Yahoo奇摩 網頁搜尋

搜尋結果

  1. Chen, Shun-Ling (Taiwan/US) is currently an SJD student at Harvard Law School, with a secondary field in Science, Technology and Society. Her dissertation is entitled The Haunting Author in the Distribution of Ownership and Authority: An exploration through Collaborative Cultural Production.

  2. Description. "Tracing the thread of “decreation” in Chinese thought, from constantly changing classical masterpieces to fake cell phones that are better than the original. Shanzhai is a Chinese neologism that means “fake,” originally coined to describe knock-off cell phones marketed under such names as Nokir and Samsing.

    • Concept
    • Book: The Hacker Ethic
    • Bio
    • Discussion
    • More Information

    From the Wikipedia: 1. "The hacker ethic comprises the values and philosophy that are standard in the hacker community. The early hacker culture and resulting philosophy originated at the Massachusetts Institute of Technology (MIT) in the 1950s and 1960s. The term 'hacker ethic' is attributed to journalist Steven Levy as described in his book title...

    Source of the concept is the book: Himanen, Pekka. The Hacker Ethic and the Spirit of the Information Age. Random House, 2002 Quote from the back cover of The Hacker Ethic, by Pekka Himanen: “Nearly a century ago, Max Weber articulated the animating spirit of the industrial age, the Protestant ethic. Now, Pekka Himanen - together with Linus Torvald...

    Pekka Himanen URL = Pekka Himanen is a Finnish philosopher and researcher on the information society, most well-known for his landmark book The Hacker Ethic, which updates Max Weber's classic on the Calvinist work ethic. In his book he shows how network society is both exacerbating the Calvinist work ethic to the point where it becomes immoral and ...

    A view on the hacker ethic by Richard Barbrook

    From the "Manifesto for ‘Digital Artisans: 4. We will shape the new information technologies in our own interests. Although they were originally developed to reinforce hierarchical power, the full potential of the Net and computing can only be realised through our autonomous and creative labour. We will transform the machines of domination into the technologies of liberation. 9. For those of us who want to be truly creative in hypermedia and computing, the only practical solution is to become...

    On the necessity of open collaboration

    " The free sharing of information - in this case code as opposed to software development - has nothing to do with altruism or a specific anti-authoritarian social vision. It is motivated by the fact that in a complex collaborative process, it is effectively impossible to differentiate between the "raw material" that goes into a creative process and the "product" that comes out. Even the greatest innovators stand on the shoulders of giants. All new creations are built on previous creations and...

    Tony Prug: the hacker ethic and the protestant ethic

    From http://rabelais.socialtools.net/FreeSoftware.ToniPrug.Aug2007.txt: "Hackers and the Protestant ethics For Himanen_(2001), it is the hacker ethics that drives thedevelopment of Free Software. Hacker not meaning just a computerspecialist of certain type, but any person who practices some of thehacker ethics. It was Levy_(1984) who first formulated main point ofhackers ethics as: a) access to computers (and anything which mightteach you something about the way the world works) should beunli...

    See also The Hacker Manifesto and the Play Ethic
    The Hacker Ethic and Meaningful Work. Tom Chance, essay
  3. "Records of the Grand Historian, also known by its Chinese name Shiji, is a monumental history of China that is the first of China's 24 dynastic histories. The Records was written in the late 2nd century BC to early 1st century BC by the ancient Chinese historian Sima Qian, whose father Sima Tan had begun it several decades earlier.

  4. 2017年12月17日 · Today, with an investment of $300,000, you can develop smart phones under your own brand – simply follow these steps: Bring your design to Shenzhen; find a factory to produce it; sign an order for 10,000 sets of phones at a price of $30 per set.

  5. The Satoshi Oath for developers is a tool to make visible the informal social processes that are part of the infrastructure, to consider who or what benefits or who or what is left behind by different design decisions.

  6. He is considered the father of Chinese historiography for his work, the Records of the Grand Historian, a Jizhuanti-style (纪传体) general history of China, covering more than two thousand years from the Yellow Emperor to his time, during the reign of Emperor Wu of Han.

  1. 其他人也搜尋了