10.07.2015 Views

Levy_S-Hackers-Heroes-Computer-Revolution

Levy_S-Hackers-Heroes-Computer-Revolution

Levy_S-Hackers-Heroes-Computer-Revolution

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2The Hacker EthicSOMETHING new was coalescing around the TX-0: a new way of life, with aphilosophy, an ethic, and a dream.There was no one moment when it started to dawn on the TX-0 hackers that bydevoting their technical abilities to computing with a devotion rarely seen outsideof monasteries they were the vanguard of a daring symbiosis between man andmachine. With a fervor like that of young hot-rodders fixated on souping upengines, they came to take their almost unique surroundings for granted. Even asthe elements of a culture were forming, as legends began to accrue, as theirmastery of programming started to surpass any previous recorded levels of skill,the dozen or so hackers were reluctant to acknowledge that their tiny society, onintimate terms with the TX-0, had been slowly and implicitly piecing together abody of concepts, beliefs, and mores.The precepts of this revolutionary Hacker Ethic were not so much debated anddiscussed as silently agreed upon. No manifestos were issued. No missionariestried to gather converts. The computer did the converting, and those who seemedto follow the Hacker Ethic most faithfully were people like Samson, Saunders, andKotok, whose lives before MIT seemed to be mere preludes to that moment whenthey fulfilled themselves behind the console of the TX-0. Later there would comehackers who took the implicit Ethic even more seriously than the TX-0 hackersdid, hackers like the legendary Greenblatt or Gosper, though it would be someyears yet before the tenets of hackerism would be explicitly delineated.Still, even in the days of the TX-0, the planks of the platform were in place. TheHacker Ethic:Access to computers and anything which might teach yousomething about the way the world works should be unlimitedand total. Always yield to the Hands-On Imperative!<strong>Hackers</strong> believe that essential lessons can be learned about the systems about the

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!