Feeds

CCS to dish out Tony Sale award for computer restoration

Crypto-machine rebuilder honoured with new annual prize

Beginner's guide to SSL certificates

Renowned Colossus-rebuilder Tony Sale has inspired a new international award for computer conservation, which will be handed out for the first time this year.

Tony Sale

The Computer Conservation Society (CCS) has launched the award in memory of the man who led the project to rebuild the world's first electronic computer, the Colossus, used to break codes during World War II.

Rebuilding the Colossus was an extremely difficult undertaking because the team only had small fragments of information about the steam-punk machine to work with.

Sale was also co-founder of the National Museum of Computing and was part of the team to save Bletchley Park, the site where code-breakers worked during the war.

"When Tony Sale died unexpectedly last year, we felt compelled to celebrate his remarkable computer conservation achievements in some special way," David Hartley, member of the CCS Tony Sale Award committee, said in a canned statement.

"For more than two decades, Tony made a huge contribution in promoting the public understanding of our computer heritage and in showing that computer conservation is a stimulating voyage of discovery rather than a simple recreation of a machine."

The Tony Sale Award will go to a person or group that has "made an outstanding engineering achievement in computer conservation", the CCS said.

"In the hectic, fast-paced world of computing, valuable history simply evaporates," secretary of the CCS, Kevin Murrell, said in a canned statement. "As many computer conservation projects across the world have already discovered, there is lots to be learned in studying the development of hardware and software.

"Through the Tony Sale Award we want to hear of projects large and small that may reveal fascinating aspects of our developing subject."

Anyone from around the world who can show some IT conservation work, preferably in the last three years, which is on display or can be shown publicly, can be nominated before the closing date on 31 July. The trophy will then be presented in October. ®

Internet Security Threat Report 2014

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Apple spent just ONE DOLLAR beefing up the latest iPad Air 2
New iPads look a lot like the old one. There's a reason for that
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Microsoft fitness bands slapped on wrists: All YOUR HEALTH DATA are BELONG TO US
Wearable will deliver 'actionable insights for healthier living'
Caterham Seven 160 review: The Raspberry Pi of motoring
Back to driving's basics with a joyously legal high
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
Amazon hopes FIRE STICK will light up its video service
We do streaming video? It seems we do...
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.