Computer Hardware Quotes

We've searched our database for all the quotes and captions related to Computer Hardware. Here they are! All 100 of them:

My first impulse, when presented with any spanking-new piece of computer hardware, is to imagine how it will look in ten years’ time, gathering dust under a card table in a thrift shop.
William Gibson (Distrust That Particular Flavor)
People who are really serious about software should make their own hardware.
Alan Kay
Code is not like other how-computers-work books. It doesn't have big color illustrations of disk drives with arrows showing how the data sweeps into the computer. Code has no drawings of trains carrying a cargo of zeros and ones. Metaphors and similes are wonderful literary devices but they do nothing but obscure the beauty of technology.
Charles Petzold (Code: The Hidden Language of Computer Hardware and Software)
The transformation can only be accomplished by man, not by hardware (computers, gadgets, automation, new machinery). A company can not buy its way into quality.
W. Edwards Deming (Out of the Crises)
when you don't have the hardware resources, you have to take advantage of what you have inside the chip
Steve Wozniak (iWoz - Computer Geek to Cult Icon: How I Invented the Personal Computer, Co-Founded Apple, and Had Fun Doing It)
The hardware of a computer is useless without the right software. Similarly, in an organization the hardware (strategy and structure) is inert without the software (beliefs and behaviors).
Larry Bossidy (Execution: The Discipline of Getting Things Done)
Programming in machine code is like eating with a toothpick.
Charles Petzold (Code: The Hidden Language of Computer Hardware and Software)
To use a computer analogy, we are running twenty-first-century software on hardware last upgraded 50,000 years ago or more. This may explain quite a lot of what we see in the news.
Ronald Wright (A Short History Of Progress)
Quantum Machine Learning is defined as the branch of science and technology that is concerned with the application of quantum mechanical phenomena such as superposition, entanglement and tunneling for designing software and hardware to provide machines the ability to learn insights and patterns from data and the environment, and the ability to adapt automatically to changing situations with high precision, accuracy and speed. 
Amit Ray (Quantum Computing Algorithms for Artificial Intelligence)
Windows 10 has been a nightmare for computer hardware manufacturers, as it can make perfectly good hardware appear to be faulty.
Steven Magee
The NSA employs more mathematicians, buys more computer hardware, and intercepts more messages than any other organization in the world.
Simon Singh (The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography)
We could just as reasonably base our number system on eight (if we were cartoon characters) or four (if we were lobsters) or even two (if we were dolphins).
Charles Petzold (Code: The Hidden Language of Computer Hardware and Software)
Her computer’s fan whirred to life, blowing warm air onto her fingers. Two flame-red slits glowed from the monitor. The speakers boomed. “I lived! I died! I live again!” Olivie had dealt with blue screens, frozen hourglasses, and even the odd hardware conflict back in the day. This was new.
Choong JayVee (In Memory: A Tribute to Sir Terry Pratchett)
How many computer programmers does it take to change a light bulb? Are you kidding? That's a hardware problem!
Various (101 Best Jokes)
She noted the lack of female hardware hackers, and was enraged at the male hacker obsession with technological play and power.
Steven Levy (Hackers: Heroes of the Computer Revolution)
In a recent analysis, Martin Grötschel of the Zuse Institute in Berlin found that, using the computers and software that existed in 1982, it would have taken a full eighty-two years to solve a particularly complex production planning problem. As of 2003, the same problem could be solved in about a minute—an improvement by a factor of around 43 million. Computer hardware became about 1,000 times faster over the same period, which means that improvements in the algorithms used accounted for approximately a 43,000-fold increase in performance.
Martin Ford (Rise of the Robots: Technology and the Threat of a Jobless Future)
When the veterans in the group were growing up, computers were quite rare and expensive, but Veres went to school in the age when anyone with a little money and skill could make up a small personal system. Veres says that what he does at home is different enough from what he does at work to serve as recreation for him. At work he deals with hardware; when he’s at home, he focuses on software—reading programming manuals and creating new software for his own computer.
Tracy Kidder (The Soul of A New Machine)
Our minds have the incredible capacity to both alter the strength of connections among neurons, essentially rewiring them, and create entirely new pathways. (It makes a computer, which cannot create new hardware when its system crashes, seem fixed and helpless).
Susannah Cahalan (Brain on Fire: My Month of Madness)
I really can’t keep it up anymore,” Huahua said. “No one’s doing any better,” Specs said lightly. “It’s not the same. This is impossible!” “Think of yourself as a computer. You’re just cold hardware, and reality is just data. Accept your input and perform your calculations. That’s how you keep it up.
Liu Cixin (Supernova Era)
According to the Hebrew understanding of the human being, we are more than just a body. We are also a soul and spirit. The “spirit” of a person can be considered the breath of life, while the soul is the eternal part of us. If our body is our computer hardware, then the soul is our software, and the spirit is the electricity that gives the whole thing life.
Chuck Missler (The Physics of Immortality)
Under a $652-million clandestine program code named GENIE, the NSA, CIA, and special military operatives have planted covert digital bugs in tens of thousands of computers, routers, and firewalls around the world to conduct computer network exploitation, or CNE. Some are planted remotely, but others require physical access to install through so-called interdiction—the CIA or FBI intercepts shipments of hardware from manufacturers and retailers in order to plant malware in them or install doctored chips before they reach the customer.
Kim Zetter (Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon)
The flip side of this is that any information that can be reduced to a choice among two or more possibilities can be expressed using bits. Needless
Charles Petzold (Code: The Hidden Language of Computer Hardware and Software)
Some people believe that Moore’s Law will continue to be accurate until about 2015.
Charles Petzold (Code: The Hidden Language of Computer Hardware and Software)
In 1948, while working for Bell Telephone Laboratories, he published a paper in the Bell System Technical Journal entitled "A Mathematical Theory of Communication" that not only introduced the word bit in print but established a field of study today known as information theory. Information theory is concerned with transmitting digital information in the presence of noise (which usually prevents all the information from getting through) and how to compensate for that. In 1949, he wrote the first article about programming a computer to play chess, and in 1952 he designed a mechanical mouse controlled by relays that could learn its way around a maze. Shannon was also well known at Bell Labs for riding a unicycle and juggling simultaneously.
Charles Petzold (Code: The Hidden Language of Computer Hardware and Software)
The relentless acceleration of computer hardware over decades suggests that we’ve somehow managed to remain on the steep part of the S-curve for far longer than has been possible in other spheres of technology. The reality, however, is that Moore’s Law has involved successfully climbing a staircase of cascading S-curves, each representing a specific semiconductor fabrication technology.
Martin Ford (Rise of the Robots: Technology and the Threat of a Jobless Future)
Our mind is nothing but accumulated thoughts-good or evil recorded from the day the child is born. For memory or thought to work, a brain is needed. Software cannot work without a hardware. When a computer is damaged can we believe that its software is still somewhere in the sky? How can memory or thinking faculty exist outside brain? The neurotransmitters are responsible for the thought process and memory retention and retrival. All are elecrochemical impulses which cannot travel to sky. Our personality, individuality etc. are result of the accumulated thoughts in our brain. It is quality and nature of accumulated thoughts which decides if one is to become a scientist,poet or a terrorist. A guitar in the hands of a layman does not make any sense. If it is in the hands of a musician melodious tunes can come out. A child in the hands of lovable and intelligent parents go to heights.
V.A. Menon
We have in our head a remarkably powerful computer, not vast by conventional hardware standards, but able to represent the structure of our world by various types of associative links in a vast network of various types of ideas.
Daniel Kahneman (Thinking, Fast and Slow)
The truth is that anxiety is at once a function of biology and philosophy, body and mind, instinct and reason, personality and culture. Even as anxiety is experienced at a spiritual and psychological level, it is scientifically measurable at the molecular level and the physiological level. It is produced by nature and it is produced by nurture. It’s a psychological phenomenon and a sociological phenomenon. In computer terms, it’s both a hardware problem (I’m wired badly) and a software problem (I run faulty logic programs that make me think anxious thoughts). The origins of a temperament are many faceted; emotional dispositions that may seem to have a simple, single source—a bad gene, say, or a childhood trauma—may not.
Scott Stossel (My Age of Anxiety: Fear, Hope, Dread, and the Search for Peace of Mind)
If men create intelligent machines, or fantasize about them, it is either because they secretly despair of their own intelligence or because they are in danger of succumbing to the weight of a monstrous and useless intelligence which they seek to exorcize by transferring it to machines, where they can play with it and make fun of it. By entrusting this burdensome intelligence to machines we are released from any responsibility to knowledge, much as entrusting power to politicians allows us to disdain any aspiration of our own to power. If men dream of machines that are unique, that are endowed with genius, it is because they despair of their own uniqueness, or because they prefer to do without it - to enjoy it by proxy, so to speak, thanks to machines. What such machines offer is the spectacle of thought, and in manipulating them people devote themselves more to the spectacle of thought than to thought itself. It is not for nothing that they are described as 'virtual', for they put thought on hold indefinitely, tying its emergence to the achievement of a complete knowledge. The act of thinking itself is thus put off for ever. Indeed, the question of thought can no more be raised than the question of the freedom of future generations, who will pass through life as we travel through the air, strapped into their seats. These Men of Artificial Intelligence will traverse their own mental space bound hand and foot to their computers. Immobile in front of his computer, Virtual Man makes love via the screen and gives lessons by means of the teleconference. He is a physical - and no doubt also a mental cripple. That is the price he pays for being operational. Just as eyeglasses and contact lenses will arguably one day evolve into implanted prostheses for a species that has lost its sight, it is similarly to be feared that artificial intelligence and the hardware that supports it will become a mental prosthesis for a species without the capacity for thought. Artificial intelligence is devoid of intelligence because it is devoid of artifice.
Jean Baudrillard (The Transparency of Evil: Essays in Extreme Phenomena)
the modern relationship between software and hardware is essentially the same as that between music and the instrument or voice that brings it to life. A single computer can transform itself into the cockpit of a fighter jet, a budget projection, a chapter of a novel, or whatever else you want, just as a single piano can be used to play Bach or funky blues.
M. Mitchell Waldrop (The Dream Machine)
Based on the above analyses, it is reasonable to expect the hardware that can emulate human-brain functionality to be available for approximately one thousand dollars by around 2020. As we will discuss in chapter 4, the software that will replicate that functionality will take about a decade longer. However, the exponential growth of the price-performance, capacity, and speed of our hardware technology will continue during that period, so by 2030 it will take a village of human brains (around one thousand) to match a thousand dollars’ worth of computing. By 2050, one thousand dollars of computing will exceed the processing power of all human brains on Earth. Of course, this figure includes those brains still using only biological neurons.
Ray Kurzweil (The Singularity is Near: When Humans Transcend Biology)
Nothing's immortal on a road trip of a billion years. The universe runs down in stop-motion around you, your backups' backups' backups need backups. Not even the error-correcting replication strategies cadged from biology can keep the mutations at bay forever. It was true for us meatsicles cycling through mayfly moments every thousand years; it was just as true for the hardware.
Peter Watts (The Freeze-Frame Revolution)
Pham Nuwen spent years learning to program/explore. Programming went back to the beginning of time. It was a little like the midden out back of his father’s castle. Where the creek had worn that away, ten meters down, there were the crumpled hulks of machines—flying machines, the peasants said—from the great days of Canberra’s original colonial era. But the castle midden was clean and fresh compared to what lay within the Reprise’s local net. There were programs here that had been written five thousand years ago, before Humankind ever left Earth. The wonder of it—the horror of it, Sura said—was that unlike the useless wrecks of Canberra’s past, these programs still worked! And via a million million circuitous threads of inheritance, many of the oldest programs still ran in the bowels of the Qeng Ho system. Take the Traders’ method of timekeeping. The frame corrections were incredibly complex—and down at the very bottom of it was a little program that ran a counter. Second by second, the Qeng Ho counted from the instant that a human had first set foot on Old Earth’s moon. But if you looked at it still more closely. . .the starting instant was actually some hundred million seconds later, the 0-second of one of Humankind’s first computer operating systems. So behind all the top-level interfaces was layer under layer of support. Some of that software had been designed for wildly different situations. Every so often, the inconsistencies caused fatal accidents. Despite the romance of spaceflight, the most common accidents were simply caused by ancient, misused programs finally getting their revenge. “We should rewrite it all,” said Pham. “It’s been done,” said Sura, not looking up. She was preparing to go off-Watch, and had spent the last four days trying to root a problem out of the coldsleep automation. “It’s been tried,” corrected Bret, just back from the freezers. “But even the top levels of fleet system code are enormous. You and a thousand of your friends would have to work for a century or so to reproduce it.” Trinli grinned evilly. “And guess what—even if you did, by the time you finished, you’d have your own set of inconsistencies. And you still wouldn’t be consistent with all the applications that might be needed now and then.” Sura gave up on her debugging for the moment. “The word for all this is ‘mature programming environment.’ Basically, when hardware performance has been pushed to its final limit, and programmers have had several centuries to code, you reach a point where there is far more signicant code than can be rationalized. The best you can do is understand the overall layering, and know how to search for the oddball tool that may come in handy—take the situation I have here.” She waved at the dependency chart she had been working on. “We are low on working fluid for the coffins. Like a million other things, there was none for sale on dear old Canberra. Well, the obvious thing is to move the coffins near the aft hull, and cool by direct radiation. We don’t have the proper equipment to support this—so lately, I’ve been doing my share of archeology. It seems that five hundred years ago, a similar thing happened after an in-system war at Torma. They hacked together a temperature maintenance package that is precisely what we need.” “Almost precisely.
Vernor Vinge (A Deepness in the Sky (Zones of Thought, #2))
This entailed switching around by hand ENIAC’s rat’s nest of cables and resetting its switches. At first the programming seemed to be a routine, perhaps even menial task, which may have been why it was relegated to women, who back then were not encouraged to become engineers. But what the women of ENIAC soon showed, and the men later came to understand, was that the programming of a computer could be just as significant as the design of its hardware.
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
REINHOLD JOBS. Wisconsin-born Coast Guard seaman who, with his wife, Clara, adopted Steve in 1955. REED JOBS. Oldest child of Steve Jobs and Laurene Powell. RON JOHNSON. Hired by Jobs in 2000 to develop Apple’s stores. JEFFREY KATZENBERG. Head of Disney Studios, clashed with Eisner and resigned in 1994 to cofound DreamWorks SKG. ALAN KAY. Creative and colorful computer pioneer who envisioned early personal computers, helped arrange Jobs’s Xerox PARC visit and his purchase of Pixar. DANIEL KOTTKE. Jobs’s closest friend at Reed, fellow pilgrim to India, early Apple employee. JOHN LASSETER. Cofounder and creative force at Pixar. DAN’L LEWIN. Marketing exec with Jobs at Apple and then NeXT. MIKE MARKKULA. First big Apple investor and chairman, a father figure to Jobs. REGIS MCKENNA. Publicity whiz who guided Jobs early on and remained a trusted advisor. MIKE MURRAY. Early Macintosh marketing director. PAUL OTELLINI. CEO of Intel who helped switch the Macintosh to Intel chips but did not get the iPhone business. LAURENE POWELL. Savvy and good-humored Penn graduate, went to Goldman Sachs and then Stanford Business School, married Steve Jobs in 1991. GEORGE RILEY. Jobs’s Memphis-born friend and lawyer. ARTHUR ROCK. Legendary tech investor, early Apple board member, Jobs’s father figure. JONATHAN “RUBY” RUBINSTEIN. Worked with Jobs at NeXT, became chief hardware engineer at Apple in 1997. MIKE SCOTT. Brought in by Markkula to be Apple’s president in 1977 to try to manage Jobs.
Walter Isaacson (Steve Jobs)
Jon Rubinstein, who was in charge of hardware, adapted the microprocessor and guts of the PowerMac G3, Apple’s high-end professional computer, for use in the proposed new machine. It would have a hard drive and a tray for compact disks, but in a rather bold move, Jobs and Rubinstein decided not to include the usual floppy disk drive. Jobs quoted the hockey star Wayne Gretzky’s maxim, “Skate where the puck’s going, not where it’s been.” He was a bit ahead of his time, but eventually most computers eliminated floppy disks.
Walter Isaacson (Steve Jobs)
Tiny hardware malfunctions can produce outsized risks. In 1980 a single faulty computer chip costing forty-six cents almost triggered a major nuclear incident over the Pacific. And in perhaps the most well-known case, nuclear catastrophe was only avoided during the Cuban missile crisis when one man, the acting Russian commodore, Vasili Arkhipov, refused to give an order to fire nuclear torpedoes. The two other officers on the submarine, convinced they were under attack, had brought the world within a split second of full-scale nuclear war.
Mustafa Suleyman (The Coming Wave: AI, Power, and Our Future)
The clarity offered by software as metaphor - and the empowerment allegedly offered to us who know software - should make us pause, because software also engenders a sense of profound ignorance. Software is extremely difficult to comprehend. Who really knows what lurks behind our smiling interfaces, behind the objects we click and manipulate? Who completely understands what one’s computer is actually doing at any given moment? Software as a metaphor for metaphor troubles the usual functioning of metaphor, that is, the clarification of an unknown concept through a known one. For, if software illuminates an unknown, it does so through an unknowable (software). This paradox - this drive to grasp what we do not know through what we do not entirely understand… does not undermine, but rather grounds software’s appeal. Its combination of what can be seen and not seen, can be known and no known - it’s separation of interface from algorithm, of software from hardware - makes it a powerful metaphor for everything we believe is invisible yet generates visible effects, from genetics to the invisible hand of the market, from ideology to culture. Every use entails an act of faith.
Wendy Hui Kyong Chun (Programmed Visions: Software and Memory (Software Studies))
There is no such thing as a computational person, whose mind is like computer software, able to work on any suitable computer or neural hardware whose mind somehow derives meaning from taking meaningless symbols as input, manipulating them by rule, and giving meaningless symbols as output. Real people have embodied minds whose conceptual systems arise from, are shaped by, and are given meaning through living human bodies. The neural structures of our brains produce conceptual systems and linguistic structures that cannot be adequately accounted for by formal systems that only manipulate symbols.
George Lakoff (Philosophy in the Flesh: The Embodied Mind and its Challenge to Western Thought)
The creative imitator looks at products or services from the viewpoint of the customer. IBM’s personal computer is practically indistinguishable from the Apple in its technical features, but IBM from the beginning offered the customer programs and software. Apple maintained traditional computer distribution through specialty stores. IBM—in a radical break with its own traditions—developed all kinds of distribution channels, specialty stores, major retailers like Sears, Roebuck, its own retail stores, and so on. It made it easy for the consumer to buy and it made it easy for the consumer to use the product. These, rather than hardware features, were the “innovations” that gave IBM the personal computer market.
Peter F. Drucker (Innovation and Entrepreneurship)
This kind of pragmatism has become a hallmark of our psychological culture. In the mid-1990s, I described how it was commonplace for people to “cycle through” different ideas of the human mind as (to name only a few images) mechanism, spirit, chemistry, and vessel for the soul.14 These days, the cycling through intensifies. We are in much more direct contact with the machine side of mind. People are fitted with a computer chip to help with Parkinson’s. They learn to see their minds as program and hardware. They take antidepressants prescribed by their psychotherapists, confident that the biochemical and oedipal self can be treated in one room. They look for signs of emotion in a brain scan. Old jokes about couples needing “chemistry” turn out not to be jokes at all.
Sherry Turkle (Alone Together: Why We Expect More from Technology and Less from Each Other)
Even in the 1950s, computers were described in the popular press as “super-brains” that were “faster than Einstein.” So can we say now, finally, that computers are as powerful as the human brain? No. Focusing on raw computing power misses the point entirely. Speed alone won’t give us AI. Running a poorly designed algorithm on a faster computer doesn’t make the algorithm better; it just means you get the wrong answer more quickly. (And with more data there are more opportunities for wrong answers!) The principal effect of faster machines has been to make the time for experimentation shorter, so that research can progress more quickly. It’s not hardware that is holding AI back; it’s software. We don’t yet know how to make a machine really intelligent—even if it were the size of the universe.
Stuart Russell (Human Compatible: Artificial Intelligence and the Problem of Control)
Jobs’s reluctance to make the Mac compatible with the architecture of the Lisa was motivated by more than rivalry or revenge. There was a philosophical component, one that was related to his penchant for control. He believed that for a computer to be truly great, its hardware and its software had to be tightly linked. When a computer was open to running software that also worked on other computers, it would end up sacrificing some functionality. The best products, he believed, were “whole widgets” that were designed end-to-end, with the software closely tailored to the hardware and vice versa. This is what would distinguish the Macintosh, which had an operating system that worked only on its own hardware, from the environment that Microsoft was creating, in which its operating system could be used on hardware made by many different companies.
Walter Isaacson (Steve Jobs)
About sixty thousand different thoughts are said to go through a person’s mind over the course of a day. Ninety-five percent of that is made up of the same things we’d been thinking about the day before, and 80 percent of those thoughts are believed to be negative. In my days as a maximalist, I lived in fear of my future, constantly worrying about my career and how others saw me. Forget about that 80 percent I mentioned a moment earlier—practically all my thoughts were negative. So, how do you make a slow computer like that work properly? Since our fifty-thousand-year-old hardware isn’t going to change, we need to get rid of the extra load that isn’t needed. Rather than trying to add more and more, running out of disk space and exhausting ourselves in the process, I think it’s time we started thinking about subtracting and refining to enhance the truly important things that might be buried deep down underneath all that excess.
Fumio Sasaki (Goodbye, Things: The New Japanese Minimalism)
So which theory did Lagos believe in? The relativist or the universalist?" "He did not seem to think there was much of a difference. In the end, they are both somewhat mystical. Lagos believed that both schools of thought had essentially arrived at the same place by different lines of reasoning." "But it seems to me there is a key difference," Hiro says. "The universalists think that we are determined by the prepatterned structure of our brains -- the pathways in the cortex. The relativists don't believe that we have any limits." "Lagos modified the strict Chomskyan theory by supposing that learning a language is like blowing code into PROMs -- an analogy that I cannot interpret." "The analogy is clear. PROMs are Programmable Read-Only Memory chips," Hiro says. "When they come from the factory, they have no content. Once and only once, you can place information into those chips and then freeze it -- the information, the software, becomes frozen into the chip -- it transmutes into hardware. After you have blown the code into the PROMs, you can read it out, but you can't write to them anymore. So Lagos was trying to say that the newborn human brain has no structure -- as the relativists would have it -- and that as the child learns a language, the developing brain structures itself accordingly, the language gets 'blown into the hardware and becomes a permanent part of the brain's deep structure -- as the universalists would have it." "Yes. This was his interpretation." "Okay. So when he talked about Enki being a real person with magical powers, what he meant was that Enki somehow understood the connection between language and the brain, knew how to manipulate it. The same way that a hacker, knowing the secrets of a computer system, can write code to control it -- digital namshubs?" "Lagos said that Enki had the ability to ascend into the universe of language and see it before his eyes. Much as humans go into the Metaverse. That gave him power to create nam-shubs. And nam-shubs had the power to alter the functioning of the brain and of the body." "Why isn't anyone doing this kind of thing nowadays? Why aren't there any namshubs in English?" "Not all languages are the same, as Steiner points out. Some languages are better at metaphor than others. Hebrew, Aramaic, Greek, and Chinese lend themselves to word play and have achieved a lasting grip on reality: Palestine had Qiryat Sefer, the 'City of the Letter,' and Syria had Byblos, the 'Town of the Book.' By contrast other civilizations seem 'speechless' or at least, as may have been the case in Egypt, not entirely cognizant of the creative and transformational powers of language. Lagos believed that Sumerian was an extraordinarily powerful language -- at least it was in Sumer five thousand years ago." "A language that lent itself to Enki's neurolinguistic hacking." "Early linguists, as well as the Kabbalists, believed in a fictional language called the tongue of Eden, the language of Adam. It enabled all men to understand each other, to communicate without misunderstanding. It was the language of the Logos, the moment when God created the world by speaking a word. In the tongue of Eden, naming a thing was the same as creating it. To quote Steiner again, 'Our speech interposes itself between apprehension and truth like a dusty pane or warped mirror. The tongue of Eden was like a flawless glass; a light of total understanding streamed through it. Thus Babel was a second Fall.' And Isaac the Blind, an early Kabbalist, said that, to quote Gershom Scholem's translation, 'The speech of men is connected with divine speech and all language whether heavenly or human derives from one source: the Divine Name.' The practical Kabbalists, the sorcerers, bore the title Ba'al Shem, meaning 'master of the divine name.'" "The machine language of the world," Hiro says.
Neal Stephenson (Snow Crash)
The Xerox Corporation’s Palo Alto Research Center, known as Xerox PARC, had been established in 1970 to create a spawning ground for digital ideas. It was safely located, for better and for worse, three thousand miles from the commercial pressures of Xerox corporate headquarters in Connecticut. Among its visionaries was the scientist Alan Kay, who had two great maxims that Jobs embraced: “The best way to predict the future is to invent it” and “People who are serious about software should make their own hardware.” Kay pushed the vision of a small personal computer, dubbed the “Dynabook,” that would be easy enough for children to use. So Xerox PARC’s engineers began to develop user-friendly graphics that could replace all of the command lines and DOS prompts that made computer screens intimidating. The metaphor they came up with was that of a desktop. The screen could have many documents and folders on it, and you could use a mouse to point and click on the one you wanted to use.
Walter Isaacson (Steve Jobs)
get a sense of how powerful Musk’s work may end up being for the American economy, have a think about the dominant mechatronic machine of the past several years: the smartphone. Pre-iPhone, the United States was the laggard in the telecommunications industry. All of the exciting cell phones and mobile services were in Europe and Asia, while American consumers bumbled along with dated equipment. When the iPhone arrived in 2007, it changed everything. Apple’s device mimicked many of the functions of a computer and then added new abilities with its apps, sensors, and location awareness. Google charged to market with its Android software and related handsets, and the United States suddenly emerged as the driving force in the mobile industry. Smartphones were revolutionary because of the ways they allowed hardware, software, and services to work in unison. This was a mix that favored the skills of Silicon Valley. The rise of the smartphone led to a massive industrial boom in which Apple became the most valuable company in the country, and billions of its clever devices were spread all over the world.
Ashlee Vance (Elon Musk: Inventing the Future)
Bitcoin was in theory and in practice inseparable from the process of computation run on cheap, powerful hardware: the system could not have existed without markets for digital moving images; especially video games, driving down the price of microchips that could handle the onerous business of guessing. It also had a voracious appetite for electricity, which had to come from somewhere - burning coal or natural gas, spinning turbines, decaying uranium - and which wasn't being used for something arguably more constructive than this discovery of meaningless hashes. The whole apparatus of the early twenty-first century's most complex and refined infrastructures and technologies was turned to the conquest of the useless. It resembled John Maynard Keynes's satirical response to criticisms of his capital injection proposal by proponents of the gold standard: just put banknotes in bottles, he suggested, and bury them in disused coal mines for people to dig up - a useless task to slow the dispersal of the new money and get people to work for it. 'It would, indeed, be more sensible to build houses and the like; but if there are political and practical difficulties in the way of this, the above would be better than nothing.
Finn Brunton (Digital Cash: The Unknown History of the Anarchists, Utopians, and Technologists Who Created Cryptocurrency)
Similarly, the computers used to run the software on the ground for the mission were borrowed from a previous mission. These machines were so out of date that Bowman had to shop on eBay to find replacement parts to get the machines working. As systems have gone obsolete, JPL no longer uses the software, but Bowman told me that the people on her team continue to use software built by JPL in the 1990s, because they are familiar with it. She said, “Instead of upgrading to the next thing we decided that it was working just fine for us and we would stay on the platform.” They have developed so much over such a long period of time with the old software that they don’t want to switch to a newer system. They must adapt to using these outdated systems for the latest scientific work. Working within these constraints may seem limiting. However, building tools with specific constraints—from outdated technologies and low bitrate radio antennas—can enlighten us. For example, as scientists started to explore what they could learn from the wait times while communicating with deep space probes, they discovered that the time lag was extraordinarily useful information. Wait times, they realized, constitute an essential component for locating a probe in space, calculating its trajectory, and accurately locating a target like Pluto in space. There is no GPS for spacecraft (they aren’t on the globe, after all), so scientists had to find a way to locate the spacecraft in the vast expanse. Before 1960, the location of planets and objects in deep space was established through astronomical observation, placing an object like Pluto against a background of stars to determine its position.15 In 1961, an experiment at the Goldstone Deep Space Communications Complex in California used radar to more accurately define an “astronomical unit” and help measure distances in space much more accurately.16 NASA used this new data as part of creating the trajectories for missions in the following years. Using the data from radio signals across a wide range of missions over the decades, the Deep Space Network maintained an ongoing database that helped further refine the definition of an astronomical unit—a kind of longitudinal study of space distances that now allows missions like New Horizons to create accurate flight trajectories. The Deep Space Network continued to find inventive ways of using the time lag of radio waves to locate objects in space, ultimately finding that certain ways of waiting for a downlink signal from the spacecraft were less accurate than others. It turned to using the antennas from multiple locations, such as Goldstone in California and the antennas in Canberra, Australia, or Madrid, Spain, to time how long the signal took to hit these different locations on Earth. The time it takes to receive these signals from the spacecraft works as a way to locate the probes as they are journeying to their destination. Latency—or the different time lag of receiving radio signals on different locations of Earth—is the key way that deep space objects are located as they journey through space. This discovery was made possible during the wait times for communicating with these craft alongside the decades of data gathered from each space mission. Without the constraint of waiting, the notion of using time as a locating feature wouldn’t have been possible.
Jason Farman (Delayed Response: The Art of Waiting from the Ancient to the Instant World)
The collapse, for example, of IBM’s legendary 80-year-old hardware business in the 1990s sounds like a classic P-type story. New technology (personal computers) displaces old (mainframes) and wipes out incumbent (IBM). But it wasn’t. IBM, unlike all its mainframe competitors, mastered the new technology. Within three years of launching its first PC, in 1981, IBM achieved $5 billion in sales and the #1 position, with everyone else either far behind or out of the business entirely (Apple, Tandy, Commodore, DEC, Honeywell, Sperry, etc.). For decades, IBM dominated computers like Pan Am dominated international travel. Its $13 billion in sales in 1981 was more than its next seven competitors combined (the computer industry was referred to as “IBM and the Seven Dwarfs”). IBM jumped on the new PC like Trippe jumped on the new jet engines. IBM owned the computer world, so it outsourced two of the PC components, software and microprocessors, to two tiny companies: Microsoft and Intel. Microsoft had all of 32 employees. Intel desperately needed a cash infusion to survive. IBM soon discovered, however, that individual buyers care more about exchanging files with friends than the brand of their box. And to exchange files easily, what matters is the software and the microprocessor inside that box, not the logo of the company that assembled the box. IBM missed an S-type shift—a change in what customers care about. PC clones using Intel chips and Microsoft software drained IBM’s market share. In 1993, IBM lost $8.1 billion, its largest-ever loss. That year it let go over 100,000 employees, the largest layoff in corporate history. Ten years later, IBM sold what was left of its PC business to Lenovo. Today, the combined market value of Microsoft and Intel, the two tiny vendors IBM hired, is close to $1.5 trillion, more than ten times the value of IBM. IBM correctly anticipated a P-type loonshot and won the battle. But it missed a critical S-type loonshot, a software standard, and lost the war.
Safi Bahcall (Loonshots: How to Nurture the Crazy Ideas That Win Wars, Cure Diseases, and Transform Industries)
Although thrilled that the era of the personal computer had arrived, he was afraid that he was going to miss the party. Slapping down seventy-five cents, he grabbed the issue and trotted through the slushy snow to the Harvard dorm room of Bill Gates, his high school buddy and fellow computer fanatic from Seattle, who had convinced him to drop out of college and move to Cambridge. “Hey, this thing is happening without us,” Allen declared. Gates began to rock back and forth, as he often did during moments of intensity. When he finished the article, he realized that Allen was right. For the next eight weeks, the two of them embarked on a frenzy of code writing that would change the nature of the computer business.1 Unlike the computer pioneers before him, Gates, who was born in 1955, had not grown up caring much about the hardware. He had never gotten his thrills by building Heathkit radios or soldering circuit boards. A high school physics teacher, annoyed by the arrogance Gates sometimes displayed while jockeying at the school’s timesharing terminal, had once assigned him the project of assembling a Radio Shack electronics kit. When Gates finally turned it in, the teacher recalled, “solder was dripping all over the back” and it didn’t work.2 For Gates, the magic of computers was not in their hardware circuits but in their software code. “We’re not hardware gurus, Paul,” he repeatedly pronounced whenever Allen proposed building a machine. “What we know is software.” Even his slightly older friend Allen, who had built shortwave radios, knew that the future belonged to the coders. “Hardware,” he admitted, “was not our area of expertise.”3 What Gates and Allen set out to do on that December day in 1974 when they first saw the Popular Electronics cover was to create the software for personal computers. More than that, they wanted to shift the balance in the emerging industry so that the hardware would become an interchangeable commodity, while those who created the operating system and application software would capture most of the profits.
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
In quel preciso momento, Karla è entrata nella stanza. Ha spento la televisione, ha guardato Todd fisso negli occhi e ha detto: "Todd, tu esisti non soltanto come membro di una famiglia o di una compagnia o di una nazione, ma come membro di una specie... sei un essere umano. Sei parte dell'umanità. Attualmente la nostra specie ha problemi profondi e stiamo cercando di sognare un modo per uscirne e stiamo usando i computer per cavarcela. La costruzione di hardware e software è il campo in cui la specie ha deciso di investire energie per la sua sopravvivenza e questa costruzione richiede zone di pace, bambini nati dalla pace, e l'assenza di distrazioni che interferiscano col codice. Non possiamo acquisire conoscenza attraverso l'informatica, ma riusciremo a usarla per tenerci fuori dalla merda. Quello che tu percepisci come un vuoto è un paradiso terrestre: alla lettera, linea per linea, la libertà di impedire all'umanità di diventare non lineare". Si è seduta sul divano e c'era il rumore della pioggia che tamburellava sul soffitto e mi sono reso conto del fatto che non c'era abbastanza luce nella stanza e che noi eravamo tutti in silenzio. Karla ha detto: "Abbiamo avuto una vita discreta. Nessuno di noi, a quanto mi risulta, è mai stato maltrattato. Non abbiamo mai desiderato niente, né abbiamo mai voluto possedere qualcosa. I nostri genitori sono tutti ancora insieme, a parte quelli di Susan. Ci hanno trattato bene, ma la vera moralità, qui. Todd consiste nel sapere se le loro mani sono state sprecate in vite non creative, o se queste mani sono utilizzate per portare avanti il sogno dell'umanità". Continuava a piovere. "Non è una coincidenza che come specie abbiamo inventato la classe media. Senza la classe media, non avremmo potuto avere quel particolare tipo di configurazione mentale che contribuisce in misura consistente a sputar fuori i sistemi informatici e la nostra specie non avrebbe mai potuto farcela ad arrivare allo stadio evolutivo successivo, qualunque esso sia. Ci sono buone probabilità che la classe media non rientri neanche parzialmente nella prossima fase evolutiva. Ma non è né qui né là. Che ti piaccia o no, Todd, tu, io, Dan, Abe, Bug, e Susan... tutti noi siamo fabbricanti del prossimo ciclo Rem del sogno umano. Tutti gli altri ne saranno attratti. Non metterli in discussione, Todd, e non crogiolartici dentro, ma non permettere mai a te stesso di dimenticarlo".
Douglas Coupland (Microserfs)
me to be honest about his failings as well as his strengths. She is one of the smartest and most grounded people I have ever met. “There are parts of his life and personality that are extremely messy, and that’s the truth,” she told me early on. “You shouldn’t whitewash it. He’s good at spin, but he also has a remarkable story, and I’d like to see that it’s all told truthfully.” I leave it to the reader to assess whether I have succeeded in this mission. I’m sure there are players in this drama who will remember some of the events differently or think that I sometimes got trapped in Jobs’s distortion field. As happened when I wrote a book about Henry Kissinger, which in some ways was good preparation for this project, I found that people had such strong positive and negative emotions about Jobs that the Rashomon effect was often evident. But I’ve done the best I can to balance conflicting accounts fairly and be transparent about the sources I used. This is a book about the roller-coaster life and searingly intense personality of a creative entrepreneur whose passion for perfection and ferocious drive revolutionized six industries: personal computers, animated movies, music, phones, tablet computing, and digital publishing. You might even add a seventh, retail stores, which Jobs did not quite revolutionize but did reimagine. In addition, he opened the way for a new market for digital content based on apps rather than just websites. Along the way he produced not only transforming products but also, on his second try, a lasting company, endowed with his DNA, that is filled with creative designers and daredevil engineers who could carry forward his vision. In August 2011, right before he stepped down as CEO, the enterprise he started in his parents’ garage became the world’s most valuable company. This is also, I hope, a book about innovation. At a time when the United States is seeking ways to sustain its innovative edge, and when societies around the world are trying to build creative digital-age economies, Jobs stands as the ultimate icon of inventiveness, imagination, and sustained innovation. He knew that the best way to create value in the twenty-first century was to connect creativity with technology, so he built a company where leaps of the imagination were combined with remarkable feats of engineering. He and his colleagues at Apple were able to think differently: They developed not merely modest product advances based on focus groups, but whole new devices and services that consumers did not yet know they needed. He was not a model boss or human being, tidily packaged for emulation. Driven by demons, he could drive those around him to fury and despair. But his personality and passions and products were all interrelated, just as Apple’s hardware and software tended to be, as if part of an integrated system. His tale is thus both instructive and cautionary, filled with lessons about innovation, character, leadership, and values.
Walter Isaacson (Steve Jobs)
By having no affiliation with “coin” in its name, Ethereum was moving beyond the idea of currency into the realm of cryptocommodities. While Bitcoin is mostly used to send monetary value between people, Ethereum could be used to send information between programs. It would do so by building a decentralized world computer with a Turing complete programming language.11 Developers could write programs, or applications, that would run on top of this decentralized world computer. Just as Apple builds the hardware and operating system that allows developers to build applications on top, Ethereum was promising to do the same in a distributed and global system. Ether, the native unit, would come into play as follows: Ether is a necessary element—a fuel—for operating the distributed application platform Ethereum. It is a form of payment made by the clients of the platform to the machines executing the requested operations. To put it another way, ether is the incentive ensuring that developers write quality applications (wasteful code costs more), and that the network remains healthy (people are compensated for their contributed resources).
Chris Burniske (Cryptoassets: The Innovative Investor's Guide to Bitcoin and Beyond)
In other words, the hardware is the matter and the software is the pattern. This substrate independence of computation implies that AI is possible: intelligence doesn’t require flesh, blood or carbon atoms.
Max Tegmark (Life 3.0: Being Human in the Age of Artificial Intelligence)
The computer includes a timer which functions like a stopwatch on a smartphone. A timer is a variable that is set to a period of time, for example, 0.5 s, which is represented as an integer number milliseconds or microseconds (0.5 s is 500 ms). The hardware clock of the computer causes an interrupt at fixed intervals and the operating system decrements the value of the timer. When its value goes to zero, we say that the timer has expired; an interrupt occurs.
Mordechai Ben-Ari (Elements of Robotics)
The dynamism of new monopolies itself explains why old monopolies don’t strangle innovation. With Apple’s iOS at the forefront, the rise of mobile computing has dramatically reduced Microsoft’s decades-long operating system dominance. Before that, IBM’s hardware monopoly of the ’60s and ’70s was overtaken by Microsoft’s software monopoly. AT&T had a monopoly on telephone service for most of the 20th century, but now anyone can get a cheap cell phone plan from any number of providers.
Peter Thiel (Zero to One: Notes on Startups, or How to Build the Future)
From a higher perspective of love, the mind is like an innocent child and simply doesn’t know any better, and it is ultimately doing what it believes will help it survive. It genuinely thinks it is doing what is best for you, even if it seems atrocious or horrific. It may be helpful to view the mind as an innocent machine or hardware going along with whatever inherited programs and software were installed into it. It literally does not have the ability to tell if a program is good or bad for it, just like a computer accepting a programmed virus without question.
Mathew Micheletti (The Inner Work: An Invitation to True Freedom and Lasting Happiness)
I can teach anybody [the computer operating system] Linux,” said La Gesse. “I can’t teach them to actually care.” Rackspace specifically looks for people like this, who fit the company’s customer-focused culture. Here’s a passage from its Fanatical Support Promise: We cannot promise that hardware won’t break, that software won’t fail, or that we will always be perfect. What we can promise is that if something goes wrong, we will rise to the occasion, take action, and help resolve the issue.
Jeff Toister (The Service Culture Handbook: A Step-by-Step Guide to Getting Your Employees Obsessed with Customer Service)
computation is a pattern in the spacetime arrangement of particles, and it’s not the particles but the pattern that really matters! Matter doesn’t matter. In other words, the hardware is the matter and the software is the pattern. This substrate independence of computation implies that AI is possible: intelligence doesn’t require flesh, blood or carbon atoms.
Max Tegmark (Life 3.0: Being Human in the Age of Artificial Intelligence)
In computer hardware, where freedom reigns for both suppliers and consumers alike on a global scale, the industry generates the fastest innovation in product and customer value the world has ever seen.
Eric S. Raymond (The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary)
It’s not just software itself—it’s the fundamental agility of software that drives Software People. It starts by listening to customers, rapidly building initial solutions to their problems, getting feedback, and then constantly iterating and improving. With this progression of computation, Software People can apply this software process to more and more of the world’s problems. I particularly enjoy seeing it arise in traditionally hardware-centric fields because when you see a Software Person running the playbook in the field of hardware, you can see the evolution play out physically in plastic, metal, and glass.
Jeff Lawson (Ask Your Developer: How to Harness the Power of Software Developers and Win in the 21st Century)
We are organic computers. Living things, including human beings, are organic hardware and software, running programs encoded in their DNA. Nature is one of the representations of the Universal mind. It’s clear that nature uses genome templates to create life.
Sahara Sanders (The Eye of Universe (Indigo Diaries, #3))
Basically, the conscious mind is like the hardware of your computer. The subconscious mind is its operating system. It’s composed of code—or all those underlying patterns and connections that were laid down during your childhood. You can’t see that code, but it runs the show. It’s the engine that determines how you react to the world at large versus how you respond to it.
Lisa Haisha (Write on: Spiritual Growth)
In the old days of enterprise computing, companies typically paid millions of dollars to license a package of software, millions more to buy the hardware and to get the software installed properly, and then more money for yearly maintenance contracts. Think Oracle. Then came Software-as-a-Service, or SaaS. The customer negotiated a price with the software supplier and paid monthly to use software that ran in the cloud. Think Salesforce. Now, we have the utilization model, with payments based on consumption. You buy credits and use them when you need them. Think Amazon’s AWS and Snowflake. We believe it’s a superior model and that someday most enterprise software will be purchased and delivered this way.
Frank Slootman (Rise of the Data Cloud)
The conceptual auto-disaster. The volunteer panels were shown fake safety propaganda movies in which implausible accidents were staged. Far from eliciting a humorous or sardonic response from the audience, marked feelings of hostility were shown towards the film and medical support staff. Subsequent films of genuine accidents exerted a notably calming effect. From this and similar work it is clear that Freud’s classic distinction between the manifest and latent content of the inner world of the psyche now has to be applied to the outer world of reality. A dominant element in this reality is technology and its instrument, the machine. In most roles the machine assumes a benign or passive posture - telephone exchanges, engineering hardware, etc. The twentieth century has also given birth to a vast range of machines - computers, pilotless planes, thermonuclear weapons - where the latent identity of the machine is ambiguous even to the skilled investigator. An understanding of this identity can be found in a study of the automobile, which dominates the vectors of speed, aggression, violence and desire. In particular the automobile crash contains a crucial image of the machine as conceptualized psychopathology. Tests on a wide range of subjects indicate that the automobile, and in particular the automobile crash, provides a focus for the conceptualizing of a wide range of impulses involving the elements of psychopathology, sexuality and self-sacrifice.
J.G. Ballard (The Atrocity Exhibition)
Systems are complex. A computer system is not just hardware, not just software, not even just people plus hardware plus software. The procedures, formal and informal, that have evolved with the system are part of the system; so is the current load on various components, and so is the attitude and experience of the users. Even among the commonly accepted “parts” of a system, clear lines of separation do not exist. Hardware merges with operating system, operating system merges with programming language, programming language merges with debugging tools, debugging tools merge with documentation, and documentation merges with training, and all of them mingle with the social climate in which the system is used.
Gerald M. Weinberg (The Psychology of Computer Programming)
Xerox had the Alto; IBM launched the Personal Computer. Xerox had the graphical user interface with mouse, icons, and overlapping windows; Apple and Microsoft launched the Macintosh and Windows. Xerox invented What-You-See-Is-What-You-Get word processing; Microsoft brazenly turned it into Microsoft Word and conquered the office market. Xerox invented the Ethernet; today the battle for market share in the networking hardware industry is between Cisco Systems and 3Com. Even the laser printer is a tainted triumph. Thanks to the five years Xerox dithered in bringing it to market, IBM got there first, introducing its own model in 1975.
Michael A. Hiltzik (Dealers of Lightning: Xerox PARC and the Dawn of the Computer Age)
hard·ware n. The part of a computer system that can be kicked.
Michael Barr (Programming Embedded Systems: With C and GNU Development Tools)
Yes, the earth is a massive conductor of electricity, but it can also be viewed as both a source of electrons and a repository for electrons. The earth is to electrons as an ocean is to drops of water. The earth is a virtually limitless source of electrons and also a giant sea of electrons.
Charles Petzold (Code: The Hidden Language of Computer Hardware and Software)
behavioral economics has told a very particular story about human beings: that we are irrational and error-prone, owing in large part to the buggy, idiosyncratic hardware of the brain.
Brian Christian (Algorithms to Live By: The Computer Science of Human Decisions)
The hardware is more “real” than the software in that you can always locate it in space-time — if it’s not in the bedroom, somebody must have moved it to the study, etc. On the other hand, the software is more “real” in the sense that you can smash the hardware back to dust (“kill” the computer) and the software still exists, and can “materialize” or “manifest” again in a different computer.
Robert Anton Wilson (Prometheus Rising)
Cloud Service Any service made available to users on demand via the Internet from a cloud computing provider's servers rather than from a company's own on-premises servers is referred to as a cloud service. Cloud services are managed by a cloud services provider and are designed to enable easy, scalable access to applications, resources, and services. CLOUD SERVICES ARE SCALABLE AND DYNAMIC. A cloud service may dynamically scale to meet the needs of its customers, and because the service provider provides all of the necessary hardware and software, a corporation does not need to provision or deploy its own resources or dedicate IT people to operate the service. Online data storage and backup solutions, Web-based e-mail services, hosted office suites and document collaboration services, database processing, managed technical support services, and more are all examples of cloud services.
Crafsol Technology
We have made a beautiful (we hope beautiful) model of consciousness in terms of brain hardware and software. Now we need to remember again that, while the brain can be modeled by a computer, the model is never the whole system. The model-maker or metaprogrammer is bigger than the model or program.
Robert Anton Wilson (Prometheus Rising)
So how many of the Forbes 400 fortunes from 1982 remained on the list 20 years later? Only 64 of the original members—a measly 16%—were still on the list in 2002. By keeping all their eggs in the one basket that had gotten them onto the list in the first place—once-booming industries like oil and gas, or computer hardware, or basic manufacturing—all the other original members fell away. When hard times hit, none of these people—despite all the huge advantages that great wealth can bring—were properly prepared. They could only stand by and wince at the sickening crunch as the constantly changing economy crushed their only basket and all their eggs.10
Benjamin Graham (The Intelligent Investor)
Obsessed for years with hardware, Jobs, 37, now recognizes that Next’s ‘crown jewel’ is not its sleek computer but its operating system
Andrew S. Grove (Only the Paranoid Survive)
Think of genetics as the hardware and epigenetics as the software in your computer.
Thomas R. Verny (The Embodied Mind: Understanding the Mysteries of Cellular Memory, Consciousness, and Our Bodies)
IT Infrastructure IT infrastructure encompasses the hardware, software, networks, and services required to operate an organization's information technology environment, supporting its computing needs, data storage, networking, and other essential operations.
Education Transforming mental health and substance abuse systems of care : community integration and
And so 1014 looks conservative as a most likely range. If brain simulation requires computational power in that range, as of 2023, about $1,000 worth of hardware can already achieve this.[
Ray Kurzweil (The Singularity Is Nearer: When We Merge with AI)
When will they just close Animation?’ And he said, ‘John, they never will.’ “ ‘What do you mean?’ I asked him,” continues Lasseter. “And Mickey said, ‘Computer hardware and software companies, they go through layoffs and it’s business. It’s the ups and downs of the business. But when people think of Pixar, it’s not our computers or our software. They think of those little short films you’ve made. That’s the identity of Pixar to the rest of the world. So if Pixar were to stop making those films and lay everybody off in Animation, that would signal to the entire world that Pixar is done. That,’ he said, ‘is why they’re not gonna close Animation.
Brent Schlender (Becoming Steve Jobs: The Evolution of a Reckless Upstart into a Visionary Leader)
How many computer programmers does it take to change a light bulb? Are you kidding? That's a hardware problem! " ♦◊♦◊♦◊♦
Various (101 Best Jokes)
Rather than plug a piece of hardware into our gray matter, how much more elegant to extract some brain cells, plop them into a Petri dish, and graft on various sorts of gelatinous computing goo. Slug it all back into the skull and watch it run on blood sugar, the way a human brain’s supposed to. Get all the functions and features you want, without that clunky-junky twentieth-century hardware thing.
William Gibson (Distrust That Particular Flavor)
Our hardware is likely to turn into something like us a lot faster than we are likely to turn into something like our hardware. Our hardware is evolving at the speed of light, while we are still the product, for the most part, of unskilled labor. But there is another argument against the need to implant computing devices, be they glass or goo. It’s a very simple one, so simple that some have difficulty grasping it. It has to do with a certain archaic distinction we still tend to make, a distinction between computing and “the world.” Between, if you like, the virtual and the real. I very much doubt that our grandchildren will understand the distinction between that which is a computer and that which isn’t.
William Gibson (Distrust That Particular Flavor)
Terrorism suspects aren’t the NSA’s only targets, however. Operations against nation-state adversaries have exploded in recent years as well. In 2011, the NSA mounted 231 offensive cyber operations against other countries, according to the documents, three-fourths of which focused on “top-priority” targets like Iran, Russia, China, and North Korea. Under a $652-million clandestine program code named GENIE, the NSA, CIA, and special military operatives have planted covert digital bugs in tens of thousands of computers, routers, and firewalls around the world to conduct computer network exploitation, or CNE. Some are planted remotely, but others require physical access to install through so-called interdiction—the CIA or FBI intercepts shipments of hardware from manufacturers and retailers in order to plant malware in them or install doctored chips before they reach the customer.
Anonymous
You’re twelve years old. One horrible day your best friend’s family moves to another town. You speak to your friend on the telephone now and then, but telephone conversations just aren’t the same as those late-night sessions with the flashlights blinking out Morse code. Your second-best friend, who lives in the house next door to yours, eventually becomes your new best friend. It’s time to teach your new best friend some Morse code and get the late-night flashlights blinking again.
Charles Petzold (Code: The Hidden Language of Computer Hardware and Software)
An example of the extent of the FSB and GRU covert cyber collection and exploitation was the exposure of what was most likely a Russian State Security & Navy Intelligence covert operation to monitor, exploit and hack targets within the central United States from Russian merchant ships equipped with advanced hacking hardware and tools. The US Coast guard boarded the merchant ship SS Chem Hydra and in it they found wireless intercept equipment associated with Russian hacking teams. Apparently the vessel had personnel on board who were tasked to collect intelligence on wireless networks and attempt hackings on regional computer networks in the heartland of America.59
Malcolm W. Nance (The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election)
might be just a set of equations and eye-blearing numbers disembodied from all physical significance. She might not hear another word about the work until a piece appeared in Air Scoop or Aviation or Air Trails. Or never. For many men, a computer was a piece of living hardware, an appliance that inhaled one set of figures and exhaled another. Once a girl finished a particular job, the calculations were whisked away into the shadowy kingdom of the engineers. “Woe unto thee if they shall make thee a computer,” joked a column in Air Scoop. “For the Project Engineer will take credit for whatsoever thou doth that is clever and full of glory. But if he slippeth up, and maketh a wrong calculation, or pulleth a boner of any kind whatsoever, he shall lay the mistake at thy door when he is called to account and he shall say, ‘What can you
Margot Lee Shetterly (Hidden Figures: The American Dream and the Untold Story of the Black Women Mathematicians Who Helped Win the Space Race)
The big change has been in the hardware/software cost ratio. The buyer of a $2-million machine in 1960 felt that he could afford $250,000 more for a customized payroll program, one that slipped easily and nondisruptively into the computer-hostile social environment. Buyers of $50,000 office machines today cannot conceivably afford customized payroll programs; so they adapt their payroll procedures to the packages available.
Frederick P. Brooks Jr. (The Mythical Man-Month: Essays on Software Engineering)
In 2016, Tesla announced that every new vehicle would be equipped with all the hardware it needs to drive autonomously, including a bevy of sensors and an onboard computer running a neural network.2 The kicker: the autonomous AI software won’t be fully deployed. As it turns out, Tesla will test drivers against software simulations running in the background on the car’s computer. Only when the background program consistently simulates moves more safely than the driver does will the autonomous software be ready for prime time. At that point, Tesla will release the program through remote software updates. What this all means is that Tesla drivers will, in aggregate, be teaching the fleet of cars how to drive.
Paul R. Daugherty (Human + Machine: Reimagining Work in the Age of AI)
the battery icon at the top of the Home screen. The indicator light on the bottom edge will turn amber while the battery is charging and green when it is fully charged. Charging should take less than four hours using a Kindle AC adaptor. Charging using 3rd-party adapters or via USB should take less than four hours, but may take longer depending on the capability of the hardware. You can still use your Kindle whilst it is connected to your computer and charging via USB.
Amazon (Kindle Paperwhite User's Guide)
Imagine a computer. The monitor, keyboard, and processor are the hardware. Without any software to run it, your computer would be worthless. Your body is your hardware and your mindset is your operating system. It gives you access to the power of the hardware, and determines what software you can run. It lets you get the most out of your computer, allowing you to balance your checkbook and even create 3-D designs. Your mindset determines how you perceive and interact with the world.
Mike Cernovich (Gorilla Mindset)
I suspect that if we can build such ultra-intelligent machines, then the first one will be severely limited by the software we’ve written for it, and that we’ll have compensated for our lack of understanding about how to optimally program intelligence by building hardware with significantly more computing power than our brains have. After all, our neurons are no better or more numerous than those of dolphins, just differently connected, suggesting that software can sometimes be more important than hardware.
Max Tegmark (Our Mathematical Universe: My Quest for the Ultimate Nature of Reality)
I had a great deal of valuable knowledge - about genetics, computers, aikido, karate, hardware, chess, wine, cocktails, dancings, sexual positions, social protocols, and the probability of a fifty-six-game hitting streak occurring in the history of baseball. I knew so much shit and I still couldn't fix myself.
Graeme Simsion (The Rosie Project (Don Tillman, #1))
There was really no compelling reason for a software company to open business in the Silicon Valley. After all, Microsoft was based in Seattle, and Apple’s computers supported many fewer third-party developers than Microsoft. IBM, still the largest hardware, software and consulting company in the world, was based far away. The reason that a new industry boomed in Silicon Valley was, ultimately, that there was a lot of talent and money around.
Arun Rao (A History of Silicon Valley: The Greatest Creation of Wealth in the History of the Planet)
We can think of life as a self-replicating information-processing system whose information (software) determines both its behavior and the blueprints for its hardware.
Max Tegmark (Life 3.0: Being Human in the Age of Artificial Intelligence)
a digital design engineer, you would spend long hours going through the TTL Data Book familiarizing yourself with the types of TTL chips that were available. Once you knew all your tools, you could actually build the computer I showed in Chapter 17 out of TTL chips. Wiring the chips together is a lot easier than wiring individual transistors
Charles Petzold (Code: The Hidden Language of Computer Hardware and Software)
need a compatible AC adapter (sold separately) for the USB cable. When your Kindle is charging, a lightning bolt appears on the battery icon at the top of the Home screen. The indicator light on the bottom edge will turn amber while the battery is charging and green when it is fully charged. Charging should take less than four hours using a Kindle AC adapter. Charging using 3rd party adapters or via USB should take less than four hours, but may take longer depending on the capability of the hardware. You can still use your Kindle while it is connected to your computer and charging via USB. To do so, unmount or eject it so that your Kindle exits USB drive mode. Windows: Right-click on the "Safely remove hardware" icon in the lower right-hand corner of the task bar and follow the onscreen instructions
Amazon (Kindle Paperwhite User's Guide 2nd Edition)
though I spotted Bernie Nordman, co-owner of Ace Hardware, make her way into the computer/library/board game back room with a steaming mug in one hand and what appeared to be a cherry Danish in the other. My
Jess Lourey (January Thaw (Murder by Month Romcom Mystery #9))
though I spotted Bernie Nordman, co-owner of Ace Hardware, make her way into the computer/library/board game back room with a steaming mug in one hand and what appeared to be a cherry Danish in
Jess Lourey (January Thaw (Murder by Month Romcom Mystery #9))
Today’s computers use transistors. When used in computers, transistors basically function the same way relays do, but (as we’ll see) they’re much faster and much smaller and much quieter and use much less power and are much cheaper. Building an 8-Bit Adder still requires 144 transistors (more if you replace the ripple carry with a look-ahead carry), but the circuit is microscopic. Chapter 13. But What About Subtraction? After you’ve convinced yourself that relays can indeed be wired together to add binary numbers, you might ask, “But what about subtraction?” Rest assured that you’re not making a nuisance of yourself by asking questions like this; you’re actually being quite perceptive. Addition and subtraction complement each other in some ways, but the mechanics of the two operations are different. An addition marches consistently from the rightmost column of digits to the leftmost column. Each carry from one column is added to the next column. We don’t carry in subtraction, however; we borrow, and that involves an intrinsically different mechanism—a messy back-and-forth kind of thing. For example, let’s look at a typical borrow-laden subtraction
Charles Petzold (Code: The Hidden Language of Computer Hardware and Software)