An Incomplete History of Microcomputing

Total Page:16

File Type:pdf, Size:1020Kb

An Incomplete History of Microcomputing l - - - - - w ' w ' ww - - - - AN - a- 5 =- - - INCOMPLETE ^ v ^ - - i HISTORY OF - - vv a cars MICROCOMPUTING ^ r v wssw v s F - by Rory Donaldson 3000 B.C. 1820 1890 The abacus is developed in Babylonia. The Arithmometer, the first com- The first automated U.S. census is mercial calculator. tabulated on the Hollerith Tabulating 1400 Machine. Because of the extra reports Moslem astronomers understand the 1831 that this automaton is able to gen- mathematical use of zero. Michael Faraday builds the first electric erate, the census costs nearly twice as generator. much as projected, creating a contro- I SOOs versy about the benefits of automation Geneva becomes the world's center 1837 that continues to this day. for the mother of all machines, Samuel Morse and Alfred Vail develop the clock. a simple way to send a signal to a 1893 distant receiver. Their invention is The Millionaire, the first efficient four- 1600 called the telegraph. function calculator, hits the market. Galileo brings together the exper- iential and mathematical into a single 1854 1900-1910 stream of inquiry that leads to the English mathematician George Boole Mechanical calculators become scientific method. creates Boolean Algebra and lays the commonplace. groundwork for information theory. 1623 1903 The Schickard mechanical calculator. 1855 _ Nikola Tesa patents electrical logic G. E. Scheutz builds the first practical circuits called gao or switches. 1630 mechanical computer. The slide rule. 1924 1862 _ IBM founded. 1652 Charles Babbage's difference and ana- The Pascal calculator relieves lytical engines promise steam-driven 1921 the tedium of adding long columns machines that will mechanize thought. The cathode ray tube (CRT). of numbers. He draws thousands of detailed draw- ings that project the fundamentals on 1 936 1673 which today's computers operate. Alan Turing describes the very Idea of The Leibnitz calculator, the first digital 0 a universal machine, the Turing Machine, machine, can multiply, add, divide, Augusta Ada. Countess of Lovelace. in a paper tited, "On Computable subtract. the first computer software genius, Numbers with an Application to the programs Babbage's engine and un- Entscheidungsproblem." Early IlOOs derstands the power of simulating Hans Christian Oersted discovers that a generalized machine that wil do your - ____ 1937 electricity in motion creates a mag- bidding. The engine is so mechanically Atanasoff formulates the principles of netic field that can be converted to complex that It Is unable to overcome the first electronic digital calculator, mechanical energy. Up to this point, its own friction and never actually Including the use of base-2, binary, on- electricity has had no practical use works, but the concept is in place. off, or "digital" signals. He builds the other than generating heat. world's first working model of the electronic digital computer. In 1973 a · . ___ 1801 _, 1875 U.S. district court recognizes Atanasoff Joseph Marie Jacquard invents the Frank Baldwin opens the first Amer- a the official Inventor of the computer. punch-card-operated loom, creating a ican calculator shop. model for future punch-card-operated computers. 1886 _____ William Burroughs develops the first successful mechanical adding machine. 116 WHOLE EARTH REVIEW SPRING 1987 -2g7 II I II 1938 __ 191 -1963 _ Konrad Zuse finishes his ZI. the first Univac, the first commercially available The first portable electronic calculator binary calculating machine. computer, is constructed by Remington is introduced by the Bell Punch Co. Rand for the U.S. Bureau of Census. 1941 0 The Zuse 3 Isthe first electro- 1964 _____ Grace Hopper conceives of a program The first criminally prosecuted mechanical general-purpose program compu- known as a compiler. ter crime. Texas controlled calculator. Hancock is sentenced to five years for pirating $5 million - 1956 worth of his employer's software. 1943 With the help of Marvin Minsky, John The IBM Mark 1,the first electronic McCarthy, an assistant professor at The digital computer to use mechanical first personal computer (PC), the Dartmouth College. coins the phrase relays. Linc. It costs $40,000, has a personal v *, Artifcial Intelligence (A). filing system, keyboard, interactive The U.S. Army appropriates $61,700 display, and is "transportable." to build ENIAC, the first productive 1958_ IBM estimates that electronic-digital computer (no relays). five large computers Douglas Engelbart of the Stanford are al that will be needed to satisfy all Research Institute develops the first 1945 of the world's data processing require- Mouse. It is pretty much Ignored until While working on the Mark I, Grace ments. IBM passes up the chance to 1983, when Apple's Lisa is introduced. Hopper discovers the first computer purchase a small company that has just bug, crushed in a relay. She goes on developed a process known as Xero- Dartmouth BASIC (Beginner's All- to begin the world's first program- graphy. discounting the technology purpose Symbolic Instruction Code) ming career. as "unimportant." is developed by Kemeny and Kirk in order to give students access to big Vannear Bush describes the first per- " 1959 computers with only a semester sonal computer n an artkle. "As We The IBM RAMAC, the first disk-based or two of study. May Think," in Atlantic Monthly maga- computer of consequence, uses disk zine. What Bush has in mind b a mini- platters four feet in diameter. 1967 ature machine called the memex - Alan Kay and Ed Cheadle develop the memory extender - consisting of a Grace Hopper develops the compiler. FLEX computer with multiple windows desk, screens, keyboards, levers, that and graphics. It proves too difficult would act as a calculator, word pro- 1960 to use and leads Kay to describe the cessor, picture editor, and filer. J.C. R. Licklider formulates the goal Dynabook: a computer for under of interactive computing In his paper $1,000 that would satisfy the most 1946 "Man-Computer Symbiosis." Inter- demanding of computer users: children. Mauchly and Eckert finish ENIAC and active computing implies a continuous Kay realizes that the technology just turn it on on February 13.Budgeted dialog between user and system, as op- isn't there to successfully develop at $61,700 three years earlier. ENIAC posed to batch processing where data his machine. ends up costing $486,804. The machine is accumulated over a period of time was designed to compute the trajectory and then submitted without any inter- 1968 of artillery shels during World War II, vening response from the receiving unit. The Hal computer mutinies in 2001: but the war ends before the system can A Space Odyssey. be put to use. It is then used running Project Multiple Access Computing feasibility studies for the development (MAC) explores Interactive time- 1969 _ of the hydrogen bomb. sharing computing at MIT. Ted Hoff of Intel introduces a new era ENIAC weighs 30 tons and contains in integrated electronics: the 4004 70,000 resistors, 18,000 vacuum tubes, 1961 microprocessor. This is the universal 3,000 neon bulbs, and 500,000 sol- Robert Noyce of Intel and Jack Kirby engine, a general-purpose, program- dered joints. of Texas Instruments solve the most mable combination of all the elements important engineering problem of of a computer on a single chip of silicon. John von Neumann builds the logical their time: how to integrate all the The 4004 is able to address 4K of framework for a generalized program- components of an electronic circuit RAM and perform 60,000 instructions mable machine: a central processor, a onto a single flake of silicon. An In- a second. memory, an arithmetic unit, Input/ tegrated circuit (IC)replaces thousands output devices, operating In a step- of transistors with a single silicon chip. Kenneth Thompson of Bell Labs writes by-step manner. ICs go on the market for $120 each. the first version of UNIX for the DEC PDP-7 minicomputer, unleashing the The EDVAC computer Is able to The IBM 360, the first programmable essence of communal computing: switch between different programs. computer. remote access and time sharing. 19,47 _ -------- 1962 _ 1970 _ Bell Labs invents the transistor, allow- Spacewar, the first interactive com- Stanford develops the Mycin inference ing huge amounts of information to be puter game, is written by Steve Russell engine, the first expert system, dedi- handled by very small, inexpensive, while a student at MIT. cated to diagnosing blood infections. cool devices that replace thousands continued of vacuum tubes. Sketchpad, the first interactive graphics program, is designed by Ivan Sutherland. 1950 Alan Turing proposes the classic test of machine ntelligence In a paper titled Computer Machinery and Intelligence: "A machine may be deemed Intelligent when it can pass for a human being in a blind test." gff 27 GATEFIVE ROAD SAUSALITO CA 94965 117 - I 1971 - 1975 1981 Journalist Don Honler refers to a The January Popular Electronics has Kenji Urada 37, is run over by a robot 100-square-mile valley southeast of San as Its cover story the eight-bit Altair he's working on and becomes the first Francisco as "Silicon Valley" because micro kit using the Intel 8080 - thou- robot fatality. of all the high-tech industry. So long sands of micro hobbyists receive the plums, prunes, pears. subliminal signal that the era of per- Adam Osborne releases the Osborne I sonal computing has finally arrived. computer: a 24-pound, luggable com- Eectronic News publishes the first ad At last there is a machine powerful plete system bundled with 64K RAM, for a microchip, the 4004. For the enough to write software for. monitor and keyboard, two disk drives, first time the public is let in. a serial and parallel port, WordStar, The Homebrew Computer Club (the MailMerge, SuperCalc, CP/M and BA- The Kenbak-l PC, the first commer- first micro user's group) is founded in SIC - all for the unprecedented price cially available PC.
Recommended publications
  • Exploring Users' Perceptions and Expectations of Security
    Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites Dominik Wermke, Nicolas Huaman, Christian Stransky, Niklas Busch, Yasemin Acar, and Sascha Fahl, Leibniz University Hannover https://www.usenix.org/conference/soups2020/presentation/wermke This paper is included in the Proceedings of the Sixteenth Symposium on Usable Privacy and Security. August 10–11, 2020 978-1-939133-16-8 Open access to the Proceedings of the Sixteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites Dominik Wermke Nicolas Huaman Christian Stransky Leibniz University Hannover Leibniz University Hannover Leibniz University Hannover Niklas Busch Yasemin Acar Sascha Fahl Leibniz University Hannover Leibniz University Hannover Leibniz University Hannover Abstract respective systems. These dedicated office tools helped the Cloud Office suites such as Google Docs or Microsoft Office adoption of personal computers over more dedicated or me- 365 are widely used and introduce security and privacy risks chanical systems for word processing. In recent years, another to documents and sensitive user information. Users may not major shift is happening in the world of office applications. know how, where and by whom their documents are accessible With Microsoft Office 365, Google Drive, and projects like and stored, and it is currently unclear how they understand and LibreOffice Online, most major office suites have moved to mitigate risks. We conduct surveys with 200 cloud office users provide some sort of cloud platform that allows for collabo- from the U.S.
    [Show full text]
  • Paradise Lost , Book III, Line 18
    _Paradise Lost_, book III, line 18 %%%%%%%%%%%%%%%%%%%%%%%% ++++++++++Hacker's Encyclopedia++++++++ ===========by Logik Bomb (FOA)======== <http://www.xmission.com/~ryder/hack.html> ---------------(1997- Revised Second Edition)-------- ##################V2.5################## %%%%%%%%%%%%%%%%%%%%%%%% "[W]atch where you go once you have entered here, and to whom you turn! Do not be misled by that wide and easy passage!" And my Guide [said] to him: "That is not your concern; it is his fate to enter every door. This has been willed where what is willed must be, and is not yours to question. Say no more." -Dante Alighieri _The Inferno_, 1321 Translated by John Ciardi Acknowledgments ---------------------------- Dedicated to all those who disseminate information, forbidden or otherwise. Also, I should note that a few of these entries are taken from "A Complete List of Hacker Slang and Other Things," Version 1C, by Casual, Bloodwing and Crusader; this doc started out as an unofficial update. However, I've updated, altered, expanded, re-written and otherwise torn apart the original document, so I'd be surprised if you could find any vestiges of the original file left. I think the list is very informative; it came out in 1990, though, which makes it somewhat outdated. I also got a lot of information from the works listed in my bibliography, (it's at the end, after all the quotes) as well as many miscellaneous back issues of such e-zines as _Cheap Truth _, _40Hex_, the _LOD/H Technical Journals_ and _Phrack Magazine_; and print magazines such as _Internet Underground_, _Macworld_, _Mondo 2000_, _Newsweek_, _2600: The Hacker Quarterly_, _U.S. News & World Report_, _Time_, and _Wired_; in addition to various people I've consulted.
    [Show full text]
  • The Origins of Word Processing and Office Automation
    Remembering the Office of the Future: The Origins of Word Processing and Office Automation Thomas Haigh University of Wisconsin Word processing entered the American office in 1970 as an idea about reorganizing typists, but its meaning soon shifted to describe computerized text editing. The designers of word processing systems combined existing technologies to exploit the falling costs of interactive computing, creating a new business quite separate from the emerging world of the personal computer. Most people first experienced word processing using a word processor, we think of a software as an application of the personal computer. package, such as Microsoft Word. However, in During the 1980s, word processing rivaled and the early 1970s, when the idea of word process- eventually overtook spreadsheet creation as the ing first gained prominence, it referred to a new most widespread business application for per- way of organizing work: an ideal of centralizing sonal computers.1 By the end of that decade, the typing and transcription in the hands of spe- typewriter had been banished to the corner of cialists equipped with technologies such as auto- most offices, used only to fill out forms and matic typewriters. The word processing concept address envelopes. By the early 1990s, high-qual- was promoted by IBM to present its typewriter ity printers and powerful personal computers and dictating machine division as a comple- were a fixture in middle-class American house- ment to its “data processing” business. Within holds. Email, which emerged as another key the word processing center, automatic typewriters application for personal computers with the and dictating machines were rechristened word spread of the Internet in the mid-1990s, essen- processing machines, to be operated by word tially extended word processing technology to processing operators rather than secretaries or electronic message transmission.
    [Show full text]
  • Published In: Encyclopedia of Library and Information Science, Vol. 49 (New York: Dekker, 1992), Pp
    Published in: Encyclopedia of Library and Information Science, vol. 49 (New York: Dekker, 1992), pp. 268-78 Author’s address: [email protected] WORD PROCESSING (HISTORY OF). Definition. The term and concept of “word processing” are by now so widely used that most readers will be already familiar with them. The term, created on the model of “data processing,” is more vague than commonly believed. A human editor, for example, obviously pro- cesses words, but is not what is meant by a “word proces- sor.” A number of software programs process words in one way or another--a concordance or indexing program, for example--but are not understood to be word processing programs.’ The term “word processor” means a facility that records keystrokes from a typewriter-like keyboard, and prints the output onto paper in a separate operation. In the meantime the data is stored, usually in memory or mag- netic media. A word processor also can make improve- ments in the stream of words before they are printed. At their most basic these include the ability to arrange words into lines. An “editor,” such as the infamous EDLINE distributed with the Microsoft Disk Operating System (MS-DOS), lacks the ability to structure lines. Commonly a word processor is understood to be a software program, and in the 1980s and 1990s it usually meant a program written for a microcomputer. However, preceding this period and continuing through it there have been hardware word processors. These are pieces of equip- ment sold for the sole purpose of word processing, con- taining in one package a keyboard, printer, recording and playback device, and in all recent examples a video or liquid crystal display screen.
    [Show full text]
  • Instructions to the Students: Outlines: Understanding Word Processing Program
    Karary University – Dr. Abdeldime Mohamed Salih – Lecture Note College of Medicine Lecture Two Title: Dealing With Word Processing Programs Instructions to the Students: By the end of this lecture readers will be familiar with Microsoft word usages. Before start: You need to use your own computer to practice the following skills The following note is prepared to understanding how to deal with the computer in general. Further information can be found at the reference given in the content of the subject. Also you can find more information in the internet. The content is prepared in such way that suits the pharmacy college students to help them dealing with Microsoft word. Also you contact the instructor in his office any time between 12:00 to 2:00 Word processing programs are constantly evolving. Try to keep as up-to-date as possible by reading computer-related news, blogs, RSS feeds, newsletters, forums, and following computer people on social networking sites. Micrsoft word is a very good tool for word processing and editing documents and has many properties that would help and you need to practice, practice, and practice! Outlines: 1. Understanding word processing Program 2. Word Processing Programs 3. Microsoft word 4. Some tips for saving time when using Microsoft word 5. Some exercises Understanding word processing Program In the past, the word processor was a device that provides for formatting and output of text, often with some additional features. Early word processors were stand-alone devices dedicated to this function, but current word processors are word processor programs running on general purpose computers to input, editing, formatting text.
    [Show full text]
  • Steve Wozniak
    Steve Wozniak. http://www.woz.org http://en.wikipedia.org/wiki/Steve_Wozniak http://en.wikipedia.org/wiki/Blue_box http://en.wikipedia.org/wiki/Apple_computer Steve Wozniak’s patent: Microcomputer for use with video display. Apple 1 manual. Apple 1 manual (PDF). http://apple2history.org/ http://www.digibarn.com/ http://www.macmothership.com/ http://www.multimedialab.be http://www.mast-r.org Wozniak’s early inspirations came from his father Jerry who was a Loc- kheed engineer, and from a fictional wonder-boy: Tom Swift. His father infected him with fascination for electronics and would often check over young Woz’s creations. Tom Swift, on the other hand, was for Woz an epitome of creative freedom, scientific knowledge, and the ability to find solutions to problems. Tom Swift would also attractively illustrate the big awards that await the inventor. To this day, Wozniak returns to Tom Swift books and reads them to his own kids as a form of inspiration. John Draper explained to Wozniak the Blue Box, a device with which one could (mis)use the telephone system by emulating pulses (i.e. phone phreaking). Although Draper instructed Woz not to produce and especially not sell the gadgets on account of the possibility of being discovered, Wo- zniak built and sold Blue Boxes for $150 a piece. Wozniak met Steve Jobs while working a summer job at HP, and they began selling blue boxes to- gether. Many of the purchasers of their blue boxes were in fact discovered and sure enough John Draper was linked to their use. 1975. By 1975, Woz dropped out of the University of California, Berkeley (he would later finish his degree in 1987) and came up with a computer that eventually became successful nationwide.
    [Show full text]
  • A History of the Personal Computer Index/11
    A History of the Personal Computer 6100 CPU. See Intersil Index 6501 and 6502 microprocessor. See MOS Legend: Chap.#/Page# of Chap. 6502 BASIC. See Microsoft/Prog. Languages -- Numerals -- 7000 copier. See Xerox/Misc. 3 E-Z Pieces software, 13/20 8000 microprocessors. See 3-Plus-1 software. See Intel/Microprocessors Commodore 8010 “Star” Information 3Com Corporation, 12/15, System. See Xerox/Comp. 12/27, 16/17, 17/18, 17/20 8080 and 8086 BASIC. See 3M company, 17/5, 17/22 Microsoft/Prog. Languages 3P+S board. See Processor 8514/A standard, 20/6 Technology 9700 laser printing system. 4K BASIC. See Microsoft/Prog. See Xerox/Misc. Languages 16032 and 32032 micro/p. See 4th Dimension. See ACI National Semiconductor 8/16 magazine, 18/5 65802 and 65816 micro/p. See 8/16-Central, 18/5 Western Design Center 8K BASIC. See Microsoft/Prog. 68000 series of micro/p. See Languages Motorola 20SC hard drive. See Apple 80000 series of micro/p. See Computer/Accessories Intel/Microprocessors 64 computer. See Commodore 88000 micro/p. See Motorola 80 Microcomputing magazine, 18/4 --A-- 80-103A modem. See Hayes A Programming lang. See APL 86-DOS. See Seattle Computer A+ magazine, 18/5 128EX/2 computer. See Video A.P.P.L.E. (Apple Pugetsound Technology Program Library Exchange) 386i personal computer. See user group, 18/4, 19/17 Sun Microsystems Call-A.P.P.L.E. magazine, 432 microprocessor. See 18/4 Intel/Microprocessors A2-Central newsletter, 18/5 603/4 Electronic Multiplier. Abacus magazine, 18/8 See IBM/Computer (mainframe) ABC (Atanasoff-Berry 660 computer.
    [Show full text]
  • Joseph Migga Kizza Fourth Edition
    Computer Communications and Networks Joseph Migga Kizza Guide to Computer Network Security Fourth Edition Computer Communications and Networks Series editor A.J. Sammes Centre for Forensic Computing Cranfield University, Shrivenham Campus Swindon, UK The Computer Communications and Networks series is a range of textbooks, monographs and handbooks. It sets out to provide students, researchers, and nonspecialists alike with a sure grounding in current knowledge, together with comprehensible access to the latest developments in computer communications and networking. Emphasis is placed on clear and explanatory styles that support a tutorial approach, so that even the most complex of topics is presented in a lucid and intelligible manner. More information about this series at http://www.springer.com/series/4198 Joseph Migga Kizza Guide to Computer Network Security Fourth Edition Joseph Migga Kizza University of Tennessee Chattanooga, TN, USA ISSN 1617-7975 ISSN 2197-8433 (electronic) Computer Communications and Networks ISBN 978-3-319-55605-5 ISBN 978-3-319-55606-2 (eBook) DOI 10.1007/978-3-319-55606-2 Library of Congress Control Number: 2017939601 # Springer-Verlag London 2009, 2013, 2015 # Springer International Publishing AG 2017 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc.
    [Show full text]
  • UTILITIES PRINT Mp 1117 17511Y~R1 T SERIAI MT N IT,11
    11 48784 $2.50 U.S. $2.95 CANADA FEBRUARY 1 ?88 THE MAGAZINE FOR THE ELECTRONICS ACTIVIST! The _ )0. Power Play ON ! Two power supplies in one 410 OFF NE ; case with digital readout G for voltage or current. SIDEC um.- NI PIS1110 ERI 11.11 UI/. 711KIS2 PIP :Ia 11 U.rr Isles (OPIMI (On 25717 2101111 1,1t.. INt PICT SPL I I/N/ MII71 kort .,Ad EDITOR p1 177721 11151111101 1.lrt tOt1 L«l;l lit NERI MI 7175 Atli SPL 7772 LONG AL? 191577 A. UTILITIES PRINT mP 1117 17511y~r1 t SERIAI MT N IT,11. bytes ..r1 Put your home computer SPELL Vol 22172 455768 19t.. fetal STARVI I17 112 TIOVE-1 11 IIIIS ...Niel 1. ... 1 .K/TREE YEK 725152 11 3M TIMIIIY011 Ldlri1 in We cover . LETTERS overdrive! POI /PIOC 11.,1.1 - 0111 041 22711 ÈUQIOIE REPLIES 1:16.. GOV.. ACTION the most powerful PERSONAL Ente cow I TYP. I C... =PMdEwa MI ht. I T. - SHIERS ,r packages available. - C rat 110. C. - OUI, Auno - 11(0115 Plus - INDUCTANCE BRIDGE 11.1 V1[ Unknown Ls to Henrys (..1_.u1..I01l.I lrt 1.. Set 11J V1. S..<1.1 Prut fete 0.01 T1 .r.M..l Doi On /rot. (.M ti01 it Prr..ltuY.N lee .. IF". WIND WITCHER .r <t1. <.y.l4l. pot. Tl.. 0.01 1..1yI.M 1!... ..I.tN .1t1 t011 ..1 011ry ,01 r1 .<1.,t .Y 1r 01 11 It tinkles without motion Ir (.L. 2747,1,11 15,27113,01 27,/Y21M4 274141,1 27,71444 DISH POSITIONER 27045,144 2704(711,1 1111 r TVRO remote move -it plans w.1I.,r4 .r.
    [Show full text]
  • Newword — the Other Wordprocessor∗
    Newword — the other wordprocessor∗ John R Hudson No, not the B word, nor even the T word, but Newword, the second wordprocessor after Tasword to appear for the CPC, albeit only the 128K machines. Newword was written by the authors of WordStar after they fell out with the company over the future direction of WordStar. WordStar was the second microcomputer wordprocessor — the Electric Pencil was the first — and, by the time I came across WordStar in 1980, it was being compared favourably with leading minicomputer wordprocessors. These were largely used in typing pools where an IBM golfball typewriter was considered state of the art. So WordStar was written with such typists in mind as well as the limitations of early microcomputer keyboards — just a typewriter keyboard plus control, escape and line feed. I used WordStar for over six years on an RML 380Z with two 8” double-sided disc drives — each side being treated as a separate 128K drive. WordStar overcame the memory and disc drive limitations of the early microcomputers in several ways. It only loaded the core functions into RAM, calling the remaining ones from disc as needed, and, as soon as a document became too long to be held in RAM, it used a technique now called ‘virtual RAM’, saving parts of the file to disc. You could alternate saves between drives, which made it appear I was using a 256K drive, and you could chain long documents across discs. In an attempt to break away from the limitations of classic WordStar on PCs, the company launched WordStar 2000 which sank almost without trace but caused the original authors to leave and produce Newword.
    [Show full text]
  • Chapter 7 Cognitive Technologies for Writing
    In E.Z Rothkopf (~d.) Review of Research in Education 14, 1987. Washington, D.C.: AERA, 1987., pp. 277-327. Chapter 7 Cognitive Technologies for Writing ROY D. PEA New York University Laboratory for Advanced Research in Educational Technologies and D. MlDlAN KURLAND Bank Street College Media Group Ludwig Wittgenstein: It is only the attempt to write down your ideas that enables them to develop (Drury, 1982). INTRODUCTION Current technologies are useful for improving the productivity and appear- ance of writing. However, with several notable exceptions, they neither offer qualitative advances over previous tools in helping mature writers express or refine their thoughts, nor help novices develop better writing skills. We pro- pose that writing tools contribute indirectly to writing development (e.g., by encouraging more writing) when they should provide direct support, in ways to be described. At the same time, an exciting new cognitive-developmental perspective on Support for writing an earlier draft of this chapter was provided by a grant from the Alfred P. Sloan Foundation (No. B1983-25). We wish to thank the participants of the September 21- 23. 1983, workshop at Bank Street College, entitled Applying Cognitive Science to Cognitive Technologiesfor Writing Development. for provocative discussion of these issues, and for of- fering their experience and insights on the topics we highlight. The manuscript was revised and updated through March 1986. We are especially grateful to Carl Bereiter. Robert Bracewell, Bertram Bruce. Jerome Bruner. Kenneth Burke, Cynthia Char. Peter Elbow, Linda Flower. Lawrence Frase. Carl Frederiksen. Howard Gardner, Jan Hawkins. John Hayes. David Kaufer, James Levin.
    [Show full text]
  • Jims Virtual World
    December 21, 2010, VOLUME 1, ISSUE 20 JIMS VIRTUAL WORLD A NEWSLETTER BY THE DEPARTMENT OF INFORMATION TECHNOLOGY VoIP: The Modern day Phone Phreaking Phone Phreaking was a rage during the 1950s - John Draper better known as Captain Crunch used to hack into tele- phone lines to make long distance calls. In today’s world, we use VoIP supported applications but during the early days of phone hacking, there was the Blue Box. The most famous ex phone phreaks were Steve Jobs and Steve Wozniak during their college days. In an old interview, Steve Wozniak stated that once they both had nearly been arrested for using it but they got away when they explained to the police officer that, “It is a music calibration tool.” Phone Phreaking was the first form of hacking; automated machines replaced manual phone exchanges and these automated machines used certain pitches of sound to connect the calls. By the use of the Blue Box, these audio signals were bypassed just as VoIP today uses digital signals to bypass the audio signals. The Blue Box was a legal and monetary complication for the telecom industry with AT&T taking stern action against all the Phone Phreakers. Captain Crunch and many other pioneers and users of this technology were arrested and prosecuted for stealing from the telephone company. Not too different from today’s scenario, the Indian Government’s stand on VoIP is still being debated upon, the intelligence bureau thinks VoIP is too undisciplined for any regulation or surveillance, and hence a threat to national security.
    [Show full text]