Decnet-Plusftam and Virtual Terminal Use and Management

Total Page:16

File Type:pdf, Size:1020Kb

Decnet-Plusftam and Virtual Terminal Use and Management VSI OpenVMS DECnet-Plus FTAM and Virtual Terminal Use and Management Document Number: DO-FTAMMG-01A Publication Date: June 2020 Revision Update Information: This is a new manual. Operating System and Version: VSI OpenVMS Integrity Version 8.4-2 VSI OpenVMS Alpha Version 8.4-2L1 VMS Software, Inc., (VSI) Bolton, Massachusetts, USA DECnet-PlusFTAM and Virtual Terminal Use and Management Copyright © 2020 VMS Software, Inc. (VSI), Bolton, Massachusetts, USA Legal Notice Confidential computer software. Valid license from VSI required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice. The only warranties for VSI products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. VSI shall not be liable for technical or editorial errors or omissions contained herein. HPE, HPE Integrity, HPE Alpha, and HPE Proliant are trademarks or registered trademarks of Hewlett Packard Enterprise. Intel, Itanium and IA-64 are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. UNIX is a registered trademark of The Open Group. The VSI OpenVMS documentation set is available on DVD. ii DECnet-PlusFTAM and Virtual Terminal Use and Management Preface .................................................................................................................................... ix 1. About VSI ..................................................................................................................... ix 2. Intended Audience ......................................................................................................... ix 3. Related Documents ........................................................................................................ ix 4. VSI Encourages Your Comments .................................................................................... ix 5. Conventions .................................................................................................................... x Chapter 1. OSI Applications Overview ............................................................................... 1 1.1. FTAM Overview .......................................................................................................... 1 1.2. FTAM Gateways .......................................................................................................... 2 1.3. FTAM User Facilities ................................................................................................... 2 1.4. Virtual Terminal Overview ........................................................................................... 2 1.4.1. Virtual Terminal Interactions .............................................................................. 3 1.4.2. Virtual Terminal Operation in a Network ............................................................ 4 1.4.3. Virtual Terminal Profiles .................................................................................... 5 1.4.4. Virtual Terminal Repertoires .............................................................................. 6 Chapter 2. Using FTAM ....................................................................................................... 7 2.1. FTAM File Specifications ............................................................................................. 7 2.1.1. File Specification Format for OpenVMS ............................................................. 7 2.1.2. File Specification Format for UNIX ................................................................. 11 2.2. FTAM Commands ...................................................................................................... 13 2.2.1. FTAM Responder Log File (OpenVMS) ........................................................... 14 2.2.2. Copying Files .................................................................................................. 14 2.2.3. Appending Files .............................................................................................. 16 2.2.4. Deleting Files .................................................................................................. 18 2.2.5. Listing Files .................................................................................................... 18 2.2.6. Renaming Files ............................................................................................... 20 2.3. Recovering from Data Transfer Errors While Copying or Appending ............................. 20 2.4. File Protection Assignment Upon File Creation ............................................................ 22 Chapter 3. Using the DAP–FTAM Gateway (OpenVMS) ............................................... 23 3.1. Function of the DAP–FTAM Gateway ......................................................................... 23 3.2. Invoking the DAP–FTAM Gateway from OpenVMS FTAM Nodes ............................... 23 3.3. Supported Qualifiers for OpenVMS Systems ............................................................... 24 3.4. Supported Document Types ........................................................................................ 24 3.5. Quoting File Names ................................................................................................... 25 3.6. DAP–FTAM Gateway Messages ................................................................................. 25 Chapter 4. Using the FTAM–FTP Gateway (UNIX) ....................................................... 27 4.1. Gateway Functions and Sample Commands ................................................................. 27 4.2. Using the FTAM–FTP Gateway from an Internet Host ................................................. 28 4.2.1. Invoking the FTAM–FTP Gateway from Internet Nodes .................................... 28 4.2.2. Specifying a Concatenation Character ............................................................... 28 4.2.3. Sample Internet Commands .............................................................................. 30 4.2.4. Starting an FTP Session ................................................................................... 31 4.2.5. Ending an FTP Session .................................................................................... 31 4.2.6. Connecting to a Remote OSI Node ................................................................... 32 4.2.7. Disconnecting from a Remote OSI Node .......................................................... 32 4.2.8. Viewing Remote Directories ............................................................................. 32 4.2.9. Displaying Remote Files .................................................................................. 33 4.2.10. Setting the File Transfer Type ........................................................................ 34 4.2.11. Copying Files Between Systems ..................................................................... 34 4.3. Using the FTAM–FTP Gateway from an OSI Node ..................................................... 36 iii DECnet-PlusFTAM and Virtual Terminal Use and Management 4.3.1. Invoking the FTAM–FTP Gateway from OpenVMS FTAM Nodes ..................... 36 4.3.2. Sample OpenVMS FTAM Commands .............................................................. 36 4.3.3. Viewing Remote Directories ............................................................................. 37 4.3.4. Copying Files Between Systems ....................................................................... 37 4.3.5. Deleting Remote Files ..................................................................................... 38 4.3.6. Renaming Files Between Systems .................................................................... 38 4.4. Special Considerations for Internet Systems ................................................................. 38 4.5. Special Considerations for Internet Systems Not Based on UNIX .................................. 38 Chapter 5. Using Virtual Terminal .................................................................................... 41 5.1. Accessing Remote Nodes ........................................................................................... 41 5.1.1. Starting a VT Association ................................................................................ 41 5.1.2. Using VT in Command Mode .......................................................................... 42 5.2. Using Gateways for Remote OSI Node Access ............................................................ 47 5.2.1. Using the LAT/VT Gateway ............................................................................. 47 5.2.2. Using the OpenVMS VT/LAT Gateway ............................................................ 49 5.2.3. Using the Telnet/VT Gateway .......................................................................... 50 5.2.4. Using the VT/Telnet Gateway .......................................................................... 52 5.2.5. Using the UNIX CTERM/VT Gateway ............................................................. 53 5.2.6. Using the UNIX VT/CTERM Gateway ............................................................
Recommended publications
  • Allgemeines Abkürzungsverzeichnis
    Allgemeines Abkürzungsverzeichnis L.
    [Show full text]
  • Networking Standards Mark Davies, Digital Equipment Corporation
    N92-12499 Networking Standards Mark Davies, Digital Equipment Corporation ABSTRACT The enterprise network is currently a multivendor environment consisting of many defacto and proprietary standards. During the 1990s, these networks will evolve towards networks which are based on international standards in both the LAN and WAN space. Also, you can expect to see the higher level functions and applications begin the same transition. The Open Network Advantage Market Requirements OPEN NETWORKS!!! Multi-protocol, multi-platform, multi-vendor networks working together International AND defacto standards Effortless communications within and between enter- prises Ability to move to standards at own pace What is an Open System? Defined as: A vendor-neutral computing environment: - compliant with International and defacto standards - permits system and network interoperability or software applications portability - includes consistency of data and human access - satisfies one or more of a business's functional requirements Standards Benefits from networks based on international and defacto standards o Vendor independence o Applications portability o Investment protection o Improved communications leading to increased productivity o Network flexibility 13DSDDED Network Architectures: DECnet, OSI, TCP/IP DECnet OS) IP Application Application Internet Applications Protocols Presentation DMA Session Control Session Transport Transport Transport (NSP) (TP 0,2,4) (TCP / UDP) Network Network Network (CLNS) (CLNS/CONS) (IP) Data Link Data Link Data Link
    [Show full text]
  • Report on the Most Appropriate Indicators Related to the Basic Concepts
    D 4.1 – Report on the most appropriate indicators related to the basic concepts Report on the most appropriate indicators related to the basic concepts Deliverable D4.1 This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 870708 D 4.1 – Report on the most appropriate indicators related to the basic concepts Disclaimer: The contents of this deliverable are the sole responsibility of one or more Parties of the SmartCulTour consortium and can under no circumstances be regarded as reflecting the position of the Research Executive Agency and European Commission under the European Union’s Horizon 2020 programme. Copyright and Reprint Permissions “You may freely reproduce all or part of this paper for non-commercial purposes, provided that the following conditions are fulfilled: (i) to cite the authors, as the copyright owners (ii) to cite the SmartCulTour Project and mention that the EC co-finances it, by means of including this statement “Smart Cultural Tourism as a Driver of Sustainable Development of European Regions - SmartCulTour Project no. H2020-870708 co financed by EC H2020 program” and (iii) not to alter the information.” _______________________________________________________________________________________ How to quote this document: Petrić, L., Mandić, A., Pivčević, S., Škrabić Perić, B., Hell, M., Šimundić, B., Muštra, V., Mikulić, D., & Grgić, J. (2020). Report on the most appropriate indicators related to the basic concepts. Deliverable 4.1 of the Horizon 2020 project SmartCulTour (GA number 870708), published on the project web site on September 2020: http://www.smartcultour.eu/deliverables/ D 4.1 – Report on the most appropriate indicators related to the basic concepts This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No.
    [Show full text]
  • Inter-Autonomous-System Routing: Border Gateway Protocol
    Inter-Autonomous-System Routing: Border Gateway Protocol Antonio Carzaniga Faculty of Informatics University of Lugano May 18, 2010 © 2005–2007 Antonio Carzaniga 1 Outline Hierarchical routing BGP © 2005–2007 Antonio Carzaniga 2 Routing Goal: each router u must be able to compute, for each other router v, the next-hop neighbor x that is on the least-cost path from u to v v x3 x4 u x2 x1 © 2005–2007 Antonio Carzaniga 3 Network Model So far we have studied routing over a “flat” network model 14 g h j 4 1 1 2 3 9 d e f 1 2 1 1 1 3 4 a b c Also, our objective has been to find the least-cost paths between sources and destinations © 2005–2007 Antonio Carzaniga 4 More Realistic Topologies © 2005–2007 Antonio Carzaniga 5 Even More Realistic ©2001 Stephen Coast © 2005–2007 Antonio Carzaniga 6 An Internet Map ©1999 Lucent Technologies © 2005–2007 Antonio Carzaniga 7 Higher-Level Objectives Scalability ◮ hundreds of millions of hosts in today’s Internet ◮ transmitting routing information (e.g., LSAs) would be too expensive ◮ forwarding would also be too expensive Administrative autonomy ◮ one organization might want to run a distance-vector routing protocol, while another might want to run a link-state protocol ◮ an organization might not want to expose its internal network structure © 2005–2007 Antonio Carzaniga 8 Hierarchical Structure Today’s Internet is organized in autonomous systems (ASs) ◮ independent administrative domains Gateway routers connect an autonomous system with other autonomous systems An intra-autonomous system routing protocol runs within an autonomous system (e.g., OSPF) ◮ this protocol determines internal routes ◮ internal router ↔ internal router ◮ internal router ↔ gateway router ◮ gateway router ↔ gateway router © 2005–2007 Antonio Carzaniga 9 Hierarchical Structure 32 25 24 AS3 31 21 23 35 AS2 33 22 34 11 42 13 12 AS4 43 14 AS1 41 © 2005–2007 Antonio Carzaniga 10 Inter-AS Routing An inter-autonomous system routing protocol determines routing at the autonomous-system level AS3 AS2 AS4 AS1 At AS3: AS1 → AS1; AS2 → AS2; AS4 → AS1.
    [Show full text]
  • Database Language SQL: Integrator of CALS Data Repositories
    Database Language SQL: Integrator of CALS Data Repositories Leonard Gallagher Joan Sullivan U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Information Systems Engineering Division Computer Systems Laboratory Gaithersburg, MD 20899 NIST Database Language SQL Integrator of CALS Data Repositories Leonard Gallagher Joan Sullivan U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Information Systems Engineering Division Computer Systems Laboratory Gaithersburg, MD 20899 September 1992 U.S. DEPARTMENT OF COMMERCE Barbara Hackman Franklin, Secretary TECHNOLOGY ADMINISTRATION Robert M. White, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY John W. Lyons, Director Database Language SQL: Integrator of CALS Data Repositories Leonard Gallagher Joan Sullivan National Institute of Standards and Technology Information Systems Engineering Division Gaithersburg, MD 20899, USA CALS Status Report on SQL and RDA - Abstract - The Computer-aided Acquisition and Logistic Support (CALS) program of the U.S. Department of Defense requires a logically integrated database of diverse data, (e.g., documents, graphics, alphanumeric records, complex objects, images, voice, video) stored in geographically separated data banks under the management and control of heterogeneous data management systems. An over-riding requirement is that these various data managers be able to communicate with each other and provide shared access to data and
    [Show full text]
  • Application Layer
    APPLICATION LAYER The application layer in the OSI model is the closest layer to the end user which means that the application layer and end user can interact directly with the software application. The application layer programs are based on client and servers. The Application layer includes the following functions: • Identifying communication partners: The application layer identifies the availability of communication partners for an application with data to transmit. • Determining resource availability: The application layer determines whether sufficient network resources are available for the requested communication. • Synchronizing communication: All the communications occur between the applications requires cooperation which is managed by an application layer. Services of Application Layers o Network Virtual terminal: An application layer allows a user to log on to a remote host. To do so, the application creates a software emulation of a terminal at the remote host. The user's computer talks to the software terminal, which in turn, talks to the host. The remote host thinks that it is communicating with one of its own terminals, so it allows the user to log on. o File Transfer, Access, and Management (FTAM): An application allows a user to access files in a remote computer, to retrieve files from a computer and to manage files in a remote computer. FTAM defines a hierarchical virtual file in terms of file structure, file attributes and the kind of operations performed on the files and their attributes. o Addressing: To obtain communication between client and server, there is a need for addressing. When a client made a request to the server, the request contains the server address and its own address.
    [Show full text]
  • Towards Coordinated, Network-Wide Traffic
    Towards Coordinated, Network-Wide Traffic Monitoring for Early Detection of DDoS Flooding Attacks by Saman Taghavi Zargar B.Sc., Computer Engineering (Software Engineering), Azad University of Mashhad, 2004 M.Sc., Computer Engineering (Software Engineering), Ferdowsi University of Mashhad, 2007 Submitted to the Graduate Faculty of the School of Information Sciences in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Pittsburgh 2014 UNIVERSITY OF PITTSBURGH SCHOOL OF INFORMATION SCIENCES This dissertation was presented by Saman Taghavi Zargar It was defended on June 3, 2014 and approved by James Joshi, Ph.D., Associate Professor, School of Information Sciences David Tipper, Ph.D., Associate Professor, School of Information Sciences Prashant Krishnamurthy, Ph.D., Associate Professor, School of Information Sciences Konstantinos Pelechrinis, Ph.D., Assistant Professor, School of Information Sciences Yi Qian, Ph.D., Associate Professor, College of Engineering, Dissertation Advisors: James Joshi, Ph.D., Associate Professor, School of Information Sciences, David Tipper, Ph.D., Associate Professor, School of Information Sciences ii Copyright c by Saman Taghavi Zargar 2014 iii Towards Coordinated, Network-Wide Traffic Monitoring for Early Detection of DDoS Flooding Attacks Saman Taghavi Zargar, PhD University of Pittsburgh, 2014 DDoS flooding attacks are one of the biggest concerns for security professionals and they are typically explicit attempts to disrupt legitimate users' access to services. Developing a com- prehensive defense mechanism against such attacks requires a comprehensive understanding of the problem and the techniques that have been used thus far in preventing, detecting, and responding to various such attacks. In this thesis, we dig into the problem of DDoS flooding attacks from four directions: (1) We study the origin of these attacks, their variations, and various existing defense mecha- nisms against them.
    [Show full text]
  • A Logical Approach to Representing and Reasoning About Interdomain Routing Policies
    A Logical Approach to Representing and Reasoning About Interdomain Routing Policies Anduo Wang and Zhijia Chen Temple University Abstract. The Internet paths connecting independently operated networks, also called domains or autonomous systems (ASes), are driven by semantically rich policies: the interdomain routing protocol that computes the Internet paths allows the ASes to influence path selection with their local policies, such as economic concerns or operational constraints. An AS can promote a policy compliant but globally longer path by carefully tweaking lower level path attributes that are used in the routing protocol. Such operational policies are notoriously complex and hard to understand. This paper takes a step back and asks whether a more principled logical approach can lead to AS policies that are easier to under- stand, reuse, evolve, and coexist. To this end, we propose to represent policies by database integrity constraints, in the form of headless datalog rules about what are the acceptable Internet paths. The simple datalog expression unifies a wide spectrum of AS policies, ranging from classic examples seen in today’s routing practice to futuristic ones proposed in various extensions to Internet routing. More importantly, by leveraging datalog’s connection to the theorem proving technique called the residue method, we developed a new technique for understanding the interactions among the policies — whether a policy can inadvertly affect another, and how to resolve the conflict. We also evaluated our logical policies, show- ing promising result with small overhead for conflict resolution on realistic large networks. 1 Introduction The Internet today is more than connecting remote hosts with valid paths.
    [Show full text]
  • Spatial Transition Learning on Road Networks with Deep Probabilistic Models
    Spatial Transition Learning on Road Networks with Deep Probabilistic Models Xiucheng Liy, Gao Congy, Yun Chengz y Nanyang Technological Univeristy, z ETH Zurich fxli055@e., [email protected], [email protected] TABLE I Abstract—In this paper, we study the problem of predicting the EXAMPLE OF TRIPS ON ROAD NETWORK. most likely traveling route on the road network between two given locations by considering the real-time traffic. We present a deep Route Destination Frequency probabilistic model–DeepST–which unifies three key explanatory factors, the past traveled route, the impact of destination and r3 ! r2 ! r4 C 400 real-time traffic for the route decision. DeepST explains the r3 ! r2 ! r5 ! r10 C 100 generation of next route by conditioning on the representations r1 ! r2 ! r5 ! r6 A 100 of the three explanatory factors. To enable effectively sharing r1 ! r2 ! r7 ! r8 B 100 r ! r ! r ! r ! r B 100 the statistical strength, we propose to learn representations of 1 2 5 6 9 K-destination proxies with an adjoint generative model. To incorporate the impact of real-time traffic, we introduce a high C r<latexit sha1_base64="(null)">(null)</latexit> 10 r<latexit sha1_base64="(null)">(null)</latexit> dimensional latent variable as its representation whose posterior r<latexit sha1_base64="(null)">(null)</latexit> 4 6 A r<latexit sha1_base64="lQIphb3ZxX5RFxPPJ2+0wE0HOKM=">AAAB6nicbZBNS8NAEIYn9avWr6hHL4tF8FQSEfRY9OKxov2ANpTNdtMu3WzC7kQooT/BiwdFvPqLvPlv3LY5aOsLCw/vzLAzb5hKYdDzvp3S2vrG5lZ5u7Kzu7d/4B4etUySacabLJGJ7oTUcCkUb6JAyTup5jQOJW+H49tZvf3EtRGJesRJyoOYDpWIBKNorQfd9/tu1at5c5FV8AuoQqFG3/3qDRKWxVwhk9SYru+lGORUo2CSTyu9zPCUsjEd8q5FRWNugny+6pScWWdAokTbp5DM3d8TOY2NmcSh7YwpjsxybWb+V+tmGF0HuVBphlyxxUdRJgkmZHY3GQjNGcqJBcq0sLsSNqKaMrTpVGwI/vLJq9C6qPmW7y+r9ZsijjKcwCmcgw9XUIc7aEATGAzhGV7hzZHOi/PufCxaS04xcwx/5Hz+AAKOjZo=</latexit>
    [Show full text]
  • User Manual Workbench
    User Manual Workbench Create and Customize User Interfaces for Router Control www.s-a-m.com WorkBench User Manual Issue1 Revision 5 Page 2 © 2017 SAM WorkBench User Manual Information and Notices Information and Notices Copyright and Disclaimer Copyright protection claimed includes all forms and matters of copyrightable material and information now allowed by statutory or judicial law or hereinafter granted, including without limitation, material generated from the software programs which are displayed on the screen such as icons, screen display looks etc. Information in this manual and software are subject to change without notice and does not represent a commitment on the part of SAM Limited. The software described in this manual is furnished under a license agreement and can not be reproduced or copied in any manner without prior agreement with SAM Limited, or their authorized agents. Reproduction or disassembly of embedded computer programs or algorithms prohibited. No part of this publication can be transmitted or reproduced in any form or by any means, electronic or mechanical, including photocopy, recording or any information storage and retrieval system, without permission being granted, in writing, by the publishers or their authorized agents. SAM operates a policy of continuous improvement and development. SAM reserves the right to make changes and improvements to any of the products described in this document without prior notice. Contact Details Customer Support For details of our Regional Customer Support Offices and contact details please visit the SAM web site and navigate to Support/247-Support. www.s-a-m.com/support/247-support/ Customers with a support contract should call their personalized number, which can be found in their contract, and be ready to provide their contract number and details.
    [Show full text]
  • Does Migration Destination Affect the Mortality Advantage of Mexican Immigrants? a Comparison of Traditional, New, and Emerging Destinations
    Does Migration Destination Affect the Mortality Advantage of Mexican Immigrants? A comparison of Traditional, New, and Emerging Destinations Andrew Fenelon1 1National Center for Health Statistics, 3311 Toledo Road, Hyattsville, MD 20782 Abstract Health declines for immigrants with greater exposure to the United States, but the specific characteristics of the migration and assimilation processes that contribute to this pattern are less clear. As the Mexican population in the US has grown, it has expanded outside traditional gateways in California and Texas to new destinations throughout the US. This study examines the mortality of Mexican immigrants in Traditional versus New and Emerging destinations in the US. Using National Health Interview Survey data between 1989 and 2009 the analysis finds that Mexican immigrants in New and Emerging destinations have a significant survival advantage over their counterparts in traditional established destinations. This advantage may reflect selective migration to new destinations, superior employment prospects, or slower behavioral assimilation. US-born Mexicans do not benefit from this advantage. The results suggest that the spatial characteristics of the assimilation process are important when considering the health of immigrants. Introduction The Hispanic mortality advantage refers to the finding that the Hispanic-origin population in the United States experiences lower adult mortality rates than the non-Hispanic white population, despite lower average socioeconomic status among Hispanics. The “Hispanic Paradox” calls attention to the fact that Hispanics resemble African-Americans in terms of socioeconomic indicators but non-Hispanic whites in health and mortality indicators (Hummer, et al., 2000, Markides and Eschbach, 2011). In many studies, Hispanics exhibit higher life expectancy than non-Hispanic whites, as well as more favorable profiles with respect to non-fatal conditions such as cancer incidence and severity, heart disease, and hypertension (Eschbach, et al., 2005, Singh and Siahpush, 2002).
    [Show full text]
  • Strategic Communication in Tourism
    STRATEGIC COMMUNICATION IN TOURISM DEPARTMENT OF DESIGN AND COMMUNICATION CENTRE FOR TOURISM, INNOVATION AND CULTURE (TIC) Bodil Stilling Blichfeldt Strategic Communication in Tourism Background, conceptualizations, introduction to analysis and relations to sustainable tourism and tourism innovation TIC TALKS no. 5, September 2017 1 Author info Associate Professor, Ph.D. Bodil Stilling Blichfeldt, TIC and Department of Design and Communication, University of Southern Denmark. Email: [email protected] Place of publication TIC is University of Southern Denmark’s multidisciplinary research center in tourism, innovation and culture. The center is located at the Kolding campus. TIC strives to transform the university to an engaged, collaborative institution where academics and students pursue an unrelenting examination of knowledge, its sources and its uses. TIC defines the university as a center for higher order knowledge creation and for collaboration with, and for, society at large. We do this through research-based education, education-based research and collaborative engagement with society. We aim to charter new territory in international academe, as well as in multi-level collaboration based on interdisciplinary research with a strong foundation in the Humanities. TIC engages in research dialogues through both a traditional peer-review publication strategy and through involvement in securing free access to knowledge. Supplementing traditional journal articles, TIC TALKS is one of TIC’s contributions to open access sharing and collaborative development of knowledge. TIC TALKS are provided by Centre for Tourism, Innovation and Culture, University of Southern Denmark Universitetsparken 1, Kolding, DK-6000 http://www.sdu.dk/en/Om_SDU/Institutter_centre/C_Tik.aspx The present manuscript qualifies as unfinished work-in-progress and the reader should bear in mind that the manuscript is quite likely to contain a series of errors, flaws and weaknesses.
    [Show full text]