IBM Operating System/2 Technical Reference

Total Page:16

File Type:pdf, Size:1020Kb

IBM Operating System/2 Technical Reference First Edition (September 1987) The following paragraph does not apply to the United Kingdom or any country where such provisions are Inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time. It is possible that this publication may contain reference to, or infor­ mation about, IBM products (machines and programs), programming, or services that are not announced in your country. Such references or information must not be construed to mean that IBM intends to announce such IBM products, programming, or services in your country. Requests for copies of this publication and for technical information about IBM products should be made to your IBM Authorized Dealer or your IBM Marketing Representative. Operating System/2 and OS/2 are trademarks of the International Business Machines Corporation. ©Copyright International Business Machines Corporation 1986, 1987 All rights reserved. No part of this publication may be reproduced or distributed in any form or by any means without prior permission in writing from the International Business Machines Corporation. Preface This book contains technical information for the IBM Operating System/2™ (OS/2™1). It provides a comprehensive and detailed description of OS/2 interfaces. This book also provides descriptions of OS/2 architecture, control structures, data structures, and 110 formats necessary to understand and use those interfaces. This book is intended for the experienced user, system programmer, and application developer. You should be knowledgeable about operating systems and be proficient in one or more of the IBM Per­ sonal Computer programming languages, as well as being familiar with the 80286 architecture. Related Publications IBM Operating System/2™ User's Reference IBM Operating System/2™ Programmer's Guide IBM Personal Computer AT®2 Technical Reference IBM Personal Computer XT™3 Model 286 Technical Reference IBM Personal System/2™ Model 501/BM Personal System/2™ Model 60 Technical Reference IBM Personal System/2™ Model 80 Technical Reference IBM Personal Computer BIOS Technical Reference IBM Personal Computer Macro Assembler/2 iAPX 286 Programmer's Reference Manual including the iAPX 286 Numeric Supplement 210498, or the iAPX 386 Programmer's Reference Manual (IBSN 1-55512-022-9) Literature Department, lnte1®4 Corporation, 3065 Bowers Avenue, Santa Clara, CA. 95051 1 IBM Operating System/2™ and OS/2 are trademarks of International Business Machines Corporation 2 Personal Computer AT is a registered trademark of International Business Machines Corporation a Personal Computer XT Model 286 and IBM Personal System/2™ are trademarks of International Business Machines Corporation 4 Intel® is a registered trademark of Intel Corporation. iii iv Contents Chapter 1. Introduction . 1-1 API Function Requests . 1-2 Memory Management . 1-2 Process Control . 1-3 Timer Services . 1-3 Multitasking . 1-3 Interprocess Communication . 1-4 Session Management . 1-4 1/0 Services . 1-4 Code Page Support . 1-5 Device Monitor Services . 1-5 Printer/Spooler Services . 1-5 DevHlp Services ................................. 1-6 OS/2 Device Driver Architecture . 1-6 OS/2 Device Drivers . 1-7 Problem Determination . 1-7 Country Support Considerations . 1-7 Chapter 2. Application Program Interface (API) . 2-1 Dynamic Linking . 2-2 PC Family API . 2-2 OS/2 Function Calls . 2-3 OS/2 Function Call Rules ......................... 2-3 OS/2 Function Call Characteristics ................... 2-4 Function Call Format . 2-4 Interface Stack Frame ........................... 2-6 Function Calling Sequence Example . 2-7 OS/2 Sample Functions . 2-8 Function DOSXAMPL .......................... 2-8 High-Level Language Interface Examples ............ 2-9 OS/2 Compatibility Considerations . 2-10 OS/2 Application Environments . 2-10 DOS Family and Full Function API . 2-11 DOS Mode Exceptions .......................... 2-19 Chapter 3. Memory Management ..................... 3-1 Use of the Segmentation Hardware . 3-1 The Protection Features of the Ring Structure ........... 3-2 OS/2 Mode Memory Management . 3-4 y Real Memory Map (Protect mode only) . 3-6 Real Mode Memory Map . 3-6 Memory Management Function Call Summary . 3-8 Memory Subal location Package (MSP) . 3-9 Memory Suballocation Example . 3-9 MSP Function Call Summary . 3-10 System Extensions . 3-11 Chapter 4. Process Control . 4-1 Timer Services .................................. 4-1 Timer Management . 4-1 Tirrie/Date ................................... 4-1 Timer Intervals ................................ 4-2 Timer Services Function Call Summary . 4-3 Multitasking . 4-3 Tasking (Processes and Threads) ................... 4-4 Multiple Independent Processes Diagram . 4-6 Multiple Threads within a Process Diagram . 4-7 Resource Management . 4-8 Tasking Function Call Summary . 4-8 Interprocess Communication (IPC) . 4-9 Communication via Signals . 4-10 Communication via Messages . 4-10 Pipes .................................... 4-10 Communicating with a Pipe . 4-12 Comparing Pipes with Files: . 4-12 Queues . 4-13 Communicating with a Queue . 4-13 Comparing Pipes and Queues . 4-14 Queue Function Calls . 4-15 Managing Queues . 4-16 The Segment for Data Storage . 4-16 Managing Data Storage Examples . 4-16 Queue Element Copy Function . 4-18 Queue Element Delete Function . 4-18 Coordinating Execution Among Several Threads . 4-19 Semaphores . 4-19 Comparison of RAM and System Semaphores . 4-20 RAM Semaphore Diagram . 4-21 General Semaphore Function Calls . 4-21 Signalling via Semaphore Function Calls . 4-21 System Semaphore Function Calls . 4-22 Starting and Stopping a Thread's Execution . 4-22 vi IPC Function Call Summary . 4-23 Asynchronous Notification . 4-24 Asynchronous Notification Function Call Summary . 4-25 Program Execution Control . 4-26 Dynamic Linking . 4-26 Demand Load . 4-27 1/0 Privilege Model . 4-27 EXE File Information . 4-28 Program Execution Control Function Call Summary . 4-29 Errors and Exceptions . 4-29 Errors from Function Requests (Return Codes) . 4-29 Hard Error Override . 4-29 Handling Machine Exceptions . 4-29 Errors and Exceptions Function Call Summary . 4-30 OS/2 Message Functions (Message Retriever) . 4-30 Message Functions Function Call Summary . 4-30 Program Startup Conventions . 4-30 Chapter 5. Session Management . 5-1 Session Manager Application Support . 5-3 Restrictions ................................ 5-4 Session Management API Function Call Summary . 5-4 Chapter 6. 1/0 Services . 6-1 ASCllZ Strings . 6-1 Filename Specification ........................... 6-1 Device Names . 6-3 Code Page Support . 6-3 Code Page Management . 6-4 Code Page Dependent Information ................. 6-5 Code Page Switching Examples ................... 6-5 Code Page Preparation ........................ 6-6 Code Page Operation . 6-8 Code Page Supported Devices . 6-10 Special Considerations and Limitations . 6-10 Code Page API Summary . 6-12 System Initialization . 6-13 Hardware Characteristics . 6-13 Device Driver Installation . 6-13 CONFIG.SYS . 6-14 Device 1/0 Function Call Summary . 6-14 File 1/0 Services . 6-14 File 1/0 Function Call Summary . 6-15 vii Video 110 Services . 6-16 Display Adapters Supported . 6-16 Video Graphics Array (VGA) . 6-16 IBM Personal System/2™ Display Adapter .......... 6-17 VIO Support by Mode . 6-17 Text Modes Supported (Mono-Compatible) . 6-17 VIO Calls Supported in Text Modes: . 6-18 Graphics Modes Supported . 6-18 VIO Calls Supported in Graphics Modes . 6-19 VIO Screen Save/Restore Operations . 6-20 VIO Code Page Support . 6-21 Video Font File Organization . 6-23 Additional VIO Considerations . 6-25 VIO Function Call Summary . ..
Recommended publications
  • Visi on Calc Working in Windows.Pdf
    VISI ON CALC WORKING IN WINDOWS The Spreadsheet Revisited Since the VisiCalc® program was introduced five years ago, the spreadsheet has become a common productivity tool in business, education, and the home . In the United States alone, there are literally millions of spreadsheet users . Spreadsheet products have continued to evolve during this period-both in their capabilities and functions and in the uses to which they've been put . Today, spreadsheet programs like the VisiCalc program are used in applications as diverse as farm management, estate planning, and inventory balancing . Visi On CalcTM By giving you access to several different spreadsheets at the same time, each displayed in its own window, the Visi On Calc program gives you back the flexibility you had when you could move paper worksheets around on your desk . Gone are the limitations of working with one huge electronic spreadsheet containing many different kinds o f data. The new Visi On Calc program is a significant step in the evolution of spreadsheet products . It's a result of many years of study and development that gives today's user perhaps the broadest set of modeling capabilities to be found in any existing spreadsheet product . Among these capabilities, the Visi On Calc spreadsheet program has these unique characteristics : Windows The Visi On windowing environment lets you use and display several spreadsheets at the same time . Because of this, you can use them more naturally-more like you would do if you were constructing them on paper . No longer do you have to fit profit and loss, cash budget, and balance sheets into one unwieldy spreadsheet, as with conventional spreadsheet programs .
    [Show full text]
  • User Guide Ty Pe S 8143, 8144, 8146 Ty Pe S 8422, 8423, 8427
    ThinkCentre™ User Guide Ty pe s 8143, 8144, 8146 Ty pe s 8422, 8423, 8427 ThinkCentre™ User Guide Ty pe s 8143, 8144, 8146 Ty pe s 8422, 8423, 8427 Note Before using this information and the product it supports, be sure to read the “Important safety information” on page v and Appendix D, “Notices,” on page 43. Second Edition (June 2004) © Copyright International Business Machines Corporation 2004. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Important safety information . .v Erasing a lost or forgotten password (clearing Conditions that require immediate action. .v CMOS) . .24 General safety guidelines . .vi Replacing the cover and connecting the cables. .25 Service . .vi Power cords and power adapters . .vi Chapter 2. Using the IBM Setup Utility Extension cords and related devices . vii program . .27 Plugs and outlets . vii Starting the IBM Setup Utility program . .27 Batteries . vii Viewing and changing settings . .27 Heat and product ventilation . viii Using passwords . .27 CD and DVD drive safety . viii Password considerations . .27 Additional safety information . .ix User Password . .28 Lithium battery notice . .x Administrator Password . .28 Modem safety information. .x IDE Drive User Password . .28 Laser compliance statement . .xi IDE Drive Master Password . .28 Setting, changing, and deleting a password. .29 Overview . xiii Using Security Profile by Device . .29 Information resources. xiii Selecting a startup device. .29 Selecting a temporary startup device . .30 Chapter 1. Installing options . .1 Changing the startup sequence . .30 Features . .1 Exiting from the IBM Setup Utility program . .30 Available options .
    [Show full text]
  • Introduction to MS-DOS
    1.Introduction to MS-DOS : MS-DOS (Microsoft Disk Operating System) was the Microsoft-marketed version of the first widely-installed operating system in personal computers. It was essentially the same operating system that (Bill Gates's) young company developed for IBM as Personal Computer - Disk Operating System in 1981. Most users of either DOS system simply referred to their system as Disk Operating System. Like PC-DOS, MS-DOS was (and still is) a non-graphical line-oriented command- driven operating system, with a relatively simple interface but not overly "friendly" user interface. Its prompt to enter a command looks like this: C:\> MS-DOS does not care about anything called an icon, wallpaper or screen saver. Rather than being considered as a Graphical User Interface (GUI) MS-DOS is what is known as a command-line interface. You type commands on what is called the command line. MS-DOS is a single-user, single-tasking computer operating system. In spite of its very small size and relative simplicity, it is one of the most successful operating systems that has been developed to date. In DOS, a file name consists of eight character followed by a 3 character file extension. The size of a file is restricted to a 4 byte file descriptor, which limits a file’s maximum size to approximately 4 billion characters. The first release of DOS could not read or write to disk drives so users could only read and write to a floppy disc. DOS was not a state of the art operating system, even for its time.
    [Show full text]
  • Operating System User's Mannal ~Zilog 03-0072-01 Revision a September 1978
    t_ .' Operating System User's Mannal ~Zilog 03-0072-01 Revision A September 1978 Copyright © 1978 by Zilog, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of Zilog. Zilog assumes no responsibility for the use of any circuitry other than circuitry embodied in a Zilog product. No other circuit patent licenses are implied. zaO-RIO Operating System User's Manual September 1978 TABLE OF CONTENTS CHAPTER 1 - INTRODUCTION AND OVERVIEW • 1 1.1 INTRODUCTION •• 1 1.2 SYSTEM OVERVIEW 3 1.2.1 Hardware Configuration • • • • • • 3 1.2.2 File Systems • • • • • • • . • • 3 1.2.3 System Initialization •••.••• 6 1.2.4 Commands • • .• .•..••• 7 1.2.5 I/O • • • . • • • • • . • • • • • . 7 CHAPTER 2 - RIO EXECUTIVE 9 2.1 SYSTEM INITIALIZATION 9 2.2 FILE NAME CONVENTIONS · 10 2.3 MEMORY MANAGEMENT . • • . 12 2.3.1 MEMMGR • . 13 2.4 COMMAND STRING INTERPRETATION · 13 2.5 ERROR HANDLING • • . 15 2.6 PROGRAM EXECUTION OF COMMANDS · 15 CHAPTER 3 - 1/0 STRUCTURE • · 16 3.1 OVERVIEW . • · 16 3.2 I/O REQUESTS - SYSTEM CALLS · 17 3.3 THE 'ASSIGN' I/O REQUEST ••• • 19 - i - 3.4 STANDARD RIO I/O DEVICES • • • 21 3.4.1 ZDOS . • • • . 21 3.4.2 DFS . 21 3.4.3 NULL . • • • . 21 3.4.4 CON . • • • . • • • • • 22 3.4.5 PCON • 27 3.4.6 FLOPPY • • • • • • • • • • 27 3.4.7 DISK • • • • • • 27 CHAPTER 4 - PROGRAM INTERFACE • • 28 4.1 PROGRAM LOCATION • • • • • 28 4.2 PARAMETER STRING ADDRESS · 29 4.3 PROGRAM STACK SPACE • • • 29 4.4 PROGRAM TERMINATION - ERROR HANDLING ••.
    [Show full text]
  • IODF Explorer
    The Input/Output Definition File (IODF) is a critical Control Point in the management of the IBM z/Series Platform. IODF Explorer Release 4.0 USER GUIDE Contact us for additional information: NewEra Software Technical Support 800-421-5035 [email protected] www.newera.com Rev: 2009-04-24 IODF Explorer 4.0 ¾ Copyright, Trademark and Legal Notices Copyrights This Getting Started Guide and the related Software Product(s) are protected under a Copyright dated 2009 by NewEra Software, Inc. All rights are reserved. License Agreement This Getting Started Guide describes the installation and operation of Image FOCUS, its environment and applications. It is made available only under the terms of a license agreement between the licensee and NewEra Software Inc. No part of this Guide or the related Software Product(s) may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, for any purpose, without the express written permission of NewEra Software, Inc. Trademarks and Copyrights of Others The following products and/or registered trademarks of International Business Machines Corporation are referenced in this document: MVS, VM, RACF, z/OS, SYSPLEX, JES, VTAM, TSO, ISPF, ICKDSF, DFSMSdss, DF/DSS, and others. 2 NewEra Software, Inc. ‐ Image Control Environment (ICE) Applications IODF Explorer 4.0 ¾ Technical Support Information NewEra Software is dedicated to providing the highest level of technical Around-the-clock- support support to meet our customers’ growing needs. In order to meet these needs, NewEra provides around‐the‐clock technical support, 7 days a week, 24 hours a day.
    [Show full text]
  • Hardware Configuration Definition User's Guide
    z/OS Version 2 Release 3 Hardware Configuration Definition User's Guide IBM SC34-2669-30 Note Before using this information and the product it supports, read the information in “Notices” on page 443. This edition applies to Version 2 Release 3 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2019-02-16 © Copyright International Business Machines Corporation 1994, 2018. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents List of Figures..................................................................................................... xiii List of Tables.....................................................................................................xxiii About this document.......................................................................................... xxv Who this document is for..........................................................................................................................xxv Related information.................................................................................................................................. xxv How to use this document.......................................................................................................................xxvi How this document is organized............................................................................................................. xxvi How to read syntax diagrams................................................................................................................
    [Show full text]
  • And PC 750 (Type 6887)
    Technical Information Manual PC 730 (Type 6877) and PC 750 (Type 6887) Technical Information Manual IBM PC 730 (Type 6877) and PC 750 (Type 6887) Note Before using this information and the product it supports, be sure to read the general information under Appendix B, “Notices and Trademarks” on page 65. First Edition (June 1996) The following paragraph does not apply to the United Kingdom or any country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time. It is possible that this publication may contain reference to, or information about, IBM products (machines and programs), programming, or services that are not announced in your country. Such references or information must not be construed to mean that IBM intends to announce such IBM products, programming, or services in your country. Requests for technical information about IBM products should be made to your IBM reseller or IBM marketing representative. IBM may have patents or pending patent applications covering subject matter in this document.
    [Show full text]
  • Operating System
    OPERATING SYSTEM INDEX LESSON 1: INTRODUCTION TO OPERATING SYSTEM LESSON 2: FILE SYSTEM – I LESSON 3: FILE SYSTEM – II LESSON 4: CPU SCHEDULING LESSON 5: MEMORY MANAGEMENT – I LESSON 6: MEMORY MANAGEMENT – II LESSON 7: DISK SCHEDULING LESSON 8: PROCESS MANAGEMENT LESSON 9: DEADLOCKS LESSON 10: CASE STUDY OF UNIX LESSON 11: CASE STUDY OF MS-DOS LESSON 12: CASE STUDY OF MS-WINDOWS NT Lesson No. 1 Intro. to Operating System 1 Lesson Number: 1 Writer: Dr. Rakesh Kumar Introduction to Operating System Vetter: Prof. Dharminder Kr. 1.0 OBJECTIVE The objective of this lesson is to make the students familiar with the basics of operating system. After studying this lesson they will be familiar with: 1. What is an operating system? 2. Important functions performed by an operating system. 3. Different types of operating systems. 1. 1 INTRODUCTION Operating system (OS) is a program or set of programs, which acts as an interface between a user of the computer & the computer hardware. The main purpose of an OS is to provide an environment in which we can execute programs. The main goals of the OS are (i) To make the computer system convenient to use, (ii) To make the use of computer hardware in efficient way. Operating System is system software, which may be viewed as collection of software consisting of procedures for operating the computer & providing an environment for execution of programs. It’s an interface between user & computer. So an OS makes everything in the computer to work together smoothly & efficiently. Figure 1: The relationship between application & system software Lesson No.
    [Show full text]
  • Microsoft Plays Hardball: Use of Exclusionary Pricing and Technical
    Antitrust Bulletin, XL:2, Summer 1995, 265-315 MICROSOFT PLAYS HARDBALL: The Use of Exclusionary Pricing and Technical Incompatibility to Maintain Monopoly Power in Markets for Operating System Software† by KENNETH C. BASEMAN* FREDERICK R. WARREN-BOULTON* and GLENN A. WOROCH** May 1995 ___________________ * Principals, MiCRA: Microeconomic Consulting and Research Associates, Inc., Washington, DC. ** University of California, Berkeley. † Forthcoming, Antitrust Bulletin, June 1995. We would like to express our appreciation for helpful comments and other assistance to Sturge Sobin, Linnet Harlan, Paul Dennis and the participants at the Columbia Business School's Institute for Tele-Information's Seminar on Sustaining Competition in Network Industries through Regulating and Pricing Access, especially Janusz Ordover and Bobby Willig. TABLE OF CONTENTS I. INTRODUCTION AND SUMMARY ................................... 1 II. BACKGROUND .................................................... 3 A. THE MARKET FOR PERSONAL COMPUTER OPERATING SYSTEMS ............................................................ 3 TABLE: NEW SHIPMENTS OF PERSONAL COMPUTER OPERATING SYSTEMS .............................................. 8 B. MICROSOFT'S PRACTICES ..................................... 9 III. FIRST-DEGREE PRICE DISCRIMINATION vs. INEFFICIENT SUBSTITUTION ................................................... 15 A. FIRST-DEGREE PRICE DISCRIMINATION ........................ 16 B. INEFFICIENT SUBSTITUTION ................................. 20 IV. ANTIFRAUD AND ANTIPIRACY
    [Show full text]
  • LICENSED PROGRAM SPECIFICATION and STATEMENT of PROGRAM SERVICE for the IBM 3270 WORKSTATION PROGRAM 90X7283
    LICENSED PROGRAM SPECIFICATION and STATEMENT OF PROGRAM SERVICE for the IBM 3270 WORKSTATION PROGRAM 90X7283 The following Licensed Program Specification applies only to the United States and Puerto Rico. IBM 3270 Workstation Program Licensed Program Specification Statement of Limited Warranty IBM 3270 Workstation Program is warranted to conform to this Licensed Program Specification when properly used in its designated hardware and software environment. Any other documentation with respect to this licensed program, excluding any documentation refer­ enced in this program specification, is provided for information pur­ poses only and does not extend or modify this IBM 3270 Workstation Program Licensed Program Specification. The IBM 3270 Workstation Program Licensed Program Specification may be updated from time to time. Such updates may constitute a change to these specifica­ tions. This limited warranty and the gO-day program media warranty are contained in the IBM Program License Agreement supplied with this product and is available to all licensees of IBM 3270 Workstation Program. Statement of Function Warranted IBM warrants that: • The media of the software disks, the IBM 3270 Workstation Program User's Guide and Reference manual, and the Problem Determination Guide and Reference manual are not defective; • The program is properly recorded on media; • The IBM 3270 Workstation Program User's Guide and Reference and Problem Determination Guide and Reference manuals are substantially complete and correct and contain the information which IBM deems is necessary for use of the software; 2 • The program functions substantially as described in the IBM 3270 Workstation Program User's Guide and Reference and Problem Determination Guide and Reference manuals.
    [Show full text]
  • Ibl\1 PERSONAL SYSTEM/2(TM) and PERSONAL COMPUTER PVBLICATIO~ and EDUCATION REFERENCES
    IBl\1 PERSONAL SYSTEM/2(TM) and PERSONAL COMPUTER PVBLICATIO~ and EDUCATION REFERENCES As of 01-13-89 The following list of PC publications is for marketing and market support purposes. This list was taken from the product Ivory Letters and all other known sources. The bulk of the publication numbers pertain to PC hardware products, as these are the ones in most demand. Some entries are listed in multiple categories because they pertain to each category within which they are shown. The publications shown in this list are only some of the PC publications available; most PC pub­ lications have been assigned 7 -digit part numbers instead of 8-digit form numbers. The follo\ving list is composed of only form numbers, so that you may readily order these publications from Mechanicsburg. Technical publications may be obtained from either an IBM Representative, an Authorized IBI'v1 Dealer, the Technical Directory (1-800-IBM-PCTB), or the IBM Software/Publications Response Line (1-800-327-5711); the latter is normally used by dealers. A change to the information since November 16, 1988 is indicated by a vertical line to the left of the change. Rich Berman Tieline 396-4887 RHBERMAN at DEM014 \Vestern Area Technical Support Ctr., Dept. CUU ii Table of Contents General/:\-liscellaneous ......................................................... 1 Managing \Vorkstations ....................................................... 11 Personal System/2 ............................................................ 12 PC AT ...................................................................
    [Show full text]
  • The Future of Virtualization Technology
    The Future of Virtualization Technology Stephen Alan Herrod VP of Technology VMware Agenda •Virtualization Today •Technology Trends and the Future Datacenter •Future directions • CPU Virtualization • I/O Virtualization • Virtual appliances •Conclusions 2 X86 Server Virtualization Basics Application Operating System Before Server Virtualization: Single OS image per machine Software and hardware tightly coupled Running multiple applications on same machine often creates conflict Underutilized resources 3 X86 Server Virtualization Basics VM1 VM2 App App Application Operating System Operating System Virtualization Layer Operating System Before Server Virtualization: After Server Virtualization: Single OS image per machine Virtual machines (VMs) break 1-to-1 dependency between OS and HW Software and hardware tightly coupled Manage OS and application as single Running multiple applications on unit by encapsulating them into VMs same machine often creates conflict Strong isolation between VMs Underutilized resources Hardware-independent: they can be provisioned anywhere 4 X86 Server Virtualization Architectures •Hosted Architectures • Install as applications on Windows/Linux with small context switching driver • Leverage host IO stack and resource management • Examples include VMware Workstation, VMware Server, Microsoft Virtual PC, Microsoft Virtual Server, … •Bare-metal Architectures • “Hypervisor” installs directly on hardware • Approach acknowledged as direction for datacenter • VMware ESX Server, Xen, Microsoft Viridian 5 Bare-metal
    [Show full text]