Ovtmepeffsystems Are Steel, Electric Power, Manufacturing (Particularly the Automobile Industry) and Construction

Total Page:16

File Type:pdf, Size:1020Kb

Ovtmepeffsystems Are Steel, Electric Power, Manufacturing (Particularly the Automobile Industry) and Construction OWTftf /<?. The Fifth Generation in Japan and Europe In Japan we have developed what might be called "expert system fever." In the world of Japanese industry/there are well over a expert systems hundred that are &y~K. either already being put to practical use o^soon tcf^d. Industries engaged most actively in the research and development oVtMepeffsystems are steel, electric power, manufacturing (particularly the automobile industry) and construction. These are also the industries with the most expert systems in operation...Expert systems now under development are advanced enough for use in strategically important applications like design and planning. From Japan Computer Quarterly (No. 69. 1987), a publication of the government-sponsored Japan Information Processing Development Center (JIPDEC) Five years after their dramatic announcment of a national research project in Artificial Intelligence, the Japanese were experiencing what they call "AI boom." Japanese top management, energized by media attention to expert systems and trade shows held by both Japan's leading business newspaper and various business associations, were pressing their middle management to move into the new technology. Within the major industrial banking, and trade groups — Mitsui, Mitsubishi. Sanwa, and others - the cooperative mechanisms already in place for a learning new technology had organized study groups, foreign travel groups, lectures, and courses to train company people to lead expert system development teams. In Britain, pioneer AI and entrepreneur Donald Michie, founder of the a leading British expert system software company, told an old friend sadly but optimistically. 'The British market (for expert systems software) has been asleep but we hope it will wake up in 1987 and 1988." The British government said it was going to end funding for the British national project, Alvey, which supported expert systems work under the title Intelligent Knowledge Based Systems. Efforts were being made to convince the government to extend it In the European Economic Community, funding for the community project, ESPRIT, which supports some work on expert systems, was renewed. Among the companies, isolated examples of small systems could be found at work, but one searched in vain for applications with significant economic gain. Was Europe simply years behind, or was the activity cloaked by proprietary secrecy? It was hard to tell. Inscrutability is something we usually attribute to the East not the West Japan: the Fifth Generation Project and the expert systems fever Artificial Intelligence is a science with a thirty year history. During its first twenty five years, Jtt 2 it Urn a quiet life as the exotic subspecialty of computer science studying intelligence and performing experiments on how to make computers intelligent. For most of this time, it was supported generously by the US Defense Department and, in a much smaller and more focused way, by the Japanese government in the PIPS (Pattern Information Processing System) national project of the 19705. In 1981, the quiet obscurity of AI was transformed into highly visible frenzy by the dramatic announcementby Japan's Ministry of International Trade and Industry of a program of advanced research and development in AI, a project they named Fifth Generation Computer Systems (FGCS). Coming on the heels of MITI's highly successful efforts to promote Japanese prowess in consumer electronics and computer chips, the announcement set off alarm bells in capitals and companies of the West The story of the founding of the project was told in the book The Fifth Generation: Artificial Intelligence and Japan's Computer Challenge to the World, and in a remarkable retrospective of the key players y and their motives published in Japanese only, Japanese Dream. Five years have passed, the project is nowjffifaja^and, it is interesting to take a look at Fifth Generation progress and i problems. _vs_fe^P." _- The Fifth Generation Project was set up to develop computer hardware and software for systems they called generically Knowledge Information Processing Systems (KIPS), the same computer development that we have called knowledge processing. The KIPS* work was keyed to a specific methodology called logic programming, originally developed in Europe. The FGCS concept was breathtaking in scope, in the performance promised, and in the vision of a society transformed by KIPS. The FGCS plan promised extremely high speed problem solving, parallel computers for achieving this, and interaction with KIPS in natural (human) language, speech, and pictures. The project period was nominally 10 years (though realistically the planners admitted that more might be needed), broken into phases of three, four, and three years. A central research institute, the Institute for New Generation Computer Technology (ICOT) was established in Tokyo under the direction of an elite scientific managementteam from MITI's own laboratory, the Electrotechnical Laboratory. The team was headed by a brilliant, unorthrodox, and charismatic scientist, Kazuhiro Fuchi. To the laboratory came forty young engineers and scientists (most in their twenties) from the eight Japanese computer firms cooperating with MITI in the project The firms were Fujitsu, Hitachi, NEC, Mitsubishi, Toshiba. Matsushita, Oki, and Sharp. Each established an internal counterpart to ICOT (usually called a Fifth Generation laboratory or something similar), consisting of a "cooperating" part and a proprietary part The cooperating part contracts with ICOT for MITI funds in support of ICOT-planned or ICOT-directed work <2rf 3 and also work thought to be of importance to the community effort The proprietary part is funded by each company for its own proprietary goals. So a company's participation is threefold. It lends people to ICOT. It connects to its people and the rest of ICOT work through the cooperating part of its lab, which in turn passes knowledge to company colleagues in the proprietary part of the lab. Under the ICOT staffing plan, the scientists and engineers rotate back to their respective companies the at end of each phase. This accords not only with the demands of the companies to have prized their young people back, working within the corporate family, and with the technology transfer imperative. It also implements what some believe is the most important goal of the FGCS project~the training of a large number of highly qualified people for future work in AI and knowledge processing in Japanese companies. Mr. Konishi, one of the young and bold planners MITI who conceived the Fifth Generation Project (now a planner for NTT), in a speech he gave a for conference in Tokyo in December, 1986, put this training goal at the top a of list of FGCS goals initally set by MITI planners. We will return to this later. Phase One began immediately with a judicious pruning of the grand vision. Work on speech picture and understanding was mostly dropped in favor of industrial research labs. Language understanding research was maintained but shared with Kyoto University. The focus was on logic programming. An early model of logic processing hardware was designed by ICOT and manufactured by Mitsubishi, for internal use and later as a commercial product sold internationally. The machine is a minicomputer workstation called PSI (Personal Sequential Inference machine). A more recent version, 3-5 times faster, is called PSI-2. A high-speed version of PSI, called CHI, was built by NEC for ICOT. ICOT also reworked and extended the logic programming language PROLOG into a powerful programming tool, in which they were able to write the operating software of their machines. This effort, done under contract by Mitsubishi, resulted in the largest prolog program by far ever written, and established the Japanese as heavyweight champions of the prolog world. ICOT designed, and Hitachi built, a machine for knowledge bases (technically speaking, a relational data base machine) but the machine was not efficient and practical, so the idea was dropped in Phase Two. The public bridge relations between Phases One and Two was a large conference held in Tokyo in November 1984 to exhibit the results of the first two and a half years and build enthusiasm and consensus for Phase Two. Conference attendance was oversubscribed. ICOT people were surprised by how many people from a broad spectrum of Japanese industry were in attendance. A disappointment was the small number of university people who attended. The biggest disappointment was felt by some American and European attendees who came expecting to see the fruits of a revolution and saw instead the considerable achievements of a fast catch-up exercise. %sr 4 Phase One came to an end in March, 1985. Almost everyone except Fuchi and his cadre of group managers rotated back to the member companies, and Fuchi selected a new batch of scientists and engineers. To a Western research manager, what they did was incomprehensible. On a single day, a highly trained team of (by then) 48 technical people whose collective skill was ICOT's own knowledge base, and whose espirit de corps was built to a high level, evaporated and was replaced by new initiates. If they could survive this at all, it would mean slow-going for the first year of Phase Two. Two, Phase according to plan, was scheduled to be the period of most innovation and creativity (for these too were FGCS goals), the period for intense focus on parallel computers. Parallelism for high-speed economical computation is a world-wide goal of the computer industry, but for ICOT it meant parallel logic processing, or PIM (for Parallel Inference Machine). ICOT says it regards logic programming as "the bridge between knowledge processing and parallel machines." The initial PIM is a cluster of PSI machines whose cluster architecture is not much different from that of DEC, Encore, Alliant, Sequent, and other Western companies. Later PIM machines will consist of clusters of the original clusters (also under development in the US), and still later models will substitute PSI-2 machines for PSI.
Recommended publications
  • Validated Products List, 1995 No. 3: Programming Languages, Database
    NISTIR 5693 (Supersedes NISTIR 5629) VALIDATED PRODUCTS LIST Volume 1 1995 No. 3 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Product Data - IGES Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1995 QC 100 NIST .056 NO. 5693 1995 NISTIR 5693 (Supersedes NISTIR 5629) VALIDATED PRODUCTS LIST Volume 1 1995 No. 3 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Product Data - IGES Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1995 (Supersedes April 1995 issue) U.S. DEPARTMENT OF COMMERCE Ronald H. Brown, Secretary TECHNOLOGY ADMINISTRATION Mary L. Good, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Arati Prabhakar, Director FOREWORD The Validated Products List (VPL) identifies information technology products that have been tested for conformance to Federal Information Processing Standards (FIPS) in accordance with Computer Systems Laboratory (CSL) conformance testing procedures, and have a current validation certificate or registered test report. The VPL also contains information about the organizations, test methods and procedures that support the validation programs for the FIPS identified in this document. The VPL includes computer language processors for programming languages COBOL, Fortran, Ada, Pascal, C, M[UMPS], and database language SQL; computer graphic implementations for GKS, COM, PHIGS, and Raster Graphics; operating system implementations for POSIX; Open Systems Interconnection implementations; and computer security implementations for DES, MAC and Key Management.
    [Show full text]
  • Computer Conservation Society
    Issue Number 88 Winter 2019/20 Computer Conservation Society Aims and Objectives The Computer Conservation Society (CCS) is a co-operative venture between BCS, The Chartered Institute for IT; the Science Museum of London; and the Science and Industry Museum (SIM) in Manchester. The CCS was constituted in September 1989 as a Specialist Group of the British Computer Society. It is thus covered by the Royal Charter and charitable status of BCS. The objects of the Computer Conservation Society (“Society”) are: To promote the conservation, restoration and reconstruction of historic computing systems and to identify existing computing systems which may need to be archived in the future; To develop awareness of the importance of historic computing systems; To develop expertise in the conservation, restoration and reconstruction of historic computing systems; To represent the interests of the Society with other bodies; To promote the study of historic computing systems, their use and the history of the computer industry; To publish information of relevance to these objectives for the information of Society members and the wider public. Membership is open to anyone interested in computer conservation and the history of computing. The CCS is funded and supported by a grant from BCS and from donations. There are a number of active projects on specific computer restorations and early computer technologies and software. Younger people are especially encouraged to take part in order to achieve skills transfer. The CCS also enjoys a close relationship with the National Museum of Computing. Resurrection The Journal of the Computer Conservation Society ISSN 0958-7403 Number 88 Winter 2019/20 Contents Society Activity 2 News Round-Up 9 The Data Curator 10 Paul Cockshott From Tea Shops to Computer Company: The Improbable 15 Story of LEO John Aeberhard Book Review: Early Computing in Britain Ferranti Ltd.
    [Show full text]
  • Chapter 3. the Persistent Programming Language, PS-Algol
    https://theses.gla.ac.uk/ Theses Digitisation: https://www.gla.ac.uk/myglasgow/research/enlighten/theses/digitisation/ This is a digitised version of the original print thesis. Copyright and moral rights for this work are retained by the author A copy can be downloaded for personal non-commercial research or study, without prior permission or charge This work cannot be reproduced or quoted extensively from without first obtaining permission in writing from the author The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the author When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given Enlighten: Theses https://theses.gla.ac.uk/ [email protected] On The Utilisation of Persistent Programming Environments Richard Cooper A thesis submitted to the Faculty of Science, University of Glasgow For the degree of Doctor of Philosophy September, 1989 © R. L. Cooper, 1989 ProQuest Number: 10999281 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a com plete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. uest ProQuest 10999281 Published by ProQuest LLC(2018). Copyright of the Dissertation is held by the Author. All rights reserved. This work is protected against unauthorized copying under Title 17, United States C ode Microform Edition © ProQuest LLC.
    [Show full text]
  • ICL Technical Journal Volume 5 Issue 3
    TECHniCAl j o u m n i Volume 5 Issue 3 May 1987 Published by INTERNATIONAL COMPUTERS LIMITED at OXFORD UNIVERSITY PRESS iCL The ICL Technical Journal is published twice a year by TECHniCRl International Computers Limited at Oxford University jouRnfli Press. Editor J. Howlett ICL House, Putney, London SW15 ISW, UK Editorial Board J. Howlett (Editor) F.F. Land H.M. Cropper (F International) (London School of Economics & D.W. Davies, FRS Political Science) G.E. Felton K.H. Macdonald M.D. Godfrey M R. Miller C.H.L. Goodman (British Telecom Research (Standard Telephone Laboratories) Laboratories and Warwick J.M. Pinkerton University) E.C.P. Portman All correspondence and papers to be considered for publication should be addressed to the Editor. The views expressed in the papers are those of the authors and do not necessarily represent ICL policy. 1987 subscription rates: annual subscription £32 UK, £40 rest of world, US $72 N. America; single issues £17 UK, £22 rest of world, US $38 N. America. Orders with remittances should be sent to the Journals Subscriptions Department, Oxford University Press, Walton Street, Oxford 0X2 6DP, UK. This publication is copyright under the Berne Convention and the Interna­ tional Copyright Convention. All rights reserved. Apart from any copying under the UK Copyright Act 1956, part 1, section 7, whereby a single copy of an article may be supplied, under certain conditions, for the purposes of research or private study, by a library of a class prescribed by the UK Board of Trade Regulations (Statutory Instruments 1957, No. 868), no part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means without the prior permission of the copyright owners.
    [Show full text]
  • ICL Systems Journal
    Volume 12 Issue 1 May 1997 Edition Journal ICL Systems Journal Editor Prof. V.A.J. Mailer ICL Professor Department of Computer Studies, Loughborough University, Loughborough, Leicestershire, LE11 3TU. Editorial Board V.A.J. Mailer (Editor) C.J. Mailer (Board Secretary) A.J. Boswell M.R. Miller (BT Laboratories) P.J. Cropper W. O'Riordan D.W. Davies FRS J.V. Panter G.E. Felton J.M.M. Pinkerton PFL Forbes E.C.P. Portman J. Flowlett A. Rowley N. Kawato (Fujitsu) M.J. Rigg M.H. Kay B. C. Warboys (Univ. of Manchester) F.F. Land P.G. Wharton All correspondence and papers to be considered for publication should be addressed to the Editor. The views expressed in the papers are those of the authors and do not nec­ essarily represent ICL policy. Published twice a year by Research and Advanced Technology, ICL, Bracknell. 1997 subscription rates (including postage & packing): UK and Europe Rest of World Annual subscription £72 $120 Single issues £43 $72 © 1997 International Computers Limited, Registered Office, ICL House, 1 High Street, Putney, London SW15 1SW. Registered in England 96056 ISSN 1364-310X ICL Systems Journal Volume 12 Issue 1 Contents Editorial i Java™—An overview 1 Nic Holt Mobile Agents—The new paradigm in computing 14 L. L. Thomsen and B. Thomsen The SY Node Design 41 G. Allt, P. DeSyllas, M. Duxbury, K. Hughes, K. Lo, J. Lysons and P.V. Rose Discovering associations in retail transactions using 73 Neural Networks O.V.D. Evans Methods for Developing Manufacturing Systems Architectures 89 S. Murgatroyd and R.
    [Show full text]
  • ICL Technical Journal Volume 7 Issue 2
    ICL TECHNICAL JOURNAL Volume 7 Issue 2 November 1990 Published by International Computers Limited at Oxford University Press AN STC COMPANY iCL TECHNICAL JOURNAL The ICL Technical Journal is published twice a year by International Computers Limited at Oxford University Press. Editor J.M.M. Pinkerton ICL, Lovelace Road, Bracknell, Berks RG12 4SN Editorial Board J.M.M. Pinkerton (Editor) A. Rowley P.J. Cropper M.R. Miller D.W. Davies FRS (British Telecom Research G.E. Felton Laboratories) P. Galais (ICL France) E.C.P. Portman M.D. Godfrey (Imperial College, B.C. Warboys (University London University) of Manchester) J. Howlett H.J. Winterbotham F.F. Land (STC Technology Ltd.) (London Business School) All correspondence and papers to be considered for publication should be addressed to the Editor. The views expressed in the papers are those of the authors and do not necessarily represent ICL policy. 1990 subscription rates: annual subscription £40 UK, £44 EEC, £48 rest of world, US $95 N. America; single issues £22 UK, £25 EEC, £27 rest of world, US $52 N. America. Orders with remittances should be sent to the Journals Subscriptions Department, Oxford University Press, Pinkhill House, Southfield Road, Eynsham, Oxford 0X8 1JJ. This publication is copyright under the Berne Convention and the Inter­ national Copyright Convention. All rights reserved. Apart from any copying under the UK Copyright Act 1956, part 1, section 7, whereby a single copy of an article may be supplied, under certain conditions, for the purposes of research or private study, by a library of a class prescribed by the UK Board of Trade Regulations (Statutory Instruments 1957, No.
    [Show full text]
  • The Alvey Programme
    6/6/2018 The Alvey Programme Informatics Informatics Department The Alvey Programme Informatics → Alvey Overview The Alvey Programme was the dominating focus of Information Technology research in the period 1983 to 1988. Prior to the Alvey Programme, university, industrial and government research were primarily separate activities. The Science and Engineering Research Council's research grants were, on the whole, reactive in that proposals were sent in and SERC either accepted or rejected them. In the late 1970s, SERC had become more pro-active with the appearance of Specially Promoted Programmes such as the Distributed Computing Systems Programme that ran from 1977 to 1984. Here the emphasis was placed on a coordinated programme of research in an area which was regarded as particularly relevant. The Alvey Programme made a major change to the way computing research was organised in the UK as a whole. For a variety of reasons, it was decided that there needed to be a more focused way of doing industrial and university research in this important area. Some of the main points were: The area was pre-competitive advanced information technology research The focus was four areas that seemed particularly relevant at the time: Software Engineering Intelligent Knowledge Based Systems Man Machine Interaction Advanced Microelectronics (VLSI Design) Research was a collaboration between academia, government and industry Research was directed into important areas and coordinated Funding was substantial, £350M at 1982 prices The involvement of Informatics Department in the Programme came about because of its role in coordinating the DCS Programme and later the Software Technology Initiative. Bob Hopgood, Rob Witty and David Duce were the three academic coordinators over the life of the DCS Programme.
    [Show full text]
  • BIDS: the Revolution in Database Access BIDS: the Revolution in Database Access
    Serials - Vol. 5, No I, March 1992 BIDS: The Revolution in Database Access BIDS: The Revolution in Database Access Introduction Although the concept of information technology in libraries and access to Access to Bibliographical information resources from libraries is Databases becoming firmly established particularly in areas like OPACs (Online Public Access The concept of access to databases is well Catalogues), automated management established within library and information systems, stand alone and networked settings. Their original format consisted of CD-ROMs and online searching there is a printed abstracts and indexes which are still current development which is likely to have extremely important. From the mid 1970s a profound effect on the role of libraries the development of computer technology and information centres and their personnel allowed the establishment of computerised and on the status of the end-user. This development is BIDS, the Bath databases which are now extremely diverse (University Computing Services) IS1 and popular. In 1977 there were 15 (Institute for Scientific Information) Data identified online search services available Service, which is a networked data service to including BRS, Lockheed Dialog, OCLC over 50 academic sites, available over and SDC (now ORBIT). The development JANET (The Joint Academic Network) and of these services has grown dramatically comprising a range of IS1 databases leased since to the extent that there are now 4869 on behalf of the academic community by online databases, 2120 database producers, CHEST (Combined Higher Education 718 online services and 99 gateways (I). Software Team). The popularity of locally available This is the first time that virtually databases is a fairly recent development and unlimited end-user access to a nationwide has been due in large part to the dataset has been established anywhere in the introduction of CD-ROM products.
    [Show full text]
  • Programming Languages, Database Language SQL, Graphics, GOSIP, POSIX, Computer Security
    NIST PUBLICATIONS.. DSlflSS NISTIR 5220 (Supersedes NISTIR 5167) VALIDATED PRODUCTS LIST 1993 No. 3 Programming Languages Database Language SQL Graphics GOSIP POSIX Judy B. Kailey Computer Security Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1993 —QC 100 NIST .056 //5220 1993 I NISTIR 5220 (Supersedes NISTIR 5167) VALIDATED PRODUCTS LIST 1993 No. 3 Programming Languages Database Language SQL Graphics GOSIP POSIX Judy B. Kailey Computer Security Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1993 (Supersedes April 1993 Issue) U.S. DEPARTMENT OF COMMERCE Ronald H. Brown, Secretary NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Arati Prabhakar, Director .; *''••••• s’ ', • sv . 'oiSt^’ls'' FOREWORD The Validated Products List is a collection of registers describing implementations of Federal Information Processing Standards (FTPS) that have been validated for conformance to FIPS. The Validated Products List also contains information about the organizations, test methods and procedures that support the validation programs for the FIPS identified in this document. The Validated Products List is updated quarterly. --?' ' 'V- w. y-rY vz-v? ‘i 'i'- bs,,,%, :ufv ./5!*.->v; ‘-^Xu) ;i-- TABLE OF CONTENTS 1. INTRODUCTION 1-1 1.1 Purpose 1-1 1.2 Document Organization 1-2 1.2.1 Programming Languages 1-2 1.2.2 Database Language SQL 1-2 1.2.3 Graphics 1-2 1.2.4 GOSIP 1-2 1.2.5 POSIX 1-2 1.2.6 Computer Security 1-2 1.2.7 FIPS Conformance Testing Products 1-2 2.
    [Show full text]
  • CONTENTS Section 1. Introduction ~ Section 2. Services 2.1 Mainframe
    COMPUTER LABORATORY ANNUAL REPORT 1989/90 CONTENTS Section 1. Introduction ~ Section 2. Services 2.1 Mainframe services 2.2 Microcomputer service and support 2.3 Communications Section 3. Other Activities 3.1 Sale of Equipment and Supplies 3.2 Sale of Services Section 4. Future developments ~ Appendix A Equipment Appendix B Staff Appendix C Costs Page 1 Section 1 Introduction. 1989/90 was an encouraging year for the Laboratory as a number of new developments came to fruition. The two new ICL UNIX machines, ordered in the Summer of 1989 as a replacement for the old ICL Series 39 Level 80, went into regular service in September, and have performed very satisfactorily. The new student record system was also phased in during the year and initial experience suggests that it is preforming well and is a considerable improvement on the older procedures which it replaced. Perhaps the most important development during the year was the approval by the Policy Group on Staffing for the appointment of three additional personnel, two programmers and a technician, to the Laboratory's staff. These appointments will make a significant improvement to the department's capacity to cope with 4It the ever increasing demands, especially in the communications area and have also constituted a major boost to the morale of existing personnel. The year also saw the formalisation of the maintenance service for microcomputer and related items which the Laboratory's technicians provided on an occasional basis in the past. It is hoped that this will become a self-funding activity and will be reviewed in Trinity term after its first full year of operation.
    [Show full text]
  • Validated Products List, Volume 1, 1995 No. 1
    NISTIR 5585 (Supersedes NISTIR 5510) VALIDATED PRODUCTS LIST Volume 1 1995 No. 1 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 January 1995 QC 100 NIST .056 HO . 5585 1995 1 NISTIR 5585 (Supersedes NISTIR 5510) VALIDATED PRODUCTS LIST Volume 1 1995 No. 1 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 January 1995 (Supersedes October 1994 issue) U.S. DEPARTMENT OF COMMERCE Ronald H. Brown, Secretary TECHNOLOGY ADMINISTRATION Mary L. Good, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Arati Prabhakar, Director i FOREWORD The Validated Products List (VPL) identifies information technology products that have been tested for conformance to Federal Information Processing Standards (FIPS) in accordance with Computer Systems Laboratory (CSL) conformance testing procedures, and have a current validation certificate or registered test report. The VPL also contains information about the organizations, test methods and procedures that support the validation programs for the FIPS identified in this document. The VPL includes computer language processors
    [Show full text]
  • Making IT Work Proceedings
    Making IT Work 22-23 May 2017 Proceedings British Computer Society Southampton Street, London, UK The National Museum of Computing Bletchley Park, Milton Keynes, UK © 2017 British Computer Society and The National Museum of Computing Contents Martin Campbell-Kelly Introduction 5 Doron Swade The Historical Utility of Reconstruction and Restoration 7 Andrew Herbert, Chris Burton and David Hartley The EDSAC Replica Project 22 Christopher P. Burton Maintainability and Sustainability Issues in Restored and Replicated Computer Systems 35 John K. Chilvers Curatorial Lessons from Other Operational Preservationists 44 Robert Garner Restoring and Demonstrating 1960s Vintage Computers at the Computer History Museum 54 Robert Lusch, Nicholas Hekman, and Don Manning IBM System/360 Printer Revitalization at TechWorks! 68 Johannes Blobel and Jochen Viehoff The New Public Engagement in Computer Museums and in the History of Computing Machines 81 Benjamin J. Trethowan Capturing, Restoring, and Presenting the Independent Radar Investigation System (IRIS) 91 Peter F. Linington Constructing and Testing a Replica Store for the EDSAC 97 Nicholas Enticknap Report of the TNMoC Workshop, 23 May 2017 107 Proc. Making IT Work, 22-23 May 2017 3 Proc. Making IT Work, 22-23 May 2017 4 Introduction Martin Campbell-Kelly Editor The Making IT Work conference, 22-23 May 2017, was jointly organized by the Computer Conservation Society of the British Computer Society and The National Museum of Computing, the UK’s two leading institutions for computer conservation. The conference brought together the leaders of national and international computer conservation and restoration projects, including several recipients of the Google-sponsored Tony Sale Award for Computer Conservation.
    [Show full text]