From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: E-commerce security???? Newsgroups: comp.security,comp.security.pgp,alt.computer.security,alt.security,comp.security.unix,comp.security.linux Date: Sun, 02 Sep 2001 22:44:52 GMTNorm writes:
the initial translation of credit card (aka electronic commerce) to
internet was relatively straight-forward since there was already
provisions for non-face-to-face MOTO (mail-order/telephone-order)
transactions ... ref to this effort:
https://www.garlic.com/~lynn/aadsm5.htm#asrn2
https://www.garlic.com/~lynn/aadsm5.htm#asrn3
however, because account number is effectively shared-secret, there
are all kinds of exploits ... not just limited to the internet. As a
result, the financial standards body developed the X9.59 standard for
ALL account-based payments (not just limited to internet but can be
done at point-of-sale also and other types of environments). refs to
debit implementation
https://www.garlic.com/~lynn/nacharfi.htm
https://web.archive.org/web/20020204041928/http://internetcouncil.nacha.org/Projects/ISAP_Results/isap_results.htm
refs: to X9.59 mapping to iso8583 (aka international message standard
used by both credit and debit networks):
https://www.garlic.com/~lynn/8583flow.htm
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Off-topic everywhere [was: Re: thee and thou Newsgroups: alt.folklore.computers,sci.lang,alt.usage.english Date: Mon, 03 Sep 2001 00:59:24 GMTRic Werme writes:
In the early '80s an apple application called grateful med saw wide-spread deployment. It saved searches and interacted with the (online) query just by getting counts of hits. People would use grateful med to try searches that resulted in reasonable number of hits.
The holy grail has been to come up with methodology to get hits in the tens or hundreds ... rather than the bi-model tendency of switching from hundreds of thousands to zero hits ... with only minor changes to the search.
Part of the approach is attempting to migrate more intelligence of the indexing scheme out into the front-ends ... allowing more awareness of how medical knowledge is structured. Part of that is referred to as UMLS or unified medical language system.
When we worked in the area a couple years ago ... there were something like 40,000 medical librarians world-wide trained in searching NLM. A typical scenerio would be a doctor spends 3-4 hrs with the medical librarian who then goes off for a couple days doing queries and then gets back to the doctor with the most likely responses.
NLM now has web interface ... but the mechanics of the searching still is pretty much the same. I don't know if it has changed recently ... but a couple years ago, the index was still a large BDAM database designed in the late '60s (and despite large amounts of efforts investigating newer technologies thru-out the 80s & 90s ... there was still nothing that could beat it).
some random refs:
https://www.garlic.com/~lynn/94.html#26 Misc. more on bidirectional links
https://www.garlic.com/~lynn/2001c.html#67 What ever happened to WAIS?
https://www.garlic.com/~lynn/2001i.html#27 History of Microsoft Word (and wordprocessing in general)
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: E-commerce security???? Newsgroups: comp.security,comp.security.pgp,alt.computer.security,alt.security,comp.security.unix,comp.security.linux Date: Mon, 03 Sep 2001 02:13:39 GMTNorm writes:
as in the discussion about security proportional to risk ... the basic problem is that the degree of risk of account numbers in unauthenticated transactions bears little or no relationship to the risk/benefit scenerio at the merchant business i.e. the account number risk is significantly larger than any amount of merchant business at risk, and therefor there is no correlation between the amount of business & revenue that a merchant is doing and the amount of risk & security associated with the existing account numbers.
There are lots of security things that can be done proportional to the amount of risk represented by the account number file .... however, in principle, the amount of business a merchant is doing should be proportional to the risk the merchant is dealing with ... and therefor is able to fund/underwrite risk proportional to their business. However, the account number file tends to far exceed the risk in the merchant business and bears little or no correlation with that business
i.e.
https://www.garlic.com/~lynn/2001h.html#61 security proportional to risk
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: YKYGOW... Newsgroups: alt.folklore.computers Date: Mon, 03 Sep 2001 15:47:27 GMTbill@wjv.com (Bill Vermillion) writes:
An example is original 3330. 19 tracks per cylinder (i.e. arm position, 19 heads, one head per track, actually a 20th head&track for position sensing). You could format three 4k records per track plus a little left over.
The standard I/O sequence involved channel command words or CCWs. A typical record access CCW program (for 4k pages) might look like:
Seek (cylinder) set sector search-id equal tic -8 read/write 4k nopif you formated each track the same ... you knew the approximate rotational angle of each record ahead of time and could specify it in the "set sector" command. The "search-id equal" was a CKD command that allowed some pretty fancy outboard record searching operations ... but the trivial case is you knew the record number and just wanted it. The "tic -8" was a branch if the search was not successful. Then the read/write command.
It was also possible to "chain" sequences together for records on the same track or cylinder ... basically changing the "nop" to a tic/branch command to the start of the next CCW package (i.e. seek command).
The original design had the CCW sequences (and the CCW arguments, like the parameters for the seek, set sector and search-id commands) all stored in main processor memory and the "channel" processor sequentially retrieving each CCW one at a time and interpreting it. Note that all the time the "channel" processor was retrieving and interpreting the channel commands (and their parameters), disks were rortating. If the channel was slow enuf, it was possible (when doing sequential record processing) that the next sequential record had rotated passed the disk head while the channel was still processing the CCW command sequences. To compensate for this, disks were sometimes formated with short, dummy "filler" records between the normal data records (and assigned IDs that wouldn't be normally used by search-id commands).
In the 3330, 4k page record case, 50-byte dummy filler records were standard. This allowed the channel extra latency while processing normal CCW sequences to get to the search-id for the next sequential record before it had rotated passed the head; at least for sequential records on the same track. However, for "sequential" records on the same cylinder, but different track, there was also extra channel & disk controller latency that resulted in the next sequential record to rotate past the head (even with 50-byte dummy filler records).
With 4k-byte data records, the maximum sized dummy filler records was 110-byte before exhausting the maximum track length capacity on 3330s. Things now got processor and controller sensitive. Some processor channels and some PCM (plug compatible manufactur) 3330s were fast enuf that they could process the switch head operation before the next sequential data record had rotated past the head (using 110-byte dummy filler records); and some combinations had too much processing latency and would result in a "rotational miss" and have to go around an extra time.
In general 4341 & 370/168 channels were fast enough that they could sequentially access data records on adjacent tracks. 370/158s channels weren't normally fast enuf ... although some PCM 3330 controllers in combination with 158 channels could process the next (rotational) sequential data record on adjacent tracks (same cylinder, different track).
When the 303x machines were introduced, all of them exhibited the 3330 rotational access characteristic of the 370/158. The 370/158 had "integrated" channels where the 158 native (horizontal microcoded) processor engine was shared between emulating 370 instructions and emulation CCW I/O instructions. The 4341 had integrated channels, but were sufficient fast enuf implementation that it wasn't a problem. The 168 had dedicated, outboard hardware "channels".
3330 filler record discussion
https://www.garlic.com/~lynn/2000d.html#7 4341 was "Is a VAX a mainframe?"
https://www.garlic.com/~lynn/2000d.html#12 4341 was "Is a VAX a mainframe?"
https://www.garlic.com/~lynn/2000d.html#44 Charging for time-share CPU time
https://www.garlic.com/~lynn/2001b.html#69 Z/90, S/390, 370/ESA (slightly off topic)
Something similar was done on the 2305 fixed-head disk that was normally used as a dedicated paging device and was formated with dummy filler/spacer records. The 2305 also had eight "logical" addresses. It was possible to schedule (queued) requests on all eight "logical" addresses and have the hardware manage which requests to service. The normal, ibm channel sequence was that after the previous CCW operation had finished, there was a series of events involving hardware interrupts, software processing, and other latency introducing events before the next queued request was (re-)driven on the I/O interface (all the time the disks were rotating).
misc. 2305 discussion
https://www.garlic.com/~lynn/93.html#31 Big I/O or Kicking the Mainframe out the Door
https://www.garlic.com/~lynn/95.html#8 3330 Disk Drives
https://www.garlic.com/~lynn/99.html#6 3330 Disk Drives
https://www.garlic.com/~lynn/99.html#104 Fixed Head Drive (Was: Re:Power distribution (Was: Re: A primeval C compiler)
https://www.garlic.com/~lynn/2000d.html#7 4341 was "Is a VAX a mainframe?"
https://www.garlic.com/~lynn/2000d.html#52 IBM 650 (was: Re: IBM--old computer manuals)
https://www.garlic.com/~lynn/2000d.html#53 IBM 650 (was: Re: IBM--old computer manuals)
https://www.garlic.com/~lynn/2000g.html#42 4M pages are a bad idea (was Re: AMD 64bit Hammer CPU and VM)
https://www.garlic.com/~lynn/2001c.html#17 database (or b-tree) page sizes
redrive latency discussion
https://www.garlic.com/~lynn/94.html#24 CP spooling & programming technology
https://www.garlic.com/~lynn/95.html#12 slot chaining
https://www.garlic.com/~lynn/96.html#19 IBM 4381 (finger-check)
https://www.garlic.com/~lynn/99.html#183 Clustering systems
https://www.garlic.com/~lynn/2000c.html#75 Does the word "mainframe" still have a meaning?
https://www.garlic.com/~lynn/2000g.html#45 4M pages are a bad idea (was Re: AMD 64bit Hammer CPU and VM)
https://www.garlic.com/~lynn/2001b.html#69 Z/90, S/390, 370/ESA (slightly off topic)
https://www.garlic.com/~lynn/2001h.html#28 checking some myths.
For the 303x line of machines, they took the processing engine from the 158 and created a "channel director" ... i.e. an outboard dedicated box that only performed CCW channel operations. The 303x channel directors (on all processor models) all shared the same channel director implementation (a somewhat repackaged 370/158 engine).
The 3031 was a revamped 370/158 where there was a dedicated processing engine for executing 370 instructions and the same processing engine outboard in a "channel director" dedicated for doing I/O. The 3031 had faster 370 processing execution (than the 370/158) ... but the channel director exhibited the same processing latency as the 370/158.
misc. 158/3031 processor comparison
https://www.garlic.com/~lynn/2000d.html#0 Is a VAX a mainframe?
The 3032 was essential a 370/168 that was configured to use the 303x outboard channel directors rather than the 370/168 outboard channel boxes.
The 3033 started out being a 370/168 wiring diagram remapped to faster chip technology (as well as using 303x channel directors) ... but was enhanced along the way to improve its performance.
misc. 303x discussions
https://www.garlic.com/~lynn/93.html#14 S/360 addressing
https://www.garlic.com/~lynn/94.html#7 IBM 7090 (360s, 370s, apl, etc)
https://www.garlic.com/~lynn/95.html#3 What is an IBM 137/148 ???
https://www.garlic.com/~lynn/97.html#20 Why Mainframes?
https://www.garlic.com/~lynn/98.html#50 Edsger Dijkstra: the blackest week of his professional life
https://www.garlic.com/~lynn/99.html#7 IBM S/360
https://www.garlic.com/~lynn/99.html#74 Read if over 40 and have Mainframe background
https://www.garlic.com/~lynn/99.html#75 Read if over 40 and have Mainframe background
https://www.garlic.com/~lynn/99.html#103 IBM 9020 computers used by FAA (was Re: EPO stories (was: HELP IT'S HOT!!!!!))
https://www.garlic.com/~lynn/99.html#110 OS/360 names and error codes (was: Humorous and/or Interesting Opcodes)
https://www.garlic.com/~lynn/99.html#112 OS/360 names and error codes (was: Humorous and/or Interesting Opcodes)
https://www.garlic.com/~lynn/99.html#187 Merced Processor Support at it again . . .
https://www.garlic.com/~lynn/99.html#188 Merced Processor Support at it again . . .
https://www.garlic.com/~lynn/99.html#190 Merced Processor Support at it again . . .
https://www.garlic.com/~lynn/2000.html#78 Mainframe operating systems
https://www.garlic.com/~lynn/2000b.html#37 How to learn assembler language for OS/390 ?
https://www.garlic.com/~lynn/2000b.html#65 oddly portable machines
https://www.garlic.com/~lynn/2000c.html#35 What level of computer is needed for a computer to Love?
https://www.garlic.com/~lynn/2000c.html#44 WHAT IS A MAINFRAME???
https://www.garlic.com/~lynn/2000c.html#69 Does the word "mainframe" still have a meaning?
https://www.garlic.com/~lynn/2000c.html#75 Does the word "mainframe" still have a meaning?
https://www.garlic.com/~lynn/2000c.html#83 Is a VAX a mainframe?
https://www.garlic.com/~lynn/2000d.html#0 Is a VAX a mainframe?
https://www.garlic.com/~lynn/2000d.html#7 4341 was "Is a VAX a mainframe?"
https://www.garlic.com/~lynn/2000d.html#12 4341 was "Is a VAX a mainframe?"
https://www.garlic.com/~lynn/2000d.html#21 S/360 development burnout?
https://www.garlic.com/~lynn/2000d.html#61 "all-out" vs less aggressive designs (was: Re: 36 to 32 bit transition)
https://www.garlic.com/~lynn/2000d.html#82 "all-out" vs less aggressive designs (was: Re: 36 to 32 bit transition)
https://www.garlic.com/~lynn/2000e.html#57 Why not an IBM zSeries workstation?
https://www.garlic.com/~lynn/2000e.html#58 Why not an IBM zSeries workstation?
https://www.garlic.com/~lynn/2000g.html#11 360/370 instruction cycle time
https://www.garlic.com/~lynn/2000g.html#28 Could CDR-coding be on the way back?
https://www.garlic.com/~lynn/2000g.html#29 Could CDR-coding be on the way back?
https://www.garlic.com/~lynn/2001.html#63 Are the L1 and L2 caches flushed on a page fault ?
https://www.garlic.com/~lynn/2001b.html#37 John Mashey's greatest hits
https://www.garlic.com/~lynn/2001b.html#39 John Mashey's greatest hits
https://www.garlic.com/~lynn/2001b.html#69 Z/90, S/390, 370/ESA (slightly off topic)
https://www.garlic.com/~lynn/2001b.html#83 Z/90, S/390, 370/ESA (slightly off topic)
https://www.garlic.com/~lynn/2001c.html#1 Z/90, S/390, 370/ESA (slightly off topic)
https://www.garlic.com/~lynn/2001c.html#3 Z/90, S/390, 370/ESA (slightly off topic)
https://www.garlic.com/~lynn/2001d.html#54 VM & VSE news
https://www.garlic.com/~lynn/2001d.html#55 VM & VSE news
https://www.garlic.com/~lynn/2001e.html#9 MIP rating on old S/370s
https://www.garlic.com/~lynn/2001i.html#13 GETMAIN R/RU (was: An IEABRC Adventure)
getting blamed for originating the 360 plug compatable manufactur
(PCM) business:
https://www.garlic.com/~lynn/submain.html#360pcm
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: I hate Compaq Newsgroups: comp.arch,comp.os.vms,alt.folklore.computers Date: Mon, 03 Sep 2001 16:11:47 GMTKilgallen@SpamCop.net (Larry Kilgallen) writes:
I rewrote the spooling infrastructure in Pascal running in a virtual machine address space with upcalls out of the kernel into the spool machine to handle unit record/spool operations on behalf of other virtual machines.
The original purpose (of the effort) was to improve the performance of the spooling infrastructure by at least an order of magnitude for the HSDT (high-speed data transport) project i.e. turns out that local node network support depended extensively on the spooling infrastructure (which had become the major thruput bottleneck for high-speed network operations). The objective was an order of magnitude performance improvement ... even taking into account that assembler code was being replaced with Pascal and the code was migrated out of the kernel into virtual address space (both introducing numerous kinds of additional overhead).
Basically, a number of things were done (none of them that couldn't really have been done with kernel assembler code) 1) semantics for asynchronous spool I/O interface was implementated, 2) numerous sequential search operations were replaced with "tree-based" operations, 3) spool records were enhanced to signficantly improve availability and recoverability, 4) kernel was insulated from numerous kinds of spool related errors that previously would have resulted in system failure.
this was deployed on parts of the internal network (the internal network was larger than the whole internet/arpanet for much of its lifetime).
hsdt, networking
https://www.garlic.com/~lynn/subpubkey.html#networking
https://www.garlic.com/~lynn/internet.htm
misc hsdt & spool file rewrite discussion
https://www.garlic.com/~lynn/94.html#22 CP spooling & programming technology
https://www.garlic.com/~lynn/94.html#23 CP spooling & programming technology
https://www.garlic.com/~lynn/94.html#25 CP spooling & programming technology
https://www.garlic.com/~lynn/94.html#31 High Speed Data Transport (HSDT)
https://www.garlic.com/~lynn/94.html#33a High Speed Data Transport (HSDT)
https://www.garlic.com/~lynn/94.html#33b High Speed Data Transport (HSDT)
https://www.garlic.com/~lynn/98.html#49 Edsger Dijkstra: the blackest week of his professional life
https://www.garlic.com/~lynn/98.html#50 Edsger Dijkstra: the blackest week of his professional life
https://www.garlic.com/~lynn/99.html#34 why is there an "@" key?
https://www.garlic.com/~lynn/99.html#115 What is the use of OSI Reference Model?
https://www.garlic.com/~lynn/99.html#201 Middleware - where did that come from?
https://www.garlic.com/~lynn/2000b.html#43 Migrating pages from a paging device (was Re: removal of paging device)
https://www.garlic.com/~lynn/2000b.html#69 oddly portable machines
https://www.garlic.com/~lynn/2000c.html#68 Does the word "mainframe" still have a meaning?
https://www.garlic.com/~lynn/2000e.html#45 IBM's Workplace OS (Was: .. Pink)
https://www.garlic.com/~lynn/2000f.html#31 OT?
https://www.garlic.com/~lynn/2001.html#72 California DMV
https://www.garlic.com/~lynn/2001c.html#66 KI-10 vs. IBM at Rutgers
https://www.garlic.com/~lynn/2001e.html#64 Design (Was Re: Server found behind drywall)
https://www.garlic.com/~lynn/2001f.html#11 Climate, US, Japan & supers query
https://www.garlic.com/~lynn/2001f.html#49 any 70's era supercomputers that ran as slow as today's supercompu
https://www.garlic.com/~lynn/2001g.html#29 any 70's era supercomputers that ran as slow as today's supercomputers?
https://www.garlic.com/~lynn/2001h.html#13 VM: checking some myths.
https://www.garlic.com/~lynn/2001h.html#29 checking some myths.
https://www.garlic.com/~lynn/2001h.html#44 Wired News :The Grid: The Next-Gen Internet?
https://www.garlic.com/~lynn/2001i.html#31 3745 and SNI
https://www.garlic.com/~lynn/2001i.html#41 Withdrawal Announcement 901-218 - No More 'small machines'
https://www.garlic.com/~lynn/2001i.html#52 misc loosely-coupled, sysplex, cluster, supercomputer, & electronic commerce
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: E-commerce security???? Newsgroups: comp.security,comp.security.pgp,alt.computer.security,alt.security,comp.security.unix,comp.security.linux Date: Mon, 03 Sep 2001 23:15:10 GMTNorm writes:
we tried to get various security measures specified:
• physical security for the data processing room, motion detecters, guards, etc • multiple layers of firewalls & packet filtering routers • actual financial transactions performed on backroom dataprocessing equipment away from the actual web server • fbi background checks for all employees • security audits • minimum business & security certification levels.... didn't happen, oh well.
so faced with the prospect that there might someday be 20,000,000 or
so e-commerce servers world-wide and all of them had to be implemented
absolutely perfectly, none of them ever having the slightest security
lapses with either technology or people ... the next choice seemed to
be to eliminate the major source of risk ... i.e. account numbers as a
risk.
https://www.garlic.com/~lynn/2001h.html#61 security proportional to risk
i.e. with security supposedly proportional to risk ... if it wasn't
going to be easy to get ubiquitous security actually proportional to
the risk (with real live security audit and certification for all such
sites) ... then the next choice would be to change the associated risk
... aka the x9.59 solution ... which was done in such a way that it
is applicable to ALL account-based transactions (not just credit, and
not just internet).
https://www.garlic.com/~lynn/
the issue isn't just that even simple things could be done to improve the situation ... the consumer also has no way of telling what sites have implemented what levels of security (even if some sites were to implement even partial measures to improve the situation ... the customer has no way of determining who has implemented what).
some discussion regarding tieing information security implementation
into business risk management and associated business rating
(i.e. analogous to credit risk rating)
https://www.garlic.com/~lynn/aepay3.htm#riskm
https://www.garlic.com/~lynn/aepay3.htm#riskaads
https://www.garlic.com/~lynn/aepay3.htm#x959risk1
https://www.garlic.com/~lynn/aepay3.htm#x959risk2
https://www.garlic.com/~lynn/aepay3.htm#x959risk3
https://www.garlic.com/~lynn/aepay3.htm#x959risk4
longer list of risk & security related discussions
https://www.garlic.com/~lynn/subintegrity.html#fraud
general x9.59 financial standard discussions
https://www.garlic.com/~lynn/subpubkey.html#privacy
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Losing our culture. Newsgroups: alt.folklore.computers Date: Mon, 03 Sep 2001 23:28:56 GMT"John Homes" writes:
Part of the GOTO issue is in some sort of failure/fault situation being able to backtrack the program. Nested conditionals tended to make the process flow more obvious based on the associated conditions/variables i.e. process flow directly dependent on some other explicit language construct ... which isn't present in a simple branch/GOTO. The trick then was placing something in the process flow that made it obvious what paths might have been taken when attempting to backtrack from a failure/fault (even when GOTOs and/or other unconditional branch operations were involved).
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: No Trusted Viewer possible? Newsgroups: comp.security.misc,comp.security.pgp.discuss Date: Tue, 04 Sep 2001 02:23:07 GMTskeptic <Use-Author-Supplied-Address-Header@[127.1]> writes:
the use of digital signatures as part of message authentication is much less problematical ... i.e. assuming that it was correctly originated, then there is little likelyhood that any alteration goes undetected.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: PKI (Public Key Infrastructure) Newsgroups: sci.crypt Date: Tue, 04 Sep 2001 16:30:52 GMT"Novice" writes:
A, B, ... all have a root-key loaded somewhere. "A" requests a certificate for their associated public-key from a CA (that is signed by the root-key ... or have secondary certificate eventually signed by some root-key). "B" requests a corresponding certificate for their associated public-key.
"A" generates a message and digital signs the message. "A" then creates a package of the message, the digital signature and "A's" certificate and sends it to "B".
"B" receives the package, validates "A's" certificate with the root-key (so that it can trust "A's" public key), then it validates the message digital signature using public key from "A's" digital certificate.
here is sample of root-keys/certificaets preloaded into browsers:
https://www.garlic.com/~lynn/aepay4.htm#comcert14
https://www.garlic.com/~lynn/aepay4.htm#comcert16
note that for the majority of the deployed infrastructures ... they aren't full PKIs ... they are subset certificate manufacturing ... full PKIs imply that the certificates are managed and administrated ... aka infrastructure in place so that all possible clients in the world can be notified with regard to revoked &/or compromised certificates.
more discussion on SSL=related certificates
https://www.garlic.com/~lynn/subpubkey.html#sslcerts
discussion of client/server digital signature authentication w/o certificates
https://www.garlic.com/~lynn/subpubkey.html#radius
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: E-commerce security???? Newsgroups: comp.security,comp.security.pgp,alt.computer.security,alt.security,comp.security.unix,comp.security.linux Date: Tue, 04 Sep 2001 17:19:12 GMTAnne & Lynn Wheeler writes:
this further (unnecessarily) propagates (more) privacy information.
X9.59 substitutes AVS with digital signature authentication which eliminates that bit of additional privacy information (in addtion to eliminating account number as a shared-secret exploit).
Hardgood shipments may still require some name&address (although softgoods & various other online services wouldn't) and there are a half-dozen or so hardgood shipment strategies that also eliminates merchant needing to know name&address for shipping.
now, there is an issue of point-of-sale ... and upgrading the magstripe cards with the addition of chips and deploying the readers. some of that is already going on ... but note that the same x9.59 transaction is defined for debit, credit, internet, point-of-sale, etc. Part of the driving force for magstripe card upgrade is that technology advances have been it extremely inexpensive to counterfeit large numbers of magstripe cards. The addition of a chip, significantly raises the bar.
misc. refs:
https://www.garlic.com/~lynn/subpubkey.html#privacy
https://www.garlic.com/~lynn/subintegrity.html#fraud
random specifics
https://www.garlic.com/~lynn/ansiepay.htm#cardsteal Stealing cards easy as Web browsing
https://www.garlic.com/~lynn/ansiepay.htm#breach Security breach raises questions about Internet shopping
https://www.garlic.com/~lynn/ansiepay.htm#theory Security breach raises questions about Internet shopping
https://www.garlic.com/~lynn/aepay6.htm#fraud Online Card Fraud Thirty Times That Offline
https://www.garlic.com/~lynn/aepay6.htm#ccfraud latest credit scam puts plastic in peril ... is your credit card being cloned?
https://www.garlic.com/~lynn/2001f.html#31 Remove the name from credit cards!
https://www.garlic.com/~lynn/2001f.html#35 Security Concerns in the Financial Services Industry
https://www.garlic.com/~lynn/2001f.html#40 Remove the name from credit cards!
https://www.garlic.com/~lynn/aepay6.htm#ccfraud2 "out of control credit card fraud"
https://www.garlic.com/~lynn/aepay6.htm#ccfraud3 "out of control credit card fraud"
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: PKI (Public Key Infrastructure) Newsgroups: sci.crypt Date: Tue, 04 Sep 2001 19:19:43 GMT"Novice" writes:
if encrypting the message, the sender obtains the recipient's public key from the recipient's digital certificate which the recipient had previously transmitted to the sender in a digital signed message (i.e. the previous description).
using the recipeint's public key (from the recipient's digital certificate, from a previously digitally signed message), the sender typically will encrypt a random secret key and then use the random secret key to actually encrypt the message. The sender will package up the publickey-encrypted random-secretkey and the secretkey-encrypted message and transmit it to the recipient. Typically, the sender may also digital sign the message (before encrypting) .. as prior previous posting.
Above is similar to the most common deployed existing certificate manufacturing infrastructure (aka PKI-subset) ... SSL domain name server operation.
However, there are lots of other ways of deploying public key operations ... PGP being one such example.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: PKI (Public Key Infrastructure) Newsgroups: sci.crypt Date: Tue, 04 Sep 2001 22:01:45 GMT"Novice" writes:
CA stands for "certification authority" ... they typically generate a certificate that represents some attribute (like identity) that they certify as having some relationship to a public key.
With PGP ... I can append my public key to my email and the recipient possibly uses some method to verify that the email with the public key actually came from me.
This is in fact, effectively what a CA (certification authority) is doing when it obtains a person's public key from the person (before any certificate is manufactured). This may be referred to as the registration part of the certification authority business process.
However, as in the PGP example, everybody could be their own registration authority ... and a certificate need never, ever be manufactured.
Effectively this is similar to the RADIUS and banking scenerios where "registration authority" of a public key is performed in much the same way that passwords and/or PINs are registered today.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: OT - Internet Explorer V6.0 Newsgroups: bit.listserv.ibm-main,comp.lang.cobol Date: Wed, 05 Sep 2001 18:34:23 GMT"Editor" writes:
we attempted to do various things with SCI standard in the very early 90s but didn't get very far at the time.
random refs:
https://www.garlic.com/~lynn/96.html#8 Why Do Mainframes Exist ???
https://www.garlic.com/~lynn/96.html#25 SGI O2 and Origin system announcements
https://www.garlic.com/~lynn/98.html#40 Comparison Cluster vs SMP?
https://www.garlic.com/~lynn/2001b.html#39 John Mashey's greatest hits
https://www.garlic.com/~lynn/2001b.html#85 what makes a cpu fast
https://www.garlic.com/~lynn/2001f.html#11 Climate, US, Japan & supers query
misc. other
https://www.garlic.com/~lynn/subtopic.html#smp
https://www.garlic.com/~lynn/subtopic.html#hacmp
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Parity - why even or odd (was Re: Load Locked (was: IA64 running out of steam)) Newsgroups: comp.arch,alt.folklore.computers Date: Thu, 06 Sep 2001 13:53:36 GMTjcmorris@mitre.org (Joe Morris) writes:
The 3081 had a UC.5 (a particular microprocessor also used in a number of other places, 8100, 3705, etc) as a "service processor". The 3090 had a pair of 4361s (small 370s, running a special version of vm/370 release 6) as the service processor (aka the service processors were redundant). One of the 4361 service processor would be the one to phone home.
I believe the 3090 had 64/80 ECC memory ... detect all 16 bit errors and correct all 15 bit errors.
misc. refs:
https://www.garlic.com/~lynn/96.html#41 IBM 4361 CPU technology
https://www.garlic.com/~lynn/99.html#61 Living legends
https://www.garlic.com/~lynn/99.html#62 Living legends
https://www.garlic.com/~lynn/99.html#63 System/1 ?
https://www.garlic.com/~lynn/99.html#106 IBM Mainframe Model Numbers--then and now?
https://www.garlic.com/~lynn/99.html#108 IBM 9020 computers used by FAA (was Re: EPO stories (was: HELP IT'S HOT!!!!!))
https://www.garlic.com/~lynn/99.html#239 IBM UC info
https://www.garlic.com/~lynn/2000b.html#50 VM (not VMS or Virtual Machine, the IBM sort)
https://www.garlic.com/~lynn/2000b.html#51 VM (not VMS or Virtual Machine, the IBM sort)
https://www.garlic.com/~lynn/2000b.html#66 oddly portable machines
https://www.garlic.com/~lynn/2000b.html#69 oddly portable machines
https://www.garlic.com/~lynn/2000b.html#79 "Database" term ok for plain files?
https://www.garlic.com/~lynn/2000c.html#76 Is a VAX a mainframe?
https://www.garlic.com/~lynn/2000d.html#26 Superduper computers--why RISC not 390?
https://www.garlic.com/~lynn/2001b.html#75 Z/90, S/390, 370/ESA (slightly off topic)
https://www.garlic.com/~lynn/2001b.html#83 Z/90, S/390, 370/ESA (slightly off topic)
https://www.garlic.com/~lynn/2001f.html#44 Golden Era of Compilers
https://www.garlic.com/~lynn/2001h.html#2 Alpha: an invitation to communicate
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Parity - why even or odd (was Re: Load Locked (was: IA64 running out of steam)) Newsgroups: alt.folklore.computers Date: Thu, 06 Sep 2001 15:14:27 GMTjcmorris@mitre.org (Joe Morris) writes:
The 67 was effictively a 360/m65 with addition of virtual memory hardware and a fully associative TLB (table lookaside buffer) for hardware virtual memory address resolution. When running in virtual memory mode, the TLB look-up added 150us to all address cycles (virtual memory mode on 360/m67 turned it into 900us machine).
A lot of the 360m67s spent much of their time running in 360m65 mode (for the most part, os/360 ran identical on 360m67 & 360m65).
The 360m67 SMP was a different beast tho from the 360m65. The 360m65 SMP was basically two 360m65 uniprocessors bolted together so that they had common addressing for all memory (or could be partitioned two uniprocessor and each processor had half the real memory).
The 360m67 SMP had special tri-ported memory and a channel director. The tri-ported memory gave each processor and the I/O channel director independent paths to memory. The tri-ported memory introduced something like an extra 10% latency in memory operations (i.e. 750us to 825us or so, my memory is little weak on this value).
It was also possible to split 360m67 SMP into approximately two independent uni-processors ... however there was still the hardware memory latency difference between the normal 65/67 and a SMP 67 (i.e. numerical intensive operations ran slower on SMP 67 whether it was configured as a up or a SMP ... compared to 65 (uniprocessor or smp) or a uniprocessor 67. However, in workload mix that was 100% cpu and heavy i/o activity ... a "half-duplex" 67 had higher thruput than a uniprocessor 65/67. The standard memory bus with single port resulting in memory bus contention between the processor and I/O (slowing down the processor). The "duplex" memory bus while having slightly higher initial latency resulted in much lower memory bus contention when concurrent I/O and CPU accesses were involved.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Parity - why even or odd (was Re: Load Locked (was: IA64 running out of steam)) Newsgroups: alt.folklore.computers Date: Thu, 06 Sep 2001 18:55:57 GMTNeil Franklin writes:
360m50 was 2microseconds ... 2byte-wide
bulk (add-on) memory (8mbytes) from Ampex that could be attached to 360m50, 360m65, etc was 8microsecond memory.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: OT - Internet Explorer V6.0 Newsgroups: bit.listserv.ibm-main,comp.lang.cobol,alt.folklore.computers Date: Thu, 06 Sep 2001 19:33:16 GMTCharles writes:
My counter-argument was that the vast majority of the IBM/PC sales were into business (i.e. for a whole slew of reasons, personal computing wasn't really ready from the general, novice consumer market) .... possibly by a ratio of 10:1. A big factor in that was having mainframe terminal emulation on the PC ... so there was a single desk footprint ... aka with a single screen, keyboard, box, a person could both do local computing as well as do their mainframe accesses (aka a big factor in early IBM/PC market penetration was that it had at least some local computing capability and also could act as an ibm mainframe terminal). Being able to establish a (then) huge install base on the basis of single keyboard on the desk (capable of both mainframe & local computing) .. that created critical mass for motivating more applications to be written for the IBM/PC ... which started the snowball effect; once the initial base was established, then more applications were written, which increased the value proposition for having a PC, leading to further increases in the install base, motivating even more application development.
This characteristic allowed some graceful transition from mainframe centric operation to incremental local applications. The problem by the late '80s was the migration was starting to accelerate for both processor-centric applications as well as data-centric applications.
This was creating a horrible bind in corporate america ... the local computing processing power was a transient type of activity ... but when some of the corporate jewels (like finance data) started migrating to PCs & PC disks there were some serious episodes of disk failure and lost data that seriously impacted business operations.
At the same time, there was an internal corporate battle going on. The disk storage division generated a report that the head of the communication division was going to be personally responsible for the demise of the disk storage division. The 2nd level detail was that the disk storage division had come up with a number of very effective solutions that supported PC accessing mainframe resident data. The communication division was non-concurring on all such offerings ... effectively attempting to maintain that all PC mainframe access had to be channeled thru the communication division's terminal (emulation) products. The lack of bandwidth and function of the communication division's terminal (emulation) was accelerating the migration of data off the mainframe. That migration was also significantly increasing the risks & business continuity exposures of corporate american (since critical corporate assets were now resident on platforms that lacked any business continuity &/or disaster recovery scenerios).
Siding with the communication divison was the mainframe processor SAA strategy which could be interpreted as 1) all application could executed at either the mainframe or the PC ... and once that was achieved 2) some of the mainframe->PC processor migration could be reversed. The shortcoming was that there was some really valid reasons for much of the mainframe->PC processing migration; but an optimal business strategy would be to do it in such a way that critical business assets (aka information & data) could continue to reside at the mainframe.
The shortcoming is that once the PC began using the terminal emulation interface as a graceful migration & market penetration ... it later became a nearly impossible (internal) business problem to offer something that would take business away from the division responsible for terminal emulation (even if that limitation eventually resulted in significant, overall loss of business to the company).
From corporate america standpoint, I believe in the mid-90s there was some study that said that companies that had (non-backed up) disk failures with critical corporate assets, 50 percent went bankrupt within the first month (corporate assets could be billing file, accounts receivable, etc ... which could seriously impact a month's cash flow).
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: I hate Compaq Newsgroups: comp.arch,alt.folklore.computers Date: Thu, 06 Sep 2001 20:53:56 GMTname99@mac.com (Maynard Handley) writes:
In the 70s, the "normal" machines were uniprocessor and two-processor SMPs had the 10-15% performance (i.e. a two processor was rated at best at 1.8times the instruction rate of a uniprocessor, not two times, all of this was due to cache consistency).
One could make the argument that one majors issue of the 801/risk architecture from the 70s that lacked cache consistency provisions ... was a re-action to the experience in designing cache-consistent mainframes.
So we cycle up to the start of the '80s with the 3081. The 3081 was going to only be available in 2-way (and 4-way; a pair of 3081s in a 3084 configuration).
However, there was some relatively important (but not widely deployed) operating system at the time ... which was ACP/TPF ... i.e. transaction processing factility aka airline control program which didn't have SMP support. It tended to be a few highly tuned, extremely high transaction rate, processor bound environment ... that carried the majority of the world's airline reservations (as well as supporting misc. other high transaction rate oriented businesses).
An ACP/TPF running on a 3081 in uniprocessor mode ... still had the 15% cache consistency performance penalty. The issue wasn't so much the cost of the unused hardware that led to the 3083 ... it was that ACP/TPF needed the additional 15% performance boost that came with eliminating the cache consistency cycles. The lack of SMP support in ACP/TPF giving rise to the 3083 is (at least) partially orthogonal to mainframes getting really scalable cache consistency implementations.
The very strong memory consistency and the distances between the caches ... made it hard to even limit the 3084 4-way to just a 15% performance penalty (in part, they ran the cache hardware cycle at faster than the machine cycle). This all further aggravated the 801/risc tendency towards avoiding cache consistency protocols all together.
The skunk works that my wife and I ran was both involved in SCI for scaleable SMP support as well as I/O-based clustering (including fiber-channel) ... the problem we had in the late '80s & early '90s is that the 801/POWER chips were so far over on not supporting cache consistency that there was no possible implementation (live oak was a 4-way RSC/.9 POWER ... but side-stepped the cache consistency issue by be able to mark segments as non-cachable ... i.e. if it was necessary to share data between processors ... don't cache it at all).
random refs:
https://www.garlic.com/~lynn/subtopic.html#smp
https://www.garlic.com/~lynn/subtopic.html#hacmp
https://www.garlic.com/~lynn/99.html#54 Fault Tolerance
https://www.garlic.com/~lynn/99.html#68 The Melissa Virus or War on Microsoft?
https://www.garlic.com/~lynn/99.html#71 High Availabilty on S/390
https://www.garlic.com/~lynn/99.html#128 Examples of non-relational databases
https://www.garlic.com/~lynn/99.html#152 Uptime (was Re: Q: S/390 on PowerPC?)
https://www.garlic.com/~lynn/99.html#182 Clustering systems
https://www.garlic.com/~lynn/99.html#183 Clustering systems
https://www.garlic.com/~lynn/99.html#184 Clustering systems
https://www.garlic.com/~lynn/99.html#185 Clustering systems
https://www.garlic.com/~lynn/99.html#186 Clustering systems
https://www.garlic.com/~lynn/2000.html#31 Computer of the century
https://www.garlic.com/~lynn/2000.html#64 distributed locking patents
https://www.garlic.com/~lynn/2000.html#78 Mainframe operating systems
https://www.garlic.com/~lynn/2000b.html#65 oddly portable machines
https://www.garlic.com/~lynn/2000c.html#4 TF-1
https://www.garlic.com/~lynn/2000c.html#9 Cache coherence [was Re: TF-1]
https://www.garlic.com/~lynn/2000c.html#14 thread scheduling and cache coherence traffic
https://www.garlic.com/~lynn/2000c.html#19 Hard disks, one year ago today
https://www.garlic.com/~lynn/2000c.html#56 Does the word "mainframe" still have a meaning?
https://www.garlic.com/~lynn/2000c.html#68 Does the word "mainframe" still have a meaning?
https://www.garlic.com/~lynn/2000d.html#31 RS/6000 vs. System/390 architecture?
https://www.garlic.com/~lynn/2000e.html#7 Ridiculous
https://www.garlic.com/~lynn/2000e.html#8 Is a VAX a mainframe?
https://www.garlic.com/~lynn/2000e.html#9 Checkpointing (was spice on clusters)
https://www.garlic.com/~lynn/2000e.html#22 Is a VAX a mainframe?
https://www.garlic.com/~lynn/2000e.html#49 How did Oracle get started?
https://www.garlic.com/~lynn/2000g.html#27 Could CDR-coding be on the way back?
https://www.garlic.com/~lynn/2000g.html#38 4M pages are a bad idea (was Re: AMD 64bit Hammer CPU and VM)
https://www.garlic.com/~lynn/2000g.html#43 4M pages are a bad idea (was Re: AMD 64bit Hammer CPU and VM)
https://www.garlic.com/~lynn/2001.html#26 Disk caching and file systems. Disk history...people forget
https://www.garlic.com/~lynn/2001.html#33 Where do the filesystem and RAID system belong?
https://www.garlic.com/~lynn/2001.html#36 Where do the filesystem and RAID system belong?
https://www.garlic.com/~lynn/2001.html#38 Competitors to SABRE?
https://www.garlic.com/~lynn/2001.html#40 Disk drive behavior
https://www.garlic.com/~lynn/2001.html#64 Are the L1 and L2 caches flushed on a page fault ?
https://www.garlic.com/~lynn/2001b.html#11 Review of the Intel C/C++ compiler for Windows
https://www.garlic.com/~lynn/2001b.html#14 IBM's announcement on RVAs
https://www.garlic.com/~lynn/2001b.html#15 Linux IA-64 interrupts [was Re: Itanium benchmarks ...]
https://www.garlic.com/~lynn/2001b.html#35 John Mashey's greatest hits
https://www.garlic.com/~lynn/2001b.html#60 monterey's place in computing was: Kildall "flying" (was Re: First OS?)
https://www.garlic.com/~lynn/2001c.html#66 KI-10 vs. IBM at Rutgers
https://www.garlic.com/~lynn/2001c.html#69 Wheeler and Wheeler
https://www.garlic.com/~lynn/2001d.html#26 why the machine word size is in radix 8??
https://www.garlic.com/~lynn/2001d.html#70 Pentium 4 Prefetch engine?
https://www.garlic.com/~lynn/2001d.html#71 Pentium 4 Prefetch engine?
https://www.garlic.com/~lynn/2001e.html#2 Block oriented I/O over IP
https://www.garlic.com/~lynn/2001e.html#4 Block oriented I/O over IP
https://www.garlic.com/~lynn/2001e.html#5 SIMTICS
https://www.garlic.com/~lynn/2001e.html#14 Climate, US, Japan & supers query
https://www.garlic.com/~lynn/2001f.html#21 Theo Alkema
https://www.garlic.com/~lynn/2001f.html#39 Ancient computer humor - DEC WARS
https://www.garlic.com/~lynn/2001f.html#60 JFSes: are they really needed?
https://www.garlic.com/~lynn/2001g.html#43 The Alpha/IA64 Hybrid
https://www.garlic.com/~lynn/2001g.html#44 The Alpha/IA64 Hybrid
https://www.garlic.com/~lynn/2001g.html#46 The Alpha/IA64 Hybrid
https://www.garlic.com/~lynn/2001g.html#49 Did AT&T offer Unix to Digital Equipment in the 70s?
https://www.garlic.com/~lynn/2001g.html#52 Compaq kills Alpha
https://www.garlic.com/~lynn/2001h.html#26 TECO Critique
https://www.garlic.com/~lynn/2001h.html#59 Blinkenlights
https://www.garlic.com/~lynn/2001h.html#76 Other oddball IBM System 360's ?
https://www.garlic.com/~lynn/2001i.html#41 Withdrawal Announcement 901-218 - No More 'small machines'
https://www.garlic.com/~lynn/2001i.html#43 Withdrawal Announcement 901-218 - No More 'small machines'
https://www.garlic.com/~lynn/2001i.html#46 Withdrawal Announcement 901-218 - No More 'small machines'
https://www.garlic.com/~lynn/2001i.html#48 Withdrawal Announcement 901-218 - No More 'small machines'
https://www.garlic.com/~lynn/2001i.html#52 misc loosely-coupled, sysplex, cluster, supercomputer, & electronic commerce
https://www.garlic.com/~lynn/2001j.html#3 YKYGOW...
https://www.garlic.com/~lynn/2001j.html#4 I hate Compaq
https://www.garlic.com/~lynn/2001j.html#12 OT - Internet Explorer V6.0
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: I hate Compaq Newsgroups: comp.arch,alt.folklore.computers Date: Fri, 07 Sep 2001 00:30:14 GMTTom Van Vleck writes:
most recent VAMPS overview (posted here 18aug)
https://www.garlic.com/~lynn/2001i.html#2
however some number of people were uncomfortable with the approach and after a couple software releases changed the implementation and put in a more traditional locking, queuing, and signalling SMP design ... which drove the SMP "software" overhead to 10-15% of each processor ... i.e. traditional 2-way 370 SMP would have 1.8 times hardware thruput of a uniprocessor (because of the cache coherency protocol slowing down each cpu by 10% ... not even taking into account any actual cross-cache line trashing overhead). With the later version software change in VM ... system thruput was reduced to about 1.5 times thruput of uniprocessor running the same workload (each processor slow down was 10% plus another 15% of each processor tied up in various kernel SMP related operations).
I was involved in an attempt to build a 16-way 370/158 ... which was chugging along pretty good until the head of POK was informed that MVS SMP support was still limited to 2-way at the time (i.e. it is either "me" or the one other cpu) and then (effectively) threatened to fire everybody involved in the 16-way project.
The 3081/3084 finally saw MVS SMP support finally extended to >2-way. The 3081/3084 also saw a lot of effort go into minimizing cache-line thrashing. Storage allocation was redone to be cache-line sensitive and various modules with internal variables were redone to separate various things into different cache lines, various control blocks redone to separate certain critical variables into different cache lines. This didn't eliminate cache-line thrashing when different CPUs needed the same variable ... but at least it mitigated cache-line thrashin when different CPUs needed different variables that happened to reside in the same cache line.
smp & cluster refs:
https://www.garlic.com/~lynn/subtopic.html#smp
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: I hate Compaq Newsgroups: comp.arch,alt.folklore.computers Date: Fri, 07 Sep 2001 00:52:31 GMTAnne & Lynn Wheeler writes:
the issue was that standard 370 of the era took big cache-miss penalties on interrupts ... i.e. application program chugging along just fine and in comes a I/O interrupt which jumps into the kernel, handles the I/O and eventually preculates back to the application. An implicit side-effect of the way that some of the code executed on a 2-way, in a large number of situations tended to keep the kernel execution on the same processor (w/o bottlenecking on a kernel lock) that it was already executing on (a kind of processor afinity). The improvement in cache-hit efficiency (corresponding reduction in cache-miss inefficeincy) would result in greater than twice the thruput of a uniprocessor (even tho the native hardware was effectively only 1.8 times that of a uniprocessor).
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: OT - Internet Explorer V6.0 Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Fri, 07 Sep 2001 14:16:08 GMTLars Poulsen writes:
the T/R people were doing 16mbit T/R theoritical comparisons against a old-style e-net theoritical comparison (3mbit/sec e-net that didn't have listen before transmit). The SAA people that wanted to see client/server start to be much more server-based were also upset.
misc. 3-layer architecture references
https://www.garlic.com/~lynn/96.html#16 middle layer
https://www.garlic.com/~lynn/96.html#17 middle layer
https://www.garlic.com/~lynn/98.html#50 Edsger Dijkstra: the blackest week of his professional life
https://www.garlic.com/~lynn/99.html#123 Speaking of USB ( was Re: ASR 33 Typing Element)
https://www.garlic.com/~lynn/99.html#124 Speaking of USB ( was Re: ASR 33 Typing Element)
https://www.garlic.com/~lynn/99.html#201 Middleware - where did that come from?
https://www.garlic.com/~lynn/99.html#202 Middleware - where did that come from?
https://www.garlic.com/~lynn/2000.html#32 Homework: Negative side of MVS?
https://www.garlic.com/~lynn/2000b.html#8 "Mainframe" Usage
https://www.garlic.com/~lynn/2000b.html#11 "Mainframe" Usage
https://www.garlic.com/~lynn/2000e.html#45 IBM's Workplace OS (Was: .. Pink)
https://www.garlic.com/~lynn/2000f.html#27 OT?
https://www.garlic.com/~lynn/2000f.html#38 Ethernet efficiency (was Re: Ms employees begging for food)
https://www.garlic.com/~lynn/2000f.html#39 Ethernet efficiency (was Re: Ms employees begging for food)
https://www.garlic.com/~lynn/2001d.html#69 Block oriented I/O over IP
there were a couple of e-net articles in '88 ACM SIGCOMM with regard to typical e-net adapter card thruput being around 95% of media thruput ... and typical aggregate e-net thruput being at 95% of media thruput dropping off to around 85% of media thruput under some worse=case scenerios (typical LAN with all nodes in tight device-driver loop transmitting minimum sized packets as fast as possible).
by comparison the typical 16mbit t/r card sustained thruput was around under 2mbit/sec ... and typical aggregate 16mbit t/r media was less than 1/2 media thruput. The Austin group had done a custom ISA 4mbit t/r card for the PC/RT ... but the whole corporation had to use the PS/2 microchannel 16mbit t/r card. The PS/2 microchannel 16mbit T/R card had lower (per card) sustained thruput than the Austin ISA 4mbit T/R card.
Part of the issue was that both client/server as well as 3-layer have asymmetric traffic flows (i.e. some server has to see the aggregate traffic of all its individual clients) while all the 16mbit T/R cards (even the ones in 370 controllers) were essentially the same, targeted at effectively random, symmetrical traffic flows ... no single node seeing any more traffic than any other node.
misc sigcomm refs
https://www.garlic.com/~lynn/2000f.html#38 Ethernet efficiency (was Re: Ms employees begging for food)
https://www.garlic.com/~lynn/2000f.html#39 Ethernet efficiency (was Re: Ms employees begging for food)
the other issue was that SNA didn't have any networking protocol/layer ... as a result T/R had to be all bridged (all nodes effectively had to see all broadcasts). By comparison, TCP/IP with a network layer allowed for routers so that all segments didn't have to see all broadcasts. The twisted-pair enet standard even ran over the same CAT4 wiring that might have been originally installed for T/R.
I had worked on the original mainframe TCP/IP support and had done the RFC 1044 support doing some tuning of the thruput at cray research between a 4341 and a cray. The nominal mainframe TCP/IP support at the time would just about consume a single 3090 processor doing 44kbytes/sec. By comparison, the 1044 support on the 4341 ran with lots of waitstate doing channel thruput (1mbyte/sec) transfers to the cray.
random tcp/ip refs:
https://www.garlic.com/~lynn/subnetwork.html#hsdt
https://www.garlic.com/~lynn/2001i.html#52 misc loosely-coupled, sysplex, cluster, supercomputer, & electronic commerce
https://www.garlic.com/~lynn/subpubkey.html#networking
https://www.garlic.com/~lynn/93.html#28 Log Structured filesystems -- think twice
https://www.garlic.com/~lynn/93.html#30 /etc/sendmail.cf UUCP routing
https://www.garlic.com/~lynn/96.html#14 mainframe tcp/ip
https://www.garlic.com/~lynn/96.html#15 tcp/ip
https://www.garlic.com/~lynn/96.html#17 middle layer
https://www.garlic.com/~lynn/96.html#32 Mainframes & Unix
https://www.garlic.com/~lynn/96.html#34 Mainframes & Unix
https://www.garlic.com/~lynn/98.html#18 Reviving the OS/360 thread (Questions about OS/360)
https://www.garlic.com/~lynn/98.html#34 ... cics ... from posting from another list
https://www.garlic.com/~lynn/98.html#49 Edsger Dijkstra: the blackest week of his professional life
https://www.garlic.com/~lynn/98.html#50 Edsger Dijkstra: the blackest week of his professional life
https://www.garlic.com/~lynn/99.html#36 why is there an "@" key?
https://www.garlic.com/~lynn/99.html#40 [netz] History and vision for the future of Internet - Public Question
https://www.garlic.com/~lynn/99.html#46 Internet and/or ARPANET?
https://www.garlic.com/~lynn/99.html#48 Language based exception handling. (Was: Did Intel pay UGS to kill Alpha port? Or Compaq simply doesn't care?)
https://www.garlic.com/~lynn/99.html#114 What is the use of OSI Reference Model?
https://www.garlic.com/~lynn/99.html#115 What is the use of OSI Reference Model?
https://www.garlic.com/~lynn/99.html#123 Speaking of USB ( was Re: ASR 33 Typing Element)
https://www.garlic.com/~lynn/99.html#158 Uptime (was Re: Q: S/390 on PowerPC?)
https://www.garlic.com/~lynn/99.html#159 Uptime (was Re: Q: S/390 on PowerPC?)
https://www.garlic.com/~lynn/99.html#183 Clustering systems
https://www.garlic.com/~lynn/2000.html#50 APPC vs TCP/IP
https://www.garlic.com/~lynn/2000.html#51 APPC vs TCP/IP
https://www.garlic.com/~lynn/2000.html#53 APPC vs TCP/IP
https://www.garlic.com/~lynn/2000.html#90 Ux's good points.
https://www.garlic.com/~lynn/2000b.html#1 "Mainframe" Usage
https://www.garlic.com/~lynn/2000b.html#4 "Mainframe" Usage
https://www.garlic.com/~lynn/2000b.html#5 "Mainframe" Usage
https://www.garlic.com/~lynn/2000b.html#8 "Mainframe" Usage
https://www.garlic.com/~lynn/2000b.html#10 "Mainframe" Usage
https://www.garlic.com/~lynn/2000b.html#45 OSA-Express Gigabit Ethernet card planning
https://www.garlic.com/~lynn/2000b.html#59 7 layers to a program
https://www.garlic.com/~lynn/2000b.html#79 "Database" term ok for plain files?
https://www.garlic.com/~lynn/2000c.html#27 The first "internet" companies?
https://www.garlic.com/~lynn/2000c.html#29 The first "internet" companies?
https://www.garlic.com/~lynn/2000c.html#31 The first "internet" companies?
https://www.garlic.com/~lynn/2000c.html#54 WHAT IS A MAINFRAME???
https://www.garlic.com/~lynn/2000c.html#58 Disincentives for MVS & future of MVS systems programmers
https://www.garlic.com/~lynn/2000c.html#59 Does the word "mainframe" still have a meaning?
https://www.garlic.com/~lynn/2000c.html#60 Disincentives for MVS & future of MVS systems programmers
https://www.garlic.com/~lynn/2000d.html#41 TCP/IP Suite of Protocols - dumb question ...
https://www.garlic.com/~lynn/2000d.html#43 Al Gore: Inventing the Internet...
https://www.garlic.com/~lynn/2000d.html#54 NCP Help (re (D)ARPANET)
https://www.garlic.com/~lynn/2000d.html#55 NCP v TCP/IP
https://www.garlic.com/~lynn/2000d.html#63 Is Al Gore The Father of the Internet?
https://www.garlic.com/~lynn/2000d.html#67 Is Al Gore The Father of the Internet?^
https://www.garlic.com/~lynn/2000d.html#70 When the Internet went private
https://www.garlic.com/~lynn/2000d.html#72 When the Internet went private
https://www.garlic.com/~lynn/2000d.html#77 Is Al Gore The Father of the Internet?^
https://www.garlic.com/~lynn/2000e.html#5 Is Al Gore The Father of the Internet?^
https://www.garlic.com/~lynn/2000e.html#28 Is Al Gore The Father of the Internet?^
https://www.garlic.com/~lynn/2000e.html#30 Is Tim Berners-Lee the inventor of the web?
https://www.garlic.com/~lynn/2000f.html#30 OT?
https://www.garlic.com/~lynn/2000f.html#31 OT?
https://www.garlic.com/~lynn/2000f.html#79 Cryptogram Newsletter is off the wall?
https://www.garlic.com/~lynn/2001b.html#81 36-bit MIME types, PDP-10 FTP
https://www.garlic.com/~lynn/2001c.html#5 what makes a cpu fast
https://www.garlic.com/~lynn/2001d.html#46 anyone have digital certificates sample code
https://www.garlic.com/~lynn/2001d.html#63 Pentium 4 Prefetch engine?
https://www.garlic.com/~lynn/2001d.html#65 Pentium 4 Prefetch engine?
https://www.garlic.com/~lynn/2001d.html#69 Block oriented I/O over IP
https://www.garlic.com/~lynn/2001e.html#8 Blame it all on Microsoft
https://www.garlic.com/~lynn/2001e.html#16 Pre ARPAnet email?
https://www.garlic.com/~lynn/2001e.html#17 Pre ARPAnet email?
https://www.garlic.com/~lynn/2001e.html#24 Pre ARPAnet email?
https://www.garlic.com/~lynn/2001e.html#32 Blame it all on Microsoft
https://www.garlic.com/~lynn/2001e.html#34 Blame it all on Microsoft
https://www.garlic.com/~lynn/2001e.html#52 Pre ARPAnet email?
https://www.garlic.com/~lynn/2001f.html#20 VM-CMS emulator
https://www.garlic.com/~lynn/2001f.html#22 Early AIX including AIX/370
https://www.garlic.com/~lynn/2001g.html#33 Did AT&T offer Unix to Digital Equipment in the 70s?
https://www.garlic.com/~lynn/2001h.html#13 VM: checking some myths.
https://www.garlic.com/~lynn/2001h.html#44 Wired News :The Grid: The Next-Gen Internet?
https://www.garlic.com/~lynn/2001i.html#5 YKYGOW...
https://www.garlic.com/~lynn/2001i.html#6 YKYGOW...
https://www.garlic.com/~lynn/2001i.html#21 3745 and SNI
https://www.garlic.com/~lynn/2001i.html#31 3745 and SNI
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Parity - why even or odd (was Re: Load Locked Newsgroups: comp.arch,alt.folklore.computers Date: Fri, 07 Sep 2001 14:21:58 GMTjcmorris@mitre.org (Joe Morris) writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Title Inflation Newsgroups: alt.folklore.computers Date: Fri, 07 Sep 2001 15:43:19 GMTCharles Richmond writes:
On the other hand, i had one of the first business cards with an email address.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: OT - Internet Explorer V6.0 Newsgroups: bit.listserv.ibm-main,comp.lang.cobol,alt.folklore.computers Date: Fri, 07 Sep 2001 17:12:33 GMT"Editor" writes:
in the late '80s ... after something like 20 years in the mainframe space, my wife and i started doing clustering on "commodity" priced platforms (she had done stint in POK in charge of loosely-coupled architecture and originated Peer-Coupled Shared Data ... later basis for ims hot-standby & sysplex). some number of the biggest current proponents of clusters were some of staunchest advisaries at the time.
we were also doing things like disaster survivability & geographic survivability (terms we had coined). we got a chance to author sections of the corporate continuous availability strategy document ... but both rochester & POK non-concurred ... and most of our stuff was pulled from the document.
random refs:
https://www.garlic.com/~lynn/subtopic.html#hacmp
https://www.garlic.com/~lynn/99.html#47 Language based exception handling. (Was: Did Intel pay UGS to kill Alpha port? Or Compaq simply doesn't care?)
https://www.garlic.com/~lynn/99.html#71 High Availabilty on S/390
https://www.garlic.com/~lynn/99.html#104 Fixed Head Drive (Was: Re:Power distribution (Was: Re: A primeval C compiler)
https://www.garlic.com/~lynn/99.html#128 Examples of non-relational databases
https://www.garlic.com/~lynn/2001d.html#47 Just a guick remembrance of where we all came from
https://www.garlic.com/~lynn/2001g.html#44 The Alpha/IA64 Hybrid
https://www.garlic.com/~lynn/2001i.html#41 Withdrawal Announcement 901-218 - No More 'small machines'
https://www.garlic.com/~lynn/2001i.html#48 Withdrawal Announcement 901-218 - No More 'small machines'
https://www.garlic.com/~lynn/2001i.html#49 Withdrawal Announcement 901-218 - No More 'small machines'
a big factor in iron cost started being volume (lots of huge up-front costs that had to be amortized across the pieces).
in the mid-80s, I once observed that a $300 CDROM player had more advanced technology than a $20,000 fiber-optic modem, claiming that I could essentially build a better fiber-optic modem from parts out of a $300 CDROM (in fact there were then some fiber-optic modems built from essentially CDROM optical drivers, the 6000 SLA was essentially a 10% faster escon ... running full-duplex instead of half-duplex, and optical drivers cost that were at least 1/10th that of escon's).
random escon/sla refs:
https://www.garlic.com/~lynn/96.html#5 360 "channels" and "multiplexers"?
https://www.garlic.com/~lynn/96.html#15 tcp/ip
https://www.garlic.com/~lynn/2000d.html#14 FW: RS6000 vs IBM Mainframe
https://www.garlic.com/~lynn/2000f.html#31 OT?
https://www.garlic.com/~lynn/2000g.html#50 Egghead cracked, MS IIS again
https://www.garlic.com/~lynn/2001.html#12 Small IBM shops
https://www.garlic.com/~lynn/2001.html#18 Disk caching and file systems. Disk history...people forget
https://www.garlic.com/~lynn/2001.html#46 Small IBM shops
https://www.garlic.com/~lynn/2001e.html#22 High Level Language Systems was Re: computer books/authors (Re: FA:
in the late '80s there was big government push in the HDTV area ... the commerce department essentially taking the position if non-US corporations dominated HDTV area ... that the associated technology volumes would allow them to then dominate all aspects of electronics hi-tech industry.
some random HDTV refs:
https://www.garlic.com/~lynn/2000e.html#11 Is Al Gore The Father of the Internet?^
https://www.garlic.com/~lynn/2001.html#73 how old are you guys
https://www.garlic.com/~lynn/2001b.html#2 FCC rulemakings on HDTV
Effectively, the volumes associated with consumer electronics provided sufficient R&D funding that they could pass the pure hitech computer industry ... aka the volumes could drive design of better, faster, & less expensive chips.
There were some issues with quality ... but once the volumes got large enuf, many areas started finding that it was cheaper to put a lot of upfront costs into quality than the costs of the associated trouble calls & returns (commodity priced disks going from MTBF of 40k hours to 800k hours). In the disk area, if RAID was then layered on top, it really became a no-contest.
some random MTBF refs:
https://www.garlic.com/~lynn/94.html#8 scheduling & dynamic adaptive ... long posting warning
https://www.garlic.com/~lynn/94.html#16 Dual-ported disks?
https://www.garlic.com/~lynn/95.html#3 What is an IBM 137/148 ???
https://www.garlic.com/~lynn/99.html#54 Fault Tolerance
https://www.garlic.com/~lynn/99.html#73 The Chronology
https://www.garlic.com/~lynn/99.html#97 Power4 = 2 cpu's on die?
https://www.garlic.com/~lynn/2001.html#32 Competitors to SABRE?
https://www.garlic.com/~lynn/2001.html#34 Competitors to SABRE?
https://www.garlic.com/~lynn/2001.html#37 Competitors to SABRE?
https://www.garlic.com/~lynn/2001.html#38 Competitors to SABRE?
https://www.garlic.com/~lynn/2001b.html#82 Disks size growing while disk count shrinking = bad performance
https://www.garlic.com/~lynn/2001b.html#84 Disks size growing while disk count shrinking = bad performance
https://www.garlic.com/~lynn/2001d.html#47 Just a guick remembrance of where we all came from
https://www.garlic.com/~lynn/2001g.html#15 Extended memory error recovery
https://www.garlic.com/~lynn/2001h.html#19 checking some myths.
This carried over into the software arenea, for instance could (relative) low-volume operating systems maintain the new R&D technology investments that was going into the high-volume operating systems tracking newest technology advances.
In that sense, at some point a threshold was passed ... and the big iron environments had to start playing catchup (they still had their legacy apps of 30+ years). Some issue is does the legacy apps represent sufficient value and revenue flow to underwrite the necessary new R&D investment to keep abreast of what is going on in some of the higher volume market segments.
Amdahl gave a seminar at MIT around '71 analysing what part 360s would play in the marketplace (the audience did somewhat roast him for being a front for foreign interests based on the Amdahl corp business plan/funding). It included some observation about the amount of software investment in the legacy applications and the, then, projected costs of rewriting applications for a new or different platform ... which wasn't likely to happen any time in the next 30 years (it has now been 30 years). Part of the issue is that there has been some advances in software technology ... and there are some now standardized product offerings that offer the feature/function of the roll-your-own, ground-up legacy implementations (potentially significantly mitigating the rewriting argument).
random Amdahl related refs:
https://www.garlic.com/~lynn/99.html#2 IBM S/360
https://www.garlic.com/~lynn/99.html#188 Merced Processor Support at it again . . .
https://www.garlic.com/~lynn/99.html#190 Merced Processor Support at it again . . .
https://www.garlic.com/~lynn/99.html#209 Core (word usage) was anti-equipment etc.
https://www.garlic.com/~lynn/2000c.html#8 IBM Linux
https://www.garlic.com/~lynn/2000c.html#44 WHAT IS A MAINFRAME???
https://www.garlic.com/~lynn/2000c.html#48 WHAT IS A MAINFRAME???
https://www.garlic.com/~lynn/2000d.html#61 "all-out" vs less aggressive designs (was: Re: 36 to 32 bit transition)
https://www.garlic.com/~lynn/2000e.html#20 Is Al Gore The Father of the Internet?^
https://www.garlic.com/~lynn/2000e.html#21 Competitors to SABRE? Big Iron
https://www.garlic.com/~lynn/2000e.html#58 Why not an IBM zSeries workstation?
https://www.garlic.com/~lynn/2000f.html#11 Amdahl Exits Mainframe Market
https://www.garlic.com/~lynn/2000f.html#12 Amdahl Exits Mainframe Market
https://www.garlic.com/~lynn/2000f.html#68 TSS ancient history, was X86 ultimate CISC? designs)
https://www.garlic.com/~lynn/2000f.html#69 TSS ancient history, was X86 ultimate CISC? designs)
https://www.garlic.com/~lynn/2001.html#18 Disk caching and file systems. Disk history...people forget
https://www.garlic.com/~lynn/2001.html#63 Are the L1 and L2 caches flushed on a page fault ?
https://www.garlic.com/~lynn/2001b.html#12 Now early Arpanet security
https://www.garlic.com/~lynn/2001b.html#28 So long, comp.arch
https://www.garlic.com/~lynn/2001b.html#56 Why SMP at all anymore?
https://www.garlic.com/~lynn/2001b.html#67 Original S/360 Systems - Models 60,62 70
https://www.garlic.com/~lynn/2001b.html#73 7090 vs. 7094 etc.
https://www.garlic.com/~lynn/2001d.html#35 Imitation...
https://www.garlic.com/~lynn/2001d.html#70 Pentium 4 Prefetch engine?
https://www.garlic.com/~lynn/2001e.html#19 SIMTICS
https://www.garlic.com/~lynn/2001g.html#35 Did AT&T offer Unix to Digital Equipment in the 70s?
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Parity - why even or odd (was Re: Load Locked Newsgroups: comp.arch,alt.folklore.computers Date: Fri, 07 Sep 2001 17:17:27 GMTjcmorris@mitre.org (Joe Morris) writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Parity - why even or odd (was Re: Load Locked Newsgroups: comp.arch,alt.folklore.computers Date: Fri, 07 Sep 2001 17:20:16 GMTAnne & Lynn Wheeler writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Help needed on conversion from VM to OS390 Newsgroups: bit.listserv.ibm-main Date: Fri, 07 Sep 2001 18:12:06 GMTFarleyP@BIS.ADP.COM (Farley, Peter x23353) writes:
random refs
https://www.garlic.com/~lynn/2001f.html#10 5-player Spacewar?
https://www.garlic.com/~lynn/2001f.html#12 5-player Spacewar?
https://www.garlic.com/~lynn/2001f.html#13 5-player Spacewar?
https://www.garlic.com/~lynn/2001f.html#14 5-player Spacewar?
https://www.garlic.com/~lynn/2001f.html#51 Logo (was Re: 5-player Spacewar?)
https://www.garlic.com/~lynn/2001h.html#2 Alpha: an invitation to communicate
https://www.garlic.com/~lynn/2001h.html#8 VM: checking some myths.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Pentium 4 SMT "Hyperthreading" Newsgroups: comp.arch Date: Sat, 08 Sep 2001 04:09:03 GMTnmm1@cus.cam.ac.uk (Nick Maclaren) writes:
The project added 2nd instruction stream with 2nd PSW and 2nd set of registers and a 1bit flag on all work in the pipeline (used to indicate the instruction stream).
The idea was that the dual i-stream had a better chance of keeping the pipeline & units fed ... at a relatively trivial incremental hardware cost.
random 195 refs:
https://www.garlic.com/~lynn/94.html#38 IBM 370/195
https://www.garlic.com/~lynn/94.html#39 IBM 370/195
https://www.garlic.com/~lynn/95.html#3 What is an IBM 137/148 ???
https://www.garlic.com/~lynn/96.html#24 old manuals
https://www.garlic.com/~lynn/99.html#7 IBM S/360
https://www.garlic.com/~lynn/99.html#73 The Chronology
https://www.garlic.com/~lynn/99.html#97 Power4 = 2 cpu's on die?
https://www.garlic.com/~lynn/99.html#100 Why won't the AS/400 die? Or, It's 1999 why do I have to learn how to use
https://www.garlic.com/~lynn/99.html#126 Dispute about Internet's origins
https://www.garlic.com/~lynn/99.html#209 Core (word usage) was anti-equipment etc.
https://www.garlic.com/~lynn/2000c.html#38 Does the word "mainframe" still have a meaning?
https://www.garlic.com/~lynn/2000e.html#21 Competitors to SABRE? Big Iron
https://www.garlic.com/~lynn/2000f.html#13 Airspeed Semantics, was: not quite an sr-71, was: Re: jet in IBM ad?
https://www.garlic.com/~lynn/2000f.html#21 OT?
https://www.garlic.com/~lynn/2000g.html#15 360/370 instruction cycle time
https://www.garlic.com/~lynn/2000g.html#18 360/370 instruction cycle time
https://www.garlic.com/~lynn/2001.html#63 Are the L1 and L2 caches flushed on a page fault ?
https://www.garlic.com/~lynn/2001b.html#38 Why SMP at all anymore?
https://www.garlic.com/~lynn/2001c.html#1 Z/90, S/390, 370/ESA (slightly off topic)
https://www.garlic.com/~lynn/2001c.html#27 Massive windows waisting time (was Re: StarOffice for free)
https://www.garlic.com/~lynn/2001h.html#49 Other oddball IBM System 360's ?
https://www.garlic.com/~lynn/2001h.html#76 Other oddball IBM System 360's ?
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Title Inflation Newsgroups: alt.folklore.computers Date: Sat, 08 Sep 2001 15:58:14 GMTjcmorris@mitre.org (Joe Morris) writes:
misc. ref:
https://www.garlic.com/~lynn/internet.htm#0
in the great cut-over to IP/internet protocol jan83 there were 200 or
so arpanet nodes, at which time the internal network was nearing 1000
nodes, which it passed later that year:
https://www.garlic.com/~lynn/internet.htm#22
https://www.garlic.com/~lynn/internet.htm#27
https://www.garlic.com/~lynn/internet.htm#29
random refs:
https://www.garlic.com/~lynn/subpubkey.html#networking
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Title Inflation Newsgroups: alt.folklore.computers Date: Sat, 08 Sep 2001 17:11:46 GMTAnne & Lynn Wheeler writes:
In the '80s there was a student that sat in the back of my office for 9 months taking notes on how i communicated (phone calls, face-to-face, meetings) ... and had access to all my email and log of all my immediate messages. The analysis resulted in Stanford PhD thesis on computer mediated communication (joint with language and computer AI departments). The author has since done a number of books and papers, one of the more recent is Knowledge Machines, Language and Information in a Technological Society.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Title Inflation Newsgroups: alt.folklore.computers Date: Sat, 08 Sep 2001 19:51:11 GMTAnne & Lynn Wheeler writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Title Inflation Newsgroups: alt.folklore.computers Date: Sat, 08 Sep 2001 20:00:35 GMTAnne & Lynn Wheeler writes:
from the above
Tandem Memos n. Something constructive but hard to control; a fresh of
breath air (sic). "That's another Tandem Memos." A phrase to worry
middle management. It refers to the computer-based conference (widely
distributed in 1981) in which many technical personnel expressed
dissatisfaction with the tools available to them at that time, and
also constructively criticized the way products were [are] developed.
The memos are required reading for anyone with a serious interest in
quality products. If you have not seen the memos, try reading the
November 1981 Datamation summary.
it was made worse by some ref in the datamation article to the effect
that i was worth my weight in gold (don't i wish) & some anonomous
person(s) put together a 300 page compilation in tandem 3-ring binders
and sent one to each member of the corporate executive committee.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Whom Do Programmers Admire Now??? Newsgroups: alt.folklore.computers Date: Sat, 08 Sep 2001 20:16:47 GMTBernd Felsche writes:
http://www.sun.com/technology-research/spring/
NOTE: above gone 404, current: (also gone 404):
http://java.sun.com/people/kgh/spring/
BUT: there is the wayback machine:
https://web.archive.org/web/20030404182953/http://java.sun.com/people/kgh/spring/
From one of the Spring Papers:
A Client-Side Stub Interpreter
Petere B. Kessler
Abstract
We have built a research operating system in which all services are
presented through interfaces described by an interface description
language. The system consists of a micro-kernel that supports a small
number of these interfaces, and a large number of interfaces that are
implemented by user-level code. A typical service implements one or
more interfaces, but is a client of many other interfaces that are
implemented elsewhere in the system. We have an interface compiler
that generates client-side and service-side stubs to deliver calls
from clients to services providing location transparency if the client
and server are in different address spaces. The code for client-side
stubs was occupying a large amount of the text space on our clients,
so a stub interpreter was written to replace the client-side stub
methods. The result was that we traded 125k bytes of stub code for 13k
bytes of stub descriptions and 4k bytes of stub interpreter. This
paper describes the stub interpreter, the stub descriptions, and
discusses some alternatives.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Big black helicopters Newsgroups: comp.arch,alt.folklore.computers Date: Sat, 08 Sep 2001 22:45:30 GMT"del cecchi" writes:
random refs:
https://www.garlic.com/~lynn/94.html#44 bloat
https://www.garlic.com/~lynn/96.html#20 1401 series emulation still running
https://www.garlic.com/~lynn/99.html#231 why couldn't others compete against IBM
https://www.garlic.com/~lynn/2001j.html#23 ot - internet explorere v6.0
from above:
An "expert witness" representing one of the companies (that left the
business) testified regarding the state-of-the-art in the late
50s. Supposedly in the late 50s ALL of the computer companies realized
the SINGLE MOST IMPORTANT criteria to be successful in the computer
business was to have compatibility across the whole computer line,
from entry level to the largest machine. The witness went on to
observe that only one company was successful in meeting this goal, all
the other companies failed. The remaining companies failed to
adequately deal with multiple plant operations (each responsible for a
particular model in the product line) that locally optimized the
hardware architecture/implementation for the specific model.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Title Inflation Newsgroups: alt.folklore.computers Date: Sat, 08 Sep 2001 22:53:01 GMTAnne & Lynn Wheeler writes:
https://www.garlic.com/~lynn/2001g.html#6
https://www.garlic.com/~lynn/2001g.html#5
https://www.garlic.com/~lynn/2001g.html#7
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Military Interest in Supercomputer AI Newsgroups: comp.sys.super,sci.military.naval,us.military.army,alt.military Date: Sun, 09 Sep 2001 01:01:19 GMTrick303@hotmail.com (rick++) writes:
p.b.andersen, a theory of computer semiotics, cambridge university press,1990.
basically saying that as one of the fathers of AI ... he realizes that it was all wrong.
somewhat off-topic, terry was thesis adviser for phd in following
https://www.garlic.com/~lynn/2001j.html#29
related to supercomputers:
https://www.garlic.com/~lynn/95.html#13
and really off-topic ... relation to electronic commerce
https://www.garlic.com/~lynn/2001i.html#52
lot of money was channeled thru ONR ...
https://www.garlic.com/~lynn/2000b.html#41
random discussions about arpanet (and the internal network)
https://www.garlic.com/~lynn/internet.htm
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Proper ISA lifespan? Newsgroups: comp.arch Date: Sun, 09 Sep 2001 02:57:46 GMTcecchi@signa.rchland.ibm.com (Del Cecchi) writes:
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Proper ISA lifespan? Newsgroups: comp.arch Date: Sun, 09 Sep 2001 03:12:58 GMTAnne & Lynn Wheeler writes:
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Big black helicopters Newsgroups: comp.arch,alt.folklore.computers Date: Sun, 09 Sep 2001 03:25:38 GMT"Rostyslaw J. Lewyckyj" writes:
on the other hand ... i've also been blamed for originating the PCM
(plug compatible manufactur aka OEM, other equipment manufactur)
controller business
https://www.garlic.com/~lynn/submain.html#360pcm
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Big black helicopters Newsgroups: comp.arch,alt.folklore.computers Date: Sun, 09 Sep 2001 13:12:04 GMT"Rostyslaw J. Lewyckyj" writes:
almost all the things that is cited about ibm changing had essentially nothing to do with those vendors going out of business ... the things cited had to do with encouraging brand new business in the ibm customer marketplace aka rather than other computer manufactures having relief with regard to the data processing customer ... "relief" had to do with brand new little guys being able to compete for bits & pieces of ibm data processing business ... the PCMs, maint. contract, software, etc (not relief for other computer manufactures).
from that stand-point one might conjecture that once the case had been filed and went on for so long ... something was needed to show for the efforts ... even if it may not have had nothing at all to do with the original filing.
In that sense, one might conclude that there was no real problem found with the majority of ibm business practices ... but IBM was still big (not necessarily because it did something unethical & drove other vendors out of business, but because it was the only vendor that met the single most important market requirement) ... and just being big was somehow bad.
If it couldn't be made less big because of the original definition of data processing market ... then the whole definition of what was the market would be changed and attempt to make IBM less big that way (pcm gear, maint. contract, leasing business, software, etc).
The point was that the original target (computer vendors being forced out of business based on various policies & practices) was moot based on those vendor testimonies ... so the whole focus changed in order to achieve an objective of size reduction. From that standpoint, one could conclude that big is bad ... regardless of the reason.
During the course of the case, some of the things were humorous in retrospect. The ruling about arbritrary retention of paper was one such. At one point, because of running out of normal room for storage ... offices were being taken over and used. At one location (about 3 percent of total employees), they were consuming an office a day for paper storage and one building was in danger of exceeding the floor loading rating (presumably if there had been accurate prediction about the length of the case and the elapsed time of the paper retention ruling ... then massive new paper storage facilities could have been started earlier).
1) the comment about vendor's testimony was with regard to the original point of the case ... which, since there was no case on that basis ... there was some random walk that occurred to find some other reasons.
2) the comment about PCM market forces ... was that it didn't exist when the original case was filed ... it only emerged during the long course of the case. since it didn't exist when the case was filed ... then one might conclude that it was added afterwards, after the original target didn't pan out (because of those vendor's testimony).
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Big black helicopters Newsgroups: comp.arch,alt.folklore.computers Date: Sun, 09 Sep 2001 13:30:39 GMTAnne & Lynn Wheeler writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Big black helicopters Newsgroups: comp.arch,alt.folklore.computers Date: Sun, 09 Sep 2001 15:34:58 GMTAnne & Lynn Wheeler writes:
a dump on 14inx11in paper (say approx. sq foot) would be 4in to 12in thick. just for debugging there would between one and three dumps per cubic foot. a location with 12,000 employees at minimum of 3 dumps per cubic foot & 600 cubic feet ... works out to about 1.5 dumps per day per person (or only .5 dumps per day per person at 12in thick dumps). Then there would be compilations, program listings, and a bunch of other stuff ... maybe 2-3 times per day.
This would have been those 1403N1 printers at 1100 lines per minute; at 66lines per page, about 1000 pages/hr. at about 250 pages per inch, that is 4inch, square foot, per hr per printer or about 8 cubit feet per printer per day (lots of output might only have 2/3rds the line density per page of dumps ... resulitng in 5in to 6in square foot, per hr per printer). 600 cubic feet would be about 75 such printers or about one such printer for every 160 employees. Such a location probably had closer to 100 mainframe systems with 2-3 1403N1s per system (more like 200-300 1403N1 printers).
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Big black helicopters Newsgroups: comp.arch,alt.folklore.computers Date: Sun, 09 Sep 2001 18:25:55 GMT"Rostyslaw J. Lewyckyj" writes:
the gov. decides to file an anti-trust case against a vehicle manufactur because it has 60 percent of the muscle car market ... and think that they had to have done something bad to obtain 60 percent market share. They bring in all the other vehicle manufactures to testify about all the bad stuff. The other vehicle manufactures testify that all the customer serveys have shown that what the market really wants is a metal-flake, candy-apple red paint job and none of them could bring themselves to produce a car with such a paint job (and the only manufactur that was willing to produce what the customer wanted is the reason that manufactur got 60 percent market share).
The gov. mulls this over for a large number of years ... and finally says that they will drop the case if the company unbundles its muscle car manufacturing and allows customers to just buy the (metal-flake, candy-apple red) shell and force the customer to do after-market assembly of the motor, wheels, transmissions, steering, brakes, glass, seats, dashboard, interior, brakes, etc.. Furthermore, unbundled car manufacturing wasn't a standard business practice (by anybody) prior to filing the case and the gov. had to help invent/promote whole new industries and businesses practices in the market (like the after market vehicle assembly industry which never existed anywhere prior to the filing of the case ... i.e. at best, the gov. could claim that industry-wide business practices by all vehicle manufactures where inhibiting the invention of businesses like the after-market vehicle assembly industry).
Also, during the lifetime of the case, the total vehicle market share of muscle cars declines by a factor of 3-4 times.
Now, many years later, there are a whole bunch of businesses in all segments of the after-market vehicle assembly industry (not just muscle cars) ... and a new manufactur comes on the scene and attempts to capture the industry with integrated, bundled, fully-assembled and tested vehicle. While in the original case, there was no competition that could complain about business practices under the gov. anti-trust regulations (the original case had effectively been filed under a completely different premise than what was settled) ... there are now large number of businesses that wish to complain about business practices.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Disaster Stories Needed Newsgroups: alt.computer.consultants,alt.disasters.misc,comp.arch.storage Date: Sun, 09 Sep 2001 23:54:27 GMTTony Toews writes:
then there are little things like the financial transaction data center that had their roof collapse in a snow storm and their disaster backup site was in the world trade center
random refs:
https://www.garlic.com/~lynn/96.html#8 Why Do Mainframes Exist ???
https://www.garlic.com/~lynn/98.html#23 Fear of Multiprocessing?
https://www.garlic.com/~lynn/99.html#34 why is there an "@" key?
https://www.garlic.com/~lynn/99.html#38 1968 release of APL\360 wanted
https://www.garlic.com/~lynn/99.html#145 Q: S/390 on PowerPC?
https://www.garlic.com/~lynn/99.html#155 checks (was S/390 on PowerPC?)
https://www.garlic.com/~lynn/99.html#184 Clustering systems
https://www.garlic.com/~lynn/99.html#207 Life-Advancing Work of Timothy Berners-Lee
https://www.garlic.com/~lynn/2000g.html#27 Could CDR-coding be on the way back?
https://www.garlic.com/~lynn/2001.html#26 Disk caching and file systems. Disk history...people forget
https://www.garlic.com/~lynn/2001.html#33 Where do the filesystem and RAID system belong?
https://www.garlic.com/~lynn/2001.html#36 Where do the filesystem and RAID system belong?
https://www.garlic.com/~lynn/2001.html#41 Where do the filesystem and RAID system belong?
https://www.garlic.com/~lynn/2001.html#42 Where do the filesystem and RAID system belong?
https://www.garlic.com/~lynn/2001b.html#19 FW: History Lesson
https://www.garlic.com/~lynn/2001b.html#20 HELP
https://www.garlic.com/~lynn/2001d.html#46 anyone have digital certificates sample code
https://www.garlic.com/~lynn/2001f.html#15 Medical data confidentiality on network comms
https://www.garlic.com/~lynn/2001g.html#46 The Alpha/IA64 Hybrid
https://www.garlic.com/~lynn/2001i.html#41 Withdrawal Announcement 901-218 - No More 'small machines'
https://www.garlic.com/~lynn/2001i.html#43 Withdrawal Announcement 901-218 - No More 'small machines'
https://www.garlic.com/~lynn/2001i.html#52 misc loosely-coupled, sysplex, cluster, supercomputer, & electronic commerce
https://www.garlic.com/~lynn/2001j.html#16 OT - Internet Explorer V6.0
https://www.garlic.com/~lynn/2001j.html#23 OT - Internet Explorer V6.0
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Does "Strong Security" Mean Anything? Newsgroups: comp.security.misc Date: Mon, 10 Sep 2001 00:09:54 GMT"Andrew" writes:
ancilliary is strong/weak authentication in conjunction with strong/weak security. strong authentication as part of strong security then could also be relatively to what is at risk ... but strong authentication is more likely to be associated with two or three factor authentication (than just single factor authentication).
also see security glossary at
https://www.garlic.com/~lynn/secure.htm
& related
https://www.garlic.com/~lynn/index.html#glossary
somewhat related ... risk management (assessing relative security against risks):
https://www.garlic.com/~lynn/subintegrity.html#fraud Risk, Fraud, Exploits
https://www.garlic.com/~lynn/2001c.html#61 Risk management vs security policy
https://www.garlic.com/~lynn/aepay3.htm#riskm The Thread Between Risk Management and Information Security
https://www.garlic.com/~lynn/aepay3.htm#riskaads AADS & RIsk Management, and Information Security Risk Management (ISRM)
https://www.garlic.com/~lynn/aadsmore.htm#biosigs biometrics and electronic signatures
https://www.garlic.com/~lynn/aepay3.htm#x959risk1 Risk Management in AA / draft X9.59
https://www.garlic.com/~lynn/aepay3.htm#x959risk2 Risk Management in AA / draft X9.59
https://www.garlic.com/~lynn/aepay3.htm#x959risk3 Risk Management in AA / draft X9.59
https://www.garlic.com/~lynn/aepay3.htm#x959risk4 Risk Management in AA / draft X9.59
random other refs:
https://www.garlic.com/~lynn/aadsm2.htm#architecture A different architecture? (was Re: certificate path
https://www.garlic.com/~lynn/aadsm2.htm#straw AADS Strawman
https://www.garlic.com/~lynn/aadsm2.htm#strawm2 AADS Strawman
https://www.garlic.com/~lynn/aadsm2.htm#keylength On leaving the 56-bit key length limitation
https://www.garlic.com/~lynn/aadsm5.htm#spki2 Simple PKI
https://www.garlic.com/~lynn/aadsm5.htm#spki3 Simple PKI
https://www.garlic.com/~lynn/aadsm6.htm#websecure merchant web server security
https://www.garlic.com/~lynn/aadsmail.htm#fraud Human Nature ... a little cross-posting
https://www.garlic.com/~lynn/aadsmail.htm#vbank Statistical Attack Against Virtual Banks (fwd)
https://www.garlic.com/~lynn/aepay2.htm#aadsx959 Account Authority Digital Signatures ... in support of x9.59
https://www.garlic.com/~lynn/aepay2.htm#morepriv [E-CARM] AADS, x9.59, & privacy
https://www.garlic.com/~lynn/aepay3.htm#privacy misc. privacy
https://www.garlic.com/~lynn/aepay3.htm#x959risk2 Risk Management in AA / draft X9.59
https://www.garlic.com/~lynn/aepay7.htm#netbank2 net banking, is it safe?? ... security proportional to risk
https://www.garlic.com/~lynn/98.html#41 AADS, X9.59, & privacy
https://www.garlic.com/~lynn/99.html#45 Internet and/or ARPANET?
https://www.garlic.com/~lynn/2001g.html#64 PKI/Digital signature doesn't work
https://www.garlic.com/~lynn/2001h.html#61 Net banking, is it safe???
https://www.garlic.com/~lynn/2001i.html#54 Computer security: The Future
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: OT - Internet Explorer V6.0 Newsgroups: bit.listserv.ibm-main,comp.lang.cobol,alt.folklore.computers Date: Mon, 10 Sep 2001 02:33:50 GMT"Peter E. C. Dashwood" writes:
while the ARPANet packet design addressed self-healing in relatively constrained infrastructure ... it didn't address what was important in networks and that was independent heterogeneous operation (aka ARPANet was relatively small number of homogeneous nodes). The internal network was actually larger than the ARPANet for most of the lifetime, which I claim was largely due to the fact that the primary internal network nodes effectively had the equivalent of heterogeneous gateway support in every node (something that the arpanet didn't get until the the great jan83 switch-over to ip protocol).
JES2 NJE implementation suffered many of the same short-comings as the original arpanet ... and in fact was so bad that frequently dissimilar releases of NJE could take down the whole MVS local node by attempting to process a package from a JES at a different release level. As a result, the JES2 nodes on the internal network were typically relegated to end-nodes with intermediate VNET nodes which had special gateways to produce/translate NGE headers that were guaranteed to be compatible with the specific release of JES2/NGE. This was not only a common shortcoming of arpanet and JES2 ... but a great many other network products of the 70s ... and even the lower-function communication products like various members from the SNA family.
the effectiveness of huge numbers of replicated smaller components can be inhibited because of faulty management & control infrastructures. Getting production quality, business continuity level self-repairing implementation right can be tricky.
An example is a strickly homogeneous implementation (like much of those done in the 60s and 70s ... with the possible exception of vnet of the internal network) can lead to lots of other kinds of failure modes and associated service outages (for instance simple release upgrades requiring that the whole infrastructure be taken down for an extended period of time ... the length of the outage that can be proportional to the number of units involved).
random refs:
https://www.garlic.com/~lynn/subpubkey.html#networking
https://www.garlic.com/~lynn/subtopic.html#hacmp Cluster, High Availability and/or Loosely-Coupled
https://www.garlic.com/~lynn/2001j.html#43 Disaster Stories Needed
https://www.garlic.com/~lynn/94.html#34 Failover and MAC addresses (was: Re: Dual-p
https://www.garlic.com/~lynn/94.html#36 Failover and MAC addresses (was: Re: Dual-p
https://www.garlic.com/~lynn/95.html#7 Who built the Internet? (was: Linux/AXP.. Reliable?)
https://www.garlic.com/~lynn/96.html#12 IBM song
https://www.garlic.com/~lynn/98.html#50 Edsger Dijkstra: the blackest week of his professional life
https://www.garlic.com/~lynn/99.html#17 Old Computers
https://www.garlic.com/~lynn/99.html#33 why is there an "@" key?
https://www.garlic.com/~lynn/99.html#34 why is there an "@" key?
https://www.garlic.com/~lynn/99.html#38b Internet and/or ARPANET?
https://www.garlic.com/~lynn/99.html#208 Computing As She Really Is. Was: Re: Life-Advancing Work of Timothy Berners-Lee
https://www.garlic.com/~lynn/99.html#209 Core (word usage) was anti-equipment etc.
https://www.garlic.com/~lynn/99.html#212 GEOPLEX
https://www.garlic.com/~lynn/2000.html#13 Computer of the century
https://www.garlic.com/~lynn/2000.html#74 Difference between NCP and TCP/IP protocols
https://www.garlic.com/~lynn/2000.html#76 Mainframe operating systems
https://www.garlic.com/~lynn/2000b.html#29 20th March 2000
https://www.garlic.com/~lynn/2000b.html#40 general questions on SSL certificates
https://www.garlic.com/~lynn/2000b.html#67 oddly portable machines
https://www.garlic.com/~lynn/2000b.html#85 Mainframe power failure (somehow morphed from Re: write rings)
https://www.garlic.com/~lynn/2000c.html#29 The first "internet" companies?
https://www.garlic.com/~lynn/2000e.html#10 Is Al Gore The Father of the Internet?^
https://www.garlic.com/~lynn/2000e.html#13 internet preceeds Gore in office.
https://www.garlic.com/~lynn/2000e.html#14 internet preceeds Gore in office.
https://www.garlic.com/~lynn/2000e.html#15 internet preceeds Gore in office.
https://www.garlic.com/~lynn/2000e.html#18 Is Al Gore The Father of the Internet?^
https://www.garlic.com/~lynn/2000e.html#19 Is Al Gore The Father of the Internet?^
https://www.garlic.com/~lynn/2000e.html#20 Is Al Gore The Father of the Internet?^
https://www.garlic.com/~lynn/2000e.html#30 Is Tim Berners-Lee the inventor of the web?
https://www.garlic.com/~lynn/2000f.html#22 Why trust root CAs ?
https://www.garlic.com/~lynn/2000f.html#30 OT?
https://www.garlic.com/~lynn/2000f.html#37 OT?
https://www.garlic.com/~lynn/2000f.html#71 HASP vs. "Straight OS," not vs. ASP
https://www.garlic.com/~lynn/2000g.html#24 A question for you old guys -- IBM 1130 information
https://www.garlic.com/~lynn/2000g.html#33 does CA need the proof of acceptance of key binding ?
https://www.garlic.com/~lynn/2000g.html#39 Could CDR-coding be on the way back?
https://www.garlic.com/~lynn/2001.html#4 Sv: First video terminal?
https://www.garlic.com/~lynn/2001.html#46 Small IBM shops
https://www.garlic.com/~lynn/2001b.html#14 IBM's announcement on RVAs
https://www.garlic.com/~lynn/2001b.html#58 Checkpoint better than PIX or vice versa???
https://www.garlic.com/~lynn/2001b.html#71 Z/90, S/390, 370/ESA (slightly off topic)
https://www.garlic.com/~lynn/2001b.html#81 36-bit MIME types, PDP-10 FTP
https://www.garlic.com/~lynn/2001b.html#85 what makes a cpu fast
https://www.garlic.com/~lynn/2001c.html#4 what makes a cpu fast
https://www.garlic.com/~lynn/2001c.html#5 what makes a cpu fast
https://www.garlic.com/~lynn/2001c.html#19 What is "IBM-MAIN"
https://www.garlic.com/~lynn/2001c.html#40 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#41 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#51 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#75 CNN reports...
https://www.garlic.com/~lynn/2001e.html#12 Blame it all on Microsoft
https://www.garlic.com/~lynn/2001e.html#16 Pre ARPAnet email?
https://www.garlic.com/~lynn/2001e.html#25 Pre ARPAnet email?
https://www.garlic.com/~lynn/2001e.html#52 Pre ARPAnet email?
https://www.garlic.com/~lynn/2001e.html#69 line length (was Re: Babble from "JD" <dyson@jdyson.com>)
https://www.garlic.com/~lynn/2001e.html#71 line length (was Re: Babble from "JD" <dyson@jdyson.com>)
https://www.garlic.com/~lynn/2001f.html#8 Theo Alkema
https://www.garlic.com/~lynn/2001f.html#9 Theo Alkema
https://www.garlic.com/~lynn/2001f.html#23 MERT Operating System & Microkernels
https://www.garlic.com/~lynn/2001g.html#44 The Alpha/IA64 Hybrid
https://www.garlic.com/~lynn/2001g.html#46 The Alpha/IA64 Hybrid
https://www.garlic.com/~lynn/2001g.html#48 The Alpha/IA64 Hybrid
https://www.garlic.com/~lynn/2001h.html#8 VM: checking some myths.
https://www.garlic.com/~lynn/2001h.html#9 VM: checking some myths.
https://www.garlic.com/~lynn/2001h.html#13 VM: checking some myths.
https://www.garlic.com/~lynn/2001h.html#38 Credit Card # encryption
https://www.garlic.com/~lynn/2001h.html#39 Credit Card # encryption
https://www.garlic.com/~lynn/2001h.html#42 Credit Card # encryption
https://www.garlic.com/~lynn/2001h.html#43 Credit Card # encryption
https://www.garlic.com/~lynn/2001h.html#65 UUCP email
https://www.garlic.com/~lynn/2001i.html#7 YKYGOW...
https://www.garlic.com/~lynn/2001i.html#32 IBM OS Timeline?
https://www.garlic.com/~lynn/2001i.html#33 Waterloo Interpreters (was Re: RAX (was RE: IBM OS Timeline?))
https://www.garlic.com/~lynn/2001i.html#53 Credit Card # encryption
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Big black helicopters Newsgroups: comp.arch,alt.folklore.computers Date: Mon, 10 Sep 2001 13:02:50 GMTAlan Greig writes:
for some time there was a 20 person (growing to about 40 people) effort in the san jose area to do software. every month Boca would be polled about did it have any software intentions and did it mind if we did it; & boca would say, no it didn't have any software intentions. Then after quite a bit of time, Boca reversed its position and the San Jose group was disbanded (this was before announce and delivery)
frequently, from a corporate empire standpoint, it was "better" to have contracts with outside agencies for deliverables than to have other internal operations providing the deliverables.
for whatever reason, IBM also walked away from the option for 1/3rd ownership of Intel (and sold the 11?12? percent stake). I don't remember if this was before some internal groups were claiming that they could build a better and enhanced 386.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: OT - Internet Explorer V6.0 Newsgroups: bit.listserv.ibm-main,comp.lang.cobol,alt.folklore.computers Date: Mon, 10 Sep 2001 13:15:03 GMTJoseph J Katnic writes:
misc. distributed locak manager & oracle refs:
https://www.garlic.com/~lynn/95.html#13 SSA
https://www.garlic.com/~lynn/96.html#15 tcp/ip
https://www.garlic.com/~lynn/98.html#23 Fear of Multiprocessing?
https://www.garlic.com/~lynn/99.html#145 Q: S/390 on PowerPC?
https://www.garlic.com/~lynn/99.html#184 Clustering systems
https://www.garlic.com/~lynn/2000g.html#27 Could CDR-coding be on the way back?
https://www.garlic.com/~lynn/2001.html#33 Where do the filesystem and RAID system belong?
https://www.garlic.com/~lynn/2001.html#41 Where do the filesystem and RAID system belong?
https://www.garlic.com/~lynn/2001c.html#66 KI-10 vs. IBM at Rutgers
https://www.garlic.com/~lynn/2001e.html#2 Block oriented I/O over IP
https://www.garlic.com/~lynn/2001g.html#46 The Alpha/IA64 Hybrid
https://www.garlic.com/~lynn/2001i.html#41 Withdrawal Announcement 901-218 - No More 'small machines'
https://www.garlic.com/~lynn/2001i.html#43 Withdrawal Announcement 901-218 - No More 'small machines'
https://www.garlic.com/~lynn/2001j.html#23 OT - Internet Explorer V6.0
general ha/cmp references:
https://www.garlic.com/~lynn/subtopic.html#hacmp cluster, loosely-coupled
random connections
https://www.garlic.com/~lynn/2001i.html#52 misc loosely-coupled, sysplex, cluster, supercomputer, & electronic commerce
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Pentium 4 SMT "Hyperthreading" Newsgroups: comp.arch,alt.folklore.computers Date: Mon, 10 Sep 2001 13:28:11 GMTJan Vorbrueggen writes:
There was some other similarity with the PPUs ... in that the 125 (and 115) memory bus had nine positions for microprocessors and the microprocessors could have arbitrary microcode/personalities loaded for them to act as various kinds of I/O processing units or (370) execution processing units.
misc. VAMPS
https://www.garlic.com/~lynn/2000c.html#68 Does the word "mainframe" still have a meaning?
https://www.garlic.com/~lynn/2000d.html#10 4341 was "Is a VAX a mainframe?"
https://www.garlic.com/~lynn/2000d.html#11 4341 was "Is a VAX a mainframe?"
https://www.garlic.com/~lynn/2000e.html#6 Ridiculous
https://www.garlic.com/~lynn/2000e.html#7 Ridiculous
https://www.garlic.com/~lynn/2001i.html#2 Most complex instructions (was Re: IBM 9020 FAA/ATC Systems from 1960's)
https://www.garlic.com/~lynn/2001j.html#18 I hate Compaq
https://www.garlic.com/~lynn/2001j.html#19 I hate Compaq
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Are client certificates really secure? Newsgroups: comp.security.misc Date: Mon, 10 Sep 2001 13:52:20 GMTmartin_macbean@hotmail.com (Martin MacBean) writes:
1) the public/private key pair has the advantage that there is no shared-secret (password) authentication that has to be stored at servers
2) in theory the same private key (since it isn't a shared-secret) can be used in lots of difference security domains. The public key may be known, but the public key is only used for authenticating, it can't be used for originating (as in the case of a shared-secret, one of the advantages of password protected private key as opposed to a shared-secret password). by comparison, in the case of a shared-secret password, the same value can be used for both originating & authenticating; thus the requirement that different shared-secret passwords be used in different security domains.
The short-comings of the software file private key is that the file can be copied and is subject to offline brute-force attacks.
The advantages of the public/private key implementation is that it is transparent to the server authentication implementation whether the client is using a software file private key or a private key hardware token rated at E4-high, i.e. it is possible to initially deploy a software implementation and then incrementally upgrade to hardware tokens starting with clients that have the highest risk exposure (giving 2-factor authentication ... something you have and something you know).
Note however, that public/private key implementations don't have to be deployed as certificate-based, they could also be deployed in a userid/public-key variety. An example would be a public-key enhanced RADIUS authentication server ... which could simultaneously support different userids using password authentication, challenge/response authentication, as well as public key authentication (where the public key is recorded in the RADIUS userid-associated database in place of a password).
NACHA recently finished a very successful pilot for ATM public-key
authenticated debit transactions that involved a certificate-less
deployment
https://www.garlic.com/~lynn/aadsm6.htm#aadsatm
security glossary
https://www.garlic.com/~lynn/secure.htm
misc. other related RADIUS &/or certificate-less PKIs discussions
https://www.garlic.com/~lynn/aadsm2.htm#inetpki A PKI for the Internet (was RE: Scale (and the SRV
https://www.garlic.com/~lynn/aadsm2.htm#account A different architecture? (was Re: certificate path
https://www.garlic.com/~lynn/aadsm2.htm#straw AADS Strawman
https://www.garlic.com/~lynn/aadsm2.htm#keyl4 On leaving the 56-bit key length limitation
https://www.garlic.com/~lynn/aadsm2.htm#pkikrb PKI/KRB
https://www.garlic.com/~lynn/aadsm3.htm#cstech5 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#cstech10 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#cstech11 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#cstech12 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#cstech13 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#kiss1 KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
https://www.garlic.com/~lynn/aadsm3.htm#kiss3 KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
https://www.garlic.com/~lynn/aadsm3.htm#kiss3 KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
https://www.garlic.com/~lynn/aadsm3.htm#kiss3 KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
https://www.garlic.com/~lynn/aadsm3.htm#kiss3 KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
https://www.garlic.com/~lynn/aadsm3.htm#kiss4 KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
https://www.garlic.com/~lynn/aadsm5.htm#conpki The Fundamental Inadequacies of Conventional PKI
https://www.garlic.com/~lynn/aadsm5.htm#pkimort PKI: Evolve or Die
https://www.garlic.com/~lynn/aadsm5.htm#pkimort2 problem with the death of X.509 PKI
https://www.garlic.com/~lynn/aadsm6.htm#nonreput2 Sender and receiver non-repudiation
https://www.garlic.com/~lynn/aadsmore.htm#hcrl1 Huge CRLs
https://www.garlic.com/~lynn/aadsmore.htm#hcrl3 Huge CRLs
https://www.garlic.com/~lynn/aadsmore.htm#keytext proposed key usage text
https://www.garlic.com/~lynn/aadsmore.htm#time Certifiedtime.com
https://www.garlic.com/~lynn/aadsmore.htm#x959demo AADS & X9.59 demos at BAI (annual world-wide retail banking) show in miami next week
https://www.garlic.com/~lynn/aadsmore.htm#killer1 Killer PKI Applications
https://www.garlic.com/~lynn/aadsmore.htm#reqcert "request certificate"
https://www.garlic.com/~lynn/aepay2.htm#privrule3 U.S. firms gird for privacy rules
https://www.garlic.com/~lynn/aepay4.htm#comcert6 Merchant Comfort Certificates
https://www.garlic.com/~lynn/aepay4.htm#comcert7 Merchant Comfort Certificates
https://www.garlic.com/~lynn/aepay4.htm#rfc2807b RFC 2807 published today XML Signature Requirements
https://www.garlic.com/~lynn/aepay4.htm#rfc2807c RFC 2807 published today XML Signature Requirements
https://www.garlic.com/~lynn/aepay6.htm#dsdebate Digital Signatures Spark Debate
https://www.garlic.com/~lynn/aepay7.htm#ssexploit Shared-Secret exploit
https://www.garlic.com/~lynn/ansiepay.htm#x959demo X9.59/AADS demos operational
https://www.garlic.com/~lynn/94.html#8 scheduling & dynamic adaptive ... long posting warning
https://www.garlic.com/~lynn/99.html#216 Ask about Certification-less Public Key
https://www.garlic.com/~lynn/99.html#217 AADS/X9.59 demo & standards at BAI (world-wide retail banking) show
https://www.garlic.com/~lynn/99.html#224 X9.59/AADS announcement at BAI this week
https://www.garlic.com/~lynn/99.html#229 Digital Signature on SmartCards
https://www.garlic.com/~lynn/99.html#230 Radius Help help!!!
https://www.garlic.com/~lynn/99.html#235 Attacks on a PKI
https://www.garlic.com/~lynn/2000.html#33 SmartCard with ECC crypto
https://www.garlic.com/~lynn/2000.html#47 TLS: What is the purpose of the client certificate request?
https://www.garlic.com/~lynn/2000.html#57 RealNames hacked. Firewall issues.
https://www.garlic.com/~lynn/2000b.html#14 Will Radius be obsolute if implement 2-token authentications?
https://www.garlic.com/~lynn/2000b.html#46 Simple authentication protocol: any good?
https://www.garlic.com/~lynn/2000b.html#90 Question regarding authentication implementation
https://www.garlic.com/~lynn/2000b.html#92 Question regarding authentication implementation
https://www.garlic.com/~lynn/2000c.html#2 Financial Stnadards Work group?
https://www.garlic.com/~lynn/2000e.html#20 Is Al Gore The Father of the Internet?^
https://www.garlic.com/~lynn/2001c.html#8 Server authentication
https://www.garlic.com/~lynn/2001c.html#9 Server authentication
https://www.garlic.com/~lynn/2001c.html#34 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001d.html#20 What is PKI?
https://www.garlic.com/~lynn/2001d.html#21 What is PKI?
https://www.garlic.com/~lynn/2001d.html#46 anyone have digital certificates sample code
https://www.garlic.com/~lynn/2001e.html#34 Blame it all on Microsoft
https://www.garlic.com/~lynn/2001e.html#81 Passwords
https://www.garlic.com/~lynn/2001f.html#77 FREE X.509 Certificates
https://www.garlic.com/~lynn/2001f.html#79 FREE X.509 Certificates
https://www.garlic.com/~lynn/2001g.html#1 distributed authentication
https://www.garlic.com/~lynn/2001g.html#12 FREE X.509 Certificates
https://www.garlic.com/~lynn/2001g.html#25 Root certificates
https://www.garlic.com/~lynn/2001g.html#38 distributed authentication
https://www.garlic.com/~lynn/2001g.html#40 Self-Signed Certificate
https://www.garlic.com/~lynn/2001h.html#7 PKI/Digital signature doesn't work
https://www.garlic.com/~lynn/2001h.html#75 Net banking, is it safe???
https://www.garlic.com/~lynn/2001i.html#9 Net banking, is it safe???
https://www.garlic.com/~lynn/2001i.html#16 Net banking, is it safe???
https://www.garlic.com/~lynn/2001i.html#25 Net banking, is it safe???
https://www.garlic.com/~lynn/2001i.html#36 Net banking, is it safe???
https://www.garlic.com/~lynn/2001j.html#8 PKI (Public Key Infrastructure)
https://www.garlic.com/~lynn/2001j.html#11 PKI (Public Key Infrastructure)
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Title Inflation Newsgroups: alt.folklore.computers Date: Mon, 10 Sep 2001 14:08:55 GMTjcmorris@mitre.org (Joe Morris) writes:
by comparison, with the arpanet cut-over to IP and gateways in Jan83, its growth really accelerated (although some large number of the nodes were things like sun workstations) ... i.e. there were something like 250 arpanet nodes at the time of the cut-over.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Big black helicopters Newsgroups: comp.arch,alt.folklore.computers Date: Mon, 10 Sep 2001 14:17:27 GMTAlan Greig writes:
decisions were made at all levels of a company ... some lower-level decisions could have been compatible with worries about the anti-trust cases (but made for totally different reasons) ... and if some lower-level decisions were made differently, upper level executives could have reversed the decisions because of the anti-trust worries.
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Are client certificates really secure? Newsgroups: comp.security.misc Date: Tue, 11 Sep 2001 13:03:29 GMTmartin_macbean@hotmail.com (Martin MacBean) writes:
In shared-secret key scenerios the same key is used to originate the signing of a message as is used to authenticate the signature. As a result all the shared-secret based authentication mechanisms stipulate that different keys are used in every domain (since somebody at a server in one domain ... say your ISP ... could use your secret to origiante transactions with your bank).
in public/private key paradigms ... the operations are asymmetrical (not symmetrical, shared-secret) ... they key that origiantes &/or signs transactions is totally different than the key that authenticates transactions.
while a shared-secret paradigm almost works if a human only participates in a single security domain ... it real-life that is far from true ... an individual may have tens or hundres of security relationships ... and the shared-secret paradigm tends to totally disintergrate ... from a real-world practical view-point; although it is possible for institutions to ignore reality and choose to believe that the only relationship that an individual is ever involved in for their whole life is a single relationship with that institution.
a properly protected private key avoids much of such shortcomings. A single PIN/password is used to establish access to the private key in a hardware token. Since the PIN/password (and private key) is never divulged to any outside agency ... it represents a totally different risk/exploit paradigm aka shared-secret PIN/passwords are at risk & represent a totally different because they are shared with multiple parties; PIN/passwords for token activiation represent a totally different kind of PIN/password paradigm.
In an authentication model ... using a private key hardware token that is PIN/password activated ... you can have 2-factor authentication ... something the person "has" and something the person "knows" (typically both of them are assumed to be relatively unique ... aka the token is unique and the associated knowledge is unique and not-shared). By comparison, 3-factor authentication involves something you have, something you know and something you are (aka typically implemented as some form of biometrics).
In any case, 2-factor authentication that uniquely originates/signs transactions is significantly more secure than any shared-secret authentication paradigm ... even if the corresponding "public key" (used for message/signature authentication) is extremely widely distributed.
In fact, to keep from falling into some of the same human factors shortcomings as the current shared-secret paradigm (where a person is required to have a unique & different shared-secret authentication PIN/password for every type, kind, and instance of relationship) it would be preferrable not to require a person to possess and utilize hundreds of different tokens. In fact, one of the biggest "at risk" problems in the current shared-secret paradigm is that an individual is forced to actually use a few number of easily remembered shared-secret PIN/passwords. Since they are few in number, they are utilized in multiple different contexts ... opening the exploit that one institution can attack other institutions (using common shared-secrets). Also, since they are easily remembered, the are subject to brute-forced guessing.
Some institutions believe that isn't true and choose to assign arbitrarily difficult shared-secret PIN/passwords ... which results in the real-world scenerio of the individual recording all their (difficult) PIN/passwords ... which are then subject to copying.
specific artical from postings
https://www.garlic.com/~lynn/aepay3.htm#passwords
Password problems account for 20-50% of all calls to help desks,
costing about a million dollars per year for a typical mid-sized
company. About time we start taking the human factors of security
seriously.
Passwords don't work: except for certain circus performers,
nobody can remember a large number of random strings. And yet, how
many security groups include a usability expert? (New York Times
article: access requires free registration.). (August 5)
also referenced in similar thread last month in this n.g.
https://www.garlic.com/~lynn/2001i.html#36
effectively, shared-secrets paradigms quickly break down. It is then either hardware tokens &/or biometrics. However, to avoid having a shared-secret biometrics (i.e. like fingerprint centrally recorded at every institution), it has to be implemented in conjunction with some form of hardware token. The challenge then seems to be addressing the hardware token market inhibitors (cost, value proposition, ease-of-use, etc).
security glossary (see authentication related entries):
https://www.garlic.com/~lynn/secure.htm
random discussions about short-comings of shared-secret paradigms
https://www.garlic.com/~lynn/aadsm2.htm#inetpki A PKI for the Internet (was RE: Scale (and the SRV
https://www.garlic.com/~lynn/aadsm2.htm#account A different architecture? (was Re: certificate path
https://www.garlic.com/~lynn/aadsm2.htm#straw AADS Strawman
https://www.garlic.com/~lynn/aadsm2.htm#strawm3 AADS Strawman
https://www.garlic.com/~lynn/aadsm2.htm#keyl4 On leaving the 56-bit key length limitation
https://www.garlic.com/~lynn/aadsm2.htm#pkikrb PKI/KRB
https://www.garlic.com/~lynn/aadsm3.htm#cstech cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#cstech2 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#cstech4 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#cstech5 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#cstech6 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#cstech8 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#cstech10 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#cstech13 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#kiss1 KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
https://www.garlic.com/~lynn/aadsm3.htm#kiss2 Common misconceptions, was Re: KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp-00.txt))
https://www.garlic.com/~lynn/aadsm3.htm#kiss3 KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
https://www.garlic.com/~lynn/aadsm3.htm#kiss8 KISS for PKIX
https://www.garlic.com/~lynn/aadsm3.htm#kiss9 KISS for PKIX .... password/digital signature
https://www.garlic.com/~lynn/aadsm4.htm#00 Is The Public Key Infrastructure Outdated?
https://www.garlic.com/~lynn/aadsm4.htm#7 Public Key Infrastructure: An Artifact...
https://www.garlic.com/~lynn/aadsm5.htm#shock2 revised Shocking Truth about Digital Signatures
https://www.garlic.com/~lynn/aadsm5.htm#spki Simple PKI
https://www.garlic.com/~lynn/aadsm5.htm#spki4 Simple PKI
https://www.garlic.com/~lynn/aadsm6.htm#websecure merchant web server security
https://www.garlic.com/~lynn/aadsmore.htm#keytext proposed key usage text
https://www.garlic.com/~lynn/aadsmore.htm#killer1 Killer PKI Applications
https://www.garlic.com/~lynn/aadsmore.htm#biosigs biometrics and electronic signatures
https://www.garlic.com/~lynn/aadsmore.htm#client4 Client-side revocation checking capability
https://www.garlic.com/~lynn/aepay2.htm#privrule3 U.S. firms gird for privacy rules
https://www.garlic.com/~lynn/aepay3.htm#votec (my) long winded observations regarding X9.59 & XML, encryption and certificates
https://www.garlic.com/~lynn/aepay3.htm#votec (my) long winded observations regarding X9.59 & XML, encryption and certificates
https://www.garlic.com/~lynn/aepay3.htm#votec (my) long winded observations regarding X9.59 & XML, encryption and certificates
https://www.garlic.com/~lynn/aepay3.htm#votec (my) long winded observations regarding X9.59 & XML, encryption and certificates
https://www.garlic.com/~lynn/aepay3.htm#mcomm (my) misc. additional comments on X9.59 issues.
https://www.garlic.com/~lynn/aepay3.htm#mcomm (my) misc. additional comments on X9.59 issues.
https://www.garlic.com/~lynn/aepay3.htm#mcomm (my) misc. additional comments on X9.59 issues.
https://www.garlic.com/~lynn/aepay3.htm#mcomm (my) misc. additional comments on X9.59 issues.
https://www.garlic.com/~lynn/aepay3.htm#aadsrel1 AADS related information
https://www.garlic.com/~lynn/aepay3.htm#aadsrel1 AADS related information
https://www.garlic.com/~lynn/aepay3.htm#aadsrel1 AADS related information
https://www.garlic.com/~lynn/aepay3.htm#aadsrel1 AADS related information
https://www.garlic.com/~lynn/aepay3.htm#aadsrel1 AADS related information
https://www.garlic.com/~lynn/aepay3.htm#aadsrel1 AADS related information
https://www.garlic.com/~lynn/aepay3.htm#aadsrel1 AADS related information
https://www.garlic.com/~lynn/aepay3.htm#aadsrel1 AADS related information
https://www.garlic.com/~lynn/aepay3.htm#aadsrel1 AADS related information
https://www.garlic.com/~lynn/aepay3.htm#aadsrel1 AADS related information
https://www.garlic.com/~lynn/aepay3.htm#passwords Passwords don't work
https://www.garlic.com/~lynn/aepay4.htm#dnsinteg1 Domain Name integrity problem
https://www.garlic.com/~lynn/aepay6.htm#x959b X9.59 Electronic Payment standard issue
https://www.garlic.com/~lynn/aepay6.htm#harvest2 shared-secrets, CC#, & harvesting CC#
https://www.garlic.com/~lynn/aepay6.htm#erictalk Announce: Eric Hughes giving Stanford EE380 talk this
https://www.garlic.com/~lynn/aepay6.htm#ecml Electronic Commerce Modeling Language
https://www.garlic.com/~lynn/aepay6.htm#dspki5 use of digital signatures and PKI (addenda)
https://www.garlic.com/~lynn/aepay7.htm#ssexploit Shared-Secret exploit
https://www.garlic.com/~lynn/aepay7.htm#netbank net banking, is it safe?? ... power to the consumer
https://www.garlic.com/~lynn/ansiepay.htm#privacy more on privacy
https://www.garlic.com/~lynn/ansiepay.htm#ifraud Internet Fraud
https://www.garlic.com/~lynn/99.html#52 Enter fonts (was Re: Unix case-sensitivity: how did it originate?
https://www.garlic.com/~lynn/99.html#172 checks (was S/390 on PowerPC?)
https://www.garlic.com/~lynn/99.html#173 checks (was S/390 on PowerPC?)
https://www.garlic.com/~lynn/99.html#214 Ask about Certification-less Public Key
https://www.garlic.com/~lynn/99.html#226 Attacks on a PKI
https://www.garlic.com/~lynn/99.html#228 Attacks on a PKI
https://www.garlic.com/~lynn/99.html#235 Attacks on a PKI
https://www.garlic.com/~lynn/99.html#238 Attacks on a PKI
https://www.garlic.com/~lynn/2000.html#33 SmartCard with ECC crypto
https://www.garlic.com/~lynn/2000.html#39 "Trusted" CA - Oxymoron?
https://www.garlic.com/~lynn/2000.html#47 TLS: What is the purpose of the client certificate request?
https://www.garlic.com/~lynn/2000.html#57 RealNames hacked. Firewall issues.
https://www.garlic.com/~lynn/2000b.html#14 Will Radius be obsolute if implement 2-token authentications?
https://www.garlic.com/~lynn/2000b.html#29 20th March 2000
https://www.garlic.com/~lynn/2000b.html#46 Simple authentication protocol: any good?
https://www.garlic.com/~lynn/2000b.html#53 Digital Certificates-Healthcare Setting
https://www.garlic.com/~lynn/2000b.html#90 Question regarding authentication implementation
https://www.garlic.com/~lynn/2000b.html#92 Question regarding authentication implementation
https://www.garlic.com/~lynn/2000c.html#32 Request for review of "secure" storage scheme
https://www.garlic.com/~lynn/2000d.html#70 When the Internet went private
https://www.garlic.com/~lynn/2000f.html#1 Why trust root CAs ?
https://www.garlic.com/~lynn/2000f.html#4 Why trust root CAs ?
https://www.garlic.com/~lynn/2000g.html#5 e-commerce: Storing Credit Card numbers safely
https://www.garlic.com/~lynn/2000g.html#33 does CA need the proof of acceptance of key binding ?
https://www.garlic.com/~lynn/2000g.html#34 does CA need the proof of acceptance of key binding ?
https://www.garlic.com/~lynn/2000g.html#49 Use of SET?
https://www.garlic.com/~lynn/2001c.html#8 Server authentication
https://www.garlic.com/~lynn/2001c.html#9 Server authentication
https://www.garlic.com/~lynn/2001c.html#30 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#34 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#39 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#40 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#41 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#42 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#54 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#60 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#65 Key Recovery System/Product
https://www.garlic.com/~lynn/2001d.html#20 What is PKI?
https://www.garlic.com/~lynn/2001d.html#21 What is PKI?
https://www.garlic.com/~lynn/2001d.html#51 OT Re: A beautiful morning in AFM.
https://www.garlic.com/~lynn/2001d.html#52 OT Re: A beautiful morning in AFM.
https://www.garlic.com/~lynn/2001d.html#53 April Fools Day
https://www.garlic.com/~lynn/2001d.html#62 OT Re: A beautiful morning in AFM.
https://www.garlic.com/~lynn/2001d.html#73 Rational basis for password policy?
https://www.garlic.com/~lynn/2001e.html#32 Blame it all on Microsoft
https://www.garlic.com/~lynn/2001e.html#52 Pre ARPAnet email?
https://www.garlic.com/~lynn/2001e.html#81 Passwords
https://www.garlic.com/~lynn/2001f.html#25 Question about credit card number
https://www.garlic.com/~lynn/2001f.html#31 Remove the name from credit cards!
https://www.garlic.com/~lynn/2001g.html#1 distributed authentication
https://www.garlic.com/~lynn/2001g.html#11 FREE X.509 Certificates
https://www.garlic.com/~lynn/2001g.html#38 distributed authentication
https://www.garlic.com/~lynn/2001g.html#40 Self-Signed Certificate
https://www.garlic.com/~lynn/2001h.html#5 PKI/Digital signature doesn't work
https://www.garlic.com/~lynn/2001h.html#7 PKI/Digital signature doesn't work
https://www.garlic.com/~lynn/2001h.html#75 Net banking, is it safe???
https://www.garlic.com/~lynn/2001i.html#9 Net banking, is it safe???
https://www.garlic.com/~lynn/2001i.html#16 Net banking, is it safe???
https://www.garlic.com/~lynn/2001i.html#25 Net banking, is it safe???
https://www.garlic.com/~lynn/2001i.html#26 No Trusted Viewer possible?
https://www.garlic.com/~lynn/2001i.html#35 Net banking, is it safe???
https://www.garlic.com/~lynn/2001i.html#36 Net banking, is it safe???
https://www.garlic.com/~lynn/2001i.html#57 E-commerce security????
https://www.garlic.com/~lynn/2001j.html#0 E-commerce security????
https://www.garlic.com/~lynn/2001j.html#2 E-commerce security????
https://www.garlic.com/~lynn/2001j.html#9 E-commerce security????
https://www.garlic.com/~lynn/2001j.html#11 PKI (Public Key Infrastructure)
https://www.garlic.com/~lynn/2001j.html#49 Are client certificates really secure?
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Are client certificates really secure? Newsgroups: comp.security.misc Date: Tue, 11 Sep 2001 13:06:30 GMTalun@texis.com (Alun Jones) writes:
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Does "Strong Security" Mean Anything? Newsgroups: comp.security.misc Date: Tue, 11 Sep 2001 13:20:38 GMTChanchao writes:
a recent similar discussion in some other security-related n.g.
https://www.garlic.com/~lynn/2001j.html#5
• physical security for the data processing room, motion detecters, guards, etc • multiple layers of firewalls & packet filtering routers • actual financial transactions performed on backroom dataprocessing • equipment away from the actual web server • fbi background checks for all employees • security audits • minimum business & security certification levels.in many circumstances (and even with the internet today) ... possibly 90+ percent of security violations are "insider" exploits (like embezzling money) so protection against insiders is typically where 90 percent of security is focused in many environments (protection from outsiders might only represent 10 percent of the security procedures; aka the 10' thick bank vaults, armed guards, etc).
misc. risk, fraud, exploit threads:
https://www.garlic.com/~lynn/subintegrity.html#fraud
--
Anne & Lynn Wheeler | lynn@garlic.com - https://www.garlic.com/~lynn/