英文字典中文字典Word104.com



中文字典辭典   英文字典 a   b   c   d   e   f   g   h   i   j   k   l   m   n   o   p   q   r   s   t   u   v   w   x   y   z   







請輸入英文單字,中文詞皆可:

timesharing    
n. 分時

time-sharing
分時


timesharing
分時

timesharing[now primarily historical] Timesharing is the technique of scheduling
a computer's time so that they are shared across multiple tasks and
multiple users, with each user having the illusion that his or her
computation is going on continuously. John McCarthy, the inventor of
LISP, first imagined
this technique in the late 1950s. The first timesharing operating
systems, BBN's "Little Hospital" and CTSS, were
deplayed in 1962-63. The early hacker culture of the 1960s and 1970s grew
up around the first generation of relatively cheap timesharing computers,
notably the DEC 10, 11, and VAX lines. But these
were only cheap in a relative sense; though quite a bit less powerful than
today's personal computers, they had to be shared by dozens or even
hundreds of people each. The early hacker comunities nucleated around
places where it was relatively easy to get access to a timesharing
account.Nowadays, communications bandwidth is usually the most important
constraint on what you can do with your computer. Not so back then;
timesharing machines were often loaded to capacity, and it was not uncommon
for everyone's work to grind to a halt while the machine scheduler
thrashed, trying to figure out what to do next. Early hacker slang
was replete with terms like cycle
crunch and cycle drought
for describing the consequences of too few instructions-per-second spread
among too many users. As GLS has noted, this sort of problem influenced
the tendency of many hackers to work odd schedules.One reason this is worth noting here is to make the point that the
earliest hacker communities were physical, not distributed via networks;
they consisted of hackers who shared a machine and therefore had to deal
with many of the same problems with respect to it. A system crash could
idle dozens of eager programmers, all sitting in the same terminal room and
with little to do but talk with each other until normal operation
resumed.Timesharing moved from being the luxury of a few large universities
runing semi-experimental operating systems to being more generally
available about 1975-76. Hackers in search of more cycles and more control
over their programming environment began to migrate off timesharing
machines and onto what are now called workstations around 1983. It took another ten
years, the development of powerful 32-bit personal micros, the
Great Internet Explosion before the migration was
complete. It is no coincidence that the last stages of this migration
coincided with the development of the first open-source operating
systems.

請選擇你想看的字典辭典:
單詞字典翻譯
TimeSharing查看 TimeSharing 在Google字典中的解釋Google英翻中〔查看〕
TimeSharing查看 TimeSharing 在Yahoo字典中的解釋Yahoo英翻中〔查看〕





安裝中文字典英文字典查詢工具!


中文字典英文字典工具:
選擇顏色:
輸入中英文單字

































































英文字典中文字典相關資料:
  • Vault 7: CIA Hacking Tools Revealed - WikiLeaks
    The CIA attacks this software by using undisclosed security vulnerabilities ("zero days") possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability
  • WikiLeaks - Vault 7: Projects
    Today, September 7th 2017, WikiLeaks publishes four secret documents from the Protego project of the CIA, along with 37 related documents (proprietary hardware software manuals from Microchip Technology Inc ) The project was maintained between 2014 and 2015
  • CIA Travel Advice To Operatives - WikiLeaks
    Today, 21 December 2014, WikiLeaks releases two classified documents by a previously undisclosed CIA office detailing how to maintain cover while travelling through airports using false ID – including during operations to infiltrate the European Union and the Schengen passport control system
  • WikiLeaks - Vault 8
    Source code and analysis for CIA software projects including those described in the Vault7 series This publication will enable investigative journalists, forensic experts and the general public to better identify and understand covert CIA infrastructure components
  • Vault 7: CIA Hacking Tools Revealed - our. wikileaks. org
    Vault 7 is a series of WikiLeaks releases on the CIA and the methods and means they use to hack, monitor, control and even disable systems ranging from smartphones, to TVs, to even dental implants
  • Vault 7 - our. wikileaks. org
    2017 02 04 - WikiLeak's publication of Vault 7 begins its new series of leaks on the U S Central Intelligence Agency Code-named Vault 7 by WikiLeaks, it is the largest ever publication of confidential documents on the agency Search on WikiLeaks Countries: United States Categories: Intelligence, Hacking
  • CIA Assessment on Surviving Secondary Screening - WikiLeaks
    The CIA manual "Surviving Secondary", dated 21 September 2011, details what happens in an airport secondary screening in different airports around the world and how to pass as a CIA undercover operative while preserving one's cover
  • WikiLeaks - Government
    Today, August 3rd 2017 WikiLeaks publishes documents from the Dumbo project of the CIA, enabling a way to suspend processes utilizing webcams and corrupt any video recordings
  • WikiLeaks
    How to contact WikiLeaks? What is Tor? Tips for Sources After Submitting Vault 7: CIA Hacking Tools Revealed Releases Documents Navigation:
  • WikiLeaks
    Today, 21 December 2018, WikiLeaks publishes a searchable database of more than 16,000 procurement requests posted by United States embassies around the world





中文字典-英文字典  2005-2009

|中文姓名英譯,姓名翻譯 |简体中文英文字典