Professional Documents
Culture Documents
Core - 5 - 1 Computers and Chess 2006
Core - 5 - 1 Computers and Chess 2006
5.1
M U S E U M ⁄ ⁄ M A Y 2 0 0 6
COM PU T E R
CHESS
N E W E X H I B I T S H O WC A S E S G A M E ’ S
PA S T A N D M U S E U M ’ S F U T U R E
PD P -1 R ES TO R AT I O N S EC R E T S U N V EI L ED ⁄⁄ T H E FA S C I N AT I N G WO R L D O F T EC H M A R K E T I N G ⁄⁄
HOW AMERICANS HELPED BUILD THE SOVIET SILICON VALLEY ⁄⁄
E XPLORE MUSEUM ARTIFACTS > >
PUBLISHER
Karen M. Tucker
AS S I STA N T PU B LI S H E R
DIG DEEPER!
Robert S. Stetson
A P U B L I C A T I O N O F T H E C O M P U T E R H I S T O R Y M U S E U M ⁄ ⁄ M A Y 2 0 0 6
Kirsten Tashev
Visit the expanded Core website.
EXECUTIVE EDITOR
Leonard J. Shustek This entire issue is now online at:
www.computerhistory.org/core
EDITOR
Karyn Wolf Lynn It’s a great way to enjoy Core all
NEW EXHIBIT EXPLORE THE COLLECTION over again or share it with a friend
TECHNICAL EDITOR (please do!).
3 ⁄⁄ The Quest to Build a Thinking 13 ⁄⁄ O B J E C T :
Dag Spicer
Machine: A History of Computer Chess Google corkboard server rack
Why did computer chess capture the The computer that launched Google.
AS S I STA N T E D ITO R
attention of a generation of computer By Chris Garcia
Chris Garcia
scientists and what does building a
computer that plays chess tell us about 14 ⁄⁄ S O F T W A R E :
DESIGN
the nature of machine intelligence? To Micro-Soft BASIC Code with notations
Ed Anderson / Skout
explore these questions, the museum has Rare handwritten notes on this early code
unveiled the “Mastering the Game: A from 1976.
CORE ONLINE
History of Computer Chess” exhibition By Chris Garcia
Grace Chen
and online counterpart.
Karyn Wolf Lynn
By Dag Spicer and Kirsten Tashev 15 ⁄⁄ D O C U M E N T :
Mike Walton
News release, Software AG of North
I N D U ST RY TA L E S America
www.computerhistory.org/core
16 ⁄⁄ Selling the Computer Revolution A 1982 document sheds light on
The marketing of computers over the international attempts to acquire
© 2006 Computer History Museum. All artwork Want more? Check out enCore
years tells a highly visual and interesting American technology.
is copyright of the Computer History Museum online, for the hidden (or not so
story of not only how computers advanced, By Sarah Wilson
unless otherwise credited. For reprints and hidden) geek in all of us.
but of how society’s views changed right
permissions, contact core@computerhistory.
along with the industry. 20 ⁄⁄ M E D I A :
org. Subscriptions are a member benefit; please We’ve added tons of related
By Paula Jabloner “He Saw the Cat” 45 RPM Record
see page 20 for details. Address changes and information to help you dig further
An early computer speech effort that made
other written correspondence may be sent to: down into computer history. Material
R E STO R AT I O N it into the movies.
Computer History Museum, Attn: Core Editor, includes:
21 ⁄⁄ Restoring the DEC PDP-1 Computer By Chris Garcia
1401 N Shoreline Blvd, Mountain View, CA 94043-
A team of volunteers spent two years
1311, USA. Online exhibits
analyzing, researching, repairing, and, we 26 ⁄⁄ E P H E M E R A :
admit, playing with the PDP-1. Here is a First West Coast Computer Faire Video files // Film clips
Cover artwork: Engraving of The Turk, 1789. Presentations by pioneers
report on the joys and sorrows of restoring T-Shirt
In 1770, Hungarian inventor Wolfgang von Personal interviews
a historic computer. From a celebrated conference that helped
Kempelen created a chess-playing automaton Transcripts // Photos
By Mike Cheponis launch the microcomputer revolution.
called The Turk whose human-like playing And more!
By Chris Garcia
qualities amazed audiences across Europe
I N T E R N AT I O N A L I N T R I G U E
and America. Some observers guessed the
27 ⁄⁄ How Two American Spies Helped SPECIAL INSERT
secret that was a mystery for most of its
Build the Soviet Silicon Valley Come Explore with Us: Building a
career: the source of its playing strength was
What were two educated American World-Class Museum
a human chess player hidden inside. Courtesy Look for this symbol, which indicates
engineers able to accomplish for the
of the Library Company of Philadelphia, CHM# that supplemental material is posted
Soviet Union as spies during the Cold
L062302012. on the web.
War? A spy-thriller with a techie twist! 2 ⁄⁄ Editor’s Note By Len Shustek
By Steven T. Usdin 33 ⁄⁄ Artifact Donations
Photo this page: In 1968, David Levy played a Start an online adventure in
Back ⁄⁄ Mystery Item
friendly game of chess with Stanford professor computer history! Visit:
John McCarthy. After the match McCarthy www.computerhistory.org/core
remarked that within ten years a computer
program would defeat Levy. Levy bet McCarthy
500 pounds that this would not be the case.
In August 1978, Levy (shown here) won the bet
when he defeated Chess 4.6, the strongest
chess playing computer of the day. Gift of David
Levy, CHM# 102634530
E DI T OR ’ S NO T E
MISSION
To preserve and present for posterity the artifacts and
stories of the information age
T H I N K I NG
It is about designing physical and web-based exhibits to explain EXECUTIVE DIRECTOR & CEO
the excitement of trying to build smart machines. It is about telling John C. Toole
hitherto unknown spy stories leading to the development of Rus-
sian computers during the Cold War. It is about bringing classic BOARD OF Steve Smith
M AC H I N E
machines from 40 years ago back to life. It is about the changing TRUSTEES The Interim CEO Network
fashion in how computers are promoted and sold. It is about build- Leonard J. Shustek Stephen L. Squires
VenCraft, LLC (President) Consultant
ing a comprehensive and eclectic collection that includes make-
Sally M. Abel Pierluigi Zappacosta
shift hardware, legendary software source code, historic t-shirts, Fenwick & West LLP Sierra Sciences, Inc.
computer-generated 45 RPM records, and news releases about at- David Anderson
tempted espionage of computer technology. Sendmail
C. Gordon Bell BOARD OF
Microsoft Corporation
All these efforts represent different aspects of the same mission: ADVISORS
the information revolution is having a profound effect on our civi-
lization, and we owe it to future generations to preserve, under-
Peggy Burke
1185 Design
Andrea Cunningham
Gene Myron Amdahl
William Aspray
A H I STORY OF COM PU T E R CH E SS
Indiana University
stand, and explain how it came to be. To do so, we collect objects CXO Communication
Robert Brodersen
of all types as the raw material, we recreate historical conditions Lori Crawford
University of California,
Infinity Capital
for study, and we describe what we know to others. These goals are Berkeley
Mark Dean
Paul E. Ceruzzi
lofty and important. IBM Almaden Research
Center
Smithsonian Institution by D A G S P I C E R and K I R S T E N T A S H E V
Bill Davidow
Donna Dubinsky
But we also do it because it’s fun! Would we have restored the Numenta
Mohr, Davidow Ventures
PDP-1 if it wasn’t the “Spacewar! Machine?” Maybe, but maybe David Emerson
Federico Faggin
Foveon
not. The man-machine conflict in the computer chess exhibit is Clarent Corporation
Samuel Fuller
the essence of science fiction. The Zelenograd story is in the best Edward Feigenbaum
Analog Devices, Inc.
Stanford University
tradition of dramatic spy thrillers, except that it’s true. The story Burt Grad
Eric Hahn
of the computer is just not the facts of technological development: Inventures Group James Gray
it is a rich human story. Microsoft Corporation
Gardner Hendrie
Sigma Partners Jeanette Horan
IBM Almaden Research
Peter S. Hirshberg
What of the chapters that are being written now? The pace of devel- Technorati
Center
opment in computers blurs the distinction between past and future. Charles House
Burge Jamieson
Sigma Partners
The British psychiatrist R. D. Laing said, “We live in a moment Intel Corporation
Randy H. Katz
of history where change is so speeded up that we begin to see the David House
University of California,
Credence Systems
present only when it is already disappearing.” Unlike those who Berkeley
Christine Hughes
study the history of the printing press or the Crusades, we are both Achievement Plus
Steven T. Kirsch
Propel Software
burdened and privileged by having the object of our study evolving John Mashey Corporation
in our lifetimes. What an experience that is! Consultant
Tom Melcher
Isaac R. Nassi
Greg Papadopoulos
SAP
Sun Microsystems
I hope you enjoy this and future issues of Core, and get involved in Suhas Patil
David Patterson
the effort to preserve computing history. We live in a remarkable Tufan
University of California,
time of technological change and should celebrate it joyously. Bernard L. Peuto Berkeley
Concord Consulting
John William Poduska, Sr.
F. Grant Saviers Advanced Visual Systems
Adaptec, Inc. (retired)
James N. Porter
Len Shustek Larry Schoenberg DISK/TREND, Inc.
John F. Shoch Eric E. Schmidt
Alloy Ventures Google
Heidi Sinclair
Len Shustek is the Chairman of the Computer History Museum.
Burson-Marsteller
He has been the co-founder of two high-tech companies, a
trustee of various non-profits, a director of several corporations,
Computer History Museum
and on the faculty of Carnegie Mellon and Stanford Universities.
1401 N Shoreline Blvd
Mountain View, CA 94043-1311 USA
+1.650.810.1010 main
+1.650.810.1055 fax
www.computerhistory.org
Chess is
WHY COMPUTER CHESS? in the first third of the 20th century on Commercial computers arrived in the
both theoretical and experimental planes early to mid-1950s as companies applied
In September 2005, the Computer History Museum opened a very ancient game. It and resulted in the invention of such things knowledge gained through WWII tech-
“Mastering the Game: A History of Computer Chess,” a dy- probably came to the west from Persia (Iran) via India during the as widespread electrification, the light nological developments to new products.
namic new exhibit that chronicles the story of how computer reign of the Persian king Chosroes (d. 576 A.D.). For much of the bulb, the automobile, the airplane, motion “Electronic” computers at this stage meant
science explored the bounds of machine thinking through the last fifteen hundred years, chess has been popular with the ruling pictures, radio, sound recording, televi- that such machines were based on vacuum
design of a computer to play chess. classes as a test of tactical and strategic acumen, a test whose les- sion, and air conditioning, to name but a tubes. These tubes could switch hundreds,
This exhibit represented a two-year project to examine sons could possibly be applied to the world stage itself. Indeed, in few practical inventions; on the theoretical even thousands, of times faster than the
how to teach visitors about software—an abstract and tradi- the Middle East, chess is known as “the game of the king,” and level, some of the key developments were previous relay or mechanical systems of
tionally challenging topic to display. In fall 2003, the museum the word “Schach mat” (“Shah mat” in Persian) signifies “the quantum theory, organic chemistry, dis- just five years earlier, resulting in comput-
formed a Software Exhibits Committee and the team explored king is dead,” thus “Checkmate.” covery of the electron, and Einstein’s three ing machines that could accomplish in sec-
conceptually a variety of “software” topics, including the his- Although it had royal origins, chess was also popular with the earth-shattering papers of 1905 that would onds what would previously have taken a
tory of text processing, programming languages, and game soft- less privileged, since it is inexpensive to play, requiring nothing re-write physics forever. The world was human months or years to calculate.
ware. Within a year, the team decided to prototype an exhibit more than a board with 64 black and white squares and some game transitioning from mysticism to science.
in order to fully understand the challenges. pieces. Chess boards themselves could be status symbols but the Concurrently, as companies and gov- OPENING MOVES
The history of computer chess as an exhibit topic was game itself, of course, was no respector of persons. While it is easy ernments sought to automate the process-
proposed when discussing game software. The topic immedi- to learn—even children can attain remarkable proficiency—chess ing of information that was generated by A colleague of Turing’s, Dr. Dietrich Prinz,
ately resonated with the team. A five-decade-long story with a has been associated with intellectual pursuits since its earliest be- modern-day life, initially mechanical solu- a research scientist on one of these new
distinguished cast of characters, the history of computer chess ginnings. Since the rules were easy to program into a computer and tions (like the Hollerith census machine of electronic machines (the Ferranti Mark I
also mirrored the larger story of computer history, providing it had nearly infinite (10 to the 120th power) possible games, chess 1890) were proposed. These were followed computer at Manchester University), con-
visitors with an overview of general technological develop- was interesting to early computer pioneers as a test bed for ideas in the 1910s and ‘20s by electrical machines, tinued the quest to create a chess-playing
ments over time. about computer reasoning. As pioneers in the 1940s sought ways then, during WWII, by electronic solu- computer program. Prinz wrote the first
Computer chess also represented an accessible way for to understand and apply computers to real-world problems, they tions. In particular, the modern “statistical limited program in 1951. Although the King Otto IV of Brandenburg playing chess
visitors to learn about software. Even if they don’t play, most began almost immediately to use chess. society,” with its government-driven desire computer was not powerful enough to play with woman, illumination from Heidelberg
Lieder manuscript, 14th century.
people know that chess is a difficult problem to solve for people to acquire quantitative justifications for its a full game, it could find the best move if it © Archivo Iconografico, S.A./CORBIS
and machines alike. With this familiar jumping off point, visi- THE TURK policy decisions, was, and remains, a major was only two moves away from checkmate,
tors could begin to explore some important computing software driving force behind the development of known as the “mate-in-two” problem.
concepts such as algorithms, upon which all computer chess But the story begins not with the birth of the computer in the 1940s, computers. No one considered these early In the United States, Alex Bernstein,
programs are built. but 170 years earlier in 1770, when diplomat and inventor Wolfgang mechanical or electrical machines “think- an experienced chess player and a pro-
Additionally, as part of its international mission, the mu- von Kempelen built a mechanical chess player called “The Turk.” ing” in any way. grammer at IBM, wrote a program in 1958
seum is committed to providing online visitors with access to As part of his desire to rise in social position, Von Kempelen cre- that could play a full chess game on an
exhibits and source material from the collection. To that end, ated The Turk as an entertainment and presented it to the Empress GIANT BRAINS IBM 704 mainframe computer. The pro-
delving into the topic of computer chess through exhibit devel- Maria Theresa of Austria-Hungary. The Empress and her court gram could be defeated by a novice player
opment has unearthed broad and deep source material such were stunned by The Turk’s strong play as well as by its mysterious However, the emergence of the electronic and each move took eight minutes. The
as research papers, tournament brochures and photographs, movements which seemed to indicate it was “thinking.” computer in the late 1940s led to much interface—front panel switches for input
source code as well as oral histories conducted by the museum Word of The Turk spread quickly throughout Europe and it speculation about “thinking” machines. In and a printer for output—was not easy to
during the research phase of the exhibition. This rich content became a sensation. It would travel to public fairs and royal courts light of all the scientific accomplishments use either.
makes the topic well-suited for more exploration in cyberspace for the next 85 years, amazing audiences and playing such well- at the time, there seemed to be no limit to While Prinz, Bernstein, and others
and the museum has created an online exhibit to parallel the known figures as Napoleon Bonaparte, Benjamin Franklin, and what science could achieve, including, per- wrote rudimentary programs, it was in
physical exhibit at its headquarters. even Charles Babbage (who would later design and build one of haps, building a machine that could think. this environment that scientists developed
Finally, the history of computer chess also has drama; it the earliest mechanical calculating machines). Although some of If a computer could play chess, so went the and extended the fundamental theoreti-
is a story, ostensibly about man vs. machine, and the dream to The Turk’s observers guessed its secret, most had no idea that the reasoning, then perhaps other problems cal techniques for evaluating chess posi-
build a thinking machine, a topic that continues to fascinate. source of its playing strength was a human chess player carefully that seemed to require human intelligence tions and for searching possible moves and
You are invited to visit the “Mastering the Game: hidden inside. might also be solved. For example, in a counter-moves.
A History of Computer Chess” exhibit at the museum Although The Turk was eventually revealed to be a magic 1949 paper, Claude Shannon, a researcher For example, early artificial intelli-
or online. Here is an overview of the topic to whet your trick, the drive to build a machine that appeared to think or mimic at MIT and Bell Laboratories, said of pro- gence pioneers Allen Newell and Herbert
appetite! human abilities continued throughout the 18th and 19th centuries. gramming a computer to play chess that, Simon from Carnegie Mellon University
Indeed, European craftsmen built automata (literally: self-guided “Although of no practical importance, the together with Cliff Shaw at the Rand Cor-
machines) that appeared to write, sing, and even play musical in- question is of theoretical interest, and poration, developed some of the funda-
struments. These automata grew out of the Enlightenment concept it is hoped that...this problem will act as mental programming ideas behind all com-
of humans as machines that could be understood through rational a wedge in attacking other problems...of puter chess programs in the mid-to-late
principles. The movements of automata were usually guided by greater significance.” 1950s. Their NSS (Newell, Simon, Shaw)
clockwork mechanisms, which were becoming a mature technol- Another computer pioneer, the Eng- program combined “algorithms” (step-by-
ogy by the mid-19th century. lishman Alan Turing, one of the most bril- step procedures) that searched for good
from previous page: Such creations were illusion, of course, no more intelligent liant mathematical minds of the 20th cen- moves with “heuristics” (rules of thumb)
Computer pioneer Claude Shannon developed the than the mute wood and metal parts out of which they were con- tury, studied the idea of “building a brain” that captured well-known chess strategies Thinking Machine, Astounding Science Fiction
foundations of computer search strategies for how cover, Oct. 1957-10. Used with permission of
a machine might place chess. Shannon (right) and
structed. The era of automata ended about 1900 at a time when the and developed a theoretical computer to reduce the number of possible moves to
Dell Magazines. CHM# L062302011
chess champion Edward Lasker play with Shannon’s world’s scientific knowledge was evolving into a system based on chess program as an example of machine explore. Specifically, the program used the
early relay-based endgame machine, c. 1940. Gift of mathematically-understood principles supplemented by profound intelligence. Working at a time before he “minimax” algorithm with the “alpha-beta
Monroe Newborn, CHM# 102645398 distaste for “metaphysics” or references to mystical (i.e. non-ratio- had access to a computer, in 1947 Turing pruning” technique.
designed the first program to play chess,
—Chris Garcia
JOE CONDON KEN THOMPSON “Mastering the Game: A History of Computer Chess”
“Innovation in the Valley”
PERSONAL INTERVIEWS NOW ONLINE “Visible Storage” with 600+ objects
(audio files and written transcripts): Legendary artifacts: Cray 1, Johnniac, Apple 1,
Enigma, and more!
Hans Berliner // Feng Hsuing Hsu // Richard Greenblatt //
David Levy // Peter Jennings // Alan Kotok // Now open to the public:
Harry Nelson // Monroe Newborn // Wednesday & Friday: 1-4 pm
Kathe and Danny Spracklen // Ken Thompson Saturday: 11 am - 5 pm
Sunday: (beginning June 11): 1-4 pm
—Sarah Wilson
14 CORE 5 .1
C OMP U T E R M A R K E T ING T OD AY DIR E C T S T HE W E B A 39” x 12” poster depicts marketing brochure
covers from the museum’s collection of
S UR F E R T O A G L E A MING A R R AY OF P R ODUC T S historical marketing materials (1948-1988). Learn
more at the museum’s latest online exhibit at
www.computerhistory.org/brochures.
JU S T A MOU S E C L IC K AWAY. BU T HO W H AV E T HE
The posters are on sale at the museum’s gift
WAY S C OMP U T E R S H AV E BE E N S OL D C H A NG E D shop. (1185 Design, Palo Alto, California)
OV E R T IME T O R E F L E C T T HE L A R G E R P UBL IC
P E R C E P T ION S OF W H AT C OMP U T E R S A R E A ND
W H AT T HE Y ME A N T O U S ? T HE HI S T OR Y OF C OMP U T E R M A R K E T ING provides a fascinating window into how popular Underwood was one of about 30 firms entering the computer
perceptions and the common understanding of computers have business by the early 1950s. In 1956, their Elecom “50,” The First
changed. The omnipresent nature of computers in 21st century Electronic Accounting Machine, was deliberately not marketed to
everyday life, where a new tech gizmo is announced daily, begs businesses as a “computer,” but rather for its “accurate-low cost
the question of how computers were first sold and to whom? accounting,” which positioned it as an advanced calculator (see pg.
P U
The Computer History Museum’s new online exhibit Selling the 18, item B). Marketing that emphasized similarity to earlier prod-
O M T E
Computer Revolution: Marketing Brochures in the Collection provides
materials that can help answer this question by providing a view
ucts promoted acceptance of a new product by making it seem to be
an extension of existing equipment and techniques.
C R
into the evolving world of computer sales over four decades. Yet Elecom is a word created from the first three letters of
The exhibit presents 261 brochures, just a small sampling of electronic computer. The brochure iconography uses the canonical
the Computer History Museum document collection, estimated at stylized Bohr model of the atom so effectively used throughout the
12 million pages or 4,000 linear feet. The curatorial staff selected 1950s as shorthand for “modern,” “space-age,” and “advanced.”
R
(i.e. personal, business, scientific etc.) and categories (i.e. main- computer industry “life-cycle,” by the early 1960s, many of the
frames, input-output, software etc.). Additional effort was made to office products vendors had already left the business, including
H
include brochures that sold software or were directed toward the Underwood. The Control Data 160-A Computer brochure from
EV
technologically-savvy individuals of the time. 1962 markets the same computer for commercial and scientific uses
while squarely selling the machine as an electronic computer— not
T
OLUTI
Bureau, or insurance companies. The Eckert-Mauchly Computer data processing...data acquisition and reduction...peripheral pro-
G
Corporation, produced a brochure in 1948 (see pg. 18, item A) for cessing...scientific computing with FORTRAN...civil engineering
their new UNIVAC computer that made interesting claims, either problems...biomedical experimentation and analysis.” The 160-A
visionary or foolish, depending on your point of view: is a “low cost” scientific wonder. The technologically savvy person
N
and/or the businessman could read more than five pages of speci-
WHAT’S YOUR PROBLEM? Is it the tedious record-keeping and the fications, including that of a magnetic core memory “consist[ing]
arduous figure-work of commerce and industry? Or is it the intricate of 8,192 words...divided into two banks of storage—each with
I
mathematics of science? Perhaps your problem is now considered a capacity of 4,096 12-bit words and a storage cycle time of 6.4
impossible because of prohibitive costs associated with conventional microseconds.” The 160-A was sold as a serious business or sci-
L
methods of solution. The UNIVAC* SYSTEM has been developed by the entific tool, with men in suits operating the machine that retailed
Eckert-Mauchly Computer Corporation to solve such problems. Within its for $60,000.
scope come applications as diverse as air traffic control, census tabula-
L
tions, market research studies, insurance records, aerodynamic design, F A S H I O N C O M P U T I N G / / In sharp contrast to the brush
oil prospecting, searching chemical literature and economic planning. cut and slide-rule culture of the scientific user, the 1966 Electronic
O
Associates, Inc. brochure for their 640 Digital Computing System
E
In 1951, the first UNIVAC was delivered to the U.S. Census represents an unusual front cover and perhaps the first computer
Bureau. Remington Rand, which had bought out the two inven- photo shoot that acts in imitation of fashion photography (see pg.
N
S
tors the year before, created a “UNIVAC Division,” and eventually 18, item D). Though not Miami Beach, the computer is fully acces-
delivered 46 machines at prices of over $1 million each. sorized with peripherals, posing in an outdoor courtyard replete
with a model lounging by the fountain. For the bargain minded,
19 5 0 s : T R A D I T I O N D O M I N AT E S I N T H E FAC E the 640 was available at prices starting below $30,000.
O F I N N O VA T I O N / / The UNIVAC brochure (possibly the
first computer marketing brochure) does not accurately represent
BY R the marketing strategies typically developed in the 1950s when
Most important, the EAI 640 strikes a balance between the work it can do
and the cost to do it. Simply stated, balance means value. The EAI 640
PAU N E computers were usually marketed as “super-calculators,” not gen- Digital Computing System offers the best value available in small scale
UNIVAC attempted.
C O M PA N I E S PROJECT D AT E S
91 : Represented in website exhibit 2 61 : Brochures included in website 1 9 4 8 -1 9 78 : Date range of UNIVAC brochures
20 : Brochures for IBM (largest 2871 : Pages scanned 1 9 4 8 -1 9 8 8 : Years covered in collection (4 0 )
representation) 17: People helped create the site
12 : Brochures for Hewlett-Packard 455 : Intern hours
(2nd largest representation) 39 : Minutes—average time to catalog
17: Brochures with UNIVAC in the title one brochure
49 : Companies with just one 1: Website created
representative brochure
PDP-1 Computer
He Saw the Cat: Computer Speech,
45 RPM record
Date: 1963
Collection: Media
Donor: Gift of Warren Yogi
CHM#: X3119.2005
—Chris Garcia
Cover of 1963 Programmed Data Processor In the restoration room, team members worked
The original proposal for restoration was 1 (PDP-1) brochure. Read more about the on various projects, from examining the
written in 2001 when the museum was museum’s extensive documentation of PDP-1 backplane with a high intensity lamp to
based at Moffett Field. Joe Fredrick, Eric marketing brochures on page 16. © Digital analyzing and repairing the paper tape punch in
Equipment Corporation (DEC). CHM#: documented step-by-step methods. Then there’s
Smith, and I produced our final proposal
102646296 always the power supply to ponder!
on November 4, 2003. The PDP-1 itself
was running on May 18, 2004, and the Closeup of the PDP-1 backplane. During It takes three to tangle with an old piece of
complete machine was fully restored as of the restoration, the team was pleasantly hardware. The restoration team worked on every
surprised at how well the PDP-1’s circuits aspect of the PDP-1. Here they examine the
November 1, 2005, almost two years to the
had fared over the years. front panel. Note the famous whiteboard in the
day since beginning of the project. background!
Team members have now begun
working on the “maintenance phase” and
will continue as long as we wish to keep the
machine running.
G E T T I N G STA R T E D
HOW TWO
Computer users have been meeting since the
days of the first commercial computers, begin-
ning in about the mid-1950s. These groups
AMERICAN SPIES
(such as SHARE for mainframes and later DE-
CUS for minis) began as informal meetings for
sharing ideas (and software) but quickly be-
came regular, well-planned, elaborate forums
for the exchange of scientific and professional
HELPED BUILD
information as well as the creation and renewal
of personal contacts.
THE SOVIET
began to be sold, Jim Warren and Bob Reil-
ing organized the West Coast Computer Faire,
which took place on April 15-17 at the Brooks
Civic Auditorium in San Francisco, Califor-
SILICON VALLEY
nia. Exhibitors included the major computer kit
companies like MITS and Digital Research, as
well as computer and chip makers such as Intel
and Commodore.
Barr enrolled in City College of New York (CCNY), the most The Russians merely had to supply Leica cameras for micro- contacts, and made plans to travel. Barr told his girlfriend that he In fact, the KGB helped Barr escape to Prague, where they
radical campus in America, to study electrical engineering. Like filming and provide their agents with rudimentary training in spy planned to try to visit the Soviet Union to get a first-hand look at gave him a new identity. For the rest of his life, Barr told friends,
other colleges it had two main political groupings; instead of iden- craft to minimize the chances that their activities would be de- communism. family and colleagues that he was born in Johannesburg, South
tifying themselves as Democrats or Republicans, however, CCNY tected. The amateur spies were more talented at stealing and copy- Barr remained in covert contact with the KGB as he traveled Africa. His new name, Joseph Berg, was a KGB joke: he was Joe
students’ allegiance was divided between Stalin and Trotsky. The ing classified information than at covering their tracks. But, their in Europe, enjoying a bohemian life. He arrived in Paris on July 4, Berg from Jo’burg.
faculty published an underground Communist publication, Teach- astounding successes were made possible by U.S. counterintelli- 1949, and convinced Olivier Messiaen, a world famous avant-garde Barr’s former partners in espionage weren’t as well placed to
er and Worker, that echoed the Daily Worker. gence, which was fixated on Nazi espionage and viewed domestic composer, to accept him as a student. disappear. In addition to the Rosenbergs, other members of the
Barr quickly associated himself with the Stalinists and joined communists as potential subversives, not industrial spies. Events at home, especially newspaper stories about the arrests ring were tracked down and arrested.
a Young Communist League chapter headed by Julius Rosenberg. The FBI aggressively searched for communists in sensitive of Soviet spies, troubled Barr. Worry turned to panic in June 1950, The FBI knocked on Sarant’s door in July 1950. Rather than
After graduating, Barr, Rosenberg and many of their CCNY government jobs, but it took half-hearted actions when it found
friends joined the Communist Party. Their them. When the Bureau alerted Army
world was turned upside down on August counterintelligence that Barr was a secret
21, 1939, by news of the Nazi-Soviet Pact. member of the Communist Party, he was
Barr’s friends remained in the Party and, SECRET DOCUMENTS quickly fired, an act which should have
as Jews who understood Hitler’s intentions, THAT BARR AND HIS been the end of his career in military elec-
in doing so they crossed the line from the tronics and thus as a Soviet spy.
left edge of the political spectrum into the COLLEAGUES SLIPPED TO Barr wasn’t out of work long, how-
territory of the zealot. ever. Within three weeks he was working
SOVIET INTELLIGENCE
After a decade of economic depres- for Western Electric Corp. and had access
sion, Barr and his comrades considered HASTENED THE RED to some of the most sensitive defense-elec-
themselves fortunate to find any work, so tronics secrets in the American arsenal.
they took jobs with virtually the only em-
ARMY’S MARCH TO BERLIN, Rosenberg and other members of their es-
ployer that was hiring, the military. JUMP-STARTED ITS POST- pionage ring had similar experiences.
When Barr started at the U.S. Army Barr recruited Sarant to assist with
Signal Corps Laboratory in the summer of WAR DEVELOPMENT OF extracting and microfilming classified
1940, everything about the technology he NUCLEAR WEAPONS AND documents. Together Barr and Sarant
worked on, even the word “radar,” was a gave the USSR over 9,000 pages of docu-
military secret. Although the job was in- DELIVERY SYSTEMS, ments detailing over 100 weapons systems,
tellectually stimulating, contributing to AND LATER HELPED including not only the most advanced
the war effort was troubling to Barr and land- and air-based radar systems used to
his comrades. The Communist Party of COMMUNIST TROOPS IN track aircraft, guide bombs and locate ene-
the U.S., following the line dictated by the my submarines, but also analog computers
NORTH KOREA FIGHT THE
Kremlin, was stridently opposed to Amer- and insights on manufacturing techniques.
ican preparation for war or assistance to AMERICAN MILITARY TO A Other members of the Rosenberg ring
Great Britain. provided Russia with the proximity fuse
Rosenberg conceived of a way out
STAND-OFF. and 12,000 pages of blueprints for the first
of the dilemma, a solution that would al- American jet fighter.
low dedicated communists to work for the Secret documents that Barr and his
military while remaining true to their ideals. The answer was star- colleagues slipped to Soviet intelligence hastened the Red Army’s
ing them in the face every day: the blueprints and manuals they march to Berlin, jump-started its post-war development of nuclear
worked with could be of great value to the Soviet Union. weapons and delivery systems, and later helped Communist troops
Rosenberg started down the road to becoming a spy before in North Korea fight the American military to a stand-off.
German troops crossed into Russia—that is, at a time when Stalin By June 1947 security procedures at defense contractors had
was allied with Hitler and there was every reason to expect that tightened up a bit and Barr’s employer, Sperry Gyroscope, con- when the arrest of Ethel Rosenberg’s brother, David Greenglass, immediately arrest him, the Bureau interrogated Sarant intensive-
information given to Moscow would be sent on to Berlin. He and tacted the FBI to ask about his reliability. A quick inspection of was announced. It was clear that the cloak of secrecy around his ly for a week, hoping that he would crack. Sarant kept his cool,
Barr volunteered their services as Soviet patriots. the Bureau’s files revealed that he’d been fired as a communist five espionage was unraveling. however, and managed to give the FBI the slip. Accompanied by
Members of the Rosenberg ring were optimally placed to ob- years previously. The FBI interviewed two of three references Barr The morning after newspapers reported Greenglass’s arrest, Carol Dayton, a neighbor with whom he’d been having an affair,
tain valuable technical information. While senior scientists were had provided Sperry, but they provided no useful information. In- Barr walked out of his Paris apartment carrying a single bag, with Sarant escaped to Mexico. Each left a spouse and two young chil-
subject to strict security measures, including compartmentaliza- explicably, the third reference was never contacted; his name was a viola slung over his shoulder. As far as subsequent FBI and CIA dren behind.
tion, the CCNY graduates designed manufacturing processes and Julius Rosenberg. investigations launched about a month later could determine, he Sarant and Dayton contacted Polish intelligence officers in
performed quality-control inspections at factories. They needed to When Sperry fired Barr in October 1947, he figured that his vanished at this moment. For more than three decades, no one in Mexico City. Their escape was straight out of a spy novel, includ-
know how weapons were built and were encouraged both to study career was over at a minimum, and that he might be in danger. the West knew where Barr was, or even whether he was alive or ing hiding in safe houses for months, wearing disguises, carrying
related weapons and to bring their work home. He sold all of his belongings, collected some cash from his KGB dead. false passports, waiting for a moonless night to wade across a river
into Guatemala, and sailing to Casablanca in the hold of a Polish UM-1 was small enough to fit on a kitchen table and light enough of steel or make enormous dams, but in its ability to manipulate became the Soviet version of Silicon Valley, became a non-event.
cargo ship. for one person to lift, and it required about the same power as a atoms and molecules. The key to catching up with and surpassing The two Americans retreated to Leningrad where they were
The American couple were stashed in Warsaw for half a year light bulb. the West, he said, would be microelectronics, a word Sarant had commissioned to build computers and microelectronic compo-
and then sent to Moscow. Barr, who had been working as an en- This success led to an expansion of their team to about 2,000 introduced into the Russian language. nents for the Soviet space program, the Red Air Force, and civilian
gineer in Prague, was brought to the Soviet capital for a dramatic people over the next two years. They designed another computer, Sarant proposed the creation of a secret city dedicated to industry. The CIA and American technical journals learned about
reunion with his old friend. a civilian version of the UM-1 called the UM-1NKh, which was microelectronics. To his and Barr’s astonishment, Khrushchev some of Sarant and Barr’s computers and, without having any idea
Sarant, who was given the name Philip Staros, presented him- eventually put into production and was widely used in applications agreed on the spot. Within months an official decree establishing that they were designed by Americans, rated them as among the
self to the Russians as a brilliant engineer who had been thwarted such as steel plants and nuclear power stations. a new city on the outskirts of Moscow was formally promulgated. best ever produced in the USSR.
because of his communist beliefs. The KGB believed him, or at Barr and Sarant then went to work on a much more advanced The Soviet leader personally signed the papers inducting Sarant A Rand Corporation journal suggested in 1972 that one of
any rate was willing to let him prove himself. computer, an all-purpose computer for use in airplanes, in space into the Communist Party of the Soviet Union and making him a their computers, the Electronica K-200, signaled “some funda-
The trio was sent to Prague, where Sarant and Barr were put and for missile control. The team also developed components that citizen. In August 1962 Sarant drove the first stake into the ground mental shifts and improvements in Soviet design policies.” The
in charge of a team of engineers and tasked with creating a com- would be needed to create new generations of computers, includ- marking the beginning of construction of Zelenograd. authors had no idea how correct they were when they wrote that
puterized anti-aircraft weapon. They succeeded, building an ana- ing a novel ferrite core computer memory that was likely more ad- Although it was widely known that they were not Russians, “everything we know about [the Electronica K-200] suggests tech-
log computer that received input from radar, predicted a plane’s vanced than anything in the U.S. at the time. Sarant and Barr’s origins were kept secret: Barr’s wife didn’t learn nological transfer: transfer of technology from a qualified, capable
future path, and controlled artillery. The first computerized anti- In 1962 Staros and Berg received a visit from a young engi- his real name or that he was American until 20 years after they’d (by Soviet standards) design and production environment to an
aircraft weapon built in the Soviet bloc, it was still in use with neer who was looking for help with some components of a cruise married. There was more than a little opposition to foreigners get- application environment long thwarted by unreliable, inappropri-
minor modifications at least into the late 1980s. missile guidance system. He was quite impressed by their achieve- ting the top positions at a high prestige operation like Zelenograd. ate, and scarce computational equipment. The K-200 is the first
Eagerly accepting a subsequent invitation to put their skills ments and reported on them to his father. The engineer’s name was In the end, Sarant was denied the top job and very reluctantly Soviet production computer that can be fairly characterized as
to work in the Soviet Union, Sarant and Barr, Dayton, and Barr’s Sergei Khrushchev, and his father was Nikita Khrushchev. Sergei’s had to settle for number two, scientific director. Still, he had over well-engineered. It may not be up to Western standards, but it eas-
Czech wife, moved to Leningrad in January 1956. Sarant and comments, and strong support from top Soviet military defense 20,000 people with advanced degrees reporting to him and more ily surpasses anything else known to be currently available in the
Barr’s first project was to design a component for the equipment officials, prompted Nikita Khrushchev to arrange a visit to meet authority than any other American had ever wielded in Soviet mili- Soviet Union for process control automation.”
that tracked the Sputnik. the two foreigners. tary industry. Barr and Sarant’s most lasting physical legacy, beyond Zele-
In July 1959, a team led by Sarant and Barr created a pro- On May 4, 1962, Khrushchev toured Sarant and Barr’s labo- Sarant and Barr’s meteoric rise was largely due to Khrush- nograd, is the Uzel. The Soviet military liked to reuse hardware
totype of a new computer, which they dubbed the UM-1. The ratories, accompanied by a delegation that included the chief of the chev’s patronage, and when he was deposed in the winter of 1964 whenever possible to keep development costs down and to enhance
UM-1 achieved a number of Soviet firsts; among them, it was the Communist Party in Leningrad, the head of the Soviet Navy and they were forced out of Zelenograd. In typical Soviet fashion, Sa- reliability. When another generation of diesel subs was designed,
first Soviet computer to use transistors. In contrast to the room- other senior defense industry officials. Sarant told Khrushchev rant’s role in conceiving and designing Zelenograd, which rapidly which NATO calls Kilo class, it retained the Uzel; there is still a
sized monsters produced by other Soviet computer designers, the that the future of Soviet power lay not in its capacity to roll tons team of programmers in St. Petersburg working on Uzel software
upgrades.
NONPROFIT ORG
U.S. POSTAGE
PAID
1401 N Shoreline Blvd
MOUNTAIN VIE W, CA
Mountain View, CA 94043-1311 USA
PERMIT NO. 50