IJREISS Volume2, Issue 6(June 2012) ISSN: 2250-0588 A
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Kermit File Transfer Protocol for the Apple II Series Personal Computers : John Patrick Francisco Lehigh University
Lehigh University Lehigh Preserve Theses and Dissertations 1986 A Kermit file transfer protocol for the Apple II series personal computers : John Patrick Francisco Lehigh University Follow this and additional works at: https://preserve.lehigh.edu/etd Part of the Electrical and Computer Engineering Commons Recommended Citation Francisco, John Patrick, "A Kermit file transfer protocol for the Apple II series personal computers :" (1986). Theses and Dissertations. 4628. https://preserve.lehigh.edu/etd/4628 This Thesis is brought to you for free and open access by Lehigh Preserve. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of Lehigh Preserve. For more information, please contact [email protected]. A KERMIT FILE TRANSFER PROTOCOL FOR THE APPLE II SERIES PERSONAL COMPUTERS (Using the Apple Pascal Operating system) by John Patrick Francisco A Thesis Presented to the Graduate Committee of Lehigh University in Candidacy for the Degree of Master of Science 1n• Computer Science Lehigh University March 1986 This thesis is accepted and approved in partial fulfillment of the requirements for the degree of Master of science.• (date) Professor in Charge -------------- --------------- Chairman of the Division Chairman of the Department • • -11- ACKNOWLEDGEMENTS It would be somewhat of an understatement to say this project was broad in scope as the disciplines involved ranged from Phychology to Electrical Engineering. Since the project required an extensive amount of detailed in formation in all fields, I was impelled to seek the help, advice and opinion of many. There were also numerous t friends and relatives upon whom I relied for both moral and financial support. -
Optimizing Processor Performance for Wintel Applications: a Case Study
Optimizing processor performance for Wintel applications: a case study Demand Technology Software 1020 Eighth Avenue South, Suite 6, Naples, FL 34102 phone: (941) 261-8945 fax: (941) 261-5456 e-mail:markf@ demandtech.com http://www.demandtech.com 1998 Demand Technology, Inc. Application tuning case study ■ The target application is a C program written to perform interval performance data collection for Windows NT ♦ It is important that this program perform well because “If you are not part of the solution, you are part of the problem.” ♦ Performance Analysts use our product, and they are very demanding customers 1998 Demand Technology, Inc. Wintel application tuning: processor optimization 2 Application tuning case study ■ At a point in development where the code was reasonably mature and stable, I subjected it to performance analysis using several tools. ♦ Microsoft Visual C++ version 5 ♦ Rational Visual Quantify execution profiler ♦ Intel vTune version 2.5 optimization tool 1998 Demand Technology, Inc. Wintel application tuning: processor optimization 3 Windows NT on Intel hardware ■ In order to use vTune effectively, it helps to understand how Intel processor hardware works ♦ extensive Intel processor documentation ships on the product CD ■ Target environment: ♦ Microsoft Windows NT 4.0 ♦ Intel Pentium and Pentium Pro hardware 1998 Demand Technology, Inc. Wintel application tuning: processor optimization 4 NT performance monitoring ■ Performance SeNTrytm collection agent initialization loop until cycle end = TRUE; Win32 API calls to -
Bringing Virtualization to the X86 Architecture with the Original Vmware Workstation
12 Bringing Virtualization to the x86 Architecture with the Original VMware Workstation EDOUARD BUGNION, Stanford University SCOTT DEVINE, VMware Inc. MENDEL ROSENBLUM, Stanford University JEREMY SUGERMAN, Talaria Technologies, Inc. EDWARD Y. WANG, Cumulus Networks, Inc. This article describes the historical context, technical challenges, and main implementation techniques used by VMware Workstation to bring virtualization to the x86 architecture in 1999. Although virtual machine monitors (VMMs) had been around for decades, they were traditionally designed as part of monolithic, single-vendor architectures with explicit support for virtualization. In contrast, the x86 architecture lacked virtualization support, and the industry around it had disaggregated into an ecosystem, with different ven- dors controlling the computers, CPUs, peripherals, operating systems, and applications, none of them asking for virtualization. We chose to build our solution independently of these vendors. As a result, VMware Workstation had to deal with new challenges associated with (i) the lack of virtual- ization support in the x86 architecture, (ii) the daunting complexity of the architecture itself, (iii) the need to support a broad combination of peripherals, and (iv) the need to offer a simple user experience within existing environments. These new challenges led us to a novel combination of well-known virtualization techniques, techniques from other domains, and new techniques. VMware Workstation combined a hosted architecture with a VMM. The hosted architecture enabled a simple user experience and offered broad hardware compatibility. Rather than exposing I/O diversity to the virtual machines, VMware Workstation also relied on software emulation of I/O devices. The VMM combined a trap-and-emulate direct execution engine with a system-level dynamic binary translator to ef- ficiently virtualize the x86 architecture and support most commodity operating systems. -
Apple Computer: the Iceo Seizes the Internet
UC Irvine Globalization of I.T. Title Apple Computer: The iCEO Seizes the Internet Permalink https://escholarship.org/uc/item/4sq9672p Author West, Joel Publication Date 2002-10-01 eScholarship.org Powered by the California Digital Library University of California Apple Computer: The iCEO Seizes the Internet October 2002 JOEL WEST Center for Research on Information Technology and Organizations University of California, Irvine CRITO (Center for Research on Information Technology and Organization) University of California, Irvine 3200 Berkeley Place North Irvine, California 92697-4650 949.824.6387 Tel. 949.824.8091 Fax [email protected] ______________________________________________________________________________ Center for Research on Information Technology and Organizations University of California, Irvine | www.crito.uci.edu Apple Computer: The iCEO Seizes the Internet Joel West <[email protected]> Center for Research on Information Technology and Organizations University of California, Irvine http://www.crito.uci.edu/ October 20, 2002 Contents 1. From Innovation to Crisis...................................................................................... 2 Go-it Alone Standards Strategy .....................................................................3 Failure to Respond to Windows Challenge.................................................... 3 2. Revised Business Strategy .....................................................................................4 Technology.................................................................................................... -
The New Iphone SE Our Meetings
The offcial journal of the Wellington Macintosh Society Inc Volume 37.04 – April 2020 Come to one of The new iPhone SE our meetings Online Monday 27 April 7:00 pm for 7:30 pm Subject: Catch-up, Q&A, Contact methods Online Monday 4 May 7:00 pm for 7:30 pm Subject: Picking a new Mac notebook iPad Group TBA Help Desk TBA Apple has reused the “iPhone SE” name to introduce a new iPhone with a low price and design similar to the iPhone models, but with the latest technology inside. Where to find us Due to the COVID-19 pandemic, we will not be able to hold physical meetings under alert level 4 or 3, and they may not be practical under alert level 2. In the meantime we will be running online meetings via Zoom, normally on the same monthly schedule as our Wellington meeting: the evening of the last Monday each month. Meeting invitations will be sent to members via email. If non-members or former members would like to attend a meeting on a trial basis, please email [email protected]. The Birth of the Wellington Apple Users INSIDE The President Writes p2 David’s Tech Guide p3 Group p10 Apple’s 44th birthday p5 Committee Contact Details p12 The Birth of iOS p8 CAPITAL APPLE – APRIL 2020 PAGE 1 The president writes ... With all these disruptions, there is now an opportunity to look at our vision for the future and to work out where we should be going. Looking back to the founding of the group in 1984, it was the young early adopters of computers that banded together in a mutual self help manner, as there was little support available. -
Standard Based Monopolies and Near Monpolies: the Wintel Example
Standard Based Monopolies and Near Monopolies: The WinTel Example By John F. McGowan, Ph.D. May 3, 1999 Abstract Standard-based monopolies and near monopolies are based on control of de facto industry standards. Usually the monopolist’s product or service is a component of or comprises a network whose many components must work together to produce a useful result. Standardization of the components is required for the network to function. In such situations, customers may become locked into the network that they participate in. Even if a competing network exists, there is substantial cost and practical obstacles to converting to the competing network of products, services, and associated standards. A near monopolist can charge more than its costs and earn monopoly profits due to lock-in. Control of the de facto standards is often achieved and maintained through frequent arbitrary changes to the standards, usually marketed as technological innovation. Intellectual property rights such as patents may also be exploited. Microsoft and Intel are prominent current examples of near monopolies based on control of de facto standards. Introduction A monopoly is a single seller. A monopoly can earn monopoly profits because customers must either buy the product or service at the price set by the monopoly or not buy at all. In a market with many sellers, competition drives the price of a product or service down to the cost of the seller. With a single seller, the seller can charge a higher price than costs. The seller cannot charge any price because at some point the customers will simply not buy the product or service. -
Wintel: Cooperation Or Conflict
#05-083 Wintel: Cooperation or Conflict Ramon Casadesus-Masanell David B. Yoffie Copyright © 2005 Working papers are in draft form. This working paper is distributed for purposes of comment and discussion only. It may not be reproduced without permission of the copyright holder. Copies of working papers are available from the author. Wintel: Cooperation or Conflict∗ Ramon Casadesus-Masanell† David B. Yoffie‡ April 13, 2005 Abstract We study the incentives of complementors (producers of complementary products) to cooperate vs. compete and how these interact. In a system of complements, like the PC, the value of the final product depends on how well the different components work together. This, in turn, depends on the firms’ investment in complementary R&D. We ask whether profit maximizing complementors will fully cooperate to make the final product as valuable as possible. Contrary to the popular view that two tight complements will generally have well aligned incentives, we demonstrate that natural conflicts emerge over pricing, the timing of investments, and who captures the greatest value at different phases of product generations. Preliminary draft ∗We thank Vicente Salas Fumás, Michal Pozarzycki, Ana Sotelo, and seminar participants at IESE’s ‘Brown Bag’ series for helpful comments. †Harvard Business School and IESE Business School ‡Harvard Business School 1 1 Introduction Intel and Microsoft are perhaps the best known pair of complementary firms in the world. More than 80% of the personal computers worldwide ship with an Intel microprocessor running Microsoft’s Windows operating system. Since 1980, when IBM chose both Intel and Microsoft as the core components of the first IBM PC, Intel and Microsoft have been joined at the hip. -
"Design Rules, Volume 2: How Technology Shapes Organizations
Design Rules, Volume 2: How Technology Shapes Organizations Chapter 17 The Wintel Standards-based Platform Carliss Y. Baldwin Working Paper 20-055 Design Rules, Volume 2: How Technology Shapes Organizations Chapter 17 The Wintel Standards-based Platform Carliss Y. Baldwin Harvard Business School Working Paper 20-055 Copyright © 2019 by Carliss Y. Baldwin Working papers are in draft form. This working paper is distributed for purposes of comment and discussion only. It may not be reproduced without permission of the copyright holder. Copies of working papers are available from the author. Funding for this research was provided in part by Harvard Business School. © Carliss Y. Baldwin Comments welcome. Please do not circulate or quote. Design Rules, Volume 2: How Technology Shapes Organizations Chapter 17 The Wintel Standards-based Platform By Carliss Y. Baldwin Note to Readers: This is a draft of Chapter 17 of Design Rules, Volume 2: How Technology Shapes Organizations. It builds on prior chapters, but I believe it is possible to read this chapter on a stand-alone basis. The chapter may be cited as: Baldwin, C. Y. (2019) “The Wintel Standards-based Platform,” HBS Working Paper (November 2019). I would be most grateful for your comments on any aspect of this chapter! Thank you in advance, Carliss. Abstract The purpose of this chapter is to use the theory of bottlenecks laid out in previous chapters to better understand the dynamics of an open standards-based platform. I describe how the Wintel platform evolved from 1990 through 2000 under joint sponsorship of Intel and Microsoft. I first describe a series of technical bottlenecks that arose in the early 1990s concerning the “bus architecture” of IBM-compatible PCs. -
The Dynamic Capabilities View of Coopetition: the Case of Intel, Apple and Microsoft
The Dynamic Capabilities View of Coopetition: The Case of Intel, Apple and Microsoft Chiara Di Guardo Marco Galvagno University of Cagliari University of Catania 2nd EIASM Workshop on Coopetition Strategy Bocconi School of Management, Milan, Italy, Sept. 14-15, 2006 Summary Research overview Research questions Lenses for investigation Conceptual Framework Narrative case study Conclusions Contribution and limitations Research overview The paradoxical relationship between cooperation and competition What we already know: Competitors can cooperate and become both more competitive Coopetitive firms have the capability to manage cooperation and competition better than peers or competitors. What we don’t know well: How such a capability develops within a firm? Would it be possible for very good partners to become competitors? Research overview (cont’d) Overarching research question Cooperation Competition ? Research overview (cont’d) Motivations Increasing importance of coopetition as a strategic device : Coopetition have a positive effect on firms’ performance Coopetition as a way to renew organizations and prevent competency traps Coopetition as a strategy to cope with turbulent environments Research questions: How do firms develop coopetitive strategies? Partially convergent interest structure [Dagnino and Padula, 2006] What drives a firm’s decision to compete against a partner? Alliance competence or capability [Kale and Singh, 1999; Anand and Khanna, 2000; Kale et al., 2002; Lambe et al., 2002] Lenses for investigation -
The Future of Quantitative Computing
Numerical Algorithms Group Title: The Future of Quantitative Computing Summary: Numerical Algorithms Group (NAG) recently announced they had been collaborating with Advanced Micro Devices (AMD) to produce math libraries for AMD’s next generation microprocessor- a 64-bit high performance chip named Opteron™. This paper includes the interview between Jim Finnegan, editor of Financial Engineering News, and Dr. Ian Reid, vice president of business development at NAG to discuss the significance of this announcement. Finnegan: So tell me more about your relationship with AMD based on their recent announcements? Reid: We’ve been working with AMD to develop the basic math libraries for their new 64-bit chips generically termed AMD64. On the one hand, there is a very basic math library all compilers need and it provides the likes of trigonometric functions (sine, cosine etc). What we’ve done with AMD is to make these functions very high performance and accurate. And let me stress “accurate” in that statement, because what we’ve found that some people emphasize computational speed over accuracy. They’ll come to us and say ‘Well, you are slower than Company X on these speed benchmarks.’ But we come back and say, ‘Well yes, but we get the right answer and they don’t. So, how fast do you want the wrong answer?’ It’s the combination of speed and accuracy that defines for us the most important metric which is computational efficiency. Finnegan: So is your basic math library to be used on the new AMD chip, is this something that is part of their new chip architecture? Reid: No. -
101 Ways to Save Apple by James Daly
http://www.wired.com/wired/archive/5.06/apple_pr.html 101 Ways to Save Apple By James Daly An assessment of what can be done to fix a once-great company. Dear Apple, In the movie Independence Day, a PowerBook saves the earth from destruction. Now it's time to return the favor. Unfortunately, even devoted Mac addicts must admit that you look a little beleaguered these days: a confusing product line, little inspiration from the top, software developers fleeing. But who wants to live in a world without you? Not us. So we surveyed a cross section of hardcore Mac fans and came up with 101 ways to get you back on the path to salvation. We chose not to resort to time travel or regurgitate the same old shoulda/coulda/wouldas (you shoulda licensed your OS in 1987, for instance, or coulda upped your price/performance in 1993). We don't believe Apple is rotten to the core. Chrysler nearly went under in the late 1970s and came back to lead its industry. Here's a fresh assessment of what can be done to fix your once-great company using the material at hand. Don't wait for a miracle. You have the power to save the world - and yourself. Edited by James Daly 1. Admit it. You're out of the hardware game. Outsource your hardware production, or scrap it entirely, to compete more directly with Microsoft without the liability of manufacturing boxes. 2. License the Apple name/technology to appliance manufacturers and build GUIs for every possible device - from washing machines to telephones to WebTV. -
The Big Tip Book for the Apple II Series 1986.Pdf
for the Apple®II Series ~ THE BIG TIP BOOK FOR THE APPLE II SERIES Bantam Computer Books Ask your bookseller for the books you have missed AMIGA DOS USER'S MANUAL by Commodore-Amiga, Inc. THE APPLE /le BOOK by Bill O'Brien THE COMMODORE 64 SURVIVAL MANUAL by Winn L. Rosch COMMODORE 128 PROGRAMMER'S REFERENCE GUIDE by Commodore Business Machines, Inc. EXPLORING ARTIFICIAL INTELLIGENCE ON YOUR APPLE II by Tim Hartnell EXPLORING ARTIFICIAL INTELLIGENCE ON YOUR COMMODORE 64 by Tim Hartnell EXPLORING ARTIFICIAL INTELLIGENCE ON YOUR IBM PC by Tim Hartnell EXPLORING THE UNIX ENVIRONMENT by The Waite Group/Irene Pasternack FRAMEWORK FROM THE GROUND UP by The Waite Group/Cynthia Spoor and Robert Warren HOW TO GET THE MOST OUT OF COMPUSERVE, 2d ed. by Charles Bowen and David Peyton HOW TO GET THE MOST OUT OF THE SOURCE by Charles Bowen and David Peyton MACINTOSH C PRIMER PLUS by The Waite Group/Stephen W. Prata THE MACINTOSH by Bill O'Brien THE NEW jr: A GUIDE TO IBM'S PCjr by Winn L. Rosch ORCHESTRATING SYMPHONY by The Waite Group/Dan Schafer PC-DOS/MS-DOS User's Guide to the Most Popular Operating System for Personal Computers by Alan M. Boyd POWER PAINTING: COMPUTER GRAPHICS ON THE MACINTOSH by Verne Bauman and Ronald Kidd/illustrated by Gasper Vaccaro SMARTER TELECOMMUNICATIONS Hands-On Guide to On-Line Computer Services by Charles Bowen and Stewart Schneider SWING WITH JAZZ: LOTUS JAZZ ON THE MACINTOSH by Datatech Publications Corp./Michael McCarty TEACH YOUR BABY TO USE A COMPUTER Birth Through Preschool by Victoria Williams, Ph.D.