1. From the Editor’s Desk
  2. Lars Heide
  3. pp. 2-3
  4. restricted access View | Download |
  1. Appropriation and Independence: BTM, Burroughs, and IBM at the Advent of the Computer Industry
  2. Jeffrey R. Yost
  3. pp. 5-17
  4. restricted access View | Download |
  1. Early Language and Compiler Developments at IBM Europe: A Personal Retrospection
  2. Albert Endres
  3. pp. 18-30
  4. restricted access View | Download |
  1. “Carrying a Bag”: Memoirs of an IBM Salesman, 1974–1981
  2. James W. Cortada
  3. pp. 32-47
  4. restricted access View | Download |
  1. This Is Not a Computer: Negotiating the Microprocessor
  2. Zbigniew Stachniak
  3. pp. 48-54
  4. restricted access View | Download |
  1. Computer Dealer Demos: Selling Home Computers with Bouncing Balls and Animated Logos
  2. Patryk Wasiak
  3. pp. 56-68
  4. restricted access View | Download |
  1. Burroughs Algol at Stanford University, 1960–1963
  2. Robert Braden
  3. pp. 69-73
  4. restricted access View | Download |
  1. Edward Feigenbaum
  2. David Alan Grier
  3. pp. 74-81
  4. restricted access View | Download |
  1. Events and Sightings
  2. Mai Sugimoto, Dag Spicer, David Walden
  3. pp. 82-85
  4. restricted access View | Download |
  1. Histories of Computing by Michael Sean Mahoney (review)
  2. Jonathan Coopersmith
  3. p. 86
  4. restricted access View | Download |
  1. Elysium directed by Neill Blomkamp and produced by TriStar Pictures (review)
  2. Anthony P. Pennino
  3. pp. 86-87
  4. restricted access View | Download |
  1. Computing: A Concise History by Paul E. Ceruzzi (review)
  2. Giuditta Parolini
  3. pp. 87-88
  4. restricted access View | Download |
  1. The Digital Flood: The Diffusion of Information Technology Across the U.S., Europe, and Asia by James W. Cortada (review)
  2. Benjamin Gross
  3. pp. 88-89
  4. restricted access View | Download |
  1. 2013 Annual Author and Subject Index
  2. pp. 90-93
  3. restricted access View | Download |
  1. Computers, Information, and Everyday Life
  2. William Aspray
  3. pp. 96-95
  4. restricted access View | Download |