Publications Core Magazine, 2012 This

Total Page:16

File Type:pdf, Size:1020Kb

Publications Core Magazine, 2012 This 2012 COMMEMORATIVE ISSUE C O RE A Publication of 25 Years of the Fellow Awards the Computer The Origins of Timesharing History Museum An Evening with Walter Isaacson Close up of the Amdahl 470V/6 Computer, 1975. The 470V/6 was the Amdahl Corporation’s fi rst product and ran the same software as IBM System/370 computers but cost less and was smaller and faster. Opposite page: Close-up of IBM 305 RAMAC System Diagram B CORE 2012 / HALL OF FELLOWS DEPARTMENTS MUSEUM UPDATES EXPLORE THE COLLECTION 2 4 6 56 60 58 Contributors An Analog Life An Evening with Oral Histories: Donor Profile Recent Artifact Walter Isaacson The Origins of Donations 3 5 61 Timesharing CEO’s Letter Talking to the Future 7 Museum Donors The President @ CHM C O RE 2012 9 SPECIAL SECTION: TWENTY-FIVE YEARS OF FELLOWS 10 12 14 18 The Fellow Awards Fellows at a Glance Visionary Pioneer 25 Years of Fellows It was 25 years ago that the See an overview of our Fellows— Grace Murray Hopper was a The Computer History Museum Museum began its Fellows where they studied and worked unique individual: a woman in a Fellows often have very inter- program. Since that time, the and what they are known for—in man’s world of computers and esting life trajectories, full of Award has been given to over this two-page chart that shows mathematics and an admiral in dramatic turns and unexpected 60 outstanding individuals in 25 years of Fellows history in an the U.S. Naval Reserve. Hopper, alternatives. Read about the computing whose work has accessible, graphic format. who made several groundbreak- Fellows in depth in this collec- made a difference. Museum ing innovations in her career, tion of essays. senior curator Dag Spicer looks was the Museum’s fi rst Fellow. back at the Awards and what Biographer Kurt Beyer high- they mean. lights some of Hopper’s MARK RICHARDS amazing accomplishments. COMPUTER HISTORY MUSEUM 1 CONTRIBUTORS Editor-in-Chief John C. Hollar Executive Editors Kirsten Tashev Carina Sweet changes in technology, business, history and stem education DR. KURT W. culture, and society. This in- principles meaningful for all Editor at Large cludes areas as diverse as com- visitors, from schoolchildren to Susan Tasaki BEYER puting developments outside retired engineers. Her back- AUTHOR the United States (especially in ground includes a ph.d. in Contributors Kurt, a former naval aviator Germany and the former Soviet developmental psychology, plus Dr. Kurt Beyer Alex Bochannek and professor at the United Union); the histories of analog more than 20 years’ experi- John C. Hollar States Naval Academy, is and non-electronic computing; ence teaching, conducting Lauren Silver military, fi nancial, and business research, and leading education currently an adjunct profes- Dag Spicer sor at Berkeley’s Haas School applications; and theoretical programs in a wide range of of Business, where he teaches computer science. settings, including schools; uni- Photography entrepreneurship and innova- versities; and science, art, and Mark Richards Photography tion. He is the co-founder of a natural history museums. Studio Dizon digital media services company JOHN C. and has authored multiple pat- Design ents (pending) on high-speed HOLLAR DAG Studio1500 PRESIDENT & CEO digital data processing. His book, Grace Hopper and the John C. Hollar, President and SPICER SENIOR CURATOR Invention of the Information Chief Executive Offi cer, directs Age (mit Press), was named the Museum’s strategic plan- Dag Spicer is senior curator at a top ten science/technology ning and operations. He is the Computer History Museum, book for 2010 by the Ameri- responsible for leading the which he joined in 1996. Dag can Library Association. Kurt Museum toward its goal of directs the Museum’s strat- received a master’s in econom- being the world’s leading in- egy relating to its collection ics from Oxford University stitution exploring the history of computer artifacts, fi lms, and his ph.d. from uc Berkeley. of computing and its ongoing documents, software, and Currently, he advises start-ups impact on society. Since joining ephemera—the largest collec- and executives in Silicon Valley the Museum in 2008, Hollar tion of computers and associ- through Morgan Stanley Smith has led the development and ated materials in the world. His Barney. He lives in Mill Valley execution of a new strategic interests include early elec- with his wife and two sons. plan that has produced signifi - tronic computing, computers in cant growth for the Museum medicine, ibm, supercomputers, and its mission. semiconductors, and computer ALEX architecture. He has been in- terviewed hundreds of times by BOCHANNEK LAUREN major news organizations and © 2012 Computer History Museum. The Museum is a CURATOR is internationally recognized as nonprofi t 501(c)(3) organization. Alex Bochannek, curator and SILVER a subject-matter expert in the All artwork is copyright of the VP OF EDUCATION senior manager at the Com- fi eld of computer history. Computer History Museum Lauren Silver is Vice President unless otherwise credited. For puter History Museum, joined reprints and permissions, the staff in 2007 following a of Education at the Computer contact [email protected]. decade of volunteer work with History Museum, where she Subscriptions are a member the Museum. He investigates has worked since 2009. Her benefi t. To purchase additional educational programs incorpo- copies of this issue of Core, complex computer-related please visit: magcloud.com. rate research from the learning Address changes and other sciences into an inquiry-based written correspondence may approach that makes computer be sent to: Computer History Museum, Public Relations email: [email protected] 2 CORE 2012 / HALL OF FELLOWS CEO’S TO OUR VALUED LETTER CORE DONORS A quarter-century ago, the Computer Museum in The Fellows are important for a third rea- Boston established an important tradition that we son. They represent the essence of computing proudly carry on today: the Fellow Awards. The history—a talented and driven individual, or Computer Museum was our predecessor, as many team, trying to solve a problem. Every great leap of you know, and we have carried on several fi ne forward in computing has involved a focused traditions begun there. None, however, is more search for a creative solution to a vexing techni- important than the Fellow Awards. cal issue. Many of the Fellows were told the The Awards are important to us, and to the problem couldn’t be solved at all. Still others pursuit of history, for at least three reasons. First, were told not to make an attempt—mainly the Fellows comprise more than 60 towering because it wasn’t in their job descriptions. From fi gures in the vast fi eld of computing. Every these basic and occasionally rebellious roots, important area is represented. We have honored astounding accomplishments grew. the greats of early hardware design—Konrad The Museum uses a careful and methodical Zuse, Jay Forrester, Gene Amdahl, and oth- process to select each year’s Fellows. Nomina- ers. The Hall includes giants of software—Don tions are open to the public. A select committee Knuth, Ken Thompson, John Backus, Dennis from both the private and public sectors reviews Ritchie, Linus Torvalds, John McCarthy, and each nomination. A weighted balloting process more. The architects of the fi rst commercial narrows the fi eld through multiple rounds of microprocessor are here—Federico Faggin, Ted voting. A Museum committee then makes the Hoff, Stan Mazor, and Masatoshi Shima. We fi nal selection. honor individuals whose skills in both technolo- Only two conditions apply. First, each nomi- gy and business built great commercial enterpris- nee must be alive at the time of selection, a re- es—Gordon Moore, Charles Geschke and John quirement modeled after the Nobel Prize. Second, Warnock, Ken Olsen, and Alan Shugart among we ask that those who are selected also agree them. Finally, we honor individuals like Tim to be publicly inducted at the Fellow Awards Berners-Lee and Vint Cerf, whose very names ceremony. The Fellows Gala is consistently one are synonymous with the stunning development of the highlights of the Museum’s calendar. of a globally connected society. We’re delighted to present profi les of all of Second, the Fellows represent a category of our Fellows in this year’s edition of Core. And unsung heroes whose stories are important to in doing so, we say: here’s to the renegades, the tell. They embody the thankless pursuit of tech- geniuses, the rule-breakers, the entrepreneurs, nical innovation that triggered enormous human and the problem-solvers. These are our Fellows. progress. Their work often went on—and in I hope you enjoy learning more about them, and many cases, continues to go on—well out of the celebrating 25 years of the Awards themselves. limelight of public recognition and acclaim. And yet the diligence, skill, and achievement of our Yours sincerely, Fellows remain a source of inspiration, especially in those moments when we could stand to feel a bit more inspired. Generations will benefi t from the lessons they can teach. JOHN C. HOLLAR PRESIDENT & CHIEF EXECUTIVE OFFICER COMPUTER HISTORY MUSEUM 3 MUSEUM UPDATES AN ANALOG LIFE: REMEMBERING JIM WILLIAMS Analog guru Jim Williams sitting at his famous work bench in 2006 “This exhibit is a He never tried to impress you analog signals to distinguish engineers must combine techni- with his math or his intellect. them from digital signals, cal knowledge with a great deal memorial to a man He didn’t make things com- which can only switch between of experience and intuition in but also a monument plicated so you would think 0 and 1 and which exist only order to harness them.
Recommended publications
  • PL/I List Processing • PL/I Language Lacked FaciliEs for TreaNg Linked Lists HAROLD LAWSON,JR
    The Birth of the Pointer Variable Based upon: Experiences and Reflec;ons of a Computer Pioneer Harold “Bud” Lawson FELLOW FELLOW and LIFE MEMBER IEEE COMPUTER SOCIETY CHARLES BABBAGE COMPUTER PIONEER FELLOW Overlapping Phases • Phase 1 (1959-1974) – Computer Industry • Phase 2 (1974-1996) - Computer-Based Systems • Phase 3 (1996-Present) – Complex Systems • Dedicated to all the talented colleagues that I have worked with during my career. • We have had fun and learned from each other. • InteresMng ReflecMons and Happenings are indicated in Red. Computer Industry (1959 to 1974) • Summer 1958 - US Census Bureau • 1959 Temple University (Introduc;on to IBM 650 (Drum Machine)) • 1959-61 Employed at Remington-Rand Univac • 1961-67 Employed at IBM • 1967-69 Part Time Consultant (Professor) • 1969-70 Employed at Standard Computer Corporaon • 1971-73 Consultant to Datasaab, Linköping • 1973-… Consultant .. Expert Witness.. Rear Admiral Dr. Grace Murray Hopper (December 9, 1906 – January 1, 1992) Minted the word “BUG” – During her Mme as Programmer of the MARK I Computer at Harvard Minted the word “COMPILER” with A-0 in 1951 Developed Math-MaMc and FlowmaMc and inspired the Development of COBOL Grace loved US Navy Service – The oldest acMve officer, reMrement at 80. From Grace I learned that it is important to queson the status-quo, to seek deeper meaning and explore alterna5ve ways of doing things. 1980 – Honarary Doctor The USS Linköpings Universitet Hopper Univac Compiler Technology of the 1950’s Grace Hopper’s Early Programming Languages Math-MaMc
    [Show full text]
  • Validated Products List, 1995 No. 3: Programming Languages, Database
    NISTIR 5693 (Supersedes NISTIR 5629) VALIDATED PRODUCTS LIST Volume 1 1995 No. 3 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Product Data - IGES Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1995 QC 100 NIST .056 NO. 5693 1995 NISTIR 5693 (Supersedes NISTIR 5629) VALIDATED PRODUCTS LIST Volume 1 1995 No. 3 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Product Data - IGES Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1995 (Supersedes April 1995 issue) U.S. DEPARTMENT OF COMMERCE Ronald H. Brown, Secretary TECHNOLOGY ADMINISTRATION Mary L. Good, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Arati Prabhakar, Director FOREWORD The Validated Products List (VPL) identifies information technology products that have been tested for conformance to Federal Information Processing Standards (FIPS) in accordance with Computer Systems Laboratory (CSL) conformance testing procedures, and have a current validation certificate or registered test report. The VPL also contains information about the organizations, test methods and procedures that support the validation programs for the FIPS identified in this document. The VPL includes computer language processors for programming languages COBOL, Fortran, Ada, Pascal, C, M[UMPS], and database language SQL; computer graphic implementations for GKS, COM, PHIGS, and Raster Graphics; operating system implementations for POSIX; Open Systems Interconnection implementations; and computer security implementations for DES, MAC and Key Management.
    [Show full text]
  • Silicon Shores Corporation Company Backgrounder
    Silicon Shores Corporation Company Backgrounder Company Overview Headquartered in Mountain View, CA Silicon Shores Corporation is the company overseeing operations of the Shoreline Lake Boathouse and American Bistro at the Shoreline Lake Recreational Area and Wildlife Sanctuary. Silicon Shores manages the facilities through a leasing arrangement with the City of Mountain View, which owns the Shoreline Lake park area. This private company, established in 2000, is incorporated in California. Christina Ferrari is the owner and President and entered into the relationship with the City in 2000. Given the origins of Shoreline Lake, the City of Mountain View’s transformation of 544 acres of junkyard, hog farm, two substandard dumps, low lying flood plains, and a sewage treatment plant into a nature preserve was quite an undertaking. Partnering with Silicon Shores ensured that the area can provide the services and amenities that the surrounding urban population and visitors would appreciate finding within a nature preserve. Vision & Mission The company’s goal for the Shoreline Lake area is to create an experience unmatched within Silicon Valley for residents and workers of the South Bay, and beyond. The centerpiece of the Park, Shoreline Lake is a man- made, 50-acre, salt water lake filled by waters pumped in from the San Francisco Bay that circulate back out into Permanente Creek. However, a densely populated, heavily-developed area surrounds the Park, which includes many well-known hi-tech firms (e.g., Google headquarters is right next door). Even so, Shoreline Lake, a safe and expansive waterway for many water sports, is also a wildlife sanctuary and home to many rare, migratory birds, such as the burrowing owl.
    [Show full text]
  • Towards a Secure Agent Society
    Towards A Secure Agent So ciety Qi He Katia Sycara The Rob otics Institute The Rob otics Institute Carnegie Mellon University Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. Pittsburgh, PA 15213, U.S.A [email protected] [email protected] March 23, 1998 Abstract We present a general view of what a \secure agent so ciety" should b e and howtode- velop it rather than fo cus on any sp eci c details or particular agent-based application . We b elieve that the main e ort to achieve security in agent so cieties consists of the following three asp ects:1 agent authentication mechanisms that form the secure so ciety's foundation, 2 a security architecture design within an agent that enables security p olicy making, se- curity proto col generation and security op eration execution, and 3 the extension of agent communication languages for agent secure communication and trust management. In this pap er, all of the three main asp ects are systematically discussed for agent security based on an overall understanding of mo dern cryptographic technology. One purp ose of the pap er is to give some answers to those questions resulting from absence of a complete picture. Area: Software Agents Keywords: security, agent architecture, agent-based public key infrastructure PKI, public key cryptosystem PKCS, con dentiality, authentication, integrity, nonrepudiation. 1 1 Intro duction If you are going to design and develop a software agent-based real application system for elec- tronic commerce, you would immediately learn that there exists no such secure communication between agents, which is assumed by most agent mo del designers.
    [Show full text]
  • How Did They Get to the Moon Without Powerpoint?
    How Did They Get to the Moon Without PowerPoint? Mordechai (Moti) Ben-Ari Department of Science Teaching Weizmann Institute of Science [email protected] Keynote speech at the Finnish Computer Science Society, May, 2003. 1 Developing a Technology The invention of writing, however, was the invention of an entirely new Let me start with a description of one of my first technology.[3, p. 9] full-time jobs: There is something to be said for this definition: I developed a technology for data min- do you remember those old movies that show “typ- ing in order to consolidate enterprise- ing pools,” where rows and rows of people, usually customer relations. women, sat pecking away at keyboards all day? Since I held that job in the early 1970s, clearly I would not have described my work in this terminol- ogy! What I actually did was: I wrote a program that read the system log, computed usage of CPU time and printed reports so that the users could be billed. My point in this talk is that hi-tech in general and computer science in particular did not begin in the 1990s, but that we have been doing it for decades. I believe that today’s students are being fed a lot of marketing propaganda to the contrary, and that they Well, things haven’t changed all that much! have completely lost a historical perspective of our discipline. I further believe that we have a respon- sibility as educators to downgrade the hype and to give our students a firm background in the scientific and engineering principles of computer science.
    [Show full text]
  • Emerging Technologies Multi/Parallel Processing
    Emerging Technologies Multi/Parallel Processing Mary C. Kulas New Computing Structures Strategic Relations Group December 1987 For Internal Use Only Copyright @ 1987 by Digital Equipment Corporation. Printed in U.S.A. The information contained herein is confidential and proprietary. It is the property of Digital Equipment Corporation and shall not be reproduced or' copied in whole or in part without written permission. This is an unpublished work protected under the Federal copyright laws. The following are trademarks of Digital Equipment Corporation, Maynard, MA 01754. DECpage LN03 This report was produced by Educational Services with DECpage and the LN03 laser printer. Contents Acknowledgments. 1 Abstract. .. 3 Executive Summary. .. 5 I. Analysis . .. 7 A. The Players . .. 9 1. Number and Status . .. 9 2. Funding. .. 10 3. Strategic Alliances. .. 11 4. Sales. .. 13 a. Revenue/Units Installed . .. 13 h. European Sales. .. 14 B. The Product. .. 15 1. CPUs. .. 15 2. Chip . .. 15 3. Bus. .. 15 4. Vector Processing . .. 16 5. Operating System . .. 16 6. Languages. .. 17 7. Third-Party Applications . .. 18 8. Pricing. .. 18 C. ~BM and Other Major Computer Companies. .. 19 D. Why Success? Why Failure? . .. 21 E. Future Directions. .. 25 II. Company/Product Profiles. .. 27 A. Multi/Parallel Processors . .. 29 1. Alliant . .. 31 2. Astronautics. .. 35 3. Concurrent . .. 37 4. Cydrome. .. 41 5. Eastman Kodak. .. 45 6. Elxsi . .. 47 Contents iii 7. Encore ............... 51 8. Flexible . ... 55 9. Floating Point Systems - M64line ................... 59 10. International Parallel ........................... 61 11. Loral .................................... 63 12. Masscomp ................................. 65 13. Meiko .................................... 67 14. Multiflow. ~ ................................ 69 15. Sequent................................... 71 B. Massively Parallel . 75 1. Ametek.................................... 77 2. Bolt Beranek & Newman Advanced Computers ...........
    [Show full text]
  • Prominence of Expert System and Case Study- DENDRAL Namita Mirjankar, Shruti Ghatnatti Karnataka, India [email protected],[email protected]
    International Journal of Advanced Networking & Applications (IJANA) ISSN: 0975-0282 Prominence of Expert System and Case Study- DENDRAL Namita Mirjankar, Shruti Ghatnatti Karnataka, India [email protected],[email protected] Abstract—Among many applications of Artificial Intelligence, Expert System is the one that exploits human knowledge to solve problems which ordinarily would require human insight. Expert systems are designed to carry the insight and knowledge found in the experts in a particular field and take decisions based on the accumulated knowledge of the knowledge base along with an arrangement of standards and principles of inference engine, and at the same time, justify those decisions with the help of explanation facility. Inference engine is continuously updated as new conclusions are drawn from each new certainty in the knowledge base which triggers extra guidelines, heuristics and rules in the inference engine. This paper explains the basic architecture of Expert System , its first ever success DENDRAL which became a stepping stone in the Artificial Intelligence field, as well as the difficulties faced by the Expert Systems Keywords—Artificial Intelligence; Expert System architecture; knowledge base; inference engine; DENDRAL I INTRODUCTION the main components that remain same are: User Interface, Knowledge Base and Inference Engine. For more than two thousand years, rationalists all over the world have been striving to comprehend and resolve two unavoidable issues of the universe: how does a human mind work, and can non-people have minds? In any case, these inquiries are still unanswered. As humans, we all are blessed with the ability to learn and comprehend, to think about different issues and to decide; but can we design machines to do all these things? Some philosophers are open to the idea that machines will perform all the tasks a human can do.
    [Show full text]
  • 1. Course Information Are Handed Out
    6.826—Principles of Computer Systems 2006 6.826—Principles of Computer Systems 2006 course secretary's desk. They normally cover the material discussed in class during the week they 1. Course Information are handed out. Delayed submission of the solutions will be penalized, and no solutions will be accepted after Thursday 5:00PM. Students in the class will be asked to help grade the problem sets. Each week a team of students Staff will work with the TA to grade the week’s problems. This takes about 3-4 hours. Each student will probably only have to do it once during the term. Faculty We will try to return the graded problem sets, with solutions, within a week after their due date. Butler Lampson 32-G924 425-703-5925 [email protected] Policy on collaboration Daniel Jackson 32-G704 8-8471 [email protected] We encourage discussion of the issues in the lectures, readings, and problem sets. However, if Teaching Assistant you collaborate on problem sets, you must tell us who your collaborators are. And in any case, you must write up all solutions on your own. David Shin [email protected] Project Course Secretary During the last half of the course there is a project in which students will work in groups of three Maria Rebelo 32-G715 3-5895 [email protected] or so to apply the methods of the course to their own research projects. Each group will pick a Office Hours real system, preferably one that some member of the group is actually working on but possibly one from a published paper or from someone else’s research, and write: Messrs.
    [Show full text]
  • Rulemaking: 1999-10 FSOR Emission Standards and Test Procedures
    State of California Environmental Protection Agency AIR RESOURCES BOARD EMISSION STANDARDS AND TEST PROCEDURES FOR NEW 2001 AND LATER MODEL YEAR SPARK-IGNITION MARINE ENGINES FINAL STATEMENT OF REASONS October 1999 State of California AIR RESOURCES BOARD Final Statement of Reasons for Rulemaking, Including Summary of Comments and Agency Response PUBLIC HEARING TO CONSIDER THE ADOPTION OF EMISSION STANDARDS AND TEST PROCEDURES FOR NEW 2001 AND LATER MODEL YEAR SPARK-IGNITION MARINE ENGINES Public Hearing Date: December 10, 1998 Agenda Item No.: 98-14-2 I. INTRODUCTION AND BACKGROUND ........................................................................................ 3 II. SUMMARY OF PUBLIC COMMENTS AND AGENCY RESPONSES – COMMENTS PRIOR TO OR AT THE HEARING .................................................................................................................. 7 A. EMISSION STANDARDS ................................................................................................................... 7 1. Adequacy of National Standards............................................................................................. 7 2. Lead Time ................................................................................................................................. 8 3. Technological Feasibility ........................................................................................................ 13 a. Technological Feasibility of California-specific Standards ..............................................................13
    [Show full text]
  • Microsoft Word 1 Microsoft Word
    Microsoft Word 1 Microsoft Word Microsoft Office Word 2007 in Windows Vista Developer(s) Microsoft Stable release 12.0.6425.1000 (2007 SP2) / April 28, 2009 Operating system Microsoft Windows Type Word processor License Proprietary EULA [1] Website Microsoft Word Windows Microsoft Word 2008 in Mac OS X 10.5. Developer(s) Microsoft Stable release 12.2.1 Build 090605 (2008) / August 6, 2009 Operating system Mac OS X Type Word processor License Proprietary EULA [2] Website Microsoft Word Mac Microsoft Word is Microsoft's word processing software. It was first released in 1983 under the name Multi-Tool Word for Xenix systems.[3] [4] [5] Versions were later written for several other platforms including IBM PCs running DOS (1983), the Apple Macintosh (1984), SCO UNIX, OS/2 and Microsoft Windows (1989). It is a component of the Microsoft Office system; however, it is also sold as a standalone product and included in Microsoft Microsoft Word 2 Works Suite. Beginning with the 2003 version, the branding was revised to emphasize Word's identity as a component within the Office suite; Microsoft began calling it Microsoft Office Word instead of merely Microsoft Word. The latest releases are Word 2007 for Windows and Word 2008 for Mac OS X, while Word 2007 can also be run emulated on Linux[6] . There are commercially available add-ins that expand the functionality of Microsoft Word. History Word 1981 to 1989 Concepts and ideas of Word were brought from Bravo, the original GUI writing word processor developed at Xerox PARC.[7] [8] On February 1, 1983, development on what was originally named Multi-Tool Word began.
    [Show full text]
  • Pete's Unsung Contribution to IEEE Standard 754 for Binary Floating
    File: 19July10 Pete’s Unsung Contribution to IEEE 754 Version dated July 10, 2010 8:21 am Pete’s Unsung Contribution to IEEE Standard 754 for Binary Floating-Point Prepared for the Conference to Celebrate Prof. G.W. “Pete” Stewart’s 70th Birthday July 19-20, 2010, at the University of Texas at Austin by Prof. W. Kahan Mathematics Dept. & Computer Science Dept. University of California @ Berkeley This is posted at <www.eecs.berkeley.edu/~wkahan/19July10.pdf> Prof. W. Kahan Page 1/18 File: 19July10 Pete’s Unsung Contribution to IEEE 754 Version dated July 10, 2010 8:21 am Pete’s Unsung Contribution to IEEE Standard 754 for Binary Floating-Point Abstract The near-universal portability, after recompilation, of numerical software for scientific, engineering, medical and entertaining computations owes a lot to the near-universal adoption of IEEE Standard 754 by computer arithmetic hardware starting in the 1980s. But in 1980, after forty months of dispute, the committee drafting this Standard was still unable to reach a consensus. The disagreement seemed irreconcilable. That was when Pete helped to close the divide. This is posted at <www.eecs.berkeley.edu/~wkahan/19July10.pdf> Prof. W. Kahan Page 2/18 File: 19July10 Pete’s Unsung Contribution to IEEE 754 Version dated July 10, 2010 8:21 am “Three Removes are as bad as a Fire.” Benjamin Franklin, Preface to Poor Richard’s Almanack (1758) My office has been moved twice since 1980, so now my notes for the events in question are buried in one of a few dozen full cartons,— I know not which.
    [Show full text]
  • SIGOPS Annual Report 2012
    SIGOPS Annual Report 2012 Fiscal Year July 2012-June 2013 Submitted by Jeanna Matthews, SIGOPS Chair Overview SIGOPS is a vibrant community of people with interests in “operatinG systems” in the broadest sense, includinG topics such as distributed computing, storaGe systems, security, concurrency, middleware, mobility, virtualization, networkinG, cloud computinG, datacenter software, and Internet services. We sponsor a number of top conferences, provide travel Grants to students, present yearly awards, disseminate information to members electronically, and collaborate with other SIGs on important programs for computing professionals. Officers It was the second year for officers: Jeanna Matthews (Clarkson University) as Chair, GeorGe Candea (EPFL) as Vice Chair, Dilma da Silva (Qualcomm) as Treasurer and Muli Ben-Yehuda (Technion) as Information Director. As has been typical, elected officers agreed to continue for a second and final two- year term beginning July 2013. Shan Lu (University of Wisconsin) will replace Muli Ben-Yehuda as Information Director as of AuGust 2013. Awards We have an excitinG new award to announce – the SIGOPS Dennis M. Ritchie Doctoral Dissertation Award. SIGOPS has lonG been lackinG a doctoral dissertation award, such as those offered by SIGCOMM, Eurosys, SIGPLAN, and SIGMOD. This new award fills this Gap and also honors the contributions to computer science that Dennis Ritchie made durinG his life. With this award, ACM SIGOPS will encouraGe the creativity that Ritchie embodied and provide a reminder of Ritchie's leGacy and what a difference a person can make in the field of software systems research. The award is funded by AT&T Research and Alcatel-Lucent Bell Labs, companies that both have a strong connection to AT&T Bell Laboratories where Dennis Ritchie did his seminal work.
    [Show full text]