Feeds

Usenet creator dead

RIP Jim Ellis

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

One of the two men behind Usenet, Jim Ellis, has died aged 45. He died at his home in Pennsylvania yesterday morning after losing his battle with non-Hodgkins lymphoma.

Jim, together with fellow Duke University graduate Tom Truscott, came up with concept of Usenet - basically linking two computers together to share information - in 1979, predating the Web by 10 years. Steve Bellovin then wrote the first program, with Steve Daniel contributing to the first widely used version.

In 1980, it consisted of just two sites - one at Duke University and another in the University of North Carolina. However it became extremely popular very quickly as a means of sharing information across the globe and before the arrival of the Web was the largest decentralised store of information ever known.

In 1993, it had 1,200 newsgroups covering every imaginable topic from in-depth techie articles to home-spun philosophy. It also created the culture of flames - abusive emails. By 1999, the number of groups had grown to 37,000.

Jim and Tom Truscott initially came up with the idea of Usenet based on their knowledge of ARPANET but wanted a single program that could allow file sharing for universities outside the DARPA R&D organisation.

They called a meeting to thrash out the idea which Steve Bellovin attended. Steve then wrote the first version in Unix Bourne shell. It was simple but effective - it periodically checked the "last saved" time-stamp of each file in a certain directory, and then sent any new updated files to another computer over a modem link.

The program was then rewritten - with Steve Daniel's input - and given away free. It has since been rewritten twice - once in 1982 and again in 1989, getting more efficient each time. Despite its enormous success, none of the original creators ever made a penny out of Usenet.

Jim Ellis was a key pioneer of the electronic age and has been rewarded for his contribution numerous times through awards. In 1993, he shared the bill with Vinton Cerf, Ward Christensen, Dave Hughes and Paul Baran at the Electronic Frontier Foundation's Pioneer Awards. In 1995 he was given the Usenix Lifetime Achievement Award.

After leaving North Carolina, he worked for the Super Computing Center in Pittsburgh and then joined Sun, working from his home. His wife Carolyn said of him yesterday: "He had a good wit. He loved bridge. He loved his family of course. He was not afraid of his impending death."

Rest in peace Jim Ellis. ®

Security for virtualized datacentres

More from The Register

next story
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
4chan outraged by Emma Watson nudie photo leak SCAM
In the immortal words of Shaggy, it wasn't me us ... amirite?
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.