Ken McKenzie Wark, Un manifeste hacker

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ken Cheng

Ken Cheng was born in Hong Kong. His family emigrated to Toronto, Canada while he was still young, and he attended high school in Toronto, and then the University of Toronto. He has a M.Ed. from Harvard University and a Ph.D. from the University of Pennsylvania in Philadelphia, USA in 1984. He did postdoctoral work at the University of Sussex and at the University of Western Ontario before beco...

متن کامل

Hacker Cartography: Crowdsourced Geography, OpenStreetMap, and the Hacker Political Imaginary

In this paper I trace the origins of “neogeography” (a constellation of new mapping practices and populations on the geospatial web) to its roots in computer hacker culture, notably through early mapping mashups, known originally as “map hacks”. I argue that a return to the figure of the hacker—via the proposed concept of hacker cartography—offers a productive lens for understanding the afforda...

متن کامل

Ken Fearon

Ken attended St Aloysius’ College, an independent Jesuit school in Glasgow, and he was proud of both his faith and his West of Scotland origins. From the day he entered Glasgow Medical School, it was evident that Ken had a fierce intellect and that he was an academic clinician to watch in the future. He achieved numerous distinctions in medical school, and in his final examinations, he was awar...

متن کامل

ASAC 2005 Brent McKenzie

The focus of this empirical study is to present the findings of a cross-cultural comparison between Canadian and Estonian university students and their perceptions of retail practices. The findings of this research indicate a level of commonality in retail shopping perceptions between both groups as well as non-trivial differences in both how shopping practice, in terms of the construct structu...

متن کامل

User Hacker Routing

The use of multiple transmission paths is known to enhance communication security. By using a suitable split function and with the help of an additional encryption layer this approach provides an interesting method for securing client server communication on the Internet.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Questions de communication

سال: 2007

ISSN: 1633-5961,2259-8901

DOI: 10.4000/questionsdecommunication.2571