Solved

Is BeOS a Unix clone?

Posted on 2000-03-30
4
283 Views
Last Modified: 2013-12-06

 
0
Comment
Question by:lxtsy
  • 2
  • 2
4 Comments
 
LVL 14

Accepted Solution

by:
chris_calabrese earned 15 total points
ID: 2670243
From an OS standpoint, it is not a Unix clone (in that way that Linux is).  On the other hand, the concepts embodied in Unix and the Unix API's have become so ingrained into the OS and programming community, that it is hard to imagine any OS today that doesn't look a whole lot like Unix in many ways.
0
 

Author Comment

by:lxtsy
ID: 2671502
where can I find the Unix,Linux API's reference ONLINE?

0
 

Author Comment

by:lxtsy
ID: 2671506
Are there C++ API in Unix,Linux
0
 
LVL 14

Expert Comment

by:chris_calabrese
ID: 2673580
I'm going to have to answer this in several parts....
1.  The right to use the "Unix" trademark implies that the system meets the Unix98 specification maintained by the Open Group (www.opengroup.org).  The complete specification is available from http://www.opengroup.org/online-pubs?DOC=007908799
2.  The Unix98 specification is largely based on the IEEE POSIX standard for operating systems.  I don't think this is freely available on line, but you can check the IEEE web site (www.ieee.org).
3.  Many suppliers of Unix and Unix-like operating systems also provide their own documentation sites.  Some examples are docs.hp.com, www.freebsd.org, docs.sun.com, uw7doc.sco.com,  and www.linuxdoc.org.
4.  For the most part, these documents all address a C based API, and are not specific to C++.  However, note that a) any C API can be called from C++ and b) the standard C++ libraries for IO, memory management, process management, etc. are already heavily Unix-centric (as Bjarne was from the Unix group at Bell Labs).
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
change HISTFILE for root user on AIX 3 70
how to check for shares on aix 1 66
Unix Question 19 44
Image not there 4 44
Attention: This article will no longer be maintained. If you have any questions, please feel free to mail me. jgh@FreeBSD.org Please see http://www.freebsd.org/doc/en_US.ISO8859-1/articles/freebsd-update-server/ for the updated article. It is avail…
Java performance on Solaris - Managing CPUs There are various resource controls in operating system which directly/indirectly influence the performance of application. one of the most important resource controls is "CPU".   In a multithreaded…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

912 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now