From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=0.2 required=5.0 tests=BAYES_00,INVALID_MSGID, REPLYTO_WITHOUT_TO_CC autolearn=no autolearn_force=no version=3.4.4 X-Google-Language: ENGLISH,ASCII-7-bit X-Google-Thread: 103376,5c89fe49fff7f5b8 X-Google-Attributes: gid103376,public From: kilgallen@eisner.decus.org (Larry Kilgallen) Subject: The nature of operating systems - was: IRQs and interrupt handlers Date: 1998/05/21 Message-ID: <1998May21.173539.1@eisner>#1/1 X-Deja-AN: 355359115 X-Nntp-Posting-Host: eisner.decus.org References: <356307C7.D18D062@cl.cam.ac.uk> <6k1rq4$58t@top.mitre.org> X-Trace: news.decus.org 895786582 26681 KILGALLEN [192.67.173.2] Organization: LJK Software Reply-To: Kilgallen@eisner.decus.org.nospam Newsgroups: comp.lang.ada Date: 1998-05-21T00:00:00+00:00 List-Id: In article <6k1rq4$58t@top.mitre.org>, mfb@mbunix.mitre.org (Michael F Brenner) writes: > But it is a fact that the raw strokes are not available to user > programs in most newer operating systems. > > Something as simple as which keys are currently being held down, > the true location of the mouse, or lighting up a pixel on the screen > are forbidden to the programer, glorifying mediocrity in the name > of security. The word security is deprecated by this philosophy > of hiding the raw input-outputs streams from the authorized users. That view seems particularly tied to the notion of a single-user computer. I certainly would not want _you_ to have access to the bare metal on a machine where my process was running. (But of course, you should be willing to tolerate _me_ having such access.:-) There are several software products (I hesitate to call them operating systems) available for single-user computers, but when you start paying for multiprocessing operating systems you find the market is driven by those who want to minimize the chance of users interfering with one another. And yes, if you just want "character-at-a-time-as-soon-as-possible" you _do_ have the potential to interfere with other users via timing. Operating systems arbitrate the degree to which such interference is tolerated, and ideally allow the system manager to vary the degree to which it is tolerated. Larry Kilgallen