Discover a new way to find and share stories you'll love… Learn about Reading Desk

Trend Results : Computer History

Blog Post Results (1-20 of 1498)


Computational Anthropology Reveals How the Most Important People in History Vary by Culture

Data mining Wikipedia people reveals some surprising differences in the way eastern and western cultures identify important figures in history, say computational anthropologists.  

Today in Media History: In 1973, the Philadelphia Inquirer published one of the first computer-assisted reporting projects

On February 18, 1973, The Philadelphia Inquirer published the first in a series of computer-assisted reporting stories called, “Crime and Injustice.” Investigative reporters Donald Barlett and James Steele used a mainframe computer to...Show More Summary

International Hacking Group Steals $300 Million – Global Digital Banking System Not Secure

- Sophisticated "Ocean's 11" style heist is one of the largest in history - Hackers remotely accessed bank computers to manipulate accounts and A.T.M.s. - Banking groups make no comment - Details expose incredible systemic vulnerability...Show More Summary

Non-Arduino powered by a piece of Computing history

Sometimes it is a blessing to have some spare time on your hands, specially if you are a hacker with lots of ideas and skill to bring them to life. [Matt] was lucky enough to have all of that and recently completed an ambitious project 8 months in the making – a Non-Arduino powered by the giant of computing history – Intel’s 8086 processor. Show More Summary

This Arduino-Style Board Uses Intel's 37-year Old 8086 Chip

Card-based computers keep getting more powerful, unless you're Matt Millman. Because this chap has decided to build an Arduino-style board that's powered by a giant of computing history – Intel's 8086 processor, which is now 37 years old. Read more...

RESTART: Russian Hackers Commit Largest Bank Heist In Human History – $1Billion Gone!

Using malware, Russian hackers steal more than $1 Billion in what’s being described as the biggest bank heist in human history. As much as £650 million is thought to have gone missing after the gang used computer viruses to infect … Continue reading ?

An Adventure into Android Makes the VIC-20 Speak

History and [Bil Herd] teaches us that Commodore begged, borrowed, or stole the engineers responsible for the Speak & Spell to add voice synthesis to a few of the computers that came after the C64. This didn’t quite work out in practice, but speech synthesis was something that was part of the Commodore scene for a long time. Show More Summary

Today in Media History: In 1946 the press introduced the 30-ton ENIAC computer

30 years before Steve Jobs introduced his first computer, there was a 30-ton computer named ENIAC. In many ways ENIAC was one of the biggest computer stories of the 20th century. According to the Computer Museum, “Late at night on February...Show More Summary

Remembering Deep Blue's Surprising Chess Triumph Over A World Champion

2 weeks agoGenres / Sci Fi : io9

Nineteen years ago today, IBM's Deep Blue computer made history by defeating reigning world chess champ Garry Kasparov. Read more...

'From Atoms to Bits': A Brilliant Visual History of American Ideas

A new paper employs a simple technique—counting words in patent texts—to trace the history of American invention, from chemistry to computers.

Elvis has left the ivory tower

Ancient history in computer science (2004) provides a gem about the personas that Microsoft envisioned as users of the development environment Visual Studio. They developed three: Mort, the opportunistic developer, likes to create quick-working solutions for immediate problems. He focuses …

?How Much History Was Lost in the Williamsburg Storage Facility Fire?

The basement of the Brooklyn Civil Court is a stark reminder that for most of mankind's history, you couldn't store information on computers. Huge stacks of court dockets line the wall in this bleak corner of local bureaucracy—thousands upon thousands of files. Show More Summary

Medicare Lung Cancer Screening Coverage A Victory for Patients

Medicare's final decision to cover computed tomography (CT) lung cancer screening gives seniors at high-risk for the disease access to care that can save more lives than any cancer screening test in history

Historic EDSAC computer component becomes part of reconstruction

3 weeks agoTechnology / Gadgets : Gizmag

A piece of cybernetic history returned home as a long-lost component of the Electronic Delay Storage Automatic Calculator (EDSAC), one of the first practical general purpose computers, was returned to Britain from the United States.Show More Summary

4 Steps to Find Information on Someone Online

It’s a classic scene in the movies. The private investigator, or the hero of the story, goes to a computer, enters a name, and up pops everything about that person. The entire life history, right down to the person’s favourite breakfast cereal and current colour of underwear. Show More Summary

The Queen of Code, a FiveThirtyEight film on Grace Hopper

3 weeks agoHumor : Boing Boing

Grace Hopper intended the world's first compiler, and this wonderful video, directed by Community's Gillian Jacobs, is a brilliant introduction to her career and position in the history of computing. My only objection is that it's not a full-length documentary.

The Ultimate History Of Cellular Technology

Nowadays, we use our cell phones for everything. They are mini computers that we carry around in our pockets. Gaming, social networking, reading, and pretty much anything else you can think of can be done on a phone, but it wasn’t always that way. Show More Summary

Are Your Computer Business Records Admissible Evidence at Trial?

Admissible computer business records evidence at trial, such as a payment history to demonstrate that an account is delinquent, is governed by state and federal procedural rules. These rules typically require testimony by an individual who is familiar with the particular computer system and how data entry occurs. Show More Summary

Conspiracy theorists are right? Analysis says oil is often the reason for interfering in another country's war

Scholars say they have used computer models to create strong evidence for what conspiracy theorists have long thought - oil is often the reason for interfering in another country's war. Throughout recent history, countries which need...Show More Summary

Copyright © 2011 Regator, LLC