Feeds

The IBM PC is 30

On 12 August 1981, the world changed

3 Big data security analytics techniques

Send in the clones

For many users, MS-DOS was sufficient, and the operating system became the standard, helped by Microsoft's entrepreneurial willingness to license MS-DOS to other hardware manufacturers. They, noting the stamp of authority the IBM brand had now placed on personal computing, were quick to emulate its offering, an approach made easier by the Chess team's use of third-party components.

The PC's Bios belonged to IBM, but clever coders worked to produce their own Bios implementations that, to the host OS and applications, would be indistinguishable from Big Blue's own.

Columbia Data Products

Columbia Data Products' 384
Source: MyNewOffice

Third-party Bioses, IBM's open hardware architecture and Microsoft's willingess to license MS-DOS made cloning an easier route to market than developing a machine from scratch. This serendipitous circumstance shifted the market IBM-ward and would quickly define personal computing's first de facto standard.

Columbia Data Products, introduced the first IBM-compatible computer in June 1982. The following November, Compaq announced the Compaq Portable, the first carry-around IBM clone, though the machine wouldn't ship until March 1983.

By which time, IBM was pushing its machine forward. That month, it introduced the XT - aka the 5160 - a 5150 with a built-in hard drive. Variants of the 5160 followed in October and, a month later, IBM introduced the ill-fated PCjr. It flopped, but February 1984's IBM PC Portable and the August-announced PC AT - aka the 5170, with a faster, 6MHz CPU - increased the PC's customer base even further.

Compaq Portable

The Compaq Portable
Source: OldComputers.net

The 6MHz IBM PC XT 286 debuted in 1986 - a year before the original 5150 was finally discontinued - and the series would go on to adopt each new generation of Intel processor, newer versions of MS-DOS and Windows. By now, though, IBM was just one manufacturer among many and its standing had been supplanted by Microsoft and Intel.

'PC' was now a generic term for machines using a Microsoft OS and an Intel processor.

IBM would go on to create the hugely popular ThinkPad line of notebook computers, launching the first in October 1992. The near total commoditisation of desktop and laptop personal computers persuaded IBM to exit this now low-margin business, and in 2005 it sold the whole lot to China's Lenovo. ®

SANS - Survey on application security programs

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.