Age, Biography and Wiki
John Iliffe (computer designer) was born on 18 September, 1931 in London, is a computer. Discover John Iliffe (computer designer)'s Biography, Age, Height, Physical Stats, Dating/Affairs, Family and career updates. Learn How rich is He in this year and how He spends money? Also learn how He earned most of networth at the age of 89 years old?
Popular As |
N/A |
Occupation |
N/A |
Age |
88 years old |
Zodiac Sign |
Virgo |
Born |
18 September 1931 |
Birthday |
18 September |
Birthplace |
London |
Date of death |
February 16, 2020 |
Died Place |
N/A |
Nationality |
Mali |
We recommend you to check the complete list of Famous People born on 18 September.
He is a member of famous computer with the age 88 years old group.
John Iliffe (computer designer) Height, Weight & Measurements
At 88 years old, John Iliffe (computer designer) height not available right now. We will update John Iliffe (computer designer)'s Height, weight, Body Measurements, Eye Color, Hair Color, Shoe & Dress size soon as possible.
Physical Status |
Height |
Not Available |
Weight |
Not Available |
Body Measurements |
Not Available |
Eye Color |
Not Available |
Hair Color |
Not Available |
Dating & Relationship status
He is currently single. He is not dating anyone. We don't have much information about He's past relationship and any previous engaged. According to our Database, He has no children.
Family |
Parents |
Not Available |
Wife |
Not Available |
Sibling |
Not Available |
Children |
Not Available |
John Iliffe (computer designer) Net Worth
His net worth has been growing significantly in 2022-2023. So, how much is John Iliffe (computer designer) worth at the age of 88 years old? John Iliffe (computer designer)’s income source is mostly from being a successful computer. He is from Mali. We have estimated
John Iliffe (computer designer)'s net worth
, money, salary, income, and assets.
Net Worth in 2023 |
$1 Million - $5 Million |
Salary in 2023 |
Under Review |
Net Worth in 2022 |
Pending |
Salary in 2022 |
Under Review |
House |
Not Available |
Cars |
Not Available |
Source of Income |
computer |
John Iliffe (computer designer) Social Network
Instagram |
|
Linkedin |
|
Twitter |
|
Facebook |
|
Wikipedia |
|
Imdb |
|
Timeline
In the year 2000 Iliffe received the IEEE Harry H. Goode Memorial Award "For lifetime achievement in the practice of computer system design and evaluation."
The BLM design was rejected by ICL management in an internal review of options to select a new architecture for ICL's mainframe products in December 1969.
The Basic Language Machine (BLM), constructed and evaluated in the research department of International Computers Limited (ICL) between 1963 and 1968 was the first general-purpose system to break completely with the Von Neumann architecture. Instead of basing the architecture on a single linear address space, the BLM offered segmented memory addressing, enabling automatic storage management and access within precise security boundaries.
In the R1 Iliffe and his colleagues introduced a protection scheme for all data objects. The manipulation of references to memory (termed codewords) was restricted to privileged code, preventing some types of program error. Codewords referenced vectors of data items, sequences of instructions or other codewords . Storage was accessed by reference to a codeword and this was resolved to a conventional address or program counter giving direct access to store when necessary. The system provided functions to create, manage and update codewords, for example changing them to reflect storage management decisions. It also supported an algebraic programming language (called Genie) which was implemented using object-oriented design concepts in 1961. The Genie compiler and associated assembler were unusual in enabling the entire system to be treated as an object-management discipline. Genie was also amongst the first languages to include intrinsic operations on real and complex vectors and matrices.
In the early 1960s there was a strong requirement for general-purpose computers to provide for the concurrent execution of multiple user programs, both in the form of multiprogramming to optimise the use of a computer's resources and in the form of time-sharing to enable interactive computing. Both of these require a computer architecture in which the operating system could guarantee the separation, security and integrity of several concurrently-running programs. It seemed clear that the simplified model of architecture derived from the Princeton IAS and followed by all the “von Neumann” models would run into severe difficulties in satisfying that requirement.
The Rice R1 and the BLM were examples of descriptor-based computer architectures that emerged in the 1960s aimed both at the efficient protection of concurrently-executing programs and the reliable implementation of high-level languages. The other major example was the B5000 series of computers developed and marketed by the Burroughs Corporation. All these descriptor-based computers included hardware mechanisms designed to support the reliable addressing of data segments. They are closely related to capability-based architectures that emerged a few years later.
Iliffe attended the EDSAC programming course in Cambridge in 1952. He eventually learned about computing by running the IBM (UK) service bureau in London. In 1958 he was invited to join the team building the R1 computer at Rice Institute, Houston, in which he took responsibility for operating system and language design and implementation. In the next 30 years he put into operation four computers demonstrating and evaluating new concepts in design.
John Kenneth Iliffe (18 September 1931 – 16 February 2020) was a British computer designer who worked on the design and evaluation of computers that supported fine-grained memory protection and object management. He implemented, evaluated and refined such designs in the Rice Institute Computer, R1 (1958–61) and the ICL Basic Language Machine (1963–68). A key feature in the architectures of both machines was control by the hardware of the formation and use of memory references so that the memory could be seen as a collection of data objects of defined sizes whose integrity is protected from the consequences of errors in address calculation, such as overrunning memory pointers (whether by accident or malicious intent).