Core Magazine May 2001

Total Page:16

File Type:pdf, Size:1020Kb

Core Magazine May 2001 MAY 2001 CORE 2.2 A PUBLICATION OF THE COMPUTER MUSEUM HISTORY CENTER WWW.COMPUTERHISTORY.ORG A TRIBUTE TO MUSEUM FELLOW TOM KILBURN PAGE 1 May 2001 A FISCAL YEAR OF COREA publication of The Computer Museum2.2 History Center IN THIS MISSION ISSUE CHANGE TO PRESERVE AND PRESENT FOR POSTERITY THE ARTIFACTS AND STORIES OF THE INFORMATION AGE VISION INSIDE FRONT COVER At the end of June, the Museum will end deserved rest before deciding what to Visible Storage Exhibit Area—The staff TO EXPLORE THE COMPUTING REVOLUTION AND ITS A FISCAL YEAR OF CHANGE John C Toole another fiscal year. Time has flown as do next. His dedication, expertise, and and volunteers have worked hard to give IMPACT ON THE HUMAN EXPERIENCE we’ve grown and changed in so many smiling face will be sorely missed, the middle bay a new “look and feel.” 2 ways. I hope that each of you have although I feel he will be part of our For example, if you haven’t seen the A TRIBUTE TO TOM KILBURN already become strong supporters in future in some way. We have focused new exhibit “Innovation 101,” you are in Brian Napper and Hilary Kahn every aspect of our growth, including key recruiting efforts on building a new for a treat. EXECUTIVE STAFF our annual campaign–it’s so critical to curatorial staff for the years ahead. 7 John C Toole FROM THE PHOTO COLLECTION: our operation. And there’s still time to Charlie Pfefferkorn—a great resource Collections—As word spreads, our EXECUTIVE DIRECTOR & CEO 2 CAPTURING HISTORY help us meet the financial demands of and long-time volunteer—has been collection grows, which emphasizes our Karen Mathews Chris Garcia this year’s programs! contracted to help during this transition. need for space and staff to take care of EXECUTIVE VICE PRESIDENT the new items. Eleanor Weber Dickman VICE PRESIDENT OF DEVELOPMENT 11 Let’s take a short walk together around In other departments, Camilla Neve & PUBLIC RELATIONS REPORT ON MUSEUM ACTIVITIES the Museum, and see what’s been joined as a development associate to Interim plans—In order to grow and Karen Mathews happening. With a goal of becoming support the growing expectations of our operate until the opening of our BOARD OF TRUSTEES operational in 2005, getting the fundraising team. We also have two permanent home, we must 13 7 DECWORLD 2001 programs, organization, and most NASA interns working on staff: Amy accommodate increasing warehouse Leonard J Shustek, Chairman Charles H (Chuck) House importantly, the people in place is Bodine is finishing her internship as a and people space. We are moving VENCRAFT, LLC INTEL CONVERGED COMMUNICATIONS GROUP, 14 Sally M. Abel essential. collections and web services intern, and forward with a temporary structure that DIALOGIC DIVISION FOCUS ON PEOPLE: JAKE FEINLER FENWICK & WEST, LLP Jessica Huynh is the new web services will allow us to build our operation and Eleanor Dickman David L Anderson Dave House ALLEGRO NETWORKS The architectural and exhibit design intern. For current staff openings, see manage a dynamic collection process. SENDMAIL teams have begun the schematic design www.computerhistory.org/jobs. C Gordon Bell Christine Hughes 15 phase of our new building. This is a This is a particularly important time for MICROSOFT CORPORATION HIGHWAY 1 CURRENT STAFF & VOLUNTEER OPPORTUNITIES particularly exciting time to be engaged The number of volunteers has been the Museum. We are growing in Peggy Burke Steve Kirsch 11 1185 DESIGN PROPEL SOFTWARE CORPORATION as we seriously think through the growing, and they participate in every programs, people, and facilities, but we Andrea Cunningham John Mashey 17 relationships of architecture, event way imaginable. If you’ve been by are also vulnerable to the economic CITIGATE CUNNINGHAM SILICON GRAPHICS UPCOMING EVENTS space, exhibits, storage, and visitor recently, you may have noticed that the downturn and changes that result. We Donna Dubinsky Ike R Nassi CONTACT INFORMATION HANDSPRING experience. And speaking of related great docents we have are much more could not have achieved what we have Suhas Patil plans, have you seen some of the visible. Ed Thelen does many of our already without the generous support of David Emerson TUFAN ON THE BACK COVER COOLEY GODWARD, LLP MYSTERY ITEMS FROM THE COLLECTION “facelift” changes in the Visible Storage regular public tours on Wednesdays and so many Museum friends. But to grow, Bernard L Peuto Samuel Fuller CONCORD CONSULTING Exhibit Area, or the plans for the interim Fridays, and the entire group has won we’ve got to expand and mature in so ANALOG DEVICES 14 John William Poduska Sr office and storage space we’ll be using the hearts of groups like the Stanford many ways. Fortunately, your support Eric Hahn ADVANCED VISUAL SYSTEMS INVENTURES GROUP until the new building opens? Alumni that recently visited. This is makes all the difference, and I F Grant Saviers Gardner C Hendrie just a hint of our future docent program encourage you to contribute to our PRIVATE INVESTOR SIGMA PARTNERS People make the Museum succeed— that will be evolving over the next annual campaign as generously as you John Shoch Peter Hirshberg ALLOY VENTURES Board, staff, volunteers, and the public. several months. can. You’ll hear more about our capital GLOSS.COM Please welcome to our Board of campaign in the future. Pierluigi Zappacosta Trustees Sally Abel (Fenwick and West You can probably tell that we’re very BACK LLP) and David Emerson (Cooley proud of where we are at the close of Finally, I hope you are enjoying the Godward LLP). The legal expertise of this fiscal year. In addition to the above: diverse and important programs that are these two new members is truly available. We are on the steep slope of Copyright © 2001, The Computer Museum History Center. All rights welcome in our fast-paced organization Events—Two exciting events, the Xerox growth to build a new cultural institution reserved. The Museum is an independent 501 (c) (3) organization, and is already being put to good use. Alto retrospective and DECWORLD that celebrates computing history, and FID# 77-0507525. PO Box 367, Moffett Field, CA 94035, USA. 2001, cap off our wonderful spring many of you have been part of that rise. The Computer Museum History Center At the staff level, Curator Dag Spicer lecture series. Karen Mathews gives an Help bring others into the circle of Building T12-A left in March after five years of service account on page 11 of current Museum Museum friends. Moffett Field, CA 94035, USA +1 650 604 2579 with the Museum. He’s taking a well operations and events. +1 650 604 2594 (fax) WWW.COMPUTERHISTORY.ORG The Museum seeks technical articles from our readers. Article submission guidelines can be located at JOHN C TOOLE www.computerhistory.org/core, or contact Editor Karyn Wolfe EXECUTIVE DIRECTOR & CEO at [email protected]. PAGE 2 PAGE 3 A TRIBUTE TO Used by permission. TOM KILBURN Used by permission. 1921-2001 BRIAN NAPPER AND HILARY KAHN Tom Kilburn, who died on January 17, 2001 at the age of 79, spent his © Computer Science Department, University of Manchester. lifetime at the forefront of the © Computer Science Department, University of Manchester. computing revolution that he himself helped to start. By co-inventing the first effective electronic storage (memory), and then leading the design and development of five major computer systems, he kept England’s University Freddie Williams led the effort to use cathode of Manchester at the center of the ray tubes (CRTs) in the 40s to solve the need “second industrial revolution” for a 25- for memory. Geoff Tootill in front of the rebuilt Baby machine at the Museum of Science and year period. Industry in Manchester Used by permission. Used by permission. © University of Manchester. Used by permission. © University of Manchester. The UK’s University of Manchester, which Tom © Computer Science Department, University of Manchester. Freddie Williams (right) and Tom Kilburn in front of © Computer Science Department, University of Manchester. Kilburn helped keep at the center of the computing the Mark 1 console in 1949 revolution for 25 years While working for Williams, Kilburn and Tootill built the Baby to demonstrate the viability of CRTs for storage (memory). It worked successfully for the first time on June 21, 1948, becoming the world’s first functioning stored program electronic computer. Kilburn was born in 1921 and educated having seen ENIAC, Williams became time on the CRT project. Kilburn spent A program was loaded into the Baby’s in Dewsbury, Yorkshire, England. In aware that the lack of a suitable 1947 tackling the problem and building memory using hand keys and then the 1940 he went to Cambridge University storage mechanism was holding up the prototypes to prove the viability of CRT stored program was executed. This to read Mathematics. Upon graduating development of electronic computers, storage, ending up with a 2048 bit store program, which calculated the highest with first-class honors in 1942, he and decided to investigate the on a standard radar CRT. In December factor of a number—and which Kilburn chose to enlist in the military for possibility of using cathode ray tubes 1947, he wrote a definitive report on admitted was probably the only unspecified key war work. He was sent (CRTs) to solve the problem. Work the mechanism. However, he knew that complete program he ever wrote—was on a six-week intensive electronics elsewhere in the world at that time was the most effective proof of the an early example of computer software. course and then to the Telecom- investigating the use of mercury delay mechanism would be to use CRTs in a The CRT storage system pioneered by munications Research Establishment lines to solve the storage problem, and computer.
Recommended publications
  • Silicon Shores Corporation Company Backgrounder
    Silicon Shores Corporation Company Backgrounder Company Overview Headquartered in Mountain View, CA Silicon Shores Corporation is the company overseeing operations of the Shoreline Lake Boathouse and American Bistro at the Shoreline Lake Recreational Area and Wildlife Sanctuary. Silicon Shores manages the facilities through a leasing arrangement with the City of Mountain View, which owns the Shoreline Lake park area. This private company, established in 2000, is incorporated in California. Christina Ferrari is the owner and President and entered into the relationship with the City in 2000. Given the origins of Shoreline Lake, the City of Mountain View’s transformation of 544 acres of junkyard, hog farm, two substandard dumps, low lying flood plains, and a sewage treatment plant into a nature preserve was quite an undertaking. Partnering with Silicon Shores ensured that the area can provide the services and amenities that the surrounding urban population and visitors would appreciate finding within a nature preserve. Vision & Mission The company’s goal for the Shoreline Lake area is to create an experience unmatched within Silicon Valley for residents and workers of the South Bay, and beyond. The centerpiece of the Park, Shoreline Lake is a man- made, 50-acre, salt water lake filled by waters pumped in from the San Francisco Bay that circulate back out into Permanente Creek. However, a densely populated, heavily-developed area surrounds the Park, which includes many well-known hi-tech firms (e.g., Google headquarters is right next door). Even so, Shoreline Lake, a safe and expansive waterway for many water sports, is also a wildlife sanctuary and home to many rare, migratory birds, such as the burrowing owl.
    [Show full text]
  • Towards a Secure Agent Society
    Towards A Secure Agent So ciety Qi He Katia Sycara The Rob otics Institute The Rob otics Institute Carnegie Mellon University Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. Pittsburgh, PA 15213, U.S.A [email protected] [email protected] March 23, 1998 Abstract We present a general view of what a \secure agent so ciety" should b e and howtode- velop it rather than fo cus on any sp eci c details or particular agent-based application . We b elieve that the main e ort to achieve security in agent so cieties consists of the following three asp ects:1 agent authentication mechanisms that form the secure so ciety's foundation, 2 a security architecture design within an agent that enables security p olicy making, se- curity proto col generation and security op eration execution, and 3 the extension of agent communication languages for agent secure communication and trust management. In this pap er, all of the three main asp ects are systematically discussed for agent security based on an overall understanding of mo dern cryptographic technology. One purp ose of the pap er is to give some answers to those questions resulting from absence of a complete picture. Area: Software Agents Keywords: security, agent architecture, agent-based public key infrastructure PKI, public key cryptosystem PKCS, con dentiality, authentication, integrity, nonrepudiation. 1 1 Intro duction If you are going to design and develop a software agent-based real application system for elec- tronic commerce, you would immediately learn that there exists no such secure communication between agents, which is assumed by most agent mo del designers.
    [Show full text]
  • Technical Details of the Elliott 152 and 153
    Appendix 1 Technical Details of the Elliott 152 and 153 Introduction The Elliott 152 computer was part of the Admiralty’s MRS5 (medium range system 5) naval gunnery project, described in Chap. 2. The Elliott 153 computer, also known as the D/F (direction-finding) computer, was built for GCHQ and the Admiralty as described in Chap. 3. The information in this appendix is intended to supplement the overall descriptions of the machines as given in Chaps. 2 and 3. A1.1 The Elliott 152 Work on the MRS5 contract at Borehamwood began in October 1946 and was essen- tially finished in 1950. Novel target-tracking radar was at the heart of the project, the radar being synchronized to the computer’s clock. In his enthusiasm for perfecting the radar technology, John Coales seems to have spent little time on what we would now call an overall systems design. When Harry Carpenter joined the staff of the Computing Division at Borehamwood on 1 January 1949, he recalls that nobody had yet defined the way in which the control program, running on the 152 computer, would interface with guns and radar. Furthermore, nobody yet appeared to be working on the computational algorithms necessary for three-dimensional trajectory predic- tion. As for the guns that the MRS5 system was intended to control, not even the basic ballistics parameters seemed to be known with any accuracy at Borehamwood [1, 2]. A1.1.1 Communication and Data-Rate The physical separation, between radar in the Borehamwood car park and digital computer in the laboratory, necessitated an interconnecting cable of about 150 m in length.
    [Show full text]
  • 1. Course Information Are Handed Out
    6.826—Principles of Computer Systems 2006 6.826—Principles of Computer Systems 2006 course secretary's desk. They normally cover the material discussed in class during the week they 1. Course Information are handed out. Delayed submission of the solutions will be penalized, and no solutions will be accepted after Thursday 5:00PM. Students in the class will be asked to help grade the problem sets. Each week a team of students Staff will work with the TA to grade the week’s problems. This takes about 3-4 hours. Each student will probably only have to do it once during the term. Faculty We will try to return the graded problem sets, with solutions, within a week after their due date. Butler Lampson 32-G924 425-703-5925 [email protected] Policy on collaboration Daniel Jackson 32-G704 8-8471 [email protected] We encourage discussion of the issues in the lectures, readings, and problem sets. However, if Teaching Assistant you collaborate on problem sets, you must tell us who your collaborators are. And in any case, you must write up all solutions on your own. David Shin [email protected] Project Course Secretary During the last half of the course there is a project in which students will work in groups of three Maria Rebelo 32-G715 3-5895 [email protected] or so to apply the methods of the course to their own research projects. Each group will pick a Office Hours real system, preferably one that some member of the group is actually working on but possibly one from a published paper or from someone else’s research, and write: Messrs.
    [Show full text]
  • Information Technology 3 and 4/1998. Emerging
    OCCASION This publication has been made available to the public on the occasion of the 50th anniversary of the United Nations Industrial Development Organisation. DISCLAIMER This document has been produced without formal United Nations editing. The designations employed and the presentation of the material in this document do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations Industrial Development Organization (UNIDO) concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries, or its economic system or degree of development. Designations such as “developed”, “industrialized” and “developing” are intended for statistical convenience and do not necessarily express a judgment about the stage reached by a particular country or area in the development process. Mention of firm names or commercial products does not constitute an endorsement by UNIDO. FAIR USE POLICY Any part of this publication may be quoted and referenced for educational and research purposes without additional permission from UNIDO. However, those who make use of quoting and referencing this publication are requested to follow the Fair Use Policy of giving due credit to UNIDO. CONTACT Please contact [email protected] for further information concerning UNIDO publications. For more information about UNIDO, please visit us at www.unido.org UNITED NATIONS INDUSTRIAL DEVELOPMENT ORGANIZATION Vienna International Centre, P.O. Box 300, 1400 Vienna, Austria Tel: (+43-1) 26026-0 · www.unido.org · [email protected] EMERGING TECHNOLOGY SERIES 3 and 4/1998 Information Technology UNITED NATIONS INDUSTRIAL DEVELOPMENT ORGANIZATION Vienna, 2000 EMERGING TO OUR READERS TECHNOLOGY SERIES Of special interest in this issue of Emerging Technology Series: Information T~chn~~ogy is the focus on a meeting that took INFORMATION place from 2n to 4 November 1998, in Bangalore, India.
    [Show full text]
  • Computer Conservation Society
    Issue Number 52 Autumn 2010 Computer Conservation Society Aims and objectives The Computer Conservation Society (CCS) is a co-operative venture between the British Computer Society (BCS), the Science Museum of London and the Museum of Science and Industry (MOSI) in Manchester. The CCS was constituted in September 1989 as a Specialist Group of the British Computer Society. It is thus covered by the Royal Charter and charitable status of the BCS. The aims of the CCS are: To promote the conservation of historic computers and to identify existing computers which may need to be archived in the future, To develop awareness of the importance of historic computers, To develop expertise in the conservation and restoration of historic computers, To represent the interests of Computer Conservation Society members with other bodies, To promote the study of historic computers, their use and the history of the computer industry, To publish information of relevance to these objectives for the information of Computer Conservation Society members and the wider public. Membership is open to anyone interested in computer conservation and the history of computing. The CCS is funded and supported by voluntary subscriptions from members, a grant from the BCS, fees from corporate membership, donations, and by the free use of the facilities of both museums. Some charges may be made for publications and attendance at seminars and conferences. There are a number of active Projects on specific computer restorations and early computer technologies and software.
    [Show full text]
  • Computer Conservation Society
    Issue Number 88 Winter 2019/20 Computer Conservation Society Aims and Objectives The Computer Conservation Society (CCS) is a co-operative venture between BCS, The Chartered Institute for IT; the Science Museum of London; and the Science and Industry Museum (SIM) in Manchester. The CCS was constituted in September 1989 as a Specialist Group of the British Computer Society. It is thus covered by the Royal Charter and charitable status of BCS. The objects of the Computer Conservation Society (“Society”) are: To promote the conservation, restoration and reconstruction of historic computing systems and to identify existing computing systems which may need to be archived in the future; To develop awareness of the importance of historic computing systems; To develop expertise in the conservation, restoration and reconstruction of historic computing systems; To represent the interests of the Society with other bodies; To promote the study of historic computing systems, their use and the history of the computer industry; To publish information of relevance to these objectives for the information of Society members and the wider public. Membership is open to anyone interested in computer conservation and the history of computing. The CCS is funded and supported by a grant from BCS and from donations. There are a number of active projects on specific computer restorations and early computer technologies and software. Younger people are especially encouraged to take part in order to achieve skills transfer. The CCS also enjoys a close relationship with the National Museum of Computing. Resurrection The Journal of the Computer Conservation Society ISSN 0958-7403 Number 88 Winter 2019/20 Contents Society Activity 2 News Round-Up 9 The Data Curator 10 Paul Cockshott From Tea Shops to Computer Company: The Improbable 15 Story of LEO John Aeberhard Book Review: Early Computing in Britain Ferranti Ltd.
    [Show full text]
  • Oral History of Butler Lampson
    Oral History of Butler Lampson Interviewed by: Alan Kay Recorded: August 22, 2006 Cambridge, Mass. CHM Reference number: X3697.2007 © 2006 Computer History Museum Oral History of Butler Lampson Alan Kay: Part of my job here as given by the Computer History Museum is to try and get a few good words from you that we could use as the opening blurb for your award from the Computer History Museum. But also to get an oral history. Butler Lampson: I was going to say, I thought the job was to record hours of brilliant conversation that historians in 2100 will pore over. Kay: That is your job. My job is to only to try and instigate it. My theory about this thing is that you should not try and talk short. Lampson: Well, we’ve got lots of time right? Kay: Okay. We do have lots of time and tape is cheap. Lampson: Tape is cheap. Right. My sister’s a film editor and she hates it. She says things were much better in the days when film was expensive, because people would think about what they shot. Now, she says, they shoot hundreds of hours of crap and then they expect the editor to sort it out. Kay: We have to transcribe those hundreds of hours. Lampson: Yeah. Somebody’s got to look at it, it’s got to be fussed around with, and besides, she says, frequently in the whole of hundreds of hours you don’t find what you want because nobody thought about it beforehand. Kay: You remember Bonnie, my wife, ran a film and video company for ten years.
    [Show full text]
  • Core Magazine February 2002
    FEBRUARY 2002 CORE 3.1 A PUBLICATION OF THE COMPUTER HISTORY MUSEUM WWW.COMPUTERHISTORY.ORG PAGE 1 February 2002 OUR ACTIONS TODAY COREA publication of the Computer History3.1 Museum IN THIS MISSION ISSUE TO PRESERVE AND PRESENT FOR POSTERITY THE ARTIFACTS AND STORIES OF THE INFORMATION AGE INSIDE FRONT COVER VISION OUR ACTIONS TODAY The achievements of tomorrow must be was an outstanding success, and I simply doesn’t exist anywhere else in TO EXPLORE THE COMPUTING REVOLUTION AND ITS John C Toole rooted in the actions we take today. hope you caught the impact of these the world. With your sustained help, our IMPACT ON THE HUMAN EXPERIENCE Many exciting and important events announcements that have heightened actions have been able to speak much 2 THE SRI VAN AND COMPUTER have happened since our last CORE awareness of our enterprise in the louder than words, and it is my goal to INTERNETWORKING publication, and they have been community. I’m very grateful to Harry see that we are able to follow through Don Nielson carefully chosen to strategically shape McDonald (director of NASA Ames), Len on our dreams! EXECUTIVE STAFF where we will be in five years. Shustek (chairman of our Board of 7 John C Toole David Miller Trustees), Donna Dubinsky (Museum This issue of CORE is loaded with THE SRI VAN AND EARLY PACKET SPEECH EXECUTIVE DIRECTOR & CEO VICE PRESIDENT OF DEVELOPMENT 2 Don Nielson First, let me officially introduce our Trustee and CEO of Handspring), and technical content and information about Karen Mathews Mike Williams new name and logo to everyone who Bill Campbell (chairman of Intuit) who our organization—from a wonderful EXECUTIVE VICE PRESIDENT HEAD CURATOR 8 has not seen them before.
    [Show full text]
  • Editors/Translators Foreword
    J Comput Virol (2009) 5:1–3 DOI 10.1007/s11416-008-0116-y EDITORIAL Editors/translators Foreword Daniel Bilar · Eric Filiol © Springer-Verlag France 2009 Bereishit In the beginning, there was bureaucracy. I had tried a feeling of nostalgia (and gratitude for Donald Knuth). I set to get major AV companies to give me malware samples to it aside till Christmas break. study in an academic setting, but to no avail: Liability rea- As I worked my way through the thesis over Christmas sons, and their suggestion—trekking back and forth to their break 2006, my cursory curiosity gave way to wonderment, corporate ‘clean’ room—was unpalatable to me. I like flat then awe, then electricity. I felt as if I had stumbled upon hierarchies, so I turned to herm1t. Herm1t runs (singlehand- a 10th century manuscript in an Scottish convent, delineat- edly, with minimal equipment and funds) the labour of love ing the calculus seven hundred years before Leibnitz and known as vxheavens (http://vx.netlux.org), a full-spectrum Newton. Aspects of the history of computer virology had to site dedicated to computer viruses. As quid pro quo, I sent be rewritten and proper due given- what a fortuitous find! him historical papers he sought for his collection. One title, I sent a printed snail mail copy off to herm1t in the Ukraine though, seemed out of reach: A German 1980 MSc thesis by and pondered my next steps. some fellow named Juergen Kraus. In early February, Eric Filiol, after having discovered an A hefty Dortmund package arrived late October 2006.
    [Show full text]
  • Who Did What? Engineers Vs Mathematicians Title Page America Vs Europe Ideas Vs Implementations Babbage Lovelace Turing
    Who did what? Engineers vs Mathematicians Title Page America vs Europe Ideas vs Implementations Babbage Lovelace Turing Flowers Atanasoff Berry Zuse Chandler Broadhurst Mauchley & Von Neumann Wilkes Eckert Williams Kilburn SlideSlide 1 1 SlideSlide 2 2 A decade of real progress What remained to be done? A number of different pioneers had during the 1930s and 40s Memory! begun to make significant progress in developing automatic calculators (computers). Thanks (almost entirely) to A.M. Turing there was a complete theoretical understanding of the elements necessary to produce a Atanasoff had pioneered the use of electronics in calculation stored program computer – or Universal Turing Machine. Zuse had mad a number of theoretical breakthroughs Not for the first time, ideas had outstripped technology. Eckert and Mauchley (with JvN) had produced ENIAC and No-one had, by the end of the war, developed a practical store or produced the EDVAC report – spreading the word memory. Newman and Flowers had developed the Colossus It should be noted that not too many people were even working on the problem. SlideSlide 3 3 SlideSlide 4 4 The players Controversy USA: Eckert, Mauchley & von Neumann – EDVAC Fall out over the EDVAC report UK: Maurice Wilkes – EDSAC Takeover of the SSEM project by Williams (Kilburn) UK: Newman – SSEM (what was the role of Colossus?) Discord on the ACE project and the departure of Turing UK: Turing - ACE EDSAC alone was harmonious We will concentrate for a little while on the SSEM – the winner! SlideSlide 5 5 SlideSlide 6 6 1 Newman & technology transfer: Secret Technology Transfer? the claim Donald Michie : Cryptanalyst An enormous amount was transferred in an extremely seminal way to the post war developments of computers in Britain.
    [Show full text]
  • Microprocessor Design
    Microprocessor Design en.wikibooks.org March 15, 2015 On the 28th of April 2012 the contents of the English as well as German Wikibooks and Wikipedia projects were licensed under Creative Commons Attribution-ShareAlike 3.0 Unported license. A URI to this license is given in the list of figures on page 211. If this document is a derived work from the contents of one of these projects and the content was still licensed by the project under this license at the time of derivation this document has to be licensed under the same, a similar or a compatible license, as stated in section 4b of the license. The list of contributors is included in chapter Contributors on page 209. The licenses GPL, LGPL and GFDL are included in chapter Licenses on page 217, since this book and/or parts of it may or may not be licensed under one or more of these licenses, and thus require inclusion of these licenses. The licenses of the figures are given in the list of figures on page 211. This PDF was generated by the LATEX typesetting software. The LATEX source code is included as an attachment (source.7z.txt) in this PDF file. To extract the source from the PDF file, you can use the pdfdetach tool including in the poppler suite, or the http://www. pdflabs.com/tools/pdftk-the-pdf-toolkit/ utility. Some PDF viewers may also let you save the attachment to a file. After extracting it from the PDF file you have to rename it to source.7z.
    [Show full text]