Collected Postings

2016- Collected Postings, 2013-2015 Collected Postings, 2011-2012 Collected Postings, 2009-2010 Collected Postings, 2007-2008 Collected Postings, 2005-2006 Collected Postings, 2003-2004 Collected Postings, 2001-2002 Collected Postings, 1993-2000 Collected Postings,
Misc. Topic Organization -- Internet History Postings -- Old Email

Usenet Postings by year

2008: p19, p18, p17, p16, p15, p14, p13, p12, p11, p10, p9, p8, p7, p6, p5, p4, p3, p2, p1
2007: p22, p21, p20, p19, p18, p17, p16, p15, p14, p13, p12, p11, p10, p9, p8, p7, p6, p5, p4, p3, p2, p1
2006: p25, p24, p23, p22, p21, p20, p19, p18, p17, p16, p15, p14, p13, p12, p11, p10, p9, p8, p7, p6, p5, p4, p3, p2, p1
2005: p22, p21, p20, p19, p18, p17, p16, p15, p14, p13, p12, p11, p10, p9, p8, p7, p6, p5, p4, p3, p2, p1,
2004: p17, p16, p15, p14, p13, p12, p11, p10, p9, p8, p7, p6, p5, p4, p3, p2, p1,
2003: p16, p15, p14, p13, p12, p11, p10, p9, p8, p7, p6, p5, p4, p3, p2 p1
2002: p17, p16, p15, p14, p13, p12, p11, p10, p9, p8, p7, p6, p5, p4, p3, p2, p1
2001: p14, p13, p12, p11, p10, p9, p8, p7, p6, p5, p4, p3, p2, p1
2000: p7, p6, p5, p4, p3, p2, p1
1999 - 1998 - 1997 - 1996 - 1995 - 1994 - 1993

Current Postings by Subject

Network related postings - (also 2005-2006) - (also 2003-2004) - (also 2001-2002) - (also 1993-2000)
Mainframe related postings - (also 2005-2006) - (also 2003-2004) - (also 2001-2002) - (also 1993-2000)
Digital Signature & Standards - (also 2005-2006) - (also 2003-2004) - (also 2001-2002) - (also 1993-2000)
All postings - (also 2005-2006) - (also 2003-2004) - (also 2001-2002) - (also 1993-2000)
- home

Network related postings (2007-2008)

"Telecommunications" from '85
"True" story of the birth of the IBM PC
1975 movie "Three Days of the Condor" tech stuff
307 digit number factored
American Airlines
An old fashioned Christmas
Ancient Apple
Ancient Apple
ANN: Microsoft goes Open Source
Annoying Processor Pricing
ANT Censuses of the Internet Address Space
Anyone know of some good internet Listserv's?
Are there tasks that don't play by WLM's rules
Are there tasks that don't play by WLM's rules
Are we approaching a "tipping point" with regard to business travel?
ARPANet architect: bring "fairness" to traffic management
Attack on Brit retail payments -- some takeways
Authentication in the e-tailer / payment gateway / customer triangle
Authentication in the e-tailer / payment gateway / customer triangle
Authentication in the e-tailer / payment gateway / customer triangle
Barbless
Barbless
Baudot code direct to computers?
Being "Open" (Was: Mainframe vs. "Server")
Best practices for software delivery
Blinkylights
Blinkylights
Boffins bust web authentication with game consoles
Book: "Everyone Else Must Fail" --Larry Ellison and Oracle???
Browser Security UI: the horns of the dilemma
Builders v. Breakers
Builders V. Breakers
CA to IBM TCP Conversion
Can individual TCP packets travel along different route or ...?
CHROME and WEB apps on Mainframe?
CHROME and WEB apps on Mainframe?
CHROME and WEB apps on Mainframe?
Clickjacking -- the new browser wipe-out
CLIs and GUIs
CLIs and GUIs
Coming soon: superfast internet
Comprehensive security?
Comprehensive security?
CompUSA to Close after Jan. 1st 2008
Convergent Technologies vs Sun
Convergent Technologies vs Sun
Could you please tell me about RADIUS authentication and how it works?
Crypto Related Posts
Damn
Damn
Damn
Damn
Dealing with the neew MA ID protection law
Death of antivirus software imminent
Dilbert is non-fiction
Discussions areas, private message silos, and how far we've come since 199x
Discussions areas, private message silos, and how far we've come since 199x
Discussions areas, private message silos, and how far we've come since 199x
Discussions areas, private message silos, and how far we've come since 199x
Discussions areas, private message silos, and how far we've come since 199x
dnssec?
Does anyone know of a documented case of VM being penetrated by hackers?
Does ARP Belong to Layer 2 Or Layer 3 OSI Reference Model???
Does socket represent an interface between ...?
Does socket represent an interface between ...?
Does TCP Need an Overhaul?
Dutch Transport Card Broken
Dutch Transport Card Broken
Early commercial Internet activities (Re: IBM-MAIN longevity)
EPIC, Ending Piracy of Integrated Circuits
Even worse than UNIX
Fast and Safe C Strings: User friendly C macros to Declare and use C Strings
Fast and Safe C Strings: User friendly C macros to Declare and use C Strings
Fast and Safe C Strings: User friendly C macros to Declare and use C Strings
FastTCP Commercialized Into An FTP Appliance
FICON tape drive?
Fixing our fraying Internet infrastructure
Fixing our fraying Internet infrastructure
Fixing our fraying Internet infrastructure
Fixing US broadband: $100 billion for fiber to every home
folklore indeed
folklore indeed
folklore indeed
folklore indeed
Friday musings on the future of 3270 applications
Govt demands password to personal computer
Govt demands password to personal computer
Grilled Turkey
Happy 20th Birthday, AS/400
Hi all Need help in TCP/IP stack Rfcs
Homebanking authentication methods: what's being used by your bank?
How did http get a port number as low as 80?
How did http get a port number as low as 80?
How did http get a port number as low as 80?
How fast is XCF
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How the Internet took over
How to tell a fake SSL certificate from a real one
How to tell a fake SSL certificate from a real one
How were you using the internet 10 years ago and how does that differ from how you use it today?
Human error tops the list of security threats
IBM 360 Model 20 Questions
IBM mainframe history, was Floating-point myths
IBM System/3 & 3277-1
IBM THINK original equipment sign
IBM to the PCM market(the sky is falling!!!the sky is falling!!)
IBM to the PCM market
IBM's Webbie World
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
Industry Standard Time To Analyze A Line Of Code
Information Security Vs. Businesss Resilience
information utility
Interesting ibm about the myths of the Mainframe
Interesting ibm about the myths of the Mainframe
internet game history
internet game history
IPv6 vs Y2K and GOSIP
Is computer history taugh now?
Is computer history taugh now?
Is computer history taugh now?
Is computer history taugh now?
Is computer history taugh now?
Is computer history taught now?
Is computer history taught now?
Is Parallel Programming Just Too Hard?
Is SUN going to become x86'ed??
Is SUN going to become x86'ed??
Is SUN going to become x86'ed??
Is SUN going to become x86'ed??
Is SUN going to become x86'ed??
Is SUN going to become x86'ed??
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
Kernels
Linux zSeries questions
Linux zSeries questions
Linux: The Completely Fair Scheduler
Lynn - You keep using the term "we" - who is "we"?
Mainframe programming vs the Web
MAINFRAME Training with IBM Certification and JOB GUARANTEE
MAINFRAME Training with IBM Certification and JOB GUARANTEE
MAINFRAME Training with IBM Certification and JOB GUARANTEE
MAINFRAME Training with IBM Certification and JOB GUARANTEE
Mainframe vs. "Server" (Was Just another example of mainframe
Memories of ACC, IBM Channels and Mainframe Internet Devices
Memory Mapped Vs I/O Mapped Vs others
Memory Mapped Vs I/O Mapped Vs others
Metcalfe Pitches Terabit Ethernet
Migration from Mainframe to othre platforms - the othe bell?
more on (the new 40+ yr old) virtualization
My Dream PC -- Chip-Based
Nerdy networking kid crashes the party
New test attempt
New test attempt
newbie need help (ECC and wireless)
Newbie question on table design
Newbie question on table design
Newsweek article--baby boomers and computers
Next Generation Security
nouns and adjectives
nouns and adjectives
nouns and adjectives
nouns and adjectives
nouns and adjectives
nouns and adjectives
NSFNET (long post warning)
NSFnet -- 20 Years of Internet Obscurity and Insight
old internal network references
old tapes
OSI abandoned!
OSI abandoned!
Palestine (was 1975 movie "Three Days of the Condor"
Palestine (was 1975 movie "Three Days of the Condor"
Palestine (was 1975 movie "Three Days of the Condor"
pc/370
Perfect MITM Attacks With No-Check SSL
Problem with TCP connection close
Public Computers
Question on Network Security
Really stupid question about z/OS HTTP server
recent mentions of 40+ yr old technology
Remembering the CDC 6600
Researcher: Info overload costs economy
Rotary phones
Rotary phones
Rotary phones
RTFM - IETF RFCs
Should a national regulatory authority stimulate deployment of IPv6?
should I encrypt over a private network?
Should online transactions be allowed on credit cards without adequate safeguards?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
some old network related discussion
squirrels
SSH protocol analyzer
SSL (https, really) accelerators for Linux/Apache?
SSL vs. SSL over tcp/ip
strange FTP problem--transatlantic asymmetry
Superconductors and computing
Sustainable Web
System z10 announcement (in English)
T.J. Maxx data theft worse than first reported
Tap and faucet and spellcheckers [was: Re: What do YOU call
Tap and faucet and spellcheckers
Telecommuniting and teleworking
The Complete April Fools' Day RFCs
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Economic Impact of Stimulating Broadband Nationally
The Economic Impact of Stimulating Broadband Nationally
The First 100 Dot Coms Ever Registered
The First 100 Dot Coms Ever Registered
The history of Structure capabilities
The human plague
The Internet's 100 Oldest Dot-Com Domains
The Internet's 100 Oldest Dot-Com Domains
The Internet's 100 Oldest Dot-Com Domains:
The One True Identity -- cracks being examined, filled, and rotted out from the inside
The original telnet specification?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The PKC-only application security model
The top 10 dead (or dying) computer skills
To what extent do IP networks meet the stringent requirements of High Availability (HA) where the target performance is 99.999%? What performance is obtained in practice
Top 10 vulnerabilities for service orientated architecture?
TOPS-10
Two views of Microkernels (Re: Kernels
Two views of Microkernels (Re: Kernels
Two views of Microkernels (Re: Kernels
US or China?
Usenet - Dead? Why?
user level TCP implementation
user level TCP implementation
Using rexx to send an email
Using rexx to send an email
Using rexx to send an email
V2X2 vs. Shark (SnapShot v. FlashCopy)
Verifying Verified By Visa - Registration breaks chain of trust
Virtual private networks
Virtual water cooler
Virtualization still hot, death of antivirus software imminent
VTAM R.I.P. -- SNATAM anyone?
Wachovia Bank web site
Wachovia Bank web site
Was CMS multi-tasking?
We're losing the battle
We're losing the battle
Web Security hasn't moved since 1995
Web Security hasn't moved since 1995
Welcome to Rain Matrix: The Cloud Computing Network
Welcome to Rain Matrix: The Cloud Computing Network
What do ATMS and card readers use?
What do YOU call the # sign?
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
What I miss in my OS
What if there were two Internets?
What if there were two Internets?
What if there were two Internets?
What if phone company had developed Internet?
What if phone company had developed Internet?
What if phone company had developed Internet?
What if phone company had developed Internet?
What if phone company had developed Internet?
What if phone company had developed Internet?
What if phone company had developed Internet?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
what is the difference between web server and application server?
What is the level of security in payment systems (credit and bank cards) nowadays?
whiny question: Why won't z/OS support the HMC 3270 emulator
Whitehouse Emails Were Lost Due to "Upgrade"
Why Is Less Than 99.9% Uptime Acceptable?
Why Ping Requires RAW Sockets?
Windows Live vs Kerberos
windows time service
windows time service
windows time service
Windows: Monitor or CUSP?
Windows: Monitor or CUSP?
Xephon, are they still in business?
Xephon, are they still in business?
Yet another squirrel question - Results (very very long post)
z/OS BIND9 DNS Vulnerable to Cache Poisoning Attack Problem?
z/OS BIND9 DNS Vulnerable to Cache Poisoning Attack Problem?

back to top, network - (2005-2006), - (2003-2004), - (2001-2002), - (1993-2000), mainframe, digsig, all

Mainframe related postings (2007-2008)

"Telecommunications" from '85
"The Register" article on HP replacing z
"True" story of the birth of the IBM PC
2 byte interface
2007s.html#9 Poster of computer hardware events?
2008i.html#102 OS X Finder windows vs terminal window weirdness
21st Century ISA goals?
21st Century ISA goals?
21st Century ISA goals?
21st Century ISA goals?
21st Century ISA goals?
21st Century ISA goals?
2741s, was Even worse than UNIX
3277 terminals and emulators
3277 terminals and emulators
3350 failures
3350 failures
3350 failures
360/30 memory
40 yrs of cp67 and cms
64 gig memory
64 gig memory
64 gig memory
64 gig memory
6400 impact printer
6400 impact printer
[ClassicMainframes] multics source is now open
A Blast from the Past
a little dbms folklore
A question for the Wheelers - Diagnose instruction
A question for the Wheelers - Diagnose instruction
A tribute to Jim Gray
A way to speed up level 1 caches
A way to speed up level 1 caches
Abend S0C0
Abend S0C0
Abend S0C0
ACP/TPF
ACP/TPF
ACP/TPF
Addressing Scheme with 64 vs 63 bits
Age of IBM VM
Age of IBM VM
Amazon's "Simple" Database
American Airlines
American Airlines
American Airlines
American Airlines
American Airlines
American Airlines
An old fashioned Christmas
An old fashioned Christmas
An old fashioned Christmas
Ancient Apple
ANN: Microsoft goes Open Source
ANN: Microsoft goes Open Source
Anniversaries
Annoying Processor Pricing
Annoying Processor Pricing
Another "migration" from the mainframe
Another "migration" from the mainframe
Another "migration" from the mainframe
Another difference between platforms
Another difference between platforms
another one biting the dust?
Any benefit to programming a RISC processor by hand?
Any benefit to programming a RISC processor by hand?
Any benefit to programming a RISC processor by hand?
Anyone know much about z/VM?
Anyone still have access to VMTOOLS and TEXTTOOLS?
APL
APL
APL
Are there tasks that don't play by WLM's rules
Are there tasks that don't play by WLM's rules
Attractive Alternatives to Mainframes
authoritative IEFBR14 reference
authoritative IEFBR14 reference
Automation is still not accepted to streamline the business processes... why organizations are not accepting newer technologies?
Barbless
Barbless
Batch job to perform sftp transfer
Baudot code direct to computers?
Baudot code direct to computers?
Baudot code direct to computers?
Baudot code direct to computers?
Baudot code direct to computers?
Being "Open" (Was: Mainframe vs. "Server")
Berkeley researcher describes parallel path
Beyond multicore
BITNET & LISTSERV
Blinkylights
Book: "Everyone Else Must Fail" --Larry Ellison and Oracle???
Book: "Everyone Else Must Fail" --Larry Ellison and Oracle???
Book: "Everyone Else Must Fail" --Larry Ellison and Oracle???
Bulkiest removable storage media?
CA ESD files Options
CA ESD files Options
CA ESD files Options
CA ESD files Options
CA ESD files Options
CA ESD files Options
CA to IBM TCP Conversion
CA to IBM product swap
Call for XEDIT freaks, submit ISPF requirements
Can outsourcing be stopped?
Can SSL sessions be compromised?
Capacity and Relational Database
Capacity and Relational Database
Capacity and Relational Database
CHROME and WEB apps on Mainframe?
CHROME and WEB apps on Mainframe?
CHROME and WEB apps on Mainframe?
CHROME and WEB apps on Mainframe?
CHROME and WEB apps on Mainframe?
CHROME and WEB apps on Mainframe?
CLIs and GUIs
CLIs and GUIs
CLIs and GUIs
CLIs and GUIs
CLIs and GUIs
CMS (PC Operating Systems)
Code Page 1047 vs 037 - Green card confusion
Combining VM list threads
complicated address generation unit?
Comprehensive security?
Comprehensive security?
Comprehensive security?
Computer Clocks
Computer History Museum
Computer History Museum
Computer History Museum
Computer History Museum
Computer History Museum
Computer History Museum
Computer History Museum
Computer Science Education: Where Are the Software Engineers of Tomorrow?
conformance
conformance
Controlling COBOL DDs named SYSOUT
Costing for IT Services
cp67 announced 40 yrs ago at spring 68 share in houston
CPU time differences for the same job
CPU time differences for the same job
CPU time differences for the same job
CPU time differences for the same job
CPU time differences for the same job
CPU time differences for the same job
CPU time differences for the same job
CPU time differences for the same job
CPU time/instruction table
Crippleware: hardware examples
Crippleware: hardware examples
Crippleware: hardware examples
Crypto Related Posts
Crypto Related Posts
CSA 'above the bar'
CSA 'above the bar'
CSA 'above the bar'
CSA 'above the bar'
CSA 'above the bar'
CSA 'above the bar'
CSA 'above the bar'
Curiousity: largest parallel sysplex around?
Curiousity: largest parallel sysplex around?
Curiousity: largest parallel sysplex around?
Current Officers
Cycles per ASM instruction
Cycles per ASM instruction
Cycles per ASM instruction
Cycles per ASM instruction
Cycles per ASM instruction
DASD or TAPE attached via TCP/IP
DASD or TAPE attached via TCP/IP
Data Areas Manuals to be dropped
DB2 & z/OS Dissertation Research
DB2 25 anniversary
DB2 25 anniversary: Birth Of An Accidental Empire
Death of antivirus software imminent
DEC and news groups
DEC and news groups
DEC and news groups
Default Search Engines are dangerous, Especially Google <- Domain Name Stealers
Did early Oracle run on the IBM mainframe?
Different Implementations of VLIW
Different Implementations of VLIW
Different Implementations of VLIW
Direction of Stack Growth
Direction of Stack Growth
Direction of Stack Growth
Direction of Stack Growth
Disc Drives
Disc Drives
Discussions areas, private message silos, and how far we've come since 199x
Discussions areas, private message silos, and how far we've come since 199x
Discussions areas, private message silos, and how far we've come since 199x
Disk drive improvements
Disk drive improvements
Disk drive improvements
Disk drive improvements
Display Technologies Evolution
Distributed Computing
Distributed Computing
distributed lock manager
distribution methods
Diversity ( was Re: Usefulness of bidirectional read/write?)
Does anyone know of a documented case of VM being penetrated by hackers?
Does anyone know of a documented case of VM being penetrated by hackers?
Does anyone know of a documented case of VM being penetrated by hackers?
Does anyone have any IT data center disaster stories?
Does software life begin at 40? IBM updates IMS database
Does software life begin at 40? IBM updates IMS database
Does software life begin at 40? IBM updates IMS database
DOS C prompt in "Vista"?
Drums: Memory or Peripheral?
Drums: Memory or Peripheral?
Drums: Memory or Peripheral?
Early commercial Internet activities (Re: IBM-MAIN longevity)
Education ranking
Education ranking
Ellison Looks Back As Oracle Turns 30
Enterprise: Accelerating the Progress of Linux
Error handling for system calls
Even worse than UNIX
Even worse than UNIX
Even worse than UNIX
Even worse than UNIX
Even worse than UNIX
EXCP access methos
EXCP access methos
EXTERNAL INTERRUPT and SAPL
Fantasy-Land_Hierarchal_NUMA_Memory-Model_on_Vertical
Fantasy-Land_Hierarchal_NUMA_Memory-Model_on_Vertical
Fantasy-Land_Hierarchal_NUMA_Memory-Model_on_Vertical
Fantasy-Land_Hierarchal_NUMA_Memory-Model_on_Vertical
Fantasy-Land_Hierarchal_NUMA_Memory-Model_on_Vertical
Fantasy-Land_Hierarchal_NUMA_Memory-Model_on_Vertical
Fast and Safe C Strings: User friendly C macros to Declare and use C Strings
Fast and Safe C Strings: User friendly C macros to Declare and use C Strings
Fast and Safe C Strings: User friendly C macros to Declare and use C Strings
Faster Chips Are Leaving Programmers in Their Dust
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FICON tape drive?
First successful PC OS?
Fixed-Point and Scientific Notation
Flash memory arrays
Flash memory arrays
Flash memory arrays
Flash memory arrays
Flash memory arrays
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
Folklore references to CP67 at Lincoln Labs
Folklore references to CP67 at Lincoln Labs
Folklore references to CP67 at Lincoln Labs
Forbidding Special characters in passwords
Friday musings on the future of 3270 applications
Friday musings on the future of 3270 applications
Future architectures
Future architectures
Future architectures
Future of System/360 architecture?
Future of System/360 architecture?
Fwd: Linux zSeries questions
GA24-3639
GETMAIN/FREEMAIN and virtual storage backing up
GETMAIN/FREEMAIN and virtual storage backing up
GETMAIN/FREEMAIN and virtual storage backing up
GETMAIN/FREEMAIN and virtual storage backing up
GETMAIN/FREEMAIN and virtual storage backing up
GETMAIN/FREEMAIN and virtual storage backing up
Grilled Turkey
hacked TOPS-10 monitors
hacked TOPS-10 monitors
handling the SPAM on this group
handling the SPAM on this group
Hannaford case exposes holes in law, some say
Has anyone ever used self-modifying microcode? Would it even be useful?
Has anyone ever used self-modifying microcode? Would it even be useful?
Has anyone ever used self-modifying microcode? Would it even be useful?
Help settle a job title/role debate
High order bit in 31/24 bit address
Historic IBM Building 25 in San Jose destroyed by fire
Historic IBM Building 25 in San Jose destroyed by fire
Historic IBM Building 25 in San Jose destroyed by fire
Historical curiosity question
Historical curiosity question
Historical curiosity question
History - Early Green Card
History dictates future of virtualization
History of preprocessing (Burroughs ALGOL)
history question
Hitachi, Silver Lake in talks about hard drives, sources say
How did third-party software companies deal with unbundling being sprung on them?
How difficult would it be for a SYSPROG?
How does ATTACH pass address of ECB to child?
How does ATTACH pass address of ECB to child?
How does ATTACH pass address of ECB to child?
How does ATTACH pass address of ECB to child?
How does ATTACH pass address of ECB to child?
How does ATTACH pass address of ECB to child?
How does ATTACH pass address of ECB to child?
How does ATTACH pass address of ECB to child?
How does ATTACH pass address of ECB to child?
How fast is XCF
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How old are you?
How powerful C64 may have been if it used an 8 Mhz 8088 or 68008?microprocessor (with otherwise the same hardware)?
How powerful C64 may have been if it used an 8 Mhz 8088 or 68008?microprocessor (with otherwise the same hardware)?
How powerful C64 may have been if it used an 8 Mhz 8088 or 68008?microprocessor (with otherwise the same hardware)?
How to write a full-screen Rexx debugger?
How to write a full-screen Rexx debugger?
How to calculate effective page fault service time?
How would a relational operating system look like?
Hypervisors May Replace Operating Systems As King Of The Data Center
Hypervisors May Replace Operating Systems As King Of The Data Center
I am trying to find out how CPU burst time is caluculated based on which CPU scheduling algorithms are created?
I/O in Emulated Mainframes
IBM 029 keypunch -- 0-8-2 overpunch -- what hex code results?
IBM 029 keypunch -- 0-8-2 overpunch -- what hex code results?
IBM 029 keypunch -- 0-8-2 overpunch -- what hex code results?
IBM 029 keypunch -- 0-8-2 overpunch -- what hex code results?
IBM 029 keypunch -- 0-8-2 overpunch -- what hex code results?
IBM 360 Model 20 Questions
IBM 360 Model 20 Questions
IBM 360 Model 20 Questions
IBM 360 Model 20 Questions
IBM 360 Model 20 Questions
IBM 360 Model 20 Questions
IBM 8000 series
IBM 8000???
IBM announced z10 ..why so fast...any problem on z 9
IBM announced z10 ..why so fast...any problem on z 9
IBM celebrates forgotten supercomputer
IBM emulator for ICL 1900
IBM Floating-point myths
IBM Floating-point myths
IBM Floating-point myths
IBM Floating-point myths
IBM LCS
IBM LCS
IBM LCS
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM obsoleting mainframe hardware
IBM obsoleting mainframe hardware
IBM PC competitors
IBM PC competitors
IBM Preview of z/OS V1.10
IBM Releases Office Desktop Software at No Charge to Foster Collaboration
IBM S/360 series operating systems history
IBM S/360 series operating systems history
IBM S/360 series operating systems history
IBM S/360 series operating systems history
IBM S/360 series operating systems history
IBM S/360 series operating systems history
IBM S/360 series operating systems history
IBM S/360 series operating systems history
IBM S/360 series operating systems history
IBM S/360 series operating systems history
IBM S/360 series operating systems history
IBM S/360 series operating systems history
IBM sues maker of Intel-based Mainframe clones
IBM System z9
IBM System z9
IBM System/3 & 3277-1
IBM System/3 & 3277-1
IBM System/3 & 3277-1
IBM System/3 & 3277-1
IBM System/3 & 3277-1
IBM System/3 & 3277-1
IBM System/3 & 3277-1
IBM System/3 & 3277-1
IBM System/3 & 3277-1
IBM System/3 & 3277-1
IBM System/360 Model 85: The Bashful Computer
IBM System/360 signs above control panels - different styles - why?
IBM System/360 DOS still going strong as Z/VSE
IBM System/360 DOS still going strong as Z/VSE
IBM System/360 DOS still going strong as Z/VSE
IBM THINK original equipment sign
IBM THINK original equipment sign
IBM to the PCM market
IBM to the PCM market(the sky is falling!!!the sky is falling!!)
IBM to the PCM market(the sky is falling!!!the sky is falling!!)
IBM to the PCM market(the sky is falling!!!the sky is falling!!)
IBM to the PCM market(the sky is falling!!!the sky is falling!!)
IBM to the PCM market
IBM to the PCM market(the sky is falling!!!the sky is falling!!)
IBM to the PCM market
IBM to the PCM market
IBM to the PCM market
IBM Unionization
IBM Unionization
IBM Z6 processor
IBM Z6 processor
IBM's 2Q2008 Earnings
IBM's Webbie World
IBM--disposition of clock business
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBMLink 2000 Finding ESO levels
IBMLink 2000 Finding ESO levels
IBMLink 2000 Finding ESO levels
IBMLink 2000 Finding ESO levels
In The US, Email Is Only For Old People
Inaccurate CPU% reported by RMF and TMON
independent appraisers
India is outsourcing jobs as well
information utility
Intel memory latencies
Intel Ships Power-Efficient Penryn CPUs
Intel Ships Power-Efficient Penryn CPUs
Intel Ships Power-Efficient Penryn CPUs
Intel: an expensive many-core future is ahead of us
Intel: an expensive many-core future is ahead of us
Intel: an expensive many-core future is ahead of us
Intel: an expensive many-core future is ahead of us
Intel: an expensive many-core future is ahead of us
Intel: an expensive many-core future is ahead of us
Intel: an expensive many-core future is ahead of us
Intel: an expensive many-core future is ahead of us
Intel: an expensive many-core future is ahead of us
Intel: an expensive many-core future is ahead of us
Interesting ibm about the myths of the Mainframe
Interesting ibm about the myths of the Mainframe
Interesting Mainframe Article: 5 Myths Exposed
Interesting Mainframe Article: 5 Myths Exposed
Internal DASD Pathing
Internal DASD Pathing
Internal DASD Pathing
Interrupts
Interrupts
Invitation to Join Mainframe Security Guru Group
Is anyone still running
Is anyone still running
Is anyone interested in starting a CICS specific group?
Is computer history taugh now?
Is computer history taugh now?
Is computer history taugh now?
Is computer history taugh now?
Is computer history taugh now?
Is computer history taugh now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is SUN going to become x86'ed??
Is SUN going to become x86'ed??
Is SUN going to become x86'ed??
Is SUN going to become x86'ed??
Is SUN going to become x86'ed??
Is virtualization diminishing the importance of OS?
ISA Support for Multithreading
ISA Support for Multithreading
ISAM and/or self-modifying channel programs
ISPF Limitations (was: Need for small machines ... )
ISPF not productive
It has been a long time since Ihave seen a printer
It keeps getting uglier
It keeps getting uglier
It keeps getting uglier
It keeps getting uglier
It keeps getting uglier
It keeps getting uglier
It keeps getting uglier
IT managers stymied by limits of x86 virtualization
IT managers stymied by limits of x86 virtualization
IT vet Gordon Bell talks about the most influential computers
It's a Presidential Mandate, Feds use it. How come you are not using FDE?
Java; a POX
JCL parms
JCL parms
JES2 or JES3, Which one is older?
Jim Gray Is Missing
Job ad for z/OS systems programmer trainee
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies (Actually, Working under the table!)
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
Just another example of mainframe costs
Just another example of mainframe costs
Just another example of mainframe costs
Just another example of mainframe costs
Just another example of mainframe costs
Just another example of mainframe costs
Keep VM 24X7 365 days
Kernels
Kernels
Kernels
Larrabee details: Yes, it is based on the Pentium. :-)
Latest Principles of Operation
Latest Principles of Operation
Latest Principles of Operation
latest Principles of Operation
Laugh, laugh. I thought I'd die - application crashes
Lean and Mean: 150,000 U.S. layoffs for IBM?
least structured statement in a computer language. And the winner
LINC-8 Front Panel Questions
LINC-8 Front Panel Questions
LINC-8 Front Panel Questions
Linux zSeries questions
Linux zSeries questions
Linux zSeries questions
Linux zSeries questions
Linux: The Completely Fair Scheduler
Linux: The Completely Fair Scheduler
Linux: The Completely Fair Scheduler
Linux: The Completely Fair Scheduler
Long running Batch programs keep IMS databases offline
Lynn - You keep using the term "we" - who is "we"?
Machine-Level Assembly Language
mainframe = superserver
mainframe developer = permanent position - Dublin Ireland
Mainframe files under AIX etc
Mainframe Funeral
mainframe performance, was Is a RISC chip more expensive?
mainframe performance, was Is a RISC chip more expensive?
Mainframe programming vs the Web
Mainframe Project management
MAINFRAME Training with IBM Certification and JOB GUARANTEE
MAINFRAME Training with IBM Certification and JOB GUARANTEE
MAINFRAME Training with IBM Certification and JOB GUARANTEE
Mainframe vs. "Server" (Was Just another example of mainframe
MapReduce - a Major Step Backwards?
Memories of ACC, IBM Channels and Mainframe Internet Devices
Memory Instrumentation - was "largest parallel sysplex around?"
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Migration from Mainframe to othre platforms - the othe bell?
Migration from Mainframe to othre platforms - the othe bell?
Migration from Mainframe to othre platforms - the othe bel?
Migration from Mainframe to othre platforms - the othe bell?
Migration from Mainframe to othre platforms - the othe bell?
MIPS and RISC<
more on (the new 40+ yr old) virtualization
more on (the new 40+ yr old) virtualization
more on (the new 40+ yr old) virtualization
more on (the new 40+ yr old) virtualization
more on (the new 40+ yr old) virtualization
more on (the new 40+ yr old) virtualization
more on (the new 40+ yr old) virtualization
more shared segment archeology
more shared segment archeology
moving on
MTS *FS tape format?
MTS memories
My Funniest or Most Memorable Moment at IBM
Need Help filtering out sporge in comp.arch
Need Help filtering out sporge in comp.arch
Nerdy networking kid crashes the party
New 'virtual IT job' could be very real
new 40+ yr old, disruptive technology
new 40+ yr old, disruptive technology
New machine code
New machine code
New machine code
New machine code
New machine code
New machine code
New Opcodes
New Opcodes
New Opcodes
New Opcodes
New Opcodes
New test attempt
New test attempt
New test attempt
New test attempt
New, 40+ yr old, direction in operating systems
Newbie question on table design
Newbie question on table design
Newbie question on table design
Newbie question on table design
Newbie question on table design
Newbie question on table design
Newbie question on table design
Newbie question on table design
Newbie question on table design
Newbie question on table design
Newbie question on table design
Newbie question about db normalization theory: redundant keys OK?
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
No Glory for the PDP-15
No Glory for the PDP-15
No Glory for the PDP-15
No Glory for the PDP-15
No Glory for the PDP-15
No Gory for the *NIX
No offense to any one but is DB2/6000 an old technology. Does anybody still use it, if so what type of industries??
Non-Standard Mainframe Language?
Non-Standard Mainframe Language?
Non-Standard Mainframe Language?
Non-Standard Mainframe Language?
nouns and adjectives
Obfuscation was: Definition of file spec in commands
Object-relational impedence
OCO, documentation, support from IBM-Main, etc
Off Topic But Concept should be Known To All
old 370 info
old 370 info
old discussion of disk controller chache
Old hardware
Old hardware
old internal network references
old productivity response time studies
old tapes
old tapes
old tapes
Old XDS Sigma stuff
Old XDS Sigma stuff
Old XDS Sigma stuff
Old XDS Sigma stuff
on-demand computing
on-demand computing
ongoing rush to the new, 40+ yr old virtual machine technology
ongoing rush to the new, 40+ yr old virtual machine technology
Op codes removed from z/10
Open Source, Unbundling, and Future System
Open Source, Unbundling, and Future System
Open z architecture and Linux questions
Open z/Architecture or Not
Open z/Architecture or Not
Operating systems are old and busted
Operating systems are old and busted
Operating systems are old and busted
Operating systems are old and busted
Operating systems are old and busted
Opsystems
Oracle Introduces Oracle VM As It Leaps Into Virtualization
OS X Finder windows vs terminal window weirdness
OS X Finder windows vs terminal window weirdness
OS X Finder windows vs terminal window weirdness
OS X Finder windows vs terminal window weirdness
OS X Finder windows vs terminal window weirdness
Outsourcing dilemma or debacle, you decide
Outsourcing dilemma or debacle, you decide
Paris
Parse/Template Function
Patents, Copyrights, Profits, Flex and Hercules
Patents, Copyrights, Profits, Flex and Hercules
pc/370
pc/370
PCI Compliance - Encryption of all non-console administrative access
Pennsylvania Railroad ticket fax service
performance of hardware dynamic scheduling
performance of hardware dynamic scheduling
PL/S programming language
PL/S programming language
Poster of computer hardware events?
Price of CPU seconds
Price of CPU seconds
Price of CPU seconds
pro- foreign key propaganda?
pro- foreign key propaganda?
Programmable TLB management?
PSI MIPS
PSI MIPS
PSI MIPS
Public Computers
Query: Mainframers look forward and back
Question on DASD Hardware
Questions to the list
Quote from comp.object
Radix Partition Trees
Radix Partition Trees
Radix Partition Trees
Random thoughts
Random thoughts
Rate Monotonic Scheduling (RMS) vs. OS Scheduling
Re-hosting IMB-MAIN
Real storage usage - a quick question
Real storage usage - a quick question
Really stupid question about z/OS HTTP server
Really stupid question about z/OS HTTP server
recent mentions of 40+ yr old technology
recent mentions of 40+ yr old technology
recent mentions of 40+ yr old technology
recent mentions of 40+ yr old technology
Regarding the virtual machines
Remembering the CDC 6600
Remembering the CDC 6600
Remembering the CDC 6600
Remembering the CDC 6600
Remembering the CDC 6600
Remembering the CDC 6600
Rotary phones
Rotary phones
Rotary phones
Rotary phones
Running OS/390 on z9 BC
Running REXX program in a batch job
Scholars needed to build a computer history bibliography
Scholars needed to build a computer history bibliography
Scholars needed to build a computer history bibliography
Scholars needed to build a computer history bibliography
Scholars needed to build a computer history bibliography
Scholars needed to build a computer history bibliography
segmentation or lack thereof
segmentation or lack thereof
ServerPac Installs and dataset allocations
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
Sizing CPU
SMF Under VM
software preservation volunteers ( was Re: LINC-8 Front Panel Questions)
Some confusion about virtual cache
some old network related discussion
some questions about System z PR/SM
source for VAX programmers
source for VAX programmers
Special characters in passwords was Re: RACF - Password rules
Special characters in passwords was Re: RACF - Password rules
Special characters in passwords was Re: RACF - Password rules
Special characters in passwords was Re: RACF - Password rules
Special characters in passwords was Re: RACF - Password rules
squirrels
squirrels
Startio Question
Startio Question
Startio Question
Startio Question
strange FTP problem--transatlantic asymmetry
subprime write-down sweepstakes
Sustainable Web
SVCs
SVCs
SVCs
SVCs
SVCs
sysprog demand
System 360 EBCDIC vs. ASCII
System z10 announcement (in English)
T.J. Maxx data theft worse than first reported
T3 Sues IBM To Break its Mainframe Monopoly
T3 Sues IBM To Break its Mainframe Monopoly
T3 Sues IBM To Break its Mainframe Monopoly
T3 Sues IBM To Break its Mainframe Monopoly
T3 Sues IBM To Break its Mainframe Monopoly
T3 Sues IBM To Break its Mainframe Monopoly
T3 Sues IBM To Break its Mainframe Monopoly
T3 Sues IBM To Break its Mainframe Monopoly
T3 Sues IBM To Break its Mainframe Monopoly
T3 Sues IBM To Break its Mainframe Monopoly
Tap and faucet and spellcheckers
Tap and faucet and spellcheckers [was: Re: What do YOU call
Tap and faucet and spellcheckers
tape blocking
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The future of PDSs
The Genealogy of the IBM PC
The history of Structure capabilities
The history of Structure capabilities
The history of Structure capabilities
The history of Structure capabilities
The history of Structure capabilities
The history of Structure capabilities
The human plague
The Internet's 100 Oldest Dot-Com Domains
The Mainframe in 10 Years
The Mainframe in 10 Years
The name "shell"
The name "shell"
The name "shell"
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The PKC-only application security model
The SLT Search LisT instruction - Maybe another one for the Wheelers
The SLT Search LisT instruction - Maybe another one for the Wheelers
The top 10 dead (or dying) computer skills
The top 10 dead (or dying) computer skills
The top 10 dead (or dying) computer skills
The Unexpected Fact about the First Computer Programmer
The Univac 110x Architecture Still Lives
The use of "script" for program
The use of "script" for program
Throwaway cores
Throwaway cores
Throwaway cores
Throwaway cores
Throwaway cores
time spent/day on a computer
Tom's Hdw review of SSDs
TOPS-10
TOPS-10
TOPS-10
TOPS-10
TOPS-10
TOPS-10
TOPS-10
TOPS-10
TOPS-10
TOPS-10
TOPS-10
TOPS-10
Toyota Beats GM in Global Production
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
TRANSLATE inst with DAT on
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Trusted (mainframe) online transactions
Two views of Microkernels (Re: Kernels
Two views of Microkernels (Re: Kernels
Unbelievable Patent for JCL
University rank of Computer Architecture
Unusual Floating-Point Format Remembered?
US Air computers delay psgrs
US Airways badmouths legacy system
Usefulness of bidirectional read/write?
Usefulness of bidirectional read/write?
Usefulness of bidirectional read/write?
Usefulness of bidirectional read/write?
Usefulness of bidirectional read/write?
Usenet - Dead? Why?
user level TCP implementation
user level TCP implementation
Using Military Philosophy to Drive High Value Sales
Using rexx to send an email
Using rexx to send an email
Using rexx to send an email
V2X2 vs. Shark (SnapShot v. FlashCopy)
V2X2 vs. Shark (SnapShot v. FlashCopy)
Virtual
Virtual
Virtual
Virtual
virtual appliance
Virtual Browsers: Disposable Security
virtual machines, the new, old thing (again)
Virtual Storage implementation
Virtual Storage implementation
Virtual Storage implementation
Virtual Storage implementation
Virtual Storage implementation
Virtual Storage implementation
Virtualization: Don't Ask, Don't Tell
Virtualization: Everybody's Doing It, but Few Know How
Virtualization: What is it exactly?
VLIW pre-history
VLIW pre-history
VLIW pre-history
VLIW pre-history
VLIW pre-history
vm 35th b'day at share in san diego next week
vm folklore, new, 40+ yr old technology
VM system kept NYSE running
VM/370 Release 6 Waterloo tape (CIA MODS)
VM/370 Release 6 Waterloo tape (CIA MODS)
vm/sp1
vm/sp1
vm/sp1
VMware signs deal to embed software in HP servers
VMware: New King Of The Data Center?
VTAM R.I.P. -- SNATAM anyone?
Was CMS multi-tasking?
Was CMS multi-tasking?
Was CMS multi-tasking?
Was CMS multi-tasking?
Was CMS multi-tasking?
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
We're losing the battle
We're losing the battle
We're losing the battle
We're losing the battle
We're losing the battle
We're losing the battle
We're losing the battle
Web Security hasn't moved since 1995
Welcome to Rain Matrix: The Cloud Computing Network
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
What happened to the Teletype Corporation?
What happened to the Teletype Corporation?
What happened to resumable instructions?
What happened to resumable instructions?
What I miss in my OS
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What is "command reject" trying to tell me?
What is "command reject" trying to tell me?
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
What is the biggest IT myth of all time?
What to do with extra storage on new z9
What's a CPU second?
Wheeler Postings
when was MMU virtualization first considered practical?
when was MMU virtualization first considered practical?
when was MMU virtualization first considered practical?
whiny question: Why won't z/OS support the HMC 3270 emulator
Whitehouse Emails Were Lost Due to "Upgrade"
Why 'pop' and not 'pull' the complementary action to 'push' for a stack
Why do we think virtualization is new?
Why is switch to DSL so traumatic?
Why isn't OMVS command integrated with ISPF?
windows time service
windows time service
Writing 23FDs
Writing 23FDs
Wylbur and Paging
Wylbur and Paging
Wylbur and Paging
Wylbur and Paging
Xephon, are they still in business?
Xephon, are they still in business?
Yet another squirrel question - Results (very very long post)
Yet another squirrel question - Results (very very long post)
Yet another squirrel question - Results (very very long post)
Yet another squirrel question - Results (very very long post)
Yet another squirrel question - Results (very very long post)
Young mainframers' group gains momentum
z/OS and VM Control Blocks
z/OS BIND9 DNS Vulnerable to Cache Poisoning Attack Problem?
z/OS Documentation - again
z/VM usability
z/VM usability
z10 presentation on 26 Feb
z10 presentation on 26 Feb
z10 presentation on 26 Feb
zH/OS (z/OS on Hercules for personal use only)

back to top, network, mainframe - (2005-2006), - (2003-2004), - (2001-2002), - (1993-2000), digsig, all

Digital Signature & Standards (2007-2008)

"Dilemmas of Privacy and Surveillance" report launched
307 digit number factored
307 digit number factored
307 digit number factored
A crazy thought?
A crazy thought?
A crazy thought?
A crazy thought?
A secure Internet requires a secure network protocol
Any benefit to programming a RISC processor by hand?
asymmetric cryptography + digital signature
asymmetric cryptography + digital signature
Attack on Brit retail payments -- some takeways
Authentication in the e-tailer / payment gateway / customer triangle
Authentication in the e-tailer / payment gateway / customer triangle
Authentication in the e-tailer / payment gateway / customer triangle
Authentication in the e-tailer / payment gateway / customer triangle
Boffins bust web authentication with game consoles
Browser Security UI: the horns of the dilemma
CA issues no-questions asked Mozilla cert
Calling Out
Calling Out
Can electronic signature bring us non-repudiation and authenticity?
Can SSL sessions be compromised?
Can SSL sessions be compromised?
Can we copy trust?
certificate distribution
Certificate Purpose
Certificate Purpose
Certificate Purpose
Certificate Purpose
Certificate Purpose
Certificate Purpose
Certificates
Certificates turn 30, X.509 turns 20, no-one notices
Combining EMV and eID on a payment card?
crypto component services - is there a market?
crypto component services - is there a market?
Damn
delegating SSL certificates
DNSSEC to be strangled at birth
dnssec?
Do soft certificates provide two factor authentication?
Dutch Transport Card Broken
Electronic signature outside Europe
Failure of PKI in messaging
Failure of PKI in messaging ... addenda
Failure of PKI in messaging
Failure of PKI in messaging
Fingerprint Firefox Plugin?
Fixing SSL (was Re: Dutch Transport Card Broken)
Fixing SSL (was Re: Dutch Transport Card Broken)
Fixing SSL (was Re: Dutch Transport Card Broken)
Fixing SSL (was Re: Dutch Transport Card Broken)
Governance of anonymous financial services
Governance of anonymous financial services
Governance of anonymous financial services
GPG
GPG
GPG
GPG
GPG
GPG
GPG
GPG
GPG
H6.2 Most Standardised Security Protocols are Too Heavy
Historical copy of PGP 5.0i for sale -- reminder of the war we lost
How many 36-bit Unix ports in the old days?
How to tell a fake SSL certificate from a real one
How to tell a fake SSL certificate from a real one
https question
Hypothesis #4 -- The First Requirement of Security is Usability
IBMLink 2000 Finding ESO levels
Identity resurges as a debate topic
If your CSO lacks an MBA, fire one of you
information utility
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
Larrabee details: Yes, it is based on the Pentium. :-)
Lynn - You keep using the term "we" - who is "we"?
MAC and SSL
MAC and SSL
man in the middle, SSL
man in the middle, SSL ... addenda
Microsoft asserts itself as an uber-CA
Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
My Dream PC -- Chip-Based
My Dream PC -- Chip-Based
My Dream PC -- Chip-Based
My Dream PC -- Chip-Based
My Dream PC -- Chip-Based
My Dream PC -- Chip-Based
New Credit Cards May Leak Personal Information
New test attempt
newbie need help (ECC and wireless)
News.com: IBM donates new privacy tool to open-source Higgins
Non-repudiation, Evidence and TLS: another fine mess I've got you into :-(
nouns and adjectives
on Revocation of Signing Certs and Public Key Signing itself
on Revocation of Signing Certs and Public Key Signing itself
One Time Identification, a request for comments/testing
OpenPGP becomes RFC4880. Consider Hypothesis #1: The One True Cipher Suite
Payment Card + Digital Signature
Perfect MITM Attacks With No-Check SSL
PKI moving to adopt the plugin model -- realignment to security based on user-needs?
PKI: The terrorists' secret weapon
PKI: The terrorists' secret weapon (part II)
public key password authentication
public key password authentication
public key password authentication
Public key encrypt-then-sign or sign-then-encrypt?
Public key encrypt-then-sign or sign-then-encrypt?
Public key encrypt-then-sign or sign-then-encrypt?
Public key encrypt-then-sign or sign-then-encrypt?
Retailers try to push data responsibilities back to banks
Say it ain't so? MITM protection on SSH shows its paces
Secure64 Develops First Automated DNSSEC Signing Application to Help Secure the Internet Worldwide
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
SIM-based mobile signature solution to launch new applications
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was': The Perfect Computer - 36 bits?
SLL Certificate
SLL Certificate
Special characters in passwords was Re: RACF - Password rules
SSL (https, really) accelerators for Linux/Apache?
SSL certificates - from a customer's point of view (trust)
SSL info
SSL info
SSL info
SSL info
SSL Security
survey of RFC S/MIME signature handling
survey of RFC S/MIME signature handling
Technologists on signatures: looking in the wrong place
The bank fraud blame game
The bank fraud blame game
The One True Identity -- cracks being examined, filled, and rotted out from the inside
The One True Identity -- cracks being examined, filled, and rotted out from the inside
The PKC-only application security model
The PKC-only application security model
The PKC-only application security model
The Uneasy Ride on the Cryptography Bandwaggon
Top 10 vulnerabilities for service orientated architecture?
User interface, security, and "simplicity"
Value of SSL client certificates?
Value of SSL client certificates?
Verifying Verified By Visa - Registration breaks chain of trust
Wachovia Bank web site
Wachovia Bank web site
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
Why self describing data formats:
Why self describing data formats:
Windows Live vs Kerberos
Windows Live vs Kerberos
World's biggest PKI goes open source: DogTag is released
z/OS BIND9 DNS Vulnerable to Cache Poisoning Attack Problem?

back to top, network, mainframe, digsig - (2005-2006), - (2003-2004), - (2001-2002), - (1993-2000), all

Current Collected subjects (2007-2008)

"Atuan" - Colossal Cave in APL?
"Designing and implementing malicious hardware"
"Dilemmas of Privacy and Surveillance" report launched
"Engine" in Z/OS?
"MVS Experience"
"New Universal Man-in-the-Middle Phishing Kit"?
"Security Breaches"
"Server" processors for numbercrunching?
"Server" processors for numbercrunching?
"Server" processors for numbercrunching?
"Telecommunications" from '85
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Elements of Programming Style"
"The Register" article on HP replacing z
"True" story of the birth of the IBM PC
"True" story of the birth of the IBM PC
#4.2 Simplicity is Inversely Proportional to the Number of Designers
'Innovation' and other crimes
'Innovation' and other crimes
'Innovation' and other crimes
'Man in the browser' is new threat to online banking
'Man in the browser' is new threat to online banking
'Man in the browser' is new threat to online banking
'pipe <' doesn't work in Windows xp? I get an error saying its not a command
(electronic commerce) SSL use
(Newbie question)How does the modern high-end processor been designed?
(old) distributed 4341s
0wned .gov machines (was Re: Russian cyberwar against Estonia?)
10 worst PCs
10 worst PCs
1401 simulator for OS/360
1960s: IBM mgmt mistrust of SLT for ICs?
1960s: IBM mgmt mistrust of SLT for ICs?
1960s: IBM mgmt mistrust of SLT for ICs?
1970s credit cards, was: 1975 movie "Three Days of the Condor" tech stuff
1970s credit cards, was: 1975 movie "Three Days of the Condor" tech stuff
1975 movie "Three Days of the Condor" tech stuff
1975 movie "Three Days of the Condor" tech stuff
1975 movie "Three Days of the Condor" tech stuff
1975 movie "Three Days of the Condor" tech stuff
1975 movie "Three Days of the Condor" tech stuff
1975 movie "Three Days of the Condor" tech stuff
1975 movie "Three Days of the Condor" tech stuff
1998 vs. 2008: A Tech Retrospective
1998 vs. 2008: A Tech Retrospective
1998 vs. 2008: A Tech Retrospective
2 byte interface
2007 Roundup: The march of the botnets
2007 Year in Review on Mainframes - Interesting
2007: year in review
2007: year in review
2008 Data Breaches: 30 Million and Counting
2008: The year of hack the vote?
21 million German bank account details on black market
21st Century ISA goals?
21st Century ISA goals?
21st Century ISA goals?
21st Century ISA goals?
21st Century ISA goals?
21st Century ISA goals?
25 years: A technology timeline
2741s, was Even worse than UNIX
307 digit number factored
307 digit number factored
307 digit number factored
307 digit number factored
3277 terminals and emulators
3277 terminals and emulators
3350 failures
3350 failures
3350 failures
360/30 memory
40 yrs of cp67 and cms
64 gig memory
64 gig memory
64 gig memory
64 gig memory
64 gig memory
6400 impact printer
6400 impact printer
[ClassicMainframes] multics source is now open
A Blast from the Past
A crazy thought?
A crazy thought?
A crazy thought?
A crazy thought?
A database theory resource - ideas
A few months of legislative vacuum - is this a good thing?
a fraud is a sale, Re: The bank fraud blame game
a fraud is a sale, Re: The bank fraud blame game
a fraud is a sale, Re: The bank fraud blame game
a little dbms folklore
A Merit based system of reward -Does anybody ( or any executive) really want to be judged on merit?
A new mathematical object was revealed yesterday
A question for the Wheelers - Diagnose instruction
A question for the Wheelers - Diagnose instruction
A secure Internet requires a secure network protocol
A secure Internet requires a secure network protocol
A Super-Efficient Light Bulb
A Super-Efficient Light Bulb
A tribute to Jim Gray
A Tribute to Jim Gray: Sometimes Nice Guys Do Finish First
A Tribute to Jim Gray: Sometimes Nice Guys Do Finish First
A Tribute to Jim Gray: Sometimes Nice Guys Do Finish First
A way to speed up level 1 caches
A way to speed up level 1 caches
A way to speed up level 1 caches
A way to speed up level 1 caches
A way to speed up level 1 caches
A way to speed up level 1 caches
A way to speed up level 1 caches
Abend S0C0
Abend S0C0
Abend S0C0
About 1 in 5 IBM employees now in India - so what?
Accidentally Deleted or Overwrote Files?
ACP/TPF
ACP/TPF
ACP/TPF
Addressing Scheme with 64 vs 63 bits
Age of IBM VM
Age of IBM VM
Ageing data centers limiting benefits of new technologies
Alexander Graham Bell - Patent Thief?
Alexander Graham Bell - Patent Thief?
Alternative credit card network
Alternative credit card network
Amazon's "Simple" Database
America Competes spreads funds out
America's Prophet of Fiscal Doom
American Airlines
American Airlines
American Airlines
American Airlines
American Airlines
American Airlines
American Airlines
An old fashioned Christmas
An old fashioned Christmas
An old fashioned Christmas
An old fashioned Christmas
Ancient Apple
Ancient Apple
ANN: Microsoft goes Open Source
ANN: Microsoft goes Open Source
ANN: Microsoft goes Open Source
ANN: Microsoft goes Open Source
ANN: Microsoft goes Open Source
ANN: Microsoft goes Open Source
ANN: Microsoft goes Open Source
ANN: Microsoft goes Open Source
ANN: Microsoft goes Open Source
ANN: Microsoft goes Open Source
ANN: Microsoft goes Open Source
ANN: Microsoft goes Open Source
ANN: Microsoft goes Open Source
Anniversaries
Annoying Processor Pricing
Annoying Processor Pricing
Annoying Processor Pricing
Annoying Processor Pricing
Another "migration" from the mainframe
Another "migration" from the mainframe
Another "migration" from the mainframe
Another "migration" from the mainframe
Another difference between platforms
Another difference between platforms
another one biting the dust?
another one biting the dust?
Another quiet week in finance
ANT Censuses of the Internet Address Space
Antivirus Inventor: Security Departments Are Wasting Their Time
Any benefit to programming a RISC processor by hand?
Any benefit to programming a RISC processor by hand?
Any benefit to programming a RISC processor by hand?
Any benefit to programming a RISC processor by hand?
Any benefit to programming a RISC processor by hand?
Any benefit to programming a RISC processor by hand?
Any benefit to programming a RISC processor by hand?
Any benefit to programming a RISC processor by hand?
Any benefit to programming a RISC processor by hand?
Anybody remember Keypunch cards?
Anyone heard of a company called TIBCO?
Anyone know of some good internet Listserv's?
Anyone know much about z/VM?
Anyone still have access to VMTOOLS and TEXTTOOLS?
APL
APL
APL
Apple files patent for WGA-style anti-piracy tech
Apple files patent for WGA-style anti-piracy tech
Apple files patent for WGA-style anti-piracy tech
Are blade servers becoming irrelevant with advances in virtualization and multi-core processor technology?
Are family businesses unfair competition?
Are family businesses unfair competition?
Are multicore processors driving application developers to explore multithreaded programming options?
Are Relational Databases Obsolete?
Are there tasks that don't play by WLM's rules
Are there tasks that don't play by WLM's rules
Are we approaching a "tipping point" with regard to business travel?
ARPANet architect: bring "fairness" to traffic management
As Expected, Ford Falls From 2nd Place in U.S. Sales
As Expected, Ford Falls From 2nd Place in U.S. Sales
As Expected, Ford Falls From 2nd Place in U.S. Sales
As Expected, Ford Falls From 2nd Place in U.S. Sales
As Expected, Ford Falls From 2nd Place in U.S. Sales
As Expected, Ford Falls From 2nd Place in U.S. Sales
As Expected, Ford Falls From 2nd Place in U.S. Sales
Astrophysicist Replaces Supercomputer with a Cluster of Eight PlayStation 3s
asymmetric cryptography + digital signature
asymmetric cryptography + digital signature
ATM PIN through phone or Internet. Is it secure? Is it allowed by PCI-DSS?, Visa, MC, etc.?
ATM Skimmers: Watch Out for Electronic Theft Devices
ATMs
ATMs
Attack on Brit retail payments -- some takeways
Attack on Brit retail payments -- some takeways
Attractive Alternatives to Mainframes
Authentication architecture on a Unix Network
Authentication in the e-tailer / payment gateway / customer triangle
Authentication in the e-tailer / payment gateway / customer triangle
Authentication in the e-tailer / payment gateway / customer triangle
Authentication in the e-tailer / payment gateway / customer triangle
authoritative IEFBR14 reference
authoritative IEFBR14 reference
authoritative IEFBR14 reference
Automation is still not accepted to streamline the business processes... why organizations are not accepting newer technolgies?
Automation is still not accepted to streamline the business processes... why organizations are not accepting newer technolgies?
Automation is still not accepted to streamline the business processes... why organizations are not accepting newer technologies?
Automation is still not accepted to streamline the business processes... why organizations are not accepting newer technologies?
BAH's Point of View
Banks failing to manage IT risk - study
Banks failing to manage IT risk - study
Banks failing to manage IT risk - study
Banks failing to manage IT risk - study
Barbless
Barbless
Barbless
Barbless
Barbless
Barbless
Barbless
Basel Committee outlines plans to strengthen Basel II
Batch job to perform sftp transfer
Baudot code direct to computers?
Baudot code direct to computers?
Baudot code direct to computers?
Baudot code direct to computers?
Baudot code direct to computers?
Baudot code direct to computers?
Baudot code direct to computers?
Baudot code direct to computers?
Being "Open" (Was: Mainframe vs. "Server")
Berkeley researcher describes parallel path
Berkeley researcher describes parallel path
Berkeley researcher describes parallel path
Berkeley researcher describes parallel path
Berkeley researcher describes parallel path
Berkeley researcher describes parallel path
Best practices for software delivery
Beyond multicore
Bidirectional Binary Self-Joins
Bidirectional Binary Self-Joins
Bidirectional Binary Self-Joins
Bidirectional Binary Self-Joins
Billion-dollar IT failure at Census Bureau
Billion-dollar IT failure at Census Bureau
Biometric Credit cards
BITNET & LISTSERV
Blind-sided, again. Why?
Blinkenlights
Blinkenlights
Blinkenlights
Blinkenlights
Blinkenlights
Blinkenlights
Blinkenlights
Blinkenlights
Blinkenlights
Blinkenlights
Blinkenlights
Blinkenlights
Blinkenlights
Blinkenlights
Blinkenlights
Blinkenlights
Blinkenlights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Blinkylights
Boffins bust web authentication with game consoles
Boffins bust web authentication with game consoles
Book: "Everyone Else Must Fail" --Larry Ellison and Oracle???
Book: "Everyone Else Must Fail" --Larry Ellison and Oracle???
Book: "Everyone Else Must Fail" --Larry Ellison and Oracle???
Boyd again
Boyd, Metcalfe, and Amdahl all in one article
Break the rules of governance and lose 4.9 billion
Break the rules of governance and lose 4.9 billion
Break the rules of governance and lose 4.9 billion
Break the rules of governance and lose 4.9 billion
Browser Security UI: the horns of the dilemma
Builders v. Breakers
Builders V. Breakers
Builders V. Breakers
Bulkiest removable storage media?
Bulkiest removable storage media?
Bulkiest removable storage media?
Bush - place in history
Bush - place in history
Bush - place in history
Bush - place in history
Bush - place in history
Bush - place in history
Bush - place in history
Bush - place in history
Bush - place in history
Bush - place in history
Bush - place in history
Bush - place in history
Bush - place in history
Bush - place in history
Buying a used desktop PC?
CA ESD files Options
CA ESD files Options
CA ESD files Options
CA ESD files Options
CA ESD files Options
CA ESD files Options
CA ESD files Options
CA issues no-questions asked Mozilla cert
CA to IBM TCP Conversion
CA to IBM product swap
Call for XEDIT freaks, submit ISPF requirements
Calling Out
Calling Out
Calling Out
Calling Out
Can electronic signature bring us non-repudiation and authenticity?
Can I ask you to list the HPC/SC (i.e. th High performace computers) which are dedicated to a problem?
Can individual TCP packets travel along different route or ...?
Can outsourcing be stopped?
Can outsourcing be stopped?
Can Smart Cards Reduce Payments Fraud and Identity Theft?
Can Smart Cards Reduce Payments Fraud and Identity Theft?
Can Smart Cards Reduce Payments Fraud and Identity Theft?
Can Smart Cards Reduce Payments Fraud and Identity Theft?
Can Smart Cards Reduce Payments Fraud and Identity Theft?
Can Smart Cards Reduce Payments Fraud and Identity Theft?
Can Smart Cards Reduce Payments Fraud and Identity Theft?
Can Smart Cards Reduce Payments Fraud and Identity Theft?
Can Smart Cards Reduce Payments Fraud and Identity Theft?
Can Smart Cards Reduce Payments Fruad and Identity Theft?
Can Smart Cards Reduce Payments Fraud and Identity Theft?
Can Smart Cards Reduce Payments Fraud and Identity Theft?
Can SSL sessions be compromised?
Can SSL sessions be compromised?
Can SSL sessions be compromised?
Can SSL sessions be compromised?
Can the financial meltdown be used to motivate sustainable development in order to achieve sustainable growth and desired sustainability?
Can we blame one person for the financial meltdown?
Can we copy trust?
Capacity and Relational Database
Capacity and Relational Database
Capacity and Relational Database
CDOs subverting Boyd's OODA-loop
certificate distribution
Certificate Purpose
Certificate Purpose
Certificate Purpose
Certificate Purpose
Certificate Purpose
Certificate Purpose
Certificates
Certificates turn 30, X.509 turns 20, no-one notices
Cheap Hack - Domain Name Market - Stolen Domains for Sale
China overtakes U.S. as top Web market
China overtakes U.S. as top Web market
China overtakes U.S. as top Web market
China overtakes U.S. as top Web market
China overtakes U.S. as top Web market
China overtakes U.S. as top Web market
China overtakes U.S. as top Web market
China overtakes U.S. as top Web market
China overtakes U.S. as top Web market
China's Godson-2 processor takes center stage
China's Godson-2 processor takes center stage
Chip&PIN cards: 1 in 5 cloned?
Chip-and-pin card reader supply-chain subversion 'has netted millions from British shoppers'
CHROME and WEB apps on Mainframe?
CHROME and WEB apps on Mainframe?
CHROME and WEB apps on Mainframe?
CHROME and WEB apps on Mainframe?
CHROME and WEB apps on Mainframe?
CHROME and WEB apps on Mainframe?
CHROME and WEB apps on Mainframe?
Clickjacking -- the new browser wipe-out
CLIs and GUIs
CLIs and GUIs
CLIs and GUIs
CLIs and GUIs
CLIs and GUIs
CLIs and GUIs
CLIs and GUIs
CLIs and GUIs
CLIs and GUIs
CLIs and GUIs
CLIs and GUIs
CLIs and GUIs
CLIs and GUIs
CMS (PC Operating Systems)
Code Page 1047 vs 037 - Green card confusion
Collateralized debt obligations (CDOs)
Combining EMV and eID on a payment card?
Combining VM list threads
Coming soon: superfast internet
competitiveness
competitiveness
complicated address generation unit?
complicated address generation unit?
Comprehensive security?
Comprehensive security?
Comprehensive security?
CompUSA to Close after Jan. 1st 2008
Computer Clocks
Computer History Museum
Computer History Museum
Computer History Museum
Computer History Museum
Computer History Museum
Computer History Museum
Computer History Museum
Computer language history
Computer Science Education: Where Are the Software Engineers of Tomorrow?
Computer Science Education: Where Are the Software Engineers of Tomorrow?
Computer Science Education: Where Are the Software Engineers of Tomorrow?
Computer Science Education: Where Are the Software Engineers of Tomorrow?
Computer Science Education: Where Are the Software Engineers of Tomorrow?
Computer Science Education: Where Are the Software Engineers of Tomorrow?
Computer Science Education: Where Are the Software Engineers of Tomorrow?
Computer Science Education: Where Are the Software Engineers of Tomorrow?
Computer Science Education: Where Are the Software Engineers of Tomorrow?
Computer Science Education: Where Are the Software Engineers of Tomorrow?
Computer Science Education: Where Are the Software Engineers of Tomorrow?
Computer Science Education: Where Are the Software Engineers of Tomorrow?
Computer Science Education: Where Are the Software Engineers of Tomorrow?
Computer science graduating class of 2007 smallest this decade
Computer tube production years
computerworld 40 yr articles
Computing Change: Researcher Traces History Of The Personal Computer
confluence of virtualization and trusted computing
confluence of virtualization and trusted computing
conformance
conformance
Controlling COBOL DDs named SYSOUT
Convergent Technologies vs Sun
Convergent Technologies vs Sun
Convergent Technologies vs Sun
Cormpany sponsored insurance
Cormpany sponsored insurance
Cost of an identity
Cost of an identity
Costing for IT Services
COTS software on box? to replace mainframe was Re: Curious(?) way to ZIP a mainframe file
COTS software on box? to replace mainframe was Re: Curious(?) way to ZIP a mainframe file
Could you please name sources of information you trust on RFID and/or other Wireless technologies?
Could you please tell me about RADIUS authentication and how it works?
cp67 announced 40 yrs ago at spring 68 share in houston
CPU time differences for the same job
CPU time differences for the same job
CPU time differences for the same job
CPU time differences for the same job
CPU time differences for the same job
CPU time differences for the same job
CPU time differences for the same job
CPU time differences for the same job
CPU time/instruction table
Credit Card Details
Credit Card Fraud
Credit Card Security
Credit Card Security
Credit Card Security
Credit crisis could cost nearly $1 trillion, IMF predicts
Credit crisis could cost nearly $1 trillion, IMF predicts
Credit crisis could cost nearly $1 trillion, IMF predicts
Credit Crisis Timeline
Crippleware: hardware examples
Crippleware: hardware examples
Crippleware: hardware examples
Crippleware: hardware examples
Crippleware: hardware examples
crypto component services - is there a market?
crypto component services - is there a market?
Crypto Related Posts
Crypto Related Posts
CSA 'above the bar'
CSA 'above the bar'
CSA 'above the bar'
CSA 'above the bar'
CSA 'above the bar'
CSA 'above the bar'
CSA 'above the bar'
Curiousity: largest parallel sysplex around?
Curiousity: largest parallel sysplex around?
Curiousity: largest parallel sysplex around?
Current Officers
Current Officers
Current Officers
Current Officers
Current Officers
Current Officers
Current Officers
Current Officers
Current Officers
Cybercrime Could Be As Destructive As Credit Crisis
Cycles per ASM instruction
Cycles per ASM instruction
Cycles per ASM instruction
Cycles per ASM instruction
Cycles per ASM instruction
Damn
Damn
Damn
Damn
Damn
DASD or TAPE attached via TCP/IP
DASD or TAPE attached via TCP/IP
Data Areas Manuals to be dropped
Data Breach Reports Up 69 Percent in 2008
Data Breaches Soar In 2007
Data Breaches Soar In 2007
Data Center Theft
Data Centers Nearing Power-Usage, Cost Crisis
Data Erasure Products
Data Erasure Products
Data leakage - practical measures to improve Information Governance
Data sharing among Industry players about frauds
Database Pioneer Rethinks The Best Way To Organize Data
DB2 & z/OS Dissertation Research
DB2 25 anniversary
DB2 25 anniversary: Birth Of An Accidental Empire
Dealing with the neew MA ID protection law
Death of antivirus software imminent
Death of antivirus software imminent
Death of antivirus software imminent
Death of antivirus software imminent
Death of antivirus software imminent
Death of antivirus software imminent
DEC and news groups
DEC and news groups
DEC and news groups
DEC and news groups
DEC and news groups
DEC and news groups
Dec. 19, 1974: Build Your Own Computer at Home!
Decoding the encryption puzzle
Decoding the encryption puzzle
Decoding the encryption puzzle
Default Search Engines are dangerous, Especially Google <- Domain Name Stealers
Definition of file spec in commands
delegating SSL certificates
Designing database tables for performance?
Designing database tables for performance?
Did early Oracle run on the IBM mainframe?
Did early Oracle run on the IBM mainframe?
Did sub-prime cause the financial mess we are in?
Did you think about Virtualization Security?
Different Implementations of VLIW
Different Implementations of VLIW
Different Implementations of VLIW
dig. TV
dig. TV
Digital cash is the future?
Dilbert is non-fiction
Direction of Stack Growth
Direction of Stack Growth
Direction of Stack Growth
Direction of Stack Growth
Disc Drives
Disc Drives
Disc Drives
Disc Drives
Disc Drives
Discussions areas, private message silos, and how far we've come since 199x
Discussions areas, private message silos, and how far we've come since 199x
Discussions areas, private message silos, and how far we've come since 199x
Discussions areas, private message silos, and how far we've come since 199x
Discussions areas, private message silos, and how far we've come since 199x
Disk drive improvements
Disk drive improvements
Disk drive improvements
Disk drive improvements
Display Technologies Evolution
Distributed Computing
Distributed Computing
Distributed Computing
distributed lock manager
distribution methods
Diversity ( was Re: Usefulness of bidirectional read/write?)
Diversity ( was Re: Usefulness of bidirectional read/write?)
Diversity ( was Re: Usefulness of bidirectional read/write?)
DNS flaw is 2008's biggest web blunder
DNSSEC to be strangled at birth
dnssec?
dnssec?
Do soft certificates provide two factor authentication?
Do you belive Information Security Risk Assessment has shortcoming like
Do you have other examples of how people evade taking resp. for risk
Do you think the change in bankrupcy laws has exacerbated the problems in the housing market leading more people into forclosure?
Do you believe a global financial regulation is possible?
Do you feel secure with your bank's online banking service?
Do you believe Risk Management Practise is on-demand at present?
Does anyone know of a documented case of VM being penetrated by hackers?
Does anyone know of a documented case of VM being penetrated by hackers?
Does anyone know of a documented case of VM being penetrated by hackers?
Does anyone have any IT data center disaster stories?
Does anyone read the Greater IBM Connection Blog?
Does anyone get the idea that those responsible for containing this finanical crisis are doing too much?
Does ARP Belong to Layer 2 Or Layer 3 OSI Reference Model???
does memory still have parity?
does memory still have parity?
Does socket represent an interface between ...?
Does socket represent an interface between ...?
Does software life begin at 40? IBM updates IMS database
Does software life begin at 40? IBM updates IMS database
Does software life begin at 40? IBM updates IMS database
Does software life begin at 40? IBM updates IMS database
Does TCP Need an Overhaul?
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
dollar coins
Donald Knuth stops paying for errata
Doom and Gloom spreads, security revisionism suggests "H6.5: Be an adept!"
DOS C prompt in "Vista"?
DOS C prompt in "Vista"?
Doug Engelbart's "Mother of All Demos"
Dr Geer goes to Washington
Drums: Memory or Peripheral?
Drums: Memory or Peripheral?
Drums: Memory or Peripheral?
Dutch Transport Card Broken
Dutch Transport Card Broken
Dutch Transport Card Broken
Dutch Transport Card Broken
Dutch Transport Card Broken
Each CPU usage
EAL5 Certification for z10 Enterprise Class Server
EAL5 Certification for z10 Enterprise Class Server
Early commercial Internet activities (Re: IBM-MAIN longevity)
Education ranking
Education ranking
Education ranking
Education ranking
Education ranking
Education ranking
Education ranking
Education ranking
Education ranking
Education ranking
Education ranking
Education ranking
Education ranking
Education ranking
Education ranking
Education ranking
Education ranking
Education ranking
Electronic signature outside Europe
Ellison Looks Back As Oracle Turns 30
Ellison Looks Back As Oracle Turns 30
Employees sue for non-paid PC boot-up time
Enterprise Right Management vs. Traditional Encryption Tools
Enterprise: Accelerating the Progress of Linux
EPIC, Ending Piracy of Integrated Circuits
EPIC, Ending Piracy of Integrated Circuits
EPIC, Ending Piracy of Integrated Circuits
EPIC, Ending Piracy of Integrated Circuits
Error handling for system calls
Escaping decades of hidden app development inefficiency and expense
Euro value
EV - what was the reason, again?
Even worse than UNIX
Even worse than UNIX
Even worse than UNIX
Even worse than UNIX
Even worse than UNIX
Even worse than UNIX
Even worse than UNIX
Even worse than UNIX
Everyone is getting same deal out of life: babyboomers can't retire but they get SS benefits intact
EXCP access methos
EXCP access methos
Executive pay: time for a trim?
Executive pay: time for a trim?
Executive pay: time for a trim?
Executive pay: time for a trim?
Expanding U.S. Tactical Aviation's "Approved Belief"
Experts: Education key to U.S. competitiveness
EXTERNAL INTERRUPT and SAPL
EZPass: Yes, Big Brother IS Watching You!
EZPass: Yes, Big Brother IS Watching You!
EZPass: Yes, Big Brother IS Watching You!
EZPass: Yes, Big Brother IS Watching You!
EZPass: Yes, Big Brother IS Watching You!
EZPass: Yes, Big Brother IS Watching You!
EZPass: Yes, Big Brother IS Watching You!
EZPass: Yes, Big Brother IS Watching You!
EZPass: Yes, Big Brother IS Watching You!
EZPass: Yes, Big Brother IS Watching You!
Failure of PKI in messaging
Failure of PKI in messaging ... addenda
Failure of PKI in messaging
Failure of PKI in messaging
Fantasy-Land_Hierarchal_NUMA_Memory-Model_on_Vertical
Fantasy-Land_Hierarchal_NUMA_Memory-Model_on_Vertical
Fantasy-Land_Hierarchal_NUMA_Memory-Model_on_Vertical
Fantasy-Land_Hierarchal_NUMA_Memory-Model_on_Vertical
Fantasy-Land_Hierarchal_NUMA_Memory-Model_on_Vertical
Fantasy-Land_Hierarchal_NUMA_Memory-Model_on_Vertical
Fantasy-Land_Hierarchal_NUMA_Memory-Model_on_Vertical
Fast and Safe C Strings: User friendly C macros to Declare and use C Strings
Fast and Safe C Strings: User friendly C macros to Declare and use C Strings
Fast and Safe C Strings: User friendly C macros to Declare and use C Strings
Faster Chips Are Leaving Programmers in Their Dust
Faster Chips Are Leaving Programmers in Their Dust
Faster Chips Are Leaving Programmers in Their Dust
Faster Chips Are Leaving Programmers in Their Dust
FastTCP Commercialized Into An FTP Appliance
Father Of Financial Dataprocessing
Fazing out x86
Fazing out x86
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FBA rant
FC07 Preliminary Programme - Leaving Room for the Bad Guys
FC5 Special Workshop CFP: Emerging trends in Online Banking and Electronic Payments
FICON tape drive?
File sharing may lead to identity theft
File Transfer conundrum
Financial Analytics in E-Commerce: Starting to Take Shape
Financial Crisis - the result of uncontrolled Innovation?
Fingerprint Firefox Plugin?
First successful PC OS?
First successful PC OS?
Fixed-Point and Scientific Notation
Fixing finance
Fixing our fraying Internet infrastructure
Fixing our fraying Internet infrastructure
Fixing our fraying Internet infrastructure
Fixing our fraying Internet infrastructure
Fixing our fraying Internet infrastructure
Fixing our fraying Internet infrastructure
Fixing our fraying Internet infrastructure
Fixing our fraying Internet infrastructure
Fixing our fraying Internet infrastructure
Fixing SSL (was Re: Dutch Transport Card Broken)
Fixing SSL (was Re: Dutch Transport Card Broken)
Fixing SSL (was Re: Dutch Transport Card Broken)
Fixing SSL (was Re: Dutch Transport Card Broken)
Fixing SSL (was Re: Dutch Transport Card Broken)
Fixing US broadband: $100 billion for fiber to every home
Flash memory arrays
Flash memory arrays
Flash memory arrays
Flash memory arrays
Flash memory arrays
Flying Was: Fission products
Flying Was: Fission products
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
folklore indeed
Folklore references to CP67 at Lincoln Labs
Folklore references to CP67 at Lincoln Labs
Folklore references to CP67 at Lincoln Labs
For the History buff's an IBM 5150 pc
Forbidding Special characters in passwords
Forbidding Special characters in passwords
Forbidding Special characters in passwords
Format Wars: XML v. JSON
Formerly common things
FORTRAN IV program illustrating assigned GO TO on web site
Fraud due to stupid failure to test for negative
Fraud due to stupid failure to test for negative
Fraud due to stupid failure to test for negative
Fraud due to stupid failure to test for negative
Fraud due to stupid failure to test for negative
Fraud due to stupid failure to test for negative
Fraud due to stupid failure to test for negative
Fraud due to stupid failure to test for negative
Fraud due to stupid failure to test for negative
Fraud due to stupid failure to test for negative
Fraud due to stupid failure to test for negative
Fraud due to stupid failure to test for negative
Fraud due to stupid failure to test for negative
Fraud due to stupid failure to test for negative
Fraud due to stupid failure to test for negative
Fraud due to stupid failure to test for negative
Fraud due to stupid failure to test for negative
Fraud due to stupid failure to test for negative
Fraud due to stupid failure to test for negative
Fraud due to stupid failure to test for negative
Fraud in financial institution
fraying infrastructure
fraying infrastructure
fraying infrastructure
fraying infrastructure
Free Checking
Free Checking
Free Checking
Friday musings on the future of 3270 applications
Friday musings on the future of 3270 applications
Fun with Data Theft/Breach Numbers
Future architectures
Future architectures
Future architectures
Future of System/360 architecture?
Future of System/360 architecture?
Fwd: Linux zSeries questions
GA24-3639
Garbage in, garbage out trampled by Moore's law
Garbage in, garbage out trampled by Moore's law
Garbage in, garbage out trampled by Moore's law
Garbage in, garbage out trampled by Moore's law
Garbage in, garbage out trampled by Moore's law
Garbage in, garbage out trampled by Moore's law
Garbage in, garbage out trampled by Moore's law
Garbage in, garbage out trampled by Moore's law
Garbage in, garbage out trampled by Moore's law
Garbage in, garbage out trampled by Moore's law
Garbage in, garbage out trampled by Moore's law
GCN at 25: VAX for the memory
Geekonomics: The Real Cost of Insecure Software
Geothermal was: VLIW pre-history
Geothermal was: VLIW pre-history
German court finds Bank responsible for malwared PC
German court finds Bank responsible for malwared PC
GETMAIN/FREEMAIN and virtual storage backing up
GETMAIN/FREEMAIN and virtual storage backing up
GETMAIN/FREEMAIN and virtual storage backing up
GETMAIN/FREEMAIN and virtual storage backing up
GETMAIN/FREEMAIN and virtual storage backing up
GETMAIN/FREEMAIN and virtual storage backing up
Globa Warning. was Re: : Is SUN going to become x86'ed??
Global Melt Down
Google And IBM Take Aim At Shortage Of Distributed Computing Skills
Google Data Centers 'The Most Efficient In The World'
Google ventures into health records biz
Governance of anonymous financial services
Governance of anonymous financial services
Governance of anonymous financial services
Govt demands password to personal computer
Govt demands password to personal computer
Govt demands password to personal computer
Govt demands password to personal computer
Govt demands password to personal computer
Govt demands password to personal computer
Govt demands password to personal computer
Govt demands password to personal computer
GPG
GPG
GPG
GPG
GPG
GPG
GPG
GPG
GPG
GPG
Graduate Enrollment in 2005
Greed - If greed was the cause of the global meltdown then why does the biz community appoint those who so easily succumb to its temptations?
Greenspan testimony and securization
Grilled Turkey
H2.1 Protocols Divide Naturally Into Two Parts
H6.1: Designing (Security) Without Requirements is like Building a Road Without a Route Map to a Destination You've Never Seen
H6.2 Most Standardised Security Protocols are Too Heavy
H6.2 Most Standardised Security Protocols are Too Heavy
hacked TOPS-10 monitors
hacked TOPS-10 monitors
hacked TOPS-10 monitors
Hackers Attack Apps While Still in Development
Half a Century of Crappy Computing
handling the SPAM on this group
handling the SPAM on this group
handling the SPAM on this group
Hannaford breach illustrates dangerous compliance mentality
Hannaford case exposes holes in law, some say
Hannaford case exposes holes in law, some say
Hannaford case exposes holes in law, some say
Hannaford case exposes holes in law, some say
Hannaford case exposes holes in law, some say
Happy 20th Birthday, AS/400
Happy 30th Birthday!
Happy DEC-20 Day,
Has anyone ever used self-modifying microcode? Would it even be useful?
Has anyone ever used self-modifying microcode? Would it even be useful?
Has anyone ever used self-modifying microcode? Would it even be useful?
Has anyone ever used self-modifying microcode? Would it even be useful?
Has anyone ever used self-modifying microcode? Would it even be useful?
Has anyone got a rule of thumb for calculation data center sizing
Has Banking Industry Overlooked Its Biggest Breach Ever?
Have not the following principles been practically disproven, once and for all, by the current global financial meltdown?
Have you told your Congressman how to VOTE on the auto bailout?
Health Care
Health Care
Help settle a job title/role debate
Help settle a job title/role debate
Hi all Need help in TCP/IP stack Rfcs
High order bit in 31/24 bit address
Historian predicts the end of 'science superpowers'
Historian predicts the end of 'science superpowers'
Historic IBM Building 25 in San Jose destroyed by fire
Historic IBM Building 25 in San Jose destroyed by fire
Historic IBM Building 25 in San Jose destroyed by fire
Historic IBM Building 25 in San Jose destroyed by fire
Historical copy of PGP 5.0i for sale -- reminder of the war we lost
Historical curiosity question
Historical curiosity question
Historical curiosity question
History - Early Green Card
History dictates future of virtualization
History of preprocessing (Burroughs ALGOL)
history question
Hitachi, Silver Lake in talks about hard drives, sources say
Homebanking authentication methods: what's being used by your bank?
Horrid thought about Politics, President Bush, and Democrats
Horrid thought about Politics, President Bush, and Democrats
Horrid thought about Politics, President Bush, and Democrats
Horrid thought about Politics, President Bush, and Democrats
Horrid thought about Politics, President Bush, and Democrats
Horrid thought about Politics, President Bush, and Democrats
Horrid thought about Politics, President Bush, and Democrats
Horses and Cars
Houses
Houses
Houses
How can companies decrease power consumption of their IT infrastructure?
how can a hierarchical mindset really ficilitate inclusive and empowered organization
How can I tell if a keylogger got added to my PC while I was in Beijing?
How did third-party software companies deal with unbundling being sprung on them?
How did http get a port number as low as 80?
How did http get a port number as low as 80?
How did http get a port number as low as 80?
How difficult would it be for a SYSPROG?
How do OTP tokens work?
How do OTP tokens work?
How do you define 'privileged access'?
How do you manage your value statement?
How do you manage your value statement?
How do group members think the US payments business will evolve over the next 3 years?
How do group members think the US payments business will evolve over the next 3 years?
How do group members think the US payments business will evolve over the next 3 years?
How does ATTACH pass address of ECB to child?
How does ATTACH pass address of ECB to child?
How does ATTACH pass address of ECB to child?
How does ATTACH pass address of ECB to child?
How does ATTACH pass address of ECB to child?
How does ATTACH pass address of ECB to child?
How does ATTACH pass address of ECB to child?
How does ATTACH pass address of ECB to child?
How does ATTACH pass address of ECB to child?
How does ATTACH pass address of ECB to child?
How does ATTACH pass address of ECB to child?
How does the smart telco deal with the bounty in its hands?
How fast is XCF
How important, or not, is virtualization to cloud computing?
How is Subprime crisis impacting other Industries?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many 36-bit Unix ports in the old days?
How many overwrites for secure erase?
How much is 700 Billion Dollars??
How much do those small credit card terminals cost per month?
How much knowledge should a software architect have regarding software security?
How old are you?
How powerful C64 may have been if it used an 8 Mhz 8088 or 68008?microprocessor (with otherwise the same hardware)?
How powerful C64 may have been if it used an 8 Mhz 8088 or 68008?microprocessor (with otherwise the same hardware)?
How powerful C64 may have been if it used an 8 Mhz 8088 or 68008?microprocessor (with otherwise the same hardware)?
How reliable are the credit rating companies? Who is over seeing them?
How Safe Are Your Personal Records In The Hands Of Government Officials?
How safe do you feel when using a debit or credit card?
How security audits, vulnerability assessments and penetration tests differ?
How Should The Government Spend The $700 Billion?
How the Internet took over
How the pages tables of each segment is located
How the pages tables of each segment is located
How to write a full-screen Rexx debugger?
How to write a full-screen Rexx debugger?
How to flush data most efficiently from memory to disk when db checkpoint?
How to tell a fake SSL certificate from a real one
How to tell a fake SSL certificate from a real one
How to tell a fake SSL certificate from a real one
How to tell a fake SSL certificate from a real one
How to tell a fake SSL certificate from a real one
How to tell a fake SSL certificate from a real one
How to calculate effective page fault service time?
How to Plan a High Value Sales Campaign Using Military Principles
How to crack RSA
How were you using the internet 10 years ago and how does that differ from how you use it today?
How would a relational operating system look like?
How would a relational operating system look like?
https question
Human error tops the list of security threats
Hypervisors May Replace Operating Systems As King Of The Data Center
Hypervisors May Replace Operating Systems As King Of The Data Center
Hypervisors May Replace Operating Systems As King Of The Data Center
Hypervisors May Replace Operating Systems As King Of The Data Center
Hypervisors May Replace Operating Systems As King Of The Data Center
Hypervisors May Replace Operating Systems As King Of The Data Center
Hypervisors May Replace Operating Systems As King Of The Data Center
Hypothesis #4 -- The First Requirement of Security is Usability
I am trying to find out how CPU burst time is caluculated based on which CPU scheduling algorithms are created?
I was wondering what types of frauds the audience think will increase?
I/O in Emulated Mainframes
IBM 029 keypunch -- 0-8-2 overpunch -- what hex code results?
IBM 029 keypunch -- 0-8-2 overpunch -- what hex code results?
IBM 029 keypunch -- 0-8-2 overpunch -- what hex code results?
IBM 029 keypunch -- 0-8-2 overpunch -- what hex code results?
IBM 029 keypunch -- 0-8-2 overpunch -- what hex code results?
IBM 360 Model 20 Questions
IBM 360 Model 20 Questions
IBM 360 Model 20 Questions
IBM 360 Model 20 Questions
IBM 360 Model 20 Questions
IBM 360 Model 20 Questions
IBM 8000 series
IBM 8000???
IBM announced z10 ..why so fast...any problem on z 9
IBM announced z10 ..why so fast...any problem on z 9
IBM celebrates forgotten supercomputer
IBM CEO's remuneration last year?
IBM CEO's remuneration last year?
IBM drops Power7 drain in 'Blue Waters'
IBM emulator for ICL 1900
IBM Floating-point myths
IBM Floating-point myths
IBM Floating-point myths
IBM Floating-point myths
IBM LCS
IBM LCS
IBM LCS
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM mainframe history, was Floating-point myths
IBM manual web pages
IBM obsoleting mainframe hardware
IBM obsoleting mainframe hardware
IBM obsoleting mainframe hardware
IBM PC competitors
IBM PC competitors
IBM PC competitors
IBM Preview of z/OS V1.10
IBM Releases Office Desktop Software at No Charge to Foster Collaboration
IBM S/360 series operating systems history
IBM S/360 series operating systems history
IBM S/360 series operating systems history
IBM S/360 series operating systems history
IBM S/360 series operating systems history
IBM S/360 series operating systems history
IBM S/360 series operating systems history
IBM S/360 series operating systems history
IBM S/360 series operating systems history
IBM S/360 series operating systems history
IBM S/360 series operating systems history
IBM S/360 series operating systems history
IBM sees decline in number of U.S IT pros, boom in China
IBM sues maker of Intel-based Mainframe clones
IBM System z9
IBM System z9
IBM System 64
IBM System/3 & 3277-1
IBM System/3 & 3277-1
IBM System/3 & 3277-1
IBM System/3 & 3277-1
IBM System/3 & 3277-1
IBM System/3 & 3277-1
IBM System/3 & 3277-1
IBM System/3 & 3277-1
IBM System/3 & 3277-1
IBM System/3 & 3277-1
IBM System/3 & 3277-1
IBM System/360 Model 85: The Bashful Computer
IBM System/360 signs above control panels - different styles - why?
IBM System/360 DOS still going strong as Z/VSE
IBM System/360 DOS still going strong as Z/VSE
IBM System/360 DOS still going strong as Z/VSE
IBM THINK original equipment sign
IBM THINK original equipment sign
IBM THINK original equipment sign
IBM to the PCM market
IBM to the PCM market(the sky is falling!!!the sky is falling!!)
IBM to the PCM market(the sky is falling!!!the sky is falling!!)
IBM to the PCM market(the sky is falling!!!the sky is falling!!)
IBM to the PCM market(the sky is falling!!!the sky is falling!!)
IBM to the PCM market
IBM to the PCM market(the sky is falling!!!the sky is falling!!)
IBM to the PCM market
IBM to the PCM market
IBM to the PCM market
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM Unionization
IBM URL of all available lists?
IBM Z6 processor
IBM Z6 processor
IBM's 2Q2008 Earnings
IBM's 2Q2008 Earnings
IBM's 2Q2008 Earnings
IBM's 2Q2008 Earnings
IBM's Webbie World
IBM--disposition of clock business
IBM--disposition of clock business
IBM--disposition of clock business
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBM-MAIN longevity
IBMLink 2000 Finding ESO levels
IBMLink 2000 Finding ESO levels
IBMLink 2000 Finding ESO levels
IBMLink 2000 Finding ESO levels
Identity resurges as a debate topic
Identity Theft Prevention tips
if you are an powerful financial regulator , how would you have stopped the credit crunch?
If you had a massively parallel computing architecture, what unsolved problem would you set out to solve?
If your CSO lacks an MBA, fire one of you
If your CSO lacks an MBA, fire one of you
If your CSO lacks an MBA, fire one of you
If your CSO lacks an MBA, fire one of you
illegal aliens
illegal aliens
illegal naked short selling
important
In light of the recent financial crisis, did Sarbanes-Oxley fail to work?
In Modeling Risk, the Human Factor Was Left Out
In The US, Email Is Only For Old People
In your experience which is a superior debit card scheme - PIN based debit or signature debit?
In your experience which is a superior debit card scheme - PIN based debit or signature debit?
In your experience which is a superior debit card scheme - PIN based debit or signature debit?
In your experience which is a superior debit card scheme - PIN based debit or signature debit?
In your experience which is a superior debit card scheme - PIN based debit or signature debit?
In your experience which is a superior debit card scheme - PIN based debit or signature debit?
In your experience which is a superior debit card scheme - PIN based debit or signature debit?
In your experience which is a superior debit card scheme - PIN based debit or signature debit?
Inaccurate CPU% reported by RMF and TMON
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
independent appraisers
India is outsourcing jobs as well
India is outsourcing jobs as well
Industry Standard Time To Analyze A Line Of Code
Information security breaches quadrupled in 2007
Information Security Vs. Businesss Resilience
information utility
Innovation: biggest draw in the West
Inside a Modern Malware Distribution System
Inside the High-Tech Hunt for a Missing Silicon Valley Legend
insider fraud
instruction sets, was Direction of Stack Growth
instructions for computers
Intel memory latencies
Intel prepares to kill off the Pentium 4
Intel Ships Power-Efficient Penryn CPUs
Intel Ships Power-Efficient Penryn CPUs
Intel Ships Power-Efficient Penryn CPUs
Intel Ships Power-Efficient Penryn CPUs
Intel Ships Power-Efficient Penryn CPUs
Intel: an expensive many-core future is ahead of us
Intel: an expensive many-core future is ahead of us
Intel: an expensive many-core future is ahead of us
Intel: an expensive many-core future is ahead of us
Intel: an expensive many-core future is ahead of us
Intel: an expensive many-core future is ahead of us
Intel: an expensive many-core future is ahead of us
Intel: an expensive many-core future is ahead of us
Intel: an expensive many-core future is ahead of us
Intel: an expensive many-core future is ahead of us
Intel: an expensive many-core future is ahead of us
Intel: an expensive many-core future is ahead of us
Intel: an expensive many-core future is ahead of us
Intel: an expensive many-core future is ahead of us
Interesting ibm about the myths of the Mainframe
Interesting ibm about the myths of the Mainframe
Interesting Mainframe Article: 5 Myths Exposed
Interesting Mainframe Article: 5 Myths Exposed
Interesting Mainframe Article: 5 Myths Exposed
Internal DASD Pathing
Internal DASD Pathing
Internal DASD Pathing
internet game history
internet game history
Interrupts
Interrupts
Invitation to Join Mainframe Security Guru Group
IPv6 vs Y2K and GOSIP
Ironkey
Is a RISC chip more expensive?
Is a military model of leadership adequate to any company, as far as it based most on authority and discipline?
Is American capitalism and greed to blame for our financial troubles in the US?
Is anyone still running
Is anyone still running
Is anyone interested in starting a CICS specific group?
Is Basel 2 out...Basel 3 in?
Is Basel 2 out...Basel 3 in?
Is computer history taugh now?
Is computer history taugh now?
Is computer history taugh now?
Is computer history taugh now?
Is computer history taugh now?
Is computer history taugh now?
Is computer history taugh now?
Is computer history taugh now?
Is computer history taugh now?
Is computer history taugh now?
Is computer history taugh now?
Is computer history taugh now?
Is computer history taugh now?
Is computer history taugh now?
Is computer history taugh now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is computer history taught now?
Is data classification the right approach to pursue a risk based information security program?
Is Information Security driven by compliance??
Is IT becoming extinct?
Is IT becoming extinct?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Parallel Programming Just Too Hard?
Is Pride going to decimate the auto Industry?
Is Silicon Valley strangeled by SOX?
Is SUN going to become x86'ed??
Is SUN going to become x86'ed??
Is SUN going to become x86'ed??
Is SUN going to become x86'ed??
Is SUN going to become x86'ed??
Is SUN going to become x86'ed??
Is SUN going to become x86'ed??
Is SUN going to become x86'ed??
Is SUN going to become x86'ed??
Is that secure : <form action="https" from a local HTML page?
Is the media letting banks off the hook on payment card security
Is the media letting banks off the hook on payment card security
Is the media letting banks off the hook on payment card security
Is the media letting banks off the hook on payment card security
Is the media letting banks off the hook on payment card security
Is the media letting banks off the hook on payment card security
Is the media letting banks off the hook on payment card security
Is the media letting banks off the hook on payment card security
Is The Government Reselling Tapes With Sensitive Data?
Is the credit crunch a short term aberation
Is the Credit Cruch a boost for Virtualization?
Is there any technology that we are severely lacking in the Financial industry?
Is This a Different Kind of Financial Crisis?
Is this the story behind the crunchy credit stuff?
Is this Risk Management's Waterloo?
Is this Risk Management's Waterloo?
Is Virtualisation a Fad?
Is virtualization diminishing the importance of OS?
ISA Support for Multithreading
ISA Support for Multithreading
ISA Support for Multithreading
ISAM and/or self-modifying channel programs
Isn't it the Federal Reserve role to oversee the banking system??
ISPF Limitations (was: Need for small machines ... )
ISPF not productive
IT full of 'ducks'? Declare open season
It has been a long time since Ihave seen a printer
It keeps getting uglier
It keeps getting uglier
It keeps getting uglier
It keeps getting uglier
It keeps getting uglier
It keeps getting uglier
It keeps getting uglier
IT managers stymied by limits of x86 virtualization
IT managers stymied by limits of x86 virtualization
IT managers stymied by limits of x86 virtualization
IT Security Statistics
IT vet Gordon Bell talks about the most influential computers
IT vet Gordon Bell talks about the most influential computers
It's a Presidential Mandate, Feds use it. How come you are not using FDE?
It's No Secret: VMware to Develop Secure Systems for NSA
It's No Secret: VMware to Develop Secure Systems for NSA
It's No Secret: VMware to Develop Secure Systems for NSA
It's Too Darn Hot
It's Too Darn Hot
Java; a POX
Javascript disabled in Firefox
JCL parms
JCL parms
JES2 or JES3, Which one is older?
Jim Gray Is Missing
Jim Gray Is Missing
Jim Gray Is Missing
Jim Gray Is Missing
Jim Gray Is Missing
Jim Gray Is Missing
Job ad for z/OS systems programmer trainee
Job ad for z/OS systems programmer trainee
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies (Actually, Working under the table!)
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
John W. Backus, 82, Fortran developer, dies
Just another example of mainframe costs
Just another example of mainframe costs
Just another example of mainframe costs
Just another example of mainframe costs
Just another example of mainframe costs
Just another example of mainframe costs
K6 again, again and again. Therefore, H6.4 -- Compromise on Security before Delivery
Kaspersky calls for a more secure internet
Keep VM 24X7 365 days
Keeping private information private
Kerberized authorization service
Kerberized authorization service
Kernels
Kernels
Kernels
Kernels
Kernels
Kernels
Kernels
Know Your Enemy: Scott McNeally on security theater
lack of information accuracy
lack of information accuracy
lack of information accuracy
lack of information accuracy
lack of information accuracy
lack of information accuracy
lack of information accuracy
lack of information accuracy
lack of information accuracy
lack of information accuracy
Lack of fraud reporting paths considered harmful
Lack of fraud reporting paths considered harmful
Lack of fraud reporting paths considered harmful
Larrabee details: Yes, it is based on the Pentium. :-)
Latest OECD broadband data puts US in middle of the pack on speed, price
Latest Principles of Operation
Latest Principles of Operation
Latest Principles of Operation
Latest Principles of Operation
latest Principles of Operation
Laugh, laugh. I thought I'd die - application crashes
LAX IT failure: leaps of faith don't work
LAX IT failure: leaps of faith don't work
Leadership, the very definition of fraud, and the court of security ideas
Leadership, the very definition of fraud, and the court of security ideas
Leadership, the very definition of fraud, and the court of security ideas
Lean and Mean: 150,000 U.S. layoffs for IBM?
Lean and Mean: 150,000 U.S. layoffs for IBM?
least structured statement in a computer language. And the winner
Lehman sees banks, others writing down $400 bln
Let IT run the company!
Liability for breaches: do we need new laws?
Liability for breaches: do we need new laws?
Liability for breaches: do we need new laws?
LINC-8 Front Panel Questions
LINC-8 Front Panel Questions
LINC-8 Front Panel Questions
Linus: Security is "people wanking around with their opinions"
Linux zSeries questions
Linux zSeries questions
Linux zSeries questions
Linux zSeries questions
Linux: The Completely Fair Scheduler
Linux: The Completely Fair Scheduler
Linux: The Completely Fair Scheduler
Linux: The Completely Fair Scheduler
Linux: The Completely Fair Scheduler
Linux: The Completely Fair Scheduler
Loads Weighing Heavily on Roads
Loads Weighing Heavily on Roads
Long running Batch programs keep IMS databases offline
Lynn - You keep using the term "we" - who is "we"?
MAC and SSL
MAC and SSL
MAC and SSL
Machine-Level Assembly Language
Machine-Level Assembly Language
Macs for security (now, with new improved NSA hardening tips!)
mainframe = superserver
mainframe developer = permanent position - Dublin Ireland
Mainframe files under AIX etc
Mainframe Funeral
mainframe performance, was Is a RISC chip more expensive?
mainframe performance, was Is a RISC chip more expensive?
mainframe performance, was Is a RISC chip more expensive?
Mainframe programming vs the Web
Mainframe programming vs the Web
Mainframe Project management
MAINFRAME Training with IBM Certification and JOB GUARANTEE
MAINFRAME Training with IBM Certification and JOB GUARANTEE
MAINFRAME Training with IBM Certification and JOB GUARANTEE
MAINFRAME Training with IBM Certification and JOB GUARANTEE
MAINFRAME Training with IBM Certification and JOB GUARANTEE
Mainframe vs. "Server" (Was Just another example of mainframe
Making tea
Making tea
Making tea
Making tea
man in the middle, SSL
man in the middle, SSL ... addenda
man in the middle, SSL
man in the middle, SSL
man in the middle, SSL ... addenda 2
MapReduce - a Major Step Backwards?
MapReduce - a Major Step Backwards?
Marines look for a few less servers, via virtualization
Mastering the Dynamics of Innovation
md5
Medical care
Memories of ACC, IBM Channels and Mainframe Internet Devices
Memory Instrumentation - was "largest parallel sysplex around?"
Memory Mapped Vs I/O Mapped Vs others
Memory Mapped Vs I/O Mapped Vs others
Metcalfe Pitches Terabit Ethernet
Michigan industry
Michigan industry
Michigan industry
Michigan industry
Michigan industry
Michigan industry
Michigan industry
Michigan industry
Michigan industry
Microsoft asserts itself as an uber-CA
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
Microsoft versus Digital Equipment Corporation
middle banking in a english muddle
middle banking in a english muddle
Migration from Mainframe to othre platforms - the othe bell?
Migration from Mainframe to othre platforms - the othe bell?
Migration from Mainframe to othre platforms - the othe bel?
Migration from Mainframe to othre platforms - the othe bell?
Migration from Mainframe to othre platforms - the othe bell?
Migration from Mainframe to othre platforms - the othe bell?
Migration from Mainframe to othre platforms - the othe bell?
Miniature clusters
MIPS and RISC
MIPS and RISC
MITM spotted in Tor
Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
Mixed Case Password on z/OS 1.7 and ACF 2 Version 8
Mobile Payment/All-in-One Card
modern paging
modern paging
Monetary affairs on free reign, but the horse has Boulton'd
more fun with new, 40yr old technology
more fun with new, 40yr old technology
more on (the new 40+ yr old) virtualization
more on (the new 40+ yr old) virtualization
more on (the new 40+ yr old) virtualization
more on (the new 40+ yr old) virtualization
more on (the new 40+ yr old) virtualization
more on (the new 40+ yr old) virtualization
more on (the new 40+ yr old) virtualization
more on (the new 40+ yr old) virtualization
more on (the new 40+ yr old) virtualization
more on (the new 40+ yr old) virtualization
more on (the new 40+ yr old) virtualization
more on (the new 40+ yr old) virtualization
more on (the new 40+ yr old) virtualization
More on GPS troubles
more on firing your MBA-less CSO
more shared segment archeology
more shared segment archeology
More Tipping Point evidence - POS vendors sued
more transactional memory for mutlithread/multiprocessor operation
Morten Reistad? Marine Cables to Mid East cut?
Move over US -- China to be new driver of world's economy and innovation
Move over US -- China to be new driver of world's economy and innovation
moving on
MS to world: Stop sending money, we have enough - was Re: Most ... can't run Vista
MS to world: Stop sending money, we have enough - was Re: Most ... can't run Vista
MS to world: Stop sending money, we have enough - was Re: Most ... can't run Vista
MTS *FS tape format?
MTS memories
MTS memories
Mulally motors on at Ford
Multi-Factor Authentication - Moving Beyond Passwords for Security of Online Transactions
Multicore boom needs new developer skills
multics source is now open
My Dream PC -- Chip-Based
My Dream PC -- Chip-Based
My Dream PC -- Chip-Based
My Dream PC -- Chip-Based
My Dream PC -- Chip-Based
My Dream PC -- Chip-Based
My Dream PC -- Chip-Based
My Dream PC -- Chip-Based
My Dream PC -- Chip-Based
My Dream PC -- Chip-Based
My Dream PC -- Chip-Based
My Dream PC -- Chip-Based
My Dream PC -- Chip-Based
My Dream PC -- Chip-Based
My Dream PC -- Chip-Based
My Dream PC -- Chip-Based
My Dream PC -- Chip-Based
My Funniest or Most Memorable Moment at IBM
My last post in this forum
Nat'l Surface Transportion Policy & Revenue Study Cmsn
Near-perfection achieved by solar absorber
Need Help filtering out sporge in comp.arch
Need Help filtering out sporge in comp.arch
Neglected IT Tasks May Have Led to Bank Meltdown
Nerdy networking kid crashes the party
New 'virtual IT job' could be very real
new 40+ yr old, disruptive technology
new 40+ yr old, disruptive technology
new 40+ yr old, disruptive technology
new 40+ yr old, disruptive technology
new 40+ yr old, disruptive technology
new 40+ yr old, disruptive technology
New Credit Cards May Leak Personal Information
New machine code
New machine code
New machine code
New machine code
New machine code
New machine code
New machine code
New Opcodes
New Opcodes
New Opcodes
New Opcodes
New Opcodes
New Research Confirms Identity Fraud Is On Decline
New Research Confirms Identity Fraud Is On Decline
New technology trends?
New test attempt
New test attempt
New test attempt
New test attempt
New test attempt
New test attempt
New test attempt
New, 40+ yr old, direction in operating systems
New, 40+ yr old, direction in operating systems
New, 40+ yr old, direction in operating systems
newbie need help (ECC and wireless)
newbie need help (ECC and wireless)
Newbie question on table design
Newbie question on table design
Newbie question on table design
Newbie question on table design
Newbie question on table design
Newbie question on table design
Newbie question on table design
Newbie question on table design
Newbie question on table design
Newbie question on table design
Newbie question on table design
Newbie question on table design
Newbie question about db normalization theory: redundant keys OK?
news maintenance: Prison pushes
News report: Federal court rules that Novell still owns UNIX
News.com: IBM donates new privacy tool to open-source Higgins
News.com: IBM donates new privacy tool to open-source Higgins
Newsgroups dying?
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Newsweek article--baby boomers and computers
Next Generation Security
Nike 90 football shoes for sale
No Glory for the PDP-15
No Glory for the PDP-15
No Glory for the PDP-15
No Glory for the PDP-15
No Glory for the PDP-15
No Glory for the PDP-15
No Glory for the PDP-15
No Glory for the PDP-15
No Glory for the PDP-15
No Gory for the *NIX
No offense to any one but is DB2/6000 an old technology. Does anybody still use it, if so what type of industries??
Non-repudiation, Evidence and TLS: another fine mess I've got you into :-(
Non-Standard Mainframe Language?
Non-Standard Mainframe Language?
Non-Standard Mainframe Language?
Non-Standard Mainframe Language?
Non-Standard Mainframe Language?
Non-Standard Mainframe Language?
Nonviolent Activists Are Now Terrorists
not crypto, but fraud detection
not crypto, but fraud detection
nouns and adjectives
nouns and adjectives
nouns and adjectives
nouns and adjectives
nouns and adjectives
nouns and adjectives
nouns and adjectives
nouns and adjectives
nouns and adjectives
nouns and adjectives
nouns and adjectives
nouns and adjectives
nouns and adjectives
NSFNET (long post warning)
NSFnet -- 20 Years of Internet Obscurity and Insight
NYCE Revives "Safe Debit" Name for PINless Debit Test Set for '09
Obama, ACORN, subprimes (Re: Spiders)
Obama, ACORN, subprimes (Re: Spiders)
Obama, ACORN, subprimes (Re: Spiders)
Obama, ACORN, subprimes (Re: Spiders)
Obama, ACORN, subprimes (Re: Spiders)
Obama, ACORN, subprimes (Re: Spiders)
Obfuscation was: Definition of file spec in commands
Object-relational impedence
OCO, documentation, support from IBM-Main, etc
Oddly good news week: Google announces a Caps library for Javascript
Oddly good news week: Google announces a Caps library for Javascript
Oddly good news week: Google announces a Caps library for Javascript
Off Topic But Concept should be Known To All
old 370 info
old 370 info
old discussion of disk controller chache
Old hardware
Old hardware
old internal network references
old lisa info
old productivity response time studies
old tapes
old tapes
old tapes
old tapes
Old XDS Sigma stuff
Old XDS Sigma stuff
Old XDS Sigma stuff
Old XDS Sigma stuff
On cleaning up the security mess: escaping the self-perpetuating trap of Fraud?
on Revocation of Signing Certs and Public Key Signing itself
on Revocation of Signing Certs and Public Key Signing itself
On the downside of the MBA-equiped CSO
on-demand computing
on-demand computing
on-demand computing
on-demand computing
Once the dust settles, do you think Milton Friedman’s economic theories will be laid to rest
One OS for everybody
One Time Identification, a request for comments/testing
ongoing rush to the new, 40+ yr old virtual machine technology
ongoing rush to the new, 40+ yr old virtual machine technology
ongoing rush to the new, 40+ yr old virtual machine technology
ongoing rush to the new, 40+ yr old virtual machine technology
ongoing rush to the new, 40+ yr old virtual machine technology
Online Bill Payment Website Hijacked - Users were redirected to a page serving malware
Op codes removed from z/10
open source voting
Open Source, Unbundling, and Future System
Open Source, Unbundling, and Future System
Open z architecture and Linux questions
Open z/Architecture or Not
Open z/Architecture or Not
OpenPGP becomes RFC4880. Consider Hypothesis #1: The One True Cipher Suite
Operating systems are old and busted
Operating systems are old and busted
Operating systems are old and busted
Operating systems are old and busted
Operating systems are old and busted
Operating systems are old and busted
Opsystems
Oracle Introduces Oracle VM As It Leaps Into Virtualization
Oracle Introduces Oracle VM As It Leaps Into Virtualization
Oracle Introduces Oracle VM As It Leaps Into Virtualization
Oracle Introduces Oracle VM As It Leaps Into Virtualization
Oracle Raises Stakes With BEA Offer
Original Colossal Cave Adventure
Original Colossal Cave Adventure
Orwellian Apple ad celebrates 25th birthday
Orwellian Apple ad celebrates 25th birthday
OS X Finder windows vs terminal window weirdness
OS X Finder windows vs terminal window weirdness
OS X Finder windows vs terminal window weirdness
OS X Finder windows vs terminal window weirdness
OS X Finder windows vs terminal window weirdness
OS X Finder windows vs terminal window weirdness
OS X Finder windows vs terminal window weirdness
OS X Finder windows vs terminal window weirdness
Osama bin Laden gets a cosmetic makevover in his British Vanity Passport
OSI abandoned!
OSI abandoned!
our Barb: WWII
Our security sucks. Why can't we change? What's wrong with us?
Our security sucks. Why can't we change? What's wrong with us?
Outsourcing dilemma or debacle, you decide
Outsourcing dilemma or debacle, you decide
Outsourcing loosing steam?
outsourcing moving up value chain
Own a piece of the crypto wars
PAAppViewer3 (AppViewer3)?
Palestine (was 1975 movie "Three Days of the Condor"
Palestine (was 1975 movie "Three Days of the Condor"
Palestine (was 1975 movie "Three Days of the Condor"
Panic in Multicore Land
Panic in Multicore Land
Panic in Multicore Land
parallel computing book
Paris
Parse/Template Function
Password Rules
Password Rules
Patents, Copyrights, Profits, Flex and Hercules
Patents, Copyrights, Profits, Flex and Hercules
Patents, Copyrights, Profits, Flex and Hercules
Payment Card + Digital Signature
Payments Security in RFS
Paypal -- Practical Approaches to Phishing -- open white paper
PC premiered 40 years ago to awed crowd
PC premiered 40 years ago to awed crowd
PC premiered 40 years ago to awed crowd
pc/370
pc/370
PCI Compliance - Encryption of all non-console administrative access
PCI Compliance - Encryption of all non-console administrative access
PCI needs to address virtualization, experts say
PCI's Bob Russo: Data loss hurts brand more than a fine
PDP-1 Spacewar! program internals
Pennsylvania Railroad ticket fax service
Pennsylvania Railroad ticket fax service
Perfect MITM Attacks With No-Check SSL
performance of hardware dynamic scheduling
performance of hardware dynamic scheduling
performance of hardware dynamic scheduling
performance of hardware dynamic scheduling
performance of hardware dynamic scheduling
Peter Gutmann Rips Windows Vista Content Protection
PIN devices vulnerable to 'tapping' attacks, researchers warn
PIN entry on digital signatures + extra token
PKI moving to adopt the plugin model -- realignment to security based on user-needs?
PKI: The terrorists' secret weapon
PKI: The terrorists' secret weapon (part II)
PL/S programming language
PL/S programming language
Pogo reports: big(gest) bank breach was covered up?
Pogo reports: big(gest) bank breach was covered up?
Point-of-Sale security
Poll: oldest computer thing you still use
Poll: oldest computer thing you still use
Poll: oldest computer thing you still use
Poll: oldest computer thing you still use
Poll: oldest computer thing you still use
Poll: oldest computer thing you still use
Poll: oldest computer thing you still use
Poll: oldest computer thing you still use
Poll: oldest computer thing you still use
Poll: oldest computer thing you still use
Poll: oldest computer thing you still use
Poll: oldest computer thing you still use
Poll: oldest computer thing you still use
Poll: oldest computer thing you still use
Poll: oldest computer thing you still use
Poster of computer hardware events?
Poster of computer hardware events?
Power sources
Price of CPU seconds
Price of CPU seconds
Price of CPU seconds
Price point
Primaries (USA)
Primaries (USA)
Prison pushes for exploitation of slave labor of prisoners
Privacy, Identity theft, account fraud
pro- foreign key propaganda?
pro- foreign key propaganda?
pro- foreign key propaganda?
Problem with TCP connection close
Programmable TLB management?
PSI MIPS
PSI MIPS
PSI MIPS
Public Computers
Public Computers
Public Computers
Public Computers
Public Computers
Public Computers
public key password authentication
public key password authentication
public key password authentication
Public key encrypt-then-sign or sign-then-encrypt?
Public key encrypt-then-sign or sign-then-encrypt?
Public key encrypt-then-sign or sign-then-encrypt?
Public key encrypt-then-sign or sign-then-encrypt?
Quality of IBM school clock systems?
Quality of IBM school clock systems?
Quality of IBM school clock systems?
Quality of IBM school clock systems?
Query: Mainframers look forward and back
question for C experts - strcpy vs memcpy
Question on Network Security
Question on DASD Hardware
Questions to the list
Quote from comp.object
Quote from comp.object
Quote from comp.object
Radix Partition Trees
Radix Partition Trees
Radix Partition Trees
Random thoughts
Random thoughts
Ransomware
Rate Monotonic Scheduling (RMS) vs. OS Scheduling
Re-hosting IMB-MAIN
reading erased bits
Real storage usage - a quick question
Real storage usage - a quick question
Realistic dynamics of contactless
Realistic dynamics of contactless
Realistic dynamics of contactless
Really stupid question about z/OS HTTP server
Really stupid question about z/OS HTTP server
realtors (and GM, too!)
realtors (and GM, too!)
realtors (and GM, too!)
realtors (and GM, too!)
realtors (and GM, too!)
realtors (and GM, too!)
recent mentions of 40+ yr old technology
recent mentions of 40+ yr old technology
recent mentions of 40+ yr old technology
recent mentions of 40+ yr old technology
recent mentions of 40+ yr old technology
recent mentions of 40+ yr old technology
recent mentions of 40+ yr old technology
recent mentions of 40+ yr old technology
recent mentions of 40+ yr old technology
recent mentions of 40+ yr old technology
recent mentions of 40+ yr old technology
recent mentions of 40+ yr old technology
recent mentions of 40+ yr old technology
Record Credit card heist...TJM
Regarding the virtual machines
Regarding the virtual machines
Remembering the CDC 6600
Remembering the CDC 6600
Remembering the CDC 6600
Remembering the CDC 6600
Remembering the CDC 6600
Remembering the CDC 6600
Remembering the CDC 6600
Remembering the CDC 6600
Remembering the CDC 6600
Remembering the Cray-1
Remembering The Search For Jim Gray, A Year Later
Removing the Big Kernel Lock
Republican accomplishments and Hoover
Republican accomplishments and Hoover
Researcher: Info overload costs economy
Residual Risk Methodology for Single Factor Authentication
Retailers try to push data responsibilities back to banks
Richard Feynman, the Challenger Disaster, and Software Engineering
Richard Feynman, the Challenger Disaster, and Software Engineering
Rotary phones
Rotary phones
Rotary phones
Rotary phones
Rotary phones
RTFM - IETF RFCs
Running OS/390 on z9 BC
Running REXX program in a batch job
Sad news of Bob Tomasulo's passing
Say it ain't so? MITM protection on SSH shows its paces
Scalable Nonblocking Data Structures
Schneier
Scholars needed to build a computer history bibliography
Scholars needed to build a computer history bibliography
Scholars needed to build a computer history bibliography
Scholars needed to build a computer history bibliography
Scholars needed to build a computer history bibliography
Scholars needed to build a computer history bibliography
Scholars needed to build a computer history bibliography
Scholars needed to build a computer history bibliography
Scholars needed to build a computer history bibliography
Scholars needed to build a computer history bibliography
Science and Engineering Indicators 2008
Sea level
Sea level
Sea level
sealand up for sale
sealand up for sale
SEC bans illegal activity then permits it
SEC bans illegal activity then permits it
Secure64 Develops First Automated DNSSEC Signing Application to Help Secure the Internet Worldwide
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
Securing financial transactions a high priority for 2007
SECURITY and BUSINESS CONTINUITY ..... Where they fit in?
Security Awareness
Security can only be message-based?
security engineering versus information security
security engineering versus information security
security engineering versus information security
Security is a subset of Reliability
Seeking (former) Adventurers
Seeking expert on credit card fraud prevention - particularly CNP/online transactions
Seeking expert on credit card fraud prevention - particularly CNP/online transactions
segmentation or lack thereof
segmentation or lack thereof
Selling Security using Prospect Theory. Or not
Serial vs. Parallel
Serial vs. Parallel
ServerPac Installs and dataset allocations
Shedding light on solar cell technology
Shockwave traffic jam recreated for first time
Should a national regulatory authority stimulate deployment of IPv6?
should I encrypt over a private network?
Should online transactions be allowed on credit cards without adequate safeguards?
Should The CEO Have the Lowest Pay In Senior Management?
Should The CEO Have the Lowest Pay In Senior Management?
Signposts on the US Government's Trail of IT Failures
Signposts on the US Government's Trail of IT Failures
Signposts on the US Government's Trail of IT Failures
Signposts on the US Government's Trail of IT Failures
Signs of Liability: 'Zero Day Threat' blames IT and Security industry
Signs of Liability: 'Zero Day Threat' blames IT and Security industry
Silly beginner questions
Silly beginner questions
SIM-based mobile signature solution to launch new applications
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was: The Perfect Computer - 36 bits?
sizeof() was': The Perfect Computer - 36 bits?
Sizing CPU
Slimmed Down Windows Offers Glimpse Into Microsoft's Virtualization Ambitions
SLL Certificate
SLL Certificate
SMF Under VM
software preservation volunteers ( was Re: LINC-8 Front Panel Questions)
Solution to phishing -- an idea who's time has come?
Solution to phishing -- an idea who's time has come?
Some confusion about virtual cache
Some IBM 3033 information
some old network related discussion
some questions about System z PR/SM
source for VAX programmers
source for VAX programmers
SOX (Sarbanes-Oxley Act), is this really followed and worthful considering current Financial Crisis?
Spammers crack Gmail Captcha
Spammers' bot cracks Microsoft's CAPTCHA
Special characters in passwords was Re: RACF - Password rules
Special characters in passwords was Re: RACF - Password rules
Special characters in passwords was Re: RACF - Password rules
Special characters in passwords was Re: RACF - Password rules
special characters in passwords
Special characters in passwords was Re: RACF - Password rules
Special characters in passwords was Re: RACF - Password rules
Special characters in passwords was Re: RACF - Password rules
Special characters in passwords was Re: RACF - Password rules
Special characters in passwords was Re: RACF - Password rules
Special characters in passwords was Re: RACF - Password rules
Special characters in passwords was Re: RACF - Password rules
Speculation ONLY
Speculation ONLY
squirrels
squirrels
squirrels
squirrels
squirrels
squirrels
squirrels
SSH protocol analyzer
SSL (https, really) accelerators for Linux/Apache?
SSL certificates - from a customer's point of view (trust)
SSL info
SSL info
SSL info
SSL info
SSL MITM-attacks make the news
SSL Security
SSL vs. SSL over tcp/ip
Stalin, Re: Bush - place in history
Stanford University Network (SUN) 3M workstation
Startio Question
Startio Question
Startio Question
Startio Question
Stephen Morse: Father of the 8086 Processor
Stolen credit-card boom
strange FTP problem--transatlantic asymmetry
Strings story
Strings story
Students mostly not ready for math, science college courses
Students mostly not ready for math, science college courses
Students mostly not ready for math, science college courses
Students mostly not ready for math, science college courses
Study Finds Sharp Math, Science Skills Help Expand Economy
Study Finds Sharp Math, Science Skills Help Expand Economy
Study Finds Sharp Math, Science Skills Help Expand Economy
Study Finds Sharp Math, Science Skills Help Expand Economy
STUDY: Lights Out In 2009?
subprime write-down sweepstakes
subprime write-down sweepstakes
subprime write-down sweepstakes
subprime write-down sweepstakes
subprime write-down sweepstakes
subprime write-down sweepstakes
subprime write-down sweepstakes
subprime write-down sweepstakes
Success has many fathers, but failure has the US taxpayer
Success has many fathers, but failure has the US taxpayer
Superconductors and computing
survey of RFC S/MIME signature handling
survey of RFC S/MIME signature handling
Sustainable Web
SVCs
SVCs
SVCs
SVCs
SVCs
sysprog demand
System 360 EBCDIC vs. ASCII
System z10 announcement (in English)
T.J. Maxx data theft worse than first reported
T.J. Maxx data theft worse than first reported
T.J. Maxx data theft worse than first reported
T.J. Maxx data theft worse than first reported
T.J. Maxx data theft worse than first reported
T.J. Maxx data theft worse than first reported
T.J. Maxx data theft worse than first reported
T.J. Maxx data theft worse than first reported
T3 Sues IBM To Break its Mainframe Monopoly
T3 Sues IBM To Break its Mainframe Monopoly
T3 Sues IBM To Break its Mainframe Monopoly
T3 Sues IBM To Break its Mainframe Monopoly
T3 Sues IBM To Break its Mainframe Monopoly
T3 Sues IBM To Break its Mainframe Monopoly
T3 Sues IBM To Break its Mainframe Monopoly
T3 Sues IBM To Break its Mainframe Monopoly
T3 Sues IBM To Break its Mainframe Monopoly
T3 Sues IBM To Break its Mainframe Monopoly
T3 Sues IBM To Break its Mainframe Monopoly
tab browsing
Tamperproof, yet playing Tetris
Tamperproof, yet playing Tetris
Tap and faucet and spellcheckers
Tap and faucet and spellcheckers
Tap and faucet and spellcheckers
Tap and faucet and spellcheckers [was: Re: What do YOU call
Tap and faucet and spellcheckers [was: Re: What do YOU call
Tap and faucet and spellcheckers
Tap and faucet and spellcheckers
Tap and faucet and spellcheckers
Tap and faucet and spellcheckers
Tap and faucet and spellcheckers
Tap and faucet and spellcheckers
Tap and faucet and spellcheckers
tape blocking
Taxcuts
Taxcuts
Taxes
Taxes
Taxes
Taxes
Taxes
Taxes
Taxes
Taxes
Technologists on signatures: looking in the wrong place
Technology and the current crisis
Telecommuniting and teleworking
Tell me why the taxpayer should be saving GM and Chrysler (and Ford) managers & shareholders at this stage of the game?
Tell me why the taxpayer should be saving GM and Chrysler (and Ford) managers & shareholders at this stage of the game?
The 50 most significant moments of Internet history
The bank fraud blame game
The bank fraud blame game
The bank fraud blame game
The bank fraud blame game
The bank fraud blame game
The bank fraud blame game
The bank fraud blame game
The bank fraud blame game
The bank fraud blame game
The bond that fell to Earth
The Complete April Fools' Day RFCs
The Complete April Fools' Day RFCs
The Complete April Fools' Day RFCs
the Depression WWII
the Depression WWII
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Development of the Vital IBM PC in Spite of the Corporate Culture of IBM
The Digital Dark Age or.....Will Google live for ever?
The Downside of Shared Services
The Economic Impact of Stimulating Broadband Nationally
The Economic Impact of Stimulating Broadband Nationally
The Economic Impact of Stimulating Broadband Nationally
The Economic Impact of Stimulating Broadband Nationally
The End of Privacy?
The end of the baby boomers, US bonds maturing, and then what?
The First 100 Dot Coms Ever Registered
The First 100 Dot Coms Ever Registered
The Founder Paradox
The fundamental _barrier to entry_ in the business of payment systems
The Future of CPUs: What's After Multi-Core?
The future of PDSs
The Genealogy of the IBM PC
The Genealogy of the IBM PC
The Genealogy of the IBM PC
The Genealogy of the IBM PC
The hands-free way to steal a credit card
The hands-free way to steal a credit card
The hands-free way to steal a credit card
The hands-free way to steal a credit card
The History of Computer Role-Playing Games
The history of Structure capabilities
The history of Structure capabilities
The history of Structure capabilities
The history of Structure capabilities
The history of Structure capabilities
The history of Structure capabilities
The history of Structure capabilities
The history of Structure capabilities
The human plague
The human plague
The human plague
The human plague
The human plague
The human plague
The human plague
The human plague
The human plague
The human plague
The human plague
The human plague
The interactive experience on yesterday's Unix?
The interactive experience on yesterday's Unix?
The interactive experience on yesterday's Unix?
The Internet's 100 Oldest Dot-Com Domains
The Internet's 100 Oldest Dot-Com Domains
The Internet's 100 Oldest Dot-Com Domains:
The logic of privacy
The logic of privacy
The madness of 'king cores'
The Mainframe in 10 Years
The Mainframe in 10 Years
The name "shell"
The name "shell"
The name "shell"
The name "shell"
The new urgency to fix online privacy
The new urgency to fix online privacy
The new urgency to fix online privacy
The new urgency to fix online privacy
The new urgency to fix online privacy
The new urgency to fix online privacy
The new urgency to fix online privacy
The new urgency to fix online privacy
The new urgency to fix online privacy
The new urgency to fix online privacy
The new urgency to fix online privacy
The new urgency to fix online privacy
The new urgency to fix online privacy
The One True Identity -- cracks being examined, filled, and rotted out from the inside
The One True Identity -- cracks being examined, filled, and rotted out from the inside
The One True Identity -- cracks being examined, filled, and rotted out from the inside
The One True Identity -- cracks being examined, filled, and rotted out from the inside
The Original mcom.com Revived
The original telnet specification?
The Pattern of Engagement in High Value Sales Campaigns
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The Perfect Computer - 36 bits?
The PKC-only application security model
The PKC-only application security model
The PKC-only application security model
The PKC-only application security model
The Price Of Oil --- going beyong US$130 a barrel
The Return of Ada
The Return of Ada
The Return of Ada
The Return of Ada
The Return of Ada
The Return of Ada
The Return of Ada
The Return of Ada
The rise of parallelism (and other computing challenges)
The SLT Search LisT instruction - Maybe another one for the Wheelers
The SLT Search LisT instruction - Maybe another one for the Wheelers
The top 10 dead (or dying) computer skills
The top 10 dead (or dying) computer skills
The top 10 dead (or dying) computer skills
The top 10 dead (or dying) computer skills
The top 10 dead (or dying) computer skills
The top 10 dead (or dying) computer skills
The top 10 dead (or dying) computer skills
The Trouble with Threat Modelling
The Uneasy Ride on the Cryptography Bandwaggon
The Unexpected Fact about the First Computer Programmer
The Unexpected Fact about the First Computer Programmer
The Unexpected Fact about the First Computer Programmer
The Unexpected Fact about the First Computer Programmer
The Univac 110x Architecture Still Lives
The use of "script" for program
The use of "script" for program
The use of "script" for program
The use of "script" for program
The vanishing CEO bonus
The wisdom of the ill informed
The Workplace War for Age and Talent
The Workplace War for Age and Talent
The Workplace War for Age and Talent
Threat assessment Versus Risk assessment
Threatwatch - more data on cost of your identity
Threatwatch: $400 to 'own' your account
Threatwatch: how much to MITM, how quickly, how much lost
Threatwatch: how much to MITM, how quickly, how much lost
Threatwatch: how much to MITM, how quickly, how much lost
Threatwatch: MITB spotted: MITM over SSL from within the browser
Threatwatch: Still searching for the economic MITM
Throwaway cores
Throwaway cores
Throwaway cores
Throwaway cores
Throwaway cores
Throwaway cores
time spent/day on a computer
time spent/day on a computer
time spent/day on a computer
time spent/day on a computer
time spent/day on a computer
time spent/day on a computer
time spent/day on a computer
time spent/day on a computer
Time to rewrite DBMS, says Ingres founder
Time to rewrite DBMS, says Ingres founder
TJ Maxx - why are they still in business?
To the horror of some in the Air Force
To what extent do IP networks meet the stringent requirements of High Availability (HA) where the target performance is 99.999%? What performance is obtained in practice
To: Graymouse -- Ireland and the EU, What in the H... is all this about?
To: Graymouse -- Ireland and the EU, What in the H... is all this about?
To: Graymouse -- Ireland and the EU, What in the H... is all this about?
To: Graymouse -- Ireland and the EU, What in the H... is all this about?
Tom's Hdw review of SSDs
Too much change opens up financial fault lines
Top 10 vulnerabilities for service orientated architecture?
Top financial firms of US are eyeing on bailout. It implies to me that their "Risk Management Department's" assessment was way below expectations
TOPS-10
TOPS-10
TOPS-10
TOPS-10
TOPS-10
TOPS-10
TOPS-10
TOPS-10
TOPS-10
TOPS-10
TOPS-10
TOPS-10
TOPS-10
TOPS-10
TOPS-10
TOPS-10
TOPS-10
TOPS-10
Toshiba Boosts Hard Drive Density By 50%
Toyota Beats GM in Global Production
Toyota Beats GM in Global Production
Toyota Beats GM in Global Production
Toyota Beats GM in Global Production
Toyota Beats GM in Global Production
Toyota Beats GM in Global Production
Toyota Beats GM in Global Production
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota Sales for 2007 May Surpass GM
Toyota takes 1Q world sales lead from General Motors
Toyota's Value Innovation: The Art of Tension
TPM, part 2
Traditional Approach Won’t Take Businesses Far Places
Traffic Jam Mystery Solved By Mathematicians
Transactional Memory
TRANSLATE inst with DAT on
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Translation of IBM Basic Assembler to C?
Trojan with Everything, To Go!
Trojan with Everything, To Go!
Trusted (mainframe) online transactions
Two views of Microkernels (Re: Kernels
Two views of Microkernels (Re: Kernels
Two views of Microkernels (Re: Kernels
Two views of Microkernels (Re: Kernels
Two views of Microkernels (Re: Kernels
Two views of Microkernels (Re: Kernels
Two views of Microkernels (Re: Kernels
Two views of Microkernels (Re: Kernels
Two views of Microkernels (Re: Kernels
U.S. Cedes Top Spot in Global IT Competitiveness
U.S. Cedes Top Spot in Global IT Competitiveness
U.S. Cedes Top Spot in Global IT Competitiveness
U.S. Cedes Top Spot in Global IT Competitiveness
U.S. Cedes Top Spot in Global IT Competitiveness
U.S. Cedes Top Spot in Global IT Competitiveness
U.S. Cedes Top Spot in Global IT Competitiveness
U.S. Cedes Top Spot in Global IT Competitiveness
U.S. Cedes Top Spot in Global IT Competitiveness
U.S. Cedes Top Spot in Global IT Competitiveness
U.S. Cedes Top Spot in Global IT Competitiveness
U.S. Cedes Top Spot in Global IT Competitiveness
U.S. Cedes Top Spot in Global IT Competitiveness
U.S. Cedes Top Spot in Global IT Competitiveness
U.S. Cedes Top Spot in Global IT Competitiveness
U.S. Identity Theft at Record Level in 2007
U.S. Science Funding Hits a Political Wall
UK computer history gets new home
UK Retail Giant Breached by Insider
Unbelievable Patent for JCL
Unbelievable Patent for JCL
University rank of Computer Architecture
University rank of Computer Architecture
uNIX circa 1982?
Unix magic poster
Unsung innovators: 10 people who shaped the computer industry
Unusual Floating-Point Format Remembered?
Up, Up, ... and Gone?
update on old (GM) competitiveness thread
US aerospace and defense sector braces for potential brain drain as Cold War workers retire
US aerospace and defense sector braces for potential brain drain as Cold War workers retire
US aerospace and defense sector braces for potential brain drain as Cold War workers retire
US Air computers delay psgrs
US Airways badmouths legacy system
US or China?
Usable Security 2007
Usable Security 2007
Usefulness of bidirectional read/write?
Usefulness of bidirectional read/write?
Usefulness of bidirectional read/write?
Usefulness of bidirectional read/write?
Usefulness of bidirectional read/write?
Usenet - Dead? Why?
User interface, security, and "simplicity"
user level TCP implementation
user level TCP implementation
Using Military Philosophy to Drive High Value Sales
Using rexx to send an email
Using rexx to send an email
Using rexx to send an email
V2X2 vs. Shark (SnapShot v. FlashCopy)
V2X2 vs. Shark (SnapShot v. FlashCopy)
V2X2 vs. Shark (SnapShot v. FlashCopy)
V2X2 vs. Shark (SnapShot v. FlashCopy)
V2X2 vs. Shark (SnapShot v. FlashCopy)
Value of SSL client certificates?
Value of SSL client certificates?
VCs have a self-destruction gene, let's tweak it
VCs have a self-destruction gene, let's tweak it
Verifying Verified By Visa - Registration breaks chain of trust
Verifying Verified By Visa - Registration breaks chain of trust
Verifying Verified By Visa - Registration breaks chain of trust
Verifying Verified By Visa - Registration breaks chain of trust
Virtual
Virtual
Virtual
Virtual
virtual appliance
Virtual Browsers: Disposable Security
virtual machines, the new, old thing (again)
Virtual private networks
Virtual Storage implementation
Virtual Storage implementation
Virtual Storage implementation
Virtual Storage implementation
Virtual Storage implementation
Virtual Storage implementation
Virtual Storage implementation
Virtual water cooler
Virtualization Adopters Hit The Tipping Point
Virtualization still hot, death of antivirus software imminent
Virtualization Wave
Virtualization's security threats
Virtualization's security threats
Virtualization: Don't Ask, Don't Tell
Virtualization: Everybody's Doing It, but Few Know How
Virtualization: History repeats itself with a search for security
Virtualization: The IT Trend That Matters
Virtualization: The IT Trend That Matters
Virtualization: The IT Trend That Matters
Virtualization: What is it exactly?
Visa and MasterCard mandated PCI compliance as of Jan 1, 2008. I would like to get a feel or opinion on this subject
VLIW pre-history
VLIW pre-history
VLIW pre-history
VLIW pre-history
VLIW pre-history
VLIW pre-history
VLIW pre-history
VLIW pre-history
VLIW pre-history
VLIW pre-history
VLIW pre-history
VLIW pre-history
VLIW pre-history
vm 35th b'day at share in san diego next week
vm folklore, new, 40+ yr old technology
VM system kept NYSE running
VM TSM server support
VM/370 Release 6 Waterloo tape (CIA MODS)
VM/370 Release 6 Waterloo tape (CIA MODS)
vm/sp1
vm/sp1
vm/sp1
VMware Chief Says the OS Is History
VMware Chief Says the OS Is History
VMware Chief Says the OS Is History
VMware Chief Says the OS Is History
VMware Chief Says the OS Is History
VMware Chief Says the OS Is History
VMware Chief Says the OS Is History
VMware Chief Says the OS Is History
VMware Chief Says the OS Is History
VMware Chief Says the OS Is History
VMware Chief Says the OS Is History
VMware Chief Says the OS Is History
VMware Chief Says the OS Is History
VMware Chief Says the OS Is History
VMware Chief Says the OS Is History
VMware Chief Says the OS Is History
VMware Chief Says the OS Is History
VMware Chief Says the OS Is History
VMware Chief Says the OS Is History
VMware renders multitasking OSes redundant
VMware signs deal to embed software in HP servers
VMware: New King Of The Data Center?
VTAM R.I.P. -- SNATAM anyone?
Wachovia Bank web site
Wachovia Bank web site
Wachovia Bank web site
Was CMS multi-tasking?
Was CMS multi-tasking?
Was CMS multi-tasking?
Was CMS multi-tasking?
Was CMS multi-tasking?
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: 1975 movie "Three Days of the Condor" tech stuff
was: How many 36-bit Unix ports in the old days?
We're losing the battle
We're losing the battle
We're losing the battle
We're losing the battle
We're losing the battle
We're losing the battle
We're losing the battle
We're losing the battle
Web Security hasn't moved since 1995
Web Security hasn't moved since 1995
Web Security hasn't moved since 1995
Web Security hasn't moved since 1995
Welcome to Rain Matrix: The Cloud Computing Network
Welcome to Rain Matrix: The Cloud Computing Network
What are security areas to be addressed before starting an e-commerce transaction or setting up a portal?
What are the Black Swans for IT Security?
What are the current INNOVATIVE ICT Security Services, that are in demand or highly marketable at the moment
What do ATMS and card readers use?
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
What do YOU call the # sign?
What do you think are the top characteristics of a good/effective leader in an organization? Do you feel these characteristics are learned or innate to an individual?
What do you think needs to happen with the auto makers to make them viable?
What do you think is holding up the use of cellphone-initiated micro payments in the U.S.?
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
what does xp do when system is copying
What emerging risks are exposed with a shift from paper to electronic retail payments?
What happened to the Teletype Corporation?
What happened to the Teletype Corporation?
What happened to the Teletype Corporation?
What happened to resumable instructions?
What happened to resumable instructions?
What happened in security over the last 10 years?
What happened in security over the last 10 years?
What I miss in my OS
What I miss in my OS
What if there were two Internets?
What if there were two Internets?
What if there were two Internets?
What if phone company had developed Internet?
What if phone company had developed Internet?
What if phone company had developed Internet?
What if phone company had developed Internet?
What if phone company had developed Internet?
What if phone company had developed Internet?
What if phone company had developed Internet?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What if the computers went back to the '70s too?
What is "command reject" trying to tell me?
What is "command reject" trying to tell me?
What is your definition of "Information"?
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
What is "timesharing" (Re: OS X Finder windows vs terminal window weirdness)
what is the difference between web server and application server?
What is the biggest IT myth of all time?
What is better faster CPU speed or wider bus?
What is the level of security in payment systems (credit and bank cards) nowadays?
What is securitization and why are people wary of it?
What is the top security threat prediction of 2009?
What mode of payment you could think of with the advent of time?
what newsgroup server do you use?
What next? from where would the Banks be hit?
What risk of possible data leakage do you see for your organization?
What risk of possible data leakage do you see for your organization?
What to do with extra storage on new z9
What to do about responsible disclosure?
what will be a wow feature in a credit card
What would be a future of technical blogs? I am wondering what kind of services readers except to get from a technical blog in next 10 years
What's a CPU second?
What's your view of current global financial / economical situation?
whats the world going to do when all the baby boomers retire
Wheeler Postings
When risks go south: FM&FM to be nationalized
When risks go south: FM&FM to be nationalized
when was MMU virtualization first considered practical?
when was MMU virtualization first considered practical?
when was MMU virtualization first considered practical?
Where Old Computers Find Their Final Resting Place
Whether, in our financial crisis, the prize for being the biggest liar is
Which is the Fastest (Secure) Way to Exchange 256-bit Keys?
Which is the strongest currency in the world? Now? Projected for the next 3 years?
Which of the latest browsers do you prefer and why?
whiny question: Why won't z/OS support the HMC 3270 emulator
Whitehouse Emails Were Lost Due to "Upgrade"
Who do we have to blame for the mortgage crisis in America?
Who do we have to blame for the mortgage crisis in America?
Who do we have to blame for the mortgage crisis in America?
Who murdered the financial system?
Who's Winning the ID Theft War?
Why 'pop' and not 'pull' the complementary action to 'push' for a stack
Why are some banks failing, and others aren't?
Why can't we analyze the risks involved in mortgage-backed securities?
Why did Sox not prevent this financal crisis?
Why Didn't Digital Catch the Wave?
Why do we think virtualization is new?
Why do Banks lend poorly in the sub-prime market? Because they are not in Banking!
Why do Banks lend poorly in the sub-prime market? Because they are not in Banking!
Why is switch to DSL so traumatic?
Why is not AIX ported to z/Series?
Why Is Less Than 99.9% Uptime Acceptable?
Why is sub-prime crisis of America called the sub-prime crisis?
Why is sub-prime crisis of America called the sub-prime crisis?
Why isn't OMVS command integrated with ISPF?
Why not build a shared services infrastructure to support the banking sector?
Why Ping Requires RAW Sockets?
Why Security Modelling doesn't work -- the OODA loop of today's battle
Why Security Modelling doesn't work -- the OODA loop of today's battle
Why Security Modelling doesn't work -- the OODA loop of today's battle
Why Security Modelling doesn't work -- the OODA loop of today's battle
Why self describing data formats:
Why self describing data formats:
Why so little parallelism?
Why so little parallelism?
Why SSNs Are Not Appropriate for Authentication and when, where and why should you offer/use it?
Why was Sarbanes-Oxley not good enough to sent alarms to the regulators about the situation arising today?
Will cards with PayPass (from MasterCard) be using CHIP & PIN in the future?
Windows Live vs Kerberos
Windows Live vs Kerberos
Windows Monitor or CUSP?
Windows Monitor or CUSP?
Windows Monitor or CUSP?
Windows Monitor or CUSP?
Windows Monitor or CUSP?
Windows Monitor or CUSP? [was ReJohn W. Backus, 82, Fortran developer, dies]
Windows Monitor or CUSP?
Windows Monitor or CUSP? [was ReJohn W. Backus, 82, Fortran developer, dies]
Windows Monitor or CUSP?
windows time service
windows time service
windows time service
windows time service
windows time service
windows time service
windows time service
windows time service
Windows: Monitor or CUSP?
Windows: Monitor or CUSP?
WindowsMonitor or CUSP?
WindowsMonitor or CUSP?
Wintel, Universities Team On Parallel Programming
With all the highly publicised data breeches and losses, are we all wasting our time?
With all the highly publicised data breeches and losses, are we all wasting our time?
With all the highly publicised data breeches and losses, are we all wasting our time?
women as computer operators in the 1960s
Working while young
Working while young
Working while young
World's biggest PKI goes open source: DogTag is released
Worst Security Threats?
Would anyone like to draw a diagram of effects or similar for the current "credit crisis"?
Would anyone like to draw a diagram of effects or similar for the current "credit crisis"?
Would the Basel Committee's announced enhancement of Basel II Framework and other steps have prevented the current global financial crisis had they been implemented years ago?
Would the Basel Committee's announced enhancement of Basel II Framework and other steps have prevented the current global financial crisis had they been implemented years ago?
Would the Basel Committee's announced enhancement of Basel II Framework and other steps have prevented the current global financial crisis had they been implemented years ago?
Would you say high tech authentication gizmo's are a waste of time/money/effort?
Would you say high tech authentication gizmo's are a waste of time/money/effort?
WoW security: now better than most banks
Wrapping up the FBEMBA
Writing 23FDs
Writing 23FDs
WSCHED and WSYNC
WSJ finds someone to blame.... be skeptical, and tell the WSJ to grow up
WSJ: Soft evidence on a crypto-related breach
WWII
WWII
WWII supplies
WWII supplies
WWII supplies
WWII supplies
Wylbur and Paging
Wylbur and Paging
Wylbur and Paging
Wylbur and Paging
Wylbur and CRBE
X.509 weakness?
Xephon, are they still in business?
Xephon, are they still in business?
Yahoo's CAPTCHA Security Reportedly Broken
Yahoo's CAPTCHA Security Reportedly Broken
Yet another squirrel question - Results (very very long post)
Yet another squirrel question - Results (very very long post)
Yet another squirrel question - Results (very very long post)
Yet another squirrel question - Results (very very long post)
Yet another squirrel question - Results (very very long post)
Yet another squirrel question - Results (very very long post)
Yet another squirrel question - Results (very very long post)
Yet another squirrel question - Results (very very long post)
Yet another squirrel question - Results (very very long post)
Yet another squirrel question - Results (very very long post)
Yet another squirrel question - Results (very very long post)
You won't guess who's the bad guy of ID theft
Young mainframers' group gains momentum
Your thoughts on the following comprehensive bailout plan please
Your views on the increase in phishing crimes such as the recent problem French president Sarkozy faces
z/OS and VM Control Blocks
z/OS BIND9 DNS Vulnerable to Cache Poisoning Attack Problem?
z/OS BIND9 DNS Vulnerable to Cache Poisoning Attack Problem?
z/OS Documentation - again
z/VM usability
z/VM usability
z10 presentation on 26 Feb
z10 presentation on 26 Feb
z10 presentation on 26 Feb
zH/OS (z/OS on Hercules for personal use only)
Zork and Adventure
Zork and Adventure

back to top, network, mainframe, digsig, all - (2005-2006) - (2003-2004) - (2001-2002) - (1993-2000)