The Risks Digest Index to Volume 11

Total Page:16

File Type:pdf, Size:1020Kb

The Risks Digest Index to Volume 11 The Risks Digest Index to Volume 11 Search RISKS using swish-e Forum on Risks to the Public in Computers and Related Systems ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator Index to Volume 11 Sunday, 30 June 1991 Issue 01 (4 February 1991) Re: Enterprising Vending Machines (Allan Meers) Re: Risks of automatic flight (Henry Spencer) Re: Voting by Phone & public-key cryptography (Evan Ravitz) Re: Random Voting IDs and Bogus Votes (Vote by Phone) (Mike Beede)) Re: Patriots ... (Steve Mitchell, Steven Philipson, Michael H. Riddle, Clifford Johnson) Re: Man-in-the-loop on SDI (Henry Spencer) Re: Broadcast local area networks ... (Curt Sampson, Donald Lindsay, John Stanley, Jerry Leichter) Issue 02 (5 February 1991) Bogus draft notices are computer generated (Jonathan Rice) People working at home on important tasks (Mike Albaugh) Predicting system reliability (Martyn Thomas) Re: Patriots (Steven Markus Woodcock, Mark Levison) Hungry copiers (another run-in with technology) (Scott Wilson) Re: Enterprising Vending Machines (Dave Curry) Broadcast LANs (Peter da Silva, Scott Hinckley) Issue 03 (6 February 1991) Tube Tragedy (Pete Mellor) New Zealand Computer Error Holds Up Funds (Gligor Tashkovich) "Inquiry into cash machine fraud" (Stella Page) Quick n' easy access to Fidelity account info (Carol Springs) Re: Enterprising Vending Machines (Mark Jackson) RISKS of no escape paths (Geoff Kuenning) A risky gas pump (Bob Grumbine) Electronic traffic signs endanger motorists... (Rich Snider) Re: Predicting system reliability (Richard P. Taylor) The new California licenses (Chris Hibbert) Phone Voting -- Really a Problem? (Michael Barnett, Dave Smith) Re: Electronic cash completely replacing cash (Barry Wright) Issue 04 (7 February 1991) Subway door accidents (Mark Brader) http://catless.ncl.ac.uk/Risks/index.11.html[2011-06-11 08:17:52] The Risks Digest Index to Volume 11 "Virus" destroys part of Mass. state budget plan (Adam M Gaffin) Reinterpretation of term "Computer Security" (Frank Dixon) SSN and Schwab Telebroker RISKS (Curtis Jackson) Re: Inquiry into cash machine fraud (John Sloan) Re: the new California licenses (Mark Jackson, Mark Gabriele) No more quick n' easy account info from Fidelity (Carol Springs, B.J. Herbison, Carl M. Kadie) Re: Electronic cash completely replacing cash (Lee S. Ridgway) Re: Predicting System Reliability... (Brad L. Knowles, Jeff Johnson) Electronic telephone directory (Jan Talmon) Issue 05 (7 February 1991) Re: Enterprising Vending Machines (postal) (Jay Schmidgall, Matt Deatherage) Re: A risky gas pump [IF YOU CAN STAND IT!] (Donald Lehman, James Helman, Jonathan Clark, Paul S. Sawyer, Christopher Lott, Guy Sherr, Michael C. Tanner, Michael Van Norman, Barry Margolin) Issue 06 (8 February 1991) Mailing lists (Dan Herrick, Mary Culnan) Americard the Beautyfool (J.C.Patilla, Jay Schmidgall, Frank Wales, Alex Bangs, Pink Prince or Prince Pink?, Jerry Leichter, Geoff Kuenning, Rob Aitken, Daniel B Dobkin, Brian Yamauchi, Joe Keane, Richard A. O'Keefe, Jeffrey Jonas, PGN (epilogue)) Issue 07 (9 February 1991 ) Study links leukemia to power lines, TV's (Martin Minow) A note on electromagnetic fields (Martin Minow) City in Turmoil (Pete Mellor) Re: the new California licenses (David Redell) Re: automatic flight and seasickness (Charles Bryant) Building very reliable systems (Jerry Leichter) Re: Predicting System Reliability... (Bruce Hamilton) Electronic traffic signs endanger motorists... (Lars Henrik Mathiesen) Newborn security system (Eric Postpischil) Request for info on UNIX viruses (Tom Brendza) Issue 08 (13 February 1991) News of His Death Much Exaggerated (Jeff Johnson) Prison terms for airline computer ticketing fraud (Rodney Hoffman) PWR system "abandoned owing to technical problems" (Martyn Thomas) Risks of having a sister (Robyn A Grunberg, Charles Meo) Re: Study links leukemia to power lines, TV's (Steve Bellovin) Re: Predicting System Reliability... (Jay Elinsky, Tanner Andrews, Martyn Thomas, Jay Elinsky, Paul Ammann) Issue 09 (14 February 1991) Vote-by-fax plan before [CA] Legislature (clarinews via Eric Postpischil) Douglas goes fly-by-wire (Martyn Thomas) Vietnam Vet's Memorial article ambiguous (Sam Levitin) Tax Preparation (Peter Jones) Collection of Evaded Taxes (Cameron Laird) Singacard anyone? (Bill J Biesty) Re: the new CA driver license (Ian Clements, Curt Sampson) Re: automatic flight and seasickness (Lars-Henrik Eriksson) Follow-up to wireless network (Frank Letts) http://catless.ncl.ac.uk/Risks/index.11.html[2011-06-11 08:17:52] The Risks Digest Index to Volume 11 4th Annual Ides-of-March Virus & Security Conference (Judy S. Brand) Issue 10 (14 February 1991) On-line in Saudi Arabia (Steve Elias via Martin Minow) Serious bug in SVR3.2 gives root access easily (Patrick Wolfe) Risks of large disk drives (Roger H. Goun) Re: The Risks of Having a Sister (David Ruderman, John Sullivan, Charles Meo) Guilty until proven innocent (Andrew Koenig) Parking Ticket Notice (Robert McClenon) Reinterpretation of the term "Computer Security" (Barry Schrager) NCCV: COMPUTING & VALUES CONFERENCE, 12-16 Aug 1991 (Walter Maner) Issue 11 (15 February 1991) Re: Enterprising Vending Machines (Jeff Johnson) Re: Electronic Cash (Joseph R. Beckenbach [2], 34AEJ7D, M P Evans) Re: Cashless Banking and Privacy (Jake Livni) Re: Cashless gas pumps (Jeff Helgesen, Dick Smith, Lars-Henrik Eriksson, K. M. Sandberg, Sean Malloy, Peter da Silva, 34AEJ7D) Re: Electronic telephone directory (Ralph Moonen) Issue 12 (17 February 1991) Re: PWR system "abandoned..." [Darlington] (Richard P. Taylor, Nancy Leveson) More on very reliable systems (Jerry Leichter) Saudi air controllers (Donald Saxman via Peter da Silva) Re: Enterprising Vending Machines (Marc Donner) Visa voided purchase woes (Jane Beckman) Credit enquiries appear to expose client lists to competitor's scrutiny (Janson) Issue 13 (19 February 1991) MAD HACKER appeal fails (Darren Dalcher) Paid to know everything about everybody? (Murder, She Wrote) (Kent M Pitman) Retail Sales Oversight -- No backup (Dave Rotheroe) Re: Tube Tragedy (Pete Mellor) Re: Serious bug in SVR3.2 gives root access easily (Richard H. Miller, Sean Eric Fagan, Steve Nuchia, anonymous, Daniel A. Graifer) Re: Errors on Vietnam Veterans Memorial (Al Arsenault, Mary Smolka) Driving records (Jim Griffith) Re: Quick n' easy access to Fidelity account info (Steve Golson) Issue 14 (20 February 1991 ) Another Computer Application fiasco story (Christopher Allen) Software failures and safety of American (Red Cross) blood supply (Rob James) MD-11 computer problems (Steve Bellovin) More on very reliable systems (Anthony E. Siegman) Re: Predicting system reliability (Henry Spencer) Broadcast LANs and data sensitivity (Henry Spencer) Re: software warranties (re: SysV bug) (Brian Kantor, David Lamb, Steve Eddins, Peter da Silva, Henry Spencer, Flint Pellett) Issue 15 (21 February 1991) Racetrack overpayments (Rodney Hoffman) http://catless.ncl.ac.uk/Risks/index.11.html[2011-06-11 08:17:52] The Risks Digest Index to Volume 11 Peace Shield in trouble (Henry Spencer) Is Unix the ultimate computer virus? (Mike T. on Dick Gabriel, via Martin Minow) Re: Murder, She Wrote (Jerry Hollombe) Re: Maintenance, Warranties, etc. (Charles Shub, Joseph M. Newcomer, Richard H. Miller, John Sullivan, Greg Johnson, Gene Spafford) Issue 16 (25 February 1991) RISKS in radiation treatment of cancer (Peter Kendell) Computer Tax Glitch in Los Angeles (Steve Milunovic) Computer problems with MD-11 jumbo jet (Fernando Pereira) Re: Warranties (Jim Horning) Accuracy in movies and newspapers (Tom Neff) Re: Biology of Unix; Message attributions (Michael Travers) Re: Worse-is-better for the 1990s (Unix) (Joseph M. Newcomer) Peace Shield and "software development problems" (Henry Spencer) Monopoly Security Policies for Thumb Prints (Bob Baldwin) Re: More on very reliable systems (Rod Simmons, Robert I. Eachus) Issue 17 (26 February 1991) The RISKS of automatic payments (Olaf 'Rhialto' Seibert) "Autopilot malfunction causes engines to break off"! (Martyn Thomas) Re: Computer problems with MD-11 jumbo jet (Daniel Faigin, Henry Spencer) Reliability extrapolation (Martyn Thomas) Risks of EMI? (Finkel) Re: Risks of radiation treatment of cancer (Clark Savage Turner) Re: Accuracy in Movies and Newspapers (John Richard Bruni) Re: worse-is-better for the 1990s (Jerry Gitomer) Automatic download of patches (Bill J Biesty) Workshop on Designing Correct Circuits (Victoria Stavridou) Issue 18 (28 February 1991) A weird error message -- old Cyber clock tale (Andrew Clayton) Tennis anyone? (name confusion) (anonymous) Burden of Proof: name confusion in driver's license bureau (Steve Sears) But the computer person said it was OK! (Dick Wexelblat) Dave Rotheroe's "Retail Sales Oversight -- No backup" note (Alan Wexelblat) Re: LINAC deaths at Zaragoza (Trevor Cradduck) Multiple engine failures (Mary Shafer responding to David Lesher) Re: MD-12; Automatic download of patches (Martin Minow) Re: Risks of EMI? (Bob Ayers) Issue 19 () About Risks in Believing AI Gurus (Klaus Brunnstein) Re: Jim Horning's note on software warranties (Alan Wexelblat) But the computer person said it was OK! (Steve Bellovin) Automatic Patching (Larry Nathanson) Risk from workstations with built-in microphones (Steve Greenwald) Specs for special equipment (Jim Purtilo) Re: worse-is-better for the 1990s (Tim Chambers, Mark McWiggins, Flint Pellett, Dan Franklin) Issue 20 (2 March 1991) http://catless.ncl.ac.uk/Risks/index.11.html[2011-06-11 08:17:52]
Recommended publications
  • Emerging Technologies Multi/Parallel Processing
    Emerging Technologies Multi/Parallel Processing Mary C. Kulas New Computing Structures Strategic Relations Group December 1987 For Internal Use Only Copyright @ 1987 by Digital Equipment Corporation. Printed in U.S.A. The information contained herein is confidential and proprietary. It is the property of Digital Equipment Corporation and shall not be reproduced or' copied in whole or in part without written permission. This is an unpublished work protected under the Federal copyright laws. The following are trademarks of Digital Equipment Corporation, Maynard, MA 01754. DECpage LN03 This report was produced by Educational Services with DECpage and the LN03 laser printer. Contents Acknowledgments. 1 Abstract. .. 3 Executive Summary. .. 5 I. Analysis . .. 7 A. The Players . .. 9 1. Number and Status . .. 9 2. Funding. .. 10 3. Strategic Alliances. .. 11 4. Sales. .. 13 a. Revenue/Units Installed . .. 13 h. European Sales. .. 14 B. The Product. .. 15 1. CPUs. .. 15 2. Chip . .. 15 3. Bus. .. 15 4. Vector Processing . .. 16 5. Operating System . .. 16 6. Languages. .. 17 7. Third-Party Applications . .. 18 8. Pricing. .. 18 C. ~BM and Other Major Computer Companies. .. 19 D. Why Success? Why Failure? . .. 21 E. Future Directions. .. 25 II. Company/Product Profiles. .. 27 A. Multi/Parallel Processors . .. 29 1. Alliant . .. 31 2. Astronautics. .. 35 3. Concurrent . .. 37 4. Cydrome. .. 41 5. Eastman Kodak. .. 45 6. Elxsi . .. 47 Contents iii 7. Encore ............... 51 8. Flexible . ... 55 9. Floating Point Systems - M64line ................... 59 10. International Parallel ........................... 61 11. Loral .................................... 63 12. Masscomp ................................. 65 13. Meiko .................................... 67 14. Multiflow. ~ ................................ 69 15. Sequent................................... 71 B. Massively Parallel . 75 1. Ametek.................................... 77 2. Bolt Beranek & Newman Advanced Computers ...........
    [Show full text]
  • Some Performance Comparisons for a Fluid Dynamics Code
    NBSIR 87-3638 Some Performance Comparisons for a Fluid Dynamics Code Daniel W. Lozier Ronald G. Rehm U.S. DEPARTMENT OF COMMERCE National Bureau of Standards National Engineering Laboratory Center for Applied Mathematics Gaithersburg, MD 20899 September 1987 U.S. DEPARTMENT OF COMMERCE NATIONAL BUREAU OF STANDARDS NBSIR 87-3638 SOME PERFORMANCE COMPARISONS FOR A FLUID DYNAMICS CODE Daniel W. Lozier Ronald G. Rehm U.S. DEPARTMENT OF COMMERCE National Bureau of Standards National Engineering Laboratory Center for Applied Mathematics Gaithersburg, MD 20899 September 1987 U.S. DEPARTMENT OF COMMERCE, Clarence J. Brown, Acting Secretary NATIONAL BUREAU OF STANDARDS, Ernest Ambler, Director - 2 - 2. BENCHMARK PROBLEM In this section we describe briefly the source of the benchmark problem, the major logical structure of the Fortran program, and the parameters of three different specific instances of the benchmark problem that vary widely in the amount of time and memory required for execution. Research Background As stated in the introduction, our purpose in benchmarking computers is solely in the interest of further- ing our investigations into fundamental problems of fire science. Over a decade ago, stimulated by federal recognition of very large losses of fife and property by fires each year throughout the nation, NBS became actively involved in a national effort to reduce such losses. The work at NBS ranges from very practical to quite theoretical; our approach, which proceeds directly from basic principles, is at the theoretical end of this spectrum. Early work was concentrated on developing a mathematical model of convection arising from a prescribed source of heat in an enclosure, e.g.
    [Show full text]
  • Cisco Unity Express Virtual 9.0 COSI Licences
    Open Source Used In Cisco Unity Express Virtual 9.0 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. Text Part Number: 78EE117C99-133317509 Open Source Used In Cisco Unity Express Virtual 9.0 1 This document contains licenses and notices for open source software used in this product. With respect to the free/open source software listed in this document, if you have any questions or wish to receive a copy of any source code to which you may be entitled under the applicable free/open source license(s) (such as the GNU Lesser/General Public License), please contact us at [email protected]. In your requests please include the following reference number 78EE117C99-133317509 Contents 1.1 Activation 1.1 1.1 1.1.1 Available under license 1.2 Apache Commons Collections 3.1 1.2.1 Available under license 1.3 Apache Commons Digester 1.8.1 1.3.1 Available under license 1.4 Apache Commons Logging 1.1. 1.4.1 Available under license 1.5 Apache Xerces 1.4.4 1.5.1 Notifications 1.5.2 Available under license 1.6 apache-log4j 1.2.15 1.6.1 Available under license 1.7 apache-xerces 2.9.1 1.7.1 Available under license 1.8 ASM 3.1 1.8.1 Available under license 1.9 bash 2.05b 1.9.1 Available under license 1.10 BCEL 5.1 1.10.1 Notifications 1.10.2 Available under license 1.11 bcprov-jdk14 1.21 1.11.1 Available under license 1.12 beepcore 0.9.08 1.12.1 Notifications Open Source Used In Cisco Unity Express Virtual
    [Show full text]
  • Programming Languages & Tools
    I PROGRAMMING LANGUAGES & TOOLS Volume 10 Number 1 1998 Editorial The Digital Technicaljoumalis a refereed AlphaServer, Compaq, tl1e Compaq logo, jane C. Blake, Managing Editor journal published quarterly by Compaq DEC, DIGITAL, tl1e DIGITAL logo, 550 ULTIUX, Kathleen M. Stetson, Editor Computer Corporation, King Street, VAX,and VMS are registered 01460-1289. Hden L. Patterson, Editor LKGI-2jW7, Littleton, MA in the U.S. Patent and Trademark Office. Hard-copy subscriptions can be ordered by DIGITAL UNIX, FX132, and OpenVMS Circulation sending a check in U.S. funds (made payable arc trademarks of Compaq Computer Kristine M. Lowe, Administrator to Compaq Computer Corporation) to the Corporation. published-by address. General subscription Production rates arc $40.00 (non-U.S. $60) for four issues Intel and Pentium are registered u·ademarks $75.00 $115) Christa W. Jessica, Production Editor and (non-U.S. for eight issues. of Intel Corporation. University and college professors and Ph.D. Elizabeth McGrail, Typographer I lUX is a registered trademark of Silicon students in the elecu·icaJ engineering and com­ Peter R. Woodbury, Illustrator Graphics, Inc. puter science fields receive complimentary sub­ scriptions upon request. Compaq customers Microsoft, Visual C++, Windows, and Advisory Board may qualify tor giftsubscriptions and arc encour­ Windows NT are registered trademarks Thomas F. Gannon, Chairman (Acting) aged to contact tl1eir sales representatives. of Microsoft Corporation. Scott E. Cutler Donald Z. Harbert Electronic subscriptions are available at MIPS is a registered trademark of MIPS William A. Laing no charge by accessing URL Technologies, Inc. Richard F. Lary http:jjwww.digital.com/subscription.
    [Show full text]
  • COMPUTATIONAL FLUID DYNAMICS: an Applications Profile from Convex Computer Corporation
    COMPUTATIONAL FLUID DYNAMICS: An Applications Profile from Convex Computer Corporation This simulation. which is based on a Navier-Stokes analysis. depicts surface This simulation shows surface pressure predictions for the AV-88 Harrier II pressure predictions for the F-15 Eagle at Mach 0.9. forebody at Mach 0.8. Supercomputer simulations permit the engineer to observe phenomena that The AV-88 Harrier II can operate from small. unprepared sites and roads close wind tunnels cannot produce. to front Jines. Supercomputing performance brings large-scale simula­ effective resource for innovation, evaluation and enhancement tions into the aircraft designers repertoire. While not expected of aircraft design. to replace such traditional design tools as wind tunnels and test Design development using supercomputing simulation pro­ fiights, computer simulations offer the manufacturer a cost- ceeds from a systematic knowledge base rather than from conjecture or surmise. At the same time, computer simulation investigating the possibilities, MCAIR selected the Convex Cl, the increases the scope for design innovation and enhancement. first affordable supercomputer Its strong price/performance ratio The use of simulations makes iterative design experimentation proved decisive. cost-effective. Moreover, si mulations point the way to improve­ The Cl combines memory and vector processing capabilities ments in design. previously found only on large-scale supercomputers with the Supercomputer simulations also permit software and price advantages of minicom­ the engineer to obseNe details of fluid flow puters. MCAIR found that the Cl completed phenomena that wind tunnels cannot pro­ in 30 minutes runs that required hours on a duce. These include surface pressure dis­ "Computational fluid minicomputer tr i bu ti on s, shock wave locations and dynamics is more complex for Installed in September 1985, this 64-bit strengths, streamline paths and boundary military aircraft than for integrated scalar and vector processor with a layer behavior.
    [Show full text]
  • Certification and Benchmarking of AIPS on the Convex
    AIPS MEMO NO. _ 3 £ Certifioation and Benchmarking of AIPS on the Convex C-l and Alliant FX/8 Kerry C. Hilldrup, Donald C. Wells, William D. Cotton National Radio Astronomy Observatory [1] Edgemont Road, Charlottesville, VA 22903-2475 (804)296-0211, FTS=938-1271, TWX=910-997-0174 24 December 1985 [2] Abstract The 15APR85 release of AIPS has been installed on the Convex C-l vector computer and on the Alliant FX/8 vector/concurrent computer. Both have been certified using the PFT benchmarking and certification test. Although a small number of compiler bugs were encountered in each, the AIPS application code was installed with only minimal modifications, and computed results agreed well with other implementations of AIPS. In the course of the implementations, the technology of the Clark CLEAN algorithm was advanced considerably; the final vectorized CLEAN algorithm on both systems is about three times as fast as the current microcode algorithm on the FPS AP-120B array processor. Similar improvements were observed for other highly vectorized tasks. Programs which were not vectorized generally executed on both in comparable CPU times and faster real times than they achieved on the DEC VAX-8600. The FX/8 with 6 computational elements (CEs) generally outperformed the C-l by a little in CPU time, but was significantly slower in real time. The performance of the FX/8 as a function of the number of CEs is also described. [1] NRAO is operated by Associated Universities, Inc., under contract with the U. S. National Science Foundation. [2] this report entirely supersedes and replaces a previous version which was dated 18 July 1985 and was marked as "AIPS Memo No.
    [Show full text]
  • Name Server Operations Guide for BIND Release 4.9.5
    Name Server Operations Guide for BIND Release 4.9.5 Releases from 4.9 Paul Vixie1 <[email protected]> Internet Software Consortium La Honda, CA Releases through 4.8.3 Kevin J. Dunlap2 Michael J. Karels Computer Systems Research Group Computer Science Division Department of Electrical Engineering and Computer Sciences University of California Berkeley, CA 94720 1. Introduction The Berkeley Internet Name Domain (BIND) implements an Internet name server for BSD-derived operating systems. The BIND consists of a server (or ‘‘daemon’’) called named and a resolver library. A name server is a network service that enables clients to name resources or objects and share this information with other objects in the network. This in effect is a distributed data base system for objects in a computer network. The BIND server runs in the background, servicing queries on a well known network port. The standard port for UDP and TCP is specified in /etc/services. The resolver is a set of routines residing in a system library that provides the interface that programs can use to access the domain name services. BIND is fully integrated into BSD (4.3 and later releases) network programs for use in storing and retrieving host names and address. The system administrator can configure the system to use BIND 1 This author was employed by Digital Equipment Corporation’s Network Systems Laboratory during the development and re- lease of BIND 4.9. Release 4.9.2 was sponsored by Vixie Enterprises. Releases from 4.9.3 were sponsored by the Internet Software Consortium. 2 This author was an employee of Digital Equipment Corporation’s ULTRIX Engineering Advanced Development Group and was on loan to CSRG when this work was done.
    [Show full text]
  • An Analysis of the Internet Virus of November 1988 
    With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988 Mark W. Eichin and Jon A. Rochlis Massachusetts Institute of Technology 77 Massachusetts Avenue, E40-311 Cambridge, MA 02139 February 9, 1989 Abstract computer, it attempted to break into other machines on the network. This paper is an analysis of that virus program In early November 1988 the Internet, a collection of net- and of the reaction of the Internet community to the attack. works consisting of 60,000 host computers implementing the TCP/IP protocol suite, was attacked by a virus, a pro- gram which broke into computers on the network and which spread from one machine to another. This paper is a de- tailed analysis of the virus programitself, as well as the re- 1.1 Organization actions of the besieged Internet community. We discuss the structure of the actual program, as well as the strategies the virus used to reproduce itself. We present the chronology In Section 1 we discuss the categorization of the program of events as seen by our team at MIT, one of a handful of which attacked the Internet, the goals of the teams work- groups around the country working to take apart the virus, ing on isolating the virus and the methods they employed, and summarize what the virus did and did not actually do. in an attempt to discover its secrets and to learn the net- In Section 2 we discuss in more detail the strategies it em- work’s vulnerabilities. We describe the lessons that this ployed, the specific attacks it used, and the effective and incident has taught the Internet community and topics for future consideration and resolution.
    [Show full text]
  • Supercomputers: the Amazing Race Gordon Bell November 2014
    Supercomputers: The Amazing Race Gordon Bell November 2014 Technical Report MSR-TR-2015-2 Gordon Bell, Researcher Emeritus Microsoft Research, Microsoft Corporation 555 California, 94104 San Francisco, CA Version 1.0 January 2015 1 Submitted to STARS IEEE Global History Network Supercomputers: The Amazing Race Timeline (The top 20 significant events. Constrained for Draft IEEE STARS Article) 1. 1957 Fortran introduced for scientific and technical computing 2. 1960 Univac LARC, IBM Stretch, and Manchester Atlas finish 1956 race to build largest “conceivable” computers 3. 1964 Beginning of Cray Era with CDC 6600 (.48 MFlops) functional parallel units. “No more small computers” –S R Cray. “First super”-G. A. Michael 4. 1964 IBM System/360 announcement. One architecture for commercial & technical use. 5. 1965 Amdahl’s Law defines the difficulty of increasing parallel processing performance based on the fraction of a program that has to be run sequentially. 6. 1976 Cray 1 Vector Processor (26 MF ) Vector data. Sid Karin: “1st Super was the Cray 1” 7. 1982 Caltech Cosmic Cube (4 node, 64 node in 1983) Cray 1 cost performance x 50. 8. 1983-93 Billion dollar SCI--Strategic Computing Initiative of DARPA IPTO response to Japanese Fifth Gen. 1990 redirected to supercomputing after failure to achieve AI goals 9. 1982 Cray XMP (1 GF) Cray shared memory vector multiprocessor 10. 1984 NSF Establishes Office of Scientific Computing in response to scientists demand and to counteract the use of VAXen as personal supercomputers 11. 1987 nCUBE (1K computers) achieves 400-600 speedup, Sandia winning first Bell Prize, stimulated Gustafson’s Law of Scalable Speed-Up, Amdahl’s Law Corollary 12.
    [Show full text]
  • Shared Memory Programming on NUMA–Based Clusters Using a General and Open Hybrid Hardware / Software Approach
    Shared Memory Programming on NUMA–based Clusters using a General and Open Hybrid Hardware / Software Approach Martin Schulz Institut für Informatik Lehrstuhl für Rechnertechnik und Rechnerorganisation Shared Memory Programming on NUMA–based Clusters using a General and Open Hybrid Hardware / Software Approach Martin Schulz Vollständiger Abdruck der von der Fakultät für Informatik der Technischen Universität München zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften (Dr. rer. nat.) genehmigten Dissertation. Vorsitzender: Univ.-Prof. R. Bayer, Ph.D. Prüfer der Dissertation: 1. Univ.-Prof. Dr. A. Bode 2. Univ.-Prof. Dr. H. Hellwagner, Universität Klagenfurt / Österreich Die Dissertation wurde am 24. April 2001 bei der Technischen Universität München ein- gereicht und durch die Fakultät für Informatik am 28. Juni 2001 angenommen. Abstract The widespread use of shared memory programming for High Performance Computing (HPC) is currently hindered by two main factors: the limited scalability of architectures with hardware support for shared memory and the abundance of existing programming models. In order to solve these issues, a comprehensive shared memory framework needs to be created which enables the use of shared memory on top of more scalable architectures and which provides a user–friendly solution to deal with the various different programming models. Driven by the first issue, a large number of so–called SoftWare Distributed Shared Memory (SW–DSM) systems have been developed. These systems rely solely on soft- ware components to create a transparent global virtual memory abstraction on highly scal- able, loosely coupled architectures without any direct hardware support for shared memory. However, they are often affected by inherent performance problems and, in addition, do not solve the second issue of the existence of (too) many shared memory programming models.
    [Show full text]
  • Network Troubleshooting Tools
    Network Troubleshooting Tools Network Troubleshooting Tools Joseph D. Sloan Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Network Troubleshooting Tools by Joseph D. Sloan Copyright © 2001 O’Reilly & Associates, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly & Associates, Inc., 101 Morris Street, Sebastopol, CA 95472. Editors: Robert Denn and Mike Loukides Production Editor: Catherine Morris Cover Designer: Emma Colby Printing History: August 2001: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly & Associates, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly & Associates, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. The association between the image of a basilisk and network troubleshooting is a trademark of O’Reilly & Associates, Inc. While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. Library of Congress Cataloging-in-Publication Data Sloan, Joe. Network Troubleshooting Tools / Joe Sloan.--1st ed. p. cm. Includes bibliographical references and index. ISBN 0-596-00186-X 1. Computer networks--Maintenance and repair 2. Computer networks--Management. I. Title. TK5105.5
    [Show full text]
  • History of the Root Server System
    RSSAC023: History of the Root Server System A Report from the ICANN Root Server System Advisory Committee (RSSAC) 4 November 2016 History of the Root Server System Preface This is a report to the Internet community from the ICANN Root Server System Advisory Committee (RSSAC). In this report, the RSSAC gives an overview of the organizational history of the root server system. The RSSAC advises the Internet community and ICANN Board of Directors on matters relating to the operation, administration, security and integrity of the Internet’s Root Server System. The RSSAC’s responsibilities include: • Communicating with the technical and ICANN communities on matters relating to the operation of the root servers and their multiple instances. • Gathering and articulating requirements to offer to those engaged in technical revisions of the protocols and common best practices related to the operation of DNS servers. • Engaging in ongoing threat assessment and risk analysis of the Root Server System. • Recommending necessary audit activity to assess the current status of root servers and the root zone. Contributors to this report are listed at end of this document. 2 RSSAC023 History of the Root Server System Table of Contents 1. Introduction ................................................................................................................. 5 2. History of Root Servers .............................................................................................. 5 2.1. Root Servers in Early Days of the DNS (1983–1986) ........................................ 5 2.2. Expanding Root Service for MILNET and NSFNET (1986–1990) ................... 7 2.3. Expanding Root Service Outside North America (1991) ................................. 10 2.4. DDN-NIC Changes to Network Solutions (1991–1992) .................................. 11 2.5. InterNIC (1993) ................................................................................................ 12 2.6. Renaming Root Servers to root-servers.net (1995) ..........................................
    [Show full text]