Fall 2015 - Charles Babbage Institute
Transcription
Fall 2015 - Charles Babbage Institute
CHARLES BABBAGE INSTITUTE CENTER FOR THE HISTORY OF INFORMATION TECHNOLOGY NEWSLETTER Vol. 37 No. 2 Fall 2015 In This Issue: Director’s Desk ACM Books and Computing History CBI SHOT 2015 CBI Completes NSF Computer Security History Project News from the Archives IBM History: Gartner Group records at CBI Researching Personal Computing (Norberg Grant) History of Information Technology in Hungary Women Programmers in the 1950s and 1960s: SHARE Statistics Recent Publications Featured Photograph CHARLES BABBAGE INSTITUTE CENTER FOR THE HISTORY OF INFORMATION TECHNOLOGY NEWSLETTER Fall 2015 Vol. 37 No. 2 In This Issue: Director’s Desk 3 ACM Books and Computing History 6 SHOT 2015 9 CBI Completes NSF Computer Security History Project 13 News from the Archives 14 IBM History: Gartner Group Records at CBI 15 Researching Personal Computing (Norberg Grant) 16 Researching and Preserving the History of Information Technology in Hungary 18 Women Programmers in the 1950s and 1960s: SHARE Statistics 25 Recent Publications 28 Featured Photograph 30 CBI Newsletter Editor: Jeffrey R. Yost Charles Babbage Institute 211 Andersen Library University of Minnesota 222 21st Avenue South Minneapolis, Minnesota 55455 Email: [email protected] Ph. (612) 624-5050 Fax: (612) 625-8054 www.cbi.umn.edu The Charles Babbage Institute for the History of Information Technology is sponsored by the University of Minnesota and the information technology community. Charles Babbage Institute Newsletter is a publication of the University of Minnesota. The CBI Newsletter reports on Institute activities and other developments in the history of information technology. Permission to copy all or part of this material is granted provided that the source is cited and a copy of the publication containing the copied material is sent to CBI. © Charles Babbage Institute 2 Director’s Desk In this column I often reflect on the state of the art in computing history. In the past, I’ve pointed to quantitative evidence suggesting impressive growth and expansion in our field. After the 2012 annual meeting of the Society for the History of Technology in Copenhagen, I reported that more than 50 computing history papers were presented at the SIGCIS workshop or during the main SHOT program itself — with 50 people attending the SIGCIS lunch meeting and 60 people at the day-long SIGCIS Sunday workshop. The numbers were also impressive for the subsequent SHOT meetings in Portland, Maine, and Dearborn, Michigan. As our report on this year’s SHOT conference and SIGCIS workshop in Albuquerque makes clear, this quantitative growth continues apace. CBI associate director Jeffrey Yost and I have a friendly wager pending about when SHOT will become fully fifty percent computing history. With this column I want to stress a slightly different theme: the qualitative evidence that computing history is maturing in depth and sophistication. It certainly makes a difference if 50 or 100 computer historians attend the SIGCIS workshop, but equally vital is the quality of their work and the recognition it gains in the wider world. Here, too, the evidence is pretty impressive. Let me give you some highlights. 1 We always take pride in the stellar accomplishments of the CBI–Tomash fellows. The leading figures in computing history are a roster of Tomash fellows, including former SIGCIS chair Tom Haigh and present SIGCIS chair Andy Russell; editor-in-chief of IEEE Annals of the History of Computing Nathan Ensmenger; and prize-winning authors Janet Abbate, Atsushi Akera, Christophe Lécuyer, and Eden Medina. This year’s CBI–Tomash fellow Gerardo Con Diaz (Yale University) continues with a notable streak of awards and accolades, including fellowships also from the IEEE History Center, the Smithsonian’s Lemelson Center, and the Business History Conference’s Rovensky Prize — all for work on his dissertation “Intangible Inventions: A History of Software Patenting in the United States, 1945-1985.” What is more, his article on software copyright was awarded this year’s SHOT Levinson Prize and will be published in Technology and Culture. A paper in computing history was the recipient of this year’s highly competitive Robinson prize, awarded to the best-presented paper at the annual SHOT conference. From 18 contenders for this prize, Sarah McLennan (College of William and Mary) won for her presentation of “Computing and the Color Line: Race, Gender, and Opportunity in Early Computing at NASA.” Two pertinent observations are that Sarah represents the wider community of historians who are discovering the importance of computing history, and that her session was jointly sponsored by SIGCIS and EDITH, a new group within SHOT focusing on diversity issues. 1 For additional reflection on the field’s evolution and maturation, see James W. Cortada, “Studying History as it Unfolds, Part 1: Creating the History of Information Technologies,” IEEE Annals of the History of Computing 37 no. 3 (2015): 20-31. 3 Closer to home, I am proud of the work that graduate student Nic Lewis has been doing on the Los Alamos High-Performance Computing History project. As we reported in the Fall 2014 newsletter, Nic spent last summer (and this summer as well) in residence at Los Alamos National Laboratory (LANL). He is taking important steps to define and develop a dissertation project. Nicholas Lewis and his award-winning poster at the LANL student symposium. Last spring he passed his preliminary (qualifying) examinations and this month he successfully defended his dissertation prospectus: “From Stretch to the Cray-1: Lab and Vendor Interaction in the Shaping of Supercomputing at Los Alamos.” At SIGCIS this year he presented a wellreceived paper based on his unique access to LANL archival materials as well as oral histories 4 with participants, “Increasing the Yield: Nuclear Testing, Weapons Strategy, and Supercomputer Selection at Los Alamos in the 1960s.” With a poster on this same topic he won a best-poster award at the LANL student symposium in early August. Deep contributions, notable awards, and increasing visibility: not only is computing history expanding outward in scale and size; it is also becoming more sophisticated and gaining accolades in the wider historical and technical communities. For 35 years, contributions to the CBI Friends have kept CBI at the forefront of computing history, advancing the field with archival collections, oral histories, research projects, and field-shaping publications. We invite you to make a contribution today to maintain the health and vitality of computing history. Thomas J. Misa 5 ACM Books and Computing History ACM Books is a new publishing venture launched by the Association for Computing Machinery in partnership with Morgan & Claypool Publishers. It covers the entire range of computer science topics—and embraces the history of computing as well as social and ethical impacts of computing. I was delighted to accept a position on the Editorial Board with responsibilities for recruiting in this broad area. I looked at it this way: history of computing plus social and ethical impacts of computing—what couldn’t we publish under this rubric? In the Spring 2015 CBI Newsletter we featured the first computing history book in the ACM Books series. Software entrepreneur John Cullinane assembled a unique memoir–oral history collection based on CBI oral histories with his notable colleagues, his sources of inspiration, and his own oral history. Smarter Than Their Machines: Oral Histories of Pioneers in Interactive Computing (2014) contains John’s personal viewpoint on the emergence of interactive computing, involving time-sharing, databases, and networking—including excerpts from 12 CBI oral histories. We mentioned that the unusually quick production cycle of 2.5 months allowed the volume to be out in time for Christmas last year. Bernadette Longo’s Edmund Berkeley and the Social Responsibility of Computer Professionals appeared this fall. In her research Bernadette extensively used the Edmund Berkeley papers at CBI, as well as archival sources at Harvard University, Berkeley’s FBI file, and several collections at the Smithsonian including the Grace Murray Hopper papers. Last month we enjoyed a publication countdown. The book was first available on the ACM Digital Library and Morgan & Claypool websites and, a couple weeks later, on Amazon, Barnes & Noble, and the usual “fine bookstores.” Berkeley will be familiar to CBI Newsletter readers for multiple reasons. He was an early advocate of computing within the insurance industry, and so figures in Joanne Yates’ Structuring the Information Age: Life Insurance and Technology in the Twentieth Century (Johns Hopkins 2005). His notable book Giant Brains, or Machines That Think published in 1949 was the very first book on computing written for a popular audience, an emphasis that Berkeley kept throughout his career in selling inexpensive computer “kits” and publishing the journal Computers and Automation (1951-73). His strongly voiced anti-military stance across these years did not always endear him to Grace Hopper and other computer professionals whose careers were in the military services. The book creates a memorable portrait of a quirky and yet unforgettable person. 6 The third volume in the ACM computing history series is just published. In 2013 Robin Hammerman and Andy Russell, along with their colleagues at Stevens Institute of Technology, hosted a conference to celebrate the many facets of Ada Lovelace, including her contributions to early computing (with Charles Babbage), her notable place in Victorian culture (her father was the noted poet Lord Byron), her iconic status within today’s contemporary “steampunk” movement, and her enduring inspiration for women in computing. It is quite a legacy over two centuries. Or, to be precise, exactly 200 years since the bicentennial of her birth is coming soon in early December 2015. We aim to have Ada’s Legacy contribute a bit to the burgeoning media interest in her accomplishments and career. At the least the volume covers an immense and varied terrain in appraising Ada’s legacy: we know of no other 19th century woman who, in addition to significant mathematical attainments and early computer programming, has a programming language named for her (covered in the book’s chapters 3-5), figures prominently in a contemporary science-fiction literary genre (in chapters 8-10), and inspires contemporary computing reform. The book contains Ada’s “Notes to the Menabrea Sketch,” where her contributions to mathematics and computing are set down for readers to examine themselves, as well as historical information on the Ada computer language. Sydney Padua, author of the recent graphic novel, The Thrilling Adventures of Lovelace and Babbage: The (Mostly) True Story of the First Computer (2015), contributes three original drawings including the one that graces the book’s cover. It so happened that these three books have meaningful connections to the Charles Babbage Institute, but this is no requirement. Other volumes in preparation include a technically oriented history of software and a history of early networking. Please give me a holler if you have an idea that might become an ACM Book. Thomas J. Misa 7 8 SHOT 2015 The Society for the History of Technology held its 58th Annual Meeting in Albuquerque, New Mexico, October 8-11, 2015, at the Hotel Albuquerque, Old Town. CBI director Thomas Misa organized two SHOT sessions, “Artificial Sciences? Technology, Education, and Professional Networks in Early Computing,” and “Rewiring Public and Private: Computing for the Public Sector and Public Interest.” He also led a Sunday SIG lunchtime discussion (with lunch sponsored by the IEEE History Center) on the evolution of discipline-specific history centers and diverse approaches. CBI archivist Arvid Nelsen presented a SIGCIS paper “Concern for the ‘Disadvantaged’: Computer Training Programs for Communities of Color in the Late 1960s.” He examined the history and context of a short-lived ACM committee for the disadvantaged, as well as other contemporaneous efforts launched to aid African Americans with IT education and jobs. This is part of his larger book project on the history of computing and African Americans. CBI’s Nicholas Lewis, a University of Minnesota History of Science, Technology, and Medicine (HSTM) doctoral candidate, presented a SIGCIS paper entitled, “Increasing the Yield: Nuclear Testing, Weapons Strategy, and Supercomputer Selection at Los Alamos in the 1960s.” This is part of his larger work for LANL and dissertation research on the history of the lab’s HighPerformance Computing. We are pleased that Dr. Janet Toland, a faculty member in the School of Information Management at Victoria University of Wellington, has been a visiting research fellow at the Charles Babbage Institute this semester. She is a recipient of an Association for Computing Machinery grant to help support her travel and research at CBI. On the main program of SHOT, she presented a paper entitled, “Computing Opportunities for All: ACM’s Role in Influencing Public Policy on Universal Access and Education, 1960-2010.” University of Minnesota’s HSTM faculty member Jennifer Karns Alexander gave a SHOT talk, “Engineering, Religion, and Industrial Ethics: Jack Keiser and Industrial Missions in Post-war Britain.” And HSTM doctoral student Dustin Studelska participated with the SHOT Graduate Student Workshop as well as served as a graduate student advisor to SHOT’s Executive Council. On Friday afternoon, SHOT awarded the Leonardo da Vinci Medal to Johan Schot, the Director of the Science Policy Research Unit (SPRU) and Professor of the History of Technology and Sustainability Transition Studies, University of Sussex. Schot, a member of the Royal Netherlands Academy of Arts and Sciences, is renowned for his interdisciplinary approach and contributions to building infrastructure at the intersection of the history of technology, science and technology policy, environmental sustainability, and social change. This has included leadership roles with: “The Greening of Industry Network,” “The History of Technology in the Netherlands Programme,” “The Tensions of Europe Network,” and the “The Knowledge Network for System Innovation.” Schot and Misa have been long-time collaborators, co-editing (with Arie Rip) Managing Technology in Society (Pinter 1995) and (with Ruth Oldenziel) a special issue of History and Technology (2015). Schot’s inspiring da Vinci address challenged historians of technology to conduct work to help check a globally pervasive form of capitalism adverse to environmental sustainability and social well-being. 9 Overall, the SHOT meeting had a substantial number of sessions and individual papers devoted to the history of computing, and a rich SIGCIS (Special Interest Group for Computers, Information, and Society) Sunday full-day meeting offered many additional papers on computer history. Immediately prior to SHOT, IEEE Annals of the History Editor-in-Chief Nathan Ensmenger held the journal’s annual Editorial Board meeting. The Friday SIGCIS lunch had its traditional set of introductions by new attendees, a vibrant book auction (led by past chair and inspired auctioneer Thomas Haigh) to raise funds for upcoming graduate student travel awards, and recognition of this year’s winners of these grants. After brief opening remarks by SIGCIS Andrew Russell, Indiana University’s Nathan Ensmenger kicked-off the Sunday SIGCIS meeting with a dynamic and deeply insightful keynote lecture, “Materiality of the Virtual: An Environmental History of Computing.” Undertaking the challenge posed in Jennifer Light’s provocative keynote from last year (to extend our connections within and outside of the history discipline), Ensmenger’s talk highlighted the deep geographical connection of transportation and communication infrastructures—from railroads and the telegraph to telephony and computing networks. He concentrated on the often-ignored environmental and labor impacts of our digital world. In exploring Bitcoin “mining,” he detailed the substantial carbon imprint of a digital currency often promoted as liberating. Ensmenger also called attention to the full life-cycle of digital devices and the developing world junk heaps where a substantial amount of once first world-owned digital devices now pollute. He also related the oppressive labor conditions of fabrication plants in China and other low-cost manufacturing countries. The audience, nearing one-hundred people, was moved by Ensmenger’s exquisitely crafted talk and slides, and a lively discussion followed. The Computer History Museum SIGCIS Prize for the best book published on the history of computing was awarded to Rebecca Slayton’s Arguments that Count: Physics, Computing, and Missile Defense, 1949-2012. This path-breaking work makes a major contribution to understanding the development of complex software for missile defense, constructions of expertise, and the arguments about underlying computing and software within missile defense system policy debates. The Michael S. Mahoney SIGCIS best article prize was awarded to David Nofre, Mark Priestley, and Gerard Alberts’ Technology and Culture (January) 2014 article “When Technology Became Language: The Origins of the Linguistic Conception of Computer Programming, 1950-1960.” In this insightful article, the authors trace the origin of the language metaphor in modern computing to cybernetics and explain how it evolved in the second half of the 1950s to a more abstract meaning aligned to formal languages of logic and linguistics. The call for universal languages was to enable the migration of code between machines, and represented a major step toward the creation and growth of programming languages. The general SHOT program had 30 papers on the history of computing: Colin Agur (Yale University) “Re-Imagining the Indian State: Three Phases in Telecom Policy, 1947-present,” Janet Abbate (Virginia Tech) “Good to Think With: Educational Visions of the Materiality of Computing,” Margo Boenig-Lipstin (Harvard University) “Players, Not Users: The Role of Computer Play in the Education of Citizens of the Information Age,” Scott Campbell (University 10 of Waterloo) “Professional Networks, Social Geography, and Early Computing in Canada,” David Chavarria-Camacho and Ignacio Siles (Universidad de Costa Rica) “Between MATILDE and the Internet: Computerizing the University of Costa Rica, 1968-1993,” Beatrice Choi (Northwestern University) “Layers of Myth and Magic: The Role of the ‘Artist Class’ in Brazilian Technology Transfer and the Myth of Use Neutrality,” Gerardo Con Diaz (Yale University) “Ontological Contests: Patent Law and the Nature of Computer Programs, 19631972,” Kevin Driscoll (Microsoft Research) “Building a Grassroots Internet: Technical Culture and the Dial-Up Bulletin-board System,” Quinn DuPont (University of Toronto) and Bradley Fidler (University of California-Los Angeles) “The Co-Development of Early Computer Network and Cryptography Infrastructure,” Sebastian Dziallas (University of Kent) “The Evolution and Purpose of Computing Curricula (1960s to 2000s),” Evan Helper-Smith (Princeton University) “‘The Sins of our Forefathers’: Chemists, Information Systems, and the Elusive Ideal of Unique Chemical Names,” Marie Hicks (Illinois Institute of Technology) “Computer Love: Sex, Social Order, and Technological Matchmaking at the Dawn of the Electronic Age, 1950-1979,” Daniel Holbrook (Marshall University) “Clean, Pure, and Orderly,” Charles House (InnovaScapes Institute) “Emergence of Corporate Wide-area Computer Communication Networks,” Bernadette Longo (New Jersey Institute of Technology) “Who Will Benefit from U.S. Computer Development? Establishing Open Communication Channels for Technology Development after World War II,” Sarah McLennan (College of William and Mary) “Computing and the Color Line: Race, Gender, and Opportunity in Early Computing at NASA,” Andrew Meade McGee (University of Virginia) “Defining Public Interest Computing: The Early Washington ACM Community and Discussions of Policy, Governance, and Democracy in the Age of the Mainframe, 1947-1968,” Andrew Nelson (University of Oregon) “Robust Action and the Rise of the CCRMA-lites: The Emergence of Computer Music at Stanford,” Irina Nikivincze (Higher School of Economics) “Making a ‘Science of the Artificial’: Careers and Contributions of the first Doctoral Women in Computer Science,” Joseph November (University of South Carolina) “George Forsythe, the ACM, and Creating a ‘Science of the Artificial’,” Tolu Odumosu (University of Virginia) “Why Diversity Was Crucial to the Creation and Adoption of the GSM Standard for Mobile Communication,” Dongoh Park (Indiana University) “Building a Digital Obligatory Gateway: Sociotechnical Development of Public Key Infrastructure in South Korea,” Elizabeth Petrick (New Jersey Institute of Technology) “From the Dynabook to Autism Apps: Tracing the Ideals of Tablet Computing,” Craig Robertson (Northeastern University) “Information as Modular: Organizing Paper in Early 20th Century Filing Cabinets,” Andrew L. Russell (Stevens Institute of Technology) “Modular Design: Project Tinkertoy and the Building Materials of the Information Age,” Ramesh Subramanian (Quinnipiac University) “High Technology and the Developing State: The Development of India’s PARAM Supercomputer,” Ksenia Tatarchenko (New York University) “‘Primum Non Nocere’ [First, Do No Harm]: Computer Expertise, Responsibility, and Cold War International Encounters,” Janet Toland (Victoria University of Wellington) “Computing Opportunities for All: ACM’s Role in Influencing Public Policy on Universal Access and Education, 1960-2010,” Gregg Pascal Zachary (Arizona State University) “Digital Africa: Researching the History of Computers and Culture in the Sub-Saharan.” SIGCIS had 24 papers on the history of computing (and a digital humanities roundtable): Nathan Ensmenger (Indiana University) “The Materiality of the Virtual: An Environmental History of Computing” [Keynote/Opening Plenary], William Aspray (University of Texas-Austin) “The History of NSF Programs to Broaden Participation in Computing,” Amy Sue Bix (Iowa State University) “Technical Work and Gendered Professionalization in the 1970s and 1980s: The 11 Association for Women in Computing,” Eileen Clancy (City University of New York) “Abacus Computing in the Age of Electronics: Sekiko Yoshida and the Early U.S. Space Program,” Gerardo Con Diaz (Yale University) “IBM and Patent Reform in the United States, 1965-1968,” Quinn DuPont (University of Toronto) “Plaintext, Encryption, Ciphertext: A History of Cryptography and Its Influence on Contemporary Society,” Bradley Fidler (University of California-Los Angeles) “The Emergence of Border Router Protocols and Autonomous Systems on the Internet, c. 1968-1989,” Megan Finn (University of Washington) “‘I am So Anxious to Hear’: Improving Information Infrastructure,” Reem Hilu (Northwestern University) “‘The Ultimate Doll’: Microprocessor Controlled Talking Dolls and Girls’ Play Practices in the Home,” Eric Hintz (Smithsonian Institution) “Susan Kare: Design Icon,” Devin Kennedy (Harvard University) “What was ‘Real’ about ‘Real-Time’?: Engineering Responsive Computers from Whirlwind to Vanguard,” Kimon Keramidas (New York University) “Digital Humanities, SIGCIS, and SHOT” [Organizer and Chair of Roundtable], Nicholas Lewis (University of Minnesota) “Increasing the Yield: Nuclear Testing, Weapons Strategy, and Supercomputer Selection at Los Alamos in the 1960s,” Rebecca Miller (Science and Technology Policy Institute) “Communication of Disaster-Related Information,” Christine Mitchell (New York University) “Bright Side of a Dark Age: Developments in Machine Translation, 1966-1992,” R. Arvid Nelsen (Charles Babbage Institute) “Concern for the ‘Disadvantaged’: Computer Training Programs for Communities of Color in the Late 1960s,” Laine Nooney (Georgia Institute of Technology) “The Infrastructure of Expertise, or What Game Engines Allow,” Joseph November (University of South Carolina) “The Medical Record and the 50-Year Challenge to Computing,” Camille Paloques-Berges (Conservatoire National des Arts et Métiers) “Unix Networks Cooperation as a Shadow Infrastructure for an Early French Internet Experience (1983-1993),” Giuditta Parolini (Technische Universitat Berlin and Berliner Zentrum fur Wissensgeschichte) “From Paper to Bit: A Digital Life for the Records of Long-term Experiments in Agriculture,” Eric Rau (Hagley Museum and Library) “A Future for History (of Technology, Science, and the Environment): Understanding the Challenges of Preserving Corporate Records in the Digital Era,” Andrew Schrock (University of Southern California) “From Black Hats to White Hats: Constructing the ‘Ethical Hacker’,” Brent Strang (Stony Brook University) “Peripheral Convergence Through User-Centered Design: A Case-Study of Logitech,” Lee Vinsel (Stevens Institute of Technology) “ICTs, Auto Safety, and Systems Maintenance: The Toyota Unintended Acceleration Recalls, 2009-2011,” Jacob Ward (University College London) “Research Transplanted and Privatised Post Office/British Telecom R&D in the Digital and Information Era.” Jeffrey R. Yost 12 CBI Completes NSF Computer Security History Project We are pleased to report the completion this fall of our successful NSF-funded project, “Building an Infrastructure for Computer Security History.” We reported on this project following our June 2014 workshop that brought together computer security professionals with academic historians and analysts. It was a notable group with intense and focused discussion and interchange. Subsequently to the workshop, we worked closely with authors and this spring published a set of six peer-reviewed articles in IEEE Annals of the History of Computing. Support came from National Science Foundation (NSF CNS-TC 1116862). The project had four major deliverables, and we achieved success with each. First, we completed a set of 31 oral history interviews with a truly stellar list of computer security pioneers. Our first interview in May 2012 was with Roger Schell while our final two interviews in June 2015 were with William Wulf and Anita Jones, each distinguished computer scientists. The recordings are 1.5 to 5 hours in length, totaling 84.5 hours, and the transcripts total 2,320 pages. A complete list of interviewees is available on the main page of the second deliverable, a knowledge-networking wiki site. 1 The wiki site contains an unusually rich set of computer-security resources, including publications, timelines, conferences — a total of 230 Steve Lipner presenting at CBI’s June 2014 entries. It has been used already in education, and we Computer Security History Workshop. hope to expand it during a follow-on project. A third deliverable was a set of scholarly publications, including the first set of Annals articles, a second set to be published next year, and six additional CBI presentations at scholarly conferences. The fourth major result is a set of print and archival collections documenting computer security, which includes collections from Stephen Lukasik, Steve Lipner, Lance Hoffman, Thomas W. Bailey, Gene Spafford, and Richard Kain as well as archival materials from AUTODIN-2 (19642010). Projects such as this one are major opportunities for shaping the field of computer history, and they fully engage the CBI staff. Jeffrey Yost conducted the majority of the interviews. Three graduate-student research assistants (Nicholas Lewis, Erik Norquest, and Jonathan Clemens) worked on the project at various times, while two undergraduates (Richard Halkyard and Patrick Severin) made significant contributions as well. CBI’s admin Katie Charlet efficiently handled the logistics of recordings, transcripts, editing, and posting of interviews, while Arvid Nelsen is in charge of all of CBI’s archival and print acquisitions. If CBI’s earlier projects in networking and software history are any guide, the short-term results of CBI publications and collections lead to longer-term developments where additional researchers draw on the “infrastructure” of 1 The wider set of security-related CBI oral histories, including those done with James Bidzos, Martin Hellman, Donn Parker, Peter Patton, and Willis Ware prior to this NSF project are at <http://conservancy.umn.edu/handle/ 11299/59493/browse?type=subject&order=ASC&rpp=20&value=Computer+security>. 13 CBI resources, including oral histories and archival collections. And for immediate results, have a look at the sources for Wikipedia entries on Dorothy Denning, Peter Denning, Lance Hoffman, Butler Lampson, Carl Landwehr, Peter Neumann, Susan H. Nycum, Donn Parker, Roger Schell, Gene Spafford, and Tom Van Vleck. You’ll find CBI resources appearing everywhere. 2 Thomas J. Misa News from the Archives Collections at CBI In the last newsletter, Tom Misa reported on the completion of the large project that the CBI Archives undertook with the University Libraries cataloging staff to increase the visibility and accessibility of the books in the James W. Cortada Collection. Since that time, we have additionally completed cataloging of the Erwin Tomash book collection (CBI 75) and the books and serials in the Carl Machover Collection. This increased visibility continues to drive requests for these incredible resources. CBI has long been known primarily for its remarkable collections of archival collections and our storage facility has been set-up specifically to accommodate maximizing space for standard archival boxes. While book collections were waiting for cataloging they were able to be housed in such boxes. With increased visibility and demand, however, we are now reconfiguring space in our caverns in order to create a section dedicated to books and serials. We are drawing on the state-of-the-art storage and retrieval systems established by the Minnesota Library Access Center — a system that organizes print materials by size in order to maximize space. A great deal of work has already taken place, relocating collections and making modifications to collection shelving. Work will continue in the weeks and months to come in rehousing publications and updating records. This work will enable CBI to further develop and grow this fabulous collection of historic resources — a task in which we are already engaged! Since the last newsletter we have also acquired remarkable collections on computer security from Eugene Spafford and Rick Smith, computer design software and associated user-groups from Mark Simonson, and the personal computing library of Eric Weiss, including the books authored by Weiss himself and other remarkable areas of focus (such as those on artificial intelligence). The books constitute only one portion of Weiss’s generous gift to CBI, which will also be the home for his collection of personal papers that includes records pertaining to his work with the Association for Computing Machinery, Sun Oil Company, the Naval Ordnance Laboratory, and Lehigh University. CBI also received from Data Systems Analysts, Inc., the collection of records that document the development, installation, use, and history of AUTODIN, the earliest and longest running computer network developed by Data Systems Analysts, Inc. for the U.S. Department of Defense. This is another remarkable set of materials in original formats — both physical and digital. I am grateful to all of our donors for making the materials that tell the stories of their 2 See “what links here” to CBI at <https://en.wikipedia.org/wiki/Special:WhatLinksHere/Charles_Babbage_Institute> 14 contributions to computing accessible to CBI’s local, national, and international community of researchers. R. Arvid Nelsen IBM History: Gartner Group Records at CBI Gideon Gartner was one of the most authoritative and respected “IBM watchers” of the twentieth century. It is easy to forget that between the 1960s and the early years of the new century, IBM’s every move, every product introduction or pronouncement was tracked by stock brokers, share holders, competitors, and customers — that entire knowledge-based consulting companies grew up to provide information and insights about IBM. Gartner’s was often considered to be the best informed. Now Gartner’s business records have become available to historians to study at CBI. And they are fabulous. Gartner kept very detailed records of his correspondence and business, of his analysis and data, drafts of his newsletters and their final versions. The records at CBI include his scribblings, speeches, and presentations, and in addition his collection of what others had to say about IBM. Almost as soon as they became available, I had to rush over to CBI to see these for my research about IBM. The value of his papers is enhanced by his deep knowledge of the industry and IBM, and the extraordinary level of detail with which he approached his work. I think he also had the world’s smallest handwriting; no person could put more data and text on a single sheet of paper than Gartner! Imagine my surprise as I opened up box after box of materials, seeing unfolding before me essentially the history of the computer industry from the early 1970s to the end of the century, week by week, year by year. Laid out before me were musings about strategy, corporate intent, pricing scenarios, analysis of different markets, such as for large and small machines and software, details about IBM’s rivals, lawsuits, and press coverage — it was all there. The finding aid was useful and accurate. The papers had buried within the folders’ formal topics much other useful material. For example, in folders that were clearly marked “IBM,” there is also useful information about rivals such as Burroughs and Control Data. The bulk of Gartner’s focus was American, but there is some commentary on Europe and Asia. After spending several days examining these papers, I concluded that it would be difficult to study the business history of information technology in the US of the second half of the twentieth century without examining this wide-ranging and foundational collection. It represents an important addition to a rapidly growing series of collections on the business and institutional players in the world of computing held at CBI. James W. Cortada CBI Senior Research Fellow CBI is pleased to announce the availability of Jeff Yost’s 124-page oral history with Gideon Gartner at <http://hdl.handle.net/11299/174965>. 15 Needles in a Haystack: The Challenges of Researching Personal Computing at the CBI (Norberg Grant) In the summer of 2015, I received the Norberg Travel Grant to conduct research for my dissertation focusing on the relationship between personal computers and the private sphere. Popular lore about personal computing often focuses on the Californian computer scene and the libertarian leanings of some early enthusiasts, and this contributes to the view that personal computers have always been involved in discussions of public policy. I wanted to examine how this entwinement of computers with the public sphere occurred since the personal computer was marketed as a consumer device meant for domesticity and the private market—competing notions of the “private.” As many have argued, a strict boundary between public and private is problematic. As Michael Warner notes, however, “attempts to frame public and private as sharp distinction or antinomy have invariably come to grief, while attempts to collapse or do without them have proven equally unsatisfying.” 1 In my dissertation, I demonstrate that although early computer adopters rarely made delineations about boundaries, their discussions about the personal computer hinged around competing notions of the “private.” Sadly, finding resources on personal computing was challenging, since there is almost no scholarly research on the topic. This meant that I was unable to draw on other scholars to help me find pertinent sources. At first, I looked towards journalistic narratives, but these leaned towards hagiography. Rather than focusing on a select group of “geniuses,” I wanted to examine enthusiasts and general users to gain a wider perspective. I knew that computer magazines and newsletters were some of the best sources to craft my narrative, but they were often difficult to locate in archives. Luckily, many early adopters of personal computers have remained in the computer industry. They often create websites dedicated to older machines and the popular literature surrounding them. Under the direction of Jason Scott, the Internet Archive has consolidated the material on these websites into a single space, along with scanning material not available elsewhere. This proved invaluable as the Internet Archive has no limit on how you work with its sources. I wrote a small script that “scraped” the magazines along with putting them into different years, allowing me to considerably shorten my time gathering material. I believe these online sources will prove increasingly important as computer historians begin to work more on personal computing. Despite the large number of materials online, I knew they did not tell the whole story. I still needed to go to traditional archives, such as the CBI. Unfortunately, studying the personal computers at CBI proved challenging. Few collections related directly to my topic. This is not to say that there are no sources; simply, that finding them can be difficult. Some particularly useful boxes were of computer magazines, such as 80 Micro Programming, TRS-80 Microcomputer News, Computer Hobbyists, and the unique Reality Hackers. CBI also has a full collection of Dr. Dobbs Journal, which I previously had a tough time finding. Other useful 1 Michael Warner, Publics and Counterpublics (New York; Cambridge, Mass.: Zone Books ; Distributed by MIT Press, 2002), 29. 16 collections were the Auerbach Associates Market and Product Reports collection and the Market and Product Reports collection. These collections allowed me to get statistics about different computing products to see how fast consumers adapted them. The material on foreign computer markets was especially interesting. I was also surprised by how much there was about peripherals. While they do not play a big part in my own work, they will be very useful for researchers moving forward. Just make sure to dedicate some time to these collections since they are very large. As with any good archive trip, there were a lot of surprises. One was Computer User magazine, which was founded in Minneapolis, Minnesota. The magazine is critical for understanding the changes in the Minnesota computing industry, and because of Minnesota’s importance to the industry, also provided an indication of what was happening in computing more broadly. In addition, I found the Donn B. Parker papers offered an amazing overview of changing ideas of computer crime. Discussions of computer ethics, property, and law permeate the collection. Finally, I also scoured the many collections dedicated to mainframe computing. It was interesting to see how mainframe computer leaders saw the computer’s transformation to a consumer device. My advice to all researchers is to get in contact with Arvid Nelsen, the current CBI archivist. It is hard to put into words just how helpful he was throughout the whole process. Because I believed that much of the personal computing literature would be scattered throughout other collections, he had to retrieve a copious amount of boxes. As I went through them, I took photos, but some collections only had a few items; this meant he was always rushing in and out giving me new boxes. I am also grateful for Tom Misa and Jeffrey Yost. 2 I had great discussions with both, and they recommended other scholars working on similar topics. The extension of CBI’s collection is astounding, and despite staying there for three weeks, there is still more I believe I can return to. Nabeel Siddiqui Ph.D. Student, William and Mary 2 Jeffrey Yost, “Exploring the Archives: Resources on Personal Computing,” CBI Fall 2012 Newsletter, http://www.cbi.umn.edu/about/nsl/v34n2.pdf. 17 Researching and Preserving the History of Information Technology in Hungary Abstract This article describes the special characteristics of the history of information technology in Hungary, and the major initiatives undertaken to research and preserve the achievements of the key organizations and their accomplishments. The research methodology used and the future plans are also outlined. Special Characteristics of the History of Information Technology in Hungary The evolution of IT in Hungary following World War II was defined first and foremost by the country’s location within the Eastern Bloc – or as it was commonly known – “behind the iron curtain.” This impacted the development of the IT industry in two ways. First, as the economy and research were centrally controlled, the prohibition of or support for IT was determined by the political decisions of the Soviet Union. Second, the export restrictions imposed by the West prevented the spread of the new advanced technologies included in the “CoCom list” – the common term for the list of strategically important IT products that were subject to the export embargo as determined by the Coordinating Committee for Multilateral Export Controls. It wasn’t until 1994, when the embargo was abolished, that the latest IT products and applications were able to be imported. This hindrance was, in many cases, turned into an advantage. The otherwise unavailable technology had to be redesigned or reconstructed using great creativity and with local talent, resulting in the successful development of a home-grown Hungarian IT industry whose production was not only able to meet local demand but also generated substantial export revenues. For example, two major Hungarian computer producers, VIDEOTON and KFKI, were able to produce many thousands of computers, the majority of which were exported. As many detailed studies have been published about the history of IT in Hungary [1,2,3], we will limit ourselves here to the efforts to conserve the artifacts from this era. The history of the preservation of IT artifacts in Hungary, and the IT exhibition in Szeged In the best of cases, objects from the past are preserved and live on in a country’s national museums. In Hungary, the Budapest Museum of Technology, which is part of the Hungarian Museum of Science, Technology and Transportation, provides a home for computers with significant Hungarian ties. For example, the museum houses the first Hungarian electromechanical computer, MESZ 1, and one of the first large-scale computers used in Hungary, the URAL 2. These computers can be viewed in the museum’s “Technical Study Store.” 18 The MESZ-1 and URAL II computers in the Hungarian Museum of Science, Technology and Transport Due to the rapid cycle of development and obsolescence of computers, the collection of the Museum of Technology was unable to keep pace. This is where the John von Neumann Computer Society, which was established in 1968 to support the fast-developing IT profession, saw a role for itself in the preservation of industry artifacts. Already in the mid 1970’s, the John von Neumann Computer Society’s Director, Győző Kovács, realized that computers that had been purchased at great cost, but had been replaced as they became obsolete, should be preserved to educate future generations. In order to implement this idea, a three-person “Board of IT History” was formed within the John von Neumann Computer Society. Achieving this goal was far from easy, however. As many early computers had already been relegated to the junkyard, only a few examples from the early years were able to be preserved. The collection efforts were also hindered by the requirement at the time to offer computers that were no longer needed to 20 other companies before they could be donated to museums. Győző Kovács, and his friend Dániel Muszka, a mathematician in the cybernetics laboratory at the University of Szeged, started to search out and collect computers that were slated for the scrap heap. Later on, their colleague, Mihály Bohus, also joined the crusade. Thanks to their heroic and self-sacrificing efforts, almost 200 tons of computers were acquired and housed in temporary warehouses. Together, they preserved the computers and from time to time organized exhibitions. A big turn in events occurred when the Municipality of Szeged, with the support of the European Union, built the Szentgyögyi Albert Agóra cultural center in Szeged, where, thanks to the John von Neumann Computer Society’s funding and the personal efforts of the Director, in 2012 a permanent 1300 m2 exhibition entitled “The Future’s Past” was established. The painstakingly acquired collection exhibits many hundreds of computer configurations and many thousands of western and eastern computers from the earlier periods of IT history [4]. To this very day, the John von Neumann Computer Society, which consists of 2,300 individuals, 100 institutions, and 23 professional associations among its members, aspires to adhere to its motto to: “Uphold the values of the past, adapt to the present, and influence the future.” 19 The Szentgyörgyi Albert Agóra IT history exhibition in Szeged [5] Personal IT Collections In addition to the Budapest Museum of Technology and the Szeged IT Exhibition, many ITrelated personal collections are forming in Hungary, most of which are collections of personal computers and computer games [6,7,8,9]. Amongst these, one of the biggest and most widespread collections is that of the author of this article, a professor at the Óbuda University. As a result of more than 40 years of systematic collection, many thousands of artifacts were accumulated, many of significant historical value. The main areas of focus are early calculation devices, key electronic components significant to the history of IT, data storage devices, personal and portable computers, and communication devices. The collection traces the many steps and stages in the development of IT products, and showcases how many significant inventions build upon a series of prior innovations. In many areas, the aim is for the collection to be exhaustive, for example to contain all of the electronic components used in Hungarian IT products, including electron tubes, transistors, integrated circuits, processors, etc. Select items from the collection are displayed in both the Óbuda University’s main hall and the Budapest University of Technology and Economics on a rotating basis. Grouped around a specific theme, the displays give a brief history of the items, the problem they were designed to solve, their significance in the history of IT, and their major applications. The collection is also used to illustrate the lessons taught in the course “Chapters in the Cultural History of Information Technology.” 20 Historical IT components from László Kutor private collection The Objectives and Accomplishments of the IT History Forum In 2009, the John von Neumann Computer Society established the IT History Forum, with the following objectives: to organize events that provide an opportunity for those who played definitive roles in the development of the Hungarian IT industry to meet and share their experiences in living and shaping the history of the IT profession; to support research in the history of IT in Hungary; to collect and preserve significant documents and the oral history of this period; and to establish a website dedicated to the work of the Forum. Events Commemorating the History of IT in Hungary Approximately once a month, the IT History Forum organizes an event in a series of “Great Hungarian IT Workshops.” Each event is focused on an institution - or the individuals working in an institution - that made significant contributions to the history of IT in Hungary. The events were organized with the active participation of two to three key individuals from these institutions, which in most cases had long since ceased to exist. If the institutions or their successors were still in existence, the events were held at the original site, or more likely at the host institute, the Óbuda University, which was able to accommodate the often two hundred or more participants. An essential element of the events was the video recording of all the presentations, which were most often given by the most renowned experts in their fields. Their recounting of the past events and achievements constitutes a valuable oral history of the IT industry in Hungary. To date, 28 such events have been held, with more than 100 hours of video recordings available on YouTube. The funding for the video recordings was provided by the John von Neumann Computer Science Society. Recently, the IT History Forum launched a new series of events entitled “Then and Now” in which the past and present of a given profession is presented. To date, three such events have been held focused on watchmaking, data centers, and the meteorology profession, which has always been reliant on intense data processing. These events featured the elite within their profession as presenters. The presentations and supporting documents, data and articles are all available on the Forum’s website. 21 IT History Data Collection Another critical focus of the IT History Forum’s research efforts is the collection of data related to Hungarian IT institutions, especially those involved in the development of IT products, or important applications of international products in Hungary as well as data related to individuals who made significant contributions to the early stage of computer science in Hungary. Using a standardized template, many students from the Óbuda University who were enrolled in the “Chapters in the Cultural History of Information Technology course” (designed and taught by the author of this article) also contributed to this data collection. All of the material is available on the Forum’s website and is in the process of undergoing peer review. Profiles in IT History In 2010, the board of the IT History Forum decided to conduct video interviews with prominent leaders from the early period of IT history in Hungary. The guiding principles in the section of these profiles in oral history were (1) that the individuals be experts in their field and (2) older than 70 years. Over the past four years, the John von Neumann Computer Science Society has financed the production of eight profiles each year. Each interview lasted at least one hour and focused on approximately 10 questions. Afterwards, the interview was edited to around 20 minutes and put on YouTube, with the approval of the person interviewed. The interviews were also included in the Hungarian National Digital Archive. The profiles brought to light new information that is significant to the understanding of the history of IT in Hungary. For this reason, the IT History Forum decided to make the transcript of the entire interview available to researchers. To date, 32 profiles and eight full transcriptions have been completed. Development of the Archives of the History of Hungarian IT Through the organization of events and collecting of information and artifacts, it became increasingly clear that a system needed to be developed to ensure the sustainability and easy access to the increasingly large body of information regarding the history of IT in Hungary. The IT History Forum turned to the John von Neumann Computer Science Society with a proposal for the development of the Archives of the History of IT in Hungary. The archives would be devoted to the preservation of information, facts, and documents with significance in the history of IT. The archives would focus on information that could be digitally stored, not on the collection of artifacts. Following approval from the John von Neumann Computer Science Society, work began on the implementation plan in January 2013. Soon after, with the assistance of a team of 14 technical experts who volunteered their time, the collection and processing of documents related primarily to the pre-1990 period began. The work continues to collect key documents pertaining to ITrelated institutions, informations about hardware and software products, applied systems, and research in the history of IT in Hungary and significant events. In addition to the collection of data and documents, including photos and videos, pertaining to these categories, the archives also contains substantial information about the individuals who contributed to all of the above. Another important function is the secure storage of the information collected. With this in mind, the John von Neuman Computer Science Society signed an agreement with the Hungarian National Informatics Infrastructure (NIIF) for unlimited secure storage of the digitally archived 22 material. Additional agreements were entered into for the storage of other materials. The information found on traditional media (i.e. paper documents, books, etc.) is stored in the National Technical Information Center and Library of the Budapest University of Technology and Economics. Finally, the video materials, particularly those created as part of the “Profiles” series, are stored in the Hungarian National Digital Archives. As of the summer of 2015, the archives include 802 documents, information on 112 institutions and 97 products; 94 studies; “Who is Who in Hungarian IT” 56, “Those who are not with us” (individuals who have made outstanding contributions) 158, 31 IT History Forum events, previous 537 IT–related events; 3 industry wide applications; 32 “Profiles” 8 full transcripts of the oral history interviews; 530 photos; close to 100 hours of video recordings of presentations given by 305 presenters at IT History Forum events. Team of experts building the Hungarian IT history archives. From left to right: Károly Megyery, Miklós Havass, Tamás Koltai, Edit Sántáné-Tóth, Bálint Dömölki, Eszter Kertészné Gérecz, Árpád Bedő , Erika Nyáriné Grófcsik , Géza Álló, Pál Simon, Eleonóra Dettai. Members not pictured: János Ballai, Bálint Bereczki, Mihály Bohus, László Kutor Processing of all materials to be archived is conducted by a volunteer expert team, with the support of a professional librarian. Certain jobs that require special expertise (for example, video editing, database management, website management) have been outsourced to professionals. Future plans The organizers of the archives feel it is important to continue the work they started. However, they also work to inspire others to collect experiences and memories and to preserve the relevant documents that are still available. As a result, a cadre of IT professionals are actively engaged in the collection and processing of information related to the history of IT in Hungary. Another important objective is to spark the interest of the younger generation in the history of IT. Already, a course is offered at the Óbuda University in the history of IT. In addition to this, the creation of research projects and supporting scholarships would greatly contribute to the development and sustainability of research into the history of IT. Another goal of the IT History Forum in Hungary is to develop active partnerships with other international organizations 23 sharing the same mandate, such as the Charles Babbage Institute, which has a decades-long history of collecting, processing, preserving and publishing information about the history of information technology. Dr. László Kutor Associate Professor, Óbuda University President, IT History Forum, John von Neumann Computer Science Society References 1. Zsuzsa Szentgyörgyi, “The Short History of Computing in Hungary,” IEEE Annals of the History of Computing, Vol. 21, No. 3, 1999. 2. Mária Raffai, “Computing Behind the Iron Curtain and Beyond Hungarian National Perspective,” History of Computing and Education 2. WCC 2006 Ed. John Impagliazzo. 3. Bálint Dömölki, “Computing in Hungary – Through the History of Five Institutions.” In: Proceedings of the 8th IT STAR Workshop on History of Computing, Szeged, Hungary, 2014. ISBN 978-88-98091-34-8, pp.80-93. 4. Gábor Képes, Géza Álló A jövő múltja Neumanntól az Internetig [The Future’s Past from Neumann to the Internet] NJSZT 2013 ISBN: 976-615-5036-06-4. 5. István Alföldi, Mihaly Bohus, Daniel Muszka, Gabor Miltenyi, “History and Highlights of a Computer Museum.” In: Proceedings of the 8th IT STAR Workshop on History of Computing, Szeged, Hungary, 2014. ISBN 978-88-98091-34-8, pp.154-168. 6. Károly Nagy’s Collection: http://retropages.uw.hu 7. Gábor Szakács’s Collection: http://retrocomputer.network.hu/video/computerek/ i_szegedi_retro_szamitogep_es_videojatek_kiallitas 8. Sándor Orsovai’s Collection: http://logout.hu/cikk/retro_szamitogep_kiallitas_beszamolo/elozmeny_felkeszules.html 9. Dr. László Kutor’s Collection: https://youtu.be/GZiKLVZoFSw, https://youtu.be/FJqzxpddSnI , https://youtu.be/s65LZIvJ2ZU 24 Women Programmers in the 1950s and 1960s: SHARE Statistics CBI is conducting a research project for the Alfred P. Sloan Foundation on “Tripling Women’s Participation in Computing (1965-1985).” Graduate student research assistant Will Vogel has submitted an article to IEEE Annals of the History of Computing from the project, based on a longitudinal survey of the trade journal Datamation and company archival materials; he also compiled a unique dataset on women in computing, based on the IBM SHARE user group records held at CBI. Bureau of Labor Statistics data begin in 1971. Vogel here reports on his research to count the women attending the SHARE meetings (1958-72) to estimate the proportion of professional women in the computing industry. - TJM Bureau of Labor Statistics on the gender composition of the computer industry workforce are available from 1971, providing an invaluable quantitative view of the influx of women into the industry in the 1970s and 1980s, and the subsequent decline of female participation over the past three decades. 1 Quantitative data for earlier decades is lacking, however. Given the importance of the late 1950s and 1960s in the history of computing, with the rapid growth of the computer workforce in those decades, quantitative estimates of gender composition provide a useful prelude to BLS data from subsequent decades. 2 I have used statistics compiled from SHARE, Inc., meeting reports to generate such an estimate. 3 SHARE was an unofficial user group for IBM computers, founded in 1955 and rapidly growing to meeting sizes in the thousands by the early 1960s. 4 SHARE met twice a year, publishing meeting reports which included directories of attendees listed by first name (or initial), last name, and institutional affiliation. The names in selected SHARE reports were tallied as ‘male’ (e.g. John, Michael), ‘female’ (e.g. Ruth, Margaret), ‘ambiguous’ (e.g. Lynn, Pat), or ‘initials,’ if only initials were given. The results, with meeting totals, are given in Table 1 below: 1 The percentage of the computer industry workforce which was female almost tripled between the 1970s and the mid-1980s, from about 15% in 1971 to 38% in 1985. See Caroline Clarke Hayes, “Computer Science: The Incredible Shrinking Woman,” in Thomas Misa, ed; Gender Codes: Why Women are Leaving Computing, Hoboken, NJ: John Wiley and Sons, 2010, p. 33. See also Rosemary Wright and Jerry A. Jacobs, “Male Flight from Computer Work: A New Look at Occupational Resegregation and Ghettoization,” American Sociological Review 59 no. 4 (1994), p. 529. 2 For the importance of the 1950s and 1960s in the history of programming, see Nathan Ensmenger, The Computer Boys Take Over: Computers, Programmers, and the Politics of Technical Expertise, Cambridge, MA: The MIT Press, 2010. 3 I am grateful to Jeffrey Yost for suggesting this line of inquiry. 4 See Atsushi Akera, “Voluntarism and the Fruits of Collaboration: The IBM User Group, Share,” Technology and Culture 42 no. 4 (2001), pp. 710-736. 25 Year: Male: Female: Ambiguous: Initials: Total: SHARE 11 5 192 20 2 68 282 1960 SHARE 14 6 284 44 12 299 639 1961 SHARE 17 556 101 14 191 862 1963 SHARE 20 676 91 18 198 983 1964 SHARE 23 7 837 104 13 87 1041 1966 SHARE 26 604 56 14 622 1296 1967 SHARE 29 1158 94 16 176 1444 1970 SHARE 34 8 1740 163 35 12 1950 1972 SHARE 38 9 1481 135 36 17 1669 1958 Meeting Number: Table 1: SHARE Raw Data, 1958-1972 The percentages of total meeting attendees for all four categories are given in Table 2, below. Note that while the percentage of names whose gender is ambiguous remains consistently low at 1-2%, the percentage of initials varies widely, from a high around 48% to a low of less than 1%. Year: Meeting Number: Male: Female: Ambiguous: Initials: 1958 SHARE 11 68.09% 7.09% 0.71% 24.11% 1960 SHARE 14 44.44% 6.89% 1.88% 46.79% 1961 SHARE 17 64.50% 11.72% 1.62% 22.16% 1963 SHARE 20 68.77% 9.26% 1.83% 20.14% 1964 SHARE 23 80.40% 9.99% 1.25% 8.36% 1966 SHARE 26 46.60% 4.32% 1.08% 47.99% 1967 SHARE 29 80.19% 6.51% 1.11% 12.19% 1970 SHARE 34 89.23% 8.36% 1.79% 0.62% 1972 SHARE 38 88.74% 8.09% 2.16% 1.02% Table 2: Percentages of Raw Total These percentages are not, in themselves, useful: the gender of those attendees whose names were reported with initials or who are counted as ‘ambiguous’ is obscured by those categories, but presumably existed nonetheless. These SHARE data thus provide a statistical sample of attendees whose names were unambiguously-gendered male or female, along with ‘noise’ in the form of initials and ambiguously-gendered names. To provide a useful estimate of the gender 5 SHARE 11 Report, CBI 21 (SHARE, Inc. Records), Box 3, Folder 17. SHARE 14, 17, 20 Reports, CBI 21 (SHARE, Inc. Records), Box 3. 7 SHARE 23, 26, 29 Reports, CBI 21 (SHARE, Inc. Records), Box 4. 8 SHARE 34 Report, Volume 1, CBI 21 (SHARE, Inc. Records), Box 5. 9 SHARE 38 Report, Volume 1, CBI 21 (SHARE, Inc. Records), Box 6. 6 26 breakdown of SHARE meetings, ‘ambiguous’ names and ‘initials’ are subtracted from the meeting total, giving a total of ‘unambiguously-gendered’ names. The percentage of male and female names in this total are given in Table 3, below: Year: Meeting Number: Total Unambiguously-Gendered: Male: Female: 1958 SHARE 11 212 (75.18% of Raw Total) 90.57% 9.43% 1960 SHARE 14 328 (51.33% of Raw Total) 86.59% 13.41% 1961 SHARE 17 657 (76.22% of Raw Total) 84.63% 15.37% 1963 SHARE 20 767 (78.03% of Raw Total) 88.14% 11.86% 1964 SHARE 23 941 (90.39% of Raw Total) 88.95% 11.05% 1966 SHARE 26 660 (50.93% of Raw Total) 91.52% 8.48% 1967 SHARE 29 1252 (86.70% of Raw Total) 92.49% 7.51% 1970 SHARE 34 1903 (97.59% of Raw Total) 91.43% 8.57% 1972 SHARE 38 1616 (96.82% of Raw Total) 91.65% 8.35% Table 3: Percentages of Unambiguously-Gendered Names Due to the fluctuating number of initials given, the percentage of the meeting total counted in this sample varies, from a low of about 50% to a high of almost 97%. However, the consistency of the percentages from meeting to meeting in spite of this fluctuation supports the representativeness of this sample. It should be emphasized that these data are imperfect. While SHARE was a large meeting, there is potential bias in the sample it provides. Attendees were selected to represent their participating institution, which may have disproportionately favored male attendance. Women may also have had more incentive to give initials than their male colleagues, in which case the exclusion of initials from this sample would tend to underrepresent the number of women actually attending SHARE meetings. Furthermore, SHARE meetings were not a perfectly representative sample of American programmers, as IBM sales representatives and other non-programmers were among the attendees. This may have introduced another bias toward male names, as IBM’s sales workforce was predominantly male in the 1950s and 1960s. 10 However, all of these potential biases are merely speculative, and cannot be established or corrected for with any degree of confidence. Given the lack of quantitative workforce data for the 1950s and 1960s, this sample, while admittedly imperfect, is nonetheless useful. It roughly shows that about 1-in-10 of SHARE attendees were female between 1958 and 1972, suggesting that computing was a relatively maledominated field in this period, but that it included a non-negligible minority of women. William F. Vogel 10 Former IBM programmer Ann Hardy reported being told in the late 1950s that “women [couldn’t] be in sales” but could work as programmers; Ann Hardy, Untitled, in “Anecdotes,” IEEE Annals of the History of Computing 25 no. 4 (2003), p. 81. According to IBM’s Think magazine, women were 5% of the company’s ‘professional’ workforce (a category which presumably included sales personnel along with programmers and systems analysts) in 1966; “Unfinished Business,” Think, July/August 1982, p. 23. 27 Recent Publications Aspray, William. “Information Society, Domains, and Culture.” [Think Piece] IEEE Annals of the History of Computing 37:2 (April-June 2015): 2-4. Bullynck, Maarten. “Computing Primes (1929-1949): Transformations in the Early Days of Digital Computing.” IEEE Annals of the History of Computing 37:3 (July-Sept. 2015): 44-54. Cardoso, Daniel Llach. Builders of the Vision: Software and the Imagination of Design (Routledge, 2015). Clune, Michael W. Gamelife: A Memoir (Farrar, Straus and Giroux, 2015). Cohn, Julie. “Transitions from Analog to Digital Computing in Electrical Power Systems.” IEEE Annals of the History of Computing 37:3 (July-Sept. 2015): 32-43. Con Diaz, Gerardo. “Embodied Software: Patents and the History of Software Development, 1946-1970.” IEEE Annals of the History of Computing 37:3 (July-Sept. 2015): 8-19. Copeland, Jack B., Carl J. Posy and Oron Shagrir. Computability: Turing, Gödel, Church, and Beyond (MIT Press, 2015). Cortada, James W. “‘Doing History’ in the Olden Days, 1970s-1990s.” [Anecdotes] IEEE Annals of the History of Computing 37:2 (April-June 2015): 84-88. Cortada, James W. “Studying History as it Unfolds, Part 1: Creating the History of Information Technologies.” IEEE Annals of the History of Computing 37:3 (July-Sept. 2015): 20-31. Dechow, Douglas R. and Daniele Struppa. Intertwingled: The Work and Influence of Ted Nelson (Springer, 2015). DeNardis, Laura. “The Internet Design Tension between Surveillance and Security.” IEEE Annals of the History of Computing 37:2 (April-June 2015): 72-83. Denning, Peter J. and Jack B. Dennis. “Machines, Languages, and Computation at MIT.” [Anecdotes] IEEE Annals of the History of Computing 37:3 (July-Sept. 2015): 76-77. Denning, Peter J. and Craig H. Martell. Great Principles of Computing (MIT Press, 2015). Haigh, Thomas. “The Tears of Donald Knuth.” Communications of the ACM 58:1 (January 2015): 40-44. Hammerman, Robin and Andrew Russell, eds. Ada’s Legacy: Cultures of Computing from the Victorian to the Digital Age (Morgan & Claypool/ACM Books, 2015). Holmes, Richard. “Computer Science: Enchantress of Abstraction.” Nature 525: 7567 (September 3, 2015): 30-32. Hu, Tung-Hui. A Prehistory of the Cloud (MIT Press, 2015). Greenberg, Joel. Gordon Welchman: Bletchley Park’s Architect of Ultra Intelligence (Frontline Books, 2014). 28 Lipner, Steven B. “The Birth and Death of the Orange Book.” IEEE Annals of the History of Computing 37:2 (April-June 2015): 19-31. Longo, Bernadette. Edmund Berkeley and the Social Responsibility of Computer Professionals (Morgan & Claypool/ACM Books, 2015). Katz, Barry M. Make IT New: The History of Silicon Valley Design (MIT Press, 2015). Meyer, Eric T. and Ralph Schroeder. Knowledge Machines: Digital Transformations of the Sciences and Humanities (MIT Press, 2015). Misa, Thomas J. “Computing is History.” Communications of the ACM 58:10 (October 2015): 35-37. Nelson, Andrew J. The Sound of Innovation: Stanford and the Computer Music Revolution (MIT Press, 2015). O’Donnell, Casey. Developer’s Dilemma: The Secret World of Videogame Creators (MIT Press, 2014). Park, Dongoh. “Social Life of PKI: Sociotechnical Development of Korean Public-Key Infrastructure.” IEEE Annals of the History of Computing 37:2 (April-June 2015): 59-71. Proenza, Francisco J. and Bruce Girard, eds. Public Access ICT Across Cultures: Diversifying Participation in the Network Society (MIT Press, 2015). Randell, Brian. “Reminiscences of Project Y and the ACS Project.” IEEE Annals of the History of Computing 37:3 (July-Sept. 2015): 56-66. Schafer, Valerie. Connecting Women: Women, Gender and ICT in Europe in the Nineteenth and Twentieth Century (Springer, 2015). Sito, Tom. Moving Innovation: A History of Computer Animation (MIT Press, 2015). Slayton, Rebecca. “Measuring Risk: Computer Security Metrics, Automation, and Learning.” IEEE Annals of the History of Computing 37:2 (April-June 2015): 32-45. Supnik, Bob. “The Story of SimH.” [Anecdotes] IEEE Annals of the History of Computing 37:3 (JulySept. 2015): 78-80. Tedre, Matti. The Science of Computing: Shaping a Discipline (Chapman and Hall, 2014). Warner, Michael. “Notes on the Evolution of Computer Security Policy in the U.S. Government, 19652003.” IEEE Annals of the History of Computing 37:2 (April-June 2015): 8-18. Witt, Stephen. How Music Got Free: The End of an Industry, the Turn of the Century, and the Patient Zero of Piracy (Viking, 2015). Yost, Jeffrey R. “Computer Security.” [Guest Editor Introduction] IEEE Annals of the History of Computing 37:2 (April-June 2015): 6-7. Yost, Jeffrey R. “The Origin and Early History of the Computer Security Software Products Industry.” IEEE Annals of the History of Computing 37:2 (April-June 2015): 46-58. Compiled by Jeffrey R. Yost 29 Featured Photo “Lighting cigarette with mechanical hands” This General Electric Company photograph, dated 13 November 1950, is one of several photographs of mechanical hands performing “simple” tasks such as pouring a drink, signing a name, and tightening a nut on a bolt. Many treasures to be found in our CBI Reference Files (CBI 24)! 30