Company Participation in Open Source Software Communities: Measuring Sustainability

Total Page:16

File Type:pdf, Size:1020Kb

Company Participation in Open Source Software Communities: Measuring Sustainability Association for Information Systems AIS Electronic Library (AISeL) International Conference on Electronic Business ICEB 2006 Proceedings (ICEB) Fall 11-28-2006 Company Participation in Open Source Software Communities: Measuring Sustainability Niklas Vainio Ville Oksanen Tere Vadén Follow this and additional works at: https://aisel.aisnet.org/iceb2006 This material is brought to you by the International Conference on Electronic Business (ICEB) at AIS Electronic Library (AISeL). It has been accepted for inclusion in ICEB 2006 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact [email protected]. FRONTIERS OF E-BUSINESS RESEARCH 2006 Company Participation in Open Source Software Communities: Measuring Sustainability Niklas Vainio1; Ville Oksanen2; Tere Vadén3 1 Researcher, Hypermedia Lab, University of Tampere, [email protected] 2 Researcher, SoberIT, Helsinki University of Technology, [email protected] 3 Assistant Professor, Hypermedia Lab, University of Tampere, [email protected] term sustainability of a community. In the following, we Abstract — A framework for analysing the sustainability of a analyse four aspects of community sustainability: 1) social, community in four dimensions – social, cultural, legal and 2) cultural, 3) legal, and 4) economical. economical – is presented. The framework is further differentiated by taking into account the different types of A. Social sustainability open source software communities, particularly with regard to The social sustainability of a community depends on the their work ethics: voluntary or salary-based. In conclusion, individual characteristics of its members, on its size and the framework is tentatively applied to two communities, form, and the division of labor and power in the Debian and Eclipse. community. Keywords — open source software, communities, Surveys on free/open source software developers show a sustainability, hackers, work ethic, Debian, Eclipse variety of backgrounds, motivations and values. Multiple motivations are suggested in the literature, including I. INTRODUCTION hedonism (“just for fun”), software politics (free software ideals), altruism, identification with a community, peer- Most of the contemporary open source software recognition, personal technological needs, reputation, communities are by nature hybrid, consisting of actors with learning and working for hire [2], [3]. Different community both commercial and non-commercial interests, motivations ideologies can be identified in different projects like and backgrounds. The goals of different groups of Debian, Linux, Eclipse, OpenBSD, Creative Commons and collaborators, be they hobbyists, volunteers or paid Wikipedia. workers, diverge while there is also considerable Although in the big picture developers seem to be a convergence with regard to the technical goals of a project heterogeneous group, there is more detail when looking at (see, e.g. [1]). It is therefore good that the old image of a particular projects. For instance, in a recent survey on community full of voluntary hackers has ceded for a more Debian and Eclipse developers [1], we identified some clear realistic approach, which takes into consideration the differences between these two communities. Largest strongly increasing corporate interest and participation. The differences were that a majority of Eclipse developers are work ethic of the corporate world is entering open source paid to work on free/open source software while for almost communities. all Debian developers it is a hobby; Eclipse developers are Company participation and the work ethic it implies in on average older than in Debian, and Debian developers are communities presents both dangers and opportunities for more aware and care about political issues such as long-term sustainability. A company needs to be able to copyright and software patents. identify the systematic variation in motivation, values, The variety of personal characteristics can be either a ideology and practices between different communities in benefit or risk for sustainability. Eric Raymond's rule order to optimize its approach to each of the community “Given enough eyeballs, all bugs are shallow” [4] assumes intensive projects. A wrong approach may easily prevent a large, diverse tester and developer base. In the ideal case, the company from reaching its chosen goals and – in the this group includes a whole range of users from less skilled worst case – also severely harm the community itself. to those with very specific skills, and a wide variety of Consequently, a general framework for assessing the different use cases, environments and equipment. Variation sustainability and conditions of success of a community of in aspects like socio-economical status, level of education open collaboration will be useful in generating a strategy and geographical location may increase the effectiveness of for interaction between companies and volunteers. the group. Ye & Kishida [5] describe free/open source community II. FOUR ASPECTS OF SUSTAINABILITY participant roles using an onion model. According to the Free and open communities such as Debian and Eclipse are model, at the the heart of the community is often a single by nature hybrid, consisting of actors with divergent goals person, a project leader, with several supporting core and motivations and from both commercial or non- developers around him or her. In middle layers of the onion commercial cultural backgrounds. Companies have are active developers, peripheral developers and bug fixers, increasing interest in collaborating with these communities, and on the outer layers users who participate in the which presents both dangers and opportunities for long- FRONTIERS OF E-BUSINESS RESEARCH 2006 community only by reporting bugs or following and trying Increases sustainability: to understand the software. z diverse user and developer base The outer layer of the onion is the largest group and the z large number developers group size gets smaller as we approach the center. A well- z large number of users and contact with the users known rule of thumb in sociological research on voluntary z developers in different roles (project leader, core organisations is the so-called 20/80-rule (derived from the group, bug fixers, bug submitters) with dynamics so-called Pareto Principle), according to which 20 % of the that encourage learning volunteers do 80 % of the work. It seems that software z moderately decentralized communication or power communities roughly follow this rule, with the number of structures active members drastically reducing with each step towards z a system of decision-making and division of the core [6]-[9]. Naturally, in a complex or broad project labour (such as the GNOME), the developer group is divided into several subgroups roughly corresponding with different Decreases sustainability: subtasks. z user and developer base with unified background, Krishnamurthy [10] found that 71 percent of hundred skills and use contexts most active projects on Sourceforge had five or less z small number of developers developers and 51 percent of the projects had only one z small number of users project administrator. Projects like these are probably z no prospective developer base or closed highly dependent on the project leader. The project leader development process plays an important role also in larger projects such as the z very centralized communication or power Linux kernel. Although Linus Torvalds writes only a minor structures portion of the new code, he is important for the project as a z bureaucratic system of decision-making and charismatic leader. The Linux community respects division of labour Torvalds' power partially for historical reasons, but also for B. Cultural sustainability his skills, and developers see him as essential. In 2002, the community had a “Linus doesn't scale” problem when The distinction between social and cultural sustainability is Torvalds couldn't anymore handle the flow of modifications not clear-cut: cultural meanings and artefacts have their to the kernel, and a system of trusted “lieutenants” had to effect only as embedded in social practices. However, for be build. Before that, social sustainability of the kernel the purposes of analysis we may differentiate between the community was low because of too centralized power and two by noting that the cultural sphere exists, first, on a knowledge. With the lieutenant system, (tacit) knowledge is higher level of abstraction. Cultural aspects of interaction distributed more evenly which makes it easier and more depend on interpretation, language, and coherent patterns of probable for developers lower in the hierarchy to take behaviour. Second, the cultural level is temporally different certain responsibilities if the project leader has to step down from the social. While some cultural artefacts and meanings for any reason. may change rather rapidly, there are cultural layers that Equally important for social sustainability is the system change little, if at all, during the lifetime of a generation or of decision-making and conflict resolution. As a small an individual. project grows in time, the diversity of developer opinions Cultural sustainability of a community is defined by its and views increases, creating more potential conflicts over traditions and history that create and shape its social and technical decisions. The “benevolent dictator” approach ethical norms and practices. While social sustainability
Recommended publications
  • Hacker Culture & Politics
    HACKER CULTURE & POLITICS COMS 541 (CRN 15368) 1435-1725 Department of Art History and Communication Studies McGill University Professor Gabriella Coleman Fall 2012 Arts W-220/ 14:35-17:25 Professor: Dr. Gabriella Coleman Office: Arts W-110 Office hours: Sign up sheet Tuesday 2:30-3:30 PM Phone: xxx E-mail: [email protected] OVERVIEW This course examines computer hackers to interrogate not only the ethics and technical practices of hacking, but to examine more broadly how hackers and hacking have transformed the politics of computing and the Internet more generally. We will examine how hacker values are realized and constituted by different legal, technical, and ethical activities of computer hacking—for example, free software production, cyberactivism and hactivism, cryptography, and the prankish games of hacker underground. We will pay close attention to how ethical principles are variably represented and thought of by hackers, journalists, and academics and we will use the example of hacking to address various topics on law, order, and politics on the Internet such as: free speech and censorship, privacy, security, surveillance, and intellectual property. We finish with an in-depth look at two sites of hacker and activist action: Wikileaks and Anonymous. LEARNER OBJECTIVES This will allow us to 1) demonstrate familiarity with variants of hacking 2) critically examine the multiple ways hackers draw on and reconfigure dominant ideas of property, freedom, and privacy through their diverse moral 1 codes and technical activities 3) broaden our understanding of politics of the Internet by evaluating the various political effects and ramifications of hacking.
    [Show full text]
  • Elegant Resume
    ALAN ELKNER 112 Chanticleer, Cherry Hill, NJ 08003 (609) 605-1945 [email protected] SUMMARY OF QUALIFICATIONS . Close to thirty years experience in the development of web applications and data hosting systems for the Unix, Intel PC and IBM mainframe environments . Extensive experience developing back-end systems for integration between clients and servers . Consistently recognized by management and peers for producing high-quality work; attention to simplicity of structure, leading to highly reliable and maintainable systems . Trusted by management to deal with clients from design phase to installation; strong inter- personal skills leading to high customer satisfaction . One year experience each working in Germany and Italy while gaining fluency in both languages SOFTWARE DEVELOPMENT ENVIRONMENTS . Web platforms, Django and Zope, using Python, running on Linux, Sun Solaris . MySQL and PostgreSQL database systems . HTML5, CSS, JavaScript and jQuery, including Ajax . Microsoft Visual C++, Visual Basic, Access and SQL Server, Active Server Pages EXPERIENCE 2013 – 2015 HelpHOPELive Cherry Hill, NJ . Django/Python developer for a non-profit specializing in crowd-funded campaigns for patients in need of assistance with medical expenses. Responsibilities include implementing requirements as defined in JIRA ticket system for feature enhancements to the core web application, written for the Django web framework and Python programming language. Utilized JavaScript, jQuery, Ajax, HTML5, and CSS on the browser side. 2013 – 2014 NovaWebDevelopment Cherry Hill, NJ . Project Manager, Django/Python Developer and Mentor for a start-up non-profit specializing in writing web applications in Django and Python. Contract involved creating a web application for teaching deaf children to read. Application presents images, videos and words to the student in a jQuery event-driven set of web pages, including timer events for animation.
    [Show full text]
  • Adoption of Open Source Software in Software-Intensive Organizations - a Systematic Literature Review
    Adoption of Open Source Software in Software-Intensive Organizations - A Systematic Literature Review Øyvind Hauge∗,1, Claudia Ayala1,2, Reidar Conradi1 IDI, NTNU, Sem Sælands vei 7-9, NO-7491 Trondheim, Norway Abstract Context: Open source software (OSS) is changing the way organizations develop, acquire, use, and commercialize software. Objective: This paper seeks to identify how organizations adopt OSS, classify the literature according to these ways of adopting OSS, and with a focus on software development evaluate the research on adoption of OSS in organiza- tions. Method: Based on the systematic literature review method we reviewed pub- lications from 24 journals and seven conference and workshop proceedings, published between 1998 and 2008. From a population of 24289 papers, we identified 112 papers that provide empirical evidence on how organizations actually adopt OSS. Results: We show that adopting OSS involves more than simply using OSS products. We moreover provide a classification framework consisting of six distinctly different ways in which organizations adopt OSS. This framework is used to illustrate some of the opportunities and challenges organizations meet when approaching OSS, to show that OSS can be adopted successfully in different ways, and to organize and review existing research. We find that existing research on OSS adoption does not sufficiently describe the context of the organizations studied, it is furthermore fragmented, and it fails to benefit fully from related research fields. To aid this situation, we offer directions for future research. ∗Corresponding author. Tel: +47 97 71 22 52; Fax: +47 73 59 44 66 Email addresses: [email protected] (Øyvind Hauge), [email protected] (Claudia Ayala), [email protected] (Reidar Conradi) 1Norwegian University of Science and Technology 2Technical University of Catalunya Preprint submitted to Information Software Technology April 26, 2010 Conclusion: The implications of our findings are twofold.
    [Show full text]
  • Hacked: a Radical Approach to Hacker Culture and Crime by Kevin F.Steinmetz Richard A
    International Social Science Review Volume 93 | Issue 2 Article 10 Book Review: Hacked: A Radical Approach to Hacker Culture and Crime by Kevin F.Steinmetz Richard A. Almeida Francis Marion University Follow this and additional works at: https://digitalcommons.northgeorgia.edu/issr Part of the Anthropology Commons, Communication Commons, Economics Commons, Geography Commons, International and Area Studies Commons, Political Science Commons, and the Public Affairs, Public Policy and Public Administration Commons Recommended Citation Almeida, Richard A. () "Book Review: Hacked: A Radical Approach to Hacker Culture and Crime by Kevin F.Steinmetz," International Social Science Review: Vol. 93 : Iss. 2 , Article 10. Available at: https://digitalcommons.northgeorgia.edu/issr/vol93/iss2/10 This Book Review is brought to you for free and open access by Nighthawks Open Institutional Repository. It has been accepted for inclusion in International Social Science Review by an authorized editor of Nighthawks Open Institutional Repository. Almeida: Book Review: Hacked Steinmetz, Kevin F. Hacked: A Radical Approach to Hacker Culture and Crime. 2016. New York: New York University Press. xv + 285 pages. Paperback, $28. “Hackers” and “hacking” occupy a complicated place in twenty-first century American life. Images of misfit teenagers, sinister manipulators of the democratic process, and monomaniacally-focused corporate intruders abound. Kevin Steinmetz acknowledges that those archetypes have some legitimacy but makes a convincing case that “craftsperson,” “guild member,” and “exploited proletarian” should be added to the iconography of hacking. On his account, hackers and hacker culture occupy an interesting and important place in American culture and the post-Fordist economy, one that can be fruitfully explored with a “radical” (Marx- inspired) approach.
    [Show full text]
  • Free As in Freedom (2.0): Richard Stallman and the Free Software Revolution
    Free as in Freedom (2.0): Richard Stallman and the Free Software Revolution Sam Williams Second edition revisions by Richard M. Stallman i This is Free as in Freedom 2.0: Richard Stallman and the Free Soft- ware Revolution, a revision of Free as in Freedom: Richard Stallman's Crusade for Free Software. Copyright c 2002, 2010 Sam Williams Copyright c 2010 Richard M. Stallman Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License." Published by the Free Software Foundation 51 Franklin St., Fifth Floor Boston, MA 02110-1335 USA ISBN: 9780983159216 The cover photograph of Richard Stallman is by Peter Hinely. The PDP-10 photograph in Chapter 7 is by Rodney Brooks. The photo- graph of St. IGNUcius in Chapter 8 is by Stian Eikeland. Contents Foreword by Richard M. Stallmanv Preface by Sam Williams vii 1 For Want of a Printer1 2 2001: A Hacker's Odyssey 13 3 A Portrait of the Hacker as a Young Man 25 4 Impeach God 37 5 Puddle of Freedom 59 6 The Emacs Commune 77 7 A Stark Moral Choice 89 8 St. Ignucius 109 9 The GNU General Public License 123 10 GNU/Linux 145 iii iv CONTENTS 11 Open Source 159 12 A Brief Journey through Hacker Hell 175 13 Continuing the Fight 181 Epilogue from Sam Williams: Crushing Loneliness 193 Appendix A { Hack, Hackers, and Hacking 209 Appendix B { GNU Free Documentation License 217 Foreword by Richard M.
    [Show full text]
  • TESMA: Requirements and Design of a Tool for Educational Programs †
    information Article TESMA: Requirements and Design of a Tool for Educational Programs † Nicolas Guelfi *,‡, Benjamin Jahi´c ‡ and Benoît Ries ‡ Université du Luxembourg. 2, avenue de l’Université, L-4365 Esch-sur-Alzette, Luxembourg; [email protected] (B.J.); [email protected] (B.R.) * Correspondence: nicolas.guelfi@uni.lu; Tel.: +352-466-644-5251 † This paper is an extended version of our paper published in Nicolas Guelfi, Benjamin Jahi´cand Benoît Ries, TESMA: Towards the Development of a Tool for Specification, Management and Assessment of Teaching Programs, published in the Proceedings of the 2nd International Conference on Applications in Information Technology (ICAIT-2016). ‡ These authors contributed equally to this work. Academic Editors: Evgeny Pyshkin, Vitaly Klyuev and Alexander Vazhenin Received: 2 December 2016; Accepted: 18 March 2017; Published: 22 March 2017 Abstract: Defining and managing teaching programs at universities or other institutions is a complex task for which there is not much support in terms of methods and tools. This task becomes even more critical when the time comes to obtain certifications w.r.t. official standards. In this paper, we present an on-going project called TESMA, whose objective is to provide an open-source tool dedicated to the specification and management (including certification) of teaching programs. An in-depth market analysis regarding related tools and conceptual frameworks of the project is presented. This tool has been engineered using a development method called Messir for its requirements elicitation and introduces a domain-specific language dedicated to the teaching domain. This paper presents the current status of this project and the future activities planned.
    [Show full text]
  • Informática Educativa
    MINISTÉRIO DA EDUCAÇÃO Universidade Aberta do Brasil Instituto Federal de Educação, Ciência e Tecnologia do Ceará Diretoria de Educação a Distância Licenciatura em Educação Profissional, Científica e Tecnológica Informática Educativa Marlene de Alencar Dutra Tatiana Santos da Paz Fortaleza, CE 2015 Créditos Presidente Equipe Arte, Criação e Produção Visual Dilma Vana Rousseff Camila Ferreira Mendes Ministro da Educação Érica Andrade Figueirêdo Renato Janine Ribeiro Lucas de Brito Arruda Quezia Brandão Souto Presidente da CAPES Renan da Silveira Teles Carlos Afonso Nobre Suzan Pagani Maranhão Diretor de EaD – CAPES Equipe Web Jean Marc Georges Mutzig Bruno Martins Ferreira Reitor do IFCE Corneli Gomes Furtado Júnior Virgílio Augusto Sales Araripe Fabrice Marc Joye Pró-Reitor de Ensino Francisco César de Araújo Filho Reuber Saraiva de Santiago Ícaro Magalhães Holanda Barroso Diretora de EAD/IFCE e Herculano Gonçalves Santos Coordenadora UAB/IFCE Revisão Cassandra Ribeiro Joye Antônio Carlos Marques Júnior Coordenadora Adjunta UAB Débora Liberato Arruda Hissa Gina Maria Porto de Aguiar Nukácia Meyre Araújo de Almeida Saulo Garcia Coordenador do Curso de Licenciatura em Educação Profissional, Científica e Logística Tecnológica Francisco Roberto Dias de Aguiar João Eudes Moreira da Silva Elaboração do conteúdo Marlene de Alencar Dutra Tatiana Santos da Paz Colaboradora Márcia Roxana da Silva Regis Equipe Pedagógica e Design Instrucional Camilla Alves Barros Daniele Luciano Marques Iraci de Oliveira Moraes Schmidlin Isabel Cristina Pereira da Costa Karine Nascimento Portela Lívia Maria de Lima Santiago Luciana Andrade Rodrigues Márcia Roxana da Silva Regis Maria do Socorro Nogueira de Paula Marília Maia Moreira Siany Góes de Sousa Tassia Pinheiro de Sousa Catalogação na Fonte: Biblioteca Waldyr Diogo de Siqueira D978i Dutra, Marlene de Alencar.
    [Show full text]
  • Open Source and Journalism: Toward New Frameworks for Imagining News
    MCS35510.1177/0163443713485494Media, Culture & SocietyLewis and Usher 4854942013 Article Media, Culture & Society 35(5) 602 –619 Open source and journalism: © The Author(s) 2013 Reprints and permissions: toward new frameworks for sagepub.co.uk/journalsPermissions.nav DOI: 10.1177/0163443713485494 imagining news innovation mcs.sagepub.com Seth C Lewis University of Minnesota, USA Nikki Usher George Washington University, USA Abstract Journalists and technologists increasingly are organizing and collaborating, both formally and informally, across major news organizations and via grassroots networks on an international scale. This intersection of so-called ‘hacks and hackers’ carries with it a shared interest in finding technological solutions for news, particularly through open- source software programming. This article critically evaluates the phenomenon of open source in journalism, offering a theoretical intervention for understanding this phenomenon and its potential implications for newswork. Building on the literature from computer science and journalism, we explore the concept of open source as both a structural framework of distributed development and a cultural framework of pro- social hacker ethics. We identify four values of open-source culture that connect with and depart from journalism—transparency, tinkering, iteration, and participation—and assess their opportunities for rethinking journalism innovation. Keywords computational journalism, data, hackers, innovation, journalism studies, online journalism, open source, participation,
    [Show full text]
  • The Digital Revolution and the Hackers Culture
    The Digital Revolution and the Hackers Culture. Elective course 3rd module (Feb-Mar) 2019 Fabio Grazioso Introduction Aims of the Course • To study of the history and evolution of digital technologies • To learn the details of some examples of digital technologies and digital media • To read authors who have contributed to the debate on digital technologies • To develop critical thinking with regards to technology (in particular digital technology) Digital Technology • Computers • Computer Networks • Mobile phones • eBooks • Podcasts • Music • Movies Digital Technology • Computers • Computer Networks • Mobile phones • eBooks • Podcasts • Music • Movies Digital Technology • Computers • Computer Networks • Mobile phones • eBooks • Podcasts • Music • Movies Digital Technology • Computers • Computer Networks • Mobile phones • eBooks • Podcasts • Music • Movies Digital Technology • Computers • Computer Networks • Mobile phones • eBooks • Podcasts • Music • Movies some consequences of digital technology • easy to copy • easy to transmit (error correction) • question identity • question reality • digital is “less natural” (e.g. writing) question identity => identity theft question reality => Philip K. Dick New “questions” • ownership • authenticity Postmodernism From Wikipedia: «[…] postmodernism is generally defined by an attitude of skepticism, irony, or rejection toward the meta-narratives and ideologies of modernism, often calling into question various assumptions of Enlightenment rationality. Consequently, common targets of postmodern critique include universalist notions of objective reality, morality, truth, human nature, reason, language, and social progress.» postmodernism is generally defined by an attitude of skepticism, irony, or rejection toward the meta-narratives and ideologies of modernism, often calling into question various assumptions of Enlightenment rationality. Consequently, common targets of postmodern critique include universalist notions of objective reality, morality, truth, human nature, reason, language, and social progress.
    [Show full text]
  • Cyberpunk & Hacker Culture
    Cyberpunk & Hacker Culture - From Fiction to Reality Keren Elazari, CISSP Cyber Security Expert Tel Aviv , Israel Session ID: MASH-W26A Session Classification: General Interest ABOUT +10 Years in Cyber Security Fortune 500 companies Security technology vendors Teaching Fellow, Singularity University www.k3r3n3.com TECHNOLOGY >>> REALITY www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com SCIENCE FICTION >>> REALITY www.k3r3n3.com www.k3r3n3.com BLADE RUNNER - 1982 www.k3r3n3.com NERUOMANCER - 1982 www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com THE MATRIX - 1999 www.k3r3n3.com www.k3r3n3.com THE FUTUROLOGICAL CONGRESS www.k3r3n3.com GIRL WITH THE DRAGON TATTOO www.k3r3n3.com WOMEN IN CYBER FRONTIERS ► Joanna Rutkowska ► Jeri Elseworth ► Limor Fried ► Hilary Mason ► Kaliya Hamlin ► Del Harvey ► Linux Chicks ► “Women Who Code” ► Grace Hopper Celebration of “Women in Computing” www.k3r3n3.com HACKERS OF FICTION NeuroMancer, Case, Molly Millions, Hero Protagonist, YT, Johnny Mnemonic, BioHazard, Spider, V, Neo, Morpheus , Trinity , Zero Cool, CrashOverRide, Cereal Killer , AcidBurn www.k3r3n3.com THIS TEAM MADE CYBERSPACE www.k3r3n3.com HACKERS OF THE WORLD UNITE! www.k3r3n3.com HACKERS OF FAME & FORTUNE THE CAPTAIN KEVIN ANALYZER CRUNCH MITNICK www.k3r3n3.com WARGAMES - 1983 www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com www.k3r3n3.com MIND READING MACHINES? www.k3r3n3.com HACKING EMBEDDED DEVICES www.k3r3n3.com www.k3r3n3.com LEPHT ANONYM, A CYBORG www.k3r3n3.com THE FUTURE OF HACKING www.k3r3n3.com CYBERPUNK FICTION HAS INSPIRED HACKER REALITY www.k3r3n3.com HACKING IS THE 21ST CENTURY FORM OF POWER! www.k3r3n3.com HACK THE PLANET www.k3r3n3.com THANK YOU! WWW.K3R3N3.COM Twitter: @k3r3n3 LinkedIn.com/in/kerene .
    [Show full text]
  • Hacking: the Performance of Technology? Cathy Legg Cycorp, University of Melbourne
    Techné 9:2 Winter 2005 Legg, The Performance of Technology? / 151 Hacking: The Performance of Technology? Cathy Legg Cycorp, University of Melbourne Thomas, Douglas. 2002. Hacker Culture. Minneapolis: University of Minnesota Press. The word “hacker” has an interesting double-meaning: one vastly more widespread connotation of technological mischief, even criminality, and an original meaning amongst the tech-savvy as a term of highest approbation. Both meanings, however, share the idea that hackers possess a superior ability to manipulate technology according to their will (and, as with God, this superior ability to exercise will is a source of both mystifying admiration and fear). This book mainly concerns itself with the former meaning. To Thomas this simultaneously mystified and vilified, elusive set of individuals exemplifies “the performance of technology” (xx), showing the way in which “the cultural, social and political history of the computer...is fraught with complexity and contradictions” (ix). In fact, he claims that hacking is more a cultural than a technological phenomenon, citing Heidegger’s, “[t]he essence of technology is not anything technological” (56). In part one of the book, “The Evolution of The Hacker,” Thomas claims secrecy to be the defining issue of “hacker culture.” Society has an ambivalent, contradictory relationship to secrecy, which the pranks of hackers highlight in paradoxical and/or ‘supplementary’ ways. For instance, “[s]ecrets can preserve an institution’s identity, but...they can also prevent a hacker from being identified” (xi). Hackers play with these contradictions (the hacker “both deploys and disturbs the notion of the secret” (189)). Thomas seeks a “genealogy of secrecy” in the Foucauldian sense.
    [Show full text]
  • Concepção De Software Para Gestão De Horários Escolares Orientando: Engenheiro Alexandre R
    Mestrado em Engenharia Informática Dissertação/Estágio Relatório Final Concepção de Software para Gestão de Horários Escolares Orientando: Engenheiro Alexandre R. S. Correia [email protected] Orientador: Professor Doutor Filipe Araújo [email protected] Data: 10 de Julho de 2009 Índice Índice ................................................................................................................................................... 2 Lista de figuras ................................................................................................................................... 5 Abstract ............................................................................................................................................... 7 Keywords ............................................................................................................................................. 7 Resumo ................................................................................................................................................ 8 Palavras-chave .................................................................................................................................... 8 Definições e Acrónimos ...................................................................................................................... 9 Agradecimentos .................................................................................................................................. 9 Capítulo 1. Introdução .....................................................................................................................
    [Show full text]