Tool Use, Reuse, and Organization in Command-Driven Interfaces

Total Page:16

File Type:pdf, Size:1020Kb

Tool Use, Reuse, and Organization in Command-Driven Interfaces University of Calgary PRISM: University of Calgary's Digital Repository Science Science Research & Publications 1988-12-01 TOOL USE, REUSE, AND ORGANIZATION IN COMMAND-DRIVEN INTERFACES Greenberg, Saul http://hdl.handle.net/1880/45930 unknown Downloaded from PRISM: https://prism.ucalgary.ca Contents List of ®gures ix List of tables xi Foreword xiii Acknowledgments and dedication xv 1 Introduction 1 : : : : : : : : : : : : : : : : : : : : : : : 1.1 Using physical tools : 1 : : : : : : 1.2 Soft tools in general-purpose computing environments : 4 : : : : : : : : : : : : : : : : : : : : : : : : : : : De®nitions : 4 : : : : : : : : : : : : : : : From appliances to manufacturing : 6 : : : : : : : : : : : : : : : : : : : : : : : Problem statement : 7 : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 1.3 Outline : 8 2 Studying UNIX 11 : : : : : : : : : : : : : : : : : : : : : : : : : 2.1 Choosing UNIX : 11 : : : : : : : : : : : : : : : : : : : : : : : : : Natural studies : 11 : : : : : : : : : : : : : : : : : A brief introduction to UNIX : 12 : : : : : : : : : : : : : : : : : : : : : : : Why study UNIX? : 14 : : : : : : : : 2.2 Techniques for analyzing activities of UNIX users : 16 : : : : : : : : : : : : : : : : : : : : : Traces of user activity : 16 : : : : : : : : : : : : : : : : : : : : : : : : Protocol analysis : 20 : : : : : : : : : : : : : : : 2.3 Data collection for the current study : 21 : : : : : : : : : : : : : : : : : : : : : : : 2.4 Concluding remarks : 25 3 Using commands in UNIX 26 : : : : : : 3.1 Frequency distributions of commands for large groups : 26 : : : : 3.2 Usage frequency of particular commands between groups : 27 3.3 Frequency distributions and command overlap between individuals 30 : : : : : : : : : : : : : : : 3.4 Growth of the command vocabulary : 32 : : : : : : : : : : : : : : : : : 3.5 Relations in command sequences : 34 : : : : : : : : : : : : : : : : : : : : : : : : : : : : 3.6 Discussion : 36 : : : : : : : : : : : : : : : : : : : : : : : 3.7 Concluding remarks : 38 v vi Contents 4 Techniques for reusing activities 40 : : : : : : : : : : : : : : : : : : : : : : : 4.1 History mechanisms : 41 : : : : : : : : : : : : : : : : : : : History in glass teletypes : 42 : : : : : : : : : : : : : : History through graphical selection : 44 : : : : : : : : : : : : : : : : : History by editing transcripts : 47 : : : : : : : : : : : : : : : : : History by navigational traces : 49 : : : : : : : : : : : : : : : : : : : : : : : : : 4.2 Adaptive systems : 52 : : : : : : : : : : : : : : : : : : Adaptive menu hierarchies : 53 : : : : : : : : : : : : : : : : : Reuse through text prediction : 54 : : : : : : : : : : : : : 4.3 Reuse through programming by example : 59 : : : : : : : : : : : : : : : : : : : : : : : 4.4 Concluding remarks : 63 5 Recurrent systems 65 : : : : : : : : : : : : : : : : : 5.1 A de®nition of recurrent systems : 65 : : : : : : : : : : 5.2 Recurrent systems in the non-computer world : 67 : : : : : : : : : : : : : : : Telephone usage ± a limited study : 67 : : : : : : : : : : : : 5.3 Recurrent systems in information retrieval : 73 : : : : : : : : : : : : : : : : : : Retrieving topics in manuals : 74 : : : : : : : : : : : : : : : : : 5.4 UNIX csh as a recurrent system : 74 : : : : : : : : : : : : : : : : Recurrences of command lines : 75 : : : : : : Command line frequency as a function of distance : 79 : : : : : : : : : : : : : : : : : : : : : : : 5.5 Concluding remarks : 81 6 Reuse opportunities in UNIX csh ± potential and actual 84 : : : : : : : : : : : : : : : : : : : 6.1 Conditioning the distribution : 84 : : : : : : : : : : : : : : : : : : : The quality of predictions : 85 : : : : : : : : : : : : : : : : Different conditioning methods : 86 : : : : : : : : : : : : : Evaluating the conditioning methods : 91 : : : : : : : : : : : : : : : : : : : : : : : : : : : Discussion : 101 : : : : : : : : : : : : : : : : : : : 6.2 Actual use of UNIX history : 102 : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Results : 102 : : : : : : : : : : : : : : : : : Corroboration and extensions : 103 : : : : : : : : : : : : : : : : : : : : : : : : : : : Discussion : 105 : : : : : : : : : : : : : : : : : : : : : : : 6.3 Concluding remarks : 106 7 Principles, corroboration, and justi®cation 108 : : : : : : : : : : : : : : : : : : : : : 7.1 Principles and guidelines : 108 : : : : : : : : : : Principles: how users repeat their activities : 108 : : : : : : : : : : : : : : : : : : : : : : : : : : 7.2 Corroboration : 112 : : : : : : : : : : : : : : : : : : : : : : : The GLIDE study : 112 : : : : : : : : : : : : : : : : : : : : : Results and discussion : 113 : : : : : : : : : : : : : : : : : : : : : : : : : : 7.3 Stepping back : 118 Contents vii : : : : : : : : : : : : : : : : : : : Plans and situated actions : 118 : : : : : : : : : : : : : Recurrences: natural fact or artifact? : 119 : : : : : : : : : : : : : : : : : : : : : : : 7.4 Concluding remarks : 121 8 Organizing activities through workspaces 123 : : : : : : : : : : : : : : : : : : : : : : : : 8.1 Relating activities : 124 : : : : : : : : : : : : 8.2 Implications: suggestions for workspaces : 127 : : : : : : : : : : : : : : : : : : : : A review of suggestions : 128 : : : : : : : : : : : : : : : Additional workspace suggestions : 129 : : : : : : : : : : : : : : : : : : : : : : : : : 8.3 Implementations : 131 : : : : : : : : : : : : : : : : : : : : : : : 8.4 Concluding remarks : 140 9 A workspace system: description and issues 141 : : : : : : : : : : : : : : : : : : : 9.1 The WORKBENCH system : 141 : : : : : : : : : : : : : : : : : A brief overview of Sunview : 142 : : : : : : : : : : : : : : : : An overview of WORKBENCH : 143 : : : : : : : : : : : : : : : : : : : : Designing the tool area : 146 : : : : : : : : : : : : : : : : : : : Designing the tool cabinet : 149 : : : : : : : : : : Underlying architecture of WORKBENCH : 152 : : : : : : : : : : : : 9.2 Pragmatic concerns and research questions : 155 10 Conclusion 159 : : : : : : : : : : : : : : : : : : : : : : 10.1 Argument of the book : 159 : : : : : : : : : : : : : : : : : : : : : : : : : : : 10.2 Contributions : 160 : : : : : : : : : : : : : : : : : : : : : : : 10.3 Looking to the future : 161 Appendix A:A sample trace 164 Appendix B:Summary statistics for each subject 169 References 177 Author index 183 Subject index 185 viii Contents This page intensionally left blank List of ®gures : : : 1.1 The Galapagos ®nch probing for insects with a cactus spine. : 2 : : : : : : : : : : : : : : : 1.2 An idealized carpenter's workshop. : 5 : : : : 3.1 The normalized command frequency, compared with Zipf. : 28 3.2 Command vocabulary size vs. the number of command lines en- : : : : : : : : : : : : : : : : : : : : tered for four individuals. : 33 : : : : : : : : : 3.3 Sequential structure of UNIX command usage. : 35 : : : : : : 4.1 Examples of the UNIX csh history mechanism in use. : 43 4.2 A portion of the INTERLISP±D environment, showing HIST- : : : : : : : : : : : : : : : : : : : : : : : : : : MENU in use. : 44 : : : : : : : 4.3 MINIT's WINDOW MANAGEMENT WINDOW. : 46 : 4.4 The VERSATERM terminal emulator for the Apple Macintosh. : 48 : : : : : : : : : : : : : : : : 4.5 The HYPERCARD recent screen. : 50 4.6 A sample FILE MANAGER window, showing a history list of the : : : : : : : : : : : : : : : : : : : : : : : last few ®les visited. : 52 4.7 The Apple Macintosh ªopen dialogº box, showing the BOOMER- : : : : : : : : : : : : : : : : : : : : : : : ANG history menu. : 53 : : 4.8 Menu trees generated by uniform and probability subdivision. : 55 4.9 Using RK-BUTTON, the UNIX version of the REACTIVE KEY- BOARD: (a) a dialog with UNIX; (b) some commands; and (c) : : : : : : : : : : : : : : : screen contents at end of the dialog. : 57 4.10 RK-POINTER menu and feedback showing ®ve interaction se- : : : : : : : : : : : : : : : : : : : : : : : : : : : : : quences. : 58 : 4.11 The QUICKEYS menu and several sequence-editing windows. : 62 5.1 The number of different calls made vs. the number of calls dialed : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : so far. : 69 5.2 Relation between recurrence rate and the number of calls made. : 70 : : : : : 5.3 Recurrences of phone numbers as a measure of distance. : 72 5.4 Cumulative recurrences of phone numbers as a measure of distance. 73 5.5 Regression: (a) command line vocabulary size; and (b) the % recurrence rate vs. the total command lines entered by each subject. 77 5.6 Command line vocabulary size vs. the number of commands en- : : : : : : : : : : : : : : : : : tered for four typical individuals. : 78 R : : : : : : : : : 5.7 Processing a subject's trace for all values of s;d . 80 ix x List of ®gures 5.8 (a) Recurrence distribution; and (b) cumulative recurrence distri- : : : : : : : : : : : : : : : : : bution as a measure of distance. : 82 6.1 Cumulative probabilities of a recurrence over distance for various : : : : : : : : : : : : : : : : : : : : : : conditioning methods. : 97 6.2 Cumulative average number of characters saved per submission : : : : : : : : : : : : : : : : : : : : : : : : : : over distance. : 98 6.3 (a) Cumulative distribution of history; and (b) distribution of history : : : : : : : : : : : : : : : : : : : use as a measure of distance. : 104 7.1 Cumulative probabilities of a recurrence over distance for various : : : : : : : : : : : : : : : : : : : : : : conditioning methods. : 116 7.2 Cumulative average number of characters saved per submission : : : : : : : : : : : : : : : : : : : : : : : : : : over distance. : 117 : : : 8.1 A user's ¯ow
Recommended publications
  • Operating RISC: UNIX Standards in the 1990S
    Operating RISC: UNIX Standards in the 1990s This case was written by Will Mitchell and Paul Kritikos at the University of Michigan. The case is based on public sources. Some figures are based on case-writers' estimates. We appreciate comments from David Girouard, Robert E. Thomas and Michael Wolff. The note "Product Standards and Competitive Advantage" (Mitchell 1992) supplements this case. The latest International Computerquest Corporation analysis of the market for UNIX- based computers landed on three desks on the same morning. Noel Sharp, founder, chief executive officer, chief engineer and chief bottle washer for the Superbly Quick Architecture Workstation Company (SQAWC) in Mountain View, California hoped to see strong growth predicted for the market for systems designed to help architects improve their designs. In New York, Bo Thomas, senior strategist for the UNIX systems division of A Big Computer Company (ABCC), hoped that general commercial markets for UNIX-based computer systems would show strong growth, but feared that the company's traditional mainframe and mini-computer sales would suffer as a result. Airborne in the middle of the Atlantic, Jean-Helmut Morini-Stokes, senior engineer for the UNIX division of European Electronic National Industry (EENI), immediately looked to see if European companies would finally have an impact on the American market for UNIX-based systems. After looking for analysis concerning their own companies, all three managers checked the outlook for the alliances competing to establish a UNIX operating system standard. Although their companies were alike only in being fictional, the three managers faced the same product standards issues. How could they hasten the adoption of a UNIX standard? The market simply would not grow until computer buyers and application software developers could count on operating system stability.
    [Show full text]
  • The Rise & Development of Illumos
    Fork Yeah! The Rise & Development of illumos Bryan Cantrill VP, Engineering [email protected] @bcantrill WTF is illumos? • An open source descendant of OpenSolaris • ...which itself was a branch of Solaris Nevada • ...which was the name of the release after Solaris 10 • ...and was open but is now closed • ...and is itself a descendant of Solaris 2.x • ...but it can all be called “SunOS 5.x” • ...but not “SunOS 4.x” — thatʼs different • Letʼs start at (or rather, near) the beginning... SunOS: A peopleʼs history • In the early 1990s, after a painful transition to Solaris, much of the SunOS 4.x engineering talent had left • Problems compounded by the adoption of an immature SCM, the Network Software Environment (NSE) • The engineers revolted: Larry McVoy developed a much simpler variant of NSE called NSElite (ancestor to git) • Using NSElite (and later, TeamWare), Roger Faulkner, Tim Marsland, Joe Kowalski and Jeff Bonwick led a sufficiently parallelized development effort to produce Solaris 2.3, “the first version that worked” • ...but with Solaris 2.4, management took over day-to- day operations of the release, and quality slipped again Solaris 2.5: Do or die • Solaris 2.5 absolutely had to get it right — Sun had new hardware, the UltraSPARC-I, that depended on it • To assure quality, the engineers “took over,” with Bonwick installed as the gatekeeper • Bonwick granted authority to “rip it out if itʼs broken" — an early BDFL model, and a template for later generations of engineering leadership • Solaris 2.5 shipped on schedule and at quality
    [Show full text]
  • IBM System Storage Open Systems Tape Encryption Solutions
    Front cover IBM System Storage Open Systems Tape Encryption Solutions Understanding tape encryption and Tivoli Key Lifecycle Manager Version 2 Planning for and installing hardware and software Configuring and managing the tape encryption solution Alex Osuna Luciano Cecchetti Edgar Vinson ibm.com/redbooks International Technical Support Organization IBM System Storage Open Systems Tape Encryption Solutions December 2010 SG24-7907-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (December 2010) This edition applies to Tivoli Key Lifecycle Manager (TKLM) Version 2. © Copyright International Business Machines Corporation 2010. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix The team who wrote this book . .x Become a published author . xi Comments welcome. xi Stay connected to IBM Redbooks . xii Chapter 1. Introduction to tape encryption. 1 1.1 IBM System Storage tape drives. 2 1.2 How tape data encryption works . 4 1.3 What to encrypt . 6 1.4 Why use tape data encryption. 7 1.4.1 Why encrypt data in the drive . 7 1.4.2 Fundamental to encryption: Policy and key management . 7 1.4.3 Summary. 8 1.5 Concepts of tape data encryption . 8 1.5.1 Symmetric key encryption. 9 1.5.2 Asymmetric key encryption . 11 1.5.3 Hybrid encryption . 14 1.5.4 Digital certificates . 15 1.6 Simplifying key management with TKLM . 20 1.6.1 Encryption as a critical business process .
    [Show full text]
  • Chapter 4 Introduction to UNIX Systems Programming
    Chapter 4 Introduction to UNIX Systems Programming 4.1 Introduction Last chapter covered how to use UNIX from from a shell program using UNIX commands. These commands are programs that are written in C that interact with the UNIX environment using functions called Systems Calls. This chapter covers this Systems Calls and how to use them inside a program. 4.2 What is an Operating System An Operating System is a program that sits between the hardware and the application programs. Like any other program it has a main() function and it is built like any other program with a compiler and a linker. However it is built with some special parameters so the starting address is the boot address where the CPU will jump to start the operating system when the system boots. Draft An operating system typically offers the following functionality: ● Multitasking The Operating System will allow multiple programs to run simultaneously in the same computer. The Operating System will schedule the programs in the multiple processors of the computer even when the number of running programs exceeds the number of processors or cores. ● Multiuser The Operating System will allow multiple users to use simultaneously in the same computer. ● File system © 2014 Gustavo Rodriguez-Rivera and Justin Ennen,Introduction to Systems Programming: a Hands-on Approach (V2014-10-27) (systemsprogrammingbook.com) It allows to store files in disk or other media. ● Networking It gives access to the local network and internet ● Window System It provides a Graphical User Interface ● Standard Programs It also includes programs such as file utilities, task manager, editors, compilers, web browser, etc.
    [Show full text]
  • Open Technology Development (OTD): Lessons Learned & Best Practices for Military Software
    2011 OTD Lessons Learned Open Technology Development (OTD): Lessons Learned & Best Practices for Military Software 2011-05-16 Sponsored by the Assistant Secretary of Defense (Networks & Information Integration) (NII) / DoD Chief Information Officer (CIO) and the Under Secretary of Defense for Acquisition, Technology, and Logistics (AT&L) This document is released under the Creative Commons Attribution ShareAlike 3.0 (CC- BY-SA) License. You are free to share (to copy, distribute and transmit the work) and to remix (to adapt the work), under the condition of attribution (you must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work)). For more information, see http://creativecommons.org/licenses/by/3.0/ . The U.S. government has unlimited rights to this document per DFARS 252.227-7013. Portions of this document were originally published in the Software Tech News, Vol.14, No.1, January 2011. See https://softwaretechnews.thedacs.com/ for more information. Version - 1.0 2 2011 OTD Lessons Learned Table of Contents Chapter 1. Introduction........................................................................................................................... 1 1.1 Software is a Renewable Military Resource ................................................................................ 1 1.2 What is Open Technology Development (OTD) ......................................................................... 3 1.3 Off-the-shelf (OTS) Software Development
    [Show full text]
  • An Analysis of the Strategic Management of Technology in the Context of the Organizational Life-Cycle
    An Analysis of the Strategic Management of Technology in the Context of the Organizational Life-Cycle by Steven W. Klosterman BSEE (1983), University of Cincinnati Submitted to the System Design and Management Program in partial fulfillment of the requirements for the degree of Master of Science in Engineering and Management at the Massachusetts Institute of Technology June 2000 C 2000 Steven W. Klosterman. All rights reserved. The author hereby grants to MIT permission to reproduce and to distribute publicly paper and electronic copies of this thesis document in whole or in part. Signature of Author --------- System Design and Management Program. June, 2000 Certified by Thomas Kochan George M. Bunker Professor of Management Thesis Supervisor Accepted by Thomas Kochan Co-Director, System Design and Management Program Sloan School of Management Acceptedby Paul A. Lagace Co-Director, System Design and Management Program Professor of Aeronautics and Astronautics MASSACHUSETTS INSTITUTE OF TECHNOLOGY EN JUN 1 4 2000 LIBRARIES I Acknowledgements I would like to thank the individuals and organizations that have helped me pursue this thesis and my MIT education: To the System Design and Management (SDM) program for providing the vision of flexible, distance learning as an enabler for mid-career engineers to study at one of the world's foremost centers of learning. To Tom Magnanti, Tom Kochan, Ed Crawley, John Williams, Margee Best, Anna Barkley, Leen Int'Veld, Dan Frey, Jon Griffith and Dennis Mahoney, I cannot sufficiently express my gratitude for being given the privilege of becoming a member of the MIT community. To my fellow students in the SDM program for providing the support, encouragement and help, I am honored to be associated with you.
    [Show full text]
  • An Introduction to X Window Application Development
    Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 1992-03 An introduction to X Window application development. Rust, David Michael Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/23933 FV KNOX LIBRARY •Ud SCHOOL SivAL POSTGRADUATE SoNTEHEV.CAUFORN.AG^^ CURITY CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE 1b. RESTRICTIVE MARKINGS REPORT SECURITY CLASSIFICATION UNCLASSIFIED a SECURITY CLASSIPICAT I6M AUTH6RITV 3. bisTRiBuTi6N7AVAlLABiUTY 6P REP5RT Approved for public release; b. dECLAssIFICATIoN/doWNgRADINg SCHEDULE distribution is unlimited PERFORMING ORGANIZATION REP6RT NUM&ER(S) 5. M6niT6Ring6Rgani2aTi6n rep6rT numbER(S) *. NAME 6F PERFORMING 6R6ANIZATI6N 6b OFFICE SYMBOL 7a. NAME 6E M6NIT6R1NG ORGANIZATION vdministrative Sciences Department (if applicable) Naval Postgraduate School Javal Postgraduate School AS :. ADDRESS (City, State, and ZIP Code) 7b. ADDRESS (City, State, and ZIP Code) /lonterey, CA 93943-5000 Monterey, CA 93943-5000 NAME OF FUNDING/SPONSORING 8b. OFFICE SYMBOL g PROCURE M E N T I NST RUMEN T ID E N T I FI CATION NUMBE R ORGANIZATION (if applicable) 6. ADDRESS (City, State, and ZIP Code) 10. SOURCE OF FUNDING NUMBERS PROGRAM 1 PR6JECT TTa^R" WoRkUNiT ELEMENT NO. NO. NO. ACCESSION NO. 1 . TITLE (Include Security Classification) ^N INTRODUCTION TO X WINDOW APPLICATION DEVELOPMENT (U) 2 PERSONAL AUTHOR(S) lust, David M. 3a. type of report 13b. time covered 14. DATE OF REPORT (Year, Month, Day) 16. PAGE COUNT Master's Thesis from 10/90 to 03/92 1992, March, 23 70 supplementary notation 6 The views expressed in this ^sis ^ those of the author md do not reflect the official policy or position of the Department of Defense or the United States Government.
    [Show full text]
  • Oracle Solaris Administration Common Tasks
    Oracle® Solaris Administration: Common Tasks Part No: 821–1451–11 December 2011 Copyright © 1998, 2011, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract,and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007). Oracle America, Inc., 500 Oracle Parkway, Redwood City, CA 94065.
    [Show full text]
  • A Source Book from the Open Group
    A Source Book from The Open Group The Single UNIX· Specification: The Authorized Guide to Version 3, 2nd Edition The Open Group Copyright ¶ June 2004, The Open Group All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the copyright owners. A Source Book from The Open Group The Single UNIX· Specification: The Authorized Guide to Version 3, 2nd Edition ISBN: 1-931624-47-X Document Number: G041 Published in the U.S. by The Open Group, June 2004. Any comments relating to the material contained in this document may be submitted by email to: [email protected] ii A Source Book from The Open Group (2004) ____________________________________________________ Contents ____________________________________________________ Chapter 1 The Single UNIX Specification............................................ 1 1.1 Introduction.................................................................................. 1 1.2 Background ................................................................................. 1 1.3 The Value of Standards................................................................ 2 1.4 The Single UNIX Specification ..................................................... 2 1.5 Benefits for Application Developers.............................................. 3 1.6 Benefits for Users........................................................................ 3 1.7 The
    [Show full text]
  • Chapter 2 Unix
    Chapter 2 Unix UNIX is basically a simple operating system, but you have to be a genius to understand the simplicity. –DennisRitchie 2.1 Unix History For many people the term “System Administrator” implies operation of Unix systems, even though the same concepts, tasks and practices apply largely to the maintenance of hosts running any operating system. In this book, we strive to describe principles that are universally applicable and not bound by a specific operating system. We will regularly use Unix as the prime example and cite its features and specific aspects because of its academic background, long history of openness, high penetration of the infrastructure marketplace, and its role as a cornerstone of the Internet. 2.1.1 The Operating System How the Unix operating system came to be and how that relates to the de- velopment of the Internet and various related technologies is fascinating; just 28 CHAPTER 2. UNIX 29 about every other Unix-related book already covers this topic in great detail. In this chapter, we summarize these developments with a focus on the major milestones along the road from the birth of Unix as a test platform for Ken Thompson’s “Space Travel” game running on a PDP-7 to the most widely used server operating system that nowadays also happens to power consumer desktops and laptops (in the form of Linux and Apple’s OS X), mobile de- vices (Apple’s iOS is OS X based and thus Unix derived; Google’s Android is a Linux flavor), TVs, commodity home routers, industry scale networking equipment, embedded devices on the Internet of Things (IoT), and virtually all supercomputers1.
    [Show full text]
  • Linux System Programming Focuses on Everything Above the Kernel, Where Applications Such As Apache, Bash, Cp, Vim, Emacs, Gcc, Gdb, Glibc, Ls, Mv, and X Exist
    Overview This book is about writing software that makes the most effective use of the system you're running on -- code that interfaces directly with the kernel and core system libraries, including the shell, text editor, compiler, debugger, core utilities, and system daemons. The majority of both Unix and Linux code is still written at the system level, and Linux System Programming focuses on everything above the kernel, where applications such as Apache, bash, cp, vim, Emacs, gcc, gdb, glibc, ls, mv, and X exist. Written primarily for engineers looking to program (better) at the low level, this book is an ideal teaching tool for any programmer. Even with the trend toward high-level development, either through web software (such as PHP) or managed code (C#), someone still has to write the PHP interpreter and the C# virtual machine. Linux System Programming gives you an understanding of core internals that makes for better code, no matter where it appears in the stack. Debugging high-level code often requires you to understand the system calls and kernel behavior of your operating system, too. Key topics include: • An overview of Linux, the kernel, the C library, and the C compiler • Reading from and writing to files, along with other basic file I/O operations, including how the Linux kernel implements and manages file I/O • Buffer size management, including the Standard I/O library • Advanced I/O interfaces, memory mappings, and optimization techniques • The family of system calls for basic process management • Advanced process management,
    [Show full text]
  • System Administration Guide: Advanced Administration
    System Administration Guide: Advanced Administration Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 819–2380–13 May 2008 Copyright 2008 Sun Microsystems, Inc. 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved. Sun Microsystems, Inc. has intellectual property rights relating to technology embodied in the product that is described in this document. In particular, and without limitation, these intellectual property rights may include one or more U.S. patents or pending patent applications in the U.S. and in other countries. U.S. Government Rights – Commercial software. Government users are subject to the Sun Microsystems, Inc. standard license agreement and applicable provisions of the FAR and its supplements. This distribution may include materials developed by third parties. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, the Solaris logo, the Java Coffee Cup logo, docs.sun.com, Java, OpenSolaris, Sun xVM hypervisor, and Solaris aretrademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. Adobe is a registered trademark of Adobe Systems, Incorporated. PostScript is a trademark or registered trademark of Adobe Systems, Incorporated, which may be registered in certain jurisdictions.
    [Show full text]