Feeds

Come on, Sir Tim!

Celebrating Web 2(no point)0

Combat fraud and increase customer satisfaction

Stob It is twenty years since Tim Berners-Lee, then a humble techie at CERN, sent a memorandum to his manager entitled Information Management: a Proposal.

The Register is proud, on this important anniversary, to be republishing that historic document for the first time, so that we can all reflect properly on Sir Tim's achievement, and feel retrospectively superior to him for the wretched syntax he devised to do HTML tables.

By the way, don't be fooled by any transparent forgeries you may find knocking around the web, this is the real dope. Ho yuss.


Room 320
C-Block

16th March 1989

Dear Mike,

I have been thinking about what we said down Le canard et le chien et la particule élémentaire théorique the other night. Now that I have had time to turn it over in my mind, I understand what you were getting at, and can see that it really boils down to a communications problem.

But I think I now have a solution. A solution which, like all really great ideas (if I may be pardoned for saying so - I find myself with enormous confidence in this one) has a wonderful simplicity and symmetry at its heart.

This solution that will not only impact life in our lab, but may in the fullness of time bring great contentment to many more souls in this little world of ours.

The thing is, Jacques is really going to come to terms with the fact that, yes, sometimes it IS going to be his turn to get the coffee in. He is a mere mortal, like the rest of us. He needs to come to terms with this fact.

That bridgehead achieved, I'm pretty sure Paulette won't be permanently wound up and so not go off on one every time Bertl uses her VAX terminal, which in turn will allow Torben the time to browse the experiment usage log to his heart's content instead of monopolising it whenever people want to get on. And all will be sweetness and photons in our corridor.

So would you like me to have a word in Jacques' coquille-comme? Telling him to stop being such a prat is something that not only would useful to my long term management ambitions, but also would afford me considerable personal satisfaction.

What do you say, chief? I'll be in later - we can talk about it then, if you like.

Regards

Tim

PS: On a less serious note, do you remember that time when the LEP team snagged our Mac II? And then tried to give us back that Swiss government built PC/AT clone that made a noise like a wounded hairdryer and a VDU so faint that you had to turn out all the lights to see if it was on?

Well now those wretched ISOLDE people are trying to grab our NeXT box, the cheeky monkeys. They say they want it for doing 'complex calculations and graphical simulations that animate in real time'. Yeah, right. Not because its black finish matches the Linac2 colour scheme, then.

And you know what they plan to give us back?

Only a bloody AMSTRAD!

It would be funny, if it weren't tragic.

Fear not. I have a wizard scam to out-manoeuvre the rascals. To put them off the scent, we need to come up with some high profile 'application' for the NeXT, instead of leaving it there on the shelf, switched off. Preferably something that has some pretence of being trans-departmental.

I've devised a doozy.

You will remember ages ago I knocked out a little app called Enquire on the Vax? It works quite well for organising stuff, so naturally the [nationality redacted] refuse to use it.

My idea is:

  • Glue a few NeXT friendly graphics on the front of Enquire,
  • Sprinkle a few software marketing terms ('hyper-' this and 'turbo-' that) to confuse the forces of darkness such as the Director and his bunch of admin zombies,
  • Recode some of it in Objective C so that nobody can argue about which platform it runs on,
  • Bung in the Ops manuals,
  • Bung in the Unix man text - oops, I mean 'hyper-text',
  • Push out the whole lot as a 'Turbo Universal Reference Document System' (TURDS for short - this part might need some more work) for the whole of the CERN network.

Neat, eh? No way is ISOLDE going to be able to touch our NeXT when she is running THAT beauty.

(By the way, have you seen Objective C? It's a scream. It's like the C language, into which somebody has melted half a pint of Smalltalk. You can bet your bottom dollar that THAT is not going to be around in 20 year's time. By then, of course, we will all be coding in Occam.)

Combat fraud and increase customer satisfaction

More from The Register

next story
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
OpenBSD founder wants to bin buggy OpenSSL library, launches fork
One Heartbleed vuln was too many for Theo de Raadt
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Got Windows 8.1 Update yet? Get ready for YET ANOTHER ONE – rumor
Leaker claims big release due this fall as Microsoft herds us into the CLOUD
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
Patch iOS, OS X now: PDFs, JPEGs, URLs, web pages can pwn your kit
Plus: iThings and desktops at risk of NEW SSL attack flaw
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Apple inaugurates free OS X beta program for world+dog
Prerelease software now open to anyone, not just developers – as long as you keep quiet
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.