Hackers, Heroes of the Computer Revolution

Chapters 1 and 2

Author: Steven Levy
Published: 1984
Language: English
Wordcount: 13,868 / 48 pg
Flesch-Kincaid Reading Ease: 54.5
LoC Category: D
Downloads: 19,208
mnybks.net#: 4377
Origin: gutenberg.org
License: ©
Advertisement

The origins and history of electronic intruders that includes the first written "code of ethics" of the computer underground.

Show Excerpt

ng of the word "any."

Dick Sunderland Chalk-complexioned MBA who believed that firm managerial bureaucracy was a worth goal, but as president of Sierra On-Line found that hackers didn't think that way.

Gerry Sussman Young MIT hacker branded "loser" because he smoked a pipe and "munged" his programs; later became "winner" by algorithmic magic.

Margot Tommervik With her husband Al, long-haired Margot parlayed her game show winnings into a magazine that deified the Apple Computer.

Tom Swift Terminal Lee Felsenstein's legendary, never-to-be-built computer terminal which would give the user ultimate leave to get his hands on the world.

TX-0 Filled a small room, but in the late fifties this $3 million machine was the world's first personal computer--for the community of MIT hackers that formed around it.

Jim Warren Portly purveyor of "techno-gossip" at Homebrew, he was first editor of hippie-styled Dr. Dobbs Journal, later started the lucrative Computer Faire.

Randy

Reviews

Add a review for this title.
Average Rating of 4 from 5 reviews: ****
2011.12.24
Willard C. Smith
*****

I first read this book in the early 1980s. The book was divided into 4 sections: 1- described the MIT Hackers who started off in 1959, 2- the early growth of hardware companies in Silicon Valley and the creation of the very first Personal Computers, 3- the first major software game developing company (for the Apple Computer), 4- a brief return to MIT and Richard Stillman's GNU project.


Only the first section is in this ebook (I downloaded the awz format of this book). I was disappointed because other reviewers left me to believe the entire book was available. Never the less I recommended reading even this subset of the entire book. The writing is very good and you can easily understand the motivations of these early Hackers.

2007.09.07
jagannath prasad
*****

you r book is very very good.

2006.06.26
Josh Davidson
*****

This is one of my favorite books of all time. I read the full copy before, and when I saw it as an E-Book form I had to have it. It is actualy most of the book, not just 2 chapters, because there is only three chapters, or sections in the book.

2005.11.14
steve lambert
***..

What the commenter above doesn't understand is that when documents are ocr scanned errors can creep in. Those of us used to reading ebooks understand that this is just part of the territory. If a few spelling errors disrupt your enjoyment then maybe you should be reading a dictionary instead.

2005.11.03
Thomas McMahon
**...

I've only just started reading this, but it appears to need major editing. On the first page alone I found about 4 spelling mistakes, which makes it difficult to read.

If you really want to read this now then go ahead, if you can wait for a revised edit, then that might be a good idea. :)


Cover image for

Download


show mobile phone QR code

Donate a small amount via Paypal below or read about some other ways that you can support ManyBooks.