Feeds

ARM creators Sophie Wilson and Steve Furber

Your phone, your tablet - their chip tech

High performance access to file storage

Wilson and Furber get to work

This incompatibility was a huge problem for The Computer Programme. The BBC decided it needed its own standard machine, to be called the BBC Micro.

BBC Micro

The Acorn Proton... er... the BBC Micro

The BBC put the contract out to tender. Acorn co-founder Chris Curry jumped in ahead of Sinclair, promising the BBC that Acorn would be able to demonstrate a machine closely following the required specifications. How soon? Oh, said Curry... by the following week.

It was the wildest of wild boasts. The Proton wasn't much more than a circuit diagram at this stage. And the BBC specs called for the 8-bit processor du jour, the Zilog Z80 - the Atom, like its predecessor, was built around the 6502.

Working flat-out, Wilson and the Atom team, now joined by Furber, “sort of got the system working" attached to a circuit emulator. In theory, this would enable it to demonstrate actual programs. In practice... nothing. With time running out, Hauser instructed the team to disconnect the machine from the emulator and try running it by itself.

Acorn's BBC Micro schematics

Inside the Beeb

"He was entirely correct," said Wilson later. "It didn't seem possible at the time, but the machine burst into life."

Proton awakes

At 7am on the morning the BBC was due to arrive, the raw hardware was fully functioning. But without an operating system, there was nothing to show. Working against the clock, with only two hours in hand, Wilson ported the operating system across and installed what was to become BBC Basic. Acorn nailed the contract.

Wilson's hand was on everything inside the BBC Micro, including what was for the punter its most obvious manifestation, BBC Basic, which Wilson would maintain, develop and rewrite over the course of the next decade and a half.

Steve Furber. Source: The Institution of Engineering and Technology

Steve Furber today
Source: The Institution of Engineering and Technology

And unlike the average head-down techie, Wilson took ownership of the whole BBC Micro project. “I was one of the people who wrote all the documentation, communicating with other people, negotiating specifications."

Wilson had learnt that the art of communication was a fundamental part of the technical skill mix... ®

Part two, in which Wilson and Furber accidentally create a desktop CPU
that consumes less than a tenth of a Watt
, tomorrow...

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.