SlideShare una empresa de Scribd logo
1 de 33
Picture credit: Erik Nygren
Picture credit: Isafmedia / Wired
Picture credit: Erik Nygren
Picture credit: Erik Nygren
WearablesDefinition
WearablesDefinition
WearablesDefinitionFrom the New Hacker’s Dictionary, via Eric S Raymond
1. A person who enjoys exploring the details of
programmable systems and how to stretch their
capabilities, as opposed to most users, who prefer
to learn only the minimum necessary.
RFC1392, the Internet Users' Glossary, usefully
amplifies this as: A person who delights in having
an intimate understanding of the internal workings
of a system, computers and computer networks in
particular.
WearablesDefinitionFrom the New Hacker’s Dictionary, via Eric S Raymond
1. A person who enjoys exploring the details of
programmable systems and how to stretch their
capabilities, as opposed to most users, who prefer
to learn only the minimum necessary.
RFC1392, the Internet Users' Glossary, usefully
amplifies this as: A person who delights in having
an intimate understanding of the internal workings
of a system, computers and computer networks in
particular.
WearablesDefinitionFrom the New Hacker’s Dictionary, via Eric S Raymond
2. One who programs enthusiastically (even obsessively) or
who enjoys programming rather than just theorizing about
programming.
3. A person capable of appreciating hack value.
4. A person who is good at programming quickly.
5. An expert at a particular program, or one who frequently
does work using it or on it; as in ‘a Unix hacker’. (Definitions
1 through 5 are correlated, and people who fit them
congregate.)
6. An expert or enthusiast of any kind. One might be an
astronomy hacker, for example.
7. One who enjoys the intellectual challenge of creatively
overcoming or circumventing limitations.
WearablesDefinitionFrom the New Hacker’s Dictionary, via Eric S Raymond
2. One who programs enthusiastically (even obsessively) or
who enjoys programming rather than just theorizing about
programming.
3. A person capable of appreciating hack value.
4. A person who is good at programming quickly.
5. An expert at a particular program, or one who frequently
does work using it or on it; as in ‘a Unix hacker’. (Definitions
1 through 5 are correlated, and people who fit them
congregate.)
6. An expert or enthusiast of any kind. One might be an
astronomy hacker, for example.
7. One who enjoys the intellectual challenge of creatively
overcoming or circumventing limitations.
Picture credit: Isafmedia / Wired
Picture credit: Erik Nygren
WearablesCase Studies: Seeing EyePython script using SL4A scripting environment under Android
WearablesCase Studies: Seeing Eye“Cloud service” to OCR uploaded photos using open source Tesseract package
WearablesCase Studies: Seeing Eye
Wearables
Moto Actv Smartwatch
- Android 2.3 (Gingerbread)
- 600MHz OMAP3 ARMv7 CPU
- 256MB RAM
- 8GB flash
- 802.11B/G/N
- Bluetooth, GPS, ANT+
- 220x176 capacitive multitouch
display
- PowerVR GPU
Case Studies: Smartwatch
Wearables
Moto Actv Smartwatch
- Android 2.3 (Gingerbread)
- 600MHz OMAP3 ARMv7 CPU
- 256MB RAM
- 8GB flash
- 802.11B/G/N
- Bluetooth, GPS, ANT+
- 220x176 capacitive multitouch
display
- PowerVR GPU
Released December 2011
Case Studies: Smartwatch
Wearables
Moto Actv Smartwatch
- Android 2.3 (Gingerbread)
- 600MHz OMAP3 ARMv7 CPU
- 256MB RAM
- 8GB flash
- 802.11B/G/N
- Bluetooth, GPS, ANT+
- 220x176 capacitive multitouch
display
- PowerVR GPU
Released December 2011
Rooted December 2011
Case Studies: Smartwatch
Wearables
Moto Actv Smartwatch
- Android 2.3 (Gingerbread)
- 600MHz OMAP3 ARMv7 CPU
- 256MB RAM
- 8GB flash
- 802.11B/G/N
- Bluetooth, GPS, ANT+
- 220x176 capacitive multitouch
display
- PowerVR GPU
Released December 2011
Rooted December 2011
Case Studies: Android
WearablesCase Studies: Android
WearablesCase Studies: Android
Community ROM of latest Android release on old unsupported hardware
Video on YouTube at http://youtu.be/7Md9b6XbVtQ
WearablesCase Studies: Chrome
Article from How-To Geek – howtogeek.com
WearablesCase Studies: LinuxLinux powers 900m+ Android devices
Photo credit: Kysoh
WearablesCase Studies: LinuxLinux powers 94% of the top 500 supercomputers
Picture credit: Erik Nygren
WearablesThe Next Generation
Photo credits: Technocamps, DesignSpark
Photo credit: Simon Cox, University of Southampton
Photo credit: Simon Cox, University of Southampton
The Next Generation
Image credit: Christopher Barnatt
Photo credit: Colin Hattersley
Wearables
Photo by Frank Wojciechowski, Princeton University
WearablesThe Next Generation
Watch on YouTube at http://youtu.be/hoSoYf9aKAM
Picture credit: Erik Nygren

Más contenido relacionado

Similar a How to be a Hacker (Sut i fod yn Haciwr)

Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools iSyaiful Ahdan
 
powe point presentation on kali linux and ethical hacking
powe point presentation on kali linux and ethical hackingpowe point presentation on kali linux and ethical hacking
powe point presentation on kali linux and ethical hackingdhruvpawar010
 
Mastering Digital Electronics: An Ultimate Guide to Logic Circuits and Advanc...
Mastering Digital Electronics: An Ultimate Guide to Logic Circuits and Advanc...Mastering Digital Electronics: An Ultimate Guide to Logic Circuits and Advanc...
Mastering Digital Electronics: An Ultimate Guide to Logic Circuits and Advanc...Lucky Gods
 
Clean Code I - Best Practices
Clean Code I - Best PracticesClean Code I - Best Practices
Clean Code I - Best PracticesTheo Jungeblut
 
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...Alan Quayle
 
Opening the IoT - Joe Fortey - IoT Midlands Meet Up - 29/07/14
Opening the IoT  - Joe Fortey - IoT Midlands Meet Up - 29/07/14Opening the IoT  - Joe Fortey - IoT Midlands Meet Up - 29/07/14
Opening the IoT - Joe Fortey - IoT Midlands Meet Up - 29/07/14WMG, University of Warwick
 
Android based message encryption decryption using matrix
Android based message encryption  decryption using matrixAndroid based message encryption  decryption using matrix
Android based message encryption decryption using matrixeSAT Journals
 
Deep Learning Neural Network Acceleration at the Edge - Andrea Gallo
Deep Learning Neural Network Acceleration at the Edge - Andrea GalloDeep Learning Neural Network Acceleration at the Edge - Andrea Gallo
Deep Learning Neural Network Acceleration at the Edge - Andrea GalloLinaro
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Zoltan Balazs
 
Build Autonomous Mobile Robot from Scratch using ROS: Simulation and Hardware...
Build Autonomous Mobile Robot from Scratch using ROS: Simulation and Hardware...Build Autonomous Mobile Robot from Scratch using ROS: Simulation and Hardware...
Build Autonomous Mobile Robot from Scratch using ROS: Simulation and Hardware...Lucky Gods
 
the darknet and the future of content distribution
the darknet and the future of content distributionthe darknet and the future of content distribution
the darknet and the future of content distributionmustafa sarac
 
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JSFestUA
 

Similar a How to be a Hacker (Sut i fod yn Haciwr) (20)

Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools i
 
powe point presentation on kali linux and ethical hacking
powe point presentation on kali linux and ethical hackingpowe point presentation on kali linux and ethical hacking
powe point presentation on kali linux and ethical hacking
 
Mastering Digital Electronics: An Ultimate Guide to Logic Circuits and Advanc...
Mastering Digital Electronics: An Ultimate Guide to Logic Circuits and Advanc...Mastering Digital Electronics: An Ultimate Guide to Logic Circuits and Advanc...
Mastering Digital Electronics: An Ultimate Guide to Logic Circuits and Advanc...
 
Darknet - Is it good for you?
Darknet - Is it good for you?Darknet - Is it good for you?
Darknet - Is it good for you?
 
Clean Code I - Best Practices
Clean Code I - Best PracticesClean Code I - Best Practices
Clean Code I - Best Practices
 
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
Practical Experiences of hacking with Contextual Comms and BOTS, Sam Machin, ...
 
Security Handbook
 Security Handbook Security Handbook
Security Handbook
 
Opening the IoT - Joe Fortey - IoT Midlands Meet Up - 29/07/14
Opening the IoT  - Joe Fortey - IoT Midlands Meet Up - 29/07/14Opening the IoT  - Joe Fortey - IoT Midlands Meet Up - 29/07/14
Opening the IoT - Joe Fortey - IoT Midlands Meet Up - 29/07/14
 
Android based message encryption decryption using matrix
Android based message encryption  decryption using matrixAndroid based message encryption  decryption using matrix
Android based message encryption decryption using matrix
 
Deep Learning Neural Network Acceleration at the Edge - Andrea Gallo
Deep Learning Neural Network Acceleration at the Edge - Andrea GalloDeep Learning Neural Network Acceleration at the Edge - Andrea Gallo
Deep Learning Neural Network Acceleration at the Edge - Andrea Gallo
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
 
Build Autonomous Mobile Robot from Scratch using ROS: Simulation and Hardware...
Build Autonomous Mobile Robot from Scratch using ROS: Simulation and Hardware...Build Autonomous Mobile Robot from Scratch using ROS: Simulation and Hardware...
Build Autonomous Mobile Robot from Scratch using ROS: Simulation and Hardware...
 
the darknet and the future of content distribution
the darknet and the future of content distributionthe darknet and the future of content distribution
the darknet and the future of content distribution
 
Hacking
Hacking Hacking
Hacking
 
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
 
Sectools
SectoolsSectools
Sectools
 
aaa
aaaaaa
aaa
 
Darknet5 (1)
Darknet5 (1)Darknet5 (1)
Darknet5 (1)
 
Pptx present
Pptx presentPptx present
Pptx present
 
Wireshark
WiresharkWireshark
Wireshark
 

Más de Martin Hamilton

Keep taking the tablets? The graduation of the iPad generation
Keep taking the tablets? The graduation of the iPad generationKeep taking the tablets? The graduation of the iPad generation
Keep taking the tablets? The graduation of the iPad generationMartin Hamilton
 
The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018
The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018
The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018Martin Hamilton
 
The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...
The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...
The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...Martin Hamilton
 
Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...
Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...
Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...Martin Hamilton
 
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018Martin Hamilton
 
Martin Hamilton - Digital skills: You won't believe what happened next!
Martin Hamilton - Digital skills: You won't believe what happened next!Martin Hamilton - Digital skills: You won't believe what happened next!
Martin Hamilton - Digital skills: You won't believe what happened next!Martin Hamilton
 
Martin Hamilton - Librarians in Outer Space - CILIP invited talk
Martin Hamilton - Librarians in Outer Space - CILIP invited talkMartin Hamilton - Librarians in Outer Space - CILIP invited talk
Martin Hamilton - Librarians in Outer Space - CILIP invited talkMartin Hamilton
 
Martin Hamilton - The impact of technology on the higher education sector - L...
Martin Hamilton - The impact of technology on the higher education sector - L...Martin Hamilton - The impact of technology on the higher education sector - L...
Martin Hamilton - The impact of technology on the higher education sector - L...Martin Hamilton
 
Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...
Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...
Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...Martin Hamilton
 
Martin Hamilton - What did your AI make today? - BCS invited talk
Martin Hamilton - What did your AI make today? - BCS invited talkMartin Hamilton - What did your AI make today? - BCS invited talk
Martin Hamilton - What did your AI make today? - BCS invited talkMartin Hamilton
 
Blockchain in research and education - UKSG Webinar - September 2017
Blockchain in research and education - UKSG Webinar - September 2017Blockchain in research and education - UKSG Webinar - September 2017
Blockchain in research and education - UKSG Webinar - September 2017Martin Hamilton
 
HPC in the cloud comes of age - Red Oak HPC Seminar
HPC in the cloud comes of age - Red Oak HPC SeminarHPC in the cloud comes of age - Red Oak HPC Seminar
HPC in the cloud comes of age - Red Oak HPC SeminarMartin Hamilton
 
Imagining Mars University - Universities UK 2017 conference
Imagining Mars University - Universities UK 2017 conferenceImagining Mars University - Universities UK 2017 conference
Imagining Mars University - Universities UK 2017 conferenceMartin Hamilton
 
Back to the future - Future Proof IT 2017
Back to the future - Future Proof IT 2017Back to the future - Future Proof IT 2017
Back to the future - Future Proof IT 2017Martin Hamilton
 
Tech in exams - SQA Assessment Expert Group - June 2017
Tech in exams - SQA Assessment Expert Group - June 2017Tech in exams - SQA Assessment Expert Group - June 2017
Tech in exams - SQA Assessment Expert Group - June 2017Martin Hamilton
 
Through the Overton Window - Health Education England horizon scanning worksh...
Through the Overton Window - Health Education England horizon scanning worksh...Through the Overton Window - Health Education England horizon scanning worksh...
Through the Overton Window - Health Education England horizon scanning worksh...Martin Hamilton
 
A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...
A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...
A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...Martin Hamilton
 
Help! My robot is a teacher! - Future Edtech 2017
Help! My robot is a teacher! - Future Edtech 2017Help! My robot is a teacher! - Future Edtech 2017
Help! My robot is a teacher! - Future Edtech 2017Martin Hamilton
 
Towards a UK Edtech Strategy - Edtech Vision 2020
Towards a UK Edtech Strategy - Edtech Vision 2020Towards a UK Edtech Strategy - Edtech Vision 2020
Towards a UK Edtech Strategy - Edtech Vision 2020Martin Hamilton
 
Bridging the digital divide - Digital Skills Summit 2017
Bridging the digital divide - Digital Skills Summit 2017Bridging the digital divide - Digital Skills Summit 2017
Bridging the digital divide - Digital Skills Summit 2017Martin Hamilton
 

Más de Martin Hamilton (20)

Keep taking the tablets? The graduation of the iPad generation
Keep taking the tablets? The graduation of the iPad generationKeep taking the tablets? The graduation of the iPad generation
Keep taking the tablets? The graduation of the iPad generation
 
The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018
The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018
The Intelligent Campus - Where the Internet of Things meets AI - HESCA June 2018
 
The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...
The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...
The Digital Book Thief has a Napster Moment - Edinburgh Near Future Library S...
 
Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...
Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...
Martin Hamilton - The wind from nowhere - Horizon scanning in an uncertain ag...
 
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
From Blockchain to Brexit - edtech trends for 2018 - BETT 2018
 
Martin Hamilton - Digital skills: You won't believe what happened next!
Martin Hamilton - Digital skills: You won't believe what happened next!Martin Hamilton - Digital skills: You won't believe what happened next!
Martin Hamilton - Digital skills: You won't believe what happened next!
 
Martin Hamilton - Librarians in Outer Space - CILIP invited talk
Martin Hamilton - Librarians in Outer Space - CILIP invited talkMartin Hamilton - Librarians in Outer Space - CILIP invited talk
Martin Hamilton - Librarians in Outer Space - CILIP invited talk
 
Martin Hamilton - The impact of technology on the higher education sector - L...
Martin Hamilton - The impact of technology on the higher education sector - L...Martin Hamilton - The impact of technology on the higher education sector - L...
Martin Hamilton - The impact of technology on the higher education sector - L...
 
Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...
Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...
Martin Hamilton - Robots and AI, the calm before the Singularity? - BCS invit...
 
Martin Hamilton - What did your AI make today? - BCS invited talk
Martin Hamilton - What did your AI make today? - BCS invited talkMartin Hamilton - What did your AI make today? - BCS invited talk
Martin Hamilton - What did your AI make today? - BCS invited talk
 
Blockchain in research and education - UKSG Webinar - September 2017
Blockchain in research and education - UKSG Webinar - September 2017Blockchain in research and education - UKSG Webinar - September 2017
Blockchain in research and education - UKSG Webinar - September 2017
 
HPC in the cloud comes of age - Red Oak HPC Seminar
HPC in the cloud comes of age - Red Oak HPC SeminarHPC in the cloud comes of age - Red Oak HPC Seminar
HPC in the cloud comes of age - Red Oak HPC Seminar
 
Imagining Mars University - Universities UK 2017 conference
Imagining Mars University - Universities UK 2017 conferenceImagining Mars University - Universities UK 2017 conference
Imagining Mars University - Universities UK 2017 conference
 
Back to the future - Future Proof IT 2017
Back to the future - Future Proof IT 2017Back to the future - Future Proof IT 2017
Back to the future - Future Proof IT 2017
 
Tech in exams - SQA Assessment Expert Group - June 2017
Tech in exams - SQA Assessment Expert Group - June 2017Tech in exams - SQA Assessment Expert Group - June 2017
Tech in exams - SQA Assessment Expert Group - June 2017
 
Through the Overton Window - Health Education England horizon scanning worksh...
Through the Overton Window - Health Education England horizon scanning worksh...Through the Overton Window - Health Education England horizon scanning worksh...
Through the Overton Window - Health Education England horizon scanning worksh...
 
A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...
A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...
A new life awaits you in the off world colonies - UCISA Spotlight on Digital ...
 
Help! My robot is a teacher! - Future Edtech 2017
Help! My robot is a teacher! - Future Edtech 2017Help! My robot is a teacher! - Future Edtech 2017
Help! My robot is a teacher! - Future Edtech 2017
 
Towards a UK Edtech Strategy - Edtech Vision 2020
Towards a UK Edtech Strategy - Edtech Vision 2020Towards a UK Edtech Strategy - Edtech Vision 2020
Towards a UK Edtech Strategy - Edtech Vision 2020
 
Bridging the digital divide - Digital Skills Summit 2017
Bridging the digital divide - Digital Skills Summit 2017Bridging the digital divide - Digital Skills Summit 2017
Bridging the digital divide - Digital Skills Summit 2017
 

Último

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

How to be a Hacker (Sut i fod yn Haciwr)

  • 7. WearablesDefinitionFrom the New Hacker’s Dictionary, via Eric S Raymond 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. RFC1392, the Internet Users' Glossary, usefully amplifies this as: A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular.
  • 8. WearablesDefinitionFrom the New Hacker’s Dictionary, via Eric S Raymond 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. RFC1392, the Internet Users' Glossary, usefully amplifies this as: A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular.
  • 9. WearablesDefinitionFrom the New Hacker’s Dictionary, via Eric S Raymond 2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming. 3. A person capable of appreciating hack value. 4. A person who is good at programming quickly. 5. An expert at a particular program, or one who frequently does work using it or on it; as in ‘a Unix hacker’. (Definitions 1 through 5 are correlated, and people who fit them congregate.) 6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example. 7. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.
  • 10. WearablesDefinitionFrom the New Hacker’s Dictionary, via Eric S Raymond 2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming. 3. A person capable of appreciating hack value. 4. A person who is good at programming quickly. 5. An expert at a particular program, or one who frequently does work using it or on it; as in ‘a Unix hacker’. (Definitions 1 through 5 are correlated, and people who fit them congregate.) 6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example. 7. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.
  • 13.
  • 14. WearablesCase Studies: Seeing EyePython script using SL4A scripting environment under Android
  • 15. WearablesCase Studies: Seeing Eye“Cloud service” to OCR uploaded photos using open source Tesseract package
  • 17. Wearables Moto Actv Smartwatch - Android 2.3 (Gingerbread) - 600MHz OMAP3 ARMv7 CPU - 256MB RAM - 8GB flash - 802.11B/G/N - Bluetooth, GPS, ANT+ - 220x176 capacitive multitouch display - PowerVR GPU Case Studies: Smartwatch
  • 18. Wearables Moto Actv Smartwatch - Android 2.3 (Gingerbread) - 600MHz OMAP3 ARMv7 CPU - 256MB RAM - 8GB flash - 802.11B/G/N - Bluetooth, GPS, ANT+ - 220x176 capacitive multitouch display - PowerVR GPU Released December 2011 Case Studies: Smartwatch
  • 19. Wearables Moto Actv Smartwatch - Android 2.3 (Gingerbread) - 600MHz OMAP3 ARMv7 CPU - 256MB RAM - 8GB flash - 802.11B/G/N - Bluetooth, GPS, ANT+ - 220x176 capacitive multitouch display - PowerVR GPU Released December 2011 Rooted December 2011 Case Studies: Smartwatch
  • 20. Wearables Moto Actv Smartwatch - Android 2.3 (Gingerbread) - 600MHz OMAP3 ARMv7 CPU - 256MB RAM - 8GB flash - 802.11B/G/N - Bluetooth, GPS, ANT+ - 220x176 capacitive multitouch display - PowerVR GPU Released December 2011 Rooted December 2011 Case Studies: Android
  • 22. WearablesCase Studies: Android Community ROM of latest Android release on old unsupported hardware Video on YouTube at http://youtu.be/7Md9b6XbVtQ
  • 23. WearablesCase Studies: Chrome Article from How-To Geek – howtogeek.com
  • 24. WearablesCase Studies: LinuxLinux powers 900m+ Android devices Photo credit: Kysoh
  • 25. WearablesCase Studies: LinuxLinux powers 94% of the top 500 supercomputers
  • 27. WearablesThe Next Generation Photo credits: Technocamps, DesignSpark
  • 28. Photo credit: Simon Cox, University of Southampton
  • 29. Photo credit: Simon Cox, University of Southampton The Next Generation Image credit: Christopher Barnatt
  • 30. Photo credit: Colin Hattersley
  • 31. Wearables Photo by Frank Wojciechowski, Princeton University
  • 32. WearablesThe Next Generation Watch on YouTube at http://youtu.be/hoSoYf9aKAM