Ya know, it finally dawned on idiot Dave that the topic is TCP/IP, not
all of VMS.
As far as TCP/IP is concerned, yes, totally get rid of the old stuff.
VSI most likely got the Multinet stuff because they determined for
various reasons that the HP TCP/IP just wasn't going to work.
But why stop a good conversation? As for VMS ....
On 4/17/2020 3:47 PM, Stephen Hoffman wrote:
> On 2020-04-16 23:34:25 +0000, Dave Froble said:
>
>> On 4/16/2020 6:26 PM, Stephen Hoffman wrote:
>>> On 2020-04-16 21:35:44 +0000, g érard Calliet said:
>>>
>>>> Le 15/04/2020 à 17:15, Stephen Hoffman a écrit :
>>>>> Tomorrow is not yesterday.
>>>> Totally right.
>>>>
>>>> If I unsderstand your point, because tomorrow is not yesterday,
>>>> because VMS is of yesterday, and not will be just immediatly
>>>> tomorow, the good choice is to abandon the users of yesterday, to
>>>> get profit today
>>>
>>> Existing users that aren't upgrading (and that aren't staying on
>>> support) aren't profitable.
>>
>> For VSI. The users may be very profitable.
A profitable user on VMS is a good candidate for support revenue in the
future.
> If the users are very profitable and are no not keeping OpenVMS current
> and supported, they probably aren't the best long-term prospect for VSI,
> but whatevers.
Just need to find a way into their wallets ...
>>> They might eventually upgrade (which would be good for VSI), or they
>>> might eventually migrate elsewhere (which is common).
>>
>> Embracing VSI would be my choice.
>>
>>> Those users that do upgrade will tell you—understandably—that
>>> they want complete and total upward API/ABI compatibility.
>>
>> Perhaps, and perhaps not. Not sure just what "total upward
>> compatibility" is. This may not be an easy concept.
Now, maybe I'm not mainstream, but, I believe firmly in keeping
different levels separate. The OS is the OS, user apps should keep
hands off. The concept holds for other levels of apps.
If the concept is observed, then VSI could make changes to OS pieces and
not affect people's apps. Might be a dubious "IF".
>>> Which is fundamentally impossible to achieve, while also fixing old
>>> limitations and old issues.
>>
>> I'm going to disagree. It will depend heavily on just what is meant
>> by "fixing". Myself, I'd say "add new capabilities".
>
> There are bits of OpenVMS that are just broken. Not the least of which
> are parts of system security.
See above about segregation. Should be able to fix much without greatly
affecting user apps.
>>> Upward-compatibility which both leaves customers with unfixable
>>> issues, and it leaves developers (both existing and potential new)
>>> with limited and absurd interfaces.
>>
>> Ok, if the "old" leave users with problems, then they either implement
>> solutions to the problems, or, they live with the problems. Some will
>> live with the problems. Others will recognize that modifications are
>> needed, and implement the modifications. Either option is acceptable,
>> depending on customer's needs.
>
> Downside is now VSI has to maintain both, document both, developers have
> to understand and check for and maintain one or more, and some choices
> are known vulnerable, and new apps and new developers get to wade
> through the defaults, and—classically—the defaults are bad choices.
> Preserving the old is not without costs. Those costs might well be
> acceptable to some. They won't be to others.
What's to maintain? It already exists. Spend time on the "new stuff".
Consider having a system wide option, old or new. Then people using
"new" won't have to know a thing about "old". Note, not sure if this is
a good idea, just thinking random thoughts.
Consider VAX/VMS V7.3. This is it. No new stuff. Perhaps some of "old
VMS" could be treated in a similar manner.
Not saying the above have been thought out. Just attempting to come up
with ideas of how to avoid either/or which will always leave someone
unhappy. Unhappy as in no support revenue.
> ...
>
>>> It's all a balance. But that balance has been skewed toward
>>> no-changes for too many decades. And even where the old designs are
>>> still working, they're routinely reaching design limits. Two TiB
>>> storage addressing, for instance.
>>
>> Perhaps I don't need greater than 2 TB. While some might. Seems to
>> me that the new file system will address the 2 TB issue, while some
>> like me will continue to use ODS2. Do not other OSs allow more than
>> one file system? VMS already does so.
>
> This isn't limited to the file systems. There's a whole lot of other
> code that'll break, due to 32-bit values scattered around within the RMS
> data structures, XQP data structures, device drivers, and in $qio and
> $io_perform storage I/O calls.
If there are things to address such issues, then if used there would be
no problems.
While I hate "wrappers", they can be easy solutions. Perhaps implement
new solutions, with a wrapper that takes the old parameters. That does
get to be a problem when using RMS data structures. But hey, VSI has a
lot of smart people. Perhaps they will devise some good solutions.
> As for file systems, ExFAT (read-write) and maybe NTFS (read, or
> read-write) would be nice to see added, maybe also UDF and a few other
> choices later. But I digress.
>
> ...
>
>>
>>> But again, there's this recurring belief it's possible to have both
>>> upward-compatibility and to fix fundamental errors, and that's just
^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^^
Actually, two different subjects. Could have one without the other.
Will be exceptions.
>>> not the case.
>>
>> Strictly speaking, no. But what about fixing the fundamental errors
>> (as in implementing new capabilities) and not chopping out the old.
>> LEaving the issues, if the old is the chosen path for some users?
>
> Great idea! Why didn't I think of that! Oh, wait, it's because that
> cannot be done. Because we cannot fit 16 or 32 bytes of data into an
> existing 8-byte buffer. Among other limits.
But one can implement new routines ....
>>> You cannot put sixteen or thirty-two bytes into an eight-byte buffer.
>>> That just fundamentally doesn't work.
>>
>> Nope. But you can provide new functionality that solves that problem.
>> Ues it, or not, as each user chooses.
>
> Which now means VSI has both secured code and insecure code, and has to
> maintain both.
> The developers and third-party vendors now have the scintillating joy of
> having to correctly adapt to both, too.
It's not clear to me that one would have to adapt to both.
>>> Upgrades can and will and must break specific APIs, where that's
>>> necessary, and which'll send some sites into agony around upgrades.
>>
>> "Could", but not "must". Allow a choice.
>
> Other than being fundamentally impossible, sure.
Impossible only lasts until something is done.
>>>> In my humble opinion, if VMS is of yesterday (right) and not will be
>>>> immediatly tomorow (right) help today those are on yesterday to go
>>>> to tomorow.
>>>
>>> The last twenty years of the keep-mostly-doing-what-we've-done
>>> strategy have been a roaring success for OpenVMS, and OpenVMS is
>>> clearly everywhere and massively popular, eh?
>>
>> I'd suggest most of the blame of that lies with DEC/Compaq/HP not
>> maintaining the OS over those 20 years, not doing a decent job of
>> marketing, telling people to migrate elsewhere, and all the rest of
>> the mis-handling of the OS.
>
> ~25 years, if we're counting Windows Affinity and the rest of 1990s DEC.
> And now the "fun" of trying to catch up with selected parts of what's
> happened over the last ~25 or so awaits VSI.
>
>>> A few things to ponder:
>>>
>>> ...How do you fit sixteen or thirty-two bytes of data into an eight
>>> byte buffer? Explain how that works.
>>
>> A new routine with adequate buffer size.
>
> Which breaks ABI and API and upward-compatibility.
Not if the old routine is still around, and users only need 8 bytes.
>>> ...How easy was it to write a non-trivial 64-bit native app on OpenVMS?
>>> Go try it.
>>
>> Make it easier.
>
> Which again breaks ABI and API and upward-compatibility. And some cranky
> folks, if (when?) the 32-/64-bit design gets deprecated.
There are no perfect solutions.
>>> ...How can a developer isolate their app code and their system
>>> against untrusted data, or against a remote attacker that might gain
>>> execute access? Attacks are only improving.
>>
>> If this is needed, then use the tools that do so. The need may not be
>> universal. Leave the decision to the users.
>
> Which is how we get into messes.
>
>>> ...And of course, everybody here has secure, encrypted, robust, and
>>> easy-to-use secrets (passwords, private keys, etc) storage, and
>>> robust mechanisms for secrets deployment, right?
>>
>> No, we don't. Some of this is being addressed by VSI.
>
> Not that I've heard about a key store...
Nor have I, and one would be nice. If easy to use.
>>> We aren't in the last millennium (yesterday), even of some of our
>>> designs and approaches and thinking and apps might still be.
>>
>> Rarely been a good idea to "re-invent the wheel". If it ain't broke,
>> don't fix it. If something new is needed, implement it.
>
> With a whole lot of code, it works, leave it alone.
>
> But with some parts of existing code, if it ain't broke, you're probably
> ignoring some deeper issues awaiting within.
>
> We all have to make the trade-offs inherent here, too.
>
> But getting back to an earlier comment up-thread, don't expect folks
> looking at OpenVMS for overhauled and new deployments to be interested
> in these trade-offs, save as these trade-offs might or do increase the
> cost and complexity of selecting OpenVMS.
>
>
>
>
--