Thursday, July 16, 2015

Some Useful Linux Commands

Some Useful Linux Commands


1 Introduction
This is my own summary of useful Linux abbreviations, directories, files, and commands. I use my own annotations to recall useful options and arguments that are not necessarily documented in easy-to-find places. I quite often call up this file when I can't remember the syntax of a command that I use often (but not often enough to remember the syntax!). I also editorialize on the relative usefulness of different types of programs.
This document is work in progress. Send suggested changes and corrections to ambler.steven@uqam.ca
O'Reilly has just published online an alphabetical list of commands from Linux in a Nutshell. It is available here. It contains more detailed explanations of many of the commands listed here.
2 Shorthand at the Command Prompt
Some of these are specific to the bash shell. I have not experimented enough with other shells to know which are common to all shells. See also the ``Bash Reference Card'', SSC (2000), available online.
• / - root directory
• ./ - current directory
• ./command_name - run a command in the current directory when the current directory is not on the path
• ../ - parent directory
• ~ - home directory
• $ - typical prompt when logged in as ordinary user
• # - typical prompt when logged in as root or superuser
• ! - repeat specified command
• !! - repeat previous command
• ^^ - repeat previous command with substitution
• & - run a program in background mode
• [Tab][Tab] - prints a list of all available commands. This is just an example of autocomplete with no restriction on the first letter.
• x[Tab][Tab] - prints a list of all available completions for a command, where the beginning is ``x''
• [Alt][Ctrl][F1] - switch to the first virtual text console
• [Alt][Ctrl][Fn] - switch to the nth virtual text console. Typically, there are six on a Linux PC system.
• [Alt][Ctrl][F7] - switch to the first GUI console, if there is one running. If the graphical console freezes, one can switch to a nongraphical console, kill the process that is giving problems, and switch back to the graphical console using this shortcut.
• [ArrowUp] - scroll through the command history (in bash)
• [Shift][PageUp] - scroll terminal output up. This also works at the login prompt, so you can scroll through your boot messages.
• [Shift][PageDown] - scroll terminal output down
• [Ctrl][Alt][+] - switch to next X server resolution (if the server is set up for more than one resolution)
• [Ctrl][Alt][-] - change to previous X server resolution
• [Ctrl][Alt][BkSpc] - kill the current X server. Used when normal exit is not possible.
• [Ctrl][Alt][Del] - shut down the system and reboot
• [Ctrl]c - kill the current process
• [Ctrl]d - logout from the current terminal
• [Ctrl]s - stop transfer to current terminal
• [Ctrl]q - resume transfer to current terminal. This should be tried if the terminal stops responding.
• [Ctrl]z - send current process to the background
• reset - restore a terminal to its default settings
• [Leftmousebutton] - Hold down left mouse button and drag to highlight text. Releasing the button copies the region to the text buffer under X and (if gpm is installed) in console mode.
• [Middlemousebutton] - Copies text from the text buffer and inserts it at the cursor location. With a two-button mouse, click on both buttons simultaneously. It is necessary for three-button emulation to be enabled, either under gpm or in XF86Config.
3 Typical Dot Files
There is some redundancy across these programs. For example, the look and behavior of emacs can be customized by usinng the .emacs file, but also by adding the appropriate modifications to the .Xdefaults file. Default versions of these files are often installed in users' home directories when the software packages that use them are installed. If a program doesn't find its configuration file in the user's home directory, it will often fall back on a sytem-wide default configuration file installed in one of the subdirectories that the package lives in.
• .bash_logout - file executed by bash shell on logout
• .bash_profile - initialization of bash shell run only on login. Bash looks first for a .bash_profile file when started as a login shell or with the -login option. If it does not find .bash_profile, it looks for .bash_login. If it doesn't find that, it looks for .profile. System-wide functions and aliases go in /etc/bashrc and default environment variables go in /etc/profile.
• .bashrc - initialization command run when bash shell starts up as a non-login shell
• .cshrc - initialization commands that are run automatically (like autoexec.bat) when C shell is initiated
• .emacs - configuration file for emacs editor
• .fvwmrc - configuration file for fvwm window manager
• .fvwm2rc - configuration file for fvwm2 window manager
• .jedrc - configuration file for the jed text editor
• .lessrc - typically contains key bindings for cursor movement with the less command
• .login - initialization file when user logs in
• .logout - commands run when user logs out
• .wm_style - gives choice of default window manager if one is not specified in startx
• .Xdefaults - sets up X resources for individual user. The behavior of many different application programs can be changed by modifying this file.
• .xinitrc - initialization file when running startx. Can be used to activate applications, run a given window manager, and modify the appearance of the root window.
• .xsession - configuration file for xdm
4 Useful Files
• /boot/vmlinuz - the typical location and name of the Linux kernel. In the Slackware distribution, the kernel is located at /vmlinuz.
Some Useful Linux Commands
• /dev/fd0 - first floppy disk drive
• /dev/fd0H1440 - driver for the first floppy drive in high density mode. Generally, this is invoked when formatting a floppy drive for a particular density. Slackware comes with drivers that allow for formatting a 3.5" diskette with up to 1.7MB of space. Red Hat and Mandrake do not contain these device driver files by default.
• /dev/fd1 - second floppy disk drive
• /dev/hda - first IDE hard drive
• /dev/hdc - on many machines, the IDE cdrom drive. Most often, there is a symbolic link called /dev/cdrom which is just a link to the true cdrom driver file.
• /dev/null - used when you want to send output into oblivion
• /etc/aliases - file containing aliases used by sendmail and other MTAs (mail transport agents). After updating this file, it is necessary to run the newaliases utility for the changes to be passed to sendmail.
• /etc/bashrc - system-wide default functions and aliases for the bash shell
• /etc/conf.modules - aliases and options for configurable modules
• /etc/crontab - shell script to run different commands periodically (hourly, daily, weekly, monthly, etc.)
• /etc/DIR_COLORS - used to store colors for different file types when using ls command. The dircolors command uses this file when there is not a .dir_colors file in the user's home directory. Used in conjunction with the eval command (see below).
• /etc/exports - specifies hosts to which file systems can be exported using NFS. Man exports contains information on how to set up this file for remote users.
• /etc/fstab - contains information on partitions and filesystems used by system to mount different partitions and devices on the directory tree
• /etc/HOSTNAME - stores the name of the host computer
• /etc/hosts - contains a list of host names and absolute IP addresses.
• /etc/hosts.allow - hosts allowed (by the tcpd daemon) to access Internet services
• /etc/hosts.deny - hosts forbidden (by the tcpd daemon) to access Internet services
• /etc/group - similar to /etc/passwd but for groups
• /etc/inetd.conf - configures the inetd daemon to tell it what TCP/IP services to provide (which daemons to load at boot time). A good start to securing a Linux box is to turn off these services unless they are necessary.
• /etc/inittab - runs different programs and processes on startup. This is typically the program which is responsible for, among other things, setting the default runlevel, running the rc.sysinit script contained in /etc/rc.d, setting up virtual login terminals, bringing down the system in an orderly fashion in response to [Ctrl][Alt][Del], running the rc script in /etc/rc.d, and running xdm for a graphical login prompt (only if the default runlevel is set for a graphical login).
• /etc/issue - pre-login message. This is often overwitten by the /etc/rc.d/rc.S script (in Slackware) or by the /etc/rc.d/rc.local script (in Mandrake and Red Hat, and perhaps other rpm-based distributions). The relevant lines should be commented out (or changed) in these scripts if a custom pre-login message is desired.
• /etc/lilo.conf - configuration file for lilo boot loader
• /etc/motd - message of the day file, printed immediately after login. This is often overwritten by /etc/rc.d/rc.S (Slackware) or /etc/rc.d/rc.local (Mandrake/Red Hat) on startup. See the remarks in connection with /etc/issue.
• /etc/mtab - shows currently mounted devices and partitions and their status
• /etc/passwd - contains passwords and other information concerning users who are registered to use the system. For obvious security reasons, this is readable only by root. It can be modified by root directly, but it is preferable to use a configuration utility such as passwd to make the changes. A corrupt /etc/passwd file can easily render a Linux box unusable.
• /etc/printcap - shows the setup of printers
• /etc/profile - sets system-wide defaults for bash shell. It is this file in Slackware that sets up the DIR_COLORS environment variable for the color ls command. Also sets up other system-wide environment variables.
• /etc/resolv.conf - contains a list of domain name servers used by the local machine
• /etc/securetty - contains a list of terminals on which root can login. For security reasons, this should not include dialup terminals.
• /etc/termcap - ASCII database defining the capabilities and characteristics of different consoles, terminals, and printers
• /etc/X11/XF86Config - X configuration file. The location in Slackware is /etc/XF86Config.
• /proc/cpuinfo - cpu information
• /proc/filesystems - prints filesystems currently in use
• /proc/interrupts - prints interrupts currently in use
• /proc/ioports - contains a list of the i/o addresses used by various devices connected to the computer
• /proc/kcore - The command ls -l /proc/kcore will give the amount of RAM on the computer. It's also possible to use the free command to get the same information (and more).
• /proc/version - prints Linux version and other info
• /var/log/messages - used by syslog daemon to store kernel boot-time messages
• /var/log/lastlog - used by system to store information about last boot
• /var/log/wtmp - contains binary data indicating login times and duration for each user on system
5 Important Directories
Different distributions have different directory structures, despite attempts at standardization such as the the Linux Filesystem Hierarchy Standard (FHS) organization.
• /bin - essential UNIX commands such as ls, etc. Should contain all binaries needed to boot the system or run it in single-user mode
• /boot - files used during booting and possibly the kernel itself are stored here
• /dev - contains device files for various devices on system
• /etc - files used by subsystems such as networking, NFS, and mail. Includes tables of disks to mount, processes to run on startup, etc.
• /etc/profile.d - contains scripts that are run by /etc/profile upon login.
• /etc/rc.d - contains a number of shell scripts that are run on bootup at different run levels. There is also typically an rc.inet1 script to set up networking (in Slackwar), an rc.modules script to load modular device drivers, and an rc.local script that can be edited to run commands desired by the administrator, along the lines of autoexec.bat in DOS.
• /etc/rc.d/init.d - contains most of the initialization scripts themselves on an rpm-based system.
• /etc/rc.d/rc*.d - where ``*'' is a number corresponding to the default run level. Contains files for services to be started and stopped at that run level. On rpm-based systems, these files are symbolic links to the initialization scripts themselves, which are in /etc/rc.d/init.d.
• /etc/skel - directory containing several example or skeleton initialization shells. Often contains subdirectories and files used to populate a new user's home directory.
• /etc/X11 - configuration files for the X Window system
• /home - home directories of individual users
• /lib - standard shared library files
• /lib/modules - modular device driver files, most with .o extensions
• /mnt - typical mount point for many user-mountable devices such as floppy drives, cd-rom readers, etc. Each device is mounted on a subdirectory of /mnt.
• /proc - virtual file system that provides a number of system statistics
• /root - home directory for root
• /sbin - location of binaries used for system administration, configuration, and monitoring
• /tmp - directory specifically designed for programs and users to store temporary files.
• /usr - directory containing a number of subdirectory with programs, libraries, documentation, etc.
• /usr/bin - contains most user commands. Should not contain binaries necessary for booting the system, which go in /bin. The /bin directory is generally located on the same disk partition as /, which is mounted in read-only mode during the boot process. Other filesystems are only mounted at a later stage during startup, so putting binaries essential for boot here is not a good idea.
• /usr/bin/X11 - most often a symbolic link to /usr/X11R6/bin, which contains executable binaries related to the X Window system
• /usr/doc - location of miscellaneous documentation, and the main location of program documentation files under Slackware
• /usr/include - standard location of include files used in C programs such as stdio.h
• /usr/info - primary location of the GNU info system files
• /usr/lib - standard library files such as libc.a. Searched by the linker when programs are compiled.
• /usr/lib/X11 - X Window system distribution
• /usr/local/bin - yet another place to look for comon executables
• /usr/man - location of manual page files
• /usr/sbin - other commands used by superuser for system administration
• /usr/share - contains subdirectories where many installed programs have configuration, setup and auxiliary files
• /usr/share/doc - location of program documentation files under Mandrake and Red Hat
• /usr/src - location of source programs used to build system. Source code for programs of all types are often unpacked in this directory.
Some Useful Linux Commands
• /usr/src/linux - often a symbolic link to a subdirectory whose name corresponds to the exact version of the Linux kernel that is running. Contains the kernel sources.
• /var - administrative files such as log files, used by various utilities
• /var/log/packages - contains files, each of which has detailed information on an installed package in Slackware. The same file can also be found at /var/adm/packages, since the adm subdirectory is a symbolic link to log. Each package file contains a short description plus a list of all installed files.
• /var/log/scripts - package installation scripts in Slackware are stored here. You can inspect these scripts to see what special features are included in individual packages.
• /var/spool - temporary storage for files being printed, mail that has not yet been picked up, etc.
6 Important Bash Shell Variables
These variables are most often inherited or declared when a shell is started. A great reference for bash shell variable, bash builtin commands, and bash in general is SSC (2000).
• HOME - home directory, abbreviated as ~
• MAIL - name of file that mail is stored in (mailbox)
• MAILCHECK - sets the frequency at which bash checks for mail
• PATH - directory paths to search for executable files. According to A Practical Guide to Linux, p.329, the PATH is set in /etc/profile. On my Linux box, /etc/profile adds /usr/X11R6/bin to the path, which means that the path must be set before by another configuration file. The .bash_profile file in my home directory adds /home/ambler/bin to the path. On my Linux box, the first command to set the path would seem to be in /etc/rc.d/rc.sysinit, which is one of the shell scripts invoked by the init process (inittab). Then, /etc/profile adds /usr/X11R6/bin. Finally, .bash_profile adds /home/ambler/bin.
• PS1 - prompt string. Things that can be put in the prompt string include \h (hostname), \u (username), \w (absolute pathname of working directory), \W (name of working directory w/o path), \d (date), \t (time). See p.331 of A Practical Guide to Linux for more details. On my Red Hat boxes, the primary prompt string is set in the /etc/bashrc file. The prompt is also set in /etc/profile, but the setting in bashrc seems to take precedence. I also have a .bashrc file, which in turn runs /etc/bashrc, which sets the prompt. This means that the same prompt is used by xterm and rxvt in X sessions. On my Slackware box, the command line prompt is set in /etc/profile. The xterm and rxvt prompts are different, since I don't have a .bash_profile file which is run when an xterm is started. In fact, I don't know where the prompt is set in X sessions. It is not set by /usr/X11R6/lib/X11/app-defaults/XTerm.
• PS2 - secondary prompt string.
7 Important Daemons and Startup Services
These are programs or processes which are run at boot time. Some remain in memory to execute various tasks when required (daemons). Most are started and stopped with scripts in the /etc/rc.d/init.d directory (see above). The exact contents of this directory will depend on which packages from a particular distribution are installed. For example, installing the Apache package will cause an httpd script to be placed in /etc/rc.d/init.d.
There are man pages on most of these. The Red Hat program tksysv (ntsysv is the non graphical version) allows root to automatically configure which of these are started automatically at boot time. The linuxconf program does the same thing, although I haven't tried it. The utility chkconfig is also designed to query and configure runtime services for different runlevels. The www.mandrakeuser.org site has a good page on common services/daemons, especially those included in recent versions of the Mandrake distribution.
A good source of information on daemons and services is the ``Linux Devices, Daemons, Services'' chapter of the CTDP (2000a) document.
• amd - runs the automount daemon for remote filesystem mounting such as nfs
• anacron - checks delayed `cron' tasks (see below) at boot time and executes them. Useful if you have cron jobs scheduled but don't run your machine all the time.
• apmd - Advanced Power Management BIOS daemon. For use on machines, especially laptops, that support apm. Monitors battery status and can shut down the system if power is too low.
• arpwatch - keeps watch for ethernet IP address pairings that are resolved using the ARP protocol.
• atd - runs jobs queued by `at'
• autofs - control the operation of automount daemons, used to mount and unmount devices on demand
• bootparamd - allows computers to boot from a Linux machine using the BOOTP network protocol. A server process that provides information to diskless clients necessary for booting
• crond - automatic task scheduler. Manages the execution of tasks that are executed at regular but infrequent intervals, such as rotating log files, cleaning up /tmp directories, etc.
• cups - daemon for print services under the Common Unix Printer System, a replacement for lpd
• dhcpd - implements the Dynamic Host Configuration Protocol (DHCP) and the Internet Bootstrap Protocol (BOOTP). Used to lease out IP addresses to remote machines.
• drakfont - font server in Mandrake
• fetchmail - daemon to fetch mail at regular intervals from mail servers
• ftpd - ftp server daemon
• gated - routing daemon that handles multiple routing protocols and replaces routed and egpup
• gpm - useful mouse server for applications running on the Linux console.
• httpd - the Apache webserver hypertext transfer protocol daemon
• identd - The identd server provides a means to determine the identity of a user of a particular TCP connection. Given a TCP port number pair, it returns a character string which identifies the owner of that connection on the server's system.
• inetd - listens for service requests on network connections, particularly dial-in services. This daemon can automatically load and unload other daemons (ftpd, telnetd, etc.), thereby economizing on system resources. In the latest version of Red Hat (7.0 at the time of writing), it has been replaced by xinetd. A partial list of services controlled by inetd is listed below. Under many distributions, inetd will execute scripts in the file /etc/inetd.conf.
• innd - Usenet news server daemon
• ipchains - daemon for packet forwarding. Used for configuring a gateway/firewall.
• isdn provides ISDN network interfacing services
• isdn4linux - for users of ISDN cards
• kerneld - automatically loads and unloads kernel modules
• keytable - loads the appropriate keyboard map from /etc/sysconfig/ keyboard
• kheader -
• kudzu - detects and configures new or changed hardware during boot
• linuxconf - ``startup hook'' needed for the linuxconf system configuration tool
• lpd - line printer and print spooler daemon
• mcserv - server program for the Midnight Commander networking file system. It provides access to the host file system to clients running the Midnight file system (currently, only the Midnight Commander file manager). If the program is run as root the program will try to get a reserved port otherwise it will use 9876 as the port. If the system has a portmapper running, then the port will be registered with the portmapper and thus clients will automatically connect to the right port. If the system does not have a portmapper, then a port should be manually specified with the -p option (see below).
• mysql - database server daemon
• named - provides DNS services
• netfs - network filesystem mounter. Used for mounting nfs, smb and ncp shares on boot.
• network -activates all network interfaces at boot time by calling scripts in /etc/sysconfig/network-scripts
• nfsd - used for exporting nfs shares when requested by remote systems
• nfslock - starts and stops nfs file locking service
• numlock - locks numlock key at init runlevel change
• pcmcia - generic services for pcmcia cards in laptops
• portmap - needed for Remote Procedure Calls
• postfix - mail transport agent which is a replacement for sendmail. Now the default on desktop installations of Mandrake.
• postgresql - database server daemon
• random - random number generating daemon, related to security and encryption
• routed - manages routing tables
• rstatd - kernel statistics server. Allows users on a network to get performance statistics for any connected machine.
• rusersd - provides services that allow users to find one another over the network
• rwalld - allows users to use rwall to write messages on remote terminals
• rwhod - server which maintains the database used by the rwho(1) and ruptime(1) programs. Its operation is predicated on the ability to broadcast messages on a network.
• sendmail - mail transfer agent. This is the agent that comes with Red Hat. Others, such as smtpd, are not included.
• smb - needed for running SAMBA
• snmpd - provides Simple Network Management Protocol support
• sound - daemon for managing sound
• squid - web page proxy server daemon
• syslogd - manages system log files
• smtpd - Simple Mail Transfer Protocol, designed for the exchange of electronic mail messages. Several daemons that support SMTP are available, including sendmail, smtpd, rsmtpd, qmail, zmail, etc.
Some Useful Linux Commands
• tcpd - from the tcp_wrappers package. Intercepts requests normally handled by inetd and filters them through the files hosts.allow and hosts.deny files, which can restrict access to services based on type of service, origin of request, destination, etc. Requests are intercepted because calls to particular services are replaced with calls to tcpd in /etc/inetd.conf.
• telnetd - telnet server daemon
• usb - daemon for devices on Universal Serial Bus
• xfs - X font server
• xinetd - more modern replacement for inetd. It apparently allows for similar kinds of access filters to the ones used by tcpd in conjunction with inetd. xinetd replaces inetd as the default network services daemon in Red Hat 7.0.
• xntpd - Network Time Protocol daemon. Provides a means to syncronize time over the network.
• webmin - daemon for webmin web-based system administration program
• ypbind - NIS binder. Needed if computer is part of Network Information Service domain.
8 Window Managers
The ``Window Managers for X'' site is extremely useful for keeping track of new Linux window managers. See http://winman.org.
• Afterstep - Based on Fvwm. Designed to give a similar look and feel to the NextStep interface.
• AnotherLevel - a custom configuration for fvwm2 which mimics the look and feel of Windows95.
• Blackbox - a light, fast, window manager. It doesn't clutter the screen with too much junk, but it gets the job done efficiently.
• CDE - Common Desktop Environment. This is the default window manager on many commercial Unix systems. There is no free version.
• Enlightenment - Very configurable, and probably the coolest looking window manager, but a bit of a resource hog.
• Flwm - Fast, Light Window Manager. It has very few features, but is very small.
• Fvwm - F (?) Virtual Window Manager. This, along with Fvwm2, are old standbies in the Linux world. They are quite configurable, but configuration involves editing text files which are sometimes obscure.
• Fvwm2 - newer version of above.
• Fvwm95 - implementation of Fvwm2 configured to look and feel like Windows 95.
• Gnome - Gnome desktop environment. A themable collection of desktop utilities that can be used with different window managers. The current default window manager for a gnome session is Sawfish.
• Icewm - Ice Window Manager. Very small, very fast, quite configurable. On low memory/small hard drive machines, this one is my favorite. Configuration involves editing text files, but the syntax is extremely easy to understand. There are also a couple of third-party programs available which allow the user to configure Icewm using a graphical interface.
• KDE - K Desktop Environment. Many of the desktop utilities can be run under different window managers. I may be wrong, but I believe kikbd is the only program out there that allows the user to reconfigure the keyboard layout to different national keyboards on the fly, with one-click switching from one to the other. Unfortunately, this utility is no longer available under KDE 2.x.
• Kwm - the window manager that comes with the KDE desktop environment.
• Mwm - Motif window manager.
• Olwm - Open Look window manager.
• Sawfish - a small, efficient, configurable window manager that is now the default window manager with Gnome.
• Twm - Tab window manager.
• UDE - Unix Desktop Environment. In early development stages. An attempt to create a new type of desktop environment for Unix machines, including Linux.
• Windowmaker - One of the more popular window managers. Highly configurable and themable.
• XFce - ``Cholesterol-Free Desktop Environment''. Includes its own window manager, a toolbar, a sound manager, a background manager, and a file manager. It has tearoff menus, up to twelve virtual desktops, etc. It is completely configurable with menus. Its toolbar looks like the one in CDE. I find it easy to use and to configure, and easy on system resources.
9 Alphabetical List of Principal Commands
In the following command list, the distinction between upper case and lower case letters is important. Most of the commands are utilities that are run by invoking their own executable files. In some cases, they are commands which are internal to a shell such as bash (shell builtins). The shell builtins are indicated. There are now many utilities that are included with either the Gnome or the KDE desktop environments, so many that it would be difficult to include them all here. In many cases, they duplicate the functionality of one or more of the programs listed below. I would suggest consulting the online documentation for these packages.
Another good source of information on commands is the CTDP (2000b) document. There are different chapters which group commands in different categories.
On rpm-based systems, to find out which package owns the command foo (where foo is a standalone executable), use the command rpm -q -f foo.
• a2p - translation utility from awk to Perl
• a2ps - translation utility from ``any'' to Postscript
• ac - print statistics concerning user connect time
• access - determine whether a file can be accessed
• acroread - Adobe utility for viewing pdf files
• adduser - used by root to add user to system
o usage: adduser userid
• afio - utility to copy or restore files to an archive file. This utility is not part of the basic internal and external programs under Red Hat Linux. It is available as an rpm on the rpmfind.net site.
• agetty - enables login on terminals. See getty, mgetty, and uugetty.
• ali - list mail aliases
• alias - assign name to specified command list. This is actually a shell builtin. On my Red Hat system, I have global alias commands in my /etc/bashrc file and in my /.bashrc file. On my Slackware box, I have made the rm command a little bit safer with
o alias rm='rm -i'
so that you can't recursively delete your /dev directory without telling the system you're sure you want to do it.
• alien - utility to convert to and from different Linux package formats. Can handle Debian (deb), Stampede (stp), Red Hat (rpm) and Slackware (tgz) packages.
• apropos - display command names based on keyword search
o usage: apropos keyword
• apsfilter - printer filter called by lpd to deal with printing different types of files. This is a fairly sophisticated print filter. It is not set up by default in Slackware. It used to be available on the second cd of a Slackware distribution. Since 4.0, it is available as one of the main packages in the ap set. Read the mail that the installation program sends to the root user. I believe that Red Hat uses its own printer filters.
• ar - create, modify and extract from archives
• arch - print machine architecture type
• as - the portable GNU assembler
• asapm - AfterStep laptop advanced power management utility
• ash - a shell, a very simple shell program sometimes used on boot diskettes since it takes up much less space than bash, tcsh, zsh, etc.
• asload - AfterStep cpu load monitor
• asmail - AfterStep mail checking utility
• asmodem - AfterStep utility to monitor modem status
• aspell - a spell checking program along the lines of ispell
• aspostit - X Window postit note utility
• at - executes a shell script at specified time. Use atq to show pending jobs, and atrm to remove jobs from the queue.
o usage: at time
o or: at -f file time
• atq - shows pending jobs queued by at. If run by root, shows everybody's pending jobs.
• atrm - removes pending jobs queued by at. Use atq to determine the identities of various jobs.
o usage: atrm job
• awk - searches for and process patterns in a file
• banner - print banner to standard output. Syntax is
o banner [option] [characters]
• bash - Bourne again shell. This is the default shell in the Red Hat installation.
• batch - queue, examine, or delete jobs for later execution. See at.
• bc - a language (compiler) similar to C, with unlimited precision arithmetic
• bg PID - send process with pid ``PID'' to the background. This is the same as executing [Ctrl]z while interacting with the running process. This is a shell builtin.
• bh - puts a job in the background. This is a shell builtin.
• biff - mail notification utility. Notifies user of mail arrival and sender's name.
• bind - displays or redefines key bindings. This is a shell builtin.
• bison - parser generator similar to yacc
• bru - a powerful backup utility program. Commercial. Demonstration versions are often included with Linux distributions such as Red Hat.
• bsh - equivalent to ash
• bunzip2 - used to uncompress files compressed with bzip2
• byacc - parser generator
• bzip2 - compresses with algorithm different from gzip
• bzless - view bzipped files
• c++ - invokes GNU C and C++ compiler
• cal - displays a 12-month calendar for the given year or a one-month calendar of the given month
o usage: cal month year
• cat - combine, copy standard input to standard output. Used to join or display files.
• cd - change working directory. This is a shell builtin in bash, tcsh and zsh.
• cdplay - command line utility for playing audio cds
• cfdisk - similar to fdisk, but menu-driven
• chat - used to interact with a modem via a chat script
• chgrp - changes group associated with file. Can be used to change the group associated with subdirectories and files of a directory.
o usage: chgrp group files
o or: chgrp -R group files
• chkconfig - Query or update system services/daemons for different runlevels. Manipulates the various symbolic links in /etc/rc.d. This utility is included with many rpm-based distributions such as RedHat and Mandrake. It is designed to work with System V initialization scripts. Graphical tools for configuring system services include ntsysv, tksysv and ksysv (the latter is a KDE utility).
• chmod - set permissions (modes) of files or directories. A value of 4 is used for read permission. A value of 2 is used for write permission. A value of 1 is used for execute permission. See umask for default file permissions upon file creation. Chmod can also be used to change the suid bit on files. The syntax for the symbolic version is
o chmod [options] who operation permission file-list
The syntax for the absolute version is
o chmod [options] mode file-list
Some Useful Linux Commands
To set the uid to the owner's permissions, use
o chmod u +s file-name
To set the uid to the group's permissions, use
o chmod g +s file-name
There are lots of security issues related to allowing a program to have root's permissions when run by an ordinary user. I don't pretend to understand all of these issues.
• chown - changes ownership of a file. Can be used recursively.
o usage: chown userid files
o or: chown -R userid files
• chsh - change default shell
• ci - creates or records changes in an RCS file
• clear - clear screen command
• cmp - compares two files for differences
o usage: cmp file1 file2
• co - retrieves an unencoded version of an RCS file
• comm - compares sorted files
• configure - automatically configures software source code
• color-xterm - color xterm program. Under Red Hat, this is just a link to xterm-color.
• control-panel - graphical system configuration tool under Red Hat.
• cp - copies on or more files. Recursive copying is one simple way of archiving part of a directory structure. Use the command as follows:
o cp -r /sourcedirectory /targetdirectory
• cpio - direct copy of files to an output device. Allows creation of archive file spanning multiple diskettes. Allows one directory structure to be mirrored elsewhere on the partition or on another partition. In order to back up an entire directory structure on diskettes, cd to the directory and use the following command:
o find . -depth -print  cpio -ov > /dev/fd0
To restore from diskettes, use:
o cpio -iv < /dev/fd0
The cpio command will prompt the user to insert more diskettes as they are needed. The command for mirroring a directory structure is the following:
o find . -depth -print  cpio -pv /destinationdirectory
This copies the working directory and its contents, including subdirectories, into /destinationdirectory. In order to copy an individual file which is larger than a floppy, use:
o find . -name nameoffile -print  cpio -iv > /dev/fd0
• cpkgtool - Slackware tool to install, uninstall and query packages. Front end to installpkg, removepkg, makepkg. This is the graphical version that uses ncurses.
• cpp - GNU C-compatible compiler preprocessor
• crontab - schedules command to run at regularly specified time
• csh - run C shell
• csplit - separate files into sections. See also split.
• cvs - manages concurrent acces to files in a hierarchy. Stands for concurrent version system. Is built on RCS. It stores successive revisions of files efficiently and ensures that access to files by multiple developers is done in a controlled manner. Useful when many developers are working on the same project.
• cut - selects characters or TAB-separated fields from lines of input and writes them to standard output
• date - displays or sets date and time
o usage: date
o or: date date
• dd - direct copy of file from one device to another. Can be used to make copies of boot or root diskettes for installing Linux. It can be used, for example, to make and exact copy of a floppy disk, as follows. First, place the diskette to be copied in the floppy drive. Then,
o dd if=/dev/fd0 ibs=512 > floppy.copy
o Replace the diskette with a fresh diskette.
o dd if=floppy.copy bs=512 of=/dev/fd0
The ibs and bs options specify the block sizes for input and for both input and output. A boot disk image can be directly copied to a floppy using the second of the two dd commands above.
• declare - declares attributes for a variable (same as typeset). This is a shell builtin.
• df - displays capacity and free capacity on different physical devices such as hard drive partitions and floppy drives that are mounted on the file system. Gives free space in blocks. With the (undocumented) option -h, the program gives free space in Mb or Gb. This is useful for those accustomed to thinking of the capacity of a high-density 3.5 inch diskette as 1440k.
• diff - displays differences between two files
o usage: diff file1 file2
• diff3 - compares three files and reports on differences
• dip - used to set up a SLIP or PPP connection. It can be used to set up an outgoing SLIP connection or an incoming connection.
• diplogin - used for setting up incoming dip connections. See the man page for dip.
• dir - a variation of the GNU ls command that defaults to printing file names in columns
• dircolors - set colors for GNU ls command. In Slackware, this command is run by the /etc/profile script. Then, whenever xterm is run with the -ls (login shell) option, ls displays different colors for different types of files. Typical usage is eval `dircolors -b`. In Red Hat and Mandrake, I get color directories by aliasing the ls command (see below).
• display - set display for output of programms under X Windows. Can be used to run a program on a remote machine while displaying the output on a local machine. The remote machine must have permission to send output to the local machine. This is actually an environment variable. See the more detailed discussion in connection with the xhost command below.
• dmesg - displays messages from /var/log relative to the most recent boot
• dos - invoke the DOSEMU DOS emulator
• du - displays information on disk usage. The command
o du / -bh | less
will display detailed disk usage for each subdirectory starting at root, giving files sizes in bytes.
• dumpkeys - print information about the keyboard driver's translation tables to standard output
• dvilj - send a dvi file to a Laserjet printer. There are specialized versions for individual models of Laserjet printer.
• dvilj2p - specialized version of dvilj for the IIp series of printers. See above.
• dvips - send a dvi file to a Postscript printer, to a Postscript capable Laserjet printer, or to a file (with the -o option). There is a switch to print only a subset of the pages, and another switch to print in landscape mode. Use -t landscape, which is one of the arguments to the paper type switch. If you have one page of a document that is a wide table, and you wish to print this in landscape mode, use
o dvips filename -pp pagenumber -t landscape
• e2fsck - check an ext2 filesystem. The syntax is
o e2fsck /dev/devicename
where the filesystem is on /dev/devicename. The device should not be mounted, and this program must be run as root.
• echo - write arguments to standard output. One use is to print out information about environment variables, as in
o echo $PATH - list paths to search
o echo $HOME or echo ~ - list name of home directory
This is a shell builtin.
• editres - a dynamic resource editor for X Toolkit applications. Allows the user to change X resources for individual applications.
• efax - fax program
• efix - convert between fax, text, bit-map and gray-scale formats
• egrep - search files for lines that match regular expressions. Runs faster than grep and fgrep.
• elm - an interactive mail system
• elvis - a version of the vi text editor
• emacs - screen oriented text editor
• env - desplay the current environment or set a variable equal to a new value
• eval - scans and evaluates the command line. See dircolors command. This is a shell builtin.
• ex - interactive command-based editor. The man page lists it as being the same as vim, an improved version of vi.
• exec - system call which creates a subshell to execute a binary or a script. This is a shell builtin.
• execve - a variation of the exec command.
• exit - exit a shell. This is a shell builtin.
• expand - convert tabs in files to spaces and write to standard output
• expect - a program that ``talks'' to other interactive programs according to a script. Following the script, Expect knows what can be expected from a program and what the correct response should be. An interpreted language provides branching and high-level control structures to direct the dialogue. In addition, the user can take control and interact directly when desired, afterward returning control to the script.
• export - place the value of a variable in the calling environment (makes it global). This is a shell builtin.
• expr - utility evaluates an expression and displays the result
• f2c - FORTRAN to C translator
• f77 - FORTRAN 77 compiler
• false - null command that returns an unsuccessful exit status
• fax - simple user interface to efax and efix programs
• fc - views, edits, and executes commands for the history list. This is a shell builtin.
• fdformat - low level format of a floppy device
• fetchmail - retrieve mail from a remote mail server and pass it to local SMTP agents on the local machine
Some Useful Linux Commands
• fdisk - used to partition hard drives
o usage: fdisk device
• fg PID - bring a background or stopped process with pid ``PID'' to the foreground. This is a shell builtin. If only one process is running in background mode, fg with no argument is sufficient to bring it to the foreground
• fgrep - search for patterns in files
• file - displays classification of a file or files according to the type of data they contain
• find - find files according to a large variety of search criteria. The find command that I use the most is
o find . -name filename -print
in order to find files matching a particular name on the working directory and all subdirectories. Find can be incredibly powerful, but it is incredibly obscure.
• finger - display information about a specified userid or userids
• fmt - simple text formatting utility. Tries to make all nonblank lines nearly the same length.
• fold - break lines of specified files so they are no wider than a specified lengths
• fortune - available in the bsdgames package in Slackware and other distributions. Put a call to fortune in /etc/profile and get something inspirational or amusing every time you fire up an xterm as a login shell.
• free - gives used and free memory on system along with other useful information
• fromdos - takes a DOS text file from stdin and sends a UNIX file to stdout.
• fsck - file system check and repair
• ftp - file transfer over network
• g++ - C++ compiler
• g77 - GNU Fortran 77 compiler
• gawk - GNU awk, mostly for processing delimited text files
• gcc - invoke C, C++ compiler
• getipts - parses arguments to a shell script. This is a shell builtin.
• getkeycodes - print kernel's scancode-to-keycode mapping table
• ghostscript - set of printing utilities. It seems to be obligatory to have this if a TEX installation such as teTEX is installed. How they communicate with one another is somewhat obscure.
• ghostview - Aladdin ghostscript interpreter/previewer
• gimp - image manipulation and paint program
• glint - Red Hat graphical front end for the rpm package installer and manager.
• grep - used to find a string within a file. The -i option returns matches without regard to case. The -n option means that each line of output is preceded by file name and line number. The -v option causes non-matched lines to be printed.
o usage: grep pattern files
o or: grep -i pattern files
o or: grep -n pattern files
o or: grep -v pattern files
• groupadd - create a new group on the system
• groups - shows which groups you are in
• grub - Gnu grand unified bootloader. Can be used instead of lilo to boot multiple operating systems. I encountered a couple of snafus trying to install grub on my home machine after installing Mandrake 8.0 and choosing the lilo bootloader during the initial install. The Mandrake installation program set up /boot/vmlinuz as a symlink to the actual kernel, vmlinuz-2.4.3-20mdk. It took me a while to figure out that grub doesn't understand symbolic links. The documentation suggests installing grub on a diskette using the ``dd'' command. This refused to work, but
o grub-install '(fd0)'
did work. The single quotes are necessary. The files necessary to run grub are normally located in /boot/grub. Once the file menu.lst has been edited and appropriated entries added to boot the different operating systems on one's hard disk(s), the following sequence of commands can be used to install grub in the master boot record (MBR) sector of the hard disk:
o root (hd0,x)
o setup (hd0)
Here, the x should be replaced by the partition where the /boot/grub directory is located, which is probably the root partition of the Linux system. Note that grub has its own conventions for naming devices and numbering partitions, so that for example a partition which is called hda6 under Linux will be called (hd0,5) by grub.
• grub-install - command to install grub on the hard drive (or floppy drive).
• gunzip - used to uncompress files compressed with gzip
• gv - PostScript and PDF previewer, based on ghostview
• gvim - see vi
• gzexe - compresses executables
• gzip - used to compress or decompress files
• halt - shut down system as root, without reboot, immediately
• hash - remembers the location of commands in the search path. This is a shell builtin.
• head - displays first part of a file
• history - command for viewing and manipulating the shell command history list
• host - look up host names using domain server
• hostname - used to get or set hostname. Typically, the host name is stored in the file /etc/HOSTNAME.
• hwclock - used to query and set the hardware clock
• hylafax - commercial fax program
• id - display userid and groupid
• inetd - daemon which starts up other daemons on demand. Configured in /etc/inetd.conf.
• ifconfig - display (as root) information on network interfaces that are currently active. First ethernet interface should be listed as eth0, second as eth1, etc. First modem ppp connection should be listed as ppp0, etc. The ``lo'' connection is ``loopback'' only.
• ifdown - shut down the network interface
• ifup [interface_name] - start up the interface
• info - display system information. This is the GNU hypertext reader.
• init - the mother of all processes, run at bootup, executes commands in /etc/inittab. Can be used (with root privileges) to change the system run level.
o usage: init run_level
• insmod - used (by root) to install modular device drivers
• installpkg - Slackware command to install one of the packages from the program sets
• intr - interrupt key, usually [Ctrl-C]
• ispell - checks files for spelling errors
o usage: ispell files
• jed - programmer's file editor. Behaves like emacs. Has modes for TEX, FORTRAN, C, etc.
• jobs - displays list of current jobs in the background. This is a shell builtin.
• joe - simple WordStar-like text editor. It can be invoked in emacs emulation mode with jemacs and in WordStar emulation mode with jstar.
• jove - Joseph's Own Version of Emacs. A simple emacs clone.
• kbd_mode - print current keyboard mode
• kernelcfg - GUI to add/remove kernel modules (as root in X terminal).
• kerneld - kernel daemon, a process that stays in memory and does all sorts of useful stuff, like automatic loading of device driver modules
• kikbd - a utility program that comes with KDE that allows users to switch on the fly among different international keyboards. It can be used under different window managers than kfm.
• kill - sends a signal to (especially to terminate) a job or process. This is a shell builtin in bash, tcsh and zsh.
• killall - kill processes by name. Kill all processes which are instances of the speciffied program. Also used to send signals to processes or restart them.
• killall5 - kill all processes except the ones on which it depends
• last - generate a listing of user logins
• lastlog - prints the last login times of all users
• latex - compile a LATEX file
• ldconfig - creates the necessary links and cache (for use by the run-time linker, ld.so) to the most recent shared libraries found in the directories specified on the command line, in the file /etc/ld.so.conf, and in the trusted directories (/usr/lib and /lib). Ldconfig checks the header and file names of the libraries it encounters when determining which versions should have their links updated. Ldconfig ignores symbolic links when scanning for libraries.
• ldd - list the shared libraries on which a given executable depends, and where they are located
• leave - display reminder at specified time
• less - Linux alternative to ``more'' command. Displays text files, one screenful at a time. When less pauses, there is a large number of available commands to tell it what to do next. One can scroll both forwards and backwards.
• let - evaluates a numeric expression. This is a shell builtin.
• lilo - installs boot loader on the boot sector of a hard drive, of a diskette, or in another location. My 486 has a hard drive that is too large for the machine's BIOS, so I have to boot from a floppy. To create a boot diskette, I do the following (as root):
o /sbin/fdformat /dev/fd0H1440
o /sbin/mkfs.ext2 /dev/fd0
o mount -t ext2 /dev/fd0 /mnt/floppy
o cp -dp /boot/* /mnt/floppy
o /sbin/lilo -C /etc/lilo.flop
The -C option to lilo has lilo use the lilo.flop file instead of the default lilo.conf.
• linuxconf - interactive tool for configuring Linux system. Uses X if loaded. This is a Gnome tool. It comes with my Red Hat distribution, and is not included with Slackware. It would seem to be the easiest way to configure Linux under Slackware. Version 1.15 is available for Slackware. There is a pretty good introduction to the use of linuxconf in the Red Hat 5.2 installation manual, which is available online at their web site.
• ln - creates a link to a file. Used to create hard links and, with the -s option, symbolic links which can link files on different disk partitions. The syntax is
o ln [options] source [dest]
• locate filename - find the file name which contains the string ``filename''. The syntax is easier than the find command.
• lock - temporarily lock terminal
• lockfile - create semaphore file(s), used to limit access to a file
• - log in to system
• logname - consult /etc/utmp for user's login name
• logout - execute logout as individual user and bring up login: prompt
• look - look for strings in files
• lpq - show print jobs that are waiting
• lpr - send file to be printed
• lprm - cancel a job from print queue
• ls - list directory contents. To get colored directory listings under Red Hat, Mandrake, etc., use
o ls -color
To get this all the time, add
o alias ls='ls -color=auto'
to .bashrc. The following command
o alias ls='ls -Fskb -color=auto'
will give directory listings in color, with file sizes in kilobytes, and append a character to the file to indicate its type.
Some Useful Linux Commands
• lsattr - list attributes of files in ext2 file system
• lsmod - used (by root) to show kernel modules currently loaded
• lspci - utility to display information on pci buses and hardware devices attached to them. Part of the pciutils package that comes with many Linux distributions.
• lspnp - utility to display information about pnp devices. Part of the pcmcia or kernel-pcmcia package, depending on the distribution.
• m4 - an implementation of the traditional UNIX macro processor. It can be used with the sendmail configuration package in Red Hat (and Slackware) to generate a sendmail.conf configuration file without having to edit the configuration file directly.
• magicfilter - general purpose printer filter. See apsfilter above. apsfilter is the printer filter that comes with the Red Hat and Slackware distributions.
• mail - sends or reads electronic mail
• make - keeps a set of programs current. This is a utility that helps when developing a set of programs. It works by executing a script called makefile, Makefile or GNUmakefile in the working directory. It is very often used in combination with configure when compiling and installing noncompiled software packages.
• makebootdisk - command in Slackware to do just what the name says
• MAKEDEV - executable script to make device files on /dev
• makeswap - configures swap space
• man - displays information from online Unix reference manual
• manpath - attempt to determine path to manual pages
• mc - Midnight Commander file manager and visual shell
• mesg - enables/disables reception of messages
• minicom - terminal program
• mkdir - create a directory
• mkfs - create a file system (format) on a device or partition. Should be invoked after lowlevel formatting of the disk using fdformat. It has several versions which are all links to the basic program, such as mkfs.ext2 and mkfs.msdos.
• mkswap - creates a Linux swap space on the specified hard disk parition (root privileges neede)
o usage: mkswap device
• more - list file contents, stopping after each full screen
• mount -t [fstype] [device] [mountpoint] - mount device using filesystem of type [fstype] with device name [device] at the location [mountpoint] in the filesystem directory tree
• mount -a - mount all filesystems according to the specifications in /etc/fstab
• mouseconfig - mouse configuration utility under Red Hat. Located in /usr/sbin.
• mpage - print multiple pages per sheet on a Postscript printer. Can also be used to print a page in landscape mode.
• Mtools - package of MS-DOS utilities. Includes the following commands.
o mcd - changes working directory on DOS disk
o mcopy - copies DOS files from one directory to another
o mdel - deletes DOS files
o mdir - lists contents of DOS directories
o mformat - adds DOS formatting information to a disk
o mtype - displays contents of a DOS file
The default device for execution of these commands is /dev/fd0 and can be referred to as ``a:''.
• mv - moves (renames) files
• netconf - used (as root) to set up network
• newaliases - rebuilds the /etc/aliases database used by sendmail. Must be rerun every time /etc/aliases is modified for the changes to take effect.
• newgrp - similar to login. Changes user's identification
• nice program_name - sets the priority of the program ``program_name''.
• nm - lists the symbols from object files objfile. If no object files are given as arguments, nm assumes `a.out'.
• nohup - runs a command that keeps running after logout. The command is in principle immune to hangups, and must have output to a non tty. According to Linux in a Nutshell, this is necessary only in the Bourne shell, since modern shells preserve background processes by default.
• ntsysv - run level editor under Red Hat. This is the equivalent of tksysv, but does not require a graphical interface.
• nxterm - color xterm program. The man page for nxterm under Red Hat brings up the same page as xterm.
• od - dumps contents of a file
• passwd - change login password
• paste - joins corresponding lines from files
• patch - updates source code. Attempts to update a file from a file of change information, or pathces, created by diff.
• pathchk - determine validity and portability of filenames
• pdflatex - part of the pdftex program suite. Produces pdf output from a LATEX file.
• pdftex - produces pdf output from a TeX file. See also pdflatex. This program is part of the tetex 0.9 distribution that is included with Red Hat 5.2 and above, and with Slackware 4.0 and above. It is also available as a separate program.
• perl - practical extraction and report language
• pg - display data one screenful at a time
• pico - simple screen oriented text editor. It is included as part of the Pine program.
• ping - check if Internet computer is responding. Can also measure the time it takes the queried computer to respond.
• pkgtool - Slackware tool to install, uninstall and query packages. Front end to installpkg, removepkg, makepkg. The cpkgtool is the ncurses graphical version of this program.
• popclient - retrieve mail via the Post Office Protocol. Supports POP2 and POP3.
• popd - pops the top directory of the directory stack and uses cd to change to that directory. This is a shell builtin.
• pr - paginates files for printing
• printenv - display list of environment variables
• printtool - run (as root) in an X terminal to configure your printer(s)
• ps - displays status of processes. Use the -a option for processes for all users. Use the -x option to include processes not attached to a terminal.
• pstree - display processes in the form of a tree structure. Killing a parent process will also kill all the children and their descendants.
• pushd - pushes the argument onto the top of the directory stack and uses cd to change to that directory. This is a shell builtin.
• pwd - print absolute path of working directory. This is a shell builtin.
• pwchk - checks the integrity of password and shadow files
• pwconv - converts passwords to the shadow password format
• pwunconv - unconverts passwords from the shadow password format. Generates a standard Unix password file.
• python - interpreted, interactive, object-oriented programming language
• rcp - copy one or more files to or from remote computer. The syntax is poorly explained in the documentation that I have, including the man pages. Usage is:
o rcp filename username@remotehost:path
The user's home directory on the remote system must contain the file .rhosts with a list of users (preceded by the full domain name or exact IP address of their machine) with access privileges.
o localhostname username
• rcs - creates or changes the attributes of an RCS file. Stands for Revision Control System.
• rdev - query/set image root device, swap device, RAM disk size, or video mode in kernel
• read - reads line from standard input. This is a shell builtin.
• readonly - declares a variable to be read only. This is a shell builtin.
• reboot - in Slackware, reboots the system. Seems to be equivalent to shutdown -r now in generic Linux.
• renice program_name - resets the priority of process ``program_name''.
• reset - used to reset the screen characteristics. This is useful if the screen gets messed up from, for example, trying to display a binary file in an xterm.
• return - exits from a function. This is a shell builtin.
• rlog - prints a summary of the history of an RCS file
• rlogin - log in to remote computer. The general syntax is as follows, using the UQAM Nobel machine as an example:
o rlogin -l userid nobel.si.uqam.ca
The remote computer must recognize the local user and the local machine. See the rcp command for how to set up the .rhosts file on the remote machine.
• rm - remove files or directories. With the -r (recursive) option (very dangerous!), can be used to remove the contents of a specified directory including all subdirectories.
• rmail - interpret and handle remote mail received via uucp
• rmdir - remove empty directories
• rmmod - used to remove modular device drivers
• route -n - show routing table. The n option returns numerical addresses rather than names.
• rpm - invokes the Red Hat package manager in command line mode. I often use this command in query mode to query packages about what files they contain and to find out which package owns a particular file. Examples are
o rpm -qil foo. Gives package information and a file list for the package foo.
o rpm -qfil foo. Gives package information and a file list for the package that owns the file foo. Foo must be in the working directory, or the full path to foo must be specified.
We need to find out about installing the rpm package on a Slackware box. It's probably better to use a package converter such as alien.
• rpm2tgz - an extremely useful utility on Slackware systems that converts rpm packages to tgz format. They can then be installed using the installpkg command (or pkgtool).
• rsh - execute shell command on a remote computer. See rcp and rlogin.
• rstat - summarize host's status: uptime, load averages, and current time
• ruptime - show host status of local machines
• rusers - list who is logged on local machines
• rwall - write to all users over a network
• rwho - show who is logged in on a LAN. The rwho service must be enabled for this command to run. If it isn't, run ``setup'' as root. I don't understand this last remark, which comes from ``Linux Newbie Administrator Guide''.
• rxvt - a terminal program similar to xterm, but which has less features and uses less memory
• sed - edits a file (not interactively). Also a tool for processing text files.
• set - set or display value of shell variables. This is a shell builtin. The command
o set | less
prints the current user environment, giving the values of currently defined variables.
• setenv - set or display value of environment variables
• setserial - used by root to configure a serial port
• setterm - set terminal attributes for a virtual console
• setuid - set the id of a program when it is run. Used, for example, to give root privileges to a program run by an ordinary user. This is actually done by running the chmod program as root. See the chmod command for the syntax.
• setup - Slackware program to set up program sets and configure system. Setup devices and file systems, mount root file system
• sh - standard UNIX shell. On Linux, just another name for bash.
• shift - promotes each command-line argument. This is a shell builtin.
• showmount - show information about an nfs server
• shutdown - reboot or shut down system as root, after specified amount of time. With the -r option, reboot. With the -h option, halt the system.
o usage: shutdown -r minutes
• sleep - creates process that sleeps for specified interval
• sliplogin - attaches a SLIP interface to standard input. Used to allow dialin SLIP connections.
• sort - sorts and/or merge files
• split - split file into specified number of segments
• ssh - secure shell. Apparently has many of the same functionalities as rlogin, telnet, ftp, rsh, etc., with better security and encryption features. We may want to learn how to set this up and use it.
• startx - front end to xinit in Linux. This is a script which starts up X clients and shuts down the X server on exit from the window manager.
• startx -- :1 - start the next X window session on the display 1 (the default is opened on display 0). One can switch between different graphical displays using [Ctrl][Alt][F7], [Ctrl][Alt][F8], etc.
• stty - sets or displays operating options for terminal
• su - log in as another user, including root
• sudo - allows individual users to have root permission to perform specified tasks
• swapoff - disables swap disk
• swapon - enables swap disk
• symlinks - provide list of and information about symbolic links
• sync - writes memory buffers to physical devices
• systat - query host for system information
• tac - print file in reverse
Some Useful Linux Commands
• tail - displays the last part of a file
• talk - visual communication program that copies lines from one terminal to that of another user
• tar - file compression and archiving utility. I find the syntax of this command to be frustratingly opaque. The following works for me. To use this command to unzip gzipped tarballs in verbose mode, use
o tar -xvzf filename.tgz
To create a tarball from files in a given directory and its subdirectories, use
o tar -cvzf filename.tgz sourcename
Sourcename can be the name of a single file, a wildcard such as *, or the name of a subdirectory. There seem to be two different conventions concerning gzipped tarballs. One often encounters .tar.gz. The other popular choice is .tgz. Slackware packages use the latter convention. The command can also be used to archive a file, a group of files, or a directory (with its subdirectories) on tape or onto floppies. If the material to be archived exceeds the capacity of the backup medium, the program will prompt the user to insert a new tape or diskette. Use the following command to back up to floppies:
o tar -cvf /dev/fd0 filename(s) or directoryname(s)
The backup can be restored with
o tar -xvf /dev/fd0
Tar can be used for other things. To mirror all the files and subdirectories in from-stuff to to-stuff, use the commands
o cd from-stuff
o tar cf - . | (cd ../to-stuff; tar xvf -)
No tar file is ever written to disk. The data is sent by pipe from one tar process to another. This example is taken from Running Linux, p.177. To list the table of contents of a tar archive, use
o tar tvf tarfile
To extract individual files from a tar archive, use
o tar xvf tarfile files
where files is the list of files to extract. When extracting files, tar creates missing subdirectories underneath the current directory in which the cammand is invoked.
• tcl - scripting language
• tcsh - extended version of the C shell
• tee - copy standard input to standard output and one or more files
• telinit - used to change run level. Exact run level that corresponds to single-user, multi-user, and X levels depends on distribution.
• telnet - remote login over network
• test - evaluates an expression or compares arguments. This is a shell builtin in bash, tcsh and zsh.
• tftp - user interface to TFTP protocol
• time - displays times for the current shell and its children. This is a shell builtin. Strange, because there is also a /usr/bin/time program on my Red Hat system.
• tin - Netnews reader
• tkdesk - graphical desktop file manager for X
• tksysv - graphical runlevel editor under Red Hat. Allows root to configure the services that are started at each run level.
• tload - display system load average in graph format
• top - dynamically displays process status
• touch - update access and modification times of a file. If the file does not exist on disk, an empty file is created.
• tr - translation utility that can be used, for example, to replace specified characters in a text file
• trap - traps a signal. This is a shell builtin.
• true - null command that returns a successful exit status
• tset - initializes terminal
• tty - shows special file that represents your terminal. Displays the terminal pathname.
• type - displays how each argument would be interpreted as a command. This is a shell builtin.
• typeset - declares attributes for a variaable (same as declare). This is a shell builtin.
• ul - translate underscores to underlining
• umask - establishes the file-creation permissions mask. Usage is
o umask xyz
The system subtracts x, y and z from the owner, group and other file permissions that it would otherwise assign to new files. This is a shell builtin.
• umount [device] - finish writing to the device and remove it from the active filesystem. The command umount -a will (re)mount all file systems listed in /etc/fstab.
• unalias - remove name previously defined by alias. This is a shell builtin.
• uname - displays information about the system. With no arguments, it displays the name of the operating system. With the -a option, it displays information about the operating system, the host name, and hardware.
• uniq - displays lines of a file that are unique
• unset - removes a variable or function. This is a shell builtin.
• unzip - uncompress files compressed with the zip utility, compatible with DOS PKzip
• updatedb - update file database used by locate command
• uptime - shows the time, how long the system has been up, the number of users, and average load.
• useradd - same as adduser
• userdel - remove an account (as root). The user's home directory and undelivered mail must be dealt with separately.
• users - prints list of users on the system
• vdir - variant of the GNU version of the ls command. Defaults to printing out the long version of directory entries.
• vi - standard screen oriented Unix editor
• view - vi in read-only mode
• vim - improved vi editor
• vrfy - query remote host to verify the accuracy of an email address
• w - display info about userids and active processes
• wait - waits for a background process to terminate. This is a shell builtin.
• wc - displays number of lines, characters and words in a file
• Wharf - the AfterStep application dock module
• whatis - display one-line summary of specified command
• whereis - use to find utilities in standard locations
• which - used to find utilities in search path. Will return the absolute directory path of the named utility program.
• who - display information about currently logged in userids
• whoami - display information about userid that is currently logged in
• wish - front end to tk, an X window extension of tcl
• workbone - console based cd player
• workman - graphical cd player program
• write - send messages to another local user
• X - starts up the X server. Can be invoked with
o X -quiet -query remotemachineaddress
in order to get a graphical login screen on the remote machine. See the discussion in connection with xdm below.
• xadm - display advanced power management BIOS information
• xargs - converts standard output of one command into arguments for another. This is one of those powerful but obscure commands. Xargs reads arguments from the standard input, delimited by blanks (which can be protected with double or single quotes or a backslash) or newlines, and executes the command (default is /bin/echo) one or more times with any initial-arguments followed by arguments read from standard input. Blank lines on the standard input are ignored.
• xbiff - graphical mail delivery notification utility
• xcalc - simple calculator program
• xclipboard - name says it all
Some Useful Linux Commands
• Xconfigurator - Red Hat utility for configuring settings for X
• xdm - used to start an X login session. This can be used to start a login session on a remote system. See the discussion on the following site:
o http://www.menet.umn.edu/~kaszeta/unix/xterminal/index.html
See the man pages for X, xdm, and Xserver. As usual, the man pages are pretty obscure. The best single source seems to be the Xserver man pages. After X is configured, X needs to be started at bootup with the command (in /etc/rc.d/init.d/xterm):
o X -quiet -query remotemachineaddress
If the address of a nameserver is not configured, then the numeric address of the remote machine rather than its name should be entered. If the machines are connected through ethernet cards and the net, then obviously basic networking has to be set up. Gnome and KDE come with their own versions of X display/login managers, called respectively gdm and kdm.
• xdvi - view a dvi file compiled under LATEX
• xedit - a simple text editor for X
• xf86config - graphical configuration tool for X
• XF86Setup - graphical configuration tool for X
• xfd - display an available font in X. Creates a grid in an x-term with one character per rectangle.
• xfig - utility for interactive generation of figures
• xfm - graphical file manager for X
• xhost - tell X server that remote computer has access to your machine and that you will use the remote computer. This can be used to set up remote X sessions. To set up a remote X session on the UQAM Nobel machine, run the following command on the local machine (one doesn't have to be root to do this)
o xhost +nobel.si.uqam.ca
Then, log onto the remote machine using rlogin (see above) or telnet. Once logged in, use the following command to get the remote X server to open an X terminal on the local machine:
o setenv DISPLAY localhostname:0 ; xterm &
This is valid for csh, which is the default login shell on Nobel. For ksh, (and I think bash) replace with
o DISPLAY=localhostname:0
o export DISPLAY ; xterm
Other X-based programs such as Netscape or Gauss (graphical version) can also be run on a remote machine with display on the local machine with little trouble. The local X server is the program that has all of the information concerning the properties of the graphics card and terminal, so it must be necessary to have X running on the local machine. The following should also work. After using xhost to give permission to the remote machine to display on the local machine, use
o netscape -display localhostname:0.0
Question: can one start the X session on the local machine and then run a remote copy of a window manager?
• xinit - start X Window. The command startx is a front end to xinit in Linux, including Slackware.
• xload - displays a graphic of the system load
• xlpq - graphical interface to print manager. This is included on one of the XFCE menus, but does not seem to be a part of the base Red Hat distribution.
• xlsfonts - list fonts available under the X Window system.
• xman - browsable command reference. Displays manual pages under X.
• xmh - graphical front end under X to the nmh mail handling system. This program is part of the XFree86 package in Red Hat.
• xmodmap - utility for modifying keymaps and pointer button mappings in X. Can be used to install a French Canadian keyboard. Download the Xmodmap.cf file from www.linux-quebec.org, and insert the command
o xmodmap /etc/X11/Xmodmap.cf &
into the .xession (with xdm) or the .xinitrc (with startx) file.
• xosview - displays bar graphs of system load, load average, memory usage, and swap usage
• xpaint - simple paint program for X
• xpdf - GPL'd utility for previewing dvi files. Doesn't seem to work too well on texts with a lot of math.
• xplaycd - X Window audio cd player utility
• xsetroot - utility to configure root window of an X terminal
• xsysinfo - graphical display of load and memory usage
• xterm - start an X Window terminal session
• xterm-color - color version of xterm
• xv - utility for viewing and manipulating many types of image files. This is a shareware program.
• xvidtune - utility for fine tuning of monitor settings under X
• yacc - parser generator
• ytalk - multi-user program similar to talk
• zcat - read one or more files that have been compressed with gzip or compress and write to standard output
Some Useful Linux Commands
• zcmp - read compressed files and pass them to cmp
• zdiff - read compressed files and pass them to diff
• zgrep - read compressed files and pass them to grep
• Zharf - AfterStep button panel module
• zip - zip utility compatible with DOS PKzip
• zless - view zipped files
• zmore - print contents of compressed files one screen at a time
• znew - uncompress Z files and recompress in .gz format
Eventually, we want to be able to distinguish between commands that are an intrinsic part of the kernel, commands that are executable binaries that come with every distribution of Linux, executable binaries that are not provided with all distributiions of Linux, and executable shell scripts. We also want to point out the typical location of these commands on different Linux distributions. Finally, we want to distinguish between shell commands and Linux commands.
10 Notes on Applications
10.1 Mail Transfer Agents (MTAs)
The Linux distributions I know come with sendmail, except for Mandrake, which as of version 7.1 uses Postfix as its default MTA. There are several competing programs available. Even the simplest don't seem to be that easy to configure.
• Exim -
• Fetchmail - seemingly one of the few ways (Pine is able to do this as well) to download mail automatically from a POP or IMAP server and pass it to local mail handling agents. Use the following line in /.fetchmailrc:
o poll pop.uqam.ca proto pop3 user USERNAME pass PASSWORD
Use the following to have fetchmail loaded as a daemon that will download mail at regular intervals:
o fetchmail -d 6000
The interval is specified in seconds. Fetchmail will poll all of the pop servers listed in /.fetchmailrc.
• Getmail - Designed as a replacement for Fetchmail.
• MMDF -
• Postfix - a mail transport agent and potential replacement for sendmail. Mandrake 7.1 and up uses this as its default MTA.
• Qmail - a ``modern'' replacement for sendmail. It is reputed to be more secure than sendmail. Since it doesn't have a GPL license, it is not the default MTA of any Linux distributions that I know of.
• Sendmail - this one gets my vote for the most complicated and obscure configuration file, /etc/sendmail.cf. Most individual Linux users will be using machines connected to the Internet via an ISP or on networks (such as university networks) with centralized mail processing and access to the net. I have to change the following lines in sendmail.cf to be able to send mail with emacs.
o DMuqam.ca # masquerade the domain name
o DNambler.steven # masquerade username
o DSnobel.si.uqam.ca # relay all mail through nobel server
The problem comes from the fact that, as a user on a local network, I don't have my own domain name. I want return mail to be routed to UQAM's mail server and I want the server to handle all my mail for me, even mail to other UQAM users. If I send mail to UQAM users using their normalized usernames, the net does not know who or where they are. I have managed to get a configuration that works by writing a sendmail.mc file and processing it with the m4 macro interpreter, following the Address-Rewriting mini-HOWTO. I now have something that works, but which mysteriously complains about ``dangerous write permissions'' every time the system boots up.
• Smail - seems to be a popular choice on smaller systems. It would appear that at one point in its history, Red Hat shipped with smail, but this has been replaced with sendmail.
• Zmailer - apparently designed for mail servers with a large number of users.
10.2 Mail User Agents (MUAs)
• Acmemail - Web-based mail agent. Allows you to access your mail with any browser. Involves setting up a Perl CGI script on the server side.
• Archimedes - A successor program to XFmail (see below)
• Arrow -
• Balsa - the default Gnome mail program
• Blitzmail -
• Elm -
• Emumail - Web-based mail agent. Allows you to use any browser to check your POP mail account. The Web site of the company that makes this one can be used to check your mail on a Unix system without setting up any CGI script on the server side.
• Evolution - mail reader and contact manager/calendar designed for use under Gnome
• Exmh - graphical front end for Mh
• Kmail - mail reading program included with KDE
• M - for ``Mahogany''. Seems similar to XFmail (see below). I haven't been able to figure out from the description whether it runs independently of or in conjunction with sendmail and procmail.
• Mh -
• Mumail -
• Mutt - text based mail program, which is highly configurable.
• Nmh - mail handling system. This system includes a large number of binary commands that are kept in /usr/bin. See the man page for nmh for details. Red Hat 5.1 and 5.2 come with exmh and xmh, which are graphical front ends for nmh. The exmh front end is a separate package, while xmh is owned by XFree86.
• Pine - text based mail and news utility. Features now include:
o MIME support
o ability to read and post network news
o maintenance of an address book of mail recipients
o spell checking during message composition
o mouse support when using xterm on an X Window system
o a highly configurable environment
Pine can be used to download mail from one or more POP3 mail servers. See Tip of the Week (http://tipoftheweek.darkelf.net) for the fourth week of February 1999. First, set up multiple configuration files (pine -p localmail, pine -p popserver 1, pine -p popserver 2, etc.). Then, to configure Pine to use a POP3 server, use the Setup Config command. Set something like this in the inbox-path:
o {pop.server.com/pop3/user=myid}INBOX
When Pine is restarted, it should ask for your password, connect to the remote server, and use it is if it were accessing local mail. The article is unclear on whether there is the option of leaving copies of the downloaded mail on the server.
• Sylpheed -
• XCmail -
• XFmail - This one seems very promising. It's a GUI-based mail tool that seems to offer most of the features of Netscape's mail module. It runs without using sendmail and procmail, which is a major advantage.
10.3 Editors
• cooledit - a pretty powerful GUI text editor
• emacs - powerful text editor that includes modules for reading and sending mail and postings to newsgroups, and a browser module. For editing TEX and LATEX files, the AucTEX addon package is invaluable, and makes emacs pretty hard to beat as an editor with LATEX.
• jed - has pretty good emacs emulation (it can even read mail like emacs!). It does simple syntax highlighting for TeX files, including giving positioning of parentheses. It would seem to be pretty configurable and takes up much less disk space than emacs, although more than joe and muemacs. It works well in console mode, and still manages to use colors for menu bars and syntax highlighting. The program xjed which comes with some versions starts up its own X terminal when invoked.
• joe - "Joe's Own Editor", a fairly powerful editor with a compact binary and an ability to emulate Wordstar, Emacs, Pico, and a few other editors.
• jove - "Joe's Own Version of Emacs". I tried this out a couple of times and managed to crash it when making some minor errors in command syntax.
• microemacs (JASSPA) - spinoff of muemacs. Pretty powerful and configurable, while not taking up too much disk space or memory.
• muemacs - a fairly powerful emacs clone whose binary is actually smaller than that of the Joe editor.
Some Useful Linux Commands
• nedit - an X Window based text editor. Of all text editors for Linux that I've seen, it has commands which are closest to Windows text editors, for cursor movement, highlighting, marking text, etc. It has very good syntax highlighting for both LATEX and HTML.
• pico - simple text editor. It often comes packaged with the Pine mail user agent.
• vi - included with most Linux distributions. If you're not used to the syntax, it can be pretty hard to understand.
• vim - improved version of vi
• xedit - simple text editor included with many Linux distributions
10.4 Other
• dfm - Desktop File Manager. Allows the user to place program icons on the desktop.
• gmc - Gnome Midnight Commander. Gnome version of Midnight Commander. Includes a graphical interface and allows the user to place icons on the desktop.
• mc - Midnight Commander file manager. Runs in console mode and in an xterm.
• scilab - a free matrix programming language. May be a good substitute for GAUSS and/or MATLAB.
11 Some Nifty Slogans
Linux: the choice of a GNU generation.
Windows: where do you want to go today? Linux: where do you want to go tomorrow?
This program has performed an illegal operation and will be shut down: please reboot using Linux.
``When you say `I wrote a program that crashed Windows', people just stare at you blankly and say `Hey, I got those with the system, for free'.'' - Linus Torvalds
Windows 2000, from the company that brought you EDLIN!
Linux: because rebooting is for adding new hardware.
Your mouse has moved. Windows NT must be restarted for the change to take effect. Reboot now [OK]?
Linux: transforms your microcomputer into a workstation. Windows NT: transforms your workstation into a microcomputer.
Some Useful Linux Commands

History of computing hardware




SUCCESS FOR CAREER




'History of computing hardware:



The history of computing hardware is the record of the constant drive to make computer hardware faster, cheaper, and store more data.
Before the development of the general-purpose computer, most calculations were done by humans. Tools to help humans calculate are generally called calculators. Calculators continue to develop, but computers add the critical element of conditional response, allowing automation of both numerical calculation and in general, automation of many symbol-manipulation tasks. Computer technology has undergone profound changes every decade since the 1940s.
Computing hardware has become a platform for uses other than computation, such as automation, communication, control, entertainment, and education. Each field in turn has imposed its own requirements on the hardware, which has evolved in response to those requirements.
Aside from written numerals, the first aids to computation were purely mechanical devices that required the operator to set up the initial values of an elementary arithmetic operation, then propel the device through manual manipulations to obtain the result. An example would be a slide rule where numbers are represented by points on a logarithmic scale and computation is performed by setting a cursor and aligning sliding scales. Numbers could be represented in a continuous "analog" form, where a length or other physical property was proportional to the number. Or, numbers could be represented in the form of digits, automatically manipulated by a mechanism. Although this approach required more complex mechanisms, it made for greater precision of results.
Both analog and digital mechanical techniques continued to be developed, producing many practical computing machines. Electrical methods rapidly improved the speed and precision of calculating machines, at first by providing motive power for mechanical calculating devices, and later directly as the medium for representation of numbers. Numbers could be represented by voltages or currents and manipulated by linear electronic amplifiers. Or, numbers could be represented as discrete binary or decimal digits, and electrically-controlled switches and combinatorial circuits could perform mathematical operations.
The invention of electronic amplifiers made calculating machines much faster than mechanical or electromechanical predecessors. Vacuum tube amplifiers gave way to discrete transistors, and then rapidly to monolithic integrated circuits. By defeating the tyranny of numbers, integrated circuits made high-speed and low-cost digital computers a widespread commodity.
This article covers major developments in the history of computing hardware, and attempts to put them in context. For a detailed timeline of events, see the computing timeline article. The history of computing article treats methods intended for pen and paper, with or without the aid of tables. Since all computers rely on digital storage, and tend to be limited by the size and speed of memory, the history of computer data storage is tied to the development of computers.
History of computing

Hardware before 1960
Hardware 1960s to present

Hardware in Soviet Bloc countries


Artificial intelligence

Computer science

Operating systems

Programming languages

Software engineering


Graphical user interface

Internet

Personal computers

Laptops

Video games

World Wide Web


Timeline of computing
• 2400 BC–1949
• 1950–1979
• 1980–1989
• 1990–1999
• 2000–2009
• More timelines...


More...

Contents
[hide]
• 1 Before computer hardware
• 2 Earliest hardware
• 3 1801: punched card technology
• 4 Desktop calculators
• 5 Advanced analog computers
• 6 Digital computation
o 6.1 Zuse
o 6.2 Colossus
o 6.3 American developments
 6.3.1 ENIAC
• 7 First-generation machines
• 8 Commercial computers
• 9 Second generation: transistors
• 10 Post-1960: third generation and beyond
• 11 See also
• 12 Notes
• 13 References
• 14 Further reading
• 15 External links

[edit] Before computer hardware
The first use of the word "computer" was recorded in 1613, referring to a person who carried out calculations, or computations, and the word continued to be used in that sense until the middle of the 20th century. From the end of the 19th century onwards though, the word began to take on its more familiar meaning, describing a machine that carries out computations.[1]
[edit] Earliest hardware
Devices have been used to aid computation for thousands of years, using one-to-one correspondence with our fingers. The earliest counting device was probably a form of tally stick. Later record keeping aids throughout the Fertile Crescent included calculi (clay spheres, cones, etc.) which represented counts of items, probably livestock or grains, sealed in containers.[2][3] Counting rods is one example.
The abacus was used for arithmetic tasks. The Roman abacus was used in Babylonia as early as 2400 BC. Since then, many other forms of reckoning boards or tables have been invented. In a medieval counting house, a checkered cloth would be placed on a table, and markers moved around on it according to certain rules, as an aid to calculating sums of money.
A number of analog computers were constructed in ancient and medieval times to perform astronomical calculations. These include the Antikythera mechanism and the astrolabe from ancient Greece (c. 150–100 BC), which are generally regarded as the first mechanical analog computers.[4] Other early versions of mechanical devices used to perform some type of calculations include the planisphere and other mechanical computing devices invented by Abū Rayhān al-Bīrūnī (c. AD 1000); the equatorium and universal latitude-independent astrolabe by Abū Ishāq Ibrāhīm al-Zarqālī (c. AD 1015); the astronomical analog computers of other medieval Muslim astronomers and engineers; and the astronomical clock tower of Su Song (c. AD 1090) during the Song Dynasty.
The "castle clock", an astronomical clock invented by Al-Jazari in 1206, is considered to be the earliest programmable analog computer.[5] It displayed the zodiac, the solar and lunar orbits, a crescent moon-shaped pointer traveling across a gateway causing automatic doors to open every hour,[6][7] and five robotic musicians who play music when struck by levers operated by a camshaft attached to a water wheel. The length of day and night could be re-programmed every day in order to account for the changing lengths of day and night throughout the year.[5]
Suanpan (the number represented on this abacus is 6,302,715,408)
Scottish mathematician and physicist John Napier noted multiplication and division of numbers could be performed by addition and subtraction, respectively, of logarithms of those numbers. While producing the first logarithmic tables Napier needed to perform many multiplications, and it was at this point that he designed Napier's bones, an abacus-like device used for multiplication and division.[8] Since real numbers can be represented as distances or intervals on a line, the slide rule was invented in the 1620s to allow multiplication and division operations to be carried out significantly faster than was previously possible.[9] Slide rules were used by generations of engineers and other mathematically inclined professional workers, until the invention of the pocket calculator. [10]

Yazu Arithmometer. Patented in Japan in 1903. Note the lever for turning the gears of the calculator.
German polymath Wilhelm Schickard built the first digital mechanical calculator in 1623, and thus became the father of the computing era.[11] Since his calculator used techniques such as cogs and gears first developed for clocks, it was also called a 'calculating clock'. It was put to practical use by his friend Johannes Kepler, who revolutionized astronomy when he condensed decades of astronomical observations into algebraic expressions. An original calculator by Blaise Pascal (1640) is preserved in the Zwinger Museum. Machines by Pascal (the Pascaline, 1642) and Gottfried Wilhelm von Leibniz (the Stepped Reckoner, c. 1672) followed. Leibniz once said "It is unworthy of excellent men to lose hours like slaves in the labour of calculation which could safely be relegated to anyone else if machines were used."[12]
Around 1820, Charles Xavier Thomas created the first successful, mass-produced mechanical calculator, the Thomas Arithmometer, that could add, subtract, multiply, and divide.[13] It was mainly based on Leibniz' work. Mechanical calculators, like the base-ten addiator, the comptometer, the Monroe, the Curta and the Addo-X remained in use until the 1970s. Leibniz also described the binary numeral system,[14] a central ingredient of all modern computers. However, up to the 1940s, many subsequent designs (including Charles Babbage's machines of the 1800s and even ENIAC of 1945) were based on the decimal system;[15] ENIAC's ring counters emulated the operation of the digit wheels of a mechanical adding machine.
In Japan, Ryoichi Yazu patented a mechanical calculator called the Yazu Arithmometer in 1903. It consisted of a single cylinder and 22 gears, and employed the mixed base-2 and base-5 number system familiar to users to the soroban (Japanese abacus). Carry and end of calculation were determined automatically.[16] More than 200 units were sold, mainly to government agencies such as the Ministry of War and agricultural experiment stations. [17][18]
[edit] 1801: punched card technology
Main article: Analytical engine. See also: Logic piano

Punched card system of a music machine, also referred to as Book music
In 1801, Joseph-Marie Jacquard developed a loom in which the pattern being woven was controlled by punched cards. The series of cards could be changed without changing the mechanical design of the loom. This was a landmark point in programmability.
In 1833, Charles Babbage moved on from developing his difference engine to developing a more complete design, the analytical engine, which would draw directly on Jacquard's punched cards for its programming.[19] In 1835, Babbage described his analytical engine. It was the plan of a general-purpose programmable computer, employing punch cards for input and a steam engine for power, using the positions of gears and shafts to represent numbers. His initial idea was to use punch-cards to control a machine that could calculate and print logarithmic tables with huge precision (a specific purpose machine). Babbage's idea soon developed into a general-purpose programmable computer, his analytical engine. While his design was sound and the plans were probably correct, or at least debuggable, the project was slowed by various problems. Babbage was a difficult man to work with and argued with anyone who didn't respect his ideas. All the parts for his machine had to be made by hand. Small errors in each item can sometimes sum up to large discrepancies in a machine with thousands of parts, which required these parts to be much better than the usual tolerances needed at the time. The project dissolved in disputes with the artisan who built parts and was ended with the depletion of government funding. Ada Lovelace, Lord Byron's daughter, translated and added notes to the "Sketch of the Analytical Engine" by Federico Luigi, Conte Menabrea.[20]

IBM 407 tabulating machine, (1961)
A reconstruction of the Difference Engine II, an earlier, more limited design, has been operational since 1991 at the London Science Museum. With a few trivial changes, it works as Babbage designed it and shows that Babbage was right in theory. The museum used computer-operated machine tools to construct the necessary parts, following tolerances which a machinist of the period would have been able to achieve. The failure of Babbage to complete the engine can be chiefly attributed to difficulties not only related to politics and financing, but also to his desire to develop an increasingly sophisticated computer.
Following in the footsteps of Babbage, although unaware of his earlier work, was Percy Ludgate, an accountant from Dublin, Ireland. He independently designed a programmable mechanical computer, which he described in a work that was published in 1909.
In the late 1880s, the American Herman Hollerith invented the recording of data on a medium that could then be read by a machine. Prior uses of machine readable media had been for control (automatons such as piano rolls or looms), not data. "After some initial trials with paper tape, he settled on punched cards…"[21] Hollerith came to use punched cards after observing how railroad conductors encoded personal characteristics of each passenger with punches on their tickets. To process these punched cards he invented the tabulator, and the key punch machines. These three inventions were the foundation of the modern information processing industry. His machines used mechanical relays (and solenoids) to increment mechanical counters. Hollerith's method was used in the 1890 United States Census and the completed results were "... finished months ahead of schedule and far under budget".[22] Hollerith's company eventually became the core of IBM. IBM developed punch card technology into a powerful tool for business data-processing and produced an extensive line of unit record equipment. By 1950, the IBM card had become ubiquitous in industry and government. The warning printed on most cards intended for circulation as documents (checks, for example), "Do not fold, spindle or mutilate," became a motto for the post-World War II era.[23]
Punched card with the extended alphabet
Leslie Comrie's articles on punched card methods and W.J. Eckert's publication of Punched Card Methods in Scientific Computation in 1940, described techniques which were sufficiently advanced to solve differential equations[24] or perform multiplication and division using floating point representations, all on punched cards and unit record machines. In the image of the tabulator (see left), note the patch panel, which is visible on the right side of the tabulator. A row of toggle switches is above the patch panel. The Thomas J. Watson Astronomical Computing Bureau, Columbia University performed astronomical calculations representing the state of the art in computing.[25]
Computer programming in the punch card era revolved around the computer center. The computer users, for example, science and engineering students at universities, would submit their programming assignments to their local computer center in the form of a stack of cards, one card per program line. They then had to wait for the program to be queued for processing, compiled, and executed. In due course a printout of any results, marked with the submitter's identification, would be placed in an output tray outside the computer center. In many cases these results would comprise solely a printout of error messages, necessitating another edit-compile-run cycle.[26] Punched cards are still used and manufactured to this day, and their distinctive dimensions (and 80-column capacity) can still be recognized in forms, records, and programs around the world.
[edit] Desktop calculators
Main article: Calculator

The Curta calculator can also do multiplication and division
By the 1900s, earlier mechanical calculators, cash registers, accounting machines, and so on were redesigned to use electric motors, with gear position as the representation for the state of a variable. The word "computer" was a job title assigned to people who used these calculators to perform mathematical calculations. By the 1920s Lewis Fry Richardson's interest in weather prediction led him to propose human computers and numerical analysis to model the weather; to this day, the most powerful computers on Earth are needed to adequately model its weather using the Navier-Stokes equations.[27]
Companies like Friden, Marchant Calculator and Monroe made desktop mechanical calculators from the 1930s that could add, subtract, multiply and divide. During the Manhattan project, future Nobel laureate Richard Feynman was the supervisor of the roomful of human computers, many of them female mathematicians, who understood the use of differential equations which were being solved for the war effort.
In 1948, the Curta was introduced. This was a small, portable, mechanical calculator that was about the size of a pepper grinder. Over time, during the 1950s and 1960s a variety of different brands of mechanical calculators appeared on the market. The first all-electronic desktop calculator was the British ANITA Mk.VII, which used a Nixie tube display and 177 subminiature thyratron tubes. In June 1963, Friden introduced the four-function EC-130. It had an all-transistor design, 13-digit capacity on a 5-inch (130 mm) CRT, and introduced Reverse Polish notation (RPN) to the calculator market at a price of $2200. The EC-132 model added square root and reciprocal functions. In 1965, Wang Laboratories produced the LOCI-2, a 10-digit transistorized desktop calculator that used a Nixie tube display and could compute logarithms.
[edit] Advanced analog computers
Main article: analog computer

Cambridge differential analyzer, 1938
Before World War II, mechanical and electrical analog computers were considered the "state of the art", and many thought they were the future of computing. Analog computers take advantage of the strong similarities between the mathematics of small-scale properties—the position and motion of wheels or the voltage and current of electronic components—and the mathematics of other physical phenomena, for example, ballistic trajectories, inertia, resonance, energy transfer, momentum, and so forth. They model physical phenomena with electrical voltages and currents[28] as the analog quantities.
Centrally, these analog systems work by creating electrical analogs of other systems, allowing users to predict behavior of the systems of interest by observing the electrical analogs.[29] The most useful of the analogies was the way the small-scale behavior could be represented with integral and differential equations, and could be thus used to solve those equations. An ingenious example of such a machine, using water as the analog quantity, was the water integrator built in 1928; an electrical example is the Mallock machine built in 1941. A planimeter is a device which does integrals, using distance as the analog quantity. Unlike modern digital computers, analog computers are not very flexible, and need to be rewired manually to switch them from working on one problem to another. Analog computers had an advantage over early digital computers in that they could be used to solve complex problems using behavioral analogues while the earliest attempts at digital computers were quite limited.
Some of the most widely deployed analog computers included devices for aiming weapons, such as the Norden bombsight[30] and the fire-control systems,[31] such as Arthur Pollen's Argo system for naval vessels. Some stayed in use for decades after WWII; the Mark I Fire Control Computer was deployed by the United States Navy on a variety of ships from destroyers to battleships. Other analog computers included the Heathkit EC-1, and the hydraulic MONIAC Computer which modeled econometric flows.[32]
The art of analog computing reached its zenith with the differential analyzer,[33] invented in 1876 by James Thomson and built by H. W. Nieman and Vannevar Bush at MIT starting in 1927. Fewer than a dozen of these devices were ever built; the most powerful was constructed at the University of Pennsylvania's Moore School of Electrical Engineering, where the ENIAC was built. Digital electronic computers like the ENIAC spelled the end for most analog computing machines, but hybrid analog computers, controlled by digital electronics, remained in substantial use into the 1950s and 1960s, and later in some specialized applications. But like all digital devices, the decimal precision of a digital device is a limitation, as compared to an analog device, in which the accuracy is a limitation.[34] As electronics progressed during the twentieth century, its problems of operation at low voltages while maintaining high signal-to-noise ratios[35] were steadily addressed, as shown below, for a digital circuit is a specialized form of analog circuit, intended to operate at standardized settings (continuing in the same vein, logic gates can be realized as forms of digital circuits). But as digital computers have become faster and use larger memory (for example, RAM or internal storage), they have almost entirely displaced analog computers. Computer programming, or coding, has arisen as another human profession.
[edit] Digital computation

Punched tape programs would be much longer than the short fragment of yellow paper tape shown.
The era of modern computing began with a flurry of development before and during World War II, as electronic circuit elements replaced mechanical equivalents, and digital calculations replaced analog calculations. Machines such as the Z3, the Atanasoff–Berry Computer, the Colossus computers, and the ENIAC were built by hand using circuits containing relays or valves (vacuum tubes), and often used punched cards or punched paper tape for input and as the main (non-volatile) storage medium. Defining a single point in the series as the "first computer" misses many subtleties (see the table "Defining characteristics of some early digital computers of the 1940s" below).
Alan Turing's 1936 paper[36] proved enormously influential in computing and computer science in two ways. Its main purpose was to prove that there were problems (namely the halting problem) that could not be solved by any sequential process. In doing so, Turing provided a definition of a universal computer which executes a program stored on tape. This construct came to be called a Turing machine. [37] Except for the limitations imposed by their finite memory stores, modern computers are said to be Turing-complete, which is to say, they have algorithm execution capability equivalent to a universal Turing machine.

Nine-track magnetic tape
For a computing machine to be a practical general-purpose computer, there must be some convenient read-write mechanism, punched tape, for example. With a knowledge of Alan Turing's theoretical 'universal computing machine' John von Neumann defined an architecture which uses the same memory both to store programs and data: virtually all contemporary computers use this architecture (or some variant). While it is theoretically possible to implement a full computer entirely mechanically (as Babbage's design showed), electronics made possible the speed and later the miniaturization that characterize modern computers.
There were three parallel streams of computer development in the World War II era; the first stream largely ignored, and the second stream deliberately kept secret. The first was the German work of Konrad Zuse. The second was the secret development of the Colossus computers in the UK. Neither of these had much influence on the various computing projects in the United States. The third stream of computer development, Eckert and Mauchly's ENIAC and EDVAC, was widely publicized.[38][39]
George Stibitz is internationally recognized as one of the fathers of the modern digital computer. While working at Bell Labs in November 1937, Stibitz invented and built a relay-based calculator that he dubbed the "Model K" (for "kitchen table", on which he had assembled it), which was the first to calculate using binary form. [40]
[edit] Zuse
Main article: Konrad Zuse

A reproduction of Zuse's Z1 computer
Working in isolation in Germany, Konrad Zuse started construction in 1936 of his first Z-series calculators featuring memory and (initially limited) programmability. Zuse's purely mechanical, but already binary Z1, finished in 1938, never worked reliably due to problems with the precision of parts.
Zuse's later machine, the Z3,[41] was finished in 1941. It was based on telephone relays and did work satisfactorily. The Z3 thus became the first functional program-controlled, all-purpose, digital computer. In many ways it was quite similar to modern machines, pioneering numerous advances, such as floating point numbers. Replacement of the hard-to-implement decimal system (used in Charles Babbage's earlier design) by the simpler binary system meant that Zuse's machines were easier to build and potentially more reliable, given the technologies available at that time.
Programs were fed into Z3 on punched films. Conditional jumps were missing, but since the 1990s it has been proved theoretically that Z3 was still a universal computer (ignoring its physical storage size limitations). In two 1936 patent applications, Konrad Zuse also anticipated that machine instructions could be stored in the same storage used for data—the key insight of what became known as the von Neumann architecture, first implemented in the British SSEM of 1948.[42] Zuse also claimed to have designed the first higher-level programming language, (Plankalkül), in 1945 (published in 1948) although it was implemented for the first time in 2000 by a team around Raúl Rojas at the Free University of Berlin—five years after Zuse died.
Zuse suffered setbacks during World War II when some of his machines were destroyed in the course of Allied bombing campaigns. Apparently his work remained largely unknown to engineers in the UK and US until much later, although at least IBM was aware of it as it financed his post-war startup company in 1946 in return for an option on Zuse's patents.
[edit] Colossus
Main article: Colossus computer

Colossus was used to break German ciphers during World War II.
During World War II, the British at Bletchley Park (40 miles north of London) achieved a number of successes at breaking encrypted German military communications. The German encryption machine, Enigma, was attacked with the help of electro-mechanical machines called bombes. The bombe, designed by Alan Turing and Gordon Welchman, after the Polish cryptographic bomba by Marian Rejewski (1938), came into use in 1941.[43] They ruled out possible Enigma settings by performing chains of logical deductions implemented electrically. Most possibilities led to a contradiction, and the few remaining could be tested by hand.
The Germans also developed a series of teleprinter encryption systems, quite different from Enigma. The Lorenz SZ 40/42 machine was used for high-level Army communications, termed "Tunny" by the British. The first intercepts of Lorenz messages began in 1941. As part of an attack on Tunny, Professor Max Newman and his colleagues helped specify the Colossus.[44] The Mk I Colossus was built between March and December 1943 by Tommy Flowers and his colleagues at the Post Office Research Station at Dollis Hill in London and then shipped to Bletchley Park in January 1944.
Colossus was the first totally electronic computing device. The Colossus used a large number of valves (vacuum tubes). It had paper-tape input and was capable of being configured to perform a variety of boolean logical operations on its data, but it was not Turing-complete. Nine Mk II Colossi were built (The Mk I was converted to a Mk II making ten machines in total). Details of their existence, design, and use were kept secret well into the 1970s. Winston Churchill personally issued an order for their destruction into pieces no larger than a man's hand. Due to this secrecy the Colossi were not included in many histories of computing. A reconstructed copy of one of the Colossus machines is now on display at Bletchley Park.
[edit] American developments
In 1937, Claude Shannon showed there is a one-to-one correspondence between the concepts of Boolean logic and certain electrical circuits, now called logic gates, which are now ubiquitous in digital computers.[45] In his master's thesis[46] at MIT, for the first time in history, Shannon showed that electronic relays and switches can realize the expressions of Boolean algebra. Entitled A Symbolic Analysis of Relay and Switching Circuits, Shannon's thesis essentially founded practical digital circuit design. George Stibitz completed a relay-based computer he dubbed the "Model K" at Bell Labs in November 1937. Bell Labs authorized a full research program in late 1938 with Stibitz at the helm. Their Complex Number Calculator,[47] completed January 8, 1940, was able to calculate complex numbers. In a demonstration to the American Mathematical Society conference at Dartmouth College on September 11, 1940, Stibitz was able to send the Complex Number Calculator remote commands over telephone lines by a teletype. It was the first computing machine ever used remotely, in this case over a phone line. Some participants in the conference who witnessed the demonstration were John von Neumann, John Mauchly, and Norbert Wiener, who wrote about it in their memoirs.

Atanasoff–Berry Computer replica at 1st floor of Durham Center, Iowa State University
In 1939, John Vincent Atanasoff and Clifford E. Berry of Iowa State University developed the Atanasoff–Berry Computer (ABC),[48] The Atanasoff-Berry Computer was the world's first electronic digital computer[49]. The design used over 300 vacuum tubes and employed capacitors fixed in a mechanically rotating drum for memory. Though the ABC machine was not programmable, it was the first to use electronic tubes in an adder. ENIAC co-inventor John Mauchly examined the ABC in June 1941, and its influence on the design of the later ENIAC machine is a matter of contention among computer historians. The ABC was largely forgotten until it became the focus of the lawsuit Honeywell v. Sperry Rand, the ruling of which invalidated the ENIAC patent (and several others) as, among many reasons, having been anticipated by Atanasoff's work.
In 1939, development began at IBM's Endicott laboratories on the Harvard Mark I. Known officially as the Automatic Sequence Controlled Calculator,[50] the Mark I was a general purpose electro-mechanical computer built with IBM financing and with assistance from IBM personnel, under the direction of Harvard mathematician Howard Aiken. Its design was influenced by Babbage's Analytical Engine, using decimal arithmetic and storage wheels and rotary switches in addition to electromagnetic relays. It was programmable via punched paper tape, and contained several calculation units working in parallel. Later versions contained several paper tape readers and the machine could switch between readers based on a condition. Nevertheless, the machine was not quite Turing-complete. The Mark I was moved to Harvard University and began operation in May 1944.
[edit] ENIAC
Main article: ENIAC

ENIAC performed ballistics trajectory calculations with 160 kW of power
The US-built ENIAC (Electronic Numerical Integrator and Computer) was the first electronic general-purpose computer. It combined, for the first time, the high speed of electronics with the ability to be programmed for many complex problems. It could add or subtract 5000 times a second, a thousand times faster than any other machine. (Colossus couldn't add). It also had modules to multiply, divide, and square root. High speed memory was limited to 20 words (about 80 bytes). Built under the direction of John Mauchly and J. Presper Eckert at the University of Pennsylvania, ENIAC's development and construction lasted from 1943 to full operation at the end of 1945. The machine was huge, weighing 30 tons, and contained over 18,000 valves. One of the major engineering feats was to minimize valve burnout, which was a common problem at that time. The machine was in almost constant use for the next ten years.
ENIAC was unambiguously a Turing-complete device. It could compute any problem (that would fit in memory). A "program" on the ENIAC, however, was defined by the states of its patch cables and switches, a far cry from the stored program electronic machines that evolved from it. Once a program was written, it had to be mechanically set into the machine. Six women did most of the programming of ENIAC. (Improvements completed in 1948 made it possible to execute stored programs set in function table memory, which made programming less a "one-off" effort, and more systematic).
Defining characteristics of some early digital computers of the 1940s (In the history of computing hardware)
Name First operational Numeral system Computing mechanism Programming
Turing complete

Zuse Z3 (Germany) May 1941 Binary
Electro-mechanical
Program-controlled by punched film stock (but no conditional branch) Yes (1998)

Atanasoff–Berry Computer (US) 1942 Binary Electronic
Not programmable—single purpose No
Colossus Mark 1 (UK) February 1944 Binary Electronic Program-controlled by patch cables and switches No
Harvard Mark I – IBM ASCC (US) May 1944 Decimal
Electro-mechanical Program-controlled by 24-channel punched paper tape (but no conditional branch) No
Colossus Mark 2 (UK) June 1944 Binary Electronic Program-controlled by patch cables and switches No
ENIAC (US)
July 1946 Decimal Electronic Program-controlled by patch cables and switches Yes
Manchester Small-Scale Experimental Machine (UK)
June 1948 Binary Electronic Stored-program in Williams cathode ray tube memory
Yes
Modified ENIAC (US)
September 1948 Decimal Electronic Program-controlled by patch cables and switches plus a primitive read-only stored programming mechanism using the Function Tables as program ROM
Yes
EDSAC (UK)
May 1949 Binary Electronic Stored-program in mercury delay line memory
Yes
Manchester Mark 1 (UK)
October 1949 Binary Electronic Stored-program in Williams cathode ray tube memory and magnetic drum memory Yes
CSIRAC (Australia) November 1949 Binary Electronic Stored-program in mercury delay line memory Yes
[edit] First-generation machines
Further information: List of vacuum tube computers
Design of the von Neumann architecture (1947)
Even before the ENIAC was finished, Eckert and Mauchly recognized its limitations and started the design of a stored-program computer, EDVAC. John von Neumann was credited with a widely circulated report describing the EDVAC design in which both the programs and working data were stored in a single, unified store. This basic design, denoted the von Neumann architecture, would serve as the foundation for the worldwide development of ENIAC's successors.[51] In this generation of equipment, temporary or working storage was provided by acoustic delay lines, which used the propagation time of sound through a medium such as liquid mercury (or through a wire) to briefly store data. A series of acoustic pulses is sent along a tube; after a time, as the pulse reached the end of the tube, the circuitry detected whether the pulse represented a 1 or 0 and caused the oscillator to re-send the pulse. Others used Williams tubes, which use the ability of a television picture tube to store and retrieve data. By 1954, magnetic core memory[52] was rapidly displacing most other forms of temporary storage, and dominated the field through the mid-1970s.

Magnetic core memory. Each core is one bit.
EDVAC was the first stored-program computer designed; however it was not the first to run. Eckert and Mauchly left the project and its construction floundered. The first working von Neumann machine was the Manchester "Baby" or Small-Scale Experimental Machine, developed by Frederic C. Williams and Tom Kilburn at the University of Manchester in 1948;[53] it was followed in 1949 by the Manchester Mark 1 computer, a complete system, using Williams tube and magnetic drum memory, and introducing index registers.[54] The other contender for the title "first digital stored-program computer" had been EDSAC, designed and constructed at the University of Cambridge. Operational less than one year after the Manchester "Baby", it was also capable of tackling real problems. EDSAC was actually inspired by plans for EDVAC (Electronic Discrete Variable Automatic Computer), the successor to ENIAC; these plans were already in place by the time ENIAC was successfully operational. Unlike ENIAC, which used parallel processing, EDVAC used a single processing unit. This design was simpler and was the first to be implemented in each succeeding wave of miniaturization, and increased reliability. Some view Manchester Mark 1 / EDSAC / EDVAC as the "Eves" from which nearly all current computers derive their architecture. Manchester University's machine became the prototype for the Ferranti Mark 1. The first Ferranti Mark 1 machine was delivered to the University in February, 1951 and at least nine others were sold between 1951 and 1957.
The first universal programmable computer in the Soviet Union was created by a team of scientists under direction of Sergei Alekseyevich Lebedev from Kiev Institute of Electrotechnology, Soviet Union (now Ukraine). The computer MESM (МЭСМ, Small Electronic Calculating Machine) became operational in 1950. It had about 6,000 vacuum tubes and consumed 25 kW of power. It could perform approximately 3,000 operations per second. Another early machine was CSIRAC, an Australian design that ran its first test program in 1949. CSIRAC is the oldest computer still in existence and the first to have been used to play digital music.[55]
[edit] Commercial computers
The first commercial computer was the Ferranti Mark 1, which was delivered to the University of Manchester in February 1951. It was based on the Manchester Mark 1. The main improvements over the Manchester Mark 1 were in the size of the primary storage (using random access Williams tubes), secondary storage (using a magnetic drum), a faster multiplier, and additional instructions. The basic cycle time was 1.2 milliseconds, and a multiplication could be completed in about 2.16 milliseconds. The multiplier used almost a quarter of the machine's 4,050 vacuum tubes (valves).[56] A second machine was purchased by the University of Toronto, before the design was revised into the Mark 1 Star. At least seven of the these later machines were delivered between 1953 and 1957, one of them to Shell labs in Amsterdam.[57]
In October 1947, the directors of J. Lyons & Company, a British catering company famous for its teashops but with strong interests in new office management techniques, decided to take an active role in promoting the commercial development of computers. The LEO I computer became operational in April 1951 [58] and ran the world's first regular routine office computer job. On 17 November 1951, the J. Lyons company began weekly operation of a bakery valuations job on the LEO (Lyons Electronic Office). This was the first business application to go live on a stored program computer.[59]
In June 1951, the UNIVAC I (Universal Automatic Computer) was delivered to the U.S. Census Bureau. Remington Rand eventually sold 46 machines at more than $1 million each ($8.2 million as of 2010).[60] UNIVAC was the first "mass produced" computer. It used 5,200 vacuum tubes and consumed 125 kW of power. Its primary storage was serial-access mercury delay lines capable of storing 1,000 words of 11 decimal digits plus sign (72-bit words). A key feature of the UNIVAC system was a newly invented type of metal magnetic tape, and a high-speed tape unit, for non-volatile storage. Magnetic media are still used in many computers.[61] In 1952, IBM publicly announced the IBM 701 Electronic Data Processing Machine, the first in its successful 700/7000 series and its first IBM mainframe computer. The IBM 704, introduced in 1954, used magnetic core memory, which became the standard for large machines. The first implemented high-level general purpose programming language, Fortran, was also being developed at IBM for the 704 during 1955 and 1956 and released in early 1957. (Konrad Zuse's 1945 design of the high-level language Plankalkül was not implemented at that time.) A volunteer user group, which exists to this day, was founded in 1955 to share their software and experiences with the IBM 701.

IBM 650 front panel
IBM introduced a smaller, more affordable computer in 1954 that proved very popular.[62] The IBM 650 weighed over 900 kg, the attached power supply weighed around 1350 kg and both were held in separate cabinets of roughly 1.5 meters by 0.9 meters by 1.8 meters. It cost $500,000 ($3.96 million as of 2010) or could be leased for $3,500 a month ($30 thousand as of 2010).[60] Its drum memory was originally 2,000 ten-digit words, later expanded to 4,000 words. Memory limitations such as this were to dominate programming for decades afterward. Efficient execution using drum memory was provided by a combination of hardware architecture: the instruction format included the address of the next instruction; and software: the Symbolic Optimal Assembly Program, SOAP[63], assigned instructions to optimal address (to the extent possible by static analysis of the source program). Thus many instructions were, when needed, located in the next row of the drum to be read and additional wait time for drum rotation was not required.
In 1955, Maurice Wilkes invented microprogramming,[64] which allows the base instruction set to be defined or extended by built-in programs (now called firmware or microcode).[65] It was widely used in the CPUs and floating-point units of mainframe and other computers, such as the IBM 360 series.[66]
IBM introduced its first magnetic disk system, RAMAC (Random Access Method of Accounting and Control) in 1956. Using fifty 24-inch (610 mm) metal disks, with 100 tracks per side, it was able to store 5 megabytes of data at a cost of $10,000 per megabyte ($80 thousand as of 2010).[60][67]
[edit] Second generation: transistors
Main article: Transistor computer
Further information: List of transistorized computers

A bipolar junction transistor
The bipolar transistor was invented in 1947. From 1955 onwards transistors replaced vacuum tubes in computer designs,[68] giving rise to the "second generation" of computers. Initially the only devices available were germanium point-contact transistors, which although less reliable than the vacuum tubes they replaced had the advantage of consuming far less power.[69] The first transistorised computer was built at the University of Manchester and was operational by 1953;[70] a second version was completed there in April 1955. The later machine used 200 transistors and 1,300 solid-state diodes and had a power consumption of 150 watts. However, it still required valves to generate the clock waveforms at 125 kHz and to read and write on the magnetic drum memory, whereas the Harwell CADET operated without any valves by using a lower clock frequency, of 58 kHz when it became operational in February 1955.[71] Problems with the reliability of early batches of point contact and alloyed junction transistors meant that the machine's mean time between failures was about 90 minutes, but this improved once the more reliable bipolar junction transistors became available.[72]
Compared to vacuum tubes, transistors have many advantages: they are smaller, and require less power than vacuum tubes, so give off less heat. Silicon junction transistors were much more reliable than vacuum tubes and had longer, indefinite, service life. Transistorized computers could contain tens of thousands of binary logic circuits in a relatively compact space. Transistors greatly reduced computers' size, initial cost, and operating cost. Typically, second-generation computers were composed of large numbers of printed circuit boards such as the IBM Standard Modular System[73] each carrying one to four logic gates or flip-flops.
A second generation computer, the IBM 1401, captured about one third of the world market. IBM installed more than one hundred thousand 1401s between 1960 and 1964.

This RAMAC DASD is being restored at the Computer History Museum
Transistorized electronics improved not only the CPU (Central Processing Unit), but also the peripheral devices. The IBM 350 RAMAC was introduced in 1956 and was the world's first disk drive. The second generation disk data storage units were able to store tens of millions of letters and digits. Next to the fixed disk storage units, connected to the CPU via high-speed data transmission, were removable disk data storage units. A removable disk stack can be easily exchanged with another stack in a few seconds. Even if the removable disks' capacity is smaller than fixed disks,' their interchangeability guarantees a nearly unlimited quantity of data close at hand. Magnetic tape provided archival capability for this data, at a lower cost than disk.
Many second generation CPUs delegated peripheral device communications to a secondary processor. For example, while the communication processor controlled card reading and punching, the main CPU executed calculations and binary branch instructions. One databus would bear data between the main CPU and core memory at the CPU's fetch-execute cycle rate, and other databusses would typically serve the peripheral devices. On the PDP-1, the core memory's cycle time was 5 microseconds; consequently most arithmetic instructions took 10 microseconds (100,000 operations per second) because most operations took at least two memory cycles; one for the instruction, one for the operand data fetch.
During the second generation remote terminal units (often in the form of teletype machines like a Friden Flexowriter) saw greatly increased use. Telephone connections provided sufficient speed for early remote terminals and allowed hundreds of kilometers separation between remote-terminals and the computing center. Eventually these stand-alone computer networks would be generalized into an interconnected network of networks—the Internet.[74]
[edit] Post-1960: third generation and beyond
Main articles: history of computing hardware (1960s–present) and history of general purpose CPUs

Intel 8742 eight-bit microcontroller IC
The explosion in the use of computers began with "third-generation" computers, making use of Jack St. Clair Kilby's[75] and Robert Noyce's[76] independent invention of the integrated circuit (or microchip), which later led to the invention of the microprocessor,[77] by Ted Hoff, Federico Faggin, and Stanley Mazor at Intel.[78] The integrated circuit in the image on the right, for example, an Intel 8742, is an 8-bit microcontroller that includes a CPU running at 12 MHz, 128 bytes of RAM, 2048 bytes of EPROM, and I/O in the same chip.
During the 1960s there was considerable overlap between second and third generation technologies.[79] IBM implemented its IBM Solid Logic Technology modules in hybrid circuits for the IBM System/360 in 1964. As late as 1975, Sperry Univac continued the manufacture of second-generation machines such as the UNIVAC 494. The Burroughs large systems such as the B5000 were stack machines, which allowed for simpler programming. These pushdown automatons were also implemented in minicomputers and microprocessors later, which influenced programming language design. Minicomputers served as low-cost computer centers for industry, business and universities.[80] It became possible to simulate analog circuits with the simulation program with integrated circuit emphasis, or SPICE (1971) on minicomputers, one of the programs for electronic design automation (EDA). The microprocessor led to the development of the microcomputer, small, low-cost computers that could be owned by individuals and small businesses. Microcomputers, the first of which appeared in the 1970s, became ubiquitous in the 1980s and beyond. Steve Wozniak, co-founder of Apple Computer, is sometimes erroneously credited with developing the first mass-market home computers. However, his first computer, the Apple I, came out some time after the MOS Technology KIM-1 and Altair 8800, and the first Apple computer with graphic and sound capabilities came out well after the Commodore PET. Computing has evolved with microcomputer architectures, with features added from their larger brethren, now dominant in most market segments.
Systems as complicated as computers require very high reliability. ENIAC remained on, in continuous operation from 1947 to 1955, for eight years before being shut down. Although a vacuum tube might fail, it would be replaced without bringing down the system. By the simple strategy of never shutting down ENIAC, the failures were dramatically reduced. Hot-pluggable hard disks, like the hot-pluggable vacuum tubes of yesteryear, continue the tradition of repair during continuous operation. Semiconductor memories routinely have no errors when they operate, although operating systems like Unix have employed memory tests on start-up to detect failing hardware. Today, the requirement of reliable performance is made even more stringent when server farms are the delivery platform.[81] Google has managed this by using fault-tolerant software to recover from hardware failures, and is even working on the concept of replacing entire server farms on-the-fly, during a service event.[82]
In the twenty-first century, multi-core CPUs became commercially available.[83] Content-addressable memory (CAM)[84] has become inexpensive enough to be used in networking, although no computer system has yet implemented hardware CAMs for use in programming languages. Currently, CAMs (or associative arrays) in software are programming-language-specific. Semiconductor memory cell arrays are very regular structures, and manufacturers prove their processes on them; this allows price reductions on memory products. When the CMOS field effect transistor-based logic gates supplanted bipolar transistors, computer power consumption could decrease dramatically (A CMOS field-effect transistor only draws significant current during the 'transition' between logic states, unlike the substantially higher (and continuous) bias current draw of a BJT). This has allowed computing to become a commodity which is now ubiquitous, embedded in many forms, from greeting cards and telephones to satellites. Computing hardware and its software have even become a metaphor for the operation of the universe.[85] Although DNA-based computing and quantum qubit computing are years or decades in the future, the infrastructure is being laid today, for example, with DNA origami on photolithography.[86]
An indication of the rapidity of development of this field can be inferred by the history of the seminal article.[87] By the time that anyone had time to write anything down, it was obsolete. After 1945, others read John von Neumann's First Draft of a Report on the EDVAC, and immediately started implementing their own systems. To this day, the pace of development has continued, worldwide.[88][89]
[edit] See also
Wikiversity has learning materials about Introduction to Computers/History

• History of computing
• Timeline of computing
• IT History Society
• Information Age
• The Secret Guide to Computers (book)
• List of vacuum tube computers
• List of transistorized computers
[edit] Notes
1. ^ computer, n., Oxford English Dictionary (2 ed.), Oxford University Press, 1989, http://dictionary.oed.com/, retrieved 2009-04-10
2. ^ According to Schmandt-Besserat 1981, these clay containers contained tokens, the total of which were the count of objects being transferred. The containers thus served as a bill of lading or an accounts book. In order to avoid breaking open the containers, marks were placed on the outside of the containers, for the count. Eventually (Schmandt-Besserat estimates it took 4000 years) the marks on the outside of the containers were all that were needed to convey the count, and the clay containers evolved into clay tablets with marks for the count.
3. ^ Eleanor Robson (2008), Mathematics in Ancient Iraq ISBN 978-0-691-09182-2 p.5: these calculi were in use in Iraq for primitive accounting systems as early as 3200-3000 BCE, with commodity-specific number systems. Balanced accounting was in use by 3000-2350 BCE, and a sexagesimal number system was in use 2350-2000 BCE.
4. ^ Lazos 1994
5. ^ a b Ancient Discoveries, Episode 11: Ancient Robots, History Channel, http://www.youtube.com/watch?v=rxjbaQl0ad8, retrieved 2008-09-06
6. ^ Howard R. Turner (1997), Science in Medieval Islam: An Illustrated Introduction, p. 184, University of Texas Press, ISBN 0292781490
7. ^ Donald Routledge Hill, "Mechanical Engineering in the Medieval Near East", Scientific American, May 1991, pp. 64–9 (cf. Donald Routledge Hill, Mechanical Engineering)
8. ^ A Spanish implementation of Napier's bones (1617), is documented in Montaner & Simon 1887, pp. 19–20.
9. ^ Kells, Kern & Bland 1943, p. 92
10. ^ Kells, Kern & Bland 1943, p. 82.
11. ^ Schmidhuber
12. ^ As quoted in Smith 1929, pp. 180–181
13. ^ Discovering the Arithmometer, Cornell University
14. ^ Leibniz 1703
15. ^ Binary-coded decimal (BCD) is a numeric representation, or character encoding, which is still extant.
16. ^ Yamada, Akihiko ([dead link]), Biquinary mechanical calculating machine,“Jido-Soroban” (automatic abacus), built by Ryoichi Yazu, National Science Museum of Japan, p. 8, http://sts.kahaku.go.jp/temp/5.pdf
17. ^ The History of Japanese Mechanical Calculating Machines
18. ^ Mechanical Calculator, "JIDOSOROBAN", The Japan Society of Mechanical Engineers (in Japanese)
19. ^ Jones
20. ^ Menabrea & Lovelace 1843
21. ^ Columbia University Computing History — Herman Hollerith
22. ^ U.S. Census Bureau: Tabulation and Processing
23. ^ Lubar 1991
24. ^ Eckert 1935
25. ^ Eckert 1940, pp. 101=114. Chapter XII is "The Computation of Planetary Pertubations".
26. ^ Fisk 2005
27. ^ Hunt 1998, pp. xiii-xxxvi
28. ^ Chua 1971, pp. 507–519
29. ^ See, for example, Horowitz & Hill 1989, pp. 1–44
30. ^ Norden
31. ^ Singer 1946
32. ^ Phillips
33. ^ (French) Coriolis 1836, pp. 5–9
34. ^ The noise level, compared to the signal level, is a fundamental factor, see for example Davenport & Root 1958, pp. 112–364.
35. ^ Ziemer, Tranter & Fannin 1993, p. 370.
36. ^ Turing 1937, pp. 230–265. Online versions: Proceedings of the London Mathematical Society Another version online.
37. ^ Kurt Gödel (1964), p. 71, "Postscriptum" in Martin Davis (ed., 2004),The Undecidable Fundamental papers by papers by Gödel, Church, Turing, and Post on this topic and the relationship to computability. ISBN 0486432289, as summarized in Church-Turing thesis.
38. ^ Moye 1996
39. ^ Bergin 1996
40. ^ Inventor Profile: George R. Stibitz, National Inventors Hall of Fame Foundation, Inc., http://www.invent.org/hall_of_fame/140.html
41. ^ Zuse
42. ^ "Electronic Digital Computers", Nature 162: 487, 25 September 1948, http://www.computer50.org/kgill/mark1/natletter.html, retrieved 2009-04-10
43. ^ Welchman 1984, pp. 138–145, 295–309
44. ^ Copeland 2006.
45. ^ Claude Shannon, "A Symbolic Analysis of Relay and Switching Circuits", Transactions of the American Institute of Electrical Engineers, Vol. 57,(1938), pp. 713-723
46. ^ Shannon 1940
47. ^ George Stibitz, US patent 2668661, "Complex Computer", granted 1954-02-09 , assigned to AT&T, 102 pages.
48. ^ January 15, 1941 notice in the Des Moines Register.
49. ^ The First Electronic Computer By Arthur W. Burks
50. ^ Da Cruz 2008
51. ^ von Neumann 1945, p. 1. The title page, as submitted by Goldstine, reads: "First Draft of a Report on the EDVAC by John von Neumann, Contract No. W-670-ORD-4926, Between the United States Army Ordnance Department and the University of Pennsylvania Moore School of Electrical Engineering".
52. ^ An Wang filed October 1949, US patent 2708722, "Pulse transfer controlling devices", granted 1955-05-17 .
53. ^ Enticknap 1998, p. 1; Baby's 'first good run' was June 21, 1948.
54. ^ Manchester 1998, by R.B.E. Napper, et al.
55. ^ CSIRAC 2005
56. ^ Lavington 1998, p. 25
57. ^ Computer Conservation Society, Our Computer Heritage Pilot Study: Deliveries of Ferranti Mark I and Mark I Star computers., http://www.ourcomputerheritage.org/wp/, retrieved 9 January 2010
58. ^ Lavington, Simon. "A brief history of British computers: the first 25 years (1948 - 1973).". British Computer Society. http://www.bcs.org/server.php?. Retrieved 10 January 2010.
59. ^ Martin 2008, p. 24 notes that David Caminer (1915–2008) served as the first corporate electronic systems analyst, for this first business computer system, a Leo computer, part of J. Lyons & Company. LEO would calculate an employee's pay, handle billing, and other office automation tasks.
60. ^ a b c "Consumer Price Index (estimate) 1800–2008". Federal Reserve Bank of Minneapolis. http://www.minneapolisfed.org/community_education/teacher/calc/hist1800.cfm. Retrieved August 1, 2009.
61. ^ Magnetic tape will be the primary data storage mechanism when CERN's Large Hadron Collider comes online in 2008.
62. ^ For example, Kara Platoni's article on Donald Knuth stated that "there was something special about the IBM 650", Stanford Magazine, May/June 2006
63. ^ IBM (1957) (PDF), SOAP II for the IBM 650, C24-4000-0, http://www.bitsavers.org/pdf/ibm/650/24-4000-0_SOAPII.pdf
64. ^ Wilkes 1986, pp. 115–126
65. ^ Horowitz & Hill 1989, p. 743
66. ^ Patterson & Hennessy 1998, p. 424
67. ^ IBM 1956
68. ^ Feynman, Leighton & Sands 1965, pp. III 14-11 to 14-12
69. ^ Lavington 1998, pp. 34–35
70. ^ Lavington 1998, p. 37
71. ^ Cooke-Yarborough, E.H. (June 1998), "Some early transistor applications in the UK.", Engineering and Science Education Journal (London, UK: IEE) 7 (3): 100–106, doi:10.1049/esej:19980301, ISSN 0963-7346, http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=00689507, retrieved 2009-06-07
72. ^ Lavington 1998, pp. 36–37
73. ^ IBM_SMS 1960
74. ^ Mayo & Newcomb 2008, pp. 96–117; Jimbo Wales is quoted on p. 115.
75. ^ Kilby 2000
76. ^ Robert Noyce's Unitary circuit, US patent 2981877, "Semiconductor device-and-lead structure", granted 1961-04-25 , assigned to Fairchild Semiconductor Corporation.
77. ^ Intel_4004 1971
78. ^ The Intel 4004 (1971) die was 12mm2, composed of 2300 transistors; by comparison, the Pentium Pro was 306mm2, composed of 5.5 million transistors, according to Patterson & Hennessy 1998, pp. 27–39
79. ^ In the defense field, considerable work was done in the computerized implementation of equations such as Kalman 1960, pp. 35–45
80. ^ Eckhouse & Morris 1979, pp. 1–2
81. ^ "Since 2005, its [Google's] data centers have been composed of standard shipping containers--each with 1,160 servers and a power consumption that can reach 250 kilowatts." — Ben Jai of Google, as quoted in Shankland 2009
82. ^ "If you're running 10,000 machines, something is going to die every day." —Jeff Dean of Google, as quoted in Shankland 2008.
83. ^ Intel has unveiled a single-chip version of a 48-core CPU for software and circuit research in cloud computing: accessdate=2009-12-02. Intel has loaded Linux on each core; each core has an X86 architecture: accessdate=2009-12-3
84. ^ Kohonen 1980, pp. 1–368
85. ^ Smolin 2001, pp. 53–57. Pages 220–226 are annotated references and guide for further reading.
86. ^ Ryan J. Kershner, Luisa D. Bozano, Christine M. Micheel, Albert M. Hung, Ann R. Fornof, Jennifer N. Cha, Charles T. Rettner, Marco Bersani, Jane Frommer, Paul W. K. Rothemund & Gregory M. Wallraff (16 August 2009) "Placement and orientation of individual DNA shapes on lithographically patterned surfaces" Nature Nanotechnology publication information, supplementary information: DNA origami on photolithography doi:10.1038/nnano.2009.220
87. ^ Burks, Goldstine & von Neumann 1947, pp. 1–464 reprinted in Datamation, September-October 1962. Note that preliminary discussion/design was the term later called system analysis/design, and even later, called system architecture.
88. ^ IEEE_Annals 1979 Online access to the IEEE Annals of the History of Computing here. DBLP summarizes the Annals of the History of Computing year by year, back to 1996, so far.
89. ^ The fastest supercomputer of the top 500 is expected to be IBM Roadrunner, topping Blue Gene/L as of May 25, 2008.
[edit] References
• Backus, John (August 1978), "Can Programming be Liberated from the von Neumann Style?", Communications of the ACM 21 (8): 613, doi:10.1145/359576.359579, 1977 ACM Turing Award Lecture, http://www.stanford.edu/class/cs242/readings/backus.pdf.
• Bell, Gordon; Newell, Allen (1971), Computer Structures: Readings and Examples, New York: McGraw-Hill, ISBN 0-07-004357-4, http://research.microsoft.com/~gbell/Computer_Structures__Readings_and_Examples/index.html.
• Bergin, Thomas J. (ed.) (November 13 and 14, 1996), Fifty Years of Army Computing: from ENIAC to MSRC, A record of a symposium and celebration, Aberdeen Proving Ground.: Army Research Laboratory and the U.S.Army Ordnance Center and School., http://www.arl.army.mil/www/DownloadedInternetPages/CurrentPages/AboutARL/eniac.pdf, retrieved 2008-05-17.
• Bowden, B. V. (1970), "The Language of Computers", American Scientist 58: 43–53, http://groups-beta.google.com/group/net.misc/msg/00c91c2cc0896b77, retrieved 2008-05-17.
• Burks, Arthur W.; Goldstine, Herman; von Neumann, John (1947), Preliminary discussion of the Logical Design of an Electronic Computing Instrument, Princeton, NJ: Institute for Advanced Study, http://www.cs.unc.edu/~adyilie/comp265/vonNeumann.html, retrieved 2008-05-18.
• Chua, Leon O (September 1971), "Memristor—The Missing Circuit Element", IEEE Transactions on Circuit Theory CT-18 (5): 507–519, doi:10.1109/TCT.1971.1083337, http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1083337.
• Cleary, J. F. (1964), GE Transistor Manual (7th ed.), General Electric, Semiconductor Products Department, Syracuse, NY, pp. 139–204, OCLC 223686427.
• Copeland, B. Jack (ed.) (2006), Colossus: The Secrets of Bletchley Park's Codebreaking Computers, Oxford, England: Oxford University Press, ISBN 019284055X.
• (French) Coriolis, Gaspard-Gustave (1836), "Note sur un moyen de tracer des courbes données par des équations différentielles", Journal de Mathématiques Pures et appliquées series I 1: 5–9, http://visualiseur.bnf.fr/ConsulterElementNum?O=NUMM-16380&Deb=11&Fin=15&E=PDF, retrieved 2008-07-06.
• ([dead link] – Scholar search) CSIRAC: Australia’s first computer, Commonwealth Scientific and Industrial Research Organisation (CSIRAC), June 3, 2005, http://www.csiro.au/science/ps4f.html, retrieved 2007-12-21.
• Da Cruz, Frank (February 28, 2008), "The IBM Automatic Sequence Controlled Calculator (ASCC)", Columbia University Computing History: A Chronology of Computing at Columbia University (Columbia University ACIS), http://www.columbia.edu/acis/history/ssec.html, retrieved 2008-05-17.
• Davenport, Wilbur B., Jr; Root, William L. (1958), An Introduction to the theory of Random Signals and Noise, McGraw-Hill, pp. 112–364, OCLC 573270.
• Eckert, Wallace (1935), "The Computation of Special Perturbations by the Punched Card Method.", Astronomical Journal 44 (1034): 177, doi:10.1086/105298.
• Eckert, Wallace (1940), "XII: "The Computation of Planetary Pertubations"", Punched Card Methods in Scientific Computation, Thomas J. Watson Astronomical Computing Bureau, Columbia University, pp. 101–114, OCLC 2275308.
• Eckhouse, Richard H., Jr.; Morris, L. Robert (1979), Minicomputer Systems: organization, programming, and applications (PDP-11), Prentice-Hall, pp. 1–2, ISBN 0135839149.
• Enticknap, Nicholas (Summer 1998), "Computing's Golden Jubilee", Resurrection (The Computer Conservation Society) (20), ISSN 0958-7403, http://www.cs.man.ac.uk/CCS/res/res20.htm#d, retrieved 2008-04-19.
• Feynman, R. P.; Leighton, Robert; Sands, Matthew (1965), Feynman Lectures on Physics, Reading, Mass: Addison-Wesley, pp. III 14–11 to 14–12, ISBN 0201020106, OCLC 531535.
• Fisk, Dale (2005), Punch cards, Columbia University ACIS, http://www.columbia.edu/acis/history/fisk.pdf, retrieved 2008-05-19.
• Hollerith, Herman (1890) (Ph.D. dissertation), In connection with the electric tabulation system which has been adopted by U.S. government for the work of the census bureau, Columbia University School of Mines.
• Horowitz, Paul; Hill, Winfield (1989), The Art of Electronics (2nd ed.), Cambridge University Press, ISBN 0521370957.
• Hunt, J. C. R. (1998), "Lewis Fry Richardson and his contributions to Mathematics, Meteorology and Models of Conflict", Ann. Rev. Fluid Mech. 30: XIII–XXXVI, doi:10.1146/annurev.fluid.30.1.0, http://www.cpom.org/people/jcrh/AnnRevFluMech(30)LFR.pdf, retrieved 2008-06-15.
• IBM_SMS (1960), IBM Standard Modular System SMS Cards, IBM, http://ed-thelen.org/1401Project/Sched2006November.html, retrieved 2008-03-06.
• IBM (September, 1956), IBM 350 disk storage unit, IBM, http://www-03.ibm.com/ibm/history/exhibits/storage/storage_350.html, retrieved 2008-07-01.
• IEEE_Annals (Series dates from 1979), Annals of the History of Computing, IEEE, http://csdl2.computer.org/persagen/DLPublication.jsp?pubtype=m&acronym=an, retrieved 2008-05-19.
• Ifrah, Georges (2000), The Universal History of Numbers: From prehistory to the invention of the computer., John Wiley and Sons, p. 48, ISBN 0-471-39340-1. Translated from the French by David Bellos, E.F. Harding, Sophie Wood and Ian Monk. Ifrah supports his thesis by quoting idiomatic phrases from languages across the entire world.
• Intel_4004 (November 1971), Intel's First Microprocessor—the Intel 4004, Intel Corp., http://www.intel.com/museum/archives/4004.htm, retrieved 2008-05-17.
• Jones, Douglas W, Punched Cards: A brief illustrated technical history, The University of Iowa, http://www.cs.uiowa.edu/~jones/cards/history.html, retrieved 2008-05-15.
• Kalman, R.E. (1960), "A new approach to linear filtering and prediction problems", Journal of Basic Engineering 82 (1): 35–45, http://www.elo.utfsm.cl/~ipd481/Papers%20varios/kalman1960.pdf, retrieved 2008-05-03.
• Kells; Kern; Bland (1943) ([dead link]), The Log-Log Duplex Decitrig Slide Rule No. 4081: A Manual, Keuffel & Esser, p. 92, http://www.mccoys-kecatalogs.com/K&EManuals/4081-3_1943/4081-3_1943.htm.
• Kilby, Jack (2000), Nobel lecture, Stockholm: Nobel Foundation, http://nobelprize.org/nobel_prizes/physics/laureates/2000/kilby-lecture.pdf, retrieved 2008-05-15.
• Kohonen, Teuvo (1980), Content-addressable memories, Springer-Verlag, pp. 368, ISBN 0387098232.
• Lavington, Simon (1998), A History of Manchester Computers (2 ed.), Swindon: The British Computer Society, ISBN 0-902505-01-8.
• Lazos (1994), The Antikythera Computer (Ο ΥΠΟΛΟΓΙΣΤΗΣ ΤΩΝ ΑΝΤΙΚΥΘΗΡΩΝ),, ΑΙΟΛΟΣ PUBLICATIONS GR.
• Leibniz, Gottfried (1703), Explication de l'Arithmétique Binaire.
• Lubar, Steve (May 1991) ([dead link] – Scholar search), "Do not fold, spindle or mutilate": A cultural history of the punched card, http://ccat.sas.upenn.edu/slubar/fsm.html, retrieved 2006-10-31.
• Manchester (1998, 1999), Mark 1, Computer History Museum, The University of Manchester, http://www.computer50.org/mark1/MM1.html, retrieved 2008-04-19.
• Martin, Douglas (June 29, 2008), "David Caminer, 92 Dies; A Pioneer in Computers", New York Times: 24.
• Mead, Carver; Conway, Lynn (1980), Introduction to VLSI Systems, Reading, Mass.: Addison-Wesley, ISBN 0201043580.
• Menabrea, Luigi Federico; Lovelace, Ada (1843), "Sketch of the Analytical Engine Invented by Charles Babbage", Scientific Memoirs 3, http://www.fourmilab.ch/babbage/sketch.html. With notes upon the Memoir by the Translator.
• Menninger, Karl (1992), Number Words and Number Symbols: A Cultural History of Numbers, Dover Publications. German to English translation, M.I.T., 1969.
• Montaner; Simon (1887), Diccionario Enciclopédico Hispano-Americano (Hispano-American Encyclopedic Dictionary).
• Moye, William T. (January 1996), ENIAC: The Army-Sponsored Revolution, http://ftp.arl.army.mil/~mike/comphist/96summary/, retrieved 2008-05-17.
• Norden, M9 Bombsight, National Museum of the USAF, http://www.nationalmuseum.af.mil/factsheets/factsheet.asp?id=8056, retrieved 2008-05-17.
• Noyce, Robert US patent 2981877, "Semiconductor device-and-lead structure", granted 1961-04-25 , assigned to Fairchild Semiconductor Corporation.
• Patterson, David; Hennessy, John (1998), Computer Organization and Design, San Francisco: Morgan Kaufmann, ISBN 1-55860-428-6.
• Pellerin, David; Thibault, Scott (April 22, 2005), Practical FPGA Programming in C, Prentice Hall Modern Semiconductor Design Series Sub Series: PH Signal Integrity Library, pp. 1–464, ISBN 0-13-154318-0.
• Phillips, A.W.H., The MONIAC, Reserve Bank Museum, http://www.rbnz.govt.nz/about/museum/3121411.pdf, retrieved 2006-05-17.
• Rojas, Raul; Hashagen, Ulf (eds., 2000). The First Computers: History and Architectures. Cambridge: MIT Press. ISBN 0-262-68137-4.
• Schmandt-Besserat, Denise (1981), "Decipherment of the earliest tablets", Science 211 (4479): 283–285, doi:10.1126/science.211.4479.283, PMID 17748027.
• Schmidhuber, Jürgen, Wilhelm Schickard (1592–1635) Father of the computer age, http://www.idsia.ch/~juergen/schickard.html, retrieved 2008-05-15.
• Shankland, Stephen (May 30, 2008), Google spotlights data center inner workings, Cnet, http://news.cnet.com/8301-10784_3-9955184-7.html?tag=nefd.lede, retrieved 2008-05-31.
• Shankland, Stephen (April 1, 2009), Google uncloaks once-secret server, Cnet, http://news.cnet.com/8301-1001_3-10209580-92.html, retrieved 2009-04-01.
• Shannon, Claude (1940), A symbolic analysis of relay and switching circuits, Massachusetts Institute of Technology, Dept. of Electrical Engineering.
• Simon, Herbert (1991), Models of My Life, Basic Books, Sloan Foundation Series.
• Singer (1946), Singer in World War II, 1939–1945 — the M5 Director, Singer Manufacturing Co., http://home.roadrunner.com/~featherweight/m5direct.htm, retrieved 2008-05-17.
• Smith, David Eugene (1929), A Source Book in Mathematics, New York: McGraw-Hill, pp. 180–181.
• Smolin, Lee (2001), Three roads to quantum gravity, Basic Books, pp. 53–57, ISBN 0-465-07835-4. Pages 220–226 are annotated references and guide for further reading.
• Steinhaus, H. (1999), Mathematical Snapshots (3rd ed.), New York: Dover, pp. 92–95, p. 301.
• Stern, Nancy (1981), From ENIAC to UNIVAC: An Appraisal of the Eckert-Mauchly Computers, Digital Press, ISBN 0-932376-14-2.
• Stibitz, George US patent 2668661, "Complex Computer", granted 1954-02-09 , assigned to AT&T.
• Turing, A.M. (1936), "On Computable Numbers, with an Application to the Entscheidungsproblem", Proceedings of the London Mathematical Society, 2 42: 230–65, 1937, doi:10.1112/plms/s2-42.1.230 (and Turing, A.M. (1938), "On Computable Numbers, with an Application to the Entscheidungsproblem: A correction", Proceedings of the London Mathematical Society, 2 43: 544–6, 1937, doi:10.1112/plms/s2-43.6.544)Other online versions: Proceedings of the London Mathematical Society Another link online.
• Ulam, Stanisław (1976), Adventures of a Mathematician, New York: Charles Scribner's Sons, (autobiography).
• von Neumann, John (June 30, 1945), First Draft of a Report on the EDVAC, Moore School of Electrical Engineering: University of Pennsylvania.
• Wang, An US patent 2708722, "Pulse transfer controlling devices", granted 1955-05-17 .
• Welchman, Gordon (1984), The Hut Six Story: Breaking the Enigma Codes, Harmondsworth, England: Penguin Books, pp. 138–145, 295–309.
• Wilkes, Maurice (1986), "The Genesis of Microprogramming", Ann. Hist. Comp. 8 (2): 115–126.
• Ziemer, Roger E.; Tranter, William H.; Fannin, D. Ronald (1993), Signals and Systems: Continuous and Discrete, Macmillan, p. 370, ISBN 0-02-431641-5.
• Zuse, Z3 Computer (1938–1941), http://www.computermuseum.li/Testpage/Z3-Computer-1939.htm, retrieved 2008-06-01.
[edit] Further reading
• Ceruzzi, Paul E., A History of Modern Computing, MIT Press, 1998