Personal Computing in the Soviet Era
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Defense Industry Restructuring in Russia
S t a n f o r d U n i v e r s i t y C I S A C Center for International Security and Arms Control The Center for International Security and Arms Control, part of Stanford University’s Institute for International Studies, is a multidisciplinary community dedicated to research and train- ing in the field of international security. The Center brings together scholars, policymakers, scientists, area specialists, members of the business community, and other experts to examine a wide range of international security issues. CISAC publishes its own series of working papers and reports on its work and also sponsors a series, Studies in International Se- curity and Arms Control, through Stanford University Press. Center for International Security and Arms Control Stanford University 320 Galvez Street Stanford, California 94305-6165 (415) 723-9625 http://www-leland.stanford.edu/group/CISAC/ Contents Acknowledgments iv Executive Summary v I Introduction 1 Section One: Case Studies II The Central Aerohydrodynamic Research Institute (TsAGI) 9 III ELVIS+ and The Moscow Center for SPARC Technology (MCST) 28 IV Impuls 45 V The Mashinostroenie Enterprise 59 VI The Saratov Aviation Plant 79 Section Two: Analysis VII Privatization at Four Enterprises 111 VIII Organizational Restructuring 137 IX Principal Differences in Accounting Systems in Russia 163 and the United States X Reallocation of the Social Services 183 XI Conclusion 207 Glossary 216 1 Acknowledgments Many people have contributed to this report, and still more have contributed to the research leading up to it. In writing this report, we have not attempted to reach consensus among the authors on the interpretations to be drawn from the data. -
••••It•• G981 &911651, Elateferyl
DOC~D:j 4009J726 TOP SICRIT WaJUOl!JWaJl1 t?l!CBl!JrnVU~ £iJl]l!WIB~ (r(!JllJU ~(51]Uj~(5 ~" W15allDl5 f WaJUJ~l1wrnlD J / P . L . 86-36 . WHEN CENSORSHIP BACKFIRES ....... ; .. ;~ .... James Killough .. ,/. , 0 ••••• 1 IDESKPAD: A PROGRAMMER' s TOOL •••• _1:: :\ :: ,_,------!: <:; ·::::: ~ ,________ __, ,; .••••• 9 IN PRAISE OF SOLITS ..................... Louis C. Grant .... •...... 12 NOTES ON BLUE RUSSIAN .................. ~ f ...... 12 NATIONAL CRYPTOLOGIC SCHOOL OFFERS COURSE-EQUIVALENCY TESTS ..................................... 13 'f'lllS B00tiM~N'f eoN'FAtlNS CJOBIW9RB MAt'l'IRIAtL et J2 J t.1 BlltN8A/elle88 (N81'/e88M 111-1) ••••It•• G981 &911651, Elateferyl .TOP SECRET Bedawif) tfpou Nuliluiliw b1 tile 81 .... eclassified and Approved for Release by NSA on -10--1-1-20'1.2 pursuant to E.O. '13526. vlDR Case# 54778 DOCID: 4009726 TOP SECRET Published Monthly by Pl, Techniques and Standards, for the Personnel of Operations VOL . II , No • 11 NOVEMBER 1975 PUBLISHER WILLIAM LUTWINIAK BOARD OF EDITORS Editor in Chief ............ Arthur J. Salenune (5642s) Cryptanalysis ...•.......... .__ ______.ltlW25s} · · P.L. 86- 36 Language .•.....••.......... Emery W. Tetrault (5236s) Machine Support. ......... · I t33zl.~) Special Research ........... Vera R. Filby (7119s) Traffic Analysis .•.••..•••• Frederic 0. Mason, Jr. (4142s) For individual subscriptions send name and organizational designator to: CRYPTOLOG, Pl TOP SECRET DOCID: 4009726 'fOP SECRET t:rl'.4RRA Jiitt;J. GIZll!ll bww. 86-36 Theodore Shabad is one of the preeminent Ameri "director of a-plant," and another was a per can experts on Soviet physical and economic geogra son identified as First Secretary of "a City phy. He is the author of Geogruphy of the USSR Committee of the Communist Party." Both were (1951), Basia Industr>ial Resources of the USSR members of the Central Committee of the Tadzhik (1969), and China's Changing Map (1972). -
Getting Started Computing at the Al Lab by Christopher C. Stacy Abstract
MASSACHUSETTS INSTITUTE OF TECHNOLOGY ARTIFICIAL INTELLI..IGENCE LABORATORY WORKING PAPER 235 7 September 1982 Getting Started Computing at the Al Lab by Christopher C. Stacy Abstract This document describes the computing facilities at the M.I.T. Artificial Intelligence Laboratory, and explains how to get started using them. It is intended as an orientation document for newcomers to the lab, and will be updated by the author from time to time. A.I. Laboratory Working Papers are produced for internal circulation. and may contain information that is, for example, too preliminary or too detailed for formal publication. It is not intended that they should be considered papers to which reference can be made in the literature. a MASACHUSETS INSTITUTE OF TECHNOLOGY 1982 Getting Started Table of Contents Page i Table of Contents 1. Introduction 1 1.1. Lisp Machines 2 1.2. Timesharing 3 1.3. Other Computers 3 1.3.1. Field Engineering 3 1.3.2. Vision and Robotics 3 1.3.3. Music 4 1,3.4. Altos 4 1.4. Output Peripherals 4 1.5. Other Machines 5 1.6. Terminals 5 2. Networks 7 2.1. The ARPAnet 7 2.2. The Chaosnet 7 2.3. Services 8 2.3.1. TELNET/SUPDUP 8 2.3.2. FTP 8 2.4. Mail 9 2.4.1. Processing Mail 9 2.4.2. Ettiquette 9 2.5. Mailing Lists 10 2.5.1. BBoards 11 2.6. Finger/Inquire 11 2.7. TIPs and TACs 12 2.7.1. ARPAnet TAC 12 2.7.2. Chaosnet TIP 13 3. -
Annual Report of S.P
ANNUAL REPORT OF S.P. KOROLEV ROCKET AND SPACE PUBLIC CORPORATION ENERGIA FOR 2019 This Annual Report of S.P.Korolev Rocket and Space Public Corporation Energia (RSC Energia) was prepared based upon its performance in 2019 with due regard for the requirements stated in the Russian Federation Government Decree of December 31, 2010 No. 1214 “On Improvement of the Procedure to Control Open Joint-Stock Companies whose Stock is in Federal Ownership and Federal State Unitary Enterprises”, and in accordance with the Regulations “On Information Disclosure by the Issuers of Outstanding Securities” No. 454-P approved by the Bank of Russia on December 30, 2014 Accuracy of the data contained in this Annual Report, including the Report on the interested-party transactions effected by RSC Energia in 2019, was confirmed by RSC Energia’s Auditing Committee Report as of 01.06.2020. This Annual Report was preliminary approved by RSC Energia’s Board of Directors on August 24, 2020 (Minutes No. 31). This Annual Report was approved at RSC Energia’s General Shareholders’ Meeting on September 28, 2020 (Minutes No 40 of 01.10.2020). 2 TABLE OF CONTENTS 1. BACKGROUND INFORMATION ABOUT RSC ENERGIA ............................. 6 1.1. Company background .........................................................................................................................6 1.2. Period of the Company operation in the industry ...............................................................................6 1.3. Information about the purchase and sale contracts for participating interests, equities, shares of business partnerships and companies concluded by the Company in 2019 ..............................................7 1.4. Information about the holding structure and the organizations involved ...........................................8 2. PRIORITY DIRECTIONS OF RSC ENERGIA OPERATION ........................ 11 2.1. -
A Brief History of the Russian Spectrum Demoscene
A BRIEF HISTORY OF THE RUSSIAN Allegedly, engineers from the Ukrainian city Lvov, were the first to succeed with this challenge and built a working machine SPECTRUM DEMOSCENE in August 1985. Their own designed schematics became very BY ELFH OF INWARD AND CYBERPUNKS UNITY valuable information, so they could trade it to the researchers in other cities for knowledge on other topics. Still, this remained Relations between Soviet Russia and computers were always nents – more than 200 to be precise. This fact complicated the unknown to the wider public and only a limited amount of peo- a bit obscure, especially when it comes to foreign models that possibility for average Radio readers to build the “Micro-80”, ple actually knew about the existence of a cheap home com- were not officially imported here. But, if one wants to trace the because a lot of elements were hard to find in normal stores, puter with colourful graphics, which any Radio amateur could roots of the Russian demoscene, especially on the Spectrum, and in most cases could only be found on the black market. easily build at home. For example, in 1986 “Radio” magazine you must dig deep into the 1980’s, when the first generation of was still publishing the schematics of the Radio-86RK compu- radio amateurs built their first machines themselves. ter, which consisted of 29 parts, but had only a black and white A LOT OF ELEMENTS WERE HARD text mode display. CONTRABAND COMPUTERS TO FIND IN NORMAL STORES, ONLY The main role in this development was played by a very popu- ON THE BLACK MARKET Despite this, it first became a very popular machine in Rus- lar magazine named “Radio”, which gathered a lot of talented sia. -
Small Computer Monitor User Guide
SmallSmall ComputerComputer MonitorMonitor UserUser GuideGuide Monitor version 1.0 for the Z80 CPU Software and Documentation by Stephen C Cousins Edition 1.0.0 CONTENTS OVERVIEW................................................................................................................4 Conventions....................................................................................................... 4 Serial port.......................................................................................................... 5 LiNC80 systems.................................................................................................. 5 RC2014 systems................................................................................................. 6 COMMANDS..............................................................................................................7 ? or Help............................................................................................................ 7 API function call................................................................................................. 8 Assemble instructions...................................................................................... 10 Baud rate setting............................................................................................. 13 Breakpoint set or clear..................................................................................... 13 Console........................................................................................................... -
Storage Organization and Management in TENEX I. Introduction
Storage Organization and Management in TENEX http://www.linique.com/dlm/tenex/fjcc72/ Storage Organization and Management in TENEX by Daniel L. Murphy Presented at the Fall Joint Computer Conference, 1972. Originally published in AFIPS Conference Proceedings Volume 41. I. Introduction In early 1969, BBN began an effort aimed at developing a new time-shared operating system. It was felt at the time that none of the commercially available systems could meet the needs of the research planned and in progress at BBN. The foremost requirement of the desired operating system was that it support a directly addressed process memory in which large list-processing computations could be performed. The cost of core storage prohibited the acquisition of sufficient memory for even one such process, and the problems of swapping such very large processes in a time-sharing environment made that solution technically infeasible as well. Paging was therefore the logical alternative, and our study and experience with list processing systems(1,2) led us to believe that using a demand-paged virtual memory system for such computations was a feasible approach. With demand paged process virtual memory added to our requirements, we found no existing system which could adequately meet our needs. Our approach was to take an existing system which was otherwise appropriate and add the necesary hardware to support paging. The system chosen was the DEC PDP-10 (3), which, although not paged, was available with a time-shared operating system and substantial support software. Consideration was given to modifying the existing PDP-10 operating system to support demand paging, but that approach was rejected because of the substantial amount of work which would be required, because of the inherent constraints imbedded in the architecture of any large system, and because development of a new operating system would allow the inclusion of a great many other features and facilities which were judged desirable. -
1. Introduction
Network Operating Systems Partha Dasgupta Department of Computer Science and Engineering Arizona State University Tempe AZ 85287-5406 USA [email protected] [Note: Written in 1997, Appeared in Encyclopedia of Electrical Engineering] 1. Introduction Network Operating Systems extend the facilities and services provided by computer operating systems to support a set of computers, connected by a network. The environment managed by a network operating system consists of an interconnected group of machines that are loosely connected. By loosely connected, we mean that such computers possess no hardware connections at the CPU – memory bus level, but are connected by external interfaces that run under the control of software. Each computer in this group run an autonomous operating system, yet cooperate with each other to allow a variety of facilities including file sharing, data sharing, peripheral sharing, remote execution and cooperative computation. Network operating systems are autonomous operating systems that support such cooperation. The group of machines comprising the management domain of the network operating system is called a distributed system. A close cousin of the network operating system is the distributed operating system. A distributed operating system is an extension of the network operating system that supports even higher levels of cooperation and integration of the machines on the network (features include task migration, dynamic resource location, and so on) (1,2). An operating system is low-level software controlling the inner workings of a machine. Typical functions performed by an operating system include managing the CPU among many concurrently executing tasks, managing memory allocation to the tasks, handling of input and output and controlling all the peripherals. -
NWG/RFC# 752 MRC 2-Jan-79 01:22 Nnnnn a Universal Host Table
NWG/RFC# 752 MRC 2-Jan-79 01:22 nnnnn A Universal Host Table Network Working Group Mark Crispin Request for Comments 752 SU-AI NIC nnnnn 2 January 1979 A Universal Host Table ABSTRACT: The network host table in use at MIT and Stanford is described. This host table is superior to the NIC and Tenex host tables in several ways. A binary file, compiled from this host table, is also described. This file is used by subsystems on MIT's ITS and Stanford's WAITS timesharing systems for efficiency in host and network lookups. HISTORY: As with many other sites on the Arpanet, we found the NIC's host table unsuited to our needs. Part of the problem was because the NIC host table was often inaccurate and all too often failed to include several nicknames in common usage in our communities. In addition, the NIC host table's format was awkward for user programs to use, especially those which wanted to have the host table mapped into memory in some sort of structured binary form for efficient lookups. Finally, the NIC host table neglects to include some essential information. The ITS host table was originally designed to be compiled along with a network handling program (MIDAS, the PDP-10 assembler used, has a pseudo-op to insert a file into an assembly). In order to make the host table palatable to the assembler, every comment line began with a semicolon, and every actual data line began with the word HOST. Each program which used the host table defined HOST as an assembly macro before inserting the host table into the assembly. -
USSR: First Computers and Evaluation of Cybernetics Points of This Papers
Dr.Vladimir Kitov Russian Plekhanov university of economics USSR: First Computers and Evaluation of Cybernetics Points of this papers Part 1. • USSR: First Computers and Evaluation of Cybernetics. Part 2. • Several key moments of the Soviet informatics. Part 1. USSR: First Computers and Evaluation of Cybernetics. • 1.1. The first soviet computers "MESM", "M-1" and "Strela". • 1.2. The most important seven organizations of the USSR, where the first serial computers "Strela" were established. • 1.3. Difficult fate of cybernetics in the USSR. • 1.4. The first courses of lectures on computers and programming in three Soviet universities. • 1.5. The first Soviet books on programming, computers and applications and their significant role in several foreign countries. Part 2. Several key moments of the Soviet informatics. • 2.1. About the following computers after "MESM", "M-1" and "Strela. • 2.2 The first in the world project of The Nationwide computer network for the control of Economy and Military Forces of the USSR. • 2.3 The application of computers for the economy and the creation of automated management systems (AMS) for different levels and purposes. • 2.4 Soviet computers “ES EVM” are the clones of IBM/360 computers . The beginning of the end of Soviet computers. 1.1. The first soviet computers "MESM", "M-1" and "Strela". • The first official step in computer industry in the USSR was patent number 10475 for the invention of "Automatic digital computer" registered on December 4, 1948 by prominent Soviet scientists Isaak Bruk and Bashir Rameev. It was the USSR first officially registered invention in the field of electronic digital computers. -
The Future of the Internet and How to Stop It the Harvard Community Has
The Future of the Internet and How to Stop It The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. Citation Jonathan L. Zittrain, The Future of the Internet -- And How to Stop It (Yale University Press & Penguin UK 2008). Published Version http://futureoftheinternet.org/ Accessed February 18, 2015 9:54:33 PM EST Citable Link http://nrs.harvard.edu/urn-3:HUL.InstRepos:4455262 Terms of Use This article was downloaded from Harvard University's DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http://nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms- of-use#LAA (Article begins on next page) YD8852.i-x 1/20/09 1:59 PM Page i The Future of the Internet— And How to Stop It YD8852.i-x 1/20/09 1:59 PM Page ii YD8852.i-x 1/20/09 1:59 PM Page iii The Future of the Internet And How to Stop It Jonathan Zittrain With a New Foreword by Lawrence Lessig and a New Preface by the Author Yale University Press New Haven & London YD8852.i-x 1/20/09 1:59 PM Page iv A Caravan book. For more information, visit www.caravanbooks.org. The cover was designed by Ivo van der Ent, based on his winning entry of an open competition at www.worth1000.com. Copyright © 2008 by Jonathan Zittrain. All rights reserved. Preface to the Paperback Edition copyright © Jonathan Zittrain 2008. Subject to the exception immediately following, this book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S. -
A Hypothesis-Based Approach to Digital Forensic Investigations (Brian D. Carrier)
CERIAS Tech Report 2006-06 A HYPOTHESIS-BASED APPROACH TO DIGITAL FORENSIC INVESTIGATIONS by Brian D. Carrier Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, IN 47907-2086 A HYPOTHESIS-BASED APPROACH TO DIGITAL FORENSIC INVESTIGATIONS A Thesis Submitted to the Faculty of Purdue University by Brian D. Carrier In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy May 2006 Purdue University West Lafayette, Indiana ii To my parents, Gerry and Suzanne. iii ACKNOWLEDGMENTS I would first like to thank my advisor, Eugene Spafford (spaf). His advice and guidance helped to shape and direct this work. I would also like to thank my com- mittee for their helpful ideas and comments: Cristina Nita-Rotaru, Sunil Prabhakar, Marc Rogers, and Sujeet Shenoi (University of Tulsa). The Center for Education and Research in Information Assurance and Security (CERIAS) provided me with a great environment and the resources needed to complete this work and my appreciation goes to the faculty and staff. Thanks to the many people in the digital forensics community that have assisted me over the years. Special thanks to Dan Kalil, Chet Maciag, Gary Palmer, and others at the Air Force Research Labs for the creation of the annual Digital Foren- sic Research Workshop (DFRWS). This work is based on concepts from the initial DFRWS Research Roadmap and the framework discussions at DFRWS 2004 helped to direct this work. Simson Garfinkel provided many helpful comments during his review of this document. Lastly, thanks to my family. My parents have always supported my endeavors (and gently guided me towards a degree in engineering instead of one in music).