Introduction to Unix

Total Page:16

File Type:pdf, Size:1020Kb

Introduction to Unix Introduction to Unix Patricia J Riddle [email protected] Computer Science 215 Semester 1 2007 Special Thanks to Jasvir Nagra (who thinks he is God ……. or Denny Crane) for his lecture notes 210 and 215 • "Students are encouraged to enroll in COMPSCI 210 before or concurrently with COMPSCI 215.” • "Students ignoring this advice are unlikely to pass COMPSCI 215." Overall Aim Informal Objective • To understand the nitty-gritty stuff about how a computer does its thing. Objectives of the Course • Operating Systems – Know what an operating system is. – Learn how these hardware components operate. • Architecture – Understand what hardware a computer requires. – Learn how these hardware components operate. • Data Communication – Learn how multiple computers communicate – Understand the layers used in data communication protocols. Big Picture • Appreciate how complex systems can be built using mostly independent layers. Overview of Part 1 • Understand what an operating system is. • Learn how an OS abstracts and interacts with hardware. • Appreciate how we can hide complexity by building in layers. UNIX • We will use UNIX as a concrete example of an OS to illustrate (and play with) ideas. UNIX in Part I • Basic understanding of UNIX Simple commands, file redirection, pipes, filename patterns • Familiarity with common UNIX shell commands: ls, cd, mkdir, rm, more, less, cut, find, grep,... • Ability to find additional information Using commands like man, info and help UNIX Continued…. • Understand notions of files, directories and permissions • Be able to write and debug shell scripts for simple tasks: Shell variables, shell control statements and arithmetic What’s in it for you? • Get to pass Compsci 215 • Get to do complier and OS papers in 3rd year More in it for you! • Write better programs because you understand the limitations and features of the underlying machine. • Troubleshoot problems quicker because you are familiar with more than one level of abstraction. • Its fun! Unix is Born • Created – Initial development: 1969 – Ken Thompson and Dennis Ritchie at Bell Labs • Motivation – A need for a “convenient interactive computing service”. – The story goes that... Ken wanted something to run his “Space Travel” game, and there was this unused PDP-7 sitting in the corner. Unix is named • Unix stands for UNiplexed Information and Computing System. (It was originally spelled "Unics.") • Coined in 1969 to describe a specific computer operating system, the term "Unix" now covers a whole host of variations, including Linux, FreeBSD, and Solaris. What’s in a name? • The name was intended as a pun on an earlier system called "Multics" (Multiplexed Information and Computing Service). • Multics was a large multi-user operating system that was being developed at Bell Labs shortly before Unix was created in the early '70s. • Brian Kernighan is credited with the name. Unix spread • Whole system was re-written in “C” in 1973, and Bell Labs started to give it away (they were constrained by monopoly laws from selling software). • Universities took it up, and graduates took it with them into industry. Unix is adopted • The standard computing interface reputedly looked like this: OS/360 JCL / / B A T C H J O B J O B (‘1 2 3 4 5‘), M S G C L A S S = H, M S G L E V E L = (1,1), N O T I F Y = M E, / / U S E R = M E , R E G I O N = 4 0 0 K / / S T E P 1 E X E C P G M = H E L L O / / S T E P L I B D D D I S P = S H R , D S N = M Y.L O A D.L I B R A R Y / / S Y S P R I N T D D S Y S O U T = * • In this environment UNIX was a revelation: UNIX [computer-science-dept-university-of-aucklands-computer:~] pat$ HELLO Why Study Unix? Unix Windows - Open design - Closed Design - Modular - Monolithic - Programmer-centric - User-centric - Popular on servers. - Popular. They may appear different, but all operating system must ultimately provide the user the same utility - abstract away hardware so that users do not have to worry about it. User Interfaces Two fundamental types of user interfaces: GUI CLI (Command Line Interface) • Easier to learn • Expressive • Aesthetics • Modular • Obvious multi-tasking • Quicker • Remote access The Matrix “Hack” What is an Operating System? • ??1 Definition • An operating system manages the hardware and software resources of the computer system. It provides a stable, consistent way for applications to deal with the hardware without having to know all the details of the hardware. Characteristics • Safe • Efficient • Abstract The Shell Unix provides user-level access to its features through a “command interpreter”, or “shell”. 1. Write a prompt (e.g. prid013@chaos:~$ or [pat]$ ) 2. Read a line of input 3. The first word is the command; the rest are strings to pass to that command 4. Find an executable file matching the command “in the usual places” and run it 5. Wait for the command to finish; when it does, go back to step 1. Using University UNIX account • Connect from Windows using Putty • File → New Connection • Under-grad server is chaos.cs.auckland.ac.nz • Put the mouse away! Fun Unix Commands • echo print a string • ls list the files and directories • cd change directory • DEMO Alert • cat displays the – Using each of these commands contents of a file • who see who else is online • write write to other people • mesg do not disturb • man Your most useful companion man and apropos • man Online manual • DEMO Alert • apropos Search – man mesg manual – How to read sections of man Apropos means suitable ie. search for something – apropos clock suitable. Instead of – man oclock apropos you can also – oclock use man -k – man xclock For tomorrow… • Try logging on to chaos – I will give away a free chocolate egg tomorrow to the 10th person who logs in to chaos. • What is the command I will use to figure out the 10th person to log in to chaos? – I will give away a chocolate egg tomorrow to the person who emails me the best answer about how they figured out the command. Resources • Bruce Hutton’s notes on using UNIX http://www.cs.auckland.ac.nz/~bruceh/lectures/210UNIX/UNIXLectures.pdf • Check out http://www.cs.auckland.ac.nz/references/Unixhelp/ • There are literally hundreds of books in the library on Unix. Look for ones with a phrase like “beginners” or “dummies”. Best Way • Most of all, you will learn by trying things out while seated at a terminal. • You can expect lots of sad things to happen when you start using Unix, but it gradually gets easier. • The silly little names for commands are the most annoying part. • Try to look “under the surface” at the technical achievements of Unix, rather that getting into a panic trying to memorize commands. Using UNIX at Home • If you are feeling brave: – Try running Knoppix – Boots off a CD - no installation required – Very friendly graphical interface to UNIX • If you are feeling braver still: – Try installing Ubuntu Linux – Needs a 486 or better, a free partition and a free weekend – Lots of online support Using UNIX at Home • If you want to use UNIX at home: – Install CYGWIN – Runs a UNIX emulator on MS Dos/MS Windows – No way to send mouse events to UNIX through Cygwin – Put the mouse away! Using University UNIX Account • Ugrad UNIX server is called chaos.cs.auckland.ac.nz • Login using your UPI and NetAccount passwd [pat]$ ssh [email protected] Password: chaos> bash prid013@chaos:~$ ……… prid013@chaos:~$ exit exit chaos> logout Connection to chaos.cs.auckland.ac.nz closed. [pat]$.
Recommended publications
  • 24 Bringing Order to Chaos: Barrier-Enabled I/O Stack for Flash Storage
    Bringing Order to Chaos: Barrier-Enabled I/O Stack for Flash Storage YOUJIP WON and JOONTAEK OH, Hanyang University, Korea JAEMIN JUNG, Texas A&M University, USA GYEONGYEOL CHOI and SEONGBAE SON, Hanyang University, Korea JOOYOUNG HWANG and SANGYEUN CHO, Samsung Electronics, Korea This work is dedicated to eliminating the overhead required for guaranteeing the storage order in the modern IO stack. The existing block device adopts a prohibitively expensive approach in ensuring the storage order among write requests: interleaving the write requests with Transfer-and-Flush. For exploiting the cache bar- rier command for flash storage, we overhaul the IO scheduler, the dispatch module, and the filesystem sothat these layers are orchestrated to preserve the ordering condition imposed by the application with which the associated data blocks are made durable. The key ingredients of Barrier-Enabled IO stack are Epoch-based IO scheduling, Order-Preserving Dispatch,andDual-Mode Journaling. Barrier-enabled IO stack can control the storage order without Transfer-and-Flush overhead. We implement the barrier-enabled IO stack in server as well as in mobile platforms. SQLite performance increases by 270% and 75%, in server and in smartphone, respectively. In a server storage, BarrierFS brings as much as by 43× andby73× performance gain in MySQL and SQLite, respectively, against EXT4 via relaxing the durability of a transaction. CCS Concepts: • Software and its engineering → File systems management; Additional Key Words and Phrases: Filesystem, storage, block device, linux ACM Reference format: Youjip Won, Joontaek Oh, Jaemin Jung, Gyeongyeol Choi, Seongbae Son, Jooyoung Hwang, and Sangyeun Cho. 2018. Bringing Order to Chaos: Barrier-Enabled I/O Stack for Flash Storage.
    [Show full text]
  • Ein Wilder Ritt Distributionen
    09/2016 Besichtigungstour zu den skurrilsten Linux-Distributionen Titelthema Ein wilder Ritt Distributionen 28 Seit den frühen 90ern schießen die Linux-Distributionen wie Pilze aus dem Boden. Das Linux-Magazin blickt zurück auf ein paar besonders erstaunliche oder schräge Exemplare. Kristian Kißling www.linux-magazin.de © Antonio Oquias, 123RF Oquias, © Antonio Auch wenn die Syntax anderes vermu- samer Linux-Distributionen aufzustellen, Basis für Evil Entity denkt (Grün!), liegt ten lässt, steht der Name des klassischen denn in den zweieinhalb Jahrzehnten falsch. Tatsächlich basierte Evil Entity auf Linux-Tools »awk« nicht für Awkward kreuzte eine Menge von ihnen unseren Slackware und setzte auf einen eher düs- (zu Deutsch etwa „tolpatschig“), sondern Weg. Während einige davon noch putz- ter anmutenden Enlightenment-Desktop für die Namen seiner Autoren, nämlich munter in die Zukunft blicken, ist bei an- (Abbildung 3). Alfred Aho, Peter Weinberger und Brian deren nicht recht klar, welche Zielgruppe Als näher am Leben erwies sich der Fo- Kernighan. Kryptische Namen zu geben sie anpeilen oder ob sie überhaupt noch kus der Distribution, der auf dem Ab- sei eine lange etablierte Unix-Tradition, am Leben sind. spielen von Multimedia-Dateien lag – sie heißt es auf einer Seite des Debian-Wiki wollten doch nur Filme schauen. [1], die sich mit den Namen traditioneller Linux für Zombies Linux-Tools beschäftigt. Je kaputter, desto besser Denn, steht dort weiter, häufig halten Apropos untot: Die passende Linux- Entwickler die Namen ihrer Tools für Distribution für Zombies ließ sich recht Auch Void Linux [4], der Name steht selbsterklärend oder sie glauben, dass einfach ermitteln. Sie heißt Undead Linux je nach Übersetzung für „gleichgültig“ sie die User ohnehin nicht interessieren.
    [Show full text]
  • Enabling Virtualization Technologies for Enhanced Cloud Computing
    New Jersey Institute of Technology Digital Commons @ NJIT Dissertations Electronic Theses and Dissertations Fall 1-31-2015 Enabling virtualization technologies for enhanced cloud computing Kashifuddin Qazi New Jersey Institute of Technology Follow this and additional works at: https://digitalcommons.njit.edu/dissertations Part of the Computer Sciences Commons Recommended Citation Qazi, Kashifuddin, "Enabling virtualization technologies for enhanced cloud computing" (2015). Dissertations. 106. https://digitalcommons.njit.edu/dissertations/106 This Dissertation is brought to you for free and open access by the Electronic Theses and Dissertations at Digital Commons @ NJIT. It has been accepted for inclusion in Dissertations by an authorized administrator of Digital Commons @ NJIT. For more information, please contact [email protected]. Copyright Warning & Restrictions The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material. Under certain conditions specified in the law, libraries and archives are authorized to furnish a photocopy or other reproduction. One of these specified conditions is that the photocopy or reproduction is not to be “used for any purpose other than private study, scholarship, or research.” If a, user makes a request for, or later uses, a photocopy or reproduction for purposes in excess of “fair use” that user may be liable for copyright infringement, This institution reserves the right to refuse to accept a copying order
    [Show full text]
  • Heterogeneous Clusters.Pdf
    HowTo Heterogeneous Clusters Running ClusterKnoppix as a master node to a CHAOS drone army HowTo Heterogeneous Clusters Running ClusterKnoppix as a master node to a CHAOS drone army CONTROL PAGE Document Approvals Approved for Publication: Author Name: Ian Latter 12 December 2003 Document Control Document Name: Heterogeneous Clusters; Running ClusterKnoppix as a master node to a CHAOS drone army Document ID: howto - heterogenous clusters.doc-Release-1.1(467) Distribution: Unrestricted Distribution Status: Release Disk File: C:\Documents and Settings\_.NULL\Desktop\whitepaper\HowTo - Heterogenous Clusters.doc Copyright: Copyright 2003, Macquarie University Version Date Release Information Author/s 1.1 12-Dec-03 Release / Unrestricted Distribution Ian Latter 1.0 11-Dec-03 Draft / Uncontrolled Ian Latter Distribution Version Release to 1.1 Public Release 1.0 Macquarie University, Moshe Bar, Bruce Knox, Wim Vandersmissen Unrestricted Distribution Copyright 2003, Macquarie University Page 2 of 13 HowTo Heterogeneous Clusters Running ClusterKnoppix as a master node to a CHAOS drone army Table of Contents 1 OVERVIEW..................................................................................................................................4 2 WHY YOU WANT A HETEROGENEOUS CLUSTER ..........................................................5 2.1 WHERE APPLICATIONS LIVE ...................................................................................................5 2.2 OPTIMIZING CLUSTER ADMINISTRATION ................................................................................5
    [Show full text]
  • Linux Installation and Getting Started
    Linux Installation and Getting Started Copyright c 1992–1996 Matt Welsh Version 2.3, 22 February 1996. This book is an installation and new-user guide for the Linux system, meant for UNIX novices and gurus alike. Contained herein is information on how to obtain Linux, installation of the software, a beginning tutorial for new UNIX users, and an introduction to system administration. It is meant to be general enough to be applicable to any distribution of the Linux software. This book is freely distributable; you may copy and redistribute it under certain conditions. Please see the copyright and distribution statement on page xiii. Contents Preface ix Audience ............................................... ix Organization.............................................. x Acknowledgments . x CreditsandLegalese ......................................... xii Documentation Conventions . xiv 1 Introduction to Linux 1 1.1 About This Book ........................................ 1 1.2 A Brief History of Linux .................................... 2 1.3 System Features ......................................... 4 1.4 Software Features ........................................ 5 1.4.1 Basic commands and utilities ............................. 6 1.4.2 Text processing and word processing ......................... 7 1.4.3 Programming languages and utilities .......................... 9 1.4.4 The X Window System ................................. 10 1.4.5 Networking ....................................... 11 1.4.6 Telecommunications and BBS software .......................
    [Show full text]
  • HPC with Openmosix
    HPC with openMosix Ninan Sajeeth Philip St. Thomas College Kozhencheri IMSc -Jan 2005 [email protected] Acknowledgements ● This document uses slides and image clippings available on the web and in books on HPC. Credit is due to their original designers! IMSc -Jan 2005 [email protected] Overview ● Mosix to openMosix ● Why openMosix? ● Design Concepts ● Advantages ● Limitations IMSc -Jan 2005 [email protected] The Scenario ● We have MPI and it's pretty cool, then why we need another solution? ● Well, MPI is a specification for cluster communication and is not a solution. ● Two types of bottlenecks exists in HPC - hardware and software (OS) level. IMSc -Jan 2005 [email protected] Hardware limitations for HPC IMSc -Jan 2005 [email protected] The Scenario ● We are approaching the speed and size limits of the electronics ● Major share of possible optimization remains with software part - OS level IMSc -Jan 2005 [email protected] Hardware limitations for HPC IMSc -Jan 2005 [email protected] How Clusters Work? Conventional supe rcomputers achieve their speed using extremely optimized hardware that operates at very high speed. Then, how do the clusters out-perform them? Simple, they cheat. While the supercomputer is optimized in hardware, the cluster is so in software. The cluster breaks down a problem in a special way so that it can distribute all the little pieces to its constituents. That way the overall problem gets solved very efficiently. - A Brief Introduction To Commodity Clustering Ryan Kaulakis IMSc -Jan 2005 [email protected] What is MOSIX? ● MOSIX is a software solution to minimise OS level bottlenecks - originally designed to improve performance of MPI and PVM on cluster systems http://www.mosix.org Not open source Free for personal and academic use IMSc -Jan 2005 [email protected] MOSIX More Technically speaking: ● MOSIX is a Single System Image (SSI) cluster that allows Automated Load Balancing across nodes through preemptive process migrations.
    [Show full text]
  • Full Circle Magazine N° 85 1 Full Ciircle Magaziine N''est Affiiliié En Aucune Maniière À Canoniical Ltd
    Full Circle LE MAGAZINE INDÉPENDANT DE LA COMMUNAUTÉ UBUNTU LINUX Numéro 85 -Mai 2014 UUBBUUNNTTUU 11 44..0044 MIS SUR LA SELLETTE full circle magazine n° 85 1 Full Ciircle Magaziine n''est affiiliié en aucune maniière à Canoniical Ltd.. sommaire ^ Tutoriels Full Circle LE MAGAZINE INDÉPENDANT DE LA COMMUNAUTÉ UBUNTU LINUX Python p.1 1 ActusLinux p.04 LibreOffice p.1 4 Command&Conquer p.09 Arduino p.25 Demandez au petitnouveau p.29 GRUB2etMultibooting p.17 LaboLinux p.33 Critique:Ubuntu14.04 p.37 Monnaievirtuelle p.39 Blender p.19 Courriers p.42 Tuxidermy p.43 Q&R p.44 Inkscape p.21 Sécurité p.46 Conception Open Source p.47 JeuxUbuntu p.49 Graphismes Les articles contenus dans ce magazine sont publiés sous la licence Creative Commons Attribution-Share Alike 3.0 Unported license. Cela signifie que vous pouvez adapter, copier, distribuer et transmettre les articles mais uniquement sous les conditions suivantes : vous devez citer le nom de l'auteur d'une certaine manière (au moins un nom, une adresse e-mail ou une URL) et le nom du magazine (« Full Circle Magazine ») ainsi que l'URL www.fullcirclemagazine.org (sans pour autant suggérer qu'ils approuvent votre utilisation de l'œuvre). Si vous modifiez, transformez ou adaptez cette création, vous devez distribuerla création qui en résulte sous la même licence ou une similaire. Full Circle Magazine est entièrement indépendantfull de circle Canonical, magazine le sponsor n° 85 des projets2 Ubuntu. Vous ne devez en aucun cas présumer que les avis et les opinions exprimés ici ont reçu l'approbation de Canonical.
    [Show full text]
  • Monitoring Agent for Linux OS Reference Chapter 1
    Monitoring Agent for Linux OS Version 6.3.5 Reference IBM Monitoring Agent for Linux OS Version 6.3.5 Reference IBM Note Before using this information and the product it supports, read the information in “Notices” on page 227. This edition applies to version 6.35.14 of the Monitoring Agent for Linux OS and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 2010, 2018. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Chapter 1. Monitoring Agent for Linux Linux Group data set.......... 108 OS ................. 1 Linux Host Availability data set ...... 109 Linux IO Ext (Superseded) data set ..... 110 Chapter 2. Dashboard ......... 3 Linux IO Extended data set........ 113 Linux IP Address data set ........ 116 Default dashboard pages .......... 3 Linux LPAR data set .......... 117 Widgets for the Default dashboard pages ..... 4 Linux Machine Information data set ..... 120 Custom views ............. 31 Linux Network data set ......... 122 Linux Network (Superseded) data set .... 127 Chapter 3. Thresholds ........ 33 Linux NFS Statistics data set ....... 133 Predefined thresholds ........... 33 Linux NFS Statistics (Superseded) data set .. 142 Customized thresholds .......... 36 Linux OS Config data set ........ 152 Linux Process data set ......... 153 Chapter 4. Attributes ......... 39 Linux Process (Superseded) data set ..... 163 Data sets for the monitoring agent....... 40 Linux Process User Info data set ...... 170 Attribute descriptions ........... 44 Linux Process User Info (Superseded) data set 174 Agent Active Runtime Status data set .... 45 Linux RPC Statistics data set ....... 178 Agent Availability Management Status data set 47 Linux RPC Statistics (Superseded) data set .
    [Show full text]
  • Fedora 13 Alpha Arrives Ami
    Fedora 13 alpha arrives amid controversy http://www.desktoplinux.com/news/NS8716234495.html Home | News | Articles | Forum | Polls | Blogs | Videos | Resource Library Keywords: Match: Fedora 13 alpha arrives amid controversy Got a HOT tip? please tell us! Mar. 12, 2010 ADVERTISEMENT (Advertise here) The Fedora project has released an alpha version of Fedora 13 featuring automatic print-driver installation, the Btrfs filesystem, Resource Library enhanced 3D driver support, and much more. Meanwhile, on LWN.net, Jonathan Corbet reports on the growing controversy in the Fedora community over the quantity and quality of updates. This techie-focused Fedora is known as a cutting-edge, community-driven upstream contributor to Red Hat Enterprise Linux (RHEL). Expected to ship in final form in Popular recent stories: Visit the... • Linux an equal Flash player May, Fedora 13 follows the final release of Fedora 12 in November. Fedora 12 • Linux, netbooks threaten Microsoft's fat profits added speed optimizations for i686 CPUs and the Intel Atom, and enhanced • gOS 3.0 goes gold support for IPv6, Bluetooth, virtualization, multimedia, and power management • Browser swallows OS • Lenovo denies ditching Linux features. Fedora 12 also added support for the netbook-oriented Moblin desktop • Lightweight, Linux-compatible browser evolves environment, in the form of a Fedora 12 Moblin Fedora Remix edition. • GNOME 2.24 gains "Empathy" IM • Review: Pardus Linux • Ubuntu to fund Linux development Plug and play printing -- yea! • Ubuntu "Intrepid Ibex" available From the end-user perspective, one of the most noticeable improvements to Fedora All-time Classics: • Choosing a desktop Linux distro 13 is automatic print driver installation.
    [Show full text]
  • Macroecological and Macroevolutionary Patterns Emerge in the Universe of GNU/Linux Operating Systems Petr Keil, A
    Macroecological and macroevolutionary patterns emerge in the universe of GNU/Linux operating systems Petr Keil, A. A. M. Macdonald, Kelly S. Ramirez, Joanne M. Bennett, Gabriel E. Garcia-Pena, Benjamin Yguel, Bérenger Bourgeois, Carsten Meyer To cite this version: Petr Keil, A. A. M. Macdonald, Kelly S. Ramirez, Joanne M. Bennett, Gabriel E. Garcia-Pena, et al.. Macroecological and macroevolutionary patterns emerge in the universe of GNU/Linux operating systems. Ecography, Wiley, 2018, 41 (11), pp.1788-1800. 10.1111/ecog.03424. hal-02621181 HAL Id: hal-02621181 https://hal.inrae.fr/hal-02621181 Submitted on 26 May 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License doi: 10.1111/ecog.03424 41 1788– 1800 ECOGRAPHY Research Macroecological and macroevolutionary patterns emerge in the universe of GNU/Linux operating systems Petr Keil, A. A. M. MacDonald, Kelly S. Ramirez, Joanne M. Bennett, Gabriel E. García-Peña, Benjamin Yguel, Bérenger Bourgeois and Carsten Meyer P. Keil (http://orcid.org/0000-0003-3017-1858) ([email protected]) and J. M. Bennett, German Centre for Integrative Biodiversity Research (iDiv) Halle- Jena-Leipzig, Leipzig, Germany.
    [Show full text]
  • Ausgabe 06 / 2010
    Lehrer und6.|2010 SchuleDezember 2010, 34. Jahrgang Zeitschrift des Verbandes Bildung und Erziehung (VBE) Landesverband Hessen e. V. / Lehrergewerkschaft im Deutschen Beamtenbund Wir wünschen allen Mitgliedern sowie allen Leserinnen und Lesern von „Lehrer und Schule“ ein gesegnetes Weihnachtsfest, erholsame Weihnachtsferien und einen guten Start in das Jahr 2011. VBE Verband Bildung und Erziehung Landesverband Hessen 2 Inhalt + + + Kommentar + + + VBE-Landesvorsitzender: CDU-Herr hat in der Sache recht ...................................................... 83 Liebe Kolleginnen Gleichwertigkeit aller Lehrämter und und Kollegen! gerechte Bezahlung! .................................................. 83 VBE: Rechtsanspruch auf Inklusion in wir haben wieder einmal hessische Verhält- Ländergesetzen verankern ........................................84 nisse – wenn auch anders als früher. Nach den vielen, vielen Ankündigungen soll es VBE-Chef fordert differenzierte Beurteilung ....... 85 jetzt also wieder einmal in vielen Bereichen hoppla-hopp gehen: Das Lehrerbildungsge- Für Sie gelesen ..................................................... 85 setz ist in denkbar schwacher Verfassung Anmerkungen zum sog. „Kleinen Schulbudget“ im Kabinett, das Hessische Schulgesetz ist aus der Sicht des VBE Hessen .....................................86 plötzlich eilig und das sogenannte Kleine Schulbudget wird mit der Brechstange den Lehrer lassen sich nicht von der Politik Schulen angedient. vorführen .................................................................
    [Show full text]
  • Linux Journal | July 2016 | Issue
    A PENGUIN-POWERED RADIO STATION IN DC ™ WATCH: ISSUE OVERVIEW V JULY 2016 | ISSUE 267 http://www.linuxjournal.com Since 1994: The Original Magazine of the Linux Community ANDROID BROWSER SECURITY What You Should Know + A Crash Course on Planning Security Exercises Delve Into Complex String Processing Turn an Old PC into a How to Set Up WordPress Virtual-Machine Host with nginx LJ267-July2016.indd 1 6/23/16 3:16 PM NEW! Machine NEW! Linux on Learning Power: with Python Why Open Architecture Practical books Author: Reuven M. Lerner Matters Sponsor: Author: for the most technical Intel Ted Schmidt Sponsor: people on the planet. IBM NEW! Hybrid Cloud NEW! LinuxONE: Security with the Ubuntu z Systems Monster Author: Author: GEEK GUIDES Petros Koutoupis John S. Tonello Sponsor: Sponsor: IBM IBM Ceph: Linux on Open-Source Power SDS Author: Author: Ted Schmidt Ted Schmidt Sponsor: Sponsor: HelpSystems SUSE Download books for free with a SSH: a Self-Audit: simple one-time registration. Modern Checking Lock for Assumptions http://geekguide.linuxjournal.com Your Server? at the Door Author: Author: Federico Kereki Greg Bledsoe Sponsor: Sponsor: Fox Technologies HelpSystems LJ267-July2016.indd 2 6/23/16 3:16 PM NEW! Machine NEW! Linux on Learning Power: with Python Why Open Architecture Practical books Author: Reuven M. Lerner Matters Sponsor: Author: for the most technical Intel Ted Schmidt Sponsor: people on the planet. IBM NEW! Hybrid Cloud NEW! LinuxONE: Security with the Ubuntu z Systems Monster Author: Author: GEEK GUIDES Petros Koutoupis John S. Tonello Sponsor: Sponsor: IBM IBM Ceph: Linux on Open-Source Power SDS Author: Author: Ted Schmidt Ted Schmidt Sponsor: Sponsor: HelpSystems SUSE Download books for free with a SSH: a Self-Audit: simple one-time registration.
    [Show full text]