Tech Insider					     Technology and Trends

			      USENET Archives

Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Posting-Version: version B 2.10 5/3/83; site utzoo.UUCP
Path: utzoo!henry
From: he...@utzoo.UUCP (Henry Spencer)
Newsgroups: net.sources
Subject: public-domain string(3) 
Message-ID: <3385@utzoo.UUCP>
Date: Tue, 29-Nov-83 20:09:53 EST
Article-I.D.: utzoo.3385
Posted: Tue Nov 29 20:09:53 1983
Date-Received: Tue, 29-Nov-83 20:09:53 EST
Organization: U of Toronto Zoology
Lines: 1063

The following (long) article is the source for a reimplementation of
the string(3) routines from System III.  This includes the V7 string
routines plus some useful extras.  If these things have changed any
in System V, I will update mine as soon as I see a System V manual.

Although these routines were written from a System III manual page,
and are believed identical in behavior to the System III routines
(except for having the signed-char bug I posted a while ago fixed),
they are *not* Bell code, they are not derived from Bell code, and
they were not written by inspection of Bell code.  They are hereby
placed into the public domain.  They may be used for any purpose on
any system without anyone's permission.

The routines are accompanied by a manual page (a minor variant of
the Bell one) and the source for a test program that gives them a
fairly thorough workout.  It was this test program that found the
signed-char bug in the V7 routines.

				Henry Spencer @ U of Toronto Zoology

			        About USENET

USENET (Users’ Network) was a bulletin board shared among many computer
systems around the world. USENET was a logical network, sitting on top
of several physical networks, among them UUCP, BLICN, BERKNET, X.25, and
the ARPANET. Sites on USENET included many universities, private companies
and research organizations. See USENET Archives.

		       SCO Files Lawsuit Against IBM

March 7, 2003 - The SCO Group filed legal action against IBM in the State 
Court of Utah for trade secrets misappropriation, tortious interference, 
unfair competition and breach of contract. The complaint alleges that IBM 
made concentrated efforts to improperly destroy the economic value of 
UNIX, particularly UNIX on Intel, to benefit IBM's Linux services 
business. See SCO v IBM.

The materials and information included in this website may only be used
for purposes such as criticism, review, private study, scholarship, or

Electronic mail:			       WorldWideWeb: