See: Mastering Python for Networking and Security: Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues, 2nd Edition Kindle Edition
The Artificial Intelligence of Things (AIoT) is the combination of Artificial intelligence (AI) technologies with the Internet of things (IoT) infrastructure to achieve more efficient IoT operations, improve human-machine interactions and enhance data management and analytics.   
- ^ Ghosh, Iman (12 August 2020). “AIoT: When Artificial Intelligence Meets the Internet of Things”. Visual Capitalist. Retrieved 22 September 2020.
- ^ Lin, Yu-Jin; Chuang, Chen-Wei; Yen, Chun-Yueh; Huang, Sheng-Hsin; Huang, Peng-Wei; Chen, Ju-Yi; Lee, Shuenn-Yuh (March 2019). “Artificial Intelligence of Things Wearable System for Cardiac Disease Detection”. 2019 IEEE International Conference on Artificial Intelligence Circuits and Systems (AICAS): 67–70. doi:10.1109/AICAS.2019.8771630. Retrieved 22 September 2020.
- ^ Chu, William Cheng-Chung; Shih, Chihhsiong; Chou, Wen-Yi; Ahamed, Sheikh Iqbal; Hsiung, Pao-Ann (November 2019). “Artificial Intelligence of Things in Sports Science: Weight Training as an Example”. Computer. 52 (11): 52–61. doi:10.1109/MC.2019.2933772. ISSN 1558-0814. Retrieved 22 September 2020.
Manning publishes the best quality IT books in the industry.
Manning is an independent publisher, providing computer books for software developers, engineers, architects, system administrators, and managers. Our books also cover topics for young programmers, students, and occasionally children.
Manning is an independent publisher of computer books and video courses for software developers, engineers, architects, system administrators, managers and all who are professionally involved with the computer business. We also publish for students and young programmers, including occasionally for children. We are an entirely virtual organization based on Shelter Island, New York, with many staff working from far-flung places like Manila and Zagreb.
“Independent” means we are not owned by a large corporate entity and are free to make decisions without bureaucratic overhead. That has allowed us to innovate and be flexible and to quickly adjust what we do as we go. We were the first by several years to sell our books as unprotected PDFs, something that later became commonplace. We were the first to start selling books before they were finished, in the Manning Early Access Program. This gave our readers access to our content as soon as it was readable, and this too has become common in the industry. And it means we are thinking every day about new ways to satisfy our customers, some of which we hope you will be pleased to discover in the not-too-distant future.
how we improve
We published our first book in 1993 and have been learning from our successes, and even more from our mistakes, ever since. Every new book teaches us something that helps us improve:
- How to choose the topics we publish on
- How to find the right authors for each book
- How to help authors write the best books they can
- How to ensure the content is valuable and easy to learn
- How to let readers know about our content
We publish standalone titles as well as the following book series:
- In Action
- In Practice
- In Depth
- In a Month of Lunches
Readers can access our books through the Manning Early Access Program, O’Reilly Learning (formerly Safari Books Online), and iBooks. Print copies, wherever they are bought, come with free electronic versions in PDF, ePub and Kindle formats. With your print copy in hand, register it on the Manning site and you can download the digital versions from your account.
At this time, our eBooks are available only from Manning.com and Apple’s iBookstore.
See Dr. Angela Yu, Udemy’s best instructor: 100 Days of Code – The Complete Python Pro Bootcamp
As of February 2021, the platform has more than 40 million students, 155,000 courses and 70,000 instructors teaching courses in over 65 languages. There have been over 480 million course enrollments. Students and instructors come from 180+ countries and 2/3 of the students are located outside of the U.S.
Students take courses largely as a means of improving job-related skills. Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company. As of 2021, there are more than 155,000 courses on the website.
The headquarters of Udemy is located in San Francisco, California, with offices in Denver, Colorado; Dublin, Ireland; Ankara, Turkey; Sao Paulo, Brazil; and Gurugram, India.
c. 2500 BC – Sumerian Abacus
c. 700 BC – Scytale
c. 150 BC – Antikythera Mechanism
c. 60 – Programmable Robot
c. 850 – On Deciphering Cryptographic Messages
c. 1470 – Cipher Disk
1621 – Slide Rule
1703 – Binary Arithmetic
1770 – The “Mechanical Turk”
1792 – Optical Telegraph
1801 – The Jacquard Loom
1822 – The Difference Engine
1833 – Michael Faraday discovered silver sulfide became a better conductor when heated
1836 – Electrical Telegraph
1843 – Fax Machine Patented
1849 to early 1900s – Silicon Valley After the Gold Rush
1851 – Thomas Arithmometer
1854 – Boolean Algebra
1870 – Mitsubishi founded
1874 – Baudot Code
1874 – Semiconductor Diode conceived of
1876 – Ericsson Corporation founded in Sweden
1885 – Stanford University
1891 – Strowger Step-by-Step Switch
1890s to 1930s – Radio Engineering
Early 1900s – Electrical Engineering
1904 – “Diode” or Two-Element Amplifier actually invented
1904 – Three-Element Amplifier or “Triode”
1906 – Vacuum Tube or “Audion”
1907 – Lee DeForest coins the term “radio” to refer to wireless transmission when he formed his DeForest Radio Telephone Company
1909 – Charles Herrold in San Jose started first radio station in USA with regularly scheduled programming, including songs, using an arc transmitter of his own design. Herrold was one of Stanford’s earliest students and founded his own College of Wireless and Engineering in San Jose
1910 – Radio Broadcasting business pioneered by Lee DeForest with broadcast from New York of a live performance by Italian tenor Enrico Caruso
1914 – Floating-Point Numbers
1917 – Vernam Cipher
1920 – Rossum’s Universal Robots
1927 – Fritz Lang’s Metropolis
1927 – First LED
1928 – Electronic Speech Synthesis
1930 – The Enigma Machine
1931 – Differential Analyzer
1936 – Church-Turing Thesis
1946 – Trackball
1946 – Williams Tube Random Access Memory
1947 – Actual Bug Found – First “debugging”
1947 – William Shockley’s Silicon Transistor
1948 – Curta Calculator
1948 – Manchester SSEM
1949 – Whirlwind Computer
1950 – Error-Correcting Codes (ECC)
1951 – Core Memory
1951 – Microprogramming
1952 – Computer Speech Recognition
1956 – First Disk Storage Unit
1956 – The Byte
1956 – Robby the Robot from Forbidden Planet
1957 – FORTRAN Programming Language
1957 – First Digital Image
1958 – The Bell 101 Modem
1958 – SAGE Computer Operational
1959 – IBM 1401 Computer
1959 – DEC PDP-1
1959 – Quicksort Algorithm
1960 – COBOL Programming Language
1961 – ANITA Electronic Calculator
1962 – Spacewar! Video Game
1962 – Virtual Memory
1963 – ASCII Character Encoding
1964 – RAND Tablet Computer
1964 – Teletype Model 33 ASR
1964 – BASIC Programming Language
1965 – First Liquid-Crystal Display (LCD)
1965 – Fiber Optics – Optical-Fiber
1965 – DENDRAL Artificial Intelligence (AI) Research Project
1965 – ELIZA – The First “Chatbot” – 1965
1965 – Touchscreen
1966 – Star Trek Premieres
1966 – Dynamic RAM
1967 – Object-Oriented Programming
1967 – First ATM Machine
1967 – Head-Mounted Display
1967 – Programming for Children
1967 – The Mouse
1968 – Carterfone Decision
1968 – Software Engineering
1968 – HAL 9000 Computer from 2001: A Space Odyssey
1968 – Mother of All Demos
1968 – Dot Matrix Printer – Shinshu Seiki (now called Seiko Epson Corporation) launched the world’s first mini-printer, the EP-101 (“EP” for Electronic Printer,) which was soon incorporated into many calculators
1969 – ARPANET / Internet
1969 – Digital Imaging
1969 – UNIX Operating System
1970 – Fair Credit Reporting Act
1970 – Relational Databases
1970 – Floppy Disk
1971 – Laser Printer
1971 – NP-Completeness
1971 – @Mail Electronic Mail
1971 – First Microprocessor – General-Purpose CPU – “Computer on a Chip”
1971 – First Wireless Network
1972 – C Programming Language
1972 – HP-35 Calculator
1972 – Pong Game from Atari – Nolan Bushnell
1973 – First Cell Phone Call
1973 – Xerox Alto from Xerox Palo Alto Research Center (PARC)
1974 – The first successful real-time conversation over ARPANET achieved using 2.4 kpbs LPC, between Culler-Harrison Incorporated in Goleta, California, and MIT Lincoln Laboratory in Lexington, Massachusetts.
1974 – First Personal Computer: The Altair 8800 Invented by MITS in Albuquerque, New Mexico
1975 – Colossal Cave Adventure – Text-based “Video” Game
1975 – The Shockwave Rider SciFi Book – A Prelude of the 21st Century Big Tech Police State
1975 – AI Medical Diagnosis – Artificial Intelligence in Medicine
1975 – BYTE Magazine
1975 – Homebrew Computer Club
1975 – The Mythical Man-Month
1975 – The name Epson was coined for the next generation of printers based on the EP-101 which was released to the public. (EPSON:E-P-SON: SON of Electronic Printer). Epson America Inc. was established to sell printers for Shinshu Seiki Co.
1976 – Public Key Cryptography
1976 – Acer founded
1976 – Tandem NonStop
1976 – Dr. Dobb’s Journal
1977 – RSA Encryption
1977 – Apple II Computer
1977 – Danny Cohen and Jon Postel of the USC Information Sciences Institute, and Vint Cerf of the Defense Advanced Research Projects Agency (DARPA), agree to separate IP from TCP, and create UDP for carrying real-time traffic.
1978 – First Internet Spam Message
1978 – France’s Minitel Videotext
1980 – Timex Sinclair ZX80 Computer
1980 – Flash Memory
1980 – RISC Microprocessors – Reduced Instruction Set Computer CPUs
1980 – Commercially Available Ethernet Invented by Robert Metcalfe of 3Com
1980 – Usenet
1981 – IBM Personal Computer – IBM PC
1981 – Simple Mail Transfer Protocol (SMTP) Email
1982 – AutoCAD
1982 – PostScript
1982 – First CGI Sequence in Feature Film – Star Trek II: The Wrath of Khan
1982 – National Geographic Moves the Pyramids – Precursor to Photoshop
1982 – TRON Movie
1982 – Home Computer Named Machine of the Year by Time Magazine
1983 – WarGames
1983 – 3-D Printing
1983 – First Laptop
1983 – Microsoft Word
1983 – Nintendo Entertainment System – Video Games
1983 – Domain Name System (DNS)
1983 – IPv4 Flag Day – TCP/IP
1984 – Text-to-Speech (TTS)
1984 – Apple Macintosh
1984 – VPL Research, Inc. – Virtual Reality (VR)
1984 – Quantum Cryptography
1984 – Verilog Language
1984 – Dell founded by Michael Dell
1984 – Cisco Systems was founded in December 1984
1985 – Connection Machine – Parallelization
1985 – NSFNET National Science Foundation “Internet”
1985 – GNU Manifesto from Richard Stallman
1985 – AFIS Stops a Serial Killer – Automated Fingerprint Identification System
1986 – Software Bug Fatalities
1986 – Pixar Animation Studios
1986 – D-Link Corporation founded in Taipei, Taiwan
1987 – Digital Video Editing
1988 – MPEG – Moving Picture Experts Group – Coding-Compressing Audio-Video
1988 – CD-ROM
1988 – Morris Worm Internet Computer Virus
1988 – Linksys founded
1989 – SimCity Video Game
1990 – GPS Is Operational – Global Positioning System
1990 – Digital Money is Invented – DigiCash – Precursor to Bitcoin
1991 – Pretty Good Privacy (PGP)
1991 – DARPA’s Report “Computers at Risk: Safe Computing in the Information Age“
1991 – Linux Kernel Operating System Invented by Linus Torvalds
1992 – Unicode Character Encoding
1993 – Apple Newton
1994 – First Banner Ad – Wired Magazine
1994 – RSA-129 Encryption Cracked
1995 – DVD
1995 – E-Commerce Startups – eBay, Amazon and DoubleClick Launched
1995 – AltaVista Web Search Engine
1995 – Gartner Hype Cycle
1996 – Universal Serial Bus (USB)
1996 – Juniper Networks founded
1997 – PalmPilot
1997 – E Ink
1998 – Diamond Rio MP3 Player
1998 – Google
1999 – Blog Is Coined
2000 – USB Flash Drive
2000 – Fortinet founded
2001 – Wikipedia
2001 – Apple iTunes
2002 – Home-Cleaning Robot
2003 – CAPTCHA
2004 – Product Tracking
2004 – Facebook
2006 – Differential Privacy
2007 – Apple iPhone
2008 – Bitcoin
2010 – Cyber Weapons
2011 – IBM Watson Wins Jeopardy!
2011 – World IPv6 Day
2012 – DNA Data Storage
2014 – Data Breaches
2015 – Google Releases TensorFlow
~2050 -Hahahaha! – Artificial General Intelligence (AGI)
~9999 – The Limits of Computation?
- WP – Timeline of computing before 1950: https://en.wikipedia.org/wiki/Timeline_of_computing_hardware_before_1950
- WP – Timeline of computing 1950–1979 – https://en.wikipedia.org/wiki/Timeline_of_computing_1950%E2%80%931979
- WP – Timeline of computing 1980–1989 – https://en.wikipedia.org/wiki/Timeline_of_computing_1980%E2%80%931989
- WP – Timeline of computing 1990–1999 – https://en.wikipedia.org/wiki/Timeline_of_computing_1990%E2%80%931999
- WP – Timeline of computing 2000–2009: https://en.wikipedia.org/wiki/Timeline_of_computing_2000%E2%80%932009
- WP – Timeline of computing 2010–2019: https://en.wikipedia.org/wiki/Timeline_of_computing_2010%E2%80%932019
- WP – Timeline of computing 2020–Present: https://en.wikipedia.org/wiki/Timeline_of_computing_2020%E2%80%93present
Microsoft Glossary of Terms – Windows – Azure – Office365 – PowerShell – C# .NET
Microsoft Windows This glossary contains terms related to Microsoft software for operating systems, e-mail, collaboration, backup and recovery, server hardware, storage management, infrastructure security and server virtualization.” (TTG)
- Active Directory – “Active Directory (AD) is Microsoft’s proprietary directory service.” (TTG)
- Active Directory functional levels – “Active Directory functional levels are controls that specify which advanced Active Directory domain features can be used in an enterprise domain.” (TTG)
- ActiveX – “ActiveX is a set of object-oriented programming technologies Microsoft developed for Internet Explorer to facilitate rich media playback.” (TTG)
- ActiveX control – “An ActiveX control is a component program object that can be re-used by many application programs within a computer or among computers in a network.” (TTG)
- Azure Container Instances – “Azure Container Instances is a service that enables a developer to deploy containers on the Microsoft Azure public cloud without having to provision or manage any underlying infrastructure.” (TTG)
- Azure HDInsight – “Azure HDInsight is a cloud-based service from Microsoft for big data analytics that helps organizations process large amounts of streaming or historical data.” (TTG)
- Azure Kubernetes Service (AKS) – “Azure Kubernetes Service (AKS) is a managed container orchestration service, based on the open source Kubernetes system, which is available on the Microsoft Azure public cloud.” (TTG)
- Azure Migrate – “Azure Migrate is a Microsoft service that helps an enterprise assess how its on-premises workloads will perform, and how much they will cost to host, in the Azure public cloud.” (TTG)
- Azure Notification Hubs – “Azure Notification Hubs are push notification engines designed to update users with alerts about new content for a given site, service or app.” (TTG)
- Azure Quantum – “Azure Quantum is a full-stack cloud service designed to allow users remote access to quantum computers.” (TTG)
- Azure Reserved Virtual Machine Instances – “Azure Reserved Virtual Machine Instances (RIs) are a type of virtual machine (VM) on the Azure public cloud that a development or IT team can reserve to use in advance.” (TTG)
- Azure SQL Data Warehouse – “Azure SQL Data Warehouse is a managed Data Warehouse-as-a Service (DWaaS) offering provided by Microsoft Azure.” (TTG)
- chief storyteller – “A chief storyteller is an employee of an organization tasked with wording the company’s mission, history and messages about their brand, also known as their story, as they want it to be heard internally and externally.” (TTG)
- clean architecture – “Clean architecture is a software design philosophy that separates the elements of the design into ringed levels.” (TTG)
- compliance as a service (CaaS) – “Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (MSP) will help an organization meet its regulatory compliance mandates.” (TTG)
- data discovery platform – “A data discovery platform is a complete set of tools for the purpose of detecting patterns, and those outlier results outside of patterns, in data.” (TTG)
- Exchange Online – “Exchange Online is the hosted version of Microsoft’s Exchange Server messaging platform that organizations can obtain as a stand-alone service or via an Office 365 (Microsoft 365) subscription.” (TTG)
- Exchange Server 2013 Service Pack 1 (SP1) – “Exchange Server 2013 SP1 is a service pack for Exchange Server 2013 that includes a number of new and updated Exchange Server 2013 features and capabilities.” (TTG)
- Exchange staged migration – “The staged Exchange migration process transfers data and mailboxes from one Exchange server to another, either on-premises or in the cloud.” (TTG)
- Exchange transaction log – “In Microsoft Exchange, a transaction log is a file that contains a record of the changes that were made to an Exchange database.” (TTG)
- Group Policy Object (GPO) – “Microsoft’s Group Policy Object (GPO) is a collection of Group Policy settings that defines what a system will look like and how it will behave for a defined group of users.” (TTG)
- GWX (Get Windows 10) – “GWX (get Windows 10) is a Windows upgrade app that was initially installed after Windows update KB3035583; the app has been the subject of consumer complaints for manipulative design.” (TTG)
- In-Memory OLTP – “In-Memory OLTP is a Microsoft in-memory technology built into SQL Server and optimized for transaction processing applications.” (TTG)
- Internet Explorer (IE) – “Internet Explorer (IE) is a World Wide Web browser made by Microsoft for use on its Windows operating system.” (TTG)
- MAPI over HTTP (Messaging Application Programming Interface over HTTP) – “MAPI over HTTP is the default transport protocol to connect clients to Microsoft Exchange and Exchange Online.” (TTG)
- MCITP (Microsoft Certified IT Professional) – “An MCITP (Microsoft Certified IT Professional) is a credential that proves that an individual has a complete set of skills required to perform a particular IT job role, such as enterprise or virtualization administrator.” (TTG)
- MCSA (Microsoft Certified Solutions Associate) – “MCSA (Microsoft Certified Solutions Associate) is a certification program intended for people who seek entry-level jobs in an information technology (IT) environment.” (TTG)
- MCSE Private Cloud (Microsoft Certified Solutions Expert Private Cloud) – “Microsoft Certified Solutions Expert (MCSE) Private Cloud is a new Microsoft certification covering Windows 2012 Hyper-V and System Center 2012, as well as applications such as SharePoint and Exchange.” (TTG)
- Microsoft – “Microsoft is a leading global vendor of computer software; hardware for computer, mobile and gaming systems; and cloud services.” (TTG)
- Microsoft Active Directory Migration Tool (ADMT) – “The Microsoft Active Directory Migration Tool (ADMT) is a tool used to move Active Directory objects from one Windows Server Active Directory domain or forest to another.” (TTG)
- Microsoft Active Directory Rights Management Services (AD Rights Management Services) – “Active Directory Rights Management Services (AD RMS) is a security tool that provides a safeguard to prevent unauthorized access to data.” (TTG)
- Microsoft Antigen – “Microsoft Antigen is a set of programs that provides security and e-mail filtering for network servers.” (TTG)
- Microsoft Antimalware for Azure – “Microsoft Antimalware for Azure is a security extension in Microsoft Azure that extends antimalware protection to virtual machines and to cloud services.” (TTG)
- Microsoft App-V (Microsoft Application Virtualization) – “Microsoft App-V is a tool IT administrators can use to virtualize and stream applications to users from a centrally managed location.” (TTG)
- Microsoft AppSource – “Microsoft AppSource is an app store for business applications such as Office 365 (Microsoft 365), Dynamics 365, Power BI or separate Azure web apps.” (TTG)
- Microsoft Assessment and Planning (MAP) Toolkit – “Microsoft Assessment and Planning (MAP) Toolkit is a free utility IT can use to determine whether or not its infrastructure is prepared for a migration to a new operating system, server version or cloud-based deployment.” (TTG)
- Microsoft AzMan (Microsoft Authorization Manager) – “Microsoft AzMan (Authorization Manager) is a role-based access and security framework.” (TTG)
- Microsoft Azure – “Microsoft Azure, formerly known as Windows Azure, is Microsoft’s public cloud computing platform.” (TTG)
- Microsoft Azure Active Directory Authentication Library (ADAL) for Microsoft SQL Server – “Microsoft Azure Active Directory Authentication Library (ADAL) enables applications to authenticate to Microsoft Azure SQL Database using Azure Active Directory.” (https://microsoft.com/en-us/download/details.aspx?id=48742)
- Microsoft Azure Active Directory Connect (Microsoft Azure AD Connect) – “Microsoft Azure Active Directory Connect (Microsoft Azure AD Connect) is a tool for connecting on-premises identity infrastructure to Microsoft Azure Active Directory.” (TTG)
- Microsoft Azure Cosmos DB – “Azure Cosmos DB is a Microsoft cloud database that supports multiple ways of storing and processing data.” (TTG)
- Microsoft Azure Data Lake – “Microsoft Azure Data Lake is a highly scalable public cloud service that allows developers, scientists, business professionals and other Microsoft customers to gain insight from large, complex data sets.” (TTG)
- Microsoft Azure File Service – “Microsoft Azure File Service is a service that allows Windows Server admins to access SMB shares in the Azure cloud by setting up file shares in the Azure management console.” (TTG)
- Microsoft Azure Functions – “Azure Functions is the serverless computing service hosted on the Microsoft Azure public cloud.” (TTG)
- Microsoft Azure Key Vault – “Microsoft Azure Key Vault is a cloud-hosted management service that allows users to encrypt keys and small secrets like passwords or answers to security questions that are used in their cloud applications and services.” (TTG)
- Microsoft Azure Marketplace – “Microsoft Azure Marketplace is an online store that provides tools and applications that are compatible with the Azure public cloud.” (TTG)
- Microsoft Azure Operational Insights – “Microsoft Azure Operational Insights (AOI) is a cloud-hosted Software as a Service tool that allows an IT operations staff to collect and search data from multiple machines for analysis.” (TTG)
- Microsoft Azure Premium Storage – “Microsoft Azure Premium Storage is solid-state drive storage for Azure virtual machines for workloads that require low latency and high throughput.” (TTG)
- Microsoft Azure RemoteApp (Remote Application Services) – “Microsoft Azure RemoteApp (Remote Application Services) is a program that allows organizations to make remotely accessed programs or applications in Microsoft Azure, known as RemoteApp programs, appear as if they are native to end users’ local computers.” (TTG)
- Microsoft Azure Resource Manager – “Microsoft Azure Resource Manager (ARM) is a management framework that allows administrators to deploy, manage and monitor Azure resources.” (TTG)
- Microsoft Azure Security Center – “Microsoft Azure Security Center is a set of tools and services for securing virtual machines that run on the Azure public cloud.” (TTG)
- Microsoft Azure Site Recovery – “Microsoft Azure Site Recovery is a new service in Microsoft Azure primarily used for disaster recovery purposes.” (TTG)
- Microsoft Azure Stack – “Microsoft Azure Stack is an integrated platform of hardware and software that delivers Microsoft Azure public cloud services in a local data center to let organizations construct hybrid clouds.” (TTG)
- Microsoft Azure VM Scale Sets – “A Microsoft Azure VM Scale Set is a group of individual virtual machines (VMs) within the Microsoft Azure public cloud that IT administrators can configure and manage as a single unit.” (TTG)
- Microsoft Certified Solution Developer (MCSD) – “An MCSD (Microsoft Certified Solution Developer) is someone who has passed exams that test their ability to design and develop custom business applications with Microsoft development tools, technologies, and platform.” (TTG)
- Microsoft Click-To-Run – “Microsoft Click-to-Run is a way to quickly install Microsoft products, including versions of Office 2010 and Office 2013.” (TTG)
- Microsoft Client Hyper-V – “Microsoft Client Hyper-V is a type-1 hypervisor for the Windows 8.” (TTG)
- Microsoft Cloud Hybrid Search Service Application – “Microsoft Cloud Hybrid Search Service Application is a hybrid enterprise search capability that enables organizations to search both on-premises and cloud-based data repositories without generated siloed results.” (TTG)
- Microsoft Cloud Security Readiness Tool (CSRT) – “The Microsoft Cloud Security Readiness Tool (CSRT) is a survey that assesses the systems, processes and productivity of an IT environment in preparation for the adoption and secure use of cloud computing services.” (TTG)
- Microsoft Cloud Witness – “Microsoft Cloud Witness is a high availability feature for failover clusters that uses storage in the Microsoft Azure cloud platform to ensure clusters continue to function if there is a site outage.” (TTG)
- Microsoft Cluster Operating System (OS) Rolling Upgrade – “Microsoft Cluster Operating System (OS) Rolling Upgrade is a feature that keeps Hyper-V virtual machines (VMs) or Scale-Out File Server workloads running during an upgrade from a Windows Server 2012 R2 cluster to a Windows Server 2016 cluster.” (TTG)
- Microsoft Cluster Server (MSCS) Generic Application – “Generic Application is a Microsoft Cluster Server (MSCS) resource type responsible for managing cluster-unaware applications.” (TTG)
- Microsoft Cluster Server (MSCS) Generic Script – “Generic Script is a Microsoft Cluster Server (MSCS) resource type in a server cluster or failover cluster that supports an application controlled by a script that runs in Windows Script Host (WSH).” (TTG)
- Microsoft Cluster Service (MSCS) – “Microsoft Cluster Service (MSCS) is a service that provides high availability (HA) for applications such as databases, messaging and file and print services.” (TTG)
- Microsoft Connectivity Analyzer (MCA) – “The Microsoft Connectivity Analyzer (MCA) is a diagnostics tool for troubleshooting and testing connectivity to several Microsoft messaging products from a client machine on an organization’s network.” (TTG)
- Microsoft Cortana – “Cortana, Microsoft’s virtual assistant, debuted in Windows Phone 8.” (TTG)
- Microsoft CPS (Microsoft Cloud Platform System) – “Microsoft CPS (Microsoft Cloud Platform System) is a software stack of Window Server 2012 R2, System Center 2012 R2, and Windows Azure Pack that runs on Dell servers.” (TTG)
- Microsoft DirectAccess Connectivity Assistant (Microsoft DCA) – “Microsoft DirectAccess Connectivity Assistant (Microsoft DCA) is a tool administrators use to improve an enterprise’s DirectAccess connection.” (TTG)
- Microsoft Dynamic Access Control (DAC) – “Microsoft Dynamic Access Control (DAC) is a data governance tool in Windows Server 2012 that lets admins control the permission of access settings in an organization.” (TTG)
- Microsoft Dynamics 365 – “Microsoft Dynamics 365 is a cloud-based business applications platform that combines components of customer relationship management (CRM) and enterprise resource planning (ERP), along with productivity applications and artificial intelligence tools.” (TTG)
- Microsoft Dynamics AX (Microsoft Axapta) – “Microsoft Dynamics AX is a multi-language, multi-currency, industry-specific global enterprise resource planning (ERP) software product.” (TTG)
- Microsoft Edge – “Microsoft Edge is the browser for Windows 10; Edge replaces Internet Explorer, the browser that debuted with Windows 95 and was a part of Windows operating systems for the following two decades.” (TTG)
- Microsoft Edge Web Notes – “Microsoft Edge Web Notes is a feature in Microsoft’s Edge browser that lets users draw, highlight or type directly on webpages and web apps.” (TTG)
- Microsoft Enhanced Mitigation Experience Toolkit (EMET) – “Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) is a free Windows-based security tool that adds supplemental security defenses to defend potentially vulnerable legacy and third-party applications.” (TTG)
- Microsoft Exchange 2010 Mailbox Server Role Requirements Calculator – “The Microsoft Exchange 2010 Mailbox Server Role Requirements Calculator is a free, downloadable tool from Microsoft that helps Exchange 2010 administrators design their mailbox server role so that it is optimized for their specific deployment.” (TTG)
- Microsoft Exchange 2013 Managed Store – “The Microsoft Exchange 2013 Managed Store is a mechanism used in Exchange Server 2013 to isolate failures at the database level.” (TTG)
- Microsoft Exchange 2013 Poison Message Queue – “Microsoft Exchange 2013 Poison Message Queue is a queue that exists specifically to hold messages deemed harmful to the deployment after a transport server or service failure.” (TTG)
- Microsoft Exchange 2013 Safety Net – “The Microsoft Exchange 2013 Safety Net is a feature new in Exchange Server 2013 that helps reduce data loss through delivery of copied email messages.” (TTG)
- Microsoft Exchange 2013 site mailbox – “A Microsoft Exchange 2013 site mailbox is an Exchange 2013 feature that helps facilitate collaboration between SharePoint 2013 users.” (TTG)
- Microsoft Exchange ActiveSync – “Microsoft Exchange ActiveSync is a synchronization protocol that enables users of mobile devices to access email, calendar, contacts, and tasks from their organization’s Microsoft Exchange server.” (TTG)
- Microsoft Exchange Address Book Policy (ABP) – “A Microsoft Exchange Address Book Policy is a feature that allows administrators to segment Exchange Global Address Lists in order to give users specified views of other users’ email addresses in their Exchange organization.” (TTG)
- Microsoft Exchange Fast Access – “Microsoft Exchange Fast Access is a new feature in Microsoft Outlook 2013 that helps improve the email client’s startup synchronization time.” (TTG)
- Microsoft Exchange Global Address List (GAL) – “The Microsoft Exchange Global Address List is a list of all users and their respective email addresses within an Exchange Server organization that uses Microsoft Outlook for email.” (TTG)
- Microsoft Exchange In-Place eDiscovery – “Microsoft Exchange In-Place eDiscovery is an administrative feature to perform legal discovery searches for relevant content in mailboxes.” (TTG)
- Microsoft Exchange Information Store – “Microsoft Exchange Information Store is a storage platform that is used to manage numerous types of information within an Exchange Server deployment.” (TTG)
- Microsoft Exchange Mailbox Replication Service (MRS) – “The Microsoft Exchange Mailbox Replication Service (MRS) is a feature that handles mailbox import, export, migration and restoration requests on Exchange Server.” (TTG)
- Microsoft Exchange Management Shell (EMS) – “Microsoft Exchange Management Shell (EMS) is a scripting platform that enables administrators to manage Exchange Server.” (TTG)
- Microsoft Exchange Online Protection (EOP) – “Microsoft Exchange Online Protection (EOP) is an email cloud service that provides end users with protection against spam and malware.” (TTG)
- Microsoft Exchange RBAC (Role Based Access Control) – “Microsoft Exchange RBAC is a permissions model used in Exchange Server 2010 and Exchange Server 2013.” (TTG)
- Microsoft Exchange Server – “Microsoft Exchange Server is Microsoft’s email, calendaring, contact, scheduling and collaboration platform.” (TTG)
- Microsoft Exchange Server 2010 – “Exchange Server 2010 is the version of Microsoft’s messaging platform that replaced Exchange Server 2007.” (TTG)
- Microsoft Exchange Server 2013 – “Exchange Server 2013 is an iteration of Microsoft’s Exchange server.” (TTG)
- Microsoft Exchange Server 2013 Managed Availability – “Microsoft Exchange Server 2013 Managed Availability is a built-in monitoring and recovery platform in Exchange 2013.” (TTG)
- Microsoft Exchange Server 2016 – “Microsoft Exchange Server 2016 is the latest iteration of the Exchange Server messaging platform.” (TTG)
- Microsoft Exchange Server ActiveSync Web Administration Tool – “The Microsoft Exchange Server ActiveSync Web Administration Tool is a software application that provides a network administrator with a Web interface for mobile device management.” (TTG)
- Microsoft Exchange Server Jetstress – “Microsoft Exchange Server Jetstress is a tool that administrators can use to validate their Exchange Server storage configuration.” (TTG)
- Microsoft Exchange Server Profile Analyzer (EPA) – “The Microsoft Exchange Server Profile Analyzer (EPA) is a Web-based tool that allows an administrator to gather data about a specific Exchange mailbox store or entire Exchange Server organization.” (TTG)
- Microsoft Exchange System Attendant (SA) – “Microsoft Exchange System Attendant service is software that proxies Active Directory requests and regulates internal Exchange Server functions.” (TTG)
- Microsoft Failover Cluster Manager (MSFCM) – “Microsoft Failover Cluster Manager (MSFCM) is a specific management function within the Windows Server operating system which is used to create, validate, and manage failover server clusters running Windows Server.” (TTG)
- Microsoft FAST Search – “Microsoft FAST Search is the search engine for Microsoft’s SharePoint collaboration platform.” (TTG)
- Microsoft FIM (Microsoft Forefront Identity Manager) – “Microsoft Forefront Identity Manager (FIM) is a self-service identity management software suite.” (TTG)
- Microsoft Flow – “Microsoft Flow, now called Power Automate, is cloud-based software that allows employees to create and automate workflows and tasks across multiple applications and services without help from developers.” (TTG)
- Microsoft Forefront Unified Access Gateway (Microsoft Forefront UAG) – “Microsoft Forefront Unified Access Gateway (Forefront UAG) is a tool that can provide a secure remote access option for remote end users who want to access corporate resources on PCs as well as on mobile devices.” (TTG)
- Microsoft Group Policy administrative template – “A Microsoft Group Policy administrative template is a file that supports the implementation of Microsoft Windows Group Policy and centralized user and machine management in Active Directory environments.” (TTG)
- Microsoft HealthVault – “Microsoft HealthVault, which launched in October 2007, is a free personal health record (PHR) service offered by Microsoft that allows individuals to store personal health and fitness information in a central location.” (TTG)
- Microsoft HoloLens – “Microsoft HoloLens is a virtual reality (VR) headset with transparent lenses for an augmented reality experience.” (TTG)
- Microsoft Hybrid Configuration Wizard – “The Microsoft Hybrid Configuration wizard is a tool in Exchange Server 2013 that provides a method for admins to create and configure hybrid deployments.” (TTG)
- Microsoft Hyper-V Best Practices Analyzer – “Microsoft Hyper-V Best Practices Analyzer is a server management tool that scans server configurations and generates a report that identifies best practice violations.” (TTG)
- Microsoft Hyper-V Shielded VM – “A Microsoft Hyper-V Shielded VM is a security feature of Windows Server 2016 that protects a Hyper-V second-generation virtual machine (VM) from access or tampering by using a combination of Secure Boot, BitLocker encryption, virtual Trusted Platform Module (TPM) and the Host Guardian Service.” (TTG)
- Microsoft Hyper-V version 1.0 – “Hyper-V is Microsoft’s server virtualization software for Microsoft Server 2008.” (TTG)
- Microsoft Identity Manager 2016 – “Microsoft Identity Manager 2016 is a tool that allows organizations to manage access, users, policies and credentials.” (TTG)
- Microsoft Intune – “Microsoft Intune is a cloud-based enterprise mobility management tool that aims to help organizations manage the mobile devices employees use to access corporate data and applications, such as email.” (TTG)
- Microsoft iSCSI Initiator – “Microsoft iSCSI Initiator is a tool that connects external iSCSI-based storage to host computers with an Ethernet network adapter.” (TTG)
- Microsoft Log Parser Studio – “Microsoft Log Parser Studio is a front-end utility that features a graphical user interface, report builder and query repository for Microsoft’s Log Parser application.”
- Microsoft Managed Desktop (MMD) – “Microsoft Managed Desktop (MMD) is a subscription-based desktop as a service (DaaS) cloud platform that includes Windows 10 Enterprise, Office 365 (Microsoft 365), Enterprise Mobility and Security on select Windows PCs and Windows 10-enabled devices.” (TTG)
- Microsoft Management Console (MMC) – “The Microsoft Management Console (MMC) is an application that provides a graphical-user interface (GUI) and a programming framework in which consoles (collections of administrative tools) can be created, saved, and opened.” (TTG)
- Microsoft Nano Server – “Microsoft Nano Server is a lightweight operating system based on Microsoft Windows Server 2016 that is tailored for use as an OS layer for virtualized container instances.” (TTG)
- Microsoft Network Access Protection (NAP) – “Network access protection (NAP), introduced with Windows Server 2008, is Microsoft’s approach to controlling access to a network based on a determination of each device’s health.” (TTG)
- Microsoft Network Device Enrollment Service (NDES) – “Microsoft Network Device Enrollment Service (NDES) is a security feature in Windows Server 2008 R2 and later Windows Server operating versions.” (TTG)
- Microsoft Network Policy and Access Services (Microsoft NPAS) – “Microsoft Network Policy and Access Services (Microsoft NPAS) is a server role in Windows 2008 and Windows Server 2012 that allows administrators to provide local and remote network access.” (TTG)
- Microsoft Office 2013 (MS Office 2013) – Microsoft Office 2013 is a suite of office productivity applications used in homes and businesses of all sizes.” (TTG)
- Microsoft Office 365 Admin Center – “The Microsoft Office 365 Admin Center is the web-based portal administrators use to manage user accounts and configuration settings for the Office 365 subscription services, including Exchange Online and SharePoint Online.” (TTG)
- Microsoft Office 365 admin roles – “Microsoft Office 365 admin roles give users authorization to perform certain tasks in the Office 365 admin center.” (TTG)
- Microsoft Office 365 Advanced Threat Protection – “Microsoft Office 365 Advanced Threat Protection (ATP) is Microsoft’s optional cloud-based service that scans and filters email to protect subscribers from malware in attachments and hyperlinks to malicious websites.” (TTG)
- Microsoft Office 365 Groups – “Microsoft Office 365 Groups is a cloud collaboration feature for communication, coordinating group efforts and exchanging information.” (TTG)
- Microsoft Office 365 suite – “Microsoft Office 365 suite (now called Microsoft 365) is a hosted, online version of Microsoft Office software.” (TTG)
- Microsoft Office Delve – “Microsoft Delve is a discovery and collaboration tool within Office 365 (Microsoft 365) that uses machine learning to help users work more efficiently.” (TTG)
- Microsoft Office for iPad – “Microsoft Office for iPad is an app that allows users to use Microsoft Office on an Apple iPad.” (TTG)
“DevOps is the buzzword these days in both software and business circles. Why? Because it has revolutionized the way modern businesses do business and, in the process, achieved milestones that weren’t possible before.” On this site, “you’ll learn what DevOps is, how it evolved, how your business can benefit from implementing it, and success stories of some of the world’s biggest and most popular companies that have embraced DevOps as part of their business.” (DMH)
“DevOps – or Development and Operations – is a term used in enterprise software development that refers to a kind of agile relationship between information technologies (IT) operations and development. The primary objective of DevOps is to optimize this relationship through fostering better collaboration and communication between development and IT operations. In particular, it seeks to integrate and activate important modifications into an enterprise’s production processes as well as to strictly monitor problems and issues as they occur so these can be addressed as soon as possible without having to disrupt other aspects of the enterprise’s operations. By doing so, DevOps can help enterprises register faster turnaround times, increase frequency of deployment of crucial new software or programs, achieve faster average recovery times, increase success rate for newly released programs, and minimize the lead time needed in between modifications or fixes to programs.” (DMH)
“DevOps is crucial for the success of any enterprise because, by nature, enterprises need to segregate business units as individually operating entities for a more efficient system of operations. However, part of such segregation is the tendency to tightly control and guard access to information, processes and management. And this can be a challenge, particularly for the IT operations unit that needs access to key information from all business units in order to provide the best IT service possible for the whole enterprise. Simply put, part of the challenge in segregating business units into individually operating ones that are independent of each other is the relatively slow flow of information to and from such units because of bureaucracy.” (DMH)
“Moving towards an organizational culture based on DevOps – one where the enterprise’s operations units and IT developers are considered as “partners” instead of unrelated units – is an effective way to break down the barriers between them. This is because an enterprise whose culture is based on DevOps is one that can help IT personnel provide organization with the best possible software with the least risk for glitches, hitches, or problems. Therefore, a DevOps-based organizational culture is one that can foster an environment where segregated business units can remain independent but, at the same time, work very well with others in order to optimize the organization’s efficiency and productivity.” (DMH)
A Dictionary of Computer Science (Oxford Quick Reference) 7th Edition, by Editors Andrew Butterfield, Gerard Ngondi, Anne Kerr
Previously named A Dictionary of Computing, this bestselling dictionary has been renamed A Dictionary of Computer Science, and fully revised by a team of computer specialists, making it the most up-to-date and authoritative guide to computing available. Containing over 6,500 entries and with expanded coverage of multimedia, computer applications, networking, and personal computer science, it is a comprehensive reference work encompassing all aspects of the subject and is as valuable for home and office users as it is indispensable for students of computer science.
Terms are defined in a jargon-free and concise manner with helpful examples where relevant. The dictionary contains approximately 150 new entries including cloud computing, cross-site scripting, iPad, semantic attack, smartphone, and virtual learning environment. Recommended web links for many entries, accessible via the Dictionary of Computer Science companion website, provide valuable further information and the appendices include useful resources such as generic domain names, file extensions, and the Greek alphabet.
This dictionary is suitable for anyone who uses computers, and is ideal for students of computer science and the related fields of IT, maths, physics, media communications, electronic engineering, and natural sciences.
- ASIN : B019GXM8X8
- Publisher : OUP Oxford; 7th edition (January 28, 2016)
- Publication date : January 28, 2016
- Print length : 641 pages
- First edition 1983, Second edition 1986, Third edition 1990, Fourth edition 1996, Fifth edition 2004, Sixth edition 2008, Seventh edition 2016
- ISBN 978–0–19–968897–5, ebook ISBN 978–0–19–100288–5
“The first edition of this dictionary was published in 1983 as a specialist reference work for computer professionals and for people interested in the underlying concepts and theories of computer science. Over successive editions, the work has been expanded and changed to reflect the technological and social changes that have occurred, especially the enormous growth in home computing and the Internet. In particular, the fourth edition (1996) included an additional 1700 entries catering for a wider readership. At the same time, the editors have retained the basic principles of the original book.”
“In the seventh edition of the dictionary we have followed the same line. The existing entries have been updated and over 120 new entries have been added. In particular, coverage of areas such as database management and social networking has been increased to reflect the growing importance of these areas. Some obsolete terms have been deleted, although some have been kept for their historical interest. Links to useful websites have been updated and more added. There are also six special feature spreads, giving information on selected topics.”
JL, ASK, 2015
Guide to the Dictionary
“Synonyms and generally used abbreviations are given either in brackets immediately after the relevant entry title, or occasionally in the text of the entry with some additional information or qualification.”
“A distinction is made between an acronym and an abbreviation: an acronym can be pronounced while an abbreviation cannot. The entry for an acronym usually appears at the acronym itself, whereas the entry for an abbreviation may appear either at the unabbreviated form or at the abbreviation—depending on which form is most commonly used. When a term is defined under an abbreviation, the entry for the unabbreviated form simply cross-refers the reader to the abbreviation.”
“Some terms listed in the dictionary are used both as nouns and verbs. This is usually indicated in the text of an entry if both forms are in common use. In many cases a noun is also used in an adjectival form to qualify another noun. This occurs too often to be noted.”
Alexander, Charles C. Holding the Line: The Eisenhower Era, 1952–1961. Bloomington: Indiana University Press, 1975.
Baran, Paul.“Packet Switching.” In Fundamentals of Digital Switching. 2d ed. Edited by John C. McDonald. New York: Plenum Press, 1990.
Barry, John A. Technobabble. Cambridge: MIT Press, 1991.
Bell, C. Gordon, Alan Kotok, Thomas N. Hastings, and Richard Hill. “The Evolution of the DEC System-10.” In Computer Engineering: A DEC View of Hardware Systems Design. Edited by C. Gordon Bell, J. Craig Mudge, and John E. McNamara. Bedford, Mass.: Digital Equipment Corporation, 1978.
Bell, C. Gordon, Gerald Butler, Robert Gray, John E. McNamara, Donald Vonada, and Ronald Wilson. “The PDP-1 and Other 18-Bit Computers.” In Computer Engineering: A DEC View of Hardware Systems Design. Edited by C. Gordon Bell, J. Craig Mudge, and John E. McNamara. Bedford, Mass.: Digital Equipment Corporation, 1978.
Bergaust, Erik. Wernher von Braun. Washington, D.C.: National Space Institute, 1976.
Blanc, Robert P., and Ira W. Cotton, eds. Computer Networking. New York: IEEE Press, 1976.
Brendon, Piers. Ike: His Life and Times. New York: Harper & Row, 1986.
Brooks, John. Telephone: The First HundredYears. New York: Harper & Row, 1976.
Brucker, Roger W., and Richard A. Watson. The Longest Cave. New York: Alfred A. Knopf, 1976.
Clarke, Arthur C., et al. The Telephone’s First Century—And Beyond: Essays on the Occasion of the 100th Anniversary of Telephone Communication. New York: Thomas Y. Crowell Company, 1977
Computer Science, Numerical Analysis and Computing. National Physical Laboratory, Engineering Sciences Group, Research 1971. London: Her Majesty’s Stationery Office, 1972.
Froehlich, Fritz E., Allen Kent, and Carolyn M. Hall, eds. “ARPANET, the Defense Data Network, and Internet.” In The Froehlich/Kent Encyclopedia of Telecommunications. New York: Marcel Dekker, Inc., 1991.
Goldstein, Jack S. A Different Sort of Time: The Life of Jerrold R. Zacharias. Cambridge MIT Press, 1992.
Halberstam, David. The Fifties. New York:Villard Books, 1993.
Hall, Mark, and John Barry. Sunburst: The Ascent of Sun Microsystems. Chicago: Contemporary Books, 1990.
Hammond, William M. Public Affairs: The Military and the Media, 1962–1968. Washington, D.C.: Center of Military History, U.S. Army, Superintendent of Documents, U.S. Government Printing Office, 1968.
Hamner, W. Clay. “The United States Postal Service: Will It Be Ready for the Year 2000?” In The Future of the Postal Service. Edited by Joel L. Fleishman. New York: Praeger, 1983.
Holzmann, Gerard J., and Björn Pehrson. The Early History of Data Network. Los Alamitos, Calif.: IEEE Computer Society Press, 1995.
Kidder, Tracy. The Soul of a New Machine. Boston: Little, Brown, 1981.
Killian, James R., Jr. Sputnik, Scientists, and Eisenhower: A Memoir of the First Special Assistant to the President for Science and Technology. Cambridge: MIT Press, 1977.
———. The Education of a College President: A Memoir. Cambridge: MIT Press, 1985.
Kleinrock, Leonard. Communication Nets: Stochastic Message Flow and Delay. New York: McGraw-Hill, 1964.
———. Queueing Systems. 2 vols. New York: John Wiley & Sons, 1974–1976.
Langdon-Davies, John. NPL: Jubilee Book of the National Physical Laboratory. London: His Majesty’s Stationery Office, 1951.
Lebow, Irwin. Information Highways & Byways: From the Telegraph to the 21st Century. New York: IEEE Press, 1995.
Licklider, J. C. R. “Computers and Government.” In The Computer Age: A Twenty-Year View, edited by Michael L. Dertouzos and Joel Moses. MIT Bicentennial Series. Cambridge: MIT Press, 1979.
———. Libraries of the Future. Cambridge: MIT Press, 1965.
Padlipsky, M. A. The Elements of Networking Style and Other Essays & Animadversions of the Art of Intercomputer Networking. Englewood Cliffs, N.J.: Prentice-Hall, Inc., 1985.
Proceedings of the Fifth Data Communications Symposium. IEEE Computer Society, Snowbird, Utah, September 27–29, 1977.
Pyatt, Edward. The National Physical Laboratory: A History. Bristol, England: Adam Hilger Ltd., 1983.
Redmond, Kent C., and Thomas M. Smith. The Whirlwind Project: The History of a Pioneer Computer. Bedford, Mass.: Digital Press, 1980.
Rheingold, Howard. The Virtual Community. New York: Harper Perennial, 1994.
———. Tools for Thought: The People and Ideas Behind the Next Computer Revolution. New York: Simon & Schuster, 1988.
Roberts, Lawrence G. “The ARPANET and Computer Networks.” In A History of Personal Workstations, edited by Adele Goldberg. Reading, Mass.: ACM Press (Addison-Wesley), 1988.
Rose, Marshall T. The Internet Message: Closing the Book with Electronic Mail. Englewood Cliffs, N.J.: PTR Prentice Hall, 1993.
Sherman, Kenneth. Data Communications: A User’s Guide. Reston,Virginia: Reston Publishing Company, 1981.
Smith, Douglas K., and Robert C. Alexander. Fumbling the Future: How Xerox Invented, then Ignored, the First Personal Computer. New York: William Morrow, 1988.
Udall, Stewart L. The Myths of August: A Personal Exploration of Our Tragic Cold War Affair with the Atom. New York: Pantheon, 1994.
Wildes, Karl L., and Nilo A. Lindgren. A Century of Electrical Engineering and Computer Science at MIT, 1882–1982. Cambridge, Mass.: MIT Press, 1985.
Winner, Langdon. The Whale and the Reactor: A Search for Limits in an Age of High Technology. Chicago: University of Chicago Press, 1986.Edit
Journal, Magazine, and Newspaper Articles
Abramson, Norman. “Development of the Alohanet.” IEEE Transactions on Information Theory, January 1985.
Anderson, Christopher. “The Accidental Superhighway.” The Economist, 1 July 1995.
Baran, Paul. “On Distributed Communications Networks.” IEEE Transactions on Communications Systems, 1 March 1964.
———.“Reliable Digital Communications Systems Using Unreliable Network Repeater Nodes.” RAND Corporation Mathematics Division Report No. P-1995, 27 May 1960.
Boggs, David R., John F. Shoch, Edward A. Taft, and Robert M. Metcalfe. “PUP: An Internetwork Architecture.” IEEE Transactions on Communications, April 1980.
“Bolt Beranek Accused by Government of Contract Overcharges.” Dow Jones News Service–Wall Street Journal combined stories, 27 October 1980.
“Bolt Beranek and Newman: Two Aides Plead Guilty to U.S. Charge.” Dow Jones News Service–Wall Street Journal combined stories, 12 November 1980.
“Bolt Beranek, Aides Accused of Cheating U.S. on Several Jobs.” The Wall Street Journal, 28 October 1980.
Bulkeley, William M. “Can He Turn Big Ideas into Big Sales?” The Wall Street Journal, 12 September 1994.
Bush,Vannevar. “As We May Think.” Atlantic Monthly, July 1945.
Campbell-Kelly, Martin. “Data Communications at the National Physical Laboratory: 1965–1975.” Annals of the History of Computing 9, no. 3/4, 1988.
Cerf,Vinton G., and Peter T. Kirstein. “Issues in Packet-Network Interconnection.” Proceedings of the IEEE, November 1979.
Cerf, Vinton G., and Robert E. Kahn. “A Protocol for Packet-Network Intercommunication.” IEEE Transactions on Communications, May 1974.
Cerf, Vinton. “PARRY Encounters the Doctor: Conversation Between a Simulated Paranoid and a Simulated Psychiatrist.” Datamation, July 1973.
Clark, David D. “The Design Philosophy of the DARPA Internet Protocols.” Proceedings of the Association for Computing Machinery Sigcomm Symposium on Data Communications, August 1988.
Clark, David D., Kenneth T. Pogran, and David P. Reed. “An Introduction to Local Area Networks.” Proceedings of the IEEE, November 1979.
Comer, Douglas. “The Computer Science Research Network CSNET: A History and Status Report.” Communications of the ACM, October 1983.
Crowther, W. R., F. E. Heart, A. A. McKenzie, J. M. McQuillan, and D. C. Walden.“Issues in Packet Switching Networking Design.” Proceedings of the 1975 National Computer Conference, 1975.
Denning, Peter J. “The Science of Computing: The ARPANET After Twenty Years.” American Scientist, November-December 1989.
Denning, Peter J., Anthony Hearn, and C. William Kern. “History and Overview of CSNET. “Proceedings of the Association for Computing Machinery Sigcomm Symposium on Data Communications, March 1983.
“Dr. J. C. R. Licklider Receives Biennial Award at State College Meeting.” The Journal of the Acoustical Society of America, November 1950.
Engelbart, Douglas C. “Coordinated Information Services for a Discipline-or Mission-Oriented Community.” Proceedings of the Second Annual Computer Communications Conference, January 1972.
———. “Intellectual Implications of Multi-Access Computer Networks.” Proceedings of the Interdisciplinary Conference on Multi-Access Computer Networks, Austin, Texas, April 1970.
Ericson, Raymond. “Philharmonic Hall Acoustics Start Rumors Flying.” The NewYork Times, 4 December 1962.
Finucane, Martin. “Creators of the Internet Forerunner Gather in Boston.” Reading (Mass.) Daily Times Herald, 12 September 1994.
Fisher, Sharon. “The Largest Computer Network: Internet Links UNIX Computers Worldwide.” InfoWorld, 25 April 1988.
Hines, William. “Mail.” Chicago Sun-Times, 29 March 1978.
Haughney, Joseph F. “Anatomy of a Packet-Switching Overhaul.” Data Communications, June 1982.
Holusha, John. “Computer Tied Carter, Mondale Campaigns: The Bethesda Connection.” Washington Star, 21 November 1976.
Jacobs, Irwin M., Richard Binder, and EstilV. Hoversten. “General Purpose Packet Satellite Networks.” Proceedings of the IEEE, November 1978.
Jennings, Dennis M., Lawrence H. Landweber, Ira H. Fuchs, David J. Farber, and W. Richards Adrion. “Computer Networking for Scientists.” Science, 22 February 1986.
Kahn, Robert E. “The Role of Government in the Evolution of the Internet.” Communications of the ACM, August 1994.
Kahn, Robert E., Steven A. Gronemeyer, Jerry Burchfiel, and Ronald C. Kunzelman. “Advances in Packet Radio Technology.” Proceedings of the IEEE, November 1978.
Kantrowitz, Barbara, and Adam Rogers. “The Birth of the Internet.” Newsweek, 8 August 1994.
Kleinrock, Leonard. “Principles and Lessons in Packet Communications.” Proceedings of the IEEE, November 1978.
Landweber, Lawrence H., Dennis M. Jennings, and Ira Fuchs. “Research Computer Networks and Their Interconnection.” IEEE Communications Magazine, June 1986.
Lee, J. A. N., and Robert F. Rosin.“The CTSS Interviews.” IEEE Annals of the History of Computing 14, no. 1, 1992.
———.“The Project MAC Interviews.” IEEE Annals of the History of Computing 14, no. 2, 1992.
Licklider, J. C. R. “A Gridless, Wireless Rat-Shocker.” Journal of Comparative and Physiological Psychology 44, 1951.
———. “Man-Computer Symbiosis.” Reprint. In Memoriam: J. C. R. Licklider. Digital Equipment Corporation Systems Research Center, 7 August 1990.
Licklider, J. C. R., and Albert Vezza. “Applications of Information Networks.” Proceedings of the IEEE, November 1978.
Licklider, J. C. R., and Robert W. Taylor. “The Computer as a Communication Device.” Reprint. In Memoriam: J. C. R. Licklider. Digital Equipment Corporation Systems Research Center, 7 August 1990.
Markoff, John. “Up from the Computer Underground.” The NewYork Times, 27 August 1993.
McKenzie, Alexander A., and B. P. Cosell, J. M. McQuillan, M. J. Thrope. “The Network Control Center for the ARPA Network.” Proceedings of the IEEE, 1972.
Mier, Edwin E. “Defense Department Readying Network Ramparts.” Data Communications, October 1983.
Mills, Jeffrey. “Electronic Mail.” Associated Press, 4 January 1976.
———.“Electronic Mail.” Associated Press, 19 June 1976.
———. “Postal Service Tests Electronic Message Service.” Associated Press, 28 March 1978.
Mills, Kay.“The Public Concern: Mail.” Newhouse News Service, 27 July 1976.
Mohl, Bruce A. “2 Bolt, Beranek Officials Collapse in Federal Court.” The Boston Globe, 31 October 1980.
Pallesen, Gayle. “Consultant Firm on PBIA Faces Criminal Charges.” Palm Beach (Florida) Post, 8 November 1980.
Pearse, Ben. “Defense Chief in the Sputnik Age.” The NewYork Times Magazine, 10 November 1957.
Pool, Bob. “Inventing the Future: UCLA Scientist Who Helped Create Internet Isn’t Done Yet.” Los Angeles Times, 11 August 1994.
Quarterman, John S., and Josiah C. Hoskins. “Notable Computer Networks.” Communications of the ACM, October 1986.
Roberts, Lawrence G. “ARPA Network Implications.” Educom, Bulletin of the Interuniversity Communications Council, fall 1971.
Salus, Peter. “Pioneers of the Internet.” Internet World, September 1994.
“Scanning the Issues,” IEEE Spectrum, August 1964.
Schonberg, Harold C. “4 Acoustics Experts to Urge Revisions in Auditorium.” The NewYork Times, 4 April 1963.
———.“Acoustics Again: Philharmonic Hall Has Some Defects, But Also Has a Poetry of Its Own.” The NewYork Times, 9 December 1962.
Selling It. Consumer Reports, June 1977.
Space Agencies. “ARPA Shapes Military Space Research.” Aviation Week, 16 June 1958.
Sterling, Bruce. “Internet.” Fantasy and Science Fiction, February 1993.
Swartzlander, Earl. “Time-Sharing at MIT.” IEEE Annals of the History of Computing 14, no. 1, 1992.
“Transforming BB&N: ARPANET’s Architect Targets Non-Military Networks.” Data Communications, April 1984.
Wilson, David McKay. “BBN Executives Collapse in Court.” Cambridge (Mass.) Chronicle, 6 November 1980.
———. “Consulting Co. Admits Overcharge.” Cambridge (Mass.) Chronicle, 30 October 1980.
Zitner, Aaron. “A Quiet Leap Forward in Cyberspace.” The Boston Globe, 11 September 1994.
Zuckerman, Laurence.“BBN Steps Out of the Shadows and into the Limelight.” The NewYork Times, 17 July 1995.Edit
Unpublished Papers, Interviews from Secondary Sources, and Other Documents
”Act One.” Symposium on the history of the ARPANET held at the University of California at Los Angeles, 17 August 1989. Transcript.
ARPA Network Information Center, Stanford Research Institute, Menlo Park, Calif. “Scenarios for Using the ARPANET.” Booklet. Prepared for the International Conference on Computer Communication, Washington, D.C., October 1972.
Baran, Paul. Interview by Judy O’Neill. Charles Babbage Institute, DARPA/IPTO Oral History Collection, University of Minnesota Center for the History of Information Processing, Minneapolis, Minn., 5 March 1990.
Barlow, John Perry. “Crime and Puzzlement.” Pinedale, Wyo., June 1990.
BBN Systems and Technologies Corporation. “Annual Report of the Science Development Program.” Cambridge, Mass., 1988.
Bhushan, A. K. “Comments on the File Transfer Protocol.” Request for Comments 385. Stanford Research Institute, Menlo Park, Calif., August 1972.
———.“The File Transfer Protocol.” Request for Comments 354. Stanford Research Institute, Menlo Park, Calif., July 1972.
Bhushan, Abhay, Ken Pogran, Ray Tomlinson, and Jim White. “Standardizing Network Mail Headers.” Request for Comments 561. MIT, Cambridge, Mass., 5 September 1973.
Blue, Allan. Interview by William Aspray. Charles Babbage Institute, DARPA/IPTO Oral History Collection, University of Minnesota Center for the History of Information Processing, Minneapolis, Minn., 12 June 1989.
Bolt Beranek and Newman Inc. “ARPANET Completion Report: Draft.” Cambridge, Mass., September 1977.
———.“BBN Proposal No. IMP P69-IST-5: Interface Message Processors for the ARPA Computer Network.” Design proposal. Submitted to the Department of the Army, Defense Supply Service, in response to RFQ No. DAHC15 69 Q 0002. Washington, D.C., 6 September 1968.
———. “BBN Report No. 1763: Initial Design for Interface Message Processors for the ARPA Computer Network.” Design proposal. Submitted to the Advanced Research Projects Agency under contract no. DAHC 15-69-C-0179. Washington, D.C., 6 January 1969.
———. “BBN Report No. 1822: Interface Message Processor.” Technical report. Cambridge, Mass., 1969.
———.“Interface Message Processors for the ARPA Computer Network.” Quarterly technical reports. Submitted to the Advanced Research Projects Agency under contract no. DAHC 15-69-C-0179 and contract no. F08606-73-C-0027. Washington, D.C., 1969–1973.
———. “Operating Manual for Interface Message Processors: 516 IMP, 316 IMP, TEP.” Revised. Submitted to the Advanced Research Projects Agency under ARPA order no. 1260, contract no. DAHC15-69-C-0179. Arlington,Va., April 1973.
———. “Report No. 4799: A History of the ARPANET: The First Decade.” Submitted to the Defense Advanced Research Projects Agency. Arlington,Va., April 1981.
———.“The Four Cities Plan.” Draft proposal and cost analysis for maintenance of IMPs and TIPs in Boston, Washington, Los Angeles, and San Francisco. Papers of BBN Division 6. Cambridge, Mass., April 1974.
———. Internal memoranda and papers relating to the work of Division 6. Cambridge, Mass., 1971–1972.
Carr, C. Stephen, Stephen D. Crocker, and Vinton G. Cerf. “HOST-HOST Communication Protocol in the ARPA Network.” Paper presented at the Spring Joint Computer Conference of the American Federation of Information Processing Societies, 1970.
Catton, Major General, USAF, Jack. Letter to F. R. Collbohm of RAND Corporation, 11 October 1965. Referring the preliminary technical development plan for message-block network to the Defense Communications Agency.
Cerf,Vinton G.“Confessions of a Hearing-Impaired Engineer.” Unpublished.
———.“PARRY Encounters the Doctor.” Request for Comments 439 (NIC 13771). Network Working Group, 21 January 1973.
Cerf, Vinton G., and Jonathan B. Postel. “Specification of Internetwork Transmission Control Protocol: TCP Version 3.” Information Sciences Institute, University of Southern California, January 1978.
Cerf, Vinton G. Interview by Judy O’Neill. Charles Babbage Institute, DARPA/ IPTO Oral History Collection, University of Minnesota Center for the History of Information Processing, Minneapolis, Minn., 24 April 1990.
Cerf, Vinton G., and Robert Kahn. “HOST and PROCESS Level Protocols for Internetwork Communication.” Notes of the International Network Working Group 39, 13 September 1973.
Clark, Wesley. Interview by Judy O’Neill. Charles Babbage Institute, DARPA/IPTO Oral History Collection, University of Minnesota Center for the History of Information Processing, Minneapolis, Minn., 3 May 1990.
Crocker, David H. “Standard for the Format of ARPA Internet Text Messages.” Request for Comments 822. Department of Electrical Engineering, University of Delaware, 13 August 1982.
Crocker, David H., John J. Vittal, Kenneth T. Pogran, and D. Austin Henderson Jr. “Standard for the Format of ARPA Network Text Messages.” Request for Comments 733. The RAND Corporation, Santa Monica, Calif., 21 November 1977.
Crowther, William. Interview by Judy O’Neill. Charles Babbage Institute, DARPA/IPTO Oral History Collection, University of Minnesota Center for the History of Information Processing, Minneapolis, Minn., 12 March 1990.
Crowther, William, and David Walden. “CurrentViews of Timing.” Memorandum to Frank E. Heart, Cambridge, Mass., 8 July 1969.
Davies, Donald W. “Further Speculations on Data Transmission.” Private papers. London, 16 November 1965.
———.“Proposal for a Digital Communication Network.” Private papers, photocopied and widely circulated. London, June 1966.
———. “Proposal for the Development of a National Communications Service for On-Line Data Processing.” Private papers. London, 15 December 1965.
———. “Remote On-line Data Processing and Its Communication Needs.” Private papers. London, 10 November 1965.
Davies, Donald W. Interview by Martin Campbell-Kelly. National Physical Laboratory, U.K., 17 March 1986.
Davies, Donald W., Keith Bartlett, Roger Scantlebury, and Peter Wilkinson. “A Digital Communications Network for Computers Giving Rapid Response at Remote Terminals.” Paper presented at the Association for Computing Machinery Symposium on Operating System Principles, Gatlinburg, Tenn., October 1967.
Davis, Ruth M. “Comments and Recommendations Concerning the ARPA Network.” Center for Computer Sciences and Technology, U.S. National Bureau of Standards, 6 October 1971.
Digital Equipment Corporation. “Interface Message Processors for the ARPA Computer Network.” Design proposal. Submitted to the Department of the Army, Defense Supply Service, in RFQ no. DAHC15 69 Q 002, 5 September 1968.
Frank, Howard. Interview by Judy O’Neill. Charles Babbage Institute, DARPA/IPTO Oral History Collection, University of Minnesota Center for the History of Information Processing, Minneapolis, Minn., 30 March 1990.
Goldstein, Paul. “The Proposed ARPANET Divestiture: Legal Questions and Economic Issues.” Working Paper, Cabledata Associates, Inc., CAWP no. 101, 27 July 1973.
Hauben, Michael, and Ronda Hauben. The Netizens Netbook page can be found at http://www.columbia.edu/∼hauben/netbook/. The Haubens’ work has also appeared in the Amateur Computerist Newsletter, available from ftp://wuarchive.wustl.edu/doc/misc/acn/.
Heart, F. E., R. E. Kahn, S. M. Ornstein, W. R. Crowther, and D. C. Walden. “The Interface Message Processor for the ARPA Computer Network.” Paper presented at the Spring Joint Computer Conference of the American Federation of Information Processing Societies, 1970.
Heart, Frank E. Interview by Judy O’Neill. Charles Babbage Institute, DARPA/IPTO Oral History Collection, University of Minnesota Center for the History of Information Processing, Minneapolis, Minn., 13 March 1990.
Herzfeld, Charles. Interview by Arthur Norberg. Charles Babbage Institute, DARPA/IPTO Oral History Collection, University of Minnesota Center for the History of Information Processing, Minneapolis, Minn., 6 August 1990.
Honeywell, Inc. “Honeywell at Bolt Beranek and Newman, Inc.” Brochure. Published for the ARPA Network demonstration at the International Conference on Computer Communication, Washington, D.C., October 1972.
Information Sciences Institute, University of Southern California. “DOD Standard Transmission Control Protocol.” Request for Comments 761. Prepared for the Defense Advanced Research Projects Agency, Information Processing Techniques Office, Arlington,Va., January 1980.
International Data Corporation. “ARPA Computer Network Provides Communications Technology for Computer/Computer Interaction Within Special Research Community.” Industry report and market review. Newtonville, Mass., 3 March 1972.
Kahn, Robert. Interview by Judy O’Neill. Charles Babbage Institute, DARPA/IPTO Oral History Collection, University of Minnesota Center for the History of Information Processing, Minneapolis, Minn., 24 April 1990.
Kahn, Robert. Interview by William Aspray. Charles Babbage Institute, DARPA/IPTO Oral History Collection, University of Minnesota Center for the History of Information Processing, Minneapolis, Minn., 22 March 1989.
Kleinrock, Leonard. Interview by Judy O’Neill. Charles Babbage Institute, DARPA/IPTO Oral History Collection, University of Minnesota Center for the History of Information Processing, Minneapolis, Minn., 3 April 1990.
Kryter, Karl D. “Lick as a Psychoacoustician and Physioacoustician.” Presentation honoring J. C. R. Licklider at the Meeting of the Acoustical Society of America, Baltimore, Md., 30 April 1991.
———. Obituary of J. C. R. Licklider, Journal of the Acoustical Society of America, December 1990.
Licklider, J. C. R., and Welden E. Clark. “On-Line Man-Computer Communication.” Paper presented at the Spring Joint Computer Conference of the American Federation of Information Processing Societies, 1962.
Licklider, J. C. R. Interview by William Aspray. Charles Babbage Institute, DARPA/IPTO Oral History Collection, University of Minnesota Center for the History of Information Processing, Minneapolis, Minn., 28 October 1988.
Lukasik, Stephen. Interview by Judy O’Neill. Charles Babbage Institute, DARPA/IPTO Oral History Collection, University of Minnesota Center for the History of Information Processing, Minneapolis, Minn., 17 October 1991.
Marill, Thomas, and Lawrence G. Roberts. “Toward a Cooperative Network of Time-Shared Computers.” Paper presented at the Fall Joint Computer Conference of the American Federation of Information Processing Societies, 1966.
McCarthy, J., S. Boilen, E. Fredkin, and J. C. R. Licklider. “A Time-Sharing Debugging System for a Small Computer.” Paper presented at the Spring Joint Computer Conference of the American Federation of Information Processing Societies, 1963.
McKenzie, Alexander A. “The ARPA Network Control Center.” Paper presented at the Fourth Data Communications Symposium of the Institute for Electrical and Electronics Engineers, October 1975.
McKenzie, Alexander A. Interview by Judy O’Neill. Charles Babbage Institute, DARPA/IPTO Oral History Collection, University of Minnesota Center for the History of Information Processing, Minneapolis, Minn., 13 March 1990.
Message Group. The full text of more than 2,600 e-mail messages sent by members of the Message Group (or MsgGroup), one of the first electronic mailing lists, relating to the development of e-mail. The Computer Museum, Boston, Mass., June 1975–June 1986. Electronic document. (http://www.tcm.org/msgroup)
Metcalfe, Robert. “Some Historic Moments in Networking.” Request for Comments 89. Network Working Group, 19 January 1971.
Myer, T. H., and D. A. Henderson. “Message Transmission Protocol.” Request for Comments 680. Stanford Research Institute, Menlo Park, Calif., 1975.
National Research Council, Commission on Engineering and Technical Systems. “Transport Protocols for Department of Defense Data Networks.” Report to the Department of Defense and the National Bureau of Standards, Board on Telecommunication and Computer Applications, 1985.
Neigus, N.J. “File Transfer Protocol.” Request for Comments 542. Bolt Beranek and Newman Inc., Cambridge, Mass., 12 July 1973.
Norberg, Arthur L., and Judy E. O’Neill. “A History of the Information Processing Techniques Office of the Defense Advanced Research Projects Agency.” Charles Babbage Institute, University of Minnesota, Minneapolis, Minn., 1992.
Ornstein, Severo M., F. E. Heart, W. R. Crowther, H. K. Rising, S. B. Russell, and A. Michel. “The Terminal IMP for the ARPA Network.” Paper presented at the Spring Joint Computer Conference of the American Federation of Information Processing Societies, Atlantic City, N.J., May 1972.
Ornstein, Severo. Interview by Judy O’Neill. Charles Babbage Institute, DARPA/IPTO Oral History Collection, University of Minnesota Center for the History of Information Processing, Minneapolis, Minn., 6 March 1990.
Pogran, Ken, John Vittal, Dave Crowther, and Austin Henderson. “Proposed Official Standard for the Format of ARPA Network Messages.” Request for Comments 724. MIT, Cambridge, Mass., 12 May 1977.
Postel, Jonathan B. “Simple Mail Transfer Protocol.” Request for Comments 821. Information Sciences Institute, University of Southern California, August 1982.
———. “Specification of Internetwork Transmission Control Protocol: TCP Version 4.” Information Sciences Institute, University of Southern California, September 1978.
———. “TCP and IP Bake Off.” Request for Comments 1025. Network Working Group, September 1987.
Pouzin, Louis. “Network Protocols.” Notes of the International Network Working Group 50, September 1973.
———.“Presentation and Major Design Aspects of the Cyclades Computer Network.” Paper presented at the IEEE Third Data Communications Symposium (Data Networks: Analysis and Design), November 1973.
———. “Experimental Communication Protocol: Basic Message Frame.” Notes of the International Network Working Group 48, January 1974.
———.“Interconnection of Packet Switching Networks.” Notes of the International Network Working Group 42, October 1973.
———. “Network Architecture and Components.” Notes of the International Network Working Group 49, August 1973.
RAND Corporation. “Development of the Distributed Adaptive Message-Block Network.” Recommendation to the Air Staff, 30 August 1965.
RCA Service Company, Government Services Division. “ARPANET Study Final Report.” Submitted under contract no. F08606-73-C-0018. 24 November 1972.
Richard J. Barber Associates, Inc. “The Advanced Research Projects Agency: 1958–1974.” A study for the Advanced Research Projects Agency under contract no. MDA-903-74-C-0096. Washington, D.C., December 1975. Photocopy.
Roberts, Lawrence G. “Extensions of Packet Communications Technology to a Hand-Held Personal Terminal.” Paper presented at the Spring Joint Computer Conference of the American Federation of Information Processing Societies, May 1972.
———. “Multiple Computer Networks and Intercomputer Communication.” Paper presented at the Association for Computing Machinery Symposium on Operating System Principles, October 1967.
Roberts, Lawrence G., and Barry D. Wessler. “Computer Network Development to Achieve Resource Sharing.” Paper presented at the Spring Joint Computer Conference of the American Federation of Information Processing Societies, 1970.
Roberts, Lawrence G. Interview by Arthur Norberg. Charles Babbage Institute, DARPA/IPTO Oral History Collection, University of Minnesota Center for the History of Information Processing, Minneapolis, Minn., 4 April 1989.
Ruina, Jack. Interview by William Aspray. Charles Babbage Institute, DARPA/IPTO Oral History Collection, University of Minnesota Center for the History of Information Processing, Minneapolis, Minn., 20 April 1989.
Sutherland, Ivan. Interview by William Aspray. Charles Babbage Institute DARPA/IPTO Oral History Collection, University of Minnesota Center for the History of Information Processing, Minneapolis, Minn., 1 May 1989.
Taylor, Robert. Interview by William Aspray. Charles Babbage Institute, DARPA/IPTO Oral History Collection, University of Minnesota Center for the History of Information Processing, Minneapolis, Minn., 28 February 1989.
U.S. Postal Service. “Electronic Message Systems for the U.S. Postal Service.” Report of the U.S.P.S. Support Panel, Committee on Telecommunications, Washington, D.C., January 1977.
Walden, David C. “Experiences in Building, Operating, and Using the ARPA Network.” Paper presented at the Second USA-Japan Computer Conference, Tokyo, Japan, August 1975.
Walden, David. Interview by Judy O’Neill. Charles Babbage Institute, DARPA/IPTO Oral History Collection, University of Minnesota Center for the History of Information Processing, Minneapolis, Minn., 6 February 1990.
Walker, Stephen T. “Completion Report: ARPA Network Development.” Defense Advanced Research Projects Agency, Information Processing Techniques Office, Washington, D.C., 4 January 1978.
Weik, Martin H. “A Third Survey of Domestic Electronic Digital Computing Systems.” Ballistic Research Laboratories, report no. 1115, March 1961.
White, Jim. “Proposed Mail Protocol.” Request for Comments 524. Stanford Research Institute, Menlo Park, Calif., 13 June 1973.
Zimmermann, H., and M. Elie. “Proposed Standard Host-Host Protocol for Heterogeneous Computer Networks: Transport Protocol.” Notes of the International Network Working Group 43, December 1973.Edit
Charles Babbage Institute, Center for the History of Information Processing, University of Minnesota. Large archival collection relating to the history of computing. More information can be obtained via the CBI Web site at http://cbi.itdean.umn.edu/cbi/welcome.html or via e-mail addressed to firstname.lastname@example.org.
Computer Museum, Boston, Massachusetts. Large collection relating to the history of computing, including the archives of the Message Group concerning the early development of e-mail. The archive is available via the homepage at http://www.tcm.org/msgroup.
Information Sciences Institute, University of Southern California. Collection includes up-to-date indexes and tests of Internet standards, protocols, Requests for Comments (RFCs), and various other technical notes available via the ISI Web site: http://www.isi.edu. Some of the earlier RFCs are not available electronically, but are archived off-line in meticulous fashion by RFC editor Jon Postel. A searchable archive is maintained at http://info.internet.isi.edu:80/in-notes/rfc.
Ohio State University, Department of Computer and Information Science. The CIS Web Server offers access to RFCs and various other technical and historical documents related to the Internet via http://www.cis. ohio-state.edu:80/hypertext/information/rfc.html.
Where Wizards Stay Up Late – The Origins Of The Internet by Matthew Lyon and Katie Hafner
by Matthew Lyon and Katie Hafner
“Twenty five years ago, it didn’t exist. Today, twenty million people worldwide are surfing the Net. Where Wizards Stay Up Late is the exciting story of the pioneers responsible for creating the most talked about, most influential, and most far-reaching communications breakthrough since the invention of the telephone.”
“In the 1960’s, when computers where regarded as mere giant calculators, J.C.R. Licklider at MIT saw them as the ultimate communications devices. With Defense Department funds, he and a band of visionary computer whizzes began work on a nationwide, interlocking network of computers. Taking readers behind the scenes, Where Wizards Stay Up Late captures the hard work, genius, and happy accidents of their daring, stunningly successful venture.”Edit
- Print length: 304 pages
- Publication date: August 19, 1999
- ASIN: B000FC0WP6
- Publisher: Simon & Schuster
- ISBN: 0684832674
Table of Contents
- 1. The Fastest Million Dollars
- 2. A Block Here, Some Stones There
- 3. The Third University
- 4. Head Down in the Bits
- 5. Do It to It Truett
- 6. Hacking Away and Hollering
- 7. E-Mail
- 8. A Rocket on Our Hands
- Chapter Notes
To the memory of J. C. R. Licklider and to the memory of Cary Lu
Infrastructure as code (IaC) is the process of managing and provisioning computer data centers through machine-readable definition files, rather than physical hardware configuration or interactive configuration tools. The IT infrastructure managed by this process comprises both physical equipment, such as bare-metal servers, as well as virtual machines, and associated configuration resources. The definitions may be in a version control system. It can use either scripts or declarative definitions, rather than manual processes, but the term is more often used to promote declarative approaches.
IaC grew as a response to the difficulty posed by utility computing and second-generation web frameworks. In 2006, the launch of Amazon Web Services’ Elastic Compute Cloud and the 1.0 version of Ruby on Rails just months before created widespread scaling problems in the enterprise that were previously experienced only at large, multi-national companies. With new tools emerging to handle this ever growing field, the idea of IaC was born. The thought of modelling infrastructure with code, and then having the ability to design, implement, and deploy applications infrastructure with known software best practices appealed to both software developers and IT infrastructure administrators. The ability to treat infrastructure like code and use the same tools as any other software project would allow developers to rapidly deploy applications.
Added value and advantages
The value of IaC can be broken down into three measurable categories: cost, speed, and risk. Cost reduction aims at helping not only the enterprise financially, but also in terms of people and effort, meaning that by removing the manual component, people are able to refocus their efforts towards other enterprise tasks. Infrastructure automation enables speed through faster execution when configuring your infrastructure and aims at providing visibility to help other teams across the enterprise work quickly and more efficiently. Automation removes the risk associated with human error, like manual misconfiguration; removing this can decrease downtime and increase reliability. These outcomes and attributes help the enterprise move towards implementing a culture of DevOps, the combined working of development and operations.
Types of approaches
There are generally two approaches to IaC: declarative (functional) vs. imperative (procedural). The difference between the declarative and the imperative approach is essentially ‘what’ versus ‘how’ . The declarative approach focuses on what the eventual target configuration should be; the imperative focuses on how the infrastructure is to be changed to meet this. The declarative approach defines the desired state and the system executes what needs to happen to achieve that desired state. Imperative defines specific commands that need to be executed in the appropriate order to end with the desired conclusion. 
There are two methods of IaC: ‘push‘ and ‘pull‘ . The main difference is the manner in which the servers are told how to be configured. In the pull method the server to be configured will pull its configuration from the controlling server. In the push method the controlling server pushes the configuration to the destination system.
There are many tools that fulfill infrastructure automation capabilities and use IaC. Broadly speaking, any framework or tool that performs changes or configures infrastructure declaratively or imperatively based on a programmatic approach can be considered IaC. Traditionally, server (lifecycle) automation and configuration management tools were used to accomplish IaC. Now enterprises are also using continuous configuration automation tools or stand-alone IaC frameworks, such as Microsoft’s PowerShell DSC or AWS CloudFormation.
Continuous configuration automation
All continuous configuration automation (CCA) tools can be thought of as an extension of traditional IaC frameworks. They leverage IaC to change, configure, and automate infrastructure, and they also provide visibility, efficiency and flexibility in how infrastructure is managed. These additional attributes provide enterprise-level security and compliance.
An important aspect when considering CCA tools, if they are open source, is the community content. As Gartner states, the value of CCA tools is “as dependent on user-community-contributed content and support as it is on the commercial maturity and performance of the automation tooling.” Vendors like Puppet and Chef, those that have been around a significant amount of time, have created their own communities. Chef has Chef Community Repository and Puppet has PuppetForge. Other vendors rely on adjacent communities and leverage other IaC frameworks such as PowerShell DSC. New vendors are emerging that are not content driven, but model driven with the intelligence in the product to deliver content. These visual, object-oriented systems work well for developers, but they are especially useful to production oriented DevOps and operations constituents that value models versus scripting for content. As the field continues to develop and change, the community based content will become ever important to how IaC tools are used, unless they are model driven and object oriented.
Notable CCA tools include:
|Tool||Released by||Method||Approach||Written in||Comments|
|Chef||Chef (2009)||Pull||Declarative and imperative||Ruby||–|
|Otter||Inedo||Push||Declarative and imperative||–||Windows oriented|
|Puppet||Puppet (2005)||Pull||Declarative and imperative||C++ & Clojure since 4.0, Ruby||–|
|SaltStack||SaltStack||Push and Pull||Declarative and imperative||Python||–|
|Ansible / Ansible Tower||Red Hat (2012)||Push||Declarative and imperative||Python||–|
Relationship to DevOps
IaC can be a key attribute of enabling best practices in DevOps – Developers become more involved in defining configuration and Ops teams get involved earlier in the development process. Tools that utilize IaC bring visibility to the state and configuration of servers and ultimately provide the visibility to users within the enterprise, aiming to bring teams together to maximize their efforts. Automation in general aims to take the confusion and error-prone aspect of manual processes and make it more efficient, and productive. Allowing for better software and applications to be created with flexibility, less downtime, and an overall cost effective way for the company. IaC is intended to reduce the complexity that kills efficiency out of manual configuration. Automation and collaboration are considered central points in DevOps; Infrastructure automation tools are often included as components of a DevOps toolchain.
Relationship to security
The 2020 Cloud Threat Report released by Unit 42 (the threat intelligence unit of cybersecurity provider Palo Alto Networks) identified around 200,000 potential vulnerabilities in infrastructure as code templates.
- ^ Wittig, Andreas; Wittig, Michael (2016). Amazon Web Services in Action. Manning Press. p. 93. ISBN 978-1-61729-288-0.
- ^ Bower, Joseph L.; Christensen, Clayton M. “Disruptive Technologies: Catching the Wave”. Harvard Business Review.
- ^ a b c Fletcher, Colin; Cosgrove, Terrence (26 August 2015). Innovation Insight for Continuous Configuration Automation Tools. Gartner (Report).
- ^ Riley, Chris (12 November 2015). “Version Your Infrastructure”. DevOps.com.
- ^ Phillips, Andrew (14 May 2015). “Moving from Infrastructure Automation to True DevOps”. DevOps.com.
- ^ “Declarative v. Imperative Models for Configuration Management: Which Is Really Better?”. Scriptrock.com. Retrieved 14 December 2015.
- ^ Loschwitz, Martin (14 November 2014). “Choosing between the leading open source configuration managers”. Admin Network & Security. Lawrence, KS USA: Linux New Media USA LLC.
- ^ Venezia, Paul (21 November 2013). “Puppet vs. Chef vs. Ansible vs. Salt”. networkworld.com. Network World. Retrieved 14 December 2015.
- ^ Garner Market Trends: DevOps – Not a Market, but Tool-Centric Philosophy That supports a Continuous Delivery Value Chain (Report). Gartner. 18 February 2015.
- ^ a b Chaganti, Ravikanth (5 January 2016). “DevOps, Infrastructure as Code, and PowerShell DSC: The Introduction”. PowerShell Magazine. PowerShell Magazine. Retrieved 11 January 2016.
- ^ https://aws.amazon.com/about-aws/whats-new/2011/02/25/introducing-aws-cloudformation/
- ^ Sturgeon, Phil (28 October 2012). “Puppet or Chef?”.
- ^ Ramos, Martin (4 November 2015). “Continuous Integration: Infrastructure as Code in DevOps”. easydynamics.com. Archived from the original on 6 February 2016. Retrieved 29 January 2016.
- ^ Infrastructure As Code: Fueling the Fire for Faster Application Delivery (Report). Forrester. March 2015.
- ^ Wurster, Laurie F.; Colville, Ronni J.; Height, Cameron; Tripathi, Somendra; Rastogi, Aditi. Emerging Technology Analysis: DevOps a Culture Shift, Not a Technology (Report). Gartner.
- ^ “Cloud Threat Report Shows Need for Consistent DevSecOps”. InformationWeek. Retrieved 24 February 2020.
- Agile software development
- Software development process
- Configuration management
- Systems engineering
- Orchestration software
- Cloud computing
- As a service
See also: Configuration management (CM)
Not to be confused with Version Control System.
In software engineering, software configuration management (SCM or S/W CM) is the task of tracking and controlling changes in the software, part of the larger cross-disciplinary field of configuration management. SCM practices include revision control and the establishment of baselines. If something goes wrong, SCM can determine what was changed and who changed it. If a configuration is working well, SCM can determine how to replicate it across many hosts.
The acronym “SCM” is also expanded as source configuration management process and software change and configuration management. However, “configuration” is generally understood to cover changes typically made by a system administrator.
The goals of SCM are generally:
- Configuration identification – Identifying configurations, configuration items and baselines.
- Configuration control – Implementing a controlled change process. This is usually achieved by setting up a change control board whose primary function is to approve or reject all change requests that are sent against any baseline.
- Configuration status accounting – Recording and reporting all the necessary information on the status of the development process.
- Configuration auditing – Ensuring that configurations contain all their intended parts and are sound with respect to their specifying documents, including requirements, architectural specifications and user manuals.
- Build management – Managing the process and tools used for builds.
- Process management – Ensuring adherence to the organization’s development process.
- Environment management – Managing the software and hardware that host the system.
- Teamwork – Facilitate team interactions related to the process.
- Defect tracking – Making sure every defect has traceability back to the source.
With the introduction of cloud computing the purposes of SCM tools have become merged in some cases. The SCM tools themselves have become virtual appliances that can be instantiated as virtual machines and saved with state and version. The tools can model and manage cloud-based virtual resources, including virtual appliances, storage units, and software bundles. The roles and responsibilities of the actors have become merged as well with developers now being able to dynamically instantiate virtual servers and related resources.
The history of software configuration management (SCM) in computing can be traced back as early as the 1950s, when CM (for Configuration Management), originally for hardware development and production control, was being applied to software development. Early software had a physical footprint, such as cards, tapes, and other media. The first software configuration management was a manual operation. With the advances in language and complexity, software engineering, involving configuration management and other methods, became a major concern due to issues like schedule, budget, and quality. Practical lessons, over the years, had led to the definition, and establishment, of procedures and tools. Eventually, the tools became systems to manage software changes. Industry-wide practices were offered as solutions, either in an open or proprietary manner (such as Revision Control System). With the growing use of computers, systems emerged that handled a broader scope, including requirements management, design alternatives, quality control, and more; later tools followed the guidelines of organizations, such as the Capability Maturity Model of the Software Engineering Institute.
- Application lifecycle management
- Comparison of open source configuration management software
- Comparison of version control software
- Continuous configuration automation
- List of revision control software
- Infrastructure as Code
- ^ Roger S. Pressman (2009). Software Engineering: A Practitioner’s Approach (7th International ed.). New York: McGraw-Hill.
- ^ Gartner and Forrester Research
- ^ Amies, A; Peddle S; Pan T M; Zou P X (June 5, 2012). “Develop cloud applications with Rational tools”. IBM DeveloperWorks. IBM.
- ^ “1988 “A Guide to Understanding Configuration Management in Trusted Systems” National Computer Security System (via Google)
- 828-2012 IEEE Standard for Configuration Management in Systems and Software Engineering. 2012. doi:10.1109/IEEESTD.2012.6170935. ISBN 978-0-7381-7232-3.
- Aiello, R. (2010). Configuration Management Best Practices: Practical Methods that Work in the Real World (1st ed.). Addison-Wesley. ISBN 0-321-68586-5.
- Babich, W.A. (1986). Software Configuration Management, Coordination for Team Productivity. 1st edition. Boston: Addison-Wesley
- Berczuk, Appleton; (2003). Software Configuration Management Patterns: Effective TeamWork, Practical Integration (1st ed.). Addison-Wesley. ISBN 0-201-74117-2.
- Bersoff, E.H. (1997). Elements of Software Configuration Management. IEEE Computer Society Press, Los Alamitos, CA, 1-32
- Dennis, A., Wixom, B.H. & Tegarden, D. (2002). System Analysis & Design: An Object-Oriented Approach with UML. Hoboken, New York: John Wiley & Sons, Inc.
- Department of Defense, USA (2001). Military Handbook: Configuration management guidance (rev. A) (MIL-HDBK-61A). Retrieved January 5, 2010, from http://www.everyspec.com/MIL-HDBK/MIL-HDBK-0001-0099/MIL-HDBK-61_11531/
- Futrell, R.T. et al. (2002). Quality Software Project Management. 1st edition. Prentice-Hall.
- International Organization for Standardization (2003). ISO 10007: Quality management systems – Guidelines for configuration management.
- Saeki M. (2003). Embedding Metrics into Information Systems Development Methods: An Application of Method Engineering Technique. CAiSE 2003, 374–389.
- Scott, J.A. & Nisse, D. (2001). Software configuration management. In: Guide to Software Engineering Body of Knowledge. Retrieved January 5, 2010, from http://www.computer.org/portal/web/swebok/htmlformat
- Paul M. Duvall, Steve Matyas, and Andrew Glover (2007). Continuous Integration: Improving Software Quality and Reducing Risk. (1st ed.). Addison-Wesley Professional. ISBN 0-321-33638-0.
- SCM and ISO 9001 by Robert Bamford and William Deibler, SSQC
- Use Cases and Implementing Application Lifecycle Management
- Parallel Development Strategies for Software Configuration Management