Home Open Source Microsoft releases OS source code on GitHub

Microsoft released the source code for MS-DOS v1.25 and v2.0 on GitHub at the beginning of this month.

After releasing the source code to the Computer History Museum in 2014, Microsoft announced the public availability of the full source code (in ASM files).

Microsoft's Rich Turner wrote, "In March 2014, Microsoft released the source code to MS-DOS 1.25 and 2.0 via the Computer History Museum. The announcement also contains a brief history of how MS-DOS came to be for those new to the subject, and ends with many links to related articles and resources for those interested in learning more.

"Today, we're re-open-sourcing MS-DOS on GitHub. Why? Because it's much easier to find, read, and refer to MS-DOS source files if they're in a GitHub repo than in the original downloadable compressed archive file."

He further writes, "Important: As noted on the repo readme, the source files are being (re)published for historical reference purposes and to allow exploration and experimentation for those interested in early PC Operating Systems. The source will be kept static, so please don't send Pull Requests suggesting any modifications to the source files!"

Turner also observes:

  • All the source for MS-DOS 1.25 and 2.0 was written in 8086 assembly code.
  • The source code for the initial release of 86-DOS dates from around 29 December 1980.
  • The MS-DOS 1.25 code dates from around 9 May 1983, and is comprised of just seven source files, including the original MS-DOS Command-Line shell – COMMAND.ASM!
  • MS-DOS 2.0 dates from around 3 August 1983, and grew considerably in sophistication (and team size), and is comprised of 100 .ASM files.
  • There are some interesting documentation (.TXT, .DOC) files interspersed with the source and object files – many are well worth a read, as are many of the source code comments!

Turner concludes with the exhortation, "Enjoy exploring the initial foundations of a family of operating systems that helped fuel the explosion of computer technology that we all rely upon for so much of our modern lives!"

Already, one commenter to the announcement has indicated that he/she plans to port the source to the Arduino platform.

The software is provided under the MIT Licence:

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the Software), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: (not included here – read the licence.md file on GitHub for the full text)

47 REASONS TO ATTEND YOW! 2018

With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

· Sydney 29-30 November
· Brisbane 3-4 December
· Melbourne 6-7 December

Register now for YOW! Workshops

· Sydney 27-28 November
· Melbourne 4-5 December

REGISTER NOW!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect