Multics

Last updated

Multics
Multics-logo.svg
Multics-Login.png
Login screen for the BAN.AI public Multics server
Developer MIT, GE, Honeywell, Bell Labs
Written in PL/I, Assembly language [1]
Working stateMature, current, historic, emulator available
Source model Open source
Initial release1969;55 years ago (1969)
Latest release 12.8 / August 10, 2023;16 months ago (2023-08-10)
Repository
Available in English
Platforms GE-645, Honeywell 6000 series machines (Honeywell 6180, Series-60/Level-68, DPS-8/M mainframes)
Kernel type Monolithic kernel
Influenced Unix, GEORGE 3, ICL VME, PRIMOS, Domain/OS, Stratus VOS
Default
user interface
Command-line interface
License Originally proprietary,
Free software Multics License since 2007 [2] [3]
Preceded by Compatible Time-Sharing System
Official website multics-wiki.swenson.org

Multics ("MULTiplexed Information and Computing Service") is an influential early time-sharing operating system based on the concept of a single-level memory. [4] [5] Nathan Gregory writes that Multics "has influenced all modern operating systems since, from microcomputers to mainframes." [6]

Contents

Initial planning and development for Multics started in 1964, in Cambridge, Massachusetts. Originally it was a cooperative project led by MIT (Project MAC with Fernando Corbató) along with General Electric and Bell Labs. It was developed on the GE 645 computer, which was specially designed for it; the first one was delivered to MIT in January 1967. GE offered their earlier 635 systems with the Dartmouth Time-Sharing System which they called "Mark I" and intended to offer the 645 with Multics as a larger successor. Bell withdrew from the project in 1969 as it became clear it would not deliver a working system in the short term. Shortly thereafter, GE decided to exit the computer industry entirely and sold the division to Honeywell in 1970. Honeywell offered Multics commercially, but with limited success.

Multics has numerous features intended to ensure high availability so that it would support a computing utility similar to the telephone and electricity utilities. Modular hardware structure and software architecture are used to achieve this. The system can grow in size by simply adding more of the appropriate resource, be it computing power, main memory, or disk storage. Separate access control lists on every file provide flexible information sharing, but complete privacy when needed. Multics has a number of standard mechanisms to allow engineers to analyze the performance of the system, as well as a number of adaptive performance optimization mechanisms.

Due to its many novel and valuable ideas, Multics has had a significant influence on computer science despite its faults. [7] Its most lasting effect on the computer industry was to inspire the creation of Unix, which carried forward many Multics features, but was able to run on less-expensive hardware. Unix was developed at Bell to allow their Multics team to continue their research using smaller machines, first a PDP-7 and ultimately the PDP-11.

Novel ideas

Multics Commands reference manual Multics-book.png
Multics Commands reference manual

Multics implements a single-level store for data access, discarding the clear distinction between files (called segments in Multics) and process memory . The memory of a process consists solely of segments that were mapped into its address space. To read or write to them, the process simply uses normal central processing unit (CPU) instructions, and the operating system takes care of making sure that all the modifications were saved to disk. In POSIX terminology, it is as if every file were mmap()ed; however, in Multics there is no concept of process memory, separate from the memory used to hold mapped-in files, as Unix has. All memory in the system is part of some segment, which appears in the file system; this includes the temporary scratch memory of the process, its kernel stack, etc.

Segments are limited to 256 kilowords, just over 1  MB, because Multics hardware had 18-bit word addresses for the content of a segment. Larger files are "multisegment files" and are handled differently. The 256 kiloword limit was rarely encountered in practice, because at the time, one megabyte of memory was prohibitively expensive.

Another major new idea of Multics was dynamic linking, in which a running process can make external routines available by adding the segments containing them to its address space. This allows applications to always use the latest version of any external routine, since those routines are kept in other segments, which are dynamically linked only when a process first attempts to begin execution in them. Since different processes can use different search rules, different users can end up using different versions of external routines. Equally importantly, with the appropriate settings in the Multics security facilities, the code in the other segment can gain access to data structures maintained in a different process. Dynamic linking in Multics does not require special dynamic-link libraries (DLLs); a program can dynamically link to any executable segment to which it has access rights.

Thus, to interact with an application running in part as a daemon (in another process), a user's process simply performs a normal procedure-call instruction to a code segment to which it had dynamically linked (a code segment that implemented some operation associated with the daemon). The code in that segment can then modify data maintained and used in the daemon. When the action necessary to commence the request is completed, a simple procedure return instruction returns control of the user's process to the user's code.

Multics also supports extremely aggressive on-line reconfiguration: central processing units, memory banks, disk drives, etc. can be added and removed while the system continues operating. At the MIT system, where most early software development was done, it was common practice to split the multiprocessor system into two separate systems during off-hours by incrementally removing enough components to form a second working system, leaving the rest still running for the original logged-in users. System software development testing could be done on the second system, then the components of the second system were added back to the main user system, without ever having shut it down. Multics supports multiple CPUs; it is one of the earliest multiprocessor systems.

Multics is the first major operating system to be designed as a secure system from the outset. [8] Despite this, early versions of Multics were compromised repeatedly. [9] This led to further work that made the system more secure, and prefigured modern security engineering techniques. Break-ins became very rare once the second-generation hardware base was adopted; it has hardware support for ring-oriented security, a multilevel refinement of the concept of master mode.[ citation needed ] A US Air Force tiger team project tested Multics security in 1973 under the codeword ZARF. On 28 May 1997, the American National Security Agency declassified this use of the codeword ZARF.

Multics is the first operating system to provide a hierarchical file system, [10] [11] and file names can be of almost arbitrary length and syntax. A given file or directory can have multiple names (typically a long and short form), and symbolic links between directories are also supported. Multics is the first to use the now-standard concept of per-process stacks [ disputed discuss ] in the kernel, with a separate stack for each security ring. It is also the first to have a command processor implemented as ordinary user code – an idea later used in the Unix shell. It is also one of the first written in a high-level language (Multics PL/I), [1] [12] after the Burroughs MCP system written in ESPOL, an expanded version of ALGOL.

The deployment of Multics into secure computing environments also spurred the development of innovative supporting applications. In 1975, Morrie Gasser of MITRE Corporation developed a pronounceable random word generator to address password requirements of installations such as the Air Force Data Services Center (AFDSC) processing classified information. To avoid guessable passwords, the AFDSC decided to assign passwords but concluded the manual assignment required too much administrative overhead. Thus, a random word generator was researched and then developed in PL/I. Instead of being based on phonemes, the system employed phonemic segments (second order approximations of English) and other rules to enhance pronounceability and randomness, which was statistically modeled against other approaches. [13] A descendant of this generator was added to Multics during Project Guardian. [14]

Project history

In 1964, Multics was developed initially for the GE-645 mainframe, a 36-bit system. GE's computer business, including Multics, was taken over by Honeywell in 1970; around 1973, Multics was supported on the Honeywell 6180 machines, which included security improvements including hardware support for protection rings.

Bell Labs pulled out of the project in 1969; some of the people who had worked on it there went on to create the Unix system. Multics development continued at MIT and General Electric. At MIT in 1975, use of Multics was declining and did not recover by 1976 to prior levels. [15] [16] Finally by slashing prices, MIT managed to lure users back to Multics in 1978. [17]

In 1974 Honeywell entered into a development contract with the Air Force (with MIT as a sub-contractor) to develop a security kernel for Multics. This would involve reducing the size of the Multics hardcore by moving specific components of the supervisor out of Ring 0. One of the initial steps after carrying out a security evaluation was the implementation of a Multilevel security framework within Multics called AIM (Access Isolation Mechanism). This provided Mandatory access control which could be enabled to supplement the already existing Discretionary access control that Multics already possessed. [18] The resulting Project Guardian ran until termination in 1976; whilst most of its changes were not added to Multics, some parts of the project such as the proposed Secure Front End Processor was productized by Honeywell as SCOMP (Secure Communications Processor). [19] The SCOMP and it's STOP operating system would eventually evolved via XTS-200 and XTS-300 into current XTS-400 offering of secure operating systems. [20]

Honeywell continued system development until 1985. About 80 multimillion-dollar sites were installed, at universities, industry, and government sites. The French university system had several installations in the early 1980s. After Honeywell stopped supporting Multics, users migrated to other systems, such as Unix.

In 1985, Multics was issued certification as a B2 level secure operating system using the Trusted Computer System Evaluation Criteria from the National Computer Security Center (NCSC), a division of the NSA; it was the first operating system evaluated to this level.

Multics was distributed from 1975 to 2000 by Groupe Bull in Europe, and by Bull HN Information Systems Inc. in the United States. In 2006, Bull SAS released the source code of Multics versions MR10.2, MR11.0, MR12.0, MR12.1, MR12.2, MR12.3, MR12.4 & MR12.5 under a free software license. [21]

The last known Multics installation running natively on Honeywell hardware was shut down on October 30, 2000, at the Canadian Department of National Defence in Halifax, Nova Scotia, Canada. [22]

Current status

In 2006 Bull HN released the source code for MR12.5, the final 1992 Multics release, to MIT. [23] Most of the system is now available as free software with the exception of some optional pieces such as TCP/IP. [24]

In 2014, Multics was successfully run on current hardware using an emulator created by Multicians Harry Reed and Charles Anthony. [25] The 1.0 release of the emulator is available as of 2017. [26] Release 12.6f of Multics accompanies the 1.0 release of the emulator, and adds a few new features, including command line recall and editing using the video system. [27]

Commands

The following is a list of programs and commands [28] for common computing tasks that are supported by the Multics command-line interface. [29] [30]

File and directory access commands

Text editors

Document formatters

Compilers, assemblers, and interpreters

Email

  • mail (ml)
  • read_mail (rdm)
  • send_mail (sdm)

On-line documentation

Scripting

Data processing

Login sessions

Active functions

The Multics shell language supports "active functions", which are similar to commands, but which return a string value. An active function is called by putting the active function name and the arguments to the active function in square brackets [ and ]. The string returned by the active function is substituted into the command in place of the call to the active function. For example, when the command echo [working_dir] is processed, the active function working_dir is run; it returns the full path of the working directory, which is substituted into the command, so that the echo command prints the working directory.

Some programs can act either as commands or as active functions; when run as a command, its result is printed, and when run as an active function, its result is returned as a string. [30]

Some common active functions are:

Retrospective observations

Peter H. Salus, author of a book covering Unix's early years, [32] stated one position: "With Multics they tried to have a much more versatile and flexible operating system, and it failed miserably". [33] This position, however, is said to have been discredited in the computing community because many of Multics' technical innovations are used in modern commercial computing systems. [7] [ better source needed ]

The permanently resident kernel of Multics, a system derided in its day as being too large and complex, was 135 KB of code.[ citation needed ] The first MIT GE-645 had 512 kilowords of memory (2 MiB), a truly enormous amount at the time, and the kernel used a moderate portion of Multics main memory.

The entire system, including the operating system and the complex PL/I compiler, user commands, and subroutine libraries, consists of about 1500 source modules. These average roughly 200 lines of source code each, and compile to a total of roughly 4.5 MiB of procedure code, which was fairly large by the standards of the day.

Multics compilers generally optimise more for code density than CPU performance, for example using small sub-routines called operators for short standard code sequences, which makes comparison of object code size with modern systems less useful. High code density is a good optimisation choice for Multics as a multi-user system with expensive main memory.

During its commercial product history, it was often commented internally that the Honeywell Information Systems (HIS) (later Honeywell-Bull) sales and marketing staff were more familiar with and comfortable making the business case for Honeywell's other computer line, the DPS 6 running GCOS. The DPS-6 and GCOS was a well-regarded and reliable platform for inventory, accounting, word processing, and vertical market applications, such as banking, where it had a sizeable customer base. In contrast, the full potential of Multics’ flexibility for even mundane tasks was not easy to comprehend in that era and its features were generally outside the skill set of contemporary business analysts.[ citation needed ] The scope of this disconnect was concretized by an anecdote conveyed by Paul Stachour, CNO/CSC:

When American Telephone and Telegraph was changing its name to just AT&T in 1983, a staffer from Honeywell’s legal department showed up and asked a Multician if he could arrange to have the name changed in all of their computerized documents. When asked when the process could be completed, the Multician replied, "It's done." The staffer repeated that he needed hundreds perhaps thousands of documents updated. The Multician explained that he had executed a global search and replace as the staffer was speaking, and the task was in fact completed.[ citation needed ]

Influence on other projects

Unix

The design and features of Multics influenced the Unix operating system, which was originally written by two Multics programmers, Ken Thompson and Dennis Ritchie. [34] Influence of Multics on Unix is evident in many areas, including the hierarchical file system, redirection, the shell, and the naming of some commands. But the internal design philosophy is quite different, focusing on keeping the system small and simple, and so correcting some perceived deficiencies of Multics because of its high resource demands on the limited computer hardware of the time.

The name Unix (originally Unics) is itself a pun on Multics. The U in Unix is rumored to stand for uniplexed as opposed to the multiplexed of Multics, further underscoring the designers' rejections of Multics' complexity in favor of a more straightforward and workable approach for smaller computers. (Garfinkel and Abelson [35] cite an alternative origin: Peter Neumann at Bell Labs, watching a demonstration of the prototype, suggested the pun name UNICS – pronounced "eunuchs" – as a "castrated Multics", although Dennis Ritchie is said to have denied this. [36] )

Ken Thompson, in a transcribed 2007 interview with Peter Seibel [34] refers to Multics as "overdesigned and overbuilt and over everything. It was close to unusable. They [Massachusetts Institute of Technology] still claim it's a monstrous success, but it just clearly wasn't". On the influence of Multics on Unix, Thompson stated that "the things that I liked enough (about Multics) to actually take were the hierarchical file system and the shell — a separate process that you can replace with some other process".

Dennis Ritchie wrote that the design of UNIX was influenced by CTSS. [37]

Other operating systems

The Prime Computer operating system, PRIMOS, was referred to as "Multics in a shoebox" by William Poduska, a founder of the company. Poduska later moved on to found Apollo Computer, whose AEGIS and later Domain/OS operating systems, sometimes called "Multics in a matchbox", extends the Multics design to a networked graphics workstation environment.

The Stratus VOS operating system of Stratus Computer (now Stratus Technologies) is very strongly influenced by Multics, and both its external user interface and internal structure bear many close resemblances to the older project. The high-reliability, availability, and security features of Multics are extended in Stratus VOS to support a new line of fault tolerant computer systems supporting secure, reliable transaction processing. Stratus VOS is the most directly related descendant of Multics still in active development and production usage today.

General Motors' Multiple Console Time Sharing System (MCTS) for the Control Data Corporation STAR-100 computer was based on Multics.

The protection architecture of Multics, restricting the ability of code at one level of the system to access resources at another, was adopted as the basis for the security features of ICL's VME operating system.

The Edinburgh Multiple Access System (EMAS) draws particularly on the one-level store concept used by Multics, providing access to files only by mapping them into memory. All memory space is associated with a segment.

See also

Related Research Articles

<span class="mw-page-title-main">Operating system</span> Software that manages computer hardware resources

An operating system (OS) is system software that manages computer hardware and software resources, and provides common services for computer programs.

<span class="mw-page-title-main">Time-sharing</span> Computing resource shared by concurrent users

In computing, time-sharing is the concurrent sharing of a computing resource among many tasks or users by giving each task or user a small slice of processing time. This quick switch between tasks or users gives the illusion of simultaneous execution. It enables multi-tasking by a single user or enables multiple-user sessions.

<span class="mw-page-title-main">Virtual memory</span> Computer memory management technique

In computing, virtual memory, or virtual storage, is a memory management technique that provides an "idealized abstraction of the storage resources that are actually available on a given machine" which "creates the illusion to users of a very large (main) memory".

<span class="mw-page-title-main">GE 645</span> 1960s Mainframe Computer

The GE 645 mainframe computer was a development of the GE 635 for use in the Multics project. This was the first computer that implemented a configurable hardware protected memory system. It was designed to satisfy the requirements of Project MAC to develop a platform that would host their proposed next generation time-sharing operating system (Multics) and to meet the requirements of a theorized computer utility. The system was the first truly symmetric multiprocessing machine to use virtual memory, it was also among the first machines to implement what is now known as a translation lookaside buffer, the foundational patent for which was granted to John Couleur and Edward Glaser.

<span class="mw-page-title-main">Conversational Monitor System</span> Operating system

The Conversational Monitor System is a simple interactive single-user operating system. CMS was originally developed as part of IBM's CP/CMS operating system, which went into production use in 1967. CMS is part of IBM's VM family, which runs on IBM mainframe computers. VM was first announced in 1972, and is still in use today as z/VM.

TYPSET is an early document editor that was used with the 1964-released RUNOFF program, one of the earliest text formatting programs to see significant use.

<span class="mw-page-title-main">General Comprehensive Operating System</span> Operating system from General Electric

General Comprehensive Operating System is a family of operating systems oriented toward the 36-bit GE-600 series and Honeywell 6000 series mainframe computers.

<span class="mw-page-title-main">Kernel panic</span> Fatal error condition associated with Unix-like computer operating systems

A kernel panic is a safety measure taken by an operating system's kernel upon detecting an internal fatal error in which either it is unable to safely recover or continuing to run the system would have a higher risk of major data loss. The term is largely specific to Unix and Unix-like systems. The equivalent on Microsoft Windows operating systems is a stop error, often called a "blue screen of death".

<span class="mw-page-title-main">Compatible Time-Sharing System</span> Computer operating system

The Compatible Time-Sharing System (CTSS) was the first general purpose time-sharing operating system. Compatible Time Sharing referred to time sharing which was compatible with batch processing; it could offer both time sharing and batch processing concurrently.

<span class="mw-page-title-main">Fernando J. Corbató</span> American computer scientist (1926–2019)

Fernando José "Corby" Corbató was an American computer scientist, notable as a pioneer in the development of time-sharing operating systems.

Jerome Howard "Jerry" Saltzer is an American computer scientist.

Stratus VOS is a proprietary operating system running on Stratus Technologies fault-tolerant computer systems. VOS is available on Stratus's ftServer and Continuum platforms. VOS customers use it to support high-volume transaction processing applications which require continuous availability. VOS is notable for being one of the few operating systems which run on fully lockstepped hardware.

<span class="mw-page-title-main">PRIMOS</span> Operating System

PRIMOS is a discontinued operating system developed during the 1970s by Prime Computer for its minicomputer systems. It rapidly gained popularity and by the mid-1980s was a serious contender as a mainline minicomputer operating system.

<span class="mw-page-title-main">Shell (computing)</span> Computer program that exposes an operating systems services to a human user or other programs

In computing, a shell is a computer program that exposes an operating system's services to a human user or other programs. In general, operating system shells use either a command-line interface (CLI) or graphical user interface (GUI), depending on a computer's role and particular operation. It is named a shell because it is the outermost layer around the operating system.

<span class="mw-page-title-main">Interdata 7/32 and 8/32</span> 32-bit minicomputers

The Model 7/32 and Model 8/32 were 32-bit minicomputers introduced by Perkin-Elmer after they acquired Interdata, Inc., in 1973. The 7/32 and 8/32 are primarily remembered for being the first 32-bit minicomputers under $10,000. The 8/32 was a more powerful machine than the 7/32, with the notable feature of allowing user-programmable microcode to be employed.

<span class="mw-page-title-main">Protection ring</span> Layer of protection in computer systems

In computer science, hierarchical protection domains, often called protection rings, are mechanisms to protect data and functionality from faults and malicious behavior.

help (command) Command in various command line shells

In computing, help is a command in various command line shells such as COMMAND.COM, cmd.exe, Bash, qshell, 4DOS/4NT, Windows PowerShell, Singularity shell, Python, MATLAB and GNU Octave. It provides online information about available commands and the shell environment.

<span class="mw-page-title-main">Kernel (operating system)</span> Core of a computer operating system

A kernel is a computer program at the core of a computer's operating system that always has complete control over everything in the system. The kernel is also responsible for preventing and mitigating conflicts between different processes. It is the portion of the operating system code that is always resident in memory and facilitates interactions between hardware and software components. A full kernel controls all hardware resources via device drivers, arbitrates conflicts between processes concerning such resources, and optimizes the utilization of common resources e.g. CPU & cache usage, file systems, and network sockets. On most systems, the kernel is one of the first programs loaded on startup. It handles the rest of startup as well as memory, peripherals, and input/output (I/O) requests from software, translating them into data-processing instructions for the central processing unit.

<span class="mw-page-title-main">Unix</span> Family of computer operating systems

Unix is a family of multitasking, multi-user computer operating systems that derive from the original AT&T Unix, whose development started in 1969 at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others. Initially intended for use inside the Bell System, AT&T licensed Unix to outside parties in the late 1970s, leading to a variety of both academic and commercial Unix variants from vendors including University of California, Berkeley (BSD), Microsoft (Xenix), Sun Microsystems (SunOS/Solaris), HP/HPE (HP-UX), and IBM (AIX).

In information security, computer science, and other fields, the principle of least privilege (PoLP), also known as the principle of minimal privilege (PoMP) or the principle of least authority (PoLA), requires that in a particular abstraction layer of a computing environment, every module must be able to access only the information and resources that are necessary for its legitimate purpose.

References

  1. 1 2 R. A. Freiburghouse, "The Multics PL/1 Compiler", General Electric Company, Cambridge, Massachusetts, 1969.
  2. "Multics License (Multics) - Open Source Initiative". opensource.org. February 5, 2008. Retrieved April 11, 2018.
  3. "Myths about Multics". www.multicians.org. Retrieved April 11, 2018.
  4. Dennis M. Ritchie, "The Evolution of the Unix Time-sharing System", Communications of the ACM, Vol. 17, 1984, pp. 365-375.
  5. Dan Murphy (1996) [1989]. "Origins and Development of TOPS-20".
  6. Gregory, Nathan (May 2018). The Tym Before. Lulu.com. p. 66. ISBN   9781387824755 . Retrieved March 29, 2020.
  7. 1 2 "Myths about Multics". www.multicians.org. Retrieved April 11, 2018.
  8. Saltzer, Jerome H. (February 1974). "Protection and the Control of Information Sharing in Multics" (PDF). Introduction to Multics", MAC TR-123 (Report). Cambridge, MA: Massachusetts Institute of Technology and Honeywell Information Systems Inc. pp. 2–41. Retrieved March 16, 2022.
  9. Tom Van Vleck (2002). "How the Air Force cracked Multics Security".
  10. "Multics Glossary -F-". www.multicians.org. Retrieved April 11, 2018.
  11. R. C. Daley and P. G. Neumann, "A general-purpose file system for secondary storage", AFIPS '65 (Fall, part I) Proceedings of the November 30 – December 1, 1965
  12. Brian Kernighan on the origins of Unix LWN.net. 2022.
  13. "A Random Word Generator for Pronounceable Passwords" (PDF). Bedford, MA: Electronic Systems Division, Air Force Systems Command, USAF. November 1975. ESD-TR-75-97. Archived (PDF) from the original on April 8, 2022. Retrieved March 8, 2021.
  14. Van Vleck, Tom. "Password Generator" . Retrieved March 8, 2021.
  15. "Report of the President" (PDF). Massachusetts Institute of Technology Bulletin. 111 (4): 355. December 1975. Archived from the original (PDF) on April 13, 2022. Retrieved April 12, 2022. Use of the Multics service, operated on the Honeywell 6180 system, declined...a decrease of 15 percent.
  16. "Report of the President" (PDF). Massachusetts Institute of Technology Bulletin. 112 (4): 392. November 1976. Archived from the original (PDF) on April 13, 2022. Retrieved April 12, 2022. ... the demise of several Multics projects which failed to obtain funding.
  17. "Report of the President and the Chancellor" (PDF). Massachusetts Institute of Technology. 1978. p. 450. Archived from the original (PDF) on April 13, 2022. Retrieved April 12, 2022. This new pricing proved so attractive to many people, however, that Multics users and usage increased considerably.
  18. "Multics Data Security". multicians.org.
  19. Fraim, Lester J. (July 1983). "Scomp: A Solution to the Multilevel Security Problem". Computer. 16 (7): 26–34. doi:10.1109/MC.1983.1654440.
  20. "STOP OS™ Version 7.3.1 Security Target" (PDF). Common Criteria.
  21. "Multics". stuff.mit.edu. Retrieved July 25, 2022.
  22. "Multics History Dates" . Retrieved September 13, 2015. Shutdown of DND-H (17:08Z 10/30/00)
  23. Van Vleck, Tom. "Open Source for Multics". Multicians.org. Retrieved April 11, 2016.
  24. Anthony, Charles. "(email) Re: [dps8m-developers] Multiprocessor and/or networked Multics". Sourceforge.net. Retrieved April 11, 2016.
  25. "RingZero - Multics reborn". WikidotCom. Retrieved April 11, 2015.
  26. "Multics Simulator" . Retrieved July 9, 2017.
  27. "Installing Multics" . Retrieved May 19, 2020.
  28. Honeywell Bull, Inc. (February 1985). Multics Commands and Active Functions (AG92-06) (PDF). Retrieved March 30, 2023.
  29. "Unix and Multics".
  30. 1 2 "Multics Commands".
  31. Multics C User's Guide (PDF). Honeywell Bull. November 1987. Retrieved March 26, 2024.
  32. Salus, Peter H. (1994). A quarter century of UNIX (Reprinted with corrections Jan. 1995. ed.). Reading, Mass.: Addison-Wesley Pub. Co. ISBN   978-0-201-54777-1.
  33. Ward, Mark (August 20, 2009). "40 years of Unix". BBC News. Retrieved April 27, 2010. Quoting Peter Salus.
  34. 1 2 Peter Seibel. Coders at Work: Reflections on the Craft of Programming. APress Publications, 2007. ISBN   978-1-4302-1948-4
  35. Garfinkel, Simson and Abelson, Harold. Architects of the Information Society: Thirty-Five Years of the Laboratory for Computer Science at MIT. MIT Press, 1999. ISBN   978-0262071963
  36. Karn, Phil (October 28, 1981). "Origins of unix". Newsgroup:  fa.unix-wizards. Usenet:   4743@Aucbvax.UUCP . Retrieved April 11, 2014.
  37. Ritchie, Dennis M. (1977). The Unix Time-sharing System: A retrospective (PDF). Tenth Hawaii International Conference on the System Sciences. a good case can be made that UNIX is in essence a modern implementation of MIT's CTSS system

Further reading

The literature contains a large number of papers about Multics, and various components of it; a fairly complete list is available at the Multics Bibliography page and on a second, briefer 1994 Multics bibliography (text format). The most important and/or informative ones are listed below.

Technical details

Security