TCM Report, Winter
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Early Stored Program Computers
Stored Program Computers Thomas J. Bergin Computing History Museum American University 7/9/2012 1 Early Thoughts about Stored Programming • January 1944 Moore School team thinks of better ways to do things; leverages delay line memories from War research • September 1944 John von Neumann visits project – Goldstine’s meeting at Aberdeen Train Station • October 1944 Army extends the ENIAC contract research on EDVAC stored-program concept • Spring 1945 ENIAC working well • June 1945 First Draft of a Report on the EDVAC 7/9/2012 2 First Draft Report (June 1945) • John von Neumann prepares (?) a report on the EDVAC which identifies how the machine could be programmed (unfinished very rough draft) – academic: publish for the good of science – engineers: patents, patents, patents • von Neumann never repudiates the myth that he wrote it; most members of the ENIAC team contribute ideas; Goldstine note about “bashing” summer7/9/2012 letters together 3 • 1.0 Definitions – The considerations which follow deal with the structure of a very high speed automatic digital computing system, and in particular with its logical control…. – The instructions which govern this operation must be given to the device in absolutely exhaustive detail. They include all numerical information which is required to solve the problem…. – Once these instructions are given to the device, it must be be able to carry them out completely and without any need for further intelligent human intervention…. • 2.0 Main Subdivision of the System – First: since the device is a computor, it will have to perform the elementary operations of arithmetics…. – Second: the logical control of the device is the proper sequencing of its operations (by…a control organ. -
P the Pioneers and Their Computers
The Videotape Sources: The Pioneers and their Computers • Lectures at The Compp,uter Museum, Marlboro, MA, September 1979-1983 • Goal: Capture data at the source • The first 4: Atanasoff (ABC), Zuse, Hopper (IBM/Harvard), Grosch (IBM), Stibitz (BTL) • Flowers (Colossus) • ENIAC: Eckert, Mauchley, Burks • Wilkes (EDSAC … LEO), Edwards (Manchester), Wilkinson (NPL ACE), Huskey (SWAC), Rajchman (IAS), Forrester (MIT) What did it feel like then? • What were th e comput ers? • Why did their inventors build them? • What materials (technology) did they build from? • What were their speed and memory size specs? • How did they work? • How were they used or programmed? • What were they used for? • What did each contribute to future computing? • What were the by-products? and alumni/ae? The “classic” five boxes of a stored ppgrogram dig ital comp uter Memory M Central Input Output Control I O CC Central Arithmetic CA How was programming done before programming languages and O/Ss? • ENIAC was programmed by routing control pulse cables f ormi ng th e “ program count er” • Clippinger and von Neumann made “function codes” for the tables of ENIAC • Kilburn at Manchester ran the first 17 word program • Wilkes, Wheeler, and Gill wrote the first book on programmiidbBbbIiSiing, reprinted by Babbage Institute Series • Parallel versus Serial • Pre-programming languages and operating systems • Big idea: compatibility for program investment – EDSAC was transferred to Leo – The IAS Computers built at Universities Time Line of First Computers Year 1935 1940 1945 1950 1955 ••••• BTL ---------o o o o Zuse ----------------o Atanasoff ------------------o IBM ASCC,SSEC ------------o-----------o >CPC ENIAC ?--------------o EDVAC s------------------o UNIVAC I IAS --?s------------o Colossus -------?---?----o Manchester ?--------o ?>Ferranti EDSAC ?-----------o ?>Leo ACE ?--------------o ?>DEUCE Whirl wi nd SEAC & SWAC ENIAC Project Time Line & Descendants IBM 701, Philco S2000, ERA.. -
Computer Architecture and Security
RED BOX RULES ARE FOR PROOF STAGE ONLY. DELETE BEFORE FINAL PRINTING. 20mm PPC FINAL ARTWORK Wang Computer Architecture Ledley and Security Computer Architecture and Architecture Computer Fundamentals of Designing Secure Computer Systems Shuangbao (Paul) Wang, George Mason University, USA WILEY-HEP INFORMATION SECURITY SERIES Robert S. Ledley, Georgetown University, USA In today’s workplace, computer and information security professionals must understand both hardware and software to deploy effective security solutions. Computer Architecture and Security covers a wide range of computer and network hardware, system software, information and data concepts from a security perspective, providing readers with Computer solutions and tools to implement secure computer and information systems. Featuring a careful, in-depth, and innovative introduction to modern computer systems and patent- pending technologies in computer security, the text integrates design considerations with hands-on experiences to help practitioners to render systems immune from attacks. Architecture Examination of memory, CPU architecture and system implementation and Security Discussion of computer buses and a dual-port bus interface Examples cover a board spectrum of hardware and software systems Includes the latest patent-pending technologies in architecture security Fundamentals of Placement of computers in a security fulfilled network environment Designing Secure Co-authored by the inventor of the modern Computed Tomography (CT) scanner Security Provides Companion Website -
History in the Computing Curriculum
R e p o r t History in the Computing Curriculum I F I P TC 3 / TC 9 Joint Task Group John Impagliazzo (Task Group Chair) Hofstra University Martin Campbell-Kelly University of Warwick Gordon Davies Open University John A. N. Lee Virginia Tech Michael R. Williams University of Calgary Prepublication Copy 1998 October Copyright © 1998, 1999 Institute of Electrical and Electronics Engineers. This report is scheduled to appear in an upcoming issue of the Annals of the History of Computing. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by sending an email request to <[email protected]>. HISTORY IN THE COMPUTING CURRICULUM Prepublication Copy 1998 October CONTENTS 1. INTRODUCTION 9. RESOURCES 9.1 Textbooks and General Works 2. GOALS AND OBJECTIVES 9.2 Monographs and Articles 9.3 Electronic Information 3. OVERVIEW OF THIS REPORT 9.4 Videos, Simulators, and Other Resources 4. BACKGROUND 10. EXTENDED TOPICS 4.1 Overview of Curriculum Recommendations 10.1 Advanced Courses 4.2 History Status 10.2 Projects 5. NEED FOR HISTORY CONTENT 11. CONCLUSIONS 5.1 The Student Perspective 5.2 The Professional Perspective 12. FUTURE DEVELOPMENTS 6. CURRICULUM CONTENT 6.1 Establishing a Knowledge Base ACKNOWLEDGMENTS 6.2 Methods of Presentation 6.2.1 The Period Method REFERENCES 6.2.2 Other Methods 6.3 Depth of Knowledge PUBLIC ACCESS 6.4 Clusters APPENDIX 7. IMPLEMENTATION OF A BASIC CURRICULUM A. -
Computer Oral History Collection, 1969-1973, 1977
Computer Oral History Collection, 1969-1973, 1977 Interviewee: Harry Huskey and Mrs. Huskey Interviewer: Bobbi Mapstone Date: April 19, 1973 Repository: Archives Center, National Museum of American History MAPSTONE: The date is April 19, 1973, This is Bobbi Mapstone and I'm talking to Professor Huskey and Mrs. Huskey at their home in Santa Cruz, California on April 19, 1973. Perhaps we could start with your joining the Institute of Numerical Analysis, what your position was, and discuss the charter of the Institute and how it influenced computing and people. HUSKEY: I think the Charter of the Institute was to foster work in computational mathematics, with the idea that with the new computing machines one could do things that were more interesting, more significant and that you weren't able to do before with desk calculators. There was a research program there, and over the years most of the famous men in analysis have spent time there. For example, Hartree was there for awhile, in fact, he was Director; Barkley Rosser was there; Mark Katz. I guess we have named some of them previously; Rutishauser was there from Switzerland; and from Oregon was there--he was one of the early people in the innovation of differential equations; there was a whole host of names. That indicates the primary function of the Institute. In order to move that kind of research along and to make sure that it had some relationship to computers, the idea was to have a high-speed computer. Originally it was expected this would be purchased from some vendor, and the Bureau had money from the Air Force to do this sort of thing. -
COMPUTER ARCHITECTURE and SECURITY Information Security Series
COMPUTER ARCHITECTURE AND SECURITY Information Security Series The Wiley-HEP Information Security Series systematically introduces the fundamentals of information security design and application. The goals of the Series are: to provide fundamental and emerging theories and techniques to stimulate more research in cryptol- ogy, algorithms, protocols, and architectures; to inspire professionals to understand the issues behind important security problems and the ideas behind the solutions; to give references and suggestions for additional reading and further study. The Series is a joint project between Wiley and Higher Education Press (HEP) of China. Publications consist of advanced textbooks for graduate students as well as researcher and practitioner references covering the key areas, including but not limited to: – Modern Cryptography – Cryptographic Protocols and Network Security Protocols – Computer Architecture and Security – Database Security – Multimedia Security – Computer Forensics – Intrusion Detection Lead Editors Songyuan Yan London, UK Moti Yung Columbia University, USA John Rief Duke University, USA Editorial Board Liz Bacon University of Greenwich, UK Kefei Chen Shanghai Jiaotong University, China Matthew Franklin University of California, USA Dieter Gollmann Hamburg University of Technology, Germany Yongfei Han Beijing University of Technology, China ONETS Wireless & Internet Security Tech. Co., Ltd. Singapore Kwangjo Kim KAIST-ICC, Korea David Naccache Ecole Normale Superieure, France Dingyi Pei Guangzhou University, -
Notes: 6 Per Page
Stored Program Computer • RAM • 10 Print “HAL: I know SPC (Stored program computer quote from that you and Frank were Williams p. 302): planning to disconnect me, and I'm afraid • “it must be possible to erase the contents of that's something I the memory and store new data2 [JT: Stored Program Computers And cannot allow to happen”1 program instructions as well] in place of the • 20 If (Dave Bowman) old, then airlock crew • it must be possible to store information for Computer Memories member long periods of time; • it must inexpensive to construct because it would be needed in large quantities; This section includes developments in • it must be possible to get at the information being stored in very short periods of time early memory technologies as well as the Microsoft because there is no point in producing high- clipart speed electronic arithmetic and control units first stored program computers if you cannot get at the instructions and data with the same high speeds).” 1 “2001 Space Odyssey” © Warner Brothers, MGM James Tam James Tam 2 “An important feature of this device [JT: A stored-program computer] was that operating instructions and function tables would be stored exactly in the same sort of memory device as that used for numbers”1 Stored Program Computer? Stored Program Computer? • ABC? • Punch card and punched tape machines? •q w e r t y u i o p Input (decimal) •a s d f g h j k l Arithmetic z x c v b n m (binary) Output (decimal) A photo of Clifford Berry and the ABC, courtesy of Iowa state university Control: data and instructions (35 mm tape) •Capacitors James Tam James Tam Who Came Up With The Concept Of The Stored How Did Machines Receive Their Instructions Program Computer? • Before stored program computers • Why it’s important. -
Military Roots
CHAPTER THREE Military Roots WHEN historians examine the origins of the electronic digital computer, they usually give top billing to the pioneering efforts of the American scientists J. Presper Eckert and John W. Mauchly, who built their Electronic Numerical Integrator and Computer (ENIAC) during World War II. Eckert and Mauchly are justly and widely honored as the men whose efforts and risks led to the first machines recognizable as modern computers. They also founded the first private computer systems company. But historians now also recognize a lesser known history of the computer, one whose roots run deep into the most sensitive and secret corners of a modern military establishment. It was no accident that the military services largely financed the postwar development of the computer in the 1950s, for computing technology had played a pivotal role in the Allied war effort. The military indirectly bankrolled even the Eckert and Mauchly computer projects, and these relatively open projects were only the tip of a much larger, and sometimes hidden, technological iceberg. The military computer projects, as well as Eckert and Mauchly's daring bet on an as-yet nonexistent commercial market, led to the first stirrings of interest in computers in the 1950s by business and industry. Indeed the first commercial computers were direct copies or adaptations of machines developed for military users. After the war, the commercial potential of government-sponsored research became more apparent. The first great political clashes over technology policy in the United States occurred. Origins of the Computer By the time war broke out in 1939, engineering and science had already made important advances in several seemingly unrelated areas . -
The First Computers—History and Architectures, Edited by Raúl Rojas and Ulf Hashagen, 2000 the First Computers—History and Architectures
History of Computing I. Bernard Cohen and William Aspray, editors Editorial Board: Bernard Galler, University of Michigan, Ann Arbor, Michigan; J. A. N. Lee, Virginia Polytechnic Institute, Blacksburg, Virginia; Arthur Norberg, Charles Babbage Institute, Minneapolis, Minnesota; Brian Randell, University of Newcastle, Newcastle upon Tyne; Henry Tropp, Humboldt State College, Arcata, California; Michael Williams, University of Calgary, Alberta; Heinz Zemanek, Vienna Memories That Shaped an Industry, Emerson W. Pugh, 1984 The Computer Comes of Age: The People, the Hardware, and the Software, R. Moreau, 1984 Memoirs of a Computer Pioneer, Maurice V. Wilkes, 1985 Ada: A Life and Legacy, Dorothy Stein, 1985 IBM's Early Computers, Charles J. Bashe, Lyle R. Johnson, John H. Palmer, and Emerson W. Pugh, 1986 A Few Good Men from Univac, David E. Lundstrom, 1987 Innovating for Failure: Government Policy and the Early British Computer Industry, John Hendry, 1990 Glory and Failure: The Difference Engines of Johann Müller, Charles Babbage and Georg and Edvard Scheutz, Michael Lindgren, 1990 John von Neumann and the Origins of Modern Computing, William Aspray, 1990 IBM's 360 and Early 370 Systems, Emerson W. Pugh, Lyle R. Johnson, and John H. Palmer, 1991 Building IBM: Shaping an Industry and Its Technology, Emerson W. Pugh, 1995 A History of Modern Computing, Paul Ceruzzi, 1998 Makin 'Numbers: Howard Aiken and the Computer, edited by I. Bernard Cohen and Gregory W. Welch with the cooperation of Robert V. D. Campbell, 1999 Howard Aiken: Portrait of a Computer Pioneer, I. Bernard Cohen, 1999 The First Computers—History and Architectures, edited by Raúl Rojas and Ulf Hashagen, 2000 The First Computers—History and Architectures edited by Raúl Rojas and Ulf Hashagen © 2000 Massachusetts Institute of Technology All rights reserved.