IBM celebrates tech behind first U.S. manned space flight
NASA teamed up with IBM to create the technology to put Alan Shepard into space
Computerworld - As NASA marks the 50th anniversary of the first U.S. manned space flight, IBM is celebrating the mathematicians and engineers who helped make it happen.
While people around the world held their breath and watched astronaut Alan Shepard blast off on May 5, 1961, workers at IBM sat on the edge of their seats watching their technology go to work. IBM not only had been in charge of installing and maintaining three "large-scale" computers for the mission, it also was also responsible for developing the technology that enabled NASA to track the spacecraft and provide real-time information to Mission Control.
"Alan Shepard was the bravest of the brave, and his flight ushered in America's space age," said Arthur Cohen, the mathematician who led IBM's Project Mercury Team. "The IBM team had the honor of applying computing power and mathematics to support the project.... We experienced an unforgettable sense of excitement when Alan Shepard safely accomplished his mission. I will forever remember May 5, 1961, and the incredible team of NASA and IBM men and women I had the opportunity to work with."
Cohen, in an email to Computerworld noted that IBM's work involved an early manifestation of real-time and predictive analytics. What IBM technicians put together for NASA helped to usher in the days of real-time communication.
According to IBM, its team of more than 75 employees working on the Mercury Project from 1959 to 1963 developed a "real-time channel" called the IBM 7281, which could receive up to 1,000 bits of data per second.
They also created advanced software programs and mathematics models to analyze incoming data and provide mission-critical information to NASA flight controllers throughout the space flight.
"The real-time aspect -- receiving asynchronous data -- was new and breakthrough," said Cohen. "The 7281 real-time channel and the data that was streaming in had to be received and evaluated in real time to be able to use information to drive displays at [Cape Canaveral]. That was brand new. It had never been done before. Of course, real time then was 1,000 bits of data per second. Today, it's, of course, trillions of bits per second."
Cohen noted the monitor that took in all the real-time information was particularly challenging to develop, but its creation also had long-term benefits on the advancement of computing.
"The monitor accepted information real-time and decided which software needed to be addressed to proceed so Mission Control would get the information it required," he added.
He said that the other technology that had a big impact on the future of computing was the mathematics IBM developed specifically for the mission. Cohen said IBM's team had to create the math needed to determine the spacecraft's trajectory, correct the trajectory, and track the capsule into re-entry or abort.
To provide real-time information to Mission Control, the IBM team built and ran three large-scale computers that funneled in all flight information. There were two 7090 transistorized computers installed at the Goddard Space Flight Center in Greenbelt, Md., and a 709 computer at the Bermuda Control Center, which acted as a backup to the project's Mission Control facility at Cape Canaveral.
Cohen remembers the entire project as an incredible amount of painstaking work.
"It was a tremendous amount of work," he said. "We sometimes worked 36 hours straight or more. As we got closer to launch, we were waiting for liftoff to occur and we couldn't leave the computing centers, so sometimes we had to sleep there with the computers.... There was a lot of suspense involved as we anticipated a man going on top of a rocket. We knew the computer systems would work, but we were in suspense of the first U.S. man going to space."
Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin, or subscribe to Sharon's RSS feed . Her email address is firstname.lastname@example.org.
Read more about Emerging Technologies in Computerworld's Emerging Technologies Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
If you use ‘password,’ one the worst passwords, as your password, fail to keep antivirus protection updated and don’t bother to deploy security patches to close critical vulnerabilities, then maybe you should consider working for the cybersecurity-clueless federal government; you’d fit right in, according to Senator Tom Coburn's cybersecurity and critical infrastructure report.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- HP HAVEn: See the big picture in Big Data
- HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard
- This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting
- This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle
- This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle. All Government IT White Papers
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of...
- Mobile Apps and Devices Slash Customer Cycle Time Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After...
- All Government IT Webcasts