|
-----Original Message-----
From: midrange-l-bounces@xxxxxxxxxxxx [mailto:midrange-l-
bounces@xxxxxxxxxxxx] On Behalf Of rob@xxxxxxxxx
Sent: Friday, April 25, 2008 11:26 AM
To: Midrange Systems Technical Discussion
Subject: Re: Encrypted Data to File
No. -Providing- you pass any questions in the V5R4 MTU and the V6R1 MTU
on hardware, I'd upgrade the 550 from V5R3 straight to V6R1 and bypass the
V5R4M5 stuff.
Rob Berendt
--
Group Dekko Services, LLC
Dept 01.073
Dock 108
6928N 400E
Kendallville, IN 46755
http://www.dekko.com
"Michael Ryan" <michaelrtr@xxxxxxxxx>
Sent by: midrange-l-bounces@xxxxxxxxxxxx
04/25/2008 11:19 AM
Please respond to
Midrange Systems Technical Discussion <midrange-l@xxxxxxxxxxxx>
To
"Midrange Systems Technical Discussion" <midrange-l@xxxxxxxxxxxx>
cc
Subject
Re: Encrypted Data to File
Since we're getting new hardware, I'd still need to do the V5R3 to
V5R4M5 upgrade on the 550, then the V5R4M6 to V6R1 upgrade on the new
Power6 box, right?
On Fri, Apr 25, 2008 at 11:13 AM, <rob@xxxxxxxxx> wrote:
550 supports V6R1https://www-304.ibm.com/systems/support/i/planning/upgrade/osmapping.html
to
Rob Berendt
--
Group Dekko Services, LLC
Dept 01.073
Dock 108
6928N 400E
Kendallville, IN 46755
http://www.dekko.com
"Michael Ryan" <michaelrtr@xxxxxxxxx>
Sent by: midrange-l-bounces@xxxxxxxxxxxx
04/25/2008 09:33 AM
Please respond to
Midrange Systems Technical Discussion <midrange-l@xxxxxxxxxxxx>
To
"Midrange Systems Technical Discussion" <midrange-l@xxxxxxxxxxxx>
cc
Subject
Re: Encrypted Data to File
Hi Rob -
Thanks for the heads up. Our BP is talking with the Ops manager right
now. I'm pretty sure they're talking about new hardware. So I'll need
to upgrade from V5R3 to V5R4M5 on the existing 550, and then upgrade
to the (I assume) whatever Power6 box running V6R1?
- Michael
On Fri, Apr 25, 2008 at 9:26 AM, <rob@xxxxxxxxx> wrote:
> Michael,
>
> If your existing hardware supports V6R1 then, by all means, upgrade
> that first. If not, then the new hardware will require that you beat
> V5R4M5 (you did see the M5, right?) before going to it by anysupported
> route.some
>
> Our existing hardware did not support V6 (270). And we want to do
> stuff like guested lpar on the new box so we upgraded to V5R4M5 onthe
> 270, restored it on to the new box, and will upgrade it to V6R1today,
> then save it all off and init the new machine so that we can restorealso
this
> V6R1 lpar as guested.
>
> Rob Berendt
> --
> Group Dekko Services, LLC
> Dept 01.073
> Dock 108
> 6928N 400E
> Kendallville, IN 46755
> http://www.dekko.com
>
>
>
>
>
>
> "Michael Ryan" <michaelrtr@xxxxxxxxx>
> Sent by: midrange-l-bounces@xxxxxxxxxxxx
> 04/25/2008 07:26 AM
> Please respond to
> Midrange Systems Technical Discussion <midrange-l@xxxxxxxxxxxx>
>
>
> To
> "Midrange Systems Technical Discussion" <midrange-l@xxxxxxxxxxxx>
> cc
>
>
>
> Subject
> Re: Encrypted Data to File
>
>
>
>
>
>
> Thanks Carsten! The plan here is to upgrade to V5R4, but there's
> a pending new hardware acquisition, and perhaps an upgrade to V6R1ago
> instead. I appreciate the information.
>
> - Michael
>
> On Fri, Apr 25, 2008 at 7:14 AM, Flensburg, Carsten
> <Flensburg@xxxxxxxxxx> wrote:
> >
> > The recent series of cryptographic APIs by Example articles are
based
> on
> > the key managament APIs introduced with release V5R4. Some time
Iproviding
> > wrote another series of articles covering this topic and
therelease
> > same functionality, that were based on the APIs available in
> > V5R3. You'll find links to these earlier articles at the end ofthe
> > article published yesterday, but I've also included them here:http://systeminetwork.com/article/apis-example-cryptographic-services-ap
> >
> > APIs by Example: Cryptographic Services APIs, Part 1:
> >
>
> > ishttp://systeminetwork.com/article/apis-example-cryptographic-services-ap
> > APIs by Example: Cryptographic Services APIs, Part 2:
> >
>
> > is-part-2http://systeminetwork.com/article/apis-example-cryptographic-services-ap
> > APIs by Example: Cryptographic Services APIs, Part 3:
> >
>
> > is-part-3http://systeminetwork.com/article/apis-example-cryptographic-services-ap
> > APIs by Example: Cryptographic Services APIs, Part 4:
> >
>
> > is-part-4http://systeminetwork.com/article/apis-example-cryptographic-services-ap
> > APIs by Example: Cryptographic Services APIs, Part 5:
> >
>
> > is-part-5http://systeminetwork.com/article/apis-example-cryptographic-services-ap
> > APIs by Example: Cryptographic Services APIs, Part 6:
> >
>
> > is-part-6http://systeminetwork.com/article/apis-example-cryptographic-services-ap
> > APIs by Example: Cryptographic Services APIs, Part 7:
> >
>
> > is-part-7Ryan
> >
> > Happy reading!
> >
> >
> > Best regards,
> > Carsten
> >
> >
> > -----Original Message-----
> > From: midrange-l-bounces@xxxxxxxxxxxx
> > [mailto:midrange-l-bounces@xxxxxxxxxxxx] On Behalf Of Michael
> >this
> > Sent: 25. april 2008 12:44
> > To: Midrange Systems Technical Discussion
> > Subject: Re: Encrypted Data to File
> >
> >
> > Very nice...looks I have some more reading in store! :)
> >
> > Question: What can be used in V5R3? Some of the key management
> utilities
> > are only available in V5R4 and higher, correct?
> >
> > Thanks...
> >
> > On Thu, Apr 24, 2008 at 4:25 PM, Flensburg, Carsten
> > <Flensburg@xxxxxxxxxx> wrote:
> > >
> > > Your assumption is correct, Michael. - Here's some more
information
> > > on the subject that might help explain the use of a salt in
> > > specificnewsletter
> > > context: http://en.wikipedia.org/wiki/Initialization_vector
> > >
> > > As coincidence would have it, this week's programming
> alsocode
> >
> > > includes an article covering this topic, together with more
> > > examples:http://systeminetwork.com/article/apis-example-cryptographic-key-manag
> > >
> > >
>
> > > em ent-encrypting-and-decrypting-data-using-key-hierarchyto
> >
> >
> > >
> > > The article doesn't appear to be on-line yet, but it should be
soon.
> > > A
> > > (free) associate membership to the System iNetwork is required
> > > access the article.Ryan
> > >
> > >
> > > Best regards,
> > > Carsten
> > >
> > >
> > >
> > > -----Original Message-----
> > > From: midrange-l-bounces@xxxxxxxxxxxx
> > > [mailto:midrange-l-bounces@xxxxxxxxxxxx] On Behalf Of Michael
> > >wrote:
> > > Sent: 24. april 2008 18:37
> > > To: Midrange Systems Technical Discussion
> > > Subject: Re: Encrypted Data to File
> > >
> > >
> > >
> > > Good refs Buck...thanks.
> > >
> > > How would this be implemented in the cryptographic APIs? Would
this
> > > be used for the Initialization Vector?
> > >
> > > On Thu, Apr 24, 2008 at 12:21 PM, Buck <kc2hiz@xxxxxxxxx>
> > > > Julius wrote:Discussion
> > > > > Carsten, could you please explain what "salt value" is.
> > > >
> > > > http://en.wikipedia.org/wiki/Salt_(cryptography)
> > > >
> > > > I've found Bruce Schneier approachable:
http://www.schneier.com/
> >
> > > > -- > > > This is the Midrange Systems Technical
> > > (MIDRANGE-L) mailing list > To post a message email:change
> > > MIDRANGE-L@xxxxxxxxxxxx > To subscribe, unsubscribe, or
listposting,
> > > options, > visit:
> > > http://lists.midrange.com/mailman/listinfo/midrange-l
> > > > or email: MIDRANGE-L-request@xxxxxxxxxxxx > Before
> > > please take a moment to review the archives > atplease
> > > http://archive.midrange.com/midrange-l.
> > > >
> > > >
> > > --
> > >
> > > This is the Midrange Systems Technical Discussion (MIDRANGE-L)
> mailing
> >
> > > list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To
subscribe,
> > > unsubscribe, or change list options,
> > > visit: http://lists.midrange.com/mailman/listinfo/midrange-l
> > > or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting,
> > > take a moment to review the archives atplease
> > > http://archive.midrange.com/midrange-l.
> > >
> > > --
> > >
> > >
> > > This is the Midrange Systems Technical Discussion (MIDRANGE-L)
> mailing
> >
> > > list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To
subscribe,
> > > unsubscribe, or change list options,
> > > visit: http://lists.midrange.com/mailman/listinfo/midrange-l
> > > or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting,
> > > take a moment to review the archives atsubscribe,
> > > http://archive.midrange.com/midrange-l.
> > >
> > >
> > --
> > This is the Midrange Systems Technical Discussion (MIDRANGE-L)
mailing
> > list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To
> > unsubscribe, or change list options,mailing
> > visit: http://lists.midrange.com/mailman/listinfo/midrange-l
> > or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please
take a
> > moment to review the archives at
http://archive.midrange.com/midrange-l
> .
> >
> > --
> > This is the Midrange Systems Technical Discussion (MIDRANGE-L)
mailing
> list
> > To post a message email: MIDRANGE-L@xxxxxxxxxxxx
> > To subscribe, unsubscribe, or change list options,
> > visit: http://lists.midrange.com/mailman/listinfo/midrange-l
> > or email: MIDRANGE-L-request@xxxxxxxxxxxx
> > Before posting, please take a moment to review the archives
> > at http://archive.midrange.com/midrange-l.
> >
> >
> --
> This is the Midrange Systems Technical Discussion (MIDRANGE-L)
> listmailing
> To post a message email: MIDRANGE-L@xxxxxxxxxxxx
> To subscribe, unsubscribe, or change list options,
> visit: http://lists.midrange.com/mailman/listinfo/midrange-l
> or email: MIDRANGE-L-request@xxxxxxxxxxxx
> Before posting, please take a moment to review the archives
> at http://archive.midrange.com/midrange-l.
>
>
> --
> This is the Midrange Systems Technical Discussion (MIDRANGE-L)
listlist
> To post a message email: MIDRANGE-L@xxxxxxxxxxxx
> To subscribe, unsubscribe, or change list options,
> visit: http://lists.midrange.com/mailman/listinfo/midrange-l
> or email: MIDRANGE-L-request@xxxxxxxxxxxx
> Before posting, please take a moment to review the archives
> at http://archive.midrange.com/midrange-l.
>
>
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
To post a message email: MIDRANGE-L@xxxxxxxxxxxx--
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.