Grid Application Systems Design 1st Edition April J. Wells
Grid Application Systems Design 1st Edition April J. Wells
Grid Application Systems Design 1st Edition April J. Wells
Grid Application Systems Design 1st Edition April J. Wells
1. Grid Application Systems Design 1st Edition
April J. Wells download
https://ebookname.com/product/grid-application-systems-
design-1st-edition-april-j-wells/
Get Instant Ebook Downloads – Browse at https://ebookname.com
2. Instant digital products (PDF, ePub, MOBI) available
Download now and explore formats that suit you...
Grid Database Design 1st Edition April J. Wells
https://ebookname.com/product/grid-database-design-1st-edition-
april-j-wells/
Design of smart power grid renewable energy systems 1st
Edition Keyhani
https://ebookname.com/product/design-of-smart-power-grid-
renewable-energy-systems-1st-edition-keyhani/
Measurement systems application and design 5th Edition
Ernest O. Doebelin
https://ebookname.com/product/measurement-systems-application-
and-design-5th-edition-ernest-o-doebelin/
The Battle of Britain Pocket Manual 1940 1st Edition
Chris Mcnab
https://ebookname.com/product/the-battle-of-britain-pocket-
manual-1940-1st-edition-chris-mcnab/
3. Pulmonary Drug Delivery Advances and Challenges 1st
Edition Ali Nokhodchi
https://ebookname.com/product/pulmonary-drug-delivery-advances-
and-challenges-1st-edition-ali-nokhodchi/
The Male Dancer 2nd Edition R. Burt
https://ebookname.com/product/the-male-dancer-2nd-edition-r-burt/
Citizen Relationship Management A Study of CRM in
Government 1st Edition Alexander Schellong
https://ebookname.com/product/citizen-relationship-management-a-
study-of-crm-in-government-1st-edition-alexander-schellong/
Portugal DK Eyewitness Travel Guide Dk Travel.
https://ebookname.com/product/portugal-dk-eyewitness-travel-
guide-dk-travel/
What Went Wrong at Enron Everyone s Guide to the
Largest Bankruptcy in U S History 1st edition Edition
Fusaro P.C.
https://ebookname.com/product/what-went-wrong-at-enron-everyone-
s-guide-to-the-largest-bankruptcy-in-u-s-history-1st-edition-
edition-fusaro-p-c/
4. Leadership Theory and the Community College Applying
Theory to Practice 1st Edition Carlos Nevarez
https://ebookname.com/product/leadership-theory-and-the-
community-college-applying-theory-to-practice-1st-edition-carlos-
nevarez/
7. AUERBACH PUBLICATIONS
www.auerbach-publications.com
To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401
E-mail: orders@crcpress.com
Agent-Based Manufacturing and Control
Systems: New Agile Manufacturing
Solutions for Achieving Peak Performance
Massimo Paolucci and Roberto Sacile
ISBN: 1574443364
Curing the Patch Management Headache
Felicia M. Nicastro
ISBN: 0849328543
Cyber Crime Investigator's Field Guide,
Second Edition
Bruce Middleton
ISBN: 0849327687
Disassembly Modeling for Assembly,
Maintenance, Reuse and Recycling
A. J. D. Lambert and Surendra M. Gupta
ISBN: 1574443348
The Ethical Hack: A Framework for
Business Value Penetration Testing
James S. Tiller
ISBN: 084931609X
Fundamentals of DSL Technology
Philip Golden, Herve Dedieu,
and Krista Jacobsen
ISBN: 0849319137
The HIPAA Program Reference Handbook
Ross Leo
ISBN: 0849322111
Implementing the IT Balanced Scorecard:
Aligning IT with Corporate Strategy
Jessica Keyes
ISBN: 0849326214
Information Security Fundamentals
Thomas R. Peltier, Justin Peltier,
and John A. Blackley
ISBN: 0849319579
Information Security Management
Handbook, Fifth Edition, Volume 2
Harold F. Tipton and Micki Krause
ISBN: 0849332109
Introduction to Management
of Reverse Logistics and Closed
Loop Supply Chain Processes
Donald F. Blumberg
ISBN: 1574443607
Maximizing ROI on Software Development
Vijay Sikka
ISBN: 0849323126
Mobile Computing Handbook
Imad Mahgoub and Mohammad Ilyas
ISBN: 0849319714
MPLS for Metropolitan
Area Networks
Nam-Kee Tan
ISBN: 084932212X
Multimedia Security Handbook
Borko Furht and Darko Kirovski
ISBN: 0849327733
Network Design: Management and
Technical Perspectives, Second Edition
Teresa C. Piliouras
ISBN: 0849316081
Network Security Technologies,
Second Edition
Kwok T. Fung
ISBN: 0849330270
Outsourcing Software Development
Offshore: Making It Work
Tandy Gold
ISBN: 0849319439
Quality Management Systems:
A Handbook for Product
Development Organizations
Vivek Nanda
ISBN: 1574443526
A Practical Guide to Security
Assessments
Sudhanshu Kairab
ISBN: 0849317061
The Real-Time Enterprise
Dimitris N. Chorafas
ISBN: 0849327776
Software Testing and Continuous
Quality Improvement,
Second Edition
William E. Lewis
ISBN: 0849325242
Supply Chain Architecture:
A Blueprint for Networking the Flow
of Material, Information, and Cash
William T. Walker
ISBN: 1574443577
The Windows Serial Port
Programming Handbook
Ying Bai
ISBN: 0849322138
OTHER AUERBACH PUBLICATIONS
8. Boca Raton New York
Auerbach Publications is an imprint of the
Taylor & Francis Group, an informa business
10. v
Contents
Preface .......................................................................................................xiii
Acknowledgments ...................................................................................xix
PART I: IN THE BEGINNING
1 History..................................................................................................3
Computing ..................................................................................................3
Methodology ...............................................................................................4
Paradigm .....................................................................................................4
Data Directed Programming...................................................................5
Procedural Programming........................................................................5
C ........................................................................................................7
C++ (C plus plus)................................................................................7
BASIC (Beginner’s All-Purpose Symbolic Instruction Code)..............8
COBOL..............................................................................................9
FORTRAN......................................................................................10
Perl ...................................................................................................10
Structured Programming ......................................................................11
Ada...................................................................................................12
Pascal................................................................................................12
Unstructured Programming..................................................................13
Imperative Programming ......................................................................15
ALGOL............................................................................................16
Modula 2..........................................................................................17
Modula 3..........................................................................................18
Oberon .............................................................................................19
Declarative Programming .....................................................................19
Functional Programming......................................................................20
Flow-Driven Programming ...................................................................20
11. vi N Contents
Event-Driven Programming ..................................................................20
Class-Based Programming ....................................................................21
Java...................................................................................................21
C# ....................................................................................................22
Prototype-Based Programming .............................................................23
Component-Oriented Programming.....................................................23
Object Linking and Embedding (OLE) ................................................25
Component Object Model (COM) .......................................................25
Concept-Oriented Programming...........................................................26
Programming Paradigms and Grid............................................................26
2 Definition and Components..........................................................29
Definition..................................................................................................29
Peer-to-Peer (P2P) Computing...................................................................31
Napster..................................................................................................31
Gnutella ................................................................................................32
Types .........................................................................................................33
Computational Grid..............................................................................33
Distributed Servers and Computation Sites ..................................... 34
Remote Instrumentation.................................................................. 34
Data Archives ...................................................................................35
Networks..........................................................................................36
Portal (User Interface) ......................................................................36
Security ............................................................................................37
Brokers .............................................................................................37
User Profiles......................................................................................38
Searching for Resources....................................................................38
Batch Job Submittal..........................................................................39
Credential Repository...................................................................... 40
Scheduler..........................................................................................41
Data Management............................................................................41
Data Grid............................................................................................. 42
Storage Mechanism Neutrality ........................................................ 42
Policy Neutrality...............................................................................43
Compatibility with Other Grid Infrastructures................................43
Storage Systems ................................................................................43
Access or Collaboration Grids.............................................................. 44
Large Format Displays..................................................................... 44
Presentation Environments.............................................................. 44
Interfaces to Grid Middleware......................................................... 44
Other Components...........................................................................45
Scavenging Grid....................................................................................45
12. Contents N vii
Grid Scope.................................................................................................47
Project Grid, Departmental Grid, or Cluster Grid ................................47
Enterprise Grid or Campus Grid...........................................................47
Global Grid...........................................................................................47
3 Early Adopters...................................................................................49
Computational and Experimental Scientists ..............................................49
Bioinformatics.......................................................................................50
Corporations..............................................................................................50
Academia...................................................................................................50
University of Houston, Texas, United States. ........................................50
University of Ulm, Germany.................................................................51
The White Rose University Consortium, United Kingdom...................51
Science.......................................................................................................52
Particle Physics......................................................................................52
Industry.....................................................................................................53
Gaming.................................................................................................53
Financial ...............................................................................................54
Wachovia..........................................................................................55
RBC Insurance.................................................................................55
Charles Schwab ................................................................................55
Life Sciences ..............................................................................................56
American Diabetes Association .............................................................56
North Carolina Genomics and Bioinformatics Consortium..................57
Spain’s Institute of Cancer Research......................................................58
Petroleum ..................................................................................................58
Royal Dutch Shell.................................................................................58
Utilities......................................................................................................58
Kansai Electric Power Co., Inc..............................................................58
Manufacturing...........................................................................................58
Ford Motor Company...........................................................................58
Saab Automobile ...................................................................................59
Motorola Semiconductor.......................................................................59
Project MegaGrid ..................................................................................... 60
Southern Partnership for Advanced Computational
Infrastructure (SPACI)...............................................................................61
Chicago Stock Exchange............................................................................62
Ohio Savings Bank ....................................................................................62
Governmental Agencies .............................................................................62
NASA....................................................................................................63
U.S. Department of Defense.................................................................63
13. viii N Contents
European Union................................................................................... 64
Flemish Government............................................................................ 64
Benefits......................................................................................................65
Virtualization........................................................................................65
PART II: THE PARTS AND PIECES
4 Security..............................................................................................71
Security......................................................................................................71
Authentication ......................................................................................71
Passwords and Personal Identification Numbers...............................72
Public Key Infrastructure and Digital Certificates............................73
Tokens..............................................................................................73
Biometrics.........................................................................................75
Geography........................................................................................76
Passwords .........................................................................................78
Private Key Cryptography.................................................................78
Block Ciphers .................................................................................. 80
Stream Ciphers ................................................................................ 80
Public Key Cryptography ................................................................ 80
Digital Signature ............................................................................. 84
Authorization....................................................................................88
Delegation of Authority....................................................................88
Accounting.......................................................................................89
Audit ................................................................................................89
Access Control..................................................................................89
Usage Control...................................................................................92
Cryptography........................................................................................92
Block Cipher.....................................................................................93
Stream Ciphers .................................................................................93
Data Integrity...................................................................................97
Capability Resource Management ..................................................100
Database Security................................................................................102
Inference.........................................................................................102
5 Hardware......................................................................................... 115
Computers............................................................................................... 115
Blade Servers.......................................................................................120
Storage.....................................................................................................121
I/O Subsystems........................................................................................123
Underlying Network................................................................................124
14. Contents N ix
Operating Systems...................................................................................124
Visualization Environments.....................................................................124
People ......................................................................................................125
6 Metadata..........................................................................................127
Defining Metadata...................................................................................127
Grid Metadata.....................................................................................131
Data Metadata ....................................................................................132
Physical Metadata...........................................................................133
Domain-Independent Metadata .....................................................133
Content-Dependent Metadata ........................................................133
Content-Independent Metadata......................................................134
Domain-Specific Metadata.............................................................134
Ontology.............................................................................................134
User Metadata ................................................................................134
Application Metadata .....................................................................134
External Metadata ...................................................................................135
Logical Metadata.....................................................................................135
User .........................................................................................................136
Data.........................................................................................................136
Resources.................................................................................................136
Metadata Services ....................................................................................136
Context ...............................................................................................136
Content...............................................................................................137
Structure .............................................................................................137
Defining Data Granularity..................................................................137
XML...............................................................................................137
Database.........................................................................................139
Access ......................................................................................................139
Metadata Formatting...............................................................................139
XML...................................................................................................140
What is XML?................................................................................140
Application.....................................................................................144
MCAT.....................................................................................................145
Conclusion...............................................................................................146
7 Drivers .............................................................................................147
Business ...................................................................................................149
Accelerated Time to Results ................................................................149
Operational Flexibility ........................................................................150
Leverage Existing Capital Investments................................................151
Better Resource Utilization .................................................................152
15. x N Contents
Enhanced Productivity........................................................................152
Better Collaboration............................................................................153
Scalability............................................................................................154
Return on Investment (ROI)...............................................................155
Reallocation of Resources....................................................................156
Total Cost of Ownership (TCO).........................................................157
Technology ..............................................................................................158
Infrastructure Optimization................................................................158
Increase Access to Data and Collaboration..........................................158
Resilient, Highly Available Infrastructure ...........................................159
Most Efficient Use of Resources ..........................................................159
Services-Oriented Approach................................................................161
Batch-Oriented Approach ...................................................................161
Object-Oriented Approach..................................................................162
Supply and Demand............................................................................162
Open Standards ..................................................................................162
Corporate IT Spending Budgets..........................................................163
Cost, Complexity, and Opportunity ...................................................163
Better, Stronger, Faster........................................................................164
Efficiency Initiatives............................................................................165
PART III: APPLICATIONS IN THE GRID
8 Virtualization..................................................................................169
Definition................................................................................................172
Why Virtualization Matters................................................................172
How to Virtualize ...............................................................................175
Problems .............................................................................................176
ABI/API Emulation........................................................................177
9 Strategy and Planning..................................................................183
Introduction ............................................................................................183
Design .....................................................................................................186
Inputs and Outputs .................................................................................186
Parallelism versus Fragmentation ........................................................187
Data-Based Parallelism...................................................................189
Processing ...........................................................................................190
Data Storage........................................................................................190
Signoff.................................................................................................191
Implementation...................................................................................191
Launching Solution..............................................................................192
16. Contents N xi
Technical Documentation ..............................................................194
User Documentation ......................................................................194
Evaluation and Maintenance...............................................................195
Services ...............................................................................................196
Analysis of a System.................................................................................197
Types of Systems .................................................................................198
Investigations ......................................................................................201
10 Programming .................................................................................205
Grid Programming ..................................................................................205
Parallel Programming..............................................................................205
Multi-Threaded Programming.................................................................212
Web Services............................................................................................213
SOAP..................................................................................................214
WSDL.................................................................................................214
WS-Inspection ....................................................................................215
11 Wrapping It Up.............................................................................. 217
Index.............................................................................................219
18. xiii
Preface
Computing and computer programming have come a long way since their begin-
nings. Many of us have seen complete transformations in the technology of com-
puting in our lifetimes. This author is relatively young when one looks at the history
of computing, and has seen punch cards, programs stored on cassette tapes, dumb
terminals, mainframes, PCs getting smaller and more powerful, and hand-held
devices. This author has seen numbered Basic on an Apple IIe, DOS Qbasic,
COBOL, highly structured and cryptic C, and Java.
Nearly all of us can remember the rise in popularity of the World Wide Web and
how the information superhighway first started to impact our lives. In the beginning,
it consisted of loosely connected text files with very few pictures and even fewer sound
and video files. In fact, this author can remember being frustrated when using a LYNX
browser to search for information for classes, finding graphics in the text, and thinking
that they were simply an intrusion. Graphics loaded slowly with the limited bandwidth
of the network and often added little or nothing to the content. Look at where we are
now. Streaming video, MP3s, games, and chat are daily parts of many millions of lives,
along with the convenience of our cellular phones. In preschool, our kids are learning to
mouse, type, and interact with mom, dad, and grandma through e-mail and chat. Places
where we can reach out and touch our fellow man, such as MySpace, are becoming the
new coffee shops and diners. The Web has become such a necessary part of many house-
holds and many lives in one way or another that we often take it for granted as much
as we do the television or the telephone. This is just another step on the road to utility
computing. It is so necessary to doing what we need to do (paying bills in bed, watching
movies in the backyard, reading the latest novels with our laptops on our laps) that we
miss it greatly when it becomes unavailable for some reason.
Internet cafés have become essential for many tourist locations and we often
look for the wireless Internet “Free WiFi” sign on the door before choosing a cof-
fee shop or restaurant (even McDonald’s and interstate rest areas have these signs).
Housing areas are offering free Internet access or at the very least intranet access,
and hotel chains have begun to have to offer free WiFi to attract clientele. In fact, the
19. xiv N Preface
only place I have seen where there is true escape from the convenience of technology
in keeping us connected is at the bottom of the Grand Canyon on a river raft trip.
We are standing now, looking over the precipice into yet another paradigm
shift, another breaking technology that promises to completely change how we
think about computing: Grid computing. It has been suggested that the Grid may
be even bigger than the Web; but when we look at the fact that much of the interac-
tion with the Grid will be through Web interfaces, this is easy to explain.
For most of us, the adventure is just beginning. For those of us who have done our
time programming for the mainframe and then for open systems and client–server sys-
tems, it is just another new model to learn; for others, it is a very big change. I, for one,
look forward to the adventure. I am strapping on my technological parachute and pre-
paring to free-dive off the edge and let the winds of change carry me where they may.
Goals of This Book
The main goal in writing this book, Grid Application Design, is to provide the reader
with information on the Grid, its beginning, its design, background, and compo-
nents, and to provide an idea of how these components will impact applications and
how those applications can be designed to best fit into this new computing model.
Many of the ideas and concepts are not new — far from it; many have been around
for decades. These ideas, however, will have to be addressed in the context of the
new model, with many different considerations included.
Many people already know about the Grid and the power that it can bring to a
computing environment. Many in business, however, are either just beginning to hear
rumblings or are afraid to take the first tentative steps. The best medicine for this uncer-
tainty is to understand the new concepts and to start to see the ways that these new
concepts can potentially impact their institutions and their ways of computing in the
near future.
Audience
The audience for this book consists of people who are starting to look (or who have
been looking) at Grid computing as an option, or those who just want to learn more
about the emerging technology. When I first started reading about the emerging tech-
nology, I shared what I was learning with people with whom I worked. While the future
I described was far more quickly emerging and grandiose than reality could hope to keep
up with, what I thought would come is slowly coming to pass.
I believe that the ultimate audience for this kind of information is even bigger than
I originally thought, however. The audience should include database administrators,
security administrators, systems analysts, systems administrators, programmers, and
executives — in fact, anyone who is hearing the rumblings and wants to know more
is destined to be in the audience of this book and the emerging technology.
20. Preface N xv
The background in Part I is designed as just that — background. A lot of it is simply
interesting reading. A lot of it is informational for people who are new to computing
— the groundwork if you will of the history that has brought us to where we find our-
selves today. If you already know how we got to where we are now, you may want to read
it for its entertainment value, a trip down memory lane so to speak, or you may just want
to skip large portions of it as irrelevant.
Part II starts cutting into the “meat” of the book, introducing the Grid and its com-
ponents and important concepts and ideas. Many of these ideas are critical to under-
standing the underpinnings of the Grid, the underpinnings around which you will build
your applications. These concepts have the potential to impact your organization and
define the impact of anything that you might bring into, or build within, your Grid
environment. A foundational knowledge of this information is vital for those building
within the Grid and those administering the Grid and its contents.
Part III delves into the role that application programming will play in this new
paradigm and how those applications need to act to “play nicely together.”
Structure of the Book
This book is broken down into three sections and eleven chapters as follows.
Part I
Part I lays the groundwork. We discuss some background on computing and how
we got to where we are. We are, in many places and many situations, already taking
baby steps toward integration of the new paradigm into the existing framework.
Chapter 1
Chapter 1 discusses computer programming paradigm shifts through history, how
we got here, the major milestones that we have seen in conceptual programming
and the groundwork for the Grid, where we are launching the future today. It
includes information on the beginnings of networking and the Internet, as it is the
model on which many people are defining the interaction point through which
most will work with the Grid.
Chapter 2
Chapter 2 provides a definition of where much of the Grid is now, the major players
that have gotten it to where it is, and many of the components that make up the
Grid system. Every Grid has components of hardware as well as software. These
components work together to create the magic of the whole.
21. xvi N Preface
Chapter 3
Chapter 3 is sort of the “proof of the pudding.” It provides a partial list of those
commercial and academic ventures that have been the early adopters of the Grid
and have started to realize its potential. We have a long way to go before any-
one can hope to realize anything as ubiquitous as commodity computing, but
also we have come a long way from our beginnings. There are more and more
organizations beginning to join the growing group that have already adopted
the Grid. Some are smaller organizations leveraging inexpensive hardware, and
others globally large organizations trying to bring their infrastructures under a
single management paradigm.
Part II
Part II goes into the pieces and parts that go into building a Grid. A variety of ideas,
concepts, and components are involved in the definition of what one needs to have
one’s brain around, before stepping off of the precipice and hang-gliding into the
future. Not all Grids need to have all components; just as one organization is radi-
cally different from another organization, so is one organization’s Grid different from
that of another organization.
Chapter 4
Chapter 4 looks at the security concerns and some of the means that can be used
to address those concerns. As the Grid continues to emerge, so will the security
concerns and the security measures developed to address those concerns. With all
the different rules and regulations that govern our organizations today, and all the
threats (internal as well as external) security is and needs to be uppermost in all of
our minds. Security, as it applies to the Grid, has come far in recent years and the
implementation has become more flexible and simplified.
Chapter 5
Chapter 5 looks at the underlying hardware on which the Grid runs. Because the
Grid can run on nearly anything, from PC to supercomputer, the hardware is dif-
ficult to define, but there are emerging components being built today specifically
with the goal of enabling the new technology. One of the selling points of a Grid
infrastructure is that it can run on nearly anything and that blade servers that are
easily snapped into and out of the Grid can add capacity and replace defective
components.
22. Preface N xvii
Chapter 6
Metadata is important in any large system. Chapter 6 looks at the role that metadata
plays and will need to play in the Grid as it continues to evolve. This metadata is
used not only to find data, but also to locate resources and to deliver the best possible
performance to the programs and applications that run on the infrastructure.
Chapter 7
Many different business and technology drivers are pushing organizations into the
features and flexibility that the Grid can offer today and will continue to offer in
the future. Chapter 7 looks at not only the technological reasons many organiza-
tions have for implementing a Grid environment (and face it, the best reason for many
technologists is simply because it is really cool), but also the business drivers that will
help the technologists convince business users that the new technology will be the best
technology to meet business needs and to allow that technology to make its inroads
into the organization. Just as organizations are changing, the drivers for Grid adop-
tion are also changing, but this is simply another layer of flexibility that the Grid
can bring.
Part III
Part III goes into deeper details of applications in the Grid environment. Applica-
tions have evolved over the past several decades, and continue to redefine them-
selves depending on the organization in which they find themselves. We have gone
from centrally hosted applications on mainframes to client–server applications to
widely distributed applications that are accessed via the Internet or intranet. The
Grid will add its own environmental impact to the evolution of applications and
will help steer the direction that that evolution will take.
Chapter 8
Chapter 8 allows us to look at virtualization as it applies to the organization and to
an infrastructure environment. Because the Grid looks at all resources as a generic
pool of power from which the computing needs can be met, virtualization of the
different components becomes more necessary. While the way that a Windows
server works internally differs from the ways that a Linux server or a mainframe
works, the ways that an application taps into the power of each server can be very
similar. While the I/O performance of an attached disk may differ greatly from the
performance of an NAS or a SAN, the access of data from any given device needs to
be as seamless as possible and the location of that data must be fluid as well.
23. xviii N Preface
Chapter 9
Chapter 9 looks at the strategy and planning needed to create the Grid-enabled
applications that we are trying to bring to our organizations or that our organiza-
tions are demanding of us. We must look at systems analysis and design in a whole
new light because the way we design these applications will have to undergo grow-
ing pains.
Chapter 10
Chapter 10 takes programming a step further and looks at the emerging stan-
dards of programming that will make the modularization of the Grid applications
possible.
Chapter 11
Finally, Chapter 11 puts it all together. We summarize what we already discussed and
then discuss where we can go from here. We are standing on the edge of a new era.
Let the adventure begin!
24. xix
Acknowledgments
My heartiest thanks go to everyone who contributed to my ability to bring this
book to completion. Thanks, especially, to John Wyzalek from Auerbach Publica-
tions for his support and faith that I could do it. His support has been invaluable.
This book is, as are they all, dedicated to my husband Larry, my son Adam, and
my daughter Amandya. They are infinitely understanding and patient. And this
book has seen its share of pain (both physical and emotional) and tribulation, and
for that I am infinitely sorry.
Remember that anything is possible if one works hard enough and wants it
badly enough. Make your dreams a reality.
It is also dedicated to our dog Crystal, who died January 17, 2007, just as I was
finishing the last chapter of this book. No longer will I work on a chapter and have
her warm heavy head resting on my knee. No longer will I have her to keep me
company while I read, research, and write. She will be sorely missed. She awaits us
at the Rainbow Bridge, her eyes once more clear, her barks echoing in the sunlight
as she chases the ducks and the rabbits, the birds, and the prairie dogs. (See www.
Rainbows Bridge.com)
Just this side of heaven is a place called Rainbow Bridge.
When an animal dies that has been especially close to someone here,
that pet goes to Rainbow Bridge. There are meadows and hills for all of
our special friends so they can run and play together. There is plenty of
food, water and sunshine, and our friends are warm and comfortable.
All the animals who had been ill and old are restored to health and
vigor. Those who were hurt or maimed are made whole and strong
again, just as we remember them in our dreams of days and times gone
by. The animals are happy and content, except for one small thing; they
each miss someone very special to them, who had to be left behind.
25. xx N Acknowledgments
They all run and play together, but the day comes when one suddenly
stops and looks into the distance. His bright eyes are intent. His eager
body quivers. Suddenly he begins to run from the group, flying over the
green grass, his legs carrying him faster and faster.
You have been spotted, and when you and your special friend finally
meet, you cling together in joyous reunion, never to be parted again.
The happy kisses rain upon your face; your hands again caress the
beloved head, and you look once more into the trusting eyes of your
pet, so long gone from your life but never absent from your heart.
Then you cross Rainbow Bridge together....
—Author unknown
26. 1
1
IN THE BEGINNING
Every adventure begins at the beginning. If one takes a river raft trip down the
Colorado River through the Grand Canyon, one has to start the adventure with
a discussion of what will come, of the people who have gone before us down this
same river, what one is going to expect from the trip, and what pitfalls one is likely
to face along the way.
We will start the adventure with an overview of the evolution of programming
paradigms. This section looks at the way programming paradigms have evolved
and how programming languages have evolved along with them. Computing itself
has, in some fashion, been around as long as man. Programming languages and
programming paradigms have been around as long as electronic computing. This
section looks at these beginnings and begins to weave the tapestry of where we
have been and how we have gotten to this point in the adventure. The adventure
winds its way through the bends and curves in the river just as on the river raft
trip. There are bumps in the river bottom and rapids along the way, as well as calm
easy stretches. We start with mainframes and linear programming. We expand to
include different platforms and different paradigms. The way that we approach
programming evolves as increased computing resources become available. We have
gone from programming of a few kilobytes of memory to the view that “memory
and disk space are cheap. We will buy whatever it takes to make the programs run”
to make the most of the resources we have.
We start with the advances and begin to look at distributed computing. We
look at peer-to-peer processing and then the earliest beginnings of the Grid in all
the ways it is becoming defined. We examine the different kids of Grids and how
I
27. 2 N Grid Applications Systems Design
the different definitions can be compared, contrasted, and combined to build the
overall picture. Regardless of what one wants to accomplish, a Grid is likely to fill
the need. There are even Grids that include the most overlooked resource that a
company has — its intellectual capital.
Finally, we look at some of the experiences of others who have stood where
many of us stand today, on the edge of deciding whether they really want to take
the step off the ledge of the great divide, out of the known and into the future
through implementation of the Grid and its new concepts in computing.
This background section brings the reader up to speed. Many will skip or skim
the material, while others will enjoy the walk down memory lane, and still others
will find walking through these pages of the first section very educational.
Tighten your flotation device, grab onto the ropes lashing the equipment to the
raft, and enjoy the adventure.
28. 3
Chapter 1
History
In pioneer days they used oxen for heavy pulling, and when one ox
couldn’t budge a log, they didn’t try to grow a larger ox. We shouldn’t
be trying for bigger computers, but for more systems of computers.
— Rear Admiral Grace Murray Hopper
Computing has become almost synonymous with mechanical computing and PCs
laptops, palmtops, mainframes, midranges, supercomputers, servers, and other modern
devices that are based on this idea of what computing is, but computers and computing
have a rich history. This history has, at its basis, the programs that run the devices and
the programming languages that were used to create them.
Computing
What people think of when they hear the phrase “computer programming”
or “programming languages” often has as much to do with when they became
acquainted with computers and computing as it does with what they do in comput-
ing. Many think of assembler language, many others COBOL or FORTRAN, and
still others Visual Basic or Java.
This book has more to do with how the programming is used and the ideas
behind making the programs behave nicely in the Grid environment than it has to
do with how the programs are made or in what programming languages they are
written (although some languages adapt more readily than others).
This chapter, however, provides a general background of programming lan-
guages and provides a common starting place.
29. 4 N Grid Applications Systems Design
Blaise Pascal, noted mathematician and scientist, in 1642 built a mechanical calcu-
lator, called the Pascaline. While Pascal was one of the few to actually make use of his
novel device, it did help to lay the foundations for mechanical computing as we know it
today. While this was a mechanical adding machine with the capacity for utilizing eight
digits, using it meant that the user hand-turned the gear (later, people improved on the
design by adding a crank to make turning easier) as the mechanism for carrying out the
calculations. In Pascal’s system, a one-toothed gear (the one’s place) engaged its tooth
with the teeth of a gear with ten teeth once every time the single toothed gear revolved.
The revolution of the one’s place tracker engaging with the ten’s place tracker, which in
turn engaged the hundreds and thousands, ten thousands, and hundred thousands gears
was the same basic principle as the original odometer (the mechanical mechanism used
for counting the number of miles, or kilometers that a car has traveled). Of course, this
was in the years before odometers were computerized. This Pascaline calculator had its
difficulties, however. It had trouble carrying (not an admirable quality in a mathematical
machine, but it was a start). The major issue was that its gears tended to jam during use.
Pascal was the only person who was able to make repairs to the machine, making bro-
ken parts and jammed gears time-consuming conditions to rectify. This was one of the
primary reasons for its lack of popularity (that and the fact that the Pascaline would have
cost more than the salaries of all the people it could have replaced). The device proved
however, that mechanical calculation was possible.
But this was hardware. We are concerned, primarily with software advances
that have marked the computer’s progress through history. We are going to primar-
ily look at changes in computer programming languages and programming models
through history.
Methodology
A programming methodology is a codified set of practices. These practices are often
accompanied by either formal training materials or educational programs or, at the
very least, diagrams and formal guidelines. Part of the distinction of a methodology
is that it is repeatable and carried out over and over in the effort to create software
programs or systems. The other part of the distinction is that methodology is centered
on software engineering and not simply the method employed in the programming.
Another way to look at methodologies is that they are the assumptions, con-
cepts, values, and practices that constitute a way of viewing reality for the commu-
nity that shares them, especially in an intellectual discipline.
Paradigm
A programming paradigm, on the other hand, is more relevant to the idea of Grids
today.
31. in the book he would read whether it was wise to make a landing there and just what
conditions he would meet.
Here are some bits verbatim from the book.
"In many cases the woods are so stunted and straggling that during winter, aerial
observation of troops actually in them would probably be possible.... Somewhat soft after
rain. Difficult for a landing.... The spa race course on the Francorchamps road is useless."
In this and other ways were the British aviators cautioned about using their aeroplanes in
Belgium.
For the last few years we have all been hearing about the wonderful maps and
information that Germany had of all the countries in Europe. No one, however, has ever
seen any of these books; and no one has ever publicly quoted any of their contents. I
believe they exist. I think, however, that the photographs printed here are the first
permanent public records of the most confidential books in use by the army of a world
power. I think they have a certain historical significance. At any rate, that England should
possess them is amazing—England whom everybody but Germany thought was the least
prepared of all.
33. THE FUTURE—PEACE OR WAR
Impressions gained during my talk with the 1914
choice for the Nobel Peace Prize—Professor Ludwig Stein
In The Hague the Temple of Peace is empty; all over the world ordnance factories are
full. Since the day of that first convention in Geneva educated men have organized and
pushed the international movement, which is called world peace. Is it a success or a
failure?
At his home in Berlin, early in February, I talked with one of the leading men of this
movement concerning these things. I asked Professor Ludwig Stein,—whose activities for
world peace are well known in America, he having been chosen for the Nobel Peace prize
of 1914 which was never awarded, he being formerly one of the three permanent
members of the Bern Bureau for International Peace, he having been selected to present
the famous declaration of peace to the late Edward the Seventh, whom the peace people
called Edward the Peacemaker, he having worked side by side with Andrew Carnegie for
the "ideal"—I asked him, could peace soon be made in this war? A deliberate man is
Professor Stein, and he thought so long without replying that his personality impressed
itself upon you before he had uttered a word—a strange combination of the dreamer and
the man of to-day, a contrast of gentle eyes and grim jaw.
"At this time," he said, tapping his finger on the copper-topped smoking table in his
study, "peace is impossible. President Wilson's endeavors are futile. Before a decisive
result has been reached, peace cannot be thought of. Once Warsaw is captured, it is
likely that Russia will make peace; or if not Warsaw, if a large really decisive battle is
fought."
It seemed significant that such an apostle of peace as Professor Stein should have so
completely given up all faith in the immediate efficacy of his movement. I asked him
therefore if he considered it a failure.
"The peace movement," he said, "is like a fire department. If a few houses burn, or the
conflagration spreads even over a number of blocks, the fire fighters are effective, but if
a whole city burns, like the big Chicago fire, the fire department can do nothing. And if
the whole world burns, what can the workers for peace do? Our movement is not strong
enough; it is not big enough. For the Balkan war, the firemen were effective, they could
confine the burning within that limited area, but when all Europe sprang up in flames, we
failed." I mentioned to the Professor that this was a new conception to the peace
movement in America, the first admission from a peace-man that the power of the
movement was to-day limited. I asked Professor Stein then if we were to think of the
movement as being a limited success or was there any chance of it ever attaining
something bigger?
"The task of the nineteenth century," he replied, "was to let national feeling grow
subconsciously. In Prussia, Fichte, the first rector of the new Berlin University, made his
34. famous 'Speeches for the German Nation.' Jahn preached 'German Unity.' Achim von
Arnim collected German songs and war songs of German warriors. Even Schiller wrote in
his later years of Germany as the heart and center of Europe, and began to feel more
national than Goethe ever did. The idea grew and produced united Italy and united
Germany. But this process of attaining national consciousness is not yet achieved. In
America it is not nearly finished. It is a sociological, unconsciously pedagogical process.
The time will come when nationalism will be thoroughly saturated in each country. When
it does and not until then, states will see that it is impossible to produce and consume
everything. That will be the beginning of international consciousness. Then the national
spirit will become secondary to conscious internationalism. When that time comes, world
peace will be possible."
I was going to ask Professor Stein how far off that day was but thought it best first to
take up his point, the thorough establishment of the national idea being the beginning of
world peace.
"As the national feeling grows," I asked him, "will not the goal for peace become always
more remote? It seems to me that international consciousness is dependent upon the
people of one country knowing the people of another. How can, for instance, the Russian
peasant ever understand the customs and personality of say, the poor man in England?
Because of geographical reasons they can never get into touch with one another; how
then are the masses of the states of the world ever going to understand each other, and
how without this understanding can there ever be world peace?"
Professor Stein believes that this barrier can be overcome.
"Modern science and fast steamers," he replied, "the wireless, and better international
trade understanding are constantly bringing together all states. Through journalists,
merchants, diplomats and extensive traveling on the part of the people of all countries,
the inhabitants of all different parts of the world begin to know each other. A hundred
years ago the Roumanian peasant did not know possibly that there was an Argentine. To-
day, though, the Roumanian knows that the price he gets for his wheat depends upon
what the Argentine farmers get for theirs. I believe that as science progresses and
culture spreads over the world, that the geographical barrier to peace can be broken
down. Consider Switzerland, it is the ideal. Three races, French, German and Italian, live
within its walls, but they are held together by culture."
I pointed out that Switzerland was so small that the French, Germans and Italians had a
chance to know and understand their different customs and personalities, and asked
Professor Stein if culture was also holding together Austria-Hungary?
"Austria," he said, "is an exception. Politically it is necessary to have the monarchial
symbol there, because only in a military state would it be possible for so many different
races to live at peace with themselves. Austria is different from Switzerland because it is
a crazy quilt of many different, uncultured, mostly illiterate, to some extent nomadic
races."
The Professor, who is a great admirer of Herbert Spencer and whom Spencer said
understood him better than any Continental thinker, thereupon mentioned the point that
the famous Englishman had made.
35. "Spencer," he said, "wrote that instead of war, a competition in traffic and industry would
take place between nations."
"But, Professor," I asked, "does not traffic and industry breed war; what caused this war?
Was not commercial jealousy between England and Germany one of the vital causes of
the war?"
He admitted that it was, and went on to say:
"After this war, the Englishman will look at his books, he will take his pencil in his hand
and he will begin figuring. He will get up a balance sheet, and he will find that war does
not pay. England is rational to excess. For years she has been the political clearing house
of the world. She could in this way rule five hundred million people as long as these
people were not striving for nationalism. But Germany attains its conscious nationalism,
and asks herself, Why should I allow the thirty-eight million people of Great Britain,
through their political clearing house, to have such a dominate influence on the affairs of
the world? Wherefore in the last analysis, this war was caused by the thorough gaining of
national consciousness that English diplomacy has no longer been able to retard. And
under the industrial system of to-day, things are not done with papers passing through a
clearing house, but with blood.
"I regard this war as an expression of the solidarity of the world on the minus side. It is
an underground solidarity, but is having, for the moment, a negative influence because
commerce is stopped. The United States is feeling it, it is holding up your country. It is
holding up China which cannot get money for necessary improvements. But all this is
working towards the conscious solidarity of the future, which will be expressed in a
positive war; when fighting will be done not with cannons but with contracts; when not
blood but ink will be wasted."
"You believe then, Professor," I asked, "that the day will come when there will be no war,
when fighting actually will be done with ink? Suppose that day comes, will it be a good
thing? Do you consider international peace a friend or an enemy to robust normal
manhood? Do you think that war cleans out degenerate tendencies of peaceful
civilization?"
Deciding that this was a metaphysical question, Professor Stein preferred not to answer
it. He did though say this:
"In the Bible it says that the holy fire must be kept burning on the altar. It is a good thing
for the world that there are idealists to keep the fire going. Men like Carnegie,
Rockefeller, and the puritan and quaker elements, they do their service to the world in
this way. The world must have ideals. International peace is an ideal. It is like the point
of a compass, the north star that the mariner sees, or the star of the desert. It points the
way for those who want to go toward a certain goal. I say, that as an ideal, it is
impossible of achievement, because the very way to it shows the people where they
really want to go."
"But, Professor," I suggested, "if a nation has only ideals, it is going to get into trouble. I
have heard it expressed that the peace movement has done the United States more harm
than good. Will you, as one of its hardest workers, give some message to the people of
America, on the status of international peace to-day and in the future?"
36. "Your country," he said, "has not yet attained its nationalism, but it is most wonderful,
because it is not formed like Austria, of half civilized, uncultured races held together by
the monarchical system, but because it is welding itself together from material, a large
part of which was composed of the scum of Europe. I wonder that it has been able to
make the strides towards nationalism, that it already has. No state in the world has
progressed so far by comparison towards national consciousness as has America in so
short a time. Up to now, America has been the student of Europe, but from now on,
America will be the teacher. To-day doubly so; with the Panama Canal you are the
forepost of the white race against the yellow. The geographical and moral position that
your country holds, imposes upon it a great duty. It is to hold back the East. Your country
cannot step aside from the yellow races. You must be prepared to cope with them."
"What, Professor! You are suggesting armament for the United States. Why! that is
against every teaching of the peace propagandist in our country."
"If the people of the United States," stated Professor Stein deliberately, "believe that the
peace movement is bound to save them from war, they have either totally misconstrued
it, or they have been grossly misinformed. A nation must be prepared for war. If the
rulers of a nation leave their country unprepared, they are guilty of criminal neglect. In
China its four hundred millions of people are unprepared, and are therefore at the mercy
of a few million Japanese who are prepared. That is because in this generation might is
right, and all that we workers for peace can do, without injuring our states, is to face the
facts of this generation, be prepared for war, if war there is to be, and keep on working
for our ideal. Anything else is a dream."
"But, Professor," I remarked, "that is not the peace idea as it has been spread broadcast
in America. Those who believe in the movement, think that the peace societies of our
country can keep us out of war. What you have just said disagrees with Andrew
Carnegie's peace utterances in the United States. Would you mind telling me the
difference between your viewpoint and Mr. Carnegie's?"
"I shall be glad to do so," replied Professor Stein. "Mr. Carnegie looks at the peace
movement from a puritanical viewpoint. He has interpreted the biblical text of turning the
sword into a plow-share literally as applying to the present day. I believe that swords will
be turned into plow shares, but not in our generation. That will come to pass, not
because it is in the Bible, but because the imminent logic of history will bring it about.
Eventually the imminent logic of history will create international peace. The puritanical
workers for peace believe that because it is written in the Bible that all men are born
equal, they should try to equalize mankind to-day. It will take about a hundred years to
educate and solidify the white race alone. It will take about ten thousand years, let us
say, to educate all the races of the world and achieve a world brotherhood. The great
mistake that is made is in thinking that the ideals of the Bible are possible to-day. They
are utterly impossible."
I then asked Professor Stein to summarize his opinions for me. "I have read your paper,"
I said, "written before the war, on Cosmopolitism, National, State and International
Compromise. There is one point I want to ask you about. You wrote—these are not your
exact words, Professor—'What poets and philosophers have dreamed of, and what the
Catholic Church has in some respects already realized: One shepherd and one herd! that
37. will be the state of Europe in times coming'—What did you mean, Professor, by that
phrase 'One shepherd and one herd'? Did you mean to convey that one state powerfully
armed would be a sort of international policeman, strong enough to keep the peace
among other nations? Did you have in mind a Germany whose mission would be to
shepherd the people of the world?"
"Absolutely not," replied Professor Stein; "by one shepherd I meant the imperialism of
the white race. White imperialism will divide the world between the white states. The
Western European and American cultural systems will rule. My idea is not the United
States of Europe, but the united cultural system of the white race."
"And when will that be possible, Professor?"
"As soon as nationalism has been thoroughly saturated, and conscious internationalism
has been achieved, and that will probably be within a hundred years."
"And meanwhile?" I asked.
"Alas! The world of to-day cannot be ruled with oil of roses, but only with blood."
THE END
Transcriber's Notes
Obvious punctuation errors repaired.
Errors in German phrases and the diacritic of "Liége" were not corrected.
The illustrations are low-resolution thumbnails; to see high-resolution images, click on the thumbnails.
The captions of the illustrations on P. 182 did not refer to the correct illustrations and were corrected
The following words appear both with and without hyphens and have not been changed: "candle[-]light",
"co[-]operation", "make[-]shift", "semi[-]circle", "sign[-]board", "track[-]side".
P. 48: "couse" changed to "course" (Of course, I suggested going with him).
P. 107: "soshes" changed to "sloshes" (the liquid ground sloshes).
P. 140: "have" changed to "leave" (the soldiers leave pits here).
P. 145: "repeal" changed to "repel" (We only use machine guns to repel).
P. 158: "chipping" changed to "clipping" (clipping their hair to the scalp).
P. 175: "Coloned" changed to "Colonel" (the Lieutenant Colonel confirmed).
P. 190: "Turkos" changed to "Turcos" (Here were the Turcos).
P. 211: "to" changed to "with" (We went with Von Stietencron).
P. 225: "center" changed to "canter" (A Uhlan on patrol passed at a canter).
P. 325: "Profesosr" changed to "Professor" (such an apostle of peace as Professor Stein).
38. *** END OF THE PROJECT GUTENBERG EBOOK BEHIND THE
SCENES IN WARRING GERMANY ***
Updated editions will replace the previous one—the old editions will
be renamed.
Creating the works from print editions not protected by U.S.
copyright law means that no one owns a United States copyright in
these works, so the Foundation (and you!) can copy and distribute it
in the United States without permission and without paying
copyright royalties. Special rules, set forth in the General Terms of
Use part of this license, apply to copying and distributing Project
Gutenberg™ electronic works to protect the PROJECT GUTENBERG™
concept and trademark. Project Gutenberg is a registered trademark,
and may not be used if you charge for an eBook, except by following
the terms of the trademark license, including paying royalties for use
of the Project Gutenberg trademark. If you do not charge anything
for copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such as
creation of derivative works, reports, performances and research.
Project Gutenberg eBooks may be modified and printed and given
away—you may do practically ANYTHING in the United States with
eBooks not protected by U.S. copyright law. Redistribution is subject
to the trademark license, especially commercial redistribution.
START: FULL LICENSE
40. PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK
To protect the Project Gutenberg™ mission of promoting the free
distribution of electronic works, by using or distributing this work (or
any other work associated in any way with the phrase “Project
Gutenberg”), you agree to comply with all the terms of the Full
Project Gutenberg™ License available with this file or online at
www.gutenberg.org/license.
Section 1. General Terms of Use and
Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand, agree
to and accept all the terms of this license and intellectual property
(trademark/copyright) agreement. If you do not agree to abide by all
the terms of this agreement, you must cease using and return or
destroy all copies of Project Gutenberg™ electronic works in your
possession. If you paid a fee for obtaining a copy of or access to a
Project Gutenberg™ electronic work and you do not agree to be
bound by the terms of this agreement, you may obtain a refund
from the person or entity to whom you paid the fee as set forth in
paragraph 1.E.8.
1.B. “Project Gutenberg” is a registered trademark. It may only be
used on or associated in any way with an electronic work by people
who agree to be bound by the terms of this agreement. There are a
few things that you can do with most Project Gutenberg™ electronic
works even without complying with the full terms of this agreement.
See paragraph 1.C below. There are a lot of things you can do with
Project Gutenberg™ electronic works if you follow the terms of this
agreement and help preserve free future access to Project
Gutenberg™ electronic works. See paragraph 1.E below.
41. 1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright law
in the United States and you are located in the United States, we do
not claim a right to prevent you from copying, distributing,
performing, displaying or creating derivative works based on the
work as long as all references to Project Gutenberg are removed. Of
course, we hope that you will support the Project Gutenberg™
mission of promoting free access to electronic works by freely
sharing Project Gutenberg™ works in compliance with the terms of
this agreement for keeping the Project Gutenberg™ name associated
with the work. You can easily comply with the terms of this
agreement by keeping this work in the same format with its attached
full Project Gutenberg™ License when you share it without charge
with others.
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the
terms of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.
1.E. Unless you have removed all references to Project Gutenberg:
1.E.1. The following sentence, with active links to, or other
immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project Gutenberg™
work (any work on which the phrase “Project Gutenberg” appears,
or with which the phrase “Project Gutenberg” is associated) is
accessed, displayed, performed, viewed, copied or distributed:
42. This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this eBook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.
1.E.2. If an individual Project Gutenberg™ electronic work is derived
from texts not protected by U.S. copyright law (does not contain a
notice indicating that it is posted with permission of the copyright
holder), the work can be copied and distributed to anyone in the
United States without paying any fees or charges. If you are
redistributing or providing access to a work with the phrase “Project
Gutenberg” associated with or appearing on the work, you must
comply either with the requirements of paragraphs 1.E.1 through
1.E.7 or obtain permission for the use of the work and the Project
Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9.
1.E.3. If an individual Project Gutenberg™ electronic work is posted
with the permission of the copyright holder, your use and distribution
must comply with both paragraphs 1.E.1 through 1.E.7 and any
additional terms imposed by the copyright holder. Additional terms
will be linked to the Project Gutenberg™ License for all works posted
with the permission of the copyright holder found at the beginning
of this work.
1.E.4. Do not unlink or detach or remove the full Project
Gutenberg™ License terms from this work, or any files containing a
part of this work or any other work associated with Project
Gutenberg™.
1.E.5. Do not copy, display, perform, distribute or redistribute this
electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
43. with active links or immediate access to the full terms of the Project
Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or
expense to the user, provide a copy, a means of exporting a copy, or
a means of obtaining a copy upon request, of the work in its original
“Plain Vanilla ASCII” or other form. Any alternate format must
include the full Project Gutenberg™ License as specified in
paragraph 1.E.1.
1.E.7. Do not charge a fee for access to, viewing, displaying,
performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.
1.E.8. You may charge a reasonable fee for copies of or providing
access to or distributing Project Gutenberg™ electronic works
provided that:
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
44. about donations to the Project Gutenberg Literary Archive
Foundation.”
• You provide a full refund of any money paid by a user who
notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.
• You provide, in accordance with paragraph 1.F.3, a full refund of
any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™
electronic work or group of works on different terms than are set
forth in this agreement, you must obtain permission in writing from
the Project Gutenberg Literary Archive Foundation, the manager of
the Project Gutenberg™ trademark. Contact the Foundation as set
forth in Section 3 below.
1.F.
1.F.1. Project Gutenberg volunteers and employees expend
considerable effort to identify, do copyright research on, transcribe
and proofread works not protected by U.S. copyright law in creating
the Project Gutenberg™ collection. Despite these efforts, Project
Gutenberg™ electronic works, and the medium on which they may
be stored, may contain “Defects,” such as, but not limited to,
incomplete, inaccurate or corrupt data, transcription errors, a
copyright or other intellectual property infringement, a defective or
45. damaged disk or other medium, a computer virus, or computer
codes that damage or cannot be read by your equipment.
1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for
the “Right of Replacement or Refund” described in paragraph 1.F.3,
the Project Gutenberg Literary Archive Foundation, the owner of the
Project Gutenberg™ trademark, and any other party distributing a
Project Gutenberg™ electronic work under this agreement, disclaim
all liability to you for damages, costs and expenses, including legal
fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR
NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR
BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH
1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK
OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL
NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT,
CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF
YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.
1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you
discover a defect in this electronic work within 90 days of receiving
it, you can receive a refund of the money (if any) you paid for it by
sending a written explanation to the person you received the work
from. If you received the work on a physical medium, you must
return the medium with your written explanation. The person or
entity that provided you with the defective work may elect to provide
a replacement copy in lieu of a refund. If you received the work
electronically, the person or entity providing it to you may choose to
give you a second opportunity to receive the work electronically in
lieu of a refund. If the second copy is also defective, you may
demand a refund in writing without further opportunities to fix the
problem.
1.F.4. Except for the limited right of replacement or refund set forth
in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
46. INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
1.F.5. Some states do not allow disclaimers of certain implied
warranties or the exclusion or limitation of certain types of damages.
If any disclaimer or limitation set forth in this agreement violates the
law of the state applicable to this agreement, the agreement shall be
interpreted to make the maximum disclaimer or limitation permitted
by the applicable state law. The invalidity or unenforceability of any
provision of this agreement shall not void the remaining provisions.
1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation,
the trademark owner, any agent or employee of the Foundation,
anyone providing copies of Project Gutenberg™ electronic works in
accordance with this agreement, and any volunteers associated with
the production, promotion and distribution of Project Gutenberg™
electronic works, harmless from all liability, costs and expenses,
including legal fees, that arise directly or indirectly from any of the
following which you do or cause to occur: (a) distribution of this or
any Project Gutenberg™ work, (b) alteration, modification, or
additions or deletions to any Project Gutenberg™ work, and (c) any
Defect you cause.
Section 2. Information about the Mission
of Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new computers.
It exists because of the efforts of hundreds of volunteers and
donations from people in all walks of life.
Volunteers and financial support to provide volunteers with the
assistance they need are critical to reaching Project Gutenberg™’s
goals and ensuring that the Project Gutenberg™ collection will
47. remain freely available for generations to come. In 2001, the Project
Gutenberg Literary Archive Foundation was created to provide a
secure and permanent future for Project Gutenberg™ and future
generations. To learn more about the Project Gutenberg Literary
Archive Foundation and how your efforts and donations can help,
see Sections 3 and 4 and the Foundation information page at
www.gutenberg.org.
Section 3. Information about the Project
Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-profit
501(c)(3) educational corporation organized under the laws of the
state of Mississippi and granted tax exempt status by the Internal
Revenue Service. The Foundation’s EIN or federal tax identification
number is 64-6221541. Contributions to the Project Gutenberg
Literary Archive Foundation are tax deductible to the full extent
permitted by U.S. federal laws and your state’s laws.
The Foundation’s business office is located at 809 North 1500 West,
Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up
to date contact information can be found at the Foundation’s website
and official page at www.gutenberg.org/contact
Section 4. Information about Donations to
the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission of
increasing the number of public domain and licensed works that can
be freely distributed in machine-readable form accessible by the
widest array of equipment including outdated equipment. Many
48. small donations ($1 to $5,000) are particularly important to
maintaining tax exempt status with the IRS.
The Foundation is committed to complying with the laws regulating
charities and charitable donations in all 50 states of the United
States. Compliance requirements are not uniform and it takes a
considerable effort, much paperwork and many fees to meet and
keep up with these requirements. We do not solicit donations in
locations where we have not received written confirmation of
compliance. To SEND DONATIONS or determine the status of
compliance for any particular state visit www.gutenberg.org/donate.
While we cannot and do not solicit contributions from states where
we have not met the solicitation requirements, we know of no
prohibition against accepting unsolicited donations from donors in
such states who approach us with offers to donate.
International donations are gratefully accepted, but we cannot make
any statements concerning tax treatment of donations received from
outside the United States. U.S. laws alone swamp our small staff.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Section 5. General Information About
Project Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could be
freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose network of
volunteer support.
49. Project Gutenberg™ eBooks are often created from several printed
editions, all of which are confirmed as not protected by copyright in
the U.S. unless a copyright notice is included. Thus, we do not
necessarily keep eBooks in compliance with any particular paper
edition.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
This website includes information about Project Gutenberg™,
including how to make donations to the Project Gutenberg Literary
Archive Foundation, how to help produce our new eBooks, and how
to subscribe to our email newsletter to hear about new eBooks.
58. Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!
ebookname.com