Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET
The Friday Funny

Friday Funny: The Computer Man

Remember when Windows 95 was the latest and greatest OS from Microsoft, and the Macintosh — and Apple — were years away from the popularity they enjoy today? Here’s a painfully awkward video from 1995, where a self-styled “Computer Man” hands out boxed copies of software to dancing office workers and extols the virtues of the Macintosh over the “plug and pray” nature of Windows 95, all while singing an IT-focused ditty based on the “Scatman” song by Scatman John. (Video below image)

The Computer Man

He’s the “Macintosh Man with virus scan.”

It wasn’t long after this video was made that Apple and the Macintosh had a near-death experience and began licensing out the Mac OS to third-party hardware manufacturers. Steve jobs returned to Apple in 1996, and the rest is history: Apple is currently the most valuable technology company in the world based on market capitalization, and may likely remain in that position for the foreseeable future.

Sponsored Content

Say Goodbye to Traditional PC Lifecycle Management

Traditional IT tools, including Microsoft SCCM, Ghost Solution Suite, and KACE, often require considerable custom configurations by T3 technicians (an expensive and often elusive IT resource) to enable management of a hybrid onsite + remote workforce. In many cases, even with the best resources, organizations are finding that these on-premise tools simply cannot support remote endpoints consistently and reliably due to infrastructure limitations.

Related Topics:


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: