Top Movies about Computer & Geeks

Pirates of Silicon Valley (1999)
This film is the semi-humorous documentary about the men who made the world of technology what it is today, their struggles during college, the founding of their companies, and the ingenious actions they took to build up the global corporate empires of Apple Computer Corporation and Microsoft Inc.

Written by Flotis, biographical look at the men who founded Apple and Microsoft and a look at the early days of the companies. Noah Wyle and Joey Slotnick portray Apple founders Steve Job and Steve Wozniak. Anthony Michael Hall and John DiMaggio play Microsoft’s Bill Gates and Steve Ballmer. The film attempts to compare the two firm’s operations and differences in the founder’s operations.

Revolution OS (2001)
REVOLUTION OS tells the inside story of the hackers who rebelled against the proprietary software model and Microsoft to create GNU/Linux and the Open Source movement.
On June 1, 2001, Microsoft CEO Steve Ballmer said “Linux is a cancer that attaches itself in an intellectual property sense to everything it touches."

Microsoft fears GNU/Linux, and rightly so. GNU/Linux and the Open Source & Free Software movements arguably represent the greatest threat to Microsoft’s way of life. Shot in cinemascope on 35mm film in Silicon Valley, REVOLUTION OS tracks down the key movers and shakers behind Linux, and finds out how and why Linux became such a potent threat.
REVOLUTION OS features interviews with Linus Torvalds, Richard Stallman, Bruce Perens, Eric Raymond, Brian Behlendorf, Michael Tiemann, Larry Augustin, Frank Hecker, and Rob Malda.

Live Free or Die Hard (2007)
When someone hacks into the computers at the FBI’s Cyber Crime Division; the Director decides to round up all the hackers who could have done this. When he’s told that because it’s the 4th of July most of their agents are not around so they might have trouble getting people to get the hackers. So he instructs them to get local PD’S to take care of it. And one of the cops they ask is John McClane who is tasked with bringing a hacker named Farrell to the FBI. But as soon as he gets there someone starts shooting at them. McClane manages to get them out but they’re still being pursued. And it’s just when McClane arrives in Washington that the whole system breaks down and chaos ensues.

WarGames (1983)
A young computer whizz kid accidentally connects into a top secret super-computer which has complete control over the U.S. nuclear arsenal. It challenges him to a game between America and Russia, and he innocently starts the countdown to World War 3.

Hackers (1995)
A young boy is arrested by the US Secret Service for writing a computer virus and is banned from using a computer until his 18th birthday. Years later, he and his new-found friends discover a plot to unleash a dangerous computer virus, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.

Sneakers (1992)
Martin Bishop is the head of a group of experts who specialize in testing security systems. When he is blackmailed by Government agents into stealing a top secret black box, the team find themselves embroiled in a game of danger and intrigue. After they recover the box, they discover that it has the capability to decode all existing encryption systems around the world, and that the agents who hired them didn’t work for the Government after all…

The Italian Job (2003)
The plan was flawless… the job was executed perfectly… the escape was clean. The only threat mastermind thief Charlie Croker never saw coming was a member of his own crew. After pulling off an amazing gold bullion heist from a heavily guarded palazzo in Venice, Italy, Charlie and his gang — inside man Steve, computer genius Lyle, wheelman handsome Rob, explosives expert Left-Ear and veteran safecracker John Bridger – can’t believe when one of them turns out to be a double-crosser. Enter Stella, a beautiful nerves-of-steel safecracker, who joins Charlie and his former gang when they follow the backstabber to California, where they plan to re-steal the gold by tapping into Los Angeles’ traffic control system, manipulating signals and creating one of the biggest traffic jams in LA history. Now the job isn’t the payoff, it’s about payback.

The Net (1995)
Angela Bennett is a computer expert. This young and beautiful analyst is never far from a computer and modem. The only activity she has outside of computers is visiting her mother. A friend, whom she’s only spoken to over the net and phone, Dale Hessman, sent her a program with a weird glitch for her to de-bug. That night, he left to meet her and was killed in a plane crash. Angela discovers secret information on the disk she has received only hours before she leaves for vacation. Her life then turns into a nightmare, her records are erased from existence and she is given a new identity, one with a police record. She struggles to find out why this has happened and who has it in for her.

23 (1998)
The movie’s plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson’s “Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl’s rather criminal acquaintances senses that there is money in computer cracking – he travels to east Berlin and tries to contact the KGB.

Takedown (2000)
Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cybertrophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one – and much more than that…

TRON (1982)
Computer Classic, one of the first computer generated movies. A hacker is split into molecules and is transported into a computer. In this computer a mean program called Master Control behaves like a dictator. The hacker, who programmed a number of features of the environment he got into, teams up with a book keeping program and his girl-friend and together they try to replace Master Control with Tron. Tron is an honest safety system.

Antitrust (2001)
This movie is the fictional story of computer programming genius Milo Hoffman after graduating from Stanford and getting out into the competitive world of computer software. In his contemplation of where to begin his career, he is contacted by Gary Winston whose character is loosely based on Bill Gates. Winston is the CEO of a company called NURV, and they are on the brink of completing the global communication’s system, Synapse. They need Hoffman to help them meet their launch date, so after much thought and with the full support of his girlfriend Alice, he accepts the job. Tragedy soon after strikes and Milo becomes suspicious of the company he has been wrapped up in. He learns that trusting anyone could be a mistake, and that nothing is as it seems.

The Matrix (1999)
Computer hacker Thomas Anderson has lived a relatively ordinary life–in what he thinks is the year 1999–until he is contacted by the
e
nigmatic Morpheus who leads him into the real world. In reality, it is 200 years later, and the world has been laid waste and taken over by advanced artificial intelligence machines. The computers have created a false version of 20th-century life–the “Matrix"–to keep the human slaves satisfied, while the AI machines draw power from the humans. Anderson, pursued constantly by “Agents" (computers who take on human form and infiltrate the Matrix), is hailed as “The One" who will lead the humans to overthrow the machines and reclaim the Earth.

The Matrix Reloaded (2003)
6 months after the events depicted in The Matrix, Neo has proved to be a good omen for the free humans, as more and more humans are being freed from the matrix and brought to Zion, the one and only stronghold of the Resistance. Neo himself has discovered his superpowers including super speed, ability to see the codes of the things inside the matrix and a certain degree of pre-cognition. But a nasty piece of news hits the human resistance: 250,000 machine sentinels are digging to Zion and would reach them in 72 hours. As Zion prepares for the ultimate war, Neo, Morpheus and Trinity are advised by the Oracle to find the Keymaker who would help them reach the Source. Meanwhile Neo’s recurrent dreams depicting Trinity’s death have got him worried and as if it was not enough, Agent Smith has somehow escaped deletion, has become more powerful than before and has fixed Neo as his next target.

Swordfish (2001)
When the DEA shut down its dummy corporation operation codenamed SWORDFISH in 1986, they had generated $400 million which they let sit around; fifteen years of compound interest has swelled it to $9.5 billion. A covert counter-terrorist unit called Black Cell, headed by the duplicitious and suave Gabriel Shear, wants the money to help finance their raise-the-stakes vengeance war against international terrorism, but it’s all locked away behind super-encryption. He brings in convicted hacker Stanley Jobson, who only wants to see his daughter Holly again but can’t afford the legal fees, to slice into the government mainframes and get the money.

Enemy of the State (1998)
Robert Clayton Dean is a successful labor lawyer based in Washington DC. He has a beautiful wife and adorable son with a nice house located in Georgetown. But things take a turn for the surreal, when a chance encounter with an old friend leaves him evidence of a politically-motivated murder. On the run from a treacherous NSA official and his men, he comes into contact with a former government operative and surveillance expert, who is his only way out.

The Thirteenth Floor (1999)
Computer scientist Hannon Fuller has discovered something extremely important. He’s about to tell the discovery to his colleague, Douglas Hall, but knowing someone is after him, the old man leaves a letter in his computer generated parallel world that’s just like the 30’s with seemingly real people with real emotions. Fuller is murdered in our real world the same night, and his colleague is suspected. Douglas discovers a bloody shirt in his bathroom and he cannot recall what he was doing the night Fuller was murdered. He logs into the system in order to find the letter, but has to confront the unexpected. The truth is harsher than he could ever imagine…

廣告

Top Movies about Computer & Geeks

Pirates of Silicon Valley (1999)
This film is the semi-humorous documentary about the men who made the world of technology what it is today, their struggles during college, the founding of their companies, and the ingenious actions they took to build up the global corporate empires of Apple Computer Corporation and Microsoft Inc.

Written by Flotis, biographical look at the men who founded Apple and Microsoft and a look at the early days of the companies. Noah Wyle and Joey Slotnick portray Apple founders Steve Job and Steve Wozniak. Anthony Michael Hall and John DiMaggio play Microsoft’s Bill Gates and Steve Ballmer. The film attempts to compare the two firm’s operations and differences in the founder’s operations.

Revolution OS (2001)
REVOLUTION OS tells the inside story of the hackers who rebelled against the proprietary software model and Microsoft to create GNU/Linux and the Open Source movement.
On June 1, 2001, Microsoft CEO Steve Ballmer said “Linux is a cancer that attaches itself in an intellectual property sense to everything it touches."

Microsoft fears GNU/Linux, and rightly so. GNU/Linux and the Open Source & Free Software movements arguably represent the greatest threat to Microsoft’s way of life. Shot in cinemascope on 35mm film in Silicon Valley, REVOLUTION OS tracks down the key movers and shakers behind Linux, and finds out how and why Linux became such a potent threat.
REVOLUTION OS features interviews with Linus Torvalds, Richard Stallman, Bruce Perens, Eric Raymond, Brian Behlendorf, Michael Tiemann, Larry Augustin, Frank Hecker, and Rob Malda.

Live Free or Die Hard (2007)
When someone hacks into the computers at the FBI’s Cyber Crime Division; the Director decides to round up all the hackers who could have done this. When he’s told that because it’s the 4th of July most of their agents are not around so they might have trouble getting people to get the hackers. So he instructs them to get local PD’S to take care of it. And one of the cops they ask is John McClane who is tasked with bringing a hacker named Farrell to the FBI. But as soon as he gets there someone starts shooting at them. McClane manages to get them out but they’re still being pursued. And it’s just when McClane arrives in Washington that the whole system breaks down and chaos ensues.

WarGames (1983)
A young computer whizz kid accidentally connects into a top secret super-computer which has complete control over the U.S. nuclear arsenal. It challenges him to a game between America and Russia, and he innocently starts the countdown to World War 3.

Hackers (1995)
A young boy is arrested by the US Secret Service for writing a computer virus and is banned from using a computer until his 18th birthday. Years later, he and his new-found friends discover a plot to unleash a dangerous computer virus, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.

Sneakers (1992)
Martin Bishop is the head of a group of experts who specialize in testing security systems. When he is blackmailed by Government agents into stealing a top secret black box, the team find themselves embroiled in a game of danger and intrigue. After they recover the box, they discover that it has the capability to decode all existing encryption systems around the world, and that the agents who hired them didn’t work for the Government after all…

The Italian Job (2003)
The plan was flawless… the job was executed perfectly… the escape was clean. The only threat mastermind thief Charlie Croker never saw coming was a member of his own crew. After pulling off an amazing gold bullion heist from a heavily guarded palazzo in Venice, Italy, Charlie and his gang — inside man Steve, computer genius Lyle, wheelman handsome Rob, explosives expert Left-Ear and veteran safecracker John Bridger – can’t believe when one of them turns out to be a double-crosser. Enter Stella, a beautiful nerves-of-steel safecracker, who joins Charlie and his former gang when they follow the backstabber to California, where they plan to re-steal the gold by tapping into Los Angeles’ traffic control system, manipulating signals and creating one of the biggest traffic jams in LA history. Now the job isn’t the payoff, it’s about payback.

The Net (1995)
Angela Bennett is a computer expert. This young and beautiful analyst is never far from a computer and modem. The only activity she has outside of computers is visiting her mother. A friend, whom she’s only spoken to over the net and phone, Dale Hessman, sent her a program with a weird glitch for her to de-bug. That night, he left to meet her and was killed in a plane crash. Angela discovers secret information on the disk she has received only hours before she leaves for vacation. Her life then turns into a nightmare, her records are erased from existence and she is given a new identity, one with a police record. She struggles to find out why this has happened and who has it in for her.

23 (1998)
The movie’s plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson’s “Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl’s rather criminal acquaintances senses that there is money in computer cracking – he travels to east Berlin and tries to contact the KGB.

Takedown (2000)
Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cybertrophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one – and much more than that…

TRON (1982)
Computer Classic, one of the first computer generated movies. A hacker is split into molecules and is transported into a computer. In this computer a mean program called Master Control behaves like a dictator. The hacker, who programmed a number of features of the environment he got into, teams up with a book keeping program and his girl-friend and together they try to replace Master Control with Tron. Tron is an honest safety system.

Antitrust (2001)
This movie is the fictional story of computer programming genius Milo Hoffman after graduating from Stanford and getting out into the competitive world of computer software. In his contemplation of where to begin his career, he is contacted by Gary Winston whose character is loosely based on Bill Gates. Winston is the CEO of a company called NURV, and they are on the brink of completing the global communication’s system, Synapse. They need Hoffman to help them meet their launch date, so after much thought and with the full support of his girlfriend Alice, he accepts the job. Tragedy soon after strikes and Milo becomes suspicious of the company he has been wrapped up in. He learns that trusting anyone could be a mistake, and that nothing is as it seems.

The Matrix (1999)
Computer hacker Thomas Anderson has lived a relatively ordinary life–in what he thinks is the year 1999–until he is contacted by the enigmatic Morpheus who leads him into the real world. In reality, it is 200 years later, and the world has been laid waste and taken over by advanced artificial intelligence machines. The computers have created a false version of 20th-century life–the “Matrix"–to keep the human slaves satisfied, while the AI machines draw power from the humans. Anderson, pursued constantly by “Agents" (computers who take on human form and infiltrate the Matrix), is hailed as “The One" who will lead the humans to overthrow the machines and reclaim the Earth.

The Matrix Reloaded (2003)
6 months after the events depicted in The Matrix, Neo has proved to be a good omen for the free humans, as more and more humans are being freed from the matrix and brought to Zion, the one and only stronghold of the Resistance. Neo himself has discovered his superpowers including super speed, ability to see the codes of the things inside the matrix and a certain degree of pre-cognition. But a nasty piece of news hits the human resistance: 250,000 machine sentinels are digging to Zion and would reach them in 72 hours. As Zion prepares for the ultimate war, Neo, Morpheus and Trinity are advised by the Oracle to find the Keymaker who would help them reach the Source. Meanwhile Neo’s recurrent dreams depicting Trinity’s death have got him worried and as if it was not enough, Agent Smith has somehow escaped deletion, has become more powerful than before and has fixed Neo as his next target.

Swordfish (2001)
When the DEA shut down its dummy corporation operation codenamed SWORDFISH in 1986, they had generated $400 million which they let sit around; fifteen years of compound interest has swelled it to $9.5 billion. A covert counter-terrorist unit called Black Cell, headed by the duplicitious and suave Gabriel Shear, wants the money to help finance their raise-the-stakes vengeance war against international terrorism, but it’s all locked away behind super-encryption. He brings in convicted hacker Stanley Jobson, who only wants to see his daughter Holly again but can’t afford the legal fees, to slice into the government mainframes and get the money.

Enemy of the State (1998)
Robert Clayton Dean is a successful labor lawyer based in Washington DC. He has a beautiful wife and adorable son with a nice house located in Georgetown. But things take a turn for the surreal, when a chance encounter with an old friend leaves him evidence of a politically-motivated murder. On the run from a treacherous NSA official and his men, he comes into contact with a former government operative and surveillance expert, who is his only way out.

The Thirteenth Floor (1999)
Computer scientist Hannon Fuller has discovered something extremely important. He’s about to tell the discovery to his colleague, Douglas Hall, but knowing someone is after him, the old man leaves a letter in his computer generated parallel world that’s just like the 30’s with seemingly real people with real emotions. Fuller is murdered in our real world the same night, and his colleague is suspected. Douglas discovers a bloody shirt in his bathroom and he cannot recall what he was doing the night Fuller was murdered. He logs into the system in order to find the letter, but has to confront the unexpected. The truth is harsher than he could ever imagine…

荒謬 客運播警廣 司機被控侵權

荒謬 客運播警廣 司機被控侵權
「聽路況犯法嗎」 網友聲援:不要聽音樂協會的歌
2008年10月14日蘋果日報

【鄭敏鈴、朱俊彥╱台中報導】公車司機在車上聽警廣廣播,竟被控違反《著作權法》。台中客運公司今年八月底接到台灣音樂著作權人聯合總會寄發的存證信函,指控該公司駕駛呂貴生在車上擴音收聽警廣,違反《著作權法》,不排除提告求償;呂貴生昨喊冤說:「我在車上聽警廣路況,才能掌握交通訊息,根本不是聽音樂,怎麼算是侵權行為?」

太誇張了
台中客運經理楊榮樹強調,遭控侵權的司機是「在駕駛座上聽路況,並未公開播放,車上本來就有廣播和音響,又不是加裝的,這樣算侵權嗎?況且客運公司怎會知道廣播公司播放的歌曲是否合法?」以此做餌來檢舉並指控司機侵權,實在不合理。

楊榮樹說,該公司目前先全面禁止司機聽廣播或看DVD等節目,但會請智慧財產局明確界定侵權定義,「否則司機一天到晚擔心被告,也不是辦法。」


台中客運公司在班車內張貼公告,要求駕駛除公司認可影片,其餘音樂、影片一律禁播。陳為坐攝

司機:禁聽後常塞車
對此,客運司機罵聲連連。台中客運一名王姓司機說:「太誇張了!」聽警廣主要是聽路況,最近被禁止不能聽,駕駛們常因此塞車在路上,「警廣不是公家的廣播 電台嗎?播出的內容,當然納稅人有權聽。如果要說侵權,也是警廣侵權,應該去告警廣,幹嘛嚇唬小司機!我們一個月又賺不了多少錢!」一位台西客運司機表 示,受此事件影響,該公司也規定司機在駕車途中,不准收聽或播放任何節目,否則會被公司罰三千元。

網友更是無法認同台灣音樂著作權人聯合總會作法。「太扯了!應該要罰播放該音樂ㄉ電台,而不是收聽者。」「很欺負人耶!只會拿司機開刀!」「舉著智慧財產大旗就可以狐假虎威、無法無天亂告嗎?」「噁心的爛單位,大家不要聽音樂協會的歌免得麻煩。」
律師陳建勛聞言也直呼:「太誇張了!」他說,司機當時已將車開上高速公路,未沿途載客,嚴格說起來,車上已非公共空間,且他聽廣播是為了解路況,若因此受罰,實在不合理。精研《著作權法》的律師徐則鈺也說,司機自己聽廣播或音樂並不違法,例如大部分遊覽車都有喇叭設備,多數駕駛會在路程上收聽廣播並播放,也曾有人挨告,但當時法院認定此為「單純開機」,判定駕駛無罪。

台中客運司機呂貴生八月上班時聽警廣路況,不料遭指違反《著作權法》。陳為坐攝

提告單位:不太清楚
警廣副總台長鍾國成則強調:「警廣播放的歌曲都是合法的!」他說,警廣與台灣音樂著作權人聯合總會合作關係良好,該台昨天聽到台中客運司機因收聽警廣被寄 存證信函,也很訝異。他透露,有些著作權仲介團體會故意拉抬費用,並請工讀生埋伏側錄,以興訟來取得罰金。警廣之前與另一著作權仲介團體、中華音樂著作權 仲介協會有授權金談判爭議。

面對各方的批判聲浪,寄發存證信函揚言提告的台灣音樂著作權人聯合總會董事長蔡清忠,昨僅簡單回應說:「不太清楚,還要再了解。」

聽警廣侵權 網友聲援客運
ddt2005716:為什麼著作權可以無限延伸?好想罵髒話!抓盜版就好,搞老百姓真的很白目。

iiooii:合法的詐騙集團,比非法還聰明,用法律來撈錢。

waijr:我覺得大家應該要站出來抵制該協會所有歌手、相關律師,甚至在協會上班的人,讓他們無法再佔大家便宜、欺負民眾。

sunface:垃圾協會!這種態度最好會讓人有想買正版的想法,爛!

nouveauriche:這樣一搞,根本沒人想聽音樂了,因為都要錢…死要錢!

nuuk:繼續把著作權無限上綱啊!唱片業自己倒光光不要怪人。

資料來源:PTT實業坊(telnet://ptt.cc

YouTube開始提供嵌入廣告的完整電視影集

文/陳曉莉 (編譯) 2008-10-13

YouTube開始與哥倫比亞廣播公司(CBS)測試在網站上提供完整的電視影集,並且在影集中嵌入廣告片。

此一合作案打破了許多YouTube的傳統服務模式,包括以往YouTube限制上傳的影片長度不得超過10分鐘,以及YouTube所主張的不干擾使用者觀賞影片的廣告模式。

根據紐約時報報導,現在YouTube上有長達46分鐘的飛越比佛利(Beverly Hills 90210)影集,同時有一長達15秒的廣告不斷在影片當中重覆播放五次以上。

使用者可以透過YouTube在上周發表的劇院瀏覽模式(theater view),以較大的視窗觀賞這些影集。

初期YouTube僅與哥倫比亞廣告公司合作,雙方共享廣告利潤,目前提供的影集除了飛越比佛利以外還包括雙面法醫(Dexter)及星艦迷航記(Star Trek),預計未來將新增更多的內容合作供應商。

國外媒體Wired分析,依照CBS當初不願與其他平台分享30%的廣告利潤來看,YouTube及CBS的拆帳比例應為20-80。

YouTube近來積極擴張營利模式,在上周發表了電子商務平台,YouTube並不直接提供銷售,而是在網站上提供使用者購買音樂及遊戲的廣告連結,並與業者分享銷售利潤。

不過台灣的使用者現階段無緣測試上述兩項服務,因為電子商務平台目前僅於美國地區測試,而影集服務可能因版權的考量而有存取地域上的限制。(編譯/陳曉莉)