Programmers who defined the tech industry: Where are they now?
- 04 November, 2010 10:45
Some early programmer names are familiar to even the most novice of software developers. You may never have seen a line of code written by Bill Gates, or written any application in BASIC (much less for the Altair). But you know Gates’ name, and the names of a few others.
That’s a darned shame, because the early microcomputer era (we didn’t uniformly call them “personal computers” yet) had many brilliant software developers. Some of them went on to greater fame and fortune; others disappeared into the mists of history.
Bob Frankston, Dan Bricklin (Computerworld photo)
In 1986, Susan Lammers did a series of interviews with 19 prominent programmers in a Microsoft Press book, Programmers at Work . These interviews — many of which the author transcribed on her own website a few years ago — give a unique view into the shared perceptions of accomplished programmers... the people who invented the tools you use today.
Lammers’ book is still enjoyable on its own merits, simply because it’s a bunch of very smart developers talking about their craft at a time when there were relative few wide shoulders to stand upon. In re-reading my copy, I was reminded by how raw the technology industry was, how many competing standards we had to weed through (it had been years since I saw a list of the late-1980s databases: R:Base, Paradox, Javelin, ANZA) — and yet how soon we expected to achieve Artificial Intelligence.
I chose five of the book’s programmers for this time machine, leaving the remainder’s fate primarily an exercise for the intrepid reader.
[ See also: Priceless! The 25 Funniest Vintage Tech Ads ]
Here you’ll learn the then-current opinions from Dan Bricklin (VisiCalc), Jonathan Sachs (Lotus 1-2-3), Robert Carr (Ashton-Tate Framework), Bill Gates (BASIC on microcomputers), and Charles Simonyi (Multiplan).
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- 2010’s notable tech industry deaths
- The New Type of Programmer: DevOp
- Programmers at Work
- Priceless! The 25 Funniest Vintage Tech Ads
- Three Minutes: Godfathers of the Spreadsheet
- Dan Bricklin
- Bob Frankston
- Software Garden
- A Developer’s Introduction to Copyright and Open Source
- open source
- Mitch Kapor
- Digital Light & Color
- Framework (office suite)
- Lotus Symphony
- GO Corporation
- Alto personal computer
- Xerox PARC turns 40: Marking four decades of IT innovations
- Hungarian Notation
- Intentional Software Corporation
- Ray Ozzie to leave Microsoft
- Life after dbase
- Pete Petersen
- Programmers at Work - Follow Up
- Soyuz TMA-10 mission 2007
- Mark Shuttleworth
- Agile Development
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Bouncing Back From CIO Unemployment
Union slams latest fibre-to-premise trial in Tasmania
Protection Storage Architecture: The What, Why, and How
Traditional backup architectures lack the flexibility, agility, and scale to meet new data protection challenges and requirements. That’s where a Protection Storage Architecture comes in. This whitepaper details how transformational architecture enables backup teams to solve immediate tactical challenges, while helping to evolve IT teams.
Quickly Delivering Products to Market
Manufacturing is held back when designer, development, production and logistics teams are dispersed across continents, and face-to-face meetings are crucial to keep projects on path. This whitepaper details how video calling and conferencing is technology’s answer to better team communications, as well as lowering costs and increasing time to market.
Security in a Faster Forward World
Organizations today operate in a Faster Forward world, as they experience a shift towards an increasingly mobile workforce. Following this, an evolving stream of attackers are now targeting mobile devices where they can more easily access a larger number of high-value corporate and government assets. This paper will guide you through finding the right Web security partner that can improve efficiency while reducing risks and improving web experience.