SlideShare a Scribd company logo
ACS History SIG
April 2010
David Benn
Back to the Future
The best way to predict the future is to invent it. (Alan
Kay)
On the other hand...
Those who fail to learn from history are doomed to
repeat it. (Winston Churchill)
ACS is 50.
computing goes back a long way...
Why should we talk
about history?
to recognise, celebrate, and learn from the past.
To understand, e.g. why are computers, GUIs,
programming languages etc the way they are?
It’s interesting...
Actually, do we need another reason?
We like to explore; the past is no different...
“I wish to God these calculations
had been executed by steam.”
Charles Babbage (19th Century inventor)
“Before computers were machines,
they were people.” (David Alan Grier)
they were people.” (David Alan Grier)
Harvard College
Observatory Human
Computers (1925)
Harvard Archives (1891)
ENIAC
Early (Australian)
Computers
CSIRAC
SILLIAC
IBM 7094
IBM
System/360
Minicomputers
supercomputers
Microcomputers
Microcomputers
Microcomputers
Computer Science
But, as Edsger Dijkstra remarked:
“Computing Science is no more about computers
than Astronomy is about Telescopes.”
Computer Science
Programming
Languages
People
Operating Systems1969 - UNIX
1985 - OSX (Mach kernel)
1985 - AmigaOS
1991 - Linux
1993 - Windows 7 (via WindowsNT)
1995 - BeOS
1996 - Windows Mobile (via WinCE)
1997 - Symbian (via EPOC32)
2005 - Microsoft Singularity
Australia, SA, ACS, ...
CSIRAC, SILLIAC, ...
Computer Society of SA (CSSA) founded in 1960 by
late Prof. Renn Potts & Don Overhue
First society for computing professionals in Australia
(amongst first in world).
CSSA merged with others across Australia in 1966 to
form Australian Computer Society. (ACS)
Questions for you
What big topics don’t appear in these slides?
What do you think this SIG should be about?
Do you have suggestions for talk topics, speakers?
Are you interested in writing, reviewing, speaking?
quotes could form basis of SIG meeting topics.
References
http://www.philsoc.org/2001Spring/2132transcript.html
http://en.wikipedia.org/wiki/Charles_Babbage
info@ITHistory.org
http://www.ithistory.org
Powerhouse Museum (Babbage etc)
The Computer History Museum
http://dbenn.wordpress.com/2007/01/14/martin-davis-on-the-importance-of-pure-
research/
acs history book, other society’s (IEEE, ACM) journals
Notes
Leinbiz (17th century)
Binary number system
Calculus, independently of Newton
Stepped reckoner
calculus ratiocinator
characteristica universalis

More Related Content

Viewers also liked

Las prohibiciones
Las prohibicionesLas prohibiciones
Las prohibiciones
Janete M. C. Silva
 
Арт-бюро Creators
Арт-бюро CreatorsАрт-бюро Creators
Арт-бюро Creators
LKarapetyan
 
Acute coronary syndrome
Acute coronary syndromeAcute coronary syndrome
Acute coronary syndrome
Lih Yin Chong
 
Lendcar
LendcarLendcar
Percutaneous Pulmonary Valve Interventions
Percutaneous Pulmonary Valve InterventionsPercutaneous Pulmonary Valve Interventions
Percutaneous Pulmonary Valve Interventions
Praveen Nagula
 
Презентация гео-локационного сервиса знакомств для инвесторов
Презентация гео-локационного сервиса знакомств для инвесторовПрезентация гео-локационного сервиса знакомств для инвесторов
Презентация гео-локационного сервиса знакомств для инвесторов
Notissimus
 
An approach to myocardial biopsy interpretation
An approach to myocardial biopsy interpretationAn approach to myocardial biopsy interpretation
An approach to myocardial biopsy interpretationSaurav Singh
 
Red hat Kira
Red hat KiraRed hat Kira
Red hat Kira
Red Hat Kira
 
Antioxidant analysis
Antioxidant analysisAntioxidant analysis
Antioxidant analysis
Mae Fah Luang University
 

Viewers also liked (9)

Las prohibiciones
Las prohibicionesLas prohibiciones
Las prohibiciones
 
Арт-бюро Creators
Арт-бюро CreatorsАрт-бюро Creators
Арт-бюро Creators
 
Acute coronary syndrome
Acute coronary syndromeAcute coronary syndrome
Acute coronary syndrome
 
Lendcar
LendcarLendcar
Lendcar
 
Percutaneous Pulmonary Valve Interventions
Percutaneous Pulmonary Valve InterventionsPercutaneous Pulmonary Valve Interventions
Percutaneous Pulmonary Valve Interventions
 
Презентация гео-локационного сервиса знакомств для инвесторов
Презентация гео-локационного сервиса знакомств для инвесторовПрезентация гео-локационного сервиса знакомств для инвесторов
Презентация гео-локационного сервиса знакомств для инвесторов
 
An approach to myocardial biopsy interpretation
An approach to myocardial biopsy interpretationAn approach to myocardial biopsy interpretation
An approach to myocardial biopsy interpretation
 
Red hat Kira
Red hat KiraRed hat Kira
Red hat Kira
 
Antioxidant analysis
Antioxidant analysisAntioxidant analysis
Antioxidant analysis
 

Similar to History sig scope

Abhishek mba project_report
Abhishek mba project_reportAbhishek mba project_report
Abhishek mba project_report
DBanerjee3
 
Rc 10.computers
Rc 10.computersRc 10.computers
Rc 10.computers
Bill Kovarik
 
A History of Silicon Valley
A History of Silicon ValleyA History of Silicon Valley
A History of Silicon Valley
piero scaruffi
 
Bruce Damer's talk on the Digibarn Computer Museum (Palo Alto CA, Jul 2008)
Bruce Damer's talk on the Digibarn Computer Museum (Palo Alto CA, Jul 2008)Bruce Damer's talk on the Digibarn Computer Museum (Palo Alto CA, Jul 2008)
Bruce Damer's talk on the Digibarn Computer Museum (Palo Alto CA, Jul 2008)
Bruce Damer
 
Describing Everything - Open Web standards and classification
Describing Everything - Open Web standards and classificationDescribing Everything - Open Web standards and classification
Describing Everything - Open Web standards and classification
Dan Brickley
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
Syed Zaid Irshad
 
Art/Science Interaction - Case study: Silicon Valley
 Art/Science Interaction - Case study: Silicon Valley Art/Science Interaction - Case study: Silicon Valley
Art/Science Interaction - Case study: Silicon Valley
piero scaruffi
 
History of computer
History of computerHistory of computer
History of computerrekhagoyal
 
Generation of computer
Generation of computerGeneration of computer
Generation of computerNiti Arora
 
Generation of computer
Generation of computerGeneration of computer
Generation of computer
Niti Arora
 
Back to the Future – The Way to a Personal Dynamic Medium for Creative Thought
Back to the Future – The Way to a Personal Dynamic Medium for Creative ThoughtBack to the Future – The Way to a Personal Dynamic Medium for Creative Thought
Back to the Future – The Way to a Personal Dynamic Medium for Creative Thought
Matthias Mueller-Prove
 
The Four Main Components And History Of Computers
The Four Main Components And History Of ComputersThe Four Main Components And History Of Computers
The Four Main Components And History Of Computers
Who Can Write My Paper Lafayette College
 
Shashank ppt
Shashank pptShashank ppt
Shashank ppt
Ashish Kumar
 

Similar to History sig scope (20)

MBA Project Report
MBA Project ReportMBA Project Report
MBA Project Report
 
Abhishek mba project_report
Abhishek mba project_reportAbhishek mba project_report
Abhishek mba project_report
 
Rc 10.computers
Rc 10.computersRc 10.computers
Rc 10.computers
 
A History of Silicon Valley
A History of Silicon ValleyA History of Silicon Valley
A History of Silicon Valley
 
Bruce Damer's talk on the Digibarn Computer Museum (Palo Alto CA, Jul 2008)
Bruce Damer's talk on the Digibarn Computer Museum (Palo Alto CA, Jul 2008)Bruce Damer's talk on the Digibarn Computer Museum (Palo Alto CA, Jul 2008)
Bruce Damer's talk on the Digibarn Computer Museum (Palo Alto CA, Jul 2008)
 
Evolution4
Evolution4Evolution4
Evolution4
 
Describing Everything - Open Web standards and classification
Describing Everything - Open Web standards and classificationDescribing Everything - Open Web standards and classification
Describing Everything - Open Web standards and classification
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Art/Science Interaction - Case study: Silicon Valley
 Art/Science Interaction - Case study: Silicon Valley Art/Science Interaction - Case study: Silicon Valley
Art/Science Interaction - Case study: Silicon Valley
 
Evolution3
Evolution3Evolution3
Evolution3
 
AI
AIAI
AI
 
History
HistoryHistory
History
 
History of computer
History of computerHistory of computer
History of computer
 
Generation of computer
Generation of computerGeneration of computer
Generation of computer
 
Generation of computer
Generation of computerGeneration of computer
Generation of computer
 
tenses
tensestenses
tenses
 
Ai long forseminar
Ai long forseminarAi long forseminar
Ai long forseminar
 
Back to the Future – The Way to a Personal Dynamic Medium for Creative Thought
Back to the Future – The Way to a Personal Dynamic Medium for Creative ThoughtBack to the Future – The Way to a Personal Dynamic Medium for Creative Thought
Back to the Future – The Way to a Personal Dynamic Medium for Creative Thought
 
The Four Main Components And History Of Computers
The Four Main Components And History Of ComputersThe Four Main Components And History Of Computers
The Four Main Components And History Of Computers
 
Shashank ppt
Shashank pptShashank ppt
Shashank ppt
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

History sig scope