Skip to content

Commit e8d6d15

Browse files
author
ZoomQuiet
committed
📖 DOC:
1 parent 111f89a commit e8d6d15

2 files changed

Lines changed: 27 additions & 0 deletions

File tree

part1/README.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
# PART I
2+
## HISTORIES
3+
••
4+
5+
> While we read history we make history. —George William Curtis, The Call of Freedom
6+
7+
8+
The next two chapters are general in their scope, meant to introduce read- ers to the world of free software, and do so from two related although distinct vantage points, both historically informed. Chapter 1, as mentioned above, describes a typical life history compiled from over fty in-person interviews along with twenty email and/or Internet Relay Chat (IRC) in- terviews. It portrays everyday life and historical transformation as many experience it: in a mundane register, and without the awareness that we are making or are part of history. What it seeks to show is how hackers become hackers slowly over time and through a range of varied activities. This pro- cess, though experienced in quotidian ways, is ultimately a historical affair, for the hackers of yesteryear are not quite the same as those of today, despite crucial continuities. The rst chapter tracks some of the changes within free software and also provides basic sociological data about free software de- velopers: where they learned to program, where they work, and how they interact with other developers.
9+
10+
11+
Chapter 2 turns away from personal accounts to tell a more global story. It traces two distinct but overlapping legal trajectories and their eventual clash. During the same period in which intellectual property law assumed tremendous and global regulatory power, free software also rose to promi- nence, eventually providing one of the most robust challenges ever to intel- lectual property laws. The legal alternatives made and supported by free software did not always follow from politically motivated action, but rather from the experiences involved in the production of free software. These ex- periences were formative, leading a generation of hackers to become astute legal thinkers and producers—knowledge that was in turn eventually mar- shaled for political protest against the current intellectual property regime.
12+
Before turning to these two chapters, it is worth highlighting how histor- ical representation is a delicate play of fabrications, or stated a little more eloquently by Voltaire in his short story “Jeannot et Colin, “fables agreed upon.” By fable, I don’t mean false, yet it is imperative to acknowledge the constructed nature of the accounts. Choices have to be made about what to include, what to exclude, and most important, how to include them. For the life history chapter, I have chosen stories, elements, and events that I hope faithfully capture the zeitgeist of becoming a free software hacker, ending with one of the most memorable hacker events: the hacker confer- ence. The subsequent chapter, by examining the dual character of our age, whereby we are subject to an omnipresent legal system and also have at our disposal a vibrant set of legal alternatives, is meant to inspire a para- doxical degree of hope and despair, thereby contributing, in its reading, to the making of history.
13+

part2/README.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
# PART II
2+
3+
## CODES OF VALUE
4+
5+
![](http://ydlj.zoomquiet.top/ipic/2021-07-05-figure-3-1.jpg)
6+
7+
8+
Anthropologists often focus on cultural value—those ethical, aesthetic, and political attributes of social life that a group has come to deem im- portant, and that ultimately help de ne it as distinct from other groups. The next two chapters tackle the question of cultural value as a starting point to address a host of questions about hacker technical and cultural production along with the tensions that mark hackers’ social dynamics, collaborative practices, and organizational forms.
9+
10+
Although we might be able to identify some indisputable commitments among hackers, such as meritocracy and the form of individualism it entails, the foundation of value among hackers is never without dispute and fric- tion. Indeed, hacking, like all social domains, is shot through with a series of notable tensions. These oscillate between individualism and collectivism, elitism and humility, and frustration and deep pleasure, among others. There are various codes—informal and formal—by which hackers negotiate the tensions that characterize their productive landscape.
11+
12+
The next two chapters attend to what hackers value as well as the ten- sions that are part and parcel of hacking, and the social codes by which these tensions are partially resolved. Chapter 3 will examine the pragmatic and aesthetic demands of writing code. Humor gures prominently since it mirrors the formal/pragmatic and poetic/aesthetic dimensions of coding, and gets us closer to the most palpable tension in the hacker world—that between individualism and collectivism, which is necessary to grasp notions of creativity and authorship.
13+
14+
Chapter 4 steps away from the craft and aesthetics of hacking toward the workshop where hacking now unfolds—the free software project. Focusing on the Debian project, I continue to give attention to the central contra- dictions that mark hacking, notably that between elitism and populism. A new thread concerning ethical commitments to information freedom and free speech also appears. Free software projects, while most famous as the place where technical coordination unfolds, is also where signi cant ethical work transpires. It is here where commitments to free speech are inculcated, thorny issues of meritocracies are resolved, and hackers embody and live out a dense ethical practice.

0 commit comments

Comments
 (0)