02X01 Sage News 198401
Total Page:16
File Type:pdf, Size:1020Kb
Flying High at COMDEX As you can see, Logos Information the Las Vegas COM Systems conducted a DEX show was an up continuous seminar of lifting experience for the Idris operating sys SAGETM Computer. Our tem on the SAGE micros. balloon, anchored in the This UNIX-like OS was very parking lot in front of the impressive, particularly when main entrance to the Con running Absoft FORTRAN 77 vention Center, provided us which compiles at 3000 lines per with plenty of exposure. minute. (That's fast). Being noticed at COMDEX is Robots always attract attention, and becoming more and more impor a mechanical arm provided by Eyring tant as the show reaches gigantic Research helped draw many into our proportions. It's now impossible to see all booth. The demonstration provided a look the booths in a single day. The exhibition has at the PDOS operating system developed by expanded from the huge Convention Center Eyring for the SAGE and other 68000 equipment. to a new West Annex, the Hilton Hotel, the The software news was all "windows", with Riviera Hotel and the Sahara Hotel. It totaled SofTech Microsystems, VisiCorp and Microsoft 1.2 million square feet and resulted in a lot of announcing products. These could open new sore feet. frontiers for SAGE micros since programmers will However, those who stopped by our booth need a great deal of speed and performance to seemed impressed with the new look of the SAGE develop applications for the windowing packages. terminals and the addition of the 40 Megabyte Win This will be especially true with SofTech's Liaison chester to the SAGE IV line. and VisiCorp's Visi-On. COMDEX also marked the formal introduction o'f State All in all, SAGE did well at COMDEX. We signed a of the Art accounting software to our machines, and we number of new dealers and were featured on two differ signed several new dealers on that basis alone. Dealers ent TV News shows. And it seemed that everybody was who carry SA products on the IBM PC or Apple III were talking about our balloon. As opposed to a year ago, amazed by the speed of the SA Demonstration Package people were now asking, "Where's SAGE?" instead of running on the SAGE II. "Who's SAGE?" Review Micros on Prime Time by Buddy Frank program bug. In terms of public relations, the industry Hollywood set the stage last year with the release of the should welcome WHIZ KIDS as a 60-minute free movie WAR GAMES) so it was only a matter of time before commercial. television also discovered microcomputers. Indeed, fas However, I wonder if this show is setting public expec ter than Silicon Valley cloned its first PC-Compatible, CBS tations so high that reality may NEVER satisfy. The 8-bit started production of a WAR GAMES spinoff known as micro these kids use runs a complete artificial intelligence WHIZ KIDS. system, supports a voice/video recognition module com The basic plot is simple: a group of four young teens use plete with laser scans, is multi-tasking, can do an autodial their home computer and a few peripherals to make the sweep of the entire Los Angeles metropolitan phone sys world a better place. Along the way they defeat the evil tem in less than two minutes, and has universal mainframe Mainframes and that diabolical group known as ((The compatibility. Additionally, any new software solutions Establish ment". are generated in seconds with just a few quick lines of Actually, the villains in WHIZ KIDS have yet to assume a code. Heaven help the programmer who is asked to write permanent character. One week it was the chief pro a routine "like the one I saw on TV last night". grammer at a corporate headquarters and the next it was a This series, which started on Saturdays, moved to Wed jolly old hacker who used his communications package to nesdays, and has now bounced back to Saturdays, is tar foil the cops. geted for the 12- to 24-year-old market. In that respect, it's One thing is cerOtain. Without a modem, the WHIZ KIDS RIGHT ON. Adults are viewed with suspicion at best, and would be less effective than the BRADY BUNCH. If this the only credible human over 25 is a completely non show doesn't make the masses a bit nervous about data technical newspaper reporter. His role is to bring in the security, it's not because CBS hasn't tried. Every show cavalry just before the bad guys unplug the WHIZ KIDS. features an illegal entry into somebody's files to uncover While none of my colleagues here at SAGE admit to the bad guys. In fact, these kids are SO good at getti ng into watching the show, I suspect that they, like myself, are programs that they're now being paid by nearby DP staffs closet fans. There's something about watching a show to test system integrity. (They always find a way in!) that's beneath your position that gives it a strange appeal. The positive aspect of WHIZ KIDS is that micros are It's like doctors watching General Hospital. There's an certainly presented in a good light. They are fun, profit unexplained feeling of satisfaction in catching the techni able and easy-to-use. Let me know if you ever see the stars cal flaws and thinking how naive the rest of America must struggling through confusing documentation or cursing a be. Page 2 • January 1984 • Sage News International News Soft",are Revie", Rakon personnel from left: }o/yon Ralston, Michele Kivell, Tim Kivell, Vault Phillip Lovegrove, Steve Whitaker. Could a prankster wreak havoc with your computer SAGE Computer debuted ((down under?) in August at files? Or, worse yet, could an unauthorized user filch Systems ~83 in New Zealand and at the Australian 10th precious information? Annual Computer Conference in Melbourne. RAKON Last year, a teen-ager entered a computer which stored COMPUTERS is SAGE's new distributor in the region, thoroughbred breeding information and destroyed data supporting offices in Auckland, Melbourne and Sidney. which cost the service $100,000 in stud fees. Using a pass At the shows, the SAGE II/IV drew considerable atten word given him by his father, it was an easy feat. tion from the industry. Articles published in New Zealand And several months ago a UCLA student was indicted Reviews, Interface and New Zealand Computer Scene for electronically breaking into several computer systems, echoed the U.S. claim of superior price/performance including one used by the Defense Departmenc and des ratio. They also pointed to the large hard disk storage troying programs which cost thousands to replace. capacity and SAGE's multi-user capability as an ((attractive If you have information worth protecting, you may proposition for medium to large businesses?). want to investigate a new package designed for SAGE RAKON COMPUTERS is a subsidiary of the Rakon micros by Management Analytic Supporc Inc. les known Group of Companies which manufactures electronic as VAULT and iell keep hackers out of your computer. components in Australia, New Zealand and Singapore. Using special coding ({keys?) (selected by each userL VALUT scrambles your information using sophisticated encryption algorithms. Information then stored, shipped or telecommunicated is as safe as if locked in a ({vault?). Without the special coding ({keys?), the information Input appears as garble. VAULT can be used either as an integral part of a ready Dear SAGE: to-use ({turn key?) application or in combination with the After writing yesterday to ask for assistance in setting up data processing and the telecommunications capabilities my SAGE IV for use with the CP/M system, I managed to of a particular microcomputer. spend a couple more hours working with it, and now have In addition to the coding ({keys?) which you select your the system working, so will not need the help I requested. self, each package can be configured with its own unique Your documentation, while very complete, is not as (( Access?) code. Without it, VA ULT ca n not be used to code clear as it could be, and I strongly suggest you improve it or decode information. OnIy the VA UL T system origi nally in that direction, so others will not have to endure the used to encrypt the file can unscramble the information. ordeal I did to do this simple task. Perhaps you should do If anyone attempts to break into your VAULT with the what Heath does - after you have written the instructions, correct ((Access?) code, you are informed of the attemp give them to a secretary or someone else who does not ted security violation. know much about computers, and see if he or she can Because of this system's unique ability to encrypt text, figure them out. It would be revealing to you, I'm sure. data, and software, the National Security Agency has George Carey placed certain restrictions on its distribution. Specifically, Marietta, GA VAUL T cannot be distributed as an export item, shipped overseas, or sold to agents of foreign governments. Sounds like the answer to the ((War Games?) syndrome! (Ed. note - We did exactly what you sugge tedJ GeorgeJ nearly three If you have something to hide, this sounds like a great month ago. We brought in everal different groups from tudent to hou e way to do it. For more information, contact MAS, 6826 wive to help us implify our manual. With their helpJ a layman hould now be able to set up a SAGE computer in 90 minutes or Ie and configure a Dean Drive, McLean, VA 22101, or phone them at (202) complete multi-u er ystem inju t 30 minute more! The new manual will be 293-1624.