ACD: Automatic Call Distributor SFTP: Secure File Transfer Protocol ADCP: Advanced Data Communication Protocol SMTP: Simple Mail

Total Page:16

File Type:pdf, Size:1020Kb

ACD: Automatic Call Distributor SFTP: Secure File Transfer Protocol ADCP: Advanced Data Communication Protocol SMTP: Simple Mail SOME OF THE COMPUTER ABBREVIATION FOR COMPUTER OPERATOR EXAM ACD: Automatic Call Distributor SFTP: Secure File Transfer Protocol ADCP: Advanced Data Communication Protocol SMTP: Simple Mail Transfer Protocol ARPANET: Advance Research Project Agency UDP: User Datagram Protocol Networks ATDM: Asynchronous Time Division Multiplexing ARP: Address Resolution Protocol ALGOL: Algorithmic Language Tel Net: Telecommunication Networking ANSI: American National Standard Institute POP3: Post Office Protocol Version3 AS: Autonomous System BGP: Border Gateway Protocol BACP: Bandwidth Allocation Control Protocol P2P: Point to Point Protocol BERT: Bit Error Rate Test PPP: Peer to Peer Protocol BIOD: Block Input/ Output Daemon SNMP: Simple Network Management Protocol BPS: Bits Per Second NTP: Network Time protocol BRI: Basic Rate Interface SIP: Session Initiation Protocol CARP: Cache Array Routing Protocol DHCP: Dynamic Host Configuration Protocol C-DAC: Centre for Development of Advance IMAP4: Internet Message Access Protocol Version4 Computing C-DOT: Centre for Development of Telematics RARP: Reverse Address Resolution Protocol CXML: Commerce Extensible Markup Language SSH: Secure Shell DAP: Data Access Protocol SMIME: Secure MIME DBML: Data Base Markup Language BPS: Bit Per Second DBMS: Data Base Management System EDI: Electronic Data Interchange DHTML: Dynamic Hyper Text Markup Language ASP: Active Server Pages DIP: Dial-up Internet Protocol BCC: Blind Carbon Copy DMA: Direct Memory Access CDMA: Code Durian Multiple Access DOS: Disk Operating System GSM: Global System for Mobile Communication DNS: Domain Name Service/Scheme CMOS: Complementary Metal Oxide Semi Conductor RAM: Random Access Memory CMYK: Cyan Magenta Yellow Black DRAM: Dynamic Random Access Memory GPS: Global Positioning System SRAM: Static Random Access Memory HDMI: High DefinitionMultimedia Interface EAP: Extensible Authentication Protocol GIGO: Garbage in Garbage Out EBCDIC: Extended Binary Coded Decimal LIFO: Last in First Out Interchange Code EDI: Electronic Data Interchange FIFO: First in First Out EPROM: Erasable Programmable Read Only PING: Pocket Internet Gopher Memory EEPROM: Electronically Erasable Programmable HDD: Hard Disc Drive Read Only Memory EIP: Enterprise Information Portal NIC: Network Interface Controller/Cord FDMA: Frequency Division Multiplexing Access HDTV: High Definition Television FLOPS: Floating Point Operations Per Second LED: Light Emitting Diode FPS: Fast Packet Switching TFT: Thin Film Transistor FSP: File Service Protocol PDA: Personal Digital Assistants FTAM: File Transfer Access and Management PDF: Portable Document Format FXS: Fax Transmit Format USB: Universal Serial Bus GDP: Gateway Discovery Protocol VIRUS: Vital Information Resource Under Sieze GSM: Global System for Mobiles IVR: Interactive Voice Response HDLC: High Level Data Link Control WIFI: Wireless Fidelity WIMAX: Worldwide Interoperability for Microwave HDML: Handheld Device Markup Language Access HID: Human Interface Device ADSL: Asymmetric Digital Subscriber Line HSSI: High Speed Serial Interface API: Application Program Interface HTTPS: Hyper Text Transfer Protocol Secure ARP: Address Resolution Protocol HTTP: Hyper Text Transfer Protocol RARP: Reverse ARP ICANN: Internet Corporation of Assign Names & ICM: Image Colour Matching Numbers ICMP: Internet Control Massage Protocol DPI: Dot Per Inch IDRP: Inter Domain Routing Protocol FAT: File Allocation Table IDS: Intrusion Detection System MANET: Mobile Ad-Hoc Network IMAP: Internet Message Access Protocol MIPS: Million Instruction Per Second INSP: Internet Name Server Protocol BIPS: Billion Instruction Per Second IOS: Internetworking Operating System TIPS: Trillion Instruction Per Second IP: Internet Protocol NAT: Network Address Translation IPP: Internet Printing Protocol IEEE: Institute of Electrical and Electronic Engineer ITSP: Internet Telephony Service Provider ISO: International Standard OrganiZation JPEG: Joint Photographic Expert Group ISDN: Integrated Servers Digital Network KBPS: Kilobits Per Second MAC: Media Access Control LAWN: Local Area Wireless Network CAN: Campus Area Network LADP: Lightweight Directory Service Access PAN: Personal Area Network Protocol LPP: Light-weight Presentation Protocol SAN: Storage Area Network MAP: Mobile Application Port CNM: Calculatory Network Mode MAPI: Mail Application Programming Interface IPV4: Internet Protocol Version 4 MB: Mega Bytes IPV6: Internet Protocol Version 6 Mbps: Mega bits per second MODEM: Modulator Demodulator MCB: Memory Control Block PCB: Printer Circuit Board MCR: Magnetic Card Reader FDD: Floppy Disc Drive MDLP: Mobile Data Link Protocol BRD: Blue Ray Disc MFLOPS: Million Floating Point Operation Per HVD: Holographic Versatile Disc Second MFM: Modified Frequency Modulation IC: Integrated circuit MGCP: Media Gateway Control Protocol ERP: Enterprise Resource Planning ATM: Asynchronous Transfer Mode/Automated MIB: Management Information Base Teller Machine CAI: Computer Assisted Instructions/Computer Aided MIDI: Musical Instruments Digital Interface Design MIME: Multipurpose Internet Mail Extension E-mail: Electronic mail MIPS: Millions Instruction Per Second DTP: DEsktop Publishing MIS: Management Information System MIPS: Million of Instructions per second MMX: Multimedia Extension ALU: Arithmetic & logic unit MOLAP: Multi-dimension Online Analytical VDU: Visual display unit Processing MPEG: Moving Pictures Expert Group VDT: Visual digital terminal ASCII: American standard code for information MUA: Mail User Agent interchange NAP: Network Access Point VGA: Video Graphics array NASDAQ: National Association of Securities CGA: Colour graphics adapter Dealers Automated Quotation NAT-PT: Network Address Translation-Protocol MDA: Monochrome display adapter Translation NETBIOS: Network Adapter Basic Input Output SVGA: Super video graphic array System NFAR: Network File Access Routine EGA: Enhanced graphic array NSP: Network Services Protocol MICR: Magnetic ink character recognition NVRAM: Non-Volatile Random Access Memory OMR: Optical mark recognition OAIS: Open Archival Information System OBR: Optical bar code reader OLTP: Online Transaction Processing LCD: Liquid Crystal Display OMAP: Open Multimedia Application Platform CRT: Cathode Ray Tube PAP: Password Authentication Protocol CD ROM: Compact Disc Read Only Memory PCM: Pulse Code Modulation FORTRAN: Formula Translation COBOL: Common Business Oriented PDN: Public Data Network LanguageLISP:List Processing PDP: Packet Data Protocol ALGOL: Alogorithmic Language IECT: Information Electronics & Communication PIN: Personal Identification Number Technology PRISM: Parallel Reduced Instruction Set Multi- BASIC: Beginners all purpose symbolic Instruction processing Code PROM: Programmable Read Only Memory LOGO: Logic Oriented Graphic Oriented PSDN: Packet-Switched Data Network CD: Compact Disc RARP: Reverse Address Resolution Protocol DOS: Disc Operating System RDBMS: Relation Data Base Management System IBM: International Business Machines RTCP: Real-Time Transport Control Protocol SMPS: Switched Mode Power Supply SDRAM: Synchronous Dynamic Random Access BIOS: Basic Input Output System Memory SGML: Standard Generalized Markup Language FTP: File Transfer Protocol SLIP: Serial Line Internet Protocol GUI: Graphic User Interface SNA: Sub Network Access Protocol TOC: Table Of Contents SQL: System Query Language LAN: LocaL Area Network SSML: Security Service Markup language MAN: Metropolitan Area Network STP: Spanning Tree Protocol WAN: Wide Area Network SWAP: Superior Wireless Application ISP: Internet Service Provider SYSOP: System Operator WWW: World Wide Web TCP/IP: Transmission Control Protocol/Internet IE: Internet Explorer protocol TDMA: Time Division Multiple Access IAP: Internet Access Providers UIML: User Interface Markup Language NAP: Network Access Point VOIP: Voice Over Internet Protocol DSL: Digital Subscribers Line VRAM: Volatile Random access Memory FTTH: Fiber To The Home VRML: Virtual Reality Modelling Language ISDN: Integrated Service Digital Network VSAM: Virtual Storage Access Method PRI: Primary Rate Interface WCCP: Web Cache Control Protocol UTP: Unshielded Twisted Pair. WML: Wireless Markup Language SMDS: Switched Multi Megabit Data Services WSDL: Web Services Description Language NSF: National Science Foundation XAML: Extensible Authority Markup Language HTML: Hyper Text Markup Language XML: Extensible Markup Language VRML: Virtual Reality Modeling Language ZIP: Zone Information Protocol NNTP: Networks News Transfer Protocol TFTP: Trivial File Transfer Protocol URL: Uniform Resource Locator.
Recommended publications
  • Allgemeines Abkürzungsverzeichnis
    Allgemeines Abkürzungsverzeichnis L.
    [Show full text]
  • Networking Standards Mark Davies, Digital Equipment Corporation
    N92-12499 Networking Standards Mark Davies, Digital Equipment Corporation ABSTRACT The enterprise network is currently a multivendor environment consisting of many defacto and proprietary standards. During the 1990s, these networks will evolve towards networks which are based on international standards in both the LAN and WAN space. Also, you can expect to see the higher level functions and applications begin the same transition. The Open Network Advantage Market Requirements OPEN NETWORKS!!! Multi-protocol, multi-platform, multi-vendor networks working together International AND defacto standards Effortless communications within and between enter- prises Ability to move to standards at own pace What is an Open System? Defined as: A vendor-neutral computing environment: - compliant with International and defacto standards - permits system and network interoperability or software applications portability - includes consistency of data and human access - satisfies one or more of a business's functional requirements Standards Benefits from networks based on international and defacto standards o Vendor independence o Applications portability o Investment protection o Improved communications leading to increased productivity o Network flexibility 13DSDDED Network Architectures: DECnet, OSI, TCP/IP DECnet OS) IP Application Application Internet Applications Protocols Presentation DMA Session Control Session Transport Transport Transport (NSP) (TP 0,2,4) (TCP / UDP) Network Network Network (CLNS) (CLNS/CONS) (IP) Data Link Data Link Data Link
    [Show full text]
  • Decnet-Plusftam and Virtual Terminal Use and Management
    VSI OpenVMS DECnet-Plus FTAM and Virtual Terminal Use and Management Document Number: DO-FTAMMG-01A Publication Date: June 2020 Revision Update Information: This is a new manual. Operating System and Version: VSI OpenVMS Integrity Version 8.4-2 VSI OpenVMS Alpha Version 8.4-2L1 VMS Software, Inc., (VSI) Bolton, Massachusetts, USA DECnet-PlusFTAM and Virtual Terminal Use and Management Copyright © 2020 VMS Software, Inc. (VSI), Bolton, Massachusetts, USA Legal Notice Confidential computer software. Valid license from VSI required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice. The only warranties for VSI products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. VSI shall not be liable for technical or editorial errors or omissions contained herein. HPE, HPE Integrity, HPE Alpha, and HPE Proliant are trademarks or registered trademarks of Hewlett Packard Enterprise. Intel, Itanium and IA-64 are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. UNIX is a registered trademark of The Open Group. The VSI OpenVMS documentation set is available on DVD. ii DECnet-PlusFTAM and Virtual
    [Show full text]
  • Database Language SQL: Integrator of CALS Data Repositories
    Database Language SQL: Integrator of CALS Data Repositories Leonard Gallagher Joan Sullivan U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Information Systems Engineering Division Computer Systems Laboratory Gaithersburg, MD 20899 NIST Database Language SQL Integrator of CALS Data Repositories Leonard Gallagher Joan Sullivan U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Information Systems Engineering Division Computer Systems Laboratory Gaithersburg, MD 20899 September 1992 U.S. DEPARTMENT OF COMMERCE Barbara Hackman Franklin, Secretary TECHNOLOGY ADMINISTRATION Robert M. White, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY John W. Lyons, Director Database Language SQL: Integrator of CALS Data Repositories Leonard Gallagher Joan Sullivan National Institute of Standards and Technology Information Systems Engineering Division Gaithersburg, MD 20899, USA CALS Status Report on SQL and RDA - Abstract - The Computer-aided Acquisition and Logistic Support (CALS) program of the U.S. Department of Defense requires a logically integrated database of diverse data, (e.g., documents, graphics, alphanumeric records, complex objects, images, voice, video) stored in geographically separated data banks under the management and control of heterogeneous data management systems. An over-riding requirement is that these various data managers be able to communicate with each other and provide shared access to data and
    [Show full text]
  • Application Layer
    APPLICATION LAYER The application layer in the OSI model is the closest layer to the end user which means that the application layer and end user can interact directly with the software application. The application layer programs are based on client and servers. The Application layer includes the following functions: • Identifying communication partners: The application layer identifies the availability of communication partners for an application with data to transmit. • Determining resource availability: The application layer determines whether sufficient network resources are available for the requested communication. • Synchronizing communication: All the communications occur between the applications requires cooperation which is managed by an application layer. Services of Application Layers o Network Virtual terminal: An application layer allows a user to log on to a remote host. To do so, the application creates a software emulation of a terminal at the remote host. The user's computer talks to the software terminal, which in turn, talks to the host. The remote host thinks that it is communicating with one of its own terminals, so it allows the user to log on. o File Transfer, Access, and Management (FTAM): An application allows a user to access files in a remote computer, to retrieve files from a computer and to manage files in a remote computer. FTAM defines a hierarchical virtual file in terms of file structure, file attributes and the kind of operations performed on the files and their attributes. o Addressing: To obtain communication between client and server, there is a need for addressing. When a client made a request to the server, the request contains the server address and its own address.
    [Show full text]
  • Ciena Acronyms Guide.Pdf
    The Acronyms Guide edited by Erin Malone Chris Janson 1st edition Publisher Acknowledgement: This is the first edition of this book. Please notify us of any acronyms we may have missed by submitting them via the form at www.ciena.com/acronymsguide. We will be happy to include them in further editions of “The Acronyms Guide”. For additional information on Ciena’s Carrier Ethernet or Optical Communications Certification programs please contact [email protected]. Table of Contents Numerics ..........................1 A .......................................1 B .......................................2 C .......................................3 D .......................................5 E .......................................7 F........................................9 G .....................................10 H .....................................11 I .......................................12 J ......................................14 K .....................................14 L ......................................14 M ....................................15 N .....................................17 O.....................................18 P .....................................20 Q.....................................22 R .....................................22 S......................................23 T .....................................26 U .....................................28 V .....................................29 W ....................................29 X .....................................30 Z......................................30
    [Show full text]
  • 2018–2019 Johns Hopkins Engineering for Professionals
    The Johns Hopkins University 3400 North Charles Street Engineering Baltimore, MD 21218 for Professionals Part-Time and Online Graduate Education in Engineering and Applied Sciences 2018–2019 Part-Time Graduate Programs ep.jhu.edu Dear Students, Technological advances occurring at a breathtaking pace are impacting every aspect of society. In this environment, the most successful engineers are those committed to seek- ing the resources they need to remain at the forefront of their professions. They know it is crucial not only to be well versed in the latest technologies, but also to understand how their fields are evolving, what the consequences of these changes will be, and the knowledge and skills they will need to remain ahead of the curve. The Whiting School of Engineering provides motivated working engineers around the world with the tools and experiences necessary to advance and deepen their educa- tions in ways that have a direct positive impact on their professional lives. The breadth of our degree and certificate programs, the real-world experience of our faculty, and our state-of-the-art instructional methods enable us to provide students with unparalleled opportunities—all of which come with the prestige and value of a Johns Hopkins education. Here, you will learn from instructors who are advancing and redefining their fields, including experienced professionals from the renowned Johns Hopkins Applied Physics Labora- tory, as well as outstanding members of the Johns Hopkins University faculty. These dedicated instructors understand how engineering joins the theoretical with the practical in order to implement solutions to today’s grand challeng- es, and they continually improve and update their course and project content to include the very latest in both the theoretical understanding and the applications of their areas of expertise.
    [Show full text]
  • The US Government's Open System Environment Profile OSE/1 Version
    C NIST Special Publication 500-21 Computer Systems APPLICATION PORTABILITY PROFILE Technology (APP) The U.S. Government's U.S. DEPARTMENT OF COMMERCE Technology Administration Open System Environment Profile National Institute of Standards and Technology OSE/1 Version 2.0 Nisr NAT L !NST."OF STAND i TECH R.I.C. llllllllllllllllllll NIST PUBLICATIONS AlllDM QEETfll APPLICA TION PORTABILITYPROFILE j)JT)) The U S. Government's ^ k^Open System Environment IL Profile OSE/1 Version 2.0 -QG 100 .U57 #500-210 1993 7he National Institute of Standards and Technology was established in 1988 by Congress to "assist industry in the development of technology . needed to improve product quality, to modernize manufacturing processes, to ensure product reliability . and to facilitate rapid commercialization ... of products based on new scientific discoveries." NIST, originally founded as the National Bureau of Standards in 1901, works to strengthen U.S. industry's competitiveness; advance science and engineering; and improve public health, safety, and the environment. One of the agency's basic functions is to develop, maintain, and retain custody of the national standards of measurement, and provide the means and methods for comparing standards used in science, engineering, manufacturing, commerce, industry, and education with the standards adopted or recognized by the Federal Government. As an agency of the U.S. Commerce Department's Technology Administration, NIST conducts basic and applied research in the physical sciences and engineering and performs related services. The Institute does generic and precompetitive work on new and advanced technologies. NIST's research facilities are located at Gaithersburg, MD 20899, and at Boulder, CO 80303.
    [Show full text]
  • IT Acronyms at Your Fingertips a Quick References Guide with Over 3,000 Technology Related Acronyms
    IT Acronyms at your fingertips A quick references guide with over 3,000 technology related acronyms IT Acronyms at your Fingertips We’ve all experienced it. You’re sitting in a meeting and someone spouts off an acronym. You immediately look around the table and no one reacts. Do they all know what it means? Is it just me? We’re here to help! We’ve compiled a list of over 3,000 IT acronyms for your quick reference and a list of the top 15 acronyms you need to know now. Top 15 acronyms you need to know now. Click the links to get a full definition of the acronym API, Application Programmer Interface MDM, Mobile Device Management AWS, Amazon Web Services PCI DSS, Payment Card Industry Data Security Standard BYOA, Bring Your Own Apps SaaS, Software as a Service BYOC, Bring Your Own Cloud SDN, Software Defined Network BYON, Bring Your Own Network SLA, Service Level Agreement BYOI, Bring Your Own Identity VDI, Virtual Desktop Infrastructure BYOE, Bring Your Own Encryption VM, Virtual Machine IoT, Internet of Things Quick Reference, over 3000 IT acronyms Click the links to get a full definition of the acronym Acronym Meaning 10 GbE 10 gigabit Ethernet 100GbE 100 Gigabit Ethernet 10HD busy period 10-high-day busy period 1170 UNIX 98 121 one-to-one 1xRTT Single-Carrier Radio Transmission Technology 2D barcode two-dimensional barcode Page 1 of 91 IT Acronyms at your Fingertips 3270 Information Display System 3BL triple bottom line 3-D three dimensions or three-dimensional 3G third generation of mobile telephony 3PL third-party logistics 3Vs volume, variety and velocity 40GbE 40 Gigabit Ethernet 4-D printing four-dimensional printing 4G fourth-generation wireless 7W seven wastes 8-VSB 8-level vestigial sideband A.I.
    [Show full text]
  • DRIVE/WINDOWS V1.1 SQL Statements For
    Preface DRIVE/WINDOWS allows you to access the SQL database system using SQL statements. While this directory gives you a brief description of the syntax of the DRIVE SQL statements for UDS, a detailed description is provided in the "SQL for UDS/SQL V1.0 Language Reference Manual" [13]. This directory describes the DRIVE SQL statements for UDS of the DRIVE/WINDOWS version 1.1 for BS2000 and SINIX. Complex statement sections which occur in both DRIVE and SQL statements are described separately in the chapter on "Metavariables" in the "DRIVE/WINDOWS V1.0: System Directory" [3]. Additional DRIVE SQL metavariables which are not included in this chapter are described in this statement directory under "UDS metavariables". The term "with the TP monitor" refers to UTM mode in BS2000. SQL return codes are accepted by UDS/SQL and output by DRIVE/WINDOWS as error messages in the form DRI9xxx. For their meaning, refer to the "SQL for UDS/SQL (BS2000) V1.0: Language Reference Manual" [13]. U20073-J-Z145-2-7600 1 UDS/SQL statements CLOSE Close the cursor CLOSE closes a cursor that you declared with the DECLARE statement for a query expression and opened with the OPEN statement. The cursor declaration is retained. You must open the cursor using the OPEN or RESTORE statement before accessing the cursor again using the FETCH statement. An open cursor is closed at the end of a transaction. In program mode, cursors can only be referenced in the source file in which they were declared. CLOSE cursor cursor Name of the cursor you wish to close.
    [Show full text]
  • HP FTAM/9000 Programmer's Guide Is to Introduce You to the File Transfer, Access and Management (FTAM) Concepts You Must Know to Write FTAM Applications
    HP FTAM/9000 Programmer’s Guide Edition 5 B1033-90014 HP 9000 Networking E0597 Printed in: U.S.A. © Copyright 1997, Hewlett-Packard Company. Legal Notices The information in this document is subject to change without notice. Hewlett-Packard makes no warranty of any kind with regard to this manual, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Hewlett-Packard shall not be held liable for errors contained herein or direct, indirect, special, incidental or consequential damages in connection with the furnishing, performance, or use of this material. Warranty. A copy of the specific warranty terms applicable to your Hewlett- Packard product and replacement parts can be obtained from your local Sales and Service Office. Restricted Rights Legend. Use, duplication or disclosure by the U.S. Government is subject to restrictions as set forth in subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 for DOD agencies, and subparagraphs (c) (1) and (c) (2) of the Commercial Computer Software Restricted Rights clause at FAR 52.227-19 for other agencies. HEWLETT-PACKARD COMPANY 3000 Hanover Street Palo Alto, California 94304 U.S.A. Use of this manual and flexible disk(s) or tape cartridge(s) supplied for this pack is restricted to this product only. Additional copies of the programs may be made for security and back-up purposes only. Resale of the programs in their present form or with alterations, is expressly prohibited. Copyright Notices. ©copyright 1983-97 Hewlett-Packard Company, all rights reserved.
    [Show full text]
  • The Architecture of Open
    Preface By Professor Brian Warboys, University of Manchester It is now some 20 years since the foundations of the VME architecture were laid. The original objectives were to produce an architecture which would be flexible enough to allow for the many changes that were inevitable in the market, in the enabling technologies and in the end-user demands for IT systems. At the same time it was imperative that the architecture should be constraining enough to control the very long development process that long life implies. The result was essentially to define a simple but powerful approach which has basically remained unchanged during its long life. This is not a tribute to the remarkable foresight of the many people who contributed to that design but rather confirmation of the long known but often forgotten maxim that the best solution to mastering complexity is by the formulation of simple rules. The basic rules, which are enshrined in the architecture, have not had to be reformulated but merely extended in order to produce an architecture which meets the modern demands of Open Client-server systems. The essential architectural simplicity which guided the development of a complex Operating System throughout the 70's and 80's is as applicable in the 90's. Moreover this approach has been thoroughly tested over the last twenty years and there should be no doubt in anybody's mind about the capability of the OpenVME architecture to manage the complex design issues which confront modern Client-server systems. A splendid side effect of this text is that, for the first time, it enumerates, in a readily digestible form, the thinking behind the VME architecture.
    [Show full text]