SlideShare a Scribd company logo
1 of 22
Download to read offline
NICTA Copyright 2012 From imagination to impact
Programming in
the 1960s: a
Personal History
Len Bass
NICTA Copyright 2012 From imagination to impact
I graduated college with a Bachelor’s degree
in Mathematics in 1964
• Two possible positions
– Actuary
– Computer programmer
• Guess which one I took?
• Prior computer experience
– Saw a computer once on a tour
– No knowledge of programming
• I was given a thin book on Fortran II and told to learn it.
• First program was copied out of the book. It didn’t work
because the machine I used it on ran Fortran IV.
2
NICTA Copyright 2012 From imagination to impact
Job workflow - submission
• Type up submission on cards
• Place job card with submission number in front
of cards
• Give cards to operator
NICTA Copyright 2012 From imagination to impact
Fortran IBM card
NICTA Copyright 2012 From imagination to impact
026 Keypunch
NICTA Copyright 2012 From imagination to impact
Operator loads cards into card reader
NICTA Copyright 2012 From imagination to impact
IBM 7094 processes job
7
NICTA Copyright 2012 From imagination to impact
IBM Chain Printer prints output
NICTA Copyright 2012 From imagination to impact
Final portion of the workflow
• Operator takes cards and output, places them
into a box with submission number in front and
places box in wooden frame
• Elapsed time ~2-3 hours, typically.
NICTA Copyright 2012 From imagination to impact
First Assignment – involved Legendre
Polynomials
• The formula involved computing N! / M!
• It took me six weeks to debug with much wasted
computer time.
• Why? 7! overflowed when computed as an
integer on a 36 bit word.
• Recall I had a degree in mathematics
– Factorials were integers.
– Who ever heard of “overflow”
10
NICTA Copyright 2012 From imagination to impact
Consequence
• Debriefing meeting with my boss and my boss’
boss.
• Outcome – my boss should have overseen me
more closely.
• It wasn’t my fault!! It was management’s fault.
11
NICTA Copyright 2012 From imagination to impact
1968 – I am off to graduate school at Purdue
• Purdue constructed new mathematical
sciences/computer sciences building
– Completed in 1967
– Designed for IBM 360/67 in basement
NICTA Copyright 2012 From imagination to impact
IBM 360/67 was ~3 years late
• Purdue replaced their order with a CDC 6600
NICTA Copyright 2012 From imagination to impact
Why is this interesting?
• Mathematical Sciences building was designed to
have an IBM 360/67 in the basement
• Building was constructed with an external
elevator shaft to take computer to the basement
• CDC 6600 was two inches wider than the IBM
360/67
• Had to redig the elevator shaft!!
NICTA Copyright 2012 From imagination to impact
My assistantship
• Systems programmer for the High Energy
Physics department
• They had an IBM 360/44. What we would today
call a RISC machine
NICTA Copyright 2012 From imagination to impact
IBM 360/44
NICTA Copyright 2012 From imagination to impact
I learn to boot the machine
• I was shown how to boot the IBM 360/44
– Push blue button on lower right
– Enter date/time on console
• First time I did this …
NICTA Copyright 2012 From imagination to impact
• Lights went out
• Bells went off
• There was a power failure at that moment
NICTA Copyright 2012 From imagination to impact
IBM repairman as terrorist
• IBM performed weekly preventive maintenance
where card dust is vacuumed from inside the
computer.
• Involves removing the front panel of the console
• Purdue installed intrusion alarms on all of the
computers on campus including the High Energy
Physics computer
• The intrusion alarm prevented the repairman
from removing the front panel.
• So … he removed the intrusion alarm
NICTA Copyright 2012 From imagination to impact
Consequences
• Removing the intrusion alarm set off a silent
alarm at the campus police state
• Policemen in full riot gear and shotguns arrived
at the computer.
• …
20
NICTA Copyright 2012 From imagination to impact
Me ~1980
NICTA Copyright 2012 From imagination to impact
The world has changed!!
22

More Related Content

Similar to Programming in the 1960s

ICT Orientation (CSS)
ICT Orientation (CSS)ICT Orientation (CSS)
ICT Orientation (CSS)Ydel Capales
 
Fixsmith pc repair fundamentals
Fixsmith pc repair fundamentalsFixsmith pc repair fundamentals
Fixsmith pc repair fundamentalsFixSmith
 
arudino uno project
arudino uno project arudino uno project
arudino uno project tanish sharma
 
A Journey Not A Destination - 6dec21
 A Journey Not A Destination - 6dec21 A Journey Not A Destination - 6dec21
A Journey Not A Destination - 6dec21Ian Phillips
 
Microprocessors basics
Microprocessors basicsMicroprocessors basics
Microprocessors basicsDr.YNM
 
555e81217b39f1c1262b33d0.ppt
555e81217b39f1c1262b33d0.ppt555e81217b39f1c1262b33d0.ppt
555e81217b39f1c1262b33d0.pptAqeelAbbas94
 
understanding computers.ppt
understanding computers.pptunderstanding computers.ppt
understanding computers.pptNaglaaFathy42
 
Intro of computers
Intro of computersIntro of computers
Intro of computersanshu_atri
 
CNC presentation 7 2010a
CNC presentation 7 2010aCNC presentation 7 2010a
CNC presentation 7 2010aphilip_langton
 
small electronics for your makerspace (clc trendspotting - february 2014)
small electronics for your makerspace (clc trendspotting - february 2014)small electronics for your makerspace (clc trendspotting - february 2014)
small electronics for your makerspace (clc trendspotting - february 2014)ariannaschlegel
 
Generations of computer
Generations of computerGenerations of computer
Generations of computerSHIKHA GAUTAM
 
An introduction to Computer Technology
An introduction to Computer TechnologyAn introduction to Computer Technology
An introduction to Computer TechnologySteven Heath
 
Advanced View Arduino Projects List - Use Arduino for Projects {2}.pdf
Advanced View Arduino Projects List - Use Arduino for Projects {2}.pdfAdvanced View Arduino Projects List - Use Arduino for Projects {2}.pdf
Advanced View Arduino Projects List - Use Arduino for Projects {2}.pdfIsmailkhan77481
 

Similar to Programming in the 1960s (20)

Veena Policegoudra
Veena Policegoudra Veena Policegoudra
Veena Policegoudra
 
electronics
electronicselectronics
electronics
 
Electro
ElectroElectro
Electro
 
ICT Orientation (CSS)
ICT Orientation (CSS)ICT Orientation (CSS)
ICT Orientation (CSS)
 
Computer
ComputerComputer
Computer
 
Fixsmith pc repair fundamentals
Fixsmith pc repair fundamentalsFixsmith pc repair fundamentals
Fixsmith pc repair fundamentals
 
arudino uno project
arudino uno project arudino uno project
arudino uno project
 
Report
ReportReport
Report
 
A Journey Not A Destination - 6dec21
 A Journey Not A Destination - 6dec21 A Journey Not A Destination - 6dec21
A Journey Not A Destination - 6dec21
 
Microprocessors basics
Microprocessors basicsMicroprocessors basics
Microprocessors basics
 
555e81217b39f1c1262b33d0.ppt
555e81217b39f1c1262b33d0.ppt555e81217b39f1c1262b33d0.ppt
555e81217b39f1c1262b33d0.ppt
 
understanding computers.ppt
understanding computers.pptunderstanding computers.ppt
understanding computers.ppt
 
Intro of computers
Intro of computersIntro of computers
Intro of computers
 
CNC presentation 7 2010a
CNC presentation 7 2010aCNC presentation 7 2010a
CNC presentation 7 2010a
 
small electronics for your makerspace (clc trendspotting - february 2014)
small electronics for your makerspace (clc trendspotting - february 2014)small electronics for your makerspace (clc trendspotting - february 2014)
small electronics for your makerspace (clc trendspotting - february 2014)
 
Uc12 chapter01
Uc12 chapter01Uc12 chapter01
Uc12 chapter01
 
Generations of computer
Generations of computerGenerations of computer
Generations of computer
 
An introduction to Computer Technology
An introduction to Computer TechnologyAn introduction to Computer Technology
An introduction to Computer Technology
 
Class1
Class1Class1
Class1
 
Advanced View Arduino Projects List - Use Arduino for Projects {2}.pdf
Advanced View Arduino Projects List - Use Arduino for Projects {2}.pdfAdvanced View Arduino Projects List - Use Arduino for Projects {2}.pdf
Advanced View Arduino Projects List - Use Arduino for Projects {2}.pdf
 

More from Len Bass

Devops syllabus
Devops syllabusDevops syllabus
Devops syllabusLen Bass
 
DevOps Syllabus summer 2020
DevOps Syllabus summer 2020DevOps Syllabus summer 2020
DevOps Syllabus summer 2020Len Bass
 
11 secure development
11  secure development 11  secure development
11 secure development Len Bass
 
10 disaster recovery
10 disaster recovery  10 disaster recovery
10 disaster recovery Len Bass
 
9 postproduction
9 postproduction 9 postproduction
9 postproduction Len Bass
 
8 pipeline
8 pipeline 8 pipeline
8 pipeline Len Bass
 
7 configuration management
7 configuration management 7 configuration management
7 configuration management Len Bass
 
6 microservice architecture
6 microservice architecture6 microservice architecture
6 microservice architectureLen Bass
 
5 infrastructure security
5 infrastructure security5 infrastructure security
5 infrastructure securityLen Bass
 
4 container management
4  container management4  container management
4 container managementLen Bass
 
3 the cloud
3 the cloud 3 the cloud
3 the cloud Len Bass
 
1 virtual machines
1 virtual machines1 virtual machines
1 virtual machinesLen Bass
 
2 networking
2 networking2 networking
2 networkingLen Bass
 
Quantum talk
Quantum talkQuantum talk
Quantum talkLen Bass
 
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorialLen Bass
 
Experience in teaching devops
Experience in teaching devopsExperience in teaching devops
Experience in teaching devopsLen Bass
 
Understanding blockchains
Understanding blockchainsUnderstanding blockchains
Understanding blockchainsLen Bass
 
What is a blockchain
What is a blockchainWhat is a blockchain
What is a blockchainLen Bass
 
Dev ops and safety critical systems
Dev ops and safety critical systemsDev ops and safety critical systems
Dev ops and safety critical systemsLen Bass
 
My first deployment pipeline
My first deployment pipelineMy first deployment pipeline
My first deployment pipelineLen Bass
 

More from Len Bass (20)

Devops syllabus
Devops syllabusDevops syllabus
Devops syllabus
 
DevOps Syllabus summer 2020
DevOps Syllabus summer 2020DevOps Syllabus summer 2020
DevOps Syllabus summer 2020
 
11 secure development
11  secure development 11  secure development
11 secure development
 
10 disaster recovery
10 disaster recovery  10 disaster recovery
10 disaster recovery
 
9 postproduction
9 postproduction 9 postproduction
9 postproduction
 
8 pipeline
8 pipeline 8 pipeline
8 pipeline
 
7 configuration management
7 configuration management 7 configuration management
7 configuration management
 
6 microservice architecture
6 microservice architecture6 microservice architecture
6 microservice architecture
 
5 infrastructure security
5 infrastructure security5 infrastructure security
5 infrastructure security
 
4 container management
4  container management4  container management
4 container management
 
3 the cloud
3 the cloud 3 the cloud
3 the cloud
 
1 virtual machines
1 virtual machines1 virtual machines
1 virtual machines
 
2 networking
2 networking2 networking
2 networking
 
Quantum talk
Quantum talkQuantum talk
Quantum talk
 
Icsa2018 blockchain tutorial
Icsa2018 blockchain tutorialIcsa2018 blockchain tutorial
Icsa2018 blockchain tutorial
 
Experience in teaching devops
Experience in teaching devopsExperience in teaching devops
Experience in teaching devops
 
Understanding blockchains
Understanding blockchainsUnderstanding blockchains
Understanding blockchains
 
What is a blockchain
What is a blockchainWhat is a blockchain
What is a blockchain
 
Dev ops and safety critical systems
Dev ops and safety critical systemsDev ops and safety critical systems
Dev ops and safety critical systems
 
My first deployment pipeline
My first deployment pipelineMy first deployment pipeline
My first deployment pipeline
 

Recently uploaded

SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 

Recently uploaded (20)

Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 

Programming in the 1960s

  • 1. NICTA Copyright 2012 From imagination to impact Programming in the 1960s: a Personal History Len Bass
  • 2. NICTA Copyright 2012 From imagination to impact I graduated college with a Bachelor’s degree in Mathematics in 1964 • Two possible positions – Actuary – Computer programmer • Guess which one I took? • Prior computer experience – Saw a computer once on a tour – No knowledge of programming • I was given a thin book on Fortran II and told to learn it. • First program was copied out of the book. It didn’t work because the machine I used it on ran Fortran IV. 2
  • 3. NICTA Copyright 2012 From imagination to impact Job workflow - submission • Type up submission on cards • Place job card with submission number in front of cards • Give cards to operator
  • 4. NICTA Copyright 2012 From imagination to impact Fortran IBM card
  • 5. NICTA Copyright 2012 From imagination to impact 026 Keypunch
  • 6. NICTA Copyright 2012 From imagination to impact Operator loads cards into card reader
  • 7. NICTA Copyright 2012 From imagination to impact IBM 7094 processes job 7
  • 8. NICTA Copyright 2012 From imagination to impact IBM Chain Printer prints output
  • 9. NICTA Copyright 2012 From imagination to impact Final portion of the workflow • Operator takes cards and output, places them into a box with submission number in front and places box in wooden frame • Elapsed time ~2-3 hours, typically.
  • 10. NICTA Copyright 2012 From imagination to impact First Assignment – involved Legendre Polynomials • The formula involved computing N! / M! • It took me six weeks to debug with much wasted computer time. • Why? 7! overflowed when computed as an integer on a 36 bit word. • Recall I had a degree in mathematics – Factorials were integers. – Who ever heard of “overflow” 10
  • 11. NICTA Copyright 2012 From imagination to impact Consequence • Debriefing meeting with my boss and my boss’ boss. • Outcome – my boss should have overseen me more closely. • It wasn’t my fault!! It was management’s fault. 11
  • 12. NICTA Copyright 2012 From imagination to impact 1968 – I am off to graduate school at Purdue • Purdue constructed new mathematical sciences/computer sciences building – Completed in 1967 – Designed for IBM 360/67 in basement
  • 13. NICTA Copyright 2012 From imagination to impact IBM 360/67 was ~3 years late • Purdue replaced their order with a CDC 6600
  • 14. NICTA Copyright 2012 From imagination to impact Why is this interesting? • Mathematical Sciences building was designed to have an IBM 360/67 in the basement • Building was constructed with an external elevator shaft to take computer to the basement • CDC 6600 was two inches wider than the IBM 360/67 • Had to redig the elevator shaft!!
  • 15. NICTA Copyright 2012 From imagination to impact My assistantship • Systems programmer for the High Energy Physics department • They had an IBM 360/44. What we would today call a RISC machine
  • 16. NICTA Copyright 2012 From imagination to impact IBM 360/44
  • 17. NICTA Copyright 2012 From imagination to impact I learn to boot the machine • I was shown how to boot the IBM 360/44 – Push blue button on lower right – Enter date/time on console • First time I did this …
  • 18. NICTA Copyright 2012 From imagination to impact • Lights went out • Bells went off • There was a power failure at that moment
  • 19. NICTA Copyright 2012 From imagination to impact IBM repairman as terrorist • IBM performed weekly preventive maintenance where card dust is vacuumed from inside the computer. • Involves removing the front panel of the console • Purdue installed intrusion alarms on all of the computers on campus including the High Energy Physics computer • The intrusion alarm prevented the repairman from removing the front panel. • So … he removed the intrusion alarm
  • 20. NICTA Copyright 2012 From imagination to impact Consequences • Removing the intrusion alarm set off a silent alarm at the campus police state • Policemen in full riot gear and shotguns arrived at the computer. • … 20
  • 21. NICTA Copyright 2012 From imagination to impact Me ~1980
  • 22. NICTA Copyright 2012 From imagination to impact The world has changed!! 22