The Dream Machine
Rate it:
Open Preview
Read between July 17, 2019 - February 12, 2020
2%
Flag icon
“Those of you who seek salvation, stand up!” So he instinctively leapt to his feet—and smashed his head against the bottom of the keyboard. Instead of finding salvation, he saw stars. This experience, Lick would say, gave him an instant insight into the scientific method: Always be extremely careful in your work—and in your proclamations of faith.
5%
Flag icon
Nonetheless, his vision of high technology’s enhancing and empowering the individual, as opposed to serving some large institution, was quite radical for 1939—so radical, in fact, that it wouldn’t really take hold of the public’s imagination for another forty years, at which point it would reemerge as the central message of the personal-computer revolution. Even more radical, however, was Bush’s second new idea, which was the mechanism for implementing his vision. Instead of storing those countless microfilmed pages alphabetically, or according to subject, or by any of the other indexing ...more
This highlight has been truncated due to consecutive passage length restrictions.
5%
Flag icon
In any case, Bush continued, once a Memex user had created an associative trail, he or she could copy it and exchange it with others. This meant that the construction of trails would quickly become a community endeavor, which would over time produce a vast, ever-expanding, and ever more richly cross-linked web of all human knowledge. Bush never explained where this notion of associative trails had come from (if he even knew; sometimes things just pop into our heads). But there is no doubt that it ranks as the Yankee Inventor’s most profoundly original idea. Today we know it as hypertext. And ...more
7%
Flag icon
Hopper would later gain fame both as a teacher and as a pioneer in the development of high-level programming languages. Yet perhaps her best-known contribution came in the summer of 1945, when she and her colleagues were tracking down a glitch in the Mark II and discovered a large moth that had gotten crushed by one of the relay switches and shorted it out. She taped the dead moth into the logbook with the notation “First case of an actual bug being found.”
10%
Flag icon
By rendering software completely abstract and decoupling it from the physical hardware, the stored-program concept has had the paradoxical effect of making software into something that is almost physically tangible. Software has become a medium that can be molded, sculpted, and engineered on its own terms. Indeed, as the Yale University computer scientist David Gelernter has pointed out, the modern relationship between software and hardware is essentially the same as that between music and the instrument or voice that brings it to life. A single computer can transform itself into the cockpit ...more
This highlight has been truncated due to consecutive passage length restrictions.
13%
Flag icon
To do a full mathematical analysis, however, Shannon needed a way to quantify what was being transmitted through those five stages of communication. Happily, he didn’t have to look far. The term “information” had been common parlance around Bell Labs since 1928, when an engineer there named Ralph Hartley had first used it to describe the amount of message flowing through a telephone wire, as opposed to static. Building on earlier work by Bell Labs mathematician Harry Nyquist—who had called it intelligence—Hartley had defined “information” as the useful part of the signal, the part that people ...more
This highlight has been truncated due to consecutive passage length restrictions.
13%
Flag icon
Suppose you’re trying to send a birthday greeting down a telegraph line, say, or through a wireless link. The communication channel has an information capacity of so many binary digits per second. And the message likewise carries an average information content of so many binary digits per letter. But taken together, Shannon realized, these two quantities determine a fundamental speed limit, measured in binary digits per second. Above that speed limit, perfect fidelity is impossible: however cleverly you encode your message and compress it, you simply cannot make it go any faster unless you ...more
This highlight has been truncated due to consecutive passage length restrictions.
13%
Flag icon
Ultimately his fundamental theorem explains how, for example, we can casually toss around compact discs in a way that no one would have ever dared do with long-playing vinyl records: error-correcting codes inspired by Shannon’s work allow the CD player to eliminate noise due to scratches and fingerprints. Shannon’s theorem likewise explains how error-correcting computer modems can transmit data at the rate of tens of thousands of bits per second over ordinary (and relatively noisy) telephone lines. It explains how NASA scientists were able to get the Voyager spacecraft’s imagery of the planet ...more
13%
Flag icon
The technical distinction between information and meaning was too much a violation of common usage, he felt, and would just end up confusing people. Could von Neumann suggest anything better? Von Neumann’s answer was immediate, as Shannon later recounted the story: “You should call it entropy, and for two reasons.” First, von Neumann told the younger man, his formula for the information content of a message was mathematically identical to the physicists’ formula for entropy, a mathematical variable related to the flow of heat.* (Shannon was astounded to learn this; he had derived his ...more
13%
Flag icon
Wiener was not amused. More than once in his long career, the portly mathematician had been known to snore his way through a lecture until the speaker was just reaching his main conclusion: “I did that,” he would snap, suddenly wide awake. “I did that years ago.” And that appears to have been his position on information theory as well. He had a point, sort of. It all depended on how you interpreted “information theory.” If you meant the specific set of mathematical tools that Shannon was inventing for communication engineers, then no, Wiener had not had much, if anything, to do with it. ...more
14%
Flag icon
Wiener’s assistant Oliver Selfridge, who was also down in Mexico City that semester, along with Walter Pitts, remembers Wiener’s going through his reasoning for them one evening over coffee as they sat in the lovely rooftop garden of his apartment house. Given the central role of communication in his new science, Wiener explained, his first thought had been to derive a name from the Greek word for “messenger.” Unfortunately, that word was angelos, which in English had long since taken on the specific meaning of “a messenger from God.” Somehow, a new science of angelics wasn’t quite what he was ...more
This highlight has been truncated due to consecutive passage length restrictions.
14%
Flag icon
And by 1946, von Neumann, Goldstine, and Burks had laid out a more refined concept of machine architecture in “Preliminary Discussion of the Logical Design of an Electronic Computing Instrument,” a report that would prove to be even more influential than “First Draft.” Among many other things, the 1946 report pointed out how much more efficient a computer would be if it could get access to each memory address at “random”—that is, instantaneously, without having to wait until the correct address came around on a circulating tape or a mercury delay line. Naturally, such a storage scheme became ...more
14%
Flag icon
Among its innovations were conceptual aids such as the “flow chart,” a graphical technique for keeping track of how data flow from one program step to the next. The report also included numerous examples of how complex programs could be built up from simpler blocks of code, which today would be known as subroutines.
Srikanth
Neumann report 1946
16%
Flag icon
He didn’t call it the Information Age; that term would be invented later, by others. But he made it clear that this magical stuff called information lay at its heart. Information was a substance as old as the first living cell and as new as the latest technology. It was the stuff that flowed through communication channels; indeed, it was the stuff that messages were made of. But it was also the stuff that concepts and images and stored programs were made of. It was the stuff that entered the eyes and the ears, that flowed through the brain, that provided the feedback for purposeful action. ...more
19%
Flag icon
Lincoln Lab’s initial guess for the programming requirements on SAGE—that it would require perhaps a few thousand lines of computer code to run the entire air-defense system—was turning out to be the most laughable underestimate of the whole project. True, the Lincoln Lab team was hardly alone in that regard. Many computer engineers still regarded programming as an afterthought: what could be so hard about writing down a logical sequence of commands? Nonetheless, the Lincoln Lab programmers were being asked to create what would now be called a real-time operating system for the most complex ...more
This highlight has been truncated due to consecutive passage length restrictions.
22%
Flag icon
Basically, they knew, a proof in logic was just like the proofs that every new generation of high school students had to struggle through in algebra or geometry. The starting point was a set of symbolic statements known as the premises, and the goal was another symbolic statement known as the theorem. To get from one to the other, you just had to combine and modify the premises by using the rules of inference (of which there were about half a dozen). In time, if the rules were applied in the right order, the manipulations would produce the theorem. The trick was to figure out that right order. ...more
This highlight has been truncated due to consecutive passage length restrictions.
27%
Flag icon
McCarthy has always maintained that the idea simply popped into his head during that same IBM summer of 1955, almost as soon as he’d recognized the problem. If you wanted to create your programs interactively, he’d reasoned, and if nobody was going to give you your very own 704 to do it with, then the obvious answer was to get together with a bunch of other users to share a machine. And not just share it in the lockstep, line-forms-at-the-rear manner of batch processing, either. Really share it. Give everybody a remote terminal so they could all tap in to the big computer through telephone ...more
This highlight has been truncated due to consecutive passage length restrictions.
28%
Flag icon
Thanks to the proliferation of commercial machines such as the IBM 650 and 704, plus the success of Fortran, the years 1956 and 1957 had already seen new dialects emerging by the dozens (two of the languages produced during this era, Fortran itself and the business-oriented Cobol, are still in widespread use today). However, none of these efforts came close to meeting McCarthy’s standards. In all of the new languages, for example, each symbolic variable had to be assigned to a fixed block of storage in the computer’s memory, so that one block might be allocated to the variable “name,” another ...more
This highlight has been truncated due to consecutive passage length restrictions.
28%
Flag icon
A Lisp programmer could happily go on indefinitely this way, hooking up simple functions into more complicated ones, then hooking up those functions to create still more complicated functions, until things got as sophisticated as anyone could want. Indeed, this functional structure ultimately turned out to be Lisp’s most powerful and compelling feature. First, it fitted in perfectly with McCarthy’s goal of interactive, question-and-answer-style computing: all you had to do was think of each Lisp function as a question, and its value as the computer’s answer. That was one big reason McCarthy ...more
This highlight has been truncated due to consecutive passage length restrictions.
28%
Flag icon
As a Lisp programmer continued to link simpler functions into more complex ones, he or she would eventually reach a point where the whole program was a function—which, of course, would also be just another list. So to execute that program, the programmer would simply give a command for the list to evaluate itself in the context of all the definitions that had gone before. And in a truly spectacular exercise in self-reference, it would do precisely that. In effect, such a list provided the purest possible embodiment of John von Neumann’s original conception of a stored program: it was both data ...more
29%
Flag icon
Lick began the article with a metaphor: “The fig tree is pollinated only by the insect Blastophaga grossorum [the fig wasp]. The larva of the insect lives in the ovary of the fig tree, and there it gets its food. The tree and the insect are thus heavily interdependent: the tree cannot reproduce without the insect; the insect cannot eat without the tree; together, they constitute not only a viable but a productive and thriving partnership. This cooperative ‘living together in intimate association, or even close union, of two dissimilar organisms’ is called symbiosis. ... The purposes of this ...more
29%
Flag icon
symbiosis meant humans and computers working together in a partnership, with each side doing what it did best: “[Humans] will set the goals and supply the motivations. ... They will formulate hypotheses. They will ask questions. They will think of mechanisms, procedures, and models. ... They will define criteria and serve as evaluators, judging the contributions of the equipment and guiding the general line of thought. ... The information-processing equipment, for its part, will convert hypotheses into testable models and then test the models against data. ... The equipment will answer ...more
29%
Flag icon
The first and foremost challenge, said Lick, was what he called the speed mismatch: “Any present-day computer is too fast and too costly for real-time cooperative thinking with one man.” His phrasing suggests that he had already rejected as impractical the idea of everyone’s having a computer of his or her own, as Wes Clark or Ken Olsen might have advocated. “Clearly,” he wrote, “for the sake of efficiency and economy, the computer must divide its time among many users.” He was deliberately noncommittal about how this would be accomplished, noting only that time-sharing systems were currently ...more
30%
Flag icon
“No one knows what it would do to a creative brain to think creatively continuously. Perhaps the brain, like the heart, must devote most of its time to rest between beats. But I doubt that that is true. I hope it is not, because [interactive computers] can give us our first look at unfettered thought. It can allow a decision maker to do almost nothing but decision making, instead of processing data to get into position to make the decision.”
30%
Flag icon
A model, in short, is any convenient simulation of reality. However, as Lick noted in another paper29 from the 1960s, there are models, and then there are models: “Ordinary mathematical models are static models. They are representations in symbols, usually written in pencil or ink on paper. They do not behave in any way. They do not ‘solve themselves.’ For any transformation to be made, for any solution to be achieved, information contained in the model must be read out of the static form and processed in some active processor, such as a mathematician’s brain or a computing machine. A dynamic ...more
This highlight has been truncated due to consecutive passage length restrictions.
30%
Flag icon
“By far the most numerous, most sophisticated, and most important models are those that reside in men’s minds. In richness, plasticity, facility, and economy, the mental model has no peer.” Included among those mental models are images recalled from memory, expectations about the probable course of events, fantasies of what might be, perceptions of other people’s motives, unspoken assumptions about human nature, hopes, dreams, fears, paradigms—essentially all conscious thought. Of course, Lick and Taylor would continue, “[the mental model] has shortcomings. It will not stand still for careful ...more
30%
Flag icon
computers are so good at processing vast quantities of data, but much more important, according to Lick, is their potential to give us a fundamentally new way of representing knowledge. In addition to our classic formats—text, tables, diagrams, equations, and the like—we now have the power to represent knowledge as a process, an executable program. Imagine the equations that describe, say, the development of a hurricane. And now imagine a computer simulation that shows us that hurricane wandering across the Caribbean to devastate southern Florida: the equations have been brought to life by the ...more
32%
Flag icon
McCarthy’s talk had an impact, not least because at the very end of it he finally stated in public what he’d long been mulling over in private: “If computers of the kind I have advocated become the computers of the future,” he said, “then computation may someday be organized as a public utility, just as the telephone system is a public utility. We can envisage computer service companies whose subscribers are connected to them by telephone lines. Each subscriber needs to pay only for the capacity that he actually uses, but he has access to all programming languages characteristic of a very ...more
42%
Flag icon
IBM had promised that the first version of OS/360 would be available by the end of 1965, and that through the selective omission of various bells and whistles, it would run on System/360 processors with as little as sixteen kilobytes of memory. By summer, however, with the programmers falling further and further behind schedule every day, it was clear that the planners had grossly underestimated the magnitude of the task. Indeed, OS/360 would eventually go down in history as one of computerdom’s classic horror stories, just as project chief Fred Brooks’s rueful meditation on the lessons he’d ...more
47%
Flag icon
And by all accounts the wildest of the bunch was Utah’s Alan Kay, a guy who was so far out in the future that not even this crowd could take him seriously—yet so funny, so glib, and so irrepressible that they listened anyway. When it was his turn to give a presentation, Kay told them about his idea for a “Dynabook,” a little computer that you could carry around in one hand like a notebook. One face would be a screen that would display formatted text and graphics and that you could draw or write on as if it were a pad of paper. The Dynabook would communicate with other computers via radio and ...more
59%
Flag icon
Taylor also tried to keep the proceedings as easy and as informal as possible, to the point of having the conference room furnished with beanbag chairs. He even let the speakers set the rules for how each meeting would proceed, much as a card dealer could call the game in Las Vegas; thus their nickname, Dealer Meetings. And when the arguments got heated, which they often did, the minister’s son would do his best to convert a “class-one” disagreement—one in which the combatants were simply yelling at each other—into a “class two” disagreement, in which each side could explain the other side’s ...more
61%
Flag icon
In fact, says Lampson, he and his colleagues were increasingly coming to realize that the decision to focus on graphics displays undermined the most fundamental premise of time-sharing—namely, that computers are fast and humans are slow. As he would express it in a later account, “[This] relationship holds only when the people are required to play on the machine’s terms, seeing information presented slowly and inconveniently, with only the clumsiest control over its form or content. When the machine is required to play the game on the human’s terms, presenting a pageful of attractively (or ...more