Feeds

3Com - a company built on ether

Master of technologies that vanished

Top three mobile application threats

3Com's sale to Huawei Technologies and Bain Capital for $2.2bn marks the end of a company which pioneered Ethernet and network computing, and once owned Palm.

3Com was named for "computers, communication and compatibility" by one of its founders, Robert Metcalfe, who had come up with Ethernet as a networking technology while at Xerox Parc.

Ethernet wasn't, and isn't, a particularly good networking technology. Its listen-wait-then-listen-again rule for avoiding collisions on networks is simplistic, and both Token Ring and ARCnet offer greater predictability and (at the time) better speeds - but Ethernet turned out to be surprisingly robust, and as processor power increased the advantages of its competitors became less compelling.

3Com started shipping an Ethernet transceiver in 1981, and within the first year sales were up to $1.8m, despite a cautious approach to expansion.

It was the personal computer, in the form of the IBM PC, which really accelerated 3Com's sales - everyone wanted to connect their desktop computers to each other, mainframes, and printers. But, such was the success of networking, IBM and its competitors started building Ethernet hardware into their computers, depriving 3Com of sales.

OS Too

Faced with lagging sales, 3Com directed its attention to servers and developed 3&plus, its very own network operating system. By 1986 network servers accounted for 32 per cent of the firm's sales, and the company started to look at providing clients in the form of UNIX workstations called the 3Station, eventually leading to a proposed acquisition by Convergent Technologies Inc, which was pulled at the last minute.

By 1987, 3Com was competing with Novell in providing "workgroup computing" at a time when the word "Novell" was synonymous with "network". A close relationship with Microsoft for a NetWare-competitor called LAN Manager to be run on OS/2 was undermined by the spectacular failure of OS/2.

But another purchase in 1987 proved more prescient - Bridge Communications Inc manufactured boxes for connecting different networks together, something an awful lot of people wanted to do.

In the early 1990s, the company was again in trouble. With its network OS and LAN Manager not selling it decided to focus on hardware and integration, just as Novell started to give up making hardware and focus on systems. 3Com would now support Netware as well as 3&plus, which was a good thing as not a lot of people were buying 3&plus.

Within a year the company had given up having its own network OS - a wise move as the concept disappeared over the next decade.

Combat fraud and increase customer satisfaction

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Brit boffins use TARDIS to re-route data flows through time and space
'Traffic Assignment and Retiming Dynamics with Inherent Stability' algo can save ISPs big bucks
Microsoft's Nadella: SQL Server 2014 means we're all about data
Adds new big data tools in quest for 'ambient intelligence'
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.