Know Your Personal Computer 3

Total Page:16

File Type:pdf, Size:1020Kb

Know Your Personal Computer 3 SERIES I ARTICLE Know Your Personal Computer 3. The Personal Computer System Software S K GhoshQI This article surveys system software organization in per­ sonal computers, using the IBM personal computer soft­ ware. Details of the hierarchical levels of the system soft­ ware organization are explained. Introduction Siddhartha Kumar Ghoshal works with An overview of the system software organization of a PC is given whatever goes on inside in Figure 1. BIOS (basic input output system) is the lowest level of parallel computers. That the operating system. It hides the details ofthe specific motherboard includes hardware, system and projects a higher level interface to the physical hardware. software, algorithms and applications. From his MSDOS (microsoft disk operating system), the most common early childhood he has operating system of the IBM PC uses it to run application pro­ designed and built grams. These programs can be written in anyone of a number of electronic gadgets. high-level languages (HLL) such as Pascal, C, FORTRAN. Each One of the most recent ones is a sixteen HLL presents the programmer with an abstract view of the processor parallel computer. computer with IBM PC motherboards. The complex operations supported by a HLL are implemented by a runtime library (RTL) specific to that language. The RTL makes calls to the MSDOS operating system so that various tasks may be performed by the IBM PC hardware and BIOS. Figure' System software of computers are organized· Organization of System Software into Levels in layers like an onion. Appllcotion progrom Organizing system software into many hierarchical levels or Runtime IIbrory MSDOS layers as shown in Figure 1 gives it the following advantages: BIOS II Hordware II Portability: Programs written using a PC can be moved, com­ piled and run on any other computer. R-E-S-O-N-A-N-C-E--I-A-p-ri-11-9-9-6------------~-~--------------------------------~ SERIES I ARTICLE • Scalability: The hardware, software and the compilers used Runtime Library to execute an application program can be upgraded to improved versions without having to rewrite or change the A Runtime Ubrary (RTl) program. comes with every high • Modularity: Any reconfiguration, up gradation or replacement level language compiler. of the software at any level does not affect its function, overall It is a collection of large performance or organization. number of subroutines • Easy understanding and documentation: The working of each that perform well-defined program level can be understood and explained without get­ but complex operations. ting into details of other levels. These operaHons are needed by every pro­ The major disadvantages of organizing system software in grammer who uses the layers are: computer by program­ ming it in the particular • Speed of operation. It slows down the application program high-level language in execution. question. She cannot • The full poten tial of the hardware is not used by an application write each and every de­ program. tail of how that complex operation is to be done We will illustrate these points with a simple example. Consider on that given computer. the program in Figure 2 which is written in the C programming This is because she does language. It stores a number as an integer variable and then prints not know all the details its value in the hexadecimal representation. Note that several and does not have all the advantages are gained by organizing the system software in a time needed to under­ hierarchical fashion on IBM PCs as shown in Figure 1. stand them before she writes and runs her first • This program can be run as an application in any general program. So the compiler purpose computer with a C compiler. implementor supplies a • To port the program from one machine to another one must 'library' of canned pro­ recompile it with a C compiler at the destination site and run grams which our pro­ it thereafter. grammer will need. RTl • The programmer need not understand the display hardware of is written by the compiler the machine, the addresses occupied by it and so ·on. implementor. • The output need not always be displayed. It may be redi­ rected to a disk file or any other device, by the operating system. • The programmer need not have any information on the word 32-------------------------------~~--------------R-E-S-O-N-A-N-C-E-I-A-p-r-il-19-9-6 SERIES I ARTICLE Figure 2 A small C pro­ gram to store a value In a main() variable I and display It on a video display. 1* The following statement stores a hexadecimal number in i */ unsigned int i = 0 x 1234ABCD ; printf (. % x \ n·, i); /* The statement prints the value stored in i */ length of the CPU, the storage of the bytes ofa word in physical memory and other details of the CPU-memory subsystem. • The virtual models of the CPU-memory subsystem and dis­ play devices as seen by a C programmer are adequate to write portable programs. • Anyone who knows C can understand what this program does. Enhancing the CPU -memory and the video display subsystems does not affect the semantics! of the program. 1 The operation intended to • Anyone writing the operating system and other system soft­ be performed by a computer ware knows how to use the basic commands to run the program program is called its seman­ tics. Unlike human languages, correctly. the semantics of computer programming languages and On the other hand, such an organization has the following programs can never be ambig­ disad van tages: uous or ill-defined. The seman­ tics of a computer program • Most of the execution time of the program is spent in the printf must be so straightforward that even a computer (which cannot statement. Although only a write operation is needed for the do anything unless told how to output, the overhead of the printf statement is enormous. That do it and does not normally is because the system call for an output operation passes learn by experience or example) through many levels of the system software. The actual write can carry it out. And to all com­ puters in the world, it must operation to the video memory occurs at the lowest level of the mean the same thing . system software. Between any two levels, a unique and elabo­ rate parameter passing protocol must be followed. All these operations consume CPU time and are calledoverheads. • Even though the video graphics hardware displays millions of shades of colours, the output produced will only be in one colour, the one to which that environment has been set. • The program writes only at the current cursor position in one -R-ES-O-N-A--N-C-E-I-A-p-r-il-19-9-6---------------~-------------------------------33- SERIES I ARTICLE What is Snowing? A modern video display adapter has its own spots which appear all over the screen. This ap­ memory (video RAM) and processor (caUed dis­ pears like snow on the screen. BIOS knows many play co-processor). If you write directly into the details of the hardware it controls and makes it video memory, you may interfere with the display appear clothed and more sophisticated.than · it co-processor attempting to read it for producing actually is. 09 not try to control the hardware. let the necessary red, green, blue or composite video BIOS handle it. Even MSOOS gets to the hardware signals. Even though the video RAM has two inde­ via BIOS. look at Figure 1 again. MSOOS in tum pendent read/write ports, the CPU gets a higher has its own share of idiosyncracies. So do not talk priority when both display processor and CPU try to MSOOS directly. Ask your RTl to do that. Just to simultaneously access it. As a result, the dis­ write your application in C as I have in Figure 2. It play processor does not get the data it needs will work without your having to know anything from the video memory. It thus goes haywire and about the hardware, BIOS, MSDOS and the RTl of sends the beam aimlessly, illuminating bright the C compiler. given window, giving the programmer no control over its absolute location on the two-dimensional video screen. • The program uses only the default font type and size. This occurs despite the capacity of the display hardware and driver system softwares for supporting various font types and sizes. The moment one tries to alleviate these difficulties by writing directly into the video memory or directly programming the display controller hardware, the program loses its portability. Thereafter it remains tied to that specific configuration of the video display hardware. One of the advantages of organising system In the context of Figure 1, let us see how the program given in software in a Figure 2 is executed. hierarchical fashion is that the programmer • The application program of Figure 2 calls the function print[. need not understand The program to carry out printf is in the runtime library file the display hardware that comes along with the C compiler. The parameters sup­ of the machine, the plied to printf are the 32-bit integer which is a number(in our address occupied by it case Ox 1234ABCD) and the print format (in our case % x). and so on. • The runtime library converts the data to be printed into an --------------------------------~-------------------------------­ 34 RESONANCE I April1996 SERIES I ARTICLE Beware of.Turbochorging Many compilers produce a code that directly modi­ such compilers runs much faster than the ones fies som~ internal .data ' structures of low-level produced by portable compilers but has no guar­ operating systems and writes intc> device control antees.
Recommended publications
  • Clangjit: Enhancing C++ with Just-In-Time Compilation
    ClangJIT: Enhancing C++ with Just-in-Time Compilation Hal Finkel David Poliakoff David F. Richards Lead, Compiler Technology and Lawrence Livermore National Lawrence Livermore National Programming Languages Laboratory Laboratory Leadership Computing Facility Livermore, CA, USA Livermore, CA, USA Argonne National Laboratory [email protected] [email protected] Lemont, IL, USA [email protected] ABSTRACT body of C++ code, but critically, defer the generation and optimiza- The C++ programming language is not only a keystone of the tion of template specializations until runtime using a relatively- high-performance-computing ecosystem but has proven to be a natural extension to the core C++ programming language. successful base for portable parallel-programming frameworks. As A significant design requirement for ClangJIT is that the runtime- is well known, C++ programmers use templates to specialize al- compilation process not explicitly access the file system - only gorithms, thus allowing the compiler to generate highly-efficient loading data from the running binary is permitted - which allows code for specific parameters, data structures, and so on. This capa- for deployment within environments where file-system access is bility has been limited to those specializations that can be identi- either unavailable or prohibitively expensive. In addition, this re- fied when the application is compiled, and in many critical cases, quirement maintains the redistributibility of the binaries using the compiling all potentially-relevant specializations is not practical. JIT-compilation features (i.e., they can run on systems where the ClangJIT provides a well-integrated C++ language extension allow- source code is unavailable). For example, on large HPC deploy- ing template-based specialization to occur during program execu- ments, especially on supercomputers with distributed file systems, tion.
    [Show full text]
  • User Guide Ty Pe S 8143, 8144, 8146 Ty Pe S 8422, 8423, 8427
    ThinkCentre™ User Guide Ty pe s 8143, 8144, 8146 Ty pe s 8422, 8423, 8427 ThinkCentre™ User Guide Ty pe s 8143, 8144, 8146 Ty pe s 8422, 8423, 8427 Note Before using this information and the product it supports, be sure to read the “Important safety information” on page v and Appendix D, “Notices,” on page 43. Second Edition (June 2004) © Copyright International Business Machines Corporation 2004. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Important safety information . .v Erasing a lost or forgotten password (clearing Conditions that require immediate action. .v CMOS) . .24 General safety guidelines . .vi Replacing the cover and connecting the cables. .25 Service . .vi Power cords and power adapters . .vi Chapter 2. Using the IBM Setup Utility Extension cords and related devices . vii program . .27 Plugs and outlets . vii Starting the IBM Setup Utility program . .27 Batteries . vii Viewing and changing settings . .27 Heat and product ventilation . viii Using passwords . .27 CD and DVD drive safety . viii Password considerations . .27 Additional safety information . .ix User Password . .28 Lithium battery notice . .x Administrator Password . .28 Modem safety information. .x IDE Drive User Password . .28 Laser compliance statement . .xi IDE Drive Master Password . .28 Setting, changing, and deleting a password. .29 Overview . xiii Using Security Profile by Device . .29 Information resources. xiii Selecting a startup device. .29 Selecting a temporary startup device . .30 Chapter 1. Installing options . .1 Changing the startup sequence . .30 Features . .1 Exiting from the IBM Setup Utility program . .30 Available options .
    [Show full text]
  • Overview of LLVM Architecture of LLVM
    Overview of LLVM Architecture of LLVM Front-end: high-level programming language => LLVM IR Optimizer: optimize/analyze/secure the program in the IR form Back-end: LLVM IR => machine code Optimizer The optimizer’s job: analyze/optimize/secure programs. Optimizations are implemented as passes that traverse some portion of a program to either collect information or transform the program. A pass is an operation on a unit of IR code. Pass is an important concept in LLVM. LLVM IR - A low-level strongly-typed language-independent, SSA-based representation. - Tailored for static analyses and optimization purposes. Part 1 Part 1 has two kinds of passes: - Analysis pass (section 1): only analyze code statically - Transformation pass (section 2 & 3): insert code into the program Analysis pass (Section 1) Void foo (uint32_t int, uint32_t * p) { LLVM IR ... Clang opt } test.c test.bc stderr mypass.so Transformation pass (Section 2 & 3) mypass.so Void foo (uint32_t int, uint32_t * p) { ... LLVM IR opt LLVM IR } test.cpp Int main () { test.bc test-ins.bc ... Clang++ foo () ... LLVM IR } Clang++ main.cpp main.bc LLVM IR lib.cpp Executable lib.bc Section 1 Challenges: - How to traverse instructions in a function http://releases.llvm.org/3.9.1/docs/ProgrammersManual.html#iterating-over-the-instruction-in-a-function - How to print to stderr Section 2 & 3 Challenges: 1. How to traverse basic blocks in a function and instructions in a basic block 2. How to insert function calls to the runtime library a. Add the function signature to the symbol table of the module Section 2 & 3 Challenges: 1.
    [Show full text]
  • And PC 750 (Type 6887)
    Technical Information Manual PC 730 (Type 6877) and PC 750 (Type 6887) Technical Information Manual IBM PC 730 (Type 6877) and PC 750 (Type 6887) Note Before using this information and the product it supports, be sure to read the general information under Appendix B, “Notices and Trademarks” on page 65. First Edition (June 1996) The following paragraph does not apply to the United Kingdom or any country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time. It is possible that this publication may contain reference to, or information about, IBM products (machines and programs), programming, or services that are not announced in your country. Such references or information must not be construed to mean that IBM intends to announce such IBM products, programming, or services in your country. Requests for technical information about IBM products should be made to your IBM reseller or IBM marketing representative. IBM may have patents or pending patent applications covering subject matter in this document.
    [Show full text]
  • Compiling a Higher-Order Smart Contract Language to LLVM
    Compiling a Higher-Order Smart Contract Language to LLVM Vaivaswatha Nagaraj Jacob Johannsen Anton Trunov Zilliqa Research Zilliqa Research Zilliqa Research [email protected] [email protected] [email protected] George Pîrlea Amrit Kumar Ilya Sergey Zilliqa Research Zilliqa Research Yale-NUS College [email protected] [email protected] National University of Singapore [email protected] Abstract +----------------------+ Scilla is a higher-order polymorphic typed intermediate | Blockchain Smart | | Contract Module | level language for implementing smart contracts. In this talk, | in C++ (BC) | +----------------------+ we describe a Scilla compiler targeting LLVM, with a focus + state variable | + ^ on mapping Scilla types, values, and its functional language foo.scilla | | | & message | fetch| | constructs to LLVM-IR. | | |update v v | The compiled LLVM-IR, when executed with LLVM’s JIT +--------------------------------------+---------------------------------+ framework, achieves a speedup of about 10x over the refer- | | | +-------------+ +----------------+ | ence interpreter on a typical Scilla contract. This reduced | +-----------------> |JIT Driver | +--> | Scilla Run-time| | | | |in C++ (JITD)| | Library in C++ | | latency is crucial in the setting of blockchains, where smart | | +-+-------+---+ | (SRTL) | | | | | ^ +----------------+ | contracts are executed as parts of transactions, to achieve | | | | | | | foo.scilla| | | peak transactions processed per second. Experiments on the | | | foo.ll| | | | | | | Ackermann
    [Show full text]
  • Ibl\1 PERSONAL SYSTEM/2(TM) and PERSONAL COMPUTER PVBLICATIO~ and EDUCATION REFERENCES
    IBl\1 PERSONAL SYSTEM/2(TM) and PERSONAL COMPUTER PVBLICATIO~ and EDUCATION REFERENCES As of 01-13-89 The following list of PC publications is for marketing and market support purposes. This list was taken from the product Ivory Letters and all other known sources. The bulk of the publication numbers pertain to PC hardware products, as these are the ones in most demand. Some entries are listed in multiple categories because they pertain to each category within which they are shown. The publications shown in this list are only some of the PC publications available; most PC pub­ lications have been assigned 7 -digit part numbers instead of 8-digit form numbers. The follo\ving list is composed of only form numbers, so that you may readily order these publications from Mechanicsburg. Technical publications may be obtained from either an IBM Representative, an Authorized IBI'v1 Dealer, the Technical Directory (1-800-IBM-PCTB), or the IBM Software/Publications Response Line (1-800-327-5711); the latter is normally used by dealers. A change to the information since November 16, 1988 is indicated by a vertical line to the left of the change. Rich Berman Tieline 396-4887 RHBERMAN at DEM014 \Vestern Area Technical Support Ctr., Dept. CUU ii Table of Contents General/:\-liscellaneous ......................................................... 1 Managing \Vorkstations ....................................................... 11 Personal System/2 ............................................................ 12 PC AT ...................................................................
    [Show full text]
  • Using ID TECH Universal SDK Library Files in a C++ Project
    Using ID TECH Universal SDK Library Files in a C++ Project Introduction From time to time, customers who wish to use ID TECH's Universal SDK for Windows (which is .NET-based and comes with C# code examples) ask if it is possible to do development against the SDK solely in C++ (on Windows). The answer is yes. Universal SDK library files (DLLs) are COM-visible and ready to be accessed from C++ code. (SDK runtimes require the .NET Common Language Runtime, but your C++ binaries can still use the SDK.) Note that while the example shown in this document involves Microsoft's Visual Studio, it is also possible to use SDK libraries in C++ projects created in Eclipse or other IDEs. How to Use the IDTechSDK.dll File in a C++ Project: 1. Create a Visual C++ project in Visual Studio 2015 (shown below, an MFC Application as an example). 2. Change the properties of the Visual C++ project. Under the General tag, set Commom Language Runtime Support under Target Platform to "Common Language Runtime Support (/clr)" under Windows. 3. Under VC++ Directories, add the path to the C# .dll file(s) to Reference Directories. 4. Under C/C++ General, set Commom Language Runtime Support to "Common Language Runtime Support (/clr)." 5. Under C/C++ Preprocessor, add _AFXDLL to Preprocessor Definitions. 6. Under C/C++ Code Generation, change Runtime Library to "Multi-threaded DLL (/MD)." 7. Under Code Analysis General, change Rule Set to "Microsoft Mixed (C++ /CLR) Recommended Rules." 8. Use IDTechSDK.dll in your .cpp file. a.
    [Show full text]
  • Using Ld the GNU Linker
    Using ld The GNU linker ld version 2 January 1994 Steve Chamberlain Cygnus Support Cygnus Support [email protected], [email protected] Using LD, the GNU linker Edited by Jeffrey Osier (jeff[email protected]) Copyright c 1991, 92, 93, 94, 95, 96, 97, 1998 Free Software Foundation, Inc. Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this manual under the conditions for verbatim copying, provided also that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this manual into another lan- guage, under the above conditions for modified versions. Chapter 1: Overview 1 1 Overview ld combines a number of object and archive files, relocates their data and ties up symbol references. Usually the last step in compiling a program is to run ld. ld accepts Linker Command Language files written in a superset of AT&T’s Link Editor Command Language syntax, to provide explicit and total control over the linking process. This version of ld uses the general purpose BFD libraries to operate on object files. This allows ld to read, combine, and write object files in many different formats—for example, COFF or a.out. Different formats may be linked together to produce any available kind of object file. See Chapter 5 [BFD], page 47, for more information. Aside from its flexibility, the gnu linker is more helpful than other linkers in providing diagnostic information.
    [Show full text]
  • Performance Analyses and Code Transformations for MATLAB Applications Patryk Kiepas
    Performance analyses and code transformations for MATLAB applications Patryk Kiepas To cite this version: Patryk Kiepas. Performance analyses and code transformations for MATLAB applications. Computa- tion and Language [cs.CL]. Université Paris sciences et lettres, 2019. English. NNT : 2019PSLEM063. tel-02516727 HAL Id: tel-02516727 https://pastel.archives-ouvertes.fr/tel-02516727 Submitted on 24 Mar 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Préparée à MINES ParisTech Analyses de performances et transformations de code pour les applications MATLAB Performance analyses and code transformations for MATLAB applications Soutenue par Composition du jury : Patryk KIEPAS Christine EISENBEIS Le 19 decembre 2019 Directrice de recherche, Inria / Paris 11 Présidente du jury João Manuel Paiva CARDOSO Professeur, University of Porto Rapporteur Ecole doctorale n° 621 Erven ROHOU Ingénierie des Systèmes, Directeur de recherche, Inria Rennes Rapporteur Matériaux, Mécanique, Michel BARRETEAU Ingénieur de recherche, THALES Examinateur Énergétique Francois GIERSCH Ingénieur de recherche, THALES Invité Spécialité Claude TADONKI Informatique temps-réel, Chargé de recherche, MINES ParisTech Directeur de thèse robotique et automatique Corinne ANCOURT Maître de recherche, MINES ParisTech Co-directrice de thèse Jarosław KOŹLAK Professeur, AGH UST Co-directeur de thèse 2 Abstract MATLAB is an interactive computing environment with an easy programming language and a vast library of built-in functions.
    [Show full text]
  • Lenovo's Acquisition of IBM's PC Division
    Lenovo’s Acquisition of IBM’s PC Division 1 @2009, ESCP Europe Business School, London ecch the case for learning This case was written by Dr. Terence Tse and Jerome Couturier, ESCP Europe Business School. It is intended to be used as the basis for class discussion rather than to illustrate either effective or ineffective handling of a management situation. The case was compiled from published sources. Lenovo’s Acquisition of IBM’s PC Division: A Short-cut to be a World Player or a Lemon that Leads Nowhere? Terence Tse and Jerome Couturier INTRODUCTION On April 20, 2004, a group of directors at Lenovo gathered in a windowless conference room on the 10th floor of a high-rise building in Beijing, at the Lenovo’s headquarters. The meeting was of critical importance to the future of the company. The one and only item on the agenda was to evaluate the potential acquisition of IBM’s personal computer (PC) division. Amongst many concerns debated, the central one remained whether Lenovo’s executives were capable of running a complex global business. Such an acquisition would open the way for China’s largest computer manufacturer to purchase Big Blue’s PC division for US$ 1.75 billion. In turn, IBM had agreed to take an 18.9% stake in the new Lenovo. Based in Beijing, Lenovo began as a spin-off of the Chinese Academy of Sciences’ (“the Academy”) new technology unit in 1994. It started its life as a reseller/distributor for AST computers and later HP and IBM. The company began making its own brand PC in 1990.
    [Show full text]
  • Meson Manual Sample.Pdf
    Chapter 2 How compilation works Compiling source code into executables looks fairly simple on the surface but gets more and more complicated the lower down the stack you go. It is a testament to the design and hard work of toolchain developers that most developers don’t need to worry about those issues during day to day coding. There are (at least) two reasons for learning how the system works behind the scenes. The first one is that learning new things is fun and interesting an sich. The second one is that having a grasp of the underlying system and its mechanics makes it easier to debug the issues that inevitably crop up as your projects get larger and more complex. This chapter aims outline how the compilation process works starting from a single source file and ending with running the resulting executable. The information in this chapter is not necessary to be able to use Meson. Beginners may skip it if they so choose, but they are advised to come back and read it once they have more experience with the software build process. The treatise in this book is written from the perspective of a build system. Details of the process that are not relevant for this use have been simplified or omitted. Entire books could (and have been) written about subcomponents of the build process. Readers interested in going deeper are advised to look up more detailed reference works such as chapters 41 and 42 of [10]. 2.1 Basic term definitions compile time All operations that are done before the final executable or library is generated are said to happen during compile time.
    [Show full text]
  • Section 3. Operating Your System
    A Ilz -N to First Edition (September 1988) The following paragraph does not apply to the United Kingdom or any country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time. It is possible that this publication may contain reference to, or information about, IBM products (machines and programs), programming, or services that are not announced in your country. Such references or information must not be construed to mean that IBM intends to announce such IBM products, programming, or services in your country. Requests for copies of this publication and for technical information about IBM products should be made to your IBM Authorized Dealer or your IBM Marketing Representative. IBM is a registered trademark of the International Business Machines Corporation. Personal System/2 is a trademark of the International Business Machines Corporation. © Copyright International Business Machines Corporation 1988. All rinhts reserved. The warranty terms and conditions applicable in the country of purchase in respect of an IBM product are available from the supplier. Please retain them with your proof of purchase.
    [Show full text]