Open Source: a strategy for public “collective intelligence”

Download Report

Transcript Open Source: a strategy for public “collective intelligence”

The Open Source Phenomenon:

A public strategy for

“collective intelligence

High School Teachers Workshop @ NJIT May 3 rd , 2006 Harold Olmstead - John Crepezzzi - Milind Shah - Osama Eljabiri

Solving Problems with Open Source (Agenda)

    Open source Story: The “process” or the “product” Open source: The big picture

Building Vibrant Human Networks

Open source in problem solving- a case study Open source Programming: Samples and examples

From Harvard Business Review

      Corporate leaders seeking growth, learning, and innovation may find the answer in a surprising place: the open-source software community.

By any measure, Linux is a powerfully competitive product. It is estimated that more servers run on Linux than on any other operating system. It has overwhelmed UNIX as a commercial offering. And its advantages extend beyond cost and quality to the speed with which it is enhanced and improved. Specifically, Linux is the creation of an essentially voluntary, self organizing community of thousands of programmers and companies.

Most leaders would sell their grandmothers for workforces that collaborate as efficiently, frictionlessly, and creatively as the self-styled Linux "hackers."

An open source story

Tuesday, December 2, 2003

Near midnight, Andrea Barisani, system administrator in the physics department of the University of Trieste, Italy discovered that an attacker had struck his institution's Gentoo Linux server. He traced the breach to a vulnerable spot in the Linux kernel and another in rsync , a file transfer mechanism that automatically replicates data among computers. This was a serious attack: Any penetration of rsync could compromise files in thousands of servers worldwide.

Barisani woke some colleagues, who put him in touch with Mike Warfield, a senior researcher at Internet Security Systems in Atlanta , and with Andrew "Tridge“ . Tridgell, a well-known Linux programmer in Australia on whose doctoral thesis rsync was based.

-

An open source story

They directed Barisani's message (made anonymous for security reasons) to another Australian , Martin Pool, who worked for Hewlett Packard in Canberra and had been a leader In rsync's development. Although Pool was no longer responsible for rsync (nobody was), he immediately hit the phones and e-mail, first quizzing failure line by line.

Warfield and Dave Dykstra (another early contributor to rsync's development, who was based in California) about vulnerabilities and then helping Barisani trace the

An open source story

    By morning Trieste time. Pool and Barisani had found the precise location of the breach. Pool contacted the current rsync development group, while Barisani connected with the loose affiliation of amateurs and professionals that package Gentoo Linux, and he posted an early warning advisory to the Gentoo site. Pool and Paul "Rusty" Russell (a fellow Canberran who works for IBM ) then labored through the write a patch, and within five hours Australian night to Gentoo user-developers started testing the first version . Meanwhile, Tridge crafted a description of the vulnerability and its fix, being sure (at Pool's urging) to credit Barisani and Warfield for their behind-the-scenes efforts. On Thursday afternoon Canberra time, the announcement and the patch were posted to the rsync Web site and thus distributed to Linux users worldwide.

An open source story

 A few days after the emergency, having caught up on his sleep, Barisani volunteered to collaborate with Warfield in setting up a system of deliberately vulnerable servers to lure the system cracker into revealing himself.

No one authorized or directed this effort. No one - amateur or professional - was paid for participating or would have been sanctioned for not doing so. No one's job hinged on stopping the attack. No one clammed up for fear of legal liability. Indeed, the larger user community was kept informed of all developments. Yet despite the need for the highest security, a group of some 20 people , scarcely any of whom had ever met , employed by a dozen different companies , living in as many time zones and straying far from their job descriptions , accomplished in about 29 hours what might have taken colleagues in adjacent cubicles weeks or months.

Open source actually!

    Shared responsibility and shared utilization across the board Cross-organization, cross-department and multi-disciplinary collaboration.

Self-organized and self-motivated teams and individuals Trust-based culture and mutual respect driven environment

Open source as an added-value problem solving process

      Shared problems: every one can contribute and help Shared solutions: every one can provide feedback Shared problem solving responsibilities Problem solvers are stakeholders and visa versa.

Public “evolutionary prototyping” Public “collective intelligence”

Impacts of open source

 Educationally (free, collaborative, practical, patient)  Economically  Socially ( global, power of diversity, decentralization, no formality)  (cost-effective, productive, adaptive, reusable, accessible, responsive, no logistical barriers) Psychologically (motivation, flexibility, cohesion )  Politically ( distribution of power, equal rights, shared ownership)

Our open source channels

* The “Survivors”:

a high school university for high school students in partnership with university, industry, high schools, parents, high school teachers and community organizations.

* The Open university

: free collaborative education and training for all.

* The capstone experience:

an interdisciplinary problem solving process that offers high school semi co-op opportunities during summer (and possibly Fall and Spring). 

High school teachers support is highly desired and sought For more information: Please contact: Osama Eljabiri at [email protected]

or [email protected]

Cell: 973-981-1049, Office: (973)642-7123

Why Open Source ?

Philosophy Cost Reliable Security Scalable

http://www.dwheeler.com/contactme.html

Our model

Curiosity Open university Survivors Capstone Fast track skills acquisition

Open Source Business Case

Problem - Consumer

All cellular phone users face the following problems with their phones:

Losing or breaking phones

Changing phone numbers

Changing carriers or upgrading handsets

Forgetting phones

© Rational Solutions Corp. 2006

Problem - Marketers

All marketers face the following problems trying to reach cellular phone users:

Building lists of cell users, and getting permission to contact them.

Segmenting cellular phone users.

Obtaining useful analytics on campaign view and response rates.

Creating new or using existing real estate on the phone without taking away from the user experience and being construed as SPAM.

© Rational Solutions Corp. 2006

Architecture

© Rational Solutions Corp. 2006

Architecture

© Rational Solutions Corp. 2006

The Solution

A fun, free, and useful, community driven application that keeps cellular users socially connected, while also protecting and providing access to their data from anywhere, at anytime.

A system for marketers to reach networks and groups of cellular users with campaigns specifically tailored to their interests, without negatively affecting the user experience.

© Rational Solutions Corp. 2006

The Solution

Save, access, share, and edit content online and offline.

Update your phonebook automatically Invite others to join Ditto directly through the phone View and dial from your phonebook remotely.

© Rational Solutions Corp. 2006

The Solution

© Rational Solutions Corp. 2006

The Solution

Customize phone real estate with highly targeted ads Market using a carrier and handset agnostic system Reach a user’s entire network of contacts virally Improve campaign effectiveness through user profiling and analytics.

© Rational Solutions Corp. 2006

Open Source

Where and how was open source used?

1.Website used PHP (data population and polling) 2.Database used was MySQL (organization of contacts, phonebook, photos, and other data) 3.Server used for hosting website was Apache 4.Operating system used for server was Linux 5.SyncML software was written based on Open Source technologies and runs on Linux Server

© Rational Solutions Corp. 2006

Questions?

© Rational Solutions Corp. 2006

PHP: An Introduction

John Crepezzzi s06

Contact Information

    John Crepezzi (609) 709-2076 [email protected]

http://web.njit.edu/~jrc9

What we’ll discuss

    What are dynamic/static websites?

What is PHP?

What is MySQL?

What you’ll need

          

What we’ll discuss (PHP)

Commenting Output Basic Syntax rules Variables -- Dynamic Data Typing Single v. Double Quotes Arithmetic/Comparison Operators Conditionals Looping Functions Variable Scoping Date/Time Functions

What we’ll discuss (HTML)

   Creating an HTML form Handling an HTML form Sending data through forms

What we’ll discuss (MySQL)

     Designing Tables and Databases Inserting Selecting Updating Deleting

Dynamic/Static

  Static     Same every time No user interaction Informational Purposes only Ex: A syllabus website Dynamic  Changes based on time/date and other factors    User can interact with site Communication/Informational Ex: http://google.com

Technologies (PHP)

      PHP Hypertext Preprocessor Dynamic Typed Open-source Free*** High Level Server-Side PHP is a web scripting language with syntax comparable to Python, and use similar to ASP.net or Perl

Technologies (HTML)

 Hypertext Markup Language    THE language of the internet Mostly every page is built around an HTML center Client-side

Technologies (MySQL)

 Database System comparable to Oracle, MS-SQL Server    Open-Source Free Most widely used on public internet sites

PHP -- Getting Started

 Commenting //c++ style commenting is used /* C style is also accepted Multiple lines inside of comment tags */

Output

echo “hello world”; echo “this is out first program”; Output: hello world this is our first program echo “hello world
”; echo “this is our first program”; Output: hello world this is our first program

Basic Syntax

  Semi colon at the end of all statements Indent not required, but preferred

Variables

  Dynamic Typing    String Num All the Same to PHP when not allocated specifically Variable Naming       $hello $counter $echo $12hello $12345 $m_count

Single v. Double Quotes

  Single Quotes - Literal Value Double Quotes - Consider Variables

Arithmentic/Comparison

  Arithmetic  +, -, *, /, % Comparison  <, >, <=, >=, !=, ==, ===

HTML Forms

  Creation Using PHP with HTML

Conditionals

if (expression) { Statements… }

Looping

 While loops while (expression) { statements }  For loops for (creation; expression; change) { statements }

Functions

function name(var1, varn) { Statements return varn; } Can appear anywhere in code   Variables Passed by value Variable Scoping

Application: Date/Time

 http://php.net/date  Write an application to take a user’s name and then tell the user the time and date of the server in a user-readable way

SQL

      Designing tables Creating tables and databases Inserting Selecting Updating Deleting

• • • • • • • • • •

Next time

Sending E-mail Using External Files Like/Not Like, Sorting, limiting Interfacing with PHP and MySQL (detailed) Security Using Cookies and Sessions Browser Detection Debugging Tying with other languages and technologies Much more…

Questions?

Thank You!

 Feel free to contact me with any questions [email protected]

http://web.njit.edu/~jrc9 John Crepezzi