Feeds

What ever happened to storing pics with electron cannons?

Blue Blue's digital photo beam

  • alert
  • submit to reddit

Combat fraud and increase customer satisfaction

Electron cannon!

The photo-storage system had to overseen by at least one operator when in use for maintenance as well as supplying it with raw film, chemicals, and tender love and care. The operator had limited control over the system through an operator's panel composed of a power-on button, power-off button, and an emergency pull. Powering on the machine would start a program load routine that took about 30 to 40 minutes to complete (Windows Vista: eat your heart out). 1360 operators also had limited control over the machine using a printer/keyboard.

Plastic cells carrying raw film chips would be inserted into the system using a spacer box assembly and hopper that could hold up to 14 cells. Chemicals would be loaded into the system from two sets of three trays of developer, fix, and stop fluids contained in flexible, one-gallon polyethylene bags. The chemical supply was enough for about three to four hours of continuous operation.

A good bit of work for all that storage – but a considerable achievement in engineering. And who wouldn't want their data stored in a Rube Goldberg device? This system has some seriously heinous, yet undeniably spectacular features. More than enough to earn even a storage system a TOB salute.

The message reads, "Check roughing pump oil while vacuum is down."

Trained service personnel only

Thanks as always to the Computer History Museum in Mountain View, California for letting us covet their aging machinery. The IBM 1360 system you see here was donated to them by Lawrence Livermore National Lab by the way, the big softies. Homework on the IBM 1360 should include the reminiscing of John Fletcher, former physicist who worked with the system at Lawrence Livermore.

'Till our next bi-whenever romp with boxes of legends. ®

1Don't look here for answers. It was a rhetorical question.

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Microsoft's Nadella: SQL Server 2014 means we're all about data
Adds new big data tools in quest for 'ambient intelligence'
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.