Life hack

Last updated
A keyboard inexpensively hacked with K'Nex pieces to allow an operator suffering from wrist pain to press the
.mw-parser-output .keyboard-key{border:1px solid #aaa;border-radius:0.2em;box-shadow:0.1em 0.1em 0.2em rgba(0,0,0,0.1);background-color:var(--background-color-neutral-subtle,#f8f9fa);background-image:linear-gradient(to bottom,var(--background-color-neutral,#eaecf0),var(--background-color-neutral-subtle,#f8f9fa),var(--background-color-neutral,#eaecf0));color:var(--color-base,#202122);padding:0.1em 0.3em;font-family:inherit;font-size:0.85em}
control,
alt and
| Shift keys with the thumb Modified keyboard (16372763).jpg
A keyboard inexpensively hacked with K'Nex pieces to allow an operator suffering from wrist pain to press the control, alt and ⇧ Shift keys with the thumb

A life hack (or life hacking) is any trick, shortcut, skill, or novelty method that increases productivity and efficiency, in all walks of life. The term was primarily used by computer experts who suffer from information overload or those with a playful curiosity in the ways they can accelerate their workflow in ways other than programming. [1]

Contents

History

The original definition of the term "hack" is "to cut with rough or heavy blows". In the modern vernacular, it has often been used to describe an inelegant but effective solution to a specific computing problem, such as quick-and-dirty shell scripts and other command line utilities that filtered, munged and processed data streams like e-mail and RSS feeds. [2] [3] The term was later extended to life hack, in reference to a solution to a problem unrelated to computers that might occur in a programmer's everyday life.[ citation needed ] Examples of these types of life hacks might include utilities to synchronize files, track tasks, remind oneself of events, or filter e-mail.[ citation needed ]

Popularization

The term life hack was coined in 2004 during the O'Reilly Emerging Technology Conference in San Diego, California by technology journalist Danny O'Brien to describe the "embarrassing" scripts and shortcuts productive IT professionals use to get their work done. [2] [4]

O'Brien and blogger Merlin Mann later co-presented a session called "Life Hacks Live" at the 2005 O'Reilly Emerging Technology conference. [5] The two also co-author a column entitled "Life Hacks" for O'Reilly's Make magazine which debuted in February 2005. [6]

The American Dialect Society voted lifehack (one word) as the runner-up for "most useful word of 2005" behind podcast . [7] The word was also added to the Oxford Dictionaries Online in June 2011. [8]

See also

Related Research Articles

<span class="mw-page-title-main">Hacker</span> Person skilled in information technology

A hacker is a person skilled in information technology who achieves goals by non-standard means. The term has become associated in popular culture with a security hacker – someone with knowledge of bugs or exploits to break into computer systems and access data which would otherwise be inaccessible to them. In a positive connotation, though, hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques to collect evidence on criminals and other malicious actors. This could include using anonymity tools to mask their identities online and pose as criminals.

<span class="mw-page-title-main">Leet</span> Online slang and alternative orthography

Leet, also known as eleet or leetspeak, or simply hacker speech, is a system of modified spellings used primarily on the Internet. It often uses character replacements in ways that play on the similarity of their glyphs via reflection or other resemblance. Additionally, it modifies certain words on the basis of a system of suffixes and alternative meanings. There are many dialects or linguistic varieties in different online communities.

<span class="mw-page-title-main">Randal L. Schwartz</span> American programmer and technology writer

Randal L. Schwartz, also known as merlyn, is an American author, system administrator and programming consultant. He has written several books on the Perl programming language, and plays a promotional role within the Perl community. He was a co-host of FLOSS Weekly.

The hacker culture is a subculture of individuals who enjoy—often in collective effort—the intellectual challenge of creatively overcoming the limitations of software systems or electronic hardware, to achieve novel and clever outcomes. The act of engaging in activities in a spirit of playfulness and exploration is termed hacking. However, the defining characteristic of a hacker is not the activities performed themselves, but how it is done and whether it is exciting and meaningful. Activities of playful cleverness can be said to have "hack value" and therefore the term "hacks" came about, with early examples including pranks at MIT done by students to demonstrate their technical aptitude and cleverness. The hacker culture originally emerged in academia in the 1960s around the Massachusetts Institute of Technology (MIT)'s Tech Model Railroad Club (TMRC) and MIT Artificial Intelligence Laboratory. Hacking originally involved entering restricted areas in a clever way without causing any major damage. Some famous hacks at the Massachusetts Institute of Technology were placing of a campus police cruiser on the roof of the Great Dome and converting the Great Dome into R2-D2.

An application program is a computer program designed to carry out a specific task other than one relating to the operation of the computer itself, typically to be used by end-users. Word processors, media players, and accounting software are examples. The collective noun "application software" refers to all applications collectively. The other principal classifications of software are system software, relating to the operation of the computer, and utility software ("utilities").

<span class="mw-page-title-main">Microsoft Entourage</span> Email client and personal information manager

Microsoft Entourage is a discontinued e-mail client and personal information manager that was developed by Microsoft for Mac OS 8.5 and later. Microsoft first released Entourage in October 2000 as part of the Microsoft Office 2001 office suite; Office 98, the previous version of Microsoft Office for the classic Mac OS included Outlook Express 5. The last version was Entourage: Mac 2008, part of Microsoft Office 2008 for Mac, released on January 15, 2008. Entourage was replaced by Outlook for Macintosh in Microsoft Office for Mac 2011, released on October 26, 2010.

<span class="mw-page-title-main">Typographical error</span> Mistake made in typing printed material

A typographical error, also called a misprint, is a mistake made in the typing of printed or electronic material. Historically, this referred to mistakes in manual typesetting. Technically, the term includes errors due to mechanical failure or slips of the hand or finger, but excludes errors of ignorance, such as spelling errors, or changing and misuse of words such as "than" and "then". Before the arrival of printing, the copyist's mistake or scribal error was the equivalent for manuscripts. Most typos involve simple duplication, omission, transposition, or substitution of a small number of characters.

<span class="mw-page-title-main">Rael Dornfest</span> American computer programmer and author

Rael Dornfest is an American computer programmer and author. He was a technical fellow and CTO of Charity: Water, and was previously an engineer at Twitter. He was founder and chief executive officer of Values of N, creator of "I Want Sandy" and "Stikkit: Little Yellow Notes that Think." Previously, he was chief technology officer at O'Reilly Media. He began working for Twitter after they bought the assets of his company Values of N.

<span class="mw-page-title-main">Web 2.0</span> World Wide Web sites that use technology beyond the static pages of earlier Web sites

Web 2.0 refers to websites that emphasize user-generated content, ease of use, participatory culture, and interoperability for end users.

<span class="mw-page-title-main">Hackathon</span> Event in which groups of software developers work at an accelerated pace

A hackathon is an event where people engage in rapid and collaborative engineering over a relatively short period of time such as 24 or 48 hours. They are often run using agile software development practices, such as sprint-like design wherein computer programmers and others involved in software development, including graphic designers, interface designers, product managers, project managers, domain experts, and others collaborate intensively on engineering projects, such as software engineering.

<span class="mw-page-title-main">Radvision</span> Israeli telecommunication company

Radvision was a provider of video conferencing solution and enabling products for IP communication developers based in Tel Aviv, Israel. Radvision was acquired by Avaya in June 2012. Spirent Communications acquired Radvision's Technology Business Unit from Avaya in July 2014, to become Spirent Developer Tools Business Unit.

<span class="mw-page-title-main">Wireless security</span> Aspect of wireless networks

Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks. The term may also refer to the protection of the wireless network itself from adversaries seeking to damage the confidentiality, integrity, or availability of the network. The most common type is Wi-Fi security, which includes Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is an old IEEE 802.11 standard from 1997. It is a notoriously weak security standard: the password it uses can often be cracked in a few minutes with a basic laptop computer and widely available software tools. WEP was superseded in 2003 by WPA, a quick alternative at the time to improve security over WEP. The current standard is WPA2; some hardware cannot support WPA2 without firmware upgrade or replacement. WPA2 uses an encryption device that encrypts the network with a 256-bit key; the longer key length improves security over WEP. Enterprises often enforce security using a certificate-based system to authenticate the connecting device, following the standard 802.11X.

<span class="mw-page-title-main">Scunthorpe problem</span> Problem caused by profanity filters on the Internet

The Scunthorpe problem is the unintentional blocking of online content by a spam filter or search engine because their text contains a string of letters that appear to have an obscene or otherwise unacceptable meaning. Names, abbreviations, and technical terms are most often cited as being affected by the issue.

Voice over Internet Protocol (VoIP) recording is a subset of telephone recording or voice logging, first used by call centers and now being used by all types of businesses. There are many reasons for recording voice over IP call traffic such as: reducing company vulnerability to lawsuits by maintaining recorded evidence, complying with telephone call recording laws, increasing security, employee training and performance reviews, enhancing employee control and alignment, verifying data, sharing data as well as customer satisfaction and enhancing call center agent morale.

A JavaScript library is a library of pre-written JavaScript code that allows for easier development of JavaScript-based applications, especially for AJAX and other web-centric technologies. They can be included in a website by embedding it directly in the HTML via a script tag.

<span class="mw-page-title-main">Lifesize</span>

Lifesize was a video and audio telecommunications company in the United States which provided high definition videoconferencing endpoints and accessories, touchscreen conference room phones, a cloud-based video collaboration platform, and omnichannel contact center solutions under their CxEngage product line. Lifesize's headquarters was located in Austin, Texas. Its Europe, Middle East and Africa regional office were located in Munich, Germany.

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.

A userscript is a program, usually written in JavaScript, for modifying web pages to augment browsing. Uses include adding shortcut buttons and keyboard shortcuts, controlling playback speeds, adding features to sites, and enhancing the browsing history.

Trevor Coleman is a co-founder of InteraXon, a Canadian company specializing in software for Non-invasive Brain-computer interfaces. The company presented an installation at Ontario House during the Vancouver 2010 Winter Olympic Games that allowed users in Vancouver to control the lights on the CN Tower, Niagara Falls and the Canadian Parliament Buildings. Interaxon also created the world's first thought-controlled in-flight entertainment system, which they demonstrated at the On the Wings of Innovation conference organized by the Ontario Government and Ontario Aerospace Council in Windsor in June 2010.

Digital Forensics Framework (DFF) is a discontinued computer forensics open-source software package. It is used by professionals and non-experts to collect, preserve and reveal digital evidence without compromising systems and data.

References

  1. "Definition of LIFE HACK". www.merriam-webster.com. 2024-10-27. Retrieved 2024-11-02.
  2. 1 2 "Interview: father of "life hacks" Danny O'Brien". Lifehacker.com. 2005-03-17. Retrieved 2010-03-11.
  3. "Cory Doctorow's notes from Danny O'Brien's first Life Hacks presentation" . Retrieved 2010-03-11.
  4. "O'Reilly Emerging Technology Conference 2004". Conferences.oreillynet.com. 1999-02-22. Archived from the original on 2007-09-18. Retrieved 2010-03-11.
  5. "O'Reilly Emerging Technology Conference 2005". Conferences.oreillynet.com. 1999-02-22. Archived from the original on 2007-09-10. Retrieved 2010-03-11.
  6. "Life hacks". Makezine.com. Archived from the original on 2012-05-27. Retrieved 2012-07-01.
  7. "Words of the Year 2005.pdf" (PDF). Retrieved 2010-03-11.
  8. "'NSFW,' 'ZOMG,' and 'Twittersphere' added to dictionary". today.com. 3 June 2011. Retrieved 2015-10-22.