Untitled - socium.ge
Untitled - socium.ge Untitled - socium.ge
The hacker ethic 423what distinguishes the informational economy from the industrial economy.Innovation was, of course, also one of the sources of growth in the industrialeconomy, but the primary means of growth was increasing the energy inputinto the process. A bigger output was the result of a bigger input in energy(time). In the informational economy, companies increasingly compete on thebasis of innovation, and more and more workers have moved from routineexecuting work, such as classic assembly-line work, to jobs that involve innovating(Castells, 2002).THE CULTURE OF THE INFORMATIONAL ECONOMYTogether, the above three developments (the change in company structure, thechange in labor market structure, and the change in the role of innovation forgrowth) constitute an economy that is very different from the industrial economy.The culture of this economy can be approached in an illuminating waythrough the work ethic of the builders of the technological foundation of theinformational economy. This group originally called themselves “hackers,”meaning by this, not computer criminals but, in the words of the hacker Jargonfile compiled on the Net, people who “program enthusiastically” and whobelieve that “information-sharing is a powerful positive good” (Raymond,2000b). This formed the “hacker ethic” (see also Levy, 1994).This creative impulse, combined with the idea of sharing information, wasbehind the creation of the Internet and the World Wide Web and the softwareused to run it, such as the Linux/Unix operating system (Abbate, 1999;Berners-Lee, 1999; Himanen, 2001). Eric Raymond, who has been one of themost visible participants in this hacker culture, has formulated its work ethicwell. In the following extract, Raymond speaks of the “Unix philosophy”because of context, but his description applies to the larger hacker culture. For“Unix philosophy,” read “hacker ethic”:To do the Unix philosophy right, you have to be loyal to excellence. You have tobelieve that software is a craft worth all the intelligence and passion you can muster. . . Software design and implementation should be a joyous art, and a kind of ahigh-level play. If this attitude seems preposterous or vaguely embarrassing to you,stop and think; ask yourself what you’ve forgotten. Why do you design softwareinstead of doing something else to make money or pass the time? You must havethought software was worthy of your passions once . . . To do the Unix philosophyright, you need to have (or recover) that attitude. You need to care. You need to play.You need to be willing to explore. (Raymond, 2000a)The same kind of philosophy is repeated in the descriptions of the founders ofkey IT companies, and their work culture. For example, Andy Bechtolsheim,
424 Pekka Himanenone of the founders of Sun Microsystems, describes the passion that drove thecompany: “We were twenty-something-year-olds running a company and wehad just met, but we certainly shared the passion” (Southwick, 1999; see alsoAlahuhta and Himanen, forthcoming).It is a creative passion that is referred to here. In their work, hackers realizetheir creativity and constantly develop themselves. Hackers play with newideas and are enthusiastic about this work. And this creativity takes placetogether with other hackers, either virtually or physically: hacker creativity isbased upon an open and shared development of ideas. It is about belonging toa group whose members have the same creative passion, give recognition toeach other’s contributions, and develop ideas further together.A significant additional feature of the hacker ethic is that the archetypalhacker works to the rhythm of his or her creativity. This is the image of thehacker sometimes programming into the small hours of the night and thenwaking up in the afternoon, or mixing work and leisure in their daily lives inother ways. They take advantage of the possibilities of IT to manage their timemore freely.Together, these features make up the two core elements of the hacker relationshipto work: (1) a networked creative passion; and (2) a flexible relationshipto time. What is important here is that, although information technologyhackers were the first to become self-conscious about this new work ethic,they realized that the work ethic is not limited to information technologyprofessionals. In fact, from the beginning, the hacker Jargon file said that ahacker can be “an expert or enthusiast of any kind.”It was in this general sense that I proposed in my book, The Hacker Ethicand the Spirit of the Information Age, the expression the “hacker ethic” todescribe the work culture of the informational economy, as a counterpart toWeber’s “Protestant ethic” in the industrial economy. I still prefer this expressionbecause it was the first “real-life” expression for the new general workethic. Nowadays, however, the “hacker ethic” has problematic connotationsthat are not meant here. First of all, to many people it immediately bringscomputer criminals to mind. Second, for other people it conjures up only themost idealist version of the work ethic, such as the ideology of the mostextreme forms of the open-source software movement (everything is “fun”and everything must be open).To avoid these misunderstandings, expressions such as the “culture of innovation,”the “innovation work ethic,” or the “creative work ethic” can be usedas alternatives for the “hacker ethic” (I would recommend using the “cultureof innovation” in most contexts). Outside academic circles and those of theinformation technology hackers themselves, these alternative expressionsbetter convey the idea of a more general new work ethic, which is not limitedto information technology jobs. They also link the new work culture explicitly
- Page 393 and 394: 372 Araba Sey and Manuel Castellspa
- Page 395 and 396: 374 Araba Sey and Manuel Castellssu
- Page 397 and 398: 376 Araba Sey and Manuel Castellsch
- Page 399 and 400: 378 Araba Sey and Manuel Castellsso
- Page 401 and 402: 380 Araba Sey and Manuel CastellsCo
- Page 404: PART VIIThe culture of the network
- Page 407 and 408: 386 Imma Tubellacultural and sociol
- Page 409 and 410: 388 Imma Tubellaand through symboli
- Page 411 and 412: 390 Imma TubellaStates. During the
- Page 413 and 414: 392 Imma TubellaIn Galicia, autonom
- Page 415 and 416: 394 Imma Tubellarooms, including fi
- Page 417 and 418: 396 Imma Tubellaunderstand the choi
- Page 419 and 420: 398 Imma Tubellainteraction which i
- Page 421 and 422: 400 Imma TubellaFerguson, M. (1995)
- Page 423 and 424: 18. Globalization, identity, and te
- Page 425 and 426: 404 Anshu ChatterjeeIndian entrepre
- Page 427 and 428: 406 Anshu ChatterjeeThese enterpris
- Page 429 and 430: 408 Anshu Chatterjeerestricted area
- Page 431 and 432: 410 Anshu Chatterjeepenetration rat
- Page 433 and 434: 412 Anshu Chatterjeeproduced instit
- Page 435 and 436: 414 Anshu ChatterjeePunjabi TV face
- Page 437 and 438: 416 Anshu Chatterjeedecisions. The
- Page 439 and 440: 418 Anshu ChatterjeeNOTES1. For mor
- Page 441 and 442: 19. The hacker ethic as the culture
- Page 443: 422 Pekka Himanenthe informational
- Page 447 and 448: 426 Pekka Himanena work culture in
- Page 449 and 450: 428 Pekka Himanenhype in which the
- Page 451 and 452: 430 Pekka HimanenWithout renewing t
- Page 453 and 454: Afterword: an historian’s view on
- Page 455 and 456: 434 Rosalind Williamsdoes it mean t
- Page 457 and 458: 436 Rosalind Williamsindustrial soc
- Page 459 and 460: 438 Rosalind Williamsgovernance str
- Page 461 and 462: 440 Rosalind Williamsspeech deliver
- Page 463 and 464: 442 Rosalind Williamsincarnates as
- Page 465 and 466: 444 Rosalind Williamsexponentially
- Page 467 and 468: 446 Rosalind Williamsmultiplicity o
- Page 469 and 470: 448 Rosalind WilliamsArendt, Hannah
- Page 471 and 472: 450 IndexCalifornia, University of:
- Page 473 and 474: 452 IndexDetroit Area Study 249, 25
- Page 475 and 476: 454 IndexGore, Al 99Gould, Stephen
- Page 477 and 478: 456 Indexencryption 71, 76gender ga
- Page 479 and 480: 458 IndexMTV 403, 415MTV India 406M
- Page 481 and 482: 460 IndexRambler 95Raymond, Eric 35
- Page 483 and 484: 462 Indexstatism 15, 17-18, 22, 84,
- Page 485: 464 IndexYahoo! 55, 59, 61Yang, Jer
424 Pekka Himanenone of the founders of Sun Microsystems, describes the passion that drove thecompany: “We were twenty-something-year-olds running a company and wehad just met, but we certainly shared the passion” (Southwick, 1999; see alsoAlahuhta and Himanen, forthcoming).It is a creative passion that is referred to here. In their work, hackers realizetheir creativity and constantly develop themselves. Hackers play with newideas and are enthusiastic about this work. And this creativity takes placeto<strong>ge</strong>ther with other hackers, either virtually or physically: hacker creativity isbased upon an open and shared development of ideas. It is about belonging toa group whose members have the same creative passion, give recognition toeach other’s contributions, and develop ideas further to<strong>ge</strong>ther.A significant additional feature of the hacker ethic is that the archetypalhacker works to the rhythm of his or her creativity. This is the ima<strong>ge</strong> of thehacker sometimes programming into the small hours of the night and thenwaking up in the afternoon, or mixing work and leisure in their daily lives inother ways. They take advanta<strong>ge</strong> of the possibilities of IT to mana<strong>ge</strong> their timemore freely.To<strong>ge</strong>ther, these features make up the two core elements of the hacker relationshipto work: (1) a networked creative passion; and (2) a flexible relationshipto time. What is important here is that, although information technologyhackers were the first to become self-conscious about this new work ethic,they realized that the work ethic is not limited to information technologyprofessionals. In fact, from the beginning, the hacker Jargon file said that ahacker can be “an expert or enthusiast of any kind.”It was in this <strong>ge</strong>neral sense that I proposed in my book, The Hacker Ethicand the Spirit of the Information A<strong>ge</strong>, the expression the “hacker ethic” todescribe the work culture of the informational economy, as a counterpart toWeber’s “Protestant ethic” in the industrial economy. I still prefer this expressionbecause it was the first “real-life” expression for the new <strong>ge</strong>neral workethic. Nowadays, however, the “hacker ethic” has problematic connotationsthat are not meant here. First of all, to many people it immediately bringscomputer criminals to mind. Second, for other people it conjures up only themost idealist version of the work ethic, such as the ideology of the mostextreme forms of the open-source software movement (everything is “fun”and everything must be open).To avoid these misunderstandings, expressions such as the “culture of innovation,”the “innovation work ethic,” or the “creative work ethic” can be usedas alternatives for the “hacker ethic” (I would recommend using the “cultureof innovation” in most contexts). Outside academic circles and those of theinformation technology hackers themselves, these alternative expressionsbetter convey the idea of a more <strong>ge</strong>neral new work ethic, which is not limitedto information technology jobs. They also link the new work culture explicitly