Feeds

Apple inks Ping trademark deal with golf gear maker

Orange Ping sticks to sweet stuff

Beginner's guide to SSL certificates

Ping through the (computer) ages

The word Ping has quite an illustrious history in the world of networked computers and the arrival of the interwebs on Planet Earth.

Arguably it's an over-used term possessing both sporty and techy overtones, so Apple's decision to adopt it for its latest iTunes-happy music service might be considered by some as a bit lazy.

Readers with long memories will of course recall freeware network tool PING, which was developed in 1983 by Mike Muuss - a senior scientist at the US Army Research Lab in Maryland. He specialised in geometric modelling, virtual reality, digital networks and operating systems.

"I named it after the sound that a sonar makes, inspired by the whole principle of echo-location," Muuss explained.

"In college I'd done a lot of modeling of sonar and radar systems, so the 'Cyberspace' analogy seemed very apt. It's exactly the same paradigm applied to a new problem domain: ping uses timed IP/ICMP ECHO_REQUEST and ECHO_REPLY packets to probe the 'distance' to the target machine."

Muuss sadly died in a car crash in 2000, but his Ping source code lives on, having been ported to systems such as MS Windows 95 and Windows NT way back when.

Ping has of course also featured in works of fiction and cartoons. There's the Swiss stop motion animation Pingu, and The Story about Ping, which tells the tale of a duck alone on the Yangtze river.

Any of these names could have inspired Jobs to use the Ping name in his latest Apple strategy boutique pontification.

But we'll leave you with the words of the somewhat obscure late 80s Irish Band Sultans of Ping FC, whose most famous song you can now presumably share with others on iTunes Ping.

"Dancing in the disco, bumper to bumper / Wait a minute, where's me jumper? / Where's me jumper? Where's me jumper? / Where's me jumper? Where's me jumper?..." ®

Beginner's guide to SSL certificates

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.