ICL Technical Journal Volume 5 Issue 3
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Vcf Pnw 2019
VCF PNW 2019 http://vcfed.org/vcf-pnw/ Schedule Saturday 10:00 AM Museum opens and VCF PNW 2019 starts 11:00 AM Erik Klein, opening comments from VCFed.org Stephen M. Jones, opening comments from Living Computers:Museum+Labs 1:00 PM Joe Decuir, IEEE Fellow, Three generations of animation machines: Atari and Amiga 2:30 PM Geoff Pool, From Minix to GNU/Linux - A Retrospective 4:00 PM Chris Rutkowski, The birth of the Business PC - How volatile markets evolve 5:00 PM Museum closes - come back tomorrow! Sunday 10:00 AM Day two of VCF PNW 2019 begins 11:00 AM John Durno, The Lost Art of Telidon 1:00 PM Lars Brinkhoff, ITS: Incompatible Timesharing System 2:30 PM Steve Jamieson, A Brief History of British Computing 4:00 PM Presentation of show awards and wrap-up Exhibitors One of the defining attributes of a Vintage Computer Festival is that exhibits are interactive; VCF exhibitors put in an amazing amount of effort to not only bring their favorite pieces of computing history, but to make them come alive. Be sure to visit all of them, ask questions, play, learn, take pictures, etc. And consider coming back one day as an exhibitor yourself! Rick Bensene, Wang Laboratories’ Electronic Calculators, An exhibit of Wang Labs electronic calculators from their first mass-market calculator, the Wang LOCI-2, through the last of their calculators, the C-Series. The exhibit includes examples of nearly every series of electronic calculator that Wang Laboratories sold, unusual and rare peripheral devices, documentation, and ephemera relating to Wang Labs calculator business. -
Validated Products List, 1995 No. 3: Programming Languages, Database
NISTIR 5693 (Supersedes NISTIR 5629) VALIDATED PRODUCTS LIST Volume 1 1995 No. 3 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Product Data - IGES Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1995 QC 100 NIST .056 NO. 5693 1995 NISTIR 5693 (Supersedes NISTIR 5629) VALIDATED PRODUCTS LIST Volume 1 1995 No. 3 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Product Data - IGES Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1995 (Supersedes April 1995 issue) U.S. DEPARTMENT OF COMMERCE Ronald H. Brown, Secretary TECHNOLOGY ADMINISTRATION Mary L. Good, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Arati Prabhakar, Director FOREWORD The Validated Products List (VPL) identifies information technology products that have been tested for conformance to Federal Information Processing Standards (FIPS) in accordance with Computer Systems Laboratory (CSL) conformance testing procedures, and have a current validation certificate or registered test report. The VPL also contains information about the organizations, test methods and procedures that support the validation programs for the FIPS identified in this document. The VPL includes computer language processors for programming languages COBOL, Fortran, Ada, Pascal, C, M[UMPS], and database language SQL; computer graphic implementations for GKS, COM, PHIGS, and Raster Graphics; operating system implementations for POSIX; Open Systems Interconnection implementations; and computer security implementations for DES, MAC and Key Management. -
Systems Corporation Pern SYSTEM OVERVIEW March 1984
o PERn Systems Corporation PERn SYSTEM OVERVIEW o March 1984 This manual is for use with POS Release G.5 and subsequent releases until further notice. Copyri9ht(C) 19B3, 19Bi PERC Systems Corporation 2600 Liberty Avenue P. O. Box 2600 Pittsbur9h, PA 15230 (HZ) 355-0900 o o This document is not to be reproduced in any fonn or transmitted in whole or in part, without the prior written authorization of PERQ Systems Corporation. o The information in this document is subject to change without notice and should not be construed as a commitment by PERQ Systems Corporation. The company assumes no responsibility for any errors that may appear in this document. PERQ Systems Corporation will make every effort to keep customers apprised of all documentation changes as quickly as possible. The Reader's Comments card is distributed with this document to request users' critical evaluation to assist us in preparing future documentation. PERQ and PEROZ are trademarks of PERQ Systems Corporation. o - ii - --~---- ----------- PREFACE January 15, 1984 o PREFACE This manual is intended for new users of PERQ and PERQ2. The manual will familiarize you with the machines and get you started using either system. As you learn more about your system, you will find that it provides you with many facilities, both conveniences and necessities. This manual consists of three chapters. Chapter One describes the method to turn the system on and the bootstrap process. Chapter Two describes the PERQ and PERQ2 hardware. Chapter Three discusses the basic operation of the system software. Distinctions between the PERQ and PERQ2 are explicit. -
Computer Conservation Society
Issue Number 88 Winter 2019/20 Computer Conservation Society Aims and Objectives The Computer Conservation Society (CCS) is a co-operative venture between BCS, The Chartered Institute for IT; the Science Museum of London; and the Science and Industry Museum (SIM) in Manchester. The CCS was constituted in September 1989 as a Specialist Group of the British Computer Society. It is thus covered by the Royal Charter and charitable status of BCS. The objects of the Computer Conservation Society (“Society”) are: To promote the conservation, restoration and reconstruction of historic computing systems and to identify existing computing systems which may need to be archived in the future; To develop awareness of the importance of historic computing systems; To develop expertise in the conservation, restoration and reconstruction of historic computing systems; To represent the interests of the Society with other bodies; To promote the study of historic computing systems, their use and the history of the computer industry; To publish information of relevance to these objectives for the information of Society members and the wider public. Membership is open to anyone interested in computer conservation and the history of computing. The CCS is funded and supported by a grant from BCS and from donations. There are a number of active projects on specific computer restorations and early computer technologies and software. Younger people are especially encouraged to take part in order to achieve skills transfer. The CCS also enjoys a close relationship with the National Museum of Computing. Resurrection The Journal of the Computer Conservation Society ISSN 0958-7403 Number 88 Winter 2019/20 Contents Society Activity 2 News Round-Up 9 The Data Curator 10 Paul Cockshott From Tea Shops to Computer Company: The Improbable 15 Story of LEO John Aeberhard Book Review: Early Computing in Britain Ferranti Ltd. -
Hacker's Handbook Ok Just a Quick Note, This Is a Very Early Version of the Book and Was Later Banned
Hacker's Handbook Ok just a quick note, this is a very early version of the book and was later banned. We've done our best in converting it to ASCII. It's taken us some time to put it together because of the reformatting, so I hope it's appreciated. We have kept to the original page numbering for so that the index will be correct. Compliments Electronic Images - Gizmo Century Communications - T H E - - H A C K E R ' S - - H A N D B O O K - Copyright (c) Hugo Cornwall All rights reserved First published in Great Britain in 1985 by Century Communications Ltd Portland House, 12-13 Greek Street, London W1V 5LE. Reprinted 1985 (four times) ISBN 0 7126 0650 5 Printed and bound in Great Britain by Billing & Sons Limited, Worcester. CONTENTS Introduction vii First Principles 2 Computer-to-computer communications 7 3 Hackers' Equipment 15 4 Targets: What you can find on mainframes 30 5 Hackers' Intelligence 42 6 Hackers' Techniques 57 7 Networks 69 8 Viewdata systems 86 9 Radio computer data 99 10 Hacking: the future 108 file:///E|/Books/Hackers Handbook.htm (1 of 133) [11/28/2000 5:58:48 AM] Hacker's Handbook Appendices I troubleshooting 112 II Glossary 117 III CCITT and related standards 130 IV Standard computer alphabets 132 V Modems 141 VI Radio Spectrum 144 VII Port-finder flow chart 148 INTRODUCTION The word 'hacker' is used in two different but associated ways: for some, a hacker is merely a computer enthusiast of any kind, who loves working with the beasties for their own sake, as opposed to operating them in order to enrich a company or research project --or to play games. -
Why Dependent Types Matter
Why Dependent Types Matter Thorsten Altenkirch Conor McBride James McKinna The University of Nottingham The University of St Andrews {txa,ctm}@cs.nott.ac.uk [email protected] Abstract We exhibit the rationale behind the design of Epigram, a dependently typed programming language and interactive program development system, using refinements of a well known program—merge sort—as a running example. We discuss its relationship with other proposals to introduce aspects of dependent types into functional programming languages and sketch some topics for further work in this area. 1. Introduction Types matter. That’s what they’re for—to classify data with respect to criteria which matter: how they should be stored in memory, whether they can be safely passed as inputs to a given operation, even who is allowed to see them. Dependent types are types expressed in terms of data, explicitly relating their inhabitants to that data. As such, they enable you to express more of what matters about data. While conventional type systems allow us to validate our programs with respect to a fixed set of criteria, dependent types are much more flexible, they realize a continuum of precision from the basic assertions we are used to expect from types up to a complete specification of the program’s behaviour. It is the programmer’s choice to what degree he wants to exploit the expressiveness of such a powerful type discipline. While the price for formally certified software may be high, it is good to know that we can pay it in installments and that we are free to decide how far we want to go. -
PDF (Ved-Editor+Html2pdf)
Free, Revised (slightly extended), Version of 1978 Book (goo.gl/AJLDih) HTML and PDF Afterthoughts (2015 onwards): Minor updates: 2018, Feb 2019, Jun 2019 PDF version with contents list in side-panel (if supported by viewer). PDF page numbers may change after further editing -- so don’t use them for reference! (5 Sep 2017: increased font size) JUMP TO TABLE OF CONTENTS 1978 Book Cover I was not consulted about the cover. The book is mainly concerned with the biological, psychological and philosophical significance of virtual machinery. I did not know that the publishers had decided to associate it with paper tape devices until it was published. 1 1978 First Page Copyright: Aaron Sloman, 1978 (When the book went out of print all rights reverted to the author.) 2015: I hereby permit anyone to copy any or all of the contents of this book. The online version of this work is licensed under a Creative Commons Attribution 4.0 International License. If you use, or comment on, any of this please include a URL if possible, so that readers can see the original (or the latest version). For more freely available online books see http://onlinebooks.library.upenn.edu/ JUMP TO TABLE OF CONTENTS 2 Original front-matter -- 1978 HARVESTER STUDIES IN COGNITIVE SCIENCE General Editor: Margaret A. Boden Harvester Studies in Cognitive Science is a new series which will explore the nature of knowledge by way of a distinctive theoretical approach one that takes account of the complex structures and interacting processes that make thought and action possible. Intelligence can be studied from the point of view of psychology, philosophy, linguistics, pedagogy and artificial intelligence, and all these different emphases will be represented within the series. -
Miscellaneous Repairs Chesapeake City Bridge Construction Solicitation
IFB W912BU21B0004 US Army Corps of Engineers Philadelphia District Miscellaneous Repairs Chesapeake City Bridge Chesapeake City, Maryland Construction Solicitation and Specifications 15 June 2021 This page was intentionally left blank for duplex printing. INVITATION NO. W912BU21B0004 PHILADELPHIA DISTRICT CORPS OF ENGINEERS INVITATION FOR BIDS FOR MISCELLANEOUS REPAIRS CHESAPEAKE CITY BRIDGE CHESAPEAKE CITY, MARYLAND I. NOTE THE AFFIRMATIVE ACTION REQUIREMENT OF THE EQUAL OPPORTUNITY CLAUSE WHICH MAY APPLY TO THE CONTRACT RESULTING FROM THIS SOLICITATION. II. BIDDERS ARE REQUIRED TO COMPLETE THE REPRESENTATION AND CERTIFICATIONS PORTION OF SECTION 00 45 00 OF THIS SOLICITATION AND SUBMIT THIS WITH THEIR OFFER. III. PROSPECTIVE BIDDERS ARE INVITED TO VISIT THE SITE TO ACQUAINT THEMSELVES WITH THE SITE CONDITIONS AND ANY PROBLEMS INCIDENT TO THE PROSECUTION OF THE WORK. THE SITE VISIT WILL BE HELD ON 22 JUNE 2021. THE SITE VISIT WILL BEGIN AT 10:00 AM AT THE CHESAPEAKE CITY PROJECT Office - C&D CANAL 815 BETHEL ROAD, CHESAPEAKE CITY, MARYLAND 21915. ALL THOSE PLANNING TO ATTEND MUST CONTACT MR. MIKE HART VIA EMAIL AT [email protected], PRIOR TO THE SITE VISIT. 15 JUNE 2021 This page was intentionally left blank for duplex printing. SOLICITATION, OFFER, 1. SOLICITATION NO. 2. TYPE OF SOLICITATION 3. DATE ISSUED PAGE OF PAGES AND AWARD X SEALED BID (IFB) 15-Jun-2021 W912BU21B0004 1 OF 41 (Construction, Alteration, or Repair) NEGOTIATED(RFP) IMPORTANT - The "offer" section on the reverse must be fully completed by offeror. 4. CONTRACT NO. 5. REQUISITION/PURCHASE REQUEST NO. 6. PROJECT NO. 7. ISSUED BY CODE W912BU 8. -
LFCS Now and Then
LFCS Now and Then Gordon Plotkin LFCS@30 Edinburgh, April, 2016 Gordon Plotkin LFCS Now and Then Origins of LFCS Logic programming Gordon Plotkin LFCS Now and Then Hope Park Square Gordon Plotkin LFCS Now and Then Hope Park Square Gordon Plotkin LFCS Now and Then Metamathematics Unit Gordon Plotkin LFCS Now and Then The James Clerk Maxwell Building JCMB, KB Gordon Plotkin LFCS Now and Then 5 Readers who take a narrow view on the automation of inductive theorem proving might be surprised that we discuss the waterfall. It is impossible,however,tobuildagoodin- ductive theorem prover without considering how to transformtheinductionconclusioninto the hypothesis (or, alternatively, how to recognize that a legitimate induction hypothesis can dispatch a subgoal). So we take the expansive view and discuss not just the induction principle and its heuristic control, but also the waterfall architecture that is effectively an integral part of the success. Boyer and Moore had met in August 1971, a year before the induction work started, when Boyer took up the position of a post-doctoral research fellow at theMetamathe- matics Unit of the University of Edinburgh. Moore was at that time starting the second year of his PhD studies in “the Unit”. Ironically, they were both from Texas and they had both come to Edinburgh from MIT. Boyer’s PhD supervisor, W. W. Bledsoe,from The University of Texas at Austin, spent 1970–71 on sabbatical at MIT, and Boyer ac- companied him and completed his PhD work there. Moore got his bachelor’s degree at MIT (1966–70) before going to Edinburgh for his PhD. -
Commerci Confidence
COMMERCI CONFIDENCE perq.Files - perq files information. Modified: 23 oct 80 JPS. a list of all files used by Three Rivers Computer Corporation for software and hardware development of the perq system. *** warning: this list is not yet complete >OS.SOURCE - OPERATING SYSTEM SOURCES file name version file name on floppy short description. DYNAMIC.PAS 0.0 DYNAMI.PAS Dynamic allocation routines - New and Dispose. WRITER.PAS 0.0 WRITER.PAS Stream package output conversion routines. READER.PAS 0.0 READER.PAS Stream package input conversion routines. PSTRING.PAS 0.0 PSTRIN.PAS String manipulation package. STREAM.PAS 0.0 STREAM.PAS Stream package base routines - Get and Put. SYSTEM.PAS A.lS SYSTEM.PAS Operating system main program. CODECONST.PAS CODECO.PAS Linker and loader constant definitions. CODETYPE.PAS CODETY.PAS Linker and loader type definitions. LOADERl.PAS LOADRl.PAS Loader constant definitions. LOADER2.PAS LOADR2.PAS Loader type definitions. LOADER3.PAS LOADR3.PAS Loader var definitions. LOADER4.PAS LOADR4.PAS Loader procedure definiiions. SEGNUMBERS.PAS 0.0 SEGNUM.PAS System segment number constants. MEMORY.PAS 1.1 MEMORY.PAS Memory manager. , SCREEN.PAS 0.0 SCREEN.PAS PAGE 2 Screen manager. SYSVERS.PAS ' 0.0 SYSVER.PAS System ve~sion number conversion routine. CMDPARSE.PAS 1.0 CMDPAR.PAS Command parser. FILESYSTEM.PAS 2.0 FILESY.PAS File system. RASTER. PAS 0.0 RASTER.PAS Raster-op definitions. LINEDRAW.PAS 0.0 LINEDR.PAS Line drawing interface module. IOERRS.PAS 0.0 IOERRS.PAS Input/output error number constants. IO.PAS 2.2 IO.PAS Input/output manager. -
The History of Standard ML
The History of Standard ML DAVID MACQUEEN, University of Chicago, USA ROBERT HARPER, Carnegie Mellon University, USA JOHN REPPY, University of Chicago, USA Shepherd: Kim Bruce, Pomona College The ML family of strict functional languages, which includes F#, OCaml, and Standard ML, evolved from the Meta Language of the LCF theorem proving system developed by Robin Milner and his research group at the University of Edinburgh in the 1970s. This paper focuses on the history of Standard ML, which plays a central rôle in this family of languages, as it was the first to include the complete set of features that we now associate with the name “ML” (i.e., polymorphic type inference, datatypes with pattern matching, modules, exceptions, and mutable state). Standard ML, and the ML family of languages, have had enormous influence on the world of programming language design and theory. ML is the foremost exemplar of a functional programming language with strict evaluation (call-by-value) and static typing. The use of parametric polymorphism in its type system, together with the automatic inference of such types, has influenced a wide variety of modern languages (where polymorphism is often referred to as generics). It has popularized the idea of datatypes with associated case analysis by pattern matching. The module system of Standard ML extends the notion of type-level parameterization to large-scale programming with the notion of parametric modules, or functors. Standard ML also set a precedent by being a language whose design included a formal definition with an associated metatheory of mathematical proofs (such as soundness of the type system). -
Another ICL Anthology
Foreword On June 21st 1948 Tom Kilburn ran a program on the first electronically stored program computer in the world. Freddy Williams and Tom had been struggling for some time to make their cathode ray tube store work. Demonstrating the store was the key thing, for without a store the computer as we know it today could never be. This simple machine, always known as the 'BABY', was developed into the Ferranti Mark 1, the first computer to go on commercial sale anywhere in the world. Tom's program was the first program to be written and run. Some of us here in Manchester felt that the fiftieth anniversary of such stupendous achievements should not go unnoticed. So at 11 a.m. on June 21st 1998, fifty years to the dot later, Tom ran that same program again on a reconstructed BABY that had earlier been ceremonially switched on by the widow of Freddy Williams. A team of enthusiasts, almost all members or retired members of ICL, researched the design and built the machine from genuine 1940s components. This would not have been possible without the usual ICL drive and enthusiasm, typified at the personal level by Chris Burton (ex- ICL West Gorton) who led the team, and marked at the corporate level by sponsorship of the project. Anyone interested can now see BABY at the Museum of Science and Industry in Manchester. Tom Kilburn says that it looks exactly like the original - except that it's cleaner. I mention this story because it illustrates vividly what has happened to our industry over fifty years.