Feeds

DEKATRON reborn: Full details on World's Oldest Digital Computer

OK iPad kids, let's see how you do on paper tape

HP ProLiant Gen8: Integrated lifecycle automation

Storing information in an age when filling ram sockets was an entirely different business

The Dekatrons didn’t just count - they also stored data by acting as a volatile memory similar to RAM in today’s computers. This meant the machine could run unattended and results wouldn’t be lost until it was powered down.

The Dekatron has 828 Dekatron tubes. Also, there are 480 relays, 7,073 contacts or relay switches, 26-high-speed relays, 199 lamps, 18 switches, a 1.5 kilowatt power supply, thousands of connectors, some sheet-metal casing and a metal frame measuring 6m across, 2m high and 1m deep.

Kevin Murrell, who started restoring the beast in 2009, likened assembling the machine to raising the Mary Rose. For non-students of history, this warship was the pride of King Henry VIII’s fleet and sank in 1545. In 1982, the surviving part of its hull was delicately raised by crane from The Solent, near Plymouth, and placed in a climate-controlled museum.

Dekatron hole punch program, photo: Gavin Clarke

Old-skool program: how to build a sub-routine for the Dekatron

You’d think the TNMOC team that rebuilt the Dekatron had a relatively easy job: unlike the Mary Rose’s archaeologists, they weren’t labouring in freezing water, breathing bottled oxygen, and scrambling through zero visibility.

However, like the Mary Rose, the computer was in pieces.

Harwell ran the Dekatron from 1951 to 1957, and then gave it to the Wolverhampton and Staffordshire Technical College. It was renamed WITCH (Wolverhampton Instrument for Teaching Computation from Harwell) and used it for teaching before it was handed over to the Birmingham Museum of Science and Industry in 1973. This is where Murrell first encountered the machine. Years later, it was taken apart and put into boxes for storage at the Birmingham Collections Centre. The Dekatron moved to TNMOC in 2009.

Murrell had manuals to work from, but this was only partially helpful.

“We had all the components and various circuit diagrams,” Murrell said. “But the diagrams aren’t that helpful. We knew physically where the bits went, but a lot of wiring has suffered in storage, some tubes had failed and spare parts had to be sourced.”

Dekatron SEX circuit, photo: Gavin Clarke

The sexy insides of the Dekatron revealed - click to enlarge

Broken Dekatron-like valves could be sourced, unused, from Russia – they’d been made during the glory days of the Soviet Union. The relays, distractingly labelled with SEX and other terms, are the type used by the General Post Office (GPO) of the era, and were relatively easy to replace if broken. Other components were scrubbed clean of decades of oxides using brushes and file filters.

Some of the cabling had rusted and was replaced with modern white-coloured plastic-coated stock that's hidden around the back; also updated is the original power source, which Murrell called “impressively terrifying”.

Before Tuesday’s reboot, Murrell and TMOCH ran simple programs to test different parts of this 2.5-ton calculator. Their program calculated the squares of multiple lists of numbers.

Back at the dawn of the nuclear age, software for the Dekatron was designed using a pencil-drawn flowchart, and written down in longhand on foolscap sheets of lined paper. The source code was taken to a punch-tape machine and the instructions punched onto paper – one program could have up to six paper tapes, and lots of spools would need to be glued into a loop so that it ran continuously.

Data for the computer was also punched on paper tape. Results from the calculations were printed by a teleprinter and could be punched directly to a new paper tape - useful if the output was needed for a new calculation.

Today, the programs are written in longhand with the help of Microsoft Excel, but otherwise it’s business as usual. Programs are transferred to paper using a hole puncher on a table next to the Dekatron and the results are collected from a teleprinter on the opposite side of the machine.

Sixty years on, the Dekatron is ready for a new generation growing up in a world of iPad apps and Visual Studio. Now they can try sailing the Mary Rose of computers - let's see how far they can get. ®

Reducing security risks from open source software

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.