3174 Establishment Controller ------Terminal User's Reference for Expanded Functions
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Operator's Guide for IBM 3270 Information Display Systems
GA27-2742-1 Operator's Guide for IBM 3270 Information Systems Display Systems i i Second Edition (July, 1972) This is a major revision of GA27-2742-0 and incorporates Technical Newsletter GN31-3001. Operating instructions for the printer and operator identification card reader have been added. Comments and corrections have been incorporated throughout the manual. Any system changes affecting this publication will be reported in subsequent revisions or Technical Newsletters. Additional copies of this manual can be obtained through IBM branch offices. Text for this publication has been prepared with the IBM SE LECTR IC ® Composer. A form is provided at the back of this publication for reader's comments. If the form has been removed, comments may be addressed to: IBM Systems Development Division, Product Publications, Dept. 520, Neighborhood Road, Kingston, N.V., 12401 © Copyright International Business Machines Corporation, 1971, 1972 Contents iii Table of Contents First Words to the Operator Qu ick Reference . 3 Operating the 3270* . 4 Introduction to Display Station Operation 5 Operator Controls 7,8 The Display Image 8 Indicators . 15-19 Keyboards 20 Typewriter Keyboard* ............... 24 I Data Entry Keyboard* ............... 44 I Operator Console Keyboard* . 62 I ·" Printer Operation * . 76 I,.~' , Operator Identification Card Reader . 88 I A Typical Job . · 90 Correcting Operator Errors . 90 Trouble with Your Machine · 92 Operator Trouble Report 92 Extras for the 3270* . .100 Selector Pen . · 101 Secu rity Key Lock .105 Audible Alarm . .106 Numeric Lock Feature .109 Understanding the 3270* .. 110 Data Processing · 111 Display Stations .. · 114 The IBM 3270 Information Display System · 115 ) Index · 119 *The complete table of contents for each section is on the first page of that section. -
Introduction to Mainframe Networking TCP/IP Problem Determination
z/OS Basic Skills Information Center Networking on z/OS z/OS Basic Skills Information Center Networking on z/OS Note Before using this information and the product it supports, read the information in “Notices” on page 251. This edition applies to z/OS (product number 5694-A01). We appreciate your comments about this publication. Comment on specific errors or omissions, accuracy, organization, subject matter, or completeness of this book. The comments you send should pertain to only the information in this manual or product and the way in which the information is presented. For technical questions and information about products and prices, please contact your IBM branch office, your IBM business partner, or your authorized remarketer. When you send comments to IBM, you grant IBM a nonexclusive right to use or distribute your comments in any way it believes appropriate without incurring any obligation to you. IBM or any other organizations will only use the personal information that you supply to contact you about the issues that you state on this form. Send your comments through this web site: http://publib.boulder.ibm.com/infocenter/zoslnctr/v1r7/index.jsp?topic=/com.ibm.zcontact.doc/webqs.html © Copyright IBM Corporation 2006, 2010. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Before you begin the topic about Coupling channels ...........40 networking on z/OS .........vii Open Systems Adapter (OSA) .......40 HiperSockets ..............46 The I/O cage ..............48 Part 1. Introduction to networking on the mainframe...........1 Chapter 4. Sample network configuration ............49 Chapter 1. -
User's Guide and Reference for IBM Z/OS® Remote Access Programs August 2, 2021
User's Guide and Reference for IBM z/OS® Remote Access Programs August 2, 2021 International Business Machines Corporation IBM Z Dallas ISV Center Dallas, TX USA This document is intended for the sole use of participants in an IBM Z Dallas ISV Center Remote Development or Early Test Program and is not to be distributed to non-participants or used for purposes other than intended. © Copyright International Business Machines Corporation 2019. All rights reserved. 1 Table of Contents 1 Preface .................................................................................................................................................... 4 1.1 Links ................................................................................................................................................. 4 2 Overview – Remote Access Environment ........................................................................................... 5 2.1 Hardware / Software Platform .......................................................................................................... 5 2.2 Introduction to the Virtual Machine Concept ................................................................................... 5 2.3 z/OS Remote Access Environment ................................................................................................... 5 2.4 Printers .............................................................................................................................................. 7 2.5 System Availability.......................................................................................................................... -
Configuring TN3270 C H a P T E R
CHAPTER 13 Configuring TN3270 IBM 3270 display terminals are among the computing community’s most widely implemented and emulated for host-based computing. Information in this chapter will help you understand the TN3270 terminal emulation environment, and how to use and create files that will allow terminals connected to the communication servers to be used for TN3270 operation. For a complete description of the commands in this chapter, see the Communication Server Command Reference publication. Cisco’s Implementation of TN3270 The TN3270 terminal emulation software is based on software developed at the University of California, Berkeley. This software allows any terminal to be used as an IBM 3270-type terminal. Users with non-3270 terminals can take advantage of the emulation capabilities to perform the functions of an IBM 3270-type terminal. Specifically, Cisco’s implementation supports emulation of an IBM 3278-2 terminal providing an 80 by 24 display. True IBM 3270-type terminals use a character format referred to as extended binary-coded decimal interchange code (EBCDIC). EBCDIC consists of 8-bit coded characters and was originally developed by IBM. Emulation is made possible by termcap and curses functions developed by Berkeley UNIX system developers. These functions translate the keyboard and terminal characteristics for ASCII-type terminals into those expected by an IBM host. ASCII characters are listed in the “ASCII Character Set” appendix in the Communication Server Command Reference publication. Formally, a termcap is a two-part terminal-handling mechanism. It consists of a database and a subroutine library. The database describes the capabilities of each terminal to be supported; the subroutine library allows programs to query the database and to make use of the values it contains. -
Datahand Personal User's Guide
DataHandâ Personal User's Guide Version 1.7.8 October 9, 2003 DataHand® Systems © Copyright 1997, DataHand® Systems, Inc. 3032 North 33rd Avenue Phoenix, AZ 85017 All rights are reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, mechanical, photocopying, recording or otherwise, without the prior written permission of DataHand® Systems, Inc. DataHand® Systems is a registered trademark of DataHand® Systems, Inc. Apple is a registered trademark of Apple Computer, Inc. IBM is a registered trademark of IBM Corporation. Microsoft and Windows are registered trademarks of Microsoft Corporation. Neither DataHand® Systems, Inc. nor its affiliates shall be liable to the purchaser of this product or third parties for damages, losses, costs or expenses incurred by purchaser or third parties as a result of: accident, misuse or abuse of this product or unauthorized modifications, repairs or alterations to this product. DataHand® Systems, Inc. and its affiliates shall not be liable for any damages or problems arising from the use of any options or any consumable products other than those designated as original DataHand® Systems, Inc. products or DataHand® Systems, Inc. approved products. ii User's Guide, Version 1.7.8, October 9, 2003 Congratulations! For choosing the world’s finest User-to-computer interface. You are now on the leading edge of interface technology. Your DataHand® System is a new and advantageous way to work with your computer. Learning to use the system requires commitment, patience and persistence, which will be well rewarded by increased comfort, reduced exposure to injury and long-term productivity increases. -
Data Stream Programmer's Reference ------,------3270 Information ------ .-- Display System
----- - --- 3270 Information ---- - - --- --------- Display System Data Stream Programmer's Reference -------,----- - --- 3270 Information - - - --- -------_.-- Display System Data Stream Programmer's Reference GA23-0059-4 File Number 8360/8370/53/4300/8100-30 Fifth Edition (December 1988) This publication introduces and explains the functions of the 3270 Information Display System data stream. Changes are continually made to the information herein; before using this publication in connection with the operation of IBM systems, refer to the latest IBM System/360 or System 1370 SRL Newsletter for the editions that are applicable and current. It is possible that this material may contain reference to, or information about, IBM products (machines and programs), programming, or services that are not announced in your country. Such references or information must not be construed to mean that IBM intends to announce such IBM products, programming, or services in your country. The names and addresses used in the examples that appear in this manual are fictitious, and any similarity to the names and addresses of actual persons is entirely coincidental. Publications are not stocked at the address given below; requests for IBM publications should be made to your IBM representative or to the IBM branch office serving your locality. A form for readers' comments is provided at the back of this publication. Address additional comments to IBM Corporation, Communication Products Information Development, Department E02, PO Box 12195, Research Triangle Park, North Carolina, U.S.A. 27709. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation whatever. You may, of course, continue to use the information you supply. -
For the at Only-A Great New Keyboard
BIG GUNS "While the For the AT Only-A Great New Keyboard layout make: The AT's keyboard is an improved version of the PC's and defuses with the good points retained and the irritating ones of the tired c corrected. But it only works with the AT. complaints, upward and outward-comfortable to new locations on the new keyboard. One as most other keys on the keyboard). won't make much difference, but the At doesn'tfirst glanceseemthemuchPC AT'sdifferentkeyboardfrom the touch and a breeze to use. As does Each key has been moved inward: Num• perfect." other one will. The tilde (-) key has Lock is now over the 8 key and Scroll• the PC's. When you take a closer look, the new Enter key, the shift keys leave been moved to make way for the larger Lock over the 9 key. you'J] fmd most of the changes are sub• you plenty of room to hit your mark, a Enter key. It won't be missed by most IBM must have heard the complaints tle, but they are all important-and long change that will certainly cut down on from PC users about the PC's not-quite• overdue. errors. PC users in it. new position where the The AT's is still the same keyboard IBM has not labeled the Tab or Back• Esc key used to be. long-enough 6-foot cord, because the cord to the AT's keyboard is 10 feet with that now-familiar clicking sound space keys-they still only have arrows The shift of the Pipe symbol key (I and \) will be noticeable. -
Systems Network Architecture Concepts and Pioducts
---- -------- ---- Systems --------- - ------- -~- .. - Network Architecture Concepts and Pioducts GC30-3072-1 File No. 370/4300-30 Second Edition (February 1984) This is a reprint of GC30-3072-0 incorporating changes released in Technical Newsletter: GN30-3205 (dated 22 September 1981) Changes are continually made to the information in IBM systems publications. Before using this publication in connection with the operation of IBM systems, refer to the latest IBM System/370 and 4300 Processors Bibliography, GC20-o001, for the editions that are applicable and current. References in this publication to IBM products, programs, or services do not imply that IBM intends to make these available in all countries in which IBM operates. Publications are not stocked at the address given below. Requests for copies of IBM publications should be made to your IBM representative or to the IBM branch office serving your locality. A form for readers' comments has been provided at the back of this publication. If the form has been removed address comments to IBM Corporation, Publications Development, Department E02, P.O. Box 12195, Research Triangle Park, North Carolina, U.S.A. 27709. IBM may use or distribute whatever information you supply in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 1981 Preface This publication introduces the IBM Systems Network Architecture to individuals who need to acquaint themselves with its benefits, its concepts, and the IBM products that are designed for use in SNA networks. This is the basic publication about Systems Network Architecture (SNA) for managers, system designers, and others involved in making decisions about planning or implementing distributed data processing within an organization. -
Spreadsheet Program for EPA's Method 301: Field Validation of Pollutant Measurement Methods Form Various Waste Media the Calcul
Spreadsheet Program for EPA's Method 301: Field Validation of Pollutant Measurement Methods form Various Waste Media The calculations involved in the four separate approaches in Method 301's validation protocol are incorporated into this spreadsheet. These four approaches are comparison against a validated method with paired sampling trains, method comparison with quadruplicate sampling trains, isotopic spiking with paired or quadruplicate sampling trains, and analyte spiking with quadruplicate trains. The purpose of the spreadsheet is to provide quick results to the statistical qualification tests involved with validating a method. The steps for using the spreadsheet are divided into the following sections: A. General instructions for Lotus 1-2-3 program. B. Method comparison with quadruplicate sampling train. C. Method comparison with a paired sampling train. D. Isotopic Spiking with a paired or quadruplicate train. E. Analyte spiking with a quadruplicate sampling train. A. General instructions for Lotus 1-2-3 program: 1. Load Lotus 1-2-3. 2. Retrieve the Method 301 program: * Call the menu by pressing the slash key, "/". * Select "FILE" (press F) then "RETRIEVE" (press R). * Type a: M301 (return). (Choose the drive where the PST file is located.) 3. Make selection: * The spreadsheet menu and title should appear: "SPREADSHEET FOR METHOD 301: VALIDATION PROTOCOL." If not press the "home" key. * Press "ALT" and the desired letter simultaneously. 4. Saving the spreadsheet: * Call up the lotus menu by pressing the slash "/." * Select File and Save * Enter a filename for the saved spreadsheet, and press enter. 5. To quit Lotus: * press slash "/" for the menu. * select Quit, Yes, and Exit. -
Proper Keyboarding Technique and Procedures
KB1 Essential Standard Apply the touch method in operating the alpha keys. KB1 - 1.02 Execute the touch method in operating the alphabetic keys. Touch Method of Keyboarding Touch Typing Touch typing (also called touch type or touch method) Typing without using the sense of sight to find the keys. A touch typist learns the location of the keys on the keyboard through muscle memory. This method involves placing the eight fingers in a horizontal row along the middle of the keyboard (the home row) and having them reach for other keys. Touch Method Touch Method of Keyboarding Typing on a keyboard without looking at the keys. Learning to key by touch rather than using the hunt and peck method Hunt and Peck Hunt and Peck Method of Keyboarding Typing on a keyboard using only one or two fingers of each hand. Touch Typists Vs. Hunt and Peck Typists The average touch typist can type 50 to 60 words per minute without typos The two-finger typist using the "hunt and peck" method typically achieves only 20 to 30. Which type of typist do you want to be? Tips for Learning the Touch Method of Keyboarding Do not rush at the early stages of learning. Take your time and the speed will pick up as you progress. Establish and maintain a rhythm while typing so keystrokes are made at equal intervals. Strike keys with the correct fingers. Move your hands and fingers as little as possible. Tips for Learning the Touch Method of Keyboarding Don't hammer on the keys. -
Quickhelp Sorenson Ntouch VP2 Calling Features
QuickHelp Sorenson ntouch VP2 Calling Features Use the bookmarks in the left-hand column to jump to the QuickHelp answers to these questions: How do I use the Group Call feature? How do I set up Voice Carry Over (VCO) calling? How do I show the in-call audio level meter? How do I set how long the option bar is displayed in a call? How do I change my Self-View video settings during a call? How do turn the Do Not Disturb mode on and off? How do I use the Group Call feature? You can use the Group Call feature to have a conversation with up 4 other people at one time. A group call begins when you “join” two calls together into one call. You can then add up to 2 other calls (for a total of 4 calls) at once. You can use the ntouch VP2 Group Call feature with all Sorenson endpoints during a point-to-point call. The Group Call feature does not work with Sorenson Video Relay Service (SVRS) calls. The example images below show the Video Privacy mode enabled on all endpoints. This was done to make it easier to see how to use the feature. Step 1. When in an active call, press the OK key on the remote control to open the In-call options bar as shown below. In-call options bar Step 2. Move to the Call button as shown below. Call button Step 3. Select the Call button to open the Call menu as shown below. -
Orbic Wonder User Guide
User guide. Add a Wi-Fi Network ............................................................................................... 19 TABLE OF CONTENTS Forgetting a Wi-Fi network .......................................................................................20 GETTING STARTED Connecting to Bluetooth Devices ............................................................................20 Buttons and Ports .........................................................................................................6 Forgetting a Bluetooth Device ................................................................................. 21 Installing the SIM Card and micro SD Card .............................................................7 Connecting to a Computer ...................................................................................... 21 Charging the Battery ...................................................................................................7 Using micro SD Card for Storage ........................................................................... 21 Turning Your Phone On/Off .......................................................................................8 Sharing Your Phone’s Data Connection .................................................................23 Setting Up Your Phone Out of the Box ......................................................................8 MAKING PHONE CALLS Home Screen ...............................................................................................................9 Place