“
The Yankees' Facebook page was hacked. The hacker was immediately purchased and signed to a 5 year contract with the Yankees.
”
”
Stephen Colbert
“
This sort of sickness is a nothingness, really – a state of limbo; neither well enough to be a functioning member of society nor possessing a sign of illness that signals to the world you are sick. There’s no broken arm. Not even a sore throat and hacking cough.
”
”
Frances Ryan
“
I’m probably the only sixteen-year-old girl in a three hundred mile radius who knows how to distinguish between a poltergeist from an actual ghost (hint: If you can disrupt it with nitric acid, or if it throws new crap at you every time, it’s a poltergeist), or how to tell if a medium’s real or faking it (poke ‘em with a true iron needle). I know the six signs of a good occult store (Number One is the proprietor bolts the door before talking about Real Business) and the four things you never do when you’re in a bar with other people who know about the darker side of the world (don’t look weak). I know how to access public information and talk my way around clerks in courthouses (a smile and the right clothing will work wonders). I also know how to hack into newspaper files, police reports, and some kinds of government databases (primary rule: Don’t get caught. Duh).
”
”
Lilith Saintcrow (Strange Angels (Strange Angels, #1))
“
Marriage is like working in a coal mine. You hack away in the dark, day after day, busting rock, and you think you're not getting anywhere, and then all of a sudden, this little sliver of sunlight appears and you say to yourself, "oh, that's what I've been waiting for--just a little light, just a little bit of hope--a sign, maybe, that will get me through. And...it does.
”
”
Adriana Trigiani (Brava, Valentine)
“
There is a tree. At the downhill edge of a long, narrow field in the western foothills of the La Sal Mountains -- southeastern Utah. A particular tree. A juniper. Large for its species -- maybe twenty feet tall and two feet in diameter. For perhaps three hundred years this tree has stood its ground. Flourishing in good seasons, and holding on in bad times. "Beautiful" is not a word that comes to mind when one first sees it. No naturalist would photograph it as exemplary of its kind. Twisted by wind, split and charred by lightning, scarred by brushfires, chewed on by insects, and pecked by birds. Human beings have stripped long strings of bark from its trunk, stapled barbed wire to it in using it as a corner post for a fence line, and nailed signs on it on three sides: NO HUNTING; NO TRESPASSING; PLEASE CLOSE THE GATE. In commandeering this tree as a corner stake for claims of rights and property, miners and ranchers have hacked signs and symbols in its bark, and left Day-Glo orange survey tape tied to its branches. Now it serves as one side of a gate between an alfalfa field and open range. No matter what, in drought, flood heat and cold, it has continued. There is rot and death in it near the ground. But at the greening tips of its upper branches and in its berrylike seed cones, there is yet the outreach of life.
I respect this old juniper tree. For its age, yes. And for its steadfastness in taking whatever is thrown at it. That it has been useful in a practical way beyond itself counts for much, as well. Most of all, I admire its capacity for self-healing beyond all accidents and assaults. There is a will in it -- toward continuing to be, come what may.
”
”
Robert Fulghum (Uh-oh: Some Observations from Both Sides of the Refrigerator Door)
“
A jacketless Murdoch resumes his quiz, brushing off the assault as 'an overexcited autograph-hunter wanting to have his shaving foam signed.
”
”
Andy Zaltzman
“
Takamasa Saegusa: 'Seigen, a mere member of the Toudouza, had the effrontery to sully the sacred dueling ground. For that reason, our lord had already decided to subject him to tu-uchi before long. Cut off his head immediately, and stick it on a pike!'
Gennosuke could hardly believe his ears. Such an insult to Irako Seigen was unwarranted. It was pride. For Gennosuke, Irako Seigen was pride itself.
Takamasa Saegusa: 'Fujiki Gennosuke! It is the way of the samurai to take the head of the defeated enemy on the battleground. Do not hesitate! If you are a samurai, you must carry out the duty of a samurai!'
Samurai...
Saegusa, Lord of Izu, continued shouting, but Gennosuke did not attend. That word 'samurai' alone reverberated through his body.
If one aims at the juncture between the base of the skull and the spine, decapitation is not that difficult, but Gennosuke could muster no more strength than a baby. He grew pale and trembled with the strain. He could only hack with his sword as if he were sawing wood. He felt nauseated, as if his own cells one after another were being annihilated. But this...
Lord Tokugawa Tadanaga: 'I approve.'
Takamasa Saegusa: 'Fujiki Gennosuke, for this splendid action you have received words of thanks from our lord. As a sign of his exceptional approval, you shall be given employment at Sunpu Castle. This great debt will by no means be forgotten. From this day forward you must offer your life to our lord!'
Prostrating himself, Gennosuke vomited.
”
”
Takayuki Yamaguchi (シグルイ 15(Shigurui, #15))
“
[Bus ride through The Strand]:
A puff of wind (in spite of the heat, there was quite a wind) blew a thin black veil over the sun and over the Strand. The faces faded; the omnibuses suddenly lost their glow. For although the clouds were of mountainous white so that one could fancy hacking hard chips off with a hatchet, with broad golden slopes, lawns of celestial pleasure gardens, on their flanks, and had all the appearance of settled habitations assembled for the conference of gods above the world, there was a perpetual movement among them. Signs were interchanged, when, as if to fulfil some scheme arranged already, now a summit dwindled, now a whole block of pyramidal size which had kept its station inalterably advanced into the midst or gravely led the procession to fresh anchorage. Fixed though they seemed at their posts, at rest in perfect unanimity, nothing could be fresher, freer, more sensitive superficially than the snow-white or gold-kindled surface; to change, to go, to dismantle the solemn assemblage was immediately possible; and in spite of the grave fixity, the accumulated robustness and solidity, now they struck light to the earth, now darkness.
Calmly and competently, Elizabeth Dalloway mounted the Westminster omnibus.
”
”
Virginia Woolf (Mrs. Dalloway)
“
The North Korean capital, Pyongyang, is a city consecrated to the worship of a father-son dynasty. (I came to think of them, with their nuclear-family implications, as 'Fat Man and Little Boy.') And a river runs through it. And on this river, the Taedong River, is moored the only American naval vessel in captivity. It was in January 1968 that the U.S.S. Pueblo strayed into North Korean waters, and was boarded and captured. One sailor was killed; the rest were held for nearly a year before being released. I looked over the spy ship, its radio antennae and surveillance equipment still intact, and found photographs of the captain and crew with their hands on their heads in gestures of abject surrender. Copies of their groveling 'confessions,' written in tremulous script, were also on show. So was a humiliating document from the United States government, admitting wrongdoing in the penetration of North Korean waters and petitioning the 'D.P.R.K.' (Democratic People's Republic of Korea) for 'lenience.' Kim Il Sung ('Fat Man') was eventually lenient about the men, but not about the ship. Madeleine Albright didn't ask to see the vessel on her visit last October, during which she described the gruesome, depopulated vistas of Pyongyang as 'beautiful.' As I got back onto the wharf, I noticed a refreshment cart, staffed by two women under a frayed umbrella. It didn't look like much—one of its three wheels was missing and a piece of brick was propping it up—but it was the only such cart I'd see. What toothsome local snacks might the ladies be offering? The choices turned out to be slices of dry bread and cups of warm water.
Nor did Madeleine Albright visit the absurdly misnamed 'Demilitarized Zone,' one of the most heavily militarized strips of land on earth. Across the waist of the Korean peninsula lies a wasteland, roughly following the 38th parallel, and packed with a titanic concentration of potential violence. It is four kilometers wide (I have now looked apprehensively at it from both sides) and very near to the capital cities of both North and South. On the day I spent on the northern side, I met a group of aging Chinese veterans, all from Szechuan, touring the old battlefields and reliving a war they helped North Korea nearly win (China sacrificed perhaps a million soldiers in that campaign, including Mao Anying, son of Mao himself). Across the frontier are 37,000 United States soldiers. Their arsenal, which has included undeclared nuclear weapons, is the reason given by Washington for its refusal to sign the land-mines treaty. In August 1976, U.S. officers entered the neutral zone to trim a tree that was obscuring the view of an observation post. A posse of North Koreans came after them, and one, seizing the ax with which the trimming was to be done, hacked two U.S. servicemen to death with it. I visited the ax also; it's proudly displayed in a glass case on the North Korean side.
”
”
Christopher Hitchens (Love, Poverty, and War: Journeys and Essays)
“
I noticed that as I drove through the defaced and suffering patches of country which still persist between Glasgow and Hamilton and Airdrie and Motherwell, no scents from hedges and fields streamed into the open car. ...it was as if in this region nature no longer breathed, or gave out at most the chill dank mineral breath of coal and iron. The air itself had a synthetic taste, the taste of a food substitute, and seemed to be merely an up-to-date by-product of local industry. The forlorn villages looked like dismembered bits of towns brutally hacked off, and with the raw edges left nakedly exposed. The towns themselves, on the other hand, were like villages on a nightmare scale, which after endless building had never managed to produce what looked like a street, and had no centre of any kind. One could not say that these places were flying asunder, for there was no sign of anything holding them together. They were merely a great number of houses jumbled together in a wilderness of grime, coal-dust and brick, under a blackish-grey synthetic sky.
”
”
Edwin Muir (Scottish Journey)
“
Ralph Waldo Emerson would later observe that “Souls are not saved in bundles.”16 Johnson fervently believed in each individual’s mysterious complexity and inherent dignity. He was, through it all, a moralist, in the best sense of that term. He believed that most problems are moral problems. “The happiness of society depends on virtue,” he would write. For him, like other humanists of that age, the essential human act is the act of making strenuous moral decisions. He, like other humanists, believed that literature could be a serious force for moral improvement. Literature gives not only new information but new experiences. It can broaden the range of awareness and be an occasion for evaluation. Literature can also instruct through pleasure. Today many writers see literature and art only in aesthetic terms, but Johnson saw them as moral enterprises. He hoped to be counted among those writers who give “ardor to virtue and confidence to truth.” He added, “It is always a writer’s duty to make the world better.” As Fussell puts it, “Johnson, then, conceives of writing as something very like a Christian sacrament, defined in the Anglican catechism as ‘an outward and visible sign of an inward and spiritual grace given to us.’ ” Johnson lived in a world of hack writers, but Johnson did not allow himself to write badly—even though he wrote quickly and for money. Instead, he pursued the ideal of absolute literary honesty. “The first step to greatness is to be honest” was one of Johnson’s maxims. He had a low but sympathetic view of human nature. It was said in Greek times that Demosthenes was not a great orator despite his stammer; he was a great orator because he stammered. The deficiency became an incentive to perfect the associated skill. The hero becomes strongest at his weakest point. Johnson was a great moralist because of his deficiencies. He came to understand that he would never defeat them. He came to understand that his story would not be the sort of virtue-conquers-vice story people like to tell. It would be, at best, a virtue-learns-to-live-with-vice story. He wrote that he did not seek cures for his failings, but palliatives. This awareness of permanent struggle made him sympathetic to others’ failings. He was a moralist, but a tenderhearted one.
”
”
David Brooks (The Road to Character)
“
Natasha started to take notice. My sleepiness was good for rudeness to visitors to the gallery, but not for signing for packages or noticing if someone had come in with a dog and tracked paw prints all over the floor, which happened a few times. There were a few spilled lattes. MFA students touching paintings, once even rearranging an installation of shattered CD jewel cases in a Jarrod Harvey installation to spell out the word “HACK.” When I noticed it, I just shuffled the shards of plastic around, no one the wiser. But when a homeless woman set herself up in the back room one afternoon, Natasha found out. I’d had no idea how long the woman had been there. Maybe people thought she was part of the artwork. I ended up paying her fifty bucks out of petty cash to leave. Natasha couldn’t hide her irritation.
”
”
Ottessa Moshfegh (My Year of Rest and Relaxation)
“
Let’s say experiment A is testing a small change, such as the color of the sign-up button. As results start coming in, it becomes clear that the increase in the number of new visitors signing up is very small—garnering just 5 percent more sign-ups than the original button color. Besides the obvious assumption that changing the color of the sign-up button may not be the key factor holding back new users from signing up, it’s also an indication that you’ll have to let the experiment run quite a long time in order to have enough data to make a solid conclusion. As you can see from the chart above, to reach statistically significant results for this test, you’d need a whopping 72,300 visitors per variant—or, in other words, you’d have to wait 72 days to get conclusive results. As Johns put it in an interview with First Round Review, “That’s a lifetime when you’re a start-up!” In a case like this what a start-up really ought to do is abandon the experiment quickly and move on to a next, potentially higher-impact, one.
”
”
Sean Ellis (Hacking Growth: How Today's Fastest-Growing Companies Drive Breakout Success)
“
Along with saying no, the easiest thing you can do to become more influential is just ask. Ask more often, ask more directly, and ask for more. People who ask for what they want get better grades, more raises and promotions, and bigger job opportunities and even more orgasm. This might seem obvious but apparently it isn't.
Most people do not realize how often they are not asking until they start asking more often. Whenever our MBA course ends and students share the biggest thing they have learned - after we have done so much together - the most common answer is “just ask”. The full realization comes from practice. What if you’re not sure how to ask? Just ask the other person. Seriously. One of the simplest and most surprising influence hacks is that if you ask people how to influence them, they will often tell you.
Most of us are reluctant to ask because we fundamentally misunderstand the psychology of asking and we underestimate our likelihood of success. In one series of experiments, employees were more likely to turn in mediocre work than to ask for deadline extension, fearing their supervisor, would think them incompetent if they asked for extra time. But they had it backward: Managers saw extension requests as a good sign of capability and motivation. Pg 64, 65
”
”
Zoe Chance (Influence Is Your Superpower: The Science of Winning Hearts, Sparking Change, and Making Good Things Happen)
“
Instead there was a rush on me of people having to have immediate action; some hand-hacked old kitchen stiff as thickened with grease as a miner or sandhog would be with clay, wanting me to go and see his boss, subito; or an Indian would bring his grievances written in a poem on a paper bag soaked with doughnut oil.[….] There were Greek and Negro chambermaids from all the hotels, porters, doormen, checkroom attendants, waitresses, specialists [….]. All kinds were coming. The humanity of the under-galleries of pipes, storage, and coal made an appearance, maintenance men, short-order grovelers; or a ducal Frenchman, in homburg, like a singer, calling himself “the beauty cook,” who wrote down on his card without taking off his gloves. And then old snowbirds and white hound-looking faces, guys with Wobbly cards from an earlier time, old Bohunk women with letters explaining what was wanted, and all varieties of assaulted kissers, infirmity, drunkenness, dazedness, innocence, limping, crawling, insanity, prejudice, and from downright leprosy the whole way again to the most vigorous straight- backed beauty. So if this collection of people has nothing in common with what would have brought up the back of a Xerxes’ army or a Constantine’s, new things have been formed; but what struck me in them was a feeling of antiquity and thick crust. But I expect happiness and gladness have always been the same, so how much variation should there be in their opposite? Dealing with them, signing them into the organization and explaining what to expect, wasn’t all generous kindness. In large part it was rough, when I wanted to get out of the way. The demand was that fierce, the idea having gotten around that it was a judgment hour, that they wanted to pull you from your clerical side of the desk to go with them.
”
”
Saul Bellow (The Adventures of Augie March)
“
But states have difficulty evaluating cybersecurity threats. If a state does detect an intrusion in one of its vital networks and if that intrusion looks to be from another state, what should the state suffering the intrusion conclude? On the one hand, it might be a defensive-minded intrusion, only checking out the intruded-upon state’s capabilities and providing reassuring intelligence to the intruding state. This might seem unsettling but not necessarily threatening, presuming the state suffering the intrusion was not developing capabilities for attack or seeking conflict. On the other hand, the intrusion might be more nefarious. It could be a sign of some coming harm, such as a cyber attack or an expanding espionage operation. The state suffering the intrusion will have to decide which of these two possibilities is correct, interpreting limited and almost certainly insufficient amounts of data to divine the intentions of another state. Thus Chapter Four’s argument is vitally important: intrusions into a state’s strategically important networks pose serious risks and are therefore inherently threatening. Intrusions launched by one state into the networks of another can cause a great deal of harm at inopportune times, even if the intrusion at the moment of discovery appears to be reasonably benign. The intrusion can also perform reconnaissance that enables a powerful and well-targeted cyber attack. Even operations launched with fully defensive intent can serve as beachheads for future attack operations, so long as a command and control mechanism is set up. Depending on its target, the intrusion can collect information that provides great insight into the communications and strategies of policy-makers. Network intrusions can also pose serious counterintelligence risks, revealing what secrets a state has learned about other states and provoking a damaging sense of paranoia. Given these very real threats, states are likely to view any serious intrusion with some degree of fear. They therefore have significant incentive to respond strongly, further animating the cybersecurity dilemma.
”
”
Ben Buchanan (The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations)
“
Our Black Ops 2 hack is running strong, stable and it’s still undetected by anti-cheat software in 2017. With the ability to easily locate other players, deliver quick kills, and unlock every single weapon quickly, you will dominate with our iWantCheats Black Ops 2 hack. You can download Black Ops 2 on Amazon.
It only takes 4 minutes to sign up and download our Black Ops 2 cheat, you can rank up in hours, not weeks. It’s really that simple, then you can start using our undetected bot on every server and kill everything you see. Think about 200 meter sniper kills, our Black Ops 2 Aimbot allows you to do that with no problems at all. Simply hit your Aimbot key and the weapon locks on and stays locked on the players head until you take him out. Watch the Call of Duty Black Ops 2 Hack video below and see our hack in action!
[Copy link to your browser to visit] ==>> blackops2.cheattool.online
”
”
black ops 2 hack
“
The agreement—signed by Amy Dacey and Robby Mook with a copy to Marc Elias—specified that in exchange for raising money and investing in the DNC, Hillary would control the party’s finances, strategy, and all the money raised. Her campaign had the right of refusal of who would be the party communications director, and it would make final decisions on all the other staff. The DNC also was required to consult with the campaign about all other staffing, budgeting, data, analytics, and mailings.
”
”
Donna Brazile (Hacks: The Inside Story of the Break-ins and Breakdowns That Put Donald Trump in the White House)
“
Assign a file or paper tray to collect single-side printed paper for reuse. Boycott paper sourced from virgin forests and reams sold in plastic. Cancel magazine and newspaper subscriptions; view them online instead. Digitize important receipts and documents for safekeeping. Digital files are valid proofs for tax purposes. Download CutePDF Writer to save online files without having to print them. Email invitations or greeting cards instead of printing them (see “Holidays and Gifts” chapter). Forage the recycling can when paper scraps are needed, such as for bookmarks or pictures (for school collages, for example). Give extra paper to the local preschool. Hack the page margins of documents to maximize printing. Imagine a paperless world. Join the growing paperless community. Kill the fax machine; encourage electronic faxing through a service such as HelloFax. Limit yourself to print only on paper that has already been printed on one side. Make online billing and banking a common practice. Nag the kids’ teachers to send home only important papers. Opt out of paper newsletters. Print on both sides when using a new sheet of paper (duplex printing). Question the need for printing; print only when absolutely necessary. In most cases, it is not. Repurpose junk mail envelopes—make sure to cross out any barcode. Sign electronically using the Adobe Acrobat signing feature or SignNow.com. Turn down business cards; enter relevant info directly into a smartphone. Use shredded paper as a packing material, single-printed paper fastened with a metal clip for a quick notepad (grocery lists, errands lists), and double-printed paper to wrap presents or pick up your dog’s feces. Visit the local library to read business magazines and books. Write on paper using a pencil, which you can then erase to reuse paper, or better yet, use your computer, cell phone, or erasable board instead of paper. XYZ: eXamine Your Zipper; i.e., your leaks: attack any incoming source of paper.
”
”
Bea Johnson (Zero Waste Home: The Ultimate Guide to Simplifying Your Life by Reducing Your Waste (A Simple Guide to Sustainable Living))
“
If you create your “account” e.g. ICO Address with the project, make sure that you are on the right website. Scammers create fake websites which look similar to the original ICO Project page but send the money to the scammers. In rare cases, it also happens that the original Web server of the ICO project is hacked and the receiving address changed to the account of the hackers. So it is best to register with the site and copy the ICO address to your computer (for example in a word file) and compare it to the ICO address on the website a day later to check if it is the same. If it is, it is reasonably safe to send the money. Usually, these hacks are identified fast and the website secured again. No changes in your ICO receiving address are a good sign that you are sending it to the right place.
”
”
Philipp Staiger (Invest smarter in ICOs: Research.Participate.Learn)
“
While Dark Web sites elude detection by most search engines, what enables certain ones to distinguish the difference between Deep and Dark Web is how the pages are accessed. Deep Web sites can be accessed typically with any browser, but there may still be sign-in limits, and users must know how to get to content since, as noted earlier, it will not be listed in search engines like Google and Bing. In contrast, Dark Web sites are encrypted and only accessible via Tor or similar browsers. They are found via word of mouth. The difference between dealing with matter on the Deep Web and on the Dark Web comes down to how you detect and attack their communication centers. Many
”
”
Malcolm W. Nance (Hacking ISIS: How to Destroy the Cyber Jihad)
“
failed, close up shop. They had considered employing several growth hacks to drive more adoption. For example, they thought about requiring people to whom users sent photos to also sign up for the app in order to download the photos. But they decided against that because they were afraid it would annoy people. But remember that growth hacking involves more than picking from a menu of hacks; it is, rather, a process of continuous experimentation to ensure that those hacks are achieving the desired results. If they were truly practicing growth hacking, they would have run a test to determine whether or not their assumption was true. Instead
”
”
Sean Ellis (Hacking Growth: How Today's Fastest-Growing Companies Drive Breakout Success)
“
Quick Gmail Trick Noah and I both use the Gmail “+” trick all the time. Let’s say your email address is bob@bobsmith.com. After signing up for services or newsletters, how can you tell who’s sharing your email, or contain the damage if someone discovers your login email? Companies get hacked all the time. Just use + as cheap insurance. If you append + and a word to the beginning, messages will still get delivered to your inbox. Signing up for Instacart, for instance? You could use bob+insta@bobsmith.com. I use this, or benefit from it, on a daily basis.
”
”
Timothy Ferriss (Tools of Titans: The Tactics, Routines, and Habits of Billionaires, Icons, and World-Class Performers)
“
Dropbox, the cloud storage company mentioned previously that Sean Ellis was from, cleverly implemented a double-sided incentivized referral program. When you referred a friend, not only did you get more free storage, but your friend got free storage as well (this is called an “in-kind” referral program). Dropbox prominently displayed their novel referral program on their site and made it easy for people to share Dropbox with their friends by integrating with all the popular social media platforms. The program immediately increased the sign-up rate by an incredible 60 percent and, given how cheap storage servers are, cost the company a fraction of what they were paying to acquire clients through channels such as Google ads. One key takeaway is, when practicable, offer in-kind referrals that benefit both parties. Although Sean Ellis coined the term “growth hacking,” the Dropbox growth hack noted above was actually conceived by Drew Houston, Dropbox’s founder and CEO, who was inspired by PayPal’s referral program that he recalled from when he was in high school. PayPal gave you ten dollars for every friend you referred, and your friend received ten dollars for signing up as well. It was literally free money. PayPal’s viral marketing campaign was conceived by none other than Elon Musk (now billionaire, founder of SpaceX, and cofounder of Tesla Motors). PayPal’s growth hack enabled the company to double their user base every ten days and to become a success story that the media raved about. One key takeaway is that a creative and compelling referral program can not only fuel growth but also generate press.
”
”
Raymond Fong (Growth Hacking: Silicon Valley's Best Kept Secret)
“
MIND GAME Name That Loop For the rest of the day, try to “catch” your negative mind loops as they happen. Watch for signs of mental “pain” or friction, which are a good indicator of thought processes that need debugging. Debug each negative thought loop down to its root problem using one of the three techniques: • The Five Whys: Ask “Why?” five times. • Worst-Case Scenario: What’s the worst thing that could happen? • Third-Person Perspective: What would you say if you were hearing this from someone else? At the end of the day, write down each of the “root problems” you uncovered on your practice sheet, preferably using the METAL method. In Part 1 of Mind Hacking, we’ve seen how the mind is a naturally noisy place and how we can cultivate focus and awareness of the mind’s programming through
”
”
John Hargrave (Mind Hacking: How to Change Your Mind for Good in 21 Days)
“
I stipulate that this does not make sense,” Randy says. Eb glares into the distance, not mollified. “Will you agree with me that the world is full of irrational people, and crazy situations?” “Jaaaa—” Eb says guardedly. “If you and I are going to hack and get paid for it, people have to hire us, right?” Eb considers it carefully. “Yes.” “That means dealing with those people, at some level, unpleasant as it may be. And accepting a whole lot of other nonsense, like lawyers and PR people and marketroids. And if you or I tried to deal with them, we would go out of our minds. True?” “Most likely, yes.” “It is good, then, that people like Avi and Beryl have come into existence, because they are our interface.” An image from the Cold War comes into Randy’s head. He reaches out with both hands and gropes in the air. “Like those glove boxes that they use to handle plutonium. See?” Eberhard nods. An encouraging sign. “But that doesn’t mean that it’s going to be like programming computers. They can only filter and soften the irrational nature of the world beyond, so Avi and Beryl may still do things that seem a little crazy.” Eb has been getting a more and more faraway look in his eyes.
”
”
Neal Stephenson (Cryptonomicon)
“
A typical plague victim developed large, tumorlike buboes on the skin; they started the size of almonds and grew to the size of eggs. They were painful to the touch and brought on hideous deformities when they grew large. A bubo under the arm would force the arm to lurch uncontrollably out to the side; sited on the neck, it would force the head into a permanently cocked position. The buboes were frequently accompanied by dark blotches, known as God’s tokens, an unmistakable sign that the sufferer had been touched by the angel of death. Accompanying these violent deformities, the victim often developed a hacking cough that brought up blood and developed into incessant vomiting. He gave off a disgusting stench, which seemed to leak from every part of his body—his saliva, breath, sweat, and excrement stank overpoweringly—and eventually he began to lose his mind, wandering around screaming and collapsing in pain.
”
”
Dan Jones (The Plantagenets: The Warrior Kings and Queens Who Made England)
“
Hacking? Some programmers try to hack their way toward working code rather than using a systematic approach like the PPP. If you've ever found that you've coded yourself into a corner in a routine and have to start over, that's an indication that the PPP might work better. If you find yourself losing your train of thought in the middle of coding a routine, that's another indication that the PPP would be beneficial. Have you ever simply forgotten to write part of a class or part of routine? That hardly ever happens if you're using the PPP. If you find yourself staring at the computer screen not knowing where to start, that's a surefire sign that the PPP would make your programming life easier.
”
”
Steve McConnell (Code Complete)
“
What, then, is political realism? Attitudinally, it shares many traits and premises with foreign policy realism. It sees governing as difficult and political peace and stability as treasures never to be taken for granted. It understands that power’s complex hydraulics make interventions unpredictable and risky. (Banning some ugly political practice, for instance, won’t necessarily make it go away.) It therefore values incrementalism and, especially, equilibrium—and, therefore, transactional politics. If most of the players in a political system are invested in dickering, the system is doing something right, not something wrong. Back-scratching and logrolling are signs of a healthy political system, not a corrupt one. Transactional politics is not always appropriate or effective, but a political system which is not reliably capable of it is a system in a state of critical failure.
”
”
Jonathan Rauch (Political Realism: How Hacks, Machines, Big Money, and Back-Room Deals Can Strengthen American Democracy)
“
The agreement—signed by Amy Dacey and Robby Mook with a copy to Marc Elias—specified that in exchange for raising money and investing in the DNC, Hillary would control the party’s finances, strategy, and all the money raised. Her campaign had the right of refusal of who would be the party communications director, and it would make final decisions on all the other staff. The DNC also was required to consult with the campaign about all other staffing, budgeting, data, analytics, and mailings. I had been wondering why it was that I couldn’t write a press release without passing it by Brooklyn. Well, here was the answer. When the party chooses the
”
”
Donna Brazile (Hacks: The Inside Story of the Break-ins and Breakdowns That Put Donald Trump in the White House)
“
It doesn’t matter how many people know about you or how they find out about you. It matters how many sign up. If handing out flyers on the street corner accomplishes that, then consider it growth hacking.
”
”
Ryan Holiday (Growth Hacker Marketing: A Primer on the Future of PR, Marketing and Advertising)
“
Telegram is a secure, encrypted chat, audio, and file sharing program for mobile phones that quickly became the preferred ISIS communications application. In September 2015, ISIS added the ability to create channels, which changed the app from simply a secret messaging app to a massive hidden forum platform ripe with content from the world’s active terrorist organizations. Multitudes of groups post in channels that are outside the scrutiny of Google and other search engines. Yet if you sign in on the phone app or via Telegram’s website today, you’ll find not only ISIS, AQ, and other terrorist channels, but a wide range of conversations. The
”
”
Malcolm W. Nance (Hacking ISIS: How to Destroy the Cyber Jihad)
“
The menu: legendary deep-fried Turkeyzilla, gravy, stuffing, mashed potatoes, cranberry sauce, and green beans.
The theme: dysfunction.
“So,” Elysia said to Lex’s parents with her ever-friendly grin, “how are you?”
“How do you think they are?” Ferbus whispered.
She kicked him under the table. “I mean—um—what do you do? For a living?”
Lex’s mother, who hadn’t said much, continued to stare down the table at the sea of black hoodies while picking at her potatoes.
Lex’s father cleared his throat. “I’m a contractor,” he said. “And she’s a teacher.”
“Omigod! I wanted to be a teacher!” Elysia turned to Mrs. Bartleby. “Do you love it?”
“Hmm?” She snapped back to attention and smiled vacantly at Elysia. “Oh, yes. I do. The kids are a nice distraction.”
“From what?” Pip asked.
Bang smacked her forehead. Lex squeezed Driggs’s hand even tighter, causing him to choke on his stuffing. He coughed and hacked until the offending morsel flew out of his mouth, landing in Sofi’s glass of water.
“Ewww!” she squealed.
“Drink around it,” Pandora scolded. “So! I hear New York City is lovely this time of year.”
Well, it looks nice, I guess,” Mr. Bartleby said. “But shoveling out the driveway is a pain in the neck. The girls used to help, but now . . .”
Sensing the impending awkwardness, Corpp jumped in. “Well, Lex has been a wonderful addition to our community. She’s smart, friendly, a joy to be around—”
“And don’t you worry about the boyfriend,” Ferbus said, pointing to Driggs. “I keep him in line.”
Mrs. Bartleby’s eyes widened, looking at Lex and then Driggs. “You have a—” she sputtered. “He’s your—”
Ferbus went white. “They didn’t know?”
“Oops!” said Uncle Mort in a theatrical voice, getting up from the table. “Almost forgot the biscuits!”
“Let me help you with those,” Lex said through clenched teeth, following him to the counter. A series of pained hugs and greetings had ensued when her parents arrived—but the rest of the guests showed up so soon thereafter that Lex hadn’t gotten a chance to talk to them, much to her relief. Still, she hadn’t stopped seething. “What were you thinking?”
Uncle Mort gave her a reproachful look. “I was thinking that your parents were probably going to feel more lonely and depressed this Thanksgiving than they’ve ever felt in their lives, and that maybe we could help alleviate some of that by hosting a dinner featuring the one and only daughter they have left.”
“A dinner of horrors? You know my track record with family gatherings!”
He ignored her. “Here we are!” he said, turning back to the table with a giant platter. “Biscuits aplenty!”
Lex grunted and took her seat. “I’m not sure how much longer I can do this,” she whispered to Driggs.
“Me neither,” he replied. “I think my hand is broken in three places.”
“Sorry.”
“And your dad seems to be shooting me some sort of a death stare.”
Lex glanced at her father. “That’s bad.”
“Think he brought the shotgun?”
“It’s entirely possible.”
“All I’m saying,” Ferbus went on, trying to redeem himself and failing, “is that we all look out for one another here.” Mr. Bartleby looked at him. Ferbus began to sweat. “Because, you know. We all need somebody. Uh, to lean on.”
“Stop talking,” Bang signed.
Elysia gave Lex’s parents a sympathetic grin. “I think what my idiot partner is trying to say—through the magic of corny song lyrics, for some reason—is that you don’t need to worry about Lex. She’s like a sister to me.” She realized her poor choice of words as a pained look came to Mrs. Bartleby’s face. “Or an especially close cousin.” She shut her mouth and stared at her potatoes. “Frig.”
Lex was now crushing Driggs’s hand into a fine paste. Other than the folding chairs creaking and Pip obliviously scraping the last bits of food off his plate, the table was silent.
“Good beans!” Pip threw in.
”
”
Gina Damico (Scorch (Croak, #2))
“
For years I have let dentists ride rough-shod over my teeth; I have been sawed, hacked, chopped, whittled, bewitched, bewildered, tattooed, and signed on again; but this is cuspid’s last stand.
”
”
S.J. Perelman (Crazy Like a Fox: The Classic Comedy Collection)
“
I want monogamy, partnership, ’til death.”
“Sounds great. Sign me up.
”
”
Penny Reid (Love Hacked (Knitting in the City, #3))
“
Semler works hard to remove any sign of structure or bureaucracy. Results alone, not tenure, rank, gender, or age, are the measuring stick, and the trust-based environment brings out the best in people.
”
”
Josh Linkner (Hacking Innovation: The New Growth Model from the Sinister World of Hackers)
“
You’ve been uploading photos on social media for long, but CoSign lets you turn them into cash. Just tag images you upload to social media with information about the products pictured in them.
”
”
Ravi Jain (New Life Hacks: 1200+ Collection of Amazing Life Hacks)
“
Hacks. When consumers or companies are creating off-label uses for something such that it becomes more useful; or when someone finds an experience related to technology or digital media so frustrating that she builds something smarter, more intuitive, and easier to use. Although Twitter was invented to make it easier for people to connect with each other, in the beginning users had no easy way to tag topics or follow conversations as they did within chat and message boards. Early adopter Chris Messina proposed using the number sign, or hashtag, as a workaround.25 His hack not only completely transformed how we aggregate and share content across social media
”
”
Amy Webb (The Signals Are Talking: Why Today's Fringe Is Tomorrow's Mainstream)