Gesamtlänge aller Episoden: 5 days 8 hours 15 minutes
Even after nearly 50 years C remains a force in the programming world. Anytime you brows the web, or even log into a computer, C is somewhere in the background. This episode I wrap up my series on C by looking at it's early development and spread. We...
C is easily one of the most influential programming languages in the world, and it's also one of the most popular languages in the world. Even after close to 50 years it remains in widespread and sustained use. In this series we are going to look at...
One of the great things about the modern Internet is the wide range of services and content available on it. You have news, email, games, even podcasts. And in each category you have a wide range of choices. This wide diversity makes the Internet so...
Released in August 1981, the IBM PC is perhaps one of the most important computers in history. It originated the basic architecture computers still use today, it flung the doors open to a thriving clone market, and created an ad-hoc set of standards....
The Intel 8086 may be the most important processor ever made. It's descendants are central to modern computing, while retaining an absurd level of backwards compatibility. For such an important chip it had an unexpected beginning. The 8086 was meant...
Saga II was a program developed in 1960 that automatically wrote screenplays for TV westerns. Outwardly it looks like artificial intelligence, but that's not entirely accurate. Saga has much more in common with CNC software than AI. This episode we...
Sometimes an idea is so good it keeps showing up. Electronic ping-pong games are one of those ideas. The game was independently invented at least twice, in 1958 and then in 1966. But, here's the thing, PONG didn't come around until the 70s. What were...
Lars Brinkhoff has been spearheading the effort to keep the incompatible Timesharing System alive. Today we sit down to talk about the overall ITS restoration project, software preservation, and how emulation can help save the past. You can find the...
Modern operating systems adhere to a pretty rigid formula. They all have users with password-protected accounts and secure files. They all have restrictions to keep programs from breaking stuff. That design has been common for a long time, but that...
Hacker hasn't always been used to describe dangerous computer experts will ill intent. More accurately it should be sued to describe those enamored with computers, programming, and trying to push machines to do interesting things. The values, ethics,...