-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hacking: who does what to whom?
,----[ Quote ]
| A couple of days ago, Jesse Sheidlower wrote
| to me about the recent climate-scientist email
| controversy. Since Jesse is a lexicographer,
| he wasn't writing about whether this is the
| blue-dress moment for anthropogenic climate
| change, or a nontroversy based on the shocking
| discovery that scientists are not always
| scrupulously fair-minded in private. Rather,
| Jesse was concerned about the argument
| structure of the verb hack.
|
| [...]
|
| So it doesn't surprise me to find that "âhack
| [into] A for B" turns into things like "How to
| hack money from the Godfather in Mafia Wars",
| or "They hacked the [credit card] numbers from
| 9 major retailers", or "Many people used to
| hack CSS files from the web".]
`----
http://languagelog.ldc.upenn.edu/nll/?p=1914
Recent:
London To Host 'Music Hack Day'
,----[ Quote ]
| The inaugural Music Hack Day, an event for the international tech and digital
| music community, is to take place in London this weekend (July 11 to 12).
|
| Bringing together 200 delegates, the two-day event is believed to be the
| first 'hack' type event dedicated exclusively to the music industry. In this
| context, hackers are defined as those who use their expertise to explore the
| possibilities of open-source software rather than those infiltrating and
| damaging secure systems.
`----
http://www.billboard.biz/bbbiz/content_display/industry/e3i42f2b2f43cf6c380e9d2c62a6dba9ffb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAksMg3IACgkQU4xAY3RXLo73cQCgoJ96SXklvJ4TWNpNB6Vp3dd8
xtEAniKv8NNinoAQS7tG1tRDkEezCLmH
=Cuxi
-----END PGP SIGNATURE-----
|
|