Fault-Tolerant Design

Total Page:16

File Type:pdf, Size:1020Kb

Fault-Tolerant Design Elena Dubrova Fault-Tolerant Design www.ketabdownload.com Fault-Tolerant Design www.ketabdownload.com Elena Dubrova Fault-Tolerant Design 123 www.ketabdownload.com Elena Dubrova KTH Royal Institute of Technology Krista Sweden ISBN 978-1-4614-2112-2 ISBN 978-1-4614-2113-9 (eBook) DOI 10.1007/978-1-4614-2113-9 Springer New York Heidelberg Dordrecht London Library of Congress Control Number: 2013932644 Ó Springer Science+Business Media New York 2013 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein. Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com) www.ketabdownload.com To my mother www.ketabdownload.com Preface This textbook serves as an introduction to fault tolerance, intended for upper division undergraduate students, graduate-level students, and practicing engineers in need of an overview of the field. Readers will develop skills in modeling and evaluating fault-tolerant architectures in terms of reliability, availability, and safety. They will gain a thorough understanding of fault-tolerant computing, including both the theory of how to achieve fault tolerance through hardware, software, information, and time redundancy and the practical knowledge of designing fault-tolerant hardware and software systems. The book contains eight chapters covering the following topics. Chapter 1 is an introduction, discussing the importance of fault tolerance in developing a dependable system. Chapter 2 describes three fundamental characteristics of dependability: attributes, impairment, and means. Chapter 3 introduces depend- ability evaluation techniques and dependability models such as reliability block diagrams and Markov chains. Chapter 4 presents commonly used approaches for the design of fault-tolerant hardware systems, such as triple modular redundancy, standby redundancy, and self-purging redundancy and evaluates their effect on system dependability. Chapter 5 shows how fault tolerance can be achieved by means of coding. It covers many important families of codes, including parity, linear, cyclic, unordered, and arithmetic codes. Chapter 6 presents time redun- dancy techniques which can be used for detecting and correcting transient and permanent faults. Chapter 7 describes the main approaches for the design of fault- tolerant software systems, including checkpoint and restart, recovery blocks, N-version programming, and N self-checking programming. Chapter 8 concludes the book. The content is designed to be highly accessible, including numerous examples and problems to reinforce the material learned. Solutions to problems and Power- Point slides are available from the author upon request. Stockholm, Sweden, December 2012 Elena Dubrova vii www.ketabdownload.com Acknowledgments This book has evolved from the lecture notes of the course ‘‘Design of Fault-Tolerant Systems’’ that I have taught at the Royal Institute of Technology (KTH), since 2000. Throughout the years, many students and colleagues have helped me polish the text. I am grateful to all who gave me feedback. In particular, I would like to thank Nan Li, Shohreh Sharif Mansouri, Nasim Farahini, Bayron Navas, Jonian Grazhdani, Xavier Lowagie, Pieter Nuyts, Henrik Kirkeby, Chen Fu, Kareem Refaat, Sergej Koziner, Julia Kuznetsova, Zhonghai Lu, and Roman Morawek for finding multiple mistakes and suggesting valuable improvements in the manuscript. I am grateful to Hannu Tenhunen who inspired me to teach this course and constantly supported me during my academic career. I am also indebted to Charles Glaser from Springer for his encouragement and assistance in publishing the book and to Sandra Brunsberg for her very careful proofreading of the final draft. Special thanks to a friend of mine who advised me to use the MetaPost tool for drawing pictures. Indeed, MetaPost gives perfect results. Finally, I am grateful to the Swedish Foundation for International Cooperation in Research and Higher Education (STINT), for the scholarship KU2002-4044 which supported my trip to the University of New South Wales, Sydney, Australia, where the first draft of this book was written during October–December 2002. ix www.ketabdownload.com Contents 1 Introduction ........................................ 1 1.1 Definition of Fault Tolerance . 1 1.2 Fault Tolerance and Redundancy. 2 1.3 Applications of Fault Tolerance . 2 References . 4 2 Fundamentals of Dependability .......................... 5 2.1 Notation . 5 2.2 Dependability Attributes. 6 2.2.1 Reliability . 6 2.2.2 Availability . 7 2.2.3 Safety . 8 2.3 Dependability Impairments . 9 2.3.1 Faults, Errors, and Failures. 9 2.3.2 Origins of Faults. 10 2.3.3 Common-Mode Faults . 12 2.3.4 Hardware Faults . 12 2.3.5 Software Faults. 14 2.4 Dependability Means . 15 2.4.1 Fault Tolerance. 15 2.4.2 Fault Prevention . 16 2.4.3 Fault Removal . 16 2.4.4 Fault Forecasting . 17 2.5 Summary . 17 References . 19 3 Dependability Evaluation Techniques ...................... 21 3.1 Basics of Probability Theory. 22 3.2 Common Measures of Dependability . 24 3.2.1 Failure Rate . 24 3.2.2 Mean Time to Failure . 27 xi www.ketabdownload.com xii Contents 3.2.3 Mean Time to Repair . 28 3.2.4 Mean Time Between Failures . 30 3.2.5 Fault Coverage . 30 3.3 Dependability Modeling . 31 3.3.1 Reliability Block Diagrams . 31 3.3.2 Fault Trees. 33 3.3.3 Reliability Graphs . 33 3.3.4 Markov Processes . 34 3.4 Dependability Evaluation . 37 3.4.1 Reliability Evaluation Using Reliability Block Diagrams . 38 3.4.2 Dependability Evaluation Using Markov Processes . 39 3.5 Summary . 48 References . 54 4 Hardware Redundancy ................................ 55 4.1 Redundancy Allocation . 56 4.2 Passive Redundancy. 57 4.2.1 Triple Modular Redundancy . 58 4.2.2 N-Modular Redundancy . 63 4.3 Active Redundancy . 65 4.3.1 Duplication with Comparison . 65 4.3.2 Standby Redundancy . 67 4.3.3 Pair-And-A-Spare . 73 4.4 Hybrid Redundancy . 75 4.4.1 Self-Purging Redundancy. 76 4.4.2 N-Modular Redundancy with Spares . 79 4.5 Summary . 80 References . 85 5 Information Redundancy ............................... 87 5.1 History . 87 5.2 Fundamental Notions . 88 5.2.1 Code . 88 5.2.2 Encoding . 89 5.2.3 Information Rate. 89 5.2.4 Decoding . 89 5.2.5 Hamming Distance . 90 5.2.6 Code Distance . 90 5.3 Parity Codes . 92 5.3.1 Definition and Properties . 92 5.3.2 Applications . 93 5.3.3 Horizontal and Vertical Parity Codes. 95 www.ketabdownload.com Contents xiii 5.4 Linear Codes. 96 5.4.1 Basic Notions . 96 5.4.2 Definition. 98 5.4.3 Generator Matrix . 99 5.4.4 Parity Check Matrix . 101 5.4.5 Syndrome. 102 5.4.6 Construction of Linear Codes . 102 5.4.7 Hamming Codes . 105 5.4.8 Lexicographic Parity Check Matrix . 107 5.4.9 Applications of Hamming Codes . 108 5.4.10 Extended Hamming Codes . 109 5.5 Cyclic Codes. 110 5.5.1 Definition. 110 5.5.2 Polynomial Manipulation . 111 5.5.3 Generator Polynomial . 112 5.5.4 Parity Check Polynomial . 114 5.5.5 Syndrome Polynomial . 115 5.5.6 Implementation of Encoding and Decoding . 115 5.5.7 Separable Cyclic Codes . 118 5.5.8 Cyclic Redundancy Check Codes . 121 5.5.9 Reed-Solomon Codes.
Recommended publications
  • Digital Switching Systems, I.E., System Testing and Accep- Tance and System Maintenance and Support
    SSyyed Riifffat AAlli DDiiggiittaall SSwwiittcchhiinngg SSyysstteemmss ((Syystemm Reliaabbiilliittyy aandd AAnnalysis) Bell Communications Research, Inc. Piscataway, New Jersey McGraw-Hill, Inc. New York • San Francisco • Washington, DC. Auckland • BogotA • Cara- cas • Lisbon • London Madrid • Mexico City • Milan • Montreal • New Delhi San Juan • Singapore • Sydney • Tokyo • Toronto 2 PREFACE The motive of this book is to expose practicing telephone engineers and other graduate engineers to the art of digital switching system (DSS) analysis. The concept of applying system analysis techniques to the digital switching sys- tems as discussed in this book evolved during the divestiture period of the Bell Operating Companies (BOCs) from AT&T. Bell Communications Research, Inc. (Bellcore), formed in 1984 as a research and engineering company support- ing the BOCs, now known as the seven Regional Bell Operating Companies (RBOCs), conducted analysis of digital switching system products to ascertain compatibility with the network. Since then Bellcore has evolved into a global provider of communications software, engineering, and consulting services. The author has primarily depended on his field experience in writing this book and has extensively used engineering and various symposium publications and advice from many subject matter experts at Bellcore. This book is divided into six basic categories. Chapters 1, 2, 3, and 4 cover digital switching system hardware, and Chaps. 5 and 6 cover software ar- chitectures and their impact on switching system reliability. Chapter 7 primarily covers field aspects of digital switching systems, i.e., system testing and accep- tance and system maintenance and support. Chapter 8 covers networked aspects of the digital switching system, including STf SCP, and AIN.
    [Show full text]
  • The Great Telecom Meltdown for a Listing of Recent Titles in the Artech House Telecommunications Library, Turn to the Back of This Book
    The Great Telecom Meltdown For a listing of recent titles in the Artech House Telecommunications Library, turn to the back of this book. The Great Telecom Meltdown Fred R. Goldstein a r techhouse. com Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the U.S. Library of Congress. British Library Cataloguing in Publication Data Goldstein, Fred R. The great telecom meltdown.—(Artech House telecommunications Library) 1. Telecommunication—History 2. Telecommunciation—Technological innovations— History 3. Telecommunication—Finance—History I. Title 384’.09 ISBN 1-58053-939-4 Cover design by Leslie Genser © 2005 ARTECH HOUSE, INC. 685 Canton Street Norwood, MA 02062 All rights reserved. Printed and bound in the United States of America. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher. All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Artech House cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. International Standard Book Number: 1-58053-939-4 10987654321 Contents ix Hybrid Fiber-Coax (HFC) Gave Cable Providers an Advantage on “Triple Play” 122 RBOCs Took the Threat Seriously 123 Hybrid Fiber-Coax Is Developed 123 Cable Modems
    [Show full text]
  • Economic Analysis of the Cost of Inconsistencies in the Implementation of ISDN Network Layer Standards
    Rochester Institute of Technology RIT Scholar Works Theses 2002 Economic analysis of the cost of inconsistencies in the implementation of ISDN network layer standards Thomas Bennett Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Bennett, Thomas, "Economic analysis of the cost of inconsistencies in the implementation of ISDN network layer standards" (2002). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Economic Analysis of the Cost of Inconsistencies in the Implementation of ISDN Network Layer Standards By Thomas R. Bennett Thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Information Technology Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences March 2002 Thesis Reproduction Permission Form Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences Master of Science in Information Technology Economic Analysis of the Cost of Inconsistencies in the Implementation of ISDN Network Layer Standards I, Thomas R. Bennett, hereby grant permission to the Wallace Library of the Rochester Institute of Technology to reproduce my thesis in whole or in part. Any reproduction must not be for commercial use or profit. Date: ~) J&/JOQ;2.. Signature of Author: _ Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences Master of Science in Information Technology Thesis Approval Form Student Name: Thomas R.
    [Show full text]
  • Telecom) Terms Glossary and Dictionary - A
    Tele-Communication (Telecom) Terms Glossary and Dictionary - A A & B Bit A & B Bit is used in digital environments to convey signaling information. A bit equal to one generally corresponds to loop current flowing in an analog environment; A bit value of zero corresponds to no loop Current, i.e. to no connection. Other signals are made by changing bit values: for example, a flash-hook is sent by briefly setting the A bit to zero. A Links A Links, also known as SS7 access links, connect an end office or signal point to a mated pair of signal transfer points. They may also connect signal transfer points and signal control points at the regional level with the A-links assigned in a quad arrangement. A&B Bit Signaling A&B Bit Signaling, also called 24th channel signaling, is a procedure used in T1 transmission facilities in which each of the 24Â T1 subchannels devotes 1 bit of every sixth frame to the carrying of supervisory signaling information. On T1 lines that use Extended SuperFrame(ESF) framing, the signaling bits are robbed from the 6th, 12th, 18th, and 24th frame, resulting in "ABCD" signaling bits. ABAM cable ABAM cable refers to a type of T1 cable. This cable was a 22 gauge, 100 ohm insulated, twisted pair. ABAM cable is no longer available, but you can easily find cable that meets the technical requirements. Abandoned Call Abandoned Call is a call in which the call originator disconnects or cancels the call after a connection has been made, but before the call is established.
    [Show full text]
  • 5Ess Switching Equipment Assignment Rules
    ___________________________________________________________________________________________________________ DWG CD DWG CD DWG CD ___________________________________________________ ISS ISS ISS ISS ISS ISS ___________________________________________________ 1 1 2D 2D 3D 3D DWG CD DWG CD DWG CD ___________________________________________________ ISS ISS ISS ISS ISS ISS 5D 4A 4A 5D 5D 6B APPX ___________________________________________________ 1B DWG CD DWG CD DWG CD ___________________________________________________ ISS ISS ISS ISS ISS ISS 5D 7AC APPX 8D 6D 9D 7D ___________________________________________________ 2AC DWG CD DWG CD DWG CD ___________________________________________________ ISS ISS ISS ISS ISS ISS ___________________________________________________ 10D 8D 11M 9M 12A 10A DWG CD DWG CD DWG CD ___________________________________________________ ISS ISS ISS ISS ISS ISS ___________________________________________________ 13M 11M 14M 12M 15B 13B DWG CD DWG CD DWG CD ___________________________________________________ ISS ISS ISS ISS ISS ISS ___________________________________________________ 16M 14M 17A 15A 18M 16M DWG CD DWG CD DWG CD ___________________________________________________ ISS ISS ISS ISS ISS ISS ___________________________________________________ 19B 17B
    [Show full text]
  • Verizon Safe Time Window Practice Contents
    VERIZON PRACTICE VZ 220-000-001 Verizon Standard Issue 1, February 2003 Verizon Safe Time Window Practice Contents Subject Page 1. General.......................................................................................................................................................3 1.1 Purpose....................................................................................................................................................3 1.2 Supersedures ...........................................................................................................................................4 1.3 Responsibility ...........................................................................................................................................4 1.4 Disclaimer.................................................................................................................................................4 2.1 Definitions.................................................................................................................................................5 2.2 References ...............................................................................................................................................8 3. PAUSE........................................................................................................................................................9 3.1 Prevent All Unplanned Service Events Policy............................................................................................9 4. National
    [Show full text]
  • Innovation Is in Ourdna Letter from Our Contents Page 12 Our Editor Features
    Magazine for the Science & Technology Innovation Center in Middletown, NJ • Premier Edition Honoring the Past, Creating the Future Innovation is in ourDNA Letter from Our Contents page 12 our Editor Features 2 The History of AT&T 94 Data Transmssion — Fax Welcome to our Science & Technology Innovation Center of Middletown, New Jersey magazine premier edition. The new Innovation Center is a place 12 The Transistor 100 Cellular Phones of inspiration and learning from the history of AT&T and significant inventions that our company has created over the past 142+ years that contribute to 13 Bell Solar Cell 104 Project AirGig™ the advancement of humanity. Over my years at AT&T, I have spoken to many The Telstar Project Our Contributors people who never knew that AT&T had a history of innovation in so many 16 109 areas beyond the creation of the telephone by Alexander Graham Bell. Coax Cable 24 Throughout the years, AT&T has been a key player in local and long-distance 30 Fiber Optics in the AT&T Network voice telephony, motion pictures, computers, the cable industry, wireless, and Science & Technology broadband. AT&T has served the nation’s telecommunication needs and par- 34 Vitaphone and Western Electric ticipated in many technology partnerships in every industry throughout the globe. The breadth of technology and innovation goes on and on, but a 44 Picturephone Irwin Gerszberg few of the innovations you might see at our new Innovation Center include: Innovation ground-to-air radio telephony, motion picture sound, the Telstar satellite, Theseus Honoring the Past, Creating the Future AVP Advanced Technology Research 48 telephone switching, the facsimile machine, military radar systems, the AT&T Science & Technology transistor, undersea cable, fiber communications, Picturephone via T1’s, coin 50 A Short History of UNIX™ EDITOR-IN-CHIEF Innovation Center phones, touch-tone dialing, AMPS cellular phones, UNIX™ and C language Irwin Gerszberg programming.
    [Show full text]
  • 220-100-300 Switching Systems Series Issue 1, October 1999
    GTE Network Services Practice 06-220-100-300 Switching Systems Series Issue 1, October 1999 Network Maintenance Window Contents Subject Page 1. General........................................................................................................................................................ 2 1.1 Purpose ..................................................................................................................................................... 2 1.2 Supersedures............................................................................................................................................ 3 1.3 Responsibility ............................................................................................................................................ 3 1.4 Disclaimer.................................................................................................................................................. 3 2. Overview ..................................................................................................................................................... 3 2.1 Definitions.................................................................................................................................................. 3 2.2 References................................................................................................................................................ 6 3. When in Doubt Check it Out.....................................................................................................................
    [Show full text]
  • Software Fault Prevention by Language Choice: Why C Is Not My Favorite Language
    Software Fault Prevention by Language Choice: Why C is Not My Favorite Language Richard Fateman Computer Science Division Electrical Engineering and Computer Sciences Dept. University of California, Berkeley June 15, 1999 Abstract How much does the choice of a programming language in¯uence the prevalence of bugs in the resulting code? It seems obvious that at the level at which individuals write new programs, a change of language can eliminate whole classes of errors, or make them possible. With few exceptions, recent literature on the engineering of large software systems seems to neglect language choice as a factor in overall quality metrics. As a point of comparison we review some interesting recent work which implicitly assumesa program must be written in C. We speculate on how reliability might be affected by changing the language, in particular if we were to use ANSI Common Lisp. 1 Introduction and Background In a recent paper, W. D. Yu [6] describes the kinds of errors committed by coders working on Lucent Technologies advanced 5ESS switching system. This system's reliability is now dependent on the correct functioning of several million lines of source code.1 Yu not only categorizes the errors, but enumerates within some categories the technical guidelines developed to overcome problems. Yu's paper's advice mirrors, in some respects, the recommendations in Maguire's Writing Solid Code [4], a book brought to my attention several years ago for source material in a software engineering undergraduate course. This ge- nial book explains techniques for avoiding pitfalls in programming in C, and contains valuable advice for intermediate or advanced C language programmers.
    [Show full text]
  • 6512766287.Pdf
    • u .- Appendix C Bell Atlantic/NYNEX 1997-2000 Merger Cost Savings Summary of BA-NY Intrastate Savings ($ Millions) pescription 1997 1998 1999 2001 1. Total Bell Atlantic Merger Expense Savings (from K. O'Ouinn's Exhibit, Part I, Line 3) 122& ~ ~ 1QZ1Q 1,077.0 2. BA-NY Intrastate Regulated Merger Savings (from K. O'Ouinn's Exhibit, Part I, Line 7) 27.3 92.5 150.0 219.5 219.5 3. BA-NY Intrastate Regulated Merger Costs (from K. O'Ouinn's Exhibit, Part III) 47.2 43.2 38.2 Q.& Q.Q 4. BA-NY Intrastate Net Merger Savings (from K. O'Ouinn's Exhibit, Part IV) (19.9) 49.3 111.8 218.9 219.5 5. Costs Due to Additional Commitments (from K. O'Ouinn's Exhibit, Part V) (47.1) (84.m (116.0> illMl ~ t 6. Net Merger Savings per Company (67.0) (34.7) (4.2) 85.3 74.0 Staff Adlustments 7. Savings from MIT Analysis 3.5 11.0 18.3 26.7 26.7 8. Savings Related to Union Employees (112.6) (6.5) 96.6 100.5 9. Savings Related to Correct Loading Rate 0.7 3.9 8.4 10.7 11.0 10. Savings Related to Correct Allocation 3.7 12.0 20.7 29.1 29.2 11. Revenue Enhancements (from Staff's Testimony in Cases 96-C-0603/0599) 39.0 107.0 143.0 12. Costs Due to Additional Commitments (from above) 47.1 84.0 116.0 133.6 145.5 13.
    [Show full text]
  • AUDIX® System Description Copyright  1995 AT&T All Rights Reserved Printed in U.S.A
    AT&T 585-305-201 Issue 4 November 1993 Comcode 106917057 AUDIX® System Description Copyright 1995 AT&T All Rights Reserved Printed in U.S.A. Notice Ordering Information While reasonable efforts were made to ensure that the information The ordering number for this document is in this document was complete and accurate at the time of printing, 585-310-226. To order this document, call the GBCS AT&T can assume no responsibility for any errors. Changes and Publications Fulfillment Center at 1-800-457-1235 (International corrections to the information contained in this document may be callers use 1-317-361-5353). For more information about AT&T incorporated into future reissues. documents, refer to the Global Business Communications Systems Publications Catalog (555-000-010). Your Responsibility for Your System's Security You are responsible for the security of your system. AT&T does not warrant that this product is immune from or will prevent Comments unauthorized use of common-carrier telecommunication services or To comment on this document, return the comment facilities accessed through or connected to it. AT&T will not be card at the front of the document. responsible for any charges that result from such unauthorized use. Product administration to prevent unauthorized use is your Acknowledgment responsibility and your system administrator should read all This document was prepared by the AT&T Product Documentation documents provided with this product to fully understand the Development Department, Denver, CO 80234-2703. features available that may reduce your risk of incurring charges. Federal Communications Commission Statement Part 15: Class A Statement.
    [Show full text]
  • Chapter 9 on the Early History and Impact of Unix Tools to Build the Tools for a New Millennium
    Chapter 9 On the Early History and Impact of Unix Tools to Build the Tools for a New Millennium “When the barbarian, advancing step by step, had discovered the native metals, and learned to melt them in the crucible and to cast them in moulds; when he had alloyed native copper with tin and produced bronze; and, finally, when by a still greater effort of thought he had invented the furnace, and produced iron from the ore, nine tenths of the battle for civilization was gained. Furnished, with iron tools capable of holding both an edge and a point, mankind were certain of attaining to civilization.” Lewis Henry Morgan “When Unix evolved within Bell Laboratories, it was not a result of some deliberate management initiative. It spread through channels of technical need and technical contact.... This was typical of the way Unix spread around Bell Laboratories.... I brought out that little hunk of history to point out that the spread and success of Unix, first in the Bell organizations and then in the rest of the world, was due to the fact that it was used, modified, and tinkered up in a whole variety of organizations.” Victor Vyssotsky “UNIX is a lever for the intellect.” John R. Mashey Iron Tools and Software Tools Our era is witnessing the birth of an important new technology, different from any in the past. This new technology is the technology of software production. The new tools of our era are tools that make it possible to produce software. Unlike the tools forged in the past, software tools are not something you can grab or hold.
    [Show full text]