 Hackers Heroes of the Computer Revolution By Phil Dinovo.

Slides:



Advertisements
Similar presentations
(COMPUTER VIDEO GAMES) History of video games The history of video games goes as far back as the 1940s. Video gaming would not reach mainstream popularity.
Advertisements

APPLE I and APPLE II Nick Rakoczy. APPLE I April 11 th, 1976.
Books in a Series Critical Thinking Questions. Day 1 In a paragraph, make a prediction about your story. Make sure to include what your prediction is.
By: Christopher Gonzalez.  INTRODUCTION  BIOGRAPHY  BIOGRAPHY II  ACCOMPLISHMENTS  RELATION TO COMD  HOW ARE HIS ACCOMPLISMENTS SO APPEALING TO.
GNU / Linux A free operating system. Summary History What can you find on a Linux OS Linux Economy.
NEXT. ENTERTAINMENT RESEARCH CARS SHOPPING SOCIAL NETWORKING Q’Q’ LISTLIST.
Alex Aguila Co-founder of Alienware Report by Mitchell Marsh.
ISP 121 Personal Computers
1 Programming & Programming Languages Overview l Machine operations and machine language. l Example of machine language. l Different types of processor.
C and Unix. A Couple Basic Concept and Terms 1. File. 2. Process. 3. Memory 4. HD.
Operating Systems ECE344 A brief history of OS Ding Yuan ECE Dept., University of Toronto
Linux Introduction. Overview What is Unix/Linux? History of Linux Features Supported Under Linux The future of Linux.
The Project AH Computing. Functional Requirements  What the product must do!  Examples attractive welcome screen all options available as clickable.
The History of Apple, Inc. by Leanne Gray. Why “Apple”? F Steve Jobs, Steve Wozniak, and Mike Markkula formed Apple Computer on April 1, 1976, after taking.
How Steve Jobs Changed My Life Zayd Sanders. Biography Born February 24, 1955 in San Francisco, Died October 5,2011. Best known as an inventor, entrepreneur,
Introduction Computers and English Matt Barton. What is this course all about? This course is designed to introduce you to the field of Computers and.
Life was great ! * Mum could stay home with Kids * One wage was enough * Finding a job was easy * Same employer until retirement * A University Education.
1 ITSK 2611 Welcome. 2 Operating System 3 What is an OS Resource Manager –Disk –Memory –CPU Device Manager –Printers –Video Card –Sound Card Utility.
Computer Hardware and Software Chapter 1. Overview Brief History of Computers Hardware of a Computer Binary and Hexadecimal Numbers Compiling vs. Interpreting.
Y SOFT My teacher told me. BEFORE YOU WATCH 1 Discuss and share your answers to the following questions: 1)What are your favourite subjects at school?
TRY ME! I’m a starter system IBM PCjr This setup represents how the IBM PCjr was first designed and marketed to consumers: A small, friendly personal computer.
Wordpress Ben Mulpeter. What is wordpress?  Wordpress is a free Content management system (CMS)  It allows free tools to help design your website and.
Software Development Process and Management (or how to be officious and unpopular)
Software and Hardware Interaction
Chapter 1: Welcome to Linux An intro to UNIX-related operating systems.
An Introduction to Linux Name: Haixin Wang ID :
Unix Background. Introducing Unix Brief Unix History u In 1969, Ken Thompson at AT&T Bell Labs began developing Unix. –First done in assembly language.
LIS508 background of GNU/Linux
Life was great ! * Mum could stay home with Kids * One wage was enough * Finding a job was easy * Same employer until retirement * A University Education.
Lecture 21 Computer Security Ethics
Introduction to PowerPoint Curriculum Implementation Day Friday, November 3, 2006 K.J. Benoy.
University of Utah 1 Apple Steve Jobs & Steve Wozniak (1976) Sold “Apple I” to hobbyists.
Decade : Diana Soltani, Eric Mooney, Andrew McMane.
Intermediate 2 Software Development Process. Software You should already know that any computer system is made up of hardware and software. The term hardware.
Today’s Consumer. The Challenge of Business In Canada, billions of dollars of goods and services are bought, sold and exchanged daily In 2009, Statistics.
240-Current Research Easily Extensible Systems, Octave, Input Formats, SOA.
CS2204: Introduction to Unix January 19 th, 2004 Class Meeting 1 * Notes adapted by Christian Allgood from previous work by other members of the CS faculty.
What is Computer Software? EQ: What are the software components of a computer? T-IDT Describe and explore current and emerging software, including.
Learning to know me, learning to Know IT: Marius Koch
 Introduction to SUN SPARC  What is CISC?  History: CISC  Advantages of CISC  Disadvantages of CISC  RISC vs CISC  Features of SUN SPARC  Architecture.
Girls and Technology. From infancy, our culture teaches us what it means to be a boy or a girl. It dictates the color of clothes we wear, the type of.
A Brief History of the Personal Computer
After today’s lesson I will be able to: Explain Kant’s theory on moral ethics Explain the term ‘categorical imperative’ Understand the phrase 'Duty and.
History of Multimedia. In the strictest sense of the word, multimedia simply means "more than one medium." In other words, television programs, movies,
Homeschooling vs. The Public School System BY TAYLOR SPILKER.
Riley M. Period: 7 2/22/11 music: Freeplay Music, chic chick, 3/3/11,
By: Sara Al Thani.  Steve jobs was born on the 24 th of February 1955 in the city of San Francisco. His biological mother was a graduate student named.
Hacker Ethic in a Networked Society This document uses the GNU Free Documentation License (v1.2 or newer). PSI 2007 Kaido Kikkas.
The Organisation of Sport Unit 1- The Sports Industry.
Little Computer People The context of home computing.
+ TIC-TAC-TOE GAME CAPSTONE PROJECT SEN Team Members Sno.NameITU ID 1Keerthi Alimity Venkata Ganugapati Sujitha Sanku Bavi Bharathan87550.
Power Point by: Marc Prenger. Disclaimer / Intro to Hackers The book Hackers is broken up into four parts. Throughout these parts the “Hacker Ethic” is.
11 Computers, C#, XNA, and You Session 1.1. Session Overview  Find out what computers are all about ...and what makes a great programmer  Discover.
 The original hackers who disliked the IBM machines preferring machines like TX-0 and PDP- 1.  Hacked for the fun of hacking  Felt all code was free.
Steve Jobs ( ) POWERPOINT BY: KALEB. Education When Steve was young he did not really care about his education but soon his mom bribed him to.
Agenda UNX122_022_w1_p3 Overview of UNIX
Cambridge English First Practice Tests
Hackers: Heroes of the Computer Revolution By: Steven Levy.
By: Devynn Martin START 10 TH GRADE YEAR: GETTING THE HANG OF THINGS.
Chapter Saving 2. Commercial Bank 3. Savings Bank 4. Credit Union 5. Savings Account 6. Certificate of Deposit 7. Money Market Account 8. Annual.
OPS224 Operating Systems - Unix Instructor: MURRAY SAUL.
By: Roshonda Levine.  the first freely programmable computer is designed.  the Harvard Mark One computer is designed.  the ENIAC.
Linux Operating Systems Taking Control of the Terminal
Hacker Ethic in a Networked Society
The hacker approach: the deve-lopment of free licenses
LINUX WINDOWS Vs..
Selected topic in computer science (1)
CS Presentation Michael Retrum.
Chapter 1: The 8051 Microcontrollers
Chapter 2 Applications Software and Operating Systems
Presentation transcript:

 Hackers Heroes of the Computer Revolution By Phil Dinovo

The Hacker Ethic  The Hacker Ethic was a sort of unspoken, unwritten code that Levy describes his “true hackers” as following. The outline of the ethic according to Levy is as follows:  Access to computers – and anything which might teach you something about the way the world works – should be unlimited and total. Always yield to the Hands-On Imperative!  All information should be free.  The two above are very much like the Open Source initiative which exists today.  Mistrust authority – Promote Decentralization.  Hackers viewed any kind of bureaucracy as a “flawed system”.  Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.  Ex. A 12 year-old named Peter Deutsch was accepted by hackers who worked with the TX-0, but not by ordinary graduate students.  You can create art and beauty on a computer.  Art and beauty refers to the “elegance” of the code. The most “beautiful” code was that which was the most aesthetic, efficient, and used the least amount of space on the computer.  Computers can change your life for the better.  From the text: “Like Aladdin’s lamp, you could get it to do your bidding.” Non-hackers did not always buy into this belief. Bob Wagner for example designed a calculator program to run on the TX-0 which he used for homework and subsequently received a 0 grade from his professor.

 The True Hacker:  Levy describes the “True Hacker” as hackers who followed or even helped established the Hacker Ethic. Below are two significant examples of his “True Hackers”.  Peter Samson is a main figure in the first section of the book. Starting school at MIT in 1958, he quickly found and joined the Tech Model Railroad Club in the first week of school. In the first three days, he put 40 hours of work into helping the club. Some of his notable achievements as a member of the TMRC include:  Designing the graphical interface for Spacewar!, one of the first ever 2D Computer Games. Named the interface “Expensive Planetarium’ in reference to the ludicrous cost of the PDP-1.  Wrote the first FORTRAN programming language compiler for the PDP-6, which he helped create. Also created FORTRAN II, which introduced support for several new statements.  Wrote the TMRC dictionary. First EditionFirst Edition  Richard Greenblatt joined the TMRC and MIT when Peter and the earlier participants were just graduating. He there discovered Peter’s FORTRAN code which modeled the Railroad for the TX-0, and felt it needed to be rewritten for the PDP-1. In fact, he spent so much time on the PDP-1 that he failed out of MIT during his sophomore year. His achievements include:  Writing MacHack, a program which defeated a human opponent (and skeptic of the program) named Hubert Dreyfus.  Co-Wrote the Incompatible Timesharing System, one of the first implementations of the Timesharing concept. Part One: True Hackers Cambridge: The 50’s and 60’s

Part Two: Hardware Hackers Northern California: The 70’s  Hardware Hackers:  As computers became more and more concise and affordable, more and more people were able to buy them. This opened up the possibility of a new type of hacking that wasn’t as accessible for the original TMRC members working on computers the size of several refrigerators. This new hacking involved not only writing new code, but completely changing components of the computer, the hardware. Some important members of this generation of hackers include:  The Homebrew Computer Club was formed as a community of hackers that would meet and discuss their ongoing projects and utilized the Hacker Ethic to share information about these projects.  A very influenced member of the HCC was Steven Wozniak (aka ‘Woz’). Woz, who worked for HP when he joined the HCC. Steve was described as always sitting in the back of the meetings wearing jeans and sport shirts. Although he didn’t fit into the mix of the group, he had no problem following along with the technical information presented there. It was at an HCC meeting that he was given a box of several components that could be programmed to work with a Motorola 6800 board. After playing around with them for quite a long time, Woz discovered the MOS 6502 by HP board which although a bit more limited, was programmed in generally the same way and was significantly cheaper, $20 a board. He designed a new version of BASIC to correct the limited functionality of the board and he decided to use this microprocessor in his own computer.. He later showed his project to his friend, Steve Jobs, who worked at Atari. Jobs suggested they try to market the computer to hobbyists. Woz asked HP for permission to market the product with the 6502 processor, to which they agreed believing he would not be able to sell it. The two formed the company Apple (a name suggested by Jobs who had once worked in an orchard) and released the computer out of Steve’s garage. They sold the computer for $ and it had decent underground success with hobbyists. After its release, Woz got to work on its successor, the Apple II. While the Apple I was nice for hackers, it lacked many things that would make it a decent personal computer, like a display. The Apple II was released in 1977 complete with a color display, keyboard, and options for I/O with floppy disks or cassettes. The computer received fantastic response and quickly became the most popular PC of its time.

Part Three: Game Hackers The Sierras: The 80’s  The last distinctive type of hacker that Levy details is the game hacker. These hackers were mainly involved in the software aspect of hacking, but occasionally modified hardware to suit their needs. Some noteworthy game hackers are:  Ken and Roberta Williams: The this couple founded the company On-line Systems in It was later renamed to Sierra On-Line (after the Sierra Nevada foothills where Roberta’s family lived), which today is known as Sierra Entertainment. The company started off as an independent publisher of games that Ken and Roberta wrote at home for the Apple II. Their first game was entitled Mystery House, a text- adventure game which did feature minimal amounts of graphics. They made several thousand dollars a month selling the game, and proceeded to design another game called Wizard and the Princess which was released on floppy disks and made even more money than the first.  The Brotherhood: The term of this chapter actually refers to two thing: One, is the name of the game company Brøderbund, which is the Scandinavian word for brotherhood. The second refers to the kind of brotherhood that existed between the game software companies of the time. Although the companies were selling their code for money, something that the original true hackers may have disapproved of, they still were freely sharing information much in the way the HCC did.  “The Third Generation”: Since computers were so affordable at this point, many more people were able to access them, and therefore hack them. Many more “basement hackers” emerged from this generation who had a mindset similar to those of the original true hackers.

Epilogue: The Last of the True Hackers Cambridge: 1983  Levy names Richard Stallman as the last True Hacker. Now, it is hard to accept this as being true since the book was released in 1984, so Richard Stallman’s achievements were only a year old when the book hit the shelves. To the contrary, what the book does not detail is what has happened due to Stallman’s efforts since then.  Stallman’s achievement in 1983 was that of the GNU Project. The GNU Project, which is still in full swing today, believes in a free software and information sharing initiative. It ties in very well to the Hacker Ethic, which is why he is known as the last “True Hacker”.

Works Cited  Levy, Steven. Hackers : Heroes of the Computer Revolution. New York: Penguin Books, Limited, 2002.