Universal Serial Bus HID Usage Tables

Total Page:16

File Type:pdf, Size:1020Kb

Universal Serial Bus HID Usage Tables Universal Serial Bus (USB) HID Usage Tables 10/28/2004 Version 1.12 Please send comments via electronic mail to: [email protected] ©1996-2004 USB Implementers’ Forum—All rights reserved. ii Universal Serial Bus HID Usage Tables Contributors Brian M. Bates – ELO Touchsystems Robert Dezmelyk – LCS/Telegraphics Robert Ingman – Microsoft Corporation Rob Lieb – Symbol Technologies, Inc. Steve McGowan – Intel (Editor) Kenneth Ray – Microsoft Corporation Steve Schumacher – LCS/Telegraphics Nathan C. Sherman - Microsoft Corporation Don Stern – TV Interactive Mike Van Flandern – Microsoft Corporation Remy Zimmerman – Logitech International And many others. Version 1.12 October 28, 2004 Universal Serial Bus HID Usage Tables iii Revision History Revision Issue Date Comments 1.12rc1 October 28, 2004 Incorporate HUT Review Request 20, 21, 22, 23, 24, 25, 27, and 29. 1.11 June 27, 2001 Version 1.11 release 1.11rc1 August 7, 2000 Incorporate HUT Review Request 1, 2, 3, 4, 5, 6, 7, 8, 9, 11, 13, 14, 15,16, 17, and 18. 1.1 April 8, 1999 Version 1.1 release 1.1rc3 February 16, 1999 Correct barcode Usage Page ID. Corrected page numbering. 1.1rc2 January 21, 1999 Incorporate HID Review Request 51. 1.1rc1 October 13,1998 Incorporate Keyboard Usage Table from the 1.0 HID Specification and HID Review Requests 16, 34, 38, 40, 41, 42, 43, 45, 46, 48 and 49. 1.0 October 30, 1997 Version 1 Version 1.12 October 21, 2004 iv Universal Serial Bus HID Usage Tables Copyright © 1996-2004, USB Implementers Forum All rights reserved. INTELLECTUAL PROPERTY DISCLAIMER THIS SPECIFICATION IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER INCLUDING ANY WARRANTY OF MERCHANTABILITY, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION, OR SAMPLE. A LICENSE IS HEREBY GRANTED TO REPRODUCE AND DISTRIBUTE THIS SPECIFICATION FOR INTERNAL USE ONLY. NO OTHER LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY OTHER INTELLECTUAL PROPERTY RIGHTS IS GRANTED OR INTENDED HEREBY. AUTHORS OF THIS SPECIFICATION DISCLAIM ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF PROPRIETARY RIGHTS, RELATING TO IMPLEMENTATION OF INFORMATION IN THIS SPECIFICATION. AUTHORS OF THIS SPECIFICATION ALSO DO NOT WARRANT OR REPRESENT THAT SUCH IMPLEMENTATION(S) WILL NOT INFRINGE SUCH RIGHTS. All product names are trademarks, registered trademarks, or service marks of their respective owners. Please send comments via electronic mail to hidcomments’at’usb.org, us the @ sign for ‘at’. Version 1.12 October 28, 2004 Universal Serial Bus HID Usage Tables v Table of Contents 1 INTRODUCTION.................................................................................................................................11 1.1 SCOPE ..............................................................................................................................................11 1.2 PURPOSE ..........................................................................................................................................11 1.3 RELATED DOCUMENTS ....................................................................................................................12 1.4 TERMS AND ABBREVIATIONS...........................................................................................................12 2 MANAGEMENT OVERVIEW...........................................................................................................13 3 USAGE PAGES.....................................................................................................................................14 3.1 HID USAGE TABLE CONVENTIONS ..................................................................................................15 3.2 HANDLING UNKNOWN USAGES .......................................................................................................15 3.3 USAGES AND UNITS .........................................................................................................................16 3.4 USAGE TYPES ..................................................................................................................................16 3.4.1 Usage Types (Controls)...........................................................................................................17 3.4.2 Usage Types (Data).................................................................................................................18 3.4.3 Usage Types (Collection)........................................................................................................20 3.4.4 Alternate Types........................................................................................................................21 3.5 SYSTEM CONTROLS .........................................................................................................................22 3.5.1 Keyboard.................................................................................................................................22 3.5.2 Mice.........................................................................................................................................22 3.5.3 Joysticks ..................................................................................................................................22 3.6 HID LANGIDS................................................................................................................................22 3.6.1 Usage Data Descriptor (0x01)................................................................................................24 3.6.2 Vendor Defined HID LANGID (0x3C - 0x3F) ........................................................................24 4 GENERIC DESKTOP PAGE (0X01) .................................................................................................26 4.1 APPLICATION USAGES .....................................................................................................................28 4.2 AXIS USAGES...................................................................................................................................29 4.3 MISCELLANEOUS CONTROLS ...........................................................................................................29 4.3.1 Resolution Multiplier...............................................................................................................30 4.4 VECTOR USAGES .............................................................................................................................31 4.5 SYSTEM CONTROLS .........................................................................................................................32 4.5.1 Power Controls .......................................................................................................................32 4.6 BUFFERED BYTES ............................................................................................................................33 4.7 DIRECTION PADS .............................................................................................................................33 4.8 FEATURE NOTIFICATIONS ................................................................................................................34 4.9 SOFTWARE FLOW CONTROLS...........................................................................................................34 4.10 SYSTEM DISPLAY CONTROLS...........................................................................................................35 5 SIMULATION CONTROLS PAGE (0X02).......................................................................................36 5.1 SPORTS SIMULATION DEVICE ..........................................................................................................37 5.2 FLIGHT SIMULATION DEVICES .........................................................................................................37 5.3 AUTOMOBILE SIMULATION DEVICES ...............................................................................................40 5.4 TANK SIMULATION DEVICES ...........................................................................................................41 5.5 MARITIME SIMULATION DEVICES ....................................................................................................41 5.6 TWO-WHEELED SIMULATION DEVICES ............................................................................................42 5.7 MISCELLANEOUS SIMULATION DEVICES..........................................................................................42 6 VR CONTROLS PAGE (0X03)...........................................................................................................43 Version 1.12 October 21, 2004 vi Universal Serial Bus HID Usage Tables 7 SPORT CONTROLS PAGE (0X04)....................................................................................................45 7.1 STICK DEVICES ................................................................................................................................46 7.2 EXERCISE MACHINES .......................................................................................................................47 8 GAME CONTROLS PAGE (0X05).....................................................................................................48 8.1 3D GAME CONTROLLER...................................................................................................................49 8.2 PINBALL DEVICE ..............................................................................................................................50
Recommended publications
  • Beyond BIOS Developing with the Unified Extensible Firmware Interface
    Digital Edition Digital Editions of selected Intel Press books are in addition to and complement the printed books. Click the icon to access information on other essential books for Developers and IT Professionals Visit our website at www.intel.com/intelpress Beyond BIOS Developing with the Unified Extensible Firmware Interface Second Edition Vincent Zimmer Michael Rothman Suresh Marisetty Copyright © 2010 Intel Corporation. All rights reserved. ISBN 13 978-1-934053-29-4 This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in professional services. If professional advice or other expert assistance is required, the services of a competent professional person should be sought. Intel Corporation may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights that relate to the presented subject matter. The furnishing of documents and other materials and information does not provide any license, express or implied, by estoppel or otherwise, to any such patents, trademarks, copyrights, or other intellectual property rights. Intel may make changes to specifications, product descriptions, and plans at any time, without notice. Fictitious names of companies, products, people, characters, and/or data mentioned herein are not intended to represent any real individual, company, product, or event. Intel products are not intended for use in medical, life saving, life sustaining, critical control or safety systems, or in nuclear facility applications. Intel, the Intel logo, Celeron, Intel Centrino, Intel NetBurst, Intel Xeon, Itanium, Pentium, MMX, and VTune are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
    [Show full text]
  • Sistemi Operativi Real-Time Marco Cesati Lezione R13 Sistemi Operativi Real-Time – II Schema Della Lezione
    Sistemi operativi real-time Marco Cesati Lezione R13 Sistemi operativi real-time – II Schema della lezione Caratteristiche comuni VxWorks LynxOS Sistemi embedded e real-time QNX eCos Windows Linux come RTOS 15 gennaio 2013 Marco Cesati Dipartimento di Ingegneria Civile e Ingegneria Informatica Università degli Studi di Roma Tor Vergata SERT’13 R13.1 Sistemi operativi Di cosa parliamo in questa lezione? real-time Marco Cesati In questa lezione descriviamo brevemente alcuni dei più diffusi sistemi operativi real-time Schema della lezione Caratteristiche comuni VxWorks LynxOS 1 Caratteristiche comuni degli RTOS QNX 2 VxWorks eCos 3 LynxOS Windows Linux come RTOS 4 QNX Neutrino 5 eCos 6 Windows Embedded CE 7 Linux come RTOS SERT’13 R13.2 Sistemi operativi Caratteristiche comuni dei principali RTOS real-time Marco Cesati Corrispondenza agli standard: generalmente le API sono proprietarie, ma gli RTOS offrono anche compatibilità (compliancy) o conformità (conformancy) allo standard Real-Time POSIX Modularità e Scalabilità: il kernel ha una dimensione Schema della lezione Caratteristiche comuni (footprint) ridotta e le sue funzionalità sono configurabili VxWorks Dimensione del codice: spesso basati su microkernel LynxOS QNX Velocità e Efficienza: basso overhead per cambi di eCos contesto, latenza delle interruzioni e primitive di Windows sincronizzazione Linux come RTOS Porzioni di codice non interrompibile: generalmente molto corte e di durata predicibile Gestione delle interruzioni “separata”: interrupt handler corto e predicibile, ISR lunga
    [Show full text]
  • NTFS from Wikipedia, the Free Encyclopedia Jump To: Navigation, Search NTFS Developer Microsoft Introduced July 1993 (Windows
    NTFS From Wikipedia, the free encyclopedia Jump to: navigation, search NTFS Developer Microsoft Introduced July 1993 (Windows NT 3.1) Partition identifier 0x07 (MBR) EBD0A0A2-B9E5-4433-87C0-68B6B72699C7 (GPT) Structures Directory contents B+ tree[1] File allocation Bitmap/Extents Bad blocks $badclus Limits Max file size 264 bytes (16 EiB) minus 1 KiB [2] Max number of files 4,294,967,295 (232-1)[2] Max filename length 255 UTF-16 code units[3] Max volume size 264 ? 1 clusters [2] Allowed characters in filenames In Posix namespace, any UTF-16 code unit (case sensitive) except U+0000 (NUL) and / (slash). In Win32 namespace, any UTF-16 code unit (case insensitive) except U+0000 (NUL) / (slash) \ (backslash) : (colon) * (asterisk) ? (Question mark) " (quote) < (less than) > (greater than) and | (pipe) [3] Features Dates recorded Creation, modification, POSIX change, access Date range 1 January 1601 ʹ 28 May 60056 (File times are 64-bit numbers counting 100- nanosecond intervals (ten million per second) since 1601, which is 58,000+ years) Date resolution 100ns Forks Yes (see Alternate data streams below) Attributes Read-only, hidden, system, archive, not content indexed, off-line, temporary File system permissions ACLs Transparent compression Per-file, LZ77 (Windows NT 3.51 onward) Transparent encryption Per-file, DESX (Windows 2000 onward), Triple DES (Windows XP onward), AES (Windows XP Service Pack 1, Windows Server 2003 onward) Single Instance Storage Yes Supported operating systems Windows NT family (Windows NT 3.1 to Windows NT 4.0, Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008) NTFS is the standard file system of Windows NT, including its later versions Windows 2000, Windows XP, Windows Server 2003, Windows Server 2008, and Windows Vista.[4] NTFS supersedes the FAT file system as the preferred file system for Microsoft͛s ͞Windows͟-branded operating systems.
    [Show full text]
  • Operating Systems: from Every Palm to the Entire Cosmos in the 21St Century Lifestyle 5
    55 pages including cover Knowledge Digest for IT Community Volume No. 40 | Issue No. 11 | February 2017 ` 50/- Operating ISSN 0970-647X ISSN Systems COVER STORY Computer Operating Systems: From every palm to the entire cosmos in the 21st Century Lifestyle 5 TECHNICAL TRENDS SECURITY CORNER Cyber Threat Analysis with Blockchain : A Disruptive Innovation 9 Memory Forensics 17 www.csi-india.org research FRONT ARTICLE Customized Linux Distributions for Top Ten Alternative Operating Bioinformatics Applications 14 Systems You Should Try Out 20 CSI CALENDAR 2016-17 Sanjay Mohapatra, Vice President, CSI & Chairman, Conf. Committee, Email: [email protected] Date Event Details & Contact Information MARCH INDIACOM 2017, Organized by Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New 01-03, 2017 Delhi http://bvicam.ac.in/indiacom/ Contact : Prof. M. N. Hoda, [email protected], [email protected], Tel.: 011-25275055 0 3-04, 2017 I International Conference on Smart Computing and Informatics (SCI -2017), venue : Anil Neerukonda Institute of Technology & Sciences Sangivalasa, Bheemunipatnam (Mandal), Visakhapatnam, Andhra Pradesh, http://anits.edu.in/ sci2017/, Contact: Prof. Suresh Chandra Satapathy. Mob.: 9000249712 04, 2017 Trends & Innovations for Next Generation ICT (TINICT) - International Summit-2017 Website digit organized by Hyderabad Chapter http://csihyderabad.org/Contact 040-24306345, 9490751639 Email id [email protected] ; [email protected] 24-25, 2017 First International Conference on “Computational Intelligence, Communications, and Business Analytics (CICBA - 2017)” at Calcutta Business School, Kolkata, India. Contact: [email protected]; (M) 94754 13463 / (O) 033 24205209 International Conference on Computational Intelligence, Communications, and Business Analytics (CICBA - 2017) at Calcutta Business School, Kolkata, India.
    [Show full text]
  • AMD A50M Fusion Controller Hub Databook
    AMD A50M Fusion Controller Hub Databook Publication # 47776 Revision: 3.00 Issue Date: June 2012 Advanced Micro Devices 47776 Rev. 3.00 June 2012 AMD A50M Fusion Controller Hub Databook © 2012 Advanced Micro Devices, Inc. All rights reserved. The contents of this document are provided in connection with Advanced Micro Devices, Inc. ("AMD") products. AMD makes no representations or warranties with respect to the accuracy or completeness of the contents of this publication and reserves the right to make changes to specifications and product descriptions at any time without notice. AMD assumes no liability whatsoever, and disclaims any express or implied warranty, relating to this document including, but not limited to, the implied warranty of merchantability, fitness for a particular purpose, or infringement of any intellectual property right. AMD shall not be liable for any damage, loss, expense, or claim of loss of any kind or character (including without limitation direct, indirect, consequential, exemplary, punitive, special, incidental or reliance damages) arising from use of or reliance on this document. No license, whether express, implied, arising by estoppel, or otherwise, to any intellectual property rights are granted by this publication. Except for AMD product purchased pursuant to AMD's Standard Terms and Conditions of Sale, and then only as expressly set forth therein, AMD's products are not designed, intended, authorized or warranted for use as components in systems intended for surgical implant into the body, or in other applications intended to support or sustain life, or in any other application in which the failure of AMD's product could create a situation where personal injury, death, or severe property or environmental damage may occur.
    [Show full text]
  • C.B.S.E. PAPER Informatics with CBSE 2018 Marking Class–XII Practices Scheme Delhi/Outside Delhi
    SOLVED C.B.S.E. PAPER Informatics with CBSE 2018 Marking Class–XII Practices Scheme Delhi/Outside Delhi Time : 3 Hours Max. Marks : 70 General Instructions : (i) All questions are compulsory. (ii) Answer the questions after carefully reading the text. 1. (a) ABC Company wants to link its computers in the Head office in New Delhi to its office in Sydney. Name the type of Network that will be formed. Which communication media should be used to form this Network ? 2 (b) Which of the following is/are not communication media ? (i) Microwaves (ii) Optical Fiber cable (iii) Node (iv) Radio waves Identify which of the above mentioned communication media are Wired media and which ones are Wireless media. (c) Write two examples each of software in the following categories : (i) Open Source Operating System 2 (ii) Open Source Web Browser (d) Expand the following terms : 2 (i) GSM (ii) IP (e) Name the devices : (i) This device constantly looks at all the data entering and exiting your connection. It can block or reject data in response to an established rule. (ii) This device connects multiple nodes to form a network. It redirects the received information only to the intended node(s). 2 2. (a) Identify the invalid variable names. State the reason if invalid. 1 (i) Marks Unit (ii) Product _1 (iii) Sales123 (iv) 2Marks (b) Write the data type of variables that should be used to store : 1 (i) Marks of students (ii) Grades of students (Grade can be 'A' or 'B' or 'C') (c) Write examples of any two properties and any two methods of jButton component.
    [Show full text]
  • Sistemas Operativos Modernos Compilación Bibliográfica
    SISTEMAS OPERATIVOS MODERNOS COMPILACIÓN BIBLIOGRÁFICA Katherine Osorio Lopez 906538 Docente: Carlos Hernan Gomez Materia: Sistemas Operativos UNIVERSIDAD NACIONAL DE COLOMBIA Facultad de Administración Departamento de Informática y Computación Manizales Noviembre 2015 Tabla de contenido INTRODUCCIÓN ........................................................................................................................... 5 HISTORIA Y EVOLUCIÓN DE LOS SISTEMAS Y LA EMPRESA O GRUPO EMPRESARIAL QUE LO RESPALDA ..................................................................................... 6 DESCRIPCIÓN GENERAL DE LOS DISTINTOS SISTEMAS OPERATIVOS/SUBTEMAS (CARACTERISTICAS GENERALES, AMBIENTE, PLATAFORMA) .......................................................................................................................... 10 SISTEMA OPERATIVO ZORIN ................................................................................................ 15 i. Presentación ......................................................................................................................... 15 ii. Estructura y Componentes del sistema ........................................................................... 16 iii. Plataformas sobre las que trabaja ................................................................................... 17 iv. Proceso de Instalación ...................................................................................................... 17 v. Gestión de procesos y del procesador ...........................................................................
    [Show full text]
  • CYBERSECURITY When Will You Be Hacked?
    SUFFOLK ACADEMY OF LAW The Educational Arm of the Suffolk County Bar Association 560 Wheeler Road, Hauppauge, NY 11788 (631) 234-5588 CYBERSECURITY When Will You Be Hacked? FACULTY Victor John Yannacone, Jr., Esq. April 26, 2017 Suffolk County Bar Center, NY Cybersecurity Part I 12 May 2017 COURSE MATERIALS 1. A cybersecurity primer 3 – 1.1. Cybersecurity practices for law firms 5 – 1.2. Cybersecurity and the future of law firms 11 – 2. Information Security 14 – 2.1. An information security policy 33 – 2.2. Data Privacy & Cloud Computing 39 – 2.3. Encryption 47 – 3. Computer security 51 – 3.1. NIST Cybersecurity Framework 77 – 4. Cybersecurity chain of trust; third party vendors 113 – 5. Ransomware 117 – 5.1. Exploit kits 132 – 6. Botnets 137 – 7. BIOS 139 – 7.1. Universal Extensible Firmware Interface (UEFI) 154– 8. Operating Systems 172 – 8.1. Microsoft Windows 197 – 8.2. macOS 236– 8.3. Open source operating system comparison 263 – 9. Firmware 273 – 10. Endpoint Security Buyers Guide 278 – 11. Glossaries & Acronym Dictionaries 11.1. Common Computer Abbreviations 282 – 11.2. BABEL 285 – 11.3. Information Technology Acronymns 291 – 11.4. Glossary of Operating System Terms 372 – 2 Cyber Security Primer Network outages, hacking, computer viruses, and similar incidents affect our lives in ways that range from inconvenient to life-threatening. As the number of mobile users, digital applications, and data networks increase, so do the opportunities for exploitation. Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction.
    [Show full text]
  • The Following Distributions Match Your Criteria (Sorted by Popularity): 1. Linux Mint (1) Linux Mint Is an Ubuntu-Based Distribu
    The following distributions match your criteria (sorted by popularity): 1. Linux Mint (1) Linux Mint is an Ubuntu-based distribution whose goal is to provide a more complete out-of-the-box experience by including browser plugins, media codecs, support for DVD playback, Java and other components. It also adds a custom desktop and menus, several unique configuration tools, and a web-based package installation interface. Linux Mint is compatible with Ubuntu software repositories. 2. Mageia (2) Mageia is a fork of Mandriva Linux formed in September 2010 by former employees and contributors to the popular French Linux distribution. Unlike Mandriva, which is a commercial entity, the Mageia project is a community project and a non-profit organisation whose goal is to develop a free Linux-based operating system. 3. Ubuntu (3) Ubuntu is a complete desktop Linux operating system, freely available with both community and professional support. The Ubuntu community is built on the ideas enshrined in the Ubuntu Manifesto: that software should be available free of charge, that software tools should be usable by people in their local language and despite any disabilities, and that people should have the freedom to customise and alter their software in whatever way they see fit. "Ubuntu" is an ancient African word, meaning "humanity to others". The Ubuntu distribution brings the spirit of Ubuntu to the software world. 4. Fedora (4) The Fedora Project is an openly-developed project designed by Red Hat, open for general participation, led by a meritocracy, following a set of project objectives. The goal of The Fedora Project is to work with the Linux community to build a complete, general purpose operating system exclusively from open source software.
    [Show full text]
  • AMD A45/A50M/A55E Fusion Controller Hub Register Programming Requirements
    AMD A45/A50M/A55E Fusion Controller Hub Register Programming Requirements Technical Reference Manual Rev. 3.00 P/N: 47778_ A45_A50M_A55E _rpr_pub_3.00 2012 Advanced Micro Devices, Inc. Trademarks AMD, the AMD Arrow logo, and combinations thereof are trademarks of Advanced Micro Devices, Inc. HyperTransport is a licensed trademark of the HyperTransport Technology Consortium. PCI Express and PCIe are trademarks of the PCI-Special Interest Group (PCI-SIG). Windows is a registered trademark of Microsoft Corporation. Other product names used in this publication are for identification purposes only and may be trademarks of their respective companies. Disclaimer The contents of this document are provided in connection with Advanced Micro Devices, Inc. ("AMD") products. AMD makes no representations or warranties with respect to the accuracy or completeness of the contents of this publication and reserves the right to make changes to specifications and product descriptions at any time without notice. AMD assumes no liability whatsoever, and disclaims any express or implied warranty, relating to this document including, but not limited to, the implied warranty of merchantability, fitness for a particular purpose, or infringement of any intellectual property right. AMD shall not be liable for any damage, loss, expense, or claim of loss of any kind or character (including without limitation direct, indirect, consequential, exemplary, punitive, special, incidental or reliance damages) arising from use of or reliance on this document. No license,
    [Show full text]
  • Application of Software Components in Operating System Design
    CHARLES UNIVERSITY IN PRAGUE FACULTY OF MATHEMATICS AND PHYSICS DOCTORAL THESIS Martin Děcký Application of Software Components in Operating System Design Department of Distributed and Dependable Systems Supervisor of the Doctoral Thesis: Doc. Ing. Petr Tůma, Dr. Study Programme: Computer Science Specialization: I2 Software Systems Prague 2015 ii Acknowledgements The text of this doctoral thesis captures my original thoughts related to the HelenOS microkernel multiserver operating system. The text describes my overall inluence on the design of HelenOS and also my individual contributions to the implementation of HelenOS. That being written, it is completely necessary to acknowledge that no human is an island and (almost) all ideas are always extensions and recombination of previous ideas. The current source code of HelenOS in its mainline branch [42] comprises of more than 287,000 physical lines of code (see Figure 7.2). These 287,000 physical lines of code were contributed by more that 50 individuals and organizations (including myself) over the entire history of HelenOS and its direct ancestors since 2001. The size of the code would be even higher if we would also count in all the original code that can be found in the numerous feature branches of HelenOS [41] and the code in standalone patches that still wait for their inal review and merging into the main- line branch. For the sake of simplicity, we also ignore the code that was once written, but later refactored, replaced or removed. Assessing my own personal contribution to the HelenOS mainline branch can be done in a straight- forward way by examining the source code repository.
    [Show full text]
  • Ebook - Informations About Operating Systems Version: September 3, 2016 | Download
    eBook - Informations about Operating Systems Version: September 3, 2016 | Download: www.operating-system.org AIX Operating System (Unix) Internet: AIX Operating System (Unix) AmigaOS Operating System Internet: AmigaOS Operating System Android operating system Internet: Android operating system Aperios Operating System Internet: Aperios Operating System AtheOS Operating System Internet: AtheOS Operating System BeIA Operating System Internet: BeIA Operating System BeOS Operating System Internet: BeOS Operating System BSD/OS Operating System Internet: BSD/OS Operating System CP/M, DR-DOS Operating System Internet: CP/M, DR-DOS Operating System Darwin Operating System Internet: Darwin Operating System Debian Linux Operating System Internet: Debian Linux Operating System eComStation Operating System Internet: eComStation Operating System Symbian (EPOC) Operating System Internet: Symbian (EPOC) Operating System FreeBSD Operating System (BSD) Internet: FreeBSD Operating System (BSD) Gentoo Linux Operating System Internet: Gentoo Linux Operating System Haiku Operating System Internet: Haiku Operating System HP-UX Operating System (Unix) Internet: HP-UX Operating System (Unix) GNU/Hurd Operating System Internet: GNU/Hurd Operating System Inferno Operating System Internet: Inferno Operating System IRIX Operating System (Unix) Internet: IRIX Operating System (Unix) JavaOS Operating System Internet: JavaOS Operating System LFS Operating System (Linux) Internet: LFS Operating System (Linux) Linspire Operating System (Linux) Internet: Linspire Operating
    [Show full text]