While using
hacker to refer to someone who enjoys playful cleverness is most often applied to computer programmers, it is sometimes used for people who apply the same attitude to other fields. For example,
Richard Stallman describes the silent composition
4′33″ by John Cage and the 14th-century
palindromic three-part piece "Ma Fin Est Mon Commencement" by
Guillaume de Machaut as hacks. In their programmer subculture, a hacker is a person who follows a spirit of playful cleverness and loves programming. It is found in an originally academic movement unrelated to computer security and most visibly associated with
free software,
open source and
demoscene. It also has a
hacker ethic, based on the idea that writing software and sharing the result on a voluntary basis is a good idea, and that information should be free, but that it's not up to the hacker to make it free by breaking into private computer systems. This hacker ethic was publicized and perhaps originated in
Steven Levy's
Hackers: Heroes of the Computer Revolution (1984). It contains a codification of its principles. The programmer subculture of hackers disassociates from the mass media's pejorative use of the word 'hacker' referring to computer security, and usually prefer the term 'cracker' for that meaning. Complaints about supposed mainstream misuse started as early as 1983, when media used "hacker" to refer to the computer criminals involved in
The 414s case. In the programmer subculture of hackers, a computer hacker is a person who enjoys designing software and building programs with a sense for aesthetics and playful cleverness. The term hack in this sense can be traced back to "describe the elaborate college pranks that...students would regularly devise" (Levy, 1984 p. 10). To be considered a 'hack' was an honor among like-minded peers as "to qualify as a hack, the feat must be imbued with innovation, style and technical virtuosity" (Levy, 1984 p. 10) The
MIT Tech Model Railroad Club Dictionary defined hack in 1959 (not yet in a computer context) as "1) an article or project without constructive end; 2) a project undertaken on bad self-advice; 3) an entropy booster; 4) to produce, or attempt to produce, a hack(3)", and "hacker" was defined as "one who hacks, or makes them". Much of TMRC's jargon was later imported into early computing culture, because the club started using a
DEC PDP-1 and applied its local model railroad slang in this computing context. Initially incomprehensible to outsiders, the slang also became popular in MIT's computing environments beyond the club. Other examples of jargon imported from the club are 'losing' ("when a piece of equipment is not working") According to
Eric S. Raymond, the Open Source and Free Software hacker subculture developed in the 1960s among 'academic hackers' working on early
minicomputers in
computer science environments in the United States. Hackers were influenced by and absorbed many ideas of key technological developments and the people associated with them. Most notable is the technical culture of the pioneers of the
ARPANET, starting in 1969. The
PDP-10 AI machine at MIT, running the
ITS operating system and connected to the ARPANET, provided an early hacker meeting point. After 1980 the subculture coalesced with the culture of
Unix. Since the mid-1990s, it has been largely coincident with what is now called the
free software and
open source movement. Many programmers have been labeled "great hackers", but the specifics of who that label applies to is a matter of opinion. Certainly major contributors to
computer science such as
Edsger Dijkstra and
Donald Knuth, as well as the inventors of popular software such as
Linus Torvalds (
Linux), and
Ken Thompson and
Dennis Ritchie (
Unix and
C programming language) are likely to be included in any such list; see also
List of programmers. People primarily known for their contributions to the consciousness of the programmer subculture of hackers include
Richard Stallman, the founder of the free software movement and the
GNU project, president of the
Free Software Foundation and author of the famous
Emacs text editor as well as the
GNU Compiler Collection (GCC), and
Eric S. Raymond, one of the founders of the
Open Source Initiative and writer of the famous text
The Cathedral and the Bazaar and many other essays, maintainer of the
Jargon File (which was previously maintained by
Guy L. Steele, Jr.). Within the computer programmer subculture of hackers, the term hacker is also used for a programmer who reaches a goal by employing a series of modifications to extend existing
code or resources. In this sense, it can have a negative connotation of using inelegant
kludges to accomplish programming tasks that are quick, but ugly, inelegant, difficult to extend, hard to maintain and inefficient. This derogatory form of the noun "
hack" derives from the everyday English sense "to cut or shape by or as if by crude or ruthless strokes" [Merriam-Webster] and is even used among users of the positive sense of "hacker" who produces "cool" or "neat" hacks. In other words, to "hack" at an original creation, as if with an axe, is to force-fit it into being usable for a task not intended by the original creator, and a "hacker" would be someone who does this habitually. (The original creator and the hacker may be the same person.) This usage is common in both programming, engineering and building. In programming, hacking in this sense appears to be tolerated and seen as a necessary compromise in many situations. Some argue that it should not be, due to this negative meaning; others argue that some kludges can, for all their ugliness and imperfection, still have "hack value". In non-software engineering, the culture is less tolerant of unmaintainable solutions, even when intended to be temporary, and describing someone as a "hacker" might imply that they lack professionalism. In this sense, the term has no real positive connotations, except for the idea that the hacker is capable of doing modifications that allow a system to work in the short term, and so has some sort of marketable skills. However, there is always the understanding that a more skillful or technical logician could have produced successful modifications that would not be considered a "hack-job". The definition is similar to other, non-computer based uses of the term "hack-job". For instance, a professional modification of a production sports car into a racing machine would not be considered a hack-job, but a cobbled together backyard mechanic's result could be. Even though the outcome of a race of the two machines could not be assumed, a quick inspection would instantly reveal the difference in the level of professionalism of the designers. The adjective associated with hacker is "hackish" (see the
Jargon file). In a very universal sense, hacker also means someone who makes things work beyond perceived limits in a clever way in general, without necessarily referring to computers, especially at MIT. That is, people who apply the creative attitude of software hackers in fields other than computing. This includes even activities that predate computer hacking, for example
reality hackers or
urban spelunkers (exploring undocumented or unauthorized areas in buildings). One specific example is clever pranks traditionally perpetrated by MIT students, with the perpetrator being called hacker. For example, when MIT students surreptitiously put a fake police car atop the dome on MIT's Building 10, that was a hack in this sense, and the students involved were therefore hackers. Other types of hacking are
reality hackers,
wetware hackers ("hack your brain"), and
media hackers ("hack your reputation"). In a similar vein, a "hack" may refer to a
math hack, that is, a clever solution to a mathematical problem. All of these uses have spread beyond MIT.
Home computing enthusiasts In yet another context, a hacker is a computer hobbyist who pushes the limits of software or hardware. The home computer hacking subculture relates to the hobbyist home computing of the late 1970s, beginning with the availability of
MITS Altair. An influential organization was the
Homebrew Computer Club. However, its roots go back further to
amateur radio enthusiasts. The amateur radio slang referred to creatively tinkering to improve performance as "hacking" already in the 1950s. A large overlap between hobbyist hackers and the programmer subculture hackers existed during the Homebrew Club's days, but the interests and values of both communities somewhat diverged. Today, the hobbyists focus on commercial
computer and video games,
software cracking and exceptional computer programming (
demo scene). Also of interest to some members of this group is the modification of computer hardware and other electronic devices, see
modding. musician probes the circuit board of a synthesizer for
"bends" using a jeweler's screwdriver and alligator clips. Electronics hobbyists working on machines other than computers also fall into this category. This includes people who do simple modifications to
graphing calculators,
video game consoles, electronic
musical keyboards or other device (see
CueCat for a notorious example) to expose or add functionality to a device that was unintended for use by end users by the company who created it. A number of
techno musicians have modified 1980s-era
Casio SK-1 sampling keyboards to create unusual sounds by doing
circuit bending: connecting wires to different leads of the integrated circuit chips. The results of these DIY experiments range from opening up previously inaccessible features that were part of the chip design to producing the strange, dis-harmonic digital tones that became part of the techno music style. Companies take different attitudes towards such practices, ranging from open acceptance (such as
Texas Instruments for its graphing calculators and
Lego for its
Lego Mindstorms robotics gear) to outright hostility (such as
Microsoft's attempts to lock out
Xbox hackers or the
DRM routines on
Blu-ray Disc players designed to sabotage compromised players.) In this context, a "hack" refers to a
program that (sometimes illegally) modifies another program, often a video game, giving the user access to features otherwise inaccessible to them. As an example of this use, for
Palm OS users (until the 4th iteration of this
operating system), a "hack" refers to an extension of the operating system which provides additional functionality. Term also refers to those people who cheat on video games using special software. This can also refer to the
jailbreaking of
iPhones.
Hacker artists Hacker artists create
art by hacking on
technology as an
artistic medium. This has extended the definition of the term and what it means to be a hacker. Such
artists may work with
graphics,
computer hardware,
sculpture,
music and other
audio,
animation,
video,
software,
simulations,
mathematics, reactive
sensory systems, text,
poetry,
literature, or any combination thereof.
Dartmouth College musician
Larry Polansky states: Another description is offered by
Jenny Marketou: A successful software and hardware hacker artist is
Mark Lottor (mkl), who has created the 3-D light art projects entitled the
Cubatron, and the
Big Round Cubatron. This art is made using custom computer technology, with specially designed
circuit boards and programming for
microprocessor chips to manipulate the
LED lights.
Don Hopkins is a software hacker artist well known for his artistic cellular automata. This art, created by a
cellular automata computer program, generates objects which randomly bump into each other and in turn create more objects and designs, similar to a lava lamp, except that the parts change color and form through interaction. Hopkins Says: Some hacker artists create art by writing computer code, and others, by developing hardware. Some create with existing software tools such as
Adobe Photoshop or
GIMP. The creative process of hacker artists can be more abstract than artists using non-technological media. For example,
mathematicians have produced visually stunning graphic presentations of
fractals, which hackers have further enhanced, often producing detailed and intricate graphics and animations from simple mathematical formulas. file:Bubbles2.gif|
Bubbles was created using watercolors, then scanned into a computer. Colors were then manipulated using a software imaging tool. file:Sunrise-lile.gif|
Sunrise was created using pen and ink, then scanned into a computer and colored with a software imaging tool. file:Hills7p.gif|
Rolling Golden Hills of California was created using pencil, scanned, and then painted with a software imaging tool. file:Bransleys fern.png|''
Barnsley's fern'', a fractal fern computed using an
iterated function system file:Animated fractal mountain.gif|A fractal that models the surface of a mountain
Art •
Burning Man Festival •
Computer art •
Computer music •
Digital art •
Demoscene •
Electronic art •
Electronic art music •
Electronica •
Experiments in Art and Technology •
Generative art •
Internet art •
Maker movement •
Media art •
Robotic art •
Software art Hacker art mentions • "Vector in Open Space" by Gerfried Stocker 1996. • Switch|Journal Jun 14 1998. • Eye Weekly "Tag – who's it?" by Ingrid Hein, July 16, 1998. • Linux Today "Playing the Open Source Game" by , Jul 5, 1999. • Canterbury Christ Church University Library Resources by Subject – Art & Design, 2001. • SuperCollider Workshop / Seminar Joel Ryan describes collaboration with hacker artists of Silicon Valley. 21 March 2002 • Anthony Barker's Weblog on Linux, Technology and the Economy "Why Geeks Love Linux", Sept 2003. • Live Art Research Gesture and Response in Field-Based Performance by
Sha Xin Wei & Satinder Gill, 2005. • Hackers, Who Are They "The Hackers Identity", October 2014. ==See also==