Feeds

Mammoth computer found in closet in Australia

Boffins think we will see it browse again

  • alert
  • submit to reddit

Seven Steps to Software Security

Melbourne newspaper The Sunday Age is reporting that a computer weighing 2000 kilograms and an incredible 52 years old has been found in a dusty warehouse in Australia.

This means a working computer has been discovered that is even older than veteran Register staffer Mike Magee. And, according to the newspaper, boffins are racing to get the beast, called CSIRAC, back in action again. The newspaper says that CSIRAC, one of the oldest computer acronyms and one which people have completely forgotten the meaning of, is the only intact first generation machine in the world.*

The boffins are racing against time to re-boot the machine in time for an exhibition to be held in Melbourne next year, The Sunday Age reports.

But CSIRAC, like many now extinct creatures, was slow on its feet and small-brained, consuming 30 kilowatts an hour, and with a tiny brain with only 1024 bytes of memory. The mammoth covered 40 square metres and was noticeable for its huge cabling, technically known as tusks, which were what first alerted the boffins to its existence. It is believed that the entire race of first generation computers was completely wiped out by a meteor called Intel which laid waste both the mammoths and the smaller midis in the early 1980s.

The complete story from The Sunday Age can be found here. ®

See also

The guide to Register acronyms

* A reader writes: The meaning of the acronym has not completely disappeared, since according to this site. It was originally called the CSIR Mark 1, which stands for: "Council for Scientific and Industrial Research Mark 1". This was considered too bland and they creatively renamed it to CSIRAC, which stands for: "Council for Scientific and Industrial Research Automatic Computer".

Boost IT visibility and business value

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.