AN 3110 Computer Tech PowerPoint Lecture
AN 3110 Computer Tech PowerPoint Lecture
Harvard Mark 1
Women in Computers
“Computers" were the people operating computers, initially women
because they were hired as telephone operators and plugs similar to
telephone plugs were used for programming early computers,
including the Collossus in the UK, and ENIAC. Women computer
operators are only shown in photos, not recorded in accounts. Women
spent hours setting up each problem on ENIAC when it was claimed
the problem was solved in 15 seconds (set up time wasn't counted).
Women in Computers
o In the late 19th century women were
considered better at math than men
because math was considered repetitive
and boring like housework
Betty
Jennings
1945
Women in Computers
1965: Sister Mary K. Keller was the first woman to earn a PhD in
computer science, at U. of Wisconsin. Dartmouth broke its “men only”
rule to allow her to participate as a grad student in the development of
BASIC. She founded and chaired the Computer Science Dept. at Clarke
College in Dubuque, Iowa, for 20 years.
1978: Sophie Wilson designed Acorn Microcomputer
1980: Carla Meninsky was a game designer and programmer for Atatri
1980s. When Carla Meninsky was hired as a game designer for the Atarti
2600 console in the early 1980s, she was one of only two female engineers
working at Atari. Carol Shaw was the other
when computer hardware manufacturing was automated then software
programming became a male job with higher status than in the 1940s
Acorn
microcomputer
Influence of Universities:
IAS computer
With the war over, Universities
across the world, mostly US
and UK spent time and
resources on computers.
Mostly used by
mathematicians to solve
complex linear equations and
to find large prime numbers.
John von Neumann helped
establish Princeton’s Institute
for Advanced Studies.
The institute created the IAS
machine. First electronic
digital binary computer built
from 1942-1951. Inspired
many more similar computers.
Influence of Universities:
EDSAC
EDSAC-1949. Inspired
by IAS. Electronic Delay
Storage Automatic
Calculator. Developed by
Maurice Wilkes and the
University of Cambridge
Mathematical Laboratory.
Operations on complex
numbers, division,
exponentiation,
differential equations,
special functions,
logarithms.
Influence of Universities
Computers became smaller and
easier to build over time.
Early computers used vacuum
tubes for conductors, then
transistors, now
microchips/integrated circuits.
Moore’s law- describes the trend in
computer hardware history in
which the number of transistors
that can be placed on an integrated
circuit has doubled almost every
two years.
University faculty and staff were
able to build their own computers.
LINC Laboratory Instrumentation
Computer at MIT. First real time
laboratory data processing.
Project Whirlwind
Project Whirlwind-1943
Massachusetts Institute of
Technology (MIT) approached
by US Navy to build a flight
simulator to train bomber
crews.
Finally completed in 1951,
Navy lost interest by this time.
Later used as central computer
for SAGE project which
connected radar installations
all over the US and Canada.
Considered first computer
network in 1958.
Influence of Big Business
UNIVAC I-1951. First
commercially produced
computer.
Built by ENIAC inventors
Presper Eckert and John
Mauchly.
They started their own
company after ENIAC.
Eckert-Mauchly Computer
Corporation.
UNIVAC I created for
Census Bureau.
Sold 46 machines at over $1
million each.
IBM
Herman Hollerith’s Tabulating
Machine Company, after a series
of buyouts, became what we
know as IBM.
Merger of Hollerith’s company,
International Time Recording
Company and the Computing
Scale Corporation.
Tabulating Machine
New company was Computing Corporation plant in 1893.
Tabulating Recording (CTR)
Corporation.
IBM became so dominant that US
government filed anti-trust suits
from 1969 to 1982.
Case dropped, hurt IBM’s
reputation and business decisions.
Influence of Big Business
IBM 7000 series mainframes-1959
IBM’s first mass produced transistorized computers.
Faster and more dependable than vacuum tube machines
Sold to national laboratories and independent scientists.
Early mainframes could take weeks to set up and
multiple people would be assigned. Today only a
few are needed and the processes of networking
are far less rigorous.
The stretch computer shown right was made in 1959 and was the pride and joy
of IBM at the time. IBM always took a very formal stance aiming for business
and pushing forward. Competitors at Apple and other areas often aimed at
entertainment and friendly user interface.
o IBM a formal
business group
that made
professional
mainframes to
hold massive
amounts of data.
o IBM actually
hired an
aggressive firm
we know as
Microsoft. As
we know, later
they became a
powerful giant
and today
dominate the PC
market.
CDC’s 6600 Supercomputer
o It performed 3 million
instructions per second,
which is three times
faster than IBM’s
mainframes.
Osborne-1
Macintosh
The judge ruled to break up Microsoft into several companies but the US
government decided not to enforce the ruling and allowed Microsoft to
survive, although Bill Gates resigned as President and took up
philanthropic activities with his Bill and Melinda Gates Foundation, which
has supported GMOs in Africa
Microsoft
Bill Gates left Harvard after selling his BASIC
programming language to Micro
Instrumentation and Telemetry Systems
(MITS)
Founded Microsoft in Albuquerque. DOS
(Disk Operating System) was his first success.
Sold to be used in IBM pc’s.
IBM and Microsoft partnered in 1985 to
launch ‘Microsoft Windows.’ Later released
95’, 98’.
98’ offered Internet Explorer with the dawn of
the internet.
Microsoft Office released for Apple in 1989,
then for Windows in 1990. Allowed average
people to use office business applications.
Around 1985 computers became useful common
tools in wealthy homes. Software for text pad
programs and games were available in stores.
Computer development has been the fastest
evolving technology in the history of
mankind. Graphical achievements in video
games are one sign of how quickly the use of
computers has spread and to what extent.
Wolfenstien 3d 1990
(above)
Wolfenstein:
New Order
2013 (right)
So what makes our computers today
work so well? And so not well at times.
o IBM and Microsoft no longer are the only developers of hardware today. We
have hundreds of products from many different companies on our shelves today.
Not only are they not all compatible but some software engineers go so far as to
make their products work worse on competitors’ products.
Foxconn: Chinese Apple factory
A recent important issue with computers is their manufacture in China and other
countries where workers are not treated well and are underpaid. There have stories
in the NY Times about Apple iphones manufactured in China due to greater speed of
production and responding to changes in manufacture. Workers report being housed
in barracks next to the factory and being wakened in the middle of the night to work
after only being given tea. These conditions and underpayment put competitive
pressure to underpay American workers. To get the details please go to the NYTimes
on the internet and search to find the articles on Apple’s Chinese factories.
Computer Basics
Input and Output
Input: Punched cards, magnetic
tape, keyboard, mouse.
Output: Printed paper, odometer
style display panels, cathode ray
display.
Modern PC’s include power
supply, motherboard,
processor/heatsink, hard drive,
random access memory (RAM)
Upgrades to mother board:
dedicated graphics cards,
wireless network cards, TV
tuner cards.
The components of a modern desktop
computer:
•Motherboard- The primary circuit. Every device
in some way connects to the motherboard. Several
devices by default are connected to the
motherboard such as the system clock.
•Power Supply- Every major component in your
pc connects to the power supply such as fans,
motherboard, graphics card, etc…
•Central Processing Unit- The CPU is a
microprocessor that is the heart of all operations.
Both hardware and software depend on the
processes or ability to keep up with the events
going on.
•Random-Access Memory- RAM buffers the
stored information while being processed. It helps
the processor handle multiple tasks at once by
keeping things in order in a sense.
•Drives- Drives (hard drive for example) store data
when not in use.
•Cooling Devices- fans and other such objects
Computers must be recycled because thy contain
toxic heavy metals and chemicals
E-Waste
E-waste is electronic waste that is considered hazardous waste in the US,
including computers, circuit boards, batteries, and flourescent bulbs (contain
mercury that causes brain damage, so if you break one leave the area as
unscented mercury is released into the air). E-waste needs to be recycled and
not just thrown out in the trash because the dangerous metals and chemicals
will leach into landfills and poison the water supply.
Lead,
mercury, cadmium, and poly brominated flame retardants are all
persistent, bio accumulative toxins (PBTs)
They can create environmental & health risks when computers are
manufactured, incinerated, land filled or melted during recycling.
PBT’s are a dangerous class of chemicals that linger in the environment &
accumulate in living tissues.
PBT’s are harmful to human health & the environment & have been
associated with cancer, nerve damage & reproductive disorders.
South and West Africa receive 70% used
electronics and of that 30% do not work
Underlying beliefs about computers: the newest technology is the best, the
latest computers and software always improve function, the latest computer
has the highest status, computerization of work always improves workers’
lives. You may think of more.
Effects: Economic, Social,
Environmental
Computers make jobs and take
jobs.
Created jobs such as web design,
computer programming, game
•Volti points out lack of availability of
design, tech support.
computers in the Global South
Jobs become automated such as (developing countries)
ATM’s reducing the need for •At a disadvantage economically.
human tellers and robots on auto •E-Waste:
assembly lines operated by • 9/10 consumers own a computer.
computers replace human •2/10 have one they aren’t using.
assembly line workers. •3/10 replaced their computer last year.
Computer skills essential to many •2/10 that disposed of a computer threw
jobs. Lack of computer skills can it in the trash.
negatively affect school •E-mail does save paper.
performance or finding a job. •Leaving computers on wastes power.
Less availability of computers to •Especially companies or homes with
lower classes/minorities puts them several computers.
at a disadvantage in school & jobs.
Unequal Access
Poor people, including many minorities, cannot afford computers and live in
poor communities with poor schools that provide little computer training.
Gender inequalities of access start in elementary school
◦ boys monopolize computers in schools, so girls have less access
Less access by girls to computers in school and their perception that computers
is a male field has led to fewer women obtaining computer science degrees in
college
Research found that diverse work teams are more innovative and productive
than homogenous ones, BUT discrimination occurs.
EVIDENCE OF DISCRIMINATION IN EMPLOYMENT:
Young white men dominate computer companies and tend to hire other young
white men
More women leave computer jobs than men, due to discrimination
Fewer women in computer industry than ever before
Average of 20-24% women in computer/internet companies
Very lower percentage of Latinos and African-Americans employed by
National Security Agency
access to computers
_NSAKEY is one small example of how government has been in public
software for years. In 1999 this key was found that gave the NSA (or any
other linked agency) a “backdoor” into your computer to view whatever
they want whenever they please. Since the 1999 thousands of dollars
have been spent looking through Microsoft’s software for any signs of
current keys. Google, Facebook, Apple, and other giants are all known to
have given access to NSA and other agencies (they have full access to
every account including phones).
2001 Patriot Act
The
Patriot act allowed law officers to secretly break and enter
homes and take computers without a warrant.
In 2004 Brandon Mayfield’s home was broken into by police and
secretly searched
Mayfield was jailed for 2 weeks on suspicion of participation in the
Madrid train bombings.
In 2007 a court ruled that the secret searches of people’s homes that
the law permits violate the Fourth Amendment of the US
Constitution against unreasonable searches and seizures.
However, the Patriot Act was renewed by the US Congress in 2010.
Brandon Mayfield
This court ruling does in fact still stand today, except that the new format is
allowing the FBI, NSA, and other areas of the government to “tap” into your
computer. As we saw with the Edward Snowden scandal, they no longer need
a warrant to tap your computer if you are connected to the internet.
TSA and Border Patrol
right of computer confiscation
The Transportation Security Administration that
searches people and their baggage with xrays at airports
has the right to seize anything, including computers.
The TSA is part of the Department of Homeland
Security, which can also conduct electronic surveillance.
Extending surveillance practices from the border to
internal transportation in the US: on an Amtrak train
from Chicago to New York border patrol agents
searched possessions and seized and destroyed the
laptop computer and hard drive of a student researching
Hesbolla because there were photos of them on his
computer (NPR April 2014)
Sources
"Designer of Apple Logo Explains The Design: Rob Janoff Interview | Obama Pacman." Obama Pacman | Apple News, Celebrity Mac Users, & More. Web. 10 Mar. 2010.
<http://obamapacman.com/2009/08/apple-computers-inc-logo-design-rob-janoff-interview/>.
"The History of Apple Computers." Inventors. Web. 12 Mar. 2010. <http://inventors.about.com/od/cstartinventions/a/Apple_Computers.htm>.
"The History of IBM." Inventors. Web. 15 Mar. /library/inventors/blibm.htm>.
"OBJECTIVE: Creation Education | Evolutionism Propaganda." OBJECTIVE: Ministries. Web. 10 Mar. 2010. <http://objectiveministries.org/creation/propaganda.html>.
"Timeline of Computer History." Computer History Museum. Web. 08 Mar. 2010. <http://www.computerhistory.org/timeline/?category=cmptr>.
Volti, Rudi. Society and Technological Change. New York: Worth, 2010. Print.
United States Government Accountability Office
www.envirosense.com
www.greenpeace.org
www.storyofstuff.com
http://good-bye-ewaste.webs.com/ewasteimages.htm
http://en.wikipedia.org/wiki/Patriot_Act
http://www.voanews.com/english/news/africa/UN-Concerned-About-West-Africas-E-Waste-Problem-139281333.html
http://en.wikipedia.org/wiki/PDP-1
http://www.computerhistory.org/babbage/adalovelace/img/5-7-2.jpg
https://www.google.com/search?q=Joseph+Mari+Jacquard&hl=en&client=firefox
a&hs=KiZ&rls=org.mozilla:enUS:official&prmd=imvns&source=lnms&tbm=isch&ei=eBZLT9asOYjyggecqsSDDg&sa=X&oi=mode_link&ct=mode&cd=2&ved=0CA4Q
_AUoAQ&biw=589&bih=706
http://www.pharic.co.uk/computer/index.htm
http://www.ehow.com/about_5399779_purpose-computer.html
http://archive.computerhistory.org/resources/physical-object/general_precision/X42-79.1.lg.jpghttp://
www.tech-faq.com/what-are-computers-used-for.html
http://www.history-timelines.org.uk/events-timelines/07-computer-history-timeline.htm
www.envirosense.comwww.greenpeace.org
www.storyofstuff.com
http://good-bye-ewaste.webs.com/ewasteimages.htm
http://inventors.about.com/od/cstartinventions/a/Apple_Computers.htm
http://www.factmonster.com/ipka/A0774696.html
http://www.pharic.co.uk/computer/index.htm
2010. <http://inventors.about.com
Sources
https://en.wikipedia.org/wiki/Kaitei_Takara_Sagashi
http://www.columbia.edu/cu/computinghistory/eniac.html
http://media02.hongkiat.com/bsod/bsod-preview.jpg
Light, Jennifer. 1999. When Compters Were Women. Technology and Culture 40.3:445-83
Milkman, Ruth. 1987. Gender at Work: The Dynamics of Job Segregation by Sex During World War II. Chicago.
http://www.women.cs.cmu.edu/ada/Resources/Women/
"| Electronics Reuse & Recycling Center." GreenerChoices.org. Web. 10 Mar. 2010.
<http://www.greenerchoices.org/electronicsrecycling/el_ewaste.cfm>.
"A Brief History of Microsoft on the Web: Reflections on Microsoft.com from Birth to 'Middle Age'" Microsoft
Corporation. Web. 11 Mar. 2010. <http://www.microsoft.com/misc/features/features_flshbk.htm>.
"Computer History." Computer Science Lab Home Page: Learn Computer Programming. Web. 09 Mar. 2010.
<http://www.computersciencelab.com/ComputerHistory/History.htm>.
Halderman, J. Alex. Hacking Democracy. MIT Technology Review. 13 September 2018.
https://events.technologyreview.com/video/watch/halderman-michigan-hacking-democracy/. Retrieved 16
January 2019.
Schwartz, Jen. The Vulnerabilities of Our Voting Machines: When americans go to the polls, will hackers unleash
chaos?. Scientific American. 1 November 2018. https://www.scientificamerican.com/article/the-vulnerabilities-
of-our-voting-machines/?
utm_source=newsletter&utm_medium=email&utm_campaign=policy&utm_content=link&utm_term=2018-11-
05_featured-this-
week&spMailingID=57720772&spUserID=NTY1MTY1ODExMAS2&spJobID=1520639068&spReportId=MT
UyMDYzOTA2OAS2. Retrieved 28 December 2018.