Volume 14, Number 6 December 1993

Total Page:16

File Type:pdf, Size:1020Kb

Volume 14, Number 6 December 1993 ISSN 1035-7521 AUUG Inc. Newsletter Volume 14, Number 6 December 1993 Registered by Australia Post, Publication Number NBG6524 The AUUG Incorporated Newsletter Volume 14 Number 6 December 1993 CONTENTS AUUG General Information . , . ¯ . 3 Editorial ......... AUUG Institutional Members . ¯ AUUG President’s Page ..... ¯ . 10 Minutes of the 1993 AGM .... ¯ . ll AUUG articles for the Australian . ¯ Financial Statement ............. .... ¯ 14 How did AUUG spend the monies at AUUG’93? Liz Fraumann ¯ . 22 Opportunity knocks softly sometimes ............... ¯ . 25 Conference Announcements Berkeley 4.3 - 4.4BSD Workshops ................. 26 AUUG Summer Conference Series ................. 30 Fifth Annual Canberra Conference and Workshops .............32 Annual AUUG-NSW Summer Conference ............... 33 ¯Northern q;emtory Chapter .................... 35 AUUG Queensland Chapter .................... 38 South Australian Summer Conference ................ 41 Victo~ Summer Technical Conference .............. ’ ¯ 43 46 Perth Summer Technical Conference ................. Tasmanian Summer Conference .................. 49 LIPDATE - USENIX Conference .................. 52 UniForum NZ’94 - Conference Countdown ............... AUUG Local Chapters AUUG Inc. - Victorian Chapter .................. 55 Update on AUUG Inc. - Victorian Chapter Activities" Stephen Prince ..... 56 From the Western Front Janet Jackson ..... 57 WAUG - Meeting Reviews .................... 59 Open System Publications ...................... 60 ACSnet Survey ......................... 63 Book Reviews .......................... 1 Vol 14 No 6 AUUGN Prentice Hall Book Order Form .................. 67 W(~lsLane Information ................ 68 !AUUGN - from AUUGN Volume 1, Number Letter from Phil McCrea ................. 69 Technical Reports LI2’4UX - An Open System Opened Peter Chubb ...... 70 Distributed Object Management HaraM Reiss ...... 78 From login: - Volume 18, Number 5 After the Fact ........................ 88 4.4BSD Release ................... 91 System Administration Tools ................. 94 Internet Hypertext is Here ................ 9-5 An Update on UNIX-Related Standards Activities ......... 97 Unix Tricks & Traps Janet Jackson , . 107 Summary of Management Committee Minutes - 5th November 1993 ..... 108 AUUG Membership Categories .................. 110 AUUG Forms ........................ Calendar of Events ...................... 115 ADVERTISEMENTS C&T Computing ....................... 6 UniForum NZ’94 ....................... 9 Softway .......................... 24 Prentice Hall Book Order Form .................. 64 W~lsLane Pry Lid ...................... 65 X/Open 116 Copyright © 1993 AUUG Incorporated. All rights reserved. AUUGN is the journal of AULIG Inccn’poratecL an organisation with the aim of promoting knowledge and understanding of Open Systems including but not restricted to the UNIX* system, networking, graphics, user interfaces and programming and development environments, and related standards. Copying without fee is permitted provided that copies are made without modification, and are not made or distributed for commercial advantage. Credit to AUUGN and the author must be given. Abstracting with credit is permitted. No other reproduction is permitted without prior permission of AUUG Incorporated. * UNIX is a registered trademark of UNIX Syslem Laboratories, Incorporated AUUGN Vol 14 No 6 2 A UUG General Information Memberships and Subscriptions Membership, Change or Address, and Subscription forms can be found at the end of this issue. Membership and General Correspondence All correspondence for the AU-UG should be addressed to:- The AUUG Secretary, Phone: (02) 361 5994 P.O. Box 366, Fax: (02) 332 4066 Kensington, N.S.W. 2033. Email: auug @ munnari.oz.au AUSTRALIA AUUG Business Manager Liz Fraumann, Phone: +61 2 953 3542 P.O. Box 366, Fax: +61 2 953 3542 Kensington, N.S.W. 2033, Email: [email protected] AUSTRALIA AUUG Executive Glenn Huxtable President Phil McCrea Vice-President pmc @ atom. ansto, go v.au glenn @ cs.uwa.edu.au ANSAMS University of Western Australia Private Mail Bag 1 Computer Science Department Menal NSW 2234 Nedlands WA Secretary Peter Wishart Tl-eaStll~r Frank Crawford peter, wishart @ c sis.dit, csiro.au [email protected] CSIRO Div. of Information Technology ANSAMS GPO Box 664 Private Mall Bag 1 Canberra ACT 2601 Menai NSW 2234 Greg Blrni~ Stephen Boucher Committee stephen@mtiame,mtia,oz.au Members, greg @ Imt oz.au MTIA Leeds & Northrup Australia P/L 509 St. K.ilda Rd. 42 McKechnie Dr. Melbourne V IC 3004 Brisbane Tech. Park Eight Mile Plans QLD 4113 Michael ~Paddon Chris Maitby mwp@ iconix.oz.au chris@ sofrway.sw.oz.au Iconix Pry Ltd Softway Pty. Ltd. 851 Dandenong Rd P.O. Box 305 East Malvem VIC 3145 Strawberry Hills NSW 2021 Rick Stevenson rick @ stallion.oz.au Stallion Technologies Pty. Ltd. 56 Sylvan Rd. Toowong, QLD 4066 Vol 14 No 6 AUUGN 3 AUUG General Information Next AUUG Meeting The .,\L~rG’94 Conference and Exhibition will be held from the 7th to 9th September, 1994, at the World Congress Centre, Melbourne. Advertising Advertisements to be included in AUUGN are welcome. They should conform to the standards of other contributions (see page 5). Advertising rotes are $120 for a quarter page, $180 for half a page, $300 for the first A4 page, $250 for a second page, $500 for the inside cover and 5750 for the back cover. There is a 20% discount for bulk ordering 0e, when you pay for three issues or more m advance). Contact the business manager for details. Mailing Lists For the purchase of the AUUGN mailing list‘ please contact the AUUG secretariat, phone (02) 361 5994, fax (02) 332 4066. Back Issues Various back issues of the ALrUGN are available. For availability and prices please contact the AUUG secretariat or write to: AUUG Inc. Back Issues Department PO Box 366 Kensington, NSW, 2033 AUSTRALIA Conference Proceedings A limited number of the Conference Proceedings for AUUG’92 and AUUG’93 are still available, at $50 for members and $60 for non-members. Contact the AUUG secretariat. Acknowledgement This newsletter was produced with the kind assistance of and on equipment pn3vided by the Australian Nuclear Science and Technology Organisation. A copy of FrameMaker for use in the production of the newsletter has been provided by Platform Technologies. Disclain~r Opinions expressed by authors and reviewers are not necessarily those of ALrUG Incorporated, its Newslet~x or its editorial committee. Vol 14 No 6 4 AUUGN AUUG Newsletter Editorial Welcome to AUUGN Volume 14 Number 6, the last one for another year. I hope you all have a Good Christmas and a Happy New Year. In this issue we have the final wrap-up of AUUG93, including the AGM and the details of where your money went. Unfortunately, AUUG these days has activities all the time, no sooner have we finished the winter conference, then we have the announcement of the summer conferences. This year, as an added attraction, we have obtained the services of Kirk McKusick to run tutorials in conjunction .with many of these conferences. The Summer Conferences are a major activity for the technically minded members, so you should get behind it by submitting papers and other tutorial topics for presentation. Also included in this issue are the usual topics, such as chapter activities, book reviews, and papers (from previous summer conferences). One item to note in particular, is the Unifomm NZ conference, to which AUUG is trying organise a contingent. Jagoda Crawford AUUGN Correspondence All correspondence regarding the AUUGN should be addressed to:- AUUGN Editor, Phone: +61 2 717 3885 P.O. Box 366, Fax: +61 2 717 9273 Kensington, N.S.W. 2033. Email: [email protected] AUSTRALIA A UUGN Book Reviews The AUUGN book review editor is Frank Crawford. Anyone interested in reviewing books or with book reviews to submit for publishing in AUUGN please contact Frank. His address can be found on page two of this issue. Remember, that any books you review, you keep. Contributions The Newsletter is published approximately every two months. The deadlines for contributions for the next issues of AUUGN are: Volume 15 No 1 Friday 28th January Volume 15 No 2 Friday 25th March Volume 15 No 3 Friday 27th May Volume 15 No 4 Friday 29th July Volume 15 No 5 Friday .23th September Volume 15 No 6 Friday 25th November Contributions should be sent to the Editor at the above address. I prefer documents to be e-mailed to me, and formatted with troff. I can process ram, me, ms and even man macros, and have tbl, eqn, pic and grap preprocessors, but please note on your submission which macros and preprocessors you are using. If you can’t use tmff, then just plain text or postscript please. Hardcopy submissions should be on A4 with 30 mm margins, and 30 tnm left at the bottom so that the AUUGN footers can be pasted on to the page. Small page numbers printed in the footer area would help. Vol 14 No 6 AUUGN 5 A Major Price/Performance breakthrough in Intelligent I/O Controllers 1/08+ Introducing the new 1/O8+. A low cost intelligent 1/O controller from Specialix, renowned for quality and performance m connectivity solutions. Ideal for small multi-user systems, the 1/O8+ is more than just cost effective, it represents a major breakthrough in price/per- formance. The secret lies in its high power RISC processor architecture, devel- oped spec~ca.tly for data commumcadon applications. This enables the 1/O8+ to deliver a sustained throughput of 19..gKb/sec on all 8 ports simultaneously, with speeds of up
Recommended publications
  • The Design of the Openbsd Cryptographic Framework
    The Design of the OpenBSD Cryptographic Framework Angelos D. Keromytis Jason L. Wright Theo de Raadt Columbia University OpenBSD Project OpenBSD Project [email protected] [email protected] [email protected] Abstract the design of these systems is intended to impede sim- ple, brute-force, computational attacks. This complexity drives the belief that strong security is fundamentally in- Cryptographic transformations are a fundamental build- imical to good performance. ing block in many security applications and protocols. To improve performance, several vendors market hard- This belief has led to the common predilection to avoid ware accelerator cards. However, until now no operating cryptography in favor of performance [22]. However, system provided a mechanism that allowed both uniform the foundation for this belief is often software imple- and efficient use of this new type of resource. mentation [8] of algorithms intended for efficient hard- ware implementation. To address this issue, vendors We present the OpenBSD Cryptographic Framework have been marketing hardware cryptographic acceler- (OCF), a service virtualization layer implemented in- ators that implement several cryptographic algorithms side the kernel, that provides uniform access to accel- used by security protocols and applications. However, erator functionality by hiding card-specific details be- modern operating systems lack the necessary support hind a carefully-designed API. We evaluate the impact to provide efficient access to such functionality to ap- of the OCF in a variety of benchmarks, measuring over- plications and the operating system itself through a all system performance, application throughput and la- uniform API that abstracts away device details. As tency, and aggregate throughput when multiple applica- a result, accelerators are often used directly through tions make use of it.
    [Show full text]
  • Usenetdht: a Low-Overhead Design for Usenet
    UsenetDHT: A low-overhead design for Usenet Emil Sit, Robert Morris, and M. Frans Kaashoek MIT CSAIL Abstract traction of Usenet is the incredible diversity and volume of content that is available. Usenet is a popular distributed messaging and file sharing ser- vice: servers in Usenet flood articles over an overlay network to Usenet is highly popular and continues to grow: one fully replicate articles across all servers. However, replication Usenet provider sees upwards of 40,000 readers reading at of Usenet’s full content requires that each server pay the cost of an aggregate 20 Gbit/s [35]. Several properties contribute receiving (and storing) over 1 Tbyte/day. This paper presents the to Usenet’s popularity. Because Usenet’s design [1, 19] design and implementation of UsenetDHT, a Usenet system that aims to replicate all articles to all interested servers, any allows a set of cooperating sites to keep a shared, distributed Usenet user can publish highly popular content without copy of Usenet articles. UsenetDHT consists of client-facing the need to personally provide a server and bandwidth. Usenet NNTP front-ends and a distributed hash table (DHT) that Usenet’s maturity also means that advanced user inter- provides shared storage of articles across the wide area. This faces exist, optimized for reading threaded discussions or design allows participating sites to partition the storage burden, streamlining bulk downloads. However, providing Usenet rather than replicating all Usenet articles at all sites. service can be expensive: users post over 1 Tbyte/day of UsenetDHT requires a DHT that maintains durability despite transient and permanent failures, and provides high storage per- new content that must be replicated and stored.
    [Show full text]
  • Interview with Mary Ann Horton RIK FARROWPROGRAMMING
    Interview with Mary Ann Horton RIK FARROWPROGRAMMING Mary Ann Horton has been a met Mary Ann Horton at USENIX ATC ’19 in Seattle. I didn’t know who UNIX developer and sysadmin she was, but somehow discovered that she worked on the control systems since 1977. She contributed to for the grid in the San Diego area, and we exchanged email addresses so Berkeley UNIX, creating the I we could continue the conversation. Later, I read her Wikipedia page [1] and first email attachments and enhancing vi. Her PhD dissertation at Berkeley learned much more about her. led to IDE editors that check your program for Rik Farrow: You have been working with UNIX since its earliest days. errors. While at Bell Labs, she led the UUCP Mapping Project and brought .com domains Mary Ann Horton: I fell in love with UNIX earning my master’s degree at Wisconsin in to UUCP email. She led the growth of Usenet, 1977, but my big break came in 1978 when I transferred to Berkeley for my PhD. We got a an early social media network, in the early VAX, initially with VMS, but quickly changed to UNIX 32/V. There were many amazing grad 1980s. Her EMS email system allowed email students contributing tools to BSD, and it was a treat to get to be part of this effort. It seemed addressing by database query. As a transgender like about half the code was written by Bill Joy, including vi. I got to enhance vi, nurture activist in the 1990s, she convinced Lucent it, and port it to all sorts of UNIX clones.
    [Show full text]
  • Proceedings of the 12Th USENIX Security Symposium
    USENIX Association Proceedings of the 12th USENIX Security Symposium Washington, D.C., USA August 4–8, 2003 THE ADVANCED COMPUTING SYSTEMS ASSOCIATION © 2003 by The USENIX Association All Rights Reserved For more information about the USENIX Association: Phone: 1 510 528 8649 FAX: 1 510 548 5738 Email: [email protected] WWW: http://www.usenix.org Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Preventing Privilege Escalation Niels Provos Markus Friedl Peter Honeyman CITI, University of Michigan GeNUA CITI, University of Michigan Abstract gain extra privilege after successful authentication lim- its the degree of escalation because the user is already Many operating system services require special priv- authorized to hold some privilege. On the other hand, ilege to execute their tasks. A programming error in a a remote adversary gaining superuser privilege with no privileged service opens the door to system compromise authentication presents a greater degree of escalation. in the form of unauthorized acquisition of privileges. In For services that are part of the critical Internet the worst case, a remote attacker may obtain superuser infrastructure is it particularly important to protect privileges. In this paper, we discuss the methodology against programming errors. Sometimes these services and design of privilege separation, a generic approach need to retain special privilege throughout their life- that lets parts of an application run with different levels time. For example, in SSH, the SSH daemon needs to of privilege.
    [Show full text]
  • USENIX Board of Directors Interview with Clem Cole ;Login
    NOTES USENIX Board of Directors ;login: Enters a New Phase Interview with Clem Communicate directly with the USENIX of Its Evolution Cole Board of Directors by writing to board@ Cat Allman, Rik Farrow, Casey Henderson Rik Farrow Arvind Krishnamurthy, and Laura Nolan usenix.org. Clem Cole is an old school hacker For over 20 years, ;login: has been a print and “Open Sourcerer” with more PRESIDENT magazine with a digital version; in the two than 45 years of free and open source system Amy Rich, Redox decades previous, it was USENIX’s news- development experience. Clem has held practically [email protected] letter, UNIX News. Since its inception 45 every position in the computer field from operator, VICE PRESIDENT years ago, it has served as a medium through programmer, and designer to VP of Engineering, Arvind Krishnamurthy, University which the USENIX community learns about CTO, and startup founder. He first encountered of Washington useful tools, research, and events from one the early editions of UNIX in the 1970s while at [email protected] another. Beginning in 2021, ;login: will Carnegie Mellon University, later doing his graduate SECRETARY no longer be the formally published print work at the University of California, Berkeley. He Kurt Andersen, LinkedIn magazine as we’ve known it most recently, has been designing and developing operating [email protected] but rather reimagined as a digital publica- systems and technical computing systems ever tion with increased opportunities for inter- since, currently leading an international team of TREASURER activity among authors and readers. engineers. He helped to write one of the original Kurt Opsahl, Electronic Frontier Foundation TCP/IP implementations in the late 1970s, and is [email protected] Since USENIX became an open access pub- known as one the authors of the precursor to IM, lisher of papers in 2008, ;login: has remained DIRECTORS the UNIX talk program, as well as other more Cat Allman, Google our only content behind a membership humorous and notorious hacks.
    [Show full text]
  • User Groups, Conferences, and Workshops PETERHISTORY H
    User Groups, Conferences, and Workshops PETERHISTORY H. SALUS Peter H. Salus is the author of ser groups go back to the beginning of “mass”-produced computers A Quarter Century of UNIX in 1953–54. In this column, I sketch that history, starting with (1994), Casting the Net (1995), mainframe groups that shared code and tips, up to the founding (and and The Daemon, the Gnu and U the Penguin (2008). naming) of USENIX and its conferences and workshops. [email protected] The first commercial computer, the IBM 701, wasn’t completed until late in 1952. The first production machine was shipped from Poughkeepsie to IBM headquarters in Manhattan that December. Prior to the 701, all computers—Aiken’s, Wilkes’, ENIAC, etc.—had been one-offs; each was sui generis. The 701 was a genuine breakthrough, and IBM built 18 of them! (By way of comparison, Apple announced that it had sold a total of 19 million Macs over fiscal 2014.) On May 7, 1954, the redesigned 701 was announced as the IBM 704. It was more than merely a redesign. The 704 was incompatible with the 701. It had 4096 words of magnetic-core memory. It had three index registers. It employed the full, 36-bit word (as opposed to the 701’s 18-bit words). It had floating-point arithmetic. It could perform 40,000 instructions per second. While deliveries began in late 1955, the operators (today we would think of them as system admin- istrators) of the eighteen 701s were already fretful months earlier. IBM itself had no solution to the problem.
    [Show full text]
  • Visualizing Web Sessions: Improving Web Browser History by a Better
    ii Visualizing Web Sessions: Improving Web Browser History by a Better Understanding of Web Page Revisitation and a New Session- and Task-Based, Visual Web History Approach Matthias Mayer 2007 University of Hamburg ii Universität Hamburg Department Informatik University of Hamburg Department of Informatics Dissertation zur Erlangung des Grades des Doktors der Naturwissenschaften, eingereicht am Department Informatik der Universität Hamburg. Dissertation in the Department of Informatics submitted to the faculty in partial fulfillment of the requirements for the degree of »Doctor rerum naturalium« at the University of Hamburg. Gutachter | Reviewers: Prof. Dr. Benjamin B. Bederson, University of Maryland, USA Prof. Dr. Horst Oberquelle, Universität Hamburg, Deutschland Prof. Dr. Christopher Habel, Universität Hamburg, Deutschland Tag der Disputation | day of disputation: 12. Dezember 2007 iii Widmung | Dedication Meiner Mutter Esther, meinem Vater Karl, meiner Schwester Gabriele. In großer Dankbarkeit. I am grateful to my mother, Esther, my father, Karl, my sister, Gabriele. iv Zusammenfassung Bei der Benutzung des World Wide Web spielen verschiedene Arten des Wiederbe- suchs von Webseiten (Revisit) eine wesentliche Rolle. Kurzzeit-Revisits entstehen häufig beim Explorieren von Websites und von Suchergebnis-Listen. Mittelfristig entstehen Revisits vorwiegend durch die Wiederbenutzung bevorzugter Werkzeuge und durch das Beobachten von Seiten, deren Inhalt sich häufig ändert. Langzeit- Revisits entstehen vor allem durch das erneute Lesen spezifischen Inhalts nach eini- ger Zeit. Die heute verfügbaren History-Werkzeuge wie der Zurück-Knopf (Back Button), Lesezeichen (Bookmarks), Verlauf (History List) und die automatische Vervollständigung einer Adresse (Auto-Complete) bilden ein heterogenes Umfeld unterschiedlichster Ansätze, die alle ihre eigenen Methoden des Zugriffs auf die persönliche Web-History bieten und mit den verschiedensten Benutzungsschnitt- stellen ausgestattet sind.
    [Show full text]
  • Usenix Notes 55
    USENIX BOARD OF DIRECTORS Years and Years Ago Communicate directly with the USENIX Board of Directors by Peter H. Salus writing to [email protected]. [email protected] 2005! PRESIDENT Think about it! USENIX Michael B. Jones, Fifty years ago, 1955, IBM encour- [email protected] aged the first meeting of “users”— notes operators of the new 704—I guess, the first LISA. Also in 1955, VICE PRESIDENT USENIX MEMBER BENEFITS AT&T/Western Electric submitted Members of the USENIX Associa- Clem Cole, to the consent decree that, among tion receive the following benefits: [email protected] other things, barred them from entering any business other than FREE SUBSCRIPTION to ;login:, the Associ- telephony or telegraphy (when was ation’s magazine, published six times SECRETARY the last time you sent or received a a year, featuring technical articles, Alva Couch, system administration articles, tips telegram?). [email protected] and techniques, practical columns on A decade later, 1965. The Multics such topics as security, Perl, Java, and project has gotten underway. CTSS operating systems, book reviews, and TREASURER and DTS on the DEC-10 are the big summaries of sessions at USENIX thing. IBM is just coming out with conferences. Theodore Ts’o, [email protected] the 360. ACCESS TO ;LOGIN: online from October 1975! Big time. The Labs have 1997 to this month: www.usenix.org/publications/login/. DIRECTORS come out with V6. The “UNIX Users’ Group” (linear parent of ACCESS TO PAPERS from USENIX confer- Matt Blaze, USENIX) has met (nearly two ences online: [email protected] dozen in attendance!) and is brac- www.usenix.org/publications/ Jon “maddog” Hall, ing itself for another—publi- library/proceedings/ [email protected] cized—meeting to be held 18 June.
    [Show full text]
  • Cryptographic Device Support for Freebsd Samuel J
    Cryptographic Device Support for FreeBSD Samuel J. Leffler Errno Consulting [email protected] ABSTRACT FreeBSD recently adopted the OpenBSD Cryptographic Framework [Keromytis et al, 2003]. In doing so it was necessary to convert the core framework to function correctly in a fully-preemp- tive/multiprocessor operating system environment. In addition several issues with the basic design were found to cause significant performance loss. After addressing these issues we found that FreeBSD outperformed OpenBSD on identical hardware by as much as 100% in tests that exercise only the cryptographic framework. These optimizations result in similar performance improvements for facilities like IPsec that make heavy use of the cryptographic framework. We observed that FreeBSD’s Fast IPsec [Leffler, 2003] typically outperforms OpenBSD’s IPsec implementation [Miltchev et al, 2002] by more than 50% on identical hardware. We conclude that the OCF cryptographic API can be optimized and re-tuned to deliver substan- tially better performance than the original OCF implementation with large gains in both through- put and latency. Moreover these changes can be made with no impact on clients of the crypto- graphic framework: both user and kernel sofware designed for the original OCF is easily ported to the FreeBSD implementation of OCF. 1. Background and Introduction • The OCF was designed for a uniprocessor system Cryptographic transformations are an important com- without kernel preemption. The FreeBSD 5.0 ponent of security applications and protocols. operating system has fine-grained locking and the Because these operations are computationally expen- kernel is fully preemptive. This required a rewrite sive vendors have dev eloped products that accelerate of the core crypto functionality.
    [Show full text]
  • Unix: a View from the Field As We Played the Game
    111 Témoignage / Testimony Unix: A View from the Field as We Played the Game Clement T. Cole Intel Corporation. UNIX is a classic example of a the economics in a virtuous circle as this “Christensen Disruptive Technology.” It was community developed into a truly global one. a cost-effective solution, produced at the I will trace a little of the history of a small right time, built by researchers at AT&T for newsletter to today’s USENIX Association Abstract themselves, and was not originally considered and some of its wider social impact.. seriously by its competition. The UNIX Operating System had simple goals. It ran Keywords: UNIX; history of UNIX; on modest hardware, and was freely shared operating systems; open system; disruptive as a result of AT&T legal requirements. As innovation. a result, a new computing customer developed, a different one than was being targeted by the large firms of the day. UNIX was targeted at the academically-inclined; it was economically accessible, and since its Intellectual Property (IP) was published in the open literature and implementation was available to the academic community fundamentally without restriction, the IP was thus “free” and able to be examined/ discussed/manipulated/abused by the target users. While its creators wrote UNIX for themselves, because they freely shared it with the wider community, that sharing fed on A Brief Personal History The point is that when UNIX was originally written, the purchasers of com- In the mid-1970s I was a student puting equipment were not primarily made at Carnegie Mellon University (CMU), up of the actual programmers of the com- studying Electrical Engineering and puting system.
    [Show full text]