The Effects of Emerging Technology and Emulation Requirements on Microprogramming

Total Page:16

File Type:pdf, Size:1020Kb

The Effects of Emerging Technology and Emulation Requirements on Microprogramming IEEE TRANSACTIONS ON COMPUTERS, VOL. C-25, NO. 10, OCTOBER 1976 The Effects of Emerging Technology and Emulation Requirements on Microprogramming SAMUEL-H. FULLER, MEMBER, IEEE, VICTOR R. L~SSER,C. GORDON BELL, FELLOW, IEEE, AND CHARLES H. KAMAN, MEMBER, IEEE Abstract-The structure of microprogrammed processors is such as the speed of main memory to that of the control largely determined by the state of (semiconductor) technology and (micro) memory, are easily rejected on the basis of existing the requirements of the task of emulation. We discuss the impact processors that are commonly recognized to be micropro- of LSI components on micruprogrammable processors and in par- ticular, the effect of large memory arrays, LSI microprocessors grammed processors yet do not possess the required fea- (bit-slices), programmable logic arrays, and high-speed shifters. tures. A secondary theme of this article is that microprogramming Most of this confusion in alternative definitions comes differs very little from "regular" programming. We argue that the from the fact that microprogramming has been used in two right approach to understanding microprogramming is to recognize very different ways: 1) as a hardware implementation that it is primarily applied to the task of emulation. We review the requirements of the emulation (interpretation) task and indicate technique to economically implement a complex instruc- what capabilities a microprogrammable processor needs to have tion set or a small number of different instruction sets on in order to make the process of emulation efficient. We conclude a single processor, and 2) as a software technique to provide with a taxonomy of microprogrammable processors. programmers with an extra degree of representational Index Terms-Emulation, interpretation, microprocessor, mi- freedom, i.e., develop multiple instruction sets, each one croprogramming, semiconductor technology. appropriate for a particular task domain. The technolog- ical use of microprogramming has been the dominant justification for the development of the vast majority of I. INTRODUCTION microprogrammable processors in the past decade. But ps HE STRUCTURE of microprogrammed processors, the cost of software began to become the major cost of a T and microprogramming in general, is largely deter- computer system, the use of microprograming as a tech- mined by two factors: the state of (semiconductor) tech- nique for making a computer more convenient to program nology and the task of emulation. Therefore, this article has and will continue to become the more important ap- first reviews those technological advances as well as those plication. constraints and demands imposed by the emulation pro- The most direct approach to understanding micropro- cess that have shaped the evolution of microprogramming. gramming is to recognize that it is primarily applied to the We then use these observations to put the past develop- task of emulation (interpretation). Through this approach ments of microprogramming in perspective and forecast it is possible to understand and predict the evolution of the major developments in the years ahead. microprogramming independent of a particular technology The other main theme of this article is that trying to. and type of instruction set being emulated. characterize and understand microprogramming in terms The process of emulation will be taken up in consider- of how it differs from "regular" programming is a fruitless ably more depth in Section 111, but it will be useful here to exercise. The futility of this approach can be seen by the briefly look at the different processors used to emulate a numerous, contradictory definitions on microprogramming Basic machine. On the one hand there are the Hewlett- in the literature (Rosin [14], Wilkes [21], Mallach [lo]). Packard 2100, DEC PDP-11, and PDP-8 that have time- Attempts to base a definition on features of a processor's sharing systems supporting Basic. The only language architecture, such as horizontal instruction formats, lack available to the user is Basic and the architecture of the of an explicit program counter, or visibility of real registers processor is hidden from him. On the other hand there are and data paths, or on features of a processor's realization, the Basic programmable calculators available from IBM (i.e., the IBM 5100), Hewlett-Packard (Spagler [15]), and Manuscript received June 16,1975;revised March 29,1976. This work Wang Laboratories that operate as Basic machines: their was supported in part by the Advanced Research Projects Agency of the input keys and displays are tailored to the Basic language. Office of the Secretary of Defense under Contract F44620-73-C-0074 and was monitored by the Air Force Office of Scientific Research. It is difficult to insist that the HP-2100, PDP-11, and S. H. Fuller and V. R. Lesser are with the Department of Computer PDP-8 are not microprogrammed processors while the Science, Carnegie-Mellon University, Pittsburgh, PA 15213. C. G. Bell was on leave at the Departments of Engineering and Com- "hidden" processors in the IBM, HP, and Wang Basic puter Science, Carnegie-Mellon University, Pittsburgh, PA 15213. He calculators are microprogrammed. The only characteristic is with the Digital Equipment Corporation, Maynard, MA. C. H. Kaman is with the Digital Equipment Corporation, Maynard, all these processors have in common is that they are em- MA. ulating Basic and a good case can be made for dropping the Copyright @I976 by The Institute of Electrical and Electronics Engineers, Inc. Printed in U.S.A. Annals No. 6 10CXQ05 FIJLLER et al.: EMERGING TECHNOLOGY AND EMULATION 1001 term "microprogramming" altogether and simply using "emulation" in its place. However, we will continue to use the term "microprogramming" here since it is so widely used and it is a convenient way to indicate that we are discussing programming as it applies to emulation (and interpretation) rather than programming in general. Following our discussion of technology and emulation, we then discuss specific hardware and software techniques I for emulation. A number of different types of micropro- order grammed processors are also included as examples. register - inputs (time state sign) generator) The state of the art in semiconductor electronics has had a profound effect on the feasibility of microprogramming. Prior to the 1960's the only effective means of imple- Fig. 1. M.I.T. Whirlwind control unit. menting a high-speed control store was to use a diode matrix. This was the technology used by Whirlwind I (Everett [3]) and suggested by Wilkes in his original paper announcements of 16 kbitlpackage RAM's continue this on microprogramming [22]. Figs. 1 and 2 show the struc- trend. There is every reason to believe that this trend will continue for at least the next 4 to 6 years. Hence we face ture of these control units. As long as these diodes were a situation where we can expect to see the size of control discrete components, a control store of any reasonable size was too expensive to compete with alternate implemen- stores growing as technology encourages designers to use tations using random logic (e.g., over 30 000 bits of control more control storage to cut costs in other areas, improve storage are required to implement the full PDP-11 archi- the performance of the microprocessors, or add additional tecture on the DEC LSI-11, while the Whirlwind I had only capabilities. 4800 "bits" in its control store). It is important to realize The other LSI components that are having a major im- that both structures are just the control parts of their pact on the evolution of microprogramming are the LSI processors and are alternatives to conventional sequential microprocessor chip sets.l The Intel 3000 2-bit processor control circuits as shown in Fig. 3. It was .not until the bit-slice,2 the AMD 2901 4-bit processor bit-slice, and the middle and late 1960's that integrated-circuit technology Western Digital microprocessor set are the most popular advanced to the level that economic read-only memories versions of this type of component. These LSI micropro- (ROM's) and read-write memories (RAM's) became a cessor components implement the major registers, data practical reality. It stands to the credit of IBM's engineers paths, and arithmetic unit in LSI packages. They all rely that they were able to develop the IBM System1360 series on microprogramming to specialize their behavior to the of machines via microprogramming in the early 1960's; appropriate "target" architecture (e.g., PDP-11, HP-2100, every model in the early IBM 360 line used a different, disk channel, communications processor). Since it will be nonsemiconductor technique to implement its control much more cost-effective to implement the next generation store. These ingenious, but admittedly cumbersome and of small computers using these LSI microprocessor com- costly, techniques could be laid aside when the IBM S/370 ponents, microprogramming will take on an even more series of machines were implemented since integrated- central role in the implementation of small computers. circuit technology had advanced to the stage that semi- Memory arrays and LSI processors are not the only conductor control stores were reliable. Fig. 4 illustrates the basic structure of current microprogrammed control By now, the term microprocessor has hecome a terribly overworked units. word. It is commonly used in at least three ways. 1)A microprogrammable processor. In other words, the processor that Semiconductor memories suitable for control stores in fetches and executes the microinstruction sequence which is used to microprogrammed processors are now at the stage where emulate the "target" machine. We will continue to call this processor a microprogrammable processor. 1024 bitlpackage RAM's and 4K (K = 1024) bitlpackage 2) A processor with very small data types (e.g., 8-bit words), a relatively ROM's are in wide use in present processors and 2K limited instruction set, and usually implemented in one or a small number of LSI packages.
Recommended publications
  • Metadefender Core V4.12.2
    MetaDefender Core v4.12.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • A Regression Method
    Journal of Automatic Chemistry/Journal of Clinical Laboratory Automation, Volume 8, Number (January-March 1986), pages 28-31 Treatment of super oxide dismutase assay by a regression method Ph. Nirde for the solution of systems of non-singular homogenous Centre d'immunologie & de biologie parasitaire, Unit[ mixte INSERM U167, linear equations. The 'MAT INV' matrix statement CNRS 624, Institute Pasteur, BP 245, 59019 Lille Cedex, France causes matrix inversion by the Gauss-Jordan elimination method. A matrix can be inverted in a significantly shorter time than is possible with BASIC programs. Introduction Indeed, whereas other minicomputers store their pro- gram text exactly as it is entered by the programmer, the The superoxide dismutase (SOD, EC 1.15.1.1) is a widely WANG BASIC interpreter converts into one-byte 'text distributed enzyme in all aerobic cells [1 and 2]. It is the atom' each word of the text program. Thus, the atomized principal protective enzyme against oxygen toxicity and lines permit faster program executionnlines are more acts by catalysing the removal of superoxide radical compact and can be more rapidly scanned, for example, (02--) [3 and 4]. The assay of SOD using Xanthine- inverting a 7 x 7 matrix requires 0"20 s. Because no files Xanthine oxidase-Ferricytochrome C was described by are used for this logiciel, this program can be easily McCord and Fridovich in 1969 [5]. Since, this spectro- adapted to BASIC microsoft language. scopic method has been in use for SOD studies in both the medicine and biology. The assay is based on the rate of reduction of ferricyto- Mathematical expressions chrome C measured spectrophotometrically, but this rate of reduction is not proportional to the amount of enzyme Rate of reduction offerricytochrome C: least squares estimation added.
    [Show full text]
  • Toy BASIC Reference Manual
    Toy BASIC Reference Manual Steve Toner Revision 1.0 June 2017 Copyright © 2017 by Stephen G. Toner [email protected] All rights reserved. This book or any portion thereof may not be reproduced or used in any manner whatsoever without the express written permission of the publisher except for the use of brief quotations in a book review or scholarly journal. Conventions The following conventions are used in this document: Literal text (e.g., a keyword or command) is shown in ALL CAPS. Some command or statements fields are shown in angle brackets: <line> is a line number, from 1-9999 <expr> is a numeric expression <progname> is a program name <svar> is a (scalar) variable name from A-Z <avar> is an array variable name from A-Z <var> is either a scalar variable, <var>, or an array reference, <avar>(<expr>) <val> is a numeric literal <string> is a string literal enclosed in quotes (“) <text> is a text string NOT enclosed in quotes Optional Fields Optional parameters are enclosed in square brackets: LIST [<line>] Multiple Valid Parameters If there is more than one acceptable option for a field, the valid options are shown in curly braces: FOOBAR {<string>|<expr>} In this example, you must provide either a <string> or an <expr> with the FOOBAR command or statement. Typefaces THIS TYPEFACE IS USED TO SHOW USER INPUT THIS TYPEFACE IS USED TO SHOW OUTPUT Keyboard Input Pressing the ENTER or RETURN key is shown as: Pressing the Backspace or Delete key is shown as: ← Holding down the Control key while pressing a key is shown as: ctrl-S
    [Show full text]
  • Metadefender Core V4.17.3
    MetaDefender Core v4.17.3 © 2020 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of MetaDefender Core 14 1. Quick Start with MetaDefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Process Files with MetaDefender Core 21 2. Installing or Upgrading MetaDefender Core 22 2.1. Recommended System Configuration 22 Microsoft Windows Deployments 22 Unix Based Deployments 24 Data Retention 26 Custom Engines 27 Browser Requirements for the Metadefender Core Management Console 27 2.2. Installing MetaDefender 27 Installation 27 Installation notes 27 2.2.1. Installing Metadefender Core using command line 28 2.2.2. Installing Metadefender Core using the Install Wizard 31 2.3. Upgrading MetaDefender Core 31 Upgrading from MetaDefender Core 3.x 31 Upgrading from MetaDefender Core 4.x 31 2.4. MetaDefender Core Licensing 32 2.4.1. Activating Metadefender Licenses 32 2.4.2. Checking Your Metadefender Core License 37 2.5. Performance and Load Estimation 38 What to know before reading the results: Some factors that affect performance 38 How test results are calculated 39 Test Reports 39 Performance Report - Multi-Scanning On Linux 39 Performance Report - Multi-Scanning On Windows 43 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3.
    [Show full text]
  • Creative Computing Magazine Is Published Bi-Monthly by Creative Computing
    he #1 magazine of computer applicafa *'are raHSJS? sfife a*«uiH O K» » #-. ^ *&> iiD o «» •— "^ Ul JT © O O Ul oo >- at O- X * 3 •O »- •« ^» ^ *© c * c ir — _j «_> o t^ ^ o am z 6 %' 7 * » • • Consumer Computers Buying Guide a/ Paf/i Analysis Electronic Game Reviews Mail Label Programs Someday all terminals will be smart. 128 Functions-software controlled 82 x 16 or 92 x 22 format-plus graphics 7x12 matrix, upper/lower case letters Printer output port 50 to 38,400 baud-selectable "CHERRY" keyboard CT-82 Intelligent Terminal, assembled and tested $795.00 ppd in Cont. U.S. SOUTHWEST TECHNICAL PRODUCTS CORPORATION 219 W. RHAPSODY SAN ANTONIO, TEXAS 78216 CIRCLE 106 ON READER 3ERVICE CARD Give creative Gontpattng to a fHend for " [W*nr fiwter service - call tell free X * • -540-0445] 800-631-8112 InNJ 201 TYPE OF SUBSCRIPTION BOOKS AND MERCHANDISE Foreign Foreign Term USA Surface Air D Gift Send to me 1 2 issues D $ 15 $ 23 $ 39 24 issues D 28 44 76 Gifts cannot be gift wrapped but a 36 issues D 40 64 112 Lifetime D 300 400 600 card with your name will be sent with each order YOUR NAME AND ADDRESS : Quan Cat Descriptions Price Name Address Cittj State Zip- NAME TO APPEAR ON GIFT CARD* SEND GIFT SUBSCRIPTION TO- Name Address Citvf State. .Zip. PAYMENT INFORMATION a Cash , check or 7M.O. enclosed o Visa/BankAmericard") Card no. Books shipping charge SI 00 USA S2 00 Foreign a Master Charge J Exp. NJ Residents add 5% sales lax DPlease bill me ($100 billing fee will be added) be prepaid- TOTAL (magazines and books) Book, orders from individuals must creative computing creative computing Books.
    [Show full text]
  • 2005 Minigame Multicart 32 in 1 Game Cartridge 3-D Tic-Tac-Toe
    2005 Minigame Multicart 32 in 1 Game Cartridge 3-D Tic-Tac-Toe Acid Drop Actionauts Activision Decathlon, The Adventure Adventures of TRON Air Raid Air Raiders Airlock Air-Sea Battle Alfred Challenge Alien Alien Greed Alien Greed 2 Alien Greed 3 Allia Quest Alligator People, The Alpha Beam with Ernie Amidar Aquaventure Armor Ambush Artillery Duel AStar Asterix Asteroid Fire Asteroids Astroblast Astrowar Atari Video Cube A-Team, The Atlantis Atlantis II Atom Smasher A-VCS-tec Challenge AVGN K.O. Boxing Bachelor Party Bachelorette Party Backfire Backgammon Bank Heist Barnstorming Base Attack Basic Math BASIC Programming Basketball Battlezone Beamrider Beany Bopper Beat 'Em & Eat 'Em Bee-Ball Berenstain Bears Bermuda Triangle Berzerk Big Bird's Egg Catch Bionic Breakthrough Blackjack BLiP Football Bloody Human Freeway Blueprint BMX Air Master Bobby Is Going Home Boggle Boing! Boulder Dash Bowling Boxing Brain Games Breakout Bridge Buck Rogers - Planet of Zoom Bugs Bugs Bunny Bump 'n' Jump Bumper Bash BurgerTime Burning Desire Cabbage Patch Kids - Adventures in the Park Cakewalk California Games Canyon Bomber Carnival Casino Cat Trax Cathouse Blues Cave In Centipede Challenge Challenge of.... Nexar, The Championship Soccer Chase the Chuckwagon Checkers Cheese China Syndrome Chopper Command Chuck Norris Superkicks Circus Atari Climber 5 Coco Nuts Codebreaker Colony 7 Combat Combat Two Commando Commando Raid Communist Mutants from Space CompuMate Computer Chess Condor Attack Confrontation Congo Bongo Conquest of Mars Cookie Monster Munch Cosmic
    [Show full text]
  • SYSTEH DESIGN and OPERATION \HTH "BASIC" James B
    SYSTEH DESIGN AND OPERATION \HTH "BASIC" James B. Grabenstein POTOHAC VALLEY TELEVISION CO., INC. ter theory to understand and operate. It is becoming a standard language in mo-st colleges and high schools throughout the country. So it is not difficult to find This paper will present a list classes full or part time in most areas of of basic programs that can be used vlith the country. For the home study enthusi­ micro computers for day to day opera­ ast, many books are available from college tion of cable tv systems. The programs book stores, radio and TV supply companies, can be used in micro computers, now on and micro computers stores. Most of these the market. The use of "basic" is a books are geared as study guides for home good introduction to learning computer study. I have found our local instructors concepts and the digital technicality. to be as interested in getting involved in "Basic" as we were. One of the by-products of taking the "Basic" course, I soon found a number of people in our area with interest in micro­ computers. Each trying to apply micro technology to their hobby or their busi­ ness. From this group a local computer club was formed. The club now meets regu­ larly with a constant exchange of ideas and information. One of the first things we discovered was that we each has a different system. Host of them being built up from componets of varying manufacturers. Each system It is not the intention of this having different recording or punch systems paper to come up with any new concepts different Central Processing Unit, in add­ in computer technology.
    [Show full text]
  • Microprogramming and Its Relationship to Emulation and Technology*
    MICROPROGRAMMING AND ITS RELATIONSHIP TO EMULATION AND TECHNOLOGY* Samuel H. Fuller and Victor R. Lesser Carnesie-Mellon University Pittsburgh, Pennsylvania C. Gordon Bell and Charles Kaman Digital Equipment Corporation Maynard, Massachusetts ABSTRACT data paths; or features of a processor's realization, such as the speed of main memory to that of the control (micro-) This paper is a survey of the development and future memory, are easily rejected on the basis of existing trends in rnicroprograrnrning. We show how the structure of processors that are commonly recosnized to be rnicroprograrnmed processors has been shaped primarily by microprogramrned processors yet do not possess the required two factors= the state of (semiconductor) technology and the features. task of emulation. The other main theme of this article is that it is a fruitless exercise to try to characterize and understand Most of this confusion in alternative definitions of microprograrnming in terms of how it differs from 'regular' microprograrnrning comes from the fact that it has been used programming. The right approach to understanding in two very different ways: (1) in a technological manner to microprogramrning is to recognize that it is primarily applied economically implement a complex instruction set or a small to the task of emulation (interpretation). Through this number of different instruction sets on a single processor, approach the evolution of rnicroprograrnming, independent of and (2) in a software manner to provide programmers with an a particular technology and type of instruction set being extra degree of representational freedom, i.e. develop emulated, is reviewed and future trends indicated. multiple instruction sets, each one appropriate for a particular task domain.
    [Show full text]
  • Liste Des Jeux - Version 128Go
    Liste des Jeux - Version 128Go Amstrad CPC 2542 Apple II 838 Apple II GS 588 Arcade 4562 Atari 2600 2271 Atari 5200 101 Atari 7800 52 Channel F 34 Coleco Vision 151 Commodore 64 7294 Family Disk System 43 Game & Watch 58 Gameboy 621 Gameboy Advance 951 Gameboy Color 502 Game Gear 277 GX4000 25 Lynx 84 Master System 373 Megadrive 1030 MSX 1693 MSX 2 146 Neo-Geo Pocket 9 Neo-Geo Pocket Color 81 Neo-Geo 152 N64 78 NES 1822 Odyssey 2 125 Oric Atmos 859 PC-88 460 PC-Engine 291 PC-Engine CD 4 PC-Engine SuperGrafx 97 Pokemon Mini 25 Playstation 123 PSP 2 Sam Coupé 733 Satellaview 66 Sega 32X 30 Sega CD 47 Sega SG-1000 64 SNES 1461 Sufami Turbo 15 Thompson TO6 125 Thompson TO8 82 Vectrex 75 Virtual Boy 24 WonderSwan 102 WonderSwan Color 83 X1 614 X68000 546 Total 32431 Amstrad CPC 1 1942 Amstrad CPC 2 2088 Amstrad CPC 3 007 - Dangereusement Votre Amstrad CPC 4 007 - Vivre et laisser mourir Amstrad CPC 5 007 : Tuer n'est pas Jouer Amstrad CPC 6 1001 B.C. - A Mediterranean Odyssey Amstrad CPC 7 10th Frame Amstrad CPC 8 12 Jeux Exceptionnels Amstrad CPC 9 12 Lost Souls Amstrad CPC 10 1943: The Battle of Midway Amstrad CPC 11 1st Division Manager Amstrad CPC 12 2 Player Super League Amstrad CPC 13 20 000 avant J.C. Amstrad CPC 14 20 000 Lieues sous les Mers Amstrad CPC 15 2112 AD Amstrad CPC 16 3D Boxing Amstrad CPC 17 3D Fight Amstrad CPC 18 3D Grand Prix Amstrad CPC 19 3D Invaders Amstrad CPC 20 3D Monster Chase Amstrad CPC 21 3D Morpion Amstrad CPC 22 3D Pool Amstrad CPC 23 3D Quasars Amstrad CPC 24 3d Snooker Amstrad CPC 25 3D Starfighter Amstrad CPC 26 3D Starstrike Amstrad CPC 27 3D Stunt Rider Amstrad CPC 28 3D Time Trek Amstrad CPC 29 3D Voicechess Amstrad CPC 30 3DC Amstrad CPC 31 3D-Sub Amstrad CPC 32 4 Soccer Simulators Amstrad CPC 33 4x4 Off-Road Racing Amstrad CPC 34 5 Estrellas Amstrad CPC 35 500cc Grand Prix 2 Amstrad CPC 36 7 Card Stud Amstrad CPC 37 720° Amstrad CPC 38 750cc Grand Prix Amstrad CPC 39 A 320 Amstrad CPC 40 A Question of Sport Amstrad CPC 41 A.P.B.
    [Show full text]
  • Wildcat5 for Windows, a Rainfall-Runoff Hydrograph Model: User Manual and Documentation
    United States Department of Agriculture Wildcat5 for Windows, A Rainfall-Runoff Hydrograph Model: User Manual and Documentation Richard H. Hawkins and Armando Barreto-Munoz Forest Rocky Mountain General Technical Service Research Station Report RMRS-GTR-334 April 2016 Hawkins, R.H.; Barreto-Munoz, A. 2016. Wildcat5 for Windows, a rainfall-runoff hydrograph model: user manual and documentation. Gen. Tech. Rep. RMRS-334. Fort Collins, CO: U.S. Department of Agriculture, Forest Service, Rocky Mountain Research Station. 68 p. Abstract Wildcat5 for Windows (Wildcat5) is an interactive Windows Excel®-based software package designed to assist watershed specialists in analyzing rainfall runoff events to predict peak flow and runoff volumes generated by single-event rainstorms for a variety of watershed soil and vegetation conditions. Model inputs are: (1) rainstorm characteristics, (2) parameters related to watershed soil and cover, (3) runoff timing parameters, and (4) unit hydrograph shape and scale selections. Many choices are available for each of the input categories and guidance is provided for their appropriate selection. The model is intended for small catchments responsive to conditions of upland soils and cover. Its peak flow estimation techniques are appropriate for projects such as gully control, culvert sizing and forest roads, environmental impact analyses, and post-wildfire hydrologic response. Keywords: hydrology, model, Curve Number, hydrograph, fire, grazing Authors Richard H. Hawkins is a professor emeritus, Watershed Resources and Ecohydrology, School of Natural Resources, Department of Agricultural and Biosystems Engineering, and Department of Hydrology and Water Resources, University of Arizona, Tucson, AZ 85721 (Emeritus, October 1, 2011). Armando Barreto-Munoz is a research assistant, Department of Agricultural and Biosystems Engineering, University of Arizona, Tucson, AZ 85721.
    [Show full text]
  • Metadefender Core V4.16.1
    MetaDefender Core v4.16.1 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 12 Key Features of MetaDefender Core 13 1. Quick Start with MetaDefender Core 14 1.1. Installation 14 Operating system invariant initial steps 14 Basic setup 15 1.1.1. Configuration wizard 15 1.2. License Activation 20 1.3. Process Files with MetaDefender Core 20 2. Installing or Upgrading MetaDefender Core 21 2.1. System Requirements 21 System Requirements For Server 21 Browser Requirements for the Metadefender Core Management Console 25 2.2. Installing MetaDefender 26 Installation 26 Installation notes 26 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 29 2.3. Upgrading MetaDefender Core 29 Upgrading from MetaDefender Core 3.x 29 Upgrading from MetaDefender Core 4.x 30 2.4. MetaDefender Core Licensing 30 2.4.1. Activating Metadefender Licenses 30 2.4.2. Checking Your Metadefender Core License 36 2.5. Performance and Load Estimation 37 What to know before reading the results: Some factors that affect performance 37 How test results are calculated 38 Test Reports 38 Performance Report - Multi-Scanning On Linux 38 Performance Report - Multi-Scanning On Windows 42 2.6. Special installation options 45 Use RAMDISK for the tempdirectory 45 3. Configuring MetaDefender Core 49 3.1. Management Console 49 3.1.1.
    [Show full text]
  • Ausstellungskatalog Die Classic Computing 2019 in Lehre
    Lehre 2019 Ausstellungskatalog Die Classic Computing 2019 in Lehre Zur Veranstaltung Inhalt Ob im Auto, Flugzeug, Handy oder Waschmaschi­ ne, ob im Privaten oder Gewerblichen – überall sind täglich Computer im Gebrauch. Dabei ist die Die Classic Computing 2019 Computertechnik erst 80 Jahre alt und das World Plakat 2019 Wide Web gerade einmal 30 Jahre. In dieser Zeit Die Ausstellung (alphabetisch) hat der Computer sich rasant entwickelt. Die Ent­ ­ Amiga 1000 mit Vampire A500V2 wicklung vollzog sich von einem tonnenschweren ­ Amiga A1200 Gerät für Spezialisten, über ein System mit dem ­ Acorn Archimedes A3010 Privatmenschen kaum etwas vernünftiges machen ­ Acorn Archimedes A420/1 konnten, bis hin zu dem universellen Computer der ­ Atari Lynx heute überall eingesetzt wird. ­ Atari MegaSTE ­ Bosch VM 2000 Einen Teil dieser Geschichte ist beim „Classic ­ Commodore C64 Computing 2019“ von Samstag, den 21.09.2019 bis ­ Commodore SX64 zum Sonntag, den 22.09.2019 jeweils 10:00­18:00 ­ Commodore CBM 720 Proxa in der Börneken Halle in Lehre bei Braunschweig ­ Epson PX4 wieder zu erleben. Bei einer der größten Ausstel­ ­ Epson PX8 lungen klassischer Computertechnik in Deutschland ­ FPGASID zeigen über 70 Aussteller aus dem ganzen Land ­ Haiku PC Betriebssystem Computer­ und Videospieltechnik der letzten sieben ­ Hewlett Packard HP 3810A Jahrzehnte. ­ Hewlett Packard HP 5036A Dabei ist dem Veranstalter, dem Verein zum Erhalt ­ Hewlett Packard HP 85 klassischer Computer e.V., wichtig, dass viele Ge­ ­ Hewlett Packard HP 86B räte dabei nicht wie in einem Museum stumm hin­ ­ Hewlett Packard HP 9825A ter Glas stehen. Der Besucher kann vielmehr die ­ Macintosh LC III Geräte wieder live erleben, sie anfassen und benut­ ­ Motorola 6300 Serie zen und dabei auch in alten Zeiten schwelgen.
    [Show full text]