HP Reverses Course on Openvms 3 | Six Wrong Reasons to Hire a Consultant 40

Total Page:16

File Type:pdf, Size:1020Kb

HP Reverses Course on Openvms 3 | Six Wrong Reasons to Hire a Consultant 40 HPOU REVERSES C RSE ON OPENVMS 3 | SIX WRONG REASONS TO HIRE A CONSULTANT 40 ® September 2014 How Analytics Empowers Business: Our 20 honorees are mining data to identify sales opportunities, deliver vital services and more accurately predict costs. 8 VOL. 1, NO. 2 For breaking news, visit computerworld.com / View our magazine archives at computerworld.com/magindex COMPUTERWORLD Table of Contents P.O. Box 9171, 492 Old Connecticut Path, Framingham, MA 01701-9171 | (508) 879-0700 The 20 winners of Computerworld’s » EDITORIAL Gregg Keizer, Lucas Mearian, 2014 Data+ Editors’ Choice Patrick Thibodeau, Jaikumar Vijayan Editor in Chief Awards are reaping business Scot Finnie Editorial Project Manager benefits from big data.COVER AGE Mari Keefe Executive Editors BEGINS ON PAGE 8 Ellen Fanning (features and design) Senior Associate Editor Julia King (events) Rebecca Linke WINNERs | 9 AstraZeneca | 10 BlueCross Managing Editors Office Manager Johanna Ambrosio (technologies) Linda Gorgone BlueShield of Tennessee | 11 Cisco | 12 Colorado Sharon Machlis (online) Contributing Editors DHSEM | 14 CGIAR | 15 Emory University Ken Mingis (news) Jamie Eckle, Preston Gralla, JR Raphael Bob Rawson (production) | 17 HealthTrust | 18 Idaho National Laboratory | » CONTacTS 20 Intel | 22 Keller Williams Realty | 24 Kennesaw Assistant Managing Editor Valerie Potter (features) Phone numbers, email addresses and State University | 26 Kisters | 27 LA Clear reporters’ beats are available online at | 28 Merck | 29 Persistent Systems | 31 Point Art Director Computerworld.com (see the Contacts April Montgomery link at the bottom of the home page). Defiance Zoo and Aquarium | 33 Shine Technologies Senior Reviews Editor Letters to the Editor | 35 SwiftIQ | 36 Texas Children’s Hospital | Barbara Krasnoff Send to [email protected]. 37 Thomson Reuters Features Editor Include an address and phone number Tracy Mayor for immediate verification. Letters will be edited for brevity and clarity. News Editors Mike Bucken, Marian Prokop News tips NEWS ANALYSIS 3 Hewlett-Packard throws a lifeline to OpenVMS [email protected] users. | OPINIONS 6 Paul Glen says you should blame yourself National Correspondents Julia King, Robert L. Mitchell Tech newsletters when your boss overloads you. | 40 Bart Perkins lists six wrong Sign up now for top stories, Reporters breaking news and more at: reasons to hire a consultant. | DEPARTMENTS 38 Shark Tank Sharon Gaudin, Matt Hamblen, www.computerworld.com/s/newsletters MORE ON COMPUTERWORLD.COM Copyright © 2014 Computerworld Inc. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission Security Manager’s Journal: Ransomware flops, thanks to security awareness of Computerworld Inc. is prohibited. Computerworld and Computerworld.com and the respective logos are trademarks of International Data Group Inc. SEPTEMBER 2014 | COMPUTERWORLD 2 NEWS ANALYSIS OPERATING SYSTEMS Itanium chips and is promising eventual support for x86 proc- essors. In June 2013, HP announced that it would not validate the operating system to its latest hardware or produce new ver- sions of it. The move to license the OpenVMS source code to a new entity, VMS Software Inc. (VSI), amounts to a reversal of that decision. “HP and VSI have provided what appears to be a path for- ward for existing VMS sites,” said Stephen Hoffman, who was on the OpenVMS engineer- ing team at Digital Equipment Corp., where the system was de- veloped, and then at Compaq, YEAR AFTER putting which acquired Digital and was OpenVMS on a later acquired by HP. HP Reverses Course, path to extinction, Hoffman is now an indepen- Hewlett-Pacakard dent consultant at HoffmanLabs. Gives OpenVMS New Life Areversed course and licensed Many OpenVMS users just A year after saying it planned to end support for OpenVMS, the venerable operating system want to be able to stay on the Hewlett-Packard licenses the esteemed operating system to a new company that plans operating system. HP stirred to a startup. BY PATRICK THIBODEAU to develop ports to the latest up a slew of complaints among THINKSTOCK SEPTEMBER 2014 | COMPUTERWORLD 3 NEWS ANALYSIS OPERATING SYSTEMS OpenVMS users when it said it a longtime OpenVMS support ary,” Harris said, citing Open- would not validate OpenVMS and maintenance firm. VMS’s disaster recovery, security beyond Integrity i2 services In a road map, VSI outlined and clustering capabilities. running Tukwila quad-core plans to validate the operating OpenVMS is largely invis- processors. That decision effec- system on Intel’s Itanium eight- ible in a world dominated by tively put the operating system core Poulson chips by early Windows, Linux, cloud-based on an end-of-life path. 2015. The company also said it systems, and even Unix systems The latest announcement would support OpenVMS on such as HP-UX, AIX and So- came just days after an Open- HP hardware running the up- laris. But it runs critical systems VMS user group in France posted coming Kittson chip and that it and its users consistently praise will develop an x86 port — al- it for its reliability, engineering though it didn’t specify a time and capabilities. HP and VSI have provided what frame for the latter initiative. HP has about 2,500 Open- appears to be a path forward VSI also plans to develop new VMS customers on support for existing VMS sites. versions of OpenVMS. contracts. That does not in- STEPHEN HOFFMAN, CONSULTANT, HOFFMANLABS clude OpenVMS users who use Legendary Strengths independent support vendors, VSI CEO Duane Harris said such the Parsec Group, which an “open letter” to Hewlett-Pack- his company approached HP has 350 OpenVMS customers ard CEO Meg Whitman urging about OpenVMS because of running some 7,000 systems. her to reconsider the decision to the operating system’s strong VSI hopes to expand the pull support for OpenVMS. The customer base. OpenVMS is OpenVMS market and sell the letter described the role of Open- used in nuclear power plants, software to new customers. It VMS in running transportation in process control systems in all intends to modernize the op- systems, health services and industries, by the U.S. Navy and erating system’s application nuclear power plants in France. in transportation and finance. development tools and improve VSI is funded by the inves- “It’s a marquee piece of soft- its capabilities — including the tors of Nemonix Engineering, ware; its strengths are legend- number of cores it can support. SEPTEMBER 2014 | COMPUTERWORLD 4 NEWS ANALYSIS OPERATING SYSTEMS software, beginning early next BETWEEN THE LINES | JOHN KLOSSNER year with a port to HP Integrity OpenVMS i4 systems running the eight- is the most core Poulson chip. Previously, secure HP said it would not validate operating OpenVMS beyond its Integrity system out i2 servers running the Tukwila there. quad-core processor. DUANE HARRIS, CEO, VSI “There is obviously a need to build a track record,” Hoffman said of the new company, noting Harris believes OpenVMS’s that OpenVMS customers “are security features and fault toler- classically conservative” and ance will be strong points. will want to see and touch the “We feel very strongly that software that VSI delivers before OpenVMS is the most secure they run it in their production operating system out there, environments. “That would not and certainly more secure than be particularly different from a Windows and certainly more new HP release,” he added. secure than Linux,” said Harris. Noting that moving an Open- VMS application to another having an impact. On the Veteran Developers platform is costly and time-con- comp.os.vms Google Groups VSI said it has assembled a team suming, Hoffman said VSI “has discussion forum, one person of veteran OpenVMS develop- the potential to throw custom- wrote that “two OpenVMS exit ers, some from the core DEC ers a lifeline . and the custom- projects here at work (a con- team that developed the operat- ers are definitely interested.” version to Linux and another ing system back in the 1970s. The change in the road map to SAP) have been put on hold VSI plans to deliver new for OpenVMS may already be indefinitely.”u SEPTEMBER 2014 | COMPUTERWORLD 5 PAUL GLEN OPINION PAUL GLEN is the co-author of The Geek Leader’s Handbook and a principal of Leading Geeks, an education and consulting firm devoted to clarifying the murky world of human emotion for people who gravitate toward concrete thinking. You can contact him at [email protected]. When Your Boss Overloads You, Blame Yourself AT WORK, DO YOU EVER FEEL the projects will ever end. time in productive work. like one of those circus per- You’re caught up in what’s And when this happens, formers spinning plates on the commonly known as thrashing, most of us curse our bosses for top of poles? With a dozen dif- spending a disproportionate giving us too much to do. We ferent projects going at once, amount of your time switching blame them for our stress and you spend your time frantically between projects. Every time lack of productivity. running from one to another, you set one aside and pick up But you shouldn’t blame your attending to each just enough to another, it takes mental and boss for this. It’s as much your keep them all spinning. You’re emotional energy to stop one fault as it is hers. exhausted from the relentless train of thought and remind A boss’s job is to get as much pace but know that the best yourself where you left off on done as possible with the re- you’re going to do is avoid the the other. When you do this too sources available. Many manag- crashing disaster of letting them often, you spend most of your ers interpret that as meaning drop. And it feels like none of time switching and little of your they have to heap as much work SEPTEMBER 2014 | COMPUTERWORLD 6 PAUL GLEN OPINION as possible on the people they cerned that the next thing your Either way, you’re not being supervise.
Recommended publications
  • The Community Is the Infrastructure: a Short Discussion of the Petsc Community
    The Community is the Infrastructure: A Short Discussion of the PETSc Community Mark Adams1, Jed Brown2, Satish Balay3, Victor Eijkhout4, Jacob Faibussowitsch5, Fande Kong6, Matthew Knepley7, Scott Kruger8, Oana Marin3, Richard Tran Mills3, Todd Munson3, Patrick Sanan9, Barry F. Smith10, Hong Zhang11, Hong Zhang3, and Junchao Zhang3 1Lawrence Berkeley National Laboratory 2University of Colorado at Boulder 3Argonne National Laboratory 4The University of Texas at Austin 5University of Illinois at Urbana-Champaign 6Idaho National Laboratory 7University of New York at Buffalo 8Tech-X Corporation 9ETH Zurich 10Argonne Associate, Argonne National Laboratory 11Illinois Institute of Technology July 5, 2021 Abstract Hard and soft infrastructure work in tandem to accomplish a particular enterprise. Soft infras- tructure { the formal and informal culture, institutions, standards, practices, and procedures that support an enterprise { is often more important to human endeavors than hard infrastructure. For example, a highway system's hard infrastructure (e.g., the roads) could not satisfy its enterprise { effective transportation | without the corresponding soft infrastructure of regulations, policing, driver habits, maintenance crews, and so forth. The relative cost and importance of the different aspects of infrastructure evolves, particularly during the development stages, from planning, to construction, to commissioning, operation, maintenance, and upgrading. The design, development, support, and dissemination of computer software is an archetypal example of soft infrastructure, regularly being the tail that wags the dog of computer hardware (prototypical hard infrastructure). Quantifying soft infrastructure is more difficult than hard in- frastructure. Thus, it is often ignored or under-emphasized when analyzing or proposing changes to human-developed systems. In particular, government understanding and funding of scientific soft infrastructure lags well behind that of hard infrastructure (for example, experimental devices such as accelerators).
    [Show full text]
  • Chapter 4 Editors and Debugging Systems
    Chapter 4 Editors and Debugging Systems This Chapter gives you… Text editors Interactive Debugging Systems 4.0 Introduction An Interactive text editor has become an important part of almost any computing environment. Text editor acts as a primary interface to the computer for all type of “knowledge workers” as they compose, organize, study, and manipulate computer-based information. An interactive debugging system provides programmers with facilities that aid in testing and debugging of programs. Many such systems are available during these days. Our discussion is broad in scope, giving the overview of interactive debugging systems – not specific to any particular existing system. 4.1 Text Editors An Interactive text editor has become an important part of almost any computing environment. Text editor acts as a primary interface to the computer for all type of “knowledge workers” as they compose, organize, study, and manipulate computer-based information. A text editor allows you to edit a text file (create, modify etc…). For example the Interactive text editors on Windows OS - Notepad, WordPad, Microsoft Word, and text editors on UNIX OS - vi, emacs, jed, pico. Normally, the common editing features associated with text editors are, Moving the cursor, Deleting, Replacing, Pasting, Searching, Searching and replacing, Saving and loading, and, Miscellaneous(e.g. quitting). 4.1.1 Overview of the editing process An interactive editor is a computer program that allows a user to create and revise a target document. Document includes objects such as computer diagrams, text, equations tables, diagrams, line art, and photographs. Here we restrict to text editors, where character strings are the primary elements of the target text.
    [Show full text]
  • Co-Ordination of the Nuclear Reaction Data Centers
    XA9743324 Internotional Atomic Energy Agency INDC(NDS)-360 Distr. G,NC I N DC INTERNATIONAL NUCLEAR DATA COMMITTEE Co-ordination of the Nuclear Reaction Data Centers Report on an IAEA Advisory Group Meeting hosted by the U.S. National Nuclear Data Center on behalf of the U.S. Government Brookhaven, 3-7 June 1996 Edited by O. Schwerer and H.D. Lemmel November 1996 IAEA NUCLEAR DATA SECTION, WAGRAMERSTRASSE 5, A-1400 VIENNA Printed by the IAEA in Austria November 1996 INDC(NDS)-360 Distr. G,NC Co-ordination of the Nuclear Reaction Data Centers Report on an IAEA Advisory Group Meeting hosted by the U.S. National Nuclear Data Center on behalf of the U.S. Government Brookhaven, 3-7 June 1996 Abstract: This report summarizes the 1996 co-ordination meeting in Brookhaven, U.S.A., of the national and regional nuclear reaction data centers, convened by the IAEA at regular intervals. The main topics are - the international exchange of nuclear reaction data by means of the "EXFOR" system, and the further development of this system, the "CINDA" system as an international index and bibliography to neutron reaction data, the sharing of the workload for speedy and reliable nuclear data compilation and data center services, the exchange and documentation of evaluated data libraries in "ENDF" format, the rapid advances of online electronic information technologies, with the goal of rendering data center services to data users in IAEA Member States by means of computer retrievals, online services and printed materials. The scope of data covers microscopic cross-sections and related parameters of nuclear reactions induced by neutrons, charged-particles and photons.
    [Show full text]
  • SAS on Unix/Linux- from the Terminal to GUI
    SAS on Unix/Linux- from the terminal to GUI. L Gakava & S Kannan – October 2015 Agenda All about the terminal o Customising your terminal o Basic Linux terminal commands o Running SAS in non-interactive mode o Available SAS file editors o What to look out for on Unix/Linux platform All about Graphical User Interface (GUI) o Launching SAS GUI. o Changing SAS default behaviour o SAS ToolBox commands o SAS editor commands. Motivation - Why Use SAS On Unix/Linux? Using SAS on UNIX/Linux Platform o Company migrating to UNIX/Linux o Joining a company which is using SAS on the Linux platform Challenge Too many commands to learn! Why Use SAS On Unix/Linux o Customising Linux sessions will ensure you increase work efficiency by taking advantage of the imbedded Linux tools. In general transferring and running large files will be quicker in Linux compared to PC*. Terminal What to expect when you login? % pwd /home/username % ls Customise: Update .bashrc file with this line PS1='$IV $PWD$EE> ' will change your prompt to show the following: /home/username> Terminal Navigation Command Meaning ls list files and directories ls -a list all files and directories mkdir make a directory cd directory change to named directory cd change to home-directory cd ~ change to home-directory cd .. change to parent directory Terminal Navigation Command Meaning cp file1 file2 copy file1 and call it file2 mv file1 file2 move or rename file1 to file2 rm file remove a file rmdir directory remove a directory cat file display a file less file display a file a page at a time head file display the first few lines of a file tail file display the last few lines of a file grep 'keyword' file search a file for keywords count number of lines/words/ wc file characters in file Terminal useful commands How do you find out if a version of a file has changed? /home/username>diff file1.txt file2.txt Command to compare two files.
    [Show full text]
  • The Jed Editor
    The jed Editor Contents 1 Introduction 3 2StartingJED 3 3 Emulating Other Editors 4 3.1EmacsEmulation................................................. 4 3.2EDTEmulation.................................................. 4 3.3WordstarEmulation................................................ 4 4 Backup and Auto-save Files 4 5 Status line and Windows 5 6 Mini-Buffer 5 6.1CommandLineCompletion........................................... 5 6.2FileNames.................................................... 6 6.3BufferNameandFileNameCompletion..................................... 6 7 Basic Editing 7 7.1Undo....................................................... 8 7.2MarkingText(PointandMark).......................................... 8 7.3TabIssues...................................................... 8 7.4Searching..................................................... 9 7.5Rectangles..................................................... 9 7.6Sorting....................................................... 9 The JED Editor 2 8Modes 10 8.1WrapMode.................................................... 10 Formatting paragraphs . ............................................ 10 8.2SmartQuotes................................................... 11 8.3CMode...................................................... 11 8.4FortranMode................................................... 11 9 Keyboard Macros 11 10 Shells and Shell Commands 12 11 Getting Help 12 12 Editing Binary Files 12 13 Dired— the Directory editor 13 14 Customization 13 14.1 Setting Keys . ..................................................
    [Show full text]
  • Jed Software Download
    Jed software download click here to download XE Plus Pack. XE Plus Pack is now FREE! License Key Information (Blog Post). Delphi XE, Download Trial. XE2+ Plus Pack. Trial version of XE2+ Plus Pack. XE Plus Pack - Release New version available for Delphi (Berlin) and (Tokyo). + Fixes issue if user has downloaded the Ribbon controls from GetIt . Download the software archive file, jedzip (a local copy is provided here) to your PC. Unzip the file. In most cases, you can simply double-click on the file. JED - Japanese Dictionary - The development of this app has been on hold for a we recommend that you scan the downloaded software with your antivirus. Part Number: www.doorway.ru JEDEC files for the repeater design in figure of Appendix C in Revision D of the FTTA Free Topology. Software. Last Update: 17 Sep Part Number: www.doorway.ru FTTA Free Topology Transceiver User's Guide This download is unsupported by Echelon. JetAudio is integrated multimedia software made up of a single compact rack. Not only does it play various music and video files, it also has. CBRIEF for JED JED (www.doorway.ru) is a text editor by John E. Davis. The jedstate program is some sort of extended mind for John E. Davis' splendid. The development of this app has been on hold for a while, if JED is not working for you, please try an alternative: IMI - Japanese Dictionary Aedict WWWJDIC for . The process of installing Sellacious via JED is same as installing any other Click on Download & Install Now button to install the Sellacious additional libraries.
    [Show full text]
  • From DOS/Windows to Linux HOWTO from DOS/Windows to Linux HOWTO
    From DOS/Windows to Linux HOWTO From DOS/Windows to Linux HOWTO Table of Contents From DOS/Windows to Linux HOWTO ........................................................................................................1 By Guido Gonzato, ggonza at tin.it.........................................................................................................1 1.Introduction...........................................................................................................................................1 2.For the Impatient...................................................................................................................................1 3.Meet bash..............................................................................................................................................1 4.Files and Programs................................................................................................................................1 5.Using Directories .................................................................................................................................2 6.Floppies, Hard Disks, and the Like ......................................................................................................2 7.What About Windows?.........................................................................................................................2 8.Tailoring the System.............................................................................................................................2 9.Networking:
    [Show full text]
  • WHITE PAPER HP Integrity Server Blades
    WHITE PAPER HP Integrity Server Blades: Meeting Mission-Critical Requirements with a Bladed Form Factor Sponsored by: HP Jean S. Bozman Jed Scaramella June 2010 EXECUTIVE SUMMARY Blades are the fastest-growing segment within the worldwide server market, and their compute density continues to grow. The increase in computing power on multicore processors, combined with virtualization software, is allowing IT managers to assign more mission-critical workloads to blade server systems. As enterprises work to break down information "silos" within the datacenter, and to improve IT flexibility, more mission-critical workloads are becoming concentrated on blades. Therefore, blades supporting such workloads would benefit from having as many reliability, availability, and serviceability (RAS) features as possible because avoiding system downtime due to data errors and memory corruption is essential to ensuring uninterrupted access to key business applications. Initially, blades were introduced within the enterprise datacenter because they provided a new way to deploy workloads onto IT infrastructure. The ability to add blades on an as-needed basis brought greater flexibility to IT infrastructure, and the ability to manage many blades within one chassis brought operational benefits. Now, customers deploying blades in their datacenter want to be able to mix blades that run different workloads and different operating systems. The ability to host multiple operating systems "under one roof" and the ability to manage the blades together are factors with the potential to reduce operational costs associated with IT staffing. As datacenters work to bring a broader range of workloads onto a bladed server infrastructure, the ability to support mission-critical workloads with hardware specifically designed for business resilience will take a higher priority for blade server installations.
    [Show full text]
  • Putty User Manual
    PuTTY User Manual PuTTY is a free (MIT-licensed) Windows Telnet and SSH client. This manual documents PuTTY, and its companion utilities PSCP, PSFTP, Plink, Pageant and PuTTYgen. Note to Unix users: this manual currently primarily documents the Windows versions of the PuTTY utilities. Some options are therefore mentioned that are absent from the Unix version; the Unix version has features not described here; and the pterm and command-line puttygen utilities are not described at all. The only Unix-specific documentation that currently exists is the man pages. This manual is copyright 1997-2017 Simon Tatham. All rights reserved. You may distribute this documentation under the MIT licence. See appendix C for the licence text in full. Chapter 1: Introduction to PuTTY 1.1 What are SSH, Telnet and Rlogin? 1.2 How do SSH, Telnet and Rlogin differ? Chapter 2: Getting started with PuTTY 2.1 Starting a session 2.2 Verifying the host key (SSH only) 2.3 Logging in 2.4 After logging in 2.5 Logging out Chapter 3: Using PuTTY 3.1 During your session 3.2 Creating a log file of your session 3.3 Altering your character set configuration 3.4 Using X11 forwarding in SSH 3.5 Using port forwarding in SSH 3.6 Making raw TCP connections 3.7 Connecting to a local serial line 3.8 The PuTTY command line Chapter 4: Configuring PuTTY 4.1 The Session panel 4.2 The Logging panel 4.3 The Terminal panel 4.4 The Keyboard panel 4.5 The Bell panel 4.6 The Features panel 4.7 The Window panel 4.8 The Appearance panel 4.9 The Behaviour panel 4.10 The Translation panel 4.11
    [Show full text]
  • Fall 2021 Jed Crandall Welcome to CSE 365!
    CSE 365 Intro Fall 2021 Jed Crandall Welcome to CSE 365! ● I hope you find it to be a fun class ● You don’t need to know anything that wasn’t in the official prereqs – You’ll be able to pick up Python, C, etc. as we go – Same goes for the Linux command line ● This is an introductory course ● Not really a difficult course… – ...but it is a 300-level CSE course, no bite-sized chunks – It’s like riding a bike, just start pedaling at the beginning and keep pedaling ● If something is not clear… – Read the instructions and source code, Google things, man pages – Ask a question in Piazza A little bit about me... ● Research area is Internet freedom, broadly speaking – Mostly, right now that means VPN security and education – In the past I’ve done some Internet censorship measurement and tracking, and hope to do more in the future ● Part of the Biodesign Center for Biocomputation, Security, and Society, academic appointment is in SCAI Syllabus in a nutshell ● Course website and Piazza ● Grade is based on three homework sets ● Use Linux and a repo ● Breakout sessions ● Cheating ● Security token ● Title IX Why study cybersecurity? ● Obvious answers – It’s required – Jobs – National security ● Less obvious answers – It’s shaping world events – You could be part of that Some thought experiments ● You're a reporter, activist, lawyer, academic, programmer, medical professional, someone who posts on social media, etc. ● You… – Send a message to a friend – Post something in a group chat – Cross a border – Open an email from your friend ● For each of these four things: – What kind of information controls might apply? – What does it have to do with things we’ll cover this semester? 1.
    [Show full text]
  • Working with Editors
    CH02.fm Page 17 Monday, October 7, 2002 8:09 PM C HAPTER 2 Working With Editors ne of the most fundamental tools required for application develop- Oment on any platform is a text editor; and the Linux operating sys- tem offers programmers a wide variety to choose from. These editors offer a wide variety of functionality from simple editing features to syntax highlighting and reading e-mail. In this chapter, we will focus on a couple of editors that offer features that will be of interest to developers, Jed, vim, and Emacs. All of these editors offer extended features beyond simple text editing. 2.1 What to Look for in an Editor While editors like pico or even ed may be useful for editing system files or writing quick notes, programming editors have certain functions that permit the programmer to focus on the act of creating code and helps to manage the process and keep an eye on syntax. 2.1.1 Extensibility One useful feature of programming editors is the ability to extend the out-of-the-box func- tionality with custom programming. Emacs utilizes a full-featured Lisp language called Elisp to provide users with the ability to add just about any functionality they might require to the editor. The original Lisp language was written in the late 1950s as part of MIT’s research into artificial intelligence. Elisp is derived from the original Lisp and provides surprising flexibility in extending Emacs for those who take the time to learn it. 17 CH02.fm Page 18 Monday, October 7, 2002 8:09 PM 18 Chapter 2 • Working With Editors Jed extensibility is based on the s-lang libraries (www.s-lang.org) that were developed by John E.
    [Show full text]
  • Latex4jed: an Enhanced L ATEX Mode For
    LATEX4Jed: an enhanced LATEX mode for Jed Version 1.4.4 Guido ‘goccia’ Gonzato, Ph.D. guido,dot,gonzato,at,univr,dot,it Universit`adi Verona (Italy) Facolt`adi Scienze MM. FF. NN. February 20, 2004 Abstract The Jed editor supports several programming languages and text formats, including LATEX. However, the author of this document feels that the default library file latex.sl is too simple, and that it could be improved in many ways. This document describes an enhanced latex.sl, which aims at making the process of writing LATEX documents an easy and pleasant task. Inspired by Emacs’ AUC-TEX, the new latex.sl provides the user with menus, templates, many utilities, and integrated conversion and previewing of LATEX documents. Contents 1 Introduction 2 2 Installing LATEX4Jed 3 2.1 As Superuser ............................... 3 2.2 As Normal User .............................. 4 2.3 Note for Windows Users ......................... 4 2.4 Caveat ................................... 5 2.5 Colours .................................. 5 2.6 Customisation ............................... 5 3 Editing LATEX Documents 7 3.1 Main Features of LATEX4Jed ....................... 7 3.2 Getting Started .............................. 9 3.3 Directory Independence ......................... 9 3.4 Editing Compressed Files ........................ 9 1 3.5 LATEX Info Help .............................. 9 3.6 Symbol Completion ............................ 10 3.7 Indentation ................................ 10 3.8 Environments ............................... 10 3.8.1 Using
    [Show full text]