Hackers: Heroes of the Computer Revolution
Rate it:
Open Preview
Read between October 30, 2015 - August 2, 2018
69%
Flag icon
But as more nontechnical people bought computers, the things that impressed hackers were not as essential. While the programs themselves had to maintain a certain standard of quality, it was quite possible that the most exacting standards — those applied by a hacker who wanted to add one more feature, or wouldn’t let go of a project until it was demonstrably faster than anything else around — were probably counterproductive.
69%
Flag icon
When computers are sold like toasters, programs will be sold like toothpaste.
70%
Flag icon
The dark period was over, but something had changed in the relationship between Ken and John. It was emblematic of the way that On-Line was changing, into more of a bureaucracy than a hacker Summer Camp.
71%
Flag icon
This was no small loss, because the VCS machine was hopelessly limited in memory, and writing games on it required skills honed as finely as those required in haiku composition.
71%
Flag icon
Like his computer hacking, which was characterized by explosive bursts of innovation and inattention to detail, his business style was punctuated by flashes of insight and failures to follow through on ideas.
72%
Flag icon
To Dick’s mind, the flow of information should be channeled with discretion, with an unambiguous interpretation controlled by the people at the top.
74%
Flag icon
Third-Generation hackers never had the sense of community of their predecessors, and early on they came to see healthy sales figures as essential to becoming winners.
74%
Flag icon
To hackers, a program was an organic entity that had a life independent from that of its author.
77%
Flag icon
“We believe that innovative authors are more likely to come from people who are independent and won’t work in a software ‘factory’ or ‘bureaucracy.’”
77%
Flag icon
Tonight, for instance, he preached to a small group on the evils of secrecy, using Apple’s current policy as a prime example. The secrecy and the stifling bureaucracy there were such that he was not sure if he would ever return to the company built on his brainchild, the Apple II.
79%
Flag icon
The beauty in hackerism was Taoistic and internal, blindingly impressive when one could perceive the daring blend of idealism and cerebration, but less than compelling when presented as a chorus line in a Las Vegas ballroom.
80%
Flag icon
everybody worked better and harder for a company that was fun to work for.
81%
Flag icon
Instead of a hacker wasting time trying to make a product perfect, Ken preferred less polished programs that shipped on schedule, so he could start building an ad campaign around them.
83%
Flag icon
“there were no artificial obstacles, things that are insisted upon that make it hard for people to get any work done — things like bureaucracy, security, refusals to share with other people.”
83%
Flag icon
Stallman kept fighting, trying, he said, “to delay the fascist advances with every method I could.”
84%
Flag icon
Hacker Ethic: like lines of code in a systems program, compromise should be bummed to the minimum.
84%
Flag icon
Machines began to break and never be fixed; sometimes they just got thrown out. Needed changes in software could not be made. The non-hackers reacted to this by turning to commercial systems, bringing with them fascism and license agreements.
85%
Flag icon
“I’m the last survivor of a dead culture,” said RMS. “And I don’t really belong in the world anymore. And in some ways I feel I ought to be dead.”
85%
Flag icon
fragile. So that to be able to defy a culture which states that ‘Thou shalt not touch this,’ and to defy that with one’s own creative powers is . . . the essence.” The essence, of course, of the Hacker Ethic.
86%
Flag icon
I think that hackers — dedicated, innovative, irreverent computer programmers — are the most interesting and effective body of intellectuals since the framers of the U.S. Constitution
87%
Flag icon
John Harris is still writing his software for the long discontinued Atari 800 computer.
89%
Flag icon
“I don’t know Stallman well. I know him well enough to know he is a hard man to like.” (And that was in the preface of Stallman’s own book!)
89%
Flag icon
Decentralized decision making. Emphasizing quality of work over quality of wardrobe.
89%
Flag icon
“One good hacker can be as good as ten or twenty engineers,
« Prev 1 2 Next »