Educause Security Discussion mailing list archives
Re: Memories (was University credentials used by third parties)
From: Nate johnson <njj () NJJ-ASSOCIATES COM>
Date: Fri, 20 Aug 2010 19:21:42 -0400
Greetings David:
I can appreciate the jump shift.
Recollections of Wang in the 60s might have been as an office automation player. There were a few vendors that gave the IBM Selectric a run for its money.
The Xerox #1200 does engender some thoughts, particularly as a replacement device for reducing the "14 7/8 x 11" to "8 1/2 x 11".
Theresa, IMHO, RCA would be a viable candidate for Dopey - because they refused to invest in earnest competition. The fact that the IBM 360 and RCA 2/3/6/7 has very similar instruction sets always generated speculation. Honeywell, GE, Remington Rand, and too many others could be named after one of the dwarfs.
Steve, I would never consider you a fossil or an oldtimer, since there are survivors that predate a 1965 entry into the field - called data processing at the time. Yes, I do recall octal and Varian, who could forget the BCD, or binary coded decimal, format - which begot extended binary coded decimal interchange code.
Gary, I was introduced to the term "BFH" by colleagues in Minnesota - big xxxxxxx hammer.
Paul, what of Remington Rand, AT&T, Data General, and Varian?
With best regards,
Nate
Gary, was that the 418 I, II, or III?
On Aug 20, 2010, at 3:42 PM, Kieper, David wrote:
<x-tad-smaller>Anyone one remember the “snow white and the seven dwarfs” in reference to computer companies back in the 60’s and 70’s:</x-tad-smaller>
<x-tad-smaller> </x-tad-smaller>
<x-tad-smaller>In the late 60’s, IBM was snow white, and seven dwarfs were Burroughs, NCR, Univac, Honeywell, Control Data Corporation, RCA, and GE. Later “dwarfs” were Xerox and DEC in the 70’s. Wang came after that…</x-tad-smaller>
<x-tad-smaller> </x-tad-smaller>
<x-tad-smaller>I still have a 8 Kbit core stack module from a GE system as well as core memories and a few cpu modules from Xerox Sigma systems. Xerox Sigma front panel (full of switches and lights) was just too big to keep around, so that went in the junk years ago. Still bring it out the old stuff for the “younger” staff to see what it was like in the 70’s. </x-tad-smaller>
<x-tad-smaller> </x-tad-smaller>
<x-tad-smaller>Ah yes, the good old days when a cpu was a few hundred 6” x 8” modules, in three large cabinets with miles of wire wrapped backplanes, IC can transistors for high speed registers, and (later) basic IC logic gates on sixteen pin chips. Troubleshooting tools were an oscilloscope, rubber mallet or vibration tool, wire wrap tool, and a soldering gun/soldapult. For every problem you were trying to fix, you created and resolved at least one other. System gave off enough RF interference that you could tell if a diagnostic was failing by turning on a radio to just about any frequency and listening for changes in the static noise (that also drowned out most radio station signals within 20 feet of it).</x-tad-smaller>
<x-tad-smaller> </x-tad-smaller>
<x-tad-smaller>Regards,</x-tad-smaller>
<x-tad-smaller> </x-tad-smaller>
<x-tad-smaller>David Kieper </x-tad-smaller>
<x-tad-smaller>Manager, Network and Infrastructure Services</x-tad-smaller>
<x-tad-smaller>Information Technology Security Officer</x-tad-smaller>
<x-tad-smaller>Information Services Division</x-tad-smaller>
<x-tad-smaller>University of Wisconsin - Green Bay office: (920) 465-2238</x-tad-smaller>
<x-tad-smaller>2420 Nicolet Drive fax: (920) 465-2864</x-tad-smaller>
<x-tad-smaller>Green Bay, WI 54311-7001 USA email: </x-tad-smaller><x-tad-smaller>kieperd () uwgb edu</x-tad-smaller>
<x-tad-smaller> </x-tad-smaller>NJJ ASSOCIATES
"The Oasis for I/T Executive Support"
"Purveyors of I/T Organizational Change"
Website ~ http://www.njj-associates.com/
Email Address ~ njj () njj-associates com
Nathaniel (Nate) J. Johnson, Sr.
President
Current thread:
- Re: University credentials used by third parties, (continued)
- Re: University credentials used by third parties Paul Kendall (Aug 20)
- Re: University credentials used by third parties Ozzie Paez (Aug 20)
- Re: University credentials used by third parties Flynn, Gary - flynngn (Aug 20)
- Re: Memories (was University credentials used by third parties) David L. Wasley (Aug 20)
- Re: Memories (was University credentials used by third parties) Kieper, David (Aug 20)
- Re: Memories (was University credentials used by third parties) David L. Wasley (Aug 20)
- Re: Memories (was University credentials used by third parties) Morrow Long (Aug 20)
- Re: Memories (was University credentials used by third parties) Mike Iglesias (Aug 20)
- Re: Memories (was University credentials used by third parties) Joel Rosenblatt (Aug 20)
- Re: Memories (was University credentials used by third parties) Valdis Kletnieks (Aug 20)
- Re: Memories (was University credentials used by third parties) Nate johnson (Aug 20)
- Re: University credentials used by third parties Bristol, Gary L. (Aug 20)
- Re: University credentials used by third parties Paul Kendall (Aug 18)
- Re: University credentials used by third parties Don Cochran (Aug 18)
- Re: University credentials used by third parties Joel Rosenblatt (Aug 18)
- Re: University credentials used by third parties Valdis Kletnieks (Aug 18)
- Re: University credentials used by third parties Paul Kendall (Aug 19)
- Re: University credentials used by third parties Joel Rosenblatt (Aug 18)
- Re: University credentials used by third parties Bob Kalal (Aug 18)
- Re: University credentials used by third parties Pete Hickey (Aug 18)
- Re: University credentials used by third parties Cal Frye (Aug 20)