Personal Distributed Computing: the Alto and Ethernet Software Abstract
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Early History of Smalltalk
The Early History of Smalltalk http://www.accesscom.com/~darius/EarlyHistoryS... The Early History of Smalltalk Alan C. Kay Apple Computer [email protected]# Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific permission. HOPL-II/4/93/MA, USA © 1993 ACM 0-89791-571-2/93/0004/0069...$1.50 Abstract Most ideas come from previous ideas. The sixties, particularly in the ARPA community, gave rise to a host of notions about "human-computer symbiosis" through interactive time-shared computers, graphics screens and pointing devices. Advanced computer languages were invented to simulate complex systems such as oil refineries and semi-intelligent behavior. The soon-to- follow paradigm shift of modern personal computing, overlapping window interfaces, and object-oriented design came from seeing the work of the sixties as something more than a "better old thing." This is, more than a better way: to do mainframe computing; for end-users to invoke functionality; to make data structures more abstract. Instead the promise of exponential growth in computing/$/volume demanded that the sixties be regarded as "almost a new thing" and to find out what the actual "new things" might be. For example, one would compute with a handheld "Dynabook" in a way that would not be possible on a shared mainframe; millions of potential users meant that the user interface would have to become a learning environment along the lines of Montessori and Bruner; and needs for large scope, reduction in complexity, and end-user literacy would require that data and control structures be done away with in favor of a more biological scheme of protected universal cells interacting only through messages that could mimic any desired behavior. -
Towards a Secure Agent Society
Towards A Secure Agent So ciety Qi He Katia Sycara The Rob otics Institute The Rob otics Institute Carnegie Mellon University Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. Pittsburgh, PA 15213, U.S.A [email protected] [email protected] March 23, 1998 Abstract We present a general view of what a \secure agent so ciety" should b e and howtode- velop it rather than fo cus on any sp eci c details or particular agent-based application . We b elieve that the main e ort to achieve security in agent so cieties consists of the following three asp ects:1 agent authentication mechanisms that form the secure so ciety's foundation, 2 a security architecture design within an agent that enables security p olicy making, se- curity proto col generation and security op eration execution, and 3 the extension of agent communication languages for agent secure communication and trust management. In this pap er, all of the three main asp ects are systematically discussed for agent security based on an overall understanding of mo dern cryptographic technology. One purp ose of the pap er is to give some answers to those questions resulting from absence of a complete picture. Area: Software Agents Keywords: security, agent architecture, agent-based public key infrastructure PKI, public key cryptosystem PKCS, con dentiality, authentication, integrity, nonrepudiation. 1 1 Intro duction If you are going to design and develop a software agent-based real application system for elec- tronic commerce, you would immediately learn that there exists no such secure communication between agents, which is assumed by most agent mo del designers. -
Stanford University Medical Experimental Computer Resource (SUMEX) Records SC1248
http://oac.cdlib.org/findaid/ark:/13030/c8s46z8g Online items available Guide to the Stanford University Medical Experimental Computer Resource (SUMEX) Records SC1248 Daniel Hartwig & Jenny Johnson Department of Special Collections and University Archives January 2018 Green Library 557 Escondido Mall Stanford 94305-6064 [email protected] URL: http://library.stanford.edu/spc Guide to the Stanford University SC1248 1 Medical Experimental Computer Resource (SUMEX) Records SC... Language of Material: English Contributing Institution: Department of Special Collections and University Archives Title: Stanford University Medical Experimental Computer Resource (SUMEX) records Identifier/Call Number: SC1248 Physical Description: 33 Linear Feet Date (inclusive): 1975-1991 Special Collections and University Archives materials are stored offsite and must be paged 48 hours in advance. For more information on paging collections, see the department's website: http://library.stanford.edu/spc. Conditions Governing Access Materials are open for research use. Audio-visual materials are not available in original format, and must be reformatted to a digital use copy. Conditions Governing Use All requests to reproduce, publish, quote from, or otherwise use collection materials must be submitted in writing to the Head of Special Collections and University Archives, Stanford University Libraries, Stanford, California 94304-6064. Consent is given on behalf of Special Collections as the owner of the physical items and is not intended to include or imply permission from the copyright owner. Such permission must be obtained from the copyright owner, heir(s) or assigns. Restrictions also apply to digital representations of the original materials. Use of digital files is restricted to research and educational purposes. -
1. Course Information Are Handed Out
6.826—Principles of Computer Systems 2006 6.826—Principles of Computer Systems 2006 course secretary's desk. They normally cover the material discussed in class during the week they 1. Course Information are handed out. Delayed submission of the solutions will be penalized, and no solutions will be accepted after Thursday 5:00PM. Students in the class will be asked to help grade the problem sets. Each week a team of students Staff will work with the TA to grade the week’s problems. This takes about 3-4 hours. Each student will probably only have to do it once during the term. Faculty We will try to return the graded problem sets, with solutions, within a week after their due date. Butler Lampson 32-G924 425-703-5925 [email protected] Policy on collaboration Daniel Jackson 32-G704 8-8471 [email protected] We encourage discussion of the issues in the lectures, readings, and problem sets. However, if Teaching Assistant you collaborate on problem sets, you must tell us who your collaborators are. And in any case, you must write up all solutions on your own. David Shin [email protected] Project Course Secretary During the last half of the course there is a project in which students will work in groups of three Maria Rebelo 32-G715 3-5895 [email protected] or so to apply the methods of the course to their own research projects. Each group will pick a Office Hours real system, preferably one that some member of the group is actually working on but possibly one from a published paper or from someone else’s research, and write: Messrs. -
Learning with Squeak Etoys
Learning with Squeak Etoys Cathleen Galas, Rita Freudenberg VPRI Research Note RN-2010-002 Viewpoints Research Institute, 1025 Westwood Blvd 2nd flr, Los Angeles, CA 90024 t: (310) 208-0524 Constructionism 2010, Paris Learning with Squeak Etoys Cathleen Galas, [email protected] Squeakland Foundation, Galas Consulting Rita Freudenberg, [email protected] Dept of Computer Science, Otto-von-Guericke-University Magdeburg, Squeakland Foundation Abstract This paper serves as introduction and overview of Squeak Etoys, an engaging computer media- authoring environment, and describes how it aids in the constructionist approach to learning, thinking, and education. Etoys development was inspired by LOGO, the constructionist ideas of Seymour Papert, and Piaget, Bruner, and Montessori. It was developed to help student exploration and discovery in learning and thinking deeply about powerful ideas in math and science. The design of Etoys includes a powerful user interface that will run on all platforms and allow users to author in multiple dimensions. Etoys is an object-oriented system that is built in Squeak, an open-source implementation of Smalltalk. The learning environment is an open world, a sandbox, ready for the creative visions of the user, and undisturbed by buttons and toolbars. Resources are readily available, a click away, stored in flaps, hidden windows that open to many new possibilities. Beginning activities involve creating and scripting objects, building collaboration between objects, and building, exploring, and sharing -
Bpml 30-Nov-77 08:14 42492 This File Is a Combination Ot Two Earlier Files
BPMl 30-Nov-77 08:14 42492 ,NLS DOCUMENTS AND PUBLICATIONS LIST - May 1977 This file is a combination ot two earlier files that included a listing of ARC publl~ations and documents through May 1977. It was compiled by Nina Zolotow. 1 AUGMENTATION RESEARCH CENTER PUBLICATIONS 2 Engelbart, D.C., "Special Considerations of tne Individual as a User, Generator, and RetrieVer of Information," Reprinted from American Documentation, Vol. 12, No.2, APrll, 1961 (XDOC··0585,) 3 Engelbart, D.C., "Augmenting Human Intellect: A Conceptual Framework," Stanford Research Inst1tute, Augmentation Research Center, AFOSR-322J, AD-289 5&5m October 1962 (XDOC--3906 J ) 4 Engelbart, D.C., "A Conceptual Framework for the Augmentation Of Man·s Intellect," VISTAS IN INFORMATION HANDLING, Howerton and Weeds (Editors), spartan BOOkS, Washington, D.C~, 1963, PP. 1-29 (XDOC-·0981,) 5 Engelbart, D.C., Sorenson, P.H., "Explorations in the Automation of Sensorimotor SkIll Tralnlng," stanford Research Institute, MAVTRADEVCEN 1517-1, AD 619 046, January 1965 (XDOC--11736,) 6 Engelbart, D.C., "Augmenting Human Intellect: Experiments, Concepts, and Posslbilltles--Summary Report," Stanford Research Institute, Au~mentatlon Research Center, March 1965 (XDOC--9691,) 7 EngliSh, W.K., Engelbart, D.C., HUddart, B., "Computer Aided DiSPlay Control--Final Report.," Stanford Research Institute, Augmentation Research Center, July 1965 (XDOC--9692,) 8 English, W.K., Engelbart, D.c., Berman, M.A., "DisplaY-Selection Techniques for Text ManiPulation," IEEE TRANSACTIONS ON HUMAN FACTORS IN ELECTRONICS, VOl. HFE~8, No.1, Pp. 5-15, March 1967 (XDOc--9694,) 9 Licklider, J.C.R., Taylor, R.W., Herbert, E., "The Computer as a CommuniCation Device," INTERNATIONAL SCIENCE AND TECHNOLOGY, NO. -
S.No. Name of Article Page No. Details of Author(S)
S.NO. NAME OF PAGE DETAILS OF AUTHOR(S) ARTICLE NO. 1. SOCIAL MEDIA, USE, Page 03- Mr. Alfredo M. Ronchi MISUSE, ABUSE, Page 24 General Secretary of the European REGULATION AND Commission-MEDICI Framework THE WAY FORWARD Piazza Leonarda da Vinci, 32, 20133, Milan, Italy 00390223991 [email protected] 2 SOCIAL MEDIA, USE, MISUSE, ABUSE, REGULATION AND THE WAY FORWARD • Abstract As a side effect of globalisation and massive cyber services the number of crimes both perpetrated at local and global level is growing up. Governments and Law Enforcement Agencies are aware of this and look for potential countermeasures not only following traditional solutions. Technological countermeasures are not enough there is a need to foster the Culture of Cyber Security. This paper will start setting the scene and describing the evolutionary path followed by cyber technology. The issue of privacy tightly connected with information and data ownership will open a more general discussion about risks and threats connected with the increasing use of cyber technologies. Cybersecurity and the need to foster a “Culture of cybersecurity” will take us to the latest part of the document devoted to the social and economic impact of “cyber”. Economic and social impacts of cyber technology are considered as well. Keywords: Data Ownership, Privacy, Ethics, Cybersecurity, Culture of cybersecurity • Setting The Scene We are witnessing relevant changes due to both technological enhancements and modification of user requirements/expectations. In recent times the digital domain, once strictly populated by professional users and computer scientists, has opened up to former digitally divided. Technology is evolving toward a mature “calm” [4 - Weiser 1991] phase, “users” are overlapping more and more with “citizens” [5 - Council of Europe 2001] and they consider technology and e-Services [6 – Ronchi 2019] as an everyday commodity, to buy a ticket, to meet a medical doctor, to access the weather forecast. -
A Public Record
Contested Commons / Trespassing Publics A Public Record I The contents of this book are available for free download and may be republished www.sarai.net/events/ip_conf/ip_conf.htm III Contested Commons / Trespassing Publics: A Public Record Produced and Designed at the Sarai Media Lab, Delhi Conference Editors: Jeebesh Bagchi, Lawrence Liang, Ravi Sundaram, Sudhir Krishnaswamy Documentation Editor: Smriti Vohra Print Design: Mrityunjay Chatterjee Conference Coordination: Prabhu Ram Conference Production: Ashish Mahajan Free Media Lounge Concept/Coordination: Monica Narula Production: Aarti Sethi, Aniruddha Shankar, Iram Ghufran, T. Meriyavan, Vivek Aiyyer Documentation: Aarti Sethi, Anand Taneja, Khadeeja Arif, Mayur Suresh, Smriti Vohra, Taha Mehmood, Vishwas Devaiah Recording: Aniruddha Shankar, Bhagwati Prasad, Mrityunjay Chatterjee, T. Meriyavan Interviews Camera/Sound: Aarti Sethi, Anand Taneja, Debashree Mukherjee, Iram Ghufran, Khadeej Arif, Mayur Suresh, Taha Mehmood Web Audio: Aarti Sethi, Bhagwati Prasad http://www.sarai.net/events/ip_conf.htm Conference organised by The Sarai Programme Centre for the Study of Developing Societies, Delhi, India www.sarai.net Alternative Law Forum (ALF), Bangalore, India www.altlawforum.org Public Lectures in collaboration with Public Service Broadcasting Trust, Delhi, India www.psbt.org Published by The Sarai Programme Centre for the Study of Developing Societies 29 Rajpur Road, Delhi 110054, India Tel: (+91) 11 2396 0040 Fax: (+91) 11 2392 8391 E-mail: [email protected] Printed at ISBN 81-901429-6-8 -
Purpose and Introductions
Desktop Publishing Pioneer Meeting Day 1 Session 1: Purpose and Introductions Moderators: Burt Grad David C. Brock Editor: Cheryl Baltes Recorded May 22, 2017 Mountain View, CA CHM Reference number: X8209.2017 © 2017 Computer History Museum Table of Contents INTRODUCTION ....................................................................................................................... 5 PARTICIPANT INTRODUCTIONS ............................................................................................. 8 Desktop Publishing Workshop: Session 1: Purpose and Introduction Conducted by Software Industry Special Interest Group Abstract: The first session of the Desktop Publishing Pioneer Meeting includes short biographies from each of the meeting participants. Moderators Burton Grad and David Brock also give an overview of the meeting schedule and introduce the topic: the development of desktop publishing, from the 1960s to the 1990s. Day 1 will focus on the technology, and day 2 will look at the business side. The first day’s meeting will include the work at Xerox PARC and elsewhere to create the technology needed to make Desktop Publishing feasible and eventually economically profitable. The second day will have each of the companies present tell the story of how their business was founded and grew and what happened eventually to the companies. Jonathan Seybold will talk about the publications and conferences he created which became the vehicles which popularized the products and their use. In the final session, the participants will -
Oral History of Butler Lampson
Oral History of Butler Lampson Interviewed by: Alan Kay Recorded: August 22, 2006 Cambridge, Mass. CHM Reference number: X3697.2007 © 2006 Computer History Museum Oral History of Butler Lampson Alan Kay: Part of my job here as given by the Computer History Museum is to try and get a few good words from you that we could use as the opening blurb for your award from the Computer History Museum. But also to get an oral history. Butler Lampson: I was going to say, I thought the job was to record hours of brilliant conversation that historians in 2100 will pore over. Kay: That is your job. My job is to only to try and instigate it. My theory about this thing is that you should not try and talk short. Lampson: Well, we’ve got lots of time right? Kay: Okay. We do have lots of time and tape is cheap. Lampson: Tape is cheap. Right. My sister’s a film editor and she hates it. She says things were much better in the days when film was expensive, because people would think about what they shot. Now, she says, they shoot hundreds of hours of crap and then they expect the editor to sort it out. Kay: We have to transcribe those hundreds of hours. Lampson: Yeah. Somebody’s got to look at it, it’s got to be fussed around with, and besides, she says, frequently in the whole of hundreds of hours you don’t find what you want because nobody thought about it beforehand. Kay: You remember Bonnie, my wife, ran a film and video company for ten years. -
The Cedar Programming Environment: a Midterm Report and Examination
The Cedar Programming Environment: A Midterm Report and Examination Warren Teitelman The Cedar Programming Environment: A Midterm Report and Examination Warren Teitelman t CSL-83-11 June 1984 [P83-00012] © Copyright 1984 Xerox Corporation. All rights reserved. CR Categories and Subject Descriptors: D.2_6 [Software Engineering]: Programming environments. Additional Keywords and Phrases: integrated programming environment, experimental programming, display oriented user interface, strongly typed programming language environment, personal computing. t The author's present address is: Sun Microsystems, Inc., 2550 Garcia Avenue, Mountain View, Ca. 94043. The work described here was performed while employed by Xerox Corporation. XEROX Xerox Corporation Palo Alto Research Center 3333 Coyote Hill Road Palo Alto, California 94304 1 Abstract: This collection of papers comprises a report on Cedar, a state-of-the-art programming system. Cedar combines in a single integrated environment: high-quality graphics, a sophisticated editor and document preparation facility, and a variety of tools for the programmer to use in the construction and debugging of his programs. The Cedar Programming Language is a strongly-typed, compiler-oriented language of the Pascal family. What is especially interesting about the Ce~ar project is that it is one of the few examples where an interactive, experimental programming environment has been built for this kind of language. In the past, such environments have been confined to dynamically typed languages like Lisp and Smalltalk. The first paper, "The Roots of Cedar," describes the conditions in 1978 in the Xerox Palo Alto Research Center's Computer Science Laboratory that led us to embark on the Cedar project and helped to define its objectives and goals. -
The Origins of Word Processing and Office Automation
Remembering the Office of the Future: The Origins of Word Processing and Office Automation Thomas Haigh University of Wisconsin Word processing entered the American office in 1970 as an idea about reorganizing typists, but its meaning soon shifted to describe computerized text editing. The designers of word processing systems combined existing technologies to exploit the falling costs of interactive computing, creating a new business quite separate from the emerging world of the personal computer. Most people first experienced word processing using a word processor, we think of a software as an application of the personal computer. package, such as Microsoft Word. However, in During the 1980s, word processing rivaled and the early 1970s, when the idea of word process- eventually overtook spreadsheet creation as the ing first gained prominence, it referred to a new most widespread business application for per- way of organizing work: an ideal of centralizing sonal computers.1 By the end of that decade, the typing and transcription in the hands of spe- typewriter had been banished to the corner of cialists equipped with technologies such as auto- most offices, used only to fill out forms and matic typewriters. The word processing concept address envelopes. By the early 1990s, high-qual- was promoted by IBM to present its typewriter ity printers and powerful personal computers and dictating machine division as a comple- were a fixture in middle-class American house- ment to its “data processing” business. Within holds. Email, which emerged as another key the word processing center, automatic typewriters application for personal computers with the and dictating machines were rechristened word spread of the Internet in the mid-1990s, essen- processing machines, to be operated by word tially extended word processing technology to processing operators rather than secretaries or electronic message transmission.