Wednesday, December 5, 2012
Natural Selection 2 DOWNLOADS
A brief history of Hacker Culture
The beginning of the story, I would like to introduce the so-called Real Programmer.
They never claimed to be a Real Programmer, Hacker, or any special title; `Real Programmer 'term in the 1980s, but as early as 1945, the computer science will continue to attract the minds of the top in the world, the imagination is the most abundant The people put into them. Eckert & Mauchly invented ENIAC, the steady avid programmer into which to write software and play various programming techniques for the music, and gradually formed a set of technological and cultural self-awareness.
Batch of Real Programmers mainly from the engineering and physics community, wore thick glasses, wearing a the polyester fiber T-shirt with white socks, and a lot of the old language to write programs in machine language, assembly language, FORTRAN. They Hacker pioneer in the era of silent contribution, but little known. From the end of the Second World War to 1970 early the punch the age of the computer and the so-called "big iron" mainframes popular computer culture dominated by the Real Programmer. Hacker legend if any name Mel (included in the Jargon File), the various versions of Murphy's Law, mock-German `Blinkenlight 'articles are spread old antiquated joke.
※ Translation:
The Jargon File written by the original author of this article, which included a lot of Hacker terminology abbreviation meaning legend. Jargon File published as a book: The New Hacker's Dictionary, MIT PRESS published. Online version:
http://www.ccil.org/jargon
※ Translation:
Murphy 's Law: When there are two roads to let your choice, one will lead to failure, you will be elected to it. It has a lot of the Derivative say: For example, a program demo before testing thousands or tens of thousands of times are correct, but the demo that day happens it will engage the aircraft out bugs.
※ Translation:
The joke of the Blinkenlight German dictionary for a long time still can not understand, to close at the end of the text. Able to German students can take a look at the (welcome into Chinese and sent to me).
Some Real Programmer is still alive and very active (This article was written in 1996). Supercomputer designer Seymour Cray's Cray, was reportedly personally designed the Cray hardware and its operating system, the operating system is the machine code hard dry out, and have not had any bug or error. Real Programmer is really super!
For a relatively less exaggerated example: Stan Kelly-Bootle, author of The Devil's DP the Dictionary of the book (McGraw-Hill, 1981 edition, ISBN 0-07-034022-6) and Hacker legendary experts, when a Manchester Mark I development program. He is now a computer magazine columnist, wrote some scientific Humor, writing is interesting voted today hackers capricious, so very popular. The other portraits David E. Lundstorm, wrote little story about Real Programmer, A few Good Men From UNIVAC included in this book, published in 1987, ISBN-0-262-62 075-8.
※ Translation:
See here, we should understand, refers to the so-called Real Programmer is to use assembly language or even machine code program with a punch card machine punch out a piece of paper cards, Stone Age Programmer kind of input into the computer by the host card reader.
The Real Programmer era into the end Instead the gradual prevalence Interactive computing Industries Integrated Service university set up a Computer related departments and computer network. Hacker marked the beginning of the era began in 1961 - MIT appear first computer DEC PDP-1. MIT's Tech Model Railroad Club (TMRC) Power and Signals Group bought the machine, put it as the most fashionable technological toys, various programming tools with computer terminology began to appear, the whole environment and culture has been developed down to today. Steven Levy's book `Hackers' front-end detail records (Anchor / Doubleday, 1984, ISBN 0-385-19195-2).
※ Translation:
Interactive computing does not refer to Windows, GUI, WYSIWYG interface, a terminal, a shell can be under the instruction Interactive computing even. First Hacker word should be the MIT. Authoritative academic artificial intelligence in the early 1980s: the MIT Artificial Intelligence Laboratory, its central figure comes from TMRC. Since 1969, is just the ARPANET built the first year, this group of people in the computer science community will continue to have a major breakthrough with contributions.
ARPANET was the first high-speed network across the United States. By the U.S. Department of Defense funded the construction of an experimental nature of digital communications network, has grown into a large network of contact universities, defense contractors and research institutions. The researchers around with unprecedented speed and flexibility to exchange information, ultra-efficient mode of cooperation led to the rapid development of science and technology.
ARPANET Another benefit is the information superhighway, making the world's hackers can get together, no longer as before the formation of a Unit, the short-lived culture isolated in various network and the confluence them into a powerful force. People began to feel the presence of the Hacker Culture, hands finishing the term put network, published online satirical literature and discussion of ethics should Hacker. (Jargon File, the first edition appeared in 1973, is a good example), Hacker rapid development of culture in the universities connected to ARPANET, especially (but not exclusively) in information related departments.
The beginning, the entire Hacker culture to the MIT AI Lab Center, Stanford University Artificial Intelligence Laboratory (SAIL) later Carnegie-MellonUniversity (referred to as CMU) is rapidly rising. Three are large-scale scientific research center and the authority of artificial intelligence, gathered around the world elite, whether technically or spirit level, Hacker culture has very high contribution.
Know the story later, we have to look at the changes in the computer itself; With the advancement of technology, the protagonist MIT AI Lab also fade away from the smash hit to the last.
From MIT that PDP-1 began Hackers may program development platform is Digital Equipment Corporation's PDP mini-PC series. DEC developed the first commercial use based interactive computing and time-sharing operating system, many universities are bought DEC machine, because it offers both flexibility and speed, is still very cheap (relative to the large computer Lesson 51 Predicting the faster) . Cheap time-sharing system is one of the factors Hacker Culture rapid growth era popular in the PDP, ARPANET is dominated by the DEC machines, the most important of which would constitute a PDP-10 and PDP-10 by Hacker 'favor fifteen The years; TOPS-10 (DEC operating systems) and MACRO-10 (its assembler) that the word is still often appear, the many nostalgic terminology and Hacker legendary.
MIT PDP-10 like everyone, but they disdain with the operating system of the DEC. They will want to write their own: the well-known legend ITS.
ITS full name is `Incompatible Timesharing System ', take this strange name really MIT Funny style - is different, they are very cocky enough skill to write a set of operating system. ITS is always unstable, design weird, bug is also a lot, but there are still many unique Transcend seems timesharing system boot time longest record holder.
The ITS itself is written in assembly language, the other part of the written by LISP. LISP is a powerful and highly flexible programming language at the time; In fact, today, 25 years later, its design is still better than most programming languages. The LISP Let ITS is the Hacker to enjoy their imaginations and Funny. LISP is the biggest player in the success of the MIT AI Lab, now it is still one of the Hacker 'favorite. The product of many ITS still alive; EMACS is probably one of the most famous book of anecdotes of the ITS remains today are the Hacker talked about, just as you read in the Jargon File. MIT hongdefazi, SAIL and CMU pitching. SAIL hardcore who later became key players of the PC industry or the graphical user interface developed. The Hacker at CMU developed the first large expert systems and industrial robots.
The other Hacker city of XEROX PARC in Palo Alto, Research Center. Ten years from 1970 in the early to mid-1980s, PARC is constantly amazing breakthrough with the invention, regardless of quality or quantity, software or hardware. Window mouse interface, laser printers and LAN; D series machine, gave birth with a mini-computer for a longer short powerful PC. Unfortunate group foresight is not appreciated by senior; PARC is a specialized company provides a good idea of someone else's money to become well known joke. Even so, PARC group of people Hacker culture still indelible contribution. The ARPANET and PDP-10 culture in the 1970s rapidly grow and prosper. Mailing list emergence of people around the world can be composed of many SIG (Special-interest group), not just the computer, but also social and entertainment aspects. DARPA these `legitimacy 'activities an eye, close one eye, because relying on these activities will attract more clever lads into the computer field.
Famous non-computer-related technology ARPANET mailing list the most important science fiction fans, today ARPANET become the Internet, more and more readers to participate in the discussion. Mailing list gradually become a public debate in the media, resulting in many commercial online services such as CompuServe, Genie and Prodigy established.
Mysterious force in the outskirts of New Jersey, the other shares actively invasion Hacker society, and finally swept through the tradition of the PDP-10. It was born in 1969, ARPANET established that year, the young man in the AT & T Bell Labs, Ken Thompson invented Unix. Thomspon has been involved in the Multics development, Multics operating system from ITS used to implement the newer OS theory, such as the operating system is more complex internal structure hidden, providing an interface so that the programmer can not have in-depth understanding of operating systems and hardware devices, but also the rapid development of the program.
Translation:
When the programmer to write a program within the operating system or hardware device must thoroughly understand. For example, write the IO program, clearly the job for the speed of the hard disk, the track number of heads must engage.
Continue to develop Multics do white working hours, Bell Labs, quickly exit (later a company Honeywell to sell the Multics of losing badly). Squiggle Ken Thompson liked the Multics operating environment, and he in the laboratory scrapped a DEC PDP-7, an operating system, the system design from the Multics copied his idea. He named this operating system Unix, used to the irony of the Multics.
Translation:
Ken Thompson wrote a game `Star Travel 'no place to run to find a single scrap machine PDP-7 play. His colleague Brian Kernighan ridicule Ken Thompson said: Thomson Oh "you write a good system, simply called Unics forget." (The Unics pronunciation the eunuch English eunuches), later changed to Unix.
Dennis Ritchie, his colleagues invented a new programming language C, he and Thompson C originally written in assembly language, Unix rewrite. C design principle is easy to use, and the freedom and flexibility of C with Unix at Bell Labs welcome. 1971 Thompson and Ritchie to secure the project of an office automation system, Unix at Bell Labs in the popular. But Thompson and Ritchie's ambitions do not stop there. The tradition at that time, an operating system must be entirely written in assembly language, beginning to allow the machine to play the highest performance. Thompson and Ritchie, the first few comprehend hardware and compiler technology has progressed to the operating system can be written entirely in a high-level language such as C, retains good performance. After five years, Unix has been successfully ported to several machines.
Translation:
Ken Thompson and Dennis Ritchie are only two engineers get the Turing Award (the computer industry, the Nobel Prize) (Other scholars).
It was an incredible thing! It means, Unix can run on a variety of platforms, Unix software can be ported to a variety of machines. No longer in need to write software for a specific machine, able to run on Unix is the most important, re-invent the wheel has become the past. In addition to cross-platform advantages, Unix and C, there are many significant advantages. The design philosophy of Unix and C `Keep It Simple, Stupid '. programmer can easily grasp the logical structure of the entire C (unlike other before or after the programming language) without having to write code all day long turned Manual. Unix provides many useful utilities, after appropriate combination (written in Shell script or Perl script) can play a great power.
※ Note:
The C Programming Language is the thinnest one of all programming language book, only 200 pages, oh. The author is Brian Kernighan and Dennis Ritchie, the C language Bible, also known as `K & R '.
※ Note:
`Keep It Simple, Stupid '(KISS) today Unix no longer follow this principle, almost all Unix irrigation bunch of the utilities and some did not, the only exception is the MINIX.
C with a wide range of applications in the Unix, surprisingly, many areas of research beyond the original designers use the computer, they are the best partner. Despite the lack of a formal support institutions, they are still under the AT & T internal madness spread. 1980, has spread to universities and research institutions, and thousands of hacker wanted to Unix installed on my machine at home.
The main machine is then run Unix PDP-11, VAX series of machines. However, due to the high portability of UNIX, it almost can be installed in the computer models. Once UNIX installed on the new machine, grab the C source code of the software to recompile all OK, who use a combination of language development software? Have a network designed specifically for UNIX --- UUCP: a low-speed, the instability but very low-cost network. Telephone lines link the two UNIX machines, can be used to transfer email. UUCP is a built-in UNIX systems, without additional installation. So UNIX platform was connected by our own set of network forming Hacker culture. After the establishment of the 1980 first USENET site, consisting of a king-size distributed bulletin board system, attracted by the number of people quickly over the ARPANET.
A few UNIX platform connected to the ARPANET. PDP-10 UNIX Hacker culture exchange, but the beginning is not very pleasant wants. Hacker who think of the PDP-10 UNIX advocates are what novice understand than their baroque original, attractive LISP and ITS, C, and UNIX is simply very funny. The group wearing animal skins to take stone axes barbarians "they muttered. The new trend in which at that time, there are other stocks to chill out. The first PC in 1975; Apple Computer was established in 1977 to grow at a rapid pace. The microcomputer's potential immediately attracted another group of young Hackers. Their favorite programming language BASIC, diehard faction of the PDP-10 UNIX fans because it is far too simple, does not even bother with it, but also look down on the people who use it.
Translation:
The group Hacker, one we must recognize, his name is Bill Gates, originally in 8080 on the development of the BASIC compiler.
Three Hacker culture in development in 1980 at the same time, despite occasional contact with each other and exchange, but each plays. The ARPANET/PDP-10 culture play LISP, MACRO, TOPS-10 and ITS. UNIX and C advocates the PDP-11 and VAX machines with telephone lines strung play. There are another group of scattered disorder microcomputer enthusiasts committed to the Computer Technology civilians.
Three in the ITS culture (that is, the MIT AI LAB center Hacker culture) reached its heyday can be said at this point, but the clouds gathering over this laboratory. PDP-10 ITS a livelihood gradually become obsolete, people began to leave the lab to go out to start a company, the artificial intelligence technology commercialization. The master of the MIT AI Lab can not stop the new high-paying winkle have fled, SAIL and CMU also encountered the same problem.
Translation:
Detailed description of the situation in the GNU Manifesto, see: (special thanks to by yhsiao translated into Chinese)
http://odie.csie.ntu.edu.tw/ ~ chiron / GNU-Manifesto.txt
Crit finally coming of, 1983 DEC announced: to be concentrated in the PDP-11 and VAX production line will stop production PDP-10; of ITS not engage in head up because it can not be transplanted to other machines, or simply did not people do the to. UNIX Berkeley Univeristy modified new VAX ran very smoothly, ITS ideal substitute. Visionary who could see the rapid growth of microcomputer technology, Unix dominate the political arena is a matter of time.
Almost Steven Levy to complete `` Hackers'' the book, the main source of information is the story of Richard M. Stallman (RMS), he is the MIT AI Lab leaders firmly opposed to the commercialization of research results of the laboratory.
The Stallman Then founded the Free Software Foundation, and devote write high-quality free software. Levy mourning tone describes him as `the last true hacker ', but fortunately, proved to Levy entirely wrong.
Translation:
Richard M. Stallman deeds refer to:
http://odie.csie.ntu.edu.tw/ ~ chiron / FSF.txt
Stallman's grand plan that is a microcosm of the early 1980s Hacker culture - in 1982, he began construction of a UNIX-compatible but the new operating system, written in C and is completely free. The spirit and tradition of the entire ITS, through the efforts of RMS integrated in a new, UNIX and VAX machines Hacker culture.
The the microcomputer LAN technology, began Hacker culture impact. Motorola 68000 CPU plus Ethernet is a powerful combination, several companies have set up production of the first generation of workstation. In 1982, out of a group of Berkeley UNIX Hacker was founded Sun Microsystems, playing their calculations: UNIX frame in to 68000 CPU machine, affordable and consistent with the majority of the application requirements. Their forward looking to set a new milestone for the entire industry. Personally, the workstation is still too expensive, but in the eyes of company and school, the workstation is really cheaper than the mini computer too much. In these institutions, the workstation (almost one) soon to replace the old huge VAX timesharing machine.
Translation:
The beginning of the production of Sun workstation CPU Motorola 68000 series was launched, to 1989 developed its own SPARC series CPU SPARCstation.
In 1984, the dissolution of AT & T UNIX officially became a commodity. The Hacker culture was divided into two categories, one focused on the Internet and USENET (mainly mini-computer running UNIX or workstation connected to the Internet), as well as another type of PC fans, most of them not connected to the Internet.
※ Translation:
Taiwan in 1992 and connected to the Internet before the players dial-up BBS telephone exchange information, but regional development is also great as USENET.
Sun and other workstation manufacturers Hacker have opened another Brave New World. Workstation demands of high-performance graphics and network Hacker committed to writing software for workstations, continue to challenge and break these features in order to play to one hundred and one percent in the 1980s. Berkeley develop a set of built-in the ARPANET protocols support UNIX, UNIX can easily connect to the Internet, the Internet has also grown more rapidly.
In addition to the Berkeley UNIX network features significantly enhance try as the workstation developed a graphical interface is also a lot. The most famous must be the development of the MIT X window. The key to the success of the X window completely open source, show a consistent style Hacker and spread on the Internet. X successful kill other commercial example of the graphical interface, a profound inspiration and influence on the development of UNIX few years later. Minority ITS diehard faction is still recalcitrant, 1990, the last ITS also shut down forever buried; those diehard faction in a dead end, only to invest in the arms of the UNIX bitterly.
UNIX at this time also split into Berkeley UNIX and AT & T two camps, maybe you've seen some of the posters, painted a titanium-wing fighter full speed fly an explosive, above Death Star printed trademarks of AT & T. The Berkeley UNIX advocate speaks for itself as a ruthless corporate empire Rebel. On sales, AT & T UNIX always keep up with BSD / Sun, but it won the standards war. In 1990, AT & T and BSD version has been difficult to clearly distinguish, because the two sides have each other's new invention.
As the 1990s came to the status of the workstation gradually by the threat of new low-cost high-end PC, they are mainly used Intel 80386 series CPU. The first the Hacker can buy a powerful machine the same as a decade ago, the mini computer, above, ran a full UNIX, and can easily connect to the Internet. Immersed in the world of MS-DOS Jing Diwa still know nothing about these changes, only a few people from the early microcomputer interested in more than the so-called "network nation" culture, the number of people playing the DOS and Mac but they never did what the climate or come up with what aircraft masterpiece light Zhaxian, although talk, but no stable development of a unified cultural traditions, dictionary of terms, legend and fabulous history. They have no real network, and can only be gathered in the small BBS station or network failures such as FIDONET.
Companies to provide Internet services such as CompuServe or Genie business is flourishing, and the fact that non-UNIX operating system is not included, such as program development tools such as compiler, few source circulating in the Internet, and therefore can not be formed to develop software culture. The Hacker culture of the main is spread all over the Internet, almost can be said to play the UNIX culture. They play on the computer and do not care what the after-sales service and the like, they want better tools, more time online, there are a cheap 32-bit PC.
With the machine, access to the Internet, but the software where to find? The terribly expensive commercial UNIX, a set of thousands of ocean better ($). The early 1990s, companies AT & T and BSD UNIX ported to the PC on the sale. Success regardless, the price does not come down, the more important thing is that there's no code, you simply can not and are not allowed to modify it to meet their own needs or take it to share with others. Traditional commercial software and not to Hacker who really want.
Even the Free Software Foundation (FSF) did not write Hacker desired operating system GNU operating system RMS commitment - HURD said for a long time, and did not see the shadow in 1996 (though in 1990, FSF software has performed in all UNIX platforms).
UNIX kernel, in the this empty window midterm, in 1992 a student of Helsinki University, Finland - Linus Torvalds began a 386PC development of a free software to use the the FSF program development tools. He quickly write a simple version, thrown on the network share, attracted a lot of Hacker to help with the development of Linux - a full-featured UNIX, completely free of charge and attach all of the source code.
Advanced Linux features, not functional but new software development model. Until the success of Linux before, everybody thinks that such a complex software such as operating systems, have to rely on a development team in close cooperation and mutual coordination and division of labor be possible to write out. Business software company with the Free Software Foundation in the 1980s are this pattern of development.
Linux is quite different from the former. The beginning it is a large group of Hacker on the network with coating applied wiped out. Strict quality control and high-level decision-making approach to development by the week released a new version for download test, test and then bug and patch affixed to the network to improve the next version. A brand new natural selection to weed Ching fast development model. Everyone dumbfounded, fixing this change out Linux, run along the very.
The end of 1993, Linux development of mature and stable, with commercial UNIX compete with one point, getting business application software ported to Linux. However, a small UNIX vendors because of the emergence of Linux to close down - because no one wanted to buy them something. The complete source code of the survivors by providing BSD-based UNIX, Hacker added development in order to continue to survive.
Hacker culture, time and time again to be to predict imminent destruction, was flooded with commercial software world, overcoming all obstacles, arduous, and create another round of their own world.
Linux can quickly grow from that one fact: the Internet popularity in the early 1990s, ISP mushroomed up to the emergence of the World-Wide Web, making the speed of Internet growth, almost suffocating feeling.
BSD officially announced the end of the project in 1994 Hacker with free UNIX (Linux with some 4.4BSD derivative versions). Linux CD-ROM sold very good (the good selling pancakes).
The last few years The Hacker are mainly active in the Linux and Internet development. The World Wide Web Internet to become the world's largest transmission media, a lot of the 1980s and early 1990s Hacker are now in the business ISP.
The Internet prevailed, Hacker Culture attention and exert their political influence. 94, 95 years the U.S. government intends to safer, the intricate coding theory to be monitored does not allow the outflow and the use. This project called the Clipper proposal caused the Hacker who rallied together to oppose and strongly protest halfway mortality. 1996 Hacker launched another protest movement against the misnomer "Communications Decency Act" and vowed to safeguard freedom of speech on the Internet.
The computer and the Internet in the 21st century everyone will be an integral part of daily necessities, modern children in the use of Internet technology sooner or later come into contact with the Hacker culture. It is the story of the legendary and Philosophy, will attract more people to join. Hacker who is filled with light.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment