Computer Sciences Corporation Has Set up a Password-Protected Area on Its Website with the Following Information for Dyncorp Employees

Total Page:16

File Type:pdf, Size:1020Kb

Computer Sciences Corporation Has Set up a Password-Protected Area on Its Website with the Following Information for Dyncorp Employees FILING PURSUANT TO RULE 425 UNDER THE SECURITIES ACT OF 1933, AS AMENDED DEEMED FILED PURSUANT TO RULE 14a-12 OF THE SECURITIES EXCHANGE ACT OF 1934, AS AMENDED FILER: COMPUTER SCIENCES CORPORATION SUBJECT COMPANY: DYNCORP (001-03879) FILING: REGISTRATION STATEMENT ON FORM S-4 (REGISTRATION NO. 333-102187) Computer Sciences Corporation has set up a password-protected area on its website with the following information for DynCorp employees. Please read the following message before entering this Web site. On December 24, 2002, Computer Sciences Corporation filed with the SEC a registration statement on Form S-4 containing a proxy statement/prospectus relating to the proposed merger with DynCorp. CSC and the directors, certain executive officers, and other employees and representatives of CSC may be deemed to be participants in the solicitation of proxies for the meeting of DynCorp shareholders relating to the proposed merger. The proxy statement/prospectus contains information concerning such potential CSC participants and other important information which you are urged to read before making any decisions regarding the proposed merger. Copies of the proxy statement/prospectus, and any amendments or supplements thereto, may be obtained without charge at the SEC's Internet Web site at www.sec.gov as they become available. In addition, you may obtain the proxy statement/prospectus and the other documents filed by CSC with the SEC by requesting them in writing as they become available from Computer Sciences Co rporation, 2100 East Grand Avenue, El Segundo, California 90245, Attention: Investor Relations, telephone: 310.615.0311; e-mail: [email protected]. Click here to enter. csc.com | Ask a Question | Site Map What's New! Keep on top of content additions to the DynCorp Welcome Web site. Find out what's new. >learn more Common Threads Learn about some of the similarities CSC and DynCorp share. >learn more Road Show Take a look at some of the key messages presented by Paul Cofoni and Paul Lombardi at their meetings in December with DynCorp employees. >learn more © Copyright 2002 Computer Sciences Corporation Legal Disclaimer Privacy Policy S-4 Registration Statement Filed for CSC/DynCorp Merger CSC filed a Form S-4 registration statement with the SEC containing a proxy statement/prospectus relating to the proposed merger with DynCorp. Learn more about the statement. News Stories Learn about some of the fascinating projects in Federal Sector, such as CSC's work at the American Embassy in Kabul or the IRS PRIME project. History of CSC Read about CSC's 40-year history, and some of the changes and constants our company has experienced. Home | csc.com | Ask a Question | Site Map Home Key Contacts Ask a Question Ask a Question If you would like a response to your question, please be sure to provide your name and contact information in the fields provided. Questions that are frequently submitted will be posted in the FAQs section of this Web site. If you have a general comment about this Web site, use the Web site evaluation form. *Required field. Question* Name E-mail* Telephone* (daytime) © Copyright 2002 Computer Sciences Corporation Home | csc.com | Ask a Question | Site Map Home Site Map © Copyright 2002 Computer Sciences Corporation CSC @ a Glance Main Page Who We Are What We Do How We Are Organized Mission & Principles Leadership CSC History Joining CSC Main Page Communication Benefits Employee Programs Forms Key Contacts Main Page CSC Federal Business Main Page Vision & Goals Clients Awards & Recognition Key Programs FAQs Main Page News Main Page CSC News CSC Trivia CSC and DynCorp Main Page Common Threads Joining the Team What This Means to You Employees Speak Events & Reminders Main Page Events Reminders Learning Opportunities Main Page Types of Training Educational Assistance Home | csc.com | Ask a Question | Site Map Home CSC @ a Glance CSC @ a Glance CSC @ a Glance Main Page Who We Are What We Do How We Are Organized Across five decades, CSC has worked with clients, guiding them through technology change. Whether developing the first business language compiler, FACT, for Honeywell or creating e-business solutions that protect our planet's endangered species, CSC has maintained a focus on innovative Mission and Principles Leadership technical solutions that deliver business results. More than one-half of our staff joined CSC through acquisitions or outsourcing partnerships. CSC is headquartered in El Segundo, California, and has hundreds of offices around the world. CSC History Expertise CSC is unique. Instead of selling products, we sell the experience and expertise of some 65,000 employees worldwide. Their reliability, collaboration, and openness to new ideas are the foundation for our reputation for flexibility, innovation, and performance. We draw upon our own expertise and an array of nonexclusive technology alliances to provide our clients with the most effective total business solution. Solutions No other company offers the range of capabilities, experience, and global integration that we do. From consulting and systems integration to IT and business process outsourcing, CSC offers companies and government agencies the total solutions they need to succeed. © Copyright 2002 Computer Sciences Corporation Home | csc.com | Ask a Question | Site Map Home CSC @ a Glance Who We Are Who We Are Founded in 1959, CSC is a global Fortune 500 company, offering world-class technology solutions to a wide range of government and commercial clients. Our culture is what makes us unique among our competitors. More than one-half of our staff joined CSC through acquisitions or outsourcing partnerships. As a service company, we regard our people as our primary asset. The varied backgrounds and experiences of our staff allow us to think creatively and reach for new solutions to business problems. CSC employees have an average of over two decades of work experience. You will be joining CSC's Federal Sector organization. With approximately 15,000 employees, Federal Sector contributed 25 percent of CSC's total revenue in FY02. Federal Sector headquarters are located in Falls Church, Virginia. © Copyright 2002 Computer Sciences Corporation CSC @ a Glance Main Page Who We Are What We Do How We Are Organized Mission and Principles Leadership CSC History Home | csc.com | Ask a Question | Site Map Home CSC @ a Glance What We Do What We Do At CSC we help clients achieve business success through the creative application of information technology. Combining the newest technologies with our capabilities in consulting, systems integration, and outsourcing, CSC offers companies and government agencies the best total solutions they need to succeed. CSC's Federal Sector organization services every agency in the U.S. government including all branches of the U.S. military. Federal Sector has three focused business groups - Civil Group, Defense Group, and the Enforcement, Security and Intelligence Division. Civil Group services civil agencies such as the Department of Education, Department of Energy, NASA, and the Social Security Administration. Defense Group provides services to the Armed Forces and the joint defense environment. The Enforcement, Security and Intelligence Division services agencies such as the Transportation Security Administration, the U.S. Coast Guard, the Department of Justice, and the U.S. intelligence community. Business Consulting and Strategy We offer the full spectrum of business consulting services from strategic planning and performance measurement to process improvement and organization development. We work closely with agencies to identify improvement opportunities and then help them realize those possibilities. e-Government and Enterprise Solutions CSC is a leader in e-government and enterprise integration services. We help clients create a strategy, focus on core competencies, and leverage new mechanisms for aggregating and disseminating information. CSC's extensive government knowledge and experience allows us to craft customized solutions for challenges facing our clients. Homeland Security CSC @ a Glance Main Page Who We Are What We Do How We Are Organized Mission and Principles Leadership CSC History CSC has focused 40 years of expertise, capabilities, and problem solving know-how on bringing security to the homeland. We help our clients identify core issues, and we create comprehensive tools and creative solutions that allow them to focus beyond the threat of today and concentrate on solutions for tomorrow. Mission Solutions CSC excels in helping government agencies achieve their mission objectives. With 40 years of partnering with civil agencies, DoD, and the intelligence community, CSC understands the priorities, values, and challenges of government organizations. We deliver real-time, mission-critical command-and-control systems to clients such as the FAA and the Navy's AEGIS program. Operations and Outsourcing Technology is our business. CSC's operations and outsourcing services bring commercial best practices to government clients, for the best solutions technology has to offer. © Copyright 2002 Computer Sciences Corporation Home | csc.com | Ask a Question | Site Map Home CSC @ a Glance How We Are Organized How We Are Organized The organization charts posted on this Web site display CSC's present organizational structure. They do not reflect the impending organizational changes. An integration team is currently preparing new org charts, and we will share these new plans when they are available. CSC's global
Recommended publications
  • Some Recollections of the PHILCO TRANSAC S-2000
    Purdue University Purdue e-Pubs Department of Computer Science Technical Reports Department of Computer Science 1991 PHILCO: Some Recollections of the PHILCO TRANSAC S-2000 Saul Rosen Report Number: 91-051 Rosen, Saul, "PHILCO: Some Recollections of the PHILCO TRANSAC S-2000" (1991). Department of Computer Science Technical Reports. Paper 891. https://docs.lib.purdue.edu/cstech/891 This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. PIllLCO: SOME RECOLLECTIONS OF THE PIllLCO TRANSAC S-2000 Saul Rosen CSD-TR-91-051 June 1991 PHILCO: SOME RECOLLECTIONS OF THE PHILCO 1RANSAC S-2000 Saul Rosen CSD-lR 91-051 June 3. 1991 Abstract In 1954 engineers at Philco Corporation invented the Surface Barrier TransisLof. the first Lmnsistor that was suil­ able for usc in high speed computers. Philco set up a com­ puter activity, eventually a Computer Division, and in 1957 introduced the PhiIco Transac 5-2000, lhe first large scale transistorized scientific compuLer system offered as a product by a computer manufacturer. In the Spring of 1958 I was hired by Philco to organize a programming systems depart­ ment La provide sofLwarc support for the new computer sys­ tem. This paper presents part of the history of the Philco computer effon from lhe point of view of one participant There were problems lhal were solved and difficulties rnat were overcome, and there were a number of successful insLaI­ lalions. However, the Philco Computer Division did nol have adequate resources 10 rcmain compel..ilive in an area dom­ inated by IBM, and Philco withdrew from the general pur­ pose computer field in 1965.
    [Show full text]
  • Captain's Logtm
    The IT Civilization Needed a Language - IBM’s FORTRAN Gave it Meaning THE CLIPPER GROUP TM SM Captain’s Log SM Navigating Information Technology Horizons Published Since 2001 Report #TCG2004036 April 9, 2004 The IT Civilization Needed a Language — IBM’s FORTRAN Gave It Meaning Analyst: Joe De Natale Management Summary The announcement of the IBM System/360 mainframe forty years ago was a momentous event in the world of IT. A scalable system that could handle the whole breadth of applications – hence the all-points-of-the-compass meaning of the 360. Granted, the scaling up had to be accomplished by replacement, but from the lowest to the most powerful, compatibility was maintained throughout the whole line of computers that spanned the range of 50:1 in processing power. A more exhaustive treatment of the System/360 anniversary is given in another Captain’s Log.1 This companion piece celebrates the 50th anniversary of the announcement by IBM of the FORTRAN compiler. That may not seem to momentous to those who were not there at the beginning, but as the saying goes, You had to be there! Part 1 – In the Beginning Back in the early 1950s, some wag invented the saying, In the beginning was the word, and the word was 36 bits. That is a pretty good starting definition of the IBM 701, which was announced in 1952. It was the first commercially-available internally-stored program computer from IBM. This was a tube-based computer and when I say tube-based, I mean tube-based. Not only was the circuitry based on vacuum-tube technology, but the memory was made up of 72 CRTs, which provided for an unheard of internal storage of 32K of 36-bit words.
    [Show full text]
  • The Software History Shop
    "One for the History Books" Workshop Moderator: Luanne Johnson Recorded: September 24, 2000 Palo Alto, California CHM Reference number: X6351.2012 © 2011 Computer History Museum Table of Contents ORIGIN OF THE SOFTWARE HISTORY CENTER ............................................................................................................... 5 STRATEGIES FOR PRESERVING HISTORICAL MATERIALS ............................................................................................. 10 ROLE OF THE CHARLES BABBAGE INSTITUTE IN SOFTWARE HISTORY PRESERVATION ............................................... 17 TYPES OF MATERIALS TO BE PRESERVED .................................................................................................................... 20 ORIGINS OF PANSOPHIC SYSTEMS .............................................................................................................................. 27 ORIGINS OF AGS COMPUTERS, INC. ............................................................................................................................ 29 ORIGINS OF APPLIED DATA RESEARCH (ADR) .............................................................................................................. 31 EARLY SOFTWARE INDUSTRY FAILURES ...................................................................................................................... 33 ORIGINS OF FORTEX DATA SYSTEMS ........................................................................................................................... 35 ORIGINS
    [Show full text]
  • Careers in Management Consulting 1-58207-440-2
    Careers/Job Search Careers in Management Consulting Whether you’re attracted by the big bucks, the intellectual rigor, the glamour, the work, or a combination of the above, you’re not alone: Consulting firms are traditionally among the largest employers of top MBA and college graduates. It’s a high-paying, high-profile field that offers students the opportunity to take on a lot of responsibility right out of school and quickly learn a great deal about the business world. But with single-digit growth projected for the industry in 2004 and 2005, expect competition for jobs to be Careers in as tough as ever. So you’ll need to do your homework to land a job with a top consulting firm. Management Consulting In this popular WetFeet Insider Guide, you’ll explore • Profiles of 37 top strategy, Big Five, and specialty consulting firms. • Consulting opportunities beyond McKinsey and BCG. • Which firm is right for you—based on our exclusive Consulting Firm Appeal Test. • The latest industry trends. • Industry rankings of the major firms. • A week in the life of a typical consultant. • The typical career paths at the different firms. • How to prepare for the recruiting process, including the dreaded case interview. • Key differences between working for a consulting firm vs. an investment bank. WetFeet Insider Guide WetFeet WetFeet has earned a strong reputation among college gradu- ates and career professionals for its series of highly credible, 2005 Edition no-holds-barred Insider Guides. WetFeet’s investigative writers get behind the annual reports and corporate PR to tell the real Insider Guide story of what it’s like to work at specific companies and in different industries.
    [Show full text]
  • COMPUTER PROGRAMMERS: College Degree with at Least One Year California
    THIS TELEMETER 'i\1/-\GNETfCS SUPPORTS THE WEIGHT OF ONE YOUNG ELEPHANT flUS ~t jaster, more reliable memory, too! SILLY TEST but we hope it attracts your attention to tire thorough three-stage inspection and testing given clIe,.yTELEMETER MAGNETICS merT'!0ry product - from core to array to Duffers and memOiY system,~. economical· reliable· fast· Telemeter Magnetics Modular Memory Systems are designed and manufactured for absolute dependability Because TELEMETER MAGNETICS manufactures the memory system complete from core pru­ duction through array wiring to finished units" . and because TELEMETER MAGNETICS tests each phase of production thoroughly ... you can be that much surer when you specify memory systems designed and engineered by TMI. Modular design permits production of custom memory systems to satisfy practically any desired configuration. Units of from 100 to 1,000,000 bits are common ... memories can be supplied incorporating severai million bits. In addition, TMI offers you a selection of memory units with cycle times of 24 microseconds, 6 to 8 microseconds, and 3 microseconds. lIIemory stllck jor Electronic circuits in TELEMETER MAGNETICS memory systems employ solid state elements II 2()-microsecond system throughout ... transistors, diodes, and ferrite cores. Amplifiers, registers, drivers, and logic 2048 ll'orris 0/ 22 bits ('([ch are on plug-in cards for compactness and maintenance ease. I{ril,' ,Iur 'I)('('il/(,(II iUlls ({.'Id ("'"11'/"/1' In/II' //11/,' 1"11. l! f/ /I tJ i(/ (. ; n r I ' ,. ,\ 0.1 / ( J r r i! () (. ( I r f \ ..., • (' U I .' f I , ! 1/ \ \ • / ) /I If, r.... ~ f,' I I ' lUI ' l i, \ IMPORTANT JOB OPPORTUNITIES Circlp 1 on Reader Service Card.
    [Show full text]
  • 2018-Modelo-Gestion-Itilcobit.Pdf
    FORMULACIÓN DE ACCIONES DE MEJORA PARA LA PRESTACIÓN DE LOS SERVICIOS EN LA EMPRESA DXC TECHNOLOGY BASADO EN LA APLICACIÓN DE LOS MODELOS DE GESTIÓN ITIL V3 Y COBIT 5 EN LA CIUDAD DE BOGOTÁ JULIO CESAR YANES POLO UNIVERSIDAD COOPERATIVA DE COLOMBIA FACULTAD DE INGENIERÍA PROGRAMA INGENIERÍA DE TELECOMUNICACIONES BOGOTA D.C. 2018 FORMULACIÓN DE ACCIONES DE MEJORA PARA LA PRESTACIÓN DE LOS SERVICIOS EN LA EMPRESA DXC TECHNOLOGY BASADO EN LA APLICACIÓN DE LOS MODELOS DE GESTIÓN ITIL V3 Y COBIT 5 EN LA CIUDAD DE BOGOTÁ JULIO CESAR YANES POLO Seminario de Profundización Gestión Tecnológica PGTI Requisito Parcial para obtener el título de Ingeniero de Ingeniero de Telecomunicaciones Director Jose Vicente Palacio Hernandez UNIVERSIDAD COOPERATIVA DE COLOMBIA FACULTAD DE INGENIERÍA PROGRAMA INGENIERÍA DE TELECOMUNICACIONES BOGOTA D.C. 2018 NOTA DE ACEPTACIÓN ____________________________________ ____________________________________ ____________________________________ ____________________________________ ____________________________________ _______________________ PRIMER JURADO _______________________ SEGUNDO JURADO Bogotá, Junio, 2018 AGRADECIMIENTOS A Dios que todo lo permite, dándome fortaleza y perseverancia para culminar con este sueño anhelado. A mi madre, a mi familia, por entregarme su amor, esfuerzos, oraciones y bendiciones para poder lograr mí objetivo. A la ilustre Universidad Cooperativa de Colombia, a la facultad de Ingeniería, a la Carrera de Ingeniería en Telecomunicaciones, por darme la oportunidad de formarme como profesional;
    [Show full text]
  • The Media's Watching Vault! Here's a Sampling of Our Coverage
    The media’s watching Vault! Here’s a sampling of our coverage. “Unflinching, fly-on-the-wall reports... No one gets past company propaganda to the nitty-gritty inside dope better than these guys.” — Knight-Ridder newspapers “Best way to scope out potential employers...Vault has sharp insight into corporate culture and hiring practices.” — Yahoo! Internet Life “Vault has become a de facto Internet outsourcer of the corporate grapevine.” — Fortune “For those hoping to climb the ladder of success, [Vault’s] insights are priceless.” — Money.com “Another killer app for the Internet.” — New York Times “If only the company profiles on the top sites would list the ‘real’ information... Sites such as Vault do this, featuring insights and commentary from employees and industry analysts.” — The Washington Post “A rich repository of information about the world of work.” — Houston Chronicle TOP50VAULT GUIDE TO THE TOP 50 CONSULTING CONSFIRMS FIRMS © 2002 Vault Inc. TOP50VAULT GUIDE TO THE TOP 50 CONSULTING CONSFIRMS FIRMSDOUGLAS CANTOR AND CLAY RISEN © 2002 Vault Inc. Copyright © 2002 by Vault Inc. All rights reserved. All information in this book is subject to change without notice. Vault makes no claims as to the accuracy and reliability of the information contained within and disclaims all warranties. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of Vault Inc. Vault, the Vault logo, and “the insider career networkTM” are trademarks of Vault Inc. For information about permission to reproduce selections from this book, contact Vault Inc., P.O.
    [Show full text]
  • App C Cultural and Historic Resources 7Jan21
    • • • • ¨¦§405 ¨¦§10 Map Detail ^ Los Angeles County Project Site ^ ¨¦§105 ¨¦§110 Legend ^ Project Site Source: ESRI World Imagery Service FIGURE 1 0 2 4 Miles . Regional Location Map Venice Inglewood Legend Project Area Venice Inglewood Source: 2013 National Geographic Society, i-cubed FIGURE 2 0 1,000 2,000 Feet . Project Location Map E Maple Ave LairportSt NPacificCoast Highway E Mariposa Ave Source: San Diego 2017 9-inch Imagery FIGURE 3 0 200 400 Feet . Area of Potential Effects State of California - The Resources Agency Primary # DEPARTMENT OF PARKS AND RECREATION HRI # PRIMARY RECORD Trinomial NRHP Status Code 6Z Other Listings Review Code Reviewer Date Page 1 of 18 *Resource Name or #: 650 North Pacific Coast Highway P1. Other Identifier: N/A *P2. Location: ☒ Unrestricted *a. County Los Angeles and *b. USGS 7.5' Quad Venice, Calif. Date 1964 T 3S; R 14W ; S.B.B.M c. Address: 650 North Pacific Coast Highway City: El Segundo Zip: 90245 d. UTM: Zone: 11S, 370970 mE/ 3754727 mN e. Other Locational Data: APN - 4138-006-031 *P3a. Description: Building S37 (subject property), is located at 650 North Pacific Coast Highway, El Segundo, CA 92045 (alternate address 650 North Sepulveda Boulevard, El Segundo, CA 90245). Built 1961-1962, Building S37 is an example of the International Style, specifically showcasing Bauhaus and Corbusian influence. The building is separated from North Pacific Coast Highway by a flat, concrete-paved sidewalk. Building S37 is rectangular in plan, measuring approximately 256 feet by 65 feet. The building is of steel frame and concrete construction, rising from a concrete slab foundation.
    [Show full text]
  • The 10 Original Software Companies
    Where It All Began: The 10 Original Software Companies Posted 06/28/2011 at 12:47pm | by Gord Goble In compiling a list of the world's oldest software companies, one comes face to face with an inevitable question. Namely, what is it? What the heck is this thing we call "software?" We searched the darkest corners of our brains and perused the online dictionaries for quickie text bytes and never really could come up with a single, all­purpose answer. Is it the overtly simplistic "Anything that is not hardware but is used with hardware" or the seemingly too limiting "The programs used to direct the operations of a computer?" How about this metaphysical beauty: "Unlike hardware, software can't be touched." Ouch. That makes our heads hurt. While it's easy to say that Windows or Office or even the wanton dismemberment of Dead Space 2 are obvious examples of software, where does one draw the line? Did software, for instance, exist before the advent of computers? In our minds, it did. Though the concept of altering the performance of mechanisms by feeding them independent sets of instructions has clearly become rampant in the computer age, it in fact started long before that – the early 18th century, to be exact. And that is precisely where we'll start our journey. Please remember as you read that software – and for that matter, computers – were with us long before the desktop PCs that so radically changed everything. Moreover, just because Joe Blow in some dungeon in Joe Blow Land cranked out a few lines of code before one of the key players, we've elected for the purposes of this article to ignore Joe and highlight instead those companies that history will see as having made a serious impact.
    [Show full text]
  • Call Your Broker: the Rise of Cloud Service Brokerages
    Call Your Broker: The Rise of Cloud Service Brokerages Managing end-to-end business processes across the entire value delivery system will never be the same. While there used to be an 800-pound gorilla orchestrating the many players in a value chain (think Walmart), all that is changing. The new 800-pound gorilla in the room is the inescapable fact that the economics of scale alone dictate that services derived from the Cloud will typically be less expensive than any that an internal IT shop can provide, not to mention grappling with Big Data and predictive analytics. Does your company generate its own electricity? Likewise with basic IT services. Now compound the issue with how much an internal IT shop can allocate for security, compliance, disaster recovery, 7x24x365 operations, unified communications, and it is quickly apparent that the economics dictate, with very few and rare exceptions that internal IT will evolve the way of internal electricity, internal shipping, internal telecommunications, and pretty much any other aspect of the business that doesn’t directly create value for customers or competitive differentiation for the company. All of these resources will be sourced from a more proficient provider. Many of the objections to that concept are effectively, in the long term, red herrings. As they did when complexity grew in the enterprise use of IT way back in the late 1950s, companies will reach outside their internal IT departments and call in outside IT services companies that have assembled top-tier technology talent in cloud computing. Over the next few years, we will see some key trends developing that will change the IT services industry as a result of the emergence of cloud computing.
    [Show full text]
  • Thrive on Change. Welcome to DXC Technology
    Australia and New Zealand Thrive on change. Welcome to DXC Technology On April 4 in Australia and New Zealand, CSC officially merged with HPE’s Enterprise Services business to launch our new company and brand: DXC Technology. DXC Technology is the world’s leading independent, end-to-end next-generation IT services company, uniquely positioned to help our clients harness the power of innovation to thrive on change. Our mission is to lead digital transformations for our clients and deliver new beneficial outcomes for their business. We have the resources, global reach and scale to help clients apply the power of technology and confidently guide them toward the future. Seelan Nayagam DXC Technology’s independence, global talent, expertise, and extensive partner Managing Director, network combine to provide greater benefit to you. Our strength comes from: DXC Technology Australia and New Our technology independence and extensive partner network, including Zealand key strategic partnerships such as Amazon Web Services, AT&T, Dell EMC, HCL, Hitachi, HPE, HP, IBM, Lenovo, Micro Focus, Microsoft, Oracle, PwC, SAP, ServiceNow and VMWare. Our industry-leading partner relationships work together to deliver the right solution and the right team to address complex, critical client business challenges. A differentiated operating model —encompassing the building, selling and delivery of technology solutions — that enables seamless interaction with you. And a clear and confident vision, forged over 60 years of delivering results for thousands of clients across all industries. This is an exciting time for all of us at DXC Technology, and we are equally thrilled to share this experience with you.
    [Show full text]
  • Oral History of Peter Harris
    Oral History of Peter Harris Interviewed by: Thomas Haigh Recorded: November 19, 2004 Mountain View, California CHM Reference number: X3010.2005 © 2004 Computer History Museum Table of Contents EDUCATION.................................................................................................................................3 UNITED AIRCRAFT......................................................................................................................5 DATA TECH..................................................................................................................................9 SELLING DATA TECH TO C-E-I-R ............................................................................................12 FOUNDING APPLIED DATA SERVICES...................................................................................13 CREATING AND SELLING THE ADPAC PRODUCT ................................................................14 ADPAC VERSUS COBOL ..........................................................................................................18 GROWING THE COMPANY.......................................................................................................20 CUTTING BACK THE COMPANY..............................................................................................22 USING ADPAC TO WRITE COBOL PROGRAMS .....................................................................24 STRUCTURED CHARTS FOR COBOL PROGRAMMERS .......................................................26 NEW UPC CONVERSION PRODUCT
    [Show full text]