Hackers: Heroes of the Computer Revolution
Rate it:
Open Preview
2%
Flag icon
jiggle some diodes, and tweak a few connections. Peter Samson and his friends had grown up with a specific relationship to the world, wherein things had meaning only if you found out how they worked.
3%
Flag icon
When a piece of equipment wasn’t working, it was “losing”; when a piece of equipment was ruined, it was “munged” (mashed until no good);
3%
Flag icon
a project undertaken or a product built not solely to fulfill some constructive goal, but with some wild pleasure taken in mere involvement, was called a “hack.”
3%
Flag icon
to qualify as a hack, the feat must be imbued with innovation, style, and technical virtuosity.
7%
Flag icon
Access to computers—and anything that might teach you something about the way the world works—should be unlimited and total. Always yield to the Hands-On Imperative!
7%
Flag icon
Hackers believe that essential lessons can be learned about the systems—about the world—from taking things apart, seeing how they work, and using this knowledge to create new and even more interesting things. They resent any person, physical barrier, or law that tries to keep them from doing this.
7%
Flag icon
Imperfect systems infuriate hackers, whose primal instinct is to debug them.
7%
Flag icon
All information should be free. If you don’t have access to the information you need to improve things, how can you fix them? A free exchange of information, particularly when the information was in the form of a computer program, allowed for greater overall creativity.
7%
Flag icon
Mistrust Authority—Promote Decentralization. The best way to promote this free exchange of information is to have an open system, something that presents no boundaries between a hacker and a piece of information or an item of equipment that he needs in his quest for knowledge, improvement, and time online. The last thing you need is a bureaucracy. Bureaucracies, whether corporate, government, or university, are flawed systems, dangerous in that they cannot accommodate the exploratory impulse of true hackers.
7%
Flag icon
Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
11%
Flag icon
The game Spacewar, a computer program itself, helped show how all games—and maybe everything else—worked like computer programs. When you went a bit astray, you modified your parameters and fixed it. You put in new instructions.
13%
Flag icon
“If hackers are born, then they’re going to get made, and if they’re made into it, they were born.”
14%
Flag icon
“The Right Thing,” Gosper would later explain, “very specifically meant the unique, correct, elegant solution . . . the thing that satisfied all the constraints at the same time, which everyone seemed to believe existed for most problems.”
18%
Flag icon
“He was very persistent. If you try a few times and give up, you’ll never get there. But if you keep at it . . . There’s a lot of problems in the world which can really be solved by applying two or three times the persistence that other people will.”
18%
Flag icon
his position of authority, like that of most bureaucrats, was deemed an accident.
20%
Flag icon
Bureaucracies were always threatened by people who wanted to know how things worked. Bureaucrats knew their survival depended on keeping people in ignorance,
22%
Flag icon
And Minsky continued, telling him that the world is built a certain way, and the most important thing we can do with the world is avoid randomness, and figure out ways by which things can be planned.
24%
Flag icon
an important corollary of hackerism states that no system or program is ever completed. You can always make it better. Systems are organic, living creations: if people stop working on them and improving them, they die.
31%
Flag icon
“Secrecy is the keystone of all tyranny,” said Heinlein’s Revolt in 2100 protagonist,
32%
Flag icon
“I’m not asking you what you want to do, I’m asking what have you done?”
35%
Flag icon
—ALL WATCHED OVER BY MACHINES OF LOVING GRACE
35%
Flag icon
Doctor Benway, the Naked Lunch character, was “a manipulator and coordinator of symbol systems, an expert on all phases of interrogation, brainwashing, and control.”
36%
Flag icon
“It was the same as ham radio. I didn’t want to spend my money to get on the air bragging about my equipment. I wanted to build things.”
37%
Flag icon
He would become interested in a subject and devour it wholesale. “I tend to consume shelves in libraries,” he’d later explain.
37%
Flag icon
“There are only two kinds of gratification that a human being can possess,” he would say, “ego and wallet. That’s it, baby. If you got those you’re in business.
38%
Flag icon
About two thousand people, sight unseen, sent checks, money orders, three, four, five hundred dollars apiece, to an unknown company in a relatively unknown city, in a technically unknown state. These people were different. They were adventurers in a new land. They were the same people who went West in the early days of America. The weirdos who decided they were going to California, or Oregon, or Christ knows where.”
38%
Flag icon
purer than one could find anywhere else. Ed Roberts later spoke of the power: “When you talk about wealth, what you’re really saying is, ‘How many people do you control?’ If I were to give you an army of ten thousand people, could you build a pyramid?
43%
Flag icon
Buckminster Fuller had developed the concept of synergy—the collective power, more than the sum of the parts, that comes of people and/or phenomena working together in a system—and
44%
Flag icon
It was from those Indians, Les Solomon insisted, that he learned the vital principle of vril, a power that allows you to move huge objects with very little force.
47%
Flag icon
transformation: “I take a day of rest now. I won’t turn on the computer on Sunday.” “The other six days, I’ll work like a dog.”
47%
Flag icon
‘Design by Geniuses for Use by Idiots,’
48%
Flag icon
“Because they all had the same thing,” Solomon would later explain. “That little burning inside the eyeball. She used to say there was an inside personality, and though they looked like disreputable bums, you looked them in the face, you looked in those eyes and you knew who they were. She’d look at them and what would come out was the brightness, the intenseness.”
51%
Flag icon
“He would pass judgment, which is his major talent:
53%
Flag icon
“It was amazing to watch the anarchists put on a different shirt,”
55%
Flag icon
You start by thinking there’s a god in the box. And then you find there isn’t anything in the box. You put the god in the box.”
57%
Flag icon
To be a leader of men, a deft builder of competent, well-meshed employee teams, a persuasive promoter, and a constructive manipulator . . . this was what Dick Sunderland aspired toward.
60%
Flag icon
. there was an aura of the illegitimate about the product, only slightly more respectable than hard-core porno books.
70%
Flag icon
Success is heady. Can you stand it?”
70%
Flag icon
can summarize what it takes in three words: marketing, marketing, marketing.”
70%
Flag icon
Software always takes longer than you expect.
71%
Flag icon
Ken had also developed a theory about friends and business. “Everything is personal and good friends up to about ten thousand dollars,” Ken later explained. “Once past ten thousand dollars, friendship doesn’t matter.”
77%
Flag icon
Now, after months of delay, some due to an unexpectedly long debugging period (there has never been an unexpectedly short debugging period in the history of computers),
77%
Flag icon
industry. Pat Mariott summed it up in a whisper, quoting gonzo journalist Hunter S. Thompson: “When the going gets weird, the weird turn pro.”
78%
Flag icon
[Socializing] gets less and less possible as the business gets more and more cutthroat. You want your competitors to know less and less what you’re doing.”
83%
Flag icon
The thing he liked about the AI lab at Tech Square was that “there were no artificial obstacles, things that are insisted upon that make it hard for people to get any work done—things like bureaucracy, security, refusals to share with other people.”
87%
Flag icon
Burrell Smith, the designer of the Macintosh computer, said it as well as anyone in one of the sessions at the first Hacker Conference: “Hackers can do almost anything and be a hacker. You can be a hacker carpenter. It’s not necessarily high tech. I think it has to do with craftsmanship and caring about what you’re doing.”
88%
Flag icon
“The right information in the right place just changes your life.