Feeds

Easy to use, virus free, secure: Aaah, how I miss my MAINFRAME

Back when installing drivers was someone else's problem

3 Big data security analytics techniques

Mention mainframe computers today and most people will conjure an image of something like an early analogue synthesiser crossed with a brontosaurus. Think a hulking, room-sized heap of metal and cables with thousands of moving parts that requires an army of people just to keep it plodding along.

A no-name PC today would blow a high-end 1970s mainframe out of the water thanks to the miniaturisation of electronics and vast improvements to performance in the decades since. At the same time, a desktop computer typically has to worry about just one user, its owner: machine cycles don’t have to be shared with potentially hundreds of other people and their processes, and the configuration of one person’s workstation can be completely different from the workstation at the next desk over. This is all a very good thing.

However, some of the “limitations” of mainframes were blessings in disguise.

Mainframe users didn’t need to know or care where the computer was physically located: it could have been, and often was, halfway across the country. It was an abstract thing that just worked, not much different from an electricity utility. You didn't have to pull up a chair to the actual beast, you connected to it remotely.

Developers didn’t have to concern themselves with “maintaining” the machine or peripheral devices such as disk or tape drives, and in fact couldn’t do so if they wanted to. All these things were just there, always “on”. With mainframes, there were well-run, disciplined, knowledgeable teams dedicated full-time to making sure everything was in working order. No one but the operations team had to worry about disk errors or bad memory cards. In short, as a mainframe user you had people watching over you, your data, and your apps. A benign Big Brother who made sure everything was kept humming.

Granted, this is all far too restrictive for 21st century computing needs, and certainly not enough to make anyone wish for a return to the days of the IBM System/360.

But these kinds of “lifestyle” benefits did allow mainframe users to concentrate on more important things. For programmers, as a side-effect, the restrictions of the corporate mainframe environment also prevented certain bad practices and enforced a kind of healthy discipline that to a great extent no longer exists.

Where did I leave that document?

Today developers can, if they want to, build tools and applications on isolated machines, with no checks and balances. With mainframes, applications and data were stored centrally, not on users’ personal desktops. Everything was more or less locatable. Now, it can be impossible. A “find” command run across a network is not very useful if some machines aren’t on the network to begin with, or if the data in question lives on a local drive unshared with the rest of the pack. This makes it easier to hide or bury things, intentionally or unintentionally.

At one bank I worked for, when a certain senior developer left it took months to track down all the mysterious systems and components he'd built because he hadn't told anyone where they resided, exactly what they did, how they worked. A tech manager had to check one machine after another manually until he located all the various applications the former employee had set up.

A related problem that comes with desktop decentralisation is the ability to use the job scheduler cron (or an equivalent) locally. On mainframes there was generally one central scheduler where a system operator could see the details for all batch jobs across users and applications. In the client-server world, job-management packages such as Autosys use databases that similarly live on central servers: Developers and support staff create and modify Autosys jobs via a web app that controls this shared database, and all of these can be browsed and searched. But anyone with a Windows or Linux box, even one connected to a central server, can still schedule private jobs using Task Scheduler or a local crontab file. Not a very rare occurrence.

There may be perfectly reasonable uses for these localised tools, but they’ll be unknown to the official company-wide scheduler and effectively invisible to system administrators. If a developer who has set up local batch jobs leaves the firm, there’s a chance no will even be aware of the existence of these jobs, much less be able to find them.

SANS - Survey on application security programs

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
New Facebook phone app allows you to stalk your mates
Nearby Friends feature goes live in a few weeks
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.