Dec. 23Rd Analytical Engine

Total Page:16

File Type:pdf, Size:1020Kb

Dec. 23Rd Analytical Engine and a curve plotter, and also be While no one could ever recall able to punch numbers onto seeing Curtiss sat at a computer Dec. 23rd cards for later use. The machine console, he always argued that, would be powered by steam. “I was involved in the salt mines of computing.” Sadly, the engine was never Analytical Engine constructed during Babbage’s Dec. 23, 1834 lifetime, but Babbage's son, Henry, did build the mill portion Robert Elliot Kahn Charles Babbage [Dec 26] (what we would call the ALU) announced a new machine with working from his father’s Born: Dec. 23, 1938; far greater capabilities than the drawings [Jan 21]. Brooklyn, New York Difference Engine [June 14] in a Perhaps more importantly for Kahn is one of the “fathers of the letter to the Duke of Wellington future inventors, Henry also Internet”; other parents include (which was mainly about the published his father’s plans and Vint Cerf [June 23]. Jon Postel government's bedeviling lack of notebooks, along with Ada [Aug 6] and Larry Roberts [Dec funding for the Difference Lovelace’s [Dec 10] “Sketch of 21]. Engine). the Analytical Engine Invented In early 1969, Kahn helped build by Charles Babbage . with the Interface Message Notes by the Translator” [July Processors (IMPs [Aug 30]) at 10]. BBN [Oct 15] which acted as the In 1878 (after Babbage’s death), system independent interfaces the British Association for the between host computers and the Advancement of Science ARPANET [July 29]. He also gave described the engine as “a the first public demo of the marvel of mechanical ingenuity”, network at a conference in Oct. but decided against making one. 1972 by connecting twenty computers together (some reports say 40). He remarked later that this was “the John Hamilton watershed event that made people suddenly realize that Curtiss packet switching was a real Born: Dec. 23, 1909; technology.” Henry Babbage's Analytical USA In 1973-74, Cerf and Kahn co- Engine Mill (1910). Photo by Died: Aug. 13, 1977 invented the Transmission Marcin Wichary. CC BY 2.0. Curtiss played a key role in Control Protocol (TCP) by persuading US government to doodling on napkins [Sept 9], The first notes on the machine utilize computers more widely although they later published a appeared in mid-1834, the first after WWII. This began after learned paper about it [May 5]. design drawing is dated Sept. Edward U. Condon, the director Subsequently the protocol was 1834, and a workable design had of the National Bureau of split into more modular pieces, evolved by mid-1836, but Standards (NBS), assigned Curtis consisting of TCP and the User underwent a major revision in to survey the federal needs for Datagram Protocol (UDP) at the late 1837. For the next decade, computers and for a national transport layer [Jan 31], and the work on the Analytical Engine computing center. Internet Protocol (IP [Sept 1]) at consisted largely of refining that the network layer; this became basic design, with no attempt Curtiss had the opportunity to known as TCP/IP [Sept 9]. made to construct it. Over two put his ideas into practice after On [Jan 1] 1983, TCP/IP was hundred detailed engineering becoming the head of the adapted as the communication drawings were created. National Applied Mathematics Labs in 1947. He undertook a protocol at the heart of the The Analytical Engine would be massive recruitment program, "Internet", a term Cerf and Kahn able to store a 1,000 fifty-digit with the aim of accelerating the had invented in 1973 as an numbers, and calculate using construction of computers and abbreviation for “inter- base-10 fixed-point arithmetic. their use for scientific networking of networks.” Programs and data were to be computations. provided on punched cards, a method inspired by its He was also involved in the successful use in Jacquard looms organization of the Eastern [July 7]. When the machine Association of Computing needed any additional input, it Machinery (ACM), which would alert its operator by dropped the “Eastern” adjective ringing a bell. For output, the in 1948; he was its first engine would include a printer president in 1947. 1 [May 22]; and several languages other devices, such as varistor Butler W. such as Euclid (the first one and thermistor. And. I Lampson specifically designed to support suggested the name ‘transistor.’” program verification). Born: Dec. 23, 1943; In the Jargon File [Oct 2], his Washington, DC name is associated with the The MH-1 Lampson was part of Project milliLampson, a unit of talking GENIE [Nov 30] at UC Berkeley, speed, abbreviated as mL. Most Mechanical Hand which helped develop the people talk at around 200 mLs, Dec. 23, 1961 Berkeley Timesharing System but Lampson supposedly speaks for Scientific Data Systems’ SDS at 1,000 mLs. Heinrich Arnold Ernst 940 [July 24]. The goal was to completed his D.Sc. thesis at MIT show that a time-sharing OS on the MH-1 mechanical hand. It could be fast, small, and Transistor Demo was unique [March 13; Dec 10] economically feasible – features in being equipped with binary that were somewhat lacking in Dec. 23, 1947 touch sensors placed in different MIT’s mammoth time-sharing parts of the gripper, and with project, Multics [Nov 30]. Prev: [Dec 16] Next: [June 23] pressure sensors inside the The point-contact transistor was gripper. The touch sensors were demonstrated by William used to detect contact between Shockley [Feb 13], Walter the gripper and any obstacles in Brattain [Feb 10], and John the environment, and between Bardeen [May 23] to senior the gripper and the object being management at Bell Labs. grasped; the pressure sensors supplied data on the size of the To illustrate its use as a current object. amplifier, they connected a microphone and loudspeaker The control system executed on (or perhaps a pair of the TX-0 [Nov 20], and used its headphones) to the transistor. sensory feedback to determine a The story goes that one by one reasonable course of action after the managers picked up the a goal has been specified for the microphone and whispered, hand. The idea was to replace “Hello.” The loudspeaker at the traditional controls based on other end of the circuit shouted, numerical operations by pattern “HELLO!”. However, Brattain’s recognition and simulation of notes from that day only higher cognitive processes such as awareness and Butler Lampson (2018). Photo mention that the amplification understanding. by Duncan.Hull. CC BY-SA 4.0. suffered “no noticeable change in quality”. Shockley later wrote The concept had originated with Lampson is also a developer of that hearing speech amplified by Claude Shannon [April 30] programming languages, notably the transistor was a moment (Ernst's supervisor) and Marvin Cal, an interactive language for similar to Alexander Graham Minsky [Aug 9] in 1958. numerical computation derived Bell’s “Mr. Watson, come here, I For more handy robots, see [Feb from J. Clifford Shaw’s JOSS want you” [March 10]. 20; Sept 9; Nov 29; Nov 30]. [June 17]. This day is usually included in Lampson and L. Peter Deutsch the transistor's “Miracle Month," [Aug 7] co-developed the QSPL which started on Nov. 17 when system programming language, Bardeen and Brattain had begun DNSSEC Sourced and also QED [March 26], a line- their experiments. Dec. 23, 1997 oriented computer text editor. The “transistor” name is due to QED was a strong influence on Bardeen and Brattain’s John Gilmore [Aug 00], co- later UNIX text editors, such as immediate supervisor, John R. founder of the EFF [July 6], ed and sed. Pierce [March 27], who recalled: published the source code for DNSSEC (the Domain Name Lampson was a founding “The way I provided the name, System Security Extensions), member of Xerox PARC [July 1] was to think of what the device and thereby probably broke the where he contributed to many did. And at that time, it was law that restricted the 'export' of projects, including the Xerox supposed to be the dual of the cryptographic software. Alto [March 1] and Dorado [May vacuum tube. The vacuum tube 6], the laser printer [Jan 21]; had transconductance, so the Since DNS [June 23] is the two-phase commit protocols; transistor would have Internet's phone book, there's a Bravo [Oct 00] with Charles ‘transresistance.’ And the name strong incentive to keep it Simonyi [Sept 10]; Ethernet should fit in with the names of secure, and DNSSEC is 2 considered a major part of that At its launch, the channel people were left without effort. DNSSEC uses public key included the first televised electricity for up to six hours encryption and digital Christmas broadcast by the during winter. signatures to certify every Queen from 1957, and gradually According to the companies, the address that’s resolved by DNS added all the others. Other attacks came from computers [Feb 13]. material included royal speeches, royal interviews, royal with IP addresses located in the However, over time it's Russian Federation. visits, and, of course, royal gradually become clear that weddings. The offensive seems to have DNSSEC has a few security started in the previous spring problems of its own, adds The previous year, the Queen’s when emails were sent to significant load to DNS servers, Christmas message had been workers containing an infected and cannot easily be scaled up to released as a podcast. Word document [March 26]. cover the full Internet. For more royal online activities, For another Ukrainian see [March 6], [March 26] cyberattack, see [June 27]. OpenSSL Begins Dec.
Recommended publications
  • Towards a Secure Agent Society
    Towards A Secure Agent So ciety Qi He Katia Sycara The Rob otics Institute The Rob otics Institute Carnegie Mellon University Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. Pittsburgh, PA 15213, U.S.A [email protected] [email protected] March 23, 1998 Abstract We present a general view of what a \secure agent so ciety" should b e and howtode- velop it rather than fo cus on any sp eci c details or particular agent-based application . We b elieve that the main e ort to achieve security in agent so cieties consists of the following three asp ects:1 agent authentication mechanisms that form the secure so ciety's foundation, 2 a security architecture design within an agent that enables security p olicy making, se- curity proto col generation and security op eration execution, and 3 the extension of agent communication languages for agent secure communication and trust management. In this pap er, all of the three main asp ects are systematically discussed for agent security based on an overall understanding of mo dern cryptographic technology. One purp ose of the pap er is to give some answers to those questions resulting from absence of a complete picture. Area: Software Agents Keywords: security, agent architecture, agent-based public key infrastructure PKI, public key cryptosystem PKCS, con dentiality, authentication, integrity, nonrepudiation. 1 1 Intro duction If you are going to design and develop a software agent-based real application system for elec- tronic commerce, you would immediately learn that there exists no such secure communication between agents, which is assumed by most agent mo del designers.
    [Show full text]
  • 1. Course Information Are Handed Out
    6.826—Principles of Computer Systems 2006 6.826—Principles of Computer Systems 2006 course secretary's desk. They normally cover the material discussed in class during the week they 1. Course Information are handed out. Delayed submission of the solutions will be penalized, and no solutions will be accepted after Thursday 5:00PM. Students in the class will be asked to help grade the problem sets. Each week a team of students Staff will work with the TA to grade the week’s problems. This takes about 3-4 hours. Each student will probably only have to do it once during the term. Faculty We will try to return the graded problem sets, with solutions, within a week after their due date. Butler Lampson 32-G924 425-703-5925 [email protected] Policy on collaboration Daniel Jackson 32-G704 8-8471 [email protected] We encourage discussion of the issues in the lectures, readings, and problem sets. However, if Teaching Assistant you collaborate on problem sets, you must tell us who your collaborators are. And in any case, you must write up all solutions on your own. David Shin [email protected] Project Course Secretary During the last half of the course there is a project in which students will work in groups of three Maria Rebelo 32-G715 3-5895 [email protected] or so to apply the methods of the course to their own research projects. Each group will pick a Office Hours real system, preferably one that some member of the group is actually working on but possibly one from a published paper or from someone else’s research, and write: Messrs.
    [Show full text]
  • Oral History of Butler Lampson
    Oral History of Butler Lampson Interviewed by: Alan Kay Recorded: August 22, 2006 Cambridge, Mass. CHM Reference number: X3697.2007 © 2006 Computer History Museum Oral History of Butler Lampson Alan Kay: Part of my job here as given by the Computer History Museum is to try and get a few good words from you that we could use as the opening blurb for your award from the Computer History Museum. But also to get an oral history. Butler Lampson: I was going to say, I thought the job was to record hours of brilliant conversation that historians in 2100 will pore over. Kay: That is your job. My job is to only to try and instigate it. My theory about this thing is that you should not try and talk short. Lampson: Well, we’ve got lots of time right? Kay: Okay. We do have lots of time and tape is cheap. Lampson: Tape is cheap. Right. My sister’s a film editor and she hates it. She says things were much better in the days when film was expensive, because people would think about what they shot. Now, she says, they shoot hundreds of hours of crap and then they expect the editor to sort it out. Kay: We have to transcribe those hundreds of hours. Lampson: Yeah. Somebody’s got to look at it, it’s got to be fussed around with, and besides, she says, frequently in the whole of hundreds of hours you don’t find what you want because nobody thought about it beforehand. Kay: You remember Bonnie, my wife, ran a film and video company for ten years.
    [Show full text]
  • The People Who Invented the Internet Source: Wikipedia's History of the Internet
    The People Who Invented the Internet Source: Wikipedia's History of the Internet PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 22 Sep 2012 02:49:54 UTC Contents Articles History of the Internet 1 Barry Appelman 26 Paul Baran 28 Vint Cerf 33 Danny Cohen (engineer) 41 David D. Clark 44 Steve Crocker 45 Donald Davies 47 Douglas Engelbart 49 Charles M. Herzfeld 56 Internet Engineering Task Force 58 Bob Kahn 61 Peter T. Kirstein 65 Leonard Kleinrock 66 John Klensin 70 J. C. R. Licklider 71 Jon Postel 77 Louis Pouzin 80 Lawrence Roberts (scientist) 81 John Romkey 84 Ivan Sutherland 85 Robert Taylor (computer scientist) 89 Ray Tomlinson 92 Oleg Vishnepolsky 94 Phil Zimmermann 96 References Article Sources and Contributors 99 Image Sources, Licenses and Contributors 102 Article Licenses License 103 History of the Internet 1 History of the Internet The history of the Internet began with the development of electronic computers in the 1950s. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks. In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced.
    [Show full text]
  • A Memorable Trip Abhisekh Sankaran Research Scholar, IIT Bombay
    A Memorable Trip Abhisekh Sankaran Research Scholar, IIT Bombay It was my first trip to the US. It had not yet sunk in that I had been chosen by ACM India as one of two Ph.D. students from India to attend the big ACM Turing Centenary Celebration in San Francisco until I saw the familiar face of Stephen Cook enter a room in the hotel a short distance from mine; later, Moshe Vardi recognized me from his trip to IITB during FSTTCS, 2011. I recognized Nitin Saurabh from IMSc Chennai, the other student chosen by ACM-India; 11 ACM SIG©s had sponsored students and there were about 75 from all over the world. Registration started at 8am on 15th June, along with breakfast. Collecting my ©Student Scholar© badge and stuffing in some food, I entered a large hall with several hundred seats, a brightly lit podium with a large screen in the middle flanked by two others. The program began with a video giving a brief biography of Alan Turing from his boyhood to the dynamic young man who was to change the world forever. There were inaugural speeches by John White, CEO of ACM, and Vint Cerf, the 2004 Turing Award winner and incoming ACM President. The MC for the event, Paul Saffo, took over and the panel discussions and speeches commenced. A live Twitter feed made it possible for people in the audience and elsewhere to post questions/comments which were actually taken up in the discussions. Of the many sessions that took place in the next two days, I will describe three that I found most interesting.
    [Show full text]
  • Desktop Publishing Pioneer Meeting: Day 1 Session 4 - Technology in the 1980S
    Desktop Publishing Pioneer Meeting: Day 1 Session 4 - Technology in the 1980s Moderators by: Burt Grad David C. Brock Editor: Cheryl Baltes Recorded May 22, 2017 Mountain View, CA CHM Reference number: X8209.2017 © 2017 Computer History Museum Table of Contents TEX TECHNOLOGY .................................................................................................................. 5 FRAMEMAKER TECHNOLOGY ................................................................................................ 7 EARLY POSTSCRIPT DEVELOPMENT EFFORTS .................................................................11 POSTSCRIPT AND FONT TECHNOLOGY ..............................................................................12 COMMERCIAL POSTSCRIPT ..................................................................................................15 POSTSCRIPT VS. OTHER APPROACHES .............................................................................20 POSTSCRIPT, APPLE, AND ADOBE .......................................................................................22 HALF TONING AND POSTSCRIPT ..........................................................................................24 ADOBE ILLUSTRATOR TECHNOLOGY ..................................................................................25 LASERWRITER TECHNOLOGY ..............................................................................................26 FONT SELECTION ...................................................................................................................27
    [Show full text]
  • Jonathan Zittrain's “The Future of the Internet: and How to Stop
    The Future of the Internet and How to Stop It The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Jonathan L. Zittrain, The Future of the Internet -- And How to Stop It (Yale University Press & Penguin UK 2008). Published Version http://futureoftheinternet.org/ Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:4455262 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA YD8852.i-x 1/20/09 1:59 PM Page i The Future of the Internet— And How to Stop It YD8852.i-x 1/20/09 1:59 PM Page ii YD8852.i-x 1/20/09 1:59 PM Page iii The Future of the Internet And How to Stop It Jonathan Zittrain With a New Foreword by Lawrence Lessig and a New Preface by the Author Yale University Press New Haven & London YD8852.i-x 1/20/09 1:59 PM Page iv A Caravan book. For more information, visit www.caravanbooks.org. The cover was designed by Ivo van der Ent, based on his winning entry of an open competition at www.worth1000.com. Copyright © 2008 by Jonathan Zittrain. All rights reserved. Preface to the Paperback Edition copyright © Jonathan Zittrain 2008. Subject to the exception immediately following, this book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S.
    [Show full text]
  • Two Facets of Authentication
    SRC Technical Note 1998 - 007 March 18, 1998 Two Facets of Authentication Mart´ın Abadi d i g i t a l Systems Research Center 130 Lytton Avenue Palo Alto, California 94301 http://www.research.digital.com/SRC/ Copyright c IEEE 1998. All rights reserved. Republished by permission. Two Facets of Authentication Mart´ın Abadi Digital Equipment Corporation Systems Research Center [email protected] March 18, 1998 Abstract Authentication can serve both for assigning responsibility and for giving credit. Some authentication protocols are adequate for one pur- pose but not the other. This paper explains the distinction between responsibility and credit, through several examples, and discusses the role of this distinction in the design and analysis of protocols. Contents 1 Responsibility and Credit 1 2FourExamples 2 2.1SigningaPublicKey....................... 2 2.2EncryptingaSessionKey.................... 4 2.3 Making a Session Key from Encrypted Shares . 5 2.4TheStation-to-StationProtocol................. 7 3 Discussion 8 3.1Design............................... 8 3.2Analysis.............................. 9 Acknowledgements 10 References 11 1 Responsibility and Credit Authentication can serve both for assigning responsibility and for giving credit. An “authenticated” message M from a principal A toaprincipalB may be used in at least two distinct ways: • B may believe that the message M is being supported by A’s authority. For example, suppose that B is a file server, A a client, and M a request to delete a file f.ThenBmay use A’s identity as an argument to the access control decision of whether to delete f. • B may attribute credit for the message M to A. For example, suppose that B is running a contest, offering a prize to the principal that mails the factors for a large number.
    [Show full text]
  • Alan Mathison Turing and the Turing Award Winners
    Alan Turing and the Turing Award Winners A Short Journey Through the History of Computer TítuloScience do capítulo Luis Lamb, 22 June 2012 Slides by Luis C. Lamb Alan Mathison Turing A.M. Turing, 1951 Turing by Stephen Kettle, 2007 by Slides by Luis C. Lamb Assumptions • I assume knowlege of Computing as a Science. • I shall not talk about computing before Turing: Leibniz, Babbage, Boole, Gödel... • I shall not detail theorems or algorithms. • I shall apologize for omissions at the end of this presentation. • Comprehensive information about Turing can be found at http://www.mathcomp.leeds.ac.uk/turing2012/ • The full version of this talk is available upon request. Slides by Luis C. Lamb Alan Mathison Turing § Born 23 June 1912: 2 Warrington Crescent, Maida Vale, London W9 Google maps Slides by Luis C. Lamb Alan Mathison Turing: short biography • 1922: Attends Hazlehurst Preparatory School • ’26: Sherborne School Dorset • ’31: King’s College Cambridge, Maths (graduates in ‘34). • ’35: Elected to Fellowship of King’s College Cambridge • ’36: Publishes “On Computable Numbers, with an Application to the Entscheindungsproblem”, Journal of the London Math. Soc. • ’38: PhD Princeton (viva on 21 June) : “Systems of Logic Based on Ordinals”, supervised by Alonzo Church. • Letter to Philipp Hall: “I hope Hitler will not have invaded England before I come back.” • ’39 Joins Bletchley Park: designs the “Bombe”. • ’40: First Bombes are fully operational • ’41: Breaks the German Naval Enigma. • ’42-44: Several contibutions to war effort on codebreaking; secure speech devices; computing. • ’45: Automatic Computing Engine (ACE) Computer. Slides by Luis C.
    [Show full text]
  • Hints and Principles for Computer System Design Butler Lampson August 13, 2020
    Hints and Principles for Computer System Design Butler Lampson August 13, 2020 Abstract This new long version of my 1983 paper suggests the goals you might have for your system— Simple, Timely, Efficient, Adaptable, Dependable, Yummy (STEADY)—and techniques for achieving them—Approximate, Incremental, Divide & Conquer (AID). It also gives some princi- ples for system design that are more than just hints, and many examples of how to apply the ideas. Table of Contents 1. Introduction 3 1.1 Oppositions and slogans 5 2. Principles 6 2.1 Abstraction 6 2.1.1 Safety and liveness 8 2.1.2 Operations 9 2.2 Writing a spec 9 2.2.1 Leaky specs and bad specs 11 2.2.2 Executable specs 13 2.3 Writing the code: Correctness 13 2.3.1 Types 15 2.3.2 Languages 16 2.4 Modules and interfaces 16 2.4.1 Classes and objects 17 2.4.2 Layers and platforms 19 2.4.3 Components 20 2.4.4 Open systems 21 2.4.5 Robustness 22 2.4.6 Standards 22 2.5 Points of view 23 2.5.1 Notation 23 3. Goals and Techniques 25 3.1 Overview 25 3.1.1 Goals 25 3.1.2 Techniques 25 3.2 Simple 26 3.2.1 Do one thing well 27 3.2.2 Brute force 29 3.2.3 Reduction 29 3.3 Timely 30 3.4 Efficient 30 3.4.1 Before the ABCs 31 3.4.2 Algorithms 36 3.4.3 Approximate 37 3.4.4 Batch 41 1 3.4.5 Cache 42 3.4.6 Concurrency 44 3.5 Adaptable 49 3.5.1 Scaling 50 3.5.2 Inflection points 51 3.6 Dependable 53 3.6.1 Correctness 54 3.6.2 Retry 55 3.6.3 Replication 56 3.6.4 Detecting failures: real time 58 3.6.5 Recovery and repair 59 3.6.6 Transactions 59 3.6.7 Security 60 3.7 Yummy 63 3.7.1 User interfaces 63 3.8 Incremental 65 3.8.1 Being and becoming 65 3.8.2 Indirection 69 4.
    [Show full text]
  • 19788 NAE Bridge V33n1
    Spring 2003 The BRIDGE LINKING ENGINEERING AND SOCIETY Computing Meets the Physical World Butler Lampson Autonomous Robot Soccer Teams Manuela Veloso Flying with Animals Part One: Linking Artificial Information-Processing Machines and Living Information-Processing Machines Chris Diorio Part Two: Interfacing Computer Electronics with Biology Thomas Daniel Entering the Brain: New Tools for Precision Surgery Eric Grimson Promoting the technological welfare of the nation by marshalling the knowledge and insights of eminent members of the engineering profession. The BRIDGE NATIONAL ACADEMY OF ENGINEERING George M.C. Fisher, Chair Wm. A. Wulf, President Sheila E. Widnall, Vice President W. Dale Compton, Home Secretary Harold K. Forsen, Foreign Secretary William L. Friend, Treasurer Editor-in-Chief George Bugliarello (Interim) Managing Editor: Carol R. Arenberg Production Assistants: Penelope Gibbs, Kimberly West The Bridge (USPS 551-240) is published quarterly by the National Academy of Engineering, 2101 Constitution Avenue, N.W., Washington, DC 20418. Periodicals postage paid at Washington, D.C. Vol. 33, No. 1 Spring 2003 Postmaster: Send address changes to The Bridge, 2101 Constitution Avenue, N.W., Washington, DC 20418. Papers are presented in The Bridge on the basis of general interest and time- liness. They reflect the views of the authors and not necessarily the position of the National Academy of Engineering. The Bridge is printed on recycled paper. © 2003 by the National Academy of Sciences. All rights reserved. A complete copy of each issue of The Bridge is available in PDF format at http://www.nae.edu/TheBridge. Some of the articles in this issue are also available as HTML documents and may contain links to related sources of information, multimedia files, or other content.
    [Show full text]
  • Vision and Reality of Hypertext and Graphical User Interfaces
    Universität Hamburg Fachbereich Informatik Vogt-Kölln-Str. 30 D-22527 Hamburg Germany Bericht 237 Vision and Reality of Hypertext and Graphical User Interfaces FBI-HH-B-237/02 Matthias Müller-Prove [email protected] In die Reihe der Berichte des Fachbereichs Informatik aufgenommen durch Prof. Dr. Horst Oberquelle Prof. Dr. Christopher Habel Februar 2002 Abstract The World Wide Web took off ten years ago. Its tremendous success makes it easy to forget the more than forty years of hypertext development that preceded the Web. Similarly, modern graphical user interfaces have drawn attention away from the many compelling ideas behind earlier user interface designs. In the present thesis, numerous early hypertext and graphical user interface systems are presented and contrasted with today's Web and desktop interfaces. The designers of early hypertext and graphical user interface systems shared a common objective: the development of a personal dynamic medium for creative thought. Not very much is left from this original vision. Retrospect reveals promising insights that might help to reconcile the desktop environment with the Web in order to design a consistent and powerful way to interact with the computer. Zusammenfassung Das World Wide Web hat vor nunmehr über zehn Jahren seinen unvergleichlichen Siegeszug begonnen. Dabei wird oft übersehen, daß die Idee des Hypertexts eine bereits über vierzigjährige Geschichte hinter sich hat. Die Arbeit zeigt diese Entwicklung anhand der verschiedenen Hypertextsysteme auf und kontrastiert sie mit dem Web. Die Betrachtung der Grafischen Benutzungsoberflächen zeigt ganz ähnlich, daß auch hier viele gute Ideen auf dem Wege zu den heute dominierenden Fenstersystemen verloren gegangen sind.
    [Show full text]