November 3

From Wikazine
Jump to: navigation, search

Podcast Episode

Day in Tech History: Nov 3rd

Prev DITH - Next DITH

Prev: November 2 - Next: November 4 - Full Catalog list at Day in Technology History Project


Howard H. Aiken of Harvard University writes a letter to J.W. Bryce of IBM to suggest the construction of an automatic calculating machinery for use in computing physical problems. This exchange will eventually lead to the creation of The Harvard Mark I, the first large-scale automatic digital computer in the US.


The first Godzilla films is released in Japan.


The first edition of the UNIX Programmer’s Manual by Dennis Ritchie and Ken Thompson is published. It includes over sixty commands.


The information technology magazine Computerworld publishes its one thousandth issue. Visit the magazine’s official website.


The existence of the Morris Worm, one of the first computers worms to spread through the Internet, becomes public knowledge the day after it was released. The first mention of the worm is posted to Usenet, and the New York Times learns that the author of the worm was Cornell student Robert T. Morris. An anonymous caller had accidentally let slip the authors initials and login (rtm). Bob Morris, Chief National Computer Security Center Scientist with the National Security Agency (NSA), called the Times and confirmed that the author was his son.


Version 4.0a of Crack, a Unix password cracking application designed to allow system administrators to locate users who may have weak passwords vulnerable to a dictionary attack, is released. This version is often credited with putting Crack on the map, introducing several important features, including a programmable dictionary generator and distributed network password cracking.


Version 1.0 of the Red Hat operating system is released. It is the first Linux distribution to use RPM as its packaging format.


John Matheison submits his resignation to the Atari Corporation to join Richard Miller in his start-up company. Matheison is often referred to as the father of the Atari Jaguar.


Umax Computer introduces the C500/240 Macintosh-compatible computer, featuring a 240MHz PowerPC 603e, a 3GB hard drive, 24MB RAM, and a CD-ROM. Price: US$1,295

Yahoo! launches Yahoo! Denmark, Yahoo!Norway, and Yahoo!Sweden.


The computer that operates the Salt Lake City Air Traffic Control Center as well as a failing back-up system are shut down. The shut-down effectively blacks out radar that tracks about two hundred passenger planes over five Western states including Idaho, Montana, Nevada, Utah, and Wyoming for almost a full minute. Control during the failure was passed to a manual system.


RealNetworks publicly admits that it has been collecting information about exactly what users of its RealJukebox player listen to with the application. The company hasn’t previously informed users of the monitoring, and it will subsequently be hotly criticized by its competitors, privacy advocates, and a wide variety of users. The company immediately apologized to the public for the concerns it might have caused, releases a patch to disable detailed reporting, changes its public privacy statement to notify users about the data collection, and swears that the data collected to date hasn’t been aggregated in any way that would allow a person to track the specific interests of any one user. Despite the measures, the admission brings software privacy rights to the forefront of government and media outlets.


Microsoft announces it has licensed processor technology from IBM, and chipset technology from Silicon Integrated Systems (SiS), for use in its next video game system.

Microsoft Research Asia (MSRA) announces the founding of the Advanced Technology Center (ATC) in Beijing, China, a new division that is to focus on developing innovations.

Version 4.3.4 of the PHP programming language is released.


Jeanson James Ancheta, age 20, of Downey, California, is arrested by special agents with the Federal Bureau of Investigation (FBI) on a seventeen-count indictments of conspiracy, as well as substantive charges of attempting to cause damage to protected computers, causing damage to computers used by the federal government in national defense, and accessing protected computers without authorization to commit fraud, and money laundering. According to prosecutors, Ancheta is a member of the Botmaster Underground who wrote viruses and malware, spread that code to assemble armies of infected computers, and sold access to the infected zombie computers for the purpose of launching distributed denial of service (DDOS) attacks and sending spam. Among the some four hundred thousand infected are computers at the Weapons Division of the United States Naval Air Warfare Center in China Lake, as well as computers belonging to the Defense Information Systems Agency, a component of the United States Department of Defense. On January 23, 2006, Ancheta will plead guilty in US District Court in Los Angeles and be sentenced to a four to six year in prison, restitution of US$15,000, and forfeiture of a 1993 BMW and US$58,000.


Microsoft fires it’s CIO Stuart Scott for violation of policies.


Circuit City announces they will close 155 stores


Dell finalizes the 3.9 billion offer for Perot, a company that offers IT services. Dell will eventually rename to Dell Services.

A Netherlands hacker finds a security hole in a jailbroken iPhone. He runs a program that posts a message on the users device stating they have been hacked and for 5 euros ($7.36), he will fix the problem. This comes days before the Austrailian hack of “Rick Astley” playing “never gonna give you up”

AT&T sues Verizon over the red map commercial claiming the most coverage.

In an International effort, Twitter rolls out a Spanish translation.

T-Mobile customers experience a widespread outage

Western Digital ships the S25 - 2.5 inch SAS hard drives. These are 10,000 rpm drives that puts the company into the enterprise storage market.


UK Information Commission finds that Google Street View cars also collected Wifi data in a mapping exercise.

George Bronk, hacked into women's Facebook pages, copied private photos and videos of them in nude, or half-nude situations, then threatened he would publish the results unless he received more photos from the user. He will be sentenced on July 22, 2011 for Stalking and face over 4 years.


IBM's CEO John Open passed away


YouTube airs the first YouTube Music Awards.

Personal tools