Hacker Motivation Quotes

We've searched our database for all the quotes and captions related to Hacker Motivation. Here they are! All 28 of them:

Like many entrepreneurs, Bushnell had no shame about distorting reality in order to motivate people.
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
Intellectual curiosity was not one of the motives on the FBI’s list. Indeed, the whole concept seemed foreign to them. Those in authority tend to be annoyed by hackers’ general attitude of disobedience. But that disobedience is a byproduct of the qualities that make them good programmers.
Paul Graham (Hackers & Painters: Big Ideas from the Computer Age)
The knack is to get people to follow you, even to places they may not think they can go, by motivating them to share your sense of mission.
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
Money is not the greatest of motivators,” Torvalds said. “Folks do their best work when they are driven by passion.
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
The knack is to get people to follow you, even to places they may not think they can go, by motivating them to share your sense of mission
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
There Could be something more Dangerous Behind that Firewall `)
Vedant Access
The tip which worked for me was to focus on input-based process goals (write for five minutes) rather than output-based results goals (write one page), and to keep the required inputs minuscule at first.
Nick Winter (The Motivation Hacker)
This interplay of military and academic motives became ingrained in the Internet. “The design of both the ARPANET and the Internet favored military values, such as survivability, flexibility, and high performance, over commercial goals, such as low cost, simplicity, or consumer appeal,” the technology historian Janet Abbate noted. “At the same time, the group that designed and built ARPA’s networks was dominated by academic scientists, who incorporated their own values of collegiality, decentralization of authority, and open exchange of information into the system.”90 These academic researchers of the late 1960s, many of whom associated with the antiwar counterculture, created a system that resisted centralized command. It would route around any damage from a nuclear attack but also around any attempt to impose control.
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
While the Texas prison officials remained in the dark about what was going on, they were fortunate that William and Danny had benign motives. Imagine what havoc the two might have caused; it would have been child's play for these guys to develop a scheme for obtaining money or property from unsuspecting victims. The Internet had become their university and playground. Learning how to run scams against individuals or break in to corporate sites would have been a cinch; teenagers and preteens learn these methods every day from the hacker sites and elsewhere on the Web. And as prisoners, Danny and William had all the time in the world. Maybe there's a lesson here: Two convicted murderers, but that didn't mean they were scum, rotten to the core. They were cheaters who hacked their way onto the Internet illegally, but that didn't mean they were willing to victimize innocent people or naively insecure companies.
Kevin D. Mitnick (The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers)
Banks have been a frequent target for hackers in recent years, with the vast majority of attacks motivated by financial theft. But not all of them. In the past two years, U.S. banks have been targets of a series of politically motivated attacks from Iran, in which a group of Iranian hackers flooded bank websites with so much online traffic - a method called a distributed denial of service attack - that the sites slowed or intermittently collapsed. Hackers who took credit for those attacks said they went after the banks in retaliation for an anti-Islam video that mocked the Prophet Muhammad. U.S. intelligence officials said the group was actually a cover for the Iranian government. Officials claimed Iran was waging the attacks in retaliation for Western economic sanctions and for attacks on its own systems.
Anonymous
To precommit is to choose now to limit your options later, preventing yourself from making the wrong choice in the face of temptation. Publicly announcing your goal is a common form of precommitment.
Nick Winter (The Motivation Hacker)
That is at the heart of the concept of “scale,” which is very much a common denominator in motivating the region’s programmers, hardware hackers, and venture capitalists. It is not enough to make a profit, or to create something that is beautiful. It has to have an impact. It has to be something that goes under 95 percent of the world’s Christmas trees, or offers clean water or electricity to billions of people.
John Markoff (Machines of Loving Grace: The Quest for Common Ground Between Humans and Robots)
A chef wields dozens of tools, from spatulas to potato scrubbing gloves. Every once in a while, he’ll need the pastry brush, but every day he’ll use a chef’s knife, a frying pan, salt, and a stove. Like a chef, a motivation hacker has a core set of tools. I’ll introduce these in Chapters 3 and 4: success spirals, precommitment, and burnt ships. Sometimes you can reach into your motivation pantry (Chapter 12) and pull out some timeboxing, but it’s often best not to get too fancy. And just as the chef who dogmatically used his chef’s knife for everything would cook a terrible pancake, so would a motivation hacker fail to quit an internet addiction using only precommitment. No single technique can solve every problem. This book will recommend several approaches to increasing motivation. Use more than one at a time.
Nick Winter (The Motivation Hacker)
That is, will is simply the process of making personal rules for ourselves that will help us reach our goals, and how much willpower we can muster is precisely how good we are at setting up these personal rules so that the we always prefer to keep our rules than to break them. This is a learnable skill.
Nick Winter (The Motivation Hacker)
motivation (“Can’t be late again…”), you eventually get out of bed, but not before twenty muddled minutes of half-dreamt schemes for skipping out today. With a little extra, suddenly it’s not so bad (“Breakfast!”). But when you have sixty extra gallons of it, you leap from bed as if it’s Christmas and you’re pretty sure that the big box in the back is the new Xbox. More motivation doesn’t just mean that we’re more likely to succeed at a task, but also that we’ll have more fun doing it. This is what we want; this is why we hack motivation. It’s not as simple as hooking up Xbox-sized rewards to every boring task, but it’s easier than trying to accomplish anything without enough motivation.
Nick Winter (The Motivation Hacker)
By increasing Expectancy or Value, or decreasing Impulsiveness or Delay, you hack motivation. For
Nick Winter (The Motivation Hacker)
The biggest hack a motivation hacker can perform is to build her confidence to the size of a volcano. An oversized eruption of Expectancy can incinerate all obstacles in the path to any goal when you combine it with good planning. Value
Nick Winter (The Motivation Hacker)
The motivation hacker learns to steer his life towards higher Value and to have fun demolishing boring necessities in his way. Impulsiveness
Nick Winter (The Motivation Hacker)
We were more concerned about having a secure password than what we were sharing, as if a bored 15-year-old hacker motivated by chaos was more dangerous than a billion-dollar corporation driven by an insatiable lust for profit.
Craig A. Falconer (Sycamore (Cyber Seed, #1))
Uber, a car service start-up founded by Travis Kalanick and Garrett Camp, has been giving out free rides during Austin’s SXSW conference for several years. During a single week, thousands of potential Uber customers—tech-obsessed, high-income young adults who cannot find a cab—are motivated to try out this service. One year Uber offered free rides. Another year, it offered BBQ delivery. Instead of spending millions on advertising or countless resources trying to reach these potential users in their respective cities, Uber just waited for the one week a year when they were all in one place and did something special. And Uber did this because a few years earlier they’d watched Twitter take SXSW by storm with a similar collaboration with the conference. This is thinking like a growth hacker—it’s how you get the most bang for your buck and how you get it from the right people.
Ryan Holiday (Growth Hacker Marketing: A Primer on the Future of PR, Marketing, and Advertising)
Kahneman’s evidence shows that we suck at remembering and predicting our own well-being. We as a culture still ignore this empirical evidence, recommending to live our lives so as to avoid deathbed regrets. Deathbed regrets are like Hollywood films: they stir passions for a couple hours, but are poorly connected to reality. They are not good criteria for a well-lived life.
Nick Winter (The Motivation Hacker)
The Linux world behaves in many respects like a free market or an ecology, a collection of selfish agents attempting to maximize utility which in the process produces a self-correcting spontaneous order more elaborate and efficient than any amount of central planning could have achieved. Here, then, is the place to seek the “principle of understanding”. The “utility function” Linux hackers are maximizing is not classically economic, but is the intangible of their own ego satisfaction and reputation among other hackers. (One may call their motivation “altruistic”, but this ignores the fact that altruism is itself a form of ego satisfaction for the altruist). Voluntary cultures that work this way are not actually uncommon; one other in which I have long participated is science fiction fandom, which unlike hackerdom has long explicitly recognized “egoboo” (ego-boosting, or the enhancement of one’s reputation among other fans) as the basic drive behind volunteer activity. Linus, by successfully positioning himself as the gatekeeper of a project in which the development is mostly done by others, and nurturing interest in the project until it became self-sustaining, has shown an acute grasp of Kropotkin’s “principle of shared understanding”. This quasi-economic view of the Linux world enables us to see how that understanding is applied. We may view Linus’s method as a way to create an efficient market in “egoboo” — to connect the selfishness of individual hackers as firmly as possible to difficult ends that can only be achieved by sustained cooperation. With the fetchmail project I have shown (albeit on a smaller scale) that his methods can be duplicated with good results. Perhaps I have even done it a bit more consciously and systematically than he.
Eric S. Raymond (The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary)
The Linux world behaves in many respects like a free market or an ecology, a collection of selfish agents attempting to maximize utility which in the process produces a self-correcting spontaneous order more elaborate and efficient than any amount of central planning could have achieved. Here, then, is the place to seek the “principle of understanding”. The “utility function” Linux hackers are maximizing is not classically economic, but is the intangible of their own ego satisfaction and reputation among other hackers. (One may call their motivation “altruistic”, but this ignores the fact that altruism is itself a form of ego satisfaction for the altruist). Voluntary cultures that work this way are not actually uncommon; one other in which I have long participated is science fiction fandom, which unlike hackerdom has long explicitly recognized “egoboo” (ego-boosting, or the enhancement of one’s reputation among other fans) as the basic drive behind volunteer activity. Linus, by successfully positioning himself as the gatekeeper of a project in which the development is mostly done by others, and nurturing interest in the project until it became self-sustaining, has shown an acute grasp of Kropotkin’s “principle of shared understanding”. This quasi-economic view of the Linux world enables us to see how that understanding is applied. We may view Linus’s method as a way to create an efficient market in “egoboo” — to connect the selfishness of individual hackers as firmly as possible to difficult ends that can only be achieved by sustained cooperation. With the fetchmail project I have shown (albeit on a smaller scale) that his methods can be duplicated with good results. Perhaps I have even done it a bit more consciously and systematically than he. Many people (especially those who politically distrust free markets) would expect a culture of self-directed egoists to be fragmented, territorial, wasteful, secretive, and hostile. But this expectation is clearly falsified by (to give just one example) the stunning variety, quality, and depth of Linux documentation. It is a hallowed given that programmers hate documenting; how is it, then, that Linux hackers generate so much documentation? Evidently Linux’s free market in egoboo works better to produce virtuous, other-directed behavior than the massively-funded documentation shops of commercial software producers. Both the fetchmail and Linux kernel projects show that by properly rewarding the egos of many other hackers, a strong developer/coordinator can use the Internet to capture the benefits of having lots of co-developers without having a project collapse into a chaotic mess. So to Brooks’s Law I counter-propose the following: Provided the development coordinator has a communications medium at least as good as the Internet, and knows how to lead without coercion, many heads are inevitably better than one.
Eric S. Raymond (The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary)
The Lockean logic of custom suggests strongly that open-source hackers observe the customs they do in order to defend some kind of expected return from their effort. The return must be more significant than the effort of homesteading projects, the cost of maintaining version histories that document “chain of title”, and the time cost of making public notifications and waiting before taking adverse possession of an orphaned project. Furthermore, the “yield” from open source must be something more than simply the use of the software, something else that would be compromised or diluted by forking. If use were the only issue, there would be no taboo against forking, and open-source ownership would not resemble land tenure at all. In fact, this alternate world (where use is the only yield, and forking is unproblematic) is the one implied by existing open-source licenses. We can eliminate some candidate kinds of yield right away. Because you can’t coerce effectively over a network connection, seeking power is right out. Likewise, the open-source culture doesn’t have anything much resembling money or an internal scarcity economy, so hackers cannot be pursuing anything very closely analogous to material wealth (e.g. the accumulation of scarcity tokens). There is one way that open-source activity can help people become wealthier, however — a way that provides a valuable clue to what actually motivates it. Occasionally, the reputation one gains in the hacker culture can spill over into the real world in economically significant ways. It can get you a better job offer, or a consulting contract, or a book deal. This kind of side effect, however, is at best rare and marginal for most hackers; far too much so to make it convincing as a sole explanation, even if we ignore the repeated protestations by hackers that they’re doing what they do not for money but out of idealism or love. However, the way such economic side effects are mediated is worth examination.
Eric S. Raymond (The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary)
GODMAN QUOTES 17 *** Reflective admonition*** Be it far from me, that which could not be near. We don’t hunt for the dead; the living brings a better meat to the table. We are carriers of our own destiny in a world of trials and fate. You are a reflection of who you are, and a telepathy of who you have dreamed to be. It waters where the river flows…good source brings better flow. Advise your life and don’t add vice to your vices. We are wanderers of time, in a life of a lost direction. We have no reservation for destiny; it belongs to what we do in our daily life. Seek for destiny helpers not destiny hackers. In admonition to learn you learn not to fall in your mistake.
Godman Tochukwu Sabastine
The only thing more dangerous than a developer is a developer conspiring with Security. The two working together gives us means, motive, and opportunity. I’m guessing our ciso probably strong-armed a Development manager to do something, which resulted in a developer doing something else, which broke the payroll run. Information Security is always flashing their badges at people and making urgent demands, regardless of the consequences to the rest of the organization, which is why we don’t invite them to many meetings. The best way to make sure something doesn’t get done is to have them in the room. They’re always coming up with a million reasons why anything we do will create a security hole that alien space-hackers will exploit to pillage our entire organization and steal all our code, intellectual property, credit card numbers, and pictures of our loved ones.
Gene Kim (The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win)
As industrial agriculture becomes more and more poisoned by profit motives, anarchists are growing their own food. Anarchist hackers understand better than most of us the power of information and the lengths that those in power will go to control it; proof is in the years- and decades-long prison sentences now being doled out for online civil disobedience.
Nathan Schneider (On Anarchism)
Amabile goes on to observe that “The more complex the activity, the more it’s hurt by extrinsic reward.” Interestingly, the studies suggest that flat salaries don’t demotivate, but piecework rates and bonuses do. Thus, it may be economically smart to give performance bonuses to people who flip burgers or dug ditches, but it’s probably smarter to decouple salary from performance in a programming shop and let people choose their own projects (both trends that the open-source world takes to their logical conclusions). Indeed, these results suggest that the only time it is a good idea to reward performance in programming is when the programmer is so motivated that he or she would have worked without the reward! Other researchers in the field are willing to point a finger straight at the issues of autonomy and creative control that so preoccupy hackers. “To the extent one’s experience of being self-determined is limited,” said Richard Ryan, associate psychology professor at the University of Rochester, “one’s creativity will be reduced as well.” In general, presenting any task as a means rather than an end in itself seems to demotivate. Even winning a competition with others or gaining peer esteem can be demotivating in this way if the victory is experienced as work for reward (which may explain why hackers are culturally prohibited from explicitly seeking or claiming that esteem).
Eric S. Raymond (The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary)