Pointy Haired Boss (Dilbert)

Sent from ProtonMail, Swiss-based encrypted email.

GPG Public Key - 
https://api.protonmail.ch/pks/lookup?op=get&search=markjac...@protonmail.com

‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Tuesday, April 2, 2019 9:30 AM, Vernooij, Kees (ITOP NM) - KLM 
<kees.verno...@klm.com> wrote:

> PHB: poly-beta-hydroxybutyrate?
>
> Kees.
>
> > -----Original Message-----
> > From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
> > Behalf Of Richards, Robert B.
> > Sent: 02 April, 2019 15:18
> > To: IBM-MAIN@LISTSERV.UA.EDU
> > Subject: Re: Pervasive encryption and batch temporary datasets
> > In the strictest terms, yes, as long as you understand that pervasive
> > encryption embodies all the pieces and parts and not just DS encryption.
> > AND, with the current hardware of the z14 models and/or second generation
> > LinuxONE machines. I am not sure I would use the "prereq" term though.
> > Coreq might be better. :-)
> > Too many people (PHB types) are misusing the term "Pervasive Encryption",
> > probably intentionally.
> > Bob
> > -----Original Message-----
> > From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
> > Behalf Of Allan Staller
> > Sent: Tuesday, April 02, 2019 8:59 AM
> > To: IBM-MAIN@LISTSERV.UA.EDU
> > Subject: Re: Pervasive encryption and batch temporary datasets
> > Let me try it this way.
> > Is df/SMS encryption a pre-requisite to the z/14 "PERVASIVE ENCRYPTION"?
> > Thanks for all you time and effort,
> > -----Original Message-----
> > From: IBM Mainframe Discussion List IBM-MAIN@LISTSERV.UA.EDU On Behalf
> > Of Timothy Sipples
> > Sent: Tuesday, April 2, 2019 1:06 AM
> > To: IBM-MAIN@LISTSERV.UA.EDU
> > Subject: Re: Pervasive encryption and batch temporary datasets
> > Allan Staller wrote:
> >
> > > My understanding is that this was a "hardware" feature and did not
> > > depend on DFSMS (except as possible an on/off switch).
> > > In you post you refer to PERVASIVE ENCRYPTION (z/14?) vs pervasive
> > > encryption (df/SMS). Can you comment on the prior posts requiring
> > > DF/SMS extended format as a pre-requisite?
> >
> > I don't fully understand the question.
> > Let's see how IBM explains these terms.... OK, here's how IBM defined
> > Pervasive Encryption (and other terms) in October, 2017:
> > "Pervasive encryption is a consumable approach to enable extensive
> > encryption of data in-flight and at-rest to substantially simplify
> > encryption and reduce costs associated with protecting data and achieving
> > compliance mandates....
> > "The IBM z14 platform provides the hardware infrastructure, in a balanced
> > system design, with the encryption capabilities that now make it possible
> > to create a fortified perimeter around critical business data....
> > "The IBM Z operating environments, such as z/OS®, are designed to take
> > advantage of the z14 platform imbedding the use of the z14 cryptographic
> > engines within the operating environment to help create an environment
> > where policies can be enforced that govern intrinsic data protection,
> > helping clients build the perimeter around business data....
> > "z/OS V2.3 and z14 can help drive pervasive encryption efforts within an
> > enterprise by supporting clients in their objective to meet complex
> > compliance mandates by creating a fortified perimeter around core business
> > data. z/OS is designed to provide new policy-based encryption options that
> > take full advantage of the improvements in the z14 platform and can help
> > clients protect their critical business data. These new capabilities
> > include:
> > • Enhanced data protection for many z/OS data sets, FS file systems, and
> > Coupling Facility structures gives users the ability to encrypt data
> > without needing to make changes to applications to imbed encryption APIs
> > within applications
> > • New z/OS policy controls make it possible to use pervasive encryption to
> > help protect user data and simplify the task of compliance
> > • z/OS Communications Server includes encryption-readiness technology to
> > enable z/OS administrators to determine which TCP and Enterprise Extender
> > traffic patterns to and from their z/OS systems meet approved encryption
> > cr iteria and help simplify the task of compliance...."
> > OK, so let's pick this apart again. Oversimplifying only slightly:
> > Pervasive Encryption -- and I'll capitalize the second word, too -- is the
> > "approach," the applied concept. In another era IBM might have called this
> > concept an "Architecture." Maybe something like "Enterprise Encryption
> > Architecture" (EAA). With a forward slash somewhere for good measure. :-)
> > The z14 models (and second generation LinuxONE machines, I would add --
> > they featured in separate announcements) are the first (and only to date)
> > hardware enablers of Pervasive Encryption.
> > As with the z14 machine, z/OS Data Set Encryption is one (but only one)
> > important enabler of Pervasive Encryption as applied to z/OS. Yes, you can
> > implement Pervasive Encryption without z/OS; the concept applies to other
> > operating systems, including Linux.
> > You can pervasively encrypt (adverb, lowercase) data on machines prior
> > to the z14, and for that matter without z/OS Data Set Encryption.
> > Encryption, and the ability of application programmers to use it, even
> > pervasively, has been an evolving fixture of IBM Z (and prior) platforms
> > since the 1970s.
> > And if you had/have a particularly energetic and dedicated application
> > development team, well managed and supervised, you can pervasively encrypt
> > data. Nobody I've encountered actually did this (pervasively encrypt all
> > data), which is why Pervasive Encryption is quite important and
> > revolutionary. You can also use z/OS Data Set Encryption, even
> > pervasively, on IBM z196/z114 and newer machines. There will be processing
> > overhead and possible service level implications pre-z14, but you can, and
> > you probably should, at least to some degree. (Make forward progress,
> > always.) However, in IBM's view, Pervasive Encryption -- the
> > "architectural level set," as it were -- requires IBM z14 (or second
> > generation LinuxONE machines), and it requires adopting multiple z/OS
> > features if you have z/OS, including but not limited to z/OS Data Set
> > Encryption.
> > Does all that make sense now?
> > Or, if you want the short official version, here's what IBM wrote in its
> > z/OS Data Set Encryption FAQ:
> > "What is the difference between data set encryption in z/OS V2.2 and
> > pervasive encryption in the July 2017 IBM Z announcements?
> > "Data set encryption, which is one aspect of pervasive encryption, is
> > available in z/OS V2.2 when the requisite service is applied."
> > Too simple. I would have added "which is one aspect of Pervasive
> > Encryption as applied to z/OS," but that would have required 4 more words.
> > :-)
> > Yes, lots of people ask questions such as, "We're implementing Pervasive
> > Encryption on z/OS. Does it support zFS?" I know what the questioner
> > means: z/OS Data Set Encryption here, not Pervasive Encryption. The
> > pronoun "it" in this example actually, in reality, refers to z/OS Data Set
> > Encryption. Sometimes it helps to be precise, but as long as I understand
> > the question, I'm fine. I won't quibble.
> >
> > Timothy Sipples
> > IT Architect Executive, Industry Solutions, IBM Z & LinuxONE
> >
> > -----------------------------------------------------------------------------
> >
> > E-Mail: sipp...@sg.ibm.com
> >
> > For IBM-MAIN subscribe / signoff / archive access instructions, send email
> > to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> > ::DISCLAIMER::
> >
> > ------------------------------------------------------------------------------------------------------------------------------------------------------
> >
> > The contents of this e-mail and any attachment(s) are confidential and
> > intended for the named recipient(s) only. E-mail transmission is not
> > guaranteed to be secure or error-free as information could be intercepted,
> > corrupted, lost, destroyed, arrive late or incomplete, or may contain
> > viruses in transmission. The e mail and its contents (with or without
> > referred errors) shall therefore not attach any liability on the
> > originator or HCL or its affiliates. Views or opinions, if any, presented
> > in this email are solely those of the author and may not necessarily
> > reflect the views or opinions of HCL or its affiliates. Any form of
> > reproduction, dissemination, copying, disclosure, modification,
> > distribution and / or publication of this message without the prior
> > written consent of authorized representative of HCL is strictly
> > prohibited. If you have received this email in error please delete it and
> > notify the sender immediately. Before opening any email and/or
> > attachments, please check them for viruses and other defects.
> >
> > ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
> >
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
> >
> > For IBM-MAIN subscribe / signoff / archive access instructions,
> > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
> For information, services and offers, please visit our web site: 
> http://www.klm.com. This e-mail and any attachment may contain confidential 
> and privileged material intended for the addressee only. If you are not the 
> addressee, you are notified that no part of the e-mail or any attachment may 
> be disclosed, copied or distributed, and that any other action related to 
> this e-mail or attachment is strictly prohibited, and may be unlawful. If you 
> have received this e-mail by error, please notify the sender immediately by 
> return e-mail, and delete this message.
>
> Koninklijke Luchtvaart Maatschappij NV (KLM), its subsidiaries and/or its 
> employees shall not be liable for the incorrect or incomplete transmission of 
> this e-mail or any attachments, nor responsible for any delay in receipt.
> Koninklijke Luchtvaart Maatschappij N.V. (also known as KLM Royal Dutch 
> Airlines) is registered in Amstelveen, The Netherlands, with registered 
> number 33014286
>
> --
>
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to