Ada User Journal

Total Page:16

File Type:pdf, Size:1020Kb

Ada User Journal ADA Volume 24 USER Number 1 JOURNAL March 2003 Contents Page Editorial Policy for Ada User Journal 2 Editorial 3 News 4 Conference Calendar 42 Forthcoming Events 50 Articles Javier Miranda “A Guided Tour to the GNAT Runtime” 55 Alan Burns “Increasing the Real-Time Expressive Power of Ada 95” 60 Ada-Europe 2002 Sponsors 64 Ada-Europe Associate Members (National Ada Organizations) Inside Back Cover Ada User Journal Volume 24, Number 1, March 2003 2 Editorial Policy for Ada User Journal Publication Original Papers Commentaries Ada User Journal – The Journal for the Manuscripts should be submitted in We publish commentaries on Ada and international Ada Community – is accordance with the submission software engineering topics. These published by Ada-Europe. It appears guidelines (below). may represent the views either of four times a year, on the last days of individuals or of organisations. Such March, June, September and All original technical contributions are articles can be of any length – December. Copy date is the first of the submitted to refereeing by at least two inclusion is at the discretion of the month of publication. people. Names of referees will be kept Editor. confidential, but their comments will Opinions expressed within the Ada Aims be relayed to the authors at the discretion of the Editor. User Journal do not necessarily Ada User Journal aims to inform represent the views of the Editor, Ada- readers of developments in the Ada The first named author will receive a Europe or its directors. programming language and its use, complimentary copy of the issue of the general Ada-related software Journal in which their paper appears. Announcements and Reports engineering issues and Ada-related We are happy to publicise and report activities in Europe and other parts of By submitting a manuscript, authors grant Ada-Europe an unlimited license on events that may be of interest to our the world. The language of the journal readers. is English. to publish (and, if appropriate, republish) it, if and when the article is Although the title of the Journal refers accepted for publication. We do not Reviews to the Ada language, any related topics require that authors assign copyright to Inclusion of any review in the Journal are welcome. In particular papers in the Journal. is at the discretion of the Editor. any of the areas related to reliable Unless the authors state explicitly A reviewer will be selected by the software technologies. otherwise, submission of an article is Editor to review any book or other taken to imply that it represents publication sent to us. We are also The Journal publishes the following prepared to print reviews submitted types of material: original, unpublished work, not under consideration for publication else- from elsewhere at the discretion of the • Refereed original articles on where. Editor. technical matters concerning Ada and related topics. News and Product Announcements Submission Guidelines Ada User Journal is one of the ways in All material for publication should be • News and miscellany of interest to which people find out what is going on sent to the Editor, preferably in the Ada community. in the Ada community. Since not all of electronic format. The Editor will only accept typed manuscripts by prior • Reprints of articles published our readers have access to resources arrangement. elsewhere that deserve a wider such as the World Wide Web and Prospective authors are encouraged to audience. Usenet, or have enough time to search through the information that can be contact the Editor by email to • Commentaries on matters relating found in those resources, we reprint or determine the best format for to Ada and software engineering. report on items that may be of interest submission. Contact details can be to them. found near the front of each edition. • Announcements and reports of Example papers conforming to conferences and workshops. Reprinted Articles formatting requirements as well as some word processor templates are • Reviews of publications in the While original material is our first available from the editor. There is no field of software engineering. priority, we are willing to reprint (with limitation on the length of papers, the permission of the copyright holder) though a paper longer than 10,000 • Announcements regarding material previously submitted words would be regarded as standards concerning Ada. elsewhere if it is appropriate to give it exceptional. a wider audience. This includes papers Further details on our approach to published in North America that are these are given below. not easily available in Europe. We have a reciprocal approach in granting permission for other publications to reprint papers originally published in Ada User Journal. Volume 24, Number 1, March 2003 Ada User Journal 3 Editorial Volume 24 of the Ada User Journal opens with an issue that features two highlights: our continued and close look into the on- going Ada language revision process and an even bigger News section, which was afforded, for the expected gratification of the readership, by temporary changes in the Journal advertising policy. After the introductory presentation of the language revision process that Pascal Leroy, the rapporteur of the ARG, the group that runs the revision process, offered to AUJ 23-4, we now turn our attention to one of major areas of activity in the revision process: the enhancement of the already powerful real-time programming model of the language, the intent of which is to further strengthen the leading role that Ada plays in the real-time and high-integrity application domains. Alan Burns, who represents the Ada real-time community in the ARG, gives us an overview of the current highlights of the real-time oriented proposals for language enhancements. Finally, in this issue we have the pleasure of hosting a paper by Javier Miranda, which, after so often recurring the News section of the Journal, briefly walks us through his enormously informative work on the description of the internals of the GNAT runtime. Let me close by reassuring the readers that we continue our effort to bring the Journal back to its calendar schedule, while being all the more eager to contributions from the Ada community at large. Tullio Vardanega Padova March 2003 Email: [email protected] Ada User Journal Volume 24, Number 1, March 2003 4 News Dirk Craeynest (ed) Offis nv/sa and K.U.Leuven. Email [email protected] [...] the ARA has decided to open up verification of software, rather than membership from its original tool and relying on the inherently more risk-prone Contents compiler vendors to anyone interested in and expensive use of testing as the page supporting Ada's future. [...] principal verification activity. Ada-related Organizations 4 Ada-related Events 4 New: Join the Ada Resource Association: SPARK is a programming language that Ada and Education 7 An introduction to the ARA's work for the facilitates Correctness-by-Construction. Ada-related Resources 9 Ada community and benefits of ARA Its most important property is that it has a Ada-related Tools 10 membership. totally unambiguous semantics. This Ada-related Products 17 http://www.adaic.org/ARA/join.html [...] enables static analysis of the language to Ada and Linux 24 be both precise (i.e. the results really Ada and Microsoft 24 Ann Brandon, Editorial Webmaster mean something and there's a very low References to Publications 25 "false alarm" rate) and efficient so the tool Ada Inside 27 support is actually useful during Ada in Context 34 Ada-related Events development rather than just being used retrospectively. [The announcements reported below are a SPARK is an annotated subset of Ada95, Ada-related selection of the many Ada-related events so the language inherits all of the support Organizations organized by local groups. If you are for commercial compilers, tools and organizing such an event, feel free to training available from the wider Ada Tucker Taft at Helm of ARA inform us as soon as possible. If you community. The "annotations" extend the attended one please consider writing a subset's support for design-by- and SofCheck small report for the Journal. -- dc] contract(tm), allowing packages and From: Editorial Webmaster subprograms to specify their intended <[email protected]> Dec 6 - Public Technical behaviour precisely at various levels of Date: Tue, 29 Oct 2002 11:56:04 -0500 Briefing on SPARK rigour and detail. Subject: [AdaIC] S. Tucker Taft at Helm of SPARK has over 10 years of industrial ARA and SofCheck From: [email protected] (Rod Chapman) use, mainly in the European Aerospace To: [email protected] Date: 27 Nov 2002 05:30:16 -0800 and Rail industries, but remains less well Subject: ANNOUNCE: Public technical S. Tucker Taft has rejoined the ARA as known in the USA, although SPARK is briefing on SPARK, Houston actually recommended by NASA's own president of SofCheck. Tucker is a Newsgroups: comp.lang.ada founder and president of both SofCheck, guidance for safety-critical software. This Inc., and the ARA. The ARA is seeing an As a "warm up" event for ACM SIGAda briefing will examine some of the most old friend turn into the newest member of 2002, Praxis Critical Systems will be notable SPARK projects, including the Ada software tool and compiler vendors. presenting a public technical briefing on Lockheed C130J, and how SPARK is SPARK on Friday 6th December. This effective in meeting standards such as Tucker is an old friend of the Ada event in aimed at engineers and managers DO-178B. Finally, we will consider some community, too, as we need not tell most involved in the design and procurement of of the barriers (both actual and mythical) of you: From 1990-95, he led the Ada9X high-integrity software, and especially that may have hindered the adoption of design team and succeeded in making those involved in the aviation and space SPARK in other projects.
Recommended publications
  • C Programmer's Manual
    C PROGRAMMER'S MANUAL CGC 7900 SERIES COLOR GRAPHICS COMPUTERS Whitesmiths, Ltd. C PROGRAMMERS' MANUAL Release: 2.1 Date: Ma rch 1982 The C language was developed at Bell Laboratories by Dennis Ritchie; Whitesmiths, Ltd. has endeavored to remain as faithful as possible to his language specification. The external specifications of the Idris operating system, and of most of its utilities, are based heavily on those of UNIX, which was also developed at Bell Labora­ tories by Dennis Ritchie" and Ken Thompson. Whi tesmi ths, Ltd. grate­ fully acknowledges the parentage of many of the concepts we have commercialized, and we thank Western Electric Co. for waiving patent licensing fees for use of the UNIX protection mechanism. The successful implementation of Whi tesmi ths r compilers, operating systems, and utilities, however, is entirely the work of our pro­ gramming staff and allied consultants. For the record, UNIX is a trademark of Bell Laboratories; lAS, PDP-11, RSTS/E, RSX-11M, RT-11, VAX, VMS, and nearly every other term with an 11 in it all are trademarks of Digital Equipment Cor­ poration; CP/M is a trademark of Digital Research Co.; MC68000 and VERSAdos are trademarks of Motorola Inc.; ISIS is a trademark of In­ tel Corporation; A-Natural and Idris are trademarks of Whitesmiths, Ltd. C is not. Copyright (c) 1978, 1979, 1980, 1981 by Whitesmiths, Ltd. C PROGRAMMERS' MANUAL SECTIONS I. The C Languag-e II. Portable C Runtime Library III. C System Interface Library IV. C Machine Interface Library SCOPE This manual describes the C programming language, as implemented by Whitesmiths, Ltd., and the various library routines that make up the machine independent C environment.
    [Show full text]
  • COSMIC C Cross Compiler for Motorola 68HC11 Family
    COSMIC C Cross Compiler for Motorola 68HC11 Family COSMIC’s C cross compiler, cx6811 for the Motorola 68HC11 family of microcontrollers, incorporates over twenty years of innovative design and development effort. In the field since 1986 and previously sold under the Whitesmiths brand name, cx6811 is reliable, field-tested and incorporates many features to help ensure your embedded 68HC11 design meets and exceeds performance specifications. The C Compiler package for Windows includes: COSMIC integrated development environment (IDEA), optimizing C cross compiler, macro assembler, linker, librarian, object inspector, hex file generator, object format converters, debugging support utilities, run-time libraries and a compiler command driver. The PC compiler package runs under Windows 95/98/ME/NT4/2000 and XP. Complexity of a more generic compiler. You also get header Key Features file support for many of the popular 68HC11 peripherals, so Supports All 68HC11 Family Microcontrollers you can access their memory mapped objects by name either ANSI C Implementation at the C or assembly language levels. Extensions to ANSI for Embedded Systems ANSI / ISO Standard C Global and Processor-Specific Optimizations This implementation conforms with the ANSI and ISO Optimized Function Calling Standard C specifications which helps you protect your C support for Internal EEPROM software investment by aiding code portability and reliability. C support for Direct Page Data C Runtime Support C support for Code Bank Switching C runtime support consists of a subset of the standard ANSI C support for Interrupt Handlers library, and is provided in C source form with the binary Three In-Line Assembly Methods package so you are free to modify library routines to match User-defined Code/Data Program Sections your needs.
    [Show full text]
  • Steve Bernier, M.Sc
    Presented by: Steve Bernier, M.Sc., Research Manager Advanced Radio Systems Communications Research Centre Canada How Different Messaging Semantics Can Affect Applications Performances SCA applications are made of several software components typically connected in a pipeline configuration Using the SCA, software components can be implemented by different organizations Interactions between components requires a middleware The middleware for SCA is CORBA 2 How Different Messaging Semantics Can Affect Applications Performances This paper provides metrics comparing two types of CORBA interactions: One-way and Two-way Using CORBA, every interaction is transformed into a message sent from a source component to a destination component Two-way interactions Source is blocked until a response is received from the destination Synchronized with the target One-way interactions Source is not blocked until a response is received from the destination 3 levels of synchronization: with the middleware, with the transport, or with the server 3 How Different Messaging Semantics Can Affect Applications Performances Two-way messaging can lead to the empty pipeline problem 4 How Different Messaging Semantics Can Affect Applications Performances One-way messaging can lead to the packet reordering problem 3, 2, 1 2, 3, 1 3, 1, 2 5 How Different Messaging Semantics Can Affect Applications Performances This paper provides metrics for 4 tests. All tests work as follows: Pipeline configuration of 4 components The first component produces 1000 packets
    [Show full text]
  • The User's Column, December 1980, BYTE Magazine
    BASIC, Computer Languages, and Computer Adventures Jerry Pournelle c/ o BYTE Publications 70 Main St Peterborough NH 03458 It's a typical Sunday afternoon here at Chaos Manor. new users become familiar with the way computers In one room a dozen kids are playing games on the Radio think, became studded with features. Every time you Shack TRS-80, while here in the office I've been playing turned around there was a new BASIC interpreter, each about with the C programming language after adding a one larger than the last, and almost none of them com­ check-writer to my accounting programs. My wife, the patible with each other. Whatever portability BASIC had only practical member of the family, gently reminds me enjoyed vanished in a myriad of disk operations, func­ of my deadlines: galley proofs of a new novel, King tions, WHILE statements, new input formats, etc, etc, David's Spaceship (Simon and Schuster); two chapters of and, at the same time, the "free" memory left over after the latest Niven/ Pournelie collaboration, Oath of Fealty loading BASIC got so small that you couldn't handle (Simon and Schuster, Real Soon Now); plus three col­ much data. umns; a speech to a librarians' convention; and inputs for The logical end of that process is Microsoft's newest a NASA study on America's fifty-year space plan. Some BASIC-BO. Understand, it's an excellent BASIC. It has business people worry about cash flow; for authors it's features that, not long ago, the most advanced languages work flow-work comes in bunches, like bananas, and didn't have.
    [Show full text]
  • Comparing UNIX with Other Systems
    Comparing UNIX with other systems Timothy DO' Chase Corporate Computer systems, Inc. 33 West Main Street Holmdel, New Jersey he original concept behind this article was to make a grand comparison between UNIX Tand several other well known systems. This was to beall encompassing and packed with vital information summarized in neat charts, tables and graphs. As the work began, the realization settled in that this was not only difficult to do, but would result in a work so boring as to beincomprehensible. The reader, faced with such awealth ofinformation would be lost at best. Conclusions would be difficult to draw and, in short, the result would be worthless. Mtertearfully filling my waste basket with the initial efforts, I regrouped and began by as­ king myself why would anyone be interested in comparing UNIX with another operating system? There appears to be only two answers. First, one might hope to learn something about UNIX by analogy. IfI understand the file system on MPEN and someone tells me that UNIX is like that except for such and so, then I might be more quickly able to under­ stand UNIX. This I felt was an unlikely motivation. After all, there are much simpler ways to learn UNIX. Instead, the motivation for comparing UNIX to other systems must come from a need to evaluate UNIX. Ifwe are aware of the features or short comings ofother systems, then we can benefit by evaluating UNIX relative to those systems. Choosing an operating system or computer is a major decision which we can benefit from or be stuck with for a long time.
    [Show full text]
  • Partner Directory Wind River Partner Program
    PARTNER DIRECTORY WIND RIVER PARTNER PROGRAM The Internet of Things (IoT), cloud computing, and Network Functions Virtualization are but some of the market forces at play today. These forces impact Wind River® customers in markets ranging from aerospace and defense to consumer, networking to automotive, and industrial to medical. The Wind River® edge-to-cloud portfolio of products is ideally suited to address the emerging needs of IoT, from the secure and managed intelligent devices at the edge to the gateway, into the critical network infrastructure, and up into the cloud. Wind River offers cross-architecture support. We are proud to partner with leading companies across various industries to help our mutual customers ease integration challenges; shorten development times; and provide greater functionality to their devices, systems, and networks for building IoT. With more than 200 members and still growing, Wind River has one of the embedded software industry’s largest ecosystems to complement its comprehensive portfolio. Please use this guide as a resource to identify companies that can help with your development across markets. For updates, browse our online Partner Directory. 2 | Partner Program Guide MARKET FOCUS For an alphabetical listing of all members of the *Clavister ..................................................37 Wind River Partner Program, please see the Cloudera ...................................................37 Partner Index on page 139. *Dell ..........................................................45 *EnterpriseWeb
    [Show full text]
  • Success Oriented Ground and Space Software Defined Architectures
    Success Oriented Ground and Space Software Defined Architectures 30 March 2004 Jerry Brand, Vince Kovarik and James Faist Melbourne, Florida Presented at the GSAW 2004 Manhattan Beach, CA GSAW 2004 (Slide 1/17) assuredcommunications™ 16-Apr-04 Introduction • Software Defined Radio (SDR) Architectures Background • JTRS/SCA Terminology • SCA Software Structure • Example Ground SDR • Example Flight SDR • Successful Architecture Attributes • Conclusions GSAW 2004 (Slide 2/17) assuredcommunications™ 16-Apr-04 JTRS/SCA Terminology • Joint Tactical Radio System (JTRS): A radio system within the 2MHz to 2Ghz (tactical) frequency 2Mhz-2GHz range and has the SCA infrastructure (see below). JTRS Radio • Software Communication Architecture (SCA): The Core Framework underlying infrastructure specification that must be implemented. Defines >2GHz • Core Framework (CF): The SCA 2.2 realization of the SCA specification that provides the SATCOM Radio radio infrastructure services specified in the SCA. Core Framework • SCA-Compliant: A radio that has a Core Framework that adheres to the SCA is SCA-Compliant. Both radios are SCA-Compliant GSAW 2004 (Slide 3/17) assuredcommunications™ 16-Apr-04 SDR Abstraction • Dynamic (re)configurability Waveform Implementation Paths – Components – Waveforms Waveform Specification – Processing paths VHDL • Plug-n-Play components C/C++ • Reuse of common Framework/Infrastructure implementations • The Framework or Operating System Infrastructure provides the Abstraction FPGA ASIC intelligent abstraction GPP DSP away from the
    [Show full text]
  • High Performance Java Software
    High Performance Java™ Software Comparing a Common Design in Three Languages Kevin Buesing Field Applications Engineer Objective Interface Systems http://www.ois.com 1 Presentation Objectives Compare the performance of a single middleware design implemented in Java, C++, and Ada 95. Compare performance of using C sockets vs. Java sockets vs. JNI C sockets. Compare multiple middleware designs implemented in various languages. 2 High Performance Java Software Foundation Knowledge Comparing Sockets Comparing One Design Implemented in Multiple Languages Comparing Different ORBs Lessons Learned Summary 3 High Performance Java Software Foundation Knowledge Comparing Sockets Comparing One Design Implemented in Multiple Languages Comparing Different ORBs Lessons Learned Summary 4 Objective Interface Perspective • Vendor of communications software for: ─ Real-time and embedded systems ─ High-performance enterprise systems • Common themes ─ Invest in long-term technologies ─ An extreme fixation on performance ─ High reliability requirements ─ Wide platform support (over 500 binary platforms) ─ Committed to standards (OMG, Open Group, JCP) 5 Technology Used for Comparison • ORBexpress™: High Performance CORBA • One design ─ Predictable and oriented for performance ─ Replaceable transports ─ Desktop, server, real-time and embedded systems • Three ORBs implemented in their native languages ─ Ada ORB written in Ada ─ C++ ORB written in C++ ─ Java ORB written in Java ─ Not language bindings ─ Common design and architecture 6 Transport Comparison C++ Sockets vs. Java Sockets vs. JNI to C++ • With ORBexpress the transport itself is typically the bottleneck ─ Is using the JNI to access C sockets faster than the Java Socket class? ─ Pluggable transport API in ORBexpress makes this easy to test ─ JNI can require copies ─Depends on JVM ─JVM’s that force extra copies in either the socket class or JNI interface preclude high bandwidth utilization • Objective Interface tests run on ─ 1.7 ghz Pentium 4 ─ Microsoft Windows XP 7 Common Architecture ORB Comparison ORBexpress: Java vs.
    [Show full text]
  • EULA for Probasec 1.4 June 8, 2018 Page 1 of 41
    Diebold Nixdorf EULA for ProBaseC 1.4 June 8, 2018 Page 1 of 41 EULA for ProBaseC 1.4 Diebold Nixdorf Software End User License Agreement Software programs which you received either installed on the device provided by Diebold Nixdorf, Incorporated or one of its affiliates (“Diebold or DN”), downloaded from a Diebold website or provided on a CD by Diebold are copyrighted by the respective authors and use of each program is governed by the respective author's terms included herein or in the software. Diebold Nixdorf, Incorporated. (“DN Software”) claims copyright in the compilation only. THIS SOFTWARE IS PROVIDED AS IS AND WITHOUT WARRANTY OF ANY KIND. Installation or use of this software or the terminal constitutes your agreement to be legally bound by these terms. If you do not agree with these terms, do not use or install this software and contact Diebold Nixdorf at www.dnlegalterms.com to arrange for return of the software and a refund of the value of the media. NEITHER DIEBOLD NIXDORF SOFTWARE NOR ITS AGENTS, DISTRIBUTORS, AFFILIATES, SUPPLIERS OR CONTENT PROVIDERS, SHALL BE LIABLE FOR ANY VIOLATION OF INTELLECTUAL PROPERTY RIGHTS OR FOR ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING FROM OR RELATING TO THE SOFTWARE DESCRIBED HEREIN. THE LIABILITY OF ANY SUCH ENTITIES IS LIMITED SOLELY AND EXCLUSIVELY TO REFUNDING THE VALUE OF THE MEDIA (BLANK CD) ON WHICH THE SOFTWARE IS PROVIDED, IF ANY. The following are the list of licenses and software components under them: License Component Name Version Copyright Notice AES Brian Gladman AES by Brian Glandman Not Applicable Copyright 1999-2010, License Brian Gladman, Worcester, UK.
    [Show full text]
  • High-Assurance, Real-Time MILS Architecture
    High-Assurance, Real-time MILS Architecture W. Mark Vanfleet Bill Beckwith Senior NSA/IAD Objective Interface Systems Security Analyst CEO/CTO [email protected] [email protected] This presentation represents joint research between the Air Force, Army, Navy, NSA, Boeing, Lockheed Martin, Objective Interface, Green Hills, LynuxWorks, Wind River, GD, Rockwell Collins, MITRE, U of Idaho Why Security in Embedded Systems? 6/28/2004 High-Assurance, Real-Time MILS Architecture Vanfleet, Beckwith - 2 1 Why Security in Embedded Systems? • A Year in the Life of a Utility System – 100 - 150 hits/day on control network – 17 intrusions – 2 Denial of Service (DoS) events – 3 Loss of Control Events • Switchgear controller • Boiler Deaerator controls 6/28/2004 High-Assurance, Real-Time MILS Architecture Vanfleet, Beckwith - 3 Why Security in Embedded Systems? (cont.) • To reduce the risk of – Damage to internal systems • Expense to repair • Operational blockage – Damage to customer systems • Loss of goodwill • Market recognition: irreparable damage to quality image • Liability for customer losses – Peace of mind • Spend attention on forward initiatives • Less monitoring required • Sleep better • To reduce costs – Potentially lower insurance – Less monitoring costs 6/28/2004 High-Assurance, Real-Time MILS Architecture Vanfleet, Beckwith - 4 2 Why Security in Embedded Systems? (cont.) • Australian Water Utility – Vitek Boden, 48, April 23rd, 2000, Queensland, Australia • disgruntled ex-employee of equipment supplier • Vehicle became command
    [Show full text]
  • Why Pascal Is Not My Favorite Programming Language
    AT&T Bell Laboratories Murray Hill, New Jersey 07974 Computing Science Technical Report No. 100 Why Pascal is Not My Favorite Programming Language Brian W. Kernighan April 2, 1981 Why Pascal is Not My Favorite Programming Language Brian W. Kernighan AT&T Bell Laboratories Murray Hill, New Jersey 07974 ABSTRACT The programming language Pascal has become the dominant language of instruction in computer science education. It has also strongly influenced lan- guages developed subsequently, in particular Ada. Pascal was originally intended primarily as a teaching language, but it has been more and more often recommended as a language for serious programming as well, for example, for system programming tasks and even operating systems. Pascal, at least in its standard form, is just plain not suitable for serious pro- gramming. This paper discusses my personal discovery of some of the reasons why. April 2, 1981 Why Pascal is Not My Favorite Programming Language Brian W. Kernighan AT&T Bell Laboratories Murray Hill, New Jersey 07974 1. Genesis This paper has its origins in two events — a spate of papers that compare C and Pas- cal1, 2, 3, 4 and a personal attempt to rewrite Software Tools5 in Pascal. Comparing C and Pascal is rather like comparing a Learjet to a Piper Cub — one is meant for getting something done while the other is meant for learning — so such comparisons tend to be somewhat farfetched. But the revision of Software Tools seems a more relevant comparison. The programs therein were originally written in Ratfor, a ‘‘structured’’ dialect of Fortran imple- mented by a preprocessor.
    [Show full text]
  • FOREWORD the Attached Paper Appeared As Part of a Workshop Session of Tutorial Lectures Held at the PRO- TEXT I Conference in Late 1984
    FOREWORD The attached paper appeared as part of a Workshop session of tutorial lectures held at the PRO- TEXT I Conference in late 1984. The lecture was an informal presentation telling the story of how the University of Nottingham equipped itself — just prior to the era of PostScript and “desk- top publishing” — to typeset all of its examination papers ‘in house’. On a personal level, my vol- unteering to lead this project triggered an interest in computerised typesetting which later devel- oped into a new direction in my computer science research interests. This ‘new direction’ has now lasted for more than 20 years and has grown to encompass almost all aspects of a subject now called ‘document engineering’. The paper is of some historical interest, if only to note that the equipment we used cost us the staggering sum of £80,000 in 1982. Nowadays comparable quality, and much greater speed, could be obtained from a computer and laser-printer combination costing about one twentieth of that amount. The key factors in the success of our project, in those very early days, were the willingness of the University not only to buy the necessary typesetters and computers but also to purchase a source code licence for the device-independent version of troff. This latter item, at £4000, was not cheap but it has done sterling service and is still in use, some 20 years later, in the School of Computer Science. Above all, the device independent troff, (unlike the original version of troff which was for the second-generation GSI CAT typesetter only) proved to be readily adaptable to a variety of typesetters and laser-printers.
    [Show full text]