[Info-vax] Some of what I'm reading...

Stephen Hoffman seaohveh at hoffmanlabs.invalid
Tue May 21 14:10:47 EDT 2019



Some more of what's been on the recent reading list...

There's been the occasional porting-related discussions around the 
Apple Rosetta as an image translation tool that was used for 
application migration from PPC to Intel processors on OS X / macOS, but 
that's clearly not the only path that's available:
https://www.highcaffeinecontent.com/blog/20190518-Translating-an-ARM-iOS-App-to-Intel-macOS-Using-Bitcode 


Chocolatey, a package manager for Microsoft Windows:
https://chocolatey.org

As was mentioned in an earlier posting of mine, "PCSI lacks 
capabilities around maintaining and managing and upgrading 
dependencies, requiring end-users and developers to hand-roll their own 
unique solutions to API dependencies.   Of these, I happen to like the 
approach Oracle Rdb uses, but it's one of many.   For an  approach 
around dependency management used elsewhere, see the nix package 
manager and NixOS", and also see the Gentoo "Slotting" scheme.  This to 
allow multiple versions and multiple disparate APIs to coexist.  Yeah, 
I don't like that, but that is increasingly part of the world we're now 
in and—like the increasing need to keep applying updates and 
upgrades—we can only choose to ignore it, or we can choose to take 
steps to better deal with what we're increasingly encountering.
https://nixos.org/nix/
https://nixos.org/
https://devmanual.gentoo.org/general-concepts/slotting/index.html

An experimental LLVM JIT-like code generator:
https://github.com/pdziepak/codegen

>From Google Research, "New research: How effective is basic account 
hygiene at preventing hijacking"
https://security.googleblog.com/2019/05/new-research-how-effective-is-basic.html 


An ELF format introduction and ELF is used on OpenVMS, and a prototype 
of Linux ELF Universal Binaries that "lets you pack binaries into one 
file, seperated [sic] by OS ABI, OS ABI version, byte order and word 
size, and most importantly, CPU architecture."
https://linux-audit.com/elf-binaries-on-linux-understanding-and-analysis/
https://icculus.org/fatelf/

Google is currently posting a list of security vulnerabilities that 
were first detected through usage of an associated exploit:
https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/htmlview?sle=true 


C++ error handling preferences — though various of this is not yet 
available on OpenVMS:
https://hackernoon.com/error-handling-in-c-or-why-you-should-use-eithers-in-favor-of-exceptions-and-error-codes-f0640912eb45 


A list of CPU-level security failures—Spectre, Meltdown, Fallout, etc:
https://cpu.fail



-- 
Pure Personal Opinion | HoffmanLabs LLC 




More information about the Info-vax mailing list