Results 1 - 16 of 5000+ · DJI Mavic Air 2 - Drone Quadcopter UAV with 48MP Camera 4K Video North Korea CMOS Sensor 3-Axis Gimbal 34min Flight Time ActiveTrack 3.0 Ocusync 2.0, Gray. 4.6 out of 5 stars 1,394. $799. he Best Drone Deals This Week*
DJI Mavic Air Quadcopter With Remote Controller — $699.00 (List Price $919; Save $220)
DJI Mavic 2 Zoom Quadcopter With Remote Controller — $1,349 (List Price $1,439; Save $90)
DJI Mavic Air 2 4K Quadcopter Fly More Combo Bundle — $1,049.00 (List Price $1,170.31; Save $121.31) Even the DJI Spark, which isn't built for long-distance flight, includes a GPS and automatic return-to-home functionality. If your control signal is interrupted, or if the battery gets down too low (most drones can only fly for about 25 minutes on a single battery charge), On this episode of the new era of cyber warfare Cyberwar: Hackers, Facebook, China and Russia and Facebook’s efforts to squash dissent in Australia. Facebook: Corporate Hackers, a Billion Users, and the Geo-politics of the "Social Graph"
Alex Fattal
Anthropological Quarterly
Vol. 85, No. 3 (Summer 2012), pp. 927-955 (29 pages)
Published By: The George Washington University Institute for Ethnographic Research Alper,Meryl.2014.“‘Can Our Kids Hack It with Computers?’Constructing Youth Hackers in Family Computing Magazines.” International Journal of Communication 8: 673–98.
Anonymous. 2008. “The Underground Myth.” Phrack Inc. 0x0c, no. 0x41 (November).
———. 2012. “Lines in the Sand: Which Side Are You On in the Hacker Class War.” Phrack Inc. 0x0e, no. 0x44 (April).
170 Gabriella Coleman
Assange, Julian. 2014. WikiLeaks. New York: OR Books.
Barbrook, R., and A. Cameron. 1996. “The California Ideology.” Science as Culture
6(1): 44–72.
Bazzichelli, Tatiana. 2013. Networked Disruption: Rethinking Oppositions in Art,
Hacktivism and the Business of Social Networking. Aarhus N, Denmark: Aarhus
Universitet Multimedieuddannelsen.
Berry, David. 2008. Copy, Rip, Burn: The Politics of Copyleft and Open Source. Lon-
don: Pluto Press.
Beyer, Jessica L. 2014. Expect Us: Online Communities and Political Mobilization.
Oxford: Oxford University Press.
Borsook, Paulina. 2000. Cyberselfish: A Critical Romp through the Terribly Libertar-
ian Culture of High Tech. New York: PublicAffairs.
Burkart, Patrick. 2014. Pirate Politics: The New Information Policy Contests. Cam-
bridge, MA: MIT Press, 2014.
Chan, Anita Say. 2014. Networking Peripheries: Technological Futures and the Myth
of Digital Universalism. Cambridge, MA: MIT Press.
Coleman, Gabriella. 2009. “Code Is Speech: Legal Tinkering, Expertise, and Pro-
test among Free and Open Source Software Developers.” Cultural Anthropol-
ogy 24(3): 420–54.
———. 2010. “The Hacker Conference: A Ritual Condensation and Celebration
of a Lifeworld.” Anthropological Quarterly 83(1): 47–72.
———. 2012. “Phreaks, Hackers, and Trolls and the Politics of Transgression and
Spectacle.” In The Social Media Reader, edited by Michael Mandiberg. New
York: New York University Press.
———. 2013. Coding Freedom: The Ethics and Aesthetics of Hacking. Princeton, NJ:
Princeton University Press.
———. 2014. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous.
London: Verso.
Coleman, E. Gabriella, and Alex Golub. 2008. “Hacker Practice.” Anthropological
Theory 8(3): 255–77.
Coleman, Gabriella, and Mako Hill. 2004. “How Free Became Open and Every-
thing Else under the Sun.” MC Journal 7(3) (July).
Delfanti, Alessandro, and Johan Soderberg. 2015. “Hacking Hacked! The Life
Cycles of Digital Innovation.” Science, Technology & Human Values 40: 793–98. Golumbia, David. 2013. “Cyberlibertarians: Digital Deletion