Edward E. Jaffe wrote: <begin extract> The above notwithstanding, I don't think anyone at IBM or elsewhere would recommend this technique for brand new, 21st-century development. </end extract>
and I am very pleased to see that this is his view. My own, slightly different view of "this interface" is in a certain sense admiring; but it is also very like my view of Kama Sutra position 327,859: I see that you can do it that way, but why? Moreover, as I have had occasion to say here before, its cleverness seems to me to be misplaced or, better perhaps, too provocative. It implicitly poses a challenge of the self-congratulatory form: No impostor is clever enough to penetrate our defenses! This is unfortunate because there are able old-sense hackers who respond only to such challenges. (It is a good operational premise to assume, however improbably, that attackers are as smart as defenders.) John Gilmore, Ashland, MA 01721 - USA ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN