[Info-vax] WHY IS VSI REQUIRING A HYPERVISOR FOR X86 OPENVMS?
Michael C
superseth369 at gmail.com
Sun Dec 20 20:03:04 EST 2020
On Sunday, December 20, 2020 at 1:00:41 PM UTC-5, ajb... at gmail.com wrote:
> On 18/12/2020 17:41, supers... at gmail.com wrote:
> > This adds more cost. Why can't it run by itself on x86?
> > Or am I misunderstanding that you do not have to buy vmware or some other
> > VM to run it?
>
> But I also don't see your point. In my experience bare metal
> requirements cost more money because you need to buy and support/install
> extra hardware for the platform. With a hypervisor you can just add
> OpenVMS instances on your existing hardware.
>
> Where I work every bare metal server is a hassle. VMs deploy
> automatically and there is no need to worry about the hardware. If the
> hardware fails, VMs are moved to or restarted on different hardware. An
> actual hypervisor _requirement_ would be perfect for us as it would cut
> down on support costs and time.
1ST PROBLEM - RESTARTED
THERE ARE CUSTOMERS, MOST I WOULD THINK, WHO WANT 24/7 UPTIME THAT OPENVMS
OFFERS AND NOT THE REBOOT MINDSET OF WINDOZE AND LINUS USERS.
>
> But OpenVMS will, so they say, support both some HPE and Dell hardware
> and some hypervisors, and all the supported hypervisors are available as
> free editions as well as paid.
>
> While VirtualBox is not a production environment VMM, both KVM and
> vSphere are and all three can be free.
>
> You can then install OpenVMS on your HPE hardware or install a free ESXi
> on it or a free Linux with KVM and then OpenVMS. Where's the problem?
>
DOWNTIME ABOVE WAS THE FIRST.
2ND PROBLEM - JOINING THE LINUX PATCH OF THE DAY CLUB
HERE IS THE OPENVMS CERT COUNTS AS OF 2018 COMPARE THEM WITH OTHER OSs - SEE THE PROBLEM?
HP » Openvms : Vulnerability Statistics
Vulnerabilities (19)
Vulnerability Trends Over Time
Year # of Vulnerabilities DoS Code Execution Overflow Memory Corruption Sql Injection XSS Directory Traversal Http Response Splitting Bypass something Gain Information Gain Privileges CSRF File Inclusion # of exploits
2005 2 1
2006 1 1
2007 6 4 1
2008 2 1 1 2
2010 3 1 2 2
2012 4 3 1
2018 1 1
Total 19 11 3 2 5
% Of All 57.9 0.0 15.8 0.0 0.0 0.0 0.0 0.0 0.0 10.5 26.3 0.0 0.0
> --
> Andrew Brehm
More information about the Info-vax
mailing list