Hacker Ethic

61 results back to index


pages: 598 words: 183,531

Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition by Steven Levy

"Margaret Hamilton" Apollo, air freight, Apple II, Bill Gates: Altair 8800, Buckminster Fuller, Byte Shop, Compatible Time-Sharing System, computer age, Computer Lib, computer vision, corporate governance, Donald Knuth, El Camino Real, Fairchild Semiconductor, Free Software Foundation, game design, Gary Kildall, Hacker Ethic, hacker house, Haight Ashbury, John Conway, John Markoff, Mark Zuckerberg, Menlo Park, Mondo 2000, Multics, non-fiction novel, Norman Mailer, Paul Graham, popular electronics, RAND corporation, reversible computing, Richard Stallman, Silicon Valley, software patent, speech recognition, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Ted Nelson, The Hackers Conference, value engineering, Whole Earth Catalog, Y Combinator

He guessed that the fix was in even before the conference was called to order—a system based on the Hacker Ethic was too drastic a step for those institutions to take. But Greenblatt later insisted that “we could have carried the day if [we’d] really wanted to.” But “charging forward,” as he put it, was more important. It was simply not a priority for Greenblatt to spread the Hacker Ethic much beyond the boundaries of Cambridge. He considered it much more important to focus on the society at Tech Square, the hacker Utopia which would stun the world by applying the Hacker Ethic to create ever more perfect systems. Chapter 7. Life They would later call it a Golden Age of hacking, this marvelous existence on the ninth floor of Tech Square.

., Applefest Garriott, Richard, Applefest, Applefest, Applefest Gates, Bill, Tiny BASIC, Tiny BASIC, Frogger, Afterword: 2010, Afterword: 2010, Afterword: 2010 Gebelli, Nasir, The Brotherhood, Frogger General Electric Science Fair, The Tech Model Railroad Club George Jackson People’s Free Clinic, Revolt in 2100 Glider gun, Life GNU operating system, Afterword: 2010 Gobbler game, The Third Generation Godbout, Bill, Every Man a God Going public, The Wizard and the Princess Gold panning, Frogger Golden, Vinnie “the Bear”, Every Man a God Google, Afterword: 2010 Gorlin, Dan, Frogger Gosper, Bill, Spacewar, Greenblatt and Gosper, Greenblatt and Gosper, Greenblatt and Gosper, Winners and Losers, Winners and Losers, Life, Life, Afterword: 2010 Graham, Paul, Afterword: 2010 Great Subway Hack, Winners and Losers, Life Greenblatt, Richard, Greenblatt and Gosper, Greenblatt and Gosper, Greenblatt and Gosper, Greenblatt and Gosper, Winners and Losers, Winners and Losers, Life, Life, Life, Life, The Wizard and the Princess, Afterword: 2010 Griffin, Kathy, Afterword: 2010 Gronk, Winners and Losers Guinness Book of World Records, Frogger Gulf & Western Conglomerate, Sega division, Frogger H Hack, The Tech Model Railroad Club Hackathons, Afterword: 2010 HACKER (Sussman program), Winners and Losers Hacker Dojo, Afterword: 2010 Hacker Ethic, The Hacker Ethic, The Hacker Ethic, Spacewar, Greenblatt and Gosper, The Midnight Computer Wiring Society, Winners and Losers, Life, Life, Revolt in 2100, Revolt in 2100, Every Man a God, Every Man a God, The Homebrew Computer Club, The Homebrew Computer Club, Tiny BASIC, Secrets, Secrets, The Wizard and the Princess, The Brotherhood, The Brotherhood, The Brotherhood, The Third Generation, Frogger, Frogger, Applefest, Applefest, Wizard vs.

Horowitz of computer keyboards, master math and LIFE hacker at MIT AI lab, guru of the Hacker Ethic, and student of Chinese restaurant menus. Richard Greenblatt. Single-minded, unkempt, prolific, and canonical MIT hacker who went into night phase so often that he zorched his academic career. The hacker’s hacker. John Harris. The young Atari 800 game hacker who became Sierra On-Line’s star programmer, but yearned for female companionship. IBM PC. IBM’s entry into the personal computer market, which amazingly included a bit of the Hacker Ethic and took over. IBM 704. IBM was The Enemy and this was its machine, the Hulking Giant computer in MIT’s Building 26.


pages: 398 words: 107,788

Coding Freedom: The Ethics and Aesthetics of Hacking by E. Gabriella Coleman

activist lawyer, Benjamin Mako Hill, commoditize, Computer Lib, crowdsourcing, Debian, disinformation, Donald Knuth, dumpster diving, Eben Moglen, en.wikipedia.org, financial independence, Free Software Foundation, Gabriella Coleman, ghettoisation, GnuPG, Hacker Conference 1984, Hacker Ethic, Hacker News, Herbert Marcuse, informal economy, information security, Jacob Appelbaum, Jaron Lanier, Jason Scott: textfiles.com, Jean Tirole, knowledge economy, laissez-faire capitalism, Larry Wall, Louis Pasteur, machine readable, means of production, Multics, Neal Stephenson, Paul Graham, peer-to-peer, pirate software, popular electronics, RFC: Request For Comment, Richard Stallman, rolodex, Ronald Reagan, Silicon Valley, Silicon Valley startup, slashdot, software patent, software studies, Steve Ballmer, Steven Levy, tacit knowledge, technological determinism, Ted Nelson, the Cathedral and the Bazaar, The Hackers Conference, the scientific method, The Soul of a New Machine, The Structural Transformation of the Public Sphere, web application, web of trust, Yochai Benkler

Yet almost all academic and journalistic work on hackers commonly whitewashes these differences, and defines all hackers as sharing a singular “hacker ethic.” Offering the first definition in Hackers: Heroes of the Computer Revolution, journalist Steven Levy (1984, 39) discovered among a couple of generations of MIT hackers a unique as well as “daring symbiosis between man and machine,” where hackers placed the desire to tinker, learn, and create technical beauty above all other goals. The hacker ethic is shorthand for a list of tenets, and it includes a mix of aesthetic and pragmatic imperatives: a commitment to information freedom, a mistrust of authority, a heightened dedication to meritocracy, and the firm belief that computers can be the basis for beauty and a better world (ibid., 39–46).

That’s a nice thought.”11 As I delved deeper into the cultural politics of hacking, though, I began to see serious limitations in making any straightforward connections between the hacker ethic of the past and the free software of the present (much less other hacker practices). Most obviously, to do so is to overlook how ethical precepts take actual form and, more crucially, how they transform over time. For example, in the early 1980s, “the precepts of this revolutionary Hacker Ethic,” Levy (1984, 39; emphasis added) observes, “were not so much debated and discussed as silently agreed upon. No Manifestos were issued.” Yet (and somewhat ironically) a mere year after the publication of his book, MIT programmer Richard Stallman charted the Free Software Foundation (FSF) ([1996] 2010) and issued “The GNU Manifesto,” insisting “that the golden rule requires that if I like a program I must share it with other people who like it.”12 Today, hacker manifestos are commonplace.

And now many hackers recognize ethical precepts as one important engine driving their productive practices—a central theme to be explored in this book. Additionally, and as the Mitnick example provided above illustrates so well, the story of the hacker ethic works to elide the tensions that exist among hackers as well as the different genealogies of hacking. Although hacker ethical principles may have a common core—one might even say a general ethos—ethnographic inquiry soon demonstrates that similar to any cultural sphere, we can easily identify great variance, ambiguity, and even serious points of contention.


Free as in Freedom by Sam Williams

Asperger Syndrome, cognitive dissonance, commoditize, Compatible Time-Sharing System, Debian, Douglas Engelbart, East Village, Eben Moglen, Free Software Foundation, Guido van Rossum, Hacker Ethic, informal economy, Isaac Newton, John Conway, John Gilmore, John Markoff, Ken Thompson, Larry Wall, machine readable, Marc Andreessen, Maui Hawaii, Multics, Murray Gell-Mann, PalmPilot, profit motive, Project Xanadu, Richard Stallman, Silicon Valley, slashdot, software patent, Steven Levy, Ted Nelson, the Cathedral and the Bazaar, urban renewal, VA Linux, Y2K

At a time when the Reagan Administration was rushing to dismantle many of the federal regulations and spending programs that had been built up during the half century following the Great Depression, more than a few software programmers saw the hacker ethic as anticompetitive and, by extension, un-American. At best, it was a throwback to the anticorporate attitudes of the late 1960s and early 1970s. Like a Wall Street banker discovering an old tie-dyed shirt hiding between French-cuffed shirts and double-breasted suits, many computer programmers treated the hacker ethic as an embarrassing reminder of an idealistic age. For a man who had spent the entire 1960s as an embarrassing throwback to the 1950s, Stallman didn't mind living out of step with his peers.

Recognizing the utility of this feature, Wall put the following copyright notice in the program's accompanying README file: Copyright (c) 1985, Larry Wall You may copy the trn kit in whole or in part as long as you don't try to make money off it, or pretend that you wrote it.See Trn Kit README. http://www.za.debian.org/doc/trn/trnreadme Such statements, while reflective of the hacker ethic, also reflected the difficulty of translating the loose, informal nature of that ethic into the rigid, legal language of copyright. In writing the GNU Emacs License, 108 Stallman had done more than close up the escape hatch that permitted proprietary offshoots. He had expressed the hacker ethic in a manner understandable to both lawyer and hacker alike. It wasn't long, Gilmore says, before other hackers began discussing ways to "port" the GNU Emacs License over to their own programs.

To be a hacker, a person had to do more than write interesting software; a person had to belong to the hacker "culture" and honor its traditions the same way a medieval wine maker might pledge membership to a vintners' guild. The social structure wasn't as rigidly outlined as that of a guild, but hackers at elite institutions such as MIT, Stanford, and Carnegie Mellon began to speak openly of a "hacker ethic": the yet-unwritten rules that governed a hacker's day-to-day behavior. In the 1984 book Hackers, author Steven Levy, after much research and consultation, codified the hacker ethic as five core hacker tenets. In many ways, the core tenets listed by Levy continue to define the culture of computer hacking. Still, the guild-like image of the hacker community was undermined by the overwhelmingly populist bias of the 175 software industry.


pages: 339 words: 57,031

From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism by Fred Turner

"World Economic Forum" Davos, 1960s counterculture, A Declaration of the Independence of Cyberspace, Alan Greenspan, Alvin Toffler, Apple's 1984 Super Bowl advert, back-to-the-land, Bill Atkinson, bioinformatics, Biosphere 2, book value, Buckminster Fuller, business cycle, Californian Ideology, classic study, Claude Shannon: information theory, complexity theory, computer age, Computer Lib, conceptual framework, Danny Hillis, dematerialisation, distributed generation, Douglas Engelbart, Douglas Engelbart, Dr. Strangelove, Dynabook, Electric Kool-Aid Acid Test, Fairchild Semiconductor, Ford Model T, From Mathematics to the Technologies of Life and Death, future of work, Future Shock, game design, George Gilder, global village, Golden Gate Park, Hacker Conference 1984, Hacker Ethic, Haight Ashbury, Herbert Marcuse, Herman Kahn, hive mind, Howard Rheingold, informal economy, intentional community, invisible hand, Ivan Sutherland, Jaron Lanier, John Gilmore, John Markoff, John Perry Barlow, John von Neumann, Kevin Kelly, knowledge economy, knowledge worker, Lewis Mumford, market bubble, Marshall McLuhan, mass immigration, means of production, Menlo Park, military-industrial complex, Mitch Kapor, Mondo 2000, Mother of all demos, new economy, Norbert Wiener, peer-to-peer, post-industrial society, postindustrial economy, Productivity paradox, QWERTY keyboard, Ralph Waldo Emerson, RAND corporation, reality distortion field, Richard Stallman, Robert Shiller, Ronald Reagan, Shoshana Zuboff, Silicon Valley, Silicon Valley ideology, South of Market, San Francisco, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, systems thinking, technoutopianism, Ted Nelson, Telecommunications Act of 1996, The Hackers Conference, the strength of weak ties, theory of mind, urban renewal, Vannevar Bush, We are as Gods, Whole Earth Catalog, Whole Earth Review, Yom Kippur War

As Levy explains, MIT and DEC had “an easy arrangement,” since “the Right Thing to do was make sure that any good program got the fullest exposure possible because information was free and the world would only be improved by its accelerated flow.”62 Tak i n g t h e W h o l e E a r t h D i g i t a l [ 135 ] This ethic also accorded well with the values espoused in the Whole Earth Catalog. Like the Catalog, the hacker ethic suggested that access to tools could change the world, first by changing the individual’s “life for the better” and, second, by creating art and beauty. In keeping with the Catalog’s habit of systems thinking, the hacker ethic characterized the tools themselves as prototypes: the computer was a rule-bound system that could serve as a model of the world; to study computers was to learn something about the world at large. Like the Catalog, the hacker ethic suggested that work should be organized in a decentralized manner and that individual ability, rather than credentials obtained from institutions, should determine the nature of one’s work and one’s authority.

Most had come to meet others like themselves. Their hosts offered them food, computers, audiovisual supplies, and places to sleep— and a regular round of facilitated conversations. By all accounts, two themes dominated those conversations: the definition of a hacker ethic and the description of emerging business forms in the computer industry. The two themes were, of course, entwined. The hacker ethic that Levy described—the single thread ostensibly running through all of the participants’ careers—had emerged at a moment when sharing products and processes improved profits for all. By the mid-1980s, however, the finances of computer and software development had changed radically.

Others, including Macintosh designer Bill Atkinson, defended corporate prerogatives, arguing that no one should be forced to give away the code at the heart of their software. The debate took on particular intensity because, according to the hacker ethic, certain business practices—like giving away your code—allowed you to claim the identity of hacker. In part for this reason, participants in a morning-long forum called “The Future of the Hacker Ethic,” led by Levy, began to focus on other elements of the hacker’s personality and to modify their stance on the free distribution of information goods. For instance, participants agreed that hackers were driven to compute and that they would regard people who impeded their computing as bureaucrats rather than legitimate authorities.


pages: 173 words: 14,313

Peers, Pirates, and Persuasion: Rhetoric in the Peer-To-Peer Debates by John Logie

1960s counterculture, Berlin Wall, book scanning, cuban missile crisis, dual-use technology, Fall of the Berlin Wall, Free Software Foundation, Hacker Ethic, Isaac Newton, Marshall McLuhan, moral panic, mutually assured destruction, peer-to-peer, plutocrats, pre–internet, publication bias, Richard Stallman, Search for Extraterrestrial Intelligence, search inside the book, SETI@home, Silicon Valley, slashdot, Steve Jobs, Steven Levy, Stewart Brand, Whole Earth Catalog

Levy’s account of the first generation of hackers not only expressly positions hackers as the latest in a long line of American explorers, it also suggests stridently that their motivations, like those of the astronauts, were ultimately to offer something of value “for all mankind.” This is especially apparent in Levy’s codification of the “Hacker Ethic,” a summation of the shared principles adhered to by the majority of the first generation of hackers. According to Levy, the generally recognized principles of the Hacker Ethic were: • Access to computers—and anything which might teach you something about the way the world works—should be unlimited and total. • Always yield to the Hands-on Imperative! • All information should be free. • Mistrust authority—promote decentralization. • Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race or position. • You can create art and beauty on a computer. • Computers can change your life for the better. (39–45) In Levy’s articulation of the Hacker Ethic it is possible to trace the convergence of the U.S.’s historic valorization of exploration, exemplified at the time by the space program, with the idealistic social visions that grew out of the youth culture of the 1960s.

Rather, they are contested sites where interested parties struggle to frame the activities at the heart of the term according to their preferences and perceived needs. In the introduction to his 2002 book Hacker Culture, Douglas Thomas writes that “the very definition of the term ‘hacker’ is widely and fiercely disputed by both critics of and participants in the computer underground” (ix). In a similar vein, in the preface to his 2001 book, The Hacker Ethic, Pekka Himanen offers a compressed account of the key shifts in the use of the term: [A] group of MIT’s passionate programmers started calling themselves hackers in the early sixties. (Later, in the mid-eighties, the media started applying the term to computer criminals. In order to avoid the confusion with virus writers and intruders into information systems, hackers began calling these destructive computer users crackers.

• All information should be free. • Mistrust authority—promote decentralization. • Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race or position. • You can create art and beauty on a computer. • Computers can change your life for the better. (39–45) In Levy’s articulation of the Hacker Ethic it is possible to trace the convergence of the U.S.’s historic valorization of exploration, exemplified at the time by the space program, with the idealistic social visions that grew out of the youth culture of the 1960s. While at first blush, the quasi-militaristic personae of the astronauts would appear to be wholly at odds with the politics of hippie/yippie cultures, both NASA and hippie leaders foregrounded their commitments to exploration in their personal and public presentations.


pages: 210 words: 56,667

The Misfit Economy: Lessons in Creativity From Pirates, Hackers, Gangsters and Other Informal Entrepreneurs by Alexa Clay, Kyra Maya Phillips

"World Economic Forum" Davos, Aaron Swartz, Airbnb, Alfred Russel Wallace, Apollo 11, Berlin Wall, Burning Man, collaborative consumption, conceptual framework, cotton gin, creative destruction, different worldview, digital rights, disruptive innovation, double helix, fear of failure, Gabriella Coleman, game design, Hacker Ethic, Howard Rheingold, informal economy, intentional community, invention of the steam engine, James Watt: steam engine, Joseph Schumpeter, Kickstarter, lone genius, Mark Zuckerberg, mass incarceration, megacity, Neil Armstrong, Occupy movement, off-the-grid, peer-to-peer rental, Ronald Reagan, Rosa Parks, sharing economy, Silicon Valley, Steve Jobs, Steven Levy, Stewart Brand, subscription business, supply-chain management, union organizing, Whole Earth Catalog, Whole Earth Review, work culture , Zipcar

Facebook has built a testing platform that allows employees to, at any given time, try thousands upon thousands of versions of Facebook’s website. Wrote Zuckerberg: “We have the words ‘Done is better than perfect’ painted on our walls to remind ourselves to always keep chipping.” With Facebook claiming a hacker ethic, we can certainly see the risk of corporations who look to co-opt hacker subculture. But co-optation is only one of the ways in which the hacker movement is mainstreaming. A lot of the hacker ethic is still oriented around disruptive innovation and challenging the underlying logics and norms of the establishment, and these are the cases we’re interested in—the hackers who are changing systems.

Misfit innovators may be their own bosses or operate in networks or communities where they feel they have the ability to help shape the rules they live by. Some open-source and hacker communities have become experts at creating their own operating principles. For example, the original hackers, the group of misfits at the Massachusetts Institute of Technology, organically developed what is known as the Hacker Ethic, a code according to which they would operate: the importance of free access to computers, freedom of information, decentralization, and judgment based solely on merit. Every hacker we spoke to gave a nod to these principles, stating that they still animate many of the hacker movements today. WHY MISFITS ARE NEEDED NOW MORE THAN EVER Many of the principles we see operating in the Misfit Economy have emerged in direct opposition to the legacy of formalization born of the Industrial Revolution some two hundred and fifty years ago.

He starts with the first iteration of hackers: the group who coalesced during the early 1960s, when the Massachusetts Institute of Technology (MIT) acquired its first programmable computer. This cohort’s obsessive programming of the machines, and the relationship they built with the systems, gave rise to the Hacker Ethic, an informal, organically developed and agreed-upon manifesto that, in several iterations, still drives the hacker movement forward: • Access to computers—and anything that might teach you something about the way the world works—should be unlimited and total. • All information should be free


pages: 426 words: 117,775

The Charisma Machine: The Life, Death, and Legacy of One Laptop Per Child by Morgan G. Ames

"World Economic Forum" Davos, 1960s counterculture, 4chan, A Declaration of the Independence of Cyberspace, Benjamin Mako Hill, British Empire, Burning Man, Cass Sunstein, clean water, commoditize, computer age, digital divide, digital rights, Evgeny Morozov, fail fast, Firefox, Free Software Foundation, Gabriella Coleman, game design, Hacker Conference 1984, Hacker Ethic, hype cycle, informal economy, Internet of things, John Markoff, Joi Ito, Khan Academy, Marshall McLuhan, Mary Lou Jepsen, Minecraft, new economy, One Laptop per Child (OLPC), Peter Thiel, placebo effect, Potemkin village, RFID, Richard Stallman, ride hailing / ride sharing, side project, Silicon Valley, Silicon Valley ideology, SimCity, smart cities, Steve Jobs, Steven Levy, Stewart Brand, technological determinism, technological solutionism, technoutopianism, TED Talk, The Hackers Conference, Travis Kalanick

Bringing in the social and legal ramifications of hacking, critical media theorist Helen Nissenbaum discusses how this hacker identity is contested and has changed from being positive and countercultural in the 1980s to one associated with criminality outside of hacker circles in the 1990s due to changes in the computing industry, hacker values, laws, and popular culture (Nissenbaum, “Hackers and the Contested Ontology of Cyberspace”). Taking a different route, Swedish philosopher Pekka Himanen redefines the “hacker ethic” as a play-based work ethic in contrast to the Protestant work ethic (Himanen, Hacker Ethic). The ethos that originated at MIT, which is central in this account, has influenced groups far beyond those hackers. It was independently developed (with some variation), Levy says, on the West Coast among a group of “hardware hackers” and would go on to be shared by many across the computer hardware and software businesses in Silicon Valley.

Antiauthority and the Glorification of Healthy Rebellion The deep distrust of school apparent in these descriptions of constructionism reflects the hacker community’s mistrust of authority figures more generally—a mistrust so codified in the culture that Steven Levy canonized it in two of the six tenets of what he called the “hacker ethic.” Levy described this ethic, the core principles of the hacker community, drawing on the time he spent with the hacker group at MIT; the ethic was subsequently embraced by many in the hacker world. The third tenet reads, “Mistrust authority; promote decentralization,” and the fourth is “Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, sex, or position.”76 This group decried school as an example of the authority they distrusted; instead, they found great solace in computers and celebrated others who felt the same.

At the same time, Papert did not specifically exclude girls; his writing includes occasional examples of girls and speaks in general terms about “children.” Mindstorms and Papert’s other publications on constructionism discuss how programming can be “artistic,” like writing poetry. On the one hand, this echoes the values of the male-dominated hacker group of which he counted himself a member and was even mentioned in Levy’s hacker ethic. On the other hand, this could open up the field to different ways of knowing. Papert and his third wife, fellow MIT professor Sherry Turkle, explored this in relation to gender specifically. Their article “Epistemological Pluralism” attempts to separate computer programming skills from what they acknowledge is a masculine technical culture by discussing more “concrete” and “bricolage”-focused methods of learning to program, which they claimed that women and girls prefer.99 Likewise, many members of the broader constructionism community including Cynthia Solomon, Sylvia Weir, Yasmin Kafai, Ricarose Roque, and more have focused specifically on how constructionism might better appeal to girls and other diverse groups.


pages: 397 words: 102,910

The Idealist: Aaron Swartz and the Rise of Free Culture on the Internet by Justin Peters

4chan, Aaron Swartz, activist lawyer, Alan Greenspan, Any sufficiently advanced technology is indistinguishable from magic, Bayesian statistics, Brewster Kahle, buy low sell high, crowdsourcing, digital rights, disintermediation, don't be evil, Free Software Foundation, global village, Hacker Ethic, hypertext link, index card, informal economy, information retrieval, Internet Archive, invention of movable type, invention of writing, Isaac Newton, John Markoff, Joi Ito, Lean Startup, machine readable, military-industrial complex, moral panic, Open Library, Paul Buchheit, Paul Graham, profit motive, RAND corporation, Republic of Letters, Richard Stallman, selection bias, semantic web, Silicon Valley, social bookmarking, social web, Steve Jobs, Steven Levy, Stewart Brand, strikebreaker, subprime mortgage crisis, Twitter Arab Spring, Vannevar Bush, Whole Earth Catalog, Y Combinator

This munificent ideology was encoded into what the author Steven Levy described in his insightful book Hackers as the “hacker ethic.” Hackers—a term for early computer programmers—wrote computer code and believed that other hackers should share their code and computing resources with their peers. This policy was, in part, a pragmatic one: at the time, computing resources were scarce, and possessiveness impeded productivity. But the attitude was also a conscious philosophical choice, a statement that the world ought to be open, efficient, and collaborative. Nowhere was this hacker ethic taken more seriously than at the Artificial Intelligence (AI) Lab at the Massachusetts Institute of Technology.

In the early 1980s, at the dawn of the personal-computing era, some of the AI Lab’s hackers defected to a company called Symbolics, where they constructed commercial versions of the machines they once built at MIT. Others went to a competing firm. The AI Lab hacking corps dwindled, and its motivating principles came to seem increasingly obsolete. For Stallman, these defections only reinforced his commitment to free software. Stallman believed that proprietary software was inimical to the hacker ethic, and that it impeded the free flow of knowledge. Treating software users strictly as customers rather than potential collaborators implied that the public could contribute nothing of value but money. “The rule made by the owners of proprietary software was, ‘If you share with your neighbor, you are a pirate.

“It should be obvious that if laws such as [the Copyright Term Extension Act] continued to be passed every 20 years or so, that nothing will ever enter into Public Domain status again and the work of people such as the Internet Wiretap, the Online Book Initiative, and Project Gutenberg will soon be over,” Hart wrote to supporters at the time.75 Just as the AI Lab exodus in the early 1980s had threatened the survival of the hacker ethic, the popularization of the Web in the mid-1990s—and the concurrent emergence of its commercial potential—threatened to marginalize the digital utopians who had been its first colonists. “While I certainly lay no claims to inventing the Internet, I was the first I have ever heard of to understand what it was to become over the first few decades of its existence,” Hart wrote on his blog.


Masters of Deception: The Gang That Ruled Cyberspace by Michelle Slatalla, Joshua Quittner

dumpster diving, East Village, Hacker Ethic, hacker house, job automation, John Gilmore, John Perry Barlow, Mitch Kapor, packet switching, ROLM, Stewart Brand, UUNET, Whole Earth Review

In its place appeared a challenge born of fluctuating hormones and adolescent invincibility: ACID PHREAK: There is no one hacker ethic. The hacker of old sought to find what the computer itself could do. There was nothing illegal about that. Today, hackers and phreaks are drawn to specific, often corporate, systems. It's no wonder everyone on the other side is getting mad. We're always one step ahead. Even as he typed, Eli was defining himself, creating his own new hacker ethic. It was a philosophy in which exploration for the sake of discovery is its own justification. And it was also a philosophy in which he saw himself as the baddest gunslinger to ever ride into town.

For someone else, it might have all sorts of catastrophic appeal. You could do anything, even cut off phone service to the whole Laurelton neighborhood. But that's anathema to them; they'd no sooner crash a computer system than they would cut off a finger. That's what they tell each other. They believe in the hacker ethic: Thou shalt not destroy. It's OK to look around, but don't hurt anything. It's good enough just to be here. It's late now, the mission has turned into an all-nighter, and it's the bold hour when all the authority figures they've ever known are already asleep, oblivious to the escalation of the shared kinetic energy in this room.

Paul wondered if The Graduate ever told his parents what happened, or if he waited in fear for the Secret Service to return. The other boys didn't mention the incident, didn't talk about how whatever they did that day got away from them. It was an odd experience, crashing something. Even a lamer board. Never would any of the three have harmed a system intentionally. Never would any of them have violated the hacker ethic by destroying anything. They only mentioned the experience obliquely after that. Whenever something struck them as weird and inexplicable, this is what they would say: "Plik. " The summer had turned out to be a great one. By the time August rolled around, Paul, Mark, and Eli felt as if they'd known one another forever.


pages: 313 words: 84,312

We-Think: Mass Innovation, Not Mass Production by Charles Leadbeater

1960s counterculture, Andrew Keen, barriers to entry, bioinformatics, c2.com, call centre, citizen journalism, clean water, cloud computing, complexity theory, congestion charging, death of newspapers, Debian, digital divide, digital Maoism, disruptive innovation, double helix, Douglas Engelbart, Edward Lloyd's coffeehouse, folksonomy, frictionless, frictionless market, future of work, game design, Garrett Hardin, Google Earth, Google X / Alphabet X, Hacker Ethic, Herbert Marcuse, Hernando de Soto, hive mind, Howard Rheingold, interchangeable parts, Isaac Newton, James Watt: steam engine, Jane Jacobs, Jaron Lanier, Jean Tirole, jimmy wales, Johannes Kepler, John Markoff, John von Neumann, Joi Ito, Kevin Kelly, knowledge economy, knowledge worker, lateral thinking, lone genius, M-Pesa, Mark Shuttleworth, Mark Zuckerberg, Marshall McLuhan, Menlo Park, microcredit, Mitch Kapor, new economy, Nicholas Carr, online collectivism, Paradox of Choice, planetary scale, post scarcity, public intellectual, Recombinant DNA, Richard Stallman, Shoshana Zuboff, Silicon Valley, slashdot, social web, software patent, Steven Levy, Stewart Brand, supply-chain management, synthetic biology, the Cathedral and the Bazaar, The Death and Life of Great American Cities, the long tail, the market place, The Wealth of Nations by Adam Smith, The Wisdom of Crowds, Thomas Kuhn: the structure of scientific revolutions, Tragedy of the Commons, Whole Earth Catalog, work culture , Yochai Benkler, Zipcar

The Internet as we know it was built on an ethic of mutual self-help with the all purpose, reprogrammable personal computer as the main point of access. Yet if the personal computer is replaced with less open, adaptable devices – like the Apple iPhone – then it will be far harder for hackers, amateurs and kids to innovate at the edges of the system. The Apple personal computer helps people to create; it feeds the mutual, self-help, hacker ethic of the web. The Apple iPhone, the iPod and iTunes are very different. What you can do depends on what Apple allows you to do. The Apple iPhone is a seductively dangerous little tool. If the future web is accessed through constrained mobile devices then it will be considerably less free and easy than it has been to date.

Are you building your own computer … if so you might like to come to a gathering of people with like-minded interests, exchange information, swap ideas, talk shop, help work on a project, whatever … The club’s first meeting, in French’s garage, attracted 32 people, six of whom had built their own computers. The club embodied the hacker ethic: people making things for themselves and helping one another to do the same. Twenty-three high-tech companies can trace their lineage to this club of do-it-yourself amateurs, among them Apple. Fred Moore died in a car crash in 1997 at the age of 55, largely unknown, and yet he helped to shape modern America: the original student protester and co-founder of the club that spawned much of the digital revolution we now live with.

Hackers are suspicious of corporate brands and want to undertake self-governing craftwork.15 They do not want to be managed, nor do they want to be commercial. This is where it all starts to get rather confusing. More companies will try to follow Apple and persuade people to become fans of their products by claiming to have a hacker ethic beating inside them. Google is the prime exponent of this conjuring trick: never has the hacker spirit generated so much profit. Companies that create fans will, however, find them hacking their software and generating their own content and will be left wondering how to react. Lego, the Danish toy-brick company, found that a fan had hacked the software for its Mindstorms robots and made improvements that were proving popular with other players.


pages: 240 words: 109,474

Masters of Doom: How Two Guys Created an Empire and Transformed Pop Culture by David Kushner

AOL-Time Warner, Apple's 1984 Super Bowl advert, book scanning, Colossal Cave Adventure, Columbine, corporate governance, Free Software Foundation, game design, glass ceiling, Hacker Ethic, informal economy, Marc Andreessen, market design, Marshall McLuhan, Neal Stephenson, Saturday Night Live, side project, Silicon Valley, SimCity, slashdot, Snow Crash, software patent, Steve Jobs, Steven Levy, X Prize

“Though some in the field used the term hacker as a form of a derision,” Lew wrote in the preface, “implying that hackers were either nerdy social outcasts or ‘unprofessional’ programmers who wrote dirty, ‘nonstandard’ computer code, I found them quite different. Beneath their often unimposing exteriors, they were adventurers, visionaries, risk-takers, artists … and the ones who most clearly saw why the computer was a truly revolutionary tool.” This Hacker Ethic read like a manifesto. When Carmack finished the book one night in bed, he had one thought: I’m supposed to be in there! He was a Whiz Kid. But he was in a nowhere house, in a nowhere school, with no good computers, no hacker culture at all. He soon found others who sympathized with his anger.

Though only in his forties, Al had a receding hairline with strands sticking up as if he had just taken his hands off one of those static electricity spheres found at state fairs. He dressed in muted ties and sweaters but possessed the eccentric streak shared by the students and faculty he would visit in the university computer lab during his job there in seventies. At the time the Hacker Ethic was reverberating from MIT to Silicon Valley. As head of the academic computing section at the school, Al, by vocation and passion, was plugged in from the start. He wasn’t tall or fat, but the kids affectionately called him Big Al. Energized by this emerging Zeitgeist, in 1981 Al and another LSUS mathematician, Jim Mangham, hatched a business scheme: a computer software subscription club.

Al assumed Carmack was trying to protect his own financial interests, but in reality he had struck what was growing into an increasingly raw nerve for the young, idealistic programmer. It was one of the few things that could truly make him angry. It was ingrained in his bones since his first reading of the Hacker Ethic. All of science and technology and culture and learning and academics is built upon using the work that others have done before, Carmack thought. But to take a patenting approach and say it’s like, well, this idea is my idea, you cannot extend this idea in anyway, because I own this idea–it just seems so fundamentally wrong.


pages: 611 words: 130,419

Narrative Economics: How Stories Go Viral and Drive Major Economic Events by Robert J. Shiller

agricultural Revolution, Alan Greenspan, Albert Einstein, algorithmic trading, Andrei Shleifer, autism spectrum disorder, autonomous vehicles, bank run, banking crisis, basic income, behavioural economics, bitcoin, blockchain, business cycle, butterfly effect, buy and hold, Capital in the Twenty-First Century by Thomas Piketty, Cass Sunstein, central bank independence, collective bargaining, computerized trading, corporate raider, correlation does not imply causation, cryptocurrency, Daniel Kahneman / Amos Tversky, debt deflation, digital divide, disintermediation, Donald Trump, driverless car, Edmond Halley, Elon Musk, en.wikipedia.org, Ethereum, ethereum blockchain, fake news, financial engineering, Ford Model T, full employment, George Akerlof, germ theory of disease, German hyperinflation, Great Leap Forward, Gunnar Myrdal, Gödel, Escher, Bach, Hacker Ethic, implied volatility, income inequality, inflation targeting, initial coin offering, invention of radio, invention of the telegraph, Jean Tirole, job automation, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, litecoin, low interest rates, machine translation, market bubble, Modern Monetary Theory, money market fund, moral hazard, Northern Rock, nudge unit, Own Your Own Home, Paul Samuelson, Philip Mirowski, plutocrats, Ponzi scheme, public intellectual, publish or perish, random walk, Richard Thaler, Robert Shiller, Ronald Reagan, Rubik’s Cube, Satoshi Nakamoto, secular stagnation, shareholder value, Silicon Valley, speech recognition, Steve Jobs, Steven Pinker, stochastic process, stocks for the long run, superstar cities, The Rise and Fall of American Growth, The Theory of the Leisure Class by Thorstein Veblen, The Wealth of Nations by Adam Smith, theory of mind, Thorstein Veblen, traveling salesman, trickle-down economics, tulip mania, universal basic income, Watson beat the top human players on Jeopardy!, We are the 99%, yellow journalism, yield curve, Yom Kippur War

Bitcoin is a contagious counternarrative because it exemplifies the impressive inventions that a free, anarchist society would eventually develop. The term hacker ethic is another modern embodiment of such anarchism. Before the widespread availability of the World Wide Web, sociologist Andrew Ross wrote, in 1991, The hacker ethic, first articulated in the 1950s among the famous MIT students who developed multiple-access user systems, is libertarian and crypto-anarchist in its right-to-know principles and its advocacy of decentralized technology.6 In his 2001 book The Hacker Ethic and the Spirit of the Information Age, Pekka Himanen wrote about the ethic of the “passionate programmers.”7 In the Internet age, people’s willingness and ability to work together with new technology—in new frameworks that do not rely on government, on conventional profit, or on lawyers—have surprised many of us.

., 157 The Grapes of Wrath (Steinbeck), 131 The Great Crash, 1929 (Galbraith), 233 Great Depression of 1930s, 111–12; angry narratives in, 239; bimetallism epidemic during, 23; blamed on loss of confidence, 130; blamed on “reckless talk” by opinion leaders, 127; confidence narratives in, 114, 122; consumption demand reduced after, 307n3; crowd psychology and suggestibility in understanding of, 120; deportation of Mexican Americans during, 190; depression of 1920–21 and, 243, 251–53; difficulty of cutting wages during, 251–52; Dust Bowl and, 130–31; fair wage narrative during, 250; family morale during, 138–39; fear during, 109, 127–28, 141; flu epidemic of 1918 mirroring trajectory of, 108; frequency of appearance of the term, 133, 134f; frugality and compassion in, 135, 136–37, 140–43, 252; gold standard narrative during, 158–59; labor-saving machinery and, 174; lists of causes created at the time, 129–30; modern theories about causes of, 132–33; modesty narrative during, 135, 136–37, 139, 142–45, 147–48, 150; narratives after 2007–9 crisis and, 95; narratives focused on scarcity during, 129; narratives illuminating causes of, ix–x; not called “Great Depression” at the time, 133–34; not forecast by economists, xiv; ordinary people’s talking about, 90–91; photos providing memory of, 131; prolonged by avoidance of consumption, 139, 142, 144–46; as record-holder of economic downturns, 112; revulsion against excesses of 1920s during, 235–36; robot tax discussed during, 209; seen as stampede or panic, 128; technocracy movement and, 193–94; technological unemployment narrative and, 183, 184; today’s downturns seen through narratives of, 134–35, 264; underconsumption narrative during, 188–90; women’s writing about concerns during, 137–40, 145–46 The Great Illusion (Angell), 95 Great Recession of 1973–75, 112 Great Recession of 1980–82, 112 Great Recession of 2007–9, 112; bank failures as key narratives in, 132; fear about intelligent machines and, 273; fueled by real estate narratives, 212; predicted by few economists, xiv; rapid drop in confidence during, 272 Great Society, 50 Greenspan, Alan, 227 Gresham’s Law, and bimetallism, 169, 313n27 hacker ethic, 7 The Hacker Ethic and the Spirit of the Information Age (Himanen), 7 Hackett, Catherine, 140, 253–54 Halley, Edmund, 124 “Happy Birthday to You” (song), 97–100 Harari, Yuval Noah, 208 Harding, Warren, 244–45 “hard times,” 134 Hard Times: An Oral History of the Great Depression (Terkel), 234 Harris, Sidney J., 263 Harvey, William Hope, 161, 162, 312n10 Hazlitt, Henry, 247 “Heads I win, tails you lose,” 110 health interventions, narrative presentation of, 78 Heathcote, Jonathan, 214 Heffetz, Ori, 144 Hepburn, Katharine, 201 Hero of Alexandria, 175 Hicks, John, 24, 26 Hill, Napoleon, 121–22 Himanen, Pekka, 7 historical databases, 279; of letters and diaries, 285 historical scholarship: compared with historical novel, 79; economics learning from, 78; use of narrative by, 14, 37 Hitler, Adolf, 122, 142, 195 HIV (human immune deficiency virus), 24; coinfective with tuberculosis, 294–95 Hoar, George Frisbie, 178 Hoffa, Jimmy, 260 Hofstadter, Douglas R., 47 Hofstadter, Richard, 36 Hollande, François, 151 Holmes, Oliver Wendell, Jr., 127 Holtby, Winifred, 140 homeownership: advantages over renting, 223, 317n18; advertising promotions for, 219–20; American Dream narrative and, 154–55; condominium conversion boom and, 223–24; seen as investment by many buyers, 226–27 home price indexes, 97, 215–16, 222 home price narratives, 215–17; declining by 2012, 227; fueling a speculative boom, 217–18, 222, 223–24 home prices: available on the Internet, 218; construction costs and, 215, 317n6; falling dramatically with financial crisis of 2007–9, 223; only going up, xii; price of land and, 215; ProQuest references to, 213–14, 216; rising again from 2012 to 2018, 223, 225; social comparison and, 218, 220; supply of housing and, 222; supply of land and, 221–22; surge leading up to financial crisis of 2007–9, 222–23.

“Regime Uncertainty: Why the Great Depression Lasted So Long and Why Prosperity Resumed after the War.” Independent Review 1(4):561–90, http://www.jstor.org/stable/pdf/24560785.pdf. Hill, Napoleon. 1925. The Law of Success in 16 Lessons. New York: Tribeca Books. ________. 1937. Think and Grow Rich. Meriden, CT: The Ralston Society. Himanen, Pekka. 2001. The Hacker Ethic and the Spirit of the Information Age. New York: Random House. Hofstadter, Douglas R. 1980. Gödel, Escher, Bach: An Eternal Golden Braid. New York: Vintage Books. ________. 1981. “Metamagical Themas: The Magic Cube’s Cubies Are Twiddled by Cubists and Solved by Cubemeisters.” Scientific American 244(3):20–39.


The Pirate's Dilemma by Matt Mason

Albert Einstein, augmented reality, barriers to entry, blood diamond, citizen journalism, creative destruction, digital divide, don't be evil, Donald Trump, Douglas Engelbart, East Village, Firefox, Free Software Foundation, future of work, glass ceiling, global village, Hacker Ethic, haute couture, Howard Rheingold, Internet of things, invisible hand, Isaac Newton, jimmy wales, job satisfaction, John Markoff, John Perry Barlow, Joseph Schumpeter, Kickstarter, Lao Tzu, Marshall McLuhan, means of production, Naomi Klein, new economy, New Urbanism, patent troll, peer-to-peer, prisoner's dilemma, public intellectual, RAND corporation, RFID, Richard Florida, Richard Stallman, SETI@home, side hustle, Silicon Valley, South China Sea, Stephen Hawking, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, the long tail, Tim Cook: Apple, urban sprawl, Whole Earth Catalog

The customized information that lawyers, doctors, and teachers give will still be expensive; this isn’t about undermining their ability to earn money. What’s actually being undermined is the very idea of why we work. When Work Stops Working The success of open-source initiatives proves that money isn’t the only thing making the world go ’round. As Pekka Himanen observes in The Hacker Ethic, capitalism is based on the notion that it is our duty to work. The nature of the work doesn’t matter; it’s just about doing it. This notion, first suggested by St. Benedict, an abbot in the sixth century, evolved into the Western work ethic (where we do work that doesn’t always matter most to us, but it’s for money rather than the 166 | THE PIRATE’S DILEMMA monastery).

We live in a world that has been governed by competition for several millennia, but increasingly competition has to compete with cooperation. Work-centeredness was long ago replaced with self-centeredness, but this drive to express ourselves is also forging a new community spirit. As Linus Torvalds writes in The Hacker Ethic, “The reason that Linux hackers do something is that they find it to be very interesting and they like to share this interesting thing with others. Suddenly you both get entertainment from the fact you are doing something interesting, and you get the social part.” Our work ethic is more of a play ethic.

Page 164 Don Tapscott and Anthony D. Williams, Wikinomics (New York: Portfolio Hardcover, 2006), p. 157. Page 165 Andy Patrizio, “PlayStation 3 Users Power on to Cure Disease,” InternetNews .com, April 5, 2007. http://www.internetnews.com/bus-news/article.php/ 3670066. Page 165 Pekka Himanen, The Hacker Ethic and the Spirit of the Information Age (New York: Random House, 2002). This book is a fantastic read; the quote from Linus Torvalds can be found on p. xv. Page 166 Don Tapscott and Anthony D. Williams, Wikinomics (New York: Portfolio Hardcover, 2006), front flap. CHAPTER 6: REAL TALK How Hip-Hop Makes Billions and Could Bring About World Peace Page 177 The Diddy and Burger King clip (which has since been posted back up) can be viewed at http://www.youtube.com/watch?


pages: 394 words: 108,215

What the Dormouse Said: How the Sixties Counterculture Shaped the Personal Computer Industry by John Markoff

Any sufficiently advanced technology is indistinguishable from magic, Apple II, back-to-the-land, beat the dealer, Bill Duvall, Bill Gates: Altair 8800, Buckminster Fuller, California gold rush, card file, computer age, Computer Lib, computer vision, conceptual framework, cuban missile crisis, different worldview, digital divide, Donald Knuth, Douglas Engelbart, Douglas Engelbart, Dynabook, Edward Thorp, El Camino Real, Electric Kool-Aid Acid Test, Fairchild Semiconductor, General Magic , general-purpose programming language, Golden Gate Park, Hacker Ethic, Hans Moravec, hypertext link, informal economy, information retrieval, invention of the printing press, Ivan Sutherland, Jeff Rulifson, John Markoff, John Nash: game theory, John von Neumann, Kevin Kelly, knowledge worker, Lewis Mumford, Mahatma Gandhi, Menlo Park, military-industrial complex, Mother of all demos, Norbert Wiener, packet switching, Paul Terrell, popular electronics, punch-card reader, QWERTY keyboard, RAND corporation, RFC: Request For Comment, Richard Stallman, Robert X Cringely, Sand Hill Road, Silicon Valley, Silicon Valley startup, South of Market, San Francisco, speech recognition, Steve Crocker, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, technological determinism, Ted Nelson, The Hackers Conference, The Theory of the Leisure Class by Thorstein Veblen, Thorstein Veblen, Turing test, union organizing, Vannevar Bush, We are as Gods, Whole Earth Catalog, William Shockley: the traitorous eight

Musicologist John Chowning, who at SAIL invented the technology that underlies modern music synthesizers, called it a “Socratean abode.” SAIL embodied what University of California computer scientist and former SAIL systems programmer Brian Harvey called the “hacker aesthetic.” Harvey’s description was a reaction to what Steven Levy in Hackers: Heroes of the Computer Revolution had described as a “hacker ethic,” which he characterized as the unspoken manifesto of the MIT hackers: Access to computers—and anything which might teach you something about the way the world works—should be unlimited and total. Always yield to the Hands-On Imperative! All information should be free. Mistrust Authority—Promote Decentralization.

You must also epoxy the pieces of paper to the desk.”11 And yet, he demurred that when Richard Stallman, one of MIT’s best-known hackers, stated that information should be free, Stallman’s ideal wasn’t based on the idea of property as theft—an ethical position—but instead on the understanding that keeping information secret is inefficient: “it leads to unaesthetic duplication of effort.”12 Anyone who has spent time around the computer community, particularly as it evolved, will recognize that both writers are correct. Points were given for style, but there was a deeper substance, an ethical stance that has become a formidable force in the modern world of computing. Perhaps no one better represented both the hacker ethic and its aesthetic than Les Earnest. He had worked for the MITRE Corporation. In 1962, he was “loaned” to the CIA and several other intelligence agencies to help integrate various military computer systems. Not surprisingly, an individual with a deeply rooted hacker sensibility was never a perfect fit with a military-intelligence bureaucracy.

Hafner, Katie, and Matthew Lyon. Where Wizards Stay Up Late: The Origins of the Internet. New York: Simon & Schuster, 1996. Hajdu, David. Positively 4th Street: The Lives and Times of Joan Baez, Bob Dylan, Mimi Baez Fariña, and Richard Fariña. New York: Farrar, Straus and Giroux, 2001. Himanen, Pekka. The Hacker Ethic, and the Spirit of the Information Age. New York: Random House, 2001. Lee, Martin A., and Bruce Shlain. Acid Dreams: The Complete Social History of LSD: The CIA, the Sixties, and Beyond. New York: Grove Weidenfeld, 1992. Levy, Steven. Crypto: How the Code Rebels Beat the Government, Saving Privacy in the Digital Age.


pages: 611 words: 188,732

Valley of Genius: The Uncensored History of Silicon Valley (As Told by the Hackers, Founders, and Freaks Who Made It Boom) by Adam Fisher

adjacent possible, Airbnb, Albert Einstein, AltaVista, An Inconvenient Truth, Andy Rubin, AOL-Time Warner, Apple II, Apple Newton, Apple's 1984 Super Bowl advert, augmented reality, autonomous vehicles, Bill Atkinson, Bob Noyce, Brownian motion, Buckminster Fuller, Burning Man, Byte Shop, circular economy, cognitive dissonance, Colossal Cave Adventure, Computer Lib, disintermediation, Do you want to sell sugared water for the rest of your life?, don't be evil, Donald Trump, Douglas Engelbart, driverless car, dual-use technology, Dynabook, Elon Musk, Fairchild Semiconductor, fake it until you make it, fake news, frictionless, General Magic , glass ceiling, Hacker Conference 1984, Hacker Ethic, Henry Singleton, Howard Rheingold, HyperCard, hypertext link, index card, informal economy, information retrieval, Ivan Sutherland, Jaron Lanier, Jeff Bezos, Jeff Rulifson, John Markoff, John Perry Barlow, Jony Ive, Kevin Kelly, Kickstarter, knowledge worker, Larry Ellison, life extension, Marc Andreessen, Marc Benioff, Mark Zuckerberg, Marshall McLuhan, Maui Hawaii, Menlo Park, Metcalfe’s law, Mondo 2000, Mother of all demos, move fast and break things, Neal Stephenson, Network effects, new economy, nuclear winter, off-the-grid, PageRank, Paul Buchheit, paypal mafia, peer-to-peer, Peter Thiel, pets.com, pez dispenser, popular electronics, quantum entanglement, random walk, reality distortion field, risk tolerance, Robert Metcalfe, rolodex, Salesforce, self-driving car, side project, Silicon Valley, Silicon Valley startup, skeuomorphism, skunkworks, Skype, Snow Crash, social graph, social web, South of Market, San Francisco, Startup school, Steve Jobs, Steve Jurvetson, Steve Wozniak, Steven Levy, Stewart Brand, Susan Wojcicki, synthetic biology, Ted Nelson, telerobotics, The future is already here, The Hackers Conference, the long tail, the new new thing, Tim Cook: Apple, Tony Fadell, tulip mania, V2 rocket, We are as Gods, Whole Earth Catalog, Whole Earth Review, Y Combinator

ISBNs: 978-1-4555-5902-2 (hardcover), 978-1-4555-5901-5 (ebook), 978-1-5387-1449-2 (international trade) E3-20180511-JV-NF Contents Cover Title Page Copyright Dedication Epigraph PREFACE Silicon Valley, Explained: The story of the past, as told by the people of the future BOOK ONE Among the Computer Bums The Big Bang: Everything starts with Doug Engelbart Ready Player One: The first T-shirt tycoon The Time Machine: Inventing the future at Xerox PARC Breakout: Jobs and Woz change the game Towel Designers: Atari’s high-strung prima donnas PARC Opens the Kimono: Good artists copy, great artists steal 3P1C F41L: It’s game over for Atari Hello, I’m Macintosh: It sure is great to get out of that bag Fumbling the Future: Who blew it: Xerox PARC—or Steve Jobs? BOOK TWO The Hacker Ethic What Information Wants: Heroes of the computer revolution The Whole Earth ’Lectronic Link: Welcome to the restaurant at the end of the universe Reality Check: The new new thing—that wasn’t From Insanely Great to Greatly Insane: General Magic mentors a generation The Bengali Typhoon: Wired’s revolution of the month Toy Stories: From PARC to Pixar Jerry Garcia’s Last Words: Netscape opened at what?!

Bruce Horn: We’re waiting for the right thing to happen to have the same type of mind-blowing experience that we were able to show the Apple people at PARC. There’s some work being done, but it’s very tough. And, yeah, I feel somewhat responsible. On the other hand, if somebody like Alan Kay couldn’t make it happen, how can I make it happen? BOOK TWO THE HACKER ETHIC We are as gods and might as well get good at it. —STEWART BRAND What Information Wants Heroes of the computer revolution By the mideighties, the technologists who were creating the future in Silicon Valley started to see themselves as more than simply engineers. Alvy Ray Smith and his midnight crew at Xerox PARC, the game makers at Atari, and the Macintosh team at Apple all became convinced that they were pioneers in a new expressive medium.

But the cool thing was seeing him explain it and show it off to other hackers and see that this was actually the currency, this was the dynamic. He was doing stuff and giving it out to everybody: “Yeah, here’s a copy of it.” And they were going to go and hack on it some more. It was just the very thesis that Steven was talking about in his book, this hacker ethic of sharing and building upon in an open-source sense and there it was. It was right there. Steven Levy: It was just like endless demos and showing people things and cool stuff. They hooked up the games. David Levitt: Amazing games no one had ever seen before. Fabrice Florin: They were up until the wee hours just showing off stuff, discussing, hacking, teaching each other how to do stuff.


pages: 499 words: 144,278

Coders: The Making of a New Tribe and the Remaking of the World by Clive Thompson

"Margaret Hamilton" Apollo, "Susan Fowler" uber, 2013 Report for America's Infrastructure - American Society of Civil Engineers - 19 March 2013, 4chan, 8-hour work day, Aaron Swartz, Ada Lovelace, AI winter, air gap, Airbnb, algorithmic bias, AlphaGo, Amazon Web Services, Andy Rubin, Asperger Syndrome, augmented reality, Ayatollah Khomeini, backpropagation, barriers to entry, basic income, behavioural economics, Bernie Sanders, Big Tech, bitcoin, Bletchley Park, blockchain, blue-collar work, Brewster Kahle, Brian Krebs, Broken windows theory, call centre, Cambridge Analytica, cellular automata, Charles Babbage, Chelsea Manning, Citizen Lab, clean water, cloud computing, cognitive dissonance, computer vision, Conway's Game of Life, crisis actor, crowdsourcing, cryptocurrency, Danny Hillis, data science, David Heinemeier Hansson, deep learning, DeepMind, Demis Hassabis, disinformation, don't be evil, don't repeat yourself, Donald Trump, driverless car, dumpster diving, Edward Snowden, Elon Musk, Erik Brynjolfsson, Ernest Rutherford, Ethereum, ethereum blockchain, fake news, false flag, Firefox, Frederick Winslow Taylor, Free Software Foundation, Gabriella Coleman, game design, Geoffrey Hinton, glass ceiling, Golden Gate Park, Google Hangouts, Google X / Alphabet X, Grace Hopper, growth hacking, Guido van Rossum, Hacker Ethic, hockey-stick growth, HyperCard, Ian Bogost, illegal immigration, ImageNet competition, information security, Internet Archive, Internet of things, Jane Jacobs, John Markoff, Jony Ive, Julian Assange, Ken Thompson, Kickstarter, Larry Wall, lone genius, Lyft, Marc Andreessen, Mark Shuttleworth, Mark Zuckerberg, Max Levchin, Menlo Park, meritocracy, microdosing, microservices, Minecraft, move 37, move fast and break things, Nate Silver, Network effects, neurotypical, Nicholas Carr, Nick Bostrom, no silver bullet, Northpointe / Correctional Offender Management Profiling for Alternative Sanctions, Oculus Rift, off-the-grid, OpenAI, operational security, opioid epidemic / opioid crisis, PageRank, PalmPilot, paperclip maximiser, pattern recognition, Paul Graham, paypal mafia, Peter Thiel, pink-collar, planetary scale, profit motive, ransomware, recommendation engine, Richard Stallman, ride hailing / ride sharing, Rubik’s Cube, Ruby on Rails, Sam Altman, Satoshi Nakamoto, Saturday Night Live, scientific management, self-driving car, side project, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, single-payer health, Skype, smart contracts, Snapchat, social software, software is eating the world, sorting algorithm, South of Market, San Francisco, speech recognition, Steve Wozniak, Steven Levy, systems thinking, TaskRabbit, tech worker, techlash, TED Talk, the High Line, Travis Kalanick, Uber and Lyft, Uber for X, uber lyft, universal basic income, urban planning, Wall-E, Watson beat the top human players on Jeopardy!, WeWork, WikiLeaks, women in the workforce, Y Combinator, Zimmermann PGP, éminence grise

Using a $120,000 machine to play a video game would likely have seemed, to computer-makers at the time, a madly frivolous thing to do. But the MIT hackers regarded themselves as liberating programming from its mundane history of mere bean counting and scientific problem-solving. Coding itself, they felt, was a playful, artistic act. They were establishing, as Levy described it, a “hacker ethic.” They believed that there was a hands-on imperative, that everyone in the world ought to be allowed to interact directly with a computer. They also believed in radical openness with code: If you wrote something useful, you should freely share it with others. (This spirit of openness extended to the physical world: When MIT authorities locked cabinets with equipment they needed to fix the computer, they studied lock picking and liberated the equipment.)

Right now, though, the truth is that there are oodles of young people from all walks of life who want in. They admire tech’s self-image as a meritocracy; they crave a field that’s truly like that. Indeed, few people are hungrier for a true meritocracy than those who’ve historically been sealed out of so many industries and so many other opportunities. An industry run truly on hacker ethics—of being judged purely on the quality of your running code, with no one remarking on your identity? That would be a thrilling utopia for them. If the world of programming actually lived up to its implicit ideals, it would be a beacon for any historically screwed-over group. Indeed, that’s precisely why previously picked-on nerd boys found it so glorious when they stumbled upon it in the ’80s.

“of the sun or moon it was”: Levy, Hackers, 139. a $120,000 machine: Russell Brandom, “ ‘Spacewar!’: The Story of the World’s First Digital Video Game,” The Verge, February 4, 2013, accessed August 16, 2018, https://www.theverge.com/2013/2/4/3949524/the-story-of-the-worlds-first-digital-video-game. a “hacker ethic”: Levy, Hackers, 26–37. “hacking in general”: Levy, Hackers, 107. tinker with the code: “GNU General Public License,” Free Software Foundation, June 29, 2007, accessed August 16, 2018, https://www.gnu.org/licenses/gpl-3.0.en.html. “bunch of other robots”: Levy, Hackers, 129. like the MIT hackers: Clive Thompson, “Steve Wozniak’s Apple I Booted Up a Tech Revolution,” Smithsonian, March 2016, accessed August 18, 2018, https://www.smithsonianmag.com/smithsonian-institution/steve-wozniaks-apple-i-booted-up-tech-revolution-180958112/.


pages: 398 words: 86,023

The Wikipedia Revolution: How a Bunch of Nobodies Created the World's Greatest Encyclopedia by Andrew Lih

Albert Einstein, AltaVista, barriers to entry, Benjamin Mako Hill, Bill Atkinson, c2.com, Cass Sunstein, citation needed, commons-based peer production, crowdsourcing, Debian, disinformation, en.wikipedia.org, Firefox, Ford Model T, Free Software Foundation, Hacker Ethic, HyperCard, index card, Jane Jacobs, Jason Scott: textfiles.com, jimmy wales, Ken Thompson, Kickstarter, Marshall McLuhan, Mitch Kapor, Network effects, optical character recognition, Ralph Waldo Emerson, Richard Stallman, side project, Silicon Valley, Skype, slashdot, social software, Steve Jobs, the Cathedral and the Bazaar, The Death and Life of Great American Cities, the long tail, The Wisdom of Crowds, Tragedy of the Commons, urban planning, urban renewal, Vannevar Bush, wikimedia commons, Y2K, Yochai Benkler

A basic LISP program looked something like this: (defun factorial (n) (if (< = n 1) 1 (* n (factorial (- n 1))))) It was so easy to learn, though hard to master. Many consider it the most elegant computer language around because of its simplicity. To understand Stallman’s view on the world, you have to understand the computer hacker ethic. The computing culture at MIT and other top scientific schools was one of sharing and openness. These institutions were full of people, after all, who were pursuing software programming not for dollar profits, but for the love of discovery and pioneering new solutions to problems. Worried little about where to live or when the next paycheck was arriving, these students could hun- A_Nupedia_25 ker down in a cloistered academic environment and concentrate on their programming creations.

Worried little about where to live or when the next paycheck was arriving, these students could hun- A_Nupedia_25 ker down in a cloistered academic environment and concentrate on their programming creations. Hackers would regularly improve how the emerging LISP language and its tools worked, and let everyone in the academic community know by allowing them to share and download new improvements over computer networks that predated the Internet. This was an important part of the hacker ethic: sharing to improve human knowledge. Changes and modifications were put in the public domain for all to partake in. Researchers would improve the work of others and recontribute the work back into the community. In the 1980s, before it became commercial, the Internet was made up of these educational institutions and research labs in which academics and engineers transferred software packages or improvement “patches” of files back and forth as part of hacker camaraderie.

Eric Raymond, in A Brief History of Hackerdom, describes the creation during the ARPANET days of the Jargon File, another precursor to Wikipedia’s group-edited document: The first intentional artifacts of the hacker culture—the first slang list, the first satires, the first self-conscious discussions of the hacker ethic—all propagated on the ARPANET in its early years. In particular, the first version of the Jargon File (http://www.tuxedo .org/jargon) developed as a cross-net collaboration during 1973–1975. This slang dictionary became one of the culture’s defining documents. It was eventually published as The New Hacker’s Dictionary. 86_The_Wikipedia_Revolution The Jargon File was much beloved by the hacker community and passed along like a family heirloom, with prominent computer scientists such as Richard Stallman, Guy Steele, and Dave Lebling all having a major hand in its editing.


Smart Mobs: The Next Social Revolution by Howard Rheingold

"hyperreality Baudrillard"~20 OR "Baudrillard hyperreality", A Pattern Language, Alvin Toffler, AOL-Time Warner, augmented reality, barriers to entry, battle of ideas, Brewster Kahle, Burning Man, business climate, citizen journalism, computer vision, conceptual framework, creative destruction, Dennis Ritchie, digital divide, disinformation, Douglas Engelbart, Douglas Engelbart, experimental economics, experimental subject, Extropian, Free Software Foundation, Garrett Hardin, Hacker Ethic, Hedy Lamarr / George Antheil, Herman Kahn, history of Unix, hockey-stick growth, Howard Rheingold, invention of the telephone, inventory management, Ivan Sutherland, John Markoff, John von Neumann, Joi Ito, Joseph Schumpeter, Ken Thompson, Kevin Kelly, Lewis Mumford, Metcalfe's law, Metcalfe’s law, more computing power than Apollo, move 37, Multics, New Urbanism, Norbert Wiener, packet switching, PalmPilot, Panopticon Jeremy Bentham, pattern recognition, peer-to-peer, peer-to-peer model, pez dispenser, planetary scale, pre–internet, prisoner's dilemma, radical decentralization, RAND corporation, recommendation engine, Renaissance Technologies, RFID, Richard Stallman, Robert Metcalfe, Robert X Cringely, Ronald Coase, Search for Extraterrestrial Intelligence, seminal paper, SETI@home, sharing economy, Silicon Valley, skunkworks, slashdot, social intelligence, spectrum auction, Steven Levy, Stewart Brand, the Cathedral and the Bazaar, the scientific method, Tragedy of the Commons, transaction costs, ultimatum game, urban planning, web of trust, Whole Earth Review, Yochai Benkler, zero-sum game

It all started with the original hackers in the early 1960s. Before the word “hacker” was misappropriated to describe people who break into computer systems, the term was coined (in the early 1960s) to describe people who create computer systems. The first people to call themselves hackers were loyal to an informal social contract called “the hacker ethic.” As Steven Levy described it, this ethic included these principles: Access to computers should be unlimited and total. Always yield to the Hands-On Imperative. All information should be free. Mistrust authority—promote decentralization.45 Without that ethic, there probably wouldn’t have been an Internet to commercialize.

The foundations of the Internet were created by the community of creators as a gift to the community of users. In the 1960s, the community of users was the same as the community of creators, so self-interest and public goods were identical, but hackers foresaw a day when their tools would be used by a wider population.48 Understanding the hacker ethic and the way in which the Internet was built to function as a commons are essential to forecasting where tomorrow’s technologies of cooperation might come from and what might encourage or limit their use. Originally, software was included with the hardware that computer manufacturers sold to customers—mainframe computers attended by special operators.

Based on GNU, all of Torvalds’s code was open according to the GPL, and Torvalds took the fateful step of posting his work to the Net and asking others for help. The kernel, known as Linux, drew hundreds, then thousands of young programmers. By the 1990s, opposition to the monolithic domination of the computer operating system market by Microsoft became a motivating factor for rebellious young programmers who had taken up the torch of the hacker ethic. “Open source” refers to software, but it also refers to a method for developing software and a philosophy of how to maintain a public good. Eric Raymond wrote about the difference between “cathedral and bazaar” approaches to complex software development: The most important feature of Linux, however, was not technical but sociological.


Hacking Capitalism by Söderberg, Johan; Söderberg, Johan;

Abraham Maslow, air gap, Alvin Toffler, AOL-Time Warner, barriers to entry, Charles Babbage, collective bargaining, commoditize, computer age, corporate governance, creative destruction, Debian, deindustrialization, delayed gratification, Dennis Ritchie, deskilling, digital capitalism, digital divide, Donald Davies, Eben Moglen, Erik Brynjolfsson, Firefox, Free Software Foundation, frictionless, full employment, Garrett Hardin, Hacker Conference 1984, Hacker Ethic, Herbert Marcuse, Howard Rheingold, IBM and the Holocaust, informal economy, interchangeable parts, invention of radio, invention of the telephone, Jacquard loom, James Watt: steam engine, jimmy wales, John Markoff, John von Neumann, Joseph Schumpeter, Joseph-Marie Jacquard, Ken Thompson, knowledge economy, knowledge worker, labour market flexibility, late capitalism, Lewis Mumford, liberal capitalism, Marshall McLuhan, means of production, Mitch Kapor, mutually assured destruction, new economy, Norbert Wiener, On the Economy of Machinery and Manufactures, packet switching, patent troll, peer-to-peer, peer-to-peer model, planned obsolescence, post scarcity, post-Fordism, post-industrial society, price mechanism, Productivity paradox, profit motive, RFID, Richard Florida, Richard Stallman, Ronald Coase, safety bicycle, Search for Extraterrestrial Intelligence, SETI@home, Silicon Valley, Slavoj Žižek, software patent, Steven Levy, Stewart Brand, subscription business, tech worker, technological determinism, technoutopianism, the Cathedral and the Bazaar, The Nature of the Firm, the scientific method, The Theory of the Leisure Class by Thorstein Veblen, Thomas Davenport, Thorstein Veblen, tragedy of the anticommons, Tragedy of the Commons, transaction costs, Whole Earth Catalog, Yochai Benkler

It is noteworthy that the belief of early socialists, that humanity would be liberated from scarcity thanks to the development of the forces of production, is resurfacing in the technophilia of many hackers. When they reflect upon the ramifications of their hobby they tend to be heavily influenced by notions about the ‘affluent society’.1 The underlying assumption, explicitly argued in Pekka Himanen’s The Hacker Ethic, is that the ‘high-tech gift economy’ on the Internet has emerged as a consequence of the abundant wealth in industrialised economies. Himanen is typical in referring to the psychologist Abraham Maslow’s work on human motivation from the 1950s. According to Maslow, human needs can be arranged in a hierarchy where primacy is assigned to those needs that are most urgently requiring to satisfy for a human being when he lacks everything.

For a critical view of how the blurring of work and passion, i.e. the hacker spirit, is taken advantage of by shareholders at the expense of disillusioned, burned-out employees, see Andrew Ross’ study of webdesigners working in advertising bureaus. No-Collar—The Human Workplace and its Hidden Costs (Philadelphia: Temple University Press 2004), Pekka Himanen, The Hacker Ethic—The Spirit of the Information Age (London: Secker & Warburg, 2001). 67. Dennies Hayes, Behind the Silicon Curtain—The Seduction of Work in a Lonely Era (London: Free Association Books, 1989), 85. 68. The tendency was noticeable within the computer industry already in the 1970s when Philip Kraft examined how the computer profession was being transformed by an intensified technical division of labour.

Behind the Silicon Curtain—The Seduction of Work in a Lonely Era, London: Free Association Books, 1989. Heller, Agnes. The Theory of Need in Marx, New York: St. Martin’s Publisher, 1976. Hemmungs, Eva. No Trespassing—Authorship, Intellectual Property Rights, and the Boundaries of Globalization, Toronto: University of Toronto Press, 2004. Himanen, Pekka. The Hacker Ethic—The Spirit of the Information Age, London: Secker & Warburg, 2001. Hippel, Eric, Democratising Innovation, Cambridge Mass.: MIT Press, 2005. Hirsch, Fred. Social Limits to Growth, London: Routledge, 1995. Hobsbawm, Eric. Bandits, London: Ebenezer Baylis & Son, 1969. ed. Hoekman, Bernard, and Michel Kostecki.


pages: 222 words: 70,132

Move Fast and Break Things: How Facebook, Google, and Amazon Cornered Culture and Undermined Democracy by Jonathan Taplin

"Friedman doctrine" OR "shareholder theory", "there is no alternative" (TINA), 1960s counterculture, affirmative action, Affordable Care Act / Obamacare, Airbnb, AlphaGo, Amazon Mechanical Turk, American Legislative Exchange Council, AOL-Time Warner, Apple's 1984 Super Bowl advert, back-to-the-land, barriers to entry, basic income, battle of ideas, big data - Walmart - Pop Tarts, Big Tech, bitcoin, Brewster Kahle, Buckminster Fuller, Burning Man, Clayton Christensen, Cody Wilson, commoditize, content marketing, creative destruction, crony capitalism, crowdsourcing, data is the new oil, data science, David Brooks, David Graeber, decentralized internet, don't be evil, Donald Trump, Douglas Engelbart, Douglas Engelbart, Dynabook, Edward Snowden, Elon Musk, equal pay for equal work, Erik Brynjolfsson, Fairchild Semiconductor, fake news, future of journalism, future of work, George Akerlof, George Gilder, Golden age of television, Google bus, Hacker Ethic, Herbert Marcuse, Howard Rheingold, income inequality, informal economy, information asymmetry, information retrieval, Internet Archive, Internet of things, invisible hand, Jacob Silverman, Jaron Lanier, Jeff Bezos, job automation, John Markoff, John Maynard Keynes: technological unemployment, John Perry Barlow, John von Neumann, Joseph Schumpeter, Kevin Kelly, Kickstarter, labor-force participation, Larry Ellison, life extension, Marc Andreessen, Mark Zuckerberg, Max Levchin, Menlo Park, Metcalfe’s law, military-industrial complex, Mother of all demos, move fast and break things, natural language processing, Network effects, new economy, Norbert Wiener, offshore financial centre, packet switching, PalmPilot, Paul Graham, paypal mafia, Peter Thiel, plutocrats, pre–internet, Ray Kurzweil, reality distortion field, recommendation engine, rent-seeking, revision control, Robert Bork, Robert Gordon, Robert Metcalfe, Ronald Reagan, Ross Ulbricht, Sam Altman, Sand Hill Road, secular stagnation, self-driving car, sharing economy, Silicon Valley, Silicon Valley ideology, Skinner box, smart grid, Snapchat, Social Justice Warrior, software is eating the world, Steve Bannon, Steve Jobs, Stewart Brand, tech billionaire, techno-determinism, technoutopianism, TED Talk, The Chicago School, the long tail, The Market for Lemons, The Rise and Fall of American Growth, Tim Cook: Apple, trade route, Tragedy of the Commons, transfer pricing, Travis Kalanick, trickle-down economics, Tyler Cowen, Tyler Cowen: Great Stagnation, universal basic income, unpaid internship, vertical integration, We are as Gods, We wanted flying cars, instead we got 140 characters, web application, Whole Earth Catalog, winner-take-all economy, women in the workforce, Y Combinator, you are the product

The early WELL guidelines were very clear about intellectual property, as stated on the log-on screen: “You own your own words. This means that you are responsible for the words you post on the WELL, and that reproduction of those words without your permission in any medium outside the WELL’s conferencing system may be challenged by you, the author.” But in 1989 something weird happened. The notion of the “hacker ethic” became a contested trope. It started with an online forum on the WELL organized by Harper’s Magazine. The subject was hacking, and Paul Tough, a Harper’s editor, had recruited Brand and a few of his most important WELL members, including Howard Rheingold, Kevin Kelly, and John Perry Barlow, to participate.

On January 24, 1990, the Secret Service raided the apartment where Acid Phreak was living with his mother. By the end of the day Acid Phreak, Phiber Optik, and a third hacker, Scorpion, were in a New York City jail, accused of hacking the main AT&T computer system. And that is where Brand, Barlow, and their fellow communards changed course. Instead of recalibrating the hacker ethic in line with their earlier goals, they embraced the criminals on the theory that theirs was really a victimless crime. Tell that to AT&T, which had to spend millions restoring its system. Barlow went on to form the Electronic Frontier Foundation, which has never met a hacker it couldn’t defend.


pages: 312 words: 93,504

Common Knowledge?: An Ethnography of Wikipedia by Dariusz Jemielniak

Andrew Keen, barriers to entry, Benevolent Dictator For Life (BDFL), citation needed, collaborative consumption, collaborative editing, commons-based peer production, conceptual framework, continuous integration, crowdsourcing, Debian, deskilling, digital Maoism, disinformation, en.wikipedia.org, Filter Bubble, Free Software Foundation, Gabriella Coleman, Google Glasses, Guido van Rossum, Hacker Ethic, hive mind, Internet Archive, invisible hand, Jaron Lanier, jimmy wales, job satisfaction, Julian Assange, knowledge economy, knowledge worker, Menlo Park, moral hazard, online collectivism, pirate software, RFC: Request For Comment, Richard Stallman, selection bias, Silicon Valley, Skype, slashdot, social software, Stewart Brand, the Cathedral and the Bazaar, The Hackers Conference, The Nature of the Firm, the strength of weak ties, The Wisdom of Crowds, transaction costs, Wayback Machine, WikiLeaks, wikimedia commons, Wikivoyage, Yochai Benkler, zero-sum game

Participation in virtual communities of practice, such as free/libre-and-opensource-software (F/LOSS) projects and other open-collaboration communities, has major influence on enculturation and shaping the shared values of the participants. For example, the Debian hacker ethic is to a huge extent socially constructed and strengthened in communal interactions in opposition to the traditional market-based concept of intellectual property (Coleman & Hill, 2005). It revolves around the strong belief in personal freedom (Coleman & Golub, 2008). Pekka Himanen describes the hacker ethic, a characteristic of the emerging network society (2001). This new paradigm is based on cooperation and joint production and is transforming the economy and society (Benkler, 2006b).

Retrieved from http:// www.plosone.org/article/info%3Adoi%2F10.1371%2Fjournal.pone.0065782 Hill, B. M., Shaw, A., & Benkler, Y. (2013). Status, social signaling and collective action in a peer production community. Unpublished manuscript, Berkman Center for Internet and Society working paper, Cambridge, MA. Himanen, P. (2001). The hacker ethic and the spirit of the information age. New York: Random House. Hine, C. (2000). Virtual ethnography. Thousand Oaks, CA: Sage. Hine, C. (2008). Virtual ethnography: Modes, varieties, affordances. In N. Fielding, R. M. Lee, & G. Blank (Eds.), The SAGE Handbook of Online Research Methods (pp. 257–270).


pages: 619 words: 177,548

Power and Progress: Our Thousand-Year Struggle Over Technology and Prosperity by Daron Acemoglu, Simon Johnson

"Friedman doctrine" OR "shareholder theory", "World Economic Forum" Davos, 4chan, agricultural Revolution, AI winter, Airbnb, airline deregulation, algorithmic bias, algorithmic management, Alignment Problem, AlphaGo, An Inconvenient Truth, artificial general intelligence, augmented reality, basic income, Bellingcat, Bernie Sanders, Big Tech, Bletchley Park, blue-collar work, British Empire, carbon footprint, carbon tax, carried interest, centre right, Charles Babbage, ChatGPT, Clayton Christensen, clean water, cloud computing, collapse of Lehman Brothers, collective bargaining, computer age, Computer Lib, Computing Machinery and Intelligence, conceptual framework, contact tracing, Corn Laws, Cornelius Vanderbilt, coronavirus, corporate social responsibility, correlation does not imply causation, cotton gin, COVID-19, creative destruction, declining real wages, deep learning, DeepMind, deindustrialization, Demis Hassabis, Deng Xiaoping, deskilling, discovery of the americas, disinformation, Donald Trump, Douglas Engelbart, Douglas Engelbart, Edward Snowden, Elon Musk, en.wikipedia.org, energy transition, Erik Brynjolfsson, European colonialism, everywhere but in the productivity statistics, factory automation, facts on the ground, fake news, Filter Bubble, financial innovation, Ford Model T, Ford paid five dollars a day, fulfillment center, full employment, future of work, gender pay gap, general purpose technology, Geoffrey Hinton, global supply chain, Gordon Gekko, GPT-3, Grace Hopper, Hacker Ethic, Ida Tarbell, illegal immigration, income inequality, indoor plumbing, industrial robot, interchangeable parts, invisible hand, Isaac Newton, Jacques de Vaucanson, James Watt: steam engine, Jaron Lanier, Jeff Bezos, job automation, Johannes Kepler, John Markoff, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, Joseph-Marie Jacquard, Kenneth Arrow, Kevin Roose, Kickstarter, knowledge economy, labor-force participation, land reform, land tenure, Les Trente Glorieuses, low skilled workers, low-wage service sector, M-Pesa, manufacturing employment, Marc Andreessen, Mark Zuckerberg, megacity, mobile money, Mother of all demos, move fast and break things, natural language processing, Neolithic agricultural revolution, Norbert Wiener, NSO Group, offshore financial centre, OpenAI, PageRank, Panopticon Jeremy Bentham, paperclip maximiser, pattern recognition, Paul Graham, Peter Thiel, Productivity paradox, profit maximization, profit motive, QAnon, Ralph Nader, Ray Kurzweil, recommendation engine, ride hailing / ride sharing, Robert Bork, Robert Gordon, Robert Solow, robotic process automation, Ronald Reagan, scientific management, Second Machine Age, self-driving car, seminal paper, shareholder value, Sheryl Sandberg, Shoshana Zuboff, Silicon Valley, social intelligence, Social Responsibility of Business Is to Increase Its Profits, social web, South Sea Bubble, speech recognition, spice trade, statistical model, stem cell, Steve Jobs, Steve Wozniak, strikebreaker, subscription business, Suez canal 1869, Suez crisis 1956, supply-chain management, surveillance capitalism, tacit knowledge, tech billionaire, technoutopianism, Ted Nelson, TED Talk, The Future of Employment, The Rise and Fall of American Growth, The Structural Transformation of the Public Sphere, The Wealth of Nations by Adam Smith, theory of mind, Thomas Malthus, too big to fail, total factor productivity, trade route, transatlantic slave trade, trickle-down economics, Turing machine, Turing test, Twitter Arab Spring, Two Sigma, Tyler Cowen, Tyler Cowen: Great Stagnation, union organizing, universal basic income, Unsafe at Any Speed, Upton Sinclair, upwardly mobile, W. E. B. Du Bois, War on Poverty, WikiLeaks, wikimedia commons, working poor, working-age population

—Wassily Leontief, “Technological Advance, Economic Growth, and the Distribution of Income,” 1983 The beginnings of the computer revolution can be found on the ninth floor of MIT’s Tech Square building. In 1959‒1960, a group of often-unkempt young men coded there in assembly language into the early hours of the morning. They were driven by a vision, sometimes referred to as the “hacker ethic,” which foreshadowed what came to energize Silicon Valley entrepreneurs. Key to this ethic was decentralization and freedom. Hackers felt great disdain for the major computer company of that era, IBM (International Business Machines). In their view, IBM wanted to control and bureaucratize information, whereas they believed that access to computers should be completely free and unlimited.

The answer to the second also builds on these institutional changes but crucially involves the emergence of a new utopian (but in reality, largely dystopian) digital vision, which pushed technologies and practices in an increasingly antilabor direction. In the next several sections we start with the institutional developments and return to how the idealistic hacker ethic of the 1960s and 1970s morphed into an agenda for automation and worker disempowerment. The Liberal Establishment and Its Discontents We saw in Chapter 7 how a sort of balance between business and organized labor emerged in the United States after the 1930s. It was undergirded by robust wage growth across jobs ranging from the unskilled to the highly skilled, and by a broadly worker-friendly direction of technology.

Thus, despite variation across countries, the direction of progress in the US has had a significant global impact. Digital Utopia The direction of technology that prioritized automation cannot be understood unless we recognize the new digital vision that emerged in the 1980s. This vision combined the drive to cut labor costs, rooted in the Friedman doctrine, with elements of the hacker ethic, but abandoned the philosophy of early hackers such as Lee Felsenstein that was antielitist and suspicious of corporate power. Felsenstein admonished IBM and other big corporations because they were trying to misuse technology with their ideology of “design by geniuses for use by idiots.” The new vision instead embraced the top-down design of digital technologies aimed at eliminating people from the production process.


pages: 273 words: 76,786

Explore Everything by Bradley Garrett

airport security, Burning Man, call centre, creative destruction, Crossrail, deindustrialization, double helix, Dr. Strangelove, dumpster diving, failed state, Gabriella Coleman, gentrification, Google Earth, Hacker Ethic, Jane Jacobs, Julian Assange, late capitalism, megacity, New Urbanism, Occupy movement, off-the-grid, place-making, shareholder value, Stephen Fry, the built environment, The Death and Life of Great American Cities, urban planning, white flight, WikiLeaks

As people become more curious about what a post-capitalist world would look like, urban explorers can supply imaginative depictions.36 * * * * To see and hear the actual demolition of West Park recorded by urban explorer Gina Soden, go to youtube.com/watch?v=qwEgaAz6uFQ (‘The Sounds of Demolition’). Chapter 4 THE RISE OF AN INFILTRATION CREW ‘There is no one hacker ethic. Everyone has his own. To say that we all think the same way is preposterous.’ – Acid Phreak It was the beginning of what was to be a long, cold winter in 2009. Team B explorers received information that a mothballed thirty-five-acre Ministry of Defence (MOD) nuclear bunker had been breached.

Alex and Laura showed us how to dig properly, and before we knew it we had an assembly line going: the person digging ‘point’ pushed dirt out to the people widening walls, who put it in buckets and gave it to the people on break eating pizza and drinking Samuel Adams, where eventually it was dumped in sledges, which got dragged outside. We dug for six hours in frenzied rotation. Alex reckoned we might have gone forward a metre. Just as the hacker ethic cannot be simplistically reified, categorised or bounded, neither can explorers themselves. While universally shared motivations behind exploration exist, such as friendship or geography, it is impossible to define a coordinated explorer ethos; individuals simply follow their desires and do their own edgework.


pages: 720 words: 197,129

The Innovators: How a Group of Inventors, Hackers, Geniuses and Geeks Created the Digital Revolution by Walter Isaacson

1960s counterculture, Ada Lovelace, AI winter, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, Albert Einstein, AltaVista, Alvin Toffler, Apollo Guidance Computer, Apple II, augmented reality, back-to-the-land, beat the dealer, Bill Atkinson, Bill Gates: Altair 8800, bitcoin, Bletchley Park, Bob Noyce, Buckminster Fuller, Byte Shop, c2.com, call centre, Charles Babbage, citizen journalism, Claude Shannon: information theory, Clayton Christensen, commoditize, commons-based peer production, computer age, Computing Machinery and Intelligence, content marketing, crowdsourcing, cryptocurrency, Debian, desegregation, Donald Davies, Douglas Engelbart, Douglas Engelbart, Douglas Hofstadter, driverless car, Dynabook, El Camino Real, Electric Kool-Aid Acid Test, en.wikipedia.org, eternal september, Evgeny Morozov, Fairchild Semiconductor, financial engineering, Firefox, Free Software Foundation, Gary Kildall, Google Glasses, Grace Hopper, Gödel, Escher, Bach, Hacker Ethic, Haight Ashbury, Hans Moravec, Howard Rheingold, Hush-A-Phone, HyperCard, hypertext link, index card, Internet Archive, Ivan Sutherland, Jacquard loom, Jaron Lanier, Jeff Bezos, jimmy wales, John Markoff, John von Neumann, Joseph-Marie Jacquard, Leonard Kleinrock, Lewis Mumford, linear model of innovation, Marc Andreessen, Mark Zuckerberg, Marshall McLuhan, Menlo Park, Mitch Kapor, Mother of all demos, Neil Armstrong, new economy, New Journalism, Norbert Wiener, Norman Macrae, packet switching, PageRank, Paul Terrell, pirate software, popular electronics, pre–internet, Project Xanadu, punch-card reader, RAND corporation, Ray Kurzweil, reality distortion field, RFC: Request For Comment, Richard Feynman, Richard Stallman, Robert Metcalfe, Rubik’s Cube, Sand Hill Road, Saturday Night Live, self-driving car, Silicon Valley, Silicon Valley startup, Skype, slashdot, speech recognition, Steve Ballmer, Steve Crocker, Steve Jobs, Steve Wozniak, Steven Levy, Steven Pinker, Stewart Brand, Susan Wojcicki, technological singularity, technoutopianism, Ted Nelson, Teledyne, the Cathedral and the Bazaar, The Coming Technological Singularity, The Nature of the Firm, The Wisdom of Crowds, Turing complete, Turing machine, Turing test, value engineering, Vannevar Bush, Vernor Vinge, Von Neumann architecture, Watson beat the top human players on Jeopardy!, Whole Earth Catalog, Whole Earth Review, wikimedia commons, William Shockley: the traitorous eight, Yochai Benkler

119 The simple answer was that the computer, as it ran the programs, produced frequency interference that could be controlled by the timing loops and picked up as tone pulses by an AM radio. By the time his query was published, Gates had been thrown into a more fundamental dispute with the Homebrew Computer Club. It became archetypal of the clash between the commercial ethic that believed in keeping information proprietary, represented by Gates, and the hacker ethic of sharing information freely, represented by the Homebrew crowd. Paul Allen (1953– ) and Bill Gates (1955– ) in the Lakeside school’s computer room. Gates arrested for speeding, 1977. The Microsoft team, with Gates at bottom left and Allen at bottom right, just before leaving Albuquerque in December 1978.

They agreed to meet when Bricklin, who lived in Boston, came to an O’Reilly conference in San Francisco. Over sushi at a nearby restaurant, Bricklin told the tale of how, years earlier, when his own company was foundering, he had run into Mitch Kapor of Lotus. Though competitors, they shared a collaborative hacker ethic, so Kapor offered a deal that helped Bricklin stay personally solvent. Bricklin went on to found a company, Trellix, that made its own website publishing system. Paying forward Kapor’s band-of-hackers helpfulness to a semicompetitor, Bricklin worked out a deal for Trellix to license Blogger’s software for $40,000, thus keeping it alive.

As the technology journalist Steven Johnson has noted, “their open architecture allows others to build more easily on top of existing ideas, just as Berners-Lee built the Web on top of the Internet.”33 This commons-based production by peer networks was driven not by financial incentives but by other forms of reward and satisfaction. The values of commons-based sharing and of private enterprise often conflict, most notably over the extent to which innovations should be patent-protected. The commons crowd had its roots in the hacker ethic that emanated from the MIT Tech Model Railroad Club and the Homebrew Computer Club. Steve Wozniak was an exemplar. He went to Homebrew meetings to show off the computer circuit he built, and he handed out freely the schematics so that others could use and improve it. But his neighborhood pal Steve Jobs, who began accompanying him to the meetings, convinced him that they should quit sharing the invention and instead build and sell it.


pages: 287 words: 86,919

Protocol: how control exists after decentralization by Alexander R. Galloway

Ada Lovelace, airport security, Alvin Toffler, Berlin Wall, bioinformatics, Bretton Woods, Charles Babbage, computer age, Computer Lib, Craig Reynolds: boids flock, Dennis Ritchie, digital nomad, discovery of DNA, disinformation, Donald Davies, double helix, Douglas Engelbart, Douglas Engelbart, easy for humans, difficult for computers, Fall of the Berlin Wall, Free Software Foundation, Grace Hopper, Hacker Ethic, Hans Moravec, informal economy, John Conway, John Markoff, John Perry Barlow, Ken Thompson, Kevin Kelly, Kickstarter, late capitalism, Lewis Mumford, linear programming, macro virus, Marshall McLuhan, means of production, Menlo Park, moral panic, mutually assured destruction, Norbert Wiener, old-boy network, OSI model, packet switching, Panopticon Jeremy Bentham, phenotype, post-industrial society, profit motive, QWERTY keyboard, RAND corporation, Ray Kurzweil, Reflections on Trusting Trust, RFC: Request For Comment, Richard Stallman, semantic web, SETI@home, stem cell, Steve Crocker, Steven Levy, Stewart Brand, Ted Nelson, telerobotics, The future is already here, the market place, theory of mind, urban planning, Vannevar Bush, Whole Earth Review, working poor, Yochai Benkler

Hacking 151 risk-takers, artists . . . and the ones who most clearly saw why the computer was a truly revolutionary tool.”9 These types of hackers are freedom fighters, living by the dictum that data wants to be free.10 Information should not be owned, and even if it is, noninvasive browsing of such information hurts no one. After all, hackers merely exploit preexisting holes made by clumsily constructed code.11 And wouldn’t the revelation of such holes actually improve data security for everyone involved? Levy distilled this so-called hacker ethic into several key points: Access to computers . . . should be unlimited and total. All information should be free. Mistrust authority—promote decentralization. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position. You can create art and beauty on a computer.

For more details on the Mitnick story, see the following texts: Katie Hafner and John Markoff, Cyberpunk: Outlaws and Hackers on the Computer Frontier (New York: Touchstone, 1991); Tsu- Chapter 5 170 A British hacker named Dr-K hardens this sentiment into an explicit anticommercialism when he writes that “[c]orporations and government cannot be trusted to use computer technology for the benefit of ordinary people.”59 It is for this reason that the Free Software Foundation was established in 1985. It is for this reason that so much of the non-PC computer community is dominated by free, or otherwise de-commercialized software.60 The hacker ethic thus begets utopia simply through its rejection of all commercial mandates. However, greater than this anti-commercialism is a pro-protocolism. Protocol, by definition, is open source, the term given to a technology that makes public the source code used in its creation. That is to say, protocol is nothing but an elaborate instruction list of how a given technology should work, from the inside out, from the top to the bottom, as exemplified in the RFCs described in chapter 4.


pages: 369 words: 80,355

Too Big to Know: Rethinking Knowledge Now That the Facts Aren't the Facts, Experts Are Everywhere, and the Smartest Person in the Room Is the Room by David Weinberger

airport security, Alfred Russel Wallace, Alvin Toffler, Amazon Mechanical Turk, An Inconvenient Truth, Berlin Wall, Black Swan, book scanning, Cass Sunstein, commoditize, Computer Lib, corporate social responsibility, crowdsourcing, Danny Hillis, David Brooks, Debian, double entry bookkeeping, double helix, Dr. Strangelove, en.wikipedia.org, Exxon Valdez, Fall of the Berlin Wall, future of journalism, Future Shock, Galaxy Zoo, Gregor Mendel, Hacker Ethic, Haight Ashbury, Herman Kahn, hive mind, Howard Rheingold, invention of the telegraph, Jeff Hawkins, jimmy wales, Johannes Kepler, John Harrison: Longitude, Kevin Kelly, Large Hadron Collider, linked data, Neil Armstrong, Netflix Prize, New Journalism, Nicholas Carr, Norbert Wiener, off-the-grid, openstreetmap, P = NP, P vs NP, PalmPilot, Pluto: dwarf planet, profit motive, Ralph Waldo Emerson, RAND corporation, Ray Kurzweil, Republic of Letters, RFID, Richard Feynman, Ronald Reagan, scientific management, semantic web, slashdot, social graph, Steven Pinker, Stewart Brand, systems thinking, technological singularity, Ted Nelson, the Cathedral and the Bazaar, the scientific method, The Wisdom of Crowds, Thomas Kuhn: the structure of scientific revolutions, Thomas Malthus, Whole Earth Catalog, X Prize

Frauenfelder does not attribute this growth in interest to the Web directly. Rather, he says, in the past few years, “some of the folks who had been spending all their time creating the Web, and everything on it, looked up from their monitors and realized that the world itself was the ultimate hackable platform.” Maker Faire embodies the hacker ethic and aesthetics that have driven the Web and the culture of the Web. And there is no doubt that even for those who do not want to do the sort of science that involves both hacksaws and bags of marshmallows—marshmallow guns are a signature Maker artifact—the Web has been a godsend for the amateur scientist.

Fortune magazine Foucault, Michel Frauenfelder, Mark FuelEconomy.gov Future Shock (Toffler) The Futurist journal Galapagos Islands Galaxy Zoo Galen of Pergamum Garfield, Eugene Gartner Group GBIF.org (Global Biodiversity Information Facility) Geek news General Electric Gentzkow, Matthew Gillmor, Dan Gladwell, Malcolm Glazer, Nathan Global social problems Goals, shared Google abundance of knowledge amateur scientists’ use of books and filtering information physical books and e-books zettabyte Gore, Al Gray, Jim Greece, ancient Green peas Group polarization Groupthink The Guardian newspaper Gulf of Mexico oil spill The Gutenberg Elegies (Birkerts) Habermas, Jürgen Hacker ethic Hague conference Haiti Halberstam, David Hannay, Timo Hard Times (Dickens) Hargittai, Eszter Harrison, John Harvard Library Innovation Lab Haumea (planet) Hawaii Heidegger, Martin Heidegger Circle Henning, Victor Heywood, Stephen Hidary, Jack Hillis, Danny Hilscher, Emily H1N1 virus Holtzblatt, Les Home economics Homophily Howe, Jeff Human Genome Project Humors Hunch.com Hyperlinks linked knowledge providing data links IBM computers Impact factor of scientific journals In vitro fertilization An Inconvenient Truth (film) Information crowd-sourcing data and networking information for fund managers Open Government Initiative reliability of Information Anxiety (Wurman) Information cascades Information overload as filter failure consequences of metadata value of information Infrastructure of knowledge InnoCentive Institutions, Net response to Insularity of Net users Intelligence Internet increasing stupidity providing hooks for Intelligence agencies Intelligent Design International Nucleotide Sequence Database Collaboration Internet abundance of knowledge amateur scientists challenging beliefs crowds and mobs cumulative nature of data sharing diversity of expertise echo chambers forking Hunch.com improving the knowledge environment increasing institutional use indefinite scaling information information filtering interpretations knowledge residing in the network LA Times wikitorial experiment linked knowledge loss of body of knowledge permission-free knowledge public nature of knowledge reliability of information scientific inquiry shaping knowledge shared experiences sub-networks The WELL conversation unresolved knowledge See also Networked knowledge Interpretations, knowledge as iPhone Iraq Jamming Jarvis, Jeff Jellies de Joinville, Jean Journals, scientific Kahn, Herman Kantor, Jodi Kelly, Kevin Kennedy, Ted Kennedy administration Kepler, Johannes Kindle Kitano, Hiroaki Knowledge abundance of as interpretation changing shape of crisis of echo chambers hiding enduring characteristics of environmental niche modeling fact-based and analogy-based human pursuit of hyperlinked context improving the Internet environment Internet challenging beliefs linked permission-free public reason as the path to social elements of stopping points unresolved Knowledge clubs Kuhn, Thomas Kundra, Vivek Kutcher, Ashton Lakhani, Karim Language games Latour, Bruno Leadership Debian network decision-making and Dickover’s social solutions network distribution Lebkowsky, Jon Leibniz, Gottfried Lessig, Lawrence Levy-Shoemaker comet Librarians Library of Congress Library use Lili’uokalani (Hawaiian queen) Linked Data standard Linked knowledge Links filters as See also Hyperlinks Linnean Society Linux Lipson, Hod Literacies Loganathan, G.V.


pages: 317 words: 98,745

Black Code: Inside the Battle for Cyberspace by Ronald J. Deibert

4chan, air gap, Any sufficiently advanced technology is indistinguishable from magic, Brian Krebs, call centre, citizen journalism, Citizen Lab, cloud computing, connected car, corporate social responsibility, crowdsourcing, cuban missile crisis, data acquisition, digital divide, disinformation, end-to-end encryption, escalation ladder, Evgeny Morozov, failed state, Firefox, Gabriella Coleman, global supply chain, global village, Google Hangouts, Hacker Ethic, Herman Kahn, informal economy, information security, invention of writing, Iridium satellite, jimmy wales, John Gilmore, John Markoff, Kibera, Kickstarter, knowledge economy, Lewis Mumford, low earth orbit, Marshall McLuhan, military-industrial complex, MITM: man-in-the-middle, mobile money, mutually assured destruction, Naomi Klein, new economy, Occupy movement, off-the-grid, Panopticon Jeremy Bentham, planetary scale, rent-seeking, Ronald Reagan, Ronald Reagan: Tear down this wall, Silicon Valley, Silicon Valley startup, Skype, smart grid, South China Sea, Steven Levy, Streisand effect, Stuxnet, Ted Kaczynski, the medium is the message, Turing test, Twitter Arab Spring, undersea cable, unit 8200, We are Anonymous. We are Legion, WikiLeaks, Yochai Benkler, zero day

A hacker was someone who did not accept technology at face value, and who experimented with technical systems, exploring their limits and possibilities: that is, a hacker opened up technical systems and explored their inner workings. This original positive idea of hacking is what I had in mind in setting out to create a research hothouse that would bring together computer and social scientists. Hacktivism by my definition is the combination of social and political activism with that original hacker ethic, and this captures the gist of what I was hoping for in founding the Citizen Lab. Oriented around a specific set of values that would inform our research, as I saw it (and still do) hacktivism has a lot in common with a philosophical tradition stretching back to the ecological holism of Harold Innis, the pragmatism and experimentalism of William James and John Dewey, and the yearning for a return to a polytechnic culture of the early Renaissance articulated by Lewis Mumford.

That is, “computer hacking” is used unquestioningly to describe anyone who breaks the law or causes a ruckus in cyberspace. The association of the term with criminality is not just a semantic issue; it represents a much larger delegitimization of the underlying philosophy of experimentation at the heart of the hacker ethic. And herein lies an enormously important paradox, one that sits at the heart of our technologically saturated world: we have created a communications environment that is utterly dependent on existing (and emerging) technologies, and yet, at the same time, we are actively discouraging experimentation with, and an understanding of, these technologies.


pages: 122 words: 38,022

Kill All Normies: Online Culture Wars From 4Chan and Tumblr to Trump and the Alt-Right by Angela Nagle

4chan, A Declaration of the Independence of Cyberspace, affirmative action, anti-communist, battle of ideas, Bernie Sanders, bitcoin, Black Lives Matter, capitalist realism, citizen journalism, crony capitalism, death of newspapers, DIY culture, Donald Trump, Evgeny Morozov, feminist movement, Gabriella Coleman, game design, Hacker Ethic, Herbert Marcuse, hive mind, John Perry Barlow, Julian Assange, Kickstarter, lolcat, mass immigration, moral panic, Nelson Mandela, Norman Mailer, Occupy movement, Oklahoma City bombing, open borders, Overton Window, post-industrial society, pre–internet, Ronald Reagan, sexual politics, Silicon Valley, Social Justice Warrior, Steve Bannon, The Wisdom of Crowds, WikiLeaks

In the US, one of the early cases of orchestrated attacks against such encroaching women was aimed at Kathy Sierra, a tech blogger and journalist. Sierra had been the keynote speaker at South by Southwest Interactive and her books were top sellers. The backlash against her was sparked when she supported a call to moderate reader comments, which at the time was seen as undermining the libertarian hacker ethic of absolute Internet freedom, although it has since become standard. Commenters on her blog began harassing and threatening her en mass, making the now routine rape and death threats received by women like Sierra. Personal details about her family and home address were posted online and hateful responses included photoshopped images of her with a noose beside her head, a shooting target pointed at her face and a creepy image of her being gagged with women’s underwear.


pages: 352 words: 120,202

Tools for Thought: The History and Future of Mind-Expanding Technology by Howard Rheingold

Ada Lovelace, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, Bletchley Park, card file, cellular automata, Charles Babbage, Claude Shannon: information theory, combinatorial explosion, Compatible Time-Sharing System, computer age, Computer Lib, Computing Machinery and Intelligence, conceptual framework, Conway's Game of Life, Douglas Engelbart, Dynabook, experimental subject, Hacker Ethic, heat death of the universe, Howard Rheingold, human-factors engineering, interchangeable parts, invention of movable type, invention of the printing press, Ivan Sutherland, Jacquard loom, John von Neumann, knowledge worker, machine readable, Marshall McLuhan, Menlo Park, Neil Armstrong, Norbert Wiener, packet switching, pattern recognition, popular electronics, post-industrial society, Project Xanadu, RAND corporation, Robert Metcalfe, Silicon Valley, speech recognition, Steve Jobs, Steve Wozniak, Stewart Brand, Ted Nelson, telemarketer, The Home Computer Revolution, Turing machine, Turing test, Vannevar Bush, Von Neumann architecture

"Phone-hacking" was another kind of prank pioneered by MAC hackers in the early 1960s that was to spawn anarchic variants in the 1970s. The self-taught mastery of complex technologies is the hallmark of the hacker's obsession, the conviction that all information (and information delivery technologies) ought to be free is a central tenet of the hacker ethical code, and the global telephone network is a complex technological system par excellence, a kind of ad hoc worldwide computer. The fact that a tone generator and a knowledge of switching circuits could provide access to long-distance lines, free of charge, led to a number of legendary phone hacks.

By separating the inference engine from the body of factual knowledge, it became possible to produce expert tools for expert-systems builders, thus bootstrapping the state of the art. While these exotic programs might seem to be distant from the mainstream of research into interactive computer systems, expert-systems research sprouted in the same laboratories that created time-sharing, chess playing programs, Spacewar, and the hacker ethic. DENDRAL had grown out of earlier work at MIT (MAC, actually) on programs for performing higher level mathematical functions like proving theorems. It became clear, with the success of DENDRAL and MYCIN, that these programs could be useful to people outside the realm of computer science. It also became clear that the kind of nontechnical questions that Weizenbaum and others had raised in regard to AI were going to be raised when this new subfield became more widely known.


pages: 889 words: 433,897

The Best of 2600: A Hacker Odyssey by Emmanuel Goldstein

affirmative action, Apple II, benefit corporation, call centre, disinformation, don't be evil, Firefox, game design, Hacker Ethic, hiring and firing, information retrieval, information security, John Markoff, John Perry Barlow, late fees, license plate recognition, Mitch Kapor, MITM: man-in-the-middle, Oklahoma City bombing, optical character recognition, OSI model, packet switching, pirate software, place-making, profit motive, QWERTY keyboard, RFID, Robert Hanssen: Double agent, rolodex, Ronald Reagan, satellite internet, Silicon Valley, Skype, spectrum auction, statistical model, Steve Jobs, Steve Wozniak, Steven Levy, Telecommunications Act of 1996, telemarketer, undersea cable, UUNET, Y2K

Yet there are, nonetheless, subtle distinctions of badness, which allow the audience to draw markedly different conclusions concerning the morality of each of the characters. So it is that in Masters we meet some teenagers, all of whom commit crimes (at least, in the legal sense), all of whom belong to an exclusive hacking group, yet each retaining an individual moral sense in both spirit and action of what the hacker ethic entails. It is in terms of these two realms— that of the individual and that of the group—that Masters attempts to deconstruct the 239 94192c08.qxd 6/3/08 3:32 PM Page 240 240 Chapter 8 story of MOD, sometimes stressing one over the other, sometimes integrating the two, but always implying that both are integral to understanding what has become the most notorious network saga since that of Robert Morris and the Internet worm.

Readers will remember Mitnick as the spiteful and vindictive teenager featured in Katie Hafner and John Markoff’s Cyberpunk: Computers and Outlaws on the Electronic Frontier. At the time of its release, Cyberpunk’s portrayal of Mitnick was thought to be biased, allegedly because Mitnick was the only hacker featured who refused to be interviewed. Biased or not, he was portrayed by the authors as a “Dark Side” hacker, and the antithesis of the hacker ethic. He was considered more evil than Pengo, a West Berlin hacker who sold his knowledge of American systems on the Internet to the Russians for cash. But Mitnick’s worse crime, by comparison, seemed only to be a lack of respect for anyone who was not up to his level of computer expertise, and few people were.

Earlier in the year, hackers belonging to the group Legions of the Underground (LoU) held an online press conference to announce a campaign to cripple the infrastructures of China and Iraq, supposedly because of human rights abuses. Led by Germany’s Chaos Computer Club, virtually every major hacker organization (2600 included) condemned this action as counterproductive, against the hacker ethic, and potentially very dangerous. Fortunately, this had an effect, and other members of LoU quickly stepped in and denied any destructive intent. 94192c08.qxd 6/3/08 3:32 PM Page 261 Pop Culture and the Hacker World This incident served to bring up some rather important issues. While hacking an occasional web page is one thing that can even be thought of as an expression of free speech, declarations of war and attempts to cause actual damage are very different indeed.


Producing Open Source Software: How to Run a Successful Free Software Project by Karl Fogel

active measures, AGPL, barriers to entry, Benjamin Mako Hill, collaborative editing, continuous integration, Contributor License Agreement, corporate governance, Debian, Donald Knuth, en.wikipedia.org, experimental subject, Firefox, Free Software Foundation, GnuPG, Hacker Ethic, Hacker News, intentional community, Internet Archive, iterative process, Kickstarter, natural language processing, off-by-one error, patent troll, peer-to-peer, pull request, revision control, Richard Stallman, selection bias, slashdot, software as a service, software patent, SpamAssassin, the Cathedral and the Bazaar, Wayback Machine, web application, zero-sum game

Conscious resistance As the world of unrestricted code swapping slowly faded away, a counterreaction crystallized in the mind of at least one programmer. Richard Stallman worked in the Artificial Intelligence Lab at the Massachusetts Institute of Technology in the 1970s and early '80s, during what turned out to be a golden age and a golden location for code sharing. The AI Lab had a strong "hacker ethic",[3] and people were not only encouraged but expected to share whatever improvements they made to the system. As Stallman wrote later: We did not call our software "free software", because that term did not yet exist; but that is what it was. Whenever people from another university or a company wanted to port and use a program, we gladly let them.

It formalized a dichotomy that had long been unnamed, and in doing so forced the movement to acknowledge that it had internal politics as well as external. The effect today is that both sides have had to find common ground, since most projects include programmers from both camps, as well as participants who don't fit any clear category. This doesn't mean people never talk about moral motivations—lapses in the traditional "hacker ethic" are sometimes called out, for example. But it is rare for a free software / open source developer to openly question the basic motivations of others in a project. The contribution trumps the contributor. If someone writes good code, you don't ask them whether they do it for moral reasons, or because their employer paid them to, or because they're building up their résumé, or whatever.


pages: 675 words: 141,667

Open Standards and the Digital Age: History, Ideology, and Networks (Cambridge Studies in the Emergence of Global Enterprise) by Andrew L. Russell

Aaron Swartz, American ideology, animal electricity, barriers to entry, borderless world, Californian Ideology, Charles Babbage, Chelsea Manning, Compatible Time-Sharing System, computer age, Computer Lib, creative destruction, digital divide, disruptive innovation, Donald Davies, Dr. Strangelove, Edward Snowden, Evgeny Morozov, Frederick Winslow Taylor, Hacker Ethic, Herbert Marcuse, Howard Rheingold, Hush-A-Phone, interchangeable parts, invisible hand, Ivan Sutherland, John Markoff, John Perry Barlow, Joseph Schumpeter, Leonard Kleinrock, Lewis Mumford, means of production, Menlo Park, Network effects, new economy, Norbert Wiener, open economy, OSI model, packet switching, pre–internet, radical decentralization, RAND corporation, RFC: Request For Comment, Richard Stallman, Ronald Coase, Ronald Reagan, scientific management, Silicon Valley, Steve Crocker, Steven Levy, Stewart Brand, systems thinking, technological determinism, technoutopianism, Ted Nelson, The Nature of the Firm, Thomas L Friedman, Thorstein Veblen, transaction costs, vertical integration, web of trust, work culture

Rather, the ideological origins of digital networks lie primarily in critiques that emerged within the center of American society through conflicts among technical professionals who sought to impose their visions of order and control. The ideals of openness fit equally as comfortably in the spirit of entrepreneurial capitalism as they do in the liberatory impulse of the hacker ethic: witness the prominence of the term “open” in the marketing campaigns of IBM, American Express, free software collectives, and advocates of transparency in government. All of these groups traffic in the discourse of openness, and all have legitimate claims for doing so.39 The rhetorical success of “openness” depends on its ability to capture widely shared values that privilege individual autonomy, reject coercion from industrial monopolists, promote private cooperation over state coercion, and celebrate the liberating and empowering potential of information and communication technologies.

Nye, “Shaping Communication Networks: Telegraph, Telephone, Computer,” Social Research 64 (1997): 1067–1091; Richard Barbrook and Andy Cameron, “The Californian Ideology,” Science as Culture 6 (1996): 44–72; Paulina Borsook, Cyberselfish: A Critical Romp through the Terribly Libertarian Culture of High Tech (New York: PublicAffairs, 2001); Pekka Himanen, The Hacker Ethic and the Spirit of the Information Age (New York: Random House, 2001); Fred Turner, From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism (Chicago: University of Chicago Press, 2006). Bibliography Manuscript Collections Alex McKenzie Collection of Computer Networking Development Records (CBI 123), Charles Babbage Institute, University of Minnesota, Minneapolis.


pages: 171 words: 54,334

Barefoot Into Cyberspace: Adventures in Search of Techno-Utopia by Becky Hogge, Damien Morris, Christopher Scally

"World Economic Forum" Davos, A Declaration of the Independence of Cyberspace, back-to-the-land, Berlin Wall, Buckminster Fuller, Chelsea Manning, citizen journalism, cloud computing, corporate social responsibility, disintermediation, DIY culture, Douglas Engelbart, Douglas Engelbart, Electric Kool-Aid Acid Test, Evgeny Morozov, Fall of the Berlin Wall, game design, Hacker Conference 1984, Hacker Ethic, Hans Moravec, informal economy, information asymmetry, Jacob Appelbaum, jimmy wales, John Gilmore, John Markoff, John Perry Barlow, Julian Assange, Kevin Kelly, mass immigration, Menlo Park, military-industrial complex, Mitch Kapor, MITM: man-in-the-middle, moral panic, Mother of all demos, Naomi Klein, Nelson Mandela, Network effects, New Journalism, Norbert Wiener, off-the-grid, peer-to-peer, Richard Stallman, Silicon Valley, Skype, Socratic dialogue, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, systems thinking, technoutopianism, Telecommunications Act of 1996, The Hackers Conference, Vannevar Bush, Whole Earth Catalog, Whole Earth Review, WikiLeaks

Rolling Stone, December 7. http://www.wheels.org/spacewar/stone/rolling_stone.html. ———. 1974. “History – Demise Party etc.” Whole Earth Catalog, October. http://wholeearth.com/issue/1180/article/321/history.-.demise.party.etc. ———. 1985. “Keep Designing: How the Information Economy is Being Created and Shaped by the Hacker Ethic.” Whole Earth Review, May. Brandeis, Louis. 1913. “What Publicity Can Do.” Harpers Weekly. Burns, John F. 2010. “WikiLeaks Founder on the Run, Trailed by Notoriety.” The New York Times, October 23. http://www.nytimes.com/2010/10/24/world/24assange.html. Bush, Vannevar. 1945. “As We May Think.”


pages: 236 words: 62,158

Marx at the Arcade: Consoles, Controllers, and Class Struggle by Jamie Woodcock

4chan, Alexey Pajitnov wrote Tetris, anti-work, antiwork, augmented reality, barriers to entry, battle of ideas, Boris Johnson, Build a better mousetrap, butterfly effect, call centre, capitalist realism, collective bargaining, Columbine, conceptual framework, cuban missile crisis, David Graeber, deindustrialization, deskilling, Donald Trump, emotional labour, game design, gamification, gentrification, gig economy, glass ceiling, global supply chain, global value chain, Hacker Ethic, Howard Zinn, Ian Bogost, independent contractor, Jeremy Corbyn, John Conway, Kickstarter, Landlord’s Game, late capitalism, Marshall McLuhan, means of production, microaggression, military-industrial complex, Minecraft, mutually assured destruction, Naomi Klein, Oculus Rift, pink-collar, planned obsolescence, scientific management, sexual politics, Silicon Valley, SimCity, Steve Bannon, systems thinking, tech worker, union organizing, unpaid internship, V2 rocket, WarGames: Global Thermonuclear War

This is a far departure from the guiding spirit behind the first multiplayer online games, then known as MUDs (multi-user dungeons). Creator Richard Bartle envisioned that multiplayer videogames start from the position that “everyone starts off on an equal footing in this artificial world.” Creating them was a “political gesture,” he explained: The original hacker ethic was, you can do what you like as long as you don’t hurt anyone else. That fed into games and it has propagated outwards. The more games you play the more sense you have of things like fairness—if you play an unfair game it’s no fun, it’s not a good game. I think that makes you more resistant to examples of unfairness in the real world.


pages: 568 words: 164,014

Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat by John P. Carlin, Garrett M. Graff

1960s counterculture, A Declaration of the Independence of Cyberspace, Aaron Swartz, air gap, Andy Carvin, Apple II, Bay Area Rapid Transit, bitcoin, Brian Krebs, business climate, cloud computing, cotton gin, cryptocurrency, data acquisition, Deng Xiaoping, disinformation, driverless car, drone strike, dual-use technology, eat what you kill, Edward Snowden, fake news, false flag, Francis Fukuyama: the end of history, Hacker Ethic, information security, Internet of things, James Dyson, Jeff Bezos, John Gilmore, John Markoff, John Perry Barlow, Ken Thompson, Kevin Roose, Laura Poitras, Mark Zuckerberg, Menlo Park, millennium bug, Minecraft, Mitch Kapor, moral hazard, Morris worm, multilevel marketing, Network effects, new economy, Oklahoma City bombing, out of africa, packet switching, peer-to-peer, peer-to-peer model, performance metric, RAND corporation, ransomware, Reflections on Trusting Trust, Richard Stallman, Robert Metcalfe, Ronald Reagan, Saturday Night Live, self-driving car, shareholder value, side project, Silicon Valley, Silicon Valley startup, Skype, Snapchat, South China Sea, Steve Crocker, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Stuxnet, The Hackers Conference, Tim Cook: Apple, trickle-down economics, Wargames Reagan, Whole Earth Catalog, Whole Earth Review, WikiLeaks, Y2K, zero day, zero-sum game

By comparison, MIT labeled devious computer- or phone-related endeavors as “cracking.” As Steven Levy wrote in his 1984 book Hackers, which began to popularize the term, computer programmers and designers were “adventurers, visionaries, risk-takers, artists, and the ones who most clearly saw why the computer was a truly revolutionary tool.”9 Levy described a “Hacker Ethic” that held that “essential lessons can be learned about the systems—about the world—from taking things apart, seeing how they work, and using this knowledge to create new and even more interesting things. They resent any person, physical barrier, or law that tries to keep them from doing this.”10 Success in the hacking world of the 1950s and 1960s came only through experimentation, and computing’s egalitarian culture believed that information should be free and decentralized—hoarding of time, data, or learning threatened the ability of the enterprise to advance.

Over eleven days, people gathered on a popular early online forum, known as the Whole Earth ’Lectronic Link, or the WELL, to debate the ethics and criminality of hacking. Was, in the words of Emmanuel Goldstein, the editor of 2600: The Hacker’s Quarterly, “electronic rummaging… the same as breaking and entering”?57* One famous hacker, known as Acid Phreak, declared in the debate, “There is no one hacker ethic. The hacker of old sought to find what the computer itself could do. There was nothing illegal about that. Today, hackers and phreaks are drawn to specific, often corporate systems. It’s no wonder the other side is getting mad. We’re always one step ahead.”58 The government continued to stumble its way through prosecutions and policy debates.


pages: 247 words: 71,698

Avogadro Corp by William Hertling

Any sufficiently advanced technology is indistinguishable from magic, cloud computing, crowdsourcing, Hacker Ethic, hive mind, invisible hand, messenger bag, natural language processing, Netflix Prize, off-the-grid, private military company, Ray Kurzweil, Recombinant DNA, recommendation engine, Richard Stallman, Ruby on Rails, standardized shipping container, tech worker, technological singularity, Turing test, web application, WikiLeaks

Though the football team would have loved James, James would rather be playing MMORPGs. They surely didn't fit in with the socialites, and their shallow interests. They weren't skaters or punks. They might have been labelled geeks, but the geeks rarely came in wearing military jackets or ditched school to smoke pot. They were too smart, and had too much of the hacker ethic to fit in with the stoners. No, they were just their own clique, and they made sure not to fit anyone else's stereotypes. Leon glanced over at Vito, who was fiddling with his ancient Motorola. Vito lavished care on the old phone. The case was worn smooth, thousands of hours of polishing from Vito's hands.


pages: 265 words: 69,310

What's Yours Is Mine: Against the Sharing Economy by Tom Slee

4chan, Airbnb, Amazon Mechanical Turk, asset-backed security, barriers to entry, Benchmark Capital, benefit corporation, Berlin Wall, big-box store, bike sharing, bitcoin, blockchain, Californian Ideology, citizen journalism, collaborative consumption, commons-based peer production, congestion charging, Credit Default Swap, crowdsourcing, data acquisition, data science, David Brooks, democratizing finance, do well by doing good, don't be evil, Dr. Strangelove, emotional labour, Evgeny Morozov, gentrification, gig economy, Hacker Ethic, impact investing, income inequality, independent contractor, informal economy, invisible hand, Jacob Appelbaum, Jane Jacobs, Jeff Bezos, John Zimmer (Lyft cofounder), Kevin Roose, Khan Academy, Kibera, Kickstarter, license plate recognition, Lyft, machine readable, Marc Andreessen, Mark Zuckerberg, Max Levchin, move fast and break things, natural language processing, Netflix Prize, Network effects, new economy, Occupy movement, openstreetmap, Paul Graham, peer-to-peer, peer-to-peer lending, Peter Thiel, pre–internet, principal–agent problem, profit motive, race to the bottom, Ray Kurzweil, recommendation engine, rent control, ride hailing / ride sharing, sharing economy, Silicon Valley, Snapchat, software is eating the world, South of Market, San Francisco, TaskRabbit, TED Talk, the Cathedral and the Bazaar, the long tail, The Nature of the Firm, Thomas L Friedman, transportation-network company, Travis Kalanick, Tyler Cowen, Uber and Lyft, Uber for X, uber lyft, ultimatum game, urban planning, WeWork, WikiLeaks, winner-take-all economy, Y Combinator, Yochai Benkler, Zipcar

Chapters 7 and 8 explore the origins of the Sharing Economy in Internet culture: the values and practices that permeate Silicon Valley companies and the wider world of technology enthusiasts, from open source programmers to Bitcoin advocates to the “maker movement” and beyond. Any short description will undoubtedly be an oversimplification, and of course there are disagreements and disputes among its adherents, but a coherent Internet culture does exist. It embraces values of rebellion, drawing from a loose set of attitudes sometimes called the hacker ethic. Facebook’s headquarters are at “One Hacker Way” and it has the word HACK laid out in 12-meter letters in the stone. The company’s mantra until last year was “move fast and break things,” and Mark Zuckerberg recently explained to potential investors: “Hackers believe that something can always be better, and that nothing is ever complete.


pages: 1,136 words: 73,489

Working in Public: The Making and Maintenance of Open Source Software by Nadia Eghbal

Amazon Web Services, Apollo 11, barriers to entry, Benevolent Dictator For Life (BDFL), Big Tech, bitcoin, Clayton Christensen, cloud computing, commoditize, commons-based peer production, context collapse, continuous integration, crowdsourcing, cryptocurrency, David Heinemeier Hansson, death of newspapers, Debian, disruptive innovation, Dunbar number, en.wikipedia.org, eternal september, Ethereum, Firefox, Free Software Foundation, Guido van Rossum, Hacker Ethic, Hacker News, Induced demand, informal economy, information security, Jane Jacobs, Jean Tirole, Kevin Kelly, Kickstarter, Kubernetes, leftpad, Mark Zuckerberg, Menlo Park, Neal Stephenson, Network effects, node package manager, Norbert Wiener, pirate software, pull request, RFC: Request For Comment, Richard Stallman, Ronald Coase, Ruby on Rails, side project, Silicon Valley, Snapchat, social graph, software as a service, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, tacit knowledge, the Cathedral and the Bazaar, The Death and Life of Great American Cities, The Nature of the Firm, TikTok, Tragedy of the Commons, transaction costs, two-sided market, urban planning, web application, wikimedia commons, Yochai Benkler, Zimmermann PGP

The term “hacker” was popularized by author Steven Levy, who memorably captured a portrait of the 1980s hacker generation in the book Hackers: Heroes of the Computer Revolution. In Hackers, Levy profiles a number of well-known programmers of the time, including Bill Gates, Steve Jobs, Steve Wozniak, and Richard Stallman. He suggests that hackers believe in sharing, openness, and decentralization, which he calls the “hacker ethic.”17 According to Levy’s portrait, hackers care about improving the world, but don’t believe in following the rules to get there. Hackers are characterized by bravado, showmanship, mischievousness, and a deep mistrust of authority. Hacker culture still lives on today, in the way that beatniks, hippies, and Marxists still exist, but hackers don’t capture the software cultural zeitgeist in the same way that they used to.


pages: 636 words: 202,284

Piracy : The Intellectual Property Wars from Gutenberg to Gates by Adrian Johns

active measures, Alan Greenspan, banking crisis, Berlin Wall, British Empire, Buckminster Fuller, business intelligence, Charles Babbage, commoditize, Computer Lib, Corn Laws, demand response, distributed generation, Douglas Engelbart, Douglas Engelbart, Edmond Halley, Ernest Rutherford, Fellow of the Royal Society, full employment, Hacker Ethic, Howard Rheingold, industrial research laboratory, informal economy, invention of the printing press, Isaac Newton, James Watt: steam engine, John Harrison: Longitude, Lewis Mumford, Marshall McLuhan, Mont Pelerin Society, new economy, New Journalism, Norbert Wiener, pirate software, radical decentralization, Republic of Letters, Richard Stallman, road to serfdom, Ronald Coase, software patent, South Sea Bubble, Steven Levy, Stewart Brand, tacit knowledge, Ted Nelson, The Home Computer Revolution, the scientific method, traveling salesman, vertical integration, Whole Earth Catalog

This caused considerable soul searching among proponents of online sociability. In the late 1980s and early 1990s repeated debates took place about the implications for digital communities, and about the responsibilities that digital expertise carried with it. They focused on what became the vexed question of the day: whether there was a hacker “ethic.” A direct adoption from Merton’s portrait of science, the contention that there was such an ethic took its rise from Levy’s Hackers, which was overtly premised on the idea. But the point of the exchanges that now ensued was to determine whether the norms of such an ethic – assuming it existed – were consequential.

Its immediate trigger was the panic over the first widely distributed worm but the exchange had time to develop broader themes, with participants arguing, changing their minds, and at length diverging irreconcilably. They included a number of veterans, Lee Felsenstein among them. Richard Stallman took part from MIT. Emmanuel Goldstein and two crackers going by the monikers Acid Phreak and Phiber Optik also contributed. The initial subject was the hacker ethic itself, which they variously construed, credited, and disdained. Most accepted that hacking was characterized by contempt for obstacles to technical progress. That was what lay behind its commitment to the free exchange of information, and hence its repudiation of intellectual property. Hackers appeared antiauthoritarian because they claimed the right and ability to “undam the pipes” and allow information to flow freely – a very Wienerian image.


The Code: Silicon Valley and the Remaking of America by Margaret O'Mara

A Declaration of the Independence of Cyberspace, accounting loophole / creative accounting, affirmative action, Airbnb, Alan Greenspan, AltaVista, Alvin Toffler, Amazon Web Services, An Inconvenient Truth, AOL-Time Warner, Apple II, Apple's 1984 Super Bowl advert, autonomous vehicles, back-to-the-land, barriers to entry, Ben Horowitz, Berlin Wall, Big Tech, Black Lives Matter, Bob Noyce, Buckminster Fuller, Burning Man, business climate, Byte Shop, California gold rush, Californian Ideology, carried interest, clean tech, clean water, cloud computing, cognitive dissonance, commoditize, company town, Compatible Time-Sharing System, computer age, Computer Lib, continuous integration, cuban missile crisis, Danny Hillis, DARPA: Urban Challenge, deindustrialization, different worldview, digital divide, Do you want to sell sugared water for the rest of your life?, don't be evil, Donald Trump, Doomsday Clock, Douglas Engelbart, driverless car, Dynabook, Edward Snowden, El Camino Real, Elon Musk, en.wikipedia.org, Erik Brynjolfsson, Fairchild Semiconductor, Frank Gehry, Future Shock, Gary Kildall, General Magic , George Gilder, gig economy, Googley, Hacker Ethic, Hacker News, high net worth, hockey-stick growth, Hush-A-Phone, immigration reform, income inequality, industrial research laboratory, informal economy, information retrieval, invention of movable type, invisible hand, Isaac Newton, It's morning again in America, Jeff Bezos, Joan Didion, job automation, job-hopping, John Gilmore, John Markoff, John Perry Barlow, Julian Assange, Kitchen Debate, knowledge economy, knowledge worker, Larry Ellison, Laura Poitras, Lyft, Marc Andreessen, Mark Zuckerberg, market bubble, Mary Meeker, mass immigration, means of production, mega-rich, Menlo Park, Mikhail Gorbachev, military-industrial complex, millennium bug, Mitch Kapor, Mother of all demos, move fast and break things, mutually assured destruction, Neil Armstrong, new economy, Norbert Wiener, old-boy network, Palm Treo, pattern recognition, Paul Graham, Paul Terrell, paypal mafia, Peter Thiel, pets.com, pirate software, popular electronics, pre–internet, prudent man rule, Ralph Nader, RAND corporation, Richard Florida, ride hailing / ride sharing, risk tolerance, Robert Metcalfe, ROLM, Ronald Reagan, Salesforce, Sand Hill Road, Second Machine Age, self-driving car, shareholder value, Sheryl Sandberg, side hustle, side project, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, skunkworks, Snapchat, social graph, software is eating the world, Solyndra, speech recognition, Steve Ballmer, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Strategic Defense Initiative, supercomputer in your pocket, Susan Wojcicki, tacit knowledge, tech billionaire, tech worker, technoutopianism, Ted Nelson, TED Talk, the Cathedral and the Bazaar, the market place, the new new thing, The Soul of a New Machine, There's no reason for any individual to have a computer in his home - Ken Olsen, Thomas L Friedman, Tim Cook: Apple, Timothy McVeigh, transcontinental railway, Twitter Arab Spring, Uber and Lyft, uber lyft, Unsafe at Any Speed, upwardly mobile, Vannevar Bush, War on Poverty, Wargames Reagan, WarGames: Global Thermonuclear War, We wanted flying cars, instead we got 140 characters, Whole Earth Catalog, WikiLeaks, William Shockley: the traitorous eight, work culture , Y Combinator, Y2K

One result was one of the most famous pieces of television advertising in history, the jaw-dropping spot broadcast into millions of American living rooms during the 1984 Super Bowl, when a lithe young woman ran through a droning audience, hurled a hammer at a Big Brother–like image projected on a blue screen, and shattered it.5 The barely veiled punch at IBM, Apple’s chief rival, reflected a broader anti-establishment streak in this techie rhetoric that went beyond marketing plans and ad slogans. “Mistrust Authority—Promote Decentralization,” read one plank of the “hacker ethic” journalist Steven Levy used in 1984 to describe the remarkable new subculture of hardware and software geeks who had helped make the computer personal. “Authority” meant Big Blue, big business, and big government. It was the perfect message for the times. After more than ten years of unrelentingly dismal business news—plant shutdowns, blue-collar jobs vanishing overseas, fumbling corporate leaders, and the pummeling of American brands by foreign competitors—high-tech companies presented a bright, promising contrast.

These entrepreneurs weren’t necessarily doing it in Silicon Valley, nor were they doing it in “the next Silicon Valley.” They were doing it everywhere, in places that had a different rhythm, were more affordable, more diverse in outlook and experience. These technologists were thinking about a different kind of hacker ethic. It was one that built software to last rather than asking programmers to give over their lives to constant tweaks and updates. It was an ethic that brought in people from beyond the charmed circles that had dominated tech for so long, and one that blended engineering with humanism. It was one that postponed building colonies on Mars until technologists first tackled inequalities here on earth.


pages: 264 words: 79,589

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen

Apple II, Brian Krebs, Burning Man, corporate governance, dumpster diving, Exxon Valdez, fake news, gentrification, Hacker Ethic, hive mind, index card, Kickstarter, McMansion, Mercator projection, offshore financial centre, packet switching, pirate software, Ponzi scheme, Robert Hanssen: Double agent, Saturday Night Live, Silicon Valley, SQL injection, Steve Jobs, Steve Wozniak, Steven Levy, traffic fines, web application, WikiLeaks, zero day, Zipcar

Every one of them would be at home, the agents knew; at the Secret Service’s behest, Gonzalez had called an online meeting for that evening, and nobody said no to Cumbajohnny. At nine p.m., agents armed with MP5 semiautomatic assault rifles burst into Shadowcrew members’ homes around the country, grabbing three founders, T-Mobile hacker Ethics, and seventeen other buyers and sellers. It was the biggest crackdown on identity thieves in American history. Two days later, a federal grand jury handed down a sixty-two-count conspiracy indictment and the Justice Department went public with Operation Firewall. “This indictment strikes at the heart of an organization that is alleged to have served as a one-stop marketplace for identity theft,” Attorney General John Ashcroft boasted in a press release.


pages: 270 words: 79,992

The End of Big: How the Internet Makes David the New Goliath by Nicco Mele

4chan, A Declaration of the Independence of Cyberspace, Airbnb, Amazon Web Services, Andy Carvin, Any sufficiently advanced technology is indistinguishable from magic, Apple's 1984 Super Bowl advert, barriers to entry, Berlin Wall, big-box store, bitcoin, bread and circuses, business climate, call centre, Cass Sunstein, centralized clearinghouse, Chelsea Manning, citizen journalism, cloud computing, collaborative consumption, collaborative editing, commoditize, Computer Lib, creative destruction, crony capitalism, cross-subsidies, crowdsourcing, David Brooks, death of newspapers, disruptive innovation, Donald Trump, Douglas Engelbart, Douglas Engelbart, en.wikipedia.org, Evgeny Morozov, Exxon Valdez, Fall of the Berlin Wall, Filter Bubble, Firefox, global supply chain, Google Chrome, Gordon Gekko, Hacker Ethic, Ian Bogost, Jaron Lanier, Jeff Bezos, jimmy wales, John Markoff, John Perry Barlow, Julian Assange, Kevin Kelly, Khan Academy, Kickstarter, Lean Startup, lolcat, machine readable, Mark Zuckerberg, military-industrial complex, minimum viable product, Mitch Kapor, Mohammed Bouazizi, Mother of all demos, Narrative Science, new economy, Occupy movement, off-the-grid, old-boy network, One Laptop per Child (OLPC), peer-to-peer, period drama, Peter Thiel, pirate software, public intellectual, publication bias, Robert Metcalfe, Ronald Reagan, Ronald Reagan: Tear down this wall, satellite internet, Seymour Hersh, sharing economy, Silicon Valley, Skype, social web, Steve Jobs, Steve Wozniak, Stewart Brand, Stuxnet, Ted Nelson, Ted Sorensen, Telecommunications Act of 1996, telemarketer, the Cathedral and the Bazaar, the long tail, The Wisdom of Crowds, transaction costs, uranium enrichment, Whole Earth Catalog, WikiLeaks, Zipcar

Home-Brewed for the People Inspired by Ted Nelson and others, a generation of nerds emerged from the late 1960s and 70s determined to disrupt the march of the institutional computer and bring the personal computer “to every desk in America,” as Bill Gates famously put it. Brand described this generation as embodying a “hacker ethic”: “Most of our generation scorned computers as the embodiment of centralized control. But a tiny contingent—later called ‘hackers’—embraced computers and set about transforming them into tools of liberation.”12 This contingent went to work in their parents’ garages and in their dorm rooms and eventually brought behemoths like Apple and Microsoft into existence.


pages: 361 words: 81,068

The Internet Is Not the Answer by Andrew Keen

"World Economic Forum" Davos, 3D printing, A Declaration of the Independence of Cyberspace, Airbnb, AltaVista, Andrew Keen, AOL-Time Warner, augmented reality, Bay Area Rapid Transit, Berlin Wall, Big Tech, bitcoin, Black Swan, Bob Geldof, Boston Dynamics, Burning Man, Cass Sunstein, Charles Babbage, citizen journalism, Clayton Christensen, clean water, cloud computing, collective bargaining, Colonization of Mars, computer age, connected car, creative destruction, cuban missile crisis, data science, David Brooks, decentralized internet, DeepMind, digital capitalism, disintermediation, disruptive innovation, Donald Davies, Downton Abbey, Dr. Strangelove, driverless car, Edward Snowden, Elon Musk, Erik Brynjolfsson, fail fast, Fall of the Berlin Wall, Filter Bubble, Francis Fukuyama: the end of history, Frank Gehry, Frederick Winslow Taylor, frictionless, fulfillment center, full employment, future of work, gentrification, gig economy, global village, Google bus, Google Glasses, Hacker Ethic, happiness index / gross national happiness, holacracy, income inequality, index card, informal economy, information trail, Innovator's Dilemma, Internet of things, Isaac Newton, Jaron Lanier, Jeff Bezos, job automation, John Perry Barlow, Joi Ito, Joseph Schumpeter, Julian Assange, Kevin Kelly, Kevin Roose, Kickstarter, Kiva Systems, Kodak vs Instagram, Lean Startup, libertarian paternalism, lifelogging, Lyft, Marc Andreessen, Mark Zuckerberg, Marshall McLuhan, Martin Wolf, Mary Meeker, Metcalfe’s law, military-industrial complex, move fast and break things, Nate Silver, Neil Armstrong, Nelson Mandela, Network effects, new economy, Nicholas Carr, nonsequential writing, Norbert Wiener, Norman Mailer, Occupy movement, packet switching, PageRank, Panopticon Jeremy Bentham, Patri Friedman, Paul Graham, peer-to-peer, peer-to-peer rental, Peter Thiel, plutocrats, Potemkin village, power law, precariat, pre–internet, printed gun, Project Xanadu, RAND corporation, Ray Kurzweil, reality distortion field, ride hailing / ride sharing, Robert Metcalfe, Robert Solow, San Francisco homelessness, scientific management, Second Machine Age, self-driving car, sharing economy, Sheryl Sandberg, Silicon Valley, Silicon Valley billionaire, Silicon Valley ideology, Skype, smart cities, Snapchat, social web, South of Market, San Francisco, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, subscription business, TaskRabbit, tech bro, tech worker, TechCrunch disrupt, Ted Nelson, telemarketer, The future is already here, The Future of Employment, the long tail, the medium is the message, the new new thing, Thomas L Friedman, Travis Kalanick, Twitter Arab Spring, Tyler Cowen, Tyler Cowen: Great Stagnation, Uber for X, uber lyft, urban planning, Vannevar Bush, warehouse robotics, Whole Earth Catalog, WikiLeaks, winner-take-all economy, work culture , working poor, Y Combinator

As critics like Tim Wu have argued, the answer lies in our new digital elite becoming accountable for the most traumatic socioeconomic disruption since the industrial revolution. Rather than thinking differently, the ethic of this new elite should be to think traditionally. Rather than seceding to Burning Man or Mars, this plutocracy must be beamed back down to earth. “Move fast and break things” was the old hacker ethic; “you break it, you own it” should be the new one. Rather than an Internet Bill of Rights, what we really need is an informal Bill of Responsibilities that establishes a new social contract for every member of networked society. Silicon Valley has fetishized the ideals of collaboration and conversation.


pages: 245 words: 83,272

Artificial Unintelligence: How Computers Misunderstand the World by Meredith Broussard

"Susan Fowler" uber, 1960s counterculture, A Declaration of the Independence of Cyberspace, Ada Lovelace, AI winter, Airbnb, algorithmic bias, AlphaGo, Amazon Web Services, autonomous vehicles, availability heuristic, barriers to entry, Bernie Sanders, Big Tech, bitcoin, Buckminster Fuller, Charles Babbage, Chris Urmson, Clayton Christensen, cloud computing, cognitive bias, complexity theory, computer vision, Computing Machinery and Intelligence, crowdsourcing, Danny Hillis, DARPA: Urban Challenge, data science, deep learning, Dennis Ritchie, digital map, disruptive innovation, Donald Trump, Douglas Engelbart, driverless car, easy for humans, difficult for computers, Electric Kool-Aid Acid Test, Elon Musk, fake news, Firefox, gamification, gig economy, global supply chain, Google Glasses, Google X / Alphabet X, Greyball, Hacker Ethic, independent contractor, Jaron Lanier, Jeff Bezos, Jeremy Corbyn, John Perry Barlow, John von Neumann, Joi Ito, Joseph-Marie Jacquard, life extension, Lyft, machine translation, Mark Zuckerberg, mass incarceration, Minecraft, minimum viable product, Mother of all demos, move fast and break things, Nate Silver, natural language processing, Northpointe / Correctional Offender Management Profiling for Alternative Sanctions, One Laptop per Child (OLPC), opioid epidemic / opioid crisis, PageRank, Paradox of Choice, payday loans, paypal mafia, performance metric, Peter Thiel, price discrimination, Ray Kurzweil, ride hailing / ride sharing, Ross Ulbricht, Saturday Night Live, school choice, self-driving car, Silicon Valley, Silicon Valley billionaire, speech recognition, statistical model, Steve Jobs, Steven Levy, Stewart Brand, TechCrunch disrupt, Tesla Model S, the High Line, The Signal and the Noise by Nate Silver, theory of mind, traumatic brain injury, Travis Kalanick, trolley problem, Turing test, Uber for X, uber lyft, Watson beat the top human players on Jeopardy!, We are as Gods, Whole Earth Catalog, women in the workforce, work culture , yottabyte

They could get things done in three days that would take a month. If somebody appeared who had the talent, the magic touch, they would fit in.” The TMRC and Minsky’s lab were later immortalized in Stewart Brand’s The Media Lab and Steven Levy’s Hackers: The Heroes of the Computer Revolution, in addition to many other publications.6 The hacker ethic is also what inspired Mark Zuckerberg’s first Facebook motto: “Move fast and break things.” Minsky was part of Zuckerberg’s curriculum at Harvard. Minsky and a collaborator, John McCarthy, organized the very first conference on artificial intelligence, at the Dartmouth Math Department in 1956.


pages: 534 words: 92,957

Digital Photography Hacks by Derrick Story

Hacker Ethic, index card, Steve Jobs, two and twenty

Among people who write code, though, the term hack refers to a "quick-and-dirty" solution to a problem, or a clever way to get something done. And the term hacker is taken as a compliment, referring to someone being creative and having the technical chops to get things done. The Hacks series is an attempt to reclaim the word, document the good ways people are hacking, and pass the hacker ethic of creative participation on to the uninitiated. Seeing how others approach systems and problems is often the quickest way to learn a new technology. This collection of hacks reflects the real-world experience of photographers who are steeped in photographic history and expertise. They share their no-nonsense and, sometimes, quick-and-dirty solutions to "getting the shot."


pages: 322 words: 99,066

The End of Secrecy: The Rise and Fall of WikiLeaks by The "Guardian", David Leigh, Luke Harding

"World Economic Forum" Davos, 4chan, air gap, banking crisis, centre right, Chelsea Manning, citizen journalism, Climategate, cloud computing, credit crunch, crowdsourcing, Downton Abbey, drone strike, end-to-end encryption, eurozone crisis, Evgeny Morozov, friendly fire, global village, Hacker Ethic, impulse control, Jacob Appelbaum, Julian Assange, knowledge economy, machine readable, military-industrial complex, Mohammed Bouazizi, Nelson Mandela, offshore financial centre, operational security, post-work, rolodex, Seymour Hersh, Silicon Valley, Skype, Steven Levy, sugar pill, uranium enrichment, WikiLeaks

“It’s about understanding the environment in which we operate, taking it apart, and then expanding upon it and recreating it. Central to it is the idea that information should be free, combined with a deep distrust of authority.” House points to a book, Hackers: Heroes of the Computer Revolution, by Steven Levy, which chronicles the rise of the “hacker ethic” at MIT. “Hackers believe that essential lessons can be learned about … the world from taking things apart, seeing how they work, and using this knowledge to create new and even more interesting things,” Levy writes. “They resent any person, physical barrier, or law that tries to keep them from doing this.


pages: 696 words: 111,976

SQL Hacks by Andrew Cumming, Gordon Russell

Apollo 13, bioinformatics, book value, business intelligence, business logic, business process, database schema, en.wikipedia.org, Erdős number, Firefox, full text search, Hacker Conference 1984, Hacker Ethic, leftpad, Paul Erdős, SQL injection, Stewart Brand, web application

Among people who write code, though, the term hack refers to a "quick-and-dirty" solution to a problem, or a clever way to get something done. And the term hacker is taken very much as a compliment, referring to someone as being creative, having the technical chops to get things done. The Hacks series is an attempt to reclaim the word, document the good ways people are hacking, and pass the hacker ethic of creative participation on to the uninitiated. Seeing how others approach systems and problems is often the quickest way to learn about a new technology. This book is a collection of 100 different hacks. Each hack involves a specific problem that you may have already seen before, but perhaps tackled in a way you wouldn't have considered.


pages: 465 words: 109,653

Free Ride by Robert Levine

A Declaration of the Independence of Cyberspace, Anne Wojcicki, book scanning, borderless world, Buckminster Fuller, citizen journalism, commoditize, company town, correlation does not imply causation, creative destruction, crowdsourcing, death of newspapers, Edward Lloyd's coffeehouse, Electric Kool-Aid Acid Test, Firefox, future of journalism, Googley, Hacker Ethic, informal economy, Jaron Lanier, John Gilmore, John Perry Barlow, Joi Ito, Julian Assange, Justin.tv, Kevin Kelly, linear programming, Marc Andreessen, Mitch Kapor, moral panic, offshore financial centre, pets.com, publish or perish, race to the bottom, Saturday Night Live, Silicon Valley, Silicon Valley startup, Skype, spectrum auction, Steve Jobs, Steven Levy, Stewart Brand, subscription business, Telecommunications Act of 1996, the long tail, Whole Earth Catalog, WikiLeaks

In the Google model, there is one distributor of movies, which also owns all the theaters.”13 Many academics believe otherwise. In April 2010, when Apple introduced the iPad, the New America Foundation fellow Tim Wu—who coined the term “net neutrality”—wrote in Slate that Steve Jobs’s hostility to the hacker ethic made Apple “a self-professed revolutionary that is closely allied with establishment forces like the entertainment conglomerates and the telecommunications industry.”14 (The real rebels work for Google!) Around the same time, Wu participated in the New America Foundation panel called “Why Your Cell Phone Is So Terrible,” and the explanation had a lot to do with closed systems.15 In his 2010 book, The Master Switch: The Rise and Fall of Information Empires, Wu shows how AT&T used its monopoly over the U.S. telephone system to prevent innovation until a 1968 FCC decision held that consumers could connect devices made by other companies, including modems and fax machines.


pages: 335 words: 107,779

Some Remarks by Neal Stephenson

airport security, augmented reality, barriers to entry, Bletchley Park, British Empire, cable laying ship, call centre, cellular automata, edge city, Eratosthenes, Fellow of the Royal Society, Hacker Ethic, high-speed rail, impulse control, Iridium satellite, Isaac Newton, Jaron Lanier, John von Neumann, Just-in-time delivery, Kevin Kelly, Kim Stanley Robinson, megaproject, music of the spheres, Neal Stephenson, Neil Armstrong, Norbert Wiener, offshore financial centre, oil shock, packet switching, pirate software, Richard Feynman, Saturday Night Live, shareholder value, Shenzhen special economic zone , Silicon Valley, Skype, slashdot, Snow Crash, social web, Socratic dialogue, South China Sea, SpaceShipOne, special economic zone, Stephen Hawking, the scientific method, trade route, Turing machine, undersea cable, uranium enrichment, Vernor Vinge, X Prize

I said, thinking all the warm and fuzzy thoughts that we think about networks. “Yes,” they said, “this is the term used by the Red Guards during the Cultural Revolution for the network of spies and informers that they spread across every village and neighborhood to snare enemies of the regime.” GOING TO CHINA AND ASKING PEOPLE ABOUT THE HACKER ETHIC IS LIKE going to Peoria and talking to the folks down at Ned’s Feed & Grain about Taoism. The hacking part comes to them easily enough—China is, in a sense, a nation of analog hackers quickly entering the digital realm. But I didn’t see any urge to draw profound, cosmic conclusions from the act of messing around with technology.


The Fugitive Game: Online With Kevin Mitnick by Jonathan Littman

Apple's 1984 Super Bowl advert, centre right, computer age, disinformation, game design, Hacker Ethic, Howard Rheingold, information security, John Markoff, John Perry Barlow, Kevin Kelly, Menlo Park, Michael Milken, Mitch Kapor, power law, profit motive, Silicon Valley, Steven Levy, telemarketer

Shimomura's computer screen as the suspect wrote a message ... complaining that I had put his picture on the front page of The New York Times. ... I too became emmeshed in the digital manhunt for the nation's most wanted computer outlaw. Mr. Shimomura . .. [has] an uncanny ability to solve complex technical programs in the manner of Star Trek's Vulcan Mr. Spock. He seems to embody the very essence of the original hacker ethic — writing programs to create something elegant, not for gain.... Mr. Mitnick is not a hacker in the original sense of the word. Mr. Shimomura is. And when their worlds collided, it was obvious which one of them had to win. But outside the New York Times, the public spin on the capture of Kevin Mitnick is beginning to shift.


A People’s History of Computing in the United States by Joy Lisi Rankin

activist fund / activist shareholder / activist investor, Albert Einstein, Apple II, Bill Gates: Altair 8800, Charles Babbage, Compatible Time-Sharing System, computer age, Computer Lib, corporate social responsibility, digital divide, Douglas Engelbart, Douglas Engelbart, Grace Hopper, Hacker Ethic, Howard Rheingold, Howard Zinn, it's over 9,000, Jeff Bezos, John Markoff, John von Neumann, language acquisition, Mark Zuckerberg, Menlo Park, military-industrial complex, Mother of all demos, Multics, Network effects, Norbert Wiener, pink-collar, profit motive, public intellectual, punch-card reader, RAND corporation, Silicon Valley, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Ted Nelson, the market place, urban planning, Whole Earth Catalog, wikimedia commons

National Council of Teachers of Mathe­matics, Computer Facilities for Mathe­m atics Instruction (Washington, DC: National Council of Teachers of Mathe­matics, 1967); National Council of Teachers of Mathe­matics, Introduction to an Algorithmic Language (BASIC) (Washington, DC: National Council of Teachers of Mathe­matics, 1968). 101. National Council of Teachers of Mathe­matics, Computer Facilities for Mathe­matics Instruction, abstract. 102. Levy employs the language of evangelization in Hackers: Heroes of the Computer Revolution, such as Albrecht “spreading the gospel of the Hacker Ethic” (166), Albrecht as a “prophet of BASIC” (167), and “the mission of spreading computing to the ­people” (170). 103. Bob Albrecht, My Computer Likes Me When I Speak in BASIC (Menlo Park, CA: Dymax, 1972). 104. Ibid., 1. 105. Paul Sabin, The Bet: Paul Ehrlich, Julian Simon, and Our ­Gamble over Earth’s ­Future (New Haven, CT: Yale University Press, 2013). 106.


pages: 480 words: 123,979

Dawn of the New Everything: Encounters With Reality and Virtual Reality by Jaron Lanier

4chan, air gap, augmented reality, back-to-the-land, Big Tech, Bill Atkinson, Buckminster Fuller, Burning Man, carbon footprint, cloud computing, collaborative editing, commoditize, Computer Lib, cosmological constant, creative destruction, crowdsourcing, deep learning, Donald Trump, Douglas Engelbart, Douglas Hofstadter, El Camino Real, Elon Musk, fake news, Firefox, game design, general-purpose programming language, gig economy, Google Glasses, Grace Hopper, Gödel, Escher, Bach, Hacker Ethic, Hans Moravec, Howard Rheingold, hype cycle, impulse control, information asymmetry, intentional community, invisible hand, Ivan Sutherland, Jaron Lanier, John Gilmore, John Perry Barlow, John von Neumann, Kevin Kelly, Kickstarter, Kuiper Belt, lifelogging, mandelbrot fractal, Mark Zuckerberg, Marshall McLuhan, Menlo Park, military-industrial complex, Minecraft, Mitch Kapor, Mondo 2000, Mother of all demos, Murray Gell-Mann, Neal Stephenson, Netflix Prize, Network effects, new economy, Nick Bostrom, Norbert Wiener, Oculus Rift, pattern recognition, Paul Erdős, peak TV, Plato's cave, profit motive, Project Xanadu, quantum cryptography, Ray Kurzweil, reality distortion field, recommendation engine, Richard Feynman, Richard Stallman, Ronald Reagan, self-driving car, Silicon Valley, Silicon Valley startup, Skinner box, Skype, Snapchat, stem cell, Stephen Hawking, Steve Bannon, Steve Jobs, Steven Levy, Stewart Brand, systems thinking, technoutopianism, Ted Nelson, telemarketer, telepresence, telepresence robot, Thorstein Veblen, Turing test, Vernor Vinge, Whole Earth Catalog, Whole Earth Review, WikiLeaks, wikimedia commons

The diners that day would go on to found companies like Pixar and Sun. Moondust was a hit with this crew, and they started pestering me. “How’d you do it? There are pixels changing all over the screen at once.” “Oh, I’m using a compressed lookup table through these shifting masks…” “Wait! Don’t tell them how you’re doing it!” “I thought the hacker ethic was all about sharing code.” “Well, yeah, if it helps bring down the big, bad old power. But this is your personal stuff.” “I don’t know what to do.” “Well, anyway, you’re one of us now.” One of us said with that emphatic, grunting rhythm from the movie Freaks. Code Culture Our world wasn’t made for us, yet.


pages: 413 words: 119,587

Machines of Loving Grace: The Quest for Common Ground Between Humans and Robots by John Markoff

A Declaration of the Independence of Cyberspace, AI winter, airport security, Andy Rubin, Apollo 11, Apple II, artificial general intelligence, Asilomar, augmented reality, autonomous vehicles, backpropagation, basic income, Baxter: Rethink Robotics, Bill Atkinson, Bill Duvall, bioinformatics, Boston Dynamics, Brewster Kahle, Burning Man, call centre, cellular automata, Charles Babbage, Chris Urmson, Claude Shannon: information theory, Clayton Christensen, clean water, cloud computing, cognitive load, collective bargaining, computer age, Computer Lib, computer vision, crowdsourcing, Danny Hillis, DARPA: Urban Challenge, data acquisition, Dean Kamen, deep learning, DeepMind, deskilling, Do you want to sell sugared water for the rest of your life?, don't be evil, Douglas Engelbart, Douglas Engelbart, Douglas Hofstadter, Dr. Strangelove, driverless car, dual-use technology, Dynabook, Edward Snowden, Elon Musk, Erik Brynjolfsson, Evgeny Morozov, factory automation, Fairchild Semiconductor, Fillmore Auditorium, San Francisco, From Mathematics to the Technologies of Life and Death, future of work, Galaxy Zoo, General Magic , Geoffrey Hinton, Google Glasses, Google X / Alphabet X, Grace Hopper, Gunnar Myrdal, Gödel, Escher, Bach, Hacker Ethic, Hans Moravec, haute couture, Herbert Marcuse, hive mind, hype cycle, hypertext link, indoor plumbing, industrial robot, information retrieval, Internet Archive, Internet of things, invention of the wheel, Ivan Sutherland, Jacques de Vaucanson, Jaron Lanier, Jeff Bezos, Jeff Hawkins, job automation, John Conway, John Markoff, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, John Perry Barlow, John von Neumann, Kaizen: continuous improvement, Kevin Kelly, Kiva Systems, knowledge worker, Kodak vs Instagram, labor-force participation, loose coupling, Marc Andreessen, Mark Zuckerberg, Marshall McLuhan, medical residency, Menlo Park, military-industrial complex, Mitch Kapor, Mother of all demos, natural language processing, Neil Armstrong, new economy, Norbert Wiener, PageRank, PalmPilot, pattern recognition, Philippa Foot, pre–internet, RAND corporation, Ray Kurzweil, reality distortion field, Recombinant DNA, Richard Stallman, Robert Gordon, Robert Solow, Rodney Brooks, Sand Hill Road, Second Machine Age, self-driving car, semantic web, Seymour Hersh, shareholder value, side project, Silicon Valley, Silicon Valley startup, Singularitarianism, skunkworks, Skype, social software, speech recognition, stealth mode startup, Stephen Hawking, Steve Ballmer, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Strategic Defense Initiative, strong AI, superintelligent machines, tech worker, technological singularity, Ted Nelson, TED Talk, telemarketer, telepresence, telepresence robot, Tenerife airport disaster, The Coming Technological Singularity, the medium is the message, Thorstein Veblen, Tony Fadell, trolley problem, Turing test, Vannevar Bush, Vernor Vinge, warehouse automation, warehouse robotics, Watson beat the top human players on Jeopardy!, We are as Gods, Whole Earth Catalog, William Shockley: the traitorous eight, zero-sum game

A number of the “six graduate students” were connected with the MIT Model Railway Club, an unorthodox group of future engineers drawn to computing as if by a magnet. Their club ethos would lead directly to what became the “hacker culture,” which held as its most prized value the free sharing of information.19 McCarthy would help spread the hacker ethic when he left MIT in 1962 and set up a rival laboratory at Stanford University. Ultimately the original hacker culture would also foment social movements such as free/open-source software, Creative Commons, and Network Neutrality movements. While still at MIT, McCarthy, in his quest for a more efficient way to conduct artificial intelligence research, had invented computer time-sharing, as well as the Lisp programming language.


pages: 755 words: 121,290

Statistics hacks by Bruce Frey

Bayesian statistics, Berlin Wall, correlation coefficient, Daniel Kahneman / Amos Tversky, distributed generation, en.wikipedia.org, feminist movement, G4S, game design, Hacker Ethic, index card, Linda problem, Milgram experiment, Monty Hall problem, p-value, place-making, reshoring, RFID, Search for Extraterrestrial Intelligence, SETI@home, Silicon Valley, statistical model, sugar pill, systematic bias, Thomas Bayes

Among people who write code, though, the term hack refers to a "quick-and-dirty" solution to a problem or a clever way to get something done. And the term hacker is taken very much as a compliment, referring to someone as being creative, having the technical chops to get things done. The Hacks series is an attempt to reclaim the word, document the good ways people are hacking, and pass the hacker ethic of creative participation on to the uninitiated. Seeing how others approach systems and problems is often the quickest way to learn about a new technology. The technologies at the heart of this book are statistics, measurement, and research design. Computer technology has developed hand-in-hand with these technologies, so the use of the term hacks to describe what is done in this book is consistent with almost every perspective on that word.


pages: 480 words: 119,407

Invisible Women by Caroline Criado Perez

"Hurricane Katrina" Superdome, Affordable Care Act / Obamacare, algorithmic bias, augmented reality, Bernie Sanders, Cambridge Analytica, collective bargaining, crowdsourcing, data science, Diane Coyle, Donald Trump, falling living standards, first-past-the-post, gender pay gap, gig economy, glass ceiling, Grace Hopper, Hacker Ethic, independent contractor, Indoor air pollution, informal economy, lifelogging, low skilled workers, mental accounting, meta-analysis, Nate Silver, new economy, obamacare, Oculus Rift, offshore financial centre, pattern recognition, phenotype, post-industrial society, randomized controlled trial, remote working, Sheryl Sandberg, Silicon Valley, Simon Kuznets, speech recognition, stem cell, Stephen Hawking, Steven Levy, tech bro, the built environment, urban planning, women in the workforce, work culture , zero-sum game

This is bad enough when it comes to human-on-human recruitment, but with the rise of algorithm-driven recruiting the problem is set to get worse, because there is every reason to suspect that this bias is being unwittingly hardwired into the very code to which we’re outsourcing our decision-making. In 1984 American tech journalist Steven Levy published his bestselling book Hackers: Heroes of the Computer Revolution. Levy’s heroes were all brilliant. They were all single-minded. They were all men. They also didn’t get laid much. ‘You would hack, and you would live by the Hacker Ethic, and you knew that horribly inefficient and wasteful things like women burned too many cycles, occupied too much memory space,’ Levy explained. ‘Women, even today, are considered grossly unpredictable,’ one of his heroes told him. ‘How can a [default male] hacker tolerate such an imperfect being?’


pages: 400 words: 121,988

Trading at the Speed of Light: How Ultrafast Algorithms Are Transforming Financial Markets by Donald MacKenzie

algorithmic trading, automated trading system, banking crisis, barriers to entry, bitcoin, blockchain, Bonfire of the Vanities, Bretton Woods, Cambridge Analytica, centralized clearinghouse, Claude Shannon: information theory, coronavirus, COVID-19, cryptocurrency, disintermediation, diversification, en.wikipedia.org, Ethereum, ethereum blockchain, family office, financial intermediation, fixed income, Flash crash, Google Earth, Hacker Ethic, Hibernia Atlantic: Project Express, interest rate derivative, interest rate swap, inventory management, Jim Simons, level 1 cache, light touch regulation, linked data, lockdown, low earth orbit, machine readable, market design, market microstructure, Martin Wolf, proprietary trading, Renaissance Technologies, Satoshi Nakamoto, Small Order Execution System, Spread Networks laid a new fibre optics cable between New York and Chicago, statistical arbitrage, statistical model, Steven Levy, The Great Moderation, transaction costs, UUNET, zero-sum game

What mattered to hackers was the respect of their programming peers, which came not from extraneous matters such as formal credentials or wealth, but from being known for having written programs of that kind, programs with “the fewest lines [of code],” put together “so artfully that the author’s peers would look at it and almost melt with awe” (Levy 1984: 30–31). Money-making commercial enterprise that it was, Island (and especially Josh Levine) nevertheless exemplified, at least to a degree, what Matt Andresen referred to in an interview with me as the “hacker ethos” (the term used in Levy 1984 is the “hacker ethic”)—including the aesthetic preference for thoughtfully succinct, efficient code.18 What is most striking about the system that Levine designed for Island is that its efficiency and speed were far greater than required for the immediate practical purpose of allowing “bandit” traders to trade directly with each other.


pages: 742 words: 137,937

The Future of the Professions: How Technology Will Transform the Work of Human Experts by Richard Susskind, Daniel Susskind

23andMe, 3D printing, Abraham Maslow, additive manufacturing, AI winter, Albert Einstein, Amazon Mechanical Turk, Amazon Robotics, Amazon Web Services, Andrew Keen, Atul Gawande, Automated Insights, autonomous vehicles, Big bang: deregulation of the City of London, big data - Walmart - Pop Tarts, Bill Joy: nanobots, Blue Ocean Strategy, business process, business process outsourcing, Cass Sunstein, Checklist Manifesto, Clapham omnibus, Clayton Christensen, clean water, cloud computing, commoditize, computer age, Computer Numeric Control, computer vision, Computing Machinery and Intelligence, conceptual framework, corporate governance, creative destruction, crowdsourcing, Daniel Kahneman / Amos Tversky, data science, death of newspapers, disintermediation, Douglas Hofstadter, driverless car, en.wikipedia.org, Erik Brynjolfsson, Evgeny Morozov, Filter Bubble, full employment, future of work, Garrett Hardin, Google Glasses, Google X / Alphabet X, Hacker Ethic, industrial robot, informal economy, information retrieval, interchangeable parts, Internet of things, Isaac Newton, James Hargreaves, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, Joseph Schumpeter, Khan Academy, knowledge economy, Large Hadron Collider, lifelogging, lump of labour, machine translation, Marshall McLuhan, Metcalfe’s law, Narrative Science, natural language processing, Network effects, Nick Bostrom, optical character recognition, Paul Samuelson, personalized medicine, planned obsolescence, pre–internet, Ray Kurzweil, Richard Feynman, Second Machine Age, self-driving car, semantic web, Shoshana Zuboff, Skype, social web, speech recognition, spinning jenny, strong AI, supply-chain management, Susan Wojcicki, tacit knowledge, TED Talk, telepresence, The Future of Employment, the market place, The Wealth of Nations by Adam Smith, The Wisdom of Crowds, Tragedy of the Commons, transaction costs, Turing test, Two Sigma, warehouse robotics, Watson beat the top human players on Jeopardy!, WikiLeaks, world market for maybe five computers, Yochai Benkler, young professional

.: MIT Press, 2011). Higgs, Eric, Andrew Light, and David Strong (eds.), Technology and the Good Life (Chicago: University of Chicago Press, 2000). Hildebrandt, Mireille, and Antoinette Rouvroy, Law, Human Agency and Autonomic Computing, paperback edn. (London: Routledge, 2013). Himanen, Pekka, The Hacker Ethic and the Spirit of the Information Age (London: Secker & Warburg, 2001). Hirschman, Albert, The Rhetoric of Reaction (Cambridge, Mass.: Harvard University Press, 1991). HM Revenue and Customs, ‘Making Tax Easier’, Mar. 2015, <https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/413975/making-tax-easier.pdf> (accessed 14 March 2015).


pages: 494 words: 142,285

The Future of Ideas: The Fate of the Commons in a Connected World by Lawrence Lessig

AltaVista, Andy Kessler, AOL-Time Warner, barriers to entry, Bill Atkinson, business process, Cass Sunstein, commoditize, computer age, creative destruction, dark matter, decentralized internet, Dennis Ritchie, disintermediation, disruptive innovation, Donald Davies, Erik Brynjolfsson, Free Software Foundation, Garrett Hardin, George Gilder, Hacker Ethic, Hedy Lamarr / George Antheil, history of Unix, Howard Rheingold, Hush-A-Phone, HyperCard, hypertext link, Innovator's Dilemma, invention of hypertext, inventory management, invisible hand, Jean Tirole, Jeff Bezos, John Gilmore, John Perry Barlow, Joseph Schumpeter, Ken Thompson, Kenneth Arrow, Larry Wall, Leonard Kleinrock, linked data, Marc Andreessen, Menlo Park, Mitch Kapor, Network effects, new economy, OSI model, packet switching, peer-to-peer, peer-to-peer model, price mechanism, profit maximization, RAND corporation, rent control, rent-seeking, RFC: Request For Comment, Richard Stallman, Richard Thaler, Robert Bork, Ronald Coase, Search for Extraterrestrial Intelligence, SETI@home, Silicon Valley, smart grid, software patent, spectrum auction, Steve Crocker, Steven Levy, Stewart Brand, systematic bias, Ted Nelson, Telecommunications Act of 1996, the Cathedral and the Bazaar, The Chicago School, tragedy of the anticommons, Tragedy of the Commons, transaction costs, vertical integration, Yochai Benkler, zero-sum game

., 9, 34-36, 67-68; Stallman, 53-66; Mark Leon, “Richard Stallman, GNU/Linux,” InfoWorld (October 9, 2000): 62. 13 See, e.g., Linus Torvalds and David Diamond, Just for Fun: The Story of an Accidental Revolutionary (New York: HarperBusiness, 2001); Pekka Himanen, Manuel Castells (epilogue), and Linus Torvalds (prologue), The Hacker Ethic and the Spirit of the Information Age (New York: Random House, 2001); Paula Rooney, “No. 11: The Dark Horse,” Computer Reseller News, November 15, 1999. 14 Stallman: “Around 1992, combining Linux with the not-quite-complete GNU system resulted in a complete free operating system. (Combining them was a substantial job in itself, of course.)


Howard Rheingold by The Virtual Community Homesteading on the Electronic Frontier-Perseus Books (1993)

"hyperreality Baudrillard"~20 OR "Baudrillard hyperreality", Alvin Toffler, Apple II, bread and circuses, Brewster Kahle, Buckminster Fuller, commoditize, conceptual framework, disinformation, Do you want to sell sugared water for the rest of your life?, Douglas Engelbart, Douglas Engelbart, Electric Kool-Aid Acid Test, experimental subject, General Magic , George Gilder, global village, Gregor Mendel, Hacker Ethic, Haight Ashbury, Howard Rheingold, HyperCard, intentional community, Ivan Sutherland, John Gilmore, John Markoff, Kevin Kelly, knowledge worker, license plate recognition, loose coupling, Marshall McLuhan, megaproject, Menlo Park, meta-analysis, Mitch Kapor, Morris worm, multilevel marketing, packet switching, Panopticon Jeremy Bentham, profit motive, RAND corporation, Ray Oldenburg, rent control, RFC: Request For Comment, Ronald Reagan, Saturday Night Live, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, technoutopianism, Ted Nelson, telepresence, The Great Good Place, The Hackers Conference, the strength of weak ties, urban decay, UUNET, Whole Earth Catalog, Whole Earth Review, young professional

When the Net upgrades its own software, the Net is used to 26-04-2012 21:43 howard rheingold's | the virtual community 36 de 43 http://www.rheingold.com/vc/book/3.html distribute the upgrade. IRC, the program that connects Internet users into worldwide real-time chat "channels," started out as an experiment by a programmer in Finland. Multi-User Dungeons originated at a University in England. Among the original hackers at MIT, the ones who helped invent time-sharing, the hacker ethic was that computer tools ought to be free. The first personal-computer makers were outraged when William Gates, now the richest man in America, started selling BASIC, which PC hobbyists had always passed around for free. The software industry exists now and Microsoft is bigger than General Motors, but the Net continues to grow because of intellectual property that skilled programmers have given to the Net community.


pages: 573 words: 142,376

Whole Earth: The Many Lives of Stewart Brand by John Markoff

A Pattern Language, air freight, Anthropocene, Apple II, back-to-the-land, Benoit Mandelbrot, Bernie Madoff, Beryl Markham, Big Tech, Bill Atkinson, Biosphere 2, Brewster Kahle, Buckminster Fuller, Burning Man, butterfly effect, Claude Shannon: information theory, cloud computing, complexity theory, computer age, Computer Lib, computer vision, Danny Hillis, decarbonisation, demographic transition, disinformation, Douglas Engelbart, Douglas Engelbart, Dynabook, El Camino Real, Electric Kool-Aid Acid Test, en.wikipedia.org, experimental subject, feminist movement, Fillmore Auditorium, San Francisco, Filter Bubble, game design, gentrification, global village, Golden Gate Park, Hacker Conference 1984, Hacker Ethic, Haight Ashbury, Herman Kahn, housing crisis, Howard Rheingold, HyperCard, intentional community, Internet Archive, Internet of things, Jane Jacobs, Jaron Lanier, Jeff Bezos, John Gilmore, John Markoff, John Perry Barlow, Kevin Kelly, Kickstarter, knowledge worker, Lao Tzu, Lewis Mumford, Loma Prieta earthquake, Marshall McLuhan, megacity, Menlo Park, Michael Shellenberger, microdosing, Mitch Kapor, Morris worm, Mother of all demos, move fast and break things, New Urbanism, Norbert Wiener, Norman Mailer, North Sea oil, off grid, off-the-grid, paypal mafia, Peter Calthorpe, Ponzi scheme, profit motive, public intellectual, Ralph Nader, RAND corporation, Ray Kurzweil, Richard Stallman, Sand Hill Road, self-driving car, shareholder value, Silicon Valley, South of Market, San Francisco, speech recognition, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, systems thinking, technoutopianism, Ted Nelson, Ted Nordhaus, TED Talk, The Death and Life of Great American Cities, The Hackers Conference, Thorstein Veblen, traveling salesman, Turing test, upwardly mobile, Vernor Vinge, We are as Gods, Whole Earth Catalog, Whole Earth Review, young professional

* * * Shortly after he arrived in Sausalito, Kevin Kelly read Steven Levy’s Hackers: Heroes of the Computer Revolution, a book that portrayed three generations of “white hat” computer hackers (the good guys) ranging from the young programmers at MIT’s AI Lab decades earlier, through the Homebrew Computer Club, to the then new world of video game design. (The term hacker had only recently entered the national lexicon. It had been just a year since the movie WarGames had introduced the American public to the notion of network-accessible computers and bright young computer wizards.) Levy identified what he described as “the hacker ethic,” epitomized by the MIT students who, beginning in the 1950s, had “hacked” projects for the simple joy of designing computers and software as an end in itself. According to Levy, this ethic was a set of ideals premised on access to computers; free access to all information; distrust of authority; meritocracy; the belief that computers could create art and beauty; and the faith that computing could improve your life.[24] Kelly went to Brand and said, “You know, the funny thing about this is, as far as I can tell, none of these guys have ever met each other, these three generations of hackers.


pages: 629 words: 142,393

The Future of the Internet: And How to Stop It by Jonathan Zittrain

A Declaration of the Independence of Cyberspace, algorithmic bias, Amazon Mechanical Turk, Andy Kessler, barriers to entry, behavioural economics, book scanning, Brewster Kahle, Burning Man, c2.com, call centre, Cass Sunstein, citizen journalism, Citizen Lab, Clayton Christensen, clean water, commoditize, commons-based peer production, corporate governance, Daniel Kahneman / Amos Tversky, digital divide, disruptive innovation, distributed generation, en.wikipedia.org, end-to-end encryption, Firefox, folksonomy, Free Software Foundation, game design, Hacker Ethic, Howard Rheingold, Hush-A-Phone, illegal immigration, index card, informal economy, information security, Internet Archive, jimmy wales, John Markoff, John Perry Barlow, license plate recognition, loose coupling, mail merge, Morris worm, national security letter, old-boy network, One Laptop per Child (OLPC), OSI model, packet switching, peer-to-peer, post-materialism, pre–internet, price discrimination, profit maximization, radical decentralization, Ralph Nader, RFC: Request For Comment, RFID, Richard Stallman, Richard Thaler, risk tolerance, Robert Bork, Robert X Cringely, SETI@home, Silicon Valley, Skype, slashdot, software patent, Steve Ballmer, Steve Jobs, Ted Nelson, Telecommunications Act of 1996, the Cathedral and the Bazaar, the long tail, The Nature of the Firm, The Wisdom of Crowds, Tragedy of the Commons, web application, wikimedia commons, Yochai Benkler, zero-sum game

Matt Blaze, Cryptography Policy and the Information Economy, WindowSecurity.com, Apr. 5, 2000, available athttp://windowsecuritycom/whitepapers/cryptography_Policy _and_the_Information_Economy.html. 40. Increases in computer crime have received attention from the hacker community. See Harmon, supra note 31; see also PEKKA HIMANEN & LINUS TORVALDS, THE HACKER ETHIC (2001); BRUCE STERLING, THE HACKER CRACKDOWN: LAW AND DISORDER ON THE ELECTRONIC FRONTIER (2002), available at http://www.mit.edu/hacker/hacker.html; cf. Note, Immunizing the Internet, Or: How I Learned to Stop Worrying and Love the Worm, 119 HARV. L. REV. 2442 (2006) (introducing the idea of “beneficial cybercrime,” which values system attacks for their tendency to draw attention to vulnerabilities in computer networks). 41.


pages: 565 words: 151,129

The Zero Marginal Cost Society: The Internet of Things, the Collaborative Commons, and the Eclipse of Capitalism by Jeremy Rifkin

3D printing, active measures, additive manufacturing, Airbnb, autonomous vehicles, back-to-the-land, benefit corporation, big-box store, bike sharing, bioinformatics, bitcoin, business logic, business process, Chris Urmson, circular economy, clean tech, clean water, cloud computing, collaborative consumption, collaborative economy, commons-based peer production, Community Supported Agriculture, Computer Numeric Control, computer vision, crowdsourcing, demographic transition, distributed generation, DIY culture, driverless car, Eben Moglen, electricity market, en.wikipedia.org, Frederick Winslow Taylor, Free Software Foundation, Garrett Hardin, general purpose technology, global supply chain, global village, Hacker Conference 1984, Hacker Ethic, industrial robot, informal economy, information security, Intergovernmental Panel on Climate Change (IPCC), intermodal, Internet of things, invisible hand, Isaac Newton, James Watt: steam engine, job automation, John Elkington, John Markoff, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, Julian Assange, Kickstarter, knowledge worker, longitudinal study, low interest rates, machine translation, Mahatma Gandhi, manufacturing employment, Mark Zuckerberg, market design, mass immigration, means of production, meta-analysis, Michael Milken, mirror neurons, natural language processing, new economy, New Urbanism, nuclear winter, Occupy movement, off grid, off-the-grid, oil shale / tar sands, pattern recognition, peer-to-peer, peer-to-peer lending, personalized medicine, phenotype, planetary scale, price discrimination, profit motive, QR code, RAND corporation, randomized controlled trial, Ray Kurzweil, rewilding, RFID, Richard Stallman, risk/return, Robert Solow, Rochdale Principles, Ronald Coase, scientific management, search inside the book, self-driving car, shareholder value, sharing economy, Silicon Valley, Skype, smart cities, smart grid, smart meter, social web, software as a service, spectrum auction, Steve Jobs, Stewart Brand, the built environment, the Cathedral and the Bazaar, the long tail, The Nature of the Firm, The Structural Transformation of the Public Sphere, The Wealth of Nations by Adam Smith, The Wisdom of Crowds, Thomas Kuhn: the structure of scientific revolutions, Thomas L Friedman, too big to fail, Tragedy of the Commons, transaction costs, urban planning, vertical integration, warehouse automation, Watson beat the top human players on Jeopardy!, web application, Whole Earth Catalog, Whole Earth Review, WikiLeaks, working poor, Yochai Benkler, zero-sum game, Zipcar

“Manitoba’s Kor Ecologic Debuts Hybrid Urbee,” Canadian Manufacturing, November 2, 2012, http://www.canadianmanufacturing.com/designengineering/news/manitobas-kor-ecologic -debuts-hybrid-urbee-11992 (accessed November 1, 2013). 31. Stewart Brand and Matt Herron, “Keep Designing—How the Information Economy Is Being Created and Shaped by the Hacker Ethic,” Whole Earth Review (May, 1985): 44. 32. Deborah Desrochers-Jacques, “Green Energy Use Jumps in Germany,” Der Spiegel, August 30, 2011, http://www.spiegel.de/international/crossing-the-20-percent-mark-green-energy-use -jumps-in-germany-a-783314.html (accessed August 7, 2013); Berlin and Niebull, “Germany’s Energy Transformation: Eneriewende,” Economist, July 28, 2012, http://www.economist.com /node/21559667 (accessed October 1, 2013). 33.


pages: 532 words: 141,574

Bleeding Edge: A Novel by Thomas Pynchon

addicted to oil, AltaVista, anti-communist, Anton Chekhov, Bernie Madoff, big-box store, Burning Man, carried interest, deal flow, Donald Trump, double entry bookkeeping, East Village, eternal september, false flag, fixed-gear, gentrification, Hacker Ethic, index card, invisible hand, jitney, Larry Ellison, late capitalism, margin call, messenger bag, Network effects, Ponzi scheme, prediction markets, pre–internet, QWERTY keyboard, RAND corporation, rent control, rolodex, Ronald Reagan, Sand Hill Road, Silicon Valley, telemarketer, Y2K

“Only the framing material,” Lucas demurely, “obvious influences, Neo-Tokyo from Akira, Ghost in the Shell, Metal Gear Solid by Hideo Kojima, or as he’s known around my crib, God.” “The further in you go, as you get passed along one node to the next, the visuals you think you’re seeing are being contributed by users all over the world. All for free. Hacker ethic. Each one doing their piece of it, then just vanishing uncredited. Adding to the veils of illusion. You know what an avatar is, right?” “Sure, had a prescription once, but they always made me a little, I don’t know, nauseous?” “In virtual reality,” Lucas begins to explain, “it’s a 3-D image you use to represent yourself—” “Yeah, actually, gamers in the house forever, but somebody told me also that in the Hindu religion avatar means an incarnation.


pages: 467 words: 149,632

If Then: How Simulmatics Corporation Invented the Future by Jill Lepore

A Declaration of the Independence of Cyberspace, Alvin Toffler, anti-communist, Apollo 11, Buckminster Fuller, Cambridge Analytica, company town, computer age, coronavirus, cuban missile crisis, data science, desegregation, don't be evil, Donald Trump, Dr. Strangelove, Elon Musk, fake news, game design, George Gilder, Grace Hopper, Hacker Ethic, Howard Zinn, index card, information retrieval, Jaron Lanier, Jeff Bezos, Jeffrey Epstein, job automation, John Perry Barlow, land reform, linear programming, Mahatma Gandhi, Marc Andreessen, Mark Zuckerberg, mass incarceration, Maui Hawaii, Menlo Park, military-industrial complex, New Journalism, New Urbanism, Norbert Wiener, Norman Mailer, packet switching, Peter Thiel, profit motive, punch-card reader, RAND corporation, Robert Bork, Ronald Reagan, Rosa Parks, self-driving car, Silicon Valley, SimCity, smart cities, social distancing, South China Sea, Stewart Brand, technoutopianism, Ted Sorensen, Telecommunications Act of 1996, urban renewal, War on Poverty, white flight, Whole Earth Catalog

In Silicon Valley, nearly all of the leaders of companies selling snake oil were men, the great-grandsons of the scientists of Simulmatics, but they believed themselves to be orphans, parentless, fatherless, sui generis self-made geniuses.11 They made no room in their world for women, or family, or knowledge other than the calculations of computers. Places like MIT’s corporate-funded Media Lab cultivated a “hacker ethic,” which meant, in many quarters, no ethics at all. In 2016, the director of the Media Lab accepted $1.7 million from convicted felon Jeffrey Epstein, after he’d registered as a sex offender and pleaded guilty to procuring an underage girl for sex (Epstein helped the lab pull in another $7.5 million from other donors), and announced a “Disobedience Award” to celebrate “responsible, ethical disobedience,” making of heedless audacity a fetish.12 MIT’s Media Lab served as a convenient scapegoat, a distraction from a broader ethical aimlessness not only in Silicon Valley but on college campuses.


pages: 542 words: 161,731

Alone Together by Sherry Turkle

Albert Einstein, Columbine, Computing Machinery and Intelligence, fake news, Future Shock, global village, Hacker Ethic, helicopter parent, Howard Rheingold, industrial robot, information retrieval, Jacques de Vaucanson, Jaron Lanier, Joan Didion, John Markoff, Kevin Kelly, lifelogging, Loebner Prize, Marshall McLuhan, meta-analysis, mirror neurons, Nicholas Carr, Norbert Wiener, off-the-grid, Panopticon Jeremy Bentham, Paradox of Choice, Ralph Waldo Emerson, Rodney Brooks, Skype, social intelligence, stem cell, technological determinism, technoutopianism, The Great Good Place, the medium is the message, the strength of weak ties, theory of mind, Turing test, Vannevar Bush, Wall-E, warehouse robotics, women in the workforce, Year of Magical Thinking

Using the computer, hackers would play tricks on each other—these were the “hacks”—but they never played tricks on people outside the group, who could not defend themselves. (A classic hack might be to make a computer seem to crash, only to have it revive when a hacker in the know touched it with a particular keystroke.) If a young hacker did not play by these rules, senior hackers would step in and make things right. Joel mourns the passing of the hacker ethic. In today’s virtual worlds, he says, “there is more mischief.” Clever people who don’t feel a commitment to the community are in a position to do real damage. On Second Life, through Rashi, Joel has become an enforcer of “old-school” hacker standards. His elephant is there to keep people in line.


pages: 935 words: 197,338

The Power Law: Venture Capital and the Making of the New Future by Sebastian Mallaby

"Susan Fowler" uber, 23andMe, 90 percent rule, Adam Neumann (WeWork), adjacent possible, Airbnb, Apple II, barriers to entry, Ben Horowitz, Benchmark Capital, Big Tech, bike sharing, Black Lives Matter, Blitzscaling, Bob Noyce, book value, business process, charter city, Chuck Templeton: OpenTable:, Clayton Christensen, clean tech, cloud computing, cognitive bias, collapse of Lehman Brothers, Colonization of Mars, computer vision, coronavirus, corporate governance, COVID-19, cryptocurrency, deal flow, Didi Chuxing, digital map, discounted cash flows, disruptive innovation, Donald Trump, Douglas Engelbart, driverless car, Dutch auction, Dynabook, Elon Musk, Fairchild Semiconductor, fake news, family office, financial engineering, future of work, game design, George Gilder, Greyball, guns versus butter model, Hacker Ethic, Henry Singleton, hiring and firing, Hyperloop, income inequality, industrial cluster, intangible asset, iterative process, Jeff Bezos, John Markoff, junk bonds, Kickstarter, knowledge economy, lateral thinking, liberal capitalism, Louis Pasteur, low interest rates, Lyft, Marc Andreessen, Mark Zuckerberg, market bubble, Marshall McLuhan, Mary Meeker, Masayoshi Son, Max Levchin, Metcalfe’s law, Michael Milken, microdosing, military-industrial complex, Mitch Kapor, mortgage debt, move fast and break things, Network effects, oil shock, PalmPilot, pattern recognition, Paul Graham, paypal mafia, Peter Thiel, plant based meat, plutocrats, power law, pre–internet, price mechanism, price stability, proprietary trading, prudent man rule, quantitative easing, radical decentralization, Recombinant DNA, remote working, ride hailing / ride sharing, risk tolerance, risk/return, Robert Metcalfe, ROLM, rolodex, Ronald Coase, Salesforce, Sam Altman, Sand Hill Road, self-driving car, shareholder value, side project, Silicon Valley, Silicon Valley startup, Skype, smart grid, SoftBank, software is eating the world, sovereign wealth fund, Startup school, Steve Jobs, Steve Wozniak, Steven Levy, super pumped, superconnector, survivorship bias, tech worker, Teledyne, the long tail, the new new thing, the strength of weak ties, TikTok, Travis Kalanick, two and twenty, Uber and Lyft, Uber for X, uber lyft, urban decay, UUNET, vertical integration, Vilfredo Pareto, Vision Fund, wealth creators, WeWork, William Shockley: the traitorous eight, Y Combinator, Zenefits

You can still see traces of this counterculture in the Valley: in the sandals, even if next-gen nylon has displaced frayed leather; in the left-liberal, sometimes libertarian politics; in the conviction that your productivity can be augmented by micro-dosing LSD. But the trouble with the cultural explanation for West Coast exceptionalism is that the rest of the world has never been as buttoned up as the Valley’s boosters imagine. The hacker ethic, championed by communalist nerds who obsessed over code and declined on principle to monetize it, actually originated at MIT—with the Tech Model Railroad Club, a group of MIT undergrads enthralled by the technology behind model trains before their attention was diverted to the TX-0 computer.[6] (The TX-0 was so captivating that the authorities at MIT considered getting rid of it.


pages: 843 words: 223,858

The Rise of the Network Society by Manuel Castells

air traffic controllers' union, Alan Greenspan, Apple II, Asian financial crisis, barriers to entry, Big bang: deregulation of the City of London, Bob Noyce, borderless world, British Empire, business cycle, capital controls, classic study, complexity theory, computer age, Computer Lib, computerized trading, content marketing, creative destruction, Credit Default Swap, declining real wages, deindustrialization, delayed gratification, dematerialisation, deskilling, digital capitalism, digital divide, disintermediation, double helix, Douglas Engelbart, Douglas Engelbart, edge city, experimental subject, export processing zone, Fairchild Semiconductor, financial deregulation, financial independence, floating exchange rates, future of work, gentrification, global village, Gunnar Myrdal, Hacker Ethic, hiring and firing, Howard Rheingold, illegal immigration, income inequality, independent contractor, Induced demand, industrial robot, informal economy, information retrieval, intermodal, invention of the steam engine, invention of the telephone, inventory management, Ivan Sutherland, James Watt: steam engine, job automation, job-hopping, John Markoff, John Perry Barlow, Kanban, knowledge economy, knowledge worker, labor-force participation, laissez-faire capitalism, Leonard Kleinrock, longitudinal study, low skilled workers, manufacturing employment, Marc Andreessen, Marshall McLuhan, means of production, megacity, Menlo Park, military-industrial complex, moral panic, new economy, New Urbanism, offshore financial centre, oil shock, open economy, packet switching, Pearl River Delta, peer-to-peer, planetary scale, popular capitalism, popular electronics, post-Fordism, post-industrial society, Post-Keynesian economics, postindustrial economy, prediction markets, Productivity paradox, profit maximization, purchasing power parity, RAND corporation, Recombinant DNA, Robert Gordon, Robert Metcalfe, Robert Solow, seminal paper, Shenzhen special economic zone , Shoshana Zuboff, Silicon Valley, Silicon Valley startup, social software, South China Sea, South of Market, San Francisco, special economic zone, spinning jenny, statistical model, Steve Jobs, Steve Wozniak, Strategic Defense Initiative, tacit knowledge, technological determinism, Ted Nelson, the built environment, the medium is the message, the new new thing, The Wealth of Nations by Adam Smith, Thomas Kuhn: the structure of scientific revolutions, total factor productivity, trade liberalization, transaction costs, urban renewal, urban sprawl, vertical integration, work culture , zero-sum game

Hill, Christopher (ed.) (1996) The Actors in Europe’s Foreign Policy, London: Routledge. Hiltz, Starr Roxanne and Turoff, Murray (1993) The Network Nation: Human Communication via Computer, Cambridge, MA: MIT Press. Hiltzik, Michael (1999) Dealers of Lightning: Xerox Parc and the Dawn of the Computer Age, New York: Harper. Himannen, Pekka (2001) The Hackers’ Ethic and the Spirit of Informationalism, New Haven: Yale University Press, forthcoming. Hinrichs, Karl, Roche, William and Sirianni, Carmen (eds) (1991) The Political Economy of Working Hours in Industrial Nations, Philadelphia, PA: Temple University Press. Hirschhorn, Larry (1984) Beyond Mechanization: Work and Technology in a Postindustrial Age, Cambridge, MA: MIT Press. —— (1985) “Information technology and the new services game”, in Manuel Castells (ed.), High Technology, Space and Society, Beverly Hills, CA: Sage, pp. 172–90.


pages: 915 words: 232,883

Steve Jobs by Walter Isaacson

"World Economic Forum" Davos, air freight, Albert Einstein, Andy Rubin, AOL-Time Warner, Apollo 13, Apple II, Apple's 1984 Super Bowl advert, big-box store, Bill Atkinson, Bob Noyce, Buckminster Fuller, Byte Shop, centre right, Clayton Christensen, cloud computing, commoditize, computer age, computer vision, corporate governance, death of newspapers, Do you want to sell sugared water for the rest of your life?, don't be evil, Douglas Engelbart, Dynabook, El Camino Real, Electric Kool-Aid Acid Test, Fairchild Semiconductor, Fillmore Auditorium, San Francisco, fixed income, game design, General Magic , Golden Gate Park, Hacker Ethic, hiring and firing, It's morning again in America, Jeff Bezos, Johannes Kepler, John Markoff, Jony Ive, Kanban, Larry Ellison, lateral thinking, Lewis Mumford, Mark Zuckerberg, Menlo Park, Mitch Kapor, Mother of all demos, Paul Terrell, Pepsi Challenge, profit maximization, publish or perish, reality distortion field, Recombinant DNA, Richard Feynman, Robert Metcalfe, Robert X Cringely, Ronald Reagan, Silicon Valley, skunkworks, Steve Ballmer, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, supply-chain management, The Home Computer Revolution, thinkpad, Tim Cook: Apple, Tony Fadell, vertical integration, Wall-E, Whole Earth Catalog

Woz was usually too shy to talk in the meetings, but people would gather around his machine afterward, and he would proudly show off his progress. Moore had tried to instill in the Homebrew an ethos of swapping and sharing rather than commerce. “The theme of the club,” Woz said, “was ‘Give to help others.’” It was an expression of the hacker ethic that information should be free and all authority mistrusted. “I designed the Apple I because I wanted to give it away for free to other people,” said Wozniak. This was not an outlook that Bill Gates embraced. After he and Paul Allen had completed their BASIC interpreter for the Altair, Gates was appalled that members of the Homebrew were making copies of it and sharing it without paying him.