Is Milton Friedman an Artist?

The idea of a hacker that Paul Graham paints is very closely related to the idea of a hacker that Steven Levy created. They may not be the exact same (if you use the definition of a “true hacker” in this sense) but they seem like the same idea from different perspectives.

Graham outlines in “The Word ‘Hacker’” that the term hack can mean a well crafted and expert solution to a problem, or it can refer to a shoddily made workaround. In both cases, the one that made the hack – the hacker – is proud of what they have created and effectively solve their solution. This is very in line with the origins of hacking in MIT described by Levy, where the students were hacking out of sheer curiosity of their limits. Whether or not Alan Kotok’s implemented calculator was the most beautifully designed piece of software is up for debate, but it was undeniably the ceiling of the Sistine Chapel for Kotok. Incidentally, this in line with Graham’s description outlined in “Hackers and Painters”, where Graham draws the distinction between a hacker and a computer scientist.

Hackers do not need to know, or necessarily want to know, how computers work, rather, they just want to make something beautiful from their imagination using the software available. It may be a bit more technical, as a toddler is able to make a painting and be considered a “painter”, and a hacker needs more competence to make something that works on a computer, but those building blocks are the only hurdle to overcome. One does not need to know how a CPU works in tandem with the processer and the disk to store and information and make the magic black box work, they just need to look up some coding tutorials on YouTube and they know a thing or two about hacking. They may not have the skills to access any worthwhile database or make a code that works in O(n­3) time to O(n log n), but they have the passion to make something, which is more than enough.

However, the two authors do not define the same hacker. They have overlap, but the specifics are different. Levy’s hackers had more defined rules. They resisted authority. They were married to the open source community. Their works are not for profit.

If we take a glimpse at Graham’s life, these rules are inconsistent. Graham himself sold Viaweb to Yahoo!, a prevalent tech giant at the time, and co-founded Y Combinator, an organization focused on giving money to creative tech solutions to hopefully find a successful product. This goes totally against the aforementioned rules outlines by Levy.

But this shows an interesting dynamic in the difference of hackers. While Levy’s hackers try to be self-sufficient, Graham’s use authority to make capitol gains. He recognizes that technology is not just something to experiment with, but something that can be used for profit. Which isn’t to say it makes the work hackers do less passionate or less genuine, but it allows that incentive to be a part of the lifestyle. In fact, not keeping everything open source is almost essential for a unique market advantage.

Not to delve too much into politics, but the difference between Levy and Graham can be analogous to communism and capitalism, respectfully. This is not to say any writer is more right or has a better definition of hackers, but the beliefs are not unique to the emerging technology. Levy’s hackers want to advance the tech community as a whole and help each other become better hackers, but Graham’s hackers do what they want because they want to, which can be a bit selfish, but the selfish incentive can also drive the community forward.

Graham’s idea of a hacker doesn’t change my mind of a hacker so much as it does lets me understand hackers more. That is, hackers don’t need to follow a set of rules and beliefs to be a “real” hacker. Hackers have the freedom and ability to define themselves however they want to be. In the current world of technology, there are too many people to place so many restrictions and use elitism to separate the real hackers from the frauds. As long as somebody has the passion and interest to further their skills at technology, then they should surely be able to pursue those. Beauty is in the eye of the beholder, and working in tandem with Graham’s painter analogy, if somebody likes what they have created, no matter how juvenile or manufactured, then it should be valid hacking.

In regard to my desirability to be a hacker, I think Graham’s perspective drives that forward. It’s much more welcoming, which goes a long way for anyone less than the top tier. While I don’t consider myself inept at programming, I recognize my peers with better skills than myself, and it can negatively affect my attitude and self-worth. However, I don’t need to be the best to feel useful, I just have to enjoy my own creations and hope someone else does too, and that goes a long way with my personal passions of hacking and painting.

GAIMZ

Following the blog’s timeline, the next wave of hackers were known as the “game hackers”. They used their programming skills not for traditionally “useful” applications, like creating a digital calculator, a la Alan Kotok, or accessible software for the everyday person, a la Micro-soft’s BASIC, but were instead in a position to create software for leisure. Computer games were not a novel concept, with primitive games like Spacewar! developed on PDP-1 way back in the 60s, but to play such a game required having the hardware itself, uncommon for the common man. Due to the hardware constraints of the personal computers, games were often limited to text-based adventures, such as Zork or Adventure. The latter, however, become the inspiration for Ken and Roberta Williams, creating the next generation of hackers.

Ken and Roberta Williams, along with a team of 5 programmers, created Mystery House, a computer game that featured a narrative story, much like Adventure did, as well as dedicated graphics. When they talked to a software distributor, Programma, they were given the ultimatum of receiving a fraction of the revenue in royalties, to which they denied and published the game themselves, keeping all the profit. This led to the creation of Sierra On-Line, a pioneer in computer gaming publishers, leading the way for other game publisher companies to follow.

Becoming a game developer required expertise in programming and netted a large return in investment if the final product was successful, and with the small catalog of games at the time, it was likely that a fun and competent game would succeed. Through the publishing company, the sales could be handled by people that were better suited to market their product, allowing the programmer to do what they do best – program. Programming was becoming lucrative in a way that was not previously possible, inspiring a new wave of programmers that did not necessarily do it for the love of computers, but for the expectation of money.

Although there is a clear difference between the game hackers of new and the historical “true hackers”, the two groups are not mutually exclusive and can coexist. Much like any hobby, there will be purists and the mere “hobbyists” that don’t have the same appreciation of the craft but still profit of it. In music, this can be illustrated using modern classical composers, like Notre Dame’s own Alex Mansour, versus modern DJs, that themselves question whether they are “just posers pushing buttons” (Diplo). However, despite massive success, these DJs and producers still value their own creations and protect their intellectual property, whether selfish or not.

We can see this hacker ethic survive in the modern world of proprietary software through the open source crowd, from small form groups like Notre Dame’s Linux Users Group, to entire communities that use the internet to exchange their ideas and creations (Source Forge, Git, etc). One can argue that this explosion of commercial software is responsible for inspiring those to follow the hacker ethic. As a matter of fact, I will argue that right now!

Having the marketplace of software restricts information and universal knowledge, but that does not mean the true hacker ethic dies. In certain ways, it makes the true hacker ethic even stronger and makes those that subscribe to it even more passionate. Hackers are able to unlock games hidden behind DRM protections faster and faster, often with improved performance, exemplifying the idea that stronger protections only create smarter “criminals”. Open source alternatives to software are becoming more commonplace, see Microsoft Office versus LibreOffice, mirroring Kotok’s aim to port the calculator to the computer.

Additionally, the world does not work in absolutes. A programmer can have the “true hacker” ethic in their minds and allow it to influence their creations, but they can also act in the commercial world. Even this behavior is being more accepted in the commercial world. People are free to mod games, creating extra content to the game without the restriction of upper management, and these mods are fueled by passion of the game. While these used to be supplemental downloads the player would have to seek, services like Steam are integrating them into their platforms, giving the modders a marketplace, whether that means charging a small fee (unpopular by today’s standards, but justified) or just exposure. While some companies can become “corrupted by the ring” – Nintendo for example – some game companies are beginning to embrace it, like SEGA, who hired a team of developers that made Sonic the Hedgehog fan games to create Sonic Mania, an official installment to the series, using SEGA’s own resources to develop. They saw the passion their games inspired and gave those inspired the ability to create personal works of art, as well as the commercial success.

Whether it’s better to be a “professional programmer, … the goal-oriented … responsible engineer” or the programmer with “love for [computing] in [your] heart” and “hacker perfectionism in [your] soul” is up to the individual programmer. Whatever makes them happy and feel fulfilled should be the route they go. The important thing to foster a whole range of perspectives to programming. No gatekeeping. No extremists. Just a beautiful synthesis of the different programming mentalities. Afterall, if there is no authority to combat, how would the true hacker feel accomplished?