Reading 00: What Type of Hacker Are You?
Steven Levy’s “Hacker Ethic” posits a number of characteristics
that make someone a true hacker. Among them, I am most interested by the guidelines
concerning free and open systems and access to information. Naturally, passion
for free and open systems leads to a distrust of the authority that governs the
use of system and fosters a general disdain for bureaucracy. These two traits
ultimately manifested in Chapter 5 with the creation of Stew Nelson’s Midnight
Computer Wiring Society. I found these characteristics and the society itself
both inspiring and a bit deflating. First, I have worked in a couple bureaucratic
workplaces already, and I find it mind numbing how little can get done at
times. As an incoming junior employee, I want to be the type of hacker who will
get things done, even if it means taking risks to get others to perform or testing
things first and checking boxes later. My favorite mentors have been those with
similar dispositions. However, reflecting on how something like the MCWS would
be received today on college campuses, I can’t help but realize how far we are
from that time in computing history. A unilateral student group breaking into
building and making adjustments to equipment as they seem fit would be a huge
problem and probably with reason. Then I realized that modern young hackers can’t
expect to act this way. I notice that hackers seem to attract hackers, and that
young hackers can best set themselves up for success by working with senior,
successful hackers to navigate the administrative processes that keep todays
much more complex systems secure. This is something else I am going to keep in
mind going into my job.
Beyond the drive to get things done and a disdain for red
tape, “true hackers” as portrayed by Levy seem to have an obsessive focus on
their work. No doubt, the world of computing was transformed by the early
hackers’ ability to single track their lives. However, I don’t think I could
ever be this kind of hacker. In class we discussed the difference between Levy
and the Tech Model Railroad Club crowd and a hacker like Margaret Hamilton. I
would put it this way. The first group did great things for computing and the
latter did great things with computing. The book makes a similar distinction discussing
Greenblatt and Gosper at the start of Chapter 5. Levy writes, “Greenblatt was
hacker of systems and visionary of application; Gosper was metaphysical explorer
and handyman of the esoteric (pg. 83).” One camp is entrenched in technology and
pushes the envelope to create innovations, and the other is almost evangelical;
bringing computing technologies to other industries and sciences to solve hard
problems. There is nothing wrong with either, but I aspire to be the second. In
fact, I think Notre Dame has an inclination to produce hackers skewed to this
camp. The focus on liberal arts and well-rounded engineers would reasonably
produce computer scientists with formidable technical skills and a calling to
some other intellectual application. The field needs hackers of the first type,
but personally, the potential to apply my skills in service to a final project
or customer is more rewarding than the more nebulous and theoretical work that
would fall on the shoulders of the other type of hackers.
Comments
Post a Comment