The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - July-September (2008 vol.7)
pp: 13-15
Joseph A. Paradiso , MIT Media Laboratory
John Heidemann , University of Southern California
Thomas G. Zimmerman , IBM Almaden Research Center
ABSTRACT
The true hacker can achieve miracles by appropriating, modifying, or "kludging" existing resources to suit other purposes, often in an ingenious fashion. From practice to philosophy, the collection of articles in this issue works to paint a broad picture of traditional, benevolent, and playful hacking from a pervasive computing perspective.
INDEX TERMS
hacking, pervasive computing
CITATION
Joseph A. Paradiso, John Heidemann, Thomas G. Zimmerman, "Hacking Is Pervasive", IEEE Pervasive Computing, vol.7, no. 3, pp. 13-15, July-September 2008, doi:10.1109/MPRV.2008.52
REFERENCES
1. The New Hacker's Dictionary, E.S. Raymond, ed., MIT Press, 1996.
2. T.F. Peterson, Nightwork: A History of Hacks and Pranks at MIT, MIT Press, 2003.
3. A. Chaikin, A Man on the Moon: The Voyages of the Apollo Astronauts, Penguin Books, 1998.
4. A. Drain, "Masters of Improv," Symmetry, vol. 4, no. 3, 2007, pp. 8–13.
22 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool