Washington Apple Pi Journal, October 1987
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Extending the UHC LLVM Backend: Adding Support for Accurate Garbage Collection
Extending the UHC LLVM backend: Adding support for accurate garbage collection Paul van der Ende MSc Thesis October 18, 2010 INF/SCR-09-59 Daily Supervisors: Center for Software Technology dr. A. Dijkstra Dept. of Information and Computing Sciences drs. J.D. Fokker Utrecht University Utrecht, the Netherlands Second Supervisor: prof. dr. S.D. Swierstra Abstract The Utrecht Haskell Compiler has an LLVM backend for whole program analyse mode. This backend pre- viously used the Boehm-Weiser library for heap allocation and conservative garbage collection. Recently an accurate garbage collector for the UHC compiler has been developed. We wanted this new garbage collection library to work with the LLVM backend. But since this new collector is accurate, it needs cooperation with the LLVM backend. Functionality needs to be added to find the set of root references and traversing all live references. To find the root set, the bytecode interpreter backend currently uses static stack maps. This is where the problem arises. The LLVM compiler is known to do various aggressive transformations. These optimizations might change the stack layout described by the static stack map. So to avoid this problem we wanted to use the shadow-stack provided by the LLVM framework. This is a dynamic structure maintained on the stack to safely find the garbage collection roots. We expect that the shadow-stack approach comes with a runtime overhead for maintaining this information dynamically on the stack. So we did measure the impact of this method. We also measured the performance improvement of the new garbage collection method used and compare it with the other UHC backends. -
Improving Memory Management Security for C and C++
Improving memory management security for C and C++ Yves Younan, Wouter Joosen, Frank Piessens, Hans Van den Eynden DistriNet, Katholieke Universiteit Leuven, Belgium Abstract Memory managers are an important part of any modern language: they are used to dynamically allocate memory for use in the program. Many managers exist and depending on the operating system and language. However, two major types of managers can be identified: manual memory allocators and garbage collectors. In the case of manual memory allocators, the programmer must manually release memory back to the system when it is no longer needed. Problems can occur when a programmer forgets to release it (memory leaks), releases it twice or keeps using freed memory. These problems are solved in garbage collectors. However, both manual memory allocators and garbage collectors store management information for the memory they manage. Often, this management information is stored where a buffer overflow could allow an attacker to overwrite this information, providing a reliable way to achieve code execution when exploiting these vulnerabilities. In this paper we describe several vulnerabilities for C and C++ and how these could be exploited by modifying the management information of a representative manual memory allocator and a garbage collector. Afterwards, we present an approach that, when applied to memory managers, will protect against these attack vectors. We implemented our approach by modifying an existing widely used memory allocator. Benchmarks show that this implementation has a negligible, sometimes even beneficial, impact on performance. 1 Introduction Security has become an important concern for all computer users. Worms and hackers are a part of every day internet life. -
Epression Integrator'sguide
Mobile Multimedia Cabinet Axis1 Integrator’s Guide Registration Benefits At SMART, we’re always improving our customers’ experience by offering free software upgrades. In the past, we’ve made new features such as handwriting recognition, USB support and SMART Recorder available to all customers, new and old alike. Register your Expression 503 mobile multimedia cabinet to be notified of free upgrades like these in the future. We also want to give you the best technical support possible. Please help us by registering your Expression 503 cabinet and keeping this information available: Serial Number: Date of Purchase: Register online at: www.smarttech.com/registration FCC Warning This equipment has been tested and found to comply with the limits for a "Class B" digital device, pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception (this can be determined by turning the equipment off and on) the user is encouraged to try to correct the interference by one or more of the following measures: l Reorient or relocate the receiving antenna. l Increase the separation between the equipment and receiver. l Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. -
Instructions Dp10 Microscope Digital Camera System
INSTRUCTIONS DP10 MICROSCOPE DIGITAL CAMERA SYSTEM This instruction manual is for the Olympus DP10 Microscope Digital Camera System. To ensure the safety, obtain optimum performance and familiarize yourself fully with the use of this system, we recommend you study this manual thoroughly before operating the system. Retain this instruction manual in an easily accessible place near the work desk for future reference. A X 7 2 1 8 IMPORTANT Connecting this digital camera system to an Olympus UIS or LB series optical microscope allows you to easily photograph and record the magnified images observed through the microscope. Optimal optical performance may not be achieved if the DP10 microscope digital camera system is mounted on a non-Olympus video microscope system. SAFETY PRECAUTIONS 1. Use the provided AC adapter only. Using another AC adapter will prevent the camera system from operating at optimum levels and may cause it to malfunc- tion. 2. The cords and cables are not resistant to bending or twisting. Do not apply excessive force to them. 3. To prevent toppling of the microscope, keep the total height of the microscope below 1m when attachments are mounted. Safety and Operation Symbols The following symbols are found on the camera and hand switch. Study the meaning of the symbols, and always use the equipment in the safest possible manner. Symbol Explanation Before use, carefully read the instruction manual. Improper use could result in personal injury to the user and/or damage to the equipment. Indicates “ I ” (ON) or “ ” (OFF) of the main switch. Use the provided card or a commercially available 3.3 V SmartMedia. -
Comparative Studies of Programming Languages; Course Lecture Notes
Comparative Studies of Programming Languages, COMP6411 Lecture Notes, Revision 1.9 Joey Paquet Serguei A. Mokhov (Eds.) August 5, 2010 arXiv:1007.2123v6 [cs.PL] 4 Aug 2010 2 Preface Lecture notes for the Comparative Studies of Programming Languages course, COMP6411, taught at the Department of Computer Science and Software Engineering, Faculty of Engineering and Computer Science, Concordia University, Montreal, QC, Canada. These notes include a compiled book of primarily related articles from the Wikipedia, the Free Encyclopedia [24], as well as Comparative Programming Languages book [7] and other resources, including our own. The original notes were compiled by Dr. Paquet [14] 3 4 Contents 1 Brief History and Genealogy of Programming Languages 7 1.1 Introduction . 7 1.1.1 Subreferences . 7 1.2 History . 7 1.2.1 Pre-computer era . 7 1.2.2 Subreferences . 8 1.2.3 Early computer era . 8 1.2.4 Subreferences . 8 1.2.5 Modern/Structured programming languages . 9 1.3 References . 19 2 Programming Paradigms 21 2.1 Introduction . 21 2.2 History . 21 2.2.1 Low-level: binary, assembly . 21 2.2.2 Procedural programming . 22 2.2.3 Object-oriented programming . 23 2.2.4 Declarative programming . 27 3 Program Evaluation 33 3.1 Program analysis and translation phases . 33 3.1.1 Front end . 33 3.1.2 Back end . 34 3.2 Compilation vs. interpretation . 34 3.2.1 Compilation . 34 3.2.2 Interpretation . 36 3.2.3 Subreferences . 37 3.3 Type System . 38 3.3.1 Type checking . 38 3.4 Memory management . -
Diploma Thesis
Faculty of Computer Science Chair for Real Time Systems Diploma Thesis Porting DotGNU to Embedded Linux Author: Alexander Stein Supervisor: Jun.-Prof. Dr.-Ing. Robert Baumgartl Dipl.-Ing. Ronald Sieber Date of Submission: May 15, 2008 Alexander Stein Porting DotGNU to Embedded Linux Diploma Thesis, Chemnitz University of Technology, 2008 Abstract Programming PLC systems is limited by the provided libraries. In contrary, hardware-near programming needs bigger eorts in e. g. initializing the hardware. This work oers a foundation to combine advantages of both development sides. Therefore, Portable.NET from the DotGNU project has been used, which is an im- plementation of CLI, better known as .NET. The target system is the PLCcore- 5484 microcontroller board, developed by SYS TEC electronic GmbH. Built upon the porting, two variants to use interrupt routines withing the Portabe.NET runtime environment have been analyzed. Finally, the reaction times to occuring interrupt events have been examined and compared. Die Programmierung für SPS-Systeme ist durch die gegebenen Bibliotheken beschränkt, während hardwarenahe Programmierung einen gröÿeren Aufwand durch z.B. Initialisierungen hat. Diese Arbeit bietet eine Grundlage, um die Vorteile bei- der Entwicklungsseiten zu kombinieren. Dafür wurde Portable.NET des DotGNU- Projekts, eine Implementierung des CLI, bekannter unter dem Namen .NET, be- nutzt. Das Zielsystem ist das PLCcore-5484 Mikrocontrollerboard der SYS TEC electronic GmbH. Aufbauend auf der Portierung wurden zwei Varianten zur Ein- bindung von Interrupt-Routinen in die Portable.NET Laufzeitumgebung untersucht. Abschlieÿend wurden die Reaktionszeiten zu eintretenden Interrupts analysiert und verglichen. Acknowledgements I would like to thank some persons who had inuence and supported me in my work. -
What Burglar? I 3 Thrushwhacker's
INSIDE THIS ISSUE • Exclusive! Interview with Guild Librarian Si- gismund Thing ................ 2 • Guild of Thieves ap prentice exam - how to take the test, and how to WIN! .................................. 11 • Top Secret Coded "Cheat Sheet" stolen Top Crook Slags from Guild of Thieves - we reveal all ..................24 ANDMUCH MUCH Rookies Shock! MORE! Top crook Silas "We just can't get the ceptional material, and fac type of young person es a bright future in the Beaker says the pro we want these days. Guild. fession will face dis Frankly, they seem Beaker said that he was aster if young new more keen on accoun "sick as a macaw" with tancy and merchant young apprentices training comers continue with banking." at the Guild's expense and their boycott. Beaker was speaking on then "going offthe straight Beaker, speaking from his the eve of new, stringent and narrow - becoming Dombrook hideaway, add entry standards to the doctors and shopkeepers ed: "Frankly, the newcom Guild of Thieves. and such." ers are rubbish. Green "These new tests aren't He added: "We have to face horns. Tenderfeet. Wet be easy", he said. "Anyone it. This a divided society. hind the ears. who can pass them is ex- It's us and them." TIME FOR ACTION BURGLARY by Our Special Correspondent A.Nonymous Commuters on the Dombrook line are facinganother ex SUPPLIES pense today - theprice of a wristwatch. For the best in Modern Burglary For burglars described as equipment, call "audacious and cunning" have noticed the clock had gone, it stolen the Victoria Station clock. was toolate to check what time it Festeron 1183 The famousclock, which has was, because it had gone, if you Jemmies &. -
Using and Porting the GNU Compiler Collection
Using and Porting the GNU Compiler Collection Richard M. Stallman Last updated 14 June 2001 for gcc-3.0 Copyright c 1988, 1989, 1992, 1993, 1994, 1995, 1996, 1998, 1999, 2000, 2001 Free Software Foundation, Inc. For GCC Version 3.0 Published by the Free Software Foundation 59 Temple Place - Suite 330 Boston, MA 02111-1307, USA Last printed April, 1998. Printed copies are available for $50 each. ISBN 1-882114-37-X Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with the Invariant Sections being “GNU General Public License”, the Front-Cover texts being (a) (see below), and with the Back-Cover Texts being (b) (see below). A copy of the license is included in the section entitled “GNU Free Documentation License”. (a) The FSF’s Front-Cover Text is: A GNU Manual (b) The FSF’s Back-Cover Text is: You have freedom to copy and modify this GNU Manual, like GNU software. Copies published by the Free Software Foundation raise funds for GNU development. Short Contents Introduction......................................... 1 1 Compile C, C++, Objective C, Fortran, Java ............... 3 2 Language Standards Supported by GCC .................. 5 3 GCC Command Options ............................. 7 4 Installing GNU CC ............................... 111 5 Extensions to the C Language Family .................. 121 6 Extensions to the C++ Language ...................... 165 7 GNU Objective-C runtime features .................... 175 8 gcov: a Test Coverage Program ...................... 181 9 Known Causes of Trouble with GCC ................... 187 10 Reporting Bugs................................. -
Washington Apple Pi Journal, November 1987
$ 250 Walhington Apple Pi The Journal of Washingtond Apple Pi, Ltd. Volume. 9 november1987 number II Hiahliahtl • Beginner's Start at the IIGS Finder • I Love Apple Music: Pa-rt 6 • Disk III Backup (g Laser Printing &Mac Typesetting ~ A View of Big Blue [!g) You're Going to Love These! (Suitcase, PowerStation, Pyr~) In TI,is Issue... Officers & Staff, Editorial ....................... .... .......... ....... 3 Spy's Adventures in Europe: A Review ...... Chris Hancock 36 President's Comer ..................................... Tom Warrick 4 Battles in Normandy: A Review ............... Chris Hancock 36 General Information ........................ ............................ 5 The Fool's Errand: A Review ..................... Steven Payne 37 Classifieds, Commercial Classifieds, Job Mart .................. 6 Software Industry: Econ. Struct. Part 2 ... Joseph A. Hasson 39 WAP Hotline ......................................................... ..... 8 Pascal News ................................. ........ Robert C. Platt 48 WAP Calendar, SIG News............................................ 9 dPub SIG Meeting Report-Oct 7 ........... Cynthia Yockey 50 Stripping Your GS System Disk ................... David Todd 10 Laser Printing and Mac Typesetting .......... Lynn R. Trusal 52 IIGS SIG Meeting Report .............................. Ted Meyer 10 Stock SIG News ............... ........... Andrew D. Thompson 55 Beginner's Guide at the IIGS Finder ................. Ted Meyer 12 Mac Meeting Report-Sept. 26 .............. Cynthia Yockey 56 Minutes ........................................ -
Macbook Air User's Guide (Manual)
Congratulations, you and your MacBook Air were made for each other. Built-in iSight camera Video chat with up to three friends anywhere in the world at the same time. www.apple.com/macbookair Mac Help isight Finder Time Machine Browse the contents Automatically back of your computer up your files to an using Cover Flow. extra hard drive. www.apple.com/macosx www.apple.com/macosx Mac Help finder Mac Help time machine iMovie iPhoto Collect all your video in Organize all your photos one library. Create and with Events. Publish to a share movies in minutes. Web Gallery with a click. www.apple.com/ilife/imovie www.apple.com/ilife/iphoto iMovie Help movie iPhoto Help photo GarageBand iWeb Create music by adding Create beautiful websites musicians to a virtual stage. with photos, movies, blogs, Enhance your song to sound podcasts, and dynamic like a pro. web widgets. www.apple.com/ilife/garageband www.apple.com/ilife/iweb GarageBand Help record iWeb Help website Contents Chapter 1: Ready, Set Up, Go 8 Welcome 9 What’s in the Box 10 Setting Up Your MacBook Air 15 Setting Up DVD or CD Sharing 16 Migrating Information to Your MacBook Air 19 Getting Additional Information onto Your MacBook Air 22 Putting Your MacBook Air to Sleep or Shutting It Down Chapter 2: Life with Your MacBook Air 26 Basic Features of Your MacBook Air 28 Keyboard Features of Your MacBook Air 30 Ports on Your MacBook Air 32 Using the Trackpad and Keyboard 34 Running Your MacBook Air on Battery Power 35 Getting Answers Chapter 3: Problem, Meet Solution 40 Problems That Prevent -
Dayna Technical Support at 1-800-531-0600
Supplements For the MacCharlie User's Manual Through version 3.0 of MacCharlie Application Software · .••••••- ·-. ,..••••••• • n Introduction •What are _ You're probably wondering why we've sent you a set of Supplements with your these Supple MacCharlie or software upgrade. The answer's simple. Because our customers' ments? needs have grown, MacCharlie has grown too since it frrst became a product. The information you'll fmd in these supplements isn't covered in the MacCharlie User's Manual because it describes features that have been added later. • How to use Each supplement explains a different enhancement to MacCharlie. If you're Them new to MacCharlie, you should probably read them all. If you've had MacCharlie for some time, you may just need to read the supplements that explain the new features of the latest version (3.0) of the MacCharlie Applica tion Software. To help you decide what to read, here's a summary of each supplement Quick; Installation Explains step-by-step how to install, start and quit MacCharlie. Upgrading MacCharlie to 3.0 Explai.."lS how to upgrade previous copies of the MacCharlie Application Software to version 3.0. The Maiii features of 3.0 are improved file transfer and printing functions, explained in the File Transfers and Printer Operations - supplements. Printer Operations Explains the printing features that have been added to MacCharlie since the User's Manual was written. File Transfers Explain the file transfer features that have been added to MacCharlie since the User's Manual was written. Keyboard Changes Explains changes to the use of the keyboard since the MacCharlie User's Manual was written. -
Stephen M. Cabrinety Collection in the History of Microcomputing, Ca
http://oac.cdlib.org/findaid/ark:/13030/kt529018f2 No online items Guide to the Stephen M. Cabrinety Collection in the History of Microcomputing, ca. 1975-1995 Processed by Stephan Potchatek; machine-readable finding aid created by Steven Mandeville-Gamble Department of Special Collections Green Library Stanford University Libraries Stanford, CA 94305-6004 Phone: (650) 725-1022 Email: [email protected] URL: http://library.stanford.edu/spc © 2001 The Board of Trustees of Stanford University. All rights reserved. Special Collections M0997 1 Guide to the Stephen M. Cabrinety Collection in the History of Microcomputing, ca. 1975-1995 Collection number: M0997 Department of Special Collections and University Archives Stanford University Libraries Stanford, California Contact Information Department of Special Collections Green Library Stanford University Libraries Stanford, CA 94305-6004 Phone: (650) 725-1022 Email: [email protected] URL: http://library.stanford.edu/spc Processed by: Stephan Potchatek Date Completed: 2000 Encoded by: Steven Mandeville-Gamble © 2001 The Board of Trustees of Stanford University. All rights reserved. Descriptive Summary Title: Stephen M. Cabrinety Collection in the History of Microcomputing, Date (inclusive): ca. 1975-1995 Collection number: Special Collections M0997 Creator: Cabrinety, Stephen M. Extent: 815.5 linear ft. Repository: Stanford University. Libraries. Dept. of Special Collections and University Archives. Language: English. Access Access restricted; this collection is stored off-site in commercial storage from which material is not routinely paged. Access to the collection will remain restricted until such time as the collection can be moved to Stanford-owned facilities. Any exemption from this rule requires the written permission of the Head of Special Collections.