The Burroughs B5000 Conference
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The PORTHOS Executive System for the IBM 7094
A § 1 " * '& I m I ^ ;/ 1 ^ # **W : : : The Porthos Executive System for the IBM 7O9I+ User ' s Manual Table of Contents Title Sheet Preface Table of Contents 1. The 709^-1^01 Computer Installation 1.1. Description 1.1.1. General 1.1.2. Organization 1.1.3* Equipment 1.2. Programming Services 1.2.1. System Consulting 1.2.2. System Development 1.2.3- Associated Programmers 1.3« Library Services 1.3* 1' Program Documentation 1.3*2. Subroutines I.3. 3« Reference Publications 1.3.1+. The Mailing List 1.3' 5* Information Bulletins Date 5/1/65 Section Contents Page: 1 Change 2 Porthos Manual Digitized by the Internet Archive in 2012 with funding from University of Illinois Urbana-Champaign http://archive.org/details/porthosexecutivesyOOuniv : s 2. Use of the Computing Facility 2.1. Conditions of Use 2.1.1. Policy for Charging for Computer Use 2.1.2. Refunding of IBM 7094 Time Due to System or Machine Failures 2.1.2.1. In-System Jobs 2.1.2.2. Relinquish Jobs 2.2. Application for Use of Equipment 2.2.1. The Form 2.2.2. Submission and Approval 2.2.3. Entries on the Problem Specification Form 2.2.4. Changes in the Problem Specification 2.2.5. Problem Abstracts 2.3- Logging and Control of Computer Time 2.3«1« Accounting for Computer Time 2.3.2. Notices to Users Concerning Lapsing Time 2.3.3. Department Reports 2.3'3-l« Internal Reports 2. 3- 3* 2. The Technical Progress Report 2. -
Burroughs Military Computer
05684 1 OCTOBER 1965 BURROUGHS MODULAR INTEGRATED CIRCUIT MILITARY COMPUTER ~~~-Burroughs Corporation-- 05684 1 OCTOBER 1965 BURROUGHS MODULAR INTEGRATED CIRCUIT MILITARY COMPUTER CHARTS 1 THROUGH 11 INTRODUCTION CHARTS 12 THROUGH 27 LOGIC/SYSTEM CHARTS 28 THROUGH 37 CIRCUITS CHARTS 38 THROUGH 51 PACKAGING CHARTS 52 THROUGH 54 SUMMARY ;.......!----Burroughs Corporation ---- 1. FUNCTIONAL MODULARITY -MATRIX ORGANIZATION 0825 -1962 0830 -1964 88500-1966 2. ADVANCED MICROCIRCUIT TECHNIQUES*, AND 3. ADVANCED MAULER COMPUTER DESIGN** * FEB. 164 COMPLETION OF 12-BIT ARITHMETIC UNIT (700 I.C"s ) LIFE-TEST CONTINUING. ** TO IMPROVE T. E.C. (REDUCE IN SIZE, INCREASE MTBF) 1. COMBINED TO PRODUCE D84 * FEATURING PHYSICALLY INDEPENDENT FUNCTIONAL MODULES ALL LOGIC IMPL~M£NTED WITH MONOLITHIC INTEGRATED CIRCUITS FOR FLEXIBILITY IN SYSTEMS CONFIGURATIONS GROWTH POTENTIAL BUILT-IN COMPACT RELIABILITY LIGHT-WEIGHT LOW POWER CONSUMPTION PROTOTYPE (OPERATIONAL JANUARY 165) DIFFERS FROM PRODUCTION 084 (1) PACKAGING MORE COMPACT-100 % FLATPACK UTILIZATION/LOGISTICAL DISADVANTAGE, AN 0 (2) INSTRUCTION REPERTOIRE-35 BASIC COMMANDS VS. 47 * NOV. 163 START-UP. 2. T 8 D C. N. M. - 11 3 - D II OVER 100 TYPES -- ALL FLATPACKS USED: LINE MAINTENANCE AT FUNCTIONAL MODULE LEVEL 3. 1 D84 C. N. M. .1 2 - D" 35 MAX. TYPES (ON LY 23 IN LOGIC*) : AVERAGE FLATPACK UTILIZATION 10 TO 11 PER CNM: LINE. MAINTENANCE AT CNM (THROWAWAY) LEVEL- MADE PRACTICAL VIA DIAGNOSTICS PROGRA.M * i. e. EXCLUDING MEMORY AND SPECIAL 1/0 CIRCUITS 4. MAJOR ADVANTAGES I. LOW COST • DEVELOPMENT COMPLETE • ONE TIME CHARGES RESTRICTED TO DESIGN OF SPECIAL INTERFACES IN THE IIO MODULE. 2. MODULAR EXPANSIBILITY THROUGH TO MULTIPROCESSING FOR MORE THROUGHPUT AND/OR GRACEFUL DEGRADATION. -
Corporate Profile of Nihon Unisys, Ltd
Nihon Unisys Group Marketing, Business development and Consulting Infrastructure Services ●Nihon Unisys, Ltd. https://www.unisys.co.jp/e/ ●UNIADEX, Ltd. https://www.uniadex.co.jp/ We coordinate, propose and execute business and ICT services (including We are a global and vendor-agnostic company offering comprehensive Corporate Profile consulting, planning, development, operation and maintenance). services (including consulting, planning, construction, operation and maintenance, facilities) for ICT infrastructure (data center, servers, networks ●UEL Corporation https://www.excel.co.jp/ and devices). We develop 3D CAD/CAM and housing CAD systems as well as business Nihon Unisys, Ltd. solutions and services. ●S&I Co., Ltd. https://sandi.jp/ We provide ICT infrastructure solutions to our clients including consulting,design, ●Cambridge Technology Partners, Ltd. https://en.ctp.co.jp/ construction, operation and maintenance based on virtualization strategy. We provide a wide range of facilitation-driven consulting services from planning for transformation at customers to IT implementation and Systems Services restructuring. ●USOL Vietnam Co., Ltd. https://www.usol-v.com.vn/ AFAS Inc. https://www.afasinc.co.jp/ ● Offshore development center of the Nihon Unisys Group. Our expert professionals in financial business provide the optimal solutions Providing software development services for the Nihon Unisys Group and its for financial institutions. customers in Japan. ●Canal Ventures, Ltd. https://www.canal-v.com/ ●International Systems Development Co., Ltd. https://www.isd.co.jp/ We are a corporate venture capital arm of Nihon Unisys Group. We provide locally based services utilizing latest technology and knowhow in Our mission is to accelerate the digital transformation through Okinawa region. the creation of business ecosystem comprising such players as startups, investors and large companies. -
The Protection of Information in Computer Systems
The Protection of Information in Computer Systems JEROME H. SALTZER, SENIOR MEMBER, IEEE, AND MICHAEL D. SCHROEDER, MEMBER, IEEE Invited Paper Abstract - This tutorial paper explores the mechanics of Confinement protecting computer-stored information from unauthorized Allowing a borrowed program to have access to data, use or modification. It concentrates on those architectural while ensuring that the program cannot release the structures--whether hardware or software--that are information. necessary to support information protection. The paper Descriptor develops in three main sections. Section I describes A protected value which is (or leads to) the physical desired functions, design principles, and examples of address of some protected object. elementary protection and authentication mechanisms. Any Discretionary reader familiar with computers should find the first section (In contrast with nondiscretionary.) Controls on access to be reasonably accessible. Section II requires some to an object that may be changed by the creator of the familiarity with descriptor-based computer architecture. It object. examines in depth the principles of modern protection Domain architectures and the relation between capability systems The set of objects that currently may be directly and access control list systems, and ends with a brief accessed by a principal. analysis of protected subsystems and protected objects. Encipherment The reader who is dismayed by either the prerequisites or The (usually) reversible scrambling of data according the level of detail in the second section may wish to skip to to a secret transformation key, so as to make it safe for Section III, which reviews the state of the art and current transmission or storage in a physically unprotected research projects and provides suggestions for further environment. -
Sperry Rand's Third-Generation Computers 1964–1980
Sperry Rand’s Third-Generation Computers 1964–1980 George T. Gray and Ronald Q. Smith The change from transistors to integrated circuits in the mid-1960s marked the beginning of third-generation computers. A late entrant (1962) in the general-purpose, transistor computer market, Sperry Rand Corporation moved quickly to produce computers using ICs. The Univac 1108’s success (1965) reversed the company’s declining fortunes in the large-scale arena, while the 9000 series upheld its market share in smaller computers. Sperry Rand failed to develop a successful minicomputer and, faced with IBM’s dominant market position by the end of the 1970s, struggled to maintain its position in the computer industry. A latecomer to the general-purpose, transistor would be suitable for all types of processing. computer market, Sperry Rand first shipped its With its top management having accepted the large-scale Univac 1107 and Univac III comput- recommendation, IBM began work on the ers to customers in the second half of 1962, System/360, so named because of the intention more than two years later than such key com- to cover the full range of computing tasks. petitors as IBM and Control Data. While this The IBM 360 did not rely exclusively on lateness enabled Sperry Rand to produce rela- integrated circuitry but instead employed a tively sophisticated products in the 1107 and combination of separate transistors and chips, III, it also meant that they did not attain signif- called Solid Logic Technology (SLT). IBM made icant market shares. Fortunately, Sperry’s mili- a big event of the System/360 announcement tary computers and the smaller Univac 1004, on 7 April 1964, holding press conferences in 1005, and 1050 computers developed early in 62 US cities and 14 foreign countries. -
TCD-SCSS-T.20121208.032.Pdf
AccessionIndex: TCD-SCSS-T.20121208.032 Accession Date: 8-Dec-2012 Accession By: Prof.J.G.Byrne Object name: Burroughs 1714 Vintage: c.1972 Synopsis: Commercial zero-instruction-set computer used by the Dept.Computer Science from 1973-1979. Just two prototyping boards survive. Description: The Burroughs 1714 was one of their B1700 family, introduced in 1972 to compete with IBM's System/3. The original research for the B1700 series, initially codenamed the Proper Language Processor or Program Language Processor (PLP) was done at the Burroughs Pasadena plant. The family were known as the Burroughs Small Systems, as distinct from the Burroughs Medium Systems (B2000, etc) and the Burroughs Large Systems (B5000, etc). All the Burroughs machines had high-level language architectures. The large were ALGOL machines, the medium COBOL machines, but the small were universal machines. The principal designer of the B1700 family was Wayne T. Wilner. He designed the architecture as a zero-instruction-set computer, an attempt to bridge the inefficient semantic gap between the ideal solution to a particular programming problem and the real physical hardware. The B1700 architecture executed idealized virtual machines for any language from virtual memory. It achieved this feat by microprogramming, see the microinstruction set further below. The Burroughs MCP (Master Control Program) would schedule a particular job to run, then preload the interpreter for whatever language was required into a writeable control store, allowing the machine to emulate the desired virtual machine. The hardware was optimised for this. It had bit-addressable memory, a variable-width ALU, could OR in data from a register into the instruction register (for very efficient instruction parsing), and the output of the ALU was directly addressable as X+Y or X-Y read-only registers. -
Sperry Corporation, UNIVAC Division Photographs and Audiovisual Materials 1985.261
Sperry Corporation, UNIVAC Division photographs and audiovisual materials 1985.261 This finding aid was produced using ArchivesSpace on September 14, 2021. Description is written in: English. Describing Archives: A Content Standard Audiovisual Collections PO Box 3630 Wilmington, Delaware 19807 [email protected] URL: http://www.hagley.org/library Sperry Corporation, UNIVAC Division photographs and audiovisual materials 1985.261 Table of Contents Summary Information .................................................................................................................................... 3 Historical Note ............................................................................................................................................... 4 Scope and Content ......................................................................................................................................... 5 Arrangement ................................................................................................................................................... 6 Administrative Information ............................................................................................................................ 6 Related Materials ........................................................................................................................................... 7 Controlled Access Headings .......................................................................................................................... 8 Bibliography -
Creativity – Success – Obscurity
Author Gerry Pickering CREATIVITY – SUCCESS – OBSCURITY UNIVAC, WHAT HAPPENED? A fellow retiree posed the question of what happened. How did the company that invented the computer snatch defeat from the jaws of victory? The question piqued my interest, thus I tried to draw on my 32 years of experiences in the company and the myriad of information available on the Internet to answer the question for myself and hopefully others that may still be interested 60+ years after the invention and delivery of the first computers. Computers plural, as there were more than one computer and more than one organization from which UNIVAC descended. J. Presper Eckert and John Mauchly, located in Philadelphia PA are credited with inventing the first general purpose computer under a contract with the U.S. Army. But our heritage also traces back to a second group of people in St. Paul MN who developed several computers about the same time under contract with the U.S. Navy. This is the story of how these two companies started separately, merged to become one company, how that merged company named UNIVAC (Universal Automatic Computers) grew to become a main rival of IBM (International Business Machines), then how UNIVAC was swallowed by another company to end up in near obscurity compared to IBM and a changing industry. Admittedly it is a biased story, as I observed the industry from my perspective as an employee of UNIVAC. It is also biased in that I personally observed only a fraction of the events as they unfolded within UNIVAC. This story concludes with a detailed account of my work assignments within UNIVAC. -
1. Types of Computers Contents
1. Types of Computers Contents 1 Classes of computers 1 1.1 Classes by size ............................................. 1 1.1.1 Microcomputers (personal computers) ............................ 1 1.1.2 Minicomputers (midrange computers) ............................ 1 1.1.3 Mainframe computers ..................................... 1 1.1.4 Supercomputers ........................................ 1 1.2 Classes by function .......................................... 2 1.2.1 Servers ............................................ 2 1.2.2 Workstations ......................................... 2 1.2.3 Information appliances .................................... 2 1.2.4 Embedded computers ..................................... 2 1.3 See also ................................................ 2 1.4 References .............................................. 2 1.5 External links ............................................. 2 2 List of computer size categories 3 2.1 Supercomputers ............................................ 3 2.2 Mainframe computers ........................................ 3 2.3 Minicomputers ............................................ 3 2.4 Microcomputers ........................................... 3 2.5 Mobile computers ........................................... 3 2.6 Others ................................................. 4 2.7 Distinctive marks ........................................... 4 2.8 Categories ............................................... 4 2.9 See also ................................................ 4 2.10 References -
A History of Silicon Valley the Greatest Creation of Wealth in History (An Immoral Tale) Being a Presentation by Piero Scaruffi
A History of Silicon Valley The Greatest Creation of Wealth in History (An immoral tale) being a presentation by piero scaruffi www.scaruffi.com adapted from the book “A History of Silicon Valley” Piero Scaruffi • Cultural Historian • Cognitive Scientist • Blogger • Poet • www.scaruffi.com www.scaruffi.com 2 This is Part 2 • See http://www.scaruffi.com/svhistory for the index of this Powerpoint presentation and links to the other parts – 1900-1960 – The 1960s – The 1970s – The 1980s – The 1990s – The 2000s www.scaruffi.com 3 What the book is about… • The book is a history of the high-tech industry in the San Francisco Bay Area (of which Silicon Valley is currently the most famous component) www.scaruffi.com 4 Semiconductors – Fairchild Semiconductors’ planar integrated circuit (1961) – Fairchild Semiconductors employees: Don Farina, Don Valentine, Charles Sporck, Jerry Sanders, Jack Gifford, Mike Markkula – Signetics (1961), first Fairchild spinoff – Main customers of integrated circuits: the Air Force and NASA www.scaruffi.com 5 Life Sciences • Stanford hires Carl Djerassi (1959), inventor of the birth-control pill • Alejandro Zaffaroni’s Syntex relocates to the Stanford Industrial Park (1963) www.scaruffi.com 6 Meanwhile elsewhere… • New York – IBM 7000 transistorized series (1960) – IBM’s SABRE (1960), the first online transaction processing, an adaptation of SAGE to automating American Airlines' reservation system – GE’s IDS (1961), the first database management system • Boston (MIT) – CTSS (1961), the first time-sharing system – "Spacewar" (1962), the first computer game – Ivan Sutherland’s "Sketchpad“ (1963), the first computer program with a GUI www.scaruffi.com 7 Meanwhile elsewhere… • US Government – Paul Baran (Rand Corp): a distributed network of computers can survive a nuclear strike (1962) – Ted Nelson (Harvard Univ): hypertext (1965) – Joseph Licklider (DARPA’s IPTO) funds Project MAC for A.I. -
M. Craig Weaver Society for Worldwide Interbank Financial
M. Craig Weaver 106 Lakewood Drive Coatesville, PA 19320 (484) 712-0479 [email protected] S UMMARY Software Engineering professional with extensive experience in the design and development of system networking software and layered network architectures. A team-oriented communicator with the ability to solve complex problems using strong analytical skills. Effectively analyzed, designed and developed global networking software products on platforms ranging from micro, server, and mid-range to mainframe computers. Core strengths: • Software design, specification, and programming • Team Management • Software Quality Assurance Testing • Network troubleshooting and problem solution • Software problem analysis and solution • Burroughs Network Architecture expert • Complex protocol design and implementation • Networking and layered network architectures T E C H N I C A L S KILLS LANGUAGES JavaScript, C++, C, ALGOL, FORTRAN, HTML, Intel Assembler, Pascal, and others. PLATFORMS UNIX Systems; Microsoft Windows based systems (WINNT/WIN2000/WINXP); Unisys A-Series; Unisys V-Series; Unisys Clearpath; Unisys ES7000; Burroughs Large Systems; Burroughs Medium systems; Intel Processor based communications processor cards; Burroughs CP9500/B900. P ROFESSIONAL E XPERIENCE Society for Worldwide Interbank Financial Telecommunication (SWIFT) 2008 – 2014 International Member Owned Banking Cooperative Manassas, Virginia SENIO R SOFTWARE ENG INEER – CONTRACT FIN Renewal Project – Moving the SWIFT financial application software from Unisys machines (ALGOL) to HP UNIX machines (C++) • Tested ALTOS conversion tool. Created test cases from canonical ALGOL forms, converting them using ALTOS, then comparing the ALGOL and C++ test results. Diagnosed discrepancies and either designed solutions or required changes to the tool. • Converted Unisys ALGOL into UNIX C++ code. Tested, debugged and maintained the converted C++ code. -
Classification of Computers
Classification of Computers Computer systems used for business purposes can be divided in to three classes: Microcomputers, Minicomputers and Mainframe computers. Though these divisions are loosely based on the size of the computer systems, there are no hard and fast rules for deciding exactly where one category ends and the next begin. Hence the largest minicomputer systems are often larger than the smallest mainframe computers. The “size” of a computer system is dependent on the size of a computer’s hardware configuration, the nature of its applications, and the complexity of its system software. This helps us to classify a system as a microcomputer, minicomputer or mainframe. Irrespective of size, all computers consist of two basic types of components. Those are processors and input/output (I/O) devices. The processor consists of three parts: the Central Processing Unit, or CPU, main storage and device controllers. The CPU executes instructions, main storage stores instructions and data processed by the CPU and device controllers let the CPU and main storage connect to I/O devices. Note: Though all computer systems consist of three basic components, the way those components are combined for a particular computer system varies depending on the system’s requirements. Microcomputer or Personal Computer Microcomputer is primarily intended for stand-alone use by an individual. Microcomputers are small, single-user systems which provide a simple processor and just a few input/output devices. This system consists of a processor with 2 or 4 GB of main storage, a keyboard, a display monitor, a printer, and a diskette drive with a capacity of 4GB and a 500 GB of hard disk.