Skip to main content

20 Facts about Apple on the Apple II's 40th Anniversary


June 10 marks the 40th anniversary of the release of the Apple II computer.
The tech giant’s first offering, the Apple I, was sold in DIY kit form, but the Apple II, released in 1977, was designed to be used by the everyday consumer -- with features such as color graphics, sound and even a built-in video game -- right out of the box.
The modern era of personal computers and the fortunes of the tech giant’s flagship product are inextricably tied together. The Apple II was discontinued in 1990, but it was a bestseller for more than a decade. By 1984, more than 2 million of the computers had been sold.
In his introduction of the Apple II in BYTE Magazine in 1977, Apple co-founder Steve Wozniak shared his vision of the future: “To me, a personal computer should be small, reliable, convenient to use and inexpensive.” That vision seems to have paid off.
In celebration of the Apple II’s 40th birthday, here is a look at some unexpected facts about the company.

Comments

Popular posts from this blog

World’s First Urdu Speaking AI Assistant Launched

C-Square, in collaboration with Genesys, has launched the world’s first Urdu-based speaking AI bot called RUBA at the Smart CX conference in Karachi. Similar to Apple’s Siri, Google’s Assistant and Microsoft’s Cortana personal assistants, RUBA is an abbreviation for Real Urdu Bot Automation. The bot can speak and understand Urdu while working as your personal assistant in performing tasks such as messaging someone. Read Related: www.thepakupdates.pk C-Square CEO, Ahsan Mashkoor demonstrated the bot at the conference, saying: RUBA was made in Urdu because of the local population in Pakistan, and for the large labour force working in the Middle-East. Federal Minister for States and Frontier Regions (Safron), Shehryar Khan Afridi, appreciated the efforts of C-Square, saying that Pakistan is moving in the right direction in terms of technology. Talking about the importance of Urdu, he said: It is important for us to learn English, it is good that we learn Chines...

NADRA Makes a Substantial Reducation in Smart ID Card Fees

The fee for the Smart National Identity Card (SNIC) has been decreased by NADRA. Interior Minister, Chaudhry Nisar, has ordered the authority to reduce the fees for the smart ID cards substantially, we have learned. Smart National Identity Card The smart ID card contains  a QR code for easier and faster identification as well as a data chip with 36 security features which makes it one of the most secure cards in the world. Each layer of the card comes with its own security features and it also has secure communication protocols for remote identification. A large amount of space on the card has been made available for the private sector to utilise for their products and services. Although, its expensive private sectot to use this card, once the number of smart card users in the country reaches critical mass, it will be much more profitable for them to use this universal and secure platform. New Fee Structure NADRA has decreased the fee for smart ID card from Rs. 15...

Dell’s Pre-installed Software Makes Your PC Vulnerable to Hackers

Discovered in a seemingly harmless support app. A young security researcher named Bill Demirkapi has discovered that Dell’s pre-installed software leaves computers and laptops open to hijacking. The said vulnerability exists in the Dell Support Assist app’s remote code execution. The software is used for updating drivers, adjust settings and clean out unused files. But after making certain modifications to the app, hackers can misuse it to install malware into your computer or take over your PC. This exploit, however, is not open to any hacker out there as only attackers on the same local network as your PC can do it. Also, you have to visit a website controlled by the attacker to fully execute the hijack. How it Works The attackers simply need to trick the user into clicking on a website. The website then runs malicious JavaScript code which is usually hidden inside ads on legitimate websites, which then allows the attacker to gain the access he needs. Here’s a demonstr...