Number int64 1 7.61k | Text stringlengths 2 3.11k |
|---|---|
6,501 | Perforated paper tapes were first used by Basile Bouchon in 1725 to control looms. However, the paper tapes were expensive to create, fragile, and difficult to repair. By 1801, Joseph Marie Jacquard had developed machines to create paper tapes by tying punched cards in a sequence for Jacquard looms. The resulting paper... |
6,502 | In 1842, a French patent by Claude Seytre described a piano playing device that read data from perforated paper rolls. By 1900, wide perforated music rolls for player pianos were used to distribute popular music to mass markets. |
6,503 | In 1846, Alexander Bain used punched tape to send telegrams. This technology was adopted by Charles Wheatstone in 1857 for the Wheatstone system used for the automated preparation, storage and transmission of data in telegraphy. |
6,504 | In the 1880s, Tolbert Lanston invented the Monotype typesetting system, which consisted of a keyboard and a composition caster. The tape, punched with the keyboard, was later read by the caster, which produced lead type according to the combinations of holes in up to 31 positions. The tape reader used compressed air, w... |
6,505 | In the 21st century, punched tape is obsolete except among hobbyists. In computer numerical control machining applications, though paper tape has been superseded by digital memory, some modern systems still measure the size of stored CNC programs in feet or meters, corresponding to the equivalent length if the data we... |
6,506 | Data was represented by the presence or absence of a hole at a particular location. Tapes originally had five rows of holes for data across the width of the tape. Later tapes had more rows. A 1944 electro-mechanical programmable calculating machine, the Automatic Sequence Controlled Calculator or Harvard Mark I, used p... |
6,507 | A row of smaller sprocket holes was always punched to be used to synchronize tape movement. Originally, this was done using a wheel with radial teeth called a sprocket wheel. Later, optical readers made use of the sprocket holes to generate timing pulses. The sprocket holes were slightly closer to one edge of the tape,... |
6,508 | Many early machines used oiled paper tape, which was pre-impregnated with a light machine oil, to lubricate the reader and punch mechanisms. The oil impregnation usually made the paper somewhat translucent and slippery, and excess oil could transfer to clothing or any surfaces it contacted. Later optical tape readers o... |
6,509 | For heavy-duty or repetitive use, polyester Mylar tape was often used. This tough, durable plastic film was usually thinner than paper tapes, but could still be used in many devices originally designed for paper media. The plastic tape was sometimes transparent, but usually was aluminized to make it opaque enough for u... |
6,510 | Tape for punching was usually 0.00394 inches thick. The two most common widths were 11⁄16 inch for five bit codes, and 1 inch for tapes with six or more bits. Hole spacing was 0.1 inches in both directions. Data holes were 0.072 inches in diameter; sprocket feed holes were 0.046 inches . |
6,511 | Most tape-punching equipment used solid circular punches to create holes in the tape. This process created "chad", or small circular pieces of paper. Managing the disposal of chad was an annoying and complex problem, as the tiny paper pieces had a tendency to escape containment and to interfere with the other electrome... |
6,512 | A variation on the tape punch was a device called a Chadless Printing Reperforator. This machine would punch a received teleprinter signal into tape and print the message on it at the same time, using a printing mechanism similar to that of an ordinary page printer. The tape punch, rather than punching out the usual ro... |
6,513 | A disadvantage to this technology was that, once punched, chadless tape did not roll up well for storage, because the protruding flaps of paper would catch on the next layer of tape so it could not be coiled up tightly. Another disadvantage that emerged in time, was that there was no reliable way to read chadless tape ... |
6,514 | Text was encoded in several ways. The earliest standard character encoding was Baudot, which dates back to the 19th century and had five holes. The Baudot code was superseded by modified five-hole codes such as the Murray code which was developed into the Western Union code which was further developed into the Interna... |
6,515 | Punched tape was used as a way of storing messages for teletypewriters. Operators typed in the message to the paper tape, and then sent the message at the maximum line speed from the tape. This permitted the operator to prepare the message "off-line" at the operator's best typing speed, and permitted the operator to co... |
6,516 | The line typically operated at 75 WPM, but it operated continuously. By preparing the tape "off-line" and then sending the message with a tape reader, the line could operate continuously rather than depending on continuous "on-line" typing by a single operator. Typically, a single 75 WPM line supported three or more te... |
6,517 | Paper tape could be read into computers at up to 1,000 characters per second. In 1963, a Danish company called Regnecentralen introduced a paper tape reader called RC 2000 that could read 2,000 characters per second; later they increased the speed further, up to 2,500 cps. As early as World War II, the Heath Robinson t... |
6,518 | When the first minicomputers were being released, most manufacturers turned to the existing mass-produced ASCII teleprinters as a low-cost solution for keyboard input and printer output. The commonly specified Model 33 ASR included a paper tape punch/reader, where ASR stands for "Automatic Send/Receive" as opposed to ... |
6,519 | Binary data transfer to or from these minicomputers was often accomplished using a doubly encoded technique to compensate for the relatively high error rate of punches and readers. The low-level encoding was typically ASCII, further encoded and framed in various schemes such as Intel Hex, in which a binary value of "01... |
6,520 | In the 1970s, computer-aided manufacturing equipment often used paper tape. A paper tape reader was smaller and less expensive than Hollerith card or magnetic tape readers, and the medium was reasonably reliable in a manufacturing environment. Paper tape was an important storage medium for computer-controlled wire-wrap... |
6,521 | Premium black waxed and lubricated long-fiber papers, and Mylar film tape were developed so that heavily used production tapes would last longer. |
6,522 | In the 1970s through the early 1980s, paper tape was commonly used to transfer binary data for incorporation in either mask-programmable read-only memory chips or their erasable counterparts EPROMs. A significant variety of encoding formats were developed for use in computer and ROM/EPROM data transfer. Encoding forma... |
6,523 | A much more primitive as well as a much longer high-level encoding scheme was also used, BNPF , also written as BPNF . In BNPF encoding, a single byte would be represented by a highly redundant character framing sequence starting with a single uppercase ASCII "B", eight ASCII characters where a "0" would be represente... |
6,524 | NCR of Dayton, Ohio, made cash registers around 1970 that would punch paper tape. Sweda made similar cash registers around the same time. The tape could then be read into a computer and not only could sales information be summarized, billings could be done on charge transactions. The tape was also used for inventory tr... |
6,525 | Punched paper tape was used by the newspaper industry until the mid-1970s or later. Newspapers were typically set in hot lead by devices like Linotype machines. With the wire services coming into a device that would punch paper tape, rather than the Linotype operator having to retype all the incoming stories, the paper... |
6,526 | If an error was found at one position on the six-level tape, that character could be turned into a null character to be skipped by punching out the remaining non-punched positions with what was known as a “chicken plucker". It looked like a strawberry stem remover that, pressed with thumb and forefinger, could punch ou... |
6,527 | Vernam ciphers were invented in 1917 to encrypt teleprinter communications using a key stored on paper tape. During the last third of the 20th century, the National Security Agency used punched paper tape to distribute cryptographic keys. The eight-level paper tapes were distributed under strict accounting controls an... |
6,528 | Acid-free paper or Mylar tapes can be read many decades after manufacture, in contrast with magnetic tape that can deteriorate and become unreadable with time. The hole patterns of punched tape can be decoded by eye if necessary, and even editing of a tape is possible by manual cutting and splicing. Unlike magnetic tap... |
6,529 | Reliability of paper tape punching operations was a concern, so that for critical applications a new punched tape could be read after punching to verify the correct contents. Rewinding a tape required a takeup reel or other measures to avoid tearing or tangling the tape. In some uses, "fan fold" tape simplified handli... |
6,530 | A punched card is a piece of card stock that stores digital data using punched holes. Punched cards were once common in data processing and the control of automated machines. |
6,531 | Punched cards were widely used in the 20th century, where unit record machines, organized into data processing systems, used punched cards for data input, output, and storage. The IBM 12-row/80-column punched card format came to dominate the industry. Many early digital computers used punched cards as the primary mediu... |
6,532 | Data can be entered onto a punched card using a keypunch. |
6,533 | While punched cards are now obsolete as a storage medium, as of 2012, some voting machines still used punched cards to record votes. Punched cards also had a significant cultural impact in the 20th century. |
6,534 | The idea of control and data storage via punched holes was developed independently on several occasions in the modern period. In most cases there is no evidence that each of the inventors was aware of the earlier work. |
6,535 | Basile Bouchon developed the control of a loom by punched holes in paper tape in 1725. The design was improved by his assistant Jean-Baptiste Falcon and by Jacques Vaucanson. Although these improvements controlled the patterns woven, they still required an assistant to operate the mechanism. |
6,536 | In 1804 Joseph Marie Jacquard demonstrated a mechanism to automate loom operation. A number of punched cards were linked into a chain of any length. Each card held the instructions for shedding and selecting the shuttle for a single pass. |
6,537 | Semyon Korsakov was reputedly the first to propose punched cards in informatics for information store and search. Korsakov announced his new method and machines in September 1832. |
6,538 | Charles Babbage proposed the use of "Number Cards", "pierced with certain holes and stand opposite levers connected with a set of figure wheels ... advanced they push in those levers opposite to which there are no holes on the cards and thus transfer that number together with its sign" in his description of the Calcula... |
6,539 | In 1881 Jules Carpentier developed a method of recording and playing back performances on a harmonium using punched cards. The system was called the Mélographe Répétiteur and "writes down ordinary music played on the keyboard dans le langage de Jacquard", that is as holes punched in a series of cards. By 1887 Carpentie... |
6,540 | At the end of the 1800s Herman Hollerith invented the recording of data on a medium that could then be read by a machine, developing punched card data processing technology for the 1890 U.S. census. His tabulating machines read and summarized data stored on punched cards and they began use for government and commercial... |
6,541 | Initially, these electromechanical machines only counted holes, but by the 1920s they had units for carrying out basic arithmetic operations.: 124
Hollerith founded the Tabulating Machine Company which was one of four companies that were amalgamated via stock acquisition to form a fifth company, Computing-Tabulating-... |
6,542 | Both IBM and Remington Rand tied punched card purchases to machine leases, a violation of the US 1914 Clayton Antitrust Act. In 1932, the US government took both to court on this issue. Remington Rand settled quickly. IBM viewed its business as providing a service and that the cards were part of the machine. IBM fought... |
6,543 | "By 1937... IBM had 32 presses at work in Endicott, N.Y., printing, cutting and stacking five to 10 million punched cards every day." Punched cards were even used as legal documents, such as U.S. Government checks and savings bonds. |
6,544 | During World War II punched card equipment was used by the Allies in some of their efforts to decrypt Axis communications. See, for example, Central Bureau in Australia. At Bletchley Park in England, "some 2 million punched cards a week were being produced, indicating the sheer scale of this part of the operation". In ... |
6,545 | Punched card technology developed into a powerful tool for business data-processing. By 1950 punched cards had become ubiquitous in industry and government. "Do not fold, spindle or mutilate," a warning that appeared on some punched cards distributed as documents such as checks and utility bills to be returned for proc... |
6,546 | In 1956 IBM signed a consent decree requiring, amongst other things, that IBM would by 1962 have no more than one-half of the punched card manufacturing capacity in the United States. Tom Watson Jr.'s decision to sign this decree, where IBM saw the punched card provisions as the most significant point, completed the tr... |
6,547 | The Univac UNITYPER introduced magnetic tape for data entry in the 1950s. During the 1960s, the punched card was gradually replaced as the primary means for data storage by magnetic tape, as better, more capable computers became available. Mohawk Data Sciences introduced a magnetic tape encoder in 1965, a system market... |
6,548 | The terms punched card, punch card, and punchcard were all commonly used, as were IBM card and Hollerith card . IBM used "IBM card" or, later, "punched card" at first mention in its documentation and thereafter simply "card" or "cards". Specific formats were often indicated by the number of character positions availabl... |
6,549 | The Hollerith punched cards used for the 1890 U.S. census were blank. Following that, cards commonly had printing such that the row and column position of a hole could be easily seen. Printing could include having fields named and marked by vertical lines, logos, and more. "General purpose" layouts were also available... |
6,550 | Herman Hollerith was awarded three patents in 1889 for electromechanical tabulating machines. These patents described both paper tape and rectangular cards as possible recording media. The card shown in U.S. patent 395,781 of January 8 was printed with a template and had hole positions arranged close to the edges so th... |
6,551 | I was traveling in the West and I had a ticket with what I think was called a punch photograph...the conductor...punched out a description of the individual, as light hair, dark eyes, large nose, etc. So you see, I only made a punch photograph of each person.: 15 |
6,552 | When use of the ticket punch proved tiring and error-prone, Hollerith developed the pantograph "keyboard punch". It featured an enlarged diagram of the card, indicating the positions of the holes to be punched. A printed reading board could be placed under a card that was to be read manually.: 43 |
6,553 | Hollerith envisioned a number of card sizes. In an article he wrote describing his proposed system for tabulating the 1890 U.S. census, Hollerith suggested a card 3 by 5+1⁄2 inches of Manila stock "would be sufficient to answer all ordinary purposes." The cards used in the 1890 census had round holes, 12 rows and 24 c... |
6,554 | Later designs led to a card with ten rows, each row assigned a digit value, 0 through 9, and 45 columns.
This card provided for fields to record multi-digit numbers that tabulators could sum, instead of their simply counting cards. Hollerith's 45 column punched cards are illustrated in Comrie's The application of the ... |
6,555 | By the late 1920s, customers wanted to store more data on each punched card. Thomas J. Watson Sr., IBM's head, asked two of his top inventors, Clair D. Lake and J. Royden Pierce, to independently develop ways to increase data capacity without increasing the size of the punched card. Pierce wanted to keep round holes an... |
6,556 | This IBM card format, introduced in 1928, has rectangular holes, 80 columns, and 10 rows. Card size is 7+3⁄8 by 3+1⁄4 inches . The cards are made of smooth stock, 0.007 inches thick. There are about 143 cards to the inch . In 1964, IBM changed from square to round corners. They come typically in boxes of 2000 cards or... |
6,557 | Initially designed to record responses to yes–no questions, support for numeric, alphabetic and special characters was added through the use of columns and zones. The top three positions of a column are called zone punching positions, 12 , 11, and 0 . For decimal data the lower ten positions are called digit punching p... |
6,558 | Diagram: Note: The 11 and 12 zones were also called the X and Y zones, respectively. |
6,559 | In 1931, IBM began introducing upper-case letters and special characters . The 26 letters have two punches . The languages of Germany, Sweden, Denmark, Norway, Spain, Portugal and Finland require up to three additional letters; their punching is not shown here.: 88–90 Most special characters have two or three punches ... |
6,560 | For some computer applications, binary formats were used, where each hole represented a single binary digit , every column is treated as a simple bit field, and every combination of holes is permitted. |
6,561 | For example, on the IBM 701 and IBM 704, card data was read, using an IBM 711, into memory in row binary format. For each of the twelve rows of the card, 72 of the 80 columns would be read into two 36-bit words; a control panel was used to select the 72 columns to be read. Software would translate this data into the de... |
6,562 | As an aid to humans who had to deal with the punched cards, the IBM 026 and later 029 and 129 key punch machines could print human-readable text above each of the 80 columns. |
6,563 | As a prank, punched cards could be made where every possible punch position had a hole. Such "lace cards" lacked structural strength, and would frequently buckle and jam inside the machine. |
6,564 | The IBM 80-column punched card format dominated the industry, becoming known as just IBM cards, even though other companies made cards and equipment to process them. |
6,565 | One of the most common punched card formats is the IBM 5081 card format, a general purpose layout with no field divisions. This format has digits printed on it corresponding to the punch positions of the digits in each of the 80 columns. Other punched card vendors manufactured cards with this same layout and number. |
6,566 | Long cards were available with a scored stub on either end which, when torn off, left an 80 column card. The torn off card is called a stub card. |
6,567 | 80-column cards were available scored, on either end, creating both a short card and a stub card when torn apart. Short cards can be processed by other IBM machines. A common length for stub cards was 51 columns. Stub cards were used in applications requiring tags, labels, or carbon copies. |
6,568 | According to the IBM Archive: IBM's Supplies Division introduced the Port-A-Punch in 1958 as a fast, accurate means of manually punching holes in specially scored IBM punched cards. Designed to fit in the pocket, Port-A-Punch made it possible to create punched card documents anywhere. The product was intended for "on-t... |
6,569 | In 1969 IBM introduced a new, smaller, round-hole, 96-column card format along with the IBM System/3 low-end business computer. These cards have tiny, 1 mm diameter circular holes, smaller than those in paper tape. Data are stored in 6-bit BCD, with three rows of 32 characters each, or 8-bit EBCDIC. In this format, eac... |
6,570 | The Powers/Remington Rand card format was initially the same as Hollerith's; 45 columns and round holes. In 1930, Remington Rand leap-frogged IBM's 80 column format from 1928 by coding two characters in each of the 45 columns – producing what is now commonly called the 90-column card.: 142 There are two sets of six ro... |
6,571 | The British Powers-Samas company used a variety of card formats for their unit record equipment. They began with 45 columns and round holes. Later 36, 40 and 65 column cards were provided. A 130 column card was also available – formed by dividing the card into two rows, each row with 65 columns and each character space... |
6,572 | Mark sense cards, developed by Reynold B. Johnson at IBM, have printed ovals that could be marked with a special electrographic pencil. Cards would typically be punched with some initial information, such as the name and location of an inventory item. Information to be added, such as quantity of the item on hand, woul... |
6,573 | Aperture cards have a cut-out hole on the right side of the punched card. A piece of 35 mm microfilm containing a microform image is mounted in the hole. Aperture cards are used for engineering drawings from all engineering disciplines. Information about the drawing, for example the drawing number, is typically punched... |
6,574 | IBM's Fred M. Carroll developed a series of rotary presses that were used to produce punched cards, including a 1921 model that operated at 460 cards per minute . In 1936 he introduced a completely different press that operated at 850 cpm. Carroll's high-speed press, containing a printing cylinder, revolutionized the c... |
6,575 | Discarded printing plates from these card presses, each printing plate the size of an IBM card and formed into a cylinder, often found use as desk pen/pencil holders, and even today are collectible IBM artifacts . |
6,576 | In the mid-1930s a box of 1,000 cards cost $1.05 . |
6,577 | While punched cards have not been widely used for generations, the impact was so great for most of the 20th century that they still appear from time to time in popular culture. For example: |
6,578 | A common example of the requests often printed on punched cards which were to be individually handled, especially those intended for the public to use and return is "Do Not Fold, Spindle or Mutilate" .: 43–55 Coined by Charles A. Phillips, it became a motto for the post–World War II era , and was widely mocked and sat... |
6,579 | ANSI INCITS 21-1967 , Rectangular Holes in Twelve-Row Punched Cards ) Specifies the size and location of rectangular holes in twelve-row 3+1⁄4-inch-wide punched cards. |
6,580 | ANSI X3.11-1990 American National Standard Specifications for General Purpose Paper Cards for Information Processing |
6,581 | ANSI X3.26-1980 Hollerith Punched Card Code |
6,582 | ISO 1681:1973 Information processing – Unpunched paper cards – Specification |
6,583 | ISO 6586:1980 Data processing – Implementation of the ISO 7- bit and 8- bit coded character sets on punched cards. Defines ISO 7-bit and 8-bit character sets on punched cards as well as the representation of 7-bit and 8-bit combinations on 12-row punched cards. Derived from, and compatible with, the Hollerith Code, ens... |
6,584 | Processing of punched cards was handled by a variety of machines, including: |
6,585 | The term "batch processing" originates in the traditional classification of methods of production as job production , batch production , and flow production . |
6,586 | Early computers were capable of running only one program at a time. Each user had sole control of the machine for a scheduled period of time. They would arrive at the computer with program and data, often on punched paper cards and magnetic or paper tape, and would load their program, run and debug it, and carry off th... |
6,587 | As computers became faster the setup and takedown time became a larger percentage of available computer time. Programs called monitors, the forerunners of operating systems, were developed which could process a series, or "batch", of programs, often from magnetic tape prepared offline. The monitor would be loaded into ... |
6,588 | Third-generation computers capable of multiprogramming began to appear in the 1960s. Instead of running one batch job at a time, these systems can have multiple batch programs running at the same time in order to keep the system as busy as possible. One or more programs might be awaiting input, one actively running on ... |
6,589 | The first general purpose time sharing system, Compatible Time-Sharing System , was compatible with batch processing. This facilitated transitioning from batch processing to interactive computing. |
6,590 | From the late 1960s onwards, interactive computing such as via text-based computer terminal interfaces , and later graphical user interfaces became common. Non-interactive computation, both one-off jobs such as compilation, and processing of multiple items in batches, became retrospectively referred to as batch process... |
6,591 | Although timesharing did exist, its use was not robust enough for corporate data processing; none of this was related to the earlier unit record equipment, which was human-operated. |
6,592 | Non-interactive computation remains pervasive in computing, both for general data processing and for system "housekeeping" tasks . A high-level program is today most often called a script, and written in scripting languages, particularly shell scripts for system tasks; in IBM PC DOS and MS-DOS this is instead known as... |
6,593 | "There is no direct counterpart to z/OS batch processing in PC or UNIX systems. Batch jobs are typically executed at a scheduled time or on an as-needed basis. Perhaps the closest comparison is with processes run by an at or cron command in UNIX, although the differences are significant." |
6,594 | Batch applications are still critical in most organizations in large part because many common business processes are amenable to batch processing. While online systems can also function when manual intervention is not desired, they are not typically optimized to perform high-volume, repetitive tasks. Therefore, even ne... |
6,595 | Some applications are amenable to flow processing, namely those that only need data from a single input at once : start the next step for each input as it completes the previous step. In this case flow processing lowers latency for individual inputs, allowing them to be completed without waiting for the entire batch to... |
6,596 | Modern batch applications make use of modern batch frameworks such as Jem The Bee, Spring Batch or implementations of JSR 352 written for Java, and other frameworks for other programming languages, to provide the fault tolerance and scalability required for high-volume processing. In order to ensure high-speed process... |
6,597 | Scripting languages became popular as they evolved along with batch processing. |
6,598 | A batch window is "a period of less-intensive online activity", when the computer system is able to run batch jobs without interference from, or with, interactive online systems. |
6,599 | A bank's end-of-day jobs require the concept of cutover, where transaction and data are cut off for a particular day's batch activity . |
6,600 | As requirements for online systems uptime expanded to support globalization, the Internet, and other business needs, the batch window shrank and increasing emphasis was placed on techniques that would require online data to be available for a maximum amount of time. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.