Chapter 13: File-System Interface

Total Page:16

File Type:pdf, Size:1020Kb

Chapter 13: File-System Interface Chapter 13: File-System Interface Operating System Concepts – 10th dition Silberschatz, Galvin and Gagne ©2018 Chapter 13: File-System Interface File Concept Access Methods Disk and Directory Structure File-System Mounting File Sharing Protection Operating System Concepts – 10th dition 1!"2 Silberschatz, Galvin and Gagne ©2018 Objectives To explain the function of file systems To describe the interfaces to file systems To discuss file-system design tradeo!s, including access methods, file sharing, file locking, and directory structures To explore file-system protection Operating System Concepts – 10th dition 1!"! Silberschatz, Galvin and Gagne ©2018 File Concept Contiguous logical address space Types: Data numeric character binary Program Contents defined y file’s creator Many types Consider text file, source file, exec&table file Operating System Concepts – 10th dition 1!"# Silberschatz, Galvin and Gagne ©2018 File Attributes (ame – only information kept in human-reada le form )denti%er – uni&ue tag 'num er( identifies file )ithin file system *ype – needed for systems that support different types +ocation – pointer to file location on device Size % current file size ,rotection % controls )ho can do reading" )riting" executing *ime, date, and &ser identi%cation % data for protection" security, and usage monitoring ,nformation about files are kept in the directory structure" )hich is maintained on the disk Many variations, including extended file attri utes such as file checksum ,nformation kept in the directory structure Operating System Concepts – 10th dition 1!"' Silberschatz, Galvin and Gagne ©2018 File info Window on Mac OS X Operating System Concepts – 10th dition 1!"- Silberschatz, Galvin and Gagne ©2018 File Operations File is an abstract data type Create /rite – at write pointer location Read – at read pointer location Reposition within file - see3 Delete *r&ncate Open(Fi) – search the directory structure on disk for entry Fi" and move the content of entry to memory Close (Fi) – move the content of entry Fi in memory to directory structure on disk Operating System Concepts – 10th dition 1!". Silberschatz, Galvin and Gagne ©2018 Open Files Several pieces of data are needed to manage open files# Open-file table: tracks open files File pointer: pointer to last read/write location, per process that has the file open 5ile-open count# counter of number of times a file is open – to allow removal of data from open-file table when last processes closes it Disk location of the file: cache of data access information Access rights: per-process access mode information Operating System Concepts – 10th dition 1!"8 Silberschatz, Galvin and Gagne ©2018 Open File Locking Provided by some operating systems and file systems Similar to reader-writer locks Shared lock similar to reader lock % several processes can acquire concurrently Exclusive lock similar to )riter lock Mediates access to a file Mandatory or ad*isory: Mandatory % access is denied depending on locks held and requested Advisory – processes can find status of locks and decide what to do Operating System Concepts – 10th dition 1!"6 Silberschatz, Galvin and Gagne ©2018 File Locking Example – Java API import java.io.01 import java.nio.channels/01 public class Locking3xample { pu lic static final boolean 35C26S,73 = false; pu lic static final boolean S9A:3D = true; pu lic static *oid main(String arsg[<( thro)s ,=3xception { FileLock sharedLock 8 null1 FileLock exclusi*eLock 8 null1 try { :andomAccessFile raf 8 new RandomAccessFile(>file.txt>" "r)>(1 -- get the channel for the file FileChannel ch 8 raf.getChannel'(1 -- this locks the first half of the file - exclusi*e exclusi*eLock = ch.lock'?, raf/length((-2, 35C26S,73(1 -00 Aow modify the data . 0- -- release the lock exclusi*eLock.release((1 Operating System Concepts – 10th dition 1!"10 Silberschatz, Galvin and Gagne ©2018 File Locking Example – Java API (Cont.) -- this locks the second half of the file - shared sharedLock 8 ch.lock(raf/length((-@BC" raf/length((" S9A:3D(1 -00 Aow read the data / / / 0- -- release the lock sharedLock.release((1 D catch '.ava.io.,=3xception ioe) 4 System/err/println(ioe)1 Dfinally 4 if 'exclusiveLock E8 null( exclusi*eLock.release((1 if 'sharedLock E8 null( sharedLock.release((1 D D D Operating System Concepts – 10th dition 1!"11 Silberschatz, Galvin and Gagne ©2018 File Types – Name, Extension Operating System Concepts – 10th dition 1!"12 Silberschatz, Galvin and Gagne ©2018 File Structure None - sequence of words, bytes Simple record structure Lines Fixed length Variable length Complex Structures Formatted document Relocatable load file Can simulate last t)o with first method by inserting appropriate control characters Fho decides: =perating system Program Operating System Concepts – 10th dition 1!"1! Silberschatz, Galvin and Gagne ©2018 Sequential-access File Operating System Concepts – 10th dition 1!"1# Silberschatz, Galvin and Gagne ©2018 Access Methods Seq&ential 8ccess read next write next reset no read after last )rite 're)rite( 4irect 8ccess – file is fixed length logical records read n write n position to n read next write next rewrite n n 8 relative lock number :elati*e block num ers allow =S to decide )here file should be placed See allocation problem in Ch C@ Operating System Concepts – 10th dition 1!"1' Silberschatz, Galvin and Gagne ©2018 Simulation of Sequential Access on Direct-access File Operating System Concepts – 10th dition 1!"1- Silberschatz, Galvin and Gagne ©2018 Other Access Methods Can e built on top of ase methods General involve creation of an index for the file Heep index in memory for fast determination of location of data to e operated on (consider 6PC code plus record of data about that item) If too large" index (in memory( of the index (on disk) IBM indexed sequential-access method (ISAM) Small master index, points to disk blocks of secondary index File kept sorted on a defined key All done y the OS 7MS operating system provides index and relative files as another example (see next slide) Operating System Concepts – 10th dition 1!"1. Silberschatz, Galvin and Gagne ©2018 Example of Index and Relative Files Operating System Concepts – 10th dition 1!"18 Silberschatz, Galvin and Gagne ©2018 Directory Structure A collection of nodes containing information about all files Directory Files F 2 F 4 F 1 F 3 F n Both the directory structure and the files reside on disk Operating System Concepts – 10th dition 1!"16 Silberschatz, Galvin and Gagne ©2018 Disk Structure Disk can e subdivided into partitions Disks or partitions can e 18)4 protected against failure Disk or partition can e used ra0 – without a file system, or :ormatted with a file system Partitions also known as minidisks, slices Entity containing file system known as avolume Each volume containing file system also tracks that file system$s info in device directory or volume table of contents As well as general-purpose file systems there are many special-purpose file systems" frequently all within the same operating system or computer Operating System Concepts – 10th dition 1!"20 Silberschatz, Galvin and Gagne ©2018 A Typical File-system Organization Operating System Concepts – 10th dition 1!"21 Silberschatz, Galvin and Gagne ©2018 Types of File Systems We mostly talk of general-purpose file systems Iut systems frequently have may file systems, some general- and some special- purpose Consider Solaris has tmpfs – memory-based volatile FS for fast, temporary I-= objfs – interface into kernel memory to get kernel sym ols for debugging ctfs % contract file system for managing daemons lofs – loopback file system allows one FS to be accessed in place of another procfs – kernel interface to process structures ufs, zfs – general purpose file systems Operating System Concepts – 10th dition 1!"22 Silberschatz, Galvin and Gagne ©2018 Operations Performed on Directory Search for a file Create a file Delete a file 2ist a directory :ename a file Traverse the file system Operating System Concepts – 10th dition 1!"2! Silberschatz, Galvin and Gagne ©2018 Directory Organization The directory is organized logically to obtain 3Lciency – locating a file quickly Aaming – con*enient to users Two users can have same name for different files The same file can have several different names Grouping – logical grouping of files by properties, (e/g/, all Java programs, all games, N( Operating System Concepts – 10th dition 1!"2# Silberschatz, Galvin and Gagne ©2018 Single-Level Directory A single directory for all users Aaming problem Grouping problem Operating System Concepts – 10th dition 1!"2' Silberschatz, Galvin and Gagne ©2018 Two-Level Directory Separate directory for each user Path name Can ha*e the same file name for different user 3Lcient searching No grouping capability Operating System Concepts – 10th dition 1!"2- Silberschatz, Galvin and Gagne ©2018 Tree-Structured Directories Operating System Concepts – 10th dition 1!"2. Silberschatz, Galvin and Gagne ©2018 Tree-Structured Directories (Cont.) 3Lcient searching Grouping Capability Current directory (working directory( cd /spell/mail/prog type list Operating System Concepts – 10th dition 1!"28 Silberschatz, Galvin and Gagne ©2018 Tree-Structured Directories (Cont) 8bsolute or relative path name Creating a new file is done in current directory Delete a file rm <file-name> Creating a new subdirectory is done in current directory mkdir <dir-name> Example#
Recommended publications
  • The Microsoft Compound Document File Format"
    OpenOffice.org's Documentation of the Microsoft Compound Document File Format Author Daniel Rentz ✉ mailto:[email protected] http://sc.openoffice.org License Public Documentation License Contributors Other sources Hyperlinks to Wikipedia ( http://www.wikipedia.org) for various extended information Mailing list ✉ mailto:[email protected] Subscription ✉ mailto:[email protected] Download PDF http://sc.openoffice.org/compdocfileformat.pdf XML http://sc.openoffice.org/compdocfileformat.odt Project started 2004-Aug-30 Last change 2007-Aug-07 Revision 1.5 Contents 1 Introduction ......................................................................................................... 3 1.1 License Notices 3 1.2 Abstract 3 1.3 Used Terms, Symbols, and Formatting 4 2 Storages and Streams ........................................................................................... 5 3 Sectors and Sector Chains ................................................................................... 6 3.1 Sectors and Sector Identifiers 6 3.2 Sector Chains and SecID Chains 7 4 Compound Document Header ............................................................................. 8 4.1 Compound Document Header Contents 8 4.2 Byte Order 9 4.3 Sector File Offsets 9 5 Sector Allocation ............................................................................................... 10 5.1 Master Sector Allocation Table 10 5.2 Sector Allocation Table 11 6 Short-Streams ...................................................................................................
    [Show full text]
  • Java Read Text File from Resources
    Java Read Text File From Resources Self-distrust Paddy piffling, his hidalgo frisk refiles mobs. Sometimes crescent Fabian nicker her penitence pianissimo, but superfluous Ricki bootstraps officially or garbling impotently. Contrabass and pell-mell Patel often sandblast some courtesan wonderfully or reframing coequally. For your research paper on your user following form of this base package your file packages creating a single device may have a folder. An effect on java file was saved within the enumeration can read by supporting all the enumeration should not least, then mapping the project domain experts? These cookies will be stored in your browser only with different consent. Are you sure you want to cancel this follow? The text files in properties file system is all your data source and read text file from resources java, we just like. You show me many ways to read a File using Kotlin. The text data from a template of read text using textreader as long time and look at. It references your JAR file with an exclamation mark at the end, Cassandra as well as GCP and AWS cloud providers. Opinions expressed by DZone contributors are their own. Since they work on device boundaries, text files that make this question about deleting files in properties file in a content in google chrome has read text file from java resources folder. Whenever possible use routines that spotlight on file descriptors rather than pathnames. Join the social network of Tech Nerds, to grease a resource from the classpath, a receive string to not adequate to impede them.
    [Show full text]
  • File Formats
    man pages section 4: File Formats Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 817–3945–10 September 2004 Copyright 2004 Sun Microsystems, Inc. 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, docs.sun.com, AnswerBook, AnswerBook2, and Solaris are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. The OPEN LOOK and Sun™ Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry. Sun holds a non-exclusive license from Xerox to the Xerox Graphical User Interface, which license also covers Sun’s licensees who implement OPEN LOOK GUIs and otherwise comply with Sun’s written license agreements.
    [Show full text]
  • Computational Intelligence to Aid Text File Format Identification
    Computational Intelligence to aid Text File Format Identification Santhilata Kuppili Venkata, Alex Green The National Archives Abstract One of the challenges faced in digital preservation is to identify the file types when the files can be opened with simple text editors and their extensions are unknown. The problem gets complicated when the file passes through the test of human readability, but would not make sense how to put to use! The Text File Format Identification (TFFI) project was initiated at The National Archives to identify file types from plain text file contents with the help of computing intelligence models. A methodology that takes help of AI and machine learning to automate the process was successfully tested and implemented on the test data. The prototype developed as a proof of concept has achieved up to 98.58% of accuracy in detecting five file formats. 1 Motivation As an official publisher and guardian for the UK Government and England and Wales, The National Archives1(TNA) collates iconic documents from various government departments. In this born-digital documentation era, TNA needs to process a huge number of files daily. So it is necessary to research for sophisticated methods to handle various tasks in the process. File format identification of plain text files is one such example. 1.1 How a simple plain text file can create confusion? Figure 1: A sample text file with no file extension In this digital era, files are often generated in an integrated development environment. Each document is supported by multiple files. They include programming source code, data descrip- tion files (such as XML), configuration files etc.
    [Show full text]
  • Mac OS X Server Administrator's Guide
    034-9285.S4AdminPDF 6/27/02 2:07 PM Page 1 Mac OS X Server Administrator’s Guide K Apple Computer, Inc. © 2002 Apple Computer, Inc. All rights reserved. Under the copyright laws, this publication may not be copied, in whole or in part, without the written consent of Apple. The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple, the Apple logo, AppleScript, AppleShare, AppleTalk, ColorSync, FireWire, Keychain, Mac, Macintosh, Power Macintosh, QuickTime, Sherlock, and WebObjects are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. AirPort, Extensions Manager, Finder, iMac, and Power Mac are trademarks of Apple Computer, Inc. Adobe and PostScript are trademarks of Adobe Systems Incorporated. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Netscape Navigator is a trademark of Netscape Communications Corporation. RealAudio is a trademark of Progressive Networks, Inc. © 1995–2001 The Apache Group. All rights reserved. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. 062-9285/7-26-02 LL9285.Book Page 3 Tuesday, June 25, 2002 3:59 PM Contents Preface How to Use This Guide 39 What’s Included
    [Show full text]
  • Alias Manager 4
    CHAPTER 4 Alias Manager 4 This chapter describes how your application can use the Alias Manager to establish and resolve alias records, which are data structures that describe file system objects (that is, files, directories, and volumes). You create an alias record to take a “fingerprint” of a file system object, usually a file, that you might need to locate again later. You can store the alias record, instead of a file system specification, and then let the Alias Manager find the file again when it’s needed. The Alias Manager contains algorithms for locating files that have been moved, renamed, copied, or restored from backup. Note The Alias Manager lets you manage alias records. It does not directly manipulate Finder aliases, which the user creates and manages through the Finder. The chapter “Finder Interface” in Inside Macintosh: Macintosh Toolbox Essentials describes Finder aliases and ways to accommodate them in your application. ◆ The Alias Manager is available only in system software version 7.0 or later. Use the Gestalt function, described in the chapter “Gestalt Manager” of Inside Macintosh: Operating System Utilities, to determine whether the Alias Manager is present. Read this chapter if you want your application to create and resolve alias records. You might store an alias record, for example, to identify a customized dictionary from within a word-processing document. When the user runs a spelling checker on the document, your application can ask the Alias Manager to resolve the record to find the correct dictionary. 4 To use this chapter, you should be familiar with the File Manager’s conventions for Alias Manager identifying files, directories, and volumes, as described in the chapter “Introduction to File Management” in this book.
    [Show full text]
  • Filesystem Hierarchy Standard
    Filesystem Hierarchy Standard LSB Workgroup, The Linux Foundation Filesystem Hierarchy Standard LSB Workgroup, The Linux Foundation Version 3.0 Publication date March 19, 2015 Copyright © 2015 The Linux Foundation Copyright © 1994-2004 Daniel Quinlan Copyright © 2001-2004 Paul 'Rusty' Russell Copyright © 2003-2004 Christopher Yeoh Abstract This standard consists of a set of requirements and guidelines for file and directory placement under UNIX-like operating systems. The guidelines are intended to support interoperability of applications, system administration tools, development tools, and scripts as well as greater uniformity of documentation for these systems. All trademarks and copyrights are owned by their owners, unless specifically noted otherwise. Use of a term in this document should not be regarded as affecting the validity of any trademark or service mark. Permission is granted to make and distribute verbatim copies of this standard provided the copyright and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this standard under the conditions for verbatim copying, provided also that the title page is labeled as modified including a reference to the original standard, provided that information on retrieving the original standard is included, and provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this standard into another language, under the above conditions for modified versions, except that this permission notice may be stated in a translation approved by the copyright holder. Dedication This release is dedicated to the memory of Christopher Yeoh, a long-time friend and colleague, and one of the original editors of the FHS.
    [Show full text]
  • Writing a Text File
    Writing a text file Class java.io.BufferedWriter provides methods for creating and writing a file of characters, like a .txt file. One can create a BufferedWriter for a Path object p using: BufferedWriter bf= Files.BufferedWriter(p); The class has three methods of importance here: p.write(s, k, len); // Here, s is a String; write the substring s[k..k+len-1] to the file. p.newLine(); // Write a line separator —whatever your OS uses as a separator. p.close(); // Close the file. Should be called when no more is to be written on the file. The class is called a buffered writer because it “buffers” the text. When a call on p.write is being executed, the call does not have to wait until the string of characters is actually written to the file on the hard drive —that would take too long. Instead, the characters are added to a buffer, and the call on p.write then terminates. The buffer will be written to the file at an appropriate time, when it is (almost) full —or, at the latest, when p.close is called. Upon creating the BufferedWriter for Path p: If the file described by p does not exist, it is created, with size 0; if it already exists, it is truncated to size 0. PrintWriter: a solution to two problems with BufferedWriter There are two problems with class BufferedWriter. First, only String values can be written using procedure write. A value of any other type to be written to the file has to be explicitly changed by your code into a String.
    [Show full text]
  • What Is UNIX? the Directory Structure Basic Commands Find
    What is UNIX? UNIX is an operating system like Windows on our computers. By operating system, we mean the suite of programs which make the computer work. It is a stable, multi-user, multi-tasking system for servers, desktops and laptops. The Directory Structure All the files are grouped together in the directory structure. The file-system is arranged in a hierarchical structure, like an inverted tree. The top of the hierarchy is traditionally called root (written as a slash / ) Basic commands When you first login, your current working directory is your home directory. In UNIX (.) means the current directory and (..) means the parent of the current directory. find command The find command is used to locate files on a Unix or Linux system. find will search any set of directories you specify for files that match the supplied search criteria. The syntax looks like this: find where-to-look criteria what-to-do All arguments to find are optional, and there are defaults for all parts. where-to-look defaults to . (that is, the current working directory), criteria defaults to none (that is, select all files), and what-to-do (known as the find action) defaults to ‑print (that is, display the names of found files to standard output). Examples: find . –name *.txt (finds all the files ending with txt in current directory and subdirectories) find . -mtime 1 (find all the files modified exact 1 day) find . -mtime -1 (find all the files modified less than 1 day) find . -mtime +1 (find all the files modified more than 1 day) find .
    [Show full text]
  • Lecture 17: Files and Directories
    11/1/16 CS 422/522 Design & Implementation of Operating Systems Lecture 17: Files and Directories Zhong Shao Dept. of Computer Science Yale University Acknowledgement: some slides are taken from previous versions of the CS422/522 lectures taught by Prof. Bryan Ford and Dr. David Wolinsky, and also from the official set of slides accompanying the OSPP textbook by Anderson and Dahlin. The big picture ◆ Lectures before the fall break: – Management of CPU & concurrency – Management of main memory & virtual memory ◆ Current topics --- “Management of I/O devices” – Last week: I/O devices & device drivers – Last week: storage devices – This week: file systems * File system structure * Naming and directories * Efficiency and performance * Reliability and protection 1 11/1/16 This lecture ◆ Implementing file system abstraction Physical Reality File System Abstraction block oriented byte oriented physical sector #’s named files no protection users protected from each other data might be corrupted robust to machine failures if machine crashes File system components ◆ Disk management User – Arrange collection of disk blocks into files File File ◆ Naming Naming access – User gives file name, not track or sector number, to locate data Disk management ◆ Security / protection – Keep information secure Disk drivers ◆ Reliability/durability – When system crashes, lose stuff in memory, but want files to be durable 2 11/1/16 User vs. system view of a file ◆ User’s view – Durable data structures ◆ System’s view (system call interface) – Collection of bytes (Unix) ◆ System’s view (inside OS): – Collection of blocks – A block is a logical transfer unit, while a sector is the physical transfer unit.
    [Show full text]
  • Files and Processes (Review)
    Files and Processes (review) Files and Processes (review) 1/61 Learning Objectives Files and Processes (review) I Review of files in standard C versus using system call interface for files I Review of buffering concepts I Review of process memory model I Review of bootup sequence in Linux and Microsoft Windows I Review of basic system calls under Linux: fork, exec, wait, exit, sleep, alarm, kill, signal I Review of similar basic system calls under MS Windows 2/61 Files Files and I Recall how we write a file copy program in standard C. Processes (review) #include <stdio.h> FILE *fopen(const char *path, const char *mode); size_t fread(void *ptr, size_t size, size_t nmemb, FILE *stream); size_t fwrite(const void *ptr, size_t size, size_t nmemb, FILE *stream); int fclose(FILE *fp); I We can also use character-based functions such as: #include <stdio.h> int fgetc(FILE *stream); int fputc(int c, FILE *stream); I With either approach, we can write a C program that will work on any operating system as it is in standard C. 3/61 Standard C File Copy Files and Processes (review) I Uses fread and fwrite. I files-processes/stdc-mycp.c 4/61 POSIX/Unix Files Files and Processes (review) I "On a UNIX system, everything is a file; if something is not a file, it is a process." I A directory is just a file containing names of other files. I Programs, services, texts, images, and so forth, are all files. I Input and output devices, and generally all devices, are considered to be files.
    [Show full text]
  • Managing File Systems in Oracle® Solaris 11.4
    ® Managing File Systems in Oracle Solaris 11.4 Part No: E61016 November 2020 Managing File Systems in Oracle Solaris 11.4 Part No: E61016 Copyright © 2004, 2020, Oracle and/or its affiliates. License Restrictions Warranty/Consequential Damages Disclaimer This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. Warranty Disclaimer The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. Restricted Rights Notice If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial
    [Show full text]