Retro or renegade? Remembering the technology of yore

Switch on the lava lamp and settle down with a sherbet Dip Dab. Today, we’re talking about why we love retro – and why it doesn’t always love us.

As we nostalgically peruse the ‘Tech Innovations of Yore’ hall of fame we’ll pay homage to previously beloved gadgets that died their death when Freddos still cost 10p, the tech that’s made comebacks more unexpected than holographic ABBA, and the stalwarts of our digital lives that have stuck around longer than the haunting memories of ’80s mullets.

Don’t you (forget about me)

An obvious place to start our walk down memory lane is the floppy disk. Kids today would laugh at the thought of a computer contraption with a maximum capacity of a single megabyte. But in its heyday, the humble floppy disk loaded our documents and programs, moved information from device to device, and supported us through ever-crashing computer nightmares.

While it will forever live on as the ‘save’ icon, the floppy couldn’t keep pace with the advancement of computer science or the data revolution, and over the years has been replaced by much smaller, more spacious, and sexier inventions like the CD-Rom, the USB stick, and most recently, the almighty Cloud.

And let’s not forget the VCR. I remember the Friday night pilgrimages to Blockbuster, the argument that followed when someone used my sister’s christening video to record an episode of Corrie (case still unsolved), and learning to not look at the screen while rewinding just in case you saw a glimpse of a vital plot point.

Anyway, I digress down memory lane. The VCR may have defeated Betamax, but within two decades it was replaced by a combination of DVDs, set-top boxes, and now on-demand streaming. It seems ease, immediacy, and choice will always win out over a soft spot for established technologies.

Guess who’s back, back again?

Moving on from the tech graveyard we arrive at the retro rebounders. Who’d have thought a pager would still be a thing? We’ve gone through the Nokia 3310, the Matrix banana phone, the iPhone 8, and oversized Apple novelty watches, but still, the pager endures as a ubiquitous piece of kit for NHS staff (who use 10% of the world’s pagers!), for lifeboat crews, and birdwatchers. These diverse groups still find the pager to be efficient and reliable in time-pressured situations and poorly connected areas and consider them more appropriate in work environments.

And as for a more broadly loved rebounder, there’s the endurance of vinyl. Hey Dad, look, the kids think you’re still cool! Despite the fact that apps like Spotify and YouTube mean we have just about every song ever at our fingertips, the vinyl is the retro-tech gift that keeps giving.

You’re still the one I run to, the one that I belong to

Then there’s the tech that just keeps trekking on, the hardware, or software, that we haven’t found a need or way to replace. Like email, invented in 1982.

Email simply hasn’t been usurped despite the pace of technological innovation in the twenty-first century. The advent of SMS, instant and even automated messaging, hasn’t stopped the reigning king of communications on the eve of its 30th birthday.

But here’s the key difference between various flavors of retro technology. Vinyl may have risen, fallen, and re-emerged as trends and tastes have changed, but essentially vinyl has never been problematic. On the other hand, the persistence of an essentially ‘retro’ technology like email has the potential to be problematic, if the right protocols aren’t adopted to keep the whole ecosystem secure.

The world around us has completely changed and cyber threats which didn’t exist in 1982 are now prevalent across inboxes. Considering the amount of spam targeted at and reaching the inbox, and the ease with which email can be used as a threat vector, it’s vital that all users of it adopt the essential security protocols to keep it safe and secure.

How do we bring email up to speed in 2022?

By making sure domains are configured and protected correctly (cue SPF and DKIM), by enabling two-factor authentication, and by ensuring DMARC is configured at p=reject, to stop exact impersonation (email spoofing) in its tracks. Instilling the correct protocols and protections is vital to keep email safe and effective in the modern age.

Interested to see how your email security currently measures up? Try our free investigate tool below!

check email dmarc setup

PUBLISHED BY

Clare Holmes

31 May. 2018

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
News

Winter wins: Red Sift OnDMARC wraps up 2024 as a G2 DMARC…

Francesca Rünger-Field

The season of giving has brought us another reason to celebrate! Red Sift OnDMARC continues its winning streak in G2’s Winter 2025 report, earning Leader status in the DMARC category for another consecutive season. This recognition reflects our strong market presence and the unwavering satisfaction of our customers. Cheers to wrapping up 2024 on…

Read more
AI

Text classification in the age of LLMs

Phong Nguyen

As natural language processing (NLP) advances, text classification remains a foundational task with applications in spam detection, sentiment analysis, topic categorization, and more. Traditionally, this task depended on rule-based systems and classical machine learning algorithms. However, the emergence of deep learning, transformer architectures, and Large Language Models (LLMs) has transformed text classification, allowing for…

Read more
Security

How to drive cybersecurity as a top business priority

Jack Lilley

Everyone has a role to play in protecting the enterprise. Whether you’re shaping strategy or implementing solutions, aligning efforts to mitigate critical risks ensures a stronger, more resilient enterprise. If you missed Red Sift’s recent webinar on “From Data to Buy-In: Driving Cybersecurity as a Top Business Priority” we’ve got you covered. The session…

Read more
DMARC

BreakSPF: How to mitigate the attack

Red Sift

BreakSPF is a newly identified attack framework that exploits misconfigurations in the Sender Policy Framework (SPF) a widely used email authentication protocol. A common misconfiguration involves overly permissive IP ranges, where SPF records allow large blocks of IP addresses to send emails on behalf of a domain. These ranges often include shared infrastructures like…

Read more