An Interview With
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Multics System, 1975
Honeywell The Multics System O 1975,1976,Honeywell Information Systems Inc. File No.:lLll - -- - ecure A Unique Business Problem-SolvingTool Here is a computer techniques are available to system that enables data all users automatically processing users to control through the Multics operating and distribute easily accessi- supervisor. ble computer power. The Because it is a unique Honeywell Multics System combination of advanced represents an advanced computing theory and out- approach to making the com- standing computer hardware, puter an integral, thoroughly Multics can provide an infor- reliable part of a company's mation service system more operation. advanced than any other yet The Multics System available. replaces many of the proce- Honeywell offers, as dures limiting conventional part of its advanced Series 60 systems and sweeps away line, two models for Multics - many of the factors that have the Model 68/60 and the restricted the application of Model 68/80. computers to routine data While contributing sig- processing assignments. nificantly to the application Now-with Multics - diversity of the Series 60 the computer becomes a family, these Multics systems responsive tool for solving also enable Honeywell to challenging business accommodate more efficiently problems. the computing needs of The Multics System today's businesses. incorporates many of the most user-oriented program- ming and supervisory tech- niques yet devised. These Multics is Transaction Processing -and More Although Multics is by Ease of accessibility, design a transaction oriented, featuring a simple and con- interactive information sys- sistent user interface for all tem, its functional capability types of services. There is no encompasses the full spec- job control or command trum of a general purpose language to learn and an computer. -
Standards for Computer Aided Manufacturing
//? VCr ~ / Ct & AFML-TR-77-145 )R^ yc ' )f f.3 Standards for Computer Aided Manufacturing Office of Developmental Automation and Control Technology Institute for Computer Sciences and Technology National Bureau of Standards Washington, D.C. 20234 January 1977 Final Technical Report, March— December 1977 Distribution limited to U.S. Government agencies only; Test and Evaluation Data; Statement applied November 1976. Other requests for this document must be referred to AFML/LTC, Wright-Patterson AFB, Ohio 45433 Manufacturing Technology Division Air Force Materials Laboratory Wright-Patterson Air Force Base, Ohio 45433 . NOTICES When Government drawings, specifications, or other data are used for any purpose other than in connection with a definitely related Government procurement opera- tion, the United States Government thereby incurs no responsibility nor any obligation whatsoever; and the fact that the Government may have formulated, furnished, or in any way supplied the said drawing, specification, or other data, is not to be regarded by implication or otherwise as in any manner licensing the holder or any person or corporation, or conveying any rights or permission to manufacture, use, or sell any patented invention that may in any way be related thereto Copies of this report should not be returned unless return is required by security considerations, contractual obligations, or notice on a specified document This final report was submitted by the National Bureau of Standards under military interdepartmental procurement request FY1457-76 -00369 , "Manufacturing Methods Project on Standards for Computer Aided Manufacturing." This technical report has been reviewed and is approved for publication. FOR THE COMMANDER: DtiWJNlb L. -
Multics Security Evaluation: Vulnerability Analysis*
* Multics Security Evaluation: Vulnerability Analysis Paul A. Karger, 2Lt, USAF Roger R. Schell, Maj, USAF Deputy for Command and Management Systems (MCI), HQ Electronic Systems Division Hanscom AFB, MA 01730 ABSTRACT operational requirements cannot be met by dedicated sys- A security evaluation of Multics for potential use as a tems because of the lack of information sharing. It has two-level (Secret / Top Secret) system in the Air Force been estimated by the Electronic Systems Division (ESD) Data Services Center (AFDSC) is presented. An overview sponsored Computer Security Technology Panel [10] that is provided of the present implementation of the Multics these additional costs may amount to $100,000,000 per Security controls. The report then details the results of a year for the Air Force alone. penetration exercise of Multics on the HIS 645 computer. In addition, preliminary results of a penetration exercise 1.2 Requirement for Multics Security of Multics on the new HIS 6180 computer are presented. Evaluation The report concludes that Multics as implemented today is not certifiably secure and cannot be used in an open This evaluation of the security of the Multics system use multi-level system. However, the Multics security was performed under Project 6917, Program Element design principles are significantly better than other con- 64708F to meet requirements of the Air Force Data Ser- temporary systems. Thus, Multics as implemented today, vices Center (AFDSC). AFDSC must provide responsive can be used in a benign Secret / Top Secret environment. interactive time-shared computer services to users within In addition, Multics forms a base from which a certifiably the Pentagon at all classification levels from unclassified to secure open use multi-level system can be developed. -
Towards Comprehensible and Effective Permission Systems
Towards Comprehensible and Effective Permission Systems Adrienne Porter Felt Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2012-185 http://www.eecs.berkeley.edu/Pubs/TechRpts/2012/EECS-2012-185.html August 9, 2012 Copyright © 2012, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. Towards Comprehensible and Effective Permission Systems by Adrienne Porter Felt A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the GRADUATE DIVISION of the UNIVERSITY OF CALIFORNIA, BERKELEY Committee in charge: Professor David Wagner, Chair Professor Vern Paxson Professor Tapan Parikh Fall 2012 Towards Comprehensible and Effective Permission Systems Copyright c 2012 by Adrienne Porter Felt Abstract Towards Comprehensible and Effective Permission Systems by Adrienne Porter Felt Doctor of Philosophy in Computer Science University of California, Berkeley Professor David Wagner, Chair How can we, as platform designers, protect computer users from the threats associated with ma- licious, privacy-invasive, and vulnerable applications? Modern platforms have turned away from the traditional user-based permission model and begun adopting application permission systems in an attempt to shield users from these threats. This dissertation evaluates modern permission systems with the goal of improving the security of future platforms. -
Čestné Prohlášení
VYSOKÉ UČENÍ TECHNICKÉ V BRNĚ BRNO UNIVERSITY OF TECHNOLOGY FAKULTA STROJNÍHO INŢENÝRSTVÍ ÚSTAV STROJÍRENSKÉ TECHNOLOGIE FACULTY OF MECHANICAL ENGINEERING INSTITUTE OF MANUFACTURING TECHNOLOGY VÝROBA PLYNOVÝCH VENTILŮ NA AUTOMATICKÉ LINCE PRODUCTION OF GAS VALVES ON THE AUTOMATIC LINE DIPLOMOVÁ PRÁCE DIPLOMA THESIS AUTOR PRÁCE BC. MILAN PEŠL AUTHOR VEDOUCÍ PRÁCE ING. MAREK ŠTRONER, PH.D. SUPERVISOR BRNO 2011 Vysoké učení technické v Brně, Fakulta strojního inženýrství Ústav strojírenské technologie Akademický rok: 2010/2011 ZADÁNÍ DIPLOMOVÉ PRÁCE student(ka): Bc. Milan Pešl který/která studuje v magisterském navazujícím studijním programu obor: Strojírenská technologie a průmyslový management (2303T005) Ředitel ústavu Vám v souladu se zákonem č.111/1998 o vysokých školách a se Studijním a zkušebním řádem VUT v Brně určuje následující téma diplomové práce: Výroba plynových ventilů na automatické lince v anglickém jazyce: Production of gas valves on the automatic line Stručná charakteristika problematiky úkolu: Na základě poznatků při výrobě plynových ventilů na automatické lince ve firmě Honeywell bude řešena problematika automatizace a manipulace, chodu automatické linky, testování ventilů, akce na snížení počtu vadných kusů při výrobě a implementace kamerového systému na detekci chyb šroubování. Cíle diplomové práce: Seznámení s automatizovanou výrobní linkou na plynové ventily a její rozložení. Popis principu práce linky a typy ventilů, které se na ní výrábějí. Testy používané ke kontrole funkčnosti ventilů. Statisté zhodnocení výroby a kamerový systém pro kontrolu šroubů. Seznam odborné literatury: 1. DRAŽAN, František., JEŘÁBEK, Karel. Manipulace s materiálem. 1. vyd. Praha : SNTL, 1989. 456 s. ISBN 04-220-79. 2. HLAVENKA, Bohumil. Manipulace s materiálem. 4. vyd. Brno : VUT, 2001. 164 s. ISBN 80-214-0068-4. -
US Department of the Interior Geological Survey Mail Stop 964 Box 25046, Federal Center'denver, Colorado 80225
U.S. Department of the Interior Geological Survey Mail Stop 964 Box 25046, Federal Center 'Denver, Colorado 80225 Program MARQDCLAG: Marquardt inversion of DC-Schlumberger soundings by lagged-convolution by Walter L. Anderson Open-File Report 79-1432 1979 Multics Documentation Page 2 Program MARQDCLAG CONTENTS DISCLAIMER 3 INTRODUCTION * 4 PARAMETERS AND DATA REQUIRED 5 PROGRAM FILES 5 DETAIL PARAMETER AND DATA DEFINITIONS 6 $parras parameters 6 $init parameters 10 DATA MATRIX NOTES 11 EXAMPLES OF INPUT PARAMETERS AND DATA ORDERING 11 SPECIAL OBJECT FORMAT PHRASES 12 MULTICS OPERATING INSTRUCTIONS 12 ERROR MESSAGES 13 PRINTED RESULTS ]4 REFERENCES 16 Appendix 1.-- Source listing 17 Source availability 17 Appendix 2.-- Conversion to other systems 53 Appendix 3.-- Test problem input/output listing 54 Multics Documentation Page 3 Program MARQDCLAG DISCLAIMER This program was written in Fortran IV for a Honeywell Multics 68/80 system*. Although program tests have been made, no guarantee (expressed or implied) is made by the author regarding accuracy or proper functioning of this program on all computer systems. * Brand or manufacturers' names used in this report are for descriptive purposes only and do not constitute endorsement by the U.S. Geological Survey. Multics Documentation Page 4 Program MARQDCLAG By Walter L. Anderson INTRODUCTION Program MARQDCLAG is a general-purpose program for the least squares inversion of direct-current (DC) Schlumberger sounding data obtained over one-dimensional horizontally stratified earth models. A modified Marquardt (1963) nonlinear least squares algorithm (MARQRT) is used for inversion of Schlumberger soundings. A digital filter developed by Anderson (1975) is employed, along with a fast lagged-convolution adaptive algorithm (RLAGH1), to efficiently and accurately evaluate the necessary Hankel transform integrals for a Schlumberger array configuration (see for example, Zohdy, 1975, p. -
The Evolution of the Unix Time-Sharing System*
The Evolution of the Unix Time-sharing System* Dennis M. Ritchie Bell Laboratories, Murray Hill, NJ, 07974 ABSTRACT This paper presents a brief history of the early development of the Unix operating system. It concentrates on the evolution of the file system, the process-control mechanism, and the idea of pipelined commands. Some attention is paid to social conditions during the development of the system. NOTE: *This paper was first presented at the Language Design and Programming Methodology conference at Sydney, Australia, September 1979. The conference proceedings were published as Lecture Notes in Computer Science #79: Language Design and Programming Methodology, Springer-Verlag, 1980. This rendition is based on a reprinted version appearing in AT&T Bell Laboratories Technical Journal 63 No. 6 Part 2, October 1984, pp. 1577-93. Introduction During the past few years, the Unix operating system has come into wide use, so wide that its very name has become a trademark of Bell Laboratories. Its important characteristics have become known to many people. It has suffered much rewriting and tinkering since the first publication describing it in 1974 [1], but few fundamental changes. However, Unix was born in 1969 not 1974, and the account of its development makes a little-known and perhaps instructive story. This paper presents a technical and social history of the evolution of the system. Origins For computer science at Bell Laboratories, the period 1968-1969 was somewhat unsettled. The main reason for this was the slow, though clearly inevitable, withdrawal of the Labs from the Multics project. To the Labs computing community as a whole, the problem was the increasing obviousness of the failure of Multics to deliver promptly any sort of usable system, let alone the panacea envisioned earlier. -
Standards for Computer Aided Manufacturing
NBSIR 76-1094 (R) Standards for Computer Aided Manufacturing John M. Evans, Jr., Ph.D., Project Manager Joseph T. O'Neill John L. Little James S. Albus, Ph.D. Anthony J. Barbera, Ph.D. Dennis W. Fife, Ph.D. Elizabeth N. Fong David E. Gilsinn, Ph.D. Frances E. Holberton Brian G. Lucas, Ph.D. Gordon E. Lyon, Ph.D. Beatrice A. S. Marron Albercht J. Neumann Mabel V. Vickers Justin C. Walker Office of Developmental Automation and Control Technology Institute for Computer Sciences and Technology National Bureau of Standards Washington, D. C. 20234 Second Interim Report October, 1976 Prepared for Manufacturing Technology Division Air Force Materials Laboratory Wright-Patterson Air Force Base, Ohio 45433 NBSIR 76-1094 (R) STANDARDS FOR COMPUTER AIDED MANUFACTURING John M. Evans, Jr., Ph D., Project Manager Joseph T. O'Neill John L. Little James S. Albus, Ph D. Anthony J. Barbera, Ph.D. Dennis W. Fife, Ph.D. Elizabeth N. Fong David E. Gilsinn, Ph D. Frances E. Holberton Brian G. Lucas, Ph D Gordon E. Lyon, Ph D. Beatrice A. S. Marron Albercht J. Neumann Mabel V. Vickers Justin C. Walker Office of Developmental Automation and Control Technology Institute for Computer Sciences and Technology National Bureau of Standards Washington, D. C. 20234 Second Interim Report October, 1976 Prepared for Manufacturing Technology Division Air Force Materials Laboratory Wright-Patterson Air Force Base, Ohio 45433 U.S. DEPARTMENT OF COMMERCE. Elliot L. Richardson, Secretary Edward O. Vetter, Under Secretary Dr. Betsy Ancker-Johnson, Assistant Secretary for Science and Technology NATIONAL BUREAU OF STANDARDS, Ernest Ambler. -
Creativity – Success – Obscurity
Author Gerry Pickering CREATIVITY – SUCCESS – OBSCURITY UNIVAC, WHAT HAPPENED? A fellow retiree posed the question of what happened. How did the company that invented the computer snatch defeat from the jaws of victory? The question piqued my interest, thus I tried to draw on my 32 years of experiences in the company and the myriad of information available on the Internet to answer the question for myself and hopefully others that may still be interested 60+ years after the invention and delivery of the first computers. Computers plural, as there were more than one computer and more than one organization from which UNIVAC descended. J. Presper Eckert and John Mauchly, located in Philadelphia PA are credited with inventing the first general purpose computer under a contract with the U.S. Army. But our heritage also traces back to a second group of people in St. Paul MN who developed several computers about the same time under contract with the U.S. Navy. This is the story of how these two companies started separately, merged to become one company, how that merged company named UNIVAC (Universal Automatic Computers) grew to become a main rival of IBM (International Business Machines), then how UNIVAC was swallowed by another company to end up in near obscurity compared to IBM and a changing industry. Admittedly it is a biased story, as I observed the industry from my perspective as an employee of UNIVAC. It is also biased in that I personally observed only a fraction of the events as they unfolded within UNIVAC. This story concludes with a detailed account of my work assignments within UNIVAC. -
Lessons from the Multics Security Evaluation
Thirty Years Later: Lessons from the Multics Security Evaluation Paul A. Karger Roger R. Schell IBM Corp., T. J. Watson Research Center Aesec Corporation Yorktown Heights, NY 10598 Pacific Grove, CA 93950 [email protected] [email protected] ABSTRACT 2 Multics Security Compared to Now Almost thirty years ago a vulnerability assessment of Multics offered considerably stronger security than Multics identified significant vulnerabilities, despite the most systems commercially available today. What factors fact that Multics was more secure than other contempo- contributed to this? rary (and current) computer systems. Considerably more important than any of the individual design and imple- mentation flaws was the demonstration of subversion of 2.1 Security as a Primary Original Goal the protection mechanism using malicious software (e.g., Multics had a primary goal of security from the very trap doors and Trojan horses). A series of enhancements beginning of its design [16, 18]. Multics was originally were suggested that enabled Multics to serve in a rela- conceived in 1965 as a computer utility – a large server tively benign environment. These included addition of system on which many different users might process data. “Mandatory Access Controls” and these enhancements This requirement was based on experience from develop- were greatly enabled by the fact the Multics was designed ing and running the CTSS time sharing system at MIT. from the start for security. However, the bottom-line con- The users might well have conflicting interests and there- clusion was that “restructuring is essential” around a fore a need to be protected from each other – a need quite verifiable “security kernel” before using Multics (or any like that faced today by a typical Application Service Pro- other system) in an open environment (as in today’s vider (ASP) or Storage Service Provider (SSP). -
NLJAN2013.Pdf
1 2 WHO WE ARE: ABB is a global leader in power and automation technologies. Based in Zurich, Switzerland, the company employs 145,000 people and operates in approximately 100 countries. The firm’s shares are traded on the stock exchanges of Zurich, Stockholm and New York. ABB’s business is comprised of five divisions that are in turn organized in relation to the customers and industries we serve. The company in its current form was created in 1988, but its history spans over 120 years. ABB’s success has been driven particularly by a strong focus on research and development. The company maintains seven corporate research centres around the world and has continued to invest in R&D through all market conditions. The result has been a long track record of innovation. Many of the technologies that underlie our modern society, from high-voltage DC power transmission to a revolutionary approach to ship propulsion, were developed or commercialized by ABB. Today, ABB stands as the largest supplier of industrial motors and drives, the largest provider of generators to the wind industry, and the largest supplier of power grids worldwide. HISTORY OF THE COMPANY RECRUITMENT STEPS: APTITUDE 1883 GROUP DISSCUSIONS Ludvig Fredholm establishes Elektriska Aktiebolaget in Stockholm as TECHNICAL manufacturers of electrical lighting and generators INTERVIEW HR INTERVIEW 1933 BBC obtains the patent for turbine rotors constructed from individual steel disks that are welded 3 1942 CURRENT STATUS: ASEA builds the world's first 120 MVA, 220 kV transformer in the Stockholm Elverks Värtanstation JOBS AVAILABLE=1336 1952 JOBEMPLOYERS =165K ASEA designs and installs the first 400 kV AC cable – a 70 m low TECHNOLOGIES=8000 pressure oil-filled (LPOF) cable connecting an underground power station (built to withstand an atomic bomb) to the Swedish grid. -
Honeywell International Inc
UNITED STATES SECURITIES AND EXCHANGE COMMISSION WASHINGTON, D.C. 20549 Form 10-K ☒ ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2020 OR ☐ TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to Commission file number 1-8974 Honeywell International Inc. (Exact name of registrant as specified in its charter) Delaware 22-2640650 (State or other jurisdiction of (I.R.S. Employer incorporation or organization) Identification No.) 300 South Tryon Street Charlotte, North Carolina 28202 (Address of principal executive offices) (Zip Code) Registrant’s telephone number, including area code (704) 627-6200 Securities registered pursuant to Section 12(b) of the Act: Title of Each Class Trading Symbols Name of each exchange on which registered Common Stock, par value $1 per share* HON The New York Stock Exchange 1.300% Senior Notes due 2023 HON 23A The New York Stock Exchange 0.000% Senior Notes due 2024 HON 24A The New York Stock Exchange 2.250% Senior Notes due 2028 HON 28A The New York Stock Exchange 0.750% Senior Notes due 2032 HON 32 The New York Stock Exchange * The common stock is also listed on the London Stock Exchange. Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark if the Registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes ☒ No ☐ Indicate by check mark if the Registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Exchange Act.