technology

Cave or community

From Sandeep Krishnamurthy’s Cave or Community?: An Empirical Examination of 100 Mature Open Source Projects:

I systematically look at the actual number of developers involved in the production of one hundred mature OSS products. What I found is more consistent with the lone developer (or cave) model of production rather than a community model (with a few glaring exceptions, of course). …

… My contention is only that communities do things other than produce the actual product- e.g. provide feature suggestions, try products out as lead users, answer questions etc. …

To be more specific the top 100 most active projects (based on Sourceforge’s activity percentile) in the mature class were chosen for this study. …

Finding 1: The vast majority of mature OSS programs are developed by a small number of individuals. …

Moreover, as shown in Table 2, only 29% of all projects had more than 5 developers while 51% of projects had 1 project administrator. Only 19 out of 100 projects had more than 10 developers. On the other extreme, 22% of projects had only one developer associated with them. …

Finding 2: Very few OSS products generate a lot of discussion. Most products do not generate too much discussion. …

Finding 3: Products with more developers tend to be viewed and downloaded more often. …

Finding 4: The number of developers working on a OSS program was unrelated to the release date.

It could be argued that older projects may have more developers associated with them. However, we found no relationship between the release date and the number of developers associated with a program. …

Even though the discussion here may seem like an example of extreme free- riding, the reader needs to know that all free-riding is not necessarily “bad”. For instance, consider public radio stations in the United States. Even the most successful stations have about a 10% contribution rate or a 90% free-ridership rate. But, they are still able to meet their goals! Similarly, the literature on lurking in e-mail lists has suggested that if everyone in a community contributes it may actually be counter-productive.

Similarly, a recent survey of participants in open-source projects conducted by the Boston Consulting Group and MIT provides more insight. The top five motivations of open-source participants were

1. To take part in an intellectually stimulating project.
2. To improve their skill.
3. To take the opportunity to work with open-source code.
4. Non-work functionality.
5. Work-related functionality.

Cave or community Read More »

Nothin’ like nerdy Microsoft humor

In January 2002, I was running for the position of Vice President of the St. Louis Unix Users Group. On the SLUUG listserv, someone proposed that those running for office come clean on any ethical lapses. Here’s what I wrote:

Fine … I’ll go first and admit my ethical lapses.

I used to use Windows. A lot. All the time. It was really hard to stop. I mean, it came free with my computer. The guy at the store said, “Hey, try it. It’s free. Everyone else is doing it. You’ll feel good.” So I did. I gave in. I was weak. And then it got really hard to just say no. I kept giving more and more money to Microsoft, and Microsoft had me in its claws. I’d come to it every couple of days: “Hey, Microsoft, got anything else for me?” I sold things to buy more Microsoft products. I withdrew from my family, my friends, other people. Finally, one day I hit bottom … I looked around, and saw little multi-colored flags everywhere on my computer. I knew I was powerless. And that’s when I knew things had to change. I came to a LUG meeting, and I stood up, and I said, “Hi. My name is Scott, and I’m a Windows user.” Everyone was really nice … a lot of them had been in the same situation I was. Since then, the group has helped me gain the strength to get the Microsoft monkey off my back, and now I’m happier and more fulfilled than I ever was. Thank you, St. Louis Unix Users Group!

Nothin’ like nerdy Microsoft humor Read More »

Perfect Score Achieved on Pac-Man

From Twin Galaxies

For the first time in video game playing history, a perfect score was achieved on the legendary arcade game, Pac-Man.

On July 3, 1999 at 4:45 P.M., taking nearly six hours to accomplish the feat — on one quarter — Billy Mitchell, 33, a Fort Lauderdale hot sauce manufacturer visiting the famous Funspot Family Fun Center in Weirs Beach, NH, scored 3,333,360 points — the maximum possible points allowed by the game. The results will go into next year’s edition of the Twin Galaxies’ Official Video Game & Pinball Book of World Records — which is the official record book for the world of video game and pinball playing. …

To get a perfect game on Pac-Man, the player has to eat every dot, every energizer, every blue man and every fruit up to and including board 256 — where the game ends with a split screen. This must be accomplished on the first man, too.

When I was a freshman in high school in Marshall, I played Pac-Man constantly. I actually won a contest for Saline County Pac-Man champ, and my prize was an Atari 2600. My all-time high score was 1,187,000, played in the Wal-Mart lobby over the course of two hours.

Perfect Score Achieved on Pac-Man Read More »

Man, I lived a lot of this

Ode to the 90s
Found on FuckedCompany.com
I part-time telecommuted
as a Webmaster
for a dot com
in Y2K consulting.
They said it was
temp-to-perm.
it didn't pay
but there were options.
I swung by the office to make trades.
(Not that there's anything
wrong with that.)
cause we had a T1 Line
and there was a bull market
with a strong,
virile President.
and you never knew
when it could
crash.
I was a millionaire at 27
for thirty seconds.
I dug grunge.
then eighties.
Tony Bennet.
then Chumbawumba.
how bizzare.
how bizzare.
smoked Cohibas.
(Not that there's anything
wrong with that.)
but I didn't inhale.
Alrighty, then...
I learned HTML
and swing dancing.
moved to Seattle
but I was back on the redeye.
why did I eat
those krispy kremes?
it all seemed like a good idea
at the time.
I had a Pentium III
yeah
baby
yeah
with 9 gigs and a DVD.
It can do anythingh
even play movies.
I fell in love
in a chatroom
with a .BMP
I got the .JPEG
I wasn't so sure.....
I got emails,
but I couldn't Reply
my server was down
and our IT can't handle the MIS.
And my email didn't allow enclosures...
her ICQ was in my PDA
but I upgraded and
the memory's gone.

[Boing Boing Blog]

Man, I lived a lot of this Read More »

The social perils of immortality

From John Shirley:

Immortality? Maybe. There’s one company …: “There’s that UCSF scientist who keeps cropping up with roundworms. Now and then you hear something new about her and her program: Cynthia Kenyon. She’s started a company called Elixir. She’s working on ways to tweak a gene called daf-2 which controls how well cells repair themselves over time. This gene gets shut off somehow–she’s trying to turn it back on, I take it…She did it in roundworms first. Now she’s done it in mice, vastly extending their lifespans. Daf-2 apparently controls a host of proteins and hormones that repair cells, eliminate free radicals, destroy bacteria and so on. All this may be far more complex in humans than in animals though…

If it works, chances are that it’ll be so expensive that it won’t appreciably add to overpopulation. Only a few people will be able to afford it. The rich will become semi-immortal. The poor may be kept in ignorance about how this is done, lest revolution demand everyone gets relative immortality. This partial suppression of the relevant biotech can be justified, perhaps: not only for reasons of space and sufficient resources in an overpopulated Earth, but for reasons of encouraging genetic diversity–mortality is motivation for reproducing. The human race seems to need death…

The social perils of immortality Read More »

DRM ratchets up, but never quite works

From Edward Felten’s "DRM and the Regulatory Ratchet":

Regular readers know that one of my running themes is the harm caused when policy makers don’t engage with technical realities. One of the most striking examples of this has to do with DRM (or copy-restriction) technologies. Independent technical experts agree almost universally that DRM is utterly unable to prevent the leakage of copyrighted material onto file sharing networks. And yet many policy-makers act as if DRM is the solution to the file-sharing problem.

The result is a kind of regulatory ratchet effect. When DRM seems not to be working, perhaps it can be rescued by imposing a few regulations on technology (think: DMCA). When somehow, despite the new regulations, DRM still isn’t working, perhaps what is needed is a few more regulations to backstop it further (think: broadcast flag). When even these expanded regulations prove insufficient, the answer is yet another layer of regulations (think: consensus watermark). The level of regulation ratchets up higher and higher – but DRM still doesn’t work.

The advocates of regulation argue at each point that just one more level of regulation will solve the problem. In a rational world, the fact that they were wrong last time would be reason to doubt them this time. But if you simply take on faith that DRM can prevent infringement, the failure of each step becomes, perversely, evidence that the next step is needed. And so the ratchet clicks along, restricting technical progress more and more, while copyright infringement goes on unabated.

DRM ratchets up, but never quite works Read More »

Black Friday, now Cyber Monday

From "Ready, Aim, Shop" in The New York Times:

Though it sounds like slick marketing, Cyber Monday, it turns out, is a legitimate trend. According to Shop.org, a trade group, 77 percent of online retailers reported a substantial sales increase on the Monday after Thanksgiving last year. “Not good for employers,” observed Ed Bussey, senior vice president of marketing at the online lingerie retailer Figleaves.com.

Figleaves.com said sales on Cyber Monday last year were twice those of Black Friday. And that number is likely to jump this year when it offers the online equivalent of a doorbuster – 20 percent off all items.

Black Friday, now Cyber Monday Read More »

Famous domain name sales

From Michael Tchong’s “GreatDomains.com” in ICONOCAST (24 February 2000):

In 1997, idNames.com sold “business.com” for $150,000 … That same domain recently sold for $7.5 million. Here are some of the more notable domain-name sales:

+------+---------------------+------------+
|  Rnk | Domain              | Sale Price |
+------+---------------------+------------+
|   1. | Business.com        |   $7.5M    |
|   2. | AltaVista.com       |    3.3     |
|   3. | Loans.com           |    3.0     |
|   4. | Autos.com           |    2.2     |
|   5. | Express.com         |    2.0     |
|   6. | Fly.com             |    1.5     |
|   7. | Bingo.com           |    1.1     |
|   8. | WallStreet.com      |    1.0     |
|   9. | ForSalebyOwner.com  |    0.8     |
|  10. | Drugs.com           |    0.8     |
+------+---------------------+------------+

Famous domain name sales Read More »

Definitions of extranet

From Justin Hibbard’s “Lack of distributed object development delays extranets” in Computerworld (17 March 1997):

An extranet extends an intranet to trading partners, suppliers and customers via a secure Internet link.

From Robert Hertzberg’s The Raw Power of an Idea: in WebWeek (31 March 1997):

The extranet … revolves around the notion of business partners opening up their intranets to one another.

Or here’s another definition:

Internet: open access
Intranet: company access
Extranet: company, clients, partner access

Definitions of extranet Read More »

Test of Flock’s blog editor

I’m trying out a new web browser – Flock – which is basically Firefox with social software tools baked in, such as blogging, Flickr, del.icio.us, & so on. Basically, all the stuff I use anyway. So far, Flock looks pretty interesting, although I’m not yet sure at all that I would use it for my daily browsing. That said, I now tend to have both Firefox & Opera open at all times on my machine, so I may just add Flock as an option as well.

Test of Flock’s blog editor Read More »

CNN’s innovations & insights

From Joel Kurtzman, Interview with Gary Hamel, Strategy & Business (4th Qtr 1997):

One of the most interesting cases of all is CNN, which “saw at least three things that had already changed in our world that others had not yet put together”: technology changes produced small satellite uplinks that made it possible to report from virtually anywhere; lifestyle changes meant we don’t all get home in time for the six o’clock network news; and regulatory changes allowed cable operators to undermine the monopoly of regional broadcasters.

CNN’s innovations & insights Read More »

Serial killer apps

From “Andreessen singles out consumers as key to Web future“, in InfoWorld (26 May 1999):

[Mark Andreessen] then switched gears and talked about the “serial killer apps” on the Internet. A serial killer app, as opposed to a killer app, just keeps getting more useful and more killer as people keep coming online, according to Andreessen.

Andreessen listed the five serial killer apps as: e-mail, the Web, instant messaging, online calendaring, and auctions. …

Andreessen said serial killer apps are the reasons people get online, but once online they are not limited to these five arenas.

Serial killer apps Read More »

You always remember your first time

I remember the first day I ever got on the Internet. I was an English teacher working at a camp for gifted high school students, and a technologist was there talking about this thing called “the Internet” and how it was going to change everything. It sounded fascinating, so when I returned home a few weeks later, I scrimped together some money and purchased 2 more megs of RAM for my Mac LC, bringing the total up to a whopping 4 MB, and a screamin’ fast 14.4 modem. Then I got online using a dialup account I purchased, and stayed on for 12 hours straight. That technologist was right, and it was blindingly obvious to me that day: the Internet was going to change everything. 

You always remember your first time Read More »

Clay Shirky’s Thinking About Networks syllabus

From Clay Shirky’s “Thinking About Networks” syllabus:

Communications networks are invisible in the traditional sense; their inner workings are hidden inside devices, behind walls and underground, or pass silently through the air. We will examine a variety of electronic networks — telegraph, telephones, internet — and design philosophies — client-server, lattice, peer-to-peer — and explore the ways different networks alter the experiences that are and are not possible within them.

Social networks are invisible in a different way; because we are immersed in myriad social networks — friends, family, work school — and because humans are so natively good at understanding and working in such networks, we don’t see them. We will examine some of the structural elements of social networks, such as strong and weak ties, clustering, and small worlds networks, to understand some of the ways that the shape of social networks affects us.

… Technological choices embodied in electronic networks profoundly affect their social dimensions: Why can we CC people on email but not on phone calls? How does the one-way network of television differ from the two-way network of the internet? What effect does bittorrent’s architectural decentralization have on its users? Social choices also affect the design of technology; resistance to spamming or attempts to hide from the RIAA have led to several deep technological changes in the design of weblogs and file-sharing networks respectively, changes that alter the social relations among the users. …

… what is special about a network, as different from a mere collection of nodes? …

Humans both shape and are shaped by networks. We live in them every day, and they become so completely woven into the fabric of our lives that the technology becomes invisible, and our primary experience of them becomes social. “Who said what to whom when” is more important than whether the messages traveled by email or carrier pigeon.

Yet the structure of networks does affect the culture that uses them. The kinds of conversations people have via snail mail differ significantly from the conversations they have in email; talking on the phone is very different than “talking” via IM; group conversations that take place in communities like Metafilter are very different from those that take place on irc and different again from mailing lists, in large part because the technology shapes the culture.

To a first approximation, networks can be defined by describing 3 aspects: nodes, connections, and contents. The Web and email, for example, use the same nodes (users computers), but have very different ways of connecting (real time versus delayed delivery) and very different sorts of contents (request and reply — “pull” — for a specific URL versus sending for later delivery — “push” — of text messages), which make using the Web so different from using email. …

PAPER #1 ASSIGNED: “Two Networks” Students pick two networks (Telephone vs telegraph, FedEx vs Bike messenger, etc) and contrast their structure and use. …

What is “information space”? How can you visualize an N-dimensional network in 2D space? 3D space? What visual tools and techniques are there for representing networks? How does the material used to represent a network affect the representation? When representing something as abstract as a network, what information about a network is it vital to represent? What information is it vital to ignore? …

… the 20th century was characterized by broadcast media of an unprecedented scale, but most of the new networking tools invented in the last 30 years have not adhered to the broadcast model. …

What is a social network? What social networks do you live in? How do social networks use technological networks? How do social networks affect technological network design? What are the social effects of privacy, secrecy, anonymity, security, reputation in a mediated setting?

Some takeaway thoughts & questions I have for my students in my Social Software class:

How are networks structured?

What are the named AND unnamed structures (assumed? cultural? instinctual?) you see in various networks?

How does software further those structures? Expose them? Subvert them?

Given the structure of software/system/service X, what social experiences are possible? What are unintended, but possible? What are desired, but impossible?

Look at Dr. Samuel Johnson’s famous definition of “network”: “Any thing reticulated, or decussated, at equal distances, with interstices between the intersections.”

Clay Shirky’s Thinking About Networks syllabus Read More »