The Container Story: Run Your Apps and Tools Natively on Cisco Boxes

Total Page:16

File Type:pdf, Size:1020Kb

The Container Story: Run Your Apps and Tools Natively on Cisco Boxes The Container Story: Run your apps and tools natively on Cisco boxes Per Jensen, [email protected] June, 2015 • Fast feature delivery – independent from “My Stuff” network OS release cycle • Custom feature delivery – “for me only” • Integration into existing/custom tool chains • Security domains – isolate “my stuff” from network OS Network Element Customization: Examples DataCenter - DevOps Service Provider IoT Enterprise • DevOps Configuration • Custom analytics/stats • Single device hosting for • Custom analytics (e.g. Automation Toolchain aggregation networking and non- brownout analysis) Integration • Custom VPN networking functions – • Integration with (Puppet, Chef, Ansible, • Custom routing incl. DNS- , DHCP- , SIP Enterprise apps (Unified CFEngine, ..) • Service chaining intercept, load balancing, Comms) • Linux tools (e.g. Ganglia) • Custom OS AP-light, OOB • Custom routing (e.g. • Custom scripts in Python (combining open-source management proxy,… military) and vendor-source) • Protocol gateway (for • Custom traffic protocols used in manipulation different embedded deployments) • Custom routing (e.g. active-active) • Linux-tools Towards An Eco-System For Customization Cisco • Empower Cisco-Services, ISV/Partners, • Deliver Network Architecture & Network Element Customers to innovate and customize • Feature rich, optimized, secure software stack • Services and support • Custom feature delivery independent Customer from Network OS software release • Deploy & Manage Network Element cycle • Deploy Business Functions • Examples: Customer • Automated management (tools/scripts) requires new capability • Automated system visibility • Automated fault detections Cisco Partner Customer • Proprietary business and networking implements new capability functions Customer • … deploys new capability Linux Containers • A Linux container lets you run a Linux system within another Linux system. Zones • A container is a group of processes on a Linux machine. • Those processes form an isolated environment. • Inside the container, it looks like a VM. • Outside the container, it looks like normal processes running on the machine. • It looks like a VM, but it is more efficient: Containers = Lightweight Virtualization Containers are almost like Virtual Machines • Containers have their own network interface (and IP address) • Can be bridged, routed... just like with Xen, KVM etc. • Containers have their own filesystem • For example a Debian host can run Fedora container (and vice-versa) • Security: Containers are isolated from each other • Two containers can't harm (or even see) each other • Resource Control: Containers are isolated and can have dedicated resources • Soft & hard quotas for RAM, CPU, I/O... Containers and Virtual Machines App A App A’ App B Containers are isolated but share OS and where Bins/ Bins/ Bins/ VM appropriate bins/libraries Libs Libs Libs Guest OS Guest OS Guest OS App App App App App App Container A A’ B B’ B’ B’ Hypervisor (Type 2) Bins/Libs Bins/Libs Control Container Host OS Host OS Server Server Containers: Classes of Use-Cases Extend Network Network Web-Scale Function Elements’ Micro-Services Virtualization Functionality Motivation: Containers on Network Elements • Network OS Independence • System Modularity • Limit kernel dependencies • Enable multiple constituents to provide for device enhancements • Cisco Development, Cisco Services, Partners, Customers, … • Leverage existing tools/tool-chains and eco-systems • Integration of network device with server-centric tool chains • Isolation / Security • Application-focused deployment, as opposed to base-OS focused deployment (“escape dependency hell”) Containers for network elements: Enabling Plugins • Virtualized environment to host “applications” on a Cisco device. Customer ISV Cisco Apps Apps Apps • Wide range of “applications” – shell, virtual services, plugins… • Applications can be developed and release independent from Network OS release cycles Plug-in 1 Plug-in 1 • Application Examples: Plug-in 2 Plug-in 3 v1.17 v2.13 • Cisco Virtual Services: • Integrated Appliance: ISR4451X-WAAS (KVM) Container Container Container • Linux shell: Guest shell (LXC) • Cisco Plugins: • Features with decoupled release cycles: Puppet Plugin, Chef Plugin (LXC), Network OS Splunk universal forwarder plugin • Third Party Services Container Network Models Shared Dedicated Applications inside the container appear as applications Applications inside the container appear as appliances on a subnet running natively on the host reachable from the host Examples: Nexus 3k, 9k, Cat 3k, 4k, Titanium Examples: ASR 1k, CSR 1kv, ISR4k, ISR 819 Container 1 Container 2 Container 1 Container 2 Network namespace: Host Network namespace: Host Network namespace: N1 Network namespace: N2 Container interfaces Container interfaces Container interfaces Container interfaces eth0 eth1 eth2 eth0 eth1 eth2 veth0 veth1 veth2 veth0 veth1 veth2 Shared namespace: Linux Bridge Interfaces are directly mapped to container VPG Multiple bridges and virtual topologies possible Host platform Host platform Forwarding Plane Network namespace: Host Network namespace: Host eth0 eth1 eth2 eth0 eth1 eth2 Physical interfaces Physical interfaces Containers On Network Elements: High-Level Architecture On Linux-based systems API/onePK Virtual Service (container) IOSd vman NXOS libvirt • Packet Connectivity libcontainer • Storage • Console/Logging Application Manages • Resource Control packaged as virtualization System • Separate Namespace .ova infrastructure Processes and virtual service lifecycle Host User Space (install, activate, …) Host Kernel OVA - Open Virtual Appliance Apps Configuration for the virtual environment (E.g., Puppet, • Amount of host resources for the guest Chef, …) • Guest storage • Network interfaces OVA is a • Package manifest tarball of these files • Authentication Certificate • Disk image (.iso) • File systems Virtual Service Deployment Workflow: Hosted Service Deployment Model router#virtual-service install name Install <app_name> package <file_uri> Service router#interface VirtualPortGroup1 ip address 3.3.3.1 router#virtual-service Un-Install Configure 255.255.255.0 uninstall name <app_name> Service Service router#virtual-service <app-name> interface virtualPortGroup1 ip address 3.3.3.2 profile app-model-1 router#virtual-service Upgrade Start upgrade name <app_name> Service Service package <file_uri> router#virtual-service <app-name> activate router#show virtual-service connect Manage Monitor router#show log Service Service router#show virtual-service global router#show virtual-service list router#show virtual-service detail name <app-name> router#show virtual-service utilization name <app-name> See also: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sdn/command/openflow-cr-bookmap/cr-virtual-services.html Guest Shell as a virtual service EEM and Guest Shell: EEM triggers Guest Shell commands/scripts as actions Enable enhanced EEM event detectors Run Guest Shell command when applet triggers Towards An Open Ecosystem For Network Components “Cisco” “Open Packages” “Reference Ecosystem” Cisco focused apps Cisco + 3rd-party packages Cisco + 3rd-party packages + reference environment Orchestration & “Open” Lifecycle Management 3rd Controller NOS NOS NOS NOS Container Container Container Container Container OS/Linux OS/Linux OS/Linux Linux Linux Switch/Router Switch/Router Switch/Router 3rd-party Device 3rd-party Server Integration Plugins Guest Shell Portable Network Components (Puppet, Chef, OpenFlow,…) In Open Reference Environment Open Application Container: Developer Perspective • Common Environment for Network Functions Orchestration & Life-cycle management • Physical Router/Switch - Virtual Router/Switch • Server/Application (incl. “Controller”) … … • Common Development Experience Load/ • Linux-style programming experience Logging “App” Unload • Typical networking functions available to developer as integrated libraries HA Scale • Distributed/Centralized/Combined NFs Storage Update • Common Runtime Experience • Run network function at the most optimal place in Data- Fwd’ing Routing Comms Topology … the network (device, controller, application server), Plane API Control Control (NC-NC) depending on NF’s needs (performance, scale, Hooks into network functions (local/remote) ease of use) Container • Open Ecosystem / Open-Source Operating Data-Plane Network System (HW/SW) Control Plane Summary • Containers as a tool to complement the OS of the network element • Fast feature delivery – independent from network OS release cycle • Enable custom feature delivery – “for me only” • Tool to provide for easy integration into existing/custom tool chains • Security domains – isolate “my stuff” from network OS • Deployment examples • Integration tools (Puppet, Chef, .. plugins) • Guest-Shell • Network Applications (Distributed Network Analytics, Self Learning Networks, …) ISR 4000 Architecture and Virtualization C97-732576-00 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 Cisco ISR 4000 Family I/O Design Management Interface Front-Panel GE Network Interface Modules Optional Drive NIM for out-of-band control plane . RJ45/SFP GE Interfaces (NIMs) Embedded Applications Larger and more powerful connection directly to a . RAID 1 for data protection . PoE+ available on some than EHWICs . Single HD (future) and management network models . Up to 8 ports per module dual SSD options . DSPs directly on modules Enhanced Service Modules USB Connections . Compatible with Cisco® ISR G2
Recommended publications
  • ••••It•• G981 &911651, Elateferyl
    DOC~D:j 4009J726 TOP SICRIT WaJUOl!JWaJl1 t?l!CBl!JrnVU~ £iJl]l!WIB~ (r(!JllJU ~(51]Uj~(5 ~" W15allDl5 f WaJUJ~l1wrnlD J / P . L . 86-36 . WHEN CENSORSHIP BACKFIRES ....... ; .. ;~ .... James Killough .. ,/. , 0 ••••• 1 IDESKPAD: A PROGRAMMER' s TOOL •••• _1:: :\ :: ,_,------!: <:; ·::::: ~ ,________ __, ,; .••••• 9 IN PRAISE OF SOLITS ..................... Louis C. Grant .... •...... 12 NOTES ON BLUE RUSSIAN .................. ~ f ...... 12 NATIONAL CRYPTOLOGIC SCHOOL OFFERS COURSE-EQUIVALENCY TESTS ..................................... 13 'f'lllS B00tiM~N'f eoN'FAtlNS CJOBIW9RB MAt'l'IRIAtL et J2 J t.1 BlltN8A/elle88 (N81'/e88M 111-1) ••••It•• G981 &911651, Elateferyl .TOP SECRET Bedawif) tfpou Nuliluiliw b1 tile 81 .... eclassified and Approved for Release by NSA on -10--1-1-20'1.2 pursuant to E.O. '13526. vlDR Case# 54778 DOCID: 4009726 TOP SECRET Published Monthly by Pl, Techniques and Standards, for the Personnel of Operations VOL . II , No • 11 NOVEMBER 1975 PUBLISHER WILLIAM LUTWINIAK BOARD OF EDITORS Editor in Chief ............ Arthur J. Salenune (5642s) Cryptanalysis ...•.......... .__ ______.ltlW25s} · · P.L. 86- 36 Language .•.....••.......... Emery W. Tetrault (5236s) Machine Support. ......... · I t33zl.~) Special Research ........... Vera R. Filby (7119s) Traffic Analysis .•.••..•••• Frederic 0. Mason, Jr. (4142s) For individual subscriptions send name and organizational designator to: CRYPTOLOG, Pl TOP SECRET DOCID: 4009726 'fOP SECRET t:rl'.4RRA Jiitt;J. GIZll!ll bww. 86-36 Theodore Shabad is one of the preeminent Ameri­ "director of a-plant," and another was a per­ can experts on Soviet physical and economic geogra­ son identified as First Secretary of "a City phy. He is the author of Geogruphy of the USSR Committee of the Communist Party." Both were (1951), Basia Industr>ial Resources of the USSR members of the Central Committee of the Tadzhik (1969), and China's Changing Map (1972).
    [Show full text]
  • 1. Introduction
    Network Operating Systems Partha Dasgupta Department of Computer Science and Engineering Arizona State University Tempe AZ 85287-5406 USA [email protected] [Note: Written in 1997, Appeared in Encyclopedia of Electrical Engineering] 1. Introduction Network Operating Systems extend the facilities and services provided by computer operating systems to support a set of computers, connected by a network. The environment managed by a network operating system consists of an interconnected group of machines that are loosely connected. By loosely connected, we mean that such computers possess no hardware connections at the CPU – memory bus level, but are connected by external interfaces that run under the control of software. Each computer in this group run an autonomous operating system, yet cooperate with each other to allow a variety of facilities including file sharing, data sharing, peripheral sharing, remote execution and cooperative computation. Network operating systems are autonomous operating systems that support such cooperation. The group of machines comprising the management domain of the network operating system is called a distributed system. A close cousin of the network operating system is the distributed operating system. A distributed operating system is an extension of the network operating system that supports even higher levels of cooperation and integration of the machines on the network (features include task migration, dynamic resource location, and so on) (1,2). An operating system is low-level software controlling the inner workings of a machine. Typical functions performed by an operating system include managing the CPU among many concurrently executing tasks, managing memory allocation to the tasks, handling of input and output and controlling all the peripherals.
    [Show full text]
  • NWG/RFC# 752 MRC 2-Jan-79 01:22 Nnnnn a Universal Host Table
    NWG/RFC# 752 MRC 2-Jan-79 01:22 nnnnn A Universal Host Table Network Working Group Mark Crispin Request for Comments 752 SU-AI NIC nnnnn 2 January 1979 A Universal Host Table ABSTRACT: The network host table in use at MIT and Stanford is described. This host table is superior to the NIC and Tenex host tables in several ways. A binary file, compiled from this host table, is also described. This file is used by subsystems on MIT's ITS and Stanford's WAITS timesharing systems for efficiency in host and network lookups. HISTORY: As with many other sites on the Arpanet, we found the NIC's host table unsuited to our needs. Part of the problem was because the NIC host table was often inaccurate and all too often failed to include several nicknames in common usage in our communities. In addition, the NIC host table's format was awkward for user programs to use, especially those which wanted to have the host table mapped into memory in some sort of structured binary form for efficient lookups. Finally, the NIC host table neglects to include some essential information. The ITS host table was originally designed to be compiled along with a network handling program (MIDAS, the PDP-10 assembler used, has a pseudo-op to insert a file into an assembly). In order to make the host table palatable to the assembler, every comment line began with a semicolon, and every actual data line began with the word HOST. Each program which used the host table defined HOST as an assembly macro before inserting the host table into the assembly.
    [Show full text]
  • Multics Extended I Mail System . User's Guide
    HONEYWELL MULTICS EXTENDED I MAIL SYSTEM . USER'S GUIDE SOFTWARE MULTICS EXTENDED MAIL SYSTEM USER'S GUIDE SUBJECT Tutorial Introduction to the Multics Extended Electronic Mail System SPECIAL INSTRUCTIONS Refer to the Preface for ttSignificant Changes". This document supersedes Order No. CH23, Revision 0, dated September 1981. The manual has been extensively revised. Change bars in the margins indicate technical changes and additions; asterisks denote deletions. This manual assumes basic knowledge of the Multics system provided by the 2-volume set, New Users' Introduction to Multics - Part I Order No. CH24 and Part II Order No. CH25. SOFTWARE SUPPORTED Multics Software Release 10.1 ORDER NUMBER CH23-01 February 1983 Honeywell PREFACE The purpose of this manual is to help you become familiar with the Multics extended electronic mail system. This manual provides you with an illustrated discussion of the print mail and read mail commands for receiving mail, the send mail command for creating and sending mail, and a large variety of useful requests and control arguments to aid you in utilizing the full capacity of the extended mail system. Readers are expected to know the Multics concepts and terms described in the 2-volume set, New Users' Introduction to Multics (Order Nos. CH24 and CH25). These two manuals are referred to throughout this manual as the New Users' Intro - Part I and Part II. Also very useful is the Qedx Text Editor Users' Guide (Order No. CG40) which is referred to as the Qedx Users' Guide. Section 1 of this manual introduces the Multics extended mail system. Section 2 reviews the print_mail command.
    [Show full text]
  • Langley Vedit for Nos/Ve Usage Manual
    NASA Technical Memorandum 100499 LANGLEY VEDIT FOR NOS/VE USAGE MANUAL M. A. HEANEY SEPTEMBER 1987 {NASil-T@-700499) LANGLEY VLDIT FOR NOS;/VE N87-38098 USAGE MANUAL [NASA) 40 p Avail: NTLS HC A03/MF A01 CSCL 1)gd Uncla s i;3/61 0103541 National Aeronautics and Space Administration LMlgleyResestchCecllW Hampton. Virginia 23665 RELATED MANUALS XEDIT Version 3 Reference Manual. Control Data Corporation Publication Number 60455730, 1984. Langley XEDIT Reference Manual. Central Scientific Computer Complex Documentation N-7a, 1984. SCL Language Definitionflsage. Control Data Corporation Publication Number 60464013, 1986. SCL System Interfaceflsage. Control Data Corporation Publication Number 60464014, 1986. SCL Quick Reference. Control Data Corporation Publication Number 60464018, 1986. SCL Advanced File Managementflsage. Control Data Corporation Publication Number 60486413, 1986. i CONTENTS INTRODUCTION ........................ 1 AUDIENCE ....................... 1 VEDITFEATURES .................... 1 REFERENCE MANUALS CONVENTIONS ............. 1 CALLINGVEDIT ....................... 3 INITIATING VEDIT ................... 3 INTERACTIVE USAGE OF VEDIT .............. 3 VED IT CONVENTI ONS ..................... 4 VEDIT COMMAND SYNTAX ................. 4 ENTERING EDITING DATA ................. 4 POSITIONING THE FILE POINTER ................ 5 LOCATING LINES VIA SPECIFIED STRINGS ......... 5 ADVANCING AND REVERSING THE POINTER .......... 5 POSITIONING POINTER AT TOP AND BOTTOM OF THE FILE ... 5 POSITIONING POINTER BY LISTING LINES ......... 6 STRINGEDITING
    [Show full text]
  • Multics Technical Bulletin MTB-424 To: Distribution From: Steve Webber Date: 08/28/79 Subject: Multics on ADP -- Software Releas
    Multics Technical Bulletin MTB-424 To: Distribution From: Steve Webber Date: 08/28/79 Subject: Multics on ADP -- Software Release 10.3 EPS-1 Attached is a draft of the Software EPS-1 for Multics ADP. Several assumptions are made that may not be valid. These are: - There will not be an absolute requirement for object level compatibility of user programs. This deviation from the standard compatibility constraint is not limited to the removal of read-alter-rewrite but also includes formats of bit offsets as stored in pointers; changes to IDCW formats; and clock reading. - The first customer ship CFCS) release of ADP will be 3082. The performance of Multics on ADP for first customer ship is not important to worry about (since we can not compare it to nonexistent data on the current hardware it is silly to project a required comparative performance level). - The simultaneous execution of the Functional Test System (FTS) (on-line T&D running under its own operating system in the mainframe) and Multics under control of some form of hypervisor is not necessary for first customer ship (i.e., the hypervisor is not part of the first system shipped). Multics Project internal working documentation. Not to be reproduced or distributed outside the Multics project. Page 2 MTB-424 INTRODUCTIO!J This EPS describes the major changes planned for the Multics software so that it will run on the ADP hardware. There are unavoidable incompatibilities that will result from the current plan but it is assumed that these are acceptable. The incompatibilities are occasionally reflected to user programs.
    [Show full text]
  • The Standard NOS/VE Documentation. If You Have Any Questions Or Suggestions, Please See Tom Mcgee Or Bonnie Swierzbin
    1 Nas IV E Cy c I e 3 He' pf u I Hi n t s 05/24/82 CYCLE 3 HELPFUL HINTS Tbis paper describes helpfu1 hints on hOM to use Cycle 3 of NOS/VE. It Is intended to supplement, rather than to replace, the standard NOS/VE documentation. If yOU have any questions or suggestions, please see Tom McGee or Bonnie Swierzbin. Appendix o lists background documents and hOM to obtain them. To obtain additional copies of this document white running on SNIOI at Arden Hills, please typel SES,INT1.lISTHINTS Ca(number of copies> To obtain a copy with revision bars against the Helpful Hints ~f the previous build (for Cycle 3, THIS IS NOT RECOMMENDED BECAUSE OF EXTENSIVE REFORMATTING), one can type l SES,INT1.lISTHINTS REVS Ca(number of copies> The C parameter is optional and defaults to one. Date Changes 12122/80 Revisions for NOS/VE Phase C 2/12181 Additional Revisions for NOS/VE Phase C 6/09/81 Revisions for NOS/VE Build N 6/19/81 Additiona. Revisions for NOS/VE Build N 8/28/81 Revisions for NOS/VE Build 0 11106/81 Revisions for NOS/VE Build P 3/01182 Revisions for NOS/VE Build Q 4/15/82 Revisions for NOS/VE Cycle 2 5/01/82 Revisions for NOS/VE Cycle 3 Cycle 3, May 1982 1-1 NOS/VE eyc'. 3 Helpful Hints 05.124/82 1.0 MAJOR CHARACTERISTICS Of THIS BUILD o At Build Q the command names were updated per OAP ARH4776.
    [Show full text]
  • TOPS-10 PSI User's Guide AA-CKB1 A-TB
    TOPS-10 PSI User's Guide AA-CKB1 A-TB February 1985 This manual describes how to write programs that transfer data over a Public Packet Switching Network (PPSN). The manual also describes how to gain access to a TOPS-10 host through a PPSN. OPERATING SYSTEM: TOPS-10 V7.02 SOFTWARE: DECnet-10 V3.0 GALAXY V4.1 TOPS-10 PSI Gateway V1.0 TOPS-10 PSI Gateway Access Libraries V1.0 Software and manuals should be ordered by title and order number, In the United States. send orders to the nearest distribution center, Outside the United States. orders should be directed to the nearest DIGITAL Field Sales Office or representative, Northeast/Mid-Atlantic Region Central Region Western Region Digital Equipment Corporation Digital Equipment Corporation Digital Equipment Corporation PO Box CS2008 Accessories and Supplies Center Accessories and Supplies Center Nashua, New Hampshire 03061 1050 East Remington Road 632 Caribbean Drive Telephone :(603)884-6660 Schaumburg, Illinois 60195 Sunnyvale. California 94086 Telephone:(312)64o-5612 Telephone:(408)734-4915 digital equipment corporation. marlboro. massachusetts First Printing, February 1985 © Digital Equipment Corporation 1985. All Rights Reserved. The information in this document is subject to change without notice and should not be construed as a commitment by Digital Equipment Corporation. Digital Equipment Corporation assumes no responsibility for any errors that may appear in this document. The software described in this document is furnished under a license and may only be used or copied in accordance with the terms of such license. No responsibility is assumed for the use or reliability of software on equipment that is not supplied by DIGITAL or its affiliated companies.
    [Show full text]
  • C ENTER UNIVERSITY COMPUTER CENTER, UNIVERSITY of MINNESOTA-TWIN CITIES, MINNEAPOLIS, MINNESOTA
    uNIYERSITY CoMPUTER c ENTER UNIVERSITY COMPUTER CENTER, UNIVERSITY OF MINNESOTA-TWIN CITIES, MINNEAPOLIS, MINNESOTA CONTENTS~------------- BULLETINS~------------- CYBER NEWS p. 10 ~DON'T FORGET THE USER'S MEETING! ! ! ! ! ! Mane on the pnopo~ed Cyben 74 enhanc.ement TUESDAY, FEBRUARY 14TH TIMESHARING p. 11 1200 baud notani~ to be pnovided; 1:15 - 4 PM in6oJtmiLUon on a.c.c.~~ pnoc.edwr.~, ROOM 370 ANDERSON HALL, WEST BANK a.ppnoxhna.te c.o~u UCC STAFF MEMBERS WILL BE PRESENT TO ANSWER FTN p. 11 QUESTIONS. FTN3 c.ompiten witt be dnopped in THE MAJOR TOPIC WILL BE THE PROPOSED AUG­ June; c.onvent yowr. pnogna.m~ a.nd MENTATION OF THE CYBER 74 {SEE THE ARTICLE da.ta. 6il~ ON PAGE 10}. RJE p. 11 SUPTO ~~ti~ 6on 1977 a.va.ita.bfe COFFEE AND COOKIES WILL BE SERVED. on a. WRITEUP doc.ument FROM THE DESK p. 12 U~en·~ meeting, MNF, EVUCOM inq~~ (M6twa.Jz.e nequ~u. ChemEng wonk6hop) PDP-11 p. 12 Communic.a.tio~ ~o6twa.Jz.e developed, in6oJtma.tion nequ~ted LAUDERDALE REORGANIZATION p. 12 Computen noom neonga.niza.tion, betten I/0 ~envic.e, mane o6fiic.e ~pa.c.e, modi6ic.a.tio~ to ~tona.ge Mea. SYSTEM 2000 p. 13 DOCUMENTATION p. 13 USAGE SUMMARIES p. 14 n a w_s_le..tie r ll_CIVOLUME II12 NUMBER 2 ~F-E~B-R-U-AR~Y-,--1-9~7-8- OPERATIONS p. 15 Vinec.ton: Pet en C. Patio n SHORT COURSES p. 16 Eddon : A. Koepke CommenU a.bout the c.ontent o6 t~ new~fetten, o!t Vea.dfine 6M the MMc.h ~-6ue ~ Febnua.ny 22 Mgg~tio~ 6M c.hang~ ma.y be dinec.ted to the eddon, 235a.
    [Show full text]
  • VM/SP Introduction.Pdf
    GC19-6200-1 File No. S370/4300-20 Program Product GC19-6200-1 File No. S370/4300-20 IBM Virtual Machine/ System Product: Program Product Introduction Program Number 5664-167 Release 2 -----~- - i::~~ Second Edition (April 1982) This edition, GC19-6200-1, is a reV1S10n of GC19-6200-0. It applies to the IBft Virtual ~achine/System Product (5664-167) until otherwise indicated in new editions or ~echnical Newsletters. Changes are continually made to the information contained herein; before using this publication in connection with the operaticn of IBft systems, consult the IB~ 2:i2tem/370 and .!!300 f!:~.§§£!§ Bibli.£g~, GC20-0001, for the editions that are applicable and current. For a list of changes, see page iii. Technical changes or additions to the text cr illustrations are indicated by a vertical bar to the left of the change. It is possible that this material may contain reference to, or information about, IB~ products (machines and programs), programming, or services that are not announced in your country. Such references or information must not be construed to mean that lEft intends to announce such IB~ products, programming, or services in your country. Publications are not stocked at the address given below; requests for IB~ publications should be made to your IBft representative or to the IB~ branch office serving your locality. A form for reader's comments is provided at the back of this publication. If the torm has been removed, comments may be addressed to IB~ Corporation, Programming Publications, Department G60, P.O. Box 6, Endicott, New York, U.S.A.
    [Show full text]
  • Kednos PL/I for Openvms Alphatm Release Notes for Version 4.4B And
    Kednos PL/I for OpenVMS Alphatm Release Notes for Version 4.4B and Runtime Library Version 4.4B This manual provides release information on Kednos PL/I Version 4.4B for OpenVMS Alpha, a software language and the associated Runtime Library Version 4.4B. Revision/Update Information: This is a new manual. Operating System and Version: For Kednos PL/I for OpenVMS Alpha: OpenVMS Alpha Version 6.2 or higher Software Version: Kednos PL/I Version 4.4 for OpenVMS Alpha Published by: Kednos Corporation, Pebble Beach, CA, www.Kednos.com May 2004 Kednos Corporation, makes no representations that the use of its products in the manner described in this publication will not infringe on existing or future patent rights, nor do the descriptions contained in this publication imply the granting of licenses to make, use, or sell equipment or software in accordance with the description. Possession, use, or copying of the software described in this publication is authorized only pursuant to a valid written license from Kednos Corporation or an anthorized sublicensor. No responsibility is assumed for the use or reliability of software on equipment that is not listed as supported in the Product Description. Copyright Kednos Corporation, 1980-2004. All rights reserved. Copyright ©1980-2004 The following are trademarks of Hewlett Packard Company: Alpha, AXP, DEC, DECnet, DECtalk, DECUS, Digital, IVP, MicroVAX, OpenVMS, RMS, RMS-11, RX50, TK50, VAX, VAX Ada, VAX BASIC, VAX BLISS, VMScluster, CDD Repository, VAX COBOL, VAX DATATRIEVE, VAX DIBOL, VAX DOCUMENT, VAX FORTRAN, VAXinfo, VAX MACRO, VAX Pascal, VAX SCAN, VAXset, VAXTPU, and the DIGITAL logo.
    [Show full text]
  • UNIVERSITY of MINNESOTA COMPUTER CENTER Deadstart Systems Newsletter
    UNIVERSITY OF MINNESOTA COMPUTER CENTER Deadstart Systems Newsletter 6 November 1979 Vol. 5 No. 21 Send all comments, criticisms and contributions to the editor: T. W. Lanzatella, University Computer Center, 2520 Broadway Drive, Lauderdale, MN 55113. The University of Minnesota is an equal opportunity educator and employer. TABLE OF CONTENTS NOTICE OF CHANGES TO THE SYSTEM • 167 PROPOSED CHANGES TO THE SYSTEM • 169 TSF OR MNF - W. T. Sackett • • • 169 TIME LIMITS AND SRU LIMITS - W. T. Sackett • • 169 NEW STATISTICAL PACKAGES - S. P. Yen . • . 170 CLEAN UP ENTER AND NOTE - K. Fjelsted •• • 170 ERROR IDLE - K. C. Matthews • 171 APL PROPOSAL - T. Hodapp • 172 SYSTEM l1AINTENANCE 174 LAST WEEK'S SYSTEMS GROUP MEETING- T. W. Lanzatella • • • • 174 CALLPRG AND LIBRARY TAPE NEWS - M. Riviere • • • • • 175 A FAIRLY CONFUSING DESCRIPTION - M. Riviere • • • • • • • 175 CALLPRG PRODUCTS ON THE 720 - M. Riviere • • • . • • • • • 178 CYBER DEADSTART DUMP ANALYSIS - J. J. Drummond 178 CYBER 720 DEADSTART DUMP ANALYSIS - R. A. Williams 179 TELEX AND TELEX PDP-11 CRASH ANALYSIS - D. W. Mears • • 180 NOTICE OF CHANGES TO THE SYSTEM Arnie Nelson added two new site codes to SUPIO, 8H and 8J. Kevin Fjelsted altered RETAIN processing in PFILES so~that the error processing bit in the FET is cleared during the file copy. This change insures that if the file copy bombs, say for a track limit, then the user will get the error message. Greg Jensen changed the SRU weighting factor for mag tape positioning operations from two to one, thus halving the cost of tape positioning. Kevin Matthews installed the following changes.
    [Show full text]