Feeds

Bletchley Park opens computing museum

Blighty's cultural computing heritage safe at last

HP ProLiant Gen8: Integrated lifecycle automation

Bletchley Park, where code breaking machines were developed during the Second World War, is to be home to a national museum of computing backed by the British Computer Society and the Codes and Ciphers Heritage Trust.

The museum will be housed in Block H of Bletchley Park which was the world's first purpose-built servercomputer room and was home to the Colossus machine which helped break the Lorenz codes used by German High Command.

Star of the show will be a rebuilt Colossus Mk2 machine. It has taken 12 years to rebuild the machine and over 6,000 volunteer days. Much of the original documentation was deliberately destroyed in 1960 but much of the machine was built using standard Post Office exchange components which the team picked up as exchanges were converted to digital.

The museum will also have exhibits of mainframes, super computers and old personal computers restored with the help of the BCS's Computer Conservation Society.

Also on display will be an air traffic control station from West Drayton and an ICL 2900 and a Turing Bombe. Displays will focus on the development of computing since 1945.

There's more info here and the museum is looking for donations.®

Eight steps to building an HP BladeSystem

More from The Register

next story
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.