SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
Computer Currents
           Miguel Rebollo

  Introduction to Computer Science
              2009-2010
Aims
•   What is a computer and what it does

•   Study current trends in the evolution of modern
    computers

•   Analyse the fundamental differences between
    computers and other machines

•   Know the relationship between hardware and
    software

•   Classify the different kinds of computers

•   Understand the social and ethical impact of
    information technology on our society
                  4626. Introd to Computer Science
General perspective
• Computers are machines that converts
  input data into output information




• Computer’s versatility is built upon its
  software
               4626. Introd to Computer Science
Computers in
         perspective
• 1939: first programmable, general-purpose,
  digital machine (Konrad Zuse)
• 1943: first electronic, digital computer (Alan
  Turing)
• 1944: IBM develops Mark I (based on
  Babbage’s analytical machine)
• 1946: ENIAC, Univ. Pennsylvania
• 1951: UNIVAC, first commercial computer
               4626. Introd to Computer Science
Computer’s evolution
             60 years of transistor (1947-2007)



 vacuum
                                                       transistors
  tubes



integrated                                               micro-
  circuits                                             processor

                    4626. Introd to Computer Science
Computers today
• Supercomputers
• Servers
• Workstations
• Personal computers
• Portable computers
• Specific purpose computers
             4626. Introd to Computer Science
Mainframes and
         supercomputers
•   cost: 1,000,000 €

•   used by large organisations

•   huge computations tasks

•   time sharing: to give short time
    periods to each user

•   supercomputers: intensive calculus



                     4626. Introd to Computer Science
Servers

                     •    provide services (sw
                          resources) to several
                          users among a network

                     •    servers are specifically
                          designed to this work




4626. Introd to Computer Science
Workstations

•   high-end desktop
    computers

•   for users who need
    massive computer
    power

•   scientific applications




                     4626. Introd to Computer Science
Personal computers

                      •    serve a single user at a
                           time

                      •    powerful enough for
                           common applications, and
                           cheaper

                      •    IBM PC is not the only
                           personal computer (PC)




     4626. Introd to Computer Science
First IBM PC




  4626. Introd to Computer Science
Portable computers

•   machines that are not tied to
    the desktop (less than 3 kg)

•   same power as PC

•   in the border line: handheld
    computers and PDAs
    (personal digital assistant)




                     4626. Introd to Computer Science
Specific purpose
              •    dedicated computers that
                   performs specific tasks

              •    their programs cannot be
                   changed easily, because they’re
                   stored in their circuits

              •    embedded computers:
                   integrated in a lot of devices
                   (as electronic equipment or
                   household appliances)


    4626. Introd to Computer Science
Is this a computer?
     4626. Introd to Computer Science
And these?
 4626. Introd to Computer Science
Computer connections
• They appear when terminals are
  substituted by PC (60s) →LAN
• Allow to share resources among
  computers and to communicate
• Joined forming bigger networks (WAN)
 • use of standard telephonic lines
 • extended to domestic users in 90s
             4626. Introd to Computer Science
Internet revolution
• Born for educational and research instit.
• Closely related with WWW development
• Current alternatives to connections:
 •   network computers (NC)

 •   household appliances

 •   games and set-top boxes

 •   cell phones

                   4626. Introd to Computer Science
Main applications
• Productivity tools
• Graphics and digital photography
• Digital sound and video. Multimedia
• Telecomm. and networks
• Artificial intelligence
• Entertainment
• General problem resolution
              4626. Introd to Computer Science
Social and ethic
         problems
• Threat to personal privacy
• Difficulty to keep data secure
• Difficulty to protect property
• Risk to failures
• Threat to work automation and
  deshumanisation
• High dependence of tech
             4626. Introd to Computer Science
does technology have
     to change?
...or is the people who
     has to change?

Contenu connexe

Similaire à Computer Currents

Early computers, history , and its types (The institute of chartered accounta...
Early computers, history , and its types (The institute of chartered accounta...Early computers, history , and its types (The institute of chartered accounta...
Early computers, history , and its types (The institute of chartered accounta...Hemita Dua
 
Hardware basics: inside the box
Hardware basics: inside the boxHardware basics: inside the box
Hardware basics: inside the boxMiguel Rebollo
 
Computer Architecture
Computer ArchitectureComputer Architecture
Computer ArchitectureHaris456
 
unit09-1212598883113378-9.pdf
unit09-1212598883113378-9.pdfunit09-1212598883113378-9.pdf
unit09-1212598883113378-9.pdfSagarBurnah
 
unit09-1212598883113378-9.pdf
unit09-1212598883113378-9.pdfunit09-1212598883113378-9.pdf
unit09-1212598883113378-9.pdfSagarBurnah
 
An introduction to Computer Technology
An introduction to Computer TechnologyAn introduction to Computer Technology
An introduction to Computer TechnologySteven Heath
 
OpenNebulaConf2015 2.06 OpenNebula in the Wild - Ander Astudillo
OpenNebulaConf2015 2.06 OpenNebula in the Wild - Ander AstudilloOpenNebulaConf2015 2.06 OpenNebula in the Wild - Ander Astudillo
OpenNebulaConf2015 2.06 OpenNebula in the Wild - Ander AstudilloOpenNebula Project
 
BASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWARE
BASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWAREBASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWARE
BASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWAREosamawajid
 
Introduction To Computing (Evolution of Computers)
Introduction To Computing (Evolution of Computers) Introduction To Computing (Evolution of Computers)
Introduction To Computing (Evolution of Computers) Mian Zain Latif
 
computer application in hospitality Industry, periyar university unit 1
computer application in hospitality Industry, periyar university  unit 1computer application in hospitality Industry, periyar university  unit 1
computer application in hospitality Industry, periyar university unit 1admin information
 
computer applicationin hospitality Industry1 periyar university unit1
computer applicationin hospitality Industry1 periyar university  unit1computer applicationin hospitality Industry1 periyar university  unit1
computer applicationin hospitality Industry1 periyar university unit1admin information
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and RisksMiguel Rebollo
 
lesson1-141205082101-conversion-gate01.pdf
lesson1-141205082101-conversion-gate01.pdflesson1-141205082101-conversion-gate01.pdf
lesson1-141205082101-conversion-gate01.pdfMakarandManikpuri
 
Chap1 computer basics
Chap1 computer basicsChap1 computer basics
Chap1 computer basicsraksharao
 

Similaire à Computer Currents (20)

Software Basics
Software BasicsSoftware Basics
Software Basics
 
Early computers, history , and its types (The institute of chartered accounta...
Early computers, history , and its types (The institute of chartered accounta...Early computers, history , and its types (The institute of chartered accounta...
Early computers, history , and its types (The institute of chartered accounta...
 
Hardware basics: inside the box
Hardware basics: inside the boxHardware basics: inside the box
Hardware basics: inside the box
 
Computer Architecture
Computer ArchitectureComputer Architecture
Computer Architecture
 
unit09-1212598883113378-9.pdf
unit09-1212598883113378-9.pdfunit09-1212598883113378-9.pdf
unit09-1212598883113378-9.pdf
 
unit09-1212598883113378-9.pdf
unit09-1212598883113378-9.pdfunit09-1212598883113378-9.pdf
unit09-1212598883113378-9.pdf
 
Chap1 basic
Chap1 basicChap1 basic
Chap1 basic
 
An introduction to Computer Technology
An introduction to Computer TechnologyAn introduction to Computer Technology
An introduction to Computer Technology
 
OpenNebulaConf2015 2.06 OpenNebula in the Wild - Ander Astudillo
OpenNebulaConf2015 2.06 OpenNebula in the Wild - Ander AstudilloOpenNebulaConf2015 2.06 OpenNebula in the Wild - Ander Astudillo
OpenNebulaConf2015 2.06 OpenNebula in the Wild - Ander Astudillo
 
BASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWARE
BASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWAREBASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWARE
BASIC COMPUTER, ABOUT COM, HISTORY OF COMPUTER AND SOFTWARE
 
Introduction To Computing (Evolution of Computers)
Introduction To Computing (Evolution of Computers) Introduction To Computing (Evolution of Computers)
Introduction To Computing (Evolution of Computers)
 
Unit i
Unit  iUnit  i
Unit i
 
computer application in hospitality Industry, periyar university unit 1
computer application in hospitality Industry, periyar university  unit 1computer application in hospitality Industry, periyar university  unit 1
computer application in hospitality Industry, periyar university unit 1
 
computer applicationin hospitality Industry1 periyar university unit1
computer applicationin hospitality Industry1 periyar university  unit1computer applicationin hospitality Industry1 periyar university  unit1
computer applicationin hospitality Industry1 periyar university unit1
 
Unit I
Unit  IUnit  I
Unit I
 
Unit i
Unit  iUnit  i
Unit i
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
lesson1-141205082101-conversion-gate01.pdf
lesson1-141205082101-conversion-gate01.pdflesson1-141205082101-conversion-gate01.pdf
lesson1-141205082101-conversion-gate01.pdf
 
Chap1 computer basics
Chap1 computer basicsChap1 computer basics
Chap1 computer basics
 
Chap003
Chap003Chap003
Chap003
 

Plus de Miguel Rebollo

GTG-CoL: A Decentralized Federated Learning Based on Consensus for Dynamic N...
 GTG-CoL: A Decentralized Federated Learning Based on Consensus for Dynamic N... GTG-CoL: A Decentralized Federated Learning Based on Consensus for Dynamic N...
GTG-CoL: A Decentralized Federated Learning Based on Consensus for Dynamic N...Miguel Rebollo
 
Co-Learning: Consensus-based Learning for Multi-Agent Systems
 Co-Learning: Consensus-based Learning for Multi-Agent Systems Co-Learning: Consensus-based Learning for Multi-Agent Systems
Co-Learning: Consensus-based Learning for Multi-Agent SystemsMiguel Rebollo
 
Análisis de la red de autores de ciencia ficción de Clarkesworld
Análisis de la red de autores de ciencia ficción de ClarkesworldAnálisis de la red de autores de ciencia ficción de Clarkesworld
Análisis de la red de autores de ciencia ficción de ClarkesworldMiguel Rebollo
 
Y sin embargo... se mueve. Dinámica de las redes complejas
Y sin embargo... se mueve. Dinámica de las redes complejasY sin embargo... se mueve. Dinámica de las redes complejas
Y sin embargo... se mueve. Dinámica de las redes complejasMiguel Rebollo
 
Exámenes en grupo y pruebas de corrección como alternativas a la evaluación
Exámenes en grupo y pruebas de corrección como alternativas a la evaluaciónExámenes en grupo y pruebas de corrección como alternativas a la evaluación
Exámenes en grupo y pruebas de corrección como alternativas a la evaluaciónMiguel Rebollo
 
Gamification. Key Concepts
Gamification. Key ConceptsGamification. Key Concepts
Gamification. Key ConceptsMiguel Rebollo
 
Using Distributed Risk Maps by Consensus as a Complement to Contact Tracing Apps
Using Distributed Risk Maps by Consensus as a Complement to Contact Tracing AppsUsing Distributed Risk Maps by Consensus as a Complement to Contact Tracing Apps
Using Distributed Risk Maps by Consensus as a Complement to Contact Tracing AppsMiguel Rebollo
 
Distributed Ledger and Robust Consensus for Agreements
Distributed Ledger and Robust Consensus for AgreementsDistributed Ledger and Robust Consensus for Agreements
Distributed Ledger and Robust Consensus for AgreementsMiguel Rebollo
 
Detección de nodos tramposos en procesos de consenso en redes
Detección de nodos tramposos en procesos de consenso en redesDetección de nodos tramposos en procesos de consenso en redes
Detección de nodos tramposos en procesos de consenso en redesMiguel Rebollo
 
La hora del código: ApS para fomentar el pensamiento computacional
La hora del código: ApS para fomentar el pensamiento computacionalLa hora del código: ApS para fomentar el pensamiento computacional
La hora del código: ApS para fomentar el pensamiento computacionalMiguel Rebollo
 
Procesos de enseñanza-aprendizaje en red
Procesos de enseñanza-aprendizaje en redProcesos de enseñanza-aprendizaje en red
Procesos de enseñanza-aprendizaje en redMiguel Rebollo
 
desarrollo de competencias a través de narrativas transmedia
desarrollo de competencias a través de narrativas transmediadesarrollo de competencias a través de narrativas transmedia
desarrollo de competencias a través de narrativas transmediaMiguel Rebollo
 
Distributed Group Analytical Hierarchical Process by Consensus
 Distributed Group Analytical Hierarchical Process by Consensus Distributed Group Analytical Hierarchical Process by Consensus
Distributed Group Analytical Hierarchical Process by ConsensusMiguel Rebollo
 
Análisis de ciudades a través de su actividad en redes sociales
Análisis de ciudades a través de su actividad en redes socialesAnálisis de ciudades a través de su actividad en redes sociales
Análisis de ciudades a través de su actividad en redes socialesMiguel Rebollo
 
Análisis de datos en redes sociales
Análisis de datos en redes socialesAnálisis de datos en redes sociales
Análisis de datos en redes socialesMiguel Rebollo
 
The multigent Layer for CALMeD SURF
The multigent Layer for CALMeD SURFThe multigent Layer for CALMeD SURF
The multigent Layer for CALMeD SURFMiguel Rebollo
 
Narrativa transmedia en el aula
Narrativa transmedia en el aulaNarrativa transmedia en el aula
Narrativa transmedia en el aulaMiguel Rebollo
 
Using geo-tagged sentiment to better understand social interactions
 Using geo-tagged sentiment to better understand social interactions Using geo-tagged sentiment to better understand social interactions
Using geo-tagged sentiment to better understand social interactionsMiguel Rebollo
 
Transport Network Analysis for Smart Open Fleets
Transport Network Analysis for Smart Open FleetsTransport Network Analysis for Smart Open Fleets
Transport Network Analysis for Smart Open FleetsMiguel Rebollo
 
Análisis de sentimientos en Twitter mediante HMM
Análisis de sentimientos en Twitter mediante HMMAnálisis de sentimientos en Twitter mediante HMM
Análisis de sentimientos en Twitter mediante HMMMiguel Rebollo
 

Plus de Miguel Rebollo (20)

GTG-CoL: A Decentralized Federated Learning Based on Consensus for Dynamic N...
 GTG-CoL: A Decentralized Federated Learning Based on Consensus for Dynamic N... GTG-CoL: A Decentralized Federated Learning Based on Consensus for Dynamic N...
GTG-CoL: A Decentralized Federated Learning Based on Consensus for Dynamic N...
 
Co-Learning: Consensus-based Learning for Multi-Agent Systems
 Co-Learning: Consensus-based Learning for Multi-Agent Systems Co-Learning: Consensus-based Learning for Multi-Agent Systems
Co-Learning: Consensus-based Learning for Multi-Agent Systems
 
Análisis de la red de autores de ciencia ficción de Clarkesworld
Análisis de la red de autores de ciencia ficción de ClarkesworldAnálisis de la red de autores de ciencia ficción de Clarkesworld
Análisis de la red de autores de ciencia ficción de Clarkesworld
 
Y sin embargo... se mueve. Dinámica de las redes complejas
Y sin embargo... se mueve. Dinámica de las redes complejasY sin embargo... se mueve. Dinámica de las redes complejas
Y sin embargo... se mueve. Dinámica de las redes complejas
 
Exámenes en grupo y pruebas de corrección como alternativas a la evaluación
Exámenes en grupo y pruebas de corrección como alternativas a la evaluaciónExámenes en grupo y pruebas de corrección como alternativas a la evaluación
Exámenes en grupo y pruebas de corrección como alternativas a la evaluación
 
Gamification. Key Concepts
Gamification. Key ConceptsGamification. Key Concepts
Gamification. Key Concepts
 
Using Distributed Risk Maps by Consensus as a Complement to Contact Tracing Apps
Using Distributed Risk Maps by Consensus as a Complement to Contact Tracing AppsUsing Distributed Risk Maps by Consensus as a Complement to Contact Tracing Apps
Using Distributed Risk Maps by Consensus as a Complement to Contact Tracing Apps
 
Distributed Ledger and Robust Consensus for Agreements
Distributed Ledger and Robust Consensus for AgreementsDistributed Ledger and Robust Consensus for Agreements
Distributed Ledger and Robust Consensus for Agreements
 
Detección de nodos tramposos en procesos de consenso en redes
Detección de nodos tramposos en procesos de consenso en redesDetección de nodos tramposos en procesos de consenso en redes
Detección de nodos tramposos en procesos de consenso en redes
 
La hora del código: ApS para fomentar el pensamiento computacional
La hora del código: ApS para fomentar el pensamiento computacionalLa hora del código: ApS para fomentar el pensamiento computacional
La hora del código: ApS para fomentar el pensamiento computacional
 
Procesos de enseñanza-aprendizaje en red
Procesos de enseñanza-aprendizaje en redProcesos de enseñanza-aprendizaje en red
Procesos de enseñanza-aprendizaje en red
 
desarrollo de competencias a través de narrativas transmedia
desarrollo de competencias a través de narrativas transmediadesarrollo de competencias a través de narrativas transmedia
desarrollo de competencias a través de narrativas transmedia
 
Distributed Group Analytical Hierarchical Process by Consensus
 Distributed Group Analytical Hierarchical Process by Consensus Distributed Group Analytical Hierarchical Process by Consensus
Distributed Group Analytical Hierarchical Process by Consensus
 
Análisis de ciudades a través de su actividad en redes sociales
Análisis de ciudades a través de su actividad en redes socialesAnálisis de ciudades a través de su actividad en redes sociales
Análisis de ciudades a través de su actividad en redes sociales
 
Análisis de datos en redes sociales
Análisis de datos en redes socialesAnálisis de datos en redes sociales
Análisis de datos en redes sociales
 
The multigent Layer for CALMeD SURF
The multigent Layer for CALMeD SURFThe multigent Layer for CALMeD SURF
The multigent Layer for CALMeD SURF
 
Narrativa transmedia en el aula
Narrativa transmedia en el aulaNarrativa transmedia en el aula
Narrativa transmedia en el aula
 
Using geo-tagged sentiment to better understand social interactions
 Using geo-tagged sentiment to better understand social interactions Using geo-tagged sentiment to better understand social interactions
Using geo-tagged sentiment to better understand social interactions
 
Transport Network Analysis for Smart Open Fleets
Transport Network Analysis for Smart Open FleetsTransport Network Analysis for Smart Open Fleets
Transport Network Analysis for Smart Open Fleets
 
Análisis de sentimientos en Twitter mediante HMM
Análisis de sentimientos en Twitter mediante HMMAnálisis de sentimientos en Twitter mediante HMM
Análisis de sentimientos en Twitter mediante HMM
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Dernier (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Computer Currents

  • 1. Computer Currents Miguel Rebollo Introduction to Computer Science 2009-2010
  • 2. Aims • What is a computer and what it does • Study current trends in the evolution of modern computers • Analyse the fundamental differences between computers and other machines • Know the relationship between hardware and software • Classify the different kinds of computers • Understand the social and ethical impact of information technology on our society 4626. Introd to Computer Science
  • 3. General perspective • Computers are machines that converts input data into output information • Computer’s versatility is built upon its software 4626. Introd to Computer Science
  • 4. Computers in perspective • 1939: first programmable, general-purpose, digital machine (Konrad Zuse) • 1943: first electronic, digital computer (Alan Turing) • 1944: IBM develops Mark I (based on Babbage’s analytical machine) • 1946: ENIAC, Univ. Pennsylvania • 1951: UNIVAC, first commercial computer 4626. Introd to Computer Science
  • 5. Computer’s evolution 60 years of transistor (1947-2007) vacuum transistors tubes integrated micro- circuits processor 4626. Introd to Computer Science
  • 6. Computers today • Supercomputers • Servers • Workstations • Personal computers • Portable computers • Specific purpose computers 4626. Introd to Computer Science
  • 7. Mainframes and supercomputers • cost: 1,000,000 € • used by large organisations • huge computations tasks • time sharing: to give short time periods to each user • supercomputers: intensive calculus 4626. Introd to Computer Science
  • 8. Servers • provide services (sw resources) to several users among a network • servers are specifically designed to this work 4626. Introd to Computer Science
  • 9. Workstations • high-end desktop computers • for users who need massive computer power • scientific applications 4626. Introd to Computer Science
  • 10. Personal computers • serve a single user at a time • powerful enough for common applications, and cheaper • IBM PC is not the only personal computer (PC) 4626. Introd to Computer Science
  • 11. First IBM PC 4626. Introd to Computer Science
  • 12. Portable computers • machines that are not tied to the desktop (less than 3 kg) • same power as PC • in the border line: handheld computers and PDAs (personal digital assistant) 4626. Introd to Computer Science
  • 13. Specific purpose • dedicated computers that performs specific tasks • their programs cannot be changed easily, because they’re stored in their circuits • embedded computers: integrated in a lot of devices (as electronic equipment or household appliances) 4626. Introd to Computer Science
  • 14. Is this a computer? 4626. Introd to Computer Science
  • 15. And these? 4626. Introd to Computer Science
  • 16. Computer connections • They appear when terminals are substituted by PC (60s) →LAN • Allow to share resources among computers and to communicate • Joined forming bigger networks (WAN) • use of standard telephonic lines • extended to domestic users in 90s 4626. Introd to Computer Science
  • 17. Internet revolution • Born for educational and research instit. • Closely related with WWW development • Current alternatives to connections: • network computers (NC) • household appliances • games and set-top boxes • cell phones 4626. Introd to Computer Science
  • 18. Main applications • Productivity tools • Graphics and digital photography • Digital sound and video. Multimedia • Telecomm. and networks • Artificial intelligence • Entertainment • General problem resolution 4626. Introd to Computer Science
  • 19. Social and ethic problems • Threat to personal privacy • Difficulty to keep data secure • Difficulty to protect property • Risk to failures • Threat to work automation and deshumanisation • High dependence of tech 4626. Introd to Computer Science
  • 20. does technology have to change?
  • 21. ...or is the people who has to change?