Sin and the Hacker Ethic: the Tragedy of Techno-Utopian Ideology in Cyberspace Business Cultures
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Renegade Solution to Extractive Economics
Center for Humane Technology | Your Undivided Attention Podcast Episode 29: A Renegade Solution to Extractive Economics Kate Raworth: So, the problem begins right on day one. When I give talks about doughnut economics to groups of students or midlife executives, I'll often say, "What's the first diagram you remember learning in economics?" And it's the same the world over, supply and demand. Tristan Harris: That's Kate Raworth. She calls herself a renegade economist. A few years ago, she sat down and drew a new economics chart in the shape of a doughnut. Her chart includes the whole picture, not just of what we buy and sell, but the parts of our lives that mainstream economics often leaves out or oversimplifies. For example, here's how she looks at the story about Vietnamese farming communities. Kate Raworth: There are parts of rural Vietnam where they're famous for their rice paddy fields. And these households aren't particularly well off, and so somebody had an idea like, "Hey, let's have them come, and having home-stay tourists." You get to stay with a family, you get to be there. Great. And it did well, and it expands, and it expands. Tristan Harris: That's good, right? I mean, growth means everyone is better off. Kate Raworth: And now it's expanded to the point that those families are utterly dependent upon the income from the home-stay tourists, and actually they're not really doing the farming, so they're having to just try and maintain it so it still looks good. -
Ethics in Security Testing
Ethics in Security Testing Title Prepared by: Nick Dunn, Managing Security Consultant Table of contents Executive summary ................................................................... 3 Introduction ................................................................................4 Professional ethics .................................................................... 6 The hacker ethic ........................................................................ 9 Reconciling the ethical stances ............................................... 12 Conclusion ............................................................................... 16 References .............................................................................. 18 About NCC Group ................................................................... 20 2 NCC Group Whitepaper ©2018 Executive summary This paper discusses the similarities and differences between professional ethics in the information security industry and ethics in the hacker community. Sources of conflict between the two and shared values of the two are discussed in order to find some reconciliation and come to an understanding of how a shared set of ethics is possible. A reconciled set of ethics allows hackers to function within the corporate world without compromising their principles and allows the commercial world to benefit from some of the more progressive ideas within the hacker community. A reconciled set of ethics allows hackers to function within the corporate world without compromising their principles -
Workshop on Venture Capital and Antitrust, February 12, 2020
Venture Capital and Antitrust Transcript of Proceedings at the Public Workshop Held by the Antitrust Division of the United States Department of Justice February 12, 2020 Paul Brest Hall Stanford University 555 Salvatierra Walk Stanford, CA 94305 Table of Contents Opening Remarks ......................................................................................................................... 1 Fireside Chat with Michael Moritz: Trends in VC Investment: How did we get here? ........ 5 Antitrust for VCs: A Discussion with Stanford Law Professor Doug Melamed ................... 14 Panel 1: What explains the Kill Zones? .................................................................................... 22 Afternoon Remarks .................................................................................................................... 40 Panel 2: Monetizing data ............................................................................................................ 42 Panel 3: Investing in platform-dominated markets ................................................................. 62 Roundtable: Is there a problem and what is the solution? ..................................................... 84 Closing Remarks ......................................................................................................................... 99 Public Workshop on Venture Capital and Antitrust, February 12, 2020 Opening Remarks • Makan Delrahim, Assistant Attorney General for Antitrust, Antitrust Division, U.S. Department of Justice MAKAN -
The Child As Hacker: Building More Human-Like Models of Learning by Joshua S
The child as hacker: Building more human-like models of learning by Joshua S. Rule Submitted to the Department of Brain and Cognitive Sciences in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Cognitive Science at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY September 2020 © Massachusetts Institute of Technology 2020. All rights reserved. Author...................................................................... Department of Brain and Cognitive Sciences September 5, 2020 Certified by. Joshua B. Tenenbaum Professor of Computational Cognitive Science Thesis Supervisor Accepted by................................................................. Rebecca Saxe John W. Jarve (1978) Professor of Brain and Cognitive Sciences Associate Head, Department of Brain and Cognitive Sciences Affiliate, McGovern Institute for Brain Science Chairman, Department Committee on Graduate Theses 2 The child as hacker: Building more human-like models of learning by Joshua S. Rule Submitted to the Department of Brain and Cognitive Sciences on September 5, 2020, in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Cognitive Science Abstract Cognitive science faces a radical challenge in explaining the richness of human learning and cognitive development. This thesis proposes that developmental theories can address the challenge by adopting perspectives from computer science. Many of our best models treat learning as analogous to computer programming because symbolic programs provide the most compelling account of sophisticated mental representations. We specifically propose that learning from childhood onward is analogous to a style of programming called hacking— making code better along many dimensions through an open-ended and internally-motivated set of diverse values and activities. This thesis also develops a first attempt to formalize and assess the child as hacker view through an in-depth empirical study of human and machine concept learning. -
In the Court of Chancery of the State of Delaware Karen Sbriglio, Firemen’S ) Retirement System of St
EFiled: Aug 06 2021 03:34PM EDT Transaction ID 66784692 Case No. 2018-0307-JRS IN THE COURT OF CHANCERY OF THE STATE OF DELAWARE KAREN SBRIGLIO, FIREMEN’S ) RETIREMENT SYSTEM OF ST. ) LOUIS, CALIFORNIA STATE ) TEACHERS’ RETIREMENT SYSTEM, ) CONSTRUCTION AND GENERAL ) BUILDING LABORERS’ LOCAL NO. ) 79 GENERAL FUND, CITY OF ) BIRMINGHAM RETIREMENT AND ) RELIEF SYSTEM, and LIDIA LEVY, derivatively on behalf of Nominal ) C.A. No. 2018-0307-JRS Defendant FACEBOOK, INC., ) ) Plaintiffs, ) PUBLIC INSPECTION VERSION ) FILED AUGUST 6, 2021 v. ) ) MARK ZUCKERBERG, SHERYL SANDBERG, PEGGY ALFORD, ) ) MARC ANDREESSEN, KENNETH CHENAULT, PETER THIEL, JEFFREY ) ZIENTS, ERSKINE BOWLES, SUSAN ) DESMOND-HELLMANN, REED ) HASTINGS, JAN KOUM, ) KONSTANTINOS PAPAMILTIADIS, ) DAVID FISCHER, MICHAEL ) SCHROEPFER, and DAVID WEHNER ) ) Defendants, ) -and- ) ) FACEBOOK, INC., ) ) Nominal Defendant. ) SECOND AMENDED VERIFIED STOCKHOLDER DERIVATIVE COMPLAINT TABLE OF CONTENTS Page(s) I. SUMMARY OF THE ACTION...................................................................... 5 II. JURISDICTION AND VENUE ....................................................................19 III. PARTIES .......................................................................................................20 A. Plaintiffs ..............................................................................................20 B. Director Defendants ............................................................................26 C. Officer Defendants ..............................................................................28 -
Boredom and Interest on Facebook, Reddit, and 4Chan by Liam Mitchell
A Phenomenological Study of Social Media: Boredom and Interest on Facebook, Reddit, and 4chan by Liam Mitchell BA, Thompson Rivers University, 2004 MA, York University, 2005 A Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of DOCTOR OF PHILOSOPHY in the Department of Political Science Liam Mitchell, 2012 University of Victoria All rights reserved. This thesis may not be reproduced in whole or in part, by photocopy or other means, without the permission of the author. ii Supervisory Committee A Phenomenological Study of Social Media: Boredom and Interest on Facebook, Reddit, and 4chan by Liam Mitchell BA, Thompson Rivers University, 2004 MA, York University, 2005 Supervisory Committee Dr. Arthur Kroker (Department of Political Science) Supervisor Dr. Bradley Bryan (Department of Political Science) Departmental Member Dr. Peyman Vahabzadeh (Department of Sociology) Outside Member iii Abstract Supervisory Committee Dr. Arthur Kroker (Department of Political Science) Supervisor Dr. Bradley Bryan (Department of Political Science) Departmental Member Dr. Peyman Vahabzadeh (Department of Sociology) Outside Member Optimists used to suggest that the anonymity of the internet allows people to interact without prejudices about race, sex, or age. Although some websites still foster anonymous communication, their popularity pales in comparison with sites like Facebook that foreground identifying characteristics. These social network sites claim to enrich their users’ lives by cultivating connections, but they sometimes -
Facebook, Inc. Annual Report 2016
Facebook, Inc. Annual Report 2016 Form 10-K (NASDAQ:FB) Published: April 27th, 2016 PDF generated by stocklight.com UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 __________________________ FORM 10-K/A Amendment No. 1 __________________________ (Mark One) x ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2015 or ¨ TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to Commission File Number: 001-35551 __________________________ FACEBOOK, INC. (Exact name of registrant as specified in its charter) __________________________ Delaware 20-1665019 (State or other jurisdiction of incorporation or organization) (I.R.S. Employer Identification Number) 1601 Willow Road, Menlo Park, California 94025 (Address of principal executive offices and Zip Code) (650) 543-4800 (Registrant's telephone number, including area code) __________________________ Securities registered pursuant to Section 12(b) of the Act: Class A Common Stock, $0.000006 par value The NASDAQ Stock Market LLC (Title of each class) (Name of each exchange on which registered) Securities registered pursuant to Section 12(g) of the Act: None (Title of class) Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes x No ¨ Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act. Yes¨ No x Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 (Exchange Act) during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days. -
About-Asana.Pdf
About Asana Asana is a leading work management platform that helps teams orchestrate their work, from daily tasks to strategic initiatives. Asana adds structure to unstructured work, creating clarity, transparency and accountability to everyone within an organization—individuals, team leads and executives—so they understand exactly who is doing what, by when. Our co-founders started Asana because they experienced firsthand the growing problem of work about work, or internal coordination. Instead of spending time on work that generated results, they were spending time in status meetings and long email threads trying to figure out who was doing what. They recognized this pain was universal to teams that need to coordinate their work effectively to achieve their objectives. As a result of that frustration, they were inspired to create Asana to solve this problem for the world’s teams. Leadership Team https://asana.com/leadership ● Dustin Moskovitz, Co-Founder and CEO ● Anna Binder, Head of People Operations ● Chris Farinacci, Head of Business ● Alex Hood, Head of Product ● Oliver Jay, Head of Sales & Customer Success ● Dave King, Head of Marketing ● Eleanor Lacey, General Counsel ● Prashant Pandey, Head of Engineering ● Tim Wan, Head of Finance Board of Directors ● Sydney Carey, CFO, Sumologic ● Matt Cohler, General Partner, Benchmark Capital ● Adam D’Angelo, CEO, Quora ● Dustin Moskovitz, CEO, Asana ● Lorrie Norrington, Operating Partner, Lead Edge Capital ● Anne Raimondi, Chief Customer Officer, Guru ● Justin Rosenstein, Board Member -
Hacker's Handbook Ok Just a Quick Note, This Is a Very Early Version of the Book and Was Later Banned
Hacker's Handbook Ok just a quick note, this is a very early version of the book and was later banned. We've done our best in converting it to ASCII. It's taken us some time to put it together because of the reformatting, so I hope it's appreciated. We have kept to the original page numbering for so that the index will be correct. Compliments Electronic Images - Gizmo Century Communications - T H E - - H A C K E R ' S - - H A N D B O O K - Copyright (c) Hugo Cornwall All rights reserved First published in Great Britain in 1985 by Century Communications Ltd Portland House, 12-13 Greek Street, London W1V 5LE. Reprinted 1985 (four times) ISBN 0 7126 0650 5 Printed and bound in Great Britain by Billing & Sons Limited, Worcester. CONTENTS Introduction vii First Principles 2 Computer-to-computer communications 7 3 Hackers' Equipment 15 4 Targets: What you can find on mainframes 30 5 Hackers' Intelligence 42 6 Hackers' Techniques 57 7 Networks 69 8 Viewdata systems 86 9 Radio computer data 99 10 Hacking: the future 108 file:///E|/Books/Hackers Handbook.htm (1 of 133) [11/28/2000 5:58:48 AM] Hacker's Handbook Appendices I troubleshooting 112 II Glossary 117 III CCITT and related standards 130 IV Standard computer alphabets 132 V Modems 141 VI Radio Spectrum 144 VII Port-finder flow chart 148 INTRODUCTION The word 'hacker' is used in two different but associated ways: for some, a hacker is merely a computer enthusiast of any kind, who loves working with the beasties for their own sake, as opposed to operating them in order to enrich a company or research project --or to play games. -
High Technology, Consumer Privacy, and U.S. National Security
Georgetown University Law Center Scholarship @ GEORGETOWN LAW 2015 High Technology, Consumer Privacy, and U.S. National Security Laura K. Donohue Georgetown University Law Center, [email protected] This paper can be downloaded free of charge from: https://scholarship.law.georgetown.edu/facpub/1457 http://ssrn.com/abstract=2563573 Bus. L. Rev. (forthcoming) This open-access article is brought to you by the Georgetown Law Library. Posted with permission of the author. Follow this and additional works at: https://scholarship.law.georgetown.edu/facpub Part of the Constitutional Law Commons, Consumer Protection Law Commons, Fourth Amendment Commons, and the National Security Law Commons HIGH TECHNOLOGY, CONSUMER PRIVACY, AND U.S. NATIONAL SECURITY Laura K. Donohue* I. INTRODUCTION Documents released over the past year detailing the National Security Agency’s (“NSA”) telephony metadata collection program and interception of international content under the Foreign Intelligence Surveillance Act (FISA) implicated U.S. high technology companies in government surveillance. 1 The result was an immediate, and detrimental, impact on U.S. corporations, the economy, and U.S. national security. The first Snowden documents, printed on June 5, 2013, revealed that the government had served orders on Verizon, directing the company to turn over telephony metadata under Section 215 of the USA PATRIOT Act.2 The following day, The Guardian published classified slides detailing how the NSA had intercepted international content under Section 702 of the FISA Amendments Act.3 The type of information obtained ranged from E-mail, video and voice chat, videos, photos, and stored data, to Voice over Internet Protocol, file transfers, video conferencing, notifications of target activity, and online social networking.4 The companies involved read like a who’s who of U.S. -
Apple Iphone 4
Apple iPhone 4 Apple iPhone 4 Name: Theo Hiotis Subject: Establish & Adjust the Marketing Mix Teacher: Robert Taylor Time: Friday 9:30am till 12:30am Major Assignment: Written Report Weighting: 35% Theo Hiotis Apple iPh e 4 Produ t ʹ The Apple iPhone 4 is a Smartphone developed by the renowned American company Apple Inc. The iPhone 4 is the fourth generation of the iPhone series created by Apple. The main purpose of the iPhone is to integrate three amazing products in to one to allow i t to be functional this includes the phone, a portable mp3 player and a device to allow surfing the internet and receiving emails possible on a small compact portable device. Its main strengths is through the success of the previous iPhone versions includi ng the iPhone 3G and 3GS, the iPhone 4 incorporates movies, music, books, games, internet and email access along with telephone calling, messaging and video calling. The iPhone also uses an application created by Apple called the Appstore, This is vital into the planning and marketing of Apples iPhone and various ads have been categorised to the App Store. The App Store features over two hundred thousand app͛s created by 3 rd party developers which includes, Games, Utilities and other apps for other essential aspects such as productivity. The Apple iPhone uses the iOS developed by the company which is also used in the company͛s other products including, iPod and iPad . The most noticeable difference from other iPhone models and the iPhone 4 is the significantly new design which features Guerrilla glass on the touch interface as it is strong and the main issue with older iPhone models was the increased amount of screen cracking on the phone this also features a stainless steel frame which also acts as the devices antenna. -
Roger Mcnamee, Zucked: Waking up to the Facebook Catastrophe, New York, NY: Penguin Press, 2019, 352 Pp., $28 (Hardcover)
International Journal of Communication 13(2019), Book Review 4169–4172 1932–8036/2019BKR0009 Roger McNamee, Zucked: Waking Up to the Facebook Catastrophe, New York, NY: Penguin Press, 2019, 352 pp., $28 (hardcover). Reviewed by Heidi E. Huntington West Texas A&M University, USA In 2016, Roger McNamee, a longtime tech insider and venture capitalist, began to notice something unusual happening on Facebook. He observed a rise in viral images and other fear- and anger-based content coming from political-oriented Facebook groups. His hunch was that “bad actors were exploiting Facebook’s architecture and business model to inflict harm on innocent people” (p. 5). As a onetime mentor to Facebook founder and CEO Mark Zuckerberg, McNamee felt he had to do something. Shortly before the 2016 U.S. election, McNamee reached out to Zuckerberg (whom he had advised not to sell Facebook back in 2006) and to COO Sheryl Sandberg (whom McNamee had suggested for the job) to alert them to his observations. Zucked: Waking Up to the Facebook Catastrophe tells the story of McNamee’s efforts to convince Facebook to change tactics regarding some key aspects of its platform to be more socially responsible, and his subsequent, unlikely journey into anti-Facebook activism when his concerns went unanswered among Facebook’s executives. A tech advocate, McNamee likens himself to Jimmy Stewart’s character in the classic 1954 film Rear Window, unwittingly drawn into taking an active role in an ongoing crisis. Zucked is part personal narrative, part doomsday prophecy, and part call to action. Its focus is also ultimately broader than a critique of Facebook alone, using McNamee’s experience with Facebook as an entry point to examine the role of big tech companies in society more generally.