The West Bank Buffer

Total Page:16

File Type:pdf, Size:1020Kb

The West Bank Buffer n THE WEST BANK BUFFER West Bank Computer Center University of Minnesota SUMMER EDITION 1973 BLOCK TIME USERS checking out a key from Hugh Smith or Helen Nelson in 93c Blegen Hall. A new policy allows block time users to run, connected to the 6600, on Sunday nite between 4:00 p.m. and mid­ FISCAL YEAR ENDS night. All persons interested in ALL ACCOUNT -NUMBERS WILL becoming qualified block time operators CLOSE UNLESS RENEWED on the 3200 should contact Hugh Smith or Helen Nelson in 93c Blegen Hall. All 3200 and 6600 account numbers will Remember, if you have taken the block become invalid on July 1. You must time course but have not operated in renew existing accounts in order to the last six months, your qualifica­ continue storing tapes at Lauderdale tion has lapsed and you must requalify. or to maintain disk pack space reserv­ ed under the old number. SUMMER HOURS The forms are even simpler to fill out than last year so hurry down to 93c Summer hours are identical to spring Blegen and pick one up from Helen. hours. We will be open on Saturdays. The schedule is reprinted below. NIFTY MOD PROVIDES ~29 CAPABILITY Mon - Fri 8:00 a.m. - 12:00 midnight Sat 8:00 a.m. - 2:00 p.m. Tom Berg has implemented an ~29 to ~26 conversion routine as part of our The center will be closed on Wednes­ IMPORT package. Thus it is now possible day, July 4 for a Civil Service to read cards punched on an IBM 029 holiday. keypunch without converting them. From a users point of view, this modifica­ tion is identical to one available at TIME SHARING LAB Experimental Engineering. The write-up from U.C.C. Notes and Comments is The West Bank instructional time reprinted here to provide documentation. sharing lab is available during summer sessions. Any instructor who wishes to use the MERITSS system for a class 029 KEYPUNCH CARD INPUT related project should contact Hugh Smith. The time sharing lab is The installation standard for the Exp located in 167 Social Sciences tower Eng & West Bank remote station is the and its hours are as follows: 026 keypunch card input. The user may override this standard to select 029 Mon - Fri 8:30 a.m. - 4:30 p.m. keypunch card input by punching con­ secutively the characters 2 and 9 into Additional hours may be scheduled by providing a room monitor and -2- ' 029 KEYPUNCH CARD INPUT (cont'd) minus, asterisk, and slash. columns 79 and 80 of his J~B card or Caution to 029 F~RTRAN users: The use any 7/8/9 end-of-record card. The of the apostrophe ' to denote hollerith newly selected keypunch mode then re­ strings is nonstandard F~RTRAN and is mains in effect until the end of the acceptable only to the MNF compiler. job or until it is reset by the charac­ ters 2 and 6 consecutively punched into Hollerith Card Conventions table is on columns 79 and 80 of a 7/8/9 end-of­ page 3. record card. The user may correctly read an input file of records having consecutive or alternating keypunch CRTFTN TWEAKED AGAIN modes by punching 26 or 29 on appro­ priate 7/8/9 cards preceding the CRTFTN is now disguising itself as a corresponding 026 or 029 records. If real live compiler by sneakily calling columns 79 and 80 of a 7/8/9 end-of­ FORTRAN on its own. This saves a lit­ record card is blank or does not contain tle more time and provides a simple the character pair 26 or 29, the pre­ one control card call to process CRTFTN viously selected keypunch mode or the programs. The parameter list on the 026 default mode is used. CRTFTN card now includes these options L,X,~,F which are described below: The particular conversion of 029 card codes to CDC display code that has been L if present causes a CRTFTN listing implemented on our system is described to be produced. in the attached table. This mapping was designed to enable F~RTRAN, SN~ ,X = ii specifies the file to which BOL, and C~B~L users of the IBM/360 executable binary will be writ­ to run their card programs on the CDC ten by the FTN compiler. De­ 6600 without any major repunching of fault is ii = 56. cards. Since many of the 029 keyboard characters are not directly available ,~ = jj file ordinal of output from CRT­ in the CDC 6600 63 character set (par­ FTN and input to FTN ticularly those needed in SN~B~L) the Default jj = 54 conversion maps 029 card codes into the corresponding display code substi­ ,F = i if i = 0 no FTN call made tutes which are generally accepted by i = 1 generates FTN, I=jj ,X=ii CDC 6600 compilers. i = 2 generates FTN, I=jj ,X=ii,L i = 3 generates FTN, I=jj ,X=ii,L,M Often, minor changes must be made in i = 4 generates FTN, I=jj ,X=ii, an 029, IBM/360 program deck in order L,M,A to be compatible with the CDC 6600 Default is i = 2 compilers. For example, in a F~RTRAN program, a program card may be a nec­ ,I = kk specifies that ordinal or unit essary addition in order to declare files from which CRTFTN input is read. used in the program. This additional Defaults to input card must either be punched on an 029 machine or punched by an 026 machine ,999999 The size of the array IDATAW. simulating an 029 machine. In the This array holds literal strings latter case, the attached table of produced by define statements. comparative punch codes may be quite Thus the array can be eliminated useful. The punches made by both if no define statements are used. keypunch machines are identical for many of the most common keyboard characters including the alphabetic, the numeric, and the comma, period, -3- West Bank Computer Center Hollerith Card Conventions CDC Display 63-Character 029 Hollerith Hollerith Set Keyboard (026) (029) 01 A A 12-1 12-1 Identical thru thru thru thru thru 11 I I 12-9 12-9 12 J J 11-1 11-1 Identical thru thru thru thru thru 22 R R 11-9 11-9 23 s s 0-2 0-2 Identical thru thru thru thru thru 32 z z 0-9 0-9 33 0 0 0 0 Identical thru thru thru thru thru 44 9 9 9 9 45 + + 12 12-8-6 46 11 11 47 11-8-4 11-8-4 Identical * * 50 I I 0-1 0-1 51 ( ( 0-8-4 12-8-5 52 ) ) 12-8-4 11-8-5 Identical 53 $ $ 11-8-3 11-8-3 54 8-3 8-6 55 blank blank no punch no punch or 6-8 or 0-8-2 Identical 56 (comma) (comma) 0-8-3 0-8-3 57 ' (period) ' (period) 12-8-3 12-8-3 60 - 0-8-6 11-8-2 or 11-0 61 ¢ 8-7 12-8-2 or 12-0 62 (underline) 0-8-2 0-8-5 Identical 63 (colon) : (colon) 8-2 8-2 64 ~ I (apostrophe) 8-4 8-5 65 .... ? 0-8-5 0-8-7 66 v 11-0 12-8-7 or 11-8-2 67 A & 0-8-7 12 70 t II (quote) 11-8-5 8-7 71 + @ 11-8-6 8-4 72 < < 12-0 12-8-4 or 12-8-2 73 > > 11-8-7 0-8-6 74 -< II 8-5 8-3 75 > % 12-8-5 0-8-4 76 -s- .., 12-8-6 11-8-7 77 (semicolon) (semicolon) 12-8-7 11-8-6 -4- STATISTICAL CONSULTANT Ralph Krishnan will be our statistical consultant during the first summer session. He will help users who have problems with OMNITAB, BMD, or SPSS programs. Ralph will be available in room 167 Social Sciences Tower during the following time: Mon, Tu, Th 12:30 p.m. - 2:30 p.m. Weds. even. 8:00 p.m. - 11:00 p.m. Fri. 12:30 p.m. - 1:30 p.m. The night time hours are scheduled to help those extension students who have consulting problems. .
Recommended publications
  • Operating Systems
    CS101 – Fundamentals of Computer and Information Sciences – LIU 1 of 2 Operating systems OS History We covered a (slightly rambling) story about the history of operating systems. Batch computing Batch systems were extraordinarily large and expensive, so that organizations could afford at most one or two. The machines had a human operator who was responsible for scheduling tasks for the machine, in order to make best use of its (very valuable) time. • Norwich council takes delivery of its first computer –@StuartSumner • Punch cards • IBM ad feat. punched cards • Keypunch machine • IBM 704 with card reader • LEGO Grace Hopper with Univac TODO: scheduling and calculating turn-around time using First-Come First-Served (FCFS) vs. Shortest Job First. (See book section 10.4, pages 350–351.) Time-sharing When mini-computers became available (just the size of a refrigerator, not a whole room), then we could have one for each workgroup or department within an orga- nization. They were powerful enough that multiple users could share the computer at the same time, by connecting multiple terminals (keyboard and monitor) to the same machine. The job of the human operator was now automated, and this was the golden ageof operating systems. Not only did they have to schedule tasks effectively, but they had to switch efficiently among serving different users, protect those users from interfer- ing with each other’s work, and so on. Some of the operating systems developed in this era were Multics, VMS, and UNIX. • PDP-11 with Ken Thompson, Dennis Ritchie • VT-101 terminal • IBM 7090 time-sharing video • Brian Kernighan on Bell Labs (Computerphile video) 2 of 2 Prof.
    [Show full text]
  • Introduction to the New Mainframe: Z/OS Basics
    Front cover Introduction to the New Mainframe: z/OS Basics An introduction to mainframe computing on the IBM zSeries platform z/OS concepts and facilities for students and beginners zSeries hardware and peripheral devices Mike Ebbers Wayne O’Brien Bill Ogden ibm.com/ International Technical Support Organization z/OS Basics March 2005 SG24-6366-00 Note: Before using this information and the product it supports, read the information in “Notices” on page -1. First Edition (March 2005) © Copyright International Business Machines Corporation 2005. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Preface . xvii How this text is organized . xvii How each chapter is organized . xviii Acknowledgements . xix Comments welcome. xxi Part 1. Introduction to z/OS and the mainframe environment Chapter 1. Introduction to the new mainframe . 1-1 1.1 The new mainframe. 1-2 1.2 Evolving architecture . 1-2 1.3 Mainframes in our midst . 1-4 1.4 What is a mainframe? . 1-5 1.5 Who uses mainframe computers?. 1-7 1.6 Factors contributing to mainframe use . 1-8 1.6.1 Reliability, availability, and serviceability. 1-9 1.6.2 Security . 1-10 1.6.3 Scalability . 1-10 1.6.4 Continuing compatibility . 1-11 1.7 Typical mainframe workloads . 1-11 1.7.1 Batch processing. 1-12 1.7.2 Online transactional processing . 1-15 1.8 Roles in the mainframe world . 1-17 1.8.1 Who is the system programmer? . 1-19 1.8.2 Who is the system administrator? .
    [Show full text]
  • The FORTRAN Automatic Coding System J
    The FORTRAN Automatic Coding System J. W. BACKUS?, R. J. BEEBERt, S. BEST$, R. GOLDBERG?, L. M. HAIBTt, H. L. HERRICK?, R. A. NELSON?, D. SAYRE?, P. B. SHERIDAN?, H.STERNt, I. ZILLERt, R. A. HUGHES§, AN^.. .R. NUTT~~ system is now copplete. It has two components: the HE FORTRAN project was begun in the sum- FORTRAN language, in which programs are written, mer of 1954. Its purpose was to reduce by a large and the translator or executive routine for the 704 factor the task of preparing scientific problems for which effects the translation of FORTRAN language IBM's next large computer, the 704. If it were possible programs into 704 programs. Descriptions of the FOR- for the 704 to code problems for itself and produce as TRAN language and the translator form the principal good programs as human coders (but without the sections of this paper. errors), it was clear that large benefits could be achieved. The experience of the FORTRAN group in using the For it was known that about two-thirds of the cost of system has confirmed the original expectations con- cerning reduction of the task of problem preparation solving most scientific and engineering problems on 1 large computers was that of problem preparation. and the efficiency of output programs. A brief case Furthermore, more than 90 per cent of the elapsed time history of one job done with a system seldom gives a for a problem was usually devoted to planning, writing, good measure of its usefulness, particularly when the and debugging the program.
    [Show full text]
  • Chapter Three Introduction to Computer Troubleshooting
    Chapter Three Introduction to Computer Troubleshooting Welcome to the Machine Introduction to Computer Troubleshooting What are the three steps in the computer troubleshooting process? What do you do if the three steps does not solve your problem? DON’T PANIC!” When things go wrong remain calm, as most computer problems are a simple fix. Even if it is the rare serious problem, usually your data is still there waiting for you. The computer troubleshooting process at its most basic is gathering information about what is going on, drawing conclusions about the information gathered, and acting on those conclusions to solve the problem. If that does not solve the problem, then we return to the gathering information stage and go through the steps again. You might think of it as a loop which we exit when the problem is solved. At the top of the paragraph, I said that most computer problems are a simple fix and I would like you to keep that in mind as we go through this chapter. Important Words in this Chapter Cables Memory Simple-to-Complex Connectors Monitor Surge Protector CPU Motherboard System HD (Hard Drive) NIC (Network Card) Troubleshooting Input Devices Power Supply Video Card Main Troubleshooting Principle What is the principle on which we base all efficient and effective troubleshooting? All efficient and effective troubleshooting is based on the principle of proceeding from the simple-to-the- complex. Why is this true? Starting with complex items first, can cause you to draw the wrong conclusions. The complex parts of a computer depend on the simpler things.
    [Show full text]
  • NBS FORTRAN Test Programs 3^1 No "I Volume 1- Documentation for Versions 1 and 3 V.I
    j I i Vt NBS SPECIAL PUBLICATION 399 J Volume 1 U.S. DEPARTMENT OF COMMERCE / National Bureau of Standards] National Bureau of Standards Library, £-01 Admin. BIdg. ncT 1 1981 13102^1 NBS FORTRAN Test Prog Volume 1-Documentation for Versions 1 and 3 NATIONAL BUREAU OF STANDARDS The National Bureau of Standards^ was established by an act of Congress March 3, 1901. The Bureau's overall goal is to strengthen and advance the Nation's science and technology and facilitate their effective application for public benefit. To this end, the Bureau conducts research and provides: (1) a basis for the Nation's physical measurement system, (2) scientific and technological services for industry and government, (3) a technical basis for equity in trade, and (4) technical services to promote public safety. The Bureau consists of the Institute for Basic Standards, the Institute for Materials Research, the Institute for Applied Technology, the Institute for Computer Sciences and Technology, and the Office for Information Programs. THE INSTITUTE FOR BASIC STANDARI>S provides the central basis within the United States of a complete and consistent system of physical measurement; coordinates that system with measurement systems of other nations; and furnishes essential services leading to accurate and uniform physical measurements throughout the Nation's scientific community, industry, and commerce. The Institute consists of a Center for Radiation Research, an Office of Meas- urement Services and the following divisions: Applied Mathematics — Electricity — Mechanics
    [Show full text]
  • Answers to Exercises
    Answers to Exercises A bird does not sing because he has an answer, he sings because he has a song. —Chinese Proverb Intro.1: abstemious, abstentious, adventitious, annelidous, arsenious, arterious, face- tious, sacrilegious. Intro.2: When a software house has a popular product they tend to come up with new versions. A user can update an old version to a new one, and the update usually comes as a compressed file on a floppy disk. Over time the updates get bigger and, at a certain point, an update may not fit on a single floppy. This is why good compression is important in the case of software updates. The time it takes to compress and decompress the update is unimportant since these operations are typically done just once. Recently, software makers have taken to providing updates over the Internet, but even in such cases it is important to have small files because of the download times involved. 1.1: (1) ask a question, (2) absolutely necessary, (3) advance warning, (4) boiling hot, (5) climb up, (6) close scrutiny, (7) exactly the same, (8) free gift, (9) hot water heater, (10) my personal opinion, (11) newborn baby, (12) postponed until later, (13) unexpected surprise, (14) unsolved mysteries. 1.2: A reasonable way to use them is to code the five most-common strings in the text. Because irreversible text compression is a special-purpose method, the user may know what strings are common in any particular text to be compressed. The user may specify five such strings to the encoder, and they should also be written at the start of the output stream, for the decoder’s use.
    [Show full text]
  • Z/OS Basics Preface
    Contents Preface . iii How this course is organized . iii How each topic is organized . iv Part 1. Introduction to z/OS and the mainframe environment Chapter 1. Introduction to the new mainframe . 3 1.1 The new mainframe. 4 1.2 The S/360: A turning point in mainframe history . 4 1.3 An evolving architecture . 5 1.4 Mainframes in our midst . 6 1.5 What is a mainframe? . 7 1.6 Who uses mainframe computers?. 10 1.7 Factors contributing to mainframe use . 11 1.8 Typical mainframe workloads . 14 1.9 Roles in the mainframe world . 21 1.10 z/OS and other mainframe operating systems . 27 1.11 Summary . 29 Chapter 2. z/OS overview. 31 2.1 What is an operating system? . 32 2.2 Overview of z/OS facilities. 32 2.3 What is z/OS? . 34 2.4 Virtual storage and other mainframe concepts . 39 2.5 What is workload management? . 57 2.6 I/O and data management. 60 2.7 Supervising the execution of work in the system . 60 2.8 Defining characteristics of z/OS . 68 2.9 Licensed programs for z/OS . 69 2.10 Middleware for z/OS . 70 2.11 A brief comparison of z/OS and UNIX. 71 2.12 Summary . 73 Chapter 3. TSO/E, ISPF, and UNIX: Interactive facilities of z/OS . 75 3.1 How do we interact with z/OS? . 76 3.2 TSO overview . 76 3.3 ISPF overview . 80 3.4 z/OS UNIX interactive interfaces. 99 3.5 Summary .
    [Show full text]
  • Ir^Is*»?.'2R-£
    DENSITY ADD MAGNETIC FIELD MEASUREMENTS IN THE TOHHAC IV-c PLASMA ;.ir^is*»?.'2r-£ John Halter Coonrod, Jr. ^riSSKSss-*"*! Lawrence Berkeley Laboratory Berkeley, California 94720 lO DiSTmm-narLT — -iii- TABLE OF CONTENTS ABSTRACT vii PREFACE ix 1. INTRODUCTION 1 1.1 Tormac Concept 1 1.2 Tormac IV . 5 1.3 Experimental Sequence 5 1.4 Motivation for Tormac IV-c 7 1.5 Diagnostics 9 1.5.1 Table of Typical Tormac IV-c Values . 10 1.6 Questions and Conclusions 11 1.7 References 13 2. EXPERIMENTAL DATA AND ANALYSIS 15 2.1 Data Summary 15 2.2 Overall Picture 16 2.3 Spectral Measurements 17 2.3.1 Reconstruction Technique 18 2.3.4 Problems with Reconstruction ..... 24 2.3.3 Do Profiles and Density 25 2.3.4 He 4686 Profiles and Fluctuations ... 37 2.4 Thomson Scattering 44 2.5 Magnetic Measurements 48 2.5.1 Flux Exclusion 50 2.5.2 Description of Small Probes 55 2.5.3 Small Probe Data 59 2.6 Interferometer Measurements 73 2.6.1 Description and Access 73 2.6.2 Alignment and Calibration Procedure . 77 2.6.3 Analysis Technique 78 2.6.4 Radial Density Profiles 79 2.7 Overall Particle Accounting ... 79 2.8 References 105 3. EXPERIMENT LAYOUT AND CONSTRUCTION 107 3.1 Glass Vessel 107 3.2 Cusp Winding 110 3.3 Cusp Bank and Switches 113 3.4 Bias Circuit 116 3.5 Pre-ionize Circuit 116 3.6 Heater Circuit 117 3.7 Floor Plan 118 3.8 Vacuum System 118 3.9 Safety Interlocks 122 3.10 References 123 -iv- 4.
    [Show full text]
  • Lawrence Berkeley National Laboratory Lawrence Berkeley National Laboratory
    Lawrence Berkeley National Laboratory Lawrence Berkeley National Laboratory Title SOFTWARE CATALOG Permalink https://escholarship.org/uc/item/7vp4q4x1 Author Beyers, Evelyn Publication Date 2013-06-27 eScholarship.org Powered by the California Digital Library University of California LBL·l 081 1 <! . UC-4 NATIONAL RESOURCE FOR COMPUTATION "--"" IN CHEMISTRY TWO-WEEK LOAN COPY This is a Library Circulating Copy wh may be borrowed for two weeks. For a retention copy, call Tech. Divisiony Ext. 6782. Vol. 1 February 1 for the U.S. Department of under Contract W-7405-ENG-48 and the National Science Foundation under Agreement CHE-7721305 DISCLAIMER This document was prepared as an account of work sponsored by the United States Govemment. While this document is believed to contain correct information, neither the United States Government nor any agency thereof, nor the Regents of the University of California, nor any of their employees, makes any wan·anty, express or implied, or assumes any legal responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by its trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Govemment or any agency thereof, or the Regents of the University of Califomia. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof or the Regents of the University of California.
    [Show full text]
  • 2 9215FQ14 FREQUENTLY ASKED QUESTIONS Category Pages Facilities & Buildings 3-10 General Reference 11-20 Human Resources
    2 FREQUENTLY ASKED QUESTIONS Category Pages Facilities & Buildings 3-10 General Reference 11-20 Human Resources 21-22 Legal 23-25 Marketing 26 Personal Names (Individuals) 27 Predecessor Companies 28-29 Products & Services 30-89 Public Relations 90 Research 91-97 April 10, 2007 9215FQ14 3 Facilities & Buildings Q. When did IBM first open its offices in my town? A. While it is not possible for us to provide such information for each and every office facility throughout the world, the following listing provides the date IBM offices were established in more than 300 U.S. and international locations: Adelaide, Australia 1914 Akron, Ohio 1917 Albany, New York 1919 Albuquerque, New Mexico 1940 Alexandria, Egypt 1934 Algiers, Algeria 1932 Altoona, Pennsylvania 1915 Amsterdam, Netherlands 1914 Anchorage, Alaska 1947 Ankara, Turkey 1935 Asheville, North Carolina 1946 Asuncion, Paraguay 1941 Athens, Greece 1935 Atlanta, Georgia 1914 Aurora, Illinois 1946 Austin, Texas 1937 Baghdad, Iraq 1947 Baltimore, Maryland 1915 Bangor, Maine 1946 Barcelona, Spain 1923 Barranquilla, Colombia 1946 Baton Rouge, Louisiana 1938 Beaumont, Texas 1946 Belgrade, Yugoslavia 1926 Belo Horizonte, Brazil 1934 Bergen, Norway 1946 Berlin, Germany 1914 (prior to) Bethlehem, Pennsylvania 1938 Beyrouth, Lebanon 1947 Bilbao, Spain 1946 Birmingham, Alabama 1919 Birmingham, England 1930 Bogota, Colombia 1931 Boise, Idaho 1948 Bordeaux, France 1932 Boston, Massachusetts 1914 Brantford, Ontario 1947 Bremen, Germany 1938 9215FQ14 4 Bridgeport, Connecticut 1919 Brisbane, Australia
    [Show full text]
  • Part I. Part II. FORTRAN IV Language Object Time System Part III. Science
    FORTRAN IV Part I. Language Part II. Object Time System Part III. Science Library ADVANCED SOFTWARE SYSTEM Programmer's Reference Manual Iorder No. DEC-9A-AF4B-D from Program Library, Maynard, Mass. Price: $2.50 ~ct comments concerning this manual to Software Quality Control, Maynard, Mass. DIGITAL EQUIPMENT CORPORATION. MAYNARD. MASSACHUSETTS Copyright 1968 by Digital Equipment Corporation PREFACE This manual describes the FORTRAN IV language and compiler system for the PDP-9 com­ puter. It provides the user with the necessary information for writing FORTRAN programs for compila­ tion and execution with the PDP-9 Advanced Software System. The manual is divided into three parts: Basic FORTRAN Language (Part I), FORTRAN Object Time System (Part II), and the FORTRAN Science Library (Part I I I) . Part I, Basic FORTRAN IV Language, is divided into chapters as follows: Chapter 1 . Introduction Chapter 2. Elements of the FORTRAN Language Chapter 3. Arithmetic Statements Chapter 4. Control Statements Chapter 5. Input/Output Statements Chapter 6. Specification Statements Chapter 7. Subprograms Part I is intendeq to familiarize the user with specific PDP-9 FORTRAN coding procedures. Several excellent texts are available for a more elementary approach to FORTRAN programming. "A Guide to FORTRAN IV Programming, II by Daniel D. McCracken (published by John Wiley and Sons, Inc.) is recommended. Part I I, FORTRAN IV Object Time System, describes the group of subprograms that process compi led FORTRAN statements, parti cu larly I/O statements, at execution time. Part ",, PDP-9 Science Library, provides deta iled descriptions of the intrinsi c functions, external functions, subfunctions, and arithmetic routines in the PDP-9 Science Library.
    [Show full text]
  • Reference Manual IBM 29 Card Punch
    Product Reference Literature IBM Reference Manual IBM 29 Card Punch Reference Manual IBM 29 Card Punch Preface This reference manual contains the information required by a card punch operator or trainee to use the IBM 29 Card Punch efficiently. The reader is assumed to have at least an introductory knowledge of data processing. The manual describes the available models of the 29 Card Punch, operating features and procedures, special features, and 29 Card Punch programming. Seventh Edition (June 1970) This is a reprint of GA24-3332-S incorporating changes released in Technical Newsletter GN22-0337 (dated June 2, 1969). Changes are periodically made to the specifications herein; any such changes will be reported in subsequent revisions or Technical Newsletters. Requests for copies of IBM publications should be made to your mM representa­ tive or to the IBM branch office serving your locality. This manual has been prepared by the IBM Systems Development Division, Product Publications, Dept. B98, PO Box 390, Poughkeepsie, N. Y. 12602. A form for readers' comments is proVided at the back of this publication. If the form has been removed, comments may be sent to the above address. Contents IBM 29 Card Punch 5 Special Features .................................. 24 Features. .. 5 Auxiliary Duplication ............................... 24 Programs ........................................ 5 Card Insertion ..................................... 24 Card Punching ............................... " 5 Character Inhibit ................................ 24
    [Show full text]