What is Hacking? (Part 2)

Thu, Jan 18

The theme of this second lecture carries over from the first lecture: What is hacking? In this session, we'll further develop the core idea of hacking, looking at its evolution over time. As part of this, we will introduce The Hacker Ethic.  We have two learning goals for today.  By the end of our lecture class, you will:

  1. Understand the historical progression of hacking from the early days of the Tech Model Railroad Club at MIT to the present fixation on Computer Security.
  2. Appreciate the the hacker ethic as a philosophy and set of moral values not just for computing, but life in general for many technology subcultures. 

The digital artifact for today is the Digital Equipment Corporation PDP-11.

The slides for today's lecture are available here.

Read This:

Steven Levy's book Hackers: Heroes of the Computer Revolution is a classic text on the history of computing. For today's lecture, read Chapters 1 and 2

Do This:

Project Group Formation

Form a group of 5 students. One person in your group needs to send a slack message or email to Ellen (ejoyce3@nd.edu) with each group member’s name and email address by 5pm on 1/23.

If you don’t know anyone in the class and need help finding a group, or if you are looking for additional group members, talk to Ellen.


Writing Reflection 00

See the instructions posted on the assignment's page

This writing reflection is due on 1/23 at 5pm.

Watch This: