70
70
Aug 19, 2017
08/17
by
CSPAN3
tv
eye 70
favorite 0
quote 0
the most significant one is right here, the apple one computer designed by steve wozniak and steve jobs. they sold about 120 of these, many assembled, some you could build in kit form. that is woz's signature on the top. the apple one was a hobbyist machine so it was aimed at gear heads, people who like soldering and connecting things to their tv. on the basis of this, steve jobs said, "if we made a computer for normal people rather than nerds -- no offense -- i think we could sell a lot more." the computer that resulted was called the apple ii. apple was created by the two steves, wozniak and jobs, and the machine that put them on the map was the apple ii, 1977, 48 kilobytes of memory -- not megabytes or gigabytes -- and provided color, unusual for the time. very few personal computers offered color. on the basis of the apple ii, apple kept itself afloat for many years. the first few years of sales of the lisa and mac were very disappointed and it was only because of the strong apple ii sales that apple was able to say in business. in total, the apple ii remained an apple product for a
the most significant one is right here, the apple one computer designed by steve wozniak and steve jobs. they sold about 120 of these, many assembled, some you could build in kit form. that is woz's signature on the top. the apple one was a hobbyist machine so it was aimed at gear heads, people who like soldering and connecting things to their tv. on the basis of this, steve jobs said, "if we made a computer for normal people rather than nerds -- no offense -- i think we could sell a lot...
22
22
tv
eye 22
favorite 0
quote 0
but was signed mainly by lab and university researchers however was indorsed by apple co-founder steve wozniak and cognitive scientist noam chomsky the first meeting of the un's convention on certain conventional weapons was scheduled for monday but has since been postponed to november. more dangerous north korea i hope he includes a timeline on that because i know right now i don't think your laptop is going to be doing that for now let's talk about this u.n. council which we expected this november meeting well so far on this council there's one hundred twenty three member nations that group nineteen have signed on for a ban on the so-called killer robots or lethal autonomous weapons we don't know many other details about what this ban would look like and how it would be implemented we'll have to wait until november as long as it actually happens then but you know it doesn't mean every member nation is going to quickly join on just because a small minority of that group has said that they're concerned about the future of the world because of these killer robots obviously we know that just bec
but was signed mainly by lab and university researchers however was indorsed by apple co-founder steve wozniak and cognitive scientist noam chomsky the first meeting of the un's convention on certain conventional weapons was scheduled for monday but has since been postponed to november. more dangerous north korea i hope he includes a timeline on that because i know right now i don't think your laptop is going to be doing that for now let's talk about this u.n. council which we expected this...
48
48
Aug 26, 2017
08/17
by
CSPAN
tv
eye 48
favorite 0
quote 0
steve wozniak, steve jobs, bill gates, these people who produce blue boxes that would allow you to place free phone calls. back in the day the phone network was the largest network in the world. if you wanted to explore you basically were exploring that network. at work -- hackers were exploring the precursor. crackers specialized in movie copy protection. if you bought a game, crackers learned how the game was protected, reversed engineered it and then got around them. so, that was the three main communities. they had a different interest. telecommunications, software protection. now the line is blurred. as time went on, as criminals entered, it wasn't just a game, and joy of discovery. it became money. criminals came in and borrow techniques from anywhere they could. they used to try to recruit hackers. now the criminals send people to college and university. they make a lot of money from these campaigns. they have giant research and development agenda. they don't need the hacking community anymore. we are trying to figure out what they are doing. they are doing this as a full-time mon
steve wozniak, steve jobs, bill gates, these people who produce blue boxes that would allow you to place free phone calls. back in the day the phone network was the largest network in the world. if you wanted to explore you basically were exploring that network. at work -- hackers were exploring the precursor. crackers specialized in movie copy protection. if you bought a game, crackers learned how the game was protected, reversed engineered it and then got around them. so, that was the three...
40
40
Aug 26, 2017
08/17
by
CSPAN
tv
eye 40
favorite 0
quote 0
the most famous examples of this would be steve wozniak, steve jobs, bill gates, these people who produced blue boxes that would allow you to place free phone calls and exploit the phone network. back in the day, the phone network was the largest network in the world. interconnected to the whole planet. if you wanted to explore, you were basically a phone freaker exploring that network. crackers specialized in movie copy protection. if you bought a game and couldn't copy it to share with your friends crackers learned , how the game was protected, reverse engineered the protection mechanisms and then , got around them. so, that was the three main communities. they each had a different interest. telecommunications, software , protection. now the line is blurred. as time went on and criminals entered, it wasn't just a game, exploration and joy of discovery. it became money. criminals came in and borrow techniques from anywhere they could. they used to try to recruit hackers in the 1990's and early 2000's. now the criminals send people to college and university. they make a lot of money from t
the most famous examples of this would be steve wozniak, steve jobs, bill gates, these people who produced blue boxes that would allow you to place free phone calls and exploit the phone network. back in the day, the phone network was the largest network in the world. interconnected to the whole planet. if you wanted to explore, you were basically a phone freaker exploring that network. crackers specialized in movie copy protection. if you bought a game and couldn't copy it to share with your...
75
75
Aug 2, 2017
08/17
by
CSPAN
tv
eye 75
favorite 0
quote 0
the best examples steve wozniak, , steve jobs, bill gates, these people who produce blue boxes that would allow you to place free phone calls and explore the phone network. day, the phone network was the largest network in the world and connected the whole planet. if you wanted to explore, you are basically a phone phreaker, exploring that network. crackers specialized in movie copy protection. if you bought a game and could not share with your friend crackers learned how the game , was protected, reversed engineered the protection mechanisms and then got around , them. copy protection. if you bought a so, that was the three main communities. they each had a different interest. telecommunications, software and protection. now, that line is completely blurred. as time went on and criminals entered, now there was money it or the joyst a game, of exploration and discovery it , became money. criminals came in and borrowed techniques from wherever they could. they tried to recruit hackers in the 1990's and early now the 2000. criminals send people to college and university. they make a lot of
the best examples steve wozniak, , steve jobs, bill gates, these people who produce blue boxes that would allow you to place free phone calls and explore the phone network. day, the phone network was the largest network in the world and connected the whole planet. if you wanted to explore, you are basically a phone phreaker, exploring that network. crackers specialized in movie copy protection. if you bought a game and could not share with your friend crackers learned how the game , was...
54
54
Aug 1, 2017
08/17
by
CSPAN2
tv
eye 54
favorite 0
quote 0
so the most famous example of this would be steve wozniak, bill gates, would ayou to make free phone calls and explore the phone network. back in the day the phone network was the largest networks in the world. if you wanted to explore you were a phone freaker exploring that network, hackers were supplying the 25 networks, the precurse at the the internet, and crackers specialized in movie copy protection. if you bought a game and couldn't copy it, crackerred learn how the game was protected, reverse engineered the protection mechanisms and got around them. so, that was the three main communities, and they each had a different interest. telecommunications, software and protection. now the line is completely blurred. then as time went on, and criminals entered, now there's money, wasn't just a game or fear of -- i mean, sense of exploration and joy of discovery, it became money. and so criminals came in and they borrowed techniques from anywhere they could. they used to try to recruit hackers in the '90s and 2000s. now the organized criminals send people to college and universities. t
so the most famous example of this would be steve wozniak, bill gates, would ayou to make free phone calls and explore the phone network. back in the day the phone network was the largest networks in the world. if you wanted to explore you were a phone freaker exploring that network, hackers were supplying the 25 networks, the precurse at the the internet, and crackers specialized in movie copy protection. if you bought a game and couldn't copy it, crackerred learn how the game was protected,...