• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

FacebookTwitterLinkedInInstagramYoutube
  • Home
  • /Publications
  • /Tech News
  • /Research
  • Home
  • / ...
  • /Tech News
  • /Research

Purchasing Power: Rivalry, Dissent, and Computing Strategy in Supercomputer Selection at Los Alamos

By Lori Cameron

By Lori Cameron on
December 12, 2017

chemical symbolschemical symbols

In the Mid-1960s, the Laboratory at Los Alamos, New Mexico, a center of scientific computing since the Manhattan Project, embarked on a search for a new supercomputer intended to fulfill the growing need for computing power in nuclear weapons development.

Although depicted at Los Alamos in later years as a smooth transition between vendors, the selection process was a contentious negotiation among computing experts and users over their differing visions of computing and its place at Los Alamos.

In the article “Purchasing Power: Rivalry, Dissent, and Computing Strategy in Supercomputer Selection at Los Alamos,” (login required for full text) published in the July-September 2017 issue of IEEE Annals of the History of Computing, the authors argue that changing technical and political demands on weapons design and Los Alamos’s place in the rivalry between IBM and Control Data Corporation further complicated the selection process and challenged the traditional control and direction of Los Alamos’s computing strategy.

The result was the formation of a new computing division and a reframing of the debate over the long-standing management and purpose of computing at Los Alamos.


About Lori Cameron

Lori Cameron is a Senior Writer for the IEEE Computer Society and currently writes regular features for Computer magazine, Computing Edge, and the Computing Now and Magazine Roundup websites. Contact her at l.cameron@computer.org. Follow her on LinkedIn.

LATEST NEWS
Quantum Insider Session Series: Choosing the Right Time and Steps for Start Working with Quantum Tech
Quantum Insider Session Series: Choosing the Right Time and Steps for Start Working with Quantum Tech
Igniting Young Minds: The Impact of IEEE CS Juniors STEMpire on Karnataka, Indian Students
Igniting Young Minds: The Impact of IEEE CS Juniors STEMpire on Karnataka, Indian Students
Monitoring LLM Safety with BERTopic: Clustering Failure Modes for Actionable Insights
Monitoring LLM Safety with BERTopic: Clustering Failure Modes for Actionable Insights
CS Juniors: ChiTech Discovery Days
CS Juniors: ChiTech Discovery Days
CV Template
CV Template
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter
Read Next

Quantum Insider Session Series: Choosing the Right Time and Steps for Start Working with Quantum Tech

Igniting Young Minds: The Impact of IEEE CS Juniors STEMpire on Karnataka, Indian Students

Monitoring LLM Safety with BERTopic: Clustering Failure Modes for Actionable Insights

CS Juniors: ChiTech Discovery Days

CV Template

A History of Rendering the Future with Computer Graphics & Applications

AI Assisted Identity Threat Detection and Zero Trust Access Enforcement

Resume Template