Aspray, William F. (Author)
Cortada, James W. (Author)
Before Symantec became a major supplier of security software, it offered a variety of natural language microcomputer software products. Its growth into a security firm was the result of acquisitions of software enterprises and expanding market conditions in the 1980s and 1990s. This story tells not only about nimbleness in the early software industry, but also about the importance of venture capitalists in the success and failure of early software firms.
...MoreArticle Yost, Jeffrey R. (2016) Computer Security, Part 2 -- Editor's Introduction. IEEE Annals of the History of Computing (pp. 10-11).
Article
Kneuper, Ralf;
(2017)
Sixty Years of Software Development Life Cycle Models
(/isis/citation/CBB236951329/)
Article
Yost, Jeffrey R.;
(2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems
(/isis/citation/CBB570334134/)
Article
Mirowski, Alexander;
(2017)
At the Electronic Crossroads Once Again: The Myth of the Modern Computer Utility in the United States
(/isis/citation/CBB369914463/)
Book
Johnston, Jessica R.;
(2009)
Technological Turf Wars: A Case Study of the Computer Antivirus Industry
(/isis/citation/CBB001230682/)
Book
Con Díaz Gerardo;
(2019)
Software Rights: How Patent Law Transformed Software Development in America
(/isis/citation/CBB992270814/)
Book
Jones, C.B.;
Lloyd, J.L.;
(2011)
Dependable and Historic Computing: Essays Dedicated to Brian Randell on the Occasion of his 75th Birthday
(/isis/citation/CBB511443626/)
Article
DuPont, Quinn;
Fidler, Bradley;
(2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity
(/isis/citation/CBB760734420/)
Article
Misa, Thomas J.;
(2016)
Computer Security Discourse at RAND, SDC, and NSA (1958-1970)
(/isis/citation/CBB851516279/)
Article
Yost, Jeffrey R.;
(2016)
Computer Security, Part 2 -- Editor's Introduction
(/isis/citation/CBB453922047/)
Article
Nyman, Linus;
Laakso, Mikael;
(2016)
Anecdote: Notes on the History of Fork and Join
(/isis/citation/CBB424414308/)
Review
Salem Elzway;
(2017)
Review of "The Outsourcer: The story of India's IT revolution"
(/isis/citation/CBB610334077/)
Book
Kidder, Tracy;
(2016)
A truck full of money: One man's quest to recover from great success
(/isis/citation/CBB668799391/)
Article
Brad Sherman;
(2018)
Intangible Machines: Patent Protection for Software in the United States
(/isis/citation/CBB843796158/)
Article
Vogel, William F.;
(2017)
"The Spitting Image of a Woman Programmer": Changing Portrayals of Women in the American Computing Industry, 1958-1985
(/isis/citation/CBB857910207/)
Review
McCray, W. Patrick;
(2016)
Review of "Inside the Machine: Art and Invention in the Electronic Age"
(/isis/citation/CBB765321999/)
Article
Smith, Alvy Ray;
(2016)
The Dawn of Digital Light
(/isis/citation/CBB962237102/)
Book
Yost, Jeffrey R.;
(2005)
The computer industry
(/isis/citation/CBB001180688/)
Article
Baker, Kevin T.;
(2017)
Simulation and “Seduction” at the Policy Interface
(/isis/citation/CBB450364367/)
Article
Lewis, Nicholas;
(2017)
Purchasing Power: Rivalry, Dissent, and Computing Strategy in Supercomputer Selection at Los Alamos
(/isis/citation/CBB909353193/)
Article
Cortada, James W.;
(2002)
Studying the increased use of software applications: Insights from the case of the American petroleum industry, 1950--2000
(/isis/citation/CBB001180897/)
Be the first to comment!