Реферат по предмету "Иностранный язык"


CyberCommunism The New Threat In The New

Millennium Essay, Research Paper

My expedition into cyber-communism began when I read Brock Meeks’ “Hackers Stumble Toward Legitimacy”[1]. The article addressed a recent hackers’ convention. Interestingly, the keynote speaker was Eric Boucher[2] (alias Jello Biafra[3]), a rock star with no technical background. Numerous questions ensue. Who is Eric Boucher (alias Jello Biafra)? What does he believe? More importantly, why schedule someone with no technical background to speak at a hackers’ convention? Addressing his beliefs, his proposed Green Party platform[4] is not inconsistent with the “Manifesto of Libertarian Communism”[5]. This answer produces a more troubling question. Was his speech against corporate America mere socialist babbling or was his speech part of something more sinister, a subversive cyber-communist movement?

I am not the first to see possible communist subversion of the digerati[6]. Corey Winesett’s “Are Linux Users Really Communists?”[7] questions the nature of the relationship, if any, between open source and communism. Scott Billings’ “Heresy and Communism”[8] ponders that the Linux community’s knee-jerk reaction to negative opinions about Linux could be the result of being “under the [communists'] spell.” Before I can evaluate cyber-communism’s merits, I must define communism’s true nature and communism’s real threat to America.

Communism Revisited

Theoretical communism and practical communism have long been held as different political sociologies. Despite Marx’s call for the working class to revolt, the communist revolution’s leaders always ascend from the intelligentsia. John Stormer’s “None Dare Call It Treason” supports this fact saying:

“Fidel Castro was a product, not of the cane fields of Cuba, but of the halls of Havana University.”

“Joseph Stalin was not a simple peasant rebelling at the oppression of the Czar. He became a communist while studying for the priesthood in a Russian Orthodox seminary.”

“The membership of the first Communist spy ring uncovered in the U.S. Government was not spawned in the sweat shops of New York’s lower east side or the tenant farms of the South. [The conspirators] came to high government posts from Harvard Law School.”

Communism’s fallacy is the belief in everyone’s benevolence; yet, human nature proves otherwise. Communism cannot create a perfect society with imperfect people. Hence, to direct Utopia, communism produces a totalitarian government over the less-perfect people, ruled by the perfect people – communists. Thus, communism’s true nature creates a controlling government in the name of a better world.

Not every supporter needs be a knowing conspirator. Supporters could be “under the [communists'] spell.” Therefore, the true communist threat comes from people who can be deluded into supporting a controlling government in the name of a better world. John Stormer’s “None Dare Call It Treason” concurs with this conclusion saying:

“Communism is a disease of the intellect. It promises universal brotherhood, peace and prosperity to lure humanitarians and idealists into participating in a conspiracy which gains power through deceit and deception and stays in power with brute force.”

From Communism to Cyber-Communism

Richard Barbrook’s “The::Cyber.Com/Munist::Manifesto”[9] and “Cyber-Communism: How Americans are Superseding Capitalism in Cyberspace” (parts 1[10], 2[11], 3[12], 4[13]) draw parallels between communism and cyber-communism. He associates the Soviet Union’s gift/communist economy, where people freely exchange material goods, with the open source gift/cyber-communist economy, where people freely exchange source code. He concludes that cyber-communism promises a digital Utopia.

However, like communism’s promises, cyber-communism’s promises are not manifesting themselves. Monty Manley’s “Be an Engineer, Not an Artist”[14] cites poorly designed code to assert that unpaid programmers will work only on “sexy” projects. Scott Billings’ “Where’s the Creativity?”[15] challenges Linux supporters to show one original idea in Linux, reminding us that Linux itself is not an original idea.

Now, I am not condemning open source itself. Cyber-communism’s fallacy is funding the open source development method. Xavier Basora’s “Open Source and Nag Screens: Contradictions of the Bazaar”[16] mentions a shareware open source program to demonstrate the difficulty of funding “free” software. Eric Raymond’s “The Magic Cauldron”[17] provides many theoretical economic models, but he fails to provide any case studies to demonstrate their practicality. Red Hat follows Eric Raymond’s economic model and still suffers fiscal losses. Richard Stallman’s “The GNU Manifesto”[18] admits programmers will “not [be] paid as much as now.” Therefore, cyber-communism’s true nature moves software development to an unfeasible economic model. Andrew Leonard’s “The Cybercommunist Manifesto”[19] concurs with this conclusion in his critique of Richard Barbrook saying:

“Barbrook’s analysis does jibe well with fears expressed by some software programmers concerning the possibility that free software could prove to be an economic disaster for the software industry.”

Cyber-communism, like communism, is about control. John Zedlewski’s “Winning the Open-Source Support Game”[20] proposes that one company provide technical support for all open source software. Instead, his plan would only create an open source support monopoly. Liviu Andreescu’s “What to do about Monopolies?”[21] says, “Communism has nothing to do with turning… [Microsoft's] code in open source.” To the contrary, cyber-communism wants all products to move into open source to shift control from the corporation to the digerati. Thus, the true cyber-communist threat comes from the digerati’s members who can be duped into supporting an economically unfeasible development method.

Subversion is already in progress. “Hacker”[22] originally meant highly skilled programmer. Eric Raymond’s “How to Become a Hacker”[23] redefines “hacker” as a programmer who supports open source. Robert Lemos’ “The New Age of Hacktivism”[24] observes hacking being done for political reasons. Still, halting cyber-communism is not difficult.

Halting the Red Menace

Stopping cyber-communism is simple. We need only break the cyber-communists’ source of control. End-users depend on the digerati/hackers to provide technical support. To break the dependency, we need to made technology so easy that everyone can use it, as said in John Holmes’ “The Age of Everyman Tech: The End of Geekdom As We Know It”[25]. However, Michael Kellen’s “Death to Wizards!”[26] illustrates that some, mostly cyber-communists, will oppose easy-to-use. Besides, an easy-to-use program translates into little technical support revenue for an already failing economic model.

1 http://www.msnbc.com/news/435153.asp

2 http://music.excite.com/artist/biography/2089

3 http://www.ipass.net/~jthrush/biafra.htm

4 http://www.angelfire.com/punk/jello2000/platform.html

5 http://flag.blackened.net/daver/anarchism/mlc/mlc1.html

6 http://www.techweb.com/encyclopedia/defineterm?term=digerati

7 http://www.osopinion.com/Opinions/CoreyWinesett/CoreyWinesett2.html

8 http://www.osopinion.com/Opinions/ScottBillings/ScottBillings5.html

9 http://www.nettime.org/nettime.w3archive/199912/msg00146.html

10 http://www.nettime.org/nettime.w3archive/199909/msg00046.html

11 http://www.nettime.org/nettime.w3archive/199909/msg00047.html

12 http://www.nettime.org/nettime.w3archive/199909/msg00049.html

13 http://www.nettime.org/nettime.w3archive/199909/msg00045.html

14 http://www.osopinion.net/Opinions/MontyManley/MontyManley17.html

15 http://www.osopinion.com/Opinions/ScottBillings/ScottBillings3.html

16 http://www.osopinion.net/Opinions/XavierBasora/XavierBasora80.html

17 http://www.tuxedo.org/~esr/writings/magic-cauldron/magic-cauldron.html

18 http://www.gnu.org/gnu/manifesto.html

19 http://www.salon.com/tech/log/1999/09/10/cybercommunism/

20 http://www.osopinion.net/Opinions/JohnZedlewski/JohnZedlewski4.html

21 http://www.osopinion.com/Opinions/LiviuAndreescu/LiviuAndreescu2.html

22 http://www.techweb.com/encyclopedia/defineterm?term=hacker

23 http://www.tuxedo.org/~esr/faqs/hacker-howto.html

24 http://www.zdnet.com/zdnn/stories/news/0,4586,2651320,00.html

25 http://www.osopinion.com/Opinions/JohnHolmes/JohnHolmes3.html

26 http://www.osopinion.com/perl/story/6123.html

370




Не сдавайте скачаную работу преподавателю!
Данный реферат Вы можете использовать для подготовки курсовых проектов.

Поделись с друзьями, за репост + 100 мильонов к студенческой карме :

Пишем реферат самостоятельно:
! Как писать рефераты
Практические рекомендации по написанию студенческих рефератов.
! План реферата Краткий список разделов, отражающий структура и порядок работы над будующим рефератом.
! Введение реферата Вводная часть работы, в которой отражается цель и обозначается список задач.
! Заключение реферата В заключении подводятся итоги, описывается была ли достигнута поставленная цель, каковы результаты.
! Оформление рефератов Методические рекомендации по грамотному оформлению работы по ГОСТ.

Читайте также:
Виды рефератов Какими бывают рефераты по своему назначению и структуре.

Сейчас смотрят :

Реферат Венеция: один день на Большом канале
Реферат Anne Stevenson Poem The Victory Essay Research
Реферат Международная миграция рабочей силы: причины и последствия
Реферат Любовь Достоевского
Реферат Психология преступника и расследования преступлений, Антонян, Еникеев, Эминов
Реферат Культура. Основные понятия
Реферат Техническое задание
Реферат Инженерно-геологическое обоснование и задачи проектируемых работ на объекте Детский сад на 280 мест в микрорайоне Спутник в г. Белгороде
Реферат Чрезвычайные ситуации природного характера Оползни сели и обвалы Их происхождение Правила поведения
Реферат Нахождение всех действительных корней алгебраического многочлена методом деления отрезка пополам (бисекции)
Реферат Понятие права природопользования и его виды
Реферат Методические рекомендации по совершенствованию словообразования глаголов у дошкольников с общим недоразвитием речи
Реферат Програма впровадження етики в державну службу обласного рівня
Реферат Особливості роботи операційної системи Windows
Реферат Чароит