Pub Date : 2024-03-20DOI: 10.1109/mahc.2024.3379939
Kyle Stine
{"title":"The Logistics of Labor and Life at Signetics","authors":"Kyle Stine","doi":"10.1109/mahc.2024.3379939","DOIUrl":"https://doi.org/10.1109/mahc.2024.3379939","url":null,"abstract":"","PeriodicalId":55033,"journal":{"name":"IEEE Annals of the History of Computing","volume":"168 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140197214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"哲学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-29DOI: 10.1109/mahc.2024.3371908
Eric Rawn
{"title":"The Work and Vision of Ubiquitous Computing at Xerox PARC","authors":"Eric Rawn","doi":"10.1109/mahc.2024.3371908","DOIUrl":"https://doi.org/10.1109/mahc.2024.3371908","url":null,"abstract":"","PeriodicalId":55033,"journal":{"name":"IEEE Annals of the History of Computing","volume":"37 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140008298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"哲学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-23DOI: 10.1109/mahc.2024.3369024
Brian Coghlan, Brian Randell, Ralf Buelow
{"title":"How Percy Ludgate's 1909 Paper Helped Thwart Konrad Zuse's Computer Patent in 1960","authors":"Brian Coghlan, Brian Randell, Ralf Buelow","doi":"10.1109/mahc.2024.3369024","DOIUrl":"https://doi.org/10.1109/mahc.2024.3369024","url":null,"abstract":"","PeriodicalId":55033,"journal":{"name":"IEEE Annals of the History of Computing","volume":"13 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2024-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139952073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"哲学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-09DOI: 10.1109/mahc.2024.3351948
Anushah Hossain
{"title":"Text Standards for the ‘Rest of World’: The Making of the Unicode Standard and the OpenType Format","authors":"Anushah Hossain","doi":"10.1109/mahc.2024.3351948","DOIUrl":"https://doi.org/10.1109/mahc.2024.3351948","url":null,"abstract":"","PeriodicalId":55033,"journal":{"name":"IEEE Annals of the History of Computing","volume":"197 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139952041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"哲学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-01DOI: 10.1109/mahc.2023.3347632
Brian K. Vagts
{"title":"Telenet, the 1983 Hacking Incidents, and the Construction of Network Security in the United States","authors":"Brian K. Vagts","doi":"10.1109/mahc.2023.3347632","DOIUrl":"https://doi.org/10.1109/mahc.2023.3347632","url":null,"abstract":"","PeriodicalId":55033,"journal":{"name":"IEEE Annals of the History of Computing","volume":"21 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139952072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"哲学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-28DOI: 10.1109/mahc.2023.3345654
James W. Cortada
IBM published a large body of technical manuals that described how to install, repair, and maintain its products during the 20th century. These were only available to the many thousands of IBM customer engineers. They remain a source of IT literature that historians have yet to study. This article describes these collections and recommends what historians and archivists should do about them.
20 世纪,IBM 出版了大量技术手册,介绍如何安装、维修和维护其产品。这些手册只提供给成千上万的 IBM 客户工程师。它们仍然是历史学家尚未研究的 IT 文献来源。本文介绍了这些藏品,并建议历史学家和档案保管员应如何处理它们。
{"title":"A Hidden IT “Best Seller”: IBM Customer Engineering Maintenance Manuals, 1930s–1980s","authors":"James W. Cortada","doi":"10.1109/mahc.2023.3345654","DOIUrl":"https://doi.org/10.1109/mahc.2023.3345654","url":null,"abstract":"IBM published a large body of technical manuals that described how to install, repair, and maintain its products during the 20th century. These were only available to the many thousands of IBM customer engineers. They remain a source of IT literature that historians have yet to study. This article describes these collections and recommends what historians and archivists should do about them.","PeriodicalId":55033,"journal":{"name":"IEEE Annals of the History of Computing","volume":"38 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140590246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"哲学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-06DOI: 10.1109/mahc.2023.3333069
{"title":"IEEE Computer Society: Volunteer Service Awards","authors":"","doi":"10.1109/mahc.2023.3333069","DOIUrl":"https://doi.org/10.1109/mahc.2023.3333069","url":null,"abstract":"","PeriodicalId":55033,"journal":{"name":"IEEE Annals of the History of Computing","volume":"11 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142191345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"哲学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-06DOI: 10.1109/mahc.2023.3329608
{"title":"Over the Rainbow: 21st Century Security & Privacy Podcast","authors":"","doi":"10.1109/mahc.2023.3329608","DOIUrl":"https://doi.org/10.1109/mahc.2023.3329608","url":null,"abstract":"","PeriodicalId":55033,"journal":{"name":"IEEE Annals of the History of Computing","volume":"13 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142191347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"哲学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-06DOI: 10.1109/mahc.2023.3327702
{"title":"IEEE Computer Society D&I Fund","authors":"","doi":"10.1109/mahc.2023.3327702","DOIUrl":"https://doi.org/10.1109/mahc.2023.3327702","url":null,"abstract":"","PeriodicalId":55033,"journal":{"name":"IEEE Annals of the History of Computing","volume":"3 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142191344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"哲学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-06DOI: 10.1109/mahc.2023.3333072
{"title":"IEEE Computer Society: Publications Seek","authors":"","doi":"10.1109/mahc.2023.3333072","DOIUrl":"https://doi.org/10.1109/mahc.2023.3333072","url":null,"abstract":"","PeriodicalId":55033,"journal":{"name":"IEEE Annals of the History of Computing","volume":"78 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142191342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"哲学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}