This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
July-September 2008 (vol. 7 no. 3)
pp. 13-15
Joseph A. Paradiso, MIT Media Laboratory
John Heidemann, University of Southern California
Thomas G. Zimmerman, IBM Almaden Research Center
The true hacker can achieve miracles by appropriating, modifying, or "kludging" existing resources to suit other purposes, often in an ingenious fashion. From practice to philosophy, the collection of articles in this issue works to paint a broad picture of traditional, benevolent, and playful hacking from a pervasive computing perspective.

1. The New Hacker's Dictionary, E.S. Raymond, ed., MIT Press, 1996.
2. T.F. Peterson, Nightwork: A History of Hacks and Pranks at MIT, MIT Press, 2003.
3. A. Chaikin, A Man on the Moon: The Voyages of the Apollo Astronauts, Penguin Books, 1998.
4. A. Drain, "Masters of Improv," Symmetry, vol. 4, no. 3, 2007, pp. 8–13.

Index Terms:
hacking, pervasive computing
Citation:
Joseph A. Paradiso, John Heidemann, Thomas G. Zimmerman, "Hacking Is Pervasive," IEEE Pervasive Computing, vol. 7, no. 3, pp. 13-15, July-Sept. 2008, doi:10.1109/MPRV.2008.52
Usage of this product signifies your acceptance of the Terms of Use.