Abstract
Data processing systems are liable to both hardware and system software failure. In first and second generation systems the impact of such failures was typically limited by the scope of the system itself to the one or limited few programs operating at the time. Resumption from the beginning of the program or preplanned checkpoint typically constituted complete recovery.