Subject: Re: Cryptic behavior...
To: Jonathan Stone <jonathan@DSG.Stanford.EDU>
From: Erik E. Fair <email@example.com>
Date: 03/13/1998 02:53:37
System performance was not as good as the VAXen upstairs (though
we did try to optimize the system as much as possible). However,
it was all ours - no graduate students competing for it. You must
remember, this was before the age of workstations (we're talking
1982 here), and computer access was at a premium.
What I meant by "it's nice" was never having to worry about bad
tty state on that system after we hacked the shells. You could
SIGINT, SIGQUIT, or SIGKILL *anything* and still have sane tty
Erik E. Fair firstname.lastname@example.org