Operating Systems Coursework
Operating Systems Coursework
P.O.BOX 1,
FACULTY OF SCIENCE.
SCHOOL OF COMPUTING AND INFORMATION SCIENCE
COURSE UNIT: OPERATING SYSTEMS
The oldest of all Microsoft’s operating systems is MS-DOS (Microsoft Disk Operating System).
MS-DOS is a text-based operating system. Users had to type commands rather than use the
friendlier graphical user interfaces (GUI’s) available today.
Microsoft Windows dates back to 1985, when Microsoft released Microsoft Windows Version
1.01. Microsoft’s aim was to provide a friendly user-interface known as a GUI (graphical user
interface) which allowed for easier navigation of the system features. Windows 1.01 never
really caught on. The release was a shaky start for the tech giant. Users found the software
unstable. (The amazing thing about Windows 1.01 is that it fitted on a single floppy disk).
However, the point-and-click interface made it easier for new users to operate a computer.
Windows 1.0 offered many of the common components found in today's graphical user
interface, such as scroll bars and "OK" buttons.
1987: Windows 2.0 and 2.11
Windows 2.0 was faster, more stable and had more GUI features. The GUI was very slightly
improved but still looked too similar to Windows 1.01.The system introduced the control panel
and ran the first versions of Excel and Word. Windows 2.0 supported extended memory, and
Microsoft updated it for compatibility with Intel's 80386 processor. It was during this time that
Microsoft became the largest software vendor in the world, just as computers were becoming
more commonplace. The fact that Windows systems were user-friendly and relatively
affordable was a contributing factor to the growing PC market.
1990: Windows 3.0
Windows 3.0 supported 16 colors and included the casual games familiar to most Windows
users: Solitaire, Minesweeper and Hearts. Games that required more processing power still ran
directly on MS-DOS. Exiting to DOS gave games direct hardware access made more system
resources available. Microsoft made an enormous impression with Windows 3.0 and 3.1.
Graphics and functionality were drastically improved. The Windows 3 family provided
multimedia capabilities as well as vastly improved graphics and application support. Building on
the success of Windows 3.x, Microsoft released Microsoft Windows 3.11 for Workgroups. This
gave Windows the ability to function on a network.
1993: Windows New Technology (NT)
Windows NT's release marked the completion of a side project to build a new, advanced OS. NT
was 32-bit and had a hardware abstraction layer. DOS was available through the command
prompt, but it did not run the Windows OS. Microsoft designed NT as a workstation OS for
businesses rather than home users. The system introduced the Start button.
1995: Windows 95
In 1995 Windows went through a major revamp and Microsoft Windows 95 was released. This
provided greatly improved multimedia and a much more polished user interface. The now
familiar desktop and Start Menu appeared. Internet and networking support was built in.
Although Windows 95 was a home user operating system, it proved to be very popular in
schools and businesses. Windows 95 facilitated hardware installation with its Plug and Play
feature. Microsoft also unveiled 32-bit color depth, enhanced multimedia capabilities and
TCP/IP network support.
1998: Windows 98
Microsoft Windows 98 was very similar to Windows 95, it offered a much tidier display and
enhanced multimedia support. Microsoft improved speed and Plug and Play hardware support
in Windows 98. The company also debuted USB support and the Quick Launch bar in this
release. DOS gaming began to wane as Windows gaming technology improved. The popularity
of the OS made it an attractive target for malware. Microsoft integrated web technology into
the Windows user interface and built its own web browser into the desktop.
2000: Windows Millennium Edition (ME)
Windows ME (Millennium Edition) was the last use of the Windows 95 codebase. Its most
notable new feature was System Restore. Many customers found this release to be unstable.
Some critics said ME stood for "mistake edition." Microsoft released the professional desktop
OS Windows 2000 (initially called NT 5.0) in the same year for the business market.
Improvements to the overall operating system allowed for easier configuration and installation.
Microsoft based this OS on the more stable Windows NT code. Some home users installed
Windows 2000 for its greater reliability. Microsoft updated Plug and Play support, which
spurred home users to switch to this OS. One big advantage of Windows 2000 was that
operating system settings could be modified easily without the need to restart the machine.
Windows 2000 proved to be a very stable operating system that offered enhanced security and
ease of administration.
2001: Windows XP
Microsoft delivered Windows XP as the first NT-based system with a version aimed squarely at
the home user. Home users and critics rated XP highly. The system improved Windows
appearance with colorful themes and provided a more stable platform. Microsoft virtually
ended gaming in DOS with this release. DirectX-enabled features in 3D gaming that OpenGL had
difficulties with. XP offered the first Windows support for 64-bit computing, but it was not very
well supported, lacking drivers and applications to run.
2009: Windows 7
Microsoft built Windows 7 on the Vista kernel. Windows 7 picked up Vista's visual capabilities
but featured more stability. To many end users, the biggest changes between Vista and
Windows 7 were faster boot times, new user interface and the addition of Internet Explorer 8.
With true 64- bit support and more Direct X features, Windows 7 proved to be a popular
release for Windows users.
2012: Windows 8
Microsoft released Windows 8 with a number of enhancements and debuted its tilebased
Metro user interface. Windows 8 took better advantage of multicore processing, solid-state
drives (SSD), touchscreens and other alternate input methods.
2015: Windows 10
Linux is an operating system or a kernel. It is distributed under an open source license. Its
functionality list is quite like UNIX.
Linux is an operating system or a kernel which germinated as an idea in the mind of young and
bright Linus Torvalds when he was a computer science student. He used to work on the UNIX
OS (proprietary software) and thought that it needed improvements. However, when his
suggestions were rejected by the designers of UNIX, he thought of launching an OS which will
be receptive to changes, modifications suggested by its users.
As time passed by, he collaborated with other programmers in places like MIT and applications
for Linux started to appear. So around 1991, a working Linux operating system with some
applications was officially launched, and this was the start of one of the most loved and open-
source OS options available today. The earlier versions of Linux were not so user- friendly as
they were in use by computer programmers and Linus Torvalds never had it in mind to
commercialize his product.
This definitely curbed the Linux's popularity as other commercially oriented Operating System
Windows got famous. Nonetheless, the open-source aspect of the Linux operating system made
it more robust.
The main advantage of Linux was that programmers were able to use the Linux Kernel to
design their own custom operating systems. With time, a new range of user-friendly OS's
stormed the computer world. Now, Linux is one of the most popular and widely used Kernel,
and it is the backbone of popular operating systems like Debian, Knoppix, Ubuntu, and Fedora.
Nevertheless, the list does not end here as there are thousands of OS's based on Linux which
offer a variety of functions to the users. Linux Kernel is normally used in combination of GNU
project by Dr. Richard Stallman. All mordern distributions of Linux are actually distributions of
Linux/GNU.
Properties of Linux
Linux Pros
A lot of the advantages of Linux are a consequence of Linux' origins, deeply rooted in UNIX,
except for the first advantage, of course:
1. Linux is free: If you want to spend absolutely nothing, you don't even have to pay the price of
a CD. Linux can be downloaded in its entirety from the Internet completely for free. No
registration fees, no costs per user, free updates, and freely available source code in case you
want to change the behavior of your system.
2. Most of all, Linux is free as in free speech: The license commonly used is the GNU Public
License (GPL). The license says that anybody who may want to do so, has the right to change
Linux and eventually to redistribute a changed version, on the one condition that the code is
still available after redistribution.
3. Linux is portable to any hardware platform: A vendor who wants to sell a new type of
computer and who doesn't know what kind of OS his new machine will run (say the CPU in your
car or washing machine), can take a Linux kernel and make it work on his hardware.
4. Linux is secure and versatile: The security model used in Linux is based on the UNIX idea of
security, which is known to be robust and of proven quality. But Linux is not only fit for use as a
fort against enemy attacks from the Internet: it will adapt equally to other situations, utilizing
the same high standards for security. Your development machine or control station will be as
secure as your firewall.
5. Linux is scalable: From a Palmtop with 2 MB of memory to a petabyte storage cluster with
hundreds of nodes: add or remove the appropriate packages and Linux fits all. You don't need a
supercomputer anymore, because you can use Linux to do big things using the building blocks
provided with the system. If you want to do little things, such as making an operating system
for an embedded processor or just recycling your old 486, Linux will do that as well.
6. The Linux OS and most Linux applications have very short debug-times: Because Linux has
been developed and tested by thousands of people, both errors and people to fix them are
usually found rather quickly. It sometimes happens that there are only a couple of hours
between discovery and fixing of a bug.
Linux Cons
"Quot capites, tot rationes", as the Romans already said: the more people, the more opinions.
At first glance, the amount of Linux distributions can be frightening, or ridiculous, depending on
your point of view. But it also means that everyone will find what he or she needs. You don't
need to be an expert to find a suitable release.
When asked, generally every Linux user will say that the best distribution is the specific version
he is using. So which one should you choose? Don't worry too much about that: all releases
contain more or less the same set of basic packages. On top of the basics, special third party
software is added making, for example, TurboLinux more suitable for the small and medium
enterprise, RedHat for servers and SuSE for workstations. However, the differences are likely to
be very superficial. The best strategy is to test a couple of distributions; unfortunately not
everybody has the time for this. Luckily, there is plenty of advice on the subject of choosing
your Linux. A quick search on Google, using the keywords "choosing your distribution" brings up
tens of links to good advice. The Installation HOWTO also discusses choosing your distribution.
• Linux is not very user friendly and confusing for beginners: It must be said that Linux, at least
the core system, is less user-friendly to use than MS Windows and certainly more difficult than
MacOS, but... In light of its popularity, considerable effort has been made to make Linux even
easier to use, especially for new users.
What is UNIX?
UNIX is an operating system (OS): it manages the way the computer works by driving the
processor, memory, disk drives, keyboards, video monitors, etc. and by performing useful tasks
for the users. UNIX was created in the late 1960s as a multiuser, multitasking system for use by
programmers. The philosophy behind the design of UNIX was to provide simple, yet powerful
utilities that could be pieced together in a flexible manner to perform a wide variety of tasks.
A key difference between the Unix OS and others you are familiar with (e.g., PC) is that UNIX
is designed for multiple users. That is multiple users may have multiple tasks running
simultaneously. Its original purpose was to facilitate software development. It is the primary OS
used by physical scientists everywhere, and all supercomputing facilities use it. To put it bluntly,
if you are at all on the numerical side of physical sciences, then you need to learn how to operate
on a Unix OS.
1) The Kernel – The core of the UNIX system. Loaded at system start up (boot); manages the
entire resources of the system. Examples of what it does are: interpreting and executing
instructions from the shell, managing the machine’s memory and allocating it to processes,
scheduling the work done by the CPU’S.
2) The Shell – Whenever you login to a UNIX system you are placed in a shell program. The
shell is a command interpreter; it takes each command and passes it to the operating system
kernel to be acted upon. It then displays the results of this operation on your screen. Several
shells are usually available on any UNIX system, each with its own strengths and weaknesses.
Examples are the Bourne Shell (sh), C Shell (csh), and Bourne Again Shell (bash).
3) Utilities -- UNIX provides several hundred utility programs, often referred to as commands.
The commands accomplish universal functions such as printing, editing files, etc.
Logging into the UNIX side of things
To log into the Linux side of the FASB computers before hitting return after entering your
username and password select:
Session GNOME.
Getting started – really basic UNIX
Now that you’ve logged in and opened up a terminal you are looking at a window that contains
your home directory space. In case you are already confused, on UNIX systems we refer to
folders as directories.
Your Home Directory
• Each user has a unique home directory. Your home directory is that part of the file system
reserved for your files.
• After login, you are put into your home directory automatically. This is where you start your
work.
• You are in control of your home directory and the files which reside there. You are also in
control of the file access permissions to the files in your home directory. Generally, you alone
should be able to create/delete/modify files in your home directory. Others may have permission
to read or execute your files as you determine.
• In most UNIX systems, you can move around or navigate to other parts of the file system
outside of your home directory. This depends upon how the file permissions have been set by
others and/or the System Administrator.
UNIX Commands
UNIX commands are programs that are supplied with the Unix OS to do specific tasks. They
generally act like:
>> Command arguments
Unlike your PC or Mac, instead of clicking a program icon, you type a program name in the
terminal window. For example, type the following:
>> Date
Date is an example of a UNIX command. When used as above it simply returns the current date
and time. But, we can often supply arguments to the command that modify the way the program
works. For example:
>> Date –date==yesterday
Here we supplied an argument asking us to return yesterday’s date instead of todays.
ANDROID OPERATING SYSTEM
Android is a Linux-based operating system it is designed primarily for touch screens mobile
devices such as smartphones and tablet computers. The operating system has developed a lot in
the last 15 years starting from black and white phones to recent smartphones or mini computers.
One of the most widely used mobile OS these days is android. The android is software that was
founded in Palo Alto of California in 2003.
Android development supports the full java programming language. Even other packages that are
API and JSE are not supported. The first version 1.0 of the android development kit (SDK) was
released in 2008 and the latest updated version is a jelly bean.
Android Architecture
The android is an operating system and is a stack of software components which is divided into
five sections and four main layers that is
Linux kernel
Libraries
Android runtime
Application Framework
Applications
The first Android version like 1.0 was released in the year 2008 but it didn’t have any
codename. Android Version – 1.5 In the Year 2009 which is called Donut. The ability of
this version is, it operates on different screen sizes as well as resolutions.
Android Versions from 2.0 – 2.1
Éclair 2.0 version was released after six weeks of the Donut version.
Android Version – 2
After four months of 2.1version invention, the Android 2.2 version was released which is
called Froyo.
Android Version 2.3
The first true visual identity of Android version 2.3 was released in the year 2010 namely
Gingerbread.
Android Version from 3.0 – 3.
In the year 2011, the versions from 3.0 – 3.2 were released which is named Honeycomb
Android Version 4.0
Android 4.0 was released in the year 2011 which is called Ice Cream Sandwich.
Android Versions 4.1 – 4.3
Android Versions 4.1 to 4.3 were released between 2012 to 2013 which is called Jelly
Bean.
Android Version 4.4
Android Version 4.4 was released in Late-2013’s which is called KitKat.
Android 5
The version of Android 5.0 was launched in the year 2014, Nov in the Nexus 6 device
which is called Lollipop
Android 5.1
This version of Android 5.1 was released in March 2015 called Lollipop
Android 6.0
Android 6.0 Version like Marshmallow was released in Oct 2015.
Android 7.0
Android 7.0 version was released by Google in Aug 2016 called Nougat.
Android 7.1, 7.1.1 & 7.1.2 Nougat
Android 7.1 version was released in Oct 2016, called Nougat
Android 8.0
Android 8.0 version was released in Aug 2017 called Oreo.
Android 8.1.0
Android 8.1.0 version was released in Dec 2017, called Oreo
Android Version 9 Pie
Android version 9 Pie was released in Aug 2018
Android Version 10
Android version 10 was launched in September 2019
Android Version 11
Android version 11 was released recently on September 8th, 2020
Advantages
The Macintosh Operating System (Mac OS) is an operating system (OS) designed by Apple Inc.
to be installed and operated on the Apple Macintosh series of computers. Introduced in 1984, it is
a graphical user interface (GUI) based OS that has since been released as multiple different
versions.
Mac OS is considered the pioneer of GUI based operating systems, as it was launched when MS-
DOS was the industry standard. Mac OS is a completely capable OS that provides functionality
and services similar to Windows or Linux OS. Some of the code base and features of Lisa OS
have been incorporated in Mac OS.
Mac OS is designed to operate on Apple manufactured PCs and by default, does not support x86
architecture. As of 2012, Mac OS released several versions, including Macintosh 128k, Mac OS
7, Mac OS X and Mac Mountain Lion.
Features of MACOS
Continuity Camera
Dark Mode
Desktop Stacks
Dynamic Desktops
Finder enhancements: Gallery View, view metadata, and Quick Actions
Improved OS and Safari security
Screenshot markup
Siri will have several improvements, including the ability to control HomeKit devices
from your Mac and the ability to use Find My iPhone.
Safari will have Favicons in tabs and intelligent tracking protection.
Quick Look will have editing tools.
Apple Mail will support emojis and be able to suggest a mailbox in which to file an
email.
Enhanced support for passwords, including the ability to automatically create strong
passwords, autofill of passcodes sent via text, and password auditing.
APFS format support for Fusion Drives.
GPU support on a per-application basis.
MACOS architecture.
Over the last 36 years, the Apple Macintosh has had three different CPU architectures, and it’s
poised to potentially migrate to a fourth. As rumors about a switch to ARM swirl, let’s take a
brief look at the history of CPU architectures on the Mac.
Motorola 68 K (1984-1995)
The Apple Macintosh (1984) was the first Mac to use a Motorola 68k CPU. Apple, Inc.
In 1984, Apple released the first Macintosh computer (called, unsurprisingly, the Apple
Macintosh). It used an 8 MHz Motorola 68000 CPU. While in development, an early Mac
prototype used an 8/16-bit Motorola 6809 CPU. However, after a designer saw the amazing
graphics routines that were being created for the 68000-based Apple Lisa, the more expensive
16/32-bit 68000 was used. The Apple Lisa used only a 5 MHz 68000, but the new Mac prototype
could run at 8 MHz. This delighted Steve Jobs, who wanted to upstage the Lisa team.
Over the next decade, new models of Macintosh computers began using successors of the 68000,
including the pure 32-bit 68020, 68030, and 68040 chips. These increased in speed and
complexity over time.
Overall, at least 72 different Macs used 68k CPUs. The final Mac model to do so was the
PowerBook 190 in 1995.
PowerPC (1994-2005)
The Apple Power Macintosh 6100, the first PowerPC-based Mac. Apple, Inc.
In the late 1980s, the computing industry began to turn away from the legacy 1970’s CPU
architectures in favor of new trends, like Reduced Instruction Set Computing (RISC). This
design technique promised faster CPUs. Apple explored many different RISC CPU options, but
eventually partnered with IBM and Motorola to design a common CPU platform. The three
companies wanted to use this to fend off the Microsoft-Intel domination (also known as
“Wintel“).
The result was the PowerPC architecture. It was first used in a series of workstations from IBM,
and then in 1994 in the Power Macintosh 6100. Apple designed a 68 K emulator that was
included with every copy of Mac OS. This meant these new Macs could run almost all older 68
K software seamlessly (albeit with some speed penalties), allowing a smooth transition to
PowerPC.
Over the years, Apple released around 87 different Mac models that used PowerPC CPUs,
including chips in the 601, 603, G3, G4, and G5 series. PowerPC CPU clock speeds increased
dramatically during this era, ranging from 60 MHz all the way up to 2.7 GHz. The final Apple
PowerPC model was an iteration of the Power Mac G5, released in November 2005.
By the mid-2000s, Apple felt hamstrung by its reliance on PowerPC CPUs. Macs had trouble
keeping speed parity with Intel-based PCs due to the delays in the production and design of new
PowerPC chips. Also, by the G5 generation, PowerPC chips were so power-hungry, they
required extensive cooling to operate, precluding their use in laptops.
So, when Apple announced it would transition to Intel chips at WWDC 2005, critics were happy,
but surprised. After years of advertising that touted the superiority of PowerPC over Intel, Apple
switching to Intel felt like a lifeline for Macintosh. Mac CPU performance increased almost four-
fold overnight. The first Intel Mac models were announced in early 2006: an iMac and the
MacBook Pro.
To preserve software compatibility between generations, Apple included an advanced emulation
technology called Rosetta starting with Mac OS X 10.4.4. It could dynamically translate some
PowerPC code to Intel on the fly.
Shortly after, developers began to distribute their programs as universal binaries, which could
run on either PowerPC or Intel Macs, which greatly eased the transition to x86. Rosetta was
eventually removed from Mac OS X starting with Mac OS X 10.7 Lion.
Depending on how you count, since 2006, Apple has released at least 80 models (perhaps as
many as 100) of Macs with Intel CPUs. The final Intel Mac model is yet to be determined, but if
you believe some pundits, it might arrive later this year.
ARM (2021?)
Back in the present day, Apple’s Intel-based Macs sell well and likely have a solid CPU roadmap
ahead of them. However, rumors that Apple will soon switch its Macs to ARM-based CPUs are
buzzing. This would mark the third system architecture transition in the Mac line—but, why?
Since 2010, Apple has been steadily gaining experience designing its own ARM CPU-based
system-on-a-chip (SOC) packages for iPhone, iPad, and Apple TV hardware. The company’s
progress has been amazing. Its designs have improved dramatically in speed and performance-
per-watt, with some iPads now rivaling MacBooks in single-core performance. Matching Intel-
level performance with ARM chips finally makes them a feasible replacement for CPU
architecture in Macs.
With ARM more competitive performance-wise, Apple would gain other benefits from an
architecture switch, including efficiency and control. The firm has already been packing many
features into its SOCs—like faster photo processing and AI face recognition—that accelerate
Apple-specific design goals. If Apple uses its own chips for Macs, it gets exactly what it needs
and nothing extra.
Also, it’s potentially cheaper for Apple to produce chips in-house, instead of buying them from
Intel. This would make Apple products even more ridiculously profitable than they already are,
which is good for its bottom line. Those cost-savings could also mean some cheaper Macs are on
the horizon if Apple chooses to move in that direction.
Developers stand to benefit, too. ARM-based SOCs in Macs would allow app manufacturers to
more easily port their iPhone and iPad software to the Mac platform. They could also more
easily keep software for all three platforms in feature parity.
UBUNTU OPERATING SYSTEM
Ubuntu is a Linux-based operating system. Ubuntu is designed for smartphones, network servers,
and computers. It is developed by Canonical Ltd, which is a UK-based company. All of the
principles used to create the Ubuntu software are based on open-source software development
principles.
Ubuntu Features
Ubuntu is a Linux-based operating system. Ubuntu is designed for smartphones, network servers
and computers. It is developed by canonical Ltd, which is a UK based company. All of the
principles used to create Ubuntu software are based on an open source software development
principles.
Ubuntu is popular in universities and research groups because it combines all the features of
Unix OS with a customizable graphical user interface.
Ubuntu includes a number of software programs, for example, LibreOffice and Firefox. It is also
possible to run proprietary software on Ubuntu.
The GNU General Public License is used to license many of Ubuntu’s software products. This
permits users to create their own version of programs by copying, changing, developing, and
redistributing them.
GNOME (GNU Network Object Model Environment, pronounced gah-NOHM), a graphical user
interface (GUI), and as a suite of desktop applications for Linux. GNOME is a desktop
environment for Linux that is comparable to the Windows desktop interface. It is designed to
make Linux accessible to people who are not programmers.
Ubuntu Features
Office software
An open-source operating system
Web browsing
Email
Photos
Videos
Gaming
A whole world of apps
Backed by Canonical
No Antivirus
Hardware auto configuration
Software Repositories
Multiple desktops
Ssh client
Office Software
In Ubuntu, we have a software called LibreOffice, via which we can create professional
documents, spreadsheets, and presentations. LibreOffice is an open-source office suite that is
compatible with Microsoft Office. That means we can open and modify files such as Word
documents, PowerPoint, and Excel spreadsheets and share them with other people easily and
quickly. Google docs can also be used directly from our desktop.
In Ubuntu, our code is openly shared during the development cycle. We’re transparent about our
plans for future releases, so as a developer, hardware manufacturer, or OEM, we can start
developing Ubuntu applications and systems right now.
Thunderbird, Mozilla’s famous email applications is included with Ubuntu, so we’ll have quick
access to our email from our desktop. Email works regardless of the email service we use, such
as Microsoft Exchange, Hotmail, Gmail, POP 3, or IMAP.
Web Browsing
Ubuntu and Firefox, both famed for their speed and security, make browsing the web a pleasure
once more. Ubuntu now supports Chrome and other browsers, which we can get via the Ubuntu
Software Centre.
Photos
Ubuntu has a plethora of free apps to let you enjoy, edit, manage and share the photos-whatever
camera you use to take photos. With excellent support for cameras and phones, we won’t require
any additional drivers to get started.
In Ubuntu, we can easily and quickly import, edit, organize and view our photos using Shotwell.
We can also share our favorite photos on any of the famous websites and social media platforms.
Tools like Gimp and Krita, both accessible in the Ubuntu Software centre ad we can use these
tools to edit images or create professional illustrations and designs.
Videos
On Ubuntu, we can watch HD videos in our browser or with the default Movie Player, VLC, and
OpenShot from the Snap Store. Use Shotcut or kdenlive to edit our videos, then watch them in
Movie Player.
Gaming
In Ubuntu, from Sudoku to first-person shooters, we have a number of games that will keep us
engaged for hours. There are thousands of games, including titles from the Unity and Steam
platforms. Choice from critically acclaimed titles like Dota2, Kerbal Space Program, Counter-
Strike: Global Offensive, and Borderlands: The Pre-Sequel.
Thousands of apps are available for download on Ubuntu. Most of them are free to download
and install with just a few clicks. For example, VLC player, Firefox, Chromium, Telegram,
PyCharm, Skype, Spotify, Atom, Slack, etc.
Backed by Canonical
Canonical is a multinational software company that offers commercial, design, and engineering
support to the project of Ubuntu. Hundreds of laptops and workstations have been pre-installed
with Ubuntu by Ubuntu's hardware enablement team throughout the world.
No Antivirus
In the Windows environment, security practices are extremely contradictory. Most of the same
companies which write Windows software also make millions of dollars providing hogging
applications that safeguard Windows apps from security issues. Although Ubuntu is not malware
protected, it is as secure as it needs to be for most users right out of the box, even without the
addition of any expensive antivirus scanners.
Another feature of Ubuntu is hardware auto configuration. Most hardware drivers are already
included in Ubuntu. Anybody who has installed a Windows generic version of Windows (i.e.,
one that has not been pre-configured by a PC vendor to work with specific hardware)
understands how convenient it is not to spend hours looking for drivers after the operating
system has been installed.
Software Repositories
It's a tremendous advantage to install a number of applications from the repositories of Ubuntu in
some clicks. Apart from the fact that the software is free and safer than .exe packages, which are
downloaded from random websites, installing programs from a centralized location is far more
convenient.
Multiple Desktops
The virtual desktops are similar to tabbed web browsing- we do not understand how beneficial
they are until we use them. There are various third-party tools for achieving the same capability
on Windows, but few of them perform properly with Vista and higher, in our experience.
ssh Client
Having a ssh client embedded into the operating system is a significant advantage for us. There
are several ssh clients for Windows, such as Putty, but none of them come pre-installed in
Windows, and even the finest of them isn't as functional as gnome-terminal.
Advantages of Ubuntu
Disadvantages of Ubuntu
Solaris is an operating system introduced by Sun Microsystems Ltd. Solaris belongs to Unix
Operating system family which uses Shell as interpreter. The shell translates the user commands
to a Language that is understood by the kernel of the Operating system. The Kernel controls all
the hardware such as CPU, Storage Devices and I/Os.
Benefits
Virtualization: Optimize resource utilization to deliver predictable Service levels with Solaris
Containers
Security: Implement a secure foundation for deploying services With Solaris leading-edge
security features.
Availability: Increase uptime with the predictive self-healing feature.
Features of Solaris
Security Solaris includes some of the worlds most advanced Security features, such as Process
and User Rights
Performance: Solaris delivers indisputable performance advantages for database, Web, and Java
technology-based services, as well as massive scalability, shattering world records by Delivering
unbeatable price/performance advantages.
Networking: With its optimized network stack and support for Today’s advanced network
computing protocols, Solaris delivers High-performance networking to most applications without
modification.
Data Management: Solaris offers dramatic advances in file system and volume management by
delivering virtually unlimited Capacity and near-zero administration.
Observability: The Solaris release gives you Observability into Your system with tools such as
Solaris Dynamic Tracing (DTrace), which enables real-time application debugging and
optimization.
Platform Choice: Solaris is fully supported on more than 900 SPARC-based and x64/x86-based
systems from top manufacturers, including systems from Sun, Dell, HP, and IBM [2].
ZFS Administration
ZFS is a combined file system and logical volume manager designed by Sun Microsystems.
The features of ZFS include data integrity verification against data Corruption modes (like bit
rot), support for high storage capacities, Integration of the concepts of file system and volume
management, snapshots and copy-on-write clones, continuous integrity Checking and automatic
repair, RAID-Z and native NFSv4 ACLs. ZFS is implemented as open-source software, licensed
under The Common Development and Distribution License (CDDL). The ZFS name is a
trademark of Oracle.
Features of ZFS:
Working of ZFS
ZFS uses the concept of storage pools to manage physical storage. Historically, file systems were
constructed on top of a single Physical device. To address multiple devices and provide for data
Redundancy, the concept of a Volume manager was introduced to provide the image of a Single
device so that file systems would not have to be modified to take advantage of multiple devices.
This design added another layer of complexity and ultimately prevented certain file system
advances, because the file system had no control over the physical placement of data on the
virtualized volumes. ZFS eliminates the volume management altogether. Instead of forcing you
to create virtualized volumes, ZFS aggregates devices into a storage pool. The storage pool
describes the physical characteristics of the storage (device layout, data redundancy, and so On,)
and acts as an arbitrary data store from which file systems can be created. File systems are no
longer constrained to individual devices, allowing them to share space with all file systems in the
pool. You no longer need to predetermine the size of a file System, as file systems grow
automatically within the space allocated to the storage pool. When new storage is added, all file
systems within the pool can immediately use the additional space without additional work. In
Many ways, the storage pool acts as a virtual memory system. When a memory DIMM is added
to a system, the operating system doesn’t force you to invoke some commands to configure the
memory and assign it to individual processes. All processes on the system automatically use the
Additional memory.
Transactional Semantics
ZFS is a transactional file system, which means that the file system state is always consistent on
disk. Traditional file systems Overwrite data in place, which means that if the machine loses
Power.
For example, between the times a data block is allocated and when it is linked into a directory,
the file system will be left in an Inconsistent state. Historically, this problem was solved through
The use of the fsck command. This command was responsible for going through and verifying
File system state, making an attempt to repair any inconsistencies in the process. This problem
caused great pain to administrators and was never guaranteed to fix all possible problems. The
journaling process records action in a separate journal, which can then be replayed safely if a
system crash occurs. This process introduces unnecessary overhead, because the data needs to be
written twice, and often results in a new set of problems, Such as when the journal can’t be
replayed properly with a transactional file system, data is managed using copy on Write
semantics. Data is never overwritten, and any sequence of Operations is either entirely
committed or entirely ignored. This Mechanism means that the file system can never be
corrupted through accidental loss of power or a system crash. So, no need for an fsck equivalent
exists. While the most recently written pieces of data might be lost, the File system itself will
always be consistent. In addition, synchronous data (written using the O_DSYNC flag) is always
guaranteed to be written before returning, so it is never lost.
With ZFS, all data and metadata is check summed using a user selectable algorithm. Traditional
file systems that do provide Check summing have performed it on a per-block basis, out of
Necessity due to the volume management layer and traditional file System design. The
traditional design means that certain failure modes, such as writing a complete block to an
incorrect location, can result in properly check summed data that is actually Incorrect. ZFS
checksums are stored in a way such that these failure modes are detected and can be recovered
from gracefully. All check summing and data recovery is done at the File system layer, and is
transparent to applications. In addition, ZFS provides for self-healing data. ZFS supports storage
pools with varying levels of data redundancy, including mirroring and a variation on RAID-5.
When a bad data block is detected, ZFS fetches the correct data from another replicated copy,
and repairs the bad data, replacing it with the good copy.
Unparalleled Scalability
ZFS has been designed from the ground up to be the most scalable file system ever. The file
system itself is 128-bit, allowing for 256 quadrillion zeta bytes of storage. All metadata is
allocated dynamically, so no need exists to pre-allocate inodes or otherwise limit the scalability
of the file system when it is first created. All the algorithms have been written with scalability in
mind. Directories can have up to 248 (256 trillion) entries and no limit Exists on the number of
file systems or number of files that can be Contained within a file system.
ZFS Snapshots
A snapshot is a read-only copy of a file system or volume. Snapshots can be created quickly and
easily. Initially, snapshots consume no additional space within the pool. As data within the active
dataset changes, the snapshot consumes space by continuing to reference the old data. As a
result, the snapshot prevents the data from being freed back to the pool.
Simplified Administration
ZFS provides a greatly simplified administration model. Through The use of hierarchical file
system layout, property inheritance, and auto management of mount points and NFS share
semantics, ZFS makes it easy to create and manage file systems without needing multiple
commands or editing configuration files. You can easily set quotas or reservations, turn
compression on or off, or manage mount points for numerous file systems with a single
command. Devices can be examined or repaired without
Having to understand a separate set of volume manager commands. You can take an unlimited
number of instantaneous snapshots of file systems. You can backup and restore individual file
Systems. ZFS manages file systems through a hierarchy that allows for this simplified
management of properties such as quotas, reservations, compression, and mount points [4].
In this model, file systems become the central point of control. File systems themselves are very
cheap (equivalent to a new directory), so you are encouraged to create a file system for each
user, project, workspace, and so on. This design allows you to define fine-grained management
points.
Solaris security
To be effective, data security features must be designed into the heart of an operating system
(OS), rather than simply wrapped around its core components. Solaris combines multiple
security technologies allowing it to monitor file integrity, verify user and process rights, and
retain a detailed audit trail of all system events. Solaris’s networking configuration design and
cryptographic capabilities also significantly reduce the system’s risk exposure.
Benefits
File Integrity
System administrators can detect possible attacks on their systems by monitoring for changes to
file information. Solaris utilizes binaries that are digitally signed, so that administrators can
easily track changes. All patches or enhancements are embedded with digital signatures,
eliminating the false positives associated with Upgrading or patching file integrity-checking
software. Solaris also provides the basic audit reporting tool for integrity checking of customer
files.
Hackers often attempt to exploit root accounts because those accounts are empowered with
complete access to UNIX systems. Solaris offers unique user and process rights management
technology that reduces risks by granting users and applications only the minimum capabilities
needed to perform their duties. Unlike other solutions, Solaris requires no application changes to
take advantage of these security enhancements. Solaris applications running on 64-bit SPARC,
AMD, and Intel processors are also automatically protected from a form of intrusion known as
“stack smashing” by a non-executable stack feature, with no application changes required and no
degradation of system performance.
Solaris provides protection against inappropriate use of network Resources through its secure by
default networking configuration, which disables many unused network services to reduce
exposure to attack. With secure by default networking, an administrator can enable or disable
individual network services or change how they listen for network connections. Solaris also ships
with IP filter firewall software preinstalled. This Integrated firewall can reduce the number of
network services that are exposed to attack. It also provides protection against maliciously
crafted networking packets.
Allow for encrypted remote access and file transfer between two Systems.
Solaris delivers a number of flexible authentication features, including support for the Pluggable
Authentication Module (PAM), which makes it possible to add authentication services to the OS
Dynamically. Third-party vendors provide many PAM modules, and customers can create their
own to meet specific security Needs.
The Kerberos service in Solaris delivers Kerberos-enabled remote applications such as rsh, rcp,
telnet, secure shell, and NFS File sharing. Kerberos-based protocols allow for standards-based
Enterprise single sign-on (SSO), authorization, and encrypted Communication. Lightweight
Directory Access Protocol (LDAP) Client-side authentication and interoperability enhancements
enable enterprise wide, secure, standards-based access to your servers and applications. To
enable easier integration with existing Environments, Solaris provides NIS and NIS+ to LDAP
gateways.All Solaris user and process rights management information can Also be stored and
managed centrally using LDAP-based directory server software. System-specific user IDs now
have strong password encryption Options, including MD5 and Blowfish, as well as account
lockout, Password history and complexity checking, long password format, And a banned
passwords list. Repeatable Security Hardening and Monitoring New features in Solaris make it
easier than ever to minimize and Harden a system.
The reduced networking Meta cluster install option creates a minimized Solaris image, ready for
administrators to add functionality and services in direct support of their system’s purpose. In
addition, the Secure by Default networking configuration disables many unused network
services, while configuring all other services for local system-only communications.
Solaris Service Manager can be used to control exactly which Services run, who can manage
those services, and what privileges those services run with. The freely available security toolkit
for Solaris assists in the process of installing and maintaining a minimized and hardened OS
Security configuration. The toolkit integrates with the Solaris Jumpstart installation process for
repeatable secure
Mandatory Access Control, Labeling, and Security Certification
Solaris with trusted extensions solves the problem of controlling Access to sensitive data by
implementing sensitivity labels for Access control to files, printers, networks, windows,
applications, And devices. Solaris with trusted extensions is the only labeled OS feature to
Support full enterprise-class solutions, giving customers multilevel Desktops through the
GNOME-based Java Desktop System or CDE, simple deployment, and centralized user ID
management. Solaris 11/06 is currently in evaluation at EAL4+, one of the highest levels of
Common Criteria Certification, with three Protection
Profiles:
DOS acts on commands. Because DOS is ready to perform when given proper command hence, it is also
known as Command Prompt.
Commands are certain words of English language or short form of English words. The meaning of these
word or short form is already known to DOS. Since, DOS recognized these words and hence acts
accordingly. These words and short forms of the English words are better known as commands.
Internal Command:-Those commands which are already stored in the “Command.Com” file of DOS are
known as internal commands. For example, CLS, VOL, TIME, DATE, COPY etc.
External Command:-Those commands which are not included in the command.com file of DOS rather
included in other files of DOS are known as external commands. It is formatted according to program for
example, TREE, FORMAT, MODE etc.
NB. Every typed command is executed when the enter key is pressed
21. Color To change the colour of background and font of DOS screen
c:\>color Some
External Commands:-
If we install WINDOWS as our main Operating System then we get a DOS environment within
WINDOWS. MS DOS (Microsoft DOS) environment can be run on computer through WINDOWS using
the run dialog box.
Fedora Operating System
Fedora operating system is an open-source operating system that is based on the Linux OS kernel
architecture. A group of developers was developed the Fedora operating system under the Fedora
Project. It is sponsored by Red Hat. It is designed as a secure operating system for the general-
purpose. Fedora operating system offers a suite of virus protection, system tools, office
productivity services, media playback, and other desktop application.
According to the Fedora Project, it is always free to use, modify, and distribute. Fedora OS is
integrated with applications and packaged software. This operating system enhances the abilities
of the software. It offers the same consistency, procedures, and functionality as a traditional OS.
Fedora operating system is the second most commonly used distribution of Linux after Ubuntu.
There are over 100 distributions based on the Fedora operating system, including the XO
operating system of Red Hat Enterprise Linux.
Fedora is a very stable, secure, and light-weight operating system. It supports different types of
architectures, such as IBM Z, AMD x86-x64, Intel i686, IBM Power64le, ARM-hfp, MIPS-64el,
ARM AArch64, IBM Power64, etc. Usually, it also works on the latest Linux kernel.
Fedora Server
Fedora Server is a very flexible and powerful OS. It keeps all your infrastructure and services
under your control. Fedora operating system offers the latest data center technologies.
Chrome OS is an operating system developed and owned by Google. It’s based on Linux and is
open-source, which means it’s free to use.
A big advantage of Chrome OS is that it’s super simple to use. Although it has a desktop
environment similar to the one you get on a Windows machine, Chrome OS is mostly a web
browser at its core. You can use Chrome to watch videos, scroll through Facebook and other
social networks, and do everything else you can do in a browser on rival operating systems like
Windows and macOS.
Like Android phones, most Chrome OS devices released in or after 2017 have access to the
Google Play Store. This means that most of the apps you can download and run on your Android
phone are also available on Chrome OS. However, keep in mind that not all of these apps are
optimized for Chrome OS. You can use these in phone screen format, which takes up just a
portion of the screen on a Chromebook.
Some newer Chromebooks also can run Linux apps, which further advances the operating
system’s capabilities. This means Chrome OS can even run desktop-level programs, given they
are available for Linux platforms.
The simplicity of Chrome OS also has a major drawback. Unlike on Windows and macOS
devices, you can’t download and run AAA games or use desktop programs like Adobe Premiere
Plus, for example. You can only run programs and games from the Play Store or those available
for Linux. This is why Chromebooks aren’t for everyone.
Chromebooks are designed to be simple and affordable, although there are high-end models
available as well. If all you want to do with a laptop is browse the web, watch YouTube videos,
play Android games, and use the same apps you do on your phone, a Chrome OS device is
definitely something to consider.
However, if you’re a more advanced user who wants to play popular AAA PC games and use
software like Photoshop, a more traditional Windows or even a macOS device is better suited for
your needs. Remember that while software like Photoshop can be used on Chrome OS since you
can download it from the Play Store, the Android version of the app is far less powerful and
feature-packed than the Windows variant.
That’s just a general guideline for who should use a Chromebook and who shouldn’t. If you want
to dive deeper into the topic, check out the main pros and cons of Chrome OS below, which will
help you figure out whether a Chromebook is for you.
Pros:
Simple: Chrome OS is all about simplicity. The Chromebook operating system is so simple,
even your grandma could use it. It also works fast and boots up in mere seconds.
Cheap: Chrome OS is open-source and free to use. It’s designed for simple tasks like browsing
the web and running Android apps, so it doesn’t need high-end hardware. For those reasons,
Chrome OS devices are generally cheaper than their Windows/macOS counterparts, although
there are a few expensive models on offer as well.
Android app support: As already mentioned, Chromebooks released in the last few years all
support Android apps, making them a lot more useful than they once were.
Linux app support: In recent years, Google has added support for Linux applications. This
means Chromebooks can now run desktop-level software, given that the Chromebook supports
Linux apps and has enough power to run them.
Secure: Because of its simplicity, Chrome OS is much more secure than Windows laptops,
especially since most of what you’ll download will be from the Play Store. There are also
frequent and automatic Chrome OS updates available and built-in virus protection.
Battery life: Since Chrome OS is a simple operating system and Chromebooks don’t need a lot
of power, battery life is generally excellent.
Cons:
Software compatibility: We’ve already mentioned this, but we’ll say it again since it’s the
biggest drawback of Chrome OS devices. You can’t use full versions of Photoshop, Microsoft
Office, and many other programs on Chromebooks. That is, unless the app is available for Linux,
but many of these big apps aren’t. And if you’re sticking to mobile apps, chances are plenty of
features will be stripped out.
Not great for gaming: You can play games on Chromebooks, but you’re limited to the titles
available in the Play Store. So you can’t play AAA games on Chrome OS devices, as they don’t
support them. But even if they did, you wouldn’t be able to play many of them since
Chromebooks are not powerful machines to begin with. Keep in mind this is changing, though,
as cloud gaming is becoming more common with services like Stadia taking on the market.
Small storage space: Since they are cloud-based, the storage space you get on a Chromebook is
generally a lot smaller than what you would expect on a Windows laptop. Instead of 500GB,
expect around 64GB. This isn’t a huge drawback since you don’t need a lot of space, but it is
worth mentioning nonetheless.
Offline mode: Chrome OS devices work best when you have access to the internet. You can use
them offline, but the experience isn’t always the best. Some apps won’t work at all, while others
will have limited functionality in offline mode.
WAVE OPERATING SYSTEM
The Samsung Wave is the first Samsung smartphone to use the Samsung homegrown operating
system. This might seem to be a brave move on the part of Samsung, especially considering the
enormous success of the Google inspired Android operating system (which is in fact is installed
on the Samsung Galaxy S), so what does Bada bring to the table and how good is it at what it
does?
Bada is a Korean word meaning Ocean and is designed to be a highly cost effective solution for
smartphones at the lower end of the price spectrum. When Samsung developed it, the intention
was not to compete with the other operating systems, but rather to increase the general
accessibility of smartphones.
Bada’s ancestry dates back to over a decade ago when Samsung first launched its proprietary
operating system. An earlier version was also used on the Samsung Star, of which over ten
million units were sold.
Features of wave OS
In order to make this software usable for smartphones a number of new features were required.
These included
Wave Architecture
So does Bada really do the trick? It seems that it does it very well.
The Wave can compete favorably with the top end smartphones and Samsung has encouraged
developers to produce many apps of which there are already over a quarter of a million. The fact
that Bada is based on proven technology means that it is fundamentally reliable and secure. It
also seems capable of doing just about everything that Android can do, so overall it has been a
success.
HP-UX OPERATING SYSTEM
Hewlett-Packard Unix was first released in 1984 on the HP Integral PC as version 1 and version
2 in 1986 on the 9000/500 series of servers utilizing HP FOCUS architecture. It had very strong
influences from BSD Unix from the beginning up to version 9.x. Version 10 and onward are
closer to System V Unix, with the latest version, 11, catering to more modern concepts such as
cluster and cloud computing.
The first version, released in 1984, was nothing more than an embedded ROM version released
on the HP Integral PC with the kernel running from the ROM, while other commands ran from
the disk. The latest version, which is HP-UX 11i, is geared towards cluster computing,
infrastructure as a service (IaaS) and overall cloud computing. It offers operating-system-level
virtualization such as hardware partitions, individual OS partitions on cell-based servers and HP
virtual machines on Integrity servers.
HP-UX is equipped with a variety of tools for use in enterprises for the monitoring (costs, work
load) as well as for the logging and visualization. Next to the base version there is a Enterprise
Edition with resource management and the Mission Critical Edition for companies with
enterprise critical applications for highest availability and security. This operating system has a
built-in host intrusion detection (H-IDS). This operating system is used for content servers, web
server, dedicated server, databases or also for cluster systems.
HP-UX 11i was originally released in 2000 and the latest major version is HP-UX 11i v3
(11.31), released in 2007. The latest update (6th) to 11.31 was in March 2010.
HP-UX is provided in one of four combinations of operating system and application bundles,
called an operating environment (OE):
Base (BOE) is the standard version.
Virtualization Server (VSE-OE) is BOE plus the HP Virtual Server Environment and
GlancePlus monitoring tools.
High Availability (HA-OE) is BOE plus Serviceguard availability tools and GlancePlus
monitoring tools.
Data Center (DC-OE) is all of the above.
The Virtual Server Environment provides virtualization capabilities and workload management
tools. Hardware and software isolation is achieved using a hard partition, or nPartition, which
establishes boundaries that completely protect one virtual machine from any faults in another
(including software, hardware or electrical faults). In HP-UX 11.31, dynamic nPartitions can be
modified while the partition is in use.
Software-only isolation is achieved using a virtual partition, or vPar, which runs its own instance
of HP-UX and has its own share of CPU, memory and I/O. HP-UX 11.31 introduces dynamic
memory migration between vPars and allows mixed vPar versions within a single nPartition.
Dynamic Root Disk allows cloning and updating of a running root file system, assisting in
system recovery and reducing downtime during upgrades.
Unified File Cache integrates the different mechanisms used for file caching: page cache and
buffer cache. This eliminates the possibility of file system inconsistencies when using system
calls that depend on differing mechanisms.
Encrypted Volume File System 2.0 provides AES encryption at the file or volume level. Security
containment isolates system resources and provides fine-grained privileges and role-based access
control.
Versions
Date – Version
1982 – HP-UX 1.0 – based on SVR3
1988 – HP-UX 2.0
1988 – HP-UX 3.0
1989 – HP-UX 7.0
1991 – HP-UX 8.0
1993 Nov. – HP-UX 9.04
1995 July – HP-UX 10.01
1996 Feb. – HP-UX 10.10 – first time with CDE
1996 Aug. – HP-UX 10.20
1997 Nov. – HP-UX 11.00 – max. 32 CPUs
--- - HP-UX 11.10 – max. 128 CPUs
--- - HP-UX 11.11
--- - HP-UX 11.20 – for Intel Itanium systems
1988 – DEC OSF/1
1993 March – Tru64 UNIX 1.2
1994 March – Tru64 UNIX 2.0
1994 Aug. – Tru64 UNIX 3.0
1996 June – Tru64 UNIX 4.0
1999 Aug. – Tru64 UNIX 5.0
2000 Aug. – Tru64 UNIX 5.1
1977 – VMS Version 0.5 released
1978 Aug. – VMS Version 1.0, multiuser, ODS-1 and 2 file systems
1980 April – VMS Version 2.0
1981 – VMS 2.2
1982 April – VMS 3.0
1984 Sept. – VMS 4.0
1986 – VMS 4.4
1988 May – VMS 5.0 – 5 million code lines
1989 Sept. – VMS 5.2
1990 Oct. – VMS 5.4
1991 Nov. – VMS 5.5
1992 Nov. – OpenVMS/AXP 1.0 – based on VMS 5.4
1993 June – OpenVMS/VAX 6.0 – first time with ISO-9660 support
1994 April – OpenVMS/VAX 6.1 – May: OpenVMS/Alpha 6.1
1995 May – OpenVMS/VAX 6.2 – June: OpenVMS/Alpha 6.2
1995 Dec. – OpenVMS 7.0 VAX and Alpha – 64-bit addressing – I/O optimized
1996 Dec. – OpenVMS 7.1 VAX and Alpha – 25 million code lines, PPP
1998 – OpenVMS 7.2 VAX and Alpha
2000 – OpenVMS 7.3 VAX and Alpha
2003 June – OpenVMS 8.0 Itanium
BLACKBERRY OPERATING SYSTEM
The BlackBerry is a wireless handheld device introduced in 1997 as a two-way pager. The more
commonly known smartphone BlackBerry, which supports push e-mail, mobile telephone, text
messaging, internet faxing, web browsing and other wireless information services was released
in 2002. It is an example of a convergent device. Developed by the Canadian company Research
in Motion (RIM), it delivers information over the wireless data networks of mobile phone service
companies. BlackBerry first made headway in the marketplace by concentrating on e-mail. RIM
currently offers BlackBerry e-mail service to non-BlackBerry devices, such as the Palm Treo,
through the BlackBerry Connect software. The original BlackBerry device had a monochrome
display, but all current models have color displays.
Operating system
RIM provides a proprietary multi-tasking operating system (OS) for the BlackBerry, which
makes heavy use of the device's specialized input devices, particularly the scroll wheel (1995 -
2006) or more recently the trackball (September 12th 2006 - Present). The OS provides support
for MIDP 1.0 and WAP 1.2. Previous versions allowed wireless synchronization with Microsoft
Exchange Server's e-mail and calendar, as well as with Lotus Domino's e-mail. The current OS 4
provides a subset of MIDP 2.0, and allows complete wireless activation and synchronization
with Exchange's e-mail, calendar, tasks, notes and contacts, and adds support for Novell
GroupWise and Lotus Notes. Third-party developers can write software using these APIs, and
proprietary BlackBerry APIs as well, but any application that makes use of certain restricted
functionality must be digitally signed so that it can be associated to a developer account at RIM.
This signing procedure guarantees the authorship of an application, but does not guarantee the
quality or security of the code.
Phones with BlackBerry e-mail client
Several ordinary mobile phones have been released featuring the BlackBerry e-mail client which
connects to BlackBerry servers. Many of these phones have full QWERTY keyboards
• HTC TyTN Operates on 3G/HSDPA/850/900/1800/1900 MHz GSM network, 240 × 320 pixel
touch screen, QWERTY keyboard
HOW IT WORKS?
As we all know, there is always a software behind the hardware. This holds true for the
blackberry as well. Blackberry Server Software comes in two forms