Posts tagged with: Technology/Internet

Defending the Free Market by Rev. Robert SiricoActon Institute has crafted a website for Rev. Robert Sirico’s new book, Defending the Free Market. With this you can give the defendingthefreemarket.com  web address to your friends for an easy-to-remember access point to the book. Other notable things about the site include:

What are you waiting for? Find out more about Defending the Free Market at defendingthefreemarket.com.

Today marks the official launch of the new and improved website for the Journal of Markets & Morality.

In addition to the new design, we also have included a search feature whereby anyone who wants can search back issues for keywords, authors, names, and so on. For example, a search for “Alexis de Tocqueville” yields 29 results, and a search for “subsidiarity” turns up 78! As is our current policy, everything up to the two most recent issues is free to access for the public and all issues are open to subscribers.

Take the time to visit us at www.marketsandmorality.com and “like” us on Facebook to receive timely updates about new issues and other news.

Danny O’Dwyer of Gamespot has created an interesting video on religion in video games.  As a self-described atheist, he examines the reasons why video games “haven’t reached the point where Islam can be portrayed without a suicide bomb.”  The video also looks at various instances of religion in existing games and includes an interview with his Muslim friend Tamoor who works in the game journalism industry. You can watch his 15 minute video below.

Danny’s article over at Gamespot has an interesting quote that touches on truth: “I believe ignoring an entire culture out of some fear of offending their faith is a fantastic way of promoting intolerance.”

(more…)

Blog author: mhornak
posted by on Wednesday, November 23, 2011

Last week, the Acton Institute Programs Department launched registration for an exciting project called AU Online.  If you haven’t already visited the website, I encourage you to do so!

AU Online is an internet-based educational resource for exploring the intellectual foundations of freedom and virtue.  It is designed to offer the Acton community another way to experience the first class content and interaction of an Acton sponsored event while at home, at the office, or at school.

We’re currently accepting registrations for the four-part pilot series that covers the foundational lectures that you’d normally attend at any AU or Toward a Free and Virtuous Society conferences.  The Foundational Series is scheduled to run twice a week, Dec. 6-15 at 4:00 p.m. EST.

Interested in participating, but not sure that you can rearrange your schedule to make the time-frame work well for you?  No problem.  Anyone who registers for the series will have access to recordings of the lectures that will be posted directly to the Foundational Series course page after each session.

Whether you are an alumnus of Acton programming or are just getting to know us, AU Online is a great resource to take advantage of to further your education and engagement with important topics and relevant issues.  Visit AU Online for more information and please contact me at mhornak@acton.org if you have any questions.

Blog author: jcouretas
posted by on Monday, November 21, 2011

You have the fruit already in the seed. — Tertullian

Image-maker Alexander Tsiaras shares a powerful medical visualization, showing human development from conception to birth and beyond. (Some graphic illustrations.) From TEDTalks (TED stands for Technology, Entertainment, Design).

Tomorrow is a big day at the Acton Institute. November 15th marks the launch of two programs, 2012 Acton University (AU) and AU Online, a new internet-based educational resource for exploring the intellectual foundations of a free and virtuous society.

For the 2012 Acton University conference (June 12-15 in Grand Rapids), we’ve overhauled the registration process to make it more user-friendly and responsive, and we look forward to hearing what you think.

We are also happy to present AU Online. This new digital learning hub will let you access select Acton content from your home, office or classroom, so even if you can’t make it to one of our programs in person, you can hear and interact with the same experts online.

It’s an exciting time here at Acton and I hope you enjoy these new resources as much as we have enjoyed developing them.

Blog author: jcouretas
posted by on Monday, August 29, 2011

The Acton Institute has released a mobile app for smart phones and tablets based on the Android operating system. The free app keeps users up to date with the latest PowerBlog posts, commentaries, events and other goings on at the institute. Point your desktop/laptop computer or smart phone to the Android Market.

In the pipeline — the Acton iPhone app for Apple mobile devices. Stay tuned!

News broke yesterday of an audacious violation of Apple Computer’s intellectual property rights (IPR) in China. This expat blogger posted photos of three sham Apple Stores she discovered in the city of Kunming—the stores have been set up by some entrepreneurial chap hoping to capitalize on the company’s Chinese popularity.

The story was slightly amusing, especially in light of Apple’s recent earnings announcement. (“They totally did it again,” said one analyst. It was also revealed that Apple now sits on enough cash in hand to buy 100% of Goldman Sachs at its current market value.) It seems that the Apple brand is now so valuable that the Chinese are counterfeiting the company’s retail outlets to sell Apple’s own products at full price. As one employee of the fake store said when reached by the Wall Street Journal,

It doesn’t make much of a difference for us whether we’re authorized or not. I just care that what I sell every day are authentic Apple products, and that our customers don’t come back to me to complain about the quality of the products.

But that’s precisely why Apple’s IPR must be protected. The company is one of the most innovative ever—their graphical user interface, popularization of the computer mouse, iPod music player, and touch-screen devices have dragged the technology sector forward, to say nothing of their design contributions—and that innovation would not have been supported without protections for the company’s intellectual property.

The U.S. Constitution justifies the establishment of IPR in giving Congress the power

To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.

As David H. Carey explains in his Acton monograph The Social Mortgage of Intellectual Property,

If allowing some techonology to be patented benefits society in the long run more than it costs society temporarily to forego unrestricted use of that technology, then such patents are morally defensible.

The Apple Store “experience” is tightly bound up with the company’s products (remember how miserably Dell stores failed?), and part of allowing Apple temporary exclusive use of its inventions is allowing it to sell them as it sees fit.

There is also the question of trademark, which exists primarily for the protection of consumers, so that when I buy a tube of Crest toothpaste from a CVS I know that I’m not getting a Chinese imitation accidentally laced with cyanide, stocked by a shyster posing as a reputable franchisee.

Whatever employees of these fake Apple Stores may say—and according to the blogger who broke the story, none of the stores’ sales force realized at the time that they weren’t working for Apple—it’s China! Would you buy an iPhone from one of the fake stores? The Chinese government has a responsibility to its citizens to enforce Apple’s trademarks and protect its citizens from fraud.

By pure coincidence, I can illustrate the importance of protecting IPR in China: Yesterday, about the time this story was hitting the internet, my father went to the Apple Store in Dallas (an authentic one) and purchased an iPad. While he is away for a week on a theology course, Apple’s device will give him access to email and other business tools, so that he can grow in virtue and keep his business running at the same time (and once they debut the iSpankings app, he’ll be able to keep his kids in line, too). He chose an iPad over any number of other devices because his IT guy—who doesn’t like Macs, as IT guys never do—told him it would do the job best.

Except for the U.S.’s protection of IPR, that market solution wouldn’t have been possible.

I usually feel sorry when I see the latest news about data compromise, hacks, or identity theft.  Though I feel for the victims, I also think about the individuals carrying out the act.  Society rightly looks down on such behavior, especially if the victims are everyday people.

What about when a high profile organization or government is hacked?  What if an organization of questionable reputation is targeted?  The online group Anonymous often aims at high profile targets with their hacks, DDoS attacks and other planned invasions.  By making the decision to compromise organizations, even questionable ones, Anonymous assumes responsibility for its actions.  Individuals that are a part of this online group hide their real identity to commit acts that are illegal.

Growing up, I believe most young people interested in computing are aware that there is a “wrong path.”  As in, property damage and theft are wrong.  This path includes learning how to break into different types of computer systems to seek information or modify a system’s behavior, typically for reasons advantageous to the hacker.  Anyone that is involved with technology knows this path exists.  Luckily, most of us are taught to respect others’ property, even if that property is digital.  What’s more, this activity undermines the rule of law and the ability of people to freely create wealth (see Acton’s Core Principles).

Computer programming is an important craft.  It’s simple to learn a little programming, but as you advance in skill the tasks become easier to perform.  Whether it is building a website, desktop computer application, or a small game, many people obtain enjoyment out of building unique and useful tools and products.  However, the same skills can be used to make an application that tricks people, steals their information or prevents their computer from functioning properly.  Individuals who make these keyloggers, trojans and worms typically do so out of greed or hate.

People break into computer networks or systems with malicious intent are called black hat hackers.  As you might expect, there are also white hat hackers.  White hats break into computer networks and systems too, but instead of taking advantage of the system’s weakness, they notify the owner of the system about the vulnerability so they may fix the problem.  Computer security is a classic case of good versus evil.  You might even call it one of those moral issues that are clearly black and white.

What stops black hats from becoming white hats?  Unfortunately, if there were no black hats there would also be no need for white hats.  Most white hats start out as black hats since learning the craft requires knowledge of breaking into systems.  White hats make a legitimate living through consulting and by working in organizations to ensure systems are secure.  They (hopefully) have a strong sense of right, especially if they start out as a white hat.

Even if you don’t know someone who works in computer security, it’s likely that your favorite IT person deals with security on a daily basis.  The IT professional that the white hat informs must secure their system against compromise, which requires knowledge of how hackers break in.  System owners are stewards of activity and information they manage.  They have the same access that hackers have to information stored in computers they work with.  Their job is to protect that information as well as ensuring its proper use within the system.

If the system administrator fails at their job, unsuspecting individuals using the system lose something.  It might be privacy, financial information, their own computer’s security or even their identity.  Black hats and hackers like the ones from Anonymous abuse gaps in security for their own amusement, personal reasons and notoriety.  They lack basic concepts of morality and are especially void of respect for any IT professional or individuals on the receiving end of their attack.

Continuing the tradition from 2010, Acton University 2011 lectures will be available for purchase online from our secure order page.  New lectures will be posted as they conclude throughout the week, so check back often.

The downloads are in MP3 format and can be transferred to any device that plays audio files such as an iPod or smartphone.

Here are some useful Acton University links: