Technosectarianism Applying Religious Metaphors to Programming - - PowerPoint PPT Presentation

technosectarianism
SMART_READER_LITE
LIVE PREVIEW

Technosectarianism Applying Religious Metaphors to Programming - - PowerPoint PPT Presentation

Technosectarianism Applying Religious Metaphors to Programming stephanie stuart mawler 2014-04-04 Goldsmiths University of London, UK Sectarianism Orthodoxy The technology system is an Orthodoxy a precious thing to be guarded, a sacred


slide-1
SLIDE 1

Technosectarianism

Applying Religious Metaphors to Programming

stephanie stuart mawler 2014-04-04 Goldsmiths University of London, UK

slide-2
SLIDE 2

Sectarianism

slide-3
SLIDE 3

Orthodoxy

The technology system is an Orthodoxy

a precious thing to be guarded,

a “sacred artifact”

slide-4
SLIDE 4

Partisans

willing to

“defend, sacrifice to,

and care for

the sacred artifact”

slide-5
SLIDE 5

Heretics

as an Orthodoxy

Heretics rise

decrying Orthodoxy as

a thing worth fighting

gathers adherents

invalid or unclean

slide-6
SLIDE 6

Apostates

followers of the Orthodoxy

the Orthodoxy

in large and small ways

eventually question

slide-7
SLIDE 7

Technosectarianism boundary communities

in

programming-related

maintenance

  • riented

around a

technology system

slide-8
SLIDE 8

Sectarianism

slide-9
SLIDE 9

Sectarianism

slide-10
SLIDE 10

Technosectarianism

slide-11
SLIDE 11

Embattled Landscape

slide-12
SLIDE 12

Embattled Landscape

Technosectarianism

the key artifacts of

the technology system

plays out within

slide-13
SLIDE 13

Written Interactions “Just the facts ma’am.” Identity Neutral…

slide-14
SLIDE 14

Foci

comments newsgroup threads

slide-15
SLIDE 15

A Thought World

Programming languages

limit

what

thought can

be

slide-16
SLIDE 16

COBOL large

mainframe

processing

slide-17
SLIDE 17

FORTRAN

formulas algorithms

numbers

slide-18
SLIDE 18

Java cowboy all-nighter

slide-19
SLIDE 19

Making, Dividing, Stratifying

  • perating systems

user interfaces

unwashed masses

slide-20
SLIDE 20

Comments

Explain the code

comments

slide-21
SLIDE 21

Exegesis

Exegesis

comments

slide-22
SLIDE 22

comments

Linux

“linux”

slide-23
SLIDE 23

“linux”

comments

Linux Partisans

partisan programmers

slide-24
SLIDE 24

comments

setuid() – The Facts

/* * setuid() is implemented * like SysV with SAVED_IDS */

slide-25
SLIDE 25

comments

setuid() – The Story

/* * setuid() is implemented like SysV with SAVED_IDS * * Note that SAVED_ID's is deficient in that a setuid root program * like sendmail, for example, cannot set its uid to be a normal * user and then switch back, because if you're root, setuid() sets * the saved uid too. If you don't like this, blame the bright people * in the POSIX committee and/or USG. Note that the BSD-style setreuid() * will allow a root program to temporarily drop privileges and be able to * regain them by swapping the real and effective uid. */

slide-26
SLIDE 26

comments

setuid() – The Story

/* * setuid() is implemented like SysV with SAVED_IDS * * Note that SAVED_ID's is deficient in that a setuid root program * like sendmail, for example, cannot set its uid to be a normal * user and then switch back, because if you're root, setuid() sets * the saved uid too. If you don't like this, blame the bright people * in the POSIX committee and/or USG. Note that the BSD-style setreuid() * will allow a root program to temporarily drop privileges and be able to * regain them by swapping the real and effective uid. */

SAVED_ID's is deficient the BSD-style setreuid()...

blame the bright people

in the POSIX committee

If you don't like this,

and/or USG.

slide-27
SLIDE 27

comments

setuid() – A Story?

/* * setuid() is implemented like SysV with SAVED_IDS * * Note that SAVED_ID's is deficient in that a setuid root program * like sendmail, for example, cannot set its uid to be a normal * user and then switch back, because if you're root, setuid() sets * the saved uid too. If you don't like this, blame the bright people * in the POSIX committee and/or USG. Note that the BSD-style setreuid() * will allow a root program to temporarily drop privileges and be able to * regain them by swapping the real and effective uid. */

explaining the code?

slide-28
SLIDE 28

Newsgroup Threads

“I’m here for the newbies”

newsgroup threads

slide-29
SLIDE 29

newsgroup threads

Lisp

“lisp”

slide-30
SLIDE 30

newsgroup threads

“lisp”

Lisp Character

Artificial Intelligence

Academic

Flexible

  • rigins

Elegant

slide-31
SLIDE 31

newsgroup threads

Assault from Within

Since i'm writing... n i wrote a lot in the past on diverse issues scattered in various essays... i'll sum

some

fundamental problems

  • f lisp.
slide-32
SLIDE 32

newsgroup threads

Redemption

  • ne slight

and that is

hope for Lisp emacs lisp.

slide-33
SLIDE 33

newsgroup threads

Priesthood

the Common Lispers,

sneer at emacs lisp

while the

want to coffin

and Scheme Lispers,

emacs priests,

emacs perpetually

slide-34
SLIDE 34

newsgroup threads

Unclean

Some of us need

comp.lang.lisp

is a group for

Common Lisp.

to get work done

and have no time

to wine over

minor improvements.

slide-35
SLIDE 35

newsgroup threads

Go Elsewhere use Mathematica

instead?

Maybe

slide-36
SLIDE 36

What Are These Interactions?

the

foundations

  • f

the

work

itself

programs teaching

slide-37
SLIDE 37

Expressions of a World

interactions

represent

commitment technology system

to the are

not

just

tools

they

slide-38
SLIDE 38

What’s at Stake? programmer

identity

and

world view

are on the table with

every project

work

is

not

just

work

slide-39
SLIDE 39

A More Efficient Project?

can programmers benefit by changing normative understanding

  • f their tools?
slide-40
SLIDE 40

Finally…

if the

technology system

is the basis

  • f belief…

is

Technosectarianism

metaphorical?