Nyman, Linus (Author)
Laakso, Mikael (Author)
The fork call allows a process (or running program) to create new processes. On multiprocessor systems, these processes can run concurrently in parallel. Since its birth 50 years ago, the fork has remained a central element of modern computing, both with regard to software development principles and, by extension, to hardware design, which increasingly accommodates parallelism in process execution. This article looks back at the birth of the fork system call to share, as remembered by its pioneers.
...More
Article
Aspray, William F.;
Cortada, James W.;
(2016)
Before It Was a Giant: The Early History of Symantec, 1982-1999
(/isis/citation/CBB189385729/)
Article
Mirowski, Alexander;
(2017)
At the Electronic Crossroads Once Again: The Myth of the Modern Computer Utility in the United States
(/isis/citation/CBB369914463/)
Article
Yost, Jeffrey R.;
(2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems
(/isis/citation/CBB570334134/)
Article
Kneuper, Ralf;
(2017)
Sixty Years of Software Development Life Cycle Models
(/isis/citation/CBB236951329/)
Article
Cortada, James W.;
(2002)
Studying the increased use of software applications: Insights from the case of the American petroleum industry, 1950--2000
(/isis/citation/CBB001180897/)
Article
Ensmenger, Nathan;
(2017)
From the Editor's Desk
(/isis/citation/CBB143265022/)
Review
Salem Elzway;
(2017)
Review of "The Outsourcer: The story of India's IT revolution"
(/isis/citation/CBB610334077/)
Article
Guy C. Fedorkow;
(January-March 2021)
Recovering Software for the Whirlwind Computer
(/isis/citation/CBB869829437/)
Thesis
Gerardo Con Diaz;
(2016)
Intangible Inventions: A History of Software Patenting in the United States, 1945-1985
(/isis/citation/CBB374973840/)
Article
Spicer, Dag;
(July-September 2016)
Interview: Raymond Tomlinson: Email Pioneer, Part 2
(/isis/citation/CBB113069755/)
Article
Day, John;
(2016)
The Clamor Outside as INWG Debated: Economic War Comes to Networking
(/isis/citation/CBB243873737/)
Article
Yost, Jeffrey R.;
(2016)
Computer Security, Part 2 -- Editor's Introduction
(/isis/citation/CBB453922047/)
Article
Vogel, William F.;
(2017)
"The Spitting Image of a Woman Programmer": Changing Portrayals of Women in the American Computing Industry, 1958-1985
(/isis/citation/CBB857910207/)
Article
Cortada, James W.;
(July-September 2017)
IBM Branch Offices: What They Were, How They Worked, 1920s–1980s
(/isis/citation/CBB237504233/)
Article
Walden. David;
Hashizumi, Hiromichi;
(2017)
Events and Sightings: Desktop Publishing Pioneer Meeting at Computer History Museum
(/isis/citation/CBB852305963/)
Article
Bultema, Patrick;
(2003)
Notes from the Field: Requirement Elicitation
(/isis/citation/CBB355987355/)
Article
Hickey, Ann M.;
Davis, Alan M.;
Kaiser, Denali;
(2003)
Requirements Elicitation Techniques: Analyzing the Gap between Technology Availability and Technology Use
(/isis/citation/CBB161177735/)
Review
Allen, Kera Jones;
(2017)
Review of "Hidden Figures: The American Dream and the Untold Story of the Black Women Mathematicians Who Helped Win the Space Race"
(/isis/citation/CBB084734115/)
Review
McCray, W. Patrick;
(2016)
Review of "Inside the Machine: Art and Invention in the Electronic Age"
(/isis/citation/CBB765321999/)
Article
Nikivincze, Irina;
(2017)
Dana Ulery: Pioneer of Statistical Computing and Architect of Large, Complex Systems
(/isis/citation/CBB666008547/)
Be the first to comment!