E Pluribus Unix?

Total Page:16

File Type:pdf, Size:1020Kb

E Pluribus Unix? regardless of the video mode. I still can only configuration difference besides the that LA'" wa.~ costing me. It was more shrink their windows and scroll around, CPU and operating system was that the than jU.'1 lht' l2HK of memory -it's the but I can't see the whole thing. Mac was not on our network. This should use I could have been making of that have tipped me off to something, but the 128K. Graph Plus will put whatever it can The Mac II and MultiFinder computers are so dissimilar that I chalked in memory. When the memory runs out, But I was becoming a bit flustered it up to differences in user interfaces or it goes to disk for that storage. When I with Graph Plus by this point. (I really CPU capahilities. had only ~'iK free, I was hitting the disk wasn't mad at Graph Plus, I just thought I I had ohviously underestimated the with every operation. With 220K free, I was -kind of like blaming the map when power of the Macintosh for graphical ap­ could do most of the work in memory. you make a wrong turn. I'll get to that in a plications. While I might never recom­ Whilc Graph Plus on the 386 is still not little while.) Even with 4 Mbytes of mem­ mend one to an engineer, for my line of quite as lightning fast as Cricket Graph ory, simple operations like drawing a leg­ work it is actually a very advanced com­ on the Mac, with enough memory it is no end on the screen were still taking a long puter. We have a large monitor on it, so I longer the slow, lumbering beast I had time. When I needed to print eight can see several applications at a time. But been putting up with. graphs that I'd already created, it took me most of my work has to do with 386's and Unfortunately, in order to take advan­ all morning. their applications, so I really can't trans­ tage of this extra memory, I have to re­ One day my managing editor passed fer to the Mac. When DOS operating sys­ boot the computer without the LAN. And along the pronouncement from our pro­ tems can use mega pixel screens for regu­ when I want to print my file, I have to duction department that Cricket Graph lar use, perhaps OS/2 PM will offer me reboot with the LAN. All this rebooting files from a Macintosh would have to be what the Mac can. takes far too long, but the LAN is what supplied for all graphs due to problems makes the printing take 5 to 7 minutes. with importing Graph Plus files. I didn't The Network I am stuck in this catch-22, which is not want to change the way I did business I've hinted several times that there's making me fond of the 3Com network. I again, and I especially didn't want to go another problem with my configuration just don't want to lose the time. Perhaps to a Mac. I know the difference between that took me a while to discover. In fact, I'll dive into exactly how many of those preemptive schedulers and the scheduler I've hit up against one last bottleneck device drivers I really need to do my for MultiFinder, and I laughed at the idea that's both big and, at the moment, insur­ usual work. that MultiFinder was a multitasking oper­ mountable. It's also the reason lowe an ating system. apology to Micrografix and Microsoft for What I'd Really Like To my chagrin, however, Cricket Graph thinking badly of their software. So what's next? Well, I've looked at on the Mac was lightning fast! The long­ In a recent review of the 33-MHz Ze­ VM/386, which I'm told can have one est part of the process was importing my nith computer, I tried to get a feel for how screen running DOS with the LAN in­ data files from the Pc. I had to print my day would improve if I swapped my stalled and one screen running DOS with­ Quattro files to a disk file, transfer them 20-MHz for a 33-MHz 386 AT. (Unfortu­ out. But VM/386 supports multiple to a Mac disk, read those into the Cricket nately, I wasn't allowed to make the swap screens, not multiple windows on one Graph worksheet, move the titles to the permanent, but I did get pretty high on screen, so I'm not crazy about the idea. appropriate places, and reformat the col­ the power.) In the course of experiment­ I'm told it's very robust, but I want the umns. This took about half an hour. But ing, I discovered that Graph Plus on my windows. drawing graphs from the data was nearly computer was being cheated. Graph Plus SCO is about to release Open Desktop instantaneous. Compare this to Graph Plus, was getting over 220 Kbytes of memory for its 386 Unix. That will offer a GUI which imported Quattro files directly but on the Zenith with nearly the same con­ called Motif and will run multiple DOS could take 3 minutes to draw each graph. figuration as my computer. But on my windows. In addition, I'm told that Printing was even more impressive. On computer, Graph Plus was getting only mega pixel screens and larger will be eas­ the Mac, I could get control and start the 75K. The configuration difference? My ily supported. If Open Desktop gives me next graph within 10 seconds. Under computer was linked with the 3Com LAN access to my LAN, it may just be the Graph Plus, it was more like 5 minutes. to give me access to printers and a file answer to all my needs._ What a difference on comparably config­ server. ured machines (4 Mbytes of RAM). The I finally paid attention to how much William L. Rinko-Gay is a MIPS technical editor. EPluribus Unix? lion computers across the country, and the source code for the operating system Will OSF and Unix Unix variants run on nearly every com­ was made available to universities at a puter in existence, from lowly IBM PC low cost. International fix Unix or XTs to Cray supercomputers. But ever since 197 9, when the Univer­ Much of Unix's popularity, in fact, has sity of California at Berkeley took Unix fracture it? been attributed to the ease with which it Version 7 release 32V for the DEC VAX is ported from one hardware base to an­ and modified the operating system to use other. This is possible because only a tiny paging for virtual memory instead of swap­ ping, there have been two major versions BY SIMSON L. GARFINKEL portion of the operating system is written in assembly language -the native lan­ of Unix. Berkeley'S hackers set about al­ guage specific to each computer system. tering and improving Version 7, adding t all started at Bell Labs in 1969 on a The rest of Unix is written in C -the such features as job control, a faster file Digital Equipment Corp. PDP-7, a com­ high-level language whose popularity has system, and TCPI IP networking support. I puter few people have ever heard of, grown hand-in-hand with the growth of In the meantime, AT&T released Unix let alone used. Today the Unix operating the operating system. Unix's popularity System III and System V. system is running on more than 1.2 mil- has also been attributed to the fact Ihat Meanwhile, Microsoft had been ship­ 98 .lfll"i ping a ver..ion o( t 'nL'C l';llk'tl Xenlx. (lng!­ had been haVing with AT&T. nally basc..'d on AT&T S)'lI1Cm III in II)li(J. Many observers and "We, along with another number of Microsoft also followed the AT&T addi­ participants in the major computer companies, felt that to tions to Unix and merged them into XenLx. respond to market demand, we needed, By the beginning of 1987. there were field believe that at least for system software, a single inde­ three major Unix variants -and more than OSF may simply be a pendent software company to provide 225 flavors, according to one estimate - technology in a real open manner that is running throughout the world. ploy to introduce accessible to everybody," says Donald AT&T is now in the process of bringing confusion into the McInnis, DEC's vice president of engi­ together those three principal Unix efforts to create a neering systems. strains into one newall-encompassing OSF is supposed to become a self­ operating system that will be upwardly single Unix standard. sufficient software house, employing up­ compatible with each of its roots, says wards of 400 -it hired 75 people in just Dick Muldoon, a spokesman for AT&T its first three months of operation. Its pro­ Data Systems. Muldoon calls this the "re­ been rewritten to provide several new ducts are to be sold to its members, who unification of Unix." features such as real-time support. Being will in turn sell them to end users, each When people buy an operating system brand-new, McKusick says, the sched­ sale generating a royalty payment to OSF. labeled Unix, Muldoon says, "We want uler is "untested." Many observers and participants in the [them] ... to know that it is going to have field, however, believe that OSF may sim­ the kind of continuity that has come to be The Open Software Foundation ply be a ploy to introduce confusion into the hallmark of the Unix system." People For a group of major vendors of work­ the efforts to create a single Unix stan­ have to be assured, he says, that the stations, the growing acceptance of Unix dard.
Recommended publications
  • Considerations for Use of Microcomputers in Developing Countrystatistical Offices
    Considerations for Use of Microcomputers in Developing CountryStatistical Offices Final Report Prepared by International Statistical Programs Center Bureau of the Census U.S. Department of Commerce Funded by Office of the Science Advisor (c Agency for International Development issued October 1983 IV U.S. Department of Commerce Malcolm Baldrige, Secretary Clarence J. Brown, Deputy Secretary BUREAU OF THE CENSUS C.L. Kincannon, Deputy Director ACKNOWLEDGE ME NT S This study was conducted by the International Statistical Programs Center (ISPC) of the U.S. Bureau of the Census under Participating Agency Services Agreement (PASA) #STB 5543-P-CA-1100-O0, "Strengthening Scientific and Technological Capacity: Low Cost Microcomputer Technology," with the U.S. Agency for International Development (AID). Funding fcr this project was provided as a research grant from the Office of the Science Advisor of AID. The views and opinions expressed in this report, however, are those of the authors, and do not necessarily reflect those of the sponsor. Project implementation was performed under general management of Robert 0. Bartram, Assistant Director for International Programs, and Karl K. Kindel, Chief ISPC. Winston Toby Riley III provided input as an independent consultant. Study activities and report preparation were accomplished by: Robert R. Bair -- Principal Investigator Barbara N. Diskin -- Project Leader/Principal Author Lawrence I. Iskow -- Author William K. Stuart -- Author Rodney E. Butler -- Clerical Assistant Jerry W. Richards -- Clerical Assistant ISPC would like to acknowledge the many microcomputer vendors, software developers, users, the United Nations Statistical Office, and AID staff and contractors that contributed to the knowledge and experiences of the study team.
    [Show full text]
  • Dennis Brylow in Theory, Simulating an Operating System Is the Same As the Real Thing. in Practice, It Is N
    Experimental Operating System Lab on a Dime Dennis Brylow Department of Mathematics, Statistics and Computer Science In theory, simulating an Operating System is the same as the real thing. In practice, it is not. Setting up specialized Operating System Laboratory hardware usually requires more time, money, and space than most schools can afford. Marquette©s Systems Lab has concentrated specifically on developing a scalable, duplicable design for an Experimental Operating System Laboratory environment with minimal cost and very low space requirements. Our Experimental Operating Systems Laboratory serves as a target platform in undergraduate courses on Hardware Systems (COSC 065), Operating Systems (COSC 125 and COEN 183), Embedded Operating Systems (COSC 195) and Compiler Construction (COSC 170). Coming Soon: Additional modules for coursework in Embedded and Realtime Systems, Networking protocol stacks, Wireless Networking, and Internetworking . http://www.mscs.mu.edu/~brylow/xinu/ XINU in the 21st Century Purdue University©s XINU Operating System has been successfully deployed in classrooms, research labs, and commercial products for more than 20 years. Marquette University presents a new reimplementation of XINU, targeted to modern RISC architectures, written in ANSI-compliant C, and particularly well-suited to embedded platforms with scarce resources. Special Purpose Serial Consoles XINU Backends Serial Annex (optional) Private Network Marquette©s Systems Lab General Purpose runs XINU on inexpensive Laboratory Workstations wireless routers containing XINU the Embedded MIPS32 Server processor. Production Network XINU Backends XINU Server XINU Frontends Backend targets upload student kernel General purpose server with multiple General purpose computer laboratory over private network on boot, run O/S network interfaces manages a private workstations can compile the XINU directly.
    [Show full text]
  • Virtual Memory for Microcomputers (MMU Comparison)
    Virtual Memory for Microcomputers Four New Memory-Management Chips Pave the Way Stephen Schmitt 2890 Sandhill Rd. Mason, MI 48854 Not too long ago, a microcomputer one answer. Virtual memory is an NS16082 is another interesting MMU system with 32K bytes of memory automatic system for controlling very that merits analysis.] Finally, I will was considered a luxury. Because big memories. But special hardware discuss some implications and ap­ memory was very expensive, you functions are essential for building plications of virtual memory in took great pains to squeeze, pack, such a system. And now, single-chip microcomputer systems. and cram programs into the small memory-management units (MMUs) amount of memory that you could af­ have been developed to provide these Program Folding ford. Today, however, you can buy capabilities for microcomputers. Almost every computer system has 256K bytes for less than $500. And In the first part of this article, I will several types of memory devices that new 16- and 32-bit microcomputers introduce some of the basic concepts differ in speed and storage capacity. feature directly addressable storage A fundamental tenet of computer spaces that are 100 to 10,000 times technology states that memory price larger than those found in 8-bit archi­ Virtual memory is a is directly related to its speed. Storage tectures. Like the pauper who just powerful concept. It hierarchies thus usually represent an became rich, how do you handle this allows you to consider effective compromise between a vast wealth? large, slow, inexpensive memory and Another drastic change in the main memory to be a small, expensive one with high ac­ microcomputer world deals with soft­ very large-much larger cess speed.
    [Show full text]
  • Using TOST in Teaching Operating Systems and Concurrent Programming Concepts
    Advances in Science, Technology and Engineering Systems Journal Vol. 5, No. 6, 96-107 (2020) ASTESJ www.astesj.com ISSN: 2415-6698 Special Issue on Multidisciplinary Innovation in Engineering Science & Technology Using TOST in Teaching Operating Systems and Concurrent Programming Concepts Tzanko Golemanov*, Emilia Golemanova Department of Computer Systems and Technologies, University of Ruse, Ruse, 7020, Bulgaria A R T I C L E I N F O A B S T R A C T Article history: The paper is aimed as a concise and relatively self-contained description of the educational Received: 30 July, 2020 environment TOST, used in teaching and learning Operating Systems basics such as Accepted: 15 October, 2020 Processes, Multiprogramming, Timesharing, Scheduling strategies, and Memory Online: 08 November, 2020 management. TOST also aids education in some important IT concepts such as Deadlock, Mutual exclusion, and Concurrent processes synchronization. The presented integrated Keywords: environment allows the students to develop and run programs in two simple programming Operating Systems languages, and at the same time, the data in the main system tables can be monitored. The Concurrent Programming paper consists of a description of TOST system, the features of the built-in programming Teaching Tools languages, and demonstrations of teaching the basic Operating Systems principles. In addition, some of the well-known concurrent processing problems are solved to illustrate TOST usage in parallel programming teaching. 1. Introduction • Visual OS simulators This paper is an extension of work originally presented in 29th The systems from the first group (MINIX [2], Nachos [3], Xinu Annual Conference of the European Association for Education in [4], Pintos [5], GeekOS [6]) run on real hardware and are too Electrical and Information Engineering (EAEEIE) [1].
    [Show full text]
  • Porting the Embedded Xinu Operating System to the Raspberry Pi Eric Biggers Macalester College, [email protected]
    Macalester College DigitalCommons@Macalester College Mathematics, Statistics, and Computer Science Mathematics, Statistics, and Computer Science Honors Projects 5-2014 Porting the Embedded Xinu Operating System to the Raspberry Pi Eric Biggers Macalester College, [email protected] Follow this and additional works at: https://digitalcommons.macalester.edu/mathcs_honors Part of the OS and Networks Commons, Software Engineering Commons, and the Systems Architecture Commons Recommended Citation Biggers, Eric, "Porting the Embedded Xinu Operating System to the Raspberry Pi" (2014). Mathematics, Statistics, and Computer Science Honors Projects. 32. https://digitalcommons.macalester.edu/mathcs_honors/32 This Honors Project - Open Access is brought to you for free and open access by the Mathematics, Statistics, and Computer Science at DigitalCommons@Macalester College. It has been accepted for inclusion in Mathematics, Statistics, and Computer Science Honors Projects by an authorized administrator of DigitalCommons@Macalester College. For more information, please contact [email protected]. MACALESTER COLLEGE HONORS PAPER IN COMPUTER SCIENCE Porting the Embedded Xinu Operating System to the Raspberry Pi Author: Advisor: Eric Biggers Shilad Sen May 5, 2014 Abstract This thesis presents a port of a lightweight instructional operating system called Em- bedded Xinu to the Raspberry Pi. The Raspberry Pi, an inexpensive credit-card-sized computer, has attracted a large community of hobbyists, researchers, and educators since its release in 2012. However, the system-level software running on the Raspberry Pi has been restricted to two ends of a spectrum: complex modern operating systems such as Linux at one end, and very simple hobbyist operating systems or simple “bare-metal” programs at the other end.
    [Show full text]
  • Real-Time Transport of Internet Telephony Service Utilizing Embedded Resource-Constrained Systems Kyle Persohn Marquette University
    Marquette University e-Publications@Marquette Master's Theses (2009 -) Dissertations, Theses, and Professional Projects Real-Time Transport of Internet Telephony Service Utilizing Embedded Resource-Constrained Systems Kyle Persohn Marquette University Recommended Citation Persohn, Kyle, "Real-Time Transport of Internet Telephony Service Utilizing Embedded Resource-Constrained Systems" (2012). Master's Theses (2009 -). Paper 162. http://epublications.marquette.edu/theses_open/162 REAL-TIME TRANSPORT OF INTERNET TELEPHONY SERVICE UTILIZING EMBEDDED RESOURCE-CONSTRAINED SYSTEMS by Kyle Persohn A Thesis Submitted to the Faculty of the Graduate School, Marquette University, in Partial Fulfillment of the Requirements for the Degree of Master of Science Milwaukee, Wisconsin August 2012 ABSTRACT REAL-TIME TRANSPORT OF INTERNET TELEPHONY SERVICE UTILIZING EMBEDDED RESOURCE-CONSTRAINED SYSTEMS Kyle Persohn Marquette University, 2012 This thesis presents a real-time framework for resource-constrained devices that improves the listening quality of Voice over Internet Protocol calls transported over congested networks. Many VoIP standards and implementations exist, but gaps in the design space encourage further exploration that previous work fails to address. We describe an experimental hardware platform that expands upon a previous design to accommodate technical research and educational needs. Our framework, based on the Real-Time Transport Protocol, integrates closely with existing software constructs available in the Embedded Xinu operating system. We offer features derived from RTP by means of a kernel device that alleviates an application from directly interacting with the underlying protocol. An example application based on Xinu's RTP implementation demonstrates measurable robustness to packet loss and delay variation (jitter)|adverse conditions affecting networks used for VoIP, such as the Internet.
    [Show full text]
  • Altogether Volume 3 Issue 4 April 1989
    ALTOCETHER m 00 ALTOCETHER m ~ ALTOCETHER ~ ALTOCETHER Q. « o. ALTOCETHER • Here I sit with (3) 190 meg hard disks in my 2086 ALTOCETHER o:::t and a 60 meg tape drive. This is driving me crazy with ALTOCETHER Q) all the tapes I'm using. Is there an alternative to the ::J 60 meg tape? Will the 150 meg tape drive for a VI ALTOCETHER VI 2000 work? ALTOCETHER • A. N') ALTOCETHER No. The 150 meg tape drive for a Series 2000 Q) ALTOCETHER will not work. The 150 meg tape uses the SCSI inter­ E face and this is not available for use on a 2086 (or ALTOCETHER ::J 1086, 3086, or 3068 for that matter>. A 125 meg 0 ALTOCETHER > tape drive is available (just recently) that will work. ALTOCETHER It will work on all models currently using the 60 meg tape, including the 686T and 986T, which is ALTOCETHER nice if you have multiple hard drives or a 190 meg ALTOCETHER hard disk. ALTOCETHER ASK DR. ALBERT ALTOCETHER o. ALTOCETHER o. I have need of a lot of storage on my 1086. I don't I have a 70 meg hard disk in my Series 500 and I want to upgrade to a 2000 to get the 380 meg hard ALTOCETHER want to add another 70 meg hard disk. Where disk because I don't need the horsepower. Can I ALTOCETHER do I put it? put larger than a 170 meg hard disk? ALTOCETHER A. A. ALTOCETHER You don't have space for another fUll height Yes.
    [Show full text]
  • Proving Safety Properties of Software Kang Gui Iowa State University
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Digital Repository @ Iowa State University Iowa State University Capstones, Theses and Graduate Theses and Dissertations Dissertations 2012 Proving safety properties of software Kang Gui Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/etd Part of the Computer Engineering Commons, and the Computer Sciences Commons Recommended Citation Gui, Kang, "Proving safety properties of software" (2012). Graduate Theses and Dissertations. 12335. https://lib.dr.iastate.edu/etd/12335 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Graduate Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Proving safety properties of software by Kang Gui A dissertation submitted to the graduate faculty in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Major: Computer Engineering Program of Study Committee: Suraj C. Kothari, Major Professor Srinivas Aluru Tien Nguyen Manimaran Govindarasu Samik Basu Iowa State University Ames, Iowa 2012 Copyright c Kang Gui, 2012. All rights reserved. ii DEDICATION To my parents Yousheng Gui and Jianping Chang iii TABLE OF CONTENTS LIST OF TABLES . vi LIST OF FIGURES . vii ACKNOWLEDGEMENTS . ix ABSTRACT . x CHAPTER 1. OVERVIEW . 1 1.1 Dissertation Outline . .3 CHAPTER 2. RELATED WORKS . 5 2.1 Finding Defects of Large Source Code . .5 2.2 Graph Based Program Analysis .
    [Show full text]
  • CIS 415 Operating Systems Course Topics Course Goals Course
    Course Topics • The role of OS as resource manager; as Welcome to CIS 415 interface between user/pgms and underlying Operating Systems hardware • Emphasis on principles, algorithms, Winter 2006 mechanisms Instructor: Ginnie Lo • Unix/Linux/Windows case study GTF: Dayi Zhou Website: http://www.cs.uoregon.edu/classes/cis415 Course Goals Course Structure • Cover what every CIS graduate should know • Lecture: Mon. and Wed. 2-3:20 about OS - fundamentals Focused lectures, Q/A, exercises, drama, • Appreciation of the astounding complexity of the OS - what it does, how it does it food, 2 midterm exams • Hone your problem solving skills, performance analysis, algorithm development • Discussion Sections: Quizzes, practice • Enable you to apply what you learn to more complex and future OS problems, solutions, programming • Stimulate your interest in learning more about OS assignments Course Workload Teaching Philosophy • Homework/quizzes - 20% • Maximize your opportunity to perform at individual and group problems your best no late assignments, drop lowest grade h, q • Group learning • Programming assignments - 20% • Learning is enjoyable one individual, one group • High expectations of you as a student • Two Midterms - 15 % each, total 30% • High expectations of me as teacher • Final - 30% • Feeding you (a great motivator) 1 Course Materials And now the first food item …. • Operating System Concepts, 7th Edition by Silbershatz, Galvin, and Gagne (6th edition is OK, get reading list) ß Online lecture slides from the textbook (ch#.pdf) ß My own online lecture slides (topic.pdf) ß Handouts: in class worksheets and readings Why an onion??? OS Layered Structure Layered Approach Access to OS Services • The operating system is divided into a •Process Management number of layers (levels), each built on top •Memory Management of lower layers.
    [Show full text]
  • A Graph-Theoretic Method to Verifying Source and Binary Control Flow Equivalence
    Iowa State University Capstones, Theses and Graduate Theses and Dissertations Dissertations 2021 Trust, transforms, and control flow: A graph-theoretic method to verifying source and binary control flow equivalence Ryan Christopher Goluch Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/etd Recommended Citation Goluch, Ryan Christopher, "Trust, transforms, and control flow: A graph-theoretic method to verifying source and binary control flow equivalence" (2021). Graduate Theses and Dissertations. 18498. https://lib.dr.iastate.edu/etd/18498 This Thesis is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Graduate Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Trust, transforms, and control flow: A graph-theoretic method to verifying source and binary control flow equivalence by Ryan Christopher Goluch A thesis submitted to the graduate faculty in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Major: Computer Engineering (Secure and Reliable Computing) Program of Study Committee: Suresh Kothari, Major Professor Samik Basu Akhilesh Tyagi The student author, whose presentation of the scholarship herein was approved by the program of study committee, is solely responsible for the content of this thesis. The Graduate College will ensure this thesis is globally accessible and will not permit alterations after a degree is conferred. Iowa State University Ames, Iowa 2021 Copyright © Ryan Christopher Goluch, 2021. All rights reserved. ii DEDICATION I would like to dedicate this work to my family, friends, colleagues, and mentors.
    [Show full text]
  • Jargon File, Version 4.0.0, 24 Jul 1996
    JARGON FILE, VERSION 4.0.0, 24 JUL 1996 This is the Jargon File, a comprehensive compendium of hacker slang illuminating many aspects of hackish tradition, folklore, and humor. This document (the Jargon File) is in the public domain, to be freely used, shared, and modified. There are (by intention) no legal restraints on what you can do with it, but there are traditions about its proper use to which many hackers are quite strongly attached. Please extend the courtesy of proper citation when you quote the File, ideally with a version number, as it will change and grow over time. (Examples of appropriate citation form: "Jargon File 4.0.0" or "The on-line hacker Jargon File, version 4.0.0, 24 JUL 1996".) The Jargon File is a common heritage of the hacker culture. Over the years a number of individuals have volunteered considerable time to maintaining the File and been recognized by the net at large as editors of it. Editorial responsibilities include: to collate contributions and suggestions from others; to seek out corroborating information; to cross-reference related entries; to keep the file in a consistent format; and to announce and distribute updated versions periodically. Current volunteer editors include: Eric Raymond [email protected] Although there is no requirement that you do so, it is considered good form to check with an editor before quoting the File in a published work or commercial product. We may have additional information that would be helpful to you and can assist you in framing your quote to reflect not only the letter of the File but its spirit as well.
    [Show full text]
  • Embedded Xinu Documentation Release Master
    Embedded Xinu Documentation Release master Douglas Comer, Dennis Brylow, and others March 03, 2015 Contents 1 Introduction 1 1.1 Getting started..............................................1 1.2 Teaching with Embedded Xinu.....................................1 1.3 Supported platforms...........................................2 1.4 The original Xinu............................................2 2 Getting started with Embedded Xinu3 2.1 Downloading the source code......................................3 2.2 Choosing a platform...........................................4 2.3 Setting up a cross-compiler.......................................4 2.4 Compiling Embedded Xinu.......................................6 2.5 Next steps................................................7 2.6 Other resources..............................................8 3 Components and Features (platform independent)9 3.1 Preemptive multitasking.........................................9 3.2 Shell................................................... 10 3.3 TTY driver................................................ 14 3.4 Memory management.......................................... 15 3.5 Message passing............................................. 17 3.6 Mailboxes................................................ 17 3.7 Standard C Library............................................ 18 3.8 Networking................................................ 19 3.9 USB................................................... 31 3.10 USB keyboard driver..........................................
    [Show full text]