IEEE Annals of the History of Computing

Issue 2 • April-June 2002

Filter Results

Displaying Results 1 - 17 of 17
  • Guest editors introduction: computer applications in libraries. 1

    Publication Year: 2002, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (168 KB) | HTML iconHTML
    Freely Available from IEEE
  • A history of computer applications in libraries: prolegomena

    Publication Year: 2002, Page(s):4 - 15
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    Modern libraries are constituted within and by a tradition of techniques and practices that represent 100 years of codified professional knowledge. This article provides a historical overview of this tradition that created a complex environment of expectation and misunderstanding for introducing library automation. A generation of systems development was needed to assimilate and further develop th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IBM and the holocaust: the strategic alliance between Nazi Germany and America's most powerful corporation [Book Review]

    Publication Year: 2002, Page(s): 94
    Request permission for commercial reuse | PDF file iconPDF (186 KB) | HTML iconHTML
    Freely Available from IEEE
  • Turing and the universal machine: the making of the modern computer [Book Review]

    Publication Year: 2002, Page(s): 95
    Request permission for commercial reuse | PDF file iconPDF (175 KB) | HTML iconHTML
    Freely Available from IEEE
  • Getting the message: a history of communications [Book Review]

    Publication Year: 2002, Page(s):95 - 96
    Request permission for commercial reuse | PDF file iconPDF (184 KB) | HTML iconHTML
    Freely Available from IEEE
  • Global communications since 1844: geopolitics and technology [Book Review]

    Publication Year: 2002, Page(s):96 - 97
    Request permission for commercial reuse | PDF file iconPDF (185 KB) | HTML iconHTML
    Freely Available from IEEE
  • The code book: the science of secrecy from ancient egypt to quantum cryptography [Book Review]

    Publication Year: 2002, Page(s):97 - 98
    Request permission for commercial reuse | PDF file iconPDF (181 KB) | HTML iconHTML
    Freely Available from IEEE
  • From gutenberg to the global information infrastructure: access to information in the networked world [Book Review]

    Publication Year: 2002, Page(s): 98
    Request permission for commercial reuse | PDF file iconPDF (174 KB) | HTML iconHTML
    Freely Available from IEEE
  • Selected papers on analysis of algorithms, CSLI lecture notes, no. 102 [Book Review]

    Publication Year: 2002, Page(s):98 - 99
    Request permission for commercial reuse | PDF file iconPDF (195 KB) | HTML iconHTML
    Freely Available from IEEE
  • Think piece: membership has its partisans

    Publication Year: 2002, Page(s):104 - 103
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (195 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The MESM and the monastery

    Publication Year: 2002, Page(s):91 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB)

    The first electronic digital computer in continental Europe was constructed not in Germany or France, but in the Ukraine. In the late 1940s, Sergei Alexeevich Lebedev began constructing the MESM (Malaya Elektronaya Schetnaya Mashina, or Small Electronic Calculating Machine). Although computer historians G.D. Crowe and S. Goodman (1994) trace the early career and work of Sergei Alexeevich Lebedev a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Library automation at the University of Illinois at Urbana-Champaign, 1965-2000

    Publication Year: 2002, Page(s):71 - 85
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB)

    Successful library system automation depends on many factors, both technological and organizational, including institution's flexibility in making changes that are consistent with a system's optimal use. Here, as the authors reflect on more than three decades of system implementation trial-and-error, they also examine the many interrelated factors that contribute to achieving a complete integratio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The use of punched cards in US libraries and documentation centers, 1936-1965

    Publication Year: 2002, Page(s):16 - 33
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1098 KB) | HTML iconHTML

    Librarians, particularly those in traditional academic and public libraries, were slow to take advantage of punched cards. In contrast, special librarians and documentalists, with their small systems and focus on retrieving information for users, readily adopted punched cards. The results were dramatic: improved ability to index scientific and technical information and better user service. The pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A well-intentioned query and the Halloween Problem

    Publication Year: 2002, Page(s):86 - 89
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    The author's description of the Halloween Problem demonstrates the role of cautionary tales in the history of computing. The Halloween Problem emerged in the context of structured query language optimization in relational database research. Normally, a query optimizer works by measuring system calls and paging requests and applying heuristics to the entire access path tree. Query optimization was ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MARC: keystone for library automation

    Publication Year: 2002, Page(s):34 - 49
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    Libraries' most central and costly activity-cataloging material and maintaining the catalogs providing end-user access-had requirements that defied efficient automation until the mid-1960s, when the Library of Congress developed the MARC format for data records. The format became the foundation for automated systems for libraries that took data sharing to new levels and enabled exploitation of fut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A software lineage

    Publication Year: 2002, Page(s):89 - 91
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB)

    The author traces the lineage of the DEC software to the present day. The hardware legacy of the Digital Equipment Corporation (DEC) is well documented. From its humble beginnings in an abandoned New England textile mill as a specialized peripheral manufacturer, DEC grew to become one of the dominant computer companies in the 1970s and 80s. DEC engineers produced landmark computers, such as the PD... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The beginning of automation in the University of Toronto Library, 1963-1972

    Publication Year: 2002, Page(s):50 - 70
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (779 KB) | HTML iconHTML

    In 1962, the Province of Ontario established five new universities and asked the University of Toronto Library (UTL) to help build libraries for them, which it did. The main task was to determine a record format, coordinated with that developed later for the Library of Congress's MARC project. Eventually, UTL established the University of Toronto Library Automation Systems. The early decisions hav... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

The IEEE Annals of the History of Computing serves as a record of vital contributions which recount, preserve, and analyze the history of computing and the impact of computing on society.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Nathan Ensmenger
Indiana University, School of Informatics & Computing
nensmeng@indiana.edu