[Info-vax] VMS83A_UPDATE V11

FrankS sapienza at noesys.com
Sat Dec 12 08:27:01 EST 2009


On Dec 11, 8:37 pm, Simon Clubley <clubley at remove_me.eisner.decus.org-
Earth.UFP> wrote:
> What percentage of the current VMS patches have problems and what is the
> percentage for the current Linux patches ?

Isn't that indeterminate?  Presumably the patch fixes things, but
there's no real way of telling whether a given patch creates new
problems.  And that would be regardless of the operating system
(OpenVMS, Windows, Linux, or other).

> Personal experience: I currently trust my Linux patches much more
> than I trust the current VMS patches.

Well goody for you.  I'm not sure what the basis is for your lack of
trust in OpenVMS patches .vs. Linux patches.  Is this a new opinion
due to the transfer of development to India?  Or is there some other
underlying distrust in developers being paid by a commercial
entity .vs. volunteer developers?

I'm not a Linux person, so pardon my ignorance.  I would think that
Linux patches are less trustworthy, given their open-source nature.
Who vets a patch to make sure it doesn't introduce a back-door
security breach, written by some mischievous "community" member?  What
is the experience level of volunteers contributing to the Linux code
base compared with those developing OpenVMS patches?

I was told by others that a recent release of Ubuntu has broken
systems using an Nvidia video card.  So far no relief (which means
lots of dead systems), and who do you complain to when that happens?



More information about the Info-vax mailing list