Data integrity on microcomputers

Dr. T. Andrews tanner at cdis-1.uucp
Sat Sep 16 00:46:25 AEST 1989


In article <1087 at lakesys.UUCP>, davef at lakesys.UUCP (Dave Fenske) writes:
) As an example, micros have a simple parity check in memory where
) larger a larger computer might have ECC.
Micros may have anything from no error checking to full ECC.  I've
had the full range through the shop here.

) Also, the methods of checking data which is read off of disk, etc.
Essentially the same on everything from IBM mainframe to 8080 CP/M.
Special formats are also available; I saw one back-up software vendor
who stored enough redundant data that you could take a hole punch,
perf your disk, and still restore.

) In short, could a microcomputer be used in very sensitive applications?
No.  You should not use computers in sensitive applications.  The
people who screw up will simply blame the computer, and you (as
the vendor) look bad for selling them a computer.  (Why do this, when
you can look bad simply by flogging buggy software to less sensitive
users?:-)
-- 
...!bikini.cis.ufl.edu!ki4pv!cdis-1!tanner  ...!bpa!cdin-1!cdis-1!tanner
or...  {allegra attctc gatech!uflorida}!ki4pv!cdis-1!tanner



More information about the Comp.unix.xenix mailing list