SlideShare a Scribd company logo
Redefining Better
    TedXBrooklyn


       Chad Dickerson
         CEO, Etsy
      @chaddickerson
      December 2, 2011
better
TedX Brooklyn: Hackers and redefining better
TedX Brooklyn: Hackers and redefining better
Hackers can do almost anything and be a
hacker.  You can be a hacker carpenter.  It's
not necessarily high tech.  I think it has to
do with craftsmanship and caring about
what you're doing.

                             Burrell Smith
       Designer of Macintosh motherboard
Hacking might be characterized as “an
appropriate application of ingenuity.”

                           — Eric Raymond
TedX Brooklyn: Hackers and redefining better
The Hacker Ethic

   Hands-on learning
        Sharing
      Openness
    Decentralization
  Improving the world
In the emerging, highly programmed
landscape ahead, you will either
create the software or you will be the
software. It’s really that simple:
Program, or be programmed.

                 — Douglas Rushkoff
TedX Brooklyn: Hackers and redefining better
TedX Brooklyn: Hackers and redefining better
TedX Brooklyn: Hackers and redefining better
TedX Brooklyn: Hackers and redefining better
TedX Brooklyn: Hackers and redefining better
Two simple “rules”
Take something from idea
  to prototype in a day
Demo it at the end of the
day, in two minutes or less
TedX Brooklyn: Hackers and redefining better
TedX Brooklyn: Hackers and redefining better
TedX Brooklyn: Hackers and redefining better
TedX Brooklyn: Hackers and redefining better
“a wonderful bazaar of
  dreamers showing
their ideas made real.”
“life-changing”
What makes
Hack Days special?
Almost no rules
TedX Brooklyn: Hackers and redefining better
No obvious leader
“Prepared environment”
Ideas united with action
Don’t bullshit —
just play.

— Wynton Marsalis
Cultivation of joy
Story-telling
Faith in people
I learned that inspiration might be the
world’s only renewable energy source
and it scales like a motherf*****.

                              My blog post after Open Hack Day
                “Yahoo! Open Hack Day: How it all came together”
TedX Brooklyn: Hackers and redefining better
The world is being
hacked, right now.
TedX Brooklyn: Hackers and redefining better
#egypt
”We use Facebook to schedule the protests,
"



Twitter to coordinate, and YouTube to tell the
world."
                              – Egyptian Activist
Thank you, Facebook
#OWS
TedX Brooklyn: Hackers and redefining better
TedX Brooklyn: Hackers and redefining better
TedX Brooklyn: Hackers and redefining better
TedX Brooklyn: Hackers and redefining better
TedX Brooklyn: Hackers and redefining better
TedX Brooklyn: Hackers and redefining better
Hack your company.
Hack your country.
Hack your world.
TedX Brooklyn: Hackers and redefining better
Photo credits and sources
• http://www.flickr.com/photos/danieloliverio/6252676907/
• http://www.flickr.com/photos/lhl/241180672/
• http://upload.wikimedia.org/wikipedia/commons/a/a9/Douglas_Rushkoff.jpg
• http://www.flickr.com/photos/lincolnian/304477845/
• http://www.flickr.com/photos/26686573@N00/5059088848/ (The_Brit_2)
• http://www.flickr.com/photos/chad/163890393/ -
• http://www.flickr.com/photos/freshelectrons/166492035/
• http://www.flickr.com/photos/andypiper/561849829/
• http://www.flickr.com/photos/gsfc/4792764923/
• http://www.wired.com/software/coolapps/news/2007/06/hackday
• http://www.flickr.com/photos/kentbrew/557602352/
• http://www.flickr.com/photos/heroiclife/2372572357/
• http://wyntonmarsalis.org/photos/gallery/wynton-marsalis-quintet-concert-sound-check-at-ronnie-scotts-
jazz-club-lond/5
• http://www.flickr.com/photos/yodelanecdotal/257015615/
• https://twitter.com/#!/factoryjoe/statuses/223115412
• https://twitter.com/#!/richardengelnbc/status/33538754417266688
• http://www.flickr.com/photos/kevynjacobs/6244779897/
• http://www.seattlepi.com/local/gallery/Occupy-Seattle-protest-at-Walmart-32299/photo-1795212.php
• http://www.flickr.com/photos/subcow/6236610724/
• http://www.flickr.com/photos/42745190@N02/6348269065/ (neonmorgan, with permission)

More Related Content

Viewers also liked

Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...
Yury Chemerkin
 
DevOps
DevOpsDevOps
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
Alert Logic
 
DevOps & Security: Here & Now
DevOps & Security: Here & NowDevOps & Security: Here & Now
DevOps & Security: Here & Now
Checkmarx
 
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
Nick Galbreath
 
Continuous Security Testing with Devops - OWASP EU 2014
Continuous Security Testing  with Devops - OWASP EU 2014Continuous Security Testing  with Devops - OWASP EU 2014
Continuous Security Testing with Devops - OWASP EU 2014
Stephen de Vries
 

Viewers also liked (6)

Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...
 
DevOps
DevOpsDevOps
DevOps
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
 
DevOps & Security: Here & Now
DevOps & Security: Here & NowDevOps & Security: Here & Now
DevOps & Security: Here & Now
 
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
DevOpsSec: Appling DevOps Principles to Security, DevOpsDays Austin 2012
 
Continuous Security Testing with Devops - OWASP EU 2014
Continuous Security Testing  with Devops - OWASP EU 2014Continuous Security Testing  with Devops - OWASP EU 2014
Continuous Security Testing with Devops - OWASP EU 2014
 

Similar to TedX Brooklyn: Hackers and redefining better

The Hacker Perspective
The Hacker PerspectiveThe Hacker Perspective
The Hacker Perspective
jjtay
 
Emergent MEDIA, NEXT GEN THINKING
Emergent MEDIA, NEXT GEN THINKINGEmergent MEDIA, NEXT GEN THINKING
Emergent MEDIA, NEXT GEN THINKING
Ann DeMarle
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lecture
Rob Jewitt
 
2011 April 16 ERDI - futuristics and personalized learning
2011 April 16 ERDI - futuristics and personalized learning2011 April 16 ERDI - futuristics and personalized learning
2011 April 16 ERDI - futuristics and personalized learning
Brian Kuhn
 
We are all hackers now
We are all hackers nowWe are all hackers now
We are all hackers now
Mark Vanderbeeken
 
P2 Lecture 5
P2 Lecture 5P2 Lecture 5
P2 Lecture 5
Frans Mäyrä
 
Micromedia: A Global Digital Climate Change
Micromedia: A Global Digital Climate ChangeMicromedia: A Global Digital Climate Change
Micromedia: A Global Digital Climate Change
Lindner Martin
 
UX STRAT USA 2018 Presentation: Dr. Faith McCreary, Intel
UX STRAT USA 2018 Presentation: Dr. Faith McCreary, IntelUX STRAT USA 2018 Presentation: Dr. Faith McCreary, Intel
UX STRAT USA 2018 Presentation: Dr. Faith McCreary, Intel
UX STRAT
 
Hackteria: Hacking the Institutions Worldwide - since 2009
Hackteria: Hacking the Institutions Worldwide - since 2009Hackteria: Hacking the Institutions Worldwide - since 2009
Hackteria: Hacking the Institutions Worldwide - since 2009
Marc Dusseiller Dusjagr
 
Make Things People Want & The Hollow Factory...
Make Things People Want & The Hollow Factory...Make Things People Want & The Hollow Factory...
Make Things People Want & The Hollow Factory...
John V Willshire
 
Information talk slides february2011 1-final
Information talk slides february2011 1-finalInformation talk slides february2011 1-final
Information talk slides february2011 1-final
Kaisa Schreck
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lecture
Rob Jewitt
 
Empowered Citizens or Digital Dairy Cows
Empowered Citizens or Digital Dairy Cows Empowered Citizens or Digital Dairy Cows
Empowered Citizens or Digital Dairy Cows
Mathias Klang
 
Recognizing the Gift
Recognizing the GiftRecognizing the Gift
Recognizing the Gift
Gardner Campbell
 
Social Media 101 - Presented at BrandMuscle
Social Media 101 - Presented at BrandMuscleSocial Media 101 - Presented at BrandMuscle
Social Media 101 - Presented at BrandMuscle
Michael DeAloia
 
Use & Abuse of Social Media
Use & Abuse of Social MediaUse & Abuse of Social Media
Use & Abuse of Social Media
Mathias Klang
 
Eduwebinar: Our Everyday Tools for Success
Eduwebinar:  Our Everyday Tools for SuccessEduwebinar:  Our Everyday Tools for Success
Eduwebinar: Our Everyday Tools for Success
Judy O'Connell
 
2009 04 30 IFS - google or be googled
2009 04 30 IFS - google or be googled2009 04 30 IFS - google or be googled
2009 04 30 IFS - google or be googled
Maarten Cannaerts
 
Our Everyday Tools for Success
Our Everyday Tools for SuccessOur Everyday Tools for Success
Our Everyday Tools for Success
Judy O'Connell
 
Quotes about cyber security
Quotes about cyber securityQuotes about cyber security
Quotes about cyber security
TruShield Security Solutions
 

Similar to TedX Brooklyn: Hackers and redefining better (20)

The Hacker Perspective
The Hacker PerspectiveThe Hacker Perspective
The Hacker Perspective
 
Emergent MEDIA, NEXT GEN THINKING
Emergent MEDIA, NEXT GEN THINKINGEmergent MEDIA, NEXT GEN THINKING
Emergent MEDIA, NEXT GEN THINKING
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lecture
 
2011 April 16 ERDI - futuristics and personalized learning
2011 April 16 ERDI - futuristics and personalized learning2011 April 16 ERDI - futuristics and personalized learning
2011 April 16 ERDI - futuristics and personalized learning
 
We are all hackers now
We are all hackers nowWe are all hackers now
We are all hackers now
 
P2 Lecture 5
P2 Lecture 5P2 Lecture 5
P2 Lecture 5
 
Micromedia: A Global Digital Climate Change
Micromedia: A Global Digital Climate ChangeMicromedia: A Global Digital Climate Change
Micromedia: A Global Digital Climate Change
 
UX STRAT USA 2018 Presentation: Dr. Faith McCreary, Intel
UX STRAT USA 2018 Presentation: Dr. Faith McCreary, IntelUX STRAT USA 2018 Presentation: Dr. Faith McCreary, Intel
UX STRAT USA 2018 Presentation: Dr. Faith McCreary, Intel
 
Hackteria: Hacking the Institutions Worldwide - since 2009
Hackteria: Hacking the Institutions Worldwide - since 2009Hackteria: Hacking the Institutions Worldwide - since 2009
Hackteria: Hacking the Institutions Worldwide - since 2009
 
Make Things People Want & The Hollow Factory...
Make Things People Want & The Hollow Factory...Make Things People Want & The Hollow Factory...
Make Things People Want & The Hollow Factory...
 
Information talk slides february2011 1-final
Information talk slides february2011 1-finalInformation talk slides february2011 1-final
Information talk slides february2011 1-final
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lecture
 
Empowered Citizens or Digital Dairy Cows
Empowered Citizens or Digital Dairy Cows Empowered Citizens or Digital Dairy Cows
Empowered Citizens or Digital Dairy Cows
 
Recognizing the Gift
Recognizing the GiftRecognizing the Gift
Recognizing the Gift
 
Social Media 101 - Presented at BrandMuscle
Social Media 101 - Presented at BrandMuscleSocial Media 101 - Presented at BrandMuscle
Social Media 101 - Presented at BrandMuscle
 
Use & Abuse of Social Media
Use & Abuse of Social MediaUse & Abuse of Social Media
Use & Abuse of Social Media
 
Eduwebinar: Our Everyday Tools for Success
Eduwebinar:  Our Everyday Tools for SuccessEduwebinar:  Our Everyday Tools for Success
Eduwebinar: Our Everyday Tools for Success
 
2009 04 30 IFS - google or be googled
2009 04 30 IFS - google or be googled2009 04 30 IFS - google or be googled
2009 04 30 IFS - google or be googled
 
Our Everyday Tools for Success
Our Everyday Tools for SuccessOur Everyday Tools for Success
Our Everyday Tools for Success
 
Quotes about cyber security
Quotes about cyber securityQuotes about cyber security
Quotes about cyber security
 

More from Chad Dickerson

Etsy - XOXO 2012 - Portland
Etsy - XOXO 2012 - PortlandEtsy - XOXO 2012 - Portland
Etsy - XOXO 2012 - Portland
Chad Dickerson
 
Keeping it real, always: Values-based business at Etsy
Keeping it real, always: Values-based business at EtsyKeeping it real, always: Values-based business at Etsy
Keeping it real, always: Values-based business at Etsy
Chad Dickerson
 
Continuous Deployment at Etsy - SXSW 2012 Lean Startup Track
Continuous Deployment at Etsy - SXSW 2012 Lean Startup TrackContinuous Deployment at Etsy - SXSW 2012 Lean Startup Track
Continuous Deployment at Etsy - SXSW 2012 Lean Startup Track
Chad Dickerson
 
Code as Craft: Building a Strong Engineering Culture at Etsy
Code as Craft: Building a Strong Engineering Culture at EtsyCode as Craft: Building a Strong Engineering Culture at Etsy
Code as Craft: Building a Strong Engineering Culture at Etsy
Chad Dickerson
 
Finding your courage
Finding your courageFinding your courage
Finding your courage
Chad Dickerson
 
Optimizing for developer happiness
Optimizing for developer happinessOptimizing for developer happiness
Optimizing for developer happiness
Chad Dickerson
 
Scaling startups
Scaling startupsScaling startups
Scaling startups
Chad Dickerson
 
Mashups: Beyond Maps
Mashups: Beyond MapsMashups: Beyond Maps
Mashups: Beyond Maps
Chad Dickerson
 
Big Company Hacks at Yahoo!
Big Company Hacks at Yahoo!Big Company Hacks at Yahoo!
Big Company Hacks at Yahoo!
Chad Dickerson
 
Hacking Developer Relations at Yahoo! Developer Network
Hacking Developer Relations at Yahoo! Developer NetworkHacking Developer Relations at Yahoo! Developer Network
Hacking Developer Relations at Yahoo! Developer Network
Chad Dickerson
 
Beyond web services: supporting mashup artists at Yahoo!
Beyond web services: supporting mashup artists at Yahoo!Beyond web services: supporting mashup artists at Yahoo!
Beyond web services: supporting mashup artists at Yahoo!
Chad Dickerson
 

More from Chad Dickerson (11)

Etsy - XOXO 2012 - Portland
Etsy - XOXO 2012 - PortlandEtsy - XOXO 2012 - Portland
Etsy - XOXO 2012 - Portland
 
Keeping it real, always: Values-based business at Etsy
Keeping it real, always: Values-based business at EtsyKeeping it real, always: Values-based business at Etsy
Keeping it real, always: Values-based business at Etsy
 
Continuous Deployment at Etsy - SXSW 2012 Lean Startup Track
Continuous Deployment at Etsy - SXSW 2012 Lean Startup TrackContinuous Deployment at Etsy - SXSW 2012 Lean Startup Track
Continuous Deployment at Etsy - SXSW 2012 Lean Startup Track
 
Code as Craft: Building a Strong Engineering Culture at Etsy
Code as Craft: Building a Strong Engineering Culture at EtsyCode as Craft: Building a Strong Engineering Culture at Etsy
Code as Craft: Building a Strong Engineering Culture at Etsy
 
Finding your courage
Finding your courageFinding your courage
Finding your courage
 
Optimizing for developer happiness
Optimizing for developer happinessOptimizing for developer happiness
Optimizing for developer happiness
 
Scaling startups
Scaling startupsScaling startups
Scaling startups
 
Mashups: Beyond Maps
Mashups: Beyond MapsMashups: Beyond Maps
Mashups: Beyond Maps
 
Big Company Hacks at Yahoo!
Big Company Hacks at Yahoo!Big Company Hacks at Yahoo!
Big Company Hacks at Yahoo!
 
Hacking Developer Relations at Yahoo! Developer Network
Hacking Developer Relations at Yahoo! Developer NetworkHacking Developer Relations at Yahoo! Developer Network
Hacking Developer Relations at Yahoo! Developer Network
 
Beyond web services: supporting mashup artists at Yahoo!
Beyond web services: supporting mashup artists at Yahoo!Beyond web services: supporting mashup artists at Yahoo!
Beyond web services: supporting mashup artists at Yahoo!
 

Recently uploaded

Sonkoloniya documentation - ONEprojukti.pdf
Sonkoloniya documentation - ONEprojukti.pdfSonkoloniya documentation - ONEprojukti.pdf
Sonkoloniya documentation - ONEprojukti.pdf
SubhamMandal40
 
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
sunilverma7884
 
Vulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive OverviewVulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive Overview
Steven Carlson
 
CiscoIconsLibrary cours de réseau VLAN.ppt
CiscoIconsLibrary cours de réseau VLAN.pptCiscoIconsLibrary cours de réseau VLAN.ppt
CiscoIconsLibrary cours de réseau VLAN.ppt
moinahousna
 
Introduction-to-the-IAM-Platform-Implementation-Plan.pptx
Introduction-to-the-IAM-Platform-Implementation-Plan.pptxIntroduction-to-the-IAM-Platform-Implementation-Plan.pptx
Introduction-to-the-IAM-Platform-Implementation-Plan.pptx
313mohammedarshad
 
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite SolutionIPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Networks
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Muhammad Ali
 
Data Integration Basics: Merging & Joining Data
Data Integration Basics: Merging & Joining DataData Integration Basics: Merging & Joining Data
Data Integration Basics: Merging & Joining Data
Safe Software
 
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
aslasdfmkhan4750
 
Google I/O Extended Harare Merged Slides
Google I/O Extended Harare Merged SlidesGoogle I/O Extended Harare Merged Slides
Google I/O Extended Harare Merged Slides
Google Developer Group - Harare
 
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
maigasapphire
 
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptxUse Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
SynapseIndia
 
Using LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and MilvusUsing LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and Milvus
Zilliz
 
Figma AI Design Generator_ In-Depth Review.pdf
Figma AI Design Generator_ In-Depth Review.pdfFigma AI Design Generator_ In-Depth Review.pdf
Figma AI Design Generator_ In-Depth Review.pdf
Management Institute of Skills Development
 
The importance of Quality Assurance for ICT Standardization
The importance of Quality Assurance for ICT StandardizationThe importance of Quality Assurance for ICT Standardization
The importance of Quality Assurance for ICT Standardization
Axel Rennoch
 
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
bhumivarma35300
 
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
Edge AI and Vision Alliance
 
Opencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of MünsterOpencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of Münster
Matthias Neugebauer
 
CHAPTER-8 COMPONENTS OF COMPUTER SYSTEM CLASS 9 CBSE
CHAPTER-8 COMPONENTS OF COMPUTER SYSTEM CLASS 9 CBSECHAPTER-8 COMPONENTS OF COMPUTER SYSTEM CLASS 9 CBSE
CHAPTER-8 COMPONENTS OF COMPUTER SYSTEM CLASS 9 CBSE
kumarjarun2010
 
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
Priyanka Aash
 

Recently uploaded (20)

Sonkoloniya documentation - ONEprojukti.pdf
Sonkoloniya documentation - ONEprojukti.pdfSonkoloniya documentation - ONEprojukti.pdf
Sonkoloniya documentation - ONEprojukti.pdf
 
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
 
Vulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive OverviewVulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive Overview
 
CiscoIconsLibrary cours de réseau VLAN.ppt
CiscoIconsLibrary cours de réseau VLAN.pptCiscoIconsLibrary cours de réseau VLAN.ppt
CiscoIconsLibrary cours de réseau VLAN.ppt
 
Introduction-to-the-IAM-Platform-Implementation-Plan.pptx
Introduction-to-the-IAM-Platform-Implementation-Plan.pptxIntroduction-to-the-IAM-Platform-Implementation-Plan.pptx
Introduction-to-the-IAM-Platform-Implementation-Plan.pptx
 
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite SolutionIPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite Solution
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
 
Data Integration Basics: Merging & Joining Data
Data Integration Basics: Merging & Joining DataData Integration Basics: Merging & Joining Data
Data Integration Basics: Merging & Joining Data
 
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
 
Google I/O Extended Harare Merged Slides
Google I/O Extended Harare Merged SlidesGoogle I/O Extended Harare Merged Slides
Google I/O Extended Harare Merged Slides
 
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
 
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptxUse Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
 
Using LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and MilvusUsing LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and Milvus
 
Figma AI Design Generator_ In-Depth Review.pdf
Figma AI Design Generator_ In-Depth Review.pdfFigma AI Design Generator_ In-Depth Review.pdf
Figma AI Design Generator_ In-Depth Review.pdf
 
The importance of Quality Assurance for ICT Standardization
The importance of Quality Assurance for ICT StandardizationThe importance of Quality Assurance for ICT Standardization
The importance of Quality Assurance for ICT Standardization
 
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
High Profile Girls call Service Pune 000XX00000 Provide Best And Top Girl Ser...
 
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
“Deploying Large Language Models on a Raspberry Pi,” a Presentation from Usef...
 
Opencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of MünsterOpencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of Münster
 
CHAPTER-8 COMPONENTS OF COMPUTER SYSTEM CLASS 9 CBSE
CHAPTER-8 COMPONENTS OF COMPUTER SYSTEM CLASS 9 CBSECHAPTER-8 COMPONENTS OF COMPUTER SYSTEM CLASS 9 CBSE
CHAPTER-8 COMPONENTS OF COMPUTER SYSTEM CLASS 9 CBSE
 
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
(CISOPlatform Summit & SACON 2024) Digital Personal Data Protection Act.pdf
 

TedX Brooklyn: Hackers and redefining better

  • 1. Redefining Better TedXBrooklyn Chad Dickerson CEO, Etsy @chaddickerson December 2, 2011
  • 5. Hackers can do almost anything and be a hacker.  You can be a hacker carpenter.  It's not necessarily high tech.  I think it has to do with craftsmanship and caring about what you're doing. Burrell Smith Designer of Macintosh motherboard
  • 6. Hacking might be characterized as “an appropriate application of ingenuity.” — Eric Raymond
  • 8. The Hacker Ethic Hands-on learning Sharing Openness Decentralization Improving the world
  • 9. In the emerging, highly programmed landscape ahead, you will either create the software or you will be the software. It’s really that simple: Program, or be programmed. — Douglas Rushkoff
  • 16. Take something from idea to prototype in a day
  • 17. Demo it at the end of the day, in two minutes or less
  • 22. “a wonderful bazaar of dreamers showing their ideas made real.”
  • 30. Don’t bullshit — just play. — Wynton Marsalis
  • 34. I learned that inspiration might be the world’s only renewable energy source and it scales like a motherf*****. My blog post after Open Hack Day “Yahoo! Open Hack Day: How it all came together”
  • 36. The world is being hacked, right now.
  • 39. ”We use Facebook to schedule the protests, " Twitter to coordinate, and YouTube to tell the world." – Egyptian Activist
  • 41. #OWS
  • 52. Photo credits and sources • http://www.flickr.com/photos/danieloliverio/6252676907/ • http://www.flickr.com/photos/lhl/241180672/ • http://upload.wikimedia.org/wikipedia/commons/a/a9/Douglas_Rushkoff.jpg • http://www.flickr.com/photos/lincolnian/304477845/ • http://www.flickr.com/photos/26686573@N00/5059088848/ (The_Brit_2) • http://www.flickr.com/photos/chad/163890393/ - • http://www.flickr.com/photos/freshelectrons/166492035/ • http://www.flickr.com/photos/andypiper/561849829/ • http://www.flickr.com/photos/gsfc/4792764923/ • http://www.wired.com/software/coolapps/news/2007/06/hackday • http://www.flickr.com/photos/kentbrew/557602352/ • http://www.flickr.com/photos/heroiclife/2372572357/ • http://wyntonmarsalis.org/photos/gallery/wynton-marsalis-quintet-concert-sound-check-at-ronnie-scotts- jazz-club-lond/5 • http://www.flickr.com/photos/yodelanecdotal/257015615/ • https://twitter.com/#!/factoryjoe/statuses/223115412 • https://twitter.com/#!/richardengelnbc/status/33538754417266688 • http://www.flickr.com/photos/kevynjacobs/6244779897/ • http://www.seattlepi.com/local/gallery/Occupy-Seattle-protest-at-Walmart-32299/photo-1795212.php • http://www.flickr.com/photos/subcow/6236610724/ • http://www.flickr.com/photos/42745190@N02/6348269065/ (neonmorgan, with permission)