Brief History of the Desktop PC back to 1970
2011
Sep 7: Seagate ships world's first 4 TB HDD (external, with 5 platters), while
Hitachi ships the first 1 TB/platter HDDs.
Mar 8: Samsung is showing off 3.5-inch HDDs with 1 TB per platter at CeBit.
The high density process enables 2-platter, 2 TB drives, as well as future
4 TB drives with 4 platters. In addition, Samsung will use the process to
bring out a 2.5-inch x 9.5-mm 1 TB laptop drive--the first 1 TB 9.5-mm thick
laptop drive. Since Seagate claims 444 - 488 Gb/sq.in. on its 5-platter, 3 TB
drives, presumably this means Samsung is up to 740 - 810 Gb/sq.in.
(Effective 2.5-in platter area is ~5 sq.in.; 3.5-in platter area is 10-12 sq.in.)
Website or physical archive:
Website only
Website Url:
Is there a fee:
No
Sector:
Research
Public or private:
Public
Address:
United States
Computer History
Overview
I define three classes of computers based on size and wealth of user (all prices adjusted to US dollars in late 1990's):
A. High-end scientific and military computers costing around $20 million. Usually called "large mainframe" or "supercomputer".
Website or physical archive:
Website only
Website Url:
Is there a fee:
No
Sector:
Research
Public or private:
Public
Address:
United States
Pentium 4: In Depth
Introduction
The Pentium 4 processor - Intel's "next generation" of processor to succeed the Pentium III and Celeron processors - was released on November 20 2000. This was an important day in CPU history and for Intel. Some OEM web sites such as Gateway.com claimed it to be "the most powerful processor available for your PC". Unfortunately, that claim was far from true in November 2000.
Website or physical archive:
Website only
Website Url:
Is there a fee:
No
Sector:
Research
Public or private:
Public
Address:
United States
Central Processing Unit
The central processing unit (CPU) is the portion of a computer system that carries out the instructions of a computer program, to perform the basic arithmetical, logical, and input/output operations of the system. The CPU plays a role somewhat analogous to the brain in the computer. The term has been in use in the computer industry at least since the early 1960s.[1] The form, design and implementation of CPUs have changed dramatically since the earliest examples, but their fundamental operation remains much the same.
Website or physical archive:
Website only
Website Url:
Is there a fee:
No
Sector:
Research
Public or private:
Public
Address:
United States
Processor History Details
1969: Four-Phase Systems AL1
The AL1 was an 8-bit bit slice chip containing eight registers and an ALU It was designed by Lee Boysel in 1969 At the time, it formed part of a nine-chip, 24-bit CPU with three AL1s, but it was later called a microprocessor when, in response to 1990s litigation by Texas Instruments, a demonstration system was constructed where a single AL1 formed part of a courtroom demonstration computer system, together with RAM, ROM, and an input-output device.
Website or physical archive:
Website only
Is there a fee:
No
Sector:
Research
Public or private:
Public
Address:
United States
Decentralized Computing
Decentralized computing is the allocation of resources, both hardware and software, to each individual workstation, or office location. In contrast, centralized computing exists when the majority of functions are carried out, or obtained from a remote centralized location. Decentralized computing is a trend in modern day business environments. This is the opposite of centralized computing, which was prevalent during the early days of computers. A decentralized computer system has many benefits over a conventional centralized network. Desktop computers have advanced so rapidly, that their potential performance far exceeds the requirements of most business applications. This results in most desktop computers remaining idle (in relation to their full potential). A decentralized system can utilize the potential of these systems to maximize efficiency. However, it is debatable whether these networks increase overall effectiveness.
Website or physical archive:
Website only
Website Url:
Is there a fee:
No
Sector:
Research
Public or private:
Public
Address:
United States
Hacktivism
Hacktivism (a portmanteau of hack and activism) is the use of computers and computer networks as a means of protest to promote political ends. The term was first used by designer/author Jason Sack in a 1995 InfoNation article about the media artist Shu Lea Cheang. Much as hacking can mean both constructive and destructive activitites, activism similarly includes both explicitly non-violent action (from the models of Martin Luther King and Mahatma Gandhi) and violent revolutionary activities (Che Guevara). If hacking as "illegally breaking into computers" is assumed, then hacktivism could be defined as "the nonviolent use of illegal or legally ambiguous digital tools in pursuit of political ends". These tools include web site defacements, redirects, denial-of-service attacks, information theft, web site parodies, virtual sit-ins, and virtual sabotage.
Website or physical archive:
Website only
Website Url:
Is there a fee:
No
Sector:
Research
Public or private:
Public
Address:
United States
Tor (Anonymity Network)
Tor (short for The Onion Router) is a system intended to enable online anonymity. Tor client software routes Internet traffic through a worldwide volunteer network of servers in order to conceal a user's location or usage from someone conducting network surveillance or traffic analysis.
Website or physical archive:
Website only
Website Url:
Is there a fee:
No
Sector:
Research
Public or private:
Public
Address:
United States
Defensive Computing
Defensive computing is a form of practice for computer users to help reduce the risk of computing problems, by avoiding dangerous computing practices. The primary goal of this method of computing is to be able to anticipate and prepare for potentially problematic situations prior to their occurrence, despite any adverse conditions of a computer system or any mistakes made by other users. This can be achieved through adherence to a variety of general guidelines, as well as the practice of specific computing techniques.
Website or physical archive:
Website only
Website Url:
Is there a fee:
No
Sector:
Research
Public or private:
Public
Address:
United States
Spyware
Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.
Website or physical archive:
Website only
Website Url:
Is there a fee:
No
Sector:
Research
Public or private:
Public
Address:
United States