{"id":44,"date":"2016-02-15T08:00:15","date_gmt":"2016-02-15T08:00:15","guid":{"rendered":"http:\/\/blogs.oregonstate.edu\/elizabethgasiorowski\/?page_id=44"},"modified":"2016-02-15T08:10:02","modified_gmt":"2016-02-15T08:10:02","slug":"bibiliography","status":"publish","type":"page","link":"https:\/\/dev.blogs.oregonstate.edu\/elizabethgasiorowski\/cultural-research\/bibiliography\/","title":{"rendered":"Bibiliography"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><b>Bibliography<\/b><\/p>\n<p><a href=\"http:\/\/www.factmonster.com\/ipka\/A0906931.html\"><span style=\"font-weight: 400\">http:\/\/www.factmonster.com\/ipka\/A0906931.html<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400\">Stern B. Nancy \u201cFrom ENIAC to UNIVAC: an appraisal of the Eckert-Mauchly computers\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400\">Hally Mike \u201cElectronic brains: stories from the dawn of the computer age\u201d<\/span><\/p>\n<p><a href=\"http:\/\/ethw.org\/Betty_Holberton\"><span style=\"font-weight: 400\">http:\/\/ethw.org\/Betty_Holberton<\/span><\/a><\/p>\n<p><a href=\"http:\/\/ethw.org\/ENIAC\"><span style=\"font-weight: 400\">http:\/\/ethw.org\/ENIAC<\/span><\/a><\/p>\n<p><a href=\"http:\/\/ethw.org\/First-Hand:The_Navy_Codebreakers_and_Their_Digital_Computers_-_Chapter_2_of_the_Story_of_the_Naval_Tactical_Data_System\"><span style=\"font-weight: 400\">http:\/\/ethw.org\/First-Hand:The_Navy_Codebreakers_and_Their_Digital_Computers_-_Chapter_2_of_the_Story_of_the_Naval_Tactical_Data_System<\/span><\/a><\/p>\n<p><a href=\"http:\/\/ethw.org\/FORTRAN\"><span style=\"font-weight: 400\">http:\/\/ethw.org\/FORTRAN<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Bibliography http:\/\/www.factmonster.com\/ipka\/A0906931.html Stern B. Nancy \u201cFrom ENIAC to UNIVAC: an appraisal of the Eckert-Mauchly computers\u201d Hally Mike \u201cElectronic brains: stories from the dawn of the computer age\u201d http:\/\/ethw.org\/Betty_Holberton http:\/\/ethw.org\/ENIAC http:\/\/ethw.org\/First-Hand:The_Navy_Codebreakers_and_Their_Digital_Computers_-_Chapter_2_of_the_Story_of_the_Naval_Tactical_Data_System http:\/\/ethw.org\/FORTRAN<\/p>\n","protected":false},"author":7500,"featured_media":0,"parent":15,"menu_order":5,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-44","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/dev.blogs.oregonstate.edu\/elizabethgasiorowski\/wp-json\/wp\/v2\/pages\/44","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dev.blogs.oregonstate.edu\/elizabethgasiorowski\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dev.blogs.oregonstate.edu\/elizabethgasiorowski\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dev.blogs.oregonstate.edu\/elizabethgasiorowski\/wp-json\/wp\/v2\/users\/7500"}],"replies":[{"embeddable":true,"href":"https:\/\/dev.blogs.oregonstate.edu\/elizabethgasiorowski\/wp-json\/wp\/v2\/comments?post=44"}],"version-history":[{"count":2,"href":"https:\/\/dev.blogs.oregonstate.edu\/elizabethgasiorowski\/wp-json\/wp\/v2\/pages\/44\/revisions"}],"predecessor-version":[{"id":51,"href":"https:\/\/dev.blogs.oregonstate.edu\/elizabethgasiorowski\/wp-json\/wp\/v2\/pages\/44\/revisions\/51"}],"up":[{"embeddable":true,"href":"https:\/\/dev.blogs.oregonstate.edu\/elizabethgasiorowski\/wp-json\/wp\/v2\/pages\/15"}],"wp:attachment":[{"href":"https:\/\/dev.blogs.oregonstate.edu\/elizabethgasiorowski\/wp-json\/wp\/v2\/media?parent=44"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}