From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: PKI/Digital signature doesn't work Newsgroups: sci.crypt Date: Sun, 22 Jul 2001 13:30:29 GMT"Harris Georgiou" writes:
we had been involved in helping create something called "electronic commerce" and had to do some amount of due diligence on some of the entitites doing certificate manufacturing.
the talk I was at where somebody from the german banking community gave a description & reasons for relying-party-only certificates was at the following conference
https://csrc.nist.gov/publications/detail/conference-paper/1998/10/08/proceedings-of-the-21st-nissc-1998
at the conference, I was on a PKI panel that included CTOs & the ilk from several certificate manufacturing companies ... misc. ref:
https://www.garlic.com/~lynn/2001g.html#0
random refs:
https://www.garlic.com/~lynn/aadsm5.htm#asrn2
https://www.garlic.com/~lynn/aadsm5.htm#asrn3
https://www.garlic.com/~lynn/aepay7.htm#nonrep6
https://www.garlic.com/~lynn/subpubkey.html#sslcerts
https://www.garlic.com/~lynn/aadsm6.htm#echeck
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Alpha: an invitation to communicate Newsgroups: comp.os.vms,comp.unix.tru64,comp.arch Date: Sun, 22 Jul 2001 16:54:25 GMTPeter Hancock writes:
disk engineering posts
https://www.garlic.com/~lynn/subtopic.html#disk
page replacement algorithm posts
https://www.garlic.com/~lynn/subtopic.html#wsclock
dynamic adaptive resource management posts
https://www.garlic.com/~lynn/subtopic.html#fairshare
multiprocessor, tightly-coupled, smp and/or compare-and-swap posts
https://www.garlic.com/~lynn/subtopic.html#smp
High Availability Cluster Multi-Processing poss
https://www.garlic.com/~lynn/subtopic.html#hacmp
360 (and/or 370) microcode posts
https://www.garlic.com/~lynn/submain.html#360mcode
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Alpha: an invitation to communicate Newsgroups: comp.os.vms,comp.unix.tru64,comp.arch Date: Mon, 23 Jul 2001 21:05:45 GMTJF Mezei writes:
if you look at the LPAR documentation with regard to performance planning, there is still some amount of "vm" overhead still involved (it just that it is somewhat less because it is being done in the hardware w/o ..at least.. the overhead of a context switch into a different address space & software processing).
a subset of the VM commands is still seen on the console for doing LPAR configurations. Also, the hardware console/service processor may or may not still be a VM system (aka all 3090s contained two "embedded" 4361s running a modified version of vm/370 release 6 that were the service processor and hardware console interface).
random refs:
https://www.garlic.com/~lynn/submain.html#360mcode
--
Anne & Lynn Wheeler | lynn@garlic.com, https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: PKI/Digital signature doesn't work Newsgroups: sci.crypt Date: Mon, 23 Jul 2001 00:48:54 GMT"Harris Georgiou" writes:
actually certificates are redundant and superfluous in an online model, where the "certification" check can be done via an online query; it is just that it is quite a bit more obvious when the relying party and the registration party are the same ... to be able to see that the certificate is extraneous in the whole operation.
certificates were designed to serve a purpose in the offline world, where it wasn't possible to directly contact the registration & certification authority ... and so had to relying on a distributed credential in place of an online query.
The r/o distributed credential (aka certificate) is otherwise redundant, superfluous and extraneous if you can directly do an online query.
An example is the current SSL server domain name certificates and being able to achieve the same purpose in a much better way by having the online domain name infrastructure provide real-time public key distribution and certification .. aka instead of registering your domain name and public key with a certification authority ... collapse the whole thing into the domain name infrastructure and register a public key at the same time the domain name is registered. the domain name infrastructure than can provide real-time certification and distribution of public key ... instead of the current mechanism relying on stale manufactured certificates.
misc. ref:
https://www.garlic.com/~lynn/subpubkey.html#sslcerts
--
Anne & Lynn Wheeler | lynn@garlic.com, https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: PKI/Digital signature doesn't work Newsgroups: sci.crypt Date: Mon, 23 Jul 2001 20:46:41 GMTthose who know me have no need of my name <not-a-real-address@usa.net> writes:
the interesting aspect is supposedly the justification for SSL domain name certificates in the first place are integrity weaknesses in the domain name infrastructure. so at least the Certification Authority business of SSL domain name certificates have to improve the integrity of the domain name infrastructure for their own purposes (in order that they can rely on what it is that they are certifying ... so people can rely on their certificates). however, if they improve the integrity of the domain name infrastructure to meet minimum integrity requirements for their own business; they also eliminate much of the justification for SSL domain name certificates in the first place.
misc. ref:
https://www.garlic.com/~lynn/subpubkey.html#sslcerts
--
Anne & Lynn Wheeler | lynn@garlic.com, https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: PKI/Digital signature doesn't work Newsgroups: sci.crypt Date: Wed, 25 Jul 2001 12:17:36 GMT"Harris Georgiou" writes:
random refs:
https://www.garlic.com/~lynn/aadsm5.htm#asrn2
https://www.garlic.com/~lynn/aadsm5.htm#asrn3
work then began in financial standards body for authentication transactions in untrusted &/or insecure networks (aka debit & atm cards already had PIN authenticated transactions that operated in secure networks).
the result of that in the financial standards world was the X9.59 standard for all electronic account-based transactions (along with some enhancements to ISO 8583 to carry X9.59 digital signature in the payment card scenerio). Part of the X9.59 standards was that "x9.59" related account numbers could only be used in authenticated transactions (i.e. the harvesting of account numbers from x9.59 transactions could not later be used in fraudulent, unauthenticated transactions; essentially removing such account numbers from the status of shared-secret and points of exploit).
There already have been debit network pilots ... and work is underway for production roll-outs.
misc. refs:
https://www.garlic.com/~lynn/nacharfi.htm
https://www.garlic.com/~lynn/99.html#224
https://www.garlic.com/~lynn/aadsmore.htm#nacha
mapping of x9.59 standard to iso 8583 payment network standard
https://www.garlic.com/~lynn/8583flow.htm
misc. other x9.59 references
https://www.garlic.com/~lynn/x959.html#x959
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: PKI/Digital signature doesn't work Newsgroups: sci.crypt Date: Wed, 25 Jul 2001 12:42:29 GMT"Harris Georgiou" writes:
so somebody goes to a certification authority (CA) to get a SSL domain name server certificate. Since the Certification Authority has no trusted database of who owns which domain name, the Certification Authority goes to the authoritative agency for domain name ownership (aka the domain name infrastructure) to verify that the entity really owns the domain name. The CA then certifies (in a digital certificate) that it has checked with the domain name infrastructure as to the true owner of the domain name before issueing the SSL domain name server certificate.
The client SSL code, when it receives a SSL domain name server certificate, checks the domain name specified in the SSL domain name server certificate against the URL that the client had used to contact the server; if they "match" ... SSL proceeds (there are misc. other things like checking to see that the CA signing the certificate is in the built-in list of CAs).
The problem, of course, is that Certification Authorities have to rely on the very same (insecure) domain name infrastructure as the final authority/arbritrator for information that they certified ... this same domain name infrastructure that the clients rely on for doing domain name -> ip address resolution.
random ref:
https://www.garlic.com/~lynn/subpubkey.html#sslcerts
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: PKI/Digital signature doesn't work Newsgroups: sci.crypt Date: Wed, 25 Jul 2001 12:54:29 GMT"Lyalc" writes:
shared-secret has the same value originating and validating the "electronic signature". leakage of shared-secrets (especially by recipients) allows fradulant originated tranactions. easly seen in all the reports about CC account# leakage & harvesting (since for all intents and purposes in the current infrastructure ... the CC account numbers are shared-secrets and can be used to origiante fradulent transactions).
public/private key authentication technology upgrade to existing shared-secret business processes is a relatively inexpensive upgrade to eliminate major exploits.
random refs:
https://www.garlic.com/~lynn/subintegrity.html#fraud
https://www.garlic.com/~lynn/aadsm2.htm#inetpki A PKI for the Internet (was RE: Scale (and the SRV
https://www.garlic.com/~lynn/aadsm2.htm#account A different architecture? (was Re: certificate path
https://www.garlic.com/~lynn/aadsm2.htm#straw AADS Strawman
https://www.garlic.com/~lynn/aadsm2.htm#strawm3 AADS Strawman
https://www.garlic.com/~lynn/aadsm2.htm#keyl4 On leaving the 56-bit key length limitation
https://www.garlic.com/~lynn/aadsm2.htm#pkikrb PKI/KRB
https://www.garlic.com/~lynn/aadsm3.htm#cstech cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#cstech2 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#cstech4 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#cstech5 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#cstech6 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#cstech8 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#cstech10 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#cstech13 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#kiss1 KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
https://www.garlic.com/~lynn/aadsm3.htm#kiss2 Common misconceptions, was Re: KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp-00.txt))
https://www.garlic.com/~lynn/aadsm3.htm#kiss3 KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
https://www.garlic.com/~lynn/aadsm3.htm#kiss8 KISS for PKIX
https://www.garlic.com/~lynn/aadsm3.htm#kiss9 KISS for PKIX .... password/digital signature
https://www.garlic.com/~lynn/aadsm4.htm#00 Is The Public Key Infrastructure Outdated?
https://www.garlic.com/~lynn/aadsm4.htm#7 Public Key Infrastructure: An Artifact...
https://www.garlic.com/~lynn/aadsm5.htm#asrn4 assurance, X9.59, etc
https://www.garlic.com/~lynn/aadsm5.htm#shock2 revised Shocking Truth about Digital Signatures
https://www.garlic.com/~lynn/aadsm5.htm#spki Simple PKI
https://www.garlic.com/~lynn/aadsm5.htm#spki4 Simple PKI
https://www.garlic.com/~lynn/aadsmore.htm#keytext proposed key usage text
https://www.garlic.com/~lynn/aadsmore.htm#killer1 Killer PKI Applications
https://www.garlic.com/~lynn/aadsmore.htm#biosigs biometrics and electronic signatures
https://www.garlic.com/~lynn/aadsmore.htm#client4 Client-side revocation checking capability
https://www.garlic.com/~lynn/aepay2.htm#privrule3 U.S. firms gird for privacy rules
https://www.garlic.com/~lynn/aepay3.htm#votec (my) long winded observations regarding X9.59 & XML, encryption and certificates
https://www.garlic.com/~lynn/aepay3.htm#votec (my) long winded observations regarding X9.59 & XML, encryption and certificates
https://www.garlic.com/~lynn/aepay3.htm#votec (my) long winded observations regarding X9.59 & XML, encryption and certificates
https://www.garlic.com/~lynn/aepay3.htm#votec (my) long winded observations regarding X9.59 & XML, encryption and certificates
https://www.garlic.com/~lynn/aepay3.htm#mcomm (my) misc. additional comments on X9.59 issues.
https://www.garlic.com/~lynn/aepay3.htm#mcomm (my) misc. additional comments on X9.59 issues.
https://www.garlic.com/~lynn/aepay3.htm#mcomm (my) misc. additional comments on X9.59 issues.
https://www.garlic.com/~lynn/aepay3.htm#mcomm (my) misc. additional comments on X9.59 issues.
https://www.garlic.com/~lynn/aepay3.htm#aadsrel1 AADS related information
https://www.garlic.com/~lynn/aepay3.htm#aadsrel1 AADS related information
https://www.garlic.com/~lynn/aepay3.htm#aadsrel1 AADS related information
https://www.garlic.com/~lynn/aepay3.htm#aadsrel1 AADS related information
https://www.garlic.com/~lynn/aepay3.htm#aadsrel1 AADS related information
https://www.garlic.com/~lynn/aepay3.htm#aadsrel1 AADS related information
https://www.garlic.com/~lynn/aepay3.htm#aadsrel1 AADS related information
https://www.garlic.com/~lynn/aepay3.htm#aadsrel1 AADS related information
https://www.garlic.com/~lynn/aepay3.htm#aadsrel1 AADS related information
https://www.garlic.com/~lynn/aepay3.htm#aadsrel1 AADS related information
https://www.garlic.com/~lynn/aepay3.htm#passwords Passwords don't work
https://www.garlic.com/~lynn/aepay4.htm#dnsinteg1 Domain Name integrity problem
https://www.garlic.com/~lynn/aepay6.htm#x959b X9.59 Electronic Payment standard issue
https://www.garlic.com/~lynn/aepay6.htm#harvest harvesting of credit card numbers
https://www.garlic.com/~lynn/aepay6.htm#harvest2 shared-secrets, CC#, & harvesting CC#
https://www.garlic.com/~lynn/aepay6.htm#erictalk Announce: Eric Hughes giving Stanford EE380 talk this
https://www.garlic.com/~lynn/aepay6.htm#ecml Electronic Commerce Modeling Language
https://www.garlic.com/~lynn/aepay6.htm#dspki5 use of digital signatures and PKI (addenda)
https://www.garlic.com/~lynn/aepay7.htm#nonrep0 non-repudiation, was Re: crypto flaw in secure mail standards
https://www.garlic.com/~lynn/aepay7.htm#nonrep1 non-repudiation, was Re: crypto flaw in secure mail standards
https://www.garlic.com/~lynn/aepay7.htm#nonrep3 non-repudiation, was Re: crypto flaw in secure mail standards
https://www.garlic.com/~lynn/aepay7.htm#nonrep4 non-repudiation, was Re: crypto flaw in secure mail standards
https://www.garlic.com/~lynn/aepay7.htm#nonrep5 non-repudiation, was Re: crypto flaw in secure mail standards
https://www.garlic.com/~lynn/aepay7.htm#nonrep6 non-repudiation, was Re: crypto flaw in secure mail standards
https://www.garlic.com/~lynn/aepay7.htm#ssexploit Shared-Secret exploit
https://www.garlic.com/~lynn/ansiepay.htm#privacy more on privacy
https://www.garlic.com/~lynn/ansiepay.htm#ifraud Internet Fraud
https://www.garlic.com/~lynn/99.html#52 Enter fonts (was Re: Unix case-sensitivity: how did it originate?
https://www.garlic.com/~lynn/99.html#172 checks (was S/390 on PowerPC?)
https://www.garlic.com/~lynn/99.html#173 checks (was S/390 on PowerPC?)
https://www.garlic.com/~lynn/99.html#214 Ask about Certification-less Public Key
https://www.garlic.com/~lynn/99.html#226 Attacks on a PKI
https://www.garlic.com/~lynn/99.html#228 Attacks on a PKI
https://www.garlic.com/~lynn/99.html#235 Attacks on a PKI
https://www.garlic.com/~lynn/99.html#238 Attacks on a PKI
https://www.garlic.com/~lynn/2000.html#33 SmartCard with ECC crypto
https://www.garlic.com/~lynn/2000.html#39 "Trusted" CA - Oxymoron?
https://www.garlic.com/~lynn/2000.html#47 TLS: What is the purpose of the client certificate request?
https://www.garlic.com/~lynn/2000.html#57 RealNames hacked. Firewall issues.
https://www.garlic.com/~lynn/2000b.html#14 Will Radius be obsolute if implement 2-token authentications?
https://www.garlic.com/~lynn/2000b.html#29 20th March 2000
https://www.garlic.com/~lynn/2000b.html#46 Simple authentication protocol: any good?
https://www.garlic.com/~lynn/2000b.html#53 Digital Certificates-Healthcare Setting
https://www.garlic.com/~lynn/2000b.html#90 Question regarding authentication implementation
https://www.garlic.com/~lynn/2000b.html#92 Question regarding authentication implementation
https://www.garlic.com/~lynn/2000c.html#32 Request for review of "secure" storage scheme
https://www.garlic.com/~lynn/2000d.html#70 When the Internet went private
https://www.garlic.com/~lynn/2000f.html#1 Why trust root CAs ?
https://www.garlic.com/~lynn/2000f.html#4 Why trust root CAs ?
https://www.garlic.com/~lynn/2000g.html#5 e-commerce: Storing Credit Card numbers safely
https://www.garlic.com/~lynn/2000g.html#33 does CA need the proof of acceptance of key binding ?
https://www.garlic.com/~lynn/2000g.html#34 does CA need the proof of acceptance of key binding ?
https://www.garlic.com/~lynn/2000g.html#49 Use of SET?
https://www.garlic.com/~lynn/2001b.html#29 z900 and Virtual Machine Theory
https://www.garlic.com/~lynn/2001c.html#8 Server authentication
https://www.garlic.com/~lynn/2001c.html#9 Server authentication
https://www.garlic.com/~lynn/2001c.html#30 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#34 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#39 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#40 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#41 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#42 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#54 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#59 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#60 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#65 Key Recovery System/Product
https://www.garlic.com/~lynn/2001c.html#73 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001d.html#19 [Newbie] Authentication vs. Authorisation?
https://www.garlic.com/~lynn/2001d.html#20 What is PKI?
https://www.garlic.com/~lynn/2001d.html#21 What is PKI?
https://www.garlic.com/~lynn/2001d.html#51 OT Re: A beautiful morning in AFM.
https://www.garlic.com/~lynn/2001d.html#52 OT Re: A beautiful morning in AFM.
https://www.garlic.com/~lynn/2001d.html#53 April Fools Day
https://www.garlic.com/~lynn/2001d.html#62 OT Re: A beautiful morning in AFM.
https://www.garlic.com/~lynn/2001d.html#73 Rational basis for password policy?
https://www.garlic.com/~lynn/2001e.html#32 Blame it all on Microsoft
https://www.garlic.com/~lynn/2001e.html#52 Pre ARPAnet email?
https://www.garlic.com/~lynn/2001e.html#81 Passwords
https://www.garlic.com/~lynn/2001f.html#24 Question about credit card number
https://www.garlic.com/~lynn/2001f.html#25 Question about credit card number
https://www.garlic.com/~lynn/2001f.html#31 Remove the name from credit cards!
https://www.garlic.com/~lynn/2001f.html#52 any 70's era supercomputers that ran as slow as today's supercomputers?
https://www.garlic.com/~lynn/2001f.html#54 any 70's era supercomputers that ran as slow as today's supercomputers?
https://www.garlic.com/~lynn/2001f.html#55 any 70's era supercomputers that ran as slow as today's supercomputers?
https://www.garlic.com/~lynn/2001f.html#57 any 70's era supercomputers that ran as slow as today's supercomputers?
https://www.garlic.com/~lynn/2001g.html#0 FREE X.509 Certificates
https://www.garlic.com/~lynn/2001g.html#1 distributed authentication
https://www.garlic.com/~lynn/2001g.html#11 FREE X.509 Certificates
https://www.garlic.com/~lynn/2001g.html#29 any 70's era supercomputers that ran as slow as today's supercomputers?
https://www.garlic.com/~lynn/2001g.html#38 distributed authentication
https://www.garlic.com/~lynn/2001g.html#40 Self-Signed Certificate
https://www.garlic.com/~lynn/2001g.html#63 PKI/Digital signature doesn't work
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: VM: checking some myths. Newsgroups: comp.os.vms,comp.unix.tru64,comp.arch Date: Wed, 25 Jul 2001 22:16:45 GMThack@watson.ibm.com (hack) writes:
There was a standard instant message between the terminals belonging to two different virtual machines.q
On the same machine, the straight forward messages allowed instant person-to-person communication/message. SMSG supported programmatically interception of instant messages allowed various automated infrastructure, automated operator, tape mounting services, etc.
The support by VNET of SMSG allowed the "instant messaging" to be expanded to the network environment (i.e. VNET had an immediate message communication, separate from normal file & data ... which would support this extending instant messaging to a multiple machine, network environment).
instant messaging between two real people in two virtual machines instant messaging between one real person and a program in two virtual machines instant messaging between two programs in two virtual machines
instant messaging between one real person and VNET in two virtual machines ... with VNET acting as transport to different real machine ... where it is a real person at the other end
instant messaging between one real person and VNET in two virtual machines ... with VNET acting as transport to different real machine ... where it is a program at the other end
instant messaging between one program and VNET in two virtual machines ... with VNET acting as transport to different real machine ... where it is a program at the other end
and of course, VNET could be used between two parties on the same machine.
The summer of 1980, the author of REXX did a multi-palyer, distributed spacewar implementation using the SMSG mechanism; on the same machine, spacewar distributed messages directly ... and this could operate in a multi (real) machine environment using VNET's support of instant messaging.
Now the case was the spacewar game running in one virtual machine, was it actually interacting with a real person ... or was it a program simulating a real person.
random refs:
https://www.garlic.com/~lynn/2001f.html#10
https://www.garlic.com/~lynn/2001f.html#12
https://www.garlic.com/~lynn/2001f.html#14
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: VM: checking some myths. Newsgroups: comp.os.vms,comp.unix.tru64,comp.arch Date: Wed, 25 Jul 2001 23:45:48 GMTAaron Sawyer writes:
misc. online history from Melinda Varian
https://www.leeandmelindavarian.com/Melinda/
https://www.leeandmelindavarian.com/Melinda#VMHist
CSC had 30 or so people. It originated CP/40, CP/67, CMS, VNET, GML, compare&swap, various performance tuning, early capacity planning and misc. other things. compare&swap turns out to be the initials of the primary person at CSC responsible. GML (which spawned the whole genre of markup languages, SGML, HTML, XML, etc) is the letter of the lastnames of three people involved (i.e. generalized markup language was chosen to match their initials).
The internal "VNET" network was consistently larger than the arpa/internet until about 1985. I claim one of the reasons is that VNET essentially contained a "gateway" function allowing the interconnection of networks ... the "internet" didn't really get that capability until Jan. 1st, 1983. random refs:
https://www.garlic.com/~lynn/internet.htm
I was at a university on the west coast and some people came out and installed CP/67 in January of 1968 (third CP/67 installation after CSC and Lincoln Labs).
misc. following have some refs:
https://www.garlic.com/~lynn/submain.html#360pcm
https://www.garlic.com/~lynn/subtopic.html#fairshare
https://www.garlic.com/~lynn/subtopic.html#wsclock
https://www.garlic.com/~lynn/submain.html#360mcode
https://www.garlic.com/~lynn/subtopic.html#smp
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: VM: checking some myths. Newsgroups: comp.os.vms,comp.unix.tru64,comp.arch,alt.folklore.computers Date: Thu, 26 Jul 2001 07:31:37 GMT"mulp" writes:
>40 1410 (I don't remember that it also did 1401) 1410 or 1401 - 2 different products >50 1410, maybe 7040 1410 or 7070 (2 distinct products, you couldn't get both!) >65 709x and IIRC also 705/7080aka 360/m40 had microcode emulation to emulate earlier machines. note also that 360/m30 included microcode emulation for 1401. Typically, there was a switch on the front panel someplace that switched between 360 hardware (emulation) and some other hardware emulation.
7070 includes 7074, and 1410 includes 7010.
I don't know anybody claiming such implementations were virtual machines.
note reference in [26} below in extract from melinda's paper at PUCC
https://www.leeandmelindavarian.com/Melinda/
https://www.leeandmelindavarian.com/Melinda#VMHist
C. CP-40 and CMS
In the Fall of 1964, the folks in Cambridge suddenly found themselves
in the position of having to cast about for something to do next. A
few months earlier, before Project MAC was lost to GE, they had been
expecting to be in the center of IBM's time-sharing activities. Now,
inside IBM, ''time-sharing'' meant TSS, and that was being developed
in New York State. However, Rasmussen was very dubious about the
prospects for TSS and knew that IBM must have a credible time-sharing
system for the S/360. He decided to go ahead with his plan to build a
time-sharing system, with Bob Creasy leading what became known as the
CP-40 Project.
The official objectives of the CP-40 Project were the following:
1. The development of means for obtaining data on the operational
characteristics of both systems and application programs;
2. The analysis of this data with a view toward more efficient machine
structures and programming techniques, particularly for use in
interactive systems;
3. The provision of a multiple-console computer system for the
Center's computing requirements; and
4. The investigation of the use of associative memories in the control
of multi-user systems.[22]
The project's real purpose was to build a time-sharing system, but the
other objectives were genuine, too, and they were always emphasized in
order to disguise the project's ''counter-strategic'' aspects.
Rasmussen consistently portrayed CP-40 as a research project to ''help
the troops in Poughkeepsie'' by studying the behavior of programs and
systems in a virtual memory environment. In fact, for some members of
the CP-40 team, this was the most interesting part of the project,
because they were concerned about the unknowns in the path IBM was
taking. TSS was to be a virtual memory system, but not much was really
known about virtual memory systems. Les Comeau has written: Since the
early time-sharing experiments used base and limit registers for
relocation, they had to roll in and roll out entire programs when
switching users....Virtual memory, with its paging technique, was
expected to reduce significantly the time spent waiting for an
exchange of user programs.
------------------------------------------------------------
31 or 32 bits. We eventually voted and recommended 31 bits. We also
discussed the design of the relocation register and had some heated
discussions with the IBM team. The Inner Six met with IBM
representatives behind closed doors at a SHARE meeting. We six sites
discussed various features of TSS and made recommendations to
IBM. This was the beginning of the SHARE TSS Project.'' (J.M. Winett,
private communication, 1990.)
22 R.J. Adair, R.U. Bayles, L.W. Comeau, and R.J. Creasy, A Virtual
Machine System for the 360/40, IBM Cambridge Scientific Center Report
320-2007, Cambridge, Mass., May, 1966.
------------------------------------------------------------
What was most significant was that the commitment to virtual memory
was backed with no successful experience. A system of that period that
had implemented virtual memory was the Ferranti Atlas computer, and
that was known not to be working well. What was frightening is that
nobody who was setting this virtual memory direction at IBM knew why
Atlas didn't work.[23] Creasy and Comeau spent the last week of
1964[24] joyfully brainstorming the design of CP-40, a new kind of
operating system, a system that would provide not only virtual memory,
but also virtual machines.[25] They had seen that the cleanest way to
protect users from one another (and to preserve compatibility as the
new System/360 design evolved) was to use the System/360 Principles of
Operations manual to describe the user's interface to the Control
Program. Each user would have a complete System/360 virtual machine
(which at first was called a ''pseudo-machine'').[26] The idea of a
virtual machine system had been bruited about a bit before then, but
it had never really been implemented. The idea of a virtual S/360 was
new, but what was really important about their concept was that nobody
until then had seen how elegantly a virtual machine system could be
built, with really very minor hardware changes and not much software.
------------------------------------------------------------
23 L.W. Comeau, ''CP-40, the Origin of VM/370'', Proceedings of SEAS
AM82, September, 1982, p. 40.
24 Creasy had decided to build CP-40 while riding on the MTA. ''I
launched the effort between Xmas 1964 and year's end, after making the
decision while on an MTA bus from Arlington to Cambridge. It was a
Tuesday, I believe.'' (R.J. Creasy, private communication, 1989.)
25 R.J. Creasy, General Description of the Research Time-Sharing
System with Special Emphasis on the Control Program, IBM Cambridge
SR&D Center Research Time-Sharing Computer Memorandum 1, Cambridge,
Mass., January 29, 1965. L.W. Comeau, The Philosophy and Logical
Structure of the Control Program, IBM Cambridge SR&D Center Research
Time-Sharing Computer Memorandum 2, Cambridge, Mass., April 15, 1965.
26 For the first few weeks, the CSC people referred to their concept
as a ''pseudo-machine'', but soon adopted the term ''virtual machine''
after hearing Dave Sayre at IBM Research use it to describe a system
he had built for a modified 7044. Sayre's M44 system was similar to
CP-40, except for the crucial difference of not providing a control
program interface that exactly duplicated a real machine. The CP-40
team credited Sayre with having ''implanted the idea that the virtual
machine concept is not necessarily less efficient than more
conventional approaches.'' (L. Talkington, ''A Good Idea and Still
Growing'', White Plains Development Center Newsletter, vol. 2, no. 3,
March, 1969.) ''The system built by Dave Sayre and Bob Nelson was
about as much of a virtual machine system as CTSS---which is to say
that it was close enough to a virtual machine system to show that
'close enough' did not count. I never heard a more eloquent argument
for virtual machines than from Dave Sayre.'' (R.J. Creasy, private
communication, 1990.)
27 ''Dick Bayles was not only a great programmer, he was also the
fastest typist I have ever seen.'' (W.J. Doherty, private
communication, 1990.) ''When Dick Bayles sat down [at a keypunch], he
wrote code as fast as it could punch cards. Yes, the machine was
slower than Bayles composing code on the fly.'' (R.J. Creasy, private
communication, 1989.)
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: checking some myths. Newsgroups: comp.os.vms,comp.unix.tru64,comp.arch,alt.folklore.computers Date: Thu, 26 Jul 2001 07:51:29 GMT"Stephen Fuld" writes:
The other characteristic was that it was much more of a microkernel with clean division represented by the virtual machine "line". As a result, it was frequently much easier taks to follow a complete control flow from end-to-end and optimize it (because of the simplicity, something that is frequently much more difficult in kernels that have less clearly defined separation of function).
While it was obvious that a straight forward deployment of another operating system in a VM virtual machine ... resulted in delta performance decrease because of the additional VM kernel pathlength, there was numerous instances where the configuration operations of another virtual machine could be selected in such away that it traded off internal management/function for relying on the VM kernel to provide that management/function. Sometimes the performance improvement was so significant, that not only did it offset other VM kernel introduced overhead ... but actually saw significant performance thruput over running the operating system w/o VM.
The other characteristic was that the CMS interactive environment (which made significant leverage of such trade-offs) would show significantly better interactive performance compared to other IBM "interactive" offerings.
one of these were the famous CERN MVS/TSO VM/CMS benchmark
https://www.garlic.com/~lynn/98.html#28
https://www.garlic.com/~lynn/2000f.html#61
https://www.garlic.com/~lynn/2001f.html#49
I was fortunate enuf to participate in some of the activity
https://www.garlic.com/~lynn/2001e.html#45
https://www.garlic.com/~lynn/2001f.html#62
https://www.garlic.com/~lynn/subtopic.html#wsclock
https://www.garlic.com/~lynn/subtopic.html#fairshare
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: checking some myths. Newsgroups: comp.os.vms,comp.unix.tru64,comp.arch,alt.folklore.computers Date: Thu, 26 Jul 2001 08:05:36 GMTAnne & Lynn Wheeler writes:
The original CP/67 kernel CPU consumption to execute the referenced OS MFT14 virtual machine was 856-322 or 534 cpu seconds. By August, I had rewritten several portions of the kernel and reduced the total CP/67 kernel CPU consumption to 435-322 or 113 cpu seconds for an overall reduction of a factor of five times (I had also replaced the page replacement algorithm with a clock-like algorithm, implemented original fair share scheduling, and done misc. other improvements).
OS Performance Studies With CP/67 OS MFT 14, OS nucleus with 100 entry trace table, 105 record in-core job queue, default IBM in-core modules, nucleus total size 82k, job scheduler 100k. HASP 118k Hasp with 1/3 2314 track buffering Job Stream 25 FORTG compiles Bare machine Time to run: 322 sec. (12.9 sec/job) times Time to run just JCL for above: 292 sec. (11.7 sec/job) Orig. CP/67 Time to run: 856 sec. (34.2 sec/job) times Time to run just JCL for above: 787 sec. (31.5 sec/job) Ratio CP/67 to bare machine 2.65 Run FORTG compiles 2.7 to run just JCL 2.2 Total time less JCL time 1 user, OS on with all of core available less CP/67 program. Note: No jobs run with the original CP/67 had ratio times higher than the job scheduler. For example, the same 25 jobs were run under WATFOR, where they were compiled and executed. Bare machine time was 20 secs., CP/67 time was 44 sec. or a ratio of 2.2. Subtracting 11.7 sec. for bare machine time and 31.5 for CP/67 time, a ratio for WATFOR less job scheduler time was 1.5. I hand built the OS MFT system with careful ordering of cards in the stage-two sysgen to optimize placement of data sets, and members in SYS1.LINKLIB and SYS1.SVCLIB. MODIFIED CP/67 OS run with one other user. The other user was not active, was just available to control amount of core used by OS. The following table gives core available to OS, execution time and execution time ratio for the 25 FORTG compiles. CORE (pages) OS with Hasp OS w/o HASP 104 1.35 (435 sec) 94 1.37 (445 sec) 74 1.38 (450 sec) 1.49 (480 sec) 64 1.89 (610 sec) 1.49 (480 sec) 54 2.32 (750 sec) 1.81 (585 sec) 44 4.53 (1450 sec) 1.96 (630 sec)--
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: VM: checking some myths. Newsgroups: comp.os.vms,comp.unix.tru64,comp.arch,alt.folklore.computers Date: Thu, 26 Jul 2001 08:39:26 GMThack@watson.ibm.com (hack) writes:
one of the things that we did in HSDT was implement several asynchronous functions for VNET so we could start seeing it drive multiple full-duplex T1 links at media thruput.
In HSDT, we also got the mainframe TCP/IP thruput up from 44kbybtes/sec to hardware channel speed.
random refs:
https://www.garlic.com/~lynn/subnetwork.html#hsdt
https://www.garlic.com/~lynn/subnetwork.html#xtphsp
https://www.garlic.com/~lynn/internet.htm
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Installing Fortran Newsgroups: alt.folklore.computers Date: Sun, 29 Jul 2001 12:35:47 GMTab528@FreeNet.Carleton.CA (Heinz W. Wiggeshoff) writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: IBM 9020 FAA/ATC Systems from 1960's Newsgroups: alt.folklore.computers Date: Mon, 30 Jul 2001 12:24:07 GMTNick Spalding writes:
I did alta-vista search on 9020 and came up with a couple hits.
http://www.faa.gov/apa/speeches/aoa/FWINGS.htm
https://web.archive.org/web/20020417133633/http://www.faa.gov/apa/speeches/aoa/FWINGS.htm
Automation of en route ATC began with the installation of IBM's
prototype 9020 system at the Jacksonville Center in 1967. Designed to
provide automated flight data processing and radar tracking at all en
route centers and major terminals, this was the most complex computer
application ever undertaken up to that time. Its half million commands
required more than twice the amount of memory originally planned, a
complication which caused the project to fall behind schedule. The
installation at all 22 en route centers was not completed until the
end of the 1970s.
http://www.aero-space.nasa.gov/library/ch1.htm
https://web.archive.org/web/20020220023313/http://www.aero-space.nasa.gov/library/ch1.htm
Automation of en route ATC began with the installation of IBM's
prototype 9020 system at the Jacksonville Center in 1967. The system
was designed to provide automated flight data processing and radar
tracking at all en route centers and major terminals. The system was
delivered behind schedule, which created significant frustration
within FAA, the aviation community and IBM. The system would not be in
place at all 22 en route centers until the end of the 1970s. However,
indicative of the complex nature of automating the en route
environment, the 9020 system proved to be the most complex computer
application in the world at the time, with more than half a million
commands. When the program was completed, IBM had more than doubled
the amount of memory the company had first thought the program would
require.
...
http://api.hq.faa.gov/96sp-fin.htm
http://catless.ncl.ac.uk/Risks/5.67.html
http://home.columbus.rr.com/lusch/index.html
HOCSR (Host and Oceanic Computer Replacement System)
http://www.faa.gov/aua/ipt_prod/enroute/hocsrfct.htm
https://web.archive.org/web/20011221011933/http://www.faa.gov/aua/ipt_prod/enroute/hocsrfct.htm
A system-wide upgrade completed in 1999 at the 20 Air Route Traffic
Control Centers. It is the heart of the system in that it receives,
processes, coordinates, distributes and tracks information on aircraft
movements throughout domestic and oceanic airspace. It replaced the
HOST computers that ten years earlier had replaced the old IBM 9020
computers. [Back]
HOST
A system-wide computer upgrade completed in 1989 at the 20 Air Route
Traffic Control Centers. HOST replaced the old IBM 9020 computers. It has
since been superseded by HOCSR. [Back]
>
http://www.faa.gov/aua/ipt_prod/enroute/hocsrfct.htm
https://web.archive.org/web/20011221011933/http://www.faa.gov/aua/ipt_prod/enroute/hocsrfct.htm
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: D Newsgroups: alt.folklore.computers Date: Mon, 30 Jul 2001 13:23:30 GMTcb@df.lth.se (Christian Brunschen) writes:
as an aside, i finally got around to updating my security glossary with glosary from Infromation Assurance Technical Framework release 3.
https://www.garlic.com/~lynn/secure.htm
notes on source of terms
https://www.garlic.com/~lynn/index.html#glosnote
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: IBM 9020 FAA/ATC Systems from 1960's Newsgroups: alt.folklore.computers Date: Mon, 30 Jul 2001 17:22:19 GMTjcmorris@mitre.org (Joe Morris) writes:
my understanding was that the 65 & 67 were originally going to be 360m60 and 360m62 ... but somewhere along the line, there was an upgrade to the memory technology (to 750ns) and the numbers got changed.
as an aside, the work at cambridge on fine grain locking with cp/67 directly led to compare&swap instruction in 370 (in fact, "CAS" are the person's initials that did most of the work at cambridge, and the trick was to come up with a mnemonic that was his initials; it got modified to CS & CDS tho).
random refs:
https://www.garlic.com/~lynn/subtopic.html#smp
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: checking some myths. Newsgroups: comp.os.vms,comp.unix.tru64,comp.arch,alt.folklore.computers Date: Mon, 30 Jul 2001 18:02:02 GMTnmm1@cus.cam.ac.uk (Nick Maclaren) writes:
The benchmarking attempting to choose workloads along the edge of the "normal" observed operational envelopes, random points withing the envelope and some number of operations that were way outside any normal envelope ... say saturating a couple fixed-head paging devices (hundreds of pages/sec), with huge queues and average service time of 1second.
These outside the envelope benchmarks tended to precipitate zombie user conditions and numerous timing failures. In order to eliminate all such cases (from the normal system), I had to totally rewrite the system serialization primitives in order to eliminate all possible occurances of zombies & kernel failures because of various asynchronous timing problems.
random refs:
https://www.garlic.com/~lynn/94.html#52
https://www.garlic.com/~lynn/2001c.html#13
https://www.garlic.com/~lynn/2001e.html#45
https://www.garlic.com/~lynn/2001f.html#56
https://www.garlic.com/~lynn/subtopic.html#fairshare
and of course, my favorite "envelope" subject:
https://www.garlic.com/~lynn/subboyd.html#boyd
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: checking some myths. Newsgroups: comp.os.vms,comp.unix.tru64,comp.arch,alt.folklore.computers Date: Mon, 30 Jul 2001 17:47:11 GMTGreg Pfister writes:
three levels of CP/67 under which ran CMS. standard cp/67 running on the real hardware in an "open" environment (university students & others on effectively a public access machine),
then a modified CP/67 running in "360m67" mode ... but providing 370 virtual machines (primarily relocation tables different structure between 360m67 & 370), and then a further modified CP/67 running in "370" mode ... which then provided 370 virtual machines (running CMS) ... aka
real 360m67 cp/67 standard 360 & 360/67 virtual machines CP/67 modified to provide 370 virtual machine 370 "R" virtual machines CP/67 modified to run on 370 w/virtual memory 370 "R" virtual machines CMSThis was about two years before virtual memory was available on 370 (and possibly a year before 370 engineering models with virtual memory were available). Issue was to try and obscure the fact that development for unannounced (or even unavailable) products was going on.
while there was quite a bit of use of CP/67 & VM/370 inside the corporation for the testing of new operating systems ... in terms of CPU cycles, probably the biggest use was straight interactive computing (edits, compiles, non-operating system testing, email, documents, GML, etc). Part of this give rise to the largest network in the world (larger than arpanet until around '85)
'83 ... had nearly 1000 mainframe nodes at point when arpanet was about
255 total nodes. random refs:
https://www.garlic.com/~lynn/99.html#112
there was another way of getting machine time. the disk engineering labs were doing all their development in a stand-alone environment (MVS with a single "test-cell" MTBF was on the order of 15 minutes). I rewrote i/o supervisor so it wouldn't fail & they could operate 6-12 test-cells concurrently. The priority list on processors ... was that typicall as soon as the CPU/processors engineers had the 2nd one running; it was made available to the disk engineering labs for their testing.
random refs:
https://www.garlic.com/~lynn/2000d.html#0
https://www.garlic.com/~lynn/subtopic.html#disk
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: physical vs. virtual addresses Newsgroups: comp.arch Date: Mon, 30 Jul 2001 18:22:37 GMThack@watson.ibm.com (hack) writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: checking some myths. Newsgroups: comp.os.vms,comp.unix.tru64,comp.arch,alt.folklore.computers Date: Mon, 30 Jul 2001 18:37:59 GMTAnne & Lynn Wheeler writes:
also some discussion at
https://www.garlic.com/~lynn/internet.htm
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Intel's new GBE card? Newsgroups: comp.arch.storage Date: Mon, 30 Jul 2001 19:21:19 GMTRick Jones writes:
the trick at the time was to come as close as possible to saturating 100mbit FDDI medium w/o disolving the CPU (the time since then, the CPUs have gotten significantly faster)
random refs:
https://www.garlic.com/~lynn/99.html#0 Early tcp development?
https://www.garlic.com/~lynn/99.html#164 Uptime (was Re: Q: S/390 on PowerPC?)
https://www.garlic.com/~lynn/99.html#207 Life-Advancing Work of Timothy Berners-Lee
https://www.garlic.com/~lynn/2000b.html#5 "Mainframe" Usage
https://www.garlic.com/~lynn/2000c.html#59 Does the word "mainframe" still have a meaning?
https://www.garlic.com/~lynn/2001b.html#11 Review of the Intel C/C++ compiler for Windows
https://www.garlic.com/~lynn/2001b.html#57 I am fed up!
https://www.garlic.com/~lynn/2001e.html#24 Pre ARPAnet email?
https://www.garlic.com/~lynn/2001e.html#32 Blame it all on Microsoft
https://www.garlic.com/~lynn/2001e.html#34 Blame it all on Microsoft
https://www.garlic.com/~lynn/2001h.html#13 VM: checking some myths.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Redhat 7.2? Newsgroups: comp.os.linux.questions,comp.os.linux.help,linux.redhat,comp.os.linux.setup Date: Mon, 30 Jul 2001 22:15:23 GMTI was in frankfurt two weeks ago ... and saw (german) Redhat 7.2 for sale in window of store (about half-block down side street off main shopping mall).
Is this something that specific to germany?
I've not seen it in any stores in the US yet?
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: "Hollerith" card code to EBCDIC conversion Newsgroups: alt.folklore.computers Date: Mon, 30 Jul 2001 23:48:35 GMTEric Fischer writes:
I had a job to rewrite the 1401 unit record (ur<->tape) front-end for 709 to run on 360m30. While I was writing the program, they would switch the machine back & forth between 1401-mode and running other 360 programs (and testing my program).
Cards could be either binary or bcd. If they were binary, you would read with column-binary command which would place 80 columns of data into 160 bytes (effectively two 6-bit values per column mapped into two 8-bit bytes). If it was BCD ... then it was just BCD read into one byte.
"greencard" gives the mapping of bit patterns to punch holes for BCDIC & EBCDIC (as well as mapping to 7track tape). The issue wasn't so much what the bit pattern was ... but what character the bit pattern represented depending on whether you were treating it as BCDIC or EBCDIC ... aka punch 0-6-8 comes in as hex "6E" ... but is backslash in BCDIC and greater-than in EBCDIC.
random refs:
https://www.garlic.com/~lynn/93.html#15 unit record & other controllers
https://www.garlic.com/~lynn/93.html#17 unit record & other controllers
https://www.garlic.com/~lynn/93.html#23 MTS & LLMPS?
https://www.garlic.com/~lynn/94.html#53 How Do the Old Mainframes
https://www.garlic.com/~lynn/95.html#4 1401 overlap instructions
https://www.garlic.com/~lynn/96.html#20 1401 series emulation still running?
https://www.garlic.com/~lynn/97.html#7 Did 1401 have time?
https://www.garlic.com/~lynn/97.html#21 IBM 1401's claim to fame
https://www.garlic.com/~lynn/98.html#9 Old Vintage Operating Systems
https://www.garlic.com/~lynn/98.html#14 S/360 operating systems geneaology
https://www.garlic.com/~lynn/98.html#53 punch card editing, take 2
https://www.garlic.com/~lynn/98.html#55 Multics
https://www.garlic.com/~lynn/99.html#13 Old Computers
https://www.garlic.com/~lynn/99.html#59 Living legends
https://www.garlic.com/~lynn/99.html#86 1401 Wordmark?
https://www.garlic.com/~lynn/99.html#87 1401 Wordmark?
https://www.garlic.com/~lynn/99.html#93 MVS vs HASP vs JES (was 2821)
https://www.garlic.com/~lynn/99.html#130 early hardware
https://www.garlic.com/~lynn/99.html#137 Mainframe emulation
https://www.garlic.com/~lynn/99.html#155 checks (was S/390 on PowerPC?)
https://www.garlic.com/~lynn/99.html#194 1403 printer on a 1401?
https://www.garlic.com/~lynn/2000.html#55 OS/360 JCL: The DD statement and DCBs
https://www.garlic.com/~lynn/2000.html#79 Mainframe operating systems
https://www.garlic.com/~lynn/2000b.html#6 ascii to binary
https://www.garlic.com/~lynn/2000c.html#11 IBM 1460
https://www.garlic.com/~lynn/2000d.html#34 Assembly language formatting on IBM systems
https://www.garlic.com/~lynn/2001.html#11 IBM 1142 reader/punch (Re: First video terminal?)
https://www.garlic.com/~lynn/2001.html#16 Sv: IBM 1142 reader/punch (Re: First video terminal?)
https://www.garlic.com/~lynn/2001.html#17 IBM 1142 reader/punch (Re: First video terminal?)
https://www.garlic.com/~lynn/2001b.html#20 HELP
https://www.garlic.com/~lynn/2001b.html#22 HELP
https://www.garlic.com/~lynn/2001b.html#27 HELP
https://www.garlic.com/~lynn/2001c.html#15 OS/360 (was LINUS for S/390)
https://www.garlic.com/~lynn/2001c.html#22 OS for IBM 370
https://www.garlic.com/~lynn/2001c.html#87 "Bootstrap"
https://www.garlic.com/~lynn/2001e.html#13 High Level Language Systems was Re: computer books/authors (Re: FA:
https://www.garlic.com/~lynn/2001f.html#5 Emulation (was Re: Object code (was: Source code - couldn't resist compiling it :-))
https://www.garlic.com/~lynn/2001f.html#36 Ancient computer humor - The Condemned
https://www.garlic.com/~lynn/2001f.html#37 Ancient computer humor - Memory
https://www.garlic.com/~lynn/2001f.html#38 Ancient computer humor - Gen A Sys
https://www.garlic.com/~lynn/2001f.html#39 Ancient computer humor - DEC WARS
https://www.garlic.com/~lynn/2001g.html#22 Golden Era of Compilers
https://www.garlic.com/~lynn/2001g.html#27 Golden Era of Compilers
https://www.garlic.com/~lynn/2001h.html#10 VM: checking some myths.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: earthlink timing out nntp connections Newsgroups: gnu.emacs.gnus Date: Tue, 31 Jul 2001 11:32:11 GMTwithin the last week or so, earthlink appears to have started timing out nntp connections after only something like 30-60 seconds. if you spend too long reading an article ... the connection has timed out before you move on to the next article ... or if you are typing a reply. it plays quite a bit of havok with gnus 5.8.8.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: TECO Critique Newsgroups: alt.folklore.computers Date: Tue, 31 Jul 2001 12:21:37 GMTjmfbahciv writes:
demand paging typically waits for a page-fault at a time and does a/one page block transfer. there are various kinds of page replacement algorithms associated with this. paging also has to do with virtual memory support ... which page faults & demand paging can be a part of, although there has been some number of systems that are simply used for memory mapping (like overcoming memory fragmentation problems).
swapping tends to be a task management oriented event. CTSS would swap/roll-out whole task and then swap/roll-in a different task.
various optimizations are possible with swapping ... and can even work with a demand paging system. at some task deactivation event all pages for a task are written out at one time (and the pages with reference bit on are remembered), later when the task is re-activated all the referenced pages are read back in at one time. between task activation and deactivation ... the system could manage the task with demand paging.
boeing huntsville modified MVT for just virtual address mapping to address a (contiguous address) memory fragmentation problem they had (w/o any page faults, or demand paging or swapping).
https://www.garlic.com/~lynn/2001.html#14
there are intermediate situations between demand paging and task swapping ... like what was done in vm/hpo in the early 80s where "swap" was managed in groups of blocks of ten pages (rather than all pages). on deactivation/outgoing ... pages were clustered in groups of ten pages for writing. on activation, a hybrid demand paging/swap occurred where a page fault for a page this is part of a group would bring in all ten pages in that group.
https://www.garlic.com/~lynn/2001h.html#20
& something from a recent mailing list
> What is footnote 23, or more directly, where can I read more
>about Atlas's VM problems. Lord knows I have plenty of experience
>(as a user) with badly implemented VM, but what was the "killer"?
I don't know specifically what Atlas's problem was. I know that the CP/67 support of demand paging wasn't very good when I first saw it in Jan. 1968, however, TSS/360's was even worse (the university that I was at had been doing TSS tests on & off during '67 & '68, primary reason that it was investigating CP/67 was because TSS performance was so abysmal).
There were actually a couple problems
1) page replacement algorithm
2) path length
3) disk/drum (fixed-head disk) I/O optimization
4) disk/drum migration
5) thrashing controls.
CP/67 didn't have #4 ... and the rest was very poor.
TSS/360 had something #4 ... but it actually caused more problems than it solved. A task that woke up or made it out of the thrashing control list ... got all its pages moved from 2311 (moveable arm disk) to 2301 (moveable arm disk) before actually executing. When it went idle (say between simple edit commands), all its pages were swept from the 2301 back to 2311. This happened even if there was no contention for space on the 2301. It wasn't optimized for relying on pages that might be laying around in real memory.
With regard to CP/67, I rewrote most of the code while also doing the pathlength optimization for running OS/360.
I created the first "clock" replacement algorithm, my own method of estimating "working set" for page thrashing controls, very short pathlength implementation, ordered seek queuing for normal disks (help both page i/o as well as disk i/o), and some 2301 optimization (as well as early form of my dynamic adaptive feedback scheduler including "fairshare"). The "clock" replacement algorithm, I later refined after graduation when I joined cambridge scientific center in 1970.
There was a "working set" paper published in ACM sometime '68 ... about a particular kind of page replacement and thrashing controls where were significantly worse than what I had implemented.
Nearly 15 years later (after I had first implemented clock) a stanford Phd thesis was done on "clock" replacement and the "working set" author strenuously objected. In a very round-about trail ... I was finally asked to provide supporting evidence (so the guy could get his Phd). There had been a paper in the early '70s by the Grenoble Scientific Center that had modified CP/67 with an "exact" implementation of Denning's definition and benchmarks published in an ACM article running with 30 users on a 1mbyte 360/67 (about 155 pages after fixed kernel requirements). The performance (for the same workload mix) was about the same I was getting at the same time on a 768k 360/67 (104 pages after fixed kernel requirements) with 75 users.
random refs:
https://www.garlic.com/~lynn/94.html#49
https://www.garlic.com/~lynn/2001g.html#29
https://www.garlic.com/~lynn/subtopic.html#wsclock
https://www.garlic.com/~lynn/subtopic.html#fairshare
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: TECO Critique Newsgroups: alt.folklore.computers Date: Tue, 31 Jul 2001 13:08:38 GMTAnne & Lynn Wheeler writes:
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: checking some myths. Newsgroups: comp.os.vms,comp.unix.tru64,comp.arch,alt.folklore.computers Date: Tue, 31 Jul 2001 13:48:55 GMTjcmorris@mitre.org (Joe Morris) writes:
basically the "acceptance" test for 3880 was that it was within +/-10% of the 3830 performance. the problem was that while the 3880 supporting data streaming 3mbyte transfers ... it did it with custom hardware for the data path and a jib' microcontroller for the control path (the 3830 had been all a fast horizontal microcoded engine). The jib' was taking quite a bit longer to do clean-up after an operation finished ... so to meet the performance criteria ... they started presenting operation finished interrupt "early" (before the jib' had finished all its clean-up). This worked OK for the acceptance test which was with a one-pack/drive, single task VS1 system.
The problem was the weekend the product test lab replaced a production 16-drive 3830 configuration with one of the 3880 controllers. I got the call bright and early monday morning to come fix a operating system problem (performance had all gone to $%#!). Finally was able to trace it back to the "new" 3880. Fortunately this was six months before first customer ship ... and allowed the engineers some time to make other adjustments to address the issues.
The problem was that with multiple drives (and high level of multitasking) on the same controller, there were frequently requests queued because of channel, controller, and/or device busy. When the controller signaled operation complete interrupt ... the operating system would immediately hit/redrive it with a queued request. Because the jib' had signaled "complete" early, it was actually still busy ... and so the redrive operation got a "control unit busy" response. The system then went off to do something else. Eventually, the jib' finished and because it had signaled a control unit busy condition, it then had to signal a control unit end interrupt. With this, the system then attempts to restart the redrive operation (which would typically succeed this time).
The extra operation and interrupts .... in addition to the increase in operation latency made things look like a 80-90% system degradation.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: checking some myths. Newsgroups: comp.os.vms,comp.unix.tru64,comp.arch,alt.folklore.computers Date: Tue, 31 Jul 2001 14:09:32 GMTjcmorris@mitre.org (Joe Morris) writes:
I joke at one point I was working first shift in research (bldg. 28), 2nd shift in GPD (disk engineering &test, bldg. 14&15), and 3rd shift in STL (on a project supporting IMS group, bldg. 90) with periodic visits to palo alto for hone (one street over from page mill).
random refs:
https://www.garlic.com/~lynn/subtopic.html#disk
https://www.garlic.com/~lynn/subtopic.html#hone
https://www.garlic.com/~lynn/subtopic.html#fairshare
https://www.garlic.com/~lynn/subtopic.html#wsclock
https://www.garlic.com/~lynn/subnetwork.html#hsdt
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: earthlink timing out nntp connections Newsgroups: gnu.emacs.gnus Date: Tue, 31 Jul 2001 14:19:33 GMTKai.Grossjohann@CS.Uni-Dortmund.DE (Kai Großjohann) writes:
If it looks like it is hanging forever, I can hang up the modem and that wakes gnus up and it says connection closed. I then reconnect the modem and do as above.
Once the modem is reconnected I can then go to the group buffer and do a get, which re-opens the connection, and then go to the posting buffer and attempt to repost it (however, if i delay a little ... say I'm off doing something in another window while waiting for all the stuff to get back together again ... I can find myself back in the original situation all over again).
doing a get in the group buffer seems the most reliable way of getting gnus to re-open the connection (other than quiting completely out and restarting).
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: earthlink timing out nntp connections Newsgroups: gnu.emacs.gnus Date: Tue, 31 Jul 2001 14:46:20 GMTKai.Grossjohann@CS.Uni-Dortmund.DE (Kai Großjohann) writes:
and possibly one out of 50? (maybe once a day) it just hangs and nothing I do brings it back ... and I eventually have to kill gnuemacs.
this started happening with gnuemacs 20.6.1 on nt4 with gnus 5.8.8 about 10 days ago ... couple days ago i upgraded to gnuemacs 20.7.1 and it hasn't made any difference.
previous posting wasn't a problem ... but i had to cycle the modem connection for this posting
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Wanted: pictures of green-screen text Newsgroups: alt.folklore.computers Date: Tue, 31 Jul 2001 15:01:20 GMTTim Shoppa writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: D Newsgroups: alt.folklore.computers Date: Wed, 01 Aug 2001 23:28:00 GMTftit@red.engin.umich.edu (Sergej Roytman) writes:
LPAR is a subset of the virtual machine function that allows a 390 to be partitioned into multiple logical machines (or logical partitions i.e. Logical PARtitions). You can dedicate resources to a logical partition as well as specify resources (like amount of cpu cycles). Within an LPAR you can run any mainframe operating system ... included the VM (or virtual machine) operating system. A test was done in such a configuration with a 41,000+ virtual machines each running a copy of Linux under a VM (virtual machine) operating system running in a "small" LPAR (i.e. configured with minimal resources)
a couple refs to linux 390
https://www.garlic.com/~lynn/99.html#191 Merced Processor Support at it again . . .
https://www.garlic.com/~lynn/2000b.html#62 VM (not VMS or Virtual Machine, the IBM sort)
https://www.garlic.com/~lynn/2000c.html#8 IBM Linux
https://www.garlic.com/~lynn/2001h.html#11 checking some myths.
--
Anne & Lynn Wheeler | lynn@garlic.com, https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: D Newsgroups: alt.folklore.computers Date: Thu, 02 Aug 2001 16:54:15 GMTjmfbahciv writes:
In a posting some time ago, I made the observation that the perception of the company was totally card based .... not because it didn't have time-sharing effort larger than possibly any other company out there ... but because its time-sharing effort was totally dwarfed by the batch/business/card business (aka if the company's time-sharing business had been some other company ... it would have been considered the largest time-sharing business around ... but because it was part of a company that had an even larger batch/business business ... the time-sharing effort has been somewhat discounted).
I joke at one time, that I personally made system distribution tapes for a number of internal installations ... at one time the number of those sites was larger than the total number of multics installations (the total number of internal sites was significantly larger than the number of sites that I directly distributed system tapes to, a number that on the internal network ... made the internal network the largest network in the world for the '70s and much of the '80s ... and the total number of internal sites was yet smaller still than the number of external customer sites).
random refs:
https://www.garlic.com/~lynn/subtopic.html#fairshare
https://www.garlic.com/~lynn/subtopic.html#wsclock
https://www.garlic.com/~lynn/subtopic.html#hone
https://www.garlic.com/~lynn/subtopic.html#smp
--
Anne & Lynn Wheeler | lynn@garlic.com, https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: D Newsgroups: alt.folklore.computers Date: Fri, 03 Aug 2001 13:28:07 GMTjmfbahciv writes:
--
Anne & Lynn Wheeler | lynn@garlic.com, https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: PKI/Digital signature doesn't work Newsgroups: sci.crypt Date: 03 Aug 2001 18:04:35 -0600Anne & Lynn Wheeler writes:
presss release ("digital signatures can secure ATM card payments on the Internet")
results
the report
includes the following from the above ...
The "real-world" viability of the proposed ANSI X9.59 standard concept
for electronic payments using public/private key pairs, which is also
known as Account Authority Digital Signature (AADS), was validated by
the ISAP Pilot results. These results demonstrate the feasibility of
using PKI without digital certificates, thereby minimizing
infrastructure requirements and costs for utilizing the ISAP process.
--
Anne & Lynn Wheeler | lynn@garlic.com, https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Credit Card # encryption Newsgroups: sci.crypt Date: Sun, 05 Aug 2001 19:59:49 GMT"Tor Rustad" writes:
For more discussion with regard to the SET aspects see:
https://www.garlic.com/~lynn/aepay7.htm#nonrep2
https://www.garlic.com/~lynn/aepay7.htm#nonrep3
https://www.garlic.com/~lynn/aepay7.htm#nonrep4
https://www.garlic.com/~lynn/aepay7.htm#nonrep5
https://www.garlic.com/~lynn/aepay7.htm#nonrep6
X9.59 over comes the problem of account-number harvesting for fraudulent purposes for all account-based payments (not just internet, not just point-of-sale, not just credit, not just debit, etc)
recent posting with regard to X9.59 (specific to debit/atm card implementation)
press release ("digital signatures can secure ATM card payments on the Internet")
results
the report
includes the following from the above ...
The "real-world" viability of the proposed ANSI X9.59 standard concept for electronic payments using public/private key pairs, which is also known as Account Authority Digital Signature (AADS), was validated by the ISAP Pilot results. These results demonstrate the feasibility of using PKI without digital certificates, thereby minimizing infrastructure requirements and costs for utilizing the ISAP process.
============================
The rfi for the above:
https://www.garlic.com/~lynn/nacharfi.htm
additional information on x9.59 and AADS
nacha web site
nacha organization
Welcome to NACHA
Welcome to the web site of NACHA - The Electronic Payments Association. Here you will find the latest information on the innovative and dynamic world of electronic payments.
Electronic payments of all kinds are used frequently by people, companies, and government agencies as a safe, reliable and convenient way to conduct business. Direct Deposit is used for payroll, travel and expense reimbursements, annuities and pensions, dividends, and government payments such as Social Security and Veterans benefits. Other types of electronic payments are frequently used for bill payments, retail purchases, Internet purchases, corporate payments and treasury management, and for the provision of food stamps and other government cash assistance.
NACHA is a not-for-profit trade association that develops operating rules and business practices for the Automated Clearing House (ACH) Network and for other areas of electronic payments. NACHA activities and initiatives facilitate the adoption of electronic payments in the areas of Internet commerce, electronic bill payment and presentment (EBPP), financial electronic data interchange (EDI), international payments, electronic checks, electronic benefits transfer (EBT) and student lending. We also promote the use of electronic payment products and services, such as Direct Deposit and Direct Payment.
NACHA represents more than 12,000 financial institutions through our network of regional ACH associations. We have over 600 members in our seven industry councils and corporate Affiliate Membership program.
I hope you will find this web site to be a valuable resource. Please come again!
--
Anne & Lynn Wheeler | lynn@garlic.com, https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Credit Card # encryption Newsgroups: sci.crypt Date: Mon, 06 Aug 2001 13:08:05 GMT"Tor Rustad" writes:
https://www.garlic.com/~lynn/aepay7.htm#nonrep5
http://lists.commerce.net/archives/ansi-epay/199905/msg00009.html
https://web.archive.org/web/20020225023945/http://lists.commerce.net/archives/ansi-epay/199905/msg00009.html
It was never even a minor purpose of the SET specification work to
eliminate credit card numbers from being known by the merchant.
The fact that the merchant does not see the account number on the way
to the payment gateway was touted by some as a benefit of the system,
but it was a side effect of the design. There was never a stated (or
even implied) requirement to hide the account number from the
merchant.
posted Fri, 7 May 1999, 14.59.11 -0700 to ansi-epay@lists.commerce.net by tlewis@xxxxxxxx
now, when I originally (long ago and far away) raised the issue that somebody could take advantage of the CC# getting to the payment gateway and not return it to the merchant ... but as stated, in the above quote as well as earlier .. "it was never even a minor purpose of SET specification work to eliminate the credit card numbers from being known by the merchant".
--
Anne & Lynn Wheeler | lynn@garlic.com, https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Credit Card # encryption Newsgroups: sci.crypt Date: Mon, 06 Aug 2001 13:14:44 GMTAnne & Lynn Wheeler writes:
--
Anne & Lynn Wheeler | lynn@garlic.com, https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Credit Card # encryption Newsgroups: sci.crypt Date: Mon, 06 Aug 2001 13:29:20 GMTAnne & Lynn Wheeler writes:
https://www.garlic.com/~lynn/aadsm5.htm#asrn2
https://www.garlic.com/~lynn/aadsm5.htm#asrn3
as well as being involved in some of the very early SET roll-outs (& SET payment gateway)
i could claim that it would be possible to start with either payment gateway and modify it to support X9.59 ... that would result in that particular gateway implementation having support for x9.59 ... but it wouldn't mean that the industry group SET specification supported the financial industry's X9.59 standard.
--
Anne & Lynn Wheeler | lynn@garlic.com, https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Credit Card # encryption Newsgroups: sci.crypt Date: Mon, 06 Aug 2001 14:30:39 GMT"Tor Rustad" writes:
you can pick up the pointer the X9.59 standards document from
& click on "ANSI Document" ... it is about 8 lines down ... and it is the URL at the end of the line (there are two URL pointers on that line, one "PASSED!!" and one "ANSI Document").
--
Anne & Lynn Wheeler | lynn@garlic.com, https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Credit Card # encryption Newsgroups: sci.crypt Date: Tue, 07 Aug 2001 15:04:57 GMT"Tor Rustad" writes:
I'm just passing on to you what they told me under relatively strong terms ... aka that not returning the CC# number to the merchant was not part of SET and never inteded to be part of SET (even if, as I raised in '96 it could be accomplished as an add-on to a SET implementation ... for some reason the people responsible for SET make a real big thing about not returning the CC# number to the merchant as not being something associated with SET).
--
Anne & Lynn Wheeler | lynn@garlic.com, https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Credit Card # encryption Newsgroups: sci.crypt Date: Tue, 07 Aug 2001 20:03:54 GMTAnne & Lynn Wheeler writes:
has there been changes to the SET specification since that time ... so that what has been claimed as not being part of SET and never even considered to be part of SET has changed in the last two years.
Part of the involvement in the set meetings during the 96 time-frame was having been involved in deploying the original (non-SET) payment gateway in the industry. we had learned a great deal of things about the operational characteristics ... which even had protocol implications from the standpoint of being able to provide diagnostic and servicability functions (early on we had a trouble ticket that got a NTF after three hrs ... in an industry that was expected first level problem determination to be accomplished within 5 minutes) ... and was somewhat successful in achieving enhancements from the standpoint of being able to provide operational production support.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Wired News :The Grid: The Next-Gen Internet? Newsgroups: bit.listserv.ibm-main Date: Mon, 06 Aug 2001 12:59:38 GMTslightly related ... we had high speed backbone running in the mid-80s that NSF looked at as being technology for NSFNET1/NSFNET2 ... the immediate precursor to the current internet. for one reason or another, we weren't allowed to bid ... but a NSF audit of what we were running concluded something to the effect that what we had running was at least five years ahead of the bid submissions (to build something new).
as an aside, we had mainframe nodes ... and at the time had implemented RFC 1044 that supported channel speed transfers (tested with 4341 connected to a cray at cray research) using only a modest amount of the mainframe cpu (by comparison, the base mainframe tcp/ip would just about saturate a 3090 processor at 44kbytes/sec).
one of the features supported (including in the mainframe nodes) was rate-based pacing ... something that is supposedly currently being worked on for "internet2".
random refs:
https://www.garlic.com/~lynn/internet.htm
https://www.garlic.com/~lynn/subnetwork.html#hsdt
https://www.garlic.com/~lynn/subindex.html#network
https://www.garlic.com/~lynn/subindx2.html#network
--
Anne & Lynn Wheeler | lynn@garlic.com, https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Article: Future Trends in Information Security Newsgroups: comp.security.misc Date: Tue, 07 Aug 2001 22:03:08 GMTjwmeritt@aol.com (JWMeritt) writes:
The Thread Between Risk Management and Information Security
https://www.garlic.com/~lynn/aepay3.htm#riskm
AADS & Risk Management, and Information Security Risk Management (ISRM)
https://www.garlic.com/~lynn/aepay3.htm#riskaads
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Whom Do Programmers Admire Now??? Newsgroups: alt.folklore.computers Date: Wed, 08 Aug 2001 12:44:26 GMTmrr@reistad.priv.no (Morten Reistad) writes:
the cp/40 genre also has the distinction of originating markup languages with GML gegatting SGML, HTML, XML, ECML, FSML, etc.
random refs:
https://www.leeandmelindavarian.com/Melinda/
https://www.leeandmelindavarian.com/Melinda#VMHist
https://www.garlic.com/~lynn/subtopic.html#fairshare
https://www.garlic.com/~lynn/subtopic.html#wsclock
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: ummmmm Newsgroups: alt.folklore.computers Date: Wed, 08 Aug 2001 20:05:36 GMTEric Sosman writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Whom Do Programmers Admire Now??? Newsgroups: alt.folklore.computers Date: Thu, 09 Aug 2001 00:13:05 GMTab528@FreeNet.Carleton.CA (Heinz W. Wiggeshoff) writes:
random refs:
https://www.garlic.com/~lynn/93.html#31 Big I/O or Kicking the Mainframe out the Door
https://www.garlic.com/~lynn/2000b.html#20 How many Megaflops and when?
https://www.garlic.com/~lynn/2000b.html#24 How many Megaflops and when?
https://www.garlic.com/~lynn/2000b.html#25 How many Megaflops and when?
https://www.garlic.com/~lynn/2000c.html#64 Does the word "mainframe" still have a meaning?
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Other oddball IBM System 360's ? Newsgroups: alt.folklore.computers Date: Thu, 09 Aug 2001 20:24:13 GMTlwinson@bbs.cpcn.com (lwin) writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Flip the bits in a byte Newsgroups: comp.lang.asm370 Date: Fri, 10 Aug 2001 14:23:09 GMTPierre Fichaud writes:
we built our own controller (which is credited with originating the ibm pcm controller business) first on an interdata-3 with the line-scanner in software (part of the reason was that we had attempted to do automated terminal recognition and reset the 270x line-scanner accordingly ... but a "feature" of the 270x thwarted our efforts; the software line-scanner was to handle both terminal type recognition and bit-speed agility). ascii convention had been to put the leading bit in the high-order bit position.
as a result, the first test ... had ascii bits arriving in 360 memory in bit-reversed order (at least by ibm standards). with a little checking, we realized that the ibm translate tables for ascii ... not only did the ascii<->ebcdic transalation ... but the translation was for bit-reversed ascii.
we actually had an option for (at least) tty to directly talk to the interdata ... so if a device was in local controller mode ... then the convention needed to be leading bit in the high-bit postion ... however if it was going on to 360 memory ... ascii bits had to bit-reversed in a byte.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: future of e-commerce Newsgroups: comp.society.futures Date: Sat, 11 Aug 2001 13:26:16 GMTgading1@hotmail.com (Herry Rizaldi) writes:
there is significant amount of b-to-b traffic going on ... and several companies have reports of significant traffic and efficiency gains.
as to b-to-c ... there are a number of reports over the last 20-30 years on things like people not going to accept ATM machines because of the human contact issues.
An example would be Dr. Supriya Singh, at CIRCIT (australia) & PIRP (harvard), her doctoral thesis was Marriage, Money and Information: Australian Consumers' Use of Banks.
there is a fair amount of work underway in both the security and
privacy relm; random ref:
https://www.garlic.com/~lynn/subpubkey.html#privacy
also from pirp (they seem to have had a slight problem setting the year):
Date: Fri, 07 Jun 2002 10:58:30 -0400
To: pirp@xxxxxx
From: Tony Oettinger & John LeGates <pirprvws@xxxxxx>
Subject: Invitation to a book-signing to launch a new book
Cc: pirprvws@xxxxxx
It is a pleasure to announce a new book by Eduardo da Costa, Global E-
commerce Strategies for Small Businesses, published this month by The
MIT Press. Dr. da Costa wrote the book while a visiting scholar at the
Program on Information Resources Policy.
You are invited to a book-signing event that we are hosting to
celebrate the launching.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Flip the bits in a byte Newsgroups: comp.lang.asm370 Date: Sat, 11 Aug 2001 15:26:43 GMT"Sven Pran" writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Net banking, is it safe??? Newsgroups: comp.security.misc Date: Sat, 11 Aug 2001 15:40:26 GMTgraperdude@aol.com (Graper) writes:
this is a business rule that is part of x9.59 standard and also used in the nacha pilot ... i.e. it eliminates the account number harvesting & leakage that is frequently in the press as a point of attack/exploit. while there are still points of exploits ... the ability to harvest hundreds of thousands of account numbers at one time and use any/all of them in subsequent fraudulent transactions is eliminated ... significantly altering the cost/benefit fraud ratio.
x9.59, aads, and nacha refs:
https://www.garlic.com/~lynn/aadsm6.htm#aadsatm (certificate-less) digital signatures can secure ATM card payments on the internet
https://www.garlic.com/~lynn/2001h.html#36 PKI/Digital signature doesn't work
https://www.garlic.com/~lynn/2001h.html#37 credit card # encryption
misc. other refs:
https://www.garlic.com/~lynn/
https://www.garlic.com/~lynn/subpubkey.html#privacy
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: YKYGOW... Newsgroups: alt.folklore.computers Date: Sat, 11 Aug 2001 18:54:34 GMTCharles Richmond writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: YKYGOW... Newsgroups: alt.folklore.computers Date: Sat, 11 Aug 2001 20:26:41 GMTAnne & Lynn Wheeler writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Blinkenlights Newsgroups: alt.folklore.computers Date: Sat, 11 Aug 2001 23:41:32 GMTProf Karl Kleine writes:
similar sampling
https://www.garlic.com/~lynn/94.html#21
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Whom Do Programmers Admire Now??? Newsgroups: alt.folklore.computers Date: Sun, 12 Aug 2001 15:24:36 GMTjmfbahciv writes:
The early cp/67 & vm/370 for kernel build was typically multi-stage process that 1) wr0te all the binaries to a (9-track) tape in bootable format ... 2) boot'ing from the tape which would result 3) in writing a disk bootable (or ipl'able) image to disk ... 4) from which cp was normally booted/ipl'ed.
Because of some experience with various kinds of glitches ... i early on enhanced the procedure to dump to tape (after the kernel) all the source and procedures necessary to recreate the cp kernel ... followed by an image of cms (typically wasn't enuf room on the tape to also include all the cms source).
Years later ... when Melinda was looking for source to the original source maintenance procedures what cambridge had developed for cp/67 & cms (and later used by a number of other product groups), i was able to find an old boot tape that still had the full set of procedures appended.
melinda's history of vm (there is also a cms copy of zork)
https://www.leeandmelindavarian.com/Melinda/
https://www.leeandmelindavarian.com/Melinda#VMHist
random refs:
https://www.garlic.com/~lynn/2000.html#43
https://www.garlic.com/~lynn/2000.html#44
https://www.garlic.com/~lynn/99.html#149
https://www.garlic.com/~lynn/99.html#18
with respect to above reference about somebody in the operator staff randomly selecting tapes to be mounted for scratch ... some amount of the archived stuff included early dynamic adaptive fair share stuff. One of the characteristics of the dynamic adaptive fair share stuff was that it did periodic system activity snapshots and used it for dynamically adaptive feedback control operations.
Apparently in the same period somebody filed a patent for taking periodic system activity snapshots and using it as output to system prograrmmers engaged in manually tuning a system. at one point, i was contacted about the availability of my source as it might have some bearing on the patent.
however, there was no mention that during almost that whole era the state-of-the-art seemed to be manual system tuning ... and somewhat ignoring that the referenced material they were interested in ... essentially eliminated that occupation in favor of a system that supported dynamic adaptive feedback.
It possibly did have some indirect benefit at cambridge since all those system activity reports early on evolved into capacity planning.
random refs:
https://www.garlic.com/~lynn/subtopic.html#fairshare
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Net banking, is it safe??? Newsgroups: comp.security.misc Date: Sun, 12 Aug 2001 15:45:21 GMTLESLIE@209-16-45-102.insync.net (Jerry Leslie) writes:
as a result havesting the merchant credit card file ... enables a large number of fraudulent (unauthenticated) transactions across possibly hundreds of thousands of credit card accounts.
aka the previous transaction information ... account number, et. al are essentiall shared-secret ... since it is sufficient for generating a fraudulent transaction.
going to authenticated transactions ... aka x9.59 and the nacha trials ... eliminates the harvesting of the credit card file as a meaningful exploit since the information contained in the file is no longer sufficient for generating a fraudulent transaction.
x9.59 and the nacha work didn't directly improve the security of the merchant web sites ... it just eliminated the major attack point at merchant web sites as a meaningful fraudulent activity (such files could still be harvesting, it just wouldn't result in fraud).
random refs:
https://www.garlic.com/~lynn/aadsm6.htm#aadsatm
https://www.garlic.com/~lynn/2001h.html#37
https://www.garlic.com/~lynn/2001h.html#53
https://www.garlic.com/~lynn/subpubkey.html#privacy
it also has an interesting personal side-benfit ... effectively empowering the person. significant amount of the current fraud revolves around the degree that merchant sites protects the consumer's data. a consumer doing large number of transactions at a large number of different sites is dependant on each & every one of those sites never, ever, making a security mistake.
going to authenticated transactions ... moves the point of attack from the merchant to the person (besides eliminating the fraudulent multiplier benefit of one event harvesting sufficient information capable of generating tens of thousands of fraudulent transactions) ... the person now has some control over the possible points of attacks (and is not dependent on a continuing bases the security of all the merchants that they have ever done business with).
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Blinkenlights Newsgroups: alt.folklore.computers Date: Sun, 12 Aug 2001 17:06:14 GMT"Daniel House" writes:
one of the great benefits to time-sharing service bureaus (like tymshare, ncss, idc, etc) was the ability to let the system (& meter) go idle when there was no system activity.
you could get different contract leases for hrs per week (i.e. one, two, three or four shifts typically). nominally the billing meter would run even when the cpu wasn't executing instructions (i.e. in wait state) if there was "outstanding" i/o i.e. even tho the processor might not be executing 360/370 instructions ... it was possible that the processor engine was executing other kinds of instructions on behalf of various i/o operations.
one of the time-sharing tricks was to be able to leave a kind of pending I/O operation on terminal lines (allowing it to accept incoming characters) which wouldn't cause the billing meter to tick when characters weren't actually being transferred. this enabled being able to offer service 3rd & 4th shift ... when there was nominal little or no (time-sharing) billing activity ... but could still rack up machine leasing billing activity.
random time-sharing references:
https://www.garlic.com/~lynn/93.html#31 Big I/O or Kicking the Mainframe out the Door
https://www.garlic.com/~lynn/94.html#5 Schedulers
https://www.garlic.com/~lynn/94.html#12 360 "OS" & "TSS" assemblers
https://www.garlic.com/~lynn/94.html#15 cp disk story
https://www.garlic.com/~lynn/94.html#47 Rethinking Virtual Memory
https://www.garlic.com/~lynn/95.html#2 Why is there only VM/370?
https://www.garlic.com/~lynn/97.html#7 Did 1401 have time?
https://www.garlic.com/~lynn/97.html#16 Why Mainframes?
https://www.garlic.com/~lynn/98.html#13 S/360 operating systems geneaology
https://www.garlic.com/~lynn/98.html#40 Comparison Cluster vs SMP?
https://www.garlic.com/~lynn/99.html#39 Internet and/or ARPANET?
https://www.garlic.com/~lynn/99.html#76 Mainframes at Universities
https://www.garlic.com/~lynn/99.html#87 1401 Wordmark?
https://www.garlic.com/~lynn/99.html#119 Computer, supercomputers & related
https://www.garlic.com/~lynn/99.html#122 Computer supersitions [was Re: Speaking of USB ( was Re: ASR 33 Typing Element)]
https://www.garlic.com/~lynn/99.html#126 Dispute about Internet's origins
https://www.garlic.com/~lynn/99.html#127 Dispute about Internet's origins
https://www.garlic.com/~lynn/99.html#130 early hardware
https://www.garlic.com/~lynn/99.html#148 OS/360 (and descendants) VM system?
https://www.garlic.com/~lynn/99.html#177 S/360 history
https://www.garlic.com/~lynn/2000.html#81 Ux's good points.
https://www.garlic.com/~lynn/2000.html#83 Ux's good points.
https://www.garlic.com/~lynn/2000.html#86 Ux's good points.
https://www.garlic.com/~lynn/2000.html#89 Ux's good points.
https://www.garlic.com/~lynn/2000b.html#61 VM (not VMS or Virtual Machine, the IBM sort)
https://www.garlic.com/~lynn/2000b.html#77 write rings
https://www.garlic.com/~lynn/2000d.html#40 360 CPU meters (was Re: Early IBM-PC sales proj..
https://www.garlic.com/~lynn/2000d.html#44 Charging for time-share CPU time
https://www.garlic.com/~lynn/2000d.html#45 Charging for time-share CPU time
https://www.garlic.com/~lynn/2000d.html#46 Charging for time-share CPU time
https://www.garlic.com/~lynn/2000d.html#47 Charging for time-share CPU time
https://www.garlic.com/~lynn/2000e.html#9 Checkpointing (was spice on clusters)
https://www.garlic.com/~lynn/2000e.html#13 internet preceeds Gore in office.
https://www.garlic.com/~lynn/2000e.html#16 First OS with 'User' concept?
https://www.garlic.com/~lynn/2000f.html#52 TSS ancient history, was X86 ultimate CISC? designs)
https://www.garlic.com/~lynn/2000f.html#53 360 Architecture, Multics, ... was (Re: X86 ultimate CISC? No.)
https://www.garlic.com/~lynn/2000f.html#54 360 Architecture, Multics, ... was (Re: X86 ultimate CISC? No.)
https://www.garlic.com/~lynn/2000f.html#56 TSS ancient history, was X86 ultimate CISC? designs)
https://www.garlic.com/~lynn/2000f.html#58 360 Architecture, Multics, ... was (Re: X86 ultimate CISC? No.)
https://www.garlic.com/~lynn/2000f.html#59 360 Architecture, Multics, ... was (Re: X86 ultimate CISC? No.)
https://www.garlic.com/~lynn/2000f.html#78 TSS ancient history, was X86 ultimate CISC? designs)
https://www.garlic.com/~lynn/2000g.html#4 virtualizable 360, was TSS ancient history
https://www.garlic.com/~lynn/2001b.html#15 Linux IA-64 interrupts [was Re: Itanium benchmarks ...]
https://www.garlic.com/~lynn/2001b.html#35 John Mashey's greatest hits
https://www.garlic.com/~lynn/2001b.html#45 First OS?
https://www.garlic.com/~lynn/2001c.html#3 Z/90, S/390, 370/ESA (slightly off topic)
https://www.garlic.com/~lynn/2001e.html#13 High Level Language Systems was Re: computer books/authors (Re: FA:
https://www.garlic.com/~lynn/2001e.html#69 line length (was Re: Babble from "JD" <dyson@jdyson.com>)
https://www.garlic.com/~lynn/2001f.html#2 Mysterious Prefixes
https://www.garlic.com/~lynn/2001f.html#17 Accounting systems ... still in use? (Do we still share?)
https://www.garlic.com/~lynn/2001f.html#48 any 70's era supercomputers that ran as slow as today's supercomputers?
https://www.garlic.com/~lynn/2001f.html#56 any 70's era supercomputers that ran as slow as today's supercomputers?
https://www.garlic.com/~lynn/2001g.html#32 Did AT&T offer Unix to Digital Equipment in the 70s?
https://www.garlic.com/~lynn/2001h.html#10 VM: checking some myths.
https://www.garlic.com/~lynn/2001h.html#12 checking some myths.
https://www.garlic.com/~lynn/2001h.html#34 D
https://www.garlic.com/~lynn/2001h.html#35 D
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Whom Do Programmers Admire Now??? Newsgroups: alt.folklore.computers Date: Sun, 12 Aug 2001 17:14:31 GMTAnne & Lynn Wheeler writes:
I wouldn't have been able to do many of the cp/67 & hasp things as an undergraduate, if I hadn't had a source-based build system.
doing things with os/360 was a little harder ... you could get microfiche source and figure out some stuff and in some cases "patch" the binaries in order to effect changes (various kinds of tricks for binary patching were developed in order to apply system enhancements to a binary-based build system ... even if some kind of source was available).
random refs:
https://www.garlic.com/~lynn/subtopic.html#fairshare
https://www.garlic.com/~lynn/subtopic.html#wsclock
https://www.garlic.com/~lynn/submain.html#360pcm
random hasp refs:
https://www.garlic.com/~lynn/93.html#2 360/67, was Re: IBM's Project F/S ?
https://www.garlic.com/~lynn/93.html#15 unit record & other controllers
https://www.garlic.com/~lynn/94.html#2 Schedulers
https://www.garlic.com/~lynn/94.html#18 CP/67 & OS MFT14
https://www.garlic.com/~lynn/95.html#7 Who built the Internet? (was: Linux/AXP.. Reliable?)
https://www.garlic.com/~lynn/96.html#9 cics
https://www.garlic.com/~lynn/96.html#12 IBM song
https://www.garlic.com/~lynn/97.html#22 Pre S/360 IBM Operating Systems?
https://www.garlic.com/~lynn/97.html#28 IA64 Self Virtualizable?
https://www.garlic.com/~lynn/98.html#21 Reviving the OS/360 thread (Questions about OS/360)
https://www.garlic.com/~lynn/98.html#29 Drive letters
https://www.garlic.com/~lynn/99.html#33 why is there an "@" key?
https://www.garlic.com/~lynn/99.html#58 When did IBM go object only
https://www.garlic.com/~lynn/99.html#76 Mainframes at Universities
https://www.garlic.com/~lynn/99.html#77 Are mainframes relevant ??
https://www.garlic.com/~lynn/99.html#92 MVS vs HASP vs JES (was 2821)
https://www.garlic.com/~lynn/99.html#93 MVS vs HASP vs JES (was 2821)
https://www.garlic.com/~lynn/99.html#94 MVS vs HASP vs JES (was 2821)
https://www.garlic.com/~lynn/99.html#109 OS/360 names and error codes (was: Humorous and/or Interesting Opcodes)
https://www.garlic.com/~lynn/99.html#113 OS/360 names and error codes (was: Humorous and/or Interesting Opcodes)
https://www.garlic.com/~lynn/99.html#117 OS390 bundling and version numbers -Reply
https://www.garlic.com/~lynn/99.html#209 Core (word usage) was anti-equipment etc.
https://www.garlic.com/~lynn/2000.html#55 OS/360 JCL: The DD statement and DCBs
https://www.garlic.com/~lynn/2000.html#76 Mainframe operating systems
https://www.garlic.com/~lynn/2000c.html#10 IBM 1460
https://www.garlic.com/~lynn/2000c.html#18 IBM 1460
https://www.garlic.com/~lynn/2000c.html#20 IBM 1460
https://www.garlic.com/~lynn/2000d.html#36 Assembly language formatting on IBM systems
https://www.garlic.com/~lynn/2000d.html#44 Charging for time-share CPU time
https://www.garlic.com/~lynn/2000d.html#45 Charging for time-share CPU time
https://www.garlic.com/~lynn/2000e.html#14 internet preceeds Gore in office.
https://www.garlic.com/~lynn/2000f.html#58 360 Architecture, Multics, ... was (Re: X86 ultimate CISC? No.)
https://www.garlic.com/~lynn/2000f.html#68 TSS ancient history, was X86 ultimate CISC? designs)
https://www.garlic.com/~lynn/2000f.html#71 HASP vs. "Straight OS," not vs. ASP
https://www.garlic.com/~lynn/2001b.html#73 7090 vs. 7094 etc.
https://www.garlic.com/~lynn/2001e.html#6 Blame it all on Microsoft
https://www.garlic.com/~lynn/2001e.html#7 Blame it all on Microsoft
https://www.garlic.com/~lynn/2001e.html#12 Blame it all on Microsoft
https://www.garlic.com/~lynn/2001f.html#2 Mysterious Prefixes
https://www.garlic.com/~lynn/2001f.html#26 Price of core memory
https://www.garlic.com/~lynn/2001g.html#22 Golden Era of Compilers
https://www.garlic.com/~lynn/2001g.html#44 The Alpha/IA64 Hybrid
https://www.garlic.com/~lynn/2001g.html#46 The Alpha/IA64 Hybrid
https://www.garlic.com/~lynn/2001g.html#48 The Alpha/IA64 Hybrid
https://www.garlic.com/~lynn/2001h.html#12 checking some myths.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Net banking, is it safe??? Newsgroups: comp.security.misc Date: Sun, 12 Aug 2001 21:25:22 GMTAnne & Lynn Wheeler writes:
nominally the amount of security is typically proportional to what is at risk.
let say a web merchant offers a $5 item (that costs $3 wholesale) and sells 100,000 of them thru credit card purchases.
that is $500,000 gross revenue, or $200,000 left to cover operating, mailing, security, salaries, profit, etc.
so, in theory, what is at "risk" should be in the $10,000 to $500,000 range (depending on whether only transactions in a certain window are at risk or aggregate of all transactions are at risk). so, in theory, some amount of the $200,000 should go to providing security proportional to the risk.
however, the merchant credit card transaction file is effectively at risk proportional to the credit limit of all the customers ... not proportional to what it is that they bought from the merchant ... and effectively doesn't have a narrow time window (other than say the card expiration date). Taking a nominal credit limit of $500, then what is at risk is now in the $50,000,000 range (not the $10k to $500k range).
Let say there are something like 10,000,000 such merchants world-wide
with similar profile ...
ignoring for the moment, the fact that they
have to have credit card file security that protects from both
outsider and insider exploits
... each and every one of those merchants
now needs security that is proportional to a $50,000,000 risk rather
than a couple hundred thousand dollar risk (at most) ... i.e. what is
at risk is possibly one hundred to one thousand times as large as what
the individual merchants directly are dealing with. Any sort of
failure at any one of those 10,000,000 merchants results in a
$50,000,000 exposure.
One could make the claim that each individual merchant doesn't have the revenue and/or the risk profile to cover the actual total risk that their credit card file represents and/or fund the necessary associated security that is proportional to the actual risk.
One of the things that I worked on was resource management algorithms that are proportional to the resource. Resource management algorithms that incurred an expense much larger than the value of the resource they managed weren't likely to survive. It was necessary to have a management algorithm that was proportional to the value.
Applying the analogy to merchant credit card risk ... the risk that they are securing needs to be proportional to their business operations (i.e. revenue and profit) and not proportional to something that they have no control over (like the aggregate of all the credit limits for all the customers that they happen to deal with).
random refs:
https://www.garlic.com/~lynn/subtopic.html#fairshare
https://www.garlic.com/~lynn/subpubkey.html#privacy
https://www.garlic.com/~lynn/subintegrity.html#fraud
and assurance
https://www.garlic.com/~lynn/subintegrity.html#assurance
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Net banking, is it safe??? Newsgroups: comp.security.misc Date: Sun, 12 Aug 2001 23:42:39 GMTAnne & Lynn Wheeler writes:
ref:
https://www.garlic.com/~lynn/index.html#glosnote
security glossary
https://www.garlic.com/~lynn/secure.htm
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Blinkenlights Newsgroups: alt.folklore.computers Date: Mon, 13 Aug 2001 12:48:54 GMTehrice@his.com (Edward Rice) writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Net banking, is it safe??? Newsgroups: comp.security.misc Date: Mon, 13 Aug 2001 16:32:48 GMTAnne & Lynn Wheeler writes:
having been somewhat involved in the first e-commerce implementation & deployment
https://www.garlic.com/~lynn/aadsm5.htm#asrn2 Assurance, e-commerce, and some x9.59 ... fyi
https://www.garlic.com/~lynn/aadsm5.htm#asrn3 Assurance, e-commerce, and some x9.59 ... fyi
https://www.garlic.com/~lynn/aadsm5.htm#asrn1 Assurance, e-commerce, and some x9.59 ... fyi
https://www.garlic.com/~lynn/aadsm5.htm#asrn4 assurance, X9.59, etc
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: UUCP email Newsgroups: alt.folklore.computers Date: Wed, 15 Aug 2001 03:34:02 GMTbhk@dsl.co.uk (Brian {Hamilton Kelly}) writes:
bitnet/earn related posts:
https://www.garlic.com/~lynn/subnetwork.html#bitnet
online computer conferencing pots
https://www.garlic.com/~lynn/subnetwork.html#cmc
note at this time, the (internal) VNET was still larger than the arpanet/internet ... on the order of 2000 mainframe nodes at the time.
misc. internet & internal network discussions
https://www.garlic.com/~lynn/internet.htm
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: UUCP email Newsgroups: alt.folklore.computers Date: Wed, 15 Aug 2001 04:10:19 GMT"Peter Ibbotson" writes:
I used it both with waffle under ms/dos and on a couple unix machines. I had rewritten/tweaked the pagesat driver for both unix and dos and co-authored articles with pictures of me in my backyard with the dish that appeared in both boardwatch magazine and infoworld.
backyard dish for full (satellite) usenet feed
https://www.garlic.com/~lynn/pagesat.jpg
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Would this type of credit card help online shopper to feel more secure? Newsgroups: comp.security.misc Date: Wed, 15 Aug 2001 14:03:35 GMTalun@texis.com (Alun Jones) writes:
misc. recent postings related to fraud
https://www.garlic.com/~lynn/2001f.html#40 Remove the name from credit cards!
https://www.garlic.com/~lynn/2001g.html#38 distributed authentication
https://www.garlic.com/~lynn/2001g.html#62 PKI/Digital signature doesn't work
https://www.garlic.com/~lynn/2001g.html#63 PKI/Digital signature doesn't work
https://www.garlic.com/~lynn/2001h.html#7 PKI/Digital signature doesn't work
https://www.garlic.com/~lynn/2001h.html#64 Net banking, is it safe???
https://www.garlic.com/~lynn/aadsm6.htm#websecure merchant web server security
https://www.garlic.com/~lynn/aepay6.htm#ccfraud2 "out of control credit card fraud"
https://www.garlic.com/~lynn/aepay6.htm#ccfraud3 "out of control credit card fraud"
https://www.garlic.com/~lynn/aepay7.htm#fakeid Fake IDs swamp police
https://www.garlic.com/~lynn/aepay7.htm#netbank net banking, is it safe?? ... power to the consumer
https://www.garlic.com/~lynn/aepay7.htm#netbank2 net banking, is it safe?? ... security proportional to risk
additional discussions
https://www.garlic.com/~lynn/subintegrity.html#fraud
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Net banking, is it safe??? Newsgroups: comp.security.misc Date: Wed, 15 Aug 2001 14:08:49 GMTjenniekJ@excite.com (Jennie) writes:
some references
https://www.garlic.com/~lynn/aepay6.htm#ccfraud2 "out of control credit card fraud"
https://www.garlic.com/~lynn/aepay6.htm#ccfraud3 "out of control credit card fraud"
other fraud references:
https://www.garlic.com/~lynn/subintegrity.html#fraud
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Very CISC Instuctions (Was: why the machine word size ...) Newsgroups: alt.folklore.computers Date: Wed, 15 Aug 2001 16:24:31 GMTdg@pearl.tao.co.uk (David Given) writes:
in the late '70s, there was a project called fort knox to converge all the low-end machines to an 801 engine (in part because just about every model used a different processor engine; fort knoxalso was going to be applied to some of the non-370 processor products also). fort knox got axed (i help the author of the report that axe'd it). To be competitive, state-of-the-art had to start moving instructions directly into the processor hardware and get better than the 10:1 370 emulation thruput that the low-end microprocessor engines had been getting up until that point; aka a 370/125 at about 100kips needed about a 1mip microprocessor engine.
in the above respect ... the low-end "microcode" wasn't to unsimilar from the various 370/390 emulators currently available on intel platform.
for high end machines ... and controllers like the 3830 ... it was horizontal microcode with one instruction per machine cycle ... i.e. wide instructions that had lots of bits for doing things like start load into some working register ... and then you are suppose to know that some number of machine instructions/cycles later .. the value was available to work on.
The high-end machines rather than measuring efficiency as avg. microprocessor instructions per 370 instruction (in the vertical microprocessor engines), the horizontal microprocessor machines tended to measure efficiency in avg. machine cycles per instruction (in part because a single vliw instruction might be operating on multiple 370 instructions concurrently). For instance optimization of the microcode help drop the avg. cycle per instruction on the 370/165 at 2.1cycls/instr to about 1.6cycles/instr for the 370/168.
random refs:
https://www.garlic.com/~lynn/submain.html#mcode
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Net banking, is it safe??? Newsgroups: comp.security.misc Date: Wed, 15 Aug 2001 14:56:59 GMTnuntapornb@hotmail.com (Nuntaporn) writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: IBM 9020 FAA/ATC Systems from 1960's Newsgroups: alt.folklore.computers Date: Thu, 16 Aug 2001 02:13:58 GMT"Charlie Gibbs" writes:
on 360/67s that didn't have the SLT RPQ, & if CP/67 was generated to use the instruction in the kernel ... the kernel would take an invalid instruction interrupt. CP/67 then had a kernel routine that would simulate the instruction.
from cp/67 reference (pg. 252)
Module name: SLTSIM
Entry point: SLTSIM
Purpose: Simulation of the SLT (search list) instruction on those
360/67s which do not have the RPQ.
Entry conditions:
gpr 0, bits 16-23, contains the key mask.
bits 24-31, contains the count of the number of elements to be searched
gpr2: contains the address of the first element (which must be on a doubleword
boundary)
gpr3: contains the number of bytes to be compared for the data match (1 through 4)
gpr4: contains the value of the offset for the data check
gpr5: contains the value of the offset for the key check
gpr14: contains a pointer to the instruction being simulated
exit conditions
0 - unsuccessful comparion and key test with completion due to count
1 - successful comparison and unsuccessful key test
2 - unsuccessful comparison and successful key test
3 - successful comparison and key test
gpr0: contains the number of elements unchecked
gpr1: contains the predecessor element
gpr2: contains the matched element
also misc. sie ref.
https://www.garlic.com/~lynn/94.html#37 SIE instruction (S/390)
https://www.garlic.com/~lynn/2000b.html#50 VM (not VMS or Virtual Machine, the IBM sort)
https://www.garlic.com/~lynn/2000b.html#51 VM (not VMS or Virtual Machine, the IBM sort)
https://www.garlic.com/~lynn/2000b.html#52 VM (not VMS or Virtual Machine, the IBM sort)
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: ummmmm Newsgroups: alt.folklore.computers Date: Thu, 16 Aug 2001 13:23:27 GMTTerry Richards writes:
2540 8bit ccw op-code(s) from my trusty green-card gx20-1703-7
punch, feed, select stacker SS: SSD00001
read, feed, select stacker SS: SSD00010
where SS: 00 stacker R1
01 stacker R2
10 stacker RP3
D: 0 EBCDIC
1 column binary
so it has been 15 years since I coded a DCB macro and my references are
long gone ... so a little searching on ibm.com turned up:
http://publibz.boulder.ibm.com:80/cgi-bin/bookmgr_OS390/BOOKS/dgt1d506/2.3.16
MODE=[C|E][R]]
specifies the mode of operation for the card punch. If MODE is
omitted, E is assumed. You can specify:
C
specifies that the cards are punched in card image mode. In card image
mode, the 12 rows in each card column are punched from 2 consecutive
bytes of virtual storage. Rows 12 through 3 are punched from the 6
low-order bits of one byte, and rows 4 through 9 are punched from the
6 low-order bits of the following byte.
E
specifies that cards are punched in EBCDIC code.
R
specifies that the program runs in read-column-eliminate mode (3505
card reader or 3525 card punch, read feature).
STACK={1|2}
specifies the stacker bin where the card is placed after punching
completes. If this parameter is omitted, stacker number 1 is used. You
can specify:
1
specifies stacker number 1.
2
specifies stacker number 2.
random refs:
https://www.garlic.com/~lynn/95.html#4 1401 overlap instructions
https://www.garlic.com/~lynn/98.html#9 Old Vintage Operating Systems
https://www.garlic.com/~lynn/99.html#13 Old Computers
https://www.garlic.com/~lynn/99.html#59 Living legends
https://www.garlic.com/~lynn/2000.html#79 Mainframe operating systems
https://www.garlic.com/~lynn/2000b.html#6 ascii to binary
https://www.garlic.com/~lynn/2001b.html#20 HELP
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Most complex instructions Newsgroups: alt.folklore.computers Date: Thu, 16 Aug 2001 20:50:31 GMTab528@FreeNet.Carleton.CA (Heinz W. Wiggeshoff) writes:
misc. ref
https://www.garlic.com/~lynn/98.html#19 S/360 operating systems geneaology
https://www.garlic.com/~lynn/98.html#20 Reviving the OS/360 thread (Questions about OS/360)
https://www.garlic.com/~lynn/2001.html#2 A new "Remember when?" period happening right now
from ibm pinciples of operation
http://publibz.boulder.ibm.com:80/cgi-bin/bookmgr_OS390/BOOKS/DZ9AR004/A.7
and for even more complex stuff there is the whole (supervisor state) infrastructure controlling access to multiple address spaces along with the program call mechanism (access registers). The idea behind program call was to try and have the efficiency of branch and link while trying to preserve some authentication & access control checking that would be possible with a kernel call (aka but w/o the overhead).
http://publibz.boulder.ibm.com:80/cgi-bin/bookmgr_OS390/BOOKS/DZ9AR004/5.4
http://publibz.boulder.ibm.com:80/cgi-bin/bookmgr_OS390/BOOKS/DZ9AR004/5.5
http://publibz.boulder.ibm.com:80/cgi-bin/bookmgr_OS390/BOOKS/DZ9AR004/5.6
http://publibz.boulder.ibm.com:80/cgi-bin/bookmgr_OS390/BOOKS/DZ9AR004/5.7
http://publibz.boulder.ibm.com:80/cgi-bin/bookmgr_OS390/BOOKS/DZ9AR004/5.8
http://publibz.boulder.ibm.com:80/cgi-bin/bookmgr_OS390/BOOKS/DZ9AR004/5.9
http://publibz.boulder.ibm.com:80/cgi-bin/bookmgr_OS390/BOOKS/DZ9AR004/5.10
http://publibz.boulder.ibm.com:80/cgi-bin/bookmgr_OS390/BOOKS/DZ9AR004/5.11
http://publibz.boulder.ibm.com:80/cgi-bin/bookmgr_OS390/BOOKS/DZ9AR004/5.12
and then there is poor SIE instruction ref'ed in previous posting.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: YKYGOW... Newsgroups: alt.folklore.computers Date: Fri, 17 Aug 2001 03:11:19 GMTjcmorris@mitre.org (Joe Morris) writes:
We managed to get a pc/rt with a 5081 into somebody's booth (not ibm) at Interop '88 running a demo copy of case's snmp. trivia question: what was causing the floor nets to crash & burn until the wee hrs of the morning before the start of the show?
misc 5081 ref:
http://www.devo.com/video/5081/index.html
random interop '88 refs
https://www.garlic.com/~lynn/94.html#34 Failover and MAC addresses (was: Re: Dual-p
https://www.garlic.com/~lynn/94.html#36 Failover and MAC addresses (was: Re: Dual-p
https://www.garlic.com/~lynn/99.html#40 [netz] History and vision for the future of Internet - Public Question
https://www.garlic.com/~lynn/2000e.html#5 Is Al Gore The Father of the Internet?^
https://www.garlic.com/~lynn/2000e.html#28 Is Al Gore The Father of the Internet?^
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Net banking, is it safe??? Newsgroups: comp.security.misc Date: Fri, 17 Aug 2001 15:45:17 GMTgraperdude@aol.com (Graper) writes:
there are a number of things that can be done for security:
1) for high activity operations, turn the web server into little more than an http<->transaction protocol translater that interfaces to a more robust backend ... where authentication takes place. This could even be collapsed into a (application protocol) firewall ... or use a pair of machines ... one the http protocol firewall, and the other an http<->transaction protocol translation.
2) use radius client authentication, either in the web server stubb (in place of a local flat-file userid/password) or in a more robust backend.
3) use one of the non-userid/password radius options for client authentication and/or even enhancing to use public key cryptography.
4) if public key cryptography is used, the private key can be housed in a hardware token of some sort
note that using radius ... an installation can have a common administrative management infrastructure for managing client authentication (including concurrent authentication technologies for different accounts as well as various types of authorization rules).
for more on internet client authentication standard, go to
https://www.garlic.com/~lynn/rfcietff.htm
and click on Term (term->RFC#) ... in the Acronym fastpath section, find & click on RADIUS. That will give you a list of all Internet IETF RFC documents associated with RADIUS (which you can click on and/or retrieve). RADIUS also has a clickable pointer for "authentication" and all Internet IETF RFC documents associated with "authentication".
client and radius authentication
https://www.garlic.com/~lynn/subpubkey.html#radius
random refs:
https://www.garlic.com/~lynn/aadsm2.htm#straw AADS Strawman
https://www.garlic.com/~lynn/aadsm2.htm#strawm1 AADS Strawman
https://www.garlic.com/~lynn/aadsm2.htm#strawm2 AADS Strawman
https://www.garlic.com/~lynn/aadsm2.htm#strawm3 AADS Strawman
https://www.garlic.com/~lynn/aadsm2.htm#strawm4 AADS Strawman
https://www.garlic.com/~lynn/aadsm3.htm#cstech3 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#cstech9 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#cstech10 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsmore.htm#bioinfo1 QC Bio-info leak?
https://www.garlic.com/~lynn/aadsmore.htm#bioinfo2 QC Bio-info leak?
https://www.garlic.com/~lynn/aadsmore.htm#bioinfo3 QC Bio-info leak?
https://www.garlic.com/~lynn/aadsmore.htm#debitfraud Debit card fraud in Canada
https://www.garlic.com/~lynn/aepay2.htm#privrule3 U.S. firms gird for privacy rules
https://www.garlic.com/~lynn/aepay3.htm#passwords Passwords don't work
https://www.garlic.com/~lynn/aepay3.htm#x959risk1 Risk Management in AA / draft X9.59
https://www.garlic.com/~lynn/aepay3.htm#x959risk2 Risk Management in AA / draft X9.59
https://www.garlic.com/~lynn/aepay3.htm#x959risk3 Risk Management in AA / draft X9.59
https://www.garlic.com/~lynn/aepay3.htm#x959risk4 Risk Management in AA / draft X9.59
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Other oddball IBM System 360's ? Newsgroups: alt.folklore.computers Date: Fri, 17 Aug 2001 16:35:00 GMTjraben@cascinc.com (Jeff Raben) writes:
at least in later time-frame, disk controllers had fine-grain locking capability initially for PARS/ACP.
cluster, high availability and/or loosely-coupled
https://www.garlic.com/~lynn/subtopic.html#hacmp
random refs
https://www.garlic.com/~lynn/94.html#11 REXX
https://www.garlic.com/~lynn/94.html#12 360 "OS" & "TSS" assemblers
https://www.garlic.com/~lynn/94.html#26 Misc. more on bidirectional links
https://www.garlic.com/~lynn/98.html#57 Reliability and SMPs
https://www.garlic.com/~lynn/99.html#24 BA Solves Y2K (Was: Re: Chinese Solve Y2K)
https://www.garlic.com/~lynn/99.html#233 Computer of the century
https://www.garlic.com/~lynn/2000.html#0 2000 = millennium?
https://www.garlic.com/~lynn/2000.html#94 Those who do not learn from history...
https://www.garlic.com/~lynn/2000b.html#20 How many Megaflops and when?
https://www.garlic.com/~lynn/2000b.html#32 20th March 2000
https://www.garlic.com/~lynn/2000b.html#51 VM (not VMS or Virtual Machine, the IBM sort)
https://www.garlic.com/~lynn/2000b.html#52 VM (not VMS or Virtual Machine, the IBM sort)
https://www.garlic.com/~lynn/2000b.html#61 VM (not VMS or Virtual Machine, the IBM sort)
https://www.garlic.com/~lynn/2000b.html#65 oddly portable machines
https://www.garlic.com/~lynn/2000c.html#3 RISC Reference?
https://www.garlic.com/~lynn/2000c.html#60 Disincentives for MVS & future of MVS systems programmers
https://www.garlic.com/~lynn/2000d.html#9 4341 was "Is a VAX a mainframe?"
https://www.garlic.com/~lynn/2000e.html#21 Competitors to SABRE? Big Iron
https://www.garlic.com/~lynn/2000e.html#22 Is a VAX a mainframe?
https://www.garlic.com/~lynn/2000f.html#20 Competitors to SABRE?
https://www.garlic.com/~lynn/2000f.html#43 Reason Japanese cars are assembled in the US (was Re: American bigotry)
https://www.garlic.com/~lynn/2000f.html#78 TSS ancient history, was X86 ultimate CISC? designs)
https://www.garlic.com/~lynn/2000g.html#3 virtualizable 360, was TSS ancient history
https://www.garlic.com/~lynn/2000g.html#30 Could CDR-coding be on the way back?
https://www.garlic.com/~lynn/2001.html#28 Competitors to SABRE?
https://www.garlic.com/~lynn/2001.html#32 Competitors to SABRE?
https://www.garlic.com/~lynn/2001.html#34 Competitors to SABRE?
https://www.garlic.com/~lynn/2001.html#37 Competitors to SABRE?
https://www.garlic.com/~lynn/2001.html#38 Competitors to SABRE?
https://www.garlic.com/~lynn/2001.html#48 Competitors to SABRE?
https://www.garlic.com/~lynn/2001.html#51 Competitors to SABRE?
https://www.garlic.com/~lynn/2001.html#58 Disk drive behavior
https://www.garlic.com/~lynn/2001b.html#37 John Mashey's greatest hits
https://www.garlic.com/~lynn/2001b.html#72 Z/90, S/390, 370/ESA (slightly off topic)
https://www.garlic.com/~lynn/2001d.html#54 VM & VSE news
https://www.garlic.com/~lynn/2001d.html#69 Block oriented I/O over IP
https://www.garlic.com/~lynn/2001e.html#2 Block oriented I/O over IP
https://www.garlic.com/~lynn/2001e.html#5 SIMTICS
https://www.garlic.com/~lynn/2001f.html#17 Accounting systems ... still in use? (Do we still share?)
https://www.garlic.com/~lynn/2001f.html#23 MERT Operating System & Microkernels
https://www.garlic.com/~lynn/2001g.html#24 XML: No More CICS?
https://www.garlic.com/~lynn/2001g.html#35 Did AT&T offer Unix to Digital Equipment in the 70s?
https://www.garlic.com/~lynn/2001g.html#45 Did AT&T offer Unix to Digital Equipment in the 70s?
https://www.garlic.com/~lynn/2001g.html#46 The Alpha/IA64 Hybrid
https://www.garlic.com/~lynn/2001g.html#47 The Alpha/IA64 Hybrid
https://www.garlic.com/~lynn/2001h.html#2 Alpha: an invitation to communicate
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/