Mirowski, Alexander (Author)
The term "computer utility" has been perennially present in the history of computing, though a precise definition of the term has been fleeting, even when it first appeared in the Mid-1960s. The recent resurgence of interest in the remote provision of computing power has brought with it the historical jumble of definitions that make up that term, and "computer utility" is once again being applied to computer architectures though with little justification or exposition given regarding this use. This article attempts to determine whether past and present applications of the term share any commonalities and in doing so questions whether there has ever existed a true "computer utility." To do so, incarnations of the "computer utility" are examined in two time periods--the 1960s and the 1970s--during which time computer time-sharing enjoyed significant prosperity and now as cloud computing has become increasingly popular and prolific.
...More
Article
Davies, Stephen M.;
(2017)
The Experimental Computer Programme: The First Computing Initiative for the National Health Service in England
(/isis/citation/CBB629384019/)
Review
Salem Elzway;
(2017)
Review of "The Outsourcer: The story of India's IT revolution"
(/isis/citation/CBB610334077/)
Book
Con Díaz Gerardo;
(2019)
Software Rights: How Patent Law Transformed Software Development in America
(/isis/citation/CBB992270814/)
Article
Yost, Jeffrey R.;
(2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems
(/isis/citation/CBB570334134/)
Article
Aspray, William F.;
Cortada, James W.;
(2016)
Before It Was a Giant: The Early History of Symantec, 1982-1999
(/isis/citation/CBB189385729/)
Book
Yost, Jeffrey R.;
(2005)
The computer industry
(/isis/citation/CBB001180688/)
Article
Kneuper, Ralf;
(2017)
Sixty Years of Software Development Life Cycle Models
(/isis/citation/CBB236951329/)
Book
Brian Hochman;
(2022)
The Listeners: A History of Wiretapping in the United States
(/isis/citation/CBB775086796/)
Article
Lewis, Nicholas;
(2017)
Purchasing Power: Rivalry, Dissent, and Computing Strategy in Supercomputer Selection at Los Alamos
(/isis/citation/CBB909353193/)
Book
Lamoreaux, Naomi R.;
Sokoloff, Kenneth Lee;
(2007)
Financing Innovation in the United States, 1870 to the Present
(/isis/citation/CBB000774188/)
Book
Brian Jordan Jefferson;
(2020)
Digitize and Punish: racial criminalization in the digital age
(/isis/citation/CBB018434400/)
Article
Tom Kane;
Nick Novelli;
(March 2019)
Technology for Governance, Politics, and Democracy [Special Issue Introduction]
(/isis/citation/CBB355109142/)
Book
Mark Aldrich;
(2018)
Back on Track: American Railroad Accidents and Safety, 1965–2015
(/isis/citation/CBB660965999/)
Article
Nyman, Linus;
Laakso, Mikael;
(2016)
Anecdote: Notes on the History of Fork and Join
(/isis/citation/CBB424414308/)
Chapter
Samuelson, Pamela;
(2011)
The Strange Odyssey of Software Interfaces as Intellectual Property
(/isis/citation/CBB001221563/)
Book
Simanti Dasgupta;
(2015)
BITS of Belonging: Information Technology, Water, and Neoliberal Governance in India
(/isis/citation/CBB815743248/)
Thesis
Kim, Richard S.Y.;
(2010)
Cyber-Surveillance: A Case Study in Policy and Development
(/isis/citation/CBB001567169/)
Book
Martin Campbell-Kelly;
Daniel D. Garcia-Schwartz;
(2015)
From mainframes to smartphones: A history of the international computer industry
(/isis/citation/CBB493120749/)
Article
Bultema, Patrick;
(2003)
Notes from the Field: Requirement Elicitation
(/isis/citation/CBB355987355/)
Article
Hickey, Ann M.;
Davis, Alan M.;
Kaiser, Denali;
(2003)
Requirements Elicitation Techniques: Analyzing the Gap between Technology Availability and Technology Use
(/isis/citation/CBB161177735/)
Be the first to comment!