Siri.lmao.sk

How To Steal Code
Inventing The Wheel Only Once
Much is said about ‘‘standing on other people’s shoulders, not their toes’’, but in fact the wheel is re-invented every day in the Unix/C community. Worse, often it is re-invented badly, with bumps, corners, and cracks. There are ways of avoiding this: someof them bad, some of them good, most of them under-appreciated and under-used.
Introduction
‘‘Everyone knows’’ that that the UNIX/C† community and its programmers are the very paragons of re-useof software. In some ways this is true. Brian Kernighan [1] and others have waxed eloquent about howoutstanding UNIX is as an environment for software re-use. Pipes, the shell, and the design of programs as‘filters’ do much to encourage programmers to build on others’ work rather than starting from scratch.
Major applications can be, and often are, written without a line of C. Of course, there are always peoplewho insist on doing everything themselves, often citing ‘efficiency’ as the compelling reason why theycan’t possibly build on the work of others (see [2] for some commentary on this). But surely these are thelamentable exceptions, rather than the rule? At the level of shell programming, yes, software re-use is widespread in the UNIX/C community. Not quiteas widespread or as effective as it might be, but definitely common. When the time comes to write pro-grams in C, however, the situation changes. It took a radical change in directory format to make peopleuse a library to read directories. Many new programs still contain hand-crafted code to analyze their argu-ments, even though prefabricated help for this has been available for years. C programmers tend to thinkthat ‘‘re-using software’’ means being able to take the source for an existing program and edit it to producethe source for a new one. While that is a useful technique, there are better ways.
Why does it matter that re-invention is rampant? Apart from the obvious, that programmers have morework to do, I mean? Well, extra work for the programmers is not exactly an unmixed blessing, even fromthe programmers’ viewpoint! Time spent re-inventing facilities that are already available is time that is notavailable to improve user interfaces, or to make the program run faster, or to chase down the proverbialLast Bug. Or, to get really picky, to make the code readable and clear so that our successors can under-stand it.
Even more seriously, re-invented wheels are often square. Every time that a line of code is re-typed is anew chance for bugs to be introduced. There will always be the temptation to take shortcuts based on howthe code will be used—shortcuts that may turn around and bite the programmer when the program is  ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁  † UNIX is a trademark of Bell Laboratories.
modified or used for something unexpected. An inferior algorithm may be used because it’s ‘‘goodenough’’ and the better algorithms are too difficult to reproduce on the spur of the moment. but thedefinition of ‘‘good enough’’ may change later. And unless the program is well-commented [here wepause for laughter], the next person who works on it will have to study the code at length to dispel thesuspicion that there is some subtle reason for the seeming re-invention. Finally, to quote [2], if you re-invent the square wheel, you will not benefit when somebody else rounds off the corners.
In short, re-inventing the wheel ought to be a rare event, occurring only for the most compelling reasons.
Using an existing wheel, or improving an existing one, is usually superior in a variety of ways. There isnothing dishonorable about stealing code* to make life easier and better.
Theft via the Editor
UNIX historically has flourished in environments in which full sources for the system are available. Thisled to the most obvious and crudest way of stealing code: copy the source of an existing program and edit itto do something new.
This approach does have its advantages. By its nature, it is the most flexible method of stealing code. Itmay be the only viable approach when what is desired is some variant of a complex algorithm that existsonly within an existing program; a good example was V7 dumpdir (which printed a table of contents of abackup tape), visibly a modified copy of V7 restor (the only other program that understood the obscure for-mat of backup tapes). And it certainly is easy.
On the other hand, this approach also has its problems. It creates two subtly-different copies of the samecode, which have to be maintained separately. Worse, they often have to be maintained ‘‘separately butsimultaneously’’, because the new program inherits all the mistakes of the original. Fixing the same bugrepeatedly is so mind-deadening that there is great temptation to fix it in only the program that is actuallygiving trouble. which means that when the other gives trouble, re-doing the cure must be preceded by re-doing the investigation and diagnosis. Still worse, such non-simultaneous bug fixes cause the variants ofthe code to diverge steadily. This is also true of improvements and cleanup work.
A program created in this way may also be inferior, in some ways, to one created from scratch. Often therewill be vestigial code left over from the program’s evolutionary ancestors. Apart from consumingresources (and possibly harboring bugs) without a useful purpose, such vestigial code greatly complicatesunderstanding the new program in isolation.
There is also the possibility that the new program has inherited a poor algorithm from the old one. This isactually a universal problem with stealing code, but it is especially troublesome with this technique becausethe original program probably was not built with such re-use in mind. Even if its algorithms were good forits intended purpose, they may not be versatile enough to do a good job in their new role.
One relatively clean form of theft via editing is to alter the original program’s source to generate eitherdesired program by conditional compilation. This eliminates most of the problems. Unfortunately, it doesso only if the two programs are sufficiently similar that they can share most of the source. When theydiverge significantly, the result can be a maintenance nightmare, actually worse than two separate sources.
Given a close similarity, though, this method can work well.
Theft via Libraries
The obvious way of using somebody else’s code is to call a library function. Here, UNIX has had somesuccess stories. Almost everybody uses the stdio library rather than inventing their own buffered-I/O pack-age. (That may sound trivial to those who never programmed on a V6 or earlier UNIX, but in fact it’s agreat improvement on the earlier state of affairs.) The simpler sorts of string manipulations are usuallydone with the strxxx functions rather than by hand-coding them, although efficiency issues and the widediversity of requirements have limited these functions to less complete success. Nobody who knows aboutqsort bothers to write his own sorting function.
 ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁  * Assuming no software licences, copyrights, patents, etc. are violated! However, these success stories are pleasant islands in an ocean of mud. The fact is that UNIX’s librariesare a disgrace. They are well enough implemented, and their design flaws are seldom more than nuisances,but there aren’t enough of them! Ironically, UNIX’s ‘‘poor cousin’’, the Software Tools community [3,4],has done much better at this. Faced with a wild diversity of different operating systems, they were forcedto put much more emphasis on identifying clean abstractions for system services.
For example, the Software Tools version of ls runs unchanged, without conditional compilation, on dozensof different operating systems [4]. By contrast, UNIX programs that read directories invariably dealt withthe raw system data structures, until Berkeley turned this cozy little world upside-down with a change tothose data structures. The Berkeley implementors were wise enough to provide a library for directoryaccess, rather than just documenting the new underlying structure. However, true to the UNIX pattern, theydesigned a library which quietly assumed (in some of its naming conventions) that the underlying systemused their structures! This particular nettle has finally been grasped firmly by the IEEE POSIX project [5],at the cost of yet another slightly-incompatible interface.
The adoption of the new directory libraries is not just a matter of convenience and portability: in generalthe libraries are faster than the hand-cooked code they replace. Nevertheless, Berkeley’s originalannouncement of the change was greeted with a storm of outraged protest.
Directories, alas, are not an isolated example. The UNIX/C community simply hasn’t made much of aneffort to identify common code and package it for re-use. One of the two major variants of UNIX still lacksa library function for binary search, an algorithm which is notorious for both the performance boost it canproduce and the difficulty of coding a fully-correct version from scratch. No major variant of UNIX has alibrary function for either one of the following code fragments, both omnipresent (or at least, they shouldbe omnipresent [6]) in simple* programs that use the relevant facilities: print error message with filename, mode, and specificreason for failure, and then exit These may sound utterly trivial, but in fact programmers almost never produce as good an error messagefor fopen as ten lines of library code can, and half the time the return value from malloc isn’t checked atall! These examples illustrate a general principle, a side benefit of stealing code: the way to encourage stan-dardization† and quality is to make it easier to be careful and standard than to be sloppy and non-standard.
On systems with library functions for error-checked fopen and malloc, it is easier to use the systemfunctions—which take some care to do ‘‘the right thing’’—than to kludge it yourself. This makes convertsvery quickly.
These are not isolated examples. Studying the libraries of most any UNIX system will yield other ideas foruseful library functions (as well as a lot of silly nonsense that UNIX doesn’t need, usually!). A few years ofUNIX systems programming also leads to recognition of repeated needs. Does your* UNIX have libraryfunctions to: decide whether a filename is well-formed (contains no control characters, shell metacharacters, orwhite space, and is within any name-length limits your system sets)? ✁✂✁✂✁✂✁✂✁✂✁✂✁✂✁✂✁✂✁✂✁✂✁✂✁✂✁✂✁✂✁✂✁✂✁ * I include the qualification ‘‘simple’’ because complex programs often want to do more intelligent error recovery thanthese code fragments suggest. However, most of the programs that use these functions don’t need fancy error recovery, andthe error responses indicated are better than the ones those programs usually have now!† Speaking of encouraging standardization: we use the names efopen and emalloc for the checked versions of fopen andmalloc, and arguments and returned values are the same as the unchecked versions except that the returned value isguaranteed non-NULL if the function returns at all.
* As you might guess, my system has all of these. Most of them are trivial to write, or are available in public-domainforms.
close all file descriptors except the standard ones? compute a standard CRC (Cyclic Redundancy Check ‘‘checksum’’)? operate on malloced unlimited-length strings? do what access(2) does but using the effective userid? expand metacharacters in a filename the same way the shell does? (the simplest way to make surethat the two agree is to use popen and echo for anything complicated) convert integer baud rates to and from the speed codes used by your system’s serial-line ioctls? convert integer file modes to and from the rwx strings used† to present such modes to humans? do a binary search through a file the way look(1) does? The above are fairly trivial examples of the sort of things that ought to be in UNIX libraries. More sophisti-cated libraries can also be useful, especially if the language provides better support for them than C does;C++ is an example [7]. Even in C, though, there is much room for improvement.
Adding library functions does have its disadvantages. The interface to a library function is important, andgetting it right is hard. Worse, once users have started using one version of an interface, changing it is verydifficult even when hindsight clearly shows mistakes; the near-useless return values of some of the com-mon UNIX library functions are obvious examples. Satisfactory handling of error conditions can bedifficult. (For example, the error-checking malloc mentioned earlier is very handy for programmers, butinvoking it from a library function would be a serious mistake, removing any possibility of more intelligentresponse to that error.) And there is the perennial headache of trying to get others to adopt your pet func-tion, so that programs using it can be portable without having to drag the source of the function around too.
For all this, though, libraries are in many ways the most satisfactory way of encouraging code theft.
Alas, encouraging code theft does not guarantee it. Even widely-available library functions often are notused nearly as much as they should be. A conspicuous example is getopt, for command-line argumentparsing. Getopt supplies only quite modest help in parsing the command line, but the standardization andconsistency that its use produces is still quite valuable; there are far too many pointless variations in com-mand syntax in the hand-cooked argument parsers in most UNIX programs. Public-domain implementa-tions of getopt have been available for years, and AT&T has published (!) the source for the System Vimplementation. Yet people continue to write their own argument parsers. There is one valid reason forthis, to be discussed in the next section. There are also a number of excuses, mostly the standard ones fornot using library functions: ‘‘It doesn’t do quite what I want.’’ But often it is close enough to serve, and the combined benefitsof code theft and standardization outweigh the minor mismatches. ‘‘Calling a library function is too inefficient.’’ This is mostly heard from people who have neverprofiled their programs and hence have no reliable information about what their code’s efficiencyproblems are [2]. ‘‘I didn’t know about it.’’ Competent programmers know the contents of their toolboxes. ‘‘That whole concept is ugly, and should be redesigned.’’ (Often said of getopt, since the usualUNIX single-letter-option syntax that getopt implements is widely criticized as user-hostile.) Howlikely is it that the rest of the world will go along with your redesign (assuming you ever finish it)?Consistency and a high-quality implementation are valuable even if the standard being imple-mented is suboptimal. ‘‘I would have done it differently.’’ The triumph of personal taste over professional program-ming.  ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁  † If you think only ls uses these, consider that rm and some similar programs ought to use rwx strings, not octal modes,when requesting confirmation! Theft via Templates
Templates are a major and much-neglected approach to code sharing: ‘‘boilerplate’’ programs which con-tain a carefully-written skeleton for some moderately stereotyped task, which can then be adapted andfilled in as needed. This method has some of the vices of modifying existing programs, but the templatecan be designed for the purpose, with attention to quality and versatility.
Templates can be particularly useful when library functions are used in a stereotyped way that is a littlecomplicated to write from scratch; getopt is an excellent example. The one really valid objection to getoptis that its invocation is not trivial, and typing in the correct sequence from scratch is a real test of memory.
The usual getopt manual page contains a lengthy example which is essentially a template for a getopt-usingprogram.
When the first public-domain getopt appeared, it quickly became clear that it would be convenient to havea template for its use handy. This template eventually grew to incorporate a number of other things: a use-ful macro or two, definition of main, opening of files in the standard UNIX filter fashion, checking for mis-takes like opening a directory, filename and line-number tracking for error messages, and some odds andends. The full current version can be found in the Appendix; actually it diverged into two distinct versionswhen it became clear that some filters wanted the illusion of a single input stream, while others wanted tohandle each input file individually (or didn’t care).
The obvious objection to this line of development is ‘‘it’s more complicated than I need’’. In fact, it turnsout to be surprisingly convenient to have all this machinery presupplied. It is much easier to alter or deletelines of code than to add them. If directories are legitimate input, just delete the code that catches them. Ifno filenames are allowed as input, or exactly one must be present, change one line of code to enforce therestriction and a few more to deal with the arguments correctly. If the arguments are not filenames at all,just delete the bits of code that assume they are. And so forth.
The job of writing an ordinary filter-like program is reduced to filling in two or three blanks* in the tem-plate, and then writing the code that actually processes the data. Even quick improvisations become good-quality programs, doing things the standard way with all the proper amenities, because even a quick impro-visation is easier to do by starting from the template. Templates are an unmixed blessing; anyone whotypes a non-trivial program in from scratch is wasting his time and his employer’s money. Templates are also useful for other stereotyped files, even ones that are not usually thought of as programs.
Most versions of UNIX have a simple template for manual pages hiding somewhere (in V7 it was/usr/man/man0/xx). Shell files that want to analyze complex argument lists have the same getopt problemas C programs, with the same solution. There is enough machinery in a ‘‘production-grade’’ make file tomake a template worthwhile, although this one tends to get altered fairly heavily; our current one is in theAppendix.
Theft via Inclusion
Source inclusion (#include) provides a way of sharing both data structures and executable code. Header
files (e.g. stdio.h) in particular tend to be taken for granted. Again, those who haven’t been around long
enough to remember V6 UNIX may have trouble grasping what a revolution it was when V7 introduced
systematic use of header files!
However, even mundane header files could be rather more useful than they normally are now. Data struc-tures in header files are widely accepted, but there is somewhat less use of them to declare the return typesof functions. One or two common header files like stdio.h and math.h do this, but programmers are stillused to the idea that the type of (e.g.) atol has to be typed in by hand. Actually, all too often the program-mer says ‘‘oh well, on my machine it works out all right if I don’t bother declaring atol’’, and the result isdirty and unportable code. The X3J11 draft ANSI standard for C addresses this by defining some moreheader files and requiring their use for portable programs, so that the header files can do all the work anddo it right.
 ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁ ✁  * All marked with the string ‘xxx’ to make them easy for a text editor to find.
In principle, source inclusion can be used for more than just header files. In practice, almost anything thatcan be done with source inclusion can be done, and usually done more cleanly, with header files andlibraries. There are occasional specialized exceptions, such as using macro definitions and source inclusionto fake parameterized data types.
Theft via Invocation
Finally, it is often possible to steal another program’s code simply by invoking that program. Invokingother programs via system or popen for things that are easily done in C is a common beginner’s error.
More experienced programmers can go too far the other way, however, insisting on doing everything in C,even when a leavening of other methods would give better results. The best way to sort a large file is prob-ably to invoke sort(1), not to do it yourself. Even invoking a shell file can be useful, although a bit odd-seeming to most C programmers, when elaborate file manipulation is needed and efficiency is not critical.
Aside from invoking other programs at run time, it can also be useful to invoke them at compile time. Par-ticularly when dealing with large tables, it is often better to dynamically generate the C code from somemore compact and readable notation. Yacc and lex are familiar examples of this on a large scale, but sim-ple sed and awk programs can build tables in more specialized, application-specific ways. Whether this isreally theft is debatable, but it’s a valuable technique all the same. It can neatly bypass a lot of objectionsthat start with ‘‘but C won’t let me write.’’.
An Excess of Invention
With all these varied methods, why is code theft not more widespread? Why are so many programsunnecessarily invented from scratch? The most obvious answer is the hardest to counter: theft requires that there be something to steal. Use oflibrary functions is impossible unless somebody sets up a library. Designing the interfaces for library func-tions is not easy. Worse, doing it well requires insight, which generally isn’t available on demand. Thesame is true, to varying degrees, for the other forms of theft.
Despite its reputation as a hotbed of software re-use, UNIX is actually hostile to some of these activities. IfUNIX directories had been complex and obscure, directory-reading libraries would have been present fromthe beginning. As it is, it was simply too easy to do things ‘‘the hard way’’. There still is no portable set offunctions to perform the dozen or so useful manipulations of terminal modes that a user program mightwant to do, a major nuisance because changing those modes ‘‘in the raw’’ is simple but highly unportable.
Finally, there is the Not Invented Here syndrome, and its relatives, Not Good Enough and Not UnderstoodHere. How else to explain AT&T UNIX’s persistent lack of the dbm library for hashed databases (eventhough it was developed at Bell Labs and hence is available to AT&T), and Berkeley UNIX’s persistentlack of the full set of strxxx functions (even though a public-domain implementation has existed for years)?The X3J11 and POSIX efforts are making some progress at developing a common nucleus of functionality,but they are aiming at a common subset of current systems, when what is really wanted is a common super-set.
Conclusion
In short, never build what you can (legally) steal! Done right, it yields better programs for less work.
References
[1] Brian W. Kernighan, The Unix System and Software Reusability, IEEE Transactions on Software Engineering, Vol SE-10, No. 5, Sept. 1984, pp. 513-8.
[2] Geoff Collyer and Henry Spencer, News Need Not Be Slow, Usenix Winter 1987 Technical Confer- [3] Brian W. Kernighan and P.J. Plauger, Software Tools, Addison-Wesley, Reading, Mass. 1976.
[4] Mike O’Dell, UNIX: The World View, Usenix Winter 1987 Technical Conference, pp. 35-45.
[5] IEEE, IEEE Trial-Use Standard 1003.1 (April 1986): Portable Operating System for Computer Environments, IEEE and Wiley-Interscience, New York, 1986.
[6] Ian Darwin and Geoff Collyer, Can’t Happen or /* NOTREACHED */ or Real Programs Dump Core, Usenix Winter 1985 Technical Conference, pp. 136-151.
[7] Bjarne Stroustrup, The C++ Programming Language, Addison-Wesley, Reading, Mass. 1986.
Appendix
Warning: these templates have been in use for varying lengths of time, and are not necessarily all entirelybug-free.
C program, single stream of input
#include <stdio.h>#include <sys/types.h>#include <sys/stat.h>#include <string.h> /* For sizing strings -- DON’T use BUFSIZ! */ (*(a) == *(b) && strcmp((a), (b)) == 0) #ifndef lintstatic char RCSid[] = "$Header$";#endif char *nullargv[] = { "-", NULL }; extern void error(), exit();#ifdef UTZOOERRextern char *mkprogname();#else#define - main - parse arguments and handle options*/ int c;int errflg = 0;extern int optind;extern char *optarg;void process(); while ((c = getopt(argc, argv, "xxxd")) != EOF) switch (c) {case ’xxx’: /* xxx meaning of option */ fprintf(stderr, "usage: %s ", progname);fprintf(stderr, "xxx [file] .\n");exit(2); - getline - get next line (internal version of fgets)*/ char *getline(ptr, size)char *ptr;int size;{ register char *namep;struct stat statbuf;extern FILE *efopen(); in = efopen(namep, "r");if (fstat(fileno(in), &statbuf) < 0) error("can’t fstat ‘%s’", namep); if ((statbuf.st_mode & S_IFMT) == S_IFDIR) error("‘%s’ is directory!", namep); fprintf(stderr, "%s: (file ‘%s’, line %ld) ", progname, inname, lineno);fprintf(stderr, s1, s2);fprintf(stderr, "\n");exit(1); while (getline(line, (int)sizeof(line)) != NULL) { C program, separate input files
#include <stdio.h>#include <sys/types.h>#include <sys/stat.h>#include <string.h> /* For sizing strings -- DON’T use BUFSIZ! */ (*(a) == *(b) && strcmp((a), (b)) == 0) #ifndef lintstatic char RCSid[] = "$Header$";#endif extern void error(), exit();#ifdef UTZOOERRextern char *mkprogname();#else#define - main - parse arguments and handle options*/ int c;int errflg = 0;FILE *in;struct stat statbuf;extern int optind;extern char *optarg;extern FILE *efopen();void process(); while ((c = getopt(argc, argv, "xxxd")) != EOF) switch (c) {case ’xxx’: /* xxx meaning of option */ fprintf(stderr, "usage: %s ", progname);fprintf(stderr, "xxx [file] .\n");exit(2); in = efopen(argv[optind], "r");if (fstat(fileno(in), &statbuf) < 0) error("can’t fstat ‘%s’", argv[optind]); if ((statbuf.st_mode & S_IFMT) == S_IFDIR) error("‘%s’ is directory!", argv[optind]); process(in, argv[optind]);(void) fclose(in); voidprocess(in, name)FILE *in;char *name;{ while (fgets(line, sizeof(line), in) != NULL) { fprintf(stderr, "%s: (file ‘%s’, line %ld) ", progname, inname, lineno);fprintf(stderr, s1, s2);fprintf(stderr, "\n");exit(1); Make file
# Things you might want to put in ENV and LENV:# -Dvoid=int # -DCHARBITS=0377 compiler lacks unsigned char# -DSTATIC=extern compiler dislikes "static foo();" as forward decl.
machines with few registers for register variables have utzoo-compatible error() function and friends ENV = -DSTATIC=extern -DREGISTER= -DUTZOOERRLENV = -Dvoid=int -DCHARBITS=0377 -DREGISTER= -DUTZOOERR # Things you might want to put in TEST:# -DDEBUG # Things you might want to put in PROF:# -Dstatic=’/* */’ make everything global so profiler can see it.
# -p CFLAGS = -O $(ENV) $(TEST) $(PROF)LINTFLAGS = $(LENV) $(TEST) -haLDFLAGS = -i OBJ = xxxLSRC = xxxDTR = README dMakefile tests tests.good xxx.c xxx <tests >tests.newdiff -h tests.new tests.good && rm tests.new # Prepare good output for regression test -- name isn’t "tests.good"# because human judgement is needed to decide when output is good.
good: xxx tests sed ’/ˆL*ENV=/s/ *-DUTZOOERR//’ Makefile >dMakefile rm -f *.o lint tests.new dMakefile dtr core mon.out xxx

Source: http://siri.lmao.sk/fiit/PSI/PSI_naskusku/_marvin_stuff_/tmp/Rozsirujuce/www/Implementacia%20-%20standardy%20a%20ine/spencer88how.pdf

G:\releases\2003\sales & results\q1\fy02.prn.pdf

Investor Relations Novartis International AG CH-4002 Basel Switzerland Karen J. Huebscher, Ph.D. Tel + 41 61 324 84 33 Nafida Bendali Tel + 41 61 324 35 14 Katharina Furrer Tel + 41 61 324 53 16 Sabine Moravi Bottoli Tel + 41 61 324 89 89 Silke Zentner Tel +41 61 324 86 12 Fax +41 61 324 84 44Internet Address:http://www.novartis.com - Investor Relations Release - Novartis meets full-ye

Microsoft word - psr handout - 01-15-2010.doc

Table of Contents Policy Number and Name 2010 - Maintenance of EMS Personnel Lists:.4 2540 - Paramedic Accreditation:.4 2540B - Skills Verification Form:.6 2541 – Paramedic Infrequently Used Skills:.6 2545 - Endotracheal Intubation – Adult Performance Criteria: .6 2546 – Intraosseous Cannulation Performance Criteria:.7 2547 - Transcutaneous Pacing (TCP) Performance Criteria:.8 254

Copyright ©2018 Sedative Dosing Pdf