A Fault-Tolerant Distributed Operating System*

Total Page:16

File Type:pdf, Size:1020Kb

A Fault-Tolerant Distributed Operating System* GEORGIA INSTITUTE OF TECHNOLOGY OFFICE OF CONTRACT ADMINISTRATION PROJECT ADMINISTRATION DATA SHEET El ORIGINAL REVISION NO. — 36 — 6 83 Project No. : - GTRINIVIX DATE 11/ 30, , Project Director et".1115"—b School/jam ICS Sponsor: NASA - Langley Research Center Hampton, VA 23665 ,-71 , Type Agreement: Grant No. -430 $ Award Period: From 1/9/83 (Performance) /?•••44.4 i(Reports) it Sponsor Amount: s mange Total to Date Estimated: $ 47,402 Funded: $ 47,402 Cost Sharing Amount: $ Cost Sharing No: Title: "A Support Architecture for Reliable Distributed Computing Systems" ADMINISTRATIVE DATA OCA Contact John W. Burdette ext. 4820 1) Sponsor Technical Contact: 2) Sponsor Admin/Contractual Matters: •.•.•. Mrs. A.S. Reed (MS 126) V NASA - Langley Research Center National Aeronautics and Space Admin. .144.1149•441ft• /4/5 I/LT Langley Research Center Hampton, VA 23665 Hampton, VA 23665 (804) 865-043-7-7— (804) 865-3215 3515 Defense Priority Rating: N/A Military Security Classification: N/A N/A (or) Company/Industrial Proprietary: ESTR ICTIONS See Attached NASA Supplemental Information Sheet for Additional Requirements. Travel: Foreign travel must have prior approval — Contact OCA in each case. Domestic travel requires sponsor approval where total will exceed greater of $500 or 125% of approved proposal budget category. Equipment: Title vests with GIT; however, Government reserves the right to acquire transfer ro itself title to items of $1,000 or more. COMMENTS: 23456 % .9, DEC1983 c%) co (,) (t`'_ RECEIVED Research Reports ch N Offico IZ" COPIES TO: Project Director Procurement/EES Supply Services GTRI Research Administrative Network Research Security Services Library ... Research Property Management R•pettrOotordinetti-teem - , Project File, GEORGIA xmmorEdof TECHNOLOGY OFFICE NOTICE OF PROJECT CLOSEOUT Closeout Notice Date 06/26/91 Center' to R5702-0A0 .0115. A SUPPORT ARCHITECTURE FOR RELIA14;101TRIBUTED COMPUTING' r ;" ffective CoSeleilen'llete 900410 (Perfii'--iienCi) 900410 (Repo stribution Required' fi Project Director ainistratite Network Represent TRI Accounting/Wants and Carib' tocureuent/MeMIY Services' eseara0Pripairty Man Research Security Services /.° A SUPPORT ARCHITECTURE FOR RELIABLE DISTRIBUTED COMPUTING SYSTEMS Semi-Annual Status Report November 9, 1983 - May 8, 1984 From Georgia Tech Research Institute Atlanta, Georgia 30332 To National Aeronautics and Space Administration Langley Research Center Grant No. NAG-1-430 ENDORSEMENT: /a Martin S. hckendry Date Principal Investigator (404)894-3816 Summary During the past six months, we have consolidated many of the concepts con- tained in the proposal for this grant, and we have begun design and construc- tion of systems to validate those concepts experimentally. An overview of the system design as it currently stands is contained in [McKe84c], attached as an appendix. This is the only paper completed during the period. Several papers are underway, or almost completed. These are described as appropriate below. Equipment The National Science Foundation has agreed to purchase test equipment to support our experimentation. This equipment comprises three VAX 11/750's interconnected via Ethernet and a VAX CI. Four well-configured IBM PC's are to be used as interface machines. The total award amount, including Georgia Tech matching contribution, is approximately $240,000. We are cur- rently negotiating a discount with Digital, the manufacturer. We anticipate delivery towards the end of calendar year 1984. Naturally, our design and construction efforts reflect this timeframe. Kernel Support Mechanisms Our work in this area has focused on mechanisms to maintain ordering require- ments in the nested action environment. This work is described in a tech- nical report [McKe84a] that is currently undergoing revision before release. Kernel Design An operating system kernel to support the operating system is under con- struction. Initial design concepts are discussed in a technical report [Spaf84] to be released soon. This report focuses on the operation invoc- ation mechanisms, network servers, the virtual memory system, and the file system. Work is now progressing on the construction of several of the low- level components of the operating system. Compiler Development In conjunction with this grant, although not funded directly by it, we are constructing a compiler to support system programming for the new operating system. The design of the language to be supported is now substantially complete, and construction of the compiler is underway. 1 Scheduling Mechanisms Preliminary work on the design of fault-tolerant scheduling mechanisms began during the past few months. This work is described in an upcoming technical report [McKe84b]. We anticipate that considerable effort will be expended here over the next two years. User Interface Work is progressing on the design and construction of a user interface for the operating system. Currently, this involves construction of a windowing operating system for the IBM PC. This will ultimately be used to interface to the VAXen, but immediately we hope to get experience using it in a Unix- style environment. Publications Possibly due to the youth of this effort, our publication record during the past six months has not been as good as we would have liked. However, many of the early concepts are now well understood and in draft form. Thus, we anticipate up to five journal submissions and several conference submissions in the next period. The topics to be covered include action management protocols, non-consistent database algorithms, action ordering mechanisms, specification techniques for fault-tolerant jobs, and scheduling mechanisms for fault-tolerant job execution. The last two papers mentioned also address dynamic reconfiguration. Possibly a paper on the file system will be com- pleted during this period also. The paper attached as an appendix was invited by the IEEE Interest group on distributed computing for a special issue of the newsletter. The issue is to focus on distributed operating systems. References [McKe84a] McKendry, M.S., "Ordering Actions for Visibility," School of In- formation and Computer Science, Georgia Institute of Technology, Tech- nical Report, 1984. [McKe84b] McKendry, M.S. "Fault-Tolerant Scheduling Mechanisms," School of Information and Computer Science, Georgia Institute of Technology, Technical Report. [McKe84c] Attached as an appendix. [Spaf84] Spafford, E.H., and M.S. McKendry, "Kernel Structures for Clouds," School of Information and Computer Science, Georgia Institute of Tech- nology, Technical Report. 2 Appendix Clouds: A Fault-Tolerant Distributed Operating System* Martin S. McKendry t School of Information and Computer Science Georgia Institute of Technology Atlanta, Georgia 30332 Introduction Clouds supports objects and (nested) actions as fundamental storage and computation mechanisms Over the past few years, several research groups have respectively. Objects are implemented as components been studying techniques to exploit the potential of of virtual address spaces. Actions are supported by distributed systems for supporting fault-tolerance. At low-level network protocols that handle lost and Georgia Tech, the Clouds group is working on the duplicated messages, remote procedure calls, and design and construction of a fault-tolerant, orphan detection. There is a tightly-controlled reconfigurable distributed operating system. We view relationship between volatile (main) memory and a single operating system as controlling a set of permanent memory (usually disk). This architectural computers called a multicomputer or computer cluster. support provides a sound basis for consistency. That is, Without impacting services provided to users, we it is possible to establish the restart state of any object intend to provide transparent support for upward after a failure. Even if that object is not available to reconfiguration -- addition of machines to the participate in establishing its state, the state is multicomputer -- and downward reconfiguration -- determined by a predefined protocol. failure or removal of machines. Thus, a fundamental difference of our work from much other work in the For a system to survive component failures (i.e., area is our attitude toward autonomy [McKe83]. We tolerate faults), mechanisms are needed in addition to regard autonomy as an issue of operating system basic action support. First, some representation of policy, not structure. Work is assigned to the work is needed. In Clouds, we represent work with machine(s) most able to handle it. In this way, service action networks. Action networks are programmed to all users can be enhanced. using a Petri-Net notation [Pete77]. The transitions of Petri-nets correspond to action executions. One of the The foundation of our approach depends on a attractions of this approach is that the state of such a combination of actions, objects, and fault-tolerant job net (called a job) is easily defined: actions execute scheduling mechanisms. Objects are instances of (transitions fire) atomically, and thus the net changes abstract data types. They encapsulate a data part, state atomically. which represents their state, and a procedural (or operation) part, which specifies the changes that can be The second requirement for survivability is that made to the data. Actions are partial orders of continuity of job execution be maintained through operations on objects. In considering reliability, the failures. To meet this requirement,
Recommended publications
  • Billg the Manager
    BillG the Manager “Intelli…what?”–Bill Gates The breadth of the Microsoft product line and the rapid turnover of core technologies all but precluded BillG from micro-managing the company in spite of the perceptions and lore around that topic. In less than 10 years the technology base of the business changed from the 8-bit BASIC era to the 16-bit MS-DOS era and to now the tail end of the 16-bit Windows era, on the verge of the Win32 decade. How did Bill manage this — where and how did he engage? This post introduces the topic and along with the next several posts we will explore some specific projects. At 38, having grown Microsoft as CEO from the start, Bill was leading Microsoft at a global scale that in 1993 was comparable to an industrial-era CEO. Even the legendary Thomas Watson Jr., son of the IBM founder, did not lead IBM until his 40s. Microsoft could never have scaled the way it did had BillG managed via a centralized hub-and-spoke system, with everything bottlenecked through him. In many ways, this was BillG’s product leadership gift to Microsoft—a deeply empowered organization that also had deep product conversations at the top and across the whole organization. This video from the early 1980’s is a great introduction to the breadth of Microsoft’s product offerings, even at a very early stage of the company. It also features some vintage BillG voiceover and early sales executive Vern Raburn. (Source: Microsoft videotape) Bill honed a set of undocumented principles that defined interactions with product groups.
    [Show full text]
  • Jim Allchin on Longhorn, Winfs, 64-Bit and Beyond Page 34 Jim
    0805red_cover.v5 7/19/05 2:57 PM Page 1 4 Scripting Solutions to Simplify Your Life Page 28 AUGUST 2005 WWW.REDMONDMAG.COM MrMr WindowsWindows Jim Allchin on Longhorn, WinFS, 64-Bit and Beyond Page 34 > $5.95 05 • AUGUST Make Room for Linux Apps Page 43 25274 867 27 Active Directory Design Disasters Page 49 71 Project1 6/16/05 12:36 PM Page 1 Exchange Server stores & PSTs driving you crazy? Only $399 for 50 mailboxes; $1499 for unlimited mailboxes! Archive all mail to SQL and save 80% storage space! Email archiving solution for internal and external email Download your FREE trial from www.gfi.com/rma Project1 6/16/05 12:37 PM Page 2 Get your FREE trial version of GFI MailArchiver for Exchange today! GFI MailArchiver for Exchange is an easy-to-use email archiving solution that enables you to archive all internal and external mail into a single SQL database. Now you can provide users with easy, centralized access to past email via a web-based search interface and easily fulfill regulatory requirements (such as the Sarbanes-Oxley Act). GFI MailArchiver leverages the journaling feature of Exchange Server 2000/2003, providing unparalleled scalability and reliability at a competitive cost. GFI MailArchiver for Exchange features Provide end-users with a single web-based location in which to search all their past email Increase Exchange performance and ease backup and restoration End PST hell by storing email in SQL format Significantly reduce storage requirements for email by up to 80% Comply with Sarbanes-Oxley, SEC and other regulations.
    [Show full text]
  • 'Freeware' Programs - WSJ
    4/24/2021 Linux Lawsuit Could Undercut Other 'Freeware' Programs - WSJ This copy is for your personal, non-commercial use only. To order presentation-ready copies for distribution to your colleagues, clients or customers visit https://www.djreprints.com. https://www.wsj.com/articles/SB106081595219055800 Linux Lawsuit Could Undercut Other 'Freeware' Programs By William M. BulkeleyStaff Reporter of THE WALL STREET JOURNAL Aug. 14, 2003 1159 pm ET (See Corrections & Amplifications item below.) To many observers, tiny SCO Group Inc.'s $3 billion copyright-infringement lawsuit against International Business Machines Corp., and SCO's related demands for stiff license fees from hundreds of users of the free Linux software, seem like little more than a financial shakedown. But the early legal maneuverings in the suit suggest the impact could be far broader. For the first time, the suit promises to test the legal underpinnings that have allowed free software such as Linux to become a potent challenge to programs made by Microsoft Corp. and others. Depending on the outcome, the suit could strengthen or drastically weaken the free-software juggernaut. The reason: In filing its legal response to the suit last week, IBM relied on an obscure software license that undergirds most of the free-software industry. Called the General Public License, or GPL, it requires that the software it covers, and derivative works as well, may be copied by anyone, free of charge. IBM's argument is that SCO, in effect, "signed" this license by distributing Linux for years, and therefore can't now turn around and demand fees.
    [Show full text]
  • Media Update Comes Vs
    RE: IOWA COURT CASE Media Update Comes vs. Microsoft, Inc. January 22, 2007 Contact: Eileen Wixted 515-240-6115 Jim Hibbs 515-201-9004 Coverage Notes: Office 515-226-0818 1. Plaintiffs officially notify the U.S. Department of Justice and the Iowa Attorney General of Microsoft’s noncompliance with the 2002 Final Judgment in United States v. Microsoft. 2. Exhibit of interest: PX7278 shows that Vista evangelists at Microsoft raved about Apple’s Mac Tiger in 2004. WEB AND BROADCAST EDITORS PLEASE NOTE LANGUAGE IN THIS SECTION BEFORE PUBLISHING 3. Former General Counsel for software company Novell testifies about Microsoft’s anticompetitive conduct against Novell and DR DOS. 1. Plaintiffs notify the Department of Justice and Iowa Attorney General Tom Miller of Microsoft’s non-compliance with the 2002 Final Judgment in United States v. Microsoft. Today, Roxanne Conlin, co-lead counsel for the Plaintiffs in Comes v. Microsoft, sent a letter to Thomas Barnett of the United States Department of Justice and Iowa Attorney General Tom Miller, informing them that the Comes Plaintiffs have obtained confidential discovery materials from Microsoft showing that Microsoft is not complying with, and is circumventing, its disclosure obligations under the 2002 Final Judgment entered by the federal court in United States v. Microsoft. The 2002 Final Judgment requires Microsoft to fully disclose applications programming interfaces (“APIs”) and related documentation used by Microsoft. An expert retained by Plaintiffs analyzed source code and other materials produced by Microsoft in the Comes matter, and has concluded that a large number of Windows APIs used by Microsoft middleware remain undocumented.
    [Show full text]
  • Virtual Memory
    Today’s topics Operating Systems Brookshear, Chapter 3 Great Ideas, Chapter 10 Slides from Kevin Wayne’s COS 126 course Performance & Computer Architecture Notes from David A. Patterson and John L. Hennessy, Computer Organization and Design: The Hardware/Software Interface, Morgan Kaufmann, 1997. http://computer.howstuffworks.com/pc.htm Slides from Prof. Marti Hearst of UC Berkeley SIMS Upcoming Computability • Great Ideas, Chapter 15 • Brookshear, Chapter 11 Compsci 001 12.1 Performance Performance= 1/Time The goal for all software and hardware developers is to increase performance Metrics for measuring performance (pros/cons?) Elapsed time CPU time • Instruction count (RISC vx. CISC) • Clock cycles per instruction • Clock cycle time MIPS vs. MFLOPS Throughput (tasks/time) Other more subjective metrics? What kind of workload to be used? Applications, kernels and benchmarks (toy or synthetic) Compsci 001 12.2 Boolean Logic AND, OR, NOT, NOR, NAND, XOR Each operator has a set of rules for combining two binary inputs These rules are defined in a Truth Table (This term is from the field of Logic) Each implemented in an electronic device called a gate Gates operate on inputs of 0’s and 1’s These are more basic than operations like addition Gates are used to build up circuits that • Compute addition, subtraction, etc • Store values to be used later • Translate values from one format to another Compsci 001 12.3 Truth Tables Compsci 001 12.4 Images from http://courses.cs.vt.edu/~csonline/MachineArchitecture/Lessons/Circuits/index.html The Big Picture Since 1946 all computers have had 5 components The Von Neumann Machine Processor Input Control Memory Datapath Output What is computer architecture? Computer Architecture = Machine Organization + Instruction Set Architecture + ..
    [Show full text]
  • 138 C. Cross-Platform Java Also Presented a Middleware Threat To
    C. Cross-Platform Java also presented a middleware threat to Microsoft’s operating system monopoly 57. Cross-platform Java is another middleware technology that has the potential to erode the applications barrier to entry by gaining widespread usage of APIs without competing directly against Windows as an operating system. 1. The nature of the Java threat 58. James Gosling and others at Sun Microsystems developed Java in significant part to provide developers a choice between writing cross-platform applications and writing applications that depend on a particular operating system. 58.1. Java consists of a series of interlocking elements designed to facilitate the creation of cross-platform applications, i.e. applications that can run on multiple operating systems. i. Gosling testified: "The Java technology is intended to make it possible to develop software applications that are not dependent on a particular operating system or particular computer hardware . A principal goal of the Java technology is to assure that a Java-based program -- unlike a traditional software application -- is no longer tied to a particular operating system and hardware platform, and does not require the developer to undertake the time- consuming and expensive effort to port the program to different platforms. As we said in the Preface to The Java Programming Language, ‘software developers creating applications in Java benefit by developing code only once, with no need to ‘port’ their applications to every software and hardware platform.’ . Because the Java technology allows developers to make software applications that can run on various JVMs on multiple platforms, it holds the promise of giving consumers greater choice in applications, operating systems, and hardware.
    [Show full text]
  • Hasta La Vista Microsoft and the Vista Operating System
    HASTA LA VISTA MICROSOFT AND THE VISTA OPERATING SYSTEM James R. “Doc” Ogden Kutztown University of Pennsylvania Denise T. Ogden Pennsylvania State University – Lehigh Valley Anatoly Belousov Elsa G. Collins Andrew Geiges Karl Long Kutztown University of Pennsylvania Introduction Jim Allchin, an executive in the Platform Product and Service Group, responsible for operating system development, walked into Bill Gates’ office in July 2004 to deliver bad news about the Longhorn operating system. “It’s not going to work,” said Allchin to Gates, Chairman of the Board and Steve Ballmer, CEO. Longhorn was too complex to run properly. The news got worse with reports that the team would have to start over. Mr. Gates, known for his directness and temperament, insisted the team take more time until everything worked. Upset over the mess, Gates said, “Hey, let's not throw things out we shouldn't throw out. Let's keep things in that we can keep in,” The executives agreed to reserve a final decision until Mr. Ballmer returned from a business trip (Guth, 2005). Over time it became clear that Longhorn had to start from scratch and remove all the bells and whistles that made the system so complex. After Bill Gates reluctantly agreed, the change was announced to Microsoft employees on August 26, 2004 and the new development process began in September 2004 (Guth, 2005). Often technology-oriented businesses have a more difficult time understanding the nuances of marketing because of the complex nature of the products/services. Nevertheless marketing is important and understanding customer needs becomes central to success.
    [Show full text]
  • Commentary Microsoft Vs. Linux: the Changing Nature of Competition
    COM-19-3908 Research Note D. Smith 13 March 2003 Commentary Microsoft vs. Linux: The Changing Nature of Competition Microsoft's attitude toward competition has changed as a result of Linux and other open- source software. Its business tactics are changing to focus on areas that have not been Microsoft's traditional strengths. Linux and open-source software are unlike any competition that Microsoft has ever faced. Microsoft is now perceived as "expensive," at least in preliminary discussions regarding Linux. There is no single competitor or group of competitors that Microsoft can challenge. Free open-source software is more a fundamental movement, and because the nature of competition has changed, Microsoft must now employ strategies that are very different. Background Microsoft has faced many types of competitors in the past. It has actually thrived on this competition, often worrying more about that than technology or customers’ wants and needs. While the constant focus and even obsession with competition has kept Microsoft remarkably agile, it has also contributed to Microsoft's sometimes overly aggressive tactics. One of these tactics involved bundling, which landed Microsoft in antitrust court in the late 1990s. It was found guilty of illegally maintaining a monopoly, but it escaped with permission (at least for now) to bundle products in any way its sees fit, with relatively minor restrictions. However, many are wondering whether this will matter in the future. Competitors have come and gone, but one tactic has remained constant — Microsoft's ability to use price to its advantage. Although neither unique to Microsoft nor the sole reason for its success, this price advantage has been effective and consistent with Microsoft's original goal — enabling PCs that run Microsoft software on every desktop.
    [Show full text]
  • Erik Stevenson
    Erik Stevenson From: Brad Silverberg To: pauline Subject: FW: DMTF and what to do with it... Date: Friday, January 28, 1994 5:36PM what a fucking mess. From: John Ludwig To: Brad Silverberg Subject: FW: DMTF and what to do with it... Date: Friday, January 28, 1994 4:39PM From: Jim Allchin To: johnlu Subject: FW: DMTF and what to do with it... Date: Thursday, January 27, 1994 3:55PM I thought you should see this. All I cansay Is "simply amazing..." Below Dan Is answering my questions to him on this mesS. If you have thoughts, I could use your help. thanks, jim From: Dan Shelly To: Jim AIIchin; Jonathan Roberts; Richard Tong Cc: Bob Muglia; David Thompson (NT) Subject: RE: DMTF and what to do with it... Date: Monday, January 24, 1994 5:52PM Answers embedded below. I was supposed to meet with IBM this Friday to discuss our distribution of source code to the DMTF. I backed out based on Re fact that our lawyers are still looking this over and it could take a *LONG* time for them to approve. I~h~t a fucking mess. > > A clear analysis of the situation 0. Is there anything in writing? > > The DMTF bylaws upon which this is all based are not clear. The original intent of the DMTF was to deliver an object level implementation. Nowhere have we committed in *writing* to deliver source code, however, if we don’t Intel has already stated that they will. Evidentatly the verbal agreement for the last 1.5 years has been that all work done by DMTF will be shared.
    [Show full text]
  • I PLAINTIFF's |
    i PLAINTIFF’S | I Bill Neukom ~ From: Paul Maritz To: David Thacher; Dwayne Walker Subject: FW: Netware competition Date: Wednesday, December 23, 1992 9:55AM From: Jim AIIchin To: Bill Gates; Dwayne Walker; Paul Maritz Co: Brad Silverberg; Jonathan Lazarus Subject: RE: Netware competition Date: Thursday, December 17, 1992 9:0DAM ;From: Bill Gates I’To: Dwayne Walker; Paul Maritz = Cc: Brad Silverberg; Jim Allchin; Jonathan Lazarus Subject: Netware competition Date: Wednesday, December 16, 1992 20:24 read this document from Novell labeled "Selling Guide Against MS" with interest. It makes a lot of very interesting attacks on our strategy - some wrong like that we are not enhancing DOS or that their network R&D is the largest in the industry (maybe we should make it clear that this is wrong). The y say that the I_AN man version of NT will be 4 to 6 months after NT. The Quote every negative article written about us. One part I learned from is this C2 certification issue. They claim they are the only product going for C2 networking certification and that that is a big deal. My understanding was that C2 network is easier to get and that )roducts like UNIX already have it. I want to understand this because it could be a huge marketing problem for us if what they say in their document is correct and we are not getting the same certification that they are. How can they be better than us when they have no preemp~on and most things run at ring O. W~th respect to security and C2, this document claims: -that we have either not started the process or are not very far into the process -this claim is based on the notion that we have not been issued a MOU (memorandum of understanding).
    [Show full text]
  • Award Winning Newsletter of the North Orange County Computer Club
    Newsletter of the North Orange County Computer Club Volume 43 No 5 May 2019 $1.50 NOCCC Meetings for Sunday May 5, 2019 The consignment table will be open from 10 am to 1 pm Main Meeting Jim Sanders will present a number of: Windows 10 Tips, Tricks, and Trade secrets. Actually more tips than tricks and only one trade secret, but an important secret. Special Interest Groups (SIGs) & Main Meeting Schedule 9:00 AM – 10:30 AM 12:00 PM Noon – 1:00 PM Beginners Digital Photography ........... Science 129 3D Printing………………………………… Irvine Auditorium Questions and Answers about Digital Photography Questions and Answers about our new printer Linux for Desktop Users……………….Science 131 PIG SIG …………………………………….. Irvine Courtyard Beginners’ Questions about Linux Bring your lunch. Consume it in the open-air benches in front of the Irvine Hall. Talk about your computer and 10:30 AM – 12:00 PM Noon life experiences. 3D Printing ................................... Irvine Auditorium Questions and Answers about our new printer Advanced Digital Photography… ........ Science 129 1:00 PM – 3:00 PM Main Questions and Answers about Digital Photography Meeting Linux Administration ............................ Science 131 More topics about the Linux operating system …………………..…….. Irvine Auditorium Mobile Computing ................................. Science 109 We discuss smartphones, tablets, laptops, operating sys- tems and computer related news. VBA and Microsoft Access/Excel ........ Science 127 Jim Sanders - Windows 10 Tips. Using VBA code to enhance the capabilities of Access and Excel 3:00 PM – 4:00 PM Board Meeting………………………………………………Science 129 Verify your membership renewal information by Mark your calendars for these meeting dates checking your address label on the last page 2019: Jun2 Jul7 Aug4 Sep8 Oct6 Nov3 Dec1 2020: Jan5 Feb9 Mar1 Apr5 May3 Coffee, cookies and donuts are available during the day in the Irvine Hall lobby.
    [Show full text]
  • Oral History of David Cutler
    Oral History of David Cutler Interviewed by: Grant Saviers Recorded: February 25, 2016 Medina, WA CHM Reference number: X7733.2016 © 2016 Computer History Museum Oral History of David Cutler Grant Saviers: I'm Grant Saviers, Trustee at the Computer History Museum, here with Dave Cutler in his living room in Bellevue, on a beautiful Seattle day. Nice weather, for a change. I’m here to discuss with Dave his long career in the computer industry. And so we'll begin. So we were talking about your entry into computers. But let's roll back a bit into early childhood and living in Michigan and being near the Oldsmobile factory in Lansing. So tell us a little bit about your early days and high school. David Cutler: Well, I grew up in Dewitt, Michigan, which is about ten miles north of Lansing, where Oldsmobile was at. I went to Dewitt High School. I was primarily an athlete, not a student, although I had pretty good grades at Dewitt. I was a 16-letter athlete. I played football, basketball, baseball and I ran track. And I'm a Michigan State fan. Michigan State was right there in East Lansing, so I grew up close to East Lansing and Michigan State. Early on, I was very interested in model airplanes, and built a lot of model airplanes and wanted to be a pilot when I grew up. But somehow that just went by the way. And later on, I discovered I had motion sickness problems, anyway, so that wasn't going to make it.
    [Show full text]