When codes cracked: The historical journey of the term 'computer bug' explained


On Sept 9, 1947, engineers found a moth stuck on one of the relay components of the Mark II computer at Harvard University. — US Naval Historical Center Online Library Photograph via Wikimedia Commons

When users think of the term ‘computer bug’, they would usually ­associate it with frozen screens, apps not functioning smoothly, or simply an unexpected crash that may require time for the system to reboot.

Computer bugs are typically described as malfunctions caused by various possible reasons, including coding errors (mistakes in the way a program is written) or design flaws, rather than ­external factors like malware.

So how did we come to think of bugs as something that could affect our experiences with ­computers?

On the Smithsonian website, the page “Log Book With Computer Bug” explains that engineers in the United States have been calling small flaws in machines “bugs” for over a ­century. In an 1878 letter written by Thomas Edison, he referred to “bugs” as “little faults and ­difficulties” he came across while working on his phonograph, according to a publication from US nonprofit digital library JStor.

Then on Sept 9, 1947, engineers found a moth stuck on one of the components of the Mark II computer at Harvard University. The bug was extracted and then taped into a logbook with the note “first actual case of bug being found”.

According to scholar Fred R. Shapiro in the journal Etymology Of The Computer Bug: History And Folklore, the moth is believed to have “inspired the scientists to speak from then on of debugging the computer, with bug originating as the later back-formation from debug”.

Essentially, while the term “bug” had been used to describe technical glitches long before, the moth incident helped popularise the specific idea of a “computer bug” and cemented “debugging” as part of computing vocabulary.

Failure to launch

Users rarely think about the lines of code running in the background when they interact with apps, websites, or devices. Yet even the smallest error in that code can lead to major problems.

In 1962, the United States National Aeronautics and Space Administration (Nasa) attempted to launch the Mariner 1 ­spacecraft to get a closer look at Venus. The 202.8kg spacecraft was launched on July 22 but the rocket went off course.

According to Nasa on its website, less than five minutes after takeoff, a Range Safety Officer had to send a destruct command to prevent further mishaps.

An investigation found that part of Mariner 1’s launch failure was due to a hardware issue with the guidance antenna on the Atlas rocket, the launch ­vehicle carrying the spacecraft. On top of that, a tiny typo in the guidance ­software caused the system to misread instructions. Instead of using an R with a small overbar to ­represent radius, the code mistakenly used just ‘R’.

Nasa noted that “the omission was not a hyphen, as is sometimes erroneously reported”.

Why? The New York Times in 1962 ran a story with the headline “For Want of Hyphen Venus Rocket Is Lost”. It also stated that the spacecraft cost US$18.5mil to build. Science fiction author Arthur C. Clarke has also famously described it as “the most expensive hyphen in history” in his 1968 book The Promise Of Space.

Website Fast Company in its report “The Most Expensive Hyphen in History” stated that the incident was a lesson in “care, caution and testing” for the space agency’s computer programmers. Famed Nasa engineer George Mueller reportedly kept a framed image of a hyphen in his office at the time to remind himself that even the smallest details matter.

A second spacecraft Mariner 2 was launched in the same year on Aug 27 and successfully completed its mission to get a close-up of Venus.

Fatal error

In healthcare, technology designed to save lives can pose risks when oversight and testing fall short.

In the mid-1980s, ­hospitals in the US and Canada began using a machine called the Therac-25 to treat cancer patients with targeted ­radiation. Unlike earlier models that relied on hardware safety systems, the Therac-25 relied on computer software to control the amount of radiation delivered to patients. It seemed like a leap forward in medical technology.

A 1993 investigation paper published by Columbia University reported six known radiation overdose incidents linked to the Therac-25. — Image by freepikA 1993 investigation paper published by Columbia University reported six known radiation overdose incidents linked to the Therac-25. — Image by freepik

But in 1986, reports emerged that a ­computer malfunction had caused the machine to deliver overdoses of ­radiation to patients. According to the New York Times, two male patients at a Texas cancer treatment centre were overdosed – leading to the death of one of the men – while another such overdose incident in Georgia caused nerve damage in a breast cancer patient.

According to the Times, an investigation into the Georgia case blamed a ­software glitch involving what was described as an “unforeseen sequence of computer commands”. Dr Kenneth Haile, the then-­director of the Kennestone Regional Oncology Center in Marietta, Georgia, explained that typing a ­certain group of commands into the machine at a rapid rate of speed could result in higher radiation than was called for.

A 1993 investigation paper published by Columbia University reported six known radiation overdose incidents between June 1985 and January 1987 linked to the Therac-25. The paper also revealed that the ­software was developed by a ­single programmer and that there was an apparent lack of documentation on software specifications and test plan.

In 1987, the US Food and Drug Administration and its Canadian counterpart ordered all Therac-25 units to be shut down until ­permanent modifications could be made.

Math not computing

Some bugs could also hit ­wallets and reputations just as hard. In 1993, Intel unveiled its new Pentium processor, the ­highly anticipated successor to the Intel 486 chip.

In October 1994, mathematics professor Thomas Nicely discovered that his new system with the Pentium processor occasionally gave the wrong answers when dividing floating-point numbers, which is a type of math used in science and engineering to handle large and precise calculations. He reported the matter to Intel. However, it seemed that Intel did not respond. So approximately a week later, Nicely sent an email to his academic contacts to inform them about the error that he found.

According to the website Tom’s Hardware, the error was due to the chip’s division algorithm. The Pentium had to set aside an array of 2,048 cells, with 1,066 of them ­holding values between -2 and 2. But Intel made a small yet critical mistake: five of those cells were set to 0 instead of 2, which threw off some calculations.

The flaw, later called the Pentium FDIV bug for ‘floating point division’, wasn’t immediately obvious to everyday users, but it sparked widespread outrage because computers were expected to do math perfectly. Intel initially ­downplayed the issue, but mounting public pressure forced the company to recall the chips at a cost of nearly US$475mil, making it one of the most expensive hardware bugs in history.

If you’re wondering what happened to some of the chips that the company recalled, they were turned into keychains. According to website Business Insider, the ­company handed the keychains to employees in 1995, inscribed with a quote by then-CEO Andy Grove: “Bad companies are destroyed by crises; good companies survive them; great companies are improved by them.”

Anticipating the bug

As computers continue to shape how people travel, work, and ­manage finances, society is also becoming more prepared for potential technology-related challenges.

In the late 1990s, programmers warned that when the year 2000 arrived, many computers – built to store years with just two digits (for example, “99” for 1999) – might read “00” as 1900 instead of 2000, potentially disrupting systems that relied on daily or yearly date ­calculations. The issue became known as the Y2K bug.

A National Geographic report explained that the Y2K bug could disrupt banks that calculate interest rates daily, power plants that depend on precise computer ­timings for safety checks, and airlines whose flight schedules could be thrown off if computers failed to display the correct dates. Governments around the world including Malaysia began working on initiatives to prepare for the year 2000 and mitigate any impact the Y2K bug might have.

In 1998, Bernama reported that the Energy, Telecommunications and Posts Ministry had set up a working committee to oversee how companies were gearing up to ­tackle the Y2K bug. Then‑minister Datuk Amar Leo Moggie (now Tan Sri) said it was “an important issue” to ensure that, when the year 2000 rolled in, utilities like airports and communications services would continue to function as usual. A report by the Economy Ministry stated that a total of RM396mil was allocated to federal and state agencies to prepare for the rollover to year 2000.

In 1999, Bank Negara Malaysia (BNM) said it had released a 66-­page report outlining the steps it had taken to ensure that all banks, financial institutions, and insurance companies in Malaysia had implemented Y2K-ready systems. It also shared that ATMs had been tested for Y2K readiness, adding that cash withdrawal services will be available throughout the year and into the year 2000. A Y2K Command Centre was made available to respond to public queries about Y2K issues relating to the banking and financial sector.

When the year 2000 arrived, The Guardian reported that the impact was felt worldwide, noting how 15 nuclear reactors were taken offline, Hawaii experienced power cuts, and over 150 expectant mothers in the United Kingdom were mistakenly given ­inaccurate Down’s syndrome test outcomes linked to the bug.

Despite these incidents, The Guardian noted that the lasting takeaway was “how few problems actually occurred”, with experts suggesting that the advanced ­precautions had helped avert major mishaps. The BBC also reported that it was largely business as usual when the year 2000 arrived at midnight.

Similarly, a Jan 1, 2000 report by LifestyleTech (then known as In.Tech) stated that the National Y2K Operations Centre reported no major Y2K-related disruption throughout the country.

Into the blue

As part of a measure to fix bugs and make sure systems stay ­reliable, software updates are ­regularly deployed to keep ­computers safe and running smoothly. But in the case of CrowdStrike, one faulty update triggered widespread chaos.

On July 19, 2024, employees around the world including Malaysia reported being affected by the iconic ‘blue screen of death’ or a critical system error screen display on Windows computers. — UnsplashOn July 19, 2024, employees around the world including Malaysia reported being affected by the iconic ‘blue screen of death’ or a critical system error screen display on Windows computers. — Unsplash

On July 19, 2024, employees around the world including Malaysia reported being affected by the iconic ‘blue screen of death’ or a critical system error screen display on Windows computers. Airlines around the world also reported being impacted by a ­‘global IT issue’, with the bug ­causing flight delays, cancellations, and massive queues at airports as passengers were forced to manually check in, resulting in travel ­disruptions for countless travellers.

Payment systems, banking and healthcare services were similarly affected, causing long lines at ­supermarket checkout counters in countries like Australia, the US and New Zealand. Speculation mounted: was the global tech ­company under ­cyberattack?

Eventually, American cybersecurity company CrowdStrike confirmed that the outage was caused “by a defect found in Falcon content update for Windows host”, adding that it “was not a cyberattack”. The company also said that it had ­quickly deployed a fix and begun restoring affected systems.

A Reuters report on July 24, 2024 said the Crowdstrike Falcon software bug affected 8.5 million Windows devices and could result in an estimated US$5.4bil (RM22.83bil) in losses, citing figures from one insurance company. Bernama reported that Digital Minister Gobind Singh Deo said five government agencies and nine companies operating in aviation, banking and healthcare were affected during the Crowdstrike outage.

The issue, he said, highlights the importance of good governance in managing digital platforms.

“Although it was not a cyberattack, the ministry takes this matter seriously. Such disruptions ­highlight weaknesses in existing IT systems that could lead to ­significant damage and loss if they recur,” he said.

Follow us on our official WhatsApp channel for breaking news alerts and key updates!
Cybersecurity , Internet , Technology

Next In Tech News

Apple just lost a key designer– many are happy to see him go
A grand social media experiment begins in Australia
Silicon Valley builds Amazon and Gmail copycats to train AI agents
People are uploading their medical records to AI chatbots
Christmas unplugged: Australian teen social media ban brings holiday headspace woes
'Not black or white': Teens worldwide react to Australia social media ban
IBM nears roughly $11 billion deal for Confluent, WSJ reports
Where coal once reigned, Virginia eyes data centres
It’s not just you. Users struggle with the Instagram repost button.
Robinhood to enter Indonesia with brokerage, crypto trader acquisition

Others Also Read