ENTRIES TAGGED "hackers"

Four short links: 28 August 2013

Four short links: 28 August 2013

Cloud Orchestration, Cultural Heritage, Student Hackers, and Visual Javascript

  1. Juju — Canonical’s cloud orchestration software, intended to be a peer of chef and puppet. (via svrn)
  2. Cultural Heritage Symbols — workshopped icons to indicate interactives, big data, makerspaces, etc. (via Courtney Johnston)
  3. Quinn Norton: Students as Hackers (EdTalks) — if you really want to understand the future, don’t look at how people are looking at technology, look at how they are misusing technology.
  4. noflo.js — visual flow controls for Javascript.
Comment: 1 |

Digging into the UDID data

The UDID story has conflicting theories, so the only real thing we have to work with is the data.

Over the weekend the hacker group Antisec released one million UDID records that they claim to have obtained from an FBI laptop using a Java vulnerability. In reply the FBI stated: The FBI is aware of published reports alleging that an FBI laptop was compromised and private data regarding Apple UDIDs was exposed. At this time there…
Read Full Post | Comments: 10 |
Makers and hackers: The Where Conference is looking for you

Makers and hackers: The Where Conference is looking for you

Visualizations, RFID installs and a Mini Maker Faire will be featured at Where 2012.

The 2012 Where Conference is looking for makers, hackers, developers and do-it-yourselfers who are working in the geolocation and mapping spaces.

Read Full Post | Comment |
Looking for the future? Watch the "crackpots"

Looking for the future? Watch the "crackpots"

Tim O'Reilly and Charlie Rose discuss the drivers of new technology: enthusiasts.

The future of technology will be shaped by the passion of enthusiasts — this was a central point in a recent discussion between Tim O’Reilly and Charlie Rose.

Read Full Post | Comment: 1 |
Visualization of the Week: An approval matrix for hacking

Visualization of the Week: An approval matrix for hacking

Recent hacks get mapped out and ranked, matrix-style.

IEEE Spectrum is applying New York Magazine's pop culture "approval matrix" to a vastly different domain: hacking.

Read Full Post | Comments Off |
Four short links: 16 February 2011

Four short links: 16 February 2011

Budget Treemap, Foo Encapsulated, Book Recommendations, Hackers and Data

  1. Interactive Treemap for the Budget (NY Times) — why don’t government departments produce and release these automatically? (via Flowing Data)
  2. Hold Conversations Not Meetings (HBR) — that sentence perfectly captures the heart of Foo Camp. (via Hacker News)
  3. Kiwi Foo 2011 Book Recommendations — we held a “which books are you reading, or would recommend?” session and this is the collected output.
  4. Hackers, Transparency, and the Zen of Failure If hackers can’t create something with the data, they won’t do anything with it. The idea of an “army of armchair auditors” becomes a functional paradox, as the people the Government has in mind for the data apparently sit in armchairs, while the hackers sit in cafes, meet in pubs, and generally find comfy chairs far too comfy to code in. (via Public Strategist)
Comments Off |

Trend to watch: Formal relationships between governments and hackers

Cyber security expert Jeffrey Carr on the rise of government-sanctioned hackers.

Over the next year, cyber security expert Jeffrey Carr expects to see governments enlist civilians in organized cyber militias — and some countries will do this in plan and public view.

Read Full Post | Comments: 2 |

Gov 2.0 events: Civic hacktivists gather globally

Collaboration opportunities abound at a host of Gov 2.0 weekend events.

This weekend, "civic hackivists" will be convening to work together on apps, ideas and platforms at the International Open Data Hackathon, Pulse Camp, City Camp CO and Random Hacks of Kindness.

Read Full Post | Comments Off |
On re-reading Steven Levy's "Hackers"

On re-reading Steven Levy's "Hackers"

Why the "Hackers" thesis still holds. Plus: How links created new context in the ebook.

Spiffing "Hackers" up for the book version has paid off by delivering a new dimension to the book that readers are reporting back on favorably. Here I offer my reactions to re-reading the text after 25 years and a discussion of the links we added to the electronic version.

Read Full Post | Comments Off |
"Hackers" at 25

"Hackers" at 25

It's been 25 years since "Hackers" was published. Author Steven Levy reflects on the book and the movement.

In mid-1980s, Steven Levy wrote a book that introduced the term "hacker" to a wide audience. In the ensuing 25 years, that word and its accompanying community have gone through tremendous change. In this Q&A, Levy discusses the book's genesis, its influence and the role hackers continue to play.

Read Full Post | Comments: 4 |