Hacking Is Pervasive
A true hacker is an individual who can achieve miracles by appropriating, modifying, or "kludging" existing resources (devices, hardware, software, or anything within reach) to suit other purposes, often in an ingenious fashion. Gifted hackers can be thought of as transmutation or collage...
Saved in:
Published in: | IEEE pervasive computing Vol. 7; no. 3; pp. 13 - 15 |
---|---|
Main Authors: | , , |
Format: | Journal Article |
Language: | English |
Published: |
New York
IEEE
01-07-2008
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | A true hacker is an individual who can achieve miracles by appropriating, modifying, or "kludging" existing resources (devices, hardware, software, or anything within reach) to suit other purposes, often in an ingenious fashion. Gifted hackers can be thought of as transmutation or collage artists. They take everything from streamlined commercial products to bits of junk as their raw materials, leveraging the development and cost efficiencies of mass production as they modify established technology to serve their needs. Their work often juxtaposes unrelated modules in shotgun marriages, transforming off-the-shelf "lead" into technological "gold." In this special issue, we turn our attention to this positive connotation of the hacker from the perspective of pervasive computing. |
---|---|
Bibliography: | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
ISSN: | 1536-1268 1558-2590 |
DOI: | 10.1109/MPRV.2008.52 |