Browse Definitions :
Definition

PDP-11 (Programmed Data Processor-11)

PDP-11 (Programmed Data Processor-11) is one of the most famous computers in computing history, one of a series manufactured by Digital Equipment Corporation ( DEC ) from the early 1960s through the mid-1990s. PDP-11, which was sold in 1970 for $10,800, was the only 16-bit computer ever made by the company.

The PDP-11 had a number of other features that distinguished it from most of its contemporaries, including multiple (eight) register s; multiple addressing mode s; a hardware stack ; processor error trap s; and a separate communications path for memory and peripherals (called the UNIBUS ) that could move data independently of the processor. Many early developers and users of the UNIX operating system ran it on the PDP-11 after the original Multics system was no longer available.

Before the 1970s, computers were not thought to be something that the average person would buy or use. At about $1,000,000, they were prohibitively expensive. Furthermore, computers of the time were so large and complex that a computer center was required to house one and a sizable staff was required to look after it. To dissociate their product line from these public perceptions, DEC didn't refer to the PDP as a computer at all, but used its name, the Programmed Data Processor, as a generic term. DEC's first model, PDP-1 sold for $120,000 - about 40 times the price of a good computer today, but a bargain at the time.

DEC was acquired by Compaq Computers in 1998.

This was last updated in March 2011

Continue Reading About PDP-11 (Programmed Data Processor-11)

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • RAID 6

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

Close