Feeds

Come on, Sir Tim!

Celebrating Web 2(no point)0

Providing a secure and efficient Helpdesk

Stob It is twenty years since Tim Berners-Lee, then a humble techie at CERN, sent a memorandum to his manager entitled Information Management: a Proposal.

The Register is proud, on this important anniversary, to be republishing that historic document for the first time, so that we can all reflect properly on Sir Tim's achievement, and feel retrospectively superior to him for the wretched syntax he devised to do HTML tables.

By the way, don't be fooled by any transparent forgeries you may find knocking around the web, this is the real dope. Ho yuss.


Room 320
C-Block

16th March 1989

Dear Mike,

I have been thinking about what we said down Le canard et le chien et la particule élémentaire théorique the other night. Now that I have had time to turn it over in my mind, I understand what you were getting at, and can see that it really boils down to a communications problem.

But I think I now have a solution. A solution which, like all really great ideas (if I may be pardoned for saying so - I find myself with enormous confidence in this one) has a wonderful simplicity and symmetry at its heart.

This solution that will not only impact life in our lab, but may in the fullness of time bring great contentment to many more souls in this little world of ours.

The thing is, Jacques is really going to come to terms with the fact that, yes, sometimes it IS going to be his turn to get the coffee in. He is a mere mortal, like the rest of us. He needs to come to terms with this fact.

That bridgehead achieved, I'm pretty sure Paulette won't be permanently wound up and so not go off on one every time Bertl uses her VAX terminal, which in turn will allow Torben the time to browse the experiment usage log to his heart's content instead of monopolising it whenever people want to get on. And all will be sweetness and photons in our corridor.

So would you like me to have a word in Jacques' coquille-comme? Telling him to stop being such a prat is something that not only would useful to my long term management ambitions, but also would afford me considerable personal satisfaction.

What do you say, chief? I'll be in later - we can talk about it then, if you like.

Regards

Tim

PS: On a less serious note, do you remember that time when the LEP team snagged our Mac II? And then tried to give us back that Swiss government built PC/AT clone that made a noise like a wounded hairdryer and a VDU so faint that you had to turn out all the lights to see if it was on?

Well now those wretched ISOLDE people are trying to grab our NeXT box, the cheeky monkeys. They say they want it for doing 'complex calculations and graphical simulations that animate in real time'. Yeah, right. Not because its black finish matches the Linac2 colour scheme, then.

And you know what they plan to give us back?

Only a bloody AMSTRAD!

It would be funny, if it weren't tragic.

Fear not. I have a wizard scam to out-manoeuvre the rascals. To put them off the scent, we need to come up with some high profile 'application' for the NeXT, instead of leaving it there on the shelf, switched off. Preferably something that has some pretence of being trans-departmental.

I've devised a doozy.

You will remember ages ago I knocked out a little app called Enquire on the Vax? It works quite well for organising stuff, so naturally the [nationality redacted] refuse to use it.

My idea is:

  • Glue a few NeXT friendly graphics on the front of Enquire,
  • Sprinkle a few software marketing terms ('hyper-' this and 'turbo-' that) to confuse the forces of darkness such as the Director and his bunch of admin zombies,
  • Recode some of it in Objective C so that nobody can argue about which platform it runs on,
  • Bung in the Ops manuals,
  • Bung in the Unix man text - oops, I mean 'hyper-text',
  • Push out the whole lot as a 'Turbo Universal Reference Document System' (TURDS for short - this part might need some more work) for the whole of the CERN network.

Neat, eh? No way is ISOLDE going to be able to touch our NeXT when she is running THAT beauty.

(By the way, have you seen Objective C? It's a scream. It's like the C language, into which somebody has melted half a pint of Smalltalk. You can bet your bottom dollar that THAT is not going to be around in 20 year's time. By then, of course, we will all be coding in Occam.)

Internet Security Threat Report 2014

More from The Register

next story
Microsoft on the Threshold of a new name for Windows next week
Rebranded OS reportedly set to be flung open by Redmond
'In... 15 feet... you will be HIT BY A TRAIN' Google patents the SPLAT-NAV
Alert system tips oblivious phone junkies to oncoming traffic
Apple: SO sorry for the iOS 8.0.1 UPDATE BUNGLE HORROR
Apple kills 'upgrade'. Hey, Microsoft. You sure you want to be like these guys?
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
ARM gives Internet of Things a piece of its mind – the Cortex-M7
32-bit core packs some DSP for VIP IoT CPU LOL
Lotus Notes inventor Ozzie invents app to talk to people on your phone
Imagine that. Startup floats with voice collab app for Win iPhone
'Google is NOT the gatekeeper to the web, as some claim'
Plus: 'Pretty sure iOS 8.0.2 will just turn the iPhone into a fax machine'
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.