Appearance
Excerpt
Excerpt from Hackers, Heroes of the Computer Revolution. Chapters 1 and 2, by Steven Levy
So Wagner began working on a computer program that would emulate
the behavior of a calculator. The idea was outrageous. To some,
it was a misappropriation of valuable machine time. According to
the standard thinking on computers, their time was too precious
that one should only attempt things which took maximum advantage
of the computer, things that otherwise would take roomfuls of
mathematicians days of mindless calculating. Hackers felt
otherwise: anything that seemed interesting or fun was fodder for
computing--and using interactive computers, with no one looking
over your shoulder and demanding clearance for your specific
project, you could act on that belief. After two or three months
of tangling with intricacies of floating-point arithmetic
(necessary to allow the program to know where to place the
decimal point) on a machine that had no simple method to perform
elementary multiplication, Wagner had written three thousand
lines of code that did the job. He had made a ridiculously
expensive computer perform the function of a calculator that cost
a thousand times less. To honor this irony, he called the
program Expensive Desk Calculator, and proudly did the homework
for his class on it.
His grade--zero. "You used a computer!" the professor told him.
"This CAN'T be right."
Wagner didn't even bother to explain. How could he convey to his
teacher that the computer was making realities out of what were
once incredible possibilities? Or that another hacker had even
written a program called Expensive Typewriter that converted the
TX-0 to something you could write text on, could process your
writing in strings of characters and print it out on the
Flexowriter--could you imagine a professor accepting a classwork
report WRITTEN BY THE COMPUTER? How could that professor--how
could, in fact, anyone who hadn't been immersed in this uncharted
man-machine universe--understand how Wagner and his fellow
hackers were routinely using the computer to simulate, according
to Wagner, "strange situations which one could scarcely envision
otherwise"? The professor would learn in time, as would
everyone, that the world opened up by the computer was a
limitless one.
Explanation
Detailed Explanation of the Excerpt from Hackers: Heroes of the Computer Revolution (Chapters 1 & 2) by Steven Levy
This passage from Steven Levy’s Hackers (1984) captures a pivotal moment in early computing culture, illustrating the clash between traditional academic expectations and the emerging ethos of the hacker mindset. The excerpt focuses on Peter Wagner, a student at MIT in the late 1950s and early 1960s, who wrote a program called Expensive Desk Calculator on the TX-0—one of the first interactive computers. The text highlights key themes in the book: innovation, subversion of authority, the playful yet profound nature of hacking, and the transformative potential of computing.
Context & Background
The Book & Its Purpose: Hackers is a foundational work in tech history, chronicling the rise of the hacker culture from MIT’s Tech Model Railroad Club (TMRC) in the 1950s to Silicon Valley in the 1980s. Levy defines hackers not as criminals (as the term later evolved) but as brilliant, obsessive tinkerers who pushed computers beyond their intended limits for creativity, efficiency, and fun.
The TX-0 & Early Computing: The TX-0 (1956) was an experimental computer at MIT, one of the first to allow interactive programming (unlike batch-processing mainframes). Hackers like Wagner had unprecedented access to it, fostering a culture of experimentation.
The Hacker Ethic: Levy outlines principles like:
- "Access to computers should be unlimited and total."
- "All information should be free."
- "You can create art and beauty on a computer."
- "Computers can change your life for the better." Wagner’s story embodies these ideals—he uses the computer not for practical utility but for exploration and joy, defying institutional norms.
Themes in the Excerpt
Subversion of Authority & Institutional Rigidity
- Wagner’s professor represents the old guard: computers were seen as serious, expensive tools for complex calculations (e.g., military or scientific work). Using one for a "trivial" calculator was wasteful in their eyes.
- The hacker mindset rejects this: "anything interesting or fun was fodder for computing." The TX-0’s interactive nature allowed hackers to bypass bureaucracy (no need for "clearance"), enabling unorthodox creativity.
Irony & Playful Defiance
- Wagner’s program is technically absurd: a million-dollar machine mimicking a $1,000 calculator. Naming it Expensive Desk Calculator is a satirical jab at the system.
- The zero grade symbolizes the generation gap—academia couldn’t yet grasp that computers could be tools of imagination, not just calculation.
The Computer as a Reality-Warping Tool
- The passage emphasizes how hackers used computers to "simulate strange situations which one could scarcely envision otherwise." This foreshadows virtual reality, simulations, and even AI—ideas that were radical in the 1950s.
- The Expensive Typewriter example (turning the TX-0 into a word processor) shows how hackers redefined the computer’s purpose, laying groundwork for personal computing.
The Unseen Revolution
- The professor’s inability to understand mirrors society’s broader lag in recognizing computing’s potential. The excerpt ends with a prophetic tone: "The world opened up by the computer was a limitless one."
- This reflects Levy’s argument that hackers were pioneers of a digital revolution, though their work was often dismissed at the time.
Literary Devices & Stylistic Choices
Juxtaposition
- Old vs. New: The professor’s rigid thinking ("This CAN’T be right") contrasts with Wagner’s visionary playfulness.
- Cost vs. Value: The "ridiculously expensive" computer doing a cheap calculator’s job highlights the paradigm shift—value isn’t just in efficiency but in possibility.
Irony
- Situational Irony: The program’s name (Expensive Desk Calculator) mocks the system that deems it wasteful.
- Dramatic Irony: Readers know computers will become ubiquitous, but the professor is blind to the future.
Rhetorical Questions
- "Could you imagine a professor accepting a classwork report WRITTEN BY THE COMPUTER?" → This engages the reader, emphasizing how unthinkable these ideas were then (but are now mundane).
Foreshadowing
- The mention of "strange situations" and the "limitless" world hints at future innovations (video games, the internet, etc.) that hackers would enable.
Tone & Diction
- Reverential toward hackers: Words like "proudly," "routinely," "uncharted" paint them as explorers of a new frontier.
- Sarcastic toward authority: The professor’s dialogue ("You used a computer!") is framed as close-minded.
Significance of the Passage
Cultural Shift in Computing
- The excerpt marks the birth of hacker culture—a move from computers as institutional tools to personal playgrounds. This ethos later shaped open-source software, Silicon Valley, and the PC revolution.
The Hacker as a Visionary
- Wagner isn’t just writing code; he’s reimagining what computers can do. His work prefigures user-friendly interfaces, creative computing, and even the idea of computers as extensions of human thought.
The Generation Gap in Tech
- The professor’s reaction symbolizes resistance to change—a recurring theme in tech history (e.g., early skepticism about the internet, smartphones). Hackers, Levy argues, drag the future into the present despite opposition.
The Democratization of Computing
- The TX-0’s interactive nature allowed hackers to experiment freely, foreshadowing the personal computer era. Wagner’s calculator program, though "useless" to his professor, represents the power of individual creativity in tech.
Key Takeaways from the Text Itself
- Hacking as Play: The passage shows that fun and curiosity drove innovation more than practicality. Wagner’s program wasn’t "useful" in a traditional sense, but it expanded the boundaries of computing.
- The Computer as a Canvas: The Expensive Typewriter example reinforces that hackers saw computers as multi-purpose tools, not just number-crunchers. This mindset led to word processors, graphics, and eventually the internet.
- The Loneliness of the Pioneer: Wagner doesn’t bother explaining because true innovation is often incomprehensible to contemporaries. This is a common trope in stories of genius (e.g., Tesla, Jobs).
- The Inevitability of Change: The closing line—"the world opened up by the computer was a limitless one"—is Levy’s thesis in microcosm. The hackers’ experiments, though dismissed, were harbingers of a digital age.
Conclusion
This excerpt is a microhistory of the digital revolution, encapsulating the clash between tradition and innovation, authority and rebellion, utility and play. Wagner’s Expensive Desk Calculator isn’t just a quirky program—it’s a symbol of how hackers redefined technology’s role in society. Levy uses this moment to argue that the future is built by those who dare to waste time on the "impossible."
The passage also serves as a metaphor for all disruptive innovation: what seems frivolous or inefficient in one era (e.g., social media, cryptocurrency) often becomes foundational in the next. The hackers of the TX-0 weren’t just writing code; they were writing the rules of a new world.