Archive for RB

Why Coffee Is Called “a Cup of Joe”

Why Coffee Is Called “a Cup of Joe”Followers of the Bach Seat know that coffee is vital to life. And while there and many ways to have a coffee – drip, cold brew, cappuccino, Irish, lattes, macchiato, mochas, even worse – iced mochas. And many places to get your coffee from home, Starbucks, Dunkin Donuts, or the best – Tim Horton’s to get your morning pick-me “cup of joe.”

Tim's largeWhy do we call our morning pick-me a “cup of Joe?”  There are a number of theories why it’s “Joe.” The first theory dates back to 1898 when according to Driftaway Coffee‘s blog, Martinson Coffee trademarked the term “cup of joe.” Martinson Coffee was founded in New York in 1898 by Joe Martinson. The author speculates that the coffee may have locally been called “Joe’s coffee” or a “cup of joe.” As the company grew, “cup of joe” could have expanded from a local nickname to a more widely used term by the 1930s

Brooke Nelson at Readers Digest says the most popular origin story goes back to Josephus Daniels during World War I. Mr. Daniels was appointed Secretary of the U.S. Navy during World War I by President Woodrow Wilson.

USS Josephus Daniels DLG/CG-27Mr. Daniels, a teetotaler, and vehement white supremacist imposed General Order 99 that prohibited alcohol aboard U.S. Navy ships on June 01, 1914. According to this theory, the loss of easy access to booze aboard U.S. Navy ships led to increased coffee consumption by sailors. The sailors sarcastically called it their new beverage “a cup of Josephus” in honor of the man who had banned their booze. The snarky name stuck and eventually turned into “a cup of Joe” for short.

Ms. Nelson concludes that this origin story for “cup of Joe” is amusing, but probably not true. She points out that the term “cup of Joe” only appears in writing for the first time in 1930—long after the Navy’s alcohol ban. Barbara Mikkelso at  Snopes.com also points out that U.S Navy ships had been officially dry for enlisted men since the spirit ration was abolished in 1862.

Not so average Joe drinking coffeeAnother theory is that “Joe” refers to the average man and is often used as slang for “fellow, guy, or chap.” Snopes reports this usage dates to 1846 and is still present today. “Joe” is used to describe a typical guy who is interchangeable with any other guy:

  • “G.I. Joe,”
  • “Joe Blow,” or
  • “Average Joe.”

So “cup of joe” could be another way of saying “the common man’s drink.”

Another origin story holds that “joe” is a mash-up of two other slang words for coffee “java” and “mocha.” The mash-up led to “jamoke,” which combines the words “java” and “mocha.”  Eventually “cup of jamoke” was shortened down to a “cup of Joe.” People do love to shorten their slang terms, after all.

Not so average Marilyn drinking coffeeSnopes says jamoke is the best theory for morphing into joe. The British etymologist Michael Quinion found an early documented example from 1931 in the Reserve Officer’s Manual by a man named Erdman:

‘Jamoke, Java, Joe. Coffee. Derived from the words Java and Mocha, where originally the best coffee came from.’”

rb-

So, where did this nickname really come from? No one knows for sure. No matter what you call it (or how you take it!), you can always count on a cup of joe to help you function in the morning.

Related Posts

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Symantec Sold

Updated 01/08/2020 – Broadcom is selling off parts Symantec less than 2 months after closing the deal. Reports have consulting giant Accenture buying Symantec’s Cyber Security Services unit for an undisclosed amount.

Under the deal, Accenture will take over Symantec’s global network of six security operations centers located in the U.S., the U.K., India, Australia, Singapore, and Japan. The SOC’s provide threat monitoring, analysis, and incident response services. Accenture says it will use the Symantec business unit to boost its managed security services.

Updated 09/17/2019 – As predicted below, Symantec has started slashing jobs. According to reports, up to 230 Symantec employees will be terminated on October 15, 2019.

Symantec SoldI could have saved a bunch of people a bunch of money– IF you had read this post – you would already have a doubt about this deal – before professional prognosticators Forester said the same thing on August 9th. In their report analyzing the deal, the market researcher cited Intel’s 2010 acquisition of McAfee and subsequent $3 billion loss spinning the security company to private equity in 2016. They said the deal should serve as a warning to CISO’s about the future of Symantec’s product portfolio under Broadcom. Well NO DUH

Broadcom (AVGO) has acquired Symantec‘s (SYMC) enterprise security business for $10.7 billion in cash. The two firms consummated their hot-and-cold bromance M&A discussions in writing today (08/08/2018).

Symantec logoThe deal is expected to bring in over $2 billion in annual revenue for the San Jose, CA-base firm. Broadcom intends to fund the transaction with proceeds from new committed debt financing. The transaction is expected to close in Q1 of Broadcom’s fiscal year 2020.

Broadcom, historically a semiconductor business has been on an M&A tear in the past few years, buying its way into a broader market position. First, with the 2016 – $5.9 billion purchase of network equipment vendor Brocade. Next was the 2018 – $18.9 billion acquisition of CA Technologies. Followed by today’s $10.7 billion pick-up of Symantec. In the presser Broadcom CEO Hock Tan called the Symantec purchase, “... the next logical step in our strategy … expanding our footprint of mission-critical infrastructure software within our core Global 2000 customer base.

Broadcom logoRumors of the purchase first appeared in the press on July 03, 2019, with “advanced talks” happening on July 15th for purchase all of Symantec for $22 Billion, but by July 15, Symantec had reportedly walked away from the table. Reports (which appear to be true) at the time were that Broadcom was after just the enterprise-cybersecurity software business; leaving the consumer the business as an independent company or a spin-off to somebody else.

ChannelE2E says the potential deal makes sense on paper. Broadcom is known for acquiring struggling or slow-growth enterprise technology businesses, stripping out costs and boosting profitability. They explain that Broadcom’s secret to M&A success is clearly communicating staff reduction plans to acquired businesses, investors, and associated end customers. Broadcom is known for swift M&A staff cuts that include reasonable severance packages for employees — rather than long, drawn-out, torturous headcount reductions.

ChannelE2E also correctly predicted the Symantec team could face job cuts, layoffs, or potential business spin-offs as a result of the deal. Right on queue, Symantec announced layoffs of roughly 7% of its more than 11,000 employees during FY 2020. The company also plans to downsize, vacate or close certain facilities and data centers in connection with the restructuring plan.

The Symantec name will be sold to Broadcom as part of the transaction. Interim Symantec CEO Rick Hill said the remaining consumer business contributed 90% of the company’s total operating income, and the company expects to be able to continue to grow revenue for its Norton LifeLock business in the mid-single digits going forward. CEO Hill tried to spin the sale as a win in a presser.

This is a transformative transaction that should maximize immediate value to our shareholders while maintaining ownership in a pure play consumer cyber safety business with predictability, growth and strong consistent profitability.

Symantec SoldSymantec’s struggles in recent years which may have lead to the buy-out are chronicled by Channele2e. Former CEO Greg Clark resigned in May 2019 amid weak enterprise cybersecurity software revenues. Executive team departures over the past year have also included Symantec’s CFO, chief operating officer, chief marketing officer and the head of its go-to-market teams. Board member Rick Hill has been interim president and CEO of the company since that time.

Symantec was late to cloud-and mobile-centric cybersecurity services, and faced intense competition from next-generation endpoint protection providers, including:

rb-

Deja Vu All Over Again

Deja Vu All Over Again

The sense of deja-vu all over again you are experiencing is real. Intel and McAfee tried this nearly a decade ago. Intel purchased top Symantec competitor McAfee for $7.7 billion. The expected “synergies” (WTF that means) never materialized. Intel ended up spinning off McAfee to private equity firm TPG in a 2016 sale that valued the business at $4.2 billion.

Related Posts

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

The Secret to F-Keying at Work

The Secret to F Keys at WorkWe use keyboards at home, work and the car. The first keyboard to feature function keys was the 1965 Singer/Friden 2201 Flexowriter Programmatic as a standalone word processing system. Each of the function keys was programmable. The familiar 12 F-Keys were introduced in 1984 with the second generation Model M keyboard for the original IBM PC. It had 12 function keys in 3 blocks of 4 at the top of the keyboard. Over the years, various operating systems and applications have made use of function keys in different ways.

After you learn this list of F-Key secrets, you can improve your fun at work by F-Keying around in your cube as you work on your project.

F1• F1 – Universal – Opens a help or support menu in most programs.
• F1 – Apple macOS X – Reduces the screen’s brightness.
• F1 – Some computers  – Used it to enter BIOS setup during startup.
• F1+WIN – Microsoft Windows –  Opens the Microsoft Windows help and support center.

F2

• F2 – Microsoft Windows – Renames a highlighted icon, file, or folder.
• F2 – Microsoft Excel – Edits the active cell.
• F2 – Apple macOS X – Increases the screen’s brightness.
• F2 – Some computers  – Used it to enter BIOS setup during startup (Acer, Asus, Dell, eMachines, Gateway, Lenovo, Sony).
• F2+CRTL – Microsoft Word –  Displays the print preview window.
• F2+ALT+CTRL – Microsoft Office – Opens the Documents Library.

F3

• F3 – Microsoft Windows – Opens desktop search feature.
• F3 – MS-DOS or Windows command line – Repeats the last command entered.
• F3 – Browsers (Firefox, Chrome and IE) – Launches the Find bar.
• F3 – Apple macOS X – Opens Mission Control.
• F3 – Other programs – Will find the next search value after an initial search is performed.
• F3+CTRL – Microsoft Word – will lowercase any highlighted text.
• F3+SHIFT – Microsoft Word – Toggles between capitalizing each word, lower case and upper case for the selected text.
• F3+WIN – Microsoft Outlook – Opens the Advanced find window.

F4

• F4 – Microsoft Windows 95 to XP – Open find window in Windows Explorer and Internet Explorer.
• F4 – Apple macOS X – Accesses dashboard.
F4+ALT – Boss key – Microsoft Windows – Immediately closes the current program without saving. It can be used in an emergency to close browser windows you don’t want others to see.
• F4+ALT – Microsoft Windows – When no program is running it launches the Shutdown dialog box.
• F4+CTRL – Microsoft Word – Repeat the last action performed.
• F4+WIN  –  Closes the open window or tab in the active window.

F5

• F5 – Microsoft Windows – Reload the page, document, or contents list in a folder.
• F5 – Microsoft Office – Open the find, replace, and go to window.
• F5 – Microsoft PowerPoint – Starts a slideshow in PowerPoint.
• F5 – Browsers (Firefox, Chrome, and IE) – Refreshes a web page from the cache.
• F5 – Apple macOS X – Increases the keyboard backlight.
• F5+CTRL – Browsers (Firefox, Chrome, and IE) – Forces a hard refresh of the web page from the server instead of the browser cache.
• F5+CTRL+SHIFT – Microsoft Word – inserts a bookmark in Word doc.

F6

• F6 – Microsoft Windows desktop – Tabs from desktop files to the taskbar and the system tray icons.
• F6 – Browsers (Firefox, Chrome, and IE) – Move the cursor to the address bar.
• F6 – Apple macOS X – Decreases the keyboard backlight.
• F6 – Reduce laptop volume (on some laptops).
• F6+CTRL+SHIFT – Microsoft Office – Opens to another document.

F7

• F7 – Microsoft Office Suite – Spell and grammar check a document.
• F7 – Mozilla Firefox – Places a moveable cursor in web pages, allowing you to select text with the keyboard (Caret browsing).
• F7 – Apple macOS X – Can be used to rewind media content.
• F7 – Increase speaker volume (on some laptops).
• F7+SHIFT – Microsoft Office Suite –  Runs a Thesaurus check on the word highlighted.

F8

• F8 – Microsoft Windows – Enter the Windows Start Menu, to access Windows Safe Mode (if pressed during the boot process).
• F8 – Apple macOS X – Can be used to pause media content.
• F8 – Used by some computers to access the Windows recovery system, but may require a Windows installation CD.

F9

• F9 – Microsoft Word – Refresh document.
• F9 – Microsoft Outlook – “Send and Receive All folders” email.
• F9 – Reduce laptop screen brightness (on some laptops).
• F9 – Apple macOS X – Can be used to fast forward media content.

F10

• F10 – Microsoft Windows – Activates the menu bar of an open application.
• F10 – Browsers (Firefox and IE) – Shows the Menu bar.
• F10 – Apple macOS X – Can be used to mute the speaker.
• F10 – Some computers – Increase laptop screen brightness.
• F10 – Some computers – Used it to enter BIOS setup during startup (Compaq, HP).
• F10+SHIFT – Microsoft Windows – The same as right-clicking on a highlighted icon, file, or Internet link pops out the context menu.

F11

• F11 – Microsoft Windows Explorer – Enter and exit full-screen mode.
• F11 – Microsoft Excel – Adds a graph of highlighted cells.
• F11 – Browsers (Firefox, Chrome, and IE) – Enter and exit full-screen mode.
• F11 – Apple macOS X – Can be used to decrease the speaker volume.
• F11+CTRL – Microsoft Excel – Adds a new macro to the workbook.
• F11 –  Used to access the hidden recovery partition when pressed during boot (Compaq, HP, Dell, eMachines, Gateway, and Lenovo).
• F11+SHIFT – Microsoft Excel – Adds a new sheet to the workbook.

F12

• F12 – Microsoft Office –  Open the Save as window.
• F12 – Browsers (Firefox, Chrome, and IE) – Opens browser debug tool.
• F12 – • F11 – Apple macOS X – Can be used to increase the speaker volume.
• F12 – Used to access the list of bootable devices on a computer when pressed during boot, allowing you to select a different device to boot from (e.g., hard drive, CD or DVD drive, floppy drive, USB drive, and network).
• F12+CTRL – Microsoft Word – opens a document.
• F12+SHIFT – Microsoft Word – Saves the Microsoft Word document (like Ctrl+S).
• F12+CTRL+SHIFT – Microsoft Office – Prints a document (Like Ctrl+P).

Newer Apple keyboards have F13, F14, and F15 keys for even more F-Keying around – in place of the Print Screen, Lock key, and the Pause key. They also have F16 – F19 keys above the number pad. Early IBM keyboards had F13 through F24 keys, but these keyboards are no longer used.

To access all the fun of F-Keying you may need to access Fn Lock key or the “Fn key”+“Fn Lock” key to strike F-Keying gold.

rb-

Even Superman uses a keyboardThere’s nothing like F-Keying at  work to make you more efficient. It may feel somewhat strange the first time you try to control your computer from the keyboard since we’re so used to navigating with the mouse. But, you can’t beat the ability to keep your hands on the keyboard.

Related Posts

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Fix Your Dongle – Today

Fix Your Dongle - TodayIf you use a Logitech (LOGI) wireless mouse, keyboard or other device fix your dongle! The Logitech wireless dongle (officially Unifying Receiver) is vulnerable to an issue discovered in 2016 as well as newly discovered vulnerabilities unless you’ve updated the firmware. Download and install the latest firmware update to protect against vulnerabilities.

Mousejack attach

Logitech logoAffected Logitech wireless devices are vulnerable to a hack called “Mousejack.” Mousejack, (CVE-2016-10761) was first reported in 2016 by IoT security firm Bastille Networks, Inc. The Mousejack attach works by sending malicious radio signals (packets) wirelessly to an unsuspecting user through Logitech Unifying wireless technology. Logitech only partially fixed the hole (Cert VU#981271) in 2016. Mousejack uses the vulnerable Logitech Unifying receiver to intercept and inject unencrypted signals within a range of about 100 meters.

Incomplete fix

Logitech did not recall the Unifying Receiver back in 2016 when Mousejack appeared. Four new vulnerabilities were discovered in 2019. The new vulnerabilities are based on the incomplete 2016 fix. Logitech will only fix two of the four vulnerabilities, the others will remain unpatched. The vulnerabilities are logged as:

Logitech will not fix the holes identified in CVE-2019-13052 or CVE-2019-13053, both of which impact all Logitech Unifying devices. A Logitech representative told the Verge:

Logitech evaluated the risk to businesses and to consumers and did not initiate a recall of products or components already in the market and supply chain.

Logitech wireless mouseLogitech plans to patch the security flaws in CVE-2019-13054 (impacts Logitech R500, Logitech SPOTLIGHT) and CVE-2019-13055 which affects all encrypted Unifying devices with keyboard capabilities.

All Logitech USB dongles

Marcus Mengs, the researcher who discovered these vulnerabilities, told ZDNet the vulnerabilities impact all Logitech USB dongles that use the company’s proprietary “Unifying” 2.4 GHz radio technology to communicate with wireless devices.

Unifying is a Logitech standard dongle radio technology, and has been shipping with a wide range of Logitech wireless gear since 2009. The dongles are often found with the company’s wireless keyboards, mice, presentation clickers, trackballs, and more.

  • Sniff keyboard traffic,
  • Inject keystrokes (even into dongles not connected to a wireless keyboard)
  • Take over the computer to which a dongle has been connected.
  • Steal the encryption key between the dongle and its paired device
  • Bypass a “key blacklist” designed to prevent the paired device from injecting keystrokes

Bastille Networks

Techsupportalert.com reports that many of the vulnerable dongles are still on the market even though Logitech started releasing updated dongles sold with mice, keyboards, and stand-alone receivers.

 Hard to find firmware update

firmware updateNot long after the discovery, Techsupportalert.com, says Logitech issued a firmware update but it was hard to find on the support site and wasn’t widely known. If you didn’t update the firmware then (and most of us didn’t know about it) now is an excellent time to update.

Even if you installed the Logitech drivers and configuration app that came with the device, you are not protected. The required firmware update is not included, it must be downloaded and installed separately.

Give credit to Logitech, their firmware can be updated, where other manufacturer’s wireless dongles cannot be updated. This includes products from Microsoft, Dell (DELL, HP (HPQ), and Lenovo (LNVGY). In fact, any device that uses the same Nordic Semiconductor or Texas Instruments (TXN) chips and firmware for wireless receivers is vulnerable. The NordicRF nRF chip is a common chip used in wireless keyboards, mice, and presentation tools, which are frequently found in non-Bluetooth wireless input devices.

If you use a wireless device from Logitech or the Lenovo 500 devices, Bastille recommends you update your firmware. Any other non-Bluetooth wireless devices should be disconnected and you should contact your vendor and ask what models are not vulnerable before you replace your current gear.

Lenovo’s announcement is here.

Logitech’s announcement is here.

Here are the direct download links to the Logitech Unifying Receiver firmware update for PC, Mac, and the gaming mouse:

  • Logitech PC firmware update (zip)
  • Logitech Mac firmware update (zip)
  • Logitech G900 gaming mouse firmware update (zip)

rb-

Logitech Unifying ReceiverYou probably have an affected device on your network. Logitech has sold well over a billion mice. Users can recognize if they’re using a vulnerable dongle if it has an orange star printed on one of its sides.

If you have any extra Logitech wireless dongles around (I have several) you may want to update them.

You should also check back in with Logitech support, to see if the promised additional fixes will be forthcoming in August 2019.

Related Posts

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

The Computer That Took Man To The Moon

The Computer That Took Man To The Moon 50 Years ago50 years ago Man first stepped on the Moon. When NASA’s Apollo 11 touched down in the Sea of Tranquility on July 20, 1969, it was a triumph of the human spirit. The Moon landing was also a technological triumph. The technological triumph was lead by the Apollo Guidance Computer (AGC).

Apollo moon mission guidance computer

The AGC helped the Apollo astronauts safely travel from Earth to the Moon and back. David Szondy at New Atlas explains that Apollo needed computers to navigate to the Moon. On Earth, navigation is about finding one’s way from one fixed point on the globe to another. For a trip to the Moon, navigation is more complex. He likened the planning to standing with a rifle on a turntable that’s spinning at the center of a much larger turntable. Then there is a third turntable sitting on the rim. And, all the tables are spinning at different and varying speeds. Now you have to hit the target by aiming at where it will be three days from now.

In order to hit the target of the Moon, the AGC provided spacecraft guidance, navigation, and control. The AGC was used in all of NASA’s Apollo Moon missions. The AGC was designed by Dr. Charles Stark Draper at the MIT Instrumentation Lab with the support of the AC Spark Plug Division of General Motors (GM), Kollsman Instrument Corporation. The AGC was built by Raytheon. It used approximately 4,000 integrated circuits from Fairchild Semiconductor.

The Apollo Guidance Computer was not much to look at. Mr. Szondy writes it looked like a brass suitcase. It was made of 30,000 components hand-built on two gold metal trays.  One tray was for memory. The second was for logic circuits. The AGC measured 24in × 12.5in × 6.5in and weighed in at 70 lb. Inside, it isn’t even very impressive by modern computer standards. It had about as much oomph as a Commodore 64 with a total of about 74 KB ROM and 4 KB RAM memory and a 12-microsecond clock speed. Gizmodo estimated it would cost $3000 to build an AGC —using 1960s-like components. Each AFC cost NASA around $200,000 (equivalent to $1.5 million today).

Three computers for each trip to the Moon

The AGC was carried aboard both the Command Service Module (CSM) and the Lunar Excursion Module (LEM). The computer flew on 15 manned missions, including nine Moon flights, six lunar landings, three Skylab missions, and the Apollo-Soyuz Test Mission in 1975.

Three computers were required for each mission. One on the CSM and two on the LEM. The CSM’s computer would handle the translunar and transearth navigation and the LEM’s would provide for autonomous landing, ascent, and rendezvous guidance. The second LEM computer was a backup designed to get the LEM back to the CSM in the event of a failure of the primary LEM AGS computer.

Margaret HamiltonThe scientist in charge of the software development program for the Apollo Guidance Computer was Margaret Hamilton, Director at the MIT Instrumentation Laboratory. AGC programs had to be written in low-level assembly language because high-level programming languages such as C for system programming had not yet been invented. The AGC programs were hard-wired into coils so it couldn’t crash.

DrDobbs explained the AGC used a unique form of Read-Only Memory (ROM) known as “rope core memory” to store its operating program. This technology used tiny rings of iron that had wires running through them. When a wire ran through the center of the ring, it represented the binary number 1. When it ran outside, it was 0. The result was an indestructible memory that could not be erased, altered, or corrupted.

rope core memory

NASA Apollo Rope core memory with a Quarter for scale

To program these rope memories, MIT used what they dubbed the LOL method, for “little old ladies.” This was because the programming was done by ex-textile workers who skillfully sent wire-carrying needles through the iron rings. They were aided by an automated system that showed them which hole in the workpiece to insert the needle into, but it was still a highly-skilled job that required concentration and patience.

Multitasking operating system

Apollo 11 LEM EagleThe Apollo Guidance Computer ran a multitasking operating system called EXEC, capable of executing eight jobs simultaneously. The two major lunar flight programs were called COLOSSUS and LUMINARY. The former was chosen because it began with “C” like the CSM, and the latter because it began with “L” like the LEM. Although these programs had many similarities, COLOSSUS and LUMINARY were the only ones capable of navigating a flight to the moon.

NASA also had to develop the discipline of software engineering for software validation and verification were developed, making extensive use of hardware and software simulators. By 1968, over 1,400 man-years of software engineering effort had been expended, with a peak manpower level of 350 engineers.

The AGC user interface, the DSKY (DiSplay&KeYboard) was mounted in both the Command Module and the Lunar Module. The astronauts had to enter commands and data for the AGC with large buttons the astronauts could operate with their spacesuit gloves on. The keyboard also gave them feedback beyond the other million lights and indicators in the cockpits.

Mainframe computerMr. Szondy put the scale of the AGC development in some context. The AGS was being developed at a time when computer technology and the entire electronics industry was undergoing a revolution. When the Apollo program began, computers were still gigantic machines that took up whole rooms. (rb– check out EMERAC in the 1957 movie Desk Set). There was only a handful of big iron in the entire world and they required a priesthood of attendants to care for and feed the monoliths. The engineers at NASA spent 2,000 man-years of engineering down-sizing main-frame technology to fit inside the Apollo spaceships.

And it wasn’t just computing technologies that were advancing. In 1958 the integrated circuit (IC) was introduced. The IC threw the whole question of who was designing and who was supplying computers into flux.

An early user of integrated circuits

ACG was one of the first computers to use integrated circuits. Integrated circuits of the time were rudimentary and very expensiveTexas Instruments (TXN) was selling ICs to the military for about $1,000 each. In 1963 the Apollo program consumed 60 percent of the integrated circuit production in the United States. By 1964, over 100,000 IC’s had been used in the Apollo program. when Philco-Ford was chosen to supply the ICs, the price had dropped to $25 each.

Mr. Szondy writes that the Apollo Guidance Computer is one of the unsung successes of the Space Race because it was so phenomenally successful, having had very few in-flight problems. The Apollo Guidance Computer led the way with an impressive list of firsts, The AGC was the first:

  • Most advanced fly-by-wire and inertial guidance system,
  • Digital flight computer,
  • Real-time embedded computing system to collect data automatically and provide mission-critical calculations,
  • Computer to use silicon chips, and
  • Onboard computer where the lives of crew depended on it functioning as advertised.

The AGC was the most advanced miniature computer to date.

rb-

In 1969 Scooby-Doo, Frosty the Snowman, and The Brady Bunch debut on TV. But what most people of a certain age remember is when 650 million people worldwide watched Neil Armstrong’s “one small step for man, one giant leap for mankind” to became a defining moment in the hearts and minds across the globe.

Related Posts

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.