History of IBM Developments

1956 - FIRST MAGNETIC HARD DISK. IBM introduces the world's first magnetic hard disk for data storage. RAMAC (or Random Access Method of Accounting and Control) offers unprecedented performance by permitting random access to any of the million characters distributed over both sides of 50 two-foot-diameter disks. Produced in San Jose, California, IBM's first hard disk stored about 2,000 bits of data per square inch and had a purchase price of about $10,000 per megabyte. By 1997, the cost of storing a megabyte had dropped to around ten cents.

1957 - FORTRAN. IBM revolutionizes programming with the introduction of FORTRAN (Formula Translator). Created by John Backus, it soon becomes the most widely used computer programming language for technical work. For the first time, engineers and scientists can write computer programs in more natural forms, such as C=A/B rather than as strings of "machine language: 1s and 0s.

1997 - DEEP BLUE. The 32-node IBM RS/6000 SP supercomputer, Deep Blue, defeated World Chess Champion Garry Kasparov in the first known instance of a computer vanquishing a world champion chess player in tournament-style competition. Also after years of teamwork among Research and Microelectronics divisions, IBM introduced the CMOS 7S process, which allowed manufacturers to use copper wires to link transistors in computer chips instead of relying on traditional aluminum interconnects; a revolutionary advance in semiconductor technology.



Sunday, October 21, 2012


Middle Eastern oil and gas companies have been targeted in massive attacks on their computer networks in an increasingly open cyber war where a new virus was discovered just this past week.

The United States and Israel, believed to behind the first cyber sabotage campaign that targeted Iran's nuclear program, are now worried about becoming targeted themselves.

"There have been increasing efforts to carry out cyber attacks on Israel's computer infrastructure," Prime Minister Benjamin Netanyahu said earlier this month, without giving details.

Netanyahu spoke just days after Washington issued a veiled warning to Iran over digital attacks and outlined a new digital warfare doctrine.

U.S. Defense Secretary Leon Panetta also referred publicly for the first time about the "Shamoon" virus that hit Saudi Arabia's state oil company Aramco in August, disabling more than 300,000 computers.

The virus also hit Rasgas, a joint venture between US oil firm Exxon Mobil Corp and state-controlled Qatar Petroleum.

Panetta called the sophisticated virus "the most destructive attack that the private sector has seen to date."

It took Aramco, the world's biggest oil company, two weeks after the August 15 attack to restore its main internal network, but the group said that oil production had not been disrupted.

However the threat that digital attacks could cripple vital infrastructure is real, with Panetta warning of the possibility of a "cyber-Pearl Harbor" to justify a policy of moving aggressively against threats.

A disruption to Saudi Arabia's oil exports could cause oil prices to spike from their already elevated prices and tip the fragile global economy into recession.

In what was interpreted as a veiled threat against Iran, Panetta said the U.S. military "has developed the capability to conduct effective operations to counter (cyber) threats to our national interests."

A senior U.S. administration official, who spoke on condition of anonymity, told AFP the cyber-attack on the Gulf oil giants was believed to be carried out by a "state actor" and acknowledged that Iran would be a prime suspect.

U.S. officials have "more than a suspicion" that Iran was to blame for the August attacks, said James Lewis, who has worked for the State Department and other government agencies on national security and cyber issues and who is now a senior fellow at the Center for Strategic and International Studies think tank.

He said the U.S. authorities were used to cyber espionage from Russia and China, but were surprised by the swift rise in Iran's digital warfare capability.

"A lot of people didn't think it would develop this quickly," he said.

However it is unsurprising that Iran would seek a cyber-warfare capability after having hundreds of centrifuges used to enrich uranium ruined by the Stuxnet virus in 2010.

Stuxnet marked a transformation for computer viruses, which had previously been used for spying or by organized crime, into a tool for sabotage.

It is widely suspected to have been the work of the United States and Israel, which believe Iran's nuclear program aims to produce a bomb.

Tehran insists its nuclear program is for peaceful uses only. Iran has been victim of other digital attacks as well.

In April it was forced to unplug computers at its Kharg oil terminal from the Internet after they came under cyber-attack, and in November last year an explosion at a missile terminal was attributed by U.S. media to a computer virus.

Only 'scratched the surface' of cyber warfare in Middle East

Kaspersky Labs, which detected the "Flame" and "Gauss" viruses believed behind those attacks, announced Monday it had found a new cyber espionage weapon it dubbed "miniFlame.”

It described the virus as "a high precision, surgical attack tool ... designed to steal data and control infected systems during targeted cyber espionage operations."

Kaspersky said "we have only just scratched the surface of the massive cyber espionage operations ongoing in the Middle East. Their full purpose remains obscure and the identity of the victims and the attackers remains unknown."

Christian Harbulot, the head of the Economic Warfare School in Paris, warned that "it is extremely difficult to undo the knot" in what is also a propaganda war.

He said Iran could be behind the "Shamoon" virus, but that "it could be an additional pretext to weaken Iran" which is already under international embargo over its nuclear program.

For Nicolas Arpagian at France's National Institute of Advanced Security and Justice Studies, the latest attacks "show that arsenal of digital weapons is getting bigger, and that when you have such an arsenal the use of cyber weapons is bound to become more commonplace."

No comments:

Post a Comment