ENIAC Issue of Penn Printout

advertisement
PENNPRINTOUT
VOLUME 12:4 MARCH 1996
February 14, 1946: The birth of the information age
march
Front cover: Public announcement of ENIAC, 1946.
From left: J. Presper Eckert, Chief Engineer;
Prof. J. G. Brainerd, project supervisor;
Sam Feltman, Chief Engineer for Ballistics, Ordnance Dept.;
Captain H. H. Goldstine, Liaison Officer;
Dr. J. W. Mauchly, Consulting Engineer;
Dean Harold Pender, Moore School of Electrical Engineering;
General G. M. Barnes, Chief, Ordnance R&D Service;
Colonel Paul N. Gillon, Chief, Research Branch, ORDS.
(Photo: John Mauchly Papers, Dept. of Special Collections,
University of Pennsylvania Library)
Below: Detail of the circuit design for the accumulator
sections of the ENIAC II chip (see page 7).
Back cover: Test fabrication of the accumulator sections
of the ENIAC II chip. The actual test chip (center)
measures less than a quarter of an inch square.
PENNPRINTOUT
Judy Smith, managing editor
Randall Couch, art direction
Teresa Leo, design
Celeste Stewart, design
Edda Katz, editing
Caroline Ferguson, editing
features
3
a golden anniversary
Gregory C. Farrington and Peter C. Patton toast ENIAC
4
abacus to eniac
Highlights in the history of computing
7
eniac-on-a-chip
Jan van der Spiegel cuts 30 tons down to size
8
crackpot notions
Dilys Winegrad tells the story of ENIAC
12
john w. mauchly: the man and the machine
Michael T. Ryan on the Penn Library’s exhibition
15
eniac golden anniversary events
Highlights for February and March
16
a birthday card to eniac
A gallery of greetings
18
cybersociety 2046
Jill Maser asks students about computing’s next 50 years
22
eniac‘s recessive gene
Mitch Marcus and Atsushi Akera on ENIAC’s progeny
Penn Printout is published by
Information Systems and Computing
University of Pennsylvania
Harnwell House, Suite 211
3820 Locust Walk
Philadelphia, PA 19104-6134
Send e-mail to: printout@isc.upenn.edu
Penn Printout Online contains the electronic
versions of Penn Printout and includes
archives dating back to September 1991:
http://www.upenn.edu/pennprintout/
24
jack
Norman I. Badler animates a model virtual employee
26
media power
John MacDermott finds new technology in education
departments
21
announcements
28
electronic calendar
30
random bits
31
q&a
Printed on acid-free, recycled paper.
Please recycle this issue.
2
PENNPRINTOUT
golden
a golden
anniversary
BY GREGORY C. FARRINGTON AND PETER C. PATTON
V
alentine’s Day 1996 marks the 50th anniversary
of the ENIAC, the world’s first general-purpose
electronic computer, created at the Moore
School of Electrical Engineering at the University of
Pennsylvania. Many historians
date the beginning of the information age to the hushed moment when the ENIAC’s 18,000
vacuum tubes first began to glow.
The subsequent history of
computing parallels the history
of printing. The development of
the rotary press in the early 1800s,
some 300 years after Gutenberg
invented moveable type, made
inexpensive printing possible and
gave birth to the great information age of print. Literacy rates
rose dramatically, and universal
education became economically
feasible.
What took centuries for
printing took only a few decades
for the computer. By the early
1980s, miniaturization had made
possible powerful, inexpensive
desktop computers. Only a decade ago, computers made the
transition from machines for
computation to machines for
communication. Desktop computers have become inexpensive
telecommunications centers, transmitting data, print, sound,
and video around the world.
When George Orwell created his nightmare vision,
1984, new communications tools were feared as instruments for enslavement. Now they are more frequently
seen as engines of freedom. Many argue that the Berlin
Wall fell and the governments in Eastern Europe and the
Soviet Union collapsed because of fax machines and
PCs. With these new technologies it is no longer possible
to wall out information and isolate people. Politically
and economically computers have become the revolutionary artillery of the 21st century.
march 1996
1996
march
Now a global economy is developing, made possible
by rapid, computer-based telecommunications. Similarly
politics, health care delivery, and the structure of the
corporation are being transformed as the information age
gathers momentum.
How we educate and learn
is also changing. When
information can be anywhere
and everywhere, instantly, and
students and faculty can
interact wherever they might
be, not just in the classroom,
the stage is set for a transformation in how students learn
and how schools serve society.
Technology gave us the
“information society.”
Humans can now create a
more democratic “learning
society” in which information
access and a quality education
will increasingly become
available to all. The richest
information resources from
the largest libraries can be
brought to the middle of the
smallest town. Computers do
not care if you are witty,
handsome, rich or poor, black
or white—or live in the center
of New York or the middle of
Peru. You can be connected to
the world, learn and teach, run a business, make money or
lose it, or just talk to colleagues and friends around the
world.
The real revolution the ENIAC created is not one of
numbers and bytes, but one in which people, regardless of
geography and politics, can communicate with and learn
from each other. The computer has become a tool of
personal liberation, and the revolution has only begun.
GREGORY C. FARRINGTON is Dean, School of Engineering and Applied Science; PETER C. PATTON is Vice
Provost, Office of Information Systems and Computing.
33
abacus
to
eniac
highlights in the history of computing
From ancient times, people have
used digital devices as computational aids. Fingers and toes, the
quintessential digital devices,
gradually gave way to sticks and
pebbles. Stone counters, used by
the Greeks before 450 B.C., were
an early form of abacus that the
Romans adopted around 50 B.C.
and which later developed into
the medieval European counting
board. Some of the highlights
along the road that led to the
ENIAC are listed here; the
chronology is based on material
in Landmarks in Digital Computing: A Smithsonian Pictorial
History by Peggy A. Kidwell and
Paul E. Ceruzzi (1994).
4
1300
The abacus, using beads strung on wires and mounted in a
frame, was in widespread use in China.
1500
The quipu, a system of knotted strings, was in extensive use by
Peruvian Incas.
1614
John Napier described logarithms.
1617
Napier described his calculating rods, or “bones,” in a book
published the year he died.
1623
Wilhelm Schickard, in a letter to Johannes Kepler, gave the first
known description of an automatic adding machine.
1642
Blaise Pascal invented an adding machine; it is the oldest
surviving example of a true adding machine where tens carry.
1673
Gottfried Wilhelm Leibniz’s calculator mechanized multiplication as well as addition.
1803
Joseph Marie Jacquard began work on an automatic loom that
used punched cards to control the manufacturing process.
1822
Charles Babbage completed a model of the difference engine, a
device that linked adding and subtracting mechanisms to one
another to calculate the values of more complex mathematical
functions.
1834
Babbage turned from construction of the difference engine to a
far more ambitious analytical engine: a machine that embodied
in its design most of the features of a modern digital computer.
1843
Ada Augusta, Countess of Lovelace, published a description of
Babbage’s analytical engine that incorporated many of the
concepts of modern computer programming.
1851
Victor Schilt exhibited a key-driven adding machine at the
Crystal Palace Exposition in London.
1853
The Scheutz difference engine, the world’s first printing
calculator, was completed.
1854
George Boole published Laws of Thought, which led to what
would be called Boolean algebra. His rules for manipulating
logical expressions would be adopted by computer designers as
the basis for the electronic circuits or “logic” of computers.
1879
James and John Ritty patented a cash register.
1884
John H. Patterson and his associates acquired the Ritty patents
and established National Cash Register Company (NCR).
1885
Dorr Felt constructed the “macaroni box” prototype for his keydriven adding machine.
PENNPRINTOUT
1890
Hollerith punched-card equipment was used in the U.S. census.
1891
William S. Burroughs began commercial manufacture of his
printing adding machine.
1893
The Millionaire calculator, introduced in Switzerland, allowed
direct multiplication by any digit and was used by government
agencies and scientists, especially astronomers, well into the
20th century.
1911
Charles Flint founded the Computing-Tabulating-Recording
Company (C-T-R), which produced and sold electronic Hollerith tabulating equipment, time clocks, and other business
machinery. James Powers began manufacturing a mechanical
punched-card system that competed with Hollerith’s. His
machines eventually were made and sold by the RemingtonRand Corporation.
1917- At Aberdeen Proving Ground, in Maryland, mathematical
1918 techniques for computing and printing firing tables for new
types of advanced ordnance used in WWI were developed.
1918
Charles Kettering developed the Kettering Bug—an unmanned
flying bomb guided by internal gyroscopes.
1919
Early versions of the Enigma cipher machine were built in
Europe.
1924
Thomas Watson, President of C-T-R, changed the company’s
name to International Business Machines Corporation.
1928
IBM adopted the 80-column punched card, the standard for the
next 50 years.
1930
Vannevar Bush of MIT developed the differential analyzer, a
large analog computer.
1936
Alan Turing, a British mathematician, published “On Computable Numbers...,” a description of a “machine” that could in
principle solve any mathematical problem presented to it in
symbolic form. His proof of the feasibility of building a
“general purpose machine” provided the theoretical basis for
modern computer software.
1937
George Stibitz, a research mathematician at Bell Telephone
Laboratories, built a binary adder out of a few light bulbs,
batteries, and wire on his kitchen table. His Model K (for
“kitchen”) demonstrated the feasibility of mechanizing binary
arithmetic.
1938
Claude Shannon of MIT showed in theory what Stibitz had
demonstrated with the
(continued on next page)
march 1996
5
Model K: that the two-valued algebra developed by George
Boole could be implemented electrically by telephone relays.
Konrad Zuse, a German mechanical engineer, began building a
mechanical computer in his parents’ Berlin apartment. Independently of Shannon, he developed a form of symbolic logic to
assist in the design of the binary circuits.
6
1939
The World’s Fair in New York featured many exhibits showing
the promise of technology. Among them were Electro, a robot
man that exhibited simple intelligence. J.V. Atanasoff began
work on an electronic computer at Iowa State University.
George Stibitz and Samuel Williams of Bell Labs completed the
Complex Number Computer (later known as the Bell Labs
Model I), which used telephone relays and coded decimal
numbers as groups of four binary digits each.
1940
Stibitz demonstrated the Bell Labs Model I at Dartmouth
College, with a terminal in New Hampshire and the Model I in
New York. Twenty years later Dartmouth would become a
center for time-sharing and remote use of computers.
1941
Within a few days of America’s entry into WWII, Konrad Zuse
demonstrated a working, programmable calculator to German
military authorities. His Z3 used surplus telephone relays and
was programmed by holes punched into discarded 35mm movie
film.
1942
J. Presper Eckert and John W. Mauchly, of the University of
Pennsylvania, proposed an electronic version of the Bush
differential analyzer for the Army, which would operate
digitally instead of by analog means. The proposal led to the
creation of the ENIAC.
1943
Electromechanical Bombes were built in Britan and the U.S. to
decipher German messages encrypted by Enigma.
1944
The first of several Colossus machines was completed in
Britain, using vacuum tubes instead of relay circuits to decipher
German messages. The ASCC, also known as the Harvard
Mark I, was unveiled at Cruft Laboratory in Cambridge,
Massachusetts.
1945
The ENIAC was completed and tested at the Moore School of
Electrical Engineering, University of Pennsylvania. Konrad
Zuse completed the Z4, a large electromechanical programmable machine, shortly before VE-day (May 8). The “First
Draft of a Report on the EDVAC,” by John von Neumann,
summarized discussions at the Moore School concerning the
proposed successor to the ENIAC. Von Neumann’s reputation
as a world-class mathematician, as well as his description of the
EDVAC in symbolic rather than engineering terms, helped win
widespread acceptance of this design.
1946
February 14: The public unveiling of the ENIAC took place in
Philadelphia. Summer: A series of lectures on the “Theory and
Techniques for Design of Electronic Digital Computers” was
given at the Moore School. The course led to widespread
adoption of the EDVAC-type design, including stored programs,
for nearly all subsequent computer development.
PENNPRINTOUT
ENIAC-on-a-Chip
BY JAN VAN DER SPIEGEL
T
ake the ENIAC, an 80 by 3 foot giant, and shrink
it to fit a silicon chip the size of your fingernail.
Place the chip on a tiny circuit board. Connect
the circuit board to a PC running graphical software
simulating the ENIAC’s look and feel. This is the recipe
that students and faculty at the School of Engineering
and Applied Science—with support from the National
Science Foundation and Atmel Corporation—are using to
create the ENIAC-on-a-Chip Kit, a teaching tool that
dramatically illustrates the performance improvements
brought about by semiconductor technology.
The chip preserves the ENIAC’s original architecture
and basic circuit building blocks as much as possible. To
recreate the giant computer using modern technology, the
ENIAC’s 18,000 vacuum tubes and 170,000 resistors
were modeled with 250,000 tiny transistors, mechanical
switches were replaced with electronic ones, and digit
and programming trunks were implemented as tiny metal
lines interconnected through cross-point switches. The
chip performs the same functions that its 30-ton predecessor pioneered 50 years ago. ENIAC-on-a-Chip
includes the following units:
• 20 accumulators—the arithmetic workhorses, which
also serve as memory elements
• constant transmitter—the module that allows initialization of the accumulators to a constant integer
• cycling unit—the master clock that synchronizes the
operation of all modules
• initiation unit—the element that tells all modules when
to start computation
• function table—the module that gives arbitrary
functional dependence for the input
• master programmer—the higher level arithmetic
coordinator that allows more sophisticated programming of the chip
• high-speed multiplier—the module that manipulates
the accumulators to perform multiplication
• divider—the module that manipulates the accumulators
to perform division
• square rooter—the module that manipulates the
accumulators to perform square roots
march 1996
The chip, fabricated in a technology whose smallest
features are .8 micrometers, is due back from the silicon
foundry in mid-April. Following is a comparison between
the ENIAC and ENIAC-on-a-Chip:
Vacuum tubes
Transistors
Resistors
Capacitors
Footprint
Clock speed
Power
ENIAC
ENIAC-on-a Chip
18,000
none
170,000
10,000
80x3 ft
100 kHz
174 kW
none
250,000
none
none
8x8 mm
20 MHz*
0.5 W*
*estimated
Once back from the foundry, the chip will be mounted
on a small, printed circuit board and connected to a PC.
The PC will be equipped with a graphical interface that
allows a user to interact with the chip. The interface will
display the front panels of the the ENIAC with its programming switches, control switches, and interconnection
cables (digit lines and programming lines). The user will
select the switches to generate the proper program settings
and interconnections to create a data file. The file will be
sent to the chip and the output of the chip (lights indicating
the output of the accumulators) will be read back into the
PC for display, allowing the user to evaluate results.
The ENIAC-on-a-Chip Kit, consisting of chip, printed
circuit board, PC software, and a set of demonstration
programs (data files), will be available to a variety of
organizations and institutions, including the National
Science Foundation and the Smithsonian. The multidimensional educational and intellectual benefits of the kit
will not only inspire students in engineering and science
but will reach out to a larger audience ranging from
historians to high school students and the public at large.
For more information about ENIAC-on-a-Chip, the
Kit, and the student and faculty developers, see http://
www.ee.upenn.edu/~jan/eniacproj.html.
JAN VAN DER SPIEGEL is Professor of Electrical
Engineering at the School of Engineering and Applied
Science.
7
crackpot notions
the story of
ENIAC
BY DILYS WINEGRAD
O
n February 14, 1946, The New York Times
announced the unveiling of “an amazing
machine which applies electronic speeds for the
first time to mathematical tasks hitherto too difficult and
cumbersome for solution.” “Leaders who saw the device
in action for the first time,” the report continued, “heralded it as a tool with which to begin to rebuild scientific
affairs on new foundations.” With these prophetic words,
the world’s first large-scale electronic general-purpose
digital computer, developed at the Moore School of
Electrical Engineering at the University of Pennsylvania
in Philadelphia, emerged from the wraps of secrecy
under which it had been constructed in the last years of
World War II.
The Times reporter went on to predict that the advent
of a flexible computer would revolutionize all areas of
science. A great many mathematical models that had
been around for generations were suddenly practical
propositions available for use by engineers and physicists. Once the new invention had been put through its
paces in public, there was widespread interest in seeing
how it worked. In the summer of 1946 an expert
audience attended the famous Moore School Lectures, at
which the speakers constituted a veritable who’s who of
computing. The significance of the ideas was variously
received, some participants remaining less than convinced. Nonetheless, the National Bureau of Standards
was sufficiently persuaded to begin building its own
computers. And Project Whirlwind at the Massachusetts
Institute of Technology finally changed from analog to
digital technology.
Skepticism was by no means confined to proponents
of rival technologies. Banks and insurance companies,
far from grasping the potential of the computer, seem to
have been put off by the notion of turning decisions, even
8
repetitive ones, over to a machine. Adolph Matz, a
Wharton School professor, predicted that “completion of
the first all-electronic general-purpose computing
machine [would open] the future to the development of
business machines heretofore undreamed of . . . and may
well also revolutionize methods and systems of dealing
with everyday business transactions.” But in 1945 his
ideas on applications to commercial enterprise were
dismissed as “too ephemeral,” and his article, “Electronics in Accounting,” was initially rejected by the official
magazine of the Association of Accountants. As John
Maynard Keynes observed, “The difficulty lies not in the
new ideas, but in escaping the old ones.” In this spirit,
Lord Kelvin in 1887 observed that radio had no future,
the telephone was described in 1876 as “only a toy”—
and John Logie Baird was kicked out of an office in 1925
as a possibly dangerous lunatic for claiming to have “a
machine for seeing by radio.”
In the 1940s, however, the nation had been ready for
a breakthrough in computer technology. Not surprisingly, the quantum leap in computer development
occurred during World War II in response to urgent
military needs. During the national emergency, the
Moore School’s differential analyzer—the most sophisticated computing instrument available for scientific use
before the ENIAC—was in constant use working out
ballistic tables. A course in the design of electromechanical instruments had also been instituted at the
School. At any other time the ideas that were elaborated
and put into effect at the University of Pennsylvania
would have been dismissed as interesting, impractical—
and certainly too expensive.
A variety of personnel had arrived at the Moore
School to serve in the war effort. Large numbers of
“human computers”—young women with mathematics
PENNPRINTOUT
degrees, supplemented by other specially trained recruits—were engaged in computing the ballistic tables,
and select students attended the Moore School’s Engineering, Science, Management War Training course
(ESMWT) at government expense. Several PhDs among
them were hired to replace the Penn professors who had
been called up. One of these, John W. Mauchly, who
taught physics at neighboring Ursinus College, had
originally signed up for a course on the theory and design
of computing instruments.
The graduate student responsible for running the lab
associated with the ESMWT course, John Presper Eckert,
Jr., was described at the time as “undoubtedly the best
electronic engineer in the Moore School.” Still in his
early twenties, Eckert had already secured a patent for
recording sound on film. The Navy adopted a device he
had developed to check the effectiveness of magnetic
mine sweeping airplanes. Eckert and Mauchly found
time to chat about the ideas that fascinated both.
Because his primary research interest in meteorology
involved enormous amounts of statistical data, Mauchly
was constantly looking for ways to speed up computation. He had already investigated the use of cold cathode
tubes—much slower than vacuum tubes and with a
poorer margin of safety, but with the advantage that they
dissipated less power and were far more economical. For
his meteorological investigations, he had constructed an
analog device that he named a “harmonic analyzer.”
Eckert soon decided that Mauchly’s ideas on
electronic computation were technically feasible. He
immediately set about applying his engineering ingenuity
and native genius to the problems that would have to be
worked out. Encouraged by Eckert’s receptivity to his
the response that greeted his proposals for developing an
electronic computer. Knowing this, when the American
Association for the Advancement of Science met at Penn
in 1940, Mauchly had opted to deliver his paper on
weather statistics to the physics section. In the audience
was John Atanasoff, a professor from Iowa State University, who, together with his graduate student Clyde Berry,
was at work on an electromechanical rotary dynamic
storage register. Mauchly and Atanasoff discussed their
mutual interests then and on subsequent occasions.
The machine Atanasoff proposed permitted a number
to be added to another number that had previously been
“stored” in the form of electrostatic charges. Designed to
solve a single class of problems, not at electronic speeds,
it had no programming. Like many ingenious inventions,
it was never finished. Although not a computer in any
useful sense, years later when the importance of computers had been fully recognized, this device was adjudged
“prior art” by a Federal court. The decision, which
denied eligibility for patent protection to the Eckert/
Mauchly invention, came in the context of business
interests and a rapidly expanding computer industry.
Before the war, researchers at the Moore School had
used the School’s version of the differential analyzer,
then the largest mechanical computing machine in the
world, to study nonlinear and varying-parameter differential equations. When the Army took over operations in
1942, the Moore School became something of an
extension of the BRL for the remaining war years—an
early model of university/government cooperation. The
human computers working on ballistics using hand-held
calculators came under the supervision of Lieutenant
Herman Goldstine, a young, Chicago-trained
It seems barely credible that scientists, engineers,
and businessmen five scant decades ago did not
grasp the implications of the new technology.
theoretical ideas and spurred by the serious consideration
that they might be implemented, Mauchly wrote a fivepage memo entitled “The Use of Vacuum Tube Devices
in Calculating.” Among other things, he pointed out that
an electronic machine performing 1,000 multiplications
per second would be able to compute complete trajectories in minutes rather than days. This memo became
the basis of the report subsequently submitted by the
Moore School to the Army’s Ballistic Research
Laboratory (BRL).
The meteorological community considered
Mauchly’s theories crackpot notions, which was much
march
march 1996
1996
mathematician stationed at the BRL.
A trajectory that could take up to 40 hours to
calculate using a desktop calculator could be computed in
30 minutes or so on the differential analyzer. But, since
each firing table involved hundreds of trajectories, it
might still require the best part of a month to complete a
table. In 1943 the Allies landed in North Africa, an event
that presented the military with totally new terrain and a
whole new set of problems for operating ordnance. The
growing backlog of firing tables provided the
final impetus for serious experimentation in the field
of computers.
(continued on next page)
99
Aware that the military were more likely than other
government agencies to take a calculated risk in time of
war, Goldstine saw a possible solution to the problems
besetting them in the enthusiastic discussions of electronic digital computing going on at the Moore School.
He briefed his superior at the Aberdeen Proving Ground
in Maryland, and a presentation was arranged at which
Penn Professor John Brainerd submitted a proposal to the
head of the BRL and its chief scientist, Oswald Veblen.
To forestall anticipated skepticism, Brainerd, who
chaired the faculty committee that supervised the
analyzer, proposed an “electronic diff. analyzer,” intentionally associating the proposed computer with the
existing differential analyzer. (As a digital device, the
proposed computer would solve differential equations by
differencing rather than differentiation—a deliberate
double entendre.) The computer described would be able
compute a trajectory in under five minutes. Unlike all
previous models, it would be fully electronic.
After delivering their report the inventors continued
to work around the clock to produce supporting arguments and data and to prepare answers to possible
questions. A few days later, on Eckert’s 24th birthday,
April 9, 1943, they presented a more detailed proposal.
In May agreement was reached, and on June 5 contract
No. W-670-ORD-4926 was signed by the Trustees of the
University of Pennsylvania and the U.S. Army Ordnance
Department with Brainerd as project supervisor, Eckert
as chief engineer, Mauchly as principal consultant, and
Goldstine as technical liaison. The machine was officially named the Electronic Numerical Integrator And
Computer, ever after to be known as ENIAC.
Among the wonders of the “new electronic speed
marvel” reported in The New York Times after the
ENIAC’s demonstration run in February, 1946, was the
absence of any moving mechanical parts associated with
Scenes from the dedication.
The original press release
describing the ENIAC’s
physical aspects and operation; J. Presper Eckert poses
at the console; an invitation
to the dedication ceremonies
and dinner; and the development team and sponsors
(identified on page 2).
Photos: John Mauchly
Papers, Department of
Special Collections, University of Pennsylvania Library.
Documents: University of
Pennsylvania
10 Archives.
the high-speed computational aspects of the machine,
which consisted of “18,000 vacuum tubes and several
miles of wiring.” All prior machines had relied on such
parts to perform their calculations, and these limited their
compactness and reliability, not to mention the speed
with which operations were executed. Astoundingly—
for the time—the ENIAC could perform 5,000 additions
or subtractions or 360 multiplications of two 10-digit
decimal numbers in a second. In the same space of time,
it could call up 1,000 values of a function from function
tables that were included. Problems that would have
taken months of simple hand calculation and hours, even
days, with the help of the differential analyzer could now
be dispatched in minutes.
At a certain stage in its development it became
necessary to “freeze” the classified design in the interest
of completing the project at hand. Nonetheless, as the
end of the war approached, engineers at the Moore
School were beginning to think intensively about
developing a more sophisticated computer. From the
first Mauchly had envisaged a general-purpose machine,
and he continued to work towards its construction.
Eckert proposed ways to overcome what he recognized
as the ENIAC’s major shortcoming: The computer
introduced almost every fundamental hardware concept
of modern computing—with the exception of internally
stored instructions.
The inventors focused on methods to increase the
machine’s memory. Having experimented with acoustic
delay lines earlier on, extrapolating from those developed
by William Shockley at Bell Laboratories, Eckert and his
engineers now investigated the possibility of developing
a mercury delay line suitable for computer memory. For
the time being it was not possible to implement the stored
program they proposed, but the mercury delay line
became an element of the next generation of computers
PENNPRINTOUT
at the Moore School and elsewhere. These included the
EDVAC, the second large computer developed at Penn
and the first in the country to incorporate a stored
memory; the EDSAC developed by Maurice Wilkes in
England; and the computers designed by Mauchly and
Eckert after leaving the Moore School. The concept of
storing the program in the same memory unit as the data
was introduced when the Institute for Advanced Studies
(IAS) computer was built a few years later by a team
headed by John von Neumann. While commuting between Los Alamos and the Institute for Advanced Study
in the last year of the war, von Neumann had participated
in the highly classified discussions at the Moore School.
When it was built, the IAS computer used a so-called
Williams electrostatic storage tube for the memory.
The Moore School team started work on the EDVAC
in late 1944 when the Army Ordnance Department
granted the ENIAC contract a supplement for an improved design. As a stored program device, the Electronic Discrete Variable Automatic Computer (EDVAC)
was the true forebear of all subsequent computing
devices. All of the early computers, including one called
the MANIAC, acknowledged their relationship to the
Moore School computers through their shared suffix.
While the letter “A” had only stood for and in the
Electronic Numeral Integrator and Computer (ENIAC),
in the successor machine—and ever afterwards—it
finally indicated a fully automatic device.
The ENIAC was completed too late to be utilized for
its original purpose of calculating firing and ballistic
tables. Instead, the first task assigned on its test run in
1945 involved the many thousands of computations
connected with top-secret studies on thermonuclear
reactions. While many projects had to be scrapped at the
end of the war, ENIAC was not among them. The
computer had proved to be significant for military
march 1996
research at Los Alamos in the West as well as at the
Ballistic Research Laboratory in the East. Indeed, the
successful simulation of a nuclear blast resulted in the
Federal government’s supporting a nascent computing
technology, soon to spawn a new industry.
Today it is impossible to think of a world without
computers or to imagine that the ideas from which they
developed, and which we now take for granted, might
have been strenuously resisted when they were first
proposed. It may seem barely credible today that
scientists, engineers, and businessmen five scant decades
ago might not have immediately grasped the implications
of the new technology. But this has been the case more
often than not throughout the course of human endeavor;
variations on the theme of “Who needs it?” are quickly
followed by reasons why it can’t be done. Notable
examples range from Nobel laureate Robert Millikan’s
assurances that man could never tap the power of the
atom to Harry M. Warner’s skepticism about the market
for talking movies. As late as the 1950s Britain’s
Astronomer Royal dismissed the notion of space travel as
“utter bilge.”
With the development of the ENIAC at the University of Pennsylvania, the City of Philadelphia acquired a
second site where ideas produced a revolution. Not
unlike Independence Hall, the Moore School provided
surroundings in which abstract theories became reality,
opening paths to new technologies that have changed our
ability to investigate the world and conduct every
transaction imaginable in ways that continue to evolve.
The first operating computer of its sort is justly famed
and a reason for celebration as the events related here
become remote, though hardly ancient, history.
DILYS WINEGRAD is Director/Curator of Arthur Ross
Gallery at the University of Pennsylvania.
11
BY MICHAEL T. RYAN
john w. mauchly
the man and the machine
In Tom Stoppard’s Arcadia, Valentine, a young scientist, muses over a conundrum: “The ordinary-sized stuff which
is our lives, the things people write poetry about – clouds – daffodils – waterfalls – and what happens in a cup of coffee
when the creme goes in – these things are full of mystery, as mysterious to us as the heavens were to the Greeks. We’re
better at predicting events at the edge of the galaxy or inside the nucleus of an atom than whether it’ll rain on auntie’s
garden party three Sundays from now. Because the problem turns out to be different. We can’t even predict the next drip
from a dripping tap when it gets irregular. Each drip sets up the conditions for the next, the smallest variation blows the
prediction apart, and the weather is unpredictable the same way, will always be unpredictable.”
No one would have appreciated the force of Valentine’s remarks more than John W. Mauchly. Attempting to solve
“the problem of the weather” was an issue he wrestled with for a good part of his career. It was one of a number of
projects that fueled his interest in computing machines, and one of several problems that the ENIAC was to have solved.
Yet if the ENIAC could not predict the weather, it could do a lot of other things, enough to earn Mauchly and his
collaborator Presper Eckert a distinguished place in the pantheon of 20th-century scientists and engineers whose work
has made a difference. Mauchly’s career and achievements are the subject of a major exhibition in the Rosenwald
Gallery of the Van Pelt Library, which is being mounted as part of the Year of the Computer activities. Curated by
Atsushi Akera and Asaf Goldschmidt of the Department of the History and Sociology of Science, with assistance from
Dr. Nancy Shawcross, the Library’s Curator of Manuscripts, John W. Mauchly and the Development of the ENIAC
Computer is based primarily on the Mauchly Papers in the Library and on the ENIAC project records in the University
Archives. It presents an intelligent and sympathetic view of the man who designed the world’s first digital electronic
computer and offers a fresh assessment of the nature of his achievement.
The son of a physicist, Mauchly received a PhD in Physics from Johns Hopkins in 1932. Finding an academic
position during the depths of the Depression was not easy, but Mauchly was able to secure an appointment at Ursinus
College, a small liberal arts school outside of Philadelphia. However, Mauchly soon came to realize that conducting
research in a small college was difficult, if not impossible. The annual operating budget of his Physics Department was
around $50! The exhibit pays close attention to Mauchly’s professional development in the years before the war,
12
PENNPRINTOUT
portraying for us a deeply committed and inventive scientist who made a virtue of scarcity. The very absence of equipment,
colleagues, and funding seemed to move him to look for new and faster ways to do the complex and laborious calculations
needed to solve a variety of problems based on accumulating and manipulating larger and larger amounts of data. What was
needed to process the data was a rapid, accurate, multifunctional calculating device.
Mauchly came to the Moore School of Electrical Engineering as an adjunct faculty member to take up the slack left by
those who had joined the war effort. At that time, one of the School’s principal areas of military support research was
calculating ballistics trajectories. Mauchly became involved with this research, and it proved to be the ideal stimulus for his
own interests in developing a high-speed calculating machine that could handle huge amounts of data quickly and accurately. He was joined by his lab assistant Presper Eckert, whose job it was to translate Mauchly’s ideas into implementable
form. It was Mauchly the physicist, Eckert the engineer. The road to ENIAC was in view.
The heart of the exhibit is the development of the ENIAC itself. The exhibit provides a clear and accessible description
of the device and its place in the history of computers. Although its unveiling came after the war had been concluded, its
purpose was still framed in terms of national defense. On Valentine’s Day, 1946, the ENIAC entered history by performing
a large, complicated calculation to determine the feasibility of a hydrogen bomb.
The story of the ENIAC, however, was only one chapter—though the major one to be sure—in the career of a creative
and dedicated scientist. Mauchly’s stay at Penn was brief. No sooner had the ENIAC been successfully tested than
Mauchly and Eckert became involved in a dispute with the University over patent rights to the ENIAC. The dispute led to
their departure from Penn and to their pioneering ventures in the commercial development and application of computing
systems. Although they worked for Remington Rand for a short time, during which the UNIVAC was developed, Mauchly
and Eckert preferred a risky independence to the more secure and financially remunerative environment of a corporation.
Moreover, many in government and industry saw the enormous research and business potential of the ENIAC and its
successors; Mauchly and Eckert quickly found themselves in an intensely competitive and crowded field. To the end, their
own research interests remained more important to them than the profits of the marketplace.
Unlike many such exhibits, John W. Mauchly and the Development of the ENIAC Computer (continued on next page)
The exhibit portrays Mauchly not as the isolated, romantic
genius, but in the context of wider developments in the
history of science that helped shape the career of this
protean individual.
march 1996
13
The exhibit encourages us to think less in terms of questions of priority and more about
complex paths of discovery, paths connecting multiple pasts to multiple presents.
is not simply a celebration of a man and an event. Akera and Goldschmidt conceive it more as a case study of the nature
of scientific research and invention in the 20th century. Time and again the exhibit poses fundamental questions in the
history of science: What is creativity? What does it mean to “discover,” “to invent,” in science? To what extent is
scientific achievement a social, collaborative, and cumulative process? The exhibit portrays Mauchly not as the isolated,
romantic genius, but in the context of wider developments in the history of science that helped shape the career of this
protean individual. The enormous importance of the ENIAC in the history of computing as well as for the marketplace
has made it a natural arena for priority disputes: Who really got there first? However, the exhibit takes a more balanced
and nuanced approach. It encourages us to think less in terms of questions of priority and more about complex paths of
discovery, paths connecting multiple pasts to multiple presents. The construction of the ENIAC triggered more than a
decade of claims, counter-claims, and law suits regarding invention and attendant proprietary rights. Akera and
Goldschmidt view these contests as characteristic of the ways in which the intrinsic complexity of scientific research can
frustrate, if not undermine, the apparent clarity of the law and the appeal of simple narrative answers to difficult questions.
On one issue, though, the exhibit is straightforward and insistent: It was the genius of Mauchly, his singularly unique
contribution, to have designed not only the first electronic digital computer, but to have grasped intuitively the many
related functions such a device could perform. If Mauchly had limited his vision to what the Army wanted, he might have
created a single-purpose machine with no wider applicability. It was because the ENIAC was so functionally rich that it
has come to occupy an important position in the history of science and technology. And who knows? Perhaps some
Valentine’s Day in the future will herald a solution to Valentine’s conundrum in Arcadia that recognizes the role played by
Mauchly in making it possible finally to predict the weather.
The exhibit formally opens on February 14 and runs through March in the Rosenwald Gallery. Gallery hours are
Mondays–Fridays, 9 AM–5 PM, and from 10 AM–2 PM on Saturdays. Those who cannot come to the Library to see the
actual show can see its virtual version on the Web at http://www.library.upenn.edu/special/events.html.
MICHAEL T. RYAN is Director of Special Collections for the University of Pennsylvania Library.
Photos: John W. Mauchly Papers, Department of Special Collections, University of Pennsylvania Library.
14
PENNPRINTOUT
events
ENIAC
golden
The detailed calendar of events planned for the 18-month
long celebration of the ENIAC and the birth of the
information age is available on the Penn Web (http://
www.seas.upenn.edu/~museum/calendar.shtml). Here is a
brief look at some of the events scheduled for February
and March.
Computer Technology in Art exhibition
February 2–25
A presentation of two- and three-dimensional works of art
that utilize computer technology. Nexus Foundation for
Today’s Art, 137 N. 2nd Street. Information: Dina Ward
(215/629-1103).
Institute of Contemporary Art exhibition
February 5–19
A celebration of the impact of computers and information
technology on art and culture by Gary Hill. Institute of
Contemporary Art, University of Pennsylvania, 36th and
Sansom Streets. Information: Patrick Murphy (215/898-7108).
ENIAC 50th anniversary exhibition
February 9–17
“From Vacuum Tubes to Microchips” at the Shops at
Liberty Place, 16th and Market Streets. Information:
Expert Events (215/724-6644).
IBM’s Deep Blue versus Garry Kasparov
February 10, 11, 13, 14, 16, and 17 at 3 PM
The chess tournament between World Chess Federation
Champion Garry Kasparov and IBM’s Deep Blue computer. Pennsylvania Convention Center. Information:
(800/342-6626).
ACM Computing Week ’96
February 14–20
ACM, the first society in computing, celebrates its 50th
anniversary. Information: http://www.acm.org/
conferences/computing_week/.
ENIAC 50th anniversary day events
February 14
10 AM–3PM: Educational Technology Showcase
featuring Penn faculty, students, and staff demonstrating
march 1996
1996
march
anniversary
locally developed, state-of-the-art projects. Houston
Hall, Bodek Lounge.
noon–1 PM: A press conference features the reactivation
of part of the original ENIAC, exactly 50 years after it
was first unveiled to the public.
1:30–3 PM: “ENIAC in Context,” the first session of the
ACM History Program, deals with the development of
the ENIAC within the social, cultural, and intellectual
environment of its time. Philadelphia Marriott, 12th and
Market Streets.
3–4:30 PM: Connaissance Presents: a major presentation by a nationally known technology leader. Irvine
Auditorium.
3:30–5 PM: “ENIAC’s Legacies,” the second session of
the ACM History Program, deals with the significant
hardware and software developments of the past 50
years, as well as the people involved. Philadelphia
Marriott, 12th and Market Streets.
6:30–9:30 PM: A “Celebration Honoring the Creation
of Modern Computing” features a speech by Vice
President Al Gore, the announcement of the 1996
Bower Award winners, and the announcement of the
1996 ACM Alan M. Turing Award winner during a
reception and dinner at the Philadelphia Marriott, 12th
and Market Streets. Information: Greater Philadelphia
First (215/575-2200).
International Literacy Conference
February 15–17
“New Technologies for Adult Learning,” sponsored by
the National Center on Adult Literacy, University of
Pennsylvania. Information: Dan Wagner (215/8982100).
American Music Theater Festival
March 20–24
“CrossWaves ’96” highlights the use of new technologies
in theater art. Annenberg Center, 36th and Walnut
Streets. Information: Marjory Samoff (215/893-1570).
15
felice macera
Happy Birthday ENIAC
thanks to robert smith, john derrickson, and paul shaffer
—Al Gore, Vice President, United States of America
—Judith Rodin, President, University of Pennsylvania
—Stanley Chodorow, Provost, University of Pennsylvania
—Edward G. Rendell, Mayor of Philadelphia
—Peter C. Patton, Vice Provost, Information Systems
& Computing
—John A. Fry, Executive Vice President, University
of Pennsylvania
16
PENNPRINTOUT
Futurists predicted computers might make us less human.
Instead, they have given birth to a new age of information
and freedom. Happy birthday to the 30 ton beginning of
it all!
—Gregory Farrington, Dean, School of Engineering
& Applied Science
Dear ENIAC
Although you’re turning 50
And your tubes are old and gray
Your I/O is outdated
And your memory’s just 2K
You’re still the inspiration
For the WWW and Cray
And for all the computations
That we carry out today
—Gershon Buchsbaum, Interim Chair, Bioengineering
—James A. Unruh, Chairman of Unisys
—Kay Mauchly Antonelli, widow of John Mauchly,
Consulting Engineer, ENIAC project
—Judith R. Eckert, widow of J. Presper Eckert, Chief
Engineer, ENIAC project
From vacuum tubes and vicious conflict, to global villages
and virtual toys dancing in the mind of a child. Your birth
is celebrated every time your progeny are used to unite
humankind in community and creativity.
—Herman H. Goldstine, Liasion Officer, ENIAC project
Born half a century ago and still an infant, you have had
a most profound effect on our generation. May we
have the wisdom to use you in the pursuit of the goals
that are the most noble in humankind.
—Patrick T. Harker, Chair, Systems Engineering
You were conceived for the purposes of war. How wonderful to see children learning to read from your progeny.
—Sohrab Rabii, Chair, Electrical Engineering
—Ira M. Cohen, Chair, Mechanical Engineering
& Applied Mechanics
Your descendants have carried us to the shores of
unexpected new worlds of connection and information.
Because of you, we have become pioneers, just beginning a vast transformation of how we work, create, learn,
and interact with one another.
Your progeny have changed research in chemical
engineering and the practice of chemical engineering.
May the next 50 years be as revolutionary and exciting.
—Mitch Marcus, Chair, Computer & Information Science
—Raymond Gorte, Chair, Chemical Engineering
march 1996
17
BY JILL MASER
cybersociety
2046
photo and graffiti: meak
Earth has only two classes of society: the techno-haves and the techno-have-nots. The techno-haves visit friends
across the globe, cavort on sun-drenched beaches, and enjoy the best of Broadway’s plays—all without leaving their
homes. The have-nots exist underground in crime-ridden decay. They have no access to the technology that makes
the good life possible, nor to education, the key to survival in the year 2046. Is this the stuff of science fiction?
18
PENNPRINTOUT
Not so, according to several groups of Penn students
assembled recently to discuss how the world will look in
the year 2046. Although each group articulated virtually
the same vision of a frightening underground uprising by
the have-nots, all the students remain optimistic that
technology will also bring forth changes for the good of
society and the planet.
Some of the students’ thoughts mirror those that
accompanied the advent of the VCR. It was thought then
that “nesting” would become prevalent, that people
would spend less time outside the home, opting instead
for the comfort of home theater. But while video stores
have proliferated, movie theaters continue to rake in our
entertainment dollars. We may prefer nesting at times,
but as one student said, “We are inherently social, we
need to socialize.” Indeed, many of the students see
technology opening new channels for us to meet people
we would not normally meet. While “a small percentage
of the population will remain Internet freaks,” technology
will allow efficiencies in everything we do, including
socializing.
In the 50 years since the birth of the ENIAC, the
world has already become a smaller place. Communication is easier and faster, and media coverage of world
events is instantaneous. The students see a continually
shrinking world, one where real-time capabilities, such as
coverage of news and financial markets, will infringe on
our “down-time.”
But technological advances will also allow us more
time to think and be creative, which will in turn lead to
Mechanical language translators will eliminate
embarrassing faux pas as we communicate with
colleagues around the world. We might see privatized
mining operations set up on nearby planets. And we
might elect our President and Congress by voting on
the Internet.
A more disturbing scenario is the social division and
turmoil that the students foresee. As technology invades
every aspect of our lives, those who have access to it and
to education will rise to the top of society, and those who
do not will become the “slave class of the technologically
literate elite.”
The situation will generate two responses. Some
techno-haves will break away and “get back to basics.”
One graduate student imagines that “people will opt out
of the techno race and create communes where they can
experience real human contact and diversity. Spiritual
communities will spring up on the coasts.”
Those less privileged, the techno-have-nots, will
become a rebel class. All the students envision some
kind of backlash against the “haves.” They believe that
as the gap widens, the have-nots will go to greater
lengths to commit crimes to get a share of money and
power. Instruments of crime will become more deadly.
Just as warfare has become less personal with the
introduction of computer-launched and tracked missiles,
instruments of personal and corporate crime will also
become remote. People will create viruses to disable
technology. People will kill for fun.
The students also see a parallel divergence between
All the students agree that regardless of the outcome of
technological innovations over the next 50 years, some level
of social responsibility needs to accompany the advances.
innovation and better technology. Economic growth will
occur, some world problems will be solved, and exciting
innovations in the arts, sciences, business, and government will take place.
We will, for example, enjoy viewing three-dimensional murals. We will be able to call up the name of a
playwright and view a production of the play we select.
The medical profession will change. Specialists will not
need to come to the hospital, and surgeons will perform
their miracles from remote locations. Virtual diagnoses
will be possible, and animated programs will show us our
ailments and how we might overcome them. We will be
able to make sophisticated decisions about our care.
march 1996
countries that have money and technology and those that
do not. While technology makes information readily
available and leads the way for movements such as
glasnost, some nations will remain outside the information age because free access to information makes it
harder to control their citizens. As one student noted,
technological advances are easy compared to the difficulty of changing people—especially people responsible
for governing a populace they fear.
The students picture a couple of large, technologically advanced countries dominating the world. Will
these countries help the rest of the world or exploit
others? Here the students
(continued on next page)
19
Exploitation will be the only way to survive a critical time when
there will not be enough food, space, or money to go around.
diverge. One group thinks that powerful countries will
simply invade “uncooperative” countries and take what
they need or want. “It all boils down to politics versus
resources,” said a student who believes that exploitation
will be the only way to survive a critical time when there
will not be enough food, space, or money to go around.
Other students see good relations among countries, fostered by the improved communication capabilities. Industries of the future may not have to be located in today’s
first-world countries. New technology will allow information—and perhaps even products—to be sent around
the world in new ways. Powerful hubs such as those in
the United States and Europe may become obsolete.
How will some of the horrific elements of this vision
come about? As one student noted, “People who develop
the technology aren’t necessarily concerned with its
20
photo: dan fishman
graffiti: slae
The graffiti pictured
in this article cover city
walls in Philadelphia.
They, along with other
examples of graffiti
around the world, can
be found at the Art
Crimes site on the World
Wide Web. URL:
http://www.graffiti.org/.
implications; people use technology to increase power
and wealth.” Another student, concerned that technology
provides the means for us to “abuse our anonymity,”
noted that “cruelty to others and taking no responsibility
for our actions are products of a dehumanized, desensitized society.” All the students agree that regardless of
the outcome of technological innovations over the next
50 years, some level of social responsibility needs to
accompany the advances. If society does not consider
the implications of the uses of technology, some of the
more frightening scenarios described by the students
could easily become reality. Let us hope that
CyberSociety 2046 is indeed the stuff of science fiction.
JILL MASER is Director of Operations Analysis in the
Office of the Executive Vice President.
PENNPRINTOUT
announce ments
ENIAC in the news
Penn wins supercomputing award
Recent research by Penn computer historians has
uncovered the fact that the ENIAC was one of the first
electronic devices to have a conditional branch. Modern
computer languages use IF...THEN...ELSE for branching.
The wires that ran around the ENIAC carried two
kinds of pulses: number-pulses and control-pulses. The
number-pulses represented numbers from zero (no pulses)
to nine (nine pulses). The control-pulse was used to
trigger the next step of the calculation.
The ENIAC operators found that if they connected a
number-pulse wire to the control-pulse input, it could be
used to control the execution of the program. Here is how
it worked: If the output on the number-pulse wire was a
non-zero number (one or more pulses), then it could be
used to start another step. But, if the output was zero (no
pulses), then the operation would halt.
Some scholars contend that it is the ability to branch
that separates a computer from a calculator. Here is
another way to say it:
The National Scalable Cluster Project (NSCP), a
collaboration of the Universities of Pennsylvania, Illinois,
and Maryland, won the award for “High Performance Data
Management and Mining” at the Supercomputing ’95
conference last December. Data mining, extracting useful
information from extremely large collections of data, is
becoming increasingly interesting as many scientific and
commercial groups struggle with the increasingly dataintensive needs of modern computing.
Researchers at the three universities linked computers
together using special high-speed communication techniques that form the basis of many plans for new national
communications infrastructures. These new techniques,
called asynchronous transfer mode or ATM, are the
specialty of several researchers at Penn, particularly
Jonathan Smith in the Department of Computer & Information Science. Professor Robert Hollebeek’s group in
Physics specializes in the configuration of large computers
or large numbers of computers to simultaneously “mine
data.” Examples of data mining at Penn include fast, realtime analysis of images (Professor Ruzena Bajcsy), very
large linguistics samples (Professor Mark Liberman), and
large databases from particle physics (Professor Hollebeek).
The award resulted from a competition called the
“High Performaance Computing Challenge,” which was
judged by a national panel of experts. The competition
featured groups seeking to outdo each other in commandeering the largest number of processors in a race toward
the first demonstration of “teraflop” computing.
IF a machine has the ability to branch,
THEN
it’s a computer,
ELSE
it’s just a calculator.
Penn wins Web awards
Three World Wide Web services at Penn, the Penn
Web itself, Oncolink, and the African Studies Web, have
all been rated among the top 5 percent of all sites on the
Internet by Point Survey, a free service that rates and
reviews only the best sites on the Web.
PennNet services and support
Data Communications and Computing Services
(DCCS) is developing a new set of “official” Web pages
that contain information about major PennNet services as
well as product information for network software. The
new pages are available from the DCCS home page
(http://www.upenn.edu/dccs/).
march 1996
Conference on “Networked Information”
Penn will again host a CAUSE-Coalition for Networked Information conference on “Networked Information” on May 30–31 at the Penn Tower Hotel. For more
information: http://www.upenn.edu/ccni96/.
New Vi-Spy release
To get the latest release of Vi-Spy, version 12.0 release
10.95, bring a blank, unformatted, high-density diskette to
the Computing Resource Center, 3732 Locust Walk.
21
ENIAC’s recessive
T
he ENIAC demonstrated to the world that largescale, high-speed, electronic computation was
possible, triggering a wave of new computer
designs and the birth of the computer industry. Despite the
ENIAC’s success, one fundamental aspect of its design is
only now becoming part of the design of everyday computers, after remaining dormant for nearly 50 years.
At the heart of the ENIAC was a set of 20 independent
accumulators, each an electronic adding machine that
could take in a number and add it to an existing total every
200 microseconds. In principle, a programmer could
arrange that all 20 of these adding machines do new
additions in parallel, allowing the ENIAC to perform not
5,000 but 100,000 additions a second. In this way, the
ENIAC was fundamentally a parallel machine.
Almost immediately the ENIAC’s programmers
decided, in the words of J. Presper Eckert [chief engineer
on the ENIAC project] that parallel programming introduced “a number of inconveniences and difficulties” so
that “in programming a machine, it is undesirable to try to
do several operations in parallel.” Eckert noted that
because there was no mechanism to allow a third operation
to continue only after two parallel sets of operations had
both completed, the two paths had to take exactly the same
length of time. Although SEAS researchers have recently
shown that there is a simple trick that would solve this
problem, it now appears that the ENIAC programmers
were actually uninterested in parallel programming. Why?
Betty Hoberton, one of the two programmers of the
demonstration program executed on February 14, 1946,
recently noted that setting up a complex parallel algorithm
was simply too time consuming, given that it took nearly a
day to move heavy digit trays and connect cables to set up
even a simple problem on the ENIAC. Also, since the
machine’s operation was unaffected by tube failures in
accumulators that weren’t being used, the smaller the
program, the longer it would run until a tube failed.
Parallel computing disappeared for 25 years.
In the late 1960s parallel computing burst forth once
more, now called supercomputing, driven by the very high
computational needs of a range of important engineering,
scientific, and military problems. To simplify both
gene
BY MITCH MARCUS AND ATSUSHI AKERA
hardware and software, many supercomputers use a very
limited kind of parallel processing, where the same
operations are performed in parallel on many different
data points.
Most surprisingly, the inside of the Intel Pentium
has a close resemblance to the ENIAC’s accumulators.
Internally the Pentium converts machine instructions into
operations that are given to any free arithmetic unit, each
of which operates in parallel; some of these units are
interconnected so that results from one can go directly
into others.
A closer successor to the ENIAC can be found inside
every CD player. Converting the stream of numbers stored
on a CD back into music involves many different steps.
Each step is actually a computer program executed on
special-purpose computer chips in the CD player called
digital signal processors (DSP). The key operation in
many of these programs, performed again and again,
involves multiplying together the results of two additions.
To speed up the conversion of numbers into music, each
DSP contains two accumulators whose outputs are fed into
a single multiplier unit so that two adds and a multiply are
all performed in parallel. Programming these algorithms
on the ENIAC would have been very natural.
Finally, although not usually recognized as such,
research in what are now called data flow machines is
attempting to recreate in modern, general form the original
flexibility of the ENIAC. A data flow machine has many
different processing units connected together exactly as the
programmer wishes, but now reconfigurable under highspeed computer control. The ENIAC was exactly such a
data flow machine, only externally programmed.
Developing an effective data flow architecture will require
the development of new methods to provide high-speed
switching at very low cost, but the payoff will be latterday ENIACs that run many times faster than current
computers.
MITCH MARCUS is Chair of the Computer and Information Science Department of the School of Engineering and
Applied Science; ATSUSHI AKERA is a graduate student
in the Department of History and Sociology of Science.
Background: The circuit design for the
ENIAC II chip follows the original’s
architecture of independent accumulators.
Opposite, inset: Programmer Betty
Hoberton was one of many women who
contributed to the original ENIAC
project. Here, four programmers set up
a calculation. Photo: John Mauchly
Papers, Department of Special Collections, University of Pennsylvania Library.
jack
BY NORMAN I. BADLER
M
ost virtual worlds have been populated by fairly
simple objects with simple appearance or motion. With the
increase in rendering and computational power of modern
workstations, more interesting inhabitants can now be
added to our virtual worlds: simulated humans. Creating
simulated human agents that behave realistically is one of
the research goals of Penn’s Center for Human Modeling
and Simulation. The Center’s Jack™ visualization software
contains a powerful and extraordinarily interactive 3D
human model that is used to analyze how people will
interact with a wide variety of systems or environments.
One application for real-time human models is human
factors analysis, which involves visualizing the appearance,
capabilities, and performance of humans as they execute
tasks in a simulated environment. Human factors applications serve a broad population that knows how to design
things but does not usually have prior skill in computer
animation of people. Human models can also be applied to
training situations. For example, in medical training Jack
can be both patient and medic in an emergency care
simulation.
The Jack model contains almost all the essential human
skeletal joints and it can be scaled to different body sizes
based on population data. The figure can be manipulated so
that it moves in several directions simultaneously: For
example, it can grip a moving steering wheel with both
hands while sitting in a car, looking out the rear-view
window and pressing the floor pedals with its feet. Jack can
walk and turn naturally, grasp objects, and follow objects
with his eyes. He can even tell you if the load he is
carrying exceeds NIOSH guidelines or his strength limits.
For a virtual reality experience, a Jack system can be
configured with immersive VR glasses, digitizing glove,
24
and 3D magnetic body tracking, permitting the user to
visualize and move his or her entire body (not just a
“disembodied” hand) in the virtual environment.
The Jack software runs on Silicon Graphics workstations, which have 3D graphics features that aid interaction
with highly articulated figures. The environment provides
state-of-the-art 3D rendering through hardware, ray-trace, or
Renderman interfaces. There is also an API (Application
Programmer Interface) through which Jack acts like a server
for human motion for other software or CAD systems.
Jack is presently the virtual employee of choice at
institutions as varied as heavy equipment manufacturers,
vehicle designers, and the military, making him clearly a
“Jack-of-all-trades.” And along with his physical development, Jack’s cognitive capabilities are expanding. He can
play “hide and seek” and engage copies of himself in limited
conversation. Among the next steps in Jack’s evolution are
speech synthesis and understanding, nonverbal communication, and personality development.
Jack has enjoyed funding from numerous sources,
including ARPA, NSF, Army, Air Force, ONR, NLM, and
several industrial sponsors. The software is licensed
commercially by the HMS Center and is available to the
Penn community at no charge except for manuals and
training costs. For more information, contact Karen Carter,
Associate Director HMS, Computer and Information
Science, Moore Building, Philadelphia, PA 19103-6389
(215/898-1488) or visit Jack’s home page on the Penn Web
(http://www.cis.upenn.edu/~hms/jack.html).
NORMAN I. BADLER is Director of the Center for Human
Modeling and Simulation in the School of Engineering and
Applied Science.
PENNPRINTOUT
Graphics available from Jack’s Web site. Above: Simulated driving tasks such as gripping a
moving steering wheel and braking. Inset: Modeling an emergency care situation on a
battlefield. Opposite left: Automatic reaching for and grasping an object using a variety of
grip styles.
march 1996
25
media power
BY JOHN MACDERMOTT
a
cer
a
em
ic
fel
Polyhedral explorations
“You start with a cube, you cut the corner off ... and
you stick it back in the hole, and then ... you cut the
opposite corner off and turn that piece around ... and
shove it back in the opening, that intersects with the first
piece that you shoved in the other corner, so that you cut
the opposite corners off, you’re going along the diagonal
of the cube, and you end up with a little cube inside.”
—Robinson Fredenthal
Most sculpture lasts a long time. Figures in bronze
or stone endure and no one needs to rely on verbal
descriptions to share an artist’s experiment in geometry.
But what if sculpture is perishable? Must the experiment
disappear with the physical medium?
Sculptor and Penn alumnus Robinson Fredenthal has
explored three-dimensional geometry not only in large,
durable works but also in hundreds of fragile paper
models. In 1995 he approached Penn’s Architectural
Archives to see how his large body of perishable work
might be preserved. Director Julia Moore Converse,
along with Jeff Cohen and Mark Aseltine of the Graduate
School of Fine Arts and GSFA student Brian Phillips,
decided to try using new media technologies to document
and analyze Fredenthal’s work.
Cohen and Phillips cataloged over 1,000 works,
26
One of the most exciting aspects of new
media technologies is the creative
power they have put in the hands of
scholars. The two Penn projects
discussed below illustrate how academic inquiry and disciplined research
methods are driving these technologies
into the mainstream of education. For
more information about interactive
media initiatives developed at Penn see
http://www.upenn.edu/newmedia/
projects/academic_projects.html.
identified several “families” of shapes, and photographed
arrangements in Fredenthal’s studio. They recorded
interviews with Fredenthal, discussing the specific pieces
and how they related to each other. Using 3D graphics
software, they reconstructed some of the shapes
Fredenthal had described and developed step-by-step
illustrations of how they were derived. They also used
Apple’s QuickTime Virtual Reality (QTVR) software to
simulate the experience of handling a sculpture. QTVR
“object movies” allow users to interactively rotate an
object on screen and view it from all sides. Cohen and
Philips have generated QTVR movies both from photographs of sculptures and from their 3D graphics.
Phillips’ work on this project has become an
independent study course, and Aseltine is now his faculty
advisor. Phillips has created a Web site devoted to
Fredenthal that includes a photographic catalog of his
works, videos, QTVR movies, text transcribed from
interviews, biographical material, and critical commentary (http://dolphin.upenn.edu/~gsfa/rf/). The site is
organized around families of shapes and offers detailed
analysis of key works.
This semester Phillips is photographing QTVR
scenes of some of Fredenthal’s large outdoor pieces,
including the “Black Forest” sculpture on Penn’s campus
PENNPRINTOUT
at 34th and Walnut Streets. These QTVR scenes are
interactive, 360-degree photographic panoramas that
allow viewers to simulate the experience of viewing the
sculpture in its surroundings. Phillips also continues to
create QTVR object movies of the paper models and new
3D graphics to illustrate selected geometric principles.
assistant, Ralph Ranjit Bhatnava, available to develop
HyperCard scripts.
The exercise begins with pre-reading activities that
help students supplement their background knowledge
about Mexico and develop awareness of issues in the
story. Students enter words they associate with Mexico:
Calor, playa, sombrero, cerveza, mar, tacos, and pobre
are commonly mentioned by students, who admit their
“Es que somos muy pobres”
responses are stereotypical.
Spanish Language Coordinator Julia Aguilar thinks
Students then view pictures showing the realities of
there’s something missing in the traditional reading
rural Mexico. Students also record their associations
experience for intermediate Spanish students. For those
with the word campesino. They scan the story text,
lacking a cultural context to draw upon, reading assignidentify the characters, view video clips, and answer
ments can become rote
questions about them.
translation exercises
The clips include the
and literary appreciamaterial shot in
tion is diminished.
Mexico plus interAguilar’s doctoral
views with critics
research has indicated
and the author Juan
that the reading process
Rulfo. Students can
involves more than dehear the first paracoding words to recongraph read aloud in
struct a message. Bethe voice of the story’s
cause a reader’s backnarrator, a young
ground knowledge also
Mexican boy.
contributes to underWhile reading the
standing, reading in a
text, students use an
second language can be
online glossary. They
click on an unfamiliar
constrained not only by
word to obtain a
unfamiliar vocabulary
definition that may be
and linguistic structures
either written or
but by the reader’s limpresented visually
ited cultural knowledge.
with photos and video
As part of her dissertaclips. To complete the
tion work, she has creexercise, they answer
ated a multimedia-ennot only questions
riched reading exercise
about events in the
to help her study how
story but also about
cultural empathy affects
the Mexican worldreading comprehension.
Multimedia provides students a window on rural
view in general.
She began by travMexico in Julia Aguilar’s new CD-ROM for Spanish
Finally, students take
eling to Mexico to vid140. The CD-ROM enriches students’ understanding
away a printout of
eotape footage to
of the short story by Juan Rulfo, “Es que somos muy
their word associasupplement “Es que
pobres” (It’s because we’re poor).
tions, answers to
somos muy pobres”
questions, and
(It’s because we’re poor),
vocabulary inquiries.
a story from Spanish 140
Preliminary results have indicated positive effects on
about a farmer’s efforts to provide his daughter a dowry
comprehension compared to a control group, and
and keep her from a life of prostitution. Aguilar taped
superior vocabulary recall. Testing in full begins this
interviews with a campesino (farmer), a young girl, and
semester as students in several sections of Spanish 140
with prostitutes. Other footage showed the environment
use the program and provide the data on which Aguilar
of rural Mexico. Back at Penn, she worked with her
will base her formal analysis.
dissertation committee to develop an instructional design
and with Jay Treat at the SAS Prep Center to prepare the
JOHN MACDERMOTT is New Media Specialist for
media elements. Professor Ralph Ginsberg, one of
Information Systems and Computing.
Aguilar’s dissertation advisors, made his research
march 1996
27
Electronic Calendar
ISC hands-on courses
Special Courses
These courses meet at the Computing Resource Center
(CRC), 3732 Locust Walk. Call 573-3102 to register.
Registration begins February 26. If you cannot attend
a course, you must cancel 48 hours in advance.
Introduction to HTML—Penn faculty & staff only
March 5, 9:30 AM–12:30 PM; March 21, 1–4 PM
Covers basic HTML formatting, creating hot links,
and moving files to and from a World Wide Web
server. Prerequisites: Familiarity with Web browsers
and an understanding of URL syntax.
Courses for DOS and Windows users
Introduction to WordPerfect for Windows
March 7, 9:30 AM–12:30 PM
Includes creating, saving, retrieving, editing, and
printing files. Prerequisite: Windows course or
tutorial.
Intermediate Word for Windows
March 14, 1–4 PM
Covers features used in complex documents, such as
merging, using templates, creating macros, and
customizing toolbars. Prerequisite: Introduction to
Word for Windows or equivalent.
Intermediate WordPerfect for Windows
March 19, 9:30 AM–12:30 PM
Covers features used in complex documents, such as
customizing the button bar, merging documents,
creating macros, using templates, and creating
tables. Prerequisite: Introduction to WordPerfect
for Windows or equivalent.
Courses for Macintosh users
Introduction to Microsoft Word
March 12, 9:30 AM–12:30 PM
Includes creating, saving, retrieving, editing, and
printing files.
Intermediate Microsoft Word
March 25, 1–4 PM
Covers features and functions needed to produce
complex documents, such as creating style sheets,
merging documents, setting up tables, customizing
toolbars, and creating glossaries. Prerequisite:
Introduction to Word or equivalent.
Introduction to Excel Spreadsheets
March 27, 1–4 PM
Covers the basic functions of an electronic spreadsheet. Includes entering, editing, and formatting
data; using functions; writing formulas; printing.
28
ISC B&P seminars
Bits & Pieces seminars meet at the CRC, 3732 Locust Walk,
unless otherwise noted. Registration is not required.
Introduction to Netscape
March 4, noon–1 PM; March 20, noon–1 PM;
March 25, 1–2 PM
Covers configuring Netscape to launch the Penn
Home Page, setting preferences, creating hotlists,
and navigating to popular Internet sites.
Introduction to WS_FTP (Windows)
March 13, noon–1 PM
Introduction to file transfers over the Internet using
WS_FTP. Covers starting a connection to a host,
short cuts, and viewing and downloading files.
Introduction to Fetch (Mac)
March 28, 1–2 PM
Introduction to file transfers over the Internet using
Fetch. Covers starting a connection to a host, short
cuts, and viewing and downloading files.
Human Resources
Registration is required. Call 898-6176.
Overview of the Personnel/Payroll System
March 11, 3–5 PM
5th Floor Conference Room, 3401 Walnut St.
Covers personnel/payroll terminology, processes,
time frames, and contact offices. For new employees.
Online Personnel Processing
March 12, 9 AM–noon, Suite 265C, 3401 Walnut St.
Hands-on workshop covers how to use the UMIS
computer to maintain employee records. Prerequisite:
Basic understanding of employee types, job class codes,
accounts, and subcodes.
PENNPRINTOUT
Van Pelt Library
Biomedical Library
All sessions except individualized training and “Surf the
Electronic Library” meet in Room 502, Van PeltDietrich Library Center. Registration required. Sign up
at Van Pelt Reference, call 898-8118, send e-mail to
librefer@pobox, or use an electronic form (http://www.
library.upenn.edu/vanpelt/forms/workshop.html).
All courses meet in the Biomedical Library Lab.
Call 898-5817 or register online via http://
www.library.upenn.edu/biomed/.
LEXIS/NEXIS Noontime Training—Penn students &
faculty only
March 4, noon–1 PM; March 11, noon–1 PM; March 18,
noon–1 PM; March 25, noon–1 PM
Internet Resources Noontime Training
Elections: March 5, noon–1 PM
Women’s Studies: March 19, noon–1 PM
Gay & Lesbian Studies: March 27, noon–1 PM
DIALOG Energy, Environmental & Geology Databases
March 6, noon–1 PM
Britannica Online
March 7, noon–1 PM
Surf the Electronic Library (hands-on course)
March 19, 7–8 PM; March 28, 7–8 PM
How to connect to Franklin, Penn’s online catalog,
and databases like WLS and LEXIS/NEXIS; how to
locate online help for electronic resources; and how
to surf the “net” through the Library Web page.
RLIN/Eureka Noontime Training
March 20, noon–1 PM
Electronic Library Demonstration
March 21, 3–4:30 PM
An overview of the Library’s electronic resources,
including the Franklin online catalog, WILS, RLIN/
Eureka, and LEXIS/NEXIS, and Internet Resources
available through the Library Web page.
Individualized Training on Electronic Resources
Monday to Friday, 9:30–10 AM, Moelis Online Search
Room. Advance registration is required.
For Penn students, faculty, or staff who want individualized training on a specific electronic resource
such as Franklin (Penn’s online catalog), a CD-ROM
database, a commercial online system such as
DIALOG, or a networked resource such as RLIN/
Eureka or LEXIS/NEXIS. (Note: LEXIS/NEXIS
training is for faculty and students only.)
march 1996
Biomedical Information on the Internet
March 6, 4–6 PM; March 28, 11 AM–1 PM
An overview of basic Internet activities and applications. Network ID and password required.
Biomedical Database Searching Using OVID Software
March 5, 4–6 PM; March 22, 2–4 PM;
March 27, 10 AM–noon
Advanced OVID Subject Searching
March 20, 2–4 PM
Searching the World Wide Web
March 8, 10 AM–noon; March 25, 2–4 PM
Finding biomedical information using Lynx and
Netscape Web browsers.
Reference Manager/EndNote Plus
By appointment. Call 898-9905
End-user Searching using Grateful Med
By appointment. Call 898-9905
Lippincott Library
Lippincott Online Training
For information, call Lippincott Reference, 898-5924; send
e-mail to lippinco@wharton; or check Lippincott Library’s Web
page (http://www.library.upenn.edu/lippincott/).
Interest Groups
Digital Media and Publishing Group meeting
March 5, noon–1:30 PM. Place to be announced.
This new group encompasses the old Desktop
Publishing and Interactive Technologies Interest
Groups. Info: http://www.upenn.edu/newmedia/ or
John MacDermott, 898-3046 or macderm@isc, or
Randall Couch, 898-6243 or couch@isc.
Super User Group meeting
March 11, noon–1:30 PM. 285-6 McNeil Building.
Info: Donna Milici, 898-0426 or donna@isc.
29
Ra nD om bit s
Modems with similar specifications don’t work equally
well on PennNet. To eliminate a frequent source of
difficulty in establishing a network connection, use a US
Robotics 14.4. or 28.8 Sportster modem. These models,
available at the Computer Connection, have been tested
thoroughly and shown to work with PennNet.
Wharton students: If you’re having trouble with
SPIKE, try to use the copy of Netscape installed with
your Internet applications (look in the “PennNet PPP”
Program Manager group in Windows or in the folder you
selected during installation on the Macintosh). If
Netscape doesn’t work, contact First Call, 57-FIRST. If
Netscape works but SPIKE doesn’t, contact
Wharton’s computer consultants, 898-8600.
Is Netscape freezing your Macintosh? The
Defrost system extension “defrosts” all versions of Netscape and works on Macs and
Power Macs running System 7 or later. Download it from http://cygnus.rsabbs.com/
~ssykes/nsdefrost.html.
New Internet search engines offer much
more functionality than their predecessors.
Check Internet Search Tools on the Library’s
Internet Resources page (http://
w w w. l i b r a r y. u p e n n . e d u / r e s o u r c e s /
resources.html) for examples. Alta Vista, for
example, searches Web pages and Usenet
messages using Boolean operators, proximity (phrase searches), and relevancy ranking.
This full functionality increases your chances
of finding exactly what you want.
The DOS/Windows FTP site at Oakland
University now has a Web page front-end to
its software archive, including subject categorizations, a
search engine, and file listings that include dates, byte
sizes, and brief descriptions (http://www.acs.oakland.edu/
oak.html).
It’s 1996—have you changed your password? To
change your Dolphin or Pobox password, log in to your
account, then at the [MAIN MENU]% prompt, type
passwd. You will be prompted to type your current
(old) password, then your new password twice.
30
PPP for Windows users: Make sure you have only one
WINSOCK.DLL file and that it’s in the C:\NET\BIN subdirectory. Having more than one WINSOCK.DLL causes
problems with Internet applications, e.g., Netscape.
Penn’s Computer Connection has sold approximately
51,500 computers and printers since 1984.
If you are having startup problems in Windows 3.1 or
Windows for Workgroups, try starting Windows by typing
win /b. This creates a file in the Windows directory
called BOOTLOG.TXT, which records the Windows
startup procedure and any files or devices that fail to load.
Each week the Library selects and annotates sites considered especially useful to
Penn faculty and students for its “Cool
New Sites” list. The sites are also included in the Library’s Internet Resources
listing under the appropriate category.
Need the zip code for Crumpled Springs, ND? Search
the Postal Service’s address and zip code site (http://
www.usps.gov/ncsc/aq-zip.html).
Longing for WordPerfect’s blue screen? In Word 6 for
Macintosh, select Options from the Tools menu, and in
the General section, check Blue Background, White Text.
In Word 6 for Windows, select Options from the Tools
menu, select the General tab, and check Blue Background, White Text.
PENNPRINTOUT
Q&A
Somebody created aliases on my Mac. How can I
locate the original files?
Macintosh alias files are small files that point to
complete, original files that can be located on your hard
drive, on diskettes, or on file servers. To locate an
original file, single-click on its alias and then select Get
Info from the File menu. From there you can click on the
Find Original button to locate the original and pull it up
in an active window on your screen. The path to the
original file also appears in the Original: field in the Get
Info window. For example, Original: Macintosh
HD:Documents:Test tells you that the original file named
Test is on the volume (hard drive) called Macintosh HD,
in the Documents folder. —Kristin Nelson, CRC
I’ve heard about new memory chips called DIMMs.
What are they and will I be able to use them?
Currently, SIMMs (Single Inline Memory Modules)
are the de facto standard for memory for most computers.
However, some newer computers (most new Mac models
and some high-end workstations) use DIMMs (Dual
Inline Memory Modules), which can handle larger
amounts of data at one time. Data handling is measured
by the number of bits in the data path, and the path used
by DIMMS is twice as wide as the path used by SIMMs.
Because DIMMs are physically larger than SIMMs, they
do not fit into computers designed for SIMMs and vice
versa. Because memory design changes periodically, it’s
always advisable to check with the vendor from whom
you purchased your system before you add memory.
—Tom Gudmundsen, CRC
What are the files with the .grp file extension in my
Windows directory?
These files are the program group files displayed in
Windows Program Manager. They contain the icons for
each of your groups. For example, the file main.grp
contains all of the icons for the Main group. You may
want to make copies of the .grp files so you will not have
to recreate them if they are deleted accidentally or
damaged. —Caroline Ferguson, CRC
march 1996
I had a problem running a program in Windows 3.1.
A friend who had the same problem attributes it to
low System Resources in Windows. How can I check
to see what the available System Resources are?
System Resources is the area of memory that Windows sets aside to keep track of windows, icons, and other
features. Each program you run, including Windows,
takes up some System Resources. To check for available
System Resources select About Program Manager from
the Help menu in the Program Manager window.
When System Resources get low, you will generally
have problems with screen display and disappearing icons.
Ultimately your computer may lock up. There isn’t a hard
and fast rule for the amount of System Resources you
should have free, but you should be concerned if the
amount drops below 50 percent. To free up System
Resources quit some open applications and close any
unnecessary windows. —Caroline Ferguson, CRC
When I try to sign on to PennLIN databases like WILS
and OED, I get messages like “No patron exists for
this ID” and “Not a valid ID, try again.” What’s
wrong? I’m a Penn faculty member.
To use the PennLIN databases you must have a
current patron record with the Library. You can register
immediately by bringing your PennCard to one of the
Library’s Circulation Desks, but there will be a 24-hour
delay before your ID will be recognised for access to the
PennLIN databases. Once you’re registered, you’ll also
be able to borrow books and take advantage of other
library services. —Patricia Renfro, University Libraries
I upgraded to the more secure version of Netscape but
how can I tell if the sites I’m accessing are secure?
An unbroken key icon at the lower left corner of the
Netscape window indicates a secure site; a broken key indicates an unsecured site. Even when you access a secure
site, be careful of the kind of information you submit.
Exercise the same care you would when using your credit
card over the phone. —Caroline Ferguson, CRC
31
felice macera
Download