piatok: tip na knihu

balu@home daniel.valuch@orange.fr
Pátek Únor 5 09:12:49 CET 2010


kupil som si knihu Hackers: Heroes of the Computer Revolution (by Steven 
Levy)
http://en.wikipedia.org/wiki/Hackers_Heroes_of_the_Computer_Revolution
Mozem doporucit, je to naozaj vyzivne citanie. Prikladam malu vzorovu 
kapitolu o pridavani instrukcie do pocitaca. Velmi dobre som sa na tom 
pobavil :-)



Nelson thought that adding an "add to memory" instruction would improve 
the machine. It would take months, perhaps, to go through channels to do 
it, and if he did it himself he would learn something about the way the 
world worked. So one night Stewart Nelson spontaneously convened the 
Midnight Computer Wiring Society. This was an entirely ad hoc 
organization which would, when the flow of history required it, 
circumvent the regulations of the Massachusetts Institute of Technology 
against unauthorized tampering with expensive computers. The MCWS, which 
that night consisted of Nelson, a student worker, and several interested 
bystanders, opened up the cabinet and proceeded to rewire the PDP-1. 
Nelson fused a couple of diodes between the "add" line and the "store" 
line outputs of the instruction decoder, and had himself a new op-code, 
which presumably supported all the previous instructions. He then 
proceeded to reassemble the machine to an apparent pristine state.
The machine was taken through its paces by the hackers that night, and 
worked fine. But the next day an Officially Sanctioned User named 
Margaret Hamilton
showed up on the ninth floor to work on something called a Vortex Model 
for a weather-simulation project she was working on. Margaret Hamilton 
was just beginning a programming career which would see her eventually 
in charge of on- board computers on the Apollo moon shot, and the Vortex 
program at that time was a very big program for her. She was well aware 
of the hackers' playfulness around the ninth floor, and she was 
moderately friendly with some of them, even though they would eventually 
blend into one collective personality in her memory: one unkempt, though 
polite, young male whose love for the computer had made him lose all reason.
The assembler that Margaret Hamilton used with her Vortex program was 
not the hacker-written MIDAS assembler, but the DEC-supplied DECAL 
system that the hackers considered absolutely horrid. So of course 
Nelson and the MCWS, when testing the machine the previous night, had 
not used the DECAL assembler. They had never even considered the 
possibility that the DECAL assembler accessed the instruction code in a 
different manner than MIDAS, a manner that was affected to a greater 
degree by the slight forward voltage drop created by the addition of two 
diodes between the add line and the store line. Margaret Hamilton, of 
course, was unaware that the PDP-1 had undergone surgery the previous 
night. So she did not immediately know the reason why her Vortex 
program, after she fed it in with the DECAL assembler ... broke. Stopped 
working. Died. Mysteriously, a perfectly good program had bombed. Though 
programs often did that for various reasons, this time Margaret Hamilton 
complained about it, and someone looked into why, and someone else 
fingered the Midnight Computer Wiring Society. So there were 
repercussions. Reprimands.
That was not the end of the Midnight Computer Wiring Society. Edwards 
and his ilk could not stay up all night to watch the machines. Besides, 
Minsky and the others in charge of Project MAC knew that the hackers' 
nocturnal activities were turning into a hands-on postgraduate course on 
logic design and hardware skills. Partially because Nelson and the 
others got good enough so disasters like the Great Margaret Hamilton 
Program Clobber were less likely to occur, the official AI lab ban 
against hardware tampering gradually faded away to the status of one of 
those antiquated laws that nobody bothers to take off the books, like a 
statute forbidding you from publicly beating a horse on Sunday. 
Eventually the Midnight Computer Wiring Society felt free enough to 
change instructions, make new hardware connections, and even rig the 
computer to the room lights on the ninth floor, so that when you fired 
up the TECO text-editing program, the lights automatically dimmed so 
that you could read the CRT display more easily.
This last hack had an unexpected consequence. The TECO editor rang a 
bell on the teletype to signal when the user made an error. This 
normally was no problem, but on certain days the machine got flaky, and 
was extremely sensitive to power line
variations like those generated by the bell on the teletype. Those 
times, when someone made a mistake with TECO, the bell would ring, and 
the machine would be thrown into randomness. The computer would be out 
of control; it would type spastically, ringing the bell, and most 
unsettling, turning the room lights on and off. The computer had run 
amok! Science-fiction Armageddon! The hackers considered this extremely 
humorous. The people in charge of the lab, particularly Marvin Minsky, 
were very understanding about these things. Marvin, as the hackers 
called him (they invariably called each other by last name), knew that 
the Hacker Ethic was what kept the lab productive, and he was not going 
to tamper with one of the crucial components of hackerism. On the other 
hand, there was Stew Nelson, constantly at odds with the rules, a hot 
potato who got hotter when he was eventually caught red-handed at phone 
hacking. Something had to be done. So Minsky called up his good friend 
Ed Fredkin, and told him he had this problem with an incredibly 
brilliant nineteen-year old who had a penchant for getting into 
sophisticated mischief. Could Fredkin hire him?




More information about the Hw-list mailing list