× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Al --
 I don't recall for certain (this was over 6 months ago), and I would be
reluctant to publicly put a name out there -- and get it wrong, publicly
getting egg on both the vendor and my face! I didn't keep detail records
since I made a point of asking ALL my vendors about compatibility with
Security level 40, and the end result was we got RISC versions of all our
existing products. My point in responding to Terry was: "Be sure to ask". 

 That said, I believe it was one or more of our application development
tools vendors that had the sensitivity. In their defense I will say the
vendors that were more than willing to provide a Security level 40
compatible version. They wanted us to understand that the performance of
their tools might suffer since they couldn't use some of the "shortcuts"
they had been using. Since we were going from a F60(!) to a 720 --
performance of some of the application development tools were not
particularly high on our list of concerns. In fact it has turned out to be a
non-issue.

 If you want to pursue the matter with me offline, please feel free to
contact me.

Best regards

********** copy of original ****************
Date: Thu, 15 Jun 2000 09:39:25 -0400
From: "Al Barsa, Jr." <barsa2@ibm.net>
Subject: Re: QSECURITY Level 40

At 04:30 PM 06/14/2000 -0700, you wrote:

Which vendor had the problem?

Al


>Terry --
>  We went to level 40 when we did CISC to RISC migration.
>  One "gotcha" was with my vendors. Some of them had programs that are
>sensitive to the security level. When we planned our upgrade the second
>question I got from several vendors was "what security level will you be
>running?". I told them security level 40 and they changed the distribution
>CD.
<<< big snip >>>
>George Lemen
>Sr. Technical Consultant, CIBER Inc.
>CIBER phone/voice mail: (425) 451-2575 x142; e-mail: glemen@ciber
>Weyerhaeuser CER Operations Manager
>Weyerhaeuser phone: (253) 924-7975; e-mail: george.lemen@weyerhaeuser.com
************************** end of copy from original
****************************
George Lemen
Sr. Technical Consultant, CIBER Inc.
CIBER phone/voice mail: (425) 451-2575 x142; e-mail: glemen@ciber
Weyerhaeuser CER Operations Manager
Weyerhaeuser phone: (253) 924-7975; e-mail: george.lemen@weyerhaeuser.com

+---
| This is the Midrange System Mailing List!
| To submit a new message, send your mail to MIDRANGE-L@midrange.com.
| To subscribe to this list send email to MIDRANGE-L-SUB@midrange.com.
| To unsubscribe from this list send email to MIDRANGE-L-UNSUB@midrange.com.
| Questions should be directed to the list owner/operator: david@midrange.com
+---

As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.