Making IT Work Proceedings

Total Page:16

File Type:pdf, Size:1020Kb

Making IT Work Proceedings Making IT Work 22-23 May 2017 Proceedings British Computer Society Southampton Street, London, UK The National Museum of Computing Bletchley Park, Milton Keynes, UK © 2017 British Computer Society and The National Museum of Computing Contents Martin Campbell-Kelly Introduction 5 Doron Swade The Historical Utility of Reconstruction and Restoration 7 Andrew Herbert, Chris Burton and David Hartley The EDSAC Replica Project 22 Christopher P. Burton Maintainability and Sustainability Issues in Restored and Replicated Computer Systems 35 John K. Chilvers Curatorial Lessons from Other Operational Preservationists 44 Robert Garner Restoring and Demonstrating 1960s Vintage Computers at the Computer History Museum 54 Robert Lusch, Nicholas Hekman, and Don Manning IBM System/360 Printer Revitalization at TechWorks! 68 Johannes Blobel and Jochen Viehoff The New Public Engagement in Computer Museums and in the History of Computing Machines 81 Benjamin J. Trethowan Capturing, Restoring, and Presenting the Independent Radar Investigation System (IRIS) 91 Peter F. Linington Constructing and Testing a Replica Store for the EDSAC 97 Nicholas Enticknap Report of the TNMoC Workshop, 23 May 2017 107 Proc. Making IT Work, 22-23 May 2017 3 Proc. Making IT Work, 22-23 May 2017 4 Introduction Martin Campbell-Kelly Editor The Making IT Work conference, 22-23 May 2017, was jointly organized by the Computer Conservation Society of the British Computer Society and The National Museum of Computing, the UK’s two leading institutions for computer conservation. The conference brought together the leaders of national and international computer conservation and restoration projects, including several recipients of the Google-sponsored Tony Sale Award for Computer Conservation. The conference enabled practitioners of computer conservation to share knowledge, and newcomers to learn about their motives and achievements. The conference took place over two days. The first day consisted of a formal lecture programme held at the headquarters of the British Computer Society, Southampton Street, London, while the second day consisted of a workshop showcasing projects at The National Museum of Computing at Bletchley Park. Following a welcome from the chair of the Computer Conservation Society, David Morriss, the first day opened with three of the UK’s pre-eminent computer conservationists addressing the issues of utility, management, and sustainability. Doron Swade, well known for the construction of Babbage’s Difference Engine Number 2, talked about the purpose and value of these activities — whether Conference speakers and attendees at The National Museum of Computing workshop Proc. Making IT Work, 22-23 May 2017 5 Introduction they be conservation, restoration, or replication. Andrew Herbert, formerly managing director of Microsoft Research in Europe, described issues of project management in building a replica of the EDSAC — easily the most ambitious recent project of its kind. Chris Burton, the doyen of British computer conservators, spoke from long experience about the chequered history of sustaining projects once they have been completed. The afternoon session began with a lecture from John Chilvers, a distinguished conservation architect and heritage consultant, who set computer conservation in the wider context of the preservation of cherished objects, from historic buildings to railway locomotives. The final three lectures of the day came from overseas speakers. Robert Garner described the restoration of a pair of IBM 1401 computers at the Computer History Museum, Mountain View, California — this project won the 2014 Sale Award. Next, Nicholas Hekman of the Vintage IBM Computing Center at TechWorks! in Binghamton, New York, described the restoration of an IBM 1403-N1 line printer originally supplied with IBM System/360 computers — the project was runner-up for the 2016 Sale Award. Lastly, Johannes Blobel and Jochen Viehoff described the building of an ENIAC accumulator for visitor interaction at the Heinz Nixdorf MuseumsForum — the winner of the 2016 Sale Award. For those able to attend, the day closed with a convivial dinner at Bella Pasta on the Strand. The morning of the workshop at The National Museum of Computing was taken up with a series of presentations from project leaders of five of the museum’s major restoration and replication projects. Following a welcome from Andrew Herbert, chair of the museum trustees, Delwyn Holroyd described the restoration of a 1980s-era ICL 2966, the museum’s largest exhibit and one of the most powerful British mainframes. Next, Ben Trethowan talked about the IRIS, until recently a key component of the UK’s air traffic control infrastructure. He was followed by Phil Hayes who described the rebuilding of the Colossus, the World War II electronic code-breaking computer. Next Peter Linington described the fabrication of a nickel delay-line memory for the EDSAC replica. Lastly, Kevin Murrell described the restoration of the Harwell Dekatron Computer, the world’s oldest functioning computer. (Trethowan and Linington contributed papers describing their work to this volume.) During the afternoon attendees were given demonstrations of these five projects. So that they could see systems close-up and ask questions, workshop participants were divided into three circulating groups of comfortable size. A detailed account of the workshop by the computer journalist Nicholas Enticknap appears as the last paper in this volume. Proc. Making IT Work, 22-23 May 2017 6 The Historical Utility of Reconstruction and Restoration Doron Swade Royal Holloway, University of London Abstract During the last several decades there has been an increasing number of initiatives to reconstruct historic computing devices and machines, and to restore original specimens to working order. These projects pose many questions. To what extent is it allowable to compromise the physical integrity of the original to achieve a working system? What status does a “restored original” have as an evidentiary source? In the case of reconstructions, to what category of object do these new-old machines belong — fictitious antiques, new primary sources, public monuments? How important is physical fidelity to historical authenticity? What is the social and historical value of such projects to their makers, to the scholarly community, and to visitors who view them? This paper uses as case studies major reconstruction and restoration projects from the modern era to address a raft of questions agitated by such projects — museological, historiographical and social. Introduction During the last several decades there has been an increasing number of initiatives to reconstruct historic computing devices and machines, and to restore original specimens to working order. The starting point here is to take such activity as a given and, without making assumptions about the original motivations or how they might have been justified at the time, seek to reverse engineer the implications and issues that relate to their historical, museological and social meanings. The process is based on a suite of projects drawn from the major flagship projects of the modern era. A word about “utility” in the title of this presentation. “utility” is not here a reference exclusively to “practical usefulness”. The concept is borrowed from economic theory where Utility is thought of as that property of a thing that makes it desirable to possess (Robinson, 1964: p. 48). So we might say that the utility of a knife is its ability to cut. One might say that the utility of art is its aesthetic appeal or its ability to affect one. Here utility is unrelated to practical usefulness. Entirely untethering utility from practical usefulness, we have the case of the architectural folly. We might say that a folly has cultural utility or socio-cultural utility as a demonstration of wealth or status, but it is not that a folly is practically useful that makes it desirable to possess. It is its very uselessness that confers meaning on the notion of its utility and that allows us to talk meaningfully of the utility of a folly, however paradoxical this might sound. So what is it about reconstructions or restorations that makes them desirable? What is their value to history, to their makers, to their host organisations where these exist, and to their public and private audiences? None of the individual projects considered here are treated in any detail. Rather each is used as a placeholder for a particular aspect of utility. Many of the individual features are not unique to specific projects but are shared by many. Case Studies The pool of machines and projects to be drawn from includes: Thomas Fowler’s Ternary Calculating Machine (c. 1840) Charles Babbage’s Calculating Engines: Difference Engine No. 2 (1847-9); Analytical Engine (1836-71) Konrad Zuse’s Z3 (1941) Proc. Making IT Work, 22-23 May 2017 7 Doron Swade Manchester “Baby” (1948) Colossus (1943) ENIAC (1946) Ferranti Pegasus (1959) Each is used here as a place-holder for particular features it exemplifies. Thomas Fowler’s Ternary Calculator Thomas Fowler was an impoverished self-tutored fell-maker who designed and built out of wood a digital three-state mechanical calculator demonstrated in the 1840s and witnessed by no less than Mr. Babbage and Augustus de Morgan amongst others. The poverty of sources here is extreme: not only did the physical original not survive but there are no plans or drawings. Fowler refused to release details of the invention, even for evaluation and endorsement by George Biddell Airy, the Royal Astronomer. Fowler was an outsider to the London scientific establishment and paranoid about his invention being stolen, and with good reason. He had earlier invented a thermosiphon for circulating hot water in heating systems and his unprotected invention had been ripped off by unscrupulous exploiters with no financial advantage to Fowler — something that aggrieved him till his death. The sources for the reconstruction by Mark Glusker (Figure 1) are partial contemporary (19th century) textual accounts, one by de Morgan, and a memorial stained glass window installed circa 1870 in a church in Devon.
Recommended publications
  • Validated Products List, 1995 No. 3: Programming Languages, Database
    NISTIR 5693 (Supersedes NISTIR 5629) VALIDATED PRODUCTS LIST Volume 1 1995 No. 3 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Product Data - IGES Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1995 QC 100 NIST .056 NO. 5693 1995 NISTIR 5693 (Supersedes NISTIR 5629) VALIDATED PRODUCTS LIST Volume 1 1995 No. 3 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Product Data - IGES Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1995 (Supersedes April 1995 issue) U.S. DEPARTMENT OF COMMERCE Ronald H. Brown, Secretary TECHNOLOGY ADMINISTRATION Mary L. Good, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Arati Prabhakar, Director FOREWORD The Validated Products List (VPL) identifies information technology products that have been tested for conformance to Federal Information Processing Standards (FIPS) in accordance with Computer Systems Laboratory (CSL) conformance testing procedures, and have a current validation certificate or registered test report. The VPL also contains information about the organizations, test methods and procedures that support the validation programs for the FIPS identified in this document. The VPL includes computer language processors for programming languages COBOL, Fortran, Ada, Pascal, C, M[UMPS], and database language SQL; computer graphic implementations for GKS, COM, PHIGS, and Raster Graphics; operating system implementations for POSIX; Open Systems Interconnection implementations; and computer security implementations for DES, MAC and Key Management.
    [Show full text]
  • DRAM EMAIL GIM Teams!!!/Teaming Issues •Memories in Verilog •Memories on the FPGA
    Memories & More •Overview of Memories •External Memories •SRAM (async, sync) •Flash •DRAM EMAIL GIM teams!!!/teaming Issues •Memories in Verilog •Memories on the FPGA 10/18/18 6.111 Fall 2018 1 Memories: a practical primer • The good news: huge selection of technologies • Small & faster vs. large & slower • Every year capacities go up and prices go down • Almost cost competitive with hard disks: high density, fast flash memories • Non-volatile, read/write, no moving parts! (robust, efficient) • The bad news: perennial system bottleneck • Latencies (access time) haven’t kept pace with cycle times • Separate technology from logic, so must communicate between silicon, so physical limitations (# of pins, R’s and C’s and L’s) limit bandwidths • New hopes: capacitive interconnect, 3D IC’s • Likely the limiting factor in cost & performance of many digital systems: designers spend a lot of time figuring out how to keep memories running at peak bandwidth • “It’s the memory - just add more faster memory” 10/18/18 6.111 Fall 2018 2 How do we Electrically Remember Things? • We can convey/transfer information with voltages that change over time • How can we store information in an electrically accessible manner? • Store in either: • Electric Field • Magnetic Field 10/18/18 6.111 Fall 2018 3 Mostly focus on rewritable • Punched Cards have existed as electromechanical program storage since ~1800s • We’re mostly concerned with rewritable storage mechanisms today (cards were true Computer program in punched card format ROMs) https://en.wiKipedia.org/wiKi/Computer_programming_in_the_
    [Show full text]
  • SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM
    SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM HEINEMANN: AUSTRALIA First published in 1987 by HEINEMANN PUBLISHERS AUSTRALIA (A division of Octopus Publishing Group/Australia Pty Ltd) 85 Abinger Street, Richmond, Victoria, 3121. Copyright (c) 1987 by Peter Wright ISBN 0-85561-166-9 All Rights Reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. TO MY WIFE LOIS Prologue For years I had wondered what the last day would be like. In January 1976 after two decades in the top echelons of the British Security Service, MI5, it was time to rejoin the real world. I emerged for the final time from Euston Road tube station. The winter sun shone brightly as I made my way down Gower Street toward Trafalgar Square. Fifty yards on I turned into the unmarked entrance to an anonymous office block. Tucked between an art college and a hospital stood the unlikely headquarters of British Counterespionage. I showed my pass to the policeman standing discreetly in the reception alcove and took one of the specially programmed lifts which carry senior officers to the sixth-floor inner sanctum. I walked silently down the corridor to my room next to the Director-General's suite. The offices were quiet. Far below I could hear the rumble of tube trains carrying commuters to the West End. I unlocked my door. In front of me stood the essential tools of the intelligence officer’s trade - a desk, two telephones, one scrambled for outside calls, and to one side a large green metal safe with an oversized combination lock on the front.
    [Show full text]
  • Who Invented the Computer?
    Who Invented the Computer? AP This story comes from VOA Special English, Voice of America's daily news and information service for English learners. Read the story and then do the activities in the worksheet at the end. Millions of us use them every day. Some are so large they have to sit on the floor. Others are so small that they fit in our hand. They help us with mathematical problems, store our music and pictures, and are needed to search the Internet. They are, of course, computers. So try this experiment. Ask a friend or just someone you see on the street this question: “Who invented the computer?” Some people cannot live without computers, but we know very little about who invented them. So who did it? Are you ready? The answer is … we do not know for sure. Many people who know a lot about information technology might say computers were invented by Alan Turing. He was a British mathematician who helped solve coded messages from Germany during World War Two. Many people consider him the “father of computer science.” But to find the first person who thought he could make a computing device, we have to go back one hundred eighty years to a man named Charles Babbadge. He also was British. Special English is part of VOA Learning English: voanews.com/learningenglish | December 2011 | 1 Recently, researchers in his home country announced plans to use millions of dollars to build one of Babbadge’s “Analytical Engines.” John Graham- Cumming and Doron Swade are supervising the project at the Science Museum in London.
    [Show full text]
  • Computer Conservation Society
    Issue Number 88 Winter 2019/20 Computer Conservation Society Aims and Objectives The Computer Conservation Society (CCS) is a co-operative venture between BCS, The Chartered Institute for IT; the Science Museum of London; and the Science and Industry Museum (SIM) in Manchester. The CCS was constituted in September 1989 as a Specialist Group of the British Computer Society. It is thus covered by the Royal Charter and charitable status of BCS. The objects of the Computer Conservation Society (“Society”) are: To promote the conservation, restoration and reconstruction of historic computing systems and to identify existing computing systems which may need to be archived in the future; To develop awareness of the importance of historic computing systems; To develop expertise in the conservation, restoration and reconstruction of historic computing systems; To represent the interests of the Society with other bodies; To promote the study of historic computing systems, their use and the history of the computer industry; To publish information of relevance to these objectives for the information of Society members and the wider public. Membership is open to anyone interested in computer conservation and the history of computing. The CCS is funded and supported by a grant from BCS and from donations. There are a number of active projects on specific computer restorations and early computer technologies and software. Younger people are especially encouraged to take part in order to achieve skills transfer. The CCS also enjoys a close relationship with the National Museum of Computing. Resurrection The Journal of the Computer Conservation Society ISSN 0958-7403 Number 88 Winter 2019/20 Contents Society Activity 2 News Round-Up 9 The Data Curator 10 Paul Cockshott From Tea Shops to Computer Company: The Improbable 15 Story of LEO John Aeberhard Book Review: Early Computing in Britain Ferranti Ltd.
    [Show full text]
  • Metal Ultrasonic Delay Lines
    Research Paper 2453 rOOmOI of R~eo"h of The NO tiO ~;;:if ~;=asoni;l~~i~;~~~:: Russell W . Mebs, John H. Darr, and John D. Grimsley A study was made of the applicability of a number of metals and a lloys for therm all y stable ultrasonic delay lin es. A preliminary iavestigation was made of different types of pressure holders and ad­ hesi ves for use in crystal t ransducer attachments and of the iafluence of specimen length on attenuation for valious m etals and alloy. The effect of cold-work, annealing, and specimen cross section on attenuation was a lso determined for a representati ve isoelastic alloy. Measurements of temperature variation of signal attenuation, distort ion, a nd delay t im e on a number of assembled delay lines indicated t hat an isoelastic a lloy employing over cured epoxy-resin crystal attachments gave best over-all t ransmission characteristics. No correlation was obtainable between strength and SOLl nd-transmission characteristics with varioLls cemented joints. 1. Introduction variations in pulse attenuation and distortion with acceleration or change of temperature. The ultrasonic delay line has come into wide use Only a general survey will be given of the basic in recent years with the development of radar, com­ theory of ultrasonic transmission as related to delay ~uters , and other electronic devices [1 , 2, 3, 4V It lines of 50 tLsec or less. More comprehensive 's a means for delaying a signal for a predetermined treatments have been given elsewhere [2, 4, and 5]. ~hort period to be accurately reproduced for use at _tn appropriate later instant.
    [Show full text]
  • June 1St Heath Robinson Operational
    similar vein to Rube Goldberg in The Mark 2 supported the US). conditional branching, just as Charles Babbage’s analytical June 1st The machine consisted of a engine had done [Dec 23], frame (called the bedspread) although there’s no evidence to which supported two long suggest that the Mark 2's Heath Robinson teleprinter paper tapes on a designer, Tommy Flowers [Dec network of reels, and two other 22], was aware of Babbage's Operational racks holding counters and logic design. June 1, 1943 circuits. Ten Colossi were operating by One tape could hold 2,000 The "Heath Robinson" was a the end of the war and an characters of cipher text, while code-breaking machine used at eleventh had been the other stored patterns that Bletchley Park [Aug 15] to help commissioned. They allowed the the codebreakers believed might decrypt the Lorenz (aka Tunny) Allies to extract a vast amount of represent the Lorenz cipher. intelligence from intercepted encryption. The second tape had radio messages sent from Lorenz was a much more to be precisely one character German High Command advanced cipher than the better longer than the first, and throughout Europe. known Enigma [Feb 23]. For keeping the tapes synchronized example, Enigma machines was a major challenge. A functioning reconstruction of a initially used just three rotors Mark 2 was completed in 2008 Max Newman [Feb 7] was during their encryption process, by Tony Sale and volunteers; it's while a Lorenz device employed responsible for the Robinson's on display at The National functional specification, but twelve.
    [Show full text]
  • Lovelace & Babbage and the Creation of the 1843 'Notes'
    Lovelace & Babbage and the Creation of the 1843 ‘Notes’ John Fuegi and Jo Francis Flare/MITH Augusta Ada Lovelace worked with Charles Babbage to create a description of Babbage’s unbuilt invention, the Analytical Engine, a highly advanced mechanical calculator often considered a forerunner of the electronic calculating computers of the 20th century. Ada Lovelace’s “Notes,” describing the Analytical Engine, published in Taylor’s Scientific Memoirs in 1843, contained a ground-breaking description of the possibilities of programming the machine to go beyond number-crunching to “computing” in the wider sense in which we understand the term today. This article expands on research first presented by the authors in their documentary film, To Dream Tomorrow. What shall we do to get rid of Mr. Babbage and known to have crossed the intellectual thresh- his calculating Machine? Surely if completed it old between conceptualizing computing as would be worthless as far as science is con- only for calculation on the one hand, and on cerned? the other hand, computing as we know it —British Prime Minister Sir Robert Peel, 18421 today: with wider applications made possible by symbolic substitution. The Analytical Engine does not occupy common In an early background interview at the ground with mere ‘calculating machines.’ … In Science Museum (London) for the historical enabling mechanism to combine together gen- documentary film about collaboration between eral symbols, in successions of unlimited variety Lovelace and Babbage, To Dream Tomorrow,3 and extent, a uniting link is established between Babbage authority Doron Swade mentioned the operations of matter and the abstract mental that he thought Babbage and Lovelace had processes of the most abstract branch of mathe- “very different qualities of mind.” Swade’s matical science.
    [Show full text]
  • Who Was Charles Babbage?
    Click here for Full Issue of EIR Volume 27, Number 20, May 19, 2000 EIRBooks Who Was Charles Babbage? by Lyndon H. LaRouche, Jr. of the Analytical Engine that was under construction at the time of Babbage’s death, all he ever built of that The Cogwheel Brain revolutionary machine. Its modest size gives little clue by Doron Swade to the monumental intellectual accomplishment of its London: Little, Brown, 2000 conception and its much publicized role as the symbolic 342 pages, hardbound, £14.99 antecedent of the modern computer.” That part of Swade’s account, covering the period from May 11, 2000 the launching of the Science Museum’s Babbage project, from May 20, 1985 through the public demonstration of No- The specific merit in Doron Swade’s new assessment of vember 29, 1991, occupies the concluding, third section of his Charles Babbage’s role in the development of modern mathe- book, which is subtitled: “A Modern Sequel.” For qualified matical computing machines, lies in Swade’s notable part in specialists familiar with earlier standard sources on Bab- the actual construction of a machine according to Babbage’s bage’s life and work, the useful contribution of Swade’s book, own designs. Swade describes the circumstances leading into lies almost entirely in the content of that third section. the first public demonstration, which was made in London, The misleading elements in the earlier part of Swade’s on Friday, November 29, 1991, three days after inventor Bab- book as a whole, lie in his fallacy of composition. Instead of bage’s 200th birthday.
    [Show full text]
  • MTAT.07.006 Research Seminar in Cryptography the Enigma Cipher Machine
    MTAT.07.006 Research Seminar in Cryptography The Enigma Cipher Machine Kadri Hendla November 28, 2005 Abstract 3.1 The Rotors The aim of this survey is to give a brief overview on Rotors are the most important part of an Enigma Enigma cipher machine and its cryptanalysis before machine. A rotor is a disc about 10 cm in diameter and during the Second World War. The survey is and it’s usually made of hard rubber or bakelite. mostly based on the articles [1] and [7] on Enigma On one face are 26 brass pins forming a circle; on from Wikipedia. the other side are corresponding electrical contacts. Each pin represents a letter in the alphabet. Inside the rotor are 26 wires connecting the pins on one 1 Introduction side to the contacts on the other side; the wiring is different for each rotor. The rotor also has a finger Enigma is a portable cipher machine, famous for wheel for turning the rotor by hand and an alpha- the role it played in World War II. The breaking of bet ring, so the operator can see the rotor position. Enigma codes is considered to be one of the reasons In the earlier versions of Enigma the alphabet ring for the Allies victory. was fixed; the later versions allowed adjusting the alphabet ring relative to the core wiring. This po- sition of the ring is known as the ring settings. The 2 History of Enigma rotors are placed in the machine side by side, which causes the pins and contacts of the neighbouring In 1918 German engineer Arthur Scherbius applied rotors to form an electrical connection.
    [Show full text]
  • Colossus – NZZ Artikel – Dominik Landwehr – März 2007 1/17
    Colossus – NZZ Artikel – Dominik Landwehr – März 2007 1/17 Colossus: 15 000 Röhren knacken den Nazi-Code Bletchley Park rekonstruiert einen frühen Computer Mit einem beispiellosen Aufwand gelang es den Briten im Zweiten Weltkrieg die deutsche Chiffriermaschine Enigma zu knacken. Weniger bekannt ist die Tatsache, dass sie dank einer Maschine namens 'Colossus' auch einen weit komplexeren deutschen Fernschreiber-Code brechen konnten. 'Colossus' nimmt in der Ahnengalerie der Computergeschichte einen Ehrenplatz ein und ist seit kurzem in Bletchley Park als funktionsfähiger Nachbau zu besichtigen. Von Dominik Landwehr 14 Jahre akribischer Arbeit stecken hinter dem Projekt der Colossus-Rekonstruktion. Damit konnte der britische Ingenieur und Nachrichtendienst-Spezialist Tony Sale eine seiner Visionen wahr machen.(Foto Dominik Landwehr) Colossus – NZZ Artikel – Dominik Landwehr – März 2007 2/17 Gewiss, es gibt grössere Museen zur Technik und besonders der Computergeschichte als jenes von Bletchley Park: Zu nennen wäre das Science Museum in London, das Deutsche Museum in München, das Heinz Nixdorf MuseumsForum in Paderborn oder das Computer History Museum im kalifornischen Mountain View. Bletchley Park – eine Zugstunde nördlich von London genau in der Mitte zwischen Oxford und Cambridge gelegen – ist dennoch etwas einzigartiges und das hängt vor allem mit seinem ’genius loci’ zusammen. Die goldenen Eier von Bletchley Park Im Rahmen einer geheimen Operation wurde hier im Zweiten Weltkrieg ein wesentlicher Teil des Nachrichtenverkehrs von Hitler Deutschland entschlüsselt. Die wichtigsten hier dekodierten Nachrichten wurden unter dem Aktenvermerk 'Ultra' nur höchsten Entscheidungsträgern zugänglich gemacht. Die Entschlüsselung geschah gewissermassen auf industrieller Basis: Bis zu zehntausend Menschen – die meisten davon Frauen – arbeiteten in Bletchley Park rund um die Uhr.
    [Show full text]
  • Publications Core Magazine, 2007 Read
    CA PUBLICATIONo OF THE COMPUTERre HISTORY MUSEUM ⁄⁄ SPRINg–SUMMER 2007 REMARKABLE PEOPLE R E scuE d TREAsuREs A collection saved by SAP Focus on E x TRAORdinARy i MAGEs Computers through the Robert Noyce lens of Mark Richards PUBLISHER & Ed I t o R - I n - c hie f THE BEST WAY Karen M. Tucker E X E c U t I V E E d I t o R TO SEE THE FUTURE Leonard J. Shustek M A n A GI n G E d I t o R OF COMPUTING IS Robert S. Stetson A S S o c IA t E E d I t o R TO BROWSE ITS PAST. Kirsten Tashev t E c H n I c A L E d I t o R Dag Spicer E d I t o R Laurie Putnam c o n t RIBU t o RS Leslie Berlin Chris garcia Paula Jabloner Luanne Johnson Len Shustek Dag Spicer Kirsten Tashev d E S IG n Kerry Conboy P R o d U c t I o n ma n ager Robert S. Stetson W E BSI t E M A n AGER Bob Sanguedolce W E BSI t E d ESIG n The computer. In all of human history, rarely has one invention done Dana Chrisler so much to change the world in such a short time. Ton Luong The Computer History Museum is home to the world’s largest collection computerhistory.org/core of computing artifacts and offers a variety of exhibits, programs, and © 2007 Computer History Museum.
    [Show full text]