Core Magazine May 2006

Total Page:16

File Type:pdf, Size:1020Kb

Core Magazine May 2006 5.1 CA PUBLICATIONo OF THEre COMPUTER HISTORY MUSEUM ⁄⁄ MAY 2006 C OM P U T E R CHESS NEW EXHIBIT SHOWCASES GAME’S PAST AND MUSEUM’S FUTURE PDP-1 RESTORATION SECRETS UNVEILED ⁄⁄ THE FASCINATING WORLD OF TECH MARKETING ⁄⁄ HOW AMERICANS HELPED BUILD THE SOVIET SILICON VALLEY ⁄⁄ EXPLORE MUSEUM ARTIFACTS >> PUBLISHER Karen M. Tucker ASSISTANT PUBLISHER DIG DEEPER! Robert S. Stetson A PUBLICATION OF THE COMPUTER HISTORY MUSEUM ⁄⁄ MAY 2006 Kirsten Tashev Visit the expanded Core website. EXECUTIVE EDITOR Leonard J. Shustek This entire issue is now online at: www.computerhistory.org/core EDITOR Karyn Wolf Lynn It’s a great way to enjoy Core all over again or share it with a friend NEW EXHIBIT EXPLORE THE COLLECTION TECHNICAL EDITOR (please do!). 3 ⁄⁄ The Quest to Build a Thinking 13 ⁄⁄ O B J E C T : Dag Spicer Machine: A History of Computer Chess Google corkboard server rack Why did computer chess capture the The computer that launched Google. ASSISTANT EDITOR attention of a generation of computer By Chris Garcia Chris Garcia scientists and what does building a computer that plays chess tell us about 14 ⁄⁄ S O F T W A R E : DESIGN the nature of machine intelligence? To Micro-Soft BASIC Code with notations Ed Anderson / Skout explore these questions, the museum has Rare handwritten notes on this early code unveiled the “Mastering the Game: A from 1976. CORE ONLINE History of Computer Chess” exhibition By Chris Garcia Grace Chen and online counterpart. Karyn Wolf Lynn By Dag Spicer and Kirsten Tashev 15 ⁄⁄ D O C U M E N T : Mike Walton News release, Software AG of North INDUSTRY TALES America www.computerhistory.org/core 16 ⁄⁄ Selling the Computer Revolution A 1982 document sheds light on The marketing of computers over the international attempts to acquire © 2006 Computer History Museum. All artwork years tells a highly visual and interesting American technology. Want more? Check out enCore is copyright of the Computer History Museum o for the hidden (or not so story of not only how computers advanced, By Sarah Wilson nline, unless otherwise credited. For reprints and but of how society’s views changed right hidden) geek in all of us. permissions, contact core@computerhistory. along with the industry. 20 ⁄⁄ M E D I A : org. Subscriptions are a member benefit; please We’ve added tons of related By Paula Jabloner “He Saw the Cat” 45 RPM Record see page 20 for details. Address changes and An early computer speech effort that made information to help you dig further other written correspondence may be sent to: down into computer history. Material RESTORATION it into the movies. Computer History Museum, Attn: Core Editor, includes: 21 ⁄⁄ Restoring the DEC PDP-1 Computer By Chris Garcia 1401 N Shoreline Blvd, Mountain View, CA 94043- A team of volunteers spent two years 1311, USA. Online exhibits analyzing, researching, repairing, and, we 26 ⁄⁄ E P H E M E R A : Video files // Film clips admit, playing with the PDP-1. Here is a First West Coast Computer Faire Cover artwork: Engraving of The Turk, 1789. Presentations by pioneers report on the joys and sorrows of restoring T-Shirt In 1770, Hungarian inventor Wolfgang von a historic computer. From a celebrated conference that helped Personal interviews Kempelen created a chess-playing automaton Transcripts // Photos By Mike Cheponis launch the microcomputer revolution. called The Turk whose human-like playing And more! By Chris Garcia qualities amazed audiences across Europe INTERNATIONAL INTRIGUE and America. Some observers guessed the 27 ⁄⁄ How Two American Spies Helped SPECIAL INSERT secret that was a mystery for most of its Build the Soviet Silicon Valley Come Explore with Us: Building a career: the source of its playing strength was What were two educated American World-Class Museum a human chess player hidden inside. Courtesy engineers able to accomplish for the Look for this symbol, which indicates of the Library Company of Philadelphia, CHM# Soviet Union as spies during the Cold that supplemental material is posted L062302012. on the web. War? A spy-thriller with a techie twist! 2 ⁄⁄ Editor’s Note By Len Shustek By Steven T. Usdin 33 ⁄⁄ Artifact Donations Photo this page: In 1968, David Levy played a Start an online adventure in Back ⁄⁄ Mystery Item friendly game of chess with Stanford professor computer history! Visit: John McCarthy. After the match McCarthy www.computerhistory.org/core remarked that within ten years a computer program would defeat Levy. Levy bet McCarthy 500 pounds that this would not be the case. In August 1978, Levy (shown here) won the bet when he defeated Chess 4.6, the strongest chess playing computer of the day. Gift of David Levy, CHM# 102634530 EDITOR’S NOTE MISSION To preserve and present for posterity the artifacts and stories of the information age This issue of Core is a wonderful demonstration that being a com- VISION puter museum is about more than just collecting old computers. To explore the computing revolution and its impact on THE QUEST TO BUILD A the human experience It is about designing physical and web-based exhibits to explain EXECUTIVE DIRECTOR & CEO the excitement of trying to build smart machines. It is about telling John C. Toole hitherto unknown spy stories leading to the development of Rus- sian computers during the Cold War. It is about bringing classic BOARD OF Steve Smith THINKING machines from 40 years ago back to life. It is about the changing TRUSTEES The Interim CEO Network fashion in how computers are promoted and sold. It is about build- Leonard J. Shustek Stephen L. Squires ing a comprehensive and eclectic collection that includes make- VenCraft, LLC (President) Consultant shift hardware, legendary software source code, historic t-shirts, Sally M. Abel Pierluigi Zappacosta Fenwick & West LLP Sierra Sciences, Inc. MACHI N E computer-generated 45 RPM records, and news releases about at- David Anderson tempted espionage of computer technology. Sendmail C. Gordon Bell BOARD OF Microsoft Corporation All these efforts represent different aspects of the same mission: ADVISORS Peggy Burke the information revolution is having a profound effect on our civi- Gene Myron Amdahl 1185 Design A HISTORY OF COMPUTER CHESS William Aspray lization, and we owe it to future generations to preserve, under- Andrea Cunningham Indiana University stand, and explain how it came to be. To do so, we collect objects CXO Communication Robert Brodersen Lori Crawford of all types as the raw material, we recreate historical conditions University of California, Infinity Capital for study, and we describe what we know to others. These goals are Berkeley Mark Dean lofty and important. IBM Almaden Research Paul E. Ceruzzi Smithsonian Institution Center by DAG SPICER and KIRSTEN TASHEV Bill Davidow Donna Dubinsky Mohr, Davidow Ventures But we also do it because it’s fun! Would we have restored the Numenta PDP-1 if it wasn’t the “Spacewar! Machine?” Maybe, but maybe Federico Faggin David Emerson Foveon not. The man-machine conflict in the computer chess exhibit is Clarent Corporation Samuel Fuller Edward Feigenbaum the essence of science fiction. The Zelenograd story is in the best Analog Devices, Inc. Stanford University tradition of dramatic spy thrillers, except that it’s true. The story Burt Grad Eric Hahn of the computer is just not the facts of technological development: Inventures Group James Gray Microsoft Corporation it is a rich human story. Gardner Hendrie Sigma Partners Jeanette Horan IBM Almaden Research Peter S. Hirshberg What of the chapters that are being written now? The pace of devel- Center Technorati opment in computers blurs the distinction between past and future. Burge Jamieson Charles House Sigma Partners The British psychiatrist R. D. Laing said, “We live in a moment Intel Corporation Randy H. Katz David House of history where change is so speeded up that we begin to see the University of California, Credence Systems present only when it is already disappearing.” Unlike those who Berkeley Christine Hughes study the history of the printing press or the Crusades, we are both Achievement Plus Steven T. Kirsch Propel Software burdened and privileged by having the object of our study evolving John Mashey Corporation Consultant in our lifetimes. What an experience that is! Tom Melcher Isaac R. Nassi SAP Greg Papadopoulos I hope you enjoy this and future issues of Core, and get involved in Sun Microsystems Suhas Patil the effort to preserve computing history. We live in a remarkable Tufan David Patterson University of California, time of technological change and should celebrate it joyously. Bernard L. Peuto Berkeley Concord Consulting John William Poduska, Sr. F. Grant Saviers Advanced Visual Systems Adaptec, Inc. (retired) James N. Porter Len Shustek Larry Schoenberg DISK/TREND, Inc. John F. Shoch Eric E. Schmidt Alloy Ventures Google Len Shustek is the Chairman of the Computer History Museum. Heidi Sinclair Burson-Marsteller He has been the co-founder of two high-tech companies, a trustee of various non-profits, a director of several corporations, and on the faculty of Carnegie Mellon and Stanford Universities. Computer History Museum 1401 N Shoreline Blvd Mountain View, CA 94043-1311 USA +1.650.810.1010 main +1.650.810.1055 fax www.computerhistory.org Copyright © 2006 Computer History Museum. All rights reserved. The museum is an independent 501(c)3 organization, TID #77-0507525. Printed in the USA. 2 CORE 5.1 WWW.COMPUTERHISTORY.ORG/CORE 3 nal) forces as a means of explaining nature. testing it with paper and pencil and using This knowledge was extended dramatically himself as the “computer.” WHY COMPUTER CHESS? in the first third of the 20th century on Commercial computers arrived in the both theoretical and experimental planes early to mid-1950s as companies applied In September 2005, the Computer History Museum opened Chess is a very ancient game.
Recommended publications
  • Macintosh ... the Naked Truth 2002.Pdf
    0 • . 'This boofl is a riot and a nlUSt-re/IA fm• "',..,~, ll!1n_.;. I! i O.l 8 ,w.s· CEO. HALF -GUY KAWASAK.I p Mo The Naked Truth An irreverent, off-the-wall, PC-slammin', totally biased look at what it's like to be a Macintosh user in a Windows®-dominated world. SCOTT KELBY BU0 fliers\ "Scott Kelby nails the joys and frustrations of being a Mac user in a PC world (though Scott's writing isn't always 'PC'). You'll laugh, you'll cry, you'll shout, ~men.' But you'll always be entertained -and know you're in the company ofa kindred spirit." DENNIS SELLERS MacCentral.com "My three favorite writers about the Macintosh experience are Guy Kawasaki, Andy Ihnatko, and Scott Kelby. Scott has the unusual ability to channel his excitement and frustration into humor and clarity that makes me laugh while he makes me think." JAY NELSON Editor & Publisher, Design Tools Monthly "Filled with insightful wit and outrageous comedy, Macintosh ... The Naked Truth will have you in stitches. A must-read for any Macintosh enthusiast." STAN FLACK President/Publisher, MacMinute.com "This is a book all Mac users should read! Scott speaks up for the average Mac user and says publicly what we've all said privately. It's a great read!" SHAWN KING The Mac Show Live "A fun read I'm sure all Mac users can relate to. I laughed out loud thinking 'yeah, that happened to me too.' Ifyou own a Mac, you should read this book." KURT CHRISTENSEN Version Tracker "Kelby is one sick puppy.
    [Show full text]
  • The Canon Cat After of Release Before Macintosh
    LORI EMERSON & FINN BRUNTON THE CANON CAT PROCESSING ADVANCED WORK In the fall of 2014, Finn Brunton, an assistant professor at NYU, contacted Lori Emerson, Director of the Media Archaeology Lab (MAL) at the University of Colorado, Boulder, about a rare fi nd he came across on ebay: a Canon Cat, which billed itself in 1986 as an “advanced work processor.” The MAL wasn’t immediately able to purchase the machine; however, Brunton purchased the Canon Cat with the agreement that he’d experiment with the Canon Cat for six months or so, sell it to the MAL, and then he and Emerson would co-write a piece – now, this piece – on the obscure machine from an ever-more distant past. Here, we hope to give you a glimpse into what computing could have been and still could be. 353 [SHIFT]+[DOCUMENT] [SHIFT]+[DOCUMENT] Who will the user be? The shape that early personal Jef Raskin began to work on designing the Canon Cat after computing takes rests in part on this question, with he left Apple in 1982, two years before release of Macintosh. its implicit temporal paradox. The scenario, or persona, The Cat was then introduced to the public by Canon in 1987 or model, or instance of the user threads through the for $1495 – roughly $3100 in 2015. Although the Cat was production of the machine, from input devices and discontinued after only six months, around 20,000 units performance criteria to software, industrial design, and were sold during this time. The Canon Cat fascinates me marketing.
    [Show full text]
  • GBCC-CIS-1 Page 1 Micro-Soft’S Macro-Impact
    CIS111 GBCC Renee Dodge CIS111 Mid-Term – Fall 2010 For your mid-term, I would like you to conduct some research on the history of computers. Select a milestone or event that you feel had a significant impact on the overall development of computers and how we use computers today. Be sure you not only provide your opinion as to why you feel this milestone is significant, but also provide historical proof - actual facts as to how this event shaped the development and use of computers. For this assignment, please complete the following: 1. Choose a topic 2. Research your topic and locate at least 5 different sources of information, overall. o At least 3 sources should be Internet websites. o Remember: Wikipedia is NOT an acceptable research source. 3. In addition to the Internet, you should also utilize the library online resources (EBSCO database, e-Books, etc). o At least 2 different sources of information should be online library resources. o If you have never used the library online resources before, you may ask me for a brief overview of how to use them or see Becky Clerkin in the library for help. 4. Include your research findings in a 5-page paper and be sure to properly cite where you found your information. If you are not sure how to cite references check out the following link: How to Cite Books, Magazines, and Web Sites in a Research Paper: http://www.lib.duke.edu/libguide/works_cited.htm 5. Upload your research paper to the Digital Drop BoX no later than Wednesday, October 27th at 11:59pm.
    [Show full text]
  • Early Stored Program Computers
    Stored Program Computers Thomas J. Bergin Computing History Museum American University 7/9/2012 1 Early Thoughts about Stored Programming • January 1944 Moore School team thinks of better ways to do things; leverages delay line memories from War research • September 1944 John von Neumann visits project – Goldstine’s meeting at Aberdeen Train Station • October 1944 Army extends the ENIAC contract research on EDVAC stored-program concept • Spring 1945 ENIAC working well • June 1945 First Draft of a Report on the EDVAC 7/9/2012 2 First Draft Report (June 1945) • John von Neumann prepares (?) a report on the EDVAC which identifies how the machine could be programmed (unfinished very rough draft) – academic: publish for the good of science – engineers: patents, patents, patents • von Neumann never repudiates the myth that he wrote it; most members of the ENIAC team contribute ideas; Goldstine note about “bashing” summer7/9/2012 letters together 3 • 1.0 Definitions – The considerations which follow deal with the structure of a very high speed automatic digital computing system, and in particular with its logical control…. – The instructions which govern this operation must be given to the device in absolutely exhaustive detail. They include all numerical information which is required to solve the problem…. – Once these instructions are given to the device, it must be be able to carry them out completely and without any need for further intelligent human intervention…. • 2.0 Main Subdivision of the System – First: since the device is a computor, it will have to perform the elementary operations of arithmetics…. – Second: the logical control of the device is the proper sequencing of its operations (by…a control organ.
    [Show full text]
  • Silicon Shores Corporation Company Backgrounder
    Silicon Shores Corporation Company Backgrounder Company Overview Headquartered in Mountain View, CA Silicon Shores Corporation is the company overseeing operations of the Shoreline Lake Boathouse and American Bistro at the Shoreline Lake Recreational Area and Wildlife Sanctuary. Silicon Shores manages the facilities through a leasing arrangement with the City of Mountain View, which owns the Shoreline Lake park area. This private company, established in 2000, is incorporated in California. Christina Ferrari is the owner and President and entered into the relationship with the City in 2000. Given the origins of Shoreline Lake, the City of Mountain View’s transformation of 544 acres of junkyard, hog farm, two substandard dumps, low lying flood plains, and a sewage treatment plant into a nature preserve was quite an undertaking. Partnering with Silicon Shores ensured that the area can provide the services and amenities that the surrounding urban population and visitors would appreciate finding within a nature preserve. Vision & Mission The company’s goal for the Shoreline Lake area is to create an experience unmatched within Silicon Valley for residents and workers of the South Bay, and beyond. The centerpiece of the Park, Shoreline Lake is a man- made, 50-acre, salt water lake filled by waters pumped in from the San Francisco Bay that circulate back out into Permanente Creek. However, a densely populated, heavily-developed area surrounds the Park, which includes many well-known hi-tech firms (e.g., Google headquarters is right next door). Even so, Shoreline Lake, a safe and expansive waterway for many water sports, is also a wildlife sanctuary and home to many rare, migratory birds, such as the burrowing owl.
    [Show full text]
  • Long-Term Growth Leonard Sherman
    Leadership Imperatives To Achieve The Holy Grail of Business: Long-Term Growth Leonard Sherman ChangeThis | 149.04 In all human endeavors we tend to revere stars that perform at a superior level over a long and illustrious career. Sports Hall of Famers Aaron, Montana, Jordan, Pelé, and Nicklaus and arts honorees Ozawa, Tharp, and Simon have earned legendary acclaim for performing immeasurably beyond the reach of most mere mortals. In business, as well, a few widely recognized companies have been able to deliver consistently superior growth over the long-term, including Amazon, who last year became the fastest company to reach $100 billion in sales, and J&J, 3M, and The Ball Corporation, each of whom has been out-innovating and outgrowing the overall market for more than a century. The Elusiveness of Long-Term Growth But these are exceptions to the rule that most companies are unable to sustain superior growth. For example, in perhaps the most definitive study of long-term business performance, the Corporate Executive Board (CEB), analyzed the long-term revenue growth of approximately five hundred Global 100 and other companies over the past half-century. The study found that only 13 percent of large enterprises could sustain a real annual revenue growth rate of as little as 2 percent over successive decades.1 ChangeThis | 149.04 Given increasing globalization and technological disruption, it is becoming harder than ever for companies to sustain growth. Researchers at the Deloitte Center for the Edge found that the “topple rate,” measuring the frequency with which companies lose their market leadership position from year to year, has grown by nearly 40 percent over the past forty years.
    [Show full text]
  • ABC800-Manual-BASIC-II.Pdf
    Preface This manual describes the BASIC II programming language of ABC 800. The reader should have programming experience, since the manual is not meant to be a BASIC textbook. Chapter 1 introduces the BASIC programming language. Chapter 2 deals with the structure of BASIC II computer programs. Chapters 3, 4, and 5 describe the data that can be processed by a program. Chapter 6 describes how to operate BASIC II. This chapter contains plenty of advice and tips on how to type and edit a program Chapter 7 deals with the direct usage of instructions and commands, without any program. This method is particularely useful when a program is being debugged. Chapters 8, 9, and 1a contain detailed descriptions of all commands, functions, and instructions that are part of BASIC II. Most of the descriptions are completed by examples which show the structure of each program part. Chapters 11 and 12 deal with the ABC 800 graphics. Both the TELETEXTgraphics and the high resolution graphics with animation mode are described. Chapter 13 describes the use of the function keys. Chapter 14 describes the differences between ABC 800 and ABC 80. Chapter 15 contains a list of error messages with comments. Chapter 16, marked with grey edges, contains short descriptions of all instructions, functions, and commands arranged in alphabetical order.The list in chapter 16 is meant for use as an index register, where the syntax can be found together with references to the detailed descriptions earlier in the manual (chapters 8, 9, and 10). Chapter 17 is a list of literature references and chapter 18 contains a number of appendices.
    [Show full text]
  • A Technology Assessment of Personal Computers. Vol. III: Personal Computer Impacts and Policy Issues
    DOCUMENT RESUME ED 202 454 IR 009 300 AUTHOR Nilles, Jack M.; And Others TITLE A Technology Assessment of Personal Computers. Vol. III: Personal Computer Impacts and Policy Issues. INSTITUTION University of Southern California, Los Angeles. Office of Interdisciplinary Program Development. SPONS AGENCY National Science Foundation, Washington, D.C. DEPORT NO OIP/PCTA-80-3/3 PUB DATE Sep BO GRANT PRA-78-05647 NOTE 342p.; For related documents, see IR 909 298-300. Some small print marginally legible. EDRS PRICE MF01/PC14 Plus Postage. DESCRIPTORS Education; Employment; *Microcomputers; Prediction; *Public Policy; Questionnaires IDENTIFIERS *Delphi Technique; International Trade; *Technology Assessment ABSTRACT A technology assessment of personal computers was conducted to study both the socially desirable and undesirable impacts of this new technology in three main areas: education, employment, and international trade. Information gleaned from this study was then used to generate suggestions for public policy options which could influence these impacts. Four primary methods were used to develop the information for the policy analysis stages of the assessment:(1) search and analysis of the relevant literature, (2) development of a series of scenarios of alternative futures, (3) performance of two Delphi surveys and a cross-impact analysis based on these scenarios, and (4) interviews and/or surveys of the potentially affected stakeholders and decision makers. Tables of data are included as well as a list of references. Appendices include Delphi questionnaires with summaries of findings and an employment questionnaire used in the study. (LLS) *********************************************************************** Reproductions supplied by EDRS are the best that can be made * from the original document. *********************************************************************** U S DEPARTMENT OF HEALTH.
    [Show full text]
  • DVD Program Notes
    DVD Program Notes Part One: Thor Magnusson, Alex Click Nilson is a Swedish avant McLean, Nick Collins, Curators garde codisician and code-jockey. He has explored the live coding of human performers since such Curators’ Note early self-modifiying algorithmic text pieces as An Instructional Game [Editor’s note: The curators attempted for One to Many Musicians (1975). to write their Note in a collaborative, He is now actively involved with improvisatory fashion reminiscent Testing the Oxymoronic Potency of of live coding, and have left the Language Articulation Programmes document open for further interaction (TOPLAP), after being in the right from readers. See the following URL: bar (in Hamburg) at the right time (2 https://docs.google.com/document/d/ AM, 15 February 2004). He previously 1ESzQyd9vdBuKgzdukFNhfAAnGEg curated for Leonardo Music Journal LPgLlCe Mw8zf1Uw/edit?hl=en GB and the Swedish Journal of Berlin Hot &authkey=CM7zg90L&pli=1.] Drink Outlets. Alex McLean is a researcher in the area of programming languages for Figure 1. Sam Aaron. the arts, writing his PhD within the 1. Overtone—Sam Aaron Intelligent Sound and Music Systems more effectively and efficiently. He group at Goldsmiths College, and also In this video Sam gives a fast-paced has successfully applied these ideas working within the OAK group, Uni- introduction to a number of key and techniques in both industry versity of Sheffield. He is one-third of live-programming techniques such and academia. Currently, Sam the live-coding ambient-gabba-skiffle as triggering instruments, scheduling leads Improcess, a collaborative band Slub, who have been making future events, and synthesizer design.
    [Show full text]
  • Core Magazine February 2002
    FEBRUARY 2002 CORE 3.1 A PUBLICATION OF THE COMPUTER HISTORY MUSEUM WWW.COMPUTERHISTORY.ORG PAGE 1 February 2002 OUR ACTIONS TODAY COREA publication of the Computer History3.1 Museum IN THIS MISSION ISSUE TO PRESERVE AND PRESENT FOR POSTERITY THE ARTIFACTS AND STORIES OF THE INFORMATION AGE INSIDE FRONT COVER VISION OUR ACTIONS TODAY The achievements of tomorrow must be was an outstanding success, and I simply doesn’t exist anywhere else in TO EXPLORE THE COMPUTING REVOLUTION AND ITS John C Toole rooted in the actions we take today. hope you caught the impact of these the world. With your sustained help, our IMPACT ON THE HUMAN EXPERIENCE Many exciting and important events announcements that have heightened actions have been able to speak much 2 THE SRI VAN AND COMPUTER have happened since our last CORE awareness of our enterprise in the louder than words, and it is my goal to INTERNETWORKING publication, and they have been community. I’m very grateful to Harry see that we are able to follow through Don Nielson carefully chosen to strategically shape McDonald (director of NASA Ames), Len on our dreams! EXECUTIVE STAFF where we will be in five years. Shustek (chairman of our Board of 7 John C Toole David Miller Trustees), Donna Dubinsky (Museum This issue of CORE is loaded with THE SRI VAN AND EARLY PACKET SPEECH EXECUTIVE DIRECTOR & CEO VICE PRESIDENT OF DEVELOPMENT 2 Don Nielson First, let me officially introduce our Trustee and CEO of Handspring), and technical content and information about Karen Mathews Mike Williams new name and logo to everyone who Bill Campbell (chairman of Intuit) who our organization—from a wonderful EXECUTIVE VICE PRESIDENT HEAD CURATOR 8 has not seen them before.
    [Show full text]
  • Interview with James Mitchell
    Interview with James Mitchell Interviewed by: David C. Brock Recorded February 19, 2019 Santa Barbara, CA CHM Reference number: X8963.2019 © 2019 Computer History Museum Interview with James Mitchell Brock: Yeah. So, yeah, maybe we can talk about your transition from Carnegie Mellon to PARC and how that opportunity came about, and what your thinking was about joining the new lab. Mitchell: I basically finished my PhD and left in July of 1970. I had missed graduation that year, so my diploma says 1971. But, in fact, I'd been out working for a year by then, and at PARC, you know, there were a number of other grad students I knew, and two of them had gone to work for a start-up in Berkeley that-- there were two Berkeley computer science departments, and the engineering one left to form this company called Berkeley Computer Corporation with Mel Pirtle running it and Butler Lampson kind of a chief technical officer and Chuck Thacker and so on, and anyway the people that I-- the two other grad students that had gone already that I knew, when I was going out, I was starting to go around and interview in early 1970 because I knew I was close to being finished, and it was in those days because there were so few people who had PhDs in computer science and every university was trying to build a department, and industrial research places like Bell Labs were trying to hire people and so on, anywhere you went with a new PhD you got an offer.
    [Show full text]
  • The People Who Invented the Internet Source: Wikipedia's History of the Internet
    The People Who Invented the Internet Source: Wikipedia's History of the Internet PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 22 Sep 2012 02:49:54 UTC Contents Articles History of the Internet 1 Barry Appelman 26 Paul Baran 28 Vint Cerf 33 Danny Cohen (engineer) 41 David D. Clark 44 Steve Crocker 45 Donald Davies 47 Douglas Engelbart 49 Charles M. Herzfeld 56 Internet Engineering Task Force 58 Bob Kahn 61 Peter T. Kirstein 65 Leonard Kleinrock 66 John Klensin 70 J. C. R. Licklider 71 Jon Postel 77 Louis Pouzin 80 Lawrence Roberts (scientist) 81 John Romkey 84 Ivan Sutherland 85 Robert Taylor (computer scientist) 89 Ray Tomlinson 92 Oleg Vishnepolsky 94 Phil Zimmermann 96 References Article Sources and Contributors 99 Image Sources, Licenses and Contributors 102 Article Licenses License 103 History of the Internet 1 History of the Internet The history of the Internet began with the development of electronic computers in the 1950s. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks. In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced.
    [Show full text]