Customer center

We are a boutique essay service, not a mass production custom writing factory. Let us create a perfect paper for you today!

Example research essay topic: Cyber Communism The New Threat In Millennium - 1,106 words

NOTE: Free essay sample provided on this page should be used for references or sample purposes only. The sample essay is available to anyone, so any direct quoting without mentioning the source will be considered plagiarism by schools, colleges and universities that use plagiarism detection software. To get a completely brand-new, plagiarism-free essay, please use our essay writing service.
One click instant price quote

My expedition into cyber-communism began when I read Brock Meeks' "Hackers Stumble Toward Legitimacy"[ 1 ]. The article addressed a recent hackers' convention. Interestingly, the keynote speaker was Eric Boucher[ 2 ] (alias Jello Biafra[ 3 ]), a rock star with no technical background. Numerous questions ensue. Who is Eric Boucher (alias Jello Biafra)? What does he believe?

More importantly, why schedule someone with no technical background to speak at a hackers' convention? Addressing his beliefs, his proposed Green Party platform[ 4 ] is not inconsistent with the "Manifesto of Libertarian Communism"[ 5 ]. This answer produces a more troubling question. Was his speech against corporate America mere socialist babbling or was his speech part of something more sinister, a subversive cyber-communist movement? I am not the first to see possible communist subversion of the digerati[ 6 ]. Corey Wine sett's "Are Linux Users Really Communists?" [ 7 ] questions the nature of the relationship, if any, between open source and communism.

Scott Billings' "Heresy and Communism"[ 8 ] ponders that the Linux community's knee-jerk reaction to negative opinions about Linux could be the result of being "under the [communists'] spell. " Before I can evaluate cyber-communism's merits, I must define communism's true nature and communism's real threat to America. Communism Revisited Theoretical communism and practical communism have long been held as different political sociologie's. Despite Marx's call for the working class to revolt, the communist revolution's leaders always ascend from the intelligentsia. John Stormer's "None Dare Call It Treason" supports this fact saying: "Fidel Castro was a product, not of the cane fields of Cuba, but of the halls of Havana University. "Joseph Stalin was not a simple peasant rebelling at the oppression of the Czar. He became a communist while studying for the priesthood in a Russian Orthodox seminary. "The membership of the first Communist spy ring uncovered in the U. S.

Government was not spawned in the sweat shops of New York's lower east side or the tenant farms of the South. [The conspirators] came to high government posts from Harvard Law School. " Communism's fallacy is the belief in everyone's benevolence; yet, human nature proves otherwise. Communism cannot create a perfect society with imperfect people. Hence, to direct Utopia, communism produces a totalitarian government over the less-perfect people, ruled by the perfect people - communists. Thus, communism's true nature creates a controlling government in the name of a better world. Not every supporter needs be a knowing conspirator. Supporters could be "under the [communists'] spell. " Therefore, the true communist threat comes from people who can be deluded into supporting a controlling government in the name of a better world.

John Stormer's "None Dare Call It Treason" concurs with this conclusion saying: "Communism is a disease of the intellect. It promises universal brotherhood, peace and prosperity to lure humanitarians and idealists into participating in a conspiracy which gains power through deceit and deception and stays in power with brute force. " From Communism to Cyber-Communism Richard Barbrook's "The: : Cyber. Com/Must: : Manifesto"[ 9 ] and "Cyber-Communism: How Americans are Superseding Capitalism in Cyberspace" (parts 1 [ 10 ], 2 [ 11 ], 3 [ 12 ], 4 [ 13 ]) draw parallels between communism and cyber-communism. He associates the Soviet Union's gift / communist economy, where people freely exchange material goods, with the open source gift / cyber -communist economy, where people freely exchange source code. He concludes that cyber-communism promises a digital Utopia. However, like communism's promises, cyber-communism's promises are not manifesting themselves.

Monty Manley's "Be an Engineer, Not an Artist"[ 14 ] cites poorly designed code to assert that unpaid programmers will work only on "sexy" projects. Scott Billings' "Where's the Creativity?" [ 15 ] challenges Linux supporters to show one original idea in Linux, reminding us that Linux itself is not an original idea. Now, I am not condemning open source itself. Cyber-communism's fallacy is funding the open source development method. Xavier Basra's "Open Source and Nag Screens: Contradictions of the Bazaar"[ 16 ] mentions a shareware open source program to demonstrate the difficulty of funding "free" software. Eric Raymond's "The Magic Cauldron"[ 17 ] provides many theoretical economic models, but he fails to provide any case studies to demonstrate their practicality.

Red Hat follows Eric Raymond's economic model and still suffers fiscal losses. Richard Stallman's "The GNU Manifesto"[ 18 ] admits programmers will "not [be] paid as much as now. " Therefore, cyber-communism's true nature moves software development to an unfeasible economic model. Andrew Leonard's "The Cybercommunist Manifesto"[ 19 ] concurs with this conclusion in his critique of Richard Barbrook saying: "Barbrook's analysis does jibe well with fears expressed by some software programmers concerning the possibility that free software could prove to be an economic disaster for the software industry. " Cyber-communism, like communism, is about control. John Zedlewski's "Winning the Open-Source Support Game"[ 20 ] proposes that one company provide technical support for all open source software.

Instead, his plan would only create an open source support monopoly. Live Andreescu's "What to do about Monopolies?" [ 21 ] says, "Communism has nothing to do with turning... [Microsoft's] code in open source. " To the contrary, cyber-communism wants all products to move into open source to shift control from the corporation to the digerati. Thus, the true cyber-communist threat comes from the digerati's members who can be duped into supporting an economically unfeasible development method. Subversion is already in progress. "Hacker"[ 22 ] originally meant highly skilled programmer.

Eric Raymond's "How to Become a Hacker"[ 23 ] redefines "hacker" as a programmer who supports open source. Robert Lemos' "The New Age of Hacktivism"[ 24 ] observes hacking being done for political reasons. Still, halting cyber-communism is not difficult. Halting the Red Menace Stopping cyber-communism is simple. We need only break the cyber-communists's our of control. End-users depend on the digerati / hackers to provide technical support.

To break the dependency, we need to made technology so easy that everyone can use it, as said in John Holmes' "The Age of Everyman Tech: The End of Geekdom As We Know It"[ 25 ]. However, Michael Kellen's "Death to Wizards!" [ 26 ] illustrates that some, mostly cyber-communists, will oppose easy-to-use. Besides, an easy-to-use program translates into little technical support revenue for an already failing economic model. 1 web 2 web 3 web 4 web 5 web 6 web 7 web 8 web 9 web 10 web 11 web 12 web 13 web 14 web 15 web 16 web 17 web 18 web 19 web 20 web 21 web 22 web 23 web 24 web 25 web 26 web


Free research essays on topics related to: true nature, communist threat, open source, economic model, technical support

Research essay sample on Cyber Communism The New Threat In Millennium

Writing service prices per page

  • $18.85 - in 14 days
  • $19.95 - in 3 days
  • $23.95 - within 48 hours
  • $26.95 - within 24 hours
  • $29.95 - within 12 hours
  • $34.95 - within 6 hours
  • $39.95 - within 3 hours
  • Calculate total price

Our guarantee

  • 100% money back guarantee
  • plagiarism-free authentic works
  • completely confidential service
  • timely revisions until completely satisfied
  • 24/7 customer support
  • payments protected by PayPal

Secure payment

With EssayChief you get

  • Strict plagiarism detection regulations
  • 300+ words per page
  • Times New Roman font 12 pts, double-spaced
  • FREE abstract, outline, bibliography
  • Money back guarantee for missed deadline
  • Round-the-clock customer support
  • Complete anonymity of all our clients
  • Custom essays
  • Writing service

EssayChief can handle your

  • essays, term papers
  • book and movie reports
  • Power Point presentations
  • annotated bibliographies
  • theses, dissertations
  • exam preparations
  • editing and proofreading of your texts
  • academic ghostwriting of any kind

Free essay samples

Browse essays by topic:

Stay with EssayChief! We offer 10% discount to all our return customers. Once you place your order you will receive an email with the password. You can use this password for unlimited period and you can share it with your friends!

Academic ghostwriting

About us

© 2002-2024 EssayChief.com