The following message is a courtesy copy of an article
that has been posted to bit.listserv.ibm-main,alt.folklore.computers as well.

[EMAIL PROTECTED] (R.S.) writes:
> Key-based solutions exist on mianframe as well as on other systems.
>
> I think it is rather technical, not ethical or organisational issue:
> It is *easy* to have illegal software on PC, sometimes you are even
> unaware of it. I mean a lot of small but usefull tools like Windows
> Commander, archivizers, DVD-burning software etc. etc.
>
> Even if you have some "tools" for z/OS it is simply not so easy to
> install it on the host - usually several persons are involed, usually
> someone could ask - "Did we buy it ? How did you get it ?".
>
> From the other hand, people are interested in having some bells &
> whistles on *their* PC (even company owned), while mainframe is not
> *their*. It is not *personal*. It's "common".

re:
http://www.garlic.com/~lynn/2007m.html#15 Patents, Copyrights, Profits, Flex 
and Hercules

slightly related recent posts about looking at software piracy (DRM) in
the mainframe and PC market space
http://www.garlic.com/~lynn/2007b.html#59 Peter Gutmann Rips Windows Vista 
Content Protection
http://www.garlic.com/~lynn/aadsm27.htm#9 Enterprise Right Management vs. 
Traditional Encryption Tools

old email about "new" apple lisa announcement and conjecture about the
processor serial number being used for software licensing (and
piracy countermeasure).
http://www.garlic.com/~lynn/2007b.html#email830213
http://www.garlic.com/~lynn/2007b.html#email830213b
in this recent post
http://www.garlic.com/~lynn/2007b.html#56 old lisa info

part of the mainframe was being able to show in court that something out
of the ordinary had to have been done to subvert the licensing
provisions (value was worth taking to court). in the PC case, the value
of individual copy makes it difficult to justify investigation and
bringing to court every individual case.

TPM is the one of the latest in pirarcy countermeasure (as well as
suppose to be countermeasure to software compromises). misc. past
posts mentioning giving an assurance talk in trusted computing
track at intel developers conference
http://www.garlic.com/~lynn/aadsm5.htm#asrn1 Assurance, e-commerce, and some 
x9.59
http://www.garlic.com/~lynn/aadsm21.htm#3 Is there any future for smartcards?
http://www.garlic.com/~lynn/aadsm23.htm#56 UK Detects Chip-And-PIN Security Flaw
http://www.garlic.com/~lynn/aadsm24.htm#23 Use of TPM chip for RNG?
http://www.garlic.com/~lynn/aadsm24.htm#52 Crypto to defend chip IP: snake oil 
or good idea?
http://www.garlic.com/~lynn/2005g.html#36 Maximum RAM and ROM for smartcards
http://www.garlic.com/~lynn/2005o.html#3 The Chinese MD5 attack
http://www.garlic.com/~lynn/2006p.html#48 Device Authentication - The answer to 
attacks lauched using stolen passwords?
http://www.garlic.com/~lynn/2006w.html#37 What does a patent do that copyright 
does not?
http://www.garlic.com/~lynn/2007g.html#61 The Perfect Computer - 36 bits?
http://www.garlic.com/~lynn/2007g.html#63 The Perfect Computer - 36 bits?
http://www.garlic.com/~lynn/2007l.html#42 My Dream PC -- Chip-Based

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to