Spring 2015 - Charles Babbage Institute

Transcription

Spring 2015 - Charles Babbage Institute
CHARLES BABBAGE INSTITUTE
CENTER FOR THE HISTORY OF INFORMATION TECHNOLOGY
NEWSLETTER
Vol. 37 No. 1
Spring 2015
In This Issue:
Director’s Desk
Gideon Gartner and Gartner Group Records
3,500 Cortada Collection Books Cataloged
CBI
Michael J. Samek Bequest
Cullinane: Smarter than Their Machines
Yost Attends NSF SaTC PI 2015
CBI “Computer Security” Annals Special Issue
Misa on Isaacson’s Innovators
Norberg Travel Grant Recipients
Con Diaz 2015 Tomash Fellow
Antitrust at CBI: U.S. v. IBM
Software History at CBI
(Norberg Grant)
Partnership for Computer History
Hollywood Computer Graphics at CBI
Recent Publications
Featured Photograph
CHARLES BABBAGE INSTITUTE
CENTER FOR THE HISTORY OF INFORMATION TECHNOLOGY
NEWSLETTER
Spring 2015
Vol. 37
No. 1
In This Issue:
Director’s Desk
3
Gideon Gartner and the Gartner Group Records
5
Cortada Book Collection Cataloged
6
Michael J. Samek Bequest
8
Cullinane: Smarter than Their Machines
10
Yost Attends NSF SaTC PI 2015
12
CBI “Computer Security” Annals Special Issue
13
Misa on Isaacson’s Innovators
15
Norberg Travel Grant Recipients
17
Con Diaz 2015 Tomash Fellow
18
Antitrust at CBI: U.S. v. IBM
19
Software History at CBI
(Norberg Grant)
21
Partnership for Computer History
23
Movie Graphics Move-In to CBI
26
Recent Publications
28
Featured Photograph
31
CBI Newsletter Editor: Jeffrey R. Yost
Charles Babbage Institute
211 Andersen Library
University of Minnesota
222 21st Avenue South
Minneapolis, Minnesota 55455
Email: cbi@umn.edu
Ph. (612) 624-5050
Fax: (612) 625-8054
www.cbi.umn.edu
The Charles Babbage Institute for the History of Information Technology is sponsored by the University of Minnesota and
the information technology community. Charles Babbage Institute Newsletter is a publication of the University of
Minnesota. The CBI Newsletter reports on Institute activities and other developments in the history of information
technology. Permission to copy all or part of this material is granted provided that the source is cited and a copy of the
publication containing the copied material is sent to CBI. © Charles Babbage Institute
2
Director’s Desk
As a historian I am committed to understanding how history is made, often through the give-andtake interactions of strong structural forces such as globalization or the digital revolution with
individual human beings struggling to get a computer program to run or a printer jam cleared.
But as director of the Charles Babbage Institute, I am reminded daily of how humans literally
make history—donating valuable records, conducting oral histories to pin down critical turning
points, traveling to an archive far away (or doing research right at hand), experiencing the thrill
of an unanticipated nugget of historical insight in the umpteenth box of letters at the end of a
long day. So here are some vignettes from CBI.
CBI archivist Arvid Nelsen was, as many of you know, away from CBI for three months this
spring. The University Libraries granted him a research leave, and he invested time tracking
down the amazing people behind pioneering efforts to bring computing skills and access to
African American communities in California from the 1960s to today. He was privileged to talk
with several founders of local computer-literacy efforts in East Palo Alto, Oakland, and the area
surrounding much-fabled Silicon Valley. He is doing research for a book drawing on their
experiences and, like the excellent professional archivist he is, also mindful of archiving the
relevant records so that these experiences can be better understood and also might serve as
inspiration for similar education efforts today and tomorrow.
In Arvid’s absence, we had the excellent assistance of Rebecca Hranj. She had the time of her
life unpacking a just-received archival collection from Mark Sylvester documenting Wavefront
Technologies and Alias|Wavefront. Wavefront was founded in 1984 by Sylvester, along with
Bill Kovacs and Larry Barels, to develop graphics technologies for television and movies.
Among their early clients were Universal Studios, Electronic Arts, and NASA. Wavefront’s
techniques appear in numerous major films, such as the James Cameron–Arnold Schwarzenegger
blockbuster True Lies (1994), among many others, and earned the company two Oscars.
Rebecca assembled choice Wavefront artifacts for an exhibit outside the CBI office suite in
Andersen Library.
This February Jeff Yost and I put the final touches necessary to send our book on the National
Science Foundation’s FastLane computer system into production at Johns Hopkins University
Press. FastLane: Managing Science in the Internet World is our title. Among other thanks, we
salute the 800+ people who granted us interviews that documented their varied perspectives on
this notable e-government effort. Jeff is pounding away at the keyboard, hard at work on his
computer services book for MIT Press. He’s now on chapter four, making excellent progress
and looking forward to delving into our ADAPSO records.
Katie Charlet keeps the 101 moving pieces of CBI well organized. In addition to assisting
visiting Norberg Travel Grant recipients and other researchers, she is also handling the necessary
visa paperwork so that we can welcome Janet Toland from New Zealand as a visiting researcher
at CBI later this summer. The University of Minnesota shut down its central computer system
for ten days in April, and Katie was our guru in navigating the multifarious challenges before
and after the upgrade. Katie also lends her organizational, editing, and layout skills to bring
together this newsletter.
3
Three Ph.D. students are currently in residence at CBI. Jonathan Clemens is writing the core
chapters of his dissertation, which treats the history of video arcade games and is based on
archival records from Atari and several principals including Al Alcorn. Nic Lewis continues
work on the CBI–Los Alamos high-performance computing project, with several articles in the
pipeline and a summer’s worth of research in the mountains of New Mexico on the docket. For
the CBI–Sloan Foundation project investigating women in the early computing industry (196585), Will Vogel is examining archival records from Control Data and Burroughs and assessing
the advertising and editorial stances of Datamation and Computerworld.
As for me, I too am keeping myself out of trouble. In March I organized and submitted two
scholarly sessions for the upcoming fall SHOT conference in Albuquerque. At SHOT and
SIGCIS we are planning sessions showcasing research supported by the ACM’s History
Committee. Last week I sent an article off to Communications of the ACM. Yesterday I saw the
reviews that will shape the final revisions for Bernadette Longo’s biography of Edmund
Berkeley, forthcoming this year from ACM Books. Today I secured college-level approval for a
new course “Digital World” that will be first offered in Spring 2016. Tomorrow I have lunch
with Bob Price and a chance to discuss a possible Control Data company history project. And of
course there are sundry meetings that offer diversion.
If you are in the Twin Cities, please drop us a line. We’d love to show you around the CBI
office suite and, as time permits, sneak downstairs to see what new treasures Arvid has added to
CBI’s archive. And have a look at our roster of archival collections. You, too, can call up some
boxes of your choice and have a go at making history yourself.
Thomas J. Misa
4
Gideon Gartner and Gartner Group Records
Sarah and Gideon Gartner during their September 2014 visit to CBI. Photo courtesy of Arvid Nelsen.
In the summer of 2014, the Charles Babbage Institute received a significant donation from
Gideon and Sarah Gartner. Following on a donation of Gartner reports in 2010, the 2014 gift
documents the career and contributions of Gideon Gartner, a truly influential figure in
information technology and investment. In 1979 Gideon established the Gartner Group, an
information technology consulting and advisory group that sold services to vendors of hardware,
software and services, to enterprise and organizational IT users, as well as to investors and
consulting firms. Gideon brought expertise in both computing – from his professional beginnings
at IBM, Philco Corporation’s Computer Division, and System Development Corporation – and
finance, having been a partner at Oppenheimer & Co, where he was recognized as a top
technology analyst on Wall Street. Among his many accomplishments, Gideon is recognized for
developing a research process, documented in the “Research Notebook” (included in the
materials now at CBI) and that was used to create the concise research reports that were deeply
valued by the IT industry, investors, and users. Gideon also created the technology advisory
consulting company GiGa in 1995 and the financial services/broker-dealer firm Gartner
Securities Corp. in 1984, which became SoundView Technologies Group in 1988. The collection
that now resides at CBI documents all of these innovative and respected organizations. See
Gartner Group Records (CBI 228) at <purl.umn.edu/202668>: 57 linear feet.
R. Arvid Nelsen
5
Now in Public Eye: 3,500 Cortada
Collection Books
In 2009 CBI received four large book collections that, together, boosted our volume count to
approximately 10,000. In an earlier CBI Newsletter article, we noted the treasures that existed in
the Erwin Tomash (CBI 75), Michael Mahoney, Carl Machover, and James Cortada book
collections. With support from the University of Minnesota Libraries we have been able to move
these valuable volumes squarely into the public eye. Once, you needed to know that a certain
book existed in the Mahoney or Cortada collection; then you could look it up specifically — in
that collection. Now, users across the university and around the world can discover and gain
access to these volumes through the university’s catalog. The result is more work for us, since
(as CBI archivist Arvid Nelsen reports) the increased visibility has already resulted in a
noticeable uptick in requests. The Cortada collection is now cataloged, the Tomash collection is
in process, and the Mahoney and Machover collections are in the cataloging queue.
The best thing is that you don’t need to know “what specifically” is in the Cortada collection to
be able to discover it. But, just in case, here is a set of tantalizing tidbits from a wide collection
that Jim Cortada assembled from his own shelves and IBM technical libraries:
These range literally from “A to Z” . . .
Michael Abbey and Michael J. Corey’s
ORACLE 8 - A Beginner’s Guide (1997)
through to Edward J. Zoll’s Logic: A
Programmed Text for Two-Valued and ThreeValued Logics (1968). The earliest book
might be Richard Courant and Herbert
Robbins’s What is Mathematics? (1941).
Another early gem is Gordon S. Brown and
Donald P. Campbell’s Principles of
Servomechanisms (1948).
Many special titles on notable topics, such as
. . . Paul W. Abrahams and Bruce A. Larson’s
UNIX for the Impatient (1992) . . . Dr. Dobb’s
Toolbook of C (1986) . . . Federal Electric
Corporation on Logarithms (1972) . . .
Richard Y. Kain on Automata Theory:
Machines and Languages (1972). And who
can resist Ned Snell on Teach Yourself the Internet in 24 hours (1998)?
Even a few famous authors, such as . . . Franz L. Alt on Electronic Digital Computers (1958) . . .
Gordon Bell on Computer Structures (1971) and Computer Engineering: A DEC View of
Hardware Systems Design (1978) . . . Edsger Dijkstra’s Primer of ALGOL 60 Programming
(1962) . . . A.P. Ershov and D.E. Knuth’s Algorithms in Modern Mathematics and Computer
Science (1981) . . . Bernie Galler and Alan Perlis’s View of Programming Languages (1970) . . .
Marvin Minsky on Semantic Information Processing (1968) . . . Nils J. Nilsson on Learning
6
Machines (1965) . . . Willis H. Ware on Digital Computer Technology and Design volumes 1
and 2 (1963).
Researchers will find 30 ACM conference volumes . . . 55 volumes of Bell System Technical
Journal (1940s though 1980s) . . . 50 IBM publications on diverse topics . . . 106 volumes of
SHARE Proceedings (1950s through 1970s).
Any of these volumes can be located through the main University of Minnesota’s catalog at
<https://www.lib.umn.edu/>. If you search for “Unix …
Impatient” you get the catalog entry: UNIX for the
Impatient, Available at TC Andersen Library Babbage
Institute (Cortada) (QA76.76.O63 A27 1992 ). A quick
consultation with us can deliver the volume to your
impatient hands.
Upstairs we have around 2,000 volumes in our reference
collection in the CBI office suite. “Where is there room
for an additional 10,000 volumes?” you might be thinking.
The Cortada, Mahoney, Machover, and Tomash book
collections are safely stored downstairs in our climatecontrolled caverns. Arvid Nelsen is taking these volumes
out of the usual archival boxes and installing them in book
trays on the cavern shelves. The books remain in optimal
storage conditions while gaining global visibility.
Thomas J. Misa
7
Michael J. Samek Bequest:
Long-Term Support for CBI
I have before me the record of Michael Samek’s first donation to the Charles Babbage Institute
— as well as his last donation. His contributions to CBI form quite a story, stretching over 25
years. We are sorry to report that Michael has passed away, but his bequest to CBI has
permanently endowed a special fund that will enhance CBI’s long-term programmatic activities
in research, scholarship, and special events.
Michael had a distinguished career in the computer
industry, and he drew on his personal experience as an
information-technology manager and executive to
encourage three CBI directors — Arthur Norberg, Robert
Seidel, and myself — to devote appropriate attention to
the users of computing. He wrote me in October 2006,
shortly after I became CBI director, expressing his
experience of having been one of those who “started early
service bureaus and/or became ‘MIS directors’ and
eventually CIOs” and emphasizing the challenges of
“[bringing] a relatively unstable technology into business
and industry — affecting the health of organizations not
Michael Samek in a talk to the Society for
Management Information Systems (1972)
to speak of careers.” Our files have a letter Michael
wrote to Arthur Norberg in May of 1986, two decades
earlier, expressing a similar concern about the importance of “the early users of computing
technology . . . the early enthusiastic promoters who frequently spurred new developmental
ideas.” He’d made a similar point in 1972 to the Society for Management Information Systems:
“Computer people must ‘stop building systems for systems’ sake’.” 1
Michael was born in Vienna, Austria, and came to the United States in June 1939. He enlisted in
February 1941 and was assigned to the Army Air Corps, volunteering for glider-pilot training
after Pearl Harbor. After initial training in California and Texas, he did field training in Egypt
and Algeria and saw combat duty in Sicily and southern France. After the war he stayed in the
Air Force Reserve, retiring as Lieutenant Colonel in 1962. 2
His wartime experiences led naturally to the aerospace industry where he worked in a variety of
engineering positions. Courses at Columbia University prompted his early entry into the
computer industry, where he worked in operations, consulting, and management. For many
years, Michael was a manager and executive with Celanese Corporation, a Fortune 100
petrochemical company, retiring as vice president of its management services division.
He took special interest in connecting information technology to corporate executives. In a 1974
Computerworld article reporting on a session he’d organized at Info ’74, he praised the
1
2
Edward J. Bride, “How to Succeed in MIS: ‘Identify with Company’,” Computerworld (20 September 1972): 4.
World War II Glider Pilots (Turner Publishing, 1991), p. 135.
8
expansion in the attendance of corporate managers: “this year 10 of you out of about 100 are
corporate executives. I think that’s progress.” At the time Michael was a vice president at
Celanese concerned with the “management gap” between corporate executives and dataprocessing personnel. 3 Eight years later, Computerworld profiled Michael’s keynote address to
the International Data Corporation’s 1982 Spring Executive Conference. There Michael gave a
critical assessment of office automation, noting successes with word processing, but observing
many other promising applications (including email!) were hampered by too many “buzzwords”
and not enough careful alignment of technology and conceptualization of office work. 4
Michael began donating to the CBI Friends program nearly the moment it got off the ground: his
first contribution was December 1982 (and our donor records clearly indicate this was a “new”
membership). He continued faithfully and regularly, most frequently as an Associate member,
over more than two decades. We were saddened to hear of Michael’s passing in 2007. His
estate passed into probate in New York state, then was transferred to Israel for final settlement.
This process has taken some time, but we are grateful for the very generous contribution that
came to CBI as a residual legatee of Michael’s estate. We have arranged with the University of
Minnesota Foundation to create the “Michael Samek Fund” with its purpose to be “support of
longer-term activities and initiatives of the Charles Babbage Institute, such as funding for special
workshops, conferences, CBI research programs, and associated scholarly publications that
enhance visibility and scholarly attention to CBI.”
We are grateful to Michael for his support over these many years and, especially, for his
intentional donation to CBI through his estate planning.
Thomas J. Misa
3
“Gap Narrows Slowly But Top Executives Still Shy From DP,” Computerworld (25 September 1974): 9.
Bruce Hoard, “Conference Keynoter Critical of OA [office automation] Scene,” Computerworld (10 May 1982):
16.
4
9
John Cullinane’s CBI Book: Smarter than
Their Machines (2014)
John Cullinane came to us last spring with a great and urgent question. “You have these
amazing oral histories,” he told us, “and you simply must get them out to the world!” It
happened that back in 2003 John had been interviewed by CBI associate director Jeffrey Yost as
part of CBI’s NSF-funded project
on the history of software. John
was the founder in 1968 of
Cullinane Corporation, one of the
earliest and most successful
software products companies. He
clearly had an important story to
tell.
John floated the idea of
publishing a book from the CBI
oral histories, and Jeff made the
suggestion of adding John’s voice
and perspective as an integral
part. John went to work looking
up the people that he’d worked
with and, sometimes, worked for
in the CBI interviews. He also
crafted introductions and
commentaries that connected his
personal story with the
interviews.
The CBI interviewees that had
direct connections to John’s
history formed quite a list. Early
on, John went to work for C-E-IR, Inc., the prototype computer
services company founded by
Herbert Robinson. John was a
“hockey dad” at ringside with
famed computer designer Richard Bloch, the pioneering computer programmer with the Harvard
Mark I. Bloch’s computers were among those that Sam Wyly sold as a rising Honeywell
salesman, while Gene Amdahl’s computers for IBM were also sold by Wyly; and it happened
that Wyly succeeded massively in the computer-services sector where Robinson had struggled.
Interactive computing was a mainstay of Cullinane Corporation, which used data networks and
databases to create and deliver software products. So there are intriguing selections from the
ARPANET and Internet pioneers: J.C.R. Licklider, Ivan Sutherland, Larry Roberts, and Bob
Kahn. The transformation of computing at MIT is a focus of Marvin Minsky and Michael
10
Dertouzos, and Joseph Traub describes the creation of Carnegie Mellon’s notable computerscience department. Jeff’s interview with John rounds out the volume.
We hatched a plan for publishing the book. John finalized the text, photos, and captions in
September 2014. We’d arranged a contract with the newly launched series at ACM Books. The
fine editorial and production staff at publishers Morgan & Claypool went to work, and we had
the book by November, well in time for Christmas. ACM Books is a new venture, publishing a
wide variety of computer science volumes — including history of computing. John’s book
contains extracts from the CBI oral histories, and the e-book version contains direct links to the
complete oral histories on the University of Minnesota server. It is simply unheard-of to have a
2.5 month book production cycle.
You can find John’s book on Amazon, Barnes and Noble, and in the ACM’s Digital Library and
by DOI. For that matter, since we sent thank you copies to each of our CBI Friends, you can join
the CBI Friends today and we’ll send you John’s book tomorrow!
John gave an hour-long seminar at Harvard University earlier this spring, and a pod cast is here
<https://soundcloud.com/harvard/public-private-partnerships-a?in=harvard/sets/m-rcbgpodcasts#t=4:55> “Are we still smarter than our machines?” he was asked by an audience
member. Judging from the up-swelling of computer savvy by young people, he noted, the
answer remains a resounding ‘yes’.
Thomas J. Misa
11
Yost Attends NSF SaTC PI 2015
CBI associate director Jeffrey Yost attended and presented a poster at the National Science
Foundation’s Secure and Trustworthy Cyberspace (SaTC) Principal Investigators Conference in
Arlington, Virginia, in early January 2015. The event (held biennially) brought together NSF
SaTC-funded investigators to present results, network, share ideas, and plan for the future.
The three-day conference, led by SaTC program director Jeremy
Epstein and attended by more than 400 investigators, included
keynote talks, breakout discussions, “rapid-fire cross-collaborations,”
and regular, poster, and “birds of a feather” sessions on many key
topics in computer security and privacy. Among the highlights, Chief
Information Security Officer of In-Q-Tel Dan Geer presented, “T.S.
Kuhn Revisited,” in which he examined the history of computer
security within the context of Kuhn’s concepts of “normal science,”
“extraordinary science,” and “paradigm shifts,” and in a closing
plenary session, former NSF Trustworthy Computing (SaTC’s prior
name) director Carl Landwehr explored how—despite many
achievements in computer security research—the field’s largest
problems have been constant over the past decade and a half.
Jeremy Epstein, SaTC Director
Yost’s poster highlighted the
accomplishments of CBI’s “Building an
Infrastructure for Computer Security
History,” a SaTC-funded project he coleads with CBI director Tom Misa. To
date 27 of the planned 30 oral histories
have been conducted (with many of the
foremost computer security pioneers,
including Rebecca Bace, Terry Benzel,
David Bell, Dorothy Denning, Peter
Denning, Butler Lampson, Carl Landwehr,
Steve Lipner, Teresa Lunt, Peter Neumann,
Roger Schell, and Gene Spafford). The
full text of these interviews—typically 2 to
4 hour interviews with 70 to 150 page
edited transcripts—are available at
www.cbi.umn.edu/oh. The first of our
two Computer Security special issues of
IEEE Annals of the History of Computing
(April-June 2015) will be out shortly and
features seminal scholarship on the history
of cryptography, computer security
standards, network security, computer
security and policy-making, and the
computer security industry. The articles
richly explore the many social, cultural, political, economic, and institutional contexts to
12
computer security (see the following article). As with the second special issue (to be published in
2016), it is composed of revised papers from CBI’s “Computer Security History Workshop,”
held at the institute in July 2014. In addition to facilitating and editing scholarship of an
emerging computer security history community, the project team has been actively publishing.
Yost has two peer-reviewed articles coming out, GSRA Nic Lewis one, and Misa, Yost, and
Lewis have more in the works. Our project’s Computer Security Wiki—detailing the history of
key people, events, ideas, and systems—has been receiving thousands of page views per month.
The Wiki is at <tinyurl.com/cbi-secure>. And our archival collecting effort has yielded many
important materials donated by Steve Lipner, Stephen Lukasik, Lance Hofffman, and others.
First of Two CBI “Computer Security” Special
Issues of the Annals (April-June 2015)
The July 2014 CBI Computer Security
History Workshop brought together
leading computer historians and some
of the foremost computer security
pioneers for two days of presentations,
discussions, and exchange. Revised
papers from this event will be
published as two CBI guest edited
special issues of IEEE Annals of the
History of Computing, the first of
which will be out any day now (and
the second in 2016).
This special issue features RAND
Corporation’s Willis Ware on the
cover, a leading computer scientist
who was the first to formally articulate
(at the 1967 Spring Joint Computer
Conference) the multi-level computer
security problem introduced by the
rapid advance of time-shared computer
systems in the 1960s. Ware went on to
lead the Defense Science Board Task
Force on Computer Security in the late
1960s that completed the famed Ware
Report in 1970, and several highly
influential committees on computers
and privacy later that decade. CBI holds the Willis H. Ware Papers, which are especially strong
documenting his committee leadership efforts regarding computers and privacy.
13
The articles of our special issue make major contributions to the technical, business, political,
social, cultural, and intellectual history of computer security. US Cybercommand Historian
Michael Warner and Microsoft’s Steve Lipner’s papers concentrate on foundations—with
Warner focusing more on policy history within the executive and legislative branches and Lipner
on the pre-history, history, and consequences of the Department of Defense computer security
standards with the Trusted Computer System Evaluation Criteria (“The Orange Book”) and the
associated certification infrastructure in the 1980s. Cornell University’s Rebecca Slayton and I
extend these foundations. Slayton’s article examines how U.S. government regulators valued
risk analysis and metrics, as practitioners often questioned the measurement of risk. I analyze
the origins and growth of the computer security software products industry—showing how
computer giants (IBM) and startups (SKK, Inc.) listened to users in developing access control
software products well short of the high assurance goals (upper end of the criteria levels) set by
the DoD with TCSEC. Finally, American University’s Laura DeNardis and Indiana University’s
Dongoh Park concentrate on elements of the political and social history of communication
security, surveillance, and cryptography. DeNardis’ article investigates the design tension
between national security interests for surveillance versus network security in computing from
the mid-1980s into the 2000s—focusing on the work of the Internet Engineering Task Force.
Park extends the geographic scope with a case study of public key encryption technology in
South Korea—highlighting the significant social and cultural challenges, as well as technological
ones, in implementing public key infrastructure.
We are grateful to all the participants of the workshop for their insightful comments and
especially to the Annals Editor-in-Chief Nathan Ensmenger for his participation at the event and
guidance with the issue. We are also grateful to the National Science Foundation and past and
present program directors Carl Landwehr and Jeremy Epstein (of Trustworthy Computing and
SaTC respectively) for funding the workshop and CBI’s larger four-year computer security
history project—NSF 1116862.
Both electronic and print subscriptions to the Annals are available from the IEEE Computer
Society, and electronic versions of all issue content are free to download to those affiliated with
organizations subscribing to either the IEEE Computer Society Digital Library (through IEEE
Xplore) or Project MUSE.
Jeffrey R. Yost
14
Isaacson’s Innovators: Historian’s Reflections
A philosopher-colleague once told me that historians read books “backwards.” Normal readers,
he thought, read books from their beginning to the end, from start to finish, left to right, top to
bottom. What was most important was the quality and soundness of the author’s argument, and
he or she built it up one sequential piece at a time. And you follow an argument from beginning
to end. Historians, by contrast, open a book to the beginning pages, start in on their reading, but
soon they are rummaging around in the footnotes, at the end of the book, how strange. Of
course, I responded, for a historian the key thing is trying to assess the quality of the evidence.
And you find the telltale trail of evidence in the footnotes.
Walter Isaacson’s Innovators: How a Group of Hackers,
Geniuses, and Geeks Created the Digital Revolution (2014)
is, I believe, a philosopher’s book. It offers memorable
profiles and a powerful narrative, providing a neat and tidy
argument linking up Charles Babbage and Ada Lovelace in
the early 19th century through the haze of the 1960s
counterculture’s LSD parties and onward to the buzz about
social media today. Ada Lovelace is the touchstone: the
subject of his first and last chapter, seeing better than her
collaborator and confidant Babbage that computing could
be about far more than numbers and calculation. Isaacson’s
Lovelace attained the lofty heights of “poetical science,”
where the idealism of the Romantic period fused with the
calculating mentality of the Victorians. In his conclusion,
“Ada Forever,” Isaacson speculates that were she alive
today she would celebrate computers as “beautiful
machines that can . . . make music and process words and
‘combine together general symbols in successions of
unlimited variety’.” He thus meaningfully connects
Lovelace with Twitter, no small achievement.
I made it to page two before my “backward” historian’s habits kicked in. Before burdening the
reader with my rummaging around in the sources and footnotes, let me give an overview of
Isaacson’s themes and perspective. Isaacson finds his heroes in latter-day Renaissance men who,
like Leonardo da Vinci, creatively combined science and technology with an interest in art,
music, and philosophy. William Shockley, the brilliant but troubled co-inventor of the transistor,
“grew up with a love of both art and science.” J.C.R. Licklider, the visionary behind the
Arpanet, was a shrewd judge of computer scientists, yet “one of [his] passions was art.”
Likewise, Isaacson shows repeatedly that vibrant communities of diverse practitioners (Bell Labs
was the locus of George Stibitz, Claude Shannon, and the transistor trio) are the locus of
technological innovation. Solitary geniuses, such as John Atanasoff “on his own” at isolated
Iowa State or even Charles Babbage, who in Isaacson’s retelling was alone “in the shed behind
his London home,” lack the supportive environment to realize enduring achievements.
Above all, Isaacson is a master at the all-encompassing narrative that lines up and connects
disparate people and diverse facts. The narrative creates connections and conjures influences
15
forward, even where the historical evidence is slim. In his very first paragraph on Howard
Aiken, then a Harvard graduate student, Isaacson has him discovering a fragment of one of
Babbage’s Difference Engines (two wheels) and becoming “fascinated by Babbage.” Soon Aiken
drafts a 22-page memo to the Harvard faculty that finds its way to IBM. “The Harvard I
[computer] borrowed a lot of Babbage’s ideas,” he writes (52). Another narrative arc connects
Bell Labs and Silicon Valley. Compared with 60 pages on the familiar storyline from Shockley
and Bell Labs to Intel and the naming of “Silicon Valley” in 1971, there is by my count just three
paragraphs on Hewlett Packard. Personal computing is likewise a familiar story (based on John
Markoff and Fred Turner) with Steward Brand at the center. Footnote 3 on page 509 discloses
the tantalizing bit that Isaacson, then at Time magazine, assigned to Brand the the 1995 essay
“We Owe it All to the Hippies,” the origin point of the counterculture-creates-personalcomputing mythos. LSD gets seven pages in the index, more than Manchester and Cambridge
universities, Maurice Wilkes, and Freddie Williams—combined (this is an American story).
What drops out of strong narratives is the uncertain play of contingent events and the possible
roads not taken. For example, Isaacson provides a lengthy treatment of America Online, since it
seems AOL provided the masses with an essential introduction to the World Wide Web. Little
remarked is the $350 billion mega-merger of AOL with the Time-Warner media empire. 1
Looking back, we see Isaacson as a print journalist working at the sharp cutting edge of the
digital revolution, and we imagine he has an insider’s story to tell about these challenging years.
On page 3 he relates, all too briefly, “I helped to run a digital division at Time and Time Warner
that launched new Web and broadband internet services . . . [quoting poet Wordsworth:] ‘Bliss
was it in that dawn to be alive’.” Yet later, he rues that “we abandoned our focus on creating
community after we settled into the Web in the mid-1990s” (421). Absent from this account is
reflection on the 1990s big-media dogma that “content is king,” attributed to Bill Gates in the
heady days of MSN and Windows 95; of course Isaacson writes with the present perspective that
the Web led naturally to Google, Facebook, and Twitter.
Isaacson consulted Charles Babbage Institute oral histories for his profiles of ENIAC and
UNIVAC guru J. Presper Eckert as well as the pioneers Richard Bloch, J.C.R. Licklider, and
others. He also did his own interviews with many prominent figures, including insights from his
acclaimed biography of Steve Jobs (2011). By all means pick up Isaacson for a readable
overview of the digital revolution. But keep in mind that there are other compelling figures that
deserve your curiosity. And remember that a full understanding of history cannot be reduced to
a straight line or captured in a single strong narrative. Look sideways to John Agar’s
Government Machine (2003) and Larry Owen’s articles in Technology and Culture and Annals
that dispel the quick judgement that “Digital Beats Analog” (p. 36). Look over the Atlantic to
better understand early programming at Cambridge University and early networking in Europe.
And look beyond the shores of Silicon Valley to understand the contributions and the
consequences of the digital revolution in Japan, India, and China.
Thomas J. Misa
1
Tim Arango, “How the AOL-Time Warner Merger Went So Wrong,” New York Times (10 January 2010) at
<www.nytimes.com/2010/01/11/business/media/11merger.html>.
16
Five 2015 Norberg Travel Grant Recipients
This year’s Arthur Norberg Travel Grants have been awarded to University of Waterloo’s Scott
Campbell, Rensselaer Polytechnic Institute STS doctoral student Ellen Kathleen Foster, New
York University Department of Music doctoral student Joshua Hudelson, College of William and
Mary American Studies doctoral student Nabeel Siddiqui, and Northeastern Illinois University
CIO (and affiliate Computer Science faculty member) Kim Tracy.
Campbell is studying how Canadian scientists, engineers, managers, and users sought to
professionalize their work in computing in the 1950s and 1960s. He will be drawing on CBI’s
strong collections of organizational records, including those of the Association for Computing
Machinery, Data Processing Management Association, (IBM) Share, Inc., (Univac’s) USE,
AFIPS, and IFIP.
Foster’s dissertation concentrates on the communities, social dynamics, and politics in
“hackerspaces/makerspaces.” At CBI she is particularly interested in researching the influence
of the federal government on “maker culture,” as well as the role on maker communities on
agencies such as ARPA/DARPA. She plans to examine the Alex McKenzie collection on
computer networking as well as the John Day papers.
Hudelson is examining the way in which computer-generated sound and musical notation have
been presented as examples of technological progress, and the impact this has had on musicians,
composers, and audiences. He will be using the John Nash papers, who created the first
computer-generated musical score with the University of Illinois’ ILLIAC, as well as the Carl
Machover papers.
Siddiqui is studying private sphere discourses on computers that have played out in public
through media meant for public consumption (magazines, newsletter, other media). She will be
researching hobbyist newsletters at CBI such as The Amateur Computerist, The Homebrew
Computer Club Newsletter, Dr. Dobbs Journal, and The Silicon Gulch Gazette.
Tracy is conducting archival research at CBI in support of a textbook he is writing on software
evolution and lessons from history (for ACM Books). CBI’s extensive software history
materials provide many opportunities for this broad study. Several collections he is particularly
interested in using are the Michael Mahoney Papers, the Carl Machover Papers, and the Charles
Bachman Papers. (See his write-up elsewhere in this newsletter.)
The Arthur L. Norberg Travel Grant Program is a fund created by donors in honor of the Charles
Babbage Institute’s founding director. To donate to this important fund please go to
<www.makingagift.umn.edu/onlinegiving> and indicate ‘Norberg Fund’ under special
instructions.
Jeffrey R. Yost
17
Gerardo Con Diaz Awarded Tomash Fellowship
Gerardo Con Diaz is the recipient of the
2015-2016 Adelle and Erwin Tomash
Fellowship. He is ABD at Yale University
(History of Science and Medicine), and has a
M.A. from Trinity College, University of
Cambridge (History, Philosophy, and
Sociology of Science and Medicine) and a
B.A. from Harvard University
(Mathematics). Over the past year he has
actively been presenting his dissertation
research at leading conferences, including
the Society for the History of Technology
(2014), and publishing peer reviewed
scholarship (two upcoming articles accepted
at IEEE Annals of the History of
Computing).
Diaz’s dissertation is entitled “Intangible Inventions: A History of Software Patenting in the
United States.” It argues that the commercial, legal, administrative, and philosophical problems
born out of the patent protection of computer programs from the 1940s to the early 1980s shaped
four legal frameworks that facilitated the spread of personal computing in the 1980s. These
frameworks are the copyright protection of computer programs, notions of free software,
software taxation, and the intellectual property protection of visual displays and microchips. His
argument highlights that patent law was central to the emergence and establishment of computer
programs as new technologies, inventions, and commodities.
Archival materials held at CBI have been central to his dissertation research. In fall 2014, he
used the collections on ADAPSO and the CCIA to study how trade associations helped to shape
the software industry’s relationships with the law. He also examined the papers of prominent
firms and people such as Applied Data Research, Martin Goetz, and Calvin Mooers to study the
personal, financial, and professional stakes involved in the intellectual property protection of
software (see related article). CBI’s collections of oral histories, conference proceedings, and
industry periodicals are also prominent throughout the dissertation. In 2015-2016, Diaz will be
conducting archival research at industrial research laboratories, court depositories, and several
branches of the National Archives.
Jeffrey R. Yost
18
Antitrust at CBI: Engaging with the
Archival Holdings on U.S. v. IBM
In the fall of 2014, I visited CBI to perform archival research for my doctoral dissertation,
Intangible Inventions, a history of software patenting in the United States. I worked very closely
with the collections for which patenting is a central concern. These include Applied Data
Research, the Association of Data Processing Service Organizations (ADAPSO), and Martin
Goetz. 1 However, one of my goals for the semester was to examine the relationships between
intellectual property law (the field of law that includes protections such as patents, copyrights,
and trademarks) and antitrust law, which is designed to preclude firms from engaging in
anticompetitive behavior. Fortunately, CBI has an extraordinarily rich collection of antitrust
records compiled by the Computer and Communications Industry Association (CCIA). 2
My purpose in this essay is to discuss some of the intellectual challenges and opportunities that
arise in the course of studying this massive and often cryptic collection. I use as an example the
records for the prominent antitrust case U.S. v. IBM (69 Civ. 200, S.D.N.Y., 1969), which
comprise a large portion of the CCIA collection. 3 The Department of Justice filed this suit on
January 17, 1969 at the U.S. District Court of the Southern District of New York. Their
complaint alleged that IBM’s bundling—that is, its free distribution of software with the
purchase of its hardware—was illegal. The suit continued until 1982, when the Assistant
Attorney General, William Baxter, dismissed the suit for lack of merit. In the process, the suit
yielded over one hundred thousand pages in trial transcripts, not counting the thousands of pages
added by trial exhibits and other related materials.
The finding aid for the CCIA’s antitrust records is very useful, but the large volume and unusual
structure of the documents for U.S. v. IBM make the aid difficult to navigate. 4 Twenty two of the
collection’s boxes are labelled by the page numbers and dates of the trial transcripts that they
contain, and several more boxes are labelled with little more than exhibit numbers written in two
different systems. For example, an entry for Box 15 reads “Pages 70371-76096, March 27, 1978June 23, 1978”; another entry specifies that Box 32 contains trial exhibits “CCIA 1327-1357.”
Although the dates in several entries give some sense of when the materials therein were
produced, more information is necessary in order to identify and understand the main issues at
the time.
1
Two articles that I wrote based on my work at CBI are forthcoming in IEEE Annals of the History of Computing.
Please keep an eye out for “Embodied Software: Patents and the History of Software Development, 1946-1970,” and
“Contested Ontologies of Software: The Story of Gottschalk v. Benson, 1963-1972.”
2
Computer and Communications Industry Association. Antitrust Records (CBI 13), Charles Babbage Institute,
University of Minnesota, Minneapolis. A sister collection is held at the Hagley Museum and Library: Computer &
Communications Industry Association IBM antitrust trial records (Accession 1912), Hagley Museum and Library,
Wilmington, DE 19807.
3
This is a well-known case in the history of computing. See Steven Usselman, “Unbundling IBM: Antitrust and the
Incentives to Innovation in American Computing,” in Sally Clarke, Naomi Lamoreaux, and Steven Usselman, The
Challenge of Remaining Innovative: Insights from Twentieth Century American Business (Stanford University Press,
2009), 249-279.
4
Finding Aid, Computer and Communications Industry Association Collection of Antitrust Records, CBI 13.
Available online at http://purl.umn.edu/40650.
19
The key to engaging with records for complex cases such as U.S. v. IBM is to think about the
ways in which courts of law generate knowledge. One effective way to start doing this is to study
the courts themselves: What procedures need to be followed in order to accomplish things such
as taking a deposition? What kinds of evidence are admissible, and what standards govern the
admission of facts and exhibits into the trial? For federal courts such as the District Court for the
Southern District of New York, a useful guide to these questions can be found in the Federal
Rules of Civil Procedure and the Federal Rules of Evidence. 5 However, understanding the legal
frameworks involved is not sufficient to make historical sense of them. This is where the
historiography of science, technology, and the law becomes very useful. Indeed, many historians
and STS scholars have written valuable studies that illustrate how to place rules of evidence and
civil procedure in their historical contexts. The space constraints of this contribution preclude me
from discussing their arguments, but their works are valuable examples of how to historicize the
relationships among knowledge, technology, and the law. 6
Still, developing a sophisticated historical understanding of evidence and procedure is only half of
the battle; the other half requires direct engagement with the historical objects themselves.
Fortunately, the U.S. v. IBM collection’s finding aid contains just enough information to begin
this work. In particular, it notes the location of briefs that all parties involved filed at different
points throughout the trial, and each brief in turn notes locations within the transcripts and
exhibits that the historical actors themselves deemed important. The aid points to a gem in the
history of U.S. v. IBM—a document known as the “Mancke Narrative,” crafted by the economist
Richard Mancke and some of his colleagues. An economic analysis of the history of IBM, this
document became the basis for IBM and the United States Data Processing Industry, a book that
Mancke and his co-authors published in 1983 based on their commissioned research for the trial. 7
The citations to the court records found in Mancke’s narrative, in his book, and in the briefs filed
throughout the case’s history provide enough information to start identifying the major factual,
evidential, and procedural issues in the history of U.S. v. IBM. These are difficult to interpret,
however, without understanding the methodological and intellectual matters at stake in the study
of technology and the law. After all, many court documents are hundreds of pages long, and they
can serve as boundary objects among all interested parties—that is, as robust objects that held
different meanings to different people, and which served diverse purposes. Still, despite these
difficulties (or perhaps because of them) the intellectual heavy lifting required to engage with the
U.S. v. IBM records is very rewarding. The collection remains one of my favorite ones at CBI.
Gerardo Con Diaz
Ph.D Candidate, Yale University, gerardo.condiaz@yale.edu
5
Of course, these rules change over time, so it’s important to become familiar with their histories as well. Their more
recent versions can be found in Federal Rules of Civil Procedure. Available online at
http://www.law.cornell.edu/rules/frcp; and Federal Rules of Evidence. Available online at
http://www.law.cornell.edu/rules/fre.
6
Four works with which a scholar new to this field can start thinking about these issues include Ian Burney, Bodies
of Evidence: Medicine and the Politics of English Inquest, 1830-1926 (Baltimore: Johns Hopkins University Press,
1999); Graham Burnett, Trying Leviathan: The Nineteenth-Century New York Court Case that Put the Whale on
Trial and Challenged the Order of Nature. New Jersey: Princeton University Press, 2010; Tal Golan, Laws of Men
and Laws of Nature: The History of Scientific Expert Testimony in England and America. Cambridge: Harvard
University Press, 2004; Sheila Jasanoff, “Science and the Statistical Victim: Modernizing Knowledge in Breast
Implant Litigation.” Social Studies of Science 32 (February 2002): 37-69.
7
Franklin Fisher, James McKie, Richard Mancke, IBM and the United States Data Processing Industry (New York,
Praeger, 1983).
20
Software History at CBI
(Norberg Grant)
Software history, and in particular, that history which is relevant to current students of
computing is the subject of a textbook that I have been working on for some time. I have a fairly
expansive technical background in software, but there are some gaps in my knowledge,
particularly on happenings before my professional career began. Additionally, I knew I needed
to know more about particular key events in software history such as the creation of technologies
we now all depend on such as operating systems, database systems, and computer graphics. The
book I’m working on is entitled Software Evolution: Lessons Learned from Software History. 1
My early searches made it clear that the Charles Babbage Institute was the best single place to go
for such materials. So, as part of my recent sabbatical, I included a trip to CBI in October 2014
as well as several other archives. As a result of that initial trip in October, I applied for and
received a Norberg travel grant to return to CBI in April 2015. The initial trip was only a week
long, and I learned that the resources at CBI certainly deserved devoting another week.
The resources at CBI turned out to be extremely helpful to my work. Since “software” is such a
broad topic and there’s no work quite like this which has a technical history of software, I needed
to develop a framework and an approach for addressing it. In the first visit, it helped me a great
deal to pour through the resources to help solve two issues: How to structure this work? And
what kind of examples should I use?
Particularly helpful to me was the Michael Mahoney papers (CBI 213). Mahoney had devoted
much of his professional career as a historian to computing history and software history in
particular. His papers show a methodology and approach which I found extremely helpful in my
own thinking about how to interrelate topics and changes in software. His papers are littered
with unpublished notes and diagrams that are just fascinating to go through. Additionally, he
had collected almost every seminal paper and book which related to many aspects of software
history. This made it easier for me to find many of the materials that I would end up using.
My initial thought in visiting CBI was to gather specific examples, particular from early
examples of software technologies. Certainly, I found a lot of these including the collections of
Charles Bachman (CBI 125), Alan Perlis (CBI 64), and Carl Machover (CBI 206). These gave
me examples of very early database systems, programming languages and compilers, and
graphics.
Besides the broad scope of materials at CBI, my visit also helped me tie together and better
understand the relationships and interactions between early software pioneers. I had also visited
the Grace Hopper papers at the Smithsonian and the George Forsythe, John McCarthy, and Doug
Engelbart papers at the Stanford University Archives. For instance, when I subsequently visited
the McCarthy papers, having gone through Mahoney’s papers, I had a better understanding of
McCarthy’s role in the theory of computation (even though I had known McCarthy when I was a
student). I found a copy of a 1932 letter from Columbia University’s astronomy professor
1
See an abstract at http://books.acm.org/subjects/forthcoming-titles
21
Wallace J. Eckert to IBM requesting a multiplying tabulating machine. This reminded me of a
similar letter I had seen at the Smithsonian from a Harvard astronomy professor requesting a
computation device in a similar timeframe.
Besides my research on the book, there were several items that, as a computer scientist, are just
awe-inspiring to see. One example is Charles Bachman’s Turing Award (in CBI 125), which I
just had to see and touch. Another fascinating document is the 1948 interrogation report of
Konrad Zuse by British Intelligence where they describe his debriefing (in CBI 17). Other
examples of thrilling items were reminders of my personal history at Bell Labs and items that
filled gaps in my memory (like Brian Kernighan’s 1981 paper on why Pascal was not his favorite
language, and the notes behind the UNIX oral history project in CBI 213). Another thrilling
example was the boards from the Bendix G-15 in CBI 90-008.
Bachman’s 1973 Turing Award Plaque.
Bendix G-15 Flip Flop board (IC1007RA), 1954.
22
In summary, the resources at the CBI were invaluable to me and my project. The scope and
breadth of the computing history resources cannot be matched anywhere. Additionally, the
collections are well-organized, well-maintained, and the finding aids are accurate and detailed.
The staff at the CBI are excellent, I never had to wait for materials, and they were extremely
responsive to my requests making my visits very productive.
Kim Tracy
Chief Information Officer, Northeastern Illinois University
k.w.tracy@ieee.org
Partnerships for Computer History
In January 2006, a fledgling Information Technology (IT) Legacy Committee met with Dr.
Arthur Norberg, then Director of the Charles Babbage Institute (CBI). Three months earlier,
Richard ‘Ole’ Olson (a Lockheed Martin [LMCO] Fellow) approached the VIP Club Board
requesting that they help LMCO to document history associated with their Eagan, Minnesota,
division. Club Director Lowell Benson volunteered to co-chair a legacy committee with Ole.
Board Associate Dick Lundgren spoke up, saying that he would help. He recommended that we
start at CBI. (The VIP Club is a non-profit, social and services club of 1,000 retirees and former
employees of UNISYS, LMCO, and their Twin Cities heritage companies.) Thus, two new
partnerships emerged: the Club partnered with LMCO for legacy investigations and with CBI for
computer history preservation.
Although Dr. Norberg published a book 1 covering UNIVAC’s formation, the committee realized
that that book did not tell the entire story of innovation in the Twin Cities that began with
Engineering Research Associates (ERA). At that January meeting, Dr. Norberg suggested getting
retirees to write career summaries and to record some oral histories. He added that if we could
gather experiences from 200 key people, that we might have the total history of the corporate
lineage. It seemed apropos to begin with ERA: 1) CBI founder, Erwin Tomash, worked at ERA
early in his technical and business career and 2) CBI directors hold the ‘ERA Land-Grant Chair
in History of Technology’ at the University of Minnesota.
Heeding Dr. Norberg’s advice, the IT Legacy Committee established three objectives:
•
First, capture whatever remaining material and information is available;
•
Second, catalog and archive all the material collected;
•
Third, publish/publicize our history and heritage in ways that interest industry and our
fellow Minnesotans via the web and local institutions.
1
Computers and Commerce: A Study of Technology and Management at Eckert Mauchly Computer Company,
Engineering Research Associates, and Remington Rand, 1946-1957 (MIT Press, 2005).
23
The committee realized that we could not document all of
Minnesota’s computer history and so decided to focus on the
heritage illustrated by our IT Legacy icon (at the right).
Thus, even though Bill Norris was one of the ERA founders,
we would not follow details of his subsequent founding of
Control Data Corporation (CDC). Although Seymour Cray
followed Mr. Norris to CDC and subsequently founded
Cray, Inc., we would not pursue that history path. A
UNISYS Fellow, Ron Q. Smith, from our Roseville,
Minnesota facility joined the Legacy committee to provide
the commercial computer industry aspects of the Twin Cities
Legacy.
The LMCO/Club partnership spread the word among employees and retirees asking for paper
and hardware artifacts. LMCO provided artifact storage space plus office space and PCs for the
capture and cataloging efforts. Club volunteers cataloged the artifacts as they were donated.
After Dr. Norberg retired, new CBI Director, Dr. Thomas Misa, continued the partnership as an
advisor. Lowell Benson started a web site to publish retiree/employee career summaries and
project stories. In 2007, we merged the Club and Legacy Committee web sites. We’ve posted
over 100 ‘Article for the Month’ topical papers since then at
<http://vipclubmn.org/documents.html>.
Our partnerships took on a new initiative for 2008 when Dick Lundgren arranged a committee
meeting with the Minnesota Sesquicentennial Commission. The Club/LMCO/UNISYS
committee subsequently displayed hardware artifacts and history posters in a tented booth on the
St. Paul Capitol grounds during the state’s formal, public celebration. The Commission was quite
impressed, and thus asked us to set up the booth display at the Minnesota State Fair and to
conduct a half-day computer history forum at the fair. About 100 volunteers from the Club,
LMCO, UNISYS, and CBI supported these efforts. Then Dick and Lowell arranged to have
documentation 2 of this initiative included in the 2058 Bi-centennial Time Capsule.
In September 2008, Dr. Misa started “Minnesota’s Hidden History of Computing,” a lecture
series presented at the Charles Babbage Institute. The series placed the ERA story within the
larger picture of Minnesota’s computer technology history. Tom referred to our anthology web
site in the lectures and cited a few specific web pages in his recent book Digital State: The Story
of Minnesota’s Computer Industry (University of Minnesota Press, 2013).
CBI is part of the University of Minnesota’s College of Science and Engineering (CSE) – Dr.
Misa is a professor there in addition to being the CBI director – and the University Libraries. In
January 2010, the Legacy Committee in cooperation with CSE administrative staff set up an
artifact/poster display3 in the University’s Walter Library for the spring semester, then did a
change out for the summer semesters.
In November 2010, Lockheed Martin MS2 in Eagan, Minnesota triggered the ending of the
Club/LMCO partnership with their announcement of a pending 2013 Eagan facility closure. In
2
3
http://vipclubmn.org/Articles/It%27sAWrap.pdf edited by Lowell A. Benson
Display descriptions are articles #138 and #142 at http://vipclubmn.org/documents.html
24
2011, Bernie Jansen (DCHS trustee and VIP Club Member Emeritus) invited Chad Roberts, then
Dakota County Historical Society’s (DCHS) Executive Director, to visit the LMCO Eagan
facility and to review our growing artifact collection. Mr. Roberts was immediately interested in
our rich UNIVAC/Sperry/UNISYS/LMCO local history. The DCHS Board subsequently
approved a motion by Mr. Jansen to accept a donation of the hardware and photo artifacts
gathered by the IT Legacy Committee and to house a permanent Legacy display at their Lawshe
Museum in South St. Paul. Therefore, yet another partnership began – the Club and DCHS.
In the fall of 2012, LMCO’s John Westergren (Legacy Committee co-chair after Ole retired)
facilitated shipping to the Charles Babbage Institute documents, brochures, engineering
logbooks, photo negatives, and other two dimensional items. John also facilitated the LMCO
donation of two semi-truck loads of three-dimensional items such as computers, hardware items,
corporate mementoes, photo prints, 35mm slides, photo transparencies, etc. to DCHS’s Lawshe
Museum. Mr. Roberts proposed and received a state Legacy grant for the accessioning of the
artifacts into the DCHS database. At the museum, retiree volunteers set up a 5-station network
with which to log and identify 20,000 or more photos.
In 2013 volunteers worked with new
DCHS Executive Director, Lynn
Gruber, to write a second MN Legacy
grant proposal, “The Birth of
Minnesota’s Computer Industry – A
Photo Essay.” The partnership set up
a couple of ‘history poster’ displays 4
in their grand hall for public viewing
beginning in August of 2013, and
then started working on the second
grant.
THE FUTURE? These computer history partnerships will continue! This year we plan to: 1)
Write a third MN Legacy grant proposal to develop additional topical poster boards for the
Lawshe Museum Exhibits; 2) Continue the volunteer photo identification work at the museum;
3) Continue web site ‘Article for the Month’ postings; and 4) perhaps repeat display setups at the
University as we did in 2010 or set up small legacy displays in other public facilities.
Lowell A. Benson
VIP Club 2014/15 President
labenson@q.com
4
Exhibit descriptions are articles #185, 199, & 200 at http://vipclubmn.org/documents.html.
25
Hollywood Computer Graphics at CBI
Wavefront exhibit at CBI curated by Rebecca Hranj. Photo courtesy of Justin Meredith.
In January this year, I set to processing several pallets of materials that had arrived on the
Andersen Library loading dock from California. The initial inventory was large and disorienting
but turned out to be an exciting new collection for the Charles Babbage Institute: the complete
contents of Mark Sylvester’s office at Alias|Wavefront. Sylvester, CEO and cofounder of
introNetworks and well known in the TED community, was a pioneer in computer graphics
animation. Along with Bill Kovacs and Larry Barels, Sylvester cofounded Wavefront
Technologies in 1984 and set to work on revolutionizing computer graphics in film, industry,
advertising, and video games.
Early software applications include The Data Visualizer, Composer,
and Dynamation. In 1995 Wavefront was purchased by Silicon
Graphics and merged with Alias Research to become Alias|Wavefront.
This merger gave birth to Maya, 3-D modeling and animation software
that has become an industry standard. Maya, now owned by Autodesk,
is used to produce South Park and earned Alias|Wavefront a 2003
Academy Award for scientific and technical achievement.
Anyone who has consumed media in the last decades has seen the
fruits of Alias|Wavefront’s labors. Even a sampling of names and titles
shows the impact their software had on the entertainment industry:
Photo: Justin Meredith
26
NBC, NASA, GameWare for Atari, Knight Rider, Crimson Tide, Aladdin, Stargate, Total Recall,
Columbia Pictures.
The collection itself reads as a history of the company and
Sylvester’s professional engagement. Holiday cards from
LucasFilm came in boxes with hundreds of pages of bound
news clippings documenting the company’s work.
Company records were interfiled with awards from the
Santa Barbara Chamber of Commerce and thank you cards
from elementary school students. Sylvester’s career as a
chef is also recorded by a substantive collection of
restaurant menus. Conference materials and design
publications cover 20 years of industry history, and a book
collection shows a leader with a desire to have a positive
impact on everything he touched. A substantial collection
of videos—in several formats, including BetaMax—
provides access to samples, shorts, and portfolios from
names that regularly appear in movie credits. The company
demos astound the viewer with the range and beauty of
their work.
Photo: Justin Meredith
The history and development of computer graphics told by the Alias|Wavefront collection will
naturally appeal to historians that frequent CBI, but it will also prove important to graphic
designers, film and gaming historians, even students of Chinese and Japanese cultures.
The Wavefront archive will be made available later this year. For further information, please
contact CBI Curator-Archivist, Arvid Nelsen. Special thanks go to Mark Sylvester, both for
donating an incredible collection and sharing tidbits via Twitter. You can give him a shout-out at
@marksylvester.
Rebecca Hranj
27
Recent Publications
Alberts, Gerard and Edgar G. Daylight. “Universality Versus Locality: The Amsterdam Style of
Algol Implementation.” IEEE Annals of the History of Computing 36:4 (October-December
2014): 52-63.
Alper, Meryl. “Augmentative, Alternative, and Assistive: Reimagining the History of Mobile
Computing and Disability.” [Think Piece] IEEE Annals of the History of Computing 37:1
(January-March 2015): 93-96.
Aspray, William. “The Many Histories of Information.” Information & Culture 50:1 (FebruaryMarch 2015): 1-23.
Bradford, Phillip G. and Paul J. Miranti. “Automating Odd-Lot Trading at the New York Stock
Exchange, 1958-1976.” Technology and Culture 55:4 (October 2014): 850-879.
Bruderer, Herbert. Meilensteine der Rechentechnik: Zur Geschichte der Mathematik und der
Informatik (Berlin/Boston: De Gruyter Oldenbourg, 2015).
Carlsson-Hyslop, Anna. “Human Computing Practices and Patronage: Anti-Aircraft Ballistics
and Tidal Calculations in First World War Britain.” Information & Culture 50:1 (FebruaryMarch 2015): 70-109.
Collopy, Peter Sachs. “Video Synthesizers: From Analog Computing to Digital Art.” IEEE
Annals of the History of Computing 36:4 (October-December 2014): 74-86.
Coopersmith, Jonanthan. Faxed: The Rise and Fall of the Fax Machine (Baltimore: Johns
Hopkins University Press, 2015).
Cortada, James W. “‘There is No Saturation Point in Education’: Inside IBM’s Sales School,
1970s-1980s.” IEEE Annals of the History of Computing 37:1 (January-March 2015): 56-66.
Cullinane, John. Smarter Than Their Machines: Oral Histories of Pioneers in Interactive
Computing (New York: Association for Computing Machinery and Morgan & Claypool, 2014).
Driscoll, Kevin. “Professional Work for Nothing: Software Commercialization and ‘An Open
Letter to Hobbyists.’” Information & Culture 50:2 (May-June 2015): 257-283.
Durnová, Helena. “Embracing the Algol Effort in Czechoslovakia.” IEEE Annals of the History
of Computing 36:4 (October-December 2014): 26-37.
Durnová, Helena and Gerard Alberts. “Was Algol 60 the First Algorithmic Language?” [Think
Piece] IEEE Annals of the History of Computing 36:4 (October-December 2014): 102-104.
Fidler, Bradley and Morgan Currie. “The Production and Interpretation of ARPANET Maps.”
IEEE Annals of the History of Computing 37:1 (January-March 2015): 44-55.
28
Haigh, Thomas, Andrew L. Russell, and William H. Dutton. “Forging Histories of the Internet.”
[Guest Editors’ introduction] Information & Culture 50:2 (May-June 2015): 143-159.
Hey, Anthony J. G. and Gyuri Papay. The Computing Universe: A Journey Through a Revolution
(New York: Cambridge University Press, 2015).
Katz-Kimchi, Merav. “Singing the Strong Light Works of [American] Engineers’: Popular
Histories of the Internet as Mythopoetic Literature.” Information & Culture 50:2 (May-June
2015): 160-180.
Kidwell, Peggy Aldrich. “Useful Instruction for Practical People: Early Printed Discussions of
the Slide Rule in the US.” IEEE Annals of the History of Computing 37:1 (January-March 2015):
36-43.
Kozak, Nadine I. “‘If You Build It, They Will Come’: Lusk, Wyoming, and the Information
Highway Imaginaire, 1989-1999.” Information & Culture 50:2 (May-June 2015): 236-256.
Mounier-Kuhn, Pierre. “Algol in France: From Universal Project to Embedded Culture.” IEEE
Annals of the History of Computing 36:4 (October-December 2014): 6-25.
McCray, W. Patrick. “How Astronomers Digitized the Sky.” Technology and Culture 55:4
(October 2014): 908-944.
Nelson, Andrew J. The Sound of Innovation: Stanford and the Computer Music Revolution
(Cambridge: MIT Press, 2015).
Nofre, David. “Managing the Technological Edge: The UNESCO International Computation
Centre and the Limits to the Transfer of Computer Technology, 1946-1961.” Annals of Science
71:4 (October 2014): 410-431.
Oggolder, Christian. “From Virtual to Social: Transforming Concepts and Images of the
Internet.” Information & Culture 50:2 (May-June 2015): 181-196.
Paulsen, Gard. “When Switches Became Programs: Programming Languages and
Telecommunications, 1965-1980.” IEEE Annals of the History of Computing 36:4 (OctoberDecember 2014): 38-51.
Payette, Sandy. “Hopper and Dijkstra: Crisis, Revolution, and the Future of Programming.”
IEEE Annals of the History of Computing 36:4 (October-December 2014): 64-73.
Petrick, Elizabeth. Personal Computers for People Who Have Disabilities (Baltimore: Johns
Hopkins University Press, 2015).
Rajaraman, Vaidyeswaran. “History of Computing in India: 1955-2010.” IEEE Annals of the
History of Computing 37:1 (January-March 2015): 24-35.
Rankin, Joy. “From the Mainframe to the Masses: A Participatory Computing Movement in
Minnesota Education.” Information & Culture 50:2 (May-June 2015): 197-216.
29
Russell, Andrew L. and Valérie Schafer. “In the Shadow of the ARPANET and Internet: Louis
Pouzin and the Cyclades Network in the 1970s.” Technology and Culture 55:4 (October 2014):
880-907.
Schafer, Valérie. “Part of a Whole: RENATER, A Twenty-Year-Old Network Within the
Internet.” Information & Culture 50:2 (May-June 2015): 217-235.
Sharma, Dinesh C. The Outsourcer: The Story of India’s IT Revolution (Cambridge: MIT Press,
2015).
Springer, Paul J. Cyber Warfare: A Reference Handbook (Santa Barbara, CA: ABC-CLIO,
2015).
Stachniak, Zbigniew. “Red Clones: The Soviet Computer Hobby Movement of the 1980s.” IEEE
Annals of the History of Computing 37:1 (January-March 2015): 12-23.
Svensson, Patrik and David Theo Goldberg. Between Humanities and the Digital (Cambridge:
MIT Press, 2015).
Compiled by Jeffrey R. Yost
30
Featured Photo
“Claude Shannon, the originator of Information Theory, at the board and Dave Hagelbarger work out
some equations needed. Their current projects include work on automata - advanced type of computing
machines which are able to perform various ‘thought’ functions.” Bell Laboratories, circa. 1955.
31