Difference between revisions of "Hackers, Problem Solving and Innovation"

From Hacker Innovation: Redefinition and Examination of Outlaw Sources of Generativity for Future Product Development Strategies (2014) by Mike Pinder
Jump to: navigation, search
(Created page with "== Hackers and innovation == Hackers essentially understand and identify problems in need of solutions and set about finding ways to solve them. Improving artefact configurat...")
 
Line 22: Line 22:
  
 
Hacker-innovators (tentatively, hackovators) represent the hybrid, fourth generation hackers, comprising of both Enthusiast Programmer and Computer Hobbyist types, working in collaborative, distributed, self-organising and governing communities (similar to those in found in Free Software and Open Source communities), enabled by distributed ICT technologies using digital tools and devices to generate, spread and share knowledge on different design parameter module configurations found within open and closed consumer artefacts.
 
Hacker-innovators (tentatively, hackovators) represent the hybrid, fourth generation hackers, comprising of both Enthusiast Programmer and Computer Hobbyist types, working in collaborative, distributed, self-organising and governing communities (similar to those in found in Free Software and Open Source communities), enabled by distributed ICT technologies using digital tools and devices to generate, spread and share knowledge on different design parameter module configurations found within open and closed consumer artefacts.
 +
 +
 +
 +
 +
==Footnotes==
 +
<references/>
 +
 +
==References==
 +
<HarvardReferences>
 +
* [*Levy, 1984] Levy, S. (1984). Hackers: Heroes of the Computer Revolution, Penguin.
 +
* [*Locke, 1689] Locke, J. (1689). Two Treatises of Government: In the Former, The False Principles and Foundation of Sir Robert Filmer, And His Followers, are Detected and Overthrown. The Latter is an Essay concerning The True Original, Extent, and End of Civil-Government.
 +
* [*Smith, 1776] Smith, A. (1776). An Inquiry into the Nature and Causes of the Wealth of Nations. London.
 +
* [*Wark, 2004] Wark, M. (2004). A Hacker Manifesto. Cambridge, Harvard College.
 +
* [*Marx, 1848] Marx, K. (1848) The Communist Manifesto.
 +
* [*Rosenbaum, 1971] Rosenbaum, R. (1971). Secrets of the Little Blue Box. Esquire: 117-226.
 +
* [*Parliament, 2000] Parliament, U. (2000). Freedom of Information Act. ch3600s08a. 2000 c. 36.
 +
* [*Assange, 2012] Assange, J. (2012). "WikiLeaks." Retrieved Sep, 2012, from http://www.wikileaks.org/.
 +
 +
 +
 +
</HarvardReferences>

Revision as of 16:14, 31 August 2014

Hackers and innovation

Hackers essentially understand and identify problems in need of solutions and set about finding ways to solve them. Improving artefact configuration states by carrying out rapid incremental trial and error iterations until an improved state is achieved. The hacker mind-set does not only apply to software code, but also hardware and physical technologies. Hackers provide the truly free foundations for collaborative ideation and innovation to take place mediated by digital technologies and combining ideas through rapid problem solving iterations (free from property ownership conflicts by simply disregarding them), to enable unrestricted collaborative design and problem solving. Hacker groups work similarly to firms by isolating a problem or unmet need with an existing artefact, product or service, followed by collaborative ideation, selection, refinement, sharing and wider diffusion back into the commons for yet further iterations.

Hackers are self-motivated without the need for authority figures to approve project initiation, deploy additional resources or even provide funding. They act with passion and genuine interest so that work does not feel like a chore but rather, a hobbyist act. Hacker work can be regarded as similar to the notion of finding a perfect job; work that you would willingly undertake, even if not paid to do so. It is said that if you are lucky enough to consider work in this way, you have found your passion in life and should, in theory at least, be a content individual repeatedly found in a state of flow [Csikszentmihalyi, 1990] [Csikszentmihalyi, 1997]. These emotions can also be applied to hacker work, where passionate interests create complete absorption, concentration, engagement and fulfilment in the activity experience, triggered by intrinsic motivations. For hackers, the thrill of pushing beyond known technological limits, sharpening and developing skills and exercising intelligence are the drivers for undertaking a hack in the first place. Barriers to hacking via institutional frameworks, IP regimes and closed source code are obstacles to overcome (in many cases simply ignored) as they only prevent a good solution from being found. They force people to make non-innovative compromises in the pursuit of a more ideal solution to a problem elsewhere or by other means.

Hacking forms free association of entities that might not otherwise be considered by firms. As already discussed, consulting firms like IDEO use hackerfests in order to facilitate free and divergent creative thinking by not pre- judging ideas, being open enough to play, share ideas and to solve new problems in new ways, much in the same way brainstorming and mind-mapping is used to solve problems by gathering spontaneous ideas from group thinking sessions.

Hierarchical structures and bureaucracy within authoritarian incumbents leverage value from censorship and secrecy by generating asset scarcity. Such structures tend to instinctively distrust forms of voluntary cooperation and information sharing as they cannot be regulated, restricted and controlled. As seen with the reaction of the business world to Open Source, where cooperation is only really trusted when initiated and under firm control under strict licensing agreements. Hackers and hacker communities operate vastly different ways to traditional firms and present real challenges for both organisational forms to find reciprocal relationships of mutual benefit, if possible at all.

Hacking can be viewed as a methodology to open up free and unrestricted, solution based thinking to foster new combinations of creativity and to allow problems to be solved in new and intriguing ways. Design thinking works in similar ways as a divergent thinking methodology and process for combining empathy, creativity and rationality to analyse and find solutions to problems [Brown, 2008]. Hackers in effect, extend the notion of divergent thinking to an extreme (devoid of aforementioned private ownership restrictions designed for inter-firm rivalries), by operating outside the creative constraints imposed by institutional law in the pursuit and discovery of better solutions to technological problems; an unrestricted mode of thinking, limited only by ones ability or imagination, unrestricted and independent of institutional legal frameworks.

Like designers, hackers are boundless unrestricted seers and seekers of value in the space of potential design parameters (whether locked out or freely available), particularly within interchangeable modular systems and frameworks. Consumer electronic products inherently built upon modular systems design are akin to Lego bricks for children. For instance Lego chooses not ship its designs in pre-assembled form with bricks individually, permanently glued together so that end-user children cannot reconfigure them as they see fit or creatively desire. Lego bricks are sold on the assumption that a multitude of unrealised design configuration options are easily available and accessible to children freely seeing and seeking out new value configurations, in addition to the few design variants kits are shipped with. Children are presented with a stimulating creative challenge that brings intrinsic joy through the exploration of alternative modular design configurations made possible by the systems clean interface design.

If a hacker were given a pre-assembled modular Lego kit, glued together to prevent other configurations being made, then the hacker’s primary task in the first instance would be to develop a glue-dissolving compound, tool or other method to remove the permanent bonding in between the bricks so that they could be taken apart and reconfigured as they saw fit. The compound would then be shared in the commons among other like-minded hackers to enable many more persons to freely see and seek alternative, perhaps higher forms of value through the reconfiguring and discovery of modular design structures (that were previously locked away in the closed system) to their heart’s content.

Many products today are sold to consumers in this glued together closed systems state within vertically integrated modular software and hardware platforms that lock out any further forms of innovation from occurring once it leaves the manufacturing base. Being closed and modular locks out potential design configuration options from all but the original creators. The hackers role is to open back up modular platforms and allow operator control (or root access) that moves configuration option control away from original designers, firms and copyright holders, who seek the regulation and control of value extraction via the marketplace, towards hacker communities themselves. Put in place to create coherent and consistent user experiences, tightly coupled closed module software and hardware interfaces make them averse to further modification by innovators, lead users, extreme users and similarly labelled hackers. Firms rely on the economic benefits of modularity to construct closed artefacts based on economies of scale, sold at above cost to consumers and when hackers challenge this control, they are immediately seen as a threat upon the organisational horizon.

Hacker ethics in closed, end-to-end integrated systems are sacrificed by firms in order to maintain control of the entire experience by resisting the empowerment of the user who must tear down walled gardens, established to best return shareholder value to investors. These systems are also closed to the technical and social infrastructures that accompany them by refusing access to distributed teams of hacker innovators, making it the hacker’s task to search for hidden doors through these secret walled gardens and obtaining access to them, in order to see what lies hidden away to be modified, altered, destroyed or improved upon.

New knowledge about module design configurations accumulates within hacker innovation communities, as more and more configurations are concurrently tested and evaluated by fixing and solving problems through iterative problem solving processes. The result is a decentralised module testing, evaluating and solving environment enabled by ICT technologies to coordinate effort.

Hacker-innovators (tentatively, hackovators) represent the hybrid, fourth generation hackers, comprising of both Enthusiast Programmer and Computer Hobbyist types, working in collaborative, distributed, self-organising and governing communities (similar to those in found in Free Software and Open Source communities), enabled by distributed ICT technologies using digital tools and devices to generate, spread and share knowledge on different design parameter module configurations found within open and closed consumer artefacts.



Footnotes


References

  • [Levy, 1984] Levy, S. (1984). Hackers: Heroes of the Computer Revolution, Penguin.
  • [Locke, 1689] Locke, J. (1689). Two Treatises of Government: In the Former, The False Principles and Foundation of Sir Robert Filmer, And His Followers, are Detected and Overthrown. The Latter is an Essay concerning The True Original, Extent, and End of Civil-Government.
  • [Smith, 1776] Smith, A. (1776). An Inquiry into the Nature and Causes of the Wealth of Nations. London.
  • [Wark, 2004] Wark, M. (2004). A Hacker Manifesto. Cambridge, Harvard College.
  • [Marx, 1848] Marx, K. (1848) The Communist Manifesto.
  • [Rosenbaum, 1971] Rosenbaum, R. (1971). Secrets of the Little Blue Box. Esquire: 117-226.
  • [Parliament, 2000] Parliament, U. (2000). Freedom of Information Act. ch3600s08a. 2000 c. 36.
  • [Assange, 2012] Assange, J. (2012). "WikiLeaks." Retrieved Sep, 2012, from http://www.wikileaks.org/.