Feeds

A history of personal computing in 20 objects part 2

The 1980s to the Present

3 Big data security analytics techniques

Power computing...

GRiD 1100 Compass

GRiD 1100 Compass

Monstrously expensive and aimed at advanced military and aerospace applications - Nasa was an early customer - GRiD’s Compass, released in April 1982, was the world’s first clamshell computer and thus the template for the notebook computer. Designed by Briton Bill Moggridge (1943-2012), the Compass was based on an Intel 8086 processor running GriD’s own GRiD-OS operating system. It had a 320 x 340 electroluminescent display and 3409KB of non-volatile magnetic ‘bubble’ memory. There was a 1.2Kb/s modem on board too.

Apple Macintosh

Apple Macintosh

The Mac didn’t introduce the graphical user interface - the Xerox Alto did - and it wasn’t even Apple’s first computer with a GUI - that was the Lisa - but it was the personal computer that did the most to popularise the graphical user interface and is one of very few personal computer device brands still going strong today, 28 years after its 1984 launch. Microsoft’s Windows would come to eclipse the Mac OS in volume, and despite rival GUIs like Gem, for a brief period through the late 1980s and early 1990s, the Mac defined how a modern GUI should work and look. It also provided the foundation for the desktop publishing revolution, which changed forever the economics of book and periodical publication, and arguably showed that any content could be produced on a computer.

Acorn Archimedes

Acorn promotes Archimedes 300 series

Acorn’s successful BBC Micro, derived from its unreleased Proton machine, kept the company going through the mid-1980s and helped it survive the very tough years of 1984 and 1985. But the Micro wouldn’t last forever, and its 6502 processor was by then long in the tooth. Rather than buy in an alternative, Acorn chose to create its own. The result was the ARM chip, and it was first implemented in the Archimedes in 1987. The chip’s designers, Sophie Wilson and Steve Furber, were attracted to the then vogue for Reduced Instruction Set Computing (Risc), and so the Archimedes became the first mass-market Risc-based personal computer.

SANS - Survey on application security programs

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.