Hacker News with Generative AI: Legacy Systems

The long (after)life of some of our old fileserver hardware (utoronto.ca)
Over on the Fediverse, I mentioned that we were still running a machine in production that was old enough that its BMC required Java for its KVM-over-IP functionality (and I've given up on working with it, rather than try to maintain a Java environment that could actually work with it). Naturally there's a story here.
HP-RT real-time VME operating system – OpenPA.net (openpa.net)
HP-RT was a real-time operating system from HP for its HP 9000 740 VME instrumentation computers, released from 1993 to 1997 in six versions from 1.0 to 3.0.
XML: Twig – A Time-Tested Powerhouse for Processing XML (perladvent.org)
XML was the preferred communication language used by services in the early 2000s. During that time, governments were establishing their own e-government systems, while companies were developing their SOAP services. Then, BOOM! Services began to adopt JSON because it was a lightweight and efficient alternative to XML. However, even though JSON became the new standard, old services were still in use and being maintained.Rewriting a system from scratch is not easy, and it might not even be necessary.
Using the Strangler Fig with Mobile Apps (martinfowler.com)
Incremental replacement of a legacy mobile application is a challenging concept to articulate and execute. However, we believe by making the investment in the pre-requisites of legacy modernization, it is posible to yield benefits in the long term. This article explores the Strangler Fig pattern and how it can be applied to mobile applications. We chart the journey of an enterprise who refused to accept the high cost and risk associated with a full rewrite of their mobile application.
An incremental approach to modernizing legacy mobile application: Strangler Fig (martinfowler.com)
Incremental replacement of a legacy mobile application is a challenging concept to articulate and execute. However, we believe by making the investment in the pre-requisites of legacy modernization, it is posible to yield benefits in the long term. This article explores the Strangler Fig pattern and how it can be applied to mobile applications. We chart the journey of an enterprise who refused to accept the high cost and risk associated with a full rewrite of their mobile application.
San Francisco to pay $212M to end reliance on 5.25-inch floppy disks (arstechnica.com)
The San Francisco Municipal Transportation Agency (SFMTA) board has agreed to spend $212 million to get its Muni Metro light rail off floppy disks.
The costs of the i386 to x86-64 upgrade (blogsystem5.substack.com)
If you read my previous article on DOS memory models, you may have dismissed everything I wrote as “legacy cruft from the 1990s that nobody cares about any longer”.
Why COBOL Isn't the Problem (lucid.co)
OpenVMS x86 E9.2-3 fixes CDE (DECWindows) and adds a Guest Console (raymii.org)
Kill It With Fire: dealing with legacy systems. (book review) (usenix.org)
Writing a Legacy PXE Bootloader (2bits.in)
Radius/UDP. How legacy protocols need to keep up with modern cryptography (cloudflare.com)
No one should use the AT&T syntax (2021) (outerproduct.net)
Tell HN: Chromium forks for legacy platforms are disappearing from GitHub (ycombinator.com)