Windows 2000 Professional Basics

Total Page:16

File Type:pdf, Size:1020Kb

Windows 2000 Professional Basics PART I Windows 2000 Professional Basics Learn To: • Install Windows 2000 Professional • Install and organize COPYRIGHTEDremove MATERIAL programs • Add a local and a network printer CHAPTER 1 Introducing Windows 2000 Professional FEATURING: Windows 2000 Professional, Windows 2000 Server: Which is which? 4 What’s new in Windows 2000 Professional? 8 What’s not in Windows 2000 Professional? 16 Why choose Windows 2000 Professional over Windows 98? 17 How is Windows 2000 Professional different from other operating systems? 25 What are the features of Windows 2000 Professional architecture? 27 Weaknesses of Windows 2000 Professional 31 Since the advent of the personal computer, users have wanted three things in an operating system: power, stability, and usability. Windows 2000 Professional has all these and more in abundance. Since its inception in 1993, Windows NT has featured an indefatigable 32-bit architecture, complete with built-in networking and the capa- bility to run almost every piece of Windows software on the market. Windows 2000 Professional now includes an interface, which has evolved from the NT 4 Explorer shell and is even easier to use. NOTE Windows 2000 Professional is actually version 5 of Windows NT Workstation. Throughout the book, I make many references to NT in describing Windows 2000. The name change was a sign of the convergence of the Windows product lines. What does all this mean to the consumer, the person sitting at a desk 52 weeks a year who just wants to be a productive computer user? It means a lot. It means a fast, up-to-date operating system with a slew of advanced features that ensure the computer will almost never crash. It means an operating system that can host the emerging mul- titude of 32-bit software applications, some of which offer amazing facilities for profes- sional audio and video recording, editing, and broadcasting. It means a new interface, which gives users tremendous control over how the system performs its tasks and how it maintains its connections to peripherals and to other computers. In this chapter, I’ll give you an overview of Windows 2000 Professional: what’s new, what’s different, and what’s under the hood. I’ll compare Windows 2000 Profes- sional to other operating systems you may be familiar with and emphasize compari- sons between Windows 2000 Professional and previous versions of Windows. In later chapters, I’ll expand on most of the topics I’ll introduce in this chapter, but you’ll find a lot here to whet your appetite. Windows 2000 Professional, Windows 2000 Server: Which Is Which? The two basic “flavors” of Windows 2000 are Professional and Server. It might be easier to think of Windows 2000 Server as the big brother of Windows 2000 Professional; they’re from the same family but a little different in size and purpose. Both versions of Windows 2000 are solid, 32-bit operating systems, with C2 Level security and built-in networking. Both feature the Windows 2000 interface. Windows 2000 Professional is an operating system designed for corporate and high-end users who want a robust and THE ROAD TO WINDOWS 2000 PROFESSIONAL 5 powerful operating environment. Windows 2000 Server does everything that Win- PART dows 2000 Professional does and adds a comprehensive set of tools for managing and I administering a network. It is designed to run on a network file server or application server. There are also additional versions of Windows 2000 Server intended for more specialized environments, such as cluster servers and data warehousing. For more information on these versions, see my book Mastering Windows 2000 Server (Sybex). Everything that I discuss in this book is relevant for both flavors of Windows 2000, but I don’t discuss the advanced networking administration features found in Win- dows 2000 Server. (Not to worry, though, networkers: in Part III of this book I do cover the administration features that let you manage the built-in networking capabilities of Windows 2000 Professional.) Windows 2000 Professional Basics The Road to Windows 2000 Professional For many years people believed that microcomputer operating systems and mainframe operating systems were totally different entities, as different as bicycles and airliners. In the case of bikes and airliners, most of us would say, “Sure, they’re both forms of transportation, but the similarity ends there.” It’s true. Microcomputer operating sys- tems mainly ended up being launching pads for personal productivity tools such as word processors, drawing packages, e-mail, spreadsheets, and simple databases, as well as games. Mainframes, which make truly awful platforms for word processing (ask any- one who’s ever tried to run the Unix version of WordPerfect or IBM’s DisplayWrite/ 370), mainly ended up being the “data warehouses” of large corporations. Because mainframe systems generally operate in well-managed, centrally adminis- tered, and very fault-tolerant environments, huge mission-critical database programs have found a home on them. The IRS keeps its “master file” on every U.S. citizen in a building full of huge mainframes in Martinsburg, West Virginia. The IRS must run a program to examine the master file every day—all 300+ million records of it—and that file is so valuable that parts of it are backed up continuously. Running that application on a few dozen Pentium Pros under Windows is hard to imagine, isn’t it? (Try explain- ing to the president that we weren’t able to issue refunds this year because the master file GPFed.) But think about it: Why doesn’t the IRS do its work on PCs? PCs are slower than mainframes, certainly, but by a smaller and smaller margin with every machine gener- ation. No, the main reason is that corporate information technology (IT) managers don’t trust PC software, and with good reason. PC users assume and take for granted the existence of bugs in the software we buy. It’s just a fact of computer life. Our accep- tance is somewhat odd, though, when you think about it. Consistent low quality is almost unheard of in the rest of the manufacturing world. If one in a thousand Big Macs gave you food poisoning, would you still frequent McDonald’s? Probably not. If 6 CHAPTER 1 • INTRODUCING WINDOWS 2000 PROFESSIONAL automobiles have manufacturing defects, do you meekly accept the answer, “Well, yes, it is a problem, but it’s not a big one. We’ll fix it in the next model.” Nope. In fact, in most areas of commerce you usually don’t need to worry about the issue of quality because laws protect consumers from shoddy products in most fields. Why don’t PC vendors work harder to produce high-quality, never-failing software? Well, some have; IBM’s Personal Editor was one example of an essentially flawless piece of software. Operating systems haven’t been quite as lucky, though; you’d pretty much need a CD-ROM to hold the list of known Windows 3.x bugs. The Beginnings The top people at Microsoft knew that they were vulnerable on a very key point: all their products ran on Intel x86 hardware, meaning the 8088, 80286, 80386, 80486, and eventually Pentium and Pentium Pro processors and beyond. Microsoft’s fortunes, then, rode on the Intel horse, and at that time the Intel horse seemed the right one to back. But what about the future? Who could know what processor would be dominant in 10 years? Microsoft wanted to know that it would be on top no matter what proces- sor the marketplace chose, so it needed an architecture-independent operating system. Building an Architecture-Independent Operating System Architecture-independent doesn’t mean that the product works as well in a Victorian house as it does in a Bauhaus office. Architecture-independent means that it’s built so that it can be modified fairly easily to work on a different processor. All of Microsoft’s operating systems up to 1989 were firmly Intel entrenched, and porting any of them to another processor would have been difficult. (For example, IBM was forced to agree that portability was a problem when it announced that it had stopped work on a ver- sion of OS/2 for its PowerPC processor, a CPU of non-Intel architecture.) A piece of software can easily become dependent on a particular processor because the writers of the operating system must become intimately familiar with the proces- sor’s strengths and weaknesses. Consequently, those strengths and weaknesses inevi- tably color a developer’s sense of what’s necessary and unnecessary for an operating system. For example, if you build an operating system on top of a 16-bit processor, you’re probably going to make the operating system a 16-bit operating system. If the processor handles memory in chunks (pages is the exact word) of 4KB, as the Intel processors do, the operating system’s pages will probably turn out to be 4KB as well. So converting the operating system to a machine with 1MB pages involves massive code rewriting unless the operating system is designed with flexible page sizes in mind. THE ROAD TO WINDOWS 2000 PROFESSIONAL 7 Building an architecture-independent operating system might have been too diffi- PART cult a task for Microsoft’s development staff, but as luck would have it, a team of top- I flight mainframe operating system designers became available in 1989. A group of former Digital Equipment Corporation programmers, led by a man named Dave Cutler, set up shop at Microsoft, promising to build the operating system of Microsoft’s future. Influenced partly by an operating system called MACH, a Unix implementation created at Carnegie Mellon University, Cutler’s team used a design approach that attempted to isolate all the processor-specific parts of the operating system into a single area called the microkernel.
Recommended publications
  • Shorten Device Boot Time for Automotive IVI and Navigation Systems
    Shorten Device Boot Time for Automotive IVI and Navigation Systems Jim Huang ( 黃敬群 ) <[email protected]> Dr. Shi-wu Lo <[email protected]> May 28, 2013 / Automotive Linux Summit (Spring) Rights to copy © Copyright 2013 0xlab http://0xlab.org/ [email protected] Attribution – ShareAlike 3.0 Corrections, suggestions, contributions and translations You are free are welcome! to copy, distribute, display, and perform the work to make derivative works Latest update: May 28, 2013 to make commercial use of the work Under the following conditions Attribution. You must give the original author credit. Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under a license identical to this one. For any reuse or distribution, you must make clear to others the license terms of this work. Any of these conditions can be waived if you get permission from the copyright holder. Your fair use and other rights are in no way affected by the above. License text: http://creativecommons.org/licenses/by-sa/3.0/legalcode Goal of This Presentation • Propose a practical approach of the mixture of ARM hibernation (suspend to disk) and Linux user-space checkpointing – to shorten device boot time • An intrusive technique for Android/Linux – minimal init script and root file system changes are required • Boot time is one of the key factors for Automotive IVI – mentioned by “Linux Powered Clusters” and “Silver Bullet of Virtualization (Pitfalls, Challenges and Concerns) Continued” at ALS 2013 – highlighted by “Boot Time Optimizations” at ALS 2012 About this presentation • joint development efforts of the following entities – 0xlab team - http://0xlab.org/ – OSLab, National Chung Cheng University of Taiwan, led by Dr.
    [Show full text]
  • User's Manual 2
    USER'S MANUAL 2 - © 2018. All Rights Reserved. Nitro 5 Covers: AN515-42 / AN515-52 This revision: March 2018 Important This manual contains proprietary information that is protected by copyright laws. The information contained in this manual is subject to change without notice. Some features described in this manual may not be supported depending on the Operating System version. Images provided herein are for reference only and may contain information or features that do not apply to your computer. Acer Group shall not be liable for technical or editorial errors or omissions contained in this manual. Register your Acer product 1. Ensure you are connected to the Internet. 2. Open the Acer Product Registration app. 3. Install any required updates. 4. Sign up for an Acer ID or sign in if you already have an Acer ID, it will automatically register your product. After we receive your product registration, you will be sent a confirmation email with important data. Model number: _________________________________ Serial number: _________________________________ Date of purchase: ______________________________ Place of purchase: ______________________________ Table of contents - 3 TABLE OF CONTENTS First things first 6 BIOS utility 39 Your guides ............................................. 6 Boot sequence....................................... 39 Basic care and tips for using your Setting passwords ................................. 39 computer.................................................. 6 Power management 40 Turning your computer off..........................
    [Show full text]
  • Powershell Core Ja Sitä Edeltävät Komentorivi- Pohjaiset Hallintatyökalut
    Ismail Belmostefa PowerShell Core ja sitä edeltävät komentorivi- pohjaiset hallintatyökalut Metropolia Ammattikorkeakoulu Insinööri (AMK) Tietotekniikan koulutusohjelma Insinöörityö 12.12.2016 Tiivistelmä Tekijä Ismail Belmostefa Otsikko PowerShell Core ja sitä edeltävät komentorivipohjaiset hallin- tatyökalut Sivumäärä 38 sivua + 2 liitettä Aika 12.12.2016 Tutkinto Insinööri (AMK) Koulutusohjelma Tietotekniikka Suuntautumisvaihtoehto Ohjelmistotekniikka Ohjaaja Kari Sundberg Ohjaajat Yliopettaja Markku Nuutinen Insinöörityön aiheena oli PowerShell Core ja sitä edeltävät komentorivipohjaiset hallinta- työkalut. Tavoite oli ymmärtää näiden asennusympäristö, alla käytetyt teknologiat ja niihin liittyvä terminologia. Tutkimustyö syntyi harjoittelutyön muistiinpanojen lopputuloksena sekä tutkimalla alan kirjallisuutta ja verkkomateriaalia. Insinöörityössä selvitettiin PowerShell Coren ja sitä edeltävien komentorivipohjaisten hal- lintatyökalujen alla käytetyt teknologiat, terminologia, käyttökohteet ja motivaatio niiden syntyyn. Koska komentorivipohjaiset hallintatyökalut on rakennettu asennusympäristön tar- joamien palveluiden päälle, palveluiden toiminnan hahmottaminen edesauttaa komentori- vin käyttöä ja soveltamista. Tutkimustyötä on hyödynnetty tietokoneen ylläpidossa, ohjel- moinnissa ja peruskäytössä. Tutkimustyö osoitti asennusympäristön kokonaiskuvan hallit- semisen tärkeyden komentorivipohjaisten työkalujen käytössä. Avainsanat DDE, OLE, COM, .NET, CMD.EXE, COMMAND.COM, WSH, MOM, PowerShell Abstract Author Ismail Belmostefa Title
    [Show full text]
  • Powerpanel Personal Edition User Manual
    PowerPanel Personal Edition User Manual User Manual PowerPanel® Personal Edition Rev. 9 2015/12/2 PowerPanel Personal Edition User Manual ELECTRONIC END USER LICENSE AGREEMENT FOR CYBERPOWER POWERPANEL PERSONAL EDITION NOTICE TO USER: THIS IS A CONTRACT. BY INSTALLING THIS SOFTWARE YOU ACCEPT ALL THE TERMS AND CONDITIONS OF THIS AGREEMENT. The End User License Agreement and copyright of CyberPower PowerPanel® Personal Edition product and related explanatory materials ("Software") are owned by Cyber Power Systems (USA), Inc. The term "Software" also shall include any upgrades, modified versions or updates of the Software licensed to you by Cyber Power Systems (USA), Inc. Please read this Agreement carefully. At the end, you will be asked to accept this agreement and continue to install or, if you do not wish to accept this Agreement, to decline this agreement, in which case you will not be able to use the Software. Upon your acceptance of this Agreement, The Cyber Power Systems (USA), Inc. grants to you a nonexclusive license to use the Software, provided that you agree to the following: 1. Use of the Software. You may install the Software on a hard disk or other storage device; install and use the Software on a file server for use on a network for the purposes of (i) permanent installation onto hard disks or other storage devices or (ii) use of the Software over such network; and make backup copies of the Software. You may make and distribute unlimited copies of the Software, including copies for commercial distribution, as long as each copy that you make and distribute contains this Agreement, the CyberPower PowerPanel® Personal Edition installer, and the same copyright and other proprietary notices pertaining to this Software that appear in the Software.
    [Show full text]
  • Automated Testing of Firmware Installation and Update Scenarios for Peripheral Devices
    DEGREE PROJECT IN COMPUTER SCIENCE AND ENGINEERING, SECOND CYCLE, 30 CREDITS STOCKHOLM, SWEDEN 2019 Automated testing of firmware installation and update scenarios for peripheral devices DAG REUTERSKIÖLD KTH ROYAL INSTITUTE OF TECHNOLOGY SCHOOL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE Automated testing of firmware installation and update scenarios for peripheral devices DAG REUTERSKIÖLD Master in Computer Science Date: August 12, 2019 Supervisor: Hamid Faragardi Examiner: Elena Troubitsyna School of Electrical Engineering and Computer Science Host company: Tobii AB Swedish title: Automatisering av enhetsinstallation, uppdatering och testning med hjälp av virtuella maskiner iii Abstract This research presents an approach to transition from manual to automated testing of hardware specific firmware. The manual approach for firmware test- ing can be repetitive and time consuming. A significant proportion of the time is spent on cleaning and re-installing operating systems so that old firmware does not interfere with the newer firmware that is being tested. The approach in this research utilizes virtual machines and presents an automation framework. One component of the automation framework is an application to imitate con- nected peripheral devices to bypass hardware dependencies of firmware in- stallers. The framework also consists of automation and pipeline scripts with the objective to execute firmware installers and detect errors and abnormalities in the installation and updating processes. The framework can run on locally hosted virtual machines, but is most applicable using cloud hosted virtual ma- chines, where it is part of a continuous integration that builds, downloads, installs, updates and tests new firmware versions, in a completely automated manner. The framework is evaluated by measuring and comparing execution times with manually conducted installation and updating tests, and the result shows that the framework complete tests much faster than the manual approach.
    [Show full text]
  • Open WATCOM Programmer's Guide
    this document downloaded from... Use of this document the wings of subject to the terms and conditions as flight in an age stated on the website. of adventure for more downloads visit our other sites Positive Infinity and vulcanhammer.net chet-aero.com Watcom FORTRAN 77 Programmer's Guide Version 1.8 Notice of Copyright Copyright 2002-2008 the Open Watcom Contributors. Portions Copyright 1984-2002 Sybase, Inc. and its subsidiaries. All rights reserved. Any part of this publication may be reproduced, transmitted, or translated in any form or by any means, electronic, mechanical, manual, optical, or otherwise, without the prior written permission of anyone. For more information please visit http://www.openwatcom.org/ Portions of this manual are reprinted with permission from Tenberry Software, Inc. ii Preface The Watcom FORTRAN 77 Programmer's Guide includes the following major components: · DOS Programming Guide · The DOS/4GW DOS Extender · Windows 3.x Programming Guide · Windows NT Programming Guide · OS/2 Programming Guide · Novell NLM Programming Guide · Mixed Language Programming · Common Problems Acknowledgements This book was produced with the Watcom GML electronic publishing system, a software tool developed by WATCOM. In this system, writers use an ASCII text editor to create source files containing text annotated with tags. These tags label the structural elements of the document, such as chapters, sections, paragraphs, and lists. The Watcom GML software, which runs on a variety of operating systems, interprets the tags to format the text into a form such as you see here. Writers can produce output for a variety of printers, including laser printers, using separately specified layout directives for such things as font selection, column width and height, number of columns, etc.
    [Show full text]
  • Oracle® VM Paravirtual Drivers Installation Guide for Microsoft Windows for Release 3.1.1 E27311-02 May 2012
    Oracle® VM Paravirtual Drivers Installation Guide for Microsoft Windows for Release 3.1.1 E27311-02 May 2012 Copyright © 2011, 2012, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error- free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S.
    [Show full text]
  • Vmware Horizon 7 7.13 Setting up Published Desktops and Applications in Horizon Console
    Setting Up Published Desktops and Applications in Horizon Console OCT 2020 VMware Horizon 7 7.13 Setting Up Published Desktops and Applications in Horizon Console You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2018-2020 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents 1 Setting Up Published Desktops and Applications in Horizon Console 6 2 Introduction to Published Desktops and Applications 7 Farms, RDS Hosts, and Published Desktops and Applications 7 Advantages of Published Desktop Pools 8 Advantages of Application Pools 8 3 Setting Up Remote Desktop Services Hosts 10 Remote Desktop Services Hosts 10 Prepare Windows Server Operating Systems for Remote Desktop Services (RDS) Host Use 12 Install Remote Desktop Services on Windows Server 2008 R2 14 Install Remote Desktop Services on Windows Server 2012, 2012 R2, 2016, or 2019 15 Install Desktop Experience on Windows Server 2008 R2 16 Install Desktop Experience on Windows Server 2012, 2012 R2, 2016, or 2019 16 Restrict Users to a Single Session 17 Install Horizon Agent on a Remote Desktop Services Host 18 Horizon Agent Custom Setup Options for an RDS Host 19 Modify Installed Components with the Horizon Agent Installer 22 Silent Installation Properties for Horizon Agent 23 Printing From a Remote Application Launched Inside a Nested Session 28 Enable Time Zone Redirection for Published Desktop and Application
    [Show full text]
  • Microsoft Windows FIPS 140 Validation Security Policy Document
    Windows Resume Security Policy Document Microsoft Windows FIPS 140 Validation Microsoft Windows 10 (Creators Update, Fall Creators Update) Non-Proprietary Security Policy Document Document Information Version Number 1.03 Updated On May 24, 2018 © 2018 Microsoft. All Rights Reserved Page 1 of 20 This Security Policy is non-proprietary and may be reproduced only in its original entirety (without revision). Windows Resume Security Policy Document The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. This work is licensed under the Creative Commons Attribution-NoDerivs- NonCommercial License (which allows redistribution of the work). To view a copy of this license, visit http://creativecommons.org/licenses/by-nd-nc/1.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. © 2018 Microsoft Corporation.
    [Show full text]
  • Virtual MBX Driver Help
    Virtual MBX Driver Help Virtual MBX Driver for Modbus, Modbus Plus and Modbus TCP Networks Version 9 Virtual MBX Driver Help VIRTUAL MBX DRIVER HELP Virtual MBX® Driver for Modbus, Modbus Plus and Modbus TCP Networks Version 9 Copyright © 1994-2017, Cyberlogic® Technologies Inc. All rights reserved. This document and its contents are protected by all applicable copyright, trademark and patent laws and international treaties. No part of this document may be copied, reproduced, stored in a retrieval system or transmitted by any means, electronic, mechanical, photocopying, recording or otherwise, without the express written permission of Cyberlogic Technologies Inc. This document is subject to change without notice, and does not necessarily reflect all aspects of the mentioned products or services, their performance or applications. Cyberlogic Technologies Inc. is not responsible for any errors or omissions in this presentation. Cyberlogic Technologies Inc. makes no express or implied warranties or representations with respect to the contents of this document. No copyright, trademark or patent liability or other liability for any damages is assumed by Cyberlogic Technologies Inc. with respect to the use of the information contained herein by any other party. Cyberlogic®, DHX®, MBX®, WinConX® and Intelligent • Powerful • Reliable® are registered trademarks and DirectAccess™, OPC Crosslink™, OPC Datacenter™, DevNet™ and C-logic™ are trademarks of Cyberlogic Technologies Inc. All other trademarks and registered trademarks belong to their respective
    [Show full text]
  • L38 Ñ Windows XP
    History History (cont.) (Timeline from www.cgonline.com) 10/81 — IBM PC (“Personal Computer”) 10/88 — OS/2 1.1 (Windows-like GUI, end and PC-DOS 1.0 of collaboration when IBM gets upset with Microsoft for improving Windows) 3/83 — Microsoft MS-DOS 2.0 (hard disk, file system) 5/90 — Windows 3.0 (big success!) 11/83 — Windows announced (vaporware!) 4/92 — Windows 3.1 (bug fixes etc.) 11/84 — MS-DOS 3.1 10/92 — Windows for Workgroups 3.1 (adds networking, but fails in market) 11/85 — Windows 1.0 (tiled windows, doesn’t do well in market) 5/93 — Windows NT 3.1 (visually like Windows 3.1, but stable 32-bit platform) 4/87 — IBM & Microsoft OS/2 1.0 (next generation, DOS-like command lines) 11/93 — Windows for Workgroups 3.11 (precursor to Windows 95) 12/87 — Windows/386 (uses 80386’s virtual memory to allow safe “preemptive” 5/94 — MS-DOS 6.22 (DOS final version) multitasking) 9/94 — Windows NT 3.5 6/95 — Windows NT 3.51 (faster) 1 Fall 2002, Lecture 38 2 Fall 2002, Lecture 38 History (cont.) What is Windows XP? 8/95 — Windows 95 (originally Windows I 32/64 -bit preemptive multitasking 4.0) (long file names, plug and play operating system for AMD K6/7, Intel hardware, taskbar and Start menu, IA32/64 and later microprocessors HUGE success in market!) ● Replaces Windows 95/98/Me as well as Windows NT/200 7/96 — Windows NT 4.0 (Windows 95 GUI, first successful version of NT) I Key goals 6/98 — Windows 98 (Windows 95 + ● security, reliability, ease of use Internet Explorer 4.0, success in market) ● Windows and POSIX compliance ● high performance, extensibility 2/00 — Windows 2000 (Windows NT 4.0 + plug and play, DirectX, USB, etc.) ● portability, international support 9/00 — Windows Me (Millennium Edition) I Various versions: XP Personal, XP (Windows 98 + IE 5.0, media support, Professional, XP Server last version in Windows 9x line) I Uses a micro-kernel architecture 9/01 — Windows XP (combines Windows ● Subsystems to provide OS personalities 2000 and ME, but based on NT/2000) for Win32, POSIX, etc.
    [Show full text]
  • Power Management User Guide © Copyright 2007 Hewlett-Packard Development Company, L.P
    Power Management User Guide © Copyright 2007 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. First Edition: July 2007 Document Part Number: 448445-001 Product notice This user guide describes features that are common to most models. Some features may not be available on your computer. iii iv Product notice Table of contents 1 Power control and light locations 2 Shutting down the computer 3 Setting power options Using power-saving states ................................................................................................................... 4 Initiating and exiting Sleep ................................................................................................... 4 Initiating and exiting Hibernation .......................................................................................... 5 Using the battery meter ........................................................................................................................ 6 Using power plans ................................................................................................................................ 7 Viewing the current
    [Show full text]