Feeds

Remembering the IBM PC

C:\> cd \memories\ibm\1981

High performance access to file storage

This Old Box It's time again to rewind that fleshy cassette storage device in your head to yesteryear.

This old box logo

This week, we're headed back to August 12, 1981 — the date IBM introduced its Personal Computer, a system that would shape the industry and make the term "PC" synonymous with home computers.

But let's not get ahead of ourselves. We enter the stage of history when PCs are still called "microcomputers," and nobody is quite sure how much profit there is to be made selling the damn things.

IBM Personal Computer (IBM 5150)

Released: 1981
Price: $1,656
OS: MS-DOS, USCD Pascal, CP/M-86
Processor: 4.77MHz Intel 8088
Memory: 65KB (first shipped with 16KB)
Display: 320x200
Storage: One or two 160KB 5.25" disk drives

IBM PC front shot

In the early '80s, IBM had built a stellar reputation for itself selling mainframe computers to big businesses. But the back rooms of conglomerates weren't enough for Big Blue — or as it was known back then, Medium-Sized Teal (no, not really).

Despite their previous failure to sell an affordable microcomputer with the IBM 5100, the company decided to try again after seeing the success of the Commodore PET, Apple II, Tandy's TRS-80s and the Atari 8-bit computers.

IBM assembled a 12-person team with the goal of bringing a product to market as quickly as possible, dubbed "Project Chess." At first, they considered buying Atari to assimilate its fledgling line of computers. But IBM instead decided to pursue its own offering — while saving money and time by building the machine with parts bought from a variety of OEMs. The company had previously developed its own components in-house.

IBM also decided to create an open architecture for the system (now known internally as project "Acorn"). Other manufacturers would be allowed to build and sell peripherals and software, thus creating the "IBM-compatible" legacy of PC equipment.

Project Chess was juggling between using the 16-bit Intel 8086 processor, Motorola MC68000 and the Intel 8088. The latter was eventually chosen because the others were determined to be too powerful.

IBM personal computer money shot

For the operating system, IBM first went to Digital Research, the creators of CP/M. Digital Research, however, showed little interest in the project. IBM then turned to a small company called Microsoft, which had built some fame for itself as the creator of a BASIC interpreter for the Altair 8800.

Bill Gates accepted IBM's offer, but Microsoft wasn't up to the challenge of writing an operating system itself. Microsoft instead bought the rights to QDOS (the "Quick and Dirty Operating System") for $50,000, written by Tim Paterson of Seattle Computer Products. QDOS itself was based heavily on the CP/M operating system. Paterson had bought a CP/M manual and used it as a basis to write QDOS in six weeks — with just enough changes to fly on the upside of legal.

Gates managed to convince IBM to let Microsoft retain the rights to the operating system, all the while keeping the Seattle Computer Products purchase secret from IBM. Microsoft would later go on to do very well indeed with licensing MS-DOS, thank you very much.

(There's more on the OS history bit here.)

The original IBM Personal Computer came with a version of Microsoft BASIC in ROM. The system was offered with either a CGA or MDA graphic card. The CGA graphics card could plug into a standard television, while the MDA plugged into a monochrome display.

Standard cassette tapes were used to load and store programs. A floppy disk drive was offered as an optional extra.

IBM PC from da rear

The IBM PC was still very expensive for the average home user, but found plenty success with businesses. In 1983, an IBM PC XT was launched with the business market in mind, offering more expansion slots and a 10 megabyte hard disk.

IBM's machine would become a standard for the industry, and Big Blue was able to own the personal computer market until the end of the '80s.

MS DOS advertisement

Click to enlarge

Thanks again to the Computer History Museum in Mountain View, CA for letting us ogle your hardware.

To our dear readers, begin reminiscing if it strikes you. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.