home.social

#sunmicrosystems — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #sunmicrosystems, aggregated by home.social.

  1. Found an SS10 with a ZX card. Seller is asking USD 700. What happened to these people? Also, as expected, NVRAM is dead, so they are asking USD 700 for a machine that needs immediate computer surgery, both AUI and TP interfaces failing internal loopbacks (prolly NVRAM, not a dead LANCE chip – its register tests are passing) and no keyboard.

    So the ZX is basically worthless without a Type 4/5 keyboard and it also needs a DB13W3-capable monitor

    #retrocomputing #sunmicrosystems #vintagecomputing

  2. Au début des années 90, RDI a eu une idée simple :
    “Et si on mettait une SPARCstation Sun… dans un portable ?”
    Résultat : le BriteLite SPARC Laptop Workstation avec CPU SPARC et Solaris.

    A lire : silicium.org/index.php/blog-ca

    #RetroComputing #Unix #SunMicrosystems #SPARC #Workstation #TechHistory #silicium

  3. I found this reply that I made in 1984 to Dennis Ritchie in the net.followup newsgroup. I was at the time lobbying Sun to add 8-bit character set support to the firmware, but they wanted to hold out for a 16-bit system, like the as yet unnamed Unicode. There was eventually an interim solution but my memory of that is a bit foggy.

    #Usenet #DennisRitchie #C #Pascal #emacs #VT100 #charactersets #ISO8859 #languages #Swedish #programming #unicode #SunMicrosystems #Värmland

  4. A fascinating look back at 1994: Bud Tribble explaining the pivotal alliance between NeXT and Sun Microsystems.

    It’s incredible to read how OpenStep was pitched as the "mature" object-oriented solution back then—laying the groundwork for the architecture we still use today in macOS. Real engineering history.

    #RetroComputing #NeXTSTEP #SunMicrosystems #TechHistory #Unix #OpenStep #Apple

    computeradsfromthepast.substac

  5. @Gammitin

    Nice. This used the #CDE desktop, based on #Motif. I did prefer the earlier #OpenWindows / #OpenLook, though. Partially because I was involved in the development of that.

    #SunMicrosystems

  6. Thinking about selling my Sun TAAC-1 VLIW board. Introduced in 1987, it was a coprocessor for VME Sun-3 systems, and the world's first "Board Level General-Purpose Graphics Processing Unit", according to some.

    Approximately 400 were made.

    Photogenic little beastie, among other things.

    If you're interested, please email: [email protected]

    #Sun #SunMicrosystems #VLIW #RetroComputing

  7. Feb. 11, 2004: Andy Bechtolsheim rejoins #SunMicrosystems through the acquisition of #Kealia, bringing in servers designed around the AMD #Opteron. Video of Andy showing off "Thumper" - 48 drive dual Opteron system: youtube.com/watch?v=-zQ5RLAyA7 #Suntember

  8. 40 years later, X Window System is far more relevant than anyone could guess - Enlarge (credit: Getty Images)

    Often times, when I am research... - arstechnica.com/?p=2032813 #sunmicrosystems #xwindowsystem #astrophysics #dumbterminal #wayland #zaphod #linux #tech #unix #vax #x11 #x

  9. Blade count: 4 Blade 100, 2 Blade 150. Obviously #nvram is dead on all. #sunmicrosystems

  10. Sigh, of course the #NVRAM battery is dead. What else would it be eh? Who was the idiot at #sunmicrosystems that decided that using NVRAM chips with integrated batteries is a good idea ? Deserves a public flogging.. grr #ffs

  11. What the history of OpenBoot, Phrack, Mudge & Solaris, can teach us about the wisdom (or not) of Apple’s building their iPhone security debugging-backdoor-NSA-hack thing

    In the days before people really, really, cared about security — when it was more amazing that mainstream computers worked at all rather than that they offered falsifiable guarantees about privacy and integrity, and most of all in the days before hackerdom decided that it would be great if all the world’s computation ran on “…surely 640Kb is enough for anyone?” glorified MS-DOS personal computers rather than on architectures specifically designed to carry the weight of “big data”… back in those days there was the concept of a monitor.

    By monitor we don’t mean VDU nor LCD screen, but instead that what you considered to be your entire computer operating system was something which could be paused, inspected, poked, amended, restarted or halted, all by a little parasitic computer system which probably polled the device tree and booted it up in the first place. The consequence of the monitor was that — beyond being a mere “boot loader” — you were essentially running your entire operating system kernel under a live debugger on a 24×7 basis.

    This “debugger” was the monitor; sometimes it was separate hardware, sometimes it was just a firmware-level subsystem with which you could interrupt your operating system at any point, and call back into. At Sun Microsystems (in particular, but much the same was available elsewhere) the monitor evolved into a complete and flexible little solution called OpenBoot, which subsequently became a PCI standard (it is/was(?) even in MacOS) and it was massively powerful.

    Unfortunately: with great power comes great responsibility, which (per the first paragraph) people were not really aware of, yet.

    So, in July 1998, Mudge posted in Phrack an article titled “FORTH Hacking on Sparc Hardware” explaining how to use the monitor to change the UID of your shell process to be zero/the root user:

    Fire up the trusty OpenBoot system via L1-A and get the pointer to thecred structure via :ok hex f5e09000 18 + l@ .f5a99858ok goNow, get the effective user id byok hex f5a99858 4 + l@ .309   (309 hex == 777 decimal)ok goOf course you want to change this to 0 (euid root):ok hex 0 f5a99858 4 + l!ok gocheck your credentials!Alliant+ iduid=777(mudge) gid=1(other) euid=0(root)

    tl;dr — press some keys, type a magic incantation in Forth and you become “root”

    Let’s just say that OpenBoot was a very powerful and essential medicine… but that provision of that power caused security side-effects/issues that were not going to go away in any short period of time. An excellent little white paper from GIAC provided a synopsis and context from a few years later, in 2001.

    The technique of elevating user privileges by manually editing system runtime memory is an exploit that can be used to subvert all operating system security measures. This vulnerability is not operating system platform specific and exists in all computer hardware that utilizes a programmable firmware component for hardware control and bootstrapping procedures. This paper will explain this vulnerability as a class of exploit and utilize the SUN Microsystems’ OpenBoot programmable ROM (PROM) and Solaris as a technical example.

    https://www.giac.org/paper/gcih/182/privilege-elevation-system-memory-editing-sun-sparc-platform/101427

    Speaking as one of the people who had to clean up the mess: we/Sun Microsystems should have done a lot more to mitigate the ability of people to get at this powerful medicine; this issue was significant amongst others which drove Sun’s internal security community to create and force the adoption of the “Secure By Default” initiative, and to formalise customer provision and promote adoption of the Solaris Security Toolkit which (amongst many other configuration changes) locked-down several different routes by which the OpenBoot monitor could be exploited.

    From the perspective of 2023: this all should have happened 5, perhaps 10 years before Mudge’s posting, but there was neither the corporate will — nor customer will/expertise — to address the matter at that time.

    So when I look at Apple, and there’s an apparent hardware debugging widget in the memory which can be driven by undocumented means to poke the entire system, for a device which they are literally advertising as robust and secure, my reactions are basically:

    1. Dude…
    2. Dudes…
    3. Dudettes…
    4. What the fuck?
    5. This is history repeating itself…
    6. Like really, what the fuck?
    7. At least when we did it, it was in a world where hardly anyone cared.

    #apple #essay #mudge #openboot #operationTriangulation #sunMicrosystems

    https://alecmuffett.com/article/108789

  12. At the first Digital Crafts Day on Friday we had Richard's SUN Iced Tea. A must have for a Java and fan boy!

  13. Annual #introduction #ComputerHistory

    I'm a retired (3rd time) techie with an incredibly lucky career and family.

    I'm most famous as being employee number 8 of #SunMicrosystems, and I got to work with the Bell Labs #UNIX team for a summer during the birth of V7 #UNIX.

    My Silicon Valley career started with #Amdahl in 1978, followed by Sun for 12 years. I've since founded 4 startups (see profile).

    I toot about #ComputerHistory; I've been there for much of it.

  14. Annual #introduction #ComputerHistory

    I'm a retired (3rd time) techie with an incredibly lucky career and family.

    I'm most famous as being employee number 8 of #SunMicrosystems, and I got to work with the Bell Labs #UNIX team for a summer during the birth of V7 #UNIX.

    My Silicon Valley career started with #Amdahl in 1978, followed by Sun for 12 years. I've since founded 4 startups (see profile).

    I toot about #ComputerHistory; I've been there for much of it.

  15. Annual #introduction #ComputerHistory

    I'm a retired (3rd time) techie with an incredibly lucky career and family.

    I'm most famous as being employee number 8 of #SunMicrosystems, and I got to work with the Bell Labs #UNIX team for a summer during the birth of V7 #UNIX.

    My Silicon Valley career started with #Amdahl in 1978, followed by Sun for 12 years. I've since founded 4 startups (see profile).

    I toot about #ComputerHistory; I've been there for much of it.

  16. Annual #introduction #ComputerHistory

    I'm a retired (3rd time) techie with an incredibly lucky career and family.

    I'm most famous as being employee number 8 of #SunMicrosystems, and I got to work with the Bell Labs #UNIX team for a summer during the birth of V7 #UNIX.

    My Silicon Valley career started with #Amdahl in 1978, followed by Sun for 12 years. I've since founded 4 startups (see profile).

    I toot about #ComputerHistory; I've been there for much of it.

  17. Als Sun Microsystems ca. 2005 eine neue Generation x86-Server (auf Basis AMD Opteron) einführte, haben sie dazu einen sehr unterhaltsamen Videoclip produziert. Und dieses Format danach dann noch mehrfach genutzt. Weil ich die einzelnen Teile kürzlich mühsam zusammen suchen musste, habe ich die für euch mal in eine Playlist zusammen gestellt. Enjoy: youtube.com/playlist?list=PLb5 #retrocomputing #vintagecomputing #itguy #sunmicrosystems

  18. Why Vinod Khosla thinks radiologists still practicing in 10 years will be ‘causing deaths’ - Doubling down on comments he’s made throughout the years regarding AI’s potential impact on the medi... more: feedproxy.google.com/~r/Techcr #artificialintelligence #creativedestructionlab #sunmicrosystems #vinodkhosla #toronto #health #khosla #tc