32

Ted Nelson Scrapbook - ia803101.us.archive.org

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Ted Nelson Scrapbook - ia803101.us.archive.org
Page 2: Ted Nelson Scrapbook - ia803101.us.archive.org

KWINK

h

of Swarthmore College Presents the 1957 Hamburg Sho w

Another thinly disguised WJR success story

A KOLLEKTION OF KUTE KOLLEGIATE KAPERS

& PUERILE PRANX

THE PROGRAM

ACT ONE

1. Prologue

(The stage of Clothier Hall, Swarthmore College) The Hamburg Show Song

2. Prologue to the Second Prologue

(As above, but better.)

The Rockin' Hamburg

3. Second Prologue

--— (Graduation at Wrathsome College*. The rest of the.. show,, save intermissions and fragments, takes

place at Wrathsome College, and no further mention will be allotted this fact.)

The Alma Mortar (Processional)

4. Let's Take a Trip

(The Seedier Local of the Murdock and East Priam Railroad.)

5. Scene around Campus

(The Campus.)

Gum Brothers

Ballet: “College” Friz the Frisby

6. An Un-Irving Experience

(The Campus, night.)

The Burden of Sensitivity

7. Turtles

(The Men's Infirmary.)

Mononucleosis

8. Pillage and Rapine

(The Dormitory Room of Jane Mool and Joan Walling.)

Title by President Courtney C. Smith

Book and Lyrics by Theodor H. Nelson

Music Written and Arranged by Richard L. Caplan

Choreography by Heli Spiegel

Programs by Pyle

Art Work by Russ Ryan

Photographs by Gordon Adams

Electronics by WSRN

Recording by TRULY ZORCH RECORD COMPANY

Lighters by Ronson

Tranquilizers by Miltown

Miss Milgrim's Dungarees by Levi

Copyright 1957 by Ted Nelson

(This program is NOTHING #4)

Sets by Chuck Ruff and Friends

Lighting by David Baltimore and Friends

Sound by Peter Temin and Friends

Stage Managing by Sananman

All Kinds of Help by Joe Keller

Sodium Propionate Added to Retard Spoilage.

ACT TWO

Blue Suede Loafers

(Around.)

Turkeys in the Straw.

(The Woods, near the Trestle.)

Orgy-Porgy

The Hall Truth

(A Public Hall.)

That Office

A Cry in' Sham

(The Snack Bar.)

Fur Enough

(A Parlor.)

He's Weird

Liberty, Equality

Just Plain Folks

(A Folk Festival.)

Rise up, Urban Proletariat

Gemeinschafted

(The Snack Bar.)

Truly Storch

(The Front Porch.)

Orgy-Porgy (reprise)

The Birds and the Beasts

(The room of Jane Mool and Joan Walling.)

Orgy-Porgy (reprise)

Excerpt from "Modern Sins"

Excerpt from "The Clipped Pegasus"

Seminar and Some Aren't

(A Seminar in a Lodge.)

It Can Be Seen as Looked upon from Different Points of View

A Pot of Message

(The Snack Bar.)

Song of Significance

Mollification

Girl Secret Agent....

Catherine Mills.

Girl Secret Age.it.

Jane Mool.

Sue Rilloway.

Girl Secret Agent.

Binnie Nustle.

Hermione Ham.

Molly Pitcher Storch.

Joan Walling.

Milie Winthrop.

Ellie Whelk.

Janet Farrell.

...Faith Blocksom

..Debbie Dempsey

.. .Barbara Gillies

.Carolyn Goldberg

.Linda Gordon

Carola Hamburger

...Lillian Kraemer

... .Debbie Kurmes

.Betty Ladd

.Lynn Milgrim

.Joan Pallme

.Janet Powell

.Helen Smits

Morris Walpole.Joe Adcock

Flipsy McFinn...'.Steve Beik

Dean (formerly a student at Swarthmore College before the Great War). Dick Caplan

College President.Harvey Caplan

Max Wabash.:.Bill Curreri

Russian Spy.Andy vanDam

Harry Mills.Charlie Dempsey

KWINK Soloist.Bob McDiarmid

American Spy.Maurice Eldridge

George Washington Storch.Peter Friedman

Rufus Mansfield.Steve Gilborn

The Ibn Khan.Murray Goldman

Ambrose Masterson.Seth Greenwald

Clint Apgar.Dietz Kessler

Millard Strimp.Robert Kramer

Alexander Hamilton Storch.Jeremy Mack

Sam Pickle.Brian Mangrum

Spy from Socony-Vacuum.Bob McMillan

Cholmondeley Stew-Dorking III.Bill Moulder

Dean (formerly a student at Swarthmore College

before the Great War).Ted Nelson

Spy from Cities Service.Tom Neumann

Herbert Marlin.Wentworth B. Ofuatey-Kodjoe

Herman C. Grubnik.Bob Patten

Faithful Old Wazir.Steve Peiker

Jock Stark.Evan Powell

Steven Pillworthy.Courtney Prentice

The Coach..Mike Sananman

Professor Whillikers.George Spelvin

22. Plots before My Eyes (Commons.)

23. Big Game Hunters (The Boudoir of Pete Schultz.)

Have You Seen?

24. Menage a Quoi?

(The Snack Bar.)

25. Physical Edification

(The Athletic Field.)

26. Extraneous and Gratuitous Nostalgia (A Parlor at Swarthmore College, 1916)

The Crum Song

27. Turtle Snoop (The Snack Bar.)

Itrs Not Bad Being out of College

28. Aarghhhh? (The Bedroom of the Ibn Khan.)

29. Slyness Trouble (The Snack Bar.)

Like Your Pleasure Big?

30. Putting the Heart before the Course

(The Library.)

I Just Feel Like Being in Love (with bibliography)

31. Peaches and Cream

(Near the Water Tower.)

_Carol. _ . ..._n Al lT_

32. Over and Out (The Snack Bar.)

Do the Rock-a-Doodle-Do Trombone.

Conductor.

Drum.

Organ.;.

Saxophone.

Guitar and Banjo..

Flute.

Nose Flute.

Guitar.

Banjo and Clarinet.

Bass Viol.

Clarinet and Saxophone.

Bagpipes and Oboe.

Piano.

Win Buck-waiter

.. .Dick Caplan

.Hugtt Uavy

.David Horr

.Bill Stell

.Dave Kresh

.Marcia Montin

.Ted Nelson

..Tom Newman

....Jim Perkins

..Ellie Schuker

....Bert Sippola

.Pete Smith

.. Dick Thomas

33. Epilogue (Graduation)

Post Mortar (Recessional)

events and reminiscences too numerous to acknowledge.

PLUS intersticial

Steve Agard, Andy vanDam, Phil Dunham, Dave Matsen

Eric Stephenson

THE FOLK .Joe Finesinger, Dave Kresh, Mike Lessac, Pete Napier,

Pete Offenhartz, Ellie Schuker, Dave Tucker, Jon Weil.

///V //// ^ y /f ^ /////ss, ,

Page 3: Ted Nelson Scrapbook - ia803101.us.archive.org

"SOFTWARE” NAT KUHN, 12 years old, an expert at computer programming, shown assisting with the exhibition.

FROM: Caroline S. Lerner/Joanne Lupton RUDER & FINN FINE ARTS 110 East 59th Street FOR IMMEDIATE RELEASE New York, N.Y. 10022 (212) PLaza 9-1800

FOR: "SOFTWARE" Exhibition

Nat Kuhn, 12 year old computer expert and member of the R.E.S.I.S.T.O.R.S. (Radically Emphatic Students Interested in Science, Technology, and other Research Studies) who is assisting with the exhibition, SOFTWARE.

Organized in 1967, THE R.E.S.I.S.T.O.R.S. are a group of about a dozen students from the Princeton, J.J. area, aged 12 to 18, who are whizzes with computers. Among their accomplishments are:

— they have participated in the last three Spring Joint Computer Conference, at one of which, during the telephone strike, they brought down the house by contriving to go "on line" through a pay telephone, since regular phone equipment was unavailable.

--they delivered eight official papers at the DECUS computer symposium last year.

—at the 1970 Conference, they set a precedent by giving the first student technical talk, at which appeared the largest audience of the entire conference program.

%

— In a Princeton barn, they work with five computers which they either own, or use on loan. These include a music synthesizer, a digital light organ, a Calcomp plotter, and a DEC PDP-8 computer like the one to be used in SOFTWARE.

--they have introduced computers to a group of disadvantaged stidents in Trenton.

Page 4: Ted Nelson Scrapbook - ia803101.us.archive.org

--

' .

I

Page 5: Ted Nelson Scrapbook - ia803101.us.archive.org

'VKjl £Ofrie/ Oay ■

?£/&£ - /nk^

/(

" /Z^-f i*,ru**2(/

7~/ a a fjoJ v

tyus T/yy?

Page 6: Ted Nelson Scrapbook - ia803101.us.archive.org

'/2JL

Page 7: Ted Nelson Scrapbook - ia803101.us.archive.org

Computers

Let Us Mow Praise Famous Hackers A new view of some much maligned electronic pioneers

Ted Nelson

Legend at M.I.T. has it that one night in the mid-'50s some students

paid a clandestine visit to Cambridge's Kendall Square subway station, where they quietly spread grease all over the tracks. The next morning, the first train that pulled into the station hit the

x grease and skidded right »through the other side, Staking its passengers to «an unscheduled stop in Sthe middle of a dark¬ ened tunnel. When the ”motorman backed up to

see what had happened, the train slid through the station in the other direction as well. The ensuing snarl is sup¬ posed to have tied up transit officials and straphangers for hours.

For several generations of M.I.T. en¬ gineers, the subway prank was known as the ultimate “hack,” the rare prac¬ tical joke clever and elegant enough to be worthy of one of the world’s most prestigious technical schools. Today the best and the brightest technol¬ ogy students are more likely to be found hanging around a computer system than a sub¬ way system. But they still call themselves hackers, and al¬ though they insist they have been misunderstood, their re¬ lationship with the public is once again on the skids.

Last year’s hit movie War- Games and a series of well-publicized computer break-ins have created an im¬ age of a teen-age computer hacker that is giving the term a bad name. Many people now think of hackers as pests or perhaps even criminals. But the hackers them¬ selves claim they are getting a bum rap from movies and newspapers. Says Bill Burns, an industrial psychologist and part-time hacker: “We are the victims of a major press screw-up.”

Hackers, as most x

3computer experts use the 2 term, are distinguished » not by their mischievous- 5 ness but by their persis- rtence and skill. Some of ” the key breakthroughs in

modern computer sci¬ ence. including the devel¬ opment of the personal computer, can be traced to these often fanatically dedicated people. Even

Bill Atkinson today, men and women

“Cap’n Crunch” Draper

who are proud to call them¬ selves hackers can be found in the research departments of al¬ most any major computer firm, designing state-of-the-art ma¬ chines and writing the software that runs on them.

Now some of the real com¬ puter whiz kids are finally getting their due. In a new book called Hackers (Double¬ day; $17.95), Writer Steven Levy argues that these “sci¬ ence-mad people" are the true heroes of the computer revolution. He traces the history' of hackers from M.I.T.'s Tech Model Railroad Club, their first mecca. to Silicon Valley’s Homebrew Computer Club, an early microcomputer gathering spot, to a video-game factory in Coarsegold. Calif. Through it all he dis¬ cerns a common thread: the unspoken as¬ sumption among crack computer pro¬ grammers and engineers that they could straighten out the world by dint of

z their intelligence if they could 5 only get their hands on the 1 control box.

The overpowering urge to compute, as Levy describes it, has always seemed bizarre to outsiders. At M.I.T. and Stan¬ ford the true devotees would skip meals, drop classes and give up sleep and social lives to burrow' deeper and deeper into their beloved electronic brains. Once they started on a project, they would regularly “wrap around.” working day and

night until, after 30 hours, they collapsed on the nearest cot or sofa. Programmers at Stanford's Artificial Intelligence Lab eventually discovered that the space between the roof and false ceiling made a comfortable sleeping hutch, and some of them lived there for months at a time.

Two weeks ago. 130 of America's most devoted hackers gathered in the bar¬ racks of a refurbished Army post in Sau- salito. Calif., at the invitation of a group of computer experts headed by Stewart Brand, editor in chief of the Whole Earth

Software Catalog. Brand's idea was to bring together, for the first time, people from several generations of hackers, and his guests included some of the brightest stars in computing: Ted Nelson, author of Computer Lib. a widely read handbook from the mid-1970s: Stephen Wozniak. who built the original Apple computer; Lee Felsenstein. designer of the Osborne 1; Richard Greenblatt. who developed the LISP machines used in artificial-intelli¬

Sat Tara Singh Khalsa

gence research: and Burrell Smith, a * time Apple repairman who went oi build the Macintosh computer.

There were a fair share of sha beards, silver-winged baseball L

^and even one turban, worn 5 a Montana-born program i 5 who now calls himself Sat T ; Singh Khalsa. But for the n |part the hackers looked m Hike backpackers or profess,

al musicians than any ster type image of computer nc By day, they met for disc sions and debates that inch ed a face-off between D, Parker, a computer-crime i pert, and John Draper, the 1 endary “Cap’n Crunch,” v. developed a system for mak

free phone calls by using the toy whi from a breakfast-cereal box to imitaie tone used by AT&T for long-dista; calls. At night the hackers cluste. around a dazzling array of com pi: hardware that beeped and glowed unt: o’clock each morning.

Most of the weekend conferenc though, was spent trying to plot the futu of hacking in an industry increasing dominated by marketers and venture ca: italists. Everyone present seemed to agr that commercialism had changed the n ture of computing. What was less cle was what the new rules for hacking ou: to be. Said Bill Atkinson, author of flashy new program called MacPai. “The question is, how do you spread e: citement around?”

Many first-generation hackers, ha\ ing struggled with the red tape that sui rounded million-dollar systems in th early days of computing, tended to vie such things as copy-protection scheme which make it difficult to steal prc grams, as barriers to the free flow of information.: Other hackers, however, j protested that anyone; who spends thousands ofgj hours writing a program \ deserves to earn royalties: on it. Said Robert Wood- head. co-author of a best¬ selling game called Wiz¬ ardry: “My soul is in my product.”

As the industry has matured, so have the Stephen Wozn pioneers who helped build it. Most of the high priests of hackii have long ago grown out of the prankste: ism associated with their name, and man; feel it is time they set an example for th. next generation of computer fans. “It one thing for a high school kid to show ot how he can dial the phone for free.” sa> Brian Harvey, an M.I.T. hacker turne high school teacher. “It's quite another fc an adult to go around encouraging school kids to steal.” —By Philip Eimer-De Wi

76 TIME. DECEMBER 3.

Page 8: Ted Nelson Scrapbook - ia803101.us.archive.org

'

Page 9: Ted Nelson Scrapbook - ia803101.us.archive.org

VASSAR COLLEGE

January 5» 1965

TO: FROM: SUBJECT:

Members of the College Community Faculty Science Club Lecture on Computers by Theodor Nelson, Instructor in Sociology 8:00 p.m. Wednesday, January 27 - The Aula

The Faculty Science Club is pleased to sponsor the talk described below for the benefit of all members of the College community interested in learning more about uses of the computer in the academic environment.

COMPUTERS, CREATIVITY, AND THE NATURE OF THE WRITTEN WORD

No special background is necessary to understand this; indeed, “special" background may well be detrimental.

Everybody’s misimpress ion of electronic computers -- a mis- impression peculiarly acute among “computer people" -- continues to restrict the general use of computers to essentially numerical tasks. Inherently these machines have far broader capacities; the limits are not of technology, but of imagination

This talk will first describe the structure and generality of the stored-program digital computer. The computer is NOT mathematical: if it is the most perfect adding machine, it is also the most perfect typewriter, electric train control, filing cabinet, movie projector, and musical instrument. But whole new attitudes will be needed, and liberal-arts personages will have to learn to program, before computers can make their real contribution to civilization.

The speaker will describe his own experiments in this direction trying to build “systems" for the handling of creative (and academic) materials -- ideas, words, and other things. A succession of approaches, and their increasing generality, will be explained.

The philosophic consequences of all this are very grave. Our concepts of “reading", “writing", and “book" fall apart, and we are challenged to design “hyperfiles" and write “hypertexts" that may have more teaching power than anything that could ever be printed on paper.

Please fetl free to invite any interested students.

Sue Lumb, President Robert Rehwold, Vice-President

Stanley Novak, Secretary

Page 10: Ted Nelson Scrapbook - ia803101.us.archive.org

Digitized by the Internet Archive in 2019 with funding from Kahle/Austin Foundation

https://archive.org/details/tednelsonscrapboOOtedn

Page 11: Ted Nelson Scrapbook - ia803101.us.archive.org

OJJ-IV

'PP

^

q>

*ak

l vzjL

'wop

l*r?o

^

qjI j

Page 12: Ted Nelson Scrapbook - ia803101.us.archive.org

|f a-

•40

•3*611 2S§|

j-§

I: Sf 2 I*. 3 C a> o t* J}*i.s

si! 83 3

$$§

* >.8 ■Q <9

f-s-g, lllf ■“ 3 fe 4>' SBS g gm: 3 S.||’g

-111 T3

mAmn £2 *0 c *S *0 -*S ^ & *2 cl S _. 3 o. a} 0 a a o

3=|>lf 3 4> G ^ o 9-S °o = >^S2 J

jsiirti;|i

= ~r «■s ~Sr 3» f a-f N _

. * " 41 ,3 Jl->> 3 c. -

'3'Sfissp

a :83ft5

ifHJ- .2 = sf£ "SSslA.

J* ^§5g

cfl a c ’ .*f£-

S

Page 13: Ted Nelson Scrapbook - ia803101.us.archive.org

flJy ( Tnf. H\ -Libido

j? vxl-^X bntrU

Unw, jf ~TffkjO

GmmMCOfrtz NCC#

/\° ylnmv-7 // i\frfXj>r<\ri\ I

frwwl / /Tm

rli:l/uV 21-Ti'ffl, 3 4j&, 5Ffjiv>

•7<7)*‘, £li&5 ASM,-) &■?>,<— 3 >B$ftlc3?

I hU'7 Zklz%:*>T .

5S--co<£7Ty^ k t,> 7 <7)ti, /r*yV » ^jTyy x>zkX

t> h . T 7 7 ij T, r -Tj, A+,— A 3 7 h‘ /

* - * ($5IK*> 0 .' V -V#^VtWft'f' -*'1

tftft T,1 3 - x I toTi Yjv tc 4- o /:. - c Jif-L7

f£t0 3Mc*‘*>&L. IBM i.Sgfeilt^O, iti®cC6'-j(--5-

coti'flK MISSS, 1M& LISfi'j 5£L". t 4 4

A. IBM f£tOfj*A>7f-;5t(4. T^TtO

t73V - y — — tciailt 44x-C«,'S.Ztt4^7 i T & $:

v>. jl:.icf/£t4, 3>fa-?5fn7^7 •

7 J

:tUUi>. ftifito ( 6^ 2 Htt) 1C,

M^fttoMrii.!

<S3S, IBM IcRS^T,

?£&? lx T<.'-Stole, T —/u K • 7 r 7 y a xOjtHffi3* T

7 n >*n>* t'lzftnx *.' & <nx~t (,, ^gt LT14^

-S-fUT-t: 4 $.-t'to-CYj

* * *

c. ztc3*iSIcoAP.3*<^*c. t £&IdL l 7 .

i-fli. £f£co9*iJ9^£,S^£T7 3 f$4

(4 i $ ic^toi) 7 i 7 1C, 1975 3 >B?F^lc

AoTt, 4 T 7 -f 7 • 7 1^ — Atl.-* 4 T 7 3 >

Sr^o-CV’*. riliS:«o

t £j (S5IR4-L) CO + T-, /-f >-'7k-i*<

10 %, W 3 >A< 90 % tC£-£ tv >otl' 6tv> 7 tOlC- .

3t, 8H x>l %<7)/<-3 >^|g#(e*>oT t>, ®.1?.co

*> S A, ti V' AT^iitii L "C £ . A t £ 14', ✓ <— 3 >14 $r-<f £ icltffx

t£<7)ti%£*‘fi7o-CW‘£ . r80^-f^li, * ') -£A-fl:iefgA £B$fAT-*> '),

C lx £1HH t L tz'<- 7 ■+ ^ • 7 > ?-le A 5 frWft

CkLtW, BASIC aiS*M£x £ rf.x h • 3

> h"^- 7 - 1><lhm L tz *4 80 £ feSC1- £ l^nS. k i»i

*. c: H 1±IH A u 'ov x-l® Ai“ 4 -v -> — > tiii*. WJ-.5^ <r> * *

-vt^tlli, riiilg, i5r.S, kAHAm^Si in, mm-t-&(nti&fflAk l x 7, c.

dlllCjhfL. r^3 > h" ^ ^ i «6n^tc^f5 H

9 ~10 Bt>^*'fi/C5fs 1 |SJ OA tv- b .

#(2fS5Si.tc r-?-aii LSI tf^i ixtzfr j J:«,» 7 T-*^>

7. to* .SSIgEt (ix^4-v><7)-c*>oT.

Znttfz/Uz, ->-X(t£ffim)A't> lx>£A.r i'Zx>t:-t

*■ /W V ✓*‘i#i)toti, — x*( Aimfp.ij) 4 S to A

Tt'JCtTI) 4 .r'--— 3 n/cto"t±, -6

*‘4, L'S«, ftiix/ctofj', &tnii LtzW&IrgtzntS.

k&faWn&VKliniZ. tot, 15S-:!iS*-<3lJn.^t^ <4/C'j tl^liiLrv'4.

* * *

5 II (C, 7/ 'J *«NCC’80 ichotll;.

ittL*'o7ctDI2. 47 A t 7 7-tofTO^'T, *<—zj >

^■<o*$,ULlci>i7 <, £t.KLJ:7 ti'I Ali 2 A<- 4i> 11'.

1 [a] OA IS^’^^tt-73 > • y— Ato-tft.) t

*>oT, #*fl#250 Atojf# tfici.J

-£ < §s=to^ffl^—nic^DTft. m 4) *,^aa‘JL7crBAsic

TRAIN 10j (-^Wf) tofltj S'Afv'yc^fc: 7. *£!=#*&**

tc, MiSto^''— 3 xciilt Z v 7 I BASIC eofulSB

^., ^itftSIS^toft^AtS^nxv'-ScOT-T.

^ng<oim^HiLic*7t>T(i, aiAftaJrx s^jul y

ssfUfflj tofsa^-.. i£{^ r-?-f 3 >• > **4 • f + XJ C7:CT) (i, ffttOlit¥

£*>t-t k Zhtc <fiit, PC <>*-3 >)co Y

^15iJ$'/l<LT < nx^icox-x. [fillsto 120 < ,

r^oTtO IBM 5100 *< 5110 < >1: o 7c i

7 ic, Cto 5120 coft&izi oT 5110 li-¥-Hjfcffi*S*‘43?£

•i^TtO-C-iiSo-'TL^ 7 **. - tOtt^fftoSi L ? I±, <1

<ot=-i—- ^toSir-cti* ») ixtA. iiitlo

*»•) LTLJt'it.

»t IBM nr-Xlct'J, fsj t 4-1' to $r 591 ^ t, Wang

DEC <D 7’— x (cjjft *1 .

t C.4*f, NCC «0—^toat'C.4ii rT ••/ 7°/u • 3 > E

a — 9 ttj to 7— x tc * o tz k -®. 7 . fCH. T / ') t Kit.

-i to7"—X lc3iS Llf (c * A a LTKfci

c:«o NCC T- Apple in Zltt*>X5tnLtz.

^- — — 7ti^Tzmt, h'to^^h[fi]KSMC, -/7 I to

UB £ [Blit 45 T-^ O T I'tzZkK.

rT ■■/ 7*/t* ^>7t/~ xs ^7t')X hj(S'J« Visi

Cale III) .

r7’o 77 5 < T !i, -tcOB *>'4®?^.

^^tO^S?5(C4-') if. e#tfiSi**4 74 v 7 h • 7-yx

<* Tj t V' 7 visi Cale m 14, nnbnvfzmizk ox;l

atcffif*.

J^^tO NCC’81 (4, T y 7"^to Visi Cale III t, 7 — K tti

<7> PIPS k, 7 >T < x> DBMS t tOj^^EtOBS'-' lc4‘ 4 X

t>7> 7 . 77 Me t -jUffl" toB$R‘^1*4x1 7 t LTv>S

<0T*>4>. »^14^n.^-i:>l$4lcLTV'4. (ON)

Aug. 1980 '2-wWifXCe ■ J81

Page 14: Ted Nelson Scrapbook - ia803101.us.archive.org

£JES^2B5T_4S|1_neet|ng_reyx^H

fycLeiftr, «-V. m3

"Hypetman Meets the Cybercrud" . rcri-

On February 21, in the sedate halls of The Sprinq House, a whirling dervish named Theodor Nelson descended on the auqust proceedings of the annual ACM^CSA joint meeting. when the dust cleared a disarray of reeling senses and violated egos could te observed.

Although, Mr. Nelson's primary target is educators, he opened with a barrage on Computer Scientists whom he characterized as biqh priests of "cybercrud". He felt, we, like our engineering brethren, pursued our dreams in isolation from the rest of the race and as such Created systems which abused people rather than served them. He warned, the computer, like the automobile, was a machine for the people and, in time, they would turn out the priests and claim it as their own.

&£• Nelson then turned his attention to CAI specifically. He saw education as a vast desensitizing process geared tc purge the young of every vestige of imagination, enthusiasm, and creativity. Stu¬ dents, teachers, and administrators alike were trapped in this factory for molding youth into old men. To him, CAI was its latest Captive, It served only to automate this destructive process and intensify the depersonalization.

According to Nelson, the liberator of CAI and the rest of the prisoners is "hypermedia". Hypermedia differs from conventional CAI in that control resides with the student rather than the system. The Student is given a wide range of computer based "on-line'* graphic and text manipulating facilities which respond to, rather than direct, hi® as he explores areas of knowledge of his own chosinq and in his own way, Mr, Nelson outlined his concept of such a system, i.e., Prelect Xanadu with hypertext, hypergrams, etc. (see Nelson's article in ^gmputer^Pecisions, Sept, 1970), Contrary to CAI experts, he believes such systems are feasible within the current technology. He claims these systems ar.e inherently simple since they are stripped Of the "talk back and; direct" capabilities which only inhibit students,

Wr, Nelson unquestionably entertained, but did he enlighten? In the opinion of this reviewer, he did both, Underneath the showman¬ ship, he had a valid mission. In the spirit of Dreyfus, he calls this field to task. Be makes us lift our robes to see if perhaps we too might, have feet of clay*

Page 15: Ted Nelson Scrapbook - ia803101.us.archive.org

.

-*

!. •

'

Page 16: Ted Nelson Scrapbook - ia803101.us.archive.org

O While Douglas Engelbart slowly pieces together his intellect augmentation system, a 32-year old consultant named Ted Nelson blazes McLuhanes- que paths into uncharted communications systems.

Nelson, lean, well-educated, and fast-talking has a real flair for¥showmanship. He got his theatrical abilities from his parents, Hollywood film producer Ralph Nelson, and actress-singer Celeste Holm; his education from Swarthmore, the University of Chicago and Harvard, where he received an M.A. in sociology. Nelson has been a consultant to Bell Telephone Laboratories, CBS Labs, and IBM.

To these oganizations, as well as any others that will listen, Nelson proposes a text and graphics manipulation program which he dubs his “fantasm system.” This is derived from another Nelson word, “fantics,” which he defines as the art and science of presentation—“making things look good, feel right, and come across clearly.” The central piece of equipment in Nelson’s fantasm system is his Xan¬ adu machine—a souped-up version of the one built by Engelbart.

Like the latter, Nelson would use a computer- driven cathode-ray tube information display, but there the similarity ends. Data in the fantasm sys¬ tem would be stored in the computer in what he calls “hypertext” form—a multilevel melange of characters, diagrams, images and movies. Instead of manipulating various complicated controls, the reader would “fly” the machine with a single control stick, which would work somewhat like the joystick in an airplane. When moved right or left, the control stick would make the hypertext proceed forward or backward with a speed proportional to the amount of deflection. Thus, for example, fast readers would push the stick to the far right. Moving the stick toward or away from the reader would make the hypertext either more detailed or more summarized.

Writing, according to Nelson, would take place, whenever and wherever thoughts occur on a small pocket keyboard, which would be at the hypertext writer’s instant disposal; all typed notes and pas¬ sages would go right on magnetic tape. Cassettes would be unplugged from the back of the pocket

t

keyboard and snapped into the Xanadu machine, accomplishing what Nelson glibly refers to as “prestidigitative publishing.”

Whether or not Nelson’s visions come true, one thing’s sure: he bristles with ideas about communi¬ cations, and at least one company, IBM, has success¬ fully introduced a typing system product based on one fragment of Nelson’s schemes. Nelson himself is perhaps the greatest living proof of the effective¬ ness of “fantics.” Says one Time Inc. executive after witnessing a Nelson presentation, “Boy, you should have seen him. He was barely up there 10 minutes when he had businessmen in the audience practically ripping their pockets trying to get to their checkbooks.” "“Man, they were stepping all over each other to underwrite his projects.”

Perhaps, though, there is a very simple explana¬ tion for Ted Nelson’s effectiveness: One of his favorite heroes is P. T. Barnum.

Electronics j November 24, 1969 97

Page 17: Ted Nelson Scrapbook - ia803101.us.archive.org

II tm

~) fxo 1

A

eV K^je - (Jitr ^aka^J S^sffe^

X\*i\bO C0KfO7fc*E.

\Z€\r «^\a) 4c. 1 PnSJV'.H-^

?)oevi»*a\^Y O'xYroj

^os

--

N

/K n

czi> *WS S TOV^^vtre

(^ ’-f Ic *pv ^ )

fevstAx) (om r|e/ ......_»r _l osc^ ce>1.>«|

*|crvMu^| TK

t\)Lri -US^XW)^ Sf?

Oh -X-t-J-t-X

\©c>1

$VdKcl^

X^X^V/ S^^kAs

1 X^A y Rc\ *-*v>| I

! ^c • frof

S

-—r t—L=

4>hA^\ ce^f^

(M«*, lv?^ |o ^|tc>r- ro^ffy}

ftr 0,k.

«^+T° *"' rr*'

** LtGK-L Notice. N«+« MTU uSC.

«Y fri'-.ti.'jt.. ,! j.vejc^|«^ Hx »s **, aV(

HrM'-r f«U.),n js^ \. 4%r r*.lAC’A*'t* -To r>vpof<t<| ^ufMAe^f

Km Ua.V •*- if UM

®H7lr tieW

Page 18: Ted Nelson Scrapbook - ia803101.us.archive.org

hcTH°i

fX^^u^{}vre^t5V5m

W*|\ (cot I'k ?' hoo *<J~. Uk c45}. Wpkjsh , w, 4‘-, vzy- rts^KLj. 1 ' ) J

:t O k\ 1°°^ 1’^ ^ /oo^j j,|^ ^ ^v^u^-£|fej_

t/ * pXj'c-ac?***^ <{*|* ijowt^

4-0^ Jt 1 1 “

... ti^ 4\ ■ 17 i y. _K

ft>.- ,* Mice. 'IliUp. . +> «-y ^ iforc V~-tu^.

oy (uf< uo -,.5CC ,!^1^' Ay*v.

._ y r r1"11 --),i.L(t T^Z;xCfq'y •T- AM ft' ^ rev,*; p,„ ^c,.| tASi, 1 „ ,1 ,f YJ

I^H^l -f*,^ >5 *f*» , ;rL/,iU rY^'

<-4^4 “* JT_T<’1'^ “:,*' V” & * ^rH) -^fMtJr

50

^ i!'H s-f rk u 4 u«..

k° c\ <\4 %,,f ot- i 'S'’ v c^pus:^ W d c\ l^v L<

f°l t* U'j j> r

l^er/o^

Dir ^0^6^ fe^,^|

H Ik JJ4* ^U skx c-^ lc tet ^pA.cs 4mrf

jnlpv^c <?r" /fv^r L.^faK u t / J. * ' . 4^,_ T^A <^u|.c,f|^ .,5 44} or j.^es or is*^st ca[

*f oor j.^y M0O

\ *h'° ^irjr^a| -* - " - /

^ • c • £

(aa V

-0-

yz<L *'Ty °

VinCAt- Cpti/sot^:

wo|s^ pk Mv|(.h; i^ea/j excerr| fr»^

" /i-cSYM^ t- j4^\. 4^^

f^OSo^frL (jdmajvex

) /c*>4 )

J<N

/y^f^SS^ \ j I 3V4,nir5i^^

t X^Cf JTfVt- 5o^xftU,^5

STJ*^

U dK 4

.11

IJ ,5 C ^l^Vi^ V-C,>jj . JLV/Atpl}^ ,

nr-*

Page 19: Ted Nelson Scrapbook - ia803101.us.archive.org

'«.

fufc-'PMg- Tf)E i'gwty.

\ j |ff3 (Y'ylY jvaviK * i'--.' - '£'-' t(- 'Hk. 5\Ste^ J <?Y uutet |p£V%0\/l*-^cX pKOViX^i

' W\S

£t£E HootLY WrE. &hoj\ >f~ U

\T VjtPLvcs-; hofcou^^i cosf c>f e>\r txf'e.v^Jf

Co

> % tjt> bijj'er' h*v <

9- Of t° * of <fcxf y$~(lO cpr?)l

ffr Oj> fi> 3 cerfzt\ r&v^ speef c/>S ?) ?

^ if?e^vy^|e^ 4

kVX^or? roy^-uy ^/full-soec^ L, our^ J %k?£L

fO^Lld^ioNj CYSTTfjResYU).

Y'1'] sW"U ■}' “Y 'f ,5HV)^\; X " * ^CcU^^?

fOBjjc^tionj tYMM l\fc Co^T: Y* coc)^oouS c4:

r °^ **?" o c^ocvu^e^ \ij .occecrY/e.

SP^tM-'F^TCH CB9T-- a^-M YY, Y ulUf ^cU^ • < -j, t«*.f VxjmAIi »«e«.4/«.

.» . _ e>r^ mK’Zrrv

f^YFOYAYM YG ACeV, T^J~~ 5 j7 fno^.b) server *}—e/fr* o»f? (Y. 'p^n-T.-pwn cjjs')

^S*T s^vvioe. oi^ 4^H-, W'>? 7 EkYv>- »-vj|f'4e'Sx’r€'!-L> clwro/ei^

Page 20: Ted Nelson Scrapbook - ia803101.us.archive.org

© —I

f

& o

y

<=r>

f <3 CT=> -*0 ro C

o

5

e

v* ?

Ot

f* /OS

O' .r

V/

w r

e -PO

5 J

Sl'f

ff^£-4 J5-S f^-v

V\ c

> ■ x r» ^ °

«w >• r -

-A_-ts o '^'O •- - _

1 *? ' r -4< j: kj> ~r^

;W

x O o ^ /v ^ . n*

>

Vs ‘ T

2 <$

r i Jj

v>

c' •■* /S

5 | JFl £

.? r 4'

£ 5 e- 4>

ft*

£ v - S

- O -<■ Cn 5~~ V •«• O- T v -

•r~ < - V^r-* £-4-

"*V .** <

-St

\l

A>

Sr?

-*5

Q? r\ ^

r* /*■

?

O? -s-r <

^ 6

o 6

O &

-T

n U^*/~oy~l

<?:

§ o

03

S'

o/ CN

r*

-?

Ol

9 op*

$

^-o 4r>

^ *$ —

- rO-

?*?

W

a c -<

c

r

£ ^ c_ ^s_

F

0» T

r ~v

p>»

1,

•£ ;

OQ -r £- 5

X c 3

■*: «or C pv ■o

r

f x o

r-

X v\ v r>

v n> —■

/

c>

£ ? ra i'

7^ X ,

c-o to r>.

o

VA

r*

c1

<i>A/V€M noAj^L

G V77

o

T y

*3^ ■\

p> 5

?

% j

x.

$

cJ >•

'o

t, r

Q

c- r

5t

H -vs

^ It rn

-T-5

9 vC^-

“H.

6^}

r«>

/

s n r ? ? vS

/S3

fx

-« r

J.

"X J7 r* u

f ^ •Nl

V.

rx

r x

-3^ “S

n X

vJvS

AS

VO

J?

4 /i «*

f? r>

V* s>

\>

5 V-^

frf ! ^ <&

_T\ in -

f° c»

1 r ^

So? ?

a r >»

-*o O’ /

$l*f- c^»

n, >.

z y f—i

-S' I^t . of ?r' ■

+ ii £- ? *»

^ 5 r'*

V jr -S-

- vSJ

> T^v

f CO ^9^

.4

if L* r\ ->

:?'$f*!r; C -

■VI.

J X ^ _

SS q vV'^,

V» N .

J r

> -is ^ > c 4 a -_v

‘ r 7

^ V *

r%

£

x

?T-e r

j. V

rr>

o

^ ?

Vr> ~r ^

7

u r ^

X>i- o '

>

—■<!

1 %? fi§

79 44 O'

% Vs

1^5

<5 S

r X

11

I s> r

--SL

Page 21: Ted Nelson Scrapbook - ia803101.us.archive.org

PXX vt

Note: "Xanadu Information System, " "Xanadu Hypertext Network. "

“Xanadu Information Terminal, ’’ 'Lightning Literature, “

and the "Etemal-Flaming-X Symbol" are trade and tervict marks for products and services

offered by Theodor H. Neison.

Please Circidatp and Post

A DISCUSSION PROSPECTUS

The following specifications are presented for general comment prior to being frozen for implementation.

The Xanadu Hypertext Network has been designed as a universal publication system to make written material of all kinds instantly available electronically.

The principal purposes of this enterprise are to provide a universal system for electronic publication and to assure the rapid availability of writings in general and of our literary and historical heritage. We further intend to assure standardization, and most especially to set a level of performance from which no one may accidentally or purposely retreat.

Readers, authors, researchers, browsers and publishers will all find certain of their needs met. The network is intended as well to be a powerful environment for private and unguided study of any subject. It is also inten¬ ded as a general archival repository, and can function directly as a teleconferencing and electronic mail system.

CONVENTION 1. TYPES OF DOCUMENT

A document consists of any text and/or links that someone wishes to store. Thus the Gettysburg Address is a document; “Jabberwocky” is a document; and a set of links between

them is a separate document. A document may also consist of changes to another document. Thus the modified Gettysburg Address

published in MAD by Doodles Weaver may be thought of as two documents: the original, and the changes. The integrity of each document is maintained by these separations: derivative documents are perma¬

nently defined in terms of the originals and the changes. Evolutionary continuity is unambiguous and storage space is saved.

© 1978 THEODOR H. NELSON

Page 22: Ted Nelson Scrapbook - ia803101.us.archive.org

FXX VI

CONVENTION 2. OWNERSHIP, CONTROL, ROYALTY

Ancient and public-domain documents have no owner. Otherwise, each document has an owner who

controls it and receives royalties for its use.

The owner determines whether a document is to be private or not.

The owner does not determine whether a reader may create links to it or modified versions of it.

The owner receives a royalty based upon use: especially, a royalty rate based upon the length of time

his document is on a reader’s screen. If it is on a screen for one hour, he receives a full hour’s royalty. If it

is on the screen for half an hour, or on half the screen for one hour, he receives half the hour’s royalty.

If a modified document is read, the original owner and the modifier split the royalty in proportion to

the size of the changes, as determined automatically.

A uniform royalty for all authors and documents is desirable, since this means there is no pretext for

the system’s keeping track of who reads what.

(Note that “on the screen,” above, may for practical purposes be interpreted as in the final buffer area.)

A one-time royalty is to be paid if a paper copy is made.

CONVENTION 3. LEVELS OF PUBLICATION

A document may be private or published. A private document may be read and linked-to only by the

owiier and his associates. A published documerit is available to anyone, and may be read and linked-to by anyone.

The name and author of a published document are listed in various directories, which are themselves

published documents.

A published document may not be withdrawn from publication. Its owner may publish a modified ver¬

sion, with a request not to use the previous version, but the previous version remains published.

A document at an intermediate level, the open document, is generally available but not listed in direc¬

tories.

CONVENTION 4. TYPES OF LINKAGE

Links are made by individuals as pathways for the reader’s exploration; thus they are parts or modifica¬

tions of the actual text. Links may be created within or between documents.

Any type of linkage is possible in principle. We are presently concentrating on three of basically literary

origin:

I The jump-link. As symbolized by the asterisk, this generalizes the footnote.

H The quote-window. This allows one document to quote another, with the reader at once free

to peruse the document of origin.

H Collateration. This sets parts of two documents in correspondence to one another, permitting

recognition and close study of the corresponding parts.

Collateration between successor versions of a document is automatic.

CONVENTION 5. FUNDING AND ACCESS

An hourly base rate is charged to all users.

This includes the cost of fetching all materials and of all editing operations, and the hourly royalty to be

divided among authors.

It also includes the placing in archival storage of all that a normal user can type in one hour.

This archival storage is comparatively slow to retrieve, involving minutes rather than seconds.

Storage at a more accessible level, or at more than one main station, involves additional storage charges.

Thus a “publisher” is someone who pays for the rapid accessibility of materials and benefits from their use

along with the author.

Page 23: Ted Nelson Scrapbook - ia803101.us.archive.org

PXX VI

SYSTEM INTERNALS

These external specifications are made possible only by certain technical developments which are for

the present proprietary and secret. A number of radical discoveries in the field of computer indexing and re¬

trieval render it possible to offer these services within seconds on configurations of present-day equipment,

even as the number of documents and service requests expands to astronomical figures.

OTHER MATTERS

The network will not monitor who reads what or who writes what. Movement of text in the network

will be under the dispersed control of user requests, with no central list of what is currently being read.

The network is to be a distributed system of storage and local services, with high-speed lines connecting

the storage centers. Each main station is to have a number of functions:

II Local service to local user terminals, honoring local requests or passing them on to other main

stations.

H Local storage of materials owned by local users and of materials having high usage at this locality.

51 Pass-through of requests and materials from other main stations, to local users or other main

stations.

H Assigned storage: duties of archival and repository storage as assigned within the system.

The Xanadu Information System ™ consists of the Xanadu Hypertext Network used in conjunction

with an official Xanadu Information Terminal ™ . This and other trademarks will be available under nominal

license fees to vendors offering compatible equipment, as precisely defined under specifications to be released

at a later time and subject to phased change.

Studies are underway as to the best feasible organization for both system security and general economic

incentive. Dispersed private-sector financing is foreseen, with probable use of the franchising mechanism. While

the profit motive is necessarily involved—the profit motives of many firms and individuals must be enlisted—

the ultimate goal is plain, idealistic and simple.

OTHER ISSUES

A number of thorny issues, and their relation to these designs, remain to be discussed. These include

system-level encryptions, libel, copyright infringement, “national security,” hardening of the archives against

war or disaster, and the general issue-cluster relating to privacy, withdrawability and the financing of archival

keepage.

Your comments are invited.

TED NELSON PROJECT XANADU

BOX 128 SWARTHMORE, PA 19081

We regret that there is little opportunity to answer correspondence. If there is sufficient interest, a

convention may be held in 1978 to discuss these matters. If you would come, please so indicate.

Page 24: Ted Nelson Scrapbook - ia803101.us.archive.org

Example of a clarifying screen visual Jmion; THE fARALlfi TEKTfACf^

The problem: bow to make It easy for a reader or author to r«a4, wrl or revise on a screen; bow to make textual jotercoraparlsop ana clear.

"in.

Speed control:

H.g’ht '•‘Ipen moves 11 **P or ahawra.

forward

%&c>kwaindl

l* nev;io.»jrs w nsHaams:

hachward *?.n fcJiine

Swnwarstf Hm Ctwne

V SSwwwnt

oo m&mxmxfge

% ite;4.e»te

a copy jr

s r ;to j&fofc

Page 25: Ted Nelson Scrapbook - ia803101.us.archive.org
Page 26: Ted Nelson Scrapbook - ia803101.us.archive.org

b^ A Cq b

b <tr Or <b „ ho

A b O O

*•> -b *V b 000

0“ <$? V

■HO Vy b bb o a ,er

rb -Q ' b' b

O b a -O' b

HO Ho

0- -0 b o

Ho Crj

O' b 0

HO -vQ* Ho

„ A Ho 0

0> . o 0* V4

o b" CT .0 o c 0 Ho Sy

O’ o

<0 OO b

Or. O’ O O' b Ho <&

o -o o-_o b,. *0 b O <) b tr \ Ho O0>

b 0 O O' b b b . b b

O O O b b b O . b ^ 4 O'

O b O O b <&■ -«* b O' b OO

b O Ho O O • b O Cj C> O O b O'HoObb'bb©

b b AT o' QJ b b b o *v b b .© 0

& A*

A b b 00. b Cp * A

</'bbV nj* O A ho b Or O'

Ho O O' b b

.O b o (b O'

Ho A-

o O’ o

O cO *0 O' O OO H-’Oooo'O- b

O - t b Qj b Qj O' A Qj Qj ho O

b o *t *b *b fij O’ b -» -w y 0) C& Ho A. o

O O O <0 b b O" O Qj Qj Ho b b O b b N

.OOO O'OHo'-yO-OOb O O’ O' O’ bO -O O’ 1/ •

O O O 0.0.a: . b*/ a'7 t/b b . b

-b Qj ho <5 or y b Ho

O o o .

bOO o -o o

0.0 b , -v , ~ o Cq Ho

-v o o a o b O -o O Qj O' b b .O Qj b *b b O -v O Ho bo - ■ - - ' ‘ b Ho O

b <b O' *%

b ^O V b o

'V b o b O'

*• A O o b -b

Qj ,0- O

b b 00

Ho A

. §'? O' A

4'"? O bV

ho ^ o A^ ho or

o o o b V b^ t^Ho b b*

O O' b Qj Qj o b b Ho HO

HO HO ft ft 0 b b -A -V

b O O O’ o O ‘ . , .-v -W /•'. _*V .'</ -H/ (.'V VJ VO O «

// A A' / ® ^ A . % / -? t? -? o’ ■=■> .<£ -4 . ^ oyV< i'X ■- t?

O O oA HO(V;HOHO -b v O ObO .0 O’ ,0 O b by rQj o b «f1 a Y

_ b o o b O' o b o b 'b 0 . b^o b<Vib b ho o-o b o o

-b b O ^ HO o\ b ^.00 b Qr O b O b O o o <5? b-b b b b b b b b c-b

o -b bb b> b o o ho o ho b

«/ b b b^ b b C/ . ^ <£• ’ b b ^ N b *V ,b obcb-V A) o' o b«/bo-b

‘ ~ o b b ^ b ^ O . Ho ~ -b O

c’-? O O b Or A.

O O’ <2j -b b O boo b b b

b A, A> O b ho- cfy o -b b

b *b Ho .Ho b b

-v O b

vP / yHO -b b* b b , o Py b A Ho

o b b • *b o O' b

b/ o b o; b/o . b o' o/b b o ^

O'/ Q> Qj O b *0/0 -b b

oSb S

h'A S' s s $

CJ Gj (b o Qj Ho Ho

b b b b *0 A b b b

~Q o b

,b b^ b O v

, A'*' b O' b o o bv

b.b b ' HO H. Ctf Qj Qr b vV *Q

b o * or V-y O Ho b A; O / b . b

.A.' O b b A b o b’ o O b b.o b

b b b C A Qj C Cr C- A-

b e» ' b b o ho •C* o co

-o o- b b^b <s

oso/. Qj Hj Qy Cy o

b. °b b ,xy Crj .O O Qj ^ O ^ b

A A A */ b b © °i b b^*V b o ho .

Qj b’^ bb b b A. Ho O Ho

© .b- b .O

rep 1.

Ho o' o v . -b b « ^ b b o . b

O \ ctr b o b b b ho b b O b Ho <b Hj ^y p b

A. -b Ho QJ (V, HO C •CV ^ o HO Qj b^O ^

/>> .b b O

0 * /A] b b ^

Page 27: Ted Nelson Scrapbook - ia803101.us.archive.org

PRELIMINARY DESCRIPTION

A COMPUTER SOFTWARE PACKAGE

for

HOME AND OFFICE

to be offered through

The Itty Bitty Machine Co., Inc.

and other fine computer stores.

As the sale of personal and home computers grows geometrically—

a surprise, apparently, to all but a few of us— it becomes clearer

and clearer that the kind of software people need just isn’t ready.

And that most people who are programming in the field have only the

dimmest notion, if any, of what it means to make computer programs

SIMPLE AND CLEAR while making them also GENERAL AND POWERFUL. We see

no conflict; only boundless opportunity for creative new designs.

Environment/One will be our first offering. It will run on the

SOL-20* computer in the TRAC** Language. (Adaptations for other com¬

puters based on the 8080 computer chip will depend on demand.)

Environment/One will be simple enough for a fourth-grader to

master in an afternoon. (Each of its main programs, however, will

adhere to Nelson’s ten-minute rule: you can learn it in ten minutes.)

It will be fully interactive: everything you want the computer to do can be commanded rapidly by choices laid out on the screen. It will

be comprehensive: a Magic Typewriter***, combining "word processing" with retrieval, boilerplate and collateration; a Business Whizness***

combining checkbook management (and reconciliation) with financial projection, purchasing and inventory management, order processing and

mailing lists. Other utility functions, meshed with the others,

perform such utility functions as TEMPUS*** (a planning aid similar

to PERT) and FUDGET*** (a general resource allocator).

For home users, we expect to offer the game of Dungeons and Dragons*+

— with animated dragons on the SOL’s screen— and ANIMA***, a system

that lets you create your very own animated cartoons— which may be

added to other parts of Environment/One.

* Trade mark of Processor Technology, Inc. ** " Rockford Research, Inc.

*** n Sophy stems Ltd. *#- ’ The Dungeon, Lake Geneva, Wis.

Page 28: Ted Nelson Scrapbook - ia803101.us.archive.org

V'iTrlWfT TO IW‘

iteeSOWfd frttViiiorttrtirtft

Most wre eompitoatod and kid to use. fte fete* Of ^teysat tat ift Jfcwfr ^awilfe is ranched. %#m smalt tettfimm t$n\ get decent sysws ys*v

ffclaty' * we*, cheap compuw - mm& tom five kurital to pakas temwi #ata - wmm great^taetkalbenefitsandnewart't&tmandvccteaHons. YettheprogramswHfcvwiMteeahtee&yk^A come.

the $oi¥svo#d taornd Computer ttovnonmcnt will change all that.

feach Of Its five major Systems cart be Usd Withift ten ftfflttftS' iftiW. $K«ft iMia vteibte data structure make it uniquely easy to use. Norei rtstdiiNitftttts will clfrify mtry Mi#y.

ISuftt atoUOd HOvCl foetus Of parallel lirtked data*, the SoftWOffd syitorti Will fee Uftiftti&fty SMiipBj to yet atfef powers traditionally only offered on large computers’. the Softwotid system ft SS89lfy feeing offtred fef the sOL4fet computet with HELhoSi disk system.

the five parts of Softworid ate:

HYPteRfYPER*, the word processor, filing artd cataloguing system. Uhiqrte pamM linked tort $M- vides a powerful revision feature tot authors. the Hypertyper system may fee used tot 'mfyttik track of the contents of flies and dossiers, and of where things are kept. &q&8M ft rf toreed on partially ordered data.

Page numbering, layout and mailing-list functions are included. PLANORAMA*, the scheduling system, a sophisticated planning system of the PfeitT type*

the Ptanorama system permits the interactive update and revision of complicated jmm and schedules, yet it is simple tor an individual to use oh a daily m hourly fern ftemimM lists are compiled automatically’.

LfeBGfcfttiOMAIN*, the accounting system. Unique visualising functions make atebimt reetmeilation, float and other complications perfectly simple.

things*, the inventory and purchasing system, this system tells you what you’ve got. and what’s oh order j types up orders, complaints, and the rtUMHce correspondence of acquisition and maintenance. Handles subscriptions and keeps track of your magazines as well.

dOMPUTOIA*, the animation and gaming system. Allows the bepmef to create ammifed cartoons, instructional materials and branching presentations on the comparer M&w

Ntttm afiki t#itm will twmMw m Ann?, 1%U.

11m sophyrtema rttonp Ucrt 128

tovarihmoin, l4A 1WB

Page 29: Ted Nelson Scrapbook - ia803101.us.archive.org

IN MU izy. ■fit. ITTVglTTf t'»|E « COMPUTER SYSTEMS FOR INDUSTRY, GOVERNMENT, ACADEMIA, OFFICES, COMMUNES & LARGE FAMILIES

Most computer sytems of the past have been too expensive, hard to understand, and graded in

capability so the little ones hardly did anything.

We are going to change all that.

The line of computer systems to be distributed by Itty Bitty will range from the tiny to the large — ex¬

cept that our “larger” systems are minuscule by the usual standards of the field.

j>iWNER.'s HhoJT CCADV

6EIMG- DOIOA) hi

They will all be powerful — restricted in in¬ dividual cases only by such absolute limitations as

mass memory attached.

Our systems will be set up for either stand-alone

computers of the 8080 class — preferably with built- in screens and keyboards, such as the Intecolor® —

or for larger computers, of the PDP-11* class, with

terminals.

*“PDP-11” is a registered trademark of the Digital Equipment

Corporation.

©Itffe Itty Bitty Machine Co., Inc. kyt !l%.

Page 30: Ted Nelson Scrapbook - ia803101.us.archive.org

WASH I N<Sf£>N

2d

Page 31: Ted Nelson Scrapbook - ia803101.us.archive.org
Page 32: Ted Nelson Scrapbook - ia803101.us.archive.org