List of Archived Posts

2018 Newsgroup Postings (03/24 - )

Congress Is About to Do a Big Favor for Private Equity Predators
Old word processors
FY18 budget deal yields life-sustaining new wings for the A-10 Warthog
These are the last days of Trump. Next: the rise of Pence
Cutting 'Old Heads' at IBM
The war isn't over. After military service, veterans still fight to endure
Iraq Invasion
Old word processors
Remington gun company files for bankruptcy protection
Graph database on z/OS?
Graph database on z/OS?
Bernanke Beliefs Busted: New Research Foretells QE Domination
The Next Battle Between States And The Feds Is Over Your Personal Data
Graph database on z/OS?
Air Force Risks Losing Third of F-35s If Upkeep Costs Aren't Cut
Old word processors
Old word processors
AFR Report: Private Equity's Failing Grade in the For-Profit College Industry
Old word processors
How China's New Stealth Fighter Could Soon Surpass the US F-22 Raptor
April 1st Corporate Directive
How China's New Stealth Fighter Could Soon Surpass the US F-22 Raptor
Historical Perspectives of the Operational Art
VS History
Old word processors
OFF TOPIC: Spring Break, 1947
DoD watchdog: Air Force failed to effectively manage F-22 modernization
Software Delivery on Tape to be Discontinued
Software Delivery on Tape to be Discontinued
Software Delivery on Tape to be Discontinued
Bottlenecks and Capacity planning
Old word processors
Old word processors
The Pentagon still uses computer software from 1958 to manage its contracts
The First E-mail Scandal, Long Before Hillary Clinton: Iran/Contra
Osborne 1 with speech synthesis
Osborne 1 with speech synthesis
Software Delivery on Tape to be Discontinued
Osborne 1 with speech synthesis
What Happened to the $2.6 Trillion Social Security Trust Fund?
Osborne 1 with speech synthesis
S/360 announce 4/7/1964, 54yrs
S/360 announce 4/7/1964, 54yrs
S/360 announce 4/7/1964, 54yrs
Anatomy of Failure: Why America Loses Every War It Starts
Counterinsurgency Lessons from Malaya and Vietnam: Learning to Eat Soup with a Knife
Slashdot: Business under-investing in I.T
Who Wrote Fortran IV, Level G?
S/360 announce 4/7/1964, 54yrs
S/360 announce 4/7/1964, 54yrs
Anatomy of Failure: Why America Loses Every War It Starts
EMV: Why the US migration didn't happen sooner
We the Corporations: How American Businesses Won Their Civil Rights
EMV: Why the US migration didn't happen sooner
We the Corporations: How American Businesses Won Their Civil Rights
Famous paper on security and source code from the '60s or '70s
Famous paper on security and source code from the '60s or '70s
The IRS Really Needs Some New Computers
Prepare for the bankrupt government pension plans!
America's War for the Greater Middle East: A Military History
11 crazy up-close photos of the F-22 Raptor stealth fighter jet soaring through the air
Famous paper on security and source code from the '60s or '70s

Congress Is About to Do a Big Favor for Private Equity Predators

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Congress Is About to Do a Big Favor for Private Equity Predators
Date: 24 Mar 2017
Blog: Facebook

Congress Is About to Do a Big Favor for Private Equity Predators;
We're also seeing a central defense of the Bank Lobbyist Act being
demolished in record time.
https://www.thenation.com/article/congress-is-about-to-do-a-big-favor-for-private-equity-predators/

The massive omnibus spending bill released Wednesday included a
surprise gift to the private-equity industry, which is one of the most
powerful players in the financial sector. When this bill passes, it
will add another layer of risk to a system already poised to become
less stable after the Senate passed its bipartisan bank-deregulation
bill earlier this month.

... snip ...

Private-Equity Giants Get a Surprise Win in $1.3 Trillion Spending
Bill
https://www.bloomberg.com/news/articles/2018-03-22/apollo-to-ares-among-surprise-winners-in-congress-spending-bill
Behind the Dodd-Frank Freakout; Elizabeth Warren thinks moderate
Democrats are helping Trump to gut Obama's Wall Street reforms. Is she
wrong?
https://www.politico.com/magazine/story/2018/03/17/behind-the-dodd-frank-freakout-217645

private equity posts
http://www.garlic.com/~lynn/submisc.html#private.equity
economic mess posts
http://www.garlic.com/~lynn/submisc.html#economic.mess

--
virtualization experience starting Jan1968, online at home since Mar1970

Old word processors

Refed: **, - **, - **
From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Old word processors
Newsgroups: alt.folklore.computers
Date: Sun, 25 Mar 2018 08:42:53 -0700

Bob Eager <news0006@eager.cx> writes:

It was possible to get a useful performance increase, at low cost, by
changing the CPU.

NEC V20 instead of 8088, V30 instead of 8086. Main improvements in
multiply/devide/shift, due to a barrel shifter and stuff. It also had
some of the 80186 enhanced instructions, although for compatibility they
were not often used.

And if you dug deep, you could switch it into 8085 mode.

Hotshot for PCjr had V20 and more/faster memory, old email
with description
http://www.garlic.com/~lynn/2014d.html#email860929
http://www.garlic.com/~lynn/2010c.html#email861114

in these posts
http://www.garlic.com/~lynn/2010c.html#83 Happy DEC-10 Day
http://www.garlic.com/~lynn/2014d.html#80 IBM PCjr STRIPPED BARE: We tear down the machine Big Blue would rather you forgot
--
virtualization experience starting Jan1968, online at home since Mar1970

FY18 budget deal yields life-sustaining new wings for the A-10 Warthog

Refed: **, - **, - **, - **
From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: FY18 budget deal yields life-sustaining new wings for the A-10 Warthog
Date: 25 Mar 2017
Blog: Facebook

FY18 budget deal yields life-sustaining new wings for the A-10 Warthog
https://www.airforcetimes.com/air/2018/03/23/fy18-budget-deal-yields-life-sustaining-new-wings-for-the-a-10-warthog/

After Desert Storm, Burton recommends a mini-A10, 5-barrel, simple
enough to be forward deployed and maintained ... but these days would
probably be a drone. F35 politics would have harder time against
something significantly cheaper and as effective. Battles with A-10
could be construed as obfuscation and misdirection away from doing
something new; delaying new efforts until F-35 is the only thing left,
part of some of their arguments

also Burton and Pentagon Wars, Corrupt From Top to Bottom
http://www.nytimes.com/1993/10/03/books/corrupt-from-top-to-bottom.html

But the larger story Mr. Burton recounts is enormously sad. After
spending 14 years at the Pentagon in the business of buying weapons,
he concludes that it is "a corrupt business -- ethically and morally
corrupt from top to bottom." The reform movement he championed has
faded. A culture of deception persists at the Pentagon, he says, and
his courageous jeremiad mourns the likelihood that this culture will
triumph in the end.  .

... snip ...

Original A-10, 7barrel, 30mm cannon, original designed for Soviet main
battle tank killer (1972)
https://en.wikipedia.org/wiki/Fairchild_Republic_A-10_Thunderbolt_II

GAO Desert Storm air effectiveness study was that A-10 was easily
killing so many tanks, that Iraqi tank crews started walking away from
their "sitting duck" tanks. Only last 100hrs of 42day Desert Storm was
land war, accounts of coalition tank battles with Iraqis and coalition
forces taking no damage, don't mention whether Iraqi tanks had anybody
home
http://www.gao.gov/products/NSIAD-97-134

Say 7000 (instead of 700) less expensive drone with 20mm or even 50cal
for CAS counterinsurgency

Note: Burton had gotten the cost of A10 30mm shells down to $13 (from
nearly $100). A million were used in Desert Storm ... or $13M ... not
very attractive for military-industrial complex looking to skim
trillions.

Part of it is battle between Army ground forces needing close air
support and USAF wanting high altitude strategic bombers (with human
pilots). Supposedly USAF allowed Army to have their own rotary
(helicopters) but all the fixed wing were suppose to be USAF. Trivia:

USAF officers slammed for pranging Predators on manual
http://www.theregister.co.uk/2009/04/29/young_usaf_predator_pilot_officer_slam/

A senior Pentagon official has delivered a stinging attack on the US
Air Force, saying that its philosophy of using fully qualified human
pilots to handle unmanned aircraft at all times has resulted in
unnecessary, expensive crashes. By contrast, US Army drones with
auto-landing equipment and cheaply-trained operators have an enviable
record

... snip ...

Boyd had story about being asked to review the latest USAF air-to-air
missile (before Vietnam). They showed him all the specs and movies
where the missile hit every time. Boyd asked them to replay the film
and had them stop it just before the missile struck flares on a
drone. Then he asks what kind of guidance does it have and they
replied heat seaking. He asks what kind of heat seaking and eventually
gets them to say "pin-point". He then asks them what is the hottest
part of a jet. They say the jet engine ... he says "wrong", it is in
the plume 30yrds behind the jet, rather than hitting every time, it
will be lucky to hit 10% of the time. Roll forward to vietnam and he
is proved correct. Then USAF general on the ground in vietnam has all
the planes grounded while the USAF missiles are replace with Navy
sidewinders (that have better than twice the hit rate). The general
lasts 3months before he is replaced and called on the carpet back at
the pentagon. He has violated fundamental rules of the pentagon,
reducing USAF budget by using a more effective missile and much worse,
increasing NAVY budget by using NAVY sidewinder. Criteria in the
pentagon for running a war is all about how big a budget.

John Boyd's Art of War; Why our greatest military theorist only made
colonel.
http://www.theamericanconservative.com/articles/john-boyds-art-of-war/

Here too Boyd had a favorite line. He often said, 'It is not true the
Pentagon has no strategy. It has a strategy, and once you understand
what that strategy is, everything the Pentagon does makes sense. The
strategy is, don't interrupt the money flow, add to it.'

... snip ...

Note: Burton was member of 1st USAF Academy graduation class on fast
path to general when he says Boyd destroyed his career by challenging
to do what was right.

Boyd posts
http://www.garlic.com/~lynn/subboyd.html

perpetual war posts
http://www.garlic.com/~lynn/submisc.html#perpetual.war
military-industrial(-congressional) complex posts
http://www.garlic.com/~lynn/submisc.html#military.industrial.complex

recent posts mentioning A-10:
http://www.garlic.com/~lynn/2017b.html#2 IBM 1970s
http://www.garlic.com/~lynn/2017d.html#94 A 40-year "conspiracy" at the VA
http://www.garlic.com/~lynn/2017d.html#97 IBM revenue has fallen for 20 quarters -- but it used to run its business very differently
http://www.garlic.com/~lynn/2017e.html#1 How Desert Storm Destroyed the US Military
http://www.garlic.com/~lynn/2017e.html#22 Ironic old "fortune"
http://www.garlic.com/~lynn/2017e.html#50 A flaw in the design; The Internet's founders saw its promise but didn't foresee users attacking one another
http://www.garlic.com/~lynn/2017f.html#14 Fast OODA-Loops increase Maneuverability
http://www.garlic.com/~lynn/2017f.html#58 [CM] What was your first home computer?
http://www.garlic.com/~lynn/2017h.html#31 Disregard post (another screwup; absolutely nothing to do with computers whatsoever!)
http://www.garlic.com/~lynn/2017i.html#38 Bullying trivia
http://www.garlic.com/~lynn/2017i.html#78 F-35 Multi-Role
http://www.garlic.com/~lynn/2017j.html#44 Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core
http://www.garlic.com/~lynn/2017j.html#73 A-10
http://www.garlic.com/~lynn/2017j.html#74 A-10
http://www.garlic.com/~lynn/2017j.html#75 A-10
http://www.garlic.com/~lynn/2018.html#11 This is the plane that almost beat out the legendary F-16
http://www.garlic.com/~lynn/2018.html#44 Predicting the future in five years as seen from 1983
http://www.garlic.com/~lynn/2018.html#48 1963 Timesharing: A Solution to Computer Bottlenecks
http://www.garlic.com/~lynn/2018b.html#79 What the Gulf War Teaches About the Future of War
http://www.garlic.com/~lynn/2018b.html#117 F-35: Still No Finish Line in Sight

--
virtualization experience starting Jan1968, online at home since Mar1970

These are the last days of Trump. Next: the rise of Pence

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: These are the last days of Trump. Next: the rise of Pence.
Date: 25 Mar 2017
Blog: Facebook

These are the last days of Trump. Next: the rise of Pence.
https://fabiusmaximus.com/2018/03/25/last-days-of-trump-rise-of-pence/

If you are in a nice safe blue district, but are safely in the
minority where you are irrelevant to the governance of the
country... What's not to like? You can introduce virtue signaling
legislation every session to keep in the good graces of those that
keep electing you, meanwhile sucking up copious cash and living the
cushy life while *never having to make a vote that matters*. You get
to play at being part of the "Resistance", wringing your hands and
clutching your pearls at all of the horrible mean things the far right
is doing, but at the end of the day it's all kabuki theater and means
nothing

...

Note: for some time, DC news (usually weekend radio) will periodically
refer to DC politics as Kabuki Theater .... including congress and
facade of conflict between the two parties ... just to distract the
public ... Roman Circus. Also works to misdirect and exhaust lots of
public energies

posts mentioning Kabuki Theater
http://www.garlic.com/~lynn/submisc.html#kabuki.theater

--
virtualization experience starting Jan1968, online at home since Mar1970

Cutting 'Old Heads' at IBM

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Cutting 'Old Heads' at IBM
Date: 25 Mar 2017
Blog: Facebook

Cutting 'Old Heads' at IBM; As it scrambled to compete in the internet
world, the once-dominant tech company cut tens of thousands of
U.S. workers, hitting its most senior employees hardest and flouting
rules against age bias.
https://features.propublica.org/ibm/ibm-age-discrimination-american-workers/

How the Crowd Led Us to Investigate IBM; Our project started with a
digital community of ex-employees.
https://www.propublica.org/article/investigating-ibm-digital-community-ex-employees

Eroding Protection Under the Law; Older Americans who face
discrimination on the job can't rely on the courts as much as earlier
generations did
https://www.propublica.org/article/americans-age-discrimination-eroding-protection-under-the-law

more IBM, Early 70s, IBM had "Future System" effort that was completely
different than 370 and was going to completely replace it. During this
period, internal politics were shutting down 370 efforts ... the lack
of 370 efforts during this period is credited with giving clone system
makers a market foothold. I continued to work on 370 stuff in this
period and periodically ridiculed FS stuff ... which wasn't exactly
career enhancing activity. Then when FS finally failed there was mad
rush to get stuff back into the 370 product pipelines. Ferguson &
Morris, "Computer Wars: The Post-IBM World", Time Books (FS
reference):

and perhaps most damaging, the old culture under Watson Snr and Jr
of free and vigorous debate was replaced with sycophancy and make
no waves under Opel and Akers. It's claimed that thereafter, IBM
lived in the shadow of defeat

  ... and:

But because of the heavy investment of face by the top management, F/S
took years to kill, although its wrongheadedness was obvious from the
very outset. "For the first time, during F/S, outspoken criticism
became politically dangerous," recalls a former top executive

... snip ...

In the late 70s and early 80s, I was blamed for online computer
conferencing (precursor to social media) on the internal network
(larger than the arpanet/internet from just about the beginning until
sometime mid-80s). Folklore is that when the corporate executive
committee were told about online computer conferencing (and the
internal network), 5of6 wanted to fire me.

In the early 80s, I also sponsored Col. Boyd's briefings at IBM
... originally just Patterns of Conflict and then he
added Organic Design for Command and Control. In his briefings
Boyd would observe that US corporate culture was starting to be
contaminated with former military officers steeped in rigid, top-down,
command and control. However about the same time, articles started
appearing that MBAs were destroying US corporations with their short
term financial objectives and financial engineering.

some Boyd refs:

John Boyd's Art of War, Why our greatest military theorist only made
colonel
http://www.theamericanconservative.com/articles/john-boyds-art-of-war/
Spinney tribute to Boyd, behind subscription wall at US Naval Institute
http://www.usni.org/magazines/proceedings/1997-07/genghis-john
lives "free" at
http://radio-weblogs.com/0107127/stories/2002/12/23/genghisJohnChuckSpinneysBioOfJohnBoyd.html

By the time he passes, the USAF had pretty much disowned Boyd; it was
the Marines at Arlington and all his effects go to Quantico. Then
something of surprise, a Boyd Hall:

There are two career paths in front of you, and you have to choose
which path you will follow. One path leads to promotions, titles, and
positions of distinction.... The other path leads to doing things that
are truly significant for the Air Force, but the rewards will quite
often be a kick in the stomach because you may have to cross swords
with the party line on occasion. You can't go down both paths, you
have to choose. Do you want to be a man of distinction or do you want
to do things that really influence the shape of the Air Force? "To be
or to do?, that is the question. Colonel John R. Boyd, USAF 1927-1997

From the dedication of Boyd Hall, United States Air Force Weapons
School, Nellis Air Force Base, Nevada. 17 September 1999

... snip ...

Boyd posts
http://www.garlic.com/~lynn/subboyd.html

--
virtualization experience starting Jan1968, online at home since Mar1970

The war isn't over. After military service, veterans still fight to endure

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: The war isn't over. After military service, veterans still fight to endure
Date: 25 Mar 2018
Blog: Facebook

The war isn't over. After military service, veterans still fight to
endure
https://www.cnbc.com/video/2018/03/22/the-war-isnt-over-after-military-service-veterans-still-fight-to-endure.html

One of the issues is that military-industrial complex has been
fighting for every last dollar ... all the lobbying dollars went to
increasing budget for defense contractors ... with as little as
possible devoted to those currently serving or veterans. I've talked
to mental health professionals that as much as possible the VA budget
went to drugs that veterans will likely be on for the rest of their
life (rather than trying to improve the situation).

past posts referencing VA money going to drugs (in lieu of mental
health professionals)
http://www.garlic.com/~lynn/2015d.html#76 Greedy Banks Nailed With $5 BILLION+ Fine For Fraud And Corruption
http://www.garlic.com/~lynn/2016b.html#110 The Koch-Fueled Plot to Destroy the VA
http://www.garlic.com/~lynn/2016f.html#20 Why a Single-Payer Health Care System is Inevitable
http://www.garlic.com/~lynn/2017.html#16 House GOP appallingly votes to conceal cost of Obamacare repeal to taxpayers
http://www.garlic.com/~lynn/2017f.html#54 [CM] What was your first home computer?

--
virtualization experience starting Jan1968, online at home since Mar1970

Iraq Invasion

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Iraq Invasion
Date: 26 Mar 2018
Blog: Facebook

MIC profits

MIC wanted Iraq2 so badly that corporate reps were telling former
eastern block countries that if they voted for IRAQ2 invasion in the
UN, they would get membership in NATO and (directed appropriation)
USAID (can *ONLY* be used for purchase of modern US arms).
http://www.amazon.com/Prophets-War-Lockheed-Military-Industrial-ebook/dp/B0047T86BA

John Boyd's Art of War; Why our greatest military theorist only made
colonel.
http://www.theamericanconservative.com/articles/john-boyds-art-of-war/

Here too Boyd had a favorite line. He often said, 'It is not true the
Pentagon has no strategy. It has a strategy, and once you understand
what that strategy is, everything the Pentagon does makes sense. The
strategy is, don't interrupt the money flow, add to it.'

... snip ...

Pentagon Wars, Corrupt From Top to Bottom
http://www.nytimes.com/1993/10/03/books/corrupt-from-top-to-bottom.html

oil

Apr2011, Secret memos expose link between oil firms and invasion of
Iraq
https://www.independent.co.uk/news/uk/politics/secret-memos-expose-link-between-oil-firms-and-invasion-of-iraq-2269610.html

petrodollar

Petro-dollar at heart of wars
https://www.irishexaminer.com/viewpoints/yourview/petro-dollar-at-heart-of-wars-374398.html
Are The Middle East Wars Really About Forcing the World Into Dollars
and Private Central Banking?
https://www.zerohedge.com/contributed/are-middle-east-wars-really-about-forcing-world-dollars-and-private-central-banking
PetroYuan Futures Open - Over 10 BillIon Notional Trades In First Hour
https://www.zerohedge.com/news/2018-03-25/petroyuan-futures-open-over-10-billion-notional-trades-first-hour
Will The Dollar Survive The Petro-Yuan?
https://oilprice.com/Energy/Energy-General/Will-The-Dollar-Survive-The-Petro-Yuan.html

...

lots of different entities all with interest in Iraq Invasion.

How the Iraq War Was Sold
https://www.counterpunch.org/2016/07/08/how-the-iraq-war-was-sold/

To understand the Iraq war you don't need to consult generals, but the
spin doctors and PR flacks who stage-managed the countdown to war from
the murky corridors of Washington where politics, corporate spin and
psy-ops spooks cohabit.

... snip ...

perpetual war posts
http://www.garlic.com/~lynn/submisc.html#perpetual.war
military-industrial(-congressional) complex posts
http://www.garlic.com/~lynn/submisc.html#military.industrial.complex
merchants of doubt posts
http://www.garlic.com/~lynn/submisc.html#merchants.of.doubt

recent posts mentioning Iraq
http://www.garlic.com/~lynn/2018.html#3 Pension Plans
http://www.garlic.com/~lynn/2018.html#5 "It Felt Like Being In The Matrix" - James Risen's Stunning Inside Story
http://www.garlic.com/~lynn/2018.html#12 Predicting the future in five years as seen from 1983
http://www.garlic.com/~lynn/2018.html#14 Predicting the future in five years as seen from 1983
http://www.garlic.com/~lynn/2018.html#72 The Next New Military Specialty Should Be Software Developers
http://www.garlic.com/~lynn/2018.html#73 Why People Dislike Really Smart Leaders
http://www.garlic.com/~lynn/2018b.html#23 Important US technology companies sold to foreigners
http://www.garlic.com/~lynn/2018b.html#24 Important US technology companies sold to foreigners
http://www.garlic.com/~lynn/2018b.html#30 free, huh, was Bitcoin confusion?
http://www.garlic.com/~lynn/2018b.html#45 More Guns Do Not Stop More Crimes, Evidence Shows
http://www.garlic.com/~lynn/2018b.html#60 Revealed - the capitalist network that runs the world
http://www.garlic.com/~lynn/2018b.html#65 Doubts about the HR departments that require knowledge of technology that does not exist
http://www.garlic.com/~lynn/2018b.html#68 Doubts about the HR departments that require knowledge of technology that does not exist
http://www.garlic.com/~lynn/2018b.html#79 What the Gulf War Teaches About the Future of War
http://www.garlic.com/~lynn/2018b.html#81 What the Gulf War Teaches About the Future of War
http://www.garlic.com/~lynn/2018b.html#88 Iraq war costs U.S. more than $2 trillion: study
http://www.garlic.com/~lynn/2018b.html#101 The Iraq War continues to divide the U.S. public, 15 years after it began
http://www.garlic.com/~lynn/2018b.html#108 The Iraq War continues to divide the U.S. public, 15 years after it began
http://www.garlic.com/~lynn/2018b.html#110 The Iraq War continues to divide the U.S. public, 15 years after it began
http://www.garlic.com/~lynn/2018b.html#115 Chevron's lawyer, speaking for major oil companies, says climate change is real and it's your fault
http://www.garlic.com/~lynn/2018c.html#2 FY18 budget deal yields life-sustaining new wings for the A-10 Warthog

--
virtualization experience starting Jan1968, online at home since Mar1970

Old word processors

Refed: **, - **, - **
From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Old word processors
Newsgroups: alt.folklore.computers
Date: Mon, 26 Mar 2018 12:26:04 -0700

hancock4 writes:

2) As described above, "touch typing" was more than just knowing
the keyboard--those other aspects, too, led to better
accuracy and speed.  They were taught in typing class.
To this day, some computer keyboards have a little rise on the
F and J keys to aid the user to find the "home row" for their
fingers.  My Dell and HP keyboards have them.

3) For myself, using the Teletype in timesharing helped by
typing skills.

junior high in the 50s, I found an old discarded typewriter and taught
myself how to touch type (got to 50-60 words/min)

later in collete, I didn't notice particular problems with 026, 029,
2741 (80-100 words/min) ... but I found that tty33 ... required
significant more pressure and much more distance ... distance
compareable to discarded typewriter when I was kid ... but more
resistance.
https://en.wikipedia.org/wiki/Teletype_Model_33

--
virtualization experience starting Jan1968, online at home since Mar1970

Remington gun company files for bankruptcy protection

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Remington gun company files for bankruptcy protection
Date: 26 Mar 2018
Blog: Facebook

Remington gun company files for bankruptcy protection
http://abcnews.go.com/US/remington-gun-company-files-bankruptcy-protection/story?id=54013831

PE Firm Cerberus Capital's "Rollup" Collapses into Bankruptcy;
Bankruptcy becomes an increasingly common "exit." And the pension
obligations?
https://wolfstreet.com/2018/03/26/pe-firm-cerberus-capitals-rollup-collapses-into-bankruptcy/

In a leveraged buyout, the acquired company is made to borrow the
money for its own acquisition and pay those funds to the acquirer,
which uses those funds to pay off the bridge loan originally taken out
to fund the initial deal. In other words, the acquirer has little or
no equity in the deal, and the acquired company has been loaded up
with debt. Hence "leveraged buyout."

... snip ...

Over half of corporate defaults are companies currently or previously
in private equity mills
http://www.nytimes.com/2009/10/05/business/economy/05simmons.html?_r=0

private-equity posts
http://www.garlic.com/~lynn/submisc.html#private.equity

--
virtualization experience starting Jan1968, online at home since Mar1970

Graph database on z/OS?

From: lynn@GARLIC.COM (Anne & Lynn Wheeler)
Subject: Re: Graph database on z/OS?
Newsgroups: bit.listserv.ibm-main
Date: 27 Mar 2018 09:13:50 -0700

dcrayford@GMAIL.COM (David Crayford) writes:

I think the general ROT for those kind of systems is that the network
defines security. All back-end services should be hidden behind
firewalls and not accessible to the outside world. It's a different
world these days where everything seems to run on docker images
orchestrated by something like kuebernetes and secured by LDAP or
whatever. Nobody dishes out userids unless you need admin.

Skip containers and do serverless computing instead; Container
technologies like Docker are very powerful, but require talent you can't
get. Serverless computing provides the same benefits -- with talent you
can actually get
https://www.infoworld.com/article/3265457/containers/why-serverless-is-the-better-option-than-containers.html

we had worked with several people at Oracle on cluster scaleup ...  part
of getting cluster scaleup being transferred were mainframe DB2
complaining if I was allowed to continue, it would be at least 5yrs
ahead of them. Over a period of a few weeks, cluster scaleup was
transferred, announced as IBM supercomputer (for technical/scientific
*ONLY*) and we were told we couldn't work on anything with more than
four processors. we leave a few months later. past posts
http://www.garlic.com/~lynn/subtopic.html#hacmp

not long later, we are brought in as consultants by two of the (former
Oracle) people we had worked with ... who were then at a small
client/server startup responsible for something called commerce server,
the startup had also invented this technology they called "SSL" they
wanted to use, the result is now frequently called "electronic
commerce".

As webservers got more complex, there was increasing number of
RDBMS-backed servers (compared to flat-file based implementations) that
had significant larger number of exploits. Part of it was RDBMS were
much more complex & corresponding increase in mistakes (along with
rapidly exploding demand for scarce skills). A specific example was they
would disable all outside connections for RDBMS maintenance ... and
during maintenance they would relax various security processes.
Complexity of RDBMS met that increasingly likely they would overrun
maintenance windows, in mad rush to get back online they would
frequently overlook reactivating various security processes.

more recent
https://en.wikipedia.org/wiki/SQL_injection

all of these have web application with access ... and attacks are
typically against the web application (where webserver frontends are
also responsible for access control).

--
virtualization experience starting Jan1968, online at home since Mar1970

Graph database on z/OS?

From: lynn@GARLIC.COM (Anne & Lynn Wheeler)
Subject: Re: Graph database on z/OS?
Newsgroups: bit.listserv.ibm-main
Date: 27 Mar 2018 10:27:49 -0700

rob.schramm@GMAIL.COM (Rob Schramm) writes:

Seems like there is a drift about security and walls.. interesting article
I found about walls when reading Cryptograms...

https://warontherocks.com/2018/02/wall-wall-fortresses-fail/

re:
http://www.garlic.com/~lynn/2018c.html#9 Graph database on z/OS?

possibly more than you ever wanted to know, in part because of doing
electronic commerce, was sucked into financial standards, financial
industry critical infrastructure protection, and other efforts, like
doing some work with these guys (but from 2004)

Electronic Safety and Soundness Securing Finance in a New Age
http://documents.worldbank.org/curated/en/756761468778791728/pdf/284050PAPER0WBWP026.pdf

This monograph presents a four pillar framework for policymakers in
emerging markets to use in designing responses to the challenge of
assuring electronic safety and soundness of their financial
systems. As such, this paper is focused in part on technological
solutions, but more importantly on the incentives of the many parties
involved in assuring the security of critical infrastructures--from
telecommunications and financial sector service providers to the
government and even to the many final consumers of financial or other
services.

... snip ...

we had been also brought in to help wordsmith some cal. state
legislation, they were working on electronic signature, data
breach notification, and opt-in privacy. several entities involved
in privacy were involved and had done detailed, in-depth public
surveys on privacy and the #1 issue was identity theft, specifically
the form involving various breaches that resulted in fraudulent
financial transactions.

A problem was that little or nothing was being done about these
breaches (except trying to keep them out of the news). A major issue
is that entities take security measures in self protection ... the
problem with the breaches was that the institutions weren't at risk,
it was the public ... so they had little motivation. It was hoped that
the publicity from the data breach notifications might motivate
institutions to take security measures.

that and a combination of other things resulted in doing financial
transaction standard that slightly tweaked the current infrastructure
...  and eliminated criminals ability to use information from previous
transactions obtained in breaches for doing fraudulent transactions
(form of replay attack) ... it didn't prevent breaches, but
eliminated risk from (and major motivation for doing) breaches.

two (other) problems: 1) security proportional to risk: value of
transaction information to merchant can be a few dollars (and a few
cents to transaction processors), the value of the information to
criminals can be the account balance (or credit limit) ... as a result
criminals may be able to outspend by factor of 100 times attacking
(than defenders can afford to spend) and 2) "dual use": transaction
information is used for both authentication and dozens of business
processes at millions of locations around the world ... as a result it
has to be both kept absolutely secure and never divulged and
simultaneously readily available.

for various reasons there are numerous stakeholders with vested
interests in preserving the status quo.

from the law of unintended consequences ... "SSL" for electronic
commerce (worked on earlier) was used to hide financial transaction
information during transmission. the "tweak" eliminates the need to
hide the information ... whether in transmission or "at rest".

financial transaction standard work
http://www.garlic.com/~lynn/x959.html#x959
and posts
http://www.garlic.com/~lynn/subpubkey.html#x959
data breach notification posts
http://www.garlic.com/~lynn/submisc.html#data.breach.notification

--
virtualization experience starting Jan1968, online at home since Mar1970

Bernanke Beliefs Busted: New Research Foretells QE Domination

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Bernanke Beliefs Busted: New Research Foretells QE Domination
Date: 27 Mar 2018
Blog: Facebook

Bernanke Beliefs Busted: New Research Foretells QE Domination
https://www.zerohedge.com/news/2018-03-27/bernanke-beliefs-busted-new-research-foretells-qe-domination
QE's Untold Story: A Chart That Fed Correspondents Need To Investigate
http://ffwiley.com/blog/2017/10/31/qes-untold-story-a-chart-that-fed-correspondents-should-investigate/

note that FED fought long legal battle to prevent disclosing what it
was doing ... when they lost, Bernanke had a press conference and said
that he thought that the Too Big To Fail would use the
trillions to help mainstreet, when they didn't, he couldn't force
them. However, he supposedly was partially selected for being
depression era scholar where something similar was tried with the same
results, so he should of had no expectations for something different.

tens of trillions in ZIRP funds
https://en.wikipedia.org/wiki/Zero_interest-rate_policy

older refs

Federal Reserve's 'astounding' report: We loaned banks trillions
http://www.csmonitor.com/USA/2010/1201/Federal-Reserve-s-astounding-report-We-loaned-banks-trillions
Bankers' Pay On The Line Again
http://baselinescenario.com/2010/12/23/bankers-pay-on-the-line-again/
Ford, BMW, Toyota Took Secret Government Money
https://jalopnik.com/5704575/ford-bmw-toyota-took-secret-government-money
The crash of 2008: A mathematician's view
http://www.eurekalert.org/pub_releases/2008-12/w-tco120808.php

economic mess posts
http://www.garlic.com/~lynn/submisc.html#economic.mess
posts mentioning Federal Reserve chairman
http://www.garlic.com/~lynn/submisc.html#fed.chairman
posts mentioning ZIRP
http://www.garlic.com/~lynn/submisc.html#zirp
too big to fail ("too big to prosecute", "too bit to jail") posts
http://www.garlic.com/~lynn/submisc.html#too-big-to-fail
(triple-A rated) toxic CDOs posts
http://www.garlic.com/~lynn/submisc.html#toxic.cdo

--
virtualization experience starting Jan1968, online at home since Mar1970

The Next Battle Between States And The Feds Is Over Your Personal Data

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: The Next Battle Between States And The Feds Is Over Your Personal Data
Date: 27 Mar 2018
Blog: Facebook

re:
http://www.garlic.com/~lynn/2018b.html#85 The Next Battle Between States And The Feds Is Over Your Personal Data

It's not just Facebook. Thousands of companies are spying on you
https://www.cnn.com/2018/03/26/opinions/data-company-spying-opinion-schneier/index.html

On War - an Andy McNab War Classic: The beautifully reproduced
illustrated 1908 edition, with introduction by Andy McNab, notes by
Col. F.N. Maude and brief memoir of General Clausewitz
https://www.amazon.com/War-beautifully-reproduced-illustrated-introduction-ebook/dp/B00G3DFLY8

from intro of the 1908 edition ... loc394-95:

As long as the Socialists only threatened capital they were not
seriously interfered with, for the Government knew quite well that the
undisputed sway of the employer was not for the ultimate good of the
State.

... snip ...

the government needed general population standard of living sufficient
that soldiers were willing to fight to preserve their way of
life. Capitalists tendency was to reduce worker standard of living to
the lowest possible ... below what the government needed for soldier
motivation ... and therefor needed socialists as counterbalance to the
capitalists in raising the general population standard of living.

--
virtualization experience starting Jan1968, online at home since Mar1970

Graph database on z/OS?

From: lynn@GARLIC.COM (Anne & Lynn Wheeler)
Subject: Re: Graph database on z/OS?
Newsgroups: bit.listserv.ibm-main
Date: 27 Mar 2018 11:38:09 -0700

re:
http://www.garlic.com/~lynn/2018c.html#9 Graph database on z/OS?
http://www.garlic.com/~lynn/2018c.html#10 Graph database on z/OS?

some old "graph", much earlier I had been involved in original
sql/relational implementation, System/R ... some past posts
http://www.garlic.com/~lynn/submain.html#systemr

the "official" next generation DBMS was "EAGLE" ... and while the
corporation was focused on EAGLE, we were able to do technology
transfer to Endicott for release as SQL/DS. Then when EAGLE implodes,
there is request about how fast could System/R be ported to MVS
... eventually released as DB2, originally for decision support only.

About the same time, I was also sucked into helping with a different
kind of relational ... that physically instantiated every entity and
every relation ... a little more like IMS ... but w/o record pointers
... entities and relations were content addressable indexes. As a
result it could represent any kind of information structure
... including tables as well as graphs. IDEA was heavily influenced by
System/R in eliminating explicit record numbers with indexing under
the covers ... but also Sowa, who was at IBM STL at the time.
http://www.jfsowa.com/pubs/semnet.htm
topic drift, other Sowa reference (about IBM FS)
http://www.jfsowa.com/computer/memo125.htm
http://www.jfsowa.com/computer/

IBM Future System posts
http://www.garlic.com/~lynn/submain.html#futuresys

In some respect, System/R (RDBMS) was optimized for financial
transactions, tables with account number index and most everything
related to the account was physically in same record. IDEA could have
separate record for every (indexed) entity and every (indexed)
relation (could be 5-10 times physical space of RDBMS tables).

Obvious doing financial transaction ran much faster on RDBMS (one
record with all information) than compared to dozen or more records
for the same information in IDEA.

However, for non-uniform information structure, IDEA could be several
times faster. A large VLSI chip design was loaded into DB2 and then
several traces were run to get best optimization. Then DB2 (hihgly
optimized) test took nearly 3hrs elapsed time to extract the full chip
design running on 3081 with 3380 disks. IDEA running with no
optimization on same 3081 and 3380s ... took less than 30mins to
extract same chip design (almost ten times faster).

IDEA also had query language that solved/addressed the SQL NULLs
problem (IDEA only has fields for things that exist, there is no
direct concept of "missing values") ... old archived post from DBMS
theory discussion
http://www.garlic.com/~lynn/2003g.html#40 How to cope with missing values - NULLS?
http://www.garlic.com/~lynn/2003g.html#41 How to cope with missing values - NULLS?

We also did some work with NIH national library of medicine. They had
hired a company to load the NLM "index" information into RDBMS
... they had spent 18months on "normalization" and could only do about
80% of the data (the rest was loaded unnormalized with lots of
duplicates).  Normalization/integrating new information was taking
longer than real time (four months of new medical knowledge was taking
more than four months).

I (one person) spent about three weeks doing the equivalent for IDEA.

some NLM refs:
https://www.nlm.nih.gov/databases/umls.html
https://www.nlm.nih.gov/research/umls/
https://www.nlm.nih.gov/research/umls/sourcereleasedocs/current/MSH/
https://www.nlm.nih.gov/mesh/intro_trees.html

trivia: at the time, NLM still had people that had originally done
their mainframe based online catalog in the 60s (BDAM with their own
home grown transaction system). This was same time that the univ
library had gotten an ONR grant to do online catalog, some of the
money was used for 2321 datacell and it was also selected to be
betatest site for original CICS product ... and I got tasked with
supporting/debugging the CICS implementation (so we had lots of
discussion about online catalogs and IBM BDAM). past BDAM/CICS posts
http://www.garlic.com/~lynn/submain.html#bdam

--
virtualization experience starting Jan1968, online at home since Mar1970

Air Force Risks Losing Third of F-35s If Upkeep Costs Aren't Cut

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Air Force Risks Losing Third of F-35s If Upkeep Costs Aren't Cut
Date: 28 Mar 2018
Blog: Facebook

Air Force Risks Losing Third of F-35s If Upkeep Costs Aren't Cut
https://www.bloomberg.com/news/articles/2018-03-28/air-force-risks-losing-third-of-f-35s-if-upkeep-costs-aren-t-cut

This is F-22: Can't Fly Won't Die
http://nypost.com/2009/07/17/cant-fly-wont-die/

Pilots call high-maintenance aircraft "hangar queens."  Well, the
F-22's a hangar empress. After three expensive decades in development,
the plane meets fewer than one-third of its specified requirements.

Anyway, an enemy wouldn't have to down a single F-22 to defeat
it. Just strike the hi-tech maintenance sites, and it's game over. (In
WWII, we didn't shoot down every Japanese Zero; we just sank their
carriers.) The F-22 isn't going to operate off a dirt strip with a
repair tent.

But this is all about lobbying, not about lobbing bombs. Cynically,
Lockheed Martin distributed the F-22 workload to nearly every state,
employing under-qualified sub-contractors to create local financial
stakes in the program. Great politics -- but the result has been a
quality collapse.

... snip ...

There were jokes at the time that F-22 couldn't be taken out in
weather (because the stealth coating was very vulnerable especially to
moisture). There are claims that since then, less moisture vulnerable
coating has been developed, used for the F-35 and supposedly
retrofitted to F-22 (however, there are concerns that new coating has
lower structural integrity and subject to loss/wear at higher
top-speed of F-22) ... F-22 constant LO restoration
http://www.tyndall.af.mil/News/Features/Display/Article/669883/lo-how-the-f-22-gets-its-stealth/

From initial F-35 prototype, there was a lot of cost reduction
compromise ... originally assuming it would be bomb truck with F-22
flying cover to handle high threat opponents. Comparison analysis of
F35 with other planes
http://www.ausairpower.net/jsf.html
has analysis of F35 radar signature at different radar frequencies
involving different angles and portions of the frame (lots to say
about how cost reduced and compromised stealth compared to original
design)
http://www.ausairpower.net/APA-2009-01.html

military-industrial(-congressional) complex posts
http://www.garlic.com/~lynn/submisc.html#military.industrial.complex

some recent F-35 posts
http://www.garlic.com/~lynn/2017h.html#36 Disregard post (another screwup; absolutely nothing to do with computers whatsoever!)
http://www.garlic.com/~lynn/2017i.html#11 The General Who Lost 2 Wars, Leaked Classified Information to His Lover--and Retired With a $220,000 Pension
http://www.garlic.com/~lynn/2017i.html#13 Merchants of Doubt
http://www.garlic.com/~lynn/2017i.html#24 Systemic Risk
http://www.garlic.com/~lynn/2017i.html#38 Bullying trivia
http://www.garlic.com/~lynn/2017i.html#51 Russian Hackers Stole NSA Data on U.S. Cyber Defense
http://www.garlic.com/~lynn/2017i.html#56 China's mega fortress in Djibouti could be model for its bases in Pakistan
http://www.garlic.com/~lynn/2017i.html#69 When Working From Home Doesn't Work
http://www.garlic.com/~lynn/2017i.html#78 F-35 Multi-Role
http://www.garlic.com/~lynn/2017i.html#84 "Worse Than Big Tobacco": How Big Pharma Fuels the Opioid Epidemic
http://www.garlic.com/~lynn/2017j.html#35 Tech: we didn't mean for it to turn out like this
http://www.garlic.com/~lynn/2017j.html#44 Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core
http://www.garlic.com/~lynn/2017j.html#63 Sugar Industry Long Downplayed Potential Harms
http://www.garlic.com/~lynn/2018.html#11 This is the plane that almost beat out the legendary F-16
http://www.garlic.com/~lynn/2018.html#48 1963 Timesharing: A Solution to Computer Bottlenecks
http://www.garlic.com/~lynn/2018.html#69 The Next New Military Specialty Should Be Software Developers
http://www.garlic.com/~lynn/2018b.html#17 Important US technology companies sold to foreigners
http://www.garlic.com/~lynn/2018b.html#39 Why China's New Supercomputer Is Only Technically the World's Fastest
http://www.garlic.com/~lynn/2018b.html#86 Lawmakers to Military: Don't Buy Another 'Money Pit' Like F-35
http://www.garlic.com/~lynn/2018b.html#95 The Return Of Haim Bodek - HFT's First Whistleblower
http://www.garlic.com/~lynn/2018b.html#114 Chevron's lawyer, speaking for major oil companies, says climate change is real and it's your fault
http://www.garlic.com/~lynn/2018b.html#117 F-35: Still No Finish Line in Sight
http://www.garlic.com/~lynn/2018c.html#2 FY18 budget deal yields life-sustaining new wings for the A-10 Warthog

--
virtualization experience starting Jan1968, online at home since Mar1970

Old word processors

Refed: **, - **, - **
From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Old word processors
Newsgroups: alt.folklore.computers
Date: Wed, 28 Mar 2018 17:09:17 -0700

hancock4 writes:

I'm guessing that in the old days, tabulating machines were
used on occasion to cut a mimeo stencil for things like a
directory or catalog.  I don't know about a computer driven
1403, but probably done there as well, especially back in the
early 1960s.

On our Univac 90/30, we had a film ribbon which we used from
time to time to produce a directory that was photocopied.  But
the printer of the 90/30 was pretty crappy and even with a film
ribbon the output looked lousy, indeed even worse, such as with
only partly formed characters.  Our office had a mag card, and
that should've been used instead to maintain the directory, even
if it meant duplicate typing.

re:
http://www.garlic.com/~lynn/2018b.html#94 Old word processors
http://www.garlic.com/~lynn/2018b.html#100 Old word processors
http://www.garlic.com/~lynn/2018b.html#103 Old word processors
http://www.garlic.com/~lynn/2018b.html#109 Old word processors
http://www.garlic.com/~lynn/2018c.html#1 Old word processors
http://www.garlic.com/~lynn/2018c.html#7 Old word processors

CP67 and VM370 were being done in CMS script (originally started out as
CTSS RUNOFF reimplementation) ... for official ibm publication ... some
run off on 2741 using film ribbon and some being run off on 1403N1 with
film ribbon ... used for photo offset
https://en.wikipedia.org/wiki/Offset_printing

First major mainstream IBM pub was principles of operation .... where
the architecture "red book" was moved to CMS script ... command line
option would either select printing the full "red book" (with
engineering notes, implementation notes, alternative considerations,
etc) or the princles of operation subset.

GML had been invented at the science center ... and GML tag support
was added to CMS script which started seeing a lot more use in the
first part of 70s ... and then 2nd half of the 70s started seeing lots
of 3800 laser printers at internal datacenters (75-76)
https://en.wikipedia.org/wiki/IBM_3800

then in 79/80, 6670s (ibm copier3 with computer interface) started
showing up in departmental areas (supported fonts for printing text)
... originally for OS/6 ... OPD, replacing mag card selectrics,
https://en.wikipedia.org/wiki/OS/6
replaced by displaywriter
https://en.wikipedia.org/wiki/IBM_Displaywriter_System

then mainframe support was added. san jose research did the
enhancements for sherpa/6670APA (being able to do images). old
email about sherpa
http://www.garlic.com/~lynn/2006p.html#email820304

one of the people responsible for sherpa ... worked on including
postscript processing in sherpa ... and then left IBM for adobe.

directory trivia: Friday's after work had discussions what could be
done about middle management and upper executives mostly being
computer illiterate and what might be done to get them to use
computers.  we hit on trying online phone directory ... Jim Gray
(before he left research for tandem)
https://en.wikipedia.org/wiki/Jim_Gray_(computer_scientist)

would spend max. of 2 person weeks developing the lookup program and I
would spend max. of 2 person weeks writing process collecting and
reformating as many company phone directories as possible (one of
problems ran into was lawyers & security people wanted to insist
that while paper directories weren't corporate confidential ... if
they were online, they had to be classified confidential restricted
and employees couldn't have access).

this was in period (late 70s/early 80s) where 3270 terminals were part
of fall budget cycle and each one required VP-level sign-off. Then
there was a rapidly spreading rumor that some of the corporate
executive committee members were using email ... and all of a sudden
every middle manager in the company had to have 3270 terminal on their
desk (even if they never actually used them, spending the day with the
vm370 login screen or possibly PROFS menu being burned into screen)
... pre-empting annual 3270 terminal deliveries justified for
development projects.

other trivia: PROFS group had collecting some number of internal
applications (including telephone books) and wrapping MENUs around
them. They had taken very early version of VMSG for the email
client. When the VMSG tried to offer them a much enhanced version, the
PROFS group attempted to get him fired (since they had already claimed
credit for everyting).  Things quieted down when VMSG author
demonstrated that every PROFS email had his initials in non-displayed
field (after that the VMSG author only shared source with me and one
other person).

science center posts
http://www.garlic.com/~lynn/subtopic.html#545tech
GML/SGML posts
http://www.garlic.com/~lynn/submain.html#sgml
some CP67/CMS pubs
http://bitsavers.org/pdf/ibm/360/cp67/
http://bitsavers.org/pdf/ibm/360/cms/

--
virtualization experience starting Jan1968, online at home since Mar1970

Old word processors

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Old word processors
Newsgroups: alt.folklore.computers
Date: Thu, 29 Mar 2018 17:58:32 -0700

re:
http://www.garlic.com/~lynn/2018c.html#15 Old word processors

hancock4 writes:

It's sad to read of intra-department squabbles at IBM, but it
seems from the IBM Early Computer history that this is nothing
new.  Back in the early 1950s there was rivalry between the
Endicott and Poughkeepsie labs.  The S/360 development had a
lot of sharp differences of opinion on the direction to go.

I've told the story before about the Gov. antitrust (turns out one of
the IBM people at the science center had relative that was MIT
economist(?) that was at the trial) ... where various members of the
bunch all testified that by the end of the 50s, all computer companies
knew that the single most important customer requirement was
compatible computer line (beginning of rapid growth in computer use
... so projecting lots of upgrading) ... and only IBM top executives
managed to enforce it (none of the top executives at bunch managed to
force plant managers for various product lines to toe the line)
... compatible product line was more important than features for any
particular model.

in the wake of failure FS
http://www.garlic.com/~lynn/submain.html#futuresys
there was mad rush to get stuff back into product pipelines,
3033 & 3081 kicked off in parallel
http://www.jfsowa.com/computer/memo125.htm
3033 started out 168-3 logic mapped to 20% faster chips.

4341 (endicott) came out in 1979, a little after 3033 (POK) ... but
cluster of 4341s was much cheaper than 3033, much more powerful
aggregate computing, much less aggregate footprint and
environmentals. Head of POK was apparently so threatened that at one
point managed to get allocation for critical 4341 manufacturing
component cut in half.

then there is my oft repeated tale about late 80s, a senior disk
engineer got a talk scheduled at internal, world-wide, annual,
communication group conference ... supposedly on 3174 performance
... however he opened his talk with the statement that the head of the
communication group was going to be responsible for the demise of the
disk division. The issue was that the communication group had
stranglehold on datacenters with corporate strategic ownership of
everything that crossed datacenter walls and were fiercely fighting
off distributed computing and client/server, trying to preserve their
dumb terminal paradigm and install base. The disk division was seeing
data fleeing datacenters to more distributed computing friendly
platforms with fall in disk sales. The disk division had come up with
a number of solution to address the opportunity, but they were
constantly being vetoed by the communication group. The mainframe
datacenter stranglehold wasn't just affecting disk sales and a few
years later the company goes into the red. some past refs
http://www.garlic.com/~lynn/subnetwork.html#termainal

--
virtualization experience starting Jan1968, online at home since Mar1970

AFR Report: Private Equity's Failing Grade in the For-Profit College Industry

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: AFR Report: Private Equity's Failing Grade in the For-Profit College Industry
Date: 30 Mar 2018
Blog: Facebook

AFR Report: Private Equity's Failing Grade in the For-Profit College Industry
http://ourfinancialsecurity.org/2018/03/afr-report-private-equitys-failing-grade-profit-college-industry/

Private equity puts lots of pressure on their acquisitions to cut
corners and generate money every way possible ... over half corporate
defaults are companies currently or previous in private equity mill
http://www.nytimes.com/2009/10/05/business/economy/05simmons.html?_r=0

PE Firm Cerberus Capital's "Rollup" Collapses into Bankruptcy;
Bankruptcy becomes an increasingly common "exit." And the pension
obligations?
https://wolfstreet.com/2018/03/26/pe-firm-cerberus-capitals-rollup-collapses-into-bankruptcy/

In a leveraged buyout, the acquired company is made to borrow the
money for its own acquisition and pay those funds to the acquirer,
which uses those funds to pay off the bridge loan originally taken out
to fund the initial deal. In other words, the acquirer has little or
no equity in the deal, and the acquired company has been loaded up
with debt. Hence "leveraged buyout."

... snip ...

PE background heavily lobbying congress
http://www.motherjones.com/politics/2007/10/barbarians-capitol-private-equity-public-enemy/

private-equity posts
http://www.garlic.com/~lynn/submisc.html#private.equity

--
virtualization experience starting Jan1968, online at home since Mar1970

Old word processors

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Old word processors
Newsgroups: alt.folklore.computers
Date: Fri, 30 Mar 2018 19:29:36 -0700

hancock4 writes:

From what I've read, creating a compatible product line across
all four modes* in 1960 would require a lot of compromises that
would downgrade performance and increase cost.  In 1960, computer
hardware was still extremely expensive, not that fast, so including
circuits to do unwanted functions was an unnecessary expense.  Indeed,
even in the early days of S/360 and even PC's, floating point was an
optional feature.  The addressing needs on a small machine are different
than a large machine; S/360 base+displacement was a compromise.

re:
http://www.garlic.com/~lynn/2018c.html#15 Old word processors
http://www.garlic.com/~lynn/2018c.html#16 Old word processors

claim was that in that emerging computing market, compatibility
outweighed model performance advantage.

majority of 360s were microprogrammed ... so it wasn't all those
circuits.

don't know much about 360 microprogramming ... a little more about
115-II/125-II and 138/148. they avg. 10 native instructions for every
(simulated 370).

115/125 was done by boeblingen (germany) ... it was nine-position memory
bus, 115 had all microprocessors the same ... but with different
microcode loads, 370 instruction, controlleres, etc.  125 was the
identical except the processor running 370 instructions was 50% faster
than the others. 115 was about 800kips processor doing 370 at about
80kips (1/10), 125 was about 1.2mips, doing 370 at 120kips. boeblingen
got their hands "slapped" for doing general 9 position memory bus
implementation.

I got sucked into doing design for 5-way 125 smp that had five of the
processors running 370 microcode (that never shipped). some past
posts
http://www.garlic.com/~lynn/submain.html#bounce
general SMP posts
http://www.garlic.com/~lynn/subtopic.html#smp

about same time, Endicott sucked me into ECPS ... that wanted highest
used 6kbytes of kernel instructions to drop into microcode. following is
study I did ... showing kernel instructions segments sorted by percent
of kernel CPU (6k bytes accounted for 79.55% of kernel CPU execution)
http://www.garlic.com/~lynn/94.html#21 370 ECPS VM microcode assist

FS posts
http://www.garlic.com/~lynn/submain.html#futuresys

at about same time FS imploded and there was mad rush to get products
back into 370 pipeline ... kick off 3033 and 3081 about the same time
http://www.jfsowa.com/computer/memo125.htm

they took 370/158 with integrated channel and removed the 370 microcode
and used 158 engine with just the integrated channel microcode for
external 303x channel director (six channels). A 3031 then was 158
engine with just the 370 microcode and 2nd 158 engine with just the
integrated channel microcode (channel director and a 2-way 3031 smp was
four 158 engines). A 3032 was 168-3 repackaged to use channel
director(s) as external channels (replacing 2860, 2870, 2880). A 3033
then was 168-3 logic remapped to 20% faster chips.

I periodically claimed that father of risc in the mid-70s did risc the
exact opposite of FS (using FS as example of how not to do something).
Circa 1980, 801/risc Iliad was to be the wide variety of internal
microprocessors used in controllers, 370, etc. ... AS/400 followon to
s/36&s/38, 4361&4381 followon toe 4331&4341, etc ... then for various
reasons all these efforts imploded and things returned to standard
customer CISC (and some number of Iliad chip engineers left for risc
projects at other vendors). 801/risc posts
http://www.garlic.com/~lynn/subtopic.html#801

earlier posts in this thread
http://www.garlic.com/~lynn/2018b.html#94 Old word processors
http://www.garlic.com/~lynn/2018b.html#100 Old word processors
http://www.garlic.com/~lynn/2018b.html#103 Old word processors
http://www.garlic.com/~lynn/2018b.html#109 Old word processors
http://www.garlic.com/~lynn/2018c.html#1 Old word processors
http://www.garlic.com/~lynn/2018c.html#7 Old word processors

--
virtualization experience starting Jan1968, online at home since Mar1970

How China's New Stealth Fighter Could Soon Surpass the US F-22 Raptor

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: How China's New Stealth Fighter Could Soon Surpass the US F-22 Raptor
Date: 31 Mar 2018
Blog: Facebook

How China's New Stealth Fighter Could Soon Surpass the US F-22 Raptor;
The J-20's rapidly evolving combat capabilities could make it a world
leading aerial warfare platform.
https://thediplomat.com/2018/03/how-chinas-new-stealth-fighter-could-soon-surpass-the-us-f-22-raptor/

Chief Engineer of China's Alleged Stealth Fighter Vows New
Capabilities For Aircraft; In an exclusive interview with Chinese
state-run media, the J-20's chief engineer pledged new capabilities
for the aircraft.
https://thediplomat.com/2018/03/chief-engineer-of-chinas-alleged-stealth-fighter-vows-new-capabilities-for-aircraft/

Just Face It - The F-35 Is A "Bomb Truck"
https://warnewsupdates.blogspot.com/2014/03/a-must-read-commentary-on-f-35.html
Head Of U.S. Air Combat Command: F-35s 'Irrelevant' Without U.S.-Only
F-22 As Support
https://warnewsupdates.blogspot.com/2014/03/head-of-us-air-combat-command-f-35s.html

Comparison analysis of F35 with other planes
http://www.ausairpower.net/jsf.html
has analysis of F35 radar signature at different radar frequencies
involving different angles and portions of the frame (lots to say
about how cost reduced and compromised stealth compared to original
design)
http://www.ausairpower.net/APA-2009-01.html

military-industrial(-congressional) complex
http://www.garlic.com/~lynn/submisc.html#military.industrial.complex

recent F-22 &/or F-35 posts
http://www.garlic.com/~lynn/2017i.html#11 The General Who Lost 2 Wars, Leaked Classified Information to His Lover--and Retired With a $220,000 Pension
http://www.garlic.com/~lynn/2017i.html#13 Merchants of Doubt
http://www.garlic.com/~lynn/2017i.html#24 Systemic Risk
http://www.garlic.com/~lynn/2017i.html#38 Bullying trivia
http://www.garlic.com/~lynn/2017i.html#51 Russian Hackers Stole NSA Data on U.S. Cyber Defense
http://www.garlic.com/~lynn/2017i.html#56 China's mega fortress in Djibouti could be model for its bases in Pakistan
http://www.garlic.com/~lynn/2017i.html#69 When Working From Home Doesn't Work
http://www.garlic.com/~lynn/2017i.html#78 F-35 Multi-Role
http://www.garlic.com/~lynn/2017i.html#84 "Worse Than Big Tobacco": How Big Pharma Fuels the Opioid Epidemic
http://www.garlic.com/~lynn/2017j.html#35 Tech: we didn't mean for it to turn out like this
http://www.garlic.com/~lynn/2017j.html#44 Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core
http://www.garlic.com/~lynn/2017j.html#63 Sugar Industry Long Downplayed Potential Harms
http://www.garlic.com/~lynn/2018.html#11 This is the plane that almost beat out the legendary F-16
http://www.garlic.com/~lynn/2018.html#48 1963 Timesharing: A Solution to Computer Bottlenecks
http://www.garlic.com/~lynn/2018.html#69 The Next New Military Specialty Should Be Software Developers
http://www.garlic.com/~lynn/2018b.html#17 Important US technology companies sold to foreigners
http://www.garlic.com/~lynn/2018b.html#39 Why China's New Supercomputer Is Only Technically the World's Fastest
http://www.garlic.com/~lynn/2018b.html#86 Lawmakers to Military: Don't Buy Another 'Money Pit' Like F-35
http://www.garlic.com/~lynn/2018b.html#95 The Return Of Haim Bodek - HFT's First Whistleblower
http://www.garlic.com/~lynn/2018b.html#114 Chevron's lawyer, speaking for major oil companies, says climate change is real and it's your fault
http://www.garlic.com/~lynn/2018b.html#117 F-35: Still No Finish Line in Sight
http://www.garlic.com/~lynn/2018c.html#2 FY18 budget deal yields life-sustaining new wings for the A-10 Warthog
http://www.garlic.com/~lynn/2018c.html#14 Air Force Risks Losing Third of F-35s If Upkeep Costs Aren't Cut

--
virtualization experience starting Jan1968, online at home since Mar1970

April 1st Corporate Directive

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: April 1st Corporate Directive
Date: 01 April 2018
Blog: Facebook

Corprate Directive was sent to me on Friday and I redistributed.
Somebody printed it off on 6670 using IBM Corprorate letterhead and
placed it in all the bldg bulletin boards. Monday morning various
people didn't recognize the Sunday, April 1st date and took it as
real. The resulting investigation didn't find the person responsible
... however afterwards all corporate letterhead paper was kept locked
up

CORPORATE DIRECTIVE NUMBER 84-570471                               April 1, 1984

In order to increase the security of all IBM computing facilities, and to avoid
the possibility of unauthorized use of these facilities, new rules are being put
into effect concerning the selection of passwords.  All users of IBM computing
facilities  are  instructed to change their passwords to conform to these rules
immediately.

RULES FOR THE SELECTION OF PASSWORDS:

 1. A password must be at least six characters long, and must not contain two
    occurrences of a character in a row, or a sequence of two or more characters
    from the alphabet in forward or reverse order.
    Example:  HGQQXP is an invalid password.
              GFEDCB is an invalid password.

 2. A password may not contain two or more letters in the same position as any
    previous password.
    Example:  If a previous password was GKPWTZ, then NRPWHS would be invalid
              because PW occurs in the same position in both passwords.

 3. A  password may not contain the name of a month or an abbreviation for a
    month.
    Example:  MARCHBC is an invalid password.
              VWMARBC is an invalid password.

 4. A  password  may  not  contain  the  numeric  representation  of  a  month.
    Therefore, a password containing any number except zero is invalid.
    Example:  WKBH3LG is invalid because it contains the numeric representation
                      for the month of March.

 5. A password may not contain any words from any language.  Thus, a password
    may not contain the letters A, or I, or sequences such as AT, ME, or TO
    because these are all words.

 6. A password may not contain sequences of two or more characters which are
    adjacent to each other on a keyboard in a horizontal, vertical or diagonal
    direction.
    Example:  QWERTY is an invalid password.
              GHNLWT is an invalid password because G and H are horizontally
                     adjacent to each other.
              HUKWVM is  an  invalid  password  because H and U are diagonally
                     adjacent to each other.

 7. A password may not contain the name of a person, place or thing.
    Example:  JOHNBOY is an invalid password.

Because of the complexity of the password selection rules, there is actually only
one password which passes all the tests.  To make the selection of this password
simpler  for  the  user,  it will be distributed to all managers.  All users are
instructed  to obtain this password from his or her manager and begin using it
immediately.

.... previous posts
http://www.garlic.com/~lynn/2001d.html#52 OT Re: A beautiful morning in AFM.
http://www.garlic.com/~lynn/2001d.html#53 April Fools Day
http://www.garlic.com/~lynn/2016h.html#14 The FBI Is Wrongly Telling People To Change Passwords 'Frequently'
http://www.garlic.com/~lynn/2017h.html#42 The Man Who Wrote Those Password Rules Has a New Tip: N3v$r M1^d!

disclaimer: we have bunch of patents related to authentication w/o
using passwords.
http://www.garlic.com/~lynn/aadssummary.htm

we were working with patent boutique law firm and had draft claims for
50 patent applications and the law firm that before we were done it
would be over a hundred. Then some executive looked at how much it
would cost to file that many patents and directed that all the claims
be repackaged as nine patent applications. Afterwards USPTO came back
and said it was getting tired of these humongous applications where
the filing fee doesn't even cover the cost of reading the application,
directing the claims be repackaged as at least two dozen
applications. past posts on shared-secret (pins, passwords,
something-you-know, etc) authentication.
http://www.garlic.com/~lynn/subintegrity.html#secrets
reference to ANSI financial transaction standard that separates
authentication
http://www.garlic.com/~lynn/x959.html#x959
and past posts
http://www.garlic.com/~lynn/subpubkey.html#x959

--
virtualization experience starting Jan1968, online at home since Mar1970

How China's New Stealth Fighter Could Soon Surpass the US F-22 Raptor

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: How China's New Stealth Fighter Could Soon Surpass the US F-22 Raptor
Date: 01 Apr 2018
Blog: Facebook

re:
http://www.garlic.com/~lynn/2018c.html#19 How China's New Stealth Fighter Could Soon Surpass the US F-22 Raptor

DoD watchdog: Air Force failed to effectively manage F-22
modernization
https://www.defensenews.com/air/2018/03/27/dod-watchdog-air-force-failed-to-effectively-manage-f-22-modernization-program/

For F-22, military-industrial complex spread development out into
every congressional district ... trying to bring all the pieces
together resulted in quality collapse.
http://nypost.com/2009/07/17/cant-fly-wont-die/

2016, 100th Boeing celebration produced publication ... one of the
articles was that the merger with M/D nearly brought down the company
and may yet still. They had claimed that doing standard MIC spreading
pieces all over the world would drastically reduce costs and
development time .... but it did the exact opposite.
https://issuu.com/pnwmarketplace/docs/i20160708144953115

May work for commodity parts where everything is already totally
understood. Doing it for brand new innovation and then bringing them
together runs into all sorts of gotchas ... whether it is hardware or
software.

F-22 constant LO restoration
http://www.tyndall.af.mil/News/Features/Display/Article/669883/lo-how-the-f-22-gets-its-stealth/
more problems
http://aviationweek.com/air-combat-safety/us-air-force-tackles-repair-f-22-stealth-coating
and
http://nationalinterest.org/blog/the-buzz/the-big-problem-americas-stealth-f-22-raptor-america-cant-19420

military-industrial(-congressional) complex
http://www.garlic.com/~lynn/submisc.html#military.industrial.complex

--
virtualization experience starting Jan1968, online at home since Mar1970

Historical Perspectives of the Operational Art

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Historical Perspectives of the Operational Art
Date: 01 Apr 2018
Blog: Facebook

Historical Perspectives of the Operational Art
https://history.army.mil/html/books/070/70-89-1/index.html
I had the PDF version kindlized by Amazon, so location refs might not
be identical to the official kindle version.
https://www.amazon.com/HISTORICAL-PERSPECTIVES-OPERATIONAL-ART-ANTHOLOGY-ebook/dp/B0086W3GX2/

loc7562-67:

Fortunately for the Allies, Neptune, translated into action on DDay,
6 June 1944 — rewarded the care of its planners by proceeding so
smoothly and effectively that the D-Day invasion was almost an
anticlimax. The losses in the invading force that day, somewhat over
10,000 in total with about 2,000 dead, were obviously not
inconsiderable, but they were certainly fewer than most of the Allied
planners and commanders had anticipated. On four of the five assault
beaches, there was never any question following the first waves of the
landing force that the invasion would stay and would not be pushed
back into the water. Even on the Americans' Omaha Beach, the only
place where during the morning there seemed to be danger of a
reversal, doubts were resolved by noon.

loc7567-70:

But the Neptune planning had been tactical and technological rather
than operational. D-Day had been almost anticlimactic in its success
because there had been intricately detailed calculation of such
tactically important minutiae as considerations of the proper timing
of the first landings in relation to tidal conditions — preferably at
midpoint on a rising tide so that landing vessels disembarking troops
and cargo could readily be re-floated.

... snip ...

note strategic 4engine heavy bombers had difficulty hitting target from 5-6
miles up, even with Norden sights. Example
https://ssi.armywarcollege.edu/pubs/display.cfm?pubID=1075

loc2582-85:

The bomber preparation of Omaha Beach was a total failure, and German
defenses on Omaha Beach were intact as American troops came ashore. At
Utah Beach, the bombers were a little more effective because the IXth
Bomber Command was using B-26 medium bombers. Wisely, in preparation
for supporting the invasion, maintenance crews removed Norden
bombsights from the bombers and installed the more effective low-level
altitude sights.

... snip ...

military-industrial(-congressional) complex
http://www.garlic.com/~lynn/submisc.html#military.industrial.complex

--
virtualization experience starting Jan1968, online at home since Mar1970

VS History

From: lynn@GARLIC.COM (Anne & Lynn Wheeler)
Subject: Re: VS History
Newsgroups: bit.listserv.ibm-main
Date: 3 Apr 2018 13:13:10 -0700

john.archie.mckown@GMAIL.COM (John McKown) writes:

​Not exactly correct. OS/VS1 was a single large address space. That
one address space was divided up into a _fixed_ number of _fixed
sized_ partitions (not regions). That is, if you had a step which
required, say, 128M to run, you had to be sure it as in a partition
which was at least 128M. The size of a partition was set by the
sysprog or, IIRC, via an operator command. OS/VS2 release 1 was also
called SVS (Single Virtual Storage). It has a single 24 bit
addressable space which has a number of "regions" defined. Like in
MVT, the size of a region was variable and basically it was
"GETMAIN'd" when the job (or step - I forget) started. One problem
that could exist in SVS was that a long running job might be
GETMAINd while some smaller jobs were running. The long running
job's storage would be a "sandbar" which could prevent other large
jobs from running due to lack of contiguous storage. That why many
shops would "shut down" batch in order to "start up" all the long
running tasks, such as CICS, IMS, etc so that those STCs would not
turn into storage sandbars.

SVS prototype was initially developed on 360/67 ... basically not too
different MVT running in 16mbyte virtual machine ... SVS built tables
for single 16mbyte virtual address space ... and a little bit to handle
very low rate paging. The largest amount of code was borrowing CCWTRANS
from CP/67 to hack into the side of EXCP for building shadow channel
programs.

CP/67 had operating systems running in virtual machines building channel
programs with virtual addresses ... which CP67 CCWTRANS had to build
"shadow" channel program (same as original but with real
addresses). OS/VS2 both SVS and MVS had same problem with MVT
applications building their own channel programs, but now addresses were
virtual ... and then executing EXCP/SVC0. EXCP was now faced with making
a copy of the applications channel programs that replaced the virtual
address with real addresses.

original justification for making all 370s virtual memory came from the
really bad storage management in MVT ... resulting in region sizes
typically having to be four times more storage that would be actually
used ... this severely restricted the number of regions that could be
defined on typical one megabyte 370/165. Moving MVT to virtual memory
(aka SVS) met that could get four times as many regions with doing
little or no paging (this was even w/o long running jobs which severely
aggrevating the storage management problem).

archived post with history from somebody in POK at the time, who was
involved in the decision
http://www.garlic.com/~lynn/2011d.html#73 Multiple Virtual Memory

MVS also turned out to have horrible problem with OS/360 API pointer
passing convention ... as a result it started out with an 8mbyte image
of the MVS kernel in each application 16mbyte virtual address space
(so when kernel code got the API pointer, it could directly access the
parameter fields in the application address area). However, MVT had a
lot of subsystems (outside the kernel) that needed to access
application parameters. For this they created the one mbyte common
segment area ... storage that appeared in every application 16mbyte
virtual address space ... could allocate storage in the CSA for
parameters that both the application and a subsystem running in a
different virtual address space, could access (now max. application
area was 7mbytes out of 16mbytes).

However, the size requirement for CSA is somewhat proportional to the
number of subsystems and activity ... by 3033 ...  CSA had become
"common system area" (rather than "common segment area") and large
installations were having problems restricting CSA to 5or6 mbytes
(leaving 2-3mbytes out of 16mbytes for applications) and CSA was
threatening to grow to 8mbytes ... leaving zero bytes for
applications.

After failure of FS (original os/vs2 MVS was suppose to be "glide
path" for the 370 replacement totally different from 370 ... see above
archived post), POK kicked off 3033 and 3081 (370/xa) in
parallel. 370/xa was to address a large number of MVS problems ... one
was new hardware mechanism for applications directly calling
subsystems (w/o having to execute kernel code) along with "access
register" architecture that provided ability for subsystems to access
storage in different application virtual address space.

However, the CSA/API problem was getting so bad in 3033 (before
370/xa), that a subset of access registers was retrofitted to 3033 as
"dual address space" mode (person responsible left not long later for
HP, working on their snake/risc and then later was one of the primary
architects for Itanium, including a lot of enterprise integrity
features).

Endicott (low/mid range 370s) equivalent to 370xa was "e-architecture"
... since DOS/VS & VS1 had single virtual address space,
"e-architecture" where the virtual address space table was moved into
microcode and new instructions were added that update the virtual
memory table entries (now in microcode). Endicott equivalent for 3033
(after FS failure) was ECPS microcode assist ... parts of kernel
pathlengths were moved into microcode where they ran ten times
faster. I was told to select the 6kbytes most executed kernel code
... archived post with the result
http://www.garlic.com/~lynn/94.html#21

shows selected 6kbyte of kernel that accounts for 79.55% of kernel
cpu.  Along with that they did VM370/VS1 handshaking ... the virtual
machine size and the VS1 virtual memory size were identical ... so all
paging was moved into VM370 ... and handshaking interface between
VM370&VS1 so VS1 could switch to a different application when there
was page fault.  I had also heavily optimized VM370 paging algorithms
and other pathlengths ...  so any VS1 that normally had any amount of
paging ... would run faster under VM370 (with ECPS) than on bare
hardware.

IBM Future System posts
http://www.garlic.com/~lynn/submain.html#futuresys

--
virtualization experience starting Jan1968, online at home since Mar1970

Old word processors

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Old word processors
Newsgroups: alt.folklore.computers
Date: Tue, 03 Apr 2018 14:08:12 -0700

hancock4 writes:

But as it turned out, many S/360-model 30 users ended up upgrading to
a better machine, or migrated to low-end S/370, so Haanstra ended
up being wrong and IBM mgmt was right to demand compatibility.
But, as mentioned, IBM eventually had to compromise on that to
introduce the model 20 and the System/3, which were not compatible.

re:
http://www.garlic.com/~lynn/2018c.html#16 Old word processors
http://www.garlic.com/~lynn/2018c.html#18 Old word processors

SHARE
https://www.share.org/

old case study of fastest growing customer was Amoco Research in Tulsa
that had IBM 1800 and then installed 370/135 with vm370 ... within
something like 18-24(?) months they had multiple 370/168s with vm370.

a big objective of (unix) posix was to free customers from proprietary
hardware ... allowing customers to migrate their posix applications
easily between hardware vendors ... big advances in software
technology and commoditizing hardware.

this was somewhat started in the 80s with startups doing new systems
...  with CPU chips, the cost of system hardware development had
dropped dramatically (leaving system software development the enormous
cost).  Using UNIX, then dropped the cost of system software
development to more than the drop in system hardware development.

In parallel with that was IBM/PC market starting from dedicated
desktop and volume allowing players into the market to expand into
much of the rest of the computer market ... although Linux (unix work
alike) comes out of the left field. Full source got the hobby market
... but also got the expanding cluster supercomputer and cloud
megadatacenter market (... and needing full source for the increasing
number of players to tailor for the new computing system
paradigm). Linux with full source also captures many of the other
non-traditional emerging (& rapdidly growing) computing markets.

other past posts in this thread
http://www.garlic.com/~lynn/2018b.html#94 Old word processors
http://www.garlic.com/~lynn/2018b.html#100 Old word processors
http://www.garlic.com/~lynn/2018b.html#103 Old word processors
http://www.garlic.com/~lynn/2018b.html#109 Old word processors
http://www.garlic.com/~lynn/2018c.html#1 Old word processors
http://www.garlic.com/~lynn/2018c.html#7 Old word processors
http://www.garlic.com/~lynn/2018c.html#15 Old word processors

--
virtualization experience starting Jan1968, online at home since Mar1970

OFF TOPIC: Spring Break, 1947

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: OFF TOPIC:  Spring Break, 1947
Newsgroups: alt.folklore.computers
Date: Tue, 03 Apr 2018 14:46:36 -0700

spring break, 1969 ... i was asked to give 40hr computer class to new
group that had been formed to start Boeing Computer Services
(consolidate dataprocessing into indepedent business unit to better
monetize the investment, including offering services to non-Boeing
entities ... Renton datacenter had something like $200M-$300M IBM
mainframes, 360/65s were arriving faster than they could be installed,
boxes constantly staged in the hallways around the machine room).

I had taken a 2hr computer intro class and within year was hired
fulltime to be responsible for univ admin & academic production
mainframe systems ... and was still going to school parttime.

At end of spring semester, then Boeing hires me fulltime to be part of
the BCS group (near the CFO office, who was runnign the BCS effort,
across from Boeing Field, a dozen or so desks in large room that had
previously been filled with drafting tables). CFO battles with head of
Renton datacenter ... since when I started, CFO only had a 360/30 used
for payroll ... although space was added for 360/67 for me to play
with).

--
virtualization experience starting Jan1968, online at home since Mar1970

DoD watchdog: Air Force failed to effectively manage F-22 modernization

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: DoD watchdog: Air Force failed to effectively manage F-22 modernization
Date: 03 Apr 2018
Blog: Facebook

DoD watchdog: Air Force failed to effectively manage F-22
modernization
https://www.defensenews.com/air/2018/03/27/dod-watchdog-air-force-failed-to-effectively-manage-f-22-modernization-program/

For F-22, military-industrial complex spread development out into
every congressional district ... trying to bring all the pieces
together resulted in quality collapse.
http://nypost.com/2009/07/17/cant-fly-wont-die/

2016, 100th Boeing celebration produced publication ... one of the
articles was that the merger with M/D nearly brought down the company
and may yet still. They had claimed that doing standard MIC spreading
pieces all over the world would drastically reduce costs and
development time .... but it did the exact opposite.
https://issuu.com/pnwmarketplace/docs/i20160708144953115

May work for commodity parts where everything is already totally
understood. Doing it for brand new innovation and then bringing them
together runs into all sorts of gotchas ... whether it is hardware or
software.

F-22 constant LO restoration
http://www.tyndall.af.mil/News/Features/Display/Article/669883/lo-how-the-f-22-gets-its-stealth/
more problems
http://aviationweek.com/air-combat-safety/us-air-force-tackles-repair-f-22-stealth-coating
and
http://nationalinterest.org/blog/the-buzz/the-big-problem-americas-stealth-f-22-raptor-america-cant-19420

military-industrial(-congressional) complex posts
http://www.garlic.com/~lynn/submisc.html#military.industrial.complex

Huge uptic in outsourcing last decade to for-profit companies,
especially to companies that had been bought up by large
private-equity operations ... looking to extract every dollar
possible, heavy congressional lobbying by for-profit companies
... especially private-equity operations

private-equity posts
http://www.garlic.com/~lynn/submisc.html#private.equity

intelligence, 70% of the budget and over half the people (including
private-equity owned company that employed Snowden)
http://www.investingdaily.com/17693/spies-like-us
also heavily contributing to the rapidly spreading for-profit success
of failure culture (make more money off series of failures)
http://www.govexec.com/excellence/management-matters/2007/04/the-success-of-failure/24107/
private equity owned companies under enormous pressure to cut corners
and extract money every way possible ... over half corporate defaults
are companies currently or formally in private equity mills
http://www.nytimes.com/2009/10/05/business/economy/05simmons.html?_r=0

There is law that gov. agencies can't lobby congress and beltway
bandits can't use money from government contracts to lobby congress
... however private-equity companies appear to have no limits on
lobbying that they do on behalf of the companies they own
... enormously increasing the flow of money to congress (part of
congress being referred to the most corrupt institution on earth)
... which would go a long way to help account for the enormous uptic
in outsourcing last decade.
http://www.motherjones.com/politics/2007/10/barbarians-capitol-private-equity-public-enemy/

Lou Gerstner, former ceo of ibm, now heads the Carlyle Group, a
Washington-based global private equity firm whose 2006 revenues of $87
billion were just a few billion below ibm's. Carlyle has boasted
George H.W. Bush, George W. Bush, and former Secretary of State James
Baker III on its employee roster.

... snip ...


success of failure posts
http://www.garlic.com/~lynn/submisc.html#success.of.failure
former amex president posts
http://www.garlic.com/~lynn/submisc.html#gerstner In the wake of the snowden event (employed by beltway bandit owned by Carlyle) they found that the private-equity owned companies that security clearances had been outsourced to ... were filling out paper work but not actually doing background checks ... part of cutting corners and increasing bottom line for their private-equity owners. A few months after the snowden event, the agency director had press conference where he said something about they might have to (re-)institute multi-party for sensitive operations (something that had previously been standard for decades countermeasure to insider threats, apparently/possibly cut as part of the outsourcing) other take on huge rash of breaches, we had been brought in to help wordsmith cal. state legislation, at the time they were working on electronic signature, data breach notification, and opt-in personal information sharing. Several participants had done detailed public privacy surveys and #1 was identity theft, mainly fraudulent financial transactions frequently as a result of data breaches. At the time there was little or nothing being done (except efforts to keep out of the press). There was hope that publicity from notifications might motivate corrective action. The issue is entities normally take security measures in self protection. The problem with the breaches was the institution wasn't at risk, it was the public. In the case of advisories dancing through contractor networks most of last decade, taking details of all major weapons systems, the contractors aren't (directly) at risk, it is the country (contractors are likely to get more money, variation on success of failure). perpetual war posts http://www.garlic.com/~lynn/submisc.html#perpetual.war some recent cyberdumb posts http://www.garlic.com/~lynn/2018.html#69 The Next New Military Specialty Should Be Software Developers http://www.garlic.com/~lynn/2018b.html#86 Lawmakers to Military: Don't Buy Another 'Money Pit' Like F-35 http://www.garlic.com/~lynn/2018b.html#112 How China Pushes the Limits on Military Technology Transfer http://www.garlic.com/~lynn/2018b.html#117 F-35: Still No Finish Line in Sight electronic signature posts http://www.garlic.com/~lynn/subpubkey.html#signature data breach notification http://www.garlic.com/~lynn/submisc.html#data.breach.notification -- virtualization experience starting Jan1968, online at home since Mar1970

Software Delivery on Tape to be Discontinued

From: lynn@GARLIC.COM (Anne & Lynn Wheeler)
Subject: Re: Software Delivery on Tape to be Discontinued
Newsgroups: bit.listserv.ibm-main
Date: 3 Apr 2018 17:55:50 -0700

0000000a2a8c2020-dmarc-request@LISTSERV.UA.EDU (Tom Marchant) writes:

I'm pretty sure that the 470/6 was never shipped. The way I heard it was that
work on the 470/V started very soon after the introduction of virtual memory
on 370 machines and the announcement of OS/VS1 and OS/VS2. OS/VS1 and
OS/VS2 release 1 were both introduced in 1972 and OS/VS2 release 2 (MVS)
in 1973, though I don't know when it actually shipped. See
http://bitsavers.trailing-edge.com/pdf/ibm/370/OS_VS2/Release_2_1973/GC28-0667-1_OS_VS2_Planning_Guide_for_Release_2_Nov73.pdf

The Wiki article on Amdahl Corporation is no help here. According to it, the
470/6 was introduced in 1975, and that when IBM announced DAT, Amdahl
dropped the 470/6 and replaced it with the 470V/6. It also claims, incorrectly,
that MDF was first shipped on the 470V/8. In fact, MDF required major
architectural extensions that were not available until the 5860.

re:
http://www.garlic.com/~lynn/2018c.html#23 VS History

also from bitsavers:
http://www.bitsavers.org/pdf/amdahl/datapro/70C-044-01_7709_Amdahl_470.pdf
more:
http://www.bitsavers.org/pdf/amdahl/

Amdahl Corporation was the first company to develop and produce an IBM
plug-compatible mainframe computer.  The company, formed in 1971 by Dr.
Gene Amdahl, delivered its first processor, the 470V /6, in June 1975.

The original Amdahl 470 was intended to be a real- memory system
targeted at IBM's System/370 Model 165.  The target moved, however, with
IBM's announcement of the virtual-memory 370/168 in August 1972, and
Amdahl modified its system design to incorporate virtual- memory
hardware, enabling the new system to compete with IBM's latest
technology.  The system that resulted from this shift in direction, the
470V/6, featured about twice the performance level of the IBM~370/168 at
a similar price, while occupying only one-third of the space required by
the IBM counterpart

... snip ...

more amdahl ref:
http://www.bitsavers.org/pdf/amdahl/

Amdahl account of running ACS/360 ... however it was terminated because
executives were afraid that it would advance state-of-the-art too fast
and they would loose control of the market
https://people.cs.clemson.edu/~mark/acs_end.html

Amdahl gave a talk in large MIT auditorium early 70s about starting
company ... filled mostly students ... but several of us from the IBM
science center attended. He was asked how he convince VC people to
fund his company. He said that he told them that even if IBM totally
walked away from 370 ... there was sufficient customer 370 software
that would keep him in business until the end of the century.  Could
be interrupted that he was referring to the IBM Future System effort
that was going to completely replace 370 ... but in subsequent
interviews he claims he never knew about FS. some FS ref:
http://www.jfsowa.com/computer/memo125.htm

370/165 ref. ... original 370 virtual memory architecture had a lot
more features ... but POK was running into all sorts of problems
retrofitting virtual memory hardware to 165 ... and claimed if they
had to do the full architecture, virtual memory announce would have to
slip by 6months. Decision was made to eliminate the troublesome
features ... and existing 370 models & software that had support
for the removed features would have to eliminate (redo hardware and
rework software).

other trivia: In the 70s, I did a lot of mainframe customer
presentations and got to know many customers. I got to know the
manager of one of the largest financial mainframe datacenters on the
east coast, who liked me to drop by and talk technology. Then at one
point the branch manager did something that horribly offended the
customer. In response, the customer announced they would order an
Amdahl (clone) mainframe (lonely Amdahl in vast sea of blue). At the
time, clone makers had been selling into mostly universities but
hadn't broken into the true blue large financial market ... and this
would be the first. I was asked to go sit onsite at the customers for
12months to help obfuscate the reason for the Amdahl order. I said
that I knew the customer really well and while he liked the idea of me
spending my time there, it would make no difference in the order
... so I didn't see any point. I was told that the branch manager was
good sailing buddy of IBM's CEO and if I didn't do this, it would ruin
the branch manager's career ... and I could forget about having any
career or promotions at IBM (it wasn't the first time I got told
that).

--
virtualization experience starting Jan1968, online at home since Mar1970

Software Delivery on Tape to be Discontinued

From: lynn@GARLIC.COM (Anne & Lynn Wheeler)
Subject: Re: Software Delivery on Tape to be Discontinued
Newsgroups: bit.listserv.ibm-main
Date: 3 Apr 2018 18:42:01 -0700

0000000433f07816-dmarc-request@LISTSERV.UA.EDU (Paul Gilmartin) writes:

I don't understand digital signatures beyond what I just read in:
https://en.wikipedia.org/wiki/Digital_signature

... Digital signatures are equivalent to traditional handwritten signatures
in many respects, but properly implemented digital signatures are more
difficult to forge than the handwritten type.  ...
Paper contracts sometimes have the ink signature block on the last page,
and the previous pages may be replaced after a signature is applied.  ...

But it seems that all such schemes depend on being able to authenticate
a public key from some certificate authority.  It doesn't appear that a
digitally signed document can be entirely self-contained.

So is a signature any more secure than an independently verifiable checksum,
or just more practical?

trivia: digital signature is the hash of the document (SHA-2) that has
been encrypted with the private key. On reception, you recompute the
hash, decrypt the digital signature with the corresponding public key
and compare the two hashes. One of the original motivations for
public/private key was to get around some of the secret key distribution
problems (which has to be hidden and never divulged). Public key had be
publicly distributed (w/o needing to hide). People can use the public
key to encrypt stuff and send it to you ... and only you can decrypt it
(with the private key). You can encrypt stuff with the private key ...
and people can decrypt it (like digital signature) with public key
... and know it came from you ... since only your private key could have
encrypted something that is decryptable with your public key.

we worked on the cal. state electronic signature legislation ... one
of the things is that "digital signatures" aren't true human
signatures in the legal sense ... "digital signatures" can be used for
authentication (in the same way pins and passwords) ... but need some
additional features to qualify as a legal signature. In that sense,
might claim that they were purposefully called "digital signatures" in
an attempt to try and inflate their perceived value (justify charging
billions)

electronic signature legislation posts
http://www.garlic.com/~lynn/subpubkey.html#signature

Last project we did at IBM was HA/CMP ... and was working on commercial
cluster scalenup with RDBMS vendors and technical scaleup with national
labs. Old post about Jan1992 meeting in Oracle CEO conference room
on commercial cluster scaleup
http://www.garlic.com/~lynn/95.html#13

within a few weeks of the meeting, cluster scaleup was transferred,
announced as supercomuter and we were told we couldn't work on anything
with more than four processors. Possible contributing faster was that
the mainframe DB2 people were complaining if I went ahead, it would
be at least 5yrs ahead of them. We leave IBM a few months later.

A little while later, two of the Oracle people (from the Jan1992
meeting) have left and our at small client/server startup responsible
for something called "commerce server". We are brought in as consultants
because they want to do payment transactions on the server, the startup
had also invented this stuff they called "SSL" they want to use, the
result is now frequently called "electronic commerce".

Somewhat for having done "electronic commerce" we get sucked into
X9 financial standards organization working on new standards.

During this time, I wrote extensively about how it was trivial to use
public/private key in lieu of passwords ... w/o digital
certificates. The problem was that the digitial certificate industry was
floating $20B business case on wall street ...  basically
$100/certificate/annum/person. We were also brought in to help wordsmith
cal. state legislation ... at the time they were working on electronic
signature (and under heavy pressure by the certificate industry to
mandate digital certificates), data breach notification, and "opt-in"
personal information sharing. Electronic signature and data breach
notification passed ... but "opt-in" (institutions could only share your
information with explicit record of you of approving) got pre-empted by
"opt-out" provision added to GLBA (institutions could share your
information unless they kept a record of you objecting).

some discussion of financial transaction standard that can do
public key authentication w/o digital certificate
http://www.garlic.com/~lynn/x959.html#x959

One of the scenarios was electronic payment transaction where they
wanted to append a digital certificate to every transaction that was at
least 100 times larger than the transaction size. Partly because I
ridiculed the idea, some of X9 started a compress digitial certificate
work item ... to try and get the digital certificate bloat down to only
20-50 times larger. Then I wrote a detailed analysis showing how to
eliminate the payload bloat by appending to every transaction a digital
certificate compressed to zero bytes (had all the same detail, just
didn't occupy any space).

payload bloat posts
http://www.garlic.com/~lynn/subpubkey.html#bloat

--
virtualization experience starting Jan1968, online at home since Mar1970

Software Delivery on Tape to be Discontinued

From: lynn@GARLIC.COM (Anne & Lynn Wheeler)
Subject: Re: Software Delivery on Tape to be Discontinued
Newsgroups: bit.listserv.ibm-main
Date: 3 Apr 2018 19:03:52 -0700

lynn@GARLIC.COM (Anne & Lynn Wheeler) writes:

also from bitsavers:
http://www.bitsavers.org/pdf/amdahl/datapro/70C-044-01_7709_Amdahl_470.pdf

re:
http://www.garlic.com/~lynn/2018c.html#27 Software Delivery on Tape to be Discontinued

other trivia ... from 470.pdf article

The system that resulted from this shift in direction, the 470V/6,
featured about twice the performance level of the IBM~370/168 at a
similar price, while occupying only one-third of the space required by
the IBM counterpart.

... snip ...

this Future System reference talks about after FS implodes, there was
mad rush to get stuff back into 370 product pipelines (Internal FS
politics had been killing off 370 efforts and lack of 370 products
during the FS period credited with starting to give clone makers market
foothold) ... kicking off 3033 and 3081 in parallel. 3033 started off
being 168-3 logic remapped to 20% faster chips. Eventually they got it
up to 50% faster by doing some other optimization. 3081 was such a
kludge that it required huge number of circuits and much more expensive
to manufacture
http://www.jfsowa.com/computer/memo125.htm

The 370 emulator minus the FS microcode was eventually sold in 1980 as
as the IBM 3081. The ratio of the amount of circuitry in the 3081 to its
performance was significantly worse than other IBM systems of the time;
its price/performance ratio wasn't quite so bad because IBM had to cut
the price to be competitive. The major competition at the time was from
Amdahl Systems -- a company founded by Gene Amdahl, who left IBM
shortly before the FS project began, when his plans for the Advanced
Computer System (ACS) were killed. The Amdahl machine was indeed
superior to the 3081 in price/performance and spectaculary superior in
terms of performance compared to the amount of circuitry.]

...snip ...

this ACS/360 reference besides killing it off because they were afraid
that it would advance the state-of-the-art too fast and they would
loose control of the market ... at the end it goes into the ACS/360
features that show up more than 20yrs later in ES-9000.
https://people.cs.clemson.edu/~mark/acs_end.html

--
virtualization experience starting Jan1968, online at home since Mar1970

Bottlenecks and Capacity planning

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Bottlenecks and Capacity planning
Date: 03 Apr 2018
Blog: Facebook

Bottlenecks and Capacity planning

from question on facebook about bottleneck masking other bottlenecks

Also look for capacity planning. science center did lots of
performance work (besides virtual machines, internal network, invented
GML, lots of online apps, etc) ... some of which evolves into capacity
planning. In the mid-70s one of the APL-based analytical system models
evovled into the performance predictor and offered on HONE. Branch
people could specify hardware/system configuration and workload
profile and asked "what if" questions about changing workload and/or
hardware. In 2000, I was doing some work at a large mainframe
datacenter (had 40+ max configured IBM mainframes @$30M, none older
than 18months, constant rolling upgrade cycle, number needed to finish
settlement in overnight batch window) and they brought in consultant
that had an analytical model for profiling system&workload and various
contributions to bottlenecks. Turns out he had acquired rights to a
several generation descendant of the performance predictor (running
it through an APL->C converter, note after the troubles of the early
90s, IBM was offloading all sorts of stuff) and was had significant
performance consulting business at large datacenters all around the
world. Bottlenecks hiding other bottlenecks was because of poor
understanding of system & workload resource profiling.

some recent performance predictor posts
http://www.garlic.com/~lynn/2015c.html#65 A New Performance Model ?
http://www.garlic.com/~lynn/2015c.html#71 A New Performance Model
http://www.garlic.com/~lynn/2015f.html#69 1973--TI 8 digit electric calculator--$99.95
http://www.garlic.com/~lynn/2015h.html#112 Is there a source for detailed, instruction-level performance info?
http://www.garlic.com/~lynn/2016b.html#36 Ransomware
http://www.garlic.com/~lynn/2016b.html#54 CMS\APL
http://www.garlic.com/~lynn/2016b.html#109 Bimodal Distribution
http://www.garlic.com/~lynn/2016c.html#5 You count as an old-timer if (was Re: Origin of the phrase "XYZZY")
http://www.garlic.com/~lynn/2017b.html#27 Virtualization's Past Helps Explain Its Current Importance
http://www.garlic.com/~lynn/2017d.html#43 The Pentagon still uses computer software from 1958 to manage its contracts
http://www.garlic.com/~lynn/2017h.html#68 Pareto efficiency
http://www.garlic.com/~lynn/2017j.html#103 why VM, was thrashing
http://www.garlic.com/~lynn/2017j.html#109 It's 1983: What computer would you buy?

as undergraduate at the univ. in the 60s when I rewrote a lot of IBM
software, part of it was "dynamic adaptive scheduling" and "scheduling
to the bottleneck" (being able to dynamically adapt to changing
bottleneck & resource useage). This made may increasing sensitive to
major bottlenecks shifting from CPU & real storage to I/O in the
mid-70s. By the early 80s, I was saying that relative system disk
throughput had declined by order of magnitude over period of 15years
(disks got faster, but CPU & memory increased ten times faster than
disks got faster). Some disk executive took exception and directed the
division system performance group to refute the claims. However, after
a couple weeks, they came back and basically said that I had slightly
understated the problem. They then respun the results for a SHARE
presentation with recommendations for configuring dasd for improved
throughput.

SHARE 63 Presentation B874

DASD Performance Review
8:30 August 16, 1984
Dr. Peter Lazarus

IBM Tie Line 543-3811
Area Code 408-463-3811
GPD Performance Evaluation
Department D18
Santa Teresa Laboratory
555 Bailey Avenue
San Jose, CA., 95150

SHARE 63 Presentation B874

Acknowledgments

This review makes liberal use of the computer science literature. As
usual, the views expressed in this report are those of the
author. Many contributed facts and ideas, but the selection and
presentation are the author's responsibility, including any
mistakes. I am especially indebted to Lynn Wheeler for pointing out
how the relative speeds of things have changed over the years, to
Brian J. Smith for helping me through many of the intricacies of
attachment modeling, to Bill O'Brien for suggesting this review, and
to my manager, Steve Goldstein, for his patient support throughout
these activities.

... snip ...

some past B874 posts:
http://www.garlic.com/~lynn/2016c.html#12 You count as an old-timer if (was Re: Origin of the phrase "XYZZY")
http://www.garlic.com/~lynn/2016d.html#21 What was a 3314?
http://www.garlic.com/~lynn/2016d.html#68 Raspberry Pi 3?
http://www.garlic.com/~lynn/2016e.html#38 How the internet was invented
http://www.garlic.com/~lynn/2016g.html#40 Floating point registers or general purpose registers
http://www.garlic.com/~lynn/2016g.html#43 "I used a real computer at home...and so will you" (Popular Science May 1967)
http://www.garlic.com/~lynn/2016h.html#45 Resurrected! Paul Allen's tech team brings 50-year-old supercomputer back from the dead
http://www.garlic.com/~lynn/2017b.html#32 Virtualization's Past Helps Explain Its Current Importance
http://www.garlic.com/~lynn/2017b.html#70 The ICL 2900
http://www.garlic.com/~lynn/2017d.html#61 Paging subsystems in the era of bigass memory
http://www.garlic.com/~lynn/2017e.html#5 TSS/8, was A Whirlwind History of the Computer
http://www.garlic.com/~lynn/2017f.html#28 MVS vs HASP vs JES (was 2821)
http://www.garlic.com/~lynn/2017i.html#46 Temporary Data Sets
http://www.garlic.com/~lynn/2017j.html#96 thrashing, was Re: A Computer That Never Was: the IBM 7095

The 3090 group had thought they had come up with "balanced" design for
CPU speed, amount of memory and numbers of channels. Number of
channels was 3880 controller was like previous 3830 controller but
with 3mbyte/sec transfer. However, it turns out that 3880 had hardware
bypass for 3mbyte/sec data transfer ... but control ops and the rest
was significantly slower (that 3830), drastically increasing channel
busy. Finally 3090 had to drastically increase the number of channels
to offset the high 3880 channel busy time (increase in channels
required an additional TCM and joke was that the 3090 was going to
charge the 3880 group for the increase in manufacturing
cost). Marketing then respun the number of 3090 channels as fantastic
3090 i/o throughput rather than needed to offset the 3880 channel
busy.

Some similar with Boyd invention of E/M theory. I would sponsor Boyd's
briefings at IBM (and still go to Boyd themed conferences at Marine
Corp Univ). When he was instructor at Nellis, he was considered
possibly best fighter pilot in the world. He then invented E/M theory
and used it to characterize/profile different fighter planes ... using
it to teach pilots that you wanted to operate in regions where your
fighter was better than theirs. He then used it for redesign of F15
and then for design of F16 & F18.

Related old post in LinkedIn
https://www.linkedin.com/pulse/pareto-efficiency-optimality-lynn-wheeler

Boyd posts & web URL refs:
http://www.garlic.com/~lynn/subboyd.html

Operations Research Joke:

I had done dynamic adaptive scheduling (along with bunch of other
stuff) at univ as undergraduate ... that was picked up by the science
center and shipped with CP/67 ... I then graduate and join the science
center ... doing a lot more stuff for CP67 ... however, the
development group splits off from the science center and start doing
vm370 ... simplifying and/or eliminating a lot of stuff from cp67. I
eventually get some stuff back in R1PLC9 (some of the fastpath
pathlength stuff) ... and eventually migrate a bunch of stuff from
CP67 to VM370 for CSC/VM for internal datacenters (one of my hobbies
after joining IBM was developing & supporting enhanced operating for
internal datacenters). some old email
http://www.garlic.com/~lynn/2006v.html#email731212
http://www.garlic.com/~lynn/2006w.html#email750102
http://www.garlic.com/~lynn/2006w.html#email750430

I continued to work on 360/370 stuff all through the FS period ,,,
even periodically ridiculing FS. Then when FS implodes there is mad
rush to get stuff back into 370 product pipeline ... contributing to
decision to put out a bunch more of my stuff as independent priced
addon (start of transition to charging for kernel software). Some
Armonk type reviews it and claims that "state of the art" is manual
tuning knobs (which MVS had enormous amount) and my scheduler didn't
have any ... and he wouldn't sign off w/o manual tuning knobs. I try
to explain to him dynamic adaptive scheduler & resource management
... but it doesn't mean anything. So I add manual tuning knobs,
publish formulas and detailed documentation. 15yrs later, we are doing
customer call on large HK bank ... and IBM employee recent graduate
from Univ. of Waterloo asks if I'm the guy from "wheeler scheduler". I
say I am and he says that they studied it at Waterloo. I asked him
about the "joke". He looks blank ... I repeat the story about manual
tuning knobs and explain that from "OR", the manual tuning knobs had
much less "degrees of freedom" than the dynamic adaptive stuff
(i.e. the automatic stuff could always compensate for any manual
value).

scheduling algorithm posts
http://www.garlic.com/~lynn/subtopic.html#fairshare
paging algorithm posts
http://www.garlic.com/~lynn/subtopic.html#clock

Also look at "layered bottlenecks" (analogous/similar to layered
defenses or defense in depth, but different)
http://ieeexplore.ieee.org/abstract/document/1703994/?reload=true
would you believe: "Using Layered Bottlenecks for Virtual Machine
Provisioning"
https://pdfs.semanticscholar.org/866b/27ca8a8a3e1cbf312afb7eaf5ad59b5e9361.pdf

trivia: mainframe z196 specs has at least half the per processor
improvement from z10->z196 (469->625MIPS) was the introduction of
out-of-order and other technologies to help compensate for cache miss
... that had been in other platforms for decades. The issue is that
cache miss latency to memory when measured in the count of processor
cycles is comparable to 60s disk i/o latency when measured in number
60s CPU processor cycles ... giving rise to lots of multiprogramming
technology to overlap execution while waiting.

Todays equivalents (in hardware) are out-of-order execution, branch
prediction, speculative execution, hyperthreading, etc.  Part of
speedup in processors after z196 are further improvements compensating
for increasing mismatch between processor speed and latency to memory
(but mainframes are still playing catchup compared to other platforms
with much longer experience in the technology).

if most of elapsed time was waiting for memory (or 60s disk), making
CPU increasingly faster has diminishing returns if other factors start
to dominate elapsed time.

recent z196, "out of order", posts
http://www.garlic.com/~lynn/2015.html#43 z13 "new"(?) characteristics from RedBook
http://www.garlic.com/~lynn/2015c.html#69 A New Performance Model ?
http://www.garlic.com/~lynn/2015f.html#93 Miniskirts and mainframes
http://www.garlic.com/~lynn/2015g.html#19 Linux Foundation Launches Open Mainframe Project
http://www.garlic.com/~lynn/2015g.html#93 HP being sued, not by IBM.....yet!
http://www.garlic.com/~lynn/2015h.html#81 IBM Automatic (COBOL) Binary Optimizer Now Availabile
http://www.garlic.com/~lynn/2015h.html#110 Is there a source for detailed, instruction-level performance info?
http://www.garlic.com/~lynn/2016b.html#27 Qbasic
http://www.garlic.com/~lynn/2016b.html#103 You count as an old-timer if (was Re: Origin of the phrase "XYZZY")
http://www.garlic.com/~lynn/2016f.html#36 z/OS Operating System size
http://www.garlic.com/~lynn/2016f.html#91 ABO Automatic Binary Optimizer
http://www.garlic.com/~lynn/2016h.html#98 A Christmassy PL/I tale
http://www.garlic.com/~lynn/2017c.html#30 The ICL 2900
http://www.garlic.com/~lynn/2017d.html#17 The Pentagon still uses computer software from 1958 to manage its contracts
http://www.garlic.com/~lynn/2017e.html#94 Migration off Mainframe to other platform
http://www.garlic.com/~lynn/2017g.html#87 IBM z14 High-lights
http://www.garlic.com/~lynn/2017g.html#88 IBM Mainframe Ushers in New Era of Data Protection
http://www.garlic.com/~lynn/2017h.html#61 computer component reliability, 1951
http://www.garlic.com/~lynn/2017h.html#95 PDP-11 question
http://www.garlic.com/~lynn/2017i.html#37 learning Unix, was progress in e-mail, such as AOL
http://www.garlic.com/~lynn/2017i.html#46 Temporary Data Sets
http://www.garlic.com/~lynn/2018b.html#80 BYTE Magazine Pentomino Article

--
virtualization experience starting Jan1968, online at home since Mar1970

Old word processors

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Old word processors
Newsgroups: alt.folklore.computers
Date: Wed, 04 Apr 2018 18:41:53 -0700

rnetzlof writes:

In time, BPS, BOS, TOS, OS PCP, OS BCP withered away. Eventually DOS
became DOS/VS, then DOS/VSE, while OS/360 wandered off into MFT
(Multiple Fixed number of Tasks, MVT (Multiple Variable number of
Tasks), SVS (Single Virtual Storage) and finally MVS (Multiple Virtual
Storage).

MFT became VS1 ... and MVT became VS2 ... VS2 initially started with SVS
... very similar to MVT running in 16mbyte virtual machine ...

DOS/VS, VS1 and SVS (before MVS) were essentially all the earlier
non-virtual version layed out in single virtual address spaces (larger
than typical real storage). Then SVS morphs into MVS with multiple
virtual address spaces.

First half of 70s, during FS, lots of 370 efforts were being shutdown.
When FS imploded, there was mad rush to get stuff back into 370 product
pipeline. POK kicked off 3033, 3081, and 370/XA in parallel. Lot of
370/XA was to address problems that had MVS had in 370. Major problem
was os/360 heritage API was tightly tied to pointer passing. When
everything was in single (real or virtual) address space it was no
problem ... but when everything had their own virtual address space
... there was real problem with applications in one address space
calling a subsystem in different address space. 370/XA was access
registers ... with subsystems to access locations in different
address spaces.

The low/mid-range Endicott equivalent (to POK 370/XA) was
"e-architecture" for DOS/VS and VS1 ... where the single address space
tables were moved into the microcode with new instructions to manage the
mapping between virtual and real.

I recently did long-winded postings in ibm-main thread
http://www.garlic.com/~lynn/2018c.html#23
http://www.garlic.com/~lynn/2018c.html#27
http://www.garlic.com/~lynn/2018c.html#29

trivia: CP67 build started out by taking all kernel assembled TXT decks
and putting them behind BPS loader and IPL'ing the (real or virtual)
reader.  The BPS loader would load everything into memory and transfer
control to routine that would write the memory to disk. Then CP67 system
was IPL'ed from desk, reloading the memory image from disk and starting
CP67 system execution.

I did a lot of work on CP67 as undergraduate in the 60s and ran into
enormous problem that BPS loader had limit of 255 external entries.  I
started running into this limit and had to do all sorts of hacks to work
around the limit. After joining the science center, I found a copy of
the BPS source in a card cabinet when rumaging through card cabinent in
storage room in the attic of 545 tech square. I was able to tweak the
BPS source so handle a bunch of things ... that hacked BPS version was
then also used for VM370. 545 tech posts
http://www.garlic.com/~lynn/subtopic.html#545tech

--
virtualization experience starting Jan1968, online at home since Mar1970

Old word processors

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Old word processors
Newsgroups: alt.folklore.computers
Date: Wed, 04 Apr 2018 19:00:36 -0700

Andreas Kohlbach <ank@spamfence.net> writes:

After that (1974) there was of course CP/M. Various 8088 and Z80 based
computers later had it as operating system. Along with word processors
like StarWriter. No need for MS-DOS. :-D

They also had some dialect of BASIC. Usually made by Microsoft though.

re:
http://www.garlic.com/~lynn/2018c.html#31 Old word processors

before ms/dos
https://en.wikipedia.org/wiki/MS-DOS
there was seattle computer
https://en.wikipedia.org/wiki/Seattle_Computer_Products
before seattle computer, there was cp/m
https://en.wikipedia.org/wiki/CP/M
before cp/m, kildall worked on cp67/cms at npg (gone 404, but lives on
at the wayback machine)
http://web.archive.org/web/20071011100440/http://www.khet.net/gmc/docs/museum/en_cpmName.html
npg
https://en.wikipedia.org/wiki/Naval_Postgraduate_School
cp67/cms (aka precursor to vm/370)
https://en.wikipedia.org/wiki/CP/CMS
before cp67/cms ... there was virtual machine, interactive computing
cp/40
http://www.garlic.com/~lynn/cp40seas1982.txt
at the IBM science center, past posts
http://www.garlic.com/~lynn/subtopic.html#545tech

and before virtual machines at science center, some had worked
on CTSS
https://en.wikipedia.org/wiki/Compatible_Time-Sharing_System

reference getting 360/67 in 1967 (but wouldn't have gotten CP/67 until
at least sometime the following year). References Kildall writing 8008
code 72-73 and in 1974 wrote CP/M, 1976 Kildall left NPG.  Decembere
1980, NPG replaces 14yr old 360/67 with 3033AP, 1Apr1981 VM/CMS 2314
disks replaced
https://calhoun.nps.edu/bitstream/handle/10945/36809/NPSMilestones_2009-05-22.pdf

Early Digital Research CP/M Source Code
http://www.computerhistory.org/atchm/early-digital-research-cpm-source-code/

--
virtualization experience starting Jan1968, online at home since Mar1970

The Pentagon still uses computer software from 1958 to manage its contracts

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: The Pentagon still uses computer software from 1958 to manage its contracts
Date: 05 Apr 2018
Blog: Facebook

The Pentagon still uses computer software from 1958 to manage its
contracts
http://www.businessinsider.com/pentagon-computers-software-from-1958-2017-3

mid-80s, top IBM executives were predicting that by early 90s
world-wide revenue would double (instead of going into the red),
nearly all based on mainframe business and there was massive internal
building program to double mainframe manufacturing capacity. There was
also huge influx in "fast-track" MBAs being constantly rotated through
business unit management positions (preparing for IBM expansion
doubling). It wasn't exactly career enhancing to point out that rather
than the top executive predictions, business was starting to go in the
opposite direction.

Late 80s, a senior disk engineer got a talk scheduled at internal,
world-wide, annual, communication group conference ... supposedly on
3174 performance ... however he opened his talk with the statement
that the head of the communication group was going to be responsible
for the demise of the disk division. The issue was that the
communication group had stranglehold on datacenters with corporate
strategic ownership of everything that crossed datacenter walls and
were fiercely fighting off distributed computing and client/server,
trying to preserve their dumb terminal paradigm and install base. The
disk division was seeing data fleeing datacenters to more distributed
computing friendly platforms with fall in disk sales. The disk
division had come up with a number of solution to address the
opportunity, but they were constantly being vetoed by the
communication group. The mainframe datacenter stranglehold wasn't just
affecting disk sales and a few years later the company goes into the
red. past posts about dumb terminal paradigm
http://www.garlic.com/~lynn/subnetwork.html#terminal

mid-90s, wallstreet financial institutions spent billions to redo
cobal financial settlement in the overnight batch window to straight
through processing running parallel on large number of "killer
micros". Pointing out that the off-the-shelf parallelization libraries
that they were using had hundred times the overhead of cobal batch was
ignored. It wasn't until deploying some major pilots went down in
flames that the pull back occurred.

Middle of last decade we helped take some scaleup financial technology
to major industry organization (FSTC). It was based on technology that
decomposed business rules into fine-grain SQL statements and then
relied on the work that major vendors put into massive parallelization
scaleup for cluster RDBMS support. Initially it got great acceptance
and then hit brick wall. We were finally told that executives still
bore the scars of the 90s debacle and it would take another generation
before it was tried again.

Current mainframe hardware sales are a percent or two of revenue but
mainframe division is 25% of revenue and 40% of profit
(software&services, milking declining market).

trivia: I did some work with Jim Gray on the original relational/SQL
DBMS implementation, System/R. System/R posts
http://www.garlic.com/~lynn/submain.html#systemr

Jim's work on formalization f transactions is credited with giving
financial auditors confideence in computerized records and operations
... from celebration of Jim's life:
https://spectrum.ieee.org/tech-talk/semiconductors/devices/tribute_to_computing_pioneer_j

Researchers credit his work with enabling ATMs, ecommerce, online
ticketing, and other database intensive services we take for granted
today.

... snip ...

UCB references (in above) gone 404, but live on at wayback machine
(you can hear me somewhere in one of the following)
http://web.archive.org/web/20080604010939/http://webcast.berkeley.edu/event_details.php?webcastid=23082
http://web.archive.org/web/20080604072804/http://webcast.berkeley.edu/event_details.php?webcastid=23083
http://web.archive.org/web/20080604072809/http://webcast.berkeley.edu/event_details.php?webcastid=23087
http://web.archive.org/web/20080604072815/http://webcast.berkeley.edu/event_details.php?webcastid=23088

other trivia: we were doing HA/CMP in the early 90s and had little
dustup at SIGOPS meeting. Jim was at DEC DBMS and supporting
VAX/Cluster and criticizing that I couldn't provide high availability
with off-the-shelf commodity hardware. A few years later, he was at
m'soft on stage with the CEO pushing being able to do high
availability with commodity hardware. Just before he disappears, he
cons me into interviewing for chief security architect in Redmond
... the interview goes on for a few weeks, but we couldn't come to
agreement
https://jimgray.azurewebsites.net/

more trivia: As part of HA/CMP we were working on commercial cluster
scaleup with RDBMS vendors and technical cluster scaleup with national
labs. Old post with reference to Jan1992 cluster scaleup meeting in
Oracle CEO conference room
http://www.garlic.com/~lynn/95.html#13

Some of the RDBMS vendors had VAX/cluster support (in the same source
base that supported UNIX) ... and had a list of several things that
they believed (VAX/cluster) could be done much better. I did a cluster
distributed lock manager based on my mainframe experience,
fixing the things "wrong" from VAX/cluster and supporting VAX/cluster
API ... simplifying RDBMS vendors porting to HA/CMP cluster
scaleup. However, within a few weeks of the Ellison Jan1992 meeting,
cluster scaleup was transferred, announced as IBM supercomputer for
technical/scientific only, and we were told we couldn't work on
anything with more than four processors (contributing was the
mainframe DB2 RDBMS group were complaining that if I was allowed to go
ahead, it would be at least 5yrs ahead of them). A few months later we
leave IBM. HA/CMP posts
http://www.garlic.com/~lynn/subtopic.html#hacmp

original posts from year ago
http://www.garlic.com/~lynn/2017d.html#11 The Pentagon still uses computer software from 1958 to manage its contracts
http://www.garlic.com/~lynn/2017d.html#13 The Pentagon still uses computer software from 1958 to manage its contracts
http://www.garlic.com/~lynn/2017d.html#15 The Pentagon still uses computer software from 1958 to manage its contracts
http://www.garlic.com/~lynn/2017d.html#17 The Pentagon still uses computer software from 1958 to manage its contracts
http://www.garlic.com/~lynn/2017d.html#30 The Pentagon still uses computer software from 1958 to manage its contracts
http://www.garlic.com/~lynn/2017d.html#35 The Pentagon still uses computer software from 1958 to manage its contracts
http://www.garlic.com/~lynn/2017d.html#36 The Pentagon still uses computer software from 1958 to manage its contracts
http://www.garlic.com/~lynn/2017d.html#37 The Pentagon still uses computer software from 1958 to manage its contracts
http://www.garlic.com/~lynn/2017d.html#39 The Pentagon still uses computer software from 1958 to manage its contracts
http://www.garlic.com/~lynn/2017d.html#43 The Pentagon still uses computer software from 1958 to manage its contracts

--
virtualization experience starting Jan1968, online at home since Mar1970

The First E-mail Scandal, Long Before Hillary Clinton: Iran/Contra

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: The First E-mail Scandal, Long Before Hillary Clinton: Iran/Contra
Date: 05 Apr 2018
Blog: Facebook

The First E-mail Scandal, Long Before Hillary Clinton: Iran/Contra
https://www.thenation.com/article/the-first-email-scandal-long-before-hillary-clinton-iran-contra/
In Iran-Contra ... evidence was in PROFS backups, The guy running
executive dataprocessing was charged with recovering files from PROFS
backups
https://en.wikipedia.org/wiki/Oliver_North#Iran.E2.80.93Contra_affair

This shows up again in 90s Clinton administration, and claims
Hillary's assistant is wiping/disappearing backups, 100,000 lost in
the 90s, because backup was "misconfigured"
http://www.judicialwatch.org/blog/2008/01/clinton-white-house-lost-emails-too/
Hillary's email scandal -- of the 1990s! Exclusive: Larry Klayman
tells of 1 million messages 'lost' from White House server
http://www.wnd.com/2016/06/hillarys-email-scandal-of-the-1990s/
The Other Clinton Email Scandal You May Not Know About
http://ijr.com/2016/06/624529-this-isnt-the-first-clinton-email-scandal/

new processes was making it increasingly hard to compromise
gov. servers, so approach is to move to non-gov. servers

Politicos squabble over 'missing' White House e-mails
https://www.cnet.com/news/politicos-squabble-over-missing-white-house-e-mails/
The George W. Bush White House 'Lost' 22 Million Emails
http://www.newsweek.com/2016/09/23/george-w-bush-white-house-lost-22-million-emails-497373.html
Special Report: G.W. Bush's 103.6 million missing email messages and
the IT archiving challenge
http://www.zdnet.com/article/special-report-g-w-bushs-103-6-million-missing-email-messages-and-the-it-archiving-challenge/
Bush White House email controversy
https://en.wikipedia.org/wiki/Bush_White_House_email_controversy
Missing White House Emails
http://www.pbs.org/weta/washingtonweek/web-video/missing-white-house-emails
Disappearing White House Emails Timeline
https://www.emptywheel.net/2008/01/17/disappearing-white-house-emails-timeline/
Group Sues White House to Restore Missing Emails; National Security
Archive says White House must reactivate its email archiving system
http://www.darkreading.com/attacks-breaches/group-sues-white-house-to-restore-missing-emails/d/d-id/1128976

Trump White House Senior Staff Have Private RNC Email Accounts
http://www.newsweek.com/trump-emails-rnc-reince-priebus-white-house-server-548191
Weak White House email domain security 'poses a national security risk': Study
https://www.washingtonexaminer.com/news/weak-white-house-email-domain-security-poses-a-national-security-risk-study

note that VP (and former director of CIA) repeatedly claiming no knowledge of
http://en.wikipedia.org/wiki/Iran%E2%80%93Contra_affair
because he was fulltime administration point person deregulating
financial industry ... creating S&L crisis
http://en.wikipedia.org/wiki/Savings_and_loan_crisis
along with other members of his family
http://en.wikipedia.org/wiki/Savings_and_loan_crisis#Silverado_Savings_and_Loan
and another
http://query.nytimes.com/gst/fullpage.html?res=9D0CE0D81E3BF937A25753C1A966958260

last decade, another family member presides over the economic mess, 70
times larger than the S&L crisis, proportionally there should have
been 70,000 criminal convictions (with jailtimes), so far nobody has
even been charged.

S&L crises posts
http://www.garlic.com/~lynn/submisc.html#s&l.crises
economic mess posts
http://www.garlic.com/~lynn/submisc.html#economic.mess

note both 80s SECSTATE and SECDEF were Bechtel executives ... helping
their (former) employer do business in the middle east. "The
Profiteers: Bechtel and the Men Who Built the World" ... Bechtel is
also part of the massive uptic in gov. outsourcing last decade
https://www.amazon.com/Profiteers-Bechtel-Men-Built-World-ebook/dp/B010MHAHV2/

VP has become president and Iran/Contra prosecutors are working with
former SECDEF on evidence ... including against the sitting
president. The president then "pardons" the former SECDEF.

loc2752-54:

Pollard had accidentally "busted the most secret White House operation
of modern times," as one account put it. "Neither Pollard nor the
government of Israel was aware that they had smashed George Bush's
first shipment of arms to Iran."

loc2764-65:

Despite his best efforts to silence Pollard, Weinberger would not
escape his own entanglement in the Iran-Contra conspiracy, for which
he would ultimately face criminal charges.

... snip ...

eventually a bunch of evidence is turned over (that the president had
"forgotten" about) showing he was heavily involved in Iran/Contra

other recent posts mentioning Bechtel
http://www.garlic.com/~lynn/2017.html#67 Trump White House Senior Staff Have Private RNC Email Accounts
http://www.garlic.com/~lynn/2017b.html#34 Good News and Bad News at Hanford, America's Most Polluted Site
http://www.garlic.com/~lynn/2017b.html#83 Sleepwalking Into a Nuclear Arms Race with Russia
http://www.garlic.com/~lynn/2017d.html#59 Breaking: Entire Nation Experiencing Collective Amnesia About Iraq War
http://www.garlic.com/~lynn/2017e.html#99 [CM] What was your first home computer?
http://www.garlic.com/~lynn/2017f.html#45 [CM] What was your first home computer?
http://www.garlic.com/~lynn/2017f.html#57 [CM] What was your first home computer?
http://www.garlic.com/~lynn/2017f.html#104 Early use of word "computer", 1944
http://www.garlic.com/~lynn/2017g.html#41 Iran/Contra and Email
http://www.garlic.com/~lynn/2017h.html#33 Disregard post (another screwup; absolutely nothing to  do with computers whatsoever!)
http://www.garlic.com/~lynn/2017h.html#74 On Tactics
http://www.garlic.com/~lynn/2017h.html#107 Iraq, Longest War
http://www.garlic.com/~lynn/2017h.html#115 When It Comes to the War in the Greater Middle East, Maybe We're the Bad Guys
http://www.garlic.com/~lynn/2018.html#20 IBM Profs
http://www.garlic.com/~lynn/2018.html#73 Why People Dislike Really Smart Leaders
http://www.garlic.com/~lynn/2018b.html#23 Important US technology companies sold to foreigners
http://www.garlic.com/~lynn/2018b.html#25 Bitcoin confusion?

--
virtualization experience starting Jan1968, online at home since Mar1970

Osborne 1 with speech synthesis

Refed: **, - **, - **
From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Osborne 1 with speech synthesis
Newsgroups: alt.folklore.computers
Date: Thu, 05 Apr 2018 18:39:33 -0700

drb@ihatespam.msu.edu (Dennis Boone) writes:

Nonsense.  People were _building their own_ terminal concentrators
(and then hooking dialup pools to them) at least as long ago as the
60s, and IBM already sold same then.

CP/67 delivered to univ jan1968 had 2741 & 1052 terminal support with
automatic terminal type identification. Univ. had some number of
TTY/ascii ... so I added tty/ascii in such a way that it did automatic
terminal type across 2741, 1052 & TTY/ascii. I then wanted to have
single dial-in number (hunt-group) for all terminals. It wouldn't work
with ibm terminal controllers because while it was possible to change
the (terminal) type of line scanner per port ... port/line speeds were
hardwired; needed one hunt-group for 2741&1052 and another for tty/ascii
https://en.wikipedia.org/wiki/Line_hunting

this somewhat motivated univ. to start clone controller project ...  did
a channel interface board for interdata/3 programmed to emulate IBM
terminal type controller ... with the addition of doing automatic
line/terminal speed. This was later upgraded to interdata/4 with the
channel interface and cluster of interdata/3s for port/line scanners.
Interdata (and later Perkin/Elmer) marketed this implementation and four
of us got written up for (some part of) clone controller business past
posts:
http://www.garlic.com/~lynn/subtopic.html#360pcm

Univ. of Michigan did something similar for their 360/67 running MTS
(but using PDP):
http://www.eecis.udel.edu/~mills/gallery/gallery7.html
http://www.eecis.udel.edu/~mills/gallery/gallery8.html

--
virtualization experience starting Jan1968, online at home since Mar1970

Osborne 1 with speech synthesis

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Osborne 1 with speech synthesis
Newsgroups: alt.folklore.computers
Date: Thu, 05 Apr 2018 21:39:16 -0700

re:
http://www.garlic.com/~lynn/2018c.html#35 Osborne 1 with speech synthesis

Interdata
https://en.wikipedia.org/wiki/Interdata

Interdata, Inc., was a computer company, founded in 1966 by a former
Electronics Associates engineer, Daniel Sinnott, and was based in
Oceanport, New Jersey. The company produced a line of 16- and 32-bit
minicomputers that were loosely based on the IBM 360 architecture but at
a cheaper price.[1] In 1974, it produced one of the first 32-bit
minicomputers,[2] the Interdata 7/32. The company then used the parallel
processing approach, where multiple tasks were performed at the same
time, making real-time computing a reality.[3]

... snip ...

Interdata/4
http://s3data.computerhistory.org/brochures/interdata.4.1969.102646126.pdf

--
virtualization experience starting Jan1968, online at home since Mar1970

Software Delivery on Tape to be Discontinued

From: lynn@GARLIC.COM (Anne & Lynn Wheeler)
Subject: Re: Software Delivery on Tape to be Discontinued
Newsgroups: bit.listserv.ibm-main
Date: 6 Apr 2018 10:58:02 -0700

llosee@GMAIL.COM (Lou Losee) writes:

Yes you are correct that you have to initiate your trust somewhere.  The
paradigm is that you trust the vendor that delivers the CA certificates to
you (e.g., Mozilla, Microsoft, IBM, etc.)
Hand delivering keys defeats the purpose of using certificates.  If you
were going to hand deliver keys, you might as well just use a symmetric
cipher rather than asymmetric. If you want perfect unbreakable encryption
then you should hand deliver one time pads between the parties.

re:
http://www.garlic.com/~lynn/2018c.html#28 Software Delivery on Tape to Be Discontinued

symmetric key ... like passwords ... are shared-secrets ... you need a
unique value for every security domain (or use, as countermeasure to
cross domain attacks).

the same single public/private key pair could be used for every security
domain in lieu of unique shared-secret ... shifting from an
institutional centric security paradigm to a person-centric security
paradigm.

this is somewhat analogous to biometric authentication ... but can work
at a distance rather than requiring person's biometric be physically
present.

the trivial approach is registering a public key in lieu of a
unique pin/password at every institution ... we actually did
example implementations for radius, kerberos and some number
of other widely used authentication infrastructure.

problem was that it would generate no new revenue stream ... and
the ceritication authority industry really wanted their $20B/year

tirivia ... in the digital signature scenario ... some hash (SHA, MD5,
etc) is calculated for the data, the hash encrypted with the private key
and appended to the data. the recipient decrypts the digital signature
with the public key and compares the decruypted value with recalculated
hash. This confirms/authenticates that the original data hasn't been
changes and also confirms/authenticates the sender.

The use in lieu of pin/password ... the institution has to protect
against replay attacks. Rather than the user generating the data that is
signed ... the institution sends the user some unique data. The user
than encrypts the hash of the unique data with their private key and
returns the encrypted hash to the institution (doesn't have to return
the data, since the institution already has it). The institution then
decrypts the returned value with the public key (saved in file that had
previously stored pin/password) and compares it with the hash of the
originally transmitted value.

There is no longer a danger of pin/passwords being skimmed or the
pin/password file being copied ... and in fact can be transmitted
completely in the clear (w/o any additional encryption).

We used this for the X9.59. Financial industry started out saying
that they could not trust some other certification authority and
would only recognize relying-party-only certificates (i.e. only
recognize certificates that they had issued).

However, a certification authority has to create a business process that
does background on the public key and then save the public key in some
administration file (before issuing a certificate).  However, for a
financial institution, that would all be collapsed in account
record. But in any sort of financial authentication, it involves
accessing the account record ... where the public key has been stored
... having it also in appended digital certificate (that is typically
100 times larger than financial transaction) is then redundant and
superfluous (since a financial institution will already have the public
key).

Then for the whole financial industry, certificates became
unnecessary. Also since X9.59 account transactions could only be done
with public key (digital signature) ... crooks were no longer able to do
fraudulent transaction against an x9.59 w/o the corresponding private
key. Since the private key was never divulged ... it was no longer
necessary to hide/encrypt/ssl/tls such financial transactions (skimming,
breaches, evesdropping, wern't prevented, but the risk of crooks
being able to use the information was eliminated).

One of the things that the transit industry then asked was if I could
design a chip that could do such transactions and be implemented in a
contractless transit card (i.e. amount of power for doing calculations
is severely limited) and time constraint of turnstyle (1/10 sec or
less). Turns out using a variation of ECC would be as strong or stronger
than RSA ... and do the calculations within the power and time
constraints of a transit contactless turnstyle.

other trivia: its certification authority ... not certificate authority
... the service provided is certification (some correspondance between
the public key and some entity) ... which is then encapsulated in a
certificate. However, since fine print frequently says that the
certification has no warrenty ... there is frequent disire to distract
the market ... and make believe that the certificate by itself has some
magic pixie dust property.

shared-secret posts
://www.garlic.com/~lynn/subintegrity.html#secret
x9.59 posts
://www.garlic.com/~lynn/subpubkey.html#x959
radius posts
://www.garlic.com/~lynn/subpubkey.html#radius
kerberos posts
://www.garlic.com/~lynn/subpubkey.html#kerberos
signature posts
://www.garlic.com/~lynn/subpubkey.html#signature
relying-party-only certificate posts
://www.garlic.com/~lynn/subpubkey.html#rto

--
virtualization experience starting Jan1968, online at home since Mar1970

Osborne 1 with speech synthesis

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Osborne 1 with speech synthesis
Newsgroups: alt.folklore.computers
Date: Fri, 06 Apr 2018 11:29:53 -0700

Charles Richmond <numerist@aquaporin4.com> writes:

Later Perkin-Elmer bought the line, and it became the Perkin-Elmer 7/32

https://en.wikipedia.org/wiki/Interdata_7/32_and_8/32

re:
http://www.garlic.com/~lynn/2018c.html#35 Osborne 1 with speech synthesis
http://www.garlic.com/~lynn/2018c.html#36 Osborne 1 with speech synthesis

around 2000, I was in large east coast datacenter and there was a
perkin-elmer branded version of our clone controller ... that was
handling majority of east coast dialup point-of-sale credit card
terminals.

at the time, majority of the dial-up point-of-sale credit card terminals
were small square boxes with magstripe ... that had 2400 baud dialup and
internally emulated PC/XT with flash disk and running MS/DOS.

trivia: about that time somebody did a study about upgrading from 2400
baud to 56kbits. it turns out the elapsed time for typical transaction
at 2400 baud was less than the 56kbit connect negotiating time (so any
move to 56kbit would increased the elapsed time for transaction).

other trivia: perkin-elmer was also active VM370 member at SHARE.  I
remember them doing a study of compression for CMS filesystem. They
showed that the pathlength of compression/decompression was frequently
offset by the savings in pathlength for doing fewer disks I/O (for the
reduced data transferred to/from disk).

Bruce Marshall was VM manager at Perkin-Elmer and one of the original
(Mar 1978) Knights of VM
http://www2.marist.edu/~mvmua/knights.html

--
virtualization experience starting Jan1968, online at home since Mar1970

What Happened to the $2.6 Trillion Social Security Trust Fund?

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: What Happened to the $2.6 Trillion Social Security Trust Fund?
Date: 06 Apr 2018
Blog: Facebook

What Happened to the $2.6 Trillion Social Security Trust Fund?
https://www.forbes.com/sites/merrillmatthews/2011/07/13/what-happened-to-the-2-6-trillion-social-security-trust-fund/

semi-related trivia: in 1999 I was asked to try and help prevent the
coming economic mess ... improve integrity of securitized mortgage
supporting documents. However they find that they can pay the rating
agencies for triple-A (when the rating agencies knew they weren't
worth triple-A, from Oct2008 congressional hearings). Triple-A trumps
supporting documentations and they can start doing no-documentation,
liar loans. Claim is part of getting triple-A is that then enables
them to sell toxic CDOs to funds restricted to only dealing in "safe"
investments ... like large institutional &government pension funds
(some claim resulting losses were 1/3rd of the funds, privatizing SS
was to make it subject to similar losses). Also the triple-A largely
enabled them to do over $27T 2001-2008 in these toxic CDOs (although
the $27T 2001-2008 is ten times the SS Trust Fund).

economic mess posts
http://www.garlic.com/~lynn/submisc.html#economic.mess
(triple-A) toxic CDOs
http://www.garlic.com/~lynn/submisc.html#toxic.cdo

more recent SS Trust Fund refs:
http://www.garlic.com/~lynn/2015c.html#4 Mandated Spending
http://www.garlic.com/~lynn/2015c.html#7 Mandated Spending
http://www.garlic.com/~lynn/2015c.html#40 past of nukes, was Future of support for telephone rotary dial ?
http://www.garlic.com/~lynn/2015c.html#41 past of nukes, was Future of support for telephone rotary dial ?
http://www.garlic.com/~lynn/2015c.html#108 Occupy Democrats
http://www.garlic.com/~lynn/2015d.html#62 Medicare Part B premiums increasing up to 30%
http://www.garlic.com/~lynn/2015d.html#66 Western Union envisioned internet functionality
http://www.garlic.com/~lynn/2015d.html#68 Western Union envisioned internet functionality
http://www.garlic.com/~lynn/2015d.html#75 Greedy Banks Nailed With $5 BILLION+ Fine For Fraud And Corruption
http://www.garlic.com/~lynn/2015d.html#82 Western Union envisioned internet functionality
http://www.garlic.com/~lynn/2015e.html#37 The real story of how the Internet became so vulnerable
http://www.garlic.com/~lynn/2015e.html#64 Western Union envisioned internet functionality
http://www.garlic.com/~lynn/2015e.html#75 prices, was Western Union envisioned internet functionality
http://www.garlic.com/~lynn/2015f.html#27 Federal Subsidies
http://www.garlic.com/~lynn/2015f.html#48 1973--TI 8 digit electric calculator--$99.95
http://www.garlic.com/~lynn/2015h.html#4 Decimal point character and billions
http://www.garlic.com/~lynn/2015h.html#48 Protecting Social Security from the Thieves in the Night
http://www.garlic.com/~lynn/2015h.html#54 rationality
http://www.garlic.com/~lynn/2016.html#22 I Feel Old
http://www.garlic.com/~lynn/2016.html#44 Thanks Obama
http://www.garlic.com/~lynn/2016b.html#25 SS Trust Fund
http://www.garlic.com/~lynn/2016c.html#23 How Generation Y is paying the price for baby boomer pensions
http://www.garlic.com/~lynn/2016c.html#88 Goldman Slammed With $5.1 Billion Fine For "Serious Misconduct" In Mortgage Selling
http://www.garlic.com/~lynn/2016e.html#54 Social Security Trust Fund IOUs
http://www.garlic.com/~lynn/2016e.html#91 E.R. Burroughs
http://www.garlic.com/~lynn/2016f.html#65 old Western Union Telegraph Company advertising
http://www.garlic.com/~lynn/2016f.html#101 Chain of Title: How Three Ordinary Americans Uncovered Wall Street's Great Foreclosure Fraud
http://www.garlic.com/~lynn/2016g.html#95 Social Security Trust Fund
http://www.garlic.com/~lynn/2016h.html#37 GOP Announces Privatization Of Medicare And The Details Are TERRIFYING
http://www.garlic.com/~lynn/2016h.html#61 GOP introduces plan to massively cut Social Security
http://www.garlic.com/~lynn/2016h.html#63 GOP introduces plan to massively cut Social Security
http://www.garlic.com/~lynn/2016h.html#100 Attack SS Entitlements
http://www.garlic.com/~lynn/2017.html#5 The Champions of the 401(k) Lament the Revolution They Started
http://www.garlic.com/~lynn/2017.html#11 Attack SS Entitlements
http://www.garlic.com/~lynn/2017.html#30 $16T National Debt
http://www.garlic.com/~lynn/2017.html#42 Peak Savings: Wall Street Faces 20 Years Of Retirement Withdrawals As Boomers Hit 70 1/2
http://www.garlic.com/~lynn/2017b.html#43 when to get out???
http://www.garlic.com/~lynn/2017d.html#67 Economists are arguing over how their profession messed up during the Great Recession. This is what happened
http://www.garlic.com/~lynn/2017e.html#12 SS Trust Fund
http://www.garlic.com/~lynn/2017g.html#48 SS Trust Fund
http://www.garlic.com/~lynn/2017g.html#50 SS Trust Fund
http://www.garlic.com/~lynn/2017h.html#45 "Subprime Is Contained" (& Other Evidence That "They Really Don't Know What They're Doing")
http://www.garlic.com/~lynn/2017i.html#55 How Economists Turned Corporations into Predators
http://www.garlic.com/~lynn/2017j.html#9 Who Is The Smallest Government Spender Since Eisenhower? Would You Believe It's Barack Obama?
http://www.garlic.com/~lynn/2018.html#59 How Income Tax on Social Security Became a $277 Billion Problem for Retirees

--
virtualization experience starting Jan1968, online at home since Mar1970

Osborne 1 with speech synthesis

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Osborne 1 with speech synthesis
Newsgroups: alt.folklore.computers
Date: Fri, 06 Apr 2018 17:43:44 -0700

hancock4 writes:

The Bell System developed a Transaction Telephone intended to speed
such credit card verification inquiries.  I don't think they ever
were widely used; a plain Touch Tone set could do the job almost
as easily, without the extra cost of a fancy phone.

Since the inquiry is a very brief transaction, a low bandwidth
continuous line would've worked out well, however, I don't think
that approach was taken too far.

re:
http://www.garlic.com/~lynn/2018c.html#35 Osborne 1 with speech synthesis
http://www.garlic.com/~lynn/2018c.html#36 Osborne 1 with speech synthesis
http://www.garlic.com/~lynn/2018c.html#38 Osborne 1 with speech synthesis

the point-of-sale magstripe terminal with built in modem ... would also
run other business processing (longer transaction) at end of shift or
once a day.

large stores would have all checkout counters connect to store
concentrator ... which then ran single line to payment network.  the
small store individual dialup with single checkout.

a lot of these (both concentrators and single POS) have been moving
to the internet.

trivia: for electronic commerce (i.e. we were brought into small
client/server startup that wanted to payment transactions on their
server, they had also invented this technology they called "SSL" they
wanted to use, the result is now frequently called "electronic
commerce") , was originally adopted from "Shift4" protocol ... a company
that was specializing in POS and concentrator for T&E (travel and
entertainment), hotels/motels and casinos ... seems to have morphed some
over the past 24-25yrs.
https://www.shift4.com/

--
virtualization experience starting Jan1968, online at home since Mar1970

S/360 announce 4/7/1964, 54yrs

Refed: **, - **, - **, - **
From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: S/360 announce 4/7/1964, 54yrs
Newsgroups: alt.folklore.computers
Date: Sat, 07 Apr 2018 13:13:51 -0700

S/360 announce 4/7/1964, 54yrs
http://www-03.ibm.com/ibm/history/exhibits/mainframe/mainframe_PR360.html

... and from 34yrs ago

we had regular Friday's after work and one of the discussions was that
most of middle management and executives were computer illiterate
... and could we create something that would attract them to using
computers. We came up with the idea of doing online telephone books. Jim
Gray would write the lookup application and I would create the
collection and formating process ... but neither of us would use more
than 2weeks of our time (note this was later picked up by and shipped by
PROFs). One of the hardest problems were site security that believed
computer/soft copies of paper phone books violated security.  From long
ago and far away:


Date: 04/07/80 09:33:19
From: wheeler
To: gray

TELE EXEC starts out with

•  DIRECTRY

but I would like to be able to specify as parm on TELE a name
specification like

TELE wheeler ( s*

which would then search s* directry files. Default would start out being
all files and then somebody could override with just subset. People
could have thier own execs to invoke TELE, i.e. MYFONE

EXEC TELE &1 &2 &3 ( myfone
EXEC ELE &1 &2 &3 ( sanjose

--
'bout as easy to customize it this way as any.

... snip ... top of post, old email index

.... a few minutes earlier


Date 04/07/80 09:19:05
To: wheeler
From: gray

Lynn: the VMCF stuff sounds good.

I will combine the TELEX and PROBE (probably tonight). Another approach
would be to have a list of files to be searched called the TELE SEARCH
file. This could specify the order of the search and also which files
are to be searched. If this were done then TELE would have to change
also. Any thoughts?

... snip ... top of post, old email index

.... the day before,


Date: 04/06/80 13:02:12
From: wheeler
To: distribution

re: directries; following has gone out on stl's VMTOOLs disk. Gray is
working on PROB routine for use by TELE exec. If request is simple case
of last name then the PROB routine will be invoked to search the
files. Currently SCANFILE is taking almost .8 168 seconds to search all
directries we have so far. Hopefully the PROB code will cut that be
nearly an order of magniture.

DIRECTRY QMARK:

This file describes the NEWS files which have a CMS filetype of DIRECTRY
containing online telephone directory information. There may be many
files, usually representing different physical locations or entites.

The use of these files is intended to be location specific. At Santa
Teresa they are maintained on a "best effort" basis. Users are
encouraged to make use of the information contained within these files
but are also warned that they are convenience items only, THE ACCURRACY
OR CURRENCY OF THE DATA IS NOT GUARANTEED! The system of interchange and
use is still in development. The TELE EXEC searches these files (as of
the DIRECTRY scheme cutover date on TELE INDEX within NEWS contains
entries pertaining to the TELE/DIRECTRY files and access.

This file will be updated as changes warrant. 80 March 31.

... snip ... top of post, old email index

trivia: there had been application that did SCANFILE which was
sequential search of files (sort of like unix grep). PROBE was radix
partition search. Binary Search starts in middle of sorted file, 16k
entry file takes avg. 14 tries (i.e. 2**14). Radix partition used the
letter frequency distribution of sorted phone data, using first two
letters of last name, 16k file, calculated partition avgs 24 records,
first try is middle of that partition ... 2nd try includes correction
for "error" of 1st try. Typical logical record was 80bytes, typical
physical record was 4096bytes ... high probabilty 1st try will at
least be within the correct physical recrd.

--
virtualization experience starting Jan1968, online at home since Mar1970

S/360 announce 4/7/1964, 54yrs

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: S/360 announce 4/7/1964, 54yrs
Newsgroups: alt.folklore.computers
Date: Sat, 07 Apr 2018 14:13:15 -0700

re:
http://www.garlic.com/~lynn/2018c.html#41 S/360 announce 4/7/1964, 54yrs

and also ibm retirees posting today: Change and Continuity at IBM: Key
Themes in Histories of IBM
https://www.cambridge.org/core/services/aop-cambridge-core/content/view/DADE64DDC8569B2F9046B4CF47DFA814/S0007680518000041a.pdf/change_and_continuity_at_ibm_key_themes_in_histories_of_ibm.pdf

and other IBM drift, "The rise and fall of IBM", both in French and
English
https://www.ecole.org/en/session/49-the-rise-and-fall-of-ibm

--
virtualization experience starting Jan1968, online at home since Mar1970

S/360 announce 4/7/1964, 54yrs

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: S/360 announce 4/7/1964, 54yrs
Newsgroups: alt.folklore.computers
Date: Sun, 08 Apr 2018 09:52:57 -0700

re:
http://www.garlic.com/~lynn/2018c.html#41 S/360 announce 4/7/1964, 54yrs
http://www.garlic.com/~lynn/2018c.html#42 S/360 announce 4/7/1964, 54yrs

a little more:

Some Key Dates in IBM's Operations in Europe, the Middle East and Africa
https://www-03.ibm.com/ibm/history/documents/pdf/emea.pdf

One of my hobbies after joining IBM was creating & supporting enhanced
operating systems for internal datacenters, including a long time
customer HONE.

When HONE started being cloned around the world, I would be asked to go
over for the installation, did one in (new) Tour Franklin, early 70s,
landscaping hadn't been completed, still brown dirt around the
bldg. Hard part was reading my email back in the states.

Late 70s and early 80s I was blamed for online computer conferencing
(precursor to social media) on the internal network (larger than
arpanet/internet from just about the beginning until sometime
mid-80s). Folklore is when the comporate executive committee was told
about online computer conferencing (and the internal network), 5of6
wanted to fire me.

Old (archived) email from person given responsibility for doing EARN
(see EMEA 1983 above, had been former co-worker at science center)
http://www.garlic.com/~lynn/2001h.html#email840320

Note In Aug1976, TYMSHARE
https://en.wikipedia.org/wiki/Tymshare

started offering its CMS-based online computer conferencing "free" to
(IBM user group) SHARE
https://www.share.org/

I created process to get monthly complete copy of all vmshare for
placing on internal systems (includine HONE systems) and making
available on the internal network. Biggest problem I had was with the
lawyers that were afraid customer information could contaminate IBM
employees. Archives here:
http://vm.marist.edu/~vmshare/

IBM email from somebody in Helsinki
http://www.garlic.com/~lynn/2007b.html#email830112
IBM email from somebody in Kuwait trying to get information about how
his customer can access TYMSHARE
http://www.garlic.com/~lynn/2007b.html#email830227

EARN (& BITNET posts), corporate sponsored UNIV network posts
http://www.garlic.com/~lynn/subnetwork.html#bitnet
internal network posts
http://www.garlic.com/~lynn/subnetwork.html#internalnet
online computer conferencing posts
http://www.garlic.com/~lynn/subnetwork.html#cmc
HONE posts
http://www.garlic.com/~lynn/subtopic.html#hone

--
virtualization experience starting Jan1968, online at home since Mar1970

Anatomy of Failure: Why America Loses Every War It Starts

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Anatomy of Failure: Why America Loses Every War It Starts
Date: 08 Apr 2018
Blog: Facebook

Anatomy of Failure: Why America Loses Every War It Starts
https://www.amazon.com/Anatomy-Failure-America-Loses-Starts-ebook/dp/B075XPH31Q/

loc101-4:

This book has its origins in the Vietnam War, in 1965. I was serving
as a Swift Boat skipper in the northernmost part of the Republic of
South Vietnam. Over time (I was there from 1965 to 1967), even a
junior naval officer could not ignore the recurring displays of
arrogance, naiveté, ignorance, ineptitude, and incompetence by the
senior American political and military leadership in waging that
conflict.

loc520-23:

George W. Bush similarly lacked experience and qualifications for the
office. Two terms as governor of Texas—a position with far less
authority than in most states—could not equip the younger Bush for
higher office. Observing his father's twelve years in the White House
as vice president and then as president might have been instructive.

... snip ...

... however a lot more complicated, financial; note that VP (and
former director of CIA) repeatedly claiming no knowledge of
http://en.wikipedia.org/wiki/Iran%E2%80%93Contra_affair
because he was fulltime administration point person deregulating
financial industry ... creating S&L crisis
http://en.wikipedia.org/wiki/Savings_and_loan_crisis
along with other members of his family
http://en.wikipedia.org/wiki/Savings_and_loan_crisis#Silverado_Savings_and_Loan
and another
http://query.nytimes.com/gst/fullpage.html?res=9D0CE0D81E3BF937A25753C1A966958260

last decade, another family member presides over the economic mess, 70
times larger than the S&L crisis which had 1000 criminal convictions
with jailtime, proportionally there should have been 70,000 criminal
convictions, but has had none.

... and military: much earlier, CIA director Colby refuses to approve
"Team B" analysis claiming huge Russian military capability,
justifying huge US military spending increase.
https://en.wikipedia.org/wiki/Team_B

White House Chief of Staff Rumsfeld replaces Colby with somebody
(Bush1) that will agree with "Team B" analysis. Rumsfeld then resigns
to become SECDEF (and is replaced by his assistant Cheney). In the
80s, Bush1 is VP and Rumsfeld is involved in supporting Iraq.
http://en.wikipedia.org/wiki/Iran%E2%80%93Iraq_War
including supplying WMDs (includes picture of Rumsfeld with Saddam)
http://en.wikipedia.org/wiki/United_States_support_for_Iraq_during_the_Iran%E2%80%93Iraq_war

In the early 90s, Bush1 is president and Cheney is SECDEF. Sat. photo
recon analyst told white house that saddam was marshaling forces to
invade Kuwait. White house said that saddam would do no such thing and
proceeded to discredit the analyst. Later the analyst informed the
white house that saddam was marshaling forces to invade Saudi Arabia,
now the white house has to choose between saddam and the Saudis.
http://www.amazon.com/Long-Strange-Journey-Intelligence-ebook/dp/B004NNV5H2/

This century, Bush2 is president, Cheney is VP, Rumsfeld is SECDEF and
one of the "Team B" members is deputy SECDEF (and major architect of
Iraq policy).
https://en.wikipedia.org/wiki/Paul_Wolfowitz

note both 80s SECSTATE and SECDEF were Bechtel executives ... helping
their (former) employer do business in the middle east. "The
Profiteers: Bechtel and the Men Who Built the World" ... Bechtel is
also part of the massive uptic in gov. outsourcing last decade
https://www.amazon.com/Profiteers-Bechtel-Men-Built-World-ebook/dp/B010MHAHV2/

VP has become president and Iran/Contra prosecutors are working with
former SECDEF on evidence ... including against the sitting
president. The president then "pardons" the former SECDEF.

loc2752-54:

Pollard had accidentally "busted the most secret White House operation
of modern times," as one account put it. "Neither Pollard nor the
government of Israel was aware that they had smashed George Bush's
first shipment of arms to Iran."

loc2764-65:

Despite his best efforts to silence Pollard, Weinberger would not
escape his own entanglement in the Iran-Contra conspiracy, for which
he would ultimately face criminal charges.

... snip ...

eventually a bunch of evidence is turned over (that the president had
"forgotten" about) showing he was heavily involved in Iran/Contra

part of military at least "War Is A Racket"
https://en.wikipedia.org/wiki/War_Is_a_Racket
and more recent "Economic Hit-Man" kleptocracy around the world
... and send in the "jackals" when other means fail
https://en.wikipedia.org/wiki/Confessions_of_an_Economic_Hit_Man
and
https://www.amazon.com/New-Confessions-Economic-Hit-Man-ebook/dp/B017MZ8EBM/
and more recently Spinney's (military-industrial complex) "perpetual
wars"
http://chuckspinney.blogspot.com/p/domestic-roots-of-perpetual-war.html

Anatomy of Failure: Why America Loses Every War It Starts, loc134-36:

The flaw in this strategy was that North Vietnam already had an
effective logistical land route to the South, called the Ho Chi
Minh. This trail, deep in the interior of Southeast Asia, did not need
seaborne routes. But the Navy was anxious to get its share of the
action—even though there was little action to be had.

... snip ...

I would sponsor Col Boyd's briefings in the 80s and continue to
participate in Boyd-themed conferences and discussions. Boyd would
talk about being very vocal about electronics on the trail wouldn't
work ... possibly as punishment is then made command of "spook
base". Spook base ref gone 404, but lives on at wayback machine
http://web.archive.org/web/20030212092342/http://home.att.net/~c.jeppeson/igloo_white.html

perpetual war posts
http://www.garlic.com/~lynn/submisc.html#perpetual.war
military-industrial(-congressional) complex posts
http://www.garlic.com/~lynn/submisc.html#military.industrial.complex
team b posts
http://www.garlic.com/~lynn/submisc.html#team.b
WMD posts
http://www.garlic.com/~lynn/submisc.html#wmds

--
virtualization experience starting Jan1968, online at home since Mar1970

Counterinsurgency Lessons from Malaya and Vietnam: Learning to Eat Soup with a Knife

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Counterinsurgency Lessons from Malaya and Vietnam: Learning to Eat Soup with a Knife
Date: 08 Apr 2018
Blog: Facebook

Counterinsurgency Lessons from Malaya and Vietnam: Learning to Eat
Soup with a Knife
https://www.amazon.com/Counterinsurgency-Lessons-Malaya-Vietnam-Learning-ebook/dp/B000QECG20/

contrasts British handling Malaysia insurgency (welcome
change/innovation coming bottom up) with US handling Vietnam
insurgency (US Army insists it is still fighting top-down
command&control conventional WW2 in Europe, repeatedly discounting
special forces and marines experience) loc1545-47:

The British army demonstrated a remarkable openness to learning during
the years from 1952 to 1957. Bottom-up input was welcomed, from
tactical innovations, such as walking backward, through operational
ones, such as food denial operations; district advisers, British army
privates, and Surrendered Enemy Personnel were asked for ideas on
better ways to accomplish the objectives of the organization.

... snip ...

How Toyota Turns Workers Into Problem Solvers
http://hbswk.hbs.edu/item/how-toyota-turns-workers-into-problem-solvers

To paraphrase one of our contacts, he said, "It's not that we don't
want to tell you what TPS is, it's that we can't. We don't have
adequate words for it. But, we can show you what TPS is."

We've observed that Toyota, its best suppliers, and other companies
that have learned well from Toyota can confidently distribute a
tremendous amount of responsibility to the people who actually do the
work, from the most senior, experienced member of the organization to
the most junior. This is accomplished because of the tremendous
emphasis on teaching everyone how to be a skillful problem solver.

... snip ...

more ... Lessons from Malaya and Vietnam, loc1628-30:

The American army's involvement in the Second Indochina War from 1950
to 1972 demonstrates the triumph of the institutional culture of an
organization over attempts at doctrinal innovation and the diminution
of the effectiveness of the organization at accomplishing national
objectives.

loc1631-33:

The concept that success in counterinsurgency consisted of separating
the insurgents from popular support never took root. The U.S. Army
proceeded with its historical role of destroying the enemy army-even
if it had a hard time finding it. The United States Army entered the
Vietnam War with a doctrine well suited to fighting conventional war
in Europe, but worse than useless for the counterinsurgency it was
about to combat.

loc1641-43:

The learning cycle was also ineffective in recognizing poor
performance, suggesting doctrinal innovation, gaining organizational
consensus behind new doctrine, and disseminating the changes
throughout the army in Vietnam. Although there was substantial
innovation from below, neither the personnel nor the organization of
the Military Assistance Advisory Group (MAAG) and of its successor
organization, Military Assistance Command-Vietnam (MACV), was
conducive to counterinsurgency learning.

and

loc2818-20:

Many of these innovations were, if useless, at least not harmful to
the achievement of American goals; the same can hardly be said for the
use of strategic B-52 bombers in a tactical close air support role,
which produced a vast number of civilian causalities and provided duds
(5 percent of the bombs failed to explode) for booby traps that killed
more than one thousand U.S. soldiers in 1966 alone

... snip ...

note in Iraq2 invasion, invaders were ordered to bypass ammo dumps
looking for (non-existent) WMDs, when they got around to going back,
over million metric tons had disappeared. From the law of unintended
consequences, large artillery shells start showing up in IEDs.
http://www.amazon.com/Prophets-War-Lockheed-Military-Industrial-ebook/dp/B0047T86BA

McMaster's 1997 book (Phd thesis), quite critical of Johnson,
McNamara, Westmoreland, body count, and whole counterinsurgency
program (when Johnson was asked what they were suppose to do in
Vietnam, he consistently replies, "kill more viet cong" ... also long
litany of Johnson & McNamara lying to congress).
https://www.amazon.com/Dereliction-Duty-Johnson-McNamara-Chiefs-ebook/dp/B004HW7834/

Doesn't get as far as Nixon's "treason" in manipulating peace talks to
improve his winning election (but does talk about Johnson lying about
vietnam and manipulating opinion to help him win election). From
(then) recently declassified info, basically advisors didn't see US
could win (wasn't military issue) ... but it would be worse position
in world opinion if didn't try.

Milton Miles book ("Different Kind of War")
https://www.amazon.com/Different-Kind-War-little-known-guerrilla/dp/B0006BQ5XY/

first half was about going into china to setup coastal watchers but
then spent much of the rest training 50,000 guerrillas fighting the
Japanese. He then spends the last half of the book about how OSS and
Army gave china to the communists. They came in and wanted to take
over the whole operation. The US Navy and Nationalists rebuffed them,
so to get something they could take credit for, they support the
communists. Also has Marshall supporting Army, both as SECDEF and then
later SECSTATE (47-49). Then 1949 China White Paper somewhat trying to
absolve state for giving China to the Communists ... possible excuse
was Marshall was preoccupied with Europe ... however there was also a
lot of placating Stalin because they believed they needed Soviets to
defeat Japan.
https://archive.org/details/VanSlykeLymanTheChinaWhitePaper1949

In Manchuria there was 1.5M Soviets fighting 1M Japanese. By
comparison Okinawa, US had 600k fighting 76k Japanese. This covers a
lot of Soviets in WW2, including Manchuria (after Germans had been
defeated) "free pdf"
https://history.army.mil/html/books/070/70-89-1/index.html
kindle
https://www.amazon.com/HISTORICAL-PERSPECTIVES-OPERATIONAL-ART-ANTHOLOGY-ebook/dp/B0086W3GX2/

Without giving China to the communists, there wouldn't have been
Korea, and w/o Korea they wouldn't have been domino theory, and w/o
domino theory, there wouldn't have been excuse for Vietnam.

and with regard to B-52s, remember McNamara was LeMay's staff planning
(strategic) fire bombing of German and Japanese cities. After end of
WW2, he leaves for the auto industry, but comes back as SECDEF for
Vietnam where Laos becomes the most bombed country in the world, more
tonnage than Germany and Japan combined. USAF had made all sort of
claims for WW2 strategic bombing (it accounted for 1/3rd of total US
WW2 spending) and even claimed it would win the war w/o US even having
to invade europe. However, Strategic 4engine heavy bombers had
difficulty hitting target from 5-6 miles up, even with Norden
sights. Example
https://ssi.armywarcollege.edu/pubs/display.cfm?pubID=1075

loc2582-85:

The bomber preparation of Omaha Beach was a total failure, and German
defenses on Omaha Beach were intact as American troops came ashore. At
Utah Beach, the bombers were a little more effective because the IXth
Bomber Command was using B-26 medium bombers. Wisely, in preparation
for supporting the invasion, maintenance crews removed Norden
bombsights from the bombers and installed the more effective low-level
altitude sights.

... snip ...

possible motivation for switching to fire bombing cities (and
civilians) ... fire bombing would be almost impossible to miss a whole
city

TPS posts
http://www.garlic.com/~lynn/2017g.html#54 Boyd's OODA-loop
http://www.garlic.com/~lynn/2017g.html#59 Deconstructing the "Warrior Caste:" The Beliefs and Backgrounds of Senior Military Elites
http://www.garlic.com/~lynn/2017g.html#93 The U.S. Military Believes People Have a Sixth Sense
http://www.garlic.com/~lynn/2017g.html#100 Why CEO pay structures harm companies
http://www.garlic.com/~lynn/2017h.html#8 Trump is taking the wrong approach to China on tech, says ex-Reagan official who helped beat Soviets
http://www.garlic.com/~lynn/2017i.html#2 Mission Command: The Who, What, Where, When and Why An Anthology
http://www.garlic.com/~lynn/2017i.html#32 progress in e-mail, such as AOL
http://www.garlic.com/~lynn/2017k.html#24 The Ultimate Guide to the OODA-Loop

military-industrial(-congressional) complex posts
http://www.garlic.com/~lynn/submisc.html#military.industrial.complex

strategic bombing posts
http://www.garlic.com/~lynn/2017.html#63 One Nation Under God: How Corporate America Invented Christian America
http://www.garlic.com/~lynn/2017c.html#91 Godwin's Law should force us to remember & fear our shared heritage with Nazi Germany
http://www.garlic.com/~lynn/2017d.html#38 Imperial Hubris
http://www.garlic.com/~lynn/2017d.html#55 Should America Have Entered World War I?
http://www.garlic.com/~lynn/2017e.html#22 Ironic old "fortune"
http://www.garlic.com/~lynn/2017e.html#60 The Illusion Of Victory: America In World War I
http://www.garlic.com/~lynn/2017e.html#69 The knives are out for Trump's national security adviser H.R. McMaster
http://www.garlic.com/~lynn/2017f.html#18 5 Naval Battles That Changed History Forever
http://www.garlic.com/~lynn/2017f.html#41 [CM] What was your first home computer?
http://www.garlic.com/~lynn/2017f.html#60 [CM] What was your first home computer?
http://www.garlic.com/~lynn/2017f.html#84 Early use of word "computer", 1944
http://www.garlic.com/~lynn/2017g.html#53 Dunkirk
http://www.garlic.com/~lynn/2017g.html#99 The Real Reason You Should See Dunkirk: Hitler Lost World War II There
http://www.garlic.com/~lynn/2017h.html#3 Dunkirk
http://www.garlic.com/~lynn/2017h.html#34 Disregard post (another screwup; absolutely nothing to do with computers whatsoever!)
http://www.garlic.com/~lynn/2017i.html#28 WW2 Internment
http://www.garlic.com/~lynn/2017i.html#74 When Working From Home Doesn't Work
http://www.garlic.com/~lynn/2017j.html#21 Norden bombsight
http://www.garlic.com/~lynn/2017j.html#24 What if the Kuomintang Had Won the Chinese Civil War?
http://www.garlic.com/~lynn/2017j.html#35 Tech: we didn't mean for it to turn out like this
http://www.garlic.com/~lynn/2017j.html#47 America's Over-Hyped Strategic Bombing Experiment
http://www.garlic.com/~lynn/2017k.html#70 Russia Invaded Japanese Islands With U.S. Ships -- After Japan Surrendered
http://www.garlic.com/~lynn/2018.html#8 The First World War
http://www.garlic.com/~lynn/2018.html#13 Predicting the future in five years as seen from 1983
http://www.garlic.com/~lynn/2018.html#48 1963 Timesharing: A Solution to Computer Bottlenecks
http://www.garlic.com/~lynn/2018b.html#45 More Guns Do Not Stop More Crimes, Evidence Shows
http://www.garlic.com/~lynn/2018b.html#60 Revealed - the capitalist network that runs the world
http://www.garlic.com/~lynn/2018c.html#2 FY18 budget deal yields life-sustaining new wings for the A-10 Warthog

fire bombing posts
http://www.garlic.com/~lynn/2016.html#60 For those who like to regress to their youth? :-)
http://www.garlic.com/~lynn/2016c.html#73 Qbasic
http://www.garlic.com/~lynn/2016c.html#91 Qbasic
http://www.garlic.com/~lynn/2016d.html#8 What Does School Really Teach Children
http://www.garlic.com/~lynn/2016d.html#30 AM radio Qbasic
http://www.garlic.com/~lynn/2016d.html#82 "Computer & Automation" later issues--anti-establishment thrust
http://www.garlic.com/~lynn/2016d.html#90 "Computer & Automation" later issues--anti-establishment thrust
http://www.garlic.com/~lynn/2016e.html#113 E.R. Burroughs
http://www.garlic.com/~lynn/2016f.html#27 British socialism / anti-trust
http://www.garlic.com/~lynn/2016f.html#56 "One Nation Under God: How Corporate America Invented Christian America"
http://www.garlic.com/~lynn/2016f.html#64 Strategic Bombing
http://www.garlic.com/~lynn/2016f.html#68 Strategic Bombing
http://www.garlic.com/~lynn/2016g.html#63 America's Over-Hyped Strategic Bombing Experiment
http://www.garlic.com/~lynn/2016h.html#21 "I used a real computer at home...and so will you" (Popular Science May 1967)
http://www.garlic.com/~lynn/2016h.html#32 "I used a real computer at home...and so will you" (Popular Science May 1967)
http://www.garlic.com/~lynn/2016h.html#33 "I used a real computer at home...and so will you" (Popular Science May 1967)
http://www.garlic.com/~lynn/2016h.html#34 "I used a real computer at home...and so will you" (Popular Science May 1967)
http://www.garlic.com/~lynn/2016h.html#36 "I used a real computer at home...and so will you" (Popular Science May 1967)
http://www.garlic.com/~lynn/2016h.html#83 "I used a real computer at home...and so will you" (Popular Science May 1967)
http://www.garlic.com/~lynn/2017d.html#38 Imperial Hubris
http://www.garlic.com/~lynn/2017e.html#22 Ironic old "fortune"
http://www.garlic.com/~lynn/2017e.html#69 The knives are out for Trump's national security adviser H.R. McMaster
http://www.garlic.com/~lynn/2017f.html#60 [CM] What was your first home computer?
http://www.garlic.com/~lynn/2017f.html#61 [CM] What was your first home computer?
http://www.garlic.com/~lynn/2017f.html#82 Early use of word "computer", 1944
http://www.garlic.com/~lynn/2017f.html#84 Early use of word "computer", 1944
http://www.garlic.com/~lynn/2017g.html#53 Dunkirk
http://www.garlic.com/~lynn/2017g.html#99 The Real Reason You Should See Dunkirk: Hitler Lost World War II There
http://www.garlic.com/~lynn/2017h.html#3 Dunkirk
http://www.garlic.com/~lynn/2017h.html#34 Disregard post (another screwup; absolutely nothing to do with computers whatsoever!)
http://www.garlic.com/~lynn/2017i.html#28 WW2 Internment
http://www.garlic.com/~lynn/2017j.html#21 Norden bombsight
http://www.garlic.com/~lynn/2017j.html#47 America's Over-Hyped Strategic Bombing Experiment
http://www.garlic.com/~lynn/2017k.html#70 Russia Invaded Japanese Islands With U.S. Ships -- After Japan Surrendered
http://www.garlic.com/~lynn/2018.html#48 1963 Timesharing: A Solution to Computer Bottlenecks

--
virtualization experience starting Jan1968, online at home since Mar1970

Slashdot: Business under-investing in I.T

From: lynn@GARLIC.COM (Anne & Lynn Wheeler)
Subject: Re: Slashdot: Business under-investing in I.T.
Newsgroups: bit.listserv.ibm-main
Date: 9 Apr 2018 09:34:49 -0700

poodles511@SBCGLOBAL.NET (Dan @ Poodles) writes:

It's simple business economics - i.e., cost center vs profit center.
Businesses will always invest in revenue generating first above all
else.

big cloud megadatacenters (hundreds of thousands of systems, millions of
processors) had been spending enormous amount to commoditize server
systems, for more than decade they say they've been assembling their own
systems at 1/3rd the cost of brand name systems. About the time server
chip makers said they were shipping more chips to cloud customers (to
assemble their own systems) than to server vendors, IBM sold off its
server business.
http://www.opencompute.org/

They've managed to so commoditize the cost of servers (cost but shows on
bottom line) that power & cooling have increasingly become major part of
their costs ... and they are putting heavy pressure on server chip makers
to significantly improve power (& cooling) use. Also they've managed to
drop server cost so drastically that they can provision large number of
extra systems for "on-demand" ... and they require systems that
power/cooling drop to near zero when idle but are nearly instant on when
needed.

It is so changing the metrics that server price/performance is being
replaced by power efficiency ratio.
https://en.wikipedia.org/wiki/Power_usage_effectiveness

and PUE is also affecting locations chosen to build new megadatacenters.

--
virtualization experience starting Jan1968, online at home since Mar1970

Who Wrote Fortran IV, Level G?

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Who Wrote Fortran IV, Level G?
Newsgroups: alt.folklore.computers
Date: Mon, 09 Apr 2018 11:25:49 -0700

Quadibloc <jsavard@ecn.ab.ca> writes:

I remember it being said that IBM didn't write that compiler itself, but instead
they hired a firm that wrote compilers for computer manufacturers to do that; it
was a firm whose ads I remember seeing in Computerworld, they mentioned that they
used a stack-based technology for their compilers.

But I can't seem to find or remember the name...

John Savard

I remember Univ. of Chicago had some amount of the contract for Fort G
... but don't remember whether it was everything ... or just runtime
libraries.

much later STL started subcontracting lots of compiler stuff out ...
there was some uproar over lots of internal compiler optimization
technology being given to some company.

--
virtualization experience starting Jan1968, online at home since Mar1970

S/360 announce 4/7/1964, 54yrs

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: S/360 announce 4/7/1964, 54yrs
Newsgroups: alt.folklore.computers
Date: Mon, 09 Apr 2018 16:59:17 -0700

Dan Espen <dan1espen@gmail.com> writes:

At Bell Labs and it's descendants, we had the "dq" command.
(Directory Query).
The UNIX version had a nice phonetic search.  You really only
had to approximate the name you were looking for.
You could get "dq" to return a full list of all employees.
A few employees used this to build a tool that would track
new hires and fires.  You could get on a distribution list
and get weekly updates on changes within the company.

re:
http://www.garlic.com/~lynn/2018c.html#41 S/360 announce 4/7/1964, 54yrs

somewhat later there was some effort made to get a copy of phonetic
search ... to add as option.

Late 70s, early 80s, I was blamed for online computer conferencing
on the internetl network (folklore when corporate executive committee
was told, 5of6 wanted to fire me).

One of the most "popular" was trip report I distributed after visiting
Jim at Tandem (not long after he left Research) ... which kicked off
what was called "Tandem memos" ... from IBMJARGON:

Tandem Memos - n. Something constructive but hard to control; a fresh of
breath air (sic). That's another Tandem Memos. A phrase to worry middle
management. It refers to the computer-based conference (widely
distributed in 1981) in which many technical personnel expressed
dissatisfaction with the tools available to them at that time, and also
constructively criticised the way products were are developed.  The
memos are required reading for anyone with a serious interest in quality
products. If you have not seen the memos, try reading the November 1981
Datamation summary.

... snip ...

... which resulted in lots of corporate attention and investigations.  A
series of investigations was to visit other research-like institutions
... later there was a claim that these visits were in response to "MIP
Envy" that Jim at written as he left research (for tandem) ... old email
reference
http://www.garlic.com/~lynn/2007.html#email801006
and
http://www.garlic.com/~lynn/2007.html#email801016

copy here as well as URL for slightly later version at m'osft (gone
404 but lives on at wayback machine)
http://www.garlic.com/~lynn/2007d.html#17 Jim Gray Is Missing
i.e.
http://www.garlic.com/~lynn/2007d.html#email800920

visits were done summer of '81 as computer conferencing came to head
with corporate executive committee ... nearly year after Jim left
(and MIP Envy). part of trip reports including Bell Labs
http://www.garlic.com/~lynn/2006n.html#56
summary of machines at some of locations visited
http://www.garlic.com/~lynn/2001l.html#61
Part of Xerox trip report in this post
http://www.garlic.com/~lynn/2006t.html#37
CMU visit
http://www.garlic.com/~lynn/2007d.html#14

--
virtualization experience starting Jan1968, online at home since Mar1970

S/360 announce 4/7/1964, 54yrs

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: S/360 announce 4/7/1964, 54yrs
Newsgroups: alt.folklore.computers
Date: Mon, 09 Apr 2018 17:14:37 -0700

hancock4 writes:

In my own career, I had one assignment to computerize a 'backwater'
office.  The good thing was that no one cared about this department
and the project was under the radar--we could it as we pleased
without bureaucrats interfering.

re:
http://www.garlic.com/~lynn/2018c.html#41 S/360 announce 4/7/1964, 54yrs
http://www.garlic.com/~lynn/2018c.html#48 S/360 announce 4/7/1964, 54yrs

something similar for the original SQL/relational implementation,
System/R; past posts
http://www.garlic.com/~lynn/submain.html#systemr

official next generation DBMS was "EAGLE" ... and while company was
preoccupied with "EAGLE" ... managed to do technology transfer "under
the radar" to Endicott for SQL/DS. Later when "EAGLE" imploded, there
was request about how fast could System/R be ported to MVS (eventually
released as DB2, originally for business analytics only)

--
virtualization experience starting Jan1968, online at home since Mar1970

Anatomy of Failure: Why America Loses Every War It Starts

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Anatomy of Failure: Why America Loses Every War It Starts
Date: 09 Apr 2018
Blog: Facebook

re:
http://www.garlic.com/~lynn/2018c.html#44 Anatomy of Failure: Why America Loses Every War It Starts

Anatomy of Failure, loc2501-4:

Russia was never going to become a Western-style democracy, for
well-understood social, historical, cultural, political, and
ideological reasons. At some stage, the sense of Russian insecurity,
which predated the tsars, would be triggered by revulsion to and an
endemic fear of being surrounded by enemies. Gorbachev, Yeltsin, and
Putin have all raised these concerns and fears. In a sense of
goodwill, perhaps, and with malice toward none, the Clinton
administration probably sensed a permanency in relations with Russia,
that they would remain sound and amicable.

... snip ...

"Is Harvard Responsible For Rise of Putin" ... after the fall of the
soviet union, those sent over to teach capitalism were more intent on
looting the country. John Helmer: Convicted Fraudster Jonathan Hay,
Harvard's Man Who Wrecked Russia, Resurfaces in Ukraine
http://www.nakedcapitalism.com/2015/02/convicted-fraudster-jonathan-hay-harvards-man-who-wrecked-russia-resurfaces-in-ukraine.html

If you are unfamiliar with this fiasco, which was also the true
proximate cause of Larry Summers' ouster from Harvard, you must read
an extraordinary expose, How Harvard Lost Russia, from Institutional
Investor. I am told copies of this article were stuffed in every
Harvard faculty member's inbox the day Summers got a vote of no
confidence and resigned shortly thereafter.

... snip ...

How Harvard lost Russia; The best and brightest of America's premier
university came to Moscow in the 1990s to teach Russians how to be
capitalists. This is the inside story of how their efforts led to
scandal and disgrace.
http://www.institutionalinvestor.com/Article/1020662/How-Harvard-lost-Russia.html

Mostly, they hurt Russia and its hopes of establishing a lasting
framework for a stable Western-style capitalism, as Summers himself
acknowledged when he testified under oath in the U.S. lawsuit in
Cambridge in 2002. "The project was of enormous value," said Summers,
who by then had been installed as the president of Harvard. "Its
cessation was damaging to Russian economic reform and to the
U.S.-Russian relationship."

... snip ...

other trivia, I was brought into discussions about how to create 5,000
brick&mortar branch banks around Russia .... at about $1M each
... or $5B total (as part of creating democratic capitalist
environment). However, before it got very far, the whole thing
implodes because of the efforts by others to loot the country
... kleptocratic capitalism
https://en.wikipedia.org/wiki/Kleptocracy

some past posts
http://www.garlic.com/~lynn/2015b.html#1 do you blame Harvard for Puten
http://www.garlic.com/~lynn/2015b.html#2 do you blame Harvard for Putin
http://www.garlic.com/~lynn/2015b.html#5 Swiss Leaks lifts the veil on a secretive banking system
http://www.garlic.com/~lynn/2015b.html#6 do you blame Harvard for Putin
http://www.garlic.com/~lynn/2015b.html#8 Shoot Bank Of America Now---The Case For Super Glass-Steagall Is Overwhelming
http://www.garlic.com/~lynn/2015f.html#30 Analysis: Root of Tattered US-Russia Ties Date Back Decades
http://www.garlic.com/~lynn/2015f.html#44 No, the F-35 Can't Fight at Long Range, Either
http://www.garlic.com/~lynn/2015h.html#70 Department of Defense Head Ashton Carter Enlists Silicon Valley to Transform the Military
http://www.garlic.com/~lynn/2015h.html#91 Happy Dec-10 Day!!!
http://www.garlic.com/~lynn/2015h.html#122 For those who like to regress to their youth? :-)
http://www.garlic.com/~lynn/2016.html#16 1970--protesters seize computer center
http://www.garlic.com/~lynn/2016.html#39 Shout out to Grace Hopper (State of the Union)
http://www.garlic.com/~lynn/2016.html#73 Shout out to Grace Hopper (State of the Union)
http://www.garlic.com/~lynn/2016b.html#31 Putin holds phone call with Obama, urges better defense cooperation in fight against ISIS
http://www.garlic.com/~lynn/2016b.html#39 Failure as a Way of Life; The logic of lost wars and military-industrial boondoggles
http://www.garlic.com/~lynn/2016c.html#7 Why was no one prosecuted for contributing to the financial crisis? New documents reveal why
http://www.garlic.com/~lynn/2016c.html#69 Qbasic
http://www.garlic.com/~lynn/2016e.html#59 How Putin Weaponized Wikileaks to Influence the Election of an American President
http://www.garlic.com/~lynn/2016f.html#105 How to Win the Cyberwar Against Russia
http://www.garlic.com/~lynn/2016g.html#92 The Lessons of Henry Kissinger
http://www.garlic.com/~lynn/2016h.html#38 "I used a real computer at home...and so will you" (Popular Science May 1967)
http://www.garlic.com/~lynn/2016h.html#62 "I used a real computer at home...and so will you" (Popular Science May 1967)
http://www.garlic.com/~lynn/2017.html#7 Malicious Cyber Activity
http://www.garlic.com/~lynn/2017.html#56 25th Anniversary Implementation of Nunn-Lugar Act
http://www.garlic.com/~lynn/2017f.html#63 [CM] What was your first home computer?
http://www.garlic.com/~lynn/2017f.html#65 View of Russia
http://www.garlic.com/~lynn/2017f.html#69 [CM] What was your first home computer?
http://www.garlic.com/~lynn/2017h.html#39 Disregard post (another screwup; absolutely nothing to do with computers whatsoever!)
http://www.garlic.com/~lynn/2017i.html#69 When Working From Home Doesn't Work
http://www.garlic.com/~lynn/2017i.html#82 John Helmer: Lunatic Russia-Hating in Washington Is 70 Years Old. It Started with Joseph Alsop, George Kennan and the Washington Post
http://www.garlic.com/~lynn/2017j.html#35 Tech: we didn't mean for it to turn out like this
http://www.garlic.com/~lynn/2017k.html#66 Innovation?, Government, Military, Commercial
http://www.garlic.com/~lynn/2018.html#14 Predicting the future in five years as seen from 1983
http://www.garlic.com/~lynn/2018b.html#33 Olympics opening ceremony
http://www.garlic.com/~lynn/2018b.html#60 Revealed - the capitalist network that runs the world

--
virtualization experience starting Jan1968, online at home since Mar1970

EMV: Why the US migration didn't happen sooner

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: EMV: Why the US migration didn't happen sooner
Date: 10 Apr 2018
Blog: Facebook

EMV: Why the US migration didn't happen sooner; There's a lot of
criticism when it comes to the timing of EMV migration in the US, with
detractors often calling the US 'backwards' and 'behind' the rest of
the world
https://www.zdnet.com/article/emv-understanding-why-the-us-migration-didnt-happen-sooner/

past reference
http://www.garlic.com/~lynn/2015c.html#73 EMV: Why the US migration didn't happen sooner

Original chips in europe were to enable offline transactions because
the enormous telco costs (for online transactions) ... and providers
were motivated to deploy chip stored-value products (because they got
the float). In mid-90s, two things happened, 1) EU telco costs started
to significantly drop and 2) EU central banks directed that providers
had to start paying interest on stored-value (eliminating the float
incentive) ... and there was big pullback.  About the same time, a US
provider started offering magstripe, online stored value (gift and
merchant) cards. Turns out during their pilot they had a hardware
glitch (which required resetting cards back to initial value) and we
were brought in to audit the whole thing and help make sure it would
never be repeated.

Chips then primarily becomes a security issue (started UK & EU
deployment in 1997). Circa 2000, there was very large east-coast chip
point-of-sale pilot in the US ... however it was during the "yes card"
vulnerability period ... and they insisted on going through with the
pilot ... even when we repeatedly explained the "yes card"
vulnerability, to some extent they were myopically focused on
lost/stolen, and couldn't process cloning threat. It wasn't until they
actually deployed and had problems that there was pull-back, all
evidence of the pilot evaporates and conjecture was that it would be a
long time before tried in the US again (letting other jurisdictions
worked out the problems).

It was covered in some detail in session at Cartes2002, trip report
gone 404, but lives on at the wayback machine
http://web.archive.org/web/20030417083810/http://www.smartcard.co.uk/resources/articles/cartes2002.html

At the 2003 ATM integrity task-force conference, secret service
presented the "yes card" problem in detail ... during which somebody
in the audience commented that they had spent billions of dollars to
prove that chips were less secure than magstripe.

"yes card" postings
http://www.garlic.com/~lynn/subintegrity.html#yescards

M'soft had PC/SC for home use of chipcards ... and there was different
issue why that "evaporated". One of the payment card brands started
sending out cards with chips and providing "free" card readers for
home use. However there was enormous customer support problems that
happened with home use .... resulting in big pull back from home use
(because of the enormous customer support costs) ... and rapidly
spreading rumor in the industry that chipcards weren't practical in
the consumer (home) market ... which also saw m'soft PC/SC
disappearing.

Turns out that the brand had apparently gotten fire sale on obsolete
serial-port cardreaders (USB was appearing, and a major justification
was address all the serial port problems). My wife got meeting in
redmond with kernel security, people that could be found from PC/SC
and various financial industry reps ... to show that the customer
support problems weren't with chipcards but serial port
devices. However, it was concluded that the bad reputation of
chipcards in the home market couldn't be reversed.

Note that in the mid-90s, at financial industry conferences, the
consumer dial-up home banking operations were presenting that they
were moving to internet ... in large part because of the enormous
consumer support costs associated with serial-port dial-up modems
(which be offloaded on ISPs). Institutional knowledge about enormous
serial-port problems (with modems) had evaporated between mid-90s and
2000 (for serial-port cardreaders). dial-up banking posts
http://www.garlic.com/~lynn/submisc.html#dialup.banking

disclaimer: I had done chip in the 2nd half of 90s that had none of
the vulnerabilities with what the industry was shipping, including the
"yes card" exploits (and also less than 1/10th the cost). Demos/booth
at 1999 BAI (world-wide retail banking) conference ... some press in
this archive posting
http://www.garlic.com/~lynn/99.html#224
other ref
http://www.garlic.com/~lynn/x959.html#aads

they way the EU financial institutions had designed the chip ...  it
was very expensive and couldn't be justified once float justification
was removed. chip makers tried to improve the justifications for the
chip by adding more functions ... but adding functions was driving up
the cost faster than it was improving the value.

I did two things, 1) concentrating on authentication and drastically
reducing cost easily inverted things so value was much higher than
cost and 2) figured out what was needed for institutions to trust
chipcards that they didn't issue ... switching from
institution-centric ... where you had a different card from each
institution ... to person-centric ... where you could have a person
card accepted by all institutions

Technical director (TD) for the director of information assurance
directorate at the agency had assurance panel in the trusted computing
tract at IDF and had me give talk on chip... details gone 404, but
lives on at wayback machine
< ahref="http://web.archive.org/web/20011109072807/http://www.intel94.com/idf/spr2001/sessiondescription.asp?id=stp+s13">http://web.archive.org/web/20011109072807/http://www.intel94.com/idf/spr2001/sessiondescription.asp?id=stp+s13

--
virtualization experience starting Jan1968, online at home since Mar1970

We the Corporations: How American Businesses Won Their Civil Rights

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: We the Corporations: How American Businesses Won Their Civil Rights
Date: 10 Apr 2018
Blog: Facebook

We the Corporations: How American Businesses Won Their Civil Rights
https://www.amazon.com/We-Corporations-American-Businesses-Rights-ebook/dp/B01M64LRDJ/

loc45-50:

IN DECEMBER 1882, ROSCOE CONKLING, A FORMER SENATOR and close
confidant of President Chester Arthur, appeared before the justices of
the Supreme Court of the United States to argue that corporations like
his client, the Southern Pacific Railroad Company, were entitled to
equal rights under the Fourteenth Amendment. Although that provision
of the Constitution said that no state shall "deprive any person of
life, liberty, or property, without due process of law" or "deny to
any person within its jurisdiction the equal protection of the laws,"
Conkling insisted the amendment's drafters intended to cover business
corporations too.

... snip ...

goes into some detail that Conkling argued that a journal detailing
the work on 14th amendment showed that it was originally intended to
also apply to corporations (in additional to people) ... however,
later examinations of the journal showed no such thing ... pure
fabrication on Conkling's part.

pg10/loc348-49:

Conditions were so bad that when the Virginia Company's first supply
ships arrived in January of 1608, nine months after the initial
landing, only 38 of the original 108 colonists had survived.

... snip ...

goes into some detail about redoing Jamestown charter and giving equal
rights to everyone saved the settlement. however, "Why Nations Fail",
original settlement, Jamestown ... English planning on emulating the
Spanish model, enslave the local population to support the
settlement. Unfortunately the North American natives weren't as
cooperative and the settlement nearly starved. Then they switched to
sending over some of the other populations from the British Isles
essentially as slaves ... the Crown charters had them as "leet-man"
pg27:

The clauses of the Fundamental Constitutions laid out a rigid social
structure. At the bottom were the "leet-men," with clause 23 noting,
"All the children of leet-men shall be leet-men, and so to all
generations."

... snip ...

We the Corporations, pg36/loc726-28:

On this issue, Hamiltonians were corporationalists—proponents of
corporate enterprise who advocated for expansive constitutional rights
for business. Jeffersonians, meanwhile, were populists—opponents of
corporate power who sought to limit corporate rights in the name of
the people.

pg120|loc1975-78:

The railroad corporations were constitutional first movers who
employed innovative tactics to secure new rights. They envisioned the
lawsuits as a form of strategic litigation, or what their lawyers
called "test cases," to determine whether corporations had the same
rights as ordinary people to equal protection and due process under
the Fourteenth Amendment.

pg123|loc2031-33:

According to the best estimates, the Central Pacific Railroad alone
distributed to lawmakers and lobbyists $500,000 annually—equal to
roughly $13 million today. As congressional leader James G. Blaine
explained the political reality in postbellum America, "to make the
wheels revolve we must have grease."

... snip ...

there is a lot more about railroads being major robber barons, 2nd
half of 1800s,
http://phys.org/news/2012-01-railroad-hyperbole-echoes-dot-com-frenzy.html
Railroaded: The Transcontinentals and the Making of Modern America
https://www.amazon.com/Railroaded-Transcontinentals-Making-Modern-America-ebook/dp/B0051GST1U/

"Why Nations Fail"
https://www.amazon.com/Why-Nations-Fail-Origins-Prosperity-ebook/dp/B0058Z4NR8/

also describes patent law inclusion in the constitution was to promote
innovation and protect individuals from corporations and businesses
trying to preserve the status quo. Situation has almost been reversed
today, where large corporations are primarily using patents to protect
their status quo. Goes along with MBAs, The Price of Inequality
https://www.amazon.com/Price-Inequality-Divided-Society-Endangers-ebook/dp/B007MKCQ30/

pg35/loc1169-73:

In business school we teach students how to recognize, and create,
barriers to competition -- including barriers to entry -- that help
ensure that profits won't be eroded. Indeed, as we shall shortly see,
some of the most important innovations in business in the last three
decades have centered not on making the economy more efficient but on
how better to ensure monopoly power or how better to circumvent
government regulations intended to align social returns and private
rewards

... snip ...

inequality posts
http://www.garlic.com/~lynn/submisc.html#inequality

some past "Railroaded" posts
http://www.garlic.com/~lynn/2012.html#57 The Myth of Work-Life Balance
http://www.garlic.com/~lynn/2012.html#62 Railroaded
http://www.garlic.com/~lynn/2012g.html#76 Monopoly/ Cartons of Punch Cards
http://www.garlic.com/~lynn/2012i.html#1 Monopoly/ Cartons of Punch Cards
http://www.garlic.com/~lynn/2014b.html#73 Royal Pardon For Turing
http://www.garlic.com/~lynn/2014m.html#37 Income Inequality
http://www.garlic.com/~lynn/2014m.html#39 LEO
http://www.garlic.com/~lynn/2015b.html#42 Future of support for telephone rotary dial ?

--
virtualization experience starting Jan1968, online at home since Mar1970

EMV: Why the US migration didn't happen sooner

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: EMV: Why the US migration didn't happen sooner
Date: 10 Apr 2018
Blog: Facebook

re:
http://www.garlic.com/~lynn/2018c.html#51 EMV: Why the US migration didn't happen sooner

note Secret Service and FBI had turf war ... Secret Service
responsible for money, gets responsibility if it can involve ATM
(cash) machine.

UK had deplyment were in 1997, and US deployment in 2001, however that
was in "Yes Card" period. There was reference on "Yes Card" at Cartes
2002 ... UK trip report (with reference at bottom) ... gone 404, but
lives on at wayback machine.
http://web.archive.org/web/20030417083810/http://www.smartcard.co.uk/resources/articles/cartes2002.html

in the wake of the "Yes Card", all evidence of the US deployment
evaporated and it was conjectured it would take until all the problems
had been shaken out in other (smaller) jurisdiction before it was
tried again (15yrs). Secret Service also gave detailed presentation at
2003 ATM Integrity Task Force meeting ... prompting somebody to
observe that they managed to spend a billion dollars to prove that
chipcards were less secure than magstripe. The issue was chipcards
could be cloned as easily as magstripe with similar
evesdropping/breaches.

Clone "Yes Cards" were programmed to always answer yes to 1) was
correct PIN entered, 2) is this offline transaction, 3) is transaction
within "open to buy" limit ... and therefor online (magstripe)
countermeasure shutting down account, had no effect.

"yes card" posts
http://www.garlic.com/~lynn/subintegrity.html#yescard

UK deployments were helped with effective move "burden of proof" to
consumer when chipcards were involved (consumer has to prove they
didn't do it). I was contacted by some UK legal representatives
involving ATM fraud ... where the person claimed they didn't do
it. The bank couldn't "find" the video survellience and therefor the
person had no easy way of proving that they didn't do it (Legal reps
wanted help in challenging burden of proof with UK Ombudsman). In the
US the institution would have to produce the video survellience to
prove the individual was responsible.

UK 1997 ref, gone 404 but lives on at wayback machine
https://web.archive.org/web/20061106193736/http://www-03.ibm.com/industries/financialservices/doc/content/solution/1026217103.html

a couple of the UK "burden of proof" articles

Victim of chip-and-pin fraud? It's all YOUR fault, insist the banks as they refuse payouts
http://www.thisismoney.co.uk/money/saving/article-2215223/Victim-chip-pin-fraud-Its-YOUR-fault-insist-banks.html
Now banks are trying to pin the blame for card fraud on you
https://www.theguardian.com/money/2012/may/04/banks-pin-card-fraud

other past posts mentioning "burden of proof":
http://www.garlic.com/~lynn/aadsm6.htm#nonreput Sender and receiver non-repudiation
http://www.garlic.com/~lynn/aadsm6.htm#terror7 [FYI] Did Encryption Empower These Terrorists?
http://www.garlic.com/~lynn/aepay10.htm#72 Invisible Ink, E-signatures slow to broadly catch on
http://www.garlic.com/~lynn/aadsm17.htm#59 dual-use digital signature vulnerability
http://www.garlic.com/~lynn/aadsm18.htm#0 dual-use digital signature vulnerability
http://www.garlic.com/~lynn/aadsm18.htm#55 MD5 collision in X509 certificates
http://www.garlic.com/~lynn/aadsm19.htm#33 Digital signatures have a big problem with meaning
http://www.garlic.com/~lynn/aadsm20.htm#0 the limits of crypto and authentication
http://www.garlic.com/~lynn/aadsm21.htm#35 [Clips] Banks Seek Better Online-Security Tools
http://www.garlic.com/~lynn/aadsm23.htm#14 Shifting the Burden - legal tactics from the contracts world
http://www.garlic.com/~lynn/aadsm23.htm#33 Chip-and-Pin terminals were replaced by "repairworkers"?
http://www.garlic.com/~lynn/aadsm26.htm#60 crypto component services - is there a market?
http://www.garlic.com/~lynn/aadsm26.htm#63 Public key encrypt-then-sign or sign-then-encrypt?
http://www.garlic.com/~lynn/aadsm28.htm#38 The Trouble with Threat Modelling
http://www.garlic.com/~lynn/2000.html#57 RealNames hacked. Firewall issues.
http://www.garlic.com/~lynn/2000g.html#34 does CA need the proof of acceptance of key binding ?
http://www.garlic.com/~lynn/2001g.html#59 PKI/Digital signature doesn't work
http://www.garlic.com/~lynn/2001g.html#62 PKI/Digital signature doesn't work
http://www.garlic.com/~lynn/2002g.html#69 Digital signature
http://www.garlic.com/~lynn/2004i.html#17 New Method for Authenticated Public Key Exchange without Digital Certificates
http://www.garlic.com/~lynn/2005e.html#41 xml-security vs. native security
http://www.garlic.com/~lynn/2005m.html#6 Creating certs for others (without their private keys)
http://www.garlic.com/~lynn/2005m.html#11 Question about authentication protocols
http://www.garlic.com/~lynn/2005o.html#26 How good is TEA, REALLY?
http://www.garlic.com/~lynn/2005o.html#42 Catch22. If you cannot legally be forced to sign a document etc - Tax Declaration etc etc etc
http://www.garlic.com/~lynn/2006d.html#32 When *not* to sign an e-mail message?
http://www.garlic.com/~lynn/2006e.html#8 Beginner's Pubkey Crypto Question
http://www.garlic.com/~lynn/2007h.html#28 sizeof() was: The Perfect Computer - 36 bits?
http://www.garlic.com/~lynn/2007i.html#23 John W. Backus, 82, Fortran developer, dies
http://www.garlic.com/~lynn/2007j.html#67 open source voting
http://www.garlic.com/~lynn/2009g.html#62 Solving password problems one at a time, Re: The password-reset paradox
http://www.garlic.com/~lynn/2009i.html#52 Credit cards
http://www.garlic.com/~lynn/2009n.html#71 Sophisticated cybercrooks cracking bank security efforts
http://www.garlic.com/~lynn/2009r.html#72 Why don't people use certificate-based access authentication?
http://www.garlic.com/~lynn/2010b.html#1 Korean bank Moves back to Mainframes (...no, not back)
http://www.garlic.com/~lynn/2010b.html#3 Korean bank Moves back to Mainframes (...no, not back)
http://www.garlic.com/~lynn/2010d.html#21 Credit card data security: Who's responsible?
http://www.garlic.com/~lynn/2010d.html#24 Cambridge researchers show Chip and PIN system vulnerable to fraud
http://www.garlic.com/~lynn/2010d.html#47 Industry groups leap to Chip and PIN's defence
http://www.garlic.com/~lynn/2010i.html#63 Wal-Mart to support smartcard payments
http://www.garlic.com/~lynn/2010k.html#7 taking down the machine - z9 series
http://www.garlic.com/~lynn/2010l.html#82 Five Theses on Security Protocols
http://www.garlic.com/~lynn/2010m.html#77 towards https everywhere and strict transport security (was: Has there been a change in US banking regulations recently?)
http://www.garlic.com/~lynn/2011b.html#60 A Two Way Non-repudiation Contract Exchange Scheme
http://www.garlic.com/~lynn/2012b.html#71 Password shortcomings
http://www.garlic.com/~lynn/2012d.html#62 Gordon Gekko Says
http://www.garlic.com/~lynn/2012j.html#35 The Conceptual ATM program
http://www.garlic.com/~lynn/2013e.html#10 The Knowledge Economy Two Classes of Workers
http://www.garlic.com/~lynn/2013f.html#8 What Makes an Architecture Bizarre?
http://www.garlic.com/~lynn/2013g.html#38 regulation,bridges,streams
http://www.garlic.com/~lynn/2013j.html#52 U.S. agents 'got lucky' pursuing accused Russia master hackers
http://www.garlic.com/~lynn/2013j.html#90 copyright protection/Doug Englebart
http://www.garlic.com/~lynn/2013m.html#17 Steve B sees what investors think
http://www.garlic.com/~lynn/2013m.html#20 Steve B sees what investors think
http://www.garlic.com/~lynn/2013o.html#58 US a laggard in adopting more secure credit cards
http://www.garlic.com/~lynn/2013o.html#60 Target Offers Free Credit Monitoring Following Security Breach
http://www.garlic.com/~lynn/2014b.html#69 Why is the US a decade behind Europe on 'chip and pin' cards?
http://www.garlic.com/~lynn/2014h.html#67 Sale receipt--obligatory?
http://www.garlic.com/~lynn/2014k.html#43 LA Times commentary:  roll out "smart" credit cards to deter fraud
http://www.garlic.com/~lynn/2014l.html#39 LA Times commentary:  roll out "smart" credit cards to deter fraud
http://www.garlic.com/~lynn/2015d.html#65 Western Union envisioned internet functionality
http://www.garlic.com/~lynn/2015f.html#6 Credit card fraud solution coming to America...finally
http://www.garlic.com/~lynn/2015f.html#7 Credit card fraud solution coming to America...finally
http://www.garlic.com/~lynn/2015f.html#17 Credit card fraud solution coming to America...finally
http://www.garlic.com/~lynn/2016h.html#104 PC Compromise and Internet Transactions

--
virtualization experience starting Jan1968, online at home since Mar1970

We the Corporations: How American Businesses Won Their Civil Rights

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: We the Corporations: How American Businesses Won Their Civil Rights
Date: 12 Apr 2018
Blog: Facebook

re:
http://www.garlic.com/~lynn/2018c.html#xx We the Corporations: How American Businesses Won Their Civil Rights

pg157/loc2581-86:

Charles Wallace Collins, a lawyer who also served for a time as the
law librarian for Congress and the Supreme Court, collected and
analyzed every Fourteenth Amendment case decided by the justices in
the nearly half-century since the provision's unorthodox
ratification. The court, he found, had heard 604 Fourteenth Amendment
cases between 1868 and 1912. A mere twenty-eight of those cases (less
than 5 percent) involved African Americans, the group whose plight
motivated the adoption of the amendment, and in nearly all of those
cases the racial minorities lost. More than half of all the Fourteenth
Amendment cases decided by the Supreme Court--312 in total--involved
corporations, which succeeded in striking down numerous laws
regulating business, including minimum wage laws, zoning laws, and
child labor laws.

pg229/loc3667-68:

IN THE TWENTIETH CENTURY, CORPORATIONS WON LIBERTY RIGHTS, SUCH AS
FREEDOM OF SPEECH AND RELIGION, WITH THE HELP OF ORGANIZATIONS LIKE
THE CHAMBER OF COMMERCE.

... snip ...

This is book written how (national) chamber of commerce around the
turn of this century became center of intensive congressional lobbying
(including ignoring the illegal worker issue) ... and it got so bad
that local chapters started divorcing themselves from the national
organization. "The Influence Machine: The U.S. Chamber of Commerce and
the Corporate Capture of American Life"
https://www.amazon.com/dp/B00NDTUDHA/

some background, in the mid-90s, First Data and First Financial were
in bidding war for take-over of Western Union and FDC drops out in
part because WU wasn't doing that well financially. Then later, FDC
and First Financial merge (and FDC has to spin off MoneyGram as part
of the merger). After the turn of the century there was explosion in
corporations bringing in illegal workers. This resulted in huge spike
in WU being used for illegal workers sending paychecks home. This was
so large that by 2005, WU revenue exploded to half of FDC's bottom
line (5yr period). Possibly in part because the president of Mexico
invited FDC executives to visit Mexico to be thrown in jail (for what
WU was charging), FDC spins off WU.

more "We the Corporations", pg245/loc3881-87:

The notion that corporations should devote themselves to maximizing
profits is often taken to be one of the bedrock principles of
corporate law and governance. In the early history of corporations,
however, business corporations were much different; as Blackstone
wrote in his Commentaries, corporations could only be formed if they
served public purposes. Today, in part because of the Dartmouth
College case, that rule no longer applies, and modern business
corporations are considered private entities that need not serve any
explicitly public objective.

... snip ...

inequality posts
http://www.garlic.com/~lynn/submisc.html#inequality

--
virtualization experience starting Jan1968, online at home since Mar1970

Famous paper on security and source code from the '60s or '70s

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Famous paper on security and source code from the '60s or '70s
Newsgroups: alt.folklore.computers
Date: Tue, 17 Apr 2018 11:25:27 -0700

no source code, there is the 74 multics airforce paper
https://csrc.nist.gov/csrc/media/publications/conference-paper/1998/10/08/proceedings-of-the-21st-nissc-1998/documents/early-cs-papers/karg74.pdf

--
virtualization experience starting Jan1968, online at home since Mar1970

Famous paper on security and source code from the '60s or '70s

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Famous paper on security and source code from the '60s or '70s
Newsgroups: alt.folklore.computers
Date: Tue, 17 Apr 2018 11:31:48 -0700

Anne & Lynn Wheeler <lynn@garlic.com> writes:

no source code, there is the 74 multics airforce paper
https://csrc.nist.gov/csrc/media/publications/conference-paper/1998/10/08/proceedings-of-the-21st-nissc-1998/documents/early-cs-papers/karg74.pdf

30 year later paper (at the time karger at watson and paper was at ibm
also, but since gone 404) ...
https://www.acsac.org/2002/papers/classic-multics.pdf

past refs:
http://www.garlic.com/~lynn/2002l.html#42 Thirty Years Later: Lessons from the Multics Security Evaluation
http://www.garlic.com/~lynn/2002p.html#13 Multics on emulated systems?
http://www.garlic.com/~lynn/2004j.html#41 Vintage computers are better than modern crap !
http://www.garlic.com/~lynn/2007f.html#25 The Perfect Computer - 36 bits?
http://www.garlic.com/~lynn/2007s.html#31 multics source is now open
http://www.garlic.com/~lynn/2008r.html#18 Comprehensive security?
http://www.garlic.com/~lynn/2009g.html#19 Top 10 Cybersecurity Threats for 2009, will they cause creation of highly-secure Corporate-wide Intranets?
http://www.garlic.com/~lynn/2009n.html#38 Cybersecurity Today: The Wild, Wild West
http://www.garlic.com/~lynn/2010j.html#61 Information on obscure text editors wanted
http://www.garlic.com/~lynn/2010j.html#63 Information on obscure text editors wanted
http://www.garlic.com/~lynn/2011b.html#15 History of copy on write
http://www.garlic.com/~lynn/2012d.html#59 A computer metaphor for systems integration
http://www.garlic.com/~lynn/2012g.html#5 What are the implication of the ongoing cyber attacks on critical infrastructure
http://www.garlic.com/~lynn/2012j.html#97 Gordon Crovitz: Who Really Invented the Internet?
http://www.garlic.com/~lynn/2013.html#29 Java Security?
http://www.garlic.com/~lynn/2013c.html#75 Still not convinced about the superiority of mainframe security vs distributed?
http://www.garlic.com/~lynn/2013h.html#35 Some Things Never Die
http://www.garlic.com/~lynn/2013i.html#11 EBCDIC and the P-Bit
http://www.garlic.com/~lynn/2013m.html#38 Quote on Slashdot.org
http://www.garlic.com/~lynn/2014f.html#10 It's all K&R's fault
http://www.garlic.com/~lynn/2014f.html#11 Before the Internet: The golden age of online services
http://www.garlic.com/~lynn/2014j.html#93 Demonstrating Moore's law

--
virtualization experience starting Jan1968, online at home since Mar1970

The IRS Really Needs Some New Computers

From: lynn@GARLIC.COM (Anne & Lynn Wheeler)
Subject: Re: The IRS Really Needs Some New Computers
Newsgroups: bit.listserv.ibm-main
Date: 17 Apr 2018 11:52:04 -0700

lists@AKPHS.COM (Phil Smith III) writes:

"Plans to replace the IMF with a twenty-first-century equivalent known as
CADE (Customer Account Data Engine) have faltered. The transition is now
well behind schedule. As a consequence, the likelihood of a catastrophic
computer failure during tax season increases with every passing year. That
may not pose quite the same danger as an errant missile, but the prospect of
lost refund checks, unnecessary audits, and other errors suggests that the
time has come to bring the IRS into the 21st century."

Because.of bitrot? C'mon. That graf is just stupid: ain't no catastrophic
failure coming because they're running old, well-tested code. SMH.

Wow, lattice of coincidence: after I hit SEND but before this went, I got
the following from a friend:

https://www.cnbc.com/2018/04/17/irs-tax-payment-site-down-as-agency-works-to
-resolve-issue.html

Insider news suggests catastrophic system failure.

Still not due to the software being old, though!

10-15yrs ago got brought in to look at some of it ... beltway bandits
had contracts for modernization projects ... where they had bunch of
newly minted graduates that went thru process classes on modern project
management and modern programming. There was huge amount of mainframe
assembler code that the beltway bandits never got to the point of
understanding and the projects failed.

however, there was article a decade ago about (mostly) dataprocessing
modernization projects where the beltway bandits had realized that they
made more money off a series of failures ... not just IRS but many other
gov. agencies
http://www.govexec.com/excellence/management-matters/2007/04/the-success-of-failure/24107/

part of it was beltway bandits and other gov. contractors were being
bought up by private-equity companies and were under heavy pressure to
cut corners every way possible as passing money up to their owners.
http://www.motherjones.com/politics/2007/10/barbarians-capitol-private-equity-public-enemy/

Lou Gerstner, former ceo of ibm, now heads the Carlyle Group, a
Washington-based global private equity firm whose 2006 revenues of $87
billion were just a few billion below ibm's. Carlyle has boasted George
H.W. Bush, George W. Bush, and former Secretary of State James Baker III
on its employee roster.

... snip ...

includes buying beltway bandit that will employee Snowden
... intelligence 70% of budget and over half the people
http://www.investingdaily.com/17693/spies-like-us

part of it is illegal to use gov. contract money for lobbying congress,
however private equity owners don't appear to be any such restrictions
(so PE operations could buy up beltway bandits and boost revenue with
lobbying).

success of failure posts
http://www.garlic.com/~lynn/submisc.html#success.of.failure
private equity posts
http://www.garlic.com/~lynn/submisc.html#private.equity
former AMEX president posts

http://www.garlic.com/~lynn/submisc.html#gerstner -- virtualization experience starting Jan1968, online at home since Mar1970

Prepare for the bankrupt government pension plans!

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Prepare for the bankrupt government pension plans!
Date: 17 Apr 2018
Blog: Facebook

Prepare for the bankrupt government pension plans!
https://fabiusmaximus.com/2018/04/17/bankruptcy-coming-for-government-pension-plans/

Oct2008 congressional hearings into the pivotal role that the rating
agencies played in the economic mess, had testimony that the rating
agencies were selling triple-A ratings on things that they knew
weren't worth triple-A. This allowed loan/mortgage originators to no
longer care about borrowers qualification or load quality (including
doing no-documentation, liar loans) because they could securitize, pay
for triple-A and unload into the bond market (including to operations
restricted to only dealing in "safe" investments, like the large
gov. pension funds, claims that as a result these pension funds took
avg. of 30% hit). The triple-A ratings were major factor in them being
able to do over $27T (trillion!) 2001-2008.

more trivia: from the law of unintended consequences ... spring 2008,
some investors realized that rating agencies were selling triple-A
(for things that weren't worth triple-A) and it might not be possible
to trust any ratings ... freezing the muni-bond market. Then Warren
Buffett steps in and starts offering insurance to unfreeze the market.

other trivia: there is constant, ongoing, non-stop saga how
(California) CalPERS invest their funds.
https://www.nakedcapitalism.com/?s=calpers

economic mess posts
http://www.garlic.com/~lynn/submisc.html#economic.mess
(triple-A rated) toxic CDOs posts
http://www.garlic.com/~lynn/submisc.html#toxic.cdo

--
virtualization experience starting Jan1968, online at home since Mar1970

America's War for the Greater Middle East: A Military History

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: America's War for the Greater Middle East: A Military History
Date: 17 Apr 2018
Blog: Facebook

America's War for the Greater Middle East: A Military History
https://www.amazon.com/Americas-War-Greater-Middle-East-ebook/dp/B0174PRIY4/

loc109-12:

The history that follows, an account of U.S. military efforts to
determine the fate and future of the Greater Middle East, is itself a
preliminary walk around, or through, a comparably large subject. If
nothing else, America's War for the Greater Middle East seeks to
reveal how remarkably far we have to go to understand what those
efforts have produced and what they have cost.

... snip ...

Last night rewatched first episode of Reilly, Ace of Spies on netflix
https://en.wikipedia.org/wiki/Reilly,_Ace_of_Spies

1901, he has stolen Russia oil surveys and brought them back England ... the Navy was really interested in the middle east oil.

The World Crisis, Vol. 1, Churchill explains the mess in middle east started before WW1, in 1910 with move from 13.5in to 15in guns (which requires moving from coal to oil), loc2012-14:

From the beginning there appeared a ship carrying ten 15-inch guns,
and therefore at least 600 feet long with room inside her for engines
which would drive her 21 knots and capacity to carry armour which on
the armoured belt, the turrets and the conning tower would reach the
thickness unprecedented in the British Service of 13 inches.

loc2087-89:

To build any large additional number of oil-burning ships meant basing
our naval supremacy upon oil. But oil was not found in appreciable
quantities in our islands. If we required it, we must carry it by sea
in peace or war from distant countries.

loc2151-56:

This led to enormous expense and to tremendous opposition on the Naval
Estimates. Yet it was absolutely impossible to turn back. We could
only fight our way forward, and finally we found our way to the
Anglo-Persian Oil agreement and contract, which for an initial
investment of two millions of public money (subsequently increased to
five millions) has not only secured to the Navy a very substantial
proportion of its oil supply, but has led to the acquisition by the
Government of a controlling share in oil properties and interests
which are at present valued at scores of millions sterling, and also
to very considerable economies, which are still continuing, in the
purchase price of Admiralty oil.

... snip ...

Iran elected leader was going to review the Anglo-Persian contracts
... CIA Confirms Role in 1953 Iran Coup
http://nsarchive.gwu.edu/NSAEBB/NSAEBB435/
including
https://en.wikipedia.org/wiki/Kermit_Roosevelt,_Jr.
in
https://en.wikipedia.org/wiki/1953_Iranian_coup_d%27%C3%A9tat
and to help keep the shah in power, US (including Norman Schwarzkopf senior) trained
https://en.wikipedia.org/wiki/SAVAK
Savak Agent Describes How He Tortured Hundreds
https://www.nytimes.com/1979/06/18/archives/savak-agent-describes-how-he-tortured-hundreds-trial-is-in-a-mosque.html

CIA director Colby refuses to approve "Team B" analysis claiming huge
Russian military capability, justifying huge US military spending
increase.
https://en.wikipedia.org/wiki/Team_B
White House Chief of Staff Rumsfeld replaces Colby with somebody
(Bush1) that will agree with "Team B" analysis. Rumsfeld then resigns
to become SECDEF (and is replaced by his assistant Cheney). In the
80s, Bush1 is VP and Rumsfeld is involved in supporting Iraq.
http://en.wikipedia.org/wiki/Iran%E2%80%93Iraq_War
including WMDs (note picture of Rumsfeld with Saddam)
http://en.wikipedia.org/wiki/United_States_support_for_Iraq_during_the_Iran%E2%80%93Iraq_war

In the early 90s, Bush1 is president and Cheney is SECDEF. Sat. photo
recon analyst told white house that Saddam was marshaling forces to
invade Kuwait. White house said that Saddam would do no such thing and
proceeded to discredit the analyst. Later the analyst informed the
white house that Saddam was marshaling forces to invade Saudi Arabia,
now the white house has to choose between Saddam and the Saudis.
http://www.amazon.com/Long-Strange-Journey-Intelligence-ebook/dp/B004NNV5H2/

This century, Bush2 is president, Cheney is VP, Rumsfeld is SECDEF and
one of the "Team B" members is deputy SECDEF (and major architect of
Iraq policy).
https://en.wikipedia.org/wiki/Paul_Wolfowitz

Originally the invasion was justified on Iraq supporting Al Qaeda and
it would only cost $50B (now heading for 100 times that). That was
then changed to WMDs. last decade before invasion, cousin of white
house chief of staff Card ... was dealing with the Iraqis at the UN
and was given evidence that WMDs (tracing back to US in the Iran/Iraq
war) had been decommissioned. the cousin shared it with Card, Powell
and others ... then is locked up in military hospital, book was
published in 2010 (before decommissioned WMDs were declassified)
http://www.amazon.com/EXTREME-PREJUDICE-Terrifying-Story-Patriot-ebook/dp/B004HYHBK2/

NY Times series from 2014, the decommission WMDs (tracing back to US
from Iran/Iraq war), had been found early in the invasion, but the
information was classified for a decade
http://www.nytimes.com/interactive/2014/10/14/world/middleeast/us-casualties-of-iraq-chemical-weapons.html

reference about supporting petro-dollars
https://www.irishexaminer.com/viewpoints/yourview/petro-dollar-at-heart-of-wars-374398.html
http://www.businessinsider.com/libya-all-about-oil-or-all-about-banking-2011-4
https://www.counterpunch.org/2015/02/03/the-sanctions-of-mass-destruction/
https://www.zerohedge.com/contributed/are-middle-east-wars-really-about-forcing-world-dollars-and-private-central-banking
http://www.atimes.com/atimes/Middle_East/MD14Ak02.html
http://www.truth-out.org/opinion/item/842:the-libyan-war-american-power-and-the-decline-of-the-petrodollar-system
https://www.globalresearch.ca/the-real-reason-russia-is-demonized-and-sanctioned-the-american-petrodollar/5402592

and/or wanted the oil
https://amityunderground.com/15-years-after-the-invasion-of-iraq-and-now-largely-out-of-the-glare-of-the-media-us-and-uk-oil-corporations-start-to-flaunt-the-spoils-of-imperial-conquest-bp-rumaila-oil-field-extraction-contract-jo/

WMD posts
http://www.garlic.com/~lynn/submisc.html#wmd
Team-B posts
http://www.garlic.com/~lynn/submisc.html#team.b
military-industrial(-congressional) complex posts
http://www.garlic.com/~lynn/submisc.html#military.industrial.complex

--
virtualization experience starting Jan1968, online at home since Mar1970

11 crazy up-close photos of the F-22 Raptor stealth fighter jet soaring through the air

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: 11 crazy up-close photos of the F-22 Raptor stealth fighter jet soaring through the air
Date: 17 Apr 2018
Blog: Facebook

11 crazy up-close photos of the F-22 Raptor stealth fighter jet
soaring through the air
http://www.businessinsider.com/f-22-raptor-fighter-jet-photos-2018-4

One could make a case for the F-35 being superior to the F-22, but
they are ultimately different kinds of aircraft. The F-35 is more of a
bomber and a reconnaissance jet, whereas the F-22 is a stealthier
fighter and more maneuverable.

... snip ...

A Second Look - Aviation Week Debate on the F-35
http://rememberedsky.com/?p=1753
Airpower Analysis Phase II: F-35
http://rememberedsky.com/?p=1667

DoD watchdog: Air Force failed to effectively manage F-22
modernization
https://www.defensenews.com/air/2018/03/27/dod-watchdog-air-force-failed-to-effectively-manage-f-22-modernization-program/

For F-22, military-industrial complex spread development out into
every congressional district ... trying to bring all the pieces
together resulted in quality collapse.
http://nypost.com/2009/07/17/cant-fly-wont-die/

2016, 100th Boeing celebration produced publication ... one of the
articles was that the merger with M/D nearly brought down the company
and may yet still. They had claimed that doing standard MIC spreading
pieces all over the world would drastically reduce costs and
development time .... but it did the exact opposite.
https://issuu.com/pnwmarketplace/docs/i20160708144953115

May work for commodity parts where everything is already totally
understood. Doing it for brand new innovation and then bringing them
together runs into all sorts of gotchas ... whether it is hardware or
software.

F-22 constant LO restoration
http://www.tyndall.af.mil/News/Features/Display/Article/669883/lo-how-the-f-22-gets-its-stealth/
more problems
http://aviationweek.com/air-combat-safety/us-air-force-tackles-repair-f-22-stealth-coating
and
http://nationalinterest.org/blog/the-buzz/the-big-problem-americas-stealth-f-22-raptor-america-cant-19420

F35 was designed as cost reduced bomb truck assuming F22 was flying
cover to handle threats. F35 primarily focused on stealth from the
front downward angle (i.e. enemy ground radar that was bomb target).
Comparison analysis of F35 with other planes
http://www.ausairpower.net/jsf.html
has analysis of F35 radar signature at different radar frequencies
involving different angles and portions of the frame (lots to say
about how cost reduced and compromised stealth compared to original
design)
http://www.ausairpower.net/APA-2009-01.html

this is 2011 tutorial on radar (including military) but says it needs
3tflops for really advanced (like military track/target stealth, which
was beyond 2011 processing)

2011 tutorial on DSP, FFT, Radar (part 3)
https://www.eetimes.com/document.asp?doc_id=1278838
STAP (part 4)
https://www.eetimes.com/document.asp?doc_id=1278878
SAR (part 5)
https://www.eetimes.com/document.asp?doc_id=1278931

latest (2016) international IEEE Radar conference, Guangzhou, China,
papers
http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8051143

There are claims that processing by latest generation of digital
signal processing chips can reduce the number of transmit/receive
pairs in APG-77/79/81/83 by nearly two orders magnitude w/o loss of
capability

significant advances in digital power and processing spurred by
autonomous vehicles, but also useful for military radar (2017 320
t-ops/sec, 100 times 2011 reference).
https://www.fastcompany.com/40479260/nvidia-debuts-a-new-supercomputer-to-power-robotic-taxis-and-delivery-trucks

related computer tech, much of the computers for supercomputers also
used for radar, missile guidance, autonomous vehicles

America Just Can't Match China's Exploding Supercomputing Power
https://www.technologyreview.com/the-download/609468/america-just-cant-match-chinas-exploding-supercomputing-power/
TECH SUPERCOMPUTERS; China Now Has More Supercomputers Than Any Other Country
http://time.com/5022859/china-most-supercomputers-world/
America second? Yes, and China's lead is only growing
https://www.bostonglobe.com/opinion/2017/05/21/america-second-yes-and-china-lead-only-growing/7G6szOUkTobxmuhgDtLD7M/story.html
China's Tsinghua University dethroned MIT (above) as the top engineering university in the world in 2015
https://www.bostonglobe.com/opinion/2017/05/21/america-second-yes-and-china-lead-only-growing/7G6szOUkTobxmuhgDtLD7M/story.html

military-industrial complex and the perpetual war forces, perpetual
war posts
http://www.garlic.com/~lynn/submisc.html#perpetual.war
military-industrial(-congressional) complex posts
http://www.garlic.com/~lynn/submisc.html#military.industrial.complex

China May Have Solved the One Thing That Was Poised to Stop Its
Military Rise
http://nationalinterest.org/blog/the-buzz/chinas-may-have-solved-the-one-thing-was-poised-stop-its-24149
Chinese engineering has become so advanced that German jet engines
could soon get a major boost from China.

Officials in China have begun talks to sell sophisticated aerospace
technology and manufacturing equipment to Germany for the production
of high-performance jet engines.

... snip ...

Let's Face It--It's the Cyber Era and We're Cyber Dumb; Got to get
educated before we can defeat Internet threats
https://medium.com/war-is-boring/30a00a8d29ad
Report: China gained U.S. weapons secrets using cyberespionage
http://www.cnn.com/2013/05/28/world/asia/china-cyberespionage/
Confidential report lists U.S. weapons system designs compromised by
Chinese cyberspies
https://www.washingtonpost.com/world/national-security/confidential-report-lists-us-weapons-system-designs-compromised-by-chinese-cyberspies/2013/05/27/a42c3e1c-c2dd-11e2-8c3b-0b5e9247e8ca_story.html
REPORT: Chinese Hackers Stole Plans For Dozens Of Critical US Weapons
Systems
http://www.businessinsider.com/china-hacked-us-military-weapons-systems-2013-5
A list of the U.S. weapons designs and technologies compromised by
hackers
https://www.washingtonpost.com/world/national-security/a-list-of-the-us-weapons-designs-and-technologies-compromised-by-hackers/2013/05/27/a95b2b12-c483-11e2-9fe2-6ee52d0eb7c1_story.html

they have little or no penalty for the breaches ... and higher threat
opponents motivates larger appropriations

posts mentioning data breach notification
http://www.garlic.com/~lynn/submisc.html#data.breach.notification

some recent cyberdumb posts:
http://www.garlic.com/~lynn/2016b.html#4 Cyberdumb
http://www.garlic.com/~lynn/2016b.html#8 Cyberdumb
http://www.garlic.com/~lynn/2016b.html#19 Does Cybercrime Really Cost $1 Trillion?
http://www.garlic.com/~lynn/2016b.html#20 DEC and The Americans
http://www.garlic.com/~lynn/2016b.html#91 Computers anyone?
http://www.garlic.com/~lynn/2016b.html#95 Computers anyone?
http://www.garlic.com/~lynn/2016f.html#104 How to Win the Cyberwar Against Russia
http://www.garlic.com/~lynn/2016h.html#0 Snowden
http://www.garlic.com/~lynn/2016h.html#28 China's spies gain valuable US defense technology: report
http://www.garlic.com/~lynn/2016h.html#67 "I used a real computer at home...and so will you" (Popular Science May 1967)
http://www.garlic.com/~lynn/2017c.html#15 China's claim it has 'quantum' radar may leave $17 billion F-35 naked
http://www.garlic.com/~lynn/2017c.html#34 CBS News: WikiLeaks claims to release thousands of CIA documents of computer activity
http://www.garlic.com/~lynn/2017c.html#47 WikiLeaks CIA Dump: Washington's Data Security Is a Mess
http://www.garlic.com/~lynn/2017e.html#50 A flaw in the design; The Internet's founders saw its promise but didn't foresee users attacking one another
http://www.garlic.com/~lynn/2017e.html#73 More Cyberdumb
http://www.garlic.com/~lynn/2017e.html#77 Time to sack the chief of computing in the NHS?
http://www.garlic.com/~lynn/2017g.html#78 This Afghan War Plan By The Guy Who Founded Blackwater Should Scare The Hell Out Of You
http://www.garlic.com/~lynn/2017i.html#51 Russian Hackers Stole NSA Data on U.S. Cyber Defense
http://www.garlic.com/~lynn/2017i.html#56 China's mega fortress in Djibouti could be model for its bases in Pakistan
http://www.garlic.com/~lynn/2017j.html#44 Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core
http://www.garlic.com/~lynn/2018.html#69 The Next New Military Specialty Should Be Software Developers
http://www.garlic.com/~lynn/2018b.html#86 Lawmakers to Military: Don't Buy Another 'Money Pit' Like F-35
http://www.garlic.com/~lynn/2018b.html#112 How China Pushes the Limits on Military Technology Transfer
http://www.garlic.com/~lynn/2018c.html#26 DoD watchdog: Air Force failed to effectively manage F-22 modernization

--
virtualization experience starting Jan1968, online at home since Mar1970

Famous paper on security and source code from the '60s or '70s

From: Anne & Lynn Wheeler <lynn@garlic.com>
Subject: Re: Famous paper on security and source code from the '60s or '70s
Newsgroups: comp.arch
Date: Wed, 18 Apr 2018 09:58:53 -0700

MitchAlsup <MitchAlsup@aol.com> writes:

The Burroughs machines would only allow code generated from its compilers
to run on its machines.


recent afc posts
http://www.garlic.com/~lynn/2018c.html#55 Famous paper on security and source code from the '60s or '70s
http://www.garlic.com/~lynn/2018c.html#56 Famous paper on security and source code from the '60s or '70s

mid-70s, the 801 group gave a talk on risc design (where we gave a talk
on 16-way SMP 370). they talked about simplifying and/or eliminating all
sorts of hardware features ... and the lack would be compensated by
software. Virtual Memory was handled by inverted tables and sixteen
segment registers (segment number value was in segment register). I
raised the issue of needing lot more segment. They said that there was
no hardware protection domain ... and inline (library) code could change
segment register values as easily as code could change general register
values. Protection would be accomplished by the compiler only generating
correct code ... and the system would only load correct executable code
from correct compiler.

later there was the (801/risc) ROMP chip with the PL.8 compiler and the
CP.r operating system ... and was going to be used for the displaywriter
followon. when that was canceled they decided to retarget the machine
for the unix workstation market. However, running (C &) unix met that
the hardware had to have traditional protection mechanism ... and then
of course, the limited number of segments came back to bite. This was
announced as PC/RT with AIX.

ROMP was 32 bit virtual addresses (with inverted tables), first four
bits selected segment register that had 12bit segment number (for 28bit,
256mbyte segments) ... which they then talked about 40bit virtual
address machine (12bit segment number plus 28bit segment
displacement). Later for RIOS (RS/6000) they were still talking about
52bit virtual addressing, the segment value had been doubled from 12bit
to 24bit (24bit segment number plus 28bit segment displacement) ... but
the part of application software being able to do inline change of
segment register values was not part of the unix protection/security.

801/risc, iliad, romp, rios, etc posts
http://www.garlic.com/~lynn/subtopic.html#801

there is the 74 multics paper
https://csrc.nist.gov/csrc/media/publications/conference-paper/1998/10/08/proceedings-of-the-21st-nissc-1998/documents/early-cs-papers/karg74.pdf
and the 30yrs later paper
https://www.acsac.org/2002/papers/classic-multics.pdf

I "liked" (found interesting) the part about no known cases of buffer
overflow which has become epidemic in C-language software. past posts
http://www.garlic.com/~lynn/subintegrity.html#overflow

--
virtualization experience starting Jan1968, online at home since Mar1970






previous, index - home