Anatomy of an Athena Workstation
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Building a Reliable Storage Stack
Building a Reliable Storage Stack Ph.D. Thesis David Cornelis van Moolenbroek Vrije Universiteit Amsterdam, 2016 This work was supported by the European Research Council Advanced Grant 227874. This work was carried out in the ASCI graduate school. ASCI dissertation series number 355. Copyright © 2016 by David Cornelis van Moolenbroek. ISBN 978-94-028-0240-5 Cover design by Eva Dienske. Printed by Ipskamp Printing. VRIJE UNIVERSITEIT Building a Reliable Storage Stack ACADEMISCH PROEFSCHRIFT ter verkrijging van de graad Doctor aan de Vrije Universiteit Amsterdam, op gezag van de rector magnificus prof.dr. V. Subramaniam, in het openbaar te verdedigen ten overstaan van de promotiecommissie van de Faculteit der Exacte Wetenschappen op maandag 12 september 2016 om 11.45 uur in de aula van de universiteit, De Boelelaan 1105 door David Cornelis van Moolenbroek geboren te Amsterdam promotor: prof.dr. A.S. Tanenbaum To my parents Acknowledgments This book marks the end of both a professional and a personal journey–one that has been long but rewarding. There are several people whom I would like to thank for accompanying and helping me along the way. First and foremost, I would like to thank my promotor, Andy Tanenbaum. While I was finishing up my master project under his supervision, he casually asked me “Would you like to be my Ph.D student?” during one of our meetings. I did not have to think long about the answer. Right from the start, he warned me that I would now have to conduct original research myself; only much later did I understand the full weight of this statement. -
Graduationl Speakers
Graduationl speakers ~~~~~~~~*L-- --- I - I -· P 8-·1111~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ stress public service By Andrew L. Fish san P. Thomas, MIT's Lutheran MIT President Paul E. Gray chaplain, who delivered the inlvo- '54 told graduating students that cation. "Grant that we may use their education is "more than a the privilege of this MIT educa- meal ticket" and should be used tion and degree wisely - not as to serve "the public interest and an entitlement to power or re- the common good." His remarks gard, but as a means to serve," were made at MIT's 122nd com- Thomas said. "May the technol- mencement on May 27. A total ogy that we use and develop be of 1733 students received 1899 humane, and the world we create degrees at the ceremony, which with it one in which people can was held in Killian Court under live more fully human lives rather sunny skies, than less, a world where clean air The importance of public ser- and water, adequate food and vice was also emphasized by Su- shelter, and freedom from fear and want are commonplace rath- Prof. IVMurman er than exceptional." named to Proj. Text of CGray's commencement address. Page 2. Athena post In his commencement address, By Irene Kuo baseball's National League Presi- Professor Earll Murman of the dent A. Bartlett Giamatti urged Department of Aeronautics and graduates to "have the courage to Astronautics was recently named connect" with people of all ideo- the new director of Project Athe- logies. Equality will come only ~~~~~~~~~~~~~~~~~,,4. na by Gerald L. -
Free Software Philosophy, History and Practice
Introduction (and some quick reminders) History and philosophy Legal aspects Free Software Philosophy, history and practice Luca Saiu [email protected] http://ageinghacker.net GNU Project Screencast version Paris, October 2014 Luca Saiu <[email protected]> Free Software — Philosophy, history and practice Introduction (and some quick reminders) History and philosophy Legal aspects Introducing myself I’m a computer scientist living and working somewhere around Paris... ...and a GNU maintainer. I’m also an associate member of the Free Software Foundation, a fellow of the Free Software Foundation Europe and an April adherent. So I’m not an impartial observer. Luca Saiu <[email protected]> Free Software — Philosophy, history and practice Introduction (and some quick reminders) History and philosophy Legal aspects Contents 1 Introduction (and some quick reminders) 2 History and philosophy The hacker community The GNU Project and the Free Software movement Linux and the Open Source movement 3 Legal aspects Copyright Free Software licenses Luca Saiu <[email protected]> Free Software — Philosophy, history and practice Introduction (and some quick reminders) History and philosophy Legal aspects Reminders about software — source code vs. machine code Source code vs. machine code Quick demo Luca Saiu <[email protected]> Free Software — Philosophy, history and practice Programs are linked to libraries static libraries shared libraries Libraries (or programs) request services to the kernel Programs invoke with other programs Programs communicate with other programs... ...on the same machine ...over the network We’re gonna see that this has legal implications. Introduction (and some quick reminders) History and philosophy Legal aspects Reminders about software — linking In practice, programs don’t exist in isolation. -
Section 1: MIT Facts and History
1 MIT Facts and History Economic Information 9 Technology Licensing Office 9 People 9 Students 10 Undergraduate Students 11 Graduate Students 12 Degrees 13 Alumni 13 Postdoctoral Appointments 14 Faculty and Staff 15 Awards and Honors of Current Faculty and Staff 16 Awards Highlights 17 Fields of Study 18 Research Laboratories, Centers, and Programs 19 Academic and Research Affiliations 20 Education Highlights 23 Research Highlights 26 7 MIT Facts and History The Massachusetts Institute of Technology is one nologies for artificial limbs, and the magnetic core of the world’s preeminent research universities, memory that enabled the development of digital dedicated to advancing knowledge and educating computers. Exciting areas of research and education students in science, technology, and other areas of today include neuroscience and the study of the scholarship that will best serve the nation and the brain and mind, bioengineering, energy, the envi- world. It is known for rigorous academic programs, ronment and sustainable development, informa- cutting-edge research, a diverse campus commu- tion sciences and technology, new media, financial nity, and its long-standing commitment to working technology, and entrepreneurship. with the public and private sectors to bring new knowledge to bear on the world’s great challenges. University research is one of the mainsprings of growth in an economy that is increasingly defined William Barton Rogers, the Institute’s founding pres- by technology. A study released in February 2009 ident, believed that education should be both broad by the Kauffman Foundation estimates that MIT and useful, enabling students to participate in “the graduates had founded 25,800 active companies. -
The Flask Security Architecture: System Support for Diverse Security Policies
The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David Andersen, Jay Lepreau University of Utah http://www.cs.utah.edu/flux/flask/ Abstract and even many types of policies [1, 43, 48]. To be gen- erally acceptable, any computer security solution must Operating systems must be flexible in their support be flexible enough to support this wide range of security for security policies, providing sufficient mechanisms for policies. Even in the distributed environments of today, supporting the wide variety of real-world security poli- this policy flexibility must be supported by the security cies. Such flexibility requires controlling the propaga- mechanisms of the operating system [32]. tion of access rights, enforcing fine-grained access rights and supporting the revocation of previously granted ac- Supporting policy flexibility in the operating system is cess rights. Previous systems are lacking in at least one a hard problem that goes beyond just supporting multi- of these areas. In this paper we present an operating ple policies. The system must be capable of supporting system security architecture that solves these problems. fine-grained access controls on low-level objects used to Control over propagation is provided by ensuring that perform higher-level functions controlled by the secu- the security policy is consulted for every security deci- rity policy. Additionally, the system must ensure that sion. This control is achieved without significant perfor- the propagation of access rights is in accordance with mance degradation through the use of a security decision the security policy. -
A Static Analysis Framework for Security Properties in Mobile and Cryptographic Systems
A Static Analysis Framework for Security Properties in Mobile and Cryptographic Systems Benyamin Y. Y. Aziz, M.Sc. School of Computing, Dublin City University A thesis presented in fulfillment of the requirements for the degree of Doctor of Philosophy Supervisor: Dr Geoff Hamilton September 2003 “Start by doing what’s necessary; then do what’s possible; and suddenly you are doing the impossible” St. Francis of Assisi To Yowell, Olivia and Clotilde Declaration I hereby certify that this material, which I now submit for assessment on the programme of study leading to the award of the degree of Doctor of Philosophy (Ph.D.) is entirely my own work and has not been taken from the work of others save and to the extent that such work has been cited and acknowledged within the text of my work. Signed: I.D. No.: Date: Acknowledgements I would like to thank all those people who were true sources of inspiration, knowledge, guidance and help to myself throughout the period of my doctoral research. In particular, I would like to thank my supervisor, Dr. Geoff Hamilton, without whom this work would not have seen the light. I would also like to thank Dr. David Gray, with whom I had many informative conversations, and my colleagues, Thomas Hack and Fr´ed´ericOehl, for their advice and guidance. Finally, I would like to mention that the work of this thesis was partially funded by project IMPROVE (Enterprise Ireland Strategic Grant ST/2000/94). Benyamin Aziz Abstract We introduce a static analysis framework for detecting instances of security breaches in infinite mobile and cryptographic systems specified using the languages of the π-calculus and its cryptographic extension, the spi calculus. -
Bushnell Family Genealogy, 1945
BUSHNELL FAMILY GENEALOGY Ancestry and Posterity of FRANCIS BUSHNELL (1580 - 1646) of Horsham, England And Guilford, Connecticut Including Genealogical Notes of other Bushnell Families, whose connections with this branch of the family tree have not been determined. Compiled and written by George Eleazer Bushnell Nashville, Tennessee 1945 Bushnell Genealogy 1 The sudden and untimely death of the family historian, George Eleazer Bushnell, of Nashville, Tennessee, who devoted so many years to the completion of this work, necessitated a complete change in its publication plans and we were required to start anew without familiarity with his painstaking work and vast acquaintance amongst the members of the family. His manuscript, while well arranged, was not yet ready for printing. It has therefore been copied, recopied and edited, However, despite every effort, prepublication funds have not been secured to produce the kind of a book we desire and which Mr. Bushnell's painstaking work deserves. His material is too valuable to be lost in some library's manuscript collection. It is a faithful record of the Bushnell family, more complete than anyone could have anticipated. Time is running out and we have reluctantly decided to make the best use of available funds by producing the "book" by a process of photographic reproduction of the typewritten pages of the revised and edited manuscript. The only deviation from the original consists in slight rearrangement, minor corrections, additional indexing and numbering. We are proud to thus assist in the compiler's labor of love. We are most grateful to those prepublication subscribers listed below, whose faith and patience helped make George Eleazer Bushnell's book thus available to the Bushnell Family. -
AHS 02 02 Content 20140102
Advances in Historical Studies, 2013, 2, 19-104 Published Online June 2013 in SciRes (http://www.scirp.org/journal/ahs/) TABLE OF CONTENTS Volume 2 Number 2 June 2013 Letter from Chief-Managing Editorial Staff ARTICLES The Roots of the Theoretical Models of the Nanotechnoscience in the Electric Circuit Theory V. Gorokhov……………………………………………………………..…………………………………………………………………………19 Reflections on the Scientific Conceptual Streams in Leonardo da Vinci and His Relationship with Luca Pacioli R. Pisano……………………………………………………………………………………………………………………………………………32 Reclaiming Realism for the Left: Gar Alperovitz and the Decision to Use the Atomic Bomb P. N. Kirstein……………………………………………………………………………………………………………………….………………46 MISCELLANEA Megalithism and Tribal Ritualism: A Passage through the Kurumbas of Attappadi M. Poyil…………………………………………………………………………………………………………………………………….………54 Temple as the Site of Struggle: Social Reform, Religious Symbols and the Politics of Nationalism in Kerala M. R. Manmathan……………………………………………………………………………………………………………..……………………57 Communities Inferred from the Books of Samuel in the Old Testament of the Bible W. Hu………………………………………………………………………………………………………………………………………………70 Les Châteaux de Landiras et de Montferrand and Their Seigneurial Families D. A. Bailey………………………………………………………………………………………………………...………………………………81 ESSAY REVIEW Borderland Theory as a Conceptual Framework for Comparative Local US and Canadian History C. Parham…………………………………………………………………………………………………………………………..………………94 Jacket: L’histoire comme images d’autres mondes [The history as images -
Caad Futures Digital Proceedings 1987 179
CAAD FUTURES DIGITAL PROCEEDINGS 1987 179 The role of media technology in the design studio P.Purcell Massachusetts Institute of Technology (U.S.A.) ABSTRACT: This paper refers to a program of work, which aims to integrate a range of computer-based multi-media technologies which has the overall goal of enhancing the processes of education in the design studio. The individual projects describe the development of visual information systems and intelligent design systems. The framework of support for much of the work is Project Athena, a campus wide initiative to apply new technology towards enhancing the educational process project. 1. INTRODUCTION The origins of the work, described in this paper lie in the awareness amongst university circles that the increasing pervasiveness of computers on the campus was not being matched by a concomitant thrust to use this facility in support of the processes of university education on the computer intensive campus. The emergence in the early eighties of a number of similar initiatives to investigate the potential of computers and associated media technologies as a support facility to enhance the processes of university education was a direct response to a general awareness that the potential was simply not being exploited. In the case of Massachusetts Institute of Technology, this initiative emerged as Project Athena. Athena provides the umbrella support for most of the developments described in this paper. Its focus is the potential of computers and media technology in the design studio and in design education generally, (especially referring to architectural design & graphic design). Design process and the visual image are key aspects of these disciplines and the work described here revolves around both of these elements. -
The Flask Security Architecture: System Support for Diverse Security Policies
The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David Andersen, Jay Lepreau University of Utah http://www.cs.utah.edu/flux/flask/ Abstract and even many types of policies [1, 43, 48]. To be gen erally acceptable, any computer security solution must Operating systems must be flexible in their support be flexible enough to support this wide range of security for security policies, providing sufficient mechanisms for policies. Even in the distributed environments of today, supporting the wide variety of real-world security poli this policy flexibility must be supported by the security cies. Such flexibility requires controlling the propaga mechanisms of the operating system [32]. tion of access rights, enforcing fine-grained access rights and supporting the revocation of previously granted ac Supporting policy flexibility in the operating system is cess rights. Previous systems are lacking in at least one a hard problem that goes beyond just supporting multi of these areas. In this paper we present an operating ple policies. The system must be capable of supporting system security architecture that solves these problems. fine-grained access controls on low-level objects used to Control over propagation is provided by ensuring that perform higher-level functions controlled by the secu the security policy is consulted for every security deci rity policy. Additionally, the system must ensure that sion. This control is achieved without significant perfor the propagation of access rights is in accordance with mance degradation through the use of a security decision the security policy. -
Questions and Answers About Project Athena
DRAFT October 31, 1986 QUESTIONS AND ANSWERS ABOUT PROJECT ATHENA by Steven R. Lerman Director Preface Project Athena is the largest university-wide educational program MIT has ever undertaken. Over time, Athena will influence the academic and social environment at the Institute in diverse ways. As with most ambitious programs, Athena raises a broad range of questions. This document tries to answer the most commonly-asked questions. It is in- tended primarily for students who are unfamiliar with Athena, its goals, its progress and its future directions. It also provides pointers on how to obtain more detailed information about various subjects. If you can't find answers to questions you have, follow the usual approach at MIT—ask someone else. Find someone on the Athena staff, and he or she will try to help. Athena will probably change your educational experience at MIT. Oc- casionally, you may experience some of the frustration that always is as- sociated with being on the leading edge of a new technology. At times, the changes seem to occur far too slowly; at other times, they happen too quickly. Just remember that part of the reason you came to MIT was to be part of the excitement associated with the forefront of technology and science! , What is Project Athena? In May 1983, MIT announced the establishment of a five-year program to ex- plore new, innovative uses of computing in the MIT curriculum. The MIT faculty was concerned that too little was being done to integrate the new com- putational technology into the undergraduate educational experience. -
Using History to Teach Computer Science and Related Disciplines
Computing Research Association Using History T o T eachComputer Science and Related Disciplines Using History To Teach Computer Science and Related Disciplines Edited by Atsushi Akera 1100 17th Street, NW, Suite 507 Rensselaer Polytechnic Institute Washington, DC 20036-4632 E-mail: [email protected] William Aspray Tel: 202-234-2111 Indiana University—Bloomington Fax: 202-667-1066 URL: http://www.cra.org The workshops and this report were made possible by the generous support of the Computer and Information Science and Engineering Directorate of the National Science Foundation (Award DUE- 0111938, Principal Investigator William Aspray). Requests for copies can be made by e-mailing [email protected]. Copyright 2004 by the Computing Research Association. Permission is granted to reproduce the con- tents, provided that such reproduction is not for profit and credit is given to the source. Table of Contents I. Introduction ………………………………………………………………………………. 1 1. Using History to Teach Computer Science and Related Disciplines ............................ 1 William Aspray and Atsushi Akera 2. The History of Computing: An Introduction for the Computer Scientist ……………….. 5 Thomas Haigh II. Curricular Issues and Strategies …………………………………………………… 27 3. The Challenge of Introducing History into a Computer Science Curriculum ………... 27 Paul E. Ceruzzi 4. History in the Computer Science Curriculum …………………………………………… 33 J.A.N. Lee 5. Using History in a Social Informatics Curriculum ....................................................... 39 William Aspray 6. Introducing Humanistic Content to Information Technology Students ……………….. 61 Atsushi Akera and Kim Fortun 7. The Synergy between Mathematical History and Education …………………………. 85 Thomas Drucker 8. Computing for the Humanities and Social Sciences …………………………………... 89 Nathan L. Ensmenger III. Specific Courses and Syllabi ………………………………………....................... 95 Course Descriptions & Syllabi 9.