[Eric Raymond - http://www.netaxs.com/~esr/writings/homesteading/ ]

Eric Raymond

Zdomácnění noosféry

Přeložil: Jiří Jirát [JJaaaa]

Úvodní protiklad

Kdokoli, kdo chvíli pozoruje zaneprázdněný, obrovsky produktivní svět Internetového "open-source" softwaru, by měl zaznamenat zajímavý protiklad. Ten spočívá v tom, co "open-source" hackeři prohlašují za svoji víru a ve způsobu jakým se skutečně chovají. Tj., rozdíl mezi "oficiální" ideologií "open-source" kultury a mezi jejím praktickým uskutečněním.

Kultury jsou přizpůsobující se stroje. "Open-source" kultura je odpověď na totožný soubor tlaků a sil. Jako obvykle, přizpůsobení kultury daným podmínkám se projevuje jak vědomou ideologií tak implicitní nevědomou či polovědomou znalostí. A není neobvyklé, že nevědomá přizpůsobení jsou částečně na štíru s vědomou ideologií.

V tomto článku se budeme prohrabávat kolem kořenů zmíněného protikladu a použijeme ho k objevení tlaků a sil, které působily. Pokusíme se vydedukovat některé zajímavé údaje o hackerovské kultuře a jejích zvycích. Na závěr navrhneme směry, ve kterých může být implicitní vědění kultury ještě lépe zacíleno.

Různost hackerovských ideologií

Ideologie Internetu jako "open-source" kultury (což hackeři proklamují jako svou víru) je dost složité téma samo o sobě. Všichni členové souhlasí, že "open source" (tj. software, který je volně šiřitelný a může být snadno vyvíjen a modifikován pro měnící se potřebu) je dobrá věc a je hoden značného společného úsilí. Tato dohoda fakticky definuje členství v této kultuře. Avšak důvody, které jedinci a různé subkultury uvádějí pro svou víru, se znatelně liší.

Jedním stupněm proměnlivosti je fanatičnost; zda je vývoj "open source" považován buď pouze za vhodný prostředek (pro dobré nástroje a zábavné hračky a jako zajímavá hra) nebo jako cíl sám o sobě.

Velký fanatik může říkat: "Volný software je můj život! Existuji, abych vytvářel užitečné, krásné programy a informační zdroje, a pak je dával k dispozici." Středně fanatická osoba může říci: "Open source je dobrá věc a přál bych si, abych mohl strávit značný čas pomáháním při jejím vzniku." Málo fanatická osoba pak může říci: "Jo, open source je občas fajn. Hraji si s tím a vážím si lidi, kteří jej vytvářejí."

Jiný stupeň proměnlivosti je v nepřátelství vůči komerčnímu software a/nebo firmám vnímaným jako dominující na komerčním softwarovém trhu.

Velmi antikomerčně naladěná osoba může říci: "Komerční software je zlodějna a křečkování. Píšu volný software, abychom skoncovali s tímhle zlem." Umírněně antikomerční přistup by se dal charakterizovat asi takto: "Komerční software je obecně OK, protože programátoři si zaslouží výplatu, ale společnosti, které se vezou na šmejdových produktech a zatěžují tím ostatní, jsou zlo." A osoba ne-antikomerční může říci: "Komerční software je OK, open source software používám či píši proto, že se mi víc líbí."

Všech devět postojů, zahrnutých v kombinacích výše zmíněných kategorií, je reprezentováno v "open-source" kultuře. Důvod, proč je výhodné zdůraznit rozdíly, tkví v tom, že v sobě zahrnují různé pořádky a rozdílné přizpůsobivé a spolupracující chování.

Historicky, nejviditelnější a nejlépe organizovaná část hackerovské kultury byla velmi fanatická a velmi antikomerčně naladěná. Free Software Foundation (dále FSF) založená Richardem M. Stallmanem podporovala velkou část vývoje "open-source" od raných 80. let, včetně nástrojů jako Emacs a GCC. Ty jsou stále základními prostředky pro svět Internet "open-source" a zdá se, že zůstanou i v dohledné budoucnosti.

Mnoho let byla FSF jediným důležitým ohniskem open-source hackingu, produkujíce ohromné množství nástrojů, které jsou pro ni stále velmi rozhodující. FSF byla také dlouho jediným sponzorem open source kultury, který měl institucionální identitu zjevnou vnějším pozorovatelům hackerovské kultury. Účinně definovali termín "free software", přičemž mu úmyslně dali konfrontační váhu (kterému se novější nálepka `open source' úmyslně vyhýbá).

Tudíž, vnímání hackerovské kultury jak zvnitřku tak zvnějšku tíhnulo ke ztotožnění s fanatickým zaměřením FSF a uvědomování si antikomerčních cílů (RMS sám popírá, že je antikomerční, ale jeho program byl tolikrát čten mnoha lidmi, včetně mnoha jeho nejhlasitějších straníků). Mocný a zjevný tlak FSF na "Potlačit softwarové křečkování" se stal nejbližším hackerovské ideologii a RMS nejbližší věcí k vůdci hackerovské kultury.

Podmínky licence FSF - General Public Licence (GPL) - vyjadřují postoje FSF. Je velice široce používána v "open-source" světě. Sunsite v Severní Karolíně je největší a nejznámější softwarový archiv v Linuxovém světě. V červenci 1997 přibližně polovina softwarových balíků na tomto "sajtu" s explicitními licenčními požadavky používala GPL.

Ale FSF nebyla jediná ve hře. Byl zde vždy také tišší, méně konfrontační a komerci přátelsky nakloněný náběh v hackerovské kultuře. Pragmatici nebyli tolik loajální k ideologii, jako spíše ke skupině inženýrských tradicí založených v raných pokusech o "open-source", které předcházely FSF. Tyto tradice zahrnovaly, což je nejdůležitější, propletené technické kultury UNIXu a předkomerčního Internetu.

Typické pragmatické postoje jsou jen mírně antikomerční a hlavní stížnosti na svět korporací nejsou proti samotnému "křečkování", jako spíše proti zavilému odporu proti přijetí nadřazených přístupů zahrnujících Unix, otevřené standardy a open-source software. Jestli pragmatici něco nenávidí, není to ani "křečkování" obecně, jako současný King Log softwarového establishmentu, což bylo dříve IBM, dnes Microsoft.

Pro pragmatiky je GPL důležitá spíše jako nástroj než jako výsledek sám o sobě. Její hlavní hodnotou není zbraň proti křečkování, nýbrž nástroj pro podporu softwarového sdílení a růst bazaar-mode vývojových komunit. Pragmatik si spíše cení vlastnictví dobrých nástrojů a hraček, než nesnášení komercionalizmu, a používá vysoce kvalitní komerční software bez ideologického nepohodlí. Současně ho jeho zkušenosti s "open-source" naučily standardy technické kvality, kterých může velmi málo zavřený software dosáhnout.

For many years, the pragmatist point of view expressed itself within the hacker culture mainly as a stubborn current of refusal to completely buy into the GPL in particular or the FSF's agenda in general. Through the 1980s and early 1990s, this attitude tended to be associated with fans of Berkeley Unix, users of the BSD license, and the early efforts to build open-source Unixes from the BSD source base. These efforts, however, failed to build bazaar communities of significant size, and became seriously fragmented and ineffective.

Do exploze Linuxu v letech 1993-94 nenašli pragmatici reálnou mocnou základnu. Ačkoliv Linus Torvalds nikdy ani v nejmenším neoponoval RMS, dal příklad tím, že pohlížel příznivě na růst komerčního Linuxového průmyslu, veřejně schvaloval použití vysoce kvalitního komerčního softwaru pro specifické účely a jemně nejpuritánštější a nejfanatičtější prvky v této kultuře.

Vedlejším účinkem rapidního růstu Linuxu byl vznik velkého množství nových hackerů, kteří byli primárně věrni Linuxu a agenda FSF pro ně byla historickým zájmem. Ačkoli novější vlna Linuxových hackerů může popisovat systém jako "volbu nové GNU generace", většina tíhnula k napodobování Torvaldse než Stallmana.

Za čas antikomerční puritáni byli ti, kdo zjistili, že se stávají menšinou. Jak moc se věci změnily nebylo zjevné, dokud Netscape neohlásil v únoru 1998, že bude distribuovat Netscape 5.0 jako "zdrojáky". To vzbudilo velký zájem o "free software" ve světě korporací. Následná výzva hackerovské kultuře, aby vyzkoušela tuto bezprecedentní možnost a přeměnila "free software" na "open source", se setkala s úrovní okamžitého schválení, což překvapilo každého zainteresovaného.

V zesíleném rozvoji, pragmatická část kultury se stala polycentrická v polovině 90. let. Další polo-nezávislé komunty s vlastními sebevědomými a charismatickými vůdci začaly klíčit na kořenech Unixu/Internetu. Z těch nejdůležitějšíh - po Linuxu - byla kultura Perlu pod Larry Wallem. Menší, ale stále významné, byly tradice vývoje kolem jazyků Tcl Johna Osterhouta a Python Guido Van Rossuma. Všechny tyto tři komunity vyjadřovaly svou ideologickou nezávislost tvoříce jejich vlastní, ne-GPL licenční schémata.

Promiskuitní teorie, puritánská praxe

Nicméně přes všechny tyto změny zůstal široký konsensus, co to vlastně "free software" nebo "open source" je. Nejjasnější vyjádření této obecné teorie může být nalezeno v různých "open-source" licencích, z nichž všechny mají zásadní společné prvky.

V roce 1997 byly tyto společné prvky vytaženy do Debian Free Software Guidelines, které se stalydefinicí open-source. Podle těchto pravidel, definovaných OSD, musí open-source licence chránit bezpodminečné právo jakékoli osoby modifikovat (a redistribuovat modifikované verze) open-source softwaru.

Tudíž, implicitní teorie OSD (a licencí konformních s OSD, jako např. GPL, BSD či Perl's Artistic License ) je, že každý může hackovat cokoli. Nic nebrání půltuctu různých lidí

In practice, however, such `forking' almost never happens. Splits in major projects have been rare, and always accompanied by re-labeling and a large volume of public self-justification. It is clear that, in such cases as the GNU Emacs/XEmacs split, or the gcc/egcs split, or the various fissionings of the BSD splinter groups, that the splitters felt they were going against a fairly powerful community norm.

In fact (and in contradiction to the anyone-can-hack-anything consensus theory) the open-source culture has an elaborate but largely unadmitted set of ownership customs. These customs regulate who can modify software, the circumstances under which it can be modified, and (especially) who has the right to redistribute modified versions back to the community.

The taboos of a culture throw its norms into sharp relief. Therefore, it will be useful later on if we summarize some important ones here.

In the remainder of this paper, we shall examine these taboos and ownership customs in detail. We shall inquire not only into how they function but what they reveal about the underlying social dynamics and incentive structures of the open-source community.

Vlastnictví a "open source"

Co znamená "vlastnictví", když majetek je nekonečně duplikovatelný, vysoce tvárný a okolní kultura nemá ani donucovací mocenské vztahy a ani materiálně chudou ekonomiku?

Skutečně, v případě "open-source" kultury je to jednoduchá otázka. Vlastníkem(ky) softwarového projektu jsou ti, kteří mají exkluzivní právo, uznávané široce komunitou, redistribuovat modifikované verze.

(Při diskusi "vlastnictví" v této sekci budu používat singulár, jako by všechny projekty byly vlastněny nějakou jedinou osobou. Měli bychom však vzít na vědomí, že projekty mohou být vlastněny skupinami. Vnitřní dynamiku těchto skupin prozkoumáme později.)

Podle standardů "open source" licencí, všechny strany jsou si rovné ve vývojové hře. Ale v praxi je velmi dobře rozeznáván rozdíl mezi "oficiálními" _patches_ (asi nejblíže "opravami", lepší český termín neznám), které jsou potvrzené a integrované do vyvíjeného softwaru veřejně uznávanými udržovateli softwaru, a mezi "samotářskými" _patches_, dodaných třetí osobou. Samotářské patches jsou neobvyklé a obecně se jim nedůvěřuje.

Veřejná redistribuce je základní prvek a je snadné jej zavést. Zvyk dodává lidem odvahu,, aby "patchovali" softwaru pro svou osobní potřebu, když je to potřeba. Zvyk je lhostejný lidem, kteří redistribují modifikované verze ve skupině vývojové nebo ve skupině uzavřených uživatelů. Pouze tehdy, když jsou modifikace poslány "open source" komunitě obecně, aby soutěžily s originálem, je vlastnictví na pořadu dne.

Obecně jsou tři způsoby, jak nabýt vlastnictví "open source" projektu. Jedna, nejzřejmější, je založit projekt. Když projekt má pouze jednoho udržovatele od svého počátku a udržovatel je stále aktivní, zvyk ani nedovoluje otázku, kdo vlastní projekt.

Druhá cesta je obdržet vlastnictví projektu předchozím vlastníkem (občas známo jako "předání žezla"). Komunita je dobře srozuměna s tím, že vlastníci projektu mají povinnost předat projekt úspěšným následníkům, pokud už si dále nepřejí nebo nemohou investovat potřebný čas do vývoje či údržbových prací.

Je významné, že v případě hlavních projektů jsou přenosy řízení obecně ohlašovány s nějakými fanfárami. Zatímco není známo, že by široká "open source" komunita zasahovala do výběru následníka, obyklá praxe jasně zahrnuje premisu, že veřejná legitimita je důležitá.

Pro malé projekty je obecně dostačující zahrnout změnu do historie, přiložené k distribuci projektu. Jasný předpoklad je, že pokud dřívější vlastník v podstatě neodevzdal kontrolu dobrovolně, může ji znovu získat s podporou komunity tim, že bude veřejně protestovat v nějakém rozumném čase.

Třetí cesta, jak získat vlastnictví projektu, je zpozorovat, že projekt potřebuje práci a vlastník zmizel nebo ztratil zájem. Pokud chcete udělat toto, je to vaše zodpovědnost, dát si práci s nalezením vlastníka. Když neuspějete, můžete oznámit na relevantním místě (jako např. Usenet newsgroup, určený pro danou oblast), že projetk nejspíš osiřel a že uvažujete o převzetí zodpovědnosti za něj.

Zvyk vyžaduje, abyste nějakou dobu počkali, než se prohlásíte novým vlastníkem. Pokud někdo v této době oznámí, že skutečně pracovali na tom projektu, jejich nárok váš přebíjí. Patří k dobrému tónu oznámit vaše záměry více než jednou. Ještě slušnější je oznámit to na více fórech (patřičné newsgroups, mailing lists); a ještě lépe, pokud máte trpělivost čekat na odpovědi. Obecně, čím více dáte příležitosti, aby se předchozí vlastník či nějaký jiný zájemce ozval s odpovědí, tím silnější nárok budete mít, pokud žádná odpověď nepřijde.

Pokud jste prošli celým tímto procesem před očima uživatelské komunity tohoto projektu a nejsou žádné námitky, pak můžete prohlásit vlastnictví osiřelého projektu za své a označit je v souboru historie. Toto je však méně bezpečné, než obdržet žezlo a nemůžete očekávat uznání plné legitimity, pokud neuděláte zásadní zlepšení před očima uživatelské komunity.

Pozoroval jsem tyto zvyky v akci během dvaceti let, zpátky k dávné historii "open source" softwaru před FSF. Mají několik zajímavých rysů. Jeden z nejdůležitějších je ten, že většina hackerů je dodržovala, bez toho aby si toho byla plně vědoma. Skutečně, výše uvedené řádky mohou být prvním vědomým a rozumně zkompletovaným souhrnem, který byl kdy napsán.

Další rys pro nevědomé zvyky je ten, že byly následovány s pozoruhodnou, až překvapující konsistencí. Pozoroval jsem doslova stovky "open source" projektů a počet významných porušení, která jsem viděl či o nich slyšel, mohou spočítat na prstech.

Další zajímavý rys je, že jak se tyto zvyky vyvíjely v čase, dělo se to také v konzistentní linii. Toto řízení mělo za cíl podpořit větší veřejnou odpovědnost, větší veřejnou známost a větší péči o zachování kreditu a změn v historiích projektu tak, aby zajistily legitimitu současných vlastníků.

Tyto rysy naznačují, že zvyky nejsou náhodné, ale jsou produktem jakési implicitní agendy či plodného vzoru v "open source" kultuře, ????

Porovnání Internetové hackerovské kultury s crackerskou/pirátskou kulturou ("warez d00dz" soustředěné kolem "crackování" her a pirátských vývěskových systémů) osvětluje plodné vzory v obou dosti dobře. Vrátíme se k d00dz pro kontrast později v tomto článku.

Locke a zemskÄËť titul

Pro porozumění plodných vzorů pomůže uvědomit si historickou analogii k těmto zvykům, která je velmi daleko od obvyklých hackerovských zájmů. Jak mohou studenti právní historie a politické filozofie rozpoznat, teorie vlastnictví, kterou zahrnují, je virtuálně identická anglo-americké "common-law" teorii půdního vlastnictví.

V této teorii jsou tři způsoby, jak získat vlastnictví země.

Na hranicích, kde existuje půda, která nikdy neměla vlastníka, může každý získat vlastnictví osídlením, zabydlením, spojujíce jeho práci s nevlastněnou zemí, oplocením a obranou jeho titulu.

Obvyklé prostředky pro předávání v osídlených oblastech je předávání titulu, to jest obdržení listiny od předešlého vlastníka. V této teorii je "řetěz titulů" důležitý. Ideální důkaz vlastnictví je řetěz smluv a předávání zpět až k době, kdy byla zem původně osídlena.

Konečně, "common-law" teorie uvažuje i případ, kdy zemský titul může být ztracen či opuštěn (např., když vlastník zemře bez dědiců, nebo když záznamy potřebné k ustavené řetězce titulů až k neobsazené zemi jsou ztraceny). Kus země, který se tak stává opuštěným, může být nárokován pomocí ??"protivného vlastnictví"?? - někdo ho obsadí, vylepší a hájí titul, jako by došlo k osídlení.

Tato teorie, stejně jako hackerovské zvyky, se vyvinula organicky v kontextu, kdy centrální autorita byla velmi slabá či neexistující. Vyvinula se za periodu tisíce let ze severského a Germánského kmenového práva. Protože byla systemizována a racionalizována v počátcích moderní éry anglickým politickým filozofem Johhem Lockem, je někdy odkazována jako "Lockeovská" teorie majetku.

Logically similar theories have tended to evolve wherever property has high economic or survival value and no single authority is powerful enough to force central allocation of scarce goods. This is true even in the hunter-gatherer cultures that are sometimes romantically thought to have no concept of `property'. For example, in the traditions of the !Kung San bushmen of the Kalahari Desert, there is no ownership of hunting grounds. But there is ownership of water-holes and springs under a theory recognizably akin to Locke's.

The !Kung San example is instructive, because it shows that Lockean property customs arise only where the expected return from the resource exceeds the expected cost of defending it. Hunting grounds are not property because the return from hunting is highly unpredictable and variable, and (although highly prized) not a necessity for day-to-day survival. Waterholes, on the other hand, are vital to survival and small enough to defend.

The `noosphere' of this paper's title is the territory of ideas, the space of all possible thoughts . What we see implied in hacker ownership customs is a Lockean theory of property rights in one subset of the noosphere, the space of all programs. Hence `homesteading the noosphere', which is what every founder of a new open-source project does.

Fare Rideau <rideau@ens.fr> correctly points out that hackers do not exactly operate in the territory of pure ideas. He asserts that what hackers own is programming projects -- intensional focus points of material labour (development, service, etc), to which are associated things like reputation, trustworthiness, etc. He therefore asserts that the space spanned by hacker projects, is not the noosphere but a sort of dual of it, the space of noosphere-exploring program projects. (With a nod to the astrophysicists out there, it would be etymologically correct to call this dual space the `ergosphere' or `sphere of work'.)

In practice, the distinction between noosphere and ergosphere is not important for the purposes of this paper. It is dubious whether the `noosphere' in the pure sense Fare insists on can be said to exist in any meaningful way; one would almost have to be a Platonist philosopher to believe in it. And the distinction between noosphere and ergosphere is only of practical importance if one wishes to assert that ideas (the elements of the noosphere) cannot be owned, but their instantiations as projects can. This question leads to issues in the theory of intellectual property which are beyond the scope of this paper.

To avoid confusion, however, it is important to note that neither the noosphere nor the ergosphere is the same as the totality of virtual locations in electronic media that is sometimes (to the disgust of most hackers) called `cyberspace'. Property there is regulated by completely different rules that are closer to those of the material substratum -- essentially, he who owns the media and machines on which a part of `cyberspace' is hosted owns that piece of cyberspace as a result.

The Lockean structure suggests strongly that open-source hackers observe the customs they do in order to defend some kind of expected return from their effort. The return must be more significant than the effort of homesteading projects, the cost of maintaining version histories that document `chain of title', and the time cost of doing public notifications and a waiting period before taking adverse possession of an orphaned project.

Furthermore, the `yield' from open source must be something more than simply the use of the software, something else that would be compromised or diluted by forking. If use were the only issue, there would be no taboo against forking, and open-source ownership would not resemble land tenure at all. In fact, this alternate world (where use is the only yield) is the one implied by existing open-source licenses.

We can eliminate some candidate kinds of yield right away. Because you can't coerce effectively over a network connection, seeking power is right out. Likewise, the open-source culture doesn't have anything much resembling money or an internal scarcity economy, so hackers cannot be pursuing anything very closely analogous to material wealth.

There is one way that open-source activity can help people become wealthier, however -- a way that provides a valuable clue to what actually motivates it. Occasionally, the reputation one gains in the hacker culture can spill over into the real world in economically significant ways. It can get you a better job offer, or a consulting contract, or a book deal.

This kind of side effect, however, is at best rare and marginal for most hackers; far too much so to make it convincing as a sole explanation, even if we ignore the repeated protestations by hackers that they're doing what they do not for money but out of idealism or love.

However, the way such economic side-effects are mediated is worth examination. Below we'll see that an understanding of the dynamics of reputation within the open-source culture itself has considerable explanatory power.

The Hacker Culture as Gift Economy

To understand the role of reputation in the open-source culture, it is helpful to move from history further into anthropology and economics, and examine the difference between exchange cultures and gift cultures.

Human beings have an innate drive to compete for social status; it's wired in by our evolutionary history. For the 90% of that history that ran before the invention of agriculture, our ancestors lived in small nomadic hunting-gathering bands. High-status individuals got the healthiest mates and access to the best food. This drive for status expresses itself in different ways, depending largely on the degree of scarcity of survival goods.

Most ways humans have of organizing are adaptations to scarcity and want. Each way carries with it different ways of gaining social status.

The simplest way is the command hierarchy. In command hierarchies, allocation of scarce goods is done by one central authority and backed up by force. Command hierarchies scale very poorly ; they become increasingly brutal and inefficient as they get larger. For this reason, command hierarchies above the size of an extended family are almost always parasites on a larger economy of a different type. In command hierarchies, social status is primarily determined by access to coercive power.

Our society is predominantly an exchange economy. This is a sophisticated adaptation to scarcity that, unlike the command model, scales quite well. Allocation of scarce goods is done in a decentralized way through trade and voluntary cooperation (and in fact, the dominating effect of competitive desire is to produce cooperative behavior). In an exchange economy, social status is primarily determined by having control of things (not necessarily material things) to use or trade.

Most people have implicit mental models for both of the above, and how they interact with each other. Government, the military, and organized crime (for example) are command hierarchies parasitic on the broader exchange economy we call `the free market'. There's a third model, however, that is radically different from either and not generally recognized except by anthropologists; the gift culture.

Gift cultures are adaptations not to scarcity but to abundance. They arise in populations that do not have significant material-scarcity problems with survival goods. We can observe gift cultures in action among aboriginal cultures living in ecozones with mild climates and abundant food. We can also observe them in certain strata of our own society, especially in show business and among the very wealthy.

Abundance makes command relationships difficult to sustain and exchange relationships an almost pointless game. In gift cultures, social status is determined not by what you control but by what you give away.

Thus the Kwakiutl chieftain's potlach party. Thus the multi-millionaire's elaborate and usually public acts of philanthropy. And thus the hacker's long hours of effort to produce high-quality open source.

For examined in this way, it is quite clear that the society of open-source hackers is in fact a gift culture. Within it, there is no serious shortage of the `survival necessities' -- disk space, network bandwidth, computing power. Software is freely shared. This abundance creates a situation in which the only available measure of competitive success is reputation among one's peers.

This observation is not in itself entirely sufficient to explain the observed features of hacker culture, however. The cracker d00dz have a gift culture which thrives in the same (electronic) media as that of the hackers, but their behavior is very different. The group mentality in their culture is much stronger and more exclusive than among hackers. They hoard secrets rather than sharing them; one is much more likely to find cracker groups distributing sourceless executables that crack software than tips that give away how they did it.

What this shows, in case it wasn't obvious, is that there is more than one way to run a gift culture. History and values matter. I have summarized the history of the hacker culture elsewhere in ; the ways in which it shaped present behavior are not mysterious. Hackers have defined their culture by set of choices about the form which their competition will take. It is that form which we will examine in the remainder of this paper.

The Joy of Hacking

In making this `reputation game' analysis, by the way, I do not mean to devalue or ignore the pure artistic satisfaction of designing beautiful software and making it work. We all experience this kind of satisfaction and thrive on it. People for whom it is not a significant motivation never become hackers in the first place, just as people who don't love music never become composers.

So perhaps we should consider another model of hacker behavior in which the pure joy of craftsmanship is the primary motivation. This `craftsmanship' model would have to explain hacker custom as a way of maximizing both the opportunities for craftsmanship and the quality of the results. Does this conflict with or suggest different results than the `reputation game' modelĹľ

Not really. In examining the `craftsmanship' model, we come back to the same problems that constrain hackerdom to operate like a gift culture. How can one maximize quality if there is no metric for quality? If scarcity economics doesn't operate, what metrics are available besides peer evaluationĹľ It appears that any craftsmanship culture ultimately must structure itself through a reputation game -- and, in fact, we can observe exactly this dynamic in many historical craftsmanship cultures from the medieval guilds onwards.

In one important respect, the `craftsmanship' model is weaker than the `gift culture' model; by itself, it doesn't help explain the contradiction we began this paper with.

Finally, the `craftsmanship' motivation itself may not be psychologically as far removed from the reputation game as we might like to assume. Imagine your beautiful program locked up in a drawer and never used again. Now imagine it being used effectively and with pleasure by many people. Which dream gives you satisfactionĹľ

Nevertheless, we'll keep an eye on the craftsmanship model. It is intuitively appealing to many hackers, and explains some aspects of individual behavior well enough.

After I published the first version of this paper, an anonymous respondent commented: ``You may not work to get reputation, but the reputation is a real payment with consequences if you do the job well.'' This is a subtle and important point. The reputation incentives continue to operate whether or not a craftsman is aware of them; thus, ultimately, whether or not a hacker understands his own behavior as part of the reputation game, his behavior will be shaped by that game.

The Many Faces of Reputation

There are reasons general to every gift culture why peer repute (prestige) is worth playing for:

First and most obviously, good reputation among one's peers is a primary reward. We're wired to experience it that way for evolutionary reasons touched on earlier. (Many people learn to redirect their drive for prestige into various sublimations that have no obvious connection to a visible peer group, such as ``honor'', ``ethical integrity'', ``piety'' etc.; this does not change the underlying mechanism.)

Secondly, prestige is a good way (and in a pure gift economy, the only way) to attract attention and cooperation from others. If one is well known for generosity, intelligence, fair dealing, leadership ability, or other good qualities, it becomes much easier to persuade other people that they will gain by association with you.

Thirdly, if your gift economy is in contact with or intertwined with an exchange economy or a command hierarchy, your reputation may spill over and earn you higher status there.

Beyond these general reasons, the peculiar conditions of the hacker culture make prestige even more valuable than it would be in a `real world' gift culture.

The main `peculiar condition' is that the artifacts one gives away (or, interpreted another way, are the visible sign of one's gift of energy and time) are very complex. Their value is nowhere near as obvious as that of material gifts or exchange-economy money. It is much harder to objectively distinguish a fine gift from a poor one. Accordingly, the success of a giver's bid for status is delicately dependent on the critical judgement of peers.

Another peculiarity is the relative purity of the open-source culture. Most gift cultures are compromised -- either by exchange-economy relationships such as trade in luxury goods, or by command-economy relationships such as family or clan groupings. No significant analogues of these exist in the open-source culture; thus, ways of gaining status other than by peer repute are virtually absent.

Ownership Rights and Reputation Incentives

We are now in a position to pull together the previous analyses into a coherent account of hacker ownership customs. We understand the yield from homesteading the noosphere now; it is peer repute in the gift culture of hackers, with all the secondary gains and side-effects that implies.

From this understanding, we can analyze the Lockean property customs of hackerdom as a means of maximizing reputation incentives; of ensuring that peer credit goes where it is due and does not go where it is not due.

The three taboos we observed above make perfect sense under this analysis. One's reputation can suffer unfairly if someone else misappropriates or mangles one's work; these taboos (and related customs) attempt to prevent this from happening.

All three of these taboo behaviors inflict global harm on the open-source community as well as local harm on the victim(s). Implicitly they damage the entire community by decreasing each potential contributor's perceived likelihood that gift/productive behavior will be rewarded.

It's important to note that there are alternate candidate explanations for two of these three taboos.

First, hackers often explain their antipathy to forking projects by bemoaning the wasteful duplication of work it would imply as the child products evolved in more-or-less parallel into the future. They may also observe that forking tends to split the co-developer community, leaving both child projects with fewer brains to work with than the parent.

A respondent has pointed out that it is unusual for more than one offspring of a fork to survive with significant `market share' into the long term. This strengthens the incentives for all parties to cooperate and avoid forking, because it's hard to know in advance who will be on the losing side and see a lot of their work either disappear entirely or languish in obscurity.

Dislike of rogue patches is often explained by observing that they can complicate bug-tracking enormously, and inflict work on maintainers who have quite enough to do catching their own mistakes.

There is considerable truth to these explanations, and they certainly do their bit to reinforce the Lockean logic of ownership. But while intellectually attractive, they fail to explain why so much emotion and territoriality gets displayed on the infrequent occasions that the taboos get bent or broken -- not just by the injured parties, but by bystanders and observers who often react quite harshly. Cold-blooded concerns about duplication of work and maintainance hassles simply do not sufficiently explain the observed behavior.

Then, too, there is the third taboo. It's hard to see how anything but the reputation-game analysis can explain this. The fact that this taboo is seldom analyzed much more deeply than ``It wouldn't be fair'' is revealing in its own way, as we shall see in the next section.

The Problem of Ego

At the beginning of the paper I mentioned that the unconscious adaptive knowledge of a culture is often at odds with its conscious ideology. We've seen one major example of this already in the fact that Lockean ownership customs have been widely followed despite the fact that they violate the stated intent of the standard licenses.

I have observed another interesting example of this phenomenon when discussing the reputation-game analysis with hackers. This is that many hackers resisted the analysis and showed a strong reluctance to admit that their behavior was motivated by a desire for peer repute or, as I incautiously labeled it at the time, `ego satisfaction'.

This illustrates an interesting point about the hacker culture. It consciously distrusts and despises egotism and ego-based motivations; Self-promotion tends to be mercilessly criticized, even when the community might appear to have something to gain from it. So much so, in fact, that the culture's `big men' and tribal elders are required to talk softly and humorously deprecate themselves at every turn in order to maintain their status. How this attitude meshes with an incentive structure that apparently runs almost entirely on ego cries out for explanation.

A large part of it, certainly, stems from the generally negative Europo-American attitude towards `ego'. The cultural matrix of most hackers teaches them that desiring ego satisfaction is a bad (or at least immature) motivation; that ego is at best an eccentricity tolerable only in prima-donnas and often an actual sign of mental pathology. Only sublimated and disguised forms like ``peer repute'', ``self-esteem'', ``professionalism'' or ``pride of accomplishment'' are generally acceptable.

I could write an entire other essay on the unhealthy roots of this part of our cultural inheritance, and the astonishing amount of self-deceptive harm we do by believing (against all the evidence of psychology and behavior) that we ever have truly `selfless' motives. Perhaps I would, if Friedrich Wilhelm Nietzsche and Ayn Rand had not already done an entirely competent job (whatever their other failings) of deconstructing `altruism' into unacknowledged kinds of self-interest.

But I am not doing moral philosophy or psychology here, so I will simply observe one minor kind of harm done by the belief that ego is evil, which is this: it has made it emotionally difficult for many hackers to consciously understand the social dynamics of their own culture!

But we are not quite done with this line of investigation. The surrounding culture's taboo against visibly ego-driven behavior is so much intensified in the hacker (sub)culture that one must suspect it of having some sort of special adaptive function for hackers. Certainly the taboo is weaker among many other gift cultures, such as the peer cultures of theater people or the very wealthy!

The Value of Humility

Having established that prestige is central to the hacker culture's reward mechanisms, we now need to understand why it has seemed so important that this fact remain semi-covert and largely unadmitted.

The contrast with the pirate culture is instructive. In that culture, status-seeking behavior is overt and even blatant. These crackers seek acclaim for releasing "zero-day warez" (cracked software redistributed on the day of the original uncracked version's release) but are closemouthed about how they do it. These magicians don't like to give away their tricks. And, as a result, the knowledge base of the cracker culture as a whole increases only slowly.

In the hacker community, by contrast, one's work is one's statement. There's a very strict meritocracy (the best craftsmanship wins) and there's a strong ethos that quality should (indeed must) be left to speak for itself. The best brag is code that ``just works'', and that any competent programmer can see is good stuff. Thus, the hacker culture's knowledge base increases rapidly.

A taboo against ego-driven posturing therefore increases productivity. But that's a second-order effect; what is being directly protected here is the quality of the information in the community's peer-evaluation system. That is, boasting or self-importance is suppressed because it behaves like noise tending to corrupt the vital signals from experiments in creative and cooperative behavior.

The hacker culture's medium of gifting is intangible, its communications channels are poor at expressing emotional nuance, and face-to-face contact among its members is the exception rather than the rule. This gives it a lower tolerance of noise than most other gift cultures, and goes a long way to explain the example in public humility required of its tribal elders.

Talking softly is also functional if one aspires to be a maintainer of a successful project; one must convince the community that one has good judgement, because most of the maintainer's job is going to be judging other people's code. Who would be inclined to contribute work to someone who clearly can't judge the quality of their own code, or whose behavior suggests they will attempt to unfairly hog the reputation return from the projectĹľ Potential contributors want project leaders with enough humility and class be able to to say, when objectively appropriate, ``Yes, that does work better than my version, I'll use it'' -- and to give credit where credit is due.

Yet another reason for humble behavior is that in the open source world, you seldom want to give the impression that a project is `done'. This might lead a potential contributor not to feel needed. The way to maximize your leverage is to be humble about the state of the program. If one does one's bragging through the code, and then says ``Well shucks, it doesn't do x, y, and z, so it can't be that good'', patches for x, y, and z will often swiftly follow.

Finally, I have personally observed that the self-deprecating behavior of some leading hackers reflects a real (and not unjustified) fear of becoming the object of a personality cult. Linus Torvalds and Larry Wall both provide clear and numerous examples of such avoidance behavior. Once on a dinner expedition with Larry Wall I joked ``You're the alpha hacker here -- you get to pick the restaurant''. He flinched audibly. And rightly so; failing to distinguish their shared values from their leaders has ruined a good many communities, a pattern of which he and Linus cannot fail to be fully aware. On the other hand, most hackers would love to have Larry's problem, if they could but bring themselves to admit it.

Global Implications of the Reputation-Game Model

The reputation-game analysis has some more implications that may not be immediately obvious. Many of these derive from the fact that one gains more prestige from founding a successful project than from cooperating in an existing one. One also gains more from projects which are strikingly innovative, as opposed to being `me, too' incremental improvements on software that already exists. On the other hand, software that nobody but the author understands or has a need for is a non-starter in the reputation game, and it's often easier to attract good notice by contributing to an existing project than it is to get people to notice a new one. Finally, it's much harder to compete with an already successful project than it is to fill an empty niche.

Thus, there's an optimum distance from one's neighbors (the most similar competing projects). Too close and one's product will be a ``me, too!'' of limited value, a poor gift (one would be better off contributing to an existing project). Too far away, and nobody will be able to use, understand, or perceive the relevance of one's effort (again, a poor gift). This creates a pattern of homesteading in the noosphere that rather resembles that of settlers spreading into a physical frontier -- not random, but like a diffusion-limited fractal wave. Projects tend to get started to fill functional gaps near the frontier.

Some very successful projects become `category killers'; nobody wants to homestead anywhere near them because competing against the established base for the attention of hackers would be too hard. People who might otherwise found their own distinct efforts end up, instead, adding extensions for these big, successful projects. The classic `category killer' example is GNU Emacs; its variants fill the ecological niche for a fully-programmable editor so completely that nobody has even attempted a truly different design since the early 1980s. Instead, people write Emacs modes.

Globally, these two tendencies (gap-filling and category-killers) have driven a broadly predictable trend in project starts over time. In the 1970s most of the open source that existed was toys and demos. In the 1980s the push was in development and Internet tools. In the 1990s the action shifted to operating systems. In each case, a new and more difficult level of problems was attacked when the possibilities of the previous one had been nearly exhausted.

This trend has interesting implications for the near future. In early 1998, Linux looks very much like a category-killer for the niche `open-source operating systems' -- people who might otherwise write competing OSs are now writing Linux device drivers and extensions instead. And most of the lower-level tools the culture ever imagined having as open-source already exist. What's leftĹľ

Applications. As the year 2000 approaches, it seems safe to predict that open-source development effort will increasingly shift towards the last virgin territory -- programs for non-techies. A clear early indicator is the development of GIMP, the Photoshop-like image workshop that is open source's first major application with the kind of end-user-friendly GUI interface considered de rigeur in commercial applications for the last decade. Another is the amount of buzz surrounding application-toolkit projects like KDE and GNOME.

Finally, the reputation-game analysis explains the oft-cited dictum that you do not become a hacker by calling yourself a hacker -- you become a hacker when other hackers call you a hacker. A `hacker', considered in this light, is somebody who has shown (by contributing gifts) that he or she both has technical ability and understands how the reputation game works. This judgement is mostly one of awareness and acculturation, and can only be delivered by those already well inside the culture.

Noospheric Property and the Ethology of Territory

To understand the consequences of property customs, it will help us to look at them from yet another angle; that of animal ethology, specifically the ethology of territory.

Property is an abstraction of animal territoriality, which evolved as a way of reducing intra-species violence. By marking his bounds, and respecting the bounds of others, a wolf diminishes his chances of being in a fight which could weaken or kill him and make him less reproductively successful.

Similarly, the function of property in human societies is to prevent inter-human conflict by setting bounds that clearly separate peaceful behavior from aggression. It is sometimes fashionable to describe human property as an arbitrary social convention, but this is dead wrong. Anybody who has ever owned a dog who barked when strangers came near its owner's property has experienced the essential continuity between animal territoriality and human property. Our domesticated cousins of the wolf are instinctively smarter about this than a good many human political theorists.

Claiming property (like marking territory) is a performative act, a way of declaring what boundaries will be defended. Community support of property claims is a way to minimize friction and maximize cooperative behavior. These things remain true even when the ``property claim'' is much more abstract than a fence or a dog's bark, even when it's just the statement of the project maintainer's name in a README file. It's still an abstraction of territoriality, and (like other forms of property) our instinct-founded models of property are territorial ones evolved to assist conflict resolution.

This ethological analysis at first seems very abstract and difficult to relate to actual hacker behavior. But it has some important consequences. One is in explaining the popularity of World Wide Web sites, and especially why open-source projects with websites seem so much more `real' and substantial than those without them.

Considered objectively, this seems hard to explain. Compared to the effort involved in originating and maintaining even a small program, a web page is easy, so it's hard to consider a web page evidence of substance or unusual effort.

Nor are the functional characteristics of the Web itself sufficient explanation. The communication functions of a web page can be as well or better served by a combination of an FTP site, a mailing list, and Usenet postings. In fact it's quite unusual for a project's routine communications to be done over the Web rather than via a mailing list or newsgroup. Why, then, the popularity of Web sites as project homesĹľ

The metaphor implicit in the term `home page' provides an important clue. While founding an open-source project is a territorial claim in the noosphere (and customarily recognized as such) it is not a terribly compelling one on the psychological level. Software, after all, has no natural location and is instantly reduplicable. It's assimilable to our instinctive notions of `territory' and `property', but only after some effort.

A project home page concretizes an abstract homesteading in the space of possible programs by expressing it as `home' territory in the more spatially-organized realm of the World Wide Web. Descending from the noosphere to `cyberspace' doesn't get us all the way to the real world of fences and barking dogs yet, but it does hook the abstract property claim more securely to our instinctive wiring about territory. And this is why projects with web pages seem more `real'.

This ethological analysis also encourages us to look more closely at mechanisms for handling conflict in the open-source culture. It leads us to expect that, in addition to maximizing reputation incentives, ownership customs should also have a role in preventing and resolving conflicts.

Causes of Conflict

In conflicts over open-source software we can identify four major issues:

If we take a second look at the ``What is the Right Thing'' issue, however, it tends to vanish. For any such question, either there is an objective way to decide it accepted by all parties or there isn't. If there is, game over and everybody wins. If there isn't, it reduces to ``who decidesĹľ''.

Accordingly, the three problems a conflict-resolution theory has to resolve about a project are (A) where the buck stops on design decisions, (B) how to decide which contributors are credited and how, and (C) how to keep a project group and product from fissioning into multiple branches.

The role of ownership customs in resolving issues (A) and (C) is clear. Custom affirms that the owners of the project make the binding decisions. We have previously observed that custom also exerts heavy pressure against dilution of ownership by forking.

It's instructive to notice that these customs make sense even if one forgets the reputation game and examines them from within a pure `craftmanship' model of the hacker culture. In this view these customs have less to do with the dilution of reputation incentives than with protecting a craftsman's right to execute his vision in his chosen way.

The craftsmanship model is not, however, sufficient to explain hacker customs about issue (B), who gets credit for what (because a pure craftsman, one unconcerned with the reputation game, would have no motive to care). To analyze these, we need to take the Lockean theory one step further and examine conflicts and the operation of property rights within projects as well as between them.

Project Structures and Ownership

The trivial case is that in which the project has a single owner/maintainer. In that case there is no possible conflict. The owner makes all decisions and collects all credit and blame. The only possible conflicts are over succession issues -- who gets to be the new owner if the old one disappears or loses interest. The community also has an interest, under issue (C), in preventing forking. These interests are expressed by a cultural norm that an owner/maintainer should publicly hand title to someone if he or she can no longer maintain the project.

The simplest non-trivial case is when a project has multiple co-maintainers working under a single `benevolent dictator' who owns the project. Custom favors this mode for group projects; it has been shown to work on projects as large as the Linux kernel or Emacs, and solves the ``who decides'' problem in a way that is not obviously worse than any of the alternatives.

Typically, a benevolent-dictator organization evolves from an owner-maintainer organization as the founder attracts contributors. Even if the owner stays dictator, it introduces a new level of possible disputes over who gets credited for what parts of the project.

In this situation, custom places an obligation on the owner/dictator to credit contributors fairly (through, for example, appropriate mentions in README or history files). In terms of the Lockean property model, this means that by contributing to a project you earn part of its reputation return (positive or negative).

Pursuing this logic, we see that a `benevolent dictator' does not in fact own his entire project unqualifiedly. Though he has the right to make binding decisions, he in effect trades away shares of the total reputation return in exchange for others' work. The analogy with sharecropping on a farm is almost irresistible, except that a contributor's name stays in the credits and continues to `earn' to some degree even after that contributor is no longer active.

As benevolent-dictator projects add more participants, they tend to develop two tiers of contributors; ordinary contributors and co-developers. A typical path to becoming a co-developer is taking responsibility for a major subsystem of the project. Another is to take the role of `lord high fixer', characterizing and fixing many bugs. In this way or others, co-developers are the contributors who make a substantial and continuing investment of time in the project.

The subsystem-owner role is particularly important for our analysis and deserves further examination. Hackers like to say that `authority follows responsibility'. A co-developer who accepts maintainance responsibility for a given subsystem generally gets to control both the implementation of that subsystem and its interfaces with the rest of the project, subject only to correction by the project leader (acting as architect). We observe that this rule effectively creates enclosed properties on the Lockean model within a project, and has exactly the same conflict-prevention role as other property boundaries.

By custom, the `dictator' or project leader in a project with co-developers is expected to consult with those co-developers on key decisions. This is especially so if the decision concerns a subsystem which a co-developer `owns' (that is, has invested time in and taken responsibility for). A wise leader, recognizing the function of the project's internal property boundaries, will not lightly interfere with or reverse decisions made by subsystem owners.

Some very large projects discard the `benevolent dictator' model entirely. One way to do this is turn the co-developers into a voting committee (as with Apache). Another is rotating dictatorship, in which control is occasionally passed from one member to another within a circle of senior co-developers (the Perl developers organize themselves this way).

Such complicated arrangements are widely considered unstable and difficult. Clearly this perceived difficulty is largely a function of the known hazards of design-by-committee, and of committees themselves; these are problems the hacker culture consciously understands. However, I think some of the visceral discomfort hackers feel about committee or rotating-chair organizations is because they're hard to fit into the unconscious Lockean model hackers use for reasoning about the simpler cases. It's problematic, in these complex organizations, to do an accounting of either ownership in the sense of control or ownership of reputation returns. It's hard to see where the internal boundaries are, and thus hard to avoid conflict unless the group enjoys an exceptionally high level of harmony and trust.

Conflict and Conflict Resolution

We've seen that within projects, an increasing complexity of roles is expressed by a distribution of design authority and partial property rights. While this is an efficient way to distribute incentives, it also dilutes the authority of the project leader -- most importantly, it dilutes the leader's authority to squash potential conflicts.

While technical arguments over design might seem the most obvious risk for internecine conflict, they are seldom a serious cause of strife. These are usually relatively easily resolved by the territorial rule that authority follows responsibility.

Another way of resolving conflicts is by seniority -- if two contributors or groups of contributors have a dispute, and the dispute cannot be resolved objectively, and neither owns the territory of the dispute, the side that has put the most work into the project as a whole (that is, the side with the most property rights in the whole project) wins.

These rules generally suffice to resolve most project disputes. When they do not, fiat of the project leader usually suffices. Disputes that survive both these filters are rare.

Conflicts do not as a rule become serious unless these two criteria ("authority follows responsibility" and "seniority wins") point in different directions, and the authority of the project leader is weak or absent. The most obvious case in which this may occur is a succession dispute following the disappearance of the project lead. I have been in one fight of this kind. It was ugly, painful, protracted, only resolved when all parties became exhausted enough to hand control to an outside person, and I devoutly hope I am never anywhere near anything of the kind again.

Ultimately, all of these conflict-resolution mechanisms rest on the wider hacker community's willingness to enforce them. The only available enforcement mechanisms are flaming and shunning -- public condemnation of those who break custom, and refusal to cooperate with them after they have done so.

Acculturation Mechanisms and the Link to Academia

An early version of this paper posed the following research question: How does the community inform and instruct its members as to its customsĹľ Are the customs self-evident or self-organising at a semi-conscious level, are they taught by example, are they taught by explicit instructionĹľ

Teaching by explicit instruction is clearly rare, if only because few explicit descriptions of the culture's norms have existed to be used up to now.

Many norms are taught by example. To cite one very simple case, there is a norm that every software distribution should have a file called README or READ.ME that contains first-look instructions for browsing the distribution. This convention has been well established since at least the early 1980s, but up to now it has never been written down. One derives it from looking at many distributions.

On the other hand, some hacker customs are self-organizing once one has acquired a basic (perhaps unconscious) understanding of the reputation game. Most hackers never have to be taught the three taboos I listed in Section Three, or at least would claim if asked that they are self-evident rather than transmitted. This phenomenon invites closer analysis -- and perhaps we can find its explanation in the process by which hackers acquire knowledge about the culture.

Many cultures use hidden clues (more precisely `mysteries' in the religio/mystical sense) as an acculturation mechanism. These are secrets which are not revealed to outsiders, but are expected to be discovered or deduced by the aspiring newbie. To be accepted inside, one must demonstrate that one both understands the mystery and has learned it in a culturally approved way.

The hacker culture makes unusually conscious and extensive use of such clues or tests. We can see this process operating at at least three levels:

In the process of acquiring these mysteries, the would-be hacker picks up contextual knowledge which (after a while) does make the three taboos and other customs seem `self-evident'.

One might, incidentally, argue that the structure of the hacker gift culture itself is its own central mystery. One is not considered acculturated (concretely: no one will call you a hacker) until one demonstrates a gut-level understanding of the reputation game and its implied customs, taboos, and usages. But this is trivial; all cultures demand such understanding from would-be joiners. Furthermore the hacker culture evinces no desire to have its internal logic and folkways kept secret -- or, at least, nobody has ever flamed me for revealing them!

Respondents to this paper too numerous to list have pointed out that hacker ownership customs seem intimately related to (and may derive directly from) the practices of the academic world, especially the scientific research commmunity. This research community has similar problems in mining a territory of potentially productive ideas, and exhibits very similar adaptive solutions to those problems in the ways it uses peer review and reputation.

Since many hackers have had formative exposure to academia (it's common to learn how to hack while in college) the extent to which academia shares adaptive patterns with the hacker culture is of more than casual interest in understanding how these customs are applied.

Obvious parallels with the hacker `gift culture' as I have characterized it abound in academia. Once a researcher achieves tenure, there is no need to worry about survival issues (Indeed, the concept of tenure can probably be traced back to an earlier gift culture in which ``natural philosophers'' were primarily wealthy gentlemen with time on their hands to devote to research.) In the absence of survival issues reputation enhancement becomes the driving goal, which encourages sharing of new ideas and research through journals and other media. This makes objective functional sense because scientific research, like the hacker culture, relies heavily on the idea of `standing upon the shoulders of giants', and not having to rediscover basic principles over and over again.

Some have gone so far as to suggest that hacker customs are merely a reflection of the research community's folkways and are actually (for most) acquired there. This probably overstates the case, if only because hacker custom seems to be readily aquired by intelligent high-schoolers!

There is a more interesting possibility here. I suspect academia and the hacker culture share adaptive patterns not because they're genetically related, but because they've both evolved the one most optimal social organization for what they're trying to do, given the laws of nature and and the instinctive wiring of human beings. The verdict of history seems to be that free-market capitalism is the globally optimal way to cooperate for economic efficiency; perhaps, in a similar way, the reputation-game gift culture is the globally optimal way to cooperate for generating (and checking!) high-quality creative work.

This point, if true, is of more than (excuse me) academic interest. It suggests from a slightly different angle one of the speculations in The Cathedral And The Bazaarthat, ultimately, the industrial-capitalist mode of software production was doomed to be outcompeted from the moment capitalism began to create enough of a wealth surplus for many programmers to live in a post-scarcity gift culture.

Conclusion: From Custom to Customary Law

We have examined the customs which regulate the ownership and control of open-source software. We have seen how they imply an underlying theory of property rights homologous to the Lockean theory of land tenure. We have related that to an analysis of the hacker culture as a `gift culture' in which participants compete for prestige by giving time, energy, and creativity away. We have examined the implications of this analysis for conflict resolution in the culture.

The next logical question to ask is "Why does this matterĹľ" Hackers developed these customs without conscious analysis and (up to now) have followed them without conscious analysis. It's not immediately clear that conscious analysis has gained us anything practical -- unless, perhaps, we can move from description to prescription and deduce ways to improve the functioning of these customs.

We have found a close logical analogy for hacker customs in the theory of land tenure under the Anglo-American common-law tradition. Historically , the European tribal cultures that invented this tradition improved their dispute-resolution systems by moving from a system of unarticulated, semi-conscious custom to a body of explicit customary law memorized by tribal wisemen -- and eventually written down.

Perhaps, as our population rises and acculturation of all new members becomes more difficult, it is time for the hacker culture to do something analogous -- to develop written codes of good practice for resolving the various sorts of disputes that can arise in connection with open-source projects, and a tradition of arbitration in which senior members of the community may be asked to mediate disputes.

The analysis in this paper suggests the outlines of what such a code might look like, making explicit that which was previously implicit. No such codes could be imposed from above; they would have to be voluntarily adopted by the founders or owners of individual projects. Nor could they be completely rigid, as the pressures on the culture are likely to change over time. Finally, for enforcement of such codes to work, they would have to reflect a broad consensus of the hacker tribe.

I have begun work on such a code, tentatively titled the "Malvern Protocol" after the little town where I live. If the general analysis in this paper becomes sufficiently widely accepted, I will make the Malvern Protocol publicly available as a model code for dispute resolution. Parties interested in critiquing and developing this code, or just offering feedback on whether they think it's a good idea or not, are invited to contact me by email.

Questions for Further Research

The culture's (and my own) understanding of large projects that don't follow a benevolent-dictator model is weak. Most such projects fail. A few become spectacularly successful and important (Perl, Apache, KDE). Nobody really understands where the difference lies. (There's a vague sense abroad that each such project is sui generis and stands or falls on the group dynamic of its particular members, but is this true or are there replicable strategies a group can followĹľ)

As a matter of observable fact, people who found successful projects gather more prestige than people who do arguably equal amounts of work debugging and assisting with successful projects. Is this a rational valuation of comparative effort, or is it a second-order effect of the unconscious territorial model we have adduced hereĹľ

Bibliography, Notes, and Acknowledgements

[Miller] Miller, William Ian; Bloodtaking and Peacemaking: Feud, Law, and Society in Saga Iceland; University of Chicago Press 1990, ISBN 0-226-52680-1. A fascinating study of Icelandic folkmoot law, which both illuminates the ancestry of the Lockean theory of property and describes the later stages of a historical process by which custom passed into customary law and thence to written law.

[Mal] Malaclypse the Younger; Principia Discordia, or How I Found Goddess and What I Did To Her When I Found Her; Loompanics, ISBN 1-55950-040-9. Amidst much enlightening silliness, the `SNAFU principle' provides a rather trenchant analysis of why command hierarchies don't scale well. There's a browseable HTML version.

[BCT] J. Barkow, L. Cosmides, and J. Tooby (Eds.); The adapted mind: Evolutionary psychology and the generation of culture. New York: Oxford University Press 1992. An excellent introduction to evolutionary psychology. Some of the papers bear directly on the three cultural types I discuss (command/exchange/gift), suggesting that these patterns are wired into the human psyche fairly deep.

[MHG] Goldhaber, Michael K.; The Attention Economy and the Net. I discovered this paper after my version 1.7. It has obvious flaws (Goldhaber's argument for the inapplicability of economic reasoning to attention does not bear close examination), but Goldhaber nevertheless has funny and perceptive things to say about the role of attention-seeking in organizing behavior. The prestige or peer repute I have discussed can fruitfully be viewed as a particular case of attention in his sense.

[HH] I have summarized the history of hackerdom at http://www.tuxedo.org/~esr/faqs/hacker-hist.html. The book that will explain it really well remains to be written, probably not by me.

[N] The term `noosphere' is an obscure term of art in philosophy derived from the Greek `nous' meaning `mind', `spirit', or `breath'. It is pronounced KNOW-uh-sfeer (two o-sounds, one long and stressed, one short and unstressed tending towards schwa). If one is being excruciatingly correct about one's orthography, it is properly spelled with a diaresis over one `o' -- just don't ask me which one.

[RP] There are some subtleties about rogue patches. One can divide them into `friendly' and `unfriendly' types. A `friendly' patch is designed to be merged back into the project's main-line sources under the maintainer's control (whether or not that merge actually happens); an `unfriendly' one is intended to yank the project in a direction the maintainer doesn't approve. Some projects (notably the Linux kernel itself) are pretty relaxed about friendly patches and even encourage independent distribution of them as part of their beta-test phase. An unfriendly patch, on the other hand, represents a decision to compete with the original and is a serious matter. Maintaining a whole raft of unfriendly patches tends to lead to forking.

I am indebted to Michael Funk <mwfunk@uncc.campus.mci.net> for pointing out how instructive a contrast with hackers the pirate culture are. Robert Lanphier <robla@real.com> contributed much to the discussion of egoless behavior. Eric Kidd <eric.kidd@pobox.com> highlighted the role of valuing humility in preventing cults of personality. The section on global effects was inspired by comments from Daniel Burn <daniel@tsathoggua.lab.usyd.edu.au>. Mike Whitaker <mrw@entropic.co.uk> inspired the main thread in the section on acculturation.

Version history

I am solely responsible for what has gone into this paper, and any errors or misconceptions. However, I have welcomed comments and feedback and used them to improve the paper -- a process which I do not expect to end at any predefined time.

10 April 1998: Version 1.2 published on the Web.

12 April 1998: Version 1.3. Typo fixes and responses to first round of public comments. First four items in bibliography. An anonymously contributed observation about reputation incentives operating even when the craftsman is unaware of them. Added instructive contrasts with warez d00dz, material on the `software should speak for itself' premise, and observations on avoiding personality cults. As a result of all these changes, the section on `The Problem of Ego' grew and fissioned.

16 April 1998: Version 1.7. New section on `Global implications' discusses historical tends in the colonization of the noosphere, and examines the `category-killer' phenomenon. Added another research question.

27 April 1998: Version 1.8. Added Goldhaber to the bibliography. This is the version that will go in the Linux Expo proceedings.

26 May 1998: Version 1.9: Incorporated Fare Rideau's noosphere/ergosphere distinction. Incorporated RMS's assertion that he is not anticommercial. New section on acculturation and academia (thanks to Ross J. Reedstrom, Eran Tromer, Allan McInnes, and others). More about humility, (`egoless behavior') from Jerry Fass and Marsh Ray.

11 July 1998: Version 1.10: Remove Fare Rideau's reference to `fame' at his suggestion.

21 November 1998: Version 1.14: Minor editorial and stale-link fixes.