SlideShare a Scribd company logo
1 of 29
Of Hobbits, Amish, Hackers and Technology (or, is technology for humans or vice versa?) Kaido Kikkas Associate professor of social and free software Department of Informatics, Tallinn University kakk@kakupesa.net  http://www.kakupesa.net University of Joensuu, 23.04.07
As they use to say in Internet: WTF? ,[object Object],[object Object],[object Object],[object Object]
J.R.R. Tolkien ,[object Object],[object Object],[object Object],[object Object],[object Object]
The ideal world of Tolkien ,[object Object]
Tolkien and hackers? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Amish – the Hobbits of today? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Really? ,[object Object],[object Object]
But... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],So?
Still... where's the point? ,[object Object],[object Object],[object Object],[object Object]
An example:  why no phones at home? ,[object Object],[object Object]
Why no school? ,[object Object],[object Object],[object Object]
Jump to another world: hackers ,[object Object],[object Object],[object Object]
For more on the hacker tradition  see the following: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Amish vs hackers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technology for people – or the other way round? ,[object Object]
Thought-provoking stuff ,[object Object],[object Object],[object Object],[object Object]
But WHAT is changing then? ,[object Object],[object Object],[object Object],[object Object],[object Object]
... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Three important factors (Benkler) ,[object Object],[object Object],[object Object],[object Object]
The Linus' Law ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common wisdom ,[object Object],[object Object],[object Object]
“ One ring to rule them all...” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Potential dangers today ,[object Object],[object Object],[object Object],[object Object],[object Object]
The lesson from the Amish ,[object Object],[object Object]
Some more Himanen ,[object Object]
Final words ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Some more online reading materials ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thanks! :-) These slides will be available under the Creative Commons BY-SA license at SlideShare (http://www.slideshare.net/UncleOwl)

More Related Content

What's hot

Brokerage 2007 keynote norman lewis
Brokerage 2007 keynote norman lewisBrokerage 2007 keynote norman lewis
Brokerage 2007 keynote norman lewisimec.archive
 
Information is correct, knowledge is relevant
Information is correct, knowledge is relevantInformation is correct, knowledge is relevant
Information is correct, knowledge is relevantMathias Klang
 
Artificial intelligence and the Singularity - History, Trends and Reality Check
Artificial intelligence and the Singularity - History, Trends and Reality CheckArtificial intelligence and the Singularity - History, Trends and Reality Check
Artificial intelligence and the Singularity - History, Trends and Reality Checkpiero scaruffi
 
The History of Silicon Valley
The History of Silicon ValleyThe History of Silicon Valley
The History of Silicon Valleyjdoe55
 
Applied Anthropology In Business
Applied Anthropology In BusinessApplied Anthropology In Business
Applied Anthropology In BusinessJohn McEntyre
 
FCC Open Internet Comment
FCC Open Internet CommentFCC Open Internet Comment
FCC Open Internet CommentTRAIL
 
Intellectual Property + Social Media: Internet & the IP law lag
Intellectual Property + Social Media: Internet & the IP law lagIntellectual Property + Social Media: Internet & the IP law lag
Intellectual Property + Social Media: Internet & the IP law lagMaximillian Kaizen
 
Open source: can you ignore it?
Open source: can you ignore it?Open source: can you ignore it?
Open source: can you ignore it?CS, NcState
 
Demystifying Machine Intelligence
Demystifying Machine IntelligenceDemystifying Machine Intelligence
Demystifying Machine Intelligencepiero scaruffi
 
Essay 3 annotated bibliography final copy 18 july 2012
Essay 3 annotated bibliography  final copy 18 july 2012Essay 3 annotated bibliography  final copy 18 july 2012
Essay 3 annotated bibliography final copy 18 july 2012rclambert
 
Darren Ross The Modernizing of Technology 1980s Presentation HIST 102.
Darren Ross The Modernizing of Technology 1980s Presentation HIST 102. Darren Ross The Modernizing of Technology 1980s Presentation HIST 102.
Darren Ross The Modernizing of Technology 1980s Presentation HIST 102. DarrenRoss21
 
Innovation and the Future of Music
Innovation and the Future of MusicInnovation and the Future of Music
Innovation and the Future of MusicPaul Papadimitriou
 

What's hot (18)

Brokerage 2007 keynote norman lewis
Brokerage 2007 keynote norman lewisBrokerage 2007 keynote norman lewis
Brokerage 2007 keynote norman lewis
 
140characters
140characters140characters
140characters
 
Information is correct, knowledge is relevant
Information is correct, knowledge is relevantInformation is correct, knowledge is relevant
Information is correct, knowledge is relevant
 
Artificial intelligence and the Singularity - History, Trends and Reality Check
Artificial intelligence and the Singularity - History, Trends and Reality CheckArtificial intelligence and the Singularity - History, Trends and Reality Check
Artificial intelligence and the Singularity - History, Trends and Reality Check
 
The History of Silicon Valley
The History of Silicon ValleyThe History of Silicon Valley
The History of Silicon Valley
 
Applied Anthropology In Business
Applied Anthropology In BusinessApplied Anthropology In Business
Applied Anthropology In Business
 
FCC Open Internet Comment
FCC Open Internet CommentFCC Open Internet Comment
FCC Open Internet Comment
 
Intellectual Property + Social Media: Internet & the IP law lag
Intellectual Property + Social Media: Internet & the IP law lagIntellectual Property + Social Media: Internet & the IP law lag
Intellectual Property + Social Media: Internet & the IP law lag
 
Open source: can you ignore it?
Open source: can you ignore it?Open source: can you ignore it?
Open source: can you ignore it?
 
L05 Innovation
L05 InnovationL05 Innovation
L05 Innovation
 
L06 Diffusion of Innovation
L06 Diffusion of InnovationL06 Diffusion of Innovation
L06 Diffusion of Innovation
 
Demystifying Machine Intelligence
Demystifying Machine IntelligenceDemystifying Machine Intelligence
Demystifying Machine Intelligence
 
INNOVATION = ∆
INNOVATION = ∆INNOVATION = ∆
INNOVATION = ∆
 
Essay 3 annotated bibliography final copy 18 july 2012
Essay 3 annotated bibliography  final copy 18 july 2012Essay 3 annotated bibliography  final copy 18 july 2012
Essay 3 annotated bibliography final copy 18 july 2012
 
Darren Ross The Modernizing of Technology 1980s Presentation HIST 102.
Darren Ross The Modernizing of Technology 1980s Presentation HIST 102. Darren Ross The Modernizing of Technology 1980s Presentation HIST 102.
Darren Ross The Modernizing of Technology 1980s Presentation HIST 102.
 
Innovation and the Future of Music
Innovation and the Future of MusicInnovation and the Future of Music
Innovation and the Future of Music
 
Vision And Five Regions
Vision And Five RegionsVision And Five Regions
Vision And Five Regions
 
NAHSL 2010
NAHSL 2010NAHSL 2010
NAHSL 2010
 

Viewers also liked

Attitude
AttitudeAttitude
AttitudeVishal
 
Jonas Gyalokay, Airtame @ Nordic growth Hackers event #3
Jonas Gyalokay, Airtame @ Nordic growth Hackers event #3Jonas Gyalokay, Airtame @ Nordic growth Hackers event #3
Jonas Gyalokay, Airtame @ Nordic growth Hackers event #3Nordic Growth Hackers
 
Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Lumension
 
Adventures in paranoia with sinatra and sequel
Adventures in paranoia with sinatra and sequelAdventures in paranoia with sinatra and sequel
Adventures in paranoia with sinatra and sequelEleanor McHugh
 
Paranoia
ParanoiaParanoia
ParanoiaJames
 
Pledge, Turn, Prestige - The Snowden Pitch
Pledge, Turn, Prestige - The Snowden PitchPledge, Turn, Prestige - The Snowden Pitch
Pledge, Turn, Prestige - The Snowden PitchMarcus John Henry Brown
 
Hacks, hackers and data journalism
Hacks, hackers and data journalismHacks, hackers and data journalism
Hacks, hackers and data journalismGlen McGregor
 
How to Identify Managers Paranoia
How to Identify Managers ParanoiaHow to Identify Managers Paranoia
How to Identify Managers ParanoiaTrailukya Dutta
 
Paranoia or risk management 2013
Paranoia or risk management 2013Paranoia or risk management 2013
Paranoia or risk management 2013Henrik Kramshøj
 
HIMSS Summit of the Southeast: Compliance and Controls
HIMSS Summit of the Southeast: Compliance and ControlsHIMSS Summit of the Southeast: Compliance and Controls
HIMSS Summit of the Southeast: Compliance and ControlsTony Gambacorta
 
RSA USA 2015 - Getting a Jump on Hackers
RSA USA 2015 - Getting a Jump on HackersRSA USA 2015 - Getting a Jump on Hackers
RSA USA 2015 - Getting a Jump on HackersWolfgang Kandek
 
On Going Evaluations
On Going EvaluationsOn Going Evaluations
On Going EvaluationsTheJellehKed
 
Pants policies and paranoia
Pants policies and paranoiaPants policies and paranoia
Pants policies and paranoiaPracticalHT
 
Healthy Paranoia: What Keeps Me Up at Night
Healthy Paranoia: What Keeps Me Up at NightHealthy Paranoia: What Keeps Me Up at Night
Healthy Paranoia: What Keeps Me Up at NightMatt Wurst
 
romantic paranoia
romantic paranoiaromantic paranoia
romantic paranoia_numbers
 
How to Protect Your Oracle Database from Hackers
How to Protect Your Oracle Database from HackersHow to Protect Your Oracle Database from Hackers
How to Protect Your Oracle Database from HackersJeff Kayser
 

Viewers also liked (20)

Attitude
AttitudeAttitude
Attitude
 
Jonas Gyalokay, Airtame @ Nordic growth Hackers event #3
Jonas Gyalokay, Airtame @ Nordic growth Hackers event #3Jonas Gyalokay, Airtame @ Nordic growth Hackers event #3
Jonas Gyalokay, Airtame @ Nordic growth Hackers event #3
 
Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009
 
Adventures in paranoia with sinatra and sequel
Adventures in paranoia with sinatra and sequelAdventures in paranoia with sinatra and sequel
Adventures in paranoia with sinatra and sequel
 
Paranoia
ParanoiaParanoia
Paranoia
 
Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)Hackers & Crackers (+ Software Freedom)
Hackers & Crackers (+ Software Freedom)
 
Pledge, Turn, Prestige - The Snowden Pitch
Pledge, Turn, Prestige - The Snowden PitchPledge, Turn, Prestige - The Snowden Pitch
Pledge, Turn, Prestige - The Snowden Pitch
 
Hacks, hackers and data journalism
Hacks, hackers and data journalismHacks, hackers and data journalism
Hacks, hackers and data journalism
 
How to Identify Managers Paranoia
How to Identify Managers ParanoiaHow to Identify Managers Paranoia
How to Identify Managers Paranoia
 
Media 2
Media 2Media 2
Media 2
 
Paranoia or risk management 2013
Paranoia or risk management 2013Paranoia or risk management 2013
Paranoia or risk management 2013
 
HIMSS Summit of the Southeast: Compliance and Controls
HIMSS Summit of the Southeast: Compliance and ControlsHIMSS Summit of the Southeast: Compliance and Controls
HIMSS Summit of the Southeast: Compliance and Controls
 
RSA USA 2015 - Getting a Jump on Hackers
RSA USA 2015 - Getting a Jump on HackersRSA USA 2015 - Getting a Jump on Hackers
RSA USA 2015 - Getting a Jump on Hackers
 
On Going Evaluations
On Going EvaluationsOn Going Evaluations
On Going Evaluations
 
'Paranoia’
'Paranoia’'Paranoia’
'Paranoia’
 
Pants policies and paranoia
Pants policies and paranoiaPants policies and paranoia
Pants policies and paranoia
 
Healthy Paranoia: What Keeps Me Up at Night
Healthy Paranoia: What Keeps Me Up at NightHealthy Paranoia: What Keeps Me Up at Night
Healthy Paranoia: What Keeps Me Up at Night
 
Paranoia
ParanoiaParanoia
Paranoia
 
romantic paranoia
romantic paranoiaromantic paranoia
romantic paranoia
 
How to Protect Your Oracle Database from Hackers
How to Protect Your Oracle Database from HackersHow to Protect Your Oracle Database from Hackers
How to Protect Your Oracle Database from Hackers
 

Similar to Of Hobbits, Amish, Hackers and Technology (or, is technology for humans or vice versa?)

Of Hobbits, Amish, Hackers and Technology 2014
Of Hobbits,  Amish, Hackers and Technology 2014Of Hobbits,  Amish, Hackers and Technology 2014
Of Hobbits, Amish, Hackers and Technology 2014Kaido Kikkas
 
Necessary freedoms for information society
Necessary freedoms for information societyNecessary freedoms for information society
Necessary freedoms for information societyKaido Kikkas
 
Creative Commons: Technology, Norms & Creation
 Creative Commons: Technology, Norms & Creation Creative Commons: Technology, Norms & Creation
Creative Commons: Technology, Norms & CreationMathias Klang
 
Living is sharing: Creative Commons
 Living is sharing: Creative Commons Living is sharing: Creative Commons
Living is sharing: Creative CommonsMathias Klang
 
Information is correct, knowledge is relevant
Information is correct, knowledge is relevantInformation is correct, knowledge is relevant
Information is correct, knowledge is relevantMathias Klang
 
Slaughtering Sacred Cows
Slaughtering Sacred CowsSlaughtering Sacred Cows
Slaughtering Sacred CowsTony Smith
 
What do PIPA and SOPA constitute for personal freedom?
What do PIPA and SOPA constitute for personal freedom?What do PIPA and SOPA constitute for personal freedom?
What do PIPA and SOPA constitute for personal freedom?DriveCollectiveMedia
 
Engineering Social Justice Presentation
Engineering Social Justice PresentationEngineering Social Justice Presentation
Engineering Social Justice PresentationNasser Saleh PhD P.Eng
 
Glyn Moody - from openness to abundance
Glyn Moody - from openness to abundanceGlyn Moody - from openness to abundance
Glyn Moody - from openness to abundanceglynmoody
 
The Future World - Sasha Kazantseva
The Future World - Sasha KazantsevaThe Future World - Sasha Kazantseva
The Future World - Sasha KazantsevaSasha Kazantseva
 
Regulating the Network
Regulating the NetworkRegulating the Network
Regulating the NetworkMathias Klang
 
Empowerment or Destruction: copyright & creative commons
Empowerment or Destruction: copyright & creative commonsEmpowerment or Destruction: copyright & creative commons
Empowerment or Destruction: copyright & creative commonsMathias Klang
 
Information is correct, knowledge is relevant
Information is correct, knowledge is relevantInformation is correct, knowledge is relevant
Information is correct, knowledge is relevantMathias Klang
 
Lim JUS394 Utopian Dystopian
Lim  JUS394 Utopian DystopianLim  JUS394 Utopian Dystopian
Lim JUS394 Utopian Dystopianmerlyna
 
International Journal of Communication 6 (2012), 2870–2893 193
International Journal of Communication 6 (2012), 2870–2893 193International Journal of Communication 6 (2012), 2870–2893 193
International Journal of Communication 6 (2012), 2870–2893 193TatianaMajor22
 
The public domain book it
The public domain book itThe public domain book it
The public domain book itchubbyat
 
May you live in interesting times
May you live in interesting timesMay you live in interesting times
May you live in interesting timesJyrki Kasvi
 
Regulatory Theory in Social Media Society
Regulatory Theory in Social Media SocietyRegulatory Theory in Social Media Society
Regulatory Theory in Social Media SocietyMathias Klang
 

Similar to Of Hobbits, Amish, Hackers and Technology (or, is technology for humans or vice versa?) (20)

Of Hobbits, Amish, Hackers and Technology 2014
Of Hobbits,  Amish, Hackers and Technology 2014Of Hobbits,  Amish, Hackers and Technology 2014
Of Hobbits, Amish, Hackers and Technology 2014
 
Necessary freedoms for information society
Necessary freedoms for information societyNecessary freedoms for information society
Necessary freedoms for information society
 
Creative Commons: Technology, Norms & Creation
 Creative Commons: Technology, Norms & Creation Creative Commons: Technology, Norms & Creation
Creative Commons: Technology, Norms & Creation
 
Living is sharing: Creative Commons
 Living is sharing: Creative Commons Living is sharing: Creative Commons
Living is sharing: Creative Commons
 
Information is correct, knowledge is relevant
Information is correct, knowledge is relevantInformation is correct, knowledge is relevant
Information is correct, knowledge is relevant
 
Slaughtering Sacred Cows
Slaughtering Sacred CowsSlaughtering Sacred Cows
Slaughtering Sacred Cows
 
What do PIPA and SOPA constitute for personal freedom?
What do PIPA and SOPA constitute for personal freedom?What do PIPA and SOPA constitute for personal freedom?
What do PIPA and SOPA constitute for personal freedom?
 
Engineering Social Justice Presentation
Engineering Social Justice PresentationEngineering Social Justice Presentation
Engineering Social Justice Presentation
 
A Genealogy of New Media
A Genealogy of New MediaA Genealogy of New Media
A Genealogy of New Media
 
Glyn Moody - from openness to abundance
Glyn Moody - from openness to abundanceGlyn Moody - from openness to abundance
Glyn Moody - from openness to abundance
 
The Future World - Sasha Kazantseva
The Future World - Sasha KazantsevaThe Future World - Sasha Kazantseva
The Future World - Sasha Kazantseva
 
Regulating the Network
Regulating the NetworkRegulating the Network
Regulating the Network
 
Empowerment or Destruction: copyright & creative commons
Empowerment or Destruction: copyright & creative commonsEmpowerment or Destruction: copyright & creative commons
Empowerment or Destruction: copyright & creative commons
 
Information is correct, knowledge is relevant
Information is correct, knowledge is relevantInformation is correct, knowledge is relevant
Information is correct, knowledge is relevant
 
Lim JUS394 Utopian Dystopian
Lim  JUS394 Utopian DystopianLim  JUS394 Utopian Dystopian
Lim JUS394 Utopian Dystopian
 
International Journal of Communication 6 (2012), 2870–2893 193
International Journal of Communication 6 (2012), 2870–2893 193International Journal of Communication 6 (2012), 2870–2893 193
International Journal of Communication 6 (2012), 2870–2893 193
 
The public domain book it
The public domain book itThe public domain book it
The public domain book it
 
May you live in interesting times
May you live in interesting timesMay you live in interesting times
May you live in interesting times
 
Technology ethics
Technology ethics Technology ethics
Technology ethics
 
Regulatory Theory in Social Media Society
Regulatory Theory in Social Media SocietyRegulatory Theory in Social Media Society
Regulatory Theory in Social Media Society
 

More from Kaido Kikkas

Alustav ettevõtja ja tarkvaralitsentsid 190522.pdf
Alustav ettevõtja ja tarkvaralitsentsid 190522.pdfAlustav ettevõtja ja tarkvaralitsentsid 190522.pdf
Alustav ettevõtja ja tarkvaralitsentsid 190522.pdfKaido Kikkas
 
Avatud e-kursuse kogemusi COVID-19 ajastul
Avatud e-kursuse kogemusi COVID-19 ajastulAvatud e-kursuse kogemusi COVID-19 ajastul
Avatud e-kursuse kogemusi COVID-19 ajastulKaido Kikkas
 
"Loll saab Internetis kah peksa"
"Loll saab Internetis kah peksa""Loll saab Internetis kah peksa"
"Loll saab Internetis kah peksa"Kaido Kikkas
 
Tants intellektuaalomandi ümber
Tants intellektuaalomandi ümberTants intellektuaalomandi ümber
Tants intellektuaalomandi ümberKaido Kikkas
 
Digital Survival Skills: A Course for TalTech Employees
Digital Survival Skills: A Course for TalTech EmployeesDigital Survival Skills: A Course for TalTech Employees
Digital Survival Skills: A Course for TalTech EmployeesKaido Kikkas
 
A Different Kind of E-Learning
A Different Kind of E-LearningA Different Kind of E-Learning
A Different Kind of E-LearningKaido Kikkas
 
Itti püsti & pikali
Itti püsti & pikaliItti püsti & pikali
Itti püsti & pikaliKaido Kikkas
 
One Flew Over the Hackers' Nest...
One Flew Over the Hackers' Nest...One Flew Over the Hackers' Nest...
One Flew Over the Hackers' Nest...Kaido Kikkas
 
Garage48 accessibility talk 261114
Garage48 accessibility talk 261114Garage48 accessibility talk 261114
Garage48 accessibility talk 261114Kaido Kikkas
 
Vaba ja tasuta...?
Vaba ja tasuta...?Vaba ja tasuta...?
Vaba ja tasuta...?Kaido Kikkas
 
"If I Don't Like Your Online Profile, I Will Not Hire You!"
"If I Don't Like Your Online Profile, I Will Not Hire You!""If I Don't Like Your Online Profile, I Will Not Hire You!"
"If I Don't Like Your Online Profile, I Will Not Hire You!"Kaido Kikkas
 
EeNET: development and lessons
EeNET: development and lessonsEeNET: development and lessons
EeNET: development and lessonsKaido Kikkas
 
Turvalise Interneti päev 11. veebruaril 2014
Turvalise Interneti päev  11. veebruaril 2014Turvalise Interneti päev  11. veebruaril 2014
Turvalise Interneti päev 11. veebruaril 2014Kaido Kikkas
 
„The four most-used passwords are love, sex, secret, and God“: password secur...
„The four most-used passwords are love, sex, secret, and God“: password secur...„The four most-used passwords are love, sex, secret, and God“: password secur...
„The four most-used passwords are love, sex, secret, and God“: password secur...Kaido Kikkas
 
Hüüru Teabetoa arvutikoolitus 16.02.13
Hüüru Teabetoa arvutikoolitus 16.02.13Hüüru Teabetoa arvutikoolitus 16.02.13
Hüüru Teabetoa arvutikoolitus 16.02.13Kaido Kikkas
 
Code of Ethics in E-learning
Code of Ethics in E-learningCode of Ethics in E-learning
Code of Ethics in E-learningKaido Kikkas
 
Võrgustikuseminar 260412 wikiversity
Võrgustikuseminar 260412 wikiversityVõrgustikuseminar 260412 wikiversity
Võrgustikuseminar 260412 wikiversityKaido Kikkas
 
Teeme ise muinasjuttu - Wesnothi õpituba
Teeme ise muinasjuttu - Wesnothi õpitubaTeeme ise muinasjuttu - Wesnothi õpituba
Teeme ise muinasjuttu - Wesnothi õpitubaKaido Kikkas
 
Open Courses: The Next Big Thing in E-Learning?
Open Courses: The Next Big Thing in E-Learning?Open Courses: The Next Big Thing in E-Learning?
Open Courses: The Next Big Thing in E-Learning?Kaido Kikkas
 
IT Kolledži uudishimupäev 2011
IT Kolledži uudishimupäev 2011IT Kolledži uudishimupäev 2011
IT Kolledži uudishimupäev 2011Kaido Kikkas
 

More from Kaido Kikkas (20)

Alustav ettevõtja ja tarkvaralitsentsid 190522.pdf
Alustav ettevõtja ja tarkvaralitsentsid 190522.pdfAlustav ettevõtja ja tarkvaralitsentsid 190522.pdf
Alustav ettevõtja ja tarkvaralitsentsid 190522.pdf
 
Avatud e-kursuse kogemusi COVID-19 ajastul
Avatud e-kursuse kogemusi COVID-19 ajastulAvatud e-kursuse kogemusi COVID-19 ajastul
Avatud e-kursuse kogemusi COVID-19 ajastul
 
"Loll saab Internetis kah peksa"
"Loll saab Internetis kah peksa""Loll saab Internetis kah peksa"
"Loll saab Internetis kah peksa"
 
Tants intellektuaalomandi ümber
Tants intellektuaalomandi ümberTants intellektuaalomandi ümber
Tants intellektuaalomandi ümber
 
Digital Survival Skills: A Course for TalTech Employees
Digital Survival Skills: A Course for TalTech EmployeesDigital Survival Skills: A Course for TalTech Employees
Digital Survival Skills: A Course for TalTech Employees
 
A Different Kind of E-Learning
A Different Kind of E-LearningA Different Kind of E-Learning
A Different Kind of E-Learning
 
Itti püsti & pikali
Itti püsti & pikaliItti püsti & pikali
Itti püsti & pikali
 
One Flew Over the Hackers' Nest...
One Flew Over the Hackers' Nest...One Flew Over the Hackers' Nest...
One Flew Over the Hackers' Nest...
 
Garage48 accessibility talk 261114
Garage48 accessibility talk 261114Garage48 accessibility talk 261114
Garage48 accessibility talk 261114
 
Vaba ja tasuta...?
Vaba ja tasuta...?Vaba ja tasuta...?
Vaba ja tasuta...?
 
"If I Don't Like Your Online Profile, I Will Not Hire You!"
"If I Don't Like Your Online Profile, I Will Not Hire You!""If I Don't Like Your Online Profile, I Will Not Hire You!"
"If I Don't Like Your Online Profile, I Will Not Hire You!"
 
EeNET: development and lessons
EeNET: development and lessonsEeNET: development and lessons
EeNET: development and lessons
 
Turvalise Interneti päev 11. veebruaril 2014
Turvalise Interneti päev  11. veebruaril 2014Turvalise Interneti päev  11. veebruaril 2014
Turvalise Interneti päev 11. veebruaril 2014
 
„The four most-used passwords are love, sex, secret, and God“: password secur...
„The four most-used passwords are love, sex, secret, and God“: password secur...„The four most-used passwords are love, sex, secret, and God“: password secur...
„The four most-used passwords are love, sex, secret, and God“: password secur...
 
Hüüru Teabetoa arvutikoolitus 16.02.13
Hüüru Teabetoa arvutikoolitus 16.02.13Hüüru Teabetoa arvutikoolitus 16.02.13
Hüüru Teabetoa arvutikoolitus 16.02.13
 
Code of Ethics in E-learning
Code of Ethics in E-learningCode of Ethics in E-learning
Code of Ethics in E-learning
 
Võrgustikuseminar 260412 wikiversity
Võrgustikuseminar 260412 wikiversityVõrgustikuseminar 260412 wikiversity
Võrgustikuseminar 260412 wikiversity
 
Teeme ise muinasjuttu - Wesnothi õpituba
Teeme ise muinasjuttu - Wesnothi õpitubaTeeme ise muinasjuttu - Wesnothi õpituba
Teeme ise muinasjuttu - Wesnothi õpituba
 
Open Courses: The Next Big Thing in E-Learning?
Open Courses: The Next Big Thing in E-Learning?Open Courses: The Next Big Thing in E-Learning?
Open Courses: The Next Big Thing in E-Learning?
 
IT Kolledži uudishimupäev 2011
IT Kolledži uudishimupäev 2011IT Kolledži uudishimupäev 2011
IT Kolledži uudishimupäev 2011
 

Recently uploaded

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Of Hobbits, Amish, Hackers and Technology (or, is technology for humans or vice versa?)

  • 1. Of Hobbits, Amish, Hackers and Technology (or, is technology for humans or vice versa?) Kaido Kikkas Associate professor of social and free software Department of Informatics, Tallinn University kakk@kakupesa.net http://www.kakupesa.net University of Joensuu, 23.04.07
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Thanks! :-) These slides will be available under the Creative Commons BY-SA license at SlideShare (http://www.slideshare.net/UncleOwl)