Preview

A Critique of the Hacker Ethic by Steven Levy

Powerful Essays
Open Document
Open Document
2040 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
A Critique of the Hacker Ethic by Steven Levy
I found that Steven Levy makes some very bold claims. I will address those in next week’s Journal. This week, he mentions a long list of people and computers that ends up reading like a computing industry “Hall of Fame.” Many of these have contributed greatly to the way our computers work, how small and how powerful they have become.
Below, I have some impressions as I looked into the biography of each. Levy’s descriptions are colorful, but not very enlightening, as regards their roles in computer history. Some of their situations have changed since then. I have listed some of the more interesting items and impressions from the text and the bios.
Altair 8800 – This machine is considered by many as the first true personal computer. Microsoft’s first project was to develop the language for the computer, Altair BASIC. The 8800 was featured on the cover of Popular Mechanics in 1975, after which the numbers of orders through the mail is cited as the start of the PC revolution.
Apple II – The first of a long line of successful machines. The Apple IIc was the first with a full-color monitor and the computer that introduced me into the new era.
Doug Carlston – His company, Broderbund, is one of the top-grossing software companies in the world today.
John Draper – He got his nickname, Captain Crunch, from the Quaker Oats cereal. Quaker Oats offered a whistle as a premium to entice purchases. John learned how use that whistle to simulate the tones AT&T used to connect to their long distance carrier networks. It is estimated that he placed millions, perhaps tens of millions, of dollars in free long distance phone calls before going to prison for it… that estimate is at retail value, of course.
Bill Gates – I find it interesting that Levy mentions Gates as “cocky,” likely in the sense of being supremely confident in his own abilities to the point of excess. I wonder if Levy considers him the same way today. Many Hackers hold Gates in contempt because of the

You May Also Find These Documents Helpful

  • Good Essays

    Bmgt Quiz

    • 701 Words
    • 3 Pages

    6. Dell Computer founder Michael Dell and Microsoft co-founder Bill Gates are two well-known examples of ________.…

    • 701 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Way back in the beginning, in 1977, Apple had commercial success with the Apple II (Timesunion.com, 2011). It can attributed to its mass-appeal in design and usages for what consumers were in need of (Timesunion.com, 2011).…

    • 704 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Andy Grove and Michael Dell made major contribution to the field of technology. Not speaking to product contributions, but the effective management tools, leadership, poise and strategic thinking are perhaps their most impressive contributions to the field.…

    • 1321 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The history timeline was very interesting to review. I never really realized what it takes to make a computer run. After careful consideration I was able to think of the two hardware innovations and two software innovations that I believe to be the most important.…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Brochure Bus-210

    • 465 Words
    • 2 Pages

    Also known as a “personal computer” was introduced in 1976 by Apple. It was a kit form of the PC and as sold to enthusiasts worldwide and they assembled a PC and programed it with a computer language. IBM introduced its first computer in 1981.…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Eric Schmidt Google Ceo

    • 1294 Words
    • 6 Pages

    Born April 27, 1955 in the United States capital, Washington D.C. Dr. Eric Emerson Schmidt spent most of his early childhood in Northern Virginia, and Italy, where his father taught at John Hopkins in Bologna. After only two short years, spent during his third and fourth grade, while overseas, by 1965 he was relocated back to the United States, in Blacksburg, Virginia, where his father was appointed chairman of the Department of Economics at Virginia Tech. As a young boy, Schmidt was very technically adept, spending most of his time dissembling and reassembling things. At the ripe age of fifteen, while he attended Yorktown High School, he got his first exposure to computing, utilizing the school’s time-shared terminal on an ASR-33 teletype machine. His father had been so impressed that he rented his very own terminal at home, where Schmidt continued working for the school, rewriting software, which at that time consisted of only tape with punched holes.…

    • 1294 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Take Home Midterm

    • 1653 Words
    • 7 Pages

    Another hacker wrongfully accused was named Jonathan James, or c0mrade. He was convicted and sent to prison for hacking in the United States–all while he was still a minor. At only fifteen years of age, he managed to hack into a number of networks, including those belonging to Bell South, Miami-Dade, the U.S. Department of Defense, and NASA.…

    • 1653 Words
    • 7 Pages
    Good Essays
  • Better Essays

    Bibliography: (Steven Levy, insanely great, the life and times of Macintosh, the computer that changed everything, 1994)…

    • 2087 Words
    • 9 Pages
    Better Essays
  • Good Essays

    Media In The 1970s

    • 735 Words
    • 3 Pages

    Steven P. Jobs and Stephen G. Wozniak did not introduce the Apple II personal computer until 1977, according to “History of American Journalism: The 1970s”, published by The University of…

    • 735 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In the garage of Mr Jobs’ stepdad, the two brilliant minds invented “Apple I”. This was…

    • 1402 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Women in Technology

    • 2197 Words
    • 9 Pages

    The revolution of computers had begun centuries ago. It has been the work of many over the course of years to bring computers where they are today. For quite some time it entailed people with bright imaginations to come up with technological inventions. These inventions were then taken and built upon to improve its functionality. Finally, computers were no longer a revolution but an evolution since the 1950 's. During the course of this time many men as well as women had influenced technology. Unfortunately, women have not received the same form of recognition as the men have in this field of study. After carefully researching women in technology, it was observed on how true this was. It was difficult to find the names of women who were influential in computing let alone their biographies. On the other hand, finding men who were involved in this field were numerous. After spending time finding a list of women who were instrumental in computing, it was then narrowed down to four women of interest. The first woman to be discussed is Ada Byron. Following her will be Grace Hopper, Evelyn Granville, and Krisztina Holly.…

    • 2197 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Ethical Computer Hacking

    • 1026 Words
    • 5 Pages

    Have you ever been a victim of a cyber crime? Something as simple as a weird pop up that won 't go away? Or maybe something a little bit more serious like your personal web page gets hi-jacked? All this "malicious" damage that causes you much grief isn 't so much the work of a hacker, per se, but more the work of a "cracker" or a "script kiddie". Now you 're confused right? Well let 's just say everyone who knows how manipulate a computer isn 't doing it on bad and evil terms, like writing a virus to deploy on a certain date to permanently delete certain file extensions. But maybe they 're the people sitting hours on end to deploy a fix for that certain virus someone else is writing, or safeguarding a local bank 's network to make sure that virus cannot access the banks database. Hacking can be ethical by providing the Internet world with a tightened sense of security by detecting and preventing security flaws before it is too late.…

    • 1026 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Later on, came Ivan Sutherland who was a computer scientist and a professor at Harvard University.…

    • 526 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Steve Jobs Bio

    • 31358 Words
    • 126 Pages

    Steve Jobs was born on February 24, 1955, in the city of San Francisco. His biological mother was an unwed graduate student named Joanne Simpson, and his biological father was either a political science or mathematics professor, a native Syrian named Abdulfattah John Jandali. Being born out of wedlock in the puritan America of the 1950s, the baby was put up for adoption. Joanne had a college education, and she insisted that the future parents of her boy be just as well educated. Unfortunately, the candidates, Paul and Clara Jobs, did not meet her expectations: they were a lower-middle class couple that had settled in the Bay Area after the war. Paul was a machinist from the Midwest who had not even graduated from high school. In the end, Joanne agreed to have her baby adopted by them, under the firm condition that they later send him to college. Paul and Clara called their new son Steven Paul. While Steve was still a toddler, the couple moved to the Santa Clara county, later to be known as Silicon Valley. They adopted another baby, a girl called Patti, three years later in 1958.…

    • 31358 Words
    • 126 Pages
    Good Essays
  • Powerful Essays

    Directed by J. T. S. Moore, the film features interviews with prominent hackers and entrepreneurs including Richard Stallman, Michael Tiemann,Linus Torvalds, Larry Augustin, Eric S. Raymond, Bruce Perens, Frank Hecker and Brian Behlendorf.…

    • 1894 Words
    • 8 Pages
    Powerful Essays

Related Topics