Newsletter Second Issue V5 Layout 1

Total Page:16

File Type:pdf, Size:1020Kb

Newsletter Second Issue V5 Layout 1 March 2010 www.keep-project.eu KEEPING EMULATION ENVIRONMENTS PORTABLE Newsletter Abstract The very success of computing technology, where machines are rapidly superseded, has created a serious and growing challenge Inside this issue of how to preserve access to digital material originally produced on machines which have since become obsolete. Cultural her- KEEP 1 itage organizations are particularly sensitive to the threat of major data loss resulting from technical obsolescence. KEEP Cultural Heritage 2 (Keeping Emulation Environments Portable) will develop an Em- About Emulators portability ulation Access Platform to enable accurate rendering of both static and dynamic digital objects: text, sound, and image files; Games and game developers 6 multimedia documents, websites, databases, videogames etc. The Case for Local Software Preservation You are now reading the second newsletter produced by partners of KEEP project approximately one year after the project’s in- Events 9 ception. In the first half of 2009, research was undertaken into media carriers and available transfer tools. Furthermore, an in- vestigation was carried out into the potential legal issues arising Long-term preservation of digital objects not only entails secure when copying information from original data carriers, and a storage and management, but also includes the development study about metadata standards and approaches in Europe has and execution of strategies to access and render these objects, been produced. Finally, an investigation was conducted into the now and in the future. Such strategies can roughly be divided state-of-the-art in emulation. By the end of 2009, a greater un- into two groups: migration and emulation. Migration is focused derstanding of existing emulation techniques and their applica- on the digital object itself. Emulation does not focus on the dig- bility as strategies for digital preservation was developed. Also, ital object, but on the hardware and software environment in user requirements analysis was carried out in the National li- which the object is rendered. braries of France, Germany and the Netherlands, and a design has been formulated for creating flexible, user-friendly emula- It aims at (re)creating an environment in which the digital object tion services, media carriers and media transfer tools. can be rendered in its original form. This is done by an emula- tor, a software application that runs on a host computer plat- form and recreates the targeted platform. The advantages of Introduction to KEEP emulation is that the original digital object can be left un- touched, no periodic migration cycles are needed, and func- Keeping Emulation Environments Portable (KEEP) is a medium tionality and appearance of the object are preserved by using its scale research project started on 1 February 2009 co-financed authentic software environment. The KEEP project recognizes by the 7th Framework Programme’s ICT-3-4.3 Digital libraries these issues and presents an integrated solution to all challenges and technology-enhanced learning priority. mentioned above. KEEP address all aspects ranging from safe- guarding the original bits from the carrier to offering online serv- Accessing digital material requires the mediation not just of a ices to end-users via a highly portable emulation framework computer but a computer compatible with the preserved mate- running on any possible device. rial. The very success of computing technology where machines are rapidly superseded has created a serious and growing chal- Project KEEP will develop an Emulation Access Platform to en- lenge of how to preserve access to digital material produced on able the accurate rendering of a broad range of static and dy- obsolete machines. Over time individuals and organisations namic digital object, designed for a wide variety of computer build up digital assets comprising a wide variety of digital objects systems, so that they can be securely accessed in the long term ranging from plain text to multimedia applications and websites. Although primarily aimed at Cultural Heritage institutions, this The central goal of KEEP is to provide new tools for accessing Emulation Access Platform will also serve the needs of a wide any digital object both at present and in the long term. range of organisations and individuals due to its universal ap- proach. KEEP is co-financed by the European Union’s FP7 Programme. The project is coordinated by the Bibliothèque naionale de France 1 March 2010 www.keep-project.eu Cultural Heritage - About Emulator portability We have to wonder about the conditions required to permit Software portability these virtual environments to run on future hardware or, in Emulators raise the same questions as any software in terms of other words, to study the conditions of emulator portability. portability. As we know, runable files are called “binaries”and re- This is one of the gauntlets taken up by the KEEP Project. sult from the compilation of “source code” files for a certain en- vironment. Then, two main strategies must be distinguished: by Pierre Echegaray and Jean-Philippe Humblot, Bibliothèque nationale de France ▪ Binaries portability This can be illustrated by the Java language: once a program is generated for the Java virtual machine (JVM), it can be executed The BnF has been using emulators for many years in order to on any environment which disposes of a JVM implementation simulate computer-based machines for which it possesses pub- such as MS Windows, Linux or Mac OS. Its portability on future lications and ensure their communication. Enabling to create vir- environments relies entirely on the capacity to adapt the JVM to tual environments, emulation appears to be the only solution to them but no future compilation is required. untie the link with original hardware, formerly necessary to run these publications. ▪ Sources portability In this scenario, sources are adapted to take into account several In this article, we explain the general principles of software porta- target environments for compilation. Used in conjunction with bility and show how they were applied for writing 10 emulators compiler facilities, the same program code allows to generate used in our Library. As we will see, these emulators have in com- different binaries for different running platforms, operating sys- mon to be open source, written in C or C++, use standardized tems or processors. input/output (I/O) libraries and can be compiled for several tar- get environments through an open source compiler: GCC. KEEP is co-financed by the European Union’s FP7 Programme. The project is coordinated by the Bibliothèque naionale de France 2 March 2010 www.keep-project.eu The first strategy imposes to focus on the definition of a virtual In the following, we will focus on the steps required and prob- machine (VM): portability will rely mainly on its capacities to be lem that may occur during the process of porting sources of em- adapted to different target platform. In the second case, porta- ulators on a new GCC target. bility focuses on the compilation’s environment required for em- ulators’ generation. This is the GNU Compiler Collection (or Compilation steps GCC)’s approach. The first action of a generation process with GCC is to run a KEEP uses both strategies: it will define a new VM, both fitted to “configure” script on the host platform. This script is generated facilitate its own portability and emulator binaries execution, and by the “autoconf” configuration scripts that can make decisions will study source portability so as to easily adapt emulator’s based on a canonical name for the system type, or target triplet. source code and the compilation chain to create binaries for this VM. The “configure” script is written in UNIX shell and detects all in- formation about the software components which can be used Compilation tool on the host (library, runtime, processor, ...). It generates some “makefile” scripts and “include” files, and sets some macro di- One of the most famous compilation suite, GCC (GNU Com- rectives (#define) adapted to the environment’s capabilities. All piler Collection) is produced by the GNU Project and supports these scripts and files are used to allow GCC to produce the various programming languages. It is a key component of the final executable files or binaries. GNU toolchain which allows portability of applications running on many different platforms, using many different processors, ex- On the other hand, emulators’ sources code is structured to ecuting on all kind of operating systems: portability is achieved embed specific instructions related to each particular target, in in particular by providing the specificities of the target platform terms of operating system or I/O libraries like DIRECTX or SDL. and adapting (or porting) source codes to take into account these properties. Source portability According to GCC general philosophy, a target is defined by a Knowing this process, let’s explore the requirements and cost of string called a triplet (though it may be composed of 2, 3 or porting existing emulators on a new target ? even 4 terms) like “i686-pc-mingw32” or “powerpc-apple-dar- win8.9.0”. GCC is to be modified within the project so as to In a first approach, if we don’t need to access the real hardware allow generation of binary code for the KEEP virtual processor except the processor, the generated code based on the target and environment which will be defined as a new target. We fore- definition is self sufficient : a program running a simple calculus, see to define a new target “keep-virtual-elf” so that the compiler for instance an addition such as 1+1, should execute in the vir- will generate pure code for the virtual machine. tual environment. It is important to notice that GCC allows to produce binaries But in the real world, software will need to interact with the user for the environment it is running on (the host platform), or to and will call at least basic I/O functions like “open”, “read”, any other environment defined as a possible target.
Recommended publications
  • Virtual Machine Technologies and Their Application in the Delivery of ICT
    Virtual Machine Technologies and Their Application In The Delivery Of ICT William McEwan accq.ac.nz n Christchurch Polytechnic Institute of Technology Christchurch, New Zealand [email protected] ABSTRACT related areas - a virtual machine or network of virtual machines can be specially configured, allowing an Virtual Machine (VM) technology was first ordinary user supervisor rights, and it can be tested implemented and developed by IBM to destruction without any adverse effect on the corporation in the early 1960's as a underlying host system. mechanism for providing multi-user facilities This paper hopes to also illustrate how VM in a secure mainframe computing configurations can greatly reduce our dependency on environment. In recent years the power of special purpose, complex, and expensive laboratory personal computers has resulted in renewed setups. It also suggests the important additional role interest in the technology. This paper begins that VM and VNL is likely to play in offering hands-on by describing the development of VM. It practical experience to students in a distance e- discusses the different approaches by which learning environment. a VM can be implemented, and it briefly considers the advantages and disadvantages Keywords: Virtual Machines, operating systems, of each approach. VM technology has proven networks, e-learning, infrastructure, server hosting. to be extremely useful in facilitating the Annual NACCQ, Hamilton New Zealand July, 2002 www. Annual NACCQ, Hamilton New Zealand July, teaching of multiple operating systems. It th offers an alternative to the traditional 1. INTRODUCTION approaches of using complex combinations Virtual Machine (VM) technology is not new. It was of specially prepared and configured OS implemented on mainframe computing systems by the images installed via the network or installed IBM Corporation in the early 1960’s (Varian 1997 pp permanently on multiple partitions or on 3-25, Gribben 1989 p.2, Thornton 2000 p.3, Sugarman multiple physical hard drives.
    [Show full text]
  • OLD PRETENDER Lovrenc Gasparin, Fotolia
    COVER STORY Bochs Emulator Legacy emulator OLD PRETENDER Lovrenc Gasparin, Fotolia Gasparin, Lovrenc Bochs, the granddaddy of all emulators, is alive and kicking; thanks to regular vitamin jabs, the lively old pretender can even handle Windows XP. BY TIM SCHÜRMANN he PC emulator Bochs first saw the 2.2.6 version in the Universe reposi- box). This also applies if you want to the light of day in 1994. Bochs’ tory; you will additionally need to install run Bochs on a pre-Pentium CPU, such Tinventor, Kevin Lawton, distrib- the Bximage program. (Bximage is al- as a 486. uted the emulator under a commercial li- ready part of the Bochs RPM for open- After installation, the program will cense before selling to French Linux ven- SUSE.) If worst comes to worst, you can simulate a complete PC, including CPU, dor Mandriva (which was then known always build your own Bochs from the graphics, sound card, and network inter- as MandrakeSoft). Mandriva freed the source code (see the “Building Bochs” face. The virtual PC in a PC works so emulator from its commercial chains, re- leasing Bochs under the LGPL license. Building Bochs If you prefer to build your own Bochs, or an additional --enable-ne2000 parameter Installation if you have no alternative, you will first to configure. The extremely long list of Bochs has now found a new home at need to install the C++ compiler and de- parameters in the user manual [2] gives SourceForge.net [1] (Figure 1). You can veloper packages for the X11 system. you a list of available options.
    [Show full text]
  • About This Particular Macintosh 9.09
    Cover 9.09 / September 2003 ATPM Volume 9, Number 9 About This Particular Macintosh: About the personal computing experience™ ATPM 9.09 / September 2003 1 Cover Cover Art Emeritus “Return of Clarus” Copyright © 2003 by Darren Woodcock1 RD Novo We need new cover art each month. Write to us!2 Robert Madill Belinda Wagner Editorial Staff Edward Goss Publisher/Editor-in-Chief Michael Tsai Tom Iov ino Managing Editor Christopher Turner Daniel Chvatik Associate Editor/Reviews Paul Fatula Grant Osborne Copy Editors Raena Armitage Contributors Dan Boland Johann Campbell Eric Blair Ellyn Ritterskamp Ron Gibbs Brooke Smith Matthew Glidden Vacant Ted G or ans on Web E ditor Lee Bennett Matt Johnson Publicity Manager Vacant Andrew Kator Webmaster Michael Tsai Chris Lawson Beta Testers The Staff Robert Paul Leitao Gregory Maddux Contributing Editors Ellyn Ritterskamp Evan Trent How To Matthew Glidden Michael Tsai Ted Goranson Mary E. Tyler Ken Gruberman Angus Wong Andrew Kator Macintosh users like you Chris Lawson David Ozab Subscriptions Sylvester Roque Sign up for free subscriptions using the Charles Ross Web form3 or by e-mail4. Mary E. Tyler Vacant Where to Find ATPM Interviews Vacant Online and downloadable issues are Opinion Matt Coates available at http://www.atpm.com. Ellyn Ritterskamp Mike Shields Chinese translations are available Vacant at http://www.maczin.com. Reviews Eric Blair Kirk McElhearn ATPM is a product of ATPM, Inc. Gregory Tetrault © 1995–2003, All Rights Reserved Vacant ISSN: 1093-2909 Technic a l Evan Trent Welcome Robert Paul Leitao Production Tools Artwork & Design Acrobat Apache Graphics Director Vacant AppleScript Layout and Design Michael Tsai BBEdit Cartoonist Matt Johnson CVL Graphic Design Consultant Jamal Ghandour CVS Blue Apple Icon Designs Mark Robinson DropDMG Other Art RD Novo FileMaker Pro FrameMaker+SGML 1.
    [Show full text]
  • Introduction to Virtualization Virtualization
    Introduction to Virtualization Prashant Shenoy Computer Science CS691D: Hot-OS Lecture 2, page 1 Virtualization • Virtualization: extend or replace an existing interface to mimic the behavior of another system. – Introduced in 1970s: run legacy software on newer mainframe hardware • Handle platform diversity by running apps in VMs – Portability and flexibility Computer Science CS691D: Hot-OS Lecture 2, page 2 Types of Interfaces • Different types of interfaces – Assembly instructions – System calls – APIs • Depending on what is replaced /mimiced, we obtain different forms of virtualization Computer Science CS691D: Hot-OS Lecture 2, page 3 Types of Virtualization • Emulation – VM emulates/simulates complete hardware – Unmodified guest OS for a different PC can be run • Bochs, VirtualPC for Mac, QEMU • Full/native Virtualization – VM simulates “enough” hardware to allow an unmodified guest OS to be run in isolation • Same hardware CPU – IBM VM family, VMWare Workstation, Parallels,… Computer Science CS691D: Hot-OS Lecture 2, page 4 Types of virtualization • Para-virtualization – VM does not simulate hardware – Use special API that a modified guest OS must use – Hypercalls trapped by the Hypervisor and serviced – Xen, VMWare ESX Server • OS-level virtualization – OS allows multiple secure virtual servers to be run – Guest OS is the same as the host OS, but appears isolated • apps see an isolated OS – Solaris Containers, BSD Jails, Linux Vserver • Application level virtualization – Application is gives its own copy of components that are not shared • (E.g., own registry files, global objects) - VE prevents conflicts – JVM Computer Science CS691D: Hot-OS Lecture 2, page 5 Examples • Application-level virtualization: “process virtual machine” • VMM /hypervisor Computer Science CS691D: Hot-OS Lecture 2, page 6 The Architecture of Virtual Machines J Smith and R.
    [Show full text]
  • Virtualizing Servers with Xen
    Virtualization Xen Features Escalabilidade Performance QoS Implementation Future Virtualizing servers with Xen Evaldo Gardenali VI International Conference of Unix at UNINET Virtualization Xen Features Escalabilidade Performance QoS Implementation Future Outline Virtualization Xen Features Scalability Performance Quality of Service Implementation Future of Xen Virtualization Xen Features Escalabilidade Performance QoS Implementation Future Overview Why? Support heterogeneous environments: Linux r 2.4 e 2.6, NetBSD r , Plan9 r FreeBSD r , OpenSolaris r Consolidate work Legacy Systems Gradual Upgrade Service Isolation Quality of Service Isolated testing and development Ease of administration Ease of relocation and migration Virtualization Xen Features Escalabilidade Performance QoS Implementation Future Virtualization Techniques Single System Image: Ensim r , Vservers, CKRM, VirtuozzoTM, BSD r jail(), Solaris r Zones √ Groups processes in “resource containers” Hard to get isolation × Emulation: QEMU, Bochs √ Portable Extremely slow × Virtualization: VMware r , VirtualPC r √ Runs unmodified Operating Systems Virtualizing x86 is inefficient × User Mode Kernel: User Mode Linux, CoLinux Guest runs as a process on the host OS × Low performance (I/O, context switches) × Paravirtualization: Xen r , Denali √ Excellent performance Requires port to special architecture × Virtualization Xen Features Escalabilidade Performance QoS Implementation Future Virtualization Techniques Single System Image: Ensim r , Vservers, CKRM, VirtuozzoTM, BSD r jail(), Solaris
    [Show full text]
  • Virtualization of Linux Based Computers: the Linux-Vserver Project
    VirtualizationVirtualization ofof LinuxLinux basedbased computers:computers: thethe LinuxLinux--VServerVServer projectproject BenoBenoîîtt desdes Ligneris,Ligneris, Ph.Ph. D.D. [email protected] Objectives:Objectives: Objectives:Objectives: 1)1) PresentPresent thethe availableavailable programsprograms thatthat cancan provideprovide aa virtualizationvirtualization ofof LinuxLinux computerscomputers withwith differentdifferent technologies.technologies. Objectives:Objectives: 1)1) PresentPresent thethe availableavailable programsprograms thatthat cancan provideprovide aa virtualizationvirtualization ofof LinuxLinux computerscomputers withwith differentdifferent technologies.technologies. 2)2) FocusFocus onon LinuxLinux--VServers:VServers: aa veryvery lightweightlightweight andand effectiveeffective technologytechnology forfor thethe regularregular LinuxLinux useruser notnot interstedintersted inin KernelKernel hacking.hacking. PlanPlan PlanPlan ● IntroductionIntroduction PlanPlan ● IntroductionIntroduction ● OverviewOverview ofof thethe availableavailable technologytechnology PlanPlan ● IntroductionIntroduction ● OverviewOverview ofof thethe availableavailable technologytechnology ● ClassificationClassification ofof thethe problems:problems: usageusage criteriacriteria PlanPlan ● IntroductionIntroduction ● OverviewOverview ofof thethe availableavailable technologytechnology ● ClassificationClassification ofof thethe problems:problems: usageusage criteriacriteria ● ComparativeComparative studystudy ofof thethe existingexisting
    [Show full text]
  • Parallels Desktop® Upgrade to Windows 7 User's Guide
    Parallels Desktop® Upgrade to Windows 7 User's Guide Copyright © 1999-2010 Parallels Holdings, Ltd. and its affiliates. All rights reserved. Parallels Holdings, Ltd. c/o Parallels International GMbH. Parallels International GmbH Vordergasse 49 CH8200 Schaffhausen Switzerland Tel: + 49 (6151) 42996 - 0 Fax: + 49 (6151) 42996 - 255 www.parallels.com Copyright © 1999-2010 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This product is protected by United States and international copyright laws. The product’s underlying technology, patents, and trademarks are listed at http://www.parallels.com/trademarks. Microsoft, Windows, Windows Server, Windows NT, Windows Vista, and MS-DOS are registered trademarks of Microsoft Corporation. Linux is a registered trademark of Linus Torvalds. Mac is a registered trademark of Apple, Inc. All other marks and names mentioned herein may be trademarks of their respective owners. 3 Contents Introduction 5 About Parallels Desktop Upgrade to Windows 7......................................................................................... 5 About This Guide......................................................................................................................................... 6 Organization of This Guide .............................................................................................................. 6 Documentation Conventions............................................................................................................. 7 Getting Help................................................................................................................................................
    [Show full text]
  • Virtualization Technologies Overview Course: CS 490 by Mendel
    Virtualization technologies overview Course: CS 490 by Mendel Rosenblum Name Can boot USB GUI Live 3D Snaps Live an OS on mem acceleration hot of migration another ory runnin disk alloc g partition ation system as guest Bochs partially partially Yes No Container s Cooperati Yes[1] Yes No No ve Linux (supporte d through X11 over networkin g) Denali DOSBox Partial (the Yes No No host OS can provide DOSBox services with USB devices) DOSEMU No No No FreeVPS GXemul No No Hercules Hyper-V iCore Yes Yes No Yes No Virtual Accounts Imperas Yes Yes Yes Yes OVP (Eclipse) Tools Integrity Yes No Yes Yes No Yes (HP-UX Virtual (Integrity guests only, Machines Virtual Linux and Machine Windows 2K3 Manager in near future) (add-on) Jail No Yes partially Yes No No No KVM Yes [3] Yes Yes [4] Yes Supported Yes [5] with VMGL [6] Linux- VServer LynxSec ure Mac-on- Yes Yes No No Linux Mac-on- No No Mac OpenVZ Yes Yes Yes Yes No Yes (using Xvnc and/or XDMCP) Oracle Yes Yes Yes Yes Yes VM (manage d by Oracle VM Manager) OVPsim Yes Yes Yes Yes (Eclipse) Padded Yes Yes Yes Cell for x86 (Green Hills Software) Padded Yes Yes Yes No Cell for PowerPC (Green Hills Software) Parallels Yes, if Boot Yes Yes Yes DirectX 9 Desktop Camp is and for Mac installed OpenGL 2.0 Parallels No Yes Yes No partially Workstati on PearPC POWER Yes Yes No Yes No Yes (on Hypervis POWER 6- or (PHYP) based systems, requires PowerVM Enterprise Licensing) QEMU Yes Yes Yes [4] Some code Yes done [7]; Also supported with VMGL [6] QEMU w/ Yes Yes Yes Some code Yes kqemu done [7]; Also module supported
    [Show full text]
  • The Art of Virtualization with Free Software Master on Free Software 2009/2010
    What is Virtualization Types of Virtualization The Art of Virtualization with Free Software Master on Free Software 2009/2010 Miguel Vidal, Jos´eCastro {mvidal,jfcastro}@libresoft.es GSyC/Libresoft – URJC April 24th, 2010 Miguel Vidal, Jos´eCastro The Art of Virtualization with Free Software What is Virtualization Types of Virtualization (cc) 2010 Miguel Vidal, Jos´eCastro. Some rights reserved. This work is licensed under a Creative Commons Attribution-Share Alike 3.0 License, available at http://creativecommons.org/licenses/by-sa/3.0/ Miguel Vidal, Jos´eCastro The Art of Virtualization with Free Software What is Virtualization Types of Virtualization Agenda Part 1: What is Virtualization Part 2: Types of Virtualization Miguel Vidal, Jos´eCastro The Art of Virtualization with Free Software What is Virtualization Types of Virtualization What is Virtualization Miguel Vidal, Jos´eCastro The Art of Virtualization with Free Software What is Virtualization Types of Virtualization What is Virtualization Hardware/software combination, which allows a computer to act as several ones. It includes making a single physical resource (such as a server, an operating system, or storage device) appears to function as multiple logical resources. Miguel Vidal, Jos´eCastro The Art of Virtualization with Free Software What is Virtualization Types of Virtualization Definitions Virtualization is a methodology of dividing the resources of a computer into multiple execution environments. Virtualization applies one or more concepts or technologies such as partitioning, time-sharing, partial or complete machine simulation, emulation, quality of service, and many others. Colloquially, virtualization refers to the abstraction of computer resources. Miguel Vidal, Jos´eCastro The Art of Virtualization with Free Software What is Virtualization Types of Virtualization Hypervisors In modern computing, Virtual Machine Monitors (aka hypervisors) allow many different OS, tasks and software configurations exist on the same physical machine.
    [Show full text]
  • Filename Extensions
    Filename Extensions Generated 22 February 1999 from Filex database with 3240 items. ! # $ & ) 0 1 2 3 4 6 7 8 9 @ S Z _ a b c d e f g h i j k l m n o p q r s t u v w x y z ~ • ! .!!! Usually README file # .### Compressed volume file (DoubleSpace) .### Temp file (QTIC) .#24 Printer data file for 24 pin matrix printer (LocoScript) .#gf Font file (MetaFont) .#ib Printer data file (LocoScript) .#sc Printer data file (LocoScript) .#st Standard mode printer definitions (LocoScript) $ .$$$ Temporary file .$$f Database (OS/2) .$$p Notes (OS/2) .$$s Spreadsheet (OS/2) .$00 Pipe file (DOS) .$1 ZX Spectrum file in HOBETA format .$d$ Data (OS/2 Planner) .$db Temporary file (dBASE IV) .$ed Editor temporary file (MS C) .$ln TLink response file (Borland C++) .$o1 Pipe file (DOS) .$vm Virtual manager temporary file (Windows 3.x) & .&&& Temporary file ) .)2( LHA archiver temporary file (LHA) 0 .0 Compressed harddisk data (DoubleSpace) .000 Common filename extension (GEOS) .000 Compressed harddisk data (DoubleSpace) .001 Fax (Hayes JT FAX) (many) .075 75x75 dpi display font (Ventura Publisher) .085 85x85 dpi display font (Ventura Publisher) .091 91x91 dpi display font (Ventura Publisher) .096 96x96 dpi display font (Ventura Publisher) .0b Printer font with lineDraw extended character set (PageMaker) 1 .1 Unformatted manual page (Roff/nroff/troff/groff) .10x Bitmap graphics (Gemini 10x printer graphics file) .123 Data (Lotus123 97) .12m Smartmaster file (Lotus123 97) .15u Printer font with PI font set (PageMaker) .1st Usually README.1ST text 2 .24b Bitmap
    [Show full text]
  • It Worked Yesterday: on (Re-) Performing Electroacoustic Music
    University of Huddersfield Repository Berweck, Sebastian It worked yesterday: On (re-)performing electroacoustic music Original Citation Berweck, Sebastian (2012) It worked yesterday: On (re-)performing electroacoustic music. Doctoral thesis, University of Huddersfield. This version is available at http://eprints.hud.ac.uk/id/eprint/17540/ The University Repository is a digital collection of the research output of the University, available on Open Access. Copyright and Moral Rights for the items on this site are retained by the individual author and/or other copyright owners. Users may access full items free of charge; copies of full text items generally can be reproduced, displayed or performed and given to third parties in any format or medium for personal research or study, educational or not-for-profit purposes without prior permission or charge, provided: • The authors, title and full bibliographic details is credited in any copy; • A hyperlink and/or URL is included for the original metadata page; and • The content is not changed in any way. For more information, including our policy and submission procedure, please contact the Repository Team at: [email protected]. http://eprints.hud.ac.uk/ It worked yesterday On (re-)performing electroacoustic music A thesis submitted to the University of Huddersfield in partial fulfilment of the requirements for the degree of Doctor of Philosophy Sebastian Berweck, August 2012 Abstract Playing electroacoustic music raises a number of challenges for performers such as dealing with obsolete or malfunctioning technology and incomplete technical documentation. Together with the generally higher workload due to the additional technical requirements the time available for musical work is significantly reduced.
    [Show full text]
  • DLCC Software Catalog
    Daniel's Legacy Computer Collections Software Catalog Category Platform Software Category Title Author Year Media Commercial Apple II Integrated Suite Claris AppleWorks 2.0 Claris Corporation and Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 1.0.2 --> 1.1.1 Update Apple Computer, Inc. 1984 400K Commercial Apple II Operating System Apple IIGS System 1.1 Apple Computer, Inc. 1986 800K Commercial Apple II Operating System Apple IIGS System 2.0 Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 3.1 Apple Computer, Inc. 1987 800K Commercial Apple II Operating System Apple IIGS System 3.2 Apple Computer, Inc. 1988 800K Commercial Apple II Operating System Apple IIGS System 4.0 Apple Computer, Inc. 1988 800K Commercial Apple II Operating System Apple IIGS System 5.0 Apple Computer, Inc. 1989 800K Commercial Apple II Operating System Apple IIGS System 5.0.2 Apple Computer, Inc. 1989 800K Commercial Apple II Reference: Programming ProDOS Basic Programming Examples Apple Computer, Inc. 1983 800K Commercial Apple II Utility: Printer ImageWriter Toolkit 1.5 Apple Computer, Inc. 1984 400K Commercial Apple II Utility: User ProDOS User's Disk Apple Computer, Inc. 1983 800K Total Apple II Titles: 12 Commercial Apple Lisa Emulator MacWorks 1.00 Apple Computer, Inc. 1984 400K Commercial Apple Lisa Office Suite Lisa 7/7 3.0 Apple Computer, Inc. 1984 400K Total Apple Lisa Titles: 2 Commercial Apple Mac OS 0-9 Audio Audioshop 1.03 Opcode Systems, Inc. 1992 800K Commercial Apple Mac OS 0-9 Audio Audioshop 2.0 Opcode Systems, Inc.
    [Show full text]