79 History of Logo
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Functional Thinking
Functional Thinking director / software architect NEAL FORD meme wrangler ® ThoughtWorks [email protected] 2002 Summit Boulevard, Atlanta, GA 30319 nealford.com thoughtworks.com memeagora.blogspot.com @neal4d 1 a metaphor an essay a history lesson 2 3 4 new language: easy new paradigm: hard 5 “functional” is more a way of thinking than a tool set 6 Execution in the Kingdom of Nouns Steve Yegge http://steve-yegge.blogspot.com/ 2006/03/execution-in-kingdom-of-nouns.html 7 v e r b s ! 8 ! 9 http://oreilly.com/news/languageposter_0504.html 1954 1957 1960 1965 1970 1975 1980 1985 1990 1995 2000 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 PostScript level 3 PostScript level 3 PostScript PostScript level 2 PostScript level 3 v 3016 v 3017 1982 1992 september 11, 1996 OO Forth 2003 september 11, 2005 1987 Forth FIG-Forth Forth-83 ANS Forth ISO Forth 1968 1978 1983 1986 1997 Logo Object Logo Tcl Tcl/Tk Tcl/Tk 8.1 Tcl/Tk 8.2.3 Tcl/Tk 8.3 Tcl/Tk 8.4 Tcl/Tk 8.4.1 Tcl/Tk 8.4.2 Tcl/Tk 8.4.3 Tcl/Tk 8.4.4 Tcl/Tk 8.4.5 Tcl/Tk 8.4.6 Tcl/Tk 8.4.7 Tcl/Tk 8.4.8 Tcl/Tk 8.4.9 Tcl/Tk 8.4.11 Tcl/Tk 8.4.12 Tcl/Tk 8.4.13 Tcl/Tk 8.4.14 Tcl/Tk 8.4.15 Tcl/Tk 8.5 Tcl/Tk 8.5.5 Tcl/Tk 8.5.6 Tcl/Tk 8.5.7 Tcl/Tk 8.5.9 1968 1986 mid 1988 end 1988 april 1999 dec. -
Atari 8-Bit Family
Atari 8-bit Family Last Updated on October 2, 2021 Title Publisher Qty Box Man Comments 221B Baker Street Datasoft 3D Tic-Tac-Toe Atari 747 Landing Simulator: Disk Version APX 747 Landing Simulator: Tape Version APX Abracadabra TG Software Abuse Softsmith Software Ace of Aces: Cartridge Version Atari Ace of Aces: Disk Version Accolade Acey-Deucey L&S Computerware Action Quest JV Software Action!: Large Label OSS Activision Decathlon, The Activision Adventure Creator Spinnaker Software Adventure II XE: Charcoal AtariAge Adventure II XE: Light Gray AtariAge Adventure!: Disk Version Creative Computing Adventure!: Tape Version Creative Computing AE Broderbund Airball Atari Alf in the Color Caves Spinnaker Software Ali Baba and the Forty Thieves Quality Software Alien Ambush: Cartridge Version DANA Alien Ambush: Disk Version Micro Distributors Alien Egg APX Alien Garden Epyx Alien Hell: Disk Version Syncro Alien Hell: Tape Version Syncro Alley Cat: Disk Version Synapse Software Alley Cat: Tape Version Synapse Software Alpha Shield Sirius Software Alphabet Zoo Spinnaker Software Alternate Reality: The City Datasoft Alternate Reality: The Dungeon Datasoft Ankh Datamost Anteater Romox Apple Panic Broderbund Archon: Cartridge Version Atari Archon: Disk Version Electronic Arts Archon II - Adept Electronic Arts Armor Assault Epyx Assault Force 3-D MPP Assembler Editor Atari Asteroids Atari Astro Chase Parker Brothers Astro Chase: First Star Rerelease First Star Software Astro Chase: Disk Version First Star Software Astro Chase: Tape Version First Star Software Astro-Grover CBS Games Astro-Grover: Disk Version Hi-Tech Expressions Astronomy I Main Street Publishing Asylum ScreenPlay Atari LOGO Atari Atari Music I Atari Atari Music II Atari This checklist is generated using RF Generation's Database This checklist is updated daily, and it's completeness is dependent on the completeness of the database. -
The Evolution of Lisp
1 The Evolution of Lisp Guy L. Steele Jr. Richard P. Gabriel Thinking Machines Corporation Lucid, Inc. 245 First Street 707 Laurel Street Cambridge, Massachusetts 02142 Menlo Park, California 94025 Phone: (617) 234-2860 Phone: (415) 329-8400 FAX: (617) 243-4444 FAX: (415) 329-8480 E-mail: [email protected] E-mail: [email protected] Abstract Lisp is the world’s greatest programming language—or so its proponents think. The structure of Lisp makes it easy to extend the language or even to implement entirely new dialects without starting from scratch. Overall, the evolution of Lisp has been guided more by institutional rivalry, one-upsmanship, and the glee born of technical cleverness that is characteristic of the “hacker culture” than by sober assessments of technical requirements. Nevertheless this process has eventually produced both an industrial- strength programming language, messy but powerful, and a technically pure dialect, small but powerful, that is suitable for use by programming-language theoreticians. We pick up where McCarthy’s paper in the first HOPL conference left off. We trace the development chronologically from the era of the PDP-6, through the heyday of Interlisp and MacLisp, past the ascension and decline of special purpose Lisp machines, to the present era of standardization activities. We then examine the technical evolution of a few representative language features, including both some notable successes and some notable failures, that illuminate design issues that distinguish Lisp from other programming languages. We also discuss the use of Lisp as a laboratory for designing other programming languages. We conclude with some reflections on the forces that have driven the evolution of Lisp. -
Technology: Window to the Future
DOCUMENT RESUME ED 316 193 IR 014 181 AUTHOR Bright, George W., Ed.; Origassy, Mary Louise, Ed. TITLE Technology: Window to the Future. Proceedings of the Annual State Conference of the Texas Computer Education Association (9th, Houston, Texas, March 5-7, 1989). INSTITUTION Texas Computer Education Association, Lubbock. PUB DATE Mar 89 NOTE 244p.; For the proceedings of the 1988 conference, see ED 315 044. Variable type fonts throughout. PUB TYPE Collected Works - Conference Proceedings (021) -- Reports - Descriptive (141) -- Reports - Research /Technical (143) EDRS PRICE MF01/PC10 Plus Postage. DESCRIPTORS *Administration; Computer Literacy; Computer Science Education; *Computer Software; *Computer Uses in Education; Desktop Publishing; Elementary School Curriculum; Elementary Secondary Education; Higher Education; *Language Arts; *Mathematics Instruction; *Microcomputers; Science Education; Social Studies; Special Education IDENTIFIERS *Texas Computer Education Association ABSTRACT This proceedings crpilation presents papers on administration, computer literacy, computer science, desktop publishing, elementary education, hardware and software, language arts, mathematics, media, music and art, science, social studies, and special education. The 130 papers are arranged alphabetically by author's name and a subject index listing by author is provided. (GL) *********************************************************************** * Reproductions supplied by EDRS are the best that can be made * * from the original document. * ********************************************************************** U.S. DEPARTMENT OF EDUCATION Office of Educational Research and Improvement EDUCATIONAL RESOURCES INFORMATION CENTER (ERIC) This document has been reproduced as 'cowed from the person or organization originating it O Minor changes have been made toimprove reproduction Quality Points of view or opinions staled in thisdocu mint do not necessarily representofficial OERI position or policy 1,A 1111 a L. Of; rt k t I "61' ,, A 1-7 '04 Y. -
BBN and Computer Technology Timeline 1948 • Establishment Of
BBN and Computer Technology Timeline 1948 • Establishment of Bolt Beranek and Newman Inc. (BBN) 1958 • Purchase of BBN's first computer, an LPG-30, manufactured by the Royal McBee Company 1959 • Purchase of PDP-1 from the Digital Equipment Corporation (DEC); Serial #0 [??] 1960 • Design of a priority-interrupt system for the PDP-1. • Development of Cyclops, an AI program for pattern recognition. 1962 • Public demonstration of computer time-sharing. 1963 • Demonstration of Data Dial, a modem to enable remote communication with computers by telephone. 1964 • Public demonstration of a computer-based communications system for the Massachusetts General Hospital. • Development of MENTOR and the SOCRATIC SYSTEM, systems for computer- based mixed-initiative tutoring. 1965 • Development of TELCOMP, an interactive computer language. • Development of the Grafacon, a tablet for scanning and digitizing graphic data. • Publication of Libraries of the Future, a consideration of the implications of computer technology for future libraries, based on a project for the Council of Library Resources. 1966 • Creation of LOGO, a computer programming language designed especially for use by children. 1967 • Formation of Time Share Ltd., a subsidiary offering computing services in the UK. 1968 • Development of packet-switching protocols for the ARPANET 1969 • Launching of the ARPANET; demonstration of four-node network. • Automation of odd-lot stock transactions for the Pacific Coast Stock Exchange. • Grammatical analysis of English text by augmented transition networks. 1970 • Development of TENEX, a virtual-memory operating system for DEC computers. • Demonstration of SCHOLAR, a computer-based system that modeled a Socratic tutor. • 1971 Transmission of person-to-person email message using the @ sign. -
Learning to Code
PART ILEARNING TO CODE How Important is Programming? “To understand computers is to know about programming. The world is divided… into people who have written a program and people who have not.” Ted Nelson, Computer Lib/Dream Machines (1974) How important is it for you to learn to program a computer? Since the introduction of the first digital electronic computers in the 1940s, people have answered this question in surprisingly different ways. During the first wave of commercial computing—in the 1950s and 1960s, when 1large and expensive mainframe computers filled entire rooms—the standard advice was that only a limited number of specialists would be needed to program com- puters using simple input devices like switches, punched cards, and paper tape. Even during the so-called “golden age” of corporate computing in America—the mid- to late 1960s—it was still unclear how many programming technicians would be needed to support the rapid computerization of the nation’s business, military, and commercial operations. For a while, some experts thought that well-designed computer systems might eventually program themselves, requiring only a handful of attentive managers to keep an eye on the machines. By the late 1970s and early 1980s, however, the rapid emergence of personal computers (PCs), and continuing shortages of computer professionals, shifted popular thinking on the issue. When consumers began to adopt low-priced PCs like the Apple II (1977), the IBM PC (1981), and the Commodore 64 (1982) by the millions, it seemed obvious that ground-breaking changes were afoot. The “PC Revolution” opened up new frontiers, employed tens of thousands of people, and (according to some enthusiasts) demanded new approaches to computer literacy. -
Programming Languages As Operating Systems (Or Revenge of the Son of the Lisp Machine)
Programming Languages as Operating Systems (or Revenge of the Son of the Lisp Machine) Matthew Flatt Robert Bruce Findler Shriram Krishnamurthi Matthias Felleisen Department of Computer Science∗ Rice University Houston, Texas 77005-1892 Abstract reclaim the program’s resources—even though the program and DrScheme share a single virtual machine. The MrEd virtual machine serves both as the implementa- To address this problem, MrEd provides a small set of tion platform for the DrScheme programming environment, new language constructs. These constructs allow a program- and as the underlying Scheme engine for executing expres- running program, such as DrScheme, to run nested programs sions and programs entered into DrScheme’s read-eval-print directly on the MrEd virtual machine without sacrificing loop. We describe the key elements of the MrEd virtual control over the nested programs. As a result, DrScheme machine for building a programming environment, and we can execute a copy of DrScheme that is executing its own step through the implementation of a miniature version of copy of DrScheme (see Figure 1). The inner and middle DrScheme in MrEd. More generally, we show how MrEd de- DrSchemes cannot interfere with the operation of the outer fines a high-level operating system for graphical programs. DrScheme, and the middle DrScheme cannot interfere with the outer DrScheme’s control over the inner DrScheme. 1 MrEd: A Scheme Machine In this paper, we describe the key elements of the MrEd virtual machine, and we step through the implementation The DrScheme programming environment [10] provides stu- of a miniature version of DrScheme in MrEd. -
Accessible Tools and Curricula for K-12 Computer Science Education
Accessible Tools and Curricula for K-12 Computer Science Education White paper from the Accessible Computer Science Education Fall Workshop (Draft for Review) November 17-19, 2020 Earl Huff, Clemson University Varsha Koushik, University of Colorado Richard E. Ladner, University of Washington Stephanie Ludi, University of North Texas Lauren Milne, Macalester College Aboubakar Mountapmbeme, University of North Texas Margaret Perkoff, University of Colorado Andreas Stefik, University of Nevada, Las Vegas Introduction Ladner Computer science is rapidly becoming an integral part of the K-12 school curriculum in the United States (US) and other countries. This white paper will focus on the US because we understand K-12 education better than in other countries. Since 1984, computer science has been part of the curriculum in schools that offered AP Computer Science A (CSA). This introduction to programming was originally taught using Pascal, then moved to C++ in 1999, and then Java in 2003. Since 2007, there has been a concerted effort by the National Science Foundation to bring computer science education to a much broader audience and to all levels in K-12. This includes all students regardless of gender, ethnicity, race, or disability. The effort began with Exploring Computer Science (ECS) which was a gentler introduction to computer science at the high school level. Shortly thereafter, the idea of an AP Computer Science Principles (CSP) course arose that was to be a gentler introduction to computer science than AP CSA with a college level equivalent, introductory computer science for non-majors. In 2016, AP CSP became a reality with 43,780 students taking the exam in spring 2017 and two years later that number rose to 94,361. -
Symbolics Architecture
Symbolics Architecture David A. Moon Symbolics, Inc. W hat is an architecture? In com- languages, user interface, and operating This architecture puter systems, an architecture system. System architecture defines the rapid is a specification of an inter- product that people actually use; the other enables face. To be dignified by the name architec- levels of architecture define the mecha- development and ture, an interface should be designed for a nism underneath that implements it. Sys- long lifespan and should connect system tem architecture is implemented by soft- efficient execution of components maintained by different orga- ware; hardware only sets bounds on what large, ambitious nizations. Often an architecture is part ofa is possible. System architecture defines the product definition and defines character- motivation for most of the design choices applications. An istics on which purchasers of that product at the other levels ofarchitecture. This sec- rely, but this is not true of everything that tion is an overview of Symbolics system unconventional design is called an architecture. An architecture is architecture. avoids trading off more formal than an internal interface be- The Symbolics system presents itself to tween closely-related system components, the user through a high-resolution bitmap safety for speed. and has farther-reaching effects on system display. In addition to text and graphics, characteristics and performance. the display contains presentations of ob- A computer system typically contains jects. The user operates on the objects by many levels and types ofarchitecture. This manipulating the presentations with a article discusses three architectures de- mouse. The display includes a continuous- fined in Symbolics computers: ly updated reminder of the mouse com- (1) System architecture-defines how mands applicable to the current context. -
Application Notes for Telcomp Software Applications and Avaya IP Office - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Telcomp Software Applications and Avaya IP Office - Issue 1.0 Abstract These Application Notes describe the configuration steps required for Telcomp software applications to successfully interoperate with the Avaya IP Office. The Telcomp PickUpIp application provides Caller ID capabilities to a single computer, or to a network of computers via the Telcomp PickUp application. The Telcomp PickUpEm application provides 911 emergency alert messages to be directed at a central console. All three of these applications work in conjunction with the Telcomp TcIpOff connection server application. Each of the Telcomp applications requires the functionality of run-time telephony event data streams provided by the Avaya IP Office DevLink PRO SDK interface. Information in these Application Notes has been obtained through DevConnect compliance testing and additional technical discussions. Testing was conducted via the DevConnect Program at the Avaya Solution and Interoperability Test Lab. SVS; Reviewed: Solution & Interoperability Test Lab Application Notes 1 of 18 SPOC 10/16/2007 ©2007 Avaya Inc. All Rights Reserved. IPO40-Telcomp 1. Introduction These Application Notes describe the compliance-tested configuration utilizing Telcomp software applications and Avaya IP Office. The Telcomp software application solution for Avaya IP Office consists of the following applications: PickUpIp – CallerID IP Server for IP Office TcIpOff – IP Office / Partner Translator for IP Office PickUp – CallerID client PickUpEm - 911 Alert Indicator Telcomp PickUpIp is a client/server middleware application that provides CallerID number information via a single-line screen pop and/or a multi-line menu capability from Avaya IP Office to a single computer, or a network of computers. -
The Lisp Machine: Noble Experiment Or Fabulous Failure?
THE LISP MACHINE: NOBLE EXPERIMENT OR FABULOUS FAILURE? P. T. Withington Symbolics, Inc. The “Lisp Machine”, a custom computer oriented programming, integrated pro- work-station designed specifically for the gramming environments, computer music, execution of Lisp, has been an important integrated-circuit design, and of course part of the Lisp tradition for 20 years. Artificial Intelligence (AI). Recently, the Lisp Machine has been depre- cated in view of the demise of many Lisp But, Lisp’s purity did not come without a Machine vendors, the swing towards stan- price. The choice by many languages to dardization, and the advances that reduced expose implementational limitations is often instruction set (RISC) architectures have a choice of efficiency. The speed of the brought. But rumors of its death are greatly normal case is optimized at the risk of the exaggerated. abnormal case going undetected. Lisp, on the other hand, guarantees the unusual as Unlike most commercial computer lan- well as the usual will be dealt with uni- guages, Lisp has always been a language of formly. It must always be on its guard: ideals. Its roots are in the theory of lambda- every operation must be checked for excep- calculus. Whereas other languages burden tions. As a consequence, Lisp on conven- the programmer with implementational gaps tional machines has historically been pon- in their abstractions, Lisp has always had the derous to work with. aim of supporting complete abstractions.1 This idealistic bent of Lisp has led to it often In the early 1970’s several groups of being the language of choice for computer- researchers utilized two novel hardware oriented research in universities and indus- technologies to improve the efficiency of try. -
KIMONO, a Descriptive Agent-Based Modelling Method for the Exploration of Complex Systems: an Application to Epidemiology
KIMONO, a descriptive agent-based modelling method for the exploration of complex systems: an application to epidemiology. Edouard Amouroux To cite this version: Edouard Amouroux. KIMONO, a descriptive agent-based modelling method for the exploration of complex systems: an application to epidemiology.. Modeling and Simulation. Université Pierre et Marie Curie - Paris VI, 2011. English. tel-00630779 HAL Id: tel-00630779 https://tel.archives-ouvertes.fr/tel-00630779 Submitted on 5 Dec 2011 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THESE DE DOCTORAT DE L’UNIVERSITE PIERRE ET MARIE CURIE Spécialité: Informatique (Ecole doctorale: EDITE) Présentée par Edouard AMOUROUX Pour obtenir le grade de DOCTEUR de l’UNIVERSITÉ PIERRE ET MARIE CURIE Sujet de la thèse : KIMONO: une méthode de modélisation descriptive centrée agent pour l'explication des systèmes complexes, une application en épidémiologie soutenue le 30/09/2011 devant le jury composé de : M. Directeur de thèse: Alexis Drogoul, Directeur de Recherche, IRD - UMMISCO / IFI - MSI Rapporteurs: David