William holds rights in novel operating systems and web service technologies. He was co-creator of the fundamental technology for InterProphet and is lead inventor on the first patent filings. He was the architect of the first open source Berkeley Unix releases. William began his professional career while still in high school at NASA-Ames as a contractor, and completed over 40 contracts over the course of his studies at Berkeley. William also was the developer of the Menlo UNIX operating system incorporating early ARPANET TCP/IP work for USGS while at Berkeley. He is a widely read international author and popular speaker.
October 6, 2006. WebMontag Silicon Valley, Palo Alto, CA. Investment Use of the "Google Test". Bandwidth driven business models have arrived for Internet megaventures - will they displace Moore's law?
October 11, 2003. Vintage Computer Festival 2003. Computer History Museum. Before 386bsd: The Symmetric 375 Computer and Berkeley Unix(With Lynne Greer Jolitz ). Symmetric Computer Systems, a venture-funded company founded in 1982 by William Jolitz, was a contender in the hot race to produce a personal BSD Unix system. The Symmetric 375 was the first system out the door with hardware floating point and virtual memory, beating Sun by years. It was the first system with open source supplied, integrated, and tested, from EMACS to SPICE for use in scientific and engineering work. And it was the first to ship systems with all software fully installed and tested, ready for use immediately. Join William and Lynne as they discuss the design and development of the 375 computer and its influence on 386BSD - the first open source BSD system for the X86 released a decade later.
See the article “Talk About Legacy Machines”.
September 2003. SDForum Emerging Technologies SIG of Silicon Valley, Palo Alto, CA, USA. TV Quality Reliable Wireless Video Streaming. Everybody wants to watch movies on a computer, but nobody does. It's worse on wireless, and even more hobbled on a cellphone or PDA. So what's a service provider to do? The customer expects TV or the service is toast. Is this possible? The problem is maintaining continuous service delivery quality. We know this, because downloaded movies play just fine. But download movies have other problems - copyright, storage demand, and unpredictable viewing availability. While there are cures, the cure is often worse - killing the emerging business.
Let's get real - download is really "plan ahead, pay once, use forever". Streaming is "pay per view" - what the service provider wants. It would be so much easier if reliable streaming worked over wireless. Today we either rollout unreliable wireless services or demo reliable services in a fantasy sandbox - the real world is a hard test. When you still can't get good cellphone coverage on the financial mecca of Sand Hill road, can you expect to pull out a PDA at Starbucks and get Shrek even half as good as a cheap TV can?
Yet large-scale wireless deployment is happening worldwide - the business opportunity of delivering on the services that get a ROI on this immense gamble is extreme. We can make reliable streaming over wire connections right now using bandwidth surplus, fast failover switching, and careful network design. But it still takes remarkably little to destabilize a single stream, let alone thousands in competition for transport resource.
In studying the stable stream we've found a novel hardware/software approach for wireless video. The network hardware is InterProphet's Silicon TCP stack used as a distributed transport that can achieve on-time delivery of video. A software framework that provides for reliability and embedded monitoring is a critical part of the deployment story in managing the infrastructure. With it, customer quality is maintained while challenges to the service are acted upon before a loss of quality can occur. Such a framework is re-purposed from delivering reliable web services, as described in my article on Web Services in Datacenter Environments in the April edition of Dr. Dobbs Journal. See TV Quality Reliable Wireless Video Streaming
June 2003. Internet Developers Group of Silicon Valley, AOL Campus, USA. "Open Software Development in the Real World. We hear a great deal about challenges to violations of Intellectual Property Rights. How are open-source developers, interested in bringing new functionality to the software world, able to complete their projects without falling victim to attacks regarding intellectual property challenges? William Jolitz’s experience bringing 386BSD, the foundation of all UNIX like operating systems, to the software community without Intellectual Property challenges gives him special insight into the necessary steps to take. Audio and video streams of the talk are available at Internet Developers Group.
March 2003. SDForum Web Services SIG of Silicon Valley, Microsoft MV Campus, USA. Issues in Deployment of Wireless Web Services. Deploying high valued web services in a wireless environment is an all or nothing proposition - you must deliver on it to keep a loyal customer. This expectation of service quality is key to customer adoption of the product and monetization of the service. A software framework that provides for reliability and embedded monitoring is a critical part of the deployment story. With it, customer quality is maintained while challenges to the service are communicated back to the developers. Concurrent service improvement is possible so that a deployment can recover from the inevitable "soft failures" during rollout. Such a framework is described in my article on "Web Services and DataCenter Environments" in this April's edition of Dr. Dobbs Journal. Issues in Deployment of Wireless Web Services Presentation.
September 21, 2006. VentureBeat, USA. The Google Test
Entrepreneur William Jolitz posits a contrarian view on YouTube, praising its expensive use of bandwidth as a key to its success. Read on about how YouTube meets the “Google Test.”
June 2005. C|net News.com.com, USA. Misplaced software priorities. We are in danger of losing out in the best and most interesting part of the software market. (See at "Misplaced software priorities | Perspectives | CNET News.com")
May 2004. Digital Technology Center Intelligent Storage Workshop 2004, Minneapolis, MN. All You Need is TCP: EtherSAN and Storage Networks(With Lynne Greer Jolitz ). In this proposal, we discuss applying the end-to-end principle and a patented low latency TCP mechanism to create a global storage network architecture we call EtherSAN.
April 2003. Dr. Dobbs Journal, USA. Web Services and DataCenter Environments. Forget your cellphones and wireless PDAs. Web services can be used even more effectively in Internet datacenters to solve client communication errors and other such problems.
Operating System Source Code Secrets Volume 1: The Basic Kernel(With Lynne Greer Jolitz ). In this multi-volume series, William and Lynne examine the anatomy of an operating system. The heart of an operating system is the basic kernel. Like a human heart, the basic kernel provides a complex operating system a fundamental means to distribute resources to all other subsystems in order for them to function independently. Without the basic kernel, no other portion of the operating system can live. Among the most crucial of functions are: dynamic configuration; bootstrap and kernel program loading; memory allocation and management; process credentials and privileges; machine dependent elements (X86); system call, interrupt and exception handling; context switching; thread creation and destruction; process multiplexing; files and file descriptors; and UNIX and BSD API’s. In addition to its historical origins, the modularity and scalability of the complete kernel is discussed and how its future evolution impacts clustering, security, extensibility, and performance. Future scheduled volumes in this series will examine the virtual memory subsystem, the TCP/IP networking protocols, and Berkeley/WINSOCK sockets. Publisher: Peer-to-Peer Communications, Charlottesville, Virginia (1996). 530 pp. See also review
5/00 Salon.Com USA.: The Unknown Hackers (by Rachel Chalmers). Bill and Lynne Jolitz may be the most famous programmers you've never heard of. Not many Linux-come-latelies know this, but Linux was actually the second open-source Unix-based operating system for personal computers to be distributed over the Internet. The first was 386BSD, which was put together by an extraordinary couple named Bill and Lynne Jolitz. In a 1993 interview in Meta magazine, Linus Torvalds himself name-checked their O.S. "If 386BSD had been available when I started on Linux," he said, "Linux would probably never have happened." (See also "The Fun with 386BSD")
7/98 Gateway, Germany: Faktor 10: Stauende; IP-Netze bis zu zehnmal schneller durch SiliconTCP (by Jürgen Fey, Editor). Das Internet droht am eigenen Erfolg zu ersticken, denn allzu oft sind die Pipelines verstopft. SiliconTCP, ein einfaches und dennoch wirkungsvolles Verfahren könnte viele Probleme lösen und die Performance verzehnfachen.
8/92 UNIX Magazin, Germany: 386BSD: Die unendliche Geschichte (by Jürgen Fey, Editor). Siet über einem Jahr können Sie die 386BSD-Serie im UNIX Magazin verfolgen. Sietdem Release 0.0 über FTP verfügbar ist, hat sich das Interesse noch weiter verstärkt und von der Theorie in die Praxis verlagert. Wir haven Bill Jolitz im Berkeley-Nachbarort Oakland besucht und ihn nach den BSD-Hintergründen, seiner Philosophie und zukünftigen Entwicklungen befragt.
US6173333: TCP/IP network accelerator system and method which identifies classes of packet traffic for predictable protocols. Grant Date: Jan. 9, 2001. Jolitz, et al. InterProphet Corporation . A network accelerator for TCP/IP includes programmable logic for performing network protocol processing at network signaling rates. The programmable logic is configured in a parallel-pipelined architecture controlled by state machines and implements processing for predictable patterns of the majority of transmissions. Incoming packets are compared with patterns corresponding to classes of transmissions which are stored in a content addressable memory, and are simultaneously stored in a dual port, dual bank application memory. The patterns are used to determine sessions to which an incoming IP datagram belongs, and data packets stored in the application memory are processed by the programmable logic. Processing of packet headers is performed in parallel and during memory transfers without the necessity of conventional store and forward techniques resulting in a substantial reduction in latency. Packets which constitute exceptions or which have checksum or other errors are processed in software. Filed July 17, 1998 Jolitz et. al. Provisional application filed Jul 18, 1997 (With Lynne Greer Jolitz ). See InterProphet Corporation for product/company/licensing details. See also Term Addressable Memory of an Accelerator System and Method
4/97 Software Development Conference, San Francisco, CA. And Why the Internet Will Bury NT(With Lynne Greer Jolitz ). The Internet is metamorphosing into a single vehicle for information. The question is no longer Who will win the OS war, but instead Is the OS war relevant anymore? This talk examines how this new Internet age and its demands force the reshaping of OS technologies and the industry. Then Sliders scenarios are presented along with predictions about the next set of OS technology losers and winners.
3/96 Software Development Conference, San Francisco, CA. Why NT Will Bury UNIX(With Lynne Greer Jolitz ). The operating systems wars have been waged as long as computers have existed. Now, an aggressive and determined software company is attempting to position itself to conquer the entire market. In this paper, we answer the questions: How real is this threat? What are the actual stakes? And should NT succeed, where does UNIX stand as an also-ran? We also provide a preview of the pending truly new technology operating systems -- where the next great battleground will be fought.
5/95 Dr. Dobb’s Journal, USA: Role-Based Network Security(With Lynne Greer Jolitz ). Network level security is usually very costly, but through the use of role-based security, PC network administration can be reduced to a simple level without loss of integrity.
3/95 Dr. Dobb's Developer Update, USA: Security and the INTERNET(With Lynne Greer Jolitz ). A detailed analysis of the technical flaws in the TCP/IP implementations which allowed intrusion by a cracker over several months and new approaches to correct them.
2/95 Dr. Dobb's Developer Update, USA: Op Ed: Inside 'Intel Inside'. Reflections on Intel's Pentium debacle and how such problems should be handled in the future.
Winter 1994 Dr. Dobbs Journal Information Highway Special Issue, USA: Very High Speed Networks: HiPPI and SIGNA(With Lynne Greer Jolitz ). Very high-speed networking is the key to rapidly and economically delivering large amounts of information.
7/94 Dr. Dobb's Developer Update, USA: Developer's Bookshelf: Gigabit Networking. A discussion of the state-of-the-art on gigabit networking.
1/94 Dr. Dobbs Journal, USA: Polymorphic Protocols. The Internet's fixed address space is being put to the test by dramatic growth in the number of Internet users. Polymorphic protocols may ultimately be the solution to the address-space problem and similar network limitations.
12/92 Dr. Dobbs Journal, USA: Inside the ISO-9660 Filesystem Format(With Lynne Greer Jolitz ). For delivering large amounts of data, CD-ROMS give you the biggest bang for the buck. The ISO-9660 filesystem format is discussed. Example utilities which allow a person to decode a CD-ROM and view a file are also presented.
8/92 Dr. Dobbs Journal, USA: High-Speed Networking. Even though network systems with data transfer rates in the gigabits-per-second range are just around the corner, today's software architectures won't necessarily scale well to higher rates. The problems and promises of high-speed networking are examined, focussing on header prediction and forward-error correction.
(with Lynne G. Jolitz). November 1994. Dr. Dobbs Journal CD-ROM Series.
11/94 Dr. Dobbs Journal, USA: The 386BSD Release 1.0 CDROM Liner Notes(With Lynne Greer Jolitz ).(15 pages). We are pleased to present the release of our first official 386BSD Reference CD-ROM. This single CD-ROM
contains the most up-to-date work in our continuing operating systems and networking research project including
articles appearing in Dr. Dobb's Journal, select annotations, system and kernel source code, and executable
binaries for select configurations. This CD-ROM is intended as a research and educational reference used to
explore state-of the-art paradigms, choices, and trade-offs, as well as examine testbed implementations of these
design choices. In addition, the collection of resources, articles, and other reference materials on this CD
creates an informational programming resource that can be referred to again and again.. See also "The Fun with 386BSD".
Modular Kernel Design(With Lynne Greer Jolitz ). Starting with Release 1.0, the 386BSD kernel was radically changed. Utilizing the lessons learned in modular design, the kernel is transformed into independent modules that may be included into the kernel program simply by adding a line into a parameterized makefile describing a system (ex: odysseus.mk). This is novel work done for 386BSD Release 1.0.
So You Want to Write a UNIX Paper(With Lynne Greer Jolitz ). Essay on the trials and tribulations of submitting novel research papers.
CPU Kernel Facilities (i386/cpu.c)(With Lynne Greer Jolitz ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code specific to the central processor unit (CPU) which implements at the bottom level of abstraction a variety of kernel facilities.
Process Creation (kern/fork.c)(With Lynne Greer Jolitz ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which implements the mechanism for replicating a process or thread, the basic concurrent objects in a POSIX-based system created explicitly by other user processes.
Process Termination (kern/exit.c)(With Lynne Greer Jolitz ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which implements the mechanism for terminating a process or thread. POSIX processes may be terminated explicitly by a function call from the process being terminated itself, or implicitly, either as a result of a processor exception or of a signal sent by another process.
Process Exceptions via Signals (kern/sig.c)(With Lynne Greer Jolitz ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which implements the POSIX signal mechanism for passing software interrupts to processes.
Process Protection (kern/cred.c)(With Lynne Greer Jolitz ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code responsible for implementing the process protection mechanism.
Process Privileges (kern/priv.c)(With Lynne Greer Jolitz ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which provides the fine-grain definition for the use of privileges by other portions of the kernel code. It is in essence the gateway through which a privileged operation is permitted to be performed. This is novel work done for 386BSD Release 1.0.
Executable File Format Emulator (kern/execve.c)(With Lynne Greer Jolitz ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which implements the execution of program machine instruction binary files. It corresponds to the top layer of abstraction of a POSIX 1003.1-based system, by implementing the entire execve() functionality of that standard as a single system call. This is novel work done for 386BSD Release 1.0.
File Descriptors (kern/descrip.c)(With Lynne Greer Jolitz ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which implements the file and file descriptor mechanisms. It is through this mechanism that low level file-like objects are attached to the Posix program interface in the system calls which in turn implement all of the Posix functions used with files.
Kernel Memory Allocator (kern/malloc.c)(With Lynne Greer Jolitz ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which implements the primary dynamic memory allocator of the kernel. It is composed of three functions: malloc(), free(), and kmeminit().
Configuration in Kernel Design (kern/config.c)(With Lynne Greer Jolitz ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which configures the software modules of the kernel and reconciles a shared configuration file with the configuration scripts in every module. The configuration scripts themselves allow for symbolic reconfiguration of the kernel without altering its contents. This file also contains the device-independent device interfaces used by the kernel exclusively to access devices. This is novel work done for 386BSD Release 1.0.
Process Scheduling (kern/synch.c)(With Lynne Greer Jolitz ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which implements the blocking, unblocking, and scheduling mechanisms used in a multiprogramming system.
Memory Maps (vm/map.c)(With Lynne Greer Jolitz ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which implements a series of routines for managing map entries and performing map operations on the map entries as needed for the rest of the virtual memory system, and is analogous to a virtual address database of sorts.
Memory Objects (vm/object.c)(With Lynne Greer Jolitz ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which implements management of memory objects for the virtual memory system.
Paging Mechanism (vm/page.c)(With Lynne Greer Jolitz ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code used to maintain the logical page abstraction vm_page.
Page Reclamation (vm/pageout.c)(With Lynne Greer Jolitz ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which implements the page reclamation daemon (the paging replacement function).
Fault Handling ( vm/fault.c)(With Lynne Greer Jolitz ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which implements the virtual memory system's address space fault handler mechanism, interpreting both hardware and software faults on a portion of the address space.
Filesystem Cache Management (fs/bio.c)(With Lynne Greer Jolitz ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code used to implement the cache management of independent filesystems. It corresponds to the middle layer of abstraction of a filesystem which maintains the exchange of file data and metadata contents read or written to the external storage comprising the physical file.
Filesystem Lookup (fs/lookup.c)(With Lynne Greer Jolitz ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD machine-independent code which is the initial point for transactions involving the filesystem. This file is responsible for turning file path names into the vnodes referenced by the rest of the virtual filesystem.
Assembly Entry and Primitives (i386/locore.c)(With Lynne Greer Jolitz ). Detailed discussion of the design, trade-offs, and implementation of the 386BSD file containing the initial assembly language that expands the core machine dependencies of the architecture of 386/486/Pentium processors. This is novel work done for 386BSD Release 1.0.
12/92 UNIX Magazin, Germany: Einladung erforderlich(With Lynne Greer Jolitz ). Für die Ebene der Device-Treiber ist das Interrupthandling fundamental. Die Initialisierung der Interrupt-Tabellen sowie die Organisation der Treiber richtet sich bei 386-Systemen natürlich sehr eng nach den spezifischen Gegebenheiten der Hardware. Wie die Interrupts beim PC funktionieren, wird in dieser Folge beschrieben.
10/92 UNIX Magazin, Germany: Treiberlatein(With Lynne Greer Jolitz ). Damit ein Betriebssystem das Laufen lernt, müssen zumindestens gewisse Grundbedürfnisse der Schnittstelle zur Hardware befriedigt werden. Diese Aufgabe erledingen die Device-Treiber, deren grundsätzliche Arbeitsweise und Umfeld in dieser Folge näher beschrieben wird.
9/92 UNIX Magazin, Germany: Das Beste aus ISA machen(With Lynne Greer Jolitz ). Die Autokonfiguration bietet ein hohes Mass an Flexibilität bezüglich der Auswahl peripherer Einheiten. Doch so gut das Betriebssystem hierzu vorbereitet sein mag, so abhängig ist dieses doch von der zugrundeliegenden Hardware. Die betagte, aber weitverbreitete ISA-Architektur des PC/AT-Bus bereitet bei der Portierung denn auch oft Kopfschmerzen.
7/92 Dr. Dobbs Journal, USA: The Final Step: Running Light with 386BSD(With Lynne Greer Jolitz ). Overview of the impact of Release 0.0 on the BSD community. Installation procedures for and highlights of Release 0.1. Final installment of series.
7/92 UNIX Magazin, Germany: Erkenne Dich Selbst(With Lynne Greer Jolitz ). Kenner der BSD-Systeme Wissen die Systemmeldungen während des Bootvorganges zu entziffern. In dieser Folge wird das zugrundeliegende Schema der Autokonfiguration der Gerätetreiber näher beschrieben. Vorteil dieser Technik is, dass erst beim Booten die aktuellen Daten der angeschlossenen Devices in den Kernel übernommen werden. Die Zeit der Betriebssystem-Patches sollte damit vorbei sein.
6/92 Dr. Dobbs Journal, USA: Missing Pieces II(With Lynne Greer Jolitz ). Finishing the NET/2 release of Berkeley UNIX to obtain a complete, unencumbered system for the 386 PC. Describes the methodology and implementation of the remaining facilities necessary to generate a working operating system for the PC.
6/92 UNIX Magazin, Germany: Magie des Kernels(With Lynne Greer Jolitz ). Als Anwender eines Multitasking-Betriebssystems nutzt man die praktischen Möglichkeiten, ohne zu wissen, welche fundamentalen Dienstleistungen innerhalb des Kernels dafür verantwortlich sind.
5/92 Dr. Dobbs Journal, USA: Missing Pieces I(With Lynne Greer Jolitz ). Finishing the NET/2 release of Berkeley UNIX to obtain a complete, unencumbered system for the 386 PC. Describes the methodology and implementation of the remaining facilities necessary to generate a working operating system for the PC. (See also Unix Device Drivers III and Missing Pieces II)
4/92 Dr. Dobbs Journal, USA: Unix Device Drivers III(With Lynne Greer Jolitz ). Completion of basic 386BSD device drivers.
4/92 UNIX Magazin, Germany: Das Geheimnis des Multiprogramming(With Lynne Greer Jolitz ). Einer der wichtigsten Unterschiede von Unix gegenüber den Singeltasking Systemen wie MS-DOS ist der von Anfang an einbezogene Faktor des Multiprogramming. Erst hiermit können auf einen einzigen Prozessor das Gefühl und die vielfältigen Möglichkeiten der Parallelverarbeitung nicht nur versprochen, sondern auch gehalten werden.
4/92 Dr. Dobbs Journal, USA: Unix Device Drivers III(With Lynne Greer Jolitz ). Completion of basic 386BSD device drivers.
3/92 Dr. Dobbs Journal, USA: Unix Device Drivers II(With Lynne Greer Jolitz ). Interfaces to the operating system. Entering, exiting and masking processor interrupts. (See also Unix Device Drivers I andUnix Device Drivers III)
3/92 UNIX Magazin, Germany: Aus Hänschen wird Hans(With Lynne Greer Jolitz ). Auch ein so umfangreiches Betreibssystem wie UNIX fängt mal kelin an. Gemeint ist die Bootphase, in der sich der Riese aus kleinen Teilen seibst zusammensetzt. Wer wollte nich schon einmal wissen, weiche Strategie hierbei verfolgt wird, um aus dem grossen Sortiment der Tabellen, Pages, Layer und Funktionen ein funktionierendes Ganzes zu machen.
2/92 Dr. Dobbs Journal, USA: Unix Device Drivers I(With Lynne Greer Jolitz ). The structure of 386BSD device drivers, interfaces to the operating system, and minimal device drivers for the console, disk drive and scheduling clock of the PC.
2/92 UNIX Magazin, Germany: Tanz auf dem Eis(With Lynne Greer Jolitz ). Gerade die ersten wackeligen Schritte des Kernels in seiner unvoliständigen Systemumgebung sind die kritischen. Diese Folge beschreibt neben dem rekusiven Paging, wie man sich auf dem brüchigen Eis bewegt.
1/92 UNIX Magazin, Germany: Rekursives Speicher-Mapping(With Lynne Greer Jolitz ). Die Speicherverwaltung gehört zu den Kernstücken jeder UNIX-implementation. Mit dem rekursiven Paging haben sich die Autoren ein neues Verfahren ausgedacht, weiches nicht nur auf dem 80386 eine verbesserte Performance ermöglicht.
12/91 UNIX Magazin, Germany: Feuer und Wasser(With Lynne Greer Jolitz ).
11/91 Dr. Dobbs Journal, USA: Device Autoconfiguration(With Lynne Greer Jolitz ). How 386BSD discovers hardware devices that are present and configures itself for operation with those devices.
11/91 UNIX Magazin, Germany: Alles in eine Schublade(With Lynne Greer Jolitz ).
10/91 Dr. Dobbs Journal, USA: Multiprogramming and Multiprocessing II(With Lynne Greer Jolitz ). How multiprogramming is achieved via multitasking. A discussion of the process. Alternative implementations and trade-offs. A reflection on why it has been so difficult to add multiprogramming to non-UNIX operating systems such as MS-DOS.
10/91 UNIX Magazin, Germany: Damit die Fehlersuche nicht zum Hürdenspringen wird(With Lynne Greer Jolitz ). Bei der Portierung eines Paketes wie BSD-UNIX muss man als Programierer verschiedene Verfahren zur Fehlersuche kombiniert einsetzen. Erst die Kombinartion führt zum Ziel, denn schliesslich pochen auch die Tools auf ihr Recht auf Fehler.
9/91 Dr. Dobbs Journal, USA: Multiprogramming and Multiprocessing I(With Lynne Greer Jolitz ). An overview of the multiprogramming paradigm in 386BSD. Conventions, definitions, and organization of multiprogramming.
9/91 UNIX Magazin, Germany: Sicher bewegen auf fremdem Terrain(With Lynne Greer Jolitz ). Die richtige Auswahl der Entwicklungs-hardware und -software kann während der eigentlichen Portierung viel Zeit sparen. Der Cross-Support offenbart auch so genügend Hindernisse, die zu überwinden sind.
8/91 Dr. Dobbs Journal, USA: The Basic Kernel(With Lynne Greer Jolitz ). Initialization of the 386BSD kernel services and data structures.
8/91 UNIX Magazin, Germany: Systemverwaltung durch Tabellen(With Lynne Greer Jolitz ). Eine der wichtigsten Hürden, die bei der Portierung von BSD auf den 386 zu überwinden ist: die fehlerfreie Initialisierung der Systemtabellen im Protected Mode. Überraschungen sind zu jeder Zeit angesagt.
7/91 Dr. Dobbs Journal, USA: A Stripped-Down Kernel(With Lynne Greer Jolitz ). The 386BSD basic kernel, incorporating a unique recursive paging feature that leverages resources and reduces complexity.
7/91 UNIX Magazin, Germany: Steighilfe(With Lynne Greer Jolitz ). Der BSD-Kernel steht nicht gleich zu Beginn eines Ports in voller Blüte auf der neuen Hardwareplattform zur Verfügung. Bis man soweit ist, kann man sich auch die Funktionen eines bereits lauffähigen Systems, hier is es MS-DOS einschliesslich seiner Applikationen, zunutze machen.
6/91 Dr. Dobbs Journal, USA: Research and the Commercial Sector: Where Does BSD Fit In?(With Lynne Greer Jolitz ). A discussion of the various demands placed on research and commercial operating systems, and how they differ.
6/91 UNIX Magazin, Germany: Portierung von BSD-UNIX auf den 80386. Heimliche Liebe(With Lynne Greer Jolitz ). Bislang galt die Intel-Plattform als Hochburg von AT&T System V, während vor allem der technische Workstationmarkt nach wie vor mit BSD-UNIX arbeitet. Kein Wunder, dass die BSD-FAns auf einen 80386-Port warteten. Unsere 386BSD-Serie beschreibt im Detail den Port und gibt wichtige Einblicke in BSD.
5/91 Dr. Dobbs Journal, USA: The Initial Root Filesystem(With Lynne Greer Jolitz ). The development of the initial root filesystem required for the 386BSD operating system kernel.
4/91 UNIX Magazin, Germany: Zwei Seiten der Medaille(With Lynne Greer Jolitz ). Die Uniforum-Konferenz gehört zu den wichtigsten Veranstaltungen, die der UNIX-Kalender im Jahr aufweist. Grund genug, diese Veranstaltung wie in den Vorjahren für Sie zu besuchen, um wichtige Neuerungen und Trends aufzuspüren. Doch der Golfkrieg hat auch hier seine vergleichsweise bescheidenen Eindrücke hinterlassen; die geplanten Reisen mussten abgesagt werden. Mit Bill Jolitz konnte ein UNIX-Insider gefunden werden, der uns seine Eindrücke zukommen liess.
4/91 Dr. Dobbs Journal, USA: Copyrights, Copyleft, and Competitive Advantage, Lynne Greer Jolitz . An overview and analysis of the effects and trends towards the use of copyrights, Free Software Foundation (FSF) “copylefts”, and the impact on American competitive advantage.
3/91 Dr. Dobbs Journal, USA: The Standalone System(With Lynne Greer Jolitz ). Using the protected mode program loader, a minimal 80386 protected mode standalone C programming environment for operating systems kernel development is created. (See also Three Initial PC Utilities and Copyrights, Copyleft, and Competitive Advantage)
2/91 Dr. Dobbs Journal, USA: FEB91: PORTING UNIX TO THE 386: THREE INITIAL PC UTILITIES(With Lynne Greer Jolitz ). Utilities to let you execute GCC-compiled programs in protected mode from MS-DOS and copy files to a shared portion of disk so MS-DOS and UNIX can exchange information. Contains: The Purpose of Our PC Utilities,
The First PC Utility: boot.exe,
Unix Kernel Load Program,
The GCC Executable Format,
Entering Protected Mode,
The Second PC Utility: cpfs.exe,
The Third PC Utility: cpsw.exe,
Where We Go From Here,
The 386BSD Project and Berkeley UNIX .
(Part of the series PORTING UNIX TO THE 386: A PRACTICAL APPROACH, see also Designing a Software Specification and The Standalone System)
1/91 Dr. Dobbs Journal, USA: PORTING UNIX TO THE 386: DESIGNING THE SOFTWARE SPECIFICATION(With Lynne Greer Jolitz ). In this first installment of a multipart series, the design specification for 386BSD, Berkeley UNIX for the 80386, is discussed. Contains: Getting Started: References, Equipment, and Software,
Development of the 386BSD Specification,
The Definition of the 386BSD Specification,
Conflicts in Priorities,
386BSD Port Goals: A Practical Approach,
Microprocessor and System Specification Issues,
386 Memory Management Vitals,
Segmentation and 386BSD,
Kernel Linear Address Space Overhead,
Virtual Address Space Layout,
Per-Process Data Structures,
386 Virtual Memory Address Translation Mechanism,
User to Kernel Communication Primitives,
Berkeley UNIX Virtual Memory System Strategy,
Structure of Per-Process Data (u.),
Process Context Description,
Page Fault and Segmentation Fault Mechanism,
Other Processor Faults,
System Call Interface,
System Specific (ISA) Issues,
Physical Memory Map,
ISA Device Controllers,
ISA Device Auto Configuration,
Interrupt Priority Level Management,
Summary: Where is 386BSD Now?,
and Suggested Readings.
(Part of the series PORTING UNIX TO THE 386: A PRACTICAL APPROACH, see also Three Initial PC Utilities)
Winter 1983 USENIX Conference Proceedings. UNIX on the National Semiconductor NS16032 (, with Glenn Skinner and Laura Neff). Using Unix as a micro-program development tool. Unix is standardized on many working platforms, so it is used to debug a new microprocessor and novel memory management unit designed at National Semiconductor in a project code-named Project Mesa.
1977 West Coast Computer Faire, USA: The Design of a Voice Output Adapter for Computer. The design of a Voice Output Adapter for visually handicapped computer programmers is discussed. This device, based on a DEC LSI-11 microcomputer and a VOTRAX VS-6 synthesizer will generate speech from ordinary typed text. Phonetic translation is accomplished by a set of rules, instead of a dictionary. Although this device uses a VOTRAX synthesizer, and experimentation has been limited to English, the device will act independently of language or synthesizer type. All software will reside in the main memory; no peripheral memory will be used. This results in a compact device.
ISDN Networking Technology: A Strategic Overview(With Lynne Greer Jolitz ). An introduction to the Integrated Services Digital Network (ISDN) is provided with a tour of motivations, standards, terminology, functional blocks, system equipment, link access protocols, signaling protocols and standard services. Specific case examples on the interoperability between current networking technology and ISDN are developed and examined. In addition, a number of possible ISDN applications are explored along with the current limitations and frustrations of the ISDN standards, the current schedule of events of ISDN service accessibility, and the near-term changes expected within the world of ISDN.
Open Systems Networking With TCP/IP(With Lynne Greer Jolitz ). A comprehensive course which details the TCP/IP protocol suite, the Internet CORE protocols and the basics of Internet architecture, including the Domain Name Server. It also examines the underlying concepts and principles of TCP/IP. Examples, network management, the integration of applications protocols into a useful network, and network operations are also discussed.
The Internet and ISDN. This intensive short course reviewed ISDN basics, IP growth, ISDN service introductions, and existing ad hoc implementations. ISDN is studied as a catalyst for campus Internet service, using the University of California at Berkeley as a case example.
InterProphet Corporation Business Plan. Enabling the New Internet Enterprise(With Lynne Greer Jolitz ),(with Ross Hunt). 1997-2000.
Symmetric Computer Systems. The 375 and 875 Single Microprocessor BSD-Unix Systems. 1982-1990.
Operating System Source Code Secrets Volume 2: The Virtual Memory System(With Lynne Greer Jolitz ). This multivolume series examines the anatomy of an operating system. The brain of an operating system is the virtual memory system. Like a human brain, the virtual memory system is the means through which temporary and permanent memory is stored and accessed. Temporary memory is used as a workspace to assemble a new item before it is stored into permanent memory. Among those most fundamental of functions are: management of kernel and program virtual address spaces (creation, replication, modification, and destruction); management of store backing an address space (naming, protection, sharing, and inheritance of memory contents); persistent and temporary memory; machine dependent (X86) memory management unit control; copy-on-write semantics; main store and secondary store management; page replacement; memory mapped I/O; address space fault handling; demand loading from secondary store; lazy versus industrious evaluation; and UNIX and BSD API’s for address space control. The virtual memory module is not only a key subsystem of the operating system kernel but is itself composed of layers and levels of abstraction. These layers are discussed in terms of future evolution to support the needs of clustering, security, extensibility, and performance.
386BSD from the Inside-Out(With Lynne Greer Jolitz ). Describes in detail the internal structure of the 386BSD operating system done by the authors as an example of operating system design methodology and implementation choice, thus reconciling the implementation-specific practice discussed in the Operating Systems Source Code Secrets series with formal operating systems design. The unique approach of this work is to proceed from fundamental structure of the kernel and its interfaces to the specific subsystems present within the operating system. This inside-out progression illuminates alternative choices for structure in a historical light by detailing how the decisions made in the past affect the current technology. The focus of this book is to provide an exploded view of a modern computer operating system and why it is composed the way it is, so that students of the field can grasp the concepts and methodologies chosen.