Feeds

Usenet creator dead

RIP Jim Ellis

  • alert
  • submit to reddit

The Power of One Infographic

One of the two men behind Usenet, Jim Ellis, has died aged 45. He died at his home in Pennsylvania yesterday morning after losing his battle with non-Hodgkins lymphoma.

Jim, together with fellow Duke University graduate Tom Truscott, came up with concept of Usenet - basically linking two computers together to share information - in 1979, predating the Web by 10 years. Steve Bellovin then wrote the first program, with Steve Daniel contributing to the first widely used version.

In 1980, it consisted of just two sites - one at Duke University and another in the University of North Carolina. However it became extremely popular very quickly as a means of sharing information across the globe and before the arrival of the Web was the largest decentralised store of information ever known.

In 1993, it had 1,200 newsgroups covering every imaginable topic from in-depth techie articles to home-spun philosophy. It also created the culture of flames - abusive emails. By 1999, the number of groups had grown to 37,000.

Jim and Tom Truscott initially came up with the idea of Usenet based on their knowledge of ARPANET but wanted a single program that could allow file sharing for universities outside the DARPA R&D organisation.

They called a meeting to thrash out the idea which Steve Bellovin attended. Steve then wrote the first version in Unix Bourne shell. It was simple but effective - it periodically checked the "last saved" time-stamp of each file in a certain directory, and then sent any new updated files to another computer over a modem link.

The program was then rewritten - with Steve Daniel's input - and given away free. It has since been rewritten twice - once in 1982 and again in 1989, getting more efficient each time. Despite its enormous success, none of the original creators ever made a penny out of Usenet.

Jim Ellis was a key pioneer of the electronic age and has been rewarded for his contribution numerous times through awards. In 1993, he shared the bill with Vinton Cerf, Ward Christensen, Dave Hughes and Paul Baran at the Electronic Frontier Foundation's Pioneer Awards. In 1995 he was given the Usenix Lifetime Achievement Award.

After leaving North Carolina, he worked for the Super Computing Center in Pittsburgh and then joined Sun, working from his home. His wife Carolyn said of him yesterday: "He had a good wit. He loved bridge. He loved his family of course. He was not afraid of his impending death."

Rest in peace Jim Ellis. ®

Mobile application security vulnerability report

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.