Difference between revisions of "Re-defining and Understanding True Hacking"

From Hacker Innovation: Redefinition and Examination of Outlaw Sources of Generativity for Future Product Development Strategies (2014) by Mike Pinder
Jump to: navigation, search
(Hacker generations and evolution)
(Corporate: Hackathons)
Line 35: Line 35:
 
 
  
 
=== Corporate: Hackathons ===
 
 
In a more creative and generative sense, consultancies and firms such as IDEO organise what are called, ‘hack nights’ to bring together multi-disciplinary design thinkers, digital community members and hackers with the aim of creating rapid prototypes for projects such as social welfare [IDEO, 2012]. Far from extremist acts, in this context, hackers from engineering, industrial design and architectural backgrounds are seen as discipline boundary-free thinkers, capable of generating new ideas by freely combining and exploring the potential generativity of technology through rapid prototyping, or merely hacking together devices and components in new and interesting ways.<ref>Prototyping an IDEO Make-A-Thon, available at: http://labs.ideo.com/category/hack, retrieved 13th Aril 2012.</ref> This is a world apart from highly illegal, deviant black hat hackers as discussed earlier. In this instance, a world leading design firm has ''hacked'' the term hack and re- contextualised it as a method in which to generate new ideas and future innovations within a legal and positive light.
 
 
Participants of a recent hack night in London were asked to choose from Make-A-Thon pin badges to communicate to other participants the type of hacking skills each member possessed; echoing the broad definition of a hacker in the sense that someone is simply considered as a passionate expert in any field. IDEO’s definitions range from computer hobbyists to enthusiast programmers in various fields; from physical design and prototyping experts, to programming, wood and metal working hackers.
 
 
'''IDEO’s hacker types:'''
 
 
*Prototyping hacker
 
* UX hacker
 
* Javascript hacker
 
* Foamcore hacker
 
* Robots hacker
 
* Python hacker
 
* No PPT hacker
 
* Ruby hacker
 
* Agile hacker
 
*Arduino hacker
 
* Hammer & hacksaw hacker
 
*3D printing hacker
 
*CAD hacker
 
* Rendering hacker
 
* Android hacker
 
* iOS hacker
 
*Wood hacker
 
 
[[File:Screen Shot 2014-08-30 at 15.38.47.png|framed|IDEO's hack-night definition of hackers via the use of pin badges to denote participant skills and background.]]
 
 
IDEO is generally regarded as a highly progressive, forward-thinking design and innovation consulting firm who in this instance, intentionally deployed the original meaning and understanding of a true hacker (a passionate expert in any field within their hackathon workshops [Himanen, 2001].<ref>HP Labs recently hosted their ‘Hack Idol’ Cyber Security Challenge sponsored by major corporations, PriceWaterhouseCoopers, BT, Cassidian, QinetiQ to search for the most talented black hat hacker fighting teams. Winners were offered jobs at large corporations and even offered sponsorship to undertake master’s degrees at renowned computer science departments at large universities.</ref>
 
 
Put simply, they brought together multi-disciplinary open, collaborative, passionate hackers with a common set of underlying ethics in order to drive and generate new innovative ideas. Throughout the event intellectual property rights, copyright and patent protection were infringed upon (and ignored) in the pursuit of suitable design and innovation outcomes, by remixing IP as participants saw fit. Over a two-day period a number hacker innovations emerged for iPad’s, iPhones as well as prototype bicycle safety devices and 3D printed accessories for Boris Bikes in London.<ref>Also known as Barclays Cycle Hire: A public bicycle-sharing scheme launched in London in 2010.</ref>
 
 
This event was a structured two-day workshop, physically bringing together hackers from different backgrounds. More of a staged event to facilitate multidisciplinary design and participation in hierarchically organised and delivered sessions (rather than in self organising Web based collaborative hacker innovation networks where members freely participate and contribute to innovations in loosely formed agile networks of like-minded skilled and passionate people), events such as this by industry opinion leaders like IDEO have significant diffusion impacts upon the way in which hacking is perceived and used by wider firms looking to emulate similar design management techniques and methods to drive firm innovation outputs.
 
 
Facebook has also adopted a hacker corporate management culture in order to foster continued innovation through organised hackathon events. Employees are tasked to hack together a new product or service prototype based on newly generated ideas. To promote an open and meritocratic ethic, all employees critique other’s hacks and collaboratively select those with the most potential value to the firm and its users. Some of Facebook’s most significant and acclaimed products and services have emerged from these hackathon events. Here hacking provides a significant if not, almost entire source of continued and sustained innovation for the firm.
 
  
 
== Footnotes ==
 
== Footnotes ==

Revision as of 15:57, 30 August 2014

Hacker mind-sets

In order to understand the hacker mind-set and ethical underpinnings, it is vital to establish the underlying beliefs that ground attitudes towards capitalism and the wider modern economic system surrounding it.

The network society in which hackers fundamentally operate, organise, innovate and disrupt can be traced back to through proceeding scientific revolutions and emerged at a very specific moment in history. Thomas Kuhn describes technological paradigms as a conceptual pattern that sets standards for performance by organising the available range of technologies around a nucleus that enhances the performance of each [Kuhn, 1962]. In his view the industrial revolution firstly enabled humans to generate power and distribute energy via human ingenuity and artefacts without being solely dependent upon the natural environment in its existing natural state. Energy generation in this sense enables activities by powering-over nature and overcoming the limiting conditions of own individual existence. Water, steam, electric and nuclear power allowed for new forms of production, consumption and social organisation for the evolving industrial society. The avant-garde today being the post-industrialist knowledge economies found in the West in which hacking primarily functions.

The industrial society is comprised of factories, corporations, bureaucracy, and the phasing-out of traditional agricultural labour in place of large-scale urbanisation; international transportations systems, centralised social systems, mass-media and-mass communications. The rise of mass communications and the Internet in particular made fundamental changes to the control of knowledge and information and have challenged the way in which wealth, power and meaning is generated. Information processing, communication and innovation technologies (computer micro chips, network connectivity and associated costs) essentially impact upon the industrialist paradigm itself; specifically on how the generation, control and application of knowledge occurs.

The value in the Internet today comes from linking-up of artefacts in the virtual and real world into new combinations, built upon and extending the configurations of its original architect in modular forms. This re-combinatorial and reconfigurable nature of intellectual property artefacts provides a key source of innovation in the post industrialist networked society. The process of innovation is also subject to recombination and reconfiguration, particularly in the latter stages of the product life cycle (PLC) via acts of hacking to create new artefact combinations or arrangements that in turn support further spirals of meaningful knowledge and information for the system as a whole. The hacker entity freely facilitates this recombination and reconfiguration irrespective of prior intellectual property rights and law that are perceived as a perverse abstraction unto itself; a concept claiming private ownership rights over nature, whether supported and justified by post-industrialist legal regimes or not. In this sense, the configuration of social structures supporting the organisational arrangement of human relationships to production, consumption and power (framed by culture) is unrestrictedly subverted, distorted and reconfigured by hackers.

Information society

The information driven society was partly invented and developed by a culture of open data sharing, collaboration and cooperation found within ARPAnet experiments and scientific as well as academic research communities. Researchers were free to examine others findings as well as test and further develop others ideas. Self professed hackers designed and built the technologies underpinning the Internet (Unix, Linux, communications protocols, sockets and layers) that make the Internet work and they believed in simply building things for societal value, not destroying them as the popular media would have us presume. Hacker ethics originating at MIT in the generative context, only to have meaning subverted by continued usage referring to computer criminals in the early 1980’s when students broke into rooms that housed campus mainframe computers in order to test out new programs and written code. They believed in freedom of information and voluntary mutual help. In their eyes, legal and institutional barriers only prevented a good solution to a creative problem from being found and simply forced people to re-invent wheels. They believed a solution to a problem should not have to be solved twice and intellectual property and private ownership rights simply create barriers to creative problem solving, resulting in epistemological and idealistic confrontations with the establishment, culminating in a spectrum of hackers acts along an illegal-to- legal dimension.

Hacker culture is a fundamental concept grounded in a specific set of ethical foundations that underpin the networked, post industrialist society and is embedded in a set of cultural beliefs, values and general world economic view. Whilst widely misinterpreted in popular culture, hackers can provide vital sources of innovation that are instinctively and habitually disregarded as simply disruptive, illegal, dangerous and irrelevant to organisations activities.

A wider contextual understanding of hacker activities is needed, devoid of misleading popular connotations and bias, to draw attention to the ways in which hacking acts can generate sources of important value for the innovating firm. By demonstrating how hackers can be vitally beneficial to firms, not simply disruptive and counter productive, it is hoped that general attitudes and policymaking will reflect the subtly changing attitudes to hacker activities already slowly taking place. In so doing should allow both private ownership and open ownership property regimes to exist more complimentarily in a mutually beneficial and reciprocal relationship towards the same goals.

Hackers ethics, passion and the roots of work

The underlying roots of hacker ethics and mind set can be traced back to direct challenges to the idea of the protestant work ethic [Weber, 1905]. Weber argued that the capitalist spirit is found in the implicit obligation individuals feel towards undertaking productive work, enforced by religion and God. Members of society are made to feel obliged to work and to find contentment in professional working activities as one’s natural God given duty. For hackers, motivations to work are entirely different. The driving force behind value creation in life comes from the passion to create artefacts of great social value, rather than merely for money and capital generation. The same ideals and vision carefully crafted and communicated to consumers by large innovative corporations who go to great lengths (and cost) to emphasise corporate social responsibility and a wider societal purpose in the world. It has long been established that firms who understand consumer’s driving passions (legal or illegal), are far better suited to creating relevant innovations and value, if they are closely aligned and directly connected to underlying consumer passions.

Basic work ethics and organisational factors for hackers do not originate primarily from work or capital gain per se, but from passion and desire to create something socially valuable. This explains the predominant view of firms such as Microsoft as the enemy of hackers with its focus on wealth generation, closed code, proprietary systems and appropriation rents from its patent portfolio and strict licensing model (in spite of a recent strategic shift towards financing and encouraging the development of Open Source software). For hackers, when profit, growth and wealth generation are the dominant focus for a firm, passion is no longer the central driving force behind innovation and creation, therefore something to be entirely wary of. Hackers also believe that innovators should directly profit from their socially beneficial efforts, but not profiting from closed information to others.

The term hacker has a broad and general definition that spans the illegal to legal dimension but essentially encompass all hacker classes as an expert or enthusiast of any kind [Himanen, 2001]. This term generally applies to anyone with a passionate interest in any domain in the information age. Unlike most typical users who see computers, networks and devices as black boxes that can enhance productivity; hackers see computers, networks and devices as sources of entertainment just like any other personal hobby. They are driven to understand and master a technology because it personally interests them and provides pleasure, joy and excitement, not merely as something that reduces uncertainty in performing a desired task in the workplace [Rogers, 1995].

[Hackers are] people who love and understand the technology they use. These are people who can "hack" together a solution to a problem with a soldering iron and a few paper clips. People who modify operating systems because they don't like the way they work [Robson, 1999].

Hackers have a strong sense of play; are prepared to take risks in exploring a technology and care deeply and passionately about their interests.[1] As Burrel Smith of Apple stated: ‘you can be a hacker carpenter... It has to do with craftsmanship and caring about what you’re doing.”

Apple is an example of a habitually innovative and disruptive firm, marketing itself upon core countercultural ethics, similar to those found in hacker communities. Technology in their eyes should be used for your own purposes outside the control of large firms. Apple wishes to outwardly express its image as a group of freethinking rebels, troublemakers and technological radicals, akin to popular hacker culture. This may have reverberated with consumers when Apple was fighting against market domination by the likes of Microsoft and IBM, but becomes somewhat contradictory when it is now Apple who dominates markets as the most valuable company in history. The philosophy behind the hippy chique becomes hippy control freak within closed systems, gated communities, centralised control and vertically integrated products that lock users into proprietary platforms. Rather than echoing radical rebelliousness, vertically integrated software and hardware screams instead, proprietary claims to private ownership and ‘a firm knows best’ attitude most strongly detested within hacker ethics.

By adopting a closed strategy, firms like Apple lock out the possibility for social product development inherently generated within the network society. There is no desire to be more responsive to the external environment because the environment does not know yet what it wants and Apple intuitively does. This has been made clear one successful and dominant design product launch after another. Firms like Apple however are somewhat rare and demonstrates an uncanny ability to develop truly radical unknown innovation for consumer needs that do not yet exist. The hacker ethic is sacrificed in order to create a seamless and simple mass-appealing interface, but in so doing resists any form of user empowerment and flies in the face of the fundamental nature of networked information technologies themselves. Habitual behaviour by industry innovation leaders deliberately closes-off external boundaries in the competitive landscape, dismissing it as externally generated noise that serves only to blur internal creative vision and direction in the fuzzy front end of the design and innovation process as it only creates fragmentation. However for those firms more at the bleeding edge of innovation leadership, external ideas, resources and hacking have the potential to provide vital waypoints, design trajectories and market direction to help reduce uncertainty in innovation management. 


Footnotes

  1. Impassioned hackers who care deeply about the technologies they use and develop, ironically, are key attributes employers search for when interviewing potential candidates because it increases the likelihood

References