Computing Science

Total Page:16

File Type:pdf, Size:1020Kb

Computing Science COMPUTING SCIENCE Reminiscences of Whetstone ALGOL Brian Randell TECHNICAL REPORT SERIES No. CS-TR-1190 February, 2010 TECHNICAL REPORT SERIES No. CS-TR-1190 February, 2010 Reminiscences of Whetstone ALGOL B. Randell Abstract These reminiscences centre on the implementation, by Lawford Russell and myself, of an ALGOL 60 compiler for the English Electric KDF9 Computer in the early 1960s. However details are also given of preceding work on so-called "automatic programming", and of other contemporary ALGOL compiler projects. © 2010 University of Newcastle upon Tyne. Printed and published by the University of Newcastle upon Tyne, Computing Science, Claremont Tower, Claremont Road, Newcastle upon Tyne, NE1 7RU, England. Bibliographical details RANDELL, B Reminisences of Whetstone ALGOL [By] B. Randell Newcastle upon Tyne: University of Newcastle upon Tyne: Computing Science, 2010. (University of Newcastle upon Tyne, Computing Science, Technical Report Series, No. CS-TR-1190) Added entries UNIVERSITY OF NEWCASTLE UPON TYNE Computing Science. Technical Report Series. CS-TR-1190 Abstract These reminiscences centre on the implementation, by Lawford Russell and myself, of an ALGOL 60 compiler for the English Electric KDF9 Computer in the early 1960s. However details are also given of preceding work on so- called "automatic programming", and of other contemporary ALGOL compiler projects. About the author Brian’s earliest work, during the period 1957-1964 while he was at English Electric, was on compilers. This led to the book: Algol 60 Implementation . (Co-author L. J. Russell). Academic Press, London, 1964. He then joined IBM T.J. Watson Research Center, Yorktown Heights, N.Y. where, with an intervening year during 1965-66 in California, he worked on high performance computer architectures (the ACS Project), then on operating systems and system design methodology. During this time, and shortly after he returned to the UK to become Professor of Computing Science at the University of Newcastle upon Tyne. He was co-editor of the reports on the two NATO Software Engineering Conferences. In 1971 Brian set up the project that initiated research into the possibility of software fault tolerance, and introduced the "recovery block" concept. Subsequent major developments included the Newcastle Connection, and the prototype distributed Secure System. He has been Principal Investigator on a succession of research projects on system dependability funded by the Science Research Council (now Engineering and Physical Sciences Research Council), the Ministry of Defence, the European Strategic Programme of Research in Information Technology (ESPRIT), and the European Information Society Technologies (IST) Programme. Most recently Brian has performed the role of Project Director for CaberNet (the IST Network of Excellence on Distributed Computing Systems Architectures) and for two IST Research Projects, MAFTIA (Malicious- and Accidental-Fault Tolerance for Internet Applications) and DSoS (Dependable Systems of Systems). Subsequently he was involved with the RODIN IST project, and the ReSIST IST Network of Excellence . Brian’s current computing science research continues to be focused on Dependability (for example on failure analysis) and, to a lesser extent, on the History of Computing. Suggested keywords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`/$E!)!*#+!,$!1'#-3(!/.!#!+0#22!aA;&/0#&,1!B-/3-#00,$3!<(:#-&0($&b?! G#*./-%!\;++(22!'#%!F/,$(%!0(E!-(:2#1,$3!J,P(!O(228!*'/!'#%!2(.&!./-!:#+&;-(+!$(*! #&!)IJ!Z*'(-(!'(!:;&!',+!3-(#&!1/%,$3!+P,22+!&/!%(C(2/:,$3!&'(!0,1-/1/%(!./-!*'#&! 7(1#0(!&'(!K8+&(0!cLMd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
Recommended publications
  • A Politico-Social History of Algolt (With a Chronology in the Form of a Log Book)
    A Politico-Social History of Algolt (With a Chronology in the Form of a Log Book) R. w. BEMER Introduction This is an admittedly fragmentary chronicle of events in the develop­ ment of the algorithmic language ALGOL. Nevertheless, it seems perti­ nent, while we await the advent of a technical and conceptual history, to outline the matrix of forces which shaped that history in a political and social sense. Perhaps the author's role is only that of recorder of visible events, rather than the complex interplay of ideas which have made ALGOL the force it is in the computational world. It is true, as Professor Ershov stated in his review of a draft of the present work, that "the reading of this history, rich in curious details, nevertheless does not enable the beginner to understand why ALGOL, with a history that would seem more disappointing than triumphant, changed the face of current programming". I can only state that the time scale and my own lesser competence do not allow the tracing of conceptual development in requisite detail. Books are sure to follow in this area, particularly one by Knuth. A further defect in the present work is the relatively lesser availability of European input to the log, although I could claim better access than many in the U.S.A. This is regrettable in view of the relatively stronger support given to ALGOL in Europe. Perhaps this calmer acceptance had the effect of reducing the number of significant entries for a log such as this. Following a brief view of the pattern of events come the entries of the chronology, or log, numbered for reference in the text.
    [Show full text]
  • Technical Details of the Elliott 152 and 153
    Appendix 1 Technical Details of the Elliott 152 and 153 Introduction The Elliott 152 computer was part of the Admiralty’s MRS5 (medium range system 5) naval gunnery project, described in Chap. 2. The Elliott 153 computer, also known as the D/F (direction-finding) computer, was built for GCHQ and the Admiralty as described in Chap. 3. The information in this appendix is intended to supplement the overall descriptions of the machines as given in Chaps. 2 and 3. A1.1 The Elliott 152 Work on the MRS5 contract at Borehamwood began in October 1946 and was essen- tially finished in 1950. Novel target-tracking radar was at the heart of the project, the radar being synchronized to the computer’s clock. In his enthusiasm for perfecting the radar technology, John Coales seems to have spent little time on what we would now call an overall systems design. When Harry Carpenter joined the staff of the Computing Division at Borehamwood on 1 January 1949, he recalls that nobody had yet defined the way in which the control program, running on the 152 computer, would interface with guns and radar. Furthermore, nobody yet appeared to be working on the computational algorithms necessary for three-dimensional trajectory predic- tion. As for the guns that the MRS5 system was intended to control, not even the basic ballistics parameters seemed to be known with any accuracy at Borehamwood [1, 2]. A1.1.1 Communication and Data-Rate The physical separation, between radar in the Borehamwood car park and digital computer in the laboratory, necessitated an interconnecting cable of about 150 m in length.
    [Show full text]
  • Microbenchmarks in Big Data
    M Microbenchmark Overview Microbenchmarks constitute the first line of per- Nicolas Poggi formance testing. Through them, we can ensure Databricks Inc., Amsterdam, NL, BarcelonaTech the proper and timely functioning of the different (UPC), Barcelona, Spain individual components that make up our system. The term micro, of course, depends on the prob- lem size. In BigData we broaden the concept Synonyms to cover the testing of large-scale distributed systems and computing frameworks. This chap- Component benchmark; Functional benchmark; ter presents the historical background, evolution, Test central ideas, and current key applications of the field concerning BigData. Definition Historical Background A microbenchmark is either a program or routine to measure and test the performance of a single Origins and CPU-Oriented Benchmarks component or task. Microbenchmarks are used to Microbenchmarks are closer to both hardware measure simple and well-defined quantities such and software testing than to competitive bench- as elapsed time, rate of operations, bandwidth, marking, opposed to application-level – macro or latency. Typically, microbenchmarks were as- – benchmarking. For this reason, we can trace sociated with the testing of individual software microbenchmarking influence to the hardware subroutines or lower-level hardware components testing discipline as can be found in Sumne such as the CPU and for a short period of time. (1974). Furthermore, we can also find influence However, in the BigData scope, the term mi- in the origins of software testing methodology crobenchmarking is broadened to include the during the 1970s, including works such cluster – group of networked computers – acting as Chow (1978). One of the first examples of as a single system, as well as the testing of a microbenchmark clearly distinguishable from frameworks, algorithms, logical and distributed software testing is the Whetstone benchmark components, for a longer period and larger data developed during the late 1960s and published sizes.
    [Show full text]
  • David Hartley a Promise of Funding Has Been Received and an Outline Plan Including Cost Estimates and Timescales Has Been Drawn Up
    Issue Number 54 Spring 2011 Computer Conservation Society Aims and objectives The Computer Conservation Society (CCS) is a co-operative venture between the British Computer Society (BCS), the Science Museum of London and the Museum of Science and Industry (MOSI) in Manchester. The CCS was constituted in September 1989 as a Specialist Group of the British Computer Society. It is thus covered by the Royal Charter and charitable status of the BCS. The aims of the CCS are: To promote the conservation of historic computers and to identify existing computers which may need to be archived in the future, To develop awareness of the importance of historic computers, To develop expertise in the conservation and restoration of historic computers, To represent the interests of Computer Conservation Society members with other bodies, To promote the study of historic computers, their use and the history of the computer industry, To publish information of relevance to these objectives for the information of Computer Conservation Society members and the wider public. Membership is open to anyone interested in computer conservation and the history of computing. The CCS is funded and supported by voluntary subscriptions from members, a grant from the BCS, fees from corporate membership, donations, and by the free use of the facilities of both museums. Some charges may be made for publications and attendance at seminars and conferences. There are a number of active Projects on specific computer restorations and early computer technologies and software.
    [Show full text]
  • Overview of the SPEC Benchmarks
    9 Overview of the SPEC Benchmarks Kaivalya M. Dixit IBM Corporation “The reputation of current benchmarketing claims regarding system performance is on par with the promises made by politicians during elections.” Standard Performance Evaluation Corporation (SPEC) was founded in October, 1988, by Apollo, Hewlett-Packard,MIPS Computer Systems and SUN Microsystems in cooperation with E. E. Times. SPEC is a nonprofit consortium of 22 major computer vendors whose common goals are “to provide the industry with a realistic yardstick to measure the performance of advanced computer systems” and to educate consumers about the performance of vendors’ products. SPEC creates, maintains, distributes, and endorses a standardized set of application-oriented programs to be used as benchmarks. 489 490 CHAPTER 9 Overview of the SPEC Benchmarks 9.1 Historical Perspective Traditional benchmarks have failed to characterize the system performance of modern computer systems. Some of those benchmarks measure component-level performance, and some of the measurements are routinely published as system performance. Historically, vendors have characterized the performances of their systems in a variety of confusing metrics. In part, the confusion is due to a lack of credible performance information, agreement, and leadership among competing vendors. Many vendors characterize system performance in millions of instructions per second (MIPS) and millions of floating-point operations per second (MFLOPS). All instructions, however, are not equal. Since CISC machine instructions usually accomplish a lot more than those of RISC machines, comparing the instructions of a CISC machine and a RISC machine is similar to comparing Latin and Greek. 9.1.1 Simple CPU Benchmarks Truth in benchmarking is an oxymoron because vendors use benchmarks for marketing purposes.
    [Show full text]
  • Computer Conservation Society
    Computer Conservation Society Aims and objectives The Computer Conservation Society (CCS) is a co-operative venture between the British Computer Society, the Science Museum of London and the Museum of Science and Industry in Manchester. The CCS was constituted in September 1989 as a Specialist Group of the British Computer Society (BCS). It is thus covered by the Royal Charter and charitable status of the BCS. The aims of the CCS are to Promote the conservation of historic computers and to identify existing computers which may need to be archived in the future Develop awareness of the importance of historic computers Encourage research on historic computers and their impact on society Membership is open to anyone interested in computer conservation and the history of computing. The CCS is funded and supported by voluntary subscriptions from members, a grant from the BCS, fees from corporate membership, do- nations, and by the free use of Science Museum facilities. Some charges may be made for publications and attendance at seminars and conferences. There are a number of active Working Parties on specific computer restorations and early computer technologies and software. Younger peo- ple are especially encouraged to take part in order to achieve skills transfer. Resurrection The Bulletin of the Computer Conservation Society ISSN 0958 - 7403 Number 30 Spring 2003 Contents Generous BCS Support for Bombe Rebuild Project Ernest Morris, Chairman 2 AGM 2 News Round-Up 3 Society Activity 6 CCS Collection Policy 11 DAP snippets Brian M Russell 12 CCS Web Site Information 12 British Computer Corporation | a 1956 Venture Hugh McGregor Ross 13 Edsger Dijkstra remembered Brian Shearing 22 Deciphering Ancient Floppy Discs Kevin Murrell 26 The ICL Archive Hamish Carmichael 28 Forthcoming Events 31 Generous BCS Support for Bombe Rebuild Project Ernest Morris, Chairman CCS members will be familiar with the good progress of the Bombe re- build from the regular reports in Resurrection by John Harper, the project manager.
    [Show full text]
  • I.MX 8Quadxplus Power and Performance
    NXP Semiconductors Document Number: AN12338 Application Note Rev. 4 , 04/2020 i.MX 8QuadXPlus Power and Performance 1. Introduction Contents This application note helps you to design power 1. Introduction ........................................................................ 1 management systems. It illustrates the current drain 2. Overview of i.MX 8QuadXPlus voltage supplies .............. 1 3. Power measurement of the i.MX 8QuadXPlus processor ... 2 measurements of the i.MX 8QuadXPlus Applications 3.1. VCC_SCU_1V8 power ........................................... 4 Processors taken on NXP Multisensory Evaluation Kit 3.2. VCC_DDRIO power ............................................... 4 (MEK) Platform through several use cases. 3.3. VCC_CPU/VCC_GPU/VCC_MAIN power ........... 5 3.4. Temperature measurements .................................... 5 This document provides details on the performance and 3.5. Hardware and software used ................................... 6 3.6. Measuring points on the MEK platform .................. 6 power consumption of the i.MX 8QuadXPlus 4. Use cases and measurement results .................................... 6 processors under a variety of low- and high-power 4.1. Low-power mode power consumption (Key States modes. or ‘KS’)…… ......................................................................... 7 4.2. Complex use case power consumption (Arm Core, The data presented in this application note is based on GPU active) ......................................................................... 11 5. SOC
    [Show full text]
  • Fiendish Designs
    Fiendish Designs A Software Engineering Odyssey © Tim Denvir 2011 1 Preface These are notes, incomplete but extensive, for a book which I hope will give a personal view of the first forty years or so of Software Engineering. Whether the book will ever see the light of day, I am not sure. These notes have come, I realise, to be a memoir of my working life in SE. I want to capture not only the evolution of the technical discipline which is software engineering, but also the climate of social practice in the industry, which has changed hugely over time. To what extent, if at all, others will find this interesting, I have very little idea. I mention other, real people by name here and there. If anyone prefers me not to refer to them, or wishes to offer corrections on any item, they can email me (see Contact on Home Page). Introduction Everybody today encounters computers. There are computers inside petrol pumps, in cash tills, behind the dashboard instruments in modern cars, and in libraries, doctors’ surgeries and beside the dentist’s chair. A large proportion of people have personal computers in their homes and may use them at work, without having to be specialists in computing. Most people have at least some idea that computers contain software, lists of instructions which drive the computer and enable it to perform different tasks. The term “software engineering” wasn’t coined until 1968, at a NATO-funded conference, but the activity that it stands for had been carried out for at least ten years before that.
    [Show full text]
  • Latest Results from the Procedure Calling Test, Ackermann's Function
    Latest results from the procedure calling test, Ackermann’s function B A WICHMANN National Physical Laboratory, Teddington, Middlesex Division of Information Technology and Computing March 1982 Abstract Ackermann’s function has been used to measure the procedure calling over- head in languages which support recursion. Two papers have been written on this which are reproduced1 in this report. Results from further measurements are in- cluded in this report together with comments on the data obtained and codings of the test in Ada and Basic. 1 INTRODUCTION In spite of the two publications on the use of Ackermann’s Function [1, 2] as a mea- sure of the procedure-calling efficiency of programming languages, there is still some interest in the topic. It is an easy test to perform and the large number of results ob- tained means that an implementation can be compared with many other systems. The purpose of this report is to provide a listing of all the results obtained to date and to show their relationship. Few modern languages do not provide recursion and hence the test is appropriate for measuring the overheads of procedure calls in most cases. Ackermann’s function is a small recursive function listed on page 2 of [1] in Al- gol 60. Although of no particular interest in itself, the function does perform other operations common to much systems programming (testing for zero, incrementing and decrementing integers). The function has two parameters M and N, the test being for (3, N) with N in the range 1 to 6. Like all tests, the interpretation of the results is not without difficulty.
    [Show full text]
  • Srovnání Kvality Virtuálních Strojů Assessment of Virtual Machines Performance
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by DSpace at VSB Technical University of Ostrava VŠB - Technická univerzita Ostrava Fakulta elektrotechniky a informatiky Katedra Informatiky Srovnání kvality virtuálních strojů Assessment of Virtual Machines Performance 2011 Lenka Novotná Prohlašuji, že jsem tuto bakalářskou práci vypracovala samostatně. Uvedla jsem všechny literární prameny a publikace, ze kterých jsem čerpala. V Ostravě dne 20. dubna 2011 ……………………… Lenka Novotná Ráda bych poděkovala vedoucímu bakalářské práce, Ing. Petru Olivkovi, za pomoc, věcné připomínky a veškerý čas, který mi věnoval. Abstrakt Hlavním cílem této bakalářské práce je vysvětlit pojem virtualizace, virtuální stroj, a dále popsat a porovnat dostupné virtualizační prostředky, které se využívají ve světovém oboru informačních technologií. Práce se především zabývá srovnáním výkonu virtualizačních strojů pro desktopové operační systémy MS Windows a Linux. Při testování jsem se zaměřila na tři hlavní faktory a to propustnost sítě, při které jsem použila aplikaci Iperf, ke změření výkonu diskových operací jsem využila program IOZone a pro test posledního faktoru, který je zaměřen na přidělování CPU procesů, jsem použila známé testovací aplikace Dhrystone a Whetstone. Všechna zmiňovaná měření okruhů byla provedena na třech virtualizačních platformách, kterými jsou VirtualBox OSE, VMware Player a KVM s QEMU. Klíčová slova: Virtualizace, virtuální stroj, VirtualBox, VMware, KVM, QEMU, plná virtualizace, paravirtualizace, částečná virtualizace, hardwarově asistovaná virtualizace, virtualizace na úrovní operačního systému, měření výkonu CPU, měření propustnosti sítě, měření diskových operací, Dhrystone, Whetstone, Iperf, IOZone. Abstract The main goal of this thesis is explain the term of Virtualization and Virtual Machine, describe and compare available virtualization resources, which we can use in worldwide field of information technology.
    [Show full text]
  • Systems Architecture of the English Electric KDF9 Computer
    Version 1, September 2009 CCS-N4X2 Systems Architecture of the English Electric KDF9 computer. This transistor-based machine was developed by an English Electric team under ACD Haley, of which the leading light was RH Allmark – (see section N4X5 for a full list of technical references). The KDF9 was remarkable because it is believed to be the first zero-address instruction format computer to have been announced (in 1960). It was first delivered at about the same time (early 1963) as the other famous zero-address computer, the Burroughs B5000 in America. A zero-address machine allows the use of Reverse Polish arithmetic; this offers certain advantages to compiler writers. It is believed that the attention of the English Electric team was first drawn to the zero-address concept through contact with George (General Order Generator), an autocode programming system written for a Deuce computer by the University of Sydney, Australia, in the latter half of the 1950s. George used Reversed Polish, and the KDF9 team was attracted to this convention for the pragmatic reason of wishing to enhance performance by minimising accesses to main store. This may be contrasted with the more theoretical line taken independently by Burroughs. To quote Bob Beard’s article in the autumn 1997 issue of Resurrection, the KDF9 had the following architectural features: Zero Address instruction format (a first?); Reverse Polish notation (for arithmetic operations); Stacks used for arithmetic operations and Flow Control (Jumps) and I/O using ferrite cores with a one microsecond cycle; Separate Arithmetic and Main Controls with instruction prefetch; Hardware Multiply and Divide occupying a complete cabinet with clock doubled; Separate I/O control; A word length of 48 bits, comprising six 8-bit 'syllables' (the precursor of the byte).
    [Show full text]
  • PERQ Workstations by R. D. Davis
    PERQ Workstations R. D. Davis Last Updated: November 6, 2003 from the Sept. 7, 1991 edition. 2 Contents 1 Preface and Dedication 11 2 History 13 2.1 PERQ History as Told by Those Who Were There . 13 2.2 PERQ History as Otherwise Researched . 16 2.3 Late 1960's . 16 2.4 1972/1973 . 17 2.5 1973 . 17 2.6 1974 . 17 2.7 1975 . 18 2.8 1976 . 18 2.9 Late 1970's . 18 2.10 1978 . 18 2.11 1979 . 19 2.12 1980 . 19 2.13 1981 . 20 2.14 1982/1983: . 22 2.15 1983-1984? . 22 2.16 1984: . 23 2.17 1985 . 24 2.18 1986: . 25 2.19 1986/1987 . 26 2.20 1997 . 27 2.21 Things whose time period is questionable . 27 3 Accent Systems Corp. 31 4 More PERQ History 33 4.1 Graphic Wonder . 33 3 4 CONTENTS 4.1.1 Historical notes from Chris Lamb . 35 4.2 Alt.sys.perq . 36 4.3 PERQ-Fanatics Mailing Lists . 36 4.4 Original uCode . 37 5 The Accent OS 39 5.1 The Accent Kernel . 42 5.2 Co-Equal Environments . 44 5.3 Accent Window Manager: Sapphire . 44 5.4 Matchmaker . 45 5.5 Microprogramming . 45 5.6 Other Info. 46 5.7 Accent and Printing/Publishing . 46 5.8 Porting POS Code to Accent . 47 5.9 Accent S5 . 47 5.10 Naming of Accent . 47 6 The Action List 49 7 Adverts and Etc. 53 7.1 PERQ-1 . 53 7.1.1 PERQ Systems and cooperative agreements: .
    [Show full text]