Tech Insider					     Technology and Trends


		     Kerberos V5 Mailing List Archives

Date: Fri, 26 Apr 91 16:52:58 -0400
From: John T Kohl <jtkohl@MIT.EDU>
To: krbdev@MIT.EDU

0. next meeting is 10 May 1991, 3:30 in E40-316

0a. at the 10 May TANSTAAFL, John Kohl will be doing a dry run of his
presentation for the Tromsoe conference

1.  user2user code: <jtkohl> reprts it's limping along as of this
afternoon.  Still needs some rough edges sanded & such.

2.  gss_api: <tytso> reports making some progress, but he's discovered
some problems with using it for Kerberos; see the discuss
meeting/mailing list for details.  Hopefully this'll be fixed before
beta.

3.  library change proposal:  while it has technical merits, the risk of
screwing up are deemed too great at this stage in the game.

<jis> mutters about lack of structure tags making a change after beta a
real problem.

3.  attack plan for May: still nebulous; mostly a "get comfortable with
the code" deal.
It also includes some "knowledge transfer" from <jtkohl> to <tytso>
about things, including:
	anonymous FTP area
	release building & such
	Imakefile munging
	ISODE stuff
	install docs
<jtkohl> will certainly not be around MIT in July, and June is not certain.

4. other stuff:
	Security Dynamics is apparently making excessive claims about
what we're doing w.r.t. smart cards & public key cryptography. Other
companies (e.g. Simpact, Motorola) are "quite interested" as well.
We should be careful in what we say so as not to mislead people.

John

			        About USENET

USENET (Users’ Network) was a bulletin board shared among many computer
systems around the world. USENET was a logical network, sitting on top
of several physical networks, among them UUCP, BLICN, BERKNET, X.25, and
the ARPANET. Sites on USENET included many universities, private companies
and research organizations. See USENET Archives.

		       SCO Files Lawsuit Against IBM

March 7, 2003 - The SCO Group filed legal action against IBM in the State 
Court of Utah for trade secrets misappropriation, tortious interference, 
unfair competition and breach of contract. The complaint alleges that IBM 
made concentrated efforts to improperly destroy the economic value of 
UNIX, particularly UNIX on Intel, to benefit IBM's Linux services 
business. See SCO vs IBM.

The materials and information included in this website may only be used
for purposes such as criticism, review, private study, scholarship, or
research.

Electronic mail:			       WorldWideWeb:
   tech-insider@outlook.com			  http://tech-insider.org/