jgd@rsiatl.UUCP (John G. De Armond) (11/09/89)
In article <14468@well.UUCP> kmh@well.UUCP (Katherine Hafner) writes: > > >My name is Katie Hafner and I am writing a book with >John Markoff. The book focuses on "hackers" as the >press has reinvented the word: people who break >into computer systems. The book is intended as a >sequel of sorts to Steven Levy's "Hackers." I am inviting the net to treat this lady with a most deadening silence. She obviously lacks sufficient taste to know that this is exactly the WRONG forum to abuse the meaning of the complimentary term "hacker". It is also the wrong forum to seek the opportunity to glorify illegal and antisocial actions. As an old time hacker, I wear the badge with pride. I started hacking when the term meant hooking 6L6s together to make bistable multivibrators (remember that term?) I greatly resent the prostitution of the term, especially when the goal is a quick buck. And she uses the network built and mantained by the creme-de-la-creme of the hackers to solicit for her techno-smut! Sheez. Lady, you have pissed me off! Source your book elsewhere. (Sorry folks, but she hit a nerve.) John -- John De Armond, WD4OQC | Manual? ... What manual ?!? Radiation Systems, Inc. Atlanta, GA | This is Unix, My son, You emory!rsiatl!jgd **I am the NRA** | just GOTTA Know!!!
saj@chinet.chi.il.us (Stephen Jacobs) (11/10/89)
A nerve is being tweaked for a lot of us. Sure, there's probably a good reason for a book on computer-obsessed vandals. But that book couldn't reasonably be a sequal to "Hackers". How about a book on the computer- obsessed in general? Include as many words & as many good stories about the good guys, and it starts to sound better. The guy who planted the Internet worm is more boring the more you hear about him. The team effort to wipe it out reads like John Le Carre. I don't know the full stories, but at least 3 operating systems (UNIX, HP TODS and Atari GEMDOS) derive from 1 guy fed up with an over-organized project going home and doing it RIGHT (in his opinion) by himself. How about stories about PARC alumni? I'm not saying not to tell about the compu-vandals, just to find the stories of the REAL successors to those "Hackers". Steve J.
rowland@hpavla.HP.COM (Fred Rowland) (11/10/89)
Sure, the press reinvented the word hacker, but they gave it a brand new meaning with criminal connotations. It would be best if the distorted meaning were to die. We certainly don't need another book to perpetuate an insult to people interested in computers and how they work. Forget it. Fred Rowland Hewlett-Packard/Avondale division
mrm@sceard.Sceard.COM (M.R.Murphy) (11/10/89)
In article <509@rsiatl.UUCP> jgd@rsiatl.UUCP (John G. De Armond) writes: +In article <14468@well.UUCP> kmh@well.UUCP (Katherine Hafner) writes: +> +> +>My name is Katie Hafner and I am writing a book with +>John Markoff. The book focuses on "hackers" as the +>press has reinvented the word: people who break +>into computer systems. The book is intended as a +>sequel of sorts to Steven Levy's "Hackers." + +I am inviting the net to treat this lady with a most deadening silence. +She obviously lacks sufficient taste to know that this is exactly the +WRONG forum to abuse the meaning of the complimentary term "hacker". +It is also the wrong forum to seek the opportunity to glorify +illegal and antisocial actions. + +As an old time hacker, I wear the badge with pride. I started hacking +when the term meant hooking 6L6s together to make bistable multivibrators +(remember that term?) I greatly resent the prostitution of the term, +especially when the goal is a quick buck. And she uses the network built +and mantained by the creme-de-la-creme of the hackers to solicit for +her techno-smut! Sheez. + +Lady, you have pissed me off! Source your book elsewhere. + +(Sorry folks, but she hit a nerve.) + +John + +-- +John De Armond, WD4OQC | Manual? ... What manual ?!? +Radiation Systems, Inc. Atlanta, GA | This is Unix, My son, You +emory!rsiatl!jgd **I am the NRA** | just GOTTA Know!!! I usually agree with John's postings, but in this case I disagree. When I started fooling around with computers, the term hacker was used to denote someone who 1) fixed programs that weren't broken, 2) kept trying changes without understanding problems or the program being changed, or 3) built furniture with an axe (or the programming equivalent). The word has changed meaning several times since then. I think that the word will likely change meanings a few more times before it's through. The then that I refer to is when you could program computers that weren't digital. That's what you get for being crusty, there aren't enough wires, knobs, and lights anymore, and surely not enough interesting noises :-(. Disagreeing with Katie, too, the press didn't change the definition of the word. Powerful the fourth estate is, but they just went with the flow. In the case of changing word meanings, we probably all should go with the same flow; it isn't worth getting pissed off over. Mike -- Mike Murphy Sceard Systems, Inc. 544 South Pacific St. San Marcos, CA 92069 mrm@Sceard.COM {hp-sdd,nosc,ucsd,uunet}!sceard!mrm +1 619 471 0655
dbell@cup.portal.com (David J Bell) (11/11/89)
>> >>My name is Katie Hafner and I am writing a book with >>John Markoff. The book focuses on "hackers" as the ^^^^^^ >>press has reinvented the word: people who break ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ >>into computer systems. The book is intended as a >>sequel of sorts to Steven Levy's "Hackers." > >I am inviting the net to treat this lady with a most deadening silence. >She obviously lacks sufficient taste to know that this is exactly the >WRONG forum to abuse the meaning of the complimentary term "hacker". >It is also the wrong forum to seek the opportunity to glorify >illegal and antisocial actions. > >As an old time hacker, I wear the badge with pride. I started hacking >when the term meant hooking 6L6s together to make bistable multivibrators >(remember that term?) I greatly resent the prostitution of the term, >especially when the goal is a quick buck. And she uses the network built >and mantained by the creme-de-la-creme of the hackers to solicit for >her techno-smut! Sheez. > >Lady, you have pissed me off! Source your book elsewhere. > >(Sorry folks, but she hit a nerve.) > >John De Armond, WD4OQC I disagree, John.... She *specifically* noted that the book will deal with the term "hackers" AS DEFINED BY THE PRESS. NOT as defined by polite society. I will keep my mind open on the subject until she proves her intentions by properly discussing it. What better forum than this to gather information? The New York Times, perhaps? That's the whole problem... And I have also been around long enough to feel confortable as a "hacker" in your terms. Although I didn't tie 6L6's together to make bistables. They made much better CW transmitters! Maybe I started later - we used 12AX7's for flip-flops... Dave dbell@cup.portal.com
reid@decwrl.dec.com (Brian Reid) (11/12/89)
In article <509@rsiatl.UUCP> jgd@rsiatl.UUCP (John G. De Armond) writes: >In article <14468@well.UUCP> kmh@well.UUCP (Katherine Hafner) writes: >> >>(a question) > > an angry response I'm an old-time hacker. I've been hacking in assembly language and other fine systems since 1966, and I've built audio amplifiers out of 6L6's, otcal socket and all (though I prefer the more modern 9-pin 6AQ5--smaller and cleaner). I hope that qualifies me as authentic. Some of you USENETters may know me as the person who does the readership and flow measurement for the network; if you've been to a USENIX you may have seen my maps being handed out at the UUNET booth. Also I'm the lead system administrator for decwrl, which is a major net node. I tell you all of this not to gloat or strut, but to ask you to accept my credentials as a lifelong member of "us" and not "them". I happen to know Katie Hafner (she used to live around here before she moved to new York) and I would like to speak up on her behalf to say that she is not at all an evil journalist, although she certainly can occasionally talk like one (as she did in her posting). She's not even a journalist, she's a writer (see--their profession has its carefully-chosen vocabulary, too). Katie, if you're reading this, I want to chastise you for your incorrect use of our hacker's language. I know you can do better. Maybe you should have asked a native speaker to review your message before you posted it. And never, never again use the word "hacker" as a perjorative, regardless of what you think the word means to the tabloid-reading public. "Hacker" is a badge of honor, a rank to be attained, in our world, and anyone who uses phrases like "..still hacking or have outgrown it" is as instantly suspect as somebody who walks into my laboratory wearing a 3-piece suit asking if my computer is IBM compatible. Also, I believe from what I know of Katie's book that its publication will be a service to the hacker community and not an attack on it. Now, here's the question that I think Katie was trying to ask but doesn't speak our language well enough to ask: My name is Katie Hafner. I'm working on a book about people who abuse computer technology. For example, Kevin Mitnick, who is in jail right now for being caught in posession of stolen credit card numbers (which, incidentally, he was using to break into DEC's E-NET and cause trouble). I'm trying to get a sense of whether or not the hacker community considers Mitnick and people like him to be outlaws. If you don't think Mitnick is an outlaw (many don't), then howabout Hans Huebner (Pengo), who penetrated various systems and sold the results to the KGB. A person who breaks into a computer network and steals money is clearly on the wrong side of the law; a person who breaks into the same network and just joyrides may well not be. I'd like to hear from you about where you think the boundary is. My own answer to my version of Katie's question is that we hackers, like all professionals, have an obligation to respect the rights of others and an obligation to help further our profession. A hacker who goes on the wrong side of the law is no different from a veterinarian or a bible salesman who uses his professional skills for unethical gain. The fact that the perpetrator happened to be a hacker rather than a woodcarver or a journalist is not relevant. Brian Reid
colbath@cs.rochester.edu (Sean Colbath) (11/12/89)
In article <227@jove.dec.com> reid@decwrl.dec.com (Brian Reid) writes: > <deleted description of flames about writing about hackers, between > John De Armond and Katherine Hafner> > >I happen to know Katie Hafner (she used to live around here before she moved >to new York) and I would like to speak up on her behalf to say that she is >not at all an evil journalist, although she certainly can occasionally talk >like one (as she did in her posting). She's not even a journalist, she's a >writer (see--their profession has its carefully-chosen vocabulary, too). I think that Brian Reid has hit upon part of the problem - that of language and the phrasing of Kate's posting. When I read Kate's article, I was rather angry too - I have been "hacking" since 8th grade (I am 22 now, and hoping to go on to Grad school in CS) and (for the most part ;-) my activities have been entirely honorable. I, too, resent the fact that the press has co-opted the word "hacker" to mean something bad, much in the same vein that "christian" is used as a pejorative these days. > Katie, if you're reading this, I want to chastise you for your incorrect use > of our hacker's language. I know you can do better. Maybe you should have > asked a native speaker to review your message before you posted it. And > never, never again use the word "hacker" as a pejorative, regardless of what > you think the word means to the tabloid-reading public. "Hacker" is a badge > of honor, a rank to be attained, in our world, and anyone who uses phrases > like "..still hacking or have outgrown it" is as instantly suspect as > somebody who walks into my laboratory wearing a 3-piece suit asking if my > computer is IBM compatible. True. If there's anything I dislike worse than the use of hacker to mean someone who perpetrates computer crime, it's the association of the word with a juvenile, pimply-faced, antisocial young man, probably overweight, sitting in his room having no other social life than what he can attain via bulletin boards and CompuServe. C'mon, people. Marvin Minsky was a hacker. McCarthy & Sussman were hackers. Bill Joy was a hacker. These people don't exactly fit that mold. There are female hackers - I know women that I would gladly describe with that word. In the professional world, one of the inventors of IBM's VM operating system was Love Seawright. I'm sure there are many more. > Also, I believe from what I know of Katie's book that its publication will be > a service to the hacker community and not an attack on it. I hope so. I would dearly love to see a book that took the curse off of that word, although it is probably too late. A previous poster likened the attempt to track down the InterNet worm to a John LeCarre novel. If it weren't for hackers, the worm might have caused a lot more damage. Hackers at MIT, Berkeley, and elsewhere reverse-engineered the object code and figured out how it attacked. An astronomer/hacker helped catch the guy who was breaking into LLBL from West Germany. *These* people are the real hackers - they should be the ones written about. Perhaps a good approach to the novel would be in some sort of Arthurian romance style, with the criminals being the "hackers" who had broken the code of honor, and were hunted down by their good counterparts. > Now, here's the question that I think Katie was trying to ask but doesn't > speak our language well enough to ask: > > My name is Katie Hafner. I'm working on a book about people > who abuse computer technology. For example, Kevin Mitnick, > who is in jail right now for being caught in possession of > stolen credit card numbers (which, incidentally, he was > using to break into DEC's E-NET and cause trouble). I'm trying > to get a sense of whether or not the hacker community > considers Mitnick and people like him to be outlaws. If you > don't think Mitnick is an outlaw (many don't), then > howabout Hans Huebner (Pengo), who penetrated various > systems and sold the results to the KGB. A person who > breaks into a computer network and steals money is clearly > on the wrong side of the law; a person who breaks into the > same network and just joyrides may well not be. I'd like to > hear from you about where you think the boundary is. Hmm. Better. Another danger from a book like this is that anything that gets written about these people, unless the author is *extremely* careful, runs the risk of glorifying their actions. This glorification of crime only helps to breed more crime, and worse, lessens public opinion of the seriousness of the crime. Many people I talk to feel that the incident with Morris and the Internet worm did no harm. This is an attitude I'd expect to see from someone outside the computer community (such as my students in my Intro CS recitation), I find it springing up among computer professionals. "No harm was done." Ugh. How untrue. Although a part of myself says that if you leave the keys in your car you are in part responsible for its theft, the criminal is still responsible for his or her actions. I hope that this book manages to portray these people in the correct light. > My own answer to my version of Katie's question is that we hackers, like > all professionals, have an obligation to respect the rights of others and > an obligation to help further our profession. A hacker who goes on the > wrong side of the law is no different from a veterinarian or a bible > salesman who uses his professional skills for unethical gain. The fact > that the perpetrator happened to be a hacker rather than a woodcarver > or a journalist is not relevant. Ha - some sort of argument for a "programmer's bar" or a "hippocratic oath of programming." I like the last term - especially with the prevalence of computer viruses today. Instead of a deafening silence, the net should provide Kate with responses that show what kind of a book we would like to see written: one that shows that the word hacker is not loaded only with negative connotations, but has more positive ones than negative. One that shows that there is an ethic among hackers, and that people who break this ethic are looked down upon (and that this ethic is not just "honor among thieves!"). One that shows that to be a hacker is to be an artist, a creator, and someone with a love for a particular discipline, and to be a "cracker" is to be someone who has never attained those ideals - someone who can only use the tools for bad purposes, for the quick and easy gratification of their desires, and does not perceive the true nature of their work. > Brian Reid Sean Colbath colbath@cs.rochester.edu rochester!colbath "And now for something completely different..."
exspes@gdr.bath.ac.uk (P E Smee) (11/13/89)
In article <111@cupcake.sal.wisc.edu> jwp@cupcake.sal.wisc.edu.UUCP (Jeffrey W Percival) writes: >In article <14468@well.UUCP> kmh@well.UUCP (Katherine Hafner) writes: >>to examine a new generation of young men obsessed >>with computers. I'm seeking comments from people > >Why do you assume all hackers are men? I'm not worried about the >implied sexism in the assumption; either there are female hackers or >there are not. All the research I've seen indicates that certainly the vast majority of hackers (in either sense of the word) are men. There seem to be two hypothetical factors. The first is the traditional obvious one, which also explains why (for example) most engineers are men. That being, that boys are encouraged to take an interest in technical things and the workings thereof, while girls are at best not encouraged, and at worst actively discouraged from doing so. The second is a bit more subtle, and has to do with the cultural expectations that men will 'be in control' of the world. Traditionally this has meant vying to obtain power by gaining control over people. This role is difficult for men who for one reason or another (generally some form of shyness) find it difficult to relate to people. Gaining power by hacking (again in either sense) provides a way of doing so without the need for relating to other people, and so allows such men to fulfill the traditional cultural masculine role. Do note that both of these are cultural effects. I think that (as with any other inequity) it would be silly to try to pretend that it doesn't exist. It seems to be fairly clearly there. This does not mean it's right. Computing (including perforce 'hacking') has the same need as most of the technological professions to figure out why women are not actively encouraged, and to do something about it. Society loses half of its potential technical geniuses if it does not address this issue. -- Paul Smee | JANET: Smee@uk.ac.bristol Computer Centre | BITNET: Smee%uk.ac.bristol@ukacrl.bitnet University of Bristol | Internet: Smee%uk.ac.bristol@nsfnet-relay.ac.uk (Phone: +44 272 303132) | UUCP: ...!uunet!ukc!gdr.bath.ac.uk!exspes
exspes@gdr.bath.ac.uk (P E Smee) (11/13/89)
In article <509@rsiatl.UUCP> jgd@rsiatl.UUCP (John G. De Armond) writes: >In article <14468@well.UUCP> kmh@well.UUCP (Katherine Hafner) writes: >> >> >>My name is Katie Hafner and I am writing a book with >>John Markoff. The book focuses on "hackers" as the >>press has reinvented the word: people who break >>into computer systems. The book is intended as a >>sequel of sorts to Steven Levy's "Hackers." > >I am inviting the net to treat this lady with a most deadening silence. >She obviously lacks sufficient taste to know that this is exactly the >WRONG forum to abuse the meaning of the complimentary term "hacker". I think you're being a bit harsh. She does specifically say 'as the press has reinvented the word'. And, realistically speaking, and whether you like it or not, (and I certainly don't) that is what 'hacker' does mean today. The press didn't invent the word, but rather grabbed it from the computer people, so I suspect that that is really our fault; that *we* did not differentiate between 'good' hacking and 'bad' hacking until we suddenly had our name for ourselves taken and turned over. >It is also the wrong forum to seek the opportunity to glorify >illegal and antisocial actions. Don't recall that Levy's book did that. Have I got him confused with someone else? Also, didn't spot that Katie said whe was going to do that. It is certainly possible (and often desireable) to write about something without glorifying it. (And anyway, in the system admin'ing parts of my current life it can be handy to know what sorts of things they are up to, so that I know what to watch out for.) >As an old time hacker, I wear the badge with pride. I started hacking >when the term meant hooking 6L6s together to make bistable multivibrators >(remember that term?) Yep. :-) Though by the time I did my first hardware hack it was more likely that the bistables would be made up from either DEC flip-chips or RTL IC's. How about acoustic delay-line memory? -- Paul Smee | JANET: Smee@uk.ac.bristol Computer Centre | BITNET: Smee%uk.ac.bristol@ukacrl.bitnet University of Bristol | Internet: Smee%uk.ac.bristol@nsfnet-relay.ac.uk (Phone: +44 272 303132) | UUCP: ...!uunet!ukc!gdr.bath.ac.uk!exspes
es@sinix.UUCP (Dr. Sanio) (11/14/89)
In article <227@jove.dec.com> reid@decwrl.dec.com (Brian Reid) writes: >>In article <14468@well.UUCP> kmh@well.UUCP (Katherine Hafner) writes: >>>(a question) > >Now, here's the question that I think Katie was trying to ask but doesn't >speak our language well enough to ask: > > My name is Katie Hafner. I'm working on a book about people > who abuse computer technology. For example, Kevin Mitnick, > who is in jail right now for being caught in posession of > .. > considers Mitnick and people like him to be outlaws. If you > don't think Mitnick is an outlaw (many don't), then > howabout Hans Huebner (Pengo), who penetrated various > systems and sold the results to the KGB. A person who > breaks into a computer network and steals money is clearly > on the wrong side of the law; a person who breaks into the > same network and just joyrides may well not be. I'd like to > hear from you about where you think the boundary is. > > .. Well, Brian, I agree to most you wrote as far as I can verify it. But I already expressed in an email I sent to Katie that I'm strongly pissed off about the rumours about Hans Huebner. Though I don't know that guy personally, I know him from several contributions on regional, continental and international networks. I know him as a serious, knowledgeable person. About that KGB affair, I know that he is not in prison, is not sentenced, even not (yet?) formally accused. As most people all over the world, I regard spying as a serious criminal offense. But in our legal system in Germany (the same with you, I believe), a person has as long to be considered as innocent as (s)he has not been sentenced. The whole "KGB Hacker" affair has been inflated excessively by the press, IMHO. The small company in Berlin (with a public access computer, where I'm a user, too), to which H.Huebner had some connections, has been accused to be involved in spying, which has clearly proved false in the meantime. I regarded the way the press spread names of suspected persons as highly discriminating and intolerable. In those publications, source programs you can find in any university computer were declared to subjects of national security uncovering the complete ignorance of the journalists. I'm sad seeing similar shit being repeated on a network mainly visited by computer experts. That cannot be excused by the fact that some people (especially in the U.S.) turn into lunatics with foam on their mouth as soon as they hear keywords like "KGB" etc . >Brian Reid regards, es
ggw@wolves.uucp (Gregory G. Woodbury) (11/16/89)
In article <1989Nov11.225859.16964@cs.rochester.edu> (Sean Colbath) writes: >In article <227@jove.dec.com> reid@decwrl.dec.com (Brian Reid) writes: > >I think that Brian Reid has hit upon part of the problem - that of language >and the phrasing of Kate's posting. When I read Kate's article, I was rather >angry too - I have been "hacking" since 8th grade (I am 22 now, and hoping >to go on to Grad school in CS) and (for the most part ;-) my activities have >been entirely honorable. (Gee, all these YOUNG people, is 36 passe? ;-) > C'mon, people. Marvin Minsky was a >hacker. McCarthy & Sussman were hackers. Bill Joy was a hacker. These >people don't exactly fit that mold. There are female hackers - I know women >that I would gladly describe with that word. > Let's not forget: Grace Hopper, John von Neuman, Eckert&Mauchley, Ken Thompson, Steve Bellovin, Tom Truscott, etc.... >> <Reid's paraphrase axed> > >> My own answer to my version of Katie's question is that we hackers, like >> all professionals, have an obligation to respect the rights of others and >> an obligation to help further our profession. A hacker who goes on the >> wrong side of the law is no different from a veterinarian or a bible >> salesman who uses his professional skills for unethical gain. : : >Ha - some sort of argument for a "programmer's bar" or a "hippocratic oath >of programming." I like the last term - especially with the prevalence of >computer viruses today. Instead of a deafening silence, the net should >provide Kate with responses that show what kind of a book we would like to >see written: one that shows that the word hacker is not loaded only with >negative connotations, but has more positive ones than negative. >> Brian Reid >Sean Colbath In actuality, there is a strong movement underway to strengthen the existing "certification" programs that exist in computing, and perhaps to require that all persons programming for federal contracts/grants/etc. be certified. This is not, *per se*, a Bad Thing, but there needs to be a very strong revision of the current definitions used by the certification programs. I seriously doubt that many of the illustrious names mentioned herein could fully pass the existing "Certified Data Processor" or similar exam programs without a *LOT* of difficulty. The preliminary information that I have received about these programs indicates that the main emphasis of the programs is to provide some kind of reassurance to the BUSINESS community that the person holding the title knows about the BUSINESS end of computing, which most of those reading this have little or no interest in. Certainly, I would have to learn a tremendous mountain of trivial information about COBOL, RPG, and mainframe environments to obtain the CDP that would be totally useless in the UN*X and network environments that we use. To make things worse, a CDP is the *minimum* sort of thing that they are considering for the "guru" types of positions that some of our leading net citizens enjoy. If there are further developments in the certification process that I have missed, I would dearly love to be corrected, BUT as the concept stands it is almost a fate worse than death to the academic guru. Oh, in terms of the "hacker" vs. "cracker" controversy.... Does it really matter what the names used are? The old definition of "hacker" could fairly easily be replaced with "wizard" or "guru" (despite the recent flamefest in comp.unix.wizards about the qualifications for that title) and let the unwashed/uninitiated use whatever terms they like. As a proud owner of the old style "hacker" accolade, I'm not happy about the abuse and misappropriation of the word, but I'd almost rather be able to self-claim the term "wizard" rather than have to have someone else bestow it. (Of course there should be a fair sprinkle of ;-)'s here and there.) -- Gregory G. Woodbury Sysop/owner Wolves Den UNIX BBS, Durham NC UUCP: ...dukcds!wolves!ggw ...dukeac!wolves!ggw [use the maps!] Domain: ggw@cds.duke.edu ggw@ac.duke.edu ggw%wolves@ac.duke.edu Phone: +1 919 493 1998 (Home) +1 919 684 6126 (Work) [The line eater is a boojum snark! ] <standard disclaimers apply>
hollombe@ttidca.TTI.COM (The Polymath) (11/21/89)
In article <1989Nov16.052001.1509@wolves.uucp> ggw@wolves.UUCP (Gregory G. Woodbury) writes: } I seriously doubt that many of the illustrious names mentioned herein }could fully pass the existing "Certified Data Processor" or similar exam }programs without a *LOT* of difficulty. The preliminary information that }I have received about these programs indicates that the main emphasis of the }programs is to provide some kind of reassurance to the BUSINESS community }that the person holding the title knows about the BUSINESS end of computing, }which most of those reading this have little or no interest in. Certainly, }I would have to learn a tremendous mountain of trivial information about }COBOL, RPG, and mainframe environments to obtain the CDP that would be totally }useless in the UN*X and network environments that we use. To make things }worse, a CDP is the *minimum* sort of thing that they are considering for }the "guru" types of positions that some of our leading net citizens enjoy. I like to think of myself as a hacker. I don't have a CS degree. For the last 4 years I've worked in a C/Unix environment. Prior to that was two years of straight assembler work. (Prior to that was 5 years of misc. programming). I passed the CDP exam (first try, with honors -- ahem (-: ) 3 years ago. I think the technical sections of the CDP exam would be trivial for any hacker worthy of the name. To prepare for the business and management sections I earned "Professional Designations" in Systems Management and Systems Analysis from the UCLA Extension program -- two classes a week for a little over a year. Not my favorite subjects, but doable if you really want that certificate. More to the point, the CDP isn't the only certificate issued by the ICCP. There's also the CCP (Certified Computer Programmer) which is strongly oriented to the technical, computer science side of the field (too much math for me, I'm afraid), and the CSA (Certified Systems Analyst) which has a stronger business orientation. BTW, none of the CDP exams I've seen even mention COBOL, or RPG, in their technical sections. The questions are at a much more abstract level, regarding general principles of hardware and software design, maintenance and use. -- The Polymath (aka: Jerry Hollombe, hollombe@ttidca.tti.com) Illegitimis non Citicorp(+)TTI Carborundum 3100 Ocean Park Blvd. (213) 452-9191, x2483 Santa Monica, CA 90405 {csun|philabs|psivax}!ttidca!hollombe
ggw@wolves.uucp (Gregory G. Woodbury) (11/24/89)
In article <7875@ttidca.TTI.COM> hollombe@ttidcb.tti.com (The Polymath) writes: >In article <1989Nov16.052001.1509@wolves.uucp> (Gregory G. Woodbury) writes: >}The preliminary information that ^^^^^^^^^^^ (nota bene) >}I have received about these programs indicates that the main emphasis of the >}programs is to provide some kind of reassurance to the BUSINESS community >}that the person holding the title knows about the BUSINESS end of computing, >}which most of those reading this have little or no interest in. : >I think the technical sections of the CDP exam would be trivial for any >hacker worthy of the name. To prepare for the business and management >sections I earned "Professional Designations" in Systems Management and >Systems Analysis from the UCLA Extension program -- two classes a week for >a little over a year. Not my favorite subjects, but doable if you really >want that certificate. This I am glad to hear. I did say that the information was of a "preliminary" nature (meaning - not from the official sources) and that I would be glad to be corrected. I DO appreciate it. >More to the point, the CDP isn't the only certificate issued by the ICCP. >There's also the CCP (Certified Computer Programmer) which is strongly >oriented to the technical, computer science side of the field (too much >math for me, I'm afraid), and the CSA (Certified Systems Analyst) which >has a stronger business orientation. Yes, I was aware of the distinction. >BTW, none of the CDP exams I've seen even mention COBOL, or RPG, in their >technical sections. The questions are at a much more abstract level, >regarding general principles of hardware and software design, maintenance >and use. I should be more careful about characterizing things on the basis of incomplete information. The "study guide" that I saw for the CDP was many years old and had lots of RPG and COBOL stuff in it. It was not an "official" representation of the test in any way, and I probably misunderstood the intent (back then). -- Gregory G. Woodbury Sysop/owner Wolves Den UNIX BBS, Durham NC UUCP: ...dukcds!wolves!ggw ...dukeac!wolves!ggw [use the maps!] Domain: ggw@cds.duke.edu ggw@ac.duke.edu ggw%wolves@ac.duke.edu Phone: +1 919 493 1998 (Home) +1 919 684 6126 (Work) [The line eater is a boojum snark! ] <standard disclaimers apply>