In computing , the Inter-Client Communication Conventions Manual ( ICCCM or I39L short for "I", 39 letters and "L") is a standard protocol for the X Window System . It specifies conventions for clients of a common X server about selections and cut buffers , communication with the window manager and session manager , manipulation of shared resources, and color characterization.
20-739: It was designed by David S. H. Rosenthal of the MIT X Consortium from 1987 to 1989. A draft version appeared in March 1988 in X11R2 . This was removed from X11R3 . Version 1.0 was released in July 1989 as part of X11R4 . Three window managers in the X11R4 contrib directory implemented support for ICCCM: gwm , olwm and tekwm . Version 1.1 contains an update for color characterization and appeared in X11R5 . Version 2.0 has many changes in
40-445: A computer scientist is a stub . You can help Misplaced Pages by expanding it . LOCKSS The LOCKSS ("Lots of Copies Keep Stuff Safe") project, under the auspices of Stanford University , is a peer-to-peer network that develops and supports an open source system allowing libraries to collect, preserve and provide their readers with access to material published on the Web. Its main goal
60-739: A book on it. He developed the Inter-Client Communication Conventions Manual (ICCCM) for the X Window System in 1988, and was issued a patent on a security system for X. In 1993 he became employee #4 and chief scientist at Nvidia , and then joined Vitria Technology in 1996. In 1999 he rejoined Sun and was a distinguished engineer. He became chief scientist for the LOCKSS project, first at Sun and then since 2002 at Stanford University . His research concerned computer data storage long-term protection techniques. He holds 23 patents. This biographical article relating to
80-554: A consistent way" and formulates additional guidelines in a clipboards-spec Archived 2021-02-17 at the Wayback Machine . David S. H. Rosenthal David Stuart Holmes Rosenthal (born 1948 in Cambridge , United Kingdom ) is a British -American computer scientist . Rosenthal is the son of Michael David Holmes Rosenthal and Marjorie Mary "Molly" Rosenthal (both deceased). His brother Mark Geoffrey Thomas Rosenthal ran to be
100-404: A library's readers access to its own copy, but does not allow similar access to other libraries or unaffiliated readers; the system does not support file sharing . On request, a library may supply another library with content to effect a repair, but only if the requesting library proved that in the past that it had a good copy by voting with the majority. If the reader's browser no longer supports
120-571: A member of the UK Parliament for Ynys Mรดn in 2015. Rosenthal received an MA degree from Trinity College, Cambridge , England , and a PhD from Imperial College, London . In the 1980s he worked on the Andrew Project at Carnegie Mellon University with James Gosling . In 1985 he joined Sun Microsystems , and developed the NeWS Network extensible Window System with Gosling and co-authored
140-459: A somewhat tamper-resistant medium under many independent administrations meant that attempts to alter or remove all copies of a published work would likely both fail and be detected. Web publishing, based on a single copy under a single administration, provides none of these safeguards against subversion. Web publishing is, therefore, an amenable tool for rewriting history. By preserving many copies under diverse administration, by automatically auditing
160-418: A tax-exempt, 501(c)(3) , not-for-profit organization, governed by a Board of Directors made up of librarians and publishers." CLOCKSS runs on LOCKSS technology. Traditionally, academic libraries have retained issues of scholarly journals, either individually or collaboratively, providing their readers access to the content received even after the publisher has ceased or the subscription has been canceled. In
180-740: Is digital preservation . The system attempts to replicate the way libraries do this for material published on paper. It was originally designed for scholarly journals, but is now also used for a range of other materials. Examples include the SOLINET project to preserve theses and dissertations at eight universities, US government documents, and the MetaArchive Cooperative program preserving at-risk digital archival collections, including Electronic Theses and Dissertations (ETDs), newspapers, photograph collections, and audio-visual collections. A similar project called CLOCKSS (Controlled LOCKSS) "is
200-591: Is a more recent standard, which, according to its introduction: "builds on the ICCCM, which defines window manager interactions at a lower level. The ICCCM does not provide ways to implement many features that modern desktop users expect." But it also states: "Clients which aim to fulfill this specification MUST adhere to the ICCCM on which this specification builds." insofar the EWMH doesn't overrule. Freedesktop.org notes that "historically, X clients have not handled cut-and-paste in
220-450: Is format-agnostic, collecting whatever formats the publisher delivers via HTTP . Libraries which have collected the same material cooperate in a peer-to-peer network to ensure its preservation. Peers in the network vote on cryptographic hash functions of preserved content and a nonce ; a peer that is outvoted regards its copy as damaged and repairs it from the publisher or other peers. The LOCKSS license used by most publishers allows
SECTION 10
#1732855517464240-439: Is no longer available. The LOCKSS system allows a library, with permission from the publisher, to collect, preserve and disseminate to its patrons a copy of the materials to which it has subscribed as well as open access material (perhaps published under a Creative Commons license). Each library's system collects a copy using a specialized web crawler that verifies that the publisher has granted suitable permission. The system
260-408: Is this system evaluated?", and "What is your disaster preparedness program?". These questions will enable the user to evaluate the system, create a successful maintenance plan for their materials, and enable the system to be reinforced by a carefully evaluated support structure. The source code for the entire LOCKSS system carries BSD-style open-source licenses and is available from GitHub . LOCKSS
280-547: The Internet Archive 's approach of omnivorous collection without permission from the publisher, centralized storage, and unrestricted dissemination. The LOCKSS system is far smaller, but it can preserve subscription materials to which the Internet Archive has no access. Since each library administers its own LOCKSS peer and maintains its own copy of preserved material, and since there are libraries doing so worldwide (see
300-465: The ICCCM itself, as this functionality is delegated to the implementing toolkit. The ICCCM has received some criticism for being ambiguous and difficult to implement correctly. This was acknowledged in the preface of version 2.0, stating that it aimed "to fix problems with earlier drafts, and to improve readability and understandability". Furthermore, some parts may be obsolete or no longer practical to implement. The Extended Window Manager Hints (EWMH)
320-696: The areas of window management, selections , session management , and resource sharing. It was released in May 1994 as part of X11R6 . X deliberately specifies "mechanism, not policy" for how windows interact. As such, an additional specification beyond the X protocol itself was needed for client interoperation. The ICCCM specifies cut and paste buffers, window manager interaction, session management, how to manipulate shared resources and how to manage device colours. These low-level functions are generally implemented within widget toolkits or desktop environments . This isolates application programmers from working directly with
340-567: The copies at intervals against each other (and, in the future, against the publisher's copy), and by alerting libraries when changes are detected, the LOCKSS system attempts to restore many of these safeguards in the now digital world of publication. Prior to implementing a LOCKSS system, some questions need to be considered carefully in order to make sure the content is verified, evaluated, and auditable by users. The user must ask questions such as, "What are your procedures?", "What are your methods?", "How
360-459: The digital age, libraries often subscribe to journals that are only available digitally over the Internet . Although convenient for patron access, the model for digital subscriptions does not allow the libraries to retain a copy of the journal. If the publisher ceases to publish, or the library cancels the subscription, or if the publisher's website is down for the day, the content that has been paid for
380-441: The format in which the copy was collected, a format migration process can convert it to a current format. These limits on the use that may be made of preserved copies of copyright material have been effective in persuading copyright owners to grant the necessary permission. The LOCKSS approach of selective collection with permission from the publisher, distributed storage, and restricted dissemination contrasts with, for example,
400-552: The list of participating libraries below ), the system provides a much higher degree of replication than is usual in a fault-tolerant system . The voting process makes use of this high degree of replication to eliminate the need for backups to off-line media, and to provide robust defenses against attacks aimed at corrupting preserved content. In addition to preserving access, libraries have traditionally made it difficult to rewrite or suppress printed material. The existence of an indeterminate but large number of identical copies on
#463536