This publish is the most recent within the “Secret Historical past Collection.” They’ll make rather more sense in case you watch the video or learn a few of the earlier posts for context. See the Secret Historical past bibliography for sources and supplemental studying.
Silicon Valley emerged from work in World Warfare II led by Stanford professor Fred Terman growing microwave and electronics for Digital Warfare techniques. Within the 1950’s and 1960’s, spurred on by Terman, Silicon Valley was promoting microwave elements and techniques to the Protection Division, and the primary fledging chip firms (Shockley, Fairchild, Nationwide, Rheem, Signetics…) had been of their infancy. However there have been no laptop firms. Silicon Valley wouldn’t have a pc firm till 1966 when Hewlett Packard shipped the HP 2116 minicomputer.
In the meantime the largest and quickest scientific laptop firms had been in Minnesota. And by 1966 they’d been delivering computer systems for 16 years.
Minneapolis/St. Paul space firms ERA, Management Information and Cray would dominate the world of scientific computing and be an innovation cluster for computing till the mid-Nineteen Eighties. After which they had been gone.
Why?
Simply as Silicon Valley’s roots will be traced to innovation in World Warfare II so can Minneapolis/St. Paul’s. The story begins with an organization you most likely by no means heard of – Engineering Analysis Associates.
It Began With Code Breaking
For hundreds of years, each nation has tried to maintain its diplomatic and navy communications secret. They do this by encrypting (defending the data by utilizing a cipher/code) to scramble the messages. Different nations attempt to learn these messages by making an attempt to interrupt these codes.
Through the Thirties the U.S. Military and Navy every had their very own small code breaking teams. The Navy’s was known as CSAW (Communications Supplemental Exercise Washington) also referred to as OPS-20-G. The Military codebreaking group was the Sign Intelligence Service (SIS) at Arlington Corridor.
The Military centered on decrypting (breaking/decoding) Japan’s diplomatic and Military codes whereas the Navy labored on breaking Japan’s Naval codes. This was not a harmonious association. The competitors between the Military and Navy code breaking teams was so contentious that in 1940 they agreed that the Military would decode and translate Japanese diplomatic code on the even days of the month and the Navy would decode and translate the messages on the odd days of the month. This association lasted till Dec. 7, 1941.
At the beginning of WWII the Military and Navy code breaking teams every had few hundred folks primarily centered on breaking Japanese codes. By the tip of WWII, with the U.S. now preventing Germany, and the Soviet Union looming as a possible adversary U.S. code breaking would develop to twenty,000 folks engaged on breaking the codes of Germany, Japan and the Soviet Union.
The 2 teams would merge in 1949 because the Armed Forces Safety Company after which grow to be the Nationwide Safety Company (NSA) in 1952.
The Rise of the Machines in Cryptography
Previous to 1932 virtually all code breaking by the Military and Navy was performed by hand. That yr they started utilizing industrial mechanical accounting gear – the IBM keypunch, card sorters, reproducers and tabulators. The Military and Navy every had their very own method to automating cryptography. The Navy had a Speedy Analytical Machines venture with hopes to construct machines to combine optics, microfilm and electronics into cryptanalytic instruments. (Vannevar Bush at MIT was making an attempt to construct one for the Navy.) As WWII loomed, the superior Speedy Machines tasks had been placed on maintain, and the Military and Navy used a whole lot of specifically modified industrial IBM electromechanical techniques to decrypt codes.
Learn the sidebars for extra detailed info
By the spring 1941, the Military constructed the primary special-purpose cryptologic attachment to the IBM punched card gear – the GeeWhizzer utilizing relays and rotary switches to assist break the Japanese diplomatic codes. That very same yr, the Navy obtained the primary in a collection of 13 electro-mechanical IBM Navy Change Machines to automate decrypting cipher techniques utilized by the Japanese Navy. The Navy attachments had been in depth modifications of IBM’s normal card sorters, reproducers and tabulators. Some could possibly be manually reconfigured by way of plugboards to do totally different duties.
Through the battle the Military and Navy constructed ~75 of those electro-mechanical and optical techniques. Some had been standalone items the dimensions of a room.
Nonetheless, the majority of the cryptoanalysis was performed with IBM punch playing cards, sorters and tabulators, together with particular microfilm comparators from Eastman Kodak. By the tip of the Warfare the Military and Navy had 750 IBM machines utilizing a number of million punch playing cards each day.
IBM’s different mechanical contribution to cryptanalysts was the Letterwriter, (codenamed CXCO) a desktop machine that tied collectively electrical typewriters to teletype, automated tape and card punches, microfilm and finally to film-processing machines.
By including plug-boards they might automate some evaluation steps. Tons of of those had been purchased.
The Navy’s most superior cryptographic machine work in WWII was constructing 125 U.S. variations of the British code breaking machine known as the BOMBE. These electromechanical BOMBES had been used to crack the ENIGMA, the cipher machine utilized by the Germans.
Designed by the Navy’s OPS-20-G staff and constructed at Nationwide Money Register (NCR) in Dayton, this similar Computing Machine Lab would construct ~25 different kinds of electromechanical and optical machines, some the dimensions of a room with 3,500 tubes, to help in breaking Japanese and German codes. By the tip of the battle the Naval Computing Machine Lab was arguably constructing probably the most refined digital machines within the U.S. Nonetheless, none of those machines had been computer systems. They’d no reminiscence, and each had been “‘hard-wired” to carry out only one process.
(In the meantime in England the British code breaking group in Bletchley Park constructed Colossus, arguably the primary digital laptop. On the finish of the Warfare the British provided the Navy OPS-20-G code breaking group a Colossus however the Navy turned it down.)
Twin-Use Know-how
Because the battle was winding down, the management of the Navy Computing Machine Lab in OPS-20-G was desirous about how they might completely hyperlink industrial, educational and navy computing science and innovation to the Navy. After discovering that no industrial firm was keen to proceed their wartime work of constructing the specialised {hardware} for codebreaking, the Navy realized they wanted a brand new firm. The determined that one of the best ways to do this was to encourage a personal for-profit firm to spin out and construct superior crypto-computing techniques.
The Secretary of the Navy gave his OK and three officers within the Navy’s code breaking group (Commander Howard Engstrom, who had been a math professor at Yale; Lieutenant Commander William “Invoice” Norris, {an electrical} engineer; and their contracting officer Captain Ralph Meader,) agreed to begin a civilian firm to proceed constructing specialised techniques to assist break codes. Whereas distinctive for the time, this public-private partnership was in-line with the wartime experiment of Vannevar Bush’s OSRD – utilizing civilians in universities to develop navy weapons.
Why Minneapolis/St. Paul?
Whereas it appeared like a good suggestion and had the Navy’s backing, the founders acquired turned down for funding by firms, funding bankers and everybody, till they talked to John Parker.
Serendipity got here to Minneapolis-St. Paul when the Navy staff met John Parker. Parker was a ex Naval Academy graduate and a Minneapolis businessman who owned a glider manufacturing firm and was properly linked in Washington. Parker agreed to speculate. In January 1946, they based Engineering Analysis Associates (ERA). Parker grew to become President, and acquired 50% of the corporate’s fairness for a $20,000 funding (equal to $315K right this moment) and assured a $200,000 line of credit score (equal to $3M right this moment). The skilled workers owned the opposite 50%. The brand new firm moved into Parker’s glider hanger. Norris grew to become the VP of Engineering, Engstrom the VP of Analysis, and Meader VP of Manufacturing.
The corporate hit the bottom working. 41 of the most effective and brightest ex-Navy technical staff members of the Naval Computing Machine Lab in Dayton moved and have become the preliminary technical workers of ERA. When the Navy added their very own workers from the Dayton Laboratory the ERA facility was designated a Naval Reserve Base and armed guards had been posted on the entrance. The corporate took on any engineering work that got here their approach however had been stored in enterprise growing new code-breaking machines for the Navy. Many of the machines had been custom-built to crack a particular code, and more and more used a brand new ERA invention – the magnetic drum reminiscence to course of and analyze the coded texts.
ERA’s headcount grew quickly. Inside a yr the corporate had 145 folks. A yr later, 420. And by 1949, 652 workers and by 1955, 1400. Gross sales of their first fiscal yr had been $1.5 million ($22 million in right this moment’s {dollars}).
Throughout World Warfare II the calls for of battle industries prompted thousands and thousands extra People to maneuver to the place most protection crops positioned. Put up-war period People had been equally cell, keen to maneuver the place the alternatives had been. And in case you had been an engineer who wished to work on the reducing fringe of electronics, and electromechanical techniques, ERA in Minneapolis-St. Paul was the place to be. (Candidates had been instructed that ERA was doing electronics work for presidency and business. Those that wished extra element got numerous cowl tales. Many had been instructed that ERA was engaged on airline seat reservation techniques.)
How Did ERA Develop So Rapidly?
The Navy considered ERA as its “captive company.” From the primary day ERA began with contracts from the Navy OPS-20-G codebreaking group. ERA constructed probably the most superior digital techniques of the time. Sadly for the corporate they couldn’t inform anybody as their buyer was probably the most secret authorities company within the nation – the Nationwide Safety Company.
ERAs techniques had been designed to resolve issues outlined by their Navy code-breaking buyer. They fell into two classes: some tasks had been designed to automate current workflows of decoding recognized ciphers; others had been used to find breaks into new ciphers. And with the beginning of the Chilly Warfare, that meant Soviet cryptosystems. ERAs cryptanalytic units had been most frequently designed to interrupt just one explicit international cipher machine (which stored a stream of recent contracts coming.) The particular goal and goal of every of those techniques with colourful codenames are nonetheless labeled.
What Did ERA Construct For the Nationwide Safety Company (NSA)?
By the tip of ERA’s first yr, ERA had contracts for a digital machine known as Alcatraz which used hundreds of vacuum tubes and relays. A contract for a system named O’Malley adopted. Then two “exhaustive trial” techniques known as Hecate for $250,000 ($3.2 million in right this moment’s {dollars}) and the follow-on system, Warlock ($500,000 – $6.4 million right this moment.) Warlock was so massive that it was stored on the ERA manufacturing facility and operated as a distant operations middle.
Subsequent had been the Robin machines, a photoelectric comparator, used to assault the Soviet Albatross code. The primary two had been delivered ultimately of 1950. 13 extra had been delivered to NSA over the subsequent two years.
ERA Disk Drives
One of many issues code breakers had was the issue of with the ability to retailer and function on massive units of knowledge. To take action, cryptanalysts used hundreds of punched playing cards, miles of paper tapes and microfilm. ERA was the pioneer within the growth of an early type of disk drives known as magnetic drum recollections.
ERA used these magnetic drums within the particular techniques they constructed for NSA and later of their Atlas computer systems. In addition they offered them as peripherals to different laptop firms.
Goldberg, which adopted, was one other room-sized particular goal machine – a comparator with statistical capabilities – that took photoelectric sensing and paper tape scanning to new heights.
Costing $250,000 ($3.2 million in right this moment’s {dollars}), it had 7,000 tubes and was one of many first Company machines to make use of a magnetic drum to retailer and deal with information.
One other equally sized system, Demon, adopted. It was a dictionary machine designed to crack a Soviet code. It additionally used 34-inch-diameter magnetic drum to carry out a specialised model of desk lookup. Three of those massive techniques had been delivered.
ERA engineers operated on the similar relentless and exhausting tempo as they’d performed in battle time – much like how Silicon Valley silicon and laptop firms would function three many years later.
For the subsequent decade ERA would proceed to ship a stream of special-purpose code breaking digital techniques and subsystems for the Navy cryptologic group. (These NSA paperwork give a touch on the quantity and number of encryption and decryption gear at NSA within the early 1950’s: right here, right here, right here, right here, and right here.)
ERA was undercapitalized and at all times on the lookout for different merchandise to promote. On the similar time ERA was constructing techniques for the NSA they pursued different strains of companies; analysis research on liquid fueled rockets, plane antenna couplers (which changed into a worthwhile product line,) a Doppler Miss Distance Indicator, Floor Assist Tools (GSE) for airways, and Venture Growth to provide instrumentation for what would grow to be underground nuclear checks. A 1950 research for the Workplace of Naval Analysis known as Excessive-Pace Computing Gadgets – a survey of all computer systems then existent within the U.S. As there was no single supply of details about what was taking place within the quickly rising laptop subject, this ERA report grew to become the bible of early U.S. computer systems.
The Holy Grail – A Digital Laptop for Cryptography?
As sophisticated because the ERA machines had been, they had been nonetheless single perform machines, not common goal computer systems. However up till 1946 nobody had constructed a common goal laptop.
With the battle over what the Navy OP-20-G’s and Military SIS computing wizards actually wished was to create a single machine that would carry out all the key cryptanalytic capabilities. A very powerful of the crypto methods had been primarily based upon both finding repeated patterns, tallying huge numbers of letter patterns, and recognizing plain textual content, or performing some type of “exhaustive looking out.”
How the NSA Received Their First Computer systems
Their concept was to place every of those main cryptanalytic capabilities in separate, devoted, single-function {hardware} packing containers and join them via a central switching mechanism. That will permit cryptanalysts to tie them collectively in any configuration; and hook all of it to free-standing enter/output mechanisms. With a inventory of those specialised packing containers the businesses believed they might create any desired cryptanalytic engine.
Simply because the consensus for the sort of structure was coalescing, a brand new concept emerged in 1946 – the idea of a common goal digital laptop with a von Neumann structure. In distinction to having many separate hardwired capabilities, a common goal laptop would have simply the 4 primary arithmetic ones (add, subtract, a number of and divide) together with a couple of that allowed motion of knowledge between the input-output elements, reminiscence, and a single central processor. In concept, one piece of {hardware} could possibly be made to mimic any machine via a cheap and simply modified set of directions.
Opponents to the venture believed {that a} von Neumann design would at all times be too sluggish as a result of it had solely a single processor to do all the things. (This debate between devoted particular goal {hardware} versus common goal computer systems continues to at the present time.)
The tipping level on this debate occurred in 1946 when an OPS-20-G engineer went to the Moore College’s 1946 summer season course on computer systems. The Moore College’s laptop group had simply accomplished the ENIAC, arguably the primary programmable digital laptop, and so they had been starting to sketch the outlines of their very own new laptop, the UNIVAC the primary laptop for enterprise functions. The engineer got here again to the Navy computing group an advocate for constructing a general-purpose digital laptop for codebreaking having satisfied himself that the majority cryptanalysis could possibly be carried out via digital strategies. He ready a report to indicate that his machine can be helpful to everybody at OP-20-G. The report remained High Secret for many years.
The report detailed how a general-purpose machine might have efficiently attacked the Japanese Purple codes in addition to German Enigma, and Fish techniques, and the way it will be usefully towards the present Soviet and Hagelin techniques.
This modified all the things for the NSA. They had been now within the laptop enterprise.
ERA’s ATLAS
In 1948 the Navy gave ERA the contract to provide its first digital laptop known as ATLAS for use by OPS-20-G for codebreaking.
Twenty 4 months later, ERA delivered the primary of two 24-bit ATLAS I computer systems. The Atlas was 45’ large and 9’ lengthy. It weighed 16,000 kilos and was water cooled. Every ATLAS I price the NSA $1.3 million ($16 million in right this moment’s {dollars}).
In hindsight, the NSA crossed the Rubicon when the ATLAS I arrived. In the present day, an intelligence company with out computer systems is unimaginable. Its buy confirmed unimaginable foresight and initiated a brand new period of cryptanalysis on the NSA. It was one of many handful of common goal, binary computer systems anyplace. Ten years later the NSA would have 53 computer systems.
ERA requested the NSA for permission to supply the pc for industrial sale. The NSA required ERA to take away directions that made the pc environment friendly for cryptography, and that grew to become the industrial model – the ERA 1101 introduced in December 1951. It had no working or programming handbook and its enter/output amenities was a typewriter, a paper tape reader, and a paper tape punch. On the time, no programming languages existed.
ERA had delivered a breakthrough laptop with out having an understanding of its potential utility or what a buyer might need to do to make use of the machine. Seeking industrial prospects, ERA arrange a ERA 1101 laptop in Washington and provided it to firms as a distant computing middle. So far as the industrial world knew ERA was a startup with no actual computing experience and this was their first providing. As well as, the one folks with expertise in writing functions for the 1101 had been hidden away at NSA, and ERA was unable to workers the Arlington workplace to create packages for patrons. Lastly, ERA’s penchant for excessive secrecy left them unschooled within the artwork of selling, gross sales, and Public Relations. Once they couldn’t discover any prospects they donated the ERA 1101 to Georgia Tech.
With their arms on their first ever common goal digital laptop, the Navy and ERA quickly discovered what wanted to be improved. ERA’s follow-on laptop, the ATLAS II was a 32-bit system with extra instruction extensions for cryptography. Two had been delivered to NSA between 1953 and 1954. ATLAS II price the NSA $2.3 million ($35 million right this moment.)
Late in 1952, a yr earlier than the ATLAS II was delivered to the NSA, ERA instructed Remington Rand (who now owned the corporate) the ATLAS II laptop existed (and the federal government had paid for its R&D prices) and it was aggressive with the newly introduced IBM 701. When the ATLAS II was delivered to the NSA in 1953 they once more requested for permission to promote it commercially (and once more needed to take away some directions) which turned the Atlas II into the industrial ERA/Univac 1103. (see its 1956 reference handbook right here.)
This time with Remington Rand’s expertise in gross sales and advertising, the pc was a industrial success with about twenty 1103s offered.
ERA’s Bogart
In 1953, with the ATLAS computer systems in hand, the Navy realized {that a} smaller digital laptop could possibly be used for information conversion and enhancing, and to “clear up” uncooked information for enter to bigger computer systems. This was the Bogart.
Bodily Bogart was a “small, compact” (in comparison with the ATLAS) laptop that weighed 3,000 kilos and lined 20 sq. toes of flooring house. To get a really feel of how insanely tough it was to program a 1950’s laptop check out the 1957 Bogart programming handbook right here.) The Bogart design staff was headed by Seymour Cray. ERA delivered 5 Bogart machines to NSA.
Seymour Cray would reuse options of the Bogart logic design when he designed the Navy Tactical Information System computer systems, the UNIVAC 490 and the Management Information Company’s CDC 1604 and CDC 160.
By 1953, 40% of the College of Minnesota electrical engineering graduates – together with Cray – had been working for ERA.
The Finish of an ERA
By 1952, the mainframe laptop business was starting to take form with workplace machine and electronics firms similar to Remington Rand, Burroughs, Nationwide Money Register, Raytheon, RCA and IBM. Parker, nonetheless the CEO, realized that the frantic chase of presidency contracts was unsustainable. (The connection with the NSA’s procurement places of work now run by Military workers, had grow to be so strained that the Navy Computing Lab was unable to get an official letter of thanks despatched to ERA for having developed the ATLAS.)
Parker calculated that ERA wanted $5 million to $10 million ($75 to $150 million in right this moment’s {dollars}) to develop and compete with the present firms within the industrial computing market. Even after the NSA took over the cryptologic work of OPS-20-G the formal contracts with ERA had been performed via the Navy’s Bureau of Ships. NSA was often called No Such Company and on paper its relationship with ERA didn’t exist. So far as the general public knew, ERA’s merchandise had been for “the Navy.” On condition that ERA’s extraordinary technical work was unknown to anybody aside from the NSA, Parker didn’t assume he might elevate the cash by way of a public providing (enterprise capital as we all know it didn’t exist.)
As an alternative, in 1952, Parker offered ERA to Remington Rand (finest recognized for producing typewriters) for $1.7M (about $12M in right this moment’s {dollars}.) A yr earlier, Remington Rand had purchased Eckert-Mauchly – one of many first U.S. industrial laptop firms – and its line of UNIVAC computer systems. They wished ERA to get its authorities prospects. ERA remained a standalone division. The ERA 1101 and 1103 grew to become part of the UNIVAC product line.
Parker grew to become head of gross sales of the merged laptop division. He left in 1956 and years later he grew to become chairman of the Teleregister Company, the predecessor to Bunker-Ramo. He went on to grow to be a director of a number of firms, together with Northwest Airways and Martin Marietta.
Remington Rand itself can be acquired by Sperry in 1955 and each ERA and Eckert–Mauchly had been folded into a pc division known as Sperry-UNIVAC. A lot of ERA’s work was dropped, whereas their drum know-how was utilized in newer UNIVAC machines. In 1986 Sperry merged with Burroughs to kind Unisys.
Epilogue
For the subsequent 60 years the NSA would have the biggest assortment of business computer systems and computing horsepower on this planet. They’d proceed to complement these with devoted particular goal {hardware}.
The reorganization of American Indicators Intelligence, resulting in the creation of the Armed Forces Indicators Company (AFSA) in 1949, then the NSA in 1952, contributed to the demise of the particular relationship between ERA and the code- breakers. The combination of the Military and Navy introduced a shift in who made selections about laptop buying. NSA inherited a pc workers from the Military aspect of technical SIGINT. They’d totally different ties and orientations than the few remaining previous Navy arms. Because of this, the brand new core NSA group didn’t protest when the particular group that built-in Company and ERA work was disbanded. The 1954 termination of the Navy Computing Machine Lab in St. Paul went nearly unnoticed.
However the period of Minnesota’s position as a scientific computing and innovation cluster wasn’t over. In actual fact, it was simply getting began. In 1957 ERA co-founder William Norris, and Sperry-Univac engineers Seymour Cray, Willis Drake, and ERA’s treasurer Arnold Ryden, together with a half dozen others, left Sperry-Univac and teamed up with three traders to kind a brand new Minneapolis-based laptop firm: Management Information Company (CDC). For the subsequent 20 years Management Information would construct the quickest scientific computer systems on this planet.
Learn half 18 right here and all of the Secret Historical past posts right here
Filed below: Company/Gov’t Innovation, Nationwide Safety, Navy, Secret Historical past of Silicon Valley |








