The document provides an introduction to operating systems, covering their basic functions and components. It discusses how operating systems manage hardware resources and provide abstraction for applications. The key components described include the kernel, drivers, utilities, and applications/processes. It also covers process scheduling, file systems, APIs/system calls, memory management, and popular operating systems like IBM z/OS, IBM i, and OpenVMS.
PowerPoint Presentation on Distributed Operating Systems,reasons for opting for distributed systems over centralized systems,types of Distributed Systems,Process Migration and its advantages.
Operating system 02 os as an extended machineVaibhav Khanna
Functions performed by the
operating systems:
Managing the hardware resources of the
computer
Providing the user-interface components
Providing a platform for software developers
to write applications
PowerPoint Presentation on Distributed Operating Systems,reasons for opting for distributed systems over centralized systems,types of Distributed Systems,Process Migration and its advantages.
Operating system 02 os as an extended machineVaibhav Khanna
Functions performed by the
operating systems:
Managing the hardware resources of the
computer
Providing the user-interface components
Providing a platform for software developers
to write applications
Functions of Operating Systems:
Types of Operating Systems:
Real-Time Operating Systems
Single-User/Single-Tasking Operating Systems
Single-User/Multitasking Operating Systems
Multi-User/Multitasking Operating Systems
User Interface
Graphical User Interface (GUI)
Command-Line Interface
Running Programs
Managing Hardware
Operating system basics provides new comers in IT to help understanding basic concepts of operating systems and errors, programs, manage hardware devices
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 5 - System ...yaminohime
Objectives
- Understand the difference between system software and application software.
- Explain the different functions of an operating system and discuss some ways that operating systems can enhance processing efficiency.
- List several ways in which operating systems differ from one another.
- Name today’s most widely used operating systems for personal computers and servers.
-State several devices other than personal computers and servers that require an operating system and list one possible operating system for each type of device.
- Discuss the role of utility programs and outline several tasks these programs perform.
- Describe what the operating systems of the future might be like.
An operating system (OS) is a set of computer programs that manages the hardware and software resources of the computer.
For more such innovative content on management studies, join WeSchool PGDM-DLP Program: http://bit.ly/ZEcPAc
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
2. Introduction
• An operating system is
the set of programs
that, after being initially
loaded into a computer
by a boot program,
controls all the other
programs in a computer
3. Introduction
• Operating systems manage a computer’s internal workings
– Memory
– Processors
– Internal and peripheral devices
– File system
• Operating systems are used on for instance::
– PCs and laptops
– Virtual machines
– Servers
– Tablets and mobile phones
– Network routers
– Storage arrays
– Cars
– Televisions
4. Introduction
• Operating systems provide an abstraction layer
between (virtualized or physical) hardware and
software applications
• As a service to applications, low level hardware
management is handled by the operating system
– Process management
– Memory management
– Interrupt handling
– Multi user management
– File locking and file sharing
5. Introduction
• Operating systems provide services to
applications in the form of Application
Programming Interfaces (APIs)
• For example for:
– File management
– I/O interfaces (like video and keyboard)
– Hardware drivers (like printer drivers)
6. History
• Early operating systems could execute one program at
a time
• At any given time, one user had sole use of the
computer
• Through the 1950s, many major features were
pioneered in the field of operating systems, including
multitasking
• During the 1960s, IBM introduced a single operating
system (OS/360) for all of its mainframes
• In 1969, UNIX was created
– UNIX used a file system with directories
– Standard POSIX system calls
7. History
• An early operating systems for personal
computers was CP/M
– CP/M introduced drive letters (c:), but no directories
• Parts of CP/M and UNIX were imitated in MS-DOS
– Drive letters and directory structures
– System calls
– MS-DOS became extremely popular when chosen as
the default operating system for the IBM PC
• The most popular operating systems running on
servers today are Microsoft Windows, Linux, and
UNIX
9. Operating System building blocks
• An operating system basically performs two
basic operations:
– It enables multiple users, multiple processes, and
multiple applications to run together on a single
piece of hardware
– It hides the technical complexities of the
underlying hardware from the applications
running on top of the operating system
10. Operating System building blocks
• The kernel is the heart of an
operating system
– Starts and stops programs
– Manages the file system
– Performs low level tasks that
most programs need
• The kernel schedules access to
hardware to avoid conflicts if
two programs try to access the
same resource or device
simultaneously
11. Operating System building blocks
• Drivers are small applications that
connect specific hardware devices to
the kernel
– Printers
– Network cards
– Keyboard and mouse
– Video screens
• Utilities are applications that are
considered part of the operating
system
– User interfaces
– Logging tools
– Editors
– System update processes
12. Operating System building blocks
• Applications consist of one or
more processes that communicate
with the operating system using
system calls that are invoked
through Application Programming
Interfaces (APIs)
13. Process scheduling
• Operating systems create the illusion of multiple
running processes in parallel by scheduling each
process to run only during a short time frame
– This principle is also known as preemptive multitasking
– Periodically, the operating system decides if a running
process is to be suspended in favor of another process, or
if the running process can keep on running for a while
• Process scheduling is fairly complex
– Must be well-balanced
– Switching processes introduces some overhead
– The scheduling algorithm guarantees each process gets
its fair share of CPU time
– Because operating systems have evolved over decades,
scheduling algorithms are very sophisticated
14. File systems
• The operating system provides a file system
to applications
– File systems usually consist of directories (also
known as folders) with files or other directories
• The operating system hides complexity
– Handling individual disk blocks or communication
with a SAN or NAS
– Managing the files and the directory structure
– Security – permission to read, write, create, and
delete files and directories
15. File systems
• Most operating systems can handle multiple
types of file systems on multiple disks at the
same time
• Some popular file systems are:
– FAT (File Allocation Table), vFAT, and FAT32, used in
MS-DOS, older versions of Windows, and removable
storage devices like USB memory sticks
– NTFS (New Technology File System) used in Windows
– UFS (Universal File System) and VxFS (Veritas File
System) used in most UNIX flavors
– Ext (and Ext2, Ext3, Ext4) - used in Linux
16. File systems
• Journaling file systems keep track of changes made to files
in a journal log before committing them to the main file
system
– Higher availability
– Fast recovery in case of a malfunction
• File systems must be mounted before they can be used by
the operating system
– A disk and the file system on it must be recognized by the
operating system and attached to it
• After mounting, the file system is typically given either:
– A drive letter (Windows)
– A drive name (OpenVMS)
– A mount point in the global directory tree (UNIX and Linux)
17. File systems
• Most operating systems provide file sharing
functionality
– File sharing enables files on one system to be
accessed by (users on) other systems
– File sharing protocols:
• NFS: originates from UNIX
• SMB/CIFS: originates from Windows
18. APIs and system calls
• System calls are programming functions
– Provide a hardware-independent interface to tasks
the operating system can perform for applications
• Example:
int read(int handle, void *buffer, int
nbyte);
translates into the system call
READ(FILEHANDLE, DESTINATION DATA
POINTER, NUMBER_OF_BYTES)
19. APIs and system calls
• The operating system takes care of:
– Looking-up the file in a file allocation table
– Looking up the disk blocks on disk
– Instructing the disk controller to fetch the
needed disk blocks
– Copy the disk blocks to memory
– Providing a pointer to the disk blocks in memory
20. APIs and system calls
• System calls are grouped and presented to
application processes as Application
Programming Interfaces (APIs)
• APIs describe the available system calls in an
operating system and how they can be used
by programmers in their applications
• Each operating system has its own API
– UNIX and Linux use the POSIX standard
– Windows has its own API
21. Device drivers
• The operating system
manages all hardware
• I/O devices are controlled
using device drivers
– Pieces of software that
interact with the device's
hardware (like an Ethernet
network adapter or a SAS
disk adapter)
– They provide an Application
Programming Interface (API)
to the operating system
22. Memory management
• The operating system:
– Allocates and de-allocates memory on behalf of applications
– Manages what happens when the amount of requested
memory exceeds the physical amount of memory
• Memory management includes:
– Cache management
– Paging
– High volume data transfers
– Memory management units (MMUs)
– Thin memory provisioning (memory overcommitting)
– Direct Memory Access (DMA)
• The operating system takes care of all of this and just
provides chunks of memory to applications
23. Shells, CLIs and GUIs
• A shell provides a user interface to the operating
system
– The primary purpose of shells is to launch other programs,
started by end users or scripts
• Two types of shells:
– Command-Line Interfaces (CLIs)
• The user types commands on a keyboard on a command-prompt
• Examples: UNIX shells (bash, sh, csh) and Windows’ cmd.exe (also
known as a DOS box)
– Graphical User Interfaces (GUIs)
• The user uses a mouse to click on icons or buttons
• Examples Microsoft Windows and X Windows (UNIX and Linux)
24. Operating system configuration
• The configuration of an operating system is
stored in an operating system specific database
or in text files
• Examples:
– Windows registry
– Files in the Linux /etc directory
– AIX Object Data Manager (ODM) database
• For most used configuration parameters, user-
friendly tools are provided
– These tools still edit the text files, but that is hidden
from the user
26. IBM z/OS
• The most used mainframe operating system
• Extreme backward compatibility is one of z/OS's
main design philosophies
– Programs written for MVS in 1974 can still run on
today's z/OS without modification
• Typical use of z/OS:
– Batch processing: reading and writing large amounts
of data and performing relatively simple calculations
on it
– Interactive users: supports thousands of interactive
users
27. IBM i (OS/400)
• IBM i is an operating system only used on IBM's Power
Systems midrange systems
– The operating system was previously known as OS/400
– The midrange system was previously known as AS/400
• One of the biggest advantages of IBM i is its
completeness, it includes:
– Communications
– Transaction processing
– Relational database manager
– Features for the implementation and maintenance of data
security
• The latest version is "IBM i 7.2“, released in 2014
28. OpenVMS
• OpenVMS is an operating system developed by
DEC
– VMS means Virtual Memory System
– OpenVMS is now maintained by VMS Software, Inc.
• OpenVMS is a multi-user operating system
designed for:
– Time sharing
– Batch processing
– Real-time processing
– Transaction processing
• OpenVMS is not open source software
– The source listings are available for purchase
29. OpenVMS
• OpenVMS is typically used in environments
where system uptime and data access is critical
• It is used for various applications, including:
– Mail servers
– Network services
– Manufacturing
– Transportation control and monitoring
– Critical applications
– Databases
• OpenVMS for HP Integrity servers based on Intel
Itanium 9500 processors was released in 2015
30. UNIX - History
• UNIX is a multitasking, multi-user operating system
• Created by Bell Labs (now AT&T) in 1969
• In 1973, UNIX was rewritten in the new C programming
language
– C was created by the same people that created UNIX
– This made UNIX portable to multiple types of computer
hardware
• In 1982, UNIX was licensed to a number of computer
manufacturers
– Most marketed their own UNIX versions based on the
original UNIX source code
– They adapted the code to meet their own hardware and
software requirements
31. UNIX – vendor versions
• Vendors came up with different names for their UNIX
flavors
• These versions are 90% the same, but have some
minor differences
– Wording of error messages
– The order of commands used to start-up the machine
– The location of certain files
Vendor UNIX flavor
IBM AIX
Oracle/Sun Solaris
HP HP-UX
Apple
Mac OS X (built on FreeBSD,
discussed in the next section)
32. UNIX – vendor versions
• Each flavor needs specific hardware
– HP-UX only runs on HP Integrity systems
– HP systems cannot run for example IBM’s AIX
• Applications running on a particular flavor of
UNIX cannot run on another flavor without (at
least) recompiling
– Software vendors must provide separate versions
of their applications for each flavor of UNIX
33. UNIX – vendor versions
• UNIX has been ported to a wider variety of
machine architectures than any other operating
system
– UNIX is written almost entirely in the C programming
language
– Source code is published
• Many business software today is released on
Linux before being released on the various flavors
of UNIX
– Linux runs on many hardware platforms without
recompiling
– Linux is now more widely used than UNIX
34. UNIX - filesystem
• UNIX popularized the hierarchical file system with
nested subdirectories – the directory tree
• All files and directories appear under the so-
called root directory "/“
– Even if they are stored on different physical disks
• UNIX has no concept of drive letters, like
Windows or DOS
– Drives are mounted on a branch in the directory tree,
providing disk space for that particular branch
– Also removable drives must be mounted in the tree
35. UNIX – system tools
• The UNIX philosophy is to use a large set of small
tools that do only one thing, and do it very well
• To perform complicated tasks, commands can be
combined using a system called pipes
– Pipes feed the output of one command to the input of
another command, without storing the intermediate
result
– For instance, the UNIX command: ls | sort prints
a sorted list of files on the screen
• The pipe sign “|” sends the output of the “ls” command as
input to the “sort” command
• In practice, these chains of piped commands can
get very long and complex
36. Linux - history
• Linux is a free UNIX-like operating system for the x86
platform
• It is not derived from the UNIX source code
• In 1991, Linus Torvalds wanted to explore the multitasking
possibilities of the new Intel 80386 CPU in his PC
• He decided to create a small multitasking, multi-user
operating system with the help of the internet community
• Because of the open source nature of Linux many
developers contributed
– Kernel patches
– Device drivers
– Multilingual keyboards
– Disk drivers
– Support for video card devices
37. Linux
• Linux commands and scripts are almost similar to those of
UNIX
• Linux also uses the same commands, file structure,
scripting language, pipes, etc. as UNIX
• Today Linux is a very mature operating system, used in:
– Servers
– Workstations
– Mobile devices
– All Android smartphones
– Appliances like set-top boxes, firewalls and NAS devices
• Ninety-five per cent of the supercomputers listed in the top
500 list of the fastest computers in the world are running
Linux
• Almost all internet services run on Linux
38. Linux – GNU/Linux
• The GNU project was launched in 1984 by Richard Stallman
– Goal was to develop a free UNIX-like operating system
– GNU is a recursive acronym for “GNU's Not UNIX!”
– By 1990, the GNU project had recreated all the major
components of the UNIX-like system except one – the kernel
• Combining Linux with the GNU system resulted in a
complete operating system: the GNU/Linux system
– It is important to understand that Linux is actually only an
operating system kernel
– Wat we call Linux, is actually GNU/Linux
• Linux and the GNU tools are licensed under the GNU
General Public License
– Ensures all source code will be free for all to copy, study, and to
change
39. Linux – distributions
• Vendors compiled the Linux source code,
added some tools and configurations of their
own, and releasing it in a distributable format
• Some of the best-known Linux distributions:
– Red Hat
– SuSe
– Ubuntu
– Debian
40. Linux - Support
• Linux can be downloaded from the internet
for free
• Most organizations demand professional
support for their software
• Professional support is not free
• Most Linux distribution vendors, like Red Hat
and SuSe, and some independent vendors,
offer support contracts for Linux
41. Linux on mainframes
• Some Linux distributions can be used on IBM
mainframes, running in virtual machines
• Linux uses X-Windows emulators on PCs to
connect to the mainframe
• The emulated LAN on the mainframe can be
used to connect multiple Linux virtual
machines and to provide an external LAN
route
42. BSD
• Berkeley Software Distribution (BSD) is a UNIX
operating system derivative
– Developed and distributed by the University of California,
Berkeley
• BSD was the basis for three open source development
projects:
– FreeBSD
• Most widely used
• FreeBSD is a complete operating system (Linux is only a kernel!)
– NetBSD
• Ported to 57 hardware platforms across 15 different processor
architectures
• Often used in embedded systems
43. BSD
– OpenBSD
• Most secure BSD version
• Has a tradition in which developers audit the source code for
software bugs and security problems
• In the 10+ years of its existence, only three security bugs
have been found in OpenBSD
• Darwin, the system on which Apple's Mac OS X is
built, is a derivative of FreeBSD