Article ID: CBB143265022

From the Editor's Desk (2017)

unapi

This issue features articles on history of the computer networks and networking. David Hemmendinger uncovers two early and previously undocumented computer networks that predated the Arpanet by as much as a half-decade, and participant-historians John Day and Craig Partridge masterfully demonstrate just how important it is that we unpack intimidating sets of acronyms (both technical and organizational) to reveal the people, practices, and politics that lie behind them. Lastly, in the second of their two-part series on visual representations of the Arpanet, Bradley Fidler and Marie Currie explore the ways in which the original Arpanet maps are anything but straightforward depictions of the physical or spatial "reality" of the network.

...More
Citation URI
https://data.isiscb.org/isis/citation/CBB143265022/

Similar Citations

Article Cortada, James W.; (July-September 2017)
IBM Branch Offices: What They Were, How They Worked, 1920s–1980s (/isis/citation/CBB237504233/)

Article James W. Cortada; (January-March 2021)
From Lapel Pins to Coffee Cups: Links Between Corporate and Material Culture, Lessons From IBM (/isis/citation/CBB400540115/)

Book Martin Campbell-Kelly; Daniel D. Garcia-Schwartz; (2015)
From mainframes to smartphones: A history of the international computer industry (/isis/citation/CBB493120749/)

Article Day, John; (2016)
The Clamor Outside as INWG Debated: Economic War Comes to Networking (/isis/citation/CBB243873737/)

Article DuPont, Quinn; Fidler, Bradley; (2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity (/isis/citation/CBB760734420/)

Article Fidler, Bradley; Currie, Morgan; (2016)
Infrastructure, Representation, and Historiography in BBN's Arpanet Maps (/isis/citation/CBB826738719/)

Article Nyman, Linus; Laakso, Mikael; (2016)
Anecdote: Notes on the History of Fork and Join (/isis/citation/CBB424414308/)

Article Aspray, William F.; Cortada, James W.; (2016)
Before It Was a Giant: The Early History of Symantec, 1982-1999 (/isis/citation/CBB189385729/)

Article Yost, Jeffrey R.; (2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems (/isis/citation/CBB570334134/)

Article Kneuper, Ralf; (2017)
Sixty Years of Software Development Life Cycle Models (/isis/citation/CBB236951329/)

Review Salem Elzway; (2017)
Review of "The Outsourcer: The story of India's IT revolution" (/isis/citation/CBB610334077/)

Article Guy C. Fedorkow; (January-March 2021)
Recovering Software for the Whirlwind Computer (/isis/citation/CBB869829437/)

Book Johnston, Jessica R.; (2009)
Technological Turf Wars: A Case Study of the Computer Antivirus Industry (/isis/citation/CBB001230682/)

Article Raúl Rojas; (January-March 2021)
The Computer Programs of Charles Babbage (/isis/citation/CBB256735074/)

Chapter Richard Judy, Robert Clough; (1990)
Soviet computing in the 1980s: A survey of the software and the applications (/isis/citation/CBB001180069/)

Authors & Contributors
Cortada, James W.
Fidler, Bradley Reuben
Yost, Jeffrey R.
Guy C. Fedorkow
Elzway, Salem
Currie, Morgan
Journals
IEEE Annals of the History of Computing
Journal of the American Association for History and Computing
Iterations: An Interdisciplinary Journal of Software History
Publishers
George Mason University
Temple University Press
Harvard University Press
Academic Press
Concepts
History of Computing
Software
Computer networks
International Business Machines Corporation
Computer industry
Computer security; cyber security
People
Conway, Melvin
Babbage, Charles
Time Periods
20th century
21st century
20th century, late
19th century
Places
United States
Europe
Soviet Union
India
Institutions
Control Data Corporation
Peter Norton Computing Corporation
Symantec Corporation
International Network Working Group
Charles Babbage Institute, University of Minnesota
Los Alamos Scientific Laboratory
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment