¶ … history of computers, while relatively brief in terms of years spanned, is incredibly complex and eventful. The technological advances have come at a blinding pace, from the original mainframes that weighed tons (literally!) to the tiny notebooks that weigh less than a gallon of milk today, just a half-century later. Five main generations have delineated the advancement of computers: the mainframe, minicomputers, personal computers, supercomputers, and finally the notebook computer.
The first of these categories is the mainframe, which originated in the 1950s. The UNIVAC, the first mainframe that was reproduced, ran off of vacuum tubes, cost over a million dollars, and was quite physically imposing. During these years mainframes filled entire rooms and were only within the price range of huge corporations or the government. In those days, the only computers were mainframes -- there was no other category of computers to compare. These central processing systems performed mainly huge data processing tasks, like tabulating census numbers or massive financial transaction monitoring. As smaller computers were introduced in the form of the "minicomputer," the functions of mainframes became more and more specialized; since mainframes offered the capability to run ("host") many different operations at the same time, they became the de facto server for operations that required simultaneous functions.
However, with the advent of minicomputers (which weren't so small themselves), the demand for mainframes dropped significantly. Most minicomputers were able to perform the same type of hosting operations for which mainframes were used at a lower cost and at similar or equal speeds. This drop in demand was so sharp, in fact, that most companies in the mainframe business were forced out, leaving IBM as the giant in the industry. IBM still controls over 90% of the mainframe business today, for many reasons due to this 1970s decline in demand and the failure of other companies to maintain their mainframe businesses.
IBM retained their mainframe platforms, and while mini (and later personal) computers became easier to utilize as servers, IBM developed mainframes into incredibly reliable processing systems. Currently, mainframes are used for very high-volume data processing tasks that cannot ordinarily be disrupted for things like routine maintenance or system outages, like online reservation systems that need to be accessible 24 hours a day as well as huge storage tasks related to their processing duties. The reliability of mainframes is now their most valuable asset, with maintenance and repairs able to be performed without any service outages by routing operations to another system. Mainframes have evolved from the only type of computer in existence to a specialized, efficient niche of the market.
When mainframes were introduced, they were simply known as "computers." There was no need to differentiate between different types of computers, since there was only one type of computer to identify. With the advent of a second type of processing system, the term "mainframe" came into use, while the new, smaller processing units were termed as "minicomputers." The first minicomputer debuted in 1964, and the category became a middle ground of processors between the powerful mainframes and the quickly-proliferating personal computers, which were more suited to one user.
Minicomputers could run multi-user operations that did not require all of the computing power of a mainframe. They were more cost-efficient for a smaller scale of businesses wanting to incorporate computing technology into their operations. Minicomputers are not often used today; they have been rendered nearly obsolete by more and more powerful microcomputers that can perform all of their server functions at a fraction of the cost and space. The increased effectivity of mainframes has also contributed to the decline of minicomputers; more affordable and efficient mainframes also contributed to this reduction in demand for minicomputers. Networking among microcomputer, or personal computer, systems also reduced the demand for the type of mid-size server capabilities that minicomputers provided.
The generation of computers that helped render the minicomputer almost obsolete is the personal, or microcomputer. This is the unit that almost every college...
Studies suggest that even "more "omniscient" technology is likely to be developed" in the near future (Lyon, 2002). Cookies were perhaps the first form of internet surveillance, developed in 1994 as a means for websites to track visitors logging in so they could provide more optimal service (Lyon, 2002). Now cookies have transformed the shape of communication and have further advanced the ability of criminals to survey individual user functions
computer programmers create programing languages, they must make use of data types to create a functional system. A number of different formats of data types exist for their use. Perhaps the most obvious is that of an alphanumeric string, or a string of letters and numbers like ab1cd1. "Alphanumeric is commonly used to help explain the availability of text that can be entered or used in a field such
Computer Hardware Industry: Marketing and Advertising Strategies Within this research paper, an overview will be provided of marketing and advertising strategies utilized within the computer hardware industry. For the purposes of accomplishing this aim, the strategies used by Gateway, Dell, and Hewlett Packard will be examined. As each company is analyzed, comparisons and contrasts will be made with strategies used by the competitors. Gateway According to Fikes (2003), Gateway Inc., once famous
Computer Science Fundamentals Too often the mechanistic are taken for granted in computer science. The technology has been around long enough now, that many take for granted the great powers that computers and computing technology has afforded modern man and his society. The fundamental characteristics of any successful endeavor should be investigated to help identify a pattern and produce learning and gather information. The purpose of this essay is identify and explain
Computer History Museum: A virtual visit Description of the event The Computer History Museum has both an online and a 'real world' incarnation. It is a physical warehouse of different types of computers, a virtual catalogue of computer history throughout the ages, and also provides information about specific topics pertinent to computer history, such as the history of video games. The Museum contains artifacts such as the first calculators, 'punch cards' and
Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now