Issue No. 03 - July-September (2008 vol. 7)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MPRV.2008.52
Thomas G. Zimmerman , IBM Almaden Research Center
Joseph A. Paradiso , MIT Media Laboratory
John Heidemann , University of Southern California
The true hacker can achieve miracles by appropriating, modifying, or "kludging" existing resources to suit other purposes, often in an ingenious fashion. From practice to philosophy, the collection of articles in this issue works to paint a broad picture of traditional, benevolent, and playful hacking from a pervasive computing perspective.
hacking, pervasive computing
Thomas G. Zimmerman, Joseph A. Paradiso, John Heidemann, "Hacking Is Pervasive", IEEE Pervasive Computing, vol. 7, no. , pp. 13-15, July-September 2008, doi:10.1109/MPRV.2008.52