Your new post is loading...
The hacker ethos is wild and anarchic, indifferent to the trappings of success. Or it was, until the gentrifiers moved in
Writings on art, culture, and media technology
Hacks/Hackers looks to help the refugee crisis, "Twitter for Journalists" webinar, and more from the Knight Fellows in this week's roundup.
An interview with Salvatore Iaconesi, Hacker
Excerpted from Brett Scott: “Here is where the second form of corruption begins to emerge.
I took a gamble when I bought the tractor mower. It was old, but well-cared for and ran well, but it was wearing out.
Are hackers the new bankers? This is the question rolling around in the mind of Alexa Clay following the publication of her book, The Misfit Economy
The spread of hacker practices to new fields, such as open hardware development and do-it-yourself biology, brings with it a renewed necessity to analyse the significance of hacking in relation to industrial and institutional innovation. We sketch out a framework drawing on the idea of recuperation and use it to situate an emerging body of works on hackers. By adopting the concept of recuperation, we highlight how hacker practices and innovations are adopted, adapted and repurposed by corporate and political institutions. In other words, hacking is being hacked. We suggest three temporalities within which this dynamics can be studied: 1) the life cycle of an individual hacker project-community, 2) the co-evolution of hacker movements and relevant industries or institutions, 3) the place of hacking within the “spirit of the times”, or, differently put, the transformations of capitalism seen through the lens of hacking.
The guy behind Apple's Hypercard is creating ways for average people to easily program their own robots and other gadgets. The post Internet of Anything: It’s Time for Everyone to be Able to Hack Robots appeared first on WIRED.
This article looks into the ways in which meaningful, positive cultural change is being made by revolutionary movements around the world, including the Cypherpunk movement, which advocates encryption as a tool to foster free expression and equality. It is the first article for the Cryptosphere by noted writer Nozomi Hayase.
Flying with the Hacker American Thinker Remnants of such restraint hold back even the hackers from bringing on Armageddon.
We are all hackers now, apparently—or are trying to be. Guilty as charged.
Excerpted from Andrew Dolan in Red Pepper, and based on a interview of Eduardo Maura, international representative of Podemos: “In describing this phenomenon Maura speaks of the ‘hacker logic’ that from the outset structured Podemos’s approach to...
|
We posted about a 3D printer fire a while back. An attendee of the Midwest RepRap Fest had left his printer alone only to find its immolated remains on his return. In the spirit of open source, naturally, he shared his experience with the rest of us.
* Essay: Repurposing the hacker. Three temporalities of recuperation. By Delfanti, Alessandro, and Söderberg, Johan. This essay describes the recuperation of hackerdom by capitalist society in three different stages. When on of the the authors, Johan, sent me the as yet unpublished draft for commentary, I wrote the following: “Two suggestions, one, I think there …
Commons are a particular type of institutional arrangement for governing the use and disposition of resources. Their salient characteristic, which defines them in contradistinction to property, is that no single person has exclusive control over the use and disposition of any particular resource. Instead, resources governed by commons may be used or disposed of by anyone among some (more or less defined) number of persons, under rules that may range from "anything goes" to quite crisply articulated formal rules that are effectively enforced.
The basic premise of Kathleen E. Kennedy’s intriguing volume Medieval Hackers is that modern computer hackers are essentially the inheritors of the medieval copyist and translators who sought to freely disseminate information from original sources through their “derivative texts,” which often also abridged, expanded, or altered information in their exemplars. More specifically, hackers can be identified with those late medieval transmitters of information who came into conflict with authorities when, starting especially in the mid-sixteenth-century, efforts were increasingly made to control, limit, or prohibit the free diffusion and distribution of certain text types, despite the fact that such unfettered free license had hitherto had been an accepted and integral part of European intellectual culture. While Kennedy begins by acknowledging in the very first sentence that “hackers are the last thing most people would associate with the Middle Ages” (1), she nonetheless manages to make a compelling argument for this bold parallel, developing the image of the “medieval hacker,” which she herself acknowledges as an “anachronistic title.” (4) The analogy ultimately succeeds, however, mostly thanks to her well-considered assessment backed up by convincing comparisons and persuasive references that demonstrate serious reflection and thorough academic rigorousness. She furthermore demonstrates expertise in the culture of both medieval textual transmission and modern information technology, as well as a host of other academic domains on which she relies to form and support her hypotheses.
The hacker ethos is wild and anarchic, indifferent to the trappings of success. Or it was, until the gentrifiers moved in
I took a gamble when I bought the tractor mower. It was old, but well-cared for and ran well, but it was wearing out. Still, I couldn't get a quarter as much machine for twice the price. Two months...
A darknet marketplace called TheRealDeal Market has emerged, focusing on brokering hackers’ zero-day attack methods. The post New Dark-Web Market Is Selling Zero-Day Exploits to Hackers appeared first on WIRED.
A new report suggests hackers are becoming more motivated by the mass destruction of technological infrastructures.
A former Tesla intern is releasing open source hardware and software that make car hacking incredibly cheap and more accessible.
Recently, 30 Hackers took over Fab Lab for a weekend. For three long days they were testing, thinking, making, experimenting, breaking, mending, and inventing. What is the point of it all and were they doing anything useful you may ask?
We are all hackers now, apparently—or are trying to be. Guilty as charged. I am writing these words, as I write most things, not with a pen and paper, or a commercial word processor, but on Emacs, a command-line text editor first developed in the 1970s for that early generation of free-software hackers. I had to hack it, so to speak, with a few crude lines of scripting code in order that it would properly serve my purposes as a writer. And it does so extremely well, with only simple text files, an integrated interpreter for the Markdown markup language, and as many split screens as I want. I get to feel clever and devious every time I sit down to use it.
|