Generasi ke-1 (1945-1955) : Vacuum Tubes dan Plugboards
- Analytical Engine (Charles
Babbage)
- Calculating Engine menggunakan
vacuum tubes (Howard Aitken, John von Neumann, J.P Eckert, Konrad Zuse)
- Beluam ada bahasa pemrograman
- Belum ada sistem operasi, system
komputer diberi instruksi yang harus dikerjakan langsung.
- Operasi menggunakan plugboard
- Pengenalan punched card
Generasi Ke-2 (1955-1965) : Transistors dan Batch System
- Tetap belum dilengkapi system
operasi. Tetapi beberapa fungsi dasar SO sudah ada.
- Pengenalan transistor untuk
komputer
- Pemisahan fungsi personil
:Designer , Operator, Programmer dan Maintenance personel
- Pengenalan job (program atau
seperangkat program)
- Penggunaan bahasa FORTRAN,
Assembeler
- Penerapan Batch System
- Pengoperasian Off-Line
- Penggunaan mesin-mesin besar
untuk kalkulasi sains dan engineering
- Typical operating system : FMS
(Fortran Monitor System) dan IBSYS (sistem operasi untuk IBM 7094)
Generasi Ke-3 (1965-1980) : IC dan Multiprogramming
- IBM mengenalkan IBM 360 dengan
sistem operasi OS/360
- Menggunakan Integrated Circuit
(IC)
- Dapat menangani komputasi sains
dan komersial
- Mengadopsi konsep ‘one family’
- Sistem operasi berukuran besar
dan kompleks
- Mengenalkan multiuser, komputer
memiliki resource yang dapat digunakan oleh banyak orang sekaligus
- Mengenalkan multiprogramming,
komputer melayani banyak proses sekaligus pada waktu yang bersamaan dengan
menerapkan partisi memori menjadi beberapa bagian memori dengan satu bagian
memori untuk satu job berbeda. Saat satu job menunggu operasi I/O selesai, job
lain dapat menggunakan proses.
- Mengenalkan Time Sharing (berbagi
waktu), tiap pemakai mempunyai satu terminal online dengan pemroses hanya
memberi layana pada pemakai yang aktif secara bergantian secara cepat. Pemakai
akan merasa dilayani terus menerus. Padahal sebenarnya secara bergantian.
- Mengenalkan SPOOLING
(Simultaneous Peripheral Operation On Line), membuat peripheral seolah-olah
dapat digunakan bersamaan, dapat diaksis secara simultan yaitu dengan cara
menyediakan beberapa partisi memori. Saat terdapat permintaan layanan
peripheral, langsung diterima dan data disimpan lebih dulu di memori yang
disediakan berupa antrian kemudian dijadwalkan agar secara nyata dilayani
peripheral.
- Sistem time sharing pertama,
CTSS, dikembangkan di MIT
- Usaha pengembangan ‘computer
utility’ mesin yang dapat menunjang ratusan time sharing user
- Pengembangan komputer MINI
(DEC-PDP-1 s/d PDP-11)
- Ken Thompson mengembangkan versi
satu pemakai (single user) dari MULTICS (MULTIplex and Computing Services)
- UNIX (Uniplexed Information and
Computing Services)
Generasi Ke-4 (1980-1990) : LSI, VLSI, dan Personal Computer (PC)
- Pengembangan LSI dan VLSI
melahirkan PC dan Workstation
- Perangkat lunaknya ‘user
friendly’
- Dua sistem operasi yang dominan :
- MS-DOS (pada IBM-PC dengan CPU
Intel 8088, 80286, 80386, 80486)
- UNIX (pada Non-Intel computer dan
workstation)
- RISC Chips
- Network Operating System
- Distributed Operating System
- Generasi Ke-5 (1990-sekarang) :
VLSI, ULSI an teknologi Nano Second, Internet, Multimedia
- Pengembangan VLSI an ULSI
melahirkan PC yang berbasis Pentium untuk server maupun workstation
- Pengembangan sistem operasi
windows
- Pengembangan internet dan
multimedia
- Pengembangan aplikasi yang
berbasis Web atau WWW
- dll.
1 comments:
◾PROTOCOL SHIELDERS◾
ReplyHELLO,
I am COREY RODRIGUEZ by name,
the only GENERAL CEO of protocol-cyber-shield-hackers.
In this message, we will explain how you can almost avoid SCAMMERS and stay safe, plus how our organization works.
Read it carefully!!
Its reading will not take more than 10mins.
We kindly URGE you to not respond without have read the entire text. Those who mail without have read everything, ask questions that are answered here!!
⚠️WARNING:
MOST HACKERS YOU SEE HERE ARE FAKES
AND SIMULTANEOUSLY INCONGRUOUS !!.
It tears US up as we have received bitter emails of Jobs attempts proposals from most clients with hacking issues but never got it done and lost a lot in the process,
EXAMPLES OF LOSSES ARE:
➡️BINARY FUNDS,
➡️INVESTMENTS,
➡️LARGE SCALE FUNDS,
➡️PROPERTIES,
➡️STONES(JEWELRIES) etc....
all scammed by uncertified and fake hackers SIMPLY TERMED as "IMPERSONATION" like most you see here,
which is disappointingly inadequate,
leaving their mess for us to deal with eventually (WE DON'T MEAN TO BRAG ABOUT THAT).
SCAMMERS DON'T SHOW MERCY ON THEIR VICTIMS!
BY THE TIME YOU KNOW IT,YOU'VE GONE TOO DEEP BEING RIPPED OFF THROUGH DIVERSE TRICKY MEANS,PLEASE BE WISE ENOUGH TO PAY ATTENTION TO THIS ARTICLE AS YOU READ THROUGH IT.
HOW CAN YOU BE CAREFUL??
You won't know until you fall Victim ,but can be attentive to potential danger, error or harm if you take note of these:
1, you see uncertified email accounts carrying numberings like
"iamhacklord1232@(gmail,yahoo or hotmailDOTcom"
pls flee from them, BIG SCAMMERS.
They take your money and never do your job!!
2, you see posts like "do you need to spy on spouse?"
All fake!
just a way to lure you toward getting ripped OFF!.
3, posting fake testimonies and comments to trick you into feeling save and secured.
Pls endeavour to ignore!!
πNOTE: beware as we urge you not to make respond to any "IVAN HONG,PETER SANTOS,MONICA HART...(impersonating with our post pretending to work for us)
WE ONLY HAVE 2 EMAILS WHICH ARE LISTED BELOW THIS ARTICLE TO ATTEND TO YOU VARIOUS MANNER OF CYBER MISHAPS.
◾VERY IMPORTANT ◾
For years now, We've helped organizations secure data base, so many sites USES US AS SECURITY BACK UP TEAM BECAUSE OF OUR METHODS OF HANDLING CYBER MISHAPS.
π"CLEAR CRIMINAL RECORDS" 99%
π"iPHONE HACK" 99%
π"BINARY RETRIEVAL" 99% AND LOT MORE BEEN DONE IN SHORT TIMING!
these are significant EXPERIENCES & RECORDS a good and effectively fully recognized organization must firmly ascertain.
◾OUR "AIMS" HERE ◾
Are:
1◾to assign a qualified agent of specific rank to particularly any sort of cyber issues you intend dealing with in short and accurate timing.
2◾ to screen in real hackers (gurus only) in need of job with or without a degree, to speed up the availability of time given for Job contracts given to us.!!
Thus an online binary decoding exam will be set for those who seeks employment under the teams Establishment.
write us on:
◾ProtocolhacksATgmailDOTcom or
◾CybershieldnotchATgmailDOTcom
COREY ROD,
SIGNED...!
Thank you!!!
Posting Komentar