Unsung innovators: Ray Tomlinson, who put the @ sign in every e-mail address
Computerworld - In the early 1970s, Ray Tomlinson worked out one of the earliest e-mail systems. That's cool, but here's something more intriguing. He is actually the guy responsible for the "At" sign (@) in every e-mail address today.
Tomlinson, a shy sort, says he is just fine with his name not being a household name. "In fact, I'm pretty happy being unsung."
Tomlinson today is a principal engineer at the Cambridge, Mass.-based BBN Technologies. But he was just starting out at the company when he came up with the e-mail system and address notation. Just 29 years old and a junior employee then, Tomlinson says he was supposed to be doing something else and at the time wasn't sure whether he should share what he came up with.
"You see, I wanted to build the first e-mail system to allow messages to be sent from one person" on one computer over a network to someone who was using an entirely different computer, Tomlinson says. He points out that, at the time, e-mail was possible only between people using terminals connected to the same computer.
"I was trying to denote on which computer a user had his mailbox because his username would already be unique on that computer," he explains. In other words, he needed a username structure that had to be unique across all computers.
But it did leave "several" punctuation marks, he says.
So how did the "At" symbol win its place in e-mail history? "Of all the available punctuation marks, only the "At" sign had a sense of place," he says. "I could have used the "On" sign or the "Of" sign, but there are no such characters. So the at-sign had to be it."
Tomlinson, a native of New York state, is in his 40th year working @ BBN.
Read more about Networking in Computerworld's Networking Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Networking White Papers | Webcasts