Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revision Both sides next revision | ||
hacker_culture [2021/04/08 12:34] ntnsndr [13. Weary giants] |
hacker_culture [2021/05/01 15:13] ntnsndr [What should I be checking out to keep up with hacker culture?] |
||
---|---|---|---|
Line 92: | Line 92: | ||
* 1,800-to-2,000-word length, written clearly and with instructive illustrations | * 1,800-to-2,000-word length, written clearly and with instructive illustrations | ||
* comprehension of the hack and convincing, accessible analysis of it | * comprehension of the hack and convincing, accessible analysis of it | ||
- | * impressive and documented research with both [[:scholarly_sources|scholarly]] and primary sources | + | * impressive and documented research with both [[:scholarly_sources|scholarly]] and primary sources, [[:citation_standards|appropriately cited]] |
* sophisticated engagement with at least two assigned sources | * sophisticated engagement with at least two assigned sources | ||
* one-minute presentation, with a compelling slide, on the last day of class (5 points) | * one-minute presentation, with a compelling slide, on the last day of class (5 points) | ||
Line 239: | Line 239: | ||
### 14. Gentrification | ### 14. Gentrification | ||
- | * Mark Zuckerberg, "[The Hacker Way](https://www.wired.com/2012/02/zuck-letter/)," _Wired_ (February 1, 2012) | + | * Mark Zuckerberg, "[The Hacker Way](https://money.cnn.com/2012/02/01/technology/zuckerberg_ipo_letter/index.htm)," _CNN Money_ (February 1, 2012) |
* Alessandro Delfanti and Johan Söderberg, "[Repurposing the hacker: Three cycles of recuperation in the evolution of hacking and capitalism](http://www.ephemerajournal.org/contribution/repurposing-hacker-three-cycles-recuperation-evolution-hacking-and-capitalism)," _Ephemera_ 18, no. 3 (2018) | * Alessandro Delfanti and Johan Söderberg, "[Repurposing the hacker: Three cycles of recuperation in the evolution of hacking and capitalism](http://www.ephemerajournal.org/contribution/repurposing-hacker-three-cycles-recuperation-evolution-hacking-and-capitalism)," _Ephemera_ 18, no. 3 (2018) | ||
* Virginia Heffernan, "[Now That Tech Runs the World, Let's Retire the Hacker Ideal](https://www.wired.com/story/now-that-tech-runs-the-world-lets-retire-the-hacker-ideal/)," _Wired_ (January 31, 2018) | * Virginia Heffernan, "[Now That Tech Runs the World, Let's Retire the Hacker Ideal](https://www.wired.com/story/now-that-tech-runs-the-world-lets-retire-the-hacker-ideal/)," _Wired_ (January 31, 2018) | ||
Line 258: | Line 258: | ||
* [Hack_Curio](https://hackcur.io/) | * [Hack_Curio](https://hackcur.io/) | ||
* [Hacker News](https://news.ycombinator.com/) | * [Hacker News](https://news.ycombinator.com/) | ||
- | * _[Hackernoon](https://hackernoon.com/)_ | + | * _[Hacker News, The](https://thehackernews.com/)_ |
+ | * _[Hacker Noon](https://hackernoon.com/)_ | ||
* _[Krebs on Security](http://krebsonsecurity.com/)_ | * _[Krebs on Security](http://krebsonsecurity.com/)_ | ||
* _[Lifehacker](http://lifehacker.com/)_ | * _[Lifehacker](http://lifehacker.com/)_ |