to continue.


pages: 335 words: 107,779

Some Remarks by Neal Stephenson

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

airport security, augmented reality, barriers to entry, British Empire, cable laying ship, call centre, cellular automata, edge city, Eratosthenes, Fellow of the Royal Society, Hacker Ethic, impulse control, Iridium satellite, Isaac Newton, Jaron Lanier, John von Neumann, Just-in-time delivery, Kevin Kelly, music of the spheres, Norbert Wiener, offshore financial centre, oil shock, packet switching, pirate software, Richard Feynman, Richard Feynman, Saturday Night Live, shareholder value, Silicon Valley, Skype, slashdot, social web, Socratic dialogue, South China Sea, special economic zone, Stephen Hawking, the scientific method, trade route, Turing machine, uranium enrichment, Vernor Vinge, X Prize

Whenever it ran low, he was compelled by certain murkily described safety regulations to leave me a block away from the fuel pumps while he filled it up, which imparted an air of drama to the procedure. One day, on the outskirts of Shanghai, I stumbled across a brand-new computer store with several large floral arrangements set up in front. A brass plaque identified it, imposingly enough, as the Shanghai Fanxin Computer System Application Technology Research Institute. Walking in, I saw the usual rack full of badly printed manuals for pirated software and a cardboard box brimming with long red skeins of firecrackers. The place was otherwise indistinguishable from any cut-rate consumer electronics outlet in the States, with the usual exception that it was smaller and more tightly packed together. There were a couple of dozen people there, but they weren’t acting like salespeople and customers; they were milling around talking. It turned out that they had just opened their doors something like an hour before I arrived.


pages: 362 words: 86,195

Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down the Internet by Joseph Menn

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

Brian Krebs, dumpster diving, fault tolerance, Firefox, Menlo Park, offshore financial centre, pirate software, Plutocrats, plutocrats, popular electronics, profit motive, RFID, Silicon Valley, zero day

He found 555 addresses that tried to infect visitors’ Web browsers, 47 containing child porn, 15 with conventional porn, 8 providing command-and-control functions that managed botnets, 5 selling scareware (the fake anti-spyware programs that trick users into thinking a download will scan and secure their computers), 4 used in financial fraud, 3 offering to pay outsiders to install malicious programs on PCs, 2 holding masses of pirated software, and 1 recruiting mules to move money around the planet. Until 2007, when the RBN got too much attention and dropped its public website, it had an official responsible for handling abuse complaints. The official generally demanded a Russian court order before cutting anyone off. But that’s not to say the company didn’t take note of such complaints—according to Zenz, it warned customers that if there was too much heat from what they were doing, it would have to charge them more.


pages: 369 words: 90,630

Mindwise: Why We Misunderstand What Others Think, Believe, Feel, and Want by Nicholas Epley

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

affirmative action, airport security, Amazon Mechanical Turk, Cass Sunstein, crowdsourcing, cuban missile crisis, friendly fire, invisible hand, meta analysis, meta-analysis, Milgram experiment, payday loans, Peter Singer: altruism, pirate software, Richard Thaler, school choice, the scientific method, theory of mind

You cover meals for friends while traveling and submit the receipts for reimbursement YES – 86% 72% NO – 14% 60% You pace your work to avoid getting new tasks YES – 23% 55% NO – 77% 68% You call in sick to get a day off YES – 71% 66% NO – 29% 64% You bluff about the money you currently make in a negotiation with a potential employer YES – 53% 61% NO – 47% 71% You agree to perform a task you have no real intention of performing YES – 73% 68% NO – 27% 69% You take office supplies from your office for personal use YES – 66% 62% NO – 43% 65% You pirate software from work and install it on your home computer YES – 94% 72% NO – 6% 56% You withhold information from colleagues who are competing for the same promotion YES – 25% 69% NO – 75% 52% You download copyrighted materials (songs, videos) without paying for them while working YES – 70% 69% NO – 30% 66% I asked my MBA students whether they considered various business practices to be unethical.


pages: 302 words: 82,233

Beautiful security by Andy Oram, John Viega

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

Albert Einstein, Amazon Web Services, business intelligence, business process, call centre, cloud computing, corporate governance, credit crunch, crowdsourcing, defense in depth, en.wikipedia.org, fault tolerance, Firefox, loose coupling, market design, Monroe Doctrine, new economy, Nicholas Carr, Nick Leeson, Norbert Wiener, optical character recognition, packet switching, performance metric, pirate software, Search for Extraterrestrial Intelligence, security theater, SETI@home, Silicon Valley, Skype, software as a service, statistical model, Steven Levy, The Wisdom of Crowds, Upton Sinclair, web application, web of trust, x509 certificate, zero day, Zimmermann PGP

The company system administrative team was questioned and the unpleasant truth came out: the FTP server had a world-writable directory for customers to upload the logfiles used for troubleshooting. Unrestricted anonymous uploads were possible, as on many classic FTP servers, to a directory named incoming, and it was set up in the most insecure manner possible: anonymous users were able to read any of the files uploaded by other people. Among other things, this presents a risk of an FTP server being used by anonymous outside parties to store and exchanges pirated software. Bringing Data Back from the Dead After network log analysis, it was time for some forensics on the hard drive. We decided to look for fragments of logfiles (originally in /var/log) to confirm the nature of the attack as well as to learn other details. The investigation brought up the following log fragments from the system messages log, the network access log, and the FTP transfer log (fortunately, the FTP server was verbosely logging all transfers): Oct 1 00:08:25 ftp ftpd[27651]: ANONYMOUS FTP LOGIN FROM [], mozilla@ Oct 1 00:17:19 ftp ftpd[27649]: lost connection to [] Oct 1 00:17:19 ftp ftpd[27649]: FTP session closed Oct 1 02:21:57 ftp ftpd[27703]: ANONYMOUS FTP LOGIN FROM [], mozilla@ Oct 1 02:29:45 ftp ftpd[27731]: ANONYMOUS FTP LOGIN FROM [], x@ Oct 1 02:30:04 ftp ftpd[27731]: Can't connect to a mailserver.


pages: 538 words: 141,822

The Net Delusion: The Dark Side of Internet Freedom by Evgeny Morozov

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

A Declaration of the Independence of Cyberspace, Ayatollah Khomeini, Berlin Wall, borderless world, Buckminster Fuller, Cass Sunstein, citizen journalism, cloud computing, cognitive dissonance, Columbine, computer age, conceptual framework, crowdsourcing, Dissolution of the Soviet Union, don't be evil, failed state, Fall of the Berlin Wall, Francis Fukuyama: the end of history, global village, Google Earth, illegal immigration, invention of radio, invention of the printing press, invisible hand, John von Neumann, Marshall McLuhan, Naomi Klein, Network effects, new economy, New Urbanism, pirate software, pre–internet, Productivity paradox, RAND corporation, Ronald Reagan, Ronald Reagan: Tear down this wall, Silicon Valley, Silicon Valley startup, Sinatra Doctrine, Skype, Slavoj Žižek, social graph, Steve Jobs, technoutopianism, The Wisdom of Crowds, urban planning, Washington Consensus, WikiLeaks, women in the workforce

Given that historical memory—especially of the Stalin period—is a sensitive issue in Russia, finding fault with Memorial, which happens to be a staunch critic of the Kremlin, wouldn’t be so hard. Russian police are notorious for finding fault with the most innocuous of documents or, worse, software and operating systems. (Quite a few Russian NGOs use illegal software in their offices, often without even realizing it until it is too late; on more than one occasion, the war on pirated software, which the West expects Moscow to fight with all its vigor, has been a good excuse to exert more pressure on dissenting NGOs.) Fortunately, the courts concluded that the search had been conducted in violation of legal due process, and Memorial’s hard drives were returned in May 2009. Nevertheless, the fact that authorities had simply walked in and confiscated twenty years of work posed a lot of questions about how activists might make digital data more secure.


pages: 205 words: 18,208

The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? by David Brin

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

affirmative action, airport security, Ayatollah Khomeini, clean water, cognitive dissonance, corporate governance, data acquisition, death of newspapers, Extropian, Howard Rheingold, illegal immigration, informal economy, Iridium satellite, Jaron Lanier, John von Neumann, Kevin Kelly, means of production, mutually assured destruction, offshore financial centre, open economy, packet switching, pattern recognition, pirate software, placebo effect, Plutocrats, plutocrats, prediction markets, Ralph Nader, RAND corporation, Saturday Night Live, Search for Extraterrestrial Intelligence, Steve Jobs, Steven Levy, Stewart Brand, telepresence, trade route, Vannevar Bush, Vernor Vinge, Whole Earth Catalog, Whole Earth Review, Yogi Berra, Zimmermann PGP

While some champion the advantages of anonymity, others cite its downside. Professor Trotter Hardy, at the College of William and Mary, says, “Anonymity is power and I think it will be abused on the Net.” The White House computer network has received anonymous death threats against the president. Electronic “mail bombs” (Trojan horse programs and viruses) can now be sent anonymously, and individuals can pirate software without being traced. There is concern that digital cash, a form of electronic money that allows for untraceable financial transactions, will usher in new forms of racketeering and money laundering. An Internet site called Fakemail let people write mail from an imaginary e-mailbox, using an alias. Commonly used names included Bill Gates, Bill Clinton, Elvis, and God. The service shut down when numerous people traced harassing mail back to its source, but others have taken its place.


pages: 478 words: 149,810

We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency by Parmy Olson

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

4chan, Asperger Syndrome, bitcoin, call centre, Chelsea Manning, corporate governance, crowdsourcing, Firefox, hive mind, Julian Assange, Minecraft, Occupy movement, pirate software, side project, Skype, speech recognition, Stephen Hawking, Stuxnet, We are Anonymous. We are Legion, We are the 99%, web application, WikiLeaks, zero day

It looked like Barr might actually point the finger at some innocent people. In the meantime, Tflow had downloaded Barr’s e-mails onto his server, then waited about fifteen hours for them to compile into a torrent, a tiny file that linked to a larger file on a host computer somewhere else, in this case HBGary’s. It was a process that millions of people across the world used every day to download pirated software, music, or movies, and Tflow planned to put his torrent file on the most popular torrenting site around: The Pirate Bay. This meant that soon, anyone could download and read more than forty thousand of Aaron Barr’s e-mails. That morning, with about thirty hours until kickoff, Barr ran some checks on HBGaryFederal.com and, just as he had expected, saw it was getting more traffic than usual.


pages: 470 words: 144,455

Secrets and Lies: Digital Security in a Networked World by Bruce Schneier

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

Ayatollah Khomeini, barriers to entry, business process, butterfly effect, cashless society, Columbine, defense in depth, double entry bookkeeping, fault tolerance, game design, IFF: identification friend or foe, John von Neumann, knapsack problem, mutually assured destruction, pez dispenser, pirate software, profit motive, Richard Feynman, Richard Feynman, risk tolerance, Silicon Valley, Simon Singh, slashdot, statistical model, Steve Ballmer, Steven Levy, the payments system, Y2K, Yogi Berra

These numbers were inflated, since they make the mendacious assumption that everyone who pirates a copy of (for example) Autodesk’s 3D Studio MAX would have otherwise paid $2,995—or $3,495 if you use the retail price rather than the street price—for it. The prevalence of software piracy greatly depends on the country: It is thought that 95 percent of the software in the People’s Republic of China is pirated, while only 50 percent of the software in Canada is pirated. (Vietnam wins, with 98 percent pirated software.) Software companies, rightfully so, are miffed at these losses. Piracy happens on different scales. There are disks shared between friends, downloads from the Internet (search under warez to find out more about this particular activity), and large-scale counterfeiting operations (usually run in the Far East). Piracy also happens to data. Whether it’s pirated CDs of copyrighted music hawked on the backstreets of Bangkok or MP3 files of copyrighted music peddled on the Web, digital intellectual property is being stolen all the time.


pages: 457 words: 126,996

Hacker, Hoaxer, Whistleblower, Spy: The Story of Anonymous by Gabriella Coleman

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

1960s counterculture, 4chan, Amazon Web Services, Bay Area Rapid Transit, bitcoin, Chelsea Manning, citizen journalism, cloud computing, collective bargaining, corporate governance, crowdsourcing, David Graeber, Debian, East Village, Edward Snowden, feminist movement, hive mind, impulse control, Jacob Appelbaum, jimmy wales, Julian Assange, Mohammed Bouazizi, Network effects, Occupy movement, pirate software, Richard Stallman, SETI@home, side project, Silicon Valley, Skype, Steven Levy, WikiLeaks, zero day

When I interview hackers who were active in the 1990s about their trolling activities, the conversation inevitably turns toward a discussion of the most feared hacker troll of the era: “u4ea” (pronounced “euphoria” and eerily similar to “lulz” in its figuration). So terrifying was this troll’s reign that every time I utter or type u4ea to one of his contemporaries, their demeanor blackens and proceedings assume an unmatched seriousness. u4ea is Canadian. More notoriously, this troll was “founder, president, and dictator for life” of hacker group BRoTHeRHooD oF WaReZ. (“BoW” for short. Warez is pirated software. “BoW” is meant to poke fun at Bulletin Board System warez groups.) According to a former member who I chatted with online, the “paramilitary wing” of BoW, called “Hagis” (short for “Hackers Against Geeks in Snowsuits”), went on cruel hacking and pranking campaigns against targets ranging from corporations, “white hat” hackers, infosecurity gurus, and basically anyone else who got in their line of fire.


pages: 607 words: 133,452

Against Intellectual Monopoly by Michele Boldrin, David K. Levine

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

accounting loophole / creative accounting, agricultural Revolution, barriers to entry, cognitive bias, David Ricardo: comparative advantage, Dean Kamen, Donald Trump, double entry bookkeeping, en.wikipedia.org, Ernest Rutherford, experimental economics, financial innovation, informal economy, interchangeable parts, invention of radio, invention of the printing press, invisible hand, James Watt: steam engine, Jean Tirole, John Harrison: Longitude, Joseph Schumpeter, linear programming, market bubble, market design, mutually assured destruction, Nash equilibrium, new economy, open economy, pirate software, placebo effect, price discrimination, profit maximization, rent-seeking, Richard Stallman, Silicon Valley, Skype, slashdot, software patent, the market place, total factor productivity, trade liberalization, transaction costs, Y2K

Too bad we do not have time to write an entire encyclopedia of competitive innovations. We could tell of similar wonders in the American automobile industry, the Swiss and German chemical industries, the worldwide oxygen steelmaking industries, the Italian textile and fashion industries, the Swiss watch industry, the wine farms of Europe and California, the Czech and Venetian glass industries, and so on and so forth.8 “Pirating” Software The idea that a software producer – say, Microsoft – could earn a profit without copyright protection always puzzles people. Without copyright protection, wouldn’t “pirates” step in and sell cheaper imitations, putting Microsoft out of business? Although this is an interesting theory of how markets work, it is not one supported by the facts. Again, we turn to open-source software and the Linux computer operating system.


Common Knowledge?: An Ethnography of Wikipedia by Dariusz Jemielniak

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

Andrew Keen, barriers to entry, citation needed, collaborative consumption, collaborative editing, conceptual framework, continuous integration, crowdsourcing, Debian, deskilling, digital Maoism, en.wikipedia.org, Filter Bubble, Google Glasses, Hacker Ethic, hive mind, Internet Archive, invisible hand, Jaron Lanier, jimmy wales, job satisfaction, Julian Assange, knowledge economy, knowledge worker, Menlo Park, moral hazard, online collectivism, pirate software, RFC: Request For Comment, Richard Stallman, Silicon Valley, Skype, slashdot, social software, Stewart Brand, The Nature of the Firm, The Wisdom of Crowds, transaction costs, WikiLeaks, wikimedia commons

Jemielniak, 2012), that the 5 6    F o r m a l R o l e s a n d H i e rarch y number of edits becomes the single most important value indicator independent from holding democratically elected seats is likely detrimental to Wikipedia in the long term, since it deters people who would prefer to specialize in a few high-quality, major contributions. However, such a process is one of the typical symptoms of organizational bureaucratization (Blau & Scott, 1962), which I address in Chapter 4. The obsession with number of edits may be related with yet another phenomenon. For Alf Rehn (2004) warez (software pirate) communities depend on the gift-economy principle. Uploading pirated software is a symbolic gesture emphasizing participation in the community and influencing the giver’s status. Other researchers point out that open-source communities in general rely on the principle of gift giving to organize the social relations within the community (Raymond, 1999/2004; Bergquist & Ljungberg, 2001; Kelty, 2006). They are a specific “marriage of altruism and self-interest” (Rheingold, 1994, p. 58) and form a gift economy, a postcapitalist form of society (Barbrook, 1998).7 Similarly, on Wikipedia the number of contributions has a strong symbolic value used in determining an editor’s position in the group.


pages: 547 words: 160,071

Underground by Suelette Dreyfus

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

airport security, invisible hand, Julian Assange, Loma Prieta earthquake, packet switching, pirate software, profit motive, publish or perish, RFC: Request For Comment, Ronald Reagan, Stephen Hawking, Steven Levy, Stuxnet, uranium enrichment, urban decay, WikiLeaks, zero day

Anyone could wander in, plop down at the bar and start up a conversation with a group of locals. Just ring up the system with your modem and type in your details – real name, your chosen handle, phone number and other basic information. Many BBS users gave false information in order to hide their true identities, and many operators didn’t really care. Bowen, however, did. Running a hacker’s board carried some risk, even before the federal computer crime laws came into force. Pirated software was illegal. Storing data copied from hacking adventures in foreign computers might also be considered illegal. In an effort to exclude police and media spies, Bowen tried to verify the personal details of every user on PI by ringing them at home or work. Often he was successful. Sometimes he wasn’t. The public section of PI housed discussion groups on the major PC brands – IBM, Commodore, Amiga, Apple and Atari – next to the popular Lonely Hearts group.


pages: 537 words: 158,544

Second World: Empires and Influence in the New Global Order by Parag Khanna

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

Admiral Zheng, affirmative action, anti-communist, Asian financial crisis, Bartolomé de las Casas, Branko Milanovic, British Empire, call centre, capital controls, central bank independence, cognitive dissonance, colonial rule, complexity theory, crony capitalism, Deng Xiaoping, Dissolution of the Soviet Union, Donald Trump, Edward Glaeser, energy security, European colonialism, facts on the ground, failed state, flex fuel, Francis Fukuyama: the end of history, friendly fire, Gini coefficient, global reserve currency, global supply chain, haute couture, Hernando de Soto, illegal immigration, income inequality, informal economy, invisible hand, Islamic Golden Age, Khyber Pass, knowledge economy, land reform, low skilled workers, means of production, megacity, Monroe Doctrine, oil shale / tar sands, oil shock, open borders, open economy, Pax Mongolica, pirate software, Plutonomy: Buying Luxury, Explaining Global Imbalances, Potemkin village, price stability, race to the bottom, RAND corporation, reserve currency, rising living standards, Ronald Reagan, Silicon Valley, Skype, South China Sea, special economic zone, stem cell, Stephen Hawking, Thomas L Friedman, trade route, trickle-down economics, uranium enrichment, urban renewal, Washington Consensus, women in the workforce

Suttmeier, “Assessing China’s Technology Potential,” Georgetown Journal of International Affairs, Summer–Fall 2004, 97–105. 28. See “Red, Inc.,” Harper’s, February 2006. 29. But Western firms can profit when Chinese companies enter the marketplace rather than merely dumping products on it. For example, Lenovo’s purchase of an IBM division required it to legally install Windows operating software, transforming Microsoft from victim to winner in China in spite of all the pirated software circulating in the country. 30. This notion is both implied and supported by the doctrine of “small state, big society.” 31. According to the Chinese Academy of Social Sciences (CASS), China has twelve distinct social strata, not the usual three, which is appropriate for a country of its size. 32. Most of China’s poverty eradication happened in the 1980s, when FDI was much lower, as a result of nascent private-sector lending and rural investment, which gave a boost to high-employment sectors like food processing.


pages: 636 words: 202,284

Piracy : The Intellectual Property Wars from Gutenberg to Gates by Adrian Johns

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

banking crisis, Berlin Wall, British Empire, Buckminster Fuller, business intelligence, Corn Laws, demand response, distributed generation, Douglas Engelbart, Edmond Halley, Ernest Rutherford, Fellow of the Royal Society, full employment, Hacker Ethic, Howard Rheingold, informal economy, invention of the printing press, Isaac Newton, James Watt: steam engine, John Harrison: Longitude, Marshall McLuhan, Mont Pelerin Society, new economy, New Journalism, Norbert Wiener, pirate software, Republic of Letters, Richard Stallman, road to serfdom, Ronald Coase, software patent, South Sea Bubble, Steven Levy, Stewart Brand, Ted Nelson, the scientific method, traveling salesman, Whole Earth Catalog

In other words, an Internet invasion might be a “manifesto” of public empowerment. This provoked the disintegration of the colloquy. Clifford Stoll, the exposer of the espionage ring, asked drily whether there had once been a “vandal’s ethic.” His point was that electronic neighborhoods were “built on trust,” as real ones were. Hackers eroded that foundation. No community could survive their “spreading viruses, pirating software, and destroying people’s work.” A contributor calling himself Homeboy went further still. “Are crackers really working for the free flow of information,” he asked, or were they in effect “unpaid tools of the establishment?” At this point, eight days into the conference, John Barlow (author of the Declaration of the Independence of Cyberspace) suddenly denied pointblank that a system’s flaws could justify hacking into it.


pages: 889 words: 433,897

The Best of 2600: A Hacker Odyssey by Emmanuel Goldstein

Amazon: amazon.comamazon.co.ukamazon.deamazon.fr

affirmative action, Apple II, call centre, don't be evil, Firefox, game design, Hacker Ethic, hiring and firing, information retrieval, late fees, license plate recognition, optical character recognition, packet switching, pirate software, place-making, profit motive, QWERTY keyboard, RFID, Robert Hanssen: Double agent, rolodex, Ronald Reagan, Silicon Valley, Skype, spectrum auction, statistical model, Steve Jobs, Steve Wozniak, Steven Levy, Telecommunications Act of 1996, telemarketer, Y2K

PayPal does not implement the hard parts of such a system, which require a trusted intermediary (not one who profits from every type of transaction, including illegitimate ones, as PayPal does), and strong cryptographic methods of ensuring identity while maintaining anonymity. PayPal is ubiquitous, but has flaws. Let the buyer, and the seller, beware. Hacking Answers by Gateway (Summer, 2007) By Franz Kafka I used to work as a technical support representative for Answers by Gateway and would serve as a corporate guardian to ensure that people calling in about pirated software or to help crack passwords were not helped. I have parted ways because my colleagues 729 94192c17.qxd 6/4/08 3:47 AM Page 730 730 Chapter 17 have a different mentality about hacking than I do. Most people who work as technicians (with some exceptions) can’t program in any language, not even in Visual Basic. But there are some ways the people who call in to Answers by Gateway can get help.