Browse Definitions :
Definition

Charles Babbage

If John von Neumann is the father of modern computing, then the English mathematician and inventor Charles Babbage can be considered its grandfather. Babbage designed, though never built, a Difference Engine and an Analytical Engine, the world's first computing machines.

Babbage worked as a mathematician in Cambridge University where he received his MA in 1817 and later, like Newton, whose mathematical principles he espoused, occupied the Lucasian chair in mathematics. As a scientist, Babbage was obsessed with facts and statistics and lived in a rationalistic world where it was assumed that if all facts, past and present, could be known then all future events were determinable. His statistical publications include "Table of the Relative Frequency of the Causes of Breaking of Plate Glass Windows" and "Table of Constants of the Class Mammalia," the minutiae of which included the heart rate of the pig. Babbage founded the Statistical Society in 1834.

A prolific disseminator of ideas and an eclectic inventor, Babbage's varied range of inventions reflected the diversity of his interests. Fascinated by the railroad, which was invented in his native England in 1823, Babbage devised a standard rail gauge width as well as a cowcatcher (for the front of trains). He also recorded inventions related to lighthouse signalling, code breaking, and the postal system. He founded the British Association for the Advancement of Science and the (Royal) Astronomical Society.

Although remembered today primarily for his calculating engines, Babbage left a legacy in the fields of political theory (he was an ardent industrialist) and operations research (where his 1832 publication, "On the Economy of Manufactures," cataloged the manufacturing processes of the day).

Charles Babbage died in London on October 18, 1871.

This was last updated in April 2005

Continue Reading About Charles Babbage

SearchCompliance

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity

  • user authentication

    User authentication verifies the identity of a user attempting to gain access to a network or computing resource by authorizing a...

  • unified threat management (UTM)

    Unified threat management (UTM) describes an information security (infosec) system that provides a single point of protection ...

  • physical security

    Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close