RE: TBTF for 1/12/98: Immune response

Joe Barrera (joebar@MICROSOFT.com)
Wed, 14 Jan 1998 11:14:28 -0800


I know you're joking, so I won't list what I know :-) But, I did actually
spend a couple months on option #2 below (implement a Unix subsystem from
scratch on top of Mach). Obviously it was missing a LOT, but it was good
enough to run 90% of the BSD binaries sitting in /bin and /etc...

- Joe

Joseph S. Barrera III <joebar@acm.org>
<http://research.microsoft.com/~joebar/>
Phone, Office: (415) 778-8227; Cellular: (415) 601-3719; Home: (650)
588-4801
The opinions expressed in this message are my own personal views.

-----Original Message-----
From: David Crook [SMTP:dcrook@commwerks.com]
Sent: Wednesday, January 14, 1998 11:00 AM
To: Joe Barrera
Cc: jfeise@ics.uci.edu; fork@xent.ics.uci.edu
Subject: Re: TBTF for 1/12/98: Immune response

Joe Barrera wrote:
>
> No, real hackers grab the Free BSD tape and implement the missing
stuff
> themselves.
>
> Or, they pick up the Mach 3 kernel and implement their own Unix
subsystem
> from scratch.
>
> Or, they toggle in the whole OS, in one pass, designing and coding
as they
> go, not needing paper and pen for notes because they have the
whole thing in
> their head.

Joe,

What the heck would you know about real operating systems, look
where
you work. :-)

Dave "Sorry, I just couldn't resist it" Crook

--
David Crook
Programmer/Analyst
Commwerks -- Industrial Strength Internet Solutions
dcrook@commwerks.com, http://www.commwerks.com