Silicon Valley User Abuse Started with Bill Gates

Total Page:16

File Type:pdf, Size:1020Kb

Silicon Valley User Abuse Started with Bill Gates Silicon Valley user abuse started with Bill Gates [This is a preview excerpt from "Deaver on Cybersecurity: An irreverent and honest exposé of the online security problem, complete with a candid and thorough reveal of its solution" by F. Scott Deaver, now available from Amazon Kindle as eBook (with free versions), paperback, and hardcover at https://www.amazon.com/Deaver- Cybersecurity-irreverent-security-complete- ebook/dp/B07ZG9YBPT/ref=sr_1_1?crid=8SRF0SSU42WX&keywords=d eaver+on+cybersecurity&qid=1578669299&s=digital- text&sprefix=Deaver%2Cdigital-text%2C190&sr=1-1.] Deliberate cybersecurity vendor malfeasance Cyberextortion - leveraging and promoting fear of hacking to sell cybersecurity products that do not work - is a thriving and lucrative business in Silicon Valley. It is an unregulated for-profit subset of an industry run by corrupt mercenary bean-counters with no regard for technical competence. It should be no surprise to anyone that cyberextortion would spring from the commercial side of the software industry. In the early 1980s, the computer world was split between two very distinct and large groups with a vast unpopulated no-man's-land between them. In the one corner, we had well-entrenched and well- heeled hulking mercenary monoliths and bullies, consisting of IBM, Digital (DEC)[1], ITT[2], AT&T[3], Xerox[4], Honeywell[5], the major players in the military-industrial complex[6] remaining after the Vietnam war buildup, and the Fortune 500 companies generally[7] - all incestuously-related and intertwined over the providing and consumption of mainframe computers and services. This would be the group represented by "Hal 9000" of "Space Odyssey: 2001"[8] fame. In the other corner, far, far away, we have the academic community and hobbyists, including the likes of USC[9], MIT[10], UC Berkeley[11], the math departments of most major universities in the country, and the online (via dialup modem) community of CompuServe[12]. The world's most corrupt businesses in the age of Tom Wolfe's Bonfire of the Vanities[13] on the one side, and intelligent, well-intentioned naïve college students with no life experiences or industry familiarity on the other. Recruiters would traipse across the great divide seeking out the best and brightest academics during the school year; and upon graduation, the great migration looking for jobs and interviews in the opposite direction. Then came the crass personal computer software pioneers to fill up the great void in the middle. Generally sociopathic, mercenary, privileged, and with some unique talent, intellect, idea, or hyper- aggression to accompany their trust-funds, senses of entitlement, pedigrees (in and out of the computer sciences), and with the moral fiber of the most corrupt of thieves, man-boys like Bill Gates[14], Steve Jobs[15], and Larry Ellison[16], along with dozens of others, rose to the fore in areas in and around personal computing and distributed networking, crashing the gap between the two broad camps that previously interacted in very narrow ways. A shark invades a goldfish bowl, and the PC commercial software industry is born The intersection of Bill Gates and a group of well-meaning, naïve, not- yet-fully-baked tree-hugging students and computer geeks was akin to planting a pedophilic Catholic priest in the middle of a kindergarten playground at recess (though for the purposes of clarity, Gate's rape of his peers was purely intellectual, not sexual, as far as any known record would show). As an active hobbyist and hacker myself at the time (I am eleven months older than Bill Gates), I am intimately familiar with the environment around college campuses at the time. I was not a student, but was on campus at both Iowa State University[17] and at Drake University[18] on a daily basis for many years during this period working one-on-one with engineering and computer sciences students on prototypes and patents for my invention of the electric construction nail gun through the Center for Industrial Research and Service's[19],[20] (CIRAS) invention incubation program. At the time, the academic attitude among most students towards the computer sciences was altruistic, to say the least. It was all about applying communal effort to a common good, open-source, and shared ideas towards collaborations that helped achieve universal understanding. Code was left on chalkboards, often written in math syntax that anyone could contribute to and discuss. There simply was, during those days, no place for the concept of "mercenary me". Bill Gates and his crowd, of course, changed all of that - "mercenary me" was in their DNA. But, none of them came to the game in any upfront or honest fashion - it was intellectual rape followed by an in-your-face "I am better than you" betrayal. And no one person illustrates this better than Bill Gates. There is no question that Bill Gates is intelligent - but so, for that matter, is Ted Kaczynski[21]. And yes, the comparison is very relevant - both scored 1590 or above on their SATs and were admitted to Harvard at younger than 17 years of age on scholarship (a fascinating insight into the old SAT scores with specific reference to Kaczynski is contained in an article for the weekly Standard written by Stuart Koehl and entitled "Write Like the Unabomber"[22]). Both Kaczynski and Gates possess high Intelligent Quotients (IQ)[23] - at 165 versus 160, Kaczynski has the "advantage", though there is a theory out there that says there's an optimum IQ for conventional success (about 130) and that people who deviate too far from it (in either direction) tend to be at risk for failure by society’s standards.[24] Both Kaczynski and Gate also possess well-below-average Emotional Quotients (EQ)[25],[26],[27],[28] - neither scores well on EQ assessments of their massive collections of publicly-available materials (something Bill Gates has recently begun acknowledging, to his credit[29],[30],[31]). Here Gates has the advantage over Kaczynski - neither has anything like genuine empathy, and both Kaczynski and Gates can detect enough of a person's emotional state to protect themselves against it and manipulate/leverage it to their advantage to some degree, but Gates is better at the latter and can also simulate empathy to a certain extent, which Kaczynski simply cannot do. In terms of their Moral Quotients (MQ)[32],[33],[34],[35], neither Gates nor Kaczynski could manage a convincing toddler's crawl out of their mother's basements. Both are true narcissists and sociopaths with a robust supporting history in the public record, with Kaczynski having the more violent criminal bent and Gates having the enormous economic advantage, able to crush dissenters and whistle-blowers, and buy his way out of criminal trouble with the largest law enforcement agencies on Earth[36],[37]. Gates has used his bullying influence in philanthropy to force solutions they don't want on ignorant, impoverished third-world cultures[38],[39],[40],[41] (other than the "third-world" part, all of that should sound familiar to victims of Windows 95), and then in turn has tried to leverage that manufactured image to revise history (all while continuing to evade his fair share of taxes[42]!). [With respect to taxes, Gates showed how out of touch he was with the rest of us when he famously declared in a statement of genuinely Trumpian excess during a 2014 BBC interview[43], "I've paid more tax than any individual ever, and gladly so ... I've paid over $6 billion in taxes." The problem with that is, of course, that even if true, he paid only $6 billion in taxes on $145 billion in earnings and capital gains against a retained net worth of $101 billion (at its peak). That is a tax rate between 4.14% and 5.94%, depending upon how it is calculated. For comparison, in the same year that the statement was made (2014), the average American individual taxpayer paid $13,414 in taxes against an income of $53,657[44], a tax rate of 25.00%. So, yes, while Gates paid more in taxes than most people in terms of gross dollars, that was merely because his accumulated net worth from all his earning was roughly two million times more than the average American's annual earnings! But by percentage, Gates raped other American taxpayers, paying only one-quarter what they did in taxes. By any measure of fairness, Gates should repay the American taxpayer between $19.25 billion and $30.25 billion, the difference between the 25.00% tax he should have paid and the $6 billion he claims he actually paid.] And the idea of a bullying, tax-dodging "philanthropist" spending money that he saved himself by paying society less than he owed for his crimes (peddling mercenary incompetence on a massive scale at an extraordinary profit through an illegal monopoly) seems a little muddied to you, welcome to the world of Bill Gates. And by no coincidence whatsoever, since he contributed so extensively to it, welcome to the equally muddy world of cyberextortion. And I am fully aware that there are any number of people in Bill Gate's world as well as in cyberextortion that see no mud whatsoever - the distinction is one of the moral code, or lack thereof) of the viewer (the idea of a self-determined moral code is an oxymoron of sorts, since morality is decided by community standards, not by individuals). Bill Gates, for all his money, intelligence, talent, and accomplishments, is immoral - you simply cannot be a narcissist and/or a sociopath and be moral, because morality is at its core a community exercise, one in which empathy is a necessary factor in extracting standards of right and wrong from all the competing needs and interests of a group of people.
Recommended publications
  • Rootkit- Rootkits.For.Dummies 2007.Pdf
    01_917106 ffirs.qxp 12/21/06 12:04 AM Page i Rootkits FOR DUMmIES‰ 01_917106 ffirs.qxp 12/21/06 12:04 AM Page ii 01_917106 ffirs.qxp 12/21/06 12:04 AM Page iii Rootkits FOR DUMmIES‰ by Larry Stevenson and Nancy Altholz 01_917106 ffirs.qxp 12/21/06 12:04 AM Page iv Rootkits For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2007 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permit- ted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission.
    [Show full text]
  • INSECURE-Mag-8.Pdf
    Hello everyone, welcome to issue 8 of (IN)SECURE. We’re happy to report that our subscriber list is growing strong. This, combined with the e-mails and quality article submissions, is a clear indication that the security community has embraced this concept and found it to be a valuable resource. This issue is packed full with material for every knowledge level and will especially be of interest to those that want to know more about the inner workings of the Payment Card Industry since we got two articles related to the topic. Mirko Zorz Chief Editor Visit the magazine website at www.insecuremag.com (IN)SECURE Magazine contacts Feedback and contributions: Mirko Zorz, Chief Editor - [email protected] Marketing: Berislav Kucan, Director of Marketing - [email protected] Distribution (IN)SECURE Magazine can be freely distributed in the form of the original, non modified PDF document. Distribution of modified versions of (IN)SECURE Magazine content is prohibited without the explicit permission from the editor. For reprinting information please send an email to [email protected] or send a fax to 1-866-420-2598. Copyright HNS Consulting Ltd. 2006. www.insecuremag.com Defend Windows web servers with ThreatSentry 3.0 ThreatSentry 3.0 is a Host Intrusion Prevention System (HIPS) specifically designed to address internal and external unauthorized system access and cyber-criminal threats on Web servers utilizing Microsoft Internet Information Services (IIS). Since its introduction, IIS has grown in popularity and ranks as one of the most widely used platforms for enabling simple to sophisticated Web sites and Web-based applications.
    [Show full text]
  • Informática Básica
    Escola Estadual de Educação Profissional - EEEP Ensino Médio Integrado à Educação Profissional Curso Técnico Informática Básica Governador Cid Ferreira Gomes Vice Governador Domingos Gomes de Aguiar Filho Secretária da Educação Maria Izolda Cela de Arruda Coelho Secretário Adjunto Maurício Holanda Maia Secretário Executivo Antônio Idilvan de Lima Alencar Assessora Institucional do Gabinete da Seduc Cristiane Carvalho Holanda Coordenadora da Educação Profissional – SEDUC Andréa Araújo Rocha CURSO TÉCNICO PROFISSIONALIZANTE INFORMÁTICA BÁSICA JANEIRO / 2011 FORTALEZA/CEARÁ ESCOLA ESTADUAL DE EDUCAÇÃO PROFISSIONAL | INFORMÁTICA BÁSICA P á g i n a | 1 CURSO TÉCNICO PROFISSIONALIZANTE SECRETARIA DE EDUCAÇÃO DO CEARÁ Consultor Técnico Pedagógico Renanh Gonçalves de Araújo Equipe de Elaboração Evandilce do Carmo Pereira João Paulo de Oliveira Lima Juliana Maria Jales Barbosa Liane Coe Girão Cartaxo Moribe Gomes de Alcântara Renanh Gonçalves de Araújo Valbert Oliveira Costa Colaboradores Maria Danielle Araújo Mota Júlio César Cavalcante Bezerra FORTALEZA 2012 ESCOLA ESTADUAL DE EDUCAÇÃO PROFISSIONAL | INFORMÁTICA BÁSICA CURSO TÉCNICO PROFISSIONALIZANTE Sumário Apresentação .................................................................................................................................................. 9 Objetivos de Aprendizagem ......................................................................................................................... 10 MÓDULO 01 - O QUE É UM COMPUTADOR?História e Evolução da Informática .............................
    [Show full text]
  • Learning to Code
    PART ILEARNING TO CODE How Important is Programming? “To understand computers is to know about programming. The world is divided… into people who have written a program and people who have not.” Ted Nelson, Computer Lib/Dream Machines (1974) How important is it for you to learn to program a computer? Since the introduction of the first digital electronic computers in the 1940s, people have answered this question in surprisingly different ways. During the first wave of commercial computing—in the 1950s and 1960s, when 1large and expensive mainframe computers filled entire rooms—the standard advice was that only a limited number of specialists would be needed to program com- puters using simple input devices like switches, punched cards, and paper tape. Even during the so-called “golden age” of corporate computing in America—the mid- to late 1960s—it was still unclear how many programming technicians would be needed to support the rapid computerization of the nation’s business, military, and commercial operations. For a while, some experts thought that well-designed computer systems might eventually program themselves, requiring only a handful of attentive managers to keep an eye on the machines. By the late 1970s and early 1980s, however, the rapid emergence of personal computers (PCs), and continuing shortages of computer professionals, shifted popular thinking on the issue. When consumers began to adopt low-priced PCs like the Apple II (1977), the IBM PC (1981), and the Commodore 64 (1982) by the millions, it seemed obvious that ground-breaking changes were afoot. The “PC Revolution” opened up new frontiers, employed tens of thousands of people, and (according to some enthusiasts) demanded new approaches to computer literacy.
    [Show full text]
  • ALTAIR 8800 CLONE COMPUTER OPERATOR's MANUAL Version
    ALTAIR 8800 CLONE COMPUTER OPERATOR’S MANUAL Version 2.3, April 2021 TABLE OF CONTENTS INTRODUCTION ............................................................... 1 PART 1 – ALTAIR 8800 CLONE HARDWARE SPECIFICATIONS ......................... 2 PART 2 – CONFIGURATION MONITOR ............................................. 4 A. Floppy Disk Menu ....................................................... 4 B. PROM Menu .............................................................. 6 C. Serial Port Menu ....................................................... 7 D. Load .BIN or .HEX File ................................................. 9 E. Administration Menu .................................................... 9 PART 3 – TERMINAL EMULATOR ................................................ 14 A. Overview .............................................................. 14 B. TeraTerm Terminal Emulator ............................................ 14 C. Installing TeraTerm ................................................... 14 D. Configuring TeraTerm .................................................. 14 E. Using TeraTerm ........................................................ 15 PART 4 – ALTAIR 8800 DEMONSTRATIONS ....................................... 16 A. Kill-the-Bit Front Panel Game ......................................... 16 B. Loading and Using 4K BASIC from Paper Tape ............................ 18 C. Loading and Using 8K BASIC from Cassette .............................. 21 D. Loading and Using Disk BASIC from Floppy Disk ........................
    [Show full text]
  • MITS Altair 8800 Computer Systems Brochure
    MITS ALTAI 800 A Computer Concept Becomes an ex •ting reality. •••••••••• Contents ••••••••••••••••••••••••••• Introduction •....•.•.•.•••••••••••• 3 Altair Systems .........•........•.. 5 The Ultimate System .......•....•.•. 7 The Possibilities .......•....•....• S User Applications ......•.......•.. 10 Altair Options ..........•..•...•.• ll Processor Description ........••.•. 14 Processor Instructions ............ l5 Questions &Answers ......••....•.• 17 1....................................................... .1 Warranty: 90 days on parts and labor fOf assembled units. 90 days on parts fOf kits. Prices, spec'ifications and delivery subject to change without notice. 6328 LINN, N.E .., P.O. BOX 8636, ALBUQUERQUE, N.M. 87108 505/265-7553 © MITS, Inc. 1974 PRINTED IN U.S:A. .. PIPE DREAM? Not too long ago, the thought of an honest, full-blown, high-quality computer that sells for less than $500 would have been considered a mere pipe dream. Everyone knows that computers are monstrous, box-shaped machines that sell for 10's and 100's of thousands of dollars. Pipe dream or not, MITS, the quality engineering company that pioneered the calcu­ lator market, has made the Altair 8800 a reality. It is the realization of that day when computers arc accessible to almost anyone who wants one. I The heart (and the secret) of the M ITS Altair 8800 is the Intel 8080 processor chip. Thanks to rapid advances in integrated circuit technology, this one IC chip can now do 3 what once took thousands of electronic components (including 100's of IC's) and miles of wire. Make no mistake about it. The M ITS Altair 8800 is a lot of brain power. Its parallel, 8-bit processor uses a 16-bit address. It has 78 basic machine instructions with variances up to 200 instructions.
    [Show full text]
  • Why I Hate Microsoft by F.W
    Why I hate Microsoft by F.W. van Wensveen Why I hate Microsoft "A personal, lengthy, but highly articulate outburst" by F.W. van Wensveen Table of contents Introduction A brief introduction, or why this paper needed to be written Abstract The management summary 1. From the people who brought you EDLIN Microsoft and innovation 2. The not-so-good, the bad and the ugly The general quality of Microsoft products 3. The power to bind Formats and standards 4. World domination From business to megalomania 5. Bad practice, foul play Exploring the limits of lawful conduct 6. Caveat Emptor Think before you buy 7. Where are you forced to go today? Price gouging and other monopolist practices 8. The road ahead On diminishing returns and continuing trends Appendix A A brief overview of Windows' most serious design flaws Appendix B Links Introduction "One OS to bring them all and in the darkness bind them..." From the title of this paper you may have guessed that I am not very impressed with the guys in Redmond. One might even say that my dislike for Microsoft is a pet hate gone out of control in an almost quixotic fashion. Why is this? Of course I have been accused of personal antipathy, of being jealous of Bill Gates and his billions, and of being prejudiced against all things Microsoft without any reason whatsoever. None of this is true. I have nothing personal against Bill Gates. Why should I? I don't know the man, I've never met him. I agree with those who say he might be the most successful salesman in history.
    [Show full text]
  • Bill Gates – a Story of Success
    Bill Gates – A story of Success William H. Gates is chairperson and chief software architect of Microsoft Corporation, the worldwide leader in software services and Internet technologies for personal and business computing. Bill Gates was born on October 28, 1955 in a family having rich business, political and community service background. His great-grandfather was a state legislator and a mayor, his grandfather was vice president of national bank and his father was a lawyer. Bill strongly believes in hard work. He believes that if you are intelligent and know how to apply your intelligence, you can achieve anything. From childhood Bill was ambitious, intelligent and competitive. These qualities helped him to attain top position in the profession he chose. In school, he had an excellent record in mathematics and science. Still he was getting very bored in school and his parents knew it, so they always tried to feed him with more information to keep him busy. Bill’s parents came to know their son's intelligence and decided to enroll him in a private school, known for its intense academic environment. It was a very important decision in Bill Gate's life where he was first introduced to a computer. Bill Gates and his friends were very much interested in computer and formed "Programmers Group" in late 1968. Being in this group, they found a new way to apply their computer skill in university of Washington. In the next year, they got their first opportunity in Information Sciences Inc. in which they were selected as programmers. ISI (Information Sciences Inc.) agreed to give them royalties whenever it made money from any of the group’s program.
    [Show full text]
  • BASIC Programming with Unix Introduction
    LinuxFocus article number 277 http://linuxfocus.org BASIC programming with Unix by John Perr <johnperr(at)Linuxfocus.org> Abstract: About the author: Developing with Linux or another Unix system in BASIC ? Why not ? Linux user since 1994, he is Various free solutions allows us to use the BASIC language to develop one of the French editors of interpreted or compiled applications. LinuxFocus. _________________ _________________ _________________ Translated to English by: Georges Tarbouriech <gt(at)Linuxfocus.org> Introduction Even if it appeared later than other languages on the computing scene, BASIC quickly became widespread on many non Unix systems as a replacement for the scripting languages natively found on Unix. This is probably the main reason why this language is rarely used by Unix people. Unix had a more powerful scripting language from the first day on. Like other scripting languages, BASIC is mostly an interpreted one and uses a rather simple syntax, without data types, apart from a distinction between strings and numbers. Historically, the name of the language comes from its simplicity and from the fact it allows to easily teach programming to students. Unfortunately, the lack of standardization lead to many different versions mostly incompatible with each other. We can even say there are as many versions as interpreters what makes BASIC hardly portable. Despite these drawbacks and many others that the "true programmers" will remind us, BASIC stays an option to be taken into account to quickly develop small programs. This has been especially true for many years because of the Integrated Development Environment found in Windows versions allowing graphical interface design in a few mouse clicks.
    [Show full text]
  • M.Nlo Hrk, CA
    vee P.t). b{)x JI() pa... k.~ca.~4-02~ N-.Proflt a... U.I.I"OSTAGE PAID ",""h No. 427 M.nlo hrk, CA Celiverto+ ~• jli • ~• N n z- 0 of m,. 3 m 0 'a m 0 c:: 0 _.M• I :::II -'U UI m 'U c» of 0 m 3: DI 3 m .... D ..lI D ~ ~ 111 u::: Not too long ago it became pouible for large scale chips to be made. Intel rolled the ball with the 800e. then rolled it some more with the 8(110. This year's real winner looks like being the PACE chip, from National Semiconductor. These things are oot easy to make. The difficulty of making them is lIflormoosly increased as they get bigger ••nd a 16 bit CPu is awful big. The $lory starts with a few enthusia$ls. a blackboard and a whole crew who doubted it could be made at all. Moby chip, as it was known, was oot a project for the faint hearted. The crooked tines on the blackboard soon became straight and well defined. Very. This is the beginning of the marks which OPtically define the position of every tiny facet of the chip to be. The precision of the whole process starts here, and hera also is the place where chips can be designed not to work - tNery line is checked and rechecked and ... Sometimes a particular person can make things when others can't. There Is the tale of the big manufacturer Now the magic begins. It starts with. sinlJle Cl'VSUI which was licensing a company in another country to of pure silicon.
    [Show full text]
  • Advanced BASIC VCFE9.Pdf
    Advanced BASIC Vintage Computer Festival 9.1 Bill Degnan Course Outline • BASIC Overview • Matricies • BASIC Timing Comparisons 1977 • Micro-Soft vs. Tiny BASIC • Micro-Soft BASIC Breakdown using PEEK BASIC Overview • BASIC has three classes of capabilities: commands, statements, and functions. • Commands “part of the operating system or environment” and manipulate global items, such as programs • Statements are made up of keywords, variables, constants, operators, and functions • Functions - A user-defined and library functions. BASIC Overview • Constants. BASIC programs are made up of statements that contain keywords, variables, operators, and constants • Numeric constants (Floating point and Integer) - Each BASIC version handles numeric constants differently. • Character String constants - signaled by a quote (") • Variables - "names" that may take on different values during a problem. - vintage versions of BASIC required variables to start with a letter. Matricies (1966 Dartmouth BASIC) • A matrix is simply a rectangular array of numbers • An array is a set of numbers arranged in rows and columns • A matrix may also consist of a single row or a single column, also called “row vectors” (lists) and “column vectors”. 10 REM MATRICIES USING DARTMOUTH BASIC 20 DIM S(2,2) 30 MAT READ S ... 240 DATA 30, 50 245 DATA 40, 25 250 FOR K=1 TO 2 260 PRINT S(K,1) 270 NEXT K RUN [What would be the output??] Matricies (Digital PDP 11 BASIC) 10 DIM A(2,3) 20 FOR I=0 TO 2 30 FOR J=0 TO 3: LET A(I,J) = 0 40 NEXT J 50 NEXT I 60 FOR I = 0 TO 2: LET A(I,0) = I 70 FOR J = 0 TO 3: LET A(0,J) = J 80 PRINT A(I,J); 90 NEXT J 100 PRINT 110 NEXT I 120 END RUN 0 1 2 3 1 0 0 0 2 0 0 0 STOP AT LINE 120 READY What’s different? The Knight’s Tour • Chess is played on a square board having 64 smaller squares, eight on a side.
    [Show full text]
  • Personal Computing
    Personal Computing Thomas J. Bergin ©Computer History Museum American University Recap: Context • By 1977, there was a fairly robust but fragmented hobbyist-oriented microcomputer industry: – Micro Instrumentation Telemetry Systems (MITS) – Processor Technology – Cromemco – MicroStuf – Kentucky Fried Computers • Two things were needed for the personal computer revolution: 1) a way to store and retrieve data, and 2) a programming language in which to write applications. Homebrew Computer Club • March 5, 1975: the Amateur Computer Users Group (Lee Felsenstein, Bob Marsh, Steve Dompier, BobAlbrecht and 27 others) met in Gordon French’s garage, Menlo Park, CA • 3rd meeting drew several hundred people and was moved to the Coleman mansion • Stanford Linear Accelerator Center’s auditorium – Steve Wozniak shows off his single board computer – Steve Jobs attends meetings Homebrew-ed • 21 companies formed: – Apcose Apple – Cromemco Morrow – North Star Osborne • West Coast Computer Faire • Byte magazine, September 1975 • Byte Shop Both: images.google.com And then there was Traf-O-Data • October 28, 1955: William H. Gates III born – father: attorney mother: schoolteacher • Lakeside School: Lakeside Programming Group – Mothers Club: access to time-shared system at GE – Students hired by local firm to debug software – First computer program: Tic-Tac-Toe (age 13) – Traf-O-Data to sell traffic mgt. software (age 16) • 1973, Bill Gates enrolls at Harvard in pre-law. • Paul Allen is in his second year. January 1975, Popular Electronics: Altair • Allen shows
    [Show full text]