PC-DOS Notes Wendy Krieger – an Os2fan2
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
Optimizing and Protecting Hard Drives ‐ Chapter # 9
Optimizing and Protecting Hard Drives ‐ Chapter # 9 Amy Hissom Key Terms antivirus (AV) software — Utility programs that prevent infection or scan a system to detect and remove viruses. McAfee Associates’ VirusScan and Norton AntiVirus are two popular AV packages. backup — An extra copy of a file, used in the event that the original becomes damaged or destroyed. boot sector virus — An infectious program that can replace the boot program with a modified, infected version of the boot command utilities, often causing boot and data retrieval problems. buffer — A temporary memory area where data is kept before being written to a hard drive or sent to a printer, thus reducing the number of writes to the devices. chain — A group of clusters used to hold a single file. child, parent, grandparent backup method — A plan for backing up and reusing tapes or removable disks by rotating them each day (child), week (parent), and month (grandparent). cross-linked clusters — Errors caused when more than one file points to a cluster, and the files appear to share the same disk space, according to the file allocation table. defragment — To “optimize” or rewrite a file to a disk in one contiguous chain of clusters, thus speeding up data retrieval. differential backup — Backup method that backs up only files that have changed or have been created since the last full backup. When recovering data, only two backups are needed: the full backup and the last differential backup. disk cache — A method whereby recently retrieved data and adjacent data are read into memory in advance, anticipating the next CPU request. -
Why Os/2 Failed: Business Mistakes Compounded by Memory Prices
Mountain Plains Journal of Business and Economics Volume 10 Issue 1 Article 4 Date Published: 10-1-2009 Why Os/2 Failed: Business Mistakes Compounded By Memory Prices Eric G. Swedin Weber State University Davis Follow this and additional works at: https://openspaces.unk.edu/mpjbt Part of the Business Commons Recommended Citation Swedin, E. G. (2009). Why Os/2 Failed: Business Mistakes Compounded By Memory Prices. Mountain Plains Journal of Business and Economics, 10(1). Retrieved from https://openspaces.unk.edu/mpjbt/ vol10/iss1/4 This Case Study is brought to you for free and open access by OpenSPACES@UNK: Scholarship, Preservation, and Creative Endeavors. It has been accepted for inclusion in Mountain Plains Journal of Business and Economics by an authorized editor of OpenSPACES@UNK: Scholarship, Preservation, and Creative Endeavors. For more information, please contact [email protected]. 36 WHY OS/2 FAILED: BUSINESS MISTAKES COMPOUNDED BY MEMORY PRICES ERIC G. SWEDIN WEBER STATE UNIVERSITY DAVIS ABSTRACT In 2006, IBM ended their support of OS/2, closing the book on an ambitious effort to create a modern operating system for the personal computer. IBM and Microsoft released the OS/2 operating system in December 1987 to replace the primitive DOS with a more sophisticated, preemptive multitasking operating system for personal computers. This article argues that OS/2 failed because of the U.S.-Japan Semiconductor Trade Agreement of 1986, subsequent accusations of DRAM chip dumping by the United States, and the resulting tariffs on Japanese memory chips, led to a memory chip shortage that drove up memory prices. -
Installation and Performance
Installation and Performance Welcome Thank you for purchasing Visual Reality software. Visual Reality is designed to offer an easy but extremely powerful, three dimensional environment in which full color still images and 3D animations can be created. Visual Reality 2.0 includes: Renderize Live. Load 2D and 3D models from a variety of drawing and modeling programs or drag and drop from Visual Model and Visual Font and compose unique scenes in an intuitive 3D environment using a wide variety of material, lighting and camera effects. Load bitmap images from a variety of common file formats for backgrounds in scenes and as color, bump or reflection maps in material definitions. Render your compositions as full-color photorealistic images at any resolution. Animate just about anything with just a few button clicks. Objects, camera views, color intensity and location of lights and the bump height of materials can all be set in motion or transformed. Rotoscoping allows you to create moving water and flickering fire. Bend, twist, stretch and morph objects over time. An advanced channel editor gives you precise time line control of every attribute, for every element or object. The 'Ease to' and 'Ease from' functions and hierarchical linking of objects give your animations a natural feel with smooth, fully controllable motion. Visual Font. Load Windows TrueType fonts and create 3D text objects by defining extrusion and bevel properties. Load extruded text into Renderize Live for inclusion in 3D scenes. Visual Image. Load and modify bitmap images from a wide variety of file formats. Work on individual images, or use the powerful layering tools to create digital collages. -
Accessing Windows Applications from Unix and Vice Versa
50-20-42 DATA COMMUNICATIONS MANAGEMENT ACCESSING WINDOWS APPLICATIONS FROM UNIX AND VICE VERSA Raj Rajagopal INSIDE Accessing Windows Applications from an X-Station, Coexistence Options, Windows in an X-Station, Accessing Windows Applications, Accessing UNIX Applications from Windows Desktops, Emulators Migrating from one environment to another takes planning, resources and, most importantly, time (except in very trivial cases). This implies that even if eventually migrating to another environment, one still has to deal with coexistence among environments in the interim. In many com- panies it would make good business sense not to migrate legacy systems at all. Instead, it may be better to develop new systems in the desired en- vironment and phase out the legacy applications. The data created by the legacy applications is important and one must ensure that data can be ac- cessed from a new environment. Coexistence considerations are very im- portant in this case. Coexistence between Windows PAYOFF IDEA NT, UNIX, and NetWare deals with a Some users want applications they develop in number of related issues. One may one environment to execute in other environ- need to access Windows applications ments with very little change. With this approach, they can continue to develop applications with from a UNIX machine or need to ac- the confidence that they will execute in another cess UNIX applications from Win- environment even if the environments change in dows desktops. One may prefer to the future. In applications that can run in both have the same type of desktop (Òan Windows NT and UNIX, this can be accomplished enterprise desktopÓ) for all users and in several ways: be able to access different environ- •use APIs — there are three flavors of this ap- ments. -
Install Guide
THIS BOX CONTAINS: • (1) CD (your game!) • Install Guide (16 pp.) with quick installation instructions, directions for creating a floppy boot disk, configurations for a variety of memory management systems and Troubleshooting answers to possible problems. • Playguide (24 pp.) covering movement, fighting, interaction and so on. • Reference Card lists keyboard commands for a single-glance reminder. • Top Line — news brief, courtesy of the World Economic Consortium. • Anti-Terrorist Site Security — guide to keeping your WEC installation safe from armored, gun-toting turncoats and other menaces, annotated by General Maxis. • Resistance Handbook — written briefing for new rebel recruits. • Registration Card — please tell us who you are! CRUSADER: NO REMORSE ™ INSTALL GUIDE Welcome to Crusader: No Remorse. This guide includes quick installation instructions for users more familiar with the process, and a detailed, step-by- step guide to installing the game. If you experience any difficulty, consult Troubleshooting (page 9). To avoid compatibility or memory problems, please take a moment to confirm that your machine matches the System Require- ments described on page 2. Remember, you may safely stop at any time during installation and return to DOS with q, except when files are being copied. QUICK INSTALLATION Note: If you are running a disk cache such as SMARTDrive, you need to disable it to ensure a clean installation. (This only affects the installation of the game. SMARTDrive will work normally during gameplay.) Refer to your SMARTDrive documentation or make a system boot disk as described in Boot Disks (page 4) to disable this cache. 1. Turn on your computer and wait for the DOS prompt. -
Operating Systems: – Kinds of Systems – Common Desktop Systems – User Interaction – Manage the Processor – Manage Memory
Technology In Action © 2008 Prentice-Hall, Inc. 1 Technology In Action Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management © 2008 Prentice-Hall, Inc. 2 Topics • System software • Operating systems: – Kinds of systems – Common desktop systems – User interaction – Manage the processor – Manage memory © 2008 Prentice-Hall, Inc. 3 Topics • Operating systems: – Manage hardware – Interact with application software – Start the computer – Keep the computer organized • Desktop and windows features • Utility programs © 2008 Prentice-Hall, Inc. 4 System Software Operating systems System utilities • Control computer • Programs that perform functions: computer housekeeping – Hardware tasks: – Memory – Manage system resources – Improve efficiency – Application programs – Virus prevention – System maintenance • Provide user interface © 2008 Prentice-Hall, Inc. 5 Operating System Categories • Four categories: – Real-Time (RTOS) – Single-User, Single-Task – Single-User, Multitask – Multiuser © 2008 Prentice-Hall, Inc. 6 Real-Time Operating Systems • Systems with a specific purpose and a certain result • Uses include: – Industrial machines – Robotic equipment – Automobiles – Video game consoles – Home appliances © 2008 Prentice-Hall, Inc. 7 Single-User Operating Systems Single-task systems Multitask systems • Perform one task at a time • Perform simultaneous tasks • PDAs: • Windows – Pocket PC • MAC OS – Palm OS • Linux – Windows Mobile • MS-DOS © 2008 Prentice-Hall, Inc. 8 Multiuser Operating Systems • Known as network operating systems • Allow access to the computer system by more than one user • Manage user requests • Systems include: – UNIX – Novell Netware – Windows Server 2003 © 2008 Prentice-Hall, Inc. 9 Desktop Operating Systems • Operating system combined with the processor is known as a platform – Microsoft Windows / Intel – Apple Macintosh / Motorola • Desktop operating systems include: – Microsoft Windows – MAC OS – UNIX – Linux © 2008 Prentice-Hall, Inc. -
Wavetek 488RT Manual
Full-service, independent repair center -~ ARTISAN® with experienced engineers and technicians on staff. TECHNOLOGY GROUP ~I We buy your excess, underutilized, and idle equipment along with credit for buybacks and trade-ins. Custom engineering Your definitive source so your equipment works exactly as you specify. for quality pre-owned • Critical and expedited services • Leasing / Rentals/ Demos equipment. • In stock/ Ready-to-ship • !TAR-certified secure asset solutions Expert team I Trust guarantee I 100% satisfaction Artisan Technology Group (217) 352-9330 | [email protected] | artisantg.com All trademarks, brand names, and brands appearing herein are the property o f their respective owners. Find the Rockwell / Allen-Bradley 1784-T45 at our website: Click HERE WAVETEK WaveTese Runtime 488-RT WAVETE ST SOFTyARE PREFACE WaveTest Runtime (488-R1) enables you to run already developed and debugged automatic test programs. Clear. easy-to -use screens with pull-down menus guide you through program execu- tion. Programs developed with WaveTest (488) can be loaded and exe- cuted. The operator will have available all of the operator dialogs and runtime output that have been included in the test program. There are no editing capabilities. Chapter 1. Configuring Chapter 1 tells you how to setup WaveTest Runtime. This in- cludes ways to automatically load and run a test program. Chap- ter 1 also has useful information regarding how to effectively use the runtime environment of Windows. Chapter 2. Reference Chapter 2 describes the windows and menus available for access- ing test programs and controlloing their execution. Chapter 2 is not meant to be read through, but rather referred to for help with questions as they arise. -
Flashboot User Manual
FlashBoot User Manual © 2015 Mikhail Kupchik Contents 3 Table of Contents Foreword 0 Part I Introduction 5 1 Product................................................................................................................................... Overview 5 2 Why USB................................................................................................................................... Flash Disks? 5 3 Why FlashBoot?................................................................................................................................... 6 4 System................................................................................................................................... Requirements 7 5 Limitations................................................................................................................................... of Demo Version 8 6 Demo Version................................................................................................................................... -> Full Version 8 7 Support................................................................................................................................... & Feedback 8 Part II CD/DVD to USB conversions 9 1 Install ...................................................................................................................................full Win8/8.1/10 -> USB [BIOS mode] 9 2 Install................................................................................................................................... full -
Level One Benchmark Windows NT 4.0 Operating Systems V1.0.5
Level One Benchmark Windows NT 4.0 Operating Systems V1.0.5 Copyright 2003, The Center for Internet Security www.cisecurity.org Page 2 of 32 Terms of Use Agreement Background. CIS provides benchmarks, scoring tools, software, data, information, suggestions, ideas, and other services and materials from the CIS website or elsewhere (“Products”) as a public service to Internet users worldwide. Recommendations contained in the Products (“Recommendations”) result from a consensus-building process that involves many security experts and are generally generic in nature. The Recommendations are intended to provide helpful information to organizations attempting to evaluate or improve the security of their networks, systems and devices. Proper use of the Recommendations requires careful analysis and adaptation to specific user requirements. The Recommendations are not in any way intended to be a “quick fix” for anyone’s information security needs. No representations, warranties and covenants. CIS makes no representations, warranties or covenants whatsoever as to (i) the positive or negative effect of the Products or the Recommendations on the operation or the security of any particular network, computer system, network device, software, hardware, or any component of any of the foregoing or (ii) the accuracy, reliability, timeliness or completeness of any Product or Recommendation. CIS is providing the Products and the Recommendations “as is” and “as available” without representations, warranties or covenants of any kind. User agreements. By using the Products and/or the Recommendations, I and/or my organization (“we”) agree and acknowledge that: 1. No network, system, device, hardware, software or component can be made fully secure; 2. -
04 ISC 265 TESIS .Pdf
Sistema Académico Web SAITICC UNIVERSIDAD TÉCNICA DEL NORTE FACULTAD DE INGENIERÍA EN CIENCIAS APLICADAS CARRERA DE INGENIERÍA EN SISTEMAS COMPUTACIONALES TRABAJO DE GRADO PREVIO A LA OBTENCIÓN DEL TÍTULO EN INGENIERÍA EN SISTEMAS COMPUTACIONALES TEMA “SISTEMA ACADÉMICO WEB UTILIZANDO SOFTWARE LIBRE” AUTOR: Edwin Fernando Valencia Pavón. DIRECTOR: Ing. Pedro Granda. Ibarra - Ecuador 2012 – 2013 Fernando Valencia Pavón ii Sistema Académico Web SAITICC CERTIFICACIÓN Certifico que el trabajo de Tesis ― IMPLEMENTACIÓN DE UN SISTEMA ACADEMICO WEB PARA EL INSTITUTO TECNOLÓGICO SUPERIOR DE LA INDUSTRIA DEL CUERO DEL CANTÓN COTACACHI” con el aplicativo "DISEÑO E IMPLEMENTACION DELSISTEMA ACADEMICO WEB PARA EL INSTITUTO TECNOLOGICO DE LA INSDUSTRIA DEL CUERO. ha sido realizado en su totalidad por la señor: Edwin Fernando Valencia Pavón ………………………………………… Ing. Pedro Granda Director de la Tesis. Fernando Valencia Pavón iii Sistema Académico Web SAITICC UNIVERSIDAD TÉCNICA DEL NORTE BIBLIOTECA UNIVERSITARIA AUTORIZACIÓN DE USO Y PUBLICACIÓN A FAVOR DE LA UNIVERSIDAD TÉCNICA DEL NORTE IDENTIFICACIÓN DE LA OBRA La Universidad Técnica del Norte dentro del proyecto Repositorio Digital Institucional, determino la necesidad de disponer de textos completos en formato digital con la finalidad de apoyar los procesos de investigación, docencia y extensión de la Universidad. Por medio del presente documento dejo sentada mi voluntad de participar en este proyecto, para lo cual pongo a disposición la siguiente información: DATOS DE CONTACTO CÉDULA DE IDENTIDAD: 100316986-7 APELLIDOS Y NOMBRES: Valencia Pavón Edwin Fernando DIRECCIÓN: Urbanización María José EMAIL: [email protected] TELÉFONO FIJO: 062928-583 TELÉFONO MÓVIL (0968398896) DATOS DE LA OBRA TÍTULO: SISTEMA ACADÉMICO WEB UTILIZANDO SOFTWARE LIBRE. AUTOR: EDWIN FERNANDO VALENCIA PAVÓN FECHA: Julio-2013 PROGRAMA: PREGRADO TÍTULO POR EL QUE INGENIERÍA EN SISTEMAS COMPUTACIONALES OPTA: DIRECTOR: ING. -
Windows Intruder Detection Checklist
Windows Intruder Detection Checklist http://www.cert.org/tech_tips/test.html CERT® Coordination Center and AusCERT Windows Intruder Detection Checklist This document is being published jointly by the CERT Coordination Center and AusCERT (Australian Computer Emergency Response Team). printable version A. Introduction B. General Advice Pertaining to Intrusion Detection C. Look for Signs that Your System may have been Compromised 1. A Word on Rootkits 2. Examine Log Files 3. Check for Odd User Accounts and Groups 4. Check All Groups for Unexpected User Membership 5. Look for Unauthorized User Rights 6. Check for Unauthorized Applications Starting Automatically 7. Check Your System Binaries for Alterations 8. Check Your Network Configurations for Unauthorized Entries 9. Check for Unauthorized Shares 10. Check for Any Jobs Scheduled to Run 11. Check for Unauthorized Processes 12. Look Throughout the System for Unusual or Hidden Files 13. Check for Altered Permissions on Files or Registry Keys 14. Check for Changes in User or Computer Policies 15. Ensure the System has not been Joined to a Different Domain 16. Audit for Intrusion Detection 17. Additional Information D. Consider Running Intrusion Detection Systems If Possible 1. Freeware/shareware Intrusion Detection Systems 2. Commercial Intrusion Detection Systems E. Review Other AusCERT and CERT Documents 1. Steps for Recovering from a Windows NT Compromise 2. Windows NT Configuration Guidelines 3. NIST Checklists F. Document Revision History A. Introduction This document outlines suggested steps for determining whether your Windows system has been compromised. System administrators can use this information to look for several types of break-ins. We also encourage you to review all sections of this document and modify your systems to address potential weaknesses. -
The OS/2 Warp 4 CID Software Distribution Guide
SG24-2010-00 International Technical Support Organization The OS/2 Warp 4 CID Software Distribution Guide January 1998 Take Note! Before using this information and the product it supports, be sure to read the general information in Appendix D, “Special Notices” on page 513. First Edition (January 1998) This edition applies to OS/2 Warp 4 in a software distribution environment and to NetView Distribution Manager/2 (NVDM/2) with Database 2 (DB2) Version 2.11 for OS/2 and Tivoli TME 10 Software Distribution 3.1.3 for OS/2 (SD4OS2) software distribution managers. This edition also applies to OS/2 Warp 4 subcomponents, such as TCP/IP 4.0, MPTS, NetFinity 4.0, Peer Services, and LAN Distance, and to OS/2- related products, such as eNetwork Personal Communications for OS/2 Warp, eNetwork Communications Server for OS/2 Warp, Transaction Server, Lotus Notes, and Lotus SmartStuite 96 for OS/2 Warp. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. DHHB Building 045 Internal Zip 2834 11400 Burnet Road Austin, Texas 78758-3493 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 1998. All rights reserved Note to U.S Government Users – Documentation related to restricted rights – Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Contents Figures. .xiii Tables. xvii Preface. .xix How This Redbook in Organized .