Open larsbrinkhoff opened 5 years ago
@GuySteele wrote this:
I was a teen-age hacker.
When I was about twelve or so, a lab secretary at MIT who knew I was `interested in science' (it might be more accurate to say `a latent nerd' -- more on that later) arranged for one of the computer hackers there to give me an informal tour. I remember stumbling around racks full of circuit boards and wires, a screeching cabinet that printed a full page every six seconds, and rows of blinking lights; the computer room was crammed full of equipment with no obvious organization. One set of gray cabinets had some trophies and plaques sitting on it: this was the PDP-6 computer that, running a program called MacHack, won prizes playing against human players in chess tournaments. The PDP-6 also had two speakers and a stereo amplifier sitting on top of it. The hacker typed a couple of commands on a keyboard, and the PDP-6 burst into a Bach Brandenburg concerto (no. 6, as I recall).
One part of that tour stands out most clearly in my mind. I was told to sit down in front of a large, round, glass screen and was given a box that had some buttons and a stick on the top. My hacker guide typed another command on the keyboard and, suddenly, green and purple spaceships appeared on the screen! The purple one started shooting little red dots at the green one, which was soon obliterated in a multicolored shower of sparkles. The green ship was mine, and the hacker had expertly shot it down. Years later I learned that this had been a color version of Space War, one of the very first video games.
Remember that this was years before `Apple' and `TRS-80' had become household words. Back then computers were still rather mysterious, hidden away in giant corporations and university laboratories.
Playing Space War was fun, but I learned nothing of programming then. I had the true fascination of computers revealed to me in November, 1968, when a chum slipped me the news that our school (Boston Latin) had an IBM computer locked up in the basement. I was dubious. I had earlier narrowly avoided buying from a senior a ticket to the fourth-floor swimming pool (Boston Latin has only three stories, and no swimming pool at all), and assumed this was another scam. So of course I laughed in his face.
When he persisted, I checked it out. Sure enough, in a locked basement room was an IBM 1130 computer. If you want all the specs: 4096 words of memory, 16 bits per word, a 15-character-per-second Selectric (`golf ball') printer, and a card reader (model 1442) that could read 300 cards per minute. Yes, this was back in the days of punched cards. Personal computers were completely unheard of then.
Nominally the computer was for the training of juniors and seniors, but I cajoled a math teacher into lending me a computer manual and spent all of Thanksgiving vacation reading it.
I was hooked.
No doubt about it. I was born to be a hacker. Fortunately, I didn't let my studies suffer (as many young hackers do), but every spare moment I thought about the computer. It was spellbinding. I wanted to know all about it: what it could and couldn't do, how its programs worked, what its circuits looked like. During study halls, lunch, and after school, I could be found in the computer room, punching programs onto cards and running them through the computer.
I was not the only one. Very soon there was a small community of IBM 1130 hackers. We helped to maintain the computer and we tutored our less fanatical fellow students in the ways of computing. What could possibly compensate us for these chores? Free rein in the computer room.
Soon after that, I developed into one of the unauthorized but tolerated `random people' hanging around the MIT Artificial Intelligence Laboratory. A random hacker is to a computer laboratory much as a groupie is to a rock band: not really doing useful work, but emotionally involved and contributing to the ambience, if nothing else. After a while, I was haunting the computer rooms at off-hours, talking to people but more often looking for chances to run programs. Sometimes `randoms' such as I were quite helpful, operating the computers for no pay and giving advice to college students who were having trouble. Sometimes, however, we were quite a nuisance. Once I was ejected from the Artificial Intelligence Laboratory by none other than Richard Greenblatt, the very famous hacker who had written the MacHack program with which the PDP-6 had won its chess trophies. He threw me out because I was monopolizing the one terminal that produced letter-quality copy. (I was using the computer as a word processor to write customized form letters to various computer manufacturers, asking them to send me computer manuals.) I deserved to be tossed out and gave him no argument. But when you're hooked, you're hooked, and I was undaunted; within a week or two I was back again.
Eventually I got a part-time job as a programmer at MIT's Project MAC computer laboratory. There I became a full-fledged member of the hacker community, and ultimately an MIT graduate student.
Myself:
I started with home computers - VIC20, Atari ST - as a kid. I read all computer related books in the library, and one of them was Guy Steele's Hacker's Dictionary. This book is chock full of information and anecdotes about ITS and PDP-10 computers. I recently got a used copy and reread it, and it brought back some memories. This book must have been at the back of my mind as a budding programmer.
In the mid 1990s, I got access to Usenet groups. At that time, the subject of PDP-10s and ITS would come up every now and then in technical discussions. People remembered them fondly, and it always sounded like exciting technology. This probably added to the mythology spinning in my mind.
Around 2000, there was a spur of ITS activity because there was a cleaned up set of files going around the FTP sites, and people were trying to make a PDP-10 emulator to get it running. I downloaded the files and looked around. I wanted to examine the programs, but they were almost indecipherable. After getting some help, I learned about the file formats and wrote a disassembler running on Linux.
Shortly after this, I was hired by the XKL company to add PDP-10 support to GCC. I worked on that for about two years.
In 2016, I had the idea to convert the instructions for installing ITS on an emulator into an automated script. This initially small script snowballed into what we now have on GitHub.
Thank you for doing this. I just recently discovered this after stumbling across a discussion on Zork and other Infocom Source Code after finally getting around to reading Ready Player One which reminded me of so many things from my early computer days in the late 70s and early 80s. I remember a multi 100 dollar phone bill my mom was giving me a hard time for because I was online on an MIT BBS from Vienna Austria all night.
@SimHacker posted this: