malleable.systems
malleable.systems copied to clipboard
Website for the malleable systems and software community
An experiment with a spreadsheet-like shell, shared at LIVE 2019 https://hisham.hm/userland/ Suggester: jryans
Mix of ZUI and spreadsheet https://arcan-fe.com/2021/04/12/introducing-pipeworld/ Suggester: [computably](https://matrix.to/#/!bQveTkYXFyxLJQwcLG:matrix.org/$pIJfrOWuAj1H6AIP6QrOYe2g7XhijlqmGa0zHTtRQnU?via=matrix.org&via=kickass.systems&via=dagarten.modular.im)
https://www.lri.fr/~mackay/pdffiles/CHI91.Triggers.pdf Shared by @geoffreylitt on [Twitter](https://twitter.com/geoffreylitt/status/1364646089756934148).
https://pure.au.dk/ws/files/121600144/Applications.pdf Shared by @geoffreylitt on [Twitter](https://twitter.com/geoffreylitt/status/1364646086460268547).
https://www.wired.com/story/power-paradox-bad-software/ Found via Jack Rusher from Future of Coding "The idea was for software to become the humble servant of every other discipline; no one anticipated that the tech industry...
https://www.devever.net/~hl/nexuses Interesting discussion of how programs can interconnect through various kinds of shared "nexuses".
Chris Martens compiled "[Notes toward Liberatory Programming](https://docs.google.com/document/d/1jWwsUDY9mHe97moysNv0PoYYfkzNPOjkKZN2hrL0Fcg/edit)", many of which overlap here and should probably be added. Shared by Chris on [Twitter](https://twitter.com/chrisamaphone/status/1291804250033606657) and FoC Slack.
Various discussion sites have linked to and discussed the mission lately. It would be good to learn from that feedback and find ways to improve and clarify our message. *...
[Conversation with Maya and others on Matrix](https://matrix.to/#/!bQveTkYXFyxLJQwcLG:matrix.org/$_gsQcAsP1h4tflsA16efW5gcXsakqRkwhaC7clOo7QM?via=matrix.org&via=occult.institute&via=kickass.systems) suggests value in a survey of approachability: > maya kate: Apologies if it isn't strictly relevant, but I wrote up the basics of...
Malleable systems will have interesting security challenges compared to more traditional approaches, since the default assumption today is to secure by locking down and preventing modification. Allowing "safe" modification and...