Cp 99, Other Filing/Pleading, 11/12/2014

Total Page:16

File Type:pdf, Size:1020Kb

Cp 99, Other Filing/Pleading, 11/12/2014 BINGHAM Catherine Wang Brett P. Ferenchak catherine. wang@ bingham. com [email protected] November 11, 2014 Via Overnight Courier and E-Mail Oregon Public Utility Commission Attn: Filing Center 550 Capitol Street, N.E. Suite 215 Salem, OR 97301-2551 [email protected] Re: Business Telecom, LLC d/b/a EarthLink Business I Notification of Conversion and Associated Name Change Dear Sir or Madam: Business Telecom, LLC d/b/a EarthLink Business I (formerly known as Business Telecom, Inc. d/b/a EarthLink Business III) (the "Company") hereby notifies the Commission (1) that the Company converted from a North Carolina corporation to a North Carolina limited liability company' and (2) of the associated name change to "Business Telecom, LLC d/b/a EarthLink Business 1." The Company requests that the Commission update its records, including the Company's Certificate,2 to reflect the conversion and associate name change and, to the extent necessary, approve these changes. Attached hereto are the Company's conversion documents and updated authorization to transact business in Oregon and trade name registration. Beijing Boston Frankfurt Hartford Hong Kong London los Angeles New York Orange County San Francisco Santa Monica Silicon Valley Tokyo Washington The conversion of the Company to a limited liability company was merely a change in its corporate form -the conversion was accomplished through the filing of Articles of Bingham McCutchen LLP Conversion in North Carolina and did not entail any merger or other transactions interrupting 2020 K Street NW Washington, DC the existence of the Company. 20006-1806 2 The Company is authorized to provide interexchange telecommunications services pursuant to Order No. 05-785 issued in CP 99. T +1.202.373.6ooo F +1.202.373·6oo1 bingham.com A/75944527.1 Oregon Public Utility Commission November 11, 2014 Page2 An original and one (1) copy of this letter are enclosed for filing. Please date-stamp the extra copy and return it in the envelope provided. This letter is also being provided via e­ mail. Should you have any questions regarding this filing, please do not hesitate to contact the undersigned. Respectfully submitted, BA~~ Catherine Wang Brett P. Ferenchak Counsel for the Company A/75944527.1 Bingh m M C ,• h • LLP '>iwha ~ o ATTACHMENTS Conversion Documents, Authority to Transact Business and Trade Name Registration N75944527.1 SOSID: 0073266 Date Filed: 12/20/2013 4:59:00 PM Effective: 12/31/2013 Elaine F. Marshall North Carolina Secretary of State C2013 354 00404 ARTI~OPORG~ATION INCLUDING ARnCLES OP' CONVERSION OF BUSINESS TELECOM, INC. December~ 2013 Pursuant to §§ 57C·2-21, 57C-9A-Ol aod S7C-9A-03 of the Oencral Statutes ofNorth Carolina, the undersigned converting business entity docs hereby submit these Articles of Organization including Articles of Conversion (the "Articles'1 for the purpose of fonning a limited liability company. 1. The name of the limited liability company is ''Business Telecom. LLC" (tho "Company"). 2. The Company is being formed pursuant to tho conversion of another business entity. 3. Tho namo of the converting business entity is .. Business Tolccom. Ino." (the "Converting Corporation") and the organization and in=nal affairs oftbe Converting Corpomdon are governed by the laws of tho state North Carolina. 4. A plan of conversion has been approved by the Converting Corporation as required by law. S. There shall be no limit on the duration of the Company. 6. The name and address of the p81S0n ex.eculiog theso articles of organization is Samuel R. DeSimone, Jr., 1375 Peachtree Street, Lovol A, Atlanta, OA 30309, in his capacity as Executive Vice President. General Counsel and Secretary of BTl Toi~:CC~m Corp., a North Carolina coJPQralion, the sole stockholder ofthe Converting Corporation (Immediately prior to the conversion) 8Jid the sole member of tho Company (immediately following tho conversion. 7. The name of tho initial registered agent ofthe Company along with its stroDt and mailing address and county is as follows: Notional Registered Agents, Jno. ISO Fayettevl11e St. Box 1011 Raleigh, NC 27601 Wake County 8. The principal office telephone number. street and mailing address and county of the Company are as follows: (404) 815-0770 1375 Peachtroo Stroot, Level A Atlanta. GA 30309 fulton County 9. The Company shall be managed by its Members and all members by virtue of their status as members shall bo managers of this limited liability company. 10. These articles will be cff'ectlve at 11:58 p.m. on December 31.2013. 112879516¥1 JN WITNESS WHEREOF, the undcrsigDcd hu causecl these Articles to be executed by its authorized rcpresentalive as of the day and year first above written as solo stockholder of the ConvertiDg CoJporation (immediately prior to tbo conversion) and solo member oftbo Company (immediately following the convorsion). BTI TELECOM CORP., a North CaroUna co~poration Secretary of State Corporation Division Registry Number: 461368-83 255 Capitol Street NE, Suite 151 Type: FOREIGN BUSINESS CORPORATION Salem, OR 97310·1327 Phone:(503)986·2200 www.filinginoregon.com BUSINESS TELECOM, INC., A NORTH CAROLINA ... 1375 PEACHTREE ST NE . ATLANTA GA 30309 Acknowledgment Letter The document you submitted was recorded as shown below. Please review and verify the information listed for accuracy. Document WITHDRAWAL OF AUTHORITY Filed On Jurisdiction 01/15/2014 NORTH CAROLINA Name BUSINESS TELECOM, INC., A NORTH CAROLINA CORPORATION Principal Place of Business . Registered Agent 7037 OLD MADISON PIKE STE 400 NATIONAL REGISTERED AGENTS, INC. HUNTSVILLE AL 35806 388 STATE STREET SUITE 420 SALEM OR 97301 Mailing Address President 1375 PEACHTREE ST NE ROLLA P HUFF ATLANTA GA 30309 1375 PEACHTREE STREET ATLANTA GA 30309 Secretary SAMUEL R DESIMONE JR 1375 PEACHTREE STREET ATLANTA GA 30309 DEBHAR ACK 01/15/2014 Application for Amendment/Withdrawal - Foreign Business/Professional . Secretary of State- Corporation Divlelon • 255 Capitol Sl NE, Suite 151 -Salem, OR 97310-1327- http://www.FIIInglnOregon.com- Phone: (503) 986-2200 I .. Check the approprtate box below: rJ AMENDMENT.TO APPLICATION FOR AUTHORITY (Compl.ta only 1, 2, B) FILED • I2J wmtDRAWAL OF AUTHORITY TO TRANSACT (Complete only 3, 4, 5, e. 7, 8) JAN 15 2014 REGISTRY NUMBER: 461368-83 OREGON ----------~----------------------------- SECRETARY OF STATE In accordance with Oregon Revtsed Sllltute 192.410-192.490, the lnfor:mauon on this application Is public~('(!. We muat reloaae this Information ID all partlea upon 1119ueat·and tt wUJ be poatild on our web11!e. · For olllce U8e o!lly Please Type or Print Legibly In Black Ink. Attach Additional Sheet· If Necessary. AMENDMEfiT l'o APi>ucAnON ONLv 1) ENTITY NAME: ____________________--:------::-----------------...:...-------- 2) AMENDMENT: (The amendment Is as fcllowe.) WITliDRAWAL OF AUTllORITY TO TRANSACT BUSINESS ONLy 3) NAME: Business Telecom, Inc., a North Carolina Corpomtion 4) STATE OR COUNTRY OF INCORPORATION: ..:N.:.:o::·rth=..C::::ar=o=lin::::a:,_ ___________,__ ________________ ' 5) THIS CORPORATION IS NOT TRANSACTING BUSINESS IN OREGON, AND SURREN,OERS ITS AUTHORJTY TO TRANSACT BUSINESS IN OREGON. 6) THIS CORPORATION REVOKES THE AUTHORITY OF ITS·REGISTEREI;) AGENT TO ACCEPT SERVICE ON ITS BEHALF AND APPOINTS THE SECRETARY OF STATE AS ITS AGENT FOR SERVICE OF PROCESS IN ANY PROCEEDING BASED ON A CAUSE OF AC110N ARISING DURING llfE TIME IT WAS AUTHORIZED TO TRANSACT BUSINESS IN OREGON. 7) MAtUNG ADDRESS: (The address to which the person lniUaUng any proceeding may maU tD thla Corporetion • c:opy of any procaaa sarwd on the Seaetary of State. The Corporation wlll notify the C01poration Division, Business Registry of any change In this mailing address for a period of fiVe years from the date of this withdrawal.) 1375 Peachtree Street, NE, Atlanta, GA 30309 B) EXECUTION: (Must be signed by at least one officer or director.) By my signature, I declare as an authorized authority, that this filing has been examined by me and Is, to the best of my knowledge and belief, true, correct, and complete. Making false statements In this d.ocument Is against the law and may be penalized by fines, lmprisorY!lent or both. Printed Name: Title: · By ; EarthLink Buaiues•, t.LC, Samuel R. DeSimone, Jr. ita Sola MtiTAbear ' .. taLC, ice Sgla Member ~By; BartbLink, LI..C, ita Sole Member 11y, Eortl>Linlc Holdin5J• , Corp .Its, Sole Member 8y1 Sa~el Jt. PeSin10ne, Jr,, Bx•cutive VP, Genei:al CoUW~~el and Beantary ~'Ut ~ c.l o \!S~ ,?t" ~ .!' ,.,. w.a..•.: ....: ·~· .,. ~~ ...'J -.. ; .~ :•~·· .- ~~ .....• r~·; t . ::.~o ' l J. •,.• ~;r~t.~ .... ;. ,_.~·.j . , CONTACT NAME: (To rNDive questions with this nllng.) ~ FEES · · ~~oot.~ : ~t;;t r.:;n ~ ~ ,. .... ~ -~ ..5 - ·"-~ ·- "" t1,,- , ~:.: .:. I• ' :t.f-'~ · Ao r' t ..., -.:; _,f :tl';;Tt:' .. ...·~~~ -~ .... ~· .:ll Thomas Pasquale ~ Rs.qt.lmd PIOC8IISing Fee $Z75 · PHONE NUMBER: (Include area code.) ~ l'nxeaslng Ftea llf8 nortefurtdllblll. Pleaae make check payallle ID "C«pomlon llvlslon.' 617-742-8484 )) Free!XlJiei ar& avallabls at ABnaloOa!!pn.com, using the BU&Inass Name sean:n program. {~4:-:o 1 .. ;..\ ~;,."1,!:("",j~.,'';:~ ...'l' i. l >;·,.,..•.u':,'J:,W.,..T~:~.'.; ,;;~ .. ;~;"" .. ;J•..ii ~l. - ,l. :·;. ,:~-;.;..:- .'. : '1 ,-:,_ • •.: .:.~ '"'': '-<!•'•:,;,::.~;'~.i,.;,;,,:.,..;:;; , .. ·,,i."· ~~ • '' ,. -:.·::: 51 • AppiiCII!Ion for Amendment Withdrawal - Foreign Bu•lneu Proteaalonlll (03/12) IR041 ·04117i:zOI2 WolleriKliiW«Oolioo Secretary of State Corporation Division Registry Number: 990733-98 255 Capitol Street NE, Suite 151 Type: FOREIGN LIMITED LIABILITY COMPANY Salem, OR 97310-1327 Phone:(503)986-2200 WWN.filinginoregon.com Next Renewal Date: 01/15/2015 . BUSINESS TELECOM, LLC 1375 PEACHTREE ST NE ATLANTA GA 30309 Acknowledgment Letter The document you submitted was recorded as shown below. Please review and verify the information listed for accuracy. Document APPLICATION FOR AUTHORITY Flied On Jurisdiction 01/15/2014 NORTH CAROLINA Name BUSINESS TELECOM, LLC Principal Place of Business Registered Agent 1375 PEACHTREE ST NE NATIONAL REGISTERED AGENTS, INC. ATLANTA GA 30309 388 STATE ST STE 420 SALEM OR 97301 Mailing Address 1375 PEACHTREE ST NE ATLANTA GA 30309 DEBHAR ACK 01/15/2014 .
Recommended publications
  • Meeting Agenda 4:30 – 6:00 PM, Wednesday, Nov 2Nd, 2016 Lyons Town Hall
    Meeting Agenda 4:30 – 6:00 PM, Wednesday, Nov 2nd, 2016 Lyons Town Hall I. Roll Call, Agenda, Minutes • Amendments to Agenda • Approve Minutes from Oct 19th • UEB Officers and Member Lead Areas • Upcoming Meetings - Nov 12, 2016 9 AM or 1 PM - Lyons Boards and Commissions Training - Lyons ​ ​ ​ Nov 9. 8 AM - Northern Water Fall Water Users Meeting - Longmont, Best Western 1850 Industrial Cir. Dec 2nd - CAMU Fall Meeting - Fairfield & Woods in Denver, CO II. Audience Business III. Liaison Updates • Board of Trustees Update - MEAN meeting Report • Staff, Engineering Update - Honeywell Savings Gaurantee IV. Continued Business ● Town Utility Account tracking V. New Business ● Water/Wastewater Rate and CIP Study Presentation RG & Assoc. VI. Parking Lot • 2017 Utility FUnd Budget, Pipe Water rates for 2017 Budget, • Reserve/Rate Stabilization Funds • Wastewater Pretreatment Policy • LRAP INF 2.2.1 • Municipal Code Corrections UEB Meeting Minutes, 19 Oct 2016 Meeting Time and Location: Began at 4:30 at Town Hall. ​ Attendance:, Aaron Caplan, Lee Hall, Coco Gordon, John Cowdry, Chuck Keim, Dan Reitz, Jay Stott ​ Staff: Kyle Miller Liaisons: Guests: ​ ​ Amendments to Agenda: Welcomed Jay Stott as the newest member of the UEB. ​ Previous Minutes: . Reviewed and modified Oct 5th Minutes under Water Wastewater CIP to add “Areas ​ where there is no looping of the water mains need looping. It was emphasized to try and coordinate getting water, and wastewater done first in areas that need paving.” Aaron had not followed up with Parks and ​ Rec to find out if they were budgeting for water usage. He would do so. Then approved minutes.
    [Show full text]
  • Embedded Linux Systems with the Yocto Project™
    OPEN SOURCE SOFTWARE DEVELOPMENT SERIES Embedded Linux Systems with the Yocto Project" FREE SAMPLE CHAPTER SHARE WITH OTHERS �f, � � � � Embedded Linux Systems with the Yocto ProjectTM This page intentionally left blank Embedded Linux Systems with the Yocto ProjectTM Rudolf J. Streif Boston • Columbus • Indianapolis • New York • San Francisco • Amsterdam • Cape Town Dubai • London • Madrid • Milan • Munich • Paris • Montreal • Toronto • Delhi • Mexico City São Paulo • Sidney • Hong Kong • Seoul • Singapore • Taipei • Tokyo Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. For information about buying this title in bulk quantities, or for special sales opportunities (which may include electronic versions; custom cover designs; and content particular to your business, training goals, marketing focus, or branding interests), please contact our corporate sales depart- ment at [email protected] or (800) 382-3419. For government sales inquiries, please contact [email protected]. For questions about sales outside the U.S., please contact [email protected]. Visit us on the Web: informit.com Cataloging-in-Publication Data is on file with the Library of Congress.
    [Show full text]
  • Smashing the Stack Protector for Fun and Profit
    Smashing the Stack Protector for Fun and Profit Bruno Bierbaumer1 ( ), Julian Kirsch1, Thomas Kittel1, Aurélien Francillon2, and Apostolis Zarras3 1 Technical University of Munich, Munich, Germany [email protected] 2 EURECOM, Sophia Antipolis, France 3 Maastricht University, Maastricht, Netherlands Abstract. Software exploitation has been proven to be a lucrative busi- ness for cybercriminals. Unfortunately, protecting software against attacks is a long-lasting endeavor that is still under active research. However, certain software-hardening schemes are already incorporated into current compilers and are actively used to make software exploitation a compli- cated procedure for the adversaries. Stack canaries are such a protection mechanism. Stack canaries aim to prevent control flow hijack by detecting corruption of a specific value on the program’s stack. Careful design and implementation of this conceptually straightforward mechanism is crucial to defeat stack-based control flow detours. In this paper, we examine 17 different stack canary implementations across multiple versions of the most popular Operating Systems running on various architectures. We systematically compare critical implementation details and introduce one new generic attack vector which allows bypassing stack canaries on current Linux systems running up-to-date multi-threaded software altogether. We release an open-source framework (CookieCrumbler) that identifies the characteristics of stack canaries on any platform it is compiled on and we propose mitigation techniques against stack-based attacks. Although stack canaries may appear obsolete, we show that when they are used correctly, they can prevent intrusions which even the more sophisticated solutions may potentially fail to block. 1 Introduction Buffer overflow vulnerabilities are as old as the Internet itself.
    [Show full text]
  • Operating Systems and Applications for Embedded Systems >>> Toolchains
    >>> Operating Systems And Applications For Embedded Systems >>> Toolchains Name: Mariusz Naumowicz Date: 31 sierpnia 2018 [~]$ _ [1/19] >>> Plan 1. Toolchain Toolchain Main component of GNU toolchain C library Finding a toolchain 2. crosstool-NG crosstool-NG Installing Anatomy of a toolchain Information about cross-compiler Configruation Most interesting features Sysroot Other tools POSIX functions AP [~]$ _ [2/19] >>> Toolchain A toolchain is the set of tools that compiles source code into executables that can run on your target device, and includes a compiler, a linker, and run-time libraries. [1. Toolchain]$ _ [3/19] >>> Main component of GNU toolchain * Binutils: A set of binary utilities including the assembler, and the linker, ld. It is available at http://www.gnu.org/software/binutils/. * GNU Compiler Collection (GCC): These are the compilers for C and other languages which, depending on the version of GCC, include C++, Objective-C, Objective-C++, Java, Fortran, Ada, and Go. They all use a common back-end which produces assembler code which is fed to the GNU assembler. It is available at http://gcc.gnu.org/. * C library: A standardized API based on the POSIX specification which is the principle interface to the operating system kernel from applications. There are several C libraries to consider, see the following section. [1. Toolchain]$ _ [4/19] >>> C library * glibc: Available at http://www.gnu.org/software/libc. It is the standard GNU C library. It is big and, until recently, not very configurable, but it is the most complete implementation of the POSIX API. * eglibc: Available at http://www.eglibc.org/home.
    [Show full text]
  • Porting Musl to the M3 Microkernel TU Dresden
    Porting Musl to the M3 microkernel TU Dresden Sherif Abdalazim, Nils Asmussen May 8, 2018 Contents 1 Abstract 2 2 Introduction 3 2.1 Background.............................. 3 2.2 M3................................... 4 3 Picking a C library 5 3.1 C libraries design factors . 5 3.2 Alternative C libraries . 5 4 Porting Musl 7 4.1 M3andMuslbuildsystems ..................... 7 4.1.1 Scons ............................. 7 4.1.2 GNUAutotools........................ 7 4.1.3 Integrating Autotools with Scons . 8 4.2 Repositoryconfiguration. 8 4.3 Compilation.............................. 8 4.4 Testing ................................ 9 4.4.1 Syscalls ............................ 9 5 Evaluation 10 5.1 PortingBusyboxcoreutils . 10 6 Conclusion 12 1 Chapter 1 Abstract Today’s processing workloads require the usage of heterogeneous multiproces- sors to utilize the benefits of specialized processors and accelerators. This has, in turn, motivated new Operating System (OS) designs to manage these het- erogeneous processors and accelerators systematically. M3 [9] is an OS following the microkernel approach. M3 uses a hardware/- software co-design to exploit the heterogeneous systems in a seamless and effi- cient form. It achieves that by abstracting the heterogeneity of the cores via a Data Transfer Unit (DTU). The DTU abstracts the heterogeneity of the cores and accelerators so that they can communicate systematically. I have been working to enhance the programming environment in M3 by porting a C library to M3. I have evaluated different C library implementations like the GNU C Library (glibc), Musl, and uClibc. I decided to port Musl as it has a relatively small code base with fewer configurations. It is simpler to port, and it started to gain more ground in embedded systems which are also a perfect match for M3 applications.
    [Show full text]
  • Rockjit: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity
    RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity Ben Niu Gang Tan Lehigh University Lehigh University 19 Memorial Dr West 19 Memorial Dr West Bethlehem, PA, 18015 Bethlehem, PA, 18015 [email protected] [email protected] ABSTRACT For performance, modern managed language implementations Managed languages such as JavaScript are popular. For perfor- adopt Just-In-Time (JIT) compilation. Instead of performing pure mance, modern implementations of managed languages adopt Just- interpretation, a JIT compiler dynamically compiles programs into In-Time (JIT) compilation. The danger to a JIT compiler is that an native code and performs optimization on the fly based on informa- attacker can often control the input program and use it to trigger a tion collected through runtime profiling. JIT compilation in man- vulnerability in the JIT compiler to launch code injection or JIT aged languages is the key to high performance, which is often the spraying attacks. In this paper, we propose a general approach only metric when comparing JIT engines, as seen in the case of called RockJIT to securing JIT compilers through Control-Flow JavaScript. Hereafter, we use the term JITted code for native code Integrity (CFI). RockJIT builds a fine-grained control-flow graph that is dynamically generated by a JIT compiler, and code heap for from the source code of the JIT compiler and dynamically up- memory pages that hold JITted code. dates the control-flow policy when new code is generated on the fly. In terms of security, JIT brings its own set of challenges. First, a Through evaluation on Google’s V8 JavaScript engine, we demon- JIT compiler is large and usually written in C/C++, which lacks strate that RockJIT can enforce strong security on a JIT compiler, memory safety.
    [Show full text]
  • Code and Control Flow Integrity for COTS Binaries
    Control Flow and Code Integrity for COTS binaries: An Effective Defense Against Real-World ROP Attacks ∗ Mingwei Zhang R. Sekar Security & Privacy Research Stony Brook University Intel Labs Stony Brook [email protected] [email protected] ABSTRACT bitrary (i.e., Turing-complete) computation. While Turing Despite decades of sustained effort, memory corruption at- completeness is an attractive property that is often the topic tacks continue to be one of the most serious security threats of research papers, real-world ROP attacks have had a more faced today. They are highly sought after by attackers, limited objective: stringing together a small set of gadgets as they provide ultimate control | the ability to execute to bypass DEP. arbitrary low-level code. Attackers have shown time and Control flow integrity (CFI) [16] is a well-known counter- again their ability to overcome widely deployed countermea- measure against control-flow hijack attacks. Such attacks sures such as Address Space Layout Randomization (ASLR) typically rely on memory corruption vulnerabilities to over- and Data Execution Prevention (DEP) by crafting Return write code pointers, e.g., return addresses on the stack, or Oriented Programming (ROP) attacks. Although Turing- variables containing function pointers. CFI thwarts most complete ROP attacks have been demonstrated in research such attacks by constraining the targets of indirect control- papers, real-world ROP payloads have had a more limited flow transfers to be consistent with a statically computed objective: that of disabling DEP so that injected native code control-flow graph. Many research efforts have demonstrated attacks can be carried out. In this paper, we provide a that CFI can be implemented within a compiler [46, 44] or systematic defense, called Control Flow and Code Integrity on binaries [66, 63], and moreover, can be applied to large (CFCI), that makes injected native code attacks impossible.
    [Show full text]
  • Anatomy of Cross-Compilation Toolchains
    Embedded Linux Conference Europe 2016 Anatomy of cross-compilation toolchains Thomas Petazzoni free electrons [email protected] Artwork and Photography by Jason Freeny free electrons - Embedded Linux, kernel, drivers - Development, consulting, training and support. http://free-electrons.com 1/1 Thomas Petazzoni I CTO and Embedded Linux engineer at Free Electrons I Embedded Linux specialists. I Development, consulting and training. I http://free-electrons.com I Contributions I Kernel support for the Marvell Armada ARM SoCs from Marvell I Major contributor to Buildroot, an open-source, simple and fast embedded Linux build system I Living in Toulouse, south west of France Drawing from Frank Tizzoni, at Kernel Recipes 2016 free electrons - Embedded Linux, kernel, drivers - Development, consulting, training and support. http://free-electrons.com 2/1 Disclaimer I I am not a toolchain developer. Not pretending to know everything about toolchains. I Experience gained from building simple toolchains in the context of Buildroot I Purpose of the talk is to give an introduction, not in-depth information. I Focused on simple gcc-based toolchains, and for a number of examples, on ARM specific details. I Will not cover advanced use cases, such as LTO, GRAPHITE optimizations, etc. I Will not cover LLVM free electrons - Embedded Linux, kernel, drivers - Development, consulting, training and support. http://free-electrons.com 3/1 What is a cross-compiling toolchain? I A set of tools that allows to build source code into binary code for
    [Show full text]
  • Choosing System C Library
    Choosing System C library Khem Raj Comcast Embedded Linux Conference Europe 2014 Düsseldorf Germany Introduction “God defined C standard library everything else is creation of man” Introduction • Standard library for C language • Provides primitives for OS service • Hosted/freestanding • String manipulations • Types • I/O • Memory • APIs Linux Implementations • GNU C library (glibc) • uClibc • eglibc – Now merged into glibc • Dietlibc • Klibc • Musl • bionic Multiple C library FAQs • Can I have multiple C libraries side by side ? • Can programs compiled with glibc run on uclibc or vice versa ? • Are they functional compatible ? • Do I need to choose one over other if I am doing real time Linux? • I have a baremetal application what libc options do I have ? Posix Compliance • Posix specifies more than ISO C • Varying degree of compliance What matters to you ? • Code Size • Functionality • Interoperability • Licensing • Backward Compatibility • Variety of architecture support • Dynamic Linking • Build system Codesize • Dietlibc/klibc – Used in really small setup e.g. initramfs • Bionic – Small linked into every process • uClibc – Configurable • Size can be really small at the expense of functionality • Eglibc – Has option groups can be ( < 1M ) License • Bionic – BSD/Apache-2.0 • Musl - MIT • Uclibc – LGPL-2.1 • Eglibc/Glibc – LGPL-2.1 Assigned to FSF • Dietlibc – GPLv2 • Klibc – GPLv2 • Newlib – some parts are GPLv3 Compliance • Musl strives for ISO/C and POSIX compliance No-mmu • uClibc supported No-mmu Distributions • Glibc is used in
    [Show full text]
  • An ECMA-55 Minimal BASIC Compiler for X86-64 Linux®
    Computers 2014, 3, 69-116; doi:10.3390/computers3030069 OPEN ACCESS computers ISSN 2073-431X www.mdpi.com/journal/computers Article An ECMA-55 Minimal BASIC Compiler for x86-64 Linux® John Gatewood Ham Burapha University, Faculty of Informatics, 169 Bangsaen Road, Tambon Saensuk, Amphur Muang, Changwat Chonburi 20131, Thailand; E-mail: [email protected] Received: 24 July 2014; in revised form: 17 September 2014 / Accepted: 1 October 2014 / Published: 1 October 2014 Abstract: This paper describes a new non-optimizing compiler for the ECMA-55 Minimal BASIC language that generates x86-64 assembler code for use on the x86-64 Linux® [1] 3.x platform. The compiler was implemented in C99 and the generated assembly language is in the AT&T style and is for the GNU assembler. The generated code is stand-alone and does not require any shared libraries to run, since it makes system calls to the Linux® kernel directly. The floating point math uses the Single Instruction Multiple Data (SIMD) instructions and the compiler fully implements all of the floating point exception handling required by the ECMA-55 standard. This compiler is designed to be small, simple, and easy to understand for people who want to study a compiler that actually implements full error checking on floating point on x86-64 CPUs even if those people have little programming experience. The generated assembly code is also designed to be simple to read. Keywords: BASIC; compiler; AMD64; INTEL64; EM64T; x86-64; assembly 1. Introduction The Beginner’s All-purpose Symbolic Instruction Code (BASIC) language was invented by John G.
    [Show full text]
  • Embedded Linux Size Reduction Techniques
    Embedded Linux Conference 2017 Embedded Linux size reduction techniques Michael Opdenacker free electrons [email protected] free electrons - Embedded Linux, kernel, drivers - Development, consulting, training and support. http://free-electrons.com 1/1 Michael Opdenacker I Michael Opdenacker I Founder and Embedded Linux engineer at free electrons I Embedded Linux expertise I Development, consulting and training I Strong open-source focus I Long time interest in embedded Linux boot time, and one of its prerequisites: small system size. I From Orange, France Penguin from Justin Ternet (https://openclipart.org/detail/182875/pinguin) free electrons - Embedded Linux, kernel, drivers - Development, consulting, training and support. http://free-electrons.com 2/1 Why reduce size? There are multiple reasons for having a small kernel and system I Run on very small systems (IoT) I Run Linux as a bootloader I Boot faster (for example on FPGAs) I Reduce power consumption Even conceivable to run the whole system in CPU internal RAM or cache (DRAM is power hungry and needs refreshing) I Security: reduce the attack surface I Cloud workloads: optimize instances for size and boot time. I Spare as much RAM as possible for applications and maximizing performance. See https://tiny.wiki.kernel.org/use_cases free electrons - Embedded Linux, kernel, drivers - Development, consulting, training and support. http://free-electrons.com 3/1 Reasons for this talk I No talk about size since ELCE 2015 I Some projects stalled (Linux tinification, LLVM Linux...) I Opportunity to have a look at solutions I didn’t try: musl library, Toybox, gcc LTO, new gcc versions, compiling with Clang..
    [Show full text]
  • The Anchor Newspapers
    Rhode Island College Digital Commons @ RIC The Anchor Newspapers 10-6-1964 The Anchor (1964, Volume 37 Issue 03) Rhode Island College Follow this and additional works at: https://digitalcommons.ric.edu/the_anchor Recommended Citation Rhode Island College, "The Anchor (1964, Volume 37 Issue 03)" (1964). The Anchor. 450. https://digitalcommons.ric.edu/the_anchor/450 This Book is brought to you for free and open access by the Newspapers at Digital Commons @ RIC. It has been accepted for inclusion in The Anchor by an authorized administrator of Digital Commons @ RIC. For more information, please contact [email protected]. THE ESTABLISHED IN 1928 ANCHOR WEEKLY IN 1962 FREE ACCESS TO 10,EAS AND FULL FREEDOM OF EXPRESSION VOL. XXXVI I, No. 3 RHODE ISLAND COLLEGE TU'ESDAY, 0C,,0B 1EIR 6, 1964 "Act One" This evening alt 8:00 p.m. i1J1 Rhode Island Voters R01bfil'tls Ha1'1 ltJlre Fine Arbs COlffimrutJteewtl.11 preserrut O'll'e of the grea1t laidli!es oif the srtaige, To Decide For RI C Dame Jud'il1fu Anrd!erson. Dame Judith will read from "Mac­ The Booarrd '()If 'Ilrusl:ees of dents can now be rarooommod,at­ beth" and "Medea." State Oo!Jil~gesreporlJed tin June ed wilfil:1 a Slllllailll:erC01IToopood­ New York Times drama crit­ thalt tfill,es!Jaljje's ll!l"St puWc jun- ing a d d i It i o n of facilities, ic Brooks Altklin\S•on wro1Je of ~or <iollege woull.d lhiave ro turn RJhlode l!S1amd ~ayers a["e al­ Mi.s'sAnderson\s i'l11terprertatfo1J1 away 400 qUlail!ilfiJedsltnldenlts.
    [Show full text]