Remembering Chiptunes, The Demoscene And The Illegal Music Of Keygens

We loved keygens back in the day. Our lawyers advise us to clarify that it’s because of the demo-scene style music embedded in them, not because we used them for piracy. [Patch] must feel the same way, as he has a lovely historical retrospective out on “The Internet’s Most Illegal Music” (embedded below).

After defining what he’s talking about for the younger set, who may never have seen a keygen in this degenerate era of software-by-subscription, [Patch] traces the history of the jaunty chiptunes that were so often embedded in this genre of program. He starts with the early demoscene and its relationship with cracker groups — those are coders who circulate “cracked” versions of games, with the copyright protection removed. In the old days, they’d embed an extra loading screen to take credit for the dastardly deeds that our lawyer says to disavow.

Continue reading “Remembering Chiptunes, The Demoscene And The Illegal Music Of Keygens”

Screenshot of "Frame of Preference"

An Emulated Stroll Down Macintosh Memory Lane

If you’re into Macs, you’ll always remember your first. Maybe it was the revolutionary classic of 1984 fame, perhaps it was the adorable G3 iMac in 1998, or even a shiny OS X machine in the 21st century. Whichever it is, you’ll find it emulated in [Marcin Wichary]’s essay “Frame of preference: A history of Mac settings, 1984–2004” — an exploration of the control panel and its history.

Image of PowerBook showing the MacOS 8.0 desktop.
That’s not a photograph, it’s an emulator. (At least on the page. Here, it’s a screenshot.)

[Marcin] is a UI designer as well as an engineer and tech historian, and his UI chops come out in full force, commenting and critiquing Curputino’s coercions. The writing is excellent, as you’d expect from the man who wrote the book on keyboards, and it provides a fascinating look at the world of retrocomputing through the eyes of a designer. That design-focused outlook is very apropos for Apple in particular. (And NeXT, of course, because you can’t tell the story of Apple without it.)

There are ten emulators on the page, provided by [Mihai Parparita] of Infinite Mac. It’s like a virtual museum with a particularly knowledgeable tour guide — and it’s a blast, getting to feel hands-on, the design changes being discussed. There’s a certain amount of gamification, with each system having suggested tasks and a completion score when you finish reading. There are even Easter eggs.

This is everything we wish the modern web was like: the passionate deep-dives of personal sites on the Old Web, but enhanced and enabled by modern technology. If you’re missing those vintage Mac days and don’t want to explore them in browser, you can 3D print your own full-size replica, or a doll-sized picoMac.

Aiken’s Secret Computing Machines

This neat video from the [Computer History Archives Project] documents the development of the Aiken Mark I through Mark IV computers. Partly shrouded in the secrecy of World War II and the Manhattan Project effort, the Mark I, “Harvard’s Robot Super Brain”, was built and donated by IBM, and marked their entry into what we would now call the computer industry.

Numerous computing luminaries used the Mark I, aside from its designer Howard Aiken. Grace Hopper, Richard Bloch, and even John von Neumann all used the machine. It was an electromechanical computer, using gears, punch tape, relays, and a five horsepower motor to keep it all running in sync. If you want to dig into how it actually worked, the deliciously named patent “Calculator” goes into some detail.

The video goes on to tell the story of Aiken’s various computers, the rift between Harvard and IBM, and the transition of computation from mechanical to electronic. If this is computer history that you don’t know, it’s well worth a watch. (And let us know if you also think that they’re using computer-generated speech to narrate it.)

If “modern” computer history is more your speed, check out this documentary about ENIAC.

Continue reading “Aiken’s Secret Computing Machines”

Debugging A 1950s Computer Sounds Like A Pain

Debugging computers in the 1950s sounds like it wasn’t an easy task. That’s one of the interesting facts from this fascinating talk by [Guy Fedorkow] about the Whirlwind, one of the first digital computers ever built. The development of this remarkable computer started at MIT (Funded by the US Navy) in 1949 as a flight simulator but pivoted to plotting interceptions in the early 1950s. That was because the USSR had just set off their first boosted nuclear bomb, which could be mounted on a missile or bomber. So, the threat of incoming missiles and atomic bombers became real, and the need arose to intercept nuclear bombers.

As a real-time computer, Whirlwind received radar data from radar stations around the US that showed the location of the interceptor and the incoming bogey, then calculated the vector for the two to meet up and, erm, have a frank exchange of views. So, how do you debug one of the first real-time computers? Carefully, it seems.

Continue reading “Debugging A 1950s Computer Sounds Like A Pain”

History Of The SPARC CPU Architecture

[RetroBytes] nicely presents the curious history of the SPARC processor architecture. SPARC, short for Scalable Processor Architecture, defined some of the most commercially successful RISC processors during the 1980s and 1990s. SPARC was initially developed by Sun Microsystems, which most of us associate the SPARC but while most computer architectures are controlled by a single company, SPARC was championed by dozens of players.  The history of SPARC is not simply the history of Sun.

A Reduced Instruction Set Computer (RISC) design is based on an Instruction Set Architecture (ISA) that runs a limited number of simpler instructions than a Complex Instruction Set Computer (CISC) based on an ISA that comprises more, and more complex, instructions. With RISC leveraging simpler instructions, it generally requires a longer sequence of those simple instructions to complete the same task as fewer complex instructions in a CISC computer. The trade-off being the simple (more efficient) RISC instructions are usually run faster (at a higher clock rate) and in a highly pipelined fashion. Our overview of the modern ISA battles presents how the days of CISC are essentially over. Continue reading “History Of The SPARC CPU Architecture”

History Of Digital Equipment Corp And Bonus PDP-11 Replica Build

[RetroBytes] takes us on a whirlwind tour of the history of the Digital Equipment Corporation (DEC), its founder Ken Olsen, and during intermission builds up a working replica of the PDP-11 from a kit. DEC was a major player in the early computer industry, cranking out a number of models that were both industrial workhorses and used in computer laboratories to develop many of the operating systems and tools whose descendants we still use today. On top of that, DEC’s innovative, employee-friendly, and lightweight company structure was generally well-liked by its employees and a welcomed departure from the typical behemoths of the day.

This video takes us from the beginnings of DEC and its roots in MIT up to the PIP-11 era, highlighting major architectures and events along the way such as the PDP-1, PDP-8, and PDP-11. [RetroBytes] says he has a DEC Alpha sitting on the sidelines, so there may be a few follow-up videos in the future — perhaps one on the VAX as well.

We’ve covered this particular PDP-11 replica last year, and if these replica kits are your cup of tea, check out our coverage of kit designer [Oscar Vermeulen]’s presentation. Have you ever used real PDP or VAX computers? Let us know your war stories in the comments below.

Continue reading “History Of Digital Equipment Corp And Bonus PDP-11 Replica Build”

Classic Chat: Preserving Computer History

Among the many facets of modern technology, few have evolved faster or more radically than the computer.  In less than a century its very nature has changed significantly: today’s smartphones easily outperform desktop computers of the past, machines which themselves were thousands of times more powerful than the room-sized behemoths that ushered in the age of digital computing. The technology has developed so rapidly that an individual who’s now making their living developing iPhone applications could very well have started their career working with stacks of punch cards.

With things moving so quickly, it can be difficult to determine what’s worth holding onto from a historical perspective. Will last year’s Chromebook one day be a museum piece? What about those old Lotus 1-2-3 floppies you’ve got in the garage? Deciding what artifacts are worth preserving in such a fast moving field is just one of the challenges faced by Dag Spicer, the Senior Curator at the Computer History Museum (CHM) in Mountain View, California. Dag stopped by the Hack Chat back in June of 2019 to talk about the role of the CHM and other institutions like it in storing and protecting computing history for future generations.

To answer that most pressing question, what’s worth saving from the landfill, Dag says the CHM often follows what they call the “Ten Year Rule” before making a decision. That is to say, at least a decade should have gone by before a decision can be made about a particular artifact. They reason that’s long enough for hindsight to determine if the piece in question made a lasting impression on the computing world or not. Note that such impression doesn’t always have to be positive; pieces that the CHM deem “Interesting Failures” also find their way into the collection, as well as hardware which became important due to patent litigation.

Of course, there are times when this rule is sidestepped. Dag points to the release of the iPod and iPhone as a prime example. It was clear that one way or another Apple’s bold gambit was going to get recorded in the annals of computing history, so these gadgets were fast-tracked into the collection. Looking back on this decision in 2022, it’s clear they made the right call. When asked in the Chat if Dag had any thoughts on contemporary hardware that could have similar impact on the computing world, he pointed to Artificial Intelligence accelerators like Google’s Tensor Processing Unit.

In addition to the hardware itself, the CHM also maintains a collection of ephemera that serves to capture some of the institutional memory of the era. Notebooks from the R&D labs of Fairchild Semiconductor, or handwritten documents from Intel luminary Andrew Grove bring a human touch to a collection of big iron and beige boxes. These primary sources are especially valuable for those looking to research early semiconductor or computer development, a task that several in the Chat said staff from the Computer History Museum had personally assisted them with.

Towards the end of the Chat, a user asks why organizations like the CHM go through the considerable expense of keeping all these relics in climate controlled storage when we have the ability to photograph them in high definition, produce schematics of their internals, and emulate their functionality on far more capable systems. While Dag admits that emulation is probably the way to go if you’re only worried about the software side of things, he believes that images and diagrams simply aren’t enough to capture the true essence of these machines.

The CHM’s PDP-1 Demo Lab, image by Alexey Komarov.

Quoting the the words of early Digital Equipment Corporation engineer Gordon Bell, Dag says these computers are “beautiful sculptures” that “reflect the times of their creation” in a way that can’t easily be replicated. They represent not just the technological state-of-the-art but also the cultural milieu in which they were developed, with each and every design decision taking into account a wide array of variables ranging from contemporary aesthetics to material availability.

While 3D scans of a computer’s case and digital facsimiles of its internal components can serve to preserve some element of the engineering that went into these computers, they will never be able to capture the experience of seeing the real thing sitting in front of you. Any school child can tell you what the Mona Lisa looks like, but that doesn’t stop millions of people from waiting in line each year to see it at the Louvre.


The Hack Chat is a weekly online chat session hosted by leading experts from all corners of the hardware hacking universe. It’s a great way for hackers connect in a fun and informal way, but if you can’t make it live, these overview posts as well as the transcripts posted to Hackaday.io make sure you don’t miss out.