Operating Systems

Total Page:16

File Type:pdf, Size:1020Kb

Operating Systems Operating Systems Introduction, Processes, Threads Daniel Gruss October 2, 2020 Table of contents www.tugraz.at 1. Basics 2. History 3. Booting 4. Process and Thread Fundamentals 5. Context Switches 6. Process and Thread Organization 1 Basics What is an Operating System www.tugraz.at 2 What is an Operating System www.tugraz.at 3 What is an Operating System www.tugraz.at 4 What is an Operating System www.tugraz.at Run on all sorts of devices: Servers, Desktops, Notebooks Tablets, Smartphones Routers, Switches, Displays Door Locks, Washing Machines, Toasters Cars, Airplanes .... We focus on general purpose operating systems 5 Operating System Roles www.tugraz.at Referee Illusionist Glue 6 Operating System Roles: Referee www.tugraz.at Referee Manage resource allocation among users and applications Isolation of different users, applications from each other Isolation of applications and operating system Communication between users, application 7 Operating System Roles: Illusionist www.tugraz.at Illusionist Abstraction of hardware and other things Makes application design simpler Each application appears to have the entire machine to itself Illusion of Infinite number of processors (near) infinite amount of memory reliable storage reliable network transport 8 Operating System Roles: Glue www.tugraz.at Glue Libraries, user interface widgets, . 9 Example: File Systems www.tugraz.at Referee Prevent users from accessing each other's files without permission Even after a file is deleted and its space re-used Illusionist Files can grow (nearly) arbitrarily large Files persist even when the machine crashes in the middle of a save 10 Example: File Systems www.tugraz.at Glue Nam ed directories, printf, . 11 OS Design Patterns I www.tugraz.at OS challenges are not unique - apply to many different computing domains many complex software systems have multiple users run programs written by third-party developers need to coordinate simultaneous activities 12 OS Design Patterns II www.tugraz.at Challenges: resource allocation fault isolation communication abstraction how to provide a set of common services 13 Reliability and Availability Security Portability Performance Adoption Design Criteria for OS www.tugraz.at Design Criteria for Operating Systems 14 Security Portability Performance Adoption Design Criteria for OS www.tugraz.at Design Criteria for Operating Systems Reliability and Availability 14 Portability Performance Adoption Design Criteria for OS www.tugraz.at Design Criteria for Operating Systems Reliability and Availability Security 14 Performance Adoption Design Criteria for OS www.tugraz.at Design Criteria for Operating Systems Reliability and Availability Security Portability 14 Adoption Design Criteria for OS www.tugraz.at Design Criteria for Operating Systems Reliability and Availability Security Portability Performance 14 Design Criteria for OS www.tugraz.at Design Criteria for Operating Systems Reliability and Availability Security Portability Performance Adoption 14 It does, what it is designed to do Application failures can be \ok" - OS provides fault isolation and clean restart after errors OS errors are bad, real bad... Reliability and Availability www.tugraz.at Reliability 15 Application failures can be \ok" - OS provides fault isolation and clean restart after errors OS errors are bad, real bad... Reliability and Availability www.tugraz.at Reliability It does, what it is designed to do 15 Reliability and Availability www.tugraz.at Reliability It does, what it is designed to do Application failures can be \ok" - OS provides fault isolation and clean restart after errors OS errors are bad, real bad... 15 hostile environment (viruses, malicious code take control) testing helps - but is much more difficult extremely rare corner cases can occur regularly Reliability www.tugraz.at Making an OS reliable is challenging 16 Reliability www.tugraz.at Making an OS reliable is challenging hostile environment (viruses, malicious code take control) testing helps - but is much more difficult extremely rare corner cases can occur regularly 16 Percentage of time the system is usable Buggy OS that loses users work is unreliable AND unavailable Buggy OS that never loses users work is reliable BUT unavailable Buggy OS that has been subverted but continues to run (and e.g. logs keystrokes and sends them of) is available BUT unreliable Availability www.tugraz.at Availability 17 Buggy OS that loses users work is unreliable AND unavailable Buggy OS that never loses users work is reliable BUT unavailable Buggy OS that has been subverted but continues to run (and e.g. logs keystrokes and sends them of) is available BUT unreliable Availability www.tugraz.at Availability Percentage of time the system is usable 17 Availability www.tugraz.at Availability Percentage of time the system is usable Buggy OS that loses users work is unreliable AND unavailable Buggy OS that never loses users work is reliable BUT unavailable Buggy OS that has been subverted but continues to run (and e.g. logs keystrokes and sends them of) is available BUT unreliable 17 Reliability and Availability www.tugraz.at Reliablity and Availability are desireable Two factors: MTTF: mean time to failure MTTR: mean time to repair 18 Security www.tugraz.at Security: computers operation cannot be compromised by a malicious attacker Privacy: data stored on the computer is only accessible to authorized users 19 Security www.tugraz.at Unfortunately: no useful computer is perfectly secure! OS is a complex piece of software complex software has bugs bugs can be exploited HW may be tampered with Sysadmin may be untrustworthy SW-developer may be untrustworthy (backdoors) 20 Security www.tugraz.at OS should be designed to minimize its vulnerability to attack Fault isolation But: interaction between users and programs required 21 Security Policy www.tugraz.at Security Policy defines who can access what data who can perform what operations 22 Policies and Enforcement may possess vulnerabilities... Enforcement www.tugraz.at Enforcment ensures that policy is followed 23 Enforcement www.tugraz.at Enforcment ensures that policy is followed Policies and Enforcement may possess vulnerabilities... 23 does not change as the hardware changes Portability is an important design criteria of the OS don't want to reimplement everything when HW changes e.g. iOS was derived from the MacOS X code base Portability www.tugraz.at OS provides an abstraction of underlying HW 24 Portability is an important design criteria of the OS don't want to reimplement everything when HW changes e.g. iOS was derived from the MacOS X code base Portability www.tugraz.at OS provides an abstraction of underlying HW does not change as the hardware changes 24 don't want to reimplement everything when HW changes e.g. iOS was derived from the MacOS X code base Portability www.tugraz.at OS provides an abstraction of underlying HW does not change as the hardware changes Portability is an important design criteria of the OS 24 e.g. iOS was derived from the MacOS X code base Portability www.tugraz.at OS provides an abstraction of underlying HW does not change as the hardware changes Portability is an important design criteria of the OS don't want to reimplement everything when HW changes 24 Portability www.tugraz.at OS provides an abstraction of underlying HW does not change as the hardware changes Portability is an important design criteria of the OS don't want to reimplement everything when HW changes e.g. iOS was derived from the MacOS X code base 24 Windows 10 based on Windows NT (started 1988) MS/DOS introduced 1981 - phased out ~2000 First Linux release 1991 Portability www.tugraz.at Lifetime of successful operating systems measured in decades 25 MS/DOS introduced 1981 - phased out ~2000 First Linux release 1991 Portability www.tugraz.at Lifetime of successful operating systems measured in decades Windows 10 based on Windows NT (started 1988) 25 First Linux release 1991 Portability www.tugraz.at Lifetime of successful operating systems measured in decades Windows 10 based on Windows NT (started 1988) MS/DOS introduced 1981 - phased out ~2000 25 Portability www.tugraz.at Lifetime of successful operating systems measured in decades Windows 10 based on Windows NT (started 1988) MS/DOS introduced 1981 - phased out ~2000 First Linux release 1991 25 Portability www.tugraz.at An OS must be designed to support applications that have not yet been written and hardware that has not been developed Simple, standard way for applications to interact with OS API memory access model instructions that can be executed 26 Example for a highly portable OS? Hardware Abstraction Layer www.tugraz.at in older/more theoretical literature sometimes \Abstract Virtual Machine" provides fixed point across which both application and hardware can develop independently 27 Hardware Abstraction Layer www.tugraz.at in older/more theoretical literature sometimes \Abstract Virtual Machine" provides fixed point across which both application and hardware can develop independently Example for a highly portable OS? 27 Performance www.tugraz.at Performance associated with application - OS design can affect the percieved performance OS decides when app can run how much memory it gets etc. Performance can be measured in different ways Overhead / Efficiency Added (lack of) cost of implementing an abstraction presented to applications
Recommended publications
  • The Profession of IT Multitasking Without Thrashing Lessons from Operating Systems Teach How to Do Multitasking Without Thrashing
    viewpoints VDOI:10.1145/3126494 Peter J. Denning The Profession of IT Multitasking Without Thrashing Lessons from operating systems teach how to do multitasking without thrashing. UR INDIVIDUAL ABILITY to The first four destinations basi- mercial world with its OS 360 in 1965. be productive has been cally remove incoming tasks from your Operating systems implement mul- hard stressed by the sheer workspace, the fifth closes quick loops, titasking by cycling a CPU through a load of task requests we and the sixth holds your incomplete list of all incomplete tasks, giving each receive via the Internet. In loops. GTD helps you keep track of one a time slice on the CPU. If the task 2001, David Allen published Getting these unfinished loops. does not complete by the end of its O 1 Things Done, a best-selling book about The idea of tasks being closed loops time slice, the OS interrupts it and puts a system for managing all our tasks to of a conversation between a requester it on the end of the list. To switch the eliminate stress and increase produc- and a perform was first proposed in CPU context, the OS saves all the CPU tivity. Allen claims that a considerable 1979 by Fernando Flores.5 The “condi- registers of the current task and loads amount of stress comes our way when tions of satisfaction” that are produced the registers of the new task. The de- we have too many incomplete tasks. by the performer define loop comple- signers set the time slice length long He views tasks as loops connecting tion and allow tracking the movement enough to keep the total context switch someone making a request and you of the conversation toward completion.
    [Show full text]
  • 1St Slide Set Operating Systems
    Organizational Information Operating Systems Generations of Computer Systems and Operating Systems 1st Slide Set Operating Systems Prof. Dr. Christian Baun Frankfurt University of Applied Sciences (1971–2014: Fachhochschule Frankfurt am Main) Faculty of Computer Science and Engineering [email protected] Prof. Dr. Christian Baun – 1st Slide Set Operating Systems – Frankfurt University of Applied Sciences – WS2021 1/24 Organizational Information Operating Systems Generations of Computer Systems and Operating Systems Organizational Information E-Mail: [email protected] !!! Tell me when problems problems exist at an early stage !!! Homepage: http://www.christianbaun.de !!! Check the course page regularly !!! The homepage contains among others the lecture notes Presentation slides in English and German language Exercise sheets in English and German language Sample solutions of the exercise sheers Old exams and their sample solutions What is the password? There is no password! The content of the English and German slides is identical, but please use the English slides for the exam preparation to become familiar with the technical terms Prof. Dr. Christian Baun – 1st Slide Set Operating Systems – Frankfurt University of Applied Sciences – WS2021 2/24 Organizational Information Operating Systems Generations of Computer Systems and Operating Systems Literature My slide sets were the basis for these books The two-column layout (English/German) of the bilingual book is quite useful for this course You can download both books for free via the FRA-UAS library from the intranet Prof. Dr. Christian Baun – 1st Slide Set Operating Systems – Frankfurt University of Applied Sciences – WS2021 3/24 Organizational Information Operating Systems Generations of Computer Systems and Operating Systems Learning Objectives of this Slide Set At the end of this slide set You know/understand.
    [Show full text]
  • BCIS 1305 Business Computer Applications
    BCIS 1305 Business Computer Applications BCIS 1305 Business Computer Applications San Jacinto College This course was developed from generally available open educational resources (OER) in use at multiple institutions, drawing mostly from a primary work curated by the Extended Learning Institute (ELI) at Northern Virginia Community College (NOVA), but also including additional open works from various sources as noted in attributions on each page of materials. Cover Image: “Keyboard” by John Ward from https://flic.kr/p/tFuRZ licensed under a Creative Commons Attribution License. BCIS 1305 Business Computer Applications by Extended Learning Institute (ELI) at NOVA is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted. CONTENTS Module 1: Introduction to Computers ..........................................................................................1 • Reading: File systems ....................................................................................................................................... 1 • Reading: Basic Computer Skills ........................................................................................................................ 1 • Reading: Computer Concepts ........................................................................................................................... 1 • Tutorials: Computer Basics................................................................................................................................ 1 Module 2: Computer
    [Show full text]
  • Virtualization and Security Aspects: an Overview
    Rui Filipe Pereira, Rui Miguel Silva & João Pedro Orvalho Virtualization and Security Aspects: An Overview Rui Filipe Pereira [email protected] Lab UbiNET – Computer Science Security and Cybercrime Polytechnic Institute Of Beja Beja, Portugal Rui Miguel Silva [email protected] Lab UbiNET – Computer Science Security and Cybercrime Polytechnic Institute Of Beja Beja, Portugal João Pedro Orvalho [email protected] Lab UbiNET – Computer Science Security and Cybercrime Polytechnic Institute Of Beja Beja, Portugal Abstract Virtualization allows a single system to concurrently run multiple isolated virtual machines, operating systems (OSes) or multiple instances of a single OS. It helps organizations to improve operational efficiency, reduce costs, improve the use of hardware, and to allocate resources on- demand. Nevertheless, like most technologies, it has vulnerabilities and threats. Research about security issues related to virtualization has been conducted for several years. However, there are still open challenges related to security in virtualization. This paper looks into some of the differences, issues, challenges, and risks caused by virtualization and aims to classify the various virtualization approaches, along with their goals, advantages and drawbacks from a security perspective. Such classification is expected to help in the identification of virtualization technologies that might be applied in a virtualized infrastructure. This work is intended to be an introduction to the security considerations, concerns, and implications arising from use of virtualized systems. Keywords: Virtualization, Cybersecurity, Hypervisor, Virtual Machine, Virtual Machine Monitor. 1. INTRODUCTION Virtualization is a technology that uses a logical environment to overcome the physical limitations of hardware. Due to its characteristics of encapsulation and isolation, virtualization is the basis for cloud computing paradigm.
    [Show full text]
  • Sistemas Operativos Moviles: Funcionalidades, Efectividad Y Aplicaciones Utiles En Colombia. Sanly Aponte Gomez Carlos Davila Ra
    SISTEMAS OPERATIVOS MOVILES: FUNCIONALIDADES, EFECTIVIDAD Y APLICACIONES UTILES EN COLOMBIA. SANLY APONTE GOMEZ CARLOS DAVILA RAMIREZ UNIVERSIDAD EAN FACULTAD DE INGENIERIA DE SISTEMAS TEKHLAR BOGOTA 2011 SISTEMAS OPERATIVOS MOVILES: FUNCIONALIDADES, EFECTIVIDAD Y APLICACIONES UTILES EN COLOMBIA. SANLY APONTE GOMEZ CARLOS DAVILA RAMIREZ Proyecto de Grado Tekhlar II como requisito para optar al título de Ingeniero en Sistemas Asesor ING. JAVIER DUARTE UNIVERSIDAD EAN FACULTAD DE INGENIERIA DE SISTEMAS TEKHLAR BOGOTA 2011 DEDICATORIA SANLY APONTE GOMEZ MIS ESFUERZOS SE LOS DEDICO: A DIOS. Por ser mí guía, fortaleza y protección en cada momento de mi vida, pasando cada día los obstáculos presentados en mis estudios hasta alcanzar mis metas profesionales. A MIS PADRES. Carmen Lucy Gómez Penna y Jaime Aponte Rivillas. Con todo mi amor, les agradezco por confiar en mí, por darme la vida y guiarme por el camino correcto. Es por eso que pude lograr la culminación de mis estudios profesionales, porque sin ustedes no los hubiera finalizado. A MIS HERMANOS. Luis Enrique Aponte y José Alfredo Aponte. Gracias por apoyarme y darme valor en los momentos más difíciles de mis estudios ya que soy un punto de referencia para ustedes. A MI TIA. Yolima Aponte Por ofrecerme todo su apoyo incondicional guiándome en mi vida personal y estudio profesional. A MI COMPAÑERO DE PROYECTO. Carlos Dávila Ramírez. Por su apoyo y acompañamiento en el desarrollo de este Proyecto de Grado que hoy entregamos finalmente. AGRADECIMIENTOS. Agradezco a la UNIVERSIDAD EAN por su buena educación a nivel personal y profesional, dándome buenas prácticas de aprendizaje y oportunidades de desarrollarme como Ingeniera de Sistemas.
    [Show full text]
  • 1St Slide Set Operating Systems
    Organizational Information Operating Systems Generations of Computer Systems and Operating Systems 1st Slide Set Operating Systems Prof. Dr. Christian Baun Frankfurt University of Applied Sciences (1971–2014: Fachhochschule Frankfurt am Main) Faculty of Computer Science and Engineering [email protected] Prof. Dr. Christian Baun – 1st Slide Set Operating Systems – Frankfurt University of Applied Sciences – WS1920 1/31 Organizational Information Operating Systems Generations of Computer Systems and Operating Systems Organizational Information E-Mail: [email protected] !!! Tell me when problems problems exist at an early stage !!! Homepage: http://www.christianbaun.de !!! Check the course page regularly !!! The homepage contains among others the lecture notes Presentation slides in English and German language Exercise sheets in English and German language Sample solutions of the exercise sheers Old exams and their sample solutions Participating in the exercises is not a precondition for exam participation But it is recommended to participate the exercises The content of the English and German slides is identical, but please use the English slides for the exam preparation to become familiar with the technical terms Prof. Dr. Christian Baun – 1st Slide Set Operating Systems – Frankfurt University of Applied Sciences – WS1920 2/31 Organizational Information Operating Systems Generations of Computer Systems and Operating Systems The Way a good Course works. Image Source: Google Mr. Miyagi says: „Not only the student learns from his master, also the master learns from his student.“ Active participation please! Prof. Dr. Christian Baun – 1st Slide Set Operating Systems – Frankfurt University of Applied Sciences – WS1920 3/31 Organizational Information Operating Systems Generations of Computer Systems and Operating Systems Things, which are bad during a Course.
    [Show full text]
  • Operating Systems What Is OS?
    Operating Systems What is OS? Operating System is a software, which makes a computer to actually work. It is the software the enables all the programs we use. The OS organizes and controls the hardware. OS acts as an interface between the application programs and the machine hardware. Examples: Windows, Linux, Unix and Mac OS, etc., What OS does? An operating system performs basic tasks such as, controlling and allocating memory, prioritizing system requests, controlling input and output devices, facilitating networking and managing file systems. Structure of Operating System: Application Programs System Programs Software (Operating System) HARDWARE (Contd…) Structure of Operating System (Contd…): The structure of OS consists of 4 layers: 1. Hardware Hardware consists of CPU, Main memory, I/O Devices, etc, 2. Software (Operating System) Software includes process management routines, memory management routines, I/O control routines, file management routines. (Contd…) Structure of Operating System (Contd…): 3. System programs This layer consists of compilers, Assemblers, linker etc. 4. Application programs This is dependent on users need. Ex. Railway reservation system, Bank database management etc., Evolution of OS: The evolution of operating systems went through seven major phases. Six of them significantly changed the ways in which users accessed computers through the open shop, batch processing, multiprogramming, timesharing, personal computing, and distributed systems. In the seventh phase the foundations of concurrent programming were developed and demonstrated in model operating systems. (Contd…) Evolution of OS (contd..): Major Technical Operating Phases Innovations Systems Open Shop The idea of OS IBM 701 open shop (1954) Batch Tape batching, BKS system (1961) First-in, first-out Processing scheduling.
    [Show full text]
  • Operating Systems What Is OS?
    Operating Systems What is OS? • Operating System is a software, which makes a computer to actually work. • It is the software the enables all the programs we use. • The OS organizes and controls the hardware. • OS acts as an interface between the application programs and the machine hardware. • Examples: Windows, Linux, Unix and Mac OS, etc., What OS does? An operating system performs basic tasks such as, • controlling and allocating memory, • prioritizing system requests, • controlling input and output devices, • facilitating networking and • managing file systems. Structure of Operating System Application Programs System Programs Software (Operating System) HARDWARE (Contd…) Structure of Operating System (Contd…) The structure of OS consists of 4 layers: 1. Hardware Hardware consists of CPU, Main memory, I/O Devices, etc, 2. Software (Operating System) Software includes process management routines, memory management routines, I/O control routines, file management routines. (Contd…) Structure of Operating System (Contd…) 3. System programs This layer consists of compilers, Assemblers, linker etc. 4. Application programs This is dependent on users need. Ex. Railway reservation system, Bank database management etc., Evolution of OS • The evolution of operating systems went through seven major phases. • Six of them significantly changed the ways in which users accessed computers through the open shop, batch processing, multiprogramming, timesharing, personal computing, and distributed systems. • In the seventh phase the foundations of concurrent programming were developed and demonstrated in model operating systems. (Contd…) Evolution of OS (contd..) Major Phases Technical Innovations Operating Systems Open Shop The idea of OS IBM 701 open shop (1954) Batch Processing Tape batching, BKS system (1961) First-in, first-out scheduling.
    [Show full text]
  • Desarrollo De Herramientas Didácticas Para El Aprendizaje De Symbian OS
    ESCUELA TÉCNICA SUPERIOR DE INGENIERÍA DE TELECOMUNICACIÓN UNIVERSIDAD POLITÉCNICA DE CARTAGENA Proyecto Fin de Carrera Desarrollo de herramientas didácticas para el aprendizaje de Symbian OS AUTOR: Carlos José Piñera Sánchez DIRECTOR: Javier Vales Alonso Octubre / 2007 Autor Carlos José Piñera Sánchez E-mail del Autor [email protected] Director(es) Javier Vales Alonso E-mail del Director [email protected] Codirector(es) - Título del PFC Desarrollo de herramientas didácticas para el aprendizaje de Symbian OS Descriptores Symbian, Sony Ericsson P800, J2ME, C++, Carbide C++, Netbeans Resumen Debido al gran interés que suscitan en la sociedad de hoy en dia los dispositivos móviles, estos, han sufrido una gran evolución en los últimos años. Se han producido una gran cantidad de cambios, tanto en el hardware como en el software ampliando sus capacidades hasta unos límites inimaginables hace algunos años. Este desarrollo ha producido la necesidad de nuevos entornos para los mismos, produciendo el desarrollo de nuevos sistemas operativos encargados de gestionar los dispositivos. Entre todos estos sistemas operativos destaca Symbian OS, ya que nació de un consorcio entre las grandes marcas de desarrollo de tecnología móvil (Nokia, Sony Ericsson, LG, Samsung, etc.) y por tanto ha sido apoyado e incluido en todos sus terminales mas avanzados. Symbian OS es hoy en dia el sistema operativo para sistemas móviles mas expandido. Posee una gran cantidad de peculiaridades que lo hace atractivo para la gestión y desarrollo sobre smartphones. Por todo ello surge la necesidad de aprender a utilizar este sistema operativo. En este proyecto se han desarrollado un completo tutorial de aprendizaje de Symbian/OS, que reúne y explica todas las herramientas que proporciona.
    [Show full text]
  • IBM Research Report Performance and Security Lessons Learned from Virtualizing the Alpha Processor
    RC 24111 (W0611-124), 27 November 2006 Computer Science IBM Research Report Performance and Security Lessons Learned from Virtualizing the Alpha Processor Paul A. Karger IBM Research Division Thomas J. Watson Research Center P. O. Box 704 Yorktown Heights, NY 10598, USA Research Division IBM Almaden – Austin – Beijing – Delhi – Haifa – T.J. Watson – Tokyo – Zurich Limited Distribution Notice: This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). Some reports are available at http://www.research.ibm.com/resources/paper_search.html. Copies may requested from IBM T.J. Watson Research Center, 16-220, P.O. Box 218, Yorktown Heights, NY 10598 or send email to [email protected]. This paper has been submitted to the 27th International Symposium on Computer Architecture (ISCA 2007). Performance and Security Lessons Learned from Virtualizing the Alpha Processor Paul A. Karger IBM Thomas J. Watson Research Center PO Box 704, Yorktown Heights, NY 10598 [email protected] ABSTRACT Virtualization has become much more important throughout the computer industry both to improve security and to support multiple workloads on the same hardware with effective isolation between those workloads. The most widely used chip architecture, the Intel and AMD x86 processors, have begun to support virtualization, but the initial implementations show many problem areas.
    [Show full text]
  • Chilton Atlas Hardware at the National Museums Scotland
    Chilton Atlas hardware at the National Museums Scotland. Simon Lavington. November 2013. [email protected] Contents. Summary 2 1. Origins: Atlas in its historical context. 3 2. Atlas in the market-place. 4 3. Relative performance, then and now. 5 4. The Atlas Computer Laboratory at Chilton, Berkshire. 6 5. Technical details of the Chilton Atlas. 9 6. Physical details of equipment layout at Chilton. 10 7. The Atlas artefacts in store at the National Museums Scotland. 14 8. Condition of the units in the NMS Granton store. 19 9. The historical significance of Atlas. 21 Appendix A: Surviving Atlas hardware at other museums. 23 Appendix B: Bibliography and other sources of Atlas information 27 Acknowledgements. Several former Atlas people have helped with technical details. Particular mention should be made of Bob Hopgood, Ted Doubtfire and Yao Chen, all of whom worked on the Chilton Atlas. Picture credits to copyright holders. National Museums Scotland Figures 1(a) and 4. Museum of Science & Industry, Manchester Figure 2. STFC Rutherford Appleton Laboratory Figures 3, 5, 6, 7 and 8 Simon Lavington Figures 1(b), 9 to 16(a), 17(a), Table A2 Science Museum, London Figure 16(b), Table A1 D B G Edwards Figure 17 (b) Computer History Museum, California Table A3. 1 Chilton Atlas hardware at the National Museums Scotland. Summary. In 1962 the British-designed Ferranti Atlas supercomputer was, briefly, the world’s most powerful computing system. In 1973 Dr A G Thomson, Keeper of the Department of Technology at the Royal Scottish Museum, asked the Science Research Council to donate some representative sections of a redundant Atlas for preservation and eventual display.
    [Show full text]
  • CYBERSECURITY When Will You Be Hacked?
    SUFFOLK ACADEMY OF LAW The Educational Arm of the Suffolk County Bar Association 560 Wheeler Road, Hauppauge, NY 11788 (631) 234-5588 CYBERSECURITY When Will You Be Hacked? FACULTY Victor John Yannacone, Jr., Esq. April 26, 2017 Suffolk County Bar Center, NY Cybersecurity Part I 12 May 2017 COURSE MATERIALS 1. A cybersecurity primer 3 – 1.1. Cybersecurity practices for law firms 5 – 1.2. Cybersecurity and the future of law firms 11 – 2. Information Security 14 – 2.1. An information security policy 33 – 2.2. Data Privacy & Cloud Computing 39 – 2.3. Encryption 47 – 3. Computer security 51 – 3.1. NIST Cybersecurity Framework 77 – 4. Cybersecurity chain of trust; third party vendors 113 – 5. Ransomware 117 – 5.1. Exploit kits 132 – 6. Botnets 137 – 7. BIOS 139 – 7.1. Universal Extensible Firmware Interface (UEFI) 154– 8. Operating Systems 172 – 8.1. Microsoft Windows 197 – 8.2. macOS 236– 8.3. Open source operating system comparison 263 – 9. Firmware 273 – 10. Endpoint Security Buyers Guide 278 – 11. Glossaries & Acronym Dictionaries 11.1. Common Computer Abbreviations 282 – 11.2. BABEL 285 – 11.3. Information Technology Acronymns 291 – 11.4. Glossary of Operating System Terms 372 – 2 Cyber Security Primer Network outages, hacking, computer viruses, and similar incidents affect our lives in ways that range from inconvenient to life-threatening. As the number of mobile users, digital applications, and data networks increase, so do the opportunities for exploitation. Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction.
    [Show full text]