19910003791.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

19910003791.Pdf 1, /iw.... -_ +I -J"- _A i:U"_'_ .7l-m _-_/£ (HASA-CR-i8740d) EVALUATION OF THE N91-13104 7 TRAJECTORY OPERATIONS APPLICATIONS SOFTWARE TASK (TOAST) (Houston Univ.) 65 p CSCL 09B Unc! <_s G3/Ol 0312546 EVALUATION OF THE TRAJECTORY OPERA TIONS APPLICATIONS SOFTWARE TASK ('TOAST) . Sharon Perkins University of Houston-Clear Lake _- _--_ ---_ Andrea Martin i ................................ Bill Bavinger Rice University : 2 Aullust 27, 1990 Cooperative Agreement NCC 9-16 Research Activity SE.36 NASA Johnson Spice Center Million Operations Directorate © © ' / _1 Research Institute for Computing and Information Systems University of Houston - Clear Lake T.E.C.H.N.I.C.A .L R" E--P_O :R" T 1,f 7S 4 - 7--;•- 7 " = m f :- - _j The University of Houston-Clear Lake established the Research Institute for Computing and Information systems in 1986 to encourage NASA Johnson Space _ Center and local industry to actively support research in the computing and _ The information sciences. As part of this endeavor, UH-Clear Lake proposed a partnership with JSC to jointly define and manage an integrated program of research in advanced data processing technology needed for JSC's main missions, including _ :. RICIS admlnlst ratlve, engineering andscience _responsibilities. JSC agreed an d entered i nto _ #_r a three-year cooperative agreement with UH-Clear Lake beginning in May, 1986, to - -'_- jointly plan and execute such research through RICIS. Additionally, under Concept Cooperative Agreement NCC 9-16, computing and educatiqaal facilities are shared by the two institutions to conduct the research. = The mission of RICIS is to conduct, coordinate and disseminate research on "_ computing and information systems among researchers, sponsors and users from UH-Clear Lake, NASA/JSC, and other research organizations. Within UH-Clear Lake, the mission is being implemented through interdisciplinary involvement of faculty and students from each of the four schools: Business, Education, Human --" Sciences and Humanities, and Natural and Applied Sciences. Other research organizations are involved via the "gateway" concept_ UH-Clear . = Lake establishes relationships with other universities and research organizations, having common research interests, to provide additional sources of expertise to -- conduct needed research. A major role of RICIS is to find the best match of sponsors, researchers and research objectives to advance knowledge in the computing and information sciences. Working jointly with NASA/JSC, RICIS advises on research needs, -" recommends principals for conducting the research, provides technical and administrative support to coordinate the research, and integrates technical results into the cooperative goals of UH-Clear Lake and NASA/JSC. m .. z m EVALUATION OF THE TRAJECTORY OPERA TIONS APPLICATIONS SOFTWARE TASK (TOAST) km . T I Jig m In iw k II qlw I Imlw W mw _ i Preface m This research was conducted under the auspices of the Research Institute for Computing and Information Systems by: Dr. Sharon Perkins, and Dr. Alfredo Perez-Davila, both Assistant Professors of Computer Science, University of Houston-Clear Lake; Ms. Andrea Martin, Manager, Computing Resource Center, Rice University; Bill Bavinger, Assistant Professor of Architecture, Rice University; David Boyes, consultant; and Dr. Livia Polanyi, consultant. Dr. Sharon Perkins served as RICIS research representative. Funding has been provided by Flight Design and Dynamics, within Mission Operations Directorate, NASA/JSC through Cooperative Agreement NCC 9-16 between NASA Johnson Space Center and the University of Houston-Clear Lake. The NASA technical monitor for this activity was Mike Evans. The views and conclusions contained in this report are those of the author and should not be interpreted as representative of the official policies, either express or implied, of NASA or the United States Government. w ! F Overview Jill The Trajectory Operations Applications Software Task (TOAS_ is a software development project under the auspices of the Mission Operations Directorate. Its purpose is to provide trajectory operation pre-mission and real-time support for the Space Shuttle program. As an Application Manager, TOAST provides an isolation layer between the underlying Unix operating system and the series of user programs. It provides two main services: 1. A common interface to operating system functions with semantics appropriate for C or FORTRAN 2. A structured input and output package that can be utilized by user application V programs. These two services can be used independently of the environment, providing a flexible application toolkit. In order to evaluate TOAST as an Application Manager, RICIS undertook an evaluation of the system under NASA Cooperative Agreement NCC 9-16. The task was to assess current and planned capabilities, compare capabilities to functions available in commercially-available off the shelf (COTS) software, and analyze requirements of Mission Control Center (MCC) and Flight Analysis Design System (FADS) users for m TOAST implementation. The project team consisted of faculty, staff, and students from University of Houston-Clear Lake and Rice University. Principal investigators were Sharon Perkins, Andrea Martin, and Bill Bavinger. w The evaluation began on March 28, 1990 and completed September 1, 1990. Preliminary results were presented to Flight Dynamics on June 1. Security briefings were delivered on May 24 and June 7. An executive brief'rag for management was presented on June 21. A I formal presentation to the NASA community was presented on June 22. An additional executive briefing for Flight Design management was delivered on July 10. V As a result of our investigation, we found that the current version of TOAST is well implemented and meets the needs of the real-time users. The plans for migrating TOAST to the X Window System are essentially sound; the Executive will port with minor changes, while Menu Handler will require a total rewrite. In this report, we include a series of recommendations for future TOAST directions, which is summarized as follows: Plan for a distributed operating environment with services, such as event notification, authentication and configuration management, database, and graphical user interfaces, provided via a high speed network. v 2 v Table of Contents List of Figures 6 Acronym Glossary 7 I. The Task II. Project Team Synopsis III. Our Approach 11 IV. High Level Summary 12 V. Needs Analysis 13 A. User Requirements 13 1. Evaluation Strategy 2. Task Analysis 14 a. Tasks Common to FDOs and Orbit Flight Design Users 14 b. Tasks of Orbit Flight Design 14 c. Tasks of Flight Dynamics Officers (FDOs) 15 3. Requirements 15 a. Requirements of Orbit Flight Designers 15 b. FDO Requirements 15 c. Additions to TOAST to Support Flight Design 16 d. Summary 16 B. Environmental Constraints 16 C. Design Philosophy 17 1. Role of an Application Manager 17 2a. Executive-based Design 18 2b. Overall Evaluation of TOAST Executive 19 3a. Structured Display Control 19 3b. Continuum of User Interfaces 20 3c. Overall Evaluation of Menu Handler 20 4a. Menu-Application-Display (MAD) Model 21 4b. Overall Evaluation of Menu-Application-Display (MAD) Model 21 5a. User Requirements versus Design Implementation 22 5b. Overall Evaluation of User Requirements Implementation 22 VI. Technical Analysis 23 A. Fault Tolerance 23 ..._. 1. Task of Fault Tolerance 23 2. Evaluation Strategy 23 3. Fault Tolerance in TOAST 23 4. Strengths of Present Implementation 24 5. Weaknesses of Present Implementation 24 6. Overall Evaluation of Strengths and Weaknesses 24 7. Recommendation 24 8. Summary 24 3 B. Portability 25 w 1. Task of Portability 25 2. Evaluation Strategy 25 3. Portability in TOAST 25 "!111 4. Strengths of Present Implementation 25 5. Weaknesses of Present Implementation 25 6. Recommendation 25 7. Summary 25 C. Comparison: Muld-Level Menu System to COTS Application Manager 26 1. Task of a Menu Application System 26 2. Evaluation Strategy 26 III 3. Multi-Level Menu System in TOAST 26 4. Strengths of Present Implementation 26 5. Weaknesses of Present Implementation 27 6. Overall Evaluation of Strengths and Weaknesses 27 7. Recommendation 27 8. Summary 27 D. Comparison: Menu Handler to Text-based COTST_ikits 27 1. Task of Forms Generation and Display Packages 27 2. Implementation in TOAST 28 3. Evaluation Strategy 28 4. Strengths of Present Implementation 28 5. Weaknesses of Present Implementation 29 6. Overall Evaluation of Strengths and Weaknesses 29 7. Recommendation 29 8. Summary 29 E. Data Structures 30 30 1. Task of Data Structures i 2. Data Structures in TOAST 30 3. Evaluation Strategy 30 4. Strengths of Present Implementation 30 5. Weaknesses of Present Implementation 30 ! 6. Recommendation 30 7. Summary 30 31 F. Security V 1. Task of Security 31 2. Evaluation Strategy 31 3. Security in TOAST 31 4. Strengths of Present Implementation 31 5. Weaknesses of Present TOAST Implementation 31 6. Weaknesses of the Environment 32 7. Overall Evaluation of Security Strengths and Weaknesses 32 w 8. Recommendation 32 9. Summary 32 m VII. Man/Machine Interface 33 33 A. Applications Programming Envirgnment m 33 1. Evaluation Strategy m 2. Strengths of Programming Environment 33 3. Weaknesses of Programming Environment 33 4. Recommendation 34 B. User Interface Capabilities 34 4 VIII. Software Engineering 35 w A. Coding Practices 35 1. Evaluation Strategy 35 2. Evaluation Criteria 35 3. Implementation in TOAST Software 36 4. Recommendation 37 5. Summary 37 B. Documentation Review 38 l° Evaluation Strategy 38 2. Evaluation Criteria 38 ,: ± 3. Implementation in Menu Handler Documentation 38 4. Strengths of Menu Handler Documentation 39 5. Weaknesses of Menu Handler Documentation 39 6. Recommendation 39 7. Summary 40 C. Revision Practices 40 1. Evaluation Strategy 40 2. Evaluation Criteria 40 3. The Revision Process for TOAST 40 4. Problem Areas 41 5. Recommendation 41 6. Summary 42 IX. Future TOAST Migrations 43 A. TOAST Under X 43 i 1. Evaluation Strategy 43 2. The X Window System 43 3.
Recommended publications
  • GNU Emacs Manual
    GNU Emacs Manual GNU Emacs Manual Sixteenth Edition, Updated for Emacs Version 22.1. Richard Stallman This is the Sixteenth edition of the GNU Emacs Manual, updated for Emacs version 22.1. Copyright c 1985, 1986, 1987, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with the Invariant Sections being \The GNU Manifesto," \Distribution" and \GNU GENERAL PUBLIC LICENSE," with the Front-Cover texts being \A GNU Manual," and with the Back-Cover Texts as in (a) below. A copy of the license is included in the section entitled \GNU Free Documentation License." (a) The FSF's Back-Cover Text is: \You have freedom to copy and modify this GNU Manual, like GNU software. Copies published by the Free Software Foundation raise funds for GNU development." Published by the Free Software Foundation 51 Franklin Street, Fifth Floor Boston, MA 02110-1301 USA ISBN 1-882114-86-8 Cover art by Etienne Suvasa. i Short Contents Preface ::::::::::::::::::::::::::::::::::::::::::::::::: 1 Distribution ::::::::::::::::::::::::::::::::::::::::::::: 2 Introduction ::::::::::::::::::::::::::::::::::::::::::::: 5 1 The Organization of the Screen :::::::::::::::::::::::::: 6 2 Characters, Keys and Commands ::::::::::::::::::::::: 11 3 Entering and Exiting Emacs ::::::::::::::::::::::::::: 15 4 Basic Editing
    [Show full text]
  • Absolute BSD—The Ultimate Guide to Freebsd Table of Contents Absolute BSD—The Ultimate Guide to Freebsd
    Absolute BSD—The Ultimate Guide to FreeBSD Table of Contents Absolute BSD—The Ultimate Guide to FreeBSD............................................................................1 Dedication..........................................................................................................................................3 Foreword............................................................................................................................................4 Introduction........................................................................................................................................5 What Is FreeBSD?...................................................................................................................5 How Did FreeBSD Get Here?..................................................................................................5 The BSD License: BSD Goes Public.......................................................................................6 The Birth of Modern FreeBSD.................................................................................................6 FreeBSD Development............................................................................................................7 Committers.........................................................................................................................7 Contributors........................................................................................................................8 Users..................................................................................................................................8
    [Show full text]
  • 1 What Is Gimp? 3 2 Default Short Cuts and Dynamic Keybinding 9
    GUM The Gimp User Manual version 1.0.0 Karin Kylander & Olof S Kylander legalities Legalities The Gimp user manual may be reproduced and distributed, subject to the fol- lowing conditions: Copyright © 1997 1998 by Karin Kylander Copyright © 1998 by Olof S Kylander E-mail: [email protected] (summer 98 [email protected]) The Gimp User Manual is an open document; you may reproduce it under the terms of the Graphic Documentation Project Copying Licence (aka GDPL) as published by Frozenriver. This document is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANT- ABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Graphic Documentation Project Copying License for more details. GRAPHIC DOCUMENTATION PROJECT COPYING LICENSE The following copyright license applies to all works by the Graphic Docu- mentation Project. Please read the license carefully---it is similar to the GNU General Public License, but there are several conditions in it that differ from what you may be used to. The Graphic Documentation Project manuals may be reproduced and distrib- uted in whole, subject to the following conditions: The Gimp User Manual Page i Legalities All Graphic Documentation Project manuals are copyrighted by their respective authors. THEY ARE NOT IN THE PUBLIC DOMAIN. • The copyright notice above and this permission notice must be preserved complete. • All work done under the Graphic Documentation Project Copying License must be available in source code for anyone who wants to obtain it. The source code for a work means the preferred form of the work for making modifications to it.
    [Show full text]
  • Evil Twin Attack Android Apk
    Evil twin attack android apk Continue Evil double attack on android (alk99) root requered @abderrahaman this attack is similar to the stream and linset, but in another plate form video tuto'gt; alk99 csploit iptables binary termux android webserver (php server ) open csploit garnt superuser to install the resolution of the core new and wait, until he has finished extracting the close application en termux and wait until he did the installation type on termux : pkg install tsu pkg install git exit open server for php (or any other android webserver support php) install the newest package to copy the default page (file index ...) or page you prefer from fake pages go to you interchannel storage www and go public past it here and go to the server for the start of the hotspot your mobile phone and on the server for php choose wlan0 192.168.43.1 click on the starter server go to your browser and bring now all working clone git clone CD clone-download-Alk-evil- twin tsu bash install.sh wait Until it finishes in the view now type: exit and open termux and type: (now the server has to be launched, and the client must be connected) tsu alk99 alk99-evil-twin-on-andoid-v1 Copyright (C) 2018 by abderra in this new wireless attack, I will walk you through the process of creating Hot Spot 2.0 Evil Twinman. This is potentially another vector attack that can be used with or without social engineering that a penetration tester or nefarious actor can use when performing a wireless pen test or trying to socially engineer the user.
    [Show full text]
  • Ttwin Version 3 User Guide
    User’s Guide Terminal Emulation for Windows P.O. Box 2197 Strawberry Hills NSW 2012 AUSTRALIA Phone: +61 2 8396 3000 Fax: +61 2 9318 1515 Email: [email protected] [email protected] Web site: http://www.ttwin.com Copyright Notice © Copyright Turbosoft All rights reserved. This manual is protected by copyright. No part of this manual may be reproduced in any form without written permission of the copyright owner. All efforts have been made to ensure the contents of this manual are correct. If any errors are detected, please inform Turbosoft. The contents of this manual are subject to change without notice. Turbosoft can assume no responsibility for errors in this manual or their consequence. The software described in this manual is supplied under a license agreement and may be used or copied only in accordance with the terms of that agreement. Licenses and Trademarks All Licenses, Copyright and Trademarks are the property of their respective owners. TTWIN User's Guide Version 3 About this Manual The TTWIN 3 User's Guide is a comprehensive guide to all the information you need to work easily and efficiently with Turbosoft's TTWIN 3 terminal emulation package. Organisation of this Manual The TTWIN 3 User's Guide is divided into 5 parts: Part One - Basic Concepts Chapter 1 Introduction. A brief description of the files supplied with the TTWIN 3 product and the system requirements. Chapter 2 Installation. The steps to follow when setting up TTWIN 3 on a local PC or on a network file server. This chapter also includes modifying and uninstalling TTWIN 3.
    [Show full text]
  • Maxcam Emu Software Orf
    Maxcam emu software orf Software Without Biss Support / Ohne Biss Support NOTED!! Important!! Wichtig!!! FOR Biss Use Software / Für Biss Version Max Cam Twin V2 Software Fortuna (EMU). Thema: Max Cam Twin V2 Software Fortuna (EMU) Nagra 2 Key Edit for TV Globo,Swisscom > Menu > Key Edit > insert with remote. We presents new EMU Software and some minor fixes for good "old" Max Cam Twin V1. Have Fun Software Without Biss Support / Ohne. Max Cam Twin V2 Software Fortuna (EMU). Thumbnail Nagra 2 Key Edit for TV Globo,Swisscom > Menu > Key Edit > insert with remote. Thema: Max Cam Twin V2 Software Fortuna (EMU) ORF1,ORF2,ORF Regional Channels, H * Panasonic DMR-BST/BCT. EMU Funktion im Menü on/off * BISS Key Eingabe über die Fernbedienung * Austria Sat und ORF ebenfalls inkludiert. Open Channels on 19,2. Surrender Software v for V2 or v for ULTRA flash> after this firmware> Settings in the menu and disable Cam check where. Guten Morgen, ich bin neuer Besitzer einer Maxcam Twin und habe mir von Emu bedeutet, das du ORF, Austriasat (nur SD), VH1, einige frz. Infos Max Cam Twin V2 Software Fortuna (Emu) ORF ICE card Irdeto Mode Sim reader, decryption problem in some other TV´s fixed. Software aufbau ist Maxcam v + Emu O*F und U***yM****a . This release constitutes the programs of ORF and Austria Sat SD. Infos EMU - Firmware Max Cam Twin V2/ Ultra Fortuna . ORF / Austria-Sat / MTV / TNT Sat funktionieren alle seit geraumer Zeit nicht. Software Without Biss Support / Ohne Biss Support NOTED!! Important!! Wichtig!!! FOR Biss Use Software / Für Biss Version MaxCam Twin HIER KAUFEN First software for the new Max Cam Twin V2 module enjoy it wants the Max [Arşiv] MaxCam Twin EMU Software Diğer Modüller.
    [Show full text]
  • TWIN: a Window System for ‘Sub-PDA’ Devices
    TWIN: A Window System for ‘Sub-PDA’ Devices Keith Packard HP Cambridge Research Laboratory [email protected] Abstract (200MHz, fixed point, 384KB on-chip RAM), 8MB of flash memory, an Agilent ADNS-2030 Optical mouse sensor, a Zigbee (802.15.4) With embedded systems gaining high resolu- wireless networking interface and an Epson tion displays and powerful CPUs, the desire for L2F50176T00 LCD screen (1.1”, 120 x 160 sophisticated graphical user interfaces can be color). At 200MHz, this processor is capable of realized in even the smallest of systems. While significant computation, but 384KB holds little the CPU power available for a given power data. budget has increased dramatically, these tiny systems remain severely memory constrained. In contrast, early graphical user interfaces for This unique environment presents interesting desktop platforms was more constrained by challenges in graphical system design and im- available CPU performance than by memory. plementation. To explore this particular space, Early workstations had at least a million pixels a new window system, TWIN, has been de- and a megabyte of physical memory but only veloped. Using ideas from modern window about 1 MIPS of processing power. Software systems in larger environments, TWIN offers in this environment was much more a matter overlapping translucent windows, anti-aliased of what could be made fast enough than what graphics and scalable fonts in a total memory would fit in memory. budget of 100KB. While the X window system[7] has been ported to reasonably small environments[2], a mini- Motivation mal combination of window system server, pro- tocol library and application toolkit consumes on the order of 4 to 5MB of memory, some ten Researchers at the HP Cambridge Research times more than is available in the target plat- Laboratory are building a collection of sub-PDA form.
    [Show full text]
  • Atheros Communications License
    Atheros Communications License Copyright (c) 2008, Atheros Communications, Inc. All rights reserved. Redistribution. Redistribution and use in binary form, without modification, are permitted provided that the following conditions are met: * Redistributions must reproduce the above copyright notice and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of Atheros Communications, Inc. nor the names of its suppliers may be used to endorse or promote products derived from this software without specific prior written permission. * No reverse engineering, decompilation, or disassembly of this software is permitted. Limited patent license. Atheros Communications, Inc. grants a world-wide, royalty-free, non-exclusive license under patents it now or hereafter owns or controls to make, have made, use, import, offer to sell and sell ("Utilize") this software, but solely to the extent that any such patent is necessary to Utilize the software alone, or in combination with an operating system licensed under an approved Open Source license as listed by the Open Source Initiative at http://opensource.org/licenses. The patent license shall not apply to any other combinations which include this software. No hardware per se is licensed hereunder. DISCLAIMER. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER I N CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    [Show full text]
  • Free and Open Source Software
    Free and open source software Copyleft ·Events and Awards ·Free software ·Free Software Definition ·Gratis versus General Libre ·List of free and open source software packages ·Open-source software Operating system AROS ·BSD ·Darwin ·FreeDOS ·GNU ·Haiku ·Inferno ·Linux ·Mach ·MINIX ·OpenSolaris ·Sym families bian ·Plan 9 ·ReactOS Eclipse ·Free Development Pascal ·GCC ·Java ·LLVM ·Lua ·NetBeans ·Open64 ·Perl ·PHP ·Python ·ROSE ·Ruby ·Tcl History GNU ·Haiku ·Linux ·Mozilla (Application Suite ·Firefox ·Thunderbird ) Apache Software Foundation ·Blender Foundation ·Eclipse Foundation ·freedesktop.org ·Free Software Foundation (Europe ·India ·Latin America ) ·FSMI ·GNOME Foundation ·GNU Project ·Google Code ·KDE e.V. ·Linux Organizations Foundation ·Mozilla Foundation ·Open Source Geospatial Foundation ·Open Source Initiative ·SourceForge ·Symbian Foundation ·Xiph.Org Foundation ·XMPP Standards Foundation ·X.Org Foundation Apache ·Artistic ·BSD ·GNU GPL ·GNU LGPL ·ISC ·MIT ·MPL ·Ms-PL/RL ·zlib ·FSF approved Licences licenses License standards Open Source Definition ·The Free Software Definition ·Debian Free Software Guidelines Binary blob ·Digital rights management ·Graphics hardware compatibility ·License proliferation ·Mozilla software rebranding ·Proprietary software ·SCO-Linux Challenges controversies ·Security ·Software patents ·Hardware restrictions ·Trusted Computing ·Viral license Alternative terms ·Community ·Linux distribution ·Forking ·Movement ·Microsoft Open Other topics Specification Promise ·Revolution OS ·Comparison with closed
    [Show full text]
  • Linux Journal | July 2017 | Issue
    ™ Patch Managment Best Practices A Guide to Using Plex in Your Home Network JULY 2017 | ISSUE 279 Since 1994: The Original Magazine of the Linux Community http://www.linuxjournal.com BUILD YOUR OWN CLUSTER EOF: Linux for Everyone— All 7.5 Billion of Us PLUS: WATCH: Learn Golang ISSUE OVERVIEW and Back Up V GitHub Repositories LJ279-July2017.indd 1 6/21/17 4:31 PM NEW! Managing Harnessing Container the Power Security and of the Cloud Practical books Compliance with SUSE in Docker Author: Author: Petros Koutoupis for the most technical Petros Koutoupis Sponsor: Sponsor: SUSE people on the planet. Twistlock DevOps for An the Rest of Us Architect’s Author: Guide: John S. Tonello Linux for GEEK GUIDES Sponsor: Enterprise IT Puppet Author: Sol Lederman Sponsor: SUSE Memory: Past, Cloud-Scale Present and Automation Future—and with Puppet the Tools to Author: Optimize It John S. Tonello Author: Sponsor: Petros Koutoupis Puppet Sponsor: Intel Download books for free with a Why Innovative Tame the simple one-time registration. App Developers Docker Life Love High-Speed Cycle with http://geekguide.linuxjournal.com OSDBMS SUSE Author: Author: Ted Schmidt John S. Tonello Sponsor: Sponsor: IBM SUSE LJ279-July2017.indd 2 6/21/17 4:31 PM NEW! Managing Harnessing Container the Power Security and of the Cloud Practical books Compliance with SUSE in Docker Author: Author: Petros Koutoupis for the most technical Petros Koutoupis Sponsor: Sponsor: SUSE people on the planet. Twistlock DevOps for An the Rest of Us Architect’s Author: Guide: John S. Tonello Linux for GEEK GUIDES Sponsor: Enterprise IT Puppet Author: Sol Lederman Sponsor: SUSE Memory: Past, Cloud-Scale Present and Automation Future—and with Puppet the Tools to Author: Optimize It John S.
    [Show full text]
  • Appendix C Graphics and Computing Gpus
    C APPENDIX Graphics and Computing GPUs John Nickolls Imagination is more Director of Architecture important than NVIDIA knowledge. David Kirk Chief Scientist Albert Einstein On Science, 1930s NVIDIA C.1 Introduction C-3 C.2 GPU System Architectures C-7 C.3 Programming GPUs C-12 C.4 Multithreaded Multiprocessor Architecture C-24 C.5 Parallel Memory System C-36 C.6 Floating-point Arithmetic C-41 C.7 Real Stuff: The NVIDIA GeForce 8800 C-45 C.8 Real Stuff: Mapping Applications to GPUs C-54 C.9 Fallacies and Pitfalls C-70 C.10 Concluding Remarks C-74 C.11 Historical Perspective and Further Reading C-75 C.1 Introduction Th is appendix focuses on the GPU—the ubiquitous graphics processing unit graphics processing in every PC, laptop, desktop computer, and workstation. In its most basic form, unit (GPU) A processor the GPU generates 2D and 3D graphics, images, and video that enable window- optimized for 2D and 3D based operating systems, graphical user interfaces, video games, visual imaging graphics, video, visual computing, and display. applications, and video. Th e modern GPU that we describe here is a highly parallel, highly multithreaded multiprocessor optimized for visual computing. To provide visual computing real-time visual interaction with computed objects via graphics, images, and video, A mix of graphics the GPU has a unifi ed graphics and computing architecture that serves as both a processing and computing programmable graphics processor and a scalable parallel computing platform. PCs that lets you visually interact with computed and game consoles combine a GPU with a CPU to form heterogeneous systems.
    [Show full text]
  • Mellanox Switch Management System (MLNX OS) Software: End-User Agreement
    MELLANOX SWITCH MANAGEMENT SYSTEM END USER LICENSE AGREEMENT Mellanox Switch Management System (MLNX_OS) Software: End-User Agreement PLEASE READ THE FOLLOWING TERMS AND CONDITIONS OF THIS MELLANOX END USER LICENSE AGREEMENT (THIS “AGREEMENT”) BEFORE INSTALLING OR USING THE MELLANOX SOFTWARE. THE MELLANOX SOFTWARE, WHICH INCLUDES ALL COMPUTER SOFTWARE IN BINARY FORM THAT IS DELIVERED TO LICENSEE, GENERALLY DESCRIBED AS THE MELLANOX SWITCH MANAGEMENT SYSTEM (MLNX_OS) SOFTWARE, AND ALL INTELLECTUAL PROPERTY RIGHTS THEREIN OR THERETO AND ANY ASSOCIATED MEDIA AND PRINTED MATERIALS, AND ANY “ONLINE” OR ELECTRONIC DOCUMENTATION, IS REFERRED TO HEREIN AS THE “SOFTWARE”. INSTALLATION OR USAGE OF THE SOFTWARE INDICATES YOUR ACCEPTANCE OF THE TERMS OF THIS AGREEMENT, AND CREATES A LEGAL AND BINDING AGREEMENT BETWEEN YOU (EITHER AN INDIVIDUAL OR AN ENTITY) (“YOU” OR “LICENSEE”) AND MELLANOX TECHNOLOGIES LTD. AND ITS AFFILIATES (“MELLANOX”). IF YOU DO NOT AGREE WITH THE TERMS AND CONDITIONS OF THIS AGREEMENT, YOU SHALL NOT USE OR COPY THIS SOFTWARE PRODUCT AND YOU MUST PROMPTLY RETURN THIS PACKAGE TO MELLANOX. 1. General Each copy of the Software is intended for use only in conjunction with Mellanox’s managed switch products (“Mellanox Products”) and is subject to the terms of this Agreement. 2. Grant of License Subject to the terms and conditions of this Agreement, Mellanox grants you a personal, non-exclusive, non- transferable license to use the Software in binary form for your internal business purposes solely in connection with Mellanox Products and not for further distribution. 2.1. Archive. You may use software back-up utilities to make one back-up copy of the Software.
    [Show full text]