Home
        The CYBER 845: First Month`s Use
         Contents
1.                                                    I    lt    lt                                 EAR    teh tt                         2 I   ee   ye ht eee eee t es t t ty ort tt m          ettet      tt         eee ss Movit     I   eee EE TERY                                                   on wt     9th       ts t  t t Ment ul  T LO EEE PED                                           ctr vv Mene      I   emt eh he          E  tt   t    tt s v Mes tL     20 1                                                                                                  htm  gt   sete str t m tts vss cerent tI  N 1                                                                                                                wes ote      o ht hx            Mere hw  1          8    lt      lt 86                                                                         eset 4 4  4 464255  5555     stent Met TD                            te                 he vit EEE HEE TESS EEE HH ott           55555555555555555                                                        tse Seer  a EEE EEE SSS EOE e  ese     655555555555555555     v Mer  0 1      5555555555555555 5   55555555  55555555   4   SSSSSSSSS   bd        9    11 12 13 14 15 16 18 19  SRUS CPTIME MS PRUS MT PRUS JOBS  SYSTEM 8767  2005  24004  2804  250   BATCH 87981  40844  65666  4694  1994   SUBMIT                      EXPORT 4150  1632  9511  82  645   SUPIO o                   TELEX 21415  9223  48105  o  2315   MSORT                  
2.                     a               a    A a Ex                    T  7    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 o 1 2 3  MACHINE CA PERIOD FROM FRIDAY 07 14 19  84 01 27  TO SATURDAY 03 14 27  84 01 28   CPU UTILIZATION  INCLUDING SUBSYSTEMS AND CPU MONITOR   SYSTEM UTILIZATION    M CHARACTER INDICATES   MAXIMUM COLUMN FOR IUS GRAPH  MAX      MIN     100 1     1               M     ef  1               6 Meee   wf  1                          Meveve oF  1                            Meveve   I  1                                                       80 1      gt                     s   gt  y       Met        I       oe ween                   ees Messe   wt  R I                 vh                                  tw n   wee Messes   I  1         ses                   44             st   sss                   1 4  ocv see sse                          tetrotv ctt tl           Meeceteeer     1    eee sse vese        ttt   Wee corti   sss   Mawes wen  N 6O I      vyse wss     tet vh        n                   stt   cv Mee to  T      9  rtt tw ho       etur t m wee   etetttt ssi m t   eee                I   te  atr hh              ete          wee   etsttttt eee eae   veseve Meevoseve   u     tee hh heh RU                 restesse            rst kt v rer Meet      T I   tere ed wera eres                               wee ee ee irte  oc  vo M we ru  I I   Hew tt hw   et t eee et th               tvi  th ee ost vMesw r4   L AOL   eee hh Ro t nh hh                                 
3.                  Access   CYBER CA    10  30                          376 5730 Equipment Purchase Information                 376 8153  2120   CDS  teas E CEU 376 5706 Experimental Engineering VO                   373 4596  MERITSS ME    10  30 cps                    376 7730 Graphics Software                             376 5592     120 CPs                       376 7120 HELP line  enero ense e tex 376 5592  VAX VMS VA     autobaud                     376 9770 9 a m  5 p m   Monday Friday  Budgets  i eo              ER ees 373 2521 HOURS line  recorded message                  373 4927  Computer Aided Instruction                     376 2975 Information  Experimental Engineering           373 4360  Computer Hours  recorded message              373 4927 Information  Lauderdale                        373 4912  Computer Store                                373 4877 Instructional Labs                              376 2703  Consulting Instructional Services                           373 7745  HELP line                                   376 5592 Lauderdale Computer Room                    373 4940  9 a m  5 p m   Monday Friday Lauderdale Services                            373 4995  Business Data Products                       376 1761 Lauderdale Services Manager                   373 7538  1 3 p m   Monday Friday Lauderdale Users    Room                       373 4921  Statistics Packages                           376 5062 MECC Liaison                                 373 7745  1 
4.     Briefly  M77 2 5 still has the follow   ing deliberate input output viola   tions mentioned in the September  article  For more detailed explana   tions of these  please refer to that  article         Conversion errors for floating  point fields with width  W    8 or  greater produces    E w     1   w     7   output rather  than all stars        Special cYBER floating and integer  point values  infinite  R   indefi   nite  1   not normalized       zero   0   and integer greater than  2  48 X  are put out with that    March 1984    single character rather than fol   lowing the field specifications        Use of the single  0  for zero  values  allows negative signed  zero valued fields to differentiate  between zero values and those  with no significant digits for the  given field          77 does not allow repeated list  directed string or complex input  data to extend over more than  one record          77 always produces    digit  rounded in the d 1 place when  E fields are produced under  Gw d fields specifiers and 1P or  greater scaling is in effect        Non zero P scaling is reduced or  raised if this would allow a  floating point number to be out   put  rather than giving an error  field of all stars     Finally  the FORCE STORES  FS  param   eter is required on the M77 control  statement if any FORTRAN entities  are known by two or more names   usually due to EQUIVALENCE state   ments     In addition to the correction of  the final errors found in the valida   ti
5.     CRAY 2330  863  4278  70  1218   TOTALS 124646  54569  151566  7650  6422   ILLEGAL                              Table 2  CA Use   January 27  1984    18 March 1984    Computer Crime Will Be Prosecuted    609 88 COMPUTER DAMAGE   Subdivision 1  Whoever does any of the following is guilty of computer  damage and may be sentenced as provided in subdivision 2     a  Intentionally and without authorization damages or destroys any com   puter  computer system  computer network  computer software  or any other  property specifically defined in section 609 87  subdivision 6      b  Intentionally and without authorization and with intent to injure or de   fraud alters any computer  computer system  computer network  computer  software  or any other property specifically defined in section 609 87  subdi     vision 6     Subdivision 2  Whoever commits computer damage may be sentenced as    follows      a  To imprisonment for not more than ten years or to payment of a fine  of not more than  50 000  or both  if the damage  destruction or alteration  results in a loss in excess of  2500  to the owner  his agent  or lessee     b  To imprisonment for not more than five years or to payment of a fine  of not more than  5000  or both  if the damage  destruction or alteration re   sults in a loss of more than  500  but not more than  2500 to the owner   his agent  or lessee  or    c  In all other cases to imprisonment for not more than 90 days or to  payment of a fine of not more than  500
6.   dem will be used    You need a place to plug the  cable into the microcomputer  Mo   dems        65 232 serial devices  and  so you need an RS 232 port on your  microcomputer  Not all microcom   puters are created equal  some  don t come with serial ports as  standard equipment  If your micro  does not already have an RS 232  port you will have to buy one     24       Your shopping list for hardware  consists of         a 1200  or 300 baud modem       a cable to connect the modem  to the microcomputer      an RS 232 serial port on the mi   crocomputer     Once you have acquired the neces   sary hardware  you stil  need a  communications program to take  advantage of it     The software    Communications software makes  your microcomputer emulate a ter   minal  This means that the commu   nications program takes characters  you type at the keyboard and  sends them out the serial port to  the modem  Characters which ar   rive at the serial port from the mo   dem are displayed on the screen   Some programs are designed to  communicate with almost any other  computer  General purpose pro   grams such as Crosstalk  Intercom   PC Talk  Visi Term  ASCOM  and a  host of others require you to spec   ify how the characters it will be  handling are  packaged   You  specify the  package  for charac     ters by specifying the communica   tion parameters  data bits  stop bits   and parity  To communicate with  our CYBER or VAX computers  spec   ify seven data bits  one stop bit   and EVE
7.   or both     609 89 COMPUTER THEFT   Subdivision 1  Whoever does any of the following is guilty of computer  theft and may be sentenced as provided in subdivision 2     a  Intentionally and without authorization or claim of right accesses or  causes to be accessed any computer  computer system  computer network or  any part thereof for the purpose of obtaining services or property  or    b  intentionally and without claim of right  and with intent to perma   nently deprive the owner of possession  takes  transfers  conceals or retains  possession of any computer  computer system  or any computer software or  data contained in a computer  computer system or computer network    Subdivision 2  Anyone who commits computer theft may be sentenced as    follows      a  To imprisonment for not more than ten years or to payment of a fine  of not more than  50 000  or both  if the loss to the owner  his agent  or  lessee is in excess of  2500  or    b  To imprisonment for not more than five years or to payment of a fine  of not more than  5000  or both  if the loss to the owner  his agent  or les   see is more than  500 but not more than  2500  or    c  In all other cases to imprisonment for not more than 90 days or to  payment of a fine of not more than  500  or both        Exhibit 1  Current Minnesota Computer Laws    Everyone is aware of the adven   tures of comic strip mini hackers   the Hollywood version of hacking  in films like War Games  and the  newspaper reports of young ent
8.  376 5592     March 1984           User log in to the system   lindo  LINDO  UC 26 JAN 82       max 2x           st     4x   3y    10   3x   5y  lt  12         end    look  ROW     all  MAX 2X  3Y  SUBJECT TO  2  4X  3Y     10  3  3X 5Y lt   12  END    go  LP OPTIMUM FOUND      STEP  OBJECTIVE FUNCTION VALUE  1  7 45454545  VARIABLE VALUE REDUCED COST  X 1 272727 0 000000  Y 1 636364 0 000000  ROW SLACK OR SURPLUS DUAL PRICES  2  0 000000    090909  3  0 000000  545455  NO  ITERATIONS   2    DO RANGE SENSITIVITY  ANALYSIS       no      quit       Exhibit 2  A sample LINDO session     Utility Programs  CRAY CATALOG    On January 22  we modified the  Cray Applications Library CATALOG  program to correctly put out record  names     CYBER DRESS    In December  we modified the cv   BER DRESS program  which makes  up MODIFY OPLs and UPDATE OLDPLS  from source programs  to increase  field length to the proper size if it  is too small     Telenet News    Because of upcoming changes at  UCC  all Telenet users should use  the address 61224 20 starting im   mediately  This replaces the need  for different addresses  such as  61224 10 when you access MERITSS   or 61224 1  61224 2  61224 a  or  61224 b  The only address you  should use starting immediately is  61224 20  The system will then  prompt you to type in the name of  the machine you wish to access  If  you have any questions  please call  our HELP line  376 5592     23                       Microcosm    HOW TO GET YOUR MICRO TO  
9.  Direc   tory or more information about  EDUNET  contact Vicky Walsh  the  University of Minnesota s EDUNET li   aison  at the University Computer  Center  227 Experimental Engineer   ing  call 373 4360 to leave a mes   sage   or call 373 5780     Grants for Research    BILINGUAL EDUCATION    The Bilingual Education Demonstra   tion Projects Program awards grants  to local education agencies  LEAs    higher education institutions in con   junction with LEAs  and reservation   based Indian schools for demonstra   tion projects illustrating approaches  to bilingual education  Projects that  use instructional technology will re   ceive 35 percent of the program s  funds in fiscal 1984  For more in   formation  contact     Luis Catarineau   Office of Bilingual Education and  Minority Language Affairs   Department of Education   400 Maryland Avenue SW   Washington  DC 20202    202  447 9227    Liddiard from 17     640 character blocks   MT PSRUS        to 5120 character records   and  JOBS  number entering from each  system   Note that since these are  chargeable resource units  this does  not include the total MS PRUs trans   ferred during interactive and batch  job rolling  In addition  CDC CYBER  systems have been very effective in  delivering CPU power to the user  rather than using it on system  tasks  This is clear from the four to  five percent total CPTIME used for  SYSTEM compared to the TOTALS for  all users  The SRU ratio for SYSTEM  to TOTALS is seven to ten percent  d
10.  ME systems to correct a LOAD state   ment problem  WRITEUP TSP  now  has full lines and revised printing  of subscripts and superscripts     MATLAB  MATRIX  INSTRUCTIONAL PACKAGE    We recently installed the MATLAB  package on the CYBER ME and CA  systems  This interactive program  serves as a convenient  laboratory   for computations that involve ma   trices  It was developed by Profes   sor Cleve Moler of the University  of New Mexico with support from  the National Science Foundation  and the Department of Energy    MATLAB provides easy access to  the well known matrix software de   veloped for the LINPACK and EISPACK  projects  The workspace is only  5000 words because of the instruc   tional nature of the package    For MATLAB documentation  see  WRITEUP MATLAB   a 60 page upper   case user s manual  A HELP com   mand is available and summarizes  the other commands  With a mini   mum field length of 70000B  the  command    MATLAB    begins execution of the program    Exhibit 1 shows a sample MATLAB  session  It defines a matrix A and a  right hand side vector B and solves  the problem AX   B for the un   known vector X  User inputs are in  lower case after the question mark  prompt character    If you have further questions  about MATLAB  call our HELP line   376 5592   Mike Frisch     LINDO  LINEAR PROGRAMMING  PACKAGE    We recently installed the LINDO   Linear  Interactive  aNd Discrete  Optimizer  package on the CYBER  CA and ME systems  This interactive  linear  qu
11.  control point to users when the  SUPIO package is deleted at the end  of winter quarter    The SRU totals are broken down  into CPTIME  in seconds   MS PRUS   Liddiard to 25    17          LOS CCE M EAI ER REESE mene PET OES REST SOROS ND                                                               t        i  H  i  D       H  i  1  H                     MACHINE CA PERIOD FROM FRIDAY 07 00 00  84 01 27  TO SATURDAY 02 59 30  84 01 28     INDICATES MIMINUM DURING    A PERTO o ONDI CA         RIO   INDICATES MAXIMUM OURING A P o  M CHARACTER INDICATES MAXIMUM  C CNLUMN FOR THIS GRAPH Bere     10  o                                     mo nmuzcz                                              DA                                              7    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    1 2     LARGE JOB AVERAGE OWM RESPONSE TIME  TIME MEASURED FROM CARRIAGE RETURN UNTIL JOB ROLLIN BEGINS  LARGE JOB FIELD EENGTHE  gt   55 K                    IN      Set I  I I  I M 1  R I M 1  E I M 1  5 2 1 M I  P I M I     1        N I M  gt  1  5    M  gt    1  E 1       1  1 I M    i  T I M           1 M                    1  E I M             M    I  I 1 I M            1 M    I  I       1  S I M     1     1 Me      1      1                  0 61      Mee     I  N I            Meeve x 1  D 1      t                          5 1      ov wert etn                   I  1 wee           ow      Mes w   1  0 10 8000 5 2000055 4 55 194006000751 AA                000000 0000                        
12.  sup   porting 2780 3780 terminals and  emulators   RBF is described in the  Remote Batch Facility Version 1  Reference Manual  CDC publication  60499600  revision K   and in       CRAY News    COS CFT UPGRADE MARCH 18    UCC will upgrade our CRAY 1 to  COS 1 12 bugfix 1 and        1 11  bugfix 1 on Sunday  March 18  An  extensive article on this upgrade  appeared in the February Newslet   ter  For additional information and  any changes that may have oc   curred since that time  see  WRITEUP CRAYCHG      20    we encourage you to use it  SUPIO  will be removed from operation on  March 17  the end of winter quar   ter  Current SUPIO users will be  given new RBF user numbers to re   place their SUPIO site codes  New  users who want to use their own  remote batch terminals should con   tact our accounting department   373 2521  for an RBF account  number    One very important note  over  the years  we have extended the  UT200 protocol that SUPIO and the  locally written UT200 terminal emu   lator used for communication  This  included features such as upper and  lower case printing  RBF does not  support any of these extended fea   tures  it strictly adheres to the orig   inal UT200 protocol  If you depend  on these features  you must convert  your emulators to ignore them  or  convert to a protocol that supports  upper and lower case printing  such  as HASP    If you need assistance  call our  HELP line  376 5592  The RBF phone  numbers are listed in Exhibit 1        Terminal 
13. 1                   M                        1                                                                      Iw 1    X  v          The CYBER 845  First Month s Use    Because UCC has a stable environ   ment  it has been a number of  months since we last reported use  and response time graphs on our  research CYBERs  With the installa   tion of the CYBER 170 845 as a sin   gle system to replace the batch cv   BER 825  CB  and interactive CYBER  730  CA   it seems appropriate to  review the first month  System reli   ability and hardware stability have  been very good  The only loss was  of a single module in the cache  memory  that fast  but invisible to  the user  memory between central  memory and the operating regis   ters     In the last several years  total  user SRUs on the research CYBERs  have steadily decreased  The peak  use was 1 573 777 sRus delivered  to users in June 1980 using the        BER 74 and CYBER 172  The maxi   mum use for the combined CYBER  74 and CYBER 170 730 systems was  in March 1982 when 1 394 084  SRUs were delivered  Since the in   stallation of the CRAY 1 in late  1981  we have expected research  CYBER use to decrease as users with  large resource needs switched to  the cost effective CRAY    But the CYBER 170 845 achieved     new maximum of 1 587 319 5805  delivered to users in its first month  of operation  During the first four  days of February  CYBER use has  dropped back to previous daily to   tals  We expect the CYBER 845 to  eas
14. 2 p m   Monday Friday Newsletter Subscription                         373 4912  Data  Bases        ox emen ned Vete 376 1761 Permanent File Restoration                     376 5605  10 11 a m   Monday Friday Professional Services Division  PSD              376 1764  Microcomputers                             376 4276 Project Assistance                              376 1764  10 12 a m  and 2 4 p m   Monday Friday Reference Room                               373 7744  Non Numeric Computing                     376 2944 Remote Batch  RJE  Services                    376 2703  1 3 p m   Monday Friday Short Courses                                 376 8806  TELL A GRAF DISSPLA                       376 2663 Shuttle Bus Service                            376 3068  1 3 p m  Tuesday  Thursday System Status  recorded message                373 4927  Contract Programming                          376 1764 Tape Librarian  see Lauderdale Services  Data Base Applications                         376 1764 Text Processing Services                        376 2943  EDUNET  Liaison eee nette 373 5780 User ACCOUN         e Epp Y acepte 373 4548  Engineering Services                 376 1023  376 8153  OPERATING HOURS  CYBER  CA  Low rate CRAY  CR  MERITSS  ME  VAX  VA   M F 7 a m    4 a m  8 p m    4 a m  7 a m    midnight 7 45a m  1 30a m    8 a m    6 a m   Sat 4 a m    5 15 p m  4 a m    5 15 p m  7 a m    5 p m  7 45 a m    1 30         24 hours  Sun 4 p m    1 a m  4 p m    1 a m  4 p m    mid
15. COMMUNICATE WITH OUR  COMPUTERS    Lately  the UCC Microcomputer  HELP line has received an inordi   nately large number of calls on the  same subject  how can   get my  micro to communicate with the        BERS  The answer is that you need  some hardware and some software   Here are the details     The hardware    Communicating with UCC s CYBER or  VAX computers usually means com   municating over phone lines  To  connect your computer to the  phone system you will need a MO   DEM  Modems are devices that  translate the signals used by your  microcomputer into audio tones  which can be sent over phone  lines  Modems used over voice   grade phone lines operate at either  1200 baud or 300 baud  If you  plan on buying a 1200 baud mo   dem  be certain the modem uses  the Bell 212 protocol  The protocol  the modem uses for translating your  microcomputer s signals into audio  tones is important because there  are two incompatible protocols for  use at 1200 baud  We use the Bell  212 protocol  If you buy a 1200   baud modem that uses the Bell  202 protocol it won t work with  our computers    Not surprisingly  you have to  connect the modem to your micro   computer  This means you need a  cable to make the connection  Not  all cables are created equal  The  cable you use to connect your  printer to your micro may not work  with your modem  It is a very  good idea to get the cable for the  modem from the same place you  buy the modem and to specify  with which microcomputer the mo 
16. N parity  There are other  settings for communications param   eters that work  but seven data   bits  one stop bit  and even parity  seems to be the choice available  on nearly all communications pack   ages  You must also specify your  modem s baud rate  1200 or 300  baud    The ucc Micro group maintains  a communications package called  COM that is optimized to talk to  our mainframes  CYBER and VAX    Because COM is designed to com   municate with the CYBER and the  VAX  you need not specify any  communications parameters except  baud rate  You can also use COM  to transfer disk files from your mi   crocomputer to and from our main   frames    Many of the general purpose  communications programs can also  be used to transfer disk files to and          our mainframe computers  But  since a general purpose program  does not know what kind of com     March 1984          puter it is talking to  you must give  the program some hints about how  to send  or receive  a file  When  you send a file to the CYBERs  the  first step is to put the CYBER into  record everything I send you mode   You do this by typing the TEXT  command  On the vAX the equiva   lent command is CREATE  Once the  host computer is recording  you tell  the micro to list  out the serial  port  the file you are sending  After  the file has been sent  you tell the  host computer to stop recording by  typing a control c  for the CYBER    or a control z  for the           Capturing information from the  mainframe w
17. Notes    NEW RESEARCH CLUSTER    We have installed our fourth public  research cluster in 130 Experimen   tal Engineering  The room is open  during regular consulting hours  10  a m  to 4 p m   and 7 to 9 p m    Monday through Friday  Although  the door is locked at all other  times  you may use the terminal  cluster by asking the input output  room staff in 131 Experimental to  unlock it  The     station is open  from 8 a m  to midnight Monday  through Friday  from 8 a m  to 4  p m  Saturday  and from 4 p m  to  midnight Sunday  The terminal                      3   3  2400 baud HASP 612  376 5880  4800 baud HASP 612  3    Exhibit 1  RBF phone numbers     WATCH YOUR ASTERISKS  Due to a CYBER system change ef   fective March 18  you can no  longer use asterisks as non separa   tors on procedure calls  In any  procedure calls that include aster   isks in parameters  you must en   close the parameter in dollar signs   For example  you must change  BEGIN STAT  XYZ     to  BEGIN STAT   XYZ      See WRITEUP  CHANGE  for more in   formation     cluster is available during all these  hours    This cluster contains three vT 100  terminals  One is equipped with  graphics that allow it to emulate a  series 401X Tektronix terminal  All  three are part of a network that  allows you to access either the CA  or the VAX system at 9600 baud    Our other clusters are located in  69 Physics  25 Blegen  and 14  Folwell  WRITEUP LABS  includes lab  hours and related information  We  charge an ad
18. adratic  and integer pro   gramming system is designed to be    22     User log in to the system   matlab     lt MATLAB gt   VERSION OF 03 19 82    HELP IS AVAILABLE     lt  gt            2 3  4 5 6     3   6   0      1 3  4 5  4 atan 1       1 3000  8000     1 3000   8000  3 1416              2 6732   1 9463    0268     lt  gt    2 exit   TOTAL FLOPS  ADIOS    Exhibit 1  A sample MATLAB program     useful to a wide range of users  It  was developed by Professor Linus  Schrage of the University of Chi   cago    LINDO can solve small to medium  size problems within a fixed work   space  Documentation is the User s  Manual for LINDO  published by the  Scientific Press  670 Gilman Street   Palo Alto  California 94301   415 322 5221   You can examine a  non circulating copy in the UCC  Reference Room  140 Experimental  Engineering  A HELP command is  available and summarizes the other  commands  The command    LINDO  begins execution of the program     3 1416    7 8 0 gt        Exhibit 2 shows a sample LINDO  session  It solves a two variable   two constraint linear programming  problem  User inputs are in lower  case after the question mark  prompt character    We have also created a special  version of LINDO that has an op   tional FORTRAN interface  Chapter  11 of the LINDO User s Manual  provides some further information  about this FORTRAN interface  The  command to execute this special  version is    LINDOUS  filename    where filename is the name of a  file that must conta
19. ditional  1 55 connect  hour for use of these terminals to  offset the cost of establishing and  maintaining the clusters     March 1984    76 5842       Programming Languages  M77  VERSION 2 5    In our previous report  UCC News   letter  September 1983  on M77 ver   sion 2 4 FORTRAN compiler valida   tion  we stated that m77 had five  uncorrected validation errors  Only  one remains in M77 version 2 5   which you can access with the  control statement    FUTURE M77     This future version will replace ver   sion 2 4 on March 18    M77 still requires that files other  than or in addition to the standard  INPUT  TAPES  INPUT  OUTPUT   TAPE6 OUTPUT must be on the PRO   GRAM statment  since M77 does not  open files dynamically  In addition   the maximum record length for any  FORMATTED OPEN statement in a pro   gram must be specified at least  once in the PROGRAM statement in  the form  file   maximum record  length    The following validation errors in  version 2 4 have been corrected in  version 2 5       Lower bound expressions  i e    more than a simple name or  constant  in adjustable dimen   sions are now correctly com   puted        Character expressions  concatena   tions  are allowed in the vo for   mat position or FMT  specifier       Substringed concatenation ele   ments are allowed in vO lists  and or as actual arguments    e Adjustable dimension array  names may be in the ENTRY  statement dummy argument lists  that occur after the adjustable  dimension declaration 
20. he Micro  HELP line  376 4276     IMS Journal    SIR USERS GROUP    This month s meeting of the sIR Us   ers Group will be held at 3 30  p m   Wednesday  March 21  in  128 Management Economics on the  west bank of the Minneapolis  campus     The EDUNET Connection    The University of Minnesota is a  member of and a supplier for EDU   NET  an international computing  network for colleges  universities   research organizations  and not for   profit companies    Through EDUNET  you can access  a vast selection of computer   assisted instructional materials  ex   tensive data bases  and advanced  research hardware and software   These resources can be accessed  with almost any portable or non   portable  printing or non printing  computer terminal  microcomputers   and word processors with commu   nications capabilities    A guide to EDUNET  called the  Resource Directory  lists programs  and services available through  EDUNET in these subject areas         agriculture and agricultural eco    nomics   business and economics   chemistry   computer assisted instruction   data base management and infor    mation retrieval systems   electronic mail and conferencing   engineering   English   graphics   home economics and food sci    ence   life sciences   mathematics and mathematical   programming       modeling and simulation       psychology and education       sociology  political science  and  history        statistics      text processing and editing    For a copy of the Resource
21. ily handle the current load  and  to be able to handle a 25 percent  increase with no degradation in re   sponse time    Tables of active interactive termi   nals  large job  755 000 octal  re   sponse time in seconds  and CPU  use are given for Thursday  January  19  and Friday  January 27  On  each day about 125 000 sRU units    March 1984    MACHINE CA PERIOD FROM THURSDAY    ACT    INDICATES MIMINUM DURIN  M    06 36 00  84 01 19  TO FRIDAY  IIME SHARING TERMINALS  PERIOD    INI    02 22 47  84 01 20     ATES MAXIMUM DURING A PERIOD    CHARACTER INDICATES MAXIMUM COLUMN FOR THIS GRAPH  MAX   122  MIN   o     11 t 13                   Ze        mozosomn       01  2    14       MACHINE CA PERIOD FROM THURSDAY    4 15  LARGE JOB AVE   TIME MEASURED FROM CARR  LARG   MAX      21  x22  tI                ROLLIN BEGINS    OG 52 41  84 01 19  TO FRIDAY 02 54 38  81 01 20     CPU UTILIZATION      INCLUDING SUBSYSTEMS AND CPU MONITOR   SYSTEM UTICIZATI                                             SYSTEM          FOR THIS GRAPH  o          Table 1  CA Use   January 19  1984    of use were generated and over  100 simultaneous interactive users  were active at 3 p m  The 845  provides response times under half  a second during 95 percent of the  day  but at certain times  10 11 30  a m  and 1 30 4 30 p m    it may  slow to two second response dur   ing a 12 minute period  Our sys     tems group hopes to alleviate this  congestion by fine tuning the sys   tem and by returning a PPU and 
22. in the relocata   ble code for the USER and NEWIP    March 1984       subroutines previously compiled by  the FIN compiler  When you enter  the LINDO USER command  LINDO  calls the routine USER  NEWIP is  used only for integer programming  problems  If you don t provide a  NEWIP routine  a non fatal UNSATIS   FIED EXTERNAL loader message ap   pears  but you can ignore this if  you don t use integer programming   Direct further questions about  LINDO to our HELP line  376   5592   Mike Frisch     NEW EDITION OF IMSL    We will replace the international  Mathematical and Statistical Library   IMSL  version 9 0 with version 9 1  on all CYBER systems  March 20   1984  You can access IMSL as a  user library with the control state   ment     FETCH IMSL V   compiler name     where compiler name is MNF  FTN   FTN5  M77  or Pascal    A machine retrievable writeup is  available on the CYBERs  To obtain  an index of this writeup  execute  the control statement     WRITEUP IMSL     The following is a list of changes  to individual routines in IMSL edi   tion 9 1     Old routine is adequate  but com   putations are affected in some  cases  Errors in source code cor   rected   GTDDU LSVG1 LSVG2 MDBIN  MDCHN MMLIND USHHST    USWCV  USWFV  Old routine is not adequate in  some cases  Errors in source code  corrected       5    2 DVCPS    MDBETA MDTNF              RSMITZ    GGAMR  IQHSE  MMBSIR     NAFRE  SSRBLK 2  31      If you encounter any problems  when you use IMSL  call our HELP   line 
23. n exhibiting some error messages  in version 2 4  we were surprised  several times as we made the vali   dation suite  For example  after di   agnosing several source statements  that began with digits  i e   thinking  that M77 was compiling data   M77  was supposed to put out the error  message NO MORE ERROR MESSAGES   but did not do so since the mech   anism to turn off all error messages  was evoked before this last mes   sage was issued  In a number of  cases  trying to get a specific error  message from M77 made the com   piler give up on a mode error  We  have corrected all these mode error  cases  have rewritten the IMPLICIT  statement to allow CHARACTER  lengths to be constant expressions   have made the END statement exe   cutable  i e   it may have a useful  label on itself   and are producing  better execution code for certain  constant subscript references to ad   justable dimensions    We want to thank those who re   ported M77 bugs to us  since your  information and source decks were  put to good use in producing the  latest version  We hope this is  another step forward in the produc   tion of a robust  standard conform   ing  error diagnosing FORTRAN com   piler that helps you produce results  for your problems quickly and ac   curately     Janet Eberhart and  Lawrence Liddiard     21       H     t  t  1  H  f          P  t  F     f        f       Math  amp  Statistics  Packages    TSP CHANGES    On January 25  we modified the  CYBER TSP program on the CA and 
24. night 4 p m    midnight 24 hours  PUBLIC LABS   TWIN CITIES CAMPUS  Location Batch Interactive Micro Location Batch Interactive Micro  East Bank West Bank  BlegH 25             160 X X BlegH 90 X  CentH X BlegH 140 X  ComH X MdbH X  DiehlH 270  207 X OMWL 2 X  EltH 121  125 X SocSci 167 X  EItH N640 X  FolH 14  14a X X  X  LindH 26 X X St  Paul  MechE 308 X  Physics 69   BaH X  SanfH X ClaOff 125 X X  TerrH X  VincH 4 X  WaLib 204 X      Research cluster  access to CYBER CA and VAX VMS  X in interactive column indicates access to MERITSS    March 1984    27          i     i              i        LR    Contents    The CYBER 845  First Month s Use  Computer Crime Will Be Prosecuted  CRAY News   COS CFT UPGRADE MARCH 18                CYBER Notes   SUPIO DISAPPEARS MARCH 17                 WATCH YOUR                5                     Terminal Notes   NEW RESEARCH        5                           Programming Languages   M77 VERSION 2 5  Math  amp  Statistics Packages   TSP CHANGES    ob Sees hib need aces   MATLAB  MATRIX INSTRUCTIONAL PACKAGE      LINDO  LINEAR PROGRAMMING PACKAGE      NEW EDITION OF     5                         Utility Programs   CRAY                                             CYBER DRESS  irse    Michael M  Skow  Acting Director    The UCC Newsletter is published monthly by the University  Computer Center  Deadline for articles is the 10th of the  month preceding publication  deadline for short  announcements is the 15th  The Newsletter is edited and  c
25. oded for typesetting at the Computer Center  then typeset on  a Linotron 202 and printed at the University of Minnesota s  Printing and Graphics Arts Department        28    Telenet                                             23  Microcosm   HOW TO GET YOUR MICRO TO COMMUNICATE   WITH OUR                 5                   24   U OF M MICRO USERS GROUP               25  IMS Journal   SIR USERS                                        25  The Edunet Connection                          25  Grants for Research   BILINGUAL EDUCATION                      25  Computer Store   COMPUTER PAPER FOR PRINTERS             26  All Systems Bulletins   HOLIDAY HOURS                            26  The Classifieds   FOR SALE       rotes es 26    Comments  suggestions  articles  and announcements should  be directed to the editor  227 Experimental Engineering   612   376 1491     The University of Minnesota adheres to the principle that all  persons should have equal opportunity and access to facilities  in any phase of University activity without regard to race   creed  color  sex  national origin  or handicap     Copyright 1984 University of Minnesota  Permission to copy  is hereby granted  provided that proper acknowledgement is  given     Nonprofit Org   U S  Postage    PAID    Minneapolis  Mn     Permit No  155       RSITY ARCHIVES         55   n WALTER LIB lt ArY  UNIVERSITY OF MINNESOTA  EAST BANK    117 PLEASANT STREET SE       MINNEAPOL IS    March 1984    
26. on suite  the 415 error messages  produced during compilation were  completely tested in version 2 5   This testing consisted of a 415 sub   program validation suite in which  each subprogram isolated a specific  error message for the different  source language conditions that  produce that error  This validation  suite then allowed us to produce  an accurate error message writeup  and handout that explains and pro   vides examples for each M77 error  message  This writeup is called  M77ERRM  The messages are listed  in alphabetical order and all varia   ble names have been moved from  the beginning to the end of the  message  That is  messages have  been changed from     CAUTION  name  NOT SET  to  CAUTION NOT SET ABOVE  name     Many messages have been  reworded  especially if more con   cise terminology existed in the ANS  FORTRAN standard  Thus  M77 uses  ASSIGNMENT for REPLACEMENT  STATE   MENT LABEL for STATEMENT NUMBER   ADJUSTABLE DIMENSION for VARIABLE  DIMENSION  and OPTION for PARAME     TER  A review of the ANS FORTRAN  standard produced additional M77  non standard error messages for  source usage that did not conform  to the standard  In a number of  cases where M77 produced two or  more different messages for the  same error condition  error mes   sages were deleted or subsumed  into the best message  We have  added new messages that we think  should help you  but they may sur   prise you when you first try the  new version    Although we expected difficulty  i
27. orks in an analogous  fashion  You put the microcomputer  into record mode  tell the main   frame to list the file  and  when  the file transfer is complete  turn  off record mode  The advantage of  using COM over a package such as  PC Talk or CrossTalk is that COM  automatically issues commands to  enter record mode and list files     Fitting the pieces together    To make sure you end up with a  system that works  it is crucial that  you actually try the hardware and  software you plan to use  Some  communications programs will only  work with specific modems or se   rial interface cards  For information  about hardware and software that  the micro group has tested  call the  Micro HELP line  376 4276   10  a m  to noon and 2 to 4 p m    Monday through Friday  or stop in  at the Micro Research Lab  125  Shepherd Labs  during HELP line  hours   Mark McCahill     U OF M MICRO USERS GROUP    Our March meeting will be at 3 15  p m   Thursday  March 8  in 133  Physics  Cathy Interdonato of Sen   sor Based Systems Metafile will dis   cuss this data base manager    On Thursday  April 12  Gary  Johnson will discuss and demon   strate LOTUS 1 2 3  This meeting will  take place at 3 15 p m  in 125  Science Classroom Building         May  Dale Archibald  editor of  the monthly Computer User  will  speak on how to choose  telecommunications software  Hear    March 1984    him on Thursday  May 10  3 15  p m   in 555 Diehl Hall    For more information about any  of these programs  call t
28. re   preneurs breaking into various com   puter systems around the country   At the same time  we must re   member that hacking can be a  crime  The State of Minnesota has  laws on the books concerning  computer damage and computer  theft  For your information  we in     March 1984    clude them here in Exhibit 1    Just as it is illegal to steal some   one s wallet or checkbook  it is il   legal to steal a user number  Just  as it is illegal to break into a  home or a store  it is illegal to  break into a computer system    Computers provide us with useful  tools and pleasant diversions  But  as in any job or game  rules exist  by which everyone must abide  If  you break the law  you will be  prosecuted        19    ATAN ARTE EE EARE E A        M    WRITEUP RBF    RBF is currently operational and    CYBER Notes  SUPIO DISAPPEARS MARCH 17    2400 baud UT200  4800 baud UT200 612  376 5959    612  376 5864    SUPIO  a UCC written program from  the early 1970s  has provided the  University with user operated re   mote job entry  RJE  terminals  But  the two terminals that SUPIO sup   ports   UuNIVAC 1004s and Control  Data UT200s   have been or are  being removed  We are replacing  them with HASP workstations  Thus   after many years of faithful service   SUPIO will retire    Its replacement is RBF  Remote  Batch Faciity   a Control Data  product  RBF supports HASP multi   leaving workstations and emulators     and UT200 terminals and emulators      We are currently looking into
29. ue to the large MT PRUs required  for incremental dumping of user  files for backup     Lawrence A  Liddiard     25                                             deste uel    5     i     t  i             Computer Store  COMPUTER PAPER FOR PRINTERS    Are you tired of carrying around  heavy boxes of computer paper   Do you like to use microcompu   ters  but every time you arrive at  your favorite micro lab  the printers  are out of paper  We have an easy  solution for you  your own paper  supply in a convenient  portable  amount    The ucc Computer Store now  has 9 1 2 by 11 inch tractor feed  paper with disaperf  laser  edges    available in shrink wrapped pack   ages of 250 sheets  This superb pa   per was previously sold only by  the box  2650 sheets   Both are  available at the Store    You can purchase items from the  Computer Store with your user ac   count number  a departmental jour   nal voucher  cash  or check  The  Store  located in 20 Experimental  Engineering  373 4877   is open  from 9 a m  to 4 30 p m   Monday  through Thursday  and from 9 a m   to 3 p m   Friday     All Systems Bulletins    HOLIDAY HOURS    UCC will maintain its normal oper    ating schedule on Monday  March   19  an official University holiday at  the Twin Cities campuses     The Classifieds  FOR SALE    Noise isolation and protective cover  for any dot matrix printer  with ac   cesory text stand  New   125  jour   nal voucher or cash  373 3137        26    March 1984       PHONE NUMBERS        
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
Ville de Libourne  Critical Capabilities for Mobile BI  Naza for Multi-Rotor User Manual  HT-IDE3000 User's Guide  Viewing - Maretron  Epson PictureMate Deluxe Viewer Edition Compact Photo Printer Start Here Card  Inno Slide 2100  CX109 4-1/2” METAL CUTTING BAND SAW WITH  Manuel d`instruction  Manuale Utente IONIC NRG per APRILIA RSV4    Copyright © All rights reserved. 
   Failed to retrieve file