This article sets out the principal achievements of an Italian-born Australian inventor, Monte Sala, who exhibited an ability to solve complex electronic problems and to design and build world-class devices. His career spanned radio and TV, NASA space tracking, vision research experiments, telemetry, Pay-TV, and cyrptography, all the time designing, developing, manufacturing, and promoting electronic devices of all kinds. He established a fledgling electronics industry in Western Australia (for which he was awarded the Order of Australia), and his career reached its climax with the invention of devices for encrypting data on communications lines—these were sold worldwide, despite some high-level opposition, culminating in adoption by SWIFT, the international bank clearinghouse.
...MoreArticle Sebastian K. Boell; Janet M. Toland (2023) Histories of Computing in Oceania. IEEE Annals of the History of Computing (pp. 6-10).
Book
Lennon, Brian;
(2018)
Passwords: philology, security, authentication
(/isis/citation/CBB427866448/)
Article
DuPont, Quinn;
Fidler, Bradley;
(2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity
(/isis/citation/CBB760734420/)
Article
Jerome H. Saltzer;
(January-March 2021)
On the Origin of Kerberos
(/isis/citation/CBB051933073/)
Book
Duane C. Wilson;
(2021)
Cybersecurity
(/isis/citation/CBB201310866/)
Article
Thomas Haigh;
Mark Priestley;
(July 2020)
Contextualizing Colossus: Codebreaking Technology and Institutional Capabilities
(/isis/citation/CBB455159316/)
Article
Sarah Myers West;
(June 2022)
Cryptography as information control
(/isis/citation/CBB869396949/)
Article
Foley, Jillian;
(March 2019)
Regulating Contested Reality: The Failure of US Encryption Regulations
(/isis/citation/CBB627277329/)
Article
Misa, Thomas J.;
(2016)
Computer Security Discourse at RAND, SDC, and NSA (1958-1970)
(/isis/citation/CBB851516279/)
Article
Yost, Jeffrey R.;
(2016)
Computer Security, Part 2 -- Editor's Introduction
(/isis/citation/CBB453922047/)
Article
Yost, Jeffrey R.;
(2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems
(/isis/citation/CBB570334134/)
Article
Aspray, William F.;
Cortada, James W.;
(2016)
Before It Was a Giant: The Early History of Symantec, 1982-1999
(/isis/citation/CBB189385729/)
Article
Rebecca Slayton;
Brian Clarke;
(January 2020)
Trusting Infrastructure: The Emergence of Computer Security Incident Response, 1989–2005
(/isis/citation/CBB421929386/)
Thesis
Gili Vidan;
(2021)
Trading on Trust: Cryptographic Authentication and Digital Decentralization in the United States, 1968–2000
(/isis/citation/CBB882929007/)
Book
Richard Coyne;
(2023)
Cryptographic City: Decoding the Smart Metropolis
(/isis/citation/CBB732227675/)
Book
Megan Prelinger;
(2015)
Inside the Machine: Art and Invention in the Electronic Age
(/isis/citation/CBB012374546/)
Book
Cheung, Derek T.;
Brach, Eric;
(2014)
Conquering the Electron: The Geniuses, Visionaries, Egomaniacs, and Scoundrels Who Built Our Electronic Age
(/isis/citation/CBB001422636/)
Article
Mills, Allan;
(2007)
A Classic Scientific Instrument: The Resistance Box
(/isis/citation/CBB000831645/)
Article
Mills, Mara;
(2008)
Another Etymology for “Bionic”: Hearing Aids and Disability History at Kent State
(/isis/citation/CBB001021169/)
Article
Altshuler, N. S.;
Larionov, A. L.;
(2011)
Biography of S. A. Altshuler, Correspondent Member of the Soviet Academy of Sciences, as Told by Himself
(/isis/citation/CBB001211399/)
Article
Friedel, Robert;
(Fall 2010)
Transistor
(/isis/citation/CBB508896793/)
Be the first to comment!