By Topic

IEEE Annals of the History of Computing

Issue 4 • Oct.-Dec. 2016

Filter Results

Displaying Results 1 - 16 of 16
  • Front Cover 
  • Front Cover

    Publication Year: 2016, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (320 KB)
    Freely Available from IEEE
  • House Advertisement 
  • TechIgnite

    Publication Year: 2016, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (250 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of Contents

    Publication Year: 2016, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (623 KB)
    Freely Available from IEEE
  • Events and Sightings 
  • Events and Sightings

    Publication Year: 2016, Page(s):3 - 5
    Request permission for commercial reuse | PDF file iconPDF (304 KB) | HTML iconHTML
    Freely Available from IEEE
  • Think Piece 
  • On the Cruelty of Really Writing a History of Machine Learning

    Publication Year: 2016, Page(s):6 - 8
    Request permission for commercial reuse | PDF file iconPDF (89 KB) | HTML iconHTML
    Freely Available from IEEE
  • House Advertisement 
  • IEEE Computer Society

    Publication Year: 2016, Page(s): 9
    Request permission for commercial reuse | PDF file iconPDF (217 KB)
    Freely Available from IEEE
  • Guest Editor's Introduction 
  • Computer Security, Part 2

    Publication Year: 2016, Page(s):10 - 11
    Request permission for commercial reuse | PDF file iconPDF (202 KB) | HTML iconHTML
    Freely Available from IEEE
  • Computer Security, Part 2 
  • Computer Security Discourse at RAND, SDC, and NSA (1958-1970)

    Publication Year: 2016, Page(s):12 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (599 KB) | HTML iconHTML

    The 1967 Spring Joint Computer Conference session organized by Willis Ware and the 1970 Ware Report are widely held by computer security practitioners and historians to have defined the field's origin. This article documents, describes, and assesses new evidence about two early multilevel access, time-sharing systems, SDC's Q-32 and NSA's RYE, and outlines its security-related consequences for bot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Before It Was a Giant: The Early History of Symantec, 1982-1999

    Publication Year: 2016, Page(s):26 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    Before Symantec became a major supplier of security software, it offered a variety of natural language microcomputer software products. Its growth into a security firm was the result of acquisitions of software enterprises and expanding market conditions in the 1980s and 1990s. This story tells not only about nimbleness in the early software industry, but also about the importance of venture capit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The March of IDES: Early History of Intrusion-Detection Expert Systems

    Publication Year: 2016, Page(s):42 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (183 KB) | HTML iconHTML

    As part of a broader prehistory and history of early intrusion-detection systems (IDSs), this article focuses on the first such system, Intrusion Detection Expert System (IDES), which was developed in the second half of the 1980s at SRI International (and SRI's follow-on Next Generation Intrusion Detection Expert System, or NIDES, in the early-to-mid 1990s). It also briefly recounts other early ID... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity

    Publication Year: 2016, Page(s):55 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1136 KB) | HTML iconHTML

    Developed around 1973 by BBN under contract from DARPA, the private line interface (PLI), a cryptographic cybersecurity device used on the Arpanet, operated with minimal modification of the existing network infrastructure, sitting at the "edge" of the network between the network switches and the connected host computers. As a result of the developmental and infrastructural trajectory set in motion... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feature Article 
  • The Dawn of Digital Light

    Publication Year: 2016, Page(s):74 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (956 KB) | HTML iconHTML

    Digital pictures and computers are now inseparable, so it's surprising how generally unremarked their association was in the beginning. Records reveal that the first digital pictures--the first still pictures, videogames, and computer animations--were made on the earliest computers. Historians have noted this before, but individually without a unifying context. This article shows that the original... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anecdotes 
  • Before Torchi and Schwilgué, There Was White

    Publication Year: 2016, Page(s):92 - 93
    Request permission for commercial reuse | PDF file iconPDF (177 KB) | HTML iconHTML
    Freely Available from IEEE
  • Rewiews 
  • Reviews [Book review and Play review]

    Publication Year: 2016, Page(s):94 - 96
    Request permission for commercial reuse | PDF file iconPDF (63 KB) | HTML iconHTML
    Freely Available from IEEE
  • Back Covers 
  • IEEE Computer Society is where You Choose the Resources that Fit Your Career

    Publication Year: 2016, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (273 KB)
    Freely Available from IEEE
  • got flaws?

    Publication Year: 2016, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (241 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Annals of the History of Computing serves as a record of vital contributions which recount, preserve, and analyze the history of computing and the impact of computing on society.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Nathan Ensmenger
Indiana University, School of Informatics & Computing
nensmeng@indiana.edu