Oral History of Robert (Bob) W. Taylor

Total Page:16

File Type:pdf, Size:1020Kb

Oral History of Robert (Bob) W. Taylor Oral History of Robert (Bob) W. Taylor Interviewed by: Paul McJones Recorded: October 10 - October 11, 2008 Woodside, California CHM Reference number: X5059.2009 © 2008 Computer History Museum Oral History of Robert (Bob) Taylor McJones: My name is Paul McJones. It’s October 10th, 2008. We’re going to conduct an oral history interview with Bob Taylor, and we have, behind the camera, Ken Beckman. Hello, Bob. Taylor: Hello, Paul. Hello, Ken [Bob’s friend and colleague at Xerox and DEC]. McJones: Bob, I thought it would be good to start at the beginning and have you tell us a little bit about growing up, your parents and early school and other experiences like that. Taylor: The very beginning? All right. This may be a little complicated. I was adopted when I was 28 days old in San Antonio, Texas. I was born in Dallas, so somehow or another, I don’t remember how, I moved, during my first 28 days of life, from Dallas to San Antonio. I was adopted from an orphanage, in effect, by a Methodist minister and his wife. They could not have any children of their own. They didn’t have RH negative things figured out in those days, so they adopted me. And during the first few years of my life I lived in small Texas towns where my father was a Methodist preacher. And then when I was about four, I guess, something like that, my father became a professor in a small Methodist college in San Antonio and we lived there for ten or eleven years. During World War II, he was in the Chaplain’s Corp. and was overseas. And when he came back, he went back into the ministry and was located in South Texas where I finished high school. I then went to college. Taylor: So I was born in 1932 and lived in various Texas towns. I might as well mention them: Uvalde, Ozona, Victoria, and then San Antonio, which is not such a small town. In 1946, we moved to Mercedes, Texas, which is down in the Rio Grande Valley on the Mexican border. In 1948 at the age of 16, I graduated from high school there and went off to college in Dallas at SMU [Southern Methodist University]. Three years later, I was in the Naval Air Reserve and the Korean War occurred, and I was put on active duty at the Dallas Naval Air Station, referred to affectionately as the U.S.S. Neverfloat. And after 22 months of active service, the Korean War was over so they released us two months earlier than they would have normally and I went back to college, this time at the University of Texas and this time as a more serious student than previously. McJones: I understand your mother was a teacher? Taylor: Well, she did do some teaching, but mostly she was, when I was there, after I came into her life, why she was mostly just my mother. My dad was a minister and then for a period of a few years was a professor in a small college, and then was in the Army as a chaplain during World War II and then went back into the ministry after that. McJones: So education was a definite theme in your family? Taylor: Yes. My dad has a Bachelor’s degree and a Divinity degree, and then he’s got a Master’s of divinity from Yale. His other college was in Texas, at the University of Texas and SMU, but he got a Master’s at Yale before he came back to Texas and went into the ministry. And then he and my mother, before I was born, were teaching missionaries in Brazil for five years, and then they came back to the states, and that’s when I was adopted. So yes, education was important to them. CHM Ref: X5059.2009 © 2008 Computer History Museum Page 2 of 74 Oral History of Robert (Bob) Taylor McJones: And you were able to graduate from high school at the age of 16 so I assume you got good grades? Taylor: Well, what happened was <laughs> let’s see. When I was four or five years old, my parents sent me to a special school that was an experimental school run by this college that my dad taught at. This was an unusual school. The school didn’t last for very long, a few years, I guess. And it was pre-public school so I went there, I think, from the age of four and five or something like that. And at this school, among other innovations, they would conduct for a one-week period, they would conduct everything, all the classes and their playground activity and their lunchtime activity in English. And the next week they would do it in Spanish. The next week they would do it in French. The next week they would do it in German and then they would go back to English, which was rather amazing. Now, today I don’t know any of those languages, but I gather at the time I had a five-year-old, or maybe a three-year-old’s vocabulary in some of them. And years later, when I would be in Germany or France, if I was in those countries for as long as a week or two, phrases would come back to me. I mean, I would utter some phrase and then I would ask myself, well, how did I know what that meant? It’s a very strange phenomenon. So by the time I started to public school at age six, I knew how to read, from my previous schooling. And furthermore, in this small college where my dad taught, there was a Psych professor whose field was intelligence testing. And he was lecturing to his class one particular period of time about intelligence tests, and he asked my dad if he could use me as a Guinea pig in front of his class and give me an intelligence test in front of the class so he could show the class an actual test underway. So my dad said, “Oh, sure.” And so they did that, and the professor was surprised at the score. There’s no point in me mentioning it except that it comes in later when I’m going to public school. The results of the test made the front page of the San Antonio Express, which is their local newspaper, and with a picture and all. And so my mother <laughs> takes me on the first day of public school and she goes in and shows this teacher, kindergarten teacher, I guess. “Now, my son already knows how to read and I just wanted to let you know. And there’s this thing in the paper.” Sounds typical of a mother, right? And so the kindergarten teacher handed me this kindergarten book that they were learning to read out of, “Run, Spot, Run,” or something like that. And I read it and so the kindergarten teacher said, “Well, you better take him to the first grade.” So my mother, after about an hour in kindergarten, why we go to first grade. And this story repeats itself. And now I’m in the second grade, but I’m only six years old and the people in second grade are eight years old. And the teacher says, “Well, you could take him into third grade, but I could give him special work if you want to keep him in the second grade because he’s already two years younger than everybody else.” And so they kept me in the second grade and that’s why I graduated from college two years ahead of my time. McJones: Then you spent several years at SMU before the Korean War and several years after? Taylor: And at SMU I was not a serious student, but I had a good time. McJones: You were taking a lot of classes but maybe not as much focus? Taylor: No, I didn’t take very many classes. I mean, I played. I was 16 and away from home for the first time, 500 miles away from home and I loved athletics so I played a lot of sports. I was too small and young and light to make the college teams, but I played lots of intramural sports; football, basketball, softball, stuff like that, and had a good time. But then I went in the Navy and, as Herman Wouk says, CHM Ref: X5059.2009 © 2008 Computer History Museum Page 3 of 74 Oral History of Robert (Bob) Taylor “The Navy is a master plan designed by geniuses for execution by morons. You want to get along in the Navy, throttle your mind down to a crawl.” You’re not smiling. He actually did say that in “The Caine Mutiny.” No, some other book. Maybe it was “The Caine Mutiny.” And it’s true. So while I was in the Navy I did a lot of reading and got interested in philosophy and science. And so when the Navy period was over and I went back to school, I was a little more serious as a student. I still didn’t know what I wanted to do. I didn’t even have a plan for a career major or anything like that. I was on the GI Bill and I just took courses that I was interested in. I had a job in a research lab as a research assistant as well as the GI Bill, and I could have just stayed there forever as a professional student.
Recommended publications
  • The Early History of Smalltalk
    The Early History of Smalltalk http://www.accesscom.com/~darius/EarlyHistoryS... The Early History of Smalltalk Alan C. Kay Apple Computer [email protected]# Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific permission. HOPL-II/4/93/MA, USA © 1993 ACM 0-89791-571-2/93/0004/0069...$1.50 Abstract Most ideas come from previous ideas. The sixties, particularly in the ARPA community, gave rise to a host of notions about "human-computer symbiosis" through interactive time-shared computers, graphics screens and pointing devices. Advanced computer languages were invented to simulate complex systems such as oil refineries and semi-intelligent behavior. The soon-to- follow paradigm shift of modern personal computing, overlapping window interfaces, and object-oriented design came from seeing the work of the sixties as something more than a "better old thing." This is, more than a better way: to do mainframe computing; for end-users to invoke functionality; to make data structures more abstract. Instead the promise of exponential growth in computing/$/volume demanded that the sixties be regarded as "almost a new thing" and to find out what the actual "new things" might be. For example, one would compute with a handheld "Dynabook" in a way that would not be possible on a shared mainframe; millions of potential users meant that the user interface would have to become a learning environment along the lines of Montessori and Bruner; and needs for large scope, reduction in complexity, and end-user literacy would require that data and control structures be done away with in favor of a more biological scheme of protected universal cells interacting only through messages that could mimic any desired behavior.
    [Show full text]
  • Towards a Secure Agent Society
    Towards A Secure Agent So ciety Qi He Katia Sycara The Rob otics Institute The Rob otics Institute Carnegie Mellon University Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. Pittsburgh, PA 15213, U.S.A [email protected] [email protected] March 23, 1998 Abstract We present a general view of what a \secure agent so ciety" should b e and howtode- velop it rather than fo cus on any sp eci c details or particular agent-based application . We b elieve that the main e ort to achieve security in agent so cieties consists of the following three asp ects:1 agent authentication mechanisms that form the secure so ciety's foundation, 2 a security architecture design within an agent that enables security p olicy making, se- curity proto col generation and security op eration execution, and 3 the extension of agent communication languages for agent secure communication and trust management. In this pap er, all of the three main asp ects are systematically discussed for agent security based on an overall understanding of mo dern cryptographic technology. One purp ose of the pap er is to give some answers to those questions resulting from absence of a complete picture. Area: Software Agents Keywords: security, agent architecture, agent-based public key infrastructure PKI, public key cryptosystem PKCS, con dentiality, authentication, integrity, nonrepudiation. 1 1 Intro duction If you are going to design and develop a software agent-based real application system for elec- tronic commerce, you would immediately learn that there exists no such secure communication between agents, which is assumed by most agent mo del designers.
    [Show full text]
  • Stanford University Medical Experimental Computer Resource (SUMEX) Records SC1248
    http://oac.cdlib.org/findaid/ark:/13030/c8s46z8g Online items available Guide to the Stanford University Medical Experimental Computer Resource (SUMEX) Records SC1248 Daniel Hartwig & Jenny Johnson Department of Special Collections and University Archives January 2018 Green Library 557 Escondido Mall Stanford 94305-6064 [email protected] URL: http://library.stanford.edu/spc Guide to the Stanford University SC1248 1 Medical Experimental Computer Resource (SUMEX) Records SC... Language of Material: English Contributing Institution: Department of Special Collections and University Archives Title: Stanford University Medical Experimental Computer Resource (SUMEX) records Identifier/Call Number: SC1248 Physical Description: 33 Linear Feet Date (inclusive): 1975-1991 Special Collections and University Archives materials are stored offsite and must be paged 48 hours in advance. For more information on paging collections, see the department's website: http://library.stanford.edu/spc. Conditions Governing Access Materials are open for research use. Audio-visual materials are not available in original format, and must be reformatted to a digital use copy. Conditions Governing Use All requests to reproduce, publish, quote from, or otherwise use collection materials must be submitted in writing to the Head of Special Collections and University Archives, Stanford University Libraries, Stanford, California 94304-6064. Consent is given on behalf of Special Collections as the owner of the physical items and is not intended to include or imply permission from the copyright owner. Such permission must be obtained from the copyright owner, heir(s) or assigns. Restrictions also apply to digital representations of the original materials. Use of digital files is restricted to research and educational purposes.
    [Show full text]
  • How Did They Get to the Moon Without Powerpoint?
    How Did They Get to the Moon Without PowerPoint? Mordechai (Moti) Ben-Ari Department of Science Teaching Weizmann Institute of Science [email protected] Keynote speech at the Finnish Computer Science Society, May, 2003. 1 Developing a Technology The invention of writing, however, was the invention of an entirely new Let me start with a description of one of my first technology.[3, p. 9] full-time jobs: There is something to be said for this definition: I developed a technology for data min- do you remember those old movies that show “typ- ing in order to consolidate enterprise- ing pools,” where rows and rows of people, usually customer relations. women, sat pecking away at keyboards all day? Since I held that job in the early 1970s, clearly I would not have described my work in this terminol- ogy! What I actually did was: I wrote a program that read the system log, computed usage of CPU time and printed reports so that the users could be billed. My point in this talk is that hi-tech in general and computer science in particular did not begin in the 1990s, but that we have been doing it for decades. I believe that today’s students are being fed a lot of marketing propaganda to the contrary, and that they Well, things haven’t changed all that much! have completely lost a historical perspective of our discipline. I further believe that we have a respon- sibility as educators to downgrade the hype and to give our students a firm background in the scientific and engineering principles of computer science.
    [Show full text]
  • 1. Course Information Are Handed Out
    6.826—Principles of Computer Systems 2006 6.826—Principles of Computer Systems 2006 course secretary's desk. They normally cover the material discussed in class during the week they 1. Course Information are handed out. Delayed submission of the solutions will be penalized, and no solutions will be accepted after Thursday 5:00PM. Students in the class will be asked to help grade the problem sets. Each week a team of students Staff will work with the TA to grade the week’s problems. This takes about 3-4 hours. Each student will probably only have to do it once during the term. Faculty We will try to return the graded problem sets, with solutions, within a week after their due date. Butler Lampson 32-G924 425-703-5925 [email protected] Policy on collaboration Daniel Jackson 32-G704 8-8471 [email protected] We encourage discussion of the issues in the lectures, readings, and problem sets. However, if Teaching Assistant you collaborate on problem sets, you must tell us who your collaborators are. And in any case, you must write up all solutions on your own. David Shin [email protected] Project Course Secretary During the last half of the course there is a project in which students will work in groups of three Maria Rebelo 32-G715 3-5895 [email protected] or so to apply the methods of the course to their own research projects. Each group will pick a Office Hours real system, preferably one that some member of the group is actually working on but possibly one from a published paper or from someone else’s research, and write: Messrs.
    [Show full text]
  • Learning with Squeak Etoys
    Learning with Squeak Etoys Cathleen Galas, Rita Freudenberg VPRI Research Note RN-2010-002 Viewpoints Research Institute, 1025 Westwood Blvd 2nd flr, Los Angeles, CA 90024 t: (310) 208-0524 Constructionism 2010, Paris Learning with Squeak Etoys Cathleen Galas, [email protected] Squeakland Foundation, Galas Consulting Rita Freudenberg, [email protected] Dept of Computer Science, Otto-von-Guericke-University Magdeburg, Squeakland Foundation Abstract This paper serves as introduction and overview of Squeak Etoys, an engaging computer media- authoring environment, and describes how it aids in the constructionist approach to learning, thinking, and education. Etoys development was inspired by LOGO, the constructionist ideas of Seymour Papert, and Piaget, Bruner, and Montessori. It was developed to help student exploration and discovery in learning and thinking deeply about powerful ideas in math and science. The design of Etoys includes a powerful user interface that will run on all platforms and allow users to author in multiple dimensions. Etoys is an object-oriented system that is built in Squeak, an open-source implementation of Smalltalk. The learning environment is an open world, a sandbox, ready for the creative visions of the user, and undisturbed by buttons and toolbars. Resources are readily available, a click away, stored in flaps, hidden windows that open to many new possibilities. Beginning activities involve creating and scripting objects, building collaboration between objects, and building, exploring, and sharing
    [Show full text]
  • Rulemaking: 1999-10 FSOR Emission Standards and Test Procedures
    State of California Environmental Protection Agency AIR RESOURCES BOARD EMISSION STANDARDS AND TEST PROCEDURES FOR NEW 2001 AND LATER MODEL YEAR SPARK-IGNITION MARINE ENGINES FINAL STATEMENT OF REASONS October 1999 State of California AIR RESOURCES BOARD Final Statement of Reasons for Rulemaking, Including Summary of Comments and Agency Response PUBLIC HEARING TO CONSIDER THE ADOPTION OF EMISSION STANDARDS AND TEST PROCEDURES FOR NEW 2001 AND LATER MODEL YEAR SPARK-IGNITION MARINE ENGINES Public Hearing Date: December 10, 1998 Agenda Item No.: 98-14-2 I. INTRODUCTION AND BACKGROUND ........................................................................................ 3 II. SUMMARY OF PUBLIC COMMENTS AND AGENCY RESPONSES – COMMENTS PRIOR TO OR AT THE HEARING .................................................................................................................. 7 A. EMISSION STANDARDS ................................................................................................................... 7 1. Adequacy of National Standards............................................................................................. 7 2. Lead Time ................................................................................................................................. 8 3. Technological Feasibility ........................................................................................................ 13 a. Technological Feasibility of California-specific Standards ..............................................................13
    [Show full text]
  • S.No. Name of Article Page No. Details of Author(S)
    S.NO. NAME OF PAGE DETAILS OF AUTHOR(S) ARTICLE NO. 1. SOCIAL MEDIA, USE, Page 03- Mr. Alfredo M. Ronchi MISUSE, ABUSE, Page 24 General Secretary of the European REGULATION AND Commission-MEDICI Framework THE WAY FORWARD Piazza Leonarda da Vinci, 32, 20133, Milan, Italy 00390223991 [email protected] 2 SOCIAL MEDIA, USE, MISUSE, ABUSE, REGULATION AND THE WAY FORWARD • Abstract As a side effect of globalisation and massive cyber services the number of crimes both perpetrated at local and global level is growing up. Governments and Law Enforcement Agencies are aware of this and look for potential countermeasures not only following traditional solutions. Technological countermeasures are not enough there is a need to foster the Culture of Cyber Security. This paper will start setting the scene and describing the evolutionary path followed by cyber technology. The issue of privacy tightly connected with information and data ownership will open a more general discussion about risks and threats connected with the increasing use of cyber technologies. Cybersecurity and the need to foster a “Culture of cybersecurity” will take us to the latest part of the document devoted to the social and economic impact of “cyber”. Economic and social impacts of cyber technology are considered as well. Keywords: Data Ownership, Privacy, Ethics, Cybersecurity, Culture of cybersecurity • Setting The Scene We are witnessing relevant changes due to both technological enhancements and modification of user requirements/expectations. In recent times the digital domain, once strictly populated by professional users and computer scientists, has opened up to former digitally divided. Technology is evolving toward a mature “calm” [4 - Weiser 1991] phase, “users” are overlapping more and more with “citizens” [5 - Council of Europe 2001] and they consider technology and e-Services [6 – Ronchi 2019] as an everyday commodity, to buy a ticket, to meet a medical doctor, to access the weather forecast.
    [Show full text]
  • Assignment #4: Big−O, Sorting, Tables, History − Soln
    Assignment #4: Big−O, Sorting, Tables, History − Soln 1. Consider the following code fragment: for (int pass = 1; pass <= 10; pass++) { for (int index = 0; index < k; index += 10) { for (int count = 0; count < index; count++) { do_something(); } } } Assuming that the execution time of do_something() is independent of k, what is the most accurate description of the worst case run−time for this algorithm? a) O(1) b) O(k ) c) O(k log(k) ) 2 d) O(k ) ← 3 e) O(k ) Briefly explain your reason for choosing this answer. The outer loop executes (10+1-1)/1=10 times, and the middle loop executes (k-0)/10 = k/10 times for each execution of the outer loop. The innermost loop executes no times at first, then once, then twice, until k-1 times the last time that the middle loop executes, and the body runs O(1) time. Thus the run time is 10*(0+1+2+?+k- 1)*O(1) = O(k2). 2. Consider the following code fragment: for (int pass = 1; pass <= k; pass++) { for (int index = 0; index < 100*k; index += k) { do_something(); } } Assuming that the execution time of do_something() is O(log(k) ), what is the most accurate description of the worst case run−time for this algorithm? f) O(log(k) ) g) O(k ) h) O(k log(k) ) ← 2 i) O(k ) 2 j) O(k log(k) ) Briefly explain your reason for choosing this answer. The outer loop is executed (k+1-1)/1 = k times, the inner loop is exectuted (100k-0)/k = 100 times, and the innermost block takes time O(log(k)).
    [Show full text]
  • Pen Computing History
    TheThe PastPast andand FutureFuture ofof PenPen ComputingComputing Conrad H. Blickenstorfer, Editor-in-Chief Pen Computing Magazine [email protected] http://www.pencomputing.com ToTo buildbuild thethe future,future, wewe mustmust learnlearn fromfrom thethe pastpast HistoryHistory ofof penpen computingcomputing 1914: Goldberg gets US patent for recognition of handwritten numbers to control machines 1938: Hansel gets US patent for machine recognition of handwriting 1956: RAND Corporation develops digitizing tablet for handwriting recognition 1957-62: Handwriting recognition projects with accuracies of 97-99% 1963: Bell Labs develops cursive recognizer 1966: RAND creates GRAIL, similar to Graffiti Pioneer:Pioneer: AlanAlan KayKay Utah State University Stanford University Xerox PARC: GUI, SmallTalk, OOL Apple Computer Research Fellow Disney Envisioned Dynabook in 1968: The Dynabook will be a “dynamic medium for creative thought, capable of synthesizing all media – pictures, animation, sound, and text – through the intimacy and responsiveness of the personal computer.” HistoryHistory ofof penpen computingcomputing 1970s: Commercial products, including kana/romanji billing machine 1980s: Handwriting recognition companies – Nestor – Communication Intelligence Corporation – Lexicus – Several others Pioneers:Pioneers: AppleApple 1987 Apple prototype – Speech recognition – Intelligent agents – Camera – Folding display – Video conferencing – Wireless communication – Personal Information Manager ““KnowledgeKnowledge NavigatorNavigator””
    [Show full text]
  • Oral History of Butler Lampson
    Oral History of Butler Lampson Interviewed by: Alan Kay Recorded: August 22, 2006 Cambridge, Mass. CHM Reference number: X3697.2007 © 2006 Computer History Museum Oral History of Butler Lampson Alan Kay: Part of my job here as given by the Computer History Museum is to try and get a few good words from you that we could use as the opening blurb for your award from the Computer History Museum. But also to get an oral history. Butler Lampson: I was going to say, I thought the job was to record hours of brilliant conversation that historians in 2100 will pore over. Kay: That is your job. My job is to only to try and instigate it. My theory about this thing is that you should not try and talk short. Lampson: Well, we’ve got lots of time right? Kay: Okay. We do have lots of time and tape is cheap. Lampson: Tape is cheap. Right. My sister’s a film editor and she hates it. She says things were much better in the days when film was expensive, because people would think about what they shot. Now, she says, they shoot hundreds of hours of crap and then they expect the editor to sort it out. Kay: We have to transcribe those hundreds of hours. Lampson: Yeah. Somebody’s got to look at it, it’s got to be fussed around with, and besides, she says, frequently in the whole of hundreds of hours you don’t find what you want because nobody thought about it beforehand. Kay: You remember Bonnie, my wife, ran a film and video company for ten years.
    [Show full text]
  • Core Magazine February 2002
    FEBRUARY 2002 CORE 3.1 A PUBLICATION OF THE COMPUTER HISTORY MUSEUM WWW.COMPUTERHISTORY.ORG PAGE 1 February 2002 OUR ACTIONS TODAY COREA publication of the Computer History3.1 Museum IN THIS MISSION ISSUE TO PRESERVE AND PRESENT FOR POSTERITY THE ARTIFACTS AND STORIES OF THE INFORMATION AGE INSIDE FRONT COVER VISION OUR ACTIONS TODAY The achievements of tomorrow must be was an outstanding success, and I simply doesn’t exist anywhere else in TO EXPLORE THE COMPUTING REVOLUTION AND ITS John C Toole rooted in the actions we take today. hope you caught the impact of these the world. With your sustained help, our IMPACT ON THE HUMAN EXPERIENCE Many exciting and important events announcements that have heightened actions have been able to speak much 2 THE SRI VAN AND COMPUTER have happened since our last CORE awareness of our enterprise in the louder than words, and it is my goal to INTERNETWORKING publication, and they have been community. I’m very grateful to Harry see that we are able to follow through Don Nielson carefully chosen to strategically shape McDonald (director of NASA Ames), Len on our dreams! EXECUTIVE STAFF where we will be in five years. Shustek (chairman of our Board of 7 John C Toole David Miller Trustees), Donna Dubinsky (Museum This issue of CORE is loaded with THE SRI VAN AND EARLY PACKET SPEECH EXECUTIVE DIRECTOR & CEO VICE PRESIDENT OF DEVELOPMENT 2 Don Nielson First, let me officially introduce our Trustee and CEO of Handspring), and technical content and information about Karen Mathews Mike Williams new name and logo to everyone who Bill Campbell (chairman of Intuit) who our organization—from a wonderful EXECUTIVE VICE PRESIDENT HEAD CURATOR 8 has not seen them before.
    [Show full text]