Sms208: Computer Appreciation for Managers

Total Page:16

File Type:pdf, Size:1020Kb

Sms208: Computer Appreciation for Managers SMS208: COMPUTER APPRECIATION FOR MANAGERS NATIONAL OPEN UNIVERSITY OF NIGERIA SMS 208 COMPUTER APPRECIATION FOR MANAGERS COURSE GUIDE SMS 208 COMPUTER APPRECIATION FOR MANAGERS Course Developer Gerald C. Okeke Eco Communication Inc. Ikeja, Lagos Course Editor/Coordinator Adegbola, Abimbola Eunice National Open University of Nigeria Programme Leader Dr. O.J. Onwe National Open University of Nigeria NATIONAL OPEN UNIVERSITY OF NIGERIA 2 SMS 208 COMPUTER APPRECIATION FOR MANAGERS National Open University of Nigeria Headquarters 14/16 Ahmadu Bello Way Victoria Island Lagos Abuja Office No. 5 Dar es Salaam Street Off Aminu Kano Crescent Wuse II, Abuja Nigeria e-mail: [email protected] URL: www.nou.edu.ng Published by National Open University of Nigeria 2008 Printed 2008 ISBN: 978-058-198-7 All Rights Reserved 3 SMS 208 COMPUTER APPRECIATION FOR MANAGERS CONTENTS PAGE Introduction………………………………………………….. 1 Course Objectives…………………………………………… 1 Credit Units………………………………………………….. 2 Study Units………………………………………………….. 2 Course Assessment………………………………………….. 2 Introduction This course is designed to avail managers in business, governance and education with what computer is and its applications in carrying out their every day assignments. This course goes on to acquaint them with the basic component parts of a personal computer and the types available. The emphasis is for them to understand the application of computer in information technology and in information communications technology that translates to effectiveness and efficiency in business and people management. Course Objectives The following are the major objectives of this course Define a computer and know the major characteristics of a computer Know the different classes and categories of computer 1. Define hardware and know the basic components of computer hardware 6.0 Identify and differentiate the types of software available *0Identify the four basic cycles the computer undergoes during data processing 6.0 Define and trace the history of operating systems Identify and differentiate types of operating systems commonly available Define and identify the major types of application systems 3 Enumerate the benefits of database management system. Identify the benefits associated with SDLC Know the levels of users involvement in the development of information system 1. Know the major functions of networks to a business Know to what extent the Internet has impacted the social life of people Understand the application of the Internet in marketing 1. Know the various forms of attack computer is exposed to Know what are the characteristics of a healthy job Identify the ways computer system impact on health and safety of workers 4 SMS 208 COMPUTER APPRECIATION FOR MANAGERS Know the roles ICT has played thus far in the reduction of poverty in developing countries. Answer the question of the future of ICT. 5 SMS 208 COMPUTER APPRECIATION FOR MANAGERS Credit Units This course attracts 3 credit units Study Units The study units of this course are as follows: Module 1 Unit 1 Introduction to Computer Unit 2 Computer Hardware Unit 3 Computer Software Unit 4 Basic Computer Operations Unit 5 Operating Systems Module 2 Unit 1 Computer Application Systems Unit 2 Database Management System Unit 3 Systems Development Life Cycle Unit 4 Computer Networks Unit 5 The Internet Module 3 Unit 1 Computer Security Unit 2 Health and Safety Unit 3 Information Communication Technology Course Assessment 6.0 Assignments = 30% 7.0 Examination = 70% 6 SMS 208 COMPUTER APPRECIATION FOR MANAGERS Course Code SMS 208 Course Title Computer Appreciation for Managers Course Developer Gerald C. Okeke Eco Communication Inc. Ikeja, Lagos Course Editor/Coordinator Adegbola, Abimbola Eunice National Open University of Nigeria Programme Leader Dr. O.J. Onwe National Open University of Nigeria NATIONAL OPEN UNIVERSITY OF NIGERIA 7 SMS 208 COMPUTER APPRECIATION FOR MANAGERS National Open University of Nigeria Headquarters 14/16 Ahmadu Bello Way Victoria Island Lagos Abuja Office No. 5 Dar es Salaam Street Off Aminu Kano Crescent Wuse II, Abuja Nigeria e-mail: [email protected] URL: www.nou.edu.ng Published by National Open University of Nigeria 2008 Printed 2008 ISBN: 978-058-198-7 All Rights Reserved viii SMS 208 COMPUTER APPRECIATION FOR MANAGERS CONTENTS PAGE Module 1 ………………………………………………… 1 Unit 1 Introduction to Computer……………………. 1 Unit 2 Computer Hardware…………………………... 13 Unit 3 Computer Software…………………………… 27 Unit 4 Basic Computer Operations…………………... 37 Unit 5 Operating Systems……………………………. 54 Module 2 ………………………………………………… 68 Unit 1 Computer Application Systems………………. 68 Unit 2 Database Management System……………….. 78 Unit 3 Systems Development Life Cycle……………. 89 Unit 4 Computer Networks…………………………... 101 Unit 5 The Internet…………………………………… 113 Module 3 ………………………………………………… 126 Unit 1 Computer Security……………………………. 126 Unit 2 Health and Safety…………………………….. 138 Unit 3 Information Communication Technology……. 149 9 SMS 208 MODULE 1 MODULE 1 Unit 1 Introduction to Computer Unit 2 Computer Hardware Unit 3 Computer Software Unit 4 Basic Computer Operations Unit 5 Operating Systems UNIT 1 INTRODUCTION TO COMPUTER CONTENTS 1.0 Introduction 2.0 Objectives 3.0 Main Content 3.1 Classes of Computers 3.1.1 Microcomputers 3.1.2 Minicomputers 3.1.3 Mainframe Computers 3.2 Mainframes vs. Supercomputers 3.3 Classes by Function 3.3.1 Servers 3.3.2 Workstation 3.3.3 Portable Data Entry Terminals 3.3.4 Embedded Computer Systems 3.4 Supercomputer 4.0 Conclusion 5.0 Summary 6.0 Tutor-Marked Assignment 7.0 References/Further Readings 1.0 INTRODUCTION There are several definitions to computer, so there is no one single definition of a computer. However, in this unit we will try to give a generalized and all round satisfactory definition of computer. A computer is a fast operating machine that can be used for the home and business to enhance productivity. In other words, a computer is a collection of electronic parts, or hardware that have a set of electronic instructions called software. All computers perform the same basic functions; they enable you to store and manipulate information. Typically any machine called a computer displays the following characteristics: 1 SMS 208 MODULE 1 The ability to perform calculation at very high speed. Ability to take in information and to store that information for future retrieval or use. The ability to take in and store sequence of instructions called program which must be written in the language of computer. The ability to obey sequence of program instructions provided the program is stored within the computer. The ability to use simple logical rules to make decisions for their own internal control, or for the control of some external activity e.g. to take over the role of calculator operator. The ability to communicate with other systems. The ability to exploit a complex internal structure of a microelectronics circuitry in a variety of ways. 2.0 OBJECTIVES At the end of this unit you are expected to: define a computer and know the major characteristics of a computer know the different classes and categories of computer differentiate mainframe computer from supercomputer define the different types of computer based on size and functions. 3.0 MAIN CONTENT 3.1 Classes of Computers A few years ago computers were easily classified as mainframe, minicomputer or microcomputer. Mainframe computers were physically large and powerful systems capable of supporting hundreds of users. They had relatively large amount of RAM (e.g. 1-2 Mb) and disk storage (e.g. 100 to 400 Mb). Minicomputers were smaller less powerful machines than mainframes, but were still multi-user machines. Microcomputers were small humble machines with 8-bit or 16-bit processors, 16Kb to 256Kb of RAM and 5 to 10 Mb of disk storage, used mainly for games and basic word processing. Developments in microprocessor technology however means that today's desktop microcomputer will easily have more RAM and disk storage than the above mentioned mainframe, as well as having a more powerful CPU. Minicomputers today are really no more than very powerful microcomputers. The differences between such a machine and a desktop model may more likely be in the software that is being used as opposed to the hardware, for example, a multi-user operating system such as Unix, would typically be used, as opposed to the Windows systems of PCs. Mainframe computers are still powerful machines (physically 2 SMS 208 MODULE 1 much smaller than their ancestors) with hundreds of megabytes of RAM and terabytes of disk storage. They have very powerful CPU's that allow them cope with large numbers of users. Supercomputer is the term used for the most powerful computer available at any time. These are typically tailored for very fast processing of what are known as number crunching applications. Such applications require a tremendous number of arithmetic calculations to be carried out. Weather forecasting is the classic example of such an application, where equations taking account of huge numbers of observations have to be solved. Other applications are to be found in astro-physics and some branches of chemical analysis and modelling. Supercomputers at the moment can carry out trillions of operations per second! The Cray is perhaps the most well known supercomputer, named after its designer, Seymour Cray. The different classes of computers based on sizes are as follow: 3.1.1 Microcomputers Microcomputers are the most common type of computers in existence today, whether at work in school or on the desk at home. The term "Microcomputer" was introduced with the advent of single chip large scale integrated circuit computer processors. The term "microcomputer" itself, is now practically an anachronism. A microcomputer is a computer with a microprocessor as its central processing unit. Another general characteristic of these computers is that they occupy physically small amounts of space when compared to mainframe and minicomputers. Many microcomputers (when equipped with a keyboard and screen for input and output) are also personal computers (in the generic sense).
Recommended publications
  • Chapter 1: Computer Abstractions and Technology 1.1 – 1.4: Introduction, Great Ideas, Moore’S Law, Abstraction, Computer Components, and Program Execution
    Chapter 1: Computer Abstractions and Technology 1.1 – 1.4: Introduction, great ideas, Moore’s law, abstraction, computer components, and program execution ITSC 3181 Introduction to Computer Architecture https://passlab.github.io/ITSC3181/ Department of Computer Science Yonghong Yan [email protected] https://passlab.github.io/yanyh/ Lectures for Chapter 1 and C Basics Computer Abstractions and Technology ☛• Lecture 01: Chapter 1 – 1.1 – 1.4: Introduction, great ideas, Moore’s law, abstraction, computer components, and program execution • Lecture 02 - 03: C Basics; Compilation, Assembly, Linking and Program Execution • Lecture 03 - 04: Chapter 1 – 1.6 – 1.7: Performance, power and technology trends • Lecture 04 - 05: Memory and Binary Systems • Lecture 05: – 1.8 - 1.9: Multiprocessing and benchmarking 2 § 1.1 Introduction 1.1 The Computer Revolution • Progress in computer technology – Underpinned by Moore’s Law • Every two years, circuit density ~= increasing frequency ~= performance, double • Makes novel applications feasible – Computers in automobiles – Cell phones – Human genome project – World Wide Web – Search Engines • Computers are pervasive 3 Generation Of Computers https://solarrenovate.com/the-evolution-of-computers/ 4 New School Computer 5 Classes of Computers • Personal computers (PC) --> computers are PCs today – General purpose, variety of software – Subject to cost/performance tradeoff • Server computers – Network based – High capacity, performance, reliability – Range from small servers to building sized 6 Classes of Computers
    [Show full text]
  • Resume of Dr. Michael J. Bisconti
    Table of Contents This file contains, in order: Time Savers Experience Matrix Resume _________________________ 1 Time Savers There are a number of things we can do to save everyone’s time. In addition to resume information there are a number of common questions that employers and recruiters have. Here is an FAQ that addresses these questions. (We may expand this FAQ over time.) Frequently Asked Questions 1099 Multiple Interviewers Severance Pay Contract End Date Multiple Interviews Technical Exam Contract Job Need/Skill Assessment Interview Temporary Vs. Permanent Contract Rate Payment Due Dates U.S. Citizenship Drug Testing Permanent Job W2 Face-to-face Interview Phone Interview Word Resume Job Hunt Progress Salary Are you a U.S. citizen? Yes. Do you have a Word resume? Yes, and I also have an Adobe PDF resume. Do you prefer temporary (contract) or permanent employment? Neither, since, in the end, they are equivalent. Will you take a drug test? 13 drug tests taken and passed. Do you work 1099? Yes, but I give W2 payers preference. Do you work W2? Yes, and I work 1099 as well but I give W2 payers preference. How is your job search going? See 1.2 Job Hunt Progress. What contract rate do you expect? $65 to $85/hr. W2 and see the 2.5 Quick Rates Guide. What salary do you expect? 120k to 130k/yr. and see the 2.5 Quick Rates Guide. When do you expect to be paid? Weekly or biweekly and weekly payers will be given preference. Will you do a face-to-face interview? Yes, but I prefer a Skype or equivalent interview because gas is so expensive and time is so valuable.
    [Show full text]
  • Nano Computing Revolution and Future Prospects
    Recent Research in Science and Technology 2012, 4(3): 16-17 ISSN: 2076-5061 Available Online: http://recent-science.com/ Nano computing revolution and future prospects Deepti Hirwani and Anuradha Sharma Maharaja Agrasen International College, Raipur C.G, India Abstract There are several ways nanocomputers might be built, using mechanical, electronic, biochemical, or quantum technology. It is unlikely that nanocomputers will be made out of semiconductor transistors (Microelectronic components that are at the core of all modern electronic devices), as they seem to perform significantly less well when shrunk to sizes under 100 nanometers.The research results summarized here also suggest that many useful, yet strikingly different solutions may exist for tolerating defects and faults within nanocomputing systems. Also included in the survey are a number of software tools useful for quantifying the reliability of nanocomputing systems in the presence of defects and faults. Keywords: Nano computing, electronic devices, technology INTRODUCTION classical computer would have to repeat 2 x input numbers, Nanocomputer is the logical name for the computer smaller performing the same task that a classical computer would have to then the microcomputer, which is smaller than the minicomputer. repeat 2 x times or use 2 xprocessors working in parallel. In other (The minicomputer is called “mini” because it was a lot smaller than words a quantum computer offers an enormous gain in the use of the original (mainframe) computers.) More technically, it is a computational resources such as time and memory. This becomes computer whose fundamental part is no bigger than a few mind boggling when you think of what 32 qubits can accomplish.
    [Show full text]
  • 2200, Canmath 201.Qxd
    An Introduction to the Computer Age Computers are changing our world. The small amount of training. Amazingly invention of the internal combustion engine enough, as the size has decreased, the power and the harnessing of electricity have had a has increased and prices have plummeted. profound effect on the way society operates. How does the computer age affect the The widespread use of the computer is Christian? What is the history behind the having a similar and perhaps even greater computer? What are the fundamental parts impact on our society. of a computer and how do they work In only decades, computers have shrunk together? What are the uses, advantages, from mammoth, room-filling machines that and limitations of computers? Do I need a only the highly educated could operate to computer? This LightUnit and those follow - tiny devices held in the palm of the hand ing it will begin to answer some of these that the average person can use after a questions for you. Section 1 Computer Background Any study must be based on definitions very specialized field, new words have come about the subject. If definitions are not into being, and many common words have understood, there is little hope that much acquired new definitions. Some of the words can be learned about the subject. The goal of may already be familiar to you, but in the the first section of this LightUnit is to pro - context of computers, they may take on a vide a basis for the rest of the course by different meaning. Therefore, do not assume defining computer and many terms associ - you know the definition even if the word is ated with computers.
    [Show full text]
  • Cpu Performance
    LECTURE 1 Introduction CLASSES OF COMPUTERS • When we think of a “computer”, most of us might first think of our laptop or maybe one of the desktop machines frequently used in the Majors’ Lab. Computers, however, are used for a wide variety of applications, each of which has a unique set of design considerations. Although computers in general share a core set of technologies, the implementation and use of these technologies varies with the chosen application. In general, there are three classes of applications to consider: desktop computers, servers, and embedded computers. CLASSES OF COMPUTERS • Desktop Computers (or Personal Computers) • Emphasize good performance for a single user at relatively low cost. • Mostly execute third-party software. • Servers • Emphasize great performance for a few complex applications. • Or emphasize reliable performance for many users at once. • Greater computing, storage, or network capacity than personal computers. • Embedded Computers • Largest class and most diverse. • Usually specifically manufactured to run a single application reliably. • Stringent limitations on cost and power. PERSONAL MOBILE DEVICES • A newer class of computers, Personal Mobile Devices (PMDs), has quickly become a more numerous alternative to PCs. PMDs, including small general-purpose devices such as tablets and smartphones, generally have the same design requirements as PCs with much more stringent efficiency requirements (to preserve battery life and reduce heat emission). Despite the various ways in which computational technology can be applied, the core concepts of the architecture of a computer are the same. Throughout the semester, try to test yourself by imagining how these core concepts might be tailored to meet the needs of a particular domain of computing.
    [Show full text]
  • Copyrighted Material
    1 The Function of Computation As in music theory, we cannot discuss the microprocessor without positioning it in the context of the history of the computer, since this component is the integrated version of the central unit. Its internal mechanisms are the same as those of supercomputers, mainframe computers and minicomputers. Thanks to advances in microelectronics, additional functionality has been integrated with each generation in order to speed up internal operations. A computer1 is a hardware and software system responsible for the automatic processing of information, managed by a stored program. To accomplish this task, the computer’s essential function is the transformation of data using computation, but two other functions are also essential. Namely, these are storing and transferring information (i.e. communication). In some industrial fields, control is a fourth function. This chapter focuses on the requirements that led to the invention of tools and calculating machines to arrive at the modern version of the computer that we know today. The technological aspect is then addressed. Some chronological references are given. Then several classification criteria are proposed. The analog computer, which is then described, was an alternative to the digital version. Finally, the relationship between hardware and software and the evolution of integration and its limits are addressed. NOTE.– This chapter does not attempt to replace a historical study. It gives only a few key dates and technical benchmarks to understand the technological evolution of the field. COPYRIGHTED MATERIAL 1 The French word ordinateur (computer) was suggested by Jacques Perret, professor at the Faculté des Lettres de Paris, in his letter dated April 16, 1955, in response to a question from IBM to name these machines; the English name was the Electronic Data Processing Machine.
    [Show full text]
  • DB2 V8 Exploitation of IBM Ziip
    Systems & Technology Group Connecting the Dots: LPARs, HiperDispatch, zIIPs and zAAPs Share in Boston,v August 2010 Glenn Anderson IBM Technical Training [email protected] © 2010 IBM Corporation What I hope to cover...... What are dispatchable units of work on z/OS Understanding Enclave SRBs How WLM manages dispatchable units of work The role of HiperDispatch What makes work eligible for zIIP and zAAP specialty engines Dispatching work to zIIP and zAAP engines z/OS Dispatchable Units There are different types of Dispatchable Units (DU's) in z/OS Preemptible Task (TCB) Non Preemptible Service Request (SRB) Preemptible Enclave Service Request (enclave SRB) Independent Dependent Workdependent z/OS Dispatching Work Enclave Services: A Dispatching Unit Standard dispatching dispatchable units (DUs) are the TCB and the SRB TCB runs at dispatching priority of address space and is pre-emptible SRB runs at supervisory priority and is non-pre-emptible Advanced dispatching units Enclave Anchor for an address space-independent transaction managed by WLM Can comprise multiple DUs (TCBs and Enclave SRBs) executing across multiple address spaces Enclave SRB Created and executed like an ordinary SRB but runs with Enclave dispatching priority and is pre-emptible Enclave Services enable a workload manager to create and control enclaves Enclave Characteristics Created by an address space (the "owner") SYS1 AS1 AS2 AS3 One address space can own many enclaves One enclave can include multiple Enclave dispatchable units (SRBs/tasks) executing concurrently in
    [Show full text]
  • An Overview of the Usage of Default Passwords (Extended Version)
    An Overview of the Usage of Default Passwords (extended version) Brandon Knieriem, Xiaolu Zhang, Philip Levine, Frank Breitinger, and Ibrahim Baggili Cyber Forensics Research and Education Group (UNHcFREG) Tagliatela College of Engineering University of New Haven, West Haven CT, 06516, United States fbknie1, [email protected],fXZhang, FBreitinger, [email protected] Summary. The recent Mirai botnet attack demonstrated the danger of using default passwords and showed it is still a major problem in 2017. In this study we investigated several common applications and their pass- word policies. Specifically, we analyzed if these applications: (1) have default passwords or (2) allow the user to set a weak password (i.e., they do not properly enforce a password policy). In order to understand the developer decision to implement default passwords, we raised this question on many online platforms or contacted professionals. Default passwords are still a significant problem. 61% of applications inspected initially used a default or blank password. When changing the password, 58% allowed a blank password, 35% allowed a weak password of 1 char- acter. Key words: Default passwords, applications, usage, security 1 Introduction Security is often disregarded or perceived as optional to the average consumer which can be a drawback. For instance, in October 2016 a large section of the In- ternet came under attack. This attack was perpetuated by approximately 100,000 Internet of Things (IoT) appliances, refrigerators, and microwaves which were compromised and formed the Mirai botnet. Targets of this attack included Twit- ter, reddit and The New York Times all of which shut down for hours.
    [Show full text]
  • The Protection of Information in Computer Systems
    The Protection of Information in Computer Systems JEROME H. SALTZER, SENIOR MEMBER, IEEE, AND MICHAEL D. SCHROEDER, MEMBER, IEEE Invited Paper Abstract - This tutorial paper explores the mechanics of Confinement protecting computer-stored information from unauthorized Allowing a borrowed program to have access to data, use or modification. It concentrates on those architectural while ensuring that the program cannot release the structures--whether hardware or software--that are information. necessary to support information protection. The paper Descriptor develops in three main sections. Section I describes A protected value which is (or leads to) the physical desired functions, design principles, and examples of address of some protected object. elementary protection and authentication mechanisms. Any Discretionary reader familiar with computers should find the first section (In contrast with nondiscretionary.) Controls on access to be reasonably accessible. Section II requires some to an object that may be changed by the creator of the familiarity with descriptor-based computer architecture. It object. examines in depth the principles of modern protection Domain architectures and the relation between capability systems The set of objects that currently may be directly and access control list systems, and ends with a brief accessed by a principal. analysis of protected subsystems and protected objects. Encipherment The reader who is dismayed by either the prerequisites or The (usually) reversible scrambling of data according the level of detail in the second section may wish to skip to to a secret transformation key, so as to make it safe for Section III, which reviews the state of the art and current transmission or storage in a physically unprotected research projects and provides suggestions for further environment.
    [Show full text]
  • IBM System Z10 Business Class - the Smart Choice for Your Business
    IBM United States Hardware Announcement 108-754, dated October 21, 2008 IBM System z10 Business Class - The smart choice for your business. z can do IT better Table of contents 4 Key prerequisites 36 Publications 4 Planned availability dates 38 Services 5 Description 38 Technical information 35 Product positioning 55 IBM Electronic Services 36 Statement of general direction 55 Terms and conditions 36 Product number 57 Pricing 36 Education support 57 Order now 58 Corrections At a glance The IBM® System z10 BC is a world-class enterprise server built on the inherent strengths of the IBM System z® platform. It is designed to deliver new technologies and virtualization that provide improvements in price/performance for key new workloads. The System z10 BC further extends System z leadership in key capabilities with the delivery of granular growth options, business-class consolidation, improved security and availability to reduce risk, and just-in-time capacity deployment helping to respond to changing business requirements. Whether you want to deploy new applications quickly, grow your business without growing IT costs, or consolidate your infrastructure for reduced complexity, look no further - z Can Do IT. The System z10 BC delivers: • The IBM z10 Enterprise Quad Core processor chip running at 3.5 GHz, designed to help improve CPU intensive workloads. • A single model E10 offering increased granularity and scalability with 130 available capacity settings. • Up to a 5-way general purpose processor and up to 5 additional Specialty Engine processors or up to a 10-way IFL or ICF server for increased levels of performance and scalability to help enable new business growth.
    [Show full text]
  • TCD-SCSS-T.20121208.032.Pdf
    AccessionIndex: TCD-SCSS-T.20121208.032 Accession Date: 8-Dec-2012 Accession By: Prof.J.G.Byrne Object name: Burroughs 1714 Vintage: c.1972 Synopsis: Commercial zero-instruction-set computer used by the Dept.Computer Science from 1973-1979. Just two prototyping boards survive. Description: The Burroughs 1714 was one of their B1700 family, introduced in 1972 to compete with IBM's System/3. The original research for the B1700 series, initially codenamed the Proper Language Processor or Program Language Processor (PLP) was done at the Burroughs Pasadena plant. The family were known as the Burroughs Small Systems, as distinct from the Burroughs Medium Systems (B2000, etc) and the Burroughs Large Systems (B5000, etc). All the Burroughs machines had high-level language architectures. The large were ALGOL machines, the medium COBOL machines, but the small were universal machines. The principal designer of the B1700 family was Wayne T. Wilner. He designed the architecture as a zero-instruction-set computer, an attempt to bridge the inefficient semantic gap between the ideal solution to a particular programming problem and the real physical hardware. The B1700 architecture executed idealized virtual machines for any language from virtual memory. It achieved this feat by microprogramming, see the microinstruction set further below. The Burroughs MCP (Master Control Program) would schedule a particular job to run, then preload the interpreter for whatever language was required into a writeable control store, allowing the machine to emulate the desired virtual machine. The hardware was optimised for this. It had bit-addressable memory, a variable-width ALU, could OR in data from a register into the instruction register (for very efficient instruction parsing), and the output of the ALU was directly addressable as X+Y or X-Y read-only registers.
    [Show full text]
  • IDUG EU 2009 Patric Becker: Leveraging Data Warehouse
    Session: A01 Leveraging Data Warehouse Performance with DB2 9 for z/OS and System z10 Patric Becker IBM Boeblingen Lab 05 October 2009 • 11:30 – 12:30 Platform: DB2 for z/OS This session looks into new feature delivered with IBM System z10 as well as the new capabilities of DB2 9 for z/OS and highlights those options which can be beneficial for Data Warehousing environments in terms of availability and performance. Not all the relevant features can be described at a very granular level, but the idea is to provide information to understand the important features to trigger further analysis to improve the availability and performance of existing Data Warehouses. IBM Deutschland Research & Development GmbH IBM D Research & Development Headquarter IBM Deutschland Research & Development GmbH Schönaicher Straße 220 D-71032 Böblingen Berlin Managing Director Erich Baier Employees 2008 Approx. 1.800 (2.200) Homepage ibm.com/de/entwicklung Very strong development portfolio Mainz Globally integrated in hardware and software Walldorf development One of the biggest IBM R&D location world wide IBM Forschung & Böblingen Acknowledged innovation team Entwicklung ~ 310 patent submissions 2008 München ~ 400 students 2008 IND GmbH ~ 80 new-hires 2007 2 IBM Research & Development Locations worldwide Böblingen Greenock ▲ Yorktown Heights Toronto Hursley ▲ Peking Rochester Krakau Boulder Dublin Moskau Beaverton Paris Fujisawa ▲ Zürich ▲ Tokio Burlington Rom Yasu Yamato Endicott San Jose Shanghai ▲ Almaden East Fishkill Santa Teresa Poughkeepsie
    [Show full text]