FSVO two larger than the standard value.
-- Shmuel (Seymour J.) Metz http://mason.gmu.edu/~smetz3 ________________________________________ From: IBM Mainframe Discussion List <IBM-MAIN@LISTSERV.UA.EDU> on behalf of Charles Mills <charl...@mcn.org> Sent: Sunday, October 11, 2020 7:28 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: IBM splitting into two companies Hold on, I'll post them here for you in a minute. "Hack" and "hacker" has always had the two meanings, the white and black hat meanings. Charles -----Original Message----- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Mike Hochee Sent: Sunday, October 11, 2020 4:09 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: IBM splitting into two companies Charles, you must've found my creds! Please dispose of them in a secure manner. :-) You make a good point. And to muddy things further, the AWS user community seems to use the term 'hack' when referring to techniques to accomplish things that are completely acceptable and above-board. Mike -----Original Message----- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Charles Mills Sent: Sunday, October 11, 2020 6:54 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: IBM splitting into two companies Caution! This message was sent from outside your organization. I would think one needs to distinguish between AWS infrastructure flaws -- what IBM would call violations of the statement of integrity -- versus dumb user errors. The pop press is going to call it "an AWS hack" even if it was because someone left their userid and password behind on a Post-It note on a table in Denny's. Of course the two cases can blur somewhat if there are infrastructure characteristics that make it particularly easy for a user to screw it up. Charles -----Original Message----- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Mike Hochee Sent: Sunday, October 11, 2020 3:34 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: IBM splitting into two companies I do not have an accurate big picture nor a decent set of data to work with, but here are a few google hits that do not inspire confidence, just anecdotal stuff of course.... https://secure-web.cisco.com/1VTzFjuATviCAhuT5E1W_7xl72YU9s5X0JaH6Tf7anj88qmCC_lgTImkHZ35sGYxirTRqyu969vlba9PoDC04LJfNclxEzPiNbLiBw-EqZiDkqJvO8C7ATQrGUejrlSwE-ZK2qvga-u8RmW_3r-j3RRr-iLHROzrUyL2KYpWcxS6vfhEmEkYqKNSvJqNfAqQx3Zk9wSdAMMp3LIGrXovyKsJSDQwajSlMDa_ddnwbGZ-GL-xqY9JcShGQAuXlvN14T1AhC0cHt8rd0OYrN6UcoJncoxuNfnJcCyLN079glPA68CZEOYwCA0aWqnLLMjJ_E0whksefvP_7vc68la8qD_d109QNXRJO5JqmIL5CvGSs0RDZVEniNlQB8FpiKeR-QAaaC2XB7o1aOQD7tQrZTIav7-5pbFd56Xg-7hbMO2wt6u-VDXyP0JT_jtFP6W5O/https%3A%2F%2Fwww.cbronline.com%2Fnews%2Faws-servers-hacked-rootkit-in-the-cloud https://secure-web.cisco.com/1DHP3Sjng4WM_zX3ulKB54LR9N6PlVEUfnYdQfLO1Vy4701nWWO9_XhKXA9fLIyVd0HAVr1cRpbSO0Rk0wVZOCAmCKODUXGDpc6gXI2hyIWt8gIWsSo6sNNfrLSw0l0fmLYZLnItZLz9fXh-c2_El-ect8PgFO2BRcJLczJTGAbHAvlcb8iOMLWVVEYyopB25zX8tr4VQzc-FV2kccH1djF2xhLONLj9j9jmAdDJQPV4Yv4TnlmXeMopGRFiI3Knw7_cLJpVoq-i0RyUXwE1GuRnjZQX1e4dF3jnu0bBqbkLzqAE75M55_Mi9vLYxwr_OcjTwS-vth1VkgYJbwNHsLlCOtGZX5yQrD8RAx-JYrri8MP70-ypRGA3TYaBNVZpmN14KUoWQvCNVSxxdIuaiNuIUhM8JHj9wEIZ7LwsqIAl8Ln8jo2mFnQ-w0dzwOScs/https%3A%2F%2Ftamebay.com%2F2020%2F05%2Famazon-warn-of-hacked-amazon-accounts-issue-acco unt-recovery-advice.html https://secure-web.cisco.com/1Z68YEzLszxbuXZWax5QMVuakmNaSX9WWEIrNNSGJTNavNiktPAJk-thQ0vLyb_WIttNgnlX8EMGlQZb3Bw_B_iklhB_hqPRg_aKXTbLqHxsm_87IabADU_ENPhpmQN4pf-QVpFmFyYI_Lb92Rg0MB_RsnoyCnSuWkdrbvv0TGxG6cFpHpc_4GgWgCTRInwafRdI9ZaaaijDncG7tu7GpKk0sh2J6yRPtzwP8P4D-CDrTOA9IH4IVj0stDyTmRL_h_A3LAVYcxhQFsTcjpP-oPE7y1GHzi_CJxAycuYmYgTCQFXCx_foXbJH9WWjhRd4yMpttIKdbyvHUQmHKXqdP0msSFOxg_Y5MtQUMt2yWCoLWyss3o6LEJE5H7vS5EVKFVVWIMPDom4x4fetg1bpF8xCDmdYXJYK0T3zVljxNJFQbEADLh-6S_mZpCP2U2Q0g/https%3A%2F%2Fwww.thesun.co.uk%2Fmoney%2F10519079%2Famazon-accounts-hacked-fraudsters%2F Does AWS have any security components on par with ICSF and RACF on the security front that you're aware of? Here's a link to their identity and access management UG... https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys. html?icmpid=docs_iam_console Browsing through it briefly makes me wonder what an AWS secure key repository and management tools might look like. Having been the victim of a minor identity theft myself in recent years, probably adds to my skepticism about cloud service provider security claims. Mike -----Original Message----- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Clark Morris Sent: Sunday, October 11, 2020 3:55 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: IBM splitting into two companies Caution! This message was sent from outside your organization. [Default] On Sat, 10 Oct 2020 10:40:07 -0700 (PDT), in bit.listserv.ibm-main computer chyck <rpanz...@gmail.com> wrote: >> snip much > >Cloud computing is alot like teenage sex - everybody is doing it (or >wants to do it) but nobody has a flippin' clue how to do it correctly!!! What I fear is that Amazon and Microsoft both have a far better idea of what cloud computing is and how to do it than does IBM. I also suspect that Amazon has all of their computing on their cloud and is very well aware of the need for high security and has worked very hard to achieve it. Microsoft based on my experience with their Knowledge Center (repository for fixes and the equivalent of PTF cover letters) seems to understand high availability better than IBM based on postings here on ibm-main. Clark Morris ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN