Feeds

How a pair of American spies created the Soviet Silicon Valley

Espionage, affairs and PCs: Ahh, Zelenograd

Securing Web Applications Made Simple and Scalable

Radio Reg Few stories in computing history come close to matching the tale of Zelenograd – the Soviet Union's attempt at creating something along the lines of Silicon Valley.

Episode 15 of Semi-Coherent Computing recounts the tale of Zelenograd's founding along with the stories of the two US-born Russian spies behind the city. No one knows this history better than Steven Usdin, the author of Engineering Communism: How Two Americans Spied for Stalin and Founded the Soviet Silicon Valley, who was kind enough to appear on the show. (You'll find Usdin's web site here and can buy the book on Amazon or from Yale Press here.)

I first saw Usdin talk about Zelenograd at a Computer History Museum event and was beyond enthralled by the story. It involves two US communist engineers who worked on top secret projects for US military contractors during World War II and funneled their technology secrets over to the Soviets. Eventually, these lads made their way to the Soviet Union where they started work on, among other things, the first Soviet made PC and even a desktop fab for producing chips.

Along the way, the spies tear apart families and then reunite them. They enjoy Khrushchev's blessing and then struggle to deal with Brezhnev's fury. They make a mockery of the FBI and parts of the Soviet way of life.

Amazing stuff.

This show is just the first part of my interview with Usdin. We'll be running the second part next week.

Sincere apologies to everyone for being so slack getting up a fresh program. I vow to be more consistent in the months ahead.

Enjoy.

Semi-Coherent Computing - Episode 15

Open source types can get Ogged and Vorbed here, those plagued by low-bandwidth can catch a smaller, crappier quality show here or a monster-sized show here.

You can also grab the show off iTunes here or subscribe to the show via this feed.

Thanks for your ears. ®

Application security programs and practises

More from The Register

next story
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Microsoft unsheathes cheap Android-killer: Behold, the Lumia 530
Say it with us: I'm King of the Landfill-ill-ill-ill
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Seventh-gen SPARC silicon will accelerate Oracle databases
Uncle Larry's mutually-optimised stack to become clearer in August
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.