Microservices Expo Authors: Mehdi Daoudi, Pat Romanski, Elizabeth White, Steve Wilson, Stackify Blog

Related Topics: Microservices Expo

Microservices Expo: Blog Feed Post

25 Years of PC Week

The scene is a deserted office park in Los Angeles after hours

The scene is a deserted office park in Los Angeles after hours. I am driving around, trying to find the spot that my IT manager friend left an envelope for me. Inside the envelope is a disc with a secret IBM software program that is about to give me one heck of a scoop for PC Week, c. 1987.

It has been a week of memories. Last week was the 40th anniversary of the real beginning of the Internet, and this week is the 25 years that PC Week (regrettably now called eWeek) began publishing its weekly commentary on our industry.

While I didn’t start writing for the publication until 1987, I remember those times very well: back in the early 1980s I was working for a private software developer and we were porting our programs from the Apple to the new fangled IBM PC, and trying to make them work. Given that we were charging several thousand dollars to electric utilities for these products, it was my job to do the quality control and make sure that the code was written properly.

I eventually went on to work in various end-user computing departments for government and private industry before getting the job at PC Week as a writer and analyst. I went on to work there for more than three years when the PC industry was rapidly expanding and corporations were buying truckloads of PCs. Back then we didn’t have networks other than the ones that connected our PCs to our IBM mainframes, and I began to specialize in networking and installed the first one in our company before I became a tech journalist.

Wayne Rash called me last month to catch up and get some input on a story that he has written for the publication about those early days. It made me go back and actually find some of the articles that I wrote and recall some fond memories.

For those of you that were born after this year and don’t remember a world without computers, it is worth taking a moment to remind you that we had 80386 computers that had barely more than a megabyte of RAM and ran at 10 MHz clock speeds. Most of the machines back then had character-mode displays (except for Macs, which were rare on corporate desktops) and Windows and Linux hadn’t yet been invented. IBM and Microsoft were working together on OS/2 and Novell’s Netware was the most popular networking operating system because it could run on 80286s and use all of the entire memory of the machine. Hard disks were rarely larger than 20 MB, and floppies had just increased to store 1 MB of data. Mostly academic researchers were using the Internet and few corporations had email, let alone email connections to the outside.

In a story that I wrote in May 1990, I talk about what corporate IT folks need to think about when upgrading to the latest OS – which at the time was Windows 3 or OS/2 1.2. Some of those issues are still with us as we wrestle with Windows 7 and Snow Leopard.

Here are a few memories from that era. You can see scans of various magazine covers and articles that I mentioned from that era here.

My first story for PC Week (Jan 1987) was about a little-known company in the PC-to-mainframe market called Attachmate and how they planned on unseating the then-champion Digital Communications Associates, makers of the popular Irma boards. Attachmate went on years later to purchase DCA, and is still around in the terminal emulation space, also having bought network analysis company NetIQ.

What really got the IBM PC started in corporate computing circles was a spreadsheet called 1-2-3 from upstart Lotus Development Corporation. For some people, it was the only application that they ran on their desktops. Lotus 1-2-3 wasn’t the first spreadsheet and indeed, here is a brief post on the original spreadsheet called Visicalc.

Years before IBM ironically purchased Lotus, they started a skunk works project to use spreadsheets as a front-end to their mainframe databases, something that was very sophisticated at the time. The sole programmer behind the project was Oleg Vishnepolsky who spent about 18 months writing the software simply called S2. The code was used for internal purposes. I spoke to Vishnepolsky last week and rather than be mad at me for blowing his cover he was reminded that when my article ran his status as a lowly programmer was immediately elevated and he got to talk to the big brass about his project. “I got to rub shoulders with people at the top layers of management, and remember this is when IBM had about ten or 12 managers between me and the CEO.” Still, the S2 project was one of the best ones of his career and the code was used by tens of thousands of IBMers.

At the time this was being developed – say 1987 or so – there were a variety of people who were trying to clone 1-2-3 using the exact same command syntax, most notably Adam Osborne. There were legal challenges going back and forth about intellectual property and Osborne, being the roué that he was, only brought more attention to the whole thing.

Somehow, I got a hold of a copy of S2 from one of IBM’s customers, the setting for my cloak and dagger black ops mission at the top of this essay. I wrote the story about S2 and saw Osborne coincidentally a few weeks later at an industry event. Much as I wanted to give him a copy, I didn’t. But you can see the screen caps of S2 that I found in my archives.

Back then, IBM was very secretive about their new products and had all sorts of established protocols for dealing with the press. One place where they gave out advance information about their plans was at their user group meetings. Since I had come from IT, I knew how easy it was to attend these meetings under somewhat false pretenses. I called up the IT manager for Ziff Davis and found out that we indeed had an IBM mainframe squirreled away in New Jersey. I asked the manager if he could give me their customer number, which is pretty much all you needed to register for the IBM user conference. When I reassured him that it wasn’t going to come out of his budget (some things never change), I signed up and brought home several scoops from the meeting, much to the dismay of my fellow PC Week news hounds. But they were quick learners and when it came time for the next meeting, several of us attended as “Ziff Davis IT managers.” When we came back from the third meeting with even more scoops, Infoworld – which at the time was our main competitor — starting putting together the pieces and called up the president of the user group and got us banned from further meetings. But it was fun while it lasted.

Speaking of fun scoops, one of our younger and more eager reporters was Gina Smith. Gina was out to dinner with her boyfriend (who later married her) at a Cambridge, Mass. Restaurant. Sitting at the next table were two Germans speaking quickly. Little did they know that Smith was fluent in German and as she listened it turned out they were from Lotus’ German office telling each other what the future product plans were for the company. Lotus never knew how we got that story, and Smith went on to write a few books and run a couple of companies in Silicon Valley.

One of my early columns (July 1987) was about how hard it was to use a laptop in a hotel room. Back then modems were the main remote access devices, and they were running at 2400 bps, which was slow enough that you could read the text as it was being transmitted. Most hotels had hard-wired their phones so you couldn’t attach a modem easily, without having to unscrew the wall plates and take out the two wires that you needed to attach the modem to the phone system. How far have we come now with universal wireless everywhere.

Another of my favorite columns (March 1988) was written as if I was Judith Martin, answering questions of network etiquette. I considered it a successful parody when I got a cease and desist letter from Miss Manner’s law firm!

In October 1988, I was promoted to run a major portion of the PC Week. That same week, I was visiting one of my friends, Cheryl Currid, who ran the IT organization of Coke Foods (Minute Maid et al.) in Dallas. One of Cheryl’s staffers had baked a cake in my honor, iced with a simulated cover of PC Week’s front page with various “stories” in icing. Currid went on to write many columns for me at various publications, and is still consulting in the industry.

Yes, those were interesting and fun times. I hope you enjoyed some of these memories too.

Read the original blog entry...

More Stories By David Strom

David Strom is an international authority on network and Internet technologies. He has written extensively on the topic for 20 years for a wide variety of print publications and websites, such as The New York Times, TechTarget.com, PC Week/eWeek, Internet.com, Network World, Infoworld, Computerworld, Small Business Computing, Communications Week, Windows Sources, c|net and news.com, Web Review, Tom's Hardware, EETimes, and many others.

@MicroservicesExpo Stories
We have already established the importance of APIs in today’s digital world (read about it here). With APIs playing such an important role in keeping us connected, it’s necessary to maintain the API’s performance as well as availability. There are multiple aspects to consider when monitoring APIs, from integration to performance issues, therefore a general monitoring strategy that only accounts for up-time is not ideal.
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, discussed how to use Kubernetes to set up a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace. H...
When you focus on a journey from up-close, you look at your own technical and cultural history and how you changed it for the benefit of the customer. This was our starting point: too many integration issues, 13 SWP days and very long cycles. It was evident that in this fast-paced industry we could no longer afford this reality. We needed something that would take us beyond reducing the development lifecycles, CI and Agile methodologies. We made a fundamental difference, even changed our culture...
As many know, the first generation of Cloud Management Platform (CMP) solutions were designed for managing virtual infrastructure (IaaS) and traditional applications. But that’s no longer enough to satisfy evolving and complex business requirements. In his session at 21st Cloud Expo, Scott Davis, Embotics CTO, will explore how next-generation CMPs ensure organizations can manage cloud-native and microservice-based application architectures, while also facilitating agile DevOps methodology. He wi...
These days, change is the only constant. In order to adapt and thrive in an ever-advancing and sometimes chaotic workforce, companies must leverage intelligent tools to streamline operations. While we're only at the dawn of machine intelligence, using a workflow manager will benefit your company in both the short and long term. Think: reduced errors, improved efficiency and more empowered employees-and that's just the start. Here are five other reasons workflow automation is leading a revolution...
Docker is sweeping across startups and enterprises alike, changing the way we build and ship applications. It's the most prominent and widely known software container platform, and it's particularly useful for eliminating common challenges when collaborating on code (like the "it works on my machine" phenomenon that most devs know all too well). With Docker, you can run and manage apps side-by-side - in isolated containers - resulting in better compute density. It's something that many developer...
We have Continuous Integration and we have Continuous Deployment, but what’s continuous across all of what we do is people. Even when tasks are automated, someone wrote the automation. So, Jayne Groll evangelizes about Continuous Everyone. Jayne is the CEO of the DevOps Institute and the author of Agile Service Management Guide. She talked about Continuous Everyone at the 2016 All Day DevOps conference. She describes it as "about people, culture, and collaboration mapped into your value streams....
Cloud adoption is often driven by a desire to increase efficiency, boost agility and save money. All too often, however, the reality involves unpredictable cost spikes and lack of oversight due to resource limitations. In his session at 20th Cloud Expo, Joe Kinsella, CTO and Founder of CloudHealth Technologies, tackled the question: “How do you build a fully optimized cloud?” He will examine: Why TCO is critical to achieving cloud success – and why attendees should be thinking holistically ab...
Docker is on a roll. In the last few years, this container management service has become immensely popular in development, especially given the great fit with agile-based projects and continuous delivery. In this article, I want to take a brief look at how you can use Docker to accelerate and streamline the software development lifecycle (SDLC) process.
We define Hybrid IT as a management approach in which organizations create a workload-centric and value-driven integrated technology stack that may include legacy infrastructure, web-scale architectures, private cloud implementations along with public cloud platforms ranging from Infrastructure-as-a-Service to Software-as-a-Service.
Did you know that you can develop for mainframes in Java? Or that the testing and deployment can be automated across mobile to mainframe? In his session and demo at @DevOpsSummit at 21st Cloud Expo, Dana Boudreau, a Senior Director at CA Technologies, will discuss how increasingly teams are developing with agile methodologies, using modern development environments, and automating testing and deployments, mobile to mainframe.
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting challenge of adapting related cloud strategies to ensure optimal alignment, from managing complexity to ensuring proper governance. How can culture, automation, legacy apps and even budget be reexamined to enable this ongoing shift within the modern software factory?
While some vendors scramble to create and sell you a fancy solution for monitoring your spanking new Amazon Lambdas, hear how you can do it on the cheap using just built-in Java APIs yourself. By exploiting a little-known fact that Lambdas aren’t exactly single-threaded, you can effectively identify hot spots in your serverless code. In his session at @DevOpsSummit at 21st Cloud Expo, Dave Martin, Product owner at CA Technologies, will give a live demonstration and code walkthrough, showing how ...
@DevOpsSummit at Cloud Expo taking place Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center, Santa Clara, CA, is co-located with the 21st International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is ...
There are several reasons why businesses migrate their operations to the cloud. Scalability and price are among the most important factors determining this transition. Unlike legacy systems, cloud based businesses can scale on demand. The database and applications in the cloud are not rendered simply from one server located in your headquarters, but is instead distributed across several servers across the world. Such CDNs also bring about greater control in times of uncertainty. A database hack ...
API Security is complex! Vendors like Forum Systems, IBM, CA and Axway have invested almost 2 decades of engineering effort and significant capital in building API Security stacks to lockdown APIs. The API Security stack diagram shown below is a building block for rapidly locking down APIs. The four fundamental pillars of API Security - SSL, Identity, Content Validation and deployment architecture - are discussed in detail below.
With Cloud Foundry you can easily deploy and use apps utilizing websocket technology, but not everybody realizes that scaling them out is not that trivial. In his session at 21st Cloud Expo, Roman Swoszowski, CTO and VP, Cloud Foundry Services, at Grape Up, will show you an example of how to deal with this issue. He will demonstrate a cloud-native Spring Boot app running in Cloud Foundry and communicating with clients over websocket protocol that can be easily scaled horizontally and coordinate...
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, discussed how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He also discussed how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
DevOps at Cloud Expo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to w...
IT organizations are moving to the cloud in hopes to approve efficiency, increase agility and save money. Migrating workloads might seem like a simple task, but what many businesses don’t realize is that application migration criteria differs across organizations, making it difficult for architects to arrive at an accurate TCO number. In his session at 21st Cloud Expo, Joe Kinsella, CTO of CloudHealth Technologies, will offer a systematic approach to understanding the TCO of a cloud application...