IBM 801 Microprocessor Oral History Panel
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Historical Perspective and Further Reading 162.E1
2.21 Historical Perspective and Further Reading 162.e1 2.21 Historical Perspective and Further Reading Th is section surveys the history of in struction set architectures over time, and we give a short history of programming languages and compilers. ISAs include accumulator architectures, general-purpose register architectures, stack architectures, and a brief history of ARMv7 and the x86. We also review the controversial subjects of high-level-language computer architectures and reduced instruction set computer architectures. Th e history of programming languages includes Fortran, Lisp, Algol, C, Cobol, Pascal, Simula, Smalltalk, C+ + , and Java, and the history of compilers includes the key milestones and the pioneers who achieved them. Accumulator Architectures Hardware was precious in the earliest stored-program computers. Consequently, computer pioneers could not aff ord the number of registers found in today’s architectures. In fact, these architectures had a single register for arithmetic instructions. Since all operations would accumulate in one register, it was called the accumulator , and this style of instruction set is given the same name. For example, accumulator Archaic EDSAC in 1949 had a single accumulator. term for register. On-line Th e three-operand format of RISC-V suggests that a single register is at least two use of it as a synonym for registers shy of our needs. Having the accumulator as both a source operand and “register” is a fairly reliable indication that the user the destination of the operation fi lls part of the shortfall, but it still leaves us one has been around quite a operand short. Th at fi nal operand is found in memory. -
John Mccarthy
JOHN MCCARTHY: the uncommon logician of common sense Excerpt from Out of their Minds: the lives and discoveries of 15 great computer scientists by Dennis Shasha and Cathy Lazere, Copernicus Press August 23, 2004 If you want the computer to have general intelligence, the outer structure has to be common sense knowledge and reasoning. — John McCarthy When a five-year old receives a plastic toy car, she soon pushes it and beeps the horn. She realizes that she shouldn’t roll it on the dining room table or bounce it on the floor or land it on her little brother’s head. When she returns from school, she expects to find her car in more or less the same place she last put it, because she put it outside her baby brother’s reach. The reasoning is so simple that any five-year old child can understand it, yet most computers can’t. Part of the computer’s problem has to do with its lack of knowledge about day-to-day social conventions that the five-year old has learned from her parents, such as don’t scratch the furniture and don’t injure little brothers. Another part of the problem has to do with a computer’s inability to reason as we do daily, a type of reasoning that’s foreign to conventional logic and therefore to the thinking of the average computer programmer. Conventional logic uses a form of reasoning known as deduction. Deduction permits us to conclude from statements such as “All unemployed actors are waiters, ” and “ Sebastian is an unemployed actor,” the new statement that “Sebastian is a waiter.” The main virtue of deduction is that it is “sound” — if the premises hold, then so will the conclusions. -
John Mccarthy – Father of Artificial Intelligence
Asia Pacific Mathematics Newsletter John McCarthy – Father of Artificial Intelligence V Rajaraman Introduction I first met John McCarthy when he visited IIT, Kanpur, in 1968. During his visit he saw that our computer centre, which I was heading, had two batch processing second generation computers — an IBM 7044/1401 and an IBM 1620, both of them were being used for “production jobs”. IBM 1620 was used primarily to teach programming to all students of IIT and IBM 7044/1401 was used by research students and faculty besides a large number of guest users from several neighbouring universities and research laboratories. There was no interactive computer available for computer science and electrical engineering students to do hardware and software research. McCarthy was a great believer in the power of time-sharing computers. John McCarthy In fact one of his first important contributions was a memo he wrote in 1957 urging the Director of the MIT In this article we summarise the contributions of Computer Centre to modify the IBM 704 into a time- John McCarthy to Computer Science. Among his sharing machine [1]. He later persuaded Digital Equip- contributions are: suggesting that the best method ment Corporation (who made the first mini computers of using computers is in an interactive mode, a mode and the PDP series of computers) to design a mini in which computers become partners of users computer with a time-sharing operating system. enabling them to solve problems. This logically led to the idea of time-sharing of large computers by many users and computing becoming a utility — much like a power utility. -
Fpgas As Components in Heterogeneous HPC Systems: Raising the Abstraction Level of Heterogeneous Programming
FPGAs as Components in Heterogeneous HPC Systems: Raising the Abstraction Level of Heterogeneous Programming Wim Vanderbauwhede School of Computing Science University of Glasgow A trip down memory lane 80 Years ago: The Theory Turing, Alan Mathison. "On computable numbers, with an application to the Entscheidungsproblem." J. of Math 58, no. 345-363 (1936): 5. 1936: Universal machine (Alan Turing) 1936: Lambda calculus (Alonzo Church) 1936: Stored-program concept (Konrad Zuse) 1937: Church-Turing thesis 1945: The Von Neumann architecture Church, Alonzo. "A set of postulates for the foundation of logic." Annals of mathematics (1932): 346-366. 60-40 Years ago: The Foundations The first working integrated circuit, 1958. © Texas Instruments. 1957: Fortran, John Backus, IBM 1958: First IC, Jack Kilby, Texas Instruments 1965: Moore’s law 1971: First microprocessor, Texas Instruments 1972: C, Dennis Ritchie, Bell Labs 1977: Fortran-77 1977: von Neumann bottleneck, John Backus 30 Years ago: HDLs and FPGAs Algotronix CAL1024 FPGA, 1989. © Algotronix 1984: Verilog 1984: First reprogrammable logic device, Altera 1985: First FPGA,Xilinx 1987: VHDL Standard IEEE 1076-1987 1989: Algotronix CAL1024, the first FPGA to offer random access to its control memory 20 Years ago: High-level Synthesis Page, Ian. "Closing the gap between hardware and software: hardware-software cosynthesis at Oxford." (1996): 2-2. 1996: Handel-C, Oxford University 2001: Mitrion-C, Mitrionics 2003: Bluespec, MIT 2003: MaxJ, Maxeler Technologies 2003: Impulse-C, Impulse Accelerated -
A Developer's Guide to the POWER Architecture
http://www.ibm.com/developerworks/linux/library/l-powarch/ 7/26/2011 10:53 AM English Sign in (or register) Technical topics Evaluation software Community Events A developer's guide to the POWER architecture POWER programming by the book Brett Olsson , Processor architect, IBM Anthony Marsala , Software engineer, IBM Summary: POWER® processors are found in everything from supercomputers to game consoles and from servers to cell phones -- and they all share a common architecture. This introduction to the PowerPC application-level programming model will give you an overview of the instruction set, important registers, and other details necessary for developing reliable, high performing POWER applications and maintaining code compatibility among processors. Date: 30 Mar 2004 Level: Intermediate Also available in: Japanese Activity: 22383 views Comments: The POWER architecture and the application-level programming model are common across all branches of the POWER architecture family tree. For detailed information, see the product user's manuals available in the IBM® POWER Web site technical library (see Resources for a link). The POWER architecture is a Reduced Instruction Set Computer (RISC) architecture, with over two hundred defined instructions. POWER is RISC in that most instructions execute in a single cycle and typically perform a single operation (such as loading storage to a register, or storing a register to memory). The POWER architecture is broken up into three levels, or "books." By segmenting the architecture in this way, code compatibility can be maintained across implementations while leaving room for implementations to choose levels of complexity for price/performances trade-offs. The levels are: Book I. -
Think Journey Business and AI Campus
Think Journey Business and AI Campus March 19–March 22 Mandalay Bay Convention Center Las Vegas Think is the flagship IBM® conference built to help enhance or jumpstart your journey to AI and the cloud. Forty-thousand of the world’s most inspiring innovators, leaders and thinkers will be in attendance; gathering to learn how AI can solve business challenges, and to discuss the current state of the art and the future possibilities of AI. Think is IBM’s only conference in 2018, and it will be your last chance until Think 2019 to learn how to make the most of AI for your business. 1 Table of Contents Top seven things to know about AI, Watson™ and Think 2018 03 Access to Watson expertise and leadership 03 Think week at-a-glance 04 Watson clients and partners 04 Entertainment at Think 04 Watson Primer 05 Watson at Work Activations 06 Future of the Call Center in Augmented Reality 07 With Watson Studio 08 The eight sessions everyone should attend 09 Watson tech talks for beginners to experts 11 Client sessions not to be missed 13 Think Campus Map 20 Watson Campus Map 20 IBM Events mobile app 21 Transportation 21 Think Journey | Business and AI Campus 2 Top seven things to know about AI, Watson and Think 2018 1. Be the first to hear about the newest Watson AI products and solutions to be unveiled at Think 2. Attend one of 50+ client-led sessions to learn about projects with Watson 3. Develop or evolve your AI strategy and business case in hands-on sessions with IBM AI experts 4. -
April 17-19, 2018 the 2018 Franklin Institute Laureates the 2018 Franklin Institute AWARDS CONVOCATION APRIL 17–19, 2018
april 17-19, 2018 The 2018 Franklin Institute Laureates The 2018 Franklin Institute AWARDS CONVOCATION APRIL 17–19, 2018 Welcome to The Franklin Institute Awards, the a range of disciplines. The week culminates in a grand United States’ oldest comprehensive science and medaling ceremony, befitting the distinction of this technology awards program. Each year, the Institute historic awards program. celebrates extraordinary people who are shaping our In this convocation book, you will find a schedule of world through their groundbreaking achievements these events and biographies of our 2018 laureates. in science, engineering, and business. They stand as We invite you to read about each one and to attend modern-day exemplars of our namesake, Benjamin the events to learn even more. Unless noted otherwise, Franklin, whose impact as a statesman, scientist, all events are free, open to the public, and located in inventor, and humanitarian remains unmatched Philadelphia, Pennsylvania. in American history. Along with our laureates, we celebrate his legacy, which has fueled the Institute’s We hope this year’s remarkable class of laureates mission since its inception in 1824. sparks your curiosity as much as they have ours. We look forward to seeing you during The Franklin From sparking a gene editing revolution to saving Institute Awards Week. a technology giant, from making strides toward a unified theory to discovering the flow in everything, from finding clues to climate change deep in our forests to seeing the future in a terahertz wave, and from enabling us to unplug to connecting us with the III world, this year’s Franklin Institute laureates personify the trailblazing spirit so crucial to our future with its many challenges and opportunities. -
Lynn Conway Professor of Electrical Engineering and Computer Science, Emerita University of Michigan, Ann Arbor, MI 48109-2110 [email protected]
IBM-ACS: Reminiscences and Lessons Learned From a 1960’s Supercomputer Project * Lynn Conway Professor of Electrical Engineering and Computer Science, Emerita University of Michigan, Ann Arbor, MI 48109-2110 [email protected] Abstract. This paper contains reminiscences of my work as a young engineer at IBM- Advanced Computing Systems. I met my colleague Brian Randell during a particularly exciting time there – a time that shaped our later careers in very interesting ways. This paper reflects on those long-ago experiences and the many lessons learned back then. I’m hoping that other ACS veterans will share their memories with us too, and that together we can build ever-clearer images of those heady days. Keywords: IBM, Advanced Computing Systems, supercomputer, computer architecture, system design, project dynamics, design process design, multi-level simulation, superscalar, instruction level parallelism, multiple out-of-order dynamic instruction scheduling, Xerox Palo Alto Research Center, VLSI design. 1 Introduction I was hired by IBM Research right out of graduate school, and soon joined what would become the IBM Advanced Computing Systems project just as it was forming in 1965. In these reflections, I’d like to share glimpses of that amazing project from my perspective as a young impressionable engineer at the time. It was a golden era in computer research, a time when fundamental breakthroughs were being made across a wide front. The well-distilled and highly codified results of that and subsequent work, as contained in today’s modern textbooks, give no clue as to how they came to be. Lost in those texts is all the excitement, the challenge, the confusion, the camaraderie, the chaos and the fun – the feeling of what it was really like to be there – at that frontier, at that time. -
The Computer Scientist As Toolsmith—Studies in Interactive Computer Graphics
Frederick P. Brooks, Jr. Fred Brooks is the first recipient of the ACM Allen Newell Award—an honor to be presented annually to an individual whose career contributions have bridged computer science and other disciplines. Brooks was honored for a breadth of career contributions within computer science and engineering and his interdisciplinary contributions to visualization methods for biochemistry. Here, we present his acceptance lecture delivered at SIGGRAPH 94. The Computer Scientist Toolsmithas II t is a special honor to receive an award computer science. Another view of computer science named for Allen Newell. Allen was one of sees it as a discipline focused on problem-solving sys- the fathers of computer science. He was tems, and in this view computer graphics is very near especially important as a visionary and a the center of the discipline. leader in developing artificial intelligence (AI) as a subdiscipline, and in enunciating A Discipline Misnamed a vision for it. When our discipline was newborn, there was the What a man is is more important than what he usual perplexity as to its proper name. We at Chapel Idoes professionally, however, and it is Allen’s hum- Hill, following, I believe, Allen Newell and Herb ble, honorable, and self-giving character that makes it Simon, settled on “computer science” as our depart- a double honor to be a Newell awardee. I am pro- ment’s name. Now, with the benefit of three decades’ foundly grateful to the awards committee. hindsight, I believe that to have been a mistake. If we Rather than talking about one particular research understand why, we will better understand our craft. -
The Computational Attitude in Music Theory
The Computational Attitude in Music Theory Eamonn Bell Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2019 © 2019 Eamonn Bell All rights reserved ABSTRACT The Computational Attitude in Music Theory Eamonn Bell Music studies’s turn to computation during the twentieth century has engendered particular habits of thought about music, habits that remain in operation long after the music scholar has stepped away from the computer. The computational attitude is a way of thinking about music that is learned at the computer but can be applied away from it. It may be manifest in actual computer use, or in invocations of computationalism, a theory of mind whose influence on twentieth-century music theory is palpable. It may also be manifest in more informal discussions about music, which make liberal use of computational metaphors. In Chapter 1, I describe this attitude, the stakes for considering the computer as one of its instruments, and the kinds of historical sources and methodologies we might draw on to chart its ascendance. The remainder of this dissertation considers distinct and varied cases from the mid-twentieth century in which computers or computationalist musical ideas were used to pursue new musical objects, to quantify and classify musical scores as data, and to instantiate a generally music-structuralist mode of analysis. I present an account of the decades-long effort to prepare an exhaustive and accurate catalog of the all-interval twelve-tone series (Chapter 2). This problem was first posed in the 1920s but was not solved until 1959, when the composer Hanns Jelinek collaborated with the computer engineer Heinz Zemanek to jointly develop and run a computer program. -
Building the Cognitive Enterprise: Nine Action Areas Deep Dive
Research Insights Building the Cognitive Enterprise: Nine Action Areas Deep Dive This Deep Dive document is the in- depth version. For an abridged version, please read, “Building the Cognitive Enterprise: Nine Action Areas, Core Concepts.” Building the Cognitive Enterprise | 1 Mark Foster Senior Vice President IBM Services and Global Business Services Introduction A new era of business reinvention is dawning. Organizations are facing an unprecedented convergence of technological, social, and regulatory forces. As artificial intelligence, blockchain, automation, Internet of Things, 5G, and edge computing become pervasive, their combined impact will reshape standard business architectures. The “outside-in” digital transformation of the past decade is giving way to the “inside-out” potential of data exploited with these exponential technologies. We call this next-generation business model the Cognitive Enterprise™. 2 | Building the Cognitive Enterprise Table of contents Executive summary 3 Introduction to the Cognitive Enterprise 4 Chapter 1 Market-making Business Platforms 11 – Double down on “Big Bets” 15 – Create a new business blueprint 19 – Orchestrate compelling change 22 – Action guide 25 Chapter 2 Intelligent Workflows 26 – Embed exponential technologies 31 – Drive value from data 37 – Deploy through hybrid multicloud 39 – Action guide 42 Chapter 3 Enterprise Experience and Humanity 43 – Elevate human-technology partnerships 47 – Cultivate smart leadership, skills, and culture 51 – Perform with purposeful agility 55 – Action guide 58 Chapter 4 New way of building: Garage 59 Conclusion A new way to grow, a new way to compete 64 Related IBM Institute for Business Value studies 65 Notes and sources 66 Executive summary | 3 Executive summary The impact of the convergence of multiple exponential ever-clearer strategic bets that they are placing. -
Changeman ZMF Administrator's Guide
ChangeManZMF Administrator’s Guide © Copyright 2001-2019 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Contains Confidential Information. Except as specifically indicated otherwise, a valid license is required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Product version: 8.2 Patch 2 Publication date: September 2019 Table of Contents Welcome to ChangeMan® ZMF. 9 Guide to ChangeMan ZMF Documentation. 9 ChangeMan ZMF Documentation Suite . 9 Using the Manuals . 11 Searching the ChangeMan ZMF Documentation Suite. 11 Using the ISPF Interface . 13 Description of the ISPF Interface. 13 Using Online Help . 13 Typographical Conventions . 14 Notes . 14 Chapter 1 Introduction . 15 Global Administrator . 16 Application Administrator . 16 Security Administrator . 16 ChangeMan ZMF Monitor . 17 General Administrator . 17 Chapter 2 What is ChangeMan ZMF? . 19 Change Package . 20 Impact Analysis . 20 Checkout . 20 Staging. 21 Audit . 21 Recompile and Relink . 22 Freeze . 22 Promotion . 23 Approval . 23 Production Installation . 23 Baseline Libraries and Delta Decks. 24 Backout Management Facilities . 24 Emergency Changes. 24 ChangeMan ZMF Life Cycle . 24 Chapter 3 Pre-Implementation Decisions .