Browse Definitions :
Definition

Antikythera mechanism (2000-year-old computer)

Contributor(s): Lowell Thing

The Antikythera mechanism is an analog computer that was used by the Greeks more than 2000 years ago to locate and predict the positions of celestial objects. When new, the device was made of bronze with a wooden frame and was roughly the size of a wall clock. The name Antikythera comes from the island near where the device was discovered in the remains of a shipwreck that occurred in or around the year 76 B.C.

See images.

Like a mechanical clock, the Antikythera mechanism has dials along with a sophisticated system of gears. It bears inscriptions that have been deciphered. Based on its construction and on the nature of the writing, scientists have deduced that the Antikythera mechanism must have been used to measure astronomical time based on cycles of the sun, the moon and the planets. In this way it could have been employed to predict solar and lunar eclipses, tides and the recurrence of the seasons. These functions would have made the device useful to farmers, seafarers and perhaps even military commanders.

This was last updated in March 2011

Continue Reading About Antikythera mechanism (2000-year-old computer)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • juice jacking

    Juice jacking is a form of hacking that compromises a device's USB charging port or charging cable, allowing hackers to break ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close