Hacking the Web 2.0 User Agency and the Role of Hackers As Computational Mediators

Total Page:16

File Type:pdf, Size:1020Kb

Hacking the Web 2.0 User Agency and the Role of Hackers As Computational Mediators Hacking the Web 2.0 User agency and the role of hackers as computational mediators andrea rota Thesis submitted to the Department of Sociology of the London School of Economics and Political Science for the degree of Doctor of Philosophy. London, January 2016 With amendments (April 2016) I certify that the thesis I have presented for examination for the PhD degree of the London School of Economics and Political Science is solely my own work other than where I have clearly indicated that it is the work of others (in which case the extent of any work carried out jointly by me and any other person is clearly identified in it). The copyright of this thesis rests with the author. Quotation from it is permitted, provided that full acknowledgement is made. This thesis may not be reproduced without my prior written consent. I warrant that this authorisation does not, to the best of my belief, infringe the rights of any third party. Additionally to the above copyright notice as required by the School, I declare that I release this dissertation under a Creative Commons Attribution-ShareAlike 4.0 International license. 1 Abstract This thesis studies the contested reconfigurations of computational agency within the do- main of practices and affordances involved in the use of the Internet in everyday life (here labelled lifeworld Internet), through the transition of the Internet to a much deeper reliance on computation than at any previous stage. Computational agency is here considered not only in terms of capacity to act enabled (or restrained) by the computational layer but also as the recursive capacity to reconfigure the computational layer itself, therefore in turn affecting one’s own and others’ computational agency. My research is based on multisited and diachronic ethnographic fieldwork: an initial (2005–2007) autoethnographic case study focused on the negotiations of computational agency within the development of a Web 2.0 application, later (2010–2011) fieldwork in- terviews focused on processes through which users make sense of the increasing perva- siveness of the Internet and of computation in everyday life, and a review (2010–2015) of hacker discourses focused on tracing the processes through which hackers constitute themselves as a recursive public able to inscribe counter–narratives in the development of technical form and to reproduce itself as a public of computational mediators with capacity to operate at the intersection of the technical and the social. By grounding my enquiry in the specific context of the lifeworlds of individual end users but by following computational agency through global hacker discourses, my re- search explores the role of computation, computational capacity and computational me- diators in the processes through which users ‘hack’ their everyday Internet environments for practical utility, or develop independent alternatives to centralized Internet services as part of their contestation of values inscribed in the materiality of mainstream Internet. 2 Contents 1 Introduction 9 1.1 Enter the Read/Write Internet ....................... 9 1.2 Overview ................................... 13 1.3 Research focus and research question ................... 19 1.4 Thesis outline ................................ 23 1.5 Contributions to previous research ..................... 30 2 Conceptual framework 34 2.1 Assembling pre–Read/Write Internet ................... 35 2.1.1 The early Internet as a mediated environment . 37 2.1.2 The ethnographic turn in Internet studies . 40 2.2 Assembling Read/Write Internet ...................... 42 2.2.1 Unfolding the Web 2.0 narrative . 42 2.2.2 Read/Write culture ......................... 44 2.2.3 User–generated content and engagement . 46 2.2.4 Critiques of Web 2.0 ........................ 48 2.3 Internet and lifeworld ............................ 51 2.4 Conceptualising power struggles around the Read/Write Internet . 53 3 Research methods: choices and challenges 59 3.1 Introduction ................................. 59 3.2 Researching computational agency: fieldwork sites and contexts . 62 3 4 3.2.1 From a failed Web 2.0 experiment to ethnography of student ac- counts ................................ 62 3.2.2 An ethnographic project? ...................... 65 3.3 Researching user accounts ......................... 67 3.3.1 Recruitment and selection of fieldwork participants . 67 3.3.2 Natives of Read/Write Internet? Demographic considerations . 70 3.3.3 The ordinary user .......................... 71 3.3.4 The interview process ....................... 75 3.4 Making sense of fieldwork stories ..................... 78 3.4.1 Prior knowledge and the role of the researcher . 78 3.4.2 Between autoethnography and participant observation . 81 3.4.3 Beyond the field: following the actors . 84 4 Mainstream lifeworld Internet: material architecture and the role of compu- tation 90 4.1 Introduction ................................. 90 4.2 From Web 2.0 to Read/Write: the architecture of lifeworld Internet . 93 4.3 Deconstructing the telos of progress .................... 99 4.3.1 Narratives of versions . 103 4.4 Topology and agency: client/server over peer–to–peer . 105 4.5 The computational turn of the Internet . 113 4.5.1 Key traits .............................. 116 4.5.2 An example: narratives of computational versions . 127 5 Assembling lifeworld within Web 2.0: negotiations and normativity 130 5.1 Introduction ................................. 130 5.2 Design of the Goldsmiths 3D Graduate app: composing information mashups133 5.3 Institutional knowledge and information politics . 136 5.4 User lifeworld and Web 2.0: a complicated relationship . 140 5.5 Web 2.0 and development constraints . 145 5.6 Engineering negotiations: actual configurations . 149 5 5.7 Conclusion .................................. 151 6 Re-assembling lifeworld Internet: user accounts 153 6.1 Introduction ................................. 153 6.2 Five years of Web 2.0 promises: what really happened? . 156 6.2.1 Producing content on the Read/Write Internet . 156 6.2.2 Aggregating content, connecting meaning . 161 6.3 Reconfiguring practices . 164 6.3.1 Downloading, consuming and sharing content . 165 6.3.2 Dealing with social norms online . 170 6.4 Reconfiguring computational infrastructure . 175 6.4.1 Read/Write practices and meaning: a complicated relationship . 175 6.4.2 Hacking lifeworld Internet: advanced practices . 178 7 Hackers as recursive public: constitution of computational mediators 184 7.1 Introduction ................................. 184 7.2 Inscribing recursion in computational infrastructure . 187 7.2.1 Negotiating computational complexity from context diversity . 188 7.2.2 Material grounding of new Internet standards . 192 7.3 Read/Write hacker learning and reproduction of hacker knowledge . 194 7.3.1 ”Civilized discourse” as environment for informal learning . 197 7.3.2 Computational platforms for hacker learning . 201 7.3.3 Taking code for granted: learning to write by reading others’ code 205 7.3.4 Beyond visibility of code: learning computational thinking . 211 7.4 A recursive public of hackers . 213 7.4.1 Peer-induction to hacker discourses . 217 8 Computational Read/Write Internet: assembling alternative rationalizations221 8.1 Introduction ................................. 221 8.2 Self-hosting: the IndieWeb . 223 8.2.1 Owning one’s own content on the web . 223 6 8.2.2 Reading and Writing on the web: IndieWeb strategies . 225 8.2.3 Balancing control and convenience: taking part in social conver- sations on the web . 228 8.2.4 IndieWeb hackers: motivations and peer support . 231 8.3 Decentralized Read/Write Internet: reassembling p2p infrastructure . 236 8.3.1 Countering centralization: hacker motivations . 238 8.3.2 Computational turn and decentralization: from user-to-user to machine-to-machine configurations . 240 8.3.3 Redecentralized Internet: strategies and configurations . 242 8.4 Alternative rationalizations and computational mediation . 248 8.4.1 Redecentralization efforts and end user engagement . 248 8.4.2 Convenience and trust in decentralized configurations . 252 8.4.3 Agency and computational capacity: the contested execution of code ................................. 256 8.4.4 Political economy of redecentralization . 260 8.5 Conclusion .................................. 266 9 Conclusion 269 9.1 Review of research findings . 270 9.2 Answering the research question . 273 9.3 Suggestions for future research . 276 A Profiles of students interviewed during fieldwork (2010-2011) 281 B Sources for the textual analysis of hacker publics and their projects 285 B.1 Magazines (printed or digital) . 287 B.2 Social news websites ............................. 288 B.3 Blogs and microblogs of individual hackers . 289 B.4 Engineering blogs .............................. 290 B.5 Conferences and hacker conventions . 291 B.6 Interviews and podcasts . 292 7 B.7 Source code and project websites . 293 B.8 Academic and professional journals . 293 References 295 List of Figures 4.1 ’Nanobots’ (from xkcd comics) . 111 7.1 Schematic chart of software infrastructure for a typical mid-2000s Web 2.0 app versus a typical post-computational turn web app . 190 7.2 User profile on Stack Overflow . 200 7.3 User activity summary on Stack Overflow . 201 7.4 Code and electronics assembly instructions from a maker zine . 206 8 Chapter 1 Introduction 1.1 Enter the Read/Write Internet In retrospect, it was like I was killing my time waiting for the web to show up. [...] I sometimes feel like I was born too
Recommended publications
  • Most Contagious 2011
    MOST CONTAGIOUS 2011 Cover image: Take This LoLLipop / Jason Zada most contagious / p.02 / mosT ConTAGIOUS 2011 / subsCripTion oFFer / 20% disCounT FuTure-prooFing your brain VALid unTiL 9Th JANUARY 2012 offering a saving of £200 gBP chapters / Contagious exists to find and filter the most innovative 01 / exercises in branding, technology, and popular culture, and movemenTs deliver this collective wisdom to our beloved subscribers. 02 / Once a year, we round up the highlights, identify what’s important proJeCTs and why, and push it out to the world, for free. 03 / serviCe Welcome to Most Contagious 2011, the only retrospective you’ll ever need. 04 / soCiaL It’s been an extraordinary year; economies in turmoil, empires 05 / torn down, dizzying technological progress, the evolution of idenTiTy brands into venture capitalists, the evolution of a generation of young people into entrepreneurs… 06 / TeChnoLogy It’s also been a bumper year for the Contagious crew. Our 07 / Insider consultancy division is now bringing insight and inspiration daTa to clients from Kraft to Nike, and Google to BBC Worldwide. We 08 / were thrilled with the success of our first Now / Next / Why event augmenTed in London in December, and are bringing the show to New York 09 / on February 22nd. Grab your ticket here. money We’ve added more people to our offices in London and New 10 / York, launched an office in India, and in 2012 have our sights haCk Culture firmly set on Brazil. Latin America, we’re on our way. Get ready! 11 / musiC 2.0 We would also like to take this opportunity to thank our friends, supporters and especially our valued subscribers, all over the 12 / world.
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Linux Journal | August 2014 | Issue
    ™ SPONSORED BY Since 1994: The Original Magazine of the Linux Community AUGUST 2014 | ISSUE 244 | www.linuxjournal.com PROGRAMMING HOW-TO: + OpenGL Build, Develop Programming and Validate Creation of RPMs USE VAGRANT Sysadmin Cloud for an Easier Troubleshooting Development with dhclient Workflow Tips for PROMISE Becoming a THEORY Web Developer An In-Depth A Rundown Look of Linux for Recreation V WATCH: ISSUE OVERVIEW LJ244-Aug2014.indd 1 7/23/14 6:56 PM Get the automation platform that makes it easy to: Build Infrastructure Deploy Applications Manage In your data center or in the cloud. getchef.com LJ244-Aug2014.indd 2 7/23/14 11:41 AM Are you tiredtiered of of dealing dealing with with proprietary proprietary storage? storage? ® 9%2Ä4MHÆDCÄ2SNQ@FD ZFS Unified Storage zStax StorCore from Silicon - From modest data storage needs to a multi-tiered production storage environment, zStax StorCore zStax StorCore 64 zStax StorCore 104 The zStax StorCore 64 utilizes the latest in The zStax StorCore 104 is the flagship of the dual-processor Intel® Xeon® platforms and fast zStax product line. With its highly available SAS SSDs for caching. The zStax StorCore 64 configurations and scalable architecture, the platform is perfect for: zStax StorCore 104 platform is ideal for: VPDOOPHGLXPRIILFHILOHVHUYHUV EDFNHQGVWRUDJHIRUYLUWXDOL]HGHQYLURQPHQWV VWUHDPLQJYLGHRKRVWV PLVVLRQFULWLFDOGDWDEDVHDSSOLFDWLRQV VPDOOGDWDDUFKLYHV DOZD\VDYDLODEOHDFWLYHDUFKLYHV TalkTalk with with an anexpert expert today: today: 866-352-1173 866-352-1173 - http://www.siliconmechanics.com/zstax LJ244-Aug2014.indd 3 7/23/14 11:41 AM AUGUST 2014 CONTENTS ISSUE 244 PROGRAMMING FEATURES 64 Vagrant 74 An Introduction to How to use Vagrant to create a OpenGL Programming much easier development workflow.
    [Show full text]
  • Hacker Public Radio
    hpr0001 :: Introduction to HPR hpr0002 :: Customization the Lost Reason hpr0003 :: Lost Haycon Audio Aired on 2007-12-31 and hosted by StankDawg Aired on 2008-01-01 and hosted by deepgeek Aired on 2008-01-02 and hosted by Morgellon StankDawg and Enigma talk about what HPR is and how someone can contribute deepgeek talks about Customization being the lost reason in switching from Morgellon and others traipse around in the woods geocaching at midnight windows to linux Customization docdroppers article hpr0004 :: Firefox Profiles hpr0005 :: Database 101 Part 1 hpr0006 :: Part 15 Broadcasting Aired on 2008-01-03 and hosted by Peter Aired on 2008-01-06 and hosted by StankDawg as part of the Database 101 series. Aired on 2008-01-08 and hosted by dosman Peter explains how to move firefox profiles from machine to machine 1st part of the Database 101 series with Stankdawg dosman and zach from the packetsniffers talk about Part 15 Broadcasting Part 15 broadcasting resources SSTRAN AMT3000 part 15 transmitter hpr0007 :: Orwell Rolled over in his grave hpr0009 :: This old Hack 4 hpr0008 :: Asus EePC Aired on 2008-01-09 and hosted by deepgeek Aired on 2008-01-10 and hosted by fawkesfyre as part of the This Old Hack series. Aired on 2008-01-10 and hosted by Mubix deepgeek reviews a film Part 4 of the series this old hack Mubix and Redanthrax discuss the EEpc hpr0010 :: The Linux Boot Process Part 1 hpr0011 :: dd_rhelp hpr0012 :: Xen Aired on 2008-01-13 and hosted by Dann as part of the The Linux Boot Process series.
    [Show full text]
  • Software in the Public Interest, Inc. 2011-2012 Annual Report
    Software in the Public Interest, Inc. 2011-2012 Annual Report 1st July 2012 To the membership, board and friends of Software in the Public Interest, Inc: As mandated by Article 8 of the SPI Bylaws, I respectfully submit this annual report on the activities of Software in the Public Interest, Inc. and extend my thanks to all of those who contributed to the mission of SPI in the past year. { Jonathan McDowell, SPI Secretary 1 Contents 1 President's Welcome3 2 Committee Reports4 2.1 Membership Committee.......................4 2.1.1 Statistics...........................4 3 Board Report5 3.1 Board Members............................5 3.2 Board Changes............................6 3.3 Elections................................6 4 Treasurer's Report7 4.1 Income Statement..........................7 4.2 Balance Sheet.............................9 5 Member Project Reports 11 5.1 New Associated Projects....................... 11 5.1.1 Drizzle............................. 11 5.1.2 Arch Linux.......................... 11 5.1.3 FreedomBox......................... 11 5.1.4 Fluxbox............................ 12 5.1.5 Haskell.org.......................... 12 5.1.6 FFmpeg............................ 12 A About SPI 13 2 Chapter 1 President's Welcome { Bdale Garbee, SPI President 3 Chapter 2 Committee Reports 2.1 Membership Committee The membership committee was extended to cover the entire board. 2.1.1 Statistics At the time of writing (July 10th) the current membership status is: NC Applicants Pending Email Approval 94 NC Members 485 Contrib Membership Applications 11 Contrib Members 489 Application Managers 9 On 1st July 2011 we had 445 contributing and 436 non-contributing members. On 1st July 2011 there were 481 contributing members and 452 non-contributing members.
    [Show full text]
  • Praktikum Iz Softverskih Alata U Elektronici 2020/2021
    PRAKTIKUM IZ SOFTVERSKIH ALATA U ELEKTRONICI 2020/2021 Predrag Pejović 16.01.2021, 10:00 © 2021 Predrag Pejović, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Linkovi na primere: OS 1: http://tnt.etf.bg.ac.rs/~oe4sae/softwareinstall.sh OS 2: http://tnt.etf.bg.ac.rs/~oe4sae/primeri-3-2020.zip LATEX 1: http://tnt.etf.bg.ac.rs/~oe4sae/primeri-4-2020.zip LATEX 2: http://tnt.etf.bg.ac.rs/~oe4sae/primeri-5-2020.zip LATEX 3: http://tnt.etf.bg.ac.rs/~oe4sae/primeri-6-2020.zip LATEX 4: http://tnt.etf.bg.ac.rs/~oe4sae/primeri-7-2020.zip Python 1: http://tnt.etf.bg.ac.rs/~oe4sae/primeri-9-2020.py Python 2: http://tnt.etf.bg.ac.rs/~oe4sae/primeri-10-2020.zip Python 3: http://tnt.etf.bg.ac.rs/~oe4sae/primeri-11-2020.zip GNU Octave: http://tnt.etf.bg.ac.rs/~oe4sae/primeri-12-2020.zip SageMath: http://tnt.etf.bg.ac.rs/~oe4sae/primeri-13-2020.zip Alternativni linkovi na primere: OS 1: http://peja.freedombox.rocks/PSAE/softwareinstall.sh OS 2: http://peja.freedombox.rocks/PSAE/primeri-3-2020.zip LATEX 1: http://peja.freedombox.rocks/PSAE/primeri-4-2020.zip LATEX 2: http://peja.freedombox.rocks/PSAE/primeri-5-2020.zip LATEX 3: http://peja.freedombox.rocks/PSAE/primeri-6-2020.zip LATEX 4: http://peja.freedombox.rocks/PSAE/primeri-7-2020.zip Python 1: http://peja.freedombox.rocks/PSAE/primeri-9-2020.py Python 2: http://peja.freedombox.rocks/PSAE/primeri-10-2020.zip Python 3: http://peja.freedombox.rocks/PSAE/primeri-11-2020.zip GNU Octave: http://peja.freedombox.rocks/PSAE/primeri-12-2020.zip SageMath: http://peja.freedombox.rocks/PSAE/primeri-13-2020.zip PRAKTIKUM IZ SOFTVERSKIH ALATA U ELEKTRONICI 2020 PRAKTIKUM IZ SOFTVERSKIH ALATA U ELEKTRONICI 2020 c Predrag Pejović, Lica (i ostali podaci o predmetu): Lica, dopuna, odakle ja u ovome? I dr Predrag Pejović, red.
    [Show full text]
  • Sense of Community and Political Mobilization in Virtual Communities: the Role of Dispositional and Situational Variables
    Butler University Digital Commons @ Butler University Scholarship and Professional Work - Communication College of Communication 2010 Sense of Community and Political Mobilization in Virtual Communities: The Role of Dispositional and Situational Variables Kevin Y. Wang Butler University, [email protected] Follow this and additional works at: https://digitalcommons.butler.edu/ccom_papers Part of the Communication Technology and New Media Commons, Social Influence and oliticalP Communication Commons, and the Social Media Commons Recommended Citation Wang, Kevin Y., "Sense of Community and Political Mobilization in Virtual Communities: The Role of Dispositional and Situational Variables" (2010). Scholarship and Professional Work - Communication. 115. https://digitalcommons.butler.edu/ccom_papers/115 This Article is brought to you for free and open access by the College of Communication at Digital Commons @ Butler University. It has been accepted for inclusion in Scholarship and Professional Work - Communication by an authorized administrator of Digital Commons @ Butler University. For more information, please contact [email protected]. Observatorio (OBS*) Journal, vol.4 - nº1 (2010), 073-096 1646-5954/ERC123483/2010 073 Sense of Community and Political Mobilization in Virtual Communities: The Role of Dispositional and Situational Variables Kevin Y. Wang, University of Minnesota – School of Journalism and Mass Communication Abstract This paper explores the psychological processes that connect virtual communities to political behavior.
    [Show full text]
  • The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 8th Edition, December 2011 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Demographics ............................................................................................................................................. 4 Social Networking Use Becomes More Active ................................................................ 5 Facebook Applications Bandwidth Consumption Triples .......................................................................... 5 Twitter Bandwidth Consumption Increases 7-Fold ................................................................................... 6 Some Perspective On Bandwidth Consumption .................................................................................... 7 Managing the Risks .................................................................................................................................... 7 Browser-based Filesharing: Work vs. Entertainment .................................................... 8 Infrastructure- or Productivity-Oriented Browser-based Filesharing ..................................................... 9 Entertainment Oriented Browser-based Filesharing .............................................................................. 10 Comparing Frequency and Volume of Use
    [Show full text]
  • Dictionary of Health Information Technology and Security
    DICTIONARY OF HEALTH INFORMATION TECHNOLOGY AND SECURITY Dr. David Edward Marcinko, MBA , CFP© Certifi ed Medical Planner© Editor-in-Chief Hope Rachel Hetico, RN, MSHA, CPHQ Certifi ed Medical Planner© Managing Editor NEW YORK 33021009_FM1.indd021009_FM1.indd i 003/17/20073/17/2007 116:48:506:48:50 Copyright © 2007 Springer Publishing Company, LLC All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmit- ted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of Springer Publishing Company, LLC. Springer Publishing Company, LLC 11 West 42nd Street New York, NY 10036 www.springerpub.com Acquisitions Editor: Sheri W. Sussman Production Editor: Carol Cain Cover design: Mimi Flow Composition: Apex Publishing, LLC 07 08 09 10/ 5 4 3 2 1 Library of Congress Cataloging-in-Publication Data Dictionary of health information technology and security / David Edward Marcinko, editor-in-chief, Hope Rachel Hetico, managing editor. p. ; cm. Includes bibliographical references. ISBN-13: 978-0-8261-4995-4 (alk. paper) ISBN-10: 0-8261-4995-2 (alk. paper) 1. Medical informatics—Dictionaries. 2. Medicine—Information technology—Dictionaries. 3. Medical informatics—Security measures— Dictionaries. I. Marcinko, David E. (David Edward) II. Hetico, Hope R. [DNLM: 1. Informatics—Dictionary—English. 2. Medical Informatics— Dictionary—English. 3. Computer Communication Networks—Dictionary— English. 4. Computer Security—Dictionary—English. W 13 D557165 2007] R858.D53 2007 610.3—dc22 2007005879 Printed in the United States of America by RR Donnelley. 33021009_FM1.indd021009_FM1.indd iiii 003/17/20073/17/2007 116:48:516:48:51 Th e Dictionary of Health Information Technology and Security is dedicated to Edward Anthony Marcinko Sr., and Edward Anthony Marcinko Jr., of Fell’s Point, Maryland.
    [Show full text]
  • Functional Package and Configuration Management with GNU Guix
    Functional Package and Configuration Management with GNU Guix David Thompson Wednesday, January 20th, 2016 About me GNU project volunteer GNU Guile user and contributor since 2012 GNU Guix contributor since 2013 Day job: Ruby + JavaScript web development / “DevOps” 2 Overview • Problems with application packaging and deployment • Intro to functional package and configuration management • Towards the future • How you can help 3 User autonomy and control It is becoming increasingly difficult to have control over your own computing: • GNU/Linux package managers not meeting user needs • Self-hosting web applications requires too much time and effort • Growing number of projects recommend installation via curl | sudo bash 1 or otherwise avoid using system package managers • Users unable to verify that a given binary corresponds to the source code 1http://curlpipesh.tumblr.com/ 4 User autonomy and control “Debian and other distributions are going to be that thing you run Docker on, little more.” 2 2“ownCloud and distribution packaging” http://lwn.net/Articles/670566/ 5 User autonomy and control This is very bad for desktop users and system administrators alike. We must regain control! 6 What’s wrong with Apt/Yum/Pacman/etc.? Global state (/usr) that prevents multiple versions of a package from coexisting. Non-atomic installation, removal, upgrade of software. No way to roll back. Nondeterminstic package builds and maintainer-uploaded binaries. (though this is changing!) Reliance on pre-built binaries provided by a single point of trust. Requires superuser privileges. 7 The problem is bigger Proliferation of language-specific package managers and binary bundles that complicate secure system maintenance.
    [Show full text]
  • Lexical Innovation on the Internet - Neologisms in Blogs
    Zurich Open Repository and Archive University of Zurich Main Library Strickhofstrasse 39 CH-8057 Zurich www.zora.uzh.ch Year: 2009 Lexical innovation on the internet - neologisms in blogs Smyk-Bhattacharjee, Dorota Abstract: Studien im Bereich des Sprachwandels beschreiben traditionellerweise diachronische Verän- derungen in den Kernsubsystemen der Sprache und versuchen, diese zu erklären. Obwohl ein Grossteil der Sprachwissenschaftler sich darüber einig ist, dass die aktuellen Entwicklungen in einer Sprache am klarsten im Wortschatz reflektiert werden, lassen die lexikographischen und morphologischen Zugänge zur Beobachtung des lexikalischen Wandels wichtige Fragen offen. So beschäftigen sich letztere typischer- weise mit Veränderungen, die schon stattgefunden haben, statt sich dem sich zum aktuellen Zeitpunkt vollziehenden Wandel zu widmen. Die vorliegende Dissertation bietet eine innovative Lösung zur Un- tersuchung des sich vollziehenden lexikalischen Wandels sowohl in Bezug auf die Datenquelle als auch bzgl. der verwendeten Methodologie. In den vergangenen 20 Jahren hat das Internet unsere Art zu leben, zu arbeiten und zu kommunizieren drastisch beeinflusst. Das Internet bietet aber auch eine Masse an frei zugänglichen Sprachdaten und damit neue Möglichkeiten für die Sprachforschung. Die in dieser Arbeit verwendeten Daten stammen aus einem Korpus englischsprachiger Blogs, eine Art Computer gestützte Kommunikation (computer-mediated communication, CMC). Blogs bieten eine neue, beispiel- lose Möglichkeit, Wörtern nachzuspüren zum Zeitpunkt, in der sie Eingang in die Sprache finden. Um die Untersuchung des Korpus zu vereinfachen, wurde eine Software mit dem Namen Indiana entwickelt. Dieses Instrument verbindet den Korpus basierten Zugang mit einer lexikographischen Analyse. Indiana verwendet eine Kombination von HTML-to-text converter, eine kumulative Datenbank und verschiede Filter, um potentielle Neologismen im Korpus identifizieren zu können.
    [Show full text]
  • Enabling Learning by Teaching: Intuitive Composing of E-Learning Modules
    Enabling Learning by Teaching: Intuitive Composing of E-Learning Modules Alexander Berntsen Stian Ellingsen Emil Henry Flakk [email protected] [email protected] [email protected] 2nd November 2015 Abstract In an effort to foster learning by teaching, we propose the development of a canvas system that makes composing e-learning modules intuitive. We try to empower and liberate non-technical module users by lowering the bar for turning them into module authors, a bar previously set far too high. In turn, this stimulates learning through teaching. By making a damn fine piece of software, we furthermore make module authoring more pleasant for experienced authors as well. We propose a system that initially enables users to easily compose H5P modules. These modules are successively easy to share and modify. Through gamification we encourage authors to share their work, and to improve the works of others. Contents 1 Introduction 2 2 The problem 2 3 Our idea 2 4 The details 4 5 First principles 7 6 Related work 8 7 Conclusions and further work 17 A Design document 21 arXiv:1510.09093v1 [cs.CY] 30 Oct 2015 List of Figures 1 A system where the user watches a YouTube video, then reads an article on NRK, and finally does a quiz . .3 2 A dialogue for tweaking conditional flow . .3 3 A reward for positive behaviour . .4 4 A user dragging a module onto the canvas to add it . .4 5 Visualised control flow . .4 6 Search results, filtered by type . .5 7 An avatar helping the user . .5 1 1.
    [Show full text]