This history of computing focuses not on chronology (what came first and who deserves credit for it) but on the actual architectures of the first machines that made electronic computing a practical reality. The book covers computers built in the United States, Germany, England, and Japan. It makes clear that similar concepts were often pursued simultaneously and that the early researchers explored many architectures beyond the von Neumann architecture that eventually became canonical. The contributors include not only historians but also engineers and computer pioneers.An introductory...
This history of computing focuses not on chronology (what came first and who deserves credit for it) but on the actual architectures of the first m...
John von Neumann (1903-1957) was unquestionably one of the most brilliant scientists of the twentieth century. He made major contributions to quantum mechanics and mathematical physics and in 1943 began a new and all-too-short career in computer science. William Aspray provides the first broad and detailed account of von Neumann's many different contributions to computing. These, Aspray reveals, extended far beyond his well-known work in the design and construction of computer systems to include important scientific applications, the revival of numerical analysis, and the creation of a...
John von Neumann (1903-1957) was unquestionably one of the most brilliant scientists of the twentieth century. He made major contributions to quant...
In The Government Machine, Jon Agar traces the mechanization of government work in the United Kingdom from the nineteenth to the early twenty-first century. He argues that this transformation has been tied to the rise of "expert movements," groups whose authority has rested on their expertise. The deployment of machines was an attempt to gain control over state action -- a revolutionary move. Agar shows how mechanization followed the popular depiction of government as machine-like, with British civil servants cast as components of a general purpose "government machine"; indeed, he...
In The Government Machine, Jon Agar traces the mechanization of government work in the United Kingdom from the nineteenth to the early twen...
This text presents an historical examination of political fact-checking, highlighting how this is part of a larger phenomenon of online scrutiny that manifests itself in multiple forms. Reflecting the long history of “fake facts” in America, the book discusses important developments in this area from the emergence of the public Internet in the 1990s to the start of the Trump-Clinton presidential election campaigns.
Topics and features: describes how some of the major players in political fact-checking began with the purpose of scrutinizing and debunking of urban legends;...
This text presents an historical examination of political fact-checking, highlighting how this is part of a larger phenomenon of online scrutiny th...
Automating Linguistics offers an in-depth study of the history of the mathematisation and automation of the sciences of language. In the wake of the first mathematisation of the 1930s, two waves followed: machine translation in the 1950s and the development of computational linguistics and natural language processing in the 1960s. These waves were pivotal given the work of large computerised corpora in the 1990s and the unprecedented technological development of computers and software.
Early machine translation was devised as a war technology originating in the...
Automating Linguistics offers an in-depth study of the history of the mathematisation and automation of the sciences of language. In ...
When viewed through a political lens, the act of defining terms in natural language arguably transforms knowledge into values. This unique volume explores how corporate, military, academic, and professional values shaped efforts to define computer terminology and establish an information engineering profession as a precursor to what would become computer science.
As the Cold War heated up, U.S. federal agencies increasingly funded university researchers and labs to develop technologies, like the computer, that would ensure that the U.S. maintained economic prosperity and military...
When viewed through a political lens, the act of defining terms in natural language arguably transforms knowledge into values. This unique volume e...
Cyber security is the greatest risk faced by financial institutions today, a risk they have understood and managed for decades longer than is commonly understood. Ever since the major London banks purchased their first computers in the early 1960s, they have had to balance their dependence on those machines with the need to secure their operations and retain the trust of their customers.
Technological change in the second half of the 20th century prompted British banks to reevaluate their function as trusted protectors of wealth. In the City of London, the capital’s oldest area...
Cyber security is the greatest risk faced by financial institutions today, a risk they have understood and managed for decades longer than is commo...
Cyber security is the greatest risk faced by financial institutions today, a risk they have understood and managed for decades longer than is commonly understood. Ever since the major London banks purchased their first computers in the early 1960s, they have had to balance their dependence on those machines with the need to secure their operations and retain the trust of their customers.
Technological change in the second half of the 20th century prompted British banks to reevaluate their function as trusted protectors of wealth. In the City of London, the capital’s oldest area...
Cyber security is the greatest risk faced by financial institutions today, a risk they have understood and managed for decades longer than is commo...
This book describes the historical development of the architectures of the first computers built by the German inventor Konrad Zuse in Berlin between 1936 and 1945. Zuse's machines are historically important because they anticipated many features of modern computers.
Specifically, these include the separation of processor and memory, the ability to compute with floating-point numbers, a hardware architecture based on microprogramming of the instruction set, and a layered design with a high-level programming language on top. In fact, Zuse's early computers are closer to modern...
This book describes the historical development of the architectures of the first computers built by the German inventor Konrad Zuse in Berlin betwe...
In May 1917, William and Elizebeth Friedman were asked by the U.S. Army to begin training officers in cryptanalysis and to decrypt intercepted German diplomatic and military communications. In June 1917, Herbert Yardley convinced the new head of the Army’s Military Intelligence Division to create a code and cipher section for the Army with himself as its head.
These two seminal events were the beginning of modern American cryptology, the growth of which culminated 35 years later with the creation of the National Security Agency. Each running their own cryptologic agencies...
In May 1917, William and Elizebeth Friedman were asked by the U.S. Army to begin training officers in cryptanalysis and to decrypt intercepted Germ...