Course Syllabus

Total Page:16

File Type:pdf, Size:1020Kb

Course Syllabus RH003 Introduction for Red Hat Linux Series Introduction to Red Hat Linux II Instructors: Dee-Ann LeBlanc and Matt Bacchi www.digitalthink.com © DigitalThink, Inc. All rights reserved. Course Syllabus Module 1: Lesson 1 - Course Introduction Lesson 2 - Introduction Sidebar: Open Source Software (OSS) Lesson 3 - Using the Linux labs Sidebar: Accessing the labs using SSH (Simulation transcript) Lesson 4 - Introduction to Red Hat Linux and the GPL Sidebar: GPL and the Free Software Foundation Sidebar: The Linux community of developers Sidebar: Benefits of a packaged distribution Lesson 5 - Prerequisites Lesson 6 - What you need Lesson 7 - Course resources Sidebar: Copying and pasting on UNIX platforms Lesson 8 - Your learning community Lesson 9 - Meet your instructors Sidebar: Welcome! (Audio transcript) Lesson 10 - The course project Module 2: Lesson 1 - Review of fundamental Linux commands Lesson 2 - Review key Linux commands Sidebar: What's included in the Red Hat package? Exercise: Review Linux commands Lesson 3 - Review the Linux filesystem hierarchy Sidebar: The usr subdirectories(Mouseover transcript) Lesson 4 - Role of the superuser Lesson 5 - Linux file security overview Quiz: Linux file security Lesson 6 - Changing permissions Exercise: Lab: changing and using permissions Lesson 7 - Console privileges Lesson 8 - Obtaining information about the system Exercise: Obtaining information about the system Lesson 9 - Module wrap-up Quiz: Module review Module 3: Lesson 1 - GNOME and the X Window System Lesson 2 - The X Window System Exercise: Features provided by the X Window System Lesson 3 - The X Window client/server architecture Sidebar: The X Window client/server architecture (Mouseover transcript) file:///d|/pdf_mine/ux201_r/syllabus.html (1 of 7) [11/8/2000 11:34:50 AM] Course Syllabus Lesson 4 - Window managers Sidebar: The window manager (FlipBook transcript) Lesson 5 - GNOME Lesson 6 - Introducing KDE Sidebar: The KDE desktop environment (FlipBook transcript) Quiz: KDE Lesson 7 - Starting a local X Window System session Sidebar: Starting x windows (FlipBook transcript) Lesson 8 - Customizing the X Window System desktop Sidebar: Adding and removing icons (Simulation transcript) Lesson 9 - Configuration editors Sidebar: Configuration tools (Simulation transcript) Lesson 10 - Copying and pasting between windows Sidebar: Copying and pasting between windows (FlipBook transcript) Lesson 11 - Configuring the mouse Lesson 12 - Module wrap-up Quiz: Module 3 review Module 4: Lesson 1 - Customizing your work environment Lesson 2 - System and user configuration files Sidebar: System configuration files (MouseOver transcript) Exercise: User configuration directories Lesson 3 - Login session startup Sidebar: Red Hat® login process (FlipBook transcript) Lesson 4 - Command aliases Exercise: Lab: creating an alias Lesson 5 - Environment control Exercise: Lab: environment control in Linux Lesson 6 - Customizing command history settings Sidebar: Customizing your history information (FlipBook transcript) Lesson 7 - Using command history Sidebar: Using fc to edit command history (FlipBook transcript) Lesson 8 - The PATH variable and security issues Exercise: Lab: working with environment variables Lesson 9 - Module wrap-up Quiz: Module review Module 5: Lesson 1 - Using the vi editor Lesson 2 - Features of vi Lesson 3 - Starting the vi text editor Sidebar: Starting the vi editor (FlipBook transcript) file:///d|/pdf_mine/ux201_r/syllabus.html (2 of 7) [11/8/2000 11:34:50 AM] Course Syllabus Lesson 4 - vi modes Sidebar: Using vi mode (FlipBook transcript) Lesson 5 - Positioning the cursor Sidebar: Positioning the cursor (FlipBook transcript) Lesson 6 - Working in input mode Exercise: Input mode Lesson 7 - Saving and exiting vi Lesson 8 - Introducing changes and undoing them Sidebar: Minimizing (FlipBook transcript) Lesson 9 - Searching for text Exercise: Lab: search and replace Lesson 10 - Module wrap-up Quiz: Using vi Module 6: Lesson 1 - Shell command line processing Lesson 2 - Re-executing and accessing previously entered commands Exercise: Re-execute and access a previous command Lesson 3 - Save time using tab completion on commands Sidebar: Configuring tab completion (FlipBook transcript) Lesson 4 - The command interpretation sequence Sidebar: The command interpretation sequence (FlipBook transcript) Lesson 5 - Standard input and output Exercise: Lab: standard input and output Lesson 6 - Advanced input/output/redirection Sidebar: Testing values, status, and attributes (Simulation transcript) Lesson 7 - Testing values, status, and attributes Exercise: Lab: testing values, status, and attributes Lesson 8 - Simultaneous redirection of standard error and standard output Sidebar: Redirecting standard output (Simulation transcript) Exercise: Lab: simultaneous redirection of standard error and standard output Lesson 9 - Useful operators to use with the test command Exercise: Useful operators with the test command Lesson 10 - Conditional execution using the if and the case statements Sidebar: If and case (Simulation transcript) Lesson 11 - Performing calculations on a list using the for loop Exercise: Lab: using the for loop Lesson 12 - Using functions to make scripts more modular Lesson 13 - Appending files Sidebar: Appending files (FlipBook transcript) Lesson 14 - Running a process in the background Sidebar: Running a process in the background (FlipBook transcript) file:///d|/pdf_mine/ux201_r/syllabus.html (3 of 7) [11/8/2000 11:34:50 AM] Course Syllabus Lesson 15 - Grouping commands and using inline groups Lesson 16 - Command substitution Lesson 17 - Module wrap-up Module 7: Lesson 1 - Bash shell scripting Lesson 2 - Introduction to shell scripting Sidebar: Application prototyping Lesson 3 - Different shells Sidebar: History of UNIX shells (Interactivity transcript) Lesson 4 - Creating shell scripts Lesson 5 - Specifying which shell will execute your script Exercise: Lab: creating a shell script Lesson 6 - Using variables in scripts Exercise: Lab: using variables and environment variables in scripts Quiz: Variables and environment variables in scripts Lesson 7 - Mastering shell options and mathematics in bash Sidebar: Setting bash options (Simulation transcript) Exercise: Lab: using mathematical operations in the bash shell Lesson 8 - Enabling debug options Sidebar: Enable debug option (Simulation transcript) Lesson 9 - Arrays Sidebar: The bash2 shell Sidebar: Using data types in bash (Simulation transcript) Lesson 10 - Using and shifting positional parameters Sidebar: Working with scripts (Simulation transcript) Lesson 11 - Using lists Sidebar: Putting lists to good use (FlipBook transcript) Exercise: Lab: shell scripting Lesson 12 - Module wrap-up Quiz: Module wrap-up Module 8: Lesson 1 - Advanced file system features Lesson 2 - The /proc filesystem Sidebar: The /proc filesystem (Interactivity transcript) Exercise: Lab: navigate the /proc directory Lesson 3 - Using file associations and listing MIME types Lesson 4 - Edit and add a file association Sidebar: Creating file associations (FlipBook transcript) Exercise: MIME types Lesson 5 - Finding and processing files on the system Sidebar: Searching with the GNOME Search Tool (FlipBook transcript) file:///d|/pdf_mine/ux201_r/syllabus.html (4 of 7) [11/8/2000 11:34:50 AM] Course Syllabus Sidebar: Utilizing find's ability to execute commands on the files that match the search (Simulation transcript) Lesson 6 - Comparing files Exercise: Lab: comparing text and binary files Lesson 7 - Understanding hard and soft file links Quiz: Hard and soft links Lesson 8 - Determining available filesystem storage Sidebar: Using df and du (FlipBook transcript) Lesson 9 - Module wrap-up Quiz: Wrap-up quiz Module 9: Lesson 1 - Common string processing utilities Lesson 2 - Conducting string searches Sidebar: Using grep (FlipBook transcript) Lesson 3 - Conducting string searches in a file and within multiple files Exercise: grep search commands Lesson 4 - Counting characters, words, and lines in a file Sidebar: Using the wc command (Simulation transcript) Lesson 5 - Sorting lines in a file Sidebar: Using sort (FlipBook transcript) Lesson 6 - Merge files using the sort command Sidebar: Using sort to merge files (Simulation transcript) Lesson 7 - Translate characters in a text file Sidebar: Using the tr command (FlipBook transcript) Exercise: Lab: using the grep, wc, sort, and tr commands Lesson 8 - Module wrap-up Quiz: Module 9 review Module 10: Lesson 1 - Process control Lesson 2 - Processes Sidebar: Kernel process management (FlipBook transcript) Lesson 3 - Process status information via the command line Sidebar: Process status information on the command line using ps (Mouseover transcript) Exercise: Processes Lesson 4 - Process status information via GNOME Lesson 5 - Top CPU-intensive processes via the command line Sidebar: Top CPU intensive processes via the command line (Mouseover transcript) Lesson 6 - Processes in the foreground and background Exercise: Lab: process manipulation Lesson 7 - Pausing commands for a set period of time file:///d|/pdf_mine/ux201_r/syllabus.html (5 of 7) [11/8/2000 11:34:50 AM] Course Syllabus Sidebar: Process manipulation (Simulation transcript) Lesson 8 - Killing a process Exercise: Lab: manipulating, troubleshooting, and killing processes. Lesson 9 - Continuing command execution after logoff Exercise: Lab: testing the nohup command Lesson 10 - Module wrap-up Quiz: Module review Module 11: Lesson 1 - Network utilities for the user Lesson 2 - Network fundamentals Sidebar:
Recommended publications
  • Desktop Migration and Administration Guide
    Red Hat Enterprise Linux 7 Desktop Migration and Administration Guide GNOME 3 desktop migration planning, deployment, configuration, and administration in RHEL 7 Last Updated: 2021-05-05 Red Hat Enterprise Linux 7 Desktop Migration and Administration Guide GNOME 3 desktop migration planning, deployment, configuration, and administration in RHEL 7 Marie Doleželová Red Hat Customer Content Services [email protected] Petr Kovář Red Hat Customer Content Services [email protected] Jana Heves Red Hat Customer Content Services Legal Notice Copyright © 2018 Red Hat, Inc. This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
    [Show full text]
  • Part II, Window Managers and Desktop Environments
    Part II Window Managers and Desktop Environments The window manager is responsible for managing application windows and application- independent behavior, such as pop-up menus appearing in the background. The window manager manages the placement, borders, and decorations of all windows, and is responsible for the look and feel of your particular X session. Desktop environments typically include an integrated window manager, some sort of control panel, applications, and a consistent look and feel across applications. The chapters in Part II, Window Managers and Desktop Environments, are: Overview This chapter provides a conceptual introduction to window managers and desktop environments and briefly surveys some of the many window managers and desktop environments available for Linux. FVWM FVWM is a traditional window manager for Linux systems. It is now into its second major version, FVWM2. Window Maker Window Maker is an elegant X11 window manager designed to give integration support to GNUstep-based applications. It emulates the look and feel of OpenStep, the NeXTSTEP GUI. Enlightenment Enlightenment, often shortened to just E, may be the most elaborate and bizarre window manager available. Enlightenment’s motto, “time to rethink everything,” provides a good indication of the uniqueness and flashiness behind Enlightenment. Using GNOME GNOME, which stands for GNU Network Object Model Environment, is a freely available desktop environment that can be used with any of several window managers, including Enlightenment and Sawfish. Using KDE KDE, the K Desktop Environment, is another freely available desktop environment. KDE includes an assortment of games and utilities, as well as an integrated suite of office productivity applications..
    [Show full text]
  • Easy Slackware
    1 Создание легкой системы на базе Slackware I - Введение Slackware пользуется заслуженной популярностью как классический linux дистрибутив, и поговорка "кто знает Red Hat тот знает только Red Hat, кто знает Slackware тот знает linux" несмотря на явный снобизм поклонников "бога Патре­ га" все же имеет под собой основания. Одним из преимуществ Slackware является возможность простого создания на ее основе практически любой системы, в том числе быстрой и легкой десктопной, о чем далее и пойдет речь. Есть дис­ трибутивы, клоны Slackware, созданные именно с этой целью, типа Аbsolute, но все же лучше создавать систему под себя, с максимальным учетом именно своих потребностей, и Slackware пожалуй как никакой другой дистрибутив подходит именно для этой цели. Легкость и быстрота системы определяется выбором WM (DM) , набором программ и оптимизацией программ и системы в целом. Первое исключает KDE, Gnome, даже новые версии XFCЕ, остается разве что LXDE, но набор программ в нем совершенно не устраивает. Оптимизация наиболее часто используемых про­ грамм и нескольких базовых системных пакетов осуществляется их сборкой из сорцов компилятором, оптимизированным именно под Ваш комп, причем каж­ дая программа конфигурируется исходя из Ваших потребностей к ее возможно­ стям. Оптимизация системы в целом осуществляется ее настройкой согласно спе­ цифическим требованиям к десктопу. Такой подход был выбран по банальной причине, возиться с gentoo нет ни­ какого желания, комп все таки создан для того чтобы им пользоваться, а не для компиляции программ, в тоже время у каждого есть минимальный набор из не­ большого количества наиболее часто используемых программ, на которые стоит потратить некоторое, не такое уж большое, время, чтобы довести их до ума. Кро­ ме того, такой подход позволяет иметь самые свежие версии наиболее часто ис­ пользуемых программ.
    [Show full text]
  • Introduction to the Enlightenment Foundation Libraries
    Introduction to the Enlightenment foundation libraries. An overview of EFL Kostis Kapelonis Introduction to the Enlightenment foundation libraries.: An overview of EFL Kostis Kapelonis Abstract The target audience of this document are UNIX programmers who are interested in the Enlightenment Foundation Libraries (EFL). You must already know C programming. You will not however learn how to program using the EFL. Instead, you will learn why you should program with the EFL. If you ever wanted to evaluate the EFL but did not see any advantages over previous graphic libraries then this document is for you! Table of Contents 1. Introduction ............................................................................................................................1 A little History ...................................................................................................................1 Related documentation ......................................................................................................... 2 Obtaining the EFL libraries ................................................................................................... 2 2. The EFL structure .................................................................................................................... 4 Organization of the Libraries ................................................................................................. 4 Brief description of each EFL library ...................................................................................... 5 3.
    [Show full text]
  • Troubleshooting Passwords
    Troubleshooting Passwords The following procedures may be used to troubleshoot password problems: • Performing Password Recovery with an Existing Administrator, page 1 • Performing Password Recovery with No Existing Administrator, page 1 • Performing Password Recovery for the Linux Grapevine User Account, page 2 Performing Password Recovery with an Existing Administrator To perform password recovery for a user (administrator, installer or observer) where there exists at least one controller administrator (ROLE_ADMIN) user account, take the following steps: 1 Contact the existing administrator to set up a temporary password for the user that requires password recovery. Note The administrator can set up a temporary password by deleting the user's account and then recreating it with the lost password. The user can then log back into the controller to regain access and change the password once again to whatever he or she desires. 2 The user then needs to log into the controller with the temporary password and change the password. Note Passwords are changed in the controller GUI using the Change Password window. For information about changing passwords, see Chapter 4, Managing Users and Roles in the Cisco Application Policy Infrastructure Controller Enterprise Module Configuration Guide. Performing Password Recovery with No Existing Administrator The following procedure describes how to perform password recovery where there exists only one controller administrator (ROLE_ADMIN) user account and this account cannot be successfully logged into. Cisco Application Policy Infrastructure Controller Enterprise Module Troubleshooting Guide, Release 1.3.x 1 Troubleshooting Passwords Performing Password Recovery for the Linux Grapevine User Account Note We recommend that you create at least two administrator accounts for your deployment.
    [Show full text]
  • NCD Thin Client Xware User's Guide
    NCD NCD Thin Client Xware User’s Guide Part Number 5401612 June 1998 Network Computing Devices, Inc. 350 North Bernardo Avenue Mountain View, CA 94043-5207 Technical support: 503/641-2200 Technical support FAX: 503/641-2959 Email: [email protected] World Wide Web: http://www.ncd.com Copyright Copyright © 1998 by Network Computing Devices, Inc. The information contained in this document is subject to change without notice. NCD SHALL NOT BE LIABLE FOR ERRORS CONTAINED HEREIN OR FOR ANY DAMAGES WHATSOEVER, INCLUDING, WITHOUT LIMITATION, ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS MATERIAL. This document contains information which is protected by copyright. All rights are reserved. Made in the U.S.A. No part of this document may be photocopied, reproduced, or translated to another language without the prior written consent of NCD. Title to and ownership of the Software, and all copies thereof, shall at all times reside with NCD and its licensors, and is protected by United States copyright laws and international treaty provisions. Trademarks Network Computing Devices is a registered trademark of Network Computing Devices, Inc. NCDnet, NCDware, and Thin Client Xware FTP are trademarks of Network Computing Devices, Inc. Apple and LaserWriter are registered trademarks of Apple Computer, Inc. Citrix, WinFrame, and ICA are registered trademarks of Citrix Systems, Inc. DECnet, DECwindows, VMS, VT, and ULTRIX are trademarks of Digital Equipment Corporation. Ethernet is a trademark of Xerox Corporation. Hewlett-Packard and LaserJet are registered trademarks of Hewlett-Packard Corporation. HP-UX is a trademark of Hewlett-Packard Corporation.
    [Show full text]
  • An Introduction to the X Window System Introduction to X's Anatomy
    An Introduction to the X Window System Robert Lupton This is a limited and partisan introduction to ‘The X Window System’, which is widely but improperly known as X-windows, specifically to version 11 (‘X11’). The intention of the X-project has been to provide ‘tools not rules’, which allows their basic system to appear in a very large number of confusing guises. This document assumes that you are using the configuration that I set up at Peyton Hall † There are helpful manual entries under X and Xserver, as well as for individual utilities such as xterm. You may need to add /usr/princeton/X11/man to your MANPATH to read the X manpages. This is the first draft of this document, so I’d be very grateful for any comments or criticisms. Introduction to X’s Anatomy X consists of three parts: The server The part that knows about the hardware and how to draw lines and write characters. The Clients Such things as terminal emulators, dvi previewers, and clocks and The Window Manager A programme which handles negotiations between the different clients as they fight for screen space, colours, and sunlight. Another fundamental X-concept is that of resources, which is how X describes any- thing that a client might want to specify; common examples would be fonts, colours (both foreground and background), and position on the screen. Keys X can, and usually does, use a number of special keys. You are familiar with the way that <shift>a and <ctrl>a are different from a; in X this sensitivity extends to things like mouse buttons that you might not normally think of as case-sensitive.
    [Show full text]
  • Version 7.8-Systemd
    Linux From Scratch Version 7.8-systemd Created by Gerard Beekmans Edited by Douglas R. Reno Linux From Scratch: Version 7.8-systemd by Created by Gerard Beekmans and Edited by Douglas R. Reno Copyright © 1999-2015 Gerard Beekmans Copyright © 1999-2015, Gerard Beekmans All rights reserved. This book is licensed under a Creative Commons License. Computer instructions may be extracted from the book under the MIT License. Linux® is a registered trademark of Linus Torvalds. Linux From Scratch - Version 7.8-systemd Table of Contents Preface .......................................................................................................................................................................... vii i. Foreword ............................................................................................................................................................. vii ii. Audience ............................................................................................................................................................ vii iii. LFS Target Architectures ................................................................................................................................ viii iv. LFS and Standards ............................................................................................................................................ ix v. Rationale for Packages in the Book .................................................................................................................... x vi. Prerequisites
    [Show full text]
  • The Elinks Manual the Elinks Manual Table of Contents Preface
    The ELinks Manual The ELinks Manual Table of Contents Preface.......................................................................................................................................................ix 1. Getting ELinks up and running...........................................................................................................1 1.1. Building and Installing ELinks...................................................................................................1 1.2. Requirements..............................................................................................................................1 1.3. Recommended Libraries and Programs......................................................................................1 1.4. Further reading............................................................................................................................2 1.5. Tips to obtain a very small static elinks binary...........................................................................2 1.6. ECMAScript support?!...............................................................................................................4 1.6.1. Ok, so how to get the ECMAScript support working?...................................................4 1.6.2. The ECMAScript support is buggy! Shall I blame Mozilla people?..............................6 1.6.3. Now, I would still like NJS or a new JS engine from scratch. .....................................6 1.7. Feature configuration file (features.conf).............................................................................7
    [Show full text]
  • Qualys Policy Compliance Getting Started Guide
    Policy Compliance Getting Started Guide July 28, 2021 Verity Confidential Copyright 2011-2021 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks are the property of their respective owners. Qualys, Inc. 919 E Hillsdale Blvd Foster City, CA 94404 1 (650) 801 6100 Table of Contents Get Started ........................................................................................................ 5 Set Up Assets............................................................................................................................ 6 Start Collecting Compliance Data ............................................................... 8 Configure Authentication....................................................................................................... 8 Launch Compliance Scans ................................................................................................... 10 We recommend you schedule scans to run automatically .............................................. 12 How to configure scan settings............................................................................................ 12 Install Cloud Agents.............................................................................................................. 17 Evaluate Middleware Assets by Using Cloud Agent .......................................................... 17 Define Policies ................................................................................................. 21
    [Show full text]
  • Lecture 1: Introduction to UNIX
    The Operating System Course Overview Getting Started Lecture 1: Introduction to UNIX CS2042 - UNIX Tools September 29, 2008 Lecture 1: UNIX Intro The Operating System Description and History Course Overview UNIX Flavors Getting Started Advantages and Disadvantages Lecture Outline 1 The Operating System Description and History UNIX Flavors Advantages and Disadvantages 2 Course Overview Class Specifics 3 Getting Started Login Information Lecture 1: UNIX Intro The Operating System Description and History Course Overview UNIX Flavors Getting Started Advantages and Disadvantages What is UNIX? One of the first widely-used operating systems Basis for many modern OSes Helped set the standard for multi-tasking, multi-user systems Strictly a teaching tool (in its original form) Lecture 1: UNIX Intro The Operating System Description and History Course Overview UNIX Flavors Getting Started Advantages and Disadvantages A Brief History of UNIX Origins The first version of UNIX was created in 1969 by a group of guys working for AT&T's Bell Labs. It was one of the first big projects written in the emerging C language. It gained popularity throughout the '70s and '80s, although non-AT&T versions eventually took the lion's share of the market. Predates Microsoft's DOS by 12 years! Lecture 1: UNIX Intro The Operating System Description and History Course Overview UNIX Flavors Getting Started Advantages and Disadvantages Lecture Outline 1 The Operating System Description and History UNIX Flavors Advantages and Disadvantages 2 Course Overview Class Specifics 3
    [Show full text]
  • The Strange Birth and Long Life of Unix - IEEE Spectrum Page 1 of 6
    The Strange Birth and Long Life of Unix - IEEE Spectrum Page 1 of 6 COMPUTING / SOFTWARE FEATURE The Strange Birth and Long Life of Unix The classic operating system turns 40, and its progeny abound By WARREN TOOMEY / DECEMBER 2011 They say that when one door closes on you, another opens. People generally offer this bit of wisdom just to lend some solace after a misfortune. But sometimes it's actually true. It certainly was for Ken Thompson and the late Dennis Ritchie, two of the greats of 20th-century information technology, when they created the Unix operating system, now considered one of the most inspiring and influential pieces of software ever written. A door had slammed shut for Thompson and Ritchie in March of 1969, when their employer, the American Telephone & Telegraph Co., withdrew from a collaborative project with the Photo: Alcatel-Lucent Massachusetts Institute of KEY FIGURES: Ken Thompson [seated] types as Dennis Ritchie looks on in 1972, shortly Technology and General Electric after they and their Bell Labs colleagues invented Unix. to create an interactive time- sharing system called Multics, which stood for "Multiplexed Information and Computing Service." Time-sharing, a technique that lets multiple people use a single computer simultaneously, had been invented only a decade earlier. Multics was to combine time-sharing with other technological advances of the era, allowing users to phone a computer from remote terminals and then read e -mail, edit documents, run calculations, and so forth. It was to be a great leap forward from the way computers were mostly being used, with people tediously preparing and submitting batch jobs on punch cards to be run one by one.
    [Show full text]