GF20 8172 15_Systems_Management_Bibliography_Aug80 15 Systems Management Bibliography Aug80
GF20-8172-15_Systems_Management_Bibliography_Aug80 GF20-8172-15_Systems_Management_Bibliography_Aug80
User Manual: GF20-8172-15_Systems_Management_Bibliography_Aug80
Open the PDF directly: View PDF
.
Page Count: 19
| Download | |
| Open PDF In Browser | View PDF |
OF20-8172-15 OENL-OO Systems Management Systems Management Bibliography This bibliography lists and categorizes selected IBM publications on the management of data processing, including audidability, data security, systems management, and generally useful application development techniques and includes texts, manuals, briefs, bulletins, and papers as well as certain forms, templates, bibliographies, and indexes. In most cases, the publications are applicable to various IBM data processing systems; publications applicable to a specific data processing system can be found in that system's bibliography. ---- -----.-- . --- -----. - -- -~- Preface This bibliography lists and categorizes selected IBM publications on the management of data processing including auditability, data security, systems management and generally useful application development techniques. In most cases the publications are applicable to various IBM data processing systems and include texts, manuals, briefs, bulletins, and papers as well as certain forms, templates, bibliographies, and indexes. Systems management briefs and systems management manuals are two types of publications found in this bibliography. The briefs describe a technique or procedure that helped make a particular data processing installation more effective. The manuals discuss in more detail - and usually without reference to a particular installation - data processing techniques and procedures and other subjects concerning the management of data processing. Organization This special bibliography has two parts: • Part 1 lists the publications in six different categories; a publication may appear in more than one category. • Part 2 contains an abstract of each publication in order number sequence so that its usefulness to an installation can be determined. Part 2 also shows the type of publication, the number of pages and the availability under SLSS (System Library Subscription Service). Note: Order numbers are in sequence by the second character. The first character is the use key, which governs the availability of the document. Use key G means that the item is available to customers, through the IBM representative, without charge for quantities that meet normal requirements. Use key S means that the item is for sale through IBM branch offices. Bill of Forms An order number in the form OfGBOF-1234 is a Bill Of Forms - a single order number for a package of separately available documents. Flags on Order Numbers Maximum case: **GC20-0001-5# A double asterisk preceding the order number indicates either a change in the publication (such as a new edition) or a new item. When more than one edition of a publication is current, the order-number suffix is followed by a number sign (#). Sixteenth Edition (August 1980) This is a major revision of, and supersedes, GF20-8172-14. Publications are not stocked at the address given below; requests for IBM publications should be made to your IBM representative or to the IBM branch office serving your locality. A form for readers' comments is provided at the back of this bibliography. If the form has been removed, comments may be addressed to: IBM Corporation, Technical Publications, Department 824, 1133 Westchester Avenue, White Plains, New York 10604. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation whatever. You may, of course, continue to use the information you supply. Preface Part 1. Classified Listings Systems Management G320-5829 Auditability and Productivity Information Catalog GC20-1853 An Introduction to 3190 Network Management •• GG22-9001 Capacity Planning - An Introduction •• GG22-9015 Capacity Planning Implementation •• G321-5114 A Capacity Planning Methodology •• G321-5113 overview of the Capacity Planning Process for Production Data Processing GE20-0612 Capacity System Planning - Executive Overview Communications Systems Management Basic Concepts G320-5840 GK20-0931 Component Failure Impact Analysis at Caterpillar Component Failure Impact Analysis - An Availability GC20-1865 Management Technique GX20- 2336 Component Failure Impact Analysis Grid and Grid Expansion Worksheets GK20-0115 A DP Cost Allocation System: Prudential Insurance GK20-0116 Data Processing Quality Assurance - Martin Marietta Data Systems - Orlando Data center .. GC20-1112 Energy Conservation and Management in Data Processing •• G321-5106 An Integrated Approach to Centralized Communications Network Management Management Controls for Data Processing GF20-0006 Management Planning Guide for a Manual of Data GC20-1610 Processing Standards GKlO-6104 Management Reporting and Controls in Data Processing, National Westminster Bank Management Services - Frito Lay GK20-0150 •• GE20-0662 An Architecture for Managing the Information Systems Business - Volume 1, Management Overview Managing the Data Processing Organization GE19-5208 •• GK20-1305 Managing the Move of Comptroller's Data Processing - State of Iowa GK20-0132 Managing Systems Development - Montgomery Ward McAuto Hierarchical Communications in DP Management GK20-0864 Measuring Programming Quality and Productivity G321-5063 •• G226-3551 Network Control Center Guide •• GG22-9003 A perspective on Networking •• GB21-2521 Account Network Management Program Availability Notice •• SB21-2524 Account Network Management Program (DOS) Description and Operations Manual •• SB21-2522 Account Network Management Program (OS) Description and Operations Manual •• GC21-0429 Network Communications Control Facility General Information Manual •• GB21-2418 Network performance Analyzer Availability Notice •• SB21-2419 Network Performance Analyzer Description and Operations Manual •• GC34-2010 Network Problem Determination Application: General Information Manual Operations Management Extension (OME) Computer Program GK20-0882 Control of the DP Operation at SMUD Organizing the Data Processing Activity GC20-1622 Performance Tuning in OS/VS2 MVS G321-5011 GK20-1013 Problem and Change Control at the State of Washington Data Processing Service Center GE19-5201 Problem and Change Management in Data Processing, A Survey and Guide A Project Management System IV Primer GC20-1862 GK20-1120 Recovery Structured Walk-through at Marine Midland Bank G321-5040 Service Levels: A Concept for the User and the Computer Center •• G321-5115 System capacity and Performance Evaluation •• G321-5120 Systems Management •• G229-0282 Systems Management - A Network Perspective •• G520-3526 Systems Management Assessment Questionnaire - Supplement GC20-1811 system outage Analysis - An Availability Management Technique •• GK20-1291 System Outage Analysis - Association of American Railroads GG22-9000 Tracking and Resolving Problems and coordinating Changes Application Development GH20-1628 A Guide to Testing in a Complex System Environment GF20-0001 Analysis of Some Queuing Models in Real-time Systems G321-5055 Automated Logical Data Base Design GE20-0593 Basic Systems Analysis and Design Techniques 1 GE20-0527 GE19-5200 GF20-8093 G321-5042 G321-5053 GF20-8102 G321-5033 G321-5057 G321-5009 GC20-8152 GC20-8078 GA24-3488 GC28-6794 GC20-1851 GC20-1707 GC20-1850# GC20-8062 GC20- 2000 GN20- 3814 GC20-8096 GE20-0348 GE20-8171 GC20-1776 GC20-1790 GC20-1777 GE20-8091 GF20-0006 GF20-6088 G321-5045 GE20-0090 GE20-8067 GC20-8011 GE20-0396 G320- 5323 GE19-5095 GG22-9011 . . SH20-2116 G321-5032 Auditability G320-5829 •• G320-5532 G520-3332 G321-5070 G321-5012 GF20-0006 •• G320-6163 •• SH20- 2361 G320-5790 G320-5791 G320-5792 Data Security G321-5069 G321-5011 G320-2683 G320-5829 G321-5066 G321-5068 G321-5070 G320-5647 G320-5646 G320-1379 G320-1370 G320-1371 G320-1372 G320-1373 Business Systems Planning, Information Systems Planning Guide Code Reading, Structured Walk-throughs, and Inspections - Improved Programming Technologies Coding Methods A User-Oriented Data Base Retrieval System Data Bases: Past, Present, and Future Decision Tables - A Systems Analysis and Documentation Technique Design and Code Inspections to Reduce Errors in Program. Development Design Techniques for a User-controlled DB/DC System Elements of Queuing Theory for System Design Flowcharting Techniques Form and Card Design Form Design Reference Guide for Printers Guide to PL/S II HlPO - A Design Aid and Documentation Technique Identification Techniques Improved Programming Technologies - An Overview Index Organization for Information Retrieval Inspections in Application Development - Introduction and Implementation Guidelines Introduction to Data Management Student Text An Introduction to Information Retrieval An Introduction to Linear Programming An Introduction to Structured Programming in COBOL An Introduction to Structured Programming in FORTRAN An Introduction to Structured Programming in PL/I Keyword-in-Context (KWIK) Indexing Management Controls for Data Processing Planning for an IBM Data Processing System A Method of Programming Measurement and Estimation Principles of Data Acquistion Systems PERT - A Dynamic Project Control Method Random Number Generation and Testing statistics-Based System Techniques, Concepts, Examples, Applications Stru,ctured Design Structured Programming Foil Presentation Script A Structured Requirements Process Using the Improved Programming Technologies 3800 System Design and Documentation Aid, IUP 5796-AT Top-Down Development USing a Program Design Language Auditability and Productivity Information Catalog Audit-Source Code compare for S/370 DOS/vS, OS/VS Availability Notice An Auditor's perspective of the IBM 8100 Information System Data Processing Spheres of Control Generalized Audit Trail Requirements and Concepts for Data Base Applications Management Controls for Data Processing Source Compare/Audit Utility Availability Notice Source ComparelAudit Utility Program Description and operations Manual Systems Auditability and Control, Audit Practices Systems Auditability and Control, Executive Report Systems Auditability and Control, Control Practices Administrative control of Computing Service An Access Control Mechanism for Computing Resources Architectural support for System Protection and Data Auditability and Productivity Information Catalog A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard (DES) cryptography Architecture for Information Security Data Processing Spheres of Control An Executive's Guide to Data Security - A Translation From an IBM Svenska AB Publication Data Security - Threats and Deficiencies in Computer Operations - A Report on a Completed Study - A Translation from an IBM Svenska Publication Data Security and Data Processing: Session Leader's Guide (State of Illinois Videotapes) Data Security and Data Processing: Volume 1 - Introduction and Overview Data Security and Data Processing: Volume 2 - Study Summary Data Security and Data Processing: Volume 3, Part I - State of Illinois Executive Overview Data Security and Data Processing: Volume 3, Part I I - 2 State of Illinois Study Results Data Security and Data Processing: Volume 4 - Massachusetts Institute of Technology Study Results G320-1375 Data Security and Data Processing: volume 5 - TRW Systems, Inc., Study Results G320-1376 Data Security and Data Processing: Volume 6 - Evaluations and Installation Experiences: Resource Security System G320-5649 Data Security Controls and Procedures - A Philosophy for DP Installations G520-2882 Data Security Seminars: IBM Education Course X8851 Brochure GC22-9062 Data Security Through Cryptography Generalized Audit Trail Requirements and Concepts for G321-5012 Data Base Applications G321-5067 Generation, Distribution, and Installation of Cryptographic Keys G321-5010 Hierarchical Approach to Computer System Integrity IBM Cryptographic Subsystem Concepts and Facilities GC22-9063 IBM Data Security Forum: Denver, Colorado, September 1974 G520-2965 G520-2838 IBM Data Security Symposium, April 1973 IBM 3845/3846 Data Encryption Device GA27-2865 General Information Manual Management Controls for Data Processing GF20-0006 G320-5650 Management Memorandum: Security Features of IBM System/370 Operating System Integrity in OS/VS2 G320- 5522 GC28-0942 OS/vSl and Os/VS2 MVS Cryptographic Facility General Information Manual GBOF-1200 Report of IBM Joint Data Security Studies GC28-0722 RACF General Information Manual Security ••• The Right Thing for Your Computer, G520-2881 The Best Thing for Your Information G520-2169 The Considerations of Data Security in a Computer Environment G520- 2700 The Considerations of Physical Security in a Computer Environment G520- 2741 The Fire After the Fire G520-2797 42 Suggestions for Improving Security in Data Processing Operations Fo~ and Templates GX20-2336 Component Failure Impact Analysis Grid and Grid Expansion Worksheets GX28-1630 Decision Table Worksheet GX20-8020 Flowcharting Template GX20-8047 Hexadecimal and Decimal Integer Conversion Table GX20-1971 HlPO Template GX20-1970 HlPO Worksheet GX20-1702 Proportional Record Layout Form GX20-1818 150/10/8 Print Chart •• GX20-2353 Systems Management Assessment Questionnaire Bibliographies ~ Indexes GC20-1764 Atlas of Applications: Volume I - An Alphabetic Bibliography of Quantitative Methods Applied to Business, Industry, Science, and Engineering (1961 to 1972) GC20-1768 Atlas of Applications: Volume II - Bibliography of Quantitative Methods in Business, Industry, Science, and Engineering (1972 to 1974) GC20-1783 Atlas of Applications: Volume III - Bibliography of Quantitative Methods in Business, Industry, Science, and Engineering GC20-1141 Management Science at Work - A Bibliography Covering All Enterprises, All Functions, and All Techniques G321-5036 Selected Readings: Data Base Systems GC20-8071 10,000 Division Codes for Proper Names G320-1374 3 GB21 Part 2. Abstracts A Session Leader's Guide, form no. G320-1379, will te distrituted with the tapes. It is alsc availatle separately from Mechanicsburg for those who would like to understand the ccntents of the tapes tefore ordering them. 1. iihose Right to Know 2. Fellow that Card 3. Implerrenting the Information Privacy and Security Program 4. Admiriistering the Information Frivacy and Security Prograro 5. Eesigning Privacy and Security Into Infcrmation Systems 6. Software Security and Tern,inal Access Ccntrol Concepts 7. Physical Plant Security 8. Contingency Planning and Backup Systems 9. ~hat Every Executive Should Kno~ About Privacy In Information Systems Customer purchase orders should te sent directly to: S/T VIJ:EOCASSETTJ;: Duplicating Corp. 500 Willow Tree Noad Leonia, New Jersey 07605 Tel. (201) 9Q7-6Q50 or N.Y.C. (212) 239- 4653 Nes. 1, 5, 6, 8 cr 9 21.95 Ncs. 2, 3, 4 or 7 23.30 Play tack Machine Required: SONY U-MAtIC 3/Q inch VIDEOCASSEtTE, or equivalent. Bill of Material NOT AVAILABLE UNDER ELSS GA24-3488 FORM DESIGN REFERENCE GUIDE FOR PRINTERS This publICation conta~nform~ te considered by personnel designing, ordering, or using forms for the system printers listed below. Tnis manual has two sections: general forms-design information a~plicable to system printers, and specific information (Appendix) for particular printers. The general information relates to items such as form length, ~~dth, weight, fastenings, and other forms-related items that must be considered and/or met when forms are designed for system printers.. The specifications are not intended to be restrictive, tut to permit the customer to purchase continuous forms from the manufacturers of his choice. For detailed information on forms feeding and operating procedures, see the appropriate component description and operating procedures manuals for the particular printer er system .. companion publications useful in designing forms are: o OCR Input Preparation Guide, Order No. GC20-1686 o Print Chart (Six Lines' per Inch), GX20-1816 o Print Chart (Eight Lines per Inch), GX20-1818 Another publication which is not an IBM publication but nay be helpful in designing forms and for comparison purposes is International Standard ISO, 2784,.. DiIl'>E!nsions in this manual are to this standard.. IBM printers included are: 1132 3211 3618 1403 3213 3713 1qOq 3215 3715 1q43 3284 3717 2203 3286 3791 Line Printer Feature 2213 3288 3792 Line Printer Feature 2222 3610 5203 3203 3612 5213 3210 Manual. 32 pages GA27-2865 1m! 38q5 DATA ENCRYPTION DEVICE, 1m! 3846 !lATA ENCRYPTION DEVICE, ~ INFORMATION manual describes the IEM 38q5 and 38q6 Data Encryption Device in sufficient detail to enable propsective users to decide whether to use this type of data protection. Physical planning diagrams and specifications are included, as are general guidelines for the selection and distribution of key-variables. Manual, 8 1/2 x 11 inches, 44 pgs, 10/77 ~his GBOF-1200 REPORT OF IBM ~ DATA SECURITY STUDIES Over two years ago, IBM announced that it was initiating a program in long range data security research, technology and documentation. Part of that program involved a two year joint study with three IBM customers: The State of Illinois; TRW Systems, Inc.; and Massachusetts Institute of Technology. An IBM installation at our Federal Systems Division in Gaithersburg, ~d,. served as a fourth study site,. Each focused on a particular aspect of data security. The. groups coapleted their work this spring, and the results are included in this GB21-2Q78 NETWORK PERFORMNCE ~ ~ JlQ§!L FDP 5798-CZ!!... NEtWORK PERFORMANCE ANALYZER CONTROlLE!!... !!l! ~~ NOTICE This Availability Notice contains complete ordering inforIraticn for the Frogram and all its related documentation, for management and data proceSSing personnel who are prospective users of the program and others who require inforn.ation concerning it .. Written in ALC, the Network Performance Analyzer (NPA) collects comrounicaticns network operating data fer analysis. NPA data nay be helpful in highlighting the causes of performance degradation, such as excessive traffic at certain periods, or insufficient line capacity. It Ray also aid in isolating performance problems induced ty high line or cluster error rates caused by temforary errors, 0% wide fluctuations in .message rates. With NPA data, networks may be tuned for greater efficiency, and potentially improved response tines. Elements such as polling rates, network paraIl'.eters, and line loading, may be modified and performance improved. ~uning nay also free up capacity. NPA inforK.ation nay also be helpful in capacity planning. Information sucb as 3705 utilization, message flow rates, and line usage rates, may help deterIl'.ine hOll! Kuch unused capacity exists for network growth. The data tray ce displayed online as collected, or reviewed later at a tenrinal. Data of particular interest nay be monitored on er offline fer exceptions to user defined limits. ~he capability of displaying realtime information may be es~ecially valuable during periods of poor performance.. The data gathered is also available for forItatting into rer:orts for study, and compariscn with previous feriods,. This allows modification of systens parameters, and otservance of sutsequent results. NPA consists of a host application prograrr and one or nore reodified NCP frograms. It runs under VS1 or MVS, with VTAM and/or TCAM. NFA can coexist with subsysteIrs such'as eles, IMS. or TSO, tut operates independently of them. Flyer, 8 112 x 11.inches, 4 pages, 6/79 = BOF: Data Security and Data Processing .•• Volume 1, Introduction and Overview (G320-1370) Volume 2, Study Summary (G320-1371) Volume 3, Part 1, State of Illinois: Executive overview (G320-1372) Volume q, Study Results; Massachusetts Institute of Technology (G320-1374) Volume 5, Study Results: TRW Systems, Inc. (G320-1375) Volume 6, Evaluations and Study Experiences: Resource Security System (G320-1376) Volume 1, for executive, contains an introduction to the data security and privacy issues and an overview of the findings of the data security studies. Valune 2, a more detailed summary of the data security study is for management and will be of special interest to those charged with implementation,. Volume 3, Part 1, an executive overview primarily concerning .privacy was prepared by the State of Illinois stt;d , team .• The remaining volumes provide a number of detailed technical papers that may be of interest to various other people within customer accounts. A complete set of nine State of Illinois Videotapes on security and privacy for use by agencies within the State are additionally available. ~'hese tapes will, however be applicable to a more general audience -- not just to those involved with state gove,rmrent. A complete set of tapes is being sent to each region. The tapes may be loaned to branch offices for loan to customers for short periods of time 13-5 days). Customers may wish to borrow individual tapes to show them to an employee group or to determine whether they are interested in purchasing them. SB21-2479 PERFORIIANCE ANALYZER ~ HOS~, l!lR 5798-CZR, ~ EERFORMANCE ~ CONTROLLER, FCP ~~ DESCRIPTION/OPERATIONS This Program Descriftion/operations Manual provides t~e user with sufficient information to understand, install and successfull~ use the program. Fer further information about this publication, see abstract for GB21-2478. Manual, 8 112 x 11 inches, 139 pages, 6/79 ~ = GB21-2521 ACCOUNT NnWORR I;ANAGEMENT ~~ FOP 5798-DA2 (OS/VS/CICS), FDP 5798-DAT, (DOSIVS/CICS), ~OTICE This Availability Notice contains complete ordering information for the Frogram and all its related documentatiGn, for management and data proceSSing personnel who are prospective users of the program and others who require inforn:ation concerning it. This FOP, wLitten in ALC, is specifically designed to automate the core elements of systems ulanagellent with an integrated set of interactive application programs and batch report programs as fellows: The problerr management application provides ~reformatted screens to ensure consistent protlem reporting, assignment and resolution of system or network incidents. It has create, update, display, and browse functions, allo~in9 nultiFle aSSignments on problems and permits extensive comments. All fields except the comments are editable and searchatle. History files can be created for batch reporting. 4 GC20 GB21 The change management application provides preformatted screens to enable planned, coordinated change activities including. equipment installation or relocation; new application programs; PUT and engineering changes, and feature changes. It likewise, has create, update, display and browse functions and includes an approver/reviewer facility. All fields are editable and searchable. History files can te created for batch reports. The network configuration application provides an online data base of network components and the ability to create, update and display records containing component details. Detail may include: component name, id characteristics, location, phone numbers, vendor information, etc. The configuration file supports display of the physical connectivity of components. GC20-1768 BIBLICGRAPHY OF INDUSTRY, SCIE~ ANI: volume to Atlas of Applications (GC20-1764). The older manual was based on 8,300 references covering the years 1961 to 1972 and gathered frorr 350 journals. Like the elder manual, Atlas of Applications ••• Volume II is a collection of references to applications of quantitative n,ethods in business, industry, engineering, and science. The quantitative method may be fran mathematiCS, statistics, operations research, or managea,ent science. The data on which the alphatetic index is based is a collection of 3,000 references to journal articles or to fafers given at conferences. ~he journals and periodicals scanned cover the years 1972 to 1974. SpeCial Eitliography, 200 pages SLSS - ORDER NO. SUBSCRIPtION ONLY The batch report facility provides a network map, component detail listings and change activity. Flyer. 8 1/2.x 11 inches. 4 pages, 8/79 with sufficient information to understand, install and successfully use the program. For further information about this program, see abstract for GB21-2521. Manual, 8 1/2 x 11 inches, 360 pages, 8/79 GC20-1772 ENERGY CONSERVATIo,N ~ND M~NAGE~ENt IN L~TA PROCESSING This manual examinesseveral aspects oreIiergy conservation and management that nay te of value to installations using IBM data proceSSing equipment, and fresents sane considerations involved in developing and implen,enting plans for ccntrolling ccnsumftion and minimizing the impact of energy shortages on data processing operations. Manual SLSS - ORI:ER NO. SUEECRIPtION ONLY SB21-2524 ACCOUNT MANAGEMENT NETWORK PROGRAMS, DOS/VS/CICS. T-DP 5798-DAT, DESCRIPTION/OPERATIONS This Program Description/Operations Manual provides the user with sufficient information to understand,· install and successfully use the program. For information regarding this program, see abstract for GB21-2521. Manual, 8 1/2 x 11 inches, 354 pages, 8/79 GC20-1776 AN INtRODUCT ION TC STRUCTURED PROGRAMMING IN COECL This text, intended-for progranmers, descrIEes-and illustrates the use cf structured programT,ing. 'Ihe technique and its sU~t;:crting practices are generally descrited in one chapter. A reference chapter illustrates the imt;:lenentation of the technique in COBOt and is followed by a chapter presenting two sarr.t;:le frograrrs. A knowledge of COBOL is assurred. Manual SB21-2522 ACCOUNT NETWORK MANAGEMENT PROGRAMS OS/VS/CICS. FOP 5798=IiAQ. DESCg];PTIO~OPERA~ This Program DescriptionJo~erations Manual provides the user GC20-1622 o,RGANIZING THE DATA PROCESSING ACTIVITY This text is-designed to help the organizational planner develop the data proceSSing structure best suited to his own needs and environment. It is directed primarily to data proceSSing managers, the executives to whom they report, and others responsible for organizational and personnel t;:lanning,.. The major topics discussed are: concepts applicable to organizing the data processing activity, t;:ossible locations of the data processing activity within the larger organization, data proceSSing functions, grouping of functions into an organizational structure, and grouping of functions into job families and job fositions,.. The Appendix provides some typical job descriptions. Manual, 128 pages SLSS - ORDER NO,. SUBSCRIPTION ONLY GC20-1777 AN INtRODUCTION TO SlRtCTURED PRCGRAMMING IN PL/I This text, intend€d~r progranrners, descrTEes-aDd illustrates the use of structured prograrrming. The technique and its supporting practices are generally described in one chaFter. A reference chapter illustrates the implen.entation of the technique in PL/I and is followed by a cha~ter .,resenting two saIr~le prograIrs. A knowledge of PL/I is assurred. Manual GC20-1783 ATLAS o,F APPLICATICNS VOLUME III, BIBLIOGRAPHY Q!: .Il2t!'!UtAtIVE MET~ .!!:! BUSINESS, INDUSTRY, SCIENCE, ~~§INEERING This nanual is a fellow-on volume to Atlas of Applications (GC20-1764) and Atlas of Applications Voluroe II (GC20-1768). The older manuals were ~ased on 11,300 references covering the years 1961 to 1974 and gathered from 350 jcurnals. Like the older rranuals, Atlas of Applications Volmt",e III is a collection of references to applications of quantitative rrethods in business, industry, engineering, and science. The quantitative method may be frOIr mathen.atics, statistics, operations research, er managenent science. The data on which the alphabetic index is tased is a collection of 2,500 references to journal articles or to papers given at conferences. The jcurnals and periodicals scanned for this volume were Irastly 1975 issues. Eitliography, 185 .,ages, 3/76 SLSS - ORDER NO. SUBSCRIPTION ONLY GC20-1707 IDENTIFICATION TECHNIQUES ~is manual ext;:lains and compares a survey of several tyt;:es of coding techniques for individuals and non-individuals. An afproach to improving coding methods involving a statistical approach is outlined. The publication is baSically a state-of-the-art description of the identification teChniques. Data ProceSSing Techniques Manual, 50 pages SLSS - ORDER NO. SUBSCRIPTION ONLY GC20-1741 MANAGEMENT SCIENCE AT WORK A BIBLIOGRAPHY COVERING ALL ENTERPRISES. ALL FUNCTIONS. AND ALL TECHNIQ~ A great number of problems in industry, in science r and in engineering can be solved by the systematic methods of mathenatics, statistics, and operations researchmanagement science~ This manual is a specially organized three-way index to almost 5000 journal articles and conference papers which have mentioned the application of analytic methods to various business, industrial, and scientific protlems. Manual, Special Bibliography, 112 pages SLSS - ORDER NO,. SUBSCRIPTION ONLY GC20-1790 AN INtRODtCTION TO SlRUCTURED PROGRA~MING IN FORtRAN This text, intended fer programmers, describe~ illustrates the use of structured pragranrring. 'Ihe technique and its supporting practices are generally described in one chafter. A second chapter illustrates the implementation of the technique in FOR'IRAN and is followed by a chapter presenting two sample prograres. A knowledge of FORTRAN is assumed. Manual. 8 1/2 x 11 inches, 48 pgs., 7/77 GC20-1764 ATLAS OF APPLICAtIONS (I) AN ALPHABETIC BIBLIOGRAPHY OF QijANt·ITATIVE ~ APPUED 1Q EUSINESS. INDUSTRY, SCIENCE, ~ND ENGINEERING (1961 TO 1972) ~his manual is a collection of references to applications of quantitative methods in business, industry, engineering, and science. The quantitative method may be from mathematics, statistiCS, operations research, or management science. The data on which the alphabetic index is based is a collection of 8,300 references to journal articles or to papers given at conferences. Some 350 journals and periodicals were scanned, covering the years 1961 to 1972 Manual, 293 pages SLSS - ORDER NO. SUBSCRIPTION ONLY GC20-1850 IMPROVED PROGRAMMING tECHNCLOGIES - ~N OVERVIEW ~u"ent is intended to briefly-descrite-8ix recently forttalized techniques designed to improve the ~rogram development process: structured pragran,n:ing, toP-d9wn frcgram development, chief programmer teams, HIPC (Hierarchy plus Input-Process-output), and structured walk-throughs. Manual SLSS - ORI:ER NO. SUBSCRIPtIo,N ONLY GC20-1851 HIPo, :: ~ J:ESIGN H12 liND ~!~!!Q!i 1ECHNIQUE The purpose of this manual is to describe a deSign aid and docuIrentation technique called HIPC - Hierarchy ~lus Input5 GC27 GC20 Process-output. The manual is intended fcr systems analysts and programmers and describes ho. to use HlPO as a design aid and documentation technique throughout ~e development cycae. Manual SLSS - ORDER NO. SUBSCRIPTION ONLY GC20-8062 INDEX OaGANIZATION !SH INlORMATION !!lS!!]!! Methods of indexing vary with the nature of the naterial to be indexed and the ways in .hicb this material .ill be used. This beok presents, in sittplified form, the basic principles behind organizing indexes of various types. It is written to help systems personnel understand the proble~s GC20-1862 A PROJECT MANAGEMENT SYSTE~ IV PRIMER this prirrer is intend~ use-as-a-learning tool by the person who will be responsible for creating input data to PMS IV from project data (CPM diagrams, task lists, dependency lists, etc;). It assumes only a limited knowledge of data processing concepts, and is written for those already familiar with net.ork planning, resource they will encounter in crganizing infcrmation for eventual retrieval. StreSSing that an indexing systes shculd always be developed in the light of the particular retrieval prcblem, and that the specific eqUipment to te used is a secondary conSideration, the book covers name indexing, special indexing !including auto-encoding and the Ifor the IBM 3276 Display Station· .and tbe IBM 3776 !Models 1 alld 2) Corrs.unication Teninal' . This .anual descri.bes the cryptographic Subsystelli and the Cryptographic concepts and techniques errplcyed. Manual, 8 U2 x 11 inches, q8 pgs, 10/77 GC20-8011 RANDOM NUMBER GENERATlON AND TESTING Random sattpling, simulation studies, and MOnte Carlo methods have been in use for sany years. Papers describing various aspects of these topics have appeared in technical journals and textbooks available to a relatively small percentage of computer users. Meanwhile. applications requiring random numbers are becoming more imPortant and'more cosmon in bUSiness and industry as well as purely scientific areas. ";rherefore,. this manual has been prepared which gives the mathematical development of the power residue method, outlines computer techniques for implementing it and also offers brief corrments on otber methods. An appendix provides programming illustrations for binary and decimal com~uters. DP Techniques Manual, 12 pages SLSS - ORDER NO. SUBSCRIPTION ONLY GC27-0q29 RR GOMMUNICATIO~S £2!!!~ FjlCI:LITY H.£ ~ 573~-XX6 A INfORMATION .: . ~ T manual is an overvie. of the prograrr product Net.ork Cott·nunicstionS Contrcl Pacility (NCCF). It is directEd to 6 GC27 GE20 customer executives, systen administrators, system analysts, system programmers, application prograroners, and terminal GE19-5201 GC28-0722 OS/VS2 MVS RESOURCE ACCESS CONTROL FACILITY (RACF) - GENERAL INFoRMATIoN MANUAL - PROG PROD 5740::xxa- - - - - - - This publication contains overview a~planning information for Version 1, Release 3 of the Resource Access Control Facility (RACF) progran prcduct (5740-XXH). It is intended for the use af installation managers and personnel responsible for systeIr data security.. It is assumed that the reader is fa~iliar with OS/VS2 (MVS). RACF is a program product that provides access control by identifying and verifying system users, authorizing access to system resources and logging detected unauthorized attempts to enter the systeIl'- and detected accesses to frotected resourceS4 Manual~ 8 1/2 x 11 inches~ 56 pgs~ 3/78 GC28-0942 Os/VS1 and OS/VS2 MVS PROGRAMMED CRYPTOGR~PHIC GENERALlNF~oN:-PRoG PROD 5740-XY5 FACILITY ---- The Progranmed 'cryptographic Facility Program Product provides OS/VS2 MVS installation with the capability to protect sensitive data through the use of cryptography. This publication is intended for installation managers and system programmers responsible for planning the software data security strategy fer their installation. Chapter 1 introduces the general sutject of cryptography and provides an overview of the Programrred Cryptographic Facility. Cha~ter 2 identifies system requirements. Chapter 3 descrites each cerr~onent of the facility and describes how they work together to provide a cryptographic capability. Chapter 4 defines the functicns available tc the user and chapter 5 identifies planning, security, and operating considerations. Manual, 8 1/2 x 11 inches, 48 pgs, 10/77 GC28-6794 GUIDE TO PL/S II ~he piIS ~ompiler is a proprietary program used by IBM to develop other r;::rograrr.s that are made generally available. This provides general inforn:ation on understanding and interpreting PL/S I I listings. The book also provides some guidelines on how to modify compiler generated assembler code. Readers wi 11 be ex{:erienced systerr.s progranm:ers who need to understand and possitle modify cf:erating system modules. They should know the basic assembler language such as PIlI. Manual, 56 pages SLSS - ORDER NC. SUBSCRIPTION ONLY GE19-5208 MANAGING ~HE DATA PRCCESSING ORGANIZATICN This tookis cfferea-as-aDaidtoeffective nanagenent of the data Frocessing crganization. It gives an overview of sorr,e im{:ortant management principles and sho\lis hc~ these princifles can be apflied to data proceSSing to ensuxe its economic use. ErrJ;hasis is on nanagerr,ent net hods of irr.proving overall productivity and quality in data processing, rather than cn prograrrrring and software engineering techniques. The took covers all the rrajcr elenents cf a Ir,anagenent systerr for the data processing organizaticn and includes chapters dealing with evaluation and selection of applications~ long range planning, short range planning~ prcject managen:ent~ operations nanagErrent~ and managerrent reforting. It is directed primarily tc data processing managers ~ tut «,ay alsc l:e cf interest to senior rranage~ent to whom data processing managers report, to users of conputer services~ and to others with an interest in good data ~rocessing managerrent. Manual, 146 pages, 11/76 SLSS - ORtER NO.. SUB fCRIFUON ONLY GE20-0090 PRINCIPLES Q! DATA ACCUISITION §X§!.!l!:!.§ For IBM custorrers whc require a tasic understanding of the fUnctions of data acquisition systems~ this nanual t:rcvides an introductory descripticn of their operation and use in a system environll\€nt. This manual acquaints the reader with many of the various items of hardware conncnly encountered in data acquisition systems ~ the rr,eans of connecting then in a systen. conf iguraticn and the central processing unit~ featUres and programming capatilities necessary for efficient operation. ~anual~ 27 pages SLSS - CRtER NC. SUESCRIFTION ONLY GE20-0348 AN IN~ROtUCTION TC INFORMA~ION RE~RIEVAL This manual uses~he~anguage of~he-ncnspecialist to fresent ways in which digital computers can te used in inforrraticn storage and retrieval systems.. Indexing nethods~ file organization~ and search strategies are discussed~ and a ,erief titliography is included. The Il',anual is intended as a first reader for those interested in the broad aspects of data tanks and nechanized libraries. Manual~ 38 pages SLSS - ORtER NO. SUB~CRIP~ION ONLY GC3Q-2010 NETWORK PROBLEM DETERMINATION APPLICATION (NPDA) GENERAL INFORMATION PROGRAM NUMBER 5735-XX-8-~his document provides introductory-information about the IBM Network Problem Determination Application (NPDA) Program Product~ which allo~s a user to record~ retrieve and exaRine communication network error data in an interactive environment. The docunent frovides a general description of NPDA as well as initial planning information needed for installation. Ma~ual~ 8 1/2 x 11 inches~ 18 pages~ 10/78 GE20-0396 SYStE~ ~ECHNIQUES CONCEPtS, ~~MPLESL APPLICATICNS - APFLICA~ION MANUAL This is an intrOductcry-rev~anual cn sixteen techniques for analyzing and improving systems~ whether business, industrial ~ scientific ~ or engineering. There are questions and answers~ short examples~ tasie concepts~ and an applicaticn bibliografhy for each method. The Ir.anual is to serve as an awareness tool; difficult topics such as confidence lireits estimation procedures~ and analysis of variance are deen~hasized. The techniques covered are Eayes and cluster analysis~ continuous sinulation, correlation and decision analysis~ discrete simulation~ discrinination and econometric analysis evolutionary operation~ eXFerimental design~ eXfonential srrccthing; factor, Markov~ qu€ue~ regression~ and tirre series analysis. Manual~ 53 pages SLSS - ORtER NO. SUE SCRIPTION CNLY .§TATIS~ICS-BASED GE19-5095 STRUCTURED PROGRAMMING FOIL PRESENTATION SCRIPT This presentation---eiPlares- one of the IR,proved Prograrrrring T"echnologies known as Structured Prograrrming.. A comparison is wade with traditional programming followed by a discussicn of the varicus structure types and consideration of some typical prograrrroing situations. The presentation was developed in 1975 by the Improved Prograrrming ~echnologies SUfFort Group en assignn'.ent at the ~orld Trade Systems Center in Zoetermeer~ Netherlands. Manual~ 96 pages~ 12/75 SLSS - ORDER NO. SUBSCRIPTION ONLY GE20-0527 BUSINESS SYSTEM§ GE19-5200 £Ql2.!!; READING, STRUCTURED WALK-THROUGHS ~ = ~ ANt CHANGE ~~Nl\GEMENT 1B flAU f!!Qill.§!.!!§ ~ AND GUIDE A-rack of coordination and control in dealing with data processing prctlems can be costly~ in terns not cnly cf resources wasted tut also of user dissatisfacticn. This rranual presents an a~Frcach to reducing such costs - the introduction of systematic problem handling to sfeed prcblero solving~ ease corrrrunicaticns~ and enatle as rrany protlems as possible to be trated as routine. Prctlerrs are eften caused ty changes to prograns cr equipnent~ so {:roblem incidence~ and thus costs~ can te reduced when control of the installation of changes is improved. Manual~ 84 pages~ 2/79 SLSS - ORDER NO. SUB~CRIF~ION ONLY operators who are operating with DOS/vS or OS/VS systeIr.s. Manual, 8 1/2 x 11 inches, 40 pages, 10/78 G~ INSPECTIONS- !~!.!!~ INFOBMA~ION SYS~E~ !~~~~1~§ Business Systems Flar.ning (BSP) is a structured a~proach to help an organizaticn establish an infcrn,aticn systems plan that can satisfy its near and long tern infcrmation needs. ~his guide cffers assistance to ESP study teams by explaining the approach and presenting guidelines for conducting a BSP stuoy. It can also be used for general reference on tte sutject of planning for inforrration systens. The guide covers BSP principles, concepts, and study overview, then devctes a chapter to each of the n.ajor activities of a ESF study, and includes a final chapter to acquaint the reader with follow on projects. ~anual~ 92 pages SLSS - ORDER ~C. SUESCRIPTION CNLY IMPROVED PRCGRAMMING TECHNOLOGIES This document addresses itself to the discovery of errors and suggests how three sUfforting techniques within the Improved Programming Technclogies help to approach the ultirrate goal: error-free software. The three techniques described here are: code reading, structured walk-throughs, and inspections. Their use within IBM has offered Significant benefits. ~'he intent of this dOcuIr.ent is to suggest how they might be of value, either individually or collectively, within other data proceSSing organizations. Manual, 10 3/8 x 8 1/4 inches, 56 pages, 3/76 SLSS - ORDER NO. SUBSCRIPTION ONLY 7 GE20 GH20 GE20-0593 BASIC SYSTEMS ANALYSIS ~~ DESIGN TECHNIQUES This application manual~ intended to assist the beginning applications analyst in learning the basics of systems analysis and design, and will also help the artalystto decide how to proceed into the "whats, hows. and whys" involved in such things as test plans, doc~ents of understanding, testing. tracking mechanisms, etc. A numter of topics are addressed, mostly from the "what to do" and "how to do it" point of view. The section "Major Events in Designing and Im~lementing a System" should help a newcomer to systems analysis to have an idea as to where to begin and the questions to ask. Manual, 45 pages, 8/78 GE20-0612 CAPACITY PLANNING: EXECUTIVE OVERVIEW The objective of Capacity System Planning is to translate business ~lans into the data processing capacity needed to support those plans. To accomplish this, significant milestones based on business plans are set up over a numl:er of years into the future, and the data processing growth plan is used to determine how much data processing capacity will be required at each milestone. This overview descril:es what that effort involves and what results it can produce. Manual, 7 1/4 x 11 inches, 12 pages, 7/78 GE20-0662 AN ARCHITECTURE FOR ~ INFORMATION ~ BUSINESS, ~ 1 MAN ~ The purpose of this ment is to build an understandirtg of the architecture,processes, and data elements that comprise the Information Systems business. From this understanding the reader may begin to implem~nt effective control and efficiency in the management of data processing. The document gives an overview of SOme fundamental management ~rinciples, and suggests how these can be applied to the data processing organization within the framework of the Information Systems Architecture. Manual, 8 1/2 x 11 inches, 49 pages, 01/80 GE20-8067 n!!! ::: ~ ~ PROJECT CONTROL mllQ!2 Designed to acquaint the reader with the PERT technique. It is divided into these sections - (1) the technique its advantages and implementation, (2) the network development, (3) the computer program - data preparation, and (4) description of PERT in operation, including sample calculations. tp Application Manual,28 pages SLSS- ORDER NO. SUBSCRIPTION ONn rum GE20-8091 KEY~ORD-IN-CONTEXT (RWIC) INDEXING . KWIC indexes constitute a new approach to the problem of how to furnish information promptly about new literature. This manual presents the principles and .advantages of RWIC indexing and gives essential details about the parts of an overall RWIC index -- the KWIC index proper, reference code, bibliography and author index. An extensive list of recommendations is included for preparing master ~achinable records. This involves reserving particular card columns for specific items and includes suggested punctuation substitutions and other special indications. The manual also gives instructions for ~achine printout, mounting copy for reproduction, and· binding. CP Techniques Manual, 24 pages SLSS - ORDER NO. SUBSCRIPTION ONLY GE20-8171 AN INTRODUCTION :!2 ..~ I?ROGRAI!MING ~ This manual is a primer on what can be accottplished on a computer with linear programming systems. ~h~ presentation covers the entire scope of linear programming application: problett formulation, computer operations, interpretation of results, and additional information that can be obtained through the use of complete linear progra~ming system for a computer. The mahual assumes no mathematical background l:eyond high school algebra. ' The first chapter deals with concepts and examples of linear programming," The second chapter deals with deriving additionalinforttation about a solution. The third chapter completely describee·a larger example of linear programming in oil refinery scheduling.' The fourth cha~ter is a descriptiOn of the sittplex method of linear programming_ A detailed glossary of linear programming terms is included. Manual, 67 pages SLSS - ORDER NO. SUBSCRIPTION ONLY GF20-0006 MANAGEMENT·CONTROLS FOR DAT}! PROCESSING This manual, written-Ey PrICe Waterhouse' CO., discusses external and internal controls necessary for data proceSSing systems, the responsibilities for these ccntrols,' and the impact of these controls on the audltability of the sYstems. Both batch·· and online versions of an application system ' il~ustratin9 oontr~l ~rocedures are also included, as is an audit/review questionnaire that can be used as a guide when conducting an audit or review of data processing department controls. Mallual, 95 pages SLSS - ORDER·NO. SUBSCRIPTION ONLY ' GI'20-0007 }!NALYSIS OF SOliE QUEUING MODELS !!! REAL-TIME.~ This manual presents asic theory which descril:es relationships among the principal elements in a queuing situation. Several queuing models are discussed, and the theory is applied to 32 short examples of problems encounterEd in real-timE systems I numerical solutions are given for these prctlems. The manual concerns single server and multi-server queues, machine interference, networks of queues, and combinations of random variables encountered in queuing analysis. Manual, 75 pages SLSS - ORDER NO. SUBSCRIPTION ONLY GF20-8093 ~ !!ruQ!l2 Specifj.c ,.ethods of alphabetic and numerical coding are discussed, also the way in which they may be developed and applied. The ~anual lists and describes the characteristics that should be included in the ccnstruction of adequate codes. Manual, 20 pages SLSS - ORCER NO. SUBSCRIPTION ONLY GF20·8102 TABLES ::: ~ g~ ~ M!!: OOCUMENT}!TION TECHNI UE The aS1C concepts of decision tal:les and a minimum set of conventions for their use in systems analysiS, procedure design, and documentation are described. The purpose of such tablES is to pro~ide information in a cOllcise format that is easy to read and understand. The tabular approach is used to express complex decision logic in a ,.anner that encourages the analyst to reduce a problem to its Simplest fortt by arranging and ~resenting logical alternatives under various conditions. The resultant tables present a system's logiC in a concise manner that is easy to visualize and grasp. ~hile the ccncepts in the test are presented on a level fcr co~·prehension by students in basic ccmputer courses, the techniques are applicable at all levels of sophistication by everyone in a data processing environment. Manual, 8 1/2 x 11 inches, 20 pgs, 4/78 SLSS - ORDER NO.. SUBSCRIPTION ONLY ~ GG22-9000 ll!! SlfS'IEM/370 TRACKING!m1 RESOLVING PROBLEMS ~·COORCINAmg CHANGES This is One of a series of Techn1cal Bulletins distributed by the Poughkeepsie Systems center; This report is intended to assist the DP manager in the development arid' imple~entation of fortt,al ~roblem managett,ent and change control procedures within the DP function,. It is directed primarily to DP managers and to the executives to whott they report. It describes functions that can be integrated as a single unit into the existing CP organization. . Technical Bulletin, 61 pages SLSS - ORCER NO. SUBSCRIPTION ONLY GG22-9001 ~ INTRODUCTION !Q CAPACITY PL}!N~ This tulletin in intended an as introduction to the concepts and methodol09ll of capacity planning·and how ca~acity planning can be a ·u~eful management tool in the complex data processing ~nvironment. Specific topics covered.include definitions of terms, performance ~easuremertt, ~ethod implementation and ~erforRance prediction' An atpendix contains visuals for a capacity planning ~resentation. Technical Bulletin ~anual, 8 1/2 x 11 inches, 136 pages, 2/17 GG22-9003 A PERSPECTIVE ON NETWCRRING This Technical-SulIe~for IB~ ana custo~er ~erscnnel. Its purpos~ is to ~rcv~de some insight into the issues and ccm~lexities of networking. It also aiscusses hcw these interact with various implementaticn configuraticns. Manual, 8· 1/2 x 11 inches, 48 pgs, 5/77 GG22-9015 ... . CAPACITY FLANNING IMILEMENTATION TECHNICAL BULLETIN This iechnical Bulletin is intended for aata-proeessing people (technical andm ls. The sYIllbols, and their use in GC20-1851. The HlPO Worksheet, GX20-1970, also may be used in the preparation of HI PO diagrams. Template, 10 to a set NOT AVAILABLE UNDER SLSS GX20-2336 COMPONENT FAILURE IMPAc~r ANALYSIS FORMS: COMPONEN'I FAILURE ~ ANALYSIS GRID ANQ GRIt EXPANSION~WORRSHEET This padded form is used in performing a component failure impact analysis ICFIA). Its use is illustrated in the manual Component Failure Impact Analysis - An Availability Manage"ent 'Iechnique (GC20-1865). padded form, 11 x 16 inches, 2 pgs, 3/79 GX20-2353 SYSTEMS MANAGEMENT ASSESSMEN'I QUESTIONNAIRE The Systems Management Assessment Questionnaire is a set of yes/no questions to evaluate the implementation of the Systems Management disciplines: Change Management Performance Managment Problem Management Capacity Management Processing Management Audit/Security Management Recovery Management Management Re~ortin9 There is also a sutjective evaluation for each discipline regarding the extent to which the items in that category are effectively utilized. In addition, there are questions on which tools and aids are utilized for Systems Management. This questionnaire '~as prepared jointly bY the nata Processing and Field Engineering Divisions. Foldout reference card, 3 1/2 x 8 1/2 inches, 14 panels, 10/79 GX20~8020 FLOWCHARTING TEMPLATE This plastiC template p:rovides cut-out shapes for drawing standard symbols used frequently in flowcharting computer systems and programs. It is enclosed in an envelope outlining definitions of symtols and use of the template. More details are given in the Data Processing Techniques manual on FLOWCHARTING TECHNIQUES (GC20-8152). Template, 10 to a set NOT AVAILABLE UNDER stss OR~ER NO. SUBSCRIP'IION ONLY G320-1372 SECURITY , DATA FROCESSING: VOLUME 3 PART 1 STATE C :l Fold and tape Please Do Not Staple Fold and tape • • • • • • • • • 0.1 • • • • • • • • • • • • • • • • • • • I • • • • I • • • • • • • • • • • I • • • I • • • • • • • • • • • • • • • • • • • I I ~ • • 11 • • • • • • • • 0 . 1 • • • • • • • • I I • • • • • • I I I I I • • • • • • • 11 • • • • 10 • • • • I • • I I • • • • • • • I • • • • • I I ' I I . I I • • • 0 . 1 I • • • I I I I • • • • • • • 1 • • • 1 • • • 1 • • • • • I I • • 1 • • • • • 1 • • _ • • • • 111111 First Class Permit 40 Armonk New York Business Reply Mail No postage stamp necessary if mailed in the U.S.A. -n CD ,2 ? Postage will be paid by: G') m 2 International Business Machines Corporation Department 824 1133 Westchester Avenue White Plains, New York 10604 Fold and tape Please Do Not Staple § Fold and tape ==-= =® ------...-....... ---- - - ---.. - -- ~-- -~-.- International Business Machines Corporation Data Processing Division 1133 Westchester Avenue. White Plains. N.Y. 10604 IBM World Trade Americas/Fer East Corporation Town of Mount Pleasant. Route 9, North Tarrytown, N.Y., U.S.A. 10591 IBM World Trade Europe/Middre East/Afri~a Corporation 360 Hamilton Avenue. WhitePtains. N.Y .• U.S.A. 10601., I I I I I I GF20-8172-15 ." c;- z ? G> m Z r- 8 ==-= - ---.-.=® -- -- ---.- --,.-------... ~--~- International Business Machines Corporation Data Processing Division 1133 Westchester Avenue. White Plains. N.Y. 10604 IBM World Trade Americas/Far East Corporation Towr. of Mount Pleasant. Route 9. North Tarrytown. N.Y .. U.S.A. 10591 IBM World Trade Europe/Middle East/Africa Corporation 360 Hamilton Avenue. White Plains. N.Y .• U.S.A. 10601
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.3 Linearized : No XMP Toolkit : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:56:37 Create Date : 2011:09:30 17:49:38-08:00 Modify Date : 2011:09:30 18:02:52-07:00 Metadata Date : 2011:09:30 18:02:52-07:00 Producer : Adobe Acrobat 9.45 Paper Capture Plug-in Format : application/pdf Document ID : uuid:30f27c64-af30-4cc5-aeb1-5fe9e62b0b1b Instance ID : uuid:2cbfa3ab-1b89-48a9-9e1d-e71194e2095f Page Layout : SinglePage Page Mode : UseNone Page Count : 19EXIF Metadata provided by EXIF.tools