- Juju — Canonical’s cloud orchestration software, intended to be a peer of chef and puppet. (via svrn)
- Cultural Heritage Symbols — workshopped icons to indicate interactives, big data, makerspaces, etc. (via Courtney Johnston)
- Quinn Norton: Students as Hackers (EdTalks) — if you really want to understand the future, don’t look at how people are looking at technology, look at how they are misusing technology.
ENTRIES TAGGED "hackers"
The UDID story has conflicting theories, so the only real thing we have to work with is the data.
Visualizations, RFID installs and a Mini Maker Faire will be featured at Where 2012.
The 2012 Where Conference is looking for makers, hackers, developers and do-it-yourselfers who are working in the geolocation and mapping spaces.
Tim O'Reilly and Charlie Rose discuss the drivers of new technology: enthusiasts.
The future of technology will be shaped by the passion of enthusiasts — this was a central point in a recent discussion between Tim O’Reilly and Charlie Rose.
Recent hacks get mapped out and ranked, matrix-style.
IEEE Spectrum is applying New York Magazine's pop culture "approval matrix" to a vastly different domain: hacking.
Budget Treemap, Foo Encapsulated, Book Recommendations, Hackers and Data
- Interactive Treemap for the Budget (NY Times) — why don’t government departments produce and release these automatically? (via Flowing Data)
- Hold Conversations Not Meetings (HBR) — that sentence perfectly captures the heart of Foo Camp. (via Hacker News)
- Kiwi Foo 2011 Book Recommendations — we held a “which books are you reading, or would recommend?” session and this is the collected output.
- Hackers, Transparency, and the Zen of Failure — If hackers can’t create something with the data, they won’t do anything with it. The idea of an “army of armchair auditors” becomes a functional paradox, as the people the Government has in mind for the data apparently sit in armchairs, while the hackers sit in cafes, meet in pubs, and generally find comfy chairs far too comfy to code in. (via Public Strategist)
Cyber security expert Jeffrey Carr on the rise of government-sanctioned hackers.
Over the next year, cyber security expert Jeffrey Carr expects to see governments enlist civilians in organized cyber militias — and some countries will do this in plan and public view.
Collaboration opportunities abound at a host of Gov 2.0 weekend events.
This weekend, "civic hackivists" will be convening to work together on apps, ideas and platforms at the International Open Data Hackathon, Pulse Camp, City Camp CO and Random Hacks of Kindness.
It's been 25 years since "Hackers" was published. Author Steven Levy reflects on the book and the movement.
In mid-1980s, Steven Levy wrote a book that introduced the term "hacker" to a wide audience. In the ensuing 25 years, that word and its accompanying community have gone through tremendous change. In this Q&A, Levy discusses the book's genesis, its influence and the role hackers continue to play.