Bestand wählen
Merken

The Emacs Of Distros

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
you but it can you hear me yes OK so as we like to say in you know in a haka context a is often seen as an operating system right so this talk is going to be about an operating system would destroy which tries to be like the max so that's that's going of 0 there around so what does it mean actually to be like you Max what's what's the nice thing about the Maxwell the max means Emacs merely makes all computing simple quiet but everyone agrees some people have found the there was a meanings the acronym but yeah I think to prefer the first one cell what does it mean concretely if we take battles for freedoms of free software how does the design of the Emacs relate to those 4 freedoms so of course we have we have licenses to guarantee those 4 freedoms on Signal GPL typically makes sure you cannot remove those freedoms which is a nice thing so that's the legal part of free software but now what does the max due to to help prevent well what we can go from a technical viewpoint is to make the 1st freedom more practical OK so the idea for max is basically you take freedom them around and you might to a concrete system design so that's what we're trying to do is the geeks package manager the so I actually if we look at early writings by Richard statement about the design of United he were saying basically that with a programmable editor people would then the programming without really noticing and so this helps improve computer literacy that's that's kind of fashionable words is there is but this is a writing from 1981 right and the idea was that In all secretariats perhaps at the time would you'll the max and so so that typically people who were told by society that is it would be unable to program but with a programmable editor a whole to us that we know who is the max those people would finally and the being able to program by themselves so they would really be in control of the software the use the right and yeah but as a whole Gross never there is if you look at what people are using the like if you look at what series I using the using probably free software sometimes proprietary software but even free software like Gabor officers that something which will help you gains the ability to program it's free software from a legal standpoint but it's not software that will free its users in a way that they can you know managed to extend its and to kids and learn how to program here so I think we have the same sort of situation with distributions so yeah so of course I mean if you look at so it lacks predates signal projects if you look at the new project on the 4 freedoms and all that it's really the same spirit it's it's trying to had emancipate computer users trying to put people in control and allow them to to actually control the software and again that's what trying to do is signal geeks projects so concretely what what has a blurred the various tool distribution hacking so well if if reconsidering mice when it allows you to do is to is in the study how it works and to easily extend its and that's something that's not really possible reason many distributions and package merges narratives you cell so of course the 1st thing we would like to do technique is to L packaging to be more you know I'm not an expert thing would like users to be able to do packaging and like users to be able to extend the distribution so just as an example of I happen to work in the research institute which sure is many people doing high-performance computing so they have a shared cluster and some people you know well Each research team wants to have their own piece of software so they want to have let's say you know scientific software combined with a very specific MPI version and another thing we want to also have the same software package but combined with a different MPI implementations so that they can compare you know that kind of stuff and bubble that each user in each gene wants to be able to choose when their grades so the recovery problem on on clusters is you know you have sysadmins taking care of installed packages on researchers doing in all do exist of experiments on benchmark and so sysadmins decide to a brittle the packages and Sawyer experiments no longer broke expected them to because you just so change over the underlying software so it's a very common problem the yeah in addition people clusters typically use um environment modules to handle that which which amounts to basically making a new distributions by hand on the machine so I think this tool should be able to help more on this kind of topics and this is related to what you care was explaining before this tool should be able to help people In this use cases package management tool themselves also can hurricane it's it's really hard to get in and to hide them to modify how they work very often and now of course we need a insulin operating system you have all sorts of use their configuration files formants everything which makes its again a bit harder from someone to come in and say look I'm going to change how things are configured the lastly you should look at a typical the Linux system or a UNIX system in general we have all sorts of programming language barriers I mean if you look at its people system you have a whole set of bash scripts to for instance initializers system or you have a big CD which takes care of system initialization of stuff and you also have know all sorts of Python scripts all around the all this makes it quite hard to to hide the system to understand what's going on because it's time you we want to look at something you know it's there's a language barrier probably at his that's what happened to me in the past probably you're going to say OK I just stop here that this level and I see later for for the next language what so I think in all these are typical Bristol distribution hacking and this is where comes in rights and yeah so like you know it's like marks it's not to solve for a minute but I think where we are able to solve a bunch of problems notably some that encode Lucas mentioned just before so I guess it's
time to time for a general because for this hiking stuff is cool bed sent them well I be able to actually do something as a package manager right so the OK so we we
basically was gigs provided singing command which is called gigs is a number of sub commands nothing there usual so let's say I want to install a package so this is the 1st thing I would to do is to install guide so guide is a interpreter compiler at so I just that the expected that I again and I don't need to be rude to actually do that and dating me OK if guide is installed now what's complaining because they don't have never exists which is fine because they already have a local copy of the binaries if do rich guy what I can see it's around here it's actually you know thought peaks profile directly in my home directory the for this is now let's say I want to so different version of the i and yeah I don't the of so what we're doing here is that we are doing as a single transaction and in a single transactions with installing 2 packages so if you want to to the talk by Nicolas Gerald this morning you probably recognize a few bits you you know Nixon and you may be able to track differences as well because as a whole set of packaging tools is different because so what we have no what we have actually downgraded saying of ready that came from the I we don't really guide and we've installed by them at the same time and so tall is telling us you should be careful about search for so I don't know about you but I think search breath are 1 of the most difficult problems in computer sales so I mean we always end up having problems just because we forgot to set the environment for bar props correctly so here's Italy is helping us sitting at be careful you don't have a Python path variables so probably it's not gonna work as explained so you can just you know export the variable of and yes no I have the old guy version and so on of what is contained in the yeah let's say I want to install GI on which is interface for OK again is telling me I have yet another environment variables that they should define for things to work correctly so far so good so um let's say I'm unhappy was my eyes you the current configuration I can always fall back the rights and now if I leave the installed packages obviously I'm back to the situation where I have just guide with the fate of the the OK I OK but of course if we want to be easy to of this was made any maximal to begin with self fortunately you a fabulous geeks hackers called that expressed came represen Emacs mode which allows you to do all that for me the name of the that I just showed you and the so 1st agony solves the packages which are installed in my for this so this is where my we all 4 5 and the other 1 was for the right so I have a whole bunch of packages installed on let's say I want to install the new 1 yeah like in this the latest versions of the available packages and in this talk and what can on with the installed yeah let's say I want to install NDI so I can just just like entering it have another description and stuff about the knee I and if I go to the installed better than just gets installed pretty much like what you get is expected commands acceptance in a much yes now it's installed and still I also have direct access to the source code so I can make a show yeah can directly see the source code of the i which is nice form of free software perspective because you know you directly you have a direct connection to the source but the guy was mentioning that they writing males and actually Gates's for writing means and the rest is in the sense that you have both the recipe for the package and you can get the binary as well the so the recipe itself just here so if I if I hit enter as the recipe the distribution of edges this expression to get back to that later and so I can directly Hackett if I want to change it the yes so another thing I can do with this a maximal this to is the generations of my people 5 so generation just which time make a transaction like you install package is a real packages is you just create a new generation and from reading my 2nd selects 2 generations at this and I can ask for a diff between the generations so what it's telling me here is that well the difference between the 2 last generation that have a new package that appear in I mean of the right a yeah this is it so I can I can use that sort of thing for a new generation of so this is this is quite useful because if you find out that something working in set of installed packages you can always check what happens right and see what the difference is far OK the collects
presentation so what's the workflow so basically you have the gigs developers typically your excuses writing those package definitions and so when they're done means that this so the definition locally so you can always write a package definition you gigs view name of the package on you make sure it actually rocks and then if you have a great excessive just push it to the geeks represent really and finally users they can just pull recipes from from upstream from next and from Desikan a installed a new packet that's a very straightforward workflow and in addition we also have a built from which is a which is basically doing continuous integration of distribution so from there you can fetch by binaries if you want to I mean I mean the tool will automatically use binaries it's available and if if they're not available at review things locally but so that's that's kind of a different workflow from that inferences um because mentioned before 1 of the dirtiest secret so that by which is actually that and maintain as they did lovers applaud software recipient and they're own machine and so you know what what else trust can you having the I'm just paraphrasing what he said and so here we have we have that bill from making making bills but since every user also has recipes locally you know every user is able to build software right by themselves the and so you can if you don't trust in him from you just don't use it right yeah just don't you that you can configure geeks to not units undefined value and that building a lot of software locally images not always convenient but you can also run your own separate build farm and then you can check you if you actually get the same results but compared to the official did by so yeah there's no no maintain their clothes no single point of 1st yeah we spread nice um so reproducible means is is a hot topic these days thanks to our friends at the interstate usage humans that but we realize that it's important to be able to have more guarantees in the binary that we using so In case which is similar to what happens with snakes when you read software at you get to 1 of is long findings was a harsh and the hash actually denotes a hashable to the variance is used to be the suffer so for instance when you build guy you need a ghostwriter into C library lots of other libraries and the fact that we see here is the high shovels dependencies so you can curries the references on what happens is normally if you take any 2 users building guy from the same geeks recipes while circuit nearly binary identical the binaries life so I think nearly because of their role as sources of non-determinism in in packaging systems and stuff like that so fortunately the reproducible the reproducible thought that the end of the project is working on it and it's mostly across this story issue actually often oftentimes a problem is extremely in in Butte systems and stuff and so what's what reproducible that they'd end up that is doing is beneficial for all the free software community which is really really nice and I think there's a talk about reproducible of that in the net at 4 PM if I remember correctly today so
yeah and Soulier they said was the NSA and all other spy agencies doing all this kind of crazy stuff it's really important to be able to to improve right we have hearings free software community in what sense OK so as response
to to talk about hacking so let me show that the whole the user can type peaks of so what do we have OK let's let's take
for instance the and see the definition a recipe for the Emacs packets so it looks like this it's actually skin quote but you don't really need to be a skew hacker who understand what's going on here right it's it's purely declarative is saying you know giving something version the giving the URL of the source called a bunch of metadata that can of build system which is being used on yeah period fixing a bunch of stuff in in the source fires and then we're describing dependencies blah blah blah you know is the usual thing i is this is from the MaxEnt since this is king called regular skin code for of guide we can actually use case so is there is maximal and which allows he likes to talk to the to guide right the so what we have here we have a max and we have navigate process and they're talking together and so when that when I put the cursor on on the variable name but I'm not sure if you can see in in the bottom line that's the maximal knows what it seems like it's a variable defined in such modules of La and so we can use method up to just jump to the definition of of the the library will work on this yeah so if I can jump to the definition of near XML to for instance uh we're likewise i mean and so forth so that makes it very easy to to navigate through the distribution you know just statement about like like when you're using facts and stuff and yeah that's it OK so let's say I want to customize the max because I'm not satisfied with the default package so what name do well at I can define another object which is this 1 for instance the lacks no exported so again it's a regular scheme objects of through defining a regular skin variable and here just saying OK I think the inputs of the original Emacs but I removed GTK + like it with that is I have Emacs package but result to get listed as a dependence and so I get m X package which can be used on x 11 but without and yeah it's inherit keyword which means I'm just copying the original Emacs recipes and modifying a couple of things if and of course in in purely spirits I can go to a rebel our so basically you read about printing and from there I can say I want to encourage the Emacs module OK and undefined that in like what it's it's so it's a normal variable Saunders you know giving a representation of the variable's value on the the is the max of packets you get this of what's can you know Crary the values of of all its fields like you can get its analysis and stuff and so we have a complete its API to to manipulate packages so it's actually quite useful so let me show you some the yeah so we have another fabulous have here David Dunson who developed geeks it's it's a problem currently that but it's a web interface which allows you to you know to to view packages and to install them in your profile and stuff like that let's see if it's still working yes so let's assume yet so you can search for packages the and so the browser here is just talking to 2 guys built-in web server so we have a guide program which runs guidance web server and again for also uses the excessive library because the IXA package management tool itself has a distribution all this is just a big library OK so so we have a professor region just using all this and browsing is the list of packages and stuff say yes what bunch of stuff in there the yeah
so you can install on yeah it's it's instantaneous because I guess it was already in this case and if we look at the consul
whereas similar thing to see and then
just installed maximize it
just install side in my profile the yeah I can see here it's been installed on
and so you know this web interface is it's really cool because it's a it's a small piece of software in its it's made possible because everything is a library and because all this to all the packages can be manipulated so even the yes so that that's the thing
of what not at Paul given seen a of
of of what's hackable pixel so far pretty much on tools side so here we have XYZ Tool side which means you know expect instrumental to libraries which allow you to to try residues defectors definitions but then there's also say inside so what happens when you build a package is with cakes is actually isn't geeks programs have expected trend sums just talks to the building so the bill and even if you were at at Nicholas focus morning it's the same as the next year so it's this is it was president and basically which takes care of sitting ch works the containers roughly we used you know separate namespaces that gratuities and everything so when you're actually building software on your machine you're just talking to that the and the demon itself creates those containers right and containers we also used guide so the implementation 2 words you know all the scripts to actually build packages and so that that's that's pretty cool we give you an
example say again if I go back to the rebel and seconds and the storm which means I'm going to do stuff which modify it is to store directly and I can say let's combine these max package definition of so let's turn it into a derivation derivation is a low level representation of the package with actions and I'm getting those gains those findings it doesn't sensoren because they're ellipses to hide from the harsh of which we can throw yeah nominate looks like this but the gains of the Maxwell just just like those long hashes yeah and I can say OK let's say it's been it's been derivation the OK it's in all in this so it's instantaneous because it's in Catch basically and if I go to that directory the what I have in the in there so this is a pretty much higher level view of what we can do with packages but we can also operate we scheme expressions of the lower levels we consider very basic scheme expressions to the the man and ask it to build its so for instance I can do I can send it that the expression which is an expression of representing the the actions of I can say cool and I enters is actually in the expression the role of and the and makes the output directory 5 and again I get problems their inventions so I can also cut base that's fine name and pass it to 1 of the command line tools so if I do gigs being of that the obvious thing yeah they just yeah this is uh handle things and it just be the things they build an NT Directory basic which it's OK very useful but again the idea we reusing schema you know in different places which means we're able to reduce called and we have libraries also to handle all the directions and stuff required to be victims but
is in so far as to enable packages themselves that's it again we can go a bit further and we actually have a similar approach to woo hoo operating system configuration so what does it look like the so at 1 again
the thing is if you want to install the operating system or if you want to modify its configuration you just try to declaration of what you want your operating system to look like so give you give in all bunch of usual detailing the whole length and so on so will pull the configuration 5 systems that sort of thing user accounts services and globally visible packages and guess what it's gains came to a so if we go from the required inspect all is names of this variable names we see you know it's just a regular skin variable so again if I want to see what's base 5 systems which is the basic set of 5 systems which are going to be mounted again just jump to the definition of and I see yeah it's OK we have 3 5 systems which are monitored by default assigned here we have service is so services are things which are going to run you know when you start the system so we have this leads service so know is 1 of these old login manager for there suddenly fashionable I guess we probably have GDM or something like that later on but so far that's what we have I so yeah again I can jump to the definition and they can look at how it's actually written so since service is just a regular skin function which takes the number of parameters and there's a lot of and basically it during the service in surprisingly the service just gives an expression which says how we will discover service and later on it gives an expression which says how we want to stop the service so what what action has been taken with when the services stuff we see these thing which means it's an expression that is going to run at runtime when we actually do startle stubs service yeah we have a bunch of other services so what we can do is this from declaration of what we have we have a tool which cannot Texas in operating system declaration as an input and can do a number of things like so it's a geek system commands if you run system beyond that and undefined what's called uh rules the the this at so I can run as a geek system command and pass in this slide which contains the duration I just chilled and if everything goes well is building a number of things like it's currently buildings the initial run in thing but here we have our so we wind up with the again is director really Our undefined and into the very thoroughly but I basically have called a closure of what's needed for this operating system so similar to what Nicholas show this morning we have a single directory containing everything all the configuration of the system so we have the balls create you know the the directly in the initial run this as a kernel a number of other things a so far so good so I can also ask it to be individual machine of the of the Lewis the existence of Cologne bits low-delay concerning Crixus network thank you it's populating the virtual machine image and here we are we get so scripts but we get around to actually stop the mutual machine which we which contains the operating system is configured so what happens when we run it what bullets on
the which it creates a number of user accounts at the beginning because it's a fresh of the disk image that doesn't have any user account at the beginning but
and a if just to I jump to the to the wife of the late you can read it it's it's a bit yeah so when we get to see why we can log only in this world we have everything we wanted to have friends
and I can also go to the login screen so this is completely logging manager I can log in and you getting new window maker session again not something very fancy but we also have X if you know where this I tried to mixture this is it so we can from there we can actually runs the going Crary's the system of the and only quick look at what happens and I just collect to my to my own machine so it really is a quite original a system which is going on in the I guess most of you haven't heard about it it's a very it's not new actually it's quite all between just provided for for the purposes of things so and to talk to the in its system to be when we use the equal commands and I'm doing it on my on my laptop here and so the fight of the way yeah if I ran as will tickle state gently then I can I can list all the services which are studied of starts for my system so when we see many services this here so we have of friends instance this service just takes care of enabling troops that from my home directly we have services which set of the use of font and TTY 1 2 2 1 6 and we have services for each face system to be mounted at the start of time and we have services for normal demons likes to eat humans there and I guess yeah X for you know stuff like that and so we can we can stop and start services like I can stubs and name get even with this command and restart it please get the idea that
and so if we summarize what we have here is we have the kernel and from there we have an initial run this and actually turns out we run guided in the initial and so we can use all our friendly guy libraries retains the ones and from there we have gained 1 which is and the and again that's guide so again we can reuse our friendly libraries scheme libraries within that that human and then we have to use land so this everything you want so the core
thing is yeah we're able to to reuse a bunch of course here and if you look at things like there's something like device mapping and you won't be able to do them both Indian in z e . g or at system initialization time from PAT 1 and so it's very useful to be able to reuse of this kind of cold at
and building need dodgy something very simple we can do yes expression to in the let's say I want to yes I want to explain something and then and I don't know it and let's say I want to start the marks from the Aeneid dodgy itself I can say something like that right and you know I can just be that it RDA and it will automatically create a any that the receive excellent dependency within the unit on and D that he will display handle and then starting next wonderful a remaining understanding it so I I want right now OK so what the status of
the project so just to summarize it's pretty young project and so it started of makes I've I've been working on and makes us for over 4 years before and started working on UNIX so 2 years ago roughly and so in the center of the project and the father of and then we we had a number of milestones so the 1st thing we had an actual is the level operating system was recently this summer and then lately you know we keep adding more features and so the last resort of actually 2 days ago and yeah another fabulous hackers spotted gigs to armies 7 so we now have a number of books and lots of birds fixes and stuff and 1 there go Gates was officially recognized by the FSF as the compliance so is compliant with the Free Software Definition guidelines which which is called
but all status so all this is this is great and everything but it is not who right so you know what I mean so a status so we have a full-featured Edmund package manager we have a thousand packages roughly which is I think 20 times less than that yeah it supports full platforms so basically in told and the Greeks and are and we have that cake system distribution which is a standalone operating system this and this is the part which is can use to dog Fuji right now I you it's it's really improved the last really is I think I hope so of what I'm using it daily and it it works quite well for for 1 doing but we don't have things like we don't have a little carry so if that's your thing you might be disappointed and we like a few things like network manager or if you know or something like that which makes it you know so convenience of that I was so binary is we have a lot of tooling because since we can easily manipulate you know packages we have a lot of tools to for instance automatically updates recipes for who lead recipes so which is to say to fly problems in recipes and we have internationalization of older software answer package description at so yeah it's it's quite active 0 cremate served quite a bunch of people so it's saying 36 contributors last year which is which is cool but yeah it's a lot less than that the course we're working on it at the end of things and like the thing here 1 contributed to the it's because I so our brave people and really awesome hackers so thanks Aizerman things my employer also for allowing me to will have to Brussels so work in progress so we have people working on those big packages big scary packages tho I think that I see very recently and people are occasionally skin union stuff like that it's a bit scary to me but then let that people are actually working we have someone was studied the new her because In other systems was to use the herd it's frigging programs there's still a lot be done we have someone and so they've done some developed geeks where which is web interface which I showed you on another thing is geeks coverage which will allow normal users to publish their binaries of urged to be so we can build some sort of a peer to peer the network at the as a role to 1 person so let me features more services and they said I yeah we have the geek system reconfigure command which allows you to modify your system configuration but it's a bit static currently we would like it to be more dynamic like being able to restart a number of services and everything of yeah lots of things to do when it's when it the better be from we have your problem sometimes a good it's a small world from yeah Liz duck fooled more packages on yeah if you have ideas we would like to hear from them so you can help by installing for all reporting birds sharing ideas and there's a friend community on on IRC people to harsh pixel of free note so I invite you to join us thank you I know if we have time for questions is that 30 seconds for Christian maybe 1 question yeah and think so what are the differences with makes cell basic theory rear reusing I mean Nixon example functional package manager so you get the same kind of features from a user viewpoint and we're actually reusing the low-level stuff of next which is the next year the thing which set you know containers but then the rest is completely eats a separate base and so we have this scheme stuff which which is I think more hackable so what's available in x so you need to have a specific language to describe packages and then you have another language in which the rest is implemented in C + + U of her and stuff since it's a different approach and also reusing system using the and the know it's from so using system differences so it's a different approach all of you and I just you know I I so yes the of and all the and yes you you you you you you you know what the and yes and what I want yes you and you yeah but you know what to sure so you know you're arguing that environment modules are more convenient and clusters right environment with use of a convenient for processes such as saying when the we used to it yeah the the OK when my my experience that INRIA suggest that it's still quite limited here's your this
Distributionstheorie
Bit
Programmiergerät
Texteditor
Freeware
Extrempunkt
Formale Sprache
Versionsverwaltung
Datenmanagement
Schreiben <Datenverarbeitung>
Systementwurf
Computer
Gradient
Übergang
Freier Ladungsträger
Skript <Programm>
Hacker
Hacker
Benchmark
Feuchteleitung
Umwandlungsenthalpie
Addition
Befehl <Informatik>
Reihe
Kontextbezogenes System
Arithmetisches Mittel
Texteditor
Diskrete-Elemente-Methode
Menge
Rechter Winkel
Datenverarbeitungssystem
Projektive Ebene
Versionsverwaltung
Programmierumgebung
Instantiierung
Subtraktion
Digital Rights Management
Zellularer Automat
Implementierung
Virtuelle Maschine
Software
Supercomputer
Netzbetriebssystem
Cluster <Rechnernetz>
Optimierung
Konfigurationsraum
Implementierung
Programm
Programmiersprache
Beobachtungsstudie
Systemverwaltung
Physikalisches System
Quick-Sort
Office-Paket
Mereologie
Gamecontroller
Wiederherstellung <Informatik>
Wort <Informatik>
Beobachtungsstudie
Modul <Software>
Distributionstheorie
Bit
Texteditor
Freeware
Extrempunkt
Compiler
Versionsverwaltung
Substitution
Information
Binärcode
Deskriptive Statistik
Last
Arithmetischer Ausdruck
Standardabweichung
Softwarewartung
Klon <Mathematik>
Elektronischer Programmführer
Hacker
ATM
Interpretierer
Distributionstheorie
Elektronischer Programmführer
Topostheorie
Quellcode
Programmierumgebung
Variable
Arithmetisches Mittel
Teilmenge
Transaktionsverwaltung
Generator <Informatik>
Menge
Suite <Programmpaket>
Rechter Winkel
Datenverarbeitungssystem
Ein-Ausgabe
Reelle Zahl
Programmbibliothek
Versionsverwaltung
Verzeichnisdienst
Programmierumgebung
Chatbot
Subtraktion
Hash-Algorithmus
Digital Rights Management
Zahlenbereich
Patch <Software>
Dienst <Informatik>
E-Mail
Homepage
Systemprogrammierung
Open Source
Mailing-Liste
Variable
Bildschirmmaske
Software
Perspektive
Datennetz
Skript <Programm>
Installation <Informatik>
Konfigurationsraum
Implementierung
Demo <Programm>
Einfach zusammenhängender Raum
Binärcode
Konfigurationsraum
Quick-Sort
Benutzerprofil
Thread
Touchscreen
Bridge <Kommunikationstechnik>
Term
Resultante
Distributionstheorie
Punkt
Gewicht <Mathematik>
Inferenz <Künstliche Intelligenz>
Freeware
Snake <Bildverarbeitung>
Kombinatorische Gruppentheorie
Binärcode
Virtuelle Maschine
Einheit <Mathematik>
Computerspiel
Software
Endogene Variable
Hash-Algorithmus
Programmbibliothek
Softwareentwickler
Bildgebendes Verfahren
Varianz
Addition
Sichtenkonzept
Gebäude <Mathematik>
Kontinuierliche Integration
Quellcode
Physikalisches System
Arithmetisches Mittel
Diskrete-Elemente-Methode
Rechter Winkel
Digitaltechnik
Projektive Ebene
Instantiierung
Resultante
Tabellenkalkulation
Distributionstheorie
Texteditor
Extrempunkt
Browser
Selbstrepräsentation
Versionsverwaltung
Parser
Substitution
Fastring
Bildschirmfenster
Metadaten
Regulärer Graph
Standardabweichung
MIDI <Musikelektronik>
Elektronischer Programmführer
Hacker
Default
Lambda-Kalkül
Gerade
Caching
Schiefe Wahrscheinlichkeitsverteilung
No-Free-Lunch-Theorem
Spieltheorie
Quellencodierung
Profil <Aerodynamik>
Nummerung
Quellcode
Ein-Ausgabe
Frequenz
Arithmetisches Mittel
Maximum-Entropie-Methode
Software
Datenfeld
Diskrete-Elemente-Methode
Funktion <Mathematik>
Verschlingung
Ein-Ausgabe
Server
Phasenumwandlung
Derivation <Algebra>
URL
Programmbibliothek
GNU Emacs
Versionsverwaltung
Instantiierung
Server
Digital Rights Management
Maßerweiterung
E-Mail
Code
Homepage
TUNIS <Programm>
Physikalisches System
Open Source
Variable
Benutzerbeteiligung
Datentyp
DoS-Attacke
Programmbibliothek
Strom <Mathematik>
Optimierung
Gammafunktion
Modul
Implementierung
Analysis
Pell-Gleichung
Benutzeroberfläche
Elektronische Publikation
ET++
Konfigurationsraum
Unicode
Mailing-Liste
Interpretierer
Physikalisches System
Modul
Objekt <Kategorie>
Uniforme Struktur
Compiler
Streaming <Kommunikationstechnik>
Benutzerprofil
Mailing-Liste
Benutzeroberfläche
YouTube
Software
Gamecontroller
Datenmodell
Parser
Profil <Aerodynamik>
Benutzeroberfläche
Bridge <Kommunikationstechnik>
Programmbibliothek
Namensraum
Pixel
Gewichtete Summe
YouTube
Gebäude <Mathematik>
Einfach zusammenhängender Raum
Implementierung
Marketinginformationssystem
Fokalpunkt
Nabel <Mathematik>
Virtuelle Maschine
Mailing-Liste
Funktion <Mathematik>
Twitter <Softwareplattform>
Software
Residuum
Programmbibliothek
Skript <Programm>
Wort <Informatik>
Elektronischer Programmführer
Optimierung
Dämon <Informatik>
Texteditor
Selbstrepräsentation
Gruppenoperation
Substitution
Derivation <Algebra>
Dienst <Informatik>
Benutzeroberfläche
Datensichtgerät
Übergang
Richtung
W3C-Standard
Arithmetischer Ausdruck
Verzeichnisdienst
Netzbetriebssystem
Hash-Algorithmus
Programmbibliothek
Schnitt <Graphentheorie>
Konfigurationsraum
Funktion <Mathematik>
Binärcode
Sichtenkonzept
Prozess <Informatik>
Zwei
Nummerung
Diskrete-Elemente-Methode
Funktion <Mathematik>
Ellipse
Derivation <Algebra>
Verzeichnisdienst
Instantiierung
Hydrostatik
Kernel <Informatik>
Bit
Konfiguration <Informatik>
Substitution
Information
Login
Template
Kernel <Informatik>
Arithmetischer Ausdruck
Regulärer Graph
Gruppentheorie
Fahne <Mathematik>
Existenzsatz
Skript <Programm>
Punkt
Druckertreiber
Default
Parametersystem
Lineares Funktional
Dicke
Prozess <Informatik>
Datennetz
Gebäude <Mathematik>
Speicher <Informatik>
Programmierumgebung
Ein-Ausgabe
Variable
Rechenschieber
Dienst <Informatik>
Menge
Gruppenkeim
Wurzel <Mathematik>
Login
ATM
Deklarative Programmiersprache
Client
Derivation <Algebra>
Bildschirmsymbol
p-Block
Verzeichnisdienst
Ext-Funktor
Message-Passing
Partitionsfunktion
Algebraisch abgeschlossener Körper
Server
Ausnahmebehandlung
Digital Rights Management
Gruppenoperation
Content <Internet>
Zahlenbereich
Dienst <Informatik>
Datensicherung
ROM <Informatik>
Zeitstempel
Datensichtgerät
Virtuelle Maschine
Physikalisches System
Systemprogrammierung
Mailing-Liste
Zufallszahlen
Verzeichnisdienst
Modul <Datentyp>
Netzbetriebssystem
Mini-Disc
Datennetz
Passwort
Booten
Operations Research
Konfigurationsraum
Bildgebendes Verfahren
Tabelle <Informatik>
Dateiverwaltung
Binärcode
Elektronische Publikation
Vererbungshierarchie
Konfigurationsraum
Default
Rechenzeit
Schlussregel
Physikalisches System
Quick-Sort
Benutzerprofil
Dynamic Host Configuration Protocol
Loop
Parametersystem
Compiler
Zeitzone
Personal Area Network
Bit
Server
Spielkonsole
Digital Rights Management
Login
Virtuelle Maschine
Physikalisches System
Font
Notebook-Computer
Datennetz
Bildschirmfenster
Passwort
Physikalischer Effekt
Inklusion <Mathematik>
Dateiverwaltung
Prozess <Informatik>
Dämon <Informatik>
Physikalisches System
Programmierumgebung
Variable
Zusammengesetzte Verteilung
Dienst <Informatik>
Differenzkern
Dämon <Informatik>
Normalvektor
Term
Aggregatzustand
Instantiierung
Mapping <Computergraphik>
Hauptidealring
Programmbibliothek
Nummerung
Speicherabzug
Dienst <Informatik>
Physikalisches System
Elektronischer Programmführer
Mini-Disc
Binärdaten
Texteditor
Regulärer Ausdruck
Zahlenbereich
Dienst <Informatik>
Übergang
Datensichtgerät
Physikalisches System
Arithmetischer Ausdruck
Güte der Anpassung
Einheit <Mathematik>
Verknüpfungsglied
Rechter Winkel
Netzbetriebssystem
Derivation <Algebra>
Projektive Ebene
Operations Research
Hacker
Distributionstheorie
Bit
Freeware
Formale Sprache
Substitution
Binärcode
Deskriptive Statistik
Netzwerkverwaltung
Code
Hacker
Lineares Funktional
Distributionstheorie
Datennetz
Nummerung
Software
Dienst <Informatik>
Diskrete-Elemente-Methode
Rechter Winkel
Internationalisierung <Programmierung>
Programmierumgebung
Instantiierung
Sichtbarkeitsverfahren
Subtraktion
Explosion <Stochastik>
Digital Rights Management
Zellularer Automat
Zahlenbereich
Dienst <Informatik>
Systemplattform
Physikalische Theorie
Physikalisches System
Arithmetische Folge
Software
Netzbetriebssystem
Nationale Forschungseinrichtung für Informatik und Automatik
Cluster <Rechnernetz>
Optimierung
Konfigurationsraum
Ideal <Mathematik>
Binärdaten
Pixel
Benutzeroberfläche
sinc-Funktion
Zwei
Systemplattform
Physikalisches System
Modul
Quick-Sort
Mereologie

Metadaten

Formale Metadaten

Titel The Emacs Of Distros
Untertitel How GNU Guix Seeks to Empower Users
Alternativer Titel Distributions - The Emacs Of Distros
Serientitel FOSDEM 2015
Autor Courtès, Ludovic
Lizenz CC-Namensnennung 2.0 Belgien:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
DOI 10.5446/34351
Herausgeber FOSDEM VZW
Erscheinungsjahr 2016
Sprache Englisch
Produktionsjahr 2015

Inhaltliche Metadaten

Fachgebiet Informatik

Ähnliche Filme

Loading...
Feedback