ETHERNET and the FIFTH GENERATION Gordon Bell Vice

Total Page:16

File Type:pdf, Size:1020Kb

ETHERNET and the FIFTH GENERATION Gordon Bell Vice THE ENGINEERING OF THE VAX-11 COMPUTING ENVIRONMENT The VAX-11 architectural design and implementation began in 1975 with the goals of a wide range of system sizes and different styles of use. While much of the implementation has been "as planned", various nodes (eg. computers, disk servers) and combined structures (eg. clusters) have evolved in response to the technology forces, user requirements and constraints. The future offers even more possibilities for interesting structures. ETHERNET AND THE FIFTH GENERATION Gordon Bell Vice President, Engineering Digital Equipment Corporation In the Fifth Computer Generation, a wide variety of computers will communicate with one another. No one argues about this. The concern is about how to do it and what form the computers will take. A standard communications language is the key. I believe Ethernet is this unifying key to the 5th computer generation because it interconnects all sizes and types of computers in a passive, tightly-coupled, high performance fashion, permiting the formation of local-area networks. HOW THE JAPANESE HAVE CONVERTED WORLD INDUSTRY INTO DISTRIBUTORSHIPS -- CONCERN NOW FOR SEMICONDUCTORS AND COMPUTERS Gordon Bell Vice President Digital Equipment Corporation Abstract We all must be impressed with the intense drive, technical and manufacturing ability of the Japanese. As an island with few natural resources, and only very bright, hard working people they have set about and accomplished the market domination of virtually all manufactured consumer goods and the components and processes to make these goods (i.e., vertical integration). Currently the U.S. has a dominant position in computers and semiconductors. However, there's no fundamental reason why the Japanese won't attain a basic goal to dominate these industries, given their history in other areas and helped by our governments. On a first visit to Japanese computer/semiconductor companies, universities, and a government R&D laboratory, I found them relatively open. This was in contrast to my former experience as a computer science researcher with their one-way scientific interchange and being an information sink. Perhaps their openness is because they are so far along with good products, and their position so secure. Their competence, hospitality, and "apparent openness" made me quite fond of them; but I now fear them more than ever. Forty-odd reasons are given in the form of "feelings" to support this domination conjecture. No solutions are given, assuming a distributorship is basically unhealthy (as shown in the 3 island formulation). The reasons are formed from my observations, but like the Japanese, taken freely from other sources with an attempt to make a better, more complete end product for industrial and government users. ID#0257 9/7/78 September 22, 1983 Dr. John Wakerly David Systems 45 Cabot Avenue Santa Clara, CA 95051 Ms. Christina Champion Computer Magazine 10662 Los Alamitos CA 90720 Dear John and Christina: I'm delighted to accept your offer to Keynote the Spring Compcon in San Francisco. Enclosed is a vitae and photograph for Computer Magazine. The title for the talk is tentatively, Understanding Evolution To Leverage the Leverage. Civilization has always been concerned with building tools to leverage intellectual processes. Although a few tools are revolutionary, nearly all are evolutionary. Virtually all revolutionary tools (machines) fail, usually for simple reasons. What are the heuristics for success (and failure avoidance)? I'll be in the Bay Area the week of October 17, and will call you about a meeting to further discuss the topic. Sincerely, Gordon Bell Chief Technical Officer GB8.13 LOCAL AREA NETS, DISTRIBUTED PROCESSING AND THE FIFTH GENERATION Gordon Bell Vice President, Engineering Digital Equipment Corporation Local Area Networks are a natural evolutionary form of computing which have come into existence to form the Fifth Computer Generation. Economies of scale for processing have disappeared, but other forms of information processing (transducing, storage, communications, specialized processing) are still expensive. The high cost components are necessary and even desirable to share when all costs (especially including user time) are evaluated. Whether computing is personalized and independent, shared in a group or provided by a central service will vary with the user and organization. Local Area Networks offer the greatest flexibility in deciding where and how to process information. OBSERVATIONS ON GENERATING COMPUTER GENERATIONS We've implemented thousands of species of the computer in a few, basically evolutionary technologies. These technologies mark the generations. The evolutionary process is cyclic and includes the technology, the architecture and implementation of species, followed by use which in turn generates increased demand for better technology, permitting evolutionary new computer structures. Since new generations spring from new technologies and often different people, a new generation most likely follows the time-worn path of early pioneers. New generation builders tend to relearn the same lessons about technology limits, architecture, its evolution including the "wheel of reincarnation" for specialized functions, multiprocessors, etc. DISTRIBUTED PROCESSING AND LIMITS TO ITS GROWTH Gordon Bell Vice President Engineering Digital Equipment Corporation Abstract Invariably, the computer has been complex enough, yet structurally simple, to effectively utilize semiconductor and magnetic storage density improvements for both increased processing and lower cost providing widely available computation on a distributed basis. From an end-user viewpoint, it's hard to imagine a saturation, despite the fact that a leveling off has always been predicted. The new fifth generation and successor generation, VLSI-based computers, will stimulate use even further providing computation for what is analogous to the fractional horsepower motor. It is worth trying to identify and then examine the factors which might limit growth: the basic technologies? the complexity of the design, given the planarity of semiconductors? either the lack or forced existence of standards? defacto constraints (e.g., communication and TV formats)? the imagination and skill of the intermediate designer/applier who must cope with the far greater complexity brought about by larger systems and programs? inability of the final user to cope with greater complexity? and possible rejection to being suplemented with so much information and information processing? Talks /11 GENERATING COMPUTER GENERATIONS Gordon Bell Vice President, Engineering Digital Equipment Corporation Abstract: The computer and pre-computer generations are marked by an identifiably new machine structure, physical technology, the basic needs for computation and actual machine use. There were four pre-computer generations and four computer generations. Thirty-six lessons have been observed, so far, and will be described and illustrated. INNOVATION ISN'T THE PROBLEM - THE JAPANESE HAVE CONVERTED U.S. INDUSTRY INTO DISTRIBUTORS BY EFFECTIVELY UTILIZING AVAILABLE IDEAS Gordon Bell Vice President Digital Equipment Corporation Abstract The island of Japan, with few natural resources and over 100 million people, virtually dominates world production of manufactured goods, including the components and processes to make these goods. The Japanese have progressed from domination of low- technology simple commodities to complex manufactured goods. The United States still holds a dominant position in the production of computers and semiconductors, but the Japanese plan to dominate these industries. Unwittingly, U.S. industry, government and society continue to aid the Japanese. Many reasons support this conjecture, each one providing a lesson. TALKS /12 MINICOMPUTER ARCHITECTURE Gordon Bell Vice President, Engineering Digital Equipment Corporation & Professor of Computer Science & Electrical Engineering Carnegie-Mellon University (on leave) Abstract Minimal cost computer designs (i.e. minicomputers) are predicated on using technological cost-performance improvements which occur at an annual rate of 25-30%. New applications are thereby feasible with the decreasing costs. A significant number of minicomputers are manufactured in which the cost is constant (or rising), thereby providing more performance (capabilities). The higher performance machines "take" their characteristics from the larger, general purpose computers (e.g. floating point arithmetic, multiprocessors, cache memories and memory management). The origin and evolution of the minicomputer will be discussed with regard to technology and applications. THE PDP-11 FAMILY AND VAX-11/780 FOR A LARGE VIRTUAL ADDRESS Gordon Bell Vice President, Engineering Digital Equipment Corporation & Professor of Computer Science & Electrical Engineering Carnegie-Mellon University (on leave) Abstract In the eight years the PDP-11 has been on the market, more than 50,000 units in ten different models have been sold. Although one of the system design goals was a broad range of models, the actual range of 500 to 1 (in price and memory size) has exceeded the design goal. The PDP-11 was designed and first implemented to be a small minicomputer. Its first extension was to a bigger physical address, memory segmentation for multiprogramming and for higher performance. This part of the talk will briefly reflect the experience in the design process, comment on its success from the point of view of the goals, and its
Recommended publications
  • High-Level Language Features Not Found in Ordinary LISP. the GLISP
    DOCUMENT RESUME ED 232 860 SE 042 634 AUTHOR Novak, Gordon S., Jr. TITLE GLISP User's Manual. Revised. INSTITUTION Stanford Univ., Calif. Dept. of Computer Science. SPONS AGENCY Advanced Research Projects Agency (DOD), Washington, D.C.; National Science Foundation, Washington, D.C. PUB DATE 23 Nov 82 CONTRACT MDA-903-80-c-007 GRANT SED-7912803 NOTE 43p.; For related documents, see SE 042 630-635. PUB TYPE Guides General (050) Reference Materials General (130) EDRS PRICE MF01/PCO2 Plus Postage. DESCRIPTORS *Computer Programs; *Computer Science; Guides; *Programing; *Programing Languages; *Resource Materials IDENTIFIERS *GLISP Programing Language; National Science Foundation ABSTRACT GLISP is a LISP-based language which provides high-level language features not found in ordinary LISP. The GLISP language is implemented by means of a compiler which accepts GLISP as input and produces ordinary LISP as output. This output can be further compiled to machine code by the LISP compiler. GLISP is available for several ISP dialects, including Interlisp, Maclisp, UCI Lisp, ELISP, Franz Lisp, and Portable Standard Lisp. The goal of GLISP is to allow structured objects to be referenced in a convenient, succinct language and to allow the structures of objects to be changed without changing the code which references the objects. GLISP provides both PASCAL-like and English-like syntaxes; much of the power and brevity of GLISP derive from the compiler features necessary to support the relatively informal, English-like language constructs. Provided in this manual is the documentation necessary for using GLISP. The documentation is presented in the following sections: introduction; object descriptions; reference to objects; GLISP program syntax; messages; context rules and reference; GLISP and knowledge representation languages; obtaining and using GLISP; GLISP hacks (some ways of doing things in GLISP which might not be entirely obvious at first glance); and examples of GLISP object declarations and programs.
    [Show full text]
  • Validated Products List, 1995 No. 3: Programming Languages, Database
    NISTIR 5693 (Supersedes NISTIR 5629) VALIDATED PRODUCTS LIST Volume 1 1995 No. 3 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Product Data - IGES Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1995 QC 100 NIST .056 NO. 5693 1995 NISTIR 5693 (Supersedes NISTIR 5629) VALIDATED PRODUCTS LIST Volume 1 1995 No. 3 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Product Data - IGES Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1995 (Supersedes April 1995 issue) U.S. DEPARTMENT OF COMMERCE Ronald H. Brown, Secretary TECHNOLOGY ADMINISTRATION Mary L. Good, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Arati Prabhakar, Director FOREWORD The Validated Products List (VPL) identifies information technology products that have been tested for conformance to Federal Information Processing Standards (FIPS) in accordance with Computer Systems Laboratory (CSL) conformance testing procedures, and have a current validation certificate or registered test report. The VPL also contains information about the organizations, test methods and procedures that support the validation programs for the FIPS identified in this document. The VPL includes computer language processors for programming languages COBOL, Fortran, Ada, Pascal, C, M[UMPS], and database language SQL; computer graphic implementations for GKS, COM, PHIGS, and Raster Graphics; operating system implementations for POSIX; Open Systems Interconnection implementations; and computer security implementations for DES, MAC and Key Management.
    [Show full text]
  • Pdf and SANS '99 ( Are Worth a Read
    motd by Rob Kolstad Dr. Rob Kolstad has long served as editor of ;login:. He is also head coach of the USENIX- sponsored USA Computing Olympiad. <[email protected]> Needs In the late 1960s, when the psychological world embraced behaviorism and psychoanalysis as its twin grails, Abraham Maslow proposed a hierarchy of needs. This hierarchy was brought to mind because I am hosting the Polish computing champion for a short visit, and he often asks questions of the sort, "Why would anyone need such a large car?" Maslow listed, in order: • Physiological needs, including air, food, water, warmth, shelter, etc. Lack of these things can cause death. • Safety needs, for coping with emergencies, chaos (e.g., rioting), and other periods of disorganization. • Needs for giving and receiving love, affection, and belonging, as well as the ability to escape loneliness/alienation. • Esteem needs, centering on a stable, high level of self-respect and respect from others, in order to gain satisfaction and self-confidence. Lack of esteem causes feelings of inferiority, weakness, helplessness, and worthlessness. "Self-actualization" needs were the big gun of the thesis. They exemplified the behavior of non-selfish adults and are, regrettably, beyond the scope of this short article. As I think about the context of "needs" vs. "wants" or "desires" in our culture, economy, and particularly among the group of readers of this publication, it seems that we're doing quite well for the easy needs (physiological needs and safety). I know many of my acquaintances (and myself!) are doing just super in their quest for better gadgetry, toys, and "stuff" ("whoever dies with the most toys wins").
    [Show full text]
  • Microkernel Mechanisms for Improving the Trustworthiness of Commodity Hardware
    Microkernel Mechanisms for Improving the Trustworthiness of Commodity Hardware Yanyan Shen Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy School of Computer Science and Engineering Faculty of Engineering March 2019 Thesis/Dissertation Sheet Surname/Family Name : Shen Given Name/s : Yanyan Abbreviation for degree as give in the University calendar : PhD Faculty : Faculty of Engineering School : School of Computer Science and Engineering Microkernel Mechanisms for Improving the Trustworthiness of Commodity Thesis Title : Hardware Abstract 350 words maximum: (PLEASE TYPE) The thesis presents microkernel-based software-implemented mechanisms for improving the trustworthiness of computer systems based on commercial off-the-shelf (COTS) hardware that can malfunction when the hardware is impacted by transient hardware faults. The hardware anomalies, if undetected, can cause data corruptions, system crashes, and security vulnerabilities, significantly undermining system dependability. Specifically, we adopt the single event upset (SEU) fault model and address transient CPU or memory faults. We take advantage of the functional correctness and isolation guarantee provided by the formally verified seL4 microkernel and hardware redundancy provided by multicore processors, design the redundant co-execution (RCoE) architecture that replicates a whole software system (including the microkernel) onto different CPU cores, and implement two variants, loosely-coupled redundant co-execution (LC-RCoE) and closely-coupled redundant co-execution (CC-RCoE), for the ARM and x86 architectures. RCoE treats each replica of the software system as a state machine and ensures that the replicas start from the same initial state, observe consistent inputs, perform equivalent state transitions, and thus produce consistent outputs during error-free executions.
    [Show full text]
  • Emerging Technologies Multi/Parallel Processing
    Emerging Technologies Multi/Parallel Processing Mary C. Kulas New Computing Structures Strategic Relations Group December 1987 For Internal Use Only Copyright @ 1987 by Digital Equipment Corporation. Printed in U.S.A. The information contained herein is confidential and proprietary. It is the property of Digital Equipment Corporation and shall not be reproduced or' copied in whole or in part without written permission. This is an unpublished work protected under the Federal copyright laws. The following are trademarks of Digital Equipment Corporation, Maynard, MA 01754. DECpage LN03 This report was produced by Educational Services with DECpage and the LN03 laser printer. Contents Acknowledgments. 1 Abstract. .. 3 Executive Summary. .. 5 I. Analysis . .. 7 A. The Players . .. 9 1. Number and Status . .. 9 2. Funding. .. 10 3. Strategic Alliances. .. 11 4. Sales. .. 13 a. Revenue/Units Installed . .. 13 h. European Sales. .. 14 B. The Product. .. 15 1. CPUs. .. 15 2. Chip . .. 15 3. Bus. .. 15 4. Vector Processing . .. 16 5. Operating System . .. 16 6. Languages. .. 17 7. Third-Party Applications . .. 18 8. Pricing. .. 18 C. ~BM and Other Major Computer Companies. .. 19 D. Why Success? Why Failure? . .. 21 E. Future Directions. .. 25 II. Company/Product Profiles. .. 27 A. Multi/Parallel Processors . .. 29 1. Alliant . .. 31 2. Astronautics. .. 35 3. Concurrent . .. 37 4. Cydrome. .. 41 5. Eastman Kodak. .. 45 6. Elxsi . .. 47 Contents iii 7. Encore ............... 51 8. Flexible . ... 55 9. Floating Point Systems - M64line ................... 59 10. International Parallel ........................... 61 11. Loral .................................... 63 12. Masscomp ................................. 65 13. Meiko .................................... 67 14. Multiflow. ~ ................................ 69 15. Sequent................................... 71 B. Massively Parallel . 75 1. Ametek.................................... 77 2. Bolt Beranek & Newman Advanced Computers ...........
    [Show full text]
  • These Innovators Sail Against the Prevailing Winds, Discovering Whole New Worlds in Biotech and Software
    FORTUNEMARCH 17, 2003 EXCERPT Heroes of manufacturing These innovators sail against the prevailing winds, discovering whole new worlds in biotech and software. by Gene Bylinsky Dan Dodge and Gordon Bell: When software really, really has to work Is software hopeless? Ask anyone whose computer has just con- to smart manufacturing and process-control engineers, who have fessed to an illegal operation or whose screen has locked up. De- installed more than one million QNX systems around the spite decades of effort, a wisecrack from the software industry’s world—and beyond. Cisco uses QNX to power some of its net- early days still stings: “If builders constructed buildings the way work equipment; Siemens uses it to run its medical systems. QNX programmers write software, the first woodpecker to come along enables the high-speed French TGV passenger trains to round would cause the collapse of civilization.” curves without tilting too far; it runs U.S. Postal Service mail- There’s one notable exception. As far as anyone can tell, soft- sorting machines, directs GE-built locomotives, and will soon ware created by a Canadian company called QNX Software Sys- control all of New York City’s traffic lights. The Federal Avia- tems simply doesn’t crash. QNX’s software has run nonstop with- tion Administration (FAA) has purchased 250 copies of QNX out mishaps at some customer sites since it was installed more for air-traffic control. And the system operates the Canadian- than a decade ago. As a delighted user has put it, “The only way built robotic arm on both the space shuttle and the interna- to make this software malfunction is to fire a bullet into the com- tional space station.
    [Show full text]
  • The Evolution of Lisp
    1 The Evolution of Lisp Guy L. Steele Jr. Richard P. Gabriel Thinking Machines Corporation Lucid, Inc. 245 First Street 707 Laurel Street Cambridge, Massachusetts 02142 Menlo Park, California 94025 Phone: (617) 234-2860 Phone: (415) 329-8400 FAX: (617) 243-4444 FAX: (415) 329-8480 E-mail: [email protected] E-mail: [email protected] Abstract Lisp is the world’s greatest programming language—or so its proponents think. The structure of Lisp makes it easy to extend the language or even to implement entirely new dialects without starting from scratch. Overall, the evolution of Lisp has been guided more by institutional rivalry, one-upsmanship, and the glee born of technical cleverness that is characteristic of the “hacker culture” than by sober assessments of technical requirements. Nevertheless this process has eventually produced both an industrial- strength programming language, messy but powerful, and a technically pure dialect, small but powerful, that is suitable for use by programming-language theoreticians. We pick up where McCarthy’s paper in the first HOPL conference left off. We trace the development chronologically from the era of the PDP-6, through the heyday of Interlisp and MacLisp, past the ascension and decline of special purpose Lisp machines, to the present era of standardization activities. We then examine the technical evolution of a few representative language features, including both some notable successes and some notable failures, that illuminate design issues that distinguish Lisp from other programming languages. We also discuss the use of Lisp as a laboratory for designing other programming languages. We conclude with some reflections on the forces that have driven the evolution of Lisp.
    [Show full text]
  • Type Design for Typewriters: Olivetti by María Ramos Silva
    Type design for typewriters: Olivetti by María Ramos Silva Dissertation submitted in partial fulfilment of the requirements for the MA in Typeface Design Department of Typography & Graphic Communication University of Reading, United Kingdom September 2015 The word utopia is the most convenient way to sell off what one has not the will, ability, or courage to do. A dream seems like a dream until one begin to work on it. Only then it becomes a goal, which is something infinitely bigger.1 -- Adriano Olivetti. 1 Original text: ‘Il termine utopia è la maniera più comoda per liquidare quello che non si ha voglia, capacità, o coraggio di fare. Un sogno sembra un sogno fino a quando non si comincia da qualche parte, solo allora diventa un proposito, cio è qualcosa di infinitamente più grande.’ Source: fondazioneadrianolivetti.it. -- Abstract The history of the typewriter has been covered by writers and researchers. However, the interest shown in the origin of the machine has not revealed a further interest in one of the true reasons of its existence, the printed letters. The following pages try to bring some light on this part of the history of type design, typewriter typefaces. The research focused on a particular company, Olivetti, one of the most important typewriter manufacturers. The first two sections describe the context for the main topic. These introductory pages explain briefly the history of the typewriter and highlight the particular facts that led Olivetti on its way to success. The next section, ‘Typewriters and text composition’, creates a link between the historical background and the machine.
    [Show full text]
  • Programming Languages, Database Language SQL, Graphics, GOSIP
    b fl ^ b 2 5 I AH1Q3 NISTIR 4951 (Supersedes NISTIR 4871) VALIDATED PRODUCTS LIST 1992 No. 4 PROGRAMMING LANGUAGES DATABASE LANGUAGE SQL GRAPHICS Judy B. Kailey GOSIP Editor POSIX COMPUTER SECURITY U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 100 . U56 4951 1992 NIST (Supersedes NISTIR 4871) VALIDATED PRODUCTS LIST 1992 No. 4 PROGRAMMING LANGUAGES DATABASE LANGUAGE SQL GRAPHICS Judy B. Kailey GOSIP Editor POSIX COMPUTER SECURITY U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 October 1992 (Supersedes July 1992 issue) U.S. DEPARTMENT OF COMMERCE Barbara Hackman Franklin, Secretary TECHNOLOGY ADMINISTRATION Robert M. White, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY John W. Lyons, Director - ;,’; '^'i -; _ ^ '’>.£. ; '':k ' ' • ; <tr-f'' "i>: •v'k' I m''M - i*i^ a,)»# ' :,• 4 ie®®;'’’,' ;SJ' v: . I 'i^’i i 'OS -.! FOREWORD The Validated Products List is a collection of registers describing implementations of Federal Information Processing Standards (FTPS) that have been validated for conformance to FTPS. The Validated Products List also contains information about the organizations, test methods and procedures that support the validation programs for the FTPS identified in this document. The Validated Products List is updated quarterly. iii ' ;r,<R^v a;-' i-'r^ . /' ^'^uffoo'*^ ''vCJIt<*bjteV sdT : Jr /' i^iL'.JO 'j,-/5l ':. ;urj ->i: • ' *?> ^r:nT^^'Ad JlSid Uawfoof^ fa«Di)itbiI»V ,, ‘ isbt^u ri il .r^^iytsrH n 'V TABLE OF CONTENTS 1.
    [Show full text]
  • Volume 3, Issue 12 (1983)
    Vol. 3, Issue 12, July 1983 • HOLE NO. 1 PAR = 4 LEHSTH = 315 �TRS. Level II t • Also in this issue: SOFTWARE: PROGRAMMING: • Anagra�s Level II Theory and Techniques •Cleanup Level l 7 of Sorting Part •E = MC2 Level l/ REVIEWS: •S.A. Horse Performance Astrology Guide Level II · HARDWARE: • Mastermind Colour Double your System-80 RAM •Sink the Enemy for S 15 Navy Colour ***** ABOUT MICRO-SO ***** EDITOR: RYSZARD WIWATOWSKI ASSOCIATE EDITORS: SOFTWARE CHARLIE BARTLETT HARDWARE EDWIN PAAY MICRO-SO is an international magazine devoted to the Tandy TRS-SO Model I, Model III and Colour microcomputers, the Dick Smith System SO/Video Genie and the Hitachi Peach. It is available at the following prices: 12 MONTH SUB. SINGLE COPY �1AGAZ I NE ONLY $ 26-00 $ 2-50 CASSETTE PLUS MAGAZINE $ 65-00 $ 4-00 (cass. only) DISK PLUS MAGAZINE $125-00 $10-00 (disk only) MICR0-80 is available in the United Kingdom from: U.K. SUBSCRIPTION DEPT. 24 Woodhill Park, Pembury, Tunbridge Wells, KENT TN2 4NW MAGAZINE ONLY £ 16-00 £ 1-50 CASSETTE PLUS MAGAZINE £ 43-60 £ N/ A DISK PLUS MAGAZINE £ 75-00 £ N/A MICRO-SO is available in New Zealand from: MICRO PROCESSOR SERVICES, 940A Columbo Street, CHRISTCHURCH N.Z. Ph 62S94 MAGAZINE ONLY NZ$ 43-00 NZ$ 4-00 CASSETTE PLUS MAGAZINE NZ$ S9-00 NZ$ 5-00 DISK PLUS MAGAZINE NZ$175-00 NZ$15-00 MICRO-SO is despatched from Australia by airmail to other countries at the following rates: ( 12 MONTH SUB) MAGAZINE CASS + MAG DISK + MAG PAPUA NEW GUINEA Aus$40-00 Aus$ S3-00 Aus$ 143-00 HONG KONG/SINGAPORE Aus$44-00 Aus$ SS-00 Aus$ 14S-00 INDIA/JAPAN Aus$49-00 Aus$ 95-00 Aus$ 155-00 USA/MIDDLE EAST/CANADA Aus$55-00 Aus$102-00 Aus$ 162-00 Specia 1 bulk purchase rates are a 1so avail ab1 e to computer shops etc.
    [Show full text]
  • Legal Review on Industrial Design Protection in Europe
    Legal review on industrial design protection in Europe Under the contract with the Directorate General Internal Market, Industry, Entrepreneurship and SMEs (MARKT2014/083/D) Legal review on industrial design protection in Europe Final Report - 15 April 2016 EN This study was carried out for the European Commission by For further information on this report, please contact: Mr. Jos Dumortier time.lex - information & technology law 35 rue du Congrès B-1000 Brussels - Belgium M: +32 477 33 82 96 [email protected] www.timelex.eu Core Team: Prof Jos Dumortier time.lex Davide Parrilli time.lex Prof Uma Suthersanen Queen Mary Intellectual Property Research Institute, Queen Mary, London Honorary Prof David Musker Queen Mary Intellectual Property Research Institute, Queen Mary, London; Consultant, Jenkins Patricia Ypma Spark Legal Network Peter McNally Spark Legal Network Jasmine Simpson Spark Legal Network Dr Lena Boucon Spark Legal Network Jo Steyaert Indiville Wouter Samyn Indiville Country Experts: Prof Clemens Appl Austria Vienna University of Economics and Business Susie P. Arnesen Denmark Løje, Arnesen & Meedom Prof Mario Franzosi Italy Avvocati Associati Franzosi Dal Negro Setti Prof Ignacio Garrote Spain Autonomous University of Madrid Prof Christophe Geiger, France CEIPI, University of Strasbourg Natalia Kapyrina Prof Pavel Koukal Czech Republic Masaryk University Dr Ewa Laskowska Poland Jagiellonian University Prof Marianne Levin Sweden Stockholm University Dr Vytautas Mizaras Lithuania Valiunas Ellex Mark Pohar Slovenia - Dr Ana Ramalho Portugal Maastricht University Allard Ringnalda Netherlands Klos cs Dr Dharamveer Singh Chauhan Luxembourg VP Fund Solutions (Luxembourg) SA Prof Guido Westkamp, Germany Queen Mary Intellectual Property Dr Marc Mimler Research Institute, Queen Mary, London DISCLAIMER The information and views set out in this report are those of the authors and do not necessarily reflect the official opinion of the Commission.
    [Show full text]
  • What We Learned from the PDP-11
    ABSTRACT Gordon Bell, William Il. Strecker November 8, 1975 COMPUTER STRUCTURES: WHAT HAVE WE LEARNED FROM THE PDP-ll? Over the FDP-11’S six year life behave in a particular way? about 20,000 specimens have been Where does it get inputs? HOW built based on 10 species (models). does it formulate and solve Al though range was a design goal, problems? it was unquantified; the actual range has exceeded expectations 3. The rest of the DEC (5OO:l in memory size and system organization--this includes price]. The range has stressed the applications groups assoc ia ted baa ic mini (mall computer with market groups # sales, architecture along all dimensions. service and manufacturing. The marn PM.5 structure, i.e. the UNIBUS, has been adopted as a de 4. The user, who receives the facto standard of interconnection final OUtQUt. for many micro and minicomputer systems. The architectural Note, that if we assume that a experience gained in the design and QrOduc t is done sequentially, and use of the PDP-11 will be described each stage has a gestation time of in terms Of its environment about two years, it takes roughly (initial goals and constraints, eight years for an idea from basic technology, and the organization research to finally appear at the that designs, builds and user’s site. Other organizations distributes the machine). ala0 affect the design : competitors (they establish a deaign level and determine the product life): and government IsI 1.0 TNTRODUCTTON and standards. There are an ever increasing number Although one might think that of groups who feel compel led to computer architecture is the sole control all products bringing them determinant of a machine, it is all common norm : the merely the focal point for a government (“5) , testing groups such specification.
    [Show full text]