Article ID: CBB189385729

Before It Was a Giant: The Early History of Symantec, 1982-1999 (2016)

unapi

Before Symantec became a major supplier of security software, it offered a variety of natural language microcomputer software products. Its growth into a security firm was the result of acquisitions of software enterprises and expanding market conditions in the 1980s and 1990s. This story tells not only about nimbleness in the early software industry, but also about the importance of venture capitalists in the success and failure of early software firms.

...More
Included in

Article Yost, Jeffrey R. (2016) Computer Security, Part 2 -- Editor's Introduction. IEEE Annals of the History of Computing (pp. 10-11). unapi

Citation URI
https://data.isiscb.org/isis/citation/CBB189385729/

Similar Citations

Article Kneuper, Ralf; (2017)
Sixty Years of Software Development Life Cycle Models (/isis/citation/CBB236951329/)

Article Yost, Jeffrey R.; (2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems (/isis/citation/CBB570334134/)

Book Johnston, Jessica R.; (2009)
Technological Turf Wars: A Case Study of the Computer Antivirus Industry (/isis/citation/CBB001230682/)

Book Con Díaz Gerardo; (2019)
Software Rights: How Patent Law Transformed Software Development in America (/isis/citation/CBB992270814/)

Article DuPont, Quinn; Fidler, Bradley; (2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity (/isis/citation/CBB760734420/)

Article Misa, Thomas J.; (2016)
Computer Security Discourse at RAND, SDC, and NSA (1958-1970) (/isis/citation/CBB851516279/)

Article Yost, Jeffrey R.; (2016)
Computer Security, Part 2 -- Editor's Introduction (/isis/citation/CBB453922047/)

Article Nyman, Linus; Laakso, Mikael; (2016)
Anecdote: Notes on the History of Fork and Join (/isis/citation/CBB424414308/)

Review Salem Elzway; (2017)
Review of "The Outsourcer: The story of India's IT revolution" (/isis/citation/CBB610334077/)

Book Kidder, Tracy; (2016)
A truck full of money: One man's quest to recover from great success (/isis/citation/CBB668799391/)

Article Brad Sherman; (2018)
Intangible Machines: Patent Protection for Software in the United States (/isis/citation/CBB843796158/)

Review McCray, W. Patrick; (2016)
Review of "Inside the Machine: Art and Invention in the Electronic Age" (/isis/citation/CBB765321999/)

Article Smith, Alvy Ray; (2016)
The Dawn of Digital Light (/isis/citation/CBB962237102/)

Book Yost, Jeffrey R.; (2005)
The computer industry (/isis/citation/CBB001180688/)

Article Baker, Kevin T.; (2017)
Simulation and “Seduction” at the Policy Interface (/isis/citation/CBB450364367/)

Authors & Contributors
Yost, Jeffrey R.
Baker, Kevin T.
Elzway, Salem
Con Diaz, Gerardo
Laakso, Mikael
Vogel, William F.
Concepts
History of Computing
Software
Computer security; cyber security
Software engineering
Computer industry
Technology and law
Time Periods
20th century
21st century
20th century, late
19th century
Places
United States
Americas
India
Institutions
Control Data Corporation
United States. Securities and Exchange Commission
Club of Rome
United States. National Security Agency
Los Alamos Scientific Laboratory
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment