SlideShare a Scribd company logo
The	
  Cathedral	
  	
  
&	
  The	
  Bazaar	
  
The	
  hacker	
  ethic	
  
is	
  a	
  
"new	
  way	
  of	
  life,	
  with	
  
a	
  philosophy,	
  
an	
  ethic	
  and	
  a	
  dream”	
  
	
  
©	
  Steven	
  Levy	
  
Knowledge	
  should	
  be	
  shared	
  
with	
  other	
  people	
  
who	
  can	
  benefit	
  from	
  it.	
  
	
  
©	
  Richard	
  Stallman	
  
Important	
  resources	
  should	
  be	
  
u?lized	
  rather	
  than	
  wasted.	
  
	
  
©	
  Richard	
  Stallman	
  
Hacking	
  and	
  ethics	
  are	
  separate	
  
 	
  
	
  
hacker	
  	
  	
  	
  	
  ???	
  
	
  	
  	
  	
  	
  	
  	
  
IETF	
  RFC	
  1983:	
  
	
  
hacker	
  
	
  	
  	
  	
  	
  	
  A	
  person	
  who	
  	
  	
  	
  	
  	
  
delights	
  in	
  having	
  an	
  inJmate	
  
understanding	
  of	
  the	
  internal	
  
workings	
  of	
  a	
  system.	
  
According	
  to	
  the	
  "hacker	
  ethic,"	
  a	
  hack	
  must:	
  
•  be	
  safe	
  
•  not	
  damage	
  anything	
  
•  not	
  damage	
  anyone,	
  
either	
  physically,	
  mentally	
  or	
  emoJonally	
  
•  be	
  funny,	
  
at	
  least	
  to	
  most	
  of	
  the	
  people	
  who	
  experience	
  it	
  
Principles	
  by	
  Steven	
  Levy	
  
• Hands-­‐On	
  ImperaJve	
  
• Sharing	
  
• Openness	
  
• DecentralizaJon	
  
• World	
  Improvement	
  
A	
  Cathedral	
  	
  
or	
  A	
  Bazaar?	
  
Linus’s	
  law:	
  
"given	
  enough	
  
eyeballs,	
  all	
  bugs	
  
are	
  shallow"	
  
Release	
  early.	
  
Release	
  oUen.	
  	
  
	
  
And	
  listen	
  to	
  your	
  
customers.	
  
	
  
©	
  Eric	
  Raymond	
  
Plan	
  to	
  throw	
  
one	
  [version]	
  away;	
  
you	
  will,	
  anyhow.	
  
	
  
©	
  Frederick	
  Brooks,	
  	
  
The	
  Mythical	
  Man	
  Month	
  
Good	
  programmers	
  
know	
  what	
  to	
  write.	
  
	
  
Great	
  ones	
  
know	
  what	
  to	
  rewrite	
  
(and	
  reuse).	
  
	
  
©	
  Eric	
  Raymond	
  
When	
  you	
  lose	
  
interest	
  in	
  a	
  program,	
  
your	
  last	
  duty	
  to	
  it	
  
is	
  to	
  hand	
  it	
  off	
  to	
  a	
  
competent	
  successor.	
  
	
  
©	
  Eric	
  Raymond	
  
99designs.com	
  	
  -­‐	
  Crowdsourced	
  design	
  
People’s	
  power	
  
People’s	
  power	
  
The cathedral and the bazaar for Strelka students
The cathedral and the bazaar for Strelka students
The cathedral and the bazaar for Strelka students
The cathedral and the bazaar for Strelka students
The cathedral and the bazaar for Strelka students
The cathedral and the bazaar for Strelka students
The cathedral and the bazaar for Strelka students
The cathedral and the bazaar for Strelka students

More Related Content

Similar to The cathedral and the bazaar for Strelka students

What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
Sibghatullah Khattak
 
Philosophy and Social Media 2: The Origins of Social Media
Philosophy and Social Media 2: The Origins of Social MediaPhilosophy and Social Media 2: The Origins of Social Media
Philosophy and Social Media 2: The Origins of Social MediaTimothy Rayner
 
Lecture 2011.01: General Introduction and Open Access (Digital Sustainability)
Lecture 2011.01: General Introduction and Open Access (Digital Sustainability)Lecture 2011.01: General Introduction and Open Access (Digital Sustainability)
Lecture 2011.01: General Introduction and Open Access (Digital Sustainability)Marcus Dapp
 
Linkedin2012
Linkedin2012Linkedin2012
Linkedin2012
Chris Ngo
 
Philippe Beaudette - How To Motivate Legions of Volunteers
Philippe Beaudette - How To Motivate Legions of VolunteersPhilippe Beaudette - How To Motivate Legions of Volunteers
Philippe Beaudette - How To Motivate Legions of Volunteers
FeverBee Limited
 
ARTIFICIAL INTELLIGENCE(AI)
ARTIFICIAL INTELLIGENCE(AI)ARTIFICIAL INTELLIGENCE(AI)
ARTIFICIAL INTELLIGENCE(AI)Niyati Mehta
 
Big Data - Little Data
Big Data - Little DataBig Data - Little Data
Big Data - Little Data
IntoTheMinds
 
Rethinking OSS In An Era of Cloud and ML
Rethinking OSS In An Era of Cloud and MLRethinking OSS In An Era of Cloud and ML
Rethinking OSS In An Era of Cloud and ML
Peter Wang
 
Hacking Social Media: The Case of Tweeting Bra
Hacking Social Media: The Case of Tweeting BraHacking Social Media: The Case of Tweeting Bra
Hacking Social Media: The Case of Tweeting Bra
Dimitris Savvakos
 
Social Engineering 101: Don't Get Manipulated by Attackers
Social Engineering 101: Don't Get Manipulated by AttackersSocial Engineering 101: Don't Get Manipulated by Attackers
Social Engineering 101: Don't Get Manipulated by Attackers
NetSquared
 
Lag etik & Informationssystem
Lag etik  & InformationssystemLag etik  & Informationssystem
Lag etik & InformationssystemMathias Klang
 
A cat will teach her young ones all the tricks, except how to jump backwards.
A cat will teach her young ones all the tricks, except how to jump backwards.A cat will teach her young ones all the tricks, except how to jump backwards.
A cat will teach her young ones all the tricks, except how to jump backwards.Rhea Myers
 
Lecture 2011.02: Key Terms and Concepts (Digital Sustainability)
Lecture 2011.02: Key Terms and Concepts (Digital Sustainability)Lecture 2011.02: Key Terms and Concepts (Digital Sustainability)
Lecture 2011.02: Key Terms and Concepts (Digital Sustainability)Marcus Dapp
 
Present to-nmmu-propella
Present to-nmmu-propellaPresent to-nmmu-propella
Present to-nmmu-propella
Exo Futures
 
Internet And Self-organizing1
Internet And Self-organizing1Internet And Self-organizing1
Internet And Self-organizing1
Artur Serra
 
The Guardian Avatar
The Guardian AvatarThe Guardian Avatar
The Guardian Avatar
Martin Geddes
 
hacking
hackinghacking
hacking
mayank1293
 
Ten Disruptions and Why They Are Important
Ten Disruptions and Why They Are ImportantTen Disruptions and Why They Are Important
Ten Disruptions and Why They Are ImportantUpstarts.tv
 
NetSquared Introduction Slides for NetSquared Amsterdam Launch Meeting
NetSquared Introduction Slides for NetSquared Amsterdam Launch MeetingNetSquared Introduction Slides for NetSquared Amsterdam Launch Meeting
NetSquared Introduction Slides for NetSquared Amsterdam Launch Meeting
NetSquared
 
Tale of the Knowledge Organization In an Age of Wicked Problems
Tale of the Knowledge Organization In an Age of Wicked ProblemsTale of the Knowledge Organization In an Age of Wicked Problems
Tale of the Knowledge Organization In an Age of Wicked Problems
GomindSHIFT
 

Similar to The cathedral and the bazaar for Strelka students (20)

What is Ethical hacking
What is Ethical hackingWhat is Ethical hacking
What is Ethical hacking
 
Philosophy and Social Media 2: The Origins of Social Media
Philosophy and Social Media 2: The Origins of Social MediaPhilosophy and Social Media 2: The Origins of Social Media
Philosophy and Social Media 2: The Origins of Social Media
 
Lecture 2011.01: General Introduction and Open Access (Digital Sustainability)
Lecture 2011.01: General Introduction and Open Access (Digital Sustainability)Lecture 2011.01: General Introduction and Open Access (Digital Sustainability)
Lecture 2011.01: General Introduction and Open Access (Digital Sustainability)
 
Linkedin2012
Linkedin2012Linkedin2012
Linkedin2012
 
Philippe Beaudette - How To Motivate Legions of Volunteers
Philippe Beaudette - How To Motivate Legions of VolunteersPhilippe Beaudette - How To Motivate Legions of Volunteers
Philippe Beaudette - How To Motivate Legions of Volunteers
 
ARTIFICIAL INTELLIGENCE(AI)
ARTIFICIAL INTELLIGENCE(AI)ARTIFICIAL INTELLIGENCE(AI)
ARTIFICIAL INTELLIGENCE(AI)
 
Big Data - Little Data
Big Data - Little DataBig Data - Little Data
Big Data - Little Data
 
Rethinking OSS In An Era of Cloud and ML
Rethinking OSS In An Era of Cloud and MLRethinking OSS In An Era of Cloud and ML
Rethinking OSS In An Era of Cloud and ML
 
Hacking Social Media: The Case of Tweeting Bra
Hacking Social Media: The Case of Tweeting BraHacking Social Media: The Case of Tweeting Bra
Hacking Social Media: The Case of Tweeting Bra
 
Social Engineering 101: Don't Get Manipulated by Attackers
Social Engineering 101: Don't Get Manipulated by AttackersSocial Engineering 101: Don't Get Manipulated by Attackers
Social Engineering 101: Don't Get Manipulated by Attackers
 
Lag etik & Informationssystem
Lag etik  & InformationssystemLag etik  & Informationssystem
Lag etik & Informationssystem
 
A cat will teach her young ones all the tricks, except how to jump backwards.
A cat will teach her young ones all the tricks, except how to jump backwards.A cat will teach her young ones all the tricks, except how to jump backwards.
A cat will teach her young ones all the tricks, except how to jump backwards.
 
Lecture 2011.02: Key Terms and Concepts (Digital Sustainability)
Lecture 2011.02: Key Terms and Concepts (Digital Sustainability)Lecture 2011.02: Key Terms and Concepts (Digital Sustainability)
Lecture 2011.02: Key Terms and Concepts (Digital Sustainability)
 
Present to-nmmu-propella
Present to-nmmu-propellaPresent to-nmmu-propella
Present to-nmmu-propella
 
Internet And Self-organizing1
Internet And Self-organizing1Internet And Self-organizing1
Internet And Self-organizing1
 
The Guardian Avatar
The Guardian AvatarThe Guardian Avatar
The Guardian Avatar
 
hacking
hackinghacking
hacking
 
Ten Disruptions and Why They Are Important
Ten Disruptions and Why They Are ImportantTen Disruptions and Why They Are Important
Ten Disruptions and Why They Are Important
 
NetSquared Introduction Slides for NetSquared Amsterdam Launch Meeting
NetSquared Introduction Slides for NetSquared Amsterdam Launch MeetingNetSquared Introduction Slides for NetSquared Amsterdam Launch Meeting
NetSquared Introduction Slides for NetSquared Amsterdam Launch Meeting
 
Tale of the Knowledge Organization In an Age of Wicked Problems
Tale of the Knowledge Organization In an Age of Wicked ProblemsTale of the Knowledge Organization In an Age of Wicked Problems
Tale of the Knowledge Organization In an Age of Wicked Problems
 

More from Alexander Chemeris

TADhack 2014 hack presentation - FairShare call limiter
TADhack 2014 hack presentation - FairShare call limiterTADhack 2014 hack presentation - FairShare call limiter
TADhack 2014 hack presentation - FairShare call limiter
Alexander Chemeris
 
Open-source SDR silicon - GNU Radio Conference 2013 presentation
Open-source SDR silicon - GNU Radio Conference 2013 presentationOpen-source SDR silicon - GNU Radio Conference 2013 presentation
Open-source SDR silicon - GNU Radio Conference 2013 presentationAlexander Chemeris
 
Fairwaves UmTRX - GNU Radio Conference 2013 presentation
Fairwaves UmTRX - GNU Radio Conference 2013 presentationFairwaves UmTRX - GNU Radio Conference 2013 presentation
Fairwaves UmTRX - GNU Radio Conference 2013 presentationAlexander Chemeris
 
29c3 OpenBTS workshop - Hardware and sotware
29c3 OpenBTS workshop - Hardware and sotware29c3 OpenBTS workshop - Hardware and sotware
29c3 OpenBTS workshop - Hardware and sotware
Alexander Chemeris
 
29c3 OpenBTS workshop - Mini-Workshop
29c3 OpenBTS workshop - Mini-Workshop29c3 OpenBTS workshop - Mini-Workshop
29c3 OpenBTS workshop - Mini-Workshop
Alexander Chemeris
 
Cеминар по OpenBTS №2 - Архитектура OpenBTS
Cеминар по OpenBTS №2 - Архитектура OpenBTSCеминар по OpenBTS №2 - Архитектура OpenBTS
Cеминар по OpenBTS №2 - Архитектура OpenBTSAlexander Chemeris
 
Cеминар по OpenBTS №1 - Введение в GSM
Cеминар по OpenBTS №1 - Введение в GSMCеминар по OpenBTS №1 - Введение в GSM
Cеминар по OpenBTS №1 - Введение в GSM
Alexander Chemeris
 
Fairwaves UmTRX - presentation at SDR'11 conference
Fairwaves UmTRX - presentation at SDR'11 conferenceFairwaves UmTRX - presentation at SDR'11 conference
Fairwaves UmTRX - presentation at SDR'11 conferenceAlexander Chemeris
 
Open source 4G radio
Open source 4G radioOpen source 4G radio
Open source 4G radio
Alexander Chemeris
 
10 elphel open hard_spb_mini-conf2010
10 elphel open hard_spb_mini-conf201010 elphel open hard_spb_mini-conf2010
10 elphel open hard_spb_mini-conf2010Alexander Chemeris
 
02.10 arduino-scratchduino
02.10 arduino-scratchduino02.10 arduino-scratchduino
02.10 arduino-scratchduino
Alexander Chemeris
 
06 как начать Open Source Hardware проект
06 как начать Open Source Hardware проект06 как начать Open Source Hardware проект
06 как начать Open Source Hardware проект
Alexander Chemeris
 
05 косенков.как заработать деньги на oshw
05 косенков.как заработать деньги на oshw05 косенков.как заработать деньги на oshw
05 косенков.как заработать деньги на oshw
Alexander Chemeris
 
04.02 Marsohod
04.02 Marsohod04.02 Marsohod
04.02 Marsohod
Alexander Chemeris
 
04.03 AFEB + Wireless OSEB
04.03 AFEB + Wireless OSEB04.03 AFEB + Wireless OSEB
04.03 AFEB + Wireless OSEB
Alexander Chemeris
 
04.01 gpfix GeoTracker
04.01 gpfix GeoTracker04.01 gpfix GeoTracker
04.01 gpfix GeoTracker
Alexander Chemeris
 
01 Что такое Open-Source Hardware
01 Что такое Open-Source Hardware01 Что такое Open-Source Hardware
01 Что такое Open-Source HardwareAlexander Chemeris
 
03 Village Telco ROSH 10.10
03 Village Telco ROSH 10.1003 Village Telco ROSH 10.10
03 Village Telco ROSH 10.10
Alexander Chemeris
 
02 История Open-Source Hardware - Олег Садов
02 История Open-Source Hardware - Олег Садов02 История Open-Source Hardware - Олег Садов
02 История Open-Source Hardware - Олег СадовAlexander Chemeris
 

More from Alexander Chemeris (20)

TADhack 2014 hack presentation - FairShare call limiter
TADhack 2014 hack presentation - FairShare call limiterTADhack 2014 hack presentation - FairShare call limiter
TADhack 2014 hack presentation - FairShare call limiter
 
Open-source SDR silicon - GNU Radio Conference 2013 presentation
Open-source SDR silicon - GNU Radio Conference 2013 presentationOpen-source SDR silicon - GNU Radio Conference 2013 presentation
Open-source SDR silicon - GNU Radio Conference 2013 presentation
 
Fairwaves UmTRX - GNU Radio Conference 2013 presentation
Fairwaves UmTRX - GNU Radio Conference 2013 presentationFairwaves UmTRX - GNU Radio Conference 2013 presentation
Fairwaves UmTRX - GNU Radio Conference 2013 presentation
 
29c3 OpenBTS workshop - Hardware and sotware
29c3 OpenBTS workshop - Hardware and sotware29c3 OpenBTS workshop - Hardware and sotware
29c3 OpenBTS workshop - Hardware and sotware
 
29c3 OpenBTS workshop - Mini-Workshop
29c3 OpenBTS workshop - Mini-Workshop29c3 OpenBTS workshop - Mini-Workshop
29c3 OpenBTS workshop - Mini-Workshop
 
Cеминар по OpenBTS №2 - Архитектура OpenBTS
Cеминар по OpenBTS №2 - Архитектура OpenBTSCеминар по OpenBTS №2 - Архитектура OpenBTS
Cеминар по OpenBTS №2 - Архитектура OpenBTS
 
Cеминар по OpenBTS №1 - Введение в GSM
Cеминар по OpenBTS №1 - Введение в GSMCеминар по OpenBTS №1 - Введение в GSM
Cеминар по OpenBTS №1 - Введение в GSM
 
Fairwaves UmTRX - presentation at SDR'11 conference
Fairwaves UmTRX - presentation at SDR'11 conferenceFairwaves UmTRX - presentation at SDR'11 conference
Fairwaves UmTRX - presentation at SDR'11 conference
 
Open source 4G radio
Open source 4G radioOpen source 4G radio
Open source 4G radio
 
10 elphel open hard_spb_mini-conf2010
10 elphel open hard_spb_mini-conf201010 elphel open hard_spb_mini-conf2010
10 elphel open hard_spb_mini-conf2010
 
02.10 arduino-scratchduino
02.10 arduino-scratchduino02.10 arduino-scratchduino
02.10 arduino-scratchduino
 
06 как начать Open Source Hardware проект
06 как начать Open Source Hardware проект06 как начать Open Source Hardware проект
06 как начать Open Source Hardware проект
 
05 косенков.как заработать деньги на oshw
05 косенков.как заработать деньги на oshw05 косенков.как заработать деньги на oshw
05 косенков.как заработать деньги на oshw
 
04.02 Marsohod
04.02 Marsohod04.02 Marsohod
04.02 Marsohod
 
04.04 fairwaves - clock tamer
04.04 fairwaves - clock tamer04.04 fairwaves - clock tamer
04.04 fairwaves - clock tamer
 
04.03 AFEB + Wireless OSEB
04.03 AFEB + Wireless OSEB04.03 AFEB + Wireless OSEB
04.03 AFEB + Wireless OSEB
 
04.01 gpfix GeoTracker
04.01 gpfix GeoTracker04.01 gpfix GeoTracker
04.01 gpfix GeoTracker
 
01 Что такое Open-Source Hardware
01 Что такое Open-Source Hardware01 Что такое Open-Source Hardware
01 Что такое Open-Source Hardware
 
03 Village Telco ROSH 10.10
03 Village Telco ROSH 10.1003 Village Telco ROSH 10.10
03 Village Telco ROSH 10.10
 
02 История Open-Source Hardware - Олег Садов
02 История Open-Source Hardware - Олег Садов02 История Open-Source Hardware - Олег Садов
02 История Open-Source Hardware - Олег Садов
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 

The cathedral and the bazaar for Strelka students

  • 1. The  Cathedral     &  The  Bazaar  
  • 2. The  hacker  ethic   is  a   "new  way  of  life,  with   a  philosophy,   an  ethic  and  a  dream”     ©  Steven  Levy  
  • 3. Knowledge  should  be  shared   with  other  people   who  can  benefit  from  it.     ©  Richard  Stallman  
  • 4. Important  resources  should  be   u?lized  rather  than  wasted.     ©  Richard  Stallman  
  • 5. Hacking  and  ethics  are  separate  
  • 6.       hacker          ???                
  • 7. IETF  RFC  1983:     hacker              A  person  who             delights  in  having  an  inJmate   understanding  of  the  internal   workings  of  a  system.  
  • 8. According  to  the  "hacker  ethic,"  a  hack  must:   •  be  safe   •  not  damage  anything   •  not  damage  anyone,   either  physically,  mentally  or  emoJonally   •  be  funny,   at  least  to  most  of  the  people  who  experience  it  
  • 9.
  • 10. Principles  by  Steven  Levy   • Hands-­‐On  ImperaJve   • Sharing   • Openness   • DecentralizaJon   • World  Improvement  
  • 11. A  Cathedral     or  A  Bazaar?  
  • 12. Linus’s  law:   "given  enough   eyeballs,  all  bugs   are  shallow"  
  • 13. Release  early.   Release  oUen.       And  listen  to  your   customers.     ©  Eric  Raymond  
  • 14. Plan  to  throw   one  [version]  away;   you  will,  anyhow.     ©  Frederick  Brooks,     The  Mythical  Man  Month  
  • 15.
  • 16. Good  programmers   know  what  to  write.     Great  ones   know  what  to  rewrite   (and  reuse).     ©  Eric  Raymond  
  • 17. When  you  lose   interest  in  a  program,   your  last  duty  to  it   is  to  hand  it  off  to  a   competent  successor.     ©  Eric  Raymond  
  • 18. 99designs.com    -­‐  Crowdsourced  design