By Paul E. Ceruzzi
This attractive heritage covers glossy computing from the improvement of the 1st digital electronic machine during the dot-com crash. the writer concentrates on 5 key moments of transition: the transformation of the pc within the overdue Nineteen Forties from a really good clinical software to a advertisement product; the emergence of small structures within the past due Nineteen Sixties; the start of non-public computing within the Seventies; the unfold of networking after 1985; and, in a bankruptcy written for this version, the interval 1995-2001. the recent fabric makes a speciality of the Microsoft antitrust go well with, the increase and fall of the dot-coms, and the appearance of open resource software program, rather Linux. in the chronological narrative, the publication lines numerous overlapping threads: the evolution of the computer's inner layout; the impression of financial developments and the chilly warfare; the long term position of IBM as a participant and as a objective for upstart marketers; the expansion of software program from a hidden aspect to a huge personality within the tale of computing; and the habitual factor of where of data and computing in a democratic society. the point of interest is at the usa (though Europe and Japan input the tale at an important points), on computing in step with se instead of on purposes equivalent to man made intelligence, and on platforms that have been offered commercially and put in in amounts.
Read Online or Download A History of Modern Computing (2nd Edition) PDF
Best computer science books
The following, the authors suggest a mode for the formal improvement of parallel courses - or multiprograms as they like to name them. They accomplish this with not less than formal equipment, i. e. with the predicate calculus and the good- proven concept of Owicki and Gries. They exhibit that the Owicki/Gries conception could be successfully placed to paintings for the formal improvement of multiprograms, whether those algorithms are dispensed or now not.
Explaining safeguard vulnerabilities, attainable exploitation situations, and prevention in a scientific demeanour, this advisor to BIOS exploitation describes the reverse-engineering recommendations used to assemble info from BIOS and enlargement ROMs. SMBIOS/DMI exploitation techniques—including BIOS rootkits and machine defense—and the exploitation of embedded x86 BIOS also are lined
Explores easy ideas of theoretical desktop technological know-how and exhibits how they observe to present programming perform. insurance levels from classical issues, comparable to formal languages, automata, and compatibility, to formal semantics, types for concurrent computation, and software semantics.
Textbook from UMass Lowell, model three. 0
Creative Commons License
Applied Discrete constructions through Alan Doerr & Kenneth Levasseur is approved less than an artistic Commons Attribution-NonCommercial-ShareAlike three. zero usa License.
Link to professor's web page: http://faculty. uml. edu/klevasseur/ads2/
- New Perspectives on Computer Concepts 2011: Comprehensive
- Computational Intelligence in Expensive Optimization Problems (Adaptation, Learning, and Optimization)
- What's Where in the Apple. A Complete Guide to the Apple Computer
- Multithreading Architecture
Additional resources for A History of Modern Computing (2nd Edition)
15 The 604 and its successor, the IBM 605, became the mainstays of scientific computing at many installations until reliable commercial computers became available in the mid 1950s. 16 One of IBM’s biggest engineering customers, Northrop Aircraft of Hawthorne, California, connected a 603 multiplying punch to one of their tabulating machines. That allowed Northrop’s users to print the results of a calculation on paper instead of punching them on cards. 17 Logically, the arrangement was no different from an ordinary punched card installation, except that a set of cables and control boxes replaced the person whose job had been to carry decks of cards from one machine to the next.
77 Unlike the UNIVAC, the 701’s central processor handled control of the slow input/output (I/O) facilities directly. All transfers of data had to pass through a single register in the machine’s processor, which led to slow operation for tasks requiring heavy use of I/O. However, the 701’s lightweight plastic tape could start and stop much faster than the UNIVAC’s metal tape and thus speed up those operations. The tape drive also employed an ingenious vacuum-column mechanism, invented by James Wiedenhammer, which allowed the tape to start and stop quickly without tearing.
The Navy assigned it a number of jobs, or ‘‘tasks,’’ that ERA carried out. Most of these were highly classified and related to the business of breaking codes. Task 13, assigned in August 1947, was for a general-purpose electronic computer. ERA completed the machine, code-named ‘‘Atlas,’’ and asked the Navy to clear them for an unclassified version they could sell on the open market. 83 As might be expected from a company like ERA, the 1101 was intended for scientific or engineering customers, and its design reflected that.