Feeds

Remembering the CDC 6600

The Craying Game

Top three mobile application threats

This Old Box You smell that?

That's the tangy aroma of aging silicon, cigarettes and loneliness.

This week we're traveling back to the 1960s to look at one of the crown jewels of the high performance computing world. You'll notice that — Hey! Don't touch that. Has Jean Claude Van Damme's Time Cop taught you nothing about tooling with the past?!

This old box logo

That's better. Yes, this column isn't just about small computers. Big girls need loving too.

Control Data Corporation 6600

Released: 1964
Price: ~$6m-$10m
OS: COS, SCOPE, MACE, KRONOS
Processor: One 60-bit CPU, ten shared-logic 12-bit peripheral I/O processors
Memory: 128K 60-bit words
Display: Printer, plotter and dual video display console
Storage: 2MB extended core storage, magnetic disk, magnetic drum

IBM internal memo
Thomas Watson Jr., IBM CEO, August 1963:

"Last week, Control Data ... announced the 6600 system. I understand that in the laboratory developing the system there are only 34 people including the janitor. Of these, 14 are engineers and 4 are programmers... Contrasting this modest effort with our vast development activities, I fail to understand why we have lost our industry leadership position by letting someone else offer the world's most powerful computer."

By 1962, computer design genius Seymour Cray was fed up with overbearing management at Control Data Corporation. He approached CDC's CEO, William Norris and gave an ultimatum. Things would have to change or he would leave. Not wanting to lose a commodity like Cray, the company gave him permission to set up a new CDC laboratory at the location of his choice.

Cray took a small team to his home town of Chippewa Falls, Wisconsin, where he continued his ongoing work to create the world's largest computer. With his closest lieutenants Jim Thornton and Les Davis, Cray constructed a computational masterwork consisting of 400,000 transistors, over 100 miles of wiring (done by hand), Freon refrigerant cooling and the fastest clock speed for its day (100 nanoseconds). With more than 100 of the systems sold over the machine's lifetime, the 6600 is considered the first ever successful supercomputer design. It was the fastest in the world from its creation until 1969 (when the CDC 7600 was introduced).

A system that needs its own address

Cut the red wire to disarm. No, the other red wire.

A 6600 setup from a CDC information pamphlet

Typical machines of the time used a single CPU to handle the entire system. The 6600 was able to out pace the competition by using a central processor assigned to math and logic only, which was supported by ten separate speedy peripheral processors.

The machine was built in a plus sign-shaped design, with a heat exchanger and cooling unit at the end of each appendage. Two arms of the central processor contain the central memory, one arm housed the CPU logic and the fourth contained the memory and logic for the peripheral processors.

Additional equipment included tape and disk units, high-speed card readers (about 1000 cards/minute) and a card punch.

The operator's console featured two large circular "scopes," that offered graphical insight on the operating system and data being processed. (It also has the distinct quality of making a person want to shout, "Welcome to the world of tomorrow!!")

I see you.

Where's the "any" key?

The CDC 6600 had 60-bit words of memory and a large disk storage device with six high-speed drums between central core storage and magnetic tapes.

It even came with a fabulous orange vinyl chair. Vendors knew how to treat a customer back then.

The 6600 solidified Cray's career and would propel him to near mythical status in the supercomputing community. Cray would later leave CDC to form his own company — but that's a story we'll tackle later on.

This cubicle is a little snug.

As always, thanks to the Computer History Museum in Mountain View, California for not noticing us balancing precariously on the rails to get a better shot.

What do you think, sirs? ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.