Soviet Computer Software and Applications in the 1980'S

Total Page:16

File Type:pdf, Size:1020Kb

Soviet Computer Software and Applications in the 1980'S RESEARCH REPORT T O THE NATIONAL COUNCIL FOR SOVIET AND EAST EUROPEAN RESEARC H TITLE : SOVIET COMPUTER SOFTWAR E AND APPLICATIONS IN THE 1980 S AUTHOR : Richard W . Judy Robert W . Cloug h CONTRACTOR : Hudson Institute, Inc . PRINCIPAL INVESTIGATOR : Hans Heymann, Jr . COUNCIL CONTRACT NUMBER : 801-0 5 DATE : June 198 9 The work leading to this report was supported by funds provided b y the National Council for Soviet and East European Research . Th e A analysis and interpretations contained in the report are those o f the authors . NOTE This report is an incidental product of the Council - funded research contract identified on the face page . It is not the Final Report under that contract, whic h was distributed in May 1989 . 4 Soviet Computer Software an d Applications in the 1980s by Richard W. Judy an d Robert W. Clough HI-4090-P January 9, 198 9 Subsection of "The Implications of the Information Revolutio n for Soviet Society" This study was funded, in part, by the National Counci l For Soviet and East European Research Herman Kahn Center n P .O. Box 26919 n Indianapolis. IN 46226 ( Soviet Computer Software and Application s in the 1980s by Richard W. Judy and Robert W . Clough* Introduction and Summary 3 Soviet Software Developments in the 1980s 10 Key Elements of Soviet Software 1 0 Operating Systems 1 0 RIAD Operating Systems 1 1 SM Operating Systems 14 . Micro Operating Systems 1 6 Programming Languages 1 8 Application Programs 2 1 Data Base Management Systems (DBMS) for RIAD and S M Computers 2 1 Personal Computer Applications 27 The Soviet Software Industry: Issues and Prospects 30 Application and Absorption of Computers in the Soviet Union 36 ASU: Automated Systems of Control 36 Two Families of ASUs 39 The Early Enthusiasm for Organizational ASUs 40 The Shift Toward Production ASUs 43 Soviet Research and Development Applications 45 Computers in Western R&D 45 Distributed Information Systems to the Fore 46 User Friendliness and the Man-Machine Interface 47 Parallel Processing and the "Fifth Generation" 48 Supercomputers and More Computers 49 R&D as a Consumer of Information Technology 49 Teamwork and Creation in Modern Science and Technology 50 The Importance of Informal Communication Among Scientists 5 1 Richard W. Judy is a Senior Research Fellow and Robert W . Clough is a Research Analyst of Hudson Institute, Indianapolis, Indiana . The views expressed herein are th e authors' own. The research reported for this paper was supported in part by the Nationa l Council for Soviet and East European Research and assisted by a travel grant from IREX , the International Research and Exchanges Board . The authors gratefully thank Virgini a Clough of Hudson Institute and Steven Flinn of Indiana University for their vital assistance . Computers in Soviet Research and Development 52 Computer Usage in Soviet R&D Institutions 54 Some Examples of Soviet R&D Computer Establishments 5 9 The Impact of Computer Deficiencies on Soviet R&D 63 Computer Networking in the USSR 7 1 Types of Soviet Computer Networks 72 The Progress and Problems of Soviet Computer Networking 74 Soviet Bibliographical Networks 75 The Science and Technology Information Network (SATsNTI) 75 The All-Union Scientific and Technical Information Center of the Stat e Committee of Science and Technology (VNTITs GKNT) 8 1 Akademset': The Network of the Academy of Sciences 82 Scientific Networking in the West: Some Relevant Contrasts 92 Remarks on Communications in the Soviet R&D Community 94 Computer Aided Design (CAD) 95 Computer Aided Design in the West 95 Soviet CAD Objectives 97 Soviet CAD Experience 98 Soviet Hardware for CAD 10 1 ( Soviet Software for CAD 11 1 Soviet Installations of CAD : Some Examples 114 Problems and Resistance 11 6 Computer Aided Manufacturing (CAM) 11 9 The Components of CAM 11 9 Numerically Controlled (NC) machine tools 11 9 Computer Numerically Controlled (CNC) Machine Tools 120 Flexible Manufacturing Systems (FMS) 120 Computer Aided Process Planning (CAPP) 12 1 Computer Aided Quality Control (CAQ) 122 Computer Integrated Manufacturing (CIM) 122 Western Literature About Soviet CIM 123 Soviet CAM Objectives 123 Soviet CAM Experience 126 Soviet Hardware for CAM 126 Soviet CAM Software 134 Soviet Applications of CAM: Some Examples 13 6 CAM in the USSR: Problems and Evaluations 13 9 A Final Note on Soviet CAM 147 A Profile of Computer Usage in the Leningrad Region 148 Endnotes 153 Bibliography 165 2 1. Introduction and Summary Does Ivan compute? If not, why? If so, how and how well? And if not well, wha t price does he pay for it ? Reduced to their essentials, these are the main questions addressed in this paper . We purposely do not pose the question, "Can Ivan compute?" because the evidence clearl y indicates that he can . One need not reach for the image of the Soviet space shuttle Buran executing flawless orbital flight and landing totally under automatic control to make the point. There are plenty of other examples to support the contention that Sovie t programmers are a talented subspecies. Ivan can compute, but the fact is that he does les s of it than Johnny...or Pierre or Fritz. Indeed, it seems that he does proportionately less o f it than anybody else in the developed world . Still, computers do exist in the USSR, probably more than 200,000 of them . In a companion paper, we have surveyed the state of Soviet computer hardware .1 Another companion paper addresses the state of Soviet telecommunications? Here we survey some aspects of the Soviet computer software world and examine how computers are applied i n several of the fields that enjoy a high level of official support . Section 2 concentrates on Soviet software . One main conclusion to emerge is that Soviet systems software in widespread use, i .e., operating systems and programmin g languages, derives entirely from the West . Up to a point, that is hardly surprising given that Soviet mainframes, minicomputers, and microcomputers are all technological derivatives of Western predecessors and that one of the purposes of copying Wester n hardware designs is to gain access to the vast "library" of applications software alread y developed in the West. Perhaps more surprising is the fact that the Soviets, b y 3 unimaginatively following Western precedents, have saddled themselves with the sam e deficiencies that plagued the Western originals. Until now, Soviet software engineers have lavished little or no creativity on their systems software . The applications software scene in the USSR is strikingly different than its counterpart in the United States, which has a multi-billion dollar per year industry engage d in designing and developing commercial software for every category of compute r equipment. Software companies market products aimed at customers from the broades t "horizontal" user groups to the narrowest "vertical" niches .3 With one exception, horizontal applications software barely exists in the USSR . That exception is data base management systems (DBMS) which are surveyed in section 2.1 .3 . As with systems software, the most widely used Soviet DBMSs are either direct copies or derivatives of Western products . Conceptual originality appears entirely absent . One design of the late 1980s is toward DBMSs that employ Russian syntax (as opposed t o English in the earlier versions) and are otherwise somewhat more user-friendly . Another trend follows earlier Western moves to exploit the growing computing power and memor y capacity provided by new hardware models. Still, Soviet DBMS technology lags far behin d Western levels . Most other applications software in the Soviet Union is custom-developed by users or their ministries. Although inter-ministerial software clearinghouses do exist, the softwar e that they receive is typically bug-ridden, poorly documented, and badly supported . Understandably, few elect to use this "bugwear" and most packages offered by th e clearinghouses are used by nobody other than their creators . Within enterprises, and eve n ministries, the quality of some applications software is thought to be rather high althoug h 4 much of it represents mediocre and expensive duplication of effort . The Soviets are now producing tens of thousands of IBM-compatible persona l computers each year; they will soon be producing (or purchasing abroad) hundreds of thousands of them annually . There can be little doubt that the authorities have decided t o press ahead with the PC "revolution" at least to the extent of equipping millions of Soviet offices with these machines . Soviet PC software is, if anything, even more derivative than software for mainframes and minicomputers . Pirated or slightly modified versions of popular first-generation Western CP/ M software abounds in the Soviet PC world. In large part, this is due to the numerica l preponderance of PCs employing the Soviet version of Intel's older 8080 micro-processor . Unauthorized copies and modifications of WORDSTAR, SUPERCALC, and dBASE II circulate and are even described in the Soviet literature . Although MS-DOS software is beginning to appear, it is not yet so predominate among Soviet PC users as it is in the West. That will change with the growth in the installed base of Soviet PCs using Intel' s 8086, 8088, and other more recent chips or their clones . The Soviet applications software industry is and has always been a shambles . Indeed, it does not deserve to be called an "industry ." This sorry state of affairs is entirely obvious to both users and industry leaders but, to date, Soviet policy makers have bee n unable to deal effectively with it. The problem is so recalcitrant because it reflects endemi c weaknesses of the larger Soviet economic system. Efforts to remedy the problem by exhortation, creation of new bureaucratic entities with no real authority, and cracking ministerial heads have all proven ineffective .
Recommended publications
  • IDMS Conversion
    IDMS Conversion The Modern Systems IDMS conversion includes the generation of a new relational database to replace the functionality, set relationships, indexes, and data structures that are currently part of the IDMS network database. The new target database can reside on or off the mainframe, and can use any of the standard relational database management systems (RDBMS): Microsoft SQL Server, Oracle or IBM DB2. Database Functionality DB-Shuttle™ provides The Modern Systems solution provides a complete replacement for all IDMS automated technology database functionality: that protects legacy assets, reduces • IDMS record layouts maintenance costs, • Group-level elements, Occurs and Redefines clauses within IDMS record provides agility and definitions flexibility, and enables • Set definitions (record-to-record relationships) Service-Oriented • System-owned indexes Architecture (SOA) • Bill-of-material structures within business-critical • Multi-member sets, multi-set relationships between two record types applications. • Duplicate CALC designations • Sorted sets, Chained sets and NEXT sets Relational Results The resulting database is fully relational. Primary keys, foreign keys and index definitions are automatically created. All constraints are generated into the resulting DDL. Table spaces, indexes, table names and column names are all generated according to your naming standards. Delivered Components As part of the delivery process, Modern Systems generates and delivers the following component types for installation in the new relational
    [Show full text]
  • Defense Industry Restructuring in Russia
    S t a n f o r d U n i v e r s i t y C I S A C Center for International Security and Arms Control The Center for International Security and Arms Control, part of Stanford University’s Institute for International Studies, is a multidisciplinary community dedicated to research and train- ing in the field of international security. The Center brings together scholars, policymakers, scientists, area specialists, members of the business community, and other experts to examine a wide range of international security issues. CISAC publishes its own series of working papers and reports on its work and also sponsors a series, Studies in International Se- curity and Arms Control, through Stanford University Press. Center for International Security and Arms Control Stanford University 320 Galvez Street Stanford, California 94305-6165 (415) 723-9625 http://www-leland.stanford.edu/group/CISAC/ Contents Acknowledgments iv Executive Summary v I Introduction 1 Section One: Case Studies II The Central Aerohydrodynamic Research Institute (TsAGI) 9 III ELVIS+ and The Moscow Center for SPARC Technology (MCST) 28 IV Impuls 45 V The Mashinostroenie Enterprise 59 VI The Saratov Aviation Plant 79 Section Two: Analysis VII Privatization at Four Enterprises 111 VIII Organizational Restructuring 137 IX Principal Differences in Accounting Systems in Russia 163 and the United States X Reallocation of the Social Services 183 XI Conclusion 207 Glossary 216 1 Acknowledgments Many people have contributed to this report, and still more have contributed to the research leading up to it. In writing this report, we have not attempted to reach consensus among the authors on the interpretations to be drawn from the data.
    [Show full text]
  • DESIGN-DRIVEN APPROACHES TOWARD MORE EXPRESSIVE STORYGAMES a Dissertation Submitted in Partial Satisfaction of the Requirements for the Degree Of
    UNIVERSITY OF CALIFORNIA SANTA CRUZ CHANGEFUL TALES: DESIGN-DRIVEN APPROACHES TOWARD MORE EXPRESSIVE STORYGAMES A dissertation submitted in partial satisfaction of the requirements for the degree of DOCTOR OF PHILOSOPHY in COMPUTER SCIENCE by Aaron A. Reed June 2017 The Dissertation of Aaron A. Reed is approved: Noah Wardrip-Fruin, Chair Michael Mateas Michael Chemers Dean Tyrus Miller Vice Provost and Dean of Graduate Studies Copyright c by Aaron A. Reed 2017 Table of Contents List of Figures viii List of Tables xii Abstract xiii Acknowledgments xv Introduction 1 1 Framework 15 1.1 Vocabulary . 15 1.1.1 Foundational terms . 15 1.1.2 Storygames . 18 1.1.2.1 Adventure as prototypical storygame . 19 1.1.2.2 What Isn't a Storygame? . 21 1.1.3 Expressive Input . 24 1.1.4 Why Fiction? . 27 1.2 A Framework for Storygame Discussion . 30 1.2.1 The Slipperiness of Genre . 30 1.2.2 Inputs, Events, and Actions . 31 1.2.3 Mechanics and Dynamics . 32 1.2.4 Operational Logics . 33 1.2.5 Narrative Mechanics . 34 1.2.6 Narrative Logics . 36 1.2.7 The Choice Graph: A Standard Narrative Logic . 38 2 The Adventure Game: An Existing Storygame Mode 44 2.1 Definition . 46 2.2 Eureka Stories . 56 2.3 The Adventure Triangle and its Flaws . 60 2.3.1 Instability . 65 iii 2.4 Blue Lacuna ................................. 66 2.5 Three Design Solutions . 69 2.5.1 The Witness ............................. 70 2.5.2 Firewatch ............................... 78 2.5.3 Her Story ............................... 86 2.6 A Technological Fix? .
    [Show full text]
  • Miami-Dade County
    MIAMI-DADE COUNTY Cognos Business Analytics and IDMS Integration at Miami-Dade County Abstract of the Program Miami-Dade County led the way as the first company in the world to successfully extract information from a CA IDMS network database using IBM Cognos Business Analytics. Miami- Dade County stores the majority of their critical data, such as Criminal Justice, Payroll, Traffic and Building information in CA IDMS mainframe databases and traditionally extracts this data using Computer Associates CA IDMS tools (CA ADS ADS/O and IDMS/Cobol/IDMS). Through the collaboration of CA Computer Associates, IBM, and Miami-Dade County, a driver was created for IBM Cognos to access this data directly by using Business Analytics tools without the need for exporting the data into a contemporary distributed environment. The problem or need for the program IDMS (Integrated Database Management System) is primarily a network (CODASYL) database management system for mainframes. Only CA tools could access IDMS data. IDMS mainframe technology did not have the capability to be accessed directly by contemporary business analytics software solutions. This limitation required data extraction, file transfer protocols, and script loading processes to expose IDMS, IMS, and DB2 mainframe data to contemporary technologies, including business analytics tools like IBM Cognos Analytics. Multiple data warehouses and operational data stores are loaded from the primary data sources originating from the IDMS mainframe platform and other relational data sources. More than 50 production IDMS databases are actively supported and used county-wide at Miami- Dade County. Access to data by the distributed world such as making the data available on an Oracle or MSSQL database requires adding multiple intermediate steps, using multiple technologies, and multiple points of failure to migrate data and make it available to analytic technologies.
    [Show full text]
  • EVOLUTION of Cowtrot SYSTEMS for Aecelsiato&S
    - 271 - EVOLUTION OF COWTROt SYSTEMS FOR AeCELSiAtO&S M.C. Crovley-Milling CRM, Geneva 1, HISTORICAL The ««liest accelerator* wer« quite •»*'. 1, and their controls few, as can be seen from fig. 1 which ahow* the 11-inch eye lot ron built by Lawrence and Livingstone in 1932. Control wm by switches sai variable resistors and indication by a variety of Meters, wired directly iota the appropriate circuit, Where the control eleaemt had to be at high vol• tage, a loop of string vat often uted Co operate it. I1* Figur* t : the 11-inch Cyclotron at Berkeley As the si«* and power of the accelerator* increased, they had to be surrounded by heavier and heavier »hielding, and the controls and indications had to be taken away from the accelerator lt»el£ and transferred to a separate control roo». At first this was done by ju»t extending the cables, keeping each control and indication separate, but the increa• sing number* of value» to be indicated led to some manual switching of instruments between different circuit* to save panel apace. In the 1980's, even though the cyclic, accelerators had grown up to 200 » in diameter, the expense of taking cables for every control element to the control too» was not exce««ive. However, in the i960'», project* of auch larger siae were being considered, where this would no longer be true. The first of theae was the "2-mile" electron lime at SLAC. This is composed of 240 alraott identical taodule*, each aodule having very many controls and indications of interest to the operators, The enormous number of cables which would be required to take all these to the control room was reduced considerably by rentóte awl t i- plexing; that is switching one particular control or indication from each «©«Joie in turn onto the s«se set of cables.
    [Show full text]
  • USSR: First Computers and Evaluation of Cybernetics Points of This Papers
    Dr.Vladimir Kitov Russian Plekhanov university of economics USSR: First Computers and Evaluation of Cybernetics Points of this papers Part 1. • USSR: First Computers and Evaluation of Cybernetics. Part 2. • Several key moments of the Soviet informatics. Part 1. USSR: First Computers and Evaluation of Cybernetics. • 1.1. The first soviet computers "MESM", "M-1" and "Strela". • 1.2. The most important seven organizations of the USSR, where the first serial computers "Strela" were established. • 1.3. Difficult fate of cybernetics in the USSR. • 1.4. The first courses of lectures on computers and programming in three Soviet universities. • 1.5. The first Soviet books on programming, computers and applications and their significant role in several foreign countries. Part 2. Several key moments of the Soviet informatics. • 2.1. About the following computers after "MESM", "M-1" and "Strela. • 2.2 The first in the world project of The Nationwide computer network for the control of Economy and Military Forces of the USSR. • 2.3 The application of computers for the economy and the creation of automated management systems (AMS) for different levels and purposes. • 2.4 Soviet computers “ES EVM” are the clones of IBM/360 computers . The beginning of the end of Soviet computers. 1.1. The first soviet computers "MESM", "M-1" and "Strela". • The first official step in computer industry in the USSR was patent number 10475 for the invention of "Automatic digital computer" registered on December 4, 1948 by prominent Soviet scientists Isaak Bruk and Bashir Rameev. It was the USSR first officially registered invention in the field of electronic digital computers.
    [Show full text]
  • Winter 2017/18
    Newsletter - Calibrated for Creative Communications Vol. 15, no. 4, Winter 2017/18 Schneeberg seen from the Wienerwald, Nov. 2017 Vantage Point IT STAR representatives nd-of-year provides an excellent vantage point to assess Eachievements and shortcomings during the exiting year and Austria/OCG-R. Bieber, Bulgaria/BAS- I. Dimov, to look forward into the future. Croatia/CITA-M. Frkovic, Cyprus/CCS-P. Masouras, Czech Rep./CSKI-J. Stuller, Greece/GCS-S. Katsikas, Based on feedback from our readers, we can tick the 2017 per- Hungary/NJSZT-B. Domolki, Italy/AICA-G. Occhini, formance of the Newsletter as successful. Our Honorary Advi- Lithuania/LIKS-E. Telešius, Macedonia/MASIT- sory Board is growing and we are happy to have a stronger fe- P. Indovski, Poland/PIPS-M. Holynski, Romania/ male representation of the informatics profession. ATIC-V. Baltac, Serbia/JISA-D. Dukic, Slovakia/SSCS- I. Privara, Slovenia/SSI-N. Schlamberger In this last 2017 Issue we are pleased to introduce our new mem- bers of the NL Advisory Board, to brief you on the Russian Vir- Contents tual Computer Museum and to provide an update on develop- New members of the Advisory Board ........................... 2 ments related to Big Data and Competences. IT STAR WS and BM in Sofia ...................................... 3 Big Data: The Data Scientist ........................................ 6 Regarding IT STAR, 2017 was rather challenging and efforts were made to build upon successful activities so as to recalibrate Russian Virtual Computer Museum ............................. 9 the Association to the benefit of its members and the larger ICT ITU Information Society Report 2017 ......................... 13 community. MS News ...................................................................
    [Show full text]
  • Computer Architecture
    А.М. Sergiyenko Computer Architecture Part 1. Central Processing Unit and Peripherals Kyiv-2016 0 УДК 004.383 ББК 32.973-018 Рецензенти: А. М. Романкевіч, доктор технічних наук, професор (кафедра спеціализованих обчислювальних систем Національного технічного університету України "КПИ"); В. П. Сімоненко, доктор технічних наук, професор (кафедра обчислювальної техніки Національного технічного університету України "КПИ") Сергієнко А. М. Архітектура компʼютерів. Частина 1. Центральний процесорний елемент та периферійні пристрої: Конспект лекцій. Англійською мовою – К.: НТУУ«КПІ», 2016. – 182 с. Розглянуті теоретичні відомості про архітектури сучасних компʼютерів. Для студентів, аспірантів, викладачів вузів в галузі електроніки, вимірю- вальної і обчислювальної техніки, звʼязку та захисту інформації. УДК 004.383 ББК 32.973-018 А. М. Сергієнко, 2016 1 CONTENTS FOREWORD 3 1. CENTRAL PROCESSING UNIT ARCHITECTURE 5 1.1 Introduction. Basic definitions and principles of computers 5 1.2 Element basis of computers 33 1.3. Von Neumann Computer Architecture 44 1.4. Instruction set of the computer 51 1.5. Data formats and operations 56 1.6. Addressing modes 69 1.7 Intel 8051 architecture 79 1.8 RISC and CISC processors 94 1.9. Interrupt system 103 2. PROCESSOR ENVIRONMENT ARCHITECTURE 120 2.1. Interface basics 120 2.2 Memory in computers 142 2.3. External storage devices 156 2.4 Computer console 169 2.5. Structure of a single processor computer 177 BIBLIOGRAPHY 180 ANNEX 1 182 2 FOREWORD The computer architecture is the basic information about a computer, which is necessary both for its design and programming. The development of a new program is the creative process of implementation of a given algorithm on a computer with the specific architecture.
    [Show full text]
  • The Founding, Fantastic Growth, and Fast Decline of Norsk Data AS Tor Steine
    The Founding, Fantastic Growth, and Fast Decline of Norsk Data AS Tor Steine To cite this version: Tor Steine. The Founding, Fantastic Growth, and Fast Decline of Norsk Data AS. 3rd History of Nordic Computing (HiNC), Oct 2010, Stockholm, Sweden. pp.249-257, 10.1007/978-3-642-23315- 9_28. hal-01564615 HAL Id: hal-01564615 https://hal.inria.fr/hal-01564615 Submitted on 19 Jul 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License The Founding, Fantastic Growth, and Fast Decline of Norsk Data AS Tor Olav Steine Formerly of Norsk Data AS [email protected] Abstract. Norsk Data was a remarkable company that in just twenty years went from a glimmer in the eyes of some computer enthusiasts to become number two in share value at the Oslo Stock Exchange. Within a few years thereafter, it collapsed, for no obvious reason. How was this tremendous success possible and why did the company collapse? Keywords: Collapse, computer, F16, industry, minicomputer, Norsk Data, Nord, simulator, success, Supermini 1 The Beginning 1.1 FFI A combination of circumstances led to the founding of Norsk Data1 in June 1967.
    [Show full text]
  • Computer Architectures an Overview
    Computer Architectures An Overview PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 25 Feb 2012 22:35:32 UTC Contents Articles Microarchitecture 1 x86 7 PowerPC 23 IBM POWER 33 MIPS architecture 39 SPARC 57 ARM architecture 65 DEC Alpha 80 AlphaStation 92 AlphaServer 95 Very long instruction word 103 Instruction-level parallelism 107 Explicitly parallel instruction computing 108 References Article Sources and Contributors 111 Image Sources, Licenses and Contributors 113 Article Licenses License 114 Microarchitecture 1 Microarchitecture In computer engineering, microarchitecture (sometimes abbreviated to µarch or uarch), also called computer organization, is the way a given instruction set architecture (ISA) is implemented on a processor. A given ISA may be implemented with different microarchitectures.[1] Implementations might vary due to different goals of a given design or due to shifts in technology.[2] Computer architecture is the combination of microarchitecture and instruction set design. Relation to instruction set architecture The ISA is roughly the same as the programming model of a processor as seen by an assembly language programmer or compiler writer. The ISA includes the execution model, processor registers, address and data formats among other things. The Intel Core microarchitecture microarchitecture includes the constituent parts of the processor and how these interconnect and interoperate to implement the ISA. The microarchitecture of a machine is usually represented as (more or less detailed) diagrams that describe the interconnections of the various microarchitectural elements of the machine, which may be everything from single gates and registers, to complete arithmetic logic units (ALU)s and even larger elements.
    [Show full text]
  • History of Data Centre Development
    History of Data Centre Development Rihards Balodis and Inara Opmane Institute of Mathematics and Computer Science, University of Latvia (IMCS UL), Riga, Latvia [email protected] Abstract: Computers are used to solve different problems. For solving these problems computer software and hardware are used, but for operations of those computing facilities a Data Centre is necessary. Therefore, development of the data centre is subordinated to solvable tasks and computing resources. We are studying the history of data centres’ development, taking into consideration an understanding of this. In the beginning of the computer era computers were installed in computing centres, because all computing centres have defined requirements according to whom their operation is intended for. Even though the concept of ‘data centre’ itself has been used since the 1990s, the characteristic features and requirement descriptions have been identified since the beginning of the very first computer operation. In this article the authors describe the historical development of data centres based on their personal experience obtained by working in the Institute of Mathematics and Computer Science, University of Latvia and comparing it with the theory of data centre development, e.g. standards, as well as other publicly available information about computer development on the internet. Keywords: Computing facilities, Data Centre, historical development. 1. Basic Characteristics of Data Centre Facilities 1.1 Data centre definition A data centre is a physical environment facility intended for housing computer systems and associated components. Data centres comprise the above-mentioned computer systems and staff that maintains them. The necessary physical environment facility encompasses power supplies with the possibility to ensure backup power, necessary communication equipment and redundant communication cabling systems, air conditioning, fire suppression and physical security devices for staff entrances.
    [Show full text]
  • The Computers' Collection at the Polytechnic Museum
    The Computers’ Collection at the Polytechnic Museum Marina Smolevitskaya To cite this version: Marina Smolevitskaya. The Computers’ Collection at the Polytechnic Museum. International Con- ference on History of Computing (HC), Jun 2013, London, United Kingdom. pp.53-63, 10.1007/978- 3-642-41650-7_5. hal-01455267 HAL Id: hal-01455267 https://hal.inria.fr/hal-01455267 Submitted on 3 Feb 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License The Computers’ Collection at the Polytechnic Museum Marina Smolevitskaya Scientific Researcher, Computer Collection Curator Polytechnic Museum, Moscow, Russia [email protected], [email protected] Abstract. The Polytechnic Museum has the Fund Collection “Electronic Digital Computing Machines”. There are more than seven hundred objects and over two thousands documentary, printed and graphic items today. All four generations of electronic digital computing machines are presented in the Museum. Some of the EDCM are working. In addition, the Museum created fourteen personal funds of Russian scientists who devoted their activity to computer science. This computers’ collection is the only one of such variety and size in Russia. Keywords: Polytechnic Museum, collection, personal funds, electronic digital computing machines, using simulations and replicas to illustrate the computing history The fund collection of “Electronic Digital Computing Machines” (EDCM) was formed in the 1960s.
    [Show full text]