Dennis Ritchie

Golang was co-created by Robert Griesemer, Rob Pike, and Ken Thompson at Google in 2007. Fair Use Source: B078HXNZX9

See also History of Go.

Ken Thompson

Golang was co-created by Robert Griesemer, Rob Pike, and Ken Thompson at Google in 2007. Fair Use Source: B078HXNZX9

See also History of Go.

Rob Pike

Robert “Rob” C. Pike (born 1956) is a Canadian programmer and author.

Golang was co-created by Robert Griesemer, Rob Pike, and Ken Thompson at Google in 2007. Fair Use Source: B078HXNZX9

He is best known for his work on the Go programming language and at Bell Labs, where he was a member of the Unix team and was involved in the creation of the Plan 9 from Bell Labs and Inferno operating systems, as well as the Limbo programming language.

See also History of Go.


The Practice of Programming

The Unix Programming Environment

Robert Griesemer

Golang was co-created by Robert Griesemer, Rob Pike, and Ken Thompson at Google in 2007. Fair Use Source: B078HXNZX9

See also History of Go.

Database Nation: The Death of Privacy in the 21st Century

See also One Nation, Under Surveillance — Privacy From the Watchful Eye, Privacy, History of Technology, History of Programming, History of Technology Bibliography, Privacy vs. Surveillance Bibliography

Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian surveillance state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity — especially in this day of technologies that encroach upon these rights — still use Orwell’s “Big Brother” (see Google as Big Brother) language to discuss privacy issues. But the reality is that the age of a monolithic Big Brother is over. And yet the threats are perhaps even more likely to destroy the rights we’ve assumed were ours. Database Nation: The Death of Privacy in the 21st Century shows how, in these early years of the 21st century, advances in technology endanger our privacy in ways never before imagined even by science fiction authors. Direct marketers and retailers track our every purchase; surveillance cameras observe our movements; mobile phones report our location to those who want to track us; government eavesdroppers listen in on private communications; misused medical records turn our bodies and our histories against us; and linked databases assemble detailed consumer profiles used to predict and influence our behavior. Privacy — the most basic of our unalienable rights — is in grave peril. Simson Garfinkel — journalist, entrepreneur, and international authority on computer security — has devoted his career to testing new technologies and warning about their implications. This newly revised update of the popular hardcover edition of Database Nation is his compelling account of how invasive technologies will affect our lives in the coming years. It’s a timely, far-reaching, entertaining, and thought-provoking look at the serious threats to privacy facing us today. The book poses a disturbing question: how can we protect our basic rights to privacy, right to free speech, identity, and autonomy when technology is making invasion and control easier than ever before? Garfinkel’s captivating blend of journalism, storytelling, and futurism is a call to arms. It will frighten, entertain, and ultimately convince us that we must take action now to protect our privacy and identity before it’s too late.”

Fair Use Source: B0026OR2OA

In the 21st century, advances in technology endanger our privacy in ways never before imagined even by science fiction.

Editorial Reviews Review

Forget the common cold for a moment. Instead, consider the rise of “false data syndrome,” a deceptive method of identification derived from numbers rather than more recognizable human traits. Simson Garfinkel couples this idea with concepts like “data shadow” and “datasphere” in Database Nation, offering a decidedly unappealing scenario of how we have overlooked privacy with the advent of advanced technology.

According to Garfinkel, “technology is not privacy neutral.” It leaves us with only two choices: 1) allow our personal data to rest in the public domain or 2) become hermits (no credit cards, no midnight video jaunts–you get the point).

Garfinkel’s thoroughly researched and example-rich text explores the history of identification procedures; the computerization of ID systems; how and where data is collected, tracked, and stored; and the laws that protect privacy. He also explains who owns, manipulates, ensures the safety of, and manages the vast amount of data that makes up our collective human infrastructure. The big surprise here? It’s not the United States government who controls or manages the majority of this data but rather faceless corporations who trade your purchasing habits, social security numbers, and other personal information just like any other hot commodity.

There’s a heck of a lot of data to digest about data here and only a smidgen of humor to counterbalance the weight of Garfinkel’s projections. But then again, humor isn’t really appropriate in connection with stolen identities; medical, bank, and insurance record exploitation; or the potential for a future that’s a “video surveillance free-for-all.”

In many information-horrific situations, Garfinkel explores the wide variety of data thievery and the future implications of larger, longer-lasting databases. “Citizens,” Garfinkel theorizes, “don’t know how to fight back even though we know our privacy is at risk.” In a case study involving an insurance claim form, he explains how a short paragraph can grant “blanket authorization” to all personal (not just medical) records to an insurance company. Citizens who refuse to sign the consent paragraph typically must forfeit any reimbursement for medical services. Ultimately, “we do not have the choice [as consumers] either to negotiate or to strike our own deal.”

The choice that we do have, however, is to build a world in which sensitive data is respected and kept private–and the book offers clever, “turn-the-tables” solutions, suggesting that citizens, government, and corporations cooperate to develop weaker ID systems and legislate heavier penalties for identification theft.

Garfinkel’s argument does give one pause, but his paranoia-laden prose and Orwellian imagination tends to obscure the effectiveness of his argument. Strangely, for all his talk about protecting your privacy, he never mentions how to remove your personal information from direct mail and telemarketing groups. And while he would like for Database Nation to be as highly regarded (and timely) as Rachel Carson’s Silent Spring, the fact remains that we’re not going to perish from having our privacy violated. –E. Brooke Gilbert

From Library Journal

If you have a computer with Intel’s “processor serial number,” own a pet with an embedded “radio frequency identification device,” use ATMs and credit cards, and shop on the Internet, privacy is almost a nonexistent concept, because your every move is being tracked and stored somewhere for future use. Garfinkel, who has reported on computer privacy issues for Wired and other publications, is an exceptional writer who clearly understands his topic; here he explores today’s threats to privacy and how they might be stopped. This is for all libraries.

History of Technology Bibliography

See also History of Technology, History of Programming, Privacy vs. Surveillance Bibliography.

Fair Use Source: B07C2NQSPV

The Computer Book: From the Abacus to Artificial Intelligence, 250 Milestones in the History of Computer Science

See also Database Nation: The Death of Privacy in the 21st Century, History of Technology, History of Programming and History of Technology Bibliography, The Story of the Computer: A Technical and Business History

Fair Use Source: B07C2NQSPV

History of computer science ranges from the ancient abacus to superintelligence and social media.

Part of Sterling’s extremely popular Milestones series, this illustrated exploration of computer science ranges from the ancient abacus to superintelligence and social media.

With 250 illustrated landmark inventions, publications, and events—encompassing everything from ancient record-keeping devices to the latest computing technologies—this highly topical addition to the Sterling Milestones series takes a chronological journey through the history and future of computer science. Two expert authors, with decades’ of experience working in computer research and innovation, explore topics including the Sumerian abacus, the first spam message, Morse code, cryptography, early computers, Isaac Asimov’s laws of robotics, UNIX and early programming languages, movies, video games, mainframes, minis and micros, hacking, virtual reality, and more.

The Story of the Computer: A Technical and Business History

See also History of Technology, History of Programming and History of Technology Bibliography, The Computer Book: From the Abacus to Artificial Intelligence

Fair Use Source: B00ULEMS4Q

One Nation, Under Surveillance – Privacy From the Watchful Eye

As an IT security writer, I think this is such an excellent book that I am using its Table of Contents as a stepping stone to my own extensive Fair Use commentary and vast expansion of these topics.

Fair Use Source: B00NU30KP4

Table of Contents:

  • Introduction by Boston T. Party (Kenneth W. Royce)

1 – Why Privacy?

  • We Have Lost Our Country
  • The Paranoid U.s. Government
  • In the Grip of Psychopathological Control
  • Privacy Is Not Shameful
  • The Coming Dark Age…if We Allow It…

2 – Privacy Vs. Paranoia

3 – the Rules

  • Don’t Draw Attention to Yourself
  • Privacy Is Always Complicated
  • Privacy Is Expensive
  • Privacy Is Inconvenient
  • Privacy Is Private
  • Be Consistent. Be Thorough.
  • Work Your Story Out in Advance
  • Always Have a Benign, Logical Explanation
  • Privacy Requires the Spinning of Yarns
  • Be Friendly. Be Relaxed. Be Unremembered.
  • Privacy Requires Your Alertness
  • “what if I Have to Lie?”
  • The Public Face of Privacy

4 – How to Mess Up

  • Learning From a Nazi’s Mistakes

5 – Privacy & Data

  • Your Data Shadow
  • Credit Information
  • Employment Information Service (Eis)
  • Medical Information Bureau (Mib)
  • Government Databanks
  • International Data-sharing
  • Surveillance Cctv Cameras
  • Radio Frequency Id Chips
  • Unchallengeable Government
  • Papers
  • Privacy & Technology

6 – Privacy & People

  • Levels of Intimacy
  • Privacy With the Public
  • Privacy With Your Acquaintances
  • The Acquaintance Neighbor
  • Privacy and Your Friends
  • Relatives
  • Your Spouse
  • Your Children
  • On Trusting People
  • Putting Friendships to the Test
  • When Trust Is Betrayed
  • The Sociopath
  • Sociopaths and Morality
  • The Sociopath’s Characteristic Exploitiveness
  • The Sociopath Always Lies, and How He Does It
  • The Indispensable Pity Ploy
  • Optical Illusions: Sociopath Autostereograms
  • Sociopaths Elsewhere (the “kunlangeta”)
  • Final Thoughts on Sociopaths

7 – the I.d.

  • Using Another’s Id
  • Using Fake Paperwork
  • Total Id Creation
  • The Foreign Id
  • Real Id
  • The Usa Passport
  • Since 2007, All Passports Have an Rfid Chip
  • Is the Ssn Required to Get a Usa Passport?
  • Can the Passport Rfid Chip Be Deactivated?
  • Some Misc. Passport Tips
  • The “enhanced Dl”
  • The National Id in Britain
  • Biometric Id
  • The Final Id: Implanted Chips
  • Your Line in the Sand

8 – Financial Privacy

  • Cash
  • Money Orders
  • Pre-paid Debit Cards
  • Paypal
  • Digital Gold Currencies
  • Exchange Providers
  • Dgc Providers
  • Activating a New Dgc Account
  • Gold & Silver Coins
  • Credit Cards
  • Checks
  • Loans & Mortgages
  • Ira’s, 401k’s & Keogh’s
  • Tips on Preventing Id Theft

9 – Your Mail

  • Receiving Your Mail
  • Sending Your Mail

10 – Telecommunications

  • Methods of Compromise
  • Misc. Telephone Privacy Tips
  • Internet Voice Mail & Fax
  • Voip Telephony
  • Privacy Advantages of Voip
  • Skype
  • Magic Jack
  • Voip Clients to Consider
  • Zfone
  • Cell Phone Privacy Concerns
  • Prepaid Cell Phones Vs. Payphones
  • Prepaid Cell Phones
  • Various Prepaid Cell Phone Providers
  • Cell Phone Privacy Measures
  • Landlines
  • Prepaid Calling Cards
  • What About Pagers?

11 – Passphrases

  • How Passphrases Are Guessed
  • Your Password Is Probably Not Good Enough
  • Creating Memorized Strong Passphrases
  • “bit Strength Threshold”
  • Best Tip: Turn Sentence Into Passphrase
  • Passphrase Generators
  • Using & Protecting Passphrases
  • Test Your Passphrase for Strength and Usage
  • Tips on Protecting Your Strong Passphrases
  • Os and Application Dependencies
  • Passphrase Wallets and Vaults
  • Keylogger Threats
  • Compelled Disclosure

12 – Computer Data

  • Definitions
  • Protecting Your Data
  • Data Encryption
  • Truecrypt
  • File Shredders
  • Monitor Security
  • Printers Can Be Individually Identified
  • Media Devices
  • Backing Up Data
  • Physical Security
  • Keyloggers and Magic Lantern Software
  • If Your Computer Is Seized
  • Encryption and Crossing the Border

13 – Internet Privacy

  • Operating System (Os)
  • Windows
  • Mac
  • Linux
  • Hardware
  • Your MAC Addresses
  • Your Wifi Router
  • Firewalls
  • Browsers
  • Microsoft Internet Explorer (Boo, Hiss!)
  • Googlag Chrome (Boooooo, Hiss!!!!)
  • Opera
  • Mozilla Firefox
  • Brave Browser
  • Misc. Browser Security Tips
  • Email Client
  • IP (Internet Protocol) Address
  • Anonymous Surfing (Proxy Tunnels)
  • Email Providers
  • Search Engines
  • Spyware
  • The FBI’s “cipav
  • Some Misc. Tips for All Users
  • Using Public Computers
  • So, You’re Still Using Windows
  • Why You Should Still Migrate From Windows to Linux or macOS
  • Overview

14 – Get a New Puppy! (Linux)

  • How to Install Puppy Linux

15 – Your Private Home

  • Going From Public to Private
  • Get Your New Place Long Before You Need It
  • Buying a New Place With Privacy
  • Renting a New Place With Privacy
  • The Timing of Your Move
  • The Moving Sequence
  • Once at Your New Place
  • Store Your Extra Stuff

16 – the Census & Acs

  • Historical Census Misuse
  • 1864: Sherman’s March Through Georgia
  • 1942-1946: U.s.a. Internment of Japanese
  • 1933-1945: Nazi Germany and Holocaust
  • Future Census Misuse
  • Individual Re-identification From Aggregates
  • Social Security Numbers Are Next
  • Why Not Also Ask About Gun Ownership?
  • Increasingly Empowered Government
  • Loss or Theft of Census Data
  • American Community Survey
  • Resisting the Census & Acs
  • The Census Bureau Process
  • Don’t Waste Your Time and Energy With…
  • You Can’t Answer What’s Not Been Asked
  • An Intriguing Legal Angle
  • Idea for Rural Properties
  • Create Your Own Form for the “enumerator”
  • Some Sample Questions and Answers

17 – Privacy & Your Guns

  • The Purchase
  • Ownership
  • Buying Accessories
  • Storing Your Guns Privately
  • Shooting Your Guns Privately
  • Selling Your Guns
  • Tracking Ownership
  • The Coming Gun Grab

18 – a Quiet Living

  • Privacy on the Job
  • Start Your Own Business

19 – the Private Car

  • Purchasing Your Car
  • Registering Your Car
  • Using Your Car Privately
  • Privatizing Your Car Travel
  • Cbp Agents at Borders and Checkpoints
  • A Cool Boston Tip on Counter-rousting Gear
  • Selling Your Car

20 – Private Travel

  • The Bus
  • The Train
  • Rental Cars
  • Motels & Hotels
  • Commercial Air Travel
  • TSA “selectee” and “no Fly” Lists
  • The Future of Air Travel and Privacy
  • Buying Your Tickets
  • Packing for Privacy, Comfort, and Convenience
  • Checking in
  • Airport Security Tips
  • International Flights
  • Entering the U.s
  • Clearing U.s. Customs
  • How to Avoid Lost & Found

21 – Private Entities

  • Trusts
  • Tax Avoidance Is Legal
  • The Necessity of Foreign Entities
  • Become Your Own Expert

22 – Privacy’s Future

  • 21st Century Dissenters
  • Two Kinds of People
  • The Masses
  • The Remnant
  • Comparing Extremes
  • “we’re So Sane, We’re Insane.”
  • The Über-remnant
  • The Über-masses
  • Different People – Different Roads
  • Can We Ever Be Free?
  • Where Are the Remnant in All This?
  • Some Final Advice

“12 years in the making, this is the long-awaited sequel to and replacement of the popular 1997 Bulletproof Privacy. Three times the size, it thoroughly covers:

  • healthy privacy vs. paranoia
  • private travel in the 21st Century
  • modern communications and privacy
  • the coming National I.D. Card
  • private money — debit cards, digital gold
  • can your home still be your castle?
  • guns & privacy
  • securing your computer
  • ghosting the Internet
  • use encrypted VoIP for free
  • create robust passphrases
  • Windows: a surveillance virus masquerading as an OS?
  • get a new Puppy . . . Linux!
  • dealing with the intrusive Census and ACS questions
  • earning a discreet living
  • how to buy and sell privately
  • answering the old If you have nothing to hide, then . . . “

See also Database Nation: The Death of Privacy in the 21st Century, Privacy vs Surveillance Bibliography, Privacy vs. Surveillance Topics.

Privacy vs. Surveillance Bibliography