10.07.2015 Views

Levy_S-Hackers-Heroes-Computer-Revolution

Levy_S-Hackers-Heroes-Computer-Revolution

Levy_S-Hackers-Heroes-Computer-Revolution

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NotesThe main source of information for <strong>Hackers</strong> was over a hundred personalinterviews conducted in 1982 and 1983. Besides these, I refer to a number ofwritten sources.Part One* Some of the TMRC jargon was codified by Peter Samson in the unpublished "AnAbridged Dictionary of the TMRC Language," circa 1959. This was apparentlythe core of a hacker dictionary, kept on-line at MIT for years, which eventuallywas expanded to The Hacker Dictionary by Gus Steele et al. (New York: Harper& Row, 1983).* Samson's poem printed in F.O.B., the TMRC newsletter, Vol. VI, No. 1(Sept. 1960).* "...stories abounded..." See Philip J. Hilts' Scientific Temperaments: Three Livesin Contemporary Science (New York: Simon & Schuster, 1982).* For IBM background, see Katharine Davis Fishman's The <strong>Computer</strong>Establishment (New York: Harper & Row, 1981).* In addition to personal interviews, some information on Spacewar was gleanedfrom J. M. Garetz' article, "The Origin of Spacewar!" in Creative ComputingVideo and Arcade Games, as well as the same author's paper, "Spacewar: RealtimeCapability of the PDP-1," presented in 1962 before the Digital Equipment<strong>Computer</strong> Users' Society, and Stewart Brand's "Spacewar: Fanatic Life andSymbolic Death Among the <strong>Computer</strong> Bums," in Rolling Stone, Dec. 7, 1972.* "What the user wants..." McCarthy quoted from his Time Sharing <strong>Computer</strong>Systems (Cambridge, Mass.: MIT Press, 1962).* How the Peg Solitaire game works is described in "Hakmem," by M. Beeler etal. (Massachusetts Institute of Technology, A.I. Lab Memo No. 239, Feb. 1972).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!