New Articles (Page 282)
To stay up to date you can also follow on Mastodon.
π The Mother of All Demos
"The Mother of All Demos" is a name retroactively applied to a landmark computer demonstration, given at the Association for Computing Machinery / Institute of Electrical and Electronics Engineers (ACM/IEEE)βComputer Society's Fall Joint Computer Conference in San Francisco, which was presented by Douglas Engelbart on December 9, 1968.
The live demonstration featured the introduction of a complete computer hardware and software system called the oN-Line System or, more commonly, NLS. The 90-minute presentation essentially demonstrated almost all the fundamental elements of modern personal computing: windows, hypertext, graphics, efficient navigation and command input, video conferencing, the computer mouse, word processing, dynamic file linking, revision control, and a collaborative real-time editor (collaborative work). Engelbart's presentation was the first to publicly demonstrate all of these elements in a single system. The demonstration was highly influential and spawned similar projects at Xerox PARC in the early 1970s. The underlying technologies influenced both the Apple Macintosh and Microsoft Windows graphical user interface operating systems in the 1980s and 1990s.
Discussed on
- "The Mother of All Demos" | 2023-07-13 | 42 Upvotes 1 Comments
- "The Mother of All Demos" | 2013-07-05 | 67 Upvotes 4 Comments
π Free Speech Zone
Free speech zones (also known as First Amendment zones, free speech cages, and protest zones) are areas set aside in public places for the purpose of political protesting. The First Amendment to the United States Constitution states that "Congress shall make no law ... abridging ... the right of the people peaceably to assemble, and to petition the Government for a redress of grievances." The existence of free speech zones is based on U.S. court decisions stipulating that the government may reasonably regulate the time, place, and manner β but not content β of expression.
The Supreme Court has developed a four-part analysis to evaluate the constitutionality of time, place and manner (TPM) restrictions. To pass muster under the First Amendment, TPM restrictions must be neutral with respect to content, be narrowly drawn, serve a significant government interest, and leave open alternative channels of communication. Application of this four-part analysis varies with the circumstances of each case, and typically requires lower standards for the restriction of obscenity and fighting words.
Free speech zones have been used at a variety of political gatherings. The stated purpose of free speech zones is to protect the safety of those attending the political gathering, or for the safety of the protesters themselves. Critics, however, suggest that such zones are "Orwellian", and that authorities use them in a heavy-handed manner to censor protesters by putting them literally out of sight of the mass media, hence the public, as well as visiting dignitaries. Though authorities generally deny specifically targeting protesters, on a number of occasions, these denials have been contradicted by subsequent court testimony. The American Civil Liberties Union (ACLU) has filed, with various degrees of success and failure, a number of lawsuits on the issue.
Though free speech zones existed prior to the Presidency of George W. Bush, it was during Bush's presidency that their scope was greatly expanded. These zones continued through the presidency of Barack Obama; he signed a bill in 2012 that expanded the power of the Secret Service to restrict speech and make arrests.
Many colleges and universities earlier instituted free speech zone rules during the Vietnam-era protests of the 1960s and 1970s. In recent years, a number of them have revised or removed these restrictions following student protests and lawsuits.
Discussed on
- "Free Speech Zone" | 2013-06-29 | 70 Upvotes 22 Comments
π For Edward Snowden: How to live in an airport
Mehran Karimi Nasseri (Persian: Ω ΩΨ±Ψ§Ω Ϊ©Ψ±ΫΩ Ϋ ΩΨ§Ψ΅Ψ±Ϋβ pronounced [mehΛrΙn kΓ¦riΛmi nΙseΛri]; born 1946), also known as Sir Alfred Mehran, is an Iranian refugee who lived in the departure lounge of Terminal One in Charles de Gaulle Airport from 26 August 1988 until July 2006, when he was hospitalized. His autobiography was published as a book, The Terminal Man, in 2004. His story was the inspiration for the 2004 Steven Spielberg film The Terminal.
Discussed on
- "For Edward Snowden: How to live in an airport" | 2013-06-27 | 10 Upvotes 1 Comments
π GEOS 8-bit operating system
GEOS (Graphic Environment Operating System) is a discontinued operating system from Berkeley Softworks (later GeoWorks). Originally designed for the Commodore 64 with its version being released in 1986, enhanced versions of GEOS later became available in 1987 for the Commodore 128 and in 1988 for the Apple II family of computers. A lesser-known version was also released for the Commodore Plus/4.
GEOS closely resembles early versions of the classic Mac OS and includes a graphical word processor (geoWrite) and paint program (geoPaint).
A December 1987 survey by the Commodore-dedicated magazine Compute!'s Gazette found that nearly half of respondents used GEOS. For many years, Commodore bundled GEOS with its redesigned and cost-reduced C64, the C64C. At its peak, GEOS was the third-most-popular microcomputer operating system in the world in terms of units shipped, trailing only MS-DOS and Mac OS (besides the original Commodore 64's KERNAL).
Other GEOS-compatible software packages were available from Berkeley Softworks or from third parties, including a reasonably sophisticated desktop publishing application called geoPublish and a spreadsheet called geoCalc. While geoPublish is not as sophisticated as Aldus Pagemaker and geoCalc not as sophisticated as Microsoft Excel, the packages provide reasonable functionality, and Berkeley Softworks founder Brian Dougherty claimed the company ran its business using its own software on Commodore 8-bit computers for several years.
Discussed on
- "GEOS 8-bit operating system" | 2013-06-24 | 13 Upvotes 4 Comments
π The Dreyfus affair
The Dreyfus Affair (French: l'affaire Dreyfus, pronouncedΒ [lafΙΛΚ dΚΙfys]) was a political scandal that divided the Third French Republic from 1894 until its resolution in 1906. "The Affair", as it is known in French, has come to symbolise modern injustice in the Francophone world, and it remains one of the most notable examples of a complex miscarriage of justice and antisemitism. The role played by the press and public opinion proved influential in the conflict.
The scandal began in December 1894 when Captain Alfred Dreyfus was convicted of treason. Dreyfus was a 35-year-old Alsatian French artillery officer of Jewish descent. He was sentenced to life imprisonment for allegedly communicating French military secrets to the German Embassy in Paris, and was imprisoned on Devil's Island in French Guiana, where he spent nearly five years.
In 1896, evidence came to lightβprimarily through an investigation instigated by Georges Picquart, head of counter-espionageβwhich identified the real culprit as a French Army major named Ferdinand Walsin Esterhazy. When high-ranking military officials suppressed the new evidence, a military court unanimously acquitted Esterhazy after a trial lasting only two days. The Army laid additional charges against Dreyfus, based on forged documents. Subsequently, Γmile Zola's open letter J'Accuseβ¦!, stoked a growing movement of support for Dreyfus, putting pressure on the government to reopen the case.
In 1899, Dreyfus was returned to France for another trial. The intense political and judicial scandal that ensued divided French society between those who supported Dreyfus (now called "Dreyfusards"), such as Sarah Bernhardt, Anatole France, Henri PoincarΓ© and Georges Clemenceau, and those who condemned him (the anti-Dreyfusards), such as Γdouard Drumont, the director and publisher of the antisemitic newspaper La Libre Parole. The new trial resulted in another conviction and a 10-year sentence, but Dreyfus was pardoned and released. In 1906, Dreyfus was exonerated and reinstated as a major in the French Army. He served during the whole of World War I, ending his service with the rank of lieutenant-colonel. He died in 1935.
The affair from 1894 to 1906 divided France into pro-republican, anticlerical, Dreyfusards and pro-Army, mostly Catholic "anti-Dreyfusards". It embittered French politics and encouraged radicalisation.
Discussed on
- "The Dreyfus affair" | 2013-06-23 | 13 Upvotes 2 Comments
π Amiga Unix
Amiga Unix (informally known as Amix) is a discontinued full port of AT&T Unix System V Release 4 operating system developed by Commodore-Amiga, Inc. in 1990 for the Amiga computer family as an alternative to AmigaOS, which shipped by default. Bundled with the Amiga 3000UX, Commodore's Unix was one of the first ports of SVR4 to the 68k architecture. The Amiga A3000UX model even got the attention of Sun Microsystems, though ultimately nothing came of it.
Unlike Apple's A/UX, Amiga Unix contained no compatibility layer to allow AmigaOS applications to run under Unix. With few native applications available to take advantage of the Amiga's significant multimedia capabilities, it failed to find a niche in the quite-competitive Unix workstation market of the early 1990s. The A3000UX's price tag of $4,998 (equivalent to $9,382 in 2019) was also not very attractive compared to other Unix workstations at the time, such as the NeXTstation ($5,000 for a base system, with a full API and many times the number of applications available), the SGI Indigo (starting at $8,000), or the Personal DECstation 5000 Model 25 (starting at $5,000). Sun, HP, and IBM had similarly priced systems. The A3000UX's 68030 was noticeably underpowered compared to most of its RISC-based competitors.
Unlike typical commercial Unix distributions of the time, Amiga Unix included the source code to the vendor-specific enhancements and platform-dependent device drivers (essentially any part that wasn't owned by AT&T), allowing interested users to study or enhance those parts of the system. However this source code was subject to the same license terms as the binary part of the systemΒ β it was not free software. Amiga Unix also incorporated and depended upon many open source components, such as the GNU C Compiler and X Window System, and included their source code.
Like many other proprietary Unix variants with small market shares, Amiga Unix vanished into the mists of computer history when its vendor, Commodore, went out of business. Today, Unix-like operating systems such as Minix, NetBSD, and Linux are available for the Amiga platform.
Discussed on
- "Amiga Unix" | 2013-06-23 | 10 Upvotes 1 Comments
π COINTELPRO
COINTELPRO (syllabic abbreviation derived from COunter INTELligence PROgram) (1956β1971) was a series of covert and, at times, illegal projects conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltrating, discrediting, and disrupting American political organizations. FBI records show that COINTELPRO resources targeted groups and individuals that the FBI deemed subversive, including feminist organizations, the Communist Party USA, antiβVietnam War organizers, activists of the civil rights movement or Black Power movement (e.g. Martin Luther King Jr., the Nation of Islam, and the Black Panther Party), environmentalist and animal rights organizations, the American Indian Movement (AIM), independence movements (such as Puerto Rican independence groups like the Young Lords), and a variety of organizations that were part of the broader New Left. The program also targeted the Ku Klux Klan in 1964.
In another instance in San Diego, the FBI financed, armed, and controlled an extreme right-wing group of former members of the Minutemen anti-communist para-military organization, transforming it into a group called the Secret Army Organization that targeted groups, activists, and leaders involved in the Anti-War Movement, using both intimidation and violent acts.
The FBI has used covert operations against domestic political groups since its inception; however, covert operations under the official COINTELPRO label took place between 1956 and 1971. COINTELPRO tactics are still used to this day and have been alleged to include discrediting targets through psychological warfare; smearing individuals and groups using forged documents and by planting false reports in the media; harassment; wrongful imprisonment; and illegal violence, including assassination. The FBI's stated motivation was "protecting national security, preventing violence, and maintaining the existing social and political order".
Beginning in 1969, leaders of the Black Panther Party were targeted by the COINTELPRO and "neutralized" by being assassinated, imprisoned, publicly humiliated or falsely charged with crimes. Some of the Black Panthers affected included Fred Hampton, Mark Clark, Zayd Shakur, Geronimo Pratt, Mumia Abu-Jamal, and Marshall Conway. Common tactics used by COINTELPRO were perjury, witness harassment, witness intimidation, and withholding of evidence.
FBI Director J. Edgar Hoover issued directives governing COINTELPRO, ordering FBI agents to "expose, disrupt, misdirect, discredit, or otherwise neutralize" the activities of these movements and especially their leaders. Under Hoover, the agent in charge of COINTELPRO was William C. Sullivan. Attorney General Robert F. Kennedy personally authorized some of the programs. Although Kennedy only gave written approval for limited wiretapping of Martin Luther King's phones "on a trial basis, for a month or so", Hoover extended the clearance so his men were "unshackled" to look for evidence in any areas of King's life they deemed worthy.
Discussed on
- "Cointelpro" | 2025-01-30 | 91 Upvotes 22 Comments
- "Cointelpro" | 2023-05-24 | 31 Upvotes 3 Comments
- "COINTELPRO" | 2013-06-15 | 147 Upvotes 38 Comments
π Warrant Canary
A warrant canary is a method by which a communications service provider aims to inform its users that the provider has been served with a government subpoena despite legal prohibitions on revealing the existence of the subpoena. The warrant canary typically informs users that there has not been a court-issued subpoena as of a particular date. If the canary is not updated for the period specified by the host or if the warning is removed, users are to assume that the host has been served with such a subpoena. The intention is to allow the provider to warn users of the existence of a subpoena passively, without technically violating the court order not to do so.
Some subpoenas, such as those covered under 18 U.S.C. Β§2709(c) of the USA Patriot Act, provide criminal penalties for disclosing the existence of the subpoena to any third party, including the service provider's users.
National Security Letters (NSL) originated in the 1986 Electronic Communications Privacy Act and originally targeted those suspected of being agents of a foreign power. Targeting agents of a foreign power was revised in 2001 under the Patriot Act to allow NSLs to target those who may have information deemed relevant to both counterintelligence activities directed against the United States and terrorism. The idea of using negative pronouncements to thwart the nondisclosure requirements of court orders and served secret warrants was first proposed by Steven Schear on the cypherpunks mailing list, mainly to uncover targeted individuals at ISPs. It was also suggested for and used by public libraries in 2002 in response to the USA Patriot Act, which could have forced librarians to disclose the circulation history of library patrons.
Discussed on
- "Warrant Canary" | 2013-06-13 | 289 Upvotes 128 Comments
π CALEA requires telecoms to install surveillance equipment in their datacenters
The Communications Assistance for Law Enforcement Act (CALEA), also known as the "Digital Telephony Act," is a United States wiretapping law passed in 1994, during the presidency of Bill Clinton (Pub. L. No. 103-414, 108 Stat. 4279, codified at 47 USC 1001-1010).
CALEA's purpose is to enhance the ability of law enforcement agencies to conduct lawful interception of communication by requiring that telecommunications carriers and manufacturers of telecommunications equipment modify and design their equipment, facilities, and services to ensure that they have built-in capabilities for targeted surveillance, allowing federal agencies to selectively wiretap any telephone traffic; it has since been extended to cover broadband Internet and VoIP traffic. Some government agencies argue that it covers mass surveillance of communications rather than just tapping specific lines and that not all CALEA-based access requires a warrant.
The original reason for adopting CALEA was the Federal Bureau of Investigation's worry that increasing use of digital telephone exchange switches would make tapping phones at the phone company's central office harder and slower to execute, or in some cases impossible. Since the original requirement to add CALEA-compliant interfaces required phone companies to modify or replace hardware and software in their systems, U.S. Congress included funding for a limited time period to cover such network upgrades. CALEA was passed into law on October 25, 1994 and came into force on January 1, 1995.
In the years since CALEA was passed it has been greatly expanded to include all VoIP and broadband Internet traffic. From 2004 to 2007 there was a 62 percent growth in the number of wiretaps performed under CALEAΒ β and more than 3,000 percent growth in interception of Internet data such as email.
By 2007, the FBI had spent $39 million on its Digital Collection System Network (DCSNet) system, which collects, stores, indexes, and analyzes communications data.
Discussed on
- "CALEA requires telecoms to install surveillance equipment in their datacenters" | 2013-06-11 | 39 Upvotes 7 Comments
π Principality of Hutt River
The Principality of Hutt River, often referred to by its former name, the Hutt River Province, is an unrecognized micronation in Australia. The principality claims to be an independent sovereign state founded on 21 April 1970. The territory is located 517Β km (354Β mi) north of Perth, near the town of Northampton in the state of Western Australia. It has an area of 75 square kilometres (29Β sqΒ mi), making it larger than several independent countries. It is not recognized as a country by the Australian Government or any other national government, and the High Court of Australia and Supreme Court of Western Australia have rejected submissions arguing that it is not subject to Australian laws.
The principality was a regional tourist attraction until it announced it was closed to tourists after 31 January 2020. It issues its own currency, stamps and passports (which are not recognised by the Australian government or any other government). The micronation was founded on 21 April 1970 when Leonard Casley declared his farm to be an independent country, the Hutt River Province. He attempted to secede from Australia over a dispute concerning wheat production quotas. A few years later, Casley began styling himself as "Prince Leonard" and granting family members royal titles, although he did not include the word "principality" in the official name until 2006.
In February 2017, at the age of 91 and after ruling for 45 years, Casley abdicated the throne in favour of his youngest son, Prince Graeme. Leonard Casley died on 13 February 2019.
Discussed on
- "Principality of Hutt River" | 2013-06-11 | 13 Upvotes 10 Comments