Article ID: CBB189385729

Before It Was a Giant: The Early History of Symantec, 1982-1999 (2016)

unapi

Before Symantec became a major supplier of security software, it offered a variety of natural language microcomputer software products. Its growth into a security firm was the result of acquisitions of software enterprises and expanding market conditions in the 1980s and 1990s. This story tells not only about nimbleness in the early software industry, but also about the importance of venture capitalists in the success and failure of early software firms.

...More
Included in

Article Yost, Jeffrey R. (2016) Computer Security, Part 2 -- Editor's Introduction. IEEE Annals of the History of Computing (pp. 10-11). unapi

Citation URI
https://data.isiscb.org/isis/citation/CBB189385729/

Similar Citations

Article Kneuper, Ralf; (2017)
Sixty Years of Software Development Life Cycle Models (/isis/citation/CBB236951329/)

Article Yost, Jeffrey R.; (2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems (/isis/citation/CBB570334134/)

Book Johnston, Jessica R.; (2009)
Technological Turf Wars: A Case Study of the Computer Antivirus Industry (/isis/citation/CBB001230682/)

Book Con Díaz Gerardo; (2019)
Software Rights: How Patent Law Transformed Software Development in America (/isis/citation/CBB992270814/)

Article Yost, Jeffrey R.; (2016)
Computer Security, Part 2 -- Editor's Introduction (/isis/citation/CBB453922047/)

Article Misa, Thomas J.; (2016)
Computer Security Discourse at RAND, SDC, and NSA (1958-1970) (/isis/citation/CBB851516279/)

Article DuPont, Quinn; Fidler, Bradley; (2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity (/isis/citation/CBB760734420/)

Article Nyman, Linus; Laakso, Mikael; (2016)
Anecdote: Notes on the History of Fork and Join (/isis/citation/CBB424414308/)

Book Kidder, Tracy; (2016)
A truck full of money: One man's quest to recover from great success (/isis/citation/CBB668799391/)

Review Salem Elzway; (2017)
Review of "The Outsourcer: The story of India's IT revolution" (/isis/citation/CBB610334077/)

Article Brad Sherman; (2018)
Intangible Machines: Patent Protection for Software in the United States (/isis/citation/CBB843796158/)

Review McCray, W. Patrick; (2016)
Review of "Inside the Machine: Art and Invention in the Electronic Age" (/isis/citation/CBB765321999/)

Article Smith, Alvy Ray; (2016)
The Dawn of Digital Light (/isis/citation/CBB962237102/)

Book Yost, Jeffrey R.; (2005)
The computer industry (/isis/citation/CBB001180688/)

Article Baker, Kevin T.; (2017)
Simulation and “Seduction” at the Policy Interface (/isis/citation/CBB450364367/)

Authors & Contributors
Yost, Jeffrey R.
Baker, Kevin T.
Elzway, Salem
Con Diaz, Gerardo
Laakso, Mikael
Vogel, William F.
Journals
IEEE Annals of the History of Computing
Iterations: An Interdisciplinary Journal of Software History
History of Science
Publishers
Yale University Press
Temple University Press
Springer
Random House
Greenwood Press
Concepts
History of Computing
Software
Computer security; cyber security
Software engineering
Computer industry
Technology and law
People
Conway, Melvin
English, Paul M.
Time Periods
20th century
21st century
20th century, late
19th century
Places
United States
Americas
India
Institutions
Control Data Corporation
United States. Securities and Exchange Commission
Club of Rome
United States. National Security Agency
Los Alamos Scientific Laboratory
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment