Hair culture brief history

xiaoxiao2021-03-06  106

Eric S. Raymond's "Hair Culture Simple History"

The following content is reproduced since http://hp.envir.online.sh.cn/Vega/hacker.htm======================================================== ======================= This original author is Eric S. Raymond Esr@snark.thyrsus.com, he is a big brother-level Hacker, write Many free software, well-known books include Jargon File, in recent years, "Cathedral and Market" papers have made OpenSource Software efforts, Netscape is willing to disclose Navigator's original code, which has a big relationship with this article.

Hacker Culture Brief History

Order: Real Programmer

The story starts, I want to introduce the so-called Real Programmer.

They never claim to be Real Programmer, Hacker or any special title; the noun in 1980 appeared in the 1980s, but since 1945, computer science continues to attract the world's top, imagination is the most abundant. The person put it it. After invented ENIAC from Eckert & Mauchly, there is a full-feasible Programmer to invest in it, and they have written software and play with various programming skills, and gradually form a set of scientific and technological culture with self-consciousness. At that time, the Real Programmers mainly came from the engineering and physical circles, they worked with thick glasses, penetrate fibers T-shirts and pure white socks, using machine language, assembly language, Fortran and many old language writes. They are the pioneers of the Hacker era, silently contributing, but it is very known. From the end of the Second World War, the early days, it was a MAINFRAMES epidemic of a card computer and the so-called "big iron block", dominated by Real Programmer. Hacker Legend Story If a famous MEL (included in Jargon File), various versions of Murphy's Law, Mock-German`blinkenlight 'articles are a long-standing old teeth joke. ※ Translator: Jargon File is also written by the original author of this article, including many Hacker language, abbreviated meaning, legendary story, etc. Jargon File has a publishing book: The New Hacker's Dictionary, Mit Press is published. There is also an Online version: http://www.ccil.org/jargon ※ Translator: Mo Fighter is: When there are two ways to make you choose, if one of them will fail, you will choose it. It has many derivatives: such as a program tested thousands of thousands of thousands of thousands of times before Demo, but Demo will be biased. Some Real Programmer is still in the world and is very active (this article is written in 1996). Super Computer CRAY Designer Seymour Cray, is said to design Cray all hardware and its operating system, and the operating system is hard to dry with the machine code, no bug or error. Real programmer is really super! To make a more exaggerated example: Stan Kelly-bootle, The Devil's DP Dictionary book author (McGraw-Hill, 1981 Edition, ISBN 0-07-034022-6) and Hacker Legend Specialist, this year in a manchester Mark I development program. He is now a columnist writer of computer magazine, writing some scientific humor, meaningful and interesting today Hackers well, so it is very popular. Others have written a small story about Real Programmer, including this book on A Few Good Men from UNIVAC, published in 1987, ISBN-0- 262-62075-8. ※ Translation: Seeing this, everyone should understand that the so-called real programmer refers to the use of a combination language or even a machine code, putting a paper card with a punching machine Punch, and inputs the stone era of the computer by the host card. Programmer. The era of Real Programmer stepped into an end, replaced by an Interactive Computing, university established a computer network, and a computer network. They gave birth to another continuous engineering tradition and finally evolved into today's open code hacker culture. Early hacker

The Hacker Age has started the first computer DEC PDP-1 in 1961. After the MIT's TECH Model Railroad Club (TMRC), after bought this machine, the machine as the most fashionable technology toy, the various program tools and computer terms have begun, and the entire environment and culture have been developed to today. . This has detailed records in the front section of Steven Levy's book `Hackers' (Anchor / Doubleday, published in 1984, ISBN 0-385-19195-2). ※ Translation: Interactive computing does not refer to Windows, GUI, Wysiwyg and other interfaces, and Terminal, there is a shell to be instructions as interactive computing. The word that uses HACKER should be MIT. The Early Academic Artificial Wisdom of the Early 1980s: MIT's Artificial Intelligence Laboratory, its core character comes from TMRC. Since 1969, it is exactly the first year of ARPANET, which has continuously has major breakthroughs and contributions in the computer science. Arpanet is the first high-speed network across the United States. The US Department of Defense is funded, an experimental digital communication network, gradually growing into a large network of universities, national defense contractors and research institutions. All local researchers can lead to the sharpness of science and technology with unprecedented speed and elastic exchange information, super efficient cooperation model. Another benefit of ArpaNet is that the information expressway makes Hackers around the world to get together, and it is no longer as shown in the past, and the network has been formed into a powerful force into a powerful force. Start someone to feel the existence of Hacker culture, handle the terminology and put on the network, publish satressial literature and discuss the moral norms of Hacker. (Jargon File appeared in 1973, is a good example), Hacker culture has rapidly developed rapidly between colleges who have connected ARPANET, especially (but not all) in information related department. At the beginning, the entire Hacker culture developed with MIT's AI Lab, but Stanford University's Artificial Intelligence Laboratory (Sail) is rapidly rising with a later Carnegie-Mellon University (referred to as CMU). Three are all authorities of the Large Information Science Research Center and artificial wisdom, gathered in the elite around the world, regardless of the technical or spiritual level, have a very high contribution to Hacker culture. In order to understand the story later, we have to look at the changes in the computer itself; with the progress of technology, the protagonist Mit Ai Lab also fades out of the stage from the red pole. From the MIT, the HACKER mainly developing platforms are the PDP mini computer sequence of Digital Equipment Corporation. DEC took the lead in developing an Interactive Computing and Time-Sharing operating system that commercial use, many universities were a machine to buy DEC, because it combined with flexibility and cheap (relative to large computer mainframe) . The inexpensive time-time system is one of the rapid growth factors of Hacker culture. At the era of PDP, ARPANET is the world of DEC machines, the most important of which is PDP-10, and PDP-10 is favored by Hacker. Year; TOPS-10 (DEC's operating system) and MACRO-10 (its group translator), many nostalgic terms and Hacker legend often have these two words. Mit is like a PDP-10 like everyone, but they disdain with DEC's operating system.

They are committed to write one: Legend has a famous ITS. ITS full name is `Incompatible TimeSharing System ', take this blame, really in line with MIT's funny style - it is to be different, they are very stinky but enough to write a set of operating systems. ITS is always unstable, design is quirky, BUG is also a lot, but there are still many unique foundations, which seems to be a record holder that opens for the long time in the time-time system. The ITS itself is written in assembly language, and other parts are written by LISP. LISP is a powerful and very flexible program; in fact, today, its design is still superior to most program languages. LISP allows ITS's Hacker to make an imagination and function. Lisp is the biggest hero of Mit Ai Lab, and now it is still one of Hacker's favorite. Many ITS products are still alive; Emacs is probably the most famous one, and the ITS's martial arts is still the Today's Hacker, Jaji, just like you read in Jargon File. Sail and CMU are not idle when Mit is red. SAIL's neutralization is later become the horizontal development of the PC boundary or graphic user. CMU's Hacker developed the first practical large-scale specialized system and industrial robot. Another harboer is a Palo Alto Research Center, Xerox Parc. From 1970 to 1980 in the mid-1980s, PARC continued to make an amazing breakthrough and inventions, regardless of quality, software or hardware. For today's window, the mouse, the Lei Ying Plan, the regional network; its D series machine, gave birth to a strong powerful personal computer with mini-computer. Unfortunately, this group of prophet is not subject to the company's high-level appreciation; PARC is a company specializing in a good idea to help others to make money. Even so, PARC's group of people still contribute to Hacker culture. In the 1970s, the PDP-10 culture was quickly thriving. Mailing List's emergence makes people from all over the world to form a lot of SIG (Special-Interest Group), not only in terms of computer, and in terms of social and entertainment. DARPA is closed on these non-regularity 'activities, because of these activities attracted more intelligence guys to invest in the computer field. A famous non-computer technology-related ARPANET MAILING LIST first pushes science fiction, and when ArpaNet turns into an Internet, it is more and more readers to participate in discussions. Mailing List gradually became a public discussion medium, resulting in many commercial Internet services such as CompuServe, Genie and Prodigy. Rise of UNIX

At this time, in the suburbs of New Jersey, another mysterious force actively invaded the Hacker society and finally swept the entire PDP-10 tradition. It was born in 1969, which is the year of Arpanet, a young guy in AT & T Bell Labs invented UNIX. Thomspon has participated in the development of Multics, and Multics is derived from ITS's operating system. It is used to do some newer OS theory, such as hiding the internal structure of the operating system, providing a interface, making Programmer without deep depth Understand the operating system and hardware equipment, can also develop program. Translation: The Programmer write program must thoroughly understand the internal or hardware devices. For example, it is said that there is an IO program. For the speed of the hard disk, the number of magnetic rails and the number of magnetic heads must be made. When discovered that Multics was doing white workers, Bell Labs quickly exited (later there was a company Honeywell sold Multics, which was very damn). Ken Thompson likes the work environment on Multics, so he wrote an operating system in a scrapped DEC PDP-7 in the laboratory. The system has his own ideas in design from Multics. He named this operating system and used to irony Multics. Translation: In fact, Ken Thompson wrote a game` Star Travel ', there is no place to run, go to a scrap machine PDP-7 to play. His colleague brian kernighan laughed Ken Thompson said: "You write the system is so happy, just call UNICS calculation." His colleague Dennis Ritchie, invented a new program language C, and he was rewritten with Thompson with C to write the original unix written by assembly language. The design principle of c is to use, freedom and flexibility, and C and Unix are quickly welcomed in Bell Labs. In 1971 Thompson and Ritchie won the project for an office automation system, UNIX started popular in Bell Labs. However, Thompson and Ritchie's ambitions are still more than this. The tradition of that time is that an operating system must be written completely with assembly language, which will enable the machine to play the highest performance. Thompson and Ritchie, a few technologies that comprehend hardware and compilers have entered into the operating system to write a good performance using high-order languages ​​such as C, still maintain good performance. Five years later, UNIX has been successfully transplanted to several machines. Translation: Ken Thompson and Dennis Ritchie are the only two engineers who have received Turing Award (Nobel Awards in the computer) (others are scholars). This is an incredible thing! It means that if UNIX runs on a variety of platforms, UNIX software can be ported to various machines. It is also not necessary to write software for a specific machine, and can run on UNIX, and the reinvention of the wheel has become a past style. In addition to the advantages of cross-platform, UNIX and C have many significant advantages. The design philosophy of UNIX and C is Keep IT Simple, Stupid '. Programmer can easily master the entire C logical structure (unlike other or later language) instead of one day to the evening. Unix provides many useful gadgets, with appropriate combinations (written as a shell script or perl script), you can play a powerful power.

※ Note: The C Programming Language is the thinnest book for all programming books, only more than two hundred pages. The author is Brian Kernighan and Dennis Ritchie, so this C language is also known as `K & R '. ※ Note: `Keep it Simple, Stupid 'referred to as KISS, today Unix does not follow the principle, almost all UNIX is a pile of utilities, the only exception is Minix. C and UNIX scope of application range, unexpectedly, many areas of research should be used to use computers, they are the best partners. Despite the lack of a formal support, they are still crazy in the inside of AT & T. In 1980, it has spread to university and research institutions, and thousands of Hacker wants to put Unix on the machine. The main machine running UNIX is the machine of the PDP-11, VAX series. However, due to the high portability of UNIX, it is almost installed on all computer models. Once the Unix on the new machine is installed, put the software's C original code to recoibly recompile everything, who wants to develop software with assembly language? There is a set of networks designed for UNIX --- UUCP: a low speed, unstable but very cost-effective network. Two UNIX machines use the phone line to connect, you can use intermittent emails. UUCP is built in a UNIX system without additional installation. So the UNIX platform has a exclusive network to form its Hacker culture. After the first USENET platform in 1980, a large-scale decentralized bulletin board is formed, and the number of people attracted quickly exceeded ARPANET. A small number of UNIX platforms have Arpanet. PDP-10 starts with UNIX's Hacker culture, but it is not very pleasant. PDP-10 Hacker feels that Unix's helpers are newers who don't understand, compared to their complex gorgeous, fascinating LISP with ITS, C and UNIX simply raw funny. "A group of barbarians wearing the beast tacine ax" they mused. At this time, there was another new trend of new trend. The first PC appeared in 1975; Apple Computer was established in 1977 to grow fast. The potential of micro-computers has attracted another young Hackers. Their favorite programming is Basic. Because it is too simple, the death loyalty of PDP-10 and UNIX fans use it at all, can't afford it using it. Translation: This group of Hacker has a certain understanding, his name is Bill Gates, which was originally to develop Basic Compiler at 8080. End of ancient times

In 1980, there were three Hacker culture in development, although there was any contact and communication, but it was also played. Arpanet / PDP-10 culture, playing Lisp, Macro, TOPS-10 and ITS. UNIX and C supporters use a telephone line to play their PDP-11 with the VAX machine. There is also another group of non-order micro-computer fans, committed to the civilian technology civil society. The ITS culture (that is, Mit Ai Lab is also said to reach the whole day, but Wu Yun gradually shrouded this laboratory. ITS decently, the PDP-10 gradually passed, and someone started to leave the laboratory to open the company and commercialize the technology of artificial intelligence. Mit Ai Lab does not stop the high salary angle of the new company, and SAIL and CMU have also encountered the same problem. Translation: This situation has a detailed description in the GNU Declaration, please refer to: (Special thanks to Chuhaibo by Aka) http://www.aka.citf.net/magazine/gnu/Manifesto.html fatal one From the coming, 1983 DEC announced: In order to focus on the PDP-11 and VAX production line, it will stop producing PDP-10; ITS did not work, because it could not be ported to other machines, or said that no one is at all. Berkeley Universty modified UNIX runs very smooth in new VAX, is an ideal substitute for ITS. People with vision can see that under the fast-growing microcomputer technology, UNIX is a chance to go sooner or later. Almost at this time, Steven Levy completed the `` Hackers '' this book, the main information source is the story of Richard M. Stallman (RMS). He is Mit Ai Lab leader character, resolutely opposes the research results of the laboratory. Stallman then founded Free Software Foundation, and fully put into a high quality free software. Levy describes his mourning pen to describe him is `The last true harboer ', but it is good to prove that Levy is completely wrong. Translation: Richard M. Stallman's related deeds please refer to: http://www.aka.citf.net/magazine/gnu/cover.htmstallman's grand plan can be said to be the epitome of Hacker culture in the 1980s - in 1982 he Start constructing a compatible but new operating system with UNIX, written with C and is completely free. The spirit of the entire ITS is integrated in a new, unix and VAX machine via RMS. Micro-computer and regional networks have begun to affect Hacker culture. Motorola 68000 CPU plus Ethernet is a powerful combination, and several companies have successfully established the first generation of workstations. In 1982, a group of Berkeley's Unix Hacker set up Sun Microsystems, and their abacus played: putting the Unix rack in a machine that is 68000 CPU, and the best costs in line with most applications. Their high-looking guilty has established a new milestone throughout the industry. Although the workstation is still too expensive for individuals, the workstation is really cheap than mini computers in the company and school. In these institutions, the workstation (almost one person) quickly replaced the old huge VAX and other TimeSharing machines. Translation: The workstation of the workstation produced by Sun is a SPARCStation that is self-developed by the Motorola 68000 series and to 1989.

Private UNIX era

In 1984, AT & T was dissolved, UNIX officially became a commodity. The HACKER culture was divided into two categories, and a class is concentrated on Internet and Usenet (mainly running UNIX mini computer or workstation, and another type of PC fans, most of them are not connected to the Internet. ※ Translation: Taiwan In front of 1992, players mainly exchange information, but there are regional restrictions, which are also very difficult to develop. Sun with other manufacturers have opened another beautiful new world for Hacker. The workstation demand is the high-efficiency drawing and network. In the 1980s, Hacker is committed to writing software, challenging and breakthroughs for workstation, and forces these functions to one hundred and one. Berkeley developed a set of unix support from ArpaNet Protocols, so Unix can easily connect to the network, the Internet also grows more rapidly. In addition to Berkeley makes UNIX network functions significantly, try to develop a set of graphics interfaces for the workstation. The most famous X Window is developed by MIT. X Window's key key is fully publicized, showing Hacker consistent style and spreads to the Internet. X successfully kills an example of other commercial graphics interfaces, has a profound inspiration and impact on the development of UNIX after several years. A few ITS dead loyalty is still in arbitrary, until the last ITS in 1990 is always turning into the plane; those dead loyalty is only in the end of the end of the Unix.

All of UNIX were split into Berkeley Unix and AT & T two major camps. Maybe you have seen some posters at the time, drawing a titanium wing fighter full speed away from an explosion, printed with the AT & T's logo. Berkeley UNIX supporters have metapuls that the anti-ruthless corporate empire. In the case of sales, AT & T Unix can't drive BSD / Sun, but it won the war of standards. By 1990, AT & T and BSD versions were difficult to distinguish, because each other has new inventions using each other. With the since the 1990s, the position of the workstation gradually be threatened by new inexpensive high-end PCs, they mainly use Intel 80386 series CPU. The first HACKER can buy a powerful computer that is equivalent to a mini computer in ten years, running a complete UNIX, and can easily connect the network. Immersed in the MS-DOS world, the frogs still don't know, from the early days, only a few people are interested in micro-computers. At this time, the number of people playing DOS and Mac has exceeded the so-called "network nation" culture, but They have never been there any climate or what aircraft, although there is a good job, but there is no stable development of unified cultural traditions, the terms dictionary, the legendary story and mythical history. They don't have a real network, can only get together in a small BBS station or some failed network such as Fidonet. Companies that provide Internet services, such as Compuserve or Genie business, increasingly booming, and the fact that Non-UNIX operating system is not included in the network, and there is little Source to flow on the network, and therefore cannot form cooperative development software. atmosphere. The main force of Hacker culture is spread around the Internet, almost tells the culture of UNIX. They don't care about what after-sales service, they want to be better tools, more online time, and a cheap 32-bit PC.

The machine is available, you can go online, but where is the software to find? Business Unix is ​​worthy, a set of thousands of oceans ($). In the early 1990s, the company began to sell AT & T to the BSD UNIX to the PC. No matter whether it is, the price does not fall, and it is more important to have the original code. You can't also modify it, in line with your needs or share it to others. Traditional commercial software does not really want to give Hacker. Even if Free Software Foundation (FSF) did not write Hacker's operating system, the RMS promised GNU operating system - Hurd said a long time, until 1996 did not see shadow (although the software started in 1990, FSF software It is already performed in all UNIX platforms).

Early free unix

In this empty window, a student in 1992, a Finnish Helsinki University, LINUS Torvalds, started to develop a free software Unix Kernel on a 386PC, using FSF's program development tools.

He quickly wrote a simple version, throwing it to everyone to share it, attracting a lot of Hacker to help develop Linux - a full-featured UNIX, completely free and accompanied all the original code. The biggest features of Linux are not functional advanced but brand new software development models. Until the success of Linux, everyone believes that such complex software like the operating system, it is possible to work closely with a development team, and coordinate with each other can be written out. The commercial software company and the 1980s of Free Software Foundation are this development model.

Linux is very different from the former. At first it was a large group of Hacker coated together on the web. There is no strict quality control and high-level decision development policy, relying on weekly issued a new version for everyone to download test, the tester will put BUG and PATCH to the next version. A brand new product selection, to the rapid development model of Railu Case. Let the guys are dumbfound, the Dong Xiu is remembered, the Linux runs out.

At the end of 1993, Linux development tends to be mature and stable, and the commercial application software is gradually ported to Linux with high UNIX. However, small UNIX manufacturers are also closed because of Linux's emergence - because no one wants to buy their things. Survivors are all based on the full rare code of UNIX-based UNIX, and Hacker is developed to continue to survive.

Hacker culture, once predicted is about to be destroyed, but in the world that is flooded in commercial software, the thorns, the road is blue, and there is another heaven and earth.

Network big explosive era

Linux can grow rapidly from a fact: Internet is popular, the early 1990s is coming, the emergence of the world-wide web, so that the speed of the Internet grows, it is a suffocating feel.

The BSD project was officially announced in 1994, and Hacker used the main free Unix (Linux and some derivatives of some 4.4BSD). The Linux CD-ROM pin is very good (good to sell pancakes). Hackers have been mainly active in Linux and Internet in recent years. World Wide Web Let Internet become the world's largest transport medium, many of the 1980s and Hackers in the 1990s and the early Hacker are now operating ISP.

转载请注明原文地址:https://www.9cbs.com/read-103523.html

New Post(0)