SlideShare a Scribd company logo
Fatma Al Falasi
10BG
 Everything is a file. ( Including hardware )
 Small, single-purpose programs.
 Ability to chain programs together to perform
complex tasks.
 Avoid captive user interfaces.
 Configuration data stored in text.
 UNIX systems have many powerful utilities
designed to create and manipulate files. The
UNIX security model is based around the
security of files. By treating everything as a file,
a consistency emerges. You can secure access to
hardware in the same way as you secure access
to a document.
 UNIX provides many small utilities that
perform one task very well. When new
functionality is required, the general
philosophy is to create a separate program –
rather than to extend an existing utility with
new features.
 A core design feature of UNIX is that the
output of one program can be the input for
another. This gives the user the flexibility to
combine many small programs together to
p.erform a larger, more complex task.
 Interactive commands are rare in UNIX. Most
commands expect their options and arguments
to be typed on the command line when the
command is launched. The command
completes normally, possibly producing
output, or generates an error message and
quits. Interactivity is reserved for programs
where it makes sense, for example, text editors
(of course, there are non-interactive text editors
too.)
 Text is a universal interface, and many UNIX
utilities exist to manipulate text. Storing
configuration in text allows an administrator to
move a configuration from one machine to
another easily. There are several revision
control applications that enable an
administrator to track which change was made
on a particular day, and provide the ability to
roll back a system configuration to a particular
date and time.
There are nine major tenets to the Linux philosophy:
 Small is Beautiful
 Each Program Does One Thing Well
 Prototype as Soon as Possible
 Choose Portability Over Efficiency
 Store Data in Flat Text Files
 Use Software Leverage
 Use Shell Scripts to Increase Leverage and
Portability
 Avoid Captive User Interfaces
 Make Every Program a Filter
 I The user should know better.....so he must specify
how things work
 I Provide mechanisms, not policy
 I Mechanism: long life time
 I Policy: short life time
 I Its not friendly, but its efficient
 I Don’t confuse ease of use with efficiency
 I Pedestrian OS’es achieve glossiness by locking
users into one
 interface policy. Its narrow, rigid and works well
for a fixed set of
 jobs. But, unanticipated tasks are often impossible
of very painful.
 I Easy things are easy, hard things are possible
 I Linux provides a large set of simple tools...
 which can be connected with well specified
interfaces...
 which are usually textual data streams.
 I No one big tool is smart enough to handle all cases
or optimized for
 everything or can anticipate all the uses to which it
may be put.
 I Its a big tool box, and a lumberyard full of lumber
 I We get a big say in what gets built and how its
structured
 I Its a plus for us. We’re engineers. We build stuff.
 I Button pushers are easily replaced, craft your
own tools
 I We are being groomed to be consumers
 I Resist and be creators of new things

The Unix philosophy lies at the core of not only
the original UNIX as developed by Ken
Thompson at Bell Labs from 1969 but also of its
numerous direct descendants and clones,
including Solaris, the BSDs and Linux. It has
made them, collectively referred to as Unix-
like operating systems, into what are widely
considered to be the best operating systems to
have been developed to date, despite the fact
that they are by far the oldest operating
systems in widespread use, and it has been a
major factor in the rapid growth and
increasing success of Linux.
The End

More Related Content

Similar to Linux principles and philosophy

Linux principles and philosophy
Linux principles and philosophy Linux principles and philosophy
Linux principles and philosophy
salamassh
 
Program design in the UNIX environment
Program design in the UNIX environmentProgram design in the UNIX environment
Program design in the UNIX environment
mustafa sarac
 
Linuxppt.pptx
Linuxppt.pptxLinuxppt.pptx
Linuxppt.pptx
Ashimann2108
 
Linux and Java - Understanding and Troubleshooting
Linux and Java - Understanding and TroubleshootingLinux and Java - Understanding and Troubleshooting
Linux and Java - Understanding and Troubleshooting
Jérôme Kehrli
 
Linux os and its features
Linux os and its featuresLinux os and its features
Linux os and its features
Kadiresan Nagarattiname
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
Avnish Khandelwal
 
Wk2 UNIX
Wk2  UNIXWk2  UNIX
Wk2 UNIX
kkdiener
 
CHAPTER 1 INTRODUCTION TO UNIX.pptx
CHAPTER 1 INTRODUCTION TO UNIX.pptxCHAPTER 1 INTRODUCTION TO UNIX.pptx
CHAPTER 1 INTRODUCTION TO UNIX.pptx
MahiDivya
 
Linux operating system - Overview
Linux operating system - OverviewLinux operating system - Overview
Linux operating system - Overview
Ashita Agrawal
 
UNIT I LINUX.docx
UNIT I LINUX.docxUNIT I LINUX.docx
UNIT I LINUX.docx
BhuvanaR13
 
Shamsa altayer
Shamsa altayerShamsa altayer
Shamsa altayer
shamsaot
 
Introduction to unix (1).pptx
Introduction to unix (1).pptxIntroduction to unix (1).pptx
Introduction to unix (1).pptx
virat834293
 
Linux operating system
Linux operating systemLinux operating system
Linux operating system
Mohamed Essam
 
Jaringan, Linux, Docker
Jaringan, Linux, DockerJaringan, Linux, Docker
Jaringan, Linux, Docker
SatrioBudi10
 
Best Operating System
Best Operating SystemBest Operating System
Best Operating System
Daily Dot
 
Nt1330 Unit 4.3 Assignment 1
Nt1330 Unit 4.3 Assignment 1Nt1330 Unit 4.3 Assignment 1
Nt1330 Unit 4.3 Assignment 1
Amanda Reed
 
Linux Operating System (Graduate Level CIS Term Paper)
Linux Operating System (Graduate Level CIS Term Paper)Linux Operating System (Graduate Level CIS Term Paper)
Linux Operating System (Graduate Level CIS Term Paper)
Carla Bennington
 
Linux v/s Windows
Linux v/s WindowsLinux v/s Windows
Linux v/s Windows
Sukhdeep Singh
 
ppt on linux by MUKESH PATEL
ppt on linux by MUKESH PATELppt on linux by MUKESH PATEL
ppt on linux by MUKESH PATEL
neo_patel
 
A Roadmap for Students Using FOSS (Free and Open Source Software) and Reachin...
A Roadmap for Students Using FOSS (Free and Open Source Software) and Reachin...A Roadmap for Students Using FOSS (Free and Open Source Software) and Reachin...
A Roadmap for Students Using FOSS (Free and Open Source Software) and Reachin...
PK Mishra
 

Similar to Linux principles and philosophy (20)

Linux principles and philosophy
Linux principles and philosophy Linux principles and philosophy
Linux principles and philosophy
 
Program design in the UNIX environment
Program design in the UNIX environmentProgram design in the UNIX environment
Program design in the UNIX environment
 
Linuxppt.pptx
Linuxppt.pptxLinuxppt.pptx
Linuxppt.pptx
 
Linux and Java - Understanding and Troubleshooting
Linux and Java - Understanding and TroubleshootingLinux and Java - Understanding and Troubleshooting
Linux and Java - Understanding and Troubleshooting
 
Linux os and its features
Linux os and its featuresLinux os and its features
Linux os and its features
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
 
Wk2 UNIX
Wk2  UNIXWk2  UNIX
Wk2 UNIX
 
CHAPTER 1 INTRODUCTION TO UNIX.pptx
CHAPTER 1 INTRODUCTION TO UNIX.pptxCHAPTER 1 INTRODUCTION TO UNIX.pptx
CHAPTER 1 INTRODUCTION TO UNIX.pptx
 
Linux operating system - Overview
Linux operating system - OverviewLinux operating system - Overview
Linux operating system - Overview
 
UNIT I LINUX.docx
UNIT I LINUX.docxUNIT I LINUX.docx
UNIT I LINUX.docx
 
Shamsa altayer
Shamsa altayerShamsa altayer
Shamsa altayer
 
Introduction to unix (1).pptx
Introduction to unix (1).pptxIntroduction to unix (1).pptx
Introduction to unix (1).pptx
 
Linux operating system
Linux operating systemLinux operating system
Linux operating system
 
Jaringan, Linux, Docker
Jaringan, Linux, DockerJaringan, Linux, Docker
Jaringan, Linux, Docker
 
Best Operating System
Best Operating SystemBest Operating System
Best Operating System
 
Nt1330 Unit 4.3 Assignment 1
Nt1330 Unit 4.3 Assignment 1Nt1330 Unit 4.3 Assignment 1
Nt1330 Unit 4.3 Assignment 1
 
Linux Operating System (Graduate Level CIS Term Paper)
Linux Operating System (Graduate Level CIS Term Paper)Linux Operating System (Graduate Level CIS Term Paper)
Linux Operating System (Graduate Level CIS Term Paper)
 
Linux v/s Windows
Linux v/s WindowsLinux v/s Windows
Linux v/s Windows
 
ppt on linux by MUKESH PATEL
ppt on linux by MUKESH PATELppt on linux by MUKESH PATEL
ppt on linux by MUKESH PATEL
 
A Roadmap for Students Using FOSS (Free and Open Source Software) and Reachin...
A Roadmap for Students Using FOSS (Free and Open Source Software) and Reachin...A Roadmap for Students Using FOSS (Free and Open Source Software) and Reachin...
A Roadmap for Students Using FOSS (Free and Open Source Software) and Reachin...
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Linux principles and philosophy

  • 2.  Everything is a file. ( Including hardware )  Small, single-purpose programs.  Ability to chain programs together to perform complex tasks.  Avoid captive user interfaces.  Configuration data stored in text.
  • 3.  UNIX systems have many powerful utilities designed to create and manipulate files. The UNIX security model is based around the security of files. By treating everything as a file, a consistency emerges. You can secure access to hardware in the same way as you secure access to a document.
  • 4.  UNIX provides many small utilities that perform one task very well. When new functionality is required, the general philosophy is to create a separate program – rather than to extend an existing utility with new features.
  • 5.  A core design feature of UNIX is that the output of one program can be the input for another. This gives the user the flexibility to combine many small programs together to p.erform a larger, more complex task.
  • 6.  Interactive commands are rare in UNIX. Most commands expect their options and arguments to be typed on the command line when the command is launched. The command completes normally, possibly producing output, or generates an error message and quits. Interactivity is reserved for programs where it makes sense, for example, text editors (of course, there are non-interactive text editors too.)
  • 7.  Text is a universal interface, and many UNIX utilities exist to manipulate text. Storing configuration in text allows an administrator to move a configuration from one machine to another easily. There are several revision control applications that enable an administrator to track which change was made on a particular day, and provide the ability to roll back a system configuration to a particular date and time.
  • 8.
  • 9. There are nine major tenets to the Linux philosophy:  Small is Beautiful  Each Program Does One Thing Well  Prototype as Soon as Possible  Choose Portability Over Efficiency  Store Data in Flat Text Files  Use Software Leverage  Use Shell Scripts to Increase Leverage and Portability  Avoid Captive User Interfaces  Make Every Program a Filter
  • 10.  I The user should know better.....so he must specify how things work  I Provide mechanisms, not policy  I Mechanism: long life time  I Policy: short life time  I Its not friendly, but its efficient  I Don’t confuse ease of use with efficiency  I Pedestrian OS’es achieve glossiness by locking users into one  interface policy. Its narrow, rigid and works well for a fixed set of  jobs. But, unanticipated tasks are often impossible of very painful.  I Easy things are easy, hard things are possible
  • 11.  I Linux provides a large set of simple tools...  which can be connected with well specified interfaces...  which are usually textual data streams.  I No one big tool is smart enough to handle all cases or optimized for  everything or can anticipate all the uses to which it may be put.  I Its a big tool box, and a lumberyard full of lumber  I We get a big say in what gets built and how its structured  I Its a plus for us. We’re engineers. We build stuff.
  • 12.  I Button pushers are easily replaced, craft your own tools  I We are being groomed to be consumers  I Resist and be creators of new things
  • 13.  The Unix philosophy lies at the core of not only the original UNIX as developed by Ken Thompson at Bell Labs from 1969 but also of its numerous direct descendants and clones, including Solaris, the BSDs and Linux. It has made them, collectively referred to as Unix- like operating systems, into what are widely considered to be the best operating systems to have been developed to date, despite the fact that they are by far the oldest operating systems in widespread use, and it has been a major factor in the rapid growth and increasing success of Linux.
  • 14.