Nyman, Linus (Author)
Laakso, Mikael (Author)
The fork call allows a process (or running program) to create new processes. On multiprocessor systems, these processes can run concurrently in parallel. Since its birth 50 years ago, the fork has remained a central element of modern computing, both with regard to software development principles and, by extension, to hardware design, which increasingly accommodates parallelism in process execution. This article looks back at the birth of the fork system call to share, as remembered by its pioneers.
...More
Article
Kneuper, Ralf;
(2017)
Sixty Years of Software Development Life Cycle Models
(/isis/citation/CBB236951329/)
Article
Aspray, William F.;
Cortada, James W.;
(2016)
Before It Was a Giant: The Early History of Symantec, 1982-1999
(/isis/citation/CBB189385729/)
Article
Mirowski, Alexander;
(2017)
At the Electronic Crossroads Once Again: The Myth of the Modern Computer Utility in the United States
(/isis/citation/CBB369914463/)
Article
Yost, Jeffrey R.;
(2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems
(/isis/citation/CBB570334134/)
Article
Cortada, James W.;
(2002)
Studying the increased use of software applications: Insights from the case of the American petroleum industry, 1950--2000
(/isis/citation/CBB001180897/)
Article
Ensmenger, Nathan;
(2017)
From the Editor's Desk
(/isis/citation/CBB143265022/)
Review
Salem Elzway;
(2017)
Review of "The Outsourcer: The story of India's IT revolution"
(/isis/citation/CBB610334077/)
Article
Guy C. Fedorkow;
(January-March 2021)
Recovering Software for the Whirlwind Computer
(/isis/citation/CBB869829437/)
Thesis
Gerardo Con Diaz;
(2016)
Intangible Inventions: A History of Software Patenting in the United States, 1945-1985
(/isis/citation/CBB374973840/)
Article
DuPont, Quinn;
Fidler, Bradley;
(2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity
(/isis/citation/CBB760734420/)
Article
Fidler, Bradley;
Currie, Morgan;
(2016)
Infrastructure, Representation, and Historiography in BBN's Arpanet Maps
(/isis/citation/CBB826738719/)
Book
Latil, Pierre de;
(1957)
Thinking by machine: A study of cybernetics
(/isis/citation/CBB001180074/)
Article
Walden. David;
Hashizumi, Hiromichi;
(2017)
Events and Sightings: Desktop Publishing Pioneer Meeting at Computer History Museum
(/isis/citation/CBB852305963/)
Article
Yost, Jeffrey R.;
(2016)
Computer Security, Part 2 -- Editor's Introduction
(/isis/citation/CBB453922047/)
Article
Vogel, William F.;
(2017)
"The Spitting Image of a Woman Programmer": Changing Portrayals of Women in the American Computing Industry, 1958-1985
(/isis/citation/CBB857910207/)
Article
Cortada, James W.;
(July-September 2017)
IBM Branch Offices: What They Were, How They Worked, 1920sā1980s
(/isis/citation/CBB237504233/)
Article
Day, John;
(2016)
The Clamor Outside as INWG Debated: Economic War Comes to Networking
(/isis/citation/CBB243873737/)
Article
Spicer, Dag;
(July-September 2016)
Interview: Raymond Tomlinson: Email Pioneer, Part 2
(/isis/citation/CBB113069755/)
Article
Honghong Tinn;
(October 2018)
Modeling Computers and Computer Models: Manufacturing Economic-Planning Projects in Cold War Taiwan, 1959ā1968
(/isis/citation/CBB062296277/)
Book
Hally, Mike;
(2005)
Electronic brains: Stories from the dawn of the computer age
(/isis/citation/CBB001180065/)
Be the first to comment!