Playful cleverness History and Visions of New Media IMKE 2007 Kaido Kikkas This document uses the GNU Free Documentation License (v1.2 or newer).

Slides:



Advertisements
Similar presentations
The Beauty, the Wonder and the Awe of Computing Chris Stephenson.
Advertisements

A Lawyer Looks at the Open Source Revolution Robert W. Gomulkiewicz Director, Intellectual Property Law & Policy Program Associate Professor of Law University.
What is GNU/Linux (Not Linux!)? David Sudjiman davidsudjiman (at) yahoo (dot) com The latest version of this document can.
Upper School Experience This PowerPoint is available on the school website “Strength from diversity”
Courtney Anstett, M.S. Service-Learning Coordinator Norwalk Community College Bringing Service and Learning Together.
Core Competencies Student Focus Group, Nov. 20, 2008.
GNU / Linux A free operating system. Summary History What can you find on a Linux OS Linux Economy.
Open Source Projects Manage Themselves? Dream On! (Another take on CatB) Chuck Connell, Tufts Univ.
Daniel Blanchette December 1st 2009 Dedicated to Susan Phillips ( )
Hacker Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester By :wejad.n.mansour.
Lecture 8 Hacker Culture
Computers in Society Week 8: Computer Security and Hacking.
 Background Philosophy  Definition of Multiculturalism  Goals  Arts’ Standards  Students Will  Why Teach From the Arts  Why Use the Fine Arts in.
IS Spring The Basics of Open Source Reinhardi A. Haqi Mohamed Umar Shakeel Advanced Topics for Systems Development.
1 Open Source Code Steve Chenoweth CSSE 375, Rose-Hulman Based on Don Bagert’s 2006 Lecture.
Getting on the same page Handout - Weinberg General Ethical concepts –do a little research SE Code of Ethics reading (pop quiz) Paper proposal coming up!
What the hell is. Free software is software that anyone is free to use, copy, improve, examine or distribute, either free of cost or for a price. More.
How to Make Money with OSS – Business Models T Seminar on Distributed Product Development Helsinki University of Technology Arttu Heikkilä 2004-DEC-07.
The Battle for Wesnoth as a teaching tool Kaido Kikkas Institute of Informatics Tallinn University.
Analyzing and Adapting to Your Audience.  Goal is….to learn enough about your audience so that you are able to adapt your purpose, goal, and eventual.
Introduction Computers and English Matt Barton. What is this course all about? This course is designed to introduce you to the field of Computers and.
Building Effective Interpersonal Relationships
9/12/2015 Kevin G. Tucker/University of Belize1 Meaningful Social Studies.
Computers and Society Examine the extent to which Richard Stallman’s GNU manifesto has succeeded in challenging the dominance of conventionally distributed.
Laying the Groundwork: Philosophy
This document uses the GNU Free Documentation License (v1.2 or newer). Different people, digital world PSI 2007 Kaido Kikkas.
A Comparison of Linux vs. Windows Bhargav A. Sorathiya B.E. 4 th C.E. Roll no:6456.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
Open Source Software In the beginning, all software was free –in the 1960s,when IBM and others sold the first large-scale computers, these machines came.
Branches of Philosophy
Institute for Social Research - Zagreb Centre for Educational Research and Development THE STATUS OF INFORMATION AND COMMUNICATION TECHNOLOGY IN NATIONAL.
Maintainability of FLOSS Projects
Distributed Version Control System
Ethics, Computing, and the Internet
Lecture 21 Computer Security Ethics
Open Source Software Architecture and Design By John Rouda.
Software Construction and Evolution - CSSE 375 Open Source 2 Shawn & Steve.
Online curriculum centre Faculty member training, April 2009.
Library 2.06 February 2009 Linux for Librarians Nishtha Anilkumar Librarian Physical Research Laboratory Ahmedabad.
Open Source Examples – Linux; Apache; Firefox Requirements – Distributed w/ source code – License allows for modifications (GPL) – License remains w/ any.
Hacker Ethic in a Networked Society This document uses the GNU Free Documentation License (v1.2 or newer). PSI 2007 Kaido Kikkas.
Challenges for European Music Education Challenges for European Music Education.
Team 13 Kevin Butler Sebastian Vaughn Kaitlin Barr Alex McCollough Brent Johnson James Dunn.
PORTFOLIO FOR TEACHERS Healthy eating and sport. How can you improve your pupils lifestyle?  ❑ motivation them for physical activities  ❑ organizing.
Building Bridges. After school programs can provide: an environment in which children can practice ways of learning and behaving that will help them succeed.
UNIX History UNIX began as a research project. UNIX System V developed at Bell Laboratories. BSD (Berkley Software Distribution) UNIX XENIX UNIX Sun Operating.
 Hackers Heroes of the Computer Revolution By Phil Dinovo.
HACKERS: HEROES OF THE COMPUTER REVOLUTION 25 TH ANNIVERSARY By: Brett Delaney Living in a Networked World: The Good, the Bad, and the Ugly CS 408 Section.
Edward de BONO Born May 19,1933 (age 81) Nationality: British
Multicultural Education
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
The Networked World PSI 2007 Kaido Kikkas This document uses the GNU Free Documentation License (v1.2 or newer).
Hackers: Heroes of the Computer Revolution By: Steven Levy.
Developmentally Appropriate Practices. Five Guidelines For Developmentally Appropriate Practices.
* House Bill 5, Section 46; Texas Education Code Section
FLOSS: concepts and development OSM2011 Kaido Kikkas 2011 Kaido Kikkas. This document is dual-licensed under the GNU Free Documentation License (v l.2.
Hackers…? Kaido Kikkas SPEAIT 2015/2016
The hacker approach: the deve- lopment of free licenses IPNM 2007 Kaido Kikkas This document uses the GNU Free Documentation License (v1.2 or newer).
Hackers…? Kaido Kikkas SPEAIT 2016/2017
7 Mavericks and Hacking 1.
Hacker Ethic in a Networked Society
The hacker approach: the deve-lopment of free licenses
S E C T I O N 3 Basic Concepts of Democracy
Open Source Software in Academia
CS Presentation Michael Retrum.
The Networked World PSI 2007 Kaido Kikkas
Towards the Information Society
What is Computer Science?
Personal and shared knowledge
Presentation transcript:

Playful cleverness History and Visions of New Media IMKE 2007 Kaido Kikkas This document uses the GNU Free Documentation License (v1.2 or newer).

Hacker...? “My website was hacked, blah blah” Typical image in most mainstream media: ingenious yet malicious hi-tech vandal There are constructive and knowledgeable people calling themselves hackers too H/hacker.html Controversy?

Who to believe? Those whose achievements range from clueless pranks to serious damage to other people (from Anonymous Dork to Kevin Mitnick)? Or those who do not have any deeper knowledge about tech culture (most journalists)? Or those who have built a great share of today's Internet infrastructure and left their distinct footprints into the history of technology (Stallman, Torvalds, Berners-Lee, Perens, de Raadt, de Icaza, Lerdorf and many others)

Definition in this lecture a hacker is (mostly but not necessarily) a computer professional with innovative mindset and a passion for exploration also a tech subculture deeply rooted in the history of technology Hacker ethic worded by Raymond: "The belief that information-sharing is a powerful positive good, and that it is an ethical duty of hackers to share their expertise by writing open-source code and facilitating access to information and to computing resources wherever possible."

The Forefathers: MIT MIT Tech Model Railroad Club, founded 1946 The Signals & Power Subcommittee First computer science classes in 1959 (TX-0) PDP-1 in 1961 Project MAC in 1963 MIT AI Lab in 1970 Foundation of the culture Recommended reading: Hackers by Steven Levy

No business “Computer science” ~ “rocket science” Too few people to form a market Military undertones Software was machine-specific Also, management kept hackers apart from managers and bookkeepers => Playful cleverness: original display of creativity unhindered by market motives

Subculture Sharing culture (programming into a drawer) Non-standard use of technology (music, chess, games like Spacewar) Specific jargon (-P, T/NIL, MU!) Hacking of Chinese food Puns and wordplay (“Government Property - Do Not Duplicate” => “Government Duplicity - Do Not Propagate” (on keys) Also: MIT hack tradition (see

The early Hacker Ethic “1. Access to computers – and anything which might teach you something about the way the world works – should be unlimited and total. Always yield to the Hands-On Imperative!” "walk the walk, not only talk the talk"; a root of later hacker ethic

... “2. All information should be free. “ Historical undertones (limited resources) – yet the base of sharing in its many forms

... “3. Mistrust authority – promote decentralization.” Democracy rather than anarchy – it fights the misuse of authority, not authority as such Decentralization has been a central feature of the Internet (and all network-based development) since its early days!

... “4. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.” Equality! (Gender, education, race, worldview...) Peter Deutsch, 12 Gender- and color-blindness of hackers - a positive effect of text-only network channels: all participants judged by the quality of their input, not their personal features! (suggested by the Jargon File)

... “5. You can create art and beauty on a computer.” Not so evident in early days – MIT hackers were the first to define computer aesthetics Ct. current WordPress slogan: “Code is poetry” Raymond's “points for style” - hackers are no nerds at all?

... “6. Computers can change your life for the better.” New, non-traditional application (the ping-pong robot) a root of today's free culture

Decline and rebirth Early 80s: split in MIT AI Lab RMS, the Last of True Hackers (Levy) 1983 – GNU 1989/91 – GNU GPL 1991 – Linux *BSD ~1995 – LAMP and Red Hat KDE & GNOME

The Cathedral and the Bazaar Set of essays by Eric S. Raymond, originally from 1997 Business reasoning of free models Open Source vs Free Software ESR as a colourful character Hacker-HOWTO: Helped to develop a new generation of hacker ethic

ESR: main criteria attitude - "Do you identify with the goals and values of the hacker community?" skills - "Do you speak code, fluently?" status - "Has a well-established member of the hacker community ever called you a hacker?" All three are needed to be a hacker!

Attitude points The world is full of fascinating problems waiting to be solved No problem should ever have to be solved twice Boredom and drudgery are evil Freedom is good Attitude is no substitute for competence

Skill points Learn how to program Get one of the open-source Unixes and learn to use and run it Learn how to use the World Wide Web and write HTML If you don't have functional English, learn it

Status points Write open-source software Help test and debug open-source software Publish useful information Help (to) keep the infrastructure working Serve the hacker culture itself

Points for style Learn to write your native language well Read science fiction and go to science fiction conventions Train in a martial-arts form Study an actual meditation discipline Learn to appreciate music, to play some musical instrument or to sing Develop your appreciation of puns and wordplay

Motivation Linus' Law: survival social status fun Ct. Wozniak's H = F 3

Hackers of the new century GNU, Linux, Wikipedia, OpenCourseWare... See: Hacker Ethic by Pekka Himanen, also other writings of Himanen and Manuel Castells Medieval vs Protestant vs hacker ethic

Himanen on Hacker Ethic Protestant Ethic money work flexibility goal orientation, result accountability optimality stability Hacker Ethic passion freedom (hacker) work ethic (hacker) money ethic nethic (hacker network ethic) caring creativity

Friday vs Sunday Friday as the day of Crucifixion but also as the last day of working week Sunday as the day of Resurrection but also as the day for rest and reflection Estonian pühapäev – lit. 'sacred day' In which day do we live?

Conclusions The hacker culture and hacker ethic do have respectable roots in history From the mindset of a dedicated techno-elite into the hacker ethos of new millennium with a wide array of new ideas and possibilities Might be the thinking model that our networked society really needs!