Managers and hackers both vary, but there are some things that come up again and again. That’s why this document exists. I am concerned with a particular kind of clash that most hackers have with many managers—a conflict that is more easily resolved if both parties understand each other.
What are some of the common differences between managers and hackers? There are several, but let me list five important ones:
|Tends to be very concerned with morality, and wants to connect with society and contribute. Rises to positions of responsibility, not only in business, but in church and volunteer organizations. Lives by responsibility and duty.||Intent on cultivating knowledge and skill. Rises to tremendous levels of competency with technology and other things. High level of discipline used to continually refine abilities.|
|Thinks concretely. Good at small talk, and at the logistical details needed to run a business.||Thinks abstractly. Good at deep discussions, and thinking about the hard concepts needed to work with technology.|
|Measures own contribution to society by the extent to which he adds to rules and sees that people live by following rules. Tends to equate rules with morality or the good of society.||Far more aware of the limitations of rules. Does not equate rules with morality or the good of society. Very likely to notice rules that are hurting your company—yes, they do exist, and they’re more common than you think.|
|Closely resembles about 40% of the population; most people have dealt with many similar people before, and can easily understand managers.||Thinks in an uncommon way found in perhaps 5% of the population; will encounter many people who have never known well anyone who is similar. Can’t count on other people understanding him.|
|Is such a dominant force in human society that he can easily forget that others might be different. Works well with people because of how much he holds in common with so many others. Needs to work at understanding people like hackers.||May have intense powers of concentration. Prizes an offbeat and clever sense of humor. At times, painfully aware of inconsistencies that are invisible to the people who are acting hypocritically. Marches to the beat of a different drummer, and needs to work at understanding people like managers.|
Questions and Answers:
Section 1: Basic Understanding
- 1.1: Won’t my hacker break into my computer and steal my trade secrets?
- Point of clarification. There are two communities of people that call themselves ‘hackers’.
One of these groups is the one you’ve heard about—those who take pride in breaking into other people’s computers. That is all the media understands ‘hacker’ to mean, but there is another community, an older and much more interesting one, that is insulted by being mistaken for the first community. They are as insulted as an automotive engineer would be if the media said ‘automotive engineer’ when they meant ‘car thief’, and the engineer learned through bitter experience that, whenever he told people he was an automotive engineer, people thought he was only a car thief.
Your hacker is an automotive engineer, not a car thief. He is a hacker because he loves computers, and loves to do impressive things with them. He doesn’t want to steal your trade secrets, and it would be good manners of you not to confuse “automotive engineer” hackers with “car thief” hackers—whom he refers to as ‘crackers’, or the extremely pejorative ‘script kiddies’.
- 1.2: Was it a good idea to hire a hacker?
- It depends on the job. A hacker can be dramatically more effective than a non-hacker at a job, or dramatically less effective. Jobs where hackers are particularly good are:
- Systems administration
- Web-related development
Jobs where hackers are particularly bad are:
- Data entry
- “Computer operator”, where the “computer operator” has to use software (especially Microsoft software) that he can’t improve.
More generally, a job that requires fast and unexpected changes, significant skill, talent, and is not very repetitive will be one a hacker will excel at. Repetitive, simple jobs are a waste of a good hacker, and will make your hacker bored and frustrated. No one works well bored and frustrated.
The good news is, if you get a hacker on something he particularly likes, you will frequently see performance on the order of five to ten times what a “normal” worker would produce. This is not consistent, and you shouldn’t expect to see it all the time, but it will happen. This is most visible on particularly difficult tasks.
- 1.3 Wait, you just said “ten times”, didn’t you? You’re not serious, right?
- Yes, I am serious; a hacker on a roll may be able to produce, in a period of a few months, something that a small development group (say, 7-8 people) would have a hard time getting together over a year. He also may not. Your mileage will vary.
IBM used to report that certain programmers might be as much as 100 times as productive as other workers, or more. This kind of thing happens.
- 1.4 How should I manage my hacker?
- The same way you herd cats. It can be quite confusing; they’re not like most other workers. Don’t worry! Your hacker is likely to be willing to suggest answers to problems, if asked. Hackers are known for coming together and producing impressive software without any business people to tell them what to do. That’s how Perl was produced. And Linux. And quite a few other things, great and small. Most hackers are nearly self-managing.
- 1.5 I don’t understand this at all. This is confusing. Is there a book on this?
- There are several books that explain important pieces of the puzzle, and some of them are listed in a reading list below. If you read from the list and ask your hacker to help you connect the dots, you’ve got a good chance at understanding your hacker much better.
Section 2: Social issues
- 2.1: My hacker doesn’t fit in well with our corporate society. She seems to do her work well, but she’s not really making many friends.
- This is common. Your hacker may not have found any people around who get along with hackers. You may wish to consider offering her a position telecommuting, or flexible hours (read: night shift), which may actually improve her productivity. Or, even better, hire another one.
- 2.2: My hacker seems to dress funny. Is there any way to impress upon him the importance of corporate appearance?
- Well… let’s look at your view of clothing first, so that you’ll have a better chance at understanding how your hacker sees things differently.
You believe in showing respect for the company and those you work with. To you, much of that respect revolves around little details. These details are to you much of the substance of respect—such as that classy suit you wear to the office. So when a hacker wears jeans and a t-shirt to work, he must be showing disrespect, right?
Not really. Those jeans—kneeholes and all—are what he wears to see his best friend, whom he respects deeply. If your hacker happens to be a Christian, he may wear jeans and a T-shirt to church on Easter. I sometimes do, and when I dress up for church, it is more to avoid distracting other churchgoers than any need of fancy clothes in order to worship God. Hackers look past appearances, and it seems strange to them that you think they need uncomfortable clothes to work well: if it’s what’s inside the clothing that matters, why not wear something comfortable and be able to concentrate better?
If your hacker isn’t dressing up, how can he still respect your company? He works hard, solves problems, and probably thinks about ways to help your company be more productive—even when he’s at home. If he wants to wear comfortable clothing at work, it’s not disrespect; he just understands what IBM, Microsoft, and Ford all recognize: employees are most productive when they choose what to wear—not their company. If you ask your hacker respectfully, he’ll probably wear clothing without any holes, and might even dress up for a few special occasions.
Your suit is a professional asset. It helps other people see your professionalism. Your hacker’s t-shirt is also a professional asset. It’s part of a culture that judges a person by what’s inside his clothing, and he works better when comfortable. He doesn’t try to get you to dress like him; why don’t you extend the same courtesy to him?
- 2.3: My hacker won’t call me by my title, and doesn’t seem to respect me at all.
- Your hacker doesn’t respect your title. Hackers don’t believe that management is “above” engineering; they believe that management is doing one job, and engineering is doing another. They may well frequently talk as if management is beneath them, but this is really quite fair; your question implies that you talk as if engineering is beneath you. Treat your hacker as an equal, and she will probably treat you as an equal—quite a compliment!
- 2.4: My hacker constantly insults the work of my other workers.
- Take your hacker aside, and ask for details of what’s wrong with the existing work. It may be that there’s something wrong with it. Don’t let the fact that it runs most of the time fool you; your hacker is probably bothered by the fact that it crashes at all. As your customers will be—consider your hacker to be an early warning system. He may be able to suggest improvements which could dramatically improve performance, reliability, or other features. It’s worth looking into.
You may be able to convince your hacker to be more polite, but if there appear to be major differences, it’s quite possible that one or more of your existing staff are incompetent by his standards. Note that hackers, of course, have different standards of competence than many other people. (Read “different” as “much higher”.) Is this necessarily appropriate? All people have weaknesses. It would perhaps be nicer if hackers were more charitable to people who can’t match their talent, but you’re lucky to have someone on staff who’s competent enough for this to be a problem.
Section 3: Productivity
- 3.1: My hacker plays video games on company time.
- Abraham Lincoln said, “If I had ten hours to chop down an oak tree, I’d spend the first eight sharpening my axe.”
Some jobs are done best by getting your hands dirty immediately: if you hire a kid to rake your leaves, you probably want him to start raking as soon as he arrives. But if you contacted a building contractor to make a new office building in the morning, and he was pouring concrete by the end of the day, you would not be impressed—at least not in a good way. Something is very wrong: there are all sorts of things that need to happen first. If your contractor begins work by pouring concrete, you will end up paying for some very expensive mistakes that could have been completely avoided by simple preparation.
Your hacker is probably honest, too honest to start off by writing poor-quality code “so my manager will think I’m working.” He’d rather be productive and spend two weeks preparing rather than two years fixing needless mistakes.
Perhaps it would be easier if hacker ways of preparation coincided with what you do when working—writing memos or something like that. But there is an elusive productive zone, and your hacker is doing whatever he can to gain that productivity. I often write best after taking meandering walks—and, if you have difficulty believing that walks are a way to produce something good, I’d encourage you to read A Dream of Light—which, walks and all, took me very little time to write. I averaged over ten times the normal speed of a professional writer. Your hacker who plays games on company time is using the same areas of his mind as I did. Your hacker is sharpening his axe, and it’s a good idea for him to do so.
Hackers, writers, and painters all need some amount of time to spend “percolating”—doing something else to let their subconscious work on a problem. Your hacker is probably stuck on something difficult. Don’t worry about it.
- 3.2: But it’s been two weeks since I saw anything!
- Your hacker is working, alone probably, on a big project, and just started, right? She’s probably trying to figure it all out in advance. Ask her how it’s going; if she starts a lot of sentences, but interrupts them all with “no, wait…” or “drat, that won’t work”, it’s going well.
- 3.3: Isn’t this damaging to productivity?
- No. Your hacker needs to recreate and think about things in many ways. He will be more productive with this recreation than without it. Your hacker enjoys working; don’t worry about things getting done reasonably well and quickly.
- 3.4: My hacker is constantly doing things unrelated to her job responsibilities.
- Do they need to be done? Very few hackers can resist solving a problem when they can solve it, and no one else is solving it. For that matter, is your hacker getting her job done? If so, consider these other things a freebie or perk (for you). Although it may not be conventional, it’s probably helping out quite a bit.
- 3.5: My hacker is writing a book, reading USENET news, playing video games, talking with friends on the phone, and building sculptures out of paper clips. On company time!
- He sounds happy. The chances are he’s in one of three states:
- Basic job responsibilities are periodic (phone support, documentation, et al.) and there’s a lull in incoming work. Don’t worry about it!
- Your hacker is stuck on a difficult problem.
- Your hacker is bored silly and is trying to find amusement. Perhaps you should find him more challenging work?
Any of these factors may be involved. All of them may be involved. In general, if the work is challenging, and is getting done, don’t worry too much about the process. You might ask for your corporation to be given credit in the book.
- 3.6: But my other workers are offended by my hacker’s success, and it hurts their productivity.
- Do you really need to have workers around who would rather be the person getting something done, than have it done already? Ego has very little place in the workplace. If they can’t do it well, assign them to something they can do.
Section 4: Stimulus and response
- 4.1: My hacker did something good, and I want to reward him.
- Good! Here are some of the things most hackers would like to receive in exchange for their work:
- Discounts on expensive toys.
The order is approximate, but the most important one is the most difficult. If you can give that to your hacker, in his eyes you will be a cut above most other bosses—and he just might work for you longer.
Try to remember this good thing your hacker just did the next time you discover he just spent a day playing x-trek. Rather than complaining about getting work done, write it off as “a perk” that was granted (informally) as a bonus for a job well done. Don’t worry; hackers get bored quickly when they aren’t doing their work.
- 4.2: My hacker did something bad, and I want to punish him.
- Don’t. 30 years of psychological research has shown that punishment has no desirable long-term effects. Your hacker is not a lab rat. (Even if he were a lab rat, punishment wouldn’t work; at least, not if he were one of the sorts of lab rats the psych research was done on.) If you don’t like something your hacker is doing, express your concerns. Explain what it is that bothers you about the behavior.
Be prepared for an argument; your hacker is a rational entity, and presumably had reasons. Don’t jump on him too quickly; they may turn out to be good reasons.
Don’t be afraid to apologize if you’re wrong. Your hacker will never think less of you if you admit to a mistake. He might be disappointed if you’ve made a mistake and can’t admit it, but he will never look down on you for admitting you were wrong. If your hacker admits to being wrong, don’t demand an additional apology; so far as the hacker is concerned, admitting to being wrong probably is an apology.
- 4.3: I don’t get it. I offered my hacker a significant promotion, and she turned it down and acted offended.
- A promotion frequently involves spending more time listening to people describing what they’re doing, and less time playing with computers. Your hacker is enjoying her work; if you want to offer a reward, consider an improvement in title, a possible raise, and some compliments. Make sure your hacker knows you are pleased with her accomplishments—that’s what she’s there for.
- 4.4: My company policy won’t let me give my hacker any more raises until he’s in management.
- In the Bible, Paul describes roles in the Christian church, and then compares these community members to parts of the human body (I Corinthians 12:14-26, NIV):
Now the body is not made up of one part but of many. If the foot should say, “Because I am not a hand, I do not belong to the body,” it would not for that reason cease to be part of the body. And if the ear should say, “Because I am not an eye, I do not belong to the body,” it would not for that reason cease to be part of the body. If the whole body were an eye, where would the sense of hearing be? If the whole body were an ear, where would the sense of smell be? But in fact God has arranged the parts in the body, every one of them, just as he wanted them to be. If they were all one part, where would the body be? As it is, there are many parts, but one body.
The eye cannot say to the hand, “I don’t need you!” And the head cannot say to the feet, “I don’t need you!” On the contrary, those parts of the body that seem to be weaker are indispensable, and the parts that we think are less honorable we treat with special honor. And the parts that are unpresentable are treated with special modesty, while our presentable parts need no special treatment. But God has combined the members of the body and has given greater honor to the parts that lacked it, so that there should be no division in the body, but that its parts should have equal concern for each other. If one part suffers, every part suffers with it; if one part is honored, every part rejoices with it.
This is a deep insight into human community. It’s not just about religion. Executives, managers, programmers, salespeople, secretaries, and other employees all contribute something fundamental to a company. Janitors? Those people are important? Well, if janitors aren’t important, firethem, and streamline your business. The halls may be a bit stinky with all that rotting trash, and two of the secretaries may sneeze every time someone walks by and kicks up dust. Your insurance covers emergency treatment and rabies shots when a rat creeps out of a mound of garbage and bites you, right? Your star saleswoman couldn’t close a key sale because she was in the hospital with food poisoning after… wait a minute. Maybe those janitors we all look down on deserve a second look. Maybe they contribute more to the physical well-being of other employees than almost anyone else you have on staff. Maybe they’re important after all.
Eye, hand, stomach, and sturdy back muscles all contribute something. Sometimes the observation—”My group adds something unique and vital, something that no other department gives.”—to a conclusion that is not justified: “My group’s contribution to the company is better and more important than anyone else.”
This conclusion also affects how companies allocate money: the people who set salaries believe they’re the most important employees. Because it’s management who sets the salaries, the belief:
A manager is a more important employee than a non-manager
creates a policy like
Every manager must be paid more than any non-manager
No matter how much an employee does for the company, there’s an artificial limit on how much you can reward him unless he gives up his work, which he is good at, and becomes a manager instead.
If that’s what you believe—a prejudice that would shock any true leader—then I don’t think I can help you much. I would simply encourage you to finish the job. Send a memo out to all employees saying:
We believe that every manager makes a more important contribution to this company than any non-manager. If you’re not a manager, you’re only a second-class citizen with our company. If you don’t like this, you can leave.
And be ready for an exodus. Your hackers won’t be the only ones to decide you’re too stupid to work with. They’ll just be the first.
Does that sound unattractive? You do have a better alternative. Your hacker can quite possibly earn $200/hour or more, if he wants—his talents are worth it. If your company policy imposes a salary ceiling on non-managers, your company policy is broken. Fix your company policy, find a loophole (say, a consultant given a contracted permament consulting position with benefits), or else get ready to have one of your most productive employees leave because your company policy is broken and you couldn’t work around it.
- I can’t believe the hacker on my staff is worth as much as we’re paying.
- Ask the other in the staff what the hacker does, and what they think of it. The chances are that your hacker is spending a few hours a week answering arcane questions that would otherwise require an expensive external consultant. Your hacker may be fulfilling another job’s worth of responsibilities in his spare time around the office. Very few hackers aren’t worth what they’re getting paid; they enjoy accomplishing difficult tasks, and improving worker efficiency.
Section 5: What does that mean?
- 5.1: My hacker doesn’t speak English. At least, I don’t think so.
- Your hacker is a techie, and knows a number of powerful concepts that most English-speakers don’t know. He also knows words for those concepts. Guess what? The concepts are unusual concepts, and the words are unusual words. He doesn’t use standard words for many things because there aren’t any standard words to explain the cool things he does.
Your best bet is to pick up a copy of TNHD (The New Hacker’s Dictionary). It can be found at http://catb.org/jargon or from a good bookstore. If you have trouble understanding that reference, ask your hacker if she has a copy, or would be willing to explain her terms. Most hackers are willing to explain terms. Be ready for condescension; it’s not intended as an insult, but if you don’t know the words, she probably has to talk down to you at first to explain them. If you’re bothered by this, think about explaining to a non-professional how to keep a project on task—if you can’t use any words longer than five letters. That’s what your hacker is doing when she tries to explain technical concepts in non-technical words. Please understand if she sounds a little condescending.
It’s a reasonably difficult set of words; there are a lot of them, and their usage is much more precise than it sounds. Hackers love word games.
It is also possible that English is not your hacker’s native language, and that it’s not yours either. Feel free to substitute a more appropriate language.
- 5.2: I can’t get an estimate out of my hacker.
- This is easier to understand with an analogy. Imagine two situations:
In the first situation, you drive for work on the same roads, at the same time, as you have for the past five years, and listened to the traffic report in the shower.
In the second situation, you are out in the middle of nowhere, travelling to see a distant relative, and you realize that you’ve forgotten to buy a hostess gift for the people you’re driving to visit. You stop by a gas station to ask where you can find a gift shop which would sell a dolphin statuette. The attendant says, “Take the road you’re on, and turn off onto the second side street you see. Keep on going until you hit the second stop sign after John’s general store. It’s in the third town you’ll see.”
Now, in both cases, think about answering the question, “How long will it take?”
In the first case, you probably know the answer: “Twenty-six minutes, twenty-two if I hit the lights right.” In the second case—well, given that you don’t know how long the route is, what the speed limits are, or how you will find the sign once you reach the right town, the best answer is, “I don’t know.”
When you ask a hacker how long a task will take and he says, “I don’t know,” he isn’t being difficult. Fixing a broken network, when you don’t know why it’s down, is much more like the second situation than the first. You don’t need to throw a pity party for your hacker because he has to work in unfamiliar territory and doesn’t even know how long a task will take. He doesn’t look at it that way; he likes the challenge. But it does mean that he accepts tasks before he knows exactly how he’ll do them, and he is responsible enough to say “I don’t know,” and not tell you something he’s simply made up. Your hacker is a driver who thrives on finding his way in unfamiliar territory, with washed-out bridges and incomplete directions among the surprises. You might be glad you have someone who likes that kind of assignment.
Your hacker hasn’t figured out how hard the problem is yet. Unlike most workers, hackers will try very hard to refuse to give an estimate until they know for sure that they understand the problem. This may include solving it.
No good engineer goes beyond 95% certainty. Most hackers are good engineers. If you say that you will not try to hold him to the estimate (and mean it!) you are much more likely to get an approximate estimate. The estimate may sound very high or very low; it may be very high or very low. Still, it’s an estimate, and you get what you ask for.
- 5.3: My hacker makes obscure, meaningless jokes.
- Another one that’s a little hard to explain.
Imagine that you are visited by a brilliant wayfarer. He strives to understand those around, silently tolerates a great many things that seem strange to him, and brings with him cultural treasures unlike anything your culture has to offer. One day, he tries to share some of them with you. Should you be bothered?
That’s what’s happening when your hacker tells you obscure technical jokes. He could be trying to make you feel stupid, but let’s be charitable. Your hacker is uncommonly intelligent—he might be a member of Mensa. Intelligent people think a little bit differently, and a genius may seem like someone from another world. Your hacker probably understands you better than you understand him—and when he shares jokes with you, he’s giving you a chance to see something special. If you feel brave, you might even ask him to explain some of them.
But don’t be bothered when he tells you jokes that take a while to explain. Some of them are quite interesting.
- 5.4: My hacker counts from zero.
- So does the computer. You can hide it, but computers count from zero. Most hackers do by habit, also.
Section 6: Is there anything else I should know?
- 6.1: I’ve found this document to be tremendously helpful. Is there anything I can do to say thank-you?
- Wonderful of you to ask, and you certainly can. There are two authors who’ve contributed to this document, an original and a revision author. Both would appreciate cash donations (e-mail the original/revision authors for details). The revision author would be very happy to receive a link to his home page: CJS Hayward (Browse around and see what he has to offer!)
You might also consider buying a couple of books through the links on these pages; you get cool books, and the authors get pocket change. 🙂 The books listed in the original version will give money to the original author, while the books added in the revision will give money to the revision author.
If you’d like to give something to one of the authors, but don’t know which, why not flip a coin?
- 6.2: Are there any books that will help me understand my hacker?
- Excellent question. Yes, there are. The following list is suggested:
- Please Understand Me or Please Understand Me II
What I said above about common manager/hacker differences was drawn from Please Understand Me as well as experience. Most hackers are intuitive thinking types, while managers who are confused by hackers tend to be sensate judging types. If you’re in a hurry, buy Please Understand Me and read the descriptions for sensate judging and intuitive thinking types. You may find them tremendously helpful in understanding hackers. I’ve found them tremendously helpful in understanding managers.
Please Understand Me came out in the 1970s and describes what people are like. Please Understand Me II came out in the 1990s and describes both what people are like and what they can do. (It’s about twice as long.) I prefer Please Understand Me.
- The New Hacker’s Dictionary
Read the introduction and appendices; they’re worth their weight in gold. Then read a definition a day—you’ll learn a lot. This book is probably the #1 hacker classic, and provides an invaluable asset into understanding hacker thought. Don’t worry if parts of it are hard to understand—you’ll still learn something, and your hacker can probably explain the harder parts.
- Stranger in a Strange Land or Firestorm 2034
Stranger in a Strange Land is a classic novel about a person who is raised by Martians and is brought to earth, a Martian mind in the body of a young man. There are not any hackers in this story, but if you can understand the protagonist in this story, you may find it much easier to understand and appreciate your hacker. Think of it as driving an automatic after you’ve learned to drive a stick.
Firestorm 2034 is a story about a medieval genius brought to the 21st century. He is traumatized by his first contacts with computers, but grows to be fascinated, and learns to program. The reader is with him as he understands technology and makes a discovery in artificial intelligence. This book was written to convey insight into certain kinds of people. If you read it, you should find it easier to understand your hacker—and perhaps grasp technology a little better, to boot! It is my second novel.
Ok, why is an unknown author putting his book next to a Heinlein classic? A few reasons:
- It draws heavily on Heinlein’s work.
- It’s less than a third as long as Stranger. To a busy leader, that counts for a lot.
- It’s written by someone who understands technology, and who weaves technology deeply into the story.
- Readers like it. One actually said he liked it better than Stranger.
- There’s less stuff that’s likely to offend you.
- I have been published in more than one respected journal. The editor of the high-IQ journal Ubiquity saw my work, and asked to feature me in their fall/winter 2001 issue—with a biography, a few writings, a painting, and a four dimensional maze. I’m not completely unknown as an author.
But it’s your call which novel to read—and I won’t question your judgment if you choose Stranger.
- Guiding the Gifted Child
This award-winning title is a very practical book because it conveys understanding. It does a good enough job of it to be useful to several different kinds of people. It will help you understand the sort of people who become hackers.
This also is the only book on this list specifically intended to help people guide hacker-like people.
- The Cathedral and the Bazaar
Perhaps this has happened already. Or perhaps it will happen any day.
You try to reason with your hacker, and say, “Windows was made by the heavily funded efforts of a major corporation. Linux was made by some programmers on their spare time, and you can get it for free. Is Linux really as good as Windows?”
Your hacker rolls his eyes, appears to be counting to ten, gives you a very dirty look, and slowly says, “Is the upcoming band performance next door—live, in concert—really as good as this scratched-up CD?”
Your hacker believes that open source software is normally better than Microsoft, and has very good reason to do so. This book explains why—and it may help you to get better software for less money, and put your business in a more competitive position. As far as hacker culture goes, it only illuminates a small part, but it does so very well.
Unfortunately, none of these books was specifically written to explain hacker culture to non-hackers. Fortunately, your hacker can help you connect the dots and put things together. Just ask him!
- Please Understand Me or Please Understand Me II
- 6.3: Has this FAQ been published?
- The original version, in some form, has been bought by IBM DeveloperWorks, which funded part of the work. You could read their version (nicely edited) by following this link (non-functional as of 12/31/01; I’ve contacted IBM requesting a current URL and am waiting to hear back). IBM has also bought another article, the Manager FAQ, a guide to managers for hackers who are frustrated and confused by corporate life. The original author is justifiably happy with his work.
I am working towards publishing the revised and expanded version.
- What’s the copyright status on this? Can I make copies and share it with a friend who’s confused by his hacker?
- You may distribute as many copies of this document as you want. The original FAQ has the following notice:
This document is copyright 1995, 1996, 1998, 1999 Peter Seebach. Unaltered distribution is permitted.
When I let the original author know I was interested in a revision, and asked what the copyright status was, he said it was covered by the Artistic License. All changes in this revision are also covered by the Artistic License, all added material copyright 2001 by CJS Hayward. Distribute freely.
- What’s the author’s e-mail, and what’s the official distribution site?
- The original is officially distributed at http://www.plethora.net/~seebs/faqs/hacker.html by email@example.com, and the revision is at CJSHayward.com/hacker/ by firstname.lastname@example.org.
- Are there any people the revision author would like to thank?
- Yes. CJS Hayward would very much like to thank the original author, Peter Seebach, for writing an excellent FAQ and for giving him permission to modify it.
- Any disclaimers?
- DISCLAIMER: Both authors are hackers. Bias is inevitable.
Revision 1.0—Last modified June 9, 2001