The following message is a courtesy copy of an article that has been posted to bit.listserv.ibm-main,alt.folklore.computers as well.
[EMAIL PROTECTED] (R.S.) writes: > Key-based solutions exist on mianframe as well as on other systems. > > I think it is rather technical, not ethical or organisational issue: > It is *easy* to have illegal software on PC, sometimes you are even > unaware of it. I mean a lot of small but usefull tools like Windows > Commander, archivizers, DVD-burning software etc. etc. > > Even if you have some "tools" for z/OS it is simply not so easy to > install it on the host - usually several persons are involed, usually > someone could ask - "Did we buy it ? How did you get it ?". > > From the other hand, people are interested in having some bells & > whistles on *their* PC (even company owned), while mainframe is not > *their*. It is not *personal*. It's "common". re: http://www.garlic.com/~lynn/2007m.html#15 Patents, Copyrights, Profits, Flex and Hercules slightly related recent posts about looking at software piracy (DRM) in the mainframe and PC market space http://www.garlic.com/~lynn/2007b.html#59 Peter Gutmann Rips Windows Vista Content Protection http://www.garlic.com/~lynn/aadsm27.htm#9 Enterprise Right Management vs. Traditional Encryption Tools old email about "new" apple lisa announcement and conjecture about the processor serial number being used for software licensing (and piracy countermeasure). http://www.garlic.com/~lynn/2007b.html#email830213 http://www.garlic.com/~lynn/2007b.html#email830213b in this recent post http://www.garlic.com/~lynn/2007b.html#56 old lisa info part of the mainframe was being able to show in court that something out of the ordinary had to have been done to subvert the licensing provisions (value was worth taking to court). in the PC case, the value of individual copy makes it difficult to justify investigation and bringing to court every individual case. TPM is the one of the latest in pirarcy countermeasure (as well as suppose to be countermeasure to software compromises). misc. past posts mentioning giving an assurance talk in trusted computing track at intel developers conference http://www.garlic.com/~lynn/aadsm5.htm#asrn1 Assurance, e-commerce, and some x9.59 http://www.garlic.com/~lynn/aadsm21.htm#3 Is there any future for smartcards? http://www.garlic.com/~lynn/aadsm23.htm#56 UK Detects Chip-And-PIN Security Flaw http://www.garlic.com/~lynn/aadsm24.htm#23 Use of TPM chip for RNG? http://www.garlic.com/~lynn/aadsm24.htm#52 Crypto to defend chip IP: snake oil or good idea? http://www.garlic.com/~lynn/2005g.html#36 Maximum RAM and ROM for smartcards http://www.garlic.com/~lynn/2005o.html#3 The Chinese MD5 attack http://www.garlic.com/~lynn/2006p.html#48 Device Authentication - The answer to attacks lauched using stolen passwords? http://www.garlic.com/~lynn/2006w.html#37 What does a patent do that copyright does not? http://www.garlic.com/~lynn/2007g.html#61 The Perfect Computer - 36 bits? http://www.garlic.com/~lynn/2007g.html#63 The Perfect Computer - 36 bits? http://www.garlic.com/~lynn/2007l.html#42 My Dream PC -- Chip-Based ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

