SlideShare a Scribd company logo
1 of 8
A Hacker Manifesto McKenzie Wark Presented by Emily White
A Hacker Manifesto ,[object Object],[object Object],[object Object],[object Object]
A Hacker Manifesto ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A Hacker Manifesto ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A Hacker Manifesto ,[object Object],[object Object],[object Object],[object Object]
A Hacker Manifesto ,[object Object],[object Object],[object Object],[object Object]
A Hacker Manifesto ,[object Object],[object Object],[object Object],[object Object]
A Hacker Manifesto ,[object Object],[object Object]

More Related Content

Similar to A Hacker Manifesto

"COGNITIVE CAPITALISM AND THE CONTESTED CAMPUS" de Nick Dyer-Witheford,
"COGNITIVE CAPITALISM AND THE CONTESTED CAMPUS" de Nick Dyer-Witheford,"COGNITIVE CAPITALISM AND THE CONTESTED CAMPUS" de Nick Dyer-Witheford,
"COGNITIVE CAPITALISM AND THE CONTESTED CAMPUS" de Nick Dyer-Witheford,eraser Juan José Calderón
 
090420 Technology And Class V1.0
090420 Technology And Class V1.0090420 Technology And Class V1.0
090420 Technology And Class V1.0jsla6764
 
Week 6-7 Technology and Class Presentation
Week 6-7 Technology and Class Presentation Week 6-7 Technology and Class Presentation
Week 6-7 Technology and Class Presentation jsla6764
 
LECTURE 11 - Cyberculture
LECTURE 11 - CybercultureLECTURE 11 - Cyberculture
LECTURE 11 - CybercultureKim Flintoff
 
LECTURE 7 - Cyberculture
LECTURE 7 - CybercultureLECTURE 7 - Cyberculture
LECTURE 7 - CybercultureKim Flintoff
 
Is Hacking Art
Is Hacking ArtIs Hacking Art
Is Hacking ArtZotronix
 
Reframing Southern Feminism(s): An Information Society Perspective - Anita Gu...
Reframing Southern Feminism(s): An Information Society Perspective - Anita Gu...Reframing Southern Feminism(s): An Information Society Perspective - Anita Gu...
Reframing Southern Feminism(s): An Information Society Perspective - Anita Gu...itfc-resources
 
On Network Capitalism, Ernesto van Peborgh, ISSS Keynote, George Washington U...
On Network Capitalism, Ernesto van Peborgh, ISSS Keynote, George Washington U...On Network Capitalism, Ernesto van Peborgh, ISSS Keynote, George Washington U...
On Network Capitalism, Ernesto van Peborgh, ISSS Keynote, George Washington U...Ernesto Peborgh
 
Open science economy
Open science economyOpen science economy
Open science economympt001
 
Patrons Curators Inventors & Thieves (Introduction)
Patrons Curators Inventors & Thieves (Introduction)Patrons Curators Inventors & Thieves (Introduction)
Patrons Curators Inventors & Thieves (Introduction)Dr Jonathan Wheeldon
 
Glyn Moody - from openness to abundance
Glyn Moody - from openness to abundanceGlyn Moody - from openness to abundance
Glyn Moody - from openness to abundanceglynmoody
 
Labouring Women: Some Major Concerns at the Current Juncture
Labouring Women: Some Major Concerns at the Current JunctureLabouring Women: Some Major Concerns at the Current Juncture
Labouring Women: Some Major Concerns at the Current Junctureitfc-resources
 
What do PIPA and SOPA constitute for personal freedom?
What do PIPA and SOPA constitute for personal freedom?What do PIPA and SOPA constitute for personal freedom?
What do PIPA and SOPA constitute for personal freedom?DriveCollectiveMedia
 
A review of some recent cyber theory
A review of some recent cyber theoryA review of some recent cyber theory
A review of some recent cyber theoryKeith Devereux
 
Of Hobbits, Amish, Hackers and Technology (or, is technology for humans or vi...
Of Hobbits, Amish, Hackers and Technology (or, is technology for humans or vi...Of Hobbits, Amish, Hackers and Technology (or, is technology for humans or vi...
Of Hobbits, Amish, Hackers and Technology (or, is technology for humans or vi...Kaido Kikkas
 
LECTURE 9 - Cyberculture
LECTURE 9 - CybercultureLECTURE 9 - Cyberculture
LECTURE 9 - CybercultureKim Flintoff
 

Similar to A Hacker Manifesto (20)

Manifesto hacker
Manifesto hackerManifesto hacker
Manifesto hacker
 
"COGNITIVE CAPITALISM AND THE CONTESTED CAMPUS" de Nick Dyer-Witheford,
"COGNITIVE CAPITALISM AND THE CONTESTED CAMPUS" de Nick Dyer-Witheford,"COGNITIVE CAPITALISM AND THE CONTESTED CAMPUS" de Nick Dyer-Witheford,
"COGNITIVE CAPITALISM AND THE CONTESTED CAMPUS" de Nick Dyer-Witheford,
 
090420 Technology And Class V1.0
090420 Technology And Class V1.0090420 Technology And Class V1.0
090420 Technology And Class V1.0
 
Week 6-7 Technology and Class Presentation
Week 6-7 Technology and Class Presentation Week 6-7 Technology and Class Presentation
Week 6-7 Technology and Class Presentation
 
LECTURE 11 - Cyberculture
LECTURE 11 - CybercultureLECTURE 11 - Cyberculture
LECTURE 11 - Cyberculture
 
LECTURE 7 - Cyberculture
LECTURE 7 - CybercultureLECTURE 7 - Cyberculture
LECTURE 7 - Cyberculture
 
Is Hacking Art
Is Hacking ArtIs Hacking Art
Is Hacking Art
 
Reframing Southern Feminism(s): An Information Society Perspective - Anita Gu...
Reframing Southern Feminism(s): An Information Society Perspective - Anita Gu...Reframing Southern Feminism(s): An Information Society Perspective - Anita Gu...
Reframing Southern Feminism(s): An Information Society Perspective - Anita Gu...
 
On Network Capitalism, Ernesto van Peborgh, ISSS Keynote, George Washington U...
On Network Capitalism, Ernesto van Peborgh, ISSS Keynote, George Washington U...On Network Capitalism, Ernesto van Peborgh, ISSS Keynote, George Washington U...
On Network Capitalism, Ernesto van Peborgh, ISSS Keynote, George Washington U...
 
After Tolerance
After ToleranceAfter Tolerance
After Tolerance
 
A Genealogy of New Media
A Genealogy of New MediaA Genealogy of New Media
A Genealogy of New Media
 
Open science economy
Open science economyOpen science economy
Open science economy
 
Patrons Curators Inventors & Thieves (Introduction)
Patrons Curators Inventors & Thieves (Introduction)Patrons Curators Inventors & Thieves (Introduction)
Patrons Curators Inventors & Thieves (Introduction)
 
Glyn Moody - from openness to abundance
Glyn Moody - from openness to abundanceGlyn Moody - from openness to abundance
Glyn Moody - from openness to abundance
 
Tektology and class
Tektology and class  Tektology and class
Tektology and class
 
Labouring Women: Some Major Concerns at the Current Juncture
Labouring Women: Some Major Concerns at the Current JunctureLabouring Women: Some Major Concerns at the Current Juncture
Labouring Women: Some Major Concerns at the Current Juncture
 
What do PIPA and SOPA constitute for personal freedom?
What do PIPA and SOPA constitute for personal freedom?What do PIPA and SOPA constitute for personal freedom?
What do PIPA and SOPA constitute for personal freedom?
 
A review of some recent cyber theory
A review of some recent cyber theoryA review of some recent cyber theory
A review of some recent cyber theory
 
Of Hobbits, Amish, Hackers and Technology (or, is technology for humans or vi...
Of Hobbits, Amish, Hackers and Technology (or, is technology for humans or vi...Of Hobbits, Amish, Hackers and Technology (or, is technology for humans or vi...
Of Hobbits, Amish, Hackers and Technology (or, is technology for humans or vi...
 
LECTURE 9 - Cyberculture
LECTURE 9 - CybercultureLECTURE 9 - Cyberculture
LECTURE 9 - Cyberculture
 

Recently uploaded

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Recently uploaded (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

A Hacker Manifesto