1992 Cern School of Computing

Total Page:16

File Type:pdf, Size:1020Kb

1992 Cern School of Computing ORGANISATION EUROPEENNE POUR LA RECHERCHE NUCLEAIRE CERN EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH 1992 CERN SCHOOL OF COMPUTING Scuola Superiore G. Reiss Romoli, L'Aquila, Italy 30 August-12 September 1992 PROCEEDINGS Editor: C. Verkerk GENEVA 1993 © Copyright CERN, Genève, 1993 Propriété littéraire et scientifique réservée Literary and scientific copyrights reserved in pour tous les paya < 11» inonde. Ce document ne all countries of the world. This report, or peut être reproduit ou traduit en tout ou en any part of it. may not be reprinted or trans­ partie sans l'autorisation écrite du Directeur lated without written permission ol the copy­ général du CERN, titulaire du droit d'auteur. right holder, the Director-General of CERN. Dans les cas appropriés, et s'il s'agit d'utiliser However, permission will be freely granted for le document à des fins non commerciales, cette appropriate non-commercial use. autorisation sera volontiers accordée. If any patentable invention or registrable Le CERN ne revendique pas la propriété des design is described in the report. CERN makes inventions brevetables et dessins ou modèles no claim to property rights in it but offers i( susceptibles de dépôt qui pourraient être for the free use of research institutions, man­ décrits dans le présent document ; ceux-ci peu­ ufacturers and others. CERN, however, may vent être librement utilisés par les instituts de oppose any attempt by a user to claim any recherche, les industriels et autres intéressés. proprietary or patent rights in such inventions Cependant, le CERN se réserve le droit de or designs as may be described in the present s'opposer à toute revendication qu'un usager document. pourrait faire de la propriété scientifique ou industrielle de toute invention et tout dessin OU modèle décrits dans le présent document. ISSN 0007-8328 ISBN 92-9083-052-20 CERN 93-03 6 July 1993 ORGANISATION EUROPÉENNE POUR LA RECHERCHE NUCLEAIRE CERN EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH 1992 CERN SCHOOL OF COMPUTING Scuola Superiore G. Reiss Romoli, L'Aquila, Italy 30 August-12 September 1992 PROCEEDINGS Editor: C Verkerk GENEVA 1993 CERN-Service d'information scientifique-RD/907-2200~juiHet 1993 Abstract These Proceedings contain written accounts of most of the lectures given at the 1992 CERN School of Computing, covering a variety of topics. A number of aspects of parallel and of distributed computing were treated in five lecture series: "Status of parallel computing", "An introduc­ tion to the APE100 computer", "Introduction to distributed systems", "Inter­ process communication" and "SHIFT, heterogeneous workstation services at CERN". Triggering and data acquisition for future colliders was covered in: "Neu­ ral networks for trigger" and "Architecture for future data acquisition sys­ tems". Analysis of experiments was treated in two series of lectures: "Off-line software in HEP: experience and trends", and "Is there a future for event display?". Design techniques were the subject of lectures on: "Computer-aided de­ sign of electronics", "CADD, computer-aided detector design" and "Software design, the methods and the tools". The other lectures reproduced here treated various fields: "Second gen­ eration expert systems", "Multidatabase in health care systems", "Multimedia networks, what is new ?", "Pandora: an experimental distributed multimedia, system", "Benchmarking computers for HEP", "Experience with some early computers" and "Turing and ACE; lessons from a 1946 computer design". Ml Preface The fifteenth CERN School of Computing took place in L'Aquila, Italy. Sixty-six students from fourteen countries participated. The School was organised in collaboration with the "ïstituto Nazionale di Fisica Nucleare" (INFN). We are very grateful to Drs. Sandro Centro and Enzo Valente for their participation in organising the School, and we thank Professor N. Cabibbo for his active support. The School was hosted by the "Scuola Superiore Guglielmo Reiss Romoli". We were impressed by the excellent facilities offered by this centre and we wish to express our sincere thanks to its Director, Professor S. Rotella, and to his representative Dr. B. Santariga for making it possible to use their facilities. The assistance provided by the staff of the "Sculoa Superiore G. Reiss Romoli" is gratefully acknowledged. Special thanks go to the print shop, who produced thousands of pages at very short notice and to the people who assisted with the e-mail facility and the PCs. Mrs. Ingiacomo and Messrs de Meo and Aglioti were also of great help. The lecture programme was again varied and greatly appreciated by the partici­ pants. All lecturers are sincerely thanked for their efforts in preparing and delivering their lectures, for providing written accounts of their presentations, and for their availability to discuss with the students. The lecture programme was complemented by excellent introductions to software design methods and tools, followed by very demanding practical work. Most of the students tackled the practical excercises with great interest and enthusiasm. Drs. Paolo Palazzi and Stephen Fisher, who organised the practical sessions are very warmly thanked for their efforts and congratulated with the results. Our sincere thanks also go to their assistants: Arash Khodabandeh, Alberto Aimar, Tlior Lunde and Bernard Sarosi. An excursion was organised to the near-by Gran Sasso Laboratory. The visit of the underground experimental halls was very much appreciated. We thank INFN and in particular Professor Navarro for organising this visit. The participants will certainly remember the excellent meals served by the restau­ rant of the Reiss Romoli centre. The manager, Mr. Bardelli, and all his staff are sincerely thanked for having taken such good care of us. We express our gratitude to our secretaries, Mrs. Ingrid Barnett and Mrs Cristina Miletti. We thank the students for their active participation and we wish all of them success in their professional life. C.Verkerk Editor V ADVISORY COMMITTEE R. BRUN, CERN, Geneva, Switzerland B.E. CARPENTER, CERN, Geneva, Switzerland R.F. CHURCHHOUSE, University of Wales, Cardiff, U.K. (Chairman) R.W. DOBINSON, CERN, Geneva, Switzerland J J. THRESHER, CERN, Geneva, Switzerland C. VERKERK, CERN, Geneva, Switzerland ( Scientific Secretary) D.O. WILLIAMS, CERN, Geneva, Switzerland P. 2ANELLA, Geneva University, Switzerland and CRS4, Cagliari, Italy I. BARNETT, CERN, Geneva, Switzerland (School Secretary) Editor's Note No written account of the lectures by L. Mapelli, "Architecture of future data acquisition systems" was available, but numerous self-explanatory transparencies exist. The editor decided to exceptionally reproduce these transparencies as an Appendix to these Proceedings. These, combined with the paper by the same author in the Proceedings of the 1991 CERN School of Computing (Report CERN 92-02), should give a complete account of Mapeili's presentation in L'Aquila. vt Contents Abstract iii Preface v Advisory Committee vi Editor's Note vi Contents vii Software Design, the methods and the tools S.M. Fisher and P, Palazzi 1 Status of Parallel Computing P. Zanella 7 An Introduction to the APE100 Computer N. Cabibboy F. Rapuano and R. Tripiccione 21 Introduction to Distributed Systems S.J. Mullender 29 Interprocess Communication S.J. Mullender 47 SHIFT, Heterogeneous Workstation Services at CERN G. Lee and L. Robertson 80 Off-line Software in HEP: Experience and Trends N.A. McCubbin 90 Is there a Future for Event Display? H. Drevermann, D. Kuhn and B.S. Nilsson 102 Neural Networks for Trigger S.R. Amendolia 135 Computer-aided Design for Electronics S. Centro 160 CADD, Computer Aided Detector Design P.M. Ferran 167 Second Generation Expert Systems D.A. Bell 177 VII Benchmarking Computers for HEP E. Mcintosh 186 Multidatabases in Health Care systems D.A. Bell 204 Multimedia Networks; what's new? DM. McAuley 215 Pandora: An experimental distributed multimedia system D.R. McAuley 220 Experience with Some Early Computers R.F. Churchhouse 223 Turing and ACE; Lessons from a 1946 Computer Design B.E. Carpenter 230 Appendix Architecture of future data acquisition systems L. Mapelli 237 List of Participants 336 vili Software Design, the methods and the tools S.M. Fisher, RAL. Chilton. UK P. Palazzi, CERN, Geneva. CH Abstract OMT, a, method for software design, was introduced and compared with similar approaches and related CASE tools were demonstrated. Students formed teams and each team chose a project and applied OMT as far as producing a design document. The course was based on a book by J. Rumbaugh et al. so we just explain the outline of the course and refer our readers to the book. 1 Summary of lectures A software system goes through phases of requirements analysis, design, implementation, testing, operations and maintenance. After analysis (what to build), comes the design phase (how to build it): system design requires decisions about architecture then detailed design concentrates on mapping of data structures and on algorithms. Design makes use of models, abstractions of a system that permit us to understand it before we build it. To build a complex system, the developers use different views of the system, build models using a, precise notation, verify that the models satisfy the requirements of the system, and gradually add detail to transform the models into an implementation. A methodology is a combination of models with a prescription to use them across the software lifecycle. The Object Modelling Technique (OMT) is a methodology that spans analysis, design and implementation using a single terminology, and can have various targets, including conventional programming languages as well as 00 ones. OMT is based on extensions to three well proven models: object : describes the structure of the data with an an extended ER model. dynamic : models temporal relationships of those objects having significant dynamic behaviour using interacting finite state machines. functional : shows functional relationship among data values using a small extension to the Dataflow diagram of SA/SD. In the lectures OMT was compared with other object-oriented approaches as well as with SA/SD, Petri Nets and Entity-Relationship (ER) modelling.
Recommended publications
  • Validated Products List, 1995 No. 3: Programming Languages, Database
    NISTIR 5693 (Supersedes NISTIR 5629) VALIDATED PRODUCTS LIST Volume 1 1995 No. 3 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Product Data - IGES Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1995 QC 100 NIST .056 NO. 5693 1995 NISTIR 5693 (Supersedes NISTIR 5629) VALIDATED PRODUCTS LIST Volume 1 1995 No. 3 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Product Data - IGES Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1995 (Supersedes April 1995 issue) U.S. DEPARTMENT OF COMMERCE Ronald H. Brown, Secretary TECHNOLOGY ADMINISTRATION Mary L. Good, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Arati Prabhakar, Director FOREWORD The Validated Products List (VPL) identifies information technology products that have been tested for conformance to Federal Information Processing Standards (FIPS) in accordance with Computer Systems Laboratory (CSL) conformance testing procedures, and have a current validation certificate or registered test report. The VPL also contains information about the organizations, test methods and procedures that support the validation programs for the FIPS identified in this document. The VPL includes computer language processors for programming languages COBOL, Fortran, Ada, Pascal, C, M[UMPS], and database language SQL; computer graphic implementations for GKS, COM, PHIGS, and Raster Graphics; operating system implementations for POSIX; Open Systems Interconnection implementations; and computer security implementations for DES, MAC and Key Management.
    [Show full text]
  • DB2SPI B.03.02 User's Guide
    HP OpenView Tiering Matrix For HP and Partner use Page 1 of 5 Updated: 18 August 2006 (For OV Performance Agent, OV Operations Agent, SPIs, OVIS, OVAI, GlancePlus and GlancePlus Pak) Usage Notes 1. This matrix is a tool for identifying what tier a system is in. NOT ALL of the listed products are supported on all systems in this matrix. Please read this introduction carefully and also look at the footnotes on each page provided for special cases. 2. Single-user Systems (Unix): For OV Operations Agents, Performance Agents and SPIs a workstation used as a single-user system is classified as a Tier 0 system. 3. Desktop Systems (Windows, Linux, Netware): Professional Desktop License is for use on a single-user Intel-based PC that is running Windows NT Workstation, Windows 2000 Professional, Windows XP Professional, RedHat Linux or Novell NetWare. 4. The tiering below is valid for all systems running AIX, HP-UX, Tru64 UNIX, Digital Unix, Linux, Sun Solaris, MS Windows and Novell NetWare. All other systems are tiered / priced using separate product numbers as follows: o OV Multi-vendor Agent - B7442AA, o OV Multi-vendor Operations Agent - B7443AA, o OV Multi-vendor Performance Agent - B7444AA. 5. Multiple Partitions (Virtual Servers): a. UNIX-based If an OV Agent is being ordered for an UNIX-based system which has multiple partitions / domains (virtual systems) a ‘password request form’ specifying the number of ‘additional’ partitions/domains has to be completed and sent to the password delivery center. There is one license required based upon the tiering of the hosting system and (n-1) free additional Tier 1 licenses for the additional partitions/domains.
    [Show full text]
  • Binary Translation 1 Abstract Binary Translation Is a Technique Used To
    Binary Translation 1 Abstract Binary translation is a technique used to change an executable program for one computer architecture and operating system into an executable program for a different computer architecture and operating system. Two binary translators are among the migration tools available for Alpha AXP computers: VEST translates OpenVMS VAX binary images to OpenVMS AXP images; mx translates ULTRIX MIPS images to DEC OSF/1 AXP images. In both cases, translated code usually runs on Alpha AXP computers as fast or faster than the original code runs on the original architecture. In contrast to other migration efforts in the industry, the VAX translator reproduces subtle CISC behavior on a RISC machine, and both open-ended translators provide good performance on dynamically modified programs. Alpha AXP binary translators are important migration tools - hundreds of translated OpenVMS VAX and ULTRIX MIPS images currently run on Alpha AXP systems. When Digital started to design the Alpha AXP architecture in the fall of 1988, the Alpha AXP team was concerned about how to run existing VAX code and soon-to-exist MIPS code on the new Alpha AXP computers.[1,2] To take full advantage of the performance capability of a new computer architecture, an application must be ported by rebuilding, using native compilers. For a single program written in a standard programming language, this is a matter of recompile and run. A complex software application, however, can be built from hundreds of source pieces using dozens of tools. A native port of such an application is possible only when all parts of the build path are running on the new architecture.
    [Show full text]
  • Unix and Linux System Administration and Shell Programming
    Unix and Linux System Administration and Shell Programming Unix and Linux System Administration and Shell Programming version 56 of August 12, 2014 Copyright © 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2009, 2010, 2011, 2012, 2013, 2014 Milo This book includes material from the http://www.osdata.com/ website and the text book on computer programming. Distributed on the honor system. Print and read free for personal, non-profit, and/or educational purposes. If you like the book, you are encouraged to send a donation (U.S dollars) to Milo, PO Box 5237, Balboa Island, California, USA 92662. This is a work in progress. For the most up to date version, visit the website http://www.osdata.com/ and http://www.osdata.com/programming/shell/unixbook.pdf — Please add links from your website or Facebook page. Professors and Teachers: Feel free to take a copy of this PDF and make it available to your class (possibly through your academic website). This way everyone in your class will have the same copy (with the same page numbers) despite my continual updates. Please try to avoid posting it to the public internet (to avoid old copies confusing things) and take it down when the class ends. You can post the same or a newer version for each succeeding class. Please remove old copies after the class ends to prevent confusing the search engines. You can contact me with a specific version number and class end date and I will put it on my website. version 56 page 1 Unix and Linux System Administration and Shell Programming Unix and Linux Administration and Shell Programming chapter 0 This book looks at Unix (and Linux) shell programming and system administration.
    [Show full text]
  • VAX 4000 Model 100 to DEC 3000 Model 400S AXP Upgrade Instr
    VAX 4000 Model 100 to DEC 3000 Model 400S AXP Upgrade Instructions MLO-010669 Part Number: EK-VX44S-IN. A01 Options You Can Upgrade Can Cannot Upgrade Upgrade Disks: RZ23L*, RZ24L* RZ57 RZ24* RZ25* RZ26* RZ55* RZ56* RZ58* Drives: RRD42** B400X RWZ01** DSSI Devices RX26* R400X TLZ04 TF85 TLZ06** TK50 TSZ05* TK70 TSZ07* TKZ08 TZ30 TSV05 TZ85* TU81 TZK10 Expansion Boxes: SZ03 SZ12 SZ16 Memory: None *Supported only in external device. **Including tabletop device. Check Components Shipped Your shipment should contain the following two kits. If you are missing any of these components, contact your Digital sales representative. System Kit: Ethernet Loopback Connector System Unit SCSI Documentation Terminator Antistatic Modem Loopback Wrist Strap Connector Printer Port Terminator System Power Cord Network Label Screwdriver Accessory Kit: Upgrade xxxxxxx xxxxxxxxxxx Card xxx Rubber Grommets RX26 Brackets Metal Support Plate TZ30 RFI Return Shield Address Label MLO-010670 Remove the System Unit Cover Follow these steps to remove the system unit cover: 1. Turn off the system by pressing the on/off switch to the off (O) position. 2. Disconnect the cables, connectors, and terminators from the system unit. 3. Loosen the two captive screws on the back of the system unit. B 1 A 0 0 Captive Screws MLO-010744 4. Slide the cover forward and lift it up from the system unit. Set the cover aside. Remove Fixed Disk Drives Note: The DEC 3000 system can hold two fixed disk drives and one removable-media drive. 1. Press and hold the spring clip that locks the disk drive in position. 2.
    [Show full text]
  • Social Construction and the British Computer Industry in the Post-World War II Period
    The rhetoric of Americanisation: Social construction and the British computer industry in the Post-World War II period By Robert James Kirkwood Reid Submitted to the University of Glasgow for the degree of Doctor of Philosophy in Economic History Department of Economic and Social History September 2007 1 Abstract This research seeks to understand the process of technological development in the UK and the specific role of a ‘rhetoric of Americanisation’ in that process. The concept of a ‘rhetoric of Americanisation’ will be developed throughout the thesis through a study into the computer industry in the UK in the post-war period . Specifically, the thesis discusses the threat of America, or how actors in the network of innovation within the British computer industry perceived it as a threat and the effect that this perception had on actors operating in the networks of construction in the British computer industry. However, the reaction to this threat was not a simple one. Rather this story is marked by sectional interests and technopolitical machination attempting to capture this rhetoric of ‘threat’ and ‘falling behind’. In this thesis the concept of ‘threat’ and ‘falling behind’, or more simply the ‘rhetoric of Americanisation’, will be explored in detail and the effect this had on the development of the British computer industry. What form did the process of capture and modification by sectional interests within government and industry take and what impact did this have on the British computer industry? In answering these questions, the thesis will first develop a concept of a British culture of computing which acts as the surface of emergence for various ideologies of innovation within the social networks that made up the computer industry in the UK.
    [Show full text]
  • Computer Architectures an Overview
    Computer Architectures An Overview PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 25 Feb 2012 22:35:32 UTC Contents Articles Microarchitecture 1 x86 7 PowerPC 23 IBM POWER 33 MIPS architecture 39 SPARC 57 ARM architecture 65 DEC Alpha 80 AlphaStation 92 AlphaServer 95 Very long instruction word 103 Instruction-level parallelism 107 Explicitly parallel instruction computing 108 References Article Sources and Contributors 111 Image Sources, Licenses and Contributors 113 Article Licenses License 114 Microarchitecture 1 Microarchitecture In computer engineering, microarchitecture (sometimes abbreviated to µarch or uarch), also called computer organization, is the way a given instruction set architecture (ISA) is implemented on a processor. A given ISA may be implemented with different microarchitectures.[1] Implementations might vary due to different goals of a given design or due to shifts in technology.[2] Computer architecture is the combination of microarchitecture and instruction set design. Relation to instruction set architecture The ISA is roughly the same as the programming model of a processor as seen by an assembly language programmer or compiler writer. The ISA includes the execution model, processor registers, address and data formats among other things. The Intel Core microarchitecture microarchitecture includes the constituent parts of the processor and how these interconnect and interoperate to implement the ISA. The microarchitecture of a machine is usually represented as (more or less detailed) diagrams that describe the interconnections of the various microarchitectural elements of the machine, which may be everything from single gates and registers, to complete arithmetic logic units (ALU)s and even larger elements.
    [Show full text]
  • Competitive Exams History of Computers- Examrace
    9/27/2021 Competitive Exams History of Computers- Examrace Examrace Competitive Exams History of Computers Get top class preparation for competitive exams right from your home: get questions, notes, tests, video lectures and more- for all subjects of your exam. First Generation (1939 − 1954) -Vacuum Tube 1937-John V. Atanasoff designed the first digital electronic computer 1939-Atanasoff and Clifford Berry demonstrate in Nov. The ABC prototype 1941-Konrad Zuse in Germany developed in secret the Z3 1943-In Britain, the Colossus was designed in secret at Bletchley Park to decode German messages 1944-Howard Aiken developed the Harvard Mark I mechanical computer for the Navy 1945-John W. Mauchly and J Presper Eckert built ENIAC at U of PA for the US Army 1946-Mauchly and Eckert start Electronic Control Co. received grant from National Bureau of Standards to build a ENIAC-type computer with magnetic tape input/output, renamed UNIVAC in 1947 but run out of money, formed in Dec. 1947 the new company Eckert-Mauchly Computer Corporation (EMCC) . 1948-Howard Aiken developed the Harvard Mark III electronic computer with 5000 tubes 1948 − U of Manchester in Britain developed the SSEM Baby electronic computer with CRT memory 1949-Mauchly and Eckert in March successfully tested the BINAC stored-program computer for Northrop Aircraft, with mercury delay line memory and a primitive magentic tape drive; Remington Rand bought EMCC Feb. 1950 and provided funds to finish UNIVAC 1950-Commander William C. Norris led Engineering Research Associates to develop
    [Show full text]
  • Recapping a Decade of IT Legacy Committee Accomplishments
    Measuring Success = Volunteer Hours! Recapping a Decade of IT Legacy Committee Accomplishments. December 2015 ©2015, Lowell A. Benson for the VIP Club. Measuring Success = Volunteer Hours! December 6, 2015 The VIP Club's Why, What, and Who. From our constitution MISSION: The VIP CLUB is a social and service organization dedicated to enriching the lives of the members through social interaction and dissemination of information. GOALS: The CLUB shall provide an opportunity for social interaction of its members. The CLUB shall provide services and information appropriate to the interest of its members. The CLUB shall provide a mechanism for member services to the community. The CLUB shall provide a forum for information on the heritage and on-going action of the heritage companies (Twin Cities based Univac/Unisys organizations and the predecessor and successor firms). MEMBERS are former employees and their spouses of Twin-Cities- based Univac / Unisys organizations and predecessor or successor business enterprises who are retired or eligible to retire, and are at least 55 years of age - Membership is voluntary. Payment of annual dues is a condition of membership. Each membership unit (retiree and spouse) is entitled to one vote. The CLUB maintains a master file of all members. This master file is the property of the CLUB and is used for communication with members and for facility access. We dedicate this booklet/article to ‘Ole’ and our VIP Club founder, Millie Gignac. ©2015, LABenson for the VIP Club Measuring Success = Volunteer Hours! Introduction The VIP Club's Information Technology (IT) Legacy Committee started in October 2005 when LMCO's Richard 'Ole' Olson brought a Legacy committee idea to the VIP Club's board.
    [Show full text]
  • DEC 2000 Model 300 AXP Upgrade Information
    DEC 2000 Model 300 AXP Upgrade Information Order Number: EK–D23AX–UP. A01 Digital Equipment Corporation Maynard, Massachusetts First Printing, December 1993 Digital Equipment Corporation makes no representations that the use of its products in the manner described in this publication will not infringe on existing or future patent rights, nor do the descriptions contained in this publication imply the granting of licenses to make, use, or sell equipment or software in accordance with the description. Possession, use, or copying of the software described in this publication is authorized only pursuant to a valid written license from Digital or an authorized sublicensor. © Digital Equipment Corporation 1993. All Rights Reserved. The following are trademarks of Digital Equipment Corporation: Alpha AXP, AXP, Bookreader, DEC, DECaudio, DECchip, DECconnect, DEC GKS, DECpc, DEC PHIGS, DECstation, DECsystem, DECsystem 3100, DECwindows, DECwrite, DELNI, Digital, MicroVAX, MicroVAX I, MicroVAX II, OpenVMS, RX, ThinWire, TURBOchannel, ULTRIX, VAX, VAX DOCUMENT, VAXcluster, VAXstation, the AXP logo, and the DIGITAL logo. Motif is a registered trademark of Open Software Foundation, Inc., licensed by Digital. FCC Notice: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense.
    [Show full text]
  • Alpha AXP PC Hardware
    • High-performance Networking • OpenVMS AXP System Software • Alpha AXP PC Hardware Digital Technical Journal Digital Equipment Corporation cleon cleon Volume 6 Number l Wimer 1994 Editorial jane C. Blake, Managing Editor Helen L. Patterson, Editor Kathleen M. Stetson, Editor Circulation Catherine M. Phillips, Administrator Dorothea B. Cassady, Secretary Production Terri Autieri, Production Editor Anne S. Katzeff, Typographer Peter R. Woodbury, Illustrator Advisory Boa.-d Samuel H. Fuller, Chairman !Uchard W Beane Donald Z. Harbert !Uchard]. Hollingsworth Alan G. Nemeth jean A. Proulx jeffrey H. Rudy Stan Smits Hobert M. Supnik Gayn B. Winters The Digital Technicaljournal is a refereed journal published quarterly by Digital Equipment Corporation, 30 Porter Road LJ02/Dl0, Littleton, Massachusetts 01460. Subscriptions to the journal are $40.00 (non-US $60) for four issues and $75.00 (non­ U.S. $115) for eight issues and must be prepaid in U.S. funds. Universit)' and college professors and Ph.D. students in the electrical engineering and computer science fields receive complimentary subscriptions upun request. Orders, inquiries, and address changes should be sent to the Digital Technicaljo urnal at the published-by address. Inquiries can also be sent electronically to [email protected]. COM. Single copies and back issues are available for S 16.00 each by calling DECdirect at 1-800-DJGlTAL (J-800-344-4825). Recent back issues of the journal are also available on the Internet at gatekeeper.dec.com in the directory /pub/DEC/OECinfo/DTJ. Digital employees may order subscriptiuns through Headers Choice by enrering VTX PROFILE at the system prompt. Comments on the content of any paper are welcomed and may be sent to the managing editor at the published-by or network address.
    [Show full text]
  • Using Decwindows Motif for Openvms
    VSI OpenVMS Using DECwindows Motif for OpenVMS Document Number: DO-DUSEDW-01A Publication Date: October 2019 Revision Update Information: This is a new manual. Operating System and Version: VSI OpenVMS Integrity Version 8.4-1H1 VSI OpenVMS Alpha Version 8.4-2L1 Software Version: DECwindows Motif for OpenVMS Version 1.7F VMS Software, Inc., (VSI) Bolton, Massachusetts, USA Using DECwindows Motif for OpenVMS: Copyright © 2019 VMS Software, Inc., (VSI), Bolton Massachusetts, USA Legal Notice Confidential computer software. Valid license from VSI required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice. The only warranties for VSI products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. VSI shall not be liable for technical or editorial errors or omissions contained herein. HPE, HPE Integrity, HPE Alpha, and HPE Proliant are trademarks or registered trademarks of Hewlett Packard Enterprise. The VSI OpenVMS documentation set is available on DVD. ii Using DECwindows Motif for OpenVMS Preface .................................................................................................................................... ix 1. About VSI ....................................................................................................................
    [Show full text]