facebook linkedin twitter

Computerware Blog

What’s the Oldest Piece of Tech You Use?

What’s the Oldest Piece of Tech You Use?

The good old days, the timeless oldies, there’s no school like the old school… A lot of us fondly look back on the simpler times, but technology typically pushes forward. In fact, if we look back at what we were collectively doing with computers back in the 80’s and 90’s, it’s practically embarrassing. Sure, the music and television shows of our formative years will never be topped, but less can be said for the technology. Unless you are a Boeing 747...

Some Boeing 747s Still Use Floppy Disks

It was recently brought to the public attention when a retired Boeing 747 was featured at a virtual hacking conference. A cybersecurity firm noticed a 3.5-inch floppy disk drive in the cockpit. Yes, those 3.5-inch floppy disks, from 1995. The disk drive is used to load various navigation databases. It turns out that an update consists of a sequence of eight floppy disks installed one by one into the cockpit of the aircraft.

When was the last time you used (or even saw) a 3.5-inch floppy disk?

Honestly, we run across them pretty regularly here at Computerware - they like to find their way into the bottoms of drawers and cabinets. If you don’t have a use for an old 3.5-inch floppy disk, we recommend using it as a makeshift drink coaster - especially those old America Online promo disks.

Let’s get back to the 747. Is it weird that an aircraft - something that needs to be 100 percent reliable - is using technology that most college students today have never used?

(Yikes, that last line made me feel all sorts of ways about my age...)

The answer is, actually, no. First of all, a lot of these planes were built in the 1990’s. They were designed with very specific, and very measured hardware. Large, long-range commercial aircraft aren’t manufactured haphazardly or in excess. According to Wikipedia, there were only 1,558 Boeing 747s ever built, and there are still around 419 being flown today. The onboard computers were designed with the technology of the day, and they were built very specifically for the aircraft. 

This is even a case where the older technology isn’t putting the plane or the airline at risk. Floppy disks aren’t inherently more secure than other data storage and data sharing technologies, but in the case of a 747, someone would need to physically enter the cockpit with their own disks, with the right data on them in order to infiltrate the system. Whereas in 2019, a cybersecurity professor was able to crash the in-flight entertainment system using nothing but a normal USB mouse. 

Please note, we aren’t trying to instill a fear of flying for anybody. As it turns out, the ethical hacker professor was only able to affect the entertainment system and not the more critical parts of the aircraft.

The lesson here is that older technology doesn’t necessarily mean it’s less secure, unless it’s actually connected to modern technology or modern networks. Your old cassette player will always play your cassettes, and never get an update that forces you to pay extra to listen to your old Prince tapes. That said, if your cassette player breaks, every all-Rush summer mixtape you ever made will have to collect dust until you find a second-hand replacement.

The same applies for business technology - that old printer that doesn’t connect to the network might not be able to serve as an entry-point to malware and cybercriminals, but it might also not be getting updates from the manufacturer to allow it to support Windows 10.

That’s where the danger of older technology also comes into play - if it’s connected to everything else, and not getting updated, then it could have vulnerabilities that make it an easy way in for hackers and other threats. If it’s connected to the Internet, it needs to be kept up-to-date. 

There’s No Shame in Having Older Technology, as Long as It’s Secure

There is a fine line - running an older operating system on a business network, the same network as your company data, is risky. That said, having an older Windows 98 desktop just to run the game Warcraft II: Tides of Darkness on original hardware just to show your kids how flippin’ sweet the mid-90s were is admirable - just don’t connect that PC to the network.

What’s the oldest piece of technology that you use on a regular basis? Tell us your story in the comments!

Is Blockchain Still a Big Deal? (It Sure Is)
Tip of the Week: Keeping a Smartphone Cool
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, September 20, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Software Cloud Data Business Management Hackers Hardware Microsoft Workplace Tips Network Security Backup Productivity Hosted Solutions Business Managed Service Provider Email Productivity Malware IT Services Saving Money Efficiency Google Innovation Computer Small Business User Tips Collaboration VoIP Quick Tips IT Support IT Support Data Backup Network Smartphones communications Mobile Devices Business Continuity Gadgets Disaster Recovery Data Recovery Microsoft Office Cybersecurity Android Social Media Smartphone Upgrade Mobile Office Server Communication Phishing Virtualization Miscellaneous Mobile Device Management Ransomware Holiday Operating System Users Windows Vendor Management Mobile Device Passwords Tech Term Managed IT Services Windows 10 Apps Outsourced IT Internet of Things Facebook Unified Threat Management Remote Monitoring BDR BYOD Automation Data Management Managed IT services Remote Computing Apple Mobile Computing Analytics WiFi Windows 10 Training Marketing History Artificial Intelligence Cloud Computing Browser The Internet of Things Business Technology Save Money Firewall Help Desk Alert Encryption App Big data Health Spam Bandwidth Office 365 Covid-19 Office Budget Two-factor Authentication Managed Service Information Technology IT Consultant Bring Your Own Device Windows 7 Antivirus VPN Managed IT Maintenance Printer Gmail Content Filtering Government Cybercrime Going Green Hard Drives Access Control Outlook Windows 8 Saving Time Remote Work Healthcare Computers Wireless Technology Search Blockchain Tech Support Virus Networking Best Practice Recovery Lithium-ion Battery Employer-Employee Relationship Retail Hiring/Firing Wi-Fi Information Cost Management Data Security It Management Travel Humor Education Data Loss Update Customer Service Conferencing iPhone Project Management Phone System IBM Money Document Management Augmented Reality Computing Hacking Hacker Law Enforcement Administration Twitter Compliance Intranet Solid State Drive File Sharing Data storage Patch Management Applications Hard Drive Flexibility Avoiding Downtime Vendor Risk Management Wireless Laptop Mobility Data Breach Legal Storage Website Save Time Downtime Regulations Current Events Customer Relationship Management Password Voice over Internet Protocol Value SaaS Computer Repair Running Cable PowerPoint Proactive IT Social Networking Vulnerabilities Robot Telephone Systems Securty Fax Server Employee/Employer Relationship User Cooperation Black Market Virtual Desktop Cryptocurrency Social Google Maps Scam Net Neutrality DDoS Social Engineering Business Growth Business Intelligence Chrome Digital Payment Digital Monitoring Meetings Router Websites Excel Paperless Office Word Private Cloud Comparison Tablet Sports Management Cortana Telephony Disaster Company Culture Software as a Service Hosted Solution Machine Learning End of Support Managed Services Provider Vulnerability Distributed Denial of Service Statistics Processors Lifestyle Text Messaging Programming Bitcoin IT service Webcam Data Protection How To Network Congestion USB Public Cloud Licensing Presentation Managed Services Downloads Managed IT Service Identity Theft Bluetooth Specifications Safety Notifications Streaming Media Inbound Marketing Distribution Documents Politics Google Docs Processor Virtual Reality Redundancy Memory Entertainment Experience Emails Teamwork Heating/Cooling Automobile Chromebook Cleaning Pain Points Evernote Monitors Smart Devices Cost Solutions Office Tips Computing Infrastructure Hack Virtual Assistant Video Conferencing Professional Services Employees How To Start Menu Download Tech Terms YouTube Computer Accessories eWaste Integration User Error Mobile Technology Co-managed IT Unified Communications Settings Trending Multi-factor Authentication Telephone Uninterrupted Power Supply Microchip Taxes Gaming Console Mouse Harddrive Skype Remote Working Environment Network Management Electronic Medical Records Transportation Spyware Reading Mobile Payment Samsung Debate Archive HIPAA Equifax Fleet Tracking Term Permissions Language Electronic Payment Recording Electricity Optimization Printing Employer Employee Relationship GPS Supply Chains Device security Competition MSP Directions Display G Suite Business Owner Nanotechnology Social Network SSID Hacks Physical Security Music Point of Contact Financial Data Desktop Finance Dark Web Free Resource switches Writing External Harddrive Electronic Health Records Business Cards Service Level Agreement Health IT cache Relocation Best Practives Television Tablets Upgrades Memes Startup IP Address Asset Tracking Processing Banking Botnet Managing IT Services Unified Threat Management Backup and Disaster Recovery Human Resources Logistics WannaCry Virtual Machines 3D Ebay Application Username Wasting Time Sync LiFi Thin CLient Surveillance Screen Reader Customer Resource management Corporate Profile Cyber security CCTV Microserver Analytic Telework Gamification Bookmark Time Management Freedom of Information Smart Phones Recycling Computer Malfunction Work/Life Balance Product Reviews Remote Workers Piracy Upload Employer/Employee Relationships Assessment Reliable Computing SharePoint Deep Learning IT Smart Tech Google Play Business Metrics Telephone Service Virtual Private Network Fiber-Optic Database Microsoft 365 Get More Done Google Calendar Adminstration Pirating Information Read Digital Signature HTML Managing Costs In Internet of Things Tip of the week Visible Light Communication Leadership Development Telephone System Medical IT VoIP Trend Micro Turn Key FinTech Mobile Security Browsers Touchscreen Printer Server News IT consulting Threats Knowledge Motion Sickness Data Storage Software License Trends User Tip Proactive Maintenance Consultation Scalability Trojan Device Management Multi-Factor Security Security Cameras Business Managemenet Procurement Fraud PDF Tactics Messenger Technology Tips CIO Tracking Content Management Devices Navigation Virtual Machine Organize Advertising Flash Rental Service eCommerce Audit Staffing Google Wallet Organization Best Available UTM Keyboard Content Data Analysis Fake News Windows XP Domains Error GDPR Managing Risk Web Server Society Upselling PCI DSS IT Plan Enterprise Resource Planning Printers SQL Server Data Warehousing Cabling Displays online Currency Communitications Legislation Supply Chain Management email scam Addiction Access Books Workers Micrsooft Video Surveillance Accountants Public Speaking A.I. Tech Hypervisor Emergency Administrator Hard Drive Disposal LinkedIn Internet Service Provider Holidays Computer Care Supercomputer Drones AI Shortcut Fileless Malware Hybrid Cloud Webinar Microsoft Excel Saving ZTime Troubleshooting Wireless Headphones Modem Strategy Regulations Compliance Migration Entrepreneur Connected Devices Proxy Server Azure Google Drive Windows Server 2008 Worker IT Assessment Personal Information CrashOverride Managing Stress Financial 3D Printing Regulation Capital Productuvuty

toner1