Educause Security Discussion mailing list archives

Re: University credentials used by third parties


From: "Kieper, David" <kieperd () UWGB EDU>
Date: Fri, 20 Aug 2010 19:42:36 +0000

Anyone one remember the "snow white and the seven dwarfs" in reference to computer companies back in the 60's and 70's:

In the late 60's, IBM was snow white, and seven dwarfs were Burroughs, NCR, Univac, Honeywell, Control Data 
Corporation, RCA, and GE.  Later "dwarfs" were Xerox and DEC in the 70's.  Wang came after that...

I still have a 8 Kbit core stack module from a GE system as well as core memories and a few cpu modules from Xerox 
Sigma systems. Xerox Sigma front panel (full of switches and lights) was just too big to keep around, so that went in 
the junk years ago.  Still bring it out the old stuff for the "younger" staff to see what it was like in the 70's.

Ah yes, the good old days when a cpu was a few hundred 6" x 8" modules, in three large cabinets with miles of wire 
wrapped backplanes, IC can transistors for high speed registers, and (later) basic IC logic gates on sixteen pin chips. 
 Troubleshooting tools were an oscilloscope, rubber mallet or vibration tool, wire wrap tool, and a soldering 
gun/soldapult.   For every problem you were trying to fix, you created and resolved at least one other.  System gave 
off enough RF interference that you could tell if a diagnostic was failing by turning on a radio to just about any 
frequency and listening for changes in the static noise (that also drowned out most radio station signals within 20 
feet of it).

Regards,

David Kieper
Manager, Network and Infrastructure Services
Information Technology Security Officer
Information Services Division
University of Wisconsin - Green Bay                               office:  (920) 465-2238
2420 Nicolet Drive                                                         fax:      (920) 465-2864
Green Bay, WI  54311-7001   USA                                  email:   kieperd () uwgb edu<mailto:kieperd () uwgb 
edu>


Current thread: