Join the Computer Artifacts Contest
Share with the community the stories behind your own keepsakes for a chance to win
7/21/2014 1:06:51 AM |
By Valerie Dennis
In June, writer Gabe Goldberg shared personal stories behind classic mainframe and computing items in “Holding on to History”
and “Cherished Computer Memories.”
These articles tells the stories of what items people have held on to and why, showing a certain point in time and how far computing has come.
Now, we want to see what artifacts the Destination z community has. We are looking for the most unique and the oldest artifacts, and will award a $50 prepaid Visa card to the first place winner in each category. For inspiration, pictured below is a replica IBM System/370 and a punch card, take by John Eells at IBM.
Participation is open to all Destination z members. To enter or see what other people might have, head to the forums for the most unique artifacts and oldest artifacts today. There, upload a picture of your item or email the photo to email@example.com and explain what makes it unique, the timeframe it is from and why you have held on to it or the story behind it. If you aren’t a member, you can join here
Submissions are due by Sept. 19 at midnight Central time. Winners in each category will be decided by judges John Eells, a member of IBM's z/OS technical marketing and strategy team, and Bob Rogers, technical editor for IBM Systems Magazine
. Winners will be announced at the end of September and will be featured on Destinationz.org and in the DzInsider newsletter.
Contest rules are available here
And don’t forget to visit us at the Destination z booth, number 412, at SHARE in Pittsburgh from Aug. 4 to 6. There, you can connect with members of the community and get your caricature keepsake. See the caricatures from SHARE in Anaheim here
Valerie Dennis is site editor of Destinationz.org.
» More Articles
Even though the mainframe is known for security, there's always a risk that an employee—maliciously or by mistake—will threaten an installation's interests. Therefore, comprehensive security requires detecting and defeating insider threats.
Read more »
Joseph Gulla discusses IT architects and IT specialists along with other key IT roles—including analysts, consultants, IT security and IT support.
Read more »