<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN">
<html>
<head>
<!-- Meta http equivalent was here -->
<link rel="stylesheet" type="text/css" href="../hackers.css">
<link rel="next" href="chapter9.html">
<link rel="contents" href="../toc.html">
<title>Revolt in 2100</title>
</head>
<body>
<h3>Part Two</h3>
<h1>Hardware Hackers</h1>
<h3>Northern California:</h3>
<h2>The Seventies</h2>
<h1>8</h1>
<h2>Revolt in 2100</h2>
<p>
THE first public terminal of the Community Memory project was an ugly
machine in a cluttered foyer on the second floor of a beat-up building
in the spaciest town in the United States of America: Berkeley,
California. It was inevitable that computers would come to "the
people" in Berkeley. Everything else did, from gourmet food to local
government. And if, in August 1973, computers were generally regarded
as inhuman, unyielding, warmongering, and nonorganic, the imposition
of a terminal connected to one of those Orwellian monsters in a
normally good-vibes zone like the foyer outside Leopold's Records on
Durant Avenue was not necessarily a threat to anyone's well-being. It
was yet another kind of flow to go with.
<p>
Outrageous, in a sense. Sort of a squashed piano, the height of a
Fender Rhodes, with a typewriter keyboard instead of a musical one.
The keyboard was protected by a cardboard box casing, with a plate
of glass set in its front. To touch the keys, you had to stick your
hands through little holes, as if you were offering yourself for
imprisonment in an electronic stockade. But the people standing by
the terminal were familiar Berkeley types, with long stringy hair,
jeans, T-shirts, and a demented gleam in their eyes that you would
mistake for a drug reaction if you did not know them well. Those
who did know them well realized that the group was high on
technology. They were getting off like they had never gotten off
before, dealing the hacker dream as if it were the most potent
strain of sinsemilla in the Bay Area.
<p>
The name of the group was Community Memory, and according to a handout
they distributed, the terminal was "a communication system which
allows people to make contact with each other on the basis of mutually
expressed interests, without having to cede judgement to third
parties." The idea was to speed the flow of information in a
decentralized, non-bureaucratic system. An idea born from computers,
an idea executable only by computers, in this case a time-shared
XDS-940 mainframe machine in the basement of a warehouse in San
Francisco. By opening a hands-on computer facility to let people
reach each other, a living metaphor would be created, a testament to
the way computer technology could be used as guerrilla warfare for
people <i>against</i> bureaucracies.
<p>
Ironically, the second-floor public area outside Leopold's, the
hippest record store in the East Bay, was also the home of the
musicians' bulletin board, a wall completely plastered with notices
of vegetarian singers looking for gigs, jug bands seeking Dobro
players, flutists into Jethro Tull seeking songwriters with similar
fixations. The old style of matchmaking. Community Memory
encouraged the new. You could place your notice in the computer and
wait to be instantly and precisely accessed by the person who needed
it most. <a name="noted14"></a>But it did not take Berkeley-ites
long to find other uses for the terminal:
<pre>
FIND 1984, YOU SAY
HEH, HEH, HEH ... JUST STICK AROUND ANOTHER TEN YEARS
LISTEN TO ALVIN LEE
PART YOUR HAIR DIFFERENT
DROP ASPIRIN
MAKE A JOINT EFFORT
DRIFT AWAY
KEEP A CLEAN NOSE
HOME {ON THE RANGE}
QUIT KICKING YORE HEARTS SEE ME FEEL ME
U.S. GET OUT OF WASHINGTON
FREE THE INDIANAPOLIS 500
GET UP AND GET AWAY
FALL BY THE WAYSIDE
FLIP OUT
STRAIGHTEN UP
LET A SMILE BE YOUR UMBRELLA ..... AND .....
BEFORE YOU KNOW IT {}{}{}{}{}{}{}{}{}{}
1984
WILL
FIND
YOU!
AND ITS GO' BE RIGHTEOUS ..... KEYWORDS: 1894 BENWAY TLALCLATLAN
INTERZONE
2-20-74
</pre>
<p>
It was an explosion, a revolution, a body blow against the
establishment, spearheaded by one demented User userism, come to the
people who called himself Doctor Benway in tribute to a sadistically
perverted character in Burroughs' <i>Naked Lunch.</i> This cat
Benway was taking things further than even the computer radicals at
Community Memory had suspected they would go, and the computer
radicals were delighted.
<p>
None was happier than Lee Felsenstein. He was one of the founders
of Community Memory and though he was not necessarily its most
influential member, he was symbolic of the movement which was taking
the Hacker Ethic to the streets. In the next decade, Lee
Felsenstein was to promote a version of the hacker dream that would,
had they known, appall Greenblatt and the Tech Square AI workers
with its technological nai'vete, political foundation, and
willingness to spread the computer gospel through, of all things,
the marketplace. But Lee Felsenstein felt he owed nothing to that
first generation of hackers. He was a new breed, a scrappy,
populist hardware hacker. His goal was to break computers out of
the protected AI towers, up from the depths of the dungeons of
corporate accounting departments, and let people discover themselves
by the Hands-On Imperative. He would be joined in this struggle by
others who simply hacked hardware, not for any political purpose but
out of sheer delight in the activity for its own sake; these people
would develop the machines and accessories through which the
practice of computing would become so widespread that the very
concept of it would change it would be easier for everyone to feel
the magic. Lee Felsenstein would come as close as anyone to being a
field general to these rabidly anarchistic troops; but now, as a
member of Community Memory, he was part of a collective effort to
take the first few steps in a momentous battle that the MIT hackers
had never considered worth fighting: to spread the Hacker Ethic by
bringing computers to the people.
<p>
It was Lee Felsenstein's vision of the hacker dream, and he felt he
had paid his dues in acquiring it.
</p>
<hr size="6" width="6" noshade>
<p>
Lee Felsenstein's boyhood might well have qualified him for a position
among the hacker elite on the ninth floor of Tech Square. It was the
same fixation with electronics, something that took hold so eerily
that it defied rational explanation. Lee Felsenstein, though, would
later try to give his love for electronics a rational explanation. In
his reconstructions of his early years (reconstructions shaped by
years of therapy), he would attribute his fascination with technology
to a complex amalgam of psychological, emotional, and survival
impulses as well as the plain old Hands-On Imperative. And his
peculiar circumstances guaranteed that he would become a different
stripe of hacker than Kotok, Silver, Gosper, or Greenblatt.
<p>
Born in 1945, Lee grew up in the Strawberry Mansion section of
Philadelphia, a neighborhood of row homes populated by first- and
second-generation Jewish immigrants. His mother was the daughter of
an engineer who had invented an important diesel fuel injector, and
his father, a commercial artist, had worked in a locomotive plant.
<a name="noted15"></a>Later, in an unpublished autobiographical
sketch, Lee would write that his father Jake "was a modernist who
believed in the perfectability of man and the machine as the model
for human society. In play with his children he would often imitate
a steam locomotive as other men would imitate animals."
<p>
Lee's home life was not happy. Family tension ran high; there was
sibling warfare between Lee, his brother J
没有合适的资源?快使用搜索试试~ 我知道了~
HACKERS: Heroes of the Computer Revolution
共29个文件
html:28个
css:1个
4星 · 超过85%的资源 需积分: 9 74 下载量 82 浏览量
2010-04-21
17:48:12
上传
评论 2
收藏 446KB ZIP 举报
温馨提示
CSDN新闻里提到的《黑客》一书…… HACKERS: Heroes of the Computer Revolution by STEVEN LEVY Contents Preface Who's Who Part One: True Hackers The Tech Model Railroad Club The Hacker Ethic Spacewar Greenblatt and Gosper The Midnight Computer Wiring Society Winners and Losers LIFE Part Two: Hardware Hackers Revolt in 2100 Every Man a God The Homebrew Computer Club Tiny BASIC Woz Secrets Part Three: Game Hackers The Wizard and the Princess The Brotherhood The Third Generation Summer Camp Frogger Applefest Wizard vs. Wizards Epilogue: The Last of the True Hackers Afterword Acknowledgments Notes
资源推荐
资源详情
资源评论
收起资源包目录
HACKERS_Heroes_of_the_Computer_Revolution.zip (29个子文件)
HACKERS_Heroes_of_the_Computer_Revolution
hackers.css 310B
afterword.html 14KB
part2
chapter8.html 63KB
chapter11.html 51KB
chapter13.html 28KB
chapter10.html 59KB
chapter9.html 50KB
chapter12.html 62KB
cover.html 2KB
epilogue.html 39KB
part1
chapter5.html 43KB
chapter1.html 55KB
chapter4.html 53KB
chapter6.html 53KB
chapter2.html 26KB
chapter7.html 60KB
chapter3.html 49KB
notes.html 11KB
acknowledgments.html 5KB
toc.html 2KB
whoiswho.html 12KB
part3
chapter14.html 55KB
chapter17.html 45KB
chapter19.html 53KB
chapter16.html 46KB
chapter15.html 25KB
chapter20.html 48KB
chapter18.html 57KB
preface.html 3KB
共 29 条
- 1
资源评论
- longhiram2012-10-20书不错,就是要英文好才行
- gxb74272582015-05-20很NB的东西!!就是我的英文不咋的!!
prog_6103
- 粉丝: 142
- 资源: 72
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功