Hackers and Founders

نویسنده

  • Paul Graham
چکیده

ISO17799 (formerly BS17799) is a standard for heuristic security management in organizations, and ISO20000 (formerly BS15000) is the ITIL reference document. Both of these are high-level, handwaving guidelines about service and business operations. True enough, they pay lip service to configuration management, but the configuration management they refer to is not the same as discussed in ;login:—it concerns software and information organization and revision/change control. The technical problem covered in ;login: is more about automation, tuning, and maintenance in operating systems. The principles are somewhat similar, but these ISO documents offer no solutions to implementation, only finger-wagging “should do’s” to be complied with.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Individualism; One's Position in Society, According to the Founders of Sociology

The concept of individualism in the field of sociology was introduced by the empirical scheme of one's position in society. The growing importance of the attention to this pattern affected by social changes has been rapid and rough. Cultural and social processes of modernization and modern age always create new conditions and stimulus leading to changes and verities in methods of individualizat...

متن کامل

Open to Grok. How do Hackers' Practices Produce Hackers?

How do hackers' practices produce hackers' identities? In this paper we argue that the association between science fiction and software programs is rooted in hackers' practices, defining how hackers' knowledge emerge. The mediation is the one of the Heinlein verb “to grok”, part of the Jargon file and of the name of a code browser, OpenGrok, the technology mediating the relationship between Ope...

متن کامل

Diversity or Concentration? Hackers’ Strategy for Working Across Multiple Bug Bounty Programs

Bug bounty programs have been proved effective in attracting external hackers to find and disclose potential flaws in a responsible way. There are many different bug bounty programs, so how do hackers balance diversity and concentration to effectively build their reputation in the vulnerability discovery ecosystem? In this paper, we present a novel methodology to understand how hackers spread t...

متن کامل

Looking for the Social Hackers

Motivated in part by the rising interest on social innovation, and also by the emergence of the networked social movements such as the Spanish ‘indignados’ and the ‘Occupy Wall Street’, the focus of this essay are the ‘social hackers’: innovators (or groups of innovators) which combine the technical skills of hackers with the civic or political orientation of social innovators. Hackers, working...

متن کامل

Security Investment, Hacking, and Information Sharing between Firms and between Hackers

A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are inverse U-shaped in each other. A hacker shifts from attack to information sharing when attack is costly or th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006