84 lines
8.4 KiB
HTML
84 lines
8.4 KiB
HTML
|
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
|
|||
|
<html xmlns="http://www.w3.org/1999/xhtml"><head><title>Weaknesses of the Hacker Personality</title><link rel="stylesheet" href="jargon.css" type="text/css"/><meta name="generator" content="DocBook XSL Stylesheets V1.61.0"/><link rel="home" href="index.html" title="The Jargon File"/><link rel="up" href="appendixb.html" title="Appendix B. A Portrait of J. Random Hacker"/><link rel="previous" href="personality.html" title="Personality Characteristics"/><link rel="next" href="miscellaneous.html" title="Miscellaneous"/></head><body><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Weaknesses of the Hacker Personality</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="personality.html">Prev</a> </td><th width="60%" align="center">Appendix B. A Portrait of J. Random Hacker</th><td width="20%" align="right"> <a accesskey="n" href="miscellaneous.html">Next</a></td></tr></table><hr/></div><div class="sect1" lang="en"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a id="weaknesses"/>Weaknesses of the Hacker Personality</h2></div></div><div/></div><p>Hackers have relatively little ability to identify emotionally with
|
|||
|
other people. This may be because hackers generally aren't much like
|
|||
|
‘other people’. Unsurprisingly, hackers also tend towards
|
|||
|
self-absorption, intellectual arrogance, and impatience with people and tasks
|
|||
|
perceived to be wasting their time.</p><p>As cynical as hackers sometimes wax about the amount of idiocy in the
|
|||
|
world, they tend by reflex to assume that everyone is as rational,
|
|||
|
‘cool’, and imaginative as they consider themselves. This bias
|
|||
|
often contributes to weakness in communication skills. Hackers tend to be
|
|||
|
especially poor at confrontation and negotiation. </p><p>Another weakness of the hacker personality is a perverse tendancy to
|
|||
|
attack all problems from the most technically complicated angle, just because
|
|||
|
it may mean more interesting problems to solve, or cooler toys to play with.
|
|||
|
Hackers sometimes have trouble grokking that the bubble gum and paperclip
|
|||
|
hardware fix is actually the way to go, and that they really don't need to
|
|||
|
convince the client to buy that shiny new tool they've had your eye on for two
|
|||
|
months.</p><p>Because of their passionate embrace of (what they consider to be) the
|
|||
|
<a href="R/Right-Thing.html"><i class="glossterm">Right Thing</i></a>, hackers can be unfortunately intolerant
|
|||
|
and bigoted on technical issues, in marked contrast to their general spirit of
|
|||
|
camaraderie and tolerance of alternative viewpoints otherwise. Old-time
|
|||
|
<a href="I/ITS.html"><i class="glossterm">ITS</i></a> partisans look down on the ever-growing hordes of
|
|||
|
<a href="U/Unix.html"><i class="glossterm">Unix</i></a> and <a href="L/Linux.html"><i class="glossterm">Linux</i></a> hackers; Unix
|
|||
|
aficionados despise <a href="V/VMS.html"><i class="glossterm">VMS</i></a> and Windows; and hackers who
|
|||
|
are used to conventional command-line user interfaces loudly loathe
|
|||
|
mouse-and-menu based systems such as the Macintosh. Hackers who don't indulge
|
|||
|
in <a href="U/Usenet.html"><i class="glossterm">Usenet</i></a> consider it a huge waste of time and
|
|||
|
<a href="B/bandwidth.html"><i class="glossterm">bandwidth</i></a>; fans of old adventure games such as
|
|||
|
<a href="A/ADVENT.html"><i class="glossterm">ADVENT</i></a> and <a href="Z/Zork.html"><i class="glossterm">Zork</i></a> consider
|
|||
|
<a href="M/MUD.html"><i class="glossterm">MUD</i></a>s to be glorified chat systems devoid of atmosphere
|
|||
|
or interesting puzzles; hackers who are willing to devote endless hours to
|
|||
|
Usenet or MUDs consider <a href="I/IRC.html"><i class="glossterm">IRC</i></a> to be a
|
|||
|
<span class="emphasis"><em>real</em></span> waste of time; IRCies think MUDs might be okay if
|
|||
|
there weren't all those silly puzzles in the way. And, of course, there are
|
|||
|
the perennial <a href="H/holy-wars.html"><i class="glossterm">holy wars</i></a> —
|
|||
|
<a href="E/EMACS.html"><i class="glossterm">EMACS</i></a> vs. <a href="V/vi.html"><i class="glossterm">vi</i></a>,
|
|||
|
<a href="B/big-endian.html"><i class="glossterm">big-endian</i></a> vs. <a href="L/little-endian.html"><i class="glossterm">little-endian</i></a>,
|
|||
|
RISC vs. CISC, etc., etc., etc. As in society at large, the intensity and
|
|||
|
duration of these debates is usually inversely proportional to the number of
|
|||
|
objective, factual arguments available to buttress any position.</p><p>As a result of all the above traits, many hackers have difficulty
|
|||
|
maintaining stable relationships. At worst, they can produce the classic
|
|||
|
<a href="G/geek.html"><i class="glossterm">geek</i></a>: withdrawn, relationally incompetent, sexually
|
|||
|
frustrated, and desperately unhappy when not submerged in his or her craft.
|
|||
|
Fortunately, this extreme is far less common than mainstream folklore paints
|
|||
|
it — but almost all hackers will recognize something of themselves in
|
|||
|
the unflattering paragraphs above.</p><p>Hackers are often monumentally disorganized and sloppy about dealing
|
|||
|
with the physical world. Bills don't get paid on time, clutter piles up to
|
|||
|
incredible heights in homes and offices, and minor maintenance tasks get
|
|||
|
deferred indefinitely.</p><p>1994-95's fad behavioral disease was a syndrome called Attention Deficit
|
|||
|
Disorder (ADD), supposedly characterized by (among other things) a combination
|
|||
|
of short attention span with an ability to ‘hyperfocus’
|
|||
|
imaginatively on interesting tasks. In 1998-1999 another syndrome that is
|
|||
|
said to overlap with many hacker traits entered popular awareness: Asperger's
|
|||
|
syndrome (AS). This disorder is also sometimes called ‘high-function
|
|||
|
autism’, though researchers are divided on whether AS is in fact a mild
|
|||
|
form of autism or a distinct syndrome with a different etiology. AS patients
|
|||
|
exhibit mild to severe deficits in interpreting facial and body-language cues
|
|||
|
and in modeling or empathizing with others' emotions. Though some AS patients
|
|||
|
exhibit mild retardation, others compensate for their deficits with high
|
|||
|
intelligence and analytical ability, and frequently seek out technical fields
|
|||
|
where problem-solving abilities are at a premium and people skills are
|
|||
|
relatively unimportant. Both syndromes are thought to relate to abnormalities
|
|||
|
in neurotransmitter chemistry, especially the brain's processing of
|
|||
|
serotonin.</p><p>Many hackers have noticed that mainstream culture has shown a tendency
|
|||
|
to pathologize and medicalize normal variations in personality, especially
|
|||
|
those variations that make life more complicated for authority figures and
|
|||
|
conformists. Thus, hackers aware of the issue tend to be among those
|
|||
|
questioning whether ADD and AS actually exist; and if so whether they are
|
|||
|
really ‘diseases’ rather than extremes of a normal genetic
|
|||
|
variation like having freckles or being able to taste DPT. In either case,
|
|||
|
they have a sneaking tendency to wonder if these syndromes are over-diagnosed
|
|||
|
and over-treated. After all, people in authority will always be
|
|||
|
inconvenienced by schoolchildren or workers or citizens who are prickly,
|
|||
|
intelligent individualists — thus, any social system that depends on
|
|||
|
authority relationships will tend to helpfully ostracize and therapize and
|
|||
|
drug such ‘abnormal’ people until they are properly docile and
|
|||
|
stupid and ‘well-socialized’.</p><p>So hackers tend to believe they have good reason for skepticism about
|
|||
|
clinical explanations of the hacker personality. That being said, most would
|
|||
|
also concede that some hacker traits coincide with indicators for
|
|||
|
non-hyperactive ADD and AS — the status of caffeine as a hacker beverage of
|
|||
|
choice may be connected to the fact that it bonds to the same neural receptors
|
|||
|
as Ritalin, the drug most commonly prescribed for ADD. It is probably true
|
|||
|
that boosters of both would find a rather higher rate of clinical ADD among
|
|||
|
hackers than the supposedly mainstream-normal 3-5% (AS is rarer at
|
|||
|
0.4-0.5%).</p></div><div class="navfooter"><hr/><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="personality.html">Prev</a> </td><td width="20%" align="center"><a accesskey="u" href="appendixb.html">Up</a></td><td width="40%" align="right"> <a accesskey="n" href="miscellaneous.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">Personality Characteristics </td><td width="20%" align="center"><a accesskey="h" href="index.html">Home</a></td><td width="40%" align="right" valign="top"> Miscellaneous</td></tr></table></div></body></html>
|