Hackers - Heroes of the Computer Revolution
نویسنده
چکیده
It’s a good conceptual basis, and usefully provides the metaphors and explanations you’ll need to communicate this kind of management style to other managers. But it won’t give you the nitty-gritty of how to implement it. persuasive technology: using computers to change what we think and do
منابع مشابه
Editorial: introduction to hacking and hacktivism
The activity of hacking constitutes one of the more contested and misunderstood aspects of network culture. Initially the word denoted a kind of obsessive commitment to creative and innovative computer programming, especially the re-engineering of systems that pushed the relatively new technology of the computer in interesting directions which were oftentimes not anticipated or recognized by th...
متن کاملSuper-Users: Hackers, Management Hostages, or Working Class Heroes? A study of user influence on redesign in distributed organizations
متن کامل
A Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors
Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...
متن کاملThe Homeopathic Revolution: Why Famous People and Cultural Heroes Choose Homeopathy
Dana Ullman (ed.). The Homeopathic Revolution. North Atlantic Books, Berkeley, CA, 2007, page 386. This is no ordinary book on homeopathy. The stunning scope of topics, the depth and breadth of knowledge and the abundant historical references throughout make this book a treasure. You will not want to miss a single word. (Caution: Do not skip Dana Ullman’s Notes. All 143 Notes add flavor and zes...
متن کاملDetecting Active Bot Networks Based on DNS Traffic Analysis
Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and redu...
متن کامل