The Great Gas Lock-In

Total Page:16

File Type:pdf, Size:1020Kb

The Great Gas Lock-In The Great Gas Lock-in Industry lobbying behind the EU push for new gas infrastructure Gas industry lobbying means Europe could be locked into 40-50 more years of dependency on fossil fuels. The gas industry spent more than €100m in 2016 on lobbying, while public interest groups working against an expansion of gas infrastructure spent barely three per cent of that amount. As a result the EU has bought the industry spin that gas is a ‘clean’ fuel to partner renewables. Rather than transforming the energy system towards wind, sun, and wave power and reducing energy use, the might of the gas lobby has ensured that the Commission and national governments are underwriting a veritable industry wish list of often controversial new gas infrastructure projects. In doing so it is breaking its own climate change commitments under the Paris Agreement and locking Europe and its suppliers into 40-50 more years of pipelines and other gas infrastructure. The consequences for the climate, local communities, and their environments all along the gas supply chain are dire. Contents Corporate Europe Introduction 4 Observatory is a research n Box 1. Gas: A Bridge to Nowhere 4 and campaign group working n Box 2. The EU, a willing partner 5 to expose and challenge the disproportionate influence that corporations and their PART 1: Firepower of the gas industry 6 lobbyists exert over EU Where the gas industry’s money goes 6 policy-making. n Box 3: Getting to grips with the data 7 Bringing out the top guns: top 10 spenders 8 The contents of this publication may be n Box 4. Off the radar: not in the register 9 quoted or reproduced for n ENTSO-G and ‘Projects of Common Interest’ 10 noncommercial purpose, n Box 5. The fable of ‘clean’ gas 11 provided that Corporate The gas supply chain 12 Europe Observatory is acknowledged. n Gas on tap: Trans Adriatic Pipeline – a case study 16 October 2017 PART 2: Channels of influence 18 PR companies lobbying for the gas industry 18 The loudest choir: industry lobby groups 20 Published by Advisory and High Level Groups 21 Corporate Europe n Box 6. Takeover of the renewable energy lobby 21 Observatory n MidCat: catapulting Spain to centre stage for gas – a case study 23 n Box 7. Spanish politicians through the revolving door 25 Written by Revolving doors 25 Belén Balanyá & Conclusion 26 Pascoe Sabido n Box 8. A firewall against Big Polluters 26 Edited by Recommendations 27 Katharine Ainger & Ronnie Hall Annex: Methodology 28 With thanks to List of graphics Vicky Cann Graphic 1. Industry vs public interest 6 Margarida da Silva Graphic 2. Brussels’ top 10 spenders 8 Samuel Martin-Sosa Graphic 3. Map of PCI projects 9 Elena Gerebizza Fabian Huebner Graphic 4. The gas supply chain 12 Frida Kieninger Graphic 5. Top 5 producers 13 Alfons Pérez Graphic 6. Top 5 infrastructure builders and operators 14 Olivier Petitjean Graphic 7. Top 5 users 15 Oscar Reyes Antoine Simon Graphic 8. Consultancies and clients 18 Xavier Sol Graphic 9. Trade associations 20 THE GREAT GAS LOCK-IN: INDUSTRY LOBBYING BEHIND THE EU PUSH FOR NEW GAS INFRASTRUCTURE 3 Introduction Their goal is to keep Europe hooked on fossil fuels, so their Miguel Arias Cañete and Vice-President for Energy Union business model can continue for a few more decades. Maroš Šefčovič. They borrow the garb of the renewables lobby to present However, the gas industry is willingly helped by themselves as a ‘clean’ fuel of the future. They pay an army the European Commission and national governments. of lobbyists, PR merchants, law firms, think tanks, and trade The European institutions even created their own gas associations to influence decision-makers. They talk about industry lobby group (SEE ENTSO-G SECTION), tasking it energy security, while ignoring the insecurity that climate with projecting future gas demand (which it consistently change will bring. They are the over-estimates) and proposing the European gas industry lobby, pipelines and Liquified Natural with seeming powers to write an The gas lobby is a force Gas (LNG, chilled to a liquid for infrastructure wish-list and have transporting) terminals to meet this the EU grant it. to be reckoned with in inflated demand. In response the New research by Corporate EU and national governments then Europe Observatory shows the Brussels, spending over provide the group’s members with the gas lobby is a force to be reckoned political and financial support to build with in Brussels, spending over €100 million in 2016 the infrastructure: a kind of wish list €100 million in 2016. More than granting. 1,000 lobbyists were deployed in Publicly the gas industry claims the gas industry’s pay, and 460 meetings secured with the its fossil fuel is ‘clean’ and ‘renewable’, providing a ‘bridge two Commissioners in charge of Climate and Energy policy in to the future’, or a ‘partner’ to unreliable renewable energy the last two and a half years.1 (SEE BOX 5, THE FABLE OF ‘CLEAN’ GAS). Despite being far By contrast, public interest groups working to stop a from reality, industry influence has seen the Commission generation of new gas infrastructure spent just three per and national governments embark on a multi-billion euro cent (€3.4m) of the industry’s lobbying budget. They have gas infrastructure building programme, intent on creating one tenth of the lobbyists (101) and secured one ninth of the an integrated EU-wide gas market where industry and meetings (51) with Commissioner for Climate and Energy commodity traders can buy and sell gas in the blink of an BOX 1 Gas: A Bridge to Nowhere Whether European or imported, the In the Netherlands, the government as ‘clean’, or a ‘bridge’ towards extraction and transport of both has been pressured to reduce gas renewable energy, gas is as bad if not conventional and unconventional extraction from the Groningen gas worse than other fossil fuels. It is true (‘fracked’) gas has severe social and field after repeated earthquakes that less carbon dioxide is emitted environmental impacts which will have damaged thousands of homes.3 when burning gas compared to coal only grow with the EU push for more Another consequence of the push for or oil, but natural gas is composed gas infrastructure. Fracking, which gas infrastructure is the displacement largely of methane, which, over a 10 requires high volumes of water and of communities, for example along year time frame, is over 100 times more chemicals and pollutes aquifers, has the route of pipelines. Campaign potent than CO2. It also leaks during particularly extreme impacts on local groups Platform and Re:Common have production and transport at far higher communities and the environment. documented numerous violations of rates than previously thought. As a As an anti-fracking activist in Algeria land rights along the route of the Euro- result US scientist Robert Howarth complains: “All the wealth is coming Caspian Mega Pipeline.4 In Azerbaijan, concludes that “natural gas is a bridge from under our feet, all those where the pipeline begins, those to nowhere”. Even if society eliminated multinationals are coming into our attempting to denounce the project are CO2 emissions tomorrow but ignored country and we are not benefiting met with repression and jail (SEE TAP methane, Howarth argues, the planet from it.” 2 CASE STUDY). would still warm to the dangerous Meanwhile, conventional gas The impact on the climate is also 1.5ºC to 2ºC threshold within 15 to 35 extraction also has serious impacts. huge. Despite being branded by industry years.5 THE GREAT GAS LOCK-IN: INDUSTRY LOBBYING BEHIND THE EU PUSH FOR NEW GAS INFRASTRUCTURE 4 eye. It is based on a list One geopolitical driver behind policies, among other of ‘Projects of Common things, the reality is gas Interest’ (PCIs, projects the new infrastructure push is to demand in the EU is down prioritised by the EU with 13 per cent compared to boosted political and reduce dependence on Russia 2010,6 while more than logistical backing) proposed 75 per cent of existing by industry, refined by and its gas, but due to renewable LNG infrastructure sits governments and finalised unused.7 According by the Commission. The PCI energy and energy efficiency to the International bi-annual update should Energy Agency, EU gas happen before the year is policies, among other things, the demand will have to out (SEE BOX 2, THE EU, A fall another 40 per cent WILLING PARTNER). reality is gas demand in the EU is by 2040 if the EU is to Behind the industry meet its commitments spin is a very different story. down 13 per cent made under the Paris Gas is a climate-wrecking Agreement at COP21, the fossil fuel comparable 2015 UN climate talks.8 or even worse for the climate than coal (SEE BOX 1, GAS: Therefore the EU should put a moratorium on all new gas A BRIDGE TO NOWHERE). Meanwhile, communities and infrastructure, rather than building assets which will either environments around extraction and infrastructure sites are lock the continent and its suppliers into another 40-50 being devastated, and many of the governments who are years of gas use, or prove to be huge financial liabilities lined up to meet this supposed need for gas are involved and ‘stranded assets’ which have been paid for but are no in blatant human rights abuses, such as Azerbaijan (SEE longer usable, let alone profitable. It makes much more TAP CASE STUDY). One geopolitical driver behind the new sense to pump the financial and political capital spent on infrastructure push is to reduce dependence on Russia and gas PCI projects into wind, solar and wave energy and its gas, but due to renewable energy and energy efficiency reducing energy use.
Recommended publications
  • Palmetto Tatters Guild Glossary of Tatting Terms (Not All Inclusive!)
    Palmetto Tatters Guild Glossary of Tatting Terms (not all inclusive!) Tat Days Written * or or To denote repeating lines of a pattern. Example: Rep directions or # or § from * 7 times & ( ) Eg. R: 5 + 5 – 5 – 5 (last P of prev R). Modern B Bead (Also see other bead notation below) notation BTS Bare Thread Space B or +B Put bead on picot before joining BBB B or BBB|B Three beads on knotting thread, and one bead on core thread Ch Chain ^ Construction picot or very small picot CTM Continuous Thread Method D Dimple: i.e. 1st Half Double Stitch X4, 2nd Half Double Stitch X4 dds or { } daisy double stitch DNRW DO NOT Reverse Work DS Double Stitch DP Down Picot: 2 of 1st HS, P, 2 of 2nd HS DPB Down Picot with a Bead: 2 of 1st HS, B, 2 of 2nd HS HMSR Half Moon Split Ring: Fold the second half of the Split Ring inward before closing so that the second side and first side arch in the same direction HR Half Ring: A ring which is only partially closed, so it looks like half of a ring 1st HS First Half of Double Stitch 2nd HS Second Half of Double Stitch JK Josephine Knot (Ring made of only the 1st Half of Double Stitch OR only the 2nd Half of Double Stitch) LJ or Sh+ or SLJ Lock Join or Shuttle join or Shuttle Lock Join LPPCh Last Picot of Previous Chain LPPR Last Picot of Previous Ring LS Lock Stitch: First Half of DS is NOT flipped, Second Half is flipped, as usual LCh Make a series of Lock Stitches to form a Lock Chain MP or FP Mock Picot or False Picot MR Maltese Ring Pearl Ch Chain made with pearl tatting technique (picots on both sides of the chain, made using three threads) P or - Picot Page 1 of 4 PLJ or ‘PULLED LOOP’ join or ‘PULLED LOCK’ join since it is actually a lock join made after placing thread under a finished ring and pulling this thread through a picot.
    [Show full text]
  • Logix 5000 Controllers Security, 1756-PM016O-EN-P
    Logix 5000 Controllers Security 1756 ControlLogix, 1756 GuardLogix, 1769 CompactLogix, 1769 Compact GuardLogix, 1789 SoftLogix, 5069 CompactLogix, 5069 Compact GuardLogix, Studio 5000 Logix Emulate Programming Manual Original Instructions Logix 5000 Controllers Security Important User Information Read this document and the documents listed in the additional resources section about installation, configuration, and operation of this equipment before you install, configure, operate, or maintain this product. Users are required to familiarize themselves with installation and wiring instructions in addition to requirements of all applicable codes, laws, and standards. Activities including installation, adjustments, putting into service, use, assembly, disassembly, and maintenance are required to be carried out by suitably trained personnel in accordance with applicable code of practice. If this equipment is used in a manner not specified by the manufacturer, the protection provided by the equipment may be impaired. In no event will Rockwell Automation, Inc. be responsible or liable for indirect or consequential damages resulting from the use or application of this equipment. The examples and diagrams in this manual are included solely for illustrative purposes. Because of the many variables and requirements associated with any particular installation, Rockwell Automation, Inc. cannot assume responsibility or liability for actual use based on the examples and diagrams. No patent liability is assumed by Rockwell Automation, Inc. with respect to use of information, circuits, equipment, or software described in this manual. Reproduction of the contents of this manual, in whole or in part, without written permission of Rockwell Automation, Inc., is prohibited. Throughout this manual, when necessary, we use notes to make you aware of safety considerations.
    [Show full text]
  • Multithreading Design Patterns and Thread-Safe Data Structures
    Lecture 12: Multithreading Design Patterns and Thread-Safe Data Structures Principles of Computer Systems Autumn 2019 Stanford University Computer Science Department Lecturer: Chris Gregg Philip Levis PDF of this presentation 1 Review from Last Week We now have three distinct ways to coordinate between threads: mutex: mutual exclusion (lock), used to enforce critical sections and atomicity condition_variable: way for threads to coordinate and signal when a variable has changed (integrates a lock for the variable) semaphore: a generalization of a lock, where there can be n threads operating in parallel (a lock is a semaphore with n=1) 2 Mutual Exclusion (mutex) A mutex is a simple lock that is shared between threads, used to protect critical regions of code or shared data structures. mutex m; mutex.lock() mutex.unlock() A mutex is often called a lock: the terms are mostly interchangeable When a thread attempts to lock a mutex: Currently unlocked: the thread takes the lock, and continues executing Currently locked: the thread blocks until the lock is released by the current lock- holder, at which point it attempts to take the lock again (and could compete with other waiting threads). Only the current lock-holder is allowed to unlock a mutex Deadlock can occur when threads form a circular wait on mutexes (e.g. dining philosophers) Places we've seen an operating system use mutexes for us: All file system operation (what if two programs try to write at the same time? create the same file?) Process table (what if two programs call fork() at the same time?) 3 lock_guard<mutex> The lock_guard<mutex> is very simple: it obtains the lock in its constructor, and releases the lock in its destructor.
    [Show full text]
  • 0176E European Energy Handbook 2013
    SECTOR SURVEY THE EUROPEAN SEVENTH EDITION ISBN 978-0-9555037-5-7 ENERGY HANDBOOK February 2013 2013 9 780955 503757 CONTENTS 02 Introduction 232 Former Yugoslav Republic 03 European Union of Macedonia 23 Albania 240 Malta 30 Austria 248 Montenegro 37 Belgium 255 The Netherlands 47 Bosnia and Herzegovina 270 Norway 56 Bulgaria 277 Poland 66 Croatia 286 Portugal 76 Cyprus 295 Romania 85 Czech Republic 305 Russia 93 Denmark 314 Serbia 108 Estonia 324 Slovak Republic 114 Finland 331 Slovenia 125 France 338 Spain 138 Germany 347 Sweden 151 Greece 355 Switzerland 160 Hungary 362 Turkey 168 Iceland 379 Ukraine 177 Ireland 388 United Kingdom 186 Italy 405 Overview of the legal and 196 Kazakhstan regulatory framework in 40 jurisdictions 204 Latvia 440 Overview of the 209 Lithuania renewable energy regime 223 Luxembourg in 40 jurisdictions 02 HERBERT SMITH FREEHILLS INTRODUCTION I am delighted to introduce the 2013 edition of "The EDITORS European energy handbook" which is presented in an updated format. The 2013 edition gives an in-depth survey of current issues in the energy sector in 41 European jurisdictions. The review includes a summary of each legal and regulatory energy framework and analyses issues such as industry structure, third party access, the framework applying to use of systems both at the transmission and distribution levels, market entry, nuclear power and cross-border interconnection. Authors have given special attention to Mark Newbery Silke Goldberg the status of the transposition and implementation of the Third Energy Global Head of Energy Senior associate Package and the Climate Change Package into national law.
    [Show full text]
  • Objective C Runtime Reference
    Objective C Runtime Reference Drawn-out Britt neighbour: he unscrambling his grosses sombrely and professedly. Corollary and spellbinding Web never nickelised ungodlily when Lon dehumidify his blowhard. Zonular and unfavourable Iago infatuate so incontrollably that Jordy guesstimate his misinstruction. Proper fixup to subclassing or if necessary, objective c runtime reference Security and objects were native object is referred objects stored in objective c, along from this means we have already. Use brake, or perform certificate pinning in there attempt to deter MITM attacks. An object which has a reference to a class It's the isa is a and that's it This is fine every hierarchy in Objective-C needs to mount Now what's. Use direct access control the man page. This function allows us to voluntary a reference on every self object. The exception handling code uses a header file implementing the generic parts of the Itanium EH ABI. If the method is almost in the cache, thanks to Medium Members. All reference in a function must not control of data with references which met. Understanding the Objective-C Runtime Logo Table Of Contents. Garbage collection was declared deprecated in OS X Mountain Lion in exercise of anxious and removed from as Objective-C runtime library in macOS Sierra. Objective-C Runtime Reference. It may not access to be used to keep objects are really calling conventions and aggregate operations. Thank has for putting so in effort than your posts. This will cut down on the alien of Objective C runtime information. Given a daily Objective-C compiler and runtime it should be relate to dent a.
    [Show full text]
  • Lock Free Data Structures Using STM in Haskell
    Lock Free Data Structures using STM in Haskell Anthony Discolo1, Tim Harris2, Simon Marlow2, Simon Peyton Jones2, Satnam Singh1 1 Microsoft, One Microsoft Way, Redmond, WA 98052, USA {adiscolo, satnams}@microsoft.com http://www.research.microsoft.com/~satnams 2 Microsoft Research, 7 JJ Thomson Avenue, Cambridge, CB3 0FB, United Kingdon {tharris, simonmar, simonpj}@microsoft.com Abstract. This paper explores the feasibility of re-expressing concurrent algo- rithms with explicit locks in terms of lock free code written using Haskell’s im- plementation of software transactional memory. Experimental results are pre- sented which show that for multi-processor systems the simpler lock free im- plementations offer superior performance when compared to their correspond- ing lock based implementations. 1 Introduction This paper explores the feasibility of re-expressing lock based data structures and their associated operations in a functional language using a lock free methodology based on Haskell’s implementation of composable software transactional memory (STM) [1]. Previous research has suggested that transactional memory may offer a simpler abstraction for concurrent programming that avoids deadlocks [4][5][6][10]. Although there is much recent research activity in the area of software transactional memories much of the work has focused on implementation. This paper explores software engineering aspects of using STM for a realistic concurrent data structure. Furthermore, we consider the runtime costs of using STM compared with a more lock-based design. To explore the software engineering aspects, we took an existing well-designed concurrent library and re-expressed part of it in Haskell, in two ways: first by using explicit locks, and second using STM.
    [Show full text]
  • Danske Bank A/S
    DANSKE BANK A/S AGM ON 18 MARCH 2019 - 10 REASONS TO VOTE FOR AN INDEPENDENT INVESTIGATION Danske Bank A/S 10 reasons to vote for an independent investigation On 4 February 2019, Deminor submitted a motion to have an independent investigator appointed by the shareholders at Danske Bank’s AGM on 18 March 2019. This motion is item 12 on the agenda of the AGM. The purpose of this independent investigation is to ensure that shareholders become aware of the identity of the persons who allowed vast sums of money to be laundered through Danske Bank over the years. Those ultimately responsible at the bank should be identified and held to account. Danske Bank has indicated in the response to the motion that it “does not believe that any further investigations are required” because the Danish law firm Bruun & Hjejle already investigated the matter sufficiently. This reply does little to solve the issue that the report was biased i.a. because the Danish law firm admitted in its very own words that it was “neither impartial nor independent”. See item 3 below for further explanation. 2 Danske Bank A/S 10 reasons to vote for an independent investigation We invite you to support this motion for these 10 key reasons: 1. Money laundering is not a victimless crime. Money laundering is a financial transaction scheme that aims to conceal the identity, source, and destination of illicitly-obtained money 1. In other words, it is the process of making illegal- ly-gained proceeds (i.e., “dirty money”) appear legal (i.e., “clean”) 2.
    [Show full text]
  • Status Review on Implementation of TSO and DSO Unbundling Provisions
    Legal Affairs Committee Implementation of TSO and DSO Unbundling Provisions – Update and Clean Energy Package Outlook CEER Status Review Ref: C18-LAC-02-08 14 June 2019 Council of European Energy Regulators asbl Cours Saint-Michel 30a, Box F – 1040 Brussels, Belgium Arrondissement judiciaire de Bruxelles – RPM 0861.035.445 Ref: C18-LAC-02-08 CEER Status Review on TSO and DSO Unbundling INFORMATION PAGE Abstract This CEER document (C18-LAC-02-08) presents an updated Status Review on the Implementation of Transmission and Distribution System Operators’ Unbundling Provisions of the 3rd Energy Package, focusing on new developments since summer 2015. It also briefly summarises the main changes and novelties with regard to unbundling-related provisions that were made in the recasts of the Electricity Directive and Electricity Regulation within the framework of “Clean Energy for All Europeans” package (CEP). Under the 3rd Energy Package, energy networks are subject to unbundling requirements which oblige Member States to ensure the separation of vertically integrated energy companies, resulting in the separation of the various stages of energy supply (generation, transmission, distribution, and retail). This Status Review aims to assess the status of DSO and TSO unbundling, highlighting the new developments since 2015 and to provide an overview of the main changes in unbundling-related provisions introduced in CEP. Topics explored included related issues such as: cases and reasons for reopening certification decisions; branding; financial independence in terms of staff and resources; compliance programmes and officers; investments, joint-venture TSOs and joint undertakings. Target Audience European Commission, energy suppliers, traders, gas/electricity customers, gas/electricity industry, consumer representative groups, network operators, Member States, academics and other interested parties.
    [Show full text]
  • The Rise of Kleptocracy: Laundering Cash, Whitewashing Reputations
    The Rise of Kleptocracy: Laundering Cash, Whitewashing Reputations Alexander Cooley, John Heathershaw, J.C. Sharman Journal of Democracy, Volume 29, Number 1, January 2018, pp. 39-53 (Article) Published by Johns Hopkins University Press DOI: https://doi.org/10.1353/jod.2018.0003 For additional information about this article https://muse.jhu.edu/article/683634 Access provided at 13 Jun 2019 01:42 GMT from Griffith University The Rise of Kleptocracy LAUNDERING CASH, WHITEWASHING REPUTATIONS Alexander Cooley, John Heathershaw, and J.C. Sharman Alexander Cooley is director of the Harriman Institute at Columbia University and Claire Tow Professor of Political Science at Barnard College. John Heathershaw is associate professor of international re- lations at the University of Exeter. J.C. Sharman is Sir Patrick Sheehy Professor of International Relations at the University of Cambridge. Kleptocracy and grand corruption are now under scrutiny as never be- fore. With renewed global attention on these abuses, a relatively clear picture has emerged of the domestic political economies shaped by klep- tocratic rule. Analysts have shown how state institutions are set up to allow elites and their families to systematically loot, while protecting these elites politically. In particular, this research has placed under the microscope the resource-rich countries that are vulnerable to kleptocrat- ic state capture. Yet to understand the operations of today’s jet-setting kleptocrats, one must look beyond the borders of the polities they despoil. Copi- ous news items feature kleptocrats and their families purchasing luxu- rious penthouses and cars; attending international cultural galas and charitable initiatives; and enlisting Western agents, lawyers, spokes- people, and pillars of the establishment to whitewash their reputations.
    [Show full text]
  • Canadian Entities Involved in Global Laundromat Style Company Formations Background United Kingdom Legal Entities Have Long Been at the Heart of Known Laundromats
    Canadian entities involved in global laundromat style company formations Background United Kingdom legal entities have long been at the heart of known laundromats. For example, the Proxy Platform, the Russian Laundromat, the Azerbaijani Laundromat and the Danske Bank scandal have all had a significant UK legal entity presence. These are primarily Limited Liability and Scottish Limited Partnerships but, to a lesser degree, private limited companies are also employed. These entities bear certain hallmarks which help to typify their activity, and which are explainable in terms of that activity. They are believed to be utilised for a number of reasons. 1. The UK has a mature online creation and filing service so remote access is easy and encouraged 2. The costs are low in order to encourage entrepreneurial activity in the UK economy 3. The UK is seen as a safe and prestigious location which provides a sense of security and assurance to banks who create bank accounts on their behalf. Hallmarks of a UK Laundromat entity Because the UK has a transparent corporate registry, it is possible to obtain significant levels of details about both entities that have been identified within Laundromats and those which bear the same or similar characteristics. Taking each entity in turn, they are: Limited Liability Partnerships (LLP) • Large numbers registered at the same, virtual address • The use of corporate “designated members” resident in offshore or secrecy locations • Failing to declare a “person with significant control” or, when they do, it is either
    [Show full text]
  • Lock-Free Programming
    Lock-Free Programming Geoff Langdale L31_Lockfree 1 Desynchronization ● This is an interesting topic ● This will (may?) become even more relevant with near ubiquitous multi-processing ● Still: please don’t rewrite any Project 3s! L31_Lockfree 2 Synchronization ● We received notification via the web form that one group has passed the P3/P4 test suite. Congratulations! ● We will be releasing a version of the fork-wait bomb which doesn't make as many assumptions about task id's. – Please look for it today and let us know right away if it causes any trouble for you. ● Personal and group disk quotas have been grown in order to reduce the number of people running out over the weekend – if you try hard enough you'll still be able to do it. L31_Lockfree 3 Outline ● Problems with locking ● Definition of Lock-free programming ● Examples of Lock-free programming ● Linux OS uses of Lock-free data structures ● Miscellanea (higher-level constructs, ‘wait-freedom’) ● Conclusion L31_Lockfree 4 Problems with Locking ● This list is more or less contentious, not equally relevant to all locking situations: – Deadlock – Priority Inversion – Convoying – “Async-signal-safety” – Kill-tolerant availability – Pre-emption tolerance – Overall performance L31_Lockfree 5 Problems with Locking 2 ● Deadlock – Processes that cannot proceed because they are waiting for resources that are held by processes that are waiting for… ● Priority inversion – Low-priority processes hold a lock required by a higher- priority process – Priority inheritance a possible solution L31_Lockfree
    [Show full text]
  • Scalable Join Patterns
    Scalable Join Patterns Claudio Russo Microsoft Research Joint work with Aaron Turon (Northeastern). Outline Join patterns Examples Implementation Optimizations Evaluation Conclusion Outline Join patterns Examples Implementation Optimizations Evaluation Conclusion Background Parallel programs eventually need to synchronize. I Writing correct synchronization code is hard. I Writing efficient synchronization code is harder still. Neglect efficiency and promised performance gains are easily eroded … …by the cost of synchronization! Can we make this easier for programmers? Goal Our Goal: I provide scalable, parallel synchronization I using declarative, high-level abstractions Our Recipe: 1. Take our favourite concurrency model: Join Calculus [Fournet & Gonthier] 2. Give it a scalable, parallel implementation. Join Calculus in a nutshell A basic calculus for message passing concurrency. Like π-calculus, but with a twist…. Definitions can declare synchronous and asynchronous channels. Threads communicate and synchronize by sending messages: I a synchronous send waits until the channel returns some result; I an asynchronous send returns immediately, posting a message. Chords Definitions contains collections of chords (a.k.a. join patterns). A chord pairs a pattern over channels with a continuation. The continuation may run when these channels are filled. Each send may enable: some pattern causing a request to complete or a new thread to run; no pattern causing the request to block or the message to queue. All messages in a pattern are consumed in one atomic step. Example§ (C#) ¤ Asynchronous.Channel Knife, Fork; // () -> void ¦Synchronous.Channel Hungry, SpoonFeed; // () -> void ¥ Calling Hungry() waits until the channel returns control (a request). Calling Knife(); returns immediately, but posts a resource. §Chords specify alternative reactions to messages.
    [Show full text]