Company Participation in Open Source Software Communities: Measuring Sustainability
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Hacker Culture & Politics
HACKER CULTURE & POLITICS COMS 541 (CRN 15368) 1435-1725 Department of Art History and Communication Studies McGill University Professor Gabriella Coleman Fall 2012 Arts W-220/ 14:35-17:25 Professor: Dr. Gabriella Coleman Office: Arts W-110 Office hours: Sign up sheet Tuesday 2:30-3:30 PM Phone: xxx E-mail: [email protected] OVERVIEW This course examines computer hackers to interrogate not only the ethics and technical practices of hacking, but to examine more broadly how hackers and hacking have transformed the politics of computing and the Internet more generally. We will examine how hacker values are realized and constituted by different legal, technical, and ethical activities of computer hacking—for example, free software production, cyberactivism and hactivism, cryptography, and the prankish games of hacker underground. We will pay close attention to how ethical principles are variably represented and thought of by hackers, journalists, and academics and we will use the example of hacking to address various topics on law, order, and politics on the Internet such as: free speech and censorship, privacy, security, surveillance, and intellectual property. We finish with an in-depth look at two sites of hacker and activist action: Wikileaks and Anonymous. LEARNER OBJECTIVES This will allow us to 1) demonstrate familiarity with variants of hacking 2) critically examine the multiple ways hackers draw on and reconfigure dominant ideas of property, freedom, and privacy through their diverse moral 1 codes and technical activities 3) broaden our understanding of politics of the Internet by evaluating the various political effects and ramifications of hacking. -
Elegant Resume
ALAN ELKNER 112 Chanticleer, Cherry Hill, NJ 08003 (609) 605-1945 [email protected] SUMMARY OF QUALIFICATIONS . Close to thirty years experience in the development of web applications and data hosting systems for the Unix, Intel PC and IBM mainframe environments . Extensive experience developing back-end systems for integration between clients and servers . Consistently recognized by management and peers for producing high-quality work; attention to simplicity of structure, leading to highly reliable and maintainable systems . Trusted by management to deal with clients from design phase to installation; strong inter- personal skills leading to high customer satisfaction . One year experience each working in Germany and Italy while gaining fluency in both languages SOFTWARE DEVELOPMENT ENVIRONMENTS . Web platforms, Django and Zope, using Python, running on Linux, Sun Solaris . MySQL and PostgreSQL database systems . HTML5, CSS, JavaScript and jQuery, including Ajax . Microsoft Visual C++, Visual Basic, Access and SQL Server, Active Server Pages EXPERIENCE 2013 – 2015 HelpHOPELive Cherry Hill, NJ . Django/Python developer for a non-profit specializing in crowd-funded campaigns for patients in need of assistance with medical expenses. Responsibilities include implementing requirements as defined in JIRA ticket system for feature enhancements to the core web application, written for the Django web framework and Python programming language. Utilized JavaScript, jQuery, Ajax, HTML5, and CSS on the browser side. 2013 – 2014 NovaWebDevelopment Cherry Hill, NJ . Project Manager, Django/Python Developer and Mentor for a start-up non-profit specializing in writing web applications in Django and Python. Contract involved creating a web application for teaching deaf children to read. Application presents images, videos and words to the student in a jQuery event-driven set of web pages, including timer events for animation. -
Adoption of Open Source Software in Software-Intensive Organizations - a Systematic Literature Review
Adoption of Open Source Software in Software-Intensive Organizations - A Systematic Literature Review Øyvind Hauge∗,1, Claudia Ayala1,2, Reidar Conradi1 IDI, NTNU, Sem Sælands vei 7-9, NO-7491 Trondheim, Norway Abstract Context: Open source software (OSS) is changing the way organizations develop, acquire, use, and commercialize software. Objective: This paper seeks to identify how organizations adopt OSS, classify the literature according to these ways of adopting OSS, and with a focus on software development evaluate the research on adoption of OSS in organiza- tions. Method: Based on the systematic literature review method we reviewed pub- lications from 24 journals and seven conference and workshop proceedings, published between 1998 and 2008. From a population of 24289 papers, we identified 112 papers that provide empirical evidence on how organizations actually adopt OSS. Results: We show that adopting OSS involves more than simply using OSS products. We moreover provide a classification framework consisting of six distinctly different ways in which organizations adopt OSS. This framework is used to illustrate some of the opportunities and challenges organizations meet when approaching OSS, to show that OSS can be adopted successfully in different ways, and to organize and review existing research. We find that existing research on OSS adoption does not sufficiently describe the context of the organizations studied, it is furthermore fragmented, and it fails to benefit fully from related research fields. To aid this situation, we offer directions for future research. ∗Corresponding author. Tel: +47 97 71 22 52; Fax: +47 73 59 44 66 Email addresses: [email protected] (Øyvind Hauge), [email protected] (Claudia Ayala), [email protected] (Reidar Conradi) 1Norwegian University of Science and Technology 2Technical University of Catalunya Preprint submitted to Information Software Technology April 26, 2010 Conclusion: The implications of our findings are twofold. -
Hacked: a Radical Approach to Hacker Culture and Crime by Kevin F.Steinmetz Richard A
International Social Science Review Volume 93 | Issue 2 Article 10 Book Review: Hacked: A Radical Approach to Hacker Culture and Crime by Kevin F.Steinmetz Richard A. Almeida Francis Marion University Follow this and additional works at: https://digitalcommons.northgeorgia.edu/issr Part of the Anthropology Commons, Communication Commons, Economics Commons, Geography Commons, International and Area Studies Commons, Political Science Commons, and the Public Affairs, Public Policy and Public Administration Commons Recommended Citation Almeida, Richard A. () "Book Review: Hacked: A Radical Approach to Hacker Culture and Crime by Kevin F.Steinmetz," International Social Science Review: Vol. 93 : Iss. 2 , Article 10. Available at: https://digitalcommons.northgeorgia.edu/issr/vol93/iss2/10 This Book Review is brought to you for free and open access by Nighthawks Open Institutional Repository. It has been accepted for inclusion in International Social Science Review by an authorized editor of Nighthawks Open Institutional Repository. Almeida: Book Review: Hacked Steinmetz, Kevin F. Hacked: A Radical Approach to Hacker Culture and Crime. 2016. New York: New York University Press. xv + 285 pages. Paperback, $28. “Hackers” and “hacking” occupy a complicated place in twenty-first century American life. Images of misfit teenagers, sinister manipulators of the democratic process, and monomaniacally-focused corporate intruders abound. Kevin Steinmetz acknowledges that those archetypes have some legitimacy but makes a convincing case that “craftsperson,” “guild member,” and “exploited proletarian” should be added to the iconography of hacking. On his account, hackers and hacker culture occupy an interesting and important place in American culture and the post-Fordist economy, one that can be fruitfully explored with a “radical” (Marx- inspired) approach. -
Free As in Freedom (2.0): Richard Stallman and the Free Software Revolution
Free as in Freedom (2.0): Richard Stallman and the Free Software Revolution Sam Williams Second edition revisions by Richard M. Stallman i This is Free as in Freedom 2.0: Richard Stallman and the Free Soft- ware Revolution, a revision of Free as in Freedom: Richard Stallman's Crusade for Free Software. Copyright c 2002, 2010 Sam Williams Copyright c 2010 Richard M. Stallman Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License." Published by the Free Software Foundation 51 Franklin St., Fifth Floor Boston, MA 02110-1335 USA ISBN: 9780983159216 The cover photograph of Richard Stallman is by Peter Hinely. The PDP-10 photograph in Chapter 7 is by Rodney Brooks. The photo- graph of St. IGNUcius in Chapter 8 is by Stian Eikeland. Contents Foreword by Richard M. Stallmanv Preface by Sam Williams vii 1 For Want of a Printer1 2 2001: A Hacker's Odyssey 13 3 A Portrait of the Hacker as a Young Man 25 4 Impeach God 37 5 Puddle of Freedom 59 6 The Emacs Commune 77 7 A Stark Moral Choice 89 8 St. Ignucius 109 9 The GNU General Public License 123 10 GNU/Linux 145 iii iv CONTENTS 11 Open Source 159 12 A Brief Journey through Hacker Hell 175 13 Continuing the Fight 181 Epilogue from Sam Williams: Crushing Loneliness 193 Appendix A { Hack, Hackers, and Hacking 209 Appendix B { GNU Free Documentation License 217 Foreword by Richard M. -
TESMA: Requirements and Design of a Tool for Educational Programs †
information Article TESMA: Requirements and Design of a Tool for Educational Programs † Nicolas Guelfi *,‡, Benjamin Jahi´c ‡ and Benoît Ries ‡ Université du Luxembourg. 2, avenue de l’Université, L-4365 Esch-sur-Alzette, Luxembourg; [email protected] (B.J.); [email protected] (B.R.) * Correspondence: nicolas.guelfi@uni.lu; Tel.: +352-466-644-5251 † This paper is an extended version of our paper published in Nicolas Guelfi, Benjamin Jahi´cand Benoît Ries, TESMA: Towards the Development of a Tool for Specification, Management and Assessment of Teaching Programs, published in the Proceedings of the 2nd International Conference on Applications in Information Technology (ICAIT-2016). ‡ These authors contributed equally to this work. Academic Editors: Evgeny Pyshkin, Vitaly Klyuev and Alexander Vazhenin Received: 2 December 2016; Accepted: 18 March 2017; Published: 22 March 2017 Abstract: Defining and managing teaching programs at universities or other institutions is a complex task for which there is not much support in terms of methods and tools. This task becomes even more critical when the time comes to obtain certifications w.r.t. official standards. In this paper, we present an on-going project called TESMA, whose objective is to provide an open-source tool dedicated to the specification and management (including certification) of teaching programs. An in-depth market analysis regarding related tools and conceptual frameworks of the project is presented. This tool has been engineered using a development method called Messir for its requirements elicitation and introduces a domain-specific language dedicated to the teaching domain. This paper presents the current status of this project and the future activities planned. -
Informática Educativa
MINISTÉRIO DA EDUCAÇÃO Universidade Aberta do Brasil Instituto Federal de Educação, Ciência e Tecnologia do Ceará Diretoria de Educação a Distância Licenciatura em Educação Profissional, Científica e Tecnológica Informática Educativa Marlene de Alencar Dutra Tatiana Santos da Paz Fortaleza, CE 2015 Créditos Presidente Equipe Arte, Criação e Produção Visual Dilma Vana Rousseff Camila Ferreira Mendes Ministro da Educação Érica Andrade Figueirêdo Renato Janine Ribeiro Lucas de Brito Arruda Quezia Brandão Souto Presidente da CAPES Renan da Silveira Teles Carlos Afonso Nobre Suzan Pagani Maranhão Diretor de EaD – CAPES Equipe Web Jean Marc Georges Mutzig Bruno Martins Ferreira Reitor do IFCE Corneli Gomes Furtado Júnior Virgílio Augusto Sales Araripe Fabrice Marc Joye Pró-Reitor de Ensino Francisco César de Araújo Filho Reuber Saraiva de Santiago Ícaro Magalhães Holanda Barroso Diretora de EAD/IFCE e Herculano Gonçalves Santos Coordenadora UAB/IFCE Revisão Cassandra Ribeiro Joye Antônio Carlos Marques Júnior Coordenadora Adjunta UAB Débora Liberato Arruda Hissa Gina Maria Porto de Aguiar Nukácia Meyre Araújo de Almeida Saulo Garcia Coordenador do Curso de Licenciatura em Educação Profissional, Científica e Logística Tecnológica Francisco Roberto Dias de Aguiar João Eudes Moreira da Silva Elaboração do conteúdo Marlene de Alencar Dutra Tatiana Santos da Paz Colaboradora Márcia Roxana da Silva Regis Equipe Pedagógica e Design Instrucional Camilla Alves Barros Daniele Luciano Marques Iraci de Oliveira Moraes Schmidlin Isabel Cristina Pereira da Costa Karine Nascimento Portela Lívia Maria de Lima Santiago Luciana Andrade Rodrigues Márcia Roxana da Silva Regis Maria do Socorro Nogueira de Paula Marília Maia Moreira Siany Góes de Sousa Tassia Pinheiro de Sousa Catalogação na Fonte: Biblioteca Waldyr Diogo de Siqueira D978i Dutra, Marlene de Alencar. -
Open Source and Journalism: Toward New Frameworks for Imagining News
MCS35510.1177/0163443713485494Media, Culture & SocietyLewis and Usher 4854942013 Article Media, Culture & Society 35(5) 602 –619 Open source and journalism: © The Author(s) 2013 Reprints and permissions: toward new frameworks for sagepub.co.uk/journalsPermissions.nav DOI: 10.1177/0163443713485494 imagining news innovation mcs.sagepub.com Seth C Lewis University of Minnesota, USA Nikki Usher George Washington University, USA Abstract Journalists and technologists increasingly are organizing and collaborating, both formally and informally, across major news organizations and via grassroots networks on an international scale. This intersection of so-called ‘hacks and hackers’ carries with it a shared interest in finding technological solutions for news, particularly through open- source software programming. This article critically evaluates the phenomenon of open source in journalism, offering a theoretical intervention for understanding this phenomenon and its potential implications for newswork. Building on the literature from computer science and journalism, we explore the concept of open source as both a structural framework of distributed development and a cultural framework of pro- social hacker ethics. We identify four values of open-source culture that connect with and depart from journalism—transparency, tinkering, iteration, and participation—and assess their opportunities for rethinking journalism innovation. Keywords computational journalism, data, hackers, innovation, journalism studies, online journalism, open source, participation, -
The Digital Revolution and the Hackers Culture
The Digital Revolution and the Hackers Culture. Elective course 3rd module (Feb-Mar) 2019 Fabio Grazioso Introduction Aims of the Course • To study of the history and evolution of digital technologies • To learn the details of some examples of digital technologies and digital media • To read authors who have contributed to the debate on digital technologies • To develop critical thinking with regards to technology (in particular digital technology) Digital Technology • Computers • Computer Networks • Mobile phones • eBooks • Podcasts • Music • Movies Digital Technology • Computers • Computer Networks • Mobile phones • eBooks • Podcasts • Music • Movies Digital Technology • Computers • Computer Networks • Mobile phones • eBooks • Podcasts • Music • Movies Digital Technology • Computers • Computer Networks • Mobile phones • eBooks • Podcasts • Music • Movies Digital Technology • Computers • Computer Networks • Mobile phones • eBooks • Podcasts • Music • Movies some consequences of digital technology • easy to copy • easy to transmit (error correction) • question identity • question reality • digital is “less natural” (e.g. writing) question identity => identity theft question reality => Philip K. Dick New “questions” • ownership • authenticity Postmodernism From Wikipedia: «[…] postmodernism is generally defined by an attitude of skepticism, irony, or rejection toward the meta-narratives and ideologies of modernism, often calling into question various assumptions of Enlightenment rationality. Consequently, common targets of postmodern critique include universalist notions of objective reality, morality, truth, human nature, reason, language, and social progress.» postmodernism is generally defined by an attitude of skepticism, irony, or rejection toward the meta-narratives and ideologies of modernism, often calling into question various assumptions of Enlightenment rationality. Consequently, common targets of postmodern critique include universalist notions of objective reality, morality, truth, human nature, reason, language, and social progress. -
Cyberpunk & Hacker Culture
Cyberpunk & Hacker Culture - From Fiction to Reality Keren Elazari, CISSP Cyber Security Expert Tel Aviv , Israel Session ID: MASH-W26A Session Classification: General Interest ABOUT +10 Years in Cyber Security Fortune 500 companies Security technology vendors Teaching Fellow, Singularity University www.k3r3n3.com TECHNOLOGY >>> REALITY www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com SCIENCE FICTION >>> REALITY www.k3r3n3.com www.k3r3n3.com BLADE RUNNER - 1982 www.k3r3n3.com NERUOMANCER - 1982 www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com THE MATRIX - 1999 www.k3r3n3.com www.k3r3n3.com THE FUTUROLOGICAL CONGRESS www.k3r3n3.com GIRL WITH THE DRAGON TATTOO www.k3r3n3.com WOMEN IN CYBER FRONTIERS ► Joanna Rutkowska ► Jeri Elseworth ► Limor Fried ► Hilary Mason ► Kaliya Hamlin ► Del Harvey ► Linux Chicks ► “Women Who Code” ► Grace Hopper Celebration of “Women in Computing” www.k3r3n3.com HACKERS OF FICTION NeuroMancer, Case, Molly Millions, Hero Protagonist, YT, Johnny Mnemonic, BioHazard, Spider, V, Neo, Morpheus , Trinity , Zero Cool, CrashOverRide, Cereal Killer , AcidBurn www.k3r3n3.com THIS TEAM MADE CYBERSPACE www.k3r3n3.com HACKERS OF THE WORLD UNITE! www.k3r3n3.com HACKERS OF FAME & FORTUNE THE CAPTAIN KEVIN ANALYZER CRUNCH MITNICK www.k3r3n3.com WARGAMES - 1983 www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com MIND READING MACHINES? www.k3r3n3.com HACKING EMBEDDED DEVICES www.k3r3n3.com www.k3r3n3.com LEPHT ANONYM, A CYBORG www.k3r3n3.com THE FUTURE OF HACKING www.k3r3n3.com CYBERPUNK FICTION HAS INSPIRED HACKER REALITY www.k3r3n3.com HACKING IS THE 21ST CENTURY FORM OF POWER! www.k3r3n3.com HACK THE PLANET www.k3r3n3.com THANK YOU! WWW.K3R3N3.COM Twitter: @k3r3n3 LinkedIn.com/in/kerene . -
Hacking: the Performance of Technology? Cathy Legg Cycorp, University of Melbourne
Techné 9:2 Winter 2005 Legg, The Performance of Technology? / 151 Hacking: The Performance of Technology? Cathy Legg Cycorp, University of Melbourne Thomas, Douglas. 2002. Hacker Culture. Minneapolis: University of Minnesota Press. The word “hacker” has an interesting double-meaning: one vastly more widespread connotation of technological mischief, even criminality, and an original meaning amongst the tech-savvy as a term of highest approbation. Both meanings, however, share the idea that hackers possess a superior ability to manipulate technology according to their will (and, as with God, this superior ability to exercise will is a source of both mystifying admiration and fear). This book mainly concerns itself with the former meaning. To Thomas this simultaneously mystified and vilified, elusive set of individuals exemplifies “the performance of technology” (xx), showing the way in which “the cultural, social and political history of the computer...is fraught with complexity and contradictions” (ix). In fact, he claims that hacking is more a cultural than a technological phenomenon, citing Heidegger’s, “[t]he essence of technology is not anything technological” (56). In part one of the book, “The Evolution of The Hacker,” Thomas claims secrecy to be the defining issue of “hacker culture.” Society has an ambivalent, contradictory relationship to secrecy, which the pranks of hackers highlight in paradoxical and/or ‘supplementary’ ways. For instance, “[s]ecrets can preserve an institution’s identity, but...they can also prevent a hacker from being identified” (xi). Hackers play with these contradictions (the hacker “both deploys and disturbs the notion of the secret” (189)). Thomas seeks a “genealogy of secrecy” in the Foucauldian sense. -
Concepção De Software Para Gestão De Horários Escolares Orientando: Engenheiro Alexandre R
Mestrado em Engenharia Informática Dissertação/Estágio Relatório Final Concepção de Software para Gestão de Horários Escolares Orientando: Engenheiro Alexandre R. S. Correia [email protected] Orientador: Professor Doutor Filipe Araújo [email protected] Data: 10 de Julho de 2009 Índice Índice ................................................................................................................................................... 2 Lista de figuras ................................................................................................................................... 5 Abstract ............................................................................................................................................... 7 Keywords ............................................................................................................................................. 7 Resumo ................................................................................................................................................ 8 Palavras-chave .................................................................................................................................... 8 Definições e Acrónimos ...................................................................................................................... 9 Agradecimentos .................................................................................................................................. 9 Capítulo 1. Introdução .....................................................................................................................