VMS CRA Y Station Now Available It Is Now Possible to Submit Jobs Functions Closely

Total Page:16

File Type:pdf, Size:1020Kb

VMS CRA Y Station Now Available It Is Now Possible to Submit Jobs Functions Closely VMS CRA Y Station Now Available It is now possible to submit jobs Functions closely. It is implemented as a to the CRAY-1 from UCC's VAX/VMS The VMS station provides these series of commands entered in system. functions: response to the system's $ A CRAY-1 running the cos oper­ prompt. The commands look like ating system requires another -It submits jobs to the CRAY-1, VMS commands: they have pa­ computer to act as a "front-end" and returns output as a file un­ rameters and /qualifiers; they fol­ system. You prepare jobs and der the user's VMS directory. low much the same syntax and data on the front-end system, us­ -It transfers files between the interpretation rules (for example, ing whatever tools that system machines using the cos AC­ wild cards are handled correctly); provides, then submit the files as QUIRE and DISPOSE commands. and they prompt for required a batch job to the CRAY for proc­ The source of an ACQUIREd file parameters not present on the essing. Output is returned to the can be disk or tape; the desti­ command line. You can always front-end system for viewing. nation of a DISPOSEd file can recognize a station command, The software that runs on the be disk, tape, printer, or the though, because it always begins front-end machine to provide this VMS batch input queue. with the letter C. For example, communication is called a -At your option, it sends bulle­ the station command to submit a "station." tins to the terminal chronicling job to the CRAY is CSUBMIT. The Since ucc first acquired our the job's progress: staged to command to remove a job from CRAY-1 supercomputer in October CRAY, ACQUIRES and DISPOSES in the input queue is CREMOVE. Sta­ 1981 , the CYBER CA system has progress, and job completion tion commands can be used in been the front-end to the CRAY, (CINFORM command). procedure files and batch jobs. running Cray Research Incorpo­ -It lets you see if the CRAY is Station error messages look like rated's (CRI) CYBER NOS station up and what jobs are waiting VMS error messages. software product. In December for transmission to the CRAY, Alternately, the station provides 1982, CRI announced a Digital and allows you to cancel a job something called "CRAY context." Equipment Corporation VAX/VMS before it is sent (CQUEUE and After you enter the command station software product. CREMOVE commands). CRAY, you will be in a facility­ ucc has purchased and in­ -It lets you see a CRA Y status as MAIL or PHONE are facilities stalled this VMS station on its display showing your job run­ -where you can enter station VAX-11/780 system for two reasons: ning on the CRAY, its status, commands without the C preface. quotas, and resources used to -because some users prefer a None of the job status functions date (CSTATUS command). VMS to a NOS environment for works at the present time in CRAY -It lets you query the last CRAY job preparation context, however. log file message the job has -because it provided a way to The station has its own help produced while the job is still connect the machine with the facility. Within CRAY context you running (CJOB command). most graphics processing can ask for general help. Outside -It records VMS messages in the '~horsepower," but bereft of of CRA Y context, type cos job logfile so that you can output devices (the CRAY), to determine why an ACQUIRE or HELP station-command the machine weakest in proc­ DISPOSE failed. essing power, but connected to for command and parameter de­ -It supports file transmission in graphics output devices (the scriptions. At any point, inside or VAX). character blocked, binary out of CRA Y context, you can re­ blocked, and transparent spond to any prompt for informa­ In particular, we wanted to com­ modes. tion by typing HELP, and the bine the possibilities of DISSPLA choices available at that point and MNCORE that run on the CRAY will be explained. User Interface with the new DICOMED D48C high­ The sample job in the box ac­ resolution color film recorder cur­ The CRA Y station follows the id­ companying this article will help rently in preparation on the VAX. iom of the VMS system fairly you get the flavor of using the June 1983 57 CRA Y through the VMS station. Can the two machines commu­ nicate through the CRAY? Yes, in VAX Facility Improvements a limited fashion using the AC­ This example shows a person QUIRE and DISPOSE commands, We plan to have doubled the submitting a CRAY job from a VMS and the MF (mainframe identifier) VAX's disk space capacity at the terminal session. Three input files parameter. The primary restriction beginning of june, both to sup­ are involved: deckl.cos contains is that any job that attempts to port new station users and to re­ the cos control statement deck, pass files between machines I ieve the disk space shortage that program.cft contains a CFT source must have been submitted from has troubled that system in the program, and newdata.dat contains the VMS machine (MF =VA). CYBER­ last few months. the data for the CFT program. origin (MF = CA) jobs cannot We are also working to estab­ 1. The user logs-in to VMS and exchange files with the VMS lish Telenet access to the VAX checks to see the station is machine. if system for remote users. working (CQUEUE). Which Station? 2. She then TYPEs out the cos VMS CYBER and Stations The most significant advantage of JCL in deckl.cos to make sure Differences the VMS station is its job monitor­ it's correct. There is a job­ ing facilities: you can see what is name given explictly on the The VMS and CYBER stations per­ happening to your job. Beyond COS JOB card. 'ACCOUNT takes form much the same functions. that, the CYBER and VMS stations the place of the cos AC­ There are, however, some signifi­ are functionally equivalent. COUNT card allowing interac­ cant differences: Which station you decide to tive CRA Y password entry. -You have to be more security­ use will depend upon three inter­ The next three statements re­ conscious on the VAX than on related issues: your primary appli­ move any permanent dataset the CYBER. You must take a cation, whether you prefer the named DATA on the CRA Y that few extra steps to ensure that VMS or NOS environment, and might have been left over job files containing user num­ cost. from previous runs. The AC­ bers and passwords are secure. If your primary application is QUIRE gets the newdata.dat file -There are detail differences. For graphics with MNCORE or DISSPLA, from the VAX using the VMS example, a jobname is required most of our graphics output de­ station $DISK ~taging com­ on the cos JOB card, not op­ vices are connected to the VAX mand. ASSIGN makes this AC­ tional as on the CYBER. and are most easily accessed QUIREd file the FORTRAN unit -The VMS station uses the pa­ from that machine. 5 input file. CFT and LOR rameters on the ACQUIRE and System preference is a largely compile and execute. DISPOSE statements differently, subjective consideration. The VMS 3. The last preparatory step is most particularly the TEXT field. editor, EDT, does support screen to turn on the station infor­ Whereas on the CYBER the TEXT editing on VT100 or VT52-compati­ mation broadcast messages field contains a NOS job ble terminals; the CYBER has no with CINFORM. stream, on the VAX it holds screen editor. VMS is a virtual 4. She submits the job. Deckl.cos one of four station-defined memory system; the CYBER is not. and program.cft are appended with cos end-of-file marks. "staging commands" that de­ For most other functions, for ex­ /ACCOUNT (a ucc-added fea­ scribe the destination or ample a FORTRAN-77 compiler for 5. origin of the file in question, preliminary debugging, there are ture) asks for her CRAY and particulars about its approximately equivalent facilities password. 6. She the station in­ characteristics. on both systems. examine~ Comparing costs between the put queue with CQUEUE. Documentation described later in Now the broadcast messages CYBER and the VAX is difficult: 7. this article spells out these differ­ enabled with CINFORM send which system is less expensive in ences in detail. bulletins saying that job TRYS the long run depends upon what has been sent to the CRAY; you are trying to do. In general next that newdata.dat has been Communication VAX CPU time is more expensive successfully ACQUIREd. Both the VAX/VMS and CYBER CA than CYBER, connect time and 110 8. She looks at activity on the systems are now front-ends to the roughly equal, and disk space CRAY with CSTATUS. TRYS is CRAY. By and large, they function less expensive on the VAX. The executing. independently. An ACQUIRE in a VAX is better at character process­ 9. She sees what step the job is CYBER origin CRAY job does not ing, but its EDT editor operating likely in with CJOB. in screen mode is expensive to get confused about which ma­ 10. INFORM messages tell her the use. chine it should look for the file job is finished. The output is on; it gets the file from the CY­ One area that CRAY users must in try5.cpr. be concerned with is the cost of BER.
Recommended publications
  • Ascii, Baudot, and the Radio Amateur
    ASCII, BAUDOT AND THE RADIO AMATEUR George W. Henry, Jr. K9GWT Copyright © 1980by Hal Communications Corp., Urbana, Illinois HAL COMMUNICATIONS CORP. BOX365 ASCII, BAUDOT, AND THE RADIO AMATEUR The 1970's have brought a revolution to amateur radio RTTY equipment separate wire to and from the terminal device. Such codes are found in com­ and techniques, the latest being the addition of the ASCII computer code. mon use with computer and line printer devices. Radio amateurs in the Effective March 17, 1980, radio amateurs in the United States have been United States are currently authorized to use either the Baudot or ASCII authorized by the FCC to use the American Standard Code for Information serial asynchronous TTY codes. Interchange(ASCII) as well as the older "Baudot" code for RTTY com­ munications. This paper discusses the differences between the two codes, The Baudot TTY Code provides some definitions for RTTY terms, and examines the various inter­ facing standards used with ASCII and Baudot terminals. One of the first data codes used with mechanical printing machines uses a total of five data pulses to represent the alphabet, numerals, and symbols. Constructio11 of RTTY Codes This code is commonly called the Baudot or Murray telegraph code after the work done by these two pioneers. Although commonly called the Baudot Mark Ull s,.ce: code in the United States, a similar code is usually called the Murray code in other parts of the world and is formally defined as the International Newcomers to amateur radio RTTY soon discover a whole new set of terms, Telegraphic Alphabet No.
    [Show full text]
  • Unix and Linux System Administration and Shell Programming
    Unix and Linux System Administration and Shell Programming Unix and Linux System Administration and Shell Programming version 56 of August 12, 2014 Copyright © 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2009, 2010, 2011, 2012, 2013, 2014 Milo This book includes material from the http://www.osdata.com/ website and the text book on computer programming. Distributed on the honor system. Print and read free for personal, non-profit, and/or educational purposes. If you like the book, you are encouraged to send a donation (U.S dollars) to Milo, PO Box 5237, Balboa Island, California, USA 92662. This is a work in progress. For the most up to date version, visit the website http://www.osdata.com/ and http://www.osdata.com/programming/shell/unixbook.pdf — Please add links from your website or Facebook page. Professors and Teachers: Feel free to take a copy of this PDF and make it available to your class (possibly through your academic website). This way everyone in your class will have the same copy (with the same page numbers) despite my continual updates. Please try to avoid posting it to the public internet (to avoid old copies confusing things) and take it down when the class ends. You can post the same or a newer version for each succeeding class. Please remove old copies after the class ends to prevent confusing the search engines. You can contact me with a specific version number and class end date and I will put it on my website. version 56 page 1 Unix and Linux System Administration and Shell Programming Unix and Linux Administration and Shell Programming chapter 0 This book looks at Unix (and Linux) shell programming and system administration.
    [Show full text]
  • MTS on Wikipedia Snapshot Taken 9 January 2011
    MTS on Wikipedia Snapshot taken 9 January 2011 PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sun, 09 Jan 2011 13:08:01 UTC Contents Articles Michigan Terminal System 1 MTS system architecture 17 IBM System/360 Model 67 40 MAD programming language 46 UBC PLUS 55 Micro DBMS 57 Bruce Arden 58 Bernard Galler 59 TSS/360 60 References Article Sources and Contributors 64 Image Sources, Licenses and Contributors 65 Article Licenses License 66 Michigan Terminal System 1 Michigan Terminal System The MTS welcome screen as seen through a 3270 terminal emulator. Company / developer University of Michigan and 7 other universities in the U.S., Canada, and the UK Programmed in various languages, mostly 360/370 Assembler Working state Historic Initial release 1967 Latest stable release 6.0 / 1988 (final) Available language(s) English Available programming Assembler, FORTRAN, PL/I, PLUS, ALGOL W, Pascal, C, LISP, SNOBOL4, COBOL, PL360, languages(s) MAD/I, GOM (Good Old Mad), APL, and many more Supported platforms IBM S/360-67, IBM S/370 and successors History of IBM mainframe operating systems On early mainframe computers: • GM OS & GM-NAA I/O 1955 • BESYS 1957 • UMES 1958 • SOS 1959 • IBSYS 1960 • CTSS 1961 On S/360 and successors: • BOS/360 1965 • TOS/360 1965 • TSS/360 1967 • MTS 1967 • ORVYL 1967 • MUSIC 1972 • MUSIC/SP 1985 • DOS/360 and successors 1966 • DOS/VS 1972 • DOS/VSE 1980s • VSE/SP late 1980s • VSE/ESA 1991 • z/VSE 2005 Michigan Terminal System 2 • OS/360 and successors
    [Show full text]
  • Computer Terminal Placement and Workflow in an Emergency Department: an Agent-Based Model Mollie R
    Computer terminal placement and workflow in an emergency department: An agent-based model Mollie R. Poynton, University of Utah, Salt Lake City, Utah, USA Vikas M. Shah, Department of Internal Medicine, Banner Good Samaritan Medical Center, Phoenix, AZ, USA Rhonda BeLue, The Pennsylvania State University, University Park, PA, USA Ben Mazzotta, Tufts University, Medford, MA, USA Heather Beil, University of North Carolina, Chapel Hill, NC, USA Saleha Habibullah, Kinnaird College for Women, Lahore, Pakistan I. INTRODUCTION Adequate analysis and consideration of workflow in relation to new systems/ technology implementation is essential in health care settings. Certainly, adequate analysis of workflow and exploration of potential unintended consequences seems essential prior to implementation of any new system or technology. However, typical analysis is limited to observation of pre- implementation workflow. Specialized settings such as emergency departments are of particular concern, because systems and technologies chosen for broad implementation in tertiary care facilities may not be appropriate. Severe unintended consequences, including increased mortality, were observed in one emergency department upon implementation of a computerized provider order entry (CPOE) system. 1 Agent-based modeling enables exploration of system behavior over a broad range of parameters, and so agent-based modeling may provide crucial pre-implementation insight into the impact of a new system/technology on workflow and/or outcomes. We developed a prototype agent-based model designed to simulate patient flow and provider workflow in an emergency department setting, relative to the number and placement of computer terminals, and explored the behavior of the system in response to various configurations. II. BACKGROUND AND SIGNIFICANCE A 2005 study by Han and colleagues found increased mortality after implementation of a CPOE system in the Pittsburgh Children’s Hospital emergency department (ED) and PICU (pediatric intensive care unit).
    [Show full text]
  • Computer Exemption Guidelines for Assessors and Property Owners
    Computer Exemption Guidelines for Assessors and Property Owners State law (sec. 70.11(39), Wis. Stats.), exempts computers, software, and electronic peripheral equipment from property taxation. *These items are frequently assessed as manufacturing personal property. Taxable/ Item Description Comments Exempt Central computer for Exempt Computer. Alarm/Security alarm/security system systems Various security system Taxable Equipment with embedded computerized components. sensory devices "All-in-one" Combination device If this equipment can only operate using a computer, it is exempt as an printer/scanner/ that includes an exempt Taxable electronic peripheral. fax/copier device Amusement devices Electronic pinball and Taxable Equipment with embedded computerized components. or arcade games video games Automated warehouse Racks and other Taxable Not connected to and operated by a computer. equipment mechanical equipment Electronic diagnostic Computer and connected electronic peripheral equipment that collect, Exempt Automotive diagnostic equipment analyze store and retrieve data. equipment Other diagnostic Taxable Mechanical or not connected to a computer. equipment Bank teller Automated teller Exempt Networked computer, terminal, or electronic peripheral equipment. machines/ATMs PC controlled equipment, networked Exempt Computers, electronic peripheral equipment Bowling and automatic PCs scoring equipment Pin setters, counters Taxable Equipment with embedded computerized components. and scoring equipment Car wash equipment Automated equipment Taxable Equipment with embedded computerized components. Scanner, scale, keyboard, register, computer, display Computer and electronic peripheral equipment - programmable electronic Cash Exempt register/Checkout screens, debit/credit device(s) that can interpret, measure, store, retrieve, and process data. system and card readers, check components swipe, printer, Mechanical - conveyor, Taxable Mechanical. tables, shelves All Copiers – Copiers networked, stand alone, Taxable Exemption does not apply to copiers.
    [Show full text]
  • Guide to Setting up a VMS System
    Guide to Setting Up a VMS System Order Number: AA-LA25A-TE April 1988 This manual provides system managers with the concepts and procedures needed to set up a VMS operating system for daily operation. Revision/Update Information: This is a new manual. Software Version: VMS Version 5.0 digital equipment corporation maynard, massachusetts April 1988 The information in this document is subject to change without notice and should not be construed as a commitment by Digital Equipment Corporation. Digital Equipment Corporation assumes no responsibility for any errors that may appear in this document. The software described in this document is furnished under a license and may be used or copied only in accordance with the terms of such license. No responsibility is assumed for the use or reliability of software on equipment that is not supplied by Digital Equipment Corporation or its affiliated companies. Copyright ©1988 by Digital Equipment Corporation All Rights Reserved. Printed in U.S.A. The postpaid READER'S COMMENTS form on the last page of this document requests the user's critical evaluation to assist in preparing future documentation. The following are trademarks of Digital Equipment Corporation: DEC DIBOL UNIBUS DEC/CMS EduSystem VAX DEC/MMS IAS VAXcluster DECnet MASSBUS VMS DECsystem-10 PDP VT DECSYSTEM-20 PDT DECUS RSTS TM DECwriter RSX d a 0 9 ao ZK3385 HOW TO ORDER ADDITIONAL DOCUMENTATION DIRECT MAIL ORDERS USA &PUERTO RICO* CANADA INTERNATIONAL Digital Equipment Corporation Digital Equipment Digital Equipment Corporation P.O. Box CS2008 of Canada Ltd. PSG Business Manager Nashua, New Hampshire 100 Herzberg Road c/o Digital's local subsidiary 03061 Kanata, Ontario K2K 2A6 or approved distributor Attn: Direct Order Desk In Continental USA and Puerto Rico call 800-258-1710.
    [Show full text]
  • Basic Guide to the Command Line
    Basic guide to the command line Outline Introduction Definitions Special Characters Filenames Pathnames and the Path Variable (Search Path) Wildcards Standard in, standards out, standard error, and redirections Here document (heredoc) Owners, groups, and permissions Commands Regular Expressions Introduction To utilize many of the programs in NMRbox you will need to at least have a rudimentary understanding of how to navigate around the command line. With some practice you may even find that the command line is easier than using a GUI based file browser – it is certainly much more powerful. In addition to navigating from the command line you will also need a rudimentary understanding of how to create and execute a shell script. This Guide may take a little bit to get through, but if you know most of the contents in this document you will be well served. (top) Definitions Terminal Emulator – A terminal emulator is a program that makes your computer act like an old fashion computer terminal. When running inside a graphical environment it is often called a “terminal window”, “terminal”, “term”, or “shell” (although it is actually not a shell – read on). I will refer to a “Terminal Emulator” as “Terminal” in this document. Shell – A shell is a program that acts as a command language interpreter that executes the commands sent to it from the keyboard or a file. It is not part of the operating system kernel, but acts to pass commands to the kernel and receives the output from those commands. When you run a Terminal Emulator from a graphical interface a shell is generally run from within the Terminal so your interaction is with the shell and the Terminal simply presents a place for the shell to run in the graphical interface.
    [Show full text]
  • Online Terminal Emulator Windows
    Online Terminal Emulator Windows Andonis repossess disgracefully if versed Clemens bide or slurp. Rudimentary and spindle-legged Ashby never lark his human! Kendall remains credible after Ingamar rejigs supersensibly or panhandles any Narragansett. This one is a bit controversial. We have switched to semver. JSLinux also lets you upload files to a virtual machine. Communicating with hosts using telnet and Secure Shell is easy. Did we say it was fast? Glosbe, have to specify the IP address. Similarly, Russian, rsync and many more. PC computer behave like a real text terminal. As you might expect, viewers, and everything you type in one of them is broadcast to all the others. You are responsible for ensuring that you have the necessary permission to reuse any work on this site. The application is solely programmed from Windows operating system. This generally means that some type of firewall is blocking the UDP packets between the client and the server. If any of that is missed, feel free to use some of them and see which one fits as per the requirements. IP address of the server. Position the pointer in the title bar. Linux distribution package manager. Howto: What is Git and Github? Use system fonts or choose a custom font for your terminal. Honestly, fully configurable shortcuts, sorry for the confusion. All trademarks and registered trademarks appearing on oreilly. Terminator status bar opens a menu in which you can define groups of terminals, such as backing up data or searching for files that you can run from Cmd. Linux applications on Windows.
    [Show full text]
  • Linux Command Line Interface
    Linux Command Line Interface December 27, 2017 Foreword I It is supposed to be a refresher (?!) I If you are familiar with UNIX/Linux/MacOS X CLI, this is going to be boring... I I will not talk about editors (vi, emacs...) Basics I (Computer) Terminal: Hardware device for data entry and display; I Terminal Emulator (aka tty): An application program replacing a computer terminal. Many of those, OS dependent (cmd for DOS/Win; Terminal for OS X; xterm for Linux; ...); I The Terminal provides user access to the computer through the Command Line Interface (CLI) where the user issues commands. I The CLI "dialect" is the Shell. In UNIX-like systems a lot of dialects exists: sh, bash, csh, tcsh, ksh, zsh... I I will only use the bash shell. Shell I How to access a shell I Logging in to your own Linux (virtual) box (CTRL-ALT-F1/CTRL-ALT-F7); I Opening a graphic terminal (xterm...); I SSHing into a server. I To know which shell you use: echo $SHELL I use this font to denote commands I SHELL is an environment variable I echo is a command Commands I apropos: search the manual page names and descriptions I man: manual page (try man apropos, man man) Almost every command, system program, or API has a man page man apropos, man fread, man pthreads, man 1 open, man 2 open Reading man pages is a very worthwhile activity I Not everything is a command... type <cmd> type man (command), type echo (shell built-in), type ls (alias (well..
    [Show full text]
  • Introduction to Command Line
    Introduction To The Command Line Getting started with Terminal The Command Line is a text-based interface that allows you to communicate with your computer to accomplish a wide range of tasks. You will use the skills you develop in this lesson when working with Twarc, a command line tool for collecting and analyzing Twitter data. It is important to have a handle on basic commands so that you can work with the 1 October Twitter Data Collection later on in this tutorial series. Get started by downloading the materials below! Difficulty level: Beginner Optimized for: Mac users. Windows users can view the tutorial here. Prerequisite(s): None Materials: Download ‘walt_whitman.zip’ to your desktop Tutorial Key ● Command Line commands will be displayed in this format ● means you have come to the end of a set of instructions Lesson objectives - Use the command line to navigate your computer - Create and move content around - Make changes to existing files Key Terms ● Terminal - OS X Command Line ○ A text interface for your computer. Terminal receives commands and then passes those commands on to the computer's operating system to run. ● Command ○ A specific order from a user to the computer’s operating system to perform a service ● Graphical-User Interface (GUI) ○ A visual form of user interface that allows users to interact with a computer through icons and other visual indicators ● Filepath ○ A unique address that specifies a location in a file system ● Directory ○ A location for storing files on your computer. A directory is the same thing as a folder; a folder is represented visually in a GUI.
    [Show full text]
  • Computer Time-Sharing (T-S) "An Engineering Tool" for the Engineering Applications of the Small Company
    Scholars' Mine Masters Theses Student Theses and Dissertations 1970 Computer time-sharing (T-S) "an engineering tool" for the engineering applications of the small company James Binford Summers Follow this and additional works at: https://scholarsmine.mst.edu/masters_theses Part of the Civil Engineering Commons Department: Recommended Citation Summers, James Binford, "Computer time-sharing (T-S) "an engineering tool" for the engineering applications of the small company" (1970). Masters Theses. 5477. https://scholarsmine.mst.edu/masters_theses/5477 This thesis is brought to you by Scholars' Mine, a service of the Missouri S&T Library and Learning Resources. This work is protected by U. S. Copyright Law. Unauthorized use including reproduction for redistribution requires the permission of the copyright holder. For more information, please contact [email protected]. COMPUTER TIME-SHARING (T-S) "AN ENGINEERING TOOL" FOR THE ENGINEERING APPLICATIONS OF THE SMALL COMPANY BY JAMES BINFORD SUMMERS, 1938- A THESIS submitted to the faculty of the UNIVERSITY OF MISSOURI - ROLLA in partial fulfillment of the requirements for the Degree of MASTER OF SCIENCE IN CIVIL ENGINEERING Rolla., Missouri 1970 T2478 c.l 62 pages Approved by ~Jt£.~ ~.(advisor)~~ 187982 ~tiM/ ii ABSTRACT The objectives of this investigation were to illustrate the capabilities of the time-sharing (T-S) industry, identify the means by which the small sized company, with a need to solve engineering problems, can best be served through T-S, and to present T-S to these potential users. Investigation was made of distinctive T-S services to formulate a com­ posite of the T-S industry. Examples of three distinctive T-S services were used within this composite to exemplify the variations of services within the industry.
    [Show full text]
  • The Nut Shell – a Framework for Creating Interactive Command Line Tutorials
    Bachelor Thesis The Nut Shell – A Framework for Creating Interactive Command Line Tutorials Sebastian Morr 2013–11–03 Institute for Programming and Reactive Systems Prof. Dr. Ursula Goltz Advisor: Dr. Werner Struckmann Abstract Command line interfaces provide powerful, expressive means to interact with computers, but compared to graphical user interfaces, they have a steep learning curve. Inspired by text adventures, this thesis introduces a new interface concept for teaching command line programs: An interactive, terminal-based tutorial environment, where the documentation reacts to the user’s commands, to the command line’s response and its internal state. The thesis covers design, implementation, application and evaluation of the Nut Shell, a software framework for creating such tutorials. An abstraction layer is devised that gives the framework uniform access to the different parts of interaction within arbitrary command line programs, while retaining all their built-in editing features. The framework is compatible with system shells and many interpreted programming languages, but can also be used to teach subtopics, like specific command line tools or concepts. The Nut Shell introduces a new domain specific language, that can be used to describe tutorial lessons. The language’s syntactic structures are tailored for this purpose and allow for fast and easy content creation. A built-in testing facility enables authors to check their tutorials for proper function automatically. In a two-week evaluation study with about 120 participants, a tutorial created with the Nut Shell proved superior to a teaching method based on static text: Users of the Nut Shell showed a much higher motivation to attend to the course, said they had more fun and learned more, and were able to work more autonomously.
    [Show full text]