From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: It keeps getting uglier Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Tue, 01 Jan 2008 08:07:42Steve_Thompson@STERCOMM.COM (Thompson, Steve) writes:
OPD's displaywriter was in WANG wordprocessing market segment.
ROMP was early 801 risc chip originally designed to be used for
displaywriter follow-on product. when that was killed, the group looked
around for something else to use the machine for and settled on the unix
workstation market. they got the company that had done the pc/ix port to
do one for the displaywriter "follow-on" and renamed the product the
PC/RT (and the software AIX).
https://www.garlic.com/~lynn/subtopic.html#801
The PC/RT follow-on was the RS6000 with RIOS chipset. RS6000 was relogo'ed as hardware platfrom by some number of other companies ... including WANG as it got out of the hardware business. As part of that change-over, some number of the people from RS6000 group went to WANG.
old time article from nov80 mentioning wang, word-processing market
http://www.time.com/time/magazine/article/0,9171,950498,00.html?iid=chix-sphere
page mentioning some of the old/70s wordprocessing market
http://www.computermuseum.li/Testpage/DedicatedWPMicros.htm
article on demise of dedicated wordprocessor boxes; having given away to
multi-application PCs
http://www.cbronline.com/article_cg_print.asp?guid=265D4108-6F66-49EC-80B1-E51D2AA8876E
note that there was a project in the early 80s to replace the wide
variety of internal microprocessors with 801/risc processors (including
the ones used for displaywriters). this included all the processors in
the low and mid-range 370s ... at the time, the 4341-follow-on (4381) was
going to use a 801/risc processor; the s/38-follow-on (as/400) was going
to use a 801/risc processor ... and lots of others were also. A special
flavor of 801/risc, Iliad had additional features for supporting
emulation of other architectures ... some old 801-related email,
including mention of work on Iliad chips
https://www.garlic.com/~lynn/lhwemail.html#801
for other topic drift, old email mentioning 43xx ... "e-architecture"
machines
https://www.garlic.com/~lynn/lhwemail.html#43xx
i.e. while the high-end 370 came up with 370-xa (code named "811"), the low/mid range came up with "e-architecture" (where dos/vs to vse came from).
for some archeological trivia, i contributed to the document killing 801/risc idea for the 4341-follow-on.
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: LINC-8 Front Panel Questions Newsgroups: alt.folklore.computers Date: Tue, 01 Jan 2008 11:58:07jmfbahciv writes:
IBM: Tape Backup is Here to Stay
http://www.enterpriseitplanet.com/storage/features/article.php/3719041
from:
"In order to maintain continuous business operations, address
regulatory requirements and archive business records, users need an
infrastructure that allows them to manage their data from online
application storage to offline, permanent archive media," says IBM's
Bruce Master, senior program manager, Worldwide Tape Storage Systems
Marketing. "Tape backup is a key part of this life cycle, allowing
users to safely store long term archives for record keeping and disaster
recovery while managing total costs of ownership (TCO)."
... snip ...
i mentioned before that when we were out marketing our ha/cmp
product
https://www.garlic.com/~lynn/subtopic.html#hacmp
we coined the terms disaster survivability and geographic survivability
https://www.garlic.com/~lynn/submain.html#available
we were also asked to write a section in the corporations continuous availability strategy document ... however both rochester and pok complained (as they couldn't meet at the time), and the section was pulled.
also from the above:
"IBM TS1120 tape drive and EKM technology is used in high-end
enterprise accounts by Fortune 100 companies in a variety of industries
including banking, finance and securities," says Master. "IBM's LTO
tape offerings have achieved nearly 900,000 drive shipments and over 10
million cartridge shipments."
... snip ...
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: folklore indeed Newsgroups: alt.folklore.computers Date: Tue, 01 Jan 2008 12:33:26Charlton Wilbur <cwilbur@chromatico.net> writes:
however, with the risk scaling linearly ... aggregation means that the countermeasures have to also increase enormously ... i.e. the refrain that the attackers can outspend the defenders by possibly 100:1.
a little military/boyd topic drift ... i think there is some guideline is that attackers need something like 3:1 for taking on a fixed defense ... being able to marshall 100:1, massively overwhelms fixed defense.
recent security thread mentioning boyd (& OODA-loop)
https://www.garlic.com/~lynn/aadsm28.htm#3 Why Security Modelling doesn't work -- the OODA-loop of today's battle
one could also claim that massive financial incentive also motivates
them to more quickly cycle their OODA-loop. misc. past posts mentioning
boyd
https://www.garlic.com/~lynn/subboyd.html#boyd
recent posts mentioning security proportional to risk and/or attackers
can afford to enormously outspend the defenders.
https://www.garlic.com/~lynn/aadsm26.htm#58 Our security sucks. Why can't we change? What's wrong with us?
https://www.garlic.com/~lynn/aadsm27.htm#3 Solution to phishing -- an idea who's time has come?
https://www.garlic.com/~lynn/aadsm28.htm#3 Why Security Modelling doesn't work -- the OODA-loop of today's battle
https://www.garlic.com/~lynn/2007e.html#26 Securing financial transactions a high priority for 2007
https://www.garlic.com/~lynn/2007f.html#75 Securing financial transactions a high priority for 2007
https://www.garlic.com/~lynn/2007g.html#20 T.J. Maxx data theft worse than first reported
https://www.garlic.com/~lynn/2007h.html#56 T.J. Maxx data theft worse than first reported
https://www.garlic.com/~lynn/2007i.html#64 John W. Backus, 82, Fortran developer, dies
https://www.garlic.com/~lynn/2007j.html#15 John W. Backus, 82, Fortran developer, dies
https://www.garlic.com/~lynn/2007l.html#39 My Dream PC -- Chip-Based
https://www.garlic.com/~lynn/2007l.html#48 My Dream PC -- Chip-Based
https://www.garlic.com/~lynn/2007v.html#86 folklore indeed
https://www.garlic.com/~lynn/2007v.html#87 Data Breaches Soar In 2007
https://www.garlic.com/~lynn/2007v.html#90 folklore indeed
https://www.garlic.com/~lynn/2007v.html#91 Tap and faucet and spellcheckers
https://www.garlic.com/~lynn/2007v.html#93 folklore indeed
https://www.garlic.com/~lynn/2007v.html#94 folklore indeed
https://www.garlic.com/~lynn/2007v.html#97 folklore indeed
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: No Glory for the PDP-15 Newsgroups: alt.folklore.computers,alt.sys.pdp10 Date: Tue, 01 Jan 2008 14:12:05"Carl Appellof" <doctorcja@yahoo.com> writes:
recent reference here to 360/30
https://www.garlic.com/~lynn/2007v.html#99 It keeps getting uglier
and some numbere of 360 FE manuals
http://www.bitsavers.org/pdf/ibm/360/fe/
which makes some reference to the native hardware of the machines ... and at least for 360/30, talks about 1401 & 1610 emulation mode.
360/65 had front panel selector for 709x emulation
a misc references to (36-bit) 709x:
IBM 7090 CompWisdom
http://www.compwisdom.com/topics/IBM-7090
IBM Archives: 7090 Data Processing System
http://www-03.ibm.com/ibm/history/exhibits/mainframe/mainframe_PP7090.html
IBM Archives: 7090 Data Processing System (continued)
http://www-03.ibm.com/ibm/history/exhibits/mainframe/mainframe_PP7090B.html
IBM 7090/94 Architecture Home Page
http://dgatx.com/computing/people/Jack-Harper/pubs/2004/IBM-7090/archive.html
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: folklore indeed Newsgroups: alt.folklore.computers Date: Tue, 01 Jan 2008 14:42:36Charlton Wilbur <cwilbur@chromatico.net> writes:
that is the outsider attack scenario ... the numbers indicate that as much as 70percent of such data breaches involve insiders. I've mentioned before that one of the results of focusing on the outsider issues will tend to obfuscate looking at major source, the insiders.
also, the large breaches are much more likely to make national press ... using news search engines ... there are quite a bit of purely "local" incidents hundreds.
there is also the scenario, that the financial institutions have fraud pattern analysis that are somewhat tuned to the "large" breaches ... looking at possibly hundred or thousands of account fraud reports and attempting to find some common transactions for the accounts (potentially indicating a common breach).
the "percentage chance" methodology tends to ignore sophistication level of crooks and/or amount of money that crooks might be willing to invest (i.e. crooks can afford to outspend defenders by as much as 100:1).
smaller operation will tend to have less sophisticated countermeasures and therefor more attactive to less sophisticated criminal activity. the sophistication of the countermeasures will tend to increase with the size of the operation ... which may mean some self-selection with regard to the sophistication of criminals doing the attacks.
the enormous multitude and variety of attacks is related to the posts in
the naked transaction metaphor threads
https://www.garlic.com/~lynn/subintegrity.html#payments
which can be considered the root of the scenario where "crooks can afford to enormously outspend attackers" and the huge imbalance in the security proportional to risk ... (and possibly except for the x9.59 financial standard work) ... everything else is mostly patchwork and simple point solution security measures.
past references/posts mentioning insiders:
https://www.garlic.com/~lynn/aadsm12.htm#44 Identity Theft More Often an Inside Job
https://www.garlic.com/~lynn/aadsm12.htm#58 Time to ID Identity-Theft Solutions
https://www.garlic.com/~lynn/aadsm14.htm#1 Who's afraid of Mallory Wolf?
https://www.garlic.com/~lynn/aadsm14.htm#12 Tackling security threats from within
https://www.garlic.com/~lynn/aadsm14.htm#28 Maybe It's Snake Oil All the Way Down
https://www.garlic.com/~lynn/aadsm17.htm#38 Study: ID theft usually an inside job
https://www.garlic.com/~lynn/aadsm17.htm#39 The future of security
https://www.garlic.com/~lynn/aadsm17.htm#47 authentication and authorization ... addenda
https://www.garlic.com/~lynn/aadsm17.htm#50 authentication and authorization (was: Question on the state of the security industry)
https://www.garlic.com/~lynn/aadsm17.htm#60 Using crypto against Phishing, Spoofing and Spamming
https://www.garlic.com/~lynn/aadsm18.htm#6 dual-use digital signature vulnerability
https://www.garlic.com/~lynn/aadsm18.htm#29 EMV cards as identity cards
https://www.garlic.com/~lynn/aadsm18.htm#49 one more time now, Leading Cause of Data Security breaches Are Due to Insiders, Not Outsiders
https://www.garlic.com/~lynn/aadsm19.htm#17 What happened with the session fixation bug?
https://www.garlic.com/~lynn/aadsm19.htm#19 "SSL stops credit card sniffing" is a correlation/causality myth
https://www.garlic.com/~lynn/aadsm22.htm#2 GP4.3 - Growth and Fraud - Case #3 - Phishing
https://www.garlic.com/~lynn/aadsm22.htm#3 GP4.3 - Growth and Fraud - Case #3 - Phishing
https://www.garlic.com/~lynn/aadsm22.htm#27 Meccano Trojans coming to a desktop near you
https://www.garlic.com/~lynn/aadsm22.htm#33 Meccano Trojans coming to a desktop near you
https://www.garlic.com/~lynn/aadsm22.htm#36 Unforgeable Blinded Credentials
https://www.garlic.com/~lynn/aadsm23.htm#0 Separation of Roles - an example
https://www.garlic.com/~lynn/aadsm23.htm#9 PGP "master keys"
https://www.garlic.com/~lynn/aadsm23.htm#10 PGP "master keys"
https://www.garlic.com/~lynn/aadsm23.htm#44 ThreatWatch - markets in loss, Visa's take, 419 "chairmen"
https://www.garlic.com/~lynn/aadsm24.htm#5 New ISO standard aims to ensure the security of financial transactions on the Internet
https://www.garlic.com/~lynn/aadsm24.htm#7 Naked Payments IV - let's all go naked
https://www.garlic.com/~lynn/aadsm24.htm#10 Naked Payments IV - let's all go naked
https://www.garlic.com/~lynn/aadsm24.htm#36 Interesting bit of a quote
https://www.garlic.com/~lynn/aadsm24.htm#48 more on FBI plans new Net-tapping push
https://www.garlic.com/~lynn/aadsm25.htm#13 Sarbanes-Oxley is what you get when you don't do FC
https://www.garlic.com/~lynn/aadsm25.htm#41 Why security training is really important (and it ain't anything to do with security!)
https://www.garlic.com/~lynn/aadsm26.htm#7 Citibank e-mail looks phishy
https://www.garlic.com/~lynn/aadsm27.htm#31 The bank fraud blame game
https://www.garlic.com/~lynn/aadsm27.htm#52 more on firing your MBA-less CSO
https://www.garlic.com/~lynn/aadsm27.htm#53 Doom and Gloom spreads, security revisionism suggests "H6.5: Be an adept!"
https://www.garlic.com/~lynn/aadsm27.htm#60 Retailers try to push data responsibilities back to banks
https://www.garlic.com/~lynn/2001c.html#45 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001g.html#38 distributed authentication
https://www.garlic.com/~lynn/2001j.html#54 Does "Strong Security" Mean Anything?
https://www.garlic.com/~lynn/2002.html#12 A terminology question
https://www.garlic.com/~lynn/2002d.html#14 Mainframers: Take back the light (spotlight, that is)
https://www.garlic.com/~lynn/2002f.html#35 Security and e-commerce
https://www.garlic.com/~lynn/2002j.html#14 Symmetric-Key Credit Card Protocol on Web Site
https://www.garlic.com/~lynn/2004i.html#5 New Method for Authenticated Public Key Exchange without Digital Certificates
https://www.garlic.com/~lynn/2004i.html#16 New Method for Authenticated Public Key Exchange without Digital Ceritificates
https://www.garlic.com/~lynn/2004j.html#15 US fiscal policy (Was: Bob Bemer, Computer Pioneer,Father of ASCII,Invento
https://www.garlic.com/~lynn/2004j.html#37 Vintage computers are better than modern crap !
https://www.garlic.com/~lynn/2005g.html#33 Good passwords and security priorities
https://www.garlic.com/~lynn/2005g.html#37 MVS secure configuration standard
https://www.garlic.com/~lynn/2005i.html#1 Brit banks introduce delays on interbank xfers due to phishing boom
https://www.garlic.com/~lynn/2005i.html#11 Revoking the Root
https://www.garlic.com/~lynn/2005j.html#52 Banks
https://www.garlic.com/~lynn/2005k.html#1 More on garbage
https://www.garlic.com/~lynn/2005k.html#55 Encryption Everywhere? (Was: Re: Ho boy! Another big one!)
https://www.garlic.com/~lynn/2005l.html#29 Importing CA certificate to smartcard
https://www.garlic.com/~lynn/2005l.html#35 More Phishing scams, still no SSL being used
https://www.garlic.com/~lynn/2005o.html#2 X509 digital certificate for offline solution
https://www.garlic.com/~lynn/2005v.html#2 ABN Tape - Found
https://www.garlic.com/~lynn/2006c.html#35 X.509 and ssh
https://www.garlic.com/~lynn/2006d.html#26 Caller ID "spoofing"
https://www.garlic.com/~lynn/2006d.html#28 Caller ID "spoofing"
https://www.garlic.com/~lynn/2006e.html#26 Debit Cards HACKED now
https://www.garlic.com/~lynn/2006e.html#44 Does the Data Protection Act of 2005 Make Sense
https://www.garlic.com/~lynn/2006h.html#15 Security
https://www.garlic.com/~lynn/2006h.html#26 Security
https://www.garlic.com/~lynn/2006k.html#4 Passwords for bank sites - change or not?
https://www.garlic.com/~lynn/2006k.html#16 Value of an old IBM PS/2 CL57 SX Laptop
https://www.garlic.com/~lynn/2006k.html#23 Value of an old IBM PS/2 CL57 SX Laptop
https://www.garlic.com/~lynn/2006k.html#33 Password Complexity
https://www.garlic.com/~lynn/2006p.html#9 New airline security measures in Europe
https://www.garlic.com/~lynn/2006u.html#40 New attacks on the financial PIN processing
https://www.garlic.com/~lynn/2006u.html#43 New attacks on the financial PIN processing
https://www.garlic.com/~lynn/2006v.html#2 New attacks on the financial PIN processing
https://www.garlic.com/~lynn/2006v.html#42 On sci.crypt: New attacks on the financial PIN processing
https://www.garlic.com/~lynn/2006v.html#49 Patent buster for a method that increases password security
https://www.garlic.com/~lynn/2006x.html#14 IBM ATM machines
https://www.garlic.com/~lynn/2007.html#42 The logic of privacy
https://www.garlic.com/~lynn/2007b.html#13 special characters in passwords
https://www.garlic.com/~lynn/2007b.html#20 How many 36-bit Unix ports in the old days?
https://www.garlic.com/~lynn/2007b.html#33 security engineering versus information security
https://www.garlic.com/~lynn/2007b.html#60 Securing financial transactions a high priority for 2007
https://www.garlic.com/~lynn/2007c.html#10 Securing financial transactions a high priority for 2007
https://www.garlic.com/~lynn/2007c.html#11 Decoding the encryption puzzle
https://www.garlic.com/~lynn/2007c.html#32 Securing financial transactions a high priority for 2007
https://www.garlic.com/~lynn/2007c.html#35 Securing financial transactions a high priority for 2007
https://www.garlic.com/~lynn/2007c.html#43 Securing financial transactions a high priority for 2007
https://www.garlic.com/~lynn/2007f.html#75 Securing financial transactions a high priority for 2007
https://www.garlic.com/~lynn/2007i.html#28 John W. Backus, 82, Fortran developer, dies
https://www.garlic.com/~lynn/2007i.html#65 John W. Backus, 82, Fortran developer, dies
https://www.garlic.com/~lynn/2007l.html#35 My Dream PC -- Chip-Based
https://www.garlic.com/~lynn/2007n.html#85 PCI Compliance - Encryption of all non-console administrative access
https://www.garlic.com/~lynn/2007n.html#94 PCI Compliance - Encryption of all non-console administrative access
https://www.garlic.com/~lynn/2007o.html#0 The Unexpected Fact about the First Computer Programmer
https://www.garlic.com/~lynn/2007q.html#11 what does xp do when system is copying
https://www.garlic.com/~lynn/2007q.html#72 Value of SSL client certificates?
https://www.garlic.com/~lynn/2007v.html#74 folklore indeed
https://www.garlic.com/~lynn/2007v.html#94 folklore indeed
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: folklore indeed Newsgroups: alt.folklore.computers Date: Tue, 01 Jan 2008 15:08:39Charlton Wilbur <cwilbur@chromatico.net> writes:
as noted repeatedly before ... there are some number of business processes, like disputes & chargebacks ... that mandate the retention of the transaction account number & date/time (which survive long after the merchant having received their money).
also as referenced in previous posts ... the national retailers
federation have raised the issue of changing the retention mandates.
https://www.garlic.com/~lynn/aadsm27.htm#60 Retailers try to push data responsibilities back to banks
there is some conjecture that the financial institutions may resist becoming responsible for the transaction activity respository with lots of distributed access from their retailers and merchants ... since there would be a huge number of breach opportunities (represented by all those authorized accesses) and the financial institution then becomes liable (rather than the merchant for the breach).
also this reference to large national retailer
https://www.garlic.com/~lynn/2007v.html#95 folklore indeed
had calculated that the current transaction information retention mandates were costing more than automatically paying all existing disputes and chargebacks ... and was seriously considering dumping the data, ignoring the retention mandates and just automatically paying off dispuates and chargebacks. Or, at least until somebody raised the issue what might happened if that became public knowledge.
however, since with the underlying naked transaction metaphor
https://www.garlic.com/~lynn/subintegrity.html#payment
there is still an enormous end-to-end vulnerability ... having aggregated repositories with a large number of "insiders" with access from widely distributed locations ... can create a new set of exploit avenues.
in the security proportional to risk scenario, the breach itself isn't the risk, the risk is that the crooks use the information for fraudulent transactions.
in the x9.59 financial standard scenario
https://www.garlic.com/~lynn/x959.html#x959
the risk isn't reduced by securing all possible breaches and/or all possible other points where crooks might be able to obtain the information ... for complete end-to-end security ... as per the requirement placed on the x9a10 financial standard working group to preseve the integrity of the financial infrastructure for *ALL* retail payments ... in x9.59 financial standard protocol, the risk is reduced by eliminating the crooks being able to use the information for fraudulent transactions.
misc. posts mentioning disputes, chargebacks, and/or references
to NRF wanting the financial institutions to change the information
retention mandates
https://www.garlic.com/~lynn/aadsm3.htm#cstech3 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aepay3.htm#disputes Half of Visa's disputes, fraud result from I-commerce (more)
https://www.garlic.com/~lynn/aadsm6.htm#nonreput Sender and receiver non-repudiation
https://www.garlic.com/~lynn/aadsm6.htm#terror7 [FYI] Did Encryption Empower These Terrorists?
https://www.garlic.com/~lynn/aadsm6.htm#terror12 [FYI] Did Encryption Empower These Terrorists?
https://www.garlic.com/~lynn/aadsm6.htm#terror13 [FYI] Did Encryption Empower These Terrorists?
https://www.garlic.com/~lynn/aadsm6.htm#terror14 [FYI] Did Encryption Empower These Terrorists? (addenda to chargebacks)
https://www.garlic.com/~lynn/aepay7.htm#nonrep0 non-repudiation, was Re: crypto flaw in secure mail standards
https://www.garlic.com/~lynn/aepay7.htm#nonrep3 non-repudiation, was Re: crypto flaw in secure mail standards
https://www.garlic.com/~lynn/aepay7.htm#nonrep5 non-repudiation, was Re: crypto flaw in secure mail standards
https://www.garlic.com/~lynn/aepay7.htm#nonrep6 non-repudiation, was Re: crypto flaw in secure mail standards
https://www.garlic.com/~lynn/aadsm7.htm#rubberhose Rubber hose attack
https://www.garlic.com/~lynn/aepay10.htm#41 ATM Scams - Whose Liability Is It, Anyway?
https://www.garlic.com/~lynn/aadsm10.htm#tamper Limitations of limitations on RE/tampering (was: Re: biometrics)
https://www.garlic.com/~lynn/aadsm12.htm#63 Intertrust, Can Victor Shear Bring Down Microsoft?
https://www.garlic.com/~lynn/aadsm17.htm#59 dual-use digital signature vulnerability
https://www.garlic.com/~lynn/aadsm19.htm#44 massive data theft at MasterCard processor
https://www.garlic.com/~lynn/aadsm2.htm#useire U.S. & Ireland use digital signature
https://www.garlic.com/~lynn/aadsm20.htm#22 ID "theft" -- so what?
https://www.garlic.com/~lynn/aadsm21.htm#36 browser vendors and CAs agreeing on high-assurance certificates
https://www.garlic.com/~lynn/aadsm23.htm#14 Shifting the Burden - legal tactics from the contracts world
https://www.garlic.com/~lynn/aadsm23.htm#33 Chip-and-Pin terminals were replaced by "repairworkers"?
https://www.garlic.com/~lynn/aadsm26.htm#10 Who has a Core Competency in Security?
https://www.garlic.com/~lynn/aadsm26.htm#44 Governance of anonymous financial services
https://www.garlic.com/~lynn/aadsm26.htm#48 Governance of anonymous financial services
https://www.garlic.com/~lynn/aadsm26.htm#63 Public key encrypt-then-sign or sign-then-encrypt?
https://www.garlic.com/~lynn/2000.html#57 RealNames hacked. Firewall issues.
https://www.garlic.com/~lynn/2001j.html#2 e-commerce security????
https://www.garlic.com/~lynn/2001l.html#52 Security standards for banks and other institution
https://www.garlic.com/~lynn/2002d.html#41 Why?
https://www.garlic.com/~lynn/2002f.html#10 Least folklorish period in computing (was Re: IBM Mainframe at home)
https://www.garlic.com/~lynn/2002m.html#36 (OT) acceptance of technology, was: Convenient and secure
https://www.garlic.com/~lynn/2003l.html#65 Strength of RSA with known plain-text
https://www.garlic.com/~lynn/2004i.html#17 New Method for Authenticated Public Key Exchange without Digital Certificates
https://www.garlic.com/~lynn/2005e.html#41 xml-security vs. native security
https://www.garlic.com/~lynn/2007h.html#28 sizeof() was: The Perfect Computer - 36 bits?
https://www.garlic.com/~lynn/2007i.html#23 John W. Backus, 82, Fortran developer, dies
https://www.garlic.com/~lynn/2007i.html#64 John W. Backus, 82, Fortran developer, dies
https://www.garlic.com/~lynn/2007j.html#67 open source voting
https://www.garlic.com/~lynn/2007r.html#32 Is the media letting banks off the hook on payment card security
https://www.garlic.com/~lynn/2007r.html#66 The new urgency to fix online privacy
https://www.garlic.com/~lynn/2007v.html#62 folklore indeed
https://www.garlic.com/~lynn/2007v.html#85 folklore indeed
https://www.garlic.com/~lynn/2007v.html#94 folklore indeed
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: It keeps getting uglier Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Tue, 01 Jan 2008 15:14:17edgould1948@COMCAST.NET (Ed Gould) writes:
not just me:
http://www-03.ibm.com/ibm/history/history/year_1968.html
from above:
Additions to System/360 family are announced, including the Model
85. The high-speed cache, or buffer memory, found in the System/360
Model 85, is the first in the industry. The cache memory makes highly
prioritized information available at 12 times the speed of regular,
main-core memory.
... snip ...
not only first 360 ... but "first in the industry".
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: folklore indeed Newsgroups: alt.folklore.computers Date: Tue, 01 Jan 2008 15:56:36Anne & Lynn Wheeler <lynn@garlic.com> writes:
for other x9a10 financial standard working group and
x9.59 financial standard folklore
https://www.garlic.com/~lynn/x959.html#x959
and
https://www.garlic.com/~lynn/subpubkey.html#x959
x9.59 given the requirement to address *ALL* retail payments had to look
seriously at all possible compromises in all possible environments
... not just simple point solution in single specific environments.
as mentioned in some recent posts ... some of the other solutions
from the period had enormous payload and processing bloat
https://www.garlic.com/~lynn/2007v.html#64 folklore indeed
and/or were so myopically focused on particular point solution
actually managed to reduce the integrity of the overall,
end-to-end infrastructure
https://www.garlic.com/~lynn/aadsm28.htm#1
part of x9.59 standard was to require strong authentication
for every transactions ... as means of eliminating the enormous
number of vulnerabilities inherit in the existing paradigm
associated with the naked transaction metaphor
https://www.garlic.com/~lynn/subintegrity.html#payments
so one of the mechanism for strong authentication involved digital
signatures ... but the genre from the period was to append a digital
certificate to every digital signature. The associated digital
certificate paradigm was one of the things that contributed to some of
the enormous payload and processing bloats
https://www.garlic.com/~lynn/subpubkey.html#bloat
The x9a10 proposed a much simpler processing paradigm with
digital signatures that didn't require the enormous additional
processing and payload bloat represented by the digital
certificate processing
https://www.garlic.com/~lynn/subpubkey.html#certless
this created some amount of contention among standard body members who were strongly oriented towards digital certificate paradigm ... and there was strong on going effort to make x9.59 standard mandate digital certificates (which contributed to delays in getting the standard finally passed).
however the significant processing and payload bloat that resulted from digital certificates was a well known fact. as a result, there was a standardization effort started in x9 for financial transaction compressed digital certificates (addressing at least the enormous payload bloat problem, with objective of reducing the enormous payload bloat from a factor of one hundred times to possibly only five times)
after awhile, i proposed that it was possible to take their compression principles and compress a financial transaction digital certificate to zero bytes. then, instead stating that x9.59 transaction would not need an appended digital certificate (as a means of avoiding the enormous payload and processing bloat), the standard could state that x9.59 transaction standard mandated that every transaction have an appended zero-byte digital certificate.
past posts describing zero-byte digital certificates and/or how to
create zero-byte digital certificates:
https://www.garlic.com/~lynn/aadsm3.htm#cstech3 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#cstech6 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#kiss1 KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
https://www.garlic.com/~lynn/aadsm3.htm#kiss6 KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
https://www.garlic.com/~lynn/aadsm4.htm#6 Public Key Infrastructure: An Artifact...
https://www.garlic.com/~lynn/aadsm4.htm#9 Thin PKI won - You lost
https://www.garlic.com/~lynn/aadsm5.htm#x959 X9.59 Electronic Payment Standard
https://www.garlic.com/~lynn/aadsm5.htm#shock revised Shocking Truth about Digital Signatures
https://www.garlic.com/~lynn/aadsm8.htm#softpki8 Software for PKI
https://www.garlic.com/~lynn/aadsm9.htm#softpki23 Software for PKI
https://www.garlic.com/~lynn/aadsm12.htm#28 Employee Certificates - Security Issues
https://www.garlic.com/~lynn/aadsm12.htm#64 Invisible Ink, E-signatures slow to broadly catch on (addenda)
https://www.garlic.com/~lynn/aadsm13.htm#20 surrogate/agent addenda (long)
https://www.garlic.com/~lynn/aadsm14.htm#30 Maybe It's Snake Oil All the Way Down
https://www.garlic.com/~lynn/aadsm14.htm#41 certificates & the alternative view
https://www.garlic.com/~lynn/aadsm20.htm#11 the limits of crypto and authentication
https://www.garlic.com/~lynn/aadsm22.htm#4 GP4.3 - Growth and Fraud - Case #3 - Phishing
https://www.garlic.com/~lynn/aadsm23.htm#51 Status of opportunistic encryption
https://www.garlic.com/~lynn/aadsm24.htm#5 New ISO standard aims to ensure the security of financial transactions on the Internet
https://www.garlic.com/~lynn/aadsm27.htm#35 The bank fraud blame game
https://www.garlic.com/~lynn/2000b.html#93 Question regarding authentication implementation
https://www.garlic.com/~lynn/2000e.html#41 Why trust root CAs ?
https://www.garlic.com/~lynn/2000f.html#3 Why trust root CAs ?
https://www.garlic.com/~lynn/2000f.html#15 Why trust root CAs ?
https://www.garlic.com/~lynn/2001c.html#57 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#58 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#72 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001e.html#35 Can I create my own SSL key?
https://www.garlic.com/~lynn/2001f.html#79 FREE X.509 Certificates
https://www.garlic.com/~lynn/2001g.html#65 PKI/Digital signature doesn't work
https://www.garlic.com/~lynn/2001i.html#16 Net banking, is it safe???
https://www.garlic.com/~lynn/2004d.html#7 Digital Signature Standards
https://www.garlic.com/~lynn/2004j.html#6 New Method for Authenticated Public Key Exchange without Digital Certificates
https://www.garlic.com/~lynn/2004j.html#7 New Method for Authenticated Public Key Exchange without Digital Certificates
https://www.garlic.com/~lynn/2004j.html#8 New Method for Authenticated Public Key Exchange without Digital Certificates
https://www.garlic.com/~lynn/2004j.html#9 Smart card Authentification
https://www.garlic.com/~lynn/2005n.html#33 X509 digital certificate for offline solution
https://www.garlic.com/~lynn/2005o.html#31 Is symmetric key distribution equivalent to symmetric key generation?
https://www.garlic.com/~lynn/2005t.html#6 phishing web sites using self-signed certs
https://www.garlic.com/~lynn/2006b.html#37 X.509 and ssh
https://www.garlic.com/~lynn/2006c.html#35 X.509 and ssh
https://www.garlic.com/~lynn/2006e.html#8 Beginner's Pubkey Crypto Question
https://www.garlic.com/~lynn/2006f.html#29 X.509 and ssh
https://www.garlic.com/~lynn/2006f.html#31 X.509 and ssh
https://www.garlic.com/~lynn/2006h.html#28 confidence in CA
https://www.garlic.com/~lynn/2006i.html#13 Multi-layered PKI implementation
https://www.garlic.com/~lynn/2007h.html#31 sizeof() was: The Perfect Computer - 36 bits?
https://www.garlic.com/~lynn/2007l.html#16 John W. Backus, 82, Fortran developer, dies
https://www.garlic.com/~lynn/2007q.html#72 Value of SSL client certificates?
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: folklore indeed Newsgroups: alt.folklore.computers Date: Tue, 01 Jan 2008 15:56:36Anne & Lynn Wheeler <lynn@garlic.com> writes:
for other x9a10 financial standard working group and
x9.59 financial standard folklore
https://www.garlic.com/~lynn/x959.html#x959
and
https://www.garlic.com/~lynn/subpubkey.html#x959
x9.59 given the requirement to address *ALL* retail payments had to look
seriously at all possible compromises in all possible environments
... not just simple point solution in single specific environments.
as mentioned in some recent posts ... some of the other solutions
from the period had enormous payload and processing bloat
https://www.garlic.com/~lynn/2007v.html#64 folklore indeed
and/or were so myopically focused on particular point solution
actually managed to reduce the integrity of the overall,
end-to-end infrastructure
https://www.garlic.com/~lynn/aadsm28.htm#1
part of x9.59 standard was to require strong authentication
for every transactions ... as means of eliminating the enormous
number of vulnerabilities inherit in the existing paradigm
associated with the naked transaction metaphor
https://www.garlic.com/~lynn/subintegrity.html#payments
so one of the mechanism for strong authentication involved digital
signatures ... but the genre from the period was to append a digital
certificate to every digital signature. The associated digital
certificate paradigm was one of the things that contributed to some of
the enormous payload and processing bloats
https://www.garlic.com/~lynn/subpubkey.html#bloat
The x9a10 proposed a much simpler processing paradigm with
digital signatures that didn't require the enormous additional
processing and payload bloat represented by the digital
certificate processing
https://www.garlic.com/~lynn/subpubkey.html#certless
this created some amount of contention among standard body members who were strongly oriented towards digital certificate paradigm ... and there was strong on going effort to make x9.59 standard mandate digital certificates (which contributed to delays in getting the standard finally passed).
however the significant processing and payload bloat that resulted from digital certificates was a well known fact. as a result, there was a standardization effort started in x9 for "compressed" digital certificates (addressing at least the enormous payload bloat problem).
after awhile, i proposed that it was possible to take their compression principles and compress a financial transaction digital certificate to zero bytes. then, instead stating that x9.59 transaction would not need an appended digital certificate (as a means of avoiding the enormous payload and processing bloat), the standard could state that x9.59 transaction standard mandated that every transaction have an appended zero byte digital certificate.
past posts describing zero byte digital certificates and/or how to
create zero byte digital certificates:
https://www.garlic.com/~lynn/aadsm3.htm#cstech3 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#cstech6 cardtech/securetech & CA PKI
https://www.garlic.com/~lynn/aadsm3.htm#kiss1 KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
https://www.garlic.com/~lynn/aadsm3.htm#kiss6 KISS for PKIX. (Was: RE: ASN.1 vs XML (used to be RE: I-D ACTION :draft-ietf-pkix-scvp- 00.txt))
https://www.garlic.com/~lynn/aadsm4.htm#6 Public Key Infrastructure: An Artifact...
https://www.garlic.com/~lynn/aadsm4.htm#9 Thin PKI won - You lost
https://www.garlic.com/~lynn/aadsm5.htm#x959 X9.59 Electronic Payment Standard
https://www.garlic.com/~lynn/aadsm5.htm#shock revised Shocking Truth about Digital Signatures
https://www.garlic.com/~lynn/aadsm8.htm#softpki8 Software for PKI
https://www.garlic.com/~lynn/aadsm9.htm#softpki23 Software for PKI
https://www.garlic.com/~lynn/aadsm12.htm#28 Employee Certificates - Security Issues
https://www.garlic.com/~lynn/aadsm12.htm#64 Invisible Ink, E-signatures slow to broadly catch on (addenda)
https://www.garlic.com/~lynn/aadsm13.htm#20 surrogate/agent addenda (long)
https://www.garlic.com/~lynn/aadsm14.htm#30 Maybe It's Snake Oil All the Way Down
https://www.garlic.com/~lynn/aadsm14.htm#41 certificates & the alternative view
https://www.garlic.com/~lynn/aadsm20.htm#11 the limits of crypto and authentication
https://www.garlic.com/~lynn/aadsm22.htm#4 GP4.3 - Growth and Fraud - Case #3 - Phishing
https://www.garlic.com/~lynn/aadsm23.htm#51 Status of opportunistic encryption
https://www.garlic.com/~lynn/aadsm24.htm#5 New ISO standard aims to ensure the security of financial transactions on the Internet
https://www.garlic.com/~lynn/aadsm27.htm#35 The bank fraud blame game
https://www.garlic.com/~lynn/2000b.html#93 Question regarding authentication implementation
https://www.garlic.com/~lynn/2000e.html#41 Why trust root CAs ?
https://www.garlic.com/~lynn/2000f.html#3 Why trust root CAs ?
https://www.garlic.com/~lynn/2000f.html#15 Why trust root CAs ?
https://www.garlic.com/~lynn/2001c.html#57 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#58 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001c.html#72 PKI and Non-repudiation practicalities
https://www.garlic.com/~lynn/2001e.html#35 Can I create my own SSL key?
https://www.garlic.com/~lynn/2001f.html#79 FREE X.509 Certificates
https://www.garlic.com/~lynn/2001g.html#65 PKI/Digital signature doesn't work
https://www.garlic.com/~lynn/2001i.html#16 Net banking, is it safe???
https://www.garlic.com/~lynn/2004d.html#7 Digital Signature Standards
https://www.garlic.com/~lynn/2004j.html#6 New Method for Authenticated Public Key Exchange without Digital Certificates
https://www.garlic.com/~lynn/2004j.html#7 New Method for Authenticated Public Key Exchange without Digital Certificates
https://www.garlic.com/~lynn/2004j.html#8 New Method for Authenticated Public Key Exchange without Digital Certificates
https://www.garlic.com/~lynn/2004j.html#9 Smart card Authentification
https://www.garlic.com/~lynn/2005n.html#33 X509 digital certificate for offline solution
https://www.garlic.com/~lynn/2005o.html#31 Is symmetric key distribution equivalent to symmetric key generation?
https://www.garlic.com/~lynn/2005t.html#6 phishing web sites using self-signed certs
https://www.garlic.com/~lynn/2006b.html#37 X.509 and ssh
https://www.garlic.com/~lynn/2006c.html#35 X.509 and ssh
https://www.garlic.com/~lynn/2006e.html#8 Beginner's Pubkey Crypto Question
https://www.garlic.com/~lynn/2006f.html#29 X.509 and ssh
https://www.garlic.com/~lynn/2006f.html#31 X.509 and ssh
https://www.garlic.com/~lynn/2006h.html#28 confidence in CA
https://www.garlic.com/~lynn/2006i.html#13 Multi-layered PKI implementation
https://www.garlic.com/~lynn/2007h.html#31 sizeof() was: The Perfect Computer - 36 bits?
https://www.garlic.com/~lynn/2007l.html#16 John W. Backus, 82, Fortran developer, dies
https://www.garlic.com/~lynn/2007q.html#72 Value of SSL client certificates?
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: folklore indeed Newsgroups: alt.folklore.computers Date: Wed, 02 Jan 2008 10:33:43Anne & Lynn Wheeler <lynn@garlic.com> writes:
a couple recent item:
Issuers Line Up for TJX Settlements
http://www.epaynews.com/index.cgi?survey=&ref=browse&f=view&id=11992194668314718872&block=
TJX To Pay Banks Up To $41 Million After Data-Theft Breach
http://money.cnn.com/news/newsfeeds/articles/djf500/200712201826DOWJONESDJONLINE001104_FORTUNE5.htm
...
as stated before, the "risk" isn't the actual breach, the "risk" is that the crooks can use the harvested information (regardless of how they obtained it; skimming, breaches, evesdropping, etc) for fraudulent transactions.
the x9a10 financial standard working group, in the mid-90s, having been
given the requirement to preserve the integrity of the financial
infrastructure for all retail payments, did detailed end-to-end
vulnerabiilty and threat assessment. the resulting x9.59 financial
standard:
https://www.garlic.com/~lynn/x959.html#x959
didn't do anything about reducing skimming, breaches, evesdropping, etc. what x9.59 standard did was eliminate the usefullness of that information to the crooks for executing fraudulent transactions.
this somewhat is discussed in various postings in the *naked transaction
metaphor* threads ... instead of requiring that all access to the
information is totally eliminated ... eliminating the ability to use the
information for fraud.
https://www.garlic.com/~lynn/subintegrity.html#payments
this is also the periodic observation that even if the planet were
buried under miles of (information hiding) encryption, it still wouldn't
be able to prevent the information leakage. part of this is the dual-use
characterization/requirements placed on the information. from one
standpoint, the information has to be readily available for numerous
business processes (and by a large number of different people). from
the other standpoint (since in the current paradigm, the information can
be used by crooks for fraudulent transactions), the information has to
be kept confidential and never divulged (to anybody). recent post
mentioning burying the planet under miles of encryption and
still not being able to prevent information leakage
https://www.garlic.com/~lynn/2007v.html#70 folklore indeed
we had been called in to consult with small client/server startup that
wanted to do payment transactions on their servers. they also had this
technology they invented, called SSL they wanted to use for the
transactions. the result is now frequently called electronic commerce.
https://www.garlic.com/~lynn/subnetwork.html#gateway
even before getting involved with x9a10 financial standard working
group, we realized that the information was extremely vulnerability and
we proposed that everybody with any kind of access to transaction
information, be required to at least have an FBI background check ... in
part because it had been known for a long time, that the highest
percentage of related fraud has involved insiders. recent post
mentioning insider issue
https://www.garlic.com/~lynn/2007v.html#74 folklore indeed
since FBI background check pretty much met all merchant employees ... it didn't get very far.
a few old posts mentioning the FBI background check requirement
https://www.garlic.com/~lynn/aadsm6.htm#terror3 [FYI] Did Encryption Empower These Terrorists?
https://www.garlic.com/~lynn/aadsm21.htm#20 Some thoughts on high-assurance certificates
https://www.garlic.com/~lynn/aadsm21.htm#34 X.509 / PKI, PGP, and IBE Secure Email Technologies
https://www.garlic.com/~lynn/aadsm22.htm#18 "doing the CA statement shuffle" and other dances
https://www.garlic.com/~lynn/2001j.html#5 e-commerce security????
https://www.garlic.com/~lynn/2001j.html#54 Does "Strong Security" Mean Anything?
https://www.garlic.com/~lynn/2005v.html#4 ABN Tape - Found
https://www.garlic.com/~lynn/2006.html#33 The new High Assurance SSL Certificates
https://www.garlic.com/~lynn/2006d.html#28 Caller ID "spoofing"
https://www.garlic.com/~lynn/2006d.html#30 Caller ID "spoofing"
https://www.garlic.com/~lynn/2007b.html#8 Special characters in passwords was Re: RACF - Password rules
https://www.garlic.com/~lynn/2007c.html#6 Securing financial transactions a high priority for 2007
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: For the History buff's an IBM 5150 pc Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Wed, 02 Jan 2008 16:16:14barry.a.schwarz@BOEING.COM (Schwarz, Barry A) writes:
predating the 5150 pc in 1981.
http://www-03.ibm.com/ibm/history/exhibits/pc/pc_1.html
from above:
One of the earliest IBM attempts to move computing into the hands of
single users was the "SCAMP" project in 1973. This six-month development
effort by the company's General Systems Division (GSD) produced a
prototype device dubbed "Special Computer, APL Machine Portable" (SCAMP)
that PC Magazine in 1983 called a "revolutionary concept" and "the
world's first personal computer." To build the prototype in the short
half-year allowed, its creators acquired off-the-shelf materials for
major components. SCAMP could be used as a desktop calculator, an
interactive APL programming device and as a "dispenser" of canned
applications. The successful demonstration of the prototype in 1973 led
to the launch of the IBM 5100 Portable Computer two years later.
... snip ...
of course, one could claim that work by science center
https://www.garlic.com/~lynn/subtopic.html#545tech
creating cp67 virtual machines in the mid-60s, enabled the deployment of CMS personal computing.
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Information security breaches quadrupled in 2007 Newsgroups: alt.folklore.computers Date: Wed, 02 Jan 2008 16:41:24so much for "Securing financial transactions a high priority for 2007".
Information security breaches quadrupled in 2007
http://www.theregister.co.uk/2008/01/02/data_breaches_skyrocket/
recent posts mentioning that change in paradigm may be necessary:
https://www.garlic.com/~lynn/aadsm28.htm#6 Death of antivirus software imminent
and
https://www.garlic.com/~lynn/aadsm28.htm#7 Why Security Modelling doesn't work -- the OODA-loop of today's battle
using the metaphor that the current situation doesn't provide a easily/readily defensable position ... applying a Boyd perspective ... what would be necessary to choose/create defensible position.
other
https://www.garlic.com/~lynn/aadsm28.htm#0 2007: year in review
and of course past posts mentioning Boyd
https://www.garlic.com/~lynn/subboyd.html#boyd
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: No Glory for the PDP-15 Newsgroups: alt.folklore.computers,alt.sys.pdp10 Date: Wed, 02 Jan 2008 19:25:47glen herrmannsfeldt <gah@ugcs.caltech.edu> writes:
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: LINC-8 Front Panel Questions Newsgroups: alt.folklore.computers Date: Wed, 02 Jan 2008 20:33:39John Byrns <byrnsj@sbcglobal.net> writes:
which then went thru a number of iterations as workstation datasave,
adsm, and currently tsm
http://www-306.ibm.com/software/tivoli/products/storage-mgr/
misc. backup/archive postings
https://www.garlic.com/~lynn/submain.html#backup
on the other hand ... never anticipated the problem recently mentioned
here involving loosing large amounts of archived data some dating
back to my undergraduate days in the 60s:
https://www.garlic.com/~lynn/2007u.html#29 Folklore references to CP67 at Lincoln Labs
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: hacked TOPS-10 monitors Newsgroups: alt.folklore.computers,alt.sys.pdp10 Date: Thu, 03 Jan 2008 10:45:31cstacy@news.dtpq.com (Christopher C. Stacy) writes:
it was less true of the other systems ... since they didn't ship as source distribution ... although source listings were available.
this changed in the early 80s with the transition to OCO (object code
only); recent posts mentioning OCO
https://www.garlic.com/~lynn/2007u.html#8 Open z/Architecture or Not
https://www.garlic.com/~lynn/2007u.html#9 Open z architecture and Linux questions
in the middle of the OCO wars there was some analysis of (waterloo)
"SHARE" library for vm370 ... that there was a many lines of source in
the "SHARE" library ... as there was in the base product. ... recent
post mentioning share (source) library:
https://www.garlic.com/~lynn/2007n.html#3 Is Parallel Programming Just Too Hard?
part of the corporate transition to OCO was to provide "user exits" ... places where users could add calleable routines associated with specific functions.
in recent thread in crypto mailing lists ... there were comments about
early systems not being built specifically for "security". recent
reference
https://www.garlic.com/~lynn/2008.html#12 No Glory for the PDP-15
and posts
https://www.garlic.com/~lynn/aadsm28.htm#4 Death of antivirus software iminent
https://www.garlic.com/~lynn/aadsm28.htm#6 Death of antivirus software iminent
https://www.garlic.com/~lynn/aadsm28.htm#8 Death of antivirus software iminent
however, the idea that a system that didn't provide security was sort of a foreign concept ... and therefor having to build a separate system specifically for security (because normal systems didn't provide security) was also a foreign concept.
besides the gov. and commercial institutions with high integrity
requirements there were also commercial timesharing (cp67 & vm370 based)
service bureaus
https://www.garlic.com/~lynn/submain.html#timeshare
and one of the things that they would do, was make cms "padded cell" modifications to limit the harm that users might do themselves (as opposed to underlying security that limited harm that they could do the system or each other).
one example of the level of security ... is some of these commercial timesharing service bureaus were providing services to competitive wall street firms (all on the same machine).
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: hacked TOPS-10 monitors Newsgroups: alt.folklore.computers,alt.sys.pdp10 Date: Thu, 03 Jan 2008 18:59:14Peter Flass <Peter_Flass@Yahoo.com> writes:
I had also done significant amount of HASP mods. as undergraduate. One was deleting the RJE support (to recover some space) and replacing it with 2741 & tty terminal support and a editor that implemented CMS edit syntax (total different code since cms editor wasn't re-entrant ... and HASP code had to be re-entrant) ... for an early CRJE
later in the transition from HASP to JES2 (and move to gburg, i've mentioned before my wife did a stint in the gburg JES group after working on future system project) ... JES2 had some integration and distribution problems. The JES2 was doing much of their source management with the cp67/vm370 processes on CMS ... but then to ship, they had to convert to "MVS" process.
misc. past posts mentioning hasp, jes, nje, etc
https://www.garlic.com/~lynn/submain.html#hasp
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: No Glory for the PDP-15 Newsgroups: alt.folklore.computers Date: Fri, 04 Jan 2008 10:15:04jmfbahciv writes:
this is also related to a joke that i buried in my resource manager.
https://www.garlic.com/~lynn/subtopic.html#fairshare
https://www.garlic.com/~lynn/subtopic.html#wsclock
the litigation from commerical and gov. resulted in the 23jun69
unbundling announcement
https://www.garlic.com/~lynn/submain.html#unbundle
which started to charge for application software and other services. however, the case was made that kernel software was still free. cp67 and vm370 continued full source-based distribution and maintenance.
however, the distraction of the future system effort
https://www.garlic.com/~lynn/submain.html#futuresys
and a period where products in the 370 pipeline started to dry up
... allowed clone processors to gain a foothold. i claim that then
contributed to the decision to start charging for kernel software
... and the release of my resource manager was selected to be the guinea
pig. however, even with starting to charge for all software ... there
was still a period before the decision to go OCO (object code only)
... recent reference:
https://www.garlic.com/~lynn/2008.html#14 hacked TOPS-10 monitors
a lot of resource manager was low level event oriented coding ... that permeated all thru the kernel (pathlength optimizatins, fault handling, elimination of conditiions to leading to zombies, kernel strucutre reorg anticipating multiprocessor support) ... however, the stated purpose for the resource manager was advanced dynamic adaptive capability.
one of the corporate revues came up with the state-of-the-art for all "modern" schedulers was low-level "tuning" knobs. this totally ignored all the code that monitored all the low-level operational characteristics and dynamically adapted to configuration and workload. So i had to add low-level "tuning" knobs to be considered "state-of-the-art".
documentation was provided describing exactly what the tuning knobs did as well as the "algorithms" behind what went on ... as well as all the code was available.
the joke? (which went undetected for decades?) was what operations research call "degrees of freedom" ... i.e. the dynamic adaptive code had more "degrees of freedom" than the tuning knobs. one of my characterizations was that the typical people dealing with low-level kernel code (in 360 assembler) didn't recognize something that was effectively dealing in time dimension.
misc past posts mentioning tuning knobs:
https://www.garlic.com/~lynn/97.html#12 OSes commerical, history
https://www.garlic.com/~lynn/2002c.html#13 OS Workloads : Interactive etc
https://www.garlic.com/~lynn/2002c.html#16 OS Workloads : Interactive etc
https://www.garlic.com/~lynn/2002c.html#28 OS Workloads : Interactive etc
https://www.garlic.com/~lynn/2004o.html#10 Multi-processor timing issue
https://www.garlic.com/~lynn/2005b.html#58 History of performance counters
https://www.garlic.com/~lynn/2006b.html#21 IBM 3090/VM Humor
https://www.garlic.com/~lynn/2007g.html#56 The Perfect Computer - 36 bits?
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Usefulness of bidirectional read/write? Newsgroups: alt.folklore.computers Date: Fri, 04 Jan 2008 19:22:54"Rostyslaw J. Lewyckyj" <urjlew@bellsouth.net> writes:
and magnetic tape i/o command codes
https://www.garlic.com/~lynn/gcard.html#25
from above (dates to 360 2400 tape drives)
I/O Command Codes Magnetic-Tape +-----------------------------------+------------------------------------+ | Write 01 | Sense 04 | | Write Tape Mark 0F | Request Track-in-Error 1B | | | Erase Gap 17 | | Read Forward 02 | | | Read Backward 0C | Mode Set 2 (9-track) | | | 800 BPI CB | | Backspace Block 27 | 1600 BPI C3 | | Backspace File 2F | 6250 BPI (3420) D3 | | Forward Space Block 37 | | | Forward Space File 3F | Sense Reserve (3420) F4 | | | Sense Release (3420) D4 | | Rewind 07 | | | Rewind Unload 0F | Loop Write-to-Read (3420) 8B | | | Set Diagnose (3420) 4B | | Data Secrity Erase (3420) 97 | Diagnostic Mode Set (3420) 0B | +-----------------------------------+------------------------------------+... snip ...
both read forward and read backward ... also mentioned here:
http://www-03.ibm.com/ibm/history/exhibits/storage/storage_2401.html
for even older ... IBM 7340 hypertape drive (circa 1961)
http://www-03.ibm.com/ibm/history/exhibits/storage/storage_7340.html
from above:
Among the 7340's features were:
• Character rate -- As many as 340,000 decimal digits per second;
170,000 alphanumeric characters per second.
* Checking -- Error detection and correction, dual odd-parity
checking. A new, highly reliable method of recording called "IBM
Phase Encoding" was used.
• Reel Capacity -- In many applications, more than twice that of the
IBM 729-IV reels (recorded at high density).
• Cartridges for Tape Reels -- Supply and take-up reels in a sealed
cartridge; faster loading and unloading (no manual threading of
tape), tape protected from contamination and operator damage,
unload reel without rewinding at any point in the file.
* Read Backward -- No rewinding necessary between passes in Phase II
of tape sorting, faster tape searching.
• Faster Access Times -- 4.2 milliseconds (average).
• File Protection -- Cartridge file protect device was under program control.
... snip ...
predates syncsort.
following:
http://www.softwarehistory.org/history/important_people.html
mentions Aso Tavitian co-founded Syncsort in 1969.
for a little topic drift, above, also mentions that Bob Weissman was
president of National CSS (cp67, virtual machine commercial timesharing
service bureau) when it was acquired by D&B ... subsequently became
president of D&B. some posts mentioning virtual machine timesharing
service bureau
https://www.garlic.com/~lynn/submain.html#timeshare
my first programming job as undergraduate was doing a port of 1401 MPIO program to 360/30. The univ. had 709 for running most of its workload ... but used a 1401 for driving unit record equipment and transfers to/from tape (with tapes manually carried between 1401 and 709).
the 360/30 was brought in to replace 1401 as part of transition to replacing the 709 ... and the 360/30 could perfectly well run the MPIO in 1401 hardware emulatiion mode ... but the port supposedly was part of gaining 360 experience.
as part of the port to 360/30, i implemented multiple buffering ... using all real storage that was available ... being able to overlap transfer to/from tape with unit record i/o.
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Remembering the Cray-1 Newsgroups: alt.folklore.computers Date: Fri, 04 Jan 2008 20:58:29Remembering the Cray-1
the above webpage (for tomorrow, 5 Jan 2008) also mentions:
Related stories
• Remembering the CDC 6600 (3 December 2007)
http://www.theregister.co.uk/2007/12/03/tob_cdc_6600/
• Remembering the IBM PC (17 November 2007)
http://www.theregister.co.uk/2007/11/17/tob_ibm_personal_computer/
• Remembering the Commodore PET 2001 (10 November 2007)
http://www.theregister.co.uk/2007/11/10/tob_commodore_pet_2001/
... on the other hand, this particular news organization has been
listing multiple virtualization (the "new", 40+ yr old) URLs on
nearly all of their webpages for some time.
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Tap and faucet and spellcheckers [was: Re: What do YOU call Newsgroups: alt.usage.english,alt.folklore.computers Date: Fri, 04 Jan 2008 22:14:10Lon Stowell <lon.stowell@comcast.net> writes:
old email reference
https://www.garlic.com/~lynn/2006b.html#email800310
in this post:
https://www.garlic.com/~lynn/2006b.html#39 another blast from the past
old email has a little topic drift x-over with this recent post:
https://www.garlic.com/~lynn/2008.html#17 Usefulness of bidirectional read/write?
the old email also has mention of inquiry by tso product
executive asking me if i would consider implementing my resource
manager in mvs ... slight topic drift x-over with this recent post:
https://www.garlic.com/~lynn/2008.html#16 No Glory for the PDP-15
of course other comments (in the old email) about cms (personal &
interactive computer) and tso (interactive? computing) being in
different divisions and each division needing their "own" offering is
quite contrived ... since earlier the "TSO" division had done its
best to totally kill off the whole vm370 product ... transferring all
the people to POK to assist in helping get out mvs/xa on schedule
... recent post with reference:
https://www.garlic.com/~lynn/2007v.html#96 source for VAX programmers
https://www.garlic.com/~lynn/2007v.html#100 source for VAX programmers
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Tap and faucet and spellcheckers [was: Re: What do YOU call Newsgroups: alt.usage.english,alt.folklore.computers Date: Sat, 05 Jan 2008 00:49:34Lon Stowell <lon.stowell@comcast.net> writes:
not having much success trying find something on the web of their connection to pyramid and/or the pre e-commerce business. did find a reference that one of their directors had been chairman and ceo of pyramid from 86 until 95 when it was acquired by siemens.
after doing the thing with the "small" client/server startup ... up the
street from them ... for what is frequently now called e-commerce
https://www.garlic.com/~lynn/subnetwork.html#gateway
... we then were asked in to spend some time with some number of the other companies in the area.
this is later reference ...
http://www.internetnews.com/ec-news/article.php/242421
one earlier reference:
Founded: 1987
Business description: ConnectInc.com private computer networks called
the CONNECT online information services delivery systems and electronic
commerce applications.
...
one of the issues is that the coming of the internet made the (private) value added networks (VANs) that were springing up in the 80s (some earlier), obsolete.
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: No Glory for the PDP-15 Newsgroups: alt.folklore.computers Date: Sat, 05 Jan 2008 12:38:28jmfbahciv writes:
recent thread in financial crypto blog mentioning Boyd and
(boyd's) OODA-loops
https://www.garlic.com/~lynn/aadsm28.htm#3 Why Security Modelling doesn't work -- the OODA-loop of today's battle
https://www.garlic.com/~lynn/aadsm28.htm#5 Why Security Modelling doesn't work -- the OODA-loop of today's battle
https://www.garlic.com/~lynn/aadsm28.htm#7 Why Security Modelling doesn't work -- the OODA-loop of today's battle
https://www.garlic.com/~lynn/aadsm28.htm#10 Why Security Modelling doesn't work -- the OODA-loop of today's battle
lots of past posts mentioning boyd
https://www.garlic.com/~lynn/subboyd.html#boyd
and various URLs from around the web mentioning boyd
and/or OODA-loops
https://www.garlic.com/~lynn/subboyd.html#boyd2
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Tap and faucet and spellcheckers Newsgroups: alt.usage.english,alt.folklore.computers Date: Sat, 05 Jan 2008 16:06:49 -0500Anne & Lynn Wheeler
one of the interesting aspects of this was that the courts seemed to view, that given a chance, human nature is criminal ... and it is necessary not to offer the chance; that human nature would be to steal something worth billions of dollars unless there were sufficient countermeasures in place (just like kids would jump in swimming pool unless there was fence around it).
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: z/OS and VM Control Blocks Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Sat, 05 Jan 2008 16:28:25lindy.mayfield@SSF.SAS.COM (Lindy Mayfield) writes:
it was eventually in use by all internal locations and PSRs ... even tho
there was a decision not to release it to customers.
https://www.garlic.com/~lynn/submain.html#dumprx
it sort-of started out as a demonstration of the functionality of the "new" rex ... the stated objective was in half-time over period of 3months, i would re-implement ipcs in rex(x) with ten times the function and it would run ten times faster (little slight of hand since the base ipcs was all implemented in assembler).
i had access to softcopy of all the base source files (including control block definitions) and documentation. however, nearly all this stuff had been created for hardcopy/printed output. the particular issue was how to come up with online appropriate information display including being able to tailor to problem being dealt with (very crude online context sensitive orientation).
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Need Help filtering out sporge in comp.arch Newsgroups: alt.folklore.computers Date: Sat, 05 Jan 2008 19:44:50ArarghMail801NOSPAM writes:
from above:
Program temporary fix is the standard IBM locution to designate single
bugfix or group of bugfixes distributed in a form ready to install for
customers. Often cited tongue-in-cheek as Permanent Temporary Fix.
... snip ...
also reference here ...
Using the program temporary fix (PTF) functions
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/books/c415321212.htm
for other topic drift, recent post mentioning vm370 source
update/maintenance
https://www.garlic.com/~lynn/2007u.html#6 Open z/Architecture or Not
https://www.garlic.com/~lynn/2007u.html#8 Open z/Architecture or Not
https://www.garlic.com/~lynn/2008.html#14 hacked TOPS-10 monitors
https://www.garlic.com/~lynn/2008.html#16 No Glory for the PDP-15
in vm370, each PTF was a separate source file "update" (one per source module needing update).
once a month, all accumlated PTFs and some set of lesser enhancements would be packaged ... with some amount of regression testing into a PLC (program level change) tape ... and distributed to customers.
there might be a major release about once a year ... where all accumulated source updates and other functional enhancements would be integrated with the base source module and distributed (on tape).
a "kernel" map consisted of listing of location of each module in fixed kernel memory ... as well as the base (assembler) source file along with date/time ... as well as naming of all individual source update files (along with date/time) that went into creating the final source that went into generating the executable image for that routine.
in the mid-80s, i was on business trip visiting the madrid science center ... they had a project scanning and digitizing a lot of old documents ... in preparation for 500 yr anniv. "discovery" of america. while there, i visited local movie house ... which included short film produced at the univ. one scene played major role with wall covered with possible 20 or so televisions ... all scrolling identical text (approx. 1200 baud?). it took me a short while to realize that it was continuously looping display of a vm370 kernel "map". What was worse, i realized I recognized the PLC of the kernel ... by which PTFs were and were not included.
misc. past posts mentioning visiting madrid science center:
https://www.garlic.com/~lynn/99.html#9 IBM S/360
https://www.garlic.com/~lynn/2000.html#14 Computer of the century
https://www.garlic.com/~lynn/2000g.html#36 stupid user stories
https://www.garlic.com/~lynn/2001e.html#66 line length (was Re: Babble from "JD" <dyson@jdyson.com>)
https://www.garlic.com/~lynn/2001n.html#16 Movies with source code (was Re: Movies with DEC minis)
https://www.garlic.com/~lynn/2002h.html#35 Computers in Science Fiction
https://www.garlic.com/~lynn/2002n.html#39 CMS update
https://www.garlic.com/~lynn/2004g.html#40 IBM 7094 Emulator - An historic moment?
https://www.garlic.com/~lynn/2004h.html#17 Google loves "e"
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Tap and faucet and spellcheckers Newsgroups: alt.usage.english,alt.folklore.computers Date: Sat, 05 Jan 2008 09:47:22Peter Moylan <peter@DIESPAMMERSDIEpmoylan.org> writes:
the issue then was what was going to happen to the software houses that became use to revenue streams from people constantly buying the latest/new release (somewhat like the old paradigm of people buying disposable, new cars every year).
"internet" showed up as the new "buzzword" about that time and allowed new set of "internet" oriented features to continually be advertised ... extended the ongoing revenue stream paradigm related to constant introduction of new features.
for other topic drift ... i was allowed to play disk engineer
in bldg. 14&15
https://www.garlic.com/~lynn/subtopic.html#disk
one of the things that was going on was that they had several "testcells" of new equipment being developed ... which had to be scheduled for stand-along testing with large mainframe (running custom, stand-alone software monitor).
they had tried bringing up MVS for supporting concurrent testing of multiple testcells ... however discovered that with just a single testcell, MVS's MTBF on the order of 15 minutes. so for the fun of it, i undertook to redo the i/o supervisor ... so the mainframes could be operating in a operating system environment with concurrent testing of numerous testcells going on (bullet proof environment that would never fail). the result was significant improvement in disk engineering productivity with testing of any testcell could occur at any time (w/o waiting for the dedicated time allocation).
one (corporate internal only) report mentioning all the work that had to be done ... and also mentioning the MVS 15 min MTBF issue ... resulted in taking a huge number of barbs and arrows from the MVS RAS group (not particularly about it not being true ... but who was I to be allowed to even refer to such a thing). one folklore was that all of the ill-will from the MVS RAS group tanked a corporate award for the work.
for even more drift ... a testcell was a heavy steel wire mesh cage with special combination padlock on each door. this was located inside a security controlled machine room, inside a security controlled building, inside a security controlled plant site.
one of the issues was somewhat related to a court case over theft of condifidential hardware documents by and employee and provided to a disk clone manufacturer. there was a claim that it represented several billion dollars i.e. the revenue difference to the clone company to be able ship a new disk the same day it was announced ... versus at least six month delay to come up with compatible disk via reverse engineering after obtaining one via normal sales mechanism.
the court supposedly made some reference effectively that there had to be security procedures proportional to the claimed value ... otherwise it could be treated as an "attractive nuisance" ... aka the swimming pool scenario requiring fence ... otherwise the owner can be held liable.
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Tap and faucet and spellcheckers Newsgroups: alt.usage.english,alt.folklore.computers Date: Sat, 05 Jan 2008 16:06:49Anne & Lynn Wheeler <lynn@garlic.com> writes:
one of the interesting aspects of this was that the courts seemed to view, that given a chance, human nature is criminal ... and it is necessary not to offer the chance; that human nature would be to steal something worth billions of dollars unless there were sufficient countermeasures in place (just like kids would jump in swimming pool unless there was fence around it).
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Tap and faucet and spellcheckers Newsgroups: alt.usage.english,alt.folklore.computers Date: Sun, 06 Jan 2008 09:31:00Anne & Lynn Wheeler <lynn@garlic.com> writes:
and old email
https://www.garlic.com/~lynn/2007.html#email801015
in this post from 1jan2007
https://www.garlic.com/~lynn/2007.html#2 The Elements of Programming Style
mentioning MVS RAS issues with new disks.
somewhat related posts with regard to results of having offended
some group or another:
https://www.garlic.com/~lynn/2007e.html#48 time spent/day on a computer
https://www.garlic.com/~lynn/2007j.html#75 IBM Unionization
https://www.garlic.com/~lynn/2007j.html#83 IBM Unionization
https://www.garlic.com/~lynn/2007j.html#94 IBM Unionization
https://www.garlic.com/~lynn/2007k.html#0 IBM Unionization
https://www.garlic.com/~lynn/2007k.html#4 IBM Unionization
https://www.garlic.com/~lynn/2007k.html#5 IBM Unionization
https://www.garlic.com/~lynn/2007k.html#9 IBM Unionization
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: As Expected, Ford Falls From 2nd Place in U.S. Sales Newsgroups: alt.folklore.computers Date: Sun, 06 Jan 2008 10:29:32As Expected, Ford Falls From 2nd Place in U.S. Sales
from above:
Toyota beat Ford in 2007 in United States auto sales, putting it behind
General Motors, industry statistics showed Thursday. Ford had held the
No. 2 spot since 1931, according to the company's historian.
... snip ...
i think the different between Toyota vis-a-vis GM and the recent overtaking Ford ... is whether or not it is world-wide figures or just US.
recent postings related to auto imports and competitiveness:
https://www.garlic.com/~lynn/2006x.html#32 Toyota set to lift crown from GM
https://www.garlic.com/~lynn/2007g.html#34 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007g.html#52 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007i.html#13 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007q.html#4 Horrid thought about Politics, President Bush, and Democrats
still didn't find article that mentions calling for 100% unearned profit tax ... but some related articles from the period:
http://multinationalmonitor.org/hyper/issues/1984/08/reagan.html
In 1980 the outlook was bleak for U.S. automobile manufacturers. They
had recent huge profit losses. Employment had fallen by 20
percent. The Chrysler Corporation had just narrowly escaped bankruptcy
by a federal bailout. It was all bad news, but rather than look for
causes within (such as quality control problems and lagging
productivity), the industry blamed Japanese imports. It turned to the
President it had supported in the 1980 election-who had run on a
platform of free market and free trade-and demanded some type of
restraint on imported autos.
In response, Reagan announced in 1981 that the U.S. had reached an
agreement with Japan on a voluntary export restraint limiting Japanese
automobile exports to the U.S. to 1.68 million cars a year.
The result has been a bonanza of auto profits and auto executive
bonuses. Creating an artificial scarcity of Japanese autos has caused
prices of both Japanese imports and U.S. manufactured autos to jump. A
1983 Wharton Econometrics study estimated that in 1981 and 1982, the
prices of Japanese imports increased an average of $920 to $960 per
car. And since 1981, the average price of a U.S. manufactured car has
increased by over 40 percent-twice the rate of increase in the
Consumer Price Index during the same period.
Profits in the U.S. auto industry soared from a loss of $3.8 billion
in 1980 to a gain of $7.7 billion in 1983. Brookings Institute
economist Robert Crandall estimates that "a substantial share of the
explanation must be the price effects of import restraints." And auto
industry executives have cashed in, too: Roger B. Smith, General
Motors chairman, granted himself $1.5 million in cash and stock
bonuses in 1983; Ford's chairman Phillip Caldwell took home $1.4
million.
...
http://www.heritage.org/Research/NationalSecurity/FYI48.cfm
From 1981 through 1983 the Japanese were allowed to ship 1.68 million
cars annually to the U.S.; last year the ceiling was 1.85 million. By
restricting the number of imported cars, Washington made it possible
for the auto companies to raise prices without fear of losing business
to less expensive competitors. Wharton Econometrics calculates that
the average price per new car has risen by $2,600 since the market
restrictions were imposed. Brookings Institution economist Robert
Crandall estimates that $400 of this price hike per U.S.-made car was
possible only because quotas reduced competition. With 1984 sales of
nearly 8 million U.S. cars, the quotas took $3.2 billion out of the
pockets of consumers and gave it to the auto industry. Crandall
further estimates that the low supply of imported cars mandated by the
quotas added $1,000 to the pricetag of every Japanese car sold in the
U.S., a total of $1.85 billion in extra consumer costs. The total 1984
bill for U.S. consumers due to auto trade restraints: $5 billion. Some
argue that quotas should be extended because the U.S. auto industry is
still not economically sound. This is a strange argument.
...
pasts posts mentioning there was article raising issue of
100% unearned profit tax:
https://www.garlic.com/~lynn/2000f.html#41 Reason Japanese cars are assembled in the US (was Re: American bigotry)
https://www.garlic.com/~lynn/2000f.html#43 Reason Japanese cars are assembled in the US (was Re: American bigotry)
https://www.garlic.com/~lynn/2001d.html#43 Economic Factors on Automation
https://www.garlic.com/~lynn/2004b.html#52 The SOB that helped IT jobs move to India is dead!
https://www.garlic.com/~lynn/2004h.html#22 Vintage computers are better than modern crap !
https://www.garlic.com/~lynn/2005s.html#2 Internet today -- what's left for hobbiests
https://www.garlic.com/~lynn/2006.html#23 auto industry
https://www.garlic.com/~lynn/2006g.html#14 The Pankian Metaphor
https://www.garlic.com/~lynn/2006g.html#17 The Pankian Metaphor
https://www.garlic.com/~lynn/2006g.html#20 The Pankian Metaphor
https://www.garlic.com/~lynn/2006m.html#49 The Pankian Metaphor (redux)
https://www.garlic.com/~lynn/2007j.html#33 IBM Unionization
https://www.garlic.com/~lynn/2007j.html#72 IBM Unionization
https://www.garlic.com/~lynn/2007j.html#88 IBM Unionization
https://www.garlic.com/~lynn/2007k.html#11 IBM Unionization
https://www.garlic.com/~lynn/2007k.html#24 IBM Unionization
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Need Help filtering out sporge in comp.arch Newsgroups: alt.folklore.computers Date: Sun, 06 Jan 2008 10:51:24Charles Richmond <frizzle@tx.rr.com> writes:
past references to internal, highly modified "csc/vm" that had somehow
leaked out to at&t longlines ... which they propagated to some number of
machines and continued to run it for nearly a decade ... then at&t
national marketing manager tracking me down to see if I could help get
them off that system and on to a current system:
https://www.garlic.com/~lynn/95.html#14 characters
https://www.garlic.com/~lynn/96.html#35 Mainframes & Unix (and TPF)
https://www.garlic.com/~lynn/97.html#15 OSes commerical, history
https://www.garlic.com/~lynn/2000.html#5 IBM XT/370 and AT/370 (was Re: Computer of the century)
https://www.garlic.com/~lynn/2000f.html#60 360 Architecture, Multics, ... was (Re: X86 ultimate CISC? No.)
https://www.garlic.com/~lynn/2001f.html#3 Oldest program you've written, and still in use?
https://www.garlic.com/~lynn/2002.html#4 Buffer overflow
https://www.garlic.com/~lynn/2002.html#11 The demise of compaq
https://www.garlic.com/~lynn/2002c.html#11 OS Workloads : Interactive etc
https://www.garlic.com/~lynn/2002i.html#32 IBM was: CDC6600 - just how powerful a machine was it?
https://www.garlic.com/~lynn/2002k.html#66 OT (sort-of) - Does it take math skills to do data processing ?
https://www.garlic.com/~lynn/2002p.html#23 Cost of computing in 1958?
https://www.garlic.com/~lynn/2003.html#17 vax6k.openecs.org rebirth
https://www.garlic.com/~lynn/2003d.html#46 unix
https://www.garlic.com/~lynn/2003k.html#4 1950s AT&T/IBM lack of collaboration?
https://www.garlic.com/~lynn/2004e.html#32 The attack of the killer mainframes
https://www.garlic.com/~lynn/2004m.html#58 Shipwrecks
https://www.garlic.com/~lynn/2005p.html#31 z/VM performance
https://www.garlic.com/~lynn/2006b.html#21 IBM 3090/VM Humor
https://www.garlic.com/~lynn/2007g.html#54 The Perfect Computer - 36 bits?
https://www.garlic.com/~lynn/2007g.html#56 The Perfect Computer - 36 bits?
https://www.garlic.com/~lynn/2007u.html#6 Open z/Architecture or Not
https://www.garlic.com/~lynn/2007v.html#15 folklore indeed
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: hacked TOPS-10 monitors Newsgroups: alt.folklore.computers,comp.sys.unisys Date: Sun, 06 Jan 2008 11:40:29"Dave Wade" <g8mqw@yahoo.com> writes:
for a little more drift ... only slightly related to this thread:
https://www.garlic.com/~lynn/2008.html#17 Usefulness of bidreictional read/write
in this post referencing getting call about helping get at&t longlines
off a highly modified, ancient csc/vm system
https://www.garlic.com/~lynn/2008.html#29 Need Help filtering out sporge in comp.arch
one of the "local" longlines (additional) modifications was support for "networked" tape drives. they had extended the device virtualization for tape drives to work over network (between vm370 machines) ... so applications running on remote vm370 could request tape mounts and read/write tapes on vm370 systems at other sites.
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: 1975 movie "Three Days of the Condor" tech stuff Newsgroups: alt.folklore.computers Date: Sun, 06 Jan 2008 14:16:03hancock4 writes:
some large merchants would aggregate the electronic transactions and have one (or very few) interfaces into some acquiring network. most common seen in lots of stores are machines that do 1-800 calls in real time into modem bank ... which interfaces into acquiring network.
apparently in this case, the acquiring network had been down for an hr or so ... and the dentist was being forced into doing "voice" auths. some number of these are actually automated VRU ... with information entered via phone keypad.
more recently, i mentioned a situation where stores weren't taking
cards unless they had the old fashion physical "swipe" machines ...
because local (telco) central office had some problem (which lasted a
couple days) we were in the process of moving and having to eat out a
lot ... and also make a lot of new purchases ... so we ran into in
numerous times during the period
https://www.garlic.com/~lynn/2007n.html#84 Poll: oldest computer thing you still use
more topic drift regarding older problem with 1-800 incoming auth
calls
https://www.garlic.com/~lynn/2007o.html#25 LAX IT failure: leaps of faith don't work
for other topic drift ... the long-time old small squat swipe machines
with (numerical) keypad on top ... are perported to be "repackaged"
pc/xt in different form factor ... with flash for harddisk ... running
ms/dos with 1200 baud modem ... at least as far as programming is
concerned. old post mentioning xt/msdos for point-of-sale terminals:
https://www.garlic.com/~lynn/2004e.html#21 A POX on you, Dennis Ritchie!!!
https://www.garlic.com/~lynn/2007r.html#13 What do ATMS and card readers use?
for other topic drift ... misc. posts mentioning compromises of
point-of-sale terminals for skimming transaction information with the
purpose of using the (skimmed transaction) information for fraudulent
transactions:
https://www.garlic.com/~lynn/aadsm22.htm#44 Creativity and security
https://www.garlic.com/~lynn/aadsm22.htm#45 Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
https://www.garlic.com/~lynn/aadsm22.htm#46 Court rules email addresses are not signatures, and signs death warrant for Digital Signatures
https://www.garlic.com/~lynn/aadsm23.htm#2 News and Views - Mozo, Elliptics, eBay + fraud, naive use of TLS and/or tokens
https://www.garlic.com/~lynn/aadsm23.htm#30 Petrol firm suspends chip-and-pin
https://www.garlic.com/~lynn/aadsm23.htm#32 Chip-and-Pin terminals were replaced by "repairworkers"?
https://www.garlic.com/~lynn/aadsm23.htm#34 Chip-and-Pin terminals were replaced by "repairworkers"?
https://www.garlic.com/~lynn/aadsm25.htm#16 Fraudwatch - Chip&PIN one-sided story, banks and deception and liability shifts
https://www.garlic.com/~lynn/aadsm27.htm#32 The bank fraud blame game
https://www.garlic.com/~lynn/2005g.html#41 Maximum RAM and ROM for smartcards
https://www.garlic.com/~lynn/2006u.html#40 New attacks on the financial PIN processing
https://www.garlic.com/~lynn/2006x.html#14 IBM ATM machines
https://www.garlic.com/~lynn/2007.html#5 Securing financial transactions a high priority for 2007
https://www.garlic.com/~lynn/2007.html#6 Securing financial transactions a high priority for 2007
https://www.garlic.com/~lynn/2007b.html#13 special characters in passwords
https://www.garlic.com/~lynn/2007r.html#72 Translation of IBM Basic Assembler to C?
and even more drift ... a couple news articles from the past couple days:
Citibank limits ATM cash withdrawals in NYC (atm fraud)
http://www.atmmarketplace.com/article.php?id=9544&na=1
UK Bank Faces Chip-and-PIN Fraud Lawsuit
http://www.epaynews.com/index.cgi?survey=&ref=browse&f=view&id=1199470277837043222&block=
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: 1975 movie "Three Days of the Condor" tech stuff Newsgroups: alt.folklore.computers Date: Sun, 06 Jan 2008 14:21:54"Charlie Gibbs" <cgibbs@kltpzyxm.invalid> writes:
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: JCL parms Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Sun, 06 Jan 2008 14:38:35shmuel+ibm-main@PATRIOT.NET (Shmuel Metz , Seymour J.) writes:
we had 709 running fortran monitor for student jobs ... running tape-to-tape ... tapes were physical moved back and forth between 709 and 1401 ... with the 1401 handling front-end unit record processing. student job elapsed time was on the order of a second.
moving to 360/65 with os360 and hasp ... minimum elapsed time for 3step (student) fortran compile, link-edit and go ... was on the order of 30seconds ... effectively all of it (constantly re)executing job scheduler.
various univ one-step job monitors attempted to "attach" compile, link-edit, and go, for student jobs (eliminating job scheduler overhead).
i had done some custom optimization with very careful reorganization of stage-II sysgen cards (stage-I output) ... in order to very carefully physically place files and PDS members on disk ... for optimal arm seek operation. this had improved 3step (effecitvely job scheduler) from 30seconds to about 13seconds (for typical student fortran job).
part of old presentation at fall68 SHARE meeting in Atlantic City discussing
very careful os360 stage-2 sysgen optimization ... in addition to
separate activity rewriting large amounts of cp67 virtual machine
kernel
https://www.garlic.com/~lynn/94.html#18 CP/67 & OS MFT14
of course when watfor became available ... it eclipsed a lot of the work on one-step job monitors.
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: 1970s credit cards, was: 1975 movie "Three Days of the Condor" tech stuff Newsgroups: alt.folklore.computers Date: Sun, 06 Jan 2008 15:25:12danny burstein <dannyb@panix.com> writes:
at some point, the industry decided that point-of-sale clerks shouldn't be involved in grabbing cards from people that might be crooks (having stolen the card).
this was even pushed further with EU suggestion that such electronic
transactions should be a lot more anonymous (in line with EU-DPD). this
implied that names and other identifying characteristics should be
removed from the cards (i.e. point-of-sale clerks also no longer
x-checking name from card against name on some form of gov. issued card,
preferrably something with photo ... as countermeasure to lost/stolen
card) ... recent reference:
https://www.garlic.com/~lynn/aadsm28.htm#1
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: U.S. Identity Theft at Record Level in 2007 Newsgroups: alt.folklore.computers Date: Sun, 06 Jan 2008 16:01:09U.S. Identity Theft at Record Level in 2007
various other URLs from above page:
Issuers Line Up for TJX Settlements
http://www.epaynews.com/index.cgi?survey=&keywords=brazil&optional=&subject=&location=&ref=keyword&f=view&id=11992194668314718872&block=
Phishing Now a Multi-Billion Dollar Menace
http://www.epaynews.com/index.cgi?survey=&keywords=brazil&optional=&subject=&location=&ref=keyword&f=view&id=1198141697837043222&block=
TJX settles with banks over credit card data breach
http://www.finextra.com/fullstory.asp?id=17877
International Card Fraudsters Scam English Village
http://www.epaynews.com/index.cgi?survey=&ref=browse&f=view&id=1198229769837043222&block=
Brazilian Visa Acquirer Automates PCI Compliance
http://www.epaynews.com/index.cgi?survey=&keywords=tjx&optional=&subject=&location=&ref=keyword&f=view&id=1197582601837043222&block=
Record Online Holiday Sales = Record Web Fraud
http://www.epaynews.com/index.cgi?survey=&keywords=tjx&optional=&subject=&location=&ref=keyword&f=view&id=1197582137837043222&block=
TJX offers $40.9m in Visa Settlement
http://www.epaynews.com/index.cgi?survey=&keywords=tjx&optional=&subject=&location=&ref=keyword&f=view&id=1197028845837043222&block=
including:
The World of Identity Theft Continues to Evolve ITRC reports on the
identity theft trends of 2007 with 2008 predictions
http://www.idtheftcenter.org/artman2/publish/m_press/2007_Trends_and_Predictions.shtml
... from above:
Last year, ITRC predicted the following trends for 2007:
• There will be an increase in check fraud, check synthesizing, and
check counterfeiting.
• Phishing will continue to grow as a problem.
• Child, family, and domestic identity theft victims will be
acknowledged by law enforcement and companies.
• There will still be a lack of sensitivity and responsiveness toward
victims by some law enforcement agencies, companies, and government
agencies.
• We will see more communication between various law enforcement
entities in multi-jurisdictional cases including the creation of
regional taskforces.
... snip ...
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: 1970s credit cards, was: 1975 movie "Three Days of the Condor" tech stuff Newsgroups: alt.folklore.computers Date: Sun, 06 Jan 2008 18:06:25rpl <plinnane3@yahoo.com.invalid> writes:
one of the sources that upwards of 70percent of id-theft involve "insiders"
... misc. recent references:
https://www.garlic.com/~lynn/aadsm27.htm#31 The bank fraud blame game
https://www.garlic.com/~lynn/aadsm27.htm#52 more on firing your MBA-less CSO
https://www.garlic.com/~lynn/aadsm27.htm#53 Doom and Gloom spreads, security revisionism suggests "H6.5: Be an adept!"
https://www.garlic.com/~lynn/aadsm27.htm#60 Retailers try to push data responsibilities back to banks
https://www.garlic.com/~lynn/2007f.html#75 Securing financial transactions a high priority for 2007
https://www.garlic.com/~lynn/2007i.html#28 John W. Backus, 82, Fortran developer, dies
https://www.garlic.com/~lynn/2007i.html#65 John W. Backus, 82, Fortran developer, dies
https://www.garlic.com/~lynn/2007l.html#35 My Dream PC -- Chip-Based
https://www.garlic.com/~lynn/2007n.html#85 PCI Compliance - Encryption of all non-console administrative access
https://www.garlic.com/~lynn/2007n.html#94 PCI Compliance - Encryption of all non-console administrative access
https://www.garlic.com/~lynn/2007o.html#0 The Unexpected Fact about the First Computer Programmer
https://www.garlic.com/~lynn/2007q.html#11 what does xp do when system is copying
https://www.garlic.com/~lynn/2007q.html#72 Value of SSL client certificates?
https://www.garlic.com/~lynn/2007r.html#27 Default Search Engines are dangerous, Especially Google <- Domain Name Stealers
https://www.garlic.com/~lynn/2007t.html#20 UK Retail Giant Breached by Insider
https://www.garlic.com/~lynn/2007v.html#74 folklore indeed
https://www.garlic.com/~lynn/2007v.html#94 folklore indeed
https://www.garlic.com/~lynn/2008.html#4 folklore indeed
https://www.garlic.com/~lynn/2008.html#5 folklore indeed
https://www.garlic.com/~lynn/2008.html#9 folklore indeed
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: 1975 movie "Three Days of the Condor" tech stuff Newsgroups: alt.folklore.computers Date: Mon, 07 Jan 2008 05:26:22Louis Krupp <lkrupp@pssw.nospam.com.invalid> writes:
we were called into consult with small client/server startup that wanted
to do financial transactions on their server. they had this technology
they had invented called SSL they wanted to use as part of this service
... which is now frequently referred to as electronic commerce ...
some related posts
https://www.garlic.com/~lynn/subnetwork.html#gateway
one of the acquiring networking protocols used extensively by T&E industry, hotels, casinos, etc ... for such aggregation, ran over x.25 ... was selected for the initial implementation. there were two varieties ... one was an internet "mall" operation ... where the paradigm was the physical mall with lots of different retail outlets sharing common services ... including the acquiring network interface. the other implementation was a payment gateway ... with authorized webservers interfacing over the internet via this new invention, ssl.
i've mentioned recently that for the internet gateway based operation,
the diagnostic and service level operations (including active monitor)
that had extended out from the acquiring network to the (assumed) x.25
endpoint ...now had to figure out how to propagated thru the
internet. we had to develop and document some amount of compensating
procedures that were implicit in circuit-based infrastructure for the
wild anarchy of the internet.
https://www.garlic.com/~lynn/2007c.html#30 Securing financial transactions a high priority for 2007
https://www.garlic.com/~lynn/2007c.html#32 Securing financial transactions a high priority for 2007
https://www.garlic.com/~lynn/2007c.html#43 Securing financial transactions a high priority for 2007
https://www.garlic.com/~lynn/2007h.html#3 21st Century ISA goals?
https://www.garlic.com/~lynn/2007h.html#78 John W. Backus, 82, Fortran developer, dies
https://www.garlic.com/~lynn/2007k.html#52 John W. Backus, 82, Fortran developer, dies
https://www.garlic.com/~lynn/2007k.html#54 John W. Backus, 82, Fortran developer, dies
https://www.garlic.com/~lynn/2007n.html#10 The top 10 dead (or dying) computer skills
https://www.garlic.com/~lynn/2007n.html#41 Windows: Monitor or CUSP?
https://www.garlic.com/~lynn/2007n.html#77 PSI MIPS
https://www.garlic.com/~lynn/2007n.html#85 PCI Compliance - Encryption of all non-console administrative access
https://www.garlic.com/~lynn/2007n.html#94 PCI Compliance - Encryption of all non-console administrative access
https://www.garlic.com/~lynn/2007o.html#23 Outsourcing loosing steam?
https://www.garlic.com/~lynn/2007o.html#25 LAX IT failure: leaps of faith don't work
https://www.garlic.com/~lynn/2007p.html#34 what does xp do when system is copying
https://www.garlic.com/~lynn/2007p.html#54 Industry Standard Time To Analyze A Line Of Code
https://www.garlic.com/~lynn/2007v.html#53 folklore indeed
https://www.garlic.com/~lynn/2007v.html#64 folklore indeed
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: JCL parms Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Mon, 07 Jan 2008 05:48:56hancock4 writes:
when i was undergraduate, they turned over responsibility for a lot of the stuff to me. they nominally would shutdown the computing center at 8am sat. morning and resume operations at 8am monday morning. i would be allowed to have the run of the place for 48hrs shift ... but then making it to monday classes (after having been awake for 48hrs) was a little trying.
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: competitiveness Newsgroups: alt.folklore.computers Date: Mon, 07 Jan 2008 13:03:08there was tv factoid the past couple days claiming that for the first time in living history that the avg. standard of living in great britain is higher than the avg. standard of living in the states.
UK standard of living rises above that in America for the first time in a century
http://www.dailymail.co.uk/pages/live/articles/news/news.html?in_article_id=506442&in_page_id=1770
for other topic drift ... standard of living related posts starting
with some posts referencing significant economic cost of illegal aliens
https://www.garlic.com/~lynn/2007i.html#18 John W. Backus, 82, Fortran developer, dies
https://www.garlic.com/~lynn/2007i.html#70 illegal aliens
https://www.garlic.com/~lynn/2007i.html#79 John W. Backus, 82, Fortran developer, dies
https://www.garlic.com/~lynn/2007i.html#81 illegal aliens
https://www.garlic.com/~lynn/2007o.html#22 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007q.html#61 Horrid thought about Politics, President Bush, and Democrats
https://www.garlic.com/~lynn/2007t.html#46 Newsweek article--baby boomers and computers
above includes references to gao studies that illegal aliens typically provide economic value (only) a little over half their cost to society (i.e. society has to spend much more on illegal aliens than their direct economic contribution).
so another way of viewing this is with respect to studies of economic policies in Scandinavian countries after ww2 (this was from a series of articles from the boston globe in the early 70s with respect to declining shoe & clothing industry in new england). supposedly the countries set a standard of living target and looked at economic contribution of different kinds of work/jobs. industries where jobs provided economic value less than the target standard of living, were to be eliminated ... and those with jobs that provided economic value higher than standard were to be encouraged. the exception were industries that were deemed "strategic" ... and it may be necessary to subsidize those jobs (paying them more than what their work is worth).
so in the case of illegal aliens, the subsidy might be considered to be to the institutions that employ the illegal aliens. these industries may provide marginal salaries to the illegal aliens ... pocketing the difference between their salaries and the what the institutions receive for the work ... and general society is required to provide the additional benefits to the workers.
difference from the scandinavian scenario is that there has been no national policy decision regarding whether these particular industries are deserving the effective subsidy (i.e. general society underwriting the significant cost of benefits to their workers).
past posts referencing scandanavian economic policy
https://www.garlic.com/~lynn/2003i.html#28 Offshore IT
https://www.garlic.com/~lynn/2004b.html#52 The SOB that helped IT jobs move to India is dead!
https://www.garlic.com/~lynn/2006g.html#4 The Pankian Metaphor
https://www.garlic.com/~lynn/2006g.html#8 The Pankian Metaphor
now from slightly different perspective ... there were a number of
gov. reports in the 90s (based on 1990 census) ... half the workers in
the manufacturing sector were "subsidized" ... aka they were receiving
benefits (salary, medical, retirement, etc) that amounted to more than
the economic contribution of their work. minor x-over topic drift in
this recent post mentioning some suggestion about one hundred percent
unearned profit tax:
https://www.garlic.com/~lynn/2008.html#28 As Expected, Ford Falls From 2nd Place in U.S. Sales
recent post mentioning inadequatly funded retirement benefits
... i.e. not fully funded retirement fund ... forcing the gov. to
assume the responsibility
https://www.garlic.com/~lynn/2007t.html#38 Newsweek article--baby boomers and computers
https://www.garlic.com/~lynn/2007v.html#26 2007 Year in Review on Mainframes - Interesting
another report (based on 1990 census) was about half the 18yr olds
were functionally illiterate, recent posts:
https://www.garlic.com/~lynn/2007g.html#7 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007i.html#24 John W. Backus, 82, Fortran developer, dies
https://www.garlic.com/~lynn/2007i.html#79 John W. Backus, 82, Fortran developer, dies
https://www.garlic.com/~lynn/2007j.html#31 IBM Unionization
https://www.garlic.com/~lynn/2007j.html#51 IBM Unionization
https://www.garlic.com/~lynn/2007j.html#80 IBM Unionization
https://www.garlic.com/~lynn/2007j.html#85 IBM Unionization
https://www.garlic.com/~lynn/2007k.html#10 IBM Unionization
https://www.garlic.com/~lynn/2007k.html#30 IBM Unionization
https://www.garlic.com/~lynn/2007k.html#34 IBM Unionization
https://www.garlic.com/~lynn/2007k.html#42 IBM Unionization
https://www.garlic.com/~lynn/2007n.html#68 Poll: oldest computer thing you still use
https://www.garlic.com/~lynn/2007o.html#21 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007o.html#22 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007v.html#29 folklore indeed
other posts mentions competitiveness
https://www.garlic.com/~lynn/2007g.html#6 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007g.html#7 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007g.html#34 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007g.html#35 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007g.html#52 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007g.html#68 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007h.html#42 Experts: Education key to U.S. competitiveness
https://www.garlic.com/~lynn/2007i.html#13 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007l.html#10 John W. Backus, 82, Fortran developer, dies
https://www.garlic.com/~lynn/2007l.html#22 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007o.html#20 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007p.html#15 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007p.html#18 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007p.html#22 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007p.html#23 Newsweek article--baby boomers and computers
https://www.garlic.com/~lynn/2007p.html#32 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007t.html#2 Newsweek article--baby boomers and computers
https://www.garlic.com/~lynn/2007t.html#15 Newsweek article--baby boomers and computers
https://www.garlic.com/~lynn/2007t.html#18 Newsweek article--baby boomers and computers
https://www.garlic.com/~lynn/2007u.html#17 T3 Sues IBM To Break its Mainframe Monopoly
https://www.garlic.com/~lynn/2007v.html#20 Education ranking
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: No Gory for the *NIX Newsgroups: alt.folklore.computers,alt.sys.pdp10 Date: Mon, 07 Jan 2008 18:36:27Peter Flass <Peter_Flass@Yahoo.com> writes:
multiple channel interfaces allowed for attaching disk controllers to multiple different channels/systems.
recent post mentioning one such problem in bldg. 28 between an mvs/168
system and vm/158 system.
https://www.garlic.com/~lynn/2007v.html#4 IBM mainframe history, was Floating-point myths
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: IT managers stymied by limits of x86 virtualization Newsgroups: alt.folklore.computers Date: Mon, 07 Jan 2008 22:59:09how could i resist ... more 40+ yr old new technology
IT managers stymied by limits of x86 virtualization; X86 virtualization
lacks maturity of mainframe virtualization, analyst firm says.
http://www.networkworld.com/news/2008/011408-silentbanker-trojan.html
from above:
IT managers well-versed in mainframe virtualization might expect smooth
sailing when implementing virtualization tools for x86-based
servers. But they're quickly finding unexpected challenges because x86
virtualization is nowhere near as mature as the mainframe virtualization
tools that evolved over the past four decades, says a Saugatuck
Technology analyst who is researching virtualization.
... snip ...
other refences in the above:
The Many Faces of Virtualization: Understanding a New IT
Reality
http://www.saugatech.com/420order.htm
Virtual-machine evolution
http://www.networkworld.com/reviews/2007/091707-virtual-management-test-history.html
Server virtualization in two-thirds of enterprises by '09, Forrester
predicts
http://www.networkworld.com/news/2007/120607-can-mid-market-merchants-comply-with.html
... and recent reference to long ago and far away, at&t longlines adding
(networked) virtual tape drives to highly modified (vm370) csc/vm (that
had leaked out)
https://www.garlic.com/~lynn/2008.html#29 Need Help filtering out sporge in comp.arch
https://www.garlic.com/~lynn/2008.html#30 hacked TOPS-10 monitors
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Inaccurate CPU% reported by RMF and TMON Newsgroups: bit.listserv.ibm-main Date: Tue, 08 Jan 2008 08:26:34jasonto888@BORJAPHOTO.COM (Jason To) writes:
some past posts mentioning effect:
https://www.garlic.com/~lynn/2005m.html#16 CPU time and system load
https://www.garlic.com/~lynn/2006v.html#19 Ranking of non-IBM mainframe builders?
https://www.garlic.com/~lynn/2007g.html#82 IBM to the PCM market
https://www.garlic.com/~lynn/2007t.html#23 SMF Under VM
really strange the first time you hear it ... aka the elapsed minus measured wait is much larger than the individually measured cpu usages (especially having vm background where it actually does capture nearly every cycle).
the referenced "SMF Under VM" post includes some number of corporate MVS URLs that go into much more detail.
old email
https://www.garlic.com/~lynn/2006v.html#email800717
discussing moving workload from 168 to 4341s w/o taking into account capture ratio.
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: dig. TV Newsgroups: alt.folklore.computers Date: Tue, 08 Jan 2008 08:45:17jmfbahciv writes:
in the mid-80s, saw some side-by-side demos of analog tv vis-a-vis digital (w/fec) as the signal quality degraded ... which showed analog picture half snow before started seeing digital "drop-out" blips (somewhat similar to dvd that has been scratched ... again, FEC technology used in audio cdroms).
a couple old posts mentioning HDTV
https://www.garlic.com/~lynn/2000e.html#11 Is Al Gore The Father of the Internet?^
https://www.garlic.com/~lynn/2001b.html#2 FCC rulemakings on HDTV
https://www.garlic.com/~lynn/2001j.html#23 OT - Internet Explorer V6.0
this post has long-winded sep90 discussion from one of the
study groups:
https://www.garlic.com/~lynn/2001.html#73 how old are you guys
the "joke" i heard about the current legislation was that as part of "balanced" budget activities in the 90s ... there was still a gap ... and to close it ... it was suggested that they could auction off frequencies that would come available with transition from analog to digital TV (of course the predictions back then about the bidding were astronomical).
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Computer Science Education: Where Are the Software Engineers of Tomorrow? Newsgroups: alt.folklore.computers Date: Tue, 08 Jan 2008 08:56:43Computer Science Education: Where Are the Software Engineers of Tomorrow?
from above:
It is all about programming! Over the last few years we have noticed
worrisome trends in CS education. The following represents a summary
of those trends:
1. Mathematics requirements in CS programs are shrinking.
2. The development of programming skills in several languages is giving
way to cookbook approaches using large libraries and special-purpose
packages.
3. The resulting set of skills is insufficient for today's software
industry (in particular for safety and security purposes) and,
unfortunately, matches well what the outsourcing industry can offer. We
are training easily replaceable professionals.
... snip ...
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: No Glory for the PDP-15 Newsgroups: alt.folklore.computers Date: Tue, 08 Jan 2008 09:48:21jmfbahciv writes:
as referenced in above ... the heritage of rigid command and control was behind his Organic Design For Command and Control briefing.
it also contributed to all the arrows and barbs i got if i happened to
wander into somebody else's "turf"
https://www.garlic.com/~lynn/2008.html#25 Tap and faucet and spellcheckers
https://www.garlic.com/~lynn/2008.html#27 Tap and faucet and spellcheckers
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Computer Science Education: Where Are the Software Engineers of Tomorrow? Newsgroups: alt.folklore.computers Date: Tue, 08 Jan 2008 10:40:14Roland Hutchinson <my.spamtrap@verizon.net> writes:
both apple (pink) and sun (spring) had object-oriented operating systems efforts ... and both floundered.
pink sort of morphed into taligent as an application environment and we were brought in to look at it for various reasons.
about the same time, we were also asked if we would consider heading up an effort to turn spring out as a product. i have some of the spring hardcopy information ... but the online softcopy seemed to have gone 404 ... although some of the references may still be in the wayback machine.
spring had an implementation very much like java ... a small footprint
environment that allowed efficient transfers of executable images.
there have been some past threads about whether java actually grew out
of the spring effort ... or was completely independent of the spring
effort, aka in the following, see abstract from spring "client-side stub
interpreter"):
https://www.garlic.com/~lynn/2003e.html#51 A Speculative question
completely other topic drift ... one of the two people at the los gatos VLSI lab responsible for the pascal language implemenation ... left and went on to become mips software development vp ... and after sgi acquired mips ... became general manager of the sun unit responsible for java.
misc. past posts mentioning pink, taligent, spring:
https://www.garlic.com/~lynn/2000.html#10 Taligent
https://www.garlic.com/~lynn/2000e.html#46 Where are they now : Taligent and Pink
https://www.garlic.com/~lynn/2000e.html#48 Where are they now : Taligent and Pink
https://www.garlic.com/~lynn/2001b.html#6 Java as a first programming language for cs students
https://www.garlic.com/~lynn/2001j.html#32 Whom Do Programmers Admire Now???
https://www.garlic.com/~lynn/2001j.html#36 Proper ISA lifespan?
https://www.garlic.com/~lynn/2001n.html#93 Buffer overflow
https://www.garlic.com/~lynn/2002.html#24 Buffer overflow
https://www.garlic.com/~lynn/2002i.html#60 Unisys A11 worth keeping?
https://www.garlic.com/~lynn/2002j.html#76 Difference between Unix and Linux?
https://www.garlic.com/~lynn/2002m.html#60 The next big things that weren't
https://www.garlic.com/~lynn/2003d.html#45 IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
https://www.garlic.com/~lynn/2003e.html#28 A Speculative question
https://www.garlic.com/~lynn/2003g.html#62 IBM says AMD dead in 5yrs ... -- Microsoft Monopoly vs. IBM
https://www.garlic.com/~lynn/2003j.html#15 A Dark Day
https://www.garlic.com/~lynn/2004c.html#53 defination of terms: "Application Server" vs. "Transaction Server"
https://www.garlic.com/~lynn/2004l.html#49 "Perfect" or "Provable" security both crypto and non-crypto?
https://www.garlic.com/~lynn/2004p.html#64 Systems software versus applications software definitions
https://www.garlic.com/~lynn/2005b.html#40 [Lit.] Buffer overruns
https://www.garlic.com/~lynn/2005f.html#38 Where should the type information be: in tags and descriptors
https://www.garlic.com/~lynn/2005i.html#42 Development as Configuration
https://www.garlic.com/~lynn/2005s.html#37 Von Neumann machines. The key to space and much else
https://www.garlic.com/~lynn/2006n.html#20 The System/360 Model 20 Wasn't As Bad As All That
https://www.garlic.com/~lynn/2006o.html#51 The Fate of VM - was: Re: Baby MVS???
https://www.garlic.com/~lynn/2007g.html#69 The Perfect Computer - 36 bits?
https://www.garlic.com/~lynn/2007l.html#1 The top 10 dead (or dying) computer skills
https://www.garlic.com/~lynn/2007m.html#36 Future of System/360 architecture?
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: dig. TV Newsgroups: alt.folklore.computers Date: Tue, 08 Jan 2008 10:53:44Roland Hutchinson <my.spamtrap@verizon.net> writes:
the demo i saw in the mid-80s was digital with fec ... and highlighted both the picture quality as signal degraded and also much smaller frequency footprint. the demo was simulated standard tv broadcast that could control signal quality reception (and also was part of the smaller frequency footprint). however, the motivation seemed to be oriented towards cable and satellite TV systems with encoded signal needing settop box to decode and view particular channels/programs (supporting pay-for-view and monthly subscription fees).
the hdtv format "wars" that went on in commerce dept meetings in the early 90s ... were about which country would win ... since the hdtv manufacturing volumes for digital chips was going to be so large, it would easily swamp everything else (including personal computer volumes at the time) ... and the "winner" would easily take-over the (whole) electronics industry.
there was some discussion of analog/digital issues in the part
of a study group report mentioned in the previous post ...
reference here
https://www.garlic.com/~lynn/2001.html#73 how old are you guys
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: As Expected, Ford Falls From 2nd Place in U.S. Sales Newsgroups: alt.folklore.computers Date: Tue, 08 Jan 2008 11:12:44greymaus <greymausg@mail.com> writes:
recently there has been several news stories about Toyota automobiles having quality control problems and falling from number one in some quality rankings.
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: IBM LCS Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Tue, 08 Jan 2008 11:45:35PA7280@UTKVM1.UTK.EDU (Ben Alford) writes:
standard 360/75 (and 360/65) storage was 750 nsec for 8byte interleaved access (some claim that 360/75 was a "hardwired" 360/65 to get extra thruput).
some installations setup LCS as extension of (executable) main memory ... that just ran slower. other installations used it for "emulated" electronic disks ... with emulated data transfers; this could be things like "hasp" buffer records and/or executable images.
i believe the ampex lcs had 8msec access (better than 10 times slower).
if you look in 360/65, 360/67, and 360/75 functional characteristic instruction timings ... one of the things will be a prorated part of 750 nsecs for (the 8byte) instruction fetch i.e. 2byte instructions will include 1/4th of 750nsecs for instruction fetch, 4byte instructions will include 1/2th of 750nsecs for instruction fetch, and 6byte instructions will include 3/4th of 750nsecs for instruction fetch.
this can be somewhat inaccurate for branch operations ... a double-word aligned (2byte) BR instruction ... will incur the full 750nsecs instruction fetch ... since the rest of the double word won't be used for any other instruction operations.
LCS was both an issue of slower electronic memory as well as longer physical signal latency.
by comparison 3090 expanded storage was the same electronic memory but physical packaging resulted in longer signal latency. as a result, it was purely packaged as sort of emulated i/o transfer ... but with a much wider bus (so the latency was amortized over much larger amount of data) and synchronized transfer instructions ... to eliminate the significant pathlength overhead in MVS for asynchronous i/o operations.
later physical packaging (and improved caching infrastructure) eliminated the need for expanded storage ... however, emulated expanded storage (as part of LPAR configuration) lingered on, compensating for other system issues.
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: IT managers stymied by limits of x86 virtualization Newsgroups: alt.folklore.computers Date: Tue, 08 Jan 2008 22:27:32Quadibloc <jsavard@ecn.ab.ca> writes:
one might wonder whether or not this has been affected by having alternative chips offering virtualization capabilities.
another recent item with respect to budgets:
Through to 2010, Server Virtualization Will Have the Single Largest
Impact on Budgets
http://www.rti.org/page.cfm?nav=443
from above:
Attracted by dazzling promises of dramatic reductions in the
complexity and costs of infrastructures, user IT executives have made
virtualization the hottest topic in many years
... snip ...
and this post, somewhat along the same lines
https://www.garlic.com/~lynn/2007s.html#0 Marines look for a few less servers, via virtualization
the following threads have strayed quite a bit more into pros & cons of
being able to ... or not being able to ... recognize running in virtual
environment (i.e. virtualization can be used as countermeasures to
compromises ... as well as the crooks possibly using virtualization to
disquise compromises):
https://www.garlic.com/~lynn/aadsm28.htm#2 Death of antivirus software imminent
https://www.garlic.com/~lynn/aadsm28.htm#3 Why Security Modelling doesn't work -- the OODA-loop of today's battle
https://www.garlic.com/~lynn/aadsm28.htm#4 Death of antivirus software imminent
https://www.garlic.com/~lynn/aadsm28.htm#6 Death of antivirus software imminent
https://www.garlic.com/~lynn/aadsm28.htm#7 Why Security Modelling doesn't work -- the OODA-loop of today's battle
https://www.garlic.com/~lynn/aadsm28.htm#8 Death of antivirus software imminent
https://www.garlic.com/~lynn/aadsm28.htm#9 Death of antivirus software imminent
https://www.garlic.com/~lynn/aadsm28.htm#11 Death of antivirus software imminent
note that mainframe virtualization also evolved into LPARs ... basically
a virtualization subset built into the hardware of the machine
... reference in recent threads
https://www.garlic.com/~lynn/2007v.html#0 IBM mainframe history, was Floating-point myths
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: IBM LCS Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Tue, 08 Jan 2008 23:07:25Anne & Lynn Wheeler <lynn@garlic.com> writes:
this reference has cornell with 360/65 (not 360/75) with 1mbyte of
IBM LCS and then got 2mbytes of Ampex ECM
http://www.cit.cornell.edu/computer/history/Newman.html
When i was undergraduate, I had made quick stop by cornell to talk to
worley(?) about hasp (part of east coast trip to attend share)
... recent reference mentioning the trip
https://www.garlic.com/~lynn/2007j.html#79 IBM 360 Model 20 Questions
this google book reference says ampex had read/write cycle
under 3msecs:
http://books.google.com/books?id=MFGj_PT_clIC&pg=PA201&lpg=PA201&dq=ampex+lcs+ibm+memory&source=web&ots=ZEmo1aj1cO&sig=2ZC1KCUBgSm-Dnfx61fKOK-UaKk
and for x-over from this thread:
https://www.garlic.com/~lynn/2008.html#33 JCL parms
from the cornell computer history article:
One of the things we didn't have, never really had well in the CLASP
system and didn't initially have at all well in the Cornell HASP system,
was the fast batch turnaround for WATFOR jobs and by then PL/C jobs. One
of the programmers there, Walt Haas, had a brainstorm and thought we
could just modify reader service and essentially execute these jobs as a
subtask of the card reader process. So we would never get in to heavy
duty job scheduling for these jobs, they would be executed in the reader
process and passed right to the printer queue. In a sense we re-invented
the "on-the-fly design" except we had a more modern operating system, a
multi-threaded operating system, that made that work out. We called it
Instant Turnaround, IT, and it was a mainstay of student computing for
quite a while after that. Those were the years when you could go down to
the basement of Upson Hall in the middle of winter and put yourself into
the middle of a couple of hundred students all with steaming wool
overcoats. Computing was just a vile experience for students in those
days I would have to say.
... snip ...
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Education ranking Newsgroups: alt.folklore.computers Date: Wed, 09 Jan 2008 08:27:51jmfbahciv writes:
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Really stupid question about z/OS HTTP server Newsgroups: bit.listserv.ibm-main Date: Wed, 09 Jan 2008 10:16:53John.Mckown@HEALTHMARKETS.COM (McKown, John) writes:
some windows references:
http://technet2.microsoft.com/windowsserver/en/library/b748fb3f-dbf0-4b01-9b22-be14a8b4ae101033.mspx
http://www.microsoft.com/windowsserver2003/technologies/security/kerberos/default.mspx
some ibm references
http://www.redbooks.ibm.com/abstracts/sg246540.html?Open
http://publib.boulder.ibm.com/infocenter/dzichelp/v2r2/topic/com.ibm.db29.doc.admin/db2z_establishkerberosthruracf.htm
http://www-03.ibm.com/servers/eserver/zseries/zos/racf/pdf/share_03_2001_racf_kerberos_windows.pdf
http://www-03.ibm.com/servers/eserver/zseries/zos/racf/kmigrate.html
and then there is stuff like:
IBM CICS RACF Security and Microsoft Windows Server 2003 Security
http://technet.microsoft.com/en-us/library/bb463146.aspx
kerberos was originally developed a MIT's Project Athena ...and then became internet standard (GSS) ... and has been adopted by quite a few infrastructures for authentication interoperability
... from my rfc index
https://www.garlic.com/~lynn/rfcietff.htm
select Term (term->RFC#) in the RFCs listed by section,
and then select "GSS" in "Acryonym fastpath" ... i.e.
generic security service (GSS)
see also network services , security
5021 4768 4757 4752 4559 4557 4556 4537 4462 4430 4402 4401 4178 4121
4120 3962 3961 3645 3244 3129 2942 2853 2744 2743 2712 2623 2479 2478
2203 2078 2025 1964 1961 1510 1509 1508 1411
...
selecting RFC number brings up the corresponding summary in the lower
frame ... i.e.
5021 PS
Extended Kerberos Version 5 Key Distribution Center (KDC) Exchanges
over TCP, Josefsson S., 2007/08/17 (7pp) (.txt=13431) (Updates 4120)
(Refs 4120) (was draft-ietf-krb-wg-tcp-expansion-02.txt)
...
and selecting the ".txt=nnn" field (in rfc summary) retrieves the actual RFC.
misc. past posts mentioning kerberos and/or pk-init
https://www.garlic.com/~lynn/subpubkey.html#kerberos
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Really stupid question about z/OS HTTP server Newsgroups: bit.listserv.ibm-main Date: Wed, 09 Jan 2008 10:41:05jchase@USSCO.COM (Chase, John) writes:
base infrastructure for all of this has been Kerberos. It was originally developed at MIT's project athena ... which as equally funded by DEC and IBM ... and so we got to go by project athena for periodic project revues.
originally kerberos was purely password (aka shared-secret)
authentication. however, passwords can be evesdropped and reused
... being shared-secret, the same value is used for both
originating authentication and validating authentication ... which
leads to lots of vulnerabilities and operational problems (including
what happens when humans have to deal with scores or hundreds of
unique passwords)
https://www.garlic.com/~lynn/subintegrity.html#secrets
public keys and digital signatures were originally proposed as addressing some of the short-comings of shared-secret infrastructures. first, there is different value for generating authentication information and validating authentication. this can address enormously growing problems with having to manage large number of unique passwords (security 101 typically requires unique passwords for unique security domains as countermeasure to cross-domain attacks ... which is no longer necessary in public key environment).
the original draft of pk-init for kerberos ... simply used public keys
and digital signatures ... in lieu of passwords for authentication.
https://www.garlic.com/~lynn/subpubkey.html#kerberos
in a purely certificate-less environment:
https://www.garlic.com/~lynn/subpubkey.html#certless
However, a variety of public key operation has evolved with include something called digital certificates ... and digital certificate mode of operation was eventually also added to the kerberos pk-init draft.
digital certificates were developed to address the scenario involving first time interaction between complete strangers (aka the letters of credit/introduction from the sailing ship days ... when the relying party had no other means of obtaining information in first time interaction with complete strangers). The purpose of the digital certificates is to carry "certified" information regarding total strangers that can't be obtained any other way.
the issue in all the major institutional authentication scenarios is that digital certificates are redundant and superfluous ... especially in employer/employee scenario ... since it is rarely the case that an employer is dealing with an employee as a total stranger. in a real digital certificate scenario use for (kerberos) authentication, a total stranger ... that is not otherwise known and/or for which there is absolutely no prior information ... is allowed authorized access to the system ... aka nominally the purpose of the digital certificate paradigm is to carry the information about what the person is allowed to do ... and there is no requirement to have any predefined (system) information regarding the individual (and/or what they are allowed or not allowed to do)
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Education ranking Newsgroups: alt.folklore.computers Date: Wed, 09 Jan 2008 12:20:19Morten Reistad <first@last.name> writes:
slightly related topic drift:
https://www.garlic.com/~lynn/2007j.html#90 IBM Unionization
and then there was events in china.
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Computer Science Education: Where Are the Software Engineers of Tomorrow? Newsgroups: alt.folklore.computers Date: Wed, 09 Jan 2008 17:54:49re:
some other comments ...
Professors Slam Java As "Damaging" To Students
http://developers.slashdot.org/article.pl?sid=08/01/08/0348239
Java panned, defended
http://weblog.infoworld.com/techwatch/archives/015423.html
from above:
Two professors emeritus at New York University, who also happen to be
executives at AdaCore, which specializes in the Ada programming
language, criticize Java in an article entitled "Computer Science
Education: Where Are The Software Engineers of Tomorrow?" in CrossTalk -
The Journal of Defense Engineering, this month.
... snip ...
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Computer Science Education: Where Are the Software Engineers of Tomorrow? Newsgroups: alt.folklore.computers Date: Wed, 09 Jan 2008 18:45:51hancock4 writes:
Offshore Considerations for Infrastructure Management
http://www.cioupdate.com/article.php/3720671
from above:
Gartner predicts that infrastructure management is the third wave of
services to be offshored after IT services and business processes.
...
there are three major reasons for the increased trend of offshoring
infrastructure management:
# Skilled workforce availability;
# Falling telecom costs enabling cheaper data and voice connectivity; and
# Web enabled monitoring and management tools helping remote management
of applications and IT infrastructure.
... snip ...
aka ... various work becoming increasingly distance insensitive
some other recent posts with education theme
https://www.garlic.com/~lynn/2007h.html#42 Experts: Education key to U.S. competitiveness
and
https://www.garlic.com/~lynn/2007l.html#5 IBM Unionization
including (referenced in the above)
National Institute for Literacy
https://web.archive.org/web/20100413134230/http://www.nifl.gov/nifl/facts/facts_overview.html
and
NSF Science and Engineering Indicators 2006
http://www.nsf.gov/statistics/seind06/
which also has pointer to
America's Pressing Challenge -- Building a Stronger Foundation
http://www.nsf.gov/statistics/nsb0602/
above NSF page indicates that mathematics and science achievement is critical.
and this post
https://www.garlic.com/~lynn/2007u.html#78 Education ranking
references US ranking at or near the bottom of industrial countries.
and for more drift, latest effort from the comptroller general
U.S. Financial Condition and Fiscal Future Briefing, 2008 Economic Forecast Forum
http://www.gao.gov/cghome/d08395cg.pdf
includes part of previous reference posts regarding composition of
federal spending from 1966 to 2006
https://www.garlic.com/~lynn/2007t.html#14 Newsweek article--baby boomers and computers
https://www.garlic.com/~lynn/2007t.html#15 Newsweek article--baby boomers and computers
https://www.garlic.com/~lynn/2007t.html#24 Translation of IBM Basic Assembler to C?
https://www.garlic.com/~lynn/2007t.html#25 Newsweek article--baby boomers and computers
https://www.garlic.com/~lynn/2007t.html#33 Newsweek article--baby boomers and computers
along with excerpts from OECD Key National Indicators: Where the United
States Ranks (16 out of 28)
https://www.garlic.com/~lynn/2007t.html#0 Newsweek article--baby boomers and computers
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: IBM LCS Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Wed, 09 Jan 2008 21:47:20Quadibloc <jsavard@ecn.ab.ca> writes:
i know ... that was why i phrased it like i did; it was the way some people would present what a 360/75 was.
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: old internal network references Newsgroups: alt.folklore.computers Date: Wed, 09 Jan 2008 22:08:03old history note discussing early internal network support ... supposedly there was some early "competition" between Yorktown TSSNET (aka TSS/360) and Cambridge (CP67) vnet.
from the Cambridge Science Center
https://www.garlic.com/~lynn/subtopic.html#545tech
with regard to the following, I've mentioned before the use of the networking between Cambridge and Endicott for the development of the CP67 that provided 370 virtual machine support (rather than 360), including supporting 370 virtual memory architecture.
with regard to the following, there was at least three science centers: cambridge, phili, and palo alto; three HONE centers: white plains, chicago, and wilshire;
the following "OS" references are to os/360 ... eventually HASP
networking which evolved into JES2/NJI.
Date: 10/18/78 13:39:39
To: wheeler
According to several papers published by Yorktown people, they had TSS
running in June 1968, and had their TSS-only net running by mid-1969,
and had their OS link running in late 1970.
We started on CLMON in summer 1968, about when they got TSS running.
We were using CLMON among CP-67, OS, and an 1130 in early 1969.
CPREMOTE was first used in September 1969, and by the time they got
the TSS<->OS link running in late 1970, the Scientific Centers,
Endicott, HONE, and maybe even Yorktown were using CPREMOTE. Probably
others, too. This use included some OS links. As of the time
Hobgood's paper was written (it was published in the Sys Jour 1Q72),
they had not yet successfully made any TSSNET connection with CP-67.
... snip ... top of post, old email index, HONE email
Brief Timeline of the Internet
http://www.webopedia.com/quick_ref/timeline.asp
from above:
Sept. 1, 1969 . First ARPANet node installed at UCLA Network
Measurement Center. Kleinrock hooked up the
Interface Message Processor to a Sigma 7 Computer.
Oct. 1, 1969 . Second node installed at Stanford Research Institute;
connected to a SDS 940 computer. The first ARPANet
message sent: "lo." Trying to spell log-in, but the
system crashed!
Nov. 1, 1969 . Third node installed at University of California, Santa
Barbara. Connected to an IBM 360/75.
Dec. 1, 1969 . Fourth node installed at University of Utah. Connected
to a DEC PDP-10.
March 1970 . Fifth node installed at BBN, across the country in
Cambridge, Mass.
... snip ...
for other vnet early history ...
https://www.leeandmelindavarian.com/Melinda/25paper.pdf
from above:
CPREMOTE was one of the earliest examples of a service virtual
machine and was motivated partly by the desire to prove the
usefulness of that concept. CPREMOTE was experimental and had limited
function, but it spread rapidly within IBM with the spread of
CP-67. As it spread, its "operational shortcomings" were removed
through independent development work by system programmers at the
locations
.. snip ...
as periodically referenced, the internal network was larger than the arpanet/internet from just about the beginning until sometime mid-85.
as i've mentioned before, HONE
https://www.garlic.com/~lynn/subtopic.html#hone
was initially created after 23jun69 unbundling announcement
https://www.garlic.com/~lynn/submain.html#unbundle
besides starting to charge for software, it also started to charge for "system engineer" services. this was an issue since junior SEs had been getting on-the-job experience as part of teams at customer accounts (sort of apprentice kind of program). switching to having to charge time for everybody at a customer account eliminated that option. HONE started out as HANDS ON NETWORK ENVIRONMENT, giving SEs "hands-on" experience with "operating systems" running in HONE virtual machines (from branch offices via terminals into remote HONE machines).
The internal network nodes exploded during the 70s. There were on the
order of 256 ARPANET nodes at the time of the great switch-over to
TCP/IP on 1/1/83 ... a point in time when the internal network
was rapidly approaching 1000 nodes ... CPHVMCE in Copenhagen
was the 1000th node:
https://www.garlic.com/~lynn/99.html#112 OS/360 names and error codes (was: Humorous and/or Interesting Opcodes)
separate from the internal network, much the same software was
also used for (univ/educational) bitnet and earn (in europe)
https://www.garlic.com/~lynn/subnetwork.html#bitnet
and as noted the current genre of virtualization and service virtual
machines is being referred to as virtual appliances ... misc
past posts mentioning virtual appliances.
https://www.garlic.com/~lynn/2006t.html#46 To RISC or not to RISC
https://www.garlic.com/~lynn/2006w.html#25 To RISC or not to RISC
https://www.garlic.com/~lynn/2006x.html#6 Multics on Vmware ?
https://www.garlic.com/~lynn/2006x.html#8 vmshare
https://www.garlic.com/~lynn/2007i.html#36 John W. Backus, 82, Fortran developer, dies
https://www.garlic.com/~lynn/2007k.html#26 user level TCP implementation
https://www.garlic.com/~lynn/2007k.html#48 John W. Backus, 82, Fortran developer, dies
https://www.garlic.com/~lynn/2007m.html#67 Operating systems are old and busted
https://www.garlic.com/~lynn/2007m.html#70 Is Parallel Programming Just Too Hard?
https://www.garlic.com/~lynn/2007o.html#3 Hypervisors May Replace Operating Systems As King Of The Data Center
https://www.garlic.com/~lynn/2007q.html#25 VMware: New King Of The Data Center?
https://www.garlic.com/~lynn/2007s.html#4 Why do we think virtualization is new?
https://www.garlic.com/~lynn/2007s.html#26 Oracle Introduces Oracle VM As It Leaps Into Virtualization
https://www.garlic.com/~lynn/2007s.html#35 Oracle Introduces Oracle VM As It Leaps Into Virtualization
https://www.garlic.com/~lynn/2007u.html#39 New, 40+ yr old, direction in operating systems
https://www.garlic.com/~lynn/2007u.html#41 New, 40+ yr old, direction in operating systems
https://www.garlic.com/~lynn/2007u.html#81 IBM mainframe history, was Floating-point myths
https://www.garlic.com/~lynn/2007v.html#75 virtual appliance
https://www.garlic.com/~lynn/2007v.html#80 software preservation volunteers ( was Re: LINC-8 Front Panel Questions)
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Education ranking Newsgroups: alt.folklore.computers Date: Thu, 10 Jan 2008 04:05:10re:
by comparison to domestic criminal justice system possibly being ill prepared to handle 3000-5000 illegal combatants & terrorists
this references
https://en.wikipedia.org/wiki/Nuremberg_Trials
there were
24 tried 20nov45 thru 1oct46, 200 total tried 1945 to 1949 and additional 1600 tried in other parts of military justice. there was also reference to stalin requesting that 50,000 just be executed.
related article
http://arstechnica.com/articles/culture/civil-liberties.ars
from above:
McCarthy's talk was well-organized, and he drew heavily on his
experiences as a federal prosecutor. McCarthy took as his starting point
a simple question: is the criminal justice system an effective means of
fighting terrorism? He then suggested that the answer depends on the
context in which you ask the question.
... snip ...
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: 1975 movie "Three Days of the Condor" tech stuff Newsgroups: alt.folklore.computers Date: Thu, 10 Jan 2008 04:41:28Anne & Lynn Wheeler <lynn@garlic.com> writes:
and stuff for electronic commerce
https://www.garlic.com/~lynn/subnetwork.html#gateway
for some additional topic drift ... at that time, there was only an implementation of client-side authentication of the server ... and we required/mandated mutual authentication of both the web merchant (by the payment gateway) and the payment gateway (by the web merchant) to be implemented.
by the time we were done, we pretty much realized while public
key authentication provided a lot of advantages, the related use
of digital certificates were redundant and superfluous ... somewhat
related recent posts
https://www.garlic.com/~lynn/2008.html#53 Really stupid question about z/OS HTTP server
https://www.garlic.com/~lynn/2008.html#54 Really stupid question about z/OS HTTP server
i.e. basically digital certificates are the electronic analog of the letters of credit/introduction from the sailing ship days ... aid in establishing first time communication between total strangers. the issue in the electronic commerce scenario and the payment gateway required that both the payment gateway be preregistered with the web merchant and the web merchants be preregistered with the payment gateway ... invalidating the underlying justification for having digital certificates and PKI.
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: competitiveness Newsgroups: alt.folklore.computers Date: Thu, 10 Jan 2008 10:26:25greymaus <greymausg@mail.com> writes:
however, maybe the question is not why it is dropping from first place ... but why it is so high at all?
in a technology age, with rankings so low in education and skills
... i.e. recent posts
https://www.garlic.com/~lynn/2008.html#44 Computer Science Education: Whare Are the Software Engineers of Tomorrow?
https://www.garlic.com/~lynn/2008.html#46 Computer Science Education: Whare Are the Software Engineers of Tomorrow?
https://www.garlic.com/~lynn/2008.html#56 Computer Science Education: Whare Are the Software Engineers of Tomorrow?
https://www.garlic.com/~lynn/2008.html#57 Computer Science Education: Whare Are the Software Engineers of Tomorrow?
including original post in this thread about science & math education
https://www.garlic.com/~lynn/2007u.html#78 Education ranking
and reference to "Where the United States Ranks (16 out of 28)"
https://www.garlic.com/~lynn/2007t.html#0 Newsweek article--baby boomers and computers
so with citizens apparently so mediocre, why is the avg. standard of living so high?
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: LINC-8 Front Panel Questions Newsgroups: alt.folklore.computers Date: Thu, 10 Jan 2008 11:48:04Anne & Lynn Wheeler <lynn@garlic.com> writes:
Why Tape Libraries Still Matter
http://itmanagement.earthweb.com/article.php/3720726
the above states that revenue from tape libraries declined
15.6 percent in 2006 ... but
Despite those statistics, tape users purchased more than 50 percent more
capacity as they migrated to higher-capacity and higher-performance tape
drives and cartridges. Thus, what looks a fading industry on the surface
is very much alive and kicking.
... snip ...
for other drift, old email about doing original cmsback
https://www.garlic.com/~lynn/lhwemail.html#cmsback
that eventually morphed into the current TSM ... as well as
collected posts mentioning (tape) backup/archive
https://www.garlic.com/~lynn/submain.html#backup
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Radix Partition Trees Newsgroups: bit.listserv.ibm-main Date: Thu, 10 Jan 2008 22:19:25rfochtman@YNC.NET (Rick Fochtman) writes:
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: As Expected, Ford Falls From 2nd Place in U.S. Sales Newsgroups: alt.folklore.computers Date: Fri, 11 Jan 2008 06:35:58greymaus <greymausg@mail.com> writes:
which is why some number of institutions have declared bankruptcy to get the retirement payments off their books ... and transferred to the gov.
... previous refs
https://www.garlic.com/~lynn/2007j.html#93 IBM Unionization
https://www.garlic.com/~lynn/2007t.html#38 Newsweek article--baby boomers and computers
https://www.garlic.com/~lynn/2007v.html#26 2007 Year in Review on Mainframes - Interesting
quite a bit of discussion in this previously referenced wiki page
https://en.wikipedia.org/wiki/Pension_Benefit_Guaranty_Corporation
also here:
http://www.pbgc.gov/
from the wiki page:
Before ERISA, employers and willing unions could agree to increase
benefits with little thought to how to pay for them. A classic case of
the unfortunate consequences of an underfunded pension plan is the 1963
shutdown of Studebaker automobile operations in South Bend, Indiana, in
which 4,500 workers lost 85% of their vested benefits.[10] One of
ERISA's stated intentions was to minimize underfunding in defined
benefit plans.
... snip ...
.... and other posts mentioning fully funded (or not) pension plans:
https://www.garlic.com/~lynn/2004b.html#9 A hundred subjects: 64-bit OS2/eCs, Innotek Products,
https://www.garlic.com/~lynn/2004b.html#42 The SOB that helped IT jobs move to India is dead!
https://www.garlic.com/~lynn/2004d.html#14 The SOB that helped IT jobs move to India is dead!
https://www.garlic.com/~lynn/2004l.html#37 I am an ageing techy, expert on everything. Let me explain
https://www.garlic.com/~lynn/2006g.html#27 The Pankian Metaphor
https://www.garlic.com/~lynn/2006g.html#35 The Pankian Metaphor
https://www.garlic.com/~lynn/2006g.html#36 The Pankian Metaphor
https://www.garlic.com/~lynn/2006l.html#53 Mainframe Linux Mythbusting (Was: Using Java in batch on z/OS?)
https://www.garlic.com/~lynn/2007j.html#20 IBM Unionization
https://www.garlic.com/~lynn/2007j.html#91 IBM Unionization
https://www.garlic.com/~lynn/2008.html#39 competitiveness
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: As Expected, Ford Falls From 2nd Place in U.S. Sales Newsgroups: alt.folklore.computers Date: Fri, 11 Jan 2008 08:59:00greymaus <greymausg@mail.com> writes:
besides the (long standing) issue of inadequately funded pension plans, there is current issue of some pension plans invested in toxic CDOs
there are issues with lending practices in the subprime mortgage market.
howver, possibly even more important is current enormous uncertainty in the valuation of the toxic CDOs (not so much that they may actually be worthless ... but nobody currently can tell the real value).
Some of this may be related to the "Consumer Reports" issue (i.e. rating institutions not accepting money from the corporations behind the products being rated).
Another part of the issue is the methodology in doing the
ratings/valuation, recent post with several toxic CDO related references:
https://www.garlic.com/~lynn/2007v.html#25 Newsweek article--baby boomers and computers
above includes reference:
How Conventional CDO Analytics Missed the Mark
http://www.bobsguide.com/guide/news/2007/Dec/20/Kamakura_Releases_Study:_How_Conventional_CDO_Analytics_Missed_the_Mark.html
again from above:
"Two years ago the Wall Street Journal in a page 1 story pointed out
the dangers in relying on the copula approach for CDO valuation, but
investors were slow to realize the magnitude of their model risk"
... snip ...
and old post with reference to problems in the 80s evaluating
risk in variable rate mortgages
https://www.garlic.com/~lynn/aepay3.htm#riskm The Thread Between Risk Management and Information Security
there is possibly some connection/overlap between the 80s inspiration/insight regarding variable rate mortgages and the more recent reference (in wall street journal article) regarding CDOs.
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: File Transfer conundrum Newsgroups: bit.listserv.ibm-main Date: Fri, 11 Jan 2008 09:45:10Gary@EVERGREEN-SYSTEMS.COM (Gary Green) writes:
"swift-2" providing internet capability and opening up for b-to-b;
we had been brought in to consult with small client/server startup that
wanted to do payment transactions on their server; they also had this
technology they called SSL they wanted to use ... and result is
sometimes now called e-commerce. part of the effort was something called
payment gateway (transition between internet and acquiring networks)
https://www.garlic.com/~lynn/subnetwork.html#gateway
we then were involved in x9a10 financial standard working group (in the
mid-90s had been given the requirement to preserve the integrity of the
financial infrastructure for all retail payments) that resulted
in the x9.59 financial standard
https://www.garlic.com/~lynn/x959.html#x959
some years ago we were also asked to provide some input to the swift-2 (what it was called at the time) specification.
Connecting to the secure IP network (SIPN)
http://www.swift.com/index.cfm?item_id=2304
from above:
SWIFTNet messaging services are provided via SWIFT's secure IP network
(SIPN), a highly secure and reliable network. Full redundancy, advanced
recovery mechanisms and first class operations and customer support
services ensure continuous network availability for SWIFTNet services.
... snip ...
SWIFTNet Interfaces Qualification
http://www.swift.com/index.cfm?item_id=2451
other refs:
Securities Markets Infrastructures
http://www.swift.com/index.cfm?item_id=2437
Banking Markets infrastructures
http://www.swift.com/index.cfm?item_id=57981
from above:
Additionally, SWIFT is now complementing its position in the wholesale,
high value clearing market by extending its portfolio of SWIFTNet
messaging solutions to the low-value payments and ACH market.
... snip ...
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Computer Science Education: Where Are the Software Engineers of Tomorrow? Newsgroups: bit.listserv.ibm-main,alt.folklore.computers Date: Fri, 11 Jan 2008 11:56:27patrick.okeefe@WAMU.NET (Patrick O'Keefe) writes:
there is independent thread in a.f.c regarding the same article, some of
the posts:
https://www.garlic.com/~lynn/2008.html#44 Computer Science Education: Where Are the Software Engineers of Tomorrow?
https://www.garlic.com/~lynn/2008.html#46 Computer Science Education: Where Are the Software Engineers of Tomorrow?
https://www.garlic.com/~lynn/2008.html#56 Computer Science Education: Where Are the Software Engineers of Tomorrow?
https://www.garlic.com/~lynn/2008.html#57 Computer Science Education: Where Are the Software Engineers of Tomorrow?
https://www.garlic.com/~lynn/2008.html#62 competitiveness
part of it related to reduced math requirements and part of it related to java (including some mention of java early days).
as noted in the radix partition trees thread ... some of luther's work showed up in mainframe instructions.
i had been involved in the original relational/sql implementation,
system/r
https://www.garlic.com/~lynn/submain.html#systemr
and technology transfer to endicott for sql/ds. for other topic drift
... one of the people in the meeting referenced here ... had mentioned
that they had done much of the work for the technology transfer back
from endicott to stl for db2
https://www.garlic.com/~lynn/95.html#13
about the same time as the original relational/sql work, I also was involved doing some stuff with a similar, but different kind of dbms implementation (joint project between some people in stl and the los gatos vlsi group). this had some of the similar objectives as the relational/sql activity ... but significantly relaxed the requirements for structured data definition ... and used radix partition trees for its indexing structure (and the person involved in the two mainframe instructions was brought in to consult on some of the work).
there was some differences between the old-style '60s DBMS contingent in STL and the relational/sql contingent ... with the '60 DBMS contingent pointing out that relational/sql typically doubled the physical disk requirements (for the table indexes) and also greatly increased the physical disk i/os (for processing the indexes). the relational/sql contingent countered that the use of indexes was part of eliminating the direct record pointer paradigm (that were characteristic of the '60 DBMS) as well as all the associated administrative overhead.
during the 80s, things started to tip towards relational/sql ... with disk cost/byte significantly reduced and significant increases in system real storages (allowing index caching, eliminating many of the additional index disk physical i/os) .... aka change in hardware cost tradeoff versis administrative/skill overhead.
for other drift, a totally independent implementation i use for
maintaining the rfc index information
https://www.garlic.com/~lynn/rfcietff.htm
as well as the merged glossary/taxonomy information
https://www.garlic.com/~lynn/index.html
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Rotary phones Newsgroups: alt.folklore.computers Date: Fri, 11 Jan 2008 12:32:20Morten Reistad <first@last.name> writes:
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: As Expected, Ford Falls From 2nd Place in U.S. Sales Newsgroups: alt.folklore.computers Date: Fri, 11 Jan 2008 14:52:07re:
as per most recent and various previous references
https://www.garlic.com/~lynn/2007t.html#50 Newsweek article--baby boomers and computers
https://www.garlic.com/~lynn/2007v.html#25 Newsweek article--baby boomers and computers
in the mid-80s there were number of large complex computer applications
that were used in evaluated risks in various financial instruments. this
long winded post
https://www.garlic.com/~lynn/aepay3.htm#riskm Thread Between Risk Management and Information Security
includes mention that there was some deficiencies related to variable rate mortgages in the 80s risk management/evaluation computer software ... and, at least in one case a "fix/correction" led to citibank getting out of the mortgage business.
roll forward nearly 20 years ... and something similar has happened. also mentioned in recent posts about current large complex risk management/evaluation computer software:
How Conventional CDO Analytics Missed the Mark
http://www.bobsguide.com/guide/news/2007/Dec/20/Kamakura_Releases_Study:_How_Conventional_CDO_Analytics_Missed_the_Mark.html
also mentioned in previous posts:
U.S. Mortgage Crisis Rivals S&L Meltdown
http://online.wsj.com/article/SB119724657737318810.html?mod=googlenews_wsj
from above:
Indeed, coming up with a value for a CDO entails analyzing more than 100
separate securities, each of which contains several thousand individual
loans -- a feat that, if done on any scale, can require millions of
dollars in computing power alone.
... snip ...
not only is there some issues whether it is currently being calculated correctly ... but that it is a mammoth amount of calculation.
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: As Expected, Ford Falls From 2nd Place in U.S. Sales Newsgroups: alt.folklore.computers Date: Fri, 11 Jan 2008 20:17:35
a few other (computerized) risk modeling
Credit risk - Wikipedia, the free encyclopedia
https://en.wikipedia.org/wiki/Credit_risk
Modeling the Reality of Risk: The Cornerstone of Enterprise Risk
Management
http://www.irmi.com/Expert/Articles/2001/Shah07.aspx
The largest collections of credit risk modeling resource
http://www.defaultrisk.com/
Stress Tests: Useful Complements to Financial Risk Models
http://www.frbsf.org/publications/economics/letter/2005/el2005-14.html
Financial Risk Modeling : DecisionCraft Analytics
http://www.decisioncraft.com/dmdirect/financial.htm
Statistical Methods for Dynamical Stochastic Models.
http://www.math.ku.dk/~mikosch/maphysto_alex/alex.html
The Big Picture | Risk Model
http://bigpicture.typepad.com/comments/2008/01/risk-model.html
FDIC: Strengthening Financial Risk Management at the FDIC
http://www.fdic.gov/deposit/insurance/strengthening/pgs34-39.html
Credit Risk Modelling: Current Practices and Applications
http://www.bis.org/publ/bcbs49.htm
Capital Based Risk Modeling
http://www.aon.com/as/en/risk/captive/based_risk.jsp
Risk Management and Risk Modeling Software Tools
http://www.roselladb.com/risk-modeling.htm
and wiki page:
Risk modeling
https://en.wikipedia.org/wiki/Risk_modeling
from above:
Formal risk modeling is required under the Basel II proposal for all the
major international banking institutions by the various national
depository institution regulators.
Quantitative risk analysis and modeling have become important in the
light of corporate scandals in the past few years (most notably, Enron),
Basel II, the revised FAS 123R and the Sarbanes-Oxley Act. In the past,
risk analysis was done qualitatively but now with the advent of powerful
computing software, quantitative risk analysis can be done quickly and
effortlessly.
... snip ...
misc past posts mentioning basel and/or sarbanes-oxley:
https://www.garlic.com/~lynn/aepay3.htm#riskm The Thread Between Risk Management and Information Security
https://www.garlic.com/~lynn/aadsm5.htm#xmlvch implementations of "XML Voucher: Generic Voucher Language" ?
https://www.garlic.com/~lynn/aadsm5.htm#epaym "e-payments" email discussion list is now "Internet-payments"
https://www.garlic.com/~lynn/aepay8.htm#bis7 BIS Papers No. 7 - Electronic finance: a new perspective and challenges
https://www.garlic.com/~lynn/aadsm10.htm#smallpay3 Small/Secure Payment Business Models
https://www.garlic.com/~lynn/aadsm10.htm#cfppki19 CFP: PKI research workshop
https://www.garlic.com/~lynn/aepay10.htm#50 glossary
https://www.garlic.com/~lynn/aepay11.htm#29 CIOs Must Be Involved In Controlling Risk In Financial Services
https://www.garlic.com/~lynn/aadsm14.htm#50 E-banking is board-level Issue, Says Basel Committee
https://www.garlic.com/~lynn/aadsm14.htm#52 Committee calls for better e-banking security management
https://www.garlic.com/~lynn/aadsm16.htm#7 The Digital Insider: Backdoor Trojans ... fyi
https://www.garlic.com/~lynn/aadsm19.htm#10 Security as a "Consumer Choice" model or as a sales (SANS) model?
https://www.garlic.com/~lynn/aadsm21.htm#3 Is there any future for smartcards?
https://www.garlic.com/~lynn/aadsm22.htm#26 FraudWatch - Chip&Pin, a new tenner (USD10)
https://www.garlic.com/~lynn/aadsm23.htm#10 PGP "master keys"
https://www.garlic.com/~lynn/aadsm25.htm#12 Sarbanes-Oxley is what you get when you don't do FC
https://www.garlic.com/~lynn/aadsm25.htm#13 Sarbanes-Oxley is what you get when you don't do FC
https://www.garlic.com/~lynn/aadsm25.htm#14 Sarbanes-Oxley is what you get when you don't do FC
https://www.garlic.com/~lynn/aadsm25.htm#15 Sarbanes-Oxley is what you get when you don't do FC
https://www.garlic.com/~lynn/aadsm25.htm#26 Fraudwatch - how much a Brit costs, how to be a 419-er, Sarbanes-Oxley rises as fraud rises, the real Piracy
https://www.garlic.com/~lynn/aadsm25.htm#43 Audit Follies - Atlantic differences, branding UnTrust, thunbs on Sarbanes-Oxley, alternates
https://www.garlic.com/~lynn/aadsm26.htm#2 Audit Follies - Atlantic differences, branding UnTrust, thunbs on Sarbanes-Oxley, alternates
https://www.garlic.com/~lynn/aadsm27.htm#11 Is this Risk Management's Waterloo?
https://www.garlic.com/~lynn/2003k.html#41 An Understanding Database Theory
https://www.garlic.com/~lynn/2005k.html#23 More on garbage
https://www.garlic.com/~lynn/2005t.html#26 Dangerous Hardware
https://www.garlic.com/~lynn/2006h.html#33 The Pankian Metaphor
https://www.garlic.com/~lynn/2006h.html#58 Sarbanes-Oxley
https://www.garlic.com/~lynn/2006i.html#1 Sarbanes-Oxley
https://www.garlic.com/~lynn/2006j.html#28 Password Complexity
https://www.garlic.com/~lynn/2006o.html#35 the personal data theft pandemic continues
https://www.garlic.com/~lynn/2006u.html#22 AOS: The next big thing in data storage
https://www.garlic.com/~lynn/2007b.html#63 Is Silicon Valley strangeled by SOX?
https://www.garlic.com/~lynn/2007j.html#0 John W. Backus, 82, Fortran developer, dies
https://www.garlic.com/~lynn/2007j.html#74 IBM Unionization
https://www.garlic.com/~lynn/2007j.html#75 IBM Unionization
https://www.garlic.com/~lynn/2007o.html#0 The Unexpected Fact about the First Computer Programmer
https://www.garlic.com/~lynn/2007r.html#61 The new urgency to fix online privacy
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Radix Partition Trees Newsgroups: bit.listserv.ibm-main Date: Fri, 11 Jan 2008 21:18:38wkkelley@OPTONLINE.NET (W. Kevin Kelley) writes:
a few old posts mentioning luther:
https://www.garlic.com/~lynn/98.html#19 S/360 operating systems geneaology
https://www.garlic.com/~lynn/98.html#20 Reviving the OS/360 thread (Questions about OS/360)
https://www.garlic.com/~lynn/2001.html#2 A new "Remember when?" period happening right now
https://www.garlic.com/~lynn/2001d.html#28 Very CISC Instuctions (Was: why the machine word size ...)
https://www.garlic.com/~lynn/2001h.html#73 Most complex instructions
https://www.garlic.com/~lynn/2002.html#14 index searching
https://www.garlic.com/~lynn/2002d.html#18 Mainframers: Take back the light (spotlight, that is)
https://www.garlic.com/~lynn/2002q.html#10 radix sort
https://www.garlic.com/~lynn/2003e.html#80 "Super-Cheap" Supercomputing
https://www.garlic.com/~lynn/2003i.html#58 assembler performance superiority: a given
https://www.garlic.com/~lynn/2003i.html#83 A Dark Day
https://www.garlic.com/~lynn/2004l.html#10 Complex Instructions
https://www.garlic.com/~lynn/2005c.html#35 [Lit.] Buffer overruns
https://www.garlic.com/~lynn/2005c.html#38 [Lit.] Buffer overruns
https://www.garlic.com/~lynn/2005e.html#37 Where should the type information be?
https://www.garlic.com/~lynn/2007l.html#57 How would a relational operating system look like?
https://www.garlic.com/~lynn/2007o.html#55 mainframe performance, was Is a RISC chip more expensive?
https://www.garlic.com/~lynn/2007u.html#18 Folklore references to CP67 at Lincoln Labs
https://www.garlic.com/~lynn/2008.html#68 Computer Science Education: Where Are the Software Engineers of Tomorrow?
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Computer Science Education: Where Are the Software Engineers of Tomorrow? Newsgroups: alt.folklore.computers Date: Sat, 12 Jan 2008 09:17:27hancock4 writes:
for some other topic drift:
Yes, The Tech Skills Shortage Is Real; The IT skills famine plaguing the
United States is only going to get worse.
http://www.informationweek.com/news/showArticle.jhtml?articleID=205900413
from above:
The growth in IT-related positions is driven by new opportunities to
leverage technology in the organization, and by businesses recognizing
the impact that IT can have on revenue. Another important factor
contributing to the growth in demand for IT talent is beginning to
appear in news headlines: "By 2010, 40% of the U.S. workforce is set to
retire." The Bureau of Labor Statistics predicts that in 2010, there
will be 52% more people in the 55-to-64 age bracket than there were in
that age group in 2000. Organizations will face significant knowledge
loss because of retirements over the coming decade.
... snip ...
and somewhat related to the above mention of "impact that IT can have
on revenue"
https://www.garlic.com/~lynn/2008.html#70 As Expected, Ford Falls From 2nd Place in U.S. Sales
https://www.garlic.com/~lynn/2008.html#71 As Expected, Ford Falls From 2nd Place in U.S. Sales
also from the "tech skills shortage"
Nearly 70% of middle school teachers lack education and certification in
mathematics, let alone computer and business skills, the National Center
for Education finds.
... snip ...
and:
In a significant move, the European Union is pushing to provide "blue
cards" aimed at attracting foreign-born IT pros to combat the shortage
of tech talent in that region. If successfully implemented, the blue
cards would apply in all 27 EU member states, increasing their economic
competitiveness.
... snip ...
and other related recent threads mentioning IT and competitiveness.
https://www.garlic.com/~lynn/2007f.html#57 Is computer history taught now?
https://www.garlic.com/~lynn/2007f.html#61 Is computer history taught now?
https://www.garlic.com/~lynn/2007g.html#6 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007g.html#7 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007h.html#42 Experts: Education key to U.S. competitiveness
https://www.garlic.com/~lynn/2007l.html#10 John W. Backus, 82, Fortran developer, dies
https://www.garlic.com/~lynn/2007l.html#22 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007p.html#15 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007p.html#23 Newsweek article--baby boomers and computers
https://www.garlic.com/~lynn/2007p.html#32 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007r.html#70 Latest OECD broadband data puts US in middle of the pack on speed, price
https://www.garlic.com/~lynn/2007t.html#15 Newsweek article--baby boomers and computers
https://www.garlic.com/~lynn/2007t.html#18 Newsweek article--baby boomers and computers
https://www.garlic.com/~lynn/2007t.html#31 Newsweek article--baby boomers and computers
https://www.garlic.com/~lynn/2007t.html#43 Newsweek article--baby boomers and computers
https://www.garlic.com/~lynn/2007u.html#78 Education ranking
https://www.garlic.com/~lynn/2007v.html#20 Education ranking
https://www.garlic.com/~lynn/2008.html#28 As Expected, Ford Falls From 2nd Place in U.S. Sales
https://www.garlic.com/~lynn/2008.html#39 competitiveness
https://www.garlic.com/~lynn/2008.html#57 Computer Science Education: Where Are the Software Engineers of Tomorrow?
https://www.garlic.com/~lynn/2008.html#62 competitiveness
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Virtualization Wave Newsgroups: alt.folklore.computers Date: Sat, 12 Jan 2008 10:36:25more in the new, 40+ yr old technology.
Acquisition Creates Virtualization Powerhouse
http://www.crn.com/it-channel/205603045
Channel At The Center Of Virtualization Wave
http://www.crn.com/it-channel/205602022
from above:
According to two recent exclusive CMP Channel surveys, solution
providers said server virtualization is becoming a larger part of their
business and it's also quickly becoming the catalyst for a wide range of
other service offerings, including disaster recovery and data center
consolidation.
... snip ...
last week in jan68, three people came out to the univ from the science
center
https://www.garlic.com/~lynn/subtopic.html#545tech
to install cp67.
page 2 (of the above), The Intangible Factor
http://www.crn.com/it-channel/205602022?pgno=2
from above:
While some of the benefits of the technology—such as reduced power,
cooling, floor space, maintenance requirements and better control of
data backups—are tangible to customers, there is so much more that can
be done. "If customers are not exposed to server virtualization, it's up
to the VAR to bring it to their attention," he added.
... snip ...
recent posts:
https://www.garlic.com/~lynn/2008.html#10 For the History buff's an IBM 5150 pc
https://www.garlic.com/~lynn/2008.html#17 Usefulness of bidirectional read/write?
https://www.garlic.com/~lynn/2008.html#30 hacked TOPS-10 monitors
https://www.garlic.com/~lynn/2008.html#33 JCL parms
https://www.garlic.com/~lynn/2008.html#41 IT managers stymied by limits of x86 virtualization
https://www.garlic.com/~lynn/2008.html#50 IT managers stymied by limits of x86 virtualization
https://www.garlic.com/~lynn/2008.html#59 old internal network references
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Rotary phones Newsgroups: alt.folklore.computers Date: Sat, 12 Jan 2008 11:42:18Anne & Lynn Wheeler <lynn@garlic.com> writes:
and for even more vmshare topic drift ...
on the internal network
https://www.garlic.com/~lynn/subnetwork.html#internalnet
there was an application that supported both a usenet type of operation and an email distribution list type of operation. it was possible to "subscribe" to a discussion group (as in email mailing list) and/or participate in discussion group in more usenet like mode.
some of this possibly prompted the evolution of the later "listserv"
http://www.lsoft.com/corporate/ericthomas.asp
http://www.lsoft.com/corporate/history_listserv.asp
(email distribution list) application that appeared on bitnet
and earn
https://www.garlic.com/~lynn/subnetwork.html#bitnet
old earn/networking email
https://www.garlic.com/~lynn/2001h.html#email840320
in this post
https://www.garlic.com/~lynn/2001h.html#65 UUCP email
however, predating both, was tymshare corporation offered vmshare
online discussion groups (hosted on their commercial service bureau
vm370-based online timesharing)
https://www.garlic.com/~lynn/submain.html#timeshare
in mid-70s (Aug76) ... vmshare archive
http://vm.marist.edu/~vmshare/
old email mentioning vmshare
https://www.garlic.com/~lynn/lhwemail.html#vmshare
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Rotary phones Newsgroups: alt.folklore.computers Date: Sat, 12 Jan 2008 12:04:24Anne & Lynn Wheeler <lynn@garlic.com> writes:
and even more drift extract from the listserv reference:
1990
Eric Thomas was hired by SUNET (the Swedish University Network) to help
build a computer network with the ambition of making Sweden the leading
IT nation in Europe. Because of this, LISTSERV development continued in
Stockholm, Sweden.
Passive probes were added to LISTSERV.
1991
The international BITNET network reached its peak, connecting some 1,400
organizations in 49 countries for the electronic, non-commercial
exchange of information in support of research and education. Thanks
largely to the volunteer efforts of Eric Thomas, BITNET provided
thousands of electronic mailing lists based on LISTSERV.
Eric Thomas did not want his software to disappear with the
mainframes. Therefore, he started looking for ways to port LISTSERV to
other environments, such as VMS and Unix.
... snip ...
From: lynn@GARLIC.COM (Anne & Lynn Wheeler) Subject: Re: Radix Partition Trees Newsgroups: bit.listserv.ibm-main Date: 12 Jan 2008 11:32:41 -0800lists@KCATS.ORG (Michael Stack) writes:
my original comment was "for the fun of it" ... look at the mainframe instructions ... on par with other comments about considering red-black trees, etc.
the other comment was with respect to Luther ... who I believe has been involved in both.
note a radix partition tree implementation can use bit strings and involve the bit displacement/place that the strings differ ... in such a situation ... rather than doing something like calculating a key for the entry ... take the bit string value itself and create a tree with forks at where there are bit differences.
radix as in numerical encoding system:
https://en.wikipedia.org/wiki/Radix
from above:
The highest symbol of a positional numeral system usually has the value
one less than the value of the radix of that numeral system.
... snip ...
radix as in radix tree:
Radix tree:
https://en.wikipedia.org/wiki/Radix_tree
from above:
Unlike balanced trees, radix trees permit lookup, insertion, and
deletion in O(k) time rather than O(log n). This doesn't seem like an
advantage, since normally k ≥ log n, but in a balanced tree every
comparison is a string comparison requiring O(k) worst-case time, many
of which are slow in practice due to long common prefixes. In a trie,
all comparisons require constant time, but it takes m comparisons to
look up a string of length m. Radix trees can perform these operations
with fewer comparisons and require many fewer nodes.
Hash tables are commonly said to have expected O(1) insertion and
deletion times, but this is only true when considering computation of
the hash of the key to be a constant time operation. When hashing the
key is taken into account, hash tables have expected O(k) insertion and
deletion times, but will take longer in the worst-case depending on how
collisions are handled. Radix trees have worst-case O(k) insertion and
deletion. The successor/predecessor operations of radix trees are also
not implemented by hash tables.
... snip ...
i.e. rather than treating each bit in a value for tree position ... deal only with the location where there are bit differences ... difference displacements that are shorter (nearer the front of the string) will appear higher in the tree.
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: As Expected, Ford Falls From 2nd Place in U.S. Sales Newsgroups: alt.folklore.computers Date: Sun, 13 Jan 2008 13:09:00Anne & Lynn Wheeler <lynn@garlic.com> writes:
the original Basel II draft included a new "qualitative" section (in
addition to all the traditional risk quantitative requirements). we were
interest in developing applications for the new specification ... for
other topic drift ...
https://www.garlic.com/~lynn/aepay3.htm#riskm The Thread Between Risk Management and Information Security
https://www.garlic.com/~lynn/2003k.html#41 An Understanding Database Theory
https://www.garlic.com/~lynn/2006w.html#47 'Innovation' and other crimes
however, during the Basel II review cycles much of the new section was removed. however, a few similar requirements did show up in sarbanes-oxley.
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Rotary phones Newsgroups: alt.folklore.computers Date: Sun, 13 Jan 2008 13:40:29floyd@apaflo.com (Floyd L. Davidson) writes:
independent of that, we did do some completely different stuff in
high-speed data transport project
https://www.garlic.com/~lynn/subnetwork.html#hsdt
working on getting, nearly full media thruput over T1 (and higher-speed) full-duplex links. besides the traditional speeds&feeds stuff ... there was also a lot of work on forward-error-correcting and encryption.
recent FEC related post
https://www.garlic.com/~lynn/2008.html#43 dig. TV
some old email mentioning encryption
https://www.garlic.com/~lynn/lhwemail.html#crypto
part of the issue was satellite transmissions are felt to be
especially easy to intercept ... however corporate standards was that
all transmission (terrestrial or satellite) leaving corporate
facilities had to be encrypted. at one point in the mid-80s, there was
a comment that the internal network
https://www.garlic.com/~lynn/subnetwork.html#internalnet
had more than half of all link encryptors in the world. In that
period, link encryptors for 56kbit transmission weren't too bad, but I
really didn't like the price I had to pay for T1 link encryptors
.. and higher-speed were pretty much custom implementations. a couple
old posts mentioning the T3 "data aggravator" encryption unit (as well
as a few other HSDT issues)
https://www.garlic.com/~lynn/2006m.html#16 Why I use a Mac, anno 2006
https://www.garlic.com/~lynn/2006n.html#36 The very first text editor
i was involved in project for packet-level encryption board that could change key on every packet and could substain better than T2 full-duplex ... and was targeted for $100 (all of which involved numerous complications).
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Toyota Sales for 2007 May Surpass GM Newsgroups: alt.folklore.computers Date: Sun, 13 Jan 2008 14:55:45Anne & Lynn Wheeler <lynn@garlic.com> writes:
Toyota Sales for 2007 May Surpass GM
http://www.consumeraffairs.com/news04/2008/01/toyota_gm.html
from above:
Toyota reported 2007 worldwide sales of 9.37 million cars and trucks and
that could be enough to propel the Japanese corporation ahead of General
Motors to become the world's largest automaker.
GM, which is held the title for 76 years, will report company sales
figures January 23. Analysts, however, estimate GM sales for 2007 at
approximately 9.3 million cars and trucks.
... snip ...
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Education ranking Newsgroups: alt.folklore.computers Date: Sun, 13 Jan 2008 15:14:14krw <krw@att.bizzzzz> writes:
refs:
http://www.us-highways.com/soworld.htm
http://www.us-highways.com/sohist1999.htm
http://www.us-highways.com/sohist.htm
and
https://en.wikipedia.org/wiki/Esso
from above:
In those states, it marketed its products under the brand "Esso", the
phonetic pronunciation of the letters "S" and "O". It also used the Esso
brand in New York and the six New England states, where the Standard Oil
Company of New York (Mobil) had the rights, but did not object to the
New Jersey company's use of the trademark (the two companies did not
merge until 1998). However, in the other states, the other Standard Oil
companies objected and forced Jersey Standard to use other brand names
... snip ...
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Rotary phones Newsgroups: alt.folklore.computers Date: Mon, 14 Jan 2008 08:48:42Morten Reistad <first@last.name> writes:
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Education ranking Newsgroups: alt.folklore.computers Date: Mon, 14 Jan 2008 22:27:19Who Cares <lon.stowell@comcast.net> writes:
a current version is called ebrd ... a couple past posts mentioning
Marshall Plan and EBRD:
https://www.garlic.com/~lynn/aadsm22.htm#43 Votes are coins stamped with the Red Queen's head
https://www.garlic.com/~lynn/2006f.html#9 The Pankian Metaphor
https://www.garlic.com/~lynn/2006f.html#10 The Pankian Metaphor
EBRD:
http://www.ebrd.com/
although
History of the OECD
http://www.people.ku.edu/~nkinners/LangList/Langs/M/Mesa.htm
from above:
The forerunner of the OECD was the Organisation for European Economic
Co-operation (OEEC), which was formed to administer American and
Canadian aid under the Marshall Plan for reconstruction of Europe after
World War II. Since it took over from the OEEC in 1961, the OECD
vocation has been to build strong economies in its member countries,
improve efficiency, hone market systems, expand free trade and
contribute to development in industrialised as well as developing
countries.
... snip ...
earlier post with OECD reference:
https://www.garlic.com/~lynn/2007r.html#70 Latest OECD broadband data puts US in middle of the pack on speed, price
and there have been recent references to this OECD study
http://www.oecd.org/document/40/0,3343,en_32252351_32235731_39701864_1_1_1_1,00.html
which was what started this thread
https://www.garlic.com/~lynn/2007u.html#78 Education ranking
and other posts in the thread:
https://www.garlic.com/~lynn/2007u.html#80 Education ranking
https://www.garlic.com/~lynn/2007u.html#82 Education ranking
https://www.garlic.com/~lynn/2007v.html#16 Education ranking
https://www.garlic.com/~lynn/2007v.html#19 Education ranking
https://www.garlic.com/~lynn/2007v.html#20 Education ranking
https://www.garlic.com/~lynn/2007v.html#38 Education ranking
https://www.garlic.com/~lynn/2007v.html#39 Education ranking
https://www.garlic.com/~lynn/2007v.html#44 Education ranking
https://www.garlic.com/~lynn/2007v.html#45 Education ranking
https://www.garlic.com/~lynn/2007v.html#51 Education ranking
https://www.garlic.com/~lynn/2007v.html#71 Education ranking
https://www.garlic.com/~lynn/2008.html#52 Education ranking
https://www.garlic.com/~lynn/2008.html#55 Education ranking
https://www.garlic.com/~lynn/2008.html#60 Education ranking
https://www.garlic.com/~lynn/2008.html#81 Education ranking
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Toyota Sales for 2007 May Surpass GM Newsgroups: alt.folklore.computers Date: Tue, 15 Jan 2008 08:36:15Morten Reistad <first@last.name> writes:
one of the us manufacturer formed C4 effort ... mostly leveraging information technology to cut the 7-8yr elapsed time new product effort in half (3-4yrs elapsed time for new product from start to finish). toyota had done that already ... and was on its way to cutting it in half again ... i.e. possibly less than 1-2yrs elapsed time for new product from start to finish ... much more agile adapting to changing conditions and/or consumer preferences, aka significantly more competitive in a changing environment.
misc. past posts mentioning participating in some of the C4 activities.
https://www.garlic.com/~lynn/2000f.html#43 Reason Japanese cars are assembled in the US (was Re: American bigotry)
https://www.garlic.com/~lynn/2003i.html#61 TGV in the USA?
https://www.garlic.com/~lynn/2004c.html#51 [OT] Lockheed puts F-16 manuals online
https://www.garlic.com/~lynn/2004h.html#22 Vintage computers are better than modern crap !
https://www.garlic.com/~lynn/2006.html#44 IBM 610 workstation computer
https://www.garlic.com/~lynn/2006g.html#14 The Pankian Metaphor
https://www.garlic.com/~lynn/2006g.html#20 The Pankian Metaphor
https://www.garlic.com/~lynn/2006m.html#49 The Pankian Metaphor (redux)
https://www.garlic.com/~lynn/2006v.html#14 In Search of Stupidity
https://www.garlic.com/~lynn/2007f.html#50 The Perfect Computer - 36 bits?
https://www.garlic.com/~lynn/2007g.html#29 The Perfect Computer - 36 bits?
https://www.garlic.com/~lynn/2007g.html#34 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007g.html#52 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007i.html#13 U.S. Cedes Top Spot in Global IT Competitiveness
https://www.garlic.com/~lynn/2007j.html#33 IBM Unionization
https://www.garlic.com/~lynn/2007n.html#31 IBM obsoleting mainframe hardware
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Toyota Sales for 2007 May Surpass GM Newsgroups: alt.folklore.computers Date: Tue, 15 Jan 2008 08:44:13Anne & Lynn Wheeler <lynn@garlic.com> writes:
dare i mention OODA-loops (and john boyd)? ... being much more agile at rapidly adapting to changing/evolving conditions.
recent posts mentioning boyd &/or OODA-loops
https://www.garlic.com/~lynn/2008.html#2 folklore indeed
https://www.garlic.com/~lynn/2008.html#11 Information security breaches quadrupled in 2007
https://www.garlic.com/~lynn/2008.html#21 No Glory for the PDP-15
https://www.garlic.com/~lynn/2008.html#45 No Glory for the PDP-15
misc. past posts mentioning john boyd
https://www.garlic.com/~lynn/subboyd.html#boyd
misc. URLs from around the web mentioning john boyd
https://www.garlic.com/~lynn/subboyd.html#boyd2
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Toyota Sales for 2007 May Surpass GM Newsgroups: alt.folklore.computers Date: Tue, 15 Jan 2008 09:06:41greymaus <greymausg@mail.com> writes:
it isn't just about producing a better product ... it is having agility to rapidly create/adapt new products to changing consumer preferences (aka another form of just-in-time).
one of the "points" from the c4 time-frame was not only were far east automobile builders moving to possibly less than 12month new product cycle ... really mess-up the US tradition of annual purchase of yearly new (disposible?) car models ... there was some observation that far east consumer electronic manufacturers were on 90day new product cycle .... supply chain from origin to retail store shelves could be greater than new product cycle (aka new products were being created ... before the previous models had cleared the shelves at retail stores).
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Computer Science Education: Where Are the Software Engineers of Tomorrow? Newsgroups: alt.folklore.computers Date: Tue, 15 Jan 2008 09:33:32Anne & Lynn Wheeler <lynn@garlic.com> writes:
a little OODA-loop and john boyd topic drift:
https://www.garlic.com/~lynn/subboyd.html#boyd
leveraging "IT technology" competitive agility, adapting automobile
products to changing conditions and changing consumer preferences:
https://www.garlic.com/~lynn/2008.html#28 As Expected, Ford Falls From 2nd Place in U.S. Sales
https://www.garlic.com/~lynn/2008.html#48 As Expected, Ford Falls From 2nd Place in U.S. Sales
https://www.garlic.com/~lynn/2008.html#65 As Expected, Ford Falls From 2nd Place in U.S. Sales
https://www.garlic.com/~lynn/2008.html#80 Toyota Sales for 2007 May Surpass GM
https://www.garlic.com/~lynn/2008.html#84 Toyota Sales for 2007 May Surpass GM
https://www.garlic.com/~lynn/2008.html#85 Toyota Sales for 2007 May Surpass GM
https://www.garlic.com/~lynn/2008.html#86 Toyota Sales for 2007 May Surpass GM
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: folklore indeed Newsgroups: alt.folklore.computers Date: Tue, 15 Jan 2008 10:30:42jmfbahciv writes:
if you go to time-sequence operation ... it is possible to treat both
task-based and timesharing as subsets of common infrastructure ... just
dealing with the amounts and types of resources dealt with, over some
time-period. somewhat related recent post about a joke and dynamic
adaptive resource management:
https://www.garlic.com/~lynn/2008.html#16 No Glory for the PDP-15
on the timesharing side ... there were numerous implementations that
made implicit assumptions that any single resource request would be
significantly less than the available resources ... so a lot of the more
complex resource allocation issues could be ignored. some amount of
past posts related to timesharing and especially virtual machine based
commercial timesharing service bureaus
https://www.garlic.com/~lynn/submain.html#timeshare
on the timesharing side ... the frequently trivial operations ... any
pre-allocation could be significantly more expensive than the (tivial)
operation itself ... so on-the-fly, dynamic could be much more
efficient. on the task-based side ... some of the operations are so
massive ... that the efficiency trade-offs between pre-allocation and
on-the-fly allocation completely reverses (pre-allocation for massive
tasks saves enormous amounts of infrastructure overhead ... vis-a-vis
on-the-fly). some recent post mentioning the "pre-allocation" overhead
for trivial, student fortran exercises (was significantly larger than
the fortran programs themselves):
https://www.garlic.com/~lynn/2008.html#33 JCL parms
https://www.garlic.com/~lynn/2008.html#51 IBM LCS
people w/o any significant direct exposure to massive amounts of normal, business-critical dataprocessing that goes on the world today (keeping lots of the infrastructure operating) ... and have possibly mostly only dealt with univ. and/or desktop programming ... will have a totally different perspective with regard to lots of the issues ... aka some of the thinking styles/viewpoints may be heavily influenced by experience.
and now for something completely different:
Culture Influences Brain Function, Study Shows
http://www.sciencedaily.com/releases/2008/01/080111102934.htm
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: folklore indeed Newsgroups: alt.folklore.computers Date: Tue, 15 Jan 2008 11:23:48jmfbahciv writes:
os/360 (and descendants) batch did this ... recent posts
mentioning some issues for (trivial) micro-resource
operations
https://www.garlic.com/~lynn/2008.html#33 JCL parms
https://www.garlic.com/~lynn/2008.html#51 IBM LCS
note however, cp67 (and vm370 descendants) virtual machine operation had
to simultaneously support both trivial interactive operations and
timesharing
https://www.garlic.com/~lynn/submain.html#timeshare
as well as large (os/360) batch operations.
heavy duty allocation ... can consume more resources than the actual operation ... for the trivial, timesharing operations. however, for the large, industrial strength dataprocessing tasks; doing trivial, timesharing allocation can consume more resources than the actual industrial strength, dataprocessing task. timesharing will typically perform some sort of pre-allocation ... but it will be in much smaller granularities ... a sequence of micro-allocations (somewhat "on-demand")
an issue is to be able to dynamically adapt the quantity of resources
being allocated (per event) to the type of work being performed. misc.
past posts mentioning dynamic adaptive resource management
https://www.garlic.com/~lynn/subtopic.html#fairshare
one of the other approaches in the large os/360 batch operation genre
were the transaction monitors ... like cics ... misc. past posts
mentioning cics (and/or bdam)
https://www.garlic.com/~lynn/submain.html#bdam
and/or DBMS operations ... like DB2, IMS, etc. These were long running "batch" operations with large amounts of pre-allocated resources ... and then these subsystems would "sub-allocate" resources (in much smaller granularities) to various online transactions (like settop box pay-for-view ... or ATM machine cash operations).
From: Anne & Lynn Wheeler <lynn@garlic.com> Subject: Re: Computer Science Education: Where Are the Software Engineers of Tomorrow? Newsgroups: alt.folklore.computers Date: Tue, 15 Jan 2008 11:40:39Anne & Lynn Wheeler <lynn@garlic.com> writes:
and for a somewhat different perspective is the current subprime situation. some amount of it is some consumers not being able to anticipate/understand that variable rate mortgages might mean that their mortgage payments would go up.
however, a significant amount of the news is really about investors buying up toxic CDO with inaccurate risk ratings ... in effect, paying more for a lower risk rating ... however, it is now turning out that nobody really knows what a lot of the risk ratings actually are. In the current situation, w/o this risk rating knowledge ... there is now a tendency to assume the worst possible risk with implication of extremely low value (huge amount of current news about institutions doing "write-downs").
on one of the tv business news shows, they just asked why hasn't there been better "risk management 101" (and is the current problem, leadership, technology, and/or understanding).
recent posts with references to risk management technology:
https://www.garlic.com/~lynn/2008.html#66 As Expected, Ford Falls From 2nd Place in U.S. Sales
https://www.garlic.com/~lynn/2008.html#70 As Expected, Ford Falls From 2nd Place in U.S. Sales
https://www.garlic.com/~lynn/2008.html#71 As Expected, Ford Falls From 2nd Place in U.S. Sales
https://www.garlic.com/~lynn/2008.html#78 As Expected, Ford Falls From 2nd Place in U.S. Sales
older posts on the topic from last year:
https://www.garlic.com/~lynn/2007j.html#81 IBM Unionization
https://www.garlic.com/~lynn/2007j.html#82 IBM Unionization
https://www.garlic.com/~lynn/2007k.html#10 IBM Unionization
https://www.garlic.com/~lynn/2007k.html#12 IBM Unionization
https://www.garlic.com/~lynn/2007o.html#0 The Unexpected Fact about the First Computer Programmer
https://www.garlic.com/~lynn/2007p.html#50 Newsweek article--baby boomers and computers
https://www.garlic.com/~lynn/2007q.html#28 what does xp do when system is copying
https://www.garlic.com/~lynn/2007q.html#41 Newsweek article--baby boomers and computers
https://www.garlic.com/~lynn/2007r.html#58 Fixing our fraying Internet infrastructure
https://www.garlic.com/~lynn/2007r.html#60 Fixing our fraying Internet infrastructure
https://www.garlic.com/~lynn/2007s.html#25 Translation of IBM Basic Assembler to C?
https://www.garlic.com/~lynn/2007s.html#28 Translation of IBM Basic Assembler to C?
https://www.garlic.com/~lynn/2007t.html#4 Translation of IBM Basic Assembler to C?
https://www.garlic.com/~lynn/2007t.html#12 Translation of IBM Basic Assembler to C?
https://www.garlic.com/~lynn/2007t.html#50 Newsweek article--baby boomers and computers
https://www.garlic.com/~lynn/2007v.html#25 Newsweek article--baby boomers and computers