Feeds

ARM creators Sophie Wilson and Steve Furber

Your phone, your tablet - their chip tech

5 things you didn’t know about cloud backup

Unsung Heroes of Tech Back in the late 1970s you wouldn't have guessed that this shy young Cambridge maths student named Wilson would be the seed for what has now become the hottest-selling microprocessor in the world.

Ninety-five per cent of today's smartphones are built around an ARM processor. The ARM began with Wilson.

Sophie Wilson. Sourc: Broadcom

Sophie Wilson today
Source: Broadcom

Today, she's Sophie Wilson, one of the most highly respected names in microprocessor electronics. In 1978, Roger Wilson was a quietly-spoken, long-haired Maths and Computing undergraduate whose only commercial experience to date had been to build an electronic device for feeding cows.

Made for a firm in Harrogate, the cow-feeder had been based on the MOS 6502, a game-changing low-cost US CPU elegantly designed by Chuck Peddle and Bill Mensch, a pair soon to become legendary as the creators of the Vic-20.

At a third of the price of equivalent processors, the 6502 was spawning a new generation of cheap personal computers in the States, and Wilson was already working on designing one too. However, the initial approach made to Wilson by Hermann Hauser, a 28-year-old Cambridge-educated Austrian physics graduate, had nothing to do with computers.

Kenneth Baker and Roger Wilson

Wilson and minister Kenneth Baker at the BBC Micro launch in 1981

Hauser’s new company, CPU, had landed itself a consultancy to a manufacturer of fruit machines that were replacing elaborate relays with electronics. There was a serious problem: some rogue genius had discovered that the spark emitted by the new cheap, disposable piezo-electric cigarette lighters was, at 1KV, powerful enough to persuade the elecronic one-armed bandits to dish out their winnings.

From little Acorns…

Young Wilson designed a fix that used a wide-band radio receiver to detect the EMP and halt any payout. And then Wilson and Hauser began talking personal computers. Hauser challenged Wilson to design and deliver a working model by the end of the Summer holiday. Wilson won the challenge.

In March 1979, Hauser relaunched his company as Acorn Computers, offering as its first product the Wilson-designed Acorn System One. It was built, like the cow-feeder, around the 6502, had 512 bytes of Ram, and was yours by mail order for 70 quid.

Acorn Series 1

Acorn's System One
Source: Chris's Acorns

Wilson had graduated by now and was taken on by Hauser as lead designer. The pay was peanuts, but Hauser played the "what an opportunity" card, and Wilson snapped up the chance to make affordable computers a reality.

The essential guide to IT transformation

More from The Register

next story
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
Samsung Gear S: Quick, LAUNCH IT – before Apple straps on iWatch
Full specs for wrist-mounted device here ... but who'll buy it?
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Now that's FIRE WIRE: HP recalls 6 MILLION burn-risk laptop cables
Right in the middle of Burning Mains Man week
HUGE iPAD? Maybe. HUGE ADVERTS? That's for SURE
Noo! Hand not big enough! Don't look at meee!
AMD unveils 'single purpose' graphics card for PC gamers and NO ONE else
Chip maker claims the Radeon R9 285 is 'best in its class'
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.