Copyright on the tracks

The origins of the free software movement can be traced back to to the hackers of MIT's Tech Model Railroad Club, but more recently model railways have played a significant part in validating copyright law.

Tradition has it the origins of the free software movement can be traced back to the hackers of the Signals and Power Subcommittee of the Tech Model Railroad Club (TMRC) at the Massachusetts Institute of Technology (MIT) in the late 50s and early 60s.

In 1961, members of the TMRC also known as The Midnight Requisition Committee discovered a TX-0 computer in Building 26 at MIT. As Steven Levy tells it in Hackers: Heroes of the Computer Revolution, worked out that the best time to gain access was in the middle of the night: "when no person in his right mind would have signed up for an hour-long session on the piece of paper posted every Friday beside the air conditioner in the RLE lab... The TMRC hackers, who soon were referring to themselves as TX-0 hackers, changed their life-style to accommodate the computer."

According to legend, this is where the traditions of hacking which later gave rise to the free software movement began.

It was the members of the TMRC who defined a hack as "a project undertaken or a product built not solely to fulfill some constructive goal, but with some wild pleasure taken in mere involvement," and devised a code of honour which Steven Levy later defined as The Hacker Ethic:

- Access to computers and anything which might teach you something about the way the world works should be unlimited and total. Always yield to the Hands-on Imperative!

- All information should be free;

- Mistrust authority, promote decentralization;

- Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race or position;

- You can create art and beauty on a computer;

- Computers can change your life for the better.

As the history page on the TMRC website recounts: "Experiments with MIT's DEC and Lincoln machines, and employment at DEC and at the AI Lab were not, of course, the limit of TMRC's involvement with computers. Early DEC computers soon found their way into TMRC. They were used to control routes in the freight yard and to throw switches on the main layout. TMRC was probably one of the first student activities to make use of computers. However, in each application, cost and electrical component limits dictated that elaborate relay interfaces connect each computer to the layout."

Intellectual Property is theft?

Fast forward to the present day, or at least to 2001. Bob Jacobsen, a model railway enthusiast based in California, set up a project known as JMRI to create a Java-based Digital Command & Control (DCC) system to automatically control model railway layouts from a home computer much like those devised in earlier years by the TMRC.

DCC allows you to control each locomotive on the track as though you were driving it from the cab. Each locomotive is equipped with a chip, which translates the signals sent from the command station, or computer, via the track. The system also controls the signals and points or turnouts and may be implemented with various degrees of sophistication.

There are a number of such systems on the market, and searching around the web will turn up many more built by hobbyists and enthusiasts to run from their home PCs, on everything from DOS to Linux.

The difference is that Jacobsen's system is an open source project hosted on sourceforge.net and released under the Artistic License, as used by Perl. (JMRI is currently licensed under the GPLv2.)

Featured Resources

The ultimate guide to business connectivity in field services

A roadmap to increased workplace efficiency

Free download

The definitive guide to migrating to the cloud

Migrate apps to the public cloud with multi-cloud infrastructure solutions

Free download

Transform your network with advanced load balancing from VMware

How to modernise load balancing to enable digital transformation

Free download

How to secure workloads in hybrid clouds

Cloud workload protection

Free download

Recommended

Nigerian cyber criminals target Texas unemployment system
cyber security

Nigerian cyber criminals target Texas unemployment system

27 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

17 Sep 2021
What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

8 Sep 2021
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

17 Sep 2021