IBM Time-·Sharing System/360 Concepts and Facilities
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Wang Laboratories 2200 Series
C21-908-101 Programmable Terminals Wang Laboratories 2200 Series MANAGEMENT SUMMARY A series of five minicomputer systems that Wang Laboratories' 2200 Series product line currently offer both batch and interactive communica consists of the 2200VP, 2200MVP, 2200LVP and tions capabilities. 2200SVP processors, all of which are multi-user or multi user upgradeable systems. The 2200 Series product line Emulation packages are provided for standard also includes the 2200 PCS-I1I, a packaged system which Teletype communications; IBM 2741 emula is single-user oriented. tion; IBM 2780, 3780, and 3741 batch terminal communications; and IBM 3270 The CPU and floppy disk drive are packaged together interactive communications. with appropriate cables and a cabinet to produce an integrated system. The 2200 PCS-I1I includes the CPU, A basic 2200PCS-1II with 32K bytes of user CRT, keyboard and single-sided double density memory, a CRT display, and a minidiskette minidiskette drive in a standard CRT-size enclosure as drive is priced at $6,500. Prices range well as an optional disk multiplexer controller. The upward to $21,000 for a 2200MVP proc number of peripherals that can be attached to a given essor with 256K bytes of user memory, system depends on the number of I/O slots that are excluding peripherals. Leases and rental plans available, with most peripherals requiring one slot. In all are also available. 2200 Series CPUs, highly efficient use of memory is achieved through the use of separate control memory to store the BASIC-2 interpreter and operating system. CHARACTERISTICS Wang began marketing the original 2200 Series in the VENDOR: Wang Laboratories,lnc., One Industrial Avenue, Spring of 1973. -
SH20-9062-2 VSPC FORTRAN Terminal Users Guide 197809
SH20-9062-2 VSPC FORTRAN Program Product Terminal User's Guide Program Number 5748-F02 ------- -- -= -=-=- --- -------·-- - - ----- - Page of SH20-9062-2 As Updated July 10, 1979 By TNL SN20-9303 fhird Edition (September 1978) This edition, as amended by technical newsletter SN20-9303, applies to Release 1 of VSPC FORTRAN, program product 5748-F02, and to any subsequent releases until otherwise indicated in new editions or technical newsletters. Information pertainipg to Release 2 of VSPC is for OS/VS2 MVS and OS/VSl only. The changes for this edition are summarized under "Summary of Amendments" foil owing the list of figures. Specific changes are indicated by a vertical bar to the left of the change. These bars will be deleted at any subsequent republication of the page affected. Editorial changes that have no technical significance are not noted. Changes are periodically made to the information herein; before using this publication in connection with the operation of IBM systems, consult the latest IBM System/3 70 Bibliography, GC2~00 l, for the editions that are applicable and current. Publications are not stocked at the address given below; requests for IBM publications should be made to your IBM representative or to the IBM branch office serving your locality. A form for reader's comments is provided at the back of this publication. If the form has been removed, comments may be addressed to IBM Corporation, P. 0. Box 50020, Programming Publishing, San Jose, California, U.S.A. 95150. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation whatever. -
CA Top Secret for Z/OS Control Options Guide
CA Top Secret® for z/OS Control Options Guide r15 Ninth Edition This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the “Documentation”), is for your informational purposes only and is subject to change or withdrawal by CA at any time. This Documentation is proprietary information of CA and may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. If you are a licensed user of the software product(s) addressed in the Documentation, you may print or otherwise make available a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print or otherwise make available copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION, LOST PROFITS, LOST INVESTMENT, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH LOSS OR DAMAGE. -
Vol. V. Computer Processing Support by James L
LARS Contract Report 112978 __ 1 Final Report Vol. V. Computer Processing Support by James L. Kast 'fl!ad Mv1rabiId 00&r NAMA spft~ortlD in the interest of early and wide dis. Principal Investigator sen!intion of Earth Resources Survey D. A. Landgrebe Program information and without liabiliY for any use made thereof." November 1978 (g79-10165) COMPUTER PROCESSING SUPPORT, N79"r21520 VOLUME5 Final Report 1 lDec. 1977-30 Nov. 1978 (Purdue Univ4 - 157 p-HC.A08/f0 onci4s A01 CSCL 09B G3/4,3 001!65 Prepared for National Aeronautics and Space Administration Johnson Space Center Earth Observation Division Houston, Texas 77058 Contract No. NAS9-15466 Technical Monitor: J. D. Erickson/SF3 Submitted by Laboratory for Applications of Remote Sensing Purdue University West Lafayette, Indiana 47907 * .2 bovernment Accession No. 3. Recipient's Cetalnq No 112978 1 4 Title and Subtitle 5. Report Date November 1978 Computer Processing Support 6. Performing Organization Code 7. Author(s) 8. Performing'Organization Report No James L. Kast 112978 10. Work Unit No. 9. Performing Organization Name and Address Laboratory for Applications of Remote Sensing Purdue University 11, Contract or Grant No West Lafayette, Indiana 47906 NAS9-15466 13. Type of Report and Period Covered 12. Sponsoring Agency Name and Address Final Report 12/1/77-11/30/78 J. D. Erickson/SF3 14. Sponsoin Ageoc Code NASA/Johnson Space Center -- Houston, Texas 77058 15. Supplementary Notes D. A. Landgrebe was LARS principal investigator. 16. Ab7rcct Over the past seven years ten agencies and institutions scattered throughout the central and eastern sections of the United States have accessed and utilized the data processing facilities and software located at Purdue University's Laboratory for Applications of Remote Sensing (LARS) for technology transfer and research purposes. -
IBM VM/370 (CMS) Terminal User's Guide for FORTRAN IV Program Product Program Products
SC28-689M IBM VM/370 (CMS) Terminal User's Guide for FORTRAN IV Program Product Program Products TfogiantTNTOniDere »73fl-rv 5734-FO^ 5734-F03 5734-LM1 5734-LM3 •V-. /•* - .' ' ^' i SC28-6891-1 IBM VM/370 (CMS) Terminal User's Gluide for FORTRAN IV Program Product Program Products Program Numbers 5734-F01 5734.FO2 5734-F03 5734-LM1 5734-LM3 U.iiversfty of London Computer Centre 20, Guilford Street, London, VV.C, 1, r hiNTRET LIBRARY No. NOT to bo removed from Cantrs'ffl Premsses LiLe; PageofSC28-6891-0,-l Revised May 13,1977 By TNL SN20-9225 Second Edition (April 1975) This edition, as amendedby technicalnewslettersSN20-9201 and SN20-9225, appliesto Release 1.0 of the IBM Virtual Machine Facility/370 (VM/370) (CMS). This edition is a reprint of SC28-6891-0incorporating changes released in Technical Newsletters SN28-0609 (dated March 1,1973) and SN28-0620 (dated January 3,1974). Changes are listed in the Summary of Amendments, Number 3, on the facing page. Information in this publication is subject to significant change. Any such changes will be published in new editions or technical newsletters. Before using the publication, consult the latest/RM Systeml360Bibliography, GC20-0360, or IBMSystemf370Bibliography, GC20-0001, and the technical newsletters that amend the particular bibliography, to learn which editions are applicable and current. Requests for copies of IBM publications should be made to your IBM representative or to the IBM branch office that serves your locality. Forms for readers* comments are provided at the back of this publication. If the forms have been removed, address comments to IBM Corporation, P. -
OS Structures and System Calls
COS 318: Operating Systems OS Structures and System Calls Kai Li Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Outline Protection mechanisms OS structures System and library calls 2 Protection Issues CPU Kernel has the ability to take CPU away from users to prevent a user from using the CPU forever Users should not have such an ability Memory Prevent a user from accessing others’ data Prevent users from modifying kernel code and data structures I/O Prevent users from performing “illegal” I/Os Question What’s the difference between protection and security? 3 Architecture Support: Privileged Mode An interrupt or exception (INT) User mode Kernel (privileged) mode • Regular instructions • Regular instructions • Access user memory • Privileged instructions • Access user memory • Access kernel memory A special instruction (IRET) 4 Privileged Instruction Examples Memory address mapping Flush or invalidate data cache Invalidate TLB entries Load and read system registers Change processor modes from kernel to user Change the voltage and frequency of processor Halt a processor Reset a processor Perform I/O operations 5 x86 Protection Rings Privileged instructions Can be executed only When current privileged Level (CPR) is 0 Operating system kernel Level 0 Operating system services Level 1 Level 2 Applications Level 3 6 Layered Structure Hiding information at each layer Layered dependency Examples Level N THE (6 layers) . MS-DOS (4 layers) . Pros Level 2 Layered abstraction -
CA Top Secret R16 Security Target
CA Top Secret r16 Security Target ST Version: 1.0 August 18, 2017 3333 Warrenville Road Suite 800 Lisle, IL 60532 Prepared By: Cyber Assurance Testing Laboratory 304 Sentinel Drive, Suite 100 Annapolis Junction, MD 20701 Security Target CA Top Secret r16 Table of Contents 1 Security Target Introduction ................................................................................................................. 6 1.1 ST Reference ................................................................................................................................. 6 1.1.1 ST Identification ................................................................................................................... 6 1.1.2 Document Organization ........................................................................................................ 6 1.1.3 Terminology .......................................................................................................................... 7 1.1.4 Acronyms .............................................................................................................................. 8 1.1.5 References ............................................................................................................................. 9 1.2 TOE Reference .............................................................................................................................. 9 1.3 TOE Overview ............................................................................................................................. -
CICS Essentials Auditing CICS – a Beginner’S Guide
CICS Essentials Auditing CICS – A Beginner’s Guide Julie-Ann Williams Mike Cairns Martin Underwood Craig Warren ii CICS ESSENTIALS Foreword by Brian Cummings A thorough Audit Guide for CICS is something that is long overdue. This document provides a wealth of information about CICS, its operations, and its various resources and capabilities along with audit guidelines and recommendations. Various documents on AuditNet and other sources have taken a stab at parts or all of CICS, but are likely not up to date or sufficiently complete. CICS largely remains an environment that holds its mysteries against auditors and security officers alike. The results of poor understanding can lead to dangerous levels of unidentified risk to the applications and sensitive information of entities that use the power of CICS for critical business applications. Unlike any other environment, CICS security implementations fail in the first place because all of the security control is often only focused on transactions. Transactions are many levels of resources removed from the data files and data bases they query or update. In the end, we see the greatest level of security established for the least sophisticated technical users – end business users, and the least security facing the most technically sophisticated – the CICS sub-system programmer and the CICS Application programmer. For example, it is typical to leave FCT resources unsecured and to allow the CICS regions to have total rights to the data sets they access. This condition gives sub-system and application programmers full-reign to use CICS utilities to inherit the CICS regions’ authorities and gain full access to freely browse and update data. -
402197 350 System Manual.Book
350 Cable Survey System System Manual Covers DeepView Software Version 5.x.x and Firmware Version 3.7 TSS (International) Ltd 1, Garnett Close Greycaine Industrial Estate Watford, Herts, WD24 7GL Telephone +44 (0)1923 470800 Facsimile +44 (0)1923 470842 24 hr Customer Support +44 (0)7899 665603 e-mail: [email protected] The information in this Manual is subject to change without notice and does not represent a commitment on the part of TSS (International) Ltd Document P/N 402197 Issue 2.4 abcdef January 2008 1 9 9 3 THE QUEEN'S AWARD FOR EXPORT ACHIEVEMENT Contents CAUTIONARY NOTICE This System Manual contains full installation and operating instructions and is an important part of the 350 System. This Manual should remain easily available for use by those who will install, operate and maintain the System. WARNINGS and CAUTIONS Where appropriate, this Manual includes important safety information. Safety infor- mation appears as WARNING and CAUTION instructions. You must obey these instructions: ❐ WARNING instructions alert you to a potential risk of death or injury to users of the 350 System. ❐ CAUTION instructions alert you to the potential risk of damage to the 350 System. For your convenience, the Table of Contents section includes copies of all the WARNING and CAUTION instructions contained in this Manual. Technical Support and contact information TSS (International) Ltd 1 Garnett Close, Greycaine Industrial Estate, Watford, Herts, WD24 7GL Tel: +44 (0)1923 470800 Fax: +44 (0)1923 470842 Out of UK Hours Technical Helpline: +44 (0)7899 -
Document Composition Facility and Document Library Facility General
GH20-9158- 2 File No. 5370-34 Document Composition Facility and Document Library Facility Program Product General Information Program Numbers 5748-XX9 5748-XXE This publication was produced using the IBM Document Composition Facility (program number 5748-XX9) and the master was printed on the IBM 3800 Printing Subsystem. Second Edition (September 1979) This is a major revision of, and makes obsolete, GH20-9158-0, and its technical newsletter, GN20-9289. This edition applies to Release 2 of the Document Composition Facility and the Document Library Facility, Program Products S748-XX9 and S748-XXE, and to any subsequent releases until oth erwise indicated in new editions or technical newsletters. It incorporates information formerlY contained in Document Library Facility: General Information, GH20-9163-0, and its technical newsletters GN20-9274 and GN20-9290. The changes for this edition are summarized under "Summary of Amendments" following the preface. Because the technical changes in this edition are extensive and difficult to localize, they are not marked by___ ver-!.L~al_ bars Ul._the left -margi n. Changes are periodically made to the information herein; before using this publication in connection with the operation of IBM systems, consult the latest IBM System/370 Bibliography, GC20-0001, for the editions that are applicable and current. It is possible that this material may contain reference to, or information about, IBM products (machines and programs), program ming or services which are not announced in your country. Such references or information must not be construed to mean that IBM intends to announce such IBM products, programming or services in your country. -
Technical Services Attachment for Technology Support Services (TSS)
Technical Services Attachment IBM Deutschland GmbH for T echnology S upport Services (TSS) Offerings Using this Attachment, Client may order TSS offerings from IBM. Additional details are provided in Transaction Documents (TDs). The agreement in place between the parties (CRA or equivalent) referenced in the signature block, this Attachment, and TDs are the complete agreement regarding TSS transactions hereunder. 1. Services IBM will provide Services, as described in this Technical Services Attachment for TSS Offerings (Attachment) and Statements of Work (SOW), Transaction Documents, and Change Authorizations (collectively Transaction Documents or TDs), to support Client’s Eligible Machines and Eligible Programs (collectively Eligible Products). This Attachment replaces all other previously accepted versions of this Attachment for the Client named in the signature block, as to new transactions dated after the effective date of this Attachment. IBM will identify Eligible Products, Specified Locations (entire information processing environment, or a portion thereof, at multiple sites or a single building), hours of coverage selected, applicable Services, and the contract period, in TDs. Additional details may be documented in the TD, as applicable to the specific transaction. Client may place service requests 24x7, by voice or electronically, however IBM will begin servicing the request during the applicable entitled coverage days and hours. Coverage is based on the time zone where the Eligible Machine is located. IBM provides Services during the hours of service selected in the Transaction Document. Eligible Machines must meet IBM’s safety and serviceability requirements. Any IBM inspection for maintenance eligibility is subject to a charge. IBM reserves the right to inspect a Machine within one month from the start of Service. -
Norco College Technology Committee Meeting 12:50Pm-1:50 P.M
Norco College Technology Committee Meeting 12:50pm-1:50 p.m. CSS 219 December 13, 2017 MINUTES Present Absent Ruth Leal (Co-Chair) Cathy Brotherton (CIS/BEIT) Damon Nance (Library) Kim K. Kamerin (AHWL) Daniel Lambros (IMC) Deven Fafard (ASNC) Sergio Quiroz (ASNC) Daren Koch (Tutorial) Lenny Riley (DOI) Guest James Finley (CIS/GAM) Ricardo Aguilera (TSS) Janet Frewing (Math) Mike Angeles (TSS) Mitzi Sloniger (COMM) Frank Martinez (TSS) Vanessa Acosta (A&R) 1. Call to Order 12:50 p.m. 2. Consent Calendar- Ruth Leal a. October 19, 2017 Minutes were reviewed. b. November 9, 2017 Minutes were reviewed. Motion (Finley/Frewing). Two abstentions. Approved. 3. Technology Plan – Ruth a. Subcommittees Report - Ms. Leal provided an update regarding the subcommittees. i. Goal #6 – Phase II computers were not all installed in the summer as reported and an email has been sent to all of the users to see if their computer was replaced or still needs to be replaced. Responses are slow but the committee will continue to follow-up. TSS will use the computers in inventory which were purchased for this in last year’s resource allocation process. TSS reported that there were 53 computers in the warehouse after installation of the podium computer project. The Phase II list was shared with Business Services and TSS in the September 2017. The committee will be updated on this in the spring. The Technology Principles and Guidelines were updated to reflect the prioritization process and new template approved by the Technology Committee. The committee reviewed the document. Motion (Acosta/Sloniger).