Feeds

Bletchley Park boffins start trailblazer EDSAC computer rebuild

First replica parts go into production

Security for virtualized datacentres

Physical production of a replica of EDSAC, aka the Electronic Delay Storage Automatic Calculator, has at last begun at The National Museum of Computing, located at World War II crypto centre Bletchley Park. EDSAC is an early computer originally put together at Cambridge University in the late 1940s.

The initial work on the replica focused on punching out 20 chassis units based on the three that survive from the original EDSAC’s 140, each home to a selection of the computer’s 3,000-odd thermionic valves. These helped it process up to 650 instructions per second, not many by today’s standards, but two orders of magnitude more than the electromechanical computers that preceded it.

“Over the past year we have researched EDSAC’s design and original construction, so this week marks the exciting transition from research to production,” said Andrew Herbert, the EDSAC reconstruction project lead. “With this important step accomplished we are confident that we can complete the daunting task of replicating EDSAC as it was in 1949."

EDSAC

EDSAC in the 1940s
Source: Cambridge Computer Lab

The machine was designed in 1947 by Maurice Wilkes (1913-2010) after his appointment two years previously as the second director of what was then called the University of Cambridge Mathematical Laboratory. Wilkes’ team took their lead from John von Neumann’s plan for an electronic computer called EDVAC (Electronic Discrete Variable Automatic Computer), itself an evolution of ENIAC (Electronic Numerical Integrator And Computer), the machine built by John Mauchly and J. Presper Eckert of the University of Pennsylvania at the behest of the US Army.

EDSAC, which occupied a space 5 x 5 x 2m, ran its first program on 6 May 1949 and was used for the following nine years. . It formed the basis for LEO (Lyons Electronic Office) built for the Lyons food company and widely regarded as the world’s first business computer. In 1958, having been succeeded by EDSAC 2, EDSAC was dismantled.

The goal of the reconstruction project - which was launched two years ago this Friday and is backed by likes of the Computer Conservation Society, Acorn co-founder Hermann Hauser and Google UK - is to have a working replica of EDSAC up and running by March 2015. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Let it go, Steve: Ballmer bans iPads from his LA Clippers b-ball team
Can you imagine the scene? 'Hey guys, it's your new owner – WTF is that on your desk?'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
iPAD-FONDLING fanboi sparks SECURITY ALERT at Sydney airport
Breaches screening rules cos Apple SCREEN ROOLZ, ok?
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
The British Museum plonks digital bricks on world of Minecraft
Institution confirms it's cool with joining the blocky universe
Turn OFF your phone or WE'LL ALL DI... live? Europe OKs mobes, tabs non-stop on flights
Airlines given green light to allow gate-to-gate jibber-jabber
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.