The Computer Boys Take Over History of Computing William Aspray, Editor
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Women in Computing History
Women in Computing History Denise Gfirer ACM-W0) Co-Chair EMD Consulting Scotts Valley, California 95066 USA <[email protected]> Introduction Exciting inventions, innovative technology, human interac- tion, and intriguing politics fill computing history. However, the recorded history is mainly composed of male achieve- ments and involvements, even though women have played substantial roles. This situation is not unusual. Most science fields are notorious for excluding, undervaluing, or over- looking the accomplishments of their female scientists [1, 16, 17, 22]. As J.A.N. Lee points out, it is up to the histori- ans and others to remedy this imbalance (see this issue [14]). Some steps have been taken towards this goal through pub- lishing biographies on women in technology [2, 5, 6, 8, 10, 12, 13, 18, 20, 21, 23, 24], also see this issue [7], and through honoring the pioneers with various awards such as the GHC'97 Pioneering Awards(z) (Figure 1), the WITI Hall of Fame(3), and the AWC Lovelace Award(n). A few online sites Figure 1: Computer Science Pioneer Celebration, at the Grace Hopper contain biographies of women in technology, shown in Table Celebration of Women in Computing '97. Left to right: (Fran Allen, Ruzena Bajcsy, Adele Mildred Koss, Denise Gtirer, Anita Borg, Jean 1 below. However, even with these resources, many women Jennings Bartik, Judy Levenson Clapp, Thelma Estrin, Joyce Currie Little who have contributed significantly to computer science are (Courtesy Institute for Women in Technology, Palo Alto, California) still to be discovered. preprogrammed software for needed tasks (in particular word processing, email, and database access). -
Rugby - a Process Model for Continuous Software Engineering
INSTITUT FUR¨ INFORMATIK DER TECHNISCHEN UNIVERSITAT¨ MUNCHEN¨ Forschungs- und Lehreinheit I Angewandte Softwaretechnik Rugby - A Process Model for Continuous Software Engineering Stephan Tobias Krusche Vollstandiger¨ Abdruck der von der Fakultat¨ fur¨ Informatik der Technischen Universitat¨ Munchen¨ zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften (Dr. rer. nat.) genehmigten Dissertation. Vorsitzender: Univ.-Prof. Dr. Helmut Seidl Prufer¨ der Dissertation: 1. Univ.-Prof. Bernd Brugge,¨ Ph.D. 2. Prof. Dr. Jurgen¨ Borstler,¨ Blekinge Institute of Technology, Karlskrona, Schweden Die Dissertation wurde am 28.01.2016 bei der Technischen Universitat¨ Munchen¨ eingereicht und durch die Fakultat¨ fur¨ Informatik am 29.02.2016 angenommen. Abstract Software is developed in increasingly dynamic environments. Organizations need the capability to deal with uncertainty and to react to unexpected changes in require- ments and technologies. Agile methods already improve the flexibility towards changes and with the emergence of continuous delivery, regular feedback loops have become possible. The abilities to maintain high code quality through reviews, to regularly re- lease software, and to collect and prioritize user feedback, are necessary for con- tinuous software engineering. However, there exists no uniform process model that handles the increasing number of reviews, releases and feedback reports. In this dissertation, we describe Rugby, a process model for continuous software en- gineering that is based on a meta model, which treats development activities as parallel workflows and which allows tailoring, customization and extension. Rugby includes a change model and treats changes as events that activate workflows. It integrates re- view management, release management, and feedback management as workflows. As a consequence, Rugby handles the increasing number of reviews, releases and feedback and at the same time decreases their size and effort. -
Computer History – the Pitfalls of Past Futures
Research Collection Working Paper Computer history – The pitfalls of past futures Author(s): Gugerli, David; Zetti, Daniela Publication Date: 2019 Permanent Link: https://doi.org/10.3929/ethz-b-000385896 Rights / License: In Copyright - Non-Commercial Use Permitted This page was generated automatically upon download from the ETH Zurich Research Collection. For more information please consult the Terms of use. ETH Library TECHNIKGESCHICHTE DAVID GUGERLI DANIELA ZETTI COMPUTER HISTORY – THE PITFALLS OF PAST FUTURES PREPRINTS ZUR KULTURGESCHICHTE DER TECHNIK // 2019 #33 WWW.TG.ETHZ.CH © BEI DEN AUTOREN Gugerli, Zetti/Computer History Preprints zur Kulturgeschichte der Technik #33 Abstract The historicization of the computer in the second half of the 20th century can be understood as the effect of the inevitable changes in both its technological and narrative development. What interests us is how past futures and therefore history were stabilized. The development, operation, and implementation of machines and programs gave rise to a historicity of the field of computing. Whenever actors have been grouped into communities – for example, into industrial and academic developer communities – new orderings have been constructed historically. Such orderings depend on the ability to refer to archival and published documents and to develop new narratives based on them. Professional historians are particularly at home in these waters – and nevertheless can disappear into the whirlpool of digital prehistory. Toward the end of the 1980s, the first critical review of the literature on the history of computers thus offered several programmatic suggestions. It is one of the peculiar coincidences of history that the future should rear its head again just when the history of computers was flourishing as a result of massive methodological and conceptual input. -
NEWSLETTER 43 Antikvariat Morris · Badhusgatan 16 · 151 73 Södertälje · Sweden [email protected] |
NEWSLETTER 43 antikvariat morris · badhusgatan 16 · 151 73 södertälje · sweden [email protected] | http://www.antikvariatmorris.se/ [dwiggins & goudy] browning, robert: In a Balcony The Blue Sky Press, Chicago. 1902. 72 pages. 8vo. Cloth spine with paper label, title lettered gilt on front board, top edge trimmed others uncut. spine and boards worn. Some upper case letters on title page plus first initial hand coloured. Introduction by Laura Mc Adoo Triggs. Book designs by F. W. Goudy & W. A. Dwiggins. Printed in red & black by by A.G. Langworthy on Van Gelder paper in a limited edition. This is Nr. 166 of 400 copies. Initialazed by Langworthy. One of Dwiggins first book designs together with his teacher Goudy. “Will contributed endpapers and other decorations to In a Balcony , but the title page spread is pure Goudy.” Bruce Kennett p. 20 & 28–29. (Not in Agner, Ransom 19). SEK500 / €49 / £43 / $57 [dwiggins] wells, h. g.: The Time Machine. An invention Random House, New York. 1931. x, 86 pages. 8vo. Illustrated paper boards, black cloth spine stamped in gold. Corners with light wear, book plate inside front cover (Tage la Cour). Text printed in red and black. Set in Monotype Fournier and printed on Hamilton An - dorra paper. Stencil style colour illustrations. Typography, illustra - tions and binding by William Addison Dwiggins. (Agner 31.07, Bruce Kennett pp. 229–31). SEK500 / €49 / £43 / $57 [bodoni] guarini, giovan battista: Pastor Fido Impresso co’ Tipi Bodoniani, Crisopoli [Parma], 1793. (4, first 2 blank), (1)–345, (3 blank) pages. Tall 4to (31 x 22 cm). -
Irish Gothic Fiction
THE ‘If the Gothic emerges in the shadows cast by modernity and its pasts, Ireland proved EME an unhappy haunting ground for the new genre. In this incisive study, Jarlath Killeen shows how the struggle of the Anglican establishment between competing myths of civility and barbarism in eighteenth-century Ireland defined itself repeatedly in terms R The Emergence of of the excesses of Gothic form.’ GENCE Luke Gibbons, National University of Ireland (Maynooth), author of Gaelic Gothic ‘A work of passion and precision which explains why and how Ireland has been not only a background site but also a major imaginative source of Gothic writing. IRISH GOTHIC Jarlath Killeen moves well beyond narrowly political readings of Irish Gothic by OF IRISH GOTHIC using the form as a way of narrating the history of the Anglican faith in Ireland. He reintroduces many forgotten old books into the debate, thereby making some of the more familiar texts seem suddenly strange and definitely troubling. With FICTION his characteristic blend of intellectual audacity and scholarly rigour, he reminds us that each text from previous centuries was written at the mercy of its immediate moment as a crucial intervention in a developing debate – and by this brilliant HIST ORY, O RIGI NS,THE ORIES historicising of the material he indicates a way forward for Gothic amidst the ruins of post-Tiger Ireland.’ Declan Kiberd, University of Notre Dame Provides a new account of the emergence of Irish Gothic fiction in the mid-eighteenth century FI This new study provides a robustly theorised and thoroughly historicised account of CTI the beginnings of Irish Gothic fiction, maps the theoretical terrain covered by other critics, and puts forward a new history of the emergence of the genre in Ireland. -
Eakta Jain A. Professional Preparation: B. Appointments: C. Publications
Eakta Jain Department of Computer and Information Science and Engineering University of Florida Phone: (352) 562-3979 E-mail: [email protected] Webpage: jainlab.cise.ufl.edu A. Professional Preparation: Indian Institute of Technology Kanpur, India B.Tech. (Electrical Engineering) 2006 Carnegie Mellon University M.S. (Robotics) 2010 Carnegie Mellon University Ph.D. (Robotics) 2012 B. Appointments: 02/14 – present Assistant Professor, Department of Computer and Information Science and Engi- neering, University of Florida, Gainesville, FL 12/12-02/14 Member of Technical Staff, Texas Instruments Embedded Signal Processing Lab, Computer Vision Branch, Dallas, TX 07/12-12/12 Systems Software Engineer, Natural User Interfaces Team, Texas Instruments, Dallas, TX 09/11-01/12 Lab Associate, Disney Research Pittsburgh, PA 06/10-08/10 Lab Associate, Disney Research Pittsburgh, PA 06/08-08/08 Lab Associate, Disney Research Pittsburgh, PA 06/07-08/07 Walt Disney Animation Studios, Burbank, CA C. Publications: Is the Motion of a Child Perceivably Different from the Motion of an Adult? Jain, E., Anthony, L., Aloba, A., Castonguay, A., Cuba, I., Shaw, A. and Woodward, J. (2016). ACM Transactions on Applied Percep- tion (TAP), 13(4), Article 22. DOI: 10.1145/2947616 Decoupling Light Reflex from Pupillary Dilation to Measure Emotional Arousal in Videos, Rai- turkar, P., Kleinsmith, A., Keil, A., Banerjee, A., and Jain, E. (2016), ACM Symposium on Ap- plied Perception (SAP), 89-96. Gaze-driven Video Re-editing, Jain, E., Sheikh, Y., Shamir, A. and Hodgins, J., (2015), ACM Transac- tions on Graphics (TOG) (34, p21:1-p21:12). DOI: 10.1145/2699644 3D Saliency from Eye Tracking with Tomography, Ma, B., Jain, E., and Entezari, A. -
Turing's Influence on Programming — Book Extract from “The Dawn of Software Engineering: from Turing to Dijkstra”
Turing's Influence on Programming | Book extract from \The Dawn of Software Engineering: from Turing to Dijkstra" Edgar G. Daylight∗ Eindhoven University of Technology, The Netherlands [email protected] Abstract Turing's involvement with computer building was popularized in the 1970s and later. Most notable are the books by Brian Randell (1973), Andrew Hodges (1983), and Martin Davis (2000). A central question is whether John von Neumann was influenced by Turing's 1936 paper when he helped build the EDVAC machine, even though he never cited Turing's work. This question remains unsettled up till this day. As remarked by Charles Petzold, one standard history barely mentions Turing, while the other, written by a logician, makes Turing a key player. Contrast these observations then with the fact that Turing's 1936 paper was cited and heavily discussed in 1959 among computer programmers. In 1966, the first Turing award was given to a programmer, not a computer builder, as were several subsequent Turing awards. An historical investigation of Turing's influence on computing, presented here, shows that Turing's 1936 notion of universality became increasingly relevant among programmers during the 1950s. The central thesis of this paper states that Turing's in- fluence was felt more in programming after his death than in computer building during the 1940s. 1 Introduction Many people today are led to believe that Turing is the father of the computer, the father of our digital society, as also the following praise for Martin Davis's bestseller The Universal Computer: The Road from Leibniz to Turing1 suggests: At last, a book about the origin of the computer that goes to the heart of the story: the human struggle for logic and truth. -
Oral History of Captain Grace Hopper
Oral History of Captain Grace Hopper Interviewed by: Angeline Pantages Recorded: December, 1980 Naval Data Automation Command, Maryland CHM Reference number: X5142.2009 © 1980 Computer History Museum Table of Contents BACKGROUND HISTORY ...........................................................................................................3 1943-1949: MARK I, II, AND III COMPUTERS AT HARVARD....................................................6 1949-1964: ECKERT AND MAUCHLY, UNIVAC, AND THE ONE-PASS COMPILER ................7 The Need for User-Friendly Languages ..................................................................................10 DEMANDS FOR THE FUTURE..................................................................................................12 Application Processors, Database Machines, Distributed Processing ....................................12 Demand for Programmers and System Analysts ....................................................................14 The Value and Cost of Information..........................................................................................14 The Navy’s Dilemma: Micros and Software Creation..............................................................15 The Murray Siblings: Brilliant Communicators.........................................................................18 Common Sense and Distributed Computing ...........................................................................19 BACK TO 1943-1949: HOWARD AIKEN....................................................................................21 -
Introduction to Computer System
Chapter 1 INTRODUCTION TO COMPUTER SYSTEM 1.0 Objectives 1.1 Introduction –Computer? 1.2 Evolution of Computers 1.3 Classification of Computers 1.4 Applications of Computers 1.5 Advantages and Disadvantages of Computers 1.6 Similarities Difference between computer and Human 1.7 A Computer System 1.8 Components of a Computer System 1.9 Summary 1.10 Check your Progress - Answers 1.11 Questions for Self – Study 1.12 Suggested Readings 1.0 OBJECTIVES After studying this chapter you will be able to: Learn the concept of a system in general and the computer system in specific. Learn and understand how the computers have evolved dramatically within a very short span, from very huge machines of the past, to very compact designs of the present with tremendous advances in technology. Understand the general classifications of computers. Study computer applications. Understand the typical characteristics of computers which are speed, accuracy, efficiency, storage capacity, versatility. Understand limitations of the computer. Discuss the similarities and differences between the human and the computer. Understand the Component of the computer. 1.1 INTRODUCTION- Computer Today, almost all of us in the world make use of computers in one way or the other. It finds applications in various fields of engineering, medicine, commercial, research and others. Not only in these sophisticated areas, but also in our daily lives, computers have become indispensable. They are present everywhere, in all the dev ices that we use daily like cars, games, washing machines, microwaves etc. and in day to day computations like banking, reservations, electronic mails, internet and many more. -
The Strange Birth and Long Life of Unix - IEEE Spectrum Page 1 of 6
The Strange Birth and Long Life of Unix - IEEE Spectrum Page 1 of 6 COMPUTING / SOFTWARE FEATURE The Strange Birth and Long Life of Unix The classic operating system turns 40, and its progeny abound By WARREN TOOMEY / DECEMBER 2011 They say that when one door closes on you, another opens. People generally offer this bit of wisdom just to lend some solace after a misfortune. But sometimes it's actually true. It certainly was for Ken Thompson and the late Dennis Ritchie, two of the greats of 20th-century information technology, when they created the Unix operating system, now considered one of the most inspiring and influential pieces of software ever written. A door had slammed shut for Thompson and Ritchie in March of 1969, when their employer, the American Telephone & Telegraph Co., withdrew from a collaborative project with the Photo: Alcatel-Lucent Massachusetts Institute of KEY FIGURES: Ken Thompson [seated] types as Dennis Ritchie looks on in 1972, shortly Technology and General Electric after they and their Bell Labs colleagues invented Unix. to create an interactive time- sharing system called Multics, which stood for "Multiplexed Information and Computing Service." Time-sharing, a technique that lets multiple people use a single computer simultaneously, had been invented only a decade earlier. Multics was to combine time-sharing with other technological advances of the era, allowing users to phone a computer from remote terminals and then read e -mail, edit documents, run calculations, and so forth. It was to be a great leap forward from the way computers were mostly being used, with people tediously preparing and submitting batch jobs on punch cards to be run one by one. -
Working on ENIAC: the Lost Labors of the Information Age
Working on ENIAC: The Lost Labors of the Information Age Thomas Haigh www.tomandmaria.com/tom University of Wisconsin—Milwaukee & Mark Priestley www.MarkPriestley.net This Research Is Sponsored By • Mrs L.D. Rope’s Second Charitable Trust • Mrs L.D. Rope’s Third Charitable Trust Thanks for contributions by my coauthors Mark Priestley & Crispin Rope. And to assistance from others including Ann Graf, Peter Sachs Collopy, and Stephanie Dick. www.EniacInAction.com CONVENTIONAL HISTORY OF COMPUTING www.EniacInAction.com The Battle for “Firsts” www.EniacInAction.com Example: Alan Turing • A lone genius, according to The Imitation Game – “I don’t have time to explain myself as I go along, and I’m afraid these men will only slow me down” • Hand building “Christopher” – In reality hundreds of “bombes” manufactured www.EniacInAction.com Isaacson’s “The Innovators” • Many admirable features – Stress on teamwork – Lively writing – References to scholarly history – Goes back beyond 1970s – Stresses role of liberal arts in tech innovation • But going to disagree with some basic assumptions – Like the subtitle! www.EniacInAction.com Amazon • Isaacson has 7 of the top 10 in “Computer Industry History” – 4 Jobs – 3 Innovators www.EniacInAction.com Groundbreaking for “Pennovation Center” Oct, 2014 “Six women Ph.D. students were tasked with programming the machine, but when the computer was unveiled to the public on Valentine’s Day of 1946, Isaacson said, the women programmers were not invited to the black tie event after the announcement.” www.EniacInAction.com Teams of Superheroes www.EniacInAction.com ENIAC as one of the “Great Machines” www.EniacInAction.com ENIAC Life Story • 1943: Proposed and approved. -
MAKING DATA MODELS READABLE David C
MAKING DATA MODELS READABLE David C. Hay Essential Strategies, Inc. “Confusion and clutter are failures of [drawing] design, not attributes of information. And so the point is to find design strategies that reveal detail and complexity ¾ rather than to fault the data for an excess of complication. Or, worse, to fault viewers for a lack of understanding.” ¾ Edward R. Tufte1 Entity/relationship models (or simply “data models”) are powerful tools for analyzing and representing the structure of an organization. Properly used, they can reveal subtle relationships between elements of a business. They can also form the basis for robust and reliable data base design. Data models have gotten a bad reputation in recent years, however, as many people have found them to be more trouble to produce and less beneficial than promised. Discouraged, people have gone on to other approaches to developing systems ¾ often abandoning modeling altogether, in favor of simply starting with system design. Requirements analysis remains important, however, if systems are ultimately to do something useful for the company. And modeling ¾ especially data modeling ¾ is an essential component of requirements analysis. It is important, therefore, to try to understand why data models have been getting such a “bad rap”. Your author believes, along with Tufte, that the fault lies in the way most people design the models, not in the underlying complexity of what is being represented. An entity/relationship model has two primary objectives: First it represents the analyst’s public understanding of an enterprise, so that the ultimate consumer of a prospective computer system can be sure that the analyst got it right.