imake

imake is a build automation system written for the X Window System. It was used by X from X11R1 (1987) to X11R6.9 (2005), and continued to be used in XFree86 (last commit 2009). It is implemented on top of the C preprocessor and make. The first version was written by Todd Brunhoff at Tektronix.

imake generates makefiles from a template, a set of C preprocessor macro functions, and a per-directory input file called an Imakefile. This allows machine dependencies (such as compiler options, alternate command names, and special make rules) to be kept separate from the descriptions of the various items to be built.

imake was heavily used for X and X-related software through the 1990s, and for unrelated software such as ChorusOS.[1] It was also used for configuration management.[2]

With the release of X.org X11R7.0, it was replaced by GNU Autotools. (X11R6.9 and X11R7.0 were the same codebase with a different build system.). X.Org plans to use Meson in the future instead of Autotools.

Notes

  1. "ChorusOS 5.0 Application Developer's Guide: The imake Environment". Oracle Corporation. 2010. Retrieved 2018-05-02.
  2. Sommerville, Ian (March 1996). "Software Configuration Management" (PDF). ICSE'96 SCM-6 Workshop. Lecture Notes in Computer Science. Berlin, Germany. 6: 231–238. doi:10.1007/BFb0023076. ISBN 978-3-540-61964-2.

Sources

gollark: They would use a much more suitable esolang, like Befunge.
gollark: Also, cool use of invisible characters: encode data as invisible character sequences and mix it in with text so it'll be persisted through copy-pasting, though not screenshotting.
gollark: Apparently Unicode has an invisible comma character. It looks like this: ⁣. One must wonder why they thought this was necessary.
gollark: Anyone know where I can find a large dataset of privacy policies, for neural network training?
gollark: <@498244879894315027> Firstly, you could probably try and just use some existing packet capture tool for this. Secondly, seriously what are you doing?! I don't think trying to replay IP or Ethernet packets (whatever gets sent to the network card) has any chance of working to meddle with a higher-level service.


This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.