Monday, October 25, 2010
Find Your Laptop Driver
The following list of links to download the drivers of laptop / notebook popular.
Before looking for drivers notebook / laptop important thing to note is the brand and type of product. Brand usually written near the LCD screen, on the front cover or around the keyboard as well as type. Often also the type listed at the bottom of the notebook either written in sticker or written directly on the laptop.
By knowing the brands and types of notebook / laptop, then try looking for drivers from the official venfor as follows:
* Acer ( TravelMate, Extensa, Ferrari, Aspire)
* ASUS, Asus
* Compaq ( Evo, Armada, Concerto, Mini, LTE, Presario, dll)
* HP ( Pavilion, Omnibook, HP Compaq, dll)
* Lenovo (ThinkPad, IdeaPad, 3000 series)
* Toshiba ( Dynabook, Portege, Tecra, Satellite, Qosmio, Libretto )
* Dell ( Inspiron, Latitude, Precision, Studio, Vostro, XPS,Studio XPS)
* Sony ( VAIO: FJ Series, UX, TZ, NR, SZ, CR, FZ, dan AR series)
* Forsa (Carnaval, Debut, TravelPac )
* BenQ (Joybook )
* MSI (Micro-Star International)
* Advan
* BYON
* NEC (Versa, LitePad, Classic, LX, SX dll)
* A*note
* ION
Sunday, February 14, 2010
How Secure Are Online Data Backups?
If you are considering taking steps to ensure the integrity and safety of your important computer data you may be concerned about the security involved when dealing with such a task. When considering a third party such as an online secure data backup solution there are a few things to consider:
For starters, it is critical that your data be secure not only while in the possession of a third party but also while in transit to them. Most modern online secure data backup providers make there services available via the Internet and will provide you with the necessary software to back up a predefined set of your critical data, which is then encrypted (typically up to 448 bit), before it is transferred over a high speed connection to a secure data storage facility. By securing your data before transferring it over the Internet, you can be assured that your sensitive data (such as financial reports, company memos, and client databases) are safe from prying eyes. For ultra-critical, or highly sensitive applications, the data may be transferred over a completely encrypted channel (also known as an encrypted "tunnel" or virtual private network). If you will be backing up sensitive data that demands the utmost of privacy be sure to inquire about the level of encryption offered by the online secure data backup you are considering.
When considering a remote data backup vendor you should also take into consideration the facilities in which your sensitive data will be physically stored. In addition to encryption technology other things to be on the lookout for are fully secure facilities, biometric security systems, facility lockout policies, and human security. Depending on the level of security you need there are many levels of protection for your data that can be provided by remote data backup companies.
Be sure to do your research and investigate the track record and reputation of the online data backup company you are considering doing business with and never hesitate to ask questions when it comes to ensuring the security of your mission critical confidential data.
Your DATA is your LIFE. Protect it!
Harald Anderson is a freelance writer and webmaster for http://www.online-remote-data-backup.com an online backup service. Experience the Digital Peace of Mind that safe, secure, encrypted online data backups can offer. Online Backups
Article source :
http://articles.klikajadeh.com/showarticle.php?article=11113
Friday, January 1, 2010
Multitouch Screens Could Enliven New Devices
That might all change soon. Ilya Rosenberg, Ken Perlin and a small team of computer scientists from New York University’s Media Research Lab hope to bring a new kind of multitouch to everything from new e-readers to musical instruments, with their new company, Touchco.
Devices like the iPhone use a technology called capacitive touch and require contact with skin to activate a touch point. These touch technologies also limit the number of simultaneous inputs (the iPhone can track up to five fingers at once). In contrast, Touchco uses a technology called interpolating force-sensitive resistance, or I.F.S.R. This technology uses force-sensitive resistors, which become more conductive as you apply different levels of pressure, and then constantly scan and detect different inputs.
This allows for very low power, unlimited simultaneous touch inputs and the possibility of fully flexible multitouch devices. The technology is also extremely inexpensive; Mr. Rosenberg hopes to sell sheets of I.F.S.R. for as little as $10 a square foot.
So where can you expect to see this technology? Mr. Perlin believes you will see a new range of multitouch e-readers in the coming year, along with new musical instruments and other laptops or notebooks. Touchco has also been working closely with Disney animators to create a true digital sketchbook replacement, utilizing extremely sensitive pressure sensors to determine pencil thickness or even use of an eraser. The software behind the sensors can easily differentiate between the palm of a hand, a brush or a pencil.
There is also the possibility that the right implementation on computer could change the way we interact with interfaces. As an example, Mr. Rosenberg showed me a long sheet of I.F.S.R., about the size of a large flat panel computer monitor, which allowed manipulation of a 3-D computer program. When I lightly dragged my hand across the touch panel I could control the cursor. When I applied more pressure, I could select objects and change their orientation, size and shape within the program. It was incredibly intuitive and simple to navigate.
As you can see from the images below, there are lots of potential applications and devices that could use inexpensive multitouch technology. You can also see some video demonstrations on Touchco’s YouTube page.
Touchco began selling developer product kits to device manufacturers this year and hopes to see new devices enter the digital marketplace by late 2010. Touchco published technical specifications here.
By NICK BILTON
Article Sourch : http://bits.blogs.nytimes.com/2009/12/30/multi-touch-screens-could-enable-many-new-devices/#more-27105
Dell Customers Fume Over Late Holiday Orders
Customers have flocked to the Direct2Dell blog and Twitter to free their inner bah humbug. They’re chastising Dell left and right for multiple delays involving their orders – some stretching more than a month. In addition, they’re scoffing at the Dell Holiday Card the company offered as an under-the-tree replacement for missing PCs.
A couple of weeks ago, Dell picked up on the negative chatter and went to its blog for self-defense.
“The reality is that we are seeing increased demand for many of the products consumers want to buy, and it has affected our ability to fulfill the orders,” wrote Lionel Menchaca, the chief blogger at Dell. “In addition, there are also some industrywide constraints on some components (like memory and larger-capacity hard drives) that are delaying the manufacturing of certain products for customers.”
Things turned uglier as Christmas came and went and order delays were extended.
Mr. Menchaca has been working to fix some orders personally, as have some of Dell’s public relations staff members in Europe.
It’s a full-court Tweet press that seems to have placated some. For example, the Twitter user @dell_ruins_xmas appears to have shut down his account after Dell stepped in with some personalized customer service.
But many customers are still irate. People on the Direct2Dell blog talk about canceling their orders and still facing delay after delay.
“Yay, the Studio 1745 I ordered on 12/1 came with an estimated delivery date of 12/29, then 1/6, and today it changed to 1/13,” wrote HobbesGTS. “I tried calling to find out why it’s delayed and customer support is worthless.”
Another customer said his order had slipped from Nov. 14 to Jan. 29.
“I’m getting the feeling that I will get my alienware … by xmas 2010!” wrote deannzt. “Can it really take 2.5 months to build this computer?”
Dell has suffered from these types of delays in the past, particularly when it first started offering a wider choice of colors on laptops. The company ran into painting issues at a factory in Asia, and had to delay orders by many weeks.
Over all, it’s a tough situation for a company that’s spent years trying to rebuild its customer service reputation. The proactive moves on the social networking sites and blogs can offset only so much anguish.
One would think that eventually the shipment times for the major PC makers should be all just about equal. Dell has finally followed the lead of its rivals and moved more of its business to contract manufacturers, rather than trying to build its own PCs.
By ASHLEE VANCE
Saturday, March 15, 2008
How computers work
A general purpose computer has four main sections: the arithmetic and logic unit (ALU), the control unit, the memory, and the input and output devices (collectively termed I/O). These parts are interconnected by busses, often made of groups of wires.
The control unit, ALU, registers, and basic I/O (and often other hardware closely linked with these) are collectively known as a central processing unit (CPU). Early CPUs were composed of many separate components but since the mid-1970s CPUs have typically been constructed on a single integrated circuit called a microprocessor.
Control unit
- Main articles: CPU design and Control unit
The control unit (often called a control system or central controller) directs the various components of a computer. It reads and interprets (decodes) instructions in the program one by one. The control system decodes each instruction and turns it into a series of control signals that operate the other parts of the computer.[12] Control systems in advanced computers may change the order of some instructions so as to improve performance.
A key component common to all CPUs is the program counter, a special memory cell (a register) that keeps track of which location in memory the next instruction is to be read from.[13]

The control system's function is as follows—note that this is a simplified description, and some of these steps may be performed concurrently or in a different order depending on the type of CPU:
- Read the code for the next instruction from the cell indicated by the program counter.
- Decode the numerical code for the instruction into a set of commands or signals for each of the other systems.
- Increment the program counter so it points to the next instruction.
- Read whatever data the instruction requires from cells in memory (or perhaps from an input device). The location of this required data is typically stored within the instruction code.
- Provide the necessary data to an ALU or register.
- If the instruction requires an ALU or specialized hardware to complete, instruct the hardware to perform the requested operation.
- Write the result from the ALU back to a memory location or to a register or perhaps an output device.
- Jump back to step (1).
Since the program counter is (conceptually) just another set of memory cells, it can be changed by calculations done in the ALU. Adding 100 to the program counter would cause the next instruction to be read from a place 100 locations further down the program. Instructions that modify the program counter are often known as "jumps" and allow for loops (instructions that are repeated by the computer) and often conditional instruction execution (both examples of control flow).
It is noticeable that the sequence of operations that the control unit goes through to process an instruction is in itself like a short computer program - and indeed, in some more complex CPU designs, there is another yet smaller computer called a microsequencer that runs a microcode program that causes all of these events to happen.
Arithmetic/logic unit (ALU)
- Main article: Arithmetic logic unit
The ALU is capable of performing two classes of operations: arithmetic and logic.
The set of arithmetic operations that a particular ALU supports may be limited to adding and subtracting or might include multiplying or dividing, trigonometry functions (sine, cosine, etc) and square roots. Some can only operate on whole numbers (integers) whilst others use floating point to represent real numbers—albeit with limited precision. However, any computer that is capable of performing just the simplest operations can be programmed to break down the more complex operations into simple steps that it can perform. Therefore, any computer can be programmed to perform any arithmetic operation—although it will take more time to do so if its ALU does not directly support the operation. An ALU may also compare numbers and return boolean truth values (true or false) depending on whether one is equal to, greater than or less than the other ("is 64 greater than 65?").
Logic operations involve Boolean logic: AND, OR, XOR and NOT. These can be useful both for creating complicated conditional statements and processing boolean logic.
Superscalar computers contain multiple ALUs so that they can process several instructions at the same time. Graphics processors and computers with SIMD and MIMD features often provide ALUs that can perform arithmetic on vectors and matrices.
Memory
- Main article: Computer storage

A computer's memory can be viewed as a list of cells into which numbers can be placed or read. Each cell has a numbered "address" and can store a single number. The computer can be instructed to "put the number 123 into the cell numbered 1357" or to "add the number that is in cell 1357 to the number that is in cell 2468 and put the answer into cell 1595". The information stored in memory may represent practically anything. Letters, numbers, even computer instructions can be placed into memory with equal ease. Since the CPU does not differentiate between different types of information, it is up to the software to give significance to what the memory sees as nothing but a series of numbers.
In almost all modern computers, each memory cell is set up to store binary numbers in groups of eight bits (called a byte). Each byte is able to represent 256 different numbers; either from 0 to 255 or -128 to +127. To store larger numbers, several consecutive bytes may be used (typically, two, four or eight). When negative numbers are required, they are usually stored in two's complement notation. Other arrangements are possible, but are usually not seen outside of specialized applications or historical contexts. A computer can store any kind of information in memory as long as it can be somehow represented in numerical form. Modern computers have billions or even trillions of bytes of memory.
The CPU contains a special set of memory cells called registers that can be read and written to much more rapidly than the main memory area. There are typically between two and one hundred registers depending on the type of CPU. Registers are used for the most frequently needed data items to avoid having to access main memory every time data is needed. Since data is constantly being worked on, reducing the need to access main memory (which is often slow compared to the ALU and control units) greatly increases the computer's speed.
Computer main memory comes in two principal varieties: random access memory or RAM and read-only memory or ROM. RAM can be read and written to anytime the CPU commands it, but ROM is pre-loaded with data and software that never changes, so the CPU can only read from it. ROM is typically used to store the computer's initial start-up instructions. In general, the contents of RAM is erased when the power to the computer is turned off while ROM retains its data indefinitely. In a PC, the ROM contains a specialized program called the BIOS that orchestrates loading the computer's operating system from the hard disk drive into RAM whenever the computer is turned on or reset. In embedded computers, which frequently do not have disk drives, all of the software required to perform the task may be stored in ROM. Software that is stored in ROM is often called firmware because it is notionally more like hardware than software. Flash memory blurs the distinction between ROM and RAM by retaining data when turned off but being rewritable like RAM. However, flash memory is typically much slower than conventional ROM and RAM so its use is restricted to applications where high speeds are not required.[14]
In more sophisticated computers there may be one or more RAM cache memories which are slower than registers but faster than main memory. Generally computers with this sort of cache are designed to move frequently needed data into the cache automatically, often without the need for any intervention on the programmer's part.
Input/output (I/O)
- Main article: Input/output
I/O is the means by which a computer receives information from the outside world and sends results back. Devices that provide input or output to the computer are called peripherals. On a typical personal computer, peripherals include input devices like the keyboard and mouse, and output devices such as the display and printer. Hard disk drives, floppy disk drives and optical disc drives serve as both input and output devices. Computer networking is another form of I/O.
Often, I/O devices are complex computers in their own right with their own CPU and memory. A graphics processing unit might contain fifty or more tiny computers that perform the calculations necessary to display 3D graphics[citation needed]. Modern desktop computers contain many smaller computers that assist the main CPU in performing I/O.
Multitasking
- Main article: Computer multitasking
While a computer may be viewed as running one gigantic program stored in its main memory, in some systems it is necessary to give the appearance of running several programs simultaneously. This is achieved by having the computer switch rapidly between running each program in turn. One means by which this is done is with a special signal called an interrupt which can periodically cause the computer to stop executing instructions where it was and do something else instead. By remembering where it was executing prior to the interrupt, the computer can return to that task later. If several programs are running "at the same time", then the interrupt generator might be causing several hundred interrupts per second, causing a program switch each time. Since modern computers typically execute instructions several orders of magnitude faster than human perception, it may appear that many programs are running at the same time even though only one is ever executing in any given instant. This method of multitasking is sometimes termed "time-sharing" since each program is allocated a "slice" of time in turn.
Before the era of cheap computers, the principle use for multitasking was to allow many people to share the same computer.
Seemingly, multitasking would cause a computer that is switching between several programs to run more slowly - in direct proportion to the number of programs it is running. However, most programs spend much of their time waiting for slow input/output devices to complete their tasks. If a program is waiting for the user to click on the mouse or press a key on the keyboard, then it will not take a "time slice" until the event it is waiting for has occurred. This frees up time for other programs to execute so that many programs may be run at the same time without unacceptable speed loss.
Multiprocessing
- Main article: Multiprocessing

Some computers may divide their work between one or more separate CPUs, creating a multiprocessing configuration. Traditionally, this technique was utilized only in large and powerful computers such as supercomputers, mainframe computers and servers. However, multiprocessor and multi-core (multiple CPUs on a single integrated circuit) personal and laptop computers have become widely available and are beginning to see increased usage in lower-end markets as a result.
Supercomputers in particular often have highly unique architectures that differ significantly from the basic stored-program architecture and from general purpose computers.[15] They often feature thousands of CPUs, customized high-speed interconnects, and specialized computing hardware. Such designs tend to be useful only for specialized tasks due to the large scale of program organization required to successfully utilize most of a the available resources at once. Supercomputers usually see usage in large-scale simulation, graphics rendering, and cryptography applications, as well as with other so-called "embarrassingly parallel" tasks.
Networking and the Internet
- Main articles: Computer networking and Internet

Computers have been used to coordinate information in multiple locations since the 1950s. The U.S. military's SAGE system was the first large-scale example of such a system, which led to a number of special-purpose commercial systems like Sabre.
In the 1970s, computer engineers at research institutions throughout the United States began to link their computers together using telecommunications technology. This effort was funded by ARPA (now DARPA), and the computer network that it produced was called the ARPANET. The technologies that made the Arpanet possible spread and evolved. In time, the network spread beyond academic and military institutions and became known as the Internet. The emergence of networking involved a redefinition of the nature and boundaries of the computer. Computer operating systems and applications were modified to include the ability to define and access the resources of other computers on the network, such as peripheral devices, stored information, and the like, as extensions of the resources of an individual computer. Initially these facilities were available primarily to people working in high-tech environments, but in the 1990s the spread of applications like e-mail and the World Wide Web, combined with the development of cheap, fast networking technologies like Ethernet and ADSL saw computer networking become almost ubiquitous. In fact, the number of computers that are networked is growing phenomenally. A very large proportion of personal computers regularly connect to the Internet to communicate and receive information. "Wireless" networking, often utilizing mobile phone networks, has meant networking is becoming increasingly ubiquitous even in mobile computing environments.
Further topics
Hardware
- Main article: Computer hardware
The term hardware covers all of those parts of a computer that are tangible objects. Circuits, displays, power supplies, cables, keyboards, printers and mice are all hardware.
Peripheral device (Input/output) | Input | Mouse, Keyboard, Joystick, Image scanner |
Output | Monitor, Printer | |
Both | Floppy disk drive, Hard disk, Optical disc drive, Teleprinter | |
Computer busses | Short range | RS-232, SCSI, PCI, USB |
Long range (Computer networking) | Ethernet, ATM, FDDI |
Software
- Main article: Computer software
Software refers to parts of the computer which do not have a material form, such as programs, data, protocols, etc. When software is stored in hardware that cannot easily be modified (such as BIOS ROM in an IBM PC compatible), it is sometimes called "firmware" to indicate that it falls into an uncertain area somewhere between hardware and software.
Programming languages
Programming languages provide various ways of specifying programs for computers to run. Unlike natural languages, programming languages are designed to permit no ambiguity and to be concise. They are purely written languages and are often difficult to read aloud. They are generally either translated into machine language by a compiler or an assembler before being run, or translated directly at run time by an interpreter. Sometimes programs are executed by a hybrid method of the two techniques. There are thousands of different programming languages—some intended to be general purpose, others useful only for highly specialized applications.
Lists of programming languages | Timeline of programming languages, Categorical list of programming languages, Generational list of programming languages, Alphabetical list of programming languages, Non-English-based programming languages |
Commonly used Assembly languages | ARM, MIPS, x86 |
Commonly used High level languages | BASIC, C, C++, C#, COBOL, Fortran, Java, Lisp, Pascal |
Commonly used Scripting languages | Bourne script, JavaScript, Python, Ruby, PHP, Perl |
Professions and organizations
As the use of computers has spread throughout society, there are an increasing number of careers involving computers. Following the theme of hardware, software and firmware, the brains of people who work in the industry are sometimes known irreverently as wetware or "meatware".
The need for computers to work well together and to be able to exchange information has spawned the need for many standards organizations, clubs and societies of both a formal and informal nature.
Standards groups | ANSI, IEC, IEEE, IETF, ISO, W3C |
Professional Societies | ACM, ACM Special Interest Groups, IET, IFIP |
Free/Open source software groups | Free Software Foundation, Mozilla Foundation, Apache Software Foundation |
See also
- Computability theory
- Computer science
- Computing
- Computers in fiction
- Computer security and Computer insecurity
- List of computer term etymologies
- Virtualization
Notes
- ^ In 1946, ENIAC consumed an estimated 174 kW. By comparison, a typical personal computer may use around 400 W; over four hundred times less. (Kempf 1961)
- ^ Early computers such as Colossus and ENIAC were able to process between 5 and 100 operations per second. A modern "commodity" microprocessor (as of 2007) can process billions of operations per second, and many of these operations are more complicated and useful than early computer operations.
- ^ Heron of Alexandria. Retrieved on 2008-01-15.
- ^ The Analytical Engine should not be confused with Babbage's difference engine which was a non-programmable mechanical calculator.
- ^ This program was written similarly to those for the PDP-11 minicomputer and shows some typical things a computer can do. All the text after the semicolons are comments for the benefit of human readers. These have no significance to the computer and are ignored. (Digital Equipment Corporation 1972)
- ^ Attempts are often made to create programs that can overcome this fundamental limitation of computers. Software that mimics learning and adaptation is part of artificial intelligence.
- ^ It is not universally true that bugs are solely due to programmer oversight. Computer hardware may fail or may itself have a fundamental problem that produces unexpected results in certain situations. For instance, the Pentium FDIV bug caused some Intel microprocessors in the early 1990s to produce inaccurate results for certain floating point division operations. This was caused by a flaw in the microprocessor design and resulted in a partial recall of the affected devices.
- ^ Even some later computers were commonly programmed directly in machine code. Some minicomputers like the DEC PDP-8 could be programmed directly from a panel of switches. However, this method was usually used only as part of the booting process. Most modern computers boot entirely automatically by reading a boot program from some non-volatile memory.
- ^ However, there is sometimes some form of machine language compatibility between different computers. An x86-64 compatible microprocessor like the AMD Athlon 64 is able to run most of the same programs that an Intel Core 2 microprocessor can, as well as programs designed for earlier microprocessors like the Intel Pentiums and Intel 80486. This contrasts with very early commercial computers, which were often one-of-a-kind and totally incompatible with other computers.
- ^ High level languages are also often interpreted rather than compiled. Interpreted languages are translated into machine code on the fly by another program called an interpreter.
- ^ Although this is a simple program, it contains a software bug. If the traffic signal is showing red when someone switches the "flash red" switch, it will cycle through green once more before starting to flash red as instructed. This bug is quite easy to fix by changing the program to repeatedly test the switch throughout each "wait" period—but writing large programs that have no bugs is exceedingly difficult.
- ^ The control unit's rule in interpreting instructions has varied somewhat in the past. While the control unit is solely responsible for instruction interpretation in most modern computers, this is not always the case. Many computers include some instructions that may only be partially interpreted by the control system and partially interpreted by another device. This is especially the case with specialized computing hardware that may be partially self-contained. For example, EDVAC, the first modern stored program computer to be designed, used a central control unit that only interpreted four instructions. All of the arithmetic-related instructions were passed on to its arithmetic unit and further decoded there.
- ^ Instructions often occupy more than one memory address, so the program counters usually increases by the number of memory locations required to store one instruction.
- ^ Flash memory also may only be rewritten a limited number of times before wearing out, making it less useful for heavy random access usage. (Verma 1988)
- ^ However, it is also very common to construct supercomputers out of many pieces of cheap commodity hardware; usually individual computers connected by networks. These so-called computer clusters can often provide supercomputer performance at a much lower cost than customized designs. While custom architectures are still used for most of the most powerful supercomputers, there has been a proliferation of cluster computers in recent years. (TOP500 2006)
- ^ Most major 64-bit instruction set architectures are extensions of earlier designs. All of the architectures listed in this table existed in 32-bit forms before their 64-bit incarnations were introduced.
References
- a Kempf, Karl (1961). "Historical Monograph: Electronic Computers Within the Ordnance Corps". Aberdeen Proving Ground (United States Army).
- a Phillips, Tony (2000). The Antikythera Mechanism I. American Mathematical Society. Retrieved on 2006-04-05.
- a Shannon, Claude Elwood (1940). "A symbolic analysis of relay and switching circuits". Massachusetts Institute of Technology.
- a Digital Equipment Corporation (1972). PDP-11/40 Processor Handbook (PDF), Maynard, MA: Digital Equipment Corporation.
- a Verma, G.; Mielke, N. (1988). "Reliability performance of ETOX based flash memories". IEEE International Reliability Physics Symposium.
- a Meuer, Hans; Strohmaier, Erich; Simon, Horst; Dongarra, Jack (2006-11-13). Architectures Share Over Time. TOP500. Retrieved on 2006-11-27.
- Stokes, Jon (2007). Inside the Machine: An Illustrated Introduction to Microprocessors and Computer Architecture. San Francisco: No Starch Press. ISBN 978-1-59327-104-6.
History of Computing
- Main article: History of computer hardware

It is difficult to identify any one device as the earliest computer, partly because the term "computer" has been subject to varying interpretations over time. Originally, the term "computer" referred to a person who performed numerical calculations (a human computer), often with the aid of a mechanical calculating device.
The history of the modern computer begins with two separate technologies - that of automated calculation and that of programmability.
Examples of early mechanical calculating devices included the abacus, the slide rule and arguably the astrolabe and the Antikythera mechanism (which dates from about 150-100 BC). The end of the Middle Ages saw a re-invigoration of European mathematics and engineering, and Wilhelm Schickard's 1623 device was the first of a number of mechanical calculators constructed by European engineers. However, none of those devices fit the modern definition of a computer because they could not be programmed.
Hero of Alexandria (c. 10 – 70 AD) built a mechanical theater which performed a play lasting 10 minutes and was operated by a complex system of ropes and drums that might be considered to be a means of deciding which parts of the mechanism performed which actions - and when.[3] This is the essence of programmability. In 1801, Joseph Marie Jacquard made an improvement to the textile loom that used a series of punched paper cards as a template to allow his loom to weave intricate patterns automatically. The resulting Jacquard loom was an important step in the development of computers because the use of punched cards to define woven patterns can be viewed as an early, albeit limited, form of programmability.
It was the fusion of automatic calculation with programmability that produced the first recognisable computers. In 1837, Charles Babbage was the first to conceptualize and design a fully programmable mechanical computer that he called "The Analytical Engine".[4] Due to limited finances, and an inability to resist tinkering with the design, Babbage never actually built his Analytical Engine.
Large-scale automated data processing of punched cards was performed for the U.S. Census in 1890 by tabulating machines designed by Herman Hollerith and manufactured by the Computing Tabulating Recording Corporation, which later became IBM. By the end of the 19th century a number of technologies that would later prove useful in the realization of practical computers had begun to appear: the punched card, Boolean algebra, the vacuum tube (thermionic valve) and the teleprinter.
During the first half of the 20th century, many scientific computing needs were met by increasingly sophisticated analog computers, which used a direct mechanical or electrical model of the problem as a basis for computation. However, these were not programmable and generally lacked the versatility and accuracy of modern digital computers.
Computer | First operation | Place | Decimal/Binary | Electronic | Programmable | Turing complete |
---|---|---|---|---|---|---|
Zuse Z3 | May 1941 | Germany | binary | No | By punched film stock | Yes (1998) |
Atanasoff–Berry Computer | Summer 1941 | USA | binary | Yes | No | No |
Colossus | December 1943 / January 1944 | UK | binary | Yes | Partially, by rewiring | No |
Harvard Mark I – IBM ASCC | 1944 | USA | decimal | No | By punched paper tape | Yes (1998) |
ENIAC | 1944 | USA | decimal | Yes | Partially, by rewiring | Yes |
1948 | USA | decimal | Yes | By Function Table ROM | Yes |
A succession of steadily more powerful and flexible computing devices were constructed in the 1930s and 1940s, gradually adding the key features that are seen in modern computers. The use of digital electronics (largely invented by Claude Shannon in 1937) and more flexible programmability were vitally important steps, but defining one point along this road as "the first digital electronic computer" is difficult (Shannon 1940). Notable achievements include:
- Konrad Zuse's electromechanical "Z machines". The Z3 (1941) was the first working machine featuring binary arithmetic, including floating point arithmetic and a measure of programmability. In 1998 the Z3 was proved to be Turing complete, therefore being the world's first operational computer.
- The non-programmable Atanasoff–Berry Computer (1941) which used vacuum tube based computation, binary numbers, and regenerative capacitor memory.
- The secret British Colossus computer (1944), which had limited programmability but demonstrated that a device using thousands of tubes could be reasonably reliable and electronically reprogrammable. It was used for breaking German wartime codes.
- The Harvard Mark I (1944), a large-scale electromechanical computer with limited programmability.
- The U.S. Army's Ballistics Research Laboratory ENIAC (1946), which used decimal arithmetic and is sometimes called the first general purpose electronic computer (since Konrad Zuse's Z3 of 1941 used electromagnets instead of electronics). Initially, however, ENIAC had an inflexible architecture which essentially required rewiring to change its programming.
Several developers of ENIAC, recognizing its flaws, came up with a far more flexible and elegant design, which came to be known as the stored program architecture or von Neumann architecture. This design was first formally described by John von Neumann in the paper "First Draft of a Report on the EDVAC", published in 1945. A number of projects to develop computers based on the stored program architecture commenced around this time, the first of these being completed in Great Britain. The first to be demonstrated working was the Manchester Small-Scale Experimental Machine (SSEM) or "Baby". However, the EDSAC, completed a year after SSEM, was perhaps the first practical implementation of the stored program design. Shortly thereafter, the machine originally described by von Neumann's paper—EDVAC—was completed but did not see full-time use for an additional two years.
Nearly all modern computers implement some form of the stored program architecture, making it the single trait by which the word "computer" is now defined. By this standard, many earlier devices would no longer be called computers by today's definition, but are usually referred to as such in their historical context. While the technologies used in computers have changed dramatically since the first electronic, general-purpose computers of the 1940s, most still use the von Neumann architecture. The design made the universal computer a practical reality.
Vacuum tube-based computers were in use throughout the 1950s, but were largely replaced in the 1960s by transistor-based devices, which were smaller, faster, cheaper, used less power and were more reliable. These factors allowed computers to be produced on an unprecedented commercial scale. By the 1970s, the adoption of integrated circuit technology and the subsequent creation of microprocessors such as the Intel 4004 caused another leap in size, speed, cost and reliability. By the 1980s, computers had become sufficiently small and cheap to replace simple mechanical controls in domestic appliances such as washing machines. Around the same time, computers became widely accessible for personal use by individuals in the form of home computers and the now ubiquitous personal computer. In conjunction with the widespread growth of the Internet since the 1990s, personal computers are becoming as common as the television and the telephone and almost all modern electronic devices contain a computer of some kind.