[Info-vax] VSI and Process Software announcement

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Sat Sep 24 09:38:05 EDT 2016


On 2016-09-24 00:11:09 +0000, IanD said:

> I ended up having to redo a number of the installs too, partly because 
> I didn't know what I was doing and partly because it's just too easy to 
> make mistakes or miss something

I work with servers that are trivial to reinstall, while preserving 
add-on applications, users, and settings.  Sure, you can wipe and 
reinstall, or you can install the OS over itself if there's been a disk 
error or an accidental or malicious file corruption somewhere, or other 
oddity.

> Security and stability is enhanced by boiler plating what is known to 
> work rather than choosing from a myriad of options

Leading folks to proper choices, and making it harder to make bad 
choices, and scheduling and deprecating and then entirely removing 
known-insecure mechanisms and implementations.

Sitting on broken code or broken designs for reasons of compatibility 
is a Really Bad Idea.  But I'm being polite.

> I'd eventually like to see standard hardware with options selected as a 
> ready-made package install with all the configuration already done - 
> like what you can buy on Amazon when you buy a pre-configured OS + 
> package install. Much much easier to do when OpenVMS will be on a VM 
> host because hardware options will be more uniform

That's system and application profiles, and provisioning portals.  
That's something I've commented on and requested before, but too far 
out of scope for an IP overhaul.  I work with other platforms that 
support these capabilities, and the ability to tailor an install or a 
user environment is exceedingly useful.   To see just the tip of what's 
available here on other platforms, search for MDM; mobile device 
management.   This is rapidly spreading beyond mobile devices and 
client computers into servers and application management, too.

> We might even get to the stage where OpenVMS is run from a single 
> distribution file and unpacked and run in memory as a turn-key. No more 
> having to update EXE's or code in myriads of directories and scan for 
> security breaches and/or corruption. Updates would be simply a matter 
> of download a single file. Checksumming an entire system then becomes 
> much easier as it's just one single file. We could then finally move 
> towards separating the OS from user data totally and could then lock 
> down the OS even further. It's much easier to ring-fence a static or 
> near static area than a dynamic one

There's still going to need to be an incremental update mechanism, at 
least until the trade-off between update size and network bandwidth 
tilts.

> OpenVMS needs to pick up the security mantle it once had and forge 
> ahead with new ideas to attract people back to it - security going 
> forward is going to become a major issue. Performance gains will slow, 
> storage will get faster but security IMO will become more important 
> than ever and a big diffirentitor

That also includes application security — OpenVMS stinks at that, in 
terms of what's offered, in terms of how the applications are isolated, 
and in terms of the application security I've encountered — and better 
and faster handling of patches and crashes.

Again, there's more than a little work here.


-- 
Pure Personal Opinion | HoffmanLabs LLC 




More information about the Info-vax mailing list