TCM Report, Winter

Total Page:16

File Type:pdf, Size:1020Kb

TCM Report, Winter Contents THE COMPUTER MUSEUM BOARD OF DIRECTORS I The Director's Letter The Computer Museum is a non-profit. Kenneth H. Olsen. Chairman public. charitable foundation dedicated to Diglfai Equipment Corporation 2 Computers: A Look At The First preserving and exhibiting an industry-wide. Charles W. Bachman. Generation broad-based collection of the history of in­ formation processing. Computer history is Chairman. Executive Committee 8 The Core Process interpreted through exhibits. publications. Bachman information Systems 10 Alan J. Perlis Lecture: Evolution videotapes. lectures. educational programs. C. Gordon Bell and other programs. The Museum archives Encore Computer Corporation of Software Programming both artifacts and documentation and 13 Bits and Bites makes the materials available for Gwen Bell scholarly use. The Computer Museum 14 Member Tour Museum membership is available to Erich Bloch 15 Yard Sale individuals and non-profit organizations International Business Machines Member Coupon for $25 annually and to businesses for $125 Harvey D. Cragon annually. Members receive the quarterly Texas Instruments 16 The Computer Museum Slides Report. invitations to all lectures and spe­ 1984 Computer Era Calendar cial programs. new posters. and a ten David Donaldson percent discount in the Museum store. Ropes and Grey 17 Founders A Founders program is in effect during the Robert Everett The End Bit initial two-year period of the Museum. until The MITRE Corporation June 10. 1984. During this period individuals and non-profit organizations may become Sydney Fernbach Founders for $250 and businesses and chari­ Computer Consultant table Foundations may become Founders for C . Lester Hogan $2500. Founders receive all benefits of mem­ Fairchild Camera and Instrument Corporation bership and recognition for their important role in establishing the Museum. Theordore G. Johnson Digital Equipment Corporation The Computer Museum is temporarily closed in preparation for its move to Boston. Andrew C . Knowles III It will reopen at Museum Wharf in down­ Lexidata Corporation town Boston in fall 1984. For more informa­ tion. call (617) 467-4036. John Lacey Control Data Corporation THE COMPUTER MUSEUM REPORT Pat McGovern (ISSN 0736-5438) ComputerWorld The Computer Museum Report is published James McKenney quarterly by The Computer Museum. One Harvard Business School Iron Way. Marlboro. MA 01752. Annual sub­ George Michael scription is part of the membership of the Museum ($25 per year for individuals Lawrence Livermore Laboratories and nonprofit organizations and $125 Robert N. Noyce for corporations). Intel The purpose is to report on the programs Brian Randell and exhibitions of the Museum. The con­ University of Newcastle-upon-Tyne tents of The Computer Museum Report may not be reproduced without written consent. Jean E. Sammet International Business Machines The Museum Staff is responsible for the con­ tents of the Report. The opinions expressed Edward A. Schwartz do not necessarily represent those of The Digital Equipment Corporation Computer Museum or its Board of Directors. Kitty Selfridge. The design and production of the Report Chairman. Members Committee is done by Benson and Clemons. Henco Software. inc. Michael Spock STAFF The Children's Museum of Boston Director Erwin Tomash Gwen Bell Dataproducts Adminis tration Honorable Paul E. Tsongas Gen Rodgers. Coordinator U.S. Senator. Massachusetts Pat Maguire Comm unications Stephanie Haack. Coordinator Brenda Erie Exhibits and Archives Meredith Stelling. Coordinator lohn McKenzie Beth Parkhurst G regory Welch Bill Wisheart Membership Eileen Gardiner. Coordinator Programs Christine Rudomin. Coordinator Store The Computer Museum Carol Strecker. Coordinator Photo Credits: Sally Askins One Iron Way Marlboro. Massachusetts 01752 Phil Rosen pp .. 3. 4. 13. 14. 15 and cover Linda Davidson 617-467-4036 David Bromfield pp .• 1. 6 Merle Insigna Harvard University. Cruft Photo Lab p. 2 Bill Meany © 1983ITHE COMPUTER MUSEUM The Director's Letter The Museum is in a time of change: location, staff and exhibits. But our plan is to keep this Report in its familiar form enabling us to communicate our activities to you. One of the greatest changes has been the departure of Jamie Parker, the Museum's first employee and developer of all the exhibits. She left in August to get married and join her husband in Geneva. In her four years with the Museum, she used her photographic memory to conceptualize exhibits. Jamie had an intuitive feeling for the artifacts and how they could be exhibited even though her education was in art history not computer science. While with the Museum, she cataloged and put three times as much in the warehouse as we had on the floor. One of Jamie's last chores was to organize our yard sale. The yard sale allowed Jamie to weed our "warehouse." In her first years, she accepted everything because that was her job. The Museum ended up warehousing a number PDP-12s, 338 display systems and PDP-6s. Since Jamie knew what was what and what was best. she selected the items to selL thus cutting down our storage costs and providing the mem­ bers with a good day of poking through old junk and taking apart comput­ ers. The cover photo is a tribute to Jamie: one of the yard sale customers is carrying off his loot and inspecting the display of the ENIAC, an exhibit put together by her. A new crew of exhibit and archives employees will help us plan the space for Museum Wharf. Meredith Stelling has taken over as the Coor­ dinator. She has been with the Museum for a year handling publications and archives. Meredith, Greg Welch and Bill Wisheart are the main ex­ hibit staff and will be joined in January by Oliver StrimpeL on leave from The Science Museum in London. Jamie Parker In September, the new space at the Wharf seemed vast and barren, except for chalk marks on the floor indicating where the new exhibits would be positioned. But the space is already beginning to fill out with two truck loads of the SAGE (30,000 pounds). an IBM 1401 card system and a collection from the University of Illinois. Reviews of exhibit plans started in September. Sheila GrinneL devel­ oper of ASTC's travelling "Chips and Changes" exhibit. Bruce McIntosh, a designer, and Paul Tractman, senior editor, The Smithsonian, spent a day consulting on the proposed organization. Then on October 13th, board members Brian Randell and consultant Dick Eckhouse reviewed the next iteration. Successive refinements bring our plans in line with reality. The SAGE system will form the fulcrum of the exhibits leading into the computer generations on one floor, and backward in time to the revolutionary one-of­ a-kind computers on the other. The process of moving has now started and the enormity of the task ahead is clear. But the team is together and progress can be seen. Gwen Bell Director The Computer Museum ReportfWinter 1983/1984 Computers: A Look at the First Generation In 1955, Martin Weik compiled a What did computing look like dur­ Preliminary Findings: Technology "Survey of Domestic Electronic Digital ing its "first generation"-the time Most first-generation computers Computing Systems," providing a re­ from the dedication of ENIAC in 1946 to did use vacuum tubes, but not all in markable snapshot of the computer the mid-fifties? the same way. After ENIAC's dedica­ population. The survey briefly de­ The variety was astonishing. Ex­ tion. designers saw the advantage of scribes and gives specifications for perimental one-of-a-kind computers, tubes for speed. but sought to mini­ about 100 different machines in exis­ each with its own unique character, mize their number. Those computers tence as of December 1955. ruled. even though most incorporated used fewer tubes in their circuits, and Weiks inventory supplied the base vacuum tubes and drum memories. thus were more reliable and compact. to compile a fundamental reference stored programs and data internally. Solid state diodes. not tubes. per­ for collecting and research at The and communicated via Flexowriters. formed logical operations. This was Computer Museum. Records for each machine were gathered from contem­ While most were built with pioneered in SEAC in 1950. after which porary historical accounts in recent vacuum tubes. many also used relays only a few computers. such as the books and journals, operating manu­ and crystal diodes. Circle and Monrobot. continued to use als, and in some cases the machines For memory. they relied on delay tubes for logic as ENIAC did. themselves. Then the findings were lines. cathode ray tubes. drums. mag­ Between 1946 and 1955. at least a checked against those appearing in netic tape loops. paper tape, punched dozen relay computers were built. an Weik's original survey. cards, magnetic wire. and toward the indication that some designers did not This research was done by Paul E. end of the period. magnetic cores. agree with the prevailing view of the Ceruzzi, assistant Professor of History For input and ouput. they used superiority of vacuum tubes. One such at Clemson University with the aid of teletypes. punched cards. other paper person was Howard Aiken. who on Rod McDonald of Rider College, and tape readers. and CRT displays as visits to Continental Europe in the Greg Welch of The Computer Museum. well as Flexowriters. 1950's influenced the choice of relays Different specifications and descrip­ Their sizes ranged from that of a for several computers. Konrad Zuse's tions have been given to the same small desk to several large rooms full computer company also produced a machines over time for various rea­ of equipment bays with consoles one line of successful relay computers in­ sons. Rather than arbitrarily selecting could walk into. And their speed stalled mainly in Continental Europe. one description, the data was collected ranged from one to tens of thousands Some of the relay computers.
Recommended publications
  • Early Stored Program Computers
    Stored Program Computers Thomas J. Bergin Computing History Museum American University 7/9/2012 1 Early Thoughts about Stored Programming • January 1944 Moore School team thinks of better ways to do things; leverages delay line memories from War research • September 1944 John von Neumann visits project – Goldstine’s meeting at Aberdeen Train Station • October 1944 Army extends the ENIAC contract research on EDVAC stored-program concept • Spring 1945 ENIAC working well • June 1945 First Draft of a Report on the EDVAC 7/9/2012 2 First Draft Report (June 1945) • John von Neumann prepares (?) a report on the EDVAC which identifies how the machine could be programmed (unfinished very rough draft) – academic: publish for the good of science – engineers: patents, patents, patents • von Neumann never repudiates the myth that he wrote it; most members of the ENIAC team contribute ideas; Goldstine note about “bashing” summer7/9/2012 letters together 3 • 1.0 Definitions – The considerations which follow deal with the structure of a very high speed automatic digital computing system, and in particular with its logical control…. – The instructions which govern this operation must be given to the device in absolutely exhaustive detail. They include all numerical information which is required to solve the problem…. – Once these instructions are given to the device, it must be be able to carry them out completely and without any need for further intelligent human intervention…. • 2.0 Main Subdivision of the System – First: since the device is a computor, it will have to perform the elementary operations of arithmetics…. – Second: the logical control of the device is the proper sequencing of its operations (by…a control organ.
    [Show full text]
  • P the Pioneers and Their Computers
    The Videotape Sources: The Pioneers and their Computers • Lectures at The Compp,uter Museum, Marlboro, MA, September 1979-1983 • Goal: Capture data at the source • The first 4: Atanasoff (ABC), Zuse, Hopper (IBM/Harvard), Grosch (IBM), Stibitz (BTL) • Flowers (Colossus) • ENIAC: Eckert, Mauchley, Burks • Wilkes (EDSAC … LEO), Edwards (Manchester), Wilkinson (NPL ACE), Huskey (SWAC), Rajchman (IAS), Forrester (MIT) What did it feel like then? • What were th e comput ers? • Why did their inventors build them? • What materials (technology) did they build from? • What were their speed and memory size specs? • How did they work? • How were they used or programmed? • What were they used for? • What did each contribute to future computing? • What were the by-products? and alumni/ae? The “classic” five boxes of a stored ppgrogram dig ital comp uter Memory M Central Input Output Control I O CC Central Arithmetic CA How was programming done before programming languages and O/Ss? • ENIAC was programmed by routing control pulse cables f ormi ng th e “ program count er” • Clippinger and von Neumann made “function codes” for the tables of ENIAC • Kilburn at Manchester ran the first 17 word program • Wilkes, Wheeler, and Gill wrote the first book on programmiidbBbbIiSiing, reprinted by Babbage Institute Series • Parallel versus Serial • Pre-programming languages and operating systems • Big idea: compatibility for program investment – EDSAC was transferred to Leo – The IAS Computers built at Universities Time Line of First Computers Year 1935 1940 1945 1950 1955 ••••• BTL ---------o o o o Zuse ----------------o Atanasoff ------------------o IBM ASCC,SSEC ------------o-----------o >CPC ENIAC ?--------------o EDVAC s------------------o UNIVAC I IAS --?s------------o Colossus -------?---?----o Manchester ?--------o ?>Ferranti EDSAC ?-----------o ?>Leo ACE ?--------------o ?>DEUCE Whirl wi nd SEAC & SWAC ENIAC Project Time Line & Descendants IBM 701, Philco S2000, ERA..
    [Show full text]
  • Computer Architecture and Security
    RED BOX RULES ARE FOR PROOF STAGE ONLY. DELETE BEFORE FINAL PRINTING. 20mm PPC FINAL ARTWORK Wang Computer Architecture Ledley and Security Computer Architecture and Architecture Computer Fundamentals of Designing Secure Computer Systems Shuangbao (Paul) Wang, George Mason University, USA WILEY-HEP INFORMATION SECURITY SERIES Robert S. Ledley, Georgetown University, USA In today’s workplace, computer and information security professionals must understand both hardware and software to deploy effective security solutions. Computer Architecture and Security covers a wide range of computer and network hardware, system software, information and data concepts from a security perspective, providing readers with Computer solutions and tools to implement secure computer and information systems. Featuring a careful, in-depth, and innovative introduction to modern computer systems and patent- pending technologies in computer security, the text integrates design considerations with hands-on experiences to help practitioners to render systems immune from attacks. Architecture Examination of memory, CPU architecture and system implementation and Security Discussion of computer buses and a dual-port bus interface Examples cover a board spectrum of hardware and software systems Includes the latest patent-pending technologies in architecture security Fundamentals of Placement of computers in a security fulfilled network environment Designing Secure Co-authored by the inventor of the modern Computed Tomography (CT) scanner Security Provides Companion Website
    [Show full text]
  • History in the Computing Curriculum
    R e p o r t History in the Computing Curriculum I F I P TC 3 / TC 9 Joint Task Group John Impagliazzo (Task Group Chair) Hofstra University Martin Campbell-Kelly University of Warwick Gordon Davies Open University John A. N. Lee Virginia Tech Michael R. Williams University of Calgary Prepublication Copy 1998 October Copyright © 1998, 1999 Institute of Electrical and Electronics Engineers. This report is scheduled to appear in an upcoming issue of the Annals of the History of Computing. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by sending an email request to <[email protected]>. HISTORY IN THE COMPUTING CURRICULUM Prepublication Copy 1998 October CONTENTS 1. INTRODUCTION 9. RESOURCES 9.1 Textbooks and General Works 2. GOALS AND OBJECTIVES 9.2 Monographs and Articles 9.3 Electronic Information 3. OVERVIEW OF THIS REPORT 9.4 Videos, Simulators, and Other Resources 4. BACKGROUND 10. EXTENDED TOPICS 4.1 Overview of Curriculum Recommendations 10.1 Advanced Courses 4.2 History Status 10.2 Projects 5. NEED FOR HISTORY CONTENT 11. CONCLUSIONS 5.1 The Student Perspective 5.2 The Professional Perspective 12. FUTURE DEVELOPMENTS 6. CURRICULUM CONTENT 6.1 Establishing a Knowledge Base ACKNOWLEDGMENTS 6.2 Methods of Presentation 6.2.1 The Period Method REFERENCES 6.2.2 Other Methods 6.3 Depth of Knowledge PUBLIC ACCESS 6.4 Clusters APPENDIX 7. IMPLEMENTATION OF A BASIC CURRICULUM A.
    [Show full text]
  • Computer Oral History Collection, 1969-1973, 1977
    Computer Oral History Collection, 1969-1973, 1977 Interviewee: Harry Huskey and Mrs. Huskey Interviewer: Bobbi Mapstone Date: April 19, 1973 Repository: Archives Center, National Museum of American History MAPSTONE: The date is April 19, 1973, This is Bobbi Mapstone and I'm talking to Professor Huskey and Mrs. Huskey at their home in Santa Cruz, California on April 19, 1973. Perhaps we could start with your joining the Institute of Numerical Analysis, what your position was, and discuss the charter of the Institute and how it influenced computing and people. HUSKEY: I think the Charter of the Institute was to foster work in computational mathematics, with the idea that with the new computing machines one could do things that were more interesting, more significant and that you weren't able to do before with desk calculators. There was a research program there, and over the years most of the famous men in analysis have spent time there. For example, Hartree was there for awhile, in fact, he was Director; Barkley Rosser was there; Mark Katz. I guess we have named some of them previously; Rutishauser was there from Switzerland; and from Oregon was there--he was one of the early people in the innovation of differential equations; there was a whole host of names. That indicates the primary function of the Institute. In order to move that kind of research along and to make sure that it had some relationship to computers, the idea was to have a high-speed computer. Originally it was expected this would be purchased from some vendor, and the Bureau had money from the Air Force to do this sort of thing.
    [Show full text]
  • COMPUTER ARCHITECTURE and SECURITY Information Security Series
    COMPUTER ARCHITECTURE AND SECURITY Information Security Series The Wiley-HEP Information Security Series systematically introduces the fundamentals of information security design and application. The goals of the Series are: to provide fundamental and emerging theories and techniques to stimulate more research in cryptol- ogy, algorithms, protocols, and architectures; to inspire professionals to understand the issues behind important security problems and the ideas behind the solutions; to give references and suggestions for additional reading and further study. The Series is a joint project between Wiley and Higher Education Press (HEP) of China. Publications consist of advanced textbooks for graduate students as well as researcher and practitioner references covering the key areas, including but not limited to: – Modern Cryptography – Cryptographic Protocols and Network Security Protocols – Computer Architecture and Security – Database Security – Multimedia Security – Computer Forensics – Intrusion Detection Lead Editors Songyuan Yan London, UK Moti Yung Columbia University, USA John Rief Duke University, USA Editorial Board Liz Bacon University of Greenwich, UK Kefei Chen Shanghai Jiaotong University, China Matthew Franklin University of California, USA Dieter Gollmann Hamburg University of Technology, Germany Yongfei Han Beijing University of Technology, China ONETS Wireless & Internet Security Tech. Co., Ltd. Singapore Kwangjo Kim KAIST-ICC, Korea David Naccache Ecole Normale Superieure, France Dingyi Pei Guangzhou University,
    [Show full text]
  • Notes: 6 Per Page
    Stored Program Computer • RAM • 10 Print “HAL: I know SPC (Stored program computer quote from that you and Frank were Williams p. 302): planning to disconnect me, and I'm afraid • “it must be possible to erase the contents of that's something I the memory and store new data2 [JT: Stored Program Computers And cannot allow to happen”1 program instructions as well] in place of the • 20 If (Dave Bowman) old, then airlock crew • it must be possible to store information for Computer Memories member long periods of time; • it must inexpensive to construct because it would be needed in large quantities; This section includes developments in • it must be possible to get at the information being stored in very short periods of time early memory technologies as well as the Microsoft because there is no point in producing high- clipart speed electronic arithmetic and control units first stored program computers if you cannot get at the instructions and data with the same high speeds).” 1 “2001 Space Odyssey” © Warner Brothers, MGM James Tam James Tam 2 “An important feature of this device [JT: A stored-program computer] was that operating instructions and function tables would be stored exactly in the same sort of memory device as that used for numbers”1 Stored Program Computer? Stored Program Computer? • ABC? • Punch card and punched tape machines? •q w e r t y u i o p Input (decimal) •a s d f g h j k l Arithmetic z x c v b n m (binary) Output (decimal) A photo of Clifford Berry and the ABC, courtesy of Iowa state university Control: data and instructions (35 mm tape) •Capacitors James Tam James Tam Who Came Up With The Concept Of The Stored How Did Machines Receive Their Instructions Program Computer? • Before stored program computers • Why it’s important.
    [Show full text]
  • Military Roots
    CHAPTER THREE Military Roots WHEN historians examine the origins of the electronic digital computer, they usually give top billing to the pioneering efforts of the American scientists J. Presper Eckert and John W. Mauchly, who built their Electronic Numerical Integrator and Computer (ENIAC) during World War II. Eckert and Mauchly are justly and widely honored as the men whose efforts and risks led to the first machines recognizable as modern computers. They also founded the first private computer systems company. But historians now also recognize a lesser known history of the computer, one whose roots run deep into the most sensitive and secret corners of a modern military establishment. It was no accident that the military services largely financed the postwar development of the computer in the 1950s, for computing technology had played a pivotal role in the Allied war effort. The military indirectly bankrolled even the Eckert and Mauchly computer projects, and these relatively open projects were only the tip of a much larger, and sometimes hidden, technological iceberg. The military computer projects, as well as Eckert and Mauchly's daring bet on an as-yet nonexistent commercial market, led to the first stirrings of interest in computers in the 1950s by business and industry. Indeed the first commercial computers were direct copies or adaptations of machines developed for military users. After the war, the commercial potential of government-sponsored research became more apparent. The first great political clashes over technology policy in the United States occurred. Origins of the Computer By the time war broke out in 1939, engineering and science had already made important advances in several seemingly unrelated areas .
    [Show full text]
  • The First Computers—History and Architectures, Edited by Raúl Rojas and Ulf Hashagen, 2000 the First Computers—History and Architectures
    History of Computing I. Bernard Cohen and William Aspray, editors Editorial Board: Bernard Galler, University of Michigan, Ann Arbor, Michigan; J. A. N. Lee, Virginia Polytechnic Institute, Blacksburg, Virginia; Arthur Norberg, Charles Babbage Institute, Minneapolis, Minnesota; Brian Randell, University of Newcastle, Newcastle upon Tyne; Henry Tropp, Humboldt State College, Arcata, California; Michael Williams, University of Calgary, Alberta; Heinz Zemanek, Vienna Memories That Shaped an Industry, Emerson W. Pugh, 1984 The Computer Comes of Age: The People, the Hardware, and the Software, R. Moreau, 1984 Memoirs of a Computer Pioneer, Maurice V. Wilkes, 1985 Ada: A Life and Legacy, Dorothy Stein, 1985 IBM's Early Computers, Charles J. Bashe, Lyle R. Johnson, John H. Palmer, and Emerson W. Pugh, 1986 A Few Good Men from Univac, David E. Lundstrom, 1987 Innovating for Failure: Government Policy and the Early British Computer Industry, John Hendry, 1990 Glory and Failure: The Difference Engines of Johann Müller, Charles Babbage and Georg and Edvard Scheutz, Michael Lindgren, 1990 John von Neumann and the Origins of Modern Computing, William Aspray, 1990 IBM's 360 and Early 370 Systems, Emerson W. Pugh, Lyle R. Johnson, and John H. Palmer, 1991 Building IBM: Shaping an Industry and Its Technology, Emerson W. Pugh, 1995 A History of Modern Computing, Paul Ceruzzi, 1998 Makin 'Numbers: Howard Aiken and the Computer, edited by I. Bernard Cohen and Gregory W. Welch with the cooperation of Robert V. D. Campbell, 1999 Howard Aiken: Portrait of a Computer Pioneer, I. Bernard Cohen, 1999 The First Computers—History and Architectures, edited by Raúl Rojas and Ulf Hashagen, 2000 The First Computers—History and Architectures edited by Raúl Rojas and Ulf Hashagen © 2000 Massachusetts Institute of Technology All rights reserved.
    [Show full text]