'Flash Gordon' tech: How Sir Maurice Wilkes made practical computers possible

ENIAC - a time before integrated circuits

High performance access to file storage

Centenary Born this day 100 years ago in Cambridge, Sir Maurice Vincent Wilkes was a pivotal figure in the world of digital computing.

Few would dispute the critical role played by Wilkes in developing practical computing that would ultimately lead to the accessible machines we rely upon today. Certainly for the British computing scene, his contributions were vital.

A brilliant mathematician and physicist, Wilkes was instrumental in establishing the Computer Laboratory at Cambridge University in the 1930s, which he ran following wartime service researching telecommunications and radar systems.

But it was in 1946 he began the work for which he is still best known - the development of the Electronic Delay Storage Automatic Calculator (EDSAC). EDSAC was a general purpose, electronic digital stored-program computer inspired by John von Neumann's (Electronic Discrete Variable Automatic Computer (EDVAC) binary architecture.

Operational in 1949, EDSAC used vacuum tubes for logic, mercury delay lines for memory, punch tape for input and a teleprinter for output.

EDSAC stands out for two reasons.

Importantly, from its inception, EDSAC was developed as a practical computer rather than a blue-sky concept, and this approach typified Wilkes' life work.

Sir Maurice Wilkes photo Computer Laboratory University of Cambridge

Before becoming a Sir: a white-coated Maurice Wilkes with EDSAC. Photo credit: the Computer Laboratory, University of Cambridge

EDSAC was immediately put to work making calculations for Cambridge researchers, and eventually became the basis for the Lyons Electronic Office (LEO). LEO, the world's first business computer, was considered sufficiently robust to run the Lyons catering business to run administrative applications. LEO was soon farmed out to other businesses and became the basis of a national international computing empire, featured in the first installment of The Reg’s Geek’s Guide to Britain.

What also helped make EDSAC unique was its relatively compact build compared to other contemporary electromechanical and electronic circuit digital programmable machines in use, such as the Z3 or the ASCC.

And a major reason for this was EDSAC favored vacuum tubes over switch/relay logic. Vacuum tubes not only meant a smaller machine, because they performed the role previously done by the bigger physical hardware, but they also meant faster, more powerful and more reliable processing combined with the ability for EDSAC to process different types of workloads.

Until EDSAC, machines were limited in the jobs they could perform by their hardware – gears, levers, relays - or the program. But an electron is an electron is an electron, no matter what the program, and the valves worked by controlling the flow of the current in a sealed container.

In a world of integrated circuits and compact design, it’s hard to comprehend how a device that at best resembles a lightbulb and at worst something from a Flash Gordon rocket ship could make a real-life computer run.

Just how was it these glass wonders revolutionised computing and how was it their chapter in that story was so brief?

In this context, a vacuum tube, thermionic valve, or electron tube describes a sealed component controlling electric current through a vacuum. A typical early tube was cylindrical (sort of), constructed from thin glass, and operated as a simple diode - a light-bulb style filament heating up to direct flow in a single direction through a vacuum to an electrode, enabling rectification. Further developments saw more sophisticated three electrode (triode) designs enabling controlled electronic amplification, leading to applications such as switching, so crucial to computational machines.

The big leap forward provided by vacuum tubes was that they meant a shift away from electromechanical computers - which had used levers and gears or relays (Z3) - to electronic computing. They replaced the magnetically operated switching relays carried forward to early computers from telegraph circuits and telephone exchanges.

One of the first computers credited with using vacuum tubes was the Atanasoff-Berry Computer (ABC). It was built in 1937 but was not programmable and was designed primarily to solve linear equations. The Colossus computers, in working order from 1943 and used from early the next year onwards to crack the German military commands during World War II, also used tubes and were programmable. This was also the case with Electronic Numerical Integrator and Computer (ENIAC), which began work for the US Ballistic Research Laboratory in 1948. ENIAC forged the way for a generation of programmable vacuum tube computers from 1949, spearheaded by Wilkes' EDSAC.

Although vacuum tubes ultimately made electronic computing a reality, pioneering engineers were initially concerned about their relative fragility, short life, unreliability, and high failure rate when compared to electromechanical relays.

Fortunately, brilliant Colossus designer and General Post Office engineer Thomas “Tommy” Flowers decided that thousands of vacuum tubes could and should be used reliably in an electronic computer as long as the environment was stable and the circuits were kept on constantly. Flowers had seen vacuum tubes in action at the GPO’s newer phone exchanges.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story


Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.