Techrecipe

Codes that changed the world that shaped the Internet

The Internet is now an indispensable object in human life. What kind of code has changed the world among the technologies that shaped the Internet?

First, the 1725 binary punch card. Binary programming began long before the advent of modern computers. In 1725, Basile Bouchon, who worked in Lyon, France, punched a hole in the paper and squeezed a way to control the machine. A part with a hole is 1, and a part without a hole is 0. This binary number was used to control the loom. Since the concept of controlling a machine with 0s and 1s is not different from the basics of modern codes, the punched card born in 1725 when computers did not exist can be said to be the first code.

Next is 1948. Von Neumann, well known as one of the world’s first computer programmers, and Nicholas Metropolis, a researcher at the Los Alamos National Institute, used ENIAC to run modern code for the first time. The first code was hundreds of numerical instructions executed in read-only memory. Programming said that iteratively mapped the probability distributions used in the atomic bomb design simulation using the Monte Carlo method.

Next, Grace Hopper, known as the creator of the 1952 programming language COBOL, was one of the earliest computer programming characters. She said she aimed to make programming easier to understand in human language from the experience of seeing her military sergeant having difficulty understanding binary code when enlisted in the military as a naval reserve during World War II.

Hopper’s idea was the subject of ridicule for some, but until the early 1950s he devised a compiler. The first compiler was to convert code that humans could understand in language into a set of instructions that a computer could directly process.

Later, Hopper and his colleagues developed the world’s first data processing programming language, FLOW-MATIC, with a close to English notation. Hopper’s compiler allows computers to process words.

In late 1961, MIT students were able to use the PDP-1. The PDP-1, which was a cutting-edge computer in a non-military computer at the time, was the highest price that sold for $120,000. The word length was 18 bits, and the standard main memory was a 4K word, so it was a computer that could expand up to 64K words, that is, 144 KB with a capacity equivalent to 9 KB.

A group of students creates a game called Space War, in which two players control a spaceship for five months using paper tape for storage for programming. Space War is distributed by DEC along with the PDP-1 mounted in the core memory, rapidly spreading in the early hacker community, and has a great influence on game developers. Today, you can still enjoy Space War with an emulator, and there are also regular demonstrations at the PDP-1 displayed in the Computer History Museum.

Next, in 1961, an MIT hacker developed a time-sharing system, a system that allows multiple users to log into the same computer at the same time. And in 1965, a coder created a command system capable of sending and receiving digital documents in a way that allows users using a time-sharing system to communicate with each other.

WHENEVER A(1).E.FENCE.OR.A(2).E.FENCE.OR.A(3).E.FENCE

PRFULL.($’R’1INSTRUCTIONS:$)

PRFULL.($ ‘4MAIL NAME1 NAME2 PROB1 PROG1 PROB2 PROG2 …$)

PRFULL.($ WHERE’=NAME1 NAME2’= IS THE FILE TO BE MAILED,$)

PRFULL.($ AND’=PROBN PROGN’= ARE DIRECTORIES TO WHICH ‘8$,

1 $IT IS TO BE SENT.’B$)

CHNCOM.(0)

END OF CONDITIONAL

Next, the Apollo 11, which succeeded in landing the first moon in mankind, was equipped with a computer used to automatically control the entire navigation function of the Apollo spacecraft called the Apollo guidance computer AGC, and to check and correct flight information. AGC requires operation in limited power and storage space, so it was always necessary to focus on the most important tasks. The team that developed the AGC software writes the code (BAILOUT) considering the possibility of an unplanned event. This is to reserve non-critical data and work so that only critical data and hull work can be retained when AGC is exposed to space shortage or overflow.

When the lunar landing ship Eagle descended towards the moon, the Eagle’s AGC sounded the 1202 alarm, which is a malfunction. The reason for this alarm was not immediately recognized by Neil Armstrong and others, but the computer expert in mission control understood that the code set by AGC (BAILOUT) was working normally. In other words, there was no problem with the moon descent because it canceled the low-priority work and resumed work such as important hull control.

POODOO INHINT

CA Q

TS ALMCADR

TC BANKCALL

CADR VAC5STOR # STORE ERASABLES FOR DEBUGGING PURPOSES.

INDEX ALMCADR

CAF 0

ABORT2 TC BORTENT

OCT77770 OCT 77770 # DONT MOVE

CA V37FLBIT # IS AVERAGE G ON

MASK FLAGWRD7

CCS A

TC WHIMPER -1 # YES. DONT DO POODOO. DO BAILOUT.

TC DOWNFLAG

ADRES STATEFLG

TC DOWNFLAG

ADRES REINTFLG

TC DOWNFLAG

ADRES NODOFLAG

TC BANKCALL

CADR MR.KLEAN

TC WHIMPER

The first thing I did when learning a new programming language was to display the phrase’Hello, world!’ on my computer. This phrase was written in a Programming in CA Tutorial published by Bell Labs in 1974, but it was also written in other textbooks previously written in 1972.

main() {printf(“hello, worldn”); }

In 1988, 23-year-old American calculator scientist Robert T Morris developed the world’s first malware called the Morris worm. This worm was the first attack that appeared on the Internet, and was used to attack computers connected to the Internet, causing a lot of damage. The New York Times is said to have used the word Internet on paper for the first time at this time. Even people who were familiar with programming at the time were surprised by the spread of the Morris worm. Although there was no intention of attacking with the Morris worm, he was also recorded as the first person to be prosecuted under the World’s First Computer Fraud and Abuse Act. After three years of probation lead, Morris became co-founder of Y Combinator and a professor in computer science at MIT.

Next, in the 1990s. A type of DoS attack performed on a computer system is a fork. Among them, the following code is famous.

: () {: | : &}; :

Execution of this code requires certain conditions, such as using batch, but when executed, the computer consumes all available memory and cannot stop working until the terminal crashes. The code is very simple, but the risk is high. However, more than that, the use of colons in characteristic functions. Most functions have the familiar names of’Print’ and’isThisEmailValid’, but there is no rule to do so. In most computing languages, colons cannot be used in function names, but the fact that they can be used in batches is known to have been an opportunity to create a vicious virus that works with a single line.

Next, Tim Berners Lee, who invented the World Wide Web (W3) in 1990 and implemented the hypertext system, creates hyperlinks from hypertext with a link function that combines multiple documents.

techrecipe

The hyperlinks created by Tim Berners-Lee are the basis of all the buttons and links currently on the Internet. Hyperlinks are a tool that has changed the world to access everything.

In 1992, the Joint Photographic Experts Group released JPEG as a standard specification for compressing image files. Other data compression formats were possible at the time, but one of the reasons JPEG became the world standard format was due to royalties. In addition, JPEG employs a lossless compression method in the process of removing image sides that cannot be detected by the human eye. Since then, it has had a great influence on data compression formats of lossy compression methods such as MP3.

NCSA Mosaic is a web browser launched in 1993 and is software developed by NCSA, the National Institute of Supercomputer Application. Until the advent of Mosaic, browsers had limitations, such as when they could render unfriendly text, images could not be viewed except at different latitudes. Mosaic, which was born in the midst of this, first realized the basics of today’s web browsers where images and texts can be viewed in one window. By allowing images and texts to be displayed side by side on the same screen, Internet content became familiar like magazines and newspapers, and it was an opportunity to attract many users.

It was in the mid-1990s that pop-up advertisements that were automatically displayed on top of certain web pages were born. Here, pop-up advertisements explosively spread to the Internet. You can put your favorite content on a free homepage, but if you want to keep a page like this, you need to show ads and monetize it. However, advertisers come up with the idea of separating ads from web content because they believe that visitors to the page on which they display ads always prefer ads. This is a pop-up ad.

Pop-up advertisements were intended to display content and advertisements separately, but when the page is displayed, an advertisement window is displayed at the front of the screen.

Next is 1996. Google is using page rank as an algorithm that determines the importance of web pages in search engines. Previously, information was organized according to whether the search term matches the word in the document, but Google PageRank is an algorithm that displays the page rank according to the number of pages linked online.

Next is the roomba guidance system in 2002. Roomba appeared in 2002. It may not have been a smart vacuum cleaner at the time of its appearance, but it is a high-performance robot vacuum cleaner at the moment. Roomba developer iRobot did not develop the first robot cleaner, but Roomba was the first robot cleaner to have a guide system. This can be said to have led the robot cleaner revolution.

(define-behavior (bounce

:start-when (or (bump?)

bounce-trigger? )

:abort-when (bump-edge?)

:onetime? t

)

)

Next is Bitcoin in 2008. It is Bitcoin that made the word cryptocurrency explosively popular. Bitcoin originated from a white paper released in 2008 by developer Satoshi Nakamoto. Bitcoin contains code to infinitely reduce the likelihood of an attacker hijacking the Bitcoin blockchain. This code gave the world credible convincing even in a system where bitcoin was made for untrustworthy people, and opened the future of 2,777 different cryptocurrencies.

In 2009, Facebook implemented a like button. Facebook assumes that users don’t have the time to comment on a friend’s post, and creates a Like button with a simpler and easier way to express the content of the post. The Like button allows users around the world to share more information, and it is said that the Like button was pressed more than a trillion times by 2012. The like button is implemented with the code below.

{“__typename”:”PageLikeAction”,”action_type”:”LIKE”,”label”:{“text”:”Like”}

Related information can be found here .

lswcap

lswcap

Through the monthly AHC PC and HowPC magazine era, he has watched 'technology age' in online IT media such as ZDNet, electronic newspaper Internet manager, editor of Consumer Journal Ivers, TechHolic publisher, and editor of Venture Square. I am curious about this market that is still full of vitality.

Add comment

Follow us

Don't be shy, get in touch. We love meeting interesting people and making new friends.

Most discussed