COMP30052 Distributed Operating Systems Chapter 1: Introduction

Total Page:16

File Type:pdf, Size:1020Kb

COMP30052 Distributed Operating Systems Chapter 1: Introduction COMP30052 Distributed Operating Systems Chapter 1: Introduction Chris Kirkham February 1, 2007 Books There is currently no single text book that covers all the topics in COMP30052. Andrew S. Tanenbaum and M van Steen, Distributed Systems Principles and Paradigms, • Prentice Hall 2002. Covers about 70% of the course, omitting some operating system material. Andrew S. Tanenbaum , Modern Operating Systems, 2nd edition, Prentice Hall, 2001. • Covers most of the remaining topics, about 25% of the course. Andrew S. Tanenbaum, Distributed Operating Systems, Prentice Hall 1995. This was • previously the main course textbook but is now rather dated, i.e. lacking material on newer systems. All the relevant material is now in one or other of the books listed above. Tanenbaum’s books have lots of problems at the end of each chapter which you should try to solve. Some of Tanenbaum’s material is available at http://www.prenhall.com/tanenbaum/ Jean Bacon and Tim Harris, Operating Systems: Concurrent and Distributed Software • Design, Addison Wesley 2003. Brings together operating system and database concerns in a single text. Gentle introduction to client-server and distributed systems. This book is useful but it lacks detail on some topics. Bovet and Cesati, Understanding the Linux kernel, O’Reilly 2001. Quite a readable • description with a lot of technical detail. Useful reference. Silberschatz, Galvin and Cagne, Operating System Concepts, 7th Edn Wiley 2005. Cov- • ers major sections of the course in reasonable depth but it is not the main text because it is weaker on distributed systems. It has a “with Java” version (2007). The previous edition (6th) is almost as good; it has an “XP update edition” which merely has one extra chapter on Windows XP. It also has a “with Java” version (2004). George Coulouris et al, Distributed Systems: Concepts and Design, 4th Edn, Addison • Wesley 2005. Comprehensive view of distributed systems concentrating on communica- tion and middleware with relatively little on the Operating System, is an alternative to Tanenbaum, Distributed Systems. 1 William Stallings, Operating Systems: Internals and Design Principles, 4th Edition, • Prentice Hall 2001. Up to date alternative treatment of some topics. Course content We assume COMP20051 (which was CS2051 when you did it). If you are unsure of this read up one of the 2nd year textbooks or the course notes. Our emphasis on networked systems means that the course relates to many others but we try to avoid direct overlap and will miss out sections of Tanenbaum that are obvious duplication. These include: COMP20081 for issues directly concerned with networking, • COMP30082 for network security, • COMP30112 for concurrency, • COMP20312 and COMP30311 for database aspects • The main topics we will cover are: Structure of operating systems; monolithic kernels and microkernels; • Networked and distributed systems; client server model; • Process placement and interaction; Inter process communication and remote procedure • call; Processes and threads, threaded servers and kernels; • Resource management issues: deadlock, distributed deadlock; • Resource management issues: distributed coordination and synchronisation, reaching • agreement; reliability in distributed systems; Filesystems: scaleability, reliability, performance, distribution; NFS and CODA models • of distribution; The fileserver: transaction based models; NTFS and UNIX filesystems; • Protection regimes, access lists and capabilities; security and authentication. • Windows 2000/XP • Middleware in distributed systems, distributed objects, CORBA, DCOM. • 2 What is an operating system? An operating system provides an environment in which users can execute programs. This encompasses a wide variety of functionality. Single user: the simple CP/M, MS-DOS are obsolete and replaced by Microsoft Win- • dows 95 etc. UNIX, conceptually simple multi-user (but considerably extended over 30 years: e.g. • memory management, distributed inter-process communication). Manufacturers systems, ICL VME, DEC VMS, IBM VM/CMS. Comprehensive facili- • ties, emphasis on security and reliability. Supporting large networks, databases and mul- tiple processors. Originally closed systems but increasingly required to interface with other Open systems. Newer commercial systems: Sun Solaris 2, Windows NT/2000/XP. Emphasis on Open • systems, user interface and on networking. Free versions of UNIX: Linux. • Other developments: Object-orientation, networking and client-server, middleware: OSF/1 • and DCE. Common Object Request Broker Architecture (CORBA), DCOM, .NET Note the size of some large systems, 5000 man years to develop IBM OS360. (Fred Brooks: The Mythical Man Month). Transaction processing with 15,000 terminals. The Linux 2.0 kernel (1996) had 470,000 lines of C source code. About 5% of this is in the true kernel of processor and memory management. 377,000 lines are in device drivers, 50,000 in the 13 file systems, 13,500 in the VFS layer, and 25,000 in network software. Linux 1.2 (1995) was 270,000 lines. Linux 2.2 (1999) about 2 million lines and Linux 2.4 (2002) 4 million. The true kernel remains very small. Most of the expansion is due to supporting new processor architectures, more filesystems and many more new devices. X windows adds another 1.5 million. Linux is small compared with Windows 2000 which was said to have 30m lines of source (including the Win32 GUI). Conventional operating system problems Asynchronous and unpredictable events. Clock interrupts, peripheral interrupts, au- • tonomous peripherals, communications and increasingly multiprocessor and networked configurations. Unknown configurations of the target system. Considerable progress has been made with • dynamic loading of device drivers, automatic detection of hardware devices and ‘plug- and-play’ techniques. Continuous modification. Fault fixing, improvement in performance and facilities with- • out disturbing existing user programs. 6 or 12 month upgrade cycle. Still a major prob- lem. 3 Networking and distribution Tanenbaum defines a Network Operating System as a system in which each machine has a considerable degree of autonomy but cooperates with other such systems on the network. In recent years the use of networked operating systems has increased. These have flexible network filestore arrangements and support various middleware systems: Java RMI, CORBA, DCOM. With these systems the middleware emphasis has moved towards Distributed Objects more than simple RPC. Tanenbaum defines a Distributed Operating System as a system that creates the illusion that a network of computers operates as a single integrated system rather than a collection of distinct machines. This is sometimes called a Single system image or a Virtual uniprocessor. Much less progress has been made on this type of system and many would doubt whether it is even a desirable objective. Nevertheless it is useful to observe the extent to which present day networked systems achieve the transparency illusion of a true distributed system. How to pass this course Attend the lectures • Read the textbooks • Attempt some problems, both in the books and in past papers. • 4.
Recommended publications
  • ICL Technical Journal Volume 5 Issue 3
    TECHniCAl j o u m n i Volume 5 Issue 3 May 1987 Published by INTERNATIONAL COMPUTERS LIMITED at OXFORD UNIVERSITY PRESS iCL The ICL Technical Journal is published twice a year by TECHniCRl International Computers Limited at Oxford University jouRnfli Press. Editor J. Howlett ICL House, Putney, London SW15 ISW, UK Editorial Board J. Howlett (Editor) F.F. Land H.M. Cropper (F International) (London School of Economics & D.W. Davies, FRS Political Science) G.E. Felton K.H. Macdonald M.D. Godfrey M R. Miller C.H.L. Goodman (British Telecom Research (Standard Telephone Laboratories) Laboratories and Warwick J.M. Pinkerton University) E.C.P. Portman All correspondence and papers to be considered for publication should be addressed to the Editor. The views expressed in the papers are those of the authors and do not necessarily represent ICL policy. 1987 subscription rates: annual subscription £32 UK, £40 rest of world, US $72 N. America; single issues £17 UK, £22 rest of world, US $38 N. America. Orders with remittances should be sent to the Journals Subscriptions Department, Oxford University Press, Walton Street, Oxford 0X2 6DP, UK. This publication is copyright under the Berne Convention and the Interna­ tional Copyright Convention. All rights reserved. Apart from any copying under the UK Copyright Act 1956, part 1, section 7, whereby a single copy of an article may be supplied, under certain conditions, for the purposes of research or private study, by a library of a class prescribed by the UK Board of Trade Regulations (Statutory Instruments 1957, No. 868), no part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means without the prior permission of the copyright owners.
    [Show full text]
  • Fcommi SS IONEN for DE EUROPÆISKE FÆLLESSKABER
    fcoMMI SS IONEN FOR DE EUROPÆISKE FÆLLESSKABER KOM(93) 454 end«lig udg. Bruxelles, den 22. oktober 1993 (forelagt af Kommissionen) EVALUERINGSRAPPORT VEDRØRENDE DET STATISTISKE PROGRAM 1989-1992 INDHOLD INDHOLD FORORD 8 INDLEDNING ; 9 DEL 1 - SAMMENFATNING .. 9 I. Målsætninger for det statistiske program 1989-1992 JO II. Overvågning af det statistiske program 10 III. Gennemførelsen af det statistiske program 1989-1992 11 III.A. Redskaber til gennemførelsen 11 III.B. Aktioner for gennemførelsen 12 III.B.1. Den almindelige koordinering i institutionerne 12 III.B.2. Dialogen med de nationale statistiksystemer 12 III.B.3. Det internationale statistiske samarbejde 12 IV. Midler til opfyldelse af de fastlagte målsætninger 13 V. Budget for det statistiske program 17 VI. Evaluering af de overordnede resultater 19 DEL 2: SAMMENFATNING AF RESULTATER SAMT PROBLEMER VED IVÆRKSÆTTELSEN AF DE STATISTISKE PROGRAMMER, DER ER UDARBEJDET I FORBINDELSE MED FÆLLESSKABSPOLITIKKER 22 I. STATISTISKE OPGAVER INDEN FOR RAMMERNE AF DEN EUROPÆISKE FÆLLES AKT ;............22 I.A. Statistiske opgaver med henblik på virkeliggørelsen af det indre marked 22 I.A.1. Standardisering og beskyttelse af fortrolige oplysninger 22 I.A.2 Statistik over EF-samhandelen efter 1992 22 I.A.3. Virksomhedsstatistik 24 - Page 2 - EVALUERINGSRAPPORT VEDRØRENDE DET STATISTISKE PROGRAM 1989-1992 INDHOLD I.B. Statistik med henblik på etablering af et udvidet økonomisk og socialt samarbejde 24 I.B.1. Statistik til styrkelse af den sociale og økonomiske samhørighed - standardisering 24 I.B.2. Statistik til styrkelse af det sociale samarbejde 25 I.B.3. Statistik til støtte for Den Økonomiske og Monetære Union 28 I.B.4.
    [Show full text]
  • Chapter1 History of Computer Security
    Chapter1 History of Computer Security Those who do not learn from the past will repeat it. George Santanya Security is a journey, not a destination. Computer security has been travelling for 40 years, and counting. On this journey, the challenges faced have kept changing, as have the answers to familiar challenges. This first chapter will trace the history of computer security, putting security mechanisms into the perspective of the IT landscape they were developed for. OBJECTIVES • Give an outline of the history of computer security. • Explain the context in which familiar security mechanisms were originally developed. • Show how changes in the application of IT pose new challenges in computer security. • DiscussCOPYRIGHTED the impact of disruptive technologies MATERIAL on computer security. 2 1 HISTORY OF COMPUTER SECURITY 1.1 THE DAWN OF COMPUTER SECURITY New security challenges arise when new – or old – technologies are put to new use. The code breakers at Bletchley Park pioneered the use of electronic programmable computers during World War II [117, 233]. The first electronic computers were built in the 1940s (Colossus, EDVAC, ENIAC) and found applications in academia (Ferranti Mark I, University of Manchester), commercial organizations (LEO, J. Lyons & Co.), and government agencies (Univac I, US Census Bureau) in the early 1950s. Computer security can trace its origins back to the 1960s. Multi-user systems emerged, needing mechanisms for protecting the system from its users, and the users from each other. Protection rings (Section 5.6.4) are a concept dating from this period [108]. Two reports in the early 1970s signal the start of computer security as a field of research in its own right.
    [Show full text]
  • A Statistical Examination of the Evolution of the UNIX System
    1 IMPERIAL COLLEGE OF SCIENCE, TECHNOLOGY AND MEDICINE University of London A Statistical Examination of The Evolution of the UNIX System by Shamim Sharifuddin Pirzada September 1988 A thesis submitted for the Degree of Doctor of Philosophy of the University of London and for the Diploma of Membership of the Imperial College. 2 ABSTRACT The UNIX system is one of the most successful operating systems in use today. However, due to its age, and in view of the tendencies of other operating systems to degenerate over time, concern has been expressed about its potential for further evolution. Modelling techniques have been proposed to view and predict the evolution of software but they have not yet been sufficiently evaluated. The project uses one such technique, developed by Lehman and others, to examine the evolution of UNIX and attempt a prognosis for its future. Hence it critically evaluates Lehman's concepts of program evolution. A brief survey of quantitative software modelling techniques is given with particular emphasis on models which predict the behaviour of software systems already in use. The development of Lehman's "Theory of Program Evolution" is reviewed and the implications of the hypotheses proposed in the theory are discussed. Also, the history of UNIX is presented as a sequence of releases from the main UNIX centres in the Bell System and the University of California, Berkeley. An attempt is made to construct statistical models of the UNIX evolution process by plotting the progress of the three main branches of the UNIX evolution tree (Research UNIX, the System V stream and BSD/UNDC) in terms of changes in various system and process attributes such as size, growth-rate, work- rate and staffing.
    [Show full text]
  • PV109: Historie a V´Yvojov´Etrendy Ve VT Operaˇcn´Isyst´Emy
    PV109: Historie a v´yvojov´etrendy ve VT Operaˇcn´ısyst´emy LudˇekMatyska Fakulta informatiky Masarykovy univerzity podzim 2016 LudˇekMatyska (FI MU) PV109: Historie a v´yvojov´etrendy ve VT podzim 2016 1 / 29 Poˇc´ıtaˇcebez operaˇcn´ıhosyst´emu Obvykl´eve svˇetˇecca do 50. let, u n´asd´ele Programov´an´ıHW { strojov´yk´od Veˇsker´aobsluha z ovl´adac´ıhopultu Program nˇekdymusel obsahovat i zav´adˇec´ıˇc´ast Na poˇc´ıtaˇcivˇzdy bˇeˇzelpouze jeden program LudˇekMatyska (FI MU) PV109: Historie a v´yvojov´etrendy ve VT podzim 2016 2 / 29 Z´arodky prvn´ıchOS C´ılembylo minimalizovat prostoje mezi ´ulohami Nˇekdyintegrov´anys pˇrekladaˇcem Hlavn´ıkomponenta - jazyk pro ˇr´ızen´ı´uloh Job Control Language, JCL Pozdˇejii dalˇs´ıfunkce, zprvu opˇetty, kter´eminimalizuj´ıprostoje spooling oˇsetˇren´ıchyb LudˇekMatyska (FI MU) PV109: Historie a v´yvojov´etrendy ve VT podzim 2016 3 / 29 Komponenty modern´ıchOS Spr´avaprocesor˚u Spr´avaproces˚ua vl´aken Spr´avahlavn´ı(operaˇcn´ı)pamˇet'i Spr´avasoubor˚u Spr´avaI/O zaˇr´ızen´ı Spr´avavnˇejˇs´ı(sekund´arn´ı)pamˇeti Networking, distribuovan´esyst´emy Syst´emochran Interpret pˇr´ıkaz˚u{ CLI/GUI Syst´emov´eprogramy Rozhran´ı(sluˇzeb)OS pro uˇzivatele V minulosti se za souˇc´astOS povaˇzovalymnohdy i pˇrekladaˇce LudˇekMatyska (FI MU) PV109: Historie a v´yvojov´etrendy ve VT podzim 2016 4 / 29 ZOS { Z´akladn´ıOperaˇcn´ıSyst´em Urˇcenpro poˇc´ıtaˇcZPA 600 (modernizovan´yEPOS2) v 60. letech Velmi jednoduch´ysyst´em Zajiˇst'oval pouze prov´adˇen´ıakc´ıpodle pokyn˚uuˇzivatele Zad´av´an´ıpˇr´ıkaz˚u konzola (psac´ıstroj) sn´ımaˇcdˇern´ychˇst´ıtk˚u Uloˇzenkomplˇenˇeve statick´epamˇeti, Pozdˇejinˇekter´eˇc´astina magnetick´ep´asce LudˇekMatyska (FI MU) PV109: Historie a v´yvojov´etrendy ve VT podzim 2016 5 / 29 IBM DOS (1966) D´avkov´ezpracov´an´ı´uloh Urˇcen´ypro menˇs´ımodely ˇradyIBM 360 Ovl´ad´an´ız dˇern´ychˇst´ıtk˚ua z konzoly Uloˇzenna magnetick´emdisku Multiprogramov´an´ıs max.
    [Show full text]
  • ICL Technical Journal Volume 7 Issue 2
    ICL TECHNICAL JOURNAL Volume 7 Issue 2 November 1990 Published by International Computers Limited at Oxford University Press AN STC COMPANY iCL TECHNICAL JOURNAL The ICL Technical Journal is published twice a year by International Computers Limited at Oxford University Press. Editor J.M.M. Pinkerton ICL, Lovelace Road, Bracknell, Berks RG12 4SN Editorial Board J.M.M. Pinkerton (Editor) A. Rowley P.J. Cropper M.R. Miller D.W. Davies FRS (British Telecom Research G.E. Felton Laboratories) P. Galais (ICL France) E.C.P. Portman M.D. Godfrey (Imperial College, B.C. Warboys (University London University) of Manchester) J. Howlett H.J. Winterbotham F.F. Land (STC Technology Ltd.) (London Business School) All correspondence and papers to be considered for publication should be addressed to the Editor. The views expressed in the papers are those of the authors and do not necessarily represent ICL policy. 1990 subscription rates: annual subscription £40 UK, £44 EEC, £48 rest of world, US $95 N. America; single issues £22 UK, £25 EEC, £27 rest of world, US $52 N. America. Orders with remittances should be sent to the Journals Subscriptions Department, Oxford University Press, Pinkhill House, Southfield Road, Eynsham, Oxford 0X8 1JJ. This publication is copyright under the Berne Convention and the Inter­ national Copyright Convention. All rights reserved. Apart from any copying under the UK Copyright Act 1956, part 1, section 7, whereby a single copy of an article may be supplied, under certain conditions, for the purposes of research or private study, by a library of a class prescribed by the UK Board of Trade Regulations (Statutory Instruments 1957, No.
    [Show full text]
  • Roberto De Holanda Christoph Engenharia De Software Para
    Roberto de Holanda Christoph Engenharia de software para software livre Dissertação apresentada ao Departamento de Informática da Pontifícia Universidade Católica do Rio de Janeiro, como parte dos requisitos para a obtenção de grau de Mestre em Informática. Orientador: Julio Cesar Sampaio do Prado Leite Todos os direitos reservados. É proibida a reprodução total ou parcial do trabalho sem a autorização da universidade, do autor e do orientador. Roberto de Holanda Christoph Graduou-se em Engenharia de Computação (Pontifícia Universidade Católica do Rio de Janeiro) em 2002. Trabalhou em diversos lugares, entre eles está no LES (Laboratório de Engenharia de Software) da PUC-Rio durante seu período de graduação e pós-graduação. Participou de diversos projetos no laboratório, entre eles o C&L, um software livre que implementa um ambiente colaborativo para a edição de cenários e léxicos. Tem grande interesse na área de Engenharia de Software, principalmente na parte de Engenharia de Requisitos. Ficha catalográfica Christoph, Roberto de Holanda Engenharia de software para software livre / Roberto de Holanda Christoph; orientador: Julio Cesar Sampaio do Prado Leite. Rio de Janeiro: PUC, Departamento de Informática, 2004. 118 f .: il. ; 29,7 cm Dissertação (mestrado) – Pontifícia Universidade Católica do Rio de Janeiro, Departamento de Informática. Inclui referências bibliográficas. 1. Informática – Teses. 2. Requisitos. 3. Engenharia de Software. 4. Software Livre. 5. Cenários. 6. Léxicos. I. Leite, Julio Cesar Sampaio do Prado. II. Pontifícia Universidade Católica do Rio de Janeiro. Departamento de Informática. III. Título. CDD 004 ii Agradecimentos Aos funcionários, professores e alunos da PUC-Rio, e a todos aqueles que acreditaram em mim e me auxiliaram neste longo caminho.
    [Show full text]
  • ETHERNET and the FIFTH GENERATION Gordon Bell Vice
    THE ENGINEERING OF THE VAX-11 COMPUTING ENVIRONMENT The VAX-11 architectural design and implementation began in 1975 with the goals of a wide range of system sizes and different styles of use. While much of the implementation has been "as planned", various nodes (eg. computers, disk servers) and combined structures (eg. clusters) have evolved in response to the technology forces, user requirements and constraints. The future offers even more possibilities for interesting structures. ETHERNET AND THE FIFTH GENERATION Gordon Bell Vice President, Engineering Digital Equipment Corporation In the Fifth Computer Generation, a wide variety of computers will communicate with one another. No one argues about this. The concern is about how to do it and what form the computers will take. A standard communications language is the key. I believe Ethernet is this unifying key to the 5th computer generation because it interconnects all sizes and types of computers in a passive, tightly-coupled, high performance fashion, permiting the formation of local-area networks. HOW THE JAPANESE HAVE CONVERTED WORLD INDUSTRY INTO DISTRIBUTORSHIPS -- CONCERN NOW FOR SEMICONDUCTORS AND COMPUTERS Gordon Bell Vice President Digital Equipment Corporation Abstract We all must be impressed with the intense drive, technical and manufacturing ability of the Japanese. As an island with few natural resources, and only very bright, hard working people they have set about and accomplished the market domination of virtually all manufactured consumer goods and the components and processes to make these goods (i.e., vertical integration). Currently the U.S. has a dominant position in computers and semiconductors. However, there's no fundamental reason why the Japanese won't attain a basic goal to dominate these industries, given their history in other areas and helped by our governments.
    [Show full text]
  • CIT392 COURSE TITLE: Computer Laboratory II
    NATIONAL OPEN UNIVERSITY OF NIGERIA SCHOOL OF SCIENCE AND TECHNOLOGY COURSE CODE: CIT392 COURSE TITLE: Computer Laboratory II Course Code CIT 392 Course Title COMPUTER LABORATORY II Course Developer/Writer Dr. ONASHOGA, S. A. (Mrs.) DEPT. OF COMPUTER SCIENCE UNIVERSITY OF AGRICULTURE, ABEOKUTA, OGUN STATE NIGERIA. Course Editor Greg Onwodi NOUN Program Leader Prof. Kehinde Obidairo Course Coordinator Greg Onwodi NOUN 9 NATIONAL OPEN UNIVERSITY OF NIGERIA Table of Contents Introduction ..................................................................................................................................... 3 What you will learn in this Course ................................................................................................. 3 Course Aims.................................................................................................................................... 4 Course Objectives ........................................................................................................................... 4 Working through this Course .......................................................................................................... 4 The Course Materials ...................................................................................................................... 5 Study Unit ....................................................................................................................................... 5 Assessment .....................................................................................................................................
    [Show full text]
  • Curriculum Vitae John Peter Fitch Personal Details: Employment Record
    Curriculum Vitae John Peter Fitch March 16, 2019 Note: I also use the name John ffitch and have published under that name, especially in music. Also I am sometimes referenced as such by others, whatever the name on the actual paper. Personal Details: Home Address: \Alta" Horsecombe Vale Combe Down Bath BA2 5QR England e-mail: [email protected] Date of Birth: 10 December 1945 Place of Birth: Barnsley, Yorkshire Marital Status: Married to Audrey Fitch, n´ee Heath since 1968, no children Employment Record: Senior Assistant in Research, The Computer Laboratory, Cambridge, 1971 { 1977 Assistant Visiting Professor, Department of Computer Science, University of Utah, 1977 { 1978 Lecturer, Department of Computer Studies, University of Leeds, 1978 { 1980 Director, The Computer Unit, University of Bath, 1980 { 1983 Professor of Software Engineering, University of Bath, 1980 { 2011 (variously in School of Mathe- matics, School of Mathematical Sciences, Department of Mathematical Sciences, and Department of Computer Science) Visiting Professor, Department of Computer Science, University of Bath 2011 { 2015 Adjunct Honorary Professor, Department of Music, National University of Ireland, Maynooth, 2011 { 2021 Partner, Fitch-Norman, LISP Software and Consultancy, 1983 { 1989 Director, Codemist Ltd, 1988 { 2016 Director, Composers Desktop Project Ltd, 2013 { date 1 Academic Record: 1956 { 1964, Brockenhurst Grammar School, Hampshire 13 `O' levels plus \Use of English", 4 `A' levels and 2 `S' levels (A1A2AA). 1964 { 1971, St John's College, University of Cambridge 1965 Mathematical Tripos Pt Ia (2nd class) 1966 Mathematical Tripos Pt Ib (2nd class) 1967 Mathematical Tripos Pt II (Senior Optime) B.A. Degree 1968 Diploma in Computer Science, with Distinction Elected to College Scholarship Awarded College Prize 1968 { 1971 Research Student in The Mathematical Laboratory Later the Computer Laboratory 1971 M.A.
    [Show full text]
  • International Computers Ltd Opracował: Andrzej Goleń – Pracownik ICL Poland W Latach 1987 -1997
    Kilka słów o ICL International Computers Ltd Opracował: Andrzej Goleń – pracownik ICL Poland w latach 1987 -1997 ICL International Computers Ltd – brytyjska korporacja komputerowa została utworzona w roku 1968 z inicjatywy Tony'ego Benna, ówczesnego brytyjskiego ministra techniki. Firma powstała w wyniku połączenia firm: International Computers and Tabulators (ICT) oraz English Electric Computers( EEC). Firmę ICL utworzono w celu zbudowania silnej brytyjskiej korporacji konkurencyjnej wobec IBM. Utworzona firma ICL prowadziła działalność w ponad 70 krajach i zatrudniała 26 000 pracowników. Podmioty tworzące ICL powstały również w wyniku procesów przejęć oraz scalania firm. Jeden z podmiotów tworzących ICL, firma English Electric Computers Ltd (EEC) powstała z scalenia firm Elliott Automation i English Electric Leo Marconi (EELM) w 1967 roku. Koncern English Electric został natomiast przejęty przez General Electric Co w 1968 roku. Firma EELM powstała z połączenia oddziału komputerowego koncernu English Electric z firmą Leo Computers (w 1963) i Marconi (w 1964 roku). Firma EELM wprowadziła na rynek serię komputerową System 4 we wrześniu 1965 roku. Firma ICT – International Computers and Tabulators Ltd swoje początki działalności oparła na maszynach tabulujących tj. technologii Hermana Holleritha. Pierwsza brytyjska firma sektora maszyn tabulujących British Tabulating Machine Company( BTM) powstała w 1907 roku. W 1911 James Power utworzył firmę konkurencyjną Powers Accounting Machines Company. W latach 20tych XX wieku brytyjskie firmy rozpoczęły produkcję oraz montaż maszyn ograniczając wcześniej realizowane zakupy maszyn w USA. Firmy BTM oraz Powers Accounting Machines Company konkurowały na rynku przez kilkadziesiąt lat. W 1959 roku mając na uwadze konkurencję firmy IBM, BTM oraz Powers Accounting Machine połączyły się tworząc International Computers and Tabulators Ltd (ICT).
    [Show full text]
  • Alvey Directorate Infrastructure Policy
    ALVEY DIRECTORATE INFRASTRUCTURE POLICY The Alvey Directorate Alvey Directorate Dept of Trade and Industry Millbank Tower Millbank ~ London SW1P 4QU Published by lEE The Institution of Electrical Engineers September 1984 - PREFACE The Alvey Directorate intends to coordinate its provision of computing resources for projects by setting up an Alvey Infrastructure Programme. This report is the output from a small working party set up within the Directorate to produce the initial plans. It is now being issued as a consultative document so that the views of participants inthe Alvey programme, current or prospective, can be obtained during the detailed planning stage. Comments on the main body of the report should be sent in the first instance to W P Sharpe, Alvey Directorate. Comments on the appendices should be sent to the representative of the area concerned: Software Engineering Dr R W Witty IKBS Mr W P Sharpe MMI Mr M J Underwood VLSI Mr M J Newman Communications Mr A Griggs CONTENTS Page 1. Overview 2 2. Context for Infrastructure Policy 2 3. Infrastructure Policy 3 4. Infrastructure Programme 4 5. Other Initiatives 5 APPENDIX A Communications Policy 7 APPENDIX B Software Engineering Infrastructure Policy 9 Annexe 1 (to Appendix B) SERC Common Base Policy 16 Annexe 2 (to Appendix B) The PERQ 17 APPENDIX C IKBS Infrastructure Policy 17 APPENDIX 0 MMI Infrastructure Policy 19 APPENDIX E VLSI and CAD Infrastructure Policy 20 Annexe (to Appendix E) Membership of Group X 23 .. "'- 1. Overview be complete at this time and it will be reviewed regularly as plans develop and needs change.
    [Show full text]