List of Archived Posts

2011 Newsgroup Postings (06/06 - 07/01)

We list every company in the world that has a mainframe computer
History of byte addressing
WHAT WAS THE PROJECT YOU WERE INVOLVED/PARTICIPATED AT IBM THAT YOU WILL ALWAYS REMEMBER?
RSA Pawned - Black Queen runs amoc behind US lines of defence
1st round in Internet Account Fraud World Cup: Customer 0, Bank 1, Attacker 300,000
Home prices may drop another 25%, Shiller predicts
Home prices may drop another 25%, Shiller predicts
Home prices may drop another 25%, Shiller predicts
At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened
Breaches and Consumer Backlash
Home prices may drop another 25%, Shiller predicts
History of byte addressing
The IBM Selective Sequence Electronic Calculator
IBM doc numbering question
Is the magic and romance killed by Windows (and Linux)?
Is the magic and romance killed by Windows (and Linux)?
Is the magic and romance killed by Windows (and Linux)?
Is the magic and romance killed by Windows (and Linux)?
Is the magic and romance killed by Windows (and Linux)?
When is performance really an issue? Was: Running an ISPF applicction from one pds
When is performance really an issue? Was: Running an ISPF applicction from one pds
Eurofighter v F16
Is BitCoin a triple entry system?
Eurofighter v F16
US Housing Crisis Is Now Worse Than Great Depression
US Housing Crisis Is Now Worse Than Great Depression
Is the magic and romance killed by Windows (and Linux)?
At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened
The National Security Agency Releases Over 50,000 Pages of Declassified Documents
Obama: "We don't have enough engineers"
IBM Centennial Film: Wild Ducks
An upbeat story
At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened
Happy 100th Birthday, IBM!
Happy 100th Birthday, IBM!
Happy 100th Birthday, IBM!
Happy 100th Birthday, IBM!
BIG IRON: The Manframe Story (so far)
Happy 100th Birthday, IBM!
Zen and Connaturality
Delinquent Homeowners to Get Mortgage Aid from Government
Delinquent Homeowners to Get Mortgage Aid from Government
Zen and Connaturality
Happy 100th Birthday, IBM!
OT The inventor of Email - Tom Van Vleck
Happy 100th Birthday, IBM!
Happy 100th Birthday, IBM!
The IBM would have, could have and should have story
Happy 100th Birthday, IBM!
OT The inventor of Email - Tom Van Vleck
DR Plans
Did My Brother Invent E-Mail With Tom Van Vleck?
Happy 100th Birthday, IBM!
Happy 100th Birthday, IBM!
Did My Brother Invent E-Mail With Tom Van Vleck? (Part One)
CISO's Guide to Breach Notification
pdp8 to PC- have we lost our way?
Law Interfering with Cybersecurity
Pipeline and Network Security: Protecting a Series of Tubes
SSL digital certificates
Cyberwar vs. Cyber-Espionage vs. Cybercrime
Do you remember back to June 23, 1969 when IBM unbundled
Do you remember back to June 23, 1969 when IBM unbundled
Do you remember back to June 23, 1969 when IBM unbundled
SQL Injection Deemed No. 1 Software Flaw
US Business Banking Cybercrime Wave: Is 'Commercially Reasonable' Reasonable?
Senate Democrats Ask House to Boost SEC Funding
Happy 100th Birthday, IBM!
IBM Mainframe (1980's) on You tube
IBM Mainframe (1980's) on You tube
IBM Mainframe (1980's) on You tube
TEMPO Timing, Tactics and Strategy
Vector processors on the 3090
Vector processors on the 3090
Vector processors on the 3090
pdp8 to PC- have we lost our way?

We list every company in the world that has a mainframe computer

Refed: **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **
From: lynn@GARLIC.COM (Anne & Lynn Wheeler)
Subject: Re: We list every company in the world that has a mainframe computer
Newsgroups: bit.listserv.ibm-main
Date: 6 Jun 2011 14:25:03 -0700
charlesm@MCN.ORG (Charles Mills) writes:
Also is not fiber preferred over copper for secure applications because it does not act as an antenna?

the internal network was larger than the arpanet/internet from just about the beginning until possibly late 85 or early 86. the corporation required encryption on all links leaving corporate premise (use to be all sorts of hassle with gov. agencies when internal network links crossed national boundaries). in the mid-80s, there was claim that internal network had more than half of all link encryptors in the world. misc. past posts mentioning internal network
http://www.garlic.com/~lynn/subnetwork.html#internalnet

also, for the corporate home terminal program there were special "encryping" pc modems produced. there is folklore about one being installed at senior executive home ... and being an old EE, he used his tongue to check for contacts on the RJ telephone jack ... just as it rang. after that there was requirement that all modems made by the corporation had the RJ jack recessed so that babies and senior executives could get their tongue in them.

semi-related to 3737 CTCA channel-extender over T1 (in late 80s) ... recent reference in this thread:
http://www.garlic.com/~lynn/2011g.html#75
also in this a.f.c. thread
http://www.garlic.com/~lynn/2011g.html#77

I had done channel-extender over T1 in 1980 for STL moving 300 people from IMS group to offsite bldg (parts of it channel over campus T3 Collins digial radio ... aka microwave ... that the company had in the area). I had to do real high-speed ... not the SNA spoofing that the communication group did with the 3737 in late 80s. I ran a project I called high-speed data transport (HSDT) to differentiate from what the communication group was up to ... misc. past posts mentioning HSDT
http://www.garlic.com/~lynn/subnetwork.html#hsdt

One of the problems was amount of the money I had to pay for T1 link encryptors ... and very difficult finding any that ran faster than T1 ... so got involved in designing something that would run significantly faster, cost significantly less to build and was significantly more secure. a couple recent posts mentioning then discovering there was three kinds of crypto:
http://www.garlic.com/~lynn/2011g.html#20 TELSTAR satellite experiment
http://www.garlic.com/~lynn/2011g.html#60 Is the magic and romance killed by Windows (and Linux)?

--
virtualization experience starting Jan1968, online at home since Mar1970

History of byte addressing

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: History of byte addressing
Newsgroups: comp.arch
Date: Tue, 07 Jun 2011 07:37:44 -0400
"Andy \"Krazy\" Glew" <andy@SPAM.comp-arch.net> writes:
And I believe that the problems with validating Burroughs' security model were what led Virgil Gligor to make it a requirement that all secure machines for US government use had to have at least kernel/user privilege levels.

The problem with Burroughs' model is that you have to prove the compiler and/or assembler correct.


note that 801/risc started out w/o privilege levels and pl.8 would only generate valid programs and only (cp.r) loader would load pl.8 valid programs.

the early presentations that the various hardware simplifications would be compensated by more sophisticated software. one of the other issues were limited number of shared objects (shared segments were done by 16 registers, 32bit addressing with top four bits selecting one of the 16 segment registers. applications could use a large number of shared objects by having inline code that changed segment register values (as easily as changing general register values).

(801/risc) romp was joint res/opd project running cp.r for a displaywriter followon. when that effort was canceled they looked around for something else to use it for and settleed on the unix workstation market. that required moving to c-language & unix model and retrofitting kernel/user privilege (although was stuck with the 16 segment register design).

misc. old email mentioning 801/risc
http://www.garlic.com/~lynn/lhwemail.html#801

--
virtualization experience starting Jan1968, online at home since Mar1970

WHAT WAS THE PROJECT YOU WERE INVOLVED/PARTICIPATED AT IBM THAT YOU WILL ALWAYS REMEMBER?

Refed: **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 07 Jun, 2011
Subject: WHAT WAS THE PROJECT YOU WERE INVOLVED/PARTICIPATED AT IBM THAT YOU WILL ALWAYS REMEMBER?
Blog: Greater IBM
re:
http://www.garlic.com/~lynn/2011f.html#21 WHAT WAS THE PROJECT YOU WERE INVOLVED/PARTICIPATED AT IBM THAT YOU WILL ALWAYS REMEMBER?
http://www.garlic.com/~lynn/2011g.html#2 WHAT WAS THE PROJECT YOU WERE INVOLVED/PARTICIPATED AT IBM THAT YOU WILL ALWAYS REMEMBER?

I did the first version of CMSBACK that is deployed internally (later morphs into WDSF, ADSM, & now TSM). Co-worker than helps with CMSBACK release 2. The coworker then leaves and does a number of new backup/archive products or releases for other vendors. Then at a VSLI house does lots of enhancements to AT&T 370 C compiler code and ports berkeley chip design tools to mainframe. VLSI house has number of SGI graphic displays and he starts doing mainframe ethernet to interconnect the graphic displays. In the midst of the work, marketing rep stops by and asks him what he is doing; he explains; marketing rep tells him that he should be doing token-ring support instead ... and if he doesn't, the VLSI house may find their mainframe support and maintenance suffering. I almost immediately get a phone call and listen to an hour or two of comments regarding marketing reps, the branch office and the corporation. Next morning, the VLSI house has press release that they are moving off mainframe to SUN servers.

"New" Almaden research bldg. was extensive cat5 for token-ring ... however they quickly find that (twisted-pair) ethernet over cat5 has both higher aggregate bandwidth as well as lower latency than 16mbit T/R.

We come up with 3tier architecture and include comparison that 3tier ethernet not only has much higher bandwith and function than 2tier 16mbit token-ring ... but total cost for 3tier ethernet is less than 2tier 16mbit token ring. It is included in response to large gov. RFI and we were also out pitching to large customer execs (including motorola) ... which brings down the wrath of the token-ring crowd, the SAA crowd, and some number of marketing reps. The Dallas E&S center comes out with a 16mibt T/R comparison to enet ... but as close as I can tell it was based on early 3mbit enet before "listen before transmit" was added (ACM SIGCOMM has paper that tests typical cat5 ethernet and finds that with 30stations in low-level device driver loop constantly transmitting minimum sized packets, effective aggregate transmission drops off to 8.5mbits).

... related item (on 3737) in Old Geeks:
http://lnkd.in/Bwajsy
... it is one thing for customers to choose alternatives to communication groups products ... but it really started to impact the corporation when the customers were motivated to move off mainframe altogether. In the late 80s, a senior disk engineer got a talk scheduled at annual, world-wide, internal communication group conference and opened the talk with the statement that the communication group was going to be responsible for the demise of the disk division (because of the strangle-hold that the communication group had on datacenters).

misc. old CMSBACK email
http://www.garlic.com/~lynn/lhwemail.html#cmsback

misc. past posts mentioning hsdt effort
http://www.garlic.com/~lynn/subnetwork.html#hsdt

misc. past posts doing 3-tier architecture
http://www.garlic.com/~lynn/subnetwork.html#3tier

misc. past posts mentioning terminal emulation and/or stranglehold that the communication group had on datacenters
http://www.garlic.com/~lynn/subnetwork.html#emulation

--
virtualization experience starting Jan1968, online at home since Mar1970

RSA Pawned - Black Queen runs amoc behind US lines of defence

Refed: **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 07 Jun, 2011
Subject: RSA Pawned - Black Queen runs amoc behind US lines of defence
Blog: Financial Cryptography
re:
http://financialcryptography.com/mt/archives/001322.html

before RSA even bought security dynamics ... there were comments that secureid represented a systemic risk (aka various failure scenarios propagate throughout the infrastructure)

a decade ago there were lots of programs to deploy (something you have) smartcards as part of two-factor authentication ... requiring smartcard "readers". In the financial industry there were give-aways of (obsolute) serial-port smartcard readers that ran into enormous problems & support costs ... eventually tanking the programs and prompting rapidly spreading rumor that smartcards weren't practical (it really wasn't a smartcard problem but a serial-port smartcard reader issue). this helped with an upswing in secureid since it only required existing PC display & keyboard.

part of the issue was that only 5-6 years earlier, there were a number of financial industry presentations about moving consumer dial-up online banking to the internet. a major justification was the significant support costs related to supporting serial-port dial-up modems for proprietary dialup banking (moving to the internet effectively transfers all that responsibility to the ISP).

one of the issues was that in the short 5-6 year period ... apparently all the financial industry institutional knowledge regarding serial-port problems & support costs (whether modems or smartcard readers) was lost; ... a major requirement for USB was to eliminate lots of the serial-port issues.

a couple recent posts mentioning serial-port
http://www.garlic.com/~lynn/2011g.html#48 Is the magic and romance killed by Windows (and Linux)?
http://www.garlic.com/~lynn/2011g.html#62 Is the magic and romance killed by Windows (and Linux)?

--
virtualization experience starting Jan1968, online at home since Mar1970

1st round in Internet Account Fraud World Cup: Customer 0, Bank 1, Attacker 300,000

Refed: **, - **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 08 Jun, 2011
Subject: 1st round in Internet Account Fraud World Cup: Customer 0, Bank 1, Attacker 300,000
Blog: Financial Cryptography
re:
http://financialcryptography.com/mt/archives/001323.html

in previous item:
http://financialcryptography.com/mt/archives/001322.html

I mention in 95-96, financial industry conferences with presentations about moving consumer dialup online banking to the internet ... largely motivated by significant customer support costs for proprietary online dialup operation. at the same conferences there were presentations by commercial/cash-management dialup online banking saying that they would NEVER move to the internet because a wide variety of vulnerabilities (many since been seen). A couple yrs ago, feds came out with a recommendation that companies have a dedicated PC for online (internet) banking that is NEVER used for anything else (as partial countermeasure to many of these vulnerabilities).

a couple recent posts mentioning
http://www.garlic.com/~lynn/2011g.html#22 An online bank scam worthy of a spy novel
http://www.garlic.com/~lynn/2011g.html#48 Is the magic and romance killed by Windows (and Linux)?

--
virtualization experience starting Jan1968, online at home since Mar1970

Home prices may drop another 25%, Shiller predicts

Refed: **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 10 Jun, 2011
Subject: Home prices may drop another 25%, Shiller predicts
Blog: Facebook
re:
http://www.northjersey.com/realestate/123577409_Home_prices_may_drop_another_25___Shiller_predicts.html
http://www.dispatch.com/live/content/business/stories/2011/06/10/americans-home-equity-near-record-low.html?sid=101

housing prices were obviously going to drop back to before the bubble started ... which has now happened ... but it looks like overbuilding (and other economic damage done by bubble) may see additional drop.

aka:
"Nationally, home prices are back to their 2002 levels," Standard & Poor's said in a statement accompanying the data.
... snip ...

Being able to pay for triple-A ratings on toxic CDOs fueled the real-estate speculation similar to Brokers' Loans fueling the stock market speculation in the 20s.

There has tended to be focus on institutions rather than individuals. After '29, there were safeguards put in place to prevent a repeat. There has been significant erosion of those safeguards since 1980 allowing the individual pockets of greed and corruption to come together for a massive economic firestorm. Individual motivation was possible $3-5T in profit, fees, and commissions on the estimated $27T in triple-A rated toxic CDO transactions (from the front-end real-estate transactions through to backend warehousing the toxic assets). Critical to the process were institutions warehousing the toxic assets at the far backend. As collapse was going on, there were warehouse custodians buying equivalent amounts of each other's toxic assets to further boost their fees and commissions. With regard to the institutions, in the middle of the past decade there were references around manhatten about musical chair analogy and who would be left standing when the music stops.

During the Madoff congressional hearings, the person that had tried unsuccessfully for a decade to get SEC to do something about Madoff (what few safeguards that were left were pure facade since regulators weren't doing anything) testified that more important than new regulations were transparency and visibility (which wouldn't be dependent on whims of regulators that might or might not be doing anything).

In x9a10 standards group during mid-90s, I was co-author of x9.59 financial standard.
http://www.garlic.com/~lynn/x959.html#x959

One of the participants from NSCC (before merge with DTC for DTCC) asked if I would look at doing something similar for (exchange) trading transactions. After putting quite a bit of work into it ... they suspended the work with comment about side-effect would be significantly improved transparency and visibility (apparently anathema to wallstreet culture).

misc. past posts mentioning NSCC &/or DTCC:
http://www.garlic.com/~lynn/2001n.html#14 Security glossary available
http://www.garlic.com/~lynn/2002e.html#47 Multics_Security
http://www.garlic.com/~lynn/2006q.html#25 garlic.com
http://www.garlic.com/~lynn/2007k.html#41 DEC and news groups
http://www.garlic.com/~lynn/2008p.html#28 Can Smart Cards Reduce Payments Fraud and Identity Theft?
http://www.garlic.com/~lynn/2008p.html#31 FC5 Special Workshop CFP: Emerging trends in Online Banking and Electronic Payments
http://www.garlic.com/~lynn/2008p.html#69 ATM PIN through phone or Internet. Is it secure? Is it allowed by PCI-DSS?, Visa, MC, etc.?
http://www.garlic.com/~lynn/2008s.html#63 Garbage in, garbage out trampled by Moore's law
http://www.garlic.com/~lynn/2009b.html#35 The recently revealed excesses of John Thain, the former CEO of Merrill Lynch, while the firm was receiving $25 Billion in TARP funds makes me sick
http://www.garlic.com/~lynn/2009b.html#65 What can agencies such as the SEC do to insure us that something like Madoff's Ponzi scheme will never happen again?
http://www.garlic.com/~lynn/2009b.html#80 How to defeat new telemarketing tactic
http://www.garlic.com/~lynn/2009c.html#1 Audit II: Two more scary words: Sarbanes-Oxley
http://www.garlic.com/~lynn/2009d.html#47 Bernard Madoff Is Jailed After Pleading Guilty -- are there more "Madoff's" out there?
http://www.garlic.com/~lynn/2009d.html#63 Do bonuses foster unethical conduct?
http://www.garlic.com/~lynn/2009d.html#75 Whistleblowing and reporting fraud
http://www.garlic.com/~lynn/2009e.html#15 The background reasons of Credit Crunch
http://www.garlic.com/~lynn/2009e.html#36 Architectural Diversity
http://www.garlic.com/~lynn/2009e.html#53 Are the "brightest minds in finance" finally onto something?
http://www.garlic.com/~lynn/2009f.html#45 Artificial Intelligence to tackle rogue traders
http://www.garlic.com/~lynn/2009f.html#67 Just posted third article about toxic assets in a series on the current financial crisis
http://www.garlic.com/~lynn/2009g.html#29 Transparency and Visibility
http://www.garlic.com/~lynn/2009i.html#23 Why are z/OS people reluctant to use z/OS UNIX? (Are settlements a good argument for overnight batch COBOL ?)
http://www.garlic.com/~lynn/2009i.html#60 In the USA "financial regulator seeks power to curb excess speculation."
http://www.garlic.com/~lynn/2009p.html#57 MasPar compiler and simulator
http://www.garlic.com/~lynn/2009s.html#47 Audits VII: the future of the Audit is in your hands
http://www.garlic.com/~lynn/2010c.html#33 Happy DEC-10 Day
http://www.garlic.com/~lynn/2010d.html#43 What was old is new again (water chilled)
http://www.garlic.com/~lynn/2010f.html#56 Handling multicore CPUs; what the competition is thinking
http://www.garlic.com/~lynn/2010h.html#54 Trust Facade
http://www.garlic.com/~lynn/2010h.html#69 Idiotic programming style edicts
http://www.garlic.com/~lynn/2010p.html#48 WikiLeaks' Wall Street Bombshell
http://www.garlic.com/~lynn/2010p.html#49 The Great Cyberheist
http://www.garlic.com/~lynn/2010p.html#63 TCM's Moguls documentary series
http://www.garlic.com/~lynn/2010q.html#44 Programmer Charged with thieft (maybe off topic)
http://www.garlic.com/~lynn/2010q.html#53 Programmer Charged with thieft (maybe off topic)
http://www.garlic.com/~lynn/2011d.html#26 The first personal computer (PC)
http://www.garlic.com/~lynn/2011e.html#39 Back to architecture: Analyzing NYSE data
http://www.garlic.com/~lynn/2011e.html#48 On Protectionism

--
virtualization experience starting Jan1968, online at home since Mar1970

Home prices may drop another 25%, Shiller predicts

Refed: **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 10 Jun, 2011
Subject: Home prices may drop another 25%, Shiller predicts
Blog: Facebook
re:
http://www.garlic.com/~lynn/2011h.html#5 Home prices may drop another 25%, Shiller predicts

Early 2009, I was asked to HTML'ize the Pecora hearings (had been scaned the previous fall at Boston Public Library) with extensive cross indexing and HREFs to corresponding things that happened this time (some assumption that the new congress would have appetite to do something about it). After quite a bit of work, I got a call that it wouldn't be needed after all (enormous wallstreet lobbying going on). Pecora hearings looked into crash of '29 and one of the results was Glass-Steagall.

misc. past posts mentioning Pecora:
http://www.garlic.com/~lynn/2009b.html#58 OCR scans of old documents
http://www.garlic.com/~lynn/2009b.html#59 As bonuses...why breed greed, when others are in dire need?
http://www.garlic.com/~lynn/2009d.html#62 Is Wall Street World's Largest Ponzi Scheme where Madoff is Just a Poster Child?
http://www.garlic.com/~lynn/2009d.html#73 Should Glass-Steagall be reinstated?
http://www.garlic.com/~lynn/2009d.html#77 Who first mentioned Credit Crunch?
http://www.garlic.com/~lynn/2009e.html#8 The background reasons of Credit Crunch
http://www.garlic.com/~lynn/2009e.html#23 Should FDIC or the Federal Reserve Bank have the authority to shut down and take over non-bank financial institutions like AIG?
http://www.garlic.com/~lynn/2009e.html#40 Architectural Diversity
http://www.garlic.com/~lynn/2009f.html#56 What's your personal confidence level concerning financial market recovery?
http://www.garlic.com/~lynn/2009f.html#65 Just posted third article about toxic assets in a series on the current financial crisis
http://www.garlic.com/~lynn/2009g.html#5 Do the current Banking Results in the US hide a grim truth?
http://www.garlic.com/~lynn/2009g.html#33 Treating the Web As an Archive
http://www.garlic.com/~lynn/2009h.html#22 China's yuan 'set to usurp US dollar' as world's reserve currency
http://www.garlic.com/~lynn/2009h.html#25 The Paradox of Economic Recovery
http://www.garlic.com/~lynn/2009h.html#29 Analysing risk, especially credit risk in Banks, which was a major reason for the current crisis
http://www.garlic.com/~lynn/2009i.html#40 64 Cores -- IBM is showing a prototype already
http://www.garlic.com/~lynn/2009i.html#57 In the USA "financial regulator seeks power to curb excess speculation."
http://www.garlic.com/~lynn/2009j.html#35 what is mortgage-backed securities?
http://www.garlic.com/~lynn/2009o.html#23 Opinions on the 'Unix Haters' Handbook'
http://www.garlic.com/~lynn/2009p.html#2 Opinions on the 'Unix Haters' Handbook
http://www.garlic.com/~lynn/2009p.html#20 U.K. lags in information security management practices
http://www.garlic.com/~lynn/2009p.html#25 Opinions on the 'Unix Haters' Handbook
http://www.garlic.com/~lynn/2009r.html#53 70 Years of ATM Innovation
http://www.garlic.com/~lynn/2009r.html#73 70 Years of ATM Innovation
http://www.garlic.com/~lynn/2010b.html#6 Bookshelves under BookMangler
http://www.garlic.com/~lynn/2010f.html#54 The 2010 Census
http://www.garlic.com/~lynn/2010h.html#28 Our Pecora Moment
http://www.garlic.com/~lynn/2010h.html#52 Our Pecora Moment
http://www.garlic.com/~lynn/2010h.html#68 Our Pecora Moment
http://www.garlic.com/~lynn/2010h.html#73 Our Pecora Moment
http://www.garlic.com/~lynn/2010l.html#38 Who is Really to Blame for the Financial Crisis?
http://www.garlic.com/~lynn/2010m.html#8 Who is Really to Blame for the Financial Crisis?
http://www.garlic.com/~lynn/2010o.html#59 They always think we don't understand
http://www.garlic.com/~lynn/2010p.html#7 What banking is. (Essential for predicting the end of finance as we know it.)
http://www.garlic.com/~lynn/2010p.html#16 Rare Apple I computer sells for $216,000 in London
http://www.garlic.com/~lynn/2010p.html#59 TCM's Moguls documentary series
http://www.garlic.com/~lynn/2010q.html#16 TCM's Moguls documentary series
http://www.garlic.com/~lynn/2010q.html#53 Programmer Charged with thieft (maybe off topic)
http://www.garlic.com/~lynn/2011.html#49 What do you think about fraud prevention in the governments?
http://www.garlic.com/~lynn/2011.html#84 The Imaginot Line
http://www.garlic.com/~lynn/2011b.html#42 Productivity And Bubbles
http://www.garlic.com/~lynn/2011b.html#43 Productivity And Bubbles
http://www.garlic.com/~lynn/2011b.html#45 Productivity And Bubbles
http://www.garlic.com/~lynn/2011b.html#53 Productivity And Bubbles
http://www.garlic.com/~lynn/2011d.html#27 The first personal computer (PC)
http://www.garlic.com/~lynn/2011e.html#36 On Protectionism

--
virtualization experience starting Jan1968, online at home since Mar1970

Home prices may drop another 25%, Shiller predicts

Refed: **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 10 Jun, 2011
Subject: Home prices may drop another 25%, Shiller predicts
Blog: Facebook
re:
http://www.garlic.com/~lynn/2011h.html#5 Home prices may drop another 25%, Shiller predicts
http://www.garlic.com/~lynn/2011h.html#6 Home prices may drop another 25%, Shiller predicts

Main thing in Glass-Steagall was that it kept safety and soundness of highly regulated depository institutions separate from unregulated risky investment banking. With repeal of Glass-Steagall, recent too-big-to-fail included mixing unregulated investment banking with highly regulated depository institutions (aka four largest too-big-to-fail institutions were carrying $5.2T in triple-A rated toxic CDOs "off-book" at the end of 2008).

On the floor of congress, the rhetoric about the main purpose of GLBA (also repealed Glass-Steagall) was that if you were already a bank, you got to remain a bank ... and if you weren't already a bank, you didn't get to become a bank (specifically calling out walmart and m'soft being excluded).

As part of the bail-out, some of the unregulated risky investment banks were given "bank charters" (which should have been excluded under GLBA) so they could borrow "zero percent money" from the Federal Reserve.

The triple-A rated toxic CDOs were going for 22cents on the dollar and except for some accounting slight-of-hand ... would have been required to be brought back on book; this would have resulted in all four being declared insolvent and required FDIC to dissolve the institutions and liquidate the assets. Instead they were left off-book while Federal Reserve (quietly) began buying trillions at 98cents on the dollar (it required over a year of legal action to get the FED to release some of the details)

past posts mentioning $5.2T in off-book toxic assets:
http://www.garlic.com/~lynn/2009e.html#23 Should FDIC or the Federal Reserve Bank have the authority to shut down and take over non-bank financial institutions like AIG?
http://www.garlic.com/~lynn/2009e.html#36 Architectural Diversity
http://www.garlic.com/~lynn/2009e.html#40 Architectural Diversity
http://www.garlic.com/~lynn/2009e.html#53 Are the "brightest minds in finance" finally onto something?
http://www.garlic.com/~lynn/2009e.html#70 When did "client server" become part of the language?
http://www.garlic.com/~lynn/2009e.html#79 Are the "brightest minds in finance" finally onto something?
http://www.garlic.com/~lynn/2009f.html#31 What is the real basis for business mess we are facing today?
http://www.garlic.com/~lynn/2009f.html#38 On whom or what would you place the blame for the sub-prime crisis?
http://www.garlic.com/~lynn/2009f.html#47 TARP Disbursements Through April 10th
http://www.garlic.com/~lynn/2009f.html#49 Is the current downturn cyclic or systemic?
http://www.garlic.com/~lynn/2009g.html#3 Do the current Banking Results in the US hide a grim truth?
http://www.garlic.com/~lynn/2009h.html#79 The $4 trillion housing headache
http://www.garlic.com/~lynn/2009i.html#60 In the USA "financial regulator seeks power to curb excess speculation."
http://www.garlic.com/~lynn/2009i.html#77 Financial Regulatory Reform - elimination of loophole allowing special purpose institutions outside Bank Holding Company (BHC) oversigh
http://www.garlic.com/~lynn/2009j.html#35 what is mortgage-backed securities?
http://www.garlic.com/~lynn/2009j.html#69 64 Cores -- IBM is showing a prototype already
http://www.garlic.com/~lynn/2009n.html#62 Opinions on the 'Unix Haters' Handbook'
http://www.garlic.com/~lynn/2009p.html#23 Opinions on the 'Unix Haters' Handbook
http://www.garlic.com/~lynn/2010e.html#74 LPARs: More or Less?
http://www.garlic.com/~lynn/2010f.html#54 The 2010 Census
http://www.garlic.com/~lynn/2010h.html#15 The Revolving Door and S.E.C. Enforcement
http://www.garlic.com/~lynn/2010h.html#22 In the News: SEC storms the 'Castle'
http://www.garlic.com/~lynn/2010l.html#40 Who is Really to Blame for the Financial Crisis?
http://www.garlic.com/~lynn/2010n.html#29 Idiotic programming style edicts
http://www.garlic.com/~lynn/2010n.html#33 Idiotic programming style edicts
http://www.garlic.com/~lynn/2010n.html#40 Idiotic programming style edicts
http://www.garlic.com/~lynn/2010p.html#17 What banking is. (Essential for predicting the end of finance as we know it.)
http://www.garlic.com/~lynn/2010p.html#63 TCM's Moguls documentary series
http://www.garlic.com/~lynn/2010q.html#58 Programmer Charged with thieft (maybe off topic)
http://www.garlic.com/~lynn/2011.html#50 What do you think about fraud prevention in the governments?
http://www.garlic.com/~lynn/2011.html#84 The Imaginot Line
http://www.garlic.com/~lynn/2011.html#94 The Curly Factor -- Prologue
http://www.garlic.com/~lynn/2011b.html#27 The Zippo Lighter theory of the financial crisis (or, who do we want to blame?)
http://www.garlic.com/~lynn/2011b.html#42 Productivity And Bubbles
http://www.garlic.com/~lynn/2011b.html#45 Productivity And Bubbles
http://www.garlic.com/~lynn/2011b.html#56 Productivity And Bubbles
http://www.garlic.com/~lynn/2011c.html#46 If IBM Hadn't Bet the Company
http://www.garlic.com/~lynn/2011d.html#23 The first personal computer (PC)
http://www.garlic.com/~lynn/2011d.html#25 The first personal computer (PC)
http://www.garlic.com/~lynn/2011d.html#28 The first personal computer (PC)
http://www.garlic.com/~lynn/2011e.html#36 On Protectionism
http://www.garlic.com/~lynn/2011e.html#41 On Protectionism
http://www.garlic.com/~lynn/2011g.html#71 Pressing Obama, House Bars Rise for Debt Ceiling

--
virtualization experience starting Jan1968, online at home since Mar1970

At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened

Refed: **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 10 Jun, 2011
Subject: At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened.
Blog: Mainframe Experts
as per upthread comment ... the difficulty of accessing the mainframe was why the disk division was claiming that the communication group was going to be responsible for the demise of the disk division ... late 80s; the disk division had attempted to bring out a number of products to correct the situation, but since the communication group "owned" strategy for everything that crossed the walls of the datacenter ... all efforts were blocked. The disk division saw the leading edge of "fleeing the mainframe" starting in the late 80s because of the stranglehold that the communication group had on the datacenter (data was fleeing to more distributed computing friendly platforms). After a couple of decades of such activity ... there remains a few things that aren't (yet) cost effective to move.
http://www.garlic.com/~lynn/subnetwork.html#emulation

earlier my wife had been con'ed into going to POK to be in charge of loosely-coupled architecture. one of the things that contributed to her not remaining long was battles with the communication group (there would be temporary truces that she could do whatever she wanted within the walls of the datacenter ... but communication group "owned" everything that crossed the walls of the datacenter).
http://www.garlic.com/~lynn/submain.html#shareddata

related recent item in (linkedin) "Old Geeks":
http://lnkd.in/Bwajsy

As mentioned upthread, in the 90s ... it appeared like the mainstay mainframe bastions were about to fall ... the financial market. The financial market was spending billions on re-engineering mainframe application to be re-hosted on large clusters of "killer-micros" (sort of leading edge of cloud computing megadatacenter complexes). This was frequently motivated by thruput constraints of the overnight batch window. As it turned out they were using parallelizing technology that looked good in toy pilots by failed to scale ... introducing factor of 100 times overhead (of batch cobol) ... which totally swamped anticipated thruput improvements of large number of killer micros.

The resulting failures left deep scars in the industry. A few years ago, approaching some number of the players with parallelizing technology that was more like 3-5 times overhead of batch cobol ... there was enormous risk adverse reaction (left over from the failures in the 90s).

past posts in thread:
http://www.garlic.com/~lynn/2011e.html#15 At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened
http://www.garlic.com/~lynn/2011e.html#16 At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened
http://www.garlic.com/~lynn/2011e.html#17 At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened
http://www.garlic.com/~lynn/2011e.html#19 At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened
http://www.garlic.com/~lynn/2011f.html#32 At least two decades back, some gurus predicted that mainframes would disappear
http://www.garlic.com/~lynn/2011f.html#33 At least two decades back, some gurus predicted that mainframes would disappear
http://www.garlic.com/~lynn/2011f.html#35 At least two decades back, some gurus predicted that mainframes would disappear
http://www.garlic.com/~lynn/2011f.html#37 At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened
http://www.garlic.com/~lynn/2011f.html#39 At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened
http://www.garlic.com/~lynn/2011f.html#42 At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened
http://www.garlic.com/~lynn/2011f.html#45 At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened
http://www.garlic.com/~lynn/2011f.html#46 At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened
http://www.garlic.com/~lynn/2011f.html#54 At least two decades back, some gurus predicted that mainframes would disappear

--
virtualization experience starting Jan1968, online at home since Mar1970

Breaches and Consumer Backlash

Refed: **, - **, - **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 11 Jun, 2011
Subject: Breaches and Consumer Backlash
Blog: Financial Crime Risk, Fraud and Security
Breaches and Consumer Backlash
http://blogs.bankinfosecurity.com/posts.php?postID=971&rf=2011-06-11-eb

In the mid-90s, I was involved in X9A10 financial standard working group and co-author of x9.59 financial transaction standard. X9.59 didn't do anything to directly address breaches ... it just eliminated the ability of crooks to use the information from breaches for performing fraudulent financial transactions.
http://www.garlic.com/~lynn/x959.html#x959

In the late 90s, I was tangentially involved in the cal. state data breach legislation. We were brought in to help wordsmith the cal. state electronic signature legislation and several of the parties were involved in privacy issues. They had done in-depth consumer/citizen privacy surveys and the number one issue was "identify theft" ... the primary kind was "account theft" as a result of breaches. Little or nothing was being done about such breaches (the institutions had nothing at risk, it was just their customers). It appeared that there was some hope that the resulting publicity from breach notifications might motivate institutions to take some corrective action with regard to breaches.
http://www.garlic.com/~lynn/subpubkey.html#signature

misc. posts related to account harvested (from breaches, skimming, evesdropping, etc):
http://www.garlic.com/~lynn/subintegrity.html#harvest

note: in decade+ since the cal. state data breach notification legislation, a number of other states have also passed similar legislation. At the federal level there have been two classes of "breach notification" bills ... 1) basically similar to the cal. state requirements and 2) "breach notification" federal preemption that basically eliminated most requirements for breach notification.

incidentally, at the same time as the cal. state data breach notification, the same parties were also working on "opt-in" privacy sharing legislation (user had to authorize institutions to share information). Then GLBA added federal pre-emption "out-out" privacy sharing provision (user had to complain to prevent institutions sharing information). as an aside, in the middle of the last decade, there was an annual privacy conference in wash dc that included panel discussion with the FTC commissioners. During the session, somebody from the audience got up and asked the commissioners if they were ever going to do anything about "opt-out". His claim was he was associated with large call-center operations and "knew" that the major institutions provided people answering 1-800 "opt-out" lines with no facilities to record any information from the call (no record of any opt-out request).

Further topic drift ... GLBA was also responsible for repeal of Glass-Steagall which played significant role in the recent economic mess. However, the rhetoric on the floor of congress was that the main purpose of GLBA was that if you were already a bank, you got to remain a bank; however if you weren't already a bank, you didn't get to become a bank (aka chartered depository institution).

--
virtualization experience starting Jan1968, online at home since Mar1970

Home prices may drop another 25%, Shiller predicts

Refed: **, - **, - **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 11 Jun, 2011
Subject: Home prices may drop another 25%, Shiller predicts
Blog: Facebook
re:
http://www.garlic.com/~lynn/2011h.html#5 Home prices may drop another 25%, Shiller predicts
http://www.garlic.com/~lynn/2011h.html#6 Home prices may drop another 25%, Shiller predicts
http://www.garlic.com/~lynn/2011h.html#7 Home prices may drop another 25%, Shiller predicts

aka Glass-Steagall was specifically allowing risky investment banking to be unregulated (and allowed to fail) ... it just kept it strictly separate from safety&soundness of regulated depository operations; repeal of Glass-Steagall opened the door to risky investment banking to pollute depository institutions (and too-big-to-fail gov. support for risk taking). The recent economic firestorm had enormous individual compensation with the likelyhood they could walk away free with millions (in some cases billions) regardless of what they did to their institutions, the economy, society, and/or country

--
virtualization experience starting Jan1968, online at home since Mar1970

History of byte addressing

Refed: **, - **, - **, - **, - **
From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: History of byte addressing
Newsgroups: comp.arch
Date: Sat, 11 Jun 2011 15:05:53 -0400
Stephen Fuld <SFuld@alumni.cmu.edu.invalid> writes:
While you know far more about this than I do, and you may very well be right about what the government did, that seems too simplistic. A minimal kernel/user privilege just prevents user mode programs from executing certain instructions. That is, it does not assure memory protection. For example, IBM's CICS (its major transaction system for S/370 and successors) had for a long time (and may still have) the "feature" that both the CICS monitor and all user written transactions were in a single address space. Thus a user written transaction program with a subscript gone awry could over write another user program, or even the CICS monitor. So for reasonable security, you need more than just user/kernel mode protection.

when undergraduate at univ., the univ. library got a ONR grant to do online catalog; part of the money went to get a 2321 (data cell). the effort was also selected to be betatest for original CICS product ... and I got tasked to support/debug CICS in the effort ... some past posts
http://www.garlic.com/~lynn/submain.html#cics

CICS had originally been developed at customer account ... and then went through some amount of effort to productize it. ordinary OS/360 was real memory (single address space) with enormous overhead related to scheduling, task switch, file open/close ... just about every systeme function. CICS (as did quite a few other "online" environments for os/360) would go thru all the high-overhead operations at startup ... and then appear like a continuously running, single large task to os/360 ... while implementing a lot of fine-grain light-weight monitor functions internally.

Note that 360 in addition to single (real) address space did provide 2k granularity fetch&storage protection. Besides the problem/supervisor state flag in the PSW ... each 2k storage block could have a 4bit "protect" key (for store protect as standard, 360 had optional "fetch protect" feature ... which could provide fetch protect in addition to store-protect). The PSW (changing was a supervisor/privilege operation) would have 4 bit key ... which needed to match the 2kblock 4bit key for storage operation to succeed (PSW key 0 allowed privilege bypass store/fetch protect). This was mainly used to protect os/360 from applications and keep applications separated (allowing up to 15 concurrent applications). However, since CICS appeared as single large application, there wasn't any use of intra-CICS key protect.

However, CICS applications tended to be very small and light-weight and underwent extensive testing and review before being allowed to run in production environment. CICS was one of the multithreaded application environments that could leverage the compare&swap instruction ... recently mentioned:
http://www.garlic.com/~lynn/2011g.html#79 alignment, was History of byte addressing
other posts mentioning compare&swap and/or smp
http://www.garlic.com/~lynn/subtopic.html#smp

while 370 introduced virtual memory, the single address space heritage and pointer-passing API was so deeply ingrained that the MVS operating system (separate address space for every application) continued to have an image of the operating system occupying every virtual address space (which also perpetuated the need for the storage key protection). Also from OS/360 heritage there were some number of "subsystem" services that resided outside the kernel proper. In the transition to MVS, these subsystems were moved into their individual private address space (also having an image of the kernel proper). This created major problem with "normal" applications making a subsystem call using pointer-passing API (since they now occupied different address spaces). The solution was something called the "common segment" ... an image which appeared in every address space (akin to kernel image in every address space) ... however the size of the common segment needed to be somewhat proportional to the number of subsystems and the number of concurrent applications using those subsystems. Towards the end of the 370 period (while still 24bit addressing and before 31bit addressing) ... each application 16mbyte virtual address space would have an 8mbyte image of the kernel and for large installations, common segments that ran 4-5mbytes (threatening to grow to 5-6mbytes); aka some installations were being faced with limiting application size (including things like total CICS) to 2mbytes.

The follow-on architecture would have "access registers" & program call ... basically an infrastructure of MVS "system tables" which support application pointer-passing API call directly to a subsysetm function in another virtual address space. The tables would allow hardware to swap virtual address space pointers (... nearly identical to call to library function in the same address space). The subsystem would have secondary address space pointer back to calling application to directly access parameters (from the pointer passing API), return results in the application address space and do a (hardware) program return (restoring caller's address space).

The CICS workaround to address space limitation and lack of system multi-threading (i.e. purely internal multi-threading but appearing as single large task to the system) ... so only ran as a single process on a single processor ... installations would run multiple concurrent CICS "regions". In the early part of this century, it wasn't unusual to find some large installations with over 100 concurrently running CICS regions (in independent virtual address space, each doing their own independent multithreaded support).

CICS system level multithreading operation didn't appear until 2004 (i.e. single CICS address space running threads concurrently on multiple processors). Major CICS history site has gone 404 ... but lives on at the wayback machine
http://web.archive.org/web/20050409124902/www.yelavich.com/cicshist.htm

The Evolution of CICS: CICS and Multiprocessor Exploitation (2004)
http://web.archive.org/web/20041023110006/http://www.yelavich.com/history/ev200402.htm

from above:
CICS chose to provide for a multi-tasking environment under a single Task Control Block (TCB) using its own dispatcher (Task Control Program) rather than attempt to multi-task concurrent transaction processing using operating system subtasks. Not only was the overhead of operating system subtasking considered excessive, but having concurrently dispatched applications would have required programs to be reentrant and serialize their use of shared resources. That was felt to be too complicated at the time.
... snip ...

--
virtualization experience starting Jan1968, online at home since Mar1970

The IBM Selective Sequence Electronic Calculator

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: The IBM Selective Sequence Electronic Calculator
Newsgroups: alt.folklore.computers
Date: Sun, 12 Jun 2011 09:30:12 -0400
Niklas Karlsson <anksil@yahoo.se> writes:
chmod u=rw,g=r,o=r xxx

also chmod a=r,u+w xxx

--
virtualization experience starting Jan1968, online at home since Mar1970

IBM doc numbering question

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: IBM doc numbering question
Newsgroups: bit.listserv.ibm-main
Date: Sun, 12 Jun 2011 10:20:56 -0400
Peter.Farley@BROADRIDGE.COM (Farley, Peter x23353) writes:
Not sure about the 121 prefix, but ISTR that "S" in front of a manual number usually meant "for sale by IBM", i.e., they didn't give it to you free for the asking, you had to pay them to get a copy. "G" as the initial letter was for the "free" documentation and later "L" was for "Licensed" documentation which you could not get unless you licensed the software that was documented by that manual, plus you also had to pay for it (I think). I don't remember when the "A" letter prefix came into use, and I'm not entirely sure of its meaning, if it has one.

701 (from bitsavers), no letter prefix
http://www.bitsavers.org/pdf/ibm/701/
709 (from bitsavers), no letter prefix
http://www.bitsavers.org/pdf/ibm/709/
7090 "A", "C", "G", & "GC"
http://www.bitsavers.org/pdf/ibm/7090/
7094 "A", "GA", "S" prefix
http://www.bitsavers.org/pdf/ibm/7094/

misc. 360 (from bitsavers)

lots of functional characteristics start out as "A" ... and later become "GA"
http://www.bitsavers.org/pdf/ibm/360/funcChar/
principle of ops also "A"
http://www.bitsavers.org/pdf/ibm/360/princOps/

also other "A" here (& later "GA")
http://www.bitsavers.org/pdf/ibm/360/

PLMs "Y"
http://www.bitsavers.org/pdf/ibm/360/asm/
& also "Z"
http://www.bitsavers.org/pdf/ibm/360/bos_bps/
and later "GY"
http://www.bitsavers.org/pdf/ibm/360/cms/

FE has "SY", "Y', and "Z"
http://www.bitsavers.org/pdf/ibm/360/fe/

PLI with "C", "GC", "H", "Y" and GY"
http://www.bitsavers.org/pdf/ibm/360/pli/

all "A"
http://www.bitsavers.org/pdf/ibm/360/configurator/

TSS "C", then "GC", "GX", "GY"
http://www.bitsavers.org/pdf/ibm/360/tss/

misc. 370 (from bitsavers)

"GA" & "SA"
http://www.bitsavers.org/pdf/ibm/370/

some "GC", but mostly "SC":
http://www.bitsavers.org/pdf/ibm/370/VM_SP/
"GC" & "SC"
http://www.bitsavers.org/pdf/ibm/370/asm/

functional characteristics "GA" & "GN"
http://www.bitsavers.org/pdf/ibm/370/funcChar/

princops "GA"
http://www.bitsavers.org/pdf/ibm/370/princOps/

HASP "GC" & "GY"
http://www.bitsavers.org/pdf/ibm/370/hasp/

PLI "GC", "SC", and "LY"
http://www.bitsavers.org/pdf/ibm/370/pli/

VS2 "GC"
http://www.bitsavers.org/pdf/ibm/370/OS_VS2/

VM370 "GC" & "SY"
http://www.bitsavers.org/pdf/ibm/370/vm370/

--
virtualization experience starting Jan1968, online at home since Mar1970

Is the magic and romance killed by Windows (and Linux)?

Refed: **, - **, - **, - **
From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Is the magic and romance killed by Windows (and Linux)?
Newsgroups: alt.folklore.computers
Date: Sun, 12 Jun 2011 15:42:36 -0400
despen writes:
If there's a gain in the microcode by pack and unpk, ap/sp and mp/dp being the same except for one bit, it would probably be a more recent development. The original 360 wasn't micro coded as far as I know.

all 360 were microcoded ... it helped account for being able to select on front panel between 360 microcode and 1401 (low/mid-range) or 7090 (higher end) microcode ("hardware emulation")

low&mid-range also tended to have "integrated" channels (microcode) ... while higher end processors had dedicated external I/O channels

--
virtualization experience starting Jan1968, online at home since Mar1970

Is the magic and romance killed by Windows (and Linux)?

Refed: **, - **, - **, - **, - **
From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Is the magic and romance killed by Windows (and Linux)?
Newsgroups: alt.folklore.computers
Date: Sun, 12 Jun 2011 18:32:52 -0400
despen writes:
I just reviewed functional characteristics for 360/30 and 360/40. No mention of a panel switch for emulation. I think the emulation instructions were just there.

re:
http://www.garlic.com/~lynn/2011h.html#14 Is the magic and romance killed by Windows (and Linux)?

my first programming job was undergraduate at the univ. porting 1401 MPIO to 360/30; i got to design & build my own monitor, interrupt handleres, device drivers, storage management, error recovery, etc.

1401 MPIO could have continued to run on 360/30 in 1401 hardware emulation ... but apparently it was part of getting ready for transition from 709/1401 combo to 360/67. Before i started, the 1401 had been swapped with 360/30 and 360/30 was spending most of its time in straight 1401 emulation (i.e. 1401 MPIO handled tape->printer/punch and reader-> tape for front-end to 709; tapes were manually moved between tape drives and the 709 ran ibsys monitor tape->tape). I eventually had assembler program that was approx. 2000 cards (still fit in box of cards).

I did two different versions with assembler conditional statements, one ran under os/360 and the other would run "stand-alone" (using BPS "loader" to get it running). The "stand-alone" version took about 25 minutes elapsed time to assembler (under os/360 on 360/30) and the version that ran under os/360 took approx. an hour to assemble. The main difference was the "os/360" version used system services, open/close and DCB macro. It was possible to recognize when the assembler was processing DCB macro by the patterns of lights on front of 360/30 ... each DCB taking 5-6 minutes elapsed time. Being able to do concurrent tape->printer/punch and reader->tape required two tape DCBs and three unit record DCBs (reader, printer & punch).

there is reference here to 1401 emulation in 360/30:
http://www.bitsavers.org/1401/1401-docs.html

past post here on the subject:
http://www.mail-archive.com/ibmvm@listserv.uark.edu/msg24371.html
also archived here
http://www.garlic.com/~lynn/2009h.html#52 IBM 1401

above references:

360/30 functional characteristics has reference to 1401/1440/1460 compatibiilty feature (GA24-3255)
http://www.bitsavers.org/pdf/ibm/360/funcChar/GA24-3231-7_360-30_funcChar.pdf

there is also reference here:
http://mail.computerhistory.org/pipermail/1401_team/2006q1/000062.html

and:
http://www.bitsavers.org/pdf/ibm/360/1401_emulator/A24-3255-1_Model30_1401_Compatibility_Apr64.pdf

page 7 says mode switch was done by "capatibility deck" ... possibly 3card loader with a few instructions ... most likely done by executing some form of (supervisor state) diagnose instruction (opcode "83") ... which was frequently used to access non-traditional 360 parts of microcode.

don't know why I remembered it as switch on front panel

--
virtualization experience starting Jan1968, online at home since Mar1970

Is the magic and romance killed by Windows (and Linux)?

Refed: **, - **, - **, - **
From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Is the magic and romance killed by Windows (and Linux)?
Newsgroups: alt.folklore.computers
Date: Sun, 12 Jun 2011 20:24:45 -0400
despen writes:
Nope, not a 3 card loader, it was the entire emulator in card deck form. This is really stretching the memory, but I'm pretty sure about 8 inches of cards. Once loaded, you could run any number of 14xx jobs.

Again stretching the memory, but I believe there was an instruction something like execute 14xx instruction at address. Most instructions were handled that way, but not all of them.


re:
http://www.garlic.com/~lynn/2011h.html#14 Is the magic and romance killed by Windows (and Linux)?
http://www.garlic.com/~lynn/2011h.html#15 Is the magic and romance killed by Windows (and Linux)?

univ. would shutdown the datacenter at 8am sat and re-open 8am monday ... i could have the machine room to myself most weekends for 48hrs straight (made it hard going to monday classes).

later when the 709 & 360/30 was replaced with 360/67 ... for running tss/360 ... but with all the tss/360 troubles spent nearly all the time running as 360/65 with os/360. I was hired to support os/360 ... and at least initially, the datacenter continued to shutdown over the weekend and I would have the machine all weekend (and monday classes continued to be something of problem after having been going 48hr straight).

bitsavers 1401 emulator/simulator directory
http://www.bitsavers.org/pdf/ibm/360/1401_emulator/

lots of discussion about running 1401 emulation within dos operating system environment ... rather than "stand-alone"
http://www.bitsavers.org/pdf/ibm/360/1401_emulator/GC27-6940-4_360_1401emul.pdf

from above:
When the Diagnose instruction is used to enable or disable the special compatibility instructions, the displacement contains the hexadecimal address 3CC. Bits 16-19 (B2.) must be zero. When the 12 byte of the Diagnose instruction is 80, special 1400 compatibility instructions are allowed to function. When the 12 byte is 00, these special instructions are disabled and cause a program interruption if used. It should be noted that the Diagnose instruction is a privileged operation.
... snip ...

Possibly the 360 1401 software was also available in bootable card deck format ... but such software would require 360 memory in addition to memory required for 1401 program.

however ... stand-alone
http://www.bitsavers.org/pdf/ibm/360/1401_emulator/A24-3255-1_Model30_1401_Compatibility_Apr64.pdf

also from pg. 7 (aka effectively all of 360/30 memory becoming 1401 memory ... no non-1401, 360 software, aka the 360/30 instructions would set options and switch to 1401 mode, and then would be overlayed):
An 8,192-byte System/360, Model 30, can accommodate a 1401 object program requiring up to 8,000 positions of core storage. A 16,384-byte System/ 360, Model 30, can accommodate a 1401 program requiring up to 16,000 positions of core storage. System/360 core storage above 16,000 positions is not available to the system when it is being operated in the 1401 compatibility mode.
... snip ...

there is also mapping of 360 byte bits to 1401. 1401 compatibility mode (with no 360 storage) would be different from 360 programs executing 1401 programs (with some microcode assists).

the mode-switch deck does mention that some of the cards specify mapping 360/30 to 1401 features:
INITIALIZATION

A specially produced initialization deck accompanies the System/360, Model 30, equipped with the 1401 compatibility feature. This deck is used each time the system is used in 1401 compatibility mode. It is normally reproduced several times and placed in front of any 1401 program to be run on the system. Examples of setup information entered by initialization control cards include: status of the check-stop-switch function, tape densities, and I/O unit-selection numbering.

MODE SMTCHING

Mode status (System/360, Model 30, mode or 1401 compatibility mode) is set during the read-in of the compatibility initialization deck.

... snip ...

the computerhistory reference:
http://mail.computerhistory.org/pipermail/1401_team/2006q1/000062.html

makes mention that first gate contain the 360 integer instruction set microcode and the 2nd gate could have a number of things, inlcuding emulation microcode.

--
virtualization experience starting Jan1968, online at home since Mar1970

Is the magic and romance killed by Windows (and Linux)?

Refed: **, - **, - **, - **, - **
From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Is the magic and romance killed by Windows (and Linux)?
Newsgroups: alt.folklore.computers
Date: Sun, 12 Jun 2011 21:03:24 -0400
Anne & Lynn Wheeler <lynn@garlic.com> writes:
univ. would shutdown the datacenter at 8am sat and re-open 8am monday ... i could have the machine room to myself most weekends for 48hrs straight (made it hard going to monday classes).

later when the 709 & 360/30 was replaced with 360/67 ... for running tss/360 ... but with all the tss/360 troubles spent nearly all the time running as 360/65 with os/360. I was hired to support os/360 ... and at least initially, the datacenter continued to shutdown over the weekend and I would have the machine all weekend (and monday classes continued to be something of problem after having been going 48hr straight).


re:
http://www.garlic.com/~lynn/2011h.html#14 Is the magic and romance killed by Windows (and Linux)?
http://www.garlic.com/~lynn/2011h.html#15 Is the magic and romance killed by Windows (and Linux)?
http://www.garlic.com/~lynn/2011h.html#16 Is the magic and romance killed by Windows (and Linux)?

for os/360 support on 360/67(65) ... i started doing sysgens with os/360 release 9.5 and doing highly modified stage2 ... in order to carefully layout files and pds members to optimize disk arm seek. later jan68, three people came out from science center to install cp/67 ... which i primarily would play with during weekend.

old post with part of presentation made at share fall '68
http://www.garlic.com/~lynn/94.html#18 CP/67 & OS MFT14
http://www.garlic.com/~lynn/94.html#20 CP/67 & OS MFT14

careful disk ordering resulted in nearly 3times improvement in typical univ. student job thruput ... w/HASP but before WATFOR; WATFOR finally resulted in student job thruput getting back down to 709 ibsys tape->tape thruput.

couple recent posts mentioning watfor & stage2 sysgen work
http://www.garlic.com/~lynn/2011g.html#44 My first mainframe experience
http://www.garlic.com/~lynn/2011g.html#50 My first mainframe experience

a couple other recent posts mentioning stage2 sysgen work:
http://www.garlic.com/~lynn/2011.html#47 CKD DASD
http://www.garlic.com/~lynn/2011b.html#37 1971PerformanceStudies - Typical OS/MFT 40/50/65s analysed

misc. past posts mentioning science center
http://www.garlic.com/~lynn/subtopic.html#545tech

--
virtualization experience starting Jan1968, online at home since Mar1970

Is the magic and romance killed by Windows (and Linux)?

Refed: **, - **, - **
From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Is the magic and romance killed by Windows (and Linux)?
Newsgroups: alt.folklore.computers
Date: Mon, 13 Jun 2011 10:37:47 -0400
despen writes:
Ah, I was thinking of the compatibility instructions that get enabled by diagnose. But something else is missing. The instruction I remember wasn't privileged.

I do have a closet full of interesting things I wrote from way back but I loath to dig into it...


re:
http://www.garlic.com/~lynn/2011h.html#14 Is the magic and romance killed by Windows (and Linux)?
http://www.garlic.com/~lynn/2011h.html#15 Is the magic and romance killed by Windows (and Linux)?
http://www.garlic.com/~lynn/2011h.html#16 Is the magic and romance killed by Windows (and Linux)?
http://www.garlic.com/~lynn/2011h.html#17 Is the magic and romance killed by Windows (and Linux)?

1401 running in DOS on 360/30 & 360/40
http://www.bitsavers.org/pdf/ibm/360/1401_emulator/GC27-6940-4_360_1401emul.pdf

pg. 64 ... appendix b, lists diagnose instruction for enabling and then "six special 360 instructions" ... all with opcode 99.

'83' diagnose instruction tended to use other fields to select the actual operation invoked (principles-of-operation defined diagnose instruction operation as "model dependent"). the '99' op-code used the first four bits following the op-code as sub-op-code selection field (analogous to the 'b2' opcode with sub-op-code field introduced with 370). I've done q&d conversion of old green card ios3270 to html
http://www.garlic.com/~lynn/gcard.html
this has two-byte op-code instructions (included "B2xx"):
http://www.garlic.com/~lynn/gcard.html#11.5

the documentation for switch to full 1401 mode ... doesn't mention what exactly the "special deck" did ... but it is most likely some flavor of diagnose instruction (since that has been the standard mechanism for nearly all special microcode).

diagnose instruction in more recent principles-of-operation
http://publibz.boulder.ibm.com/cgi-bin/bookmgr_OS390/BOOKS/dz9zr003/10.5?DT=20040504121320

I referenced this '68 Share presentation which covers some of the thruput improvements for OS/360 MFT14 and also a whole slew of changes I had done for cp67 (this presentation was mostly pathlenth changes done between jan68 and summer of 68).
http://www.garlic.com/~lynn/94.html#18 CP/67 & OS MFT14
http://www.garlic.com/~lynn/94.html#20 CP/67 & OS MFT14

for CMS, I did a special CCW used with standard SIO. CMS file/disk I/O was effectively serialized ... always did seek/search/read-or-write/ and waited for operations to complete. Doing SIO simulation, scanning channel program and building "shadow", followed by LPSW simulation to enter wait state & subsequent I/O interrupt simulation.

I defined a single CCW for disk SIO that had all the seek/search/read-or-write parameters and was defined to complete with CC=1,csw-stored ... when I/O was completed. Drastically reduced the virtual machine simulation overhead. People at the science center (primarily Bob Adair) chided me for violating 360 principles-of-operation (with arbitrary invention of new CCW). Instead they said that all specialized cp/67 processing had to be done via diagnose instruction ... with something of a fiction that virtual machine was a 360 "model" ... for purposes of defining multiple new defintions of diagnose instruction operation. For cp/67 operation, the diagnose "displacement" field was defined as selecting the specific virtual machine function. Diagnose (disk/file) I/O became "18" ... with effectively the same semantics that I had used for SIO/CCW with cc=1/csw-stored.

z/vm definition for (virtual machine) diagnose
http://publib.boulder.ibm.com/infocenter/zvm/v5r3/topic/com.ibm.zvm.v53.hcpb4/hcse5b21.htm

still has support for diagnose '18' (dating back to cp67):
http://publib.boulder.ibm.com/infocenter/zvm/v5r3/topic/com.ibm.zvm.v53.hcpb4/hcse5b2146.htm#wq108

misc. past posts mentioning science center
http://www.garlic.com/~lynn/subtopic.html#545tech

--
virtualization experience starting Jan1968, online at home since Mar1970

When is performance really an issue? Was: Running an ISPF applicction from one pds

Refed: **, - **, - **
From: lynn@GARLIC.COM (Anne & Lynn Wheeler)
Subject: Re: When is performance really an issue? Was: Running an ISPF applicction from one pds
Newsgroups: bit.listserv.ibm-main
Date: 13 Jun 2011 13:03:04 -0700
BillF@MAINSTAR.COM (Bill Fairchild) writes:
So what is the "exact" location, velocity, and/or mass of one particular electron?

well ... they did manage to recently report that the shape is spherical

Electron is surprisingly spherical, say scientists following 10-year study
http://www.sciencedaily.com/releases/2011/05/110525131707.htm

--
virtualization experience starting Jan1968, online at home since Mar1970

When is performance really an issue? Was: Running an ISPF applicction from one pds

Refed: **, - **, - **, - **
From: lynn@GARLIC.COM (Anne & Lynn Wheeler)
Subject: Re: When is performance really an issue? Was: Running an ISPF applicction from one pds
Newsgroups: bit.listserv.ibm-main
Date: 13 Jun 2011 15:47:37 -0700
scott.rowe@JOANN.COM (Scott Rowe) writes:
If it bothers you that much you are going to have to go back to running on older (slower) hardware. It is just not possible without throwing out all the innovative features that allow current processors to run at the speeds they do. If you think it's bad now, it will get a lot worse if/when IBM introduces SMT in mainframe CPUs.

there was project to do threading for 370/195 (that never shipped).

195 had pipeline and peaked around 10MIPs for carefully crafted code. However, branches stalled the pipeline (modulo special case looping within pipeline); no speculative execution, etc. ... so most codes ran about 5mips (still slightly faster than 3033, which was about 1.5 times 168-3 or 4.5mips).

the effort was to duplicate psw and registers to simulate 2-way multiprocessor w/o actually replicating any other hardware (instructions in pipeline would have one bit flag to identify which instruction stream instruction/regs/etc belonged to) ... two 5mip instruction streams utlizing peak 10mips with only modest additional hardware

have to settle for 360/195 functional characteristics from bitsavers (very similar to 370/195)
http://www.bitsavers.org/pdf/ibm/360/funcChar/A22-6943-0_360-195_funChar.pdf

3081d was supposedly approx. 5mips ... but for some things it ran 20% slower than 3033. 3081k doubled the cache size and was supposedly approx. 7mips ... but for some number of things ran nearly same as on 3033. it isn't until 3090 that you really start to match 195, more than 15 yrs earlier; announce aug1969
http://www-03.ibm.com/ibm/history/exhibits/mainframe/mainframe_PP2195.html
370/195
http://www-03.ibm.com/ibm/history/exhibits/mainframe/mainframe_2423PH3195.html
3090 announce feb1985:
http://www-03.ibm.com/ibm/history/exhibits/mainframe/mainframe_PP3090.html

big part was the side trip into FS and the disastrous failure (including shutting down lots of 370 development during the FS years). With the failure of FS, there was mad rush to get products back into the 370 pipeline. 3033 started out as 168-3 remapped to 20% faster chips (chips also had 10 times as many circuits/chip, but the extra circuits started out going unused). During 3033 development, some of the critical 168-3 parts were redone to leverage higher circuit/chip density eventually reaching 1.5times 168-3.

In parallel with 3033 there was 3081 which was basically the FS 370 emulator ... some amount of details here:
http://www.jfsowa.com/computer/memo125.htm

from above:
The 370 emulator minus the FS microcode was eventually sold in 1980 as as the IBM 3081. The ratio of the amount of circuitry in the 3081 to its performance was significantly worse than other IBM systems of the time; its price/performance ratio wasn't quite so bad because IBM had to cut the price to be competitive. The major competition at the time was from Amdahl Systems -- a company founded by Gene Amdahl, who left IBM shortly before the FS project began, when his plans for the Advanced Computer System (ACS) were killed. The Amdahl machine was indeed superior to the 3081 in price/performance and spectaculary superior in terms of performance compared to the amount of circuitry.]
... snip ...

misc. past posts mentioning FS
http://www.garlic.com/~lynn/submain.html#futuresys

--
virtualization experience starting Jan1968, online at home since Mar1970

Eurofighter v F16

Refed: **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 13 Jun, 2011
Subject: Eurofighter v F16
Blog: Boyd's Strategy
RAF Eurofighter Typhoons 'beaten by Pakistani F-16s'
http://www.theregister.co.uk/2011/06/08/eurofighter_beaten_by_f16/

one of the offspring has been teaching part of infectious disease board certification class for some years. they let us periodically sit in. one of the emerging things about drug treatments is that it appears to be becoming quite personalized (genetic characteristics of the patient and particular strains of the infection). auto industry would be extremely highly personalized auto (not "any color you want as long as its black").

also for auto industry, circa 1990 I got to sit in on some of the C4 taskforce meetings, US auto industry on how to completely remake themselves in the face of foreign competition. an "OODA specific" was that US auto industry was taking 7-8 yrs to do a new model (sometimes parallel efforts off-set by 3-4 yrs), while foreign competition had reduced it to 3-4 yrs and were heading towards halving that again (the idea of annual new model yrs would start to become less meaningful). Any change in technology, consumer preferences and/or environment met that foreign competition could adapt much faster (potentially in less than model year). There was also issue that with large number of parts and suppliers ... with US 7-8yr cycle, between the original design and production; some of the parts changed sufficiently that they no longer fit.

one of the lessons was that 20yrs ago, the us auto industry could articulate all the factors involved and everything that needed to be done ... but still were unable to make the changes (in part, way too many stakeholders with vested interest in preserving status quo).

When Boyd would talk about OODA-loop ... there would be the part about iterating faster than the opponent ... but there would also be some about of discussion about looking at the subject from every possible angle and facet. The "every possible angle and facet" could result in a completely new game-changing response ... rather than simply continuing with similar responses, only faster. Some of this flows into Sun Tzu & winning before the battle is even fought.

A trivial example are data breaches. There is call for ever increasing protection to prevent data breaches. In the mid-90s, I was co-author of financial transaction standard ... that didn't do anything directly about breaches, it just slightly tweaked the infrastructure so that crooks could no longer use the "breached" information for fraudulent transactions (which eliminates nearly off of the motivation for breaches). While the tweak was relatively minor, it did change the game for some of the players that have vested interest in existing status quo.
http://www.garlic.com/~lynn/x959.html#x959

One of the reasons for changing the environment ... is that merchants countermeasures for data breaches comes out of the profit they make per transaction ... which can be as little as a dollar or two. The crooks motivation for the breach is being able to use the account number from each transaction to drain the accounts ... potentially several hundred dollars. As a result, the bad guys frequently can afford to out-spend by 100 times attacking the system than the merchants can afford to spend on countermeasures to prevent breaches.

OODA-loop circle is then not only process flow but also continuous observation perimeter ... but has to take in all possible aspects and then morphs into a sphere

some current players in financial transactions have significant fee surcharge based on possible fraud (& therefor risk). significantly eliminating a lot of fraud (all the kinds that use information from existing transactions, breaches, skimming, evesdropping, etc) eliminates a major portion of fraud and therefor risk and therefor major component of fees. The high level of fraud/risk in existing paradigm also acts as barrier to entry for competition.
http://www.garlic.com/~lynn/subintegrity.html#harvest

I had done feed-back/feed-forward computer resource control systems as undergraduate in the 60s ... that were shipped in commercial products. In one case, I created a joke (that appeared to last in the industry for decades) when I was forced to add manual "tuning" parameters. I published detailed description, formulas and all the code ... and nobody realized the joke. I had given the computer adaptation more degrees of freedom than the manually set parameters (being able to automatically override any possible manually specified parameter). The issue was computer operation tended to dynamically change frequently while the state-of-art for manual parameters were statically set and rarely, if ever changed (not designed for dynamic adaptive operation).

Boyd dog-fights imply some number of continuous simultaneous/concurrent operation. OODA-loop only captures part of that turning it into iterative, sequential processes (loosing some amount of the multiple concurrent continuous flavor).

Cellphone/driving & other studies show people do poorly at multitasking. Possibly some of this are claims that people only use 5-10 percent of their brains (at a time). More recent studies imply this could be an evolutionary adaptation to optimize/limit brain energy use.

For decades there has been a computer holy grail for parallel programming; some paradigm that people trained in sequential processes can use that then can be automagically performed on large number of concurrent operations.

I worked with Jim Gray in the 70s at SJR and he is largely responsible for formalizing transaction semantics ... significantly helps define boundaries of independent transactions (and what might be performed in parallel and what needs to be serialized). As a result, there has been some success in being able to perform independent transactions in parallel on large number of independent processors. Trivial analogy is how to organize queue for multiple bank tellers or multiple grocery checkout clerks.
http://www.garlic.com/~lynn/submain.html#systemr

At computer chip conferences, engineers will talk about the latest work on multiple parallel hardware processing capability (especially for things like real-time gaming and graphics) ... and what a horrible time the programmers have in being able to adapt to using such facilities.

misc. past posts mentioning John Boyd
http://www.garlic.com/~lynn/subboyd.html

--
virtualization experience starting Jan1968, online at home since Mar1970

Is BitCoin a triple entry system?

Refed: **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 13 Jun, 2011
Subject: Is BitCoin a triple entry system?
Blog: Financial Cryptography
Is BitCoin a triple entry system?
http://financialcryptography.com/mt/archives/001325.html

unregulated loan originators found they could access an unlimited amount of funds by paying the rating agencies for triple-A rating. As a result they no longer needed to worry about loan quality and/or borrower's qualifications ... immediately unloading the loans as triple-A rated toxic CDOs as fast as possible. There has been estimate that there were $27T in triple-A rated toxic CDO transactions during the bubble ... which would have been possibly $3T-$5T in profit, fees, and commissions between the original real-estate transaction and far backend warehousing of the toxic CDOs (there were statements that the financial industry tripled in size as percent of GDP during the bubble off those toxic CDO transactions). I had also heard references to musical chair analogy during the height of the bubble and who would be left standing when the music stops. Zakara's "Post American World" uses a Cinderella analogy, the major players all knew they had to leave before the stroke of midnight, but most wanted to stay until the last possible minute. For the most part the individuals all walk away with what they wanted ... it was some of the institutions that were left holding the toxic CDOs.

Note that securitized instruments had been used during the S&L failure with fraudulent documents. In the late 90s we had been asked to look at processes that might be used to significantly improve the trust & integrity of the supporting documents (the magnitude of the problem in the S&L failure was much smaller not having the triple-A ratings).

Being able to pay for triple-A ratings on the CDOs, much of the supporting documentation became superfluous and the unregulated loan originators could make no-documentation loans. No-documentation, no-down, 1% interest only ARMs became very attractive to speculators ... during the bubble some sectors of the country had 20-30% real-estate inflation & speculators could make 2000% ROI.

one of the items pointed out in the "wall street money machine" was the frequent enormous disconnect between the compensation for individuals packaging and dealing the triple-A rated toxic CDOs and their institutions ... individuals motivated to repeatedly engage in activities that could easily take down the institution (if it weren't for gov. bailouts); there has been periodic references that the environment represents enormous moral hazard.

misc. past posts mentioning estimated $27T in triple-A rated toxic CDO transactions:
http://www.garlic.com/~lynn/2009d.html#59 Quiz: Evaluate your level of Spreadsheet risk
http://www.garlic.com/~lynn/2009d.html#62 Is Wall Street World's Largest Ponzi Scheme where Madoff is Just a Poster Child?
http://www.garlic.com/~lynn/2009e.html#8 The background reasons of Credit Crunch
http://www.garlic.com/~lynn/2009e.html#23 Should FDIC or the Federal Reserve Bank have the authority to shut down and take over non-bank financial institutions like AIG?
http://www.garlic.com/~lynn/2009f.html#41 On whom or what would you place the blame for the sub-prime crisis?
http://www.garlic.com/~lynn/2009f.html#49 Is the current downturn cyclic or systemic?
http://www.garlic.com/~lynn/2009f.html#56 What's your personal confidence level concerning financial market recovery?
http://www.garlic.com/~lynn/2009f.html#65 Just posted third article about toxic assets in a series on the current financial crisis
http://www.garlic.com/~lynn/2009g.html#1 Future of Financial Mathematics?
http://www.garlic.com/~lynn/2009g.html#5 Do the current Banking Results in the US hide a grim truth?
http://www.garlic.com/~lynn/2009g.html#27 Flawed Credit Ratings Reap Profits as Regulators Fail Investors
http://www.garlic.com/~lynn/2009g.html#52 Future of Financial Mathematics?
http://www.garlic.com/~lynn/2009h.html#3 Consumer Credit Crunch and Banking Writeoffs
http://www.garlic.com/~lynn/2009h.html#10 China's yuan 'set to usurp US dollar' as world's reserve currency
http://www.garlic.com/~lynn/2009h.html#21 China's yuan 'set to usurp US dollar' as world's reserve currency
http://www.garlic.com/~lynn/2009h.html#25 The Paradox of Economic Recovery
http://www.garlic.com/~lynn/2009h.html#29 Analysing risk, especially credit risk in Banks, which was a major reason for the current crisis
http://www.garlic.com/~lynn/2009h.html#49 IBM to Build Europe, Asia 'Smart Infrastructure'
http://www.garlic.com/~lynn/2009i.html#60 In the USA "financial regulator seeks power to curb excess speculation."
http://www.garlic.com/~lynn/2009j.html#35 what is mortgage-backed securities?
http://www.garlic.com/~lynn/2009n.html#13 UK issues Turning apology (and about time, too)
http://www.garlic.com/~lynn/2009n.html#21 UK issues Turning apology (and about time, too)
http://www.garlic.com/~lynn/2010d.html#4 alphas was: search engine history, was Happy DEC
http://www.garlic.com/~lynn/2010d.html#5 alphas was: search engine history, was Happy DEC
http://www.garlic.com/~lynn/2010d.html#8 search engine history, was Happy DEC-10 Day
http://www.garlic.com/~lynn/2010d.html#10 search engine history, was Happy DEC-10 Day
http://www.garlic.com/~lynn/2010d.html#11 search engine history, was Happy DEC-10 Day
http://www.garlic.com/~lynn/2010d.html#26 search engine history, was Happy DEC-10 Day
http://www.garlic.com/~lynn/2010d.html#29 search engine history, was Happy DEC-10 Day
http://www.garlic.com/~lynn/2010e.html#74 LPARs: More or Less?
http://www.garlic.com/~lynn/2010f.html#15 LPARs: More or Less?
http://www.garlic.com/~lynn/2010f.html#33 The 2010 Census
http://www.garlic.com/~lynn/2010f.html#54 The 2010 Census
http://www.garlic.com/~lynn/2010f.html#69 The 2010 Census
http://www.garlic.com/~lynn/2010h.html#15 The Revolving Door and S.E.C. Enforcement
http://www.garlic.com/~lynn/2010i.html#34 Idiotic programming style edicts
http://www.garlic.com/~lynn/2010i.html#47 "Fraud & Stupidity Look a Lot Alike"
http://www.garlic.com/~lynn/2010k.html#46 Snow White and the Seven Dwarfs
http://www.garlic.com/~lynn/2010l.html#38 Who is Really to Blame for the Financial Crisis?
http://www.garlic.com/~lynn/2010l.html#40 Who is Really to Blame for the Financial Crisis?
http://www.garlic.com/~lynn/2010l.html#48 Who is Really to Blame for the Financial Crisis?
http://www.garlic.com/~lynn/2010l.html#53 Who is Really to Blame for the Financial Crisis?
http://www.garlic.com/~lynn/2010l.html#56 Who is Really to Blame for the Financial Crisis?
http://www.garlic.com/~lynn/2010n.html#29 Idiotic programming style edicts
http://www.garlic.com/~lynn/2010o.html#22 60 Minutes News Report:Unemployed for over 99 weeks!
http://www.garlic.com/~lynn/2010o.html#24 What Is MERS and What Role Does It Have in the Foreclosure Mess?
http://www.garlic.com/~lynn/2010o.html#59 They always think we don't understand
http://www.garlic.com/~lynn/2010p.html#6 What banking is. (Essential for predicting the end of finance as we know it.)
http://www.garlic.com/~lynn/2010p.html#7 What banking is. (Essential for predicting the end of finance as we know it.)
http://www.garlic.com/~lynn/2011.html#50 What do you think about fraud prevention in the governments?
http://www.garlic.com/~lynn/2011.html#80 Chinese and Indian Entrepreneurs Are Eating America's Lunch
http://www.garlic.com/~lynn/2011b.html#27 The Zippo Lighter theory of the financial crisis (or, who do we want to blame?)
http://www.garlic.com/~lynn/2011b.html#42 Productivity And Bubbles
http://www.garlic.com/~lynn/2011b.html#43 Productivity And Bubbles
http://www.garlic.com/~lynn/2011b.html#45 Productivity And Bubbles
http://www.garlic.com/~lynn/2011c.html#46 If IBM Hadn't Bet the Company
http://www.garlic.com/~lynn/2011d.html#23 The first personal computer (PC)
http://www.garlic.com/~lynn/2011e.html#7 I actually miss working at IBM
http://www.garlic.com/~lynn/2011e.html#36 On Protectionism
http://www.garlic.com/~lynn/2011e.html#48 On Protectionism
http://www.garlic.com/~lynn/2011e.html#60 In your opinon, what is the highest risk of financial fraud for a corporation ?
http://www.garlic.com/~lynn/2011e.html#74 The first personal computer (PC)
http://www.garlic.com/~lynn/2011f.html#43 Massive Fraud, Common Crime, No Prosecutions
http://www.garlic.com/~lynn/2011f.html#66 Bank email archives thrown open in financial crash report
http://www.garlic.com/~lynn/2011g.html#30 Bank email archives thrown open in financial crash report
http://www.garlic.com/~lynn/2011g.html#71 Pressing Obama, House Bars Rise for Debt Ceiling

--
virtualization experience starting Jan1968, online at home since Mar1970

Eurofighter v F16

From: lynn@garlic.com (Lynn Wheeler)
Date: 14 Jun, 2011
Subject: Eurofighter v F16
Blog: Boyd's Strategy
re:
http://www.garlic.com/~lynn/2011h.html#21 Eurofighter v F16

trying to map dogfights (multiple, concurrent continuous activities) for general explanation ... OODA-loop looses parts ... being translated into iterative repeated sequence of discrete steps ... somewhat the flatland metaphor
http://www.amazon.com/Flatland-Illustrated-Edwin-Abbot/dp/1449548660/

there was SF story about galaxy of humans that got their education from "tapes" loaded directly into their brains ... the secret was where did the yearly new generation of tapes come from. something like the big consulting houses ... somebody has to figure out the latest best practices for the first time, which is then drilled into hordes of new college graduates.

--
virtualization experience starting Jan1968, online at home since Mar1970

US Housing Crisis Is Now Worse Than Great Depression

Refed: **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 14 Jun, 2011
Subject: US Housing Crisis Is Now Worse Than Great Depression
Blog: Facebook
US Housing Crisis Is Now Worse Than Great Depression
http://www.cnbc.com/id/43395857

crash of '29 was stock-market speculation, this time it was real-estate speculation

Visiting south florida in the middle of last decade ... sitting in coffee houses and watching waves of groups 20-30 people led by real estate agent, touring new high rise condos. articles about locals in low-paying service jobs carrying 2-4 of these new condos; developers were putting up these high rise condos, marching up the eastern coast filling every inch. apparently all were assuming mad rush of retiring baby boomers (having sold their mcmansions) moving to s. florida with large chests of money they needed to unload. Closest visible analogy to 20s stock market frenzy.

early 2009, i was asked to html'ize the Pecora hearings that had been scanned the previous fall at Boston Public Library ... doing extensive (xref) indexing and lots of x-link (xref) between what happened then and this time (some anticipation that new congress might have an appetite to do something). later in the spring got a call that it wouldn't be needed after all (enormous lobbying by wallstreet). Brokers' Loans in the 20s provided similar speculation funding to the no-doc, nodown, 1% interest only payment ARMs (as a result of unregulated loan originators being able to pay rating agencies for triple-A ratings on everything they wrote regardless of loan quality or borrower's qualification). some more here
http://www.garlic.com/~lynn/2011h.html#22
from financial cryptography blog.

lots of players were doing bad things ... but there were players that had higher percentage of the $27T in triple-A rated toxic CDO (GSE subprime/CRA was $10B in 2001 and they were shooting for $500B by 2010). Repeal of Glass-Steagall allowed the too-big-to-fail institutions to be used for warehousing significant amounts of the $27T (at end of 2008, the four largest had $5.2T being held offbook). another
http://www.garlic.com/~lynn/2011b.html#27
from financial cryptography blog. Freddie was fined $400m for its accounting practices and there were reports that it had more lobbyists on retainer than it had employees ... but it wasn't really in the higher end stuff that it took to make up majority of $27T,

similar recent thread:
http://www.garlic.com/~lynn/2011h.html#5 Home prices may drop another 25%, Shiller predicts
http://www.garlic.com/~lynn/2011h.html#6 Home prices may drop another 25%, Shiller predicts
http://www.garlic.com/~lynn/2011h.html#7 Home prices may drop another 25%, Shiller predicts
http://www.garlic.com/~lynn/2011h.html#10 Home prices may drop another 25%, Shiller predicts

--
virtualization experience starting Jan1968, online at home since Mar1970

US Housing Crisis Is Now Worse Than Great Depression

Refed: **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 14 Jun, 2011
Subject: US Housing Crisis Is Now Worse Than Great Depression
Blog: Facebook
re:
http://www.garlic.com/~lynn/2011h.html#24 US Housing Crisis Is Now Worse Than Great Depression

#1
http://content.time.com/time/specials/packages/article/0,28804,1877351_1877350_1877339,00.html
on time's list of those responsible

money for repeal of glass-steagall was fairly evenly divided, slightly more went to republicans because there were more republicans at the time. #2
http://content.time.com/time/specials/packages/article/0,28804,1877351_1877350_1877330,00.html
on times list (did both glba and commodities trading for enron, but also used by aig)

the commodity trading effort was something of family affair ... a number of references:
http://www.garlic.com/~lynn/2009d.html#10
.. with both Mr. & Mrs.

loan originators found they could securitize and pay-for triple-A ratings & it opened up seemingly unlimited source of funds; they could also unload immediately and no longer had to care about loan quality and/or borrowers' qualifications. securitization had been used during S&L mess with fraudulent documents. In the late 90s we were asked to look at improving integrity and trust in supporting documents. However, with paying for triple-A ratings, they no longer needed supporting documents and could make no-document loans (there are no fraudulent documents if there are no documents). The paid-for triple-A ratings also opened the market to lots of new entities from all over the world (that were restricted to dealing in triple-A, like pension funds). Trillions were sold to the (new) unregulated investment arms of too-big-to-fail regulated depository institutions (courtesy of repeal of Glass-Steagall). In all, estimataed $27T in triple-A rated toxic CDO transactions were done during the bubble (with wallstreet taking hefty fees&commissions).

misc. past posts mentioning GLBA repeal of Glass-Steagall and commodities trading "modernization"
http://www.garlic.com/~lynn/2009c.html#39 'WHO IS RESPONSIBLE FOR THE GLOBAL MELTDOWN'
http://www.garlic.com/~lynn/2009c.html#46 How to defeat new telemarketing tactic
http://www.garlic.com/~lynn/2009c.html#48 How to defeat new telemarketing tactic
http://www.garlic.com/~lynn/2009c.html#53 How to defeat new telemarketing tactic
http://www.garlic.com/~lynn/2009c.html#55 Who will give Citigroup the KNOCKOUT blow?
http://www.garlic.com/~lynn/2009c.html#65 is it possible that ALL banks will be nationalized?
http://www.garlic.com/~lynn/2009d.html#10 Who will Survive AIG or Derivative Counterparty Risk?
http://www.garlic.com/~lynn/2009d.html#28 I need insight on the Stock Market
http://www.garlic.com/~lynn/2009d.html#61 Quiz: Evaluate your level of Spreadsheet risk
http://www.garlic.com/~lynn/2009d.html#62 Is Wall Street World's Largest Ponzi Scheme where Madoff is Just a Poster Child?
http://www.garlic.com/~lynn/2009d.html#63 Do bonuses foster unethical conduct?
http://www.garlic.com/~lynn/2009d.html#73 Should Glass-Steagall be reinstated?
http://www.garlic.com/~lynn/2009e.html#0 What is swap in the financial market?
http://www.garlic.com/~lynn/2009e.html#13 Should we fear and hate derivatives?
http://www.garlic.com/~lynn/2009f.html#29 What is the real basis for business mess we are facing today?
http://www.garlic.com/~lynn/2009f.html#51 On whom or what would you place the blame for the sub-prime crisis?
http://www.garlic.com/~lynn/2009g.html#7 Just posted third article about toxic assets in a series on the current financial crisis
http://www.garlic.com/~lynn/2009g.html#33 Treating the Web As an Archive
http://www.garlic.com/~lynn/2009h.html#17 REGULATOR ROLE IN THE LIGHT OF RECENT FINANCIAL SCANDALS
http://www.garlic.com/~lynn/2009i.html#60 In the USA "financial regulator seeks power to curb excess speculation."
http://www.garlic.com/~lynn/2009o.html#84 Opinions on the 'Unix Haters' Handbook'
http://www.garlic.com/~lynn/2009q.html#77 Now is time for banks to replace core system according to Accenture
http://www.garlic.com/~lynn/2010f.html#54 The 2010 Census
http://www.garlic.com/~lynn/2010h.html#28 Our Pecora Moment
http://www.garlic.com/~lynn/2010h.html#67 The Python and the Mongoose: it helps if you know the rules of engagement
http://www.garlic.com/~lynn/2010l.html#38 Who is Really to Blame for the Financial Crisis?
http://www.garlic.com/~lynn/2010n.html#36 Idiotic programming style edicts
http://www.garlic.com/~lynn/2010q.html#29 Ernst & Young sued for fraud over Lehman
http://www.garlic.com/~lynn/2011f.html#52 Are Americans serious about dealing with money laundering and the drug cartels?

--
virtualization experience starting Jan1968, online at home since Mar1970

Is the magic and romance killed by Windows (and Linux)?

Refed: **, - **, - **
From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Is the magic and romance killed by Windows (and Linux)?
Newsgroups: alt.folklore.computers
Date: Wed, 15 Jun 2011 09:31:42 -0400
jmfbahciv <See.above@aol.com> writes:
And those are the ones which took Jim years to figure out (why it happened when it did). IIRC, a lot of them had to do with instruction placement (word and instruction boundary conditions). Then he would fix the real bug and take out the "workaround" fix which was made to make the problem go away.

i got caught up in the reverse ... attempting to do some things in zero instructions ... carefully ordering the sequence of other things to achieve the results. possibly years later, somebody would make a change (fix, enhancement, whatever) and break the careful ordering.

I did have two "bugs" associated with lengths.

I had done the cp67 tty/ascii terminal support as undergraduate at univ. that was shipped in the product. since tty line-lengths were limited, I did a game with one-byte lengths. There is story here about a cp67 system crashing 27times in single day
http://www.multicians.org/thvv/360-67.html

at MIT USL ... I believe their datacenter was also in tech sq ... but in another bldg, across the courtyard from 545 tech sq (science center on 4th floor)
http://www.garlic.com/~lynn/subtopic.html#545tech

they had changed the max. TTY length from 80 to something like 1200; tty/ascii plotter(?) down at harvard (w/o changing the one-byte stuff). The length calculations then went negative, and truncated to large positive value ... resulting in storage overlay.

In the resource manager, I was doing some activity calculations over a 2-3 minute interval. There was short sequence of code where interval values got calculated. Some customer was playing with the "STOP" button on the front console, and stopped the code during critical sequence, which resulted in interval calculation exceeding (something like 30mins) the length of the field I was using for calculations ... which then resulted in divide check. I had to generate a fix to handle case of somebody hitting the console stop button, catching the code in critical section ... and leaving it stopped for more than 30mins.

--
virtualization experience starting Jan1968, online at home since Mar1970

At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened

Refed: **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 15 Jun, 2011
Subject: At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened.
Blog: Mainframe Experts
early 85 ... i did proposals for racks that could contain arbitrary mix of 370 & non-370 computing units. the mainframe forces didn't take to the idea that customers would be allowed to select non370 computing units (contaminating true-blue mainframe environment). old (long-winded) post from 2004 discussing the '85 proposals for mixing 370 & non-370 computing units
http://www.garlic.com/~lynn/2004m.html#17

Germany had done a 370 ("roman") 3-chip set that could be packaged on PC board with about 168-3 (3mips) MIP rate. This was in approx. same time frame as Endicott's "washington" (aka xt/370 & at/370). Washington was a couple 68k reworked to emulate 370 at about 100kips. I did some of the software for Washington ... which was a stripped down vm370/cms with I/O processing being done via interprocessor communication with application running on Intel processor.

I got "blamed" for a six month slip in washington schedule when doing a bunch of benchmarks showed cms applications were page-trashing in the available 370 memory (and they had to add 128k bytes of memory to the product ... to mitigate a lot of page thrashing). That helped a little ... but both paging and cms i/o were passed over to the intel processor which was done one record at a time on 100ms access disk. CMS applications from the period were more memory and filesystem hungry than comparable DOS applications (and 100ms DOS disks used to simulate mainframe disks slowed things down enormously).

This picked up a little with A74 (workstation) ... 350kips 370 processing (3+times faster than washington, but 1/10th roman) with 4mbytes of memory ... old email with reference to A74 being announced as 7437
http://www.garlic.com/~lynn/2000e.html#email880622
old long-winded post including doing some software for a74
http://www.garlic.com/~lynn/2003f.html#56

Neither washington nor a74 had rack proposal. Rack proposal was something like multiple PC "expansion" chassis all rack mounted with lots of (Roman 370 and non-370) processor boards in PC adapter card form factors ... slightly analogous to current day "blades".

At the same time I was also doing this stuff with NSF and what was to become NSFNET (operational precursor to modern internet) ... and having to juggle internal rack/cluster meetings with meetings with the director of NSF ... email from later in spring '85 about conflict with running rack processor clusters meetings and NSFNET meetings with director of NSF:
http://www.garlic.com/~lynn/2007d.html#email850315

other past NSFNET related email
http://www.garlic.com/~lynn/lhwemail.html#nsfnet

misc. past posts in this thread:
http://www.garlic.com/~lynn/2011e.html#15 At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened
http://www.garlic.com/~lynn/2011e.html#16 At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened
http://www.garlic.com/~lynn/2011e.html#17 At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened
http://www.garlic.com/~lynn/2011e.html#19 At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened
http://www.garlic.com/~lynn/2011f.html#32 At least two decades back, some gurus predicted that mainframes would disappear
http://www.garlic.com/~lynn/2011f.html#33 At least two decades back, some gurus predicted that mainframes would disappear
http://www.garlic.com/~lynn/2011f.html#35 At least two decades back, some gurus predicted that mainframes would disappear
http://www.garlic.com/~lynn/2011f.html#37 At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened
http://www.garlic.com/~lynn/2011f.html#39 At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened
http://www.garlic.com/~lynn/2011f.html#42 At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened
http://www.garlic.com/~lynn/2011f.html#45 At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened
http://www.garlic.com/~lynn/2011f.html#46 At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened
http://www.garlic.com/~lynn/2011f.html#53 The first personal computer (PC)
http://www.garlic.com/~lynn/2011f.html#54 At least two decades back, some gurus predicted that mainframes would disappear
http://www.garlic.com/~lynn/2011h.html#8 At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened

--
virtualization experience starting Jan1968, online at home since Mar1970

The National Security Agency Releases Over 50,000 Pages of Declassified Documents

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: The National Security Agency Releases Over 50,000 Pages of Declassified Documents
Newsgroups: alt.folklore.computers
Date: Wed, 15 Jun 2011 15:02:22 -0400
x-over post:

The National Security Agency Releases Over 50,000 Pages of Declassified Documents (including the Harvest manuals)
http://www.fas.org/irp/news/2011/06/nsa060811.html
Highlights of this release include:

Manuals, charts, and other documents on the development of early computer systems at NSA/CSS, including the HARVEST. This innovative system was developed with IBM and was in use from 1962 to 1976;

Early publications on cryptography, including Cryptology: Instruction Book on the Art of Secret Writing from 1809;

Documents from World War II, including previously unreleased German documents from the Target Intelligence Committee (TICOM).


--
virtualization experience starting Jan1968, online at home since Mar1970

Obama: "We don't have enough engineers"

Refed: **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 15 Jun, 2011
Subject: Obama: "We don't have enough engineers"
Blog: Facebook
Congress had GSEs doing subprime/CRA mortgages but that was relative small percentage of the mortgage market. Securitizing and paying for triple-A ratings opened things up for being processed through wallstreet, estimated $27T in triple-A rated toxic CDOs transactions that were mostly brand new wallstreet transactions where they took enormous (new) fees & commissions (estimate that wallstreet tripled in size as percent of GDP during the bubble; NY state published that aggregate wallstreet bonuses spiked over 400% during the bubble). For two yrs after real-estate peaked, wallstreet individuals continued the enormous fees and commissions by "selling" pieces of existing CDOs at "face value" to each other (even tho they mostly knew that it would eventually take down their institution). At the end of 2008, just the four largest too-big-to-fail institutions were holding $5.2T in triple-A rated toxic CDOs off-book. several tens of billions in transactions had gone for 22cents on the dollar. Except for accounting sleight of hand, FDIC would have had to close & liquidate the institutions.

There had been some use of mortgage securitization during S&L mess with fraudulent supporting documents. In the 90s, we were asked to look at increasing the integrity and trust in the supporting documents. However, the unregulated loan originators then found that they could pay for triple-A ratings ... which allowed for them to unload everything they wrote w/o regard to loan quality or borrower's qualification (also made supporting documents superfluous, once documents no longer exist, there is no question if they are fraudulent). Speculators found no-documentation, no-down, 1% interest-only payment ARMs could have 2000% ROI in markets with inflation running 20-30%. #1:
http://content.time.com/time/specials/packages/article/0,28804,1877351_1877350_1877339,00.html
in time's list of those responsible. and #2:
http://content.time.com/time/specials/packages/article/0,28804,1877351_1877350_1877330,00.html
in times responsible list

At the end, for 2yrs or so, they were selling pieces of existing to each other at "face-value" ... sort of old-time stock portfolio churn. There were a number of 10-50 billion dollar ("real") transactions that went for 22 cents on the dollar. The accounting slight of hand (and lifting "mark-to-market") was part of the too-big-to-fail. Originally, in order to sell other parts of the CDOs, they had to find someplace that would warehouse the riskiest part (lowest tranches) ... which turned out to be unregulated investment banking arms of their own institutions (off-book) ... which was largely responsible for the 22cents on the dollar. Lots of the rest is obfuscation and misdirection (especially about which CDOs were worth how much). Originally $700B TARP was to buy this stuff ... before they knew that just the four largest had $5.2T and $700B was far from adequate. The $700B was retargeted for other stuff ... and behind scenes Federal Reserve began buying trillions of the toxic assets at 98cents on the dollar (took over year of litigation to get the FED to release what was going on). Part of the obfuscation is that there was enormous individual compensation motivation ... even when they knew they were putting their institutions (economy & country) at enormous risk (disconnect between individual and institution). At the height of the bubble there were references to musical chair analogy with wondering which institutions would be left standing when the music stopped. Zakara's "Post American World" uses Cinderella "ball" analogy, they all knew that they had to get out before stroke of midnight but couldn't resist staying in until the last possible minute.

recent item: The Big Banks Fight On.
http://economix.blogs.nytimes.com/2011/06/15/the-big-banks-fight-on/

Note that the original draft of Basel2 from decade ago had additional provisions for risk-adjusted capital ... most of which got gutted in large part by US institutions

past posts mentioning time's list of those responsible:
http://www.garlic.com/~lynn/2009c.html#38 People to Blame for the Financial Crisis
http://www.garlic.com/~lynn/2009c.html#39 'WHO IS RESPONSIBLE FOR THE GLOBAL MELTDOWN'
http://www.garlic.com/~lynn/2009c.html#49 How to defeat new telemarketing tactic
http://www.garlic.com/~lynn/2009c.html#53 How to defeat new telemarketing tactic
http://www.garlic.com/~lynn/2009c.html#55 Who will give Citigroup the KNOCKOUT blow?
http://www.garlic.com/~lynn/2009c.html#65 is it possible that ALL banks will be nationalized?
http://www.garlic.com/~lynn/2009d.html#10 Who will Survive AIG or Derivative Counterparty Risk?
http://www.garlic.com/~lynn/2009d.html#28 I need insight on the Stock Market
http://www.garlic.com/~lynn/2009d.html#61 Quiz: Evaluate your level of Spreadsheet risk
http://www.garlic.com/~lynn/2009d.html#62 Is Wall Street World's Largest Ponzi Scheme where Madoff is Just a Poster Child?
http://www.garlic.com/~lynn/2009d.html#63 Do bonuses foster unethical conduct?
http://www.garlic.com/~lynn/2009d.html#73 Should Glass-Steagall be reinstated?
http://www.garlic.com/~lynn/2009e.html#0 What is swap in the financial market?
http://www.garlic.com/~lynn/2009e.html#8 The background reasons of Credit Crunch
http://www.garlic.com/~lynn/2009e.html#13 Should we fear and hate derivatives?
http://www.garlic.com/~lynn/2009e.html#23 Should FDIC or the Federal Reserve Bank have the authority to shut down and take over non-bank financial institutions like AIG?
http://www.garlic.com/~lynn/2009e.html#35 Architectural Diversity
http://www.garlic.com/~lynn/2009f.html#29 What is the real basis for business mess we are facing today?
http://www.garlic.com/~lynn/2009f.html#38 On whom or what would you place the blame for the sub-prime crisis?
http://www.garlic.com/~lynn/2009f.html#51 On whom or what would you place the blame for the sub-prime crisis?
http://www.garlic.com/~lynn/2009f.html#53 What every taxpayer should know about what caused the current Financial Crisis
http://www.garlic.com/~lynn/2009g.html#5 Do the current Banking Results in the US hide a grim truth?
http://www.garlic.com/~lynn/2009g.html#7 Just posted third article about toxic assets in a series on the current financial crisis
http://www.garlic.com/~lynn/2009g.html#33 Treating the Web As an Archive
http://www.garlic.com/~lynn/2009g.html#76 Undoing 2000 Commodity Futures Modernization Act
http://www.garlic.com/~lynn/2009h.html#17 REGULATOR ROLE IN THE LIGHT OF RECENT FINANCIAL SCANDALS
http://www.garlic.com/~lynn/2009i.html#54 64 Cores -- IBM is showing a prototype already
http://www.garlic.com/~lynn/2009i.html#60 In the USA "financial regulator seeks power to curb excess speculation."
http://www.garlic.com/~lynn/2009i.html#74 Administration calls for financial system overhaul
http://www.garlic.com/~lynn/2009i.html#77 Financial Regulatory Reform - elimination of loophole allowing special purpose institutions outside Bank Holding Company (BHC) oversigh
http://www.garlic.com/~lynn/2009j.html#16 TIME's Annual Journey: 1989
http://www.garlic.com/~lynn/2009j.html#18 Another one bites the dust
http://www.garlic.com/~lynn/2009j.html#21 The Big Takeover
http://www.garlic.com/~lynn/2009j.html#30 An Amazing Document On Madoff Said To Have Been Sent To SEC In 2005
http://www.garlic.com/~lynn/2009j.html#35 what is mortgage-backed securities?
http://www.garlic.com/~lynn/2009l.html#5 Internal fraud isn't new, but it's news
http://www.garlic.com/~lynn/2009n.html#56 Opinions on the 'Unix Haters' Handbook'
http://www.garlic.com/~lynn/2009o.html#84 Opinions on the 'Unix Haters' Handbook'
http://www.garlic.com/~lynn/2009p.html#51 Opinions on the 'Unix Haters' Handbook
http://www.garlic.com/~lynn/2009q.html#77 Now is time for banks to replace core system according to Accenture
http://www.garlic.com/~lynn/2009r.html#47 70 Years of ATM Innovation
http://www.garlic.com/~lynn/2010b.html#82 Oldest Instruction Set still in daily use?
http://www.garlic.com/~lynn/2010b.html#92 Who's to Blame for the Meltdown?
http://www.garlic.com/~lynn/2010f.html#54 The 2010 Census
http://www.garlic.com/~lynn/2010h.html#28 Our Pecora Moment
http://www.garlic.com/~lynn/2010h.html#67 The Python and the Mongoose: it helps if you know the rules of engagement
http://www.garlic.com/~lynn/2010l.html#38 Who is Really to Blame for the Financial Crisis?
http://www.garlic.com/~lynn/2010n.html#36 Idiotic programming style edicts
http://www.garlic.com/~lynn/2010q.html#29 Ernst & Young sued for fraud over Lehman
http://www.garlic.com/~lynn/2011e.html#9 I actually miss working at IBM
http://www.garlic.com/~lynn/2011e.html#36 On Protectionism
http://www.garlic.com/~lynn/2011e.html#38 On Protectionism
http://www.garlic.com/~lynn/2011e.html#40 On Protectionism
http://www.garlic.com/~lynn/2011f.html#52 Are Americans serious about dealing with money laundering and the drug cartels?
http://www.garlic.com/~lynn/2011h.html#25 US Housing Crisis Is Now Worse Than Great Depression

--
virtualization experience starting Jan1968, online at home since Mar1970

IBM Centennial Film: Wild Ducks

Refed: **, - **, - **, - **, - **, - **, - **, - **, - **
From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: IBM Centennial Film: Wild Ducks
Newsgroups: alt.folklore.computers
Date: Wed, 15 Jun 2011 19:21:05 -0400
IBM Centennial Film: Wild Ducks
http://www.youtube.com/watch?v=ksQrJh7s7N0&feature=youtu.be

This is about "wild duck" customers .... I had always heard the reference from Watsons with regard to wild duck "employees" (as opposed to customer wild ducks) ... although after the failure of FS ... the (wild duck "employees") reference changes to "as long as they fly in formation".

--
virtualization experience starting Jan1968, online at home since Mar1970

An upbeat story

From: lynn@GARLIC.COM (Anne & Lynn Wheeler)
Subject: Re: An upbeat story
Newsgroups: bit.listserv.ibm-main
Date: 16 Jun 2011 06:28:21 -0700
BillF@MAINSTAR.COM (Bill Fairchild) writes:
A long time ago a friend of mine told me that the mental abilities to do computer programming, music, and foreign languages are probably linked genetically. Since then I have noticed a lot of anecdotal evidence to support this theory, including myself. But I have also found a lot of people who are strong in only one of those three possibly interrelated skills.

a least one of the scenarios is whether a person becomes as fluent in a computer language as in their native language ... one of the supposed traits of fluency is actually "thinking" & "dreaming" in a language (as opposed to constantly translating between the language they are working in and some other language that they think in). anecdotal stories are people that have had dreams in a "computer" language.

--
virtualization experience starting Jan1968, online at home since Mar1970

At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened

Refed: **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 16 Jun, 2011
Subject: At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened.
Blog: Mainframe Experts
previous post in this thread, including cluster work from 1985
http://www.garlic.com/~lynn/2011h.html#27 At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened.

Note that STL didn't even want to do relational, the original relational/sql implementation was System/R ... and released out of Endicott as SQL/DS. STL was all consumed doing EAGLE ... it wasn't until EAGLE crashed and burned did they come around asking how fast could relational be released on MVS (and even then they only positioned it as decision support and not as transaction DBMS). Lots of past posts mentioning system/r
http://www.garlic.com/~lynn/submain.html#systemr

There was totally different relational implementation called Shelby, written in C, originally for OS/2. This morphs in portable RDBMS and some amount of capability work done so it could also be called DB2.
http://www-01.ibm.com/software/data/db2/linux-unix-windows/editions-features-purescale.html

"From The Annals of Release No Software Before Its Time" thread from 2yrs ago mentioning purescale db2 vis-a-vis Oracle RAC & Exadata
http://www.garlic.com/~lynn/2009p.html#43

reference to jan92 meeting in Ellison's conference room regarding rdbms and cluster scaleup (only platform at the time with extensive cluster scaleup support)
http://www.garlic.com/~lynn/95.html#13

mainframe DB2 people claimed that if I was allowed to continue ... it would be at least minimum of 5yrs ahead of them. As it turned out by the end of jan92, the cluster scaleup effort was transferred, announced for numerical intensive only, and we were told we couldn't work on anything with more than four processors. misc. past email on 90s cluster scalup
http://www.garlic.com/~lynn/lhwemail.html#medusa

past posts mentioning cluster scaleup
http://www.garlic.com/~lynn/subtopic.html#hacmp

previous post in this discussion regarding earlier rack/clusters:
http://www.garlic.com/~lynn/2011h.html#27

there was whole genre of large numerical intensive clusters that grew up in national labs (after we were told we couldn't work on anything with more than four processors) ... evolving into GRIDS and BLADE technologies. In early part of century, vendors started trying to better monetize their GRID investments, like selling GRIDS into financial industry where they have become established in places like rapid trading (there have been some references that avg. time for holding equities is now measured in minutes because of rapid trading). . There are also articles about exchanges doing newer networking technologies that shave milliseconds off elapsed time ... because it becomes significant for rapid trading.

GRID technologies have more recently morphed into CLOUD computing ... especially in some the newer generations of mega-datacenters.

--
virtualization experience starting Jan1968, online at home since Mar1970

Happy 100th Birthday, IBM!

Refed: **, - **, - **, - **, - **, - **, - **, - **, - **, - **
From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Happy 100th Birthday, IBM!
Newsgroups: alt.folklore.computers
Date: Fri, 17 Jun 2011 10:52:24 -0400
hancock4 writes:
A business failure should be qualified as to whether it was a marketing failure, a technical failure, or both.

FS was technical failure ... couldn't be done ... furthermore lots of the pieces were pure vaporware ... and, of course, the failure radically changed the corporate culture. That might be separate that it would have been marketing failure ... even if it had been possible ... since it was (purposefully) totally incompatible with 360 (part of countermeasure to clone controller business). In the early 70s, Amdahl gave talk to large audience at MIT ... and was asked how he made the business case for his clone processor business. His reply was that customers had already invested enormous amounts in 360 software and even if IBM were to totally walk away from 360 (possibly a veiled reference to FS), that install base could keep him in business until the end of the century.

recent discussion in ibm-main about 195 (before FS) wasn't really matched until 15yrs later (3090) ... which could be attributed to FS and then the mad scamble attempting to recover
http://www.garlic.com/~lynn/2011h.html#20

and recent post reference wild ducks item ... and that after fs failure ... the watsons references about needing "wild duck" employees ... was updated to "as long as they fly in formation".
http://www.garlic.com/~lynn/2011h.html#30

aka .. ferguson & morris reference here:
http://people.cs.clemson.edu/~mark/fs.html

with "For the first time, during F/S, outspoken criticism became politically dangerous"

and other refs ... perhaps the most damaging, the old culture under Watsons of free and vigorous debate was replaced with sycophancy and make no waves under Opel and Akers.

this has reference to 3081 (ten yrs after 195)
http://www.jfsowa.com/computer/memo125.htm

other comments were that if any of the other computer companies had such a monumental failure ... they would never have survived and would no longer be in business.

misc. past references to 360 clone controller busness ... and having been involved in creating one such as an undergarduate
http://www.garlic.com/~lynn/subtopic.html#360pcm

--
virtualization experience starting Jan1968, online at home since Mar1970

Happy 100th Birthday, IBM!

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Happy 100th Birthday, IBM!
Newsgroups: alt.folklore.computers
Date: Fri, 17 Jun 2011 11:50:16 -0400
hancock4 writes:
The impression I got from the IBM histories was FS work was indeed mostly wasted. Some parts were salvaged for use on the AS/400, but I don't think the AS/400 could be called a scaled down FS.

re:
http://www.garlic.com/~lynn/2011h.html#33 Happy 100th Birthday, IBM!

FS included idea of single-level-store (memory mapped filesystem) ... somewhat carried over from TSS/360 (along with other platforms like Multics). S/38 had the concept of single-level-stored ... in theory adapted from FS (but origins predate FS).
http://www.garlic.com/~lynn/submain.html#futuresys

One of the issue in S/38 implementation of single-level-store was that it was scatter allocate across all available disks. This resulted in whole filesystem had to be backed-up and restored as single entity across all available disks. Common failure-mode of the period was single-disk failure ... and S/38 filesystem organization made recovery an expensive process (in some cases claims that it could take days).

The design precluded it from scaling up efficiently ... large mainframes of the period could have 300 or more disks (single integrated backup and restore of such a configuration would have the system never available for production work). Original patent for RAID/replicated disk was in 1978 by engineer from san jose plant site (that I worked with in prior life). S/38 was an early adopter of the technology ... since countermeasure/recovery from single-disk failures represented such a onerous penalty.

As undergraduate at the Univ., the 360/67 was originally brought in for tss/360 operation ... which never made it into production work. The IBM system engineer would play with it on weekends ... sometimes in competition with weekend time that I wanted. At one point we did a simulated workload benchmark comparison between cp67/cms and tss/360 with emulated fortran edit, compile and execute. The cp67/cms ran 35 emulated CMS users that got better throughput & responses than tss/360 with four emulated users.

Part of this was because of the semantics of the TSS/360 single-level-store (memory-mapped filesystem) implementatioain. Later at the science center
http://www.garlic.com/~lynn/subtopic.html#545tech
I did a paged-mapped filesystem implementation for CMS
http://www.garlic.com/~lynn/submain.html#mmap

and it helped significantly having observed what not to do from observing TSS/360. During FS period, some of the ridicule would be that I already had something running that was better than their vaporware descriptions (at least my dynamic adaptive resource management and my paged mapped filesystem).

On the other hand, CMS heavily leveraged os/360 software using emulation of os/360 system services. TSS/360 did do an implementation for efficiently mapping executable images ... and the OS/360 implementation paradigm for executables (and specifically how address constants were handled) gave me constant, enormous problems
http://www.garlic.com/~lynn/submain.html#adcon

--
virtualization experience starting Jan1968, online at home since Mar1970

Happy 100th Birthday, IBM!

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Happy 100th Birthday, IBM!
Newsgroups: alt.folklore.computers
Date: Fri, 17 Jun 2011 14:44:17 -0400
Anne & Lynn Wheeler <lynn@garlic.com> writes:
re:
http://www.garlic.com/~lynn/2011h.html#33 Happy 100th Birthday, IBM!


re:
http://www.garlic.com/~lynn/2011h.html#34 Happy 100th Birthday, IBM!

One of the last nails in the FS coffin was analysis was that if the Eastern Airlines res system (running on 370/195) was run on a FS machine built out of the same (195) hardware, it would have thruput of 370/145 (about 30 times slowdown, or 3% of the thruput).

The S/38 sold into market where that kind of high-level abstraction slowdown (30 times) was acceptable. Also, the simple minded single-level-store page-mapped implementations was tolerable (and not sufficient disk drives that made the scatter allocation completely intolerable, s/38).
http://www.garlic.com/~lynn/submain.html#futuresys

AS/400 was follow-on to S/38. The high-level abstraction used in s/38 made it easier to move to completely different hardware. In that period (early 80s) there was big internal corporate drive to move lots of hardware to 801/risc ... low&mid-range 370 would be done with 801/risc ("iliad") microprocessors, as/400 was going to be 801/risc ... lots of other products would also be done using 801/risc. That effort floundered for various reasons ... the "801/risc" for 4381, 4341-following, became cisc, the as/400 801/risc changed to cisc. Other efforts became business as usual.
http://www.garlic.com/~lynn/subtopic.html#801

The only one that sort-of survived was 801/risc ROMP (joint Research/Office-products MicroProcessor) originally targeted for displaywriter followon. The displaywriter followon was canceled ... and they eventually retargeted it for the unix workstation market. The group that had done the AT&T unix port for ibm/pc (PC/IX) was hired to do one for ROMP that turned int PC/RT & AIX.

Much later in the 90s, there was joint motorola, ibm, apple effort to do single-chip 801/risc. At the time, we were doing HA/CMP & cluster scale-up for (801/risc) RS/6000
http://www.garlic.com/~lynn/subtopic.html#hacmp
and email referencing the cluster scaleup work
http://www.garlic.com/~lynn/lhwemail.html#medusa

and the executive we reported to (had previously come from motorola) moved over to head up the (somerset) effort for power/pc. At some point, Rochester becomes involved as another go around for moving as/400 to 801/risc platform (decade later than the earlier effort).

power/pc 600 ... & rochester heavily involved with 630
http://en.wikipedia.org/wiki/PowerPC_600

the above mentions that 630 became power3 and was done to merge power/pc & power architectures.

this mentions it was done in power4 (cobra & muskie used in as/400)
http://en.wikipedia.org/wiki/IBM_RS64

630 for rs/600 & as/400
http://www.cpushack.com/CIC/announce/1994/PowerPC630Preview.html

s/38 in nov80, as/400 in 1988 (new cisc chip done to replace the 801/risc iliad effort), and then mid-90s as/400 with 630.
http://en.wikipedia.org/wiki/IBM_System_i

above mentions s/38 had a (single) 48bit virtual address space; aka the whole filesystem, executables, memory resident, everything was all mapped into a single 48bit (virtual) address space.

--
virtualization experience starting Jan1968, online at home since Mar1970

Happy 100th Birthday, IBM!

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Happy 100th Birthday, IBM!
Newsgroups: alt.folklore.computers
Date: Fri, 17 Jun 2011 19:48:27 -0400
Quadibloc <jsavard@ecn.ab.ca> writes:
I see from that memo that they halted 370 development to give FS an open field... the same way that they halted 1401 development to give the 360 an open field.

re:
http://www.garlic.com/~lynn/2011h.html#33 Happy 100th Birthday, IBM!
http://www.garlic.com/~lynn/2011h.html#34 Happy 100th Birthday, IBM!
http://www.garlic.com/~lynn/2011h.html#35 Happy 100th Birthday, IBM!

folklore told to me in the early 70s was that in the gov. litigation against IBM, an executive from one of the other (7 dwarfs) computer companies testified that by the late 50s, all the computer companies realized that the single most market requirement was a compatible computer line ... and that IBM executives were the only one that managed to enforce their plant managers to toe the line (other companies weren't able to force their individual product lines to be "compatible").

the scenario was that lots of companies were starting to rapidly "grow" ... both in size and the things being computerized. as a result being able to start small and upgrade with the minimal of effort was the major business requirement. Even if IBM didn't get everything right in 360 ... and several vendors had specific models that were better ... being the only company marketing compatible product line created overwhelming market business image (allowing it to dominate all its competitors).

the reality of the compatible 360 line may have left a lot to be desired, but major condition was the market perception.

to give 360 an "open field" required steering lots of products into 360 ... not just 1401.

misc. past posts mentioning above litigation folklore
http://www.garlic.com/~lynn/94.html#44 bloat
http://www.garlic.com/~lynn/99.html#231 Why couldn't others compete against IBM?
http://www.garlic.com/~lynn/2001j.html#33 Big black helicopters
http://www.garlic.com/~lynn/2003.html#71 Card Columns
http://www.garlic.com/~lynn/2005k.html#0 IBM/Watson autobiography--thoughts on?
http://www.garlic.com/~lynn/2005k.html#4 IBM/Watson autobiography--thoughts on?
http://www.garlic.com/~lynn/2006q.html#60 Was FORTRAN buggy?
http://www.garlic.com/~lynn/2007f.html#77 John W. Backus, 82, Fortran developer, dies
http://www.garlic.com/~lynn/2007g.html#42 1960s: IBM mgmt mistrust of SLT for ICs?
http://www.garlic.com/~lynn/2007m.html#34 IBM 8000 ???
http://www.garlic.com/~lynn/2007p.html#8 what does xp do when system is copying
http://www.garlic.com/~lynn/2007t.html#63 Remembering the CDC 6600
http://www.garlic.com/~lynn/2010.html#45 360 programs on a z/10
http://www.garlic.com/~lynn/2010b.html#14 360 programs on a z/10
http://www.garlic.com/~lynn/2010k.html#21 Snow White and the Seven Dwarfs
http://www.garlic.com/~lynn/2011b.html#57 If IBM Hadn't Bet the Company

--
virtualization experience starting Jan1968, online at home since Mar1970

BIG IRON: The Manframe Story (so far)

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: BIG IRON: The Manframe Story (so far)
Newsgroups: alt.folklore.computers
Date: Sat, 18 Jun 2011 22:50:26 -0400
i presume it is somewhat to take some of ibm's 100yr

BIG IRON: The Manframe Story (so far)
http://siliconwhisperer.com/2011/06/big-iron-the-manframe-story-so-far/

CA Mainframe Chorus and IBM Systems Magazine co-present BIG IRON: The Mainframe Story (so far). This documentary film chronicles the mainframe's origins and storied history with an eye toward its bright future.

http://www.youtube.com/p/F918E728A443518F?hl=en_US&fs=1

--
virtualization experience starting Jan1968, online at home since Mar1970

Happy 100th Birthday, IBM!

Refed: **, - **, - **, - **, - **
From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Happy 100th Birthday, IBM!
Newsgroups: alt.folklore.computers
Date: Sun, 19 Jun 2011 17:09:05 -0400
Quadibloc <jsavard@ecn.ab.ca> writes:
The IBM PC was not really "aimed" at any market. It came with BASIC in ROM and a cassette interface, as if it was competing with the Apple II and the Commodore-64. In that market, of course, it failed dismally - and so did the later IBM PCjr.

my brother was regional market rep at apple (largest physical region in conus) and would periodically come into town. I would sometimes get to go to business dinners ... even including mac developers (before mac was announced). I would argue that they needed terminal emulation to address corporate market ... they were steadfast about never producing anything that might possible be used in commerical or corporate environment.

big issue was this was early before there was lots of useful applications for home ... still quite a bit of hobbyist market. big breakthru for the pc in the time frame was large corporations had annual budgets for tens of thousands of 3270 terminals. they could switch that to ibm/pc with terminal emulation; approx. same price as 3270 terminal, same desk footprint, do the 3270 terminal function and also be available for some local computing (didn't need independent/separate business justification). the terminal emulation significantly helped the snowball ... creating install base that attracted developers and add-ons ... which then increased sales ... eventually reaching critical mass that also attract the clones. the clone competition then helped with pricing for consumer market (more snowball, volumes attact developers & clones, developers & clones attact the volumes)

i've made snide references to mac developing business volumes with desktop publishing ... where they could sort of squint real-hard and pretend it wasn't really commercial.

past post about doing employee discount order through local computerland, delivery date was so far out that i took delivery a few days after street price dropped to less than employee discount.
http://www.garlic.com/~lynn/2006k.html#48 Hey! Keep Your Hands Out Of My Abstraction Layer!
http://www.garlic.com/~lynn/2010c.html#62 Happy DEC-10 Day

above includes this old email with list price and employee discount
http://www.garlic.com/~lynn/2006k.html#email820210

i used personal ibm/pc to replace ibm 3101 in the home terminal program ... picture here
http://www.garlic.com/~lynn/lhwemail.html#oldpicts

the home terminal program developed some 3270 emulation software that did both sophisticated transmission compression/decompression as well as caching pieces of previously transmitted information (host would first check if info was in local pc cache and specify control to display that information). misc. past post mentioning home terminal 3270 emulation
http://www.garlic.com/~lynn/2003n.html#7 3270 terminal keyboard??
http://www.garlic.com/~lynn/2003p.html#44 Mainframe Emulation Solutions
http://www.garlic.com/~lynn/2006y.html#0 Why so little parallelism?
http://www.garlic.com/~lynn/2008n.html#51 Baudot code direct to computers?

misc. past posts mentioning terminal emulation
http://www.garlic.com/~lynn/subnetwork.html#terminal

--
virtualization experience starting Jan1968, online at home since Mar1970

Zen and Connaturality

Refed: **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 19 Jun, 2011
Subject: Zen and Connaturality
Blog: Boyd Disciples
re:
http://lnkd.in/ngnYM2

Boyd briefing regarding finger-feel would include example of his being brought into review wargames. He would characterize it as the generals & admirals spending all year playing golf while their staff practiced. Then for the actual games, the general & admirals would be in the warrooms with little feel for the tempo and information flow. OODA-loop highlights the components that need to be practiced and emphases the tempo with iteration of all of the discrete components.

recent computer technology discussion was that there seems to be some correlation between programming and musical and multiple language skills. now some of the recent neorology studies could turn out that same brain structures are used in computer programming, multiple language proficiency and musical ability. Question is whether those brain structures are there originally or possibly develop & evolve with musical and multiple language use (practice; part of the orientation was that musical and multiple language use has tended to start at much younger age than programming). another point of the programming discussion is that there is a certain level of programming language proficiency where it approaches that of natural language (think & dream in the language). For separate aspect, both music&language tends to be passed down from one generation to the next.

taking OODA-loop to the next level would be where all the iterative discrete steps run continuously and simultaneously (rather than being discrete sequentially repeated steps, they all become concurrent and continuous). possible analogy in language proficiency is being able to handle concurrent translation ... where the brain is running both languages concurrently. part-way along the way is metaphor with multiple different OODA-loops running concurrently possibly with different tempos and scope.

an example from internet and tcp/ip was early standard had "header" checksum (basically advanced parity of the transmitted bits carried in header field). Header checksum requires the processor to first calculate the checksum and place value in the header before transmission (similarly a processor validates the checksum after complete reception). Changing to "trailer" checksum allows hardware to calculate the checksum as the bits are being transmitted and append the value in the trailer. Receiving hardware then can recalculate checksum and compares with the value in the trailer. Trailer "checksum" allows the operation to be done in parallel with hardware transmission/reception of the bits (and not as separate, discrete operation by the processor).

with regard to proficiency, in my youth, I had programmed computers to do some things and being asked by co-workers to explain in english ... I would be "blamed" for them not being able to understand a english description of the process. In part, their orientation was sequentially distinct processes ... and these particular operations involved multiple continuous concurrent processes.

In the past, I've periodically used the flatland metaphor
http://www.amazon.com/Flatland-ebook/dp/B0027P89GI

as an analogy to iterative discrete steps vis-a-vis multiple concurrent, simultaneously.

Boyd would also talk about viewing from lots of different perspectives and all facets. Viewing from different perspectives doesn't preclude constant practice ... but in order to view from a different viewpoint could require suspending some current viewpoint.

misc. past posts mentioning Boyd
http://www.garlic.com/~lynn/subboyd.html

--
virtualization experience starting Jan1968, online at home since Mar1970

Delinquent Homeowners to Get Mortgage Aid from Government

Refed: **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 19 Jun, 2011
Subject: Delinquent Homeowners to Get Mortgage Aid from Government
Blog: Facebook
Delinquent Homeowners to Get Mortgage Aid from Government
http://www.cnbc.com/id/43281199/Delinquent_Homeowners_to_Get_Mortgage_Aid_from_Government

also

Foreclosure Backlog Will Take Decades to Clear Out
http://www.consumeraffairs.com/news04/2011/06/foreclosure-backlog-will-take-decades-to-clear-out.html

there is story that AIG was negotiating with Goldman (and others) for paying 50 cents on the dollar (for CDS). Geithner then steps in and says that AIG is legally obligated to pay 100 cents on the dollar and can't negotiate to pay less ... and that was the justification for the $180+B to AIG (so it could payout 100 cents on the dollar to Goldman ... at the time, there was joke about treasury dept. being a goldman branch office in wash) ... so is the mortgage aid for the middle class but another transfer of wealth to the too-big-to-fail?

past facebook on the subject:
http://www.garlic.com/~lynn/2011g.html#76 The Two Trillion Dollar Meltdown: Easy Money, High Rollers, and the Great Credit Crash
http://www.garlic.com/~lynn/2011h.html#5 Home prices may drop another 25%, Shiller predicts
http://www.garlic.com/~lynn/2011h.html#6 Home prices may drop another 25%, Shiller predicts
http://www.garlic.com/~lynn/2011h.html#7 Home prices may drop another 25%, Shiller predicts
http://www.garlic.com/~lynn/2011h.html#10 Home prices may drop another 25%, Shiller predicts
http://www.garlic.com/~lynn/2011h.html#24 US Housing Crisis Is Now Worse Than Great Depression
http://www.garlic.com/~lynn/2011h.html#25 US Housing Crisis Is Now Worse Than Great Depression

--
virtualization experience starting Jan1968, online at home since Mar1970

Delinquent Homeowners to Get Mortgage Aid from Government

Refed: **, - **, - **, - **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 19 Jun, 2011
Subject: Delinquent Homeowners to Get Mortgage Aid from Government
Blog: Facebook
re:
http://www.garlic.com/~lynn/2011h.html#40 Delinquent Homeowners to Get Mortgage Aid from Government

Another too-big-to-fail was that they have been caught in money laundering for the drug cartels ... since the gov. has been leaning over backwards already to keep them in business, that didn't leave many options (no shutting down the institution and executives going to jail)

past post with news article too-big-to-fail money laundering referends
http://www.garlic.com/~lynn/2010m.html#24 Little-Noted, Prepaid Rules Would Cover Non-Banks As Wells As Banks

other past posts mentioning too-big-to-fail money laundering:
http://www.garlic.com/~lynn/2010l.html#60 Who is Really to Blame for the Financial Crisis?
http://www.garlic.com/~lynn/2010l.html#65 Federal Reserve
http://www.garlic.com/~lynn/2010m.html#68 Idiotic programming style edicts
http://www.garlic.com/~lynn/2010q.html#58 Programmer Charged with thieft (maybe off topic)
http://www.garlic.com/~lynn/2011.html#50 What do you think about fraud prevention in the governments?
http://www.garlic.com/~lynn/2011.html#84 The Imaginot Line
http://www.garlic.com/~lynn/2011b.html#42 Productivity And Bubbles
http://www.garlic.com/~lynn/2011f.html#52 Are Americans serious about dealing with money laundering and the drug cartels?
http://www.garlic.com/~lynn/2011f.html#55 Are Americans serious about dealing with money laundering and the drug cartels?
http://www.garlic.com/~lynn/2011f.html#64 Are Americans serious about dealing with money laundering and the drug cartels?
http://www.garlic.com/~lynn/2011g.html#5 How they failed to catch Madoff
http://www.garlic.com/~lynn/2011g.html#52 Enron: The Smartest Guys in the Room

--
virtualization experience starting Jan1968, online at home since Mar1970

Zen and Connaturality

Refed: **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 20 Jun, 2011
Subject: Zen and Connaturality
Blog: Boyd Disciples
re:
http://lnkd.in/ngnYM2
and
http://www.garlic.com/~lynn/2011h.html#39 Zen and Connaturality

Boyd's multiple viewpoints could be taken as different levels of understanding (observe & orient) ... that being told and/or reading about may not be sufficient. Having done it once can carry with a total different quality ... but not necessarily sufficient to be proficient. Say, reading about a basketball game, viewing a basketball game on TV, being at a basketball game, and shooting baskets. All may carry with them a levels of understanding ... but not necessarily proficiency & "finger feel" (say hitting 100 times from the head of the key w/o anybody else on the court and hitting 100 times when there are opponents).

"Correct" can be quite ambiguous ... there was possibly some belief that our brain once formed, didn't change. It now seems that brains are quite plastic, adaptive and undergoes significant changes as people grow, learn and perform actions. "Native" form of the brain might be considered to correspond to some spontaneous reaction. However, there seems to be less & less of a native form ... and the brain constantly adapts to the person's environment. Some evidence that it may be evolutionary related to conservation of energy ... brain adapting to repeated actions so less & less energy is used (and becomes more proficient).

While there are some characteristics of the brain that may be innate, independent of experience, culture and language ... there is other characteristics that seem to be heavily influenced by experience, culture and language ... aka some languages that lack particular constructs making it more difficult to deal with various concepts ... which brings things back to flatland analogy. I would contend that Boyd's experience from fighter dog fights made it easier for him to consider tempo & maneuver warfare applied to other environments ... and possibly difficult to convey to people w/o similar experiences.

--
virtualization experience starting Jan1968, online at home since Mar1970

Happy 100th Birthday, IBM!

Refed: **, - **, - **, - **, - **, - **, - **, - **, - **, - **
From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Happy 100th Birthday, IBM!
Newsgroups: alt.folklore.computers
Date: Mon, 20 Jun 2011 15:45:49 -0400
"Charlie Gibbs" <cgibbs@kltpzyxm.invalid> writes:
Oh, you heard about the Canadian government's purchase of F-35 jet fighters, did you?

there is growing body of sentiment that f35 is already dead ... modulo a lot of directed appropriations by congress for their local districts and friends. a couple past mention of f35
http://www.garlic.com/~lynn/2009.html#83 F111 related discussion x-over from Facebook
http://www.garlic.com/~lynn/2010b.html#77 search engine history, was Happy DEC-10 Day
http://www.garlic.com/~lynn/2010o.html#66 They always think we don't understand

there was analysis of marines buying abrahms ... which was forced on them. turns out that the army order was just under the fixed price level ... to get the fixed price they needed the total orders to be slightly more and so marines were forced into buying them. problem was that the weight of the abrahms 65-70tons and 90+ percent of marine mission profiles involved parts of the world with 35ton load limit (basically forcing some number of marines becoming adjunct to army operations). past post
http://www.garlic.com/~lynn/2010h.html#51 25 reasons why hardware is still hot at IBM

misc. past post mentioning defense meltdown &/or pentagon labyrinth
http://www.garlic.com/~lynn/2008s.html#20 Five great technological revolutions
http://www.garlic.com/~lynn/2009e.html#53 Are the "brightest minds in finance" finally onto something?
http://www.garlic.com/~lynn/2011.html#53 What do you think about fraud prevention in the governments?
http://www.garlic.com/~lynn/2011.html#55 America's Defense Meltdown
http://www.garlic.com/~lynn/2011.html#75 America's Defense Meltdown
http://www.garlic.com/~lynn/2011.html#93 America's Defense Meltdown
http://www.garlic.com/~lynn/2011b.html#0 America's Defense Meltdown
http://www.garlic.com/~lynn/2011b.html#59 Productivity And Bubbles
http://www.garlic.com/~lynn/2011c.html#39 The first personal computer (PC)
http://www.garlic.com/~lynn/2011c.html#45 If IBM Hadn't Bet the Company
http://www.garlic.com/~lynn/2011d.html#83 End of an era
http://www.garlic.com/~lynn/2011e.html#18 End of an era
http://www.garlic.com/~lynn/2011e.html#33 The real cost of outsourcing (and offshoring)
http://www.garlic.com/~lynn/2011e.html#65 End of an era
http://www.garlic.com/~lynn/2011f.html#13 Car models and corporate culture: It's all lies
http://www.garlic.com/~lynn/2011f.html#18 21st century India: welcome to the smartest city on the planet
http://www.garlic.com/~lynn/2011f.html#28 US military spending has increased 81% since 2001
http://www.garlic.com/~lynn/2011f.html#90 CFTC Limits on Commodity Speculation May Wait Until Early 2012
http://www.garlic.com/~lynn/2011g.html#10 America's Defense Meltdown
http://www.garlic.com/~lynn/2011g.html#34 Congratulations, where was my invite?
http://www.garlic.com/~lynn/2011g.html#72 77,000 federal workers paid more than governors

--
virtualization experience starting Jan1968, online at home since Mar1970

OT The inventor of Email - Tom Van Vleck

Refed: **, - **, - **, - **, - **, - **, - **, - **
From: lynn@GARLIC.COM (Anne & Lynn Wheeler)
Subject: Re: OT The inventor of Email - Tom Van Vleck
Newsgroups: bit.listserv.ibm-main
Date: 20 Jun 2011 13:19:06 -0700
ps2os2@YAHOO.COM (Ed Gould) writes:

http://www.multicians.org/thvv/mail-history.html


more off-topic ... some number of people from CTSS went to the science center on 4th flr, 545 tech sq. and did (virtual machine) cp40 (on 360/40 with hardware modifications to support virtual memory) ... which then morphs into cp67 when 360/67 became available (and later morphs into vm370). cp40/cms & cp67/cms inherits a lot from ctss.

... others went from CTSS to multics (project mac) on 5th flr, 545 tech sq.

misc. past posts mentioning science center &/or 545 tech sq
http://www.garlic.com/~lynn/subtopic.html#545tech

another of Tom's stories about cp67 and USL (datacenter in another tech sq bldg. across the courtyard from 545)
http://www.multicians.org/thvv/360-67.html

I had done tty/ascii terminal support in cp67 at univ. as undergraduate and had played some game with using one byte length field. Tom (at USL) later modified max. length for TTY to something like 1200 (I think it was some sort of ascii device plotter down at Harvard). The length calculations then resulted in negative number which gets truncated to very large length and a storage overlay.

Base cp67 did dynamic terminal type identification using terminal controller "SAD" command to change line-scanner associated with specific port (for 1052 & 2741). Changes i added for tty/ascii attempted to maintain the dynamic terminal type identification. I then wanted to do single dial-in line for all terminals (using hunt group mapping a single number to a pool). Turns out that 2702 had hardware shortcut & hardwired line speed for each port (separate from being able to dynamically change line-scanner). Dynamic worked between 2741, 1052, & tty for leased lines (where line speed was fixed) ... but wouldn't work for a single pool for all dial-ins. This somewhat prompted univ. to start a clone controller project that would do both dynamic line-speed and dynamic terminal-type. Later four of us get written up as blamed for (some part of) clone controller business. misc. past posts
http://www.garlic.com/~lynn/subtopic.html#360pcm

there was recent mention on facebook of early domain names
http://www.whoisd.com/oldestcom.php

I also pointed out old email involving 9-net
http://www.garlic.com/~lynn/2006j.html#email881216

also mentioned that Postel (mentioned in previous references), use to let me do section 6.10 in STD1.

old reference to interconnecting internal network and csnet/arpanet (mostly for email)
http://www.garlic.com/~lynn/internet.htm#0
and this email
http://www.garlic.com/~lynn/internet.htm#email821010

the ibm internal network had been larger than the arpanet/internet from just about the beginning until late '85 or possibly early '86 ... misc. past posts
http://www.garlic.com/~lynn/subnetwork.html#internalnet

recent references to computer conferencing mailing lists on bitnet/earn (where existing ibm-main originated):
http://www.garlic.com/~lynn/2011c.html#31 If IBM Hadn't Bet the Company
http://www.garlic.com/~lynn/2011f.html#78 Wylbur, Orvyl, Milton, CRBE/CRJE were all used (and sometimes liked) in the past

in the late 70s and early 80s, I got blamed for computer conferencing on the internal network; folklore was when the executive committee was informed of internal network & computer conferencing, 5of6 wanted to fire me; (aka at least chairman, ceo, president, etc).

--
virtualization experience starting Jan1968, online at home since Mar1970

Happy 100th Birthday, IBM!

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Happy 100th Birthday, IBM!
Newsgroups: alt.folklore.computers
Date: Tue, 21 Jun 2011 10:00:41 -0400
Who invented the personal computer? (hint: not IBM)
http://arstechnica.com/tech-policy/news/2011/06/did-ibm-invent-the-personal-computer-answer-no.ars

from above:

"There was a remarkable breakthrough that wasn't about a chip or a thing, it was rather the integrated whole that mattered," explains IBM Innovation Vice President Bernie Meyerson. "And the thing that IBM did that changed history, frankly, and all of us are familiar with, is we invented the personal computer."

... snip ...

--
virtualization experience starting Jan1968, online at home since Mar1970

Happy 100th Birthday, IBM!

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Happy 100th Birthday, IBM!
Newsgroups: alt.folklore.computers
Date: Tue, 21 Jun 2011 10:36:19 -0400
hancock4 writes:
In today's world, with powerful servers, I don't think there'd be much demand for a low-end Z series. The mainframe today is basically a giant locomotive capable of powerful work. For driving to the convenience store for a bottle of water, one would take their bike, walk, or auto.

In the old days, a company put both large and small applications on its mainframe since that's all they had. (that is, large=enterprise wide high volume and small=one department, low volume) Today, such small applications wouldn't be written for the mainframe, but rather a PC.


there is lots of discussion in ibm-main mailing list that low-end Z series is where the developer (next generation application) and education (next generation mainframers) come from. w/o low-end Z, just assume a shrinking market of large legacy applications (that haven't been able to move yet) and eventually dies off.

part of this has focused on legal actions against companies offering mainframe emulators that run on other hardware platforms. it eliminated some companies that were siphoning off production work that would have required a real mainframe purchase ... but also alienated the development and education market (who can't justify real mainframe purchase).

--
virtualization experience starting Jan1968, online at home since Mar1970

The IBM would have, could have and should have story

Refed: **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 21 Jun, 2011
Subject: The IBM would have, could have and should have story
Blog: IBM co/ex workers
from: IBM at 100: A prosperous failure

http://www.zdnet.com/news/it-at-work/2011/06/17/ibm-at-100-a-prosperous-failure-40093143/

remember in the mid-80s, executives where pitching that the company would double (from $60B to $120B) mostly on mainframe sales. As part of that there was huge manufacturing building program (to double mainframe manufacturing). Possibly also as part of doubling prediction, there also appeared to be huge uptick in "fast-track" ... turning out large number of 90-day wonder executives. This is when mainframe was on down tick and company was heading into the red a few yrs later (it wasn't necessarily career enhancing to pointing out that the company wouldn't be doubling).

this discusses some of the events ... including parts of role that failure of Future System played:
http://web.archive.org/web/20110718153549/http://www.ecole.org/Crisis_and_change_1995_1.htm
http://www.ecole.org/en/seances/CM07

From Ferguson and Morris book on IBM there were references that IBM lived under dark shadow of the failure for decades, also reference to the old culture under Watsons was replaced with sycophancy and make no waves under Opel and Akers.

This has more detail on Future System
http://people.cs.clemson.edu/~mark/fs.html

and this reference from Ferguson & Morris:

Most corrosive of all, the old IBM candor died with F/S. Top management, particularly Opel, reacted defensively as F/S headed toward a debacle. The IBM culture that Watson had built was a harsh one, but it encouraged dissent and open controversy. But because of the heavy investment of face by the top management, F/S took years to kill, although its wrongheadedness was obvious from the very outset. "For the first time, during F/S, outspoken criticism became politically dangerous," recalls a former top executive.

Misc detail on FS:
http://www.jfsowa.com/computer/memo125.htm

past posts mentioning FS
http://www.garlic.com/~lynn/submain.html#futuresys

Also in the late 80s, a senior disk engineer got a talk scheduled at annual, worldwide, internal communication group conference. He opened the talk with statement that communication group would be responsible for the demise of the disk division. The issue was the stranglehold that the communication group (products) had on datacenters. The disk division was seeing leading wave of data fleeing the datacenters (& mainframes to more distributed computing friendly platforms) and came up with some number of products to address the situation. However, communication group was protecting their turf and owned strategic responsibility for everything that crossed datacenter walls.

misc. past posts mentioning communication group
http://www.garlic.com/~lynn/subnetwork.html#terminal

--
virtualization experience starting Jan1968, online at home since Mar1970

Happy 100th Birthday, IBM!

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Happy 100th Birthday, IBM!
Newsgroups: alt.folklore.computers
Date: Wed, 22 Jun 2011 15:52:13 -0400
Peter Flass <Peter_Flass@Yahoo.com> writes:
A little more than a toy;-) At PPPOE we used Displaywriters from the time they first came out - dual 8in floppies. We generated a lot of paper. The secretaries got a lot out of them and really liked them.

801/RISC ROMP was originally going to be followon displaywriter. when that got cancled, they eventually hit on using it for the unix workstation market ... and it came out as PC/RT and AIXV2 (getting the company that did port of A&T unix for PC/IX to do one for PC/RT). misc. past posts mentioning 801, romp, rios, iliad, power, power/pc, etc
http://www.garlic.com/~lynn/subtopic.html#801

The follow-on to the PC/RT & ROMP was RS/6000 and RIOS. There was big push to have other companies use RS/6000, even rebranding them; one such company was WANG ... and even some from Austin RS/6000 showing up employed at WANG.

WANG LABORATORIES, INC.
http://www.fundinguniverse.com/company-histories/WANG-LABORATORIES-INC-Company-History.html

from above:
June 1991 Wang reached an agreement with IBM to resell computers made by its former rival. Wang agreed to sell IBM personal computers and IBM's RS/6000 workstations, which Wang would equip (under a Wang label) with its imaging and office productivity software, and sell IBM's proprietary AS/400 line of computers under IBM's label while designing software systems making it easy for Wang's VS line customers to convert to IBM's AS/400 line. In turn, IBM agreed to invest $25 million in Wang's operations which could be converted to a three to four percent stake in Wang's Class B stock, with an option to invest an additional $75 million.
... snip ...

Another company that rebranded rs/6000 was bull:
http://en.wikipedia.org/wiki/Groupe_Bull

also sold ha/cmp ... supposedly ran their service center in Mass off ha/cmp platform. misc. past posts mentioning ha/cmp
http://www.garlic.com/~lynn/subtopic.html#hacmp

recent post in (linkedin) Mainframe Experts discussion on clusters & cluster-scaleup
http://www.garlic.com/~lynn/2011h.html#27

referencing this old email being torn between internal meetings on cluster and meetings with director of NSF on NSFNET
http://www.garlic.com/~lynn/2007d.html#email850315

--
virtualization experience starting Jan1968, online at home since Mar1970

OT The inventor of Email - Tom Van Vleck

Refed: **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **
From: lynn@GARLIC.COM (Anne & Lynn Wheeler)
Subject: Re: OT The inventor of Email - Tom Van Vleck
Newsgroups: bit.listserv.ibm-main
Date: 22 Jun 2011 13:11:45 -0700
shmuel+ibm-main@PATRIOT.NET (Shmuel Metz , Seymour J.) writes:
It's older than that.

re:
http://www.garlic.com/~lynn/2011h.html#44 OT The inventor of Email - Tom Van Vleck

besides:
http://www.multicians.org/thvv/mail-history.html

other CTSS reference pages by Tom
http://www.multicians.org/thvv/7094.html

from above:
Notable CTSS Applications - Electronic Mail

There were a few other significant improvements about that same time, some contributed by the user community. Noel Morris and I wrote a command, suggested by Glenda Schroeder and Louis Pouzin, called MAIL, which allowed users to send text messages to each other; this was one of the earliest electronic mail facilities. (I am told that the Q-32 system also had a MAIL command in 1965.)

... snip ...

and from above:
Bob Creasy wrote "The Origin of the VM/370 Time-sharing System" in the IBM Journal of Research and Development, Vol. 25, No. 5, September 1981. This article describes the roots of CP/CMS in CTSS.
... snip ...

also from above:
RUNOFF

Jerry Saltzer wrote one of the very first computer word processing programs, RUNOFF, for CTSS in 1963 and 1964. This program is the ancestor of Unix roff, nroff, and similar text formatting facilities for many other systems. Users edited the input files for RUNOFF with a special editor, TYPSET, that supported upper and lower case letters.

Jerry has placed the original CTSS documentation for RUNOFF online as Manuscript Typing and Editing (from Patricia Crisman, editor, The Compatible Time-Sharing System, A Programmers Guide. Second edition. M. I. T. Press, 1965, section AH.9.01, December 1966 revision) and TYPSET and RUNOFF, memorandum editor and type-out commands, M.I.T. Computation Center Memorandum CC-244 / M.I.T. Project MAC Memorandum MAC-M-193. November 6, 1964. The source of RUNOFF is included in the Pierce Collection tapes.

... snip ...

At the science center, Madnick did redo of RUNOFF for cp67/cms called script (using very similar formating commands). Then in 69, "G", "M", and "L" invented GML at the science center and gml tag processing was added to script. A decade later GML morphs into SGML ... and then another decade, SGML morphs into HTML (at CERN)

reference to SGML to HTML morph:
http://infomesh.net/html/history/early/

misc. past posts mentioning GML, SGML, etc at science center
http://www.garlic.com/~lynn/submain.html#sgml

misc. past posts mentioning science center
http://www.garlic.com/~lynn/subtopic.html#545tech

--
virtualization experience starting Jan1968, online at home since Mar1970

DR Plans

From: lynn@GARLIC.COM (Anne & Lynn Wheeler)
Subject: Re: DR Plans
Newsgroups: bit.listserv.ibm-main
Date: 22 Jun 2011 13:34:12 -0700
eamacneil@YAHOO.CA (Ted MacNEIL) writes:
Considering the circumstances of a disaster, it wouldn't amaze me. In 1969, the Canadian government started forcing all financial institutions, over a certain size, to implement a DR plan, and test it.

In the 90s, major east coast ATM transaction processing center in New Jersey had roof collapse over the week (from snow). Its D/R site had been on something like 5th flr of WTC ... but had recently been taken out by the incident in WTC garage.

we were doing ha/cmp and out marketing I had coined terms disaster survivability and geographic survivability ... to differentiate from disaster/recovery. I had also been asked to write a section for the corporate continuous availability strategy document ... but it got remove when both Rochester & POK complained that they couldn't meet the requirements.

misc. past posts mentioning availability, disaster survivability, and/or geographic survivability
http://www.garlic.com/~lynn/submain.html#available

--
virtualization experience starting Jan1968, online at home since Mar1970

Did My Brother Invent E-Mail With Tom Van Vleck?

Refed: **, - **, - **, - **, - **, - **
From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Did My Brother Invent E-Mail With Tom Van Vleck?
Newsgroups: alt.folklore.computers
Date: Thu, 23 Jun 2011 08:43:18 -0400
Did My Brother Invent E-Mail With Tom Van Vleck?
http://opinionator.blogs.nytimes.com/2011/06/19/did-my-brother-invent-e-mail-with-tom-van-vleck-part-one/
http://opinionator.blogs.nytimes.com/2011/06/20/did-my-brother-invent-e-mail-with-tom-van-vleck-part-two/
http://opinionator.blogs.nytimes.com/2011/06/21/did-my-brother-invent-e-mail-with-tom-van-vleck-part-three/
http://opinionator.blogs.nytimes.com/2011/06/22/did-my-brother-invent-e-mail-with-tom-van-vleck-part-four/
http://opinionator.blogs.nytimes.com/2011/06/23/did-my-brother-invent-e-mail-with-tom-van-vleck-part-five/

started playing in ibm-main
http://groups.google.com/group/bit.listserv.ibm-main/browse_thread/thread/efaa987d177c71e0/116f3ca747e4aa68?lnk=raot#116f3ca747e4aa68

... and some archived here
http://www.garlic.com/~lynn/2011h.html#44 OT The inventor of Email - Tom Van Vleck
http://www.garlic.com/~lynn/2011h.html#49 OT The inventor of Email - Tom Van Vleck

--
virtualization experience starting Jan1968, online at home since Mar1970

Happy 100th Birthday, IBM!

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Happy 100th Birthday, IBM!
Newsgroups: alt.folklore.computers
Date: Thu, 23 Jun 2011 11:28:33 -0400
Michael Wojcik <mwojcik@newsguy.com> writes:
Really? There seemed to be a lot of Apple ][s in education, and in small business (where VisiCalc was the killer app). VisiCalc was released for the Apple ][ in 1979.

re:
http://www.garlic.com/~lynn/2011h.html#38 Happy 100th Birthday, IBM!

my brother spent a lot of time selling apple2 into school districts.

he later programmed his apple2 to dialin to corporate hdqtrs S/38 to get apple build, manufacturing and delivery schedules.

i've mentioned in the past, I had discussed with my brother possibility of programming apple2 to download current/new vmshare entries ... and then uploading to ibm mainframe (before I setup tymshare process for getting regular tape dumps of everything). vmshare archive reference (originated on tymshare's vm370/cms timesharing service aug1976):
http://vm.marist.edu/~vmshare/

History of Mac OS
http://en.wikipedia.org/wiki/History_of_Mac_OS

some number of the people mentioned in above (about targeted for "avg. consumer") ... were adamant that it was targeted for the kitchen table and they wouldn't do anything for its use anywhere else.

more Mac folklore here:
http://www.folklore.org/index.py

--
virtualization experience starting Jan1968, online at home since Mar1970

Happy 100th Birthday, IBM!

Refed: **, - **, - **, - **
From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Happy 100th Birthday, IBM!
Newsgroups: alt.folklore.computers
Date: Fri, 24 Jun 2011 10:26:46 -0400
"anon and off" <no.spam@thank.you.invalid> writes:
Do you mean the SC/MP chip from National?

similar sounding names but different

past scamp reference emulating 1130 allowing apl/1130:
http://www.brouhaha.com/~eric/retrocomputing/ibm/5100

above has no. of other URL refs (some gone 404, may have to resort to wayback machine), also from above:

The 5100 was based on the design of an earlier proof-of-concept system called SCAMP, for "Special Computer, APL Machine Portable". SCAMP was also based on the PALM processor, but used a Norelco (Philips) compact cassette drive instead of the 3M cartridge. SCAMP emulated an IBM 1130 minicomputer in order to run APL\1130. SCAMP is in the Smithsonian Institution.

... snip ...

ibm refence to scamp in 1973
http://www-03.ibm.com/ibm/history/exhibits/pc/pc_1.html

misc. past posts mentioning scamp chip:
http://www.garlic.com/~lynn/2000g.html#24 A question for you old guys -- IBM 1130 information
http://www.garlic.com/~lynn/2003i.html#84 IBM 5100
http://www.garlic.com/~lynn/2003j.html#0 IBM 5100
http://www.garlic.com/~lynn/2003n.html#6 The IBM 5100 and John Titor
http://www.garlic.com/~lynn/2003n.html#8 The IBM 5100 and John Titor
http://www.garlic.com/~lynn/2004c.html#40 Microprocessor History Site
http://www.garlic.com/~lynn/2007d.html#53 Is computer history taugh now?
http://www.garlic.com/~lynn/2007d.html#54 Is computer history taugh now?
http://www.garlic.com/~lynn/2007d.html#64 Is computer history taugh now?
http://www.garlic.com/~lynn/2008.html#10 For the History buff's an IBM 5150 pc
http://www.garlic.com/~lynn/2010c.html#54 Processes' memory
http://www.garlic.com/~lynn/2010i.html#33 System/3--IBM compilers (languages) available?

--
virtualization experience starting Jan1968, online at home since Mar1970

Did My Brother Invent E-Mail With Tom Van Vleck? (Part One)

Refed: **, - **, - **, - **, - **, - **
From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Did My Brother Invent E-Mail With Tom Van Vleck? (Part One)
Newsgroups: alt.folklore.computers
Date: Fri, 24 Jun 2011 10:51:48 -0400
Ahem A Rivet's Shot <steveo@eircom.net> writes:
Consider UUCP over a long distance modem link, you wind up paying by data volume which is close enough to paying by the word.

re:
http://www.garlic.com/~lynn/2011h.html#51 Did My Brother Invent E-Mail With Tom Van Vleck? (Part One)

old email .... I tripped across it while doing the previous scamp post
http://www.garlic.com/~lynn/2011h.html#53 Happy 100th Birthday, IBM!

about cost of coast-to-coast 56kbit link ($11,764/month)
http://www.garlic.com/~lynn/2007d.html#email820202
in this post
http://www.garlic.com/~lynn/2007d.html#55 Is computer history taugh now?
which was some topic drift from previous SCAMP post
http://www.garlic.com/~lynn/2007d.html#54 Is computer history taugh now?

there was interesting scenario a little later in the mid-80s with the communication group ... and their 37x5 products which didn't have support for faster than 56kbit links.

I was doing support for T1 & faster ... and the communication group came up with a study that customers weren't going to be needing T1 support until 1990 or so (which just happened to correspond to their product development plans). They had done study of customers using 37x5 "fat pipe" support (being able to logical treat multiple 56kbit connections as single link) ... plotting number of 2, 3, 4, 5, etc parallel 56kbit "fat pipes". They showed 37x5 customers "fat pipes" dropping to zero for six parallel 56kbit links.

what they didn't know (or ignored) was tariff for 5-6 56kbit links tended to be the same as T1 links. So arorund six 56kbit links, customers would switch to T1 links and use some other vendors support (a quick trivial survey at the time turned up 200 customer T1 links in mainframe datacenter use supported by other vendor products ... at time when communication group was claiming that they wouldn't be in use until several years later).

at the time I was having some equipment built on the other side of the pacific ... on friday before business trip, the communication group announced a new online computer conference with the following definition:
low-speed <9.6kbits medium-speed 19.2kbits high-speed 56kbits very high-speed 1.5mbits

monday morning on the wall of conference room on other side of pacific:
low-speed <20mbits medium-speed 100mbits high-speed 200-300mbits very high-speed >600mbits

as stop gap, communication group did come out with 3737, a couple recent references:
http://www.garlic.com/~lynn/2011g.html#75 We list every company in the world that has a mainframe computer
http://www.garlic.com/~lynn/2011g.html#77 Is the magic and romance killed by Windows (and Linux)?
http://www.garlic.com/~lynn/2011h.html#0 We list every company in the world that has a mainframe computer
http://www.garlic.com/~lynn/2011h.html#2 WHAT WAS THE PROJECT YOU WERE INVOLVED/PARTICIPATED AT IBM THAT YOU WILL ALWAYS REMEMBER?

which to effectively use T1 bandwidth had to do an enormous amount of spoofing the mainframe VTAM.

misc. past posts mentioning the communication group online computer conference announce:
http://www.garlic.com/~lynn/94.html#33b High Speed Data Transport (HSDT)
http://www.garlic.com/~lynn/2000b.html#69 oddly portable machines
http://www.garlic.com/~lynn/2000e.html#45 IBM's Workplace OS (Was: .. Pink)
http://www.garlic.com/~lynn/2003m.html#59 SR 15,15
http://www.garlic.com/~lynn/2004g.html#12 network history
http://www.garlic.com/~lynn/2005j.html#58 Q ALLOC PAGE vs. CP Q ALLOC vs ESAMAP
http://www.garlic.com/~lynn/2005j.html#59 Q ALLOC PAGE vs. CP Q ALLOC vs ESAMAP
http://www.garlic.com/~lynn/2005n.html#25 Data communications over telegraph circuits
http://www.garlic.com/~lynn/2005r.html#9 Intel strikes back with a parallel x86 design
http://www.garlic.com/~lynn/2006e.html#36 The Pankian Metaphor
http://www.garlic.com/~lynn/2006l.html#4 Google Architecture
http://www.garlic.com/~lynn/2006s.html#42 Ranking of non-IBM mainframe builders?
http://www.garlic.com/~lynn/2006s.html#50 Ranking of non-IBM mainframe builders?
http://www.garlic.com/~lynn/2007p.html#64 Damn
http://www.garlic.com/~lynn/2007q.html#45 Are there tasks that don't play by WLM's rules
http://www.garlic.com/~lynn/2007t.html#61 Crypto Related Posts
http://www.garlic.com/~lynn/2008e.html#45 1975 movie "Three Days of the Condor" tech stuff
http://www.garlic.com/~lynn/2008h.html#31 VTAM R.I.P. -- SNATAM anyone?
http://www.garlic.com/~lynn/2008i.html#99 We're losing the battle
http://www.garlic.com/~lynn/2008p.html#12 Discussions areas, private message silos, and how far we've come since 199x
http://www.garlic.com/~lynn/2008p.html#13 "Telecommunications" from '85
http://www.garlic.com/~lynn/2009g.html#14 Top 10 Cybersecurity Threats for 2009, will they cause creation of highly-secure Corporate-wide Intranets?
http://www.garlic.com/~lynn/2009g.html#72 Mainframe articles
http://www.garlic.com/~lynn/2009l.html#7 VTAM security issue
http://www.garlic.com/~lynn/2009l.html#24 August 7, 1944: today is the 65th Anniversary of the Birth of the Computer
http://www.garlic.com/~lynn/2009l.html#44 SNA: conflicting opinions
http://www.garlic.com/~lynn/2009p.html#59 MasPar compiler and simulator
http://www.garlic.com/~lynn/2009p.html#84 Anyone going to Supercomputers '09 in Portland?
http://www.garlic.com/~lynn/2010e.html#11 Crazed idea: SDSF for z/Linux
http://www.garlic.com/~lynn/2010i.html#69 Favourite computer history books?
http://www.garlic.com/~lynn/2010o.html#6 When will MVS be able to use cheap dasd
http://www.garlic.com/~lynn/2010o.html#57 So why doesn't the mainstream IT press seem to get the IBM mainframe?
http://www.garlic.com/~lynn/2011c.html#6 Other early NSFNET backbone
http://www.garlic.com/~lynn/2011g.html#74 We list every company in the world that has a mainframe computer

--
virtualization experience starting Jan1968, online at home since Mar1970

CISO's Guide to Breach Notification

Refed: **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 24 Jun, 2011
Subject: CISO's Guide to Breach Notification
Blog: Information Security Network
CISO's Guide to Breach Notification
http://www.govinfosecurity.com/articles.php?art_id=3780&rf=2011-06-24-eg

we were tangentially involved with the Cal. state breach notification more than a decade ago. We had been brought in to help wordsmith the cal. electronic signature legislation and several of the parties were heavily involved in privacy issues. misc. past posts mentioning electronic signature
http://www.garlic.com/~lynn/subpubkey.html#signature

They had done detailed, in-depth public surveys and found the #1 issue was identity theft, specifically the "account fraud" kind frequently occurring as result of some breach. There was little or nothing being done about such breaches (damage was to the public not the businesses involved, so there was little motivation for countermeasures). The were some hope that the publicity resulting from the breach notification would prompt businesses to take corrective action. At the same time the parties were working on an "opt-in" personal information sharing legislation (only share when specifically authorized) ... when it was pre-empted by "opt-out" provision (can share unless complaints) in GLBA (also played roll in current financial mess with repeal of Glass-Steagall). In the period since, there have been quite a few federal notification bills introduced that fall into two categories 1) similar to original cal. legislation and 2) basically federal pre-emption that would eliminate most notification ... ... aka basically every time there was a federal bill introduced to require notification ... there would be a notification bill that wouldn't require notification.

misc. past posts mentioning data breach notification:
http://www.garlic.com/~lynn/aadsm22.htm#33 Meccano Trojans coming to a desktop near you
http://www.garlic.com/~lynn/aadsm24.htm#47 More Brittle Security -- Agriculture
http://www.garlic.com/~lynn/aadsm25.htm#24 DDA cards may address the UK Chip&Pin woes
http://www.garlic.com/~lynn/aadsm26.htm#54 What to do about responsible disclosure?
http://www.garlic.com/~lynn/aadsm26.htm#57 Our security sucks. Why can't we change? What's wrong with us?
http://www.garlic.com/~lynn/aadsm28.htm#53 Pogo reports: big(gest) bank breach was covered up?
http://www.garlic.com/~lynn/2006e.html#44 Does the Data Protection Act of 2005 Make Sense
http://www.garlic.com/~lynn/2006o.html#35 the personal data theft pandemic continues
http://www.garlic.com/~lynn/2007.html#5 Securing financial transactions a high priority for 2007
http://www.garlic.com/~lynn/2007g.html#8 Securing financial transactions a high priority for 2007
http://www.garlic.com/~lynn/2007s.html#16 The new urgency to fix online privacy
http://www.garlic.com/~lynn/2008g.html#8 Hannaford case exposes holes in law, some say
http://www.garlic.com/~lynn/2008i.html#42 Security Breaches
http://www.garlic.com/~lynn/2008i.html#76 Security Awareness
http://www.garlic.com/~lynn/2008j.html#39 What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
http://www.garlic.com/~lynn/2008m.html#55 With all the highly publicised data breeches and losses, are we all wasting our time?
http://www.garlic.com/~lynn/2008m.html#66 With all the highly publicised data breeches and losses, are we all wasting our time?
http://www.garlic.com/~lynn/2008m.html#70 Why SSNs Are Not Appropriate for Authentication and when, where and why should you offer/use it?
http://www.garlic.com/~lynn/2008m.html#71 TJ Maxx - why are they still in business?
http://www.garlic.com/~lynn/2008m.html#72 What are security areas to be addressed before starting an e-commerce transaction or setting up a portal?
http://www.garlic.com/~lynn/2008m.html#73 Blinkylights
http://www.garlic.com/~lynn/2008n.html#82 Fraud in financial institution
http://www.garlic.com/~lynn/2008o.html#16 Is Information Security driven by compliance??
http://www.garlic.com/~lynn/2008p.html#5 Privacy, Identity theft, account fraud
http://www.garlic.com/~lynn/2008p.html#6 SECURITY and BUSINESS CONTINUITY ..... Where they fit in?
http://www.garlic.com/~lynn/2008p.html#7 Dealing with the neew MA ID protection law
http://www.garlic.com/~lynn/2008q.html#25 Cybercrime Could Be As Destructive As Credit Crisis
http://www.garlic.com/~lynn/2008r.html#2 Payment Card + Digital Signature
http://www.garlic.com/~lynn/2008s.html#1 PCI's Bob Russo: Data loss hurts brand more than a fine
http://www.garlic.com/~lynn/2009.html#29 Data losses set to soar
http://www.garlic.com/~lynn/2009.html#58 HONEY I LOVE YOU, but please cut the cards
http://www.garlic.com/~lynn/2009b.html#9 New Research Reveals 45% of Card Breach Victims Lose Confidence in Their Financial Accounts
http://www.garlic.com/~lynn/2009b.html#29 is privacy a security attribute(component or ?). If yes, why? If no why not?
http://www.garlic.com/~lynn/2009d.html#27 Californa's Data Breach Law May Get an Update
http://www.garlic.com/~lynn/2009d.html#38 Internet threat: Hackers swarm bank accounts
http://www.garlic.com/~lynn/2009f.html#57 Data masking/data disguise Primer 1) WHY
http://www.garlic.com/~lynn/2009g.html#10 Top 10 Cybersecurity Threats for 2009, will they cause creation of highly-secure Corporate-wide Intranets?
http://www.garlic.com/~lynn/2009j.html#13 PCI SSC Seeks Input on Security Standards
http://www.garlic.com/~lynn/2009j.html#23 Database Servers: Candy For Hackers
http://www.garlic.com/~lynn/2009j.html#33 IBM touts encryption innovation
http://www.garlic.com/~lynn/2009j.html#56 Replace the current antiquated credit card system
http://www.garlic.com/~lynn/2009k.html#77 Cyber attackers empty business accounts in minutes
http://www.garlic.com/~lynn/2009l.html#5 Internal fraud isn't new, but it's news
http://www.garlic.com/~lynn/2009o.html#50 WSJ.com The Fallacy of Identity Theft
http://www.garlic.com/~lynn/2009p.html#15 Rogue security software threat will grow in 2010, warns report
http://www.garlic.com/~lynn/2009p.html#17 U.K. lags in information security management practices
http://www.garlic.com/~lynn/2009p.html#22 FBI: National data-breach law would help fight cybercrime
http://www.garlic.com/~lynn/2009p.html#27 FBI: National data-breach law would help fight cybercrime
http://www.garlic.com/~lynn/2009q.html#58 Cyber breaches are a closely kept secret
http://www.garlic.com/~lynn/2010b.html#69 Happy DEC-10 Day
http://www.garlic.com/~lynn/2010b.html#82 Oldest Instruction Set still in daily use?
http://www.garlic.com/~lynn/2010f.html#29 Cyberattacks raise e-banking security fears
http://www.garlic.com/~lynn/2010g.html#84 In SSL We Trust? Not Lately
http://www.garlic.com/~lynn/2010h.html#73 Our Pecora Moment
http://www.garlic.com/~lynn/2010h.html#74 Idiotic programming style edicts
http://www.garlic.com/~lynn/2010h.html#82 Costs Of Data Breaches Much Higher In U.S. Than In Other Countries, Study Says
http://www.garlic.com/~lynn/2010j.html#18 Personal use z/OS machines was Re: Multiprise 3k for personal Use?
http://www.garlic.com/~lynn/2010l.html#28 Mainframe Hacking -- Fact or Fiction
http://www.garlic.com/~lynn/2010l.html#71 A slight modification of my comments on PKI
http://www.garlic.com/~lynn/2010m.html#2 Five Theses on Security Protocols
http://www.garlic.com/~lynn/2010m.html#56 About that "Mighty Fortress"... What's it look like?
http://www.garlic.com/~lynn/2010m.html#64 How Safe Are Online Financial Transactions?
http://www.garlic.com/~lynn/2010n.html#22 Data breaches remain high
http://www.garlic.com/~lynn/2010n.html#44 Who are these people who think cybersecurity experts are crying wolf?
http://www.garlic.com/~lynn/2010n.html#46 Who are these people who think cybersecurity experts are crying wolf?
http://www.garlic.com/~lynn/2010n.html#49 ZeuS attacks mobiles in bnak SMS bypass scam
http://www.garlic.com/~lynn/2010n.html#52 Who are these people who think cybersecurity experts are crying wolf?
http://www.garlic.com/~lynn/2010n.html#76 Mainframe hacking?
http://www.garlic.com/~lynn/2010o.html#8 PCI: Smaller Merchants Threatened
http://www.garlic.com/~lynn/2010o.html#9 On Scope Scrinkage in PCI DSS
http://www.garlic.com/~lynn/2010o.html#18 Electronic Theft Costs Businesses More Than Physical Theft
http://www.garlic.com/~lynn/2010o.html#50 The Credit Card Criminals Are Getting Crafty
http://www.garlic.com/~lynn/2010o.html#53 The Credit Card Criminals Are Getting Crafty
http://www.garlic.com/~lynn/2010o.html#76 e-commerce smackdown as PCI standards revised
http://www.garlic.com/~lynn/2010p.html#5 Fun with ATM Skimmers, Part III
http://www.garlic.com/~lynn/2010q.html#4 Plug Your Data Leaks from the inside
http://www.garlic.com/~lynn/2011.html#30 Data Breaches: Stabilize in 2010, But There's an Asterisk
http://www.garlic.com/~lynn/2011f.html#14 How is SSL hopelessly broken? Let us count the ways
http://www.garlic.com/~lynn/2011f.html#55 Are Americans serious about dealing with money laundering and the drug cartels?
http://www.garlic.com/~lynn/2011h.html#9 Breaches and Consumer Backlash

--
virtualization experience starting Jan1968, online at home since Mar1970

pdp8 to PC- have we lost our way?

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: pdp8 to PC- have we lost our way?
Newsgroups: alt.folklore.computers
Date: Sat, 25 Jun 2011 11:16:12 -0400
Morten Reistad <first@last.name> writes:
The "terminal" of today is usually a networked machine, where it has a local browser, and local clients for mail, chat, even skype; and has client support for windows terminal service, ssh, and possibly even an X server.

There are some very nice "hotel installations", where it all runs from write protected disks with union ram filesystems on top.

A fast reboot (much less than a minute), and you are back to a freshly installed system.

I have even seen these installed in hospital operating theatres, where they are in a vacuum-safe container, and access is via recirculated bluetooth sterilised keyboards and mice.

I got quoted a cost estimate to go in and change the computer of around $15k.


lot of MIT's Project Athena (80s & early 90s) was along these lines ... terminal rooms turned into workstation rooms; DEC & IBM workstations that had some local harddisk but were w/o "personality" ... and restarted; network filesystem, (kerberos) authentication, x-windows, etc
http://en.wikipedia.org/wiki/Project_Athena

there were some amount of cross-over between people at science center and employees at project athena ... the director of athena was from mit, but both ibm and dec had "assistant" directors. in late 80s & early 90s, would periodically go by have review of athena projects; one such review was there while they were working out details of kerberos cross-domain operation.
http://en.wikipedia.org/wiki/Kerberos_%28protocol%29

kerberos has since seen deployment in many infrastructures ... including underlying infrastructure for windows (was on temporary assignment working with company during period that they had contract with m'soft doing the original implementation). one reference from the wiki site:
http://www.justice.gov/atr/cases/ms_tuncom/major/mtc-00029523.htm

I was in something of festouche with certification authority industry with regard to public-key support in kerberos (aka pk-init). I had defined simple public key operation that didn't require digital certificates (aka public key was registered with kerberos server in lieu of password). some from the CA industry was pushing hard that only digital certificate mode of operation be used ... misc. past posts mentioning pk-init for kerberos
http://www.garlic.com/~lynn/subpubkey.html#kerberos

for other drift, this was also somewhat behind getting dragged into helping wordsmith the cal. state electronic signature legislation (digital certificate industry was lobbying hard that only digital certificate mode of operation would be specified)
http://www.garlic.com/~lynn/subpubkey.html#signature

--
virtualization experience starting Jan1968, online at home since Mar1970

Law Interfering with Cybersecurity

From: lynn@garlic.com (Lynn Wheeler)
Date: 25 Jun, 2011
Subject: Law Interfering with Cybersecurity
Blog: Information Security Network
Law Interfering with Cybersecurity
http://blogs.govinfosecurity.com/posts.php?postID=986&rf=2011-06-25-eg

note during early days of ISAC meetings, a main concern was that ISACs would be subject to FOIA and details of exploits would leak to the public (something similar was what prompted cal. state breach notification legislation)

recent reference:
http://www.garlic.com/~lynn/2011h.html#55 CISO's Guide to Breach Notification

misc. past posts mentioning fraud, vulnerabilities, exploits
http://www.garlic.com/~lynn/subintegrity.html#fraud

--
virtualization experience starting Jan1968, online at home since Mar1970

Pipeline and Network Security: Protecting a Series of Tubes

Refed: **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 25 Jun, 2011
Subject: Pipeline and Network Security: Protecting a Series of Tubes
Blog: Fear, Honor, and Interest
re:
http://fearhonorinterest.wordpress.com/2011/06/24/pipeline-and-network-security-protecting-a-series-of-tubes/

my periodic analogy for cybersecurity is putting things behind a bank vault door which has been installed in an open field -- with no bank vault

cybersecurity threat tends to be to data "at rest" (at end-points, not "in flight") and typically involves strong financial motivation, the crooks using havested information for fraudulent transactions. frequently the end-points are merchants where the value of the information (to merchants) is profit from transaction (possibly a couple of dollars), while the value of the information to crooks is for fraudulent transactions that drain the accounts (potentially several hundred dollars). As a result, the attackers can potentially afford to outspend the defenders by a factor of 100 times (inverted asymmetrical threat)

the financial infrastructure has strong vested interest in preserving the current infrastructure status quo with interchange rates strongly related to possible fraud. a decade ago there were a number of "safe" internet payment products being hawked to merchants ... which saw strong acceptance until the cognitive dissonance. merchants had been programmed for decades that the interchange fees charged were strongly correlated with potential fraud ... and they expected "safe" payment products to reduce those fees by an order of magnitude (or more). However, they were then informed that the interchange rates for the "safe" payment products would basically be a surchange on top of the highest fee they were already paying ... and all the efforts fell apart.

past posts mentioning mismatch between attackers & defenders and/or "cognitive dissonance"
http://www.garlic.com/~lynn/aadsm26.htm#58 Our security sucks. Why can't we change? What's wrong with us?
http://www.garlic.com/~lynn/aadsm27.htm#3 Solution to phishing -- an idea who's time has come?
http://www.garlic.com/~lynn/aadsm28.htm#3 Why Security Modelling doesn't work -- the OODA-loop of today's battle
http://www.garlic.com/~lynn/aadsm28.htm#5 Why Security Modelling doesn't work -- the OODA-loop of today's battle
http://www.garlic.com/~lynn/aadsm28.htm#60 Seeking expert on credit card fraud prevention - particularly CNP/online transactions
http://www.garlic.com/~lynn/aadsm28.htm#64 Seeking expert on credit card fraud prevention - particularly CNP/online transactions
http://www.garlic.com/~lynn/aadsm28.htm#71 Paypal -- Practical Approaches to Phishing -- open white paper
http://www.garlic.com/~lynn/aadsm28.htm#72 What are the current INNOVATIVE ICT Security Services, that are in demand or highly marketable at the moment
http://www.garlic.com/~lynn/aadsm28.htm#74 Visa and MasterCard mandated PCI compliance as of Jan 1, 2008. I would like to get a feel or opinion on this subject
http://www.garlic.com/~lynn/aadsm28.htm#75 Fun with Data Theft/Breach Numbers
http://www.garlic.com/~lynn/2007e.html#26 Securing financial transactions a high priority for 2007
http://www.garlic.com/~lynn/2007f.html#75 Securing financial transactions a high priority for 2007
http://www.garlic.com/~lynn/2007g.html#20 T.J. Maxx data theft worse than first reported
http://www.garlic.com/~lynn/2007h.html#56 T.J. Maxx data theft worse than first reported
http://www.garlic.com/~lynn/2007i.html#64 John W. Backus, 82, Fortran developer, dies
http://www.garlic.com/~lynn/2007j.html#15 John W. Backus, 82, Fortran developer, dies
http://www.garlic.com/~lynn/2007l.html#39 My Dream PC -- Chip-Based
http://www.garlic.com/~lynn/2007l.html#48 My Dream PC -- Chip-Based
http://www.garlic.com/~lynn/2007u.html#15 Public Computers
http://www.garlic.com/~lynn/2007v.html#86 folklore indeed
http://www.garlic.com/~lynn/2007v.html#87 Data Breaches Soar In 2007
http://www.garlic.com/~lynn/2007v.html#90 folklore indeed
http://www.garlic.com/~lynn/2007v.html#91 Tap and faucet and spellcheckers
http://www.garlic.com/~lynn/2007v.html#93 folklore indeed
http://www.garlic.com/~lynn/2007v.html#94 folklore indeed
http://www.garlic.com/~lynn/2007v.html#97 folklore indeed
http://www.garlic.com/~lynn/2008.html#2 folklore indeed
http://www.garlic.com/~lynn/2008.html#4 folklore indeed
http://www.garlic.com/~lynn/2008b.html#75 Toyota Sales for 2007 May Surpass GM
http://www.garlic.com/~lynn/2008c.html#47 Data Erasure Products
http://www.garlic.com/~lynn/2008h.html#20 handling the SPAM on this group
http://www.garlic.com/~lynn/2008i.html#21 Worst Security Threats?
http://www.garlic.com/~lynn/2008i.html#101 We're losing the battle
http://www.garlic.com/~lynn/2008m.html#56 With all the highly publicised data breeches and losses, are we all wasting our time?
http://www.garlic.com/~lynn/2008m.html#71 TJ Maxx - why are they still in business?
http://www.garlic.com/~lynn/2008m.html#72 What are security areas to be addressed before starting an e-commerce transaction or setting up a portal?
http://www.garlic.com/~lynn/2008n.html#54 In your experience which is a superior debit card scheme - PIN based debit or signature debit?
http://www.garlic.com/~lynn/2008n.html#75 Should online transactions be allowed on credit cards without adequate safeguards?
http://www.garlic.com/~lynn/2008o.html#13 What risk of possible data leakage do you see for your organization?
http://www.garlic.com/~lynn/2008o.html#16 Is Information Security driven by compliance??
http://www.garlic.com/~lynn/2008o.html#76 Blinkenlights
http://www.garlic.com/~lynn/2008p.html#5 Privacy, Identity theft, account fraud
http://www.garlic.com/~lynn/2008p.html#7 Dealing with the neew MA ID protection law
http://www.garlic.com/~lynn/2008p.html#79 PIN entry on digital signatures + extra token
http://www.garlic.com/~lynn/2008q.html#4 GPG
http://www.garlic.com/~lynn/2008q.html#5 GPG
http://www.garlic.com/~lynn/2008r.html#53 21 million German bank account details on black market
http://www.garlic.com/~lynn/2008s.html#10 Data leakage - practical measures to improve Information Governance
http://www.garlic.com/~lynn/2009b.html#13 US credit card payment house breaches by sniffing malware
http://www.garlic.com/~lynn/2009b.html#62 Study: Data breaches continue to get more costly for businesses
http://www.garlic.com/~lynn/2009c.html#29 How to defeat new telemarketing tactic
http://www.garlic.com/~lynn/2009c.html#32 How to defeat new telemarketing tactic
http://www.garlic.com/~lynn/2009c.html#51 How to defeat new telemarketing tactic
http://www.garlic.com/~lynn/2009d.html#69 PCI Compliance
http://www.garlic.com/~lynn/2009f.html#36 PCI security rules may require reinforcements
http://www.garlic.com/~lynn/2009f.html#57 Data masking/data disguise Primer 1) WHY
http://www.garlic.com/~lynn/2009f.html#60 Cobol hits 50 and keeps counting
http://www.garlic.com/~lynn/2009g.html#11 Top 10 Cybersecurity Threats for 2009, will they cause creation of highly-secure Corporate-wide Intranets?
http://www.garlic.com/~lynn/2009g.html#62 Solving password problems one at a time, Re: The password-reset paradox
http://www.garlic.com/~lynn/2009g.html#64 What happened to X9.59?
http://www.garlic.com/~lynn/2009i.html#51 64 Cores -- IBM is showing a prototype already
http://www.garlic.com/~lynn/2009i.html#53 Merchant Groups Ask for Broad Changes in Letter to PCI's Overseer
http://www.garlic.com/~lynn/2009j.html#11 Is anyone aware of a system that offers three layers of security and ID protection for online purchases or even over the counter POS purchases?
http://www.garlic.com/~lynn/2009j.html#13 PCI SSC Seeks Input on Security Standards
http://www.garlic.com/~lynn/2009j.html#33 IBM touts encryption innovation
http://www.garlic.com/~lynn/2009j.html#41 How can we stop Credit card FRAUD?
http://www.garlic.com/~lynn/2009j.html#57 How can we stop Credit card FRAUD?
http://www.garlic.com/~lynn/2009k.html#54 The satate of software
http://www.garlic.com/~lynn/2009l.html#53 Hacker charges also an indictment on PCI, expert says
http://www.garlic.com/~lynn/2009m.html#13 PCI Council Releases Recommendations For Preventing Card-Skimming Attacks
http://www.garlic.com/~lynn/2009m.html#22 PCI SSC Seeks standard for End to End Encryption?
http://www.garlic.com/~lynn/2009m.html#49 Hacker charges also an indictment on PCI, expert says
http://www.garlic.com/~lynn/2009m.html#62 August 7, 1944: today is the 65th Anniversary of the Birth of the Computer
http://www.garlic.com/~lynn/2009n.html#1 IT Story New Standard For EU-Compliant Electronic Signatures
http://www.garlic.com/~lynn/2009r.html#55 Verizon report goes deep inside data breach investigations
http://www.garlic.com/~lynn/2009s.html#39 Six Months Later, MasterCard Softens a Controversial PCI Rule
http://www.garlic.com/~lynn/2010d.html#17 Chip and PIN is Broken!
http://www.garlic.com/~lynn/2010f.html#29 Cyberattacks raise e-banking security fears
http://www.garlic.com/~lynn/2010f.html#75 Is Security a Curse for the Cloud Computing Industry?
http://www.garlic.com/~lynn/2010g.html#21 Should the USA Implement EMV?
http://www.garlic.com/~lynn/2010g.html#84 In SSL We Trust? Not Lately
http://www.garlic.com/~lynn/2010h.html#54 Trust Facade
http://www.garlic.com/~lynn/2010h.html#69 Idiotic programming style edicts
http://www.garlic.com/~lynn/2010i.html#25 Retailers blamed for making people vulnerable to credit card fraud and ID theft
http://www.garlic.com/~lynn/2010i.html#58 Cyber Self Defense: Reduce Your Attack Surface
http://www.garlic.com/~lynn/2010j.html#10 Wal-Mart to support smartcard payments
http://www.garlic.com/~lynn/2010k.html#5 The Attacker's Advantage
http://www.garlic.com/~lynn/2010l.html#26 Root Zone DNSSEC Deployment Technical Status Update
http://www.garlic.com/~lynn/2010l.html#70 A slight modification of my comments on PKI
http://www.garlic.com/~lynn/2010l.html#79 Five Theses on Security Protocols
http://www.garlic.com/~lynn/2010m.html#29 Are we spending too little on security? Or are we spending too much??
http://www.garlic.com/~lynn/2010m.html#64 How Safe Are Online Financial Transactions?
http://www.garlic.com/~lynn/2010o.html#8 PCI: Smaller Merchants Threatened
http://www.garlic.com/~lynn/2010o.html#28 Survey Outlines Compliance Challenge Among Small Merchants
http://www.garlic.com/~lynn/2010o.html#31 Survey Outlines Compliance Challenge Among Small Merchants
http://www.garlic.com/~lynn/2010o.html#39 Compressing the OODA-Loop - Removing the D (and maybe even an O)
http://www.garlic.com/~lynn/2010o.html#52 Payment Card Industry Pursues Profits Over Security
http://www.garlic.com/~lynn/2010o.html#53 The Credit Card Criminals Are Getting Crafty
http://www.garlic.com/~lynn/2010o.html#76 e-commerce smackdown as PCI standards revised
http://www.garlic.com/~lynn/2010q.html#4 Plug Your Data Leaks from the inside
http://www.garlic.com/~lynn/2011.html#42 Looking for a real Fortran-66 compatible PC compiler (CP/M or DOSor Windows
http://www.garlic.com/~lynn/2011b.html#36 Internal Fraud and Dollar Losses
http://www.garlic.com/~lynn/2011g.html#23 Fight Fraud with Device ID
http://www.garlic.com/~lynn/2011g.html#48 Is the magic and romance killed by Windows (and Linux)?

--
virtualization experience starting Jan1968, online at home since Mar1970

SSL digital certificates

Refed: **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 25 Jun, 2011
Subject: SSL digital certificates
Blog: Facebook
Facebook was leaking akamai.net SSL certificate. I've periodically seen this before (not just w/facebook). misc past posts mentioning SSL digital certificates
http://www.garlic.com/~lynn/subpubkey.html#sslcert

we had been called in to consult with small client/server startup that wanted to do payment transactions on their servers, the startup had also invented this technology called SSL they wanted to use. It took some effort including doing presentations on industrial strength networking to room full of paper millionaire employees. The result is now frequently referred to as "electronic commerce" ... some past posts about "payment gateway" for "electronic commerce"
http://www.garlic.com/~lynn/subnetwork.html#gateway

other trivia, one of my hobbies was providing highly enhanced operating systems to internal datacenters, including world-wide sales&marketing support HONE (early on even called on to do the initial installs of HONE clones at various places around the world). In the mid-70s, the US HONE datacenters were consolidated in Palo Alto. Downsizing and other factors eventually resulted in dissolving HONE and the Palo Alto bldg has different occupant. However, a new bldg. was built next door and FACEBOOK moved their hdqtrs into the new bldg. ... misc. past posts mentioning HONE
http://www.garlic.com/~lynn/subtopic.html#hone

In the internet bubble, wallstreet investment bankers had a IPO mill, cranking companies through the process (and taking enormous profits at the IPO). Part of the process was the companies needed to eventually fail ... leaving the market open for the next round of IPOs. At one point we had been very critical of some technicalogy that was involved in a company about to do an IPO. Investment bankers sent somebody to visit us and asked us to stop making comments (at least until after their IPO).

the explanation we were told afterwards was that many investment bankers tend to be totally amoral

misc. past posts mentioning "internet bubble" and/or "IPO mill"
http://www.garlic.com/~lynn/aadsm28.htm#69 VCs have a self-destruction gene, let's tweak it
http://www.garlic.com/~lynn/aadsm28.htm#70 VCs have a self-destruction gene, let's tweak it
http://www.garlic.com/~lynn/2005.html#20 I told you ... everybody is going to Dalian,China
http://www.garlic.com/~lynn/2005k.html#37 The 8008 (was: Blinky lights WAS: The SR-71 Blackbird was designed ENTIRELYwith slide rules)
http://www.garlic.com/~lynn/2005s.html#16 Is a Hurricane about to hit IBM ?
http://www.garlic.com/~lynn/2006g.html#36 The Pankian Metaphor
http://www.garlic.com/~lynn/2007g.html#7 U.S. Cedes Top Spot in Global IT Competitiveness
http://www.garlic.com/~lynn/2007j.html#51 IBM Unionization
http://www.garlic.com/~lynn/2007p.html#39 India is outsourcing jobs as well
http://www.garlic.com/~lynn/2007r.html#36 Students mostly not ready for math, science college courses
http://www.garlic.com/~lynn/2008e.html#37 was: 1975 movie "Three Days of the Condor" tech stuff
http://www.garlic.com/~lynn/2008e.html#51 was: 1975 movie "Three Days of the Condor" tech stuff
http://www.garlic.com/~lynn/2008f.html#81 Is IT becoming extinct?
http://www.garlic.com/~lynn/2008i.html#65 How do you manage your value statement?
http://www.garlic.com/~lynn/2008n.html#27 VMware Chief Says the OS Is History
http://www.garlic.com/~lynn/2008q.html#55 Can outsourcing be stopped?
http://www.garlic.com/~lynn/2009d.html#2 IBM 'pulls out of US'
http://www.garlic.com/~lynn/2009i.html#9 Why are z/OS people reluctant to use z/OS UNIX?
http://www.garlic.com/~lynn/2009k.html#18 A Complete History Of Mainframe Computing
http://www.garlic.com/~lynn/2009o.html#25 Opinions on the 'Unix Haters' Handbook'
http://www.garlic.com/~lynn/2009o.html#37 Young Developers Get Old Mainframers' Jobs
http://www.garlic.com/~lynn/2009o.html#63 U.S. students behind in math, science, analysis says
http://www.garlic.com/~lynn/2009o.html#67 I would like to understand the professional job market in US. Is it shrinking?
http://www.garlic.com/~lynn/2010b.html#20 Happy DEC-10 Day
http://www.garlic.com/~lynn/2010c.html#81 search engine history, was Happy DEC-10 Day
http://www.garlic.com/~lynn/2010i.html#53 Of interest to the Independent Contractors on the list
http://www.garlic.com/~lynn/2010i.html#84 Idiotic programming style edicts
http://www.garlic.com/~lynn/2010n.html#36 Idiotic programming style edicts
http://www.garlic.com/~lynn/2010n.html#38 Idiotic programming style edicts
http://www.garlic.com/~lynn/2010o.html#22 60 Minutes News Report:Unemployed for over 99 weeks!
http://www.garlic.com/~lynn/2010o.html#41 60 Minutes News Report:Unemployed for over 99 weeks!
http://www.garlic.com/~lynn/2010p.html#78 TCM's Moguls documentary series

--
virtualization experience starting Jan1968, online at home since Mar1970

Cyberwar vs. Cyber-Espionage vs. Cybercrime

Refed: **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 27 Jun, 2011
Subject: Cyberwar vs. Cyber-Espionage vs. Cybercrime
Blog: Fear, Honor, and Interest

http://fearhonorinterest.wordpress.com/2011/06/27/cyberwar-vs-cyber-espionage-vs-cybercrime/

lot of cybercrime is around breaches - harvesting financial transaction account information for the purpose of performing fraudulent transactions.

we were tangentially involved in the cal. state breach notification legislation being brought in to help wordsmith the electronic signature legislation. some of the parties had done detailed public surveys of privacy issue and found #1 was "identity theft" - in large part the account fraud kind frequently as result of breaches. In many of the breach cases, the custodian of the data was processor or merchant which were not at risk from exposure of the information (i.e. the crooks used the information to drain customer accounts). At the time, there was little being done about breaches (almost no awareness that the account fraud was occurring as a result of breach) and there was some anticipation that the publicity resulting from breach notification would provide some motivation to take corrective action.

in the decade or so since the cal. legislation there have been dueling federal pre-emption bills introduced; 1) similar to original cal. legislation and 2) notification legislation eliminating most requirements for notification.

most of the breach "cybercrime" - looks much more like cyber-espionage - stealing information - for criminal purposes.

besides many of the entities holding the data aren't at risk with its exposure (modulo data breach notification legislation), another problem is the enormous mismatch between the defenders and the attackers, the value of the information for large majority of the defenders is the profit from the transaction (potentially a couple dollars) while the value of the information to the attackers can be two orders of magnitude larger (100 times or more), from fraudulent transactions draining the accounts (security proportional to risk metaphor).

in the 90s, there was work on slightly tweaking the paradigm so that exposure of the information was no longer a risk - it didn't do anything to eliminate breaches - it just eliminated the ability for crooks to use the harvested information (breaches, skimming, evesdropping, etc) for performing fraudulent transactions (eliminating criminal motivation for such activities). for various reasons, the solutions have yet to be deployed. there have been a number of metaphors attempting to illustrate various aspects of the current environment - one such dual-use - information exists at millions of locations & required to be available for large number of business processes, so even if planet was buried under miles of information hiding encryption, it couldn't stop leakage.

past posts mentioning the dual-use metaphor
http://www.garlic.com/~lynn/aadsm22.htm#2 GP4.3 - Growth and Fraud - Case #3 - Phishing
http://www.garlic.com/~lynn/aadsm22.htm#36 Unforgeable Blinded Credentials
http://www.garlic.com/~lynn/aadsm24.htm#38 Interesting bit of a quote
http://www.garlic.com/~lynn/aadsm24.htm#48 more on FBI plans new Net-tapping push
http://www.garlic.com/~lynn/aadsm25.htm#13 Sarbanes-Oxley is what you get when you don't do FC
http://www.garlic.com/~lynn/aadsm26.htm#8 What is the point of encrypting information that is publicly visible?
http://www.garlic.com/~lynn/aadsm27.htm#3 Solution to phishing -- an idea who's time has come?
http://www.garlic.com/~lynn/aadsm28.htm#1 2008: The year of hack the vote?
http://www.garlic.com/~lynn/aadsm28.htm#19 Lack of fraud reporting paths considered harmful
http://www.garlic.com/~lynn/2005u.html#3 PGP Lame question
http://www.garlic.com/~lynn/2005v.html#2 ABN Tape - Found
http://www.garlic.com/~lynn/2006e.html#26 Debit Cards HACKED now
http://www.garlic.com/~lynn/2006h.html#15 Security
http://www.garlic.com/~lynn/2006o.html#37 the personal data theft pandemic continues
http://www.garlic.com/~lynn/2006p.html#8 SSL, Apache 2 and RSA key sizes
http://www.garlic.com/~lynn/2006t.html#40 Encryption and authentication
http://www.garlic.com/~lynn/2006u.html#43 New attacks on the financial PIN processing
http://www.garlic.com/~lynn/2006v.html#2 New attacks on the financial PIN processing
http://www.garlic.com/~lynn/2006v.html#49 Patent buster for a method that increases password security
http://www.garlic.com/~lynn/2006y.html#25 "The Elements of Programming Style"
http://www.garlic.com/~lynn/2007b.html#8 Special characters in passwords was Re: RACF - Password rules
http://www.garlic.com/~lynn/2007b.html#20 How many 36-bit Unix ports in the old days?
http://www.garlic.com/~lynn/2007b.html#60 Securing financial transactions a high priority for 2007
http://www.garlic.com/~lynn/2007c.html#10 Securing financial transactions a high priority for 2007
http://www.garlic.com/~lynn/2007c.html#33 Securing financial transactions a high priority for 2007
http://www.garlic.com/~lynn/2007c.html#53 Securing financial transactions a high priority for 2007
http://www.garlic.com/~lynn/2007d.html#34 Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
http://www.garlic.com/~lynn/2007e.html#26 Securing financial transactions a high priority for 2007
http://www.garlic.com/~lynn/2007f.html#75 Securing financial transactions a high priority for 2007
http://www.garlic.com/~lynn/2007g.html#20 T.J. Maxx data theft worse than first reported
http://www.garlic.com/~lynn/2007i.html#65 John W. Backus, 82, Fortran developer, dies
http://www.garlic.com/~lynn/2007k.html#76 My Dream PC -- Chip-Based
http://www.garlic.com/~lynn/2007n.html#85 PCI Compliance - Encryption of all non-console administrative access
http://www.garlic.com/~lynn/2007o.html#28 EZPass: Yes, Big Brother IS Watching You!
http://www.garlic.com/~lynn/2007r.html#21 Is the media letting banks off the hook on payment card security
http://www.garlic.com/~lynn/2007r.html#24 How to tell a fake SSL certificate from a real one
http://www.garlic.com/~lynn/2007s.html#16 The new urgency to fix online privacy
http://www.garlic.com/~lynn/2007v.html#60 Credit Card Details
http://www.garlic.com/~lynn/2007v.html#70 folklore indeed
http://www.garlic.com/~lynn/2007v.html#74 folklore indeed
http://www.garlic.com/~lynn/2008d.html#9 Toyota Sales for 2007 May Surpass GM
http://www.garlic.com/~lynn/2008i.html#21 Worst Security Threats?
http://www.garlic.com/~lynn/2008i.html#101 We're losing the battle
http://www.garlic.com/~lynn/2008m.html#70 Why SSNs Are Not Appropriate for Authentication and when, where and why should you offer/use it?
http://www.garlic.com/~lynn/2008n.html#75 Should online transactions be allowed on credit cards without adequate safeguards?
http://www.garlic.com/~lynn/2008n.html#90 Credit Card Security
http://www.garlic.com/~lynn/2008o.html#13 What risk of possible data leakage do you see for your organization?
http://www.garlic.com/~lynn/2008o.html#22 What risk of possible data leakage do you see for your organization?
http://www.garlic.com/~lynn/2008o.html#76 Blinkenlights
http://www.garlic.com/~lynn/2008p.html#5 Privacy, Identity theft, account fraud
http://www.garlic.com/~lynn/2008p.html#7 Dealing with the neew MA ID protection law
http://www.garlic.com/~lynn/2008p.html#59 Can Smart Cards Reduce Payments Fraud and Identity Theft?
http://www.garlic.com/~lynn/2008r.html#53 21 million German bank account details on black market
http://www.garlic.com/~lynn/2008s.html#10 Data leakage - practical measures to improve Information Governance
http://www.garlic.com/~lynn/2009.html#60 The 25 Most Dangerous Programming Errors
http://www.garlic.com/~lynn/2009f.html#36 PCI security rules may require reinforcements
http://www.garlic.com/~lynn/2009f.html#57 Data masking/data disguise Primer 1) WHY
http://www.garlic.com/~lynn/2009g.html#10 Top 10 Cybersecurity Threats for 2009, will they cause creation of highly-secure Corporate-wide Intranets?
http://www.garlic.com/~lynn/2009i.html#14 Online Banking's Innate Security Flaws
http://www.garlic.com/~lynn/2009i.html#53 Merchant Groups Ask for Broad Changes in Letter to PCI's Overseer
http://www.garlic.com/~lynn/2009j.html#11 Is anyone aware of a system that offers three layers of security and ID protection for online purchases or even over the counter POS purchases?
http://www.garlic.com/~lynn/2009j.html#13 PCI SSC Seeks Input on Security Standards
http://www.garlic.com/~lynn/2009j.html#26 Price Tag for End-to-End Encryption: $4.8 Billion, Mercator Says
http://www.garlic.com/~lynn/2009j.html#33 IBM touts encryption innovation
http://www.garlic.com/~lynn/2009j.html#41 How can we stop Credit card FRAUD?
http://www.garlic.com/~lynn/2009k.html#54 The satate of software
http://www.garlic.com/~lynn/2009k.html#60 The satate of software
http://www.garlic.com/~lynn/2009l.html#53 Hacker charges also an indictment on PCI, expert says
http://www.garlic.com/~lynn/2009m.html#13 PCI Council Releases Recommendations For Preventing Card-Skimming Attacks
http://www.garlic.com/~lynn/2009m.html#22 PCI SSC Seeks standard for End to End Encryption?
http://www.garlic.com/~lynn/2009n.html#36 The Compliance Spectrum...Reducing PCI DSS Scope
http://www.garlic.com/~lynn/2009r.html#29 Data Breaches Show PCI DSS Ineffective
http://www.garlic.com/~lynn/2009s.html#39 Six Months Later, MasterCard Softens a Controversial PCI Rule
http://www.garlic.com/~lynn/2010f.html#29 Cyberattacks raise e-banking security fears
http://www.garlic.com/~lynn/2010f.html#75 Is Security a Curse for the Cloud Computing Industry?
http://www.garlic.com/~lynn/2010g.html#84 In SSL We Trust? Not Lately
http://www.garlic.com/~lynn/2010i.html#25 Retailers blamed for making people vulnerable to credit card fraud and ID theft
http://www.garlic.com/~lynn/2010i.html#58 Cyber Self Defense: Reduce Your Attack Surface
http://www.garlic.com/~lynn/2010k.html#5 The Attacker's Advantage
http://www.garlic.com/~lynn/2010o.html#76 e-commerce smackdown as PCI standards revised

--
virtualization experience starting Jan1968, online at home since Mar1970

Do you remember back to June 23, 1969 when IBM unbundled

Refed: **, - **, - **, - **, - **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 27 Jun, 2011
Subject: Do you remember back to June 23, 1969 when IBM unbundled
Blog: IBMers
lots of past posts mentioning 23jun69
http://www.garlic.com/~lynn/submain.html#unbundle

I had been brought in summer of '69 to setup cp67 timesharing service ... 360/67 in machine room that had been for 360/30 that was used for payroll (early in the formation of what was to become boeing computer services). lots of politics with corporate dataprocessing taking over rest of division dataprocessing in boeing.... including renton datacenter. all summer of '69, 360/65s were arriving in renton faster than they could be installed ... pieces of machines were staged in halls around the external datacenter walls. The claim was that renton had several hundred million dollars of ibm 360s and the datacenter was being replicated up at 747 plant in Everett (disaster scenario where mt. rainier heats up, causes mud slide that takes out renton datacenter.

Corporate was next to "plant 2" .. recent reference:
http://www.rbogash.com/Plant%202/2Plant2.html
in "Greater IBM" discussion ... archived here
http://www.garlic.com/~lynn/2010q.html#59

I was undergraduate ... but that spring IBM had con'ed me in to giving a one week class for burgeoning BCS technical staff ... i was then hired as full-time boeing employee for the summer ... before going back to finish my degree.

The corporation did manage to make the case with the gov. that kernel software should still be free. In the 70s, the company took major detour down Future System ... which turned out to be major failure. The distraction of Future System is credited with letting the clone processors to gain market foothold. After the FS failure, there was mad rush to get things back in the 370 software & hardware product pipelines (which had been pretty much shutdown during FS). That contributed to decision for releasing a bunch of 370 stuff I had been doing all during the FS period (as well as ridiculing the FS activities).
http://www.garlic.com/~lynn/submain.html#futuresys

The clone processor competition then contributed to decision to transition to charging for kernel software and one of my pieces of kernel software was selected as guinea pig for kernel software charging (dynamic adaptive resource management ... much of the work I had originally done as undergraduate).
http://www.garlic.com/~lynn/subtopic.html#fairshare

The other thing done as part of starting to charge for SE services ... was how to do SE training and keep their skills sharp. New SEs were getting experience; sort of apprentice program, as part of large team at customer account. Much of that "hands-on" was effectively eliminated as part of unbundling. Part of the solution was several internal virtual machine cp67 datacenters with online access to branch office ... allowing SE to practice with operating systems (in virtual machine) ... i.e. hands-on network environment ... aka "HONE". misc. past posts mentioning HONE
http://www.garlic.com/~lynn/subtopic.html#hone

Science Center had also ported apl\360 to cms for cms\apl ... along with providing API for system services (like file i/o). Along with large virtual memory workspaces, this opened up real-word applications (apl\360 tended to 16kbyte to 32kbyte workspaces, no system services API). Early on business planners in Armonk loaded most valuable corporate data (customers) on the science center cp67 system and ran business modeling. At the same time, lots of sales&marketing support applications were being done in cms\apl and being deployed on HONE ... eventually coming to dominate all HONE activity (and SE virtual machine used disappearing).

For much of 70s and first part of 80s, one of my hobbies was providing enhanced operating systems for internal datacenters, including HONE. I even did some of the early HONE clone installations at various places around the world.

--
virtualization experience starting Jan1968, online at home since Mar1970

Do you remember back to June 23, 1969 when IBM unbundled

Refed: **, - **, - **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 28 Jun, 2011
Subject: Do you remember back to June 23, 1969 when IBM unbundled
Blog: IBMers
re:
http://www.garlic.com/~lynn/2011h.html#61 Do you remember back to June 23, 1969 when IBM unbundled

One of the other impacts of the unbundling announcement and gov. litigation was that software pricing had to cover its costs. software tended to have high upfront costs ... and so part of new product was business forecasting "high", "medium", and "low": price ... attempting to determine if product was price sensitive and could effect total number of customers (lower price might significantly increase number of customers helping to spread out the upfront development costs).

However, some of the development groups hadn't anticipated the change to software pricing and requirement to show profit ... and for some, it wasn't possible to show sufficient customers (at any price point) to cover the upfront development costs. As a result there were some number of bookkeeping/accounting slight-of-hand that were invented. One such was "combining" products ... with the development costs and revenue aggregated for the combination (instead of individual products). An example was JES2 networking which couldn't show break-even at any forecasted price. The ploy then was to treat it as a "joint" product with VM370 networking (which had a much larger forecasted install base and original development amounted to somewhat more than single person). It was then possible to come up with a combined customer forecast (& revenue) that covered the enormously larger JES2 development costs.

There were a number of such accounting/bookkeeping ploys ... especially when the product had been "deemed" strategic (in some cases product combinations that have no conceivable rational relation).

misc. past posts mentioning hasp, jes2, &/or hasp/jes2 networking
http://www.garlic.com/~lynn/submain.html#hasp

misc. past posts mentioning internal network (mostly vm370 ... larger than the arpanet/internet from just about the beginning until possibly late '85 or early '86)
http://www.garlic.com/~lynn/subnetwork.html#internalnet

another case of combining products
http://www.garlic.com/~lynn/2000d.html#17 Where's all the VMers?
http://www.garlic.com/~lynn/2001m.html#33 XEDIT on MVS
http://www.garlic.com/~lynn/2003k.html#0 VSPC
http://www.garlic.com/~lynn/2005t.html#40 FULIST
http://www.garlic.com/~lynn/2006k.html#50 TSO and more was: PDP-1
http://www.garlic.com/~lynn/2007g.html#17 The Perfect Computer - 36 bits?
http://www.garlic.com/~lynn/2007o.html#41 Virtual Storage implementation
http://www.garlic.com/~lynn/2007o.html#69 ServerPac Installs and dataset allocations
http://www.garlic.com/~lynn/2007t.html#55 new 40+ yr old, disruptive technology
http://www.garlic.com/~lynn/2008h.html#43 handling the SPAM on this group
http://www.garlic.com/~lynn/2009s.html#46 DEC-10 SOS Editor Intra-Line Editing
http://www.garlic.com/~lynn/2010g.html#6 Call for XEDIT freaks, submit ISPF requirements
http://www.garlic.com/~lynn/2010g.html#50 Call for XEDIT freaks, submit ISPF requirements
http://www.garlic.com/~lynn/2010k.html#54 Unix systems and Serialization mechanism
http://www.garlic.com/~lynn/2010m.html#84 Set numbers off permanently
http://www.garlic.com/~lynn/2011e.html#95 VM IS DEAD
http://www.garlic.com/~lynn/2011h.html#19 When is performance really an issue? Was: Running an ISPF applicction from one pds
http://www.garlic.com/~lynn/2011h.html#20 When is performance really an issue? Was: Running an ISPF applicction from one pds

--
virtualization experience starting Jan1968, online at home since Mar1970

Do you remember back to June 23, 1969 when IBM unbundled

Refed: **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 28 Jun, 2011
Subject: Do you remember back to June 23, 1969 when IBM unbundled
Blog: IBMers
re:
http://www.garlic.com/~lynn/2011h.html#61 Do you remember back to June 23, 1969 when IBM unbundled
http://www.garlic.com/~lynn/2011h.html#62 Do you remember back to June 23, 1969 when IBM unbundled

before unbundling ... it was somewhat in executives interest to have per employee productivity tend towards zero ... since their compensation was somewhat proportional to number of people in organization. it got somewhat more complex after unbundling since productivity had to meet some minimum threshold (in order to meet P&L) ... unless of course it was possible to have what they were doing declared "strategic" and then use accounting gimicks to subsidize their (low productivity) activities.

things were somewhat further complicated by FS effort not long after unbundling ... a massive project with hordes of employees & effectively lots of vaporware. FS politics significantly changed the corporate culture ... during FS, 370 efforts were shutdown (to eliminate competition) as well as other efforts to stifle criticism ... from Ferguson and Morris book (on IBM) there were references that IBM lived under dark shadow of the failure for decades, also reference to the old culture under Watsons was replaced with sycophancy and make no waves under Opel and Akers.

also this FS reference
http://people.cs.clemson.edu/~mark/fs.html

with another Ferguson & Morris quote:
Most corrosive of all, the old IBM candor died with F/S. Top management, particularly Opel, reacted defensively as F/S headed toward a debacle. The IBM culture that Watson had built was a harsh one, but it encouraged dissent and open controversy. But because of the heavy investment of face by the top management, F/S took years to kill, although its wrongheadedness was obvious from the very outset. "For the first time, during F/S, outspoken criticism became politically dangerous," recalls a former top executive.
... snip ...

past posts mentioning unbundling
http://www.garlic.com/~lynn/submain.html#unbundle

past posts mentioning FS
http://www.garlic.com/~lynn/submain.html#futuresys

--
virtualization experience starting Jan1968, online at home since Mar1970

SQL Injection Deemed No. 1 Software Flaw

From: lynn@garlic.com (Lynn Wheeler)
Date: 28 Jun, 2011
Subject: SQL Injection Deemed No. 1 Software Flaw
Blog: Financial Crime Risk, Fraud and Security
SQL Injection Deemed No. 1 Software Flaw
http://www.bankinfosecurity.com/articles.php?art_id=3796&rf=2011-06-28-eb

from above:
The most dangerous flaw in software coding these days allows for SQL injections that hackers use to penetrate databases and pilfer data such as user names, passwords and credit card information.

That's according to a list of the 25 most dangerous programming errors issued Monday by MITRE, the not-for-profit contractor that manages an array of federal government technology and engineering programs, and the SANS Institute, an organization that provides IT security training.

... snip ...

we were brought in to consult with small client/server startup that wanted to do payment transactions on their server, they had also invented this technology called "SSL" they wanted to use; the result is now frequently called "electronic commerce". misc. past posts about "payment gateway" part of doing "electronic commerce"
http://www.garlic.com/~lynn/subnetwork.html#gateway

We had worked with two of the people responsible for the "commerce server" in prior life ... they were in this referenced JAN92 meeting in Ellison's conference room
http://www.garlic.com/~lynn/95.html#13

fairly early on ... there showed strong differentiation regarding frequency of exploits between e-commerce servers that used RDBMS technology and those that didn't (somewhat supports claims about exploits proportional to complexity)

random archeological reference ... original RDBMS/SQL implementation was System/R ... some past posts
http://www.garlic.com/~lynn/submain.html#systemr

--
virtualization experience starting Jan1968, online at home since Mar1970

US Business Banking Cybercrime Wave: Is 'Commercially Reasonable' Reasonable?

Refed: **, - **, - **, - **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 28 Jun, 2011
Subject: US Business Banking Cybercrime Wave: Is 'Commercially Reasonable' Reasonable?
Blog: Financial Crime Risk, Fraud and Security
US Business Banking Cybercrime Wave: Is 'Commercially Reasonable' Reasonable?
http://ffiec.bankinfosecurity.com/whitepapers.php?wp_id=463&rf=2011-06-28-wp-bttn

from above:
This TowerGroup Research Note addresses the growing issue of targeted attacks by cybercriminals on business banking customers. As the sophistication of cybercriminal organizations has developed, they have begun attacking businesses with techniques such as phishing and "man in the middle" Trojan horses, techniques previously directed primarily at consumer banking applications.
... snip ...

industry conferences in the early-to-mid 90s had presentations by consumer dial-up online banking operations about moving to the internet. a big issue was the significant cost of operating proprietary dialup, online infrastructure (one operation claimed to be carrying/supporting library of over sixty modem drivers with constant customer support, compatibility and maintenance issues. The migration to internet for consumer online banking basically/effectively turned over all those infrastructure support problems to ISPs.

at the same time, the commercial/cash-management dialup online operations were claiming that they would NEVER move to the internet because of the significant security problems. in past couple years one of the commendations for business online banking is to have a separate, dedicated PC that is only used for online banking and NEVER used for anything else. This would be a countermeasure to some number of the exploits and partially returns to the old, dialup online banking days

misc. past posts mentioning commerical dialup online operations:
http://www.garlic.com/~lynn/aadsm27.htm#35 The bank fraud blame game
http://www.garlic.com/~lynn/2002h.html#5 Coulda, Woulda, Shoudda moments?
http://www.garlic.com/~lynn/2005p.html#28 Canon Cat for Sale
http://www.garlic.com/~lynn/2006b.html#39 another blast from the past
http://www.garlic.com/~lynn/2007m.html#68 Operating systems are old and busted
http://www.garlic.com/~lynn/2007n.html#17 What if phone company had developed Internet?
http://www.garlic.com/~lynn/2007n.html#37 FastTCP Commercialized Into An FTP Appliance
http://www.garlic.com/~lynn/2007u.html#11 Public Computers
http://www.garlic.com/~lynn/2008i.html#7 Annoying Processor Pricing
http://www.garlic.com/~lynn/2008j.html#61 German court finds Bank responsible for malwared PC
http://www.garlic.com/~lynn/2008k.html#85 IBM-MAIN longevity
http://www.garlic.com/~lynn/2008m.html#19 IBM-MAIN longevity
http://www.garlic.com/~lynn/2009c.html#57 Western Union history--data communications passed it by
http://www.garlic.com/~lynn/2009l.html#2 Cyber attackers empty business accounts in minutes
http://www.garlic.com/~lynn/2009l.html#61 Hacker charges also an indictment on PCI, expert says
http://www.garlic.com/~lynn/2009l.html#64 Hacker charges also an indictment on PCI, expert says
http://www.garlic.com/~lynn/2009m.html#9 Cyber crooks increasingly target small business accounts
http://www.garlic.com/~lynn/2009m.html#68 Definition of a computer?
http://www.garlic.com/~lynn/2009m.html#70 Client Certificate UI for Chrome?
http://www.garlic.com/~lynn/2009m.html#73 Definition of a computer?
http://www.garlic.com/~lynn/2009m.html#83 A Faster Way to the Cloud
http://www.garlic.com/~lynn/2009n.html#3 Hacker charges also an indictment on PCI, expert says
http://www.garlic.com/~lynn/2009q.html#59 EU agency runs rule over ID cards for online banking logins
http://www.garlic.com/~lynn/2010b.html#18 security and online banking
http://www.garlic.com/~lynn/2010b.html#21 security and online banking
http://www.garlic.com/~lynn/2010b.html#54 ISPs could cut spam easily, says expert
http://www.garlic.com/~lynn/2010c.html#72 Users still make hacking easy with weak passwords
http://www.garlic.com/~lynn/2010c.html#79 Customers risk online banking fraud by reusing bank credentials
http://www.garlic.com/~lynn/2010c.html#86 NY Town's Bank Account Hacked; Poughkeepsie Loses $378K in Fraudulent Transfers
http://www.garlic.com/~lynn/2010d.html#30 Michigan firm sues bank over theft of $560,000
http://www.garlic.com/~lynn/2010f.html#6 Online Banking & Password Theft
http://www.garlic.com/~lynn/2010f.html#92 Why do most websites use HTTPS only while logging you in...and not for the entire session?
http://www.garlic.com/~lynn/2010i.html#66 Global CIO: Global Banks Form Consortium To Counter HP, IBM, & Oracle
http://www.garlic.com/~lynn/2010j.html#35 IBM Rational Developer for System z
http://www.garlic.com/~lynn/2010j.html#41 Monet, was Re: A "portable" hard disk
http://www.garlic.com/~lynn/2010m.html#38 U.K. bank hit by massive fraud from ZeuS-based botnet
http://www.garlic.com/~lynn/2010m.html#53 Is the ATM still the banking industry's single greatest innovation?
http://www.garlic.com/~lynn/2010m.html#65 How Safe Are Online Financial Transactions?
http://www.garlic.com/~lynn/2010m.html#82 Nearly $1,000,000 stolen electronically from the University of Virginia
http://www.garlic.com/~lynn/2010m.html#87 Nearly $1,000,000 stolen electronically from the University of Virginia
http://www.garlic.com/~lynn/2010n.html#47 ZeuS attacks mobiles in bank SMS bypass scam
http://www.garlic.com/~lynn/2010q.html#35 VMSHARE Archives
http://www.garlic.com/~lynn/2011d.html#13 I actually miss working at IBM
http://www.garlic.com/~lynn/2011g.html#22 An online bank scam worthy of a spy novel
http://www.garlic.com/~lynn/2011g.html#27 TELSTAR satellite experiment
http://www.garlic.com/~lynn/2011g.html#48 Is the magic and romance killed by Windows (and Linux)?
http://www.garlic.com/~lynn/2011h.html#4 1st round in Internet Account Fraud World Cup: Customer 0, Bank 1, Attacker 300,000

--
virtualization experience starting Jan1968, online at home since Mar1970

Senate Democrats Ask House to Boost SEC Funding

Refed: **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **
From: lynn@garlic.com (Lynn Wheeler)
Date: 28 Jun, 2011
Subject: Senate Democrats Ask House to Boost SEC Funding
Blog: Financial Crime Risk, Fraud and Security
Senate Democrats Ask House to Boost SEC Funding
http://www.mainjustice.com/2011/06/28/senate-democrats-say-house-is-starving-sec/

from above:
Saying that House Republicans are short-changing the Securities and Exchange Commission, Senate Democrats called on House appropriators to boost its funding to help combat financial crime and avert another financial crisis.
... snip ...

This may have been also going on the whole past decade, based on testimony in Madoff hearings by person that had tried for a decade to get SEC to do something about Madoff and the GAO reports showing uptick in public company fraudulent financial filings (even after passage of Sarbanes-Oxley)

recently seen on the internet: Enron was a dry run and it worked so well it has become institutionalized

misc. past posts mentioning Madoff hearings and/or GAO reports on (SEC) public company fraudulent financial filings
http://www.garlic.com/~lynn/2008f.html#96 Bush - place in history
http://www.garlic.com/~lynn/2008k.html#25 IBM's 2Q2008 Earnings
http://www.garlic.com/~lynn/2009b.html#25 The recently revealed excesses of John Thain, the former CEO of Merrill Lynch, while the firm was receiving $25 Billion in TARP funds makes me sick
http://www.garlic.com/~lynn/2009b.html#36 A great article was posted in another BI group: "To H*** with Business Intelligence: 40 Percent of Execs Trust Gut"
http://www.garlic.com/~lynn/2009b.html#48 The blame game is on : A blow to the Audit/Accounting Industry or a lesson learned ???
http://www.garlic.com/~lynn/2009b.html#49 US disaster, debts and bad financial management
http://www.garlic.com/~lynn/2009b.html#52 What has the Global Financial Crisis taught the Nations, it's Governments and Decision Makers, and how should they apply that knowledge to manage risks differently in the future?
http://www.garlic.com/~lynn/2009b.html#53 Credit & Risk Management ... go Simple ?
http://www.garlic.com/~lynn/2009b.html#54 In your opinion, which facts caused the global crise situation?
http://www.garlic.com/~lynn/2009b.html#73 What can we learn from the meltdown?
http://www.garlic.com/~lynn/2009b.html#80 How to defeat new telemarketing tactic
http://www.garlic.com/~lynn/2009c.html#0 Audit II: Two more scary words: Sarbanes-Oxley
http://www.garlic.com/~lynn/2009c.html#20 Decision Making or Instinctive Steering?
http://www.garlic.com/~lynn/2009c.html#29 How to defeat new telemarketing tactic
http://www.garlic.com/~lynn/2009d.html#0 PNC Financial to pay CEO $3 million stock bonus
http://www.garlic.com/~lynn/2009d.html#3 Congress Set to Approve Pay Cap of $500,000
http://www.garlic.com/~lynn/2009d.html#37 NEW SEC (Enforcement) MANUAL, A welcome addition
http://www.garlic.com/~lynn/2009d.html#42 Bernard Madoff Is Jailed After Pleading Guilty -- are there more "Madoff's" out there?
http://www.garlic.com/~lynn/2009d.html#47 Bernard Madoff Is Jailed After Pleading Guilty -- are there more "Madoff's" out there?
http://www.garlic.com/~lynn/2009d.html#61 Quiz: Evaluate your level of Spreadsheet risk
http://www.garlic.com/~lynn/2009d.html#62 Is Wall Street World's Largest Ponzi Scheme where Madoff is Just a Poster Child?
http://www.garlic.com/~lynn/2009d.html#63 Do bonuses foster unethical conduct?
http://www.garlic.com/~lynn/2009d.html#73 Should Glass-Steagall be reinstated?
http://www.garlic.com/~lynn/2009e.html#36 Architectural Diversity
http://www.garlic.com/~lynn/2009e.html#37 How do you see ethics playing a role in your organizations current or past?
http://www.garlic.com/~lynn/2009e.html#53 Are the "brightest minds in finance" finally onto something?
http://www.garlic.com/~lynn/2009f.html#2 CEO pay sinks - Wall Street Journal/Hay Group survey results just released
http://www.garlic.com/~lynn/2009f.html#29 What is the real basis for business mess we are facing today?
http://www.garlic.com/~lynn/2009f.html#51 On whom or what would you place the blame for the sub-prime crisis?
http://www.garlic.com/~lynn/2009f.html#67 Just posted third article about toxic assets in a series on the current financial crisis
http://www.garlic.com/~lynn/2009g.html#7 Just posted third article about toxic assets in a series on the current financial crisis
http://www.garlic.com/~lynn/2009g.html#29 Transparency and Visibility
http://www.garlic.com/~lynn/2009g.html#33 Treating the Web As an Archive
http://www.garlic.com/~lynn/2009h.html#17 REGULATOR ROLE IN THE LIGHT OF RECENT FINANCIAL SCANDALS
http://www.garlic.com/~lynn/2009i.html#60 In the USA "financial regulator seeks power to curb excess speculation."
http://www.garlic.com/~lynn/2009j.html#12 IBM identity manager goes big on role control
http://www.garlic.com/~lynn/2009j.html#30 An Amazing Document On Madoff Said To Have Been Sent To SEC In 2005
http://www.garlic.com/~lynn/2009o.html#71 "Rat Your Boss" or "Rats to Riches," the New SEC
http://www.garlic.com/~lynn/2009s.html#47 Audits VII: the future of the Audit is in your hands
http://www.garlic.com/~lynn/2010h.html#15 The Revolving Door and S.E.C. Enforcement
http://www.garlic.com/~lynn/2010h.html#16 The Revolving Door and S.E.C. Enforcement
http://www.garlic.com/~lynn/2010h.html#31 In the News: SEC storms the 'Castle'
http://www.garlic.com/~lynn/2010h.html#41 Profiling of fraudsters
http://www.garlic.com/~lynn/2010h.html#67 The Python and the Mongoose: it helps if you know the rules of engagement
http://www.garlic.com/~lynn/2010i.html#34 Idiotic programming style edicts
http://www.garlic.com/~lynn/2010i.html#84 Idiotic programming style edicts
http://www.garlic.com/~lynn/2010k.html#46 Snow White and the Seven Dwarfs
http://www.garlic.com/~lynn/2010l.html#38 Who is Really to Blame for the Financial Crisis?
http://www.garlic.com/~lynn/2010n.html#35 Idiotic programming style edicts
http://www.garlic.com/~lynn/2010o.html#37 WHAT, WHY AND HOW - FRAUD, IMPACT OF AUDIT
http://www.garlic.com/~lynn/2010o.html#71 They always think we don't understand
http://www.garlic.com/~lynn/2010p.html#6 What banking is. (Essential for predicting the end of finance as we know it.)
http://www.garlic.com/~lynn/2010p.html#7 What banking is. (Essential for predicting the end of finance as we know it.)
http://www.garlic.com/~lynn/2010p.html#68 TCM's Moguls documentary series
http://www.garlic.com/~lynn/2010q.html#31 Ernst & Young sued for fraud over Lehman
http://www.garlic.com/~lynn/2011b.html#21 New-home sales in 2010 fall to lowest in 47 years
http://www.garlic.com/~lynn/2011b.html#42 Productivity And Bubbles
http://www.garlic.com/~lynn/2011e.html#36 On Protectionism
http://www.garlic.com/~lynn/2011f.html#35 At least two decades back, some gurus predicted that mainframes would disappear
http://www.garlic.com/~lynn/2011f.html#82 Bank email archives thrown open in financial crash report
http://www.garlic.com/~lynn/2011f.html#88 Court OKs Firing of Boeing Computer-Security Whistleblowers
http://www.garlic.com/~lynn/2011g.html#5 How they failed to catch Madoff
http://www.garlic.com/~lynn/2011g.html#47 Lords: Auditors guilty of 'dereliction of duty'
http://www.garlic.com/~lynn/2011g.html#52 Enron: The Smartest Guys in the Room

--
virtualization experience starting Jan1968, online at home since Mar1970

Happy 100th Birthday, IBM!

Refed: **, - **, - **
From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Happy 100th Birthday, IBM!
Newsgroups: alt.folklore.computers
Date: Thu, 30 Jun 2011 09:52:08 -0400
Peter Flass <Peter_Flass@Yahoo.com> writes:
Many immigrants to the US came here intending to make a pile of money and go back home. I think a few might have actually done this, but not too many.

a survey from more than a decade ago ... found whole corporate advanced technology depts populated by foreigners that had been sent(/funded) by their govs. to univ & graduate school in US and who were then suppose to join corpoations and work in certain areas for 5-8yrs and then return home (technology transfer back to their home company).

more recently, multinationals have just moved these depts overseas.

in the early 90s, half the advanced tech. degrees at cal. institutions of higher education went to foreigners and appeared to be proportionally represented in the internet bubble (possibly half of the skills making internet bubble possible coming from overseas).

Y2K remediation was competing for skills/resources at the same time as the internet bubble ... and corporations frequently had to go overseas for Y2K remediation. Lots of corporate nuts&bolts dataprocessing having gone overseas as part of Y2K ... stayed there. Nobody really paid any attention until after internet bubble deflated ... and some number attempting to return to former corporate dataprocessing jobs found that they had gone overseas.

Transition over the past two decades has seen increasing percentage of high-tech jobs (because of number of factors) being in other countries.

The Org Charts Of All The Major Tech Companies (Humor)
http://www.businessinsider.com/big-tech-org-charts-2011-6

in the comment section, (at least somebody claiming to be) Sam Palmisano (IBM CEO):
IBM's is a map of the US and India, with a single line from Armonk to Bangladore.
... snip ...

Past posts mentioning Y2K remediation competing with internet bubble and being forced to go overseas accelerating high-tech jobs leaving US (from the positions being in US staffed by foreigners to the positions being in foreign countries staffed by foreigners).
http://www.garlic.com/~lynn/99.html#21 Roads as Runways Was: Re: BA Solves Y2K (Was: Re: Chinese Solve Y2K)
http://www.garlic.com/~lynn/99.html#22 Roads as Runways Was: Re: BA Solves Y2K (Was: Re: Chinese Solve Y2K)
http://www.garlic.com/~lynn/99.html#23 Roads as Runways Was: Re: BA Solves Y2K (Was: Re: Chinese Solve Y2K)
http://www.garlic.com/~lynn/99.html#24 BA Solves Y2K (Was: Re: Chinese Solve Y2K)
http://www.garlic.com/~lynn/99.html#27 Roads as Runways Was: Re: BA Solves Y2K (Was: Re: Chinese
http://www.garlic.com/~lynn/99.html#78 Mainframes Relevant?
http://www.garlic.com/~lynn/99.html#214 Ask about Certification-less Public Key
http://www.garlic.com/~lynn/2000.html#0 2000 = millennium?
http://www.garlic.com/~lynn/2001.html#68 California DMV
http://www.garlic.com/~lynn/2001n.html#74 The demise of compaq
http://www.garlic.com/~lynn/2002.html#30 Younger recruits versus experienced veterans ( was Re: The demise of compa
http://www.garlic.com/~lynn/2002.html#45 VM and/or Linux under OS/390?????
http://www.garlic.com/~lynn/2002k.html#14 NASA MOC (mainframe mission operations computer) being powere d
http://www.garlic.com/~lynn/2002l.html#49 Do any architectures use instruction count instead of timer
http://www.garlic.com/~lynn/2003p.html#21 Sun researchers: Computers do bad math ;)
http://www.garlic.com/~lynn/2003p.html#33 [IBM-MAIN] NY Times editorial on white collar jobs going
http://www.garlic.com/~lynn/2004b.html#2 The SOB that helped IT jobs move to India is dead!
http://www.garlic.com/~lynn/2004e.html#48 Data Display & Modeling
http://www.garlic.com/~lynn/2004f.html#39 Who said "The Mainframe is dead"?
http://www.garlic.com/~lynn/2004o.html#66 Integer types for 128-bit addressing
http://www.garlic.com/~lynn/2004q.html#13 [Lit.] Buffer overruns
http://www.garlic.com/~lynn/2005.html#20 I told you ... everybody is going to Dalian,China
http://www.garlic.com/~lynn/2005c.html#6 [Lit.] Buffer overruns
http://www.garlic.com/~lynn/2005s.html#16 Is a Hurricane about to hit IBM ?
http://www.garlic.com/~lynn/2006b.html#29 IBM 610 workstation computer
http://www.garlic.com/~lynn/2006c.html#33 Military Time?
http://www.garlic.com/~lynn/2006g.html#21 Taxes
http://www.garlic.com/~lynn/2006o.html#9 Pa Tpk spends $30 million for "Duet" system; but benefits are unknown
http://www.garlic.com/~lynn/2006r.html#16 Was FORTRAN buggy?
http://www.garlic.com/~lynn/2006s.html#40 Ranking of non-IBM mainframe builders?
http://www.garlic.com/~lynn/2006u.html#35 Friday fun - Discovery on the pad and the software's not done
http://www.garlic.com/~lynn/2007b.html#26 How many 36-bit Unix ports in the old days?
http://www.garlic.com/~lynn/2007g.html#7 U.S. Cedes Top Spot in Global IT Competitiveness
http://www.garlic.com/~lynn/2007g.html#39 Wylbur and Paging
http://www.garlic.com/~lynn/2007h.html#10 The Perfect Computer - 36 bits?
http://www.garlic.com/~lynn/2007l.html#18 Non-Standard Mainframe Language?
http://www.garlic.com/~lynn/2007p.html#31 Newsweek article--baby boomers and computers
http://www.garlic.com/~lynn/2007p.html#39 India is outsourcing jobs as well
http://www.garlic.com/~lynn/2007r.html#26 The new urgency to fix online privacy
http://www.garlic.com/~lynn/2007r.html#36 Students mostly not ready for math, science college courses
http://www.garlic.com/~lynn/2007t.html#19 Translation of IBM Basic Assembler to C?
http://www.garlic.com/~lynn/2007v.html#5 IPv6 vs Y2K and GOSIP
http://www.garlic.com/~lynn/2008.html#57 Computer Science Education: Where Are the Software Engineers of Tomorrow?
http://www.garlic.com/~lynn/2008.html#73 Computer Science Education: Where Are the Software Engineers of Tomorrow?
http://www.garlic.com/~lynn/2008f.html#81 Is IT becoming extinct?
http://www.garlic.com/~lynn/2008i.html#65 How do you manage your value statement?
http://www.garlic.com/~lynn/2008l.html#38 dollar coins
http://www.garlic.com/~lynn/2008n.html#27 VMware Chief Says the OS Is History
http://www.garlic.com/~lynn/2008q.html#55 Can outsourcing be stopped?
http://www.garlic.com/~lynn/2009.html#16 Date arithmetic and Zune bug
http://www.garlic.com/~lynn/2009d.html#2 IBM 'pulls out of US'
http://www.garlic.com/~lynn/2009f.html#60 Cobol hits 50 and keeps counting
http://www.garlic.com/~lynn/2009f.html#64 Cobol hits 50 and keeps counting
http://www.garlic.com/~lynn/2009i.html#9 Why are z/OS people reluctant to use z/OS UNIX?
http://www.garlic.com/~lynn/2009k.html#18 A Complete History Of Mainframe Computing
http://www.garlic.com/~lynn/2009l.html#37 Disksize history question
http://www.garlic.com/~lynn/2009n.html#53 Long parms...again
http://www.garlic.com/~lynn/2009o.html#37 Young Developers Get Old Mainframers' Jobs
http://www.garlic.com/~lynn/2009o.html#63 U.S. students behind in math, science, analysis says
http://www.garlic.com/~lynn/2009o.html#67 I would like to understand the professional job market in US. Is it shrinking?
http://www.garlic.com/~lynn/2010.html#78 y2k10 problem with credit cards in Germany
http://www.garlic.com/~lynn/2010i.html#53 Of interest to the Independent Contractors on the list
http://www.garlic.com/~lynn/2010i.html#65 Of interest to the Independent Contractors on the list
http://www.garlic.com/~lynn/2010j.html#19 Personal use z/OS machines was Re: Multiprise 3k for personal Use?
http://www.garlic.com/~lynn/2010n.html#76 Mainframe hacking?
http://www.garlic.com/~lynn/2010o.html#41 60 Minutes News Report:Unemployed for over 99 weeks!
http://www.garlic.com/~lynn/2010p.html#39 TCM's Moguls documentary series
http://www.garlic.com/~lynn/2010q.html#44 Programmer Charged with thieft (maybe off topic)
http://www.garlic.com/~lynn/2010q.html#69 No command, and control
http://www.garlic.com/~lynn/2011.html#32 CMS Sort Descending?
http://www.garlic.com/~lynn/2011.html#87 Date representations: Y2k revisited
http://www.garlic.com/~lynn/2011b.html#75 If IBM Hadn't Bet the Company
http://www.garlic.com/~lynn/2011f.html#86 Bank email archives thrown open in financial crash report

--
virtualization experience starting Jan1968, online at home since Mar1970

IBM Mainframe (1980's) on You tube

Refed: **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **
From: lynn@GARLIC.COM (Anne & Lynn Wheeler)
Subject: Re: IBM Mainframe (1980's) on You tube
Newsgroups: bit.listserv.ibm-main
Date: 30 Jun 2011 07:17:19 -0700
ps2os2@YAHOO.COM (Ed Gould) writes:
Another topic. What was the IBM # for the specialized processor engines that were something like AP's (but weren't) on the 3090. I keep coming up with a 3088, but I know thats not correct. If I could remember more I could google but the number is just not coming forth.

The real question is did anyone know of any that were used (if so for what?).


3088 was trotter ... 8-arm channel-to-channel

there were the vm/4361s that ran special modified version of vm370 release 6 that were the "service processors" on the 3090 ... aka 3092
http://www.garlic.com/~lynn/2004p.html#37 IBM 3614 and 3624 ATM's
http://www.garlic.com/~lynn/2008i.html#10 Different Implementations of VLIW
http://www.garlic.com/~lynn/2009b.html#22 Evil weather
http://www.garlic.com/~lynn/2009e.html#50 Mainframe Hall of Fame: 17 New Members Added
http://www.garlic.com/~lynn/2011c.html#71 IBM and the Computer Revolution
http://www.garlic.com/~lynn/2011e.html#62 3090 ... announce 12Feb85
http://www.garlic.com/~lynn/2011f.html#31 TCP/IP Available on MVS When?
http://www.garlic.com/~lynn/2011f.html#32 At least two decades back, some gurus predicted that mainframes would disappear
http://www.garlic.com/~lynn/2011f.html#42 At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened

3090 had "VF" vector processor facility feature ... misc. past posts mentioning 3090VF
http://www.garlic.com/~lynn/2000c.html#61 TF-1
http://www.garlic.com/~lynn/2002i.html#12 CDC6600 - just how powerful a machine was it?
http://www.garlic.com/~lynn/2003g.html#68 IBM zSeries in HPC
http://www.garlic.com/~lynn/2005m.html#20 simd for 390(or z990)?
http://www.garlic.com/~lynn/2006m.html#4 The Power of the NORC
http://www.garlic.com/~lynn/2007.html#45 Just another example of mainframe costs
http://www.garlic.com/~lynn/2007.html#46 How many 36-bit Unix ports in the old days?
http://www.garlic.com/~lynn/2007q.html#55 IBM Z6 processor

3090 was trout1.5 ... misc. past posts w/old email discussing trout1.5
http://www.garlic.com/~lynn/2003j.html#42 Flash 10208
http://www.garlic.com/~lynn/2006j.html#27 virtual memory
http://www.garlic.com/~lynn/2009r.html#49 "Portable" data centers
http://www.garlic.com/~lynn/2010e.html#44 Need tool to zap core
http://www.garlic.com/~lynn/2010k.html#72 "SIE" on a RISC architecture
http://www.garlic.com/~lynn/2010m.html#55 z millicode: where does it reside?

long ago and far away, my wife had been con'ed into going to POK to be responsible for loosely-coupled architecture. While there there were ongoing skirmishes and temporary truces over mandate to use SNA for loosely-coupled operation (temporary truce would be that she could use anything she wanted within the walls of the datacenter but the communication group own corporate strategic responsibility for everything that cross datacenter walls). While there, she also developed peer-coupled shared data architecture which saw little uptake until sysplex (except for IMS hot-standby) as well as enhancements to 3088 that improved its use for loosely-coupled operation (which didn't ship). misc. past posts reference peer-coupled shared data architecture
http://www.garlic.com/~lynn/submain.html#shareddata

there was internal effort that used 3088 with cluster of eight vm/4341s for processor complex ... but before they were able to ship as product, they had to convert the interprocessor communication to SNA ... and cluster operations that had taken small faction of a second elapsed time, went to large fraction of a minute. misc. past posts mentioning trotter
http://www.garlic.com/~lynn/2001b.html#73 7090 vs. 7094 etc.
http://www.garlic.com/~lynn/2002e.html#25 Crazy idea: has it been done?
http://www.garlic.com/~lynn/2002f.html#6 Blade architectures
http://www.garlic.com/~lynn/2002h.html#26 Future architecture
http://www.garlic.com/~lynn/2003d.html#67 unix
http://www.garlic.com/~lynn/2003i.html#70 A few Z990 Gee-Wiz stats
http://www.garlic.com/~lynn/2004p.html#49 History of C
http://www.garlic.com/~lynn/2005.html#11 CAS and LL/SC
http://www.garlic.com/~lynn/2005n.html#7 54 Processors?
http://www.garlic.com/~lynn/2006c.html#43 IBM 610 workstation computer
http://www.garlic.com/~lynn/2006j.html#31 virtual memory
http://www.garlic.com/~lynn/2006k.html#21 Sending CONSOLE/SYSLOG To Off-Mainframe Server
http://www.garlic.com/~lynn/2006l.html#4 Google Architecture
http://www.garlic.com/~lynn/2006r.html#4 Was FORTRAN buggy?
http://www.garlic.com/~lynn/2007j.html#71 John W. Backus, 82, Fortran developer, dies
http://www.garlic.com/~lynn/2007o.html#72 FICON tape drive?
http://www.garlic.com/~lynn/2008d.html#64 Interesting ibm about the myths of the Mainframe
http://www.garlic.com/~lynn/2008e.html#73 Convergent Technologies vs Sun
http://www.garlic.com/~lynn/2008o.html#57 Virtual
http://www.garlic.com/~lynn/2008r.html#72 Curiousity: largest parallel sysplex around?
http://www.garlic.com/~lynn/2010f.html#14 What was the historical price of a P/390?
http://www.garlic.com/~lynn/2010j.html#14 Multiprise 3k for personal Use?

--
virtualization experience starting Jan1968, online at home since Mar1970

IBM Mainframe (1980's) on You tube

Refed: **, - **, - **, - **, - **, - **, - **, - **
From: lynn@GARLIC.COM (Anne & Lynn Wheeler)
Subject: Re: IBM Mainframe (1980's) on You tube
Newsgroups: bit.listserv.ibm-main
Date: 30 Jun 2011 07:57:17 -0700
mike.a.schwab@GMAIL.COM (Mike Schwab) writes:
Vector processors. Instruction Op-codes were re-used for z/Series.

So Hercules was consolidated into 3 models. Latest S/370 with 64MB real, XA through S/390 with vector, and z/Series. Earlier models would run on the last model, just the software would not use instructions for after the model they were coded for. I think they are even trying for a S/360-67 for Multics with virtual memory add-on.


some number of people from CTSS (ibm 7094) went to science center on the 4th floor, 545 tech sq, and did cp40 on 360/40 with specially modified virtual memory hardware (they had originally tried for a 360/50, but all the spare 360/50s were going to the FAA air traffic control effort) misc. past posts mentioning 545 tech sq
http://www.garlic.com/~lynn/subtopic.html#545

some number of other people from CTSS went to Project Mac/Multics on 5th floor.

the science center was pushing hard that Project Mac select 360/67 (standard IBM product with virtual memory support, basically 360/65 with the virtual memory hardware add-on) for Multics. However, Project Mac selected GE645 for Multics. IBM (also) started official time-sharing TSS/360 product for 360/67. The science center worked on morphing cp40 into cp67 for 360/67 (in parallel with tss/360 ... folklore is cp67 at one point had 12 people working on cp/67 at the same time that tss/360 had 100 times more ... approx 1200 people). There was various internal politics between the tss/360 group and the (virtual machine) cp67 group at the science center. Quite a bit of that early history is covered in Melinda's paper ... original in multipart postscript
http://www.leeandmelindavarian.com/Melinda/
recently I sent Melinda a merged single file PDF version
http://www.leeandmelindavarian.com/Melinda/neuvm.pdf
and a kindle version
http://www.leeandmelindavarian.com/Melinda/neuvm.azw

IBM TSS/360 pubs at bitsavers:
http://www.bitsavers.org/pdf/ibm/360/tss/

Multics was originally implemented in PLI ... GE computer business was bought by Honeywell (including commercial Multics) and recently the Multics source was made available ... lots more at Multics site (and there are reports of work on simulation to run Multics)
http://www.multicians.org

Some mention of using cp67 for keeping SE skills sharp in recent (linkedin IBM employee) discussion about 23jun69 unbundling announce:
http://www.garlic.com/~lynn/2011h.html#61 Do you remember back to June 23, 1969 when IBM unbundled
http://www.garlic.com/~lynn/2011h.html#62 Do you remember back to June 23, 1969 when IBM unbundled
http://www.garlic.com/~lynn/2011h.html#63 Do you remember back to June 23, 1969 when IBM unbundled

other recent discussion of CTSS, Multics, science center, tech sq
http://www.garlic.com/~lynn/2011h.html#44 OT The inventor of Email - Tom Van Vleck
http://www.garlic.com/~lynn/2011h.html#49 OT The inventor of Email - Tom Van Vleck
http://www.garlic.com/~lynn/2011h.html#51 Did My Brother Invent E-Mail With Tom Van Vleck?
http://www.garlic.com/~lynn/2011h.html#54 Did My Brother Invent E-Mail With Tom Van Vleck?

The cp67 development group split off from the science center and took over (IBM) Boston Programming Center on the 3rd floor ... with the morph of cp67 into vm370 and rapid growth ... the group outgrew the 3rd floor and moved out to the old (empty) SBC (given to CDC in some litigation settlement) bldg. in Burlington mall. misc. recent post mentioning another occupant of the 3rd flr:
http://www.garlic.com/~lynn/2011.html#15 545 Tech Square

misc. recent posts mentioning Burlington mall "group":
http://www.garlic.com/~lynn/2011.html#18 IBM Future System
http://www.garlic.com/~lynn/2011b.html#70 vm/370 3081
http://www.garlic.com/~lynn/2011c.html#83 IBM Future System
http://www.garlic.com/~lynn/2011d.html#52 Maybe off topic
http://www.garlic.com/~lynn/2011f.html#39 At least two decades back, some gurus predicted that mainframes would disappear in future and it still has not happened
http://www.garlic.com/~lynn/2011g.html#8 Is the magic and romance killed by Windows (and Linux)?

--
virtualization experience starting Jan1968, online at home since Mar1970

IBM Mainframe (1980's) on You tube

Refed: **, - **, - **, - **, - **, - **, - **
From: lynn@GARLIC.COM (Anne & Lynn Wheeler)
Subject: Re: IBM Mainframe (1980's) on You tube
Newsgroups: bit.listserv.ibm-main
Date: 30 Jun 2011 11:13:03 -0700
lynn@GARLIC.COM (Anne & Lynn Wheeler) writes:
IBM TSS/360 pubs at bitsavers:
http://www.bitsavers.org/pdf/ibm/360/tss/


re:
http://www.garlic.com/~lynn/2011h.html#68 IBM Mainframe (1980's) on You tube
http://www.garlic.com/~lynn/2011h.html#69 IBM Mainframe (1980's) on You tube

one of the things in tss/360 was "single-level-store" ... basically virtual memory semantics for files. there was some number of implementation difficulties ... which continued into the FS effort. ... misc. past posts
http://www.garlic.com/~lynn/submain.html#futuresys

After FS failed, some subset was carried forth for the s/38 in Rochester (later morphing into as/400).

some number of things carried forth from CTSS into cp67/cms ... but CMS also adopted a bunch of os/360 stuff (compiler, assemblers, etc) by simulating some amount of os/360 system services.

during the FS period ... I was doing some memory mapped stuff for cp67/cms ... attempting to avoid many of the shortcomings that I observed from tss/360 (and ridiculing the FS effort, claiming I had some amount of stuff running that they just had vaporware descriptions). misc. past posts
http://www.garlic.com/~lynn/submain.html#mmap

However, tss/360 did (at least) one thing correct and that was the definition of address constants; it was possible to memory-map an executable image on disk directly into a virtual address space at any location/address (w/o needing to perform any additional operations) ... including being able to have identical shared copy of the same executable images in different virtual address spaces simultaneously at different addresses.

By comparison, the os/360 semantics for "relocatable address constants" (started out) bringing the executable image into (real) storage at a specific location ... and then running through the (real) storage image adjusting all the "relocatable address constants" (to correspond to their loaded address). For memory-mapped implementation, this represented horrible post-processing work ... precluding automically having exact page-mapped image (whats on disk and whats in memory are identical) and sharing between different virtual address spaces potentially at different virtual addresses.

I had constant on-going headache attempting to deal with all of the os/360 semantics that had been incorporated into CMS making the transition to memory-mapped paradigm ... misc. past posts mentioning headaches trying to deal with the os/360 relocatable adcon semantics (in paged mapped environment):
http://www.garlic.com/~lynn/submain.html#adcons

I then ported a bunch of the stuff from cp67/cms to vm370/cms ... a couple old email refs:
http://www.garlic.com/~lynn/2006v.html#email731212
http://www.garlic.com/~lynn/2006w.html#email750102
http://www.garlic.com/~lynn/2006w.html#email750430

above mentions csc/vm distirbution ... one of my hobbies was providing production operation systems for internal datacenters. At one point, csc/vm was distributed and run at more internal datacenters than the total, aggregate number of Multics installations (small rivalry between the science center on 4th flr and multics on 5th flr).

the mad rush to get products back into the 370 hardware and software product pipelines (after FS failure) ... contributed to picking up and releasing a subset of the csc/vm code in standard shipped vm370 product.

--
virtualization experience starting Jan1968, online at home since Mar1970

TEMPO Timing, Tactics and Strategy

From: lynn@garlic.com (Lynn Wheeler)
Date: 30 Jun, 2011
Subject: TEMPO Timing, Tactics and Strategy
Blog: Boyd Disciples
re:
http://lnkd.in/WV9YGb

patterns of conflict ... "inside adversary's OODA time cycle ... to make appear ambiguous (unpredictable)" ... much later "fold adversary back inside himself".

Slight chess analogy where play is many moves ahead ... anticipating all possible moves by opponent and your countermoves. appearing unpredictable can possibly throw your opponent into decision paralysis ... loosing the tempo of possible moves & countermoves.

also: "Maneuver adversary beyond his moral-mental-physical capacity to adapt or endure so that he neither divine our intentions or focus his efforts".

anything that creates ambiguity including tempo change (slower and faster), can throw off adversary ... however faster tempo can simply saturate some specific O-O-D-A capacity (as opposed to confusing). also x-over wtih "zen and connaturality" comments there may be several, simultaneous, continuous activities ... which can outrun and/or confuse adversary's observe, orient, decide, and/or act (independently and/or in combination). At times, there can be quality/speed trade-offs (say better orientation/decide/act as opposed to faster) but there are periodic references that faster is usually better

past posts mentioning Boyd &/or OODA-loop
http://www.garlic.com/~lynn/subboyd.html

--
virtualization experience starting Jan1968, online at home since Mar1970

Vector processors on the 3090

Refed: **, - **, - **, - **, - **
From: lynn@GARLIC.COM (Anne & Lynn Wheeler)
Subject: Re: Vector processors on the 3090
Newsgroups: bit.listserv.ibm-main
Date: 30 Jun 2011 20:13:47 -0700
ps2os2@YAHOO.COM (Ed Gould) writes:
All the google searches are mute (or Cost $$$)

As to the mega flops the facility had. Anyone have the numbers?

Sorry to ask these semi off topic question but I was asked about them and am at a loss to find documentation that doesn't. Cost $$

As a side question anyone work with the facility? Any stories you would like to share would be interesting.


see previous post reference
http://www.garlic.com/~lynn/2011h.html#68 IBM Mainframe (1980's) on You tube

... which includes mflop ranking numbers, here
http://www.garlic.com/~lynn/2002i.html#12 CDC6600 - just how powerful a machine was it?

references table that has gone 404 ... but still available at wayback machine

from table:


IBM ES/9000-511 VF(1 proc 11ns)                       30
IBM ES/9000-340 VF (14.5 ns)                          23
IBM ES/9000-320 VF (1 proc 15 ns)                     22
IBM ES/9000 Model 260 VF (15 ns)                      19
IBM ES/9000 Model 210 VF (15 ns)                      17
IBM 3090/180J VF (1 proc, 14.5 ns)                    16
IBM ES/9000 Model 190 VF(15 ns)                       14
IBM 3090/180E VF                                      13

linkpack http://en.wikipedia.org/wiki/LINPACK try search "linpack 3090 vf" for various other refs
http://publishing.cdlib.org/ucpressebooks/view?docId=ft0f59n73z&chunk.id=d0e7046&toc.id=d0e7005&brand=ucpress;query=architecture
http://www.netlib.org/performance/rank/linpack/
ftp://icmsec.cc.ac.cn/pub/netlib/performance/html/linpack-peak.data.col0.html
http://www.taborcommunications.com/archives/3053.html
http://www.sdsc.edu/Xtal/Bm/benchmark_results

other posts in previous thread:
http://www.garlic.com/~lynn/2011h.html#69 IBM Mainframe (1980's) on You tube
http://www.garlic.com/~lynn/2011h.html#70 IBM Mainframe (1980's) on You tube

--
virtualization experience starting Jan1968, online at home since Mar1970

Vector processors on the 3090

Refed: **, - **, - **, - **
From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Vector processors on the 3090
Newsgroups: bit.listserv.ibm-main
Date: Thu, 30 Jun 2011 23:28:19 -0400
re:
http://www.garlic.com/~lynn/2011h.html#68 IBM Mainframe (1980's) on You tube
http://www.garlic.com/~lynn/2011h.html#72 Vector processors on the 3090

then, of course, there is the 'ol reliable bitsavers:
http://www.bitsavers.org/pdf/ibm/370/SA22-7093-0_HighAccuracyArith.pdf
http://www.bitsavers.org/pdf/ibm/370/SA22-7094-1_MathAssists.pdf
http://www.bitsavers.org/pdf/ibm/370/SA22-7125-1_Vector_Operations_Aug86.pdf
http://www.bitsavers.org/pdf/ibm/370/SA22-7125-2_Vector_Operations_Aug87.pdf
http://www.bitsavers.org/pdf/ibm/370/SA22-7125-3_Vector_Operations_Aug88.pdf

--
virtualization experience starting Jan1968, online at home since Mar1970

Vector processors on the 3090

Refed: **, - **, - **, - **, - **, - **, - **, - **, - **, - **, - **
From: lynn@GARLIC.COM (Anne & Lynn Wheeler)
Subject: Re: Vector processors on the 3090
Newsgroups: bit.listserv.ibm-main
Date: 1 Jul 2011 05:42:16 -0700
timothy.sipples@US.IBM.COM (Timothy Sipples) writes:
That's not really true. For example, there was the IBM Engineering and Scientific Subroutine Library (ESSL) Vector and Scalar/370 software. That software provided a library of mathematical functions you could call from FORTRAN, C, PL/I, APL2, or Assembler programs on MVS or VM. It was also supported for the languages that ran on AIX/ESA. Program number was 5688-226, and it was withdrawn from marketing in 2001. VS FORTRAN Version 2 (not sure which release) also had some automatic vector support of its own.

The Vector Facility for 3090s was announced on October 1, 1985. Announcement letter 185-121 is still available on IBM's announcements Web site (http://www.ibm.com/common/ssi). At the time you could rent your first Vector Facility for a list price of $30,830 per month and any subsequent VFs for $19,170 per month. The purchases prices were $370,000 and $230,000, respectively. All prices are in 1985 dollars, of course.

Before that there was the IBM 3838 Array Processor which ran (eventually) the Vector Processing Subsystem (VPSS)/XA. I think the 3838 debuted in 1976 or 1977. Your VPSS stuff could run on the VFs using (what else) VPSS/VF. VPSS/XA was IBM Program Number 5665-301. VPS/XA also supported FORTRAN, at least.

And before *that* there was the IBM 2938 Array Processor which you attached to your System/360.

By the way, you could think of today's zEnterprise BladeCenter Extension (zBX) as a mainframe vector processor...plus lots of other capabilities.


re:
http://www.garlic.com/~lynn/2011h.html#68 IBM Mainframe (1980's) on You tube
http://www.garlic.com/~lynn/2011h.html#69 IBM Mainframe (1980's) on You tube
http://www.garlic.com/~lynn/2011h.html#72 Vector processors on the 3090
http://www.garlic.com/~lynn/2011h.html#73 Vector processors on the 3090

there were a couple groups in kingston ... one was the E&S center that had a 3090VF (as well as 20 Floating Point Systems boxes) and the group that was supposedly designing an IBM supercomputer ... but was also funding/supporting various other activities ... like the HiPPI I/O interface for 3090 and providing funding for Chen Supercomputer company. long winded thread in a.f.c. from last year
http://www.garlic.com/~lynn/2010b.html#71 Happy DEC-10 Day
http://www.garlic.com/~lynn/2010b.html#72 Happy DEC-10 Day
http://www.garlic.com/~lynn/2010b.html#73 Happy DEC-10 Day
http://www.garlic.com/~lynn/2010b.html#74 Happy DEC-10 Day

and later thread in comp.arch
http://www.garlic.com/~lynn/2010f.html#47 Nonlinear systems and nonlocal supercomputing
http://www.garlic.com/~lynn/2010f.html#48 Nonlinear systems and nonlocal supercomputing
http://www.garlic.com/~lynn/2010f.html#49 Nonlinear systems and nonlocal supercomputing
http://www.garlic.com/~lynn/2010f.html#50 Nonlinear systems and nonlocal supercomputing

As mentioned in above, oct91, the senior executive sponsonsoring the supercomputer effort retired and there was lots of review of various projects. then there was an effort to canvas the company to find something for supercomputer (they found the effort I was doing in mid-jan92, and over a couple weeks, it was transferred to Kingston, we were told we couldn't work on anything with than four more processors and it was announced as supercomputer). misc. email from late 91 & early 92
http://www.garlic.com/~lynn/lhwemail.html#medusa

This old post describes the ('87) cornell national supercomputer facility with 3090-400 VF and five FPS boxes
http://www.garlic.com/~lynn/2000c.html#61 TF-1

some followon in this old thread:
http://www.garlic.com/~lynn/2000d.html#2 IBM's "ASCI White" and "Big Blue" architecture?
http://www.garlic.com/~lynn/2000d.html#3 IBM's "ASCI White" and "Big Blue" architecture?
http://www.garlic.com/~lynn/2000d.html#8 IBM's "ASCI White" and "Big Blue" architecture?

above references the 1.5gflops peak for 375mhz power3-ii chip is approx. same as the aggregate for IBM Kingston E&S lab in 1985 (with all the FPS boxes)

HiPPI was the standards version of Cray 100mbyte/sec parallel (aka half-duplex) channel (standards effort driven out of LANL). 3090 I/O wasn't capable of handle the rate ... so a hack was done in the side of 3090 expanded store bus ... with peek/poke semantics; aka basicaly i/o commands & data were read/written to special addresses on the 3090 expanded store bus. Later there was serial-HiPPI (with fiber) which then sort of merges with FCS (standards effort driven out of LLNL for 1gbit fiber full-duplex; POK gets involved and there is now FICON flavor of FCS).

--
virtualization experience starting Jan1968, online at home since Mar1970

pdp8 to PC- have we lost our way?

Refed: **, - **, - **
From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: pdp8 to PC- have we lost our way?
Newsgroups: alt.folklore.computers
Date: Fri, 01 Jul 2011 10:15:27 -0400
jmfbahciv <See.above@aol.com> writes:
Sure. I was talking about 80s when sources were withheld from the very people who would use them to develop more stuff which would sell more hardware. But it took a very long time and several buyouts before making sources available to all became a feature again.

(virtual machine) cp67 & vm370 shipped source ... and in fact shipped regular maintenance in source (there is folklore about some gov. 3-letter agency asking the company for source that exactly corresponds to favorite-son, flagship MVS operating system and the company after spending $5M investigating the issue came back and said that it wasn't pratical).

23jun69 unbundling announcement started to charge for hardware maintenance, application software, SE services, etc (as result of various litigation, however they did manage to make the case that kernel software was still free). recent thread in linkedin ibm employee discussion:
http://www.garlic.com/~lynn/2011h.html#61 Do you remember back to June 23, 1969 when IBM unbundled
http://www.garlic.com/~lynn/2011h.html#62 Do you remember back to June 23, 1969 when IBM unbundled
http://www.garlic.com/~lynn/2011h.html#63 Do you remember back to June 23, 1969 when IBM unbundled

other past posts mentioning unbundling
http://www.garlic.com/~lynn/submain.html#unbundle

the distraction of the future system effort is then credited with allowing clone processors to gain market foothold ... misc. past posts mentioning FS
http://www.garlic.com/~lynn/submain.html#futuresys

then with the failure of FS and mad rush to get stuff back into the 370 software & hardware product pipelines contributed to releasing some of the (370) software I had been doing all during the FS period (I was also periodically ridiculing FS activity, which wasn't necessarily exactly career enhancing) ... recently referenced in this ibm-main post
http://www.garlic.com/~lynn/2011h.html#70 IBM Mainframe (1980's) on You Tube

Part of the stuff selected for release was my dynamic adaptive resource management ... and apparently because of the clone processor, there was also decision to transition to charging for kernel software ... and my resource manager was selected as guinea pig ... so i got to spend some amount of time with legal & business people on software charging policies ... misc. past posts mentioning resource manager
http://www.garlic.com/~lynn/subtopic.html#fairshare

towards the end of the kernel software charging transition in the 80s ... there was then decisiion for OCO (object-code-only) ... past posts mentioning OCO-wars (including some reference to source maintenance):
http://www.garlic.com/~lynn/2005u.html#57 IPCS Standard Print Service
http://www.garlic.com/~lynn/2006n.html#34 Not Your Dad's Mainframe: Little Iron
http://www.garlic.com/~lynn/2006o.html#14 SEQUENCE NUMBERS
http://www.garlic.com/~lynn/2007k.html#15 Data Areas Manuals to be dropped
http://www.garlic.com/~lynn/2007m.html#15 Patents, Copyrights, Profits, Flex and Hercules
http://www.garlic.com/~lynn/2007u.html#6 Open z/Architecture or Not
http://www.garlic.com/~lynn/2007u.html#8 Open z/Architecture or Not
http://www.garlic.com/~lynn/2008d.html#42 VM/370 Release 6 Waterloo tape (CIA MODS)
http://www.garlic.com/~lynn/2009i.html#45 dynamic allocation
http://www.garlic.com/~lynn/2009i.html#72 Linux versioning file system
http://www.garlic.com/~lynn/2009k.html#0 Timeline: The evolution of online communities
http://www.garlic.com/~lynn/2009k.html#20 If you don't have access to a mainframe
http://www.garlic.com/~lynn/2009k.html#48 Timeline: 40 Years Of Unix
http://www.garlic.com/~lynn/2009r.html#7 The 50th Anniversary of the Legendary IBM 1401
http://www.garlic.com/~lynn/2009r.html#49 "Portable" data centers
http://www.garlic.com/~lynn/2010j.html#17 Personal use z/OS machines was Re: Multiprise 3k for personal Use?
http://www.garlic.com/~lynn/2010j.html#19 Personal use z/OS machines was Re: Multiprise 3k for personal Use?
http://www.garlic.com/~lynn/2010j.html#20 Personal use z/OS machines was Re: Multiprise 3k for personal Use?
http://www.garlic.com/~lynn/2010j.html#22 Personal use z/OS machines was Re: Multiprise 3k for personal Use?
http://www.garlic.com/~lynn/2010k.html#30 Idiotic programming style edicts
http://www.garlic.com/~lynn/2010k.html#65 Idiotic programming style edicts
http://www.garlic.com/~lynn/2010k.html#67 Idiotic programming style edicts
http://www.garlic.com/~lynn/2010l.html#1 Honoree pedigrees
http://www.garlic.com/~lynn/2010l.html#15 Age
http://www.garlic.com/~lynn/2010p.html#30 Philosophy: curiousity question
http://www.garlic.com/~lynn/2011b.html#87 The first personal computer (PC)
http://www.garlic.com/~lynn/2011c.html#56 The real cost of outsourcing

--
virtualization experience starting Jan1968, online at home since Mar1970




previous, next, index - home