A film on Douglas Engelbart, inventor of the computer mouse whose vision was to augment the collective IQ of humans using the computer as a tool to accomplish this.
Using real cases, this documentary demonstrates the extent to which violent criminals can use social media to locate and manipulate victims.
7 computers are currently being produced worldwide per second but only 4 humans are born at the same time. Everyday activities like buying a computer always generate a greater global impact on social and ecological levels. BEHIND THE SCREEN gives people behind the major electronic product a face and demonstrates the links of a decentralized economic system that are difficult to understand based on true life processes. The main stages which a computer passes through its life span are presented: Gold-mining in West Africa, electronics manufacturing by migrant workers in the Czech Republic, the use of computer products in the rich western world and their final disposal in the electronic waste dumps of Ghana.
"Welcome to Macintosh" is a documentary that mixes history, criticism and an unapologetic revelry of all things Apple. Whether a long time Mac fanatic or new to computers, Welcome to Macintosh explores the many ways Apple Computer (now Apple, Inc.) has changed the world, from the early days of the Apple-I to the latest the company has to offer.
This documentary looks at the computer hacker community in New York City of today, its meetings and conferences, political annotations, and historically explores the roots of the original definition 'hacking' amongst the model train enthusiasts at MIT.
Hacks is a 73 minute European documentary exploring what nature of "Hacking" is in a social context. In HACKS, the Austrian multimedia artist Christine Bader examines who is the computer hacker and what moves him or her. Is the hacker a Robin Hood in cyber space or an anarchistic agitator? Bader speaks with Dutch, German and American communication freaks who are working with various kinds of network issues, like making the Internet accessible to individual persons (Felipe Rodriguez, founder of Internet provider Xs4all), creating a meeting place in cyber space, or designing an ultramodern communication network on a ‘multimedia art ship‘. ‘Hackers are not encumbered by technical, financial or organizational problems, they just want to do things‘, Rodriguez thinks. That the technological means ‘just to do things‘ are now freely available is demonstrated by the numerous computer initiatives that whiz past in HACKS.
What is Bitcoin? With the advent of Bitcoin, the world's first digital currency, for the first time in history money is no longer controlled by banks or governments, but by the people who use it. But where did this currency come from? How does it work? And is it truly the way forward, or just a flash in the pan? Magic Money answers these questions and more as it explores the mysterious origins of Bitcoin, its role in society, and how it could shape the future.
Hackers Wanted explores the origins and nature of hackers and hacking by following the adventures of Adrian Lamo, and contrasting his story with that of controversial figures throughout history.
Italy’s biggest political party, the Five Star Movement, promotes direct democracy through internet voting. Five Star Movement uses a digital platform named Rousseau, that allows Movement’s members to vote online and express their opinion on various issues. But who governs this data?
Finally, a program for beginners that explains how your personal computer works! Video Professor's Learn DOS offers easy step-by-step instructions on starting your PC, exploring directories, and files. Learn how to use the DOS essential "HELP" command, and copy and delete information. In about an hour, you will be able to start running software programs on your own.Learn DOS
For years now, the Kremlin has been systematically trying to use well-trained hackers for its own benefit. In exchange for freedom and protection, they do the dirty work of the state, interfering in other countries’ elections and penetrating government networks. Just how dangerous is Russia’s cyber army?
THE PEOPLE'S CLOUD is a web-based six-part documentary series that gets to the bottom of the internet; investigating the ecology and impact of cloud computing on the lives of those who use it, the places it is physically located in and the people who work to maintain it.
Documentary film investigating allegations of election fraud during the 2004 U.S. presidential election. Electronic voting machines count approximately 90% of America's votes in county, state and federal elections. The technology is also increasingly being used across the world, including in Canada, the United Kingdom, Europe and Latin America. The film uncovers incendiary evidence from the trash cans of Texas to the ballot boxes of Ohio, exposing secrecy, votes in the trash, hackable software and election officials rigging the presidential recount.Ultimately proving our votes can be stolen without a trace "Hacking Democracy" culminates in the famous 'Hursti Hack'; a duel between the Diebold voting machines and a computer hacker from Finland - with America's democracy at stake.
Second Skin takes an intimate look at three sets of computer gamers whose lives have been transformed by online virtual worlds. An emerging genre of computer software called Massively Multiplayer Online games, or MMOs, allows millions of users to interact simultaneously in virtual spaces. Of the 50 million players worldwide, 50 percent consider themselves addicted.
In The Realm of the Hackers is a documentary about the prominent hacker community, centered in Melbourne, Australia in the late 80's to early 1990. The storyline is centered around the Australian teenagers going by the hacker names "Electron" and "Phoenix", who were members of an elite computer hacking group called The Realm and hacked into some of the most secure computer networks in the world, including those of the US Naval Research Laboratory, Lawrence Livermore National Laboratory, a government lab charged with the security of the US nuclear stockpile, and NASA.
A documentary film, created with a grant from Gordon College, telling the story of Ken Olsen, founder of Digital Equipment Corporation in 1957. Olsen revolutionized the electronics industry by making computers smaller and more accessible to both businesses and individuals. In 1986, Fortune magazine selected Olsen as “America’s Most Successful Entrepreneur” and featured him on its cover.
Experience the powerful stories of women in cybersecurity as they share their triumphs and struggles in this inspiring documentary, "Do We Belong Here." This film delves into the challenges faced by women in a male-dominated field and celebrates their achievements in overcoming barriers and breaking new ground. Learn about the personal and professional journeys that are shaping the future of cybersecurity.
In 1986, astronomer turned computer scientist Clifford Stoll had just started working on a computer system at the Lawrence Berkeley Laboratory when he noticed a 75-cent discrepancy between the charges printed by two accounting programs responsible for charging people for machine use. Intrigued, he deduced that the system was being hacked, and he determined to find the culprit. This is the re-enactment of how he tracked down KGB cracker Markus Hess through the Ethernet to Hannover, Germany.
The year is 2020 and the Amiga computer is 35 years old and going strong. We look at new developments and interview Amigans worldwide in this feature packed documentary.
A exploration of the fanaticism that surrounds the Apple brand, featuring interviews with Mac evangelists and members of the Mac community.