aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorYuchen Pei <me@ypei.me>2018-06-15 16:55:25 +0200
committerYuchen Pei <me@ypei.me>2018-06-15 16:55:25 +0200
commit9bf8cf3cd80cd5c9aa6ce02bdf5a34f80b30995b (patch)
tree4b2fa45d1b7741bd2d1504bcaf8c71a188ac0a47
parent1b404b78deaecc1dbe5cada7084c4f739da8b669 (diff)
added an mpost
-rw-r--r--microposts/hackers-excerpt.md9
1 files changed, 9 insertions, 0 deletions
diff --git a/microposts/hackers-excerpt.md b/microposts/hackers-excerpt.md
new file mode 100644
index 0000000..2076578
--- /dev/null
+++ b/microposts/hackers-excerpt.md
@@ -0,0 +1,9 @@
+---
+date: 2018-06-15
+---
+
+> But as more nontechnical people bought computers, the things that impressed hackers were not as essential. While the programs themselves had to maintain a certain standard of quality, it was quite possible that the most exacting standards—those applied by a hacker who wanted to add one more feature, or wouldn’t let go of a project until it was demonstrably faster than anything else around—were probably counterproductive. What seemed more important was marketing. There were plenty of brilliant programs which no one knew about. Sometimes hackers would write programs and put them in the public domain, give them away as easily as John Harris had lent his early copy of Jawbreaker to the guys at the Fresno computer store. But rarely would people ask for public domain programs by name: they wanted the ones they saw advertised and discussed in magazines, demonstrated in computer stores. It was not so important to have amazingly clever algorithms. Users would put up with more commonplace ones.
+>
+> The Hacker Ethic, of course, held that every program should be as good as you could make it (or better), infinitely flexible, admired for its brilliance of concept and execution, and designed to extend the user’s powers. Selling computer programs like toothpaste was heresy. But it was happening. Consider the prescription for success offered by one of a panel of high-tech venture capitalists, gathered at a 1982 software show: “I can summarize what it takes in three words: marketing, marketing, marketing.” When computers are sold like toasters, programs will be sold like toothpaste. The Hacker Ethic notwithstanding.
+
+[Hackers: Heroes of Computer Revolution](http://www.stevenlevy.com/index.php/books/hackers), by Steven Levy.