Feeds

The BBC Micro turns 30

The 8-bit 1980s dream machine

High performance access to file storage

Corporation Street

Before the Atom had even been launched, executives at the BBC's education programming department, enthused by rival broadcaster ITV's 1979 series The Mighty Micro, developed a plan to help encourage ordinary Britons to learn to use computer technology.

The Mighty Micro

Instigator: Christopher Evans' 'revolutionary' book

The Mighty Micro, presented by physicist Dr Christoper Evans and based on his book of the same name, had forecast how computer technology would utterly change working practices and the economy in the near future. He'd seen how the computing scene had exploded in the US on the back of kit from the likes of Apple and Commodore, and how it had not merely appealed to enthusiasts, but had also begun to transform business.

In 1979, the BBC produced a three-part series, The Silicon Factor, to explore the social impact of the microchip revolution. In November of that year, the Corporation began preliminary work on a ten-part series, provisionally titled Hands on Micros and scheduled to be broadcast in October 1981. It would introduce viewers to the computer and help get them using one. It would also form the launch of what would become known as the BBC Computer Literacy Project (CLP), steered by The Silicon Factor Producer David Allen.

In March 1980, the BBC began a consultation process to shape the Computer Literacy Project. It discussed the scheme with the UK government's Department of Industry, the Department of Education and Science, the Manpower Services Commission, and other organisations. By happy chance, it learned that the DoI was planning to name 1982 the 'Year of Information Technology'.

BBC Literacy Project original review

Internal review: in 1983 BBC detailed the progress made by the Computer Literacy Project

It was decided that the Computer Literacy Project and the TV series that would launch it needed a machine which the public could buy and use to gain hands-on experience of what was being discussed in each episode. Only that way would the audience truly engage with the new technology and the goals of the CLP be realised. Around it would be assembled a full array of guides, adult-learning courses and software packages.

However, the BBC quickly realised that, with no standard platform available, particularly when it came to Basic, the lingua franca of home micros and the language the show would be using to present examples of programming, it would have to specify one itself. With currently available machines all sporting different dialects of Basic, it was felt that choosing one of them would hinder viewers who had bought a different machine.

The only option, then, was to define a standard, to specify a machine that would incorporate a Basic that would have a great deal of commonality with other dialects, but would be well structured to foster good programming practice. It would specify all the features a computer ought to possesses, even if those features – such as floppy disk and hard drive support, extended I/O options, and the ability to download programs over the air through the Teletext system – were absent from many current machines.

The BBC's Computer Programme

Geek chic circa 1982: Ian McNaught-Davis on The Computer Programme
Source: BBC

It became clear that to give this 'standard' some weight, it would need the BBC's clear stamp of approval – to be, in fact, the BBC Microcomputer. That, in turn, would necessitate the close involvement of BBC Engineering, the department charged with handling all of the Corporation's technical endeavours.

Building a new machine from scratch was impossible – it would take at least two years, more than the Computer Literacy Project schedule allowed. So the CLP team decided to approach the likes of Acorn and Science of Cambridge – soon to be renamed Sinclair Research. In all, the BBC met seven computer companies in the UK, six of whom were keen enough to detail how they would work with the BBC and the machine they would produce.

High performance access to file storage

Next page: NewBrain? Never

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.