[Info-vax] WHY IS VSI REQUIRING A HYPERVISOR FOR X86 OPENVMS?

Michael C superseth369 at gmail.com
Sun Dec 20 20:03:04 EST 2020


On Sunday, December 20, 2020 at 1:00:41 PM UTC-5, ajb... at gmail.com wrote:
> On 18/12/2020 17:41, supers... at gmail.com wrote: 
> > This adds more cost. Why can't it run by itself on x86? 
> > Or am I misunderstanding that you do not have to buy vmware or some other 
> > VM to run it? 
> 
> But I also don't see your point. In my experience bare metal 
> requirements cost more money because you need to buy and support/install 
> extra hardware for the platform. With a hypervisor you can just add 
> OpenVMS instances on your existing hardware. 
> 
> Where I work every bare metal server is a hassle. VMs deploy 
> automatically and there is no need to worry about the hardware. If the 
> hardware fails, VMs are moved to or restarted on different hardware. An 
> actual hypervisor _requirement_ would be perfect for us as it would cut 
> down on support costs and time. 

1ST PROBLEM - RESTARTED

THERE ARE CUSTOMERS, MOST I WOULD THINK, WHO WANT 24/7 UPTIME THAT OPENVMS
OFFERS AND NOT THE REBOOT MINDSET OF WINDOZE AND LINUS USERS.

> 
> But OpenVMS will, so they say, support both some HPE and Dell hardware 
> and some hypervisors, and all the supported hypervisors are available as 
> free editions as well as paid. 
> 
> While VirtualBox is not a production environment VMM, both KVM and 
> vSphere are and all three can be free. 
> 
> You can then install OpenVMS on your HPE hardware or install a free ESXi 
> on it or a free Linux with KVM and then OpenVMS. Where's the problem? 
> 

DOWNTIME ABOVE WAS THE FIRST. 

2ND PROBLEM - JOINING THE LINUX PATCH OF THE DAY CLUB

HERE IS THE OPENVMS CERT COUNTS AS OF 2018 COMPARE THEM WITH OTHER OSs - SEE THE PROBLEM?

HP	» Openvms	: Vulnerability Statistics 
Vulnerabilities (19)
 Vulnerability Trends Over Time
Year 	# of Vulnerabilities 	DoS 	Code Execution 	Overflow 	Memory Corruption 	Sql Injection 	XSS 	Directory Traversal 	Http Response Splitting 	Bypass something 	Gain Information 	Gain Privileges 	CSRF 	File Inclusion 	# of exploits
2005 	2 	1 													
2006 	1 	1 													
2007 	6 	4 		1 											
2008 	2 	1 		1 								2 			
2010 	3 	1 									2 	2 			
2012 	4 	3 										1 			
2018 	1 			1 											
Total 	19 	11 		3 							2 	5 			
% Of All 		57.9 	0.0 	15.8 	0.0 	0.0 	0.0 	0.0 	0.0 	0.0 	10.5 	26.3 	0.0 	0.0 	

> -- 
> Andrew Brehm



More information about the Info-vax mailing list