View allAll Photos Tagged computerhistory
Complètement mélangés des unités centrales Macintosh et quelques clones, peut-être des écrans... En fait je ne sais plus ce qu’il y a dans le tas !
Le lecteur de CD externe d'Apple pour les Macintosh, modele AppleCD 300 de 1993.
Le site Francais des Apple vintage :
Juin 2010, une partie de ma collection de "vieux' micros Apple.
Dans le haut :
Mac 6400 / Mac 128 k / Performa 5300 et 5400.
Au Milieu :
Manuels Apple
Dans le bas :
Deux iMac Indigo 400 Mhz et a droite en bas un iMac Snow 700 Mhz.
En péparation une étagere au dessus des performas, pour le matériel qui arrivent...
Check out Renewin' Strathewen
A benevolent social hack
Now published at seldomlogical.com/2009/09/12/a-benevolent-social-hack
"I wanted Alan Turing to be raised into the pantheon of great Britons, but I felt it would be hypocritical to do so without recognising that Britain treated him so badly" [0]
Today I witnessed a social hack by a UK hacker who in the space of a month turned around 60 years of history. What did it take? A simple idea, a measure of determination, some imagination and a bit of luck. What did he achieve? He persuaded the government of the United Kingdom with the help of fellow citizens, to acknowledge the maltreatment of a deceased fellow Hacker.
What is a Hacker?
You might have heard of Hackers in the media. [1] Those pesky 12 year-old boys and their computers at it again, breaking into Government computers and causing millions of dollars damage. If you believe the media, Hackers are also responsible for numerous other electronic sins when the most likely explanation is probably a poor choice of operating system. [2] Hackers have something of an image problem. In fact the term Hacker has been hijacked and misused. It used to mean a person who playfully enjoyed puzzles, reveled in understanding complicated and building new technology. Hackers tend to be benevolent. Less interested in exploiting for gain [3], more interested in mastery and exploits to show amongst their friends. [4]
Malevolent vs Benevolent
Instead, the media cottoned onto the term Hackers to describe malevolent behaviour and the broken understanding has persisted ever since. [5] So Instead of using the correct technical term Cracker, the term Hacker has now become synonymous with bad. Here is a simple way for you to correct this. Whenever you hear the term Hacker in the media, ask yourself, "is the behaviour benevolent or malevolent?" If it's malevolent substitute Hacker for Cracker. If the behaviour is benevolent you are getting a definition closer to the original idea describing a Hacker. So to summarise, Hackers are curious and benevolent by nature, enjoy understanding the and mastering the complex and creating new technology. [6]
A social hack
Just as Hackers enjoy creating new technology, sometimes malevolent Hackers, Crackers, try to engineer people for information. [7] Exploiting the cognitive biases of humans for personal gain. [8] I can only think of a few instances of social hacks being done for good instead of evil. [9] But today, I witnessed a benevolent social hack. An example illustrating the benevolence of Hackers. An existence proof of a good "social hack". But first a short detour into technology history.
If there is a birthplace of modern hackers you might be tempted to think MIT. [10] But you'd be wrong. Modern computer technology had it's birthplace in the United Kingdom. First there was Charles Babbage. Babbage created a mechanical calculating device, Ada Lovelace supplied the software programming. The first hardware and software development team. [11] Babbage and Lovelace might have supplied the early inspiration but it took the Second World War, another 83 years [12] to encourage the theoretical framework and a complete working example of what we now know as Computers to exist. And at the centre of all this was one man, Alan Mathison Turing. [13]
Alan Mathison Turing
Turing is the original Hacker. He excelled as a mathematician, code breaker and computer scientist and had a measurable effect on the infant science of computers with the creation of the Turing machine" [14] and the thought experiment, "Intelligent Machinery". [15] Turing also designed calculating machines, part electrical, part mechanical to crack the German Enigma and numerous other algorthyms to help crack encrypted messages vital for the German war machine. [16] In the mid to late 1940's, Turing continued to apply himself to the big problem of the time, outlined in "Computing Machinery and Intelligence" [17], software for the Manchester Mark 1 [18] and developed the "Turing Test" [19] as a means to test if a machine is in fact intelligent.
Turing was clearly a man of his time, able to influence the future course of computer technology for a better world. But Turing was also a man born into the wrong time. Turing's crime was his sexuality. In a time where sexual orientation was not a choice but law, Turing was persecuted. Turing was subject to unethical medical procedures by the UK Government. The same Allied government who turned to ordinary people like Turing to help to defeat Germany. To defeat the Nazi regime and put a stop to the extermination of Jews, Gypsies, homosexuals and anyone else who didn't fit the plan for a master race.
The idea behind a social hack is to somehow change the way people behave, perceive and judge. A social hack is much harder to achieve than a playing around with technology. A social hack relies on being able to persuade other people to do something they might not originally think of, want or imagine possible. A good social hack is done to improve some aspect of society for altruistic reasons.
Recognition, gratitude, apology
Almost a month ago a UK Hacker and nerd, John Graham-Cumming, wrote about [20] a petition [21] he organising to get the UK Government to formally apologise to Alan Turing. An apology for the mistreatment he received on behalf of the government. Well almost a month later after many emails, blog posts, twits later, John persuaded the Prime Minister, Gordon Brown on behalf of the government of United Kingdom to publicly apologise to Alan Turing for his maltreatment and recognise the importance of Turing's technical and scientific contribution to the war effort and science and technology in general. [22] The most rewarding surprise is the discovery of existing members of Turing's family who now get some closure on the matter. In 2012 it will be the centenary of the birth of Turing London on June 23. [23] For nerds and people who work in computing, the Turing year is going to be big. Maybe not as big as Y2K, but big enough.
So thank you John for this benevolent "social hack". A reminder that Hackers do good things. A reminder that in a just society, people and Hackers alike should be judged by their achievements and not their race, religion, sex or orientation.
Reference
[0] ABC News, Reuters, "Brown sorry for code-breaker's 'appalling' treatment",
[Accessed Saturday, 12th September 2009]
www.abc.net.au/news/stories/2009/09/12/2683906.htm
[1] mit.edu, Bruce Stirling, "The Hacker Crackdown",
[Accessed Friday, 11th September 2009]
www.mit.edu/hacker/hacker.html
[2] Wikipedia, Storm botnet: In 2007 a Storm botnet controlled by criminal gangs estimated to total between 150,000 to 1 million PC's to enable a distributed denial of service attack. It was reported that up to 80% of the machines involved used Microsoft Windows operating system.
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Storm_botnet
[3] It has been known for Hackers have exploited their knowledge to gain access and excessive CPU access and I suspect the fascination for lock picking probably has a very practical reason behind it. Historically this was a necessity as access to precious processing time was limited. Limited enough to hack a solution. You can read more about early Hackers here by "Eric Steven Raymond", "A Brief History of Hackerdom",
[Accessed Friday, 11th September 2009]
www.catb.org/~esr/writings/cathedral-bazaar/hacker-histor...
[4] Woz.org, Steve Wozniak, "Letters-General Questions Answered (Woz on hacking)",
[Accessed Friday, 11th September 2009]
www.woz.org/letters/general/59.html
[4] The confusion between Hackers and Crackers means to use the word Hacker means Bad to most people.
[5] catb.org, Eric Steven Raymond, "The basic difference is this: hackers build things, crackers break them."
[Accessed Friday, 11th September 2009]
catb.org/~esr/faqs/hacker-howto.html#what_is
[6] Scientific American, Herbert H. Thompson, "How I Stole Someone's Identity",
[Accessed Friday, 11th September 2009]
www.scientificamerican.com/article.cfm?id=anatomy-of-a-so...
[7] Wikipedia, "A cognitive biases is a hickup in rational thought that can be used by Crackers to socially engineer a human for malevolent (bad) reasons.",
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/List_of_cognitive_biases
[8] Dashes.com, Anil Dash, "Bill Gates and the Greatest Tech Hack Ever" I have a bit of trouble with this one but it's worth looking at despite the involvement of Microsoft."
[Accessed Friday, 11th September 2009]
dashes.com/anil/2008/06/bill-gates-and-the-greatest-tech-hack-ever.html
[9] mitadmissions.org, Michael Snively, "Hacking/Snively's Blog: If you've never seen "Hackers" then you're depriving yourself and should make a point of getting on that train.* I get asked about hacking at MIT a lot, which is natural;"
[Accessed Friday, 11th September 2009]
www.mitadmissions.org/topics/life/hacks_traditions/hackin...
[10] Wikipedia, Ada Lovelace, "She is mainly known for having written a description of Charles Babbage's early mechanical general-purpose computer, the analytical engine. She is today appreciated as the "first programmer" since she was writing programs—that is, encoding an algorithm in a form to be processed by a machine—for a machine that Babbage had not yet built.",
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Ada_Lovelace
[11] computerhistory.org, Charles Babbage, "1849 is the year Babbage is reported to have created a version of his analytical machine."
[Accessed Friday, 11th September 2009]
http:www.computerhistory.org/babbage/ number10.gov.uk
[12] alanturing.net, "Born 23 June 1912 in London, died 7 June 1954 in Cheshire, United Kingdom. Computer scientist, mathematician and cryptographer.",
[Accessed Friday, 11th September 2009]
[13] Wikipedia, "Turing machine",
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Turing_machine#Informal_description
[14] Wikipedia, "Computing Machinery and Intelligence. A paper written in 1950 for 'Mind' in which Turing discusses artificial intelligence, proposes the 'Turing test' of intelligence and asks important questions such as, 'can machines think?'",
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Computing_Machinery_and_Intelligence/
[15] Wikipedia, "Cryptanalysis: Where Turing works at Bletchley Park during the Second World War in order to crack German cryptographic cyphers."
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Alan_Turing#Cryptanalysis
[16] abelard.org, A. M. Turing, "Computing machinery and intelligence"
[Accessed Friday, 11th September 2009]
www.abelard.org/turpap/turpap.php
[17] computer50.org, "Manchester Mark 1: By April 1949 was generally available for computation in scientific research in the University. With the integration of a high speed magnetic drum by the Autumn (the ancestor of today's disc) this was the first machine with a fast electronic and magnetic two-level store. It in turn was the basis of the first commercially available computer, the Ferranti Mark 1, the first machine off the production line being delivered in February 1951."
[Accessed Friday, 11th September 2009]
www.computer50.org/mark1/MM1.html22
[18] Wikipedia, "Turing test",
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Alan_Turing#Early_computers_and_the...
[19] jgc.org, John Graham-Cumming, "Alan Turing deserves an apology from the British Government",
[Accessed Friday, 11th September 2009]
www.jgc.org/blog/2009/06/alan-turing-deserves-apology-fro...
[20] number10.gov.uk, John Graham-Cumming, "number10.gov.uk: E-Petitions: Submitted by John Graham-Cumming – Deadline to sign up by: 20 January 2010 – Signatures: 31,172"
[Accessed Friday, 11th September 2009]
petitions.number10.gov.uk/turing/
[21] number10.gov.uk, "Treatment of Alan Turing was 'appalling'"
[Accessed Friday, 11th September 2009]
[22] cs.swan.ac.uk, "THE ALAN TURING YEAR",
[Accessed Friday, 11th September 2009]
next >>>
This is the t-shirt design that was, among much else, drawn on the whiteboard at the last of three daily meetings following VRM Day 2022b, the second of the two in-person gatherings that ProjectVRM holds each year, always the day before the Internet Identity Workshop (IIW) commences for the next three days at the Computer History Museum in Silicon Valley. This time the workshop also included a talk and discussion led by Roger McNamee as part of the Beyond the Web Salon Series led by Doc and Joyce Searls, who (in addition to their work with ProjectVRM) are visiting scholars at the Ostrom Workshop, of Indiana University, which hosts the series. Roger's talk was carried live by Owl , RingCentral and Zoom to IU and the world. Roger's talk so energized attendees that a cabal, informally called Roger & We, was formed in the room and took more shape over the following days at IIW. Its purpose became branded ESC, for End Surveillance Capitalism.
ProjectVRM was born in 2006 as a project by Doc Searls when he became a fellow with the Berkman Klein Center at Harvard University. Its blog, wiki, and mailing list (of more than 500 members) remain kindly hosted by the BKC.
This image is from a digital scan of a photo slide (E-868) located in the BU Records: Marketing and Communications: Baylor Photography section of the vast photographic holdings of the The Texas Collection, Baylor University. Rights: Some rights reserved. E-mail txcoll@baylor.edu for information about obtaining a high-resolution file of this image.Visit www.baylor.edu/lib/texas/ for more information about our collections.
This is the last of three daily meetings following VRM Day 2022b, the second of the two in-person gatherings that ProjectVRM holds each year, always the day before the Internet Identity Workshop (IIW) commences for the next three days at the Computer History Museum in Silicon Valley. This time the workshop also included a talk and discussion led by Roger McNamee as part of the Beyond the Web Salon Series led by Doc and Joyce Searls, who (in addition to their work with ProjectVRM) are visiting scholars at the Ostrom Workshop, of Indiana University, which hosts the series. Roger's talk was carried live by Owl , RingCentral and Zoom to IU and the world. Roger's talk so energized attendees that a cabal, informally called Roger & We, was formed in the room and took more shape over the following days at IIW. Its purpose became branded ESC, for End Surveillance Capitalism.
ProjectVRM was born in 2006 as a project by Doc Searls when he became a fellow with the Berkman Klein Center at Harvard University. Its blog, wiki, and mailing list (of more than 500 members) remain kindly hosted by the BKC.
Part of the videogames exhibition in Museum Of The Moving Image in New York City.
I like how they picked one joystick with an orange ring and another one without.
Jeu vidéo pour la famille des Apple II : Six-Gun Shootout (1985)
" Gunfights of the wild west "
• Avec se wargame vous incarnez une des grandes figures de l’Ouest Américain, Billy the Kid, The Dalton gang, wyatt Earp, Doc Holliday … Chaque personnage ayant des caractéristiques unique.
• Vous pourrez choisir un scénario basé sur l’histoire de l’Ouest ou sur des légendes populaires. Vos armes, un colt six coups, mais aussi le couteau ou le bâton de dynamite !
• Jouable en solitaire ou à deux joueurs.
C'est un intéressant mélange de stratégie et d'éléments de RPG , un peu similaire à Computer Ambush un autre wargame de SSI. En résumé, se jeu ne ressemblait à aucun autre !
• Editeur : Strategic Simulations Inc. (S.S.I.) U.SA.
• Présentation : En coffret contenant une disquette et un manuel de 21 pages en anglais.
Imagine we could be around during the time of the first printing press. What would you want to keep for civilization to see in the future? This is one of the questions I asked myself as I photographed these computers. I set out to document what I saw as the visual elements of the beginning of a new era, the age of the computer, a time as significant as the age of the printing press.
I wanted my photography to express the kind of passion that men and women felt when they were inventing these machines. More than just taking pictures, I wanted both the layperson and the computer professional to feel what I felt. To see these machines as more than steel and wire and plastic. To see that these are ideas and dreams and lives.
As a still photographer I can only use two dimensions, color, form, context, and a few other tricks. I must use them with my enthusiasm and my imagination, while staying true to the machines. My hope is that my photographs will allow people to see these machines in a new way.
—Mark Richards
Mark Richards is an artist working on a series depicting the evolution of the computer age. A California native, Mark has covered Silicon Valley since the early 1990s. His images have earned numerous awards from Communication Arts magazine, and his work has appeared in publications such as the New York Times Sunday Magazine, Fortune, Smithsonian, Life, and BusinessWeek.
These photographs are from Core Memory: A Visual Survey of Vintage Computer (Chronicle Books, 2007), which features Mark Richards’ photographs of objects from the collection of the Computer History Museum. This book is available in the Museum gift shop.
Same robot arm: overview, detail.
I didn't get a picture of the placard, but I thought it just said "Minsky's Robot Arm".
After a bit of Googling for Minsky and robots, the only reference I seem to be turning up is what generally gets referred to as the Tentacle Arm, or what he referred to as 1967's "Serpentine Hydraulic Robot Arm".
The description from www.computerhistory.org/timeline/?category=rai&year=1968 is typical:
Marvin Minsky developed the Tentacle Arm, which moved like an octopus. It had twelve joints designed to reach around obstacles. A PDP-6 computer controlled the arm, powered by hydraulic fluids. Mounted on a wall, it could lift the weight of a person.
There's slightly more info at Ed Thelen's site:
The Tentacle Arm (1968)
This arm was developed by Marvin Minsky at MIT in 1968. Since it moved like an octopus, this early robot arm was called the Tentacle Arm. It had twelve joints and was designed to reach around obstacles. The arm was controlled by a PDP-6 computer and was powered by hydraulic fluids. It was designed to be mounted on a wall and could lift the weight of a person.
The one problem here is that the arm I saw at the MIT Museum didn't look strong enough to lift a person. I suppose it was possible, but it looks like a spindly little serpentine thing.
Still, it does match the description and photos at places like the Computer History Museum (different view), so I guess it's the same one.
Odd that it doesn't have a Wikipedia page though. Should rectify that, eh?
This IBM 1620 Data Processing System, was Baylor University's first computer of its kind. Acquired in 1962, it was part of the Hankamer School of Business, and located in the Casey Computer Lab, named in honor of the machine's donor, Carl Casey. The unit carried a price tag of nearly $100,000 new. This IBM was used by the institution from 1962-1974. Its replacement was an IBM Systems 3 Computer.
This image is from a digital scan of a photo negative (G-826) located in the BU Records: Marketing and Communications: Baylor Photography section of the vast photographic holdings of the The Texas Collection, Baylor University. Rights: Some rights reserved. E-mail txcoll@baylor.edu for information about this image. Visit www.baylor.edu/lib/texas/ for more information about our collections.
12 maja o godzinie 17:00 w Centrum Szyfrów Enigma w Poznaniu odbyło się wyjątkowe spotkanie z zespołem konstruktorskim polskiego komputera edukacyjnego Elwro-800 Junior.
Więcej o komputerze Elwro 800 Junior: pl.wikipedia.org/wiki/Elwro_800_Junior
Wydarzenie: csenigma.pl/spotkanie-z-juniorem-elwro-800-junior-w-centr...
On May 12, at 5:00 p.m. in the Enigma Cipher Center in Poznań, a special meeting with the design team of the Polish educational computer Elwro-800 Junior took place.
More about the Elwro 800 Junior computer: pl.wikipedia.org/wiki/Elwro_800_Junior
Event: csenigma.pl/spotkuje-z-juniorem-elwro-800-junior-w-centru...
Check out Renewin' Strathewen
Now published at seldomlogical.com/2009/09/12/a-benevolent-social-hack
Updated link to original statement by PM.
A benevolent social hack
Today I witnessed a social hack by a UK hacker who in the space of a month turned around 60 years of history. What did it take? A simple idea, a measure of determination some imagination and a bit of luck. What did he achieve? He persuaded the government of the United Kingdom with the help of fellow citizens, to acknowledge the maltreatment of a fellow citizen. But this was no ordinary citizen.
What is a Hacker?
You might have heard of Hackers in the media. [0] Those pesky 12 year-old boys and their computers at it again. Breaking into Government computers and causing millions of dollars damage. If you listen to the media, Hackers are also responsible for numerous other electronic sins when the most likely explanation is probably a poor choice of operating system. [1] Hackers have something of an image problem. In fact the term Hacker has been hijacked and misused. It used to mean a person who playfully enjoyed puzzles, reveled in understanding complicated technology by gaining access to machinery they had no permission to access. Hackers tend to be benevolent. Less interested in exploiting for gain [2], more interested in mastery and exploits to show amongst their friends. [3]
Instead, the media cottoned onto the term Hackers to describe malevolent behaviour and the broken understanding has persisted ever since. [4] So Instead of using the correct technical term Cracker, the term Hacker has now become synonymous with bad. Here is a simple way to correct this. Whenever you hear the term Hacker in the media, ask yourself is the behaviour benevolent or malevolent? If it's malevolent substitute Hacker for Cracker. If the behaviour is benevolent you are getting a definition closer to the original idea describing a Hacker. So to summarise, Hackers are curious and benevolent by nature. The alike understanding the complex and enjoy creating new things, especially technology. [5]
What is a "social hack"?.
What is a social hack?
Just as Hackers enjoy breaking and rebuilding technology, sometimes malevolent Hackers, Crackers try to re-engineer people. The intent is sometimes playful but the most reported reason is to gain access to information for misuse [6] by exploiting the cognitive biases of humans. [7] I can only think of a few instances of social hacks being done for good instead of evil. [8] But today I witnessed a benevolent social hack. And a big one at that. Now I have an example that probably best illustrates the benevolence of Hackers and what exactly a good "social hack" is. But first a bit of technology history.
A bit of history
If there is a birthplace of modern hackers you might be tempted to think MIT. [9] But you'd be wrong. Modern computer technology has it's birthplace in the United Kingdom. First there was Charles Babbage. Babbage created a mechanical calculating device and with the help of another Ada Lovelace between them the became the original, hardware/software team. [10] Babbage and Lovelace might have supplied the early inspiration but it took the Second World War, another 83 years [11] to encourage the theoretical framework and a complete working example of what we now know as Computers to exist. And at the centre of all this was one man, Alan Mathison Turing. [12]
Turing is the original Hacker, a mathematician, code breaker and computer scientist. Turing had a measurable effect on the infant science of computers with the creation of the
Turing machine" [13] and the thought experiment, "Intelligent Machinery". [14] Turing also designed machines, part electrical, part mechanical to crack the German Enigma and numerous other algorthyms to help crack encrypted messages vital for the German war machine.[15] In the mid to late 1940's, Turing continued to apply himself to the big problem of the time, outlined in "Computing Machinery and Intelligence" [16], software for the Manchester Mark 1 [17] and developed the "Turing Test" [18] as a means to test if a machine is in fact intelligent.
What is a social hack again?
Enough of the history, lets get back to social hacks. Turing was clearly a man of his time able to influence the future course of computer technology for a better world. But Turing was also a man born into the wrong time. Turing's crime was his sexuality. In a time where sexual orientation was not a choice but the law, Turing was persecuted. Turing was also subject to unethical medical procedures by the UK Government. The same Allied government who turned to ordinary people like Turing to help to defeat Nazi Germany. To defeat the Nazi regime and put a stop to the extermination of Jews, Gypsies, homosexuals and anyone else who didn't fit into the master plan.
So the idea behind a social hack is to somehow change the way people behave, perceive or do things through some mechanism. A social hack is much harder to achieve than a playing around with technology. A social hack relies on being able to persuade other people to do something they might not have thought of, want to do or imagined possible. A good social hack is done, for a greater good. A good social hack improves some aspect of society without personal gain.
A social hack howto
Almost a month ago a UK Hacker and nerd, John Graham-Cumming, wrote about [19] a petition [20] he was forming to get the UK Government to apologise formally to Alan Turing for the treatment he received at their hand. Well almost a month later after many emails, blog posts, twits later, John has got the Prime Minister, Gordon Brown on behalf of the government of United Kingdom to publicly apologise to Alan Turing, his treatment and formally recognise the importance of Alan Turing's technical and scientific application to the war effort. [21] And the contribution he made to science and technology in general. Probably the most rewarding part was also the discovery of members of Turing's existing family who now get some closure. In 2012 it will be the centenary of the birth of Turing London on June 23. [22] For nerds and people who work in computing, the Turing year is going to be big. Maybe not as big as Y2K, but big enough.
So thanks John for this benevolent "social hack". A reminder that Hackers do good things. A reminder that in a just society, people and Hackers alike should be judged by their achievements and not their race, religion, sex or orientation.
Reference
[0] Bruce Stirling, "The Hacker Crackdown",
[Accessed Friday, 11th September 2009]
www.mit.edu/hacker/hacker.html
[1] Wikipedia, "Storm botnet: In 2007 a Storm botnet controlled by criminal gangs estimated to total between 150,000 to 1 million PC's to enable a distributed denial of service attack. It was reported that up to 80% of the machines involved used Microsoft Windows operating system."
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Storm_botnet
[2] It has been known for Hackers have exploited their knowledge to gain access and excessive CPU access and I suspect the fascination for lock picking probably has a very practical reason behind it. Historically this was a necessity as access to precious processing time was limited. Limited enough to hack a solution. You can read more about early Hackers here by "Eric Steven Raymond", "A Brief History of Hackerdom",
[Accessed Friday, 11th September 2009]
www.catb.org/~esr/writings/cathedral-bazaar/hacker-histor...
[3] Woz.org, Steve Wozniak, "Letters-General Questions Answered (Woz on hacking)",
[Accessed Friday, 11th September 2009]
www.woz.org/letters/general/59.html
[4] The confusion between Hackers and Crackers means to use the word Hacker means Bad to most people.
[5] catb.org, Eric Steven Raymond, "The basic difference is this: hackers build things, crackers break them."
[Accessed Friday, 11th September 2009]
catb.org/~esr/faqs/hacker-howto.html#what_is
[6] Scientific American, Herbert H. Thompson, "How I Stole Someone's Identity",
[Accessed Friday, 11th September 2009]
www.scientificamerican.com/article.cfm?id=anatomy-of-a-so...
[7] Wikipedia, "A cognitive biases is a hickup in rational thought that can be used by Crackers to socially engineer a human for malevolhttp://www.computer50.org/mark1/MM1.htmlent (bad) reasons.",
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/List_of_cognitive_biases
[8] Dashes.com, Anil Dash, "Bill Gates and the Greatest Tech Hack Ever" I have a bit of trouble with this one but it's worth looking at despite the involvement of Microsoft.
[Accessed Friday, 11th September 2009]
dashes.com/anil/2008/06/bill-gates-and-the-http://www.cs....
[9] mitadmissions.org, Michael Snively, "Hacking/Snively's Blog: If you've never seen "Hackers" then you're depriving yourself and should make a point of getting on that train.* I get asked about hacking at MIT a lot, which is natural;"
[Accessed Friday, 11th September 2009]
www.mitadmissions.org/topics/life/hacks_traditions/hackin...
[10] Wikipedia, Ada Lovelace, "She is mainly known for having written a description of Charles Babbage's early mechanical general-purpose computer, the analytical engine. She is today appreciated as the "first programmer" since she was writing programs—that is, encoding an algorithm in a form to be processed by a machine—for a machine that Babbage had not yet built.",
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Ada_Lovelace
[11] computerhistory.org, Charles Babbage, "1849 is the year Babbage is reported to have created a version of his analytical machine."
[Accessed Friday, 11th September 2009]
www.computerhistory.org/babbage/ number10.gov.uk
[12] alanturing.net, "Born 23 June 1912 in London, died 7 June 1954 in Cheshire, United Kingdom. Computer scientist, mathematician and cryptographer.",
[Accessed Friday, 11th September 2009]
[13] Wikipedia, "Turing machine",
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Turing_machine#Informal_description
[14] Wikipedia, "Computing Machinery and Intelligence. A paper written in 1950 for 'Mind' in which Turing discusses artificial intelligence, proposes the 'Turing test' of intelligence and asks important questions such as, 'can machines think?'",
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Computing_Machinery_and_Intelligence\
[15] Wikipedia, "Cryptanalysis: Where Turing works at Bletchley Park during the Second World War in order to crack German cryptographic cyphers. "
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Alan_Turing#Cryptanalysis
[16] abelard.org, A. M. Turing, "Computing machinery and intelligence"
[Accessed Friday, 11th September 2009]
www.abelard.org/turpap/turpap.php
[17] computer50.org, "Manchester Mark 1: By April 1949 was generally available for computation in scientific research in the University. With the integration of a high speed magnetic drum by the Autumn (the ancestor of today's disc) this was the first machine with a fast electronic and magnetic two-level store. It in turn was the basis of the first commercially available computer, the Ferranti Mark 1, the first machine off the production line being delivered in February 1951."
[Accessed Friday, 11th September 2009]
www.computer50.org/mark1/MM1.html22
[18] Wikipedia, "Turing test"
[Accessed Friday, 11th September 2009]
en.wikipedia.org/wiki/Alan_Turing#Early_computers_and_the...
[19] jgc.org, John Graham-Cumming<, "Alan Turing deserves an apology from the British Government ",
[Accessed Friday, 11th September 2009]
www.jgc.org/blog/2009/06/alan-turing-deserves-apology-fro...
[20] number10.gov.uk, John Graham-Cumming, "number10.gov.uk: E-Petitions: Submitted by John Graham-Cumming – Deadline to sign up by: 20 January 2010 – Signatures: 31,172"
[Accessed Friday, 11th September 2009]
petitions.number10.gov.uk/turing/
[21] number10.gov.uk, "Treatment of Alan Turing was 'appalling'"
[Accessed Friday, 11th September 2009]
[22] cs.swan.ac.uk, "THE ALAN TURING YEAR",
[Accessed Friday, 11th September 2009]
next >>>
Computer History Museum in Mountain View California
1401 N Shoreline Blvd
Mountain View, CA
(650) 810-1010
The world's largest history museum for the preservation and presentation of artifacts and stories of the Information Age located in the heart of Silicon Valley.
Picture Taken by Michael Kappel (Me)
View the high resolution Image on my photography website
Follow Me on my Tumblr.com Photo Blog
That's my article on asynchronous serial port programming on the front of SGI's newsletter in 1998.
I threw about six boxes of old stuff out of my garage this afternoon. Here's part of what you can find in my dumpster if you go diving for it before trash pickup day.