The Computer Boys Take Over History of Computing William Aspray, Editor

Total Page:16

File Type:pdf, Size:1020Kb

The Computer Boys Take Over History of Computing William Aspray, Editor The Computer Boys Take Over History of Computing William Aspray, editor John Agar The Government Machine: A Revolutionary History of the Computer William Aspray John von Neumann and the Origins of Modern Computing William Aspray and Paul E. Ceruzzi, editors The Internet and American Business Charles J. Bashe, Lyle R. Johnson, John H. Palmer, and Emerson W. Pugh IBM ’ s Early Computers Martin Campbell-Kelly From Airline Reservations to Sonic the Hedgehog: A History of the Software Industry Paul E. Ceruzzi A History of Modern Computing I. Bernard Cohen Howard Aiken: Portrait of a Computer Pioneer I. Bernard Cohen and Gregory W. Welch, editors Makin ’ Numbers: Howard Aiken and the Computer Nathan Ensmenger The Computer Boys Take Over: Computers, Programmers, and the Politics of Technical Expertise John Hendry Innovating for Failure: Government Policy and the Early British Computer Industry Michael Lindgren Glory and Failure: The Difference Engines of Johann M ü ller, Charles Babbage, and Georg and Edvard Scheutz David E. Lundstrom A Few Good Men from Univac Ren é Moreau The Computer Comes of Age: The People, the Hardware, and the Software Arthur L. Norberg Computers and Commerce: A Study of Technology and Management at Eckert-Mauchly Computer Company, Engineering Research Associates, and Remington Rand, 1946 – 1957 Emerson W. Pugh Building IBM: Shaping an Industry and Its Technology Emerson W. Pugh Memories That Shaped an Industry Emerson W. Pugh, Lyle R. Johnson, and John H. Palmer IBM ’ s 360 and Early 370 Systems Kent C. Redmond and Thomas M. Smith From Whirlwind to MITRE: The R & D Story of the SAGE Air Defense Computer Alex Roland with Philip Shiman Strategic Computing: DARPA and the Quest for Machine Intelligence, 1983 – 1993 Ra ú l Rojas and Ulf Hashagen, editors The First Computers: History and Architectures Dorothy Stein Ada: A Life and a Legacy John Vardalas The Computer Revolution in Canada: Building National Technological Competence, 1945 – 1980 Maurice V. Wilkes Memoirs of a Computer Pioneer The Computer Boys Take Over Computers, Programmers, and the Politics of Technical Expertise Nathan Ensmenger The MIT Press Cambridge, Massachusetts London, England © 2010 Massachusetts Institute of Technology All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher. For information about special quantity discounts, please email special_sales @mitpress.mit.edu This book was set in Sabon by Toppan Best-set Premedia Limited. Printed and bound in the United States of America. Library of Congress Cataloging-in-Publication Data Ensmenger, Nathan, 1972 – The computer boys take over : computers, programmers, and the politics of technical expertise / Nathan Ensmenger. p. cm. — (History of computing) Includes bibliographical references and index. ISBN 978-0-262-05093-7 (hardcover : alk. paper) 1. Computer programming. 2. Computer programmers. 3. Software engineering — History. 4. Computer software — Development — Social aspects. I. Title. QA76.6.E58 2010 005.1 — dc22 2009052638 10 9 8 7 6 5 4 3 2 1 For Deborah and the boys Contents Acknowledgments ix 1 Introduction: Computer Revolutionaries 1 2 The Black Art of Programming 27 3 Chess Players, Music Lovers, and Mathematicians 51 4 Tower of Babel 83 5 The Rise of Computer Science 111 6 The Cosa Nostra of the Data Processing Industry 137 7 The Professionalization of Programming 163 8 Engineering a Solution 195 9 Conclusions: Visible Technicians 223 Notes 245 Bibliography 287 Index 315 Acknowledgments This book represents the culmination of a long period of research, writing, and intellectual exchange that has benefi ted enormously from the contributions of numerous historians from around the globe. The history of the computing community, although small in number, is great in spirit, and is as welcoming a collection of scholars as I have ever encountered. Two of the senior members of this community have proven particu- larly supportive of me and my work. William Aspray has served as an adviser and mentor from almost the beginning of my career, and has been unfailingly generous in his time, energy, and encouragement. The late Michael Mahoney, whose wit and erudition will be sorely missed by the community, also served as a model of unselfi sh scholarship. It would be impossible to detail the many ways in which both of these scholars have informed, and continue to inform, my own thinking and scholarship. This book started as a dissertation, and owes much to the friends and advisers who guided it through its earliest incarnations. Emily Thompson, Robert Kohler, and Walter Licht served as patient readers of many, many early drafts, and without their kind and enlightened counsel this project would never have made it past its infancy. Josh Buhs, Thomas Haigh, Atsushi Akera, and the rest of my graduate school cohort listened for years to my vague musings on the eccentricities of early computer pro- grammers, and their feedback helped refi ne my thoughts and arguments. Edward Bell and the rest of the crew at E. J. Bell and Associates, by providing me with frequent opportunities to pick up consulting work, made it possible for me to fi nish graduate school without going under fi nancially. My colleagues at the University of Pennsylvania have been patient and gracious sounding boards and mentors. Ruth Schwartz Cowan, who x Acknowledgments served as the chair of the department for most of the formative years of this manuscript, allowed me time and space to balance my research and teaching. Susan Lindee has continued that tradition. Both of them have provided much support and encouragement. Janet Tighe has served as a fount of wisdom and sanity for almost a decade. John Tresch and Beth Linker have struggled alongside me in the trenches as my fellow junior faculty members. My other senior colleagues have been endlessly giving of their advice and solicitude. I appreciate all of them greatly. There are far too many archivists, librarians, and fellow historians who contributed to this project to identify them individually here. The Charles Babbage Institute, however, cannot go unmentioned. Not only does the Babbage hold the vast majority of the source material used to construct this history but also it serves as the center of gravity of the entire history of the computing community. It also provided generous funding in the form of the Tomash Fellowship in the History of Information Processing. Tom Misa, Jeff Yost, and Arthur Norberg have all served as trusted friends and advisers. Finally, like most academic book projects, this one has absorbed more than its share of my time and energy outside the offi ce. Many thanks to all of my family. My parents, Elisabeth and Stephen, made possible so many opportunities in my life. My wife, Deborah, has been a constant companion and source of loving support, and has been endlessly forgiv- ing of my need to stretch the project out with “ just one more ” revision. My three sons, Asher, Tate, and Tucker, made the process bearable by providing joy, motivation, and strength each day. 1 Introduction: Computer Revolutionaries To be a good programmer today is as much a privilege as it was to be a literate man in the sixteenth century. This privilege leads the programmer to expect rec- ognition and respect on the part of society. Unfortunately, such recognition is not always realized. — Andrei Ershov, Aesthetics and the Human Factor in Programming , 1972 The Computer People Chances are that you or someone close to you makes their living “ working with computers. ” In the decades since the 1950s, the technical spe- cialists most directly associated with the electronic digital computer— computer programmers, systems analysts, and network and database administrators — have assumed an increasingly active and visible role in the shaping of our modern information society. All but the smallest organizations now have their own information technology departments fi lled with such specialists, and in many cases they represent some of the organization ’ s most valued — or at least most highly paid — employees. In the United States alone there are more than three million professional computer experts; the total worldwide estimate is nearly thirty-fi ve million. 1 There are now more people working in computing than in all of the other fi elds of engineering and architecture combined. In recent years, “ computer people ” have become some of our wealthiest citizens, most important business leaders and philanthropists, and most recog- nized celebrities. It is likely, however, that unless you yourself are one of these com- puter people, you have at best a vague notion of what it actually means to work with computers. Even compared to other esoteric scientifi c or technical disciplines, the work of computer specialists is opaque to out- siders. Their activities are often regarded by nonpractitioners as being at 2 Chapter 1 once too diffi cult and technical to be understood by mere mortals, and too trivial and tedious to be worth the effort. The specialists themselves talk about what they do as being a mysterious blend of art and science, high tech and black magic. Many of the colloquial terms that are fre- quently used to describe these experts — “ hackers, ” “ wizards, ” “ cowboys, ” or “ gurus ” — refl ect the ambivalent fusion of wonder, awe, and suspicion with which they are generally regarded. 2 That so many of these computer specialists seem unwilling (or unable) to communicate to others what it is they do or how they do it only exacerbates the apparent impenetrabil- ity of their discipline. But while you might not know much about what it is that these com- puter specialists do, you probably can at least imagine what they look like: the stereotype of the scruffy, bearded, long-haired programmer, wearing (inappropriately) sandals and a T-shirt, has been a staple of popular culture since at least the early 1960s.
Recommended publications
  • Women in Computing History
    Women in Computing History Denise Gfirer ACM-W0) Co-Chair EMD Consulting Scotts Valley, California 95066 USA <[email protected]> Introduction Exciting inventions, innovative technology, human interac- tion, and intriguing politics fill computing history. However, the recorded history is mainly composed of male achieve- ments and involvements, even though women have played substantial roles. This situation is not unusual. Most science fields are notorious for excluding, undervaluing, or over- looking the accomplishments of their female scientists [1, 16, 17, 22]. As J.A.N. Lee points out, it is up to the histori- ans and others to remedy this imbalance (see this issue [14]). Some steps have been taken towards this goal through pub- lishing biographies on women in technology [2, 5, 6, 8, 10, 12, 13, 18, 20, 21, 23, 24], also see this issue [7], and through honoring the pioneers with various awards such as the GHC'97 Pioneering Awards(z) (Figure 1), the WITI Hall of Fame(3), and the AWC Lovelace Award(n). A few online sites Figure 1: Computer Science Pioneer Celebration, at the Grace Hopper contain biographies of women in technology, shown in Table Celebration of Women in Computing '97. Left to right: (Fran Allen, Ruzena Bajcsy, Adele Mildred Koss, Denise Gtirer, Anita Borg, Jean 1 below. However, even with these resources, many women Jennings Bartik, Judy Levenson Clapp, Thelma Estrin, Joyce Currie Little who have contributed significantly to computer science are (Courtesy Institute for Women in Technology, Palo Alto, California) still to be discovered. preprogrammed software for needed tasks (in particular word processing, email, and database access).
    [Show full text]
  • Rugby - a Process Model for Continuous Software Engineering
    INSTITUT FUR¨ INFORMATIK DER TECHNISCHEN UNIVERSITAT¨ MUNCHEN¨ Forschungs- und Lehreinheit I Angewandte Softwaretechnik Rugby - A Process Model for Continuous Software Engineering Stephan Tobias Krusche Vollstandiger¨ Abdruck der von der Fakultat¨ fur¨ Informatik der Technischen Universitat¨ Munchen¨ zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften (Dr. rer. nat.) genehmigten Dissertation. Vorsitzender: Univ.-Prof. Dr. Helmut Seidl Prufer¨ der Dissertation: 1. Univ.-Prof. Bernd Brugge,¨ Ph.D. 2. Prof. Dr. Jurgen¨ Borstler,¨ Blekinge Institute of Technology, Karlskrona, Schweden Die Dissertation wurde am 28.01.2016 bei der Technischen Universitat¨ Munchen¨ eingereicht und durch die Fakultat¨ fur¨ Informatik am 29.02.2016 angenommen. Abstract Software is developed in increasingly dynamic environments. Organizations need the capability to deal with uncertainty and to react to unexpected changes in require- ments and technologies. Agile methods already improve the flexibility towards changes and with the emergence of continuous delivery, regular feedback loops have become possible. The abilities to maintain high code quality through reviews, to regularly re- lease software, and to collect and prioritize user feedback, are necessary for con- tinuous software engineering. However, there exists no uniform process model that handles the increasing number of reviews, releases and feedback reports. In this dissertation, we describe Rugby, a process model for continuous software en- gineering that is based on a meta model, which treats development activities as parallel workflows and which allows tailoring, customization and extension. Rugby includes a change model and treats changes as events that activate workflows. It integrates re- view management, release management, and feedback management as workflows. As a consequence, Rugby handles the increasing number of reviews, releases and feedback and at the same time decreases their size and effort.
    [Show full text]
  • Computer History – the Pitfalls of Past Futures
    Research Collection Working Paper Computer history – The pitfalls of past futures Author(s): Gugerli, David; Zetti, Daniela Publication Date: 2019 Permanent Link: https://doi.org/10.3929/ethz-b-000385896 Rights / License: In Copyright - Non-Commercial Use Permitted This page was generated automatically upon download from the ETH Zurich Research Collection. For more information please consult the Terms of use. ETH Library TECHNIKGESCHICHTE DAVID GUGERLI DANIELA ZETTI COMPUTER HISTORY – THE PITFALLS OF PAST FUTURES PREPRINTS ZUR KULTURGESCHICHTE DER TECHNIK // 2019 #33 WWW.TG.ETHZ.CH © BEI DEN AUTOREN Gugerli, Zetti/Computer History Preprints zur Kulturgeschichte der Technik #33 Abstract The historicization of the computer in the second half of the 20th century can be understood as the effect of the inevitable changes in both its technological and narrative development. What interests us is how past futures and therefore history were stabilized. The development, operation, and implementation of machines and programs gave rise to a historicity of the field of computing. Whenever actors have been grouped into communities – for example, into industrial and academic developer communities – new orderings have been constructed historically. Such orderings depend on the ability to refer to archival and published documents and to develop new narratives based on them. Professional historians are particularly at home in these waters – and nevertheless can disappear into the whirlpool of digital prehistory. Toward the end of the 1980s, the first critical review of the literature on the history of computers thus offered several programmatic suggestions. It is one of the peculiar coincidences of history that the future should rear its head again just when the history of computers was flourishing as a result of massive methodological and conceptual input.
    [Show full text]
  • NEWSLETTER 43 Antikvariat Morris · Badhusgatan 16 · 151 73 Södertälje · Sweden [email protected] |
    NEWSLETTER 43 antikvariat morris · badhusgatan 16 · 151 73 södertälje · sweden [email protected] | http://www.antikvariatmorris.se/ [dwiggins & goudy] browning, robert: In a Balcony The Blue Sky Press, Chicago. 1902. 72 pages. 8vo. Cloth spine with paper label, title lettered gilt on front board, top edge trimmed others uncut. spine and boards worn. Some upper case letters on title page plus first initial hand coloured. Introduction by Laura Mc Adoo Triggs. Book designs by F. W. Goudy & W. A. Dwiggins. Printed in red & black by by A.G. Langworthy on Van Gelder paper in a limited edition. This is Nr. 166 of 400 copies. Initialazed by Langworthy. One of Dwiggins first book designs together with his teacher Goudy. “Will contributed endpapers and other decorations to In a Balcony , but the title page spread is pure Goudy.” Bruce Kennett p. 20 & 28–29. (Not in Agner, Ransom 19). SEK500 / €49 / £43 / $57 [dwiggins] wells, h. g.: The Time Machine. An invention Random House, New York. 1931. x, 86 pages. 8vo. Illustrated paper boards, black cloth spine stamped in gold. Corners with light wear, book plate inside front cover (Tage la Cour). Text printed in red and black. Set in Monotype Fournier and printed on Hamilton An - dorra paper. Stencil style colour illustrations. Typography, illustra - tions and binding by William Addison Dwiggins. (Agner 31.07, Bruce Kennett pp. 229–31). SEK500 / €49 / £43 / $57 [bodoni] guarini, giovan battista: Pastor Fido Impresso co’ Tipi Bodoniani, Crisopoli [Parma], 1793. (4, first 2 blank), (1)–345, (3 blank) pages. Tall 4to (31 x 22 cm).
    [Show full text]
  • Irish Gothic Fiction
    THE ‘If the Gothic emerges in the shadows cast by modernity and its pasts, Ireland proved EME an unhappy haunting ground for the new genre. In this incisive study, Jarlath Killeen shows how the struggle of the Anglican establishment between competing myths of civility and barbarism in eighteenth-century Ireland defined itself repeatedly in terms R The Emergence of of the excesses of Gothic form.’ GENCE Luke Gibbons, National University of Ireland (Maynooth), author of Gaelic Gothic ‘A work of passion and precision which explains why and how Ireland has been not only a background site but also a major imaginative source of Gothic writing. IRISH GOTHIC Jarlath Killeen moves well beyond narrowly political readings of Irish Gothic by OF IRISH GOTHIC using the form as a way of narrating the history of the Anglican faith in Ireland. He reintroduces many forgotten old books into the debate, thereby making some of the more familiar texts seem suddenly strange and definitely troubling. With FICTION his characteristic blend of intellectual audacity and scholarly rigour, he reminds us that each text from previous centuries was written at the mercy of its immediate moment as a crucial intervention in a developing debate – and by this brilliant HIST ORY, O RIGI NS,THE ORIES historicising of the material he indicates a way forward for Gothic amidst the ruins of post-Tiger Ireland.’ Declan Kiberd, University of Notre Dame Provides a new account of the emergence of Irish Gothic fiction in the mid-eighteenth century FI This new study provides a robustly theorised and thoroughly historicised account of CTI the beginnings of Irish Gothic fiction, maps the theoretical terrain covered by other critics, and puts forward a new history of the emergence of the genre in Ireland.
    [Show full text]
  • Eakta Jain A. Professional Preparation: B. Appointments: C. Publications
    Eakta Jain Department of Computer and Information Science and Engineering University of Florida Phone: (352) 562-3979 E-mail: [email protected] Webpage: jainlab.cise.ufl.edu A. Professional Preparation: Indian Institute of Technology Kanpur, India B.Tech. (Electrical Engineering) 2006 Carnegie Mellon University M.S. (Robotics) 2010 Carnegie Mellon University Ph.D. (Robotics) 2012 B. Appointments: 02/14 – present Assistant Professor, Department of Computer and Information Science and Engi- neering, University of Florida, Gainesville, FL 12/12-02/14 Member of Technical Staff, Texas Instruments Embedded Signal Processing Lab, Computer Vision Branch, Dallas, TX 07/12-12/12 Systems Software Engineer, Natural User Interfaces Team, Texas Instruments, Dallas, TX 09/11-01/12 Lab Associate, Disney Research Pittsburgh, PA 06/10-08/10 Lab Associate, Disney Research Pittsburgh, PA 06/08-08/08 Lab Associate, Disney Research Pittsburgh, PA 06/07-08/07 Walt Disney Animation Studios, Burbank, CA C. Publications: Is the Motion of a Child Perceivably Different from the Motion of an Adult? Jain, E., Anthony, L., Aloba, A., Castonguay, A., Cuba, I., Shaw, A. and Woodward, J. (2016). ACM Transactions on Applied Percep- tion (TAP), 13(4), Article 22. DOI: 10.1145/2947616 Decoupling Light Reflex from Pupillary Dilation to Measure Emotional Arousal in Videos, Rai- turkar, P., Kleinsmith, A., Keil, A., Banerjee, A., and Jain, E. (2016), ACM Symposium on Ap- plied Perception (SAP), 89-96. Gaze-driven Video Re-editing, Jain, E., Sheikh, Y., Shamir, A. and Hodgins, J., (2015), ACM Transac- tions on Graphics (TOG) (34, p21:1-p21:12). DOI: 10.1145/2699644 3D Saliency from Eye Tracking with Tomography, Ma, B., Jain, E., and Entezari, A.
    [Show full text]
  • Turing's Influence on Programming — Book Extract from “The Dawn of Software Engineering: from Turing to Dijkstra”
    Turing's Influence on Programming | Book extract from \The Dawn of Software Engineering: from Turing to Dijkstra" Edgar G. Daylight∗ Eindhoven University of Technology, The Netherlands [email protected] Abstract Turing's involvement with computer building was popularized in the 1970s and later. Most notable are the books by Brian Randell (1973), Andrew Hodges (1983), and Martin Davis (2000). A central question is whether John von Neumann was influenced by Turing's 1936 paper when he helped build the EDVAC machine, even though he never cited Turing's work. This question remains unsettled up till this day. As remarked by Charles Petzold, one standard history barely mentions Turing, while the other, written by a logician, makes Turing a key player. Contrast these observations then with the fact that Turing's 1936 paper was cited and heavily discussed in 1959 among computer programmers. In 1966, the first Turing award was given to a programmer, not a computer builder, as were several subsequent Turing awards. An historical investigation of Turing's influence on computing, presented here, shows that Turing's 1936 notion of universality became increasingly relevant among programmers during the 1950s. The central thesis of this paper states that Turing's in- fluence was felt more in programming after his death than in computer building during the 1940s. 1 Introduction Many people today are led to believe that Turing is the father of the computer, the father of our digital society, as also the following praise for Martin Davis's bestseller The Universal Computer: The Road from Leibniz to Turing1 suggests: At last, a book about the origin of the computer that goes to the heart of the story: the human struggle for logic and truth.
    [Show full text]
  • Oral History of Captain Grace Hopper
    Oral History of Captain Grace Hopper Interviewed by: Angeline Pantages Recorded: December, 1980 Naval Data Automation Command, Maryland CHM Reference number: X5142.2009 © 1980 Computer History Museum Table of Contents BACKGROUND HISTORY ...........................................................................................................3 1943-1949: MARK I, II, AND III COMPUTERS AT HARVARD....................................................6 1949-1964: ECKERT AND MAUCHLY, UNIVAC, AND THE ONE-PASS COMPILER ................7 The Need for User-Friendly Languages ..................................................................................10 DEMANDS FOR THE FUTURE..................................................................................................12 Application Processors, Database Machines, Distributed Processing ....................................12 Demand for Programmers and System Analysts ....................................................................14 The Value and Cost of Information..........................................................................................14 The Navy’s Dilemma: Micros and Software Creation..............................................................15 The Murray Siblings: Brilliant Communicators.........................................................................18 Common Sense and Distributed Computing ...........................................................................19 BACK TO 1943-1949: HOWARD AIKEN....................................................................................21
    [Show full text]
  • Introduction to Computer System
    Chapter 1 INTRODUCTION TO COMPUTER SYSTEM 1.0 Objectives 1.1 Introduction –Computer? 1.2 Evolution of Computers 1.3 Classification of Computers 1.4 Applications of Computers 1.5 Advantages and Disadvantages of Computers 1.6 Similarities Difference between computer and Human 1.7 A Computer System 1.8 Components of a Computer System 1.9 Summary 1.10 Check your Progress - Answers 1.11 Questions for Self – Study 1.12 Suggested Readings 1.0 OBJECTIVES After studying this chapter you will be able to: Learn the concept of a system in general and the computer system in specific. Learn and understand how the computers have evolved dramatically within a very short span, from very huge machines of the past, to very compact designs of the present with tremendous advances in technology. Understand the general classifications of computers. Study computer applications. Understand the typical characteristics of computers which are speed, accuracy, efficiency, storage capacity, versatility. Understand limitations of the computer. Discuss the similarities and differences between the human and the computer. Understand the Component of the computer. 1.1 INTRODUCTION- Computer Today, almost all of us in the world make use of computers in one way or the other. It finds applications in various fields of engineering, medicine, commercial, research and others. Not only in these sophisticated areas, but also in our daily lives, computers have become indispensable. They are present everywhere, in all the dev ices that we use daily like cars, games, washing machines, microwaves etc. and in day to day computations like banking, reservations, electronic mails, internet and many more.
    [Show full text]
  • The Strange Birth and Long Life of Unix - IEEE Spectrum Page 1 of 6
    The Strange Birth and Long Life of Unix - IEEE Spectrum Page 1 of 6 COMPUTING / SOFTWARE FEATURE The Strange Birth and Long Life of Unix The classic operating system turns 40, and its progeny abound By WARREN TOOMEY / DECEMBER 2011 They say that when one door closes on you, another opens. People generally offer this bit of wisdom just to lend some solace after a misfortune. But sometimes it's actually true. It certainly was for Ken Thompson and the late Dennis Ritchie, two of the greats of 20th-century information technology, when they created the Unix operating system, now considered one of the most inspiring and influential pieces of software ever written. A door had slammed shut for Thompson and Ritchie in March of 1969, when their employer, the American Telephone & Telegraph Co., withdrew from a collaborative project with the Photo: Alcatel-Lucent Massachusetts Institute of KEY FIGURES: Ken Thompson [seated] types as Dennis Ritchie looks on in 1972, shortly Technology and General Electric after they and their Bell Labs colleagues invented Unix. to create an interactive time- sharing system called Multics, which stood for "Multiplexed Information and Computing Service." Time-sharing, a technique that lets multiple people use a single computer simultaneously, had been invented only a decade earlier. Multics was to combine time-sharing with other technological advances of the era, allowing users to phone a computer from remote terminals and then read e -mail, edit documents, run calculations, and so forth. It was to be a great leap forward from the way computers were mostly being used, with people tediously preparing and submitting batch jobs on punch cards to be run one by one.
    [Show full text]
  • Working on ENIAC: the Lost Labors of the Information Age
    Working on ENIAC: The Lost Labors of the Information Age Thomas Haigh www.tomandmaria.com/tom University of Wisconsin—Milwaukee & Mark Priestley www.MarkPriestley.net This Research Is Sponsored By • Mrs L.D. Rope’s Second Charitable Trust • Mrs L.D. Rope’s Third Charitable Trust Thanks for contributions by my coauthors Mark Priestley & Crispin Rope. And to assistance from others including Ann Graf, Peter Sachs Collopy, and Stephanie Dick. www.EniacInAction.com CONVENTIONAL HISTORY OF COMPUTING www.EniacInAction.com The Battle for “Firsts” www.EniacInAction.com Example: Alan Turing • A lone genius, according to The Imitation Game – “I don’t have time to explain myself as I go along, and I’m afraid these men will only slow me down” • Hand building “Christopher” – In reality hundreds of “bombes” manufactured www.EniacInAction.com Isaacson’s “The Innovators” • Many admirable features – Stress on teamwork – Lively writing – References to scholarly history – Goes back beyond 1970s – Stresses role of liberal arts in tech innovation • But going to disagree with some basic assumptions – Like the subtitle! www.EniacInAction.com Amazon • Isaacson has 7 of the top 10 in “Computer Industry History” – 4 Jobs – 3 Innovators www.EniacInAction.com Groundbreaking for “Pennovation Center” Oct, 2014 “Six women Ph.D. students were tasked with programming the machine, but when the computer was unveiled to the public on Valentine’s Day of 1946, Isaacson said, the women programmers were not invited to the black tie event after the announcement.” www.EniacInAction.com Teams of Superheroes www.EniacInAction.com ENIAC as one of the “Great Machines” www.EniacInAction.com ENIAC Life Story • 1943: Proposed and approved.
    [Show full text]
  • MAKING DATA MODELS READABLE David C
    MAKING DATA MODELS READABLE David C. Hay Essential Strategies, Inc. “Confusion and clutter are failures of [drawing] design, not attributes of information. And so the point is to find design strategies that reveal detail and complexity ¾ rather than to fault the data for an excess of complication. Or, worse, to fault viewers for a lack of understanding.” ¾ Edward R. Tufte1 Entity/relationship models (or simply “data models”) are powerful tools for analyzing and representing the structure of an organization. Properly used, they can reveal subtle relationships between elements of a business. They can also form the basis for robust and reliable data base design. Data models have gotten a bad reputation in recent years, however, as many people have found them to be more trouble to produce and less beneficial than promised. Discouraged, people have gone on to other approaches to developing systems ¾ often abandoning modeling altogether, in favor of simply starting with system design. Requirements analysis remains important, however, if systems are ultimately to do something useful for the company. And modeling ¾ especially data modeling ¾ is an essential component of requirements analysis. It is important, therefore, to try to understand why data models have been getting such a “bad rap”. Your author believes, along with Tufte, that the fault lies in the way most people design the models, not in the underlying complexity of what is being represented. An entity/relationship model has two primary objectives: First it represents the analyst’s public understanding of an enterprise, so that the ultimate consumer of a prospective computer system can be sure that the analyst got it right.
    [Show full text]