{"title":"多访问、多编程、单处理器系统中软件保护和硬件故障恢复的考虑","authors":"G. Oppenheimer, K. P. Clancy","doi":"10.1145/1476589.1476596","DOIUrl":null,"url":null,"abstract":"Data processing systems are liable to both hardware and system software failure. In first and second generation systems the impact of such failures was typically limited by the scope of the system itself to the one or limited few programs operating at the time. Resumption from the beginning of the program or preplanned checkpoint typically constituted complete recovery.","PeriodicalId":294588,"journal":{"name":"Proceedings of the December 9-11, 1968, fall joint computer conference, part I","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Considerations for software protection and recovery from hardware failures in a multiaccess, multiprogramming, single processor system\",\"authors\":\"G. Oppenheimer, K. P. Clancy\",\"doi\":\"10.1145/1476589.1476596\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data processing systems are liable to both hardware and system software failure. In first and second generation systems the impact of such failures was typically limited by the scope of the system itself to the one or limited few programs operating at the time. Resumption from the beginning of the program or preplanned checkpoint typically constituted complete recovery.\",\"PeriodicalId\":294588,\"journal\":{\"name\":\"Proceedings of the December 9-11, 1968, fall joint computer conference, part I\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1899-12-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the December 9-11, 1968, fall joint computer conference, part I\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1476589.1476596\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the December 9-11, 1968, fall joint computer conference, part I","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1476589.1476596","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Considerations for software protection and recovery from hardware failures in a multiaccess, multiprogramming, single processor system
Data processing systems are liable to both hardware and system software failure. In first and second generation systems the impact of such failures was typically limited by the scope of the system itself to the one or limited few programs operating at the time. Resumption from the beginning of the program or preplanned checkpoint typically constituted complete recovery.