(Bob) Bemer Papers
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Oral History of Captain Grace Hopper
Oral History of Captain Grace Hopper Interviewed by: Angeline Pantages Recorded: December, 1980 Naval Data Automation Command, Maryland CHM Reference number: X5142.2009 © 1980 Computer History Museum Table of Contents BACKGROUND HISTORY ...........................................................................................................3 1943-1949: MARK I, II, AND III COMPUTERS AT HARVARD....................................................6 1949-1964: ECKERT AND MAUCHLY, UNIVAC, AND THE ONE-PASS COMPILER ................7 The Need for User-Friendly Languages ..................................................................................10 DEMANDS FOR THE FUTURE..................................................................................................12 Application Processors, Database Machines, Distributed Processing ....................................12 Demand for Programmers and System Analysts ....................................................................14 The Value and Cost of Information..........................................................................................14 The Navy’s Dilemma: Micros and Software Creation..............................................................15 The Murray Siblings: Brilliant Communicators.........................................................................18 Common Sense and Distributed Computing ...........................................................................19 BACK TO 1943-1949: HOWARD AIKEN....................................................................................21 -
Distributing Liability: the Legal and Political Battles of Y2K LSE Research Online URL for This Paper: Version: Accepted Version
Distributing liability: the legal and political battles of Y2K LSE Research Online URL for this paper: http://eprints.lse.ac.uk/103330/ Version: Accepted Version Article: Mulvin, Dylan (2020) Distributing liability: the legal and political battles of Y2K. IEEE Annals of the History of Computing. ISSN 1058-6180 Reuse Items deposited in LSE Research Online are protected by copyright, with all rights reserved unless indicated otherwise. They may be downloaded and/or printed for private study, or other acts as permitted by national copyright laws. The publisher or other rights holders may allow further reproduction and re-use of the full text version. This is indicated by the licence information on the LSE Research Online record for the item. [email protected] https://eprints.lse.ac.uk/ Distributing Liability The legal and political battles of Y2K Dylan Mulvin* • Dylan Mulvin is an Assistant Professor in the Department of Media and Communications at the London School of Economics and Political Science – London, UK WC2A 2AE. E-mail: [email protected]. Abstract In 1999 the United States Congress passed the Y2K Act, a major—but temporary— effort at reshaping American tort law. The Act strictly limited the scope and applicability of lawsuits related to liability for the Year 2000 Problem. This paper excavates the process that led to the Act, including its unlikely signature by President Clinton. The history presented here is based on a reconsideration of the Y2K crisis as a major episode in the history of computing. The Act, and the Y2K crisis more broadly, expose the complex interconnections of software, code, and law at the end of the 20th century, and, taken seriously, argue for the appreciation of the role of liability in the history of technology. -
Distributing Liability: the Legal and Political Battles of Y2K
Theme Article: Computing and Capitalism Distributing Liability: The Legal and Political Battles of Y2K Dylan Mulvin London School of Economics and Political Science Abstract—In 1999 the United States Congress passed the Y2K Act, a major—but temporary—effort at reshaping American tort law. The Act strictly limited the scope and applicability of lawsuits related to liability for the Year 2000 Problem. This article excavates the process that led to the Act, including its unlikely signature by President Clinton. The history presented here is based on a reconsideration of the Y2K crisis as a major episode in the history of computing. The Act, and the Y2K crisis more broadly, expose the complex interconnections of software, code, and law at the end of the 20th century, and, taken seriously, argue for the appreciation of the role of liability in the history of technology. & It’s almost a betrayal. After being told for The United States’ “Y2K Act” of 1999 took years that technology is the path to a highly drastic steps to protect American companies evolved future, it’s come as something of a shock to discover that a computer system is from lawsuits related to the Year 2000 Problem not a shining city on a hill - perfect and ever (the “Y2K bug”).3 Among other changes, the new - but something more akin to an old Act gave all companies ninety days to solve any farmhouse built bit by bit over decades by Y2K malfunctions, capped punitive damages, and non-union carpenters.1 stipulated that legal and financial responsibility –– Ellen Ullman, “The Myth of Order” Wired, would have to be distributed proportionately April 1999 among any liable companies. -
Control Characters in ASCII and Unicode
Control characters in ASCII and Unicode Tens of odd control characters appear in ASCII charts. The same characters have found their way to Unicode as well. CR, LF, ESC, CAN... what are all these codes for? Should I care about them? This is an in-depth look into control characters in ASCII and its descendants, including Unicode, ANSI and ISO standards. When ASCII first appeared in the 1960s, control characters were an essential part of the new character set. Since then, many new character sets and standards have been published. Computing is not the same either. What happened to the control characters? Are they still used and if yes, for what? This article looks back at the history of character sets while keeping an eye on modern use. The information is based on a number of standards released by ANSI, ISO, ECMA and The Unicode Consortium, as well as industry practice. In many cases, the standards define one use for a character, but common practice is different. Some characters are used contrary to the standards. In addition, certain characters were originally defined in an ambiguous or loose way, which has resulted in confusion in their use. Contents Groups of control characters Control characters in standards o ASCII control characters o C1 control characters o ISO 8859 special characters NBSP and SHY o Control characters in Unicode Control characters in modern applications Character list o ASCII o C1 o ISO 8859 Categories Translations Character index Sources This article starts by looking at the history of control characters in standards. We then move to modern times. -
An Interview with Donald Knuth 1974 ACM Turing Award Recipient
An Interview with Donald Knuth 1974 ACM Turing Award Recipient Interviewed by: Edward Feigenbaum March 14, 2007 and March 21, 2007 Mountain View, California This transcript and the interview on which it is based is from the files of the Computer History Museum in Mountain View, California. It is used here by the ACM with Kind permission from the Museum. CHM Reference number: X3926.2007, © 2007 Computer History Museum DK: Donald Knuth, The 1974 ACM Turing Award Recipient EF: Edward Feigenbaum, a professor at Stanford University EF: My name is Edward Feigenbaum. I’m a professor at Stanford University, in the Computer Science Department. I’m very pleased to have the opportunity to interview my colleague and friend from 1968 on, Professor Don Knuth of the Computer Science Department. Don and I have discussed the question of what viewers and readers of this oral history we think there are. We’re orienting our questions and comments to several groups of you readers and viewers. First, the generally intelligent and enlightened science-oriented person who has seen the field of computer science explode in the past half century and would like to find out what is important, even beautiful, and what some of the field’s problems have been. Second, the student of today who would like orientation and motivation toward computer science as a field of scholarly work and application, much as Don and I had to do in the 1950s. And third, those of you who maybe are not yet born, the history of science scholar of a dozen or 100 years from now, who will want to know more about Donald Knuth, the scientist and programming artist, who produced a memorable body of work in the decades just before and after the turn of the millennium. -
Complexity & Verification: the History of Programming As Problem Solving
COMPLEXITY & VERIFICATION: THE HISTORY OF PROGRAMMING AS PROBLEM SOLVING A DISSERTATION SUBMITTED TO THE FACULTY OF THE GRADUATE SCHOOL OF THE UNIVERSITY OF MINNESOTA BY Joline Zepcevski IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY Arthur L. Norberg February 2012 © Copyright by Joline Zepcevski 2012 All Rights Reserved Acknowledgments It takes the work of so many people to help a student finish a dissertation. I wish to thank Professor Arthur L. Norberg for postponing his retirement to be my advisor and my friend over the course of this project. Thank you to my committee, Professor Jennifer Alexander, Professor Susan Jones, Dr. Jeffery Yost, and Professor Michel Janssen, all of whom individually guided this dissertation at different times and in specific ways. Thank you also to Professor Thomas Misa for his guidance and assistance over many years. I had a great faculty and a great cohort of graduate students without whom this dissertation would never have been completed. I particularly want to thank Sara Cammeresi, whose unending support and friendship were invaluable to the completion of this project. I wish to thank my family, Jovan Zepcevski, Geraldine French, Nicole Zepcevski, and Brian Poff, who supported me and loved me throughout it all. I also want to thank my friends: Tara Jenson, Holly and Aaron Adkins, Liz Brophey, Jennifer Nunnelee, Jen Parkos, Vonny and Justin Kleinman, Zsuzsi Bork, AJ Letournou, Jamie Stallman, Pete Daniels, and Megan Longo who kept me sane. I need to thank Lisa Needham for all her assistance. Without your help, I wouldn’t sound nearly as smart. -
Robert (Bob) Bemer Papers X3054.2005
http://oac.cdlib.org/findaid/ark:/13030/c8j96cf7 No online items Guide to the Robert (Bob) Bemer papers X3054.2005 Finding aid prepared by Jack Doran and Sara Chabino Lott Processing of this collection was made possible through generous funding from the National Archives’ National Historical Publications & Records Commission: Access to Historical Records grant. Computer History Museum 1401 N. Shoreline Blvd. Mountain View, CA, 94043 (650) 810-1010 [email protected] October 2018 Guide to the Robert (Bob) Bemer X3054.2005 1 papers X3054.2005 Title: Robert (Bob) Bemer papers Identifier/Call Number: X3054.2005 Contributing Institution: Computer History Museum Language of Material: English Physical Description: 5.42 Linear feet4 record cartons, 1 manuscript box Date (bulk): Bulk, 1955-1999 Date (inclusive): 1943-2002 Abstract: The Robert (Bob) Bemer papers, ranging in date from 1943 to 2001, with the bulk between 1955 and 1959, trace Bemer’s career in programming at IBM, Rand Corporation, General Electric, and Honeywell, Inc., as well as his personal interest in documenting, sharing and preserving information about the history of computing. Bemer was responsible for developing six ASCII characters, played a key role in the development of COBOL (Common Business Oriented Language), and identified what became known as the Y2K problem. Materials include correspondence, memoranda, published papers and articles, speeches, newspaper clippings, and technical documentation. Roughly one-fourth of the collection relates to Bemer’s discovery of the Y2K problem and his subsequent work to solve it. The remaining three-fourths of the collection relates to Bemer’s work on programming languages and standards, and among these documents are what Bemer called “vignettes” about the history of computing and software, as remembered by Bemer and his contemporaries. -
Ascii Control Codes
270 TUGboat, Volume 29 (2008), No. 2 Character encoding Since a computer organizes its bits in 8-bit bytes, and ASCII only codified the codes under 128, this left Victor Eijkhout the codes with the high bit set (`extended ASCII') Have you ever wondered what goes on between the undefined, and different manufacturers of computer `A' you hit on your keyboard, the `A' stored in your equipment came up with their own way of filling file, and the `A' that comes out of your printer? them in. These standards were called `code pages', Why does that letter still come out of the printer and IBM gave a standard numbering to them. For in- if the file is printed by your friend in Egypt who stance, code page 437 is the MS-DOS code page with doesn't use the letter `A'? Maybe you know that `A' accented characters for most European languages, is character 65 (decimal) in ASCII; if you put it on 862 is DOS in Israel, and 737 is DOS for Greek. a web page, and it's visited by someone in Japan, Here is cp437: why don't they get character number 65 in the Kanji alphabet? Do you remember the DOS days when your Mac owning colleague would send you a file and what were supposed to be accented characters would turn into smiley faces? Have you ever pasted text from MS-Word into Emacs, and Emacs wanted to save the document as UTF-8? Just what is that about? All this, and more, will be explained in this article. -
Speeches and Papers 3 1955-196# ASSOCIATION for COMPUTING MACHINERY 211 East I+3Rd Street New York 17, New York
R. W. Bemer Speeches and Papers 3 1955-196# ASSOCIATION FOR COMPUTING MACHINERY 211 East i+3rd Street New York 17, New York VISITING SCIENTISTS PROGRAM FOR COLLEGES AND UNIVERSITIES 1963 Committee: Dr. James R. Oliver, Director USL Computing Center University of Southwestern Louisiana Lafayette, Louisiana, 70506 Dr. Jack Moshman, Vice-President C-E-I-R, Inc. Arlington, Virginia Dr. John W. Hamblen, Director Data Processing and Computing Center Southern Illinois University Carbondale, Illinois BRUCE W. ARDEN, University of Michigan, Computing Center, Ann Arbor, Michigan. Topics of Interest: (l) On the Classification of Languages and Compiling Algorithms; (2) The Use of Computers in a University. ROBERT L. ASIIENHURST, School of Business, University of Chicago, Chicago 37, Illinois. Topics of Interest: (l) Switching Theory (especially decomposition theory); (2) Computer Design and Organization; (3) Computer Arithemtic (algorithms and behavior); (L) Formal Structure of Algorithms (numeric and non-numeric). ROBERT W. BEMER, Director Systems Programming, UNIVAC Division of Sperry Rand Corporation, 315 Park Avenue South, New York 10, Hew York. Topics of Interest (l) Numerical Analysis; (2) Programming Languages; (3) Automatic Control. HOWARD BROMBERG, C-E-I-R, Inc., Benson East, Jenkintown, Pennsylvania, 190^6. Topics of Interest: (l) Automatic Programming; (2) Computer Languages; (3) Standardization Principles. JOHN W. CARR, III, Moore School of Electrical Engineering, University of Pennsylvania, Philadelphia ht Pennsylvania. Topics of Interest: (l) Language for Problem Solving Using Digital Computers; (2) Better Computers in the Future; (3) Numerical Analysis and Functional Analysis; (L) Automatic Theorem Proving. THOMAS E. CHEATHAM, JR., 1 Ardley Place, Winchester, Massachusetts. Topics of Interest: (l) Trends in Programming Systems; (2) The CL-II Programming System. -
Cobol 1 Cobol
COBOL 1 COBOL COBOL Paradigm procedural, object-oriented Appeared in 1959 Designed by Grace Hopper, William Selden, Gertrude Tierney, Howard Bromberg, Howard Discount, Vernon Reeves, Jean E. Sammet Stable release COBOL 2002 (2002) Typing discipline strong, static Major OpenCOBOL, Micro Focus International implementations Dialects HP3000 COBOL/II, COBOL/2, IBM OS/VS COBOL, IBM COBOL/II, IBM COBOL SAA, IBM Enterprise COBOL, IBM COBOL/400, IBM ILE COBOL, Unix COBOL X/Open, Micro Focus COBOL, Microsoft COBOL, Ryan McFarland RM/COBOL, Ryan McFarland RM/COBOL-85, DOSVS COBOL, UNIVAC COBOL, Realia COBOL, Fujitsu COBOL, ICL COBOL, ACUCOBOL-GT, COBOL-IT, DEC COBOL-10, DEC VAX COBOL, Wang VS COBOL, Visual COBOL, Tandem (NonStop) COBOL85, Tandem (NonStop) SCOBOL (a COBOL74 variant for creating screens on text-based terminals) Influenced by FLOW-MATIC, COMTRAN, FACT Influenced PL/I, CobolScript, ABAP COBOL at Wikibooks COBOL (pronounced /ˈkoʊbɒl/) is one of the oldest programming languages. Its name is an acronym for COmmon Business-Oriented Language, defining its primary domain in business, finance, and administrative systems for companies and governments. The COBOL 2002 standard includes support for object-oriented programming and other modern language features.[1] History and specification The COBOL specification was created by a committee of researchers from private industry, universities, and government during the second half of 1959. The specifications were to a great extent inspired by the FLOW-MATIC language invented by Grace Hopper - commonly referred to as "the mother of the COBOL language." The IBM COMTRAN language invented by Bob Bemer was also drawn upon, but the FACT language specification from Honeywell was not distributed to committee members until late in the process and had relatively little impact. -
Annals of the Historyofcomputing :R
« Annals of the HistoryofComputing :r Dr. John A. N. Editor-in-Chief Annals ofthe 1987-1995 Virginia Tech Wednesday, June 19, 1996 Department ofComputer Science. ry iyyy yy Blackburg, VA 24001-0106 Professor Edward Feigenbaum of Phone +1-703-231-5780 Department Computer Science Fax- + 1-703-231-6075 Stanford University [email protected] Stanford CA 94305 [email protected] Dear Dr. Feigenbaum: Re: "Computer Pioneers" In May 1995 the lEEE Computer Society Press published my book entitled "Computer Pioneers", a collection of the biographies of 240 pioneers in our industry. The first printing quickly sold out, and the second printing (with one or two corrections) was prepared for the 1996 50th Anniversary activities. I am working on the second edition, trying hard to include those whom I missed before and bringing the others up-to-date. I am enclosing the outline of an entry that I have constructed from the lEEE Spectrum, together with the biography of another pioneer from the first edition. I would be grateful if you would fill out the details for me, and return it to me so that I can include your name in the next edition. Also if you have a photograph, not necessarily a very recent one, I would appreciate receiving a copy. Upon receipt I will scan it into our system and return the original to you as soon as possible. The World's Computer Society DC 'end: Biographies LOS AL -MITOS, G. TOKYO. JAPAN yyyyy,5i11.;;:..] v. The Institute ot I lectrk.<l .m.l Electronics Engineers, lm WASHINGTON, Edward E. -
4/25/2015 ASCII Chart
4/25/2015 ASCII Chart AskApache Web DevelopmentFREE THOUGHT · FREE SOFTWARE · FREE WORLD(http://www.fsf.org/register_form?referrer=7511) Skip Home » Linux » ASCII Chart ASCII Chart « Adding a Trailing "/" to WordPress PermalinksRun Firefox every 5 Min from Windows Batch File » by Charles Torvalds Wanted to stick this here for a reference, mostly for me. I use ASCII alot in bash, preg_matches, preg_replace, etc.. Contents [hide] Linux Function to print ASCII Chart History of ASCII ASCII control characters ASCII CODES 1. THE NON PRINTING CHARACTERS 2. SPECIAL CHARACTERS 3. NUMERIC CHARACTERS 4. ADDITIONAL SPECIAL CHARACTERS 5. CAPITALIZED or UPPER CASE CHARACTERS 6. ADDITIONAL SPECIAL CHARACTERS 7. LOWER CASE CHARACTERS 8. EXTENDED ASCII CHARACTERS Linux Function to print ASCII Chart ^ (http://uploads.askapache.com/2012/10/asciichart.png) This function will print a 256 ASCII Character Chart. function aa_pascii () { local p=; for i in {1..256}; do p=" $i"; echo ‐e "${p: ‐3} \\0$(( $i / 64 * 100 + $i % 64 / 8 * 10 + $i % 8 ))"; done | cat ‐t | column ‐c$(( ${COLUMNS:‐80} / 2 )) } History of ASCII ^ The American Standard Code for Information Interchange (ASCII) was developed under the auspices of a committee of the American Standards Association, called the X3 committee, by its X3.2 (later X3L2) subcommittee, and later by that subcommittee's X3.2.4 working group. The ASA became the United States of America Standards Institute or USASI and ultimately the American National Standards Institute. The X3.2 subcommittee designed ASCII based on earlier teleprinter encoding systems. Like other character encodings, ASCII specifies a correspondence between digital bit patterns and character symbols (i.e.