Lynne Jolitz's List of Published Works (http://jolitz.telemuse.net/lynne/cv)

Lynne Greer Jolitz has been a founder of startups ranging from workstations to Internet multimedia.

[ Jolitz Heritage ]

Have an opinion? Want/need more? Ask.
Lynne Jolitz, Writer

Lynne is very active in the womens entrepreneur and technology networking groups, and writes on topics of interest to women in high-tech, such as her commissioned front-page business article Paving the Way for 'Systers' appearing in the San Francisco Chronicle(9/15/03). She currently conducts due diligence on technology for investment and works on Internet multimedia community building projects.

Lynne Jolitz's List of Written Works
Lynne Jolitz's Patents and Awards

US6952409: Accelerator system and method. Issue Date: Oct 10, 2005. Lynne G. Jolitz. In a system consisting of a cell phone, wireless network, and a base station, for cell communication packets having a formatted header containing information about the packet, said cell phone comprising a modulator/RF detector and a DSP, the improvement comprising means for transparent bi-directional translation of audio/video protocols into Internet standard protocols, thereby allowing directed attachment to other stream oriented protocol devices without interposed protocol translation while reducing complexity. Filed Jan. 8, 2001 . See also Lynne Jolitz term memory patent and TCP/IP network accelerator system and method which identifies classes of packet traffic for predictable protocols and Term Addressable Memory of an Accelerator System and Method.

US6768992: Term Addressable Memory of an Accelerator System and Method. Grant Date: July 27, 2004. Lynne G. Jolitz. An improved term addressable memory of an accelerator system and method includes a mechanism for performing predetermined plurality of pattern matches of packets to classify them for use with stateful protocol processing units that can resolve session data spread across multiple data packets and process them for the ultimate destination. The invention replaces a conventional content addressable memory (CAM) with a term addressable memory, whereby redundant terms are recorded with a single memory entry. Two classes of terms are recorded with a single memory entry. Two classes of terms are used to match packet addresses and application ports, as well as a much smaller session CAM that matches the aggregate match of all terms to a specific session. Filed Jan. 8, 2001 . See Lynne Jolitz term memory patent and TCP/IP network accelerator system and method which identifies classes of packet traffic for predictable protocols.

Physics Department, University of California at Berkeley, 2003 Alumni Award (October 2003) for her work in behalf of the physics alumni association and outreach.

Oracle E-Business Network, Geek of the Week Award (January 2001) for 386bsd (1991-1995) and SiliconTCP (1997-2001) technologies.
Lynne receives awards for 386bsd and InterProphet

US6173333: TCP/IP network accelerator system and method which identifies classes of packet traffic for predictable protocols. Grant Date: Jan. 9, 2001. Jolitz, et al. InterProphet Corporation . A network accelerator for TCP/IP includes programmable logic for performing network protocol processing at network signaling rates. The programmable logic is configured in a parallel-pipelined architecture controlled by state machines and implements processing for predictable patterns of the majority of transmissions. Incoming packets are compared with patterns corresponding to classes of transmissions which are stored in a content addressable memory, and are simultaneously stored in a dual port, dual bank application memory. The patterns are used to determine sessions to which an incoming IP datagram belongs, and data packets stored in the application memory are processed by the programmable logic. Processing of packet headers is performed in parallel and during memory transfers without the necessity of conventional store and forward techniques resulting in a substantial reduction in latency. Packets which constitute exceptions or which have checksum or other errors are processed in software. Filed July 17, 1998 Jolitz et. al. Provisional application filed Jul 18, 1997 (With ). See InterProphet Corporation for product/company/licensing details. See also Term Addressable Memory of an Accelerator System and Method

Patents pending.

Lynne Jolitz's Recent Articles, Talks and Papers (2003-2005)

August 2005. Byte.com, USA. Innovation After Grokster. Will the Supreme Court's Grokster decision throttle innovation in video search, podcasting, and other emerging technologies?.

June 23, 2005. TechWeb / Security Pipeline, USA. Opinion: Getting "Beyond Fear": A Security Expert's Prescription for A Safer World . Open source pioneer Lynne Jolitz turns a skeptical eye toward airport security, wondering if all the pat-downs and X-rays are good policy. While politicians and the public debate whether the searches are too intrusive, Lynne says that's the wrong question. The real question is whether the searches are cost-effective. Are they the best way we can be spending our security effort and money? (See at "Security Pipeline | Opinion: Getting "Beyond Fear": A Security Expert's Prescription for A Safer World")

May 2005. Byte.com, USA. Search Engine Quirks and Search Engine Jerks. Search engines can seem almost human in their obsessions, preferences, and desires. But it's the real humans who can use search techniques to threaten a site or a business.

January 2005. Byte.com, USA. The Year Ahead.Lynne predicts that 2005 will bring us more spam, less security, and maybe some shake-ups in search—but each of these fields holds opportunity for technical innovation.

November 2004. Byte.com, USA. The Problems of Personalization.Online retailers are crowding onto the "personalization" bandwagon—with humorous and occasionally insulting results.

October 2004. Byte.com, USA. Buffer, Buffer, Where is the Buffer?.With so much of modern technology concerned with buffers, buffering, and the dreaded buffer overflow, Lynne asks: Can we build a better buffer?

September 2004. Dr. Dobbs Journal, USA. Free Culture And the Internet. Lynne Jolitz reviews the book Free Culture by Lawrence Lessig. See also Free Culture and the Internet

July 11-17, 2004. Tech Trek Science, Math, & Computer Camp, Stanford, CA. Girls Just Want to Have Astro Fun. Theory and practice of astronomy and physics in a one-hour powerpoint presentation loaded with cool video of NASA launches and space exploration, plus a bit of the physics of magnitude and distance. Rebecca Jolitz (age 9) demonstrates how to use a Schmidt-Cassagrain (SCT) telescope. Multiple talks. Sponsored by the AAUW. 125 seventh graders attended from all over California.

June 2004. ACM SIGCHI International Conference on Advances in Computer Entertainment Technology (ACE 2004). National University of Singapore, Singapore. Lessons Learned in Massive Video Production (MVP) for University Alumni Outreach. In this paper, we describe lessons learned in creating a Massive Video Production (MVP) mechanism and filmography environment for the University of California at Berkeley. The goal was to provide a university department mandated to expand alumni outreach with personalized university-branded alumni VideoGreetings using a convenient and dynamic alumni outreach tool with modern multimedia production standards coupled with commonplace digital camera raw clips with no intervention on the part of the alumni coordinator and department other than editorial approval of the finished production. The actual mechanism consists of a hosted production engine, filmography and search environment, review and editorial functions, and subscription and protection. See also Lynne Jolitz Invited to Present at ACE2004 and retail version of this service can be found at "MinutePitch - Your Video Screen on the Web!", quick pitch ("Just Add Message ... That Easy!"), with details of what it provides ("What does MinutePitch do for you?"), what it does for you("Get the Most out of Video") and the point of using it ("Getting the Most out of Your Marketing and Sales Budget")

May 2004. Digital Technology Center Intelligent Storage Workshop 2004, Minneapolis, MN. All You Need is TCP: EtherSAN and Storage Networks(With ). In this proposal, we discuss applying the end-to-end principle and a patented low latency TCP mechanism to create a global storage network architecture we call EtherSAN.

October 11, 2003. Vintage Computer Festival 2003. Computer History Museum. Before 386bsd: The Symmetric 375 Computer and Berkeley Unix(With ). Symmetric Computer Systems, a venture-funded company founded in 1982 by William Jolitz, was a contender in the hot race to produce a personal BSD Unix system. The Symmetric 375 was the first system out the door with hardware floating point and virtual memory, beating Sun by years. It was the first system with open source supplied, integrated, and tested, from EMACS to SPICE for use in scientific and engineering work. And it was the first to ship systems with all software fully installed and tested, ready for use immediately. Join William and Lynne as they discuss the design and development of the 375 computer and its influence on 386BSD - the first open source BSD system for the X86 released a decade later.
See the article “Talk About Legacy Machines”.

September 15, 2003. San Francisco Chronicle, Technology and Business Section page E1. USA. Paving the Way for ‘Systers’. On Sept. 9, Anita Borg, a well-known computer scientist and champion for the advancement of women in the technology industry who died in April, was eulogized by colleagues at Stanford University's Memorial Auditorium. Here are the thoughts of Lynne Greer Jolitz , who has spearheaded several Silicon Valley Startups. Article also posted on SF Gate, among the top five newspaper-affiliated web sites in the U.S., with 4.9 million users and 58 million page views per month.

September 2003. Byte.com, USA. Memories and Cookies. The optimism and untethered ambition of the dot-com boom may have vanished from the face of the Internet, but it lingers on in cookie files. Special Feature.

February 2003. Byte.com, USA. DDOS: Just a Matter of Resource. Why are we so vulnerable still to distributed denial-of-service attacks? Because the Internet has no policy for monitoring service and isolating misbehaving network elements. Special Feature.

Spring 2002. San Jose State University. Instructor, Unix System Administration. Professional development aimed at career enhancement with evening course. Teaching Linux and UNIX to accomplished professionals for certification in cross-platform network administration. Introduction to command line, file handling, management, and network operations. Instruction and laboratory hands on experience with the instructor. Emphasis on system administration, server, network engineering.

Lynne Jolitz's Published (in print) Books

Operating System Source Code Secrets Volume 1: The Basic Kernel(With ). In this multi-volume series, William and Lynne examine the anatomy of an operating system. The heart of an operating system is the basic kernel. Like a human heart, the basic kernel provides a complex operating system a fundamental means to distribute resources to all other subsystems in order for them to function independently. Without the basic kernel, no other portion of the operating system can live. Among the most crucial of functions are: dynamic configuration; bootstrap and kernel program loading; memory allocation and management; process credentials and privileges; machine dependent elements (X86); system call, interrupt and exception handling; context switching; thread creation and destruction; process multiplexing; files and file descriptors; and UNIX and BSD API’s. In addition to its historical origins, the modularity and scalability of the complete kernel is discussed and how its future evolution impacts clustering, security, extensibility, and performance. Future scheduled volumes in this series will examine the virtual memory subsystem, the TCP/IP networking protocols, and Berkeley/WINSOCK sockets. Publisher: Peer-to-Peer Communications, Charlottesville, Virginia (1996). 530 pp. See also review

Lynne Jolitz's Published, Broadcast and Events Interviews and Opinion (Partial List)

September 23, 2004. Spotlight on "Hidden Physicists", Radiations Magazine of the Sigma Pi Sigma National Physics Honors Society. “ Lynne Greer Jolitz has been a founder of startups ranging from workstations to Internet infrastructure. She is currently founder and CTO of ExecProducer, an Internet multimedia collaboration company.” Commentary.

March 10, 2003. Among the deluge of sarcastic messages… Good Morning Silicon Valley, John Paczkowski, San Jose Mercury News. “I received about the researchers who managed to transmit 6.7 gigabytes of data from Sunnyvale, Calif., to Amsterdam in less than a minute was this one from Lynne Jolitz, who suggests that such a transmission rate would aid and abet the downloading of more than digital content…” Commentary.

October 26, 2002. "Looking for Symmetric 375", "met Mr. and Mrs. Jolitz, who did the first work on porting BSD Unix to the 386" at Vintage Computer Faire 2002. NASA Ames Research Center. Showed the original Symmetric Computer Systems operational running wire-wrap (20,000 connections, 25x22 inch board) Proto I computer (in the case) from 1983. Also showed a final production unit operational with 4.3BSD SYMMETRIX from 1987. Discussion and display board on “Funding a Systems Startup” about Symmetric Computer Systems, a venture-backed company founded by William Jolitz in 1982.

April 2001 (Air Date). DSL, Bandwidth and IPv6: Where are We Heading?, John Dvorak, Host. Real Computing. Understanding the 2001 business fall-out in the DSL broadband area. A critical examination of IPv6. Finally, a look at what’s in it for the consumer.

January 2001 (Air Date). Fixing the Bandwidth Bottleneck, Jeremy Burton, Host. Oracle E-Business Network. Lynne Jolitz, the co-creator of 386BSD, the first Berkeley Unix open source operating system, and SiliconTCP, the first ballistic protocol processing mechanism for wire-speed Internet transactions, contrasts past software mechanisms in operating systems with future hardware approaches.

5/00 Salon.Com USA.: The Unknown Hackers (by Rachel Chalmers). Bill and Lynne Jolitz may be the most famous programmers you've never heard of. Not many Linux-come-latelies know this, but Linux was actually the second open-source Unix-based operating system for personal computers to be distributed over the Internet. The first was 386BSD, which was put together by an extraordinary couple named Bill and Lynne Jolitz. In a 1993 interview in Meta magazine, Linus Torvalds himself name-checked their O.S. "If 386BSD had been available when I started on Linux," he said, "Linux would probably never have happened." (See also "The Fun with 386BSD")

7/98 Gateway, Germany: Faktor 10: Stauende; IP-Netze bis zu zehnmal schneller durch SiliconTCP (by Jürgen Fey, Editor). Das Internet droht am eigenen Erfolg zu ersticken, denn allzu oft sind die Pipelines verstopft. SiliconTCP, ein einfaches und dennoch wirkungsvolles Verfahren könnte viele Probleme lösen und die Performance verzehnfachen.

Lynne Jolitz's Articles, Papers, Books, Seminars (1984-2002)

November 2002. Byte.com, USA. DNS on the Hot Seat. Distributed DOS attacks on the Internet's root servers can grind Web traffic to a halt. Is it time to find a replacement for DNS? Feature article.

October 2002. Grace Hopper Conference 2002, Vancouver, BC. From 386BSD to OSPREY: The Evolution of an Operating System. While 386BSD is famous for pioneering inexpensive 386-based Unix systems for academics and open source code for programmers, it also proved to be a fungible framework for new approaches, unfettered by legacy or short-term commercial objective. This paper examines a single aspect of OS operation in the form of tracking root resource usage in a server, specifically processor and memory. This aspect is extremely relevant to all corporate datacenters, as the cost effectiveness of banks of as many as hundreds of servers is directly related to how effectively these two are utilized. Poor utilization of resources means a datacenter needs more machines to do the same work, while perfect resource utilization would match resource to need exactly. The author believes that the findings generalize to most other aspects of servers, as they derive efficiencies from the underlying effectiveness of these root resources – issues 386BSD addressed years ago. Due to the structure of Unix itself, however, some root resource legacies can only be conquered with a radical new approach, inspiring the OSPREY system.

4/97 Software Development Conference, San Francisco, CA. And Why the Internet Will Bury NT(With ). The Internet is metamorphosing into a single vehicle for information. The question is no longer Who will win the OS war, but instead Is the OS war relevant anymore? This talk examines how this new Internet age and its demands force the reshaping of OS technologies and the industry. Then Sliders scenarios are presented along with predictions about the next set of OS technology losers and winners.

3/96 Software Development Conference, San Francisco, CA. Why NT Will Bury UNIX(With ). The operating systems wars have been waged as long as computers have existed. Now, an aggressive and determined software company is attempting to position itself to conquer the entire market. In this paper, we answer the questions: How real is this threat? What are the actual stakes? And should NT succeed, where does UNIX stand as an also-ran? We also provide a preview of the pending truly new technology operating systems -- where the next great battleground will be fought.

8/95 Dr. Dobb’s Journal, USA: Programmer’s Bookshelf: Perspectives on Computer Security. When you get on the net, who can you trust? Lynne examines several new books that address this question: Network Security: Private Communications in a Public World, by Charlie Kaufman, Radia Perlman, and Michael Speciner; E-Mail Security, by Bruce Schneier; Network Security, by Steven Shaffer and Alan Simon; and Network Security: How to Plan for It and Achieve It, by Richard H. Baker. [Embedded in "Le Monde En Tique" ]

8/95 Dr. Dobb's Developer Update, USA: Book Review: POSIX.4 Programming. Contrasts traditional operating systems techniques with real-time demands.

5/95 Dr. Dobb’s Journal, USA: Role-Based Network Security(With ). Network level security is usually very costly, but through the use of role-based security, PC network administration can be reduced to a simple level without loss of integrity.

3/95 Dr. Dobb's Developer Update, USA: Security and the INTERNET(With ). A detailed analysis of the technical flaws in the TCP/IP implementations which allowed intrusion by a cracker over several months and new approaches to correct them.

Winter 1994 Dr. Dobbs Journal Information Highway Special Issue, USA: Very High Speed Networks: HiPPI and SIGNA(With ). Very high-speed networking is the key to rapidly and economically delivering large amounts of information.

9/93 Dr. Dobb’s Journal, USA: Programmer’s Bookshelf: Under Lock and Key. While you can’t keep network systems and data under lock and key, there are security techniques you can still employ. Lynne examines the approaches presented in UNIX System Security and UNIX Installation, Security, and Integrity.

6/93 Dr. Dobbs Journal, USA: Extending Standards for CD-ROM. Although ISO-compliant CD-ROMs are interchangeable and usable on any type of system, the minimalism that made the ISO-9660 standard successful is sometimes too minimal. Consequently, the Rock Ridge Group and others have developed extensions to give new life to CD-ROMs.

12/92 Dr. Dobbs Journal, USA: Inside the ISO-9660 Filesystem Format(With ). For delivering large amounts of data, CD-ROMS give you the biggest bang for the buck. The ISO-9660 filesystem format is discussed. Example utilities which allow a person to decode a CD-ROM and view a file are also presented.

4/91 Dr. Dobbs Journal, USA: Copyrights, Copyleft, and Competitive Advantage. An overview and analysis of the effects and trends towards the use of copyrights, Free Software Foundation (FSF) “copylefts”, and the impact on American competitive advantage.

Lynne Jolitz's 386BSD R1.0 Reference CD-ROM: Essays on Kernel Design

(with William F. Jolitz). November 1994. Dr. Dobbs Journal CD-ROM Series.

11/94 Dr. Dobbs Journal, USA: The 386BSD Release 1.0 CDROM Liner Notes(With ).(15 pages). We are pleased to present the release of our first official 386BSD Reference CD-ROM. This single CD-ROM contains the most up-to-date work in our continuing operating systems and networking research project including articles appearing in Dr. Dobb's Journal, select annotations, system and kernel source code, and executable binaries for select configurations. This CD-ROM is intended as a research and educational reference used to explore state-of the-art paradigms, choices, and trade-offs, as well as examine testbed implementations of these design choices. In addition, the collection of resources, articles, and other reference materials on this CD creates an informational programming resource that can be referred to again and again.. See also "The Fun with 386BSD".

Modular Kernel Design(With ). Starting with Release 1.0, the 386BSD kernel was radically changed. Utilizing the lessons learned in modular design, the kernel is transformed into independent modules that may be included into the kernel program simply by adding a line into a parameterized makefile describing a system (ex: odysseus.mk). This is novel work done for 386BSD Release 1.0.

So You Want to Write a UNIX Paper(With ). Essay on the trials and tribulations of submitting novel research papers.

CPU Kernel Facilities (i386/cpu.c)(With ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code specific to the central processor unit (CPU) which implements at the bottom level of abstraction a variety of kernel facilities.

Process Creation (kern/fork.c)(With ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which implements the mechanism for replicating a process or thread, the basic concurrent objects in a POSIX-based system created explicitly by other user processes.

Process Termination (kern/exit.c)(With ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which implements the mechanism for terminating a process or thread. POSIX processes may be terminated explicitly by a function call from the process being terminated itself, or implicitly, either as a result of a processor exception or of a signal sent by another process.

Process Exceptions via Signals (kern/sig.c)(With ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which implements the POSIX signal mechanism for passing software interrupts to processes.

Process Protection (kern/cred.c)(With ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code responsible for implementing the process protection mechanism.

Process Privileges (kern/priv.c)(With ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which provides the fine-grain definition for the use of privileges by other portions of the kernel code. It is in essence the gateway through which a privileged operation is permitted to be performed. This is novel work done for 386BSD Release 1.0.

Executable File Format Emulator (kern/execve.c)(With ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which implements the execution of program machine instruction binary files. It corresponds to the top layer of abstraction of a POSIX 1003.1-based system, by implementing the entire execve() functionality of that standard as a single system call. This is novel work done for 386BSD Release 1.0.

File Descriptors (kern/descrip.c)(With ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which implements the file and file descriptor mechanisms. It is through this mechanism that low level file-like objects are attached to the Posix program interface in the system calls which in turn implement all of the Posix functions used with files.

Kernel Memory Allocator (kern/malloc.c)(With ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which implements the primary dynamic memory allocator of the kernel. It is composed of three functions: malloc(), free(), and kmeminit().

Configuration in Kernel Design (kern/config.c)(With ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which configures the software modules of the kernel and reconciles a shared configuration file with the configuration scripts in every module. The configuration scripts themselves allow for symbolic reconfiguration of the kernel without altering its contents. This file also contains the device-independent device interfaces used by the kernel exclusively to access devices. This is novel work done for 386BSD Release 1.0.

Process Scheduling (kern/synch.c)(With ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which implements the blocking, unblocking, and scheduling mechanisms used in a multiprogramming system.

Memory Maps (vm/map.c)(With ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which implements a series of routines for managing map entries and performing map operations on the map entries as needed for the rest of the virtual memory system, and is analogous to a virtual address database of sorts.

Memory Objects (vm/object.c)(With ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which implements management of memory objects for the virtual memory system.

Paging Mechanism (vm/page.c)(With ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code used to maintain the logical page abstraction vm_page.

Page Reclamation (vm/pageout.c)(With ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which implements the page reclamation daemon (the paging replacement function).

Fault Handling ( vm/fault.c)(With ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which implements the virtual memory system's address space fault handler mechanism, interpreting both hardware and software faults on a portion of the address space.

Filesystem Cache Management (fs/bio.c)(With ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code used to implement the cache management of independent filesystems. It corresponds to the middle layer of abstraction of a filesystem which maintains the exchange of file data and metadata contents read or written to the external storage comprising the physical file.

Filesystem Lookup (fs/lookup.c)(With ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which is the initial point for transactions involving the filesystem. This file is responsible for turning file path names into the vnodes referenced by the rest of the virtual filesystem.

Assembly Entry and Primitives (i386/locore.c)(With ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD file containing the initial assembly language that expands the core machine dependencies of the architecture of 386/486/Pentium processors. This is novel work done for 386BSD Release 1.0.

Lynne Jolitz's Porting UNIX to the 386 (386BSD Series)

12/92 UNIX Magazin, Germany: Einladung erforderlich(With ). Für die Ebene der Device-Treiber ist das Interrupthandling fundamental. Die Initialisierung der Interrupt-Tabellen sowie die Organisation der Treiber richtet sich bei 386-Systemen natürlich sehr eng nach den spezifischen Gegebenheiten der Hardware. Wie die Interrupts beim PC funktionieren, wird in dieser Folge beschrieben.

10/92 UNIX Magazin, Germany: Treiberlatein(With ). Damit ein Betriebssystem das Laufen lernt, müssen zumindestens gewisse Grundbedürfnisse der Schnittstelle zur Hardware befriedigt werden. Diese Aufgabe erledingen die Device-Treiber, deren grundsätzliche Arbeitsweise und Umfeld in dieser Folge näher beschrieben wird.

9/92 UNIX Magazin, Germany: Das Beste aus ISA machen(With ). Die Autokonfiguration bietet ein hohes Mass an Flexibilität bezüglich der Auswahl peripherer Einheiten. Doch so gut das Betriebssystem hierzu vorbereitet sein mag, so abhängig ist dieses doch von der zugrundeliegenden Hardware. Die betagte, aber weitverbreitete ISA-Architektur des PC/AT-Bus bereitet bei der Portierung denn auch oft Kopfschmerzen.

7/92 Dr. Dobbs Journal, USA: The Final Step: Running Light with 386BSD(With ). Overview of the impact of Release 0.0 on the BSD community. Installation procedures for and highlights of Release 0.1. Final installment of series.

7/92 UNIX Magazin, Germany: Erkenne Dich Selbst(With ). Kenner der BSD-Systeme Wissen die Systemmeldungen während des Bootvorganges zu entziffern. In dieser Folge wird das zugrundeliegende Schema der Autokonfiguration der Gerätetreiber näher beschrieben. Vorteil dieser Technik is, dass erst beim Booten die aktuellen Daten der angeschlossenen Devices in den Kernel übernommen werden. Die Zeit der Betriebssystem-Patches sollte damit vorbei sein.

6/92 Dr. Dobbs Journal, USA: Missing Pieces II(With ). Finishing the NET/2 release of Berkeley UNIX to obtain a complete, unencumbered system for the 386 PC. Describes the methodology and implementation of the remaining facilities necessary to generate a working operating system for the PC.

6/92 UNIX Magazin, Germany: Magie des Kernels(With ). Als Anwender eines Multitasking-Betriebssystems nutzt man die praktischen Möglichkeiten, ohne zu wissen, welche fundamentalen Dienstleistungen innerhalb des Kernels dafür verantwortlich sind.

5/92 Dr. Dobbs Journal, USA: Missing Pieces I(With ). Finishing the NET/2 release of Berkeley UNIX to obtain a complete, unencumbered system for the 386 PC. Describes the methodology and implementation of the remaining facilities necessary to generate a working operating system for the PC. (See also Unix Device Drivers III and )

4/92 Dr. Dobbs Journal, USA: Unix Device Drivers III(With ). Completion of basic 386BSD device drivers.

4/92 UNIX Magazin, Germany: Das Geheimnis des Multiprogramming(With ). Einer der wichtigsten Unterschiede von Unix gegenüber den Singeltasking Systemen wie MS-DOS ist der von Anfang an einbezogene Faktor des Multiprogramming. Erst hiermit können auf einen einzigen Prozessor das Gefühl und die vielfältigen Möglichkeiten der Parallelverarbeitung nicht nur versprochen, sondern auch gehalten werden.

4/92 Dr. Dobbs Journal, USA: Unix Device Drivers III(With ). Completion of basic 386BSD device drivers.

3/92 Dr. Dobbs Journal, USA: Unix Device Drivers II(With ). Interfaces to the operating system. Entering, exiting and masking processor interrupts. (See also Unix Device Drivers I and)

3/92 UNIX Magazin, Germany: Aus Hänschen wird Hans(With ). Auch ein so umfangreiches Betreibssystem wie UNIX fängt mal kelin an. Gemeint ist die Bootphase, in der sich der Riese aus kleinen Teilen seibst zusammensetzt. Wer wollte nich schon einmal wissen, weiche Strategie hierbei verfolgt wird, um aus dem grossen Sortiment der Tabellen, Pages, Layer und Funktionen ein funktionierendes Ganzes zu machen.

2/92 Dr. Dobbs Journal, USA: Unix Device Drivers I(With ). The structure of 386BSD device drivers, interfaces to the operating system, and minimal device drivers for the console, disk drive and scheduling clock of the PC.

2/92 UNIX Magazin, Germany: Tanz auf dem Eis(With ). Gerade die ersten wackeligen Schritte des Kernels in seiner unvoliständigen Systemumgebung sind die kritischen. Diese Folge beschreibt neben dem rekusiven Paging, wie man sich auf dem brüchigen Eis bewegt.

1/92 UNIX Magazin, Germany: Rekursives Speicher-Mapping(With ). Die Speicherverwaltung gehört zu den Kernstücken jeder UNIX-implementation. Mit dem rekursiven Paging haben sich die Autoren ein neues Verfahren ausgedacht, weiches nicht nur auf dem 80386 eine verbesserte Performance ermöglicht.

12/91 UNIX Magazin, Germany: Feuer und Wasser(With ).

11/91 Dr. Dobbs Journal, USA: Device Autoconfiguration(With ). How 386BSD discovers hardware devices that are present and configures itself for operation with those devices.

11/91 UNIX Magazin, Germany: Alles in eine Schublade(With ).

10/91 Dr. Dobbs Journal, USA: Multiprogramming and Multiprocessing II(With ). How multiprogramming is achieved via multitasking. A discussion of the process. Alternative implementations and trade-offs. A reflection on why it has been so difficult to add multiprogramming to non-UNIX operating systems such as MS-DOS.

10/91 UNIX Magazin, Germany: Damit die Fehlersuche nicht zum Hürdenspringen wird(With ). Bei der Portierung eines Paketes wie BSD-UNIX muss man als Programierer verschiedene Verfahren zur Fehlersuche kombiniert einsetzen. Erst die Kombinartion führt zum Ziel, denn schliesslich pochen auch die Tools auf ihr Recht auf Fehler.

9/91 Dr. Dobbs Journal, USA: Multiprogramming and Multiprocessing I(With ). An overview of the multiprogramming paradigm in 386BSD. Conventions, definitions, and organization of multiprogramming.

9/91 UNIX Magazin, Germany: Sicher bewegen auf fremdem Terrain(With ). Die richtige Auswahl der Entwicklungs-hardware und -software kann während der eigentlichen Portierung viel Zeit sparen. Der Cross-Support offenbart auch so genügend Hindernisse, die zu überwinden sind.

8/91 Dr. Dobbs Journal, USA: The Basic Kernel(With ). Initialization of the 386BSD kernel services and data structures.

8/91 UNIX Magazin, Germany: Systemverwaltung durch Tabellen(With ). Eine der wichtigsten Hürden, die bei der Portierung von BSD auf den 386 zu überwinden ist: die fehlerfreie Initialisierung der Systemtabellen im Protected Mode. Überraschungen sind zu jeder Zeit angesagt.

7/91 Dr. Dobbs Journal, USA: A Stripped-Down Kernel(With ). The 386BSD basic kernel, incorporating a unique recursive paging feature that leverages resources and reduces complexity.

7/91 UNIX Magazin, Germany: Steighilfe(With ). Der BSD-Kernel steht nicht gleich zu Beginn eines Ports in voller Blüte auf der neuen Hardwareplattform zur Verfügung. Bis man soweit ist, kann man sich auch die Funktionen eines bereits lauffähigen Systems, hier is es MS-DOS einschliesslich seiner Applikationen, zunutze machen.

6/91 Dr. Dobbs Journal, USA: Research and the Commercial Sector: Where Does BSD Fit In?(With ). A discussion of the various demands placed on research and commercial operating systems, and how they differ.

6/91 UNIX Magazin, Germany: Portierung von BSD-UNIX auf den 80386. Heimliche Liebe(With ). Bislang galt die Intel-Plattform als Hochburg von AT&T System V, während vor allem der technische Workstationmarkt nach wie vor mit BSD-UNIX arbeitet. Kein Wunder, dass die BSD-FAns auf einen 80386-Port warteten. Unsere 386BSD-Serie beschreibt im Detail den Port und gibt wichtige Einblicke in BSD.

5/91 Dr. Dobbs Journal, USA: The Initial Root Filesystem(With ). The development of the initial root filesystem required for the 386BSD operating system kernel.

4/91 UNIX Magazin, Germany: Zwei Seiten der Medaille(With ). Die Uniforum-Konferenz gehört zu den wichtigsten Veranstaltungen, die der UNIX-Kalender im Jahr aufweist. Grund genug, diese Veranstaltung wie in den Vorjahren für Sie zu besuchen, um wichtige Neuerungen und Trends aufzuspüren. Doch der Golfkrieg hat auch hier seine vergleichsweise bescheidenen Eindrücke hinterlassen; die geplanten Reisen mussten abgesagt werden. Mit Bill Jolitz konnte ein UNIX-Insider gefunden werden, der uns seine Eindrücke zukommen liess.

4/91 Dr. Dobbs Journal, USA: Copyrights, Copyleft, and Competitive Advantage. An overview and analysis of the effects and trends towards the use of copyrights, Free Software Foundation (FSF) “copylefts”, and the impact on American competitive advantage.

3/91 Dr. Dobbs Journal, USA: The Standalone System(With ). Using the protected mode program loader, a minimal 80386 protected mode standalone C programming environment for operating systems kernel development is created. (See also and )

2/91 Dr. Dobbs Journal, USA: FEB91: PORTING UNIX TO THE 386: THREE INITIAL PC UTILITIES(With ). Utilities to let you execute GCC-compiled programs in protected mode from MS-DOS and copy files to a shared portion of disk so MS-DOS and UNIX can exchange information. Contains: The Purpose of Our PC Utilities, The First PC Utility: boot.exe, Unix Kernel Load Program, The GCC Executable Format, Consistency Checks, GATE A20, Entering Protected Mode, The Second PC Utility: cpfs.exe, The Third PC Utility: cpsw.exe, Where We Go From Here, and The 386BSD Project and Berkeley UNIX . (Part of the series PORTING UNIX TO THE 386: A PRACTICAL APPROACH, see also and )

1/91 Dr. Dobbs Journal, USA: PORTING UNIX TO THE 386: DESIGNING THE SOFTWARE SPECIFICATION(With ). In this first installment of a multipart series, the design specification for 386BSD, Berkeley UNIX for the 80386, is discussed. Contains: Getting Started: References, Equipment, and Software, Development of the 386BSD Specification, The Definition of the 386BSD Specification, Conflicts in Priorities, 386BSD Port Goals: A Practical Approach, Microprocessor and System Specification Issues, 386 Memory Management Vitals, Segmentation and 386BSD, Kernel Linear Address Space Overhead, Virtual Address Space Layout, Per-Process Data Structures, 386 Virtual Memory Address Translation Mechanism, User to Kernel Communication Primitives, Berkeley UNIX Virtual Memory System Strategy, Structure of Per-Process Data (u.), Process Context Description, Page Fault and Segmentation Fault Mechanism, Other Processor Faults, Microprocessor Idiosyncrasies, System Call Interface, System Specific (ISA) Issues, Physical Memory Map, ISA Device Controllers, ISA Device Auto Configuration, Interrupt Priority Level Management, Bootstrap Operation, Summary: Where is 386BSD Now?, and Suggested Readings. (Part of the series PORTING UNIX TO THE 386: A PRACTICAL APPROACH, see also )

Lynne Jolitz's Other Papers

The Symmetric 375 and Symmetrix Owner's Manual. Publisher: Symmetric Computer Systems, San Jose, CA. (1984, 1987). 260 pp. Documents the system administration, basic use of languages and utilities, and the hardware, including circuitry of the Symmetric 375 computer and its Berkeley Unix derived Symmetrix operating system. See also "Writing the Owner's Manual for the Symmetric 375 Computer system".

October 1989. TeleMuse. A Survey of Select Utilities on Current and Future Demand Side Management Strategies for the 1990’s. Marketing assessment for the American power industry. Still pertinent today (don't utilities every change?). Done under contract for MSC.

InterProphet Corporation Business Plan. Enabling the New Internet Enterprise(With ),(with Ross Hunt). 1997-2000.

Lynne Jolitz's Seminar and Short Course Instructional Books

ISDN Networking Technology: A Strategic Overview(With ). An introduction to the Integrated Services Digital Network (ISDN) is provided with a tour of motivations, standards, terminology, functional blocks, system equipment, link access protocols, signaling protocols and standard services. Specific case examples on the interoperability between current networking technology and ISDN are developed and examined. In addition, a number of possible ISDN applications are explored along with the current limitations and frustrations of the ISDN standards, the current schedule of events of ISDN service accessibility, and the near-term changes expected within the world of ISDN.

Open Systems Networking With TCP/IP(With ). A comprehensive course which details the TCP/IP protocol suite, the Internet CORE protocols and the basics of Internet architecture, including the Domain Name Server. It also examines the underlying concepts and principles of TCP/IP. Examples, network management, the integration of applications protocols into a useful network, and network operations are also discussed.

Lynne Jolitz's Books Scheduled for Publication (Contract with Publisher)

Operating System Source Code Secrets Volume 2: The Virtual Memory System(With ). This multivolume series examines the anatomy of an operating system. The brain of an operating system is the virtual memory system. Like a human brain, the virtual memory system is the means through which temporary and permanent memory is stored and accessed. Temporary memory is used as a workspace to assemble a new item before it is stored into permanent memory. Among those most fundamental of functions are: management of kernel and program virtual address spaces (creation, replication, modification, and destruction); management of store backing an address space (naming, protection, sharing, and inheritance of memory contents); persistent and temporary memory; machine dependent (X86) memory management unit control; copy-on-write semantics; main store and secondary store management; page replacement; memory mapped I/O; address space fault handling; demand loading from secondary store; lazy versus industrious evaluation; and UNIX and BSD API’s for address space control. The virtual memory module is not only a key subsystem of the operating system kernel but is itself composed of layers and levels of abstraction. These layers are discussed in terms of future evolution to support the needs of clustering, security, extensibility, and performance.

386BSD from the Inside-Out(With ). Describes in detail the internal structure of the 386BSD operating system done by the authors as an example of operating system design methodology and implementation choice, thus reconciling the implementation-specific practice discussed in the Operating Systems Source Code Secrets series with formal operating systems design. The unique approach of this work is to proceed from fundamental structure of the kernel and its interfaces to the specific subsystems present within the operating system. This inside-out progression illuminates alternative choices for structure in a historical light by detailing how the decisions made in the past affect the current technology. The focus of this book is to provide an exploded view of a modern computer operating system and why it is composed the way it is, so that students of the field can grasp the concepts and methodologies chosen.

[Return to prior page]