Forgot your password?

Comment: Re:... really 13 years to update? (Score 2) 341

When a hammer works, you don't get a new one just because there is a new one. Upgrades cost a fortune for most businesses and upgrades nearly always break some part of the business process. Most businesses have been burned by the upgrade process in the past and when they start putting a dollar figure on the upgrade vs the cost of not doing the upgrade, it is often cheaper to not do the upgrade.

Comment: Re:Obsolete (Score 1) 164

by thogard (#46378927) Attached to: ICANN Considers Using '' To Tackle DNS Namespace Collisions

Oddly enough, it wouldn't. You could use NAT hardware in front of old gear and everything will just keep working. Stuff that gets updated, could just use the new syntax and deal with things correctly. Stuff like core routers and switches wouldn't care. It would be fare less disruptive than trying to install ipv6.

Comment: Re:Obsolete (Score 1) 164

by thogard (#46355837) Attached to: ICANN Considers Using '' To Tackle DNS Namespace Collisions

Early ip resolver libraries would sometimes parse octal ip addresses with commas as in your example of /.'s ip address as 330,42,265,55. Many of those would also deal with a 0xd822b52d or sometimes without the 0x. Many systems will let you do something like "ifconfig en0 0xd822b52d/32 alias"

Some of the early proposals to expand the IPv4 address space was to allow use more of the bits from the ports source and destination addresses so you could do things like "ping" or "ifconfig en0 dstbits 4 srcbits 8"

Comment: Re:Hash (Score 1) 195

by thogard (#46207289) Attached to: Is Whitelisting the Answer To the Rise In Data Breaches?

Microware OS-9 from 1979 used program and modules somewhat like DLL or shared libraries. The code to load a module would CRC check them when loaded and that bit of code could check a list and that list could either allow or deny any module. If you loaded the right data module, you had built in white listing about 3 and a half decades ago.

Comment: Re:x86 IS efficient (Score 2) 168

by thogard (#46099095) Attached to: AMD Announces First ARM Processor

There is one disadvantage of the different ARM modes and that is the an arbitrary program will contain all the needed bit patters to make some useful code. This means that any reasonable large program will have enough code to support hacking techniques like Return Oriented Programming if another bug can be exploited. I would love to see some control bits that turn off the other modes.

Comment: Re:No mention of SPARC? (Score 1) 223

by thogard (#45951415) Attached to: James Gosling Grades Oracle's Handling of Sun's Tech

Early Java was nothing other than a mess of pointers to pointers to pointers to pointers to more pointers all in a multi threaded system. The T1 addressed that problem but the concept of "All problems in computer science can be solved by another level of indirection*" is false and at some point compiler writers fix part of it. When they win, concepts like the T1 fail.

Sun tried great things with the T1 and it was like a great chess move that failed. The problem is they did a pawn sacrifice of their core business for that attack and it just didn't work out. Up until the T2000, Sun never designed their high end kit, they stayed with the low end and groups like Cray or SGI did their "big iron". The only great boxes sun designed in house where the small pizza boxes. The SS1, SSP20, x1, netra210 were great little servers. Things like the 690 and e10k were outsourced and while they were impressive as well, they didn't have the personality of the pizza boxes.

*To Quote David Wheeler

Comment: Re:hard to fault Oracle (Score 1) 223

by thogard (#45951255) Attached to: James Gosling Grades Oracle's Handling of Sun's Tech

Have you read "man inittab" on any system V derived? action=respawn means it will ALWAYS run at the listed run levels. Sort of like how it runs the svc daemon does now. Whoever planned the new system just didn't get "init".

SMF only runs things as long as the contract system works.

As far as writing sensitive data to disks, do you know about the "real world?" Take a look at any online credit card system in the world. You will find people enter their card number as their email address, shipping address, reference number. You will find admins sending stuff like "can you fix 4111 1111 .... 1111 for me?" SSNs flow like water as well. Some times you must scrub the empty space on the disk or scrub stuff you know was just wrong. ZFS has NO ability to do that and that is a MAJOR FLAW!!!!!

ifconfig isn't about the stack. It is a tool to tell the stack what to do and has been for more than 3 decades. Inventing new tools to do the same job was pure incompetence.

Comment: Re:No mention of SPARC? (Score 2) 223

by thogard (#45949733) Attached to: James Gosling Grades Oracle's Handling of Sun's Tech

No, the t2 can preserve the context of 64 threads but it can and will only run no more than 8 execution threads at a time. In most cases, the pipeline is so starved, it won't even manage 8. When it is running 8 at a time, it is doing each at a much slower rate that the older CPUs would be doing if they were made using the same process.

The II/IIi/IIIii can preserve something like 4 processes executions context at a time. Sometimes that is better. It is better on nearly all of my workloads.

"The chain which can be yanked is not the eternal chain." -- G. Fitch