Hacking Is Pervasive

A true hacker is an individual who can achieve miracles by appropriating, modifying, or "kludging" existing resources (devices, hardware, software, or anything within reach) to suit other purposes, often in an ingenious fashion. Gifted hackers can be thought of as transmutation or collage...

Full description

Saved in:
Bibliographic Details
Published in:IEEE pervasive computing Vol. 7; no. 3; pp. 13 - 15
Main Authors: Paradiso, J.A., Heidemann, J., Zimmerman, T.G.
Format: Journal Article
Language:English
Published: New York IEEE 01-07-2008
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:A true hacker is an individual who can achieve miracles by appropriating, modifying, or "kludging" existing resources (devices, hardware, software, or anything within reach) to suit other purposes, often in an ingenious fashion. Gifted hackers can be thought of as transmutation or collage artists. They take everything from streamlined commercial products to bits of junk as their raw materials, leveraging the development and cost efficiencies of mass production as they modify established technology to serve their needs. Their work often juxtaposes unrelated modules in shotgun marriages, transforming off-the-shelf "lead" into technological "gold." In this special issue, we turn our attention to this positive connotation of the hacker from the perspective of pervasive computing.
Bibliography:ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
ISSN:1536-1268
1558-2590
DOI:10.1109/MPRV.2008.52