BoingBoing Spring 2011

From SFTropes
Jump to: navigation, search

Contents

List of Examples

Scary... a Virtual World Through Kinect, not a Keyboard

Though this is a primitive attempt, a software engineer by the name of John B was able to create his own world through his own version of "Gary's Mod" while interacting with it through the xBox Kinect. He used OpenNI to gather skeletal coordinate data from Kinect, which was then passed to some custom code that packages those coordinates inside UDP packets. Those packets are then sent to a custom Lua script that is interpreted by Garry’s Mod. This is a scary step towards building more interactive virtual societies. The repercussions and and analysis of such a notion clearly relates to Sherry Turkle's claim to their potential dangers and the current socio-culture trend of having more and more intimate interactions through virtual instances. John's exploration in this new form of virtual interaction has the potential of starting a new trend away from mouse, keyboard, point and click interactions for the primary user/gamer. I'd like to note a quote in the video: "You can ...like killing players that connect to the game," for discussion.

Robots to get their own internet and Wikipedia

In the following link from the BBC, it talks about an initiation towards what is called a RoboEarth. This is robots uploading information and storing it so they may communicate with each other and learn the same information each individual robot may have. I found this very interesting. Humans have developed a method of storing personal thoughts and techniques on paper; we store it in hard drives, etc. but collaboratively we do not learn the same information at that given instant. We cannot recollect other peoples memories like we index through directories on computers, but these robots in the future may be able to interact like such among themselves. This article hints at how fast robot's communication and learning skills are improving, a trait that was lagging in the robotic world. Link : http://www.bbc.co.uk/news/technology-12400647

=== Japanese Elderly Reject Robotic Help ===

This news story from the BBC discusses how elderly people in Japan dislike the use of robotic caretakers in nursing homes. This piece speaks directly to Sherry Turkle's concerns about human beings forging emotional connections with machines. Unlike the people in Turkle's examples, however, these Japanese nursing home patients are rejecting their mechanical helpers emotionally. Link: http://www.bbc.co.uk/news/business-12347219 Submitted By: Dr. Famiglietti

Exoskeleton Allows Heavy Lifting

This article describes the recently-revealed Raytheon Sarcos XOS 2 military exoskeleton, in development to grant increased strength and endurance to military soldiers. The current model is only focused on facilitating logistics (lifting munitions, carrying heavy packs, etc.) However, a fully-armored combat juggernaut model is fortunately on the drawing board as well. This is an obvious example of technology that allows us to exceed the physical limits of the human body. -bstewart Link : http://www.gizmag.com/raytheon-significantly-progresses-exoskeleton-design/16479/

Hacker Gets Revenge On Desktop Thief

In this video, a hacker tells a story at a convention about how he used his knowledge about technology to track down his stolen computer almost two years later, using the power of the internet. In addition to being a more literal example of hacking as well as a lesson about physical and digital security, it relates to our story "Hackers" in which the characters find new and innovative ways to repurpose technology for their own uses. Link: http://www.i-am-bored.com/bored_link.cfm?link_id=55806 Submitted By: Michael Smith

Paraplegic Walks Again With Help From Exoskeleton

Footage has recently been released of a new exoskeleton suit - the ReWalk - that will allow the disabled to walk again. This relates to both Schismatrix in regards to the Mechanists using technology to enhance themselves robotically, as well as the Winter Market, where Lise is dependent on an exoskeleton to move around and interact with her environment. Link: http://www.geeksaresexy.net/2011/04/19/man-walks-again-after-20yrs-in-a-wheelchair/ Submitted By: Msmith312 01:26, 21 April 2011 (UTC)

Alternate Keyboard Layouts

Instead of using the typical QWERTY keyboard, an intrigued hacker wanted to switch to the Dvorak format. This was for "geekiness." Nevertheless, it reduced the typical speed by a factor of 8, thus the hacker returned to QWERTY. This is an example of taking an everyday piece of technology and using it in an unorthodox way. http://hackaday.com/2011/04/06/alternate-keyboard-layouts-for-geekiness-and-other-reasons/ -Submitted by Slayton Gilmore

Death in Disney Films

The following link contains a .pdf file that discusses the results of a study conducted by a group of researchers. These researchers wished to see how deaths in Disney animated films affected children. Since children do not have a full understanding of the gravity of death, the researchers were interested in recording how the children responded to various characters passing on. This is certainly related to many of our Sherry Turkle readings, as it is not only tracking emotional responses to nonhuman or nonexistent beings, but it is specifically attaching a sense of loss to these beings. Link: [1] Submitted by: Michael Smith

Understanding the Power of Video Games

In the following link, a short article and corresponding video elaborates on the idea of video games teaching valuable life lessons. For example, the article hints about an individual gaining more self-confidence by controlling an avatar for 90 seconds, which is initially argued by the hostman saying playing video games is about escapism. The article provides some counterargument to Sherry Turkle's example of the physics student becoming more withdrawn from society than before after partaking a MUD. Link: http://kotaku.com/5752162/stephen-colbert-tries-to-understand-the-power-of-video-games Submitted By: kvicente3 

In Search for Intelligence, a Silicon Brain Twitches

The Wall Street Journal reported a few years ago about a development at the Blue Brain Project in which simulated portions of a generic rat brain spontaneously demonstrated "natural" neural activity. Although this is not a recent article, it strikes a chord with many of the themes discussed in class, such as the ability to simulate a human mind and the distinction between a virtual entity and a natural entity. The Blue Brain Project's results suggest that, when a brain is simulated with anatomical accuracy, it may not be possible to locate the dividing line between a "real" person and a "fake" person, as discussed in "Flesh Made Word."
Link: http://online.wsj.com/article/SB124751881557234725.html#articleTabs%3Darticle Submitted By: E.t.dale 17:11, 5 February 2011 (UTC)

=== USB Drive Inside a Floppy ===

This DIYer decided to put a promotional usb drive to good use by stuffing it inside of a floppy disk. This act of taking "junk" and turning it into a form of art relates back to Rubin in "The Winter Market". Link:http://www.flickr.com/photos/charles_mangin/sets/72157625250155063/
Link:http://www.youtube.com/watch?v=ojNYill9oBM Submitted By: Taylor Riggs

N64 Advance portable gaming system

This article is about a person who felt a passion for the N64. So much so that he went on to build a portable version of the N64 by using different parts from the system and other systems like the PlayStation one. This relates to the theme learned from Steven Levy's "Hackers." The people in this story were fascinated by the computers and made amazing thing by using it like this person did with the N64. Link: http://hackaday.com/2011/02/05/n64-advance-portable-gaming-system/ Submitted By: Jpham7

Yoga Database to Foil Yoga Copythieves

A open database of all yoga postures will go live in India soon. The purpose is to stop self-styled yoga gurus from claiming copyright to ancient "asanas." The database will contain 1,300 "asanas," which will soon be uploaded on the country's online libaray. Now if someone claims they inveneted an "asana" they can be checked if they really have invented the poses through this database. Noe if anyone applies for a patent on yoga, they can be checked using this database. This presents the same idea as in Steven Levey's "hackers," whether information should be free or not. This supports that information is out there for everyone to use just like the "hackers" would have wanted. http://boingboing.net/ Submitted by Sriram Suresh

Canadian ISPs are Taking Control of the Web

This story from arstechnica directly battles the question "Who decides how technology will be used?" Since the internet is the most prominent and widespread technology of our day, any kind of entity which tries and limits it (as we've seen in Egypt) suddenly gains power and control. Link: http://arstechnica.com/tech-policy/news/2011/01/canada-gets-first-bitter-dose-of-metered-internet-billing.ars Submitted By: CC Rossi

Man from Georgia Creates and Dates Three Robots 

In this following article, an introverted man from Georgia creates three robots to fulfill specific relationships in his life: a friend, mistress, and wife. This unidentified man designed robots for himself because he struggles interacting with other people and believes that "humans are so biological and messy." He considers humans as being a flawed type since they can possess many diseases such as STDs. This story relates to Turkle's theme in "Programmed for Love" which argues the legitimacy of loving robots and technology. http://gizmodo.com/367698/technosexual-one-mans-tale-of-robot-love
Submitted By: Ross Lucier

10µm Scanning Electron Microscope from an old vidicon tube

The following links are of one person's experience of building an electron microscope from an old vidicon tube. A vidicon tube is a video camera tube design in which the target material is a photoconductor. The Vidicon was developed in the 1950s and the technology was used by NASA for the Galileo probe in the 70's. http://hackaday.com/2011/02/06/10-µm-scanning-electron-microscope-from-vidicon-tube/ http://www.coultersmithing.com/forums/viewtopic.php?f=10&t=172

Hacker Holds Video Game Hostage

The following article concerns a particular player of a MMO that was dissatisfied with the state of the game's moderation and treatment of players. His response was to hold the personal information of over 3 million users until his needs were met. Link: http://kotaku.com/5735250/hacker-holds-video-game-hostage Submitted By: Jarvis Johnson

Ex-Girlfriend Gets Revenge by Turning Boyfriend Into a Meme

The following article is written about a girlfriend who, after being dumped by her boyfriend, took a photo of him and uploaded it to the internet as a meme. She uploaded over 60 photos all with different (insulting) captions to a myriad of websites so that upon searching his name in Google Images, one would find all of these photos. This relates to Steven Levy's "Hackers" in which hacking was talked about as a culture that takes a tool and re-purposes it; in this case that tool was Google images and it was used to humiliate an ex-boyfriend. Link: http://gizmodo.com/5752857/ex+girlfriend-gets-revenge-by-turning-boyfriend-into-a-meme Submitted By: Partha Unnava

Steampunk CD Player

This CD player is created out of old materials that would often be seen as junk, but the creator chose to use them for something productive. This relates to the Winter Market, and how Rubin makes things out of what other people consider trash. http://hackaday.com/category/digital-audio-hacks/ Submitted By: Nick Orangio

Project 64

Why do you need a Nintendo 64 to play Nintendo games? Project 64 allows you to play all the biggest Nintendo game hits anytime on your own computer. Along with that, this costs nothing, but a download for any user wanting to be apart of this project. There are many sites going up that brings you video games on your computer for free. Project 64 gives anyone a working program that gives you games from the past.  The creators of Project 64 can be linked to Rubin in "The Winter Market" by taking something old and outdated and making it into art that is valued by society. Link: http://ezinearticles.com/?Project-64-Roms-Explained&id=1340743 Submitted By: ccarlson8 6 February 2011

How to Make (Robot) Friends and Influence People

This news story from technology review by MIT discusses a new robot who you could have a meaningful relationship with. This piece is related to Sherry Turkle’s concerns about robots having emotional relationships with people. Link: http://www.technologyreview.com/blog/arxiv/23480/ Submitted By: Barbara Zappala

Hacking the Microsoft Kinect

(Hopefully) Everyone by now has seen the news and articles floating around the web about the hacking of the Microsoft Kinect. The website Adafruit put up a bounty for intrepid hardware hackers, awarding $1k to the first person to successfully gain control of their Kinect (bounty was doubled to 2k after microsoft released a statement against hacking its device, and later raised again to $3k after another message from M$). The kinect has been hacked to work on all sorts of devices (including personal computers) and has even been used in robotics applications to generate 3D maps of the robot's surroundings. Link: http://blog.makezine.com/archive/2010/11/hack-the-new-xbox-kinect-and-collec.html Submitted By: --Tswihart3 19:21, 6 February 2011 (UTC)

3D Without The Glasses

Researcher Jonathan Post has figured out a way of watching 3D images without the use of specially synced glasses or Red-Blue stereoscopy. He connects electrodes to the side of his face, and uses small electrical impulses to manually open and close his eyelids at approximately 60 Hz (simulating the method that the glasses use). This controversial method is being doubted by many, as the video does not show absolute proof that the images are presented in 3D. Daito Manabe, in his own experiments, has proven that facial muscles can be specifically controlled through electrodes, and he shows this off in several of his videos, one of which I will also present. This connects with many of our stories that talk about mixing machine and human parts, such as P. Burke controlling Delphi and Lise's exoskeleton. Links: Jonathan Post Daito Manabe --Jmicali13 19:20, 6 February 2011 (UTC)

US Government Cracking the Chinese Firewall

The Internet is the current epitome of open-source information. We have near-instant access to more information than was ever before thought possible. Yet, in an "interesting" hack, the Chinese government prevents its citizens from accessing certain information, such as getting truthful and updated news. Recently, however, the United States government has found a way to hack China's hack, and provide Chinese citizens with news and other "vital information" through e-mail. The Hackers of the 1950's would be proud of their country's government for trying to subvert a restriction placed on technology by some authoritative figure. Link: http://www.foxnews.com/politics/2011/02/05/government-slips-china-internet-censors-new-technology/ --cgolden3

=== Integrating Minecraft with Microsoft Kinect ===

Nathan Viniconis initially started with making static monuments using the Kinect to break down images and recreate them using the blocks that make up the minecraft world. He then took it one step further to make the monoliths actually move. This is a brilliant hack of both Minecraft and the Kinect. Link: http://www.geek.com/articles/games/kinect-hack-builds-living-minecraft-monuments-20110124/ Submitted By: Eric Flynn

Remote Camera Trigger Built From Air Freshener Parts

After looking at an automatic Glade air freshener that releases fragrance every few minutes, an intrigued hacker decided to take this mechanism and apply it to a digital camera.  He even added a custom timer to change the 9, 18, or 36-minute standard timer settings. Link: http://http://hackaday.com/2011/02/04/remote-camera-trigger-built-from-air-freshener-parts/ -sgilmore7

Wikipedia Works to Close Gender Gap

The Wikimedia Foundation has found that only 13% of all Wikipedia contributors are female and hopes that this will grow to 25% by 2015. Some, like the New York Times, are claiming that the goal to include more women runs counter to the culture of Wikipedia which is heavily influenced by standard hacker culture as discussed in Steve Levy's "Hackers". Kat Walsh, a member of the Wikimedia board said that Wikipedia was allowed to develop naturally into the way it is now and to change it to make it more female friendly would take a lot of work. Link: http://tinyurl.com/4gqfoor Submitted By: David Garcia [[|]]

Edison Clock

Read the article here. The article discusses how old ammeters and possibly vacuum tubes are used to create an alarm clock which relates to The Winter Market where Rubin makes trash from "junk". Tanner 20:25, 6 February 2011 (UTC)

Netbook Arcade Machine

The author of this article finds a new/better use for his Netbook by converting it into an arcade machine.  He admits that it is not a simple or cheap DIY project, but in his opinion the final product is entirely worth the effort.  This hack relates to "The Winter Market" because like Rubin, the author decided to find his own use for outdated technology that others might consider junk. 
Link: http://lifehacker.com/5748222/your-netbook-will-be-much-happier-as-an-arcade-machine
-Mengjia Guo

Marcel Duchamp's Toilet Exhibition

This article is about a famous artist from Normandy, renowned for submitting a very unorthodox piece of art to a gallery in New York.  This exhibit was one of the first in a series of "modern art."  It was not the artist's intent, however, to spark an art movement from this.  He instead meant to ask a question that is more applicable than ever now.  What qualifies as art?  How do we define art?  Who makes decisions about what is considered art or not?  Sources are here:http://www.guardian.co.uk/books/2008/feb/09/art and here: http://en.wikipedia.org/wiki/Fountain_(Duchamp) ~Benjamin Norton

Portal Speed Run

This video shows a dedicated Portal player who spent two years figuring out tons of glitches in the popular computer game in order to play the game in such a way to by-pass all of its rules and finish in a mere 9 and a half minutes. [2] --Pcarton 21:40, 6 February 2011 (UTC)

=== Repurposing an ATM ===

This article briefly goes over the process of hacking an ATM machine and instantly win.  The hacker who demonstrates this is Barnaby Jack as he describes the weaknesses of ATMs and his method for turning one into his personal lottery machine.  Sources: http://www.wired.com/magazine/2011/01/st_howtoatm/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+wired/index+(Wired:+Index+3+(Top+Stories+2))

Facebook Marriages

Apparently, the most common relationship status on Facebook is that of "married." This article makes some quick connections and suggests that this is because most couples wait until they are married in real life to change their Facebook relationship status to anything. This trend is the basis for an interesting claim that a Facebook marriage status is the most serious commitment of all. This relates to class themes because it shows how interconnected personal lives are becoming with technology. [3] Ismith30 22:42, 6 February 2011 (UTC)


Tokyo Man Marries Video Game Character

A man decides to perform a real live marriage to an in-game girl. It brings up whether or not this was a sign of addiction gone too far. What the article describes is an example of what Turkle describes as an emotional connection with technology instead of human interaction. Source: http://articles.cnn.com/2009-12-16/world/japan.virtual.wedding_1_virtual-world-sal-marry?_s=PM:WORLD Submitted by: Wisdom Chen

Ghost in the Shell

A true masterpiece of Japanese Cyberpunk. Written by Masamune Shirow, the story take place in a future cyberpunk world. Section 9 of Japanese National Public Safety Commission, is a elite police squad dealing with network security threats. The most dangerous threat comes from the hackers in the story, the hacker invade human's brain and control victims to serve their evil purpose, fake memory will be implanted after the invasion to make the case even harder to solve. Here is a brief introduction of Ghost in the shell series on wikipedia. http://en.wikipedia.org/wiki/World_of_Ghost_in_the_Shell - Linfeng Liu

Turn Old PC Fans into Battery-Recharging Wind Turbines

This article correlates to how Rubin reuses "junk" in the story of "The Winter Market". This article is about turing old computer fans into wind turbines. These homemade wind turbines are powerful enough to recharge batteries for other power-hungry devices, and it saves lots of energy because it saves wall outlets. It is convenient and is an easy job to do. http://lifehacker.com/5677756/turn-old-pc-fans-into-battery+recharging-wint-turbines; Submitted by: Tamara Corbett

Getting Around Not Having Internet

With the ongoing tension in Egypt and the government there still grasping for control by cutting off the Internet, people have developed away to get around lack of Internet access, using a voicemail service as a medium for tweeting.  This real-world struggle illustrates the question brought up in both "The Winter Market" and "Hackers":  who gets to decide how technology is used--the general public or an elite few? http://gizmodo.com/5748203/those-with-limited-internet-access-can-call-these-numbers-to-tweet-egypt-news  ----Stephanie Lui

TedXVienna talk on "context hacking"

ohannes from Vienna arts/pranks/tech collective Monochrom gave this fun TEDxVienna talk on "context hacking" -- making pranks out of pranks, subverting subversion, transcending mere grossouts, and being melancholic postmodern leftists. http://www.youtube.com/watch?v=K2Rvh8VG3o8&feature=player_embedded; Submitted by: Chris Antley


Craft an iPad Stand from Chopsticks

This article shows how you can make a great iPad Stand out of chopsticks. Chopsticks is something that most people would consider as trash, but in this article they are showing that they can be used for other things than just eating Chinese food. This is a great example of how "The Street Finds Its Own Uses Of Things". http://lifehacker.com/5752661/craft-an-ipad-stand-from-chopsticks . Submitted by: Frida Fogdemark

NFL Teams May Replace Playbooks with iPads

In this article the head of technology for the Dallas Cowboys, Pete Walsh, discusses that NFL teams may replace their traditional paper play books with IPads. The article looks into the possible benefits of using the iPad and how it could change the way a playbook is used in the NFL. http://apple.slashdot.org/story/11/02/06/1220207/NFL-Teams-Considering-IPads-To-Replace-Playbooks Submitted by: Danielle Hamilton Carter

Robo Rainbow graffiti machine

This article and video shows how easily robo rainbow graffiti machine could be built up and used. It's a simple technology that gave non graffiti artist a easy way to help decorate the city and made people happy and enjoy the technology. The machine only use several part from bicycle, a screw driver, several frames and a controller to build up and easily installed on the bicycle and move it to everywhere you want to decorate. The idea is brilliant and the result is awesome as well. robo rainbow graffiti machine article video and photos --Submitted by Mc


Hackers use a medical server to host Call of Duty

A medical server that stores very private information on the patients of the owners is used by some hackers to play of Call of Duty: Black Ops. This is a good parallel to "Hackers" because it shows what happens when certain consequences aren't considered. Another good way of thinking about it is 'What would happen if Rubin stole his materials?' www.theregister.co.uk/2011/01/14/seacoast_radiology_server_breach/ -submitted by Blaise Hymel

High School Boy telecommutes with Robot

A boy suffering from Polycystic Kidney Disease is unable to attend school due to a weak immune system. Thus, a 4 foot robot, a Vgo, attends class for him in school and is equiped with a webcam and software that allows the boy to communicate and make friends. http://www.tomsguide.com/us/High-School-Telecommute-Robot-Video-Conference,news-9998.html Submitted by Chris Aguilar

Custom Enclosures Made of Paper

This article describes how a guy used papier mache to create a custom enclosure for an electronic device. Although not necessarily practical, the enclosure definitely has artistic value, much like some of Rubin's inventions. Moreover, the hack is constructed with junk (used paper and cardboard are usually considered "junk" by today's society). http://hackaday.com/2011/02/05/custom-enclosures-made-of-paper/ Submitted by Lorenzo Tolentino

Star Wars, Metroid and Zelda Vintage NES Games Turned into 1TB External Hard Drives

The people at Etsy.com have repurposed some old NES cartridges by turning them into 500GB, 750GB and 1TB external hard-drives. This is done much like Rubin finds "junk" to repurpose. http://blogs.laweekly.com/stylecouncil/2011/02/zelda_star_wars_nintendo_hard.php - submitted by Kyle Spoerke


Turn an IKEA organizer into an awesome and Cheap Photography Soft Box

explains how you can save up some money for a new camera by making your own photography soft box from an IKEA organizer http://lifehacker.com/5752697/turn-an-ikea-organizer-into-an-awesome-and-cheap-photography-soft-box - submitted by Cody Jung


Database to foil yoga copythieves to launch

This blog is about the creation of an open Indian database where all yoga postures will be. It is supposed to protect the true practice of yoga and stop the self-styled "yoga gurus" from claiming copyright to ancient yoga practices. They have documented about 1300 different postures and are soon going to be uploaded on the country's Traditional Knowledge Digital Library.


Hamster-Powered Walker

Using a "mini-strandbeest" walker hacked together with a frame and a hamster ball, this guy created a hamster-powered walker. The mini-strandbeest is a wind-powered walker-thing built as a miniature model of the huge strandbeests of Theo Jansen, a kinetic sculptor. This guy replaced the wind-power with hamster-power, which relates to the hacking themes explored by Gibson and others. http://crabfuartworks.blogspot.com/2011/02/hamster-powered-walker.html - Submitted by Christopher Hood


SIGSALY Phone Encryption

During WWII, Allied leaders Franklin D. Roosevelt and Winston Churchill needed a safe method of communicating war strategies across the Atlantic Ocean. Their first attempts were done using a standard telephone. The Axis powers easily spliced into the phone lines and heard every word the two leaders said to each other. The two countries came up with the SIGSALY system (or "Green Hornet"). It basically laced their voiced with white noise. This system has never been broken, even to this day. It relates to our readings in the sense that "the street does find it's own use for things." But, in this case, "the street" is the governments of the Allied powers and "the things" in question were computers design for rudimentory tasks. http://en.wikipedia.org/wiki/SIGSALY and http://www.youtube.com/watch?v=23wEmj-EWVI from 1:30 to 5:30


Hacking the Wiimote

This video shows how a Nintendo Wiimote is hacked and turned into a multi-touch whiteboard easily and at a lost cost and limited materials. They only used infrared light pens other than the remote itself. http://www.youtube.com/watch?v=5s5EvhHy7eQ&feature=player_embedded - Submitted by Darren Sanders


Kinect Hacked to Perform Surgery

The Kinect has been subject to a slew of media attention due to its various applications people have formulated using its depth and tracking capabilities. It’s been used to innovate the way we interact with games, and model images. However, its capabilities may have a place in the medical field. Engineering students at the University of Washington have developed software for the Kinect so that it maps out three dimensional images of a patients’ body in surgery. Robots will then be able to use these three dimensional maps to precisely perform surgery. The Kinect was originally manufactured as a peripheral for the Xbox 360 to creatively interact with games. This relates to how in Steven Levy's Hackers, a group of MIT hackers uses the concept of using a tool and re-purpose that tool for other uses. [4] xjo0nn - Joon Ki Hong


Homemade "Segstick"

This article details a "segstick" constructed of a broomstick, two power drills, and various other electrical components to provide power to the drills. The article relates back to Rubin of "The Winter Market" in that it demonstrates the use of "junk" and finding new uses for this "junk" to create original works of art and technology. http://hackaday.com/2010/12/27/mit-inspired-impromptu-segstick/ - Submitted by Curtis Luckey


Printable Wax for PCB Etch Resist

For DIYer's, getting etch resists on a PCB board can be slightly annoying. A popular method is to print toner to an transparency and transfer it onto the PCB board, however is not always that simple to do. This person managed to repurpose a printer to directly print wax on the PCB to act as a etch resist. http://hackaday.com/2011/01/31/printable-wax-as-pcb-etch-resist/ - Submitted by Bryant Menn


Automatic camera trigger built from an automatic air freshener

In this video a man shows off his automatic camera which he built using the motion sensing technology out of an air freshener. He is like Rubin in "The Winter Market" making something of use out of an almost worthless air freshener. http://www.ubergizmo.com/2011/02/automatic-camera-trigger-air-freshener/#more-62795 - Submitted by Michael Trimberger

Building a Remote Control UAV including a fireworks armament

This entry on HackADay.com covers the design and testing of a tricopter configuration UAV device. The device is driven by a remote operator and has a camera that allows the operator to control the device. The maker of this video also equipped fireworks as a dummy armament to destroy hydrogen filled balloons. This hack exhibits class themes because he uses a open-source controlling system and other devices that were not designed for this purpose. He found his own use for things. See the HackADay article for more. Submitted by Andrew Dehn

Virtual Idol

Hatsune Miku is a Japanese singing/song synthesizing program that thousands of composers utilize to create music. What's unique about this program is that the synthesized vocals are "sung" by the titular virtual character, Miku. While the program itself does not create the music (the user does), the creative lines between man and machine are quite blurred by the program's cute, spunky, virtual girl happily singing the lyrics to a song. No longer is music the sole domain of man and his skill with some instrument, room must be made for Miku and her virtual singing prowess.

While the above demonstrates a few more general themes of sci-fi (AI, Humanity and Robotics, etc.), the extreme popularity of Miku highlights many of Turkle's points in "Programmed for Love". Why go to a Kelly Clarkson concert when you can go to one of Miku's virtual, holographic concerts? The first Hatsune Miku concert was held on March 9, 2010 and attracted thousands of attendees and viewers on NicoNicoDouga (a Japenese version of Youtube). Miku presents producer's with a variety of benefits, not only is Miku's repertoire of music constantly expanded by thousands of eager fans and composers, Miku never gets sick, goes on hiatus or overdoses on drugs. She is perfect like Delphi from "The Girl Who Was Plugged In", and her popularity may soon take the world by storm. http://en.wikipedia.org/wiki/Hatsune_Miku http://www.youtube.com/watch?v=DTXO7KGHtjI Submitted by: Eric Yu

Using Mac OS on PC Hardware

a.k.a. a "hackintosh." This is actually the project of one of the groups in the Famiglietti' English class. Applies to class themes presented in the nonfiction reading, Hackers in which the hackers went against the corporate ideals of hardware use, particularly IBM. However in this case it is the hacker going against Mac's hardware restraints. Source: http://tonymacx86.blogspot.com/2010/04/iboot-multibeast-install-mac-os-x-on.html http://comosus.wordpress.com/

Wikiscanner

This Wired article discusses about Virgil, a young american hacker, who created a project called WikiScanner (It uncovers all the anonymous wiki edit by tracing the ip address.). This article gives you an insight of a modern hacker. Virgil used "junk" information from anonymous users into something more useful like Rubin in the story "The Winter Market". in Submitted by Ky Lee

The Future of Video Games

The following link shows one of the newest yet most overlooked gaming systems today. The game system is called OnLive. This system is different than any other because it does not require any CDs, DVDs, or game cartridges to function. It is completely run on cloud computing. This relates to Tiptree's, "The Girl Who Was Plugged In" because Delphi was completely run by cloud computing through someone else. Link: http://www.onlive.com/corporate Submitted By: Michael Kersh



Recent Company Hacks 

Even though nothing was touched, a man or woman hacked into NASDAQ and could have caused alot of damage. The HackerCup was pretty recent, and reports of all kinds of hacks are popping up across the country, including the creator himself, Mark Zuckerberg as even he wasn't above getting his account hacked. These links shows the extent that hackers can go. NASDAQ Link http://money.cnn.com/2011/02/05/technology/nasdaq_hacked/index.htm  FACEBOOK Link: http://www.guardian.co.uk/technology/blog/2011/jan/26/mark-zuckerberg-facebook-fan-hack-investigation  Submitted By: Joshua Lill

RepRap

This is a project to create a cheap, open source, and self replicating 3d printer. Commerical 3d printers cost tens of thousands of dollars, but the RepRap is only a couple hundred. Further more, it can print most of its own parts. This culture surrounding this project is a lot like that described in Hackers. http://reprap.org/wiki/Main_Page Submitted by Robert Grosse
To quote the homepage: "RepRap is about making self-replicating machines, and making them freely available for the benefit of everyone. We are using 3D printing to do this, but if you have other technologies that can copy themselves and that can be made freely available to all, then this is the place for you too."

Antifeatures

Benjamin Hill gives a lecture on the advantages of free software by documenting some of the "antifeatures" that software comes with, things that make your cell phone drain 3rd party batteries quicker, or have your printer reject non-standard ink. These "features" go directly counter to Gibson's argument that "the street finds its own uses for things" by making "the street" unable to do anything. Link: http://www.boingboing.net/2011/02/05/antifeatures-deliber.html Submitted by: Jordan Mayhue

Kepler's list

A large list of (possibly) habitable planets has been compiled by a team of scientists. This information is more or less freely available to the community to scour and search-- allowing many more eyes to see it than something done "behind closed doors." This is a project that could have some serious repercussions for the scientific community. It is basically the antithesis of the "antifeatures" listed previously, it's something that allows everyone to participate. Link: http://www.boingboing.net/2011/02/07/exploring-keplers-li.html Submitted by: Jordan Mayhue

Open source backgrounds for Android

This project gives everyone access to wallpapers for their phone from basically any site that they would like. It follows Gibson's idea of "the street finds its own uses for things" because it shows how one person's idea can be made marketable to the masses. Link: http://lifehacker.com/#!5753887/weblivewallpaper-sets-web-sites-or-image-galleries-as-your-android-wallpaper Submitted by: Jordan Mayhue

Analog LED clock

A project like this would make Rubin himself proud, by using LEDs from other sources, and putting them together, you can create your own animated analog clock. While the uses of this are somewhat limited, it does look quite neat. Link: http://lifehacker.com/classic#!5752752/craft-an-analog-clock-with-digital-guts-and-led-animations Submitted by: Jordan Mayhue


How To Become A Hacker

Interesting article that puts you in the mindset of a hacker. It's a guide the tell you step by step how to think and act like a hacker. It's not as interesting as actually changing something but it is nice to know how we should actually feel when doing sorts of things. http://www.catb.org/~esr/faqs/hacker-howto.html Submitted by: Tanner Shirah


Fake robot baby provokes real screams

Just after we discussed the uncanny valley in class i stumbled upon this recent video of a project at Osaka University in Japan that attempts to create a robot baby that can produce the facial experessions that will evoke emotions similar to that of a real  baby. It can also create screams that mimic a baby's screams. http://www.engadget.com/2011/02/08/fake-robot-baby-provokes-real-screams-video/ Submitted by: Jarvis Johnson

How to Hack Social Behavior

This article discusses ways to analyze one's social behavior and observe it in a way that one can fix weak points in their actions. This relates to the thought of people's own ability to define their society as we have talked about in Neuromancer. By hacking their own social behavior, people can, as a whole, control the direction their society moves. http://lifehacker.com/#!5760650/how-to-hack-social-behavior

http://danariely.com/2011/01/20/social-hacking/

Submitted by: Partha Unnava


IBM Watson

IBM is not known for being cool.

At a party thrown by IBM a couple weeks ago in San Francisco to celebrate the company's 100th birthday this year, what stuck out most wasn't the video demonstration of 100 years of innovation (IBM invented the barcode!) or the great appetizers or the free-flowing wine.

It was the grey hair.

That's no knock against IBM -- the company has some very smart people doing some weird and fascinating things, like Keith Dierkz, the director of the company's Global Rail Innovation Center, who spends his working days studying traffic and how to improve it.

Still, in Silicon Valley, where the cool kids work at Google and Facebook and Twitter and the startup of the week, IBM stands out as a bastion of ... let's call it maturity.

Which is why the IBM computer Watson's victory on Jeopardy last night is so amazing. Yes, it's a great feat for artificial intelligence -- Google can't recognize natural language queries. But as FINS reports today, Watson is accomplishing something even more important: it's making college kids want to work for IBM again.

IBM coordinated the computer's Jeopardy appearance with 58 visits to college campuses, and more than 10,000 students sat down to watch the show at parties.

Now, college students who never even considered IBM as a place to work have put it top on their list, and a lot of students are reaching out to the Watson team directly. They're realizing that IBM has a huge patent portfolio and impressive budget for pure research, and they want to be part of it. Yes, IBM still makes most of its money selling mainframe computers and consulting services. But the company has a long legacy of innovation as well.

In case you haven't been paying attention, IBM has also been on a roll financially: the company laid out an ambitious set of five-year earnings targets in May, and so far it's been right on track. Moreover, the stock price in the last year has outpaced nearly every other large-cap tech company -- including Google -- with the exception of Apple. Link:http://www.businessinsider.com/ibms-watson-may-have-accomplished-the-impossible-2011-2


Junkyard fish tank

This particular hack isn't very technological or complicated as many of the ones we usually see on this wiki or talk about in class. This one is about man who had to much clutter around his house but didn't want to through it away. So what does he do, He build a fully functional fish tank. This one fits into our theme that the street finds its own use for things. [5] Submitted by: Andrew Dehn


FreedomBox: wall-wart firmware to provide privacy and route around censorship

This is a project to provide privacy and ways to route around censorship in normal times. This is done by setting up various linux routers all over the place. The founder is planning to make the technology much more accessible so that it is much easier for people to use. [6]


Pace Makers Found venerable to Hacker Attacks

Here it is. It is a news article of New York Times presenting a theoretical security flaw in many critical medical equipment. The hacking breach was attempted as a test to see if it could be done by a team of computer security researchers. "They were able to reprogram it to shut down and to deliver jolts of electricity that would potentially be fatal — if the device had been in a person." There has been a suggestions to “incorporate encryption and security technologies designed to mitigate these risks.” None the less, vulnerability of technology to other technology presents a major concern with our technologically dependent society. How can we be truly safe? Security has to be more advanced then growing trends, yet it relies on technology itself to create a sense of protection.


Anonymous Security Firm Hack Used Every Trick in the Book

Security firm HBGary was recently hacked by Anonymous and had many of its secrets exposed to the public. Anonymous used a mixture of SQL injection, weak password security, and social engineering to hoodwink top officials in the firm. Hacking their passwords through websites lke Twitter and LinkedIn, Anonymous was able to access the mainframe of the firm and extract vital information from a remote location. Though not a classical "hack," this is a literal computer hack, and as such is deemed worthy olf inclusion. --cgolden3 05:34, 18 February 2011 (UTC)

http://www.theregister.co.uk/2011/02/17/hbgary_hack_redux/ http://arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars/

Sony Responds to PS3 Hacking

Due to the recent popularity of people hacking or jailbreaking their PS3s, Sony has officially announced that "Consumers using circumvention devices or running unauthorized or pirated software will have access to the PlayStation Network and access to Qriocity services through PlayStation 3 System terminated permanently." Also, Sony has been attempting to take legal action against the hacker of the PS3 along with sending DMCA takedown notices to anyone hosting the "fail0verflow" tool. http://www.g4tv.com/thefeed/blog/post/710491/Sony-Issues-A-Statement-About-Hacking-The-PS3-Urges-Gamers-To-Delete-All-Unauthorized-Content.html Submitted by Kyle Spoerke


Gamerator, Arcade Cabinet Plus Keg, Available Now

This company has combined things that people love the most by creating a cabinet that combines 85 classic arcade games, a fully functioning keg tap as well as a refrigerated interior, and a 26 inch LCD screen. http://www.g4tv.com/thefeed/blog/post/710532/Gamerator-Arcade-Cabinet-Plus-Keg-Available-Now.html Submitted by Kyle Spoerke


Wintermute AI

Connecting directly to Neuromancer, this open source project aims to bring Artificial Intelligence to the Ubuntu Operating System. Read up for more info WintermuteAI --Jmicali13 16:41, 18 February 2011 (UTC)

Immaterials: Light painting WiFi

A group of Oslo-based designers and researchers created a "WiFi visualizer" that, combined with light painting techniques, allowed them to visually document WiFi strength throughout parts of Oslo. By manifesting in the physical world the invisible realm of WiFi communication, and in a sense the Internet itself, the work of this group embodies many questions raised in class relating to the division of physical reality and cyber-reality. Also, by plainly showing people such a pervasive yet largely unnoticed element of life, the trust in the inherent truth of one's own individual perception of reality is challenged.
Link: http://yourban.no/2011/02/22/immaterials-light-painting-wifi/ and here Submitted By: E.t.dale 23:21, 2 March 2011 (UTC)


Kinect to get Windows drivers months after open source drivers were developed

After Microsoft refusal to released the drivers for the Kinect , Johnny Chung Lee, a worker for Microsoft, supported the Adafruit’s Open Kinect Contest. This contest would have reward the first person to hack the Kinect a sum of money. This led to the development of open source divers for the Kinect. This then in turn made Microsoft release their own version of the drivers so that anybody can develop applications for the Kinect. http://hackaday.com/2011/02/22/kinect-to-get-windows-drivers-months-after-open-source-drivers-were-developed/ Submitted by Jonathan Pham

Anonymous Hacks Westboro Church

Probably the same "Anonymous" group that struck a few entries above, recently "Anonymous" has struck again. This time their target was the Westboro Baptist Church, a group that had specifically challeneged "Anonymous" in an online letter last week. During a radio show involving a spokesperson of the church and a member of the "Anonoymous" hacker group, the official website of the church was hacked and its contents defaced to show a message from "Anonymous," that "despite having the capability to hack your sites previously, we chose not to." Later the hacking group tweeted that "#WBC was more leet than #HBGary. It took #Anonymous a 0day to get in their network, not some public SQL." "Anonymous" draws some parallels with the high-tech street gang the "Panther Moderns" from Neuromancer. Both groups contain members who have shifting, unstable identities and perform questionable acts of "good" cyber-terrorism. Submitted by Eric Yu http://www.computerworld.com/s/article/9211305/Anonymous_hacks_church_Web_site_during_live_interview?taxonomyId=82&pageNumber=1

3 teens behind internet crime forum Gh0stMarket get jail

The Guardian reports that three UK teenagers who created and ran "one of the world's largest English-language internet crime forums," described in court as "Crimebook", have been sentenced to up to 5 years in jail. Authorities estimated that losses from credit card data traded over Gh0stMarket.net totaled more than $26 million dollars. Threatening to blow up the head of the police unit in charge of internet crimes after an earlier arrest was probably an unwise move. Submitted by Chris Antley http://www.guardian.co.uk/uk/2011/mar/02/ghostmarket-web-scam-teenagers

The Rise of AI's

Guild Wars is a five- to six-year old MMORPG, which has kept an active gamer population throughout the years. In turn, Anet -- the company behind the creation to today's maintenance -- continues to update the game while working on Guild Wars's sequel. However the changes recently made to Guild Wars have continued to bring a questionable change -- the rise of AI's a.k.a. "Heroes." Ever since a player strike from fall 2005/2006, the rise of heroes have been well underway but since the release of the last campaign "Nightfall," the growth of heroes have been controlled and limited. Provided the maximum size of a party is eight, heroes at the time of Nightfall were limited to 3. With the recent update, the number of heroes possible in a maximum party has reached the highest maximum available -- 7. In addition to the increase of heroes, a purchasable item is called the mercenary hero, which can be created from a player's own character. After reading Neuromancer and other assigned readings like the "Winter Market" and "Flesh Made Word," is increasing the number of AI's a good development in the long-run or short-run considering the trade-offs such as the decrease of interaction between players? Submitted by kvicente3 http://www.guildwars.com/gameplay/developer_updates/destination_embark_beach.php


Ashton Kutcher's Twitter Account Hacked

In a delectable turn of irony, the Punk'd star's Twitter account was hacked recently. While not incredibly interesting in and of itself, the second tweet the hacker posted was

"P.S. This is for those young protesters around the world who deserve not to have their Facebook & Twitter accounts hacked like this. #SSL"

This is obviously a nod to the young tech-savvy middle easterners living in turmoil right now. Pretty interesting use (misuse) of social media in a way thoroughly unintended by the users and Mr. Kutcher himself. http://latimesblogs.latimes.com/technology/2011/03/ashton-kutchers-twitter-account-gets-hacked-at-ted-conference.html

--cgolden3 14:51, 4 March 2011 (UTC)

Using Google for Hacking

The page in the following link mentions using Google as a tool for hacking personal information and security cameras. Personally I couldn't believe that people would leave sensitive personal information on the internet in places that are searchable by Google. I gave some of the searches a try and they appeared to work better than expected. This relates pretty closely to how Case and other members in Neuromancer would hack into other computer mainframes to change information and steal it for their own use. Submitted by mkersh3 Link : http://www.bbc.co.uk/news/technology-12400647

Robots in Action

Cracked.com recently had an article called "The 7 Creepiest Robots to be Seen in Action", the article had 7 different robots, complete with videos of them in action. Cracked.com doesn't write serious articles, and this one is suppose to be more funny and slightly satiricle than it is serious, but the videos are really cool. Submitted by: Joshua Lill Link: http://www.cracked.com/blog/the-7-creepiest-robots-to-see-in-action/


Nintendo 3DS Hacked within first 24 hours of release

Nintendo's "unhackable" device gets exploited incredibly quickly. Come on big N, you should know better than provoke the hacking community. www.pcmag.com/article2/0,2817,2381021,00.asp

Real Life Like Robot Professor

While searching the internet for entertainment, and boredom, I stumbled upon this little article which, kind of scared me. It was a picture of a guy, dressed like a professor, and it looked real. I clicked on the link, only to find out that this guy, was actually a robot, needless to say, I was creeped out. It really is quite amazing, and a great read. Author: Joshua Lill Link: http://www.crunchgear.com/2011/03/04/is-this-uncanny-valley-scaling-robot-a-hoax/?icid=main%7Chp-laptop%7Cdl8%7Csec1_lnk3%7C205134


=== Japanese Elderly Reject Robotic Help ===

This news story from the BBC discusses how elderly people in Japan dislike the use of robotic caretakers in nursing homes. This piece speaks directly to Sherry Turkle's concerns about human beings forging emotional connections with machines. Unlike the people in Turkle's examples, however, these Japanese nursing home patients are rejecting their mechanical helpers emotionally. Link: http://www.bbc.co.uk/news/business-12347219 Submitted By: Dr. Famiglietti

Hacker Gets Revenge On Desktop Thief

In this video, a hacker tells a story at a convention about how he used his knowledge about technology to track down his stolen computer almost two years later, using the power of the internet. In addition to being a more literal example of hacking as well as a lesson about physical and digital security, it relates to our story "Hackers" in which the characters find new and innovative ways to repurpose technology for their own uses. Link: http://www.i-am-bored.com/bored_link.cfm?link_id=55806 Submitted By: Michael Smith

Understanding the Power of Video Games

In the following link, a short article and corresponding video elaborates on the idea of video games teaching valuable life lessons. For example, the article hints about an individual gaining more self-confidence by controlling an avatar for 90 seconds, which is initially argued by the hostman saying playing video games is about escapism. The article provides some counterargument to Sherry Turkle's example of the physics student becoming more withdrawn from society than before after partaking a MUD. Link: http://kotaku.com/5752162/stephen-colbert-tries-to-understand-the-power-of-video-games Submitted By: kvicente3 

In Search for Intelligence, a Silicon Brain Twitches

The Wall Street Journal reported a few years ago about a development at the Blue Brain Project in which simulated portions of a generic rat brain spontaneously demonstrated "natural" neural activity. Although this is not a recent article, it strikes a chord with many of the themes discussed in class, such as the ability to simulate a human mind and the distinction between a virtual entity and a natural entity. The Blue Brain Project's results suggest that, when a brain is simulated with anatomical accuracy, it may not be possible to locate the dividing line between a "real" person and a "fake" person, as discussed in "Flesh Made Word."
Link: http://online.wsj.com/article/SB124751881557234725.html#articleTabs%3Darticle Submitted By: E.t.dale 17:11, 5 February 2011 (UTC)

=== USB Drive Inside a Floppy ===

This DIYer decided to put a promotional usb drive to good use by stuffing it inside of a floppy disk. This act of taking "junk" and turning it into a form of art relates back to Rubin in "The Winter Market". Link:http://www.flickr.com/photos/charles_mangin/sets/72157625250155063/
Link:http://www.youtube.com/watch?v=ojNYill9oBM Submitted By: Taylor Riggs

N64 Advance portable gaming system

This article is about a person who felt a passion for the N64. So much so that he went on to build a portable version of the N64 by using different parts from the system and other systems like the PlayStation one. This relates to the theme learned from Steven Levy's "Hackers." The people in this story were fascinated by the computers and made amazing thing by using it like this person did with the N64. Link: http://hackaday.com/2011/02/05/n64-advance-portable-gaming-system/ Submitted By: Jpham7

Yoga Database to Foil Yoga Copythieves

A open database of all yoga postures will go live in India soon. The purpose is to stop self-styled yoga gurus from claiming copyright to ancient "asanas." The database will contain 1,300 "asanas," which will soon be uploaded on the country's online libaray. Now if someone claims they inveneted an "asana" they can be checked if they really have invented the poses through this database. Noe if anyone applies for a patent on yoga, they can be checked using this database. This presents the same idea as in Steven Levey's "hackers," whether information should be free or not. This supports that information is out there for everyone to use just like the "hackers" would have wanted. http://boingboing.net/ Submitted by Sriram Suresh

Canadian ISPs are Taking Control of the Web

This story from arstechnica directly battles the question "Who decides how technology will be used?" Since the internet is the most prominent and widespread technology of our day, any kind of entity which tries and limits it (as we've seen in Egypt) suddenly gains power and control. Link: http://arstechnica.com/tech-policy/news/2011/01/canada-gets-first-bitter-dose-of-metered-internet-billing.ars Submitted By: CC Rossi

Man from Georgia Creates and Dates Three Robots 

In this following article, an introverted man from Georgia creates three robots to fulfill specific relationships in his life: a friend, mistress, and wife. This unidentified man designed robots for himself because he struggles interacting with other people and believes that "humans are so biological and messy." He considers humans as being a flawed type since they can possess many diseases such as STDs. This story relates to Turkle's theme in "Programmed for Love" which argues the legitimacy of loving robots and technology. http://gizmodo.com/367698/technosexual-one-mans-tale-of-robot-love
Submitted By: Ross Lucier

10µm Scanning Electron Microscope from an old vidicon tube

The following links are of one person's experience of building an electron microscope from an old vidicon tube. A vidicon tube is a video camera tube design in which the target material is a photoconductor. The Vidicon was developed in the 1950s and the technology was used by NASA for the Galileo probe in the 70's. http://hackaday.com/2011/02/06/10-µm-scanning-electron-microscope-from-vidicon-tube/ http://www.coultersmithing.com/forums/viewtopic.php?f=10&t=172

Hacker Holds Video Game Hostage

The following article concerns a particular player of a MMO that was dissatisfied with the state of the game's moderation and treatment of players. His response was to hold the personal information of over 3 million users until his needs were met. Link: http://kotaku.com/5735250/hacker-holds-video-game-hostage Submitted By: Jarvis Johnson

Ex-Girlfriend Gets Revenge by Turning Boyfriend Into a Meme

The following article is written about a girlfriend who, after being dumped by her boyfriend, took a photo of him and uploaded it to the internet as a meme. She uploaded over 60 photos all with different (insulting) captions to a myriad of websites so that upon searching his name in Google Images, one would find all of these photos. This relates to Steven Levy's "Hackers" in which hacking was talked about as a culture that takes a tool and re-purposes it; in this case that tool was Google images and it was used to humiliate an ex-boyfriend. Link: http://gizmodo.com/5752857/ex+girlfriend-gets-revenge-by-turning-boyfriend-into-a-meme Submitted By: Partha Unnava

Steampunk CD Player

This CD player is created out of old materials that would often be seen as junk, but the creator chose to use them for something productive. This relates to the Winter Market, and how Rubin makes things out of what other people consider trash. http://hackaday.com/category/digital-audio-hacks/ Submitted By: Nick Orangio

Project 64

Why do you need a Nintendo 64 to play Nintendo games? Project 64 allows you to play all the biggest Nintendo game hits anytime on your own computer. Along with that, this costs nothing, but a download for any user wanting to be apart of this project. There are many sites going up that brings you video games on your computer for free. Project 64 gives anyone a working program that gives you games from the past.  The creators of Project 64 can be linked to Rubin in "The Winter Market" by taking something old and outdated and making it into art that is valued by society. Link: http://ezinearticles.com/?Project-64-Roms-Explained&id=1340743 Submitted By: ccarlson8 6 February 2011

How to Make (Robot) Friends and Influence People

This news story from technology review by MIT discusses a new robot who you could have a meaningful relationship with. This piece is related to Sherry Turkle’s concerns about robots having emotional relationships with people. Link: http://www.technologyreview.com/blog/arxiv/23480/ Submitted By: Barbara Zappala

Hacking the Microsoft Kinect

(Hopefully) Everyone by now has seen the news and articles floating around the web about the hacking of the Microsoft Kinect. The website Adafruit put up a bounty for intrepid hardware hackers, awarding $1k to the first person to successfully gain control of their Kinect (bounty was doubled to 2k after microsoft released a statement against hacking its device, and later raised again to $3k after another message from M$). The kinect has been hacked to work on all sorts of devices (including personal computers) and has even been used in robotics applications to generate 3D maps of the robot's surroundings. Link: http://blog.makezine.com/archive/2010/11/hack-the-new-xbox-kinect-and-collec.html Submitted By: --Tswihart3 19:21, 6 February 2011 (UTC)

3D Without The Glasses

Researcher Jonathan Post has figured out a way of watching 3D images without the use of specially synced glasses or Red-Blue stereoscopy. He connects electrodes to the side of his face, and uses small electrical impulses to manually open and close his eyelids at approximately 60 Hz (simulating the method that the glasses use). This controversial method is being doubted by many, as the video does not show absolute proof that the images are presented in 3D. Daito Manabe, in his own experiments, has proven that facial muscles can be specifically controlled through electrodes, and he shows this off in several of his videos, one of which I will also present. This connects with many of our stories that talk about mixing machine and human parts, such as P. Burke controlling Delphi and Lise's exoskeleton. Links: Jonathan Post Daito Manabe --Jmicali13 19:20, 6 February 2011 (UTC)

US Government Cracking the Chinese Firewall

The Internet is the current epitome of open-source information. We have near-instant access to more information than was ever before thought possible. Yet, in an "interesting" hack, the Chinese government prevents its citizens from accessing certain information, such as getting truthful and updated news. Recently, however, the United States government has found a way to hack China's hack, and provide Chinese citizens with news and other "vital information" through e-mail. The Hackers of the 1950's would be proud of their country's government for trying to subvert a restriction placed on technology by some authoritative figure. Link: http://www.foxnews.com/politics/2011/02/05/government-slips-china-internet-censors-new-technology/ --cgolden3

=== Integrating Minecraft with Microsoft Kinect ===

Nathan Viniconis initially started with making static monuments using the Kinect to break down images and recreate them using the blocks that make up the minecraft world. He then took it one step further to make the monoliths actually move. This is a brilliant hack of both Minecraft and the Kinect. Link: http://www.geek.com/articles/games/kinect-hack-builds-living-minecraft-monuments-20110124/ Submitted By: Eric Flynn

Remote Camera Trigger Built From Air Freshener Parts

After looking at an automatic Glade air freshener that releases fragrance every few minutes, an intrigued hacker decided to take this mechanism and apply it to a digital camera.  He even added a custom timer to change the 9, 18, or 36-minute standard timer settings. Link: http://http://hackaday.com/2011/02/04/remote-camera-trigger-built-from-air-freshener-parts/ -sgilmore7

Wikipedia Works to Close Gender Gap

The Wikimedia Foundation has found that only 13% of all Wikipedia contributors are female and hopes that this will grow to 25% by 2015. Some, like the New York Times, are claiming that the goal to include more women runs counter to the culture of Wikipedia which is heavily influenced by standard hacker culture as discussed in Steve Levy's "Hackers". Kat Walsh, a member of the Wikimedia board said that Wikipedia was allowed to develop naturally into the way it is now and to change it to make it more female friendly would take a lot of work. Link: http://tinyurl.com/4gqfoor Submitted By: David Garcia [[|]]

Edison Clock

Read the article here. The article discusses how old ammeters and possibly vacuum tubes are used to create an alarm clock which relates to The Winter Market where Rubin makes trash from "junk". Tanner 20:25, 6 February 2011 (UTC)

Netbook Arcade Machine

The author of this article finds a new/better use for his Netbook by converting it into an arcade machine.  He admits that it is not a simple or cheap DIY project, but in his opinion the final product is entirely worth the effort.  This hack relates to "The Winter Market" because like Rubin, the author decided to find his own use for outdated technology that others might consider junk. 
Link: http://lifehacker.com/5748222/your-netbook-will-be-much-happier-as-an-arcade-machine
-Mengjia Guo

Marcel Duchamp's Toilet Exhibition

This article is about a famous artist from Normandy, renowned for submitting a very unorthodox piece of art to a gallery in New York.  This exhibit was one of the first in a series of "modern art."  It was not the artist's intent, however, to spark an art movement from this.  He instead meant to ask a question that is more applicable than ever now.  What qualifies as art?  How do we define art?  Who makes decisions about what is considered art or not?  Sources are here:http://www.guardian.co.uk/books/2008/feb/09/art and here: http://en.wikipedia.org/wiki/Fountain_(Duchamp) ~Benjamin Norton

Portal Speed Run

This video shows a dedicated Portal player who spent two years figuring out tons of glitches in the popular computer game in order to play the game in such a way to by-pass all of its rules and finish in a mere 9 and a half minutes. [7] --Pcarton 21:40, 6 February 2011 (UTC)

=== Repurposing an ATM ===

This article briefly goes over the process of hacking an ATM machine and instantly win.  The hacker who demonstrates this is Barnaby Jack as he describes the weaknesses of ATMs and his method for turning one into his personal lottery machine.  Sources: http://www.wired.com/magazine/2011/01/st_howtoatm/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+wired/index+(Wired:+Index+3+(Top+Stories+2))

Facebook Marriages

Apparently, the most common relationship status on Facebook is that of "married." This article makes some quick connections and suggests that this is because most couples wait until they are married in real life to change their Facebook relationship status to anything. This trend is the basis for an interesting claim that a Facebook marriage status is the most serious commitment of all. This relates to class themes because it shows how interconnected personal lives are becoming with technology. [8] Ismith30 22:42, 6 February 2011 (UTC)


Tokyo Man Marries Video Game Character

A man decides to perform a real live marriage to an in-game girl. It brings up whether or not this was a sign of addiction gone too far. What the article describes is an example of what Turkle describes as an emotional connection with technology instead of human interaction. Source: http://articles.cnn.com/2009-12-16/world/japan.virtual.wedding_1_virtual-world-sal-marry?_s=PM:WORLD Submitted by: Wisdom Chen

Ghost in the Shell

A true masterpiece of Japanese Cyberpunk. Written by Masamune Shirow, the story take place in a future cyberpunk world. Section 9 of Japanese National Public Safety Commission, is a elite police squad dealing with network security threats. The most dangerous threat comes from the hackers in the story, the hacker invade human's brain and control victims to serve their evil purpose, fake memory will be implanted after the invasion to make the case even harder to solve. Here is a brief introduction of Ghost in the shell series on wikipedia. http://en.wikipedia.org/wiki/World_of_Ghost_in_the_Shell - Linfeng Liu

Turn Old PC Fans into Battery-Recharging Wind Turbines

This article correlates to how Rubin reuses "junk" in the story of "The Winter Market". This article is about turing old computer fans into wind turbines. These homemade wind turbines are powerful enough to recharge batteries for other power-hungry devices, and it saves lots of energy because it saves wall outlets. It is convenient and is an easy job to do. http://lifehacker.com/5677756/turn-old-pc-fans-into-battery+recharging-wint-turbines; Submitted by: Tamara Corbett

Getting Around Not Having Internet

With the ongoing tension in Egypt and the government there still grasping for control by cutting off the Internet, people have developed away to get around lack of Internet access, using a voicemail service as a medium for tweeting.  This real-world struggle illustrates the question brought up in both "The Winter Market" and "Hackers":  who gets to decide how technology is used--the general public or an elite few? http://gizmodo.com/5748203/those-with-limited-internet-access-can-call-these-numbers-to-tweet-egypt-news  ----Stephanie Lui

TedXVienna talk on "context hacking"

ohannes from Vienna arts/pranks/tech collective Monochrom gave this fun TEDxVienna talk on "context hacking" -- making pranks out of pranks, subverting subversion, transcending mere grossouts, and being melancholic postmodern leftists. http://www.youtube.com/watch?v=K2Rvh8VG3o8&feature=player_embedded; Submitted by: Chris Antley


Craft an iPad Stand from Chopsticks

This article shows how you can make a great iPad Stand out of chopsticks. Chopsticks is something that most people would consider as trash, but in this article they are showing that they can be used for other things than just eating Chinese food. This is a great example of how "The Street Finds Its Own Uses Of Things". http://lifehacker.com/5752661/craft-an-ipad-stand-from-chopsticks . Submitted by: Frida Fogdemark

NFL Teams May Replace Playbooks with iPads

In this article the head of technology for the Dallas Cowboys, Pete Walsh, discusses that NFL teams may replace their traditional paper play books with IPads. The article looks into the possible benefits of using the iPad and how it could change the way a playbook is used in the NFL. http://apple.slashdot.org/story/11/02/06/1220207/NFL-Teams-Considering-IPads-To-Replace-Playbooks Submitted by: Danielle Hamilton Carter

Robo Rainbow graffiti machine

This article and video shows how easily robo rainbow graffiti machine could be built up and used. It's a simple technology that gave non graffiti artist a easy way to help decorate the city and made people happy and enjoy the technology. The machine only use several part from bicycle, a screw driver, several frames and a controller to build up and easily installed on the bicycle and move it to everywhere you want to decorate. The idea is brilliant and the result is awesome as well. robo rainbow graffiti machine article video and photos --Submitted by Mc


Hackers use a medical server to host Call of Duty

A medical server that stores very private information on the patients of the owners is used by some hackers to play of Call of Duty: Black Ops. This is a good parallel to "Hackers" because it shows what happens when certain consequences aren't considered. Another good way of thinking about it is 'What would happen if Rubin stole his materials?' www.theregister.co.uk/2011/01/14/seacoast_radiology_server_breach/ -submitted by Blaise Hymel

High School Boy telecommutes with Robot

A boy suffering from Polycystic Kidney Disease is unable to attend school due to a weak immune system. Thus, a 4 foot robot, a Vgo, attends class for him in school and is equiped with a webcam and software that allows the boy to communicate and make friends. http://www.tomsguide.com/us/High-School-Telecommute-Robot-Video-Conference,news-9998.html Submitted by Chris Aguilar

Custom Enclosures Made of Paper

This article describes how a guy used papier mache to create a custom enclosure for an electronic device. Although not necessarily practical, the enclosure definitely has artistic value, much like some of Rubin's inventions. Moreover, the hack is constructed with junk (used paper and cardboard are usually considered "junk" by today's society). Submitted by Lorenzo Tolentino

Star Wars, Metroid and Zelda Vintage NES Games Turned into 1TB External Hard Drives

The people at Etsy.com have repurposed some old NES cartridges by turning them into 500GB, 750GB and 1TB external hard-drives. This is done much like Rubin finds "junk" to repurpose. http://blogs.laweekly.com/stylecouncil/2011/02/zelda_star_wars_nintendo_hard.php - submitted by Kyle Spoerke


Turn an IKEA organizer into an awesome and Cheap Photography Soft Box

explains how you can save up some money for a new camera by making your own photography soft box from an IKEA organizer http://lifehacker.com/5752697/turn-an-ikea-organizer-into-an-awesome-and-cheap-photography-soft-box - submitted by Cody Jung


Database to foil yoga copythieves to launch

This blog is about the creation of an open Indian database where all yoga postures will be. It is supposed to protect the true practice of yoga and stop the self-styled "yoga gurus" from claiming copyright to ancient yoga practices. They have documented about 1300 different postures and are soon going to be uploaded on the country's Traditional Knowledge Digital Library.


Hamster-Powered Walker

Using a "mini-strandbeest" walker hacked together with a frame and a hamster ball, this guy created a hamster-powered walker. The mini-strandbeest is a wind-powered walker-thing built as a miniature model of the huge strandbeests of Theo Jansen, a kinetic sculptor. This guy replaced the wind-power with hamster-power, which relates to the hacking themes explored by Gibson and others. http://crabfuartworks.blogspot.com/2011/02/hamster-powered-walker.html - Submitted by Christopher Hood


SIGSALY Phone Encryption

During WWII, Allied leaders Franklin D. Roosevelt and Winston Churchill needed a safe method of communicating war strategies across the Atlantic Ocean. Their first attempts were done using a standard telephone. The Axis powers easily spliced into the phone lines and heard every word the two leaders said to each other. The two countries came up with the SIGSALY system (or "Green Hornet"). It basically laced their voiced with white noise. This system has never been broken, even to this day. It relates to our readings in the sense that "the street does find it's own use for things." But, in this case, "the street" is the governments of the Allied powers and "the things" in question were computers design for rudimentory tasks. http://en.wikipedia.org/wiki/SIGSALY and http://www.youtube.com/watch?v=23wEmj-EWVI from 1:30 to 5:30


Hacking the Wiimote

This video shows how a Nintendo Wiimote is hacked and turned into a multi-touch whiteboard easily and at a lost cost and limited materials. They only used infrared light pens other than the remote itself. http://www.youtube.com/watch?v=5s5EvhHy7eQ&feature=player_embedded - Submitted by Darren Sanders


Kinect Hacked to Perform Surgery

The Kinect has been subject to a slew of media attention due to its various applications people have formulated using its depth and tracking capabilities. It’s been used to innovate the way we interact with games, and model images. However, its capabilities may have a place in the medical field. Engineering students at the University of Washington have developed software for the Kinect so that it maps out three dimensional images of a patients’ body in surgery. Robots will then be able to use these three dimensional maps to precisely perform surgery. The Kinect was originally manufactured as a peripheral for the Xbox 360 to creatively interact with games. This relates to how in Steven Levy's Hackers, a group of MIT hackers uses the concept of using a tool and re-purpose that tool for other uses. [9] xjo0nn - Joon Ki Hong


Homemade "Segstick"

This article details a "segstick" constructed of a broomstick, two power drills, and various other electrical components to provide power to the drills. The article relates back to Rubin of "The Winter Market" in that it demonstrates the use of "junk" and finding new uses for this "junk" to create original works of art and technology. http://hackaday.com/2010/12/27/mit-inspired-impromptu-segstick/ - Submitted by Curtis Luckey


Printable Wax for PCB Etch Resist

For DIYer's, getting etch resists on a PCB board can be slightly annoying. A popular method is to print toner to an transparency and transfer it onto the PCB board, however is not always that simple to do. This person managed to repurpose a printer to directly print wax on the PCB to act as a etch resist. http://hackaday.com/2011/01/31/printable-wax-as-pcb-etch-resist/ - Submitted by Bryant Menn


Automatic camera trigger built from an automatic air freshener

In this video a man shows off his automatic camera which he built using the motion sensing technology out of an air freshener. He is like Rubin in "The Winter Market" making something of use out of an almost worthless air freshener. http://www.ubergizmo.com/2011/02/automatic-camera-trigger-air-freshener/#more-62795 - Submitted by Michael Trimberger

Building a Remote Control UAV including a fireworks armament

This entry on HackADay.com covers the design and testing of a tricopter configuration UAV device. The device is driven by a remote operator and has a camera that allows the operator to control the device. The maker of this video also equipped fireworks as a dummy armament to destroy hydrogen filled balloons. This hack exhibits class themes because he uses a open-source controlling system and other devices that were not designed for this purpose. He found his own use for things. See the HackADay article for more. Submitted by Andrew Dehn

Virtual Idol

Hatsune Miku is a Japanese singing/song synthesizing program that thousands of composers utilize to create music. What's unique about this program is that the synthesized vocals are "sung" by the titular virtual character, Miku. While the program itself does not create the music (the user does), the creative lines between man and machine are quite blurred by the program's cute, spunky, virtual girl happily singing the lyrics to a song. No longer is music the sole domain of man and his skill with some instrument, room must be made for Miku and her virtual singing prowess.

While the above demonstrates a few more general themes of sci-fi (AI, Humanity and Robotics, etc.), the extreme popularity of Miku highlights many of Turkle's points in "Programmed for Love". Why go to a Kelly Clarkson concert when you can go to one of Miku's virtual, holographic concerts? The first Hatsune Miku concert was held on March 9, 2010 and attracted thousands of attendees and viewers on NicoNicoDouga (a Japenese version of Youtube). Miku presents producer's with a variety of benefits, not only is Miku's repertoire of music constantly expanded by thousands of eager fans and composers, Miku never gets sick, goes on hiatus or overdoses on drugs. She is perfect like Delphi from "The Girl Who Was Plugged In", and her popularity may soon take the world by storm. http://en.wikipedia.org/wiki/Hatsune_Miku Submitted by: Eric Yu

Using Mac OS on PC Hardware

a.k.a. a "hackintosh." This is actually the project of one of the groups in the Famiglietti' English class. Applies to class themes presented in the nonfiction reading, Hackers in which the hackers went against the corporate ideals of hardware use, particularly IBM. However in this case it is the hacker going against Mac's hardware restraints. Source: http://tonymacx86.blogspot.com/2010/04/iboot-multibeast-install-mac-os-x-on.html http://comosus.wordpress.com/

Wikiscanner

This Wired article discusses about Virgil, a young american hacker, who created a project called WikiScanner (It uncovers all the anonymous wiki edit by tracing the ip address.). This article gives you an insight of a modern hacker. Virgil used "junk" information from anonymous users into something more useful like Rubin in the story "The Winter Market". in Submitted by Ky Lee

The Future of Video Games

The following link shows one of the newest yet most overlooked gaming systems today. The game system is called OnLive. This system is different than any other because it does not require any CDs, DVDs, or game cartridges to function. It is completely run on cloud computing. This relates to Tiptree's, "The Girl Who Was Plugged In" because Delphi was completely run by cloud computing through someone else. Link: http://www.onlive.com/corporate Submitted By: Michael Kersh

Recent Company Hacks 

Even though nothing was touched, a man or woman hacked into NASDAQ and could have caused alot of damage. The HackerCup was pretty recent, and reports of all kinds of hacks are popping up across the country, including the creator himself, Mark Zuckerberg as even he wasn't above getting his account hacked. These links shows the extent that hackers can go. NASDAQ Link http://money.cnn.com/2011/02/05/technology/nasdaq_hacked/index.htm  FACEBOOK Link: http://www.guardian.co.uk/technology/blog/2011/jan/26/mark-zuckerberg-facebook-fan-hack-investigation  Submitted By: Joshua Lill

RepRap

This is a project to create a cheap, open source, and self replicating 3d printer. Commerical 3d printers cost tens of thousands of dollars, but the RepRap is only a couple hundred. Further more, it can print most of its own parts. This culture surrounding this project is a lot like that described in Hackers. http://reprap.org/wiki/Main_Page Submitted by Robert Grosse
To quote the homepage: "RepRap is about making self-replicating machines, and making them freely available for the benefit of everyone. We are using 3D printing to do this, but if you have other technologies that can copy themselves and that can be made freely available to all, then this is the place for you too."

Antifeatures

Benjamin Hill gives a lecture on the advantages of free software by documenting some of the "antifeatures" that software comes with, things that make your cell phone drain 3rd party batteries quicker, or have your printer reject non-standard ink. These "features" go directly counter to Gibson's argument that "the street finds its own uses for things" by making "the street" unable to do anything. Link: http://www.boingboing.net/2011/02/05/antifeatures-deliber.html Submitted by: Jordan Mayhue

Kepler's list

A large list of (possibly) habitable planets has been compiled by a team of scientists. This information is more or less freely available to the community to scour and search-- allowing many more eyes to see it than something done "behind closed doors." This is a project that could have some serious repercussions for the scientific community. It is basically the antithesis of the "antifeatures" listed previously, it's something that allows everyone to participate. Link: http://www.boingboing.net/2011/02/07/exploring-keplers-li.html Submitted by: Jordan Mayhue

Open source backgrounds for Android

This project gives everyone access to wallpapers for their phone from basically any site that they would like. It follows Gibson's idea of "the street finds its own uses for things" because it shows how one person's idea can be made marketable to the masses. Link: http://lifehacker.com/#!5753887/weblivewallpaper-sets-web-sites-or-image-galleries-as-your-android-wallpaper Submitted by: Jordan Mayhue

Analog LED clock

A project like this would make Rubin himself proud, by using LEDs from other sources, and putting them together, you can create your own animated analog clock. While the uses of this are somewhat limited, it does look quite neat. Link: http://lifehacker.com/classic#!5752752/craft-an-analog-clock-with-digital-guts-and-led-animations Submitted by: Jordan Mayhue


How To Become A Hacker

Interesting article that puts you in the mindset of a hacker. It's a guide the tell you step by step how to think and act like a hacker. It's not as interesting as actually changing something but it is nice to know how we should actually feel when doing sorts of things. http://www.catb.org/~esr/faqs/hacker-howto.html Submitted by: Tanner Shirah


Fake robot baby provokes real screams

Just after we discussed the uncanny valley in class i stumbled upon this recent video of a project at Osaka University in Japan that attempts to create a robot baby that can produce the facial experessions that will evoke emotions similar to that of a real  baby. It can also create screams that mimic a baby's screams. http://www.engadget.com/2011/02/08/fake-robot-baby-provokes-real-screams-video/ Submitted by: Jarvis Johnson

How to Hack Social Behavior

This article discusses ways to analyze one's social behavior and observe it in a way that one can fix weak points in their actions. This relates to the thought of people's own ability to define their society as we have talked about in Neuromancer. By hacking their own social behavior, people can, as a whole, control the direction their society moves. http://lifehacker.com/#!5760650/how-to-hack-social-behavior Submitted by: Partha Unnava


IBM Watson

IBM is not known for being cool.

At a party thrown by IBM a couple weeks ago in San Francisco to celebrate the company's 100th birthday this year, what stuck out most wasn't the video demonstration of 100 years of innovation (IBM invented the barcode!) or the great appetizers or the free-flowing wine.

It was the grey hair.

That's no knock against IBM -- the company has some very smart people doing some weird and fascinating things, like Keith Dierkz, the director of the company's Global Rail Innovation Center, who spends his working days studying traffic and how to improve it.

Still, in Silicon Valley, where the cool kids work at Google and Facebook and Twitter and the startup of the week, IBM stands out as a bastion of ... let's call it maturity.

Which is why the IBM computer Watson's victory on Jeopardy last night is so amazing. Yes, it's a great feat for artificial intelligence -- Google can't recognize natural language queries. But as FINS reports today, Watson is accomplishing something even more important: it's making college kids want to work for IBM again.

IBM coordinated the computer's Jeopardy appearance with 58 visits to college campuses, and more than 10,000 students sat down to watch the show at parties.

Now, college students who never even considered IBM as a place to work have put it top on their list, and a lot of students are reaching out to the Watson team directly. They're realizing that IBM has a huge patent portfolio and impressive budget for pure research, and they want to be part of it. Yes, IBM still makes most of its money selling mainframe computers and consulting services. But the company has a long legacy of innovation as well.

In case you haven't been paying attention, IBM has also been on a roll financially: the company laid out an ambitious set of five-year earnings targets in May, and so far it's been right on track. Moreover, the stock price in the last year has outpaced nearly every other large-cap tech company -- including Google -- with the exception of Apple. Link:http://www.businessinsider.com/ibms-watson-may-have-accomplished-the-impossible-2011-2


Junkyard fish tank

This particular hack isn't very technological or complicated as many of the ones we usually see on this wiki or talk about in class. This one is about man who had to much clutter around his house but didn't want to through it away. So what does he do, He build a fully functional fish tank. This one fits into our theme that the street finds its own use for things. [10] Submitted by: Andrew Dehn


FreedomBox: wall-wart firmware to provide privacy and route around censorship

This is a project to provide privacy and ways to route around censorship in normal times. This is done by setting up various linux routers all over the place. The founder is planning to make the technology much more accessible so that it is much easier for people to use. [11]


Pace Makers Found venerable to Hacker Attacks

Here it is. It is a news article of New York Times presenting a theoretical security flaw in many critical medical equipment. The hacking breach was attempted as a test to see if it could be done by a team of computer security researchers. "They were able to reprogram it to shut down and to deliver jolts of electricity that would potentially be fatal — if the device had been in a person." There has been a suggestions to “incorporate encryption and security technologies designed to mitigate these risks.” None the less, vulnerability of technology to other technology presents a major concern with our technologically dependent society. How can we be truly safe? Security has to be more advanced then growing trends, yet it relies on technology itself to create a sense of protection.


Anonymous Security Firm Hack Used Every Trick in the Book

Security firm HBGary was recently hacked by Anonymous and had many of its secrets exposed to the public. Anonymous used a mixture of SQL injection, weak password security, and social engineering to hoodwink top officials in the firm. Hacking their passwords through websites lke Twitter and LinkedIn, Anonymous was able to access the mainframe of the firm and extract vital information from a remote location. Though not a classical "hack," this is a literal computer hack, and as such is deemed worthy olf inclusion. --cgolden3 05:34, 18 February 2011 (UTC)

http://www.theregister.co.uk/2011/02/17/hbgary_hack_redux/ http://arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars/

Sony Responds to PS3 Hacking

Due to the recent popularity of people hacking or jailbreaking their PS3s, Sony has officially announced that "Consumers using circumvention devices or running unauthorized or pirated software will have access to the PlayStation Network and access to Qriocity services through PlayStation 3 System terminated permanently." Also, Sony has been attempting to take legal action against the hacker of the PS3 along with sending DMCA takedown notices to anyone hosting the "fail0verflow" tool. http://www.g4tv.com/thefeed/blog/post/710491/Sony-Issues-A-Statement-About-Hacking-The-PS3-Urges-Gamers-To-Delete-All-Unauthorized-Content.html Submitted by Kyle Spoerke


Gamerator, Arcade Cabinet Plus Keg, Available Now

This company has combined things that people love the most by creating a cabinet that combines 85 classic arcade games, a fully functioning keg tap as well as a refrigerated interior, and a 26 inch LCD screen. http://www.g4tv.com/thefeed/blog/post/710532/Gamerator-Arcade-Cabinet-Plus-Keg-Available-Now.html Submitted by Kyle Spoerke


Wintermute AI

Connecting directly to Neuromancer, this open source project aims to bring Artificial Intelligence to the Ubuntu Operating System. Read up for more info WintermuteAI --Jmicali13 16:41, 18 February 2011 (UTC)

Immaterials: Light painting WiFi

A group of Oslo-based designers and researchers created a "WiFi visualizer" that, combined with light painting techniques, allowed them to visually document WiFi strength throughout parts of Oslo. By manifesting in the physical world the invisible realm of WiFi communication, and in a sense the Internet itself, the work of this group embodies many questions raised in class relating to the division of physical reality and cyber-reality. Also, by plainly showing people such a pervasive yet largely unnoticed element of life, the trust in the inherent truth of one's own individual perception of reality is challenged.
Link: http://yourban.no/2011/02/22/immaterials-light-painting-wifi/ and here Submitted By: E.t.dale 23:21, 2 March 2011 (UTC)


Kinect to get Windows drivers months after open source drivers were developed

After Microsoft refusal to released the drivers for the Kinect , Johnny Chung Lee, a worker for Microsoft, supported the Adafruit’s Open Kinect Contest. This contest would have reward the first person to hack the Kinect a sum of money. This led to the development of open source divers for the Kinect. This then in turn made Microsoft release their own version of the drivers so that anybody can develop applications for the Kinect. http://hackaday.com/2011/02/22/kinect-to-get-windows-drivers-months-after-open-source-drivers-were-developed/ Submitted by Jonathan Pham

Anonymous Hacks Westboro Church

Probably the same "Anonymous" group that struck a few entries above, recently "Anonymous" has struck again. This time their target was the Westboro Baptist Church, a group that had specifically challeneged "Anonymous" in an online letter last week. During a radio show involving a spokesperson of the church and a member of the "Anonoymous" hacker group, the official website of the church was hacked and its contents defaced to show a message from "Anonymous," that "despite having the capability to hack your sites previously, we chose not to." Later the hacking group tweeted that "#WBC was more leet than #HBGary. It took #Anonymous a 0day to get in their network, not some public SQL." "Anonymous" draws some parallels with the high-tech street gang the "Panther Moderns" from Neuromancer. Both groups contain members who have shifting, unstable identities and perform questionable acts of "good" cyber-terrorism. Submitted by Eric Yu http://www.computerworld.com/s/article/9211305/Anonymous_hacks_church_Web_site_during_live_interview?taxonomyId=82&pageNumber=1

3 teens behind internet crime forum Gh0stMarket get jail

The Guardian reports that three UK teenagers who created and ran "one of the world's largest English-language internet crime forums," described in court as "Crimebook", have been sentenced to up to 5 years in jail. Authorities estimated that losses from credit card data traded over Gh0stMarket.net totaled more than $26 million dollars. Threatening to blow up the head of the police unit in charge of internet crimes after an earlier arrest was probably an unwise move. Submitted by Chris Antley http://www.guardian.co.uk/uk/2011/mar/02/ghostmarket-web-scam-teenagers

The Rise of AI's

Guild Wars is a five- to six-year old MMORPG, which has kept an active gamer population throughout the years. In turn, Anet -- the company behind the creation to today's maintenance -- continues to update the game while working on Guild Wars's sequel. However the changes recently made to Guild Wars have continued to bring a questionable change -- the rise of AI's a.k.a. "Heroes." Ever since a player strike from fall 2005/2006, the rise of heroes have been well underway but since the release of the last campaign "Nightfall," the growth of heroes have been controlled and limited. Provided the maximum size of a party is eight, heroes at the time of Nightfall were limited to 3. With the recent update, the number of heroes possible in a maximum party has reached the highest maximum available -- 7. In addition to the increase of heroes, a purchasable item is called the mercenary hero, which can be created from a player's own character. After reading Neuromancer and other assigned readings like the "Winter Market" and "Flesh Made Word," is increasing the number of AI's a good development in the long-run or short-run considering the trade-offs such as the decrease of interaction between players. Submitted by kvicente3 http://www.guildwars.com/gameplay/developer_updates/destination_embark_beach.php


Ashton Kutcher's Twitter Account Hacked

In a delectable turn of irony, the Punk'd star's Twitter account was hacked recently. While not incredibly interesting in and of itself, the second tweet the hacker posted was

"P.S. This is for those young protesters around the world who deserve not to have their Facebook & Twitter accounts hacked like this. #SSL"

This is obviously a nod to the young tech-savvy middle easterners living in turmoil right now. Pretty interesting use (misuse) of social media in a way thoroughly unintended by the users and Mr. Kutcher himself. http://latimesblogs.latimes.com/technology/2011/03/ashton-kutchers-twitter-account-gets-hacked-at-ted-conference.html

--cgolden3 14:51, 4 March 2011 (UTC)

Using Google for Hacking

The page in the following link mentions using Google as a tool for hacking personal information and security cameras. Personally I couldn't believe that people would leave sensitive personal information on the internet in places that are searchable by Google. I gave some of the searches a try and they appeared to work better than expected. This relates pretty closely to how Case and other members in Neuromancer would hack into other computer mainframes to change information and steal it for their own use. Submitted by mkersh3 Link : http://www.bbc.co.uk/news/technology-12400647

Robots in Action

Cracked.com recently had an article called "The 7 Creepiest Robots to be Seen in Action", the article had 7 different robots, complete with videos of them in action. Cracked.com doesn't write serious articles, and this one is suppose to be more funny and slightly satiricle than it is serious, but the videos are really cool. Submitted by: Joshua Lill Link: http://www.cracked.com/blog/the-7-creepiest-robots-to-see-in-action/


Nintendo 3DS Hacked within first 24 hours of release

Nintendo's "unhackable" device gets exploited incredibly quickly. Come on big N, you should know better than provoke the hacking community. www.pcmag.com/article2/0,2817,2381021,00.asp

Inside Google’s Self-Driving Cars

Google’s Sebstain Thrun a software engineer has been working on making self-driving cars. The car is able to avoid obstacles, and drive at extremely high speeds. The car can also avoid deer and other obstacles. The car uses artificial intelligence software and can sense anything near the car, and can make decisions made by a human driver. Robot drivers react faster than humans, and have a 360 degree view, which could help in distracted or intoxicated drivers. This goes along with class themes like in Neuromancer and other stories we have read. The article brings the question of is technology slowly taking over every aspect of our life. Is this good or bad? Also the idea of artificial intelligence and the cars being able to make human decisions relate to what we have discussed in class. Submitted by:Sriram Suresh http://www.nytimes.com/2010/10/10/science/10google.html?_r=2&partner=rss&emc=rss

Google Remotely Kills Bad Apps

Google has been remotely deleting over 260,000 malicious applications off of people's personal Android phones. These applications were downloaded directly from the Android marketplace and now are being deleted from the marketplace as well as the individuals cell phones. This brings up the question... what else can Google do to your phone if it really wanted to? Submitted by: Colby Wren http://www.securitynewsdaily.com/google-remotely-kills-bad-android-apps-from-users-phones-0587/

Facebook Banners

Ever since Facebook updates the format of each profile page to include the most recently tagged five pictures at the top of the page a new phenomenon has arisen. In a Myspace-esque move people now have some hacked license to customize their account using Facebook banners. In the last month sites like www.fbanners.com have sprung up that allow people to use these 5 picture slots to customize their Facebook profile.

SixthSense Technology

Pranav Mistry discusses the possible applications of SixthSense technology, which uses a personal camera and projector to interact with physical objects. For example, when a person using this device picks up a book, the camera sees the cover, looks up information about it (such as user ratings, reviews), and projects the results onto the book itself. Mistry suggests that this technology, unlike other digital devices, can reconnect us to the physical world. This goes back to our discussion about how technology affects our concept of reality. Submitted by: Roberta Reusch-Lewis  http://www.ted.com/talks/pranav_mistry_the_thrilling_potential_of_sixthsense_technology.html

Guy Hacks Time Square

A guy hacks time square with an iPhone. He uses a wireless transmitter and with the use of his iphone wirelessly transmits his video onto the screens of time square.http://thechive.com/2011/03/16/dude-hacks-times-square-screens-with-an-iphone-what-have-you-done-today-video/.

We Are All Cyborgs Now

Self-proclaimed "cyborg anthropologist" Amber Case describes in this TED presentation the way in which humans are becoming cyborgs due to the prevalence of technology and social media in the modern world. At several points in her speech, she makes reference to the way in which technology allows people to exceed their bodily limits, a theme discussed at length in Neuromancer and Schismatrix. She also examines the maintenance of the "second self" in social media, touching upon many aspects of simulation mentioned in "Flesh Made World" and Baudrillard's Simulacra and Simulation.
Link: http://www.ted.com/talks/amber_case_we_are_all_cyborgs_now.html Submitted By: E.t.dale 03:36, 18 March 2011 (UTC)

Giving “sight” to the visually impaired with Kinect

This article discusses yet another use for Microsoft's Kinect device. Besides dancing against your friends, the Kinect can be utilized in a number of tasks. Students at the University of Konstanz have rigged the device with a laptop that uses three waist-mounted motors and headphones to guide the reader through hallways and tell users when they are approaching certain key points, such as doors. This can bring up a number of class themes, primarily the idea of exceeding the human body. Does this hack count as exceeding the human body? Does it not because it seeks to restore a function that most people are born with? http://hackaday.com/2011/03/16/giving-sight-to-the-visually-impaired-with-kinect/   - Submitted by: --Adehn3 06:00, 18 March 2011 (UTC)

Sweet Sixteen Facebook Event Hacked, 200,000 Invites Ensue

After posting a birthday invitation on Facebook, an Australian teen was forced to cancel her house party after she received more than 200,000 RSVPs in what appears to be a hijacked Facebook event. http://www.pcmag.com/article2/0,2817,2382041,00.asp?kc=PCRSS03069TX1K0001121 --cgolden3 13:20, 18 March 2011 (UTC)

Audiophile Quality Headphones at a Fraction of the Price

This article discusses how high quality headphones work and a method to create high quality headphones from a regular headset by buying an orthodynamic driver (a driver used in high quality headphones) and installing it into the regular headset. This relates to the overall idea of hacking that we have discussed since reading Levy's Hackers; the understanding of how technology works and using this understanding to outwit a larger "authoritative" entity. In this case, the entity that was outwitted was the companies creating high quality headphones and selling them for high prices. The hacker demonstrated that with a technological know-how, one could create a similar set of headphones for a much smaller price. http://hackaday.com/2011/03/18/audiophile-quality-headphones-at-a-fraction-of-the-price/ --punnava3 11:18, 18 March 2011 (UTC)


World Map in Minecraft

This article shows how a group of people took quantitative data from NASA about the earth's terrain and creating a scale Minecraft map that is the Earth. This is similar to how Ruben made art out of objects generally not considered to be art.

http://crafthub.net/2011/03/25/world-map-constructed-in-minecraft/


http://www.reddit.com/r/Minecraft/comments/gauub/the_earth_scaled_cartograph/

The Pirate's Dilemma

A book about how hackers, pirates, and other related groups have changed popular culture and society on the whole. Free PDF download. http://thepiratesdilemma.com/ --dgarcia32 28 March 2011 (UTC)


Uberman's Sleep Schedule

This article is about Uberman's sleep schedule, a cultic, strange, and oddly possible way to exceed the limit of the human body.


http://www.kuro5hin.org/story/2002/4/15/103358/720


Can’t Make It To Dinner? Send a Robot Proxy In Your Place

Wieden+Kennedy Amsterdam put together a clever recognition app that allows Skype callers to control custom-built mechanical dolls with head movements. This is a great idea because, as the article says, sometimes it is hard to get the whole family together. However, there is a thin line where technology has become so advanced in our lives that we don't act like humans anymore. This remind us of our various readings like Flesh Made Word where Russ has stop having feelings because all he socializes with are computers. http://gizmodo.com/#!robots/5717346 By Barbara Zappala

Augmented Reality Gear Makes it Rain

The Magic Vision Lab created a device which simulates weather within an augmented reality device. The weather situations simulated are snow, hail, and rain. The entire idea blurs the line between technology and life much like in Neuromancer with Case being in/out of the matrix. The idea also exists within Flesh Made Word with the various AI simulations that reflect what is/was real life.

http://blog.makezine.com/archive/2011/03/augmented-reality-gear-simulates-weather.html

Tanner 12:37, 31 March 2011 (UTC)

Monkey Controls Robot With Only Thoughts

A monkey in North Carolina controlled a robot in Japan using only its brain waves (connected via the Internet).  After a few hours of practice, the monkey began using separate neurons to control the robot rather than its own legs, and then began to be able to control only the robot without also moving its own legs.  This reminds us of the use of surrogate bodies in The Girl Who Was Plugged In.  http://www.thinkartificial.org/machine-interfaces/monkey-brain-makes-robot-walk/

Firefox 4 beats IE9 out of the gate in usage

Both Firefox and Internet Explorer have launched major updates, and it looks like Firefox is being used more widely than Internet Explorer is, despite its own update being released over a week later. Firefox 4 has more advantages than IE9, like being able to be used on older operating systems, like Windows XP, while IE9 requires the OP to be Windows 7 or at least Windows SP2. Over fifty percent of computers being used are Windows XP machines, compared to about 10 percent of Windows 7, so there will be a rise of browsers being switched to Firefox in the future. But overall, as you will see on the chart at the top, IE is still being used heavily worldwide. http://news.cnet.com/8301-30685_3-20049592-264.html?tag=topStories3 tcorbett3

Hackers hunt prey on smartphones, Facebook

Hackers are now starting to prey on people with smartphones. In March, smartphones running on Google-backed Android software were attacked and it was discovered that they came from random applications rigged with Trojans. Trojans steal important personal information and they downloaded other applications without the user's knowledge. Hackers are able to go into multiple people's bank accounts to mine and gather large amounts of money to put into their own secret account. http://news.yahoo.com/s/afp/20110405/ts_afp/usitinternetcomputersecuritysymantecpandalabs tcorbett3

Do it yourself covert internet connections

To get around government blockages of internet in certain countries, people have come up with all sorts of novel measures, such as using homemade radio antenna. One person even modified a microwave oven to secretly transmit signals in the microwaves it outputs. This article brings up issues seen in the Hackers reading selection: individual versus top-down control of technology, and the do it yourself ethic. http://www.economist.com/node/18386151?story_id=18386151

Android Exploits (There's an app for that!)

For years, people have been trying to get out of work early, fake phone-calls, and generally do things that we really aren't supposed to be doing. Some of the apps on Android's market can do all those things, and more with simply the push of a button. While the legality of actually using some of these methods is questionable, they do seem to represent some very interesting possibilities with regards to the usefulness of technology in the future.

http://www.wired.com/gadgetlab/2011/04/android-exploits/

Google Easter Egg Makes AT&T Look Foolish(Tilt your screen)

When you search 'tilt' on my iPhone, the search result screen will tilt a little bit. Check this out. http://www.wired.com/gadgetlab/2011/04/google-easter-egg/

Antitrust Between Google and Microsoft

A war of words is heating up between Google, Microsoft and a host of smaller sites over alleged anticompetitive behavior by Google in the online search market. A variety of news outlets and blogs are reporting on allegations that Microsoft may be engaging in a proxy war against Google, using smaller companies to fight its battles.

http://www.networkworld.com/news/2010/030110-antitrust-rhetoric-heats-up-between.html

http://lifehacker.com/#!5789078/getting-more-from-google

http://lifehacker.com/#!5788772/when-not-to-google-searches-youre-better-off-making-elsewhere

Hack of Sony and Microsoft

Hack of both Sony and Microsoft may consider a righteous act. But similar act may be considered wrong. This brings up hacker ethics. Are we allow to have double standards in the society. http://www.g4tv.com/thefeed/blog/post/711551/daily-wrap-up-40411/


A False Sense of Security: Car Hack

Anti-theft car systems may make you feel safe, but modern car thieves are "hacking" them to gain easy access to your vehicle, without the need for breaking in. http://gizmodo.com/#!5789644/a-false-sense-of-security-or-how-to-steal-a-car-with-your-computer

3D Video Capture with Kinect

A guy combines the depth and color images recorded from the Kinect and projects the color image back out into space. This makes a holographic representation of the objects that were captured. http://www.youtube.com/watch?v=7QrnwoO1-8A

The Great Fire Wall

This is the largest hacking project in human's history. The Great Fire Wall (official name: Gold Shield Project) is a internet censorship system designed and controlled by Chinese government to protect its citizens from the corrupted capitalism propaganda. These capitalism medias includes wordpress.com, facebook, cnn, twitter etc. Here is short intro of the Great Fire Wall system in English language. http://www.youtube.com/watch?v=dWfUOG0EA9w

3D LED Screen-Dance

There is a dancer in A "cube" TV. Image sequence using a volume display method (based on the DMD digital light engine generates static two-dimensional image projection screen, this image by the reciprocating motion along the normal direction as the front surface reflection mirror, the formation of a continuous Image sequence. When the two-dimensional images and synchronize the position of mirror refresh, with the effect of persistence of vision, the image sequence of the observed physical depth perception as a three-dimensional images. Here is the video: http://www.youtube.com/watch?v=Qk_03gXvf90&feature=player_embedded

the start of the terminator movies...

a group of european scientists and engineers of just started up an intitative to create a network that would allow robots to learn from the experience of their peers, thus enabling them to take on tasks that they weren't necessarily programmed to perform" this could be a huge leap for the developement of robots if the inititative is seen through, as inventors and robot builders could just jack their robots into this network and it will take care of the programing side of things. http://www.engadget.com/2011/02/02/roboearth-teaches-robots-to-learn-from-peers-pour-european-frui/

Xbox To-Go

Console systems are by nature more powerful than their handheld counterparts but often at the expense of portability. Here, a man has created an Xbox 360 laptop, which is a fully portable Xbox 360 system that was modified to have its own monitor and internal power system. By integrating outside components, he has transformed his device to extend its purpose and remove its limitations. http://hacknmod.com/hack/diy-low-cost-xbox-360-slim-laptop/


Actual Virtual Pop Star

http://beta.news.yahoo.com/blogs/trending-now/japan-newest-pop-star-isn-t-real-justin-164912472.html?nc

Japan has created a virtual sensation, whose true identity was only recently revealed!  --cgolden3 19:53, 24 June 2011 (UTC)

Personal tools