St. Columba allegedly saves the life of a Pict who was being attacked by a monster in Loch Ness. The account will later be recorded in the book Life of St. Columba by Adamnan. It is the beginning of the Loch Ness Monster myth. Adamnan recounts the event in the book, “…(He) raised his holy hand, while all the rest, brethren as well as strangers, were stupefied with terror, and, invoking the name of God, formed the saving sign of the cross in the air, and commanded the ferocious monster, saying, “Thou shalt go no further, nor touch the man; go back with all speed.” Then at the voice of the saint, the monster was terrified, and fled more quickly than if it had been pulled back with ropes, though it had just got so near to Lugne, as he swam, that there was not more than the length of a spear-staff between the man and the beast.”
The first computer User Group, SHARE, is founded by users of IBM’s Model 704 computer, shown here SHARE is founded in order for the growing community of IBM computer users, who were mainly aerospace companies on the US West Coast, to exchange information and programs. The first meeting includes scientists and engineers whose companies have ordered the newest IBM computer, the 704. Sparked by quick growth and the fact that its members were some of IBM’s largest customers, the group had significant influence over IBM designs and customer support.
IBM’s Project Chess task force meets with Digital Research about using CP/M-86 for IBM’s upcoming microcomputer. Gary Kildall will later claim that he agreed to provide CP/M-86 to IBM. However, sources at IBM will later state that Kildall was never interested in the agreement.
Eric Jenott, a paratrooper stationed at Fort Bragg, in North Carolina is accused of hacking US Army computer systems and giving the passwords to a citizen of China. Jenott’s attorney says that the soldier is just a recreational hacker who was testing the strength of a supposedly impenetrable computer system, found a weakness, and then told his superiors about it. He will later be cleared of the charges, but is still found guilty of damaging government property and computer fraud.
The United States Justice Department reveals that they have drafted legislation that will permit investigators to enter homes and offices secretly in order to disable computer scrambling software being used for criminally suspicious purposes.
The United States Department of Defense (DoD) issues a memo requiring all US military systems to connect via the Non-classified Internet Protocol Router Network (NIPRNET), rather than directly to the Internet by December 15, 1999. NIPRNET is used to exchange unclassified but sensitive information between “internal” users as well as providing users access to the Internet. NIPRNet is comprised of Internet protocol routers owned by the United States Department of Defense (DOD). It was created by the Defense Information Systems Agency (DISA) to supersede the earlier MILNET.
Intel announces that the new Itanium processor, under development since 1994, will initially be released with a maximum clock speed of 733MHz instead of the originally announced 800MHz.
Intel releases a 1000MHz Pentium III Xeon processor, featuring a 256KiB Level 2 Cache and a 133MT/s front side bus.
The corporate credit and bank loan rating of Gateway, Inc. is reduced to junk status by Standard & Poor (S&P). Gateway is the fourth largest US manufacturer of personal computers. Over fifty music industry publishers and songwriters announce that they have filed a copyright infringement suit in the United States District Court for the Southern District of New York against MP3.com, Inc.
Version 4.8 of the Netscape Communicator web browser suite.
Square Enix acquires the Taito Corporation, a video game developer and manufacturer of arcade hardware. The acquisition allows Square Enix to enter the arcade sector of the game industry.
Version 0.9.4 of the Eterm color VT102 terminal emulator for Windows.
A Congressional committee called for the investigation of the The Terrorist Identities Datamart Environment (TIDE). This is the database that holds all terrorist names. The reason was because the database was grossly neglected and on the verge of failure due to design flaws that were never corrected.
Google learns from a Security firm of an exploit to their SSL system.