RSS

New year, new horizons, and an old video…

03 Jan

As I promised when I started this blog… I’ve been working on a series of videos about the History of Programming.  The overall video has been done for a very long time, almost 6 months, but with some of the limitations on size of uploads to YouTube, I’ve had to break the video up into a 6 part series.

So without further delay, here is Part 1 of the History of Programming:

Be on the lookout for parts 2 – 6 in the coming days.

Mike

More to come…

Advertisements
 
2 Comments

Posted by on January 3, 2012 in Opinion

 

2 responses to “New year, new horizons, and an old video…

  1. AlisdairM

    January 3, 2012 at 10:22 pm

    Looking forward to seeing the rest of this – although I am curious what you are crediting as the creation of cryptography at such a late date. Substitution ciphers have a history going back a further millennium, maybe more. There are many ancient forms of sending encrypted or concealed messages, using other techniques from simple obfuscation (shave the messenger to read the message!) to more elaborate schemes requiring a physical ‘key’.

    I’m curious if the history will include notable dates regarding the criminalization of programming. Clearly we can look at modern statues regarding cryptography, patents, copyright abuse/DRM and banned kinds of communication such as in China, or closer to home. I have no idea how far back the establishment has felt threatened and needed to protect itself from information brokers though – maybe another article in its own right?

     
  2. techmana

    January 4, 2012 at 3:28 pm

    AlisdairM the reference I used for cryptography was from: http://en.wikipedia.org/wiki/Timeline_of_computing_hardware_2400_BC%E2%80%931949 and the actual quote was:

    Arab mathematician, Al-Kindi (Alkindus), was a pioneer of cryptography. He gave the first known recorded explanation of cryptanalysis in A Manuscript on Deciphering Cryptographic Messages. In particular, he is credited with developing the frequency analysis method whereby variations in the frequency of the occurrence of letters could be analyzed and exploited to break encryption ciphers (i.e. crypanalysis by frequency analysis).[4] The text also covers methods of cryptanalysis, encipherments, cryptanalysis of certain encipherments, and statistical analysis of letters and letter combinations in Arabic. (Taken from Wikipedia)

    So I was not looking at it from a first time concealing messages or information. I took it from the point of view of a system to be used later by a computer or a systematic approach.

    As for the rest of the series I don’t really focus on that area, I’m much more focused on the fact that programming and languages in particular have not advanced much since the 60’s.

    I’m now working on a birthday presentation for one language and has been very influential to modern programming and it should be done by the time all of the other parts are released.

    It would be interesting to do a session on the concept of “criminalization of programming.”

    Mike

     

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

 
%d bloggers like this: