Tag Archives: Tech · Edit · Tags: MCITP

The Peculiar Origins of Tech Terms

Earlier this year, PCMag offered up a brief history of malware. While researching the story, we had a little back and forth regarding the origin of the term “computer virus.”

One side had contended that the phrase first appeared in the science fiction book When HARLIE Was One. The other insisted that it was coined by computer scientist Fred Cohen. The former ultimately won out on account of chronology (1972 versus 1983), but Cohen got the nod for the first mention of the term in an academic paper. (Interestingly, it’s been subsequently brought to my attention that the term “computer virus” also popped up in a 1982 issue of The Uncanny X-Men, penned by Chris Claremont.)

 

Best Microsoft MCTS Training, Microsoft MCITP Training at certkingdom.com

 

Interestingly, someone also commented that the term “worm” was also born in sci-fi—this time in John Brunner’s 1975 bit of dystopia, The Shockwave Rider. It’s likely not a major revelation to most that a number of well-known tech terms actually originated on the pulpy pages of sci-fi novels.

Science fiction authors often draw on current advances in technology in order to predict the future, and computer developers often read a lot of science fiction. Take, for instance, “cyberspace,” which entered the lexicon by way of William Gibson’s short story “Burning Chrome,” and later his beloved 1984 novel, Neuromancer.

This got us thinking about the origins of other well-known tech terms. Turns out, many were born from far more diverse sources than just the predictions of science fiction authors. In this slideshow, we’ve pointed out familiar terms that were born from comedy sketches, comic books, practical jokes, and children’s stories, and there’s even one that started life as an airport shuttle.

Stupid user tricks 5: IT’s weakest link

But we were prepped. We were almost grinning, because we were about to be heroes. We told the IT guy that we have virtual images of his servers, that we had their configs registered with a local outfit that will rent us replacement infrastructure until he gets the new stuff on order, so all we need are the backup tapes and we can have him up and running in about a day, maybe less.

 

Best Microsoft MCTS Training, Microsoft MCITP Training at certkingdom.com

 

Boy, that would have been nice. But we also learned that Mr. IT had gotten tired of going to the second floor to replace backup tapes. After all, that disk array was doing just fine as a backup. So the last tape they had was from four months before the four-post header.

Fallout: Not only did Mr. IT get fired, but the IT team lost the contract — unfair.

Moral: Do your daily backups, and don’t treat your  IT infrastructure like a fridge.

Stupid user trick No. 5: Letting mom monkey around with the admin console
Incident: One IT consultant tells tale of yet another hard-learned lesson in proper password management brought to you by that time-honored IT pro, mom.

A small-business client had us install a Small Business Server box for her. She had about 12 people working for her, including her mom, who was doubling as the office manager and her daughter’s personal assistant.

We did as we were asked. Everything was set up, tested, and found to be working. We established an admin account on the server and left it with the owner with strict instructions that it’s for emergencies when she’s on the phone with us only. She, of course, gave the admin account info to her mom to keep someplace safe without passing on the last part of the instructions.

Her mother went exploring and found this thing called Active Directory. Next thing we know, we’re getting an angry call from the daughter because our email server was sending strange emails to all her clients and friends. The story: Her mom had figured out how to get into Computers and Users and had been adding everyone in her daughter’s address book into AD, along with generating them an internal email address in addition to the one listed in her daughter’s rolodex. The system sent everyone a welcome email with an introduction to the “new” network they’d just joined.

Fallout: Apology emails around, consultant fees to delete all those users and set AD right, and palpable tension between daughter and mom.

Moral: Server passwords aren’t status symbols. If a person doesn’t need one, don’t share it.

Stupid user trick No. 6: Paying before planning
Incident: Hubris is no stranger to the world of IT. But when a trumped-up higher-up puts the purchase before the plan, the fallout can mean only one thing — a derailed career, as one developer recounts.

I worked for an Internet startup back in the late ’90s, complete with big-time VC funding and a small DNA kernel of three business whizzes and one techno geek who gleefully grabbed the CTO title.

The startup’s goal was to create a Java-based vertical accounting system followed by inventory and sales systems that would eventually comprise a “suite” of offerings. The three kernel guys land a huge bundle of first-round financing and sit down with two “experts” from the vertical to discuss what the initial application should look like and how it should run.

They’re in germination meetings for about a week, coming out with huge schematics and wireframes for the first rev. The CTO decided a messaging bus platform is absolutely required and proceeded to do a deal with the leader in that space at the time (name withheld), for — wait for it — $5 million.