• Corpus ID: 201795798

Electronic Mail and Text Messaging in CTSS, 1965-1973

  title={Electronic Mail and Text Messaging in CTSS, 1965-1973},
  author={Tom Van Vleck},
  journal={IEEE Annals of the History of Computing},
  pages={4 - 6}
  • T. Van Vleck
  • Published 14 March 2012
  • Computer Science
  • IEEE Annals of the History of Computing
Applications from prior technologies are often reimplemented on new computing or communications platforms, and users sometimes don’t realize that the applications have been recycled. For example, text messaging was available between computer users for years before its implementation on cell phones, and email has precursors before its implementation on the Internet. My colleague Noel Morris and I implemented both an electronic mail command and a text messaging facility for the Massachusetts… 

Messaging in the Early SDC Time-Sharing System

In the early 1960s, the time-sharing computer at the System Development Corporation had several messaging commands through which remotely logged in users communicated with one another and with the

Learning to Ignore

It is found that the organizational bulk email system as a whole was strained, and communicators are caught in the middle of this multi-stakeholder problem.

Forensic investigation for Instant Messenger: evidence extraction tools and techniques

The result illustrated that the approach presented in the thesis are able to extract information from instant messenger in a more efficient manner in compare to the traditional approaches.

Spirited: A Web Application for Structured Debate

An application was built that provides a blog-style interface for posting articles of any length, as well as additional features, like citations, to support the argument, and allows for an interaction that has been difficult if not impossible until now – having a productive argument on the internet.

Why Doesn't Jane Protect Her Privacy?

This investigation revealed a number of fundamental issues such as incomplete threat models, misaligned incentives, and a general absence of understanding of the email architecture that suggest that merely increasing the availability and usability of encryption functionality in email clients will not automatically encourage increased deployment by email users.

Analysis and Simulation of Threats in an Open, Decentralized, Distributed Spam Filtering System

Although the TRAP protocol was not designed with regards to certain attacks on the system itself most of the attacks can be fairly easily stopped, and by adding cryptographic defenses to the protocol a lot of the threats would be mitigated.

Conversation pieces: On recounting new media art mailinglist cultures

Abstract In the field of media art, mailinglists such as nettime, -empyre-, SPECTRE and CRUMB have functioned as important para-institutional formations that have influentially played host to a

More than Words: A global analysis of the socio-economic impact of Rich Interaction Applications (RIAs)

Applications such as iMessage, KakaoTalk, LINE, Signal, Skype, Snapchat, Threema, Viber, WhatsApp and WeChat have become an increasingly popular means of personal and business interaction.


YIBIN LIU: E-MAIL MARKETING SYSTEM ADOPTION IN E-COMMERCE STARTUPS Tampere University of Technology Master of Science Thesis, 82 pages May 2016 Master’s Degree Programme in Business and Technology



The Technical Development of Internet Email

  • C. Partridge
  • Computer Science
    IEEE Annals of the History of Computing
  • 2008
Development and evolution of the technologies and standards for Internet email took more than 20 years, and arguably is still under way, with a focus on why things look as they do today.

The History of Electronic Mail,’

  • 2001

five-part New York Times blog posting about CTSS history and the creation of MAIL, June 2011; http://opinionator.blogs.nytimes.com/ tag/tom-van-vleck

  • 2011

The IBM 7094 and CTSS,’

  • 2010