Ah yes. The IBM model M. Hefty enough to crush a skull, robust enough to live through a dish washer to clean off the blood. I’ve got one in storage that I’m sure still works. Built in 1982.
A better weapon would be an actual 3270 terminal keyboard from the 1970’s.
Those were a 122-key monster about 18" wide, in a solid metal case. They weighed close to 20 pounds (10 kg), I think. More than once I’ve dropped one from waist-high onto a solid floor, and they were still working! Didn’t even show any noticeable damage to the case.
That would do real damage.
[Tiresome Pedant mode]
The small (~1/4") round mini-DIN connector that fit PS/2s was the second generation PC keyboard connector. The first generation keyboards that fit original PCs, PC/XTs, PC/ATs, and all their clones had a ~1/2" diameter DIN-style plug.
See here for more: IBM PC keyboard | Connection - Wikipedia.
But other than that, thanks for sharing some excellent ancient history there. Been many many years since I typed on an M-style keyboard.
Yes, that sounds a lot like the computer my dad described.
Another fun note, Mel was mentioned using chunks of code as data. A friend of mine who was deep into the TRS-80 disassembled some of the ROM. He found at least one instance where the routines jumped into the middle of another routine, mid-instruction. (I.e the second byte of a two-byte instruction). Apparently, some clever programmers, rather than writing a very short subroutine, searched the assembled machine code for the proper sequence of bytes in existing code, found them, and saved a few bytes of ROM memory by using that.
Hmm, neat! That same technique is still in widespread use among malicious hackers, now called return-oriented programming. Essentially, in some situations where you’re trying to exploit a system, you can’t execute arbitrary code, but you can jump to a sequence of arbitrary addresses. So you look around what’s already in memory for sequences of instructions at the end of existing functions, looking for ones that you can reuse and chain together for your own ends. Modern software like a web browser is so large that it’s very likely you’ll find enough pieces to achieve what you’re going for.
You may be thinking of Amdhal, the biggest System 360/370 clone. Our IT manager went on a rant one time about how they only made one version, so they stuck a board into the CPU cabinet to consume clock cycles if you didn’t want to pay for a faster computer.
Made sense when rental rates were in the hundreds of thousands (millions?) per year. Apparently IBM was shocked that we went with Amdahl, they were more reasonable when the next upgrade time came around.
Yes, our system was like a tank - actually, a huge colection of racks… Toward the end, we were buying parts on eBay, When they finally went to VoIP they sold the contents of the rack to a company down the road who still used that model. If it works, don’t mess with it. (VoIP was fun… Caller ID had a limited number of characters. Internally you wanted to see the name of who was calling, but there was no way to change that to company name on outbound calls… much confusion for a long time.)
Yes. When we switched to VoIP the phones also used 24V instead of 48V for ringers. ome of the really old phones with those mechanical bells no longer worked. (The bell would ring weakly if you laid it sideways so th hammer had gravity assist).
There was a whole discussion somewhere about how the phone company in the good old days could measure ring power and determine if there was an unregistered extension. Technically, in the Goode Olde Days, they had to wire everything and were responsible to fix anything if the phones stopped working, hence the anal control. Eventually, with deregulation, they basically provided service to the house and wiring inside was your problem, you fix it.