

Computer Chronicles
Season 3
TV-G
The most popular television program about consumer technology during the rise of the personal computer revolution from 1983 to 2002. Episodes featured interviews with luminaries from the tech industry.
Where to Watch Season 3
26 Episodes
- Modems & Bulletin BoardsE8
Modems & Bulletin BoardsFrom high-tech trysts to selling black-market software, computers users are talking. Guests: Ezra Shapiro, Byte Magazine; Rory O'Connor, InforWorld; Matthew McClure, The Well; Donald Ingrim, Alameda County DA; George Morrow, Morrow Computing Products/Demos: CompuServe, Byte BBS, The Well. - Artificial Intelligence (1986)E17
Artificial Intelligence (1986)Expert systems, decision support software, and natural language communication. Guests: Harry Tennant, Texas Instruments; Hubert Dreyfus, UC Berkeley; Gary Hendrix, Symantec; S. Jerrold Kaplan, Lotus Developmnt; Gary Kildall, Digital Research Products/Demos: Personal Consultant, Q&A. - Computers and the Pentagon: Part 1E25
Computers and the Pentagon: Part 1The world's biggest computer user is the U.S. government and the military in particular. This program reviews the military uses of computer technology. Shot on location at various research centers around the country. Featured are the Robotics Institute at Carnegie Mellon University in Pittsburgh, Pennsylvania and Advanced Decision Systems in Mountain View, California. Demonstrations include the Pilot's Assistant and the Battlefield Commander's Assistant. Also flight and battle simulators from Singer Link. Guests include Raj Reddy, Director of the Robotics Institute at CMU. - Computers and the Pentagon: Part 2E26
Computers and the Pentagon: Part 2A look at the uses of computer hardware and software in the Defense Department. Shot on location at various military installations around the country. Featured are demonstrations of SDI, the Strategic Defense Initiative, the AEGIS combat control system on board the USS Valley Forge advanced navy cruiser, and the Air Force's Advanced Sensory Exploitation System using distributed networks and artificial intelligence to detect enemy threats