[Info-vax] New VSI Roadmap (yipee!)

Kerry Main kerry.main at backtothefutureit.com
Sun Mar 1 12:05:38 EST 2015


> -----Original Message-----
> From: Info-vax [mailto:info-vax-bounces at info-vax.com] On Behalf Of JF
> Mezei
> Sent: 01-Mar-15 1:59 AM
> To: info-vax at info-vax.com
> Subject: Re: [New Info-vax] New VSI Roadmap (yipee!)
> 
> On 15-02-28 23:10, Kerry Main wrote:
> 
> > Contrast that with a Lottery Cust I was working at where they were
> > so frustrated because they had a regulatory requirement to apply all
> > vendor security patches above a certain level with a fixed timeframe
> > (I think it was 45 days).
> 
> 
> So. BUND announces a vulnerability.
> 
> Linux supplies a path within 3 days. Customer complans because fix is
> avialble.
> 
> VMS *never* gets the patch or announcement that its version of BIND is
> not vulnerable, and customer is happy ?
> 
> Realy ?
> 

You assume they are using VMS Bind - I have no idea, but if not, then
they don't care. They may also be using Multinet or TCPware which if they
are, Process likely provided a fix.  

I personally use Multinet for my home systems as their features are 
better than the native stack (I don't use yet, but IPsec anyone?)

I am not defending HP's past practices, as they were just as bad for their
other OS platforms as OpenVMS.

No OS platform is 100% secure - they will all have issues at one time
or another. My concern with commodity OS's is the scale and number
of security patches and the huge impact  it has on Operations groups.

Regards,

Kerry Main
Back to the Future IT Inc.
 .. Learning from the past to plan the future

Kerry dot main at backtothefutureit dot com









More information about the Info-vax mailing list