Original ''Hackers''''. Clever Solutions, Political Acts
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Spacewarduino
1 SPACEWARDUINO Kaivan Wadia (Department of EECS) – Massachusetts Institute of Technology Advisor: Prof. Philip Tan ABSTRACT Spacewar! was one of the first ever computer games developed in the early 1960s. Steve Russell, Martin Graetz and Wayne Witaenem of the fictitious "Hingham Institute" conceived of the game in 1961, with the intent of implementing it on a DEC PDP-1 computer at MIT. Alan Kotok obtained some sine and cosine routines from DEC following which Steve Russell started coding and the first version was produced by February 1962. Spacewar! was the first computer game written at MIT. In the duration of this project we hope to implement the same game on an Arduino Microcontroller with a Gameduino shield while examining the original assembly code and staying as true to the original version of the game as possible. 2 TABLE OF CONTENTS 1. INTRODUCTION 3 2. UNDERSTANDING THE SOURCE CODE 4 3. VECTOR GRAPHICS AND SPACESHIPS 7 4. SPACEWAR! NIGHT SKY 9 5. THE ARDUINO/GAMEDUINO IMPLEMENTATION 11 6. CONCLUSION 13 7. REFERENCES 14 3 1. INTRODUCTION The major aim of this project is to replicate the first computer game written at MIT, Spacewar!. In the process we aim to learn a lot about the way video games were written for the machines in the pioneering days of computing. Spacewar! is game of space combat created for the DEC PDP-1 by hackers at MIT, including Steve Russell, Martin Graetz, Wayne Witaenem, Alan Kotok, Dan Edwards, and Peter Samson. The game can be played on a Java emulator at http://spacewar.oversigma.com/. -
Hacker Culture & Politics
HACKER CULTURE & POLITICS COMS 541 (CRN 15368) 1435-1725 Department of Art History and Communication Studies McGill University Professor Gabriella Coleman Fall 2012 Arts W-220/ 14:35-17:25 Professor: Dr. Gabriella Coleman Office: Arts W-110 Office hours: Sign up sheet Tuesday 2:30-3:30 PM Phone: xxx E-mail: [email protected] OVERVIEW This course examines computer hackers to interrogate not only the ethics and technical practices of hacking, but to examine more broadly how hackers and hacking have transformed the politics of computing and the Internet more generally. We will examine how hacker values are realized and constituted by different legal, technical, and ethical activities of computer hacking—for example, free software production, cyberactivism and hactivism, cryptography, and the prankish games of hacker underground. We will pay close attention to how ethical principles are variably represented and thought of by hackers, journalists, and academics and we will use the example of hacking to address various topics on law, order, and politics on the Internet such as: free speech and censorship, privacy, security, surveillance, and intellectual property. We finish with an in-depth look at two sites of hacker and activist action: Wikileaks and Anonymous. LEARNER OBJECTIVES This will allow us to 1) demonstrate familiarity with variants of hacking 2) critically examine the multiple ways hackers draw on and reconfigure dominant ideas of property, freedom, and privacy through their diverse moral 1 codes and technical activities 3) broaden our understanding of politics of the Internet by evaluating the various political effects and ramifications of hacking. -
THE FUTURE of IDEAS This Work Is Licensed Under a Creative Commons Attribution-Noncommercial License (US/V3.0)
less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page i THE FUTURE OF IDEAS This work is licensed under a Creative Commons Attribution-Noncommercial License (US/v3.0). Noncommercial uses are thus permitted without any further permission from the copyright owner. Permissions beyond the scope of this license are administered by Random House. Information on how to request permission may be found at: http://www.randomhouse.com/about/ permissions.html The book maybe downloaded in electronic form (freely) at: http://the-future-of-ideas.com For more permission about Creative Commons licenses, go to: http://creativecommons.org less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page iii the future of ideas THE FATE OF THE COMMONS IN A CONNECTED WORLD /// Lawrence Lessig f RANDOM HOUSE New York less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page iv Copyright © 2001 Lawrence Lessig All rights reserved under International and Pan-American Copyright Conventions. Published in the United States by Random House, Inc., New York, and simultaneously in Canada by Random House of Canada Limited, Toronto. Random House and colophon are registered trademarks of Random House, Inc. library of congress cataloging-in-publication data Lessig, Lawrence. The future of ideas : the fate of the commons in a connected world / Lawrence Lessig. p. cm. Includes index. ISBN 0-375-50578-4 1. Intellectual property. 2. Copyright and electronic data processing. 3. Internet—Law and legislation. 4. Information society. I. Title. K1401 .L47 2001 346.04'8'0285—dc21 2001031968 Random House website address: www.atrandom.com Printed in the United States of America on acid-free paper 24689753 First Edition Book design by Jo Anne Metsch less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page v To Bettina, my teacher of the most important lesson. -
The Evolution of Lisp
1 The Evolution of Lisp Guy L. Steele Jr. Richard P. Gabriel Thinking Machines Corporation Lucid, Inc. 245 First Street 707 Laurel Street Cambridge, Massachusetts 02142 Menlo Park, California 94025 Phone: (617) 234-2860 Phone: (415) 329-8400 FAX: (617) 243-4444 FAX: (415) 329-8480 E-mail: [email protected] E-mail: [email protected] Abstract Lisp is the world’s greatest programming language—or so its proponents think. The structure of Lisp makes it easy to extend the language or even to implement entirely new dialects without starting from scratch. Overall, the evolution of Lisp has been guided more by institutional rivalry, one-upsmanship, and the glee born of technical cleverness that is characteristic of the “hacker culture” than by sober assessments of technical requirements. Nevertheless this process has eventually produced both an industrial- strength programming language, messy but powerful, and a technically pure dialect, small but powerful, that is suitable for use by programming-language theoreticians. We pick up where McCarthy’s paper in the first HOPL conference left off. We trace the development chronologically from the era of the PDP-6, through the heyday of Interlisp and MacLisp, past the ascension and decline of special purpose Lisp machines, to the present era of standardization activities. We then examine the technical evolution of a few representative language features, including both some notable successes and some notable failures, that illuminate design issues that distinguish Lisp from other programming languages. We also discuss the use of Lisp as a laboratory for designing other programming languages. We conclude with some reflections on the forces that have driven the evolution of Lisp. -
ILLUSTRATIONS Figure 1.1 Eadweard Muybridge, Descending
APPENDIX: ILLUSTRATIONS Figure 1.1 Eadweard Muybridge, Descending Stairs and Turning Around, photographs from series Animal Locomotion, 1884-1885. 236 237 Figure 1.2 Marcel Duchamp, Nude Descending a Staircase, No. 2 oil on canvas, 1912. Philadelphia Museum of Art. 238 Figure 1.3 Giacomo Balla, Dynamism of a Dog on a Leash, oil on canvas, 1912. Albright-Knox Art Gallery, Buffalo, New York. 239 Figure 1.4 A. Michael Noll, Gaussian Quadratic, computer-generated image, 1963. 240 Figure 1.5 Stephen Rusell with Peter Samson, Martin Graetz,Wayne Witanen, Alan Kotok, and Dan Edwards, Spacewar!, computer game, designed at MIT on DEC PDP-1 assembler, 1962. Above: view of screen. Below: console. 241 Figure 1.6 Andy Warhol, Self-Portrait, photograph of image created on Commodore Amiga 1000 computer using Graphicraft software, 1986. 242 Figure 1.7 Nam June Paik, Magnet TV, black and white television with magnet, 1965. 243 Figure 1.8 Nam June Paik, Zen for TV, black and white television, 1963-1975. 244 Figure 1.9 Vito Acconci, Centers, performance on video, 20 minutes, 1971. 245 Figure 1.10 Joan Jonas, Left Side, Right Side, performance on video, 1972. Pat Hearn Gallery, New York. 246 Figure 1.11 Dan Graham, Present Continuous Past, installation view, 1974. 247 Figure 1.12 Gary Hill, Hole in the Wall, installation at the Woodstock Artists Association, Woodstock, NY, 1974. 248 Figure 1.13 Nam June Paik, TV Buddha, mixed-media video sculpture, installed at Stedelijk Museum, Amsterdam, 1974. 249 Figure 2.1 jodi (Joan Heemskerk and Dirk Paesmans), wwwwwwwww.jodi.org, screenshot. -
TCM Report, Summer
Board of Directors Corporate Donors Contributing Members John William Poduska. Sr. Benefactor-$lO.ooo or more Pathway Design. Inc. Patron-$SOO or more Chairman and CEO AFIPS. Inc." PC Magazine Anonymous. Ray Duncan. Tom Eggers. Belmont Computer. Inc. American Exr.ress Foundation Peat. Marwick. Mitchell & Co. Alan E. Frisbie. Tom and Rosemarie American Te ephone & Telegraph Co." Pell. Rudman. Inc. Hall. Andrew Lavien. Nicholas and Gwen Bell. President Apollo Computer. Inc." Pencept. Inc. Nancy Petti nella. Paul R. Pierce. The Computer Museum Bank of America" Polese-Clancy. Inc. Jonathan Rotenberg. Oliver and Kitty Erich Bloch The Boston Globe" Price Waterhouse Selfridge. J. Michael Storie. Bob National Science Foundation ComputerLand" Project Software & Development. Inc. Whelan. Leo R. Yochim Control Data Corporation" Shawmut Corporation David Donaldson Data General Corporation" Standard Oil Corporation Sponsor-$250 Ropes and Gray Digital Equipment Corporation" Teradyne Hewlett-Packard Warner & Stackpole Isaac Auerbach. G. C . Beldon. Jr .. Sydney Fernbach Philip D. Brooke. Richard J. Clayton. Computer Consultant International Data Group" XRE Corporation International Business Machines. Inc." " Contributed to the Capital Campaign Richard Corben. Howard E. Cox. Jr .. C. Lester Hogan The MITRE Corporation" Lucien and Catherine Dimino. Philip H. Fairchild Camera and Instrument NEC Corporation" Darn. Dan L. Eisner. Bob O. Evans. Corporation Raytheon Company Branko Gerovac. Dr. Roberto Guatelli. Sanders Associates M. Ernest Huber. Lawrence J. Kilgallen. Arthur Humphreys The Travelers Companies Core Members Martin Kirkpatrick. Marian Kowalski. ICL Wang Laboratories. Inc." Raymond Kurzweil. Michael Levitt. Carl Theodore G. Johnson Harlan E. and Lois Anderson Machover. Julius Marcus. Joe W .. Charles and Constance Bachman Matthews. Tron McConnell. -
The Internet Is a Semicommons
GRIMMELMANN_10_04_29_APPROVED_PAGINATED 4/29/2010 11:26 PM THE INTERNET IS A SEMICOMMONS James Grimmelmann* I. INTRODUCTION As my contribution to this Symposium on David Post’s In Search of Jefferson’s Moose1 and Jonathan Zittrain’s The Future of the Internet,2 I’d like to take up a question with which both books are obsessed: what makes the Internet work? Post’s answer is that the Internet is uniquely Jeffersonian; it embodies a civic ideal of bottom-up democracy3 and an intellectual ideal of generous curiosity.4 Zittrain’s answer is that the Internet is uniquely generative; it enables its users to experiment with new uses and then share their innovations with each other.5 Both books tell a story about how the combination of individual freedom and a cooperative ethos have driven the Internet’s astonishing growth. In that spirit, I’d like to suggest a third reason that the Internet works: it gets the property boundaries right. Specifically, I see the Internet as a particularly striking example of what property theorist Henry Smith has named a semicommons.6 It mixes private property in individual computers and network links with a commons in the communications that flow * Associate Professor, New York Law School. My thanks for their comments to Jack Balkin, Shyam Balganesh, Aislinn Black, Anne Chen, Matt Haughey, Amy Kapczynski, David Krinsky, Jonathon Penney, Chris Riley, Henry Smith, Jessamyn West, and Steven Wu. I presented earlier versions of this essay at the Commons Theory Workshop for Young Scholars (Max Planck Institute for the Study of Collective Goods), the 2007 IP Scholars conference, the 2007 Telecommunications Policy Research Conference, and the December 2009 Symposium at Fordham Law School on David Post’s and Jonathan Zittrain’s books. -
From Cyber-Utopia to Cyber-War. Advocacy Coalitions and the Normative Change in Cyberspace
From Cyber-Utopia to Cyber-War. Normative Change in Cyberspace. Dissertation zur Erlangung des akademischen Grades doctor philosophiae (Dr. phil.) vorgelegt dem Rat der Fakultät für Sozial- und Verhaltenswissenschaften der Friedrich- Schiller-Universität Jena von Matthias Schulze (M.A.) geboren am 28.03.1986 in Weimar 15.03.2017 1 Gutachter 1. Prof. Dr. Rafael Biermann (Friedrich-Schiller Universität Jena) 2. Dr. Myriam Dunn Cavelty (ETH Zürich) 3. Prof. Dr. Georg Ruhrmann (Friedrich-Schiller Universität Jena) Tag der mündlichen Prüfung: 08.08.2017 2 Copyright © 2018 by Matthias Schulze. Some Rights reserved. This work is licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0). To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/ or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042, USA. 3 Table of Contents Table of Contents 4 Acknowledgement 7 Abstract 10 List of Abbreviations 11 List of Tables and Graphics 13 1. Introduction 15 1.1 Puzzle & Research Question 18 1.2 Literature Review 22 1.3 Contributions of the Study 27 1.4 Case Selection: The United States 30 1.5 Structure and Logic of the Argument 32 2. Explaining Normative Change 38 2.1 Norms and Theories of Normative Change 39 2.1.1 Norm Diffusion and Norm Entrepreneurs 41 2.1.2 Critique of Deontological Norms 42 2.1.3 Critique of Diffusion Models 44 2.2 Paradigms and Norm-Change 47 2.2.1 Discursive Struggles between Paradigms 53 2.2.2 Framing 59 2.2.3 Degrees of Change 63 2.2.4 Explaining Change 67 -
Hacked: a Radical Approach to Hacker Culture and Crime by Kevin F.Steinmetz Richard A
International Social Science Review Volume 93 | Issue 2 Article 10 Book Review: Hacked: A Radical Approach to Hacker Culture and Crime by Kevin F.Steinmetz Richard A. Almeida Francis Marion University Follow this and additional works at: https://digitalcommons.northgeorgia.edu/issr Part of the Anthropology Commons, Communication Commons, Economics Commons, Geography Commons, International and Area Studies Commons, Political Science Commons, and the Public Affairs, Public Policy and Public Administration Commons Recommended Citation Almeida, Richard A. () "Book Review: Hacked: A Radical Approach to Hacker Culture and Crime by Kevin F.Steinmetz," International Social Science Review: Vol. 93 : Iss. 2 , Article 10. Available at: https://digitalcommons.northgeorgia.edu/issr/vol93/iss2/10 This Book Review is brought to you for free and open access by Nighthawks Open Institutional Repository. It has been accepted for inclusion in International Social Science Review by an authorized editor of Nighthawks Open Institutional Repository. Almeida: Book Review: Hacked Steinmetz, Kevin F. Hacked: A Radical Approach to Hacker Culture and Crime. 2016. New York: New York University Press. xv + 285 pages. Paperback, $28. “Hackers” and “hacking” occupy a complicated place in twenty-first century American life. Images of misfit teenagers, sinister manipulators of the democratic process, and monomaniacally-focused corporate intruders abound. Kevin Steinmetz acknowledges that those archetypes have some legitimacy but makes a convincing case that “craftsperson,” “guild member,” and “exploited proletarian” should be added to the iconography of hacking. On his account, hackers and hacker culture occupy an interesting and important place in American culture and the post-Fordist economy, one that can be fruitfully explored with a “radical” (Marx- inspired) approach. -
Robert Alan Saunders
SMITHSONIAN INSTITUTION LEMELSON CENTER FOR THE STUDY OF INVENTION AND INNOVATION Robert Alan Saunders Transcript of an interview conducted by Christopher Weaver at National Museum of American History Washington, D.C., USA on 29 November 2018 with subsequent additions and corrections For additional information, contact the Archives Center at 202-633-3270 or [email protected] All uses of this manuscript are covered by an agreement between the Smithsonian Institution and Robert Alan Saunders dated November 29, 2018. For additional information about rights and reproductions, please contact: Archives Center National Museum of American History Smithsonian Institution MRC 601 P.O. Box 37012 Washington, D.C. 20013-7012 Phone: 202-633-3270 TDD: 202-357-1729 Email: [email protected] Web: http://americanhistory.si.edu/archives/rights-and-reproductions Preferred citation: Robert Alan Saunders, “Interview with Robert Alan Saunders,” conducted by Christopher Weaver, November 29, 2018, Video Game Pioneers Oral History Collection, Archives Center, National Museum of American History, Smithsonian Institution, Washington, DC. Acknowledgement: The Smithsonian’s Lemelson Center for the Study of Invention and Innovation gratefully acknowledges financial support from the Entertainment Software Association and Coastal Bridge Advisors for this oral history project. For additional information, contact the Archives Center at 202-633-3270 or [email protected] Abstract Robert Saunders begins discussing his early family life, education, and early exposure to electrical engineering. He next recounts his time at MIT, recalling members of the Tech Model Railroad Club and his work with the TX-0 and PDP-1 computers. Saunders discusses the contributions of Spacewar! team members to the project and his development of the original PDP-1 game controllers. -
Free As in Freedom (2.0): Richard Stallman and the Free Software Revolution
Free as in Freedom (2.0): Richard Stallman and the Free Software Revolution Sam Williams Second edition revisions by Richard M. Stallman i This is Free as in Freedom 2.0: Richard Stallman and the Free Soft- ware Revolution, a revision of Free as in Freedom: Richard Stallman's Crusade for Free Software. Copyright c 2002, 2010 Sam Williams Copyright c 2010 Richard M. Stallman Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License." Published by the Free Software Foundation 51 Franklin St., Fifth Floor Boston, MA 02110-1335 USA ISBN: 9780983159216 The cover photograph of Richard Stallman is by Peter Hinely. The PDP-10 photograph in Chapter 7 is by Rodney Brooks. The photo- graph of St. IGNUcius in Chapter 8 is by Stian Eikeland. Contents Foreword by Richard M. Stallmanv Preface by Sam Williams vii 1 For Want of a Printer1 2 2001: A Hacker's Odyssey 13 3 A Portrait of the Hacker as a Young Man 25 4 Impeach God 37 5 Puddle of Freedom 59 6 The Emacs Commune 77 7 A Stark Moral Choice 89 8 St. Ignucius 109 9 The GNU General Public License 123 10 GNU/Linux 145 iii iv CONTENTS 11 Open Source 159 12 A Brief Journey through Hacker Hell 175 13 Continuing the Fight 181 Epilogue from Sam Williams: Crushing Loneliness 193 Appendix A { Hack, Hackers, and Hacking 209 Appendix B { GNU Free Documentation License 217 Foreword by Richard M. -
Alan Kotok & David R.R. Webber
JAi^ E F! N E T: ALAN KOTOK & DAVID R.R. WEBBER www.newriders.cirm 201 West 103rd Street, Indianapolis, Indiana 46290 ~ — An Imprint of Pearson Education . Boston • Indianapolis • London • Munich • New York • San Francisco vi ebXML: The New Global Standard for Doing Business over the Internet Table of Contents PART I Executive Overview of ebXML 1 There's No Business Like E-Business 3 In Case You Hadn't Noticed, Doing Business Is Different Now 6 Business Isn't So Simple Anymore 11 From Just-in-Case to Just-in-Time Inventories 16 Investors Want to See Your Internet Strategy 22 Higher Volumes, Larger Scale, Bigger Numbers 23 Can Your Company's Systems Keep Pace? 26 Direct to Consumer 28 Disintermediation 28 Business to Business 29 Distributors 29 References and Affiliates 29 Muki-Vendor Malls 30 Standardizing Information Systems 30 Electronic Data Interchange (EDI): E-Business as We (Used to) Know It 31 Aim to Improve the Business Process 40 Sweat the Details 40 Aim for Interoperability 40 Link to Other Technologies 41 Endnotes 42 2 ebXML in a Nutshell 47 Vision and Scope 47 Software Processes, Puzzles, and Pyramids 49 ebXML Process Flow ,• 53 A Look at the ebXML Technical Architecture 55 Business Processes and Objects 57 Core Components 58 Trading Partner Profiles and Agreements 62 Registries and Repositories 64 Messaging Functions 68 Messaging Specifications 69 ebXML Message Package 69 Reliable Message Flow 11 Getting Started with ebXML 71 Endnotes 74 Table of Contents vii 3 ebXML at Work 77 Case 1: Go-Go Travel, in Search of a New Business