Edward E. Jaffe wrote:

<begin extract>
The above notwithstanding, I don't think anyone at IBM or elsewhere
would recommend this technique for brand new, 21st-century
development.
</end extract>

and I am very pleased to see that this is his view.   My own, slightly
different view of "this interface" is in a certain sense admiring; but
it is also very like my view of Kama Sutra position 327,859: I see
that you can do it that way, but why?

Moreover, as I have had occasion to say here before, its cleverness
seems to me to be misplaced or, better perhaps, too provocative.  It
implicitly poses a challenge of the self-congratulatory form: No
impostor is clever enough to penetrate our defenses!  This is
unfortunate because there are able old-sense hackers who respond only
to such challenges.  (It is a good operational premise to assume,
however improbably, that attackers are as smart as defenders.)

John Gilmore, Ashland, MA 01721 - USA

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: INFO IBM-MAIN

Reply via email to