Fraud Blocker Skip to main content

Computing Collection (page 15)

"From the Pilot ACE to Artificial Intelligence: Unveiling the Evolution of Computing" Step into a time machine and travel back to 1950

Background imageComputing Collection: Worldwide web, conceptual artwork

Worldwide web, conceptual artwork

Background imageComputing Collection: Internet downloading, conceptual artwork

Internet downloading, conceptual artwork

Background imageComputing Collection: Email, conceptual artwork

Email, conceptual artwork

Background imageComputing Collection: Computer virus, conceptual image

Computer virus, conceptual image. Computer artwork representing a computer virus spreading across the internet

Background imageComputing Collection: Internet technology, abstract image

Internet technology, abstract image
Internet technology. Abstract image of cubes in front of a circuit board, representing computing and internet technology

Background imageComputing Collection: Cordless mouse and keyboard

Cordless mouse and keyboard for a computer. Wireless keyboards and mice use either infrared or radio waves to connect to the computer

Background imageComputing Collection: Internet search, conceptual artwork

Internet search, conceptual artwork

Background imageComputing Collection: Computer fan

Computer fan. This fan cools a computers central processing unit (CPU). This is a bottom view of the fan showing the copper heat sink

Background imageComputing Collection: Computer memory chips

Computer memory chips. RAM (random access memory) chips (grey) on a circuit board from a computer

Background imageComputing Collection: Wireless internet planet, artwork

Wireless internet planet, artwork
Wireless internet planet, computer artwork. The concentric circles are a broadcast symbol representing the wireless networks installed in the buildings on this planet

Background imageComputing Collection: Laptop use, artwork

Laptop use, artwork
Laptop use, computer artwork

Background imageComputing Collection: Computer virus, conceptual artwork

Computer virus, conceptual artwork
Computer virus, conceptual computer artwork. The virus is depicted as a collection of strands (red) infiltrating a computers memory chip (centre)

Background imageComputing Collection: Computer viruses, conceptual artwork

Computer viruses, conceptual artwork
Computer viruses, conceptual computer artwork. The viruses (green) are shown against a background of a skull (representing the harm done by the computer viruses)

Background imageComputing Collection: SCSI card

SCSI card. This is a small computer system interface (SCSI) card. It is used to connect several peripheral devices to a single peripheral component interconnector (PCI) slot

Background imageComputing Collection: Microchip processor heat sink

Microchip processor heat sink (centre), seen against a circuit board background. This metal heat sink was produced by extrusion, and has three rows of fins either side

Background imageComputing Collection: E-mail symbol, abstract artwork

E-mail symbol, abstract artwork
E-mail symbol, abstract computer artwork. This at (@) symbol forms part of all electronic mail (e-mail) addresses. Previous to its use as an e-mail component

Background imageComputing Collection: Computer technology demonstration, Korea

Computer technology demonstration, Korea
A stand at Seoul Airport, South Korea, demonstrating computer, communications and Internet technology

Background imageComputing Collection: USB memory sticks, artwork

USB memory sticks, artwork
USB memory sticks, computer artwork

Background imageComputing Collection: Analogue computer

Analogue computer. These machines were the precursor of modern digital computers. This is an EAI (Electronics Associates Incorporated) Pace 231-R computer, a US model produced in 1961

Background imageComputing Collection: Video telephony demonstration, Korea

Video telephony demonstration, Korea
A stand at Seoul Airport, South Korea, demonstrating video telephone technology. The screen shows a view of the woman apparently making the call

Background imageComputing Collection: USB memory stick

USB memory stick. Computer artwork of a memory stick on an abstract background

Background imageComputing Collection: Trojan horse, conceptual artwork

Trojan horse, conceptual artwork
Trojan horse, conceptual computer artwork. The trojan horse, a type of malicious computer program, is represented by the horse figure (green), which is covered by electronic circuitry designs

Background imageComputing Collection: Global internet, conceptual artwork

Global internet, conceptual artwork
Global internet, conceptual computer artwork. Hand icon (green) pointing at a globe symbol. The globe represents the worldwide reach of computer networks such as the internet and the world wide web

Background imageComputing Collection: Internet information highway, artwork

Internet information highway, artwork
Internet information highway, conceptual computer artwork. Parallel tracks (white) passing through a group of globes (green) covered in printed circuit board (PCB) designs

Background imageComputing Collection: Computer hacking, conceptual artwork

Computer hacking, conceptual artwork
Computer hacking, conceptual computer artwork. Computer screens showing rows of numbers and the word " ENTER", represent the use of mathematics, such as cryptology

Background imageComputing Collection: Quantum encryption, computer artwork

Quantum encryption, computer artwork
Quantum encryption. Computer artwork of keys embedded within a set of cubes. This could represent the concept of quantum encryption

Background imageComputing Collection: Census tabulation in former Lambeth workhouse

Census tabulation in former Lambeth workhouse
Data from the 1931 census being transferred to punched cards in the former Lambeth workhouse - presumably the one on Princes Road (now Black Prince Road), Lambeth, south London

Background imageComputing Collection: Computer operators

Computer operators
A female operator checks the terminal of a large IBM computer. Photograph by Heinz Zinram

Background imageComputing Collection: Computer Systems - Tape Storage

Computer Systems - Tape Storage
Three men examine a tape storgae device for a large industrial computer system. Photograph by Heinz Zinram



All Professionally Made to Order for Quick Shipping

"From the Pilot ACE to Artificial Intelligence: Unveiling the Evolution of Computing" Step into a time machine and travel back to 1950, where the groundbreaking Pilot ACE computer revolutionized computing as we know it. This marvel of technology laid the foundation for future advancements that would shape our digital world. But let's not forget about ancient wonders like the Antikythera mechanism, an intricate artwork from centuries ago that showcased early computing capabilities, and is a testament to human ingenuity and our innate desire to unravel complex problems. In this journey through time, we encounter Alan Turing, a brilliant British mathematician whose contributions in cryptography during World War II paved the way for modern-day computing. His legacy continues to inspire generations of innovators pushing boundaries in artificial intelligence. Speaking of AI, imagine stepping into a conceptual artwork where machines possess human-like intelligence. The possibilities seem endless as scientists strive towards creating sentient beings capable of learning and adapting on their own. As we delve deeper into this digital realm, conceptual illustrations depict a vibrant landscape filled with interconnected devices forming our ever-expanding digital world. We witness how computers have become an integral part of our daily lives – from home computers empowering individuals to supercomputers at CERN unraveling mysteries of the universe. Peering beneath the surface reveals mesmerizing colored X-ray images showcasing intricate computer motherboards resembling works of art themselves. These microchips intricately connect wires within them, enabling seamless communication between various components. However, not all aspects are rosy; history reminds us that even nuclear missile warning systems relied on computing technologies back in 1965. It serves as a stark reminder that responsible use and ethical considerations must accompany technological progress. Finally, we come across promotional photographs capturing moments when IBM's iconic IBM 1410 took center stage – bringing advanced computational power within reach for businesses worldwide. This captivating journey showcases how far we've come since those early days while reminding us of the limitless potential that lies ahead.