DECUS US Chapters SIG Newsletters V01 N06 Feb1986

Index of /pdf/dec/decus/DECUS SIG Newsletters

PDF DECUS US Chapters SIG Newsletters V01 N06 Feb1986
DECUS U.S. CHAPTER SIGs NEWSLETTERS
APL SIG ................................................................ APL · · · · · · · · · · · · · · · · · .. · · .... . ARTIFICIAL INTELLIGENCE SIC .......................................... Al .......................... . BUSINESS APPLICATIONS SIC ........................................... BA .......................... . COMMERCIAL LANGUAGES SIG ......................................... CL ..... ············ ........ . DAARC SIG ............................................................. DAR · · · · · · · · · · · · · · · · · · · · · · · · · · DATA MANAGEMENT SIG .............................................. OMS .... ············· ........ . DATATRIEYE SIG ....................................................... DTR· .. · · · · · .. · · · · · · · .... · .... · EDUSIG ................................................................ EDU .......................... . GRAPHICS SIG ......................................................... GRA · · · · · · · · · · · · · · · · · .. · · · · · · · HARDWARE MICRO SIG ............................................... HMS.················ ......... . IAS SIG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IAS ......................... . LANGUAGES AND TOOLS SIG.......................................... L&T ......................... . LARGE SYSTEMS SIG ..................................................... LS ......................... . MUMPS SIG ............................................................ MMP ......................... . NETWORKS SIG ........................................................ NTW ........................ . OFFICE AUTOMATION SIG ............................................... OA ......................... . PERSONAL COMPUTER SIG ............................................. PC· ........................ . RSTS SIG ................................................................ RST ......................... . RSX SIG ................................................................. RSX ............... · ......... . RT SIG................................................................... RT· ........................ . SITE MANAGEMENT & TRAINING SIG ................................... SIT ......................... . UNISIG .................................................................. UNI·························· VAX SYSTEMS SIG ...................................................... VAX ......................... . LIBRARY INFORMATION SECTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . LIB ......................... . "HOW TO" SUBMIT AN ARTICLE ... GROUP FORMS .................... HOW ................ ··· ...... . QUESTIONNAIRE SECTION .............................................. OU ................ ······· .. .
lFEBRUARY 19861 fvolume 1, Number 6}

GENERAL TABLE OF CONTENTS

SECTIONS

PAGE NO.

APL SIG . Steering Committee Listing

APL- i

ARTIFICIAL INTELLIGENCE SIC . Steering Committee Listing ...................................................................... . . The Linked List .................................................................................. . . PROLOG: Programmig in Logic .................................................................. . . 0 PS5 News ........ , ............................................................................ . . Book· Review .................................................................................... .

AlAl- 1 Al- 3 Al-11 Al-14

BUSINESS APPLICATIONS SIG . Steering Committee Listing ...................................................................... . BA- i

COMMERCIAL LANGUAGES SIG . Steering Committee Listing ...................................................................... . CL. Letter ........................................................................................... . CL-

DATA ACQUISITION, ANALYSIS, RESEARCH AND CONTROL SIG

. Steering Committee Listing ...................................................................... . DAR-

. Editor Note ...................................................................................... . DAR- 1

1

. Micro Power/RT .................................................................................. . DAR- 2

DATA MANAGEMENT SIG . Steering Committee Listing ...................................................................... . . Contributions .................................................................................... . . Documentation Set Winners ..................................................................... . . Coming Features ................................................................................ . . Calling All Hands ................................................................................ . . DEC Sends out Conflicting Signals on FMS and TOMS ........................................... . . A Hoot from the Editor ........................................................................... .

OMSOMSOMS- 1 OMS- 2 OMS- 2 OMS- 2 OMS- 3

DATATRIEVE SIG . Steering Committee Listing ...................................................................... . . Products Status ................................................................................. . . Chairman's Corner ............................................................................... . . From the Editor's Pen ............................................................................ . . Message from DTR/4GL Communications Committee Representative ............................. . . News of the SIG ................................................................................. . . Converting Decimal UICs to OCTAL UICs ........................................................ . . Wombat Magic .................................................................................. . . DATATRIEVE Wishlist, Fall 1985 ................................................................. . . Nostalgia Bit .................................................................................... .

DTR- i DTR- 2 DTR- 3 DTR- 4 DTR- 4 DTR- 5 DTR- 6 DTR- 8 DTR-13 DTR-20

EDUSIG . Steering Committee Listing ...................................................................... . EDU-

GRAPHICS APPLICATIONS SIG . Steering Committee Listing ...................................................................... . GRA-

HARDWARE AND MICRO SIG . Steering Committee Listing ...................................................................... . HMS- i

IASSIG . Steering Committee Listing ...................................................................... . . Curley's Corner .................................................................................. . . Letter from the Editor ............................................................................ .

IAS- i IAS- 1 IAS- 4

LANGUAGES AND TOOLS SIG . Steering Committee Listing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . L&T-

LARGE SYSTEMS SIG . Steering Committee Listing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chairperson's Article . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . From the Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Your Input........................................................................................ . Alternative Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Doctor TOPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

LS- i LS- 1 LS- 3 LS- 4 LS- 5 LS- 6

MUMPS SIG . Steering Committee Listing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . MMP- i

NETWORKS SIG . Networks SIG Steering Committee ............................................................... . . Index ............................................................................................ . . The Editor's Cobwebb ........................................................................... . . Native Mode ETHERNET Communications ....................................................... . . Network Design and Analysis .................................................................... .

NTW- 3 NTW- 4 NTW- 5 NTW- 6 NTW-28

OFFICE AUTOMATION SIG . Steering Committee Listing ...................................................................... . . From the Editor .................................................................................. . . Next on SIG Chair named ......................................................................... . . Notes From Fall Symposium ..................................................................... . . ALL-IN-1 ........................................................................................ .

QA- i OA- 1 OA- 2 QA- 3 QA- 4

PERSONAL COMPUTER SIG . Steering Committee Listing ...................................................................... . PC-

RSTSSIG . Steering Committee Listing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . RST-

RSX SIG . Steering Committee Listing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . RSX- i

RTSIG . Steering Committee Listing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . RT- i

SITE MANAGEMENT & TRAINING SIG . Steering Committee Listing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SIT- i

UNISIG . Steering Committee Listing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . UN I- i

VAX SYSTEMS SIG

. Editor's Workfile ................................................................................. . VAX- 3 . Enhancing the VAXTPU EDT Keypad Emulator ................................................... . VAX- 4 . Spring 1986 System Improvement Requests ..................................................... . VAX-18 . Digital Responds to the Fall 1985 SIR Ballot ..................................................... . VAX-39 . FALL 1985 SIR BALLOT RESULTS ............................................................... . VAX-44 . VAX System SIG Committee List. ................................................................. . VAX-57 . INPUT/OUTPUT ................................................................................. . VAX-60
. INPUT/OUTPUT Submission Form ............................................................... . au- 3
s . System Improvement Request Submission Form ................................................. . au-
. VAX Systems SIG Spring 1986 SIR Ballot ........................................................ . au- 7

LIBRARY SECTION

HOW TO SUBMIT AN ARTICLE ... ORDER FORMS SECTION . How to Submit an Article ......................................................................... . . Article Submission for HMS ...................................................................... . . Subscription Service Order Form ................................................................. . . Membership Application Form ................................................................... .

HOW- i HOW- 1 HOW- 3 HOW- 5

QUESTIONNAIRE SECTION . DATAGRAM ..................................................................................... . . INPUT/OUTPUT Submission Form ............................................................... . . System Improvement Request Submission Form ................................................. . . VAX System SIG Spring 1986 SIR Ballot ......................................................... .

QU- 1 QU- 3 QU- 5 QU- 7

.I

,. ' ' +. /0~6 789 ( [; x: \ -u ... n LE - Vil. I 0 I0 I Tr:>*? Fr ....... ti w:~ tc ...........>.. -OAl'<CC·EF'"GIU d KLMl·IOr·or.:s Tuvw::-1·z{-t}$1"·1!1 ! :flll'-<:r II oAt;c r.!~f~tl! ,,! I< bMUQf: <;lR ~ T\.t

Jt·~··aE~··Dm·~~-)<1=>JvA-+,+,/0123456789([;x:\-a ... nLE_VAl·'OIT0*?fr·tuw~tc1-t- ... !-OAI<CDEFGHIJKLMHOPGRSTUVWXTZ{-t}$ ... 41!J!f~\xnAe~rDEI

LMLJQEgB§!YY~HI;Ot·n~·e89··Dl·~~-><1=>JvAt+,+,/0123456789([;x:\-uinLE_va1·'DIT0*?fr·4-uw~tc1-1--t!-OAI<CDEFGHIJKLMHOPnRsTuvw:{T2{ ti$·

-:rR~B~£~~EQ~!~!bMLlQ[gE~!YYW~!;at·~··eee··Dm·~~-)<1=>JvAt+.+,/0123456789([;x:\-uinLE_V61·'DIT0*?fr-.i.uw~tcl-t--t!-OAI<CDEF

~1101

NYZ{-t}$··1!:f-'-<:rAA~~£~~fQH!~!bMHOPg8!!YY~Ll!iat·~~·eea··Dm.~~-,<!=>JvAt~.+./0123456789([;x:\-uinLE_Vil.\·'DIT0*?frHtuw~t

OABI

IJKLMHOPORSTUVWHYZ{-t}$··a:~-~:rRA~~£~~~~~t~!bMLlQEgE~!Y~~u!;at·~~·een··Um.~~~)<1=>JvAt+.+,/0123456789([;x:\-uinLE_V61·

?f[·

cl-t-~1-0A9CDEFGHIJKLMHOPORSTUVWXYZ{-t}$··S!:f-'-<:rAA~tcq~fQH!~!bMLlQ[gE~!Y~~H!;at·n$·eBav·Dm.~~-)<1=>JvAt+.+,/0123456789((

LOI I

'DITa·?Ff·tuw~tcl-t--tl-OA9CD~~~UTJKLMHOPORSTUVWXYZ{-t}$·41!1!1~\xAQ8~£~iEQt:!!~!bMLlQE:gB§IY~~ur;ut·n$·eBR··0m.~~-,<1=>JvAt+.

3~~c

; x: \ -u ... n LE_ VA I 0 Ia I Ta·?f r ....... ... 1-1-~l-OAflCDEFGHI dl<LMl·IOP0f;:5Tuvw:n·z{-t}$··EI: :flll ... :rAQ8~£~~EQtj!~!bMLlQE!;.lf::§IlJV1!!H!;at·C1e1>·eBB··Dm

~.

+, /0123456789 ( (; X: \-a J..11 l E_ 111 0 I Ta~'!' F [ .... llW'.3tc1-1--+ 1-0A£·CC·EFGtU JK l.Ml·IOF·QF:S TUVW:·CfZ{-t}$,..~S ! :fllf°'l:r A~~~£~g(§tj.!,,!!l,,,/'1110F:gB§!\:!~~Ll

4l·BI

en +·~~-)<1·>]vA_+,+,/0123456 ~ ;x:\ u ... nLE_VA\o'DITa·?rr·tuw~tc1-~-t!-OAflCDEF'"GHIJKLMNOFQRSTUVWn1~{-t}$·~El!:f- ... ~AA6~£~~t~'!~~~b~~Q[g!

HI~at·Cl··eee··Dll·~k - ) ( i=) J

+. /0123456789 ( (; )(: \ -u ... nl. E _Vil. I 0 I a I TIH?f r NtUW'.3tc:l-~-+l-0AflC[·EFGtUJKLMl·IOF·ar.:STUVWWfZ{-t}$·41!1 ':flll ... :r11AA.·«

I~!b~!:!QEgB§!!:!~!HI;at·Cl~·ee

l·~i;.-)<i=>JvAt+.+,/0123456789([;x:\-a ... 11Le_Vll.\0'01Ta*TFf··uw'.3tcl-~-+l-OA9CDEFGHIJKLMNOPORSTUVW:{TZ{-

llC U':fVllWl ...H:s't:"RZ~{e-t!}£$~·~·1E:g:~fl!llJ...!:bs~:R!A:0!!Q£~E!0!B;§E

·

;.brM!;:a!QtE~:B~Ee;~1!>.l·'e.le!e'-·!·".D!l1.lD·.:~;~at-·)l!<lit·=e>DRJ·v·DAllt·+2~.-+,) /(011.=2)3]4v5A67t+89, +([. ;1x0:1\2-3U4.5L6O7L8E_9Q(A[\;

0 '01Ta·TffNtUW'.3tCl-1--+l-OA9CDEFOHIJKLI
x: \ -u ... nLE - QA I 0 Ia I Ta· 1 Fr ..... uw.:> tc f-1-·~ J_ - <

FGHIJKLMHOPQRSTUVWH',.Z{-t}$· ··· * !... :i:RAB~£1:!g(gt.11JH.f'll!C!l''.BB§!!:!~~11I;at·C1··eea··Dm.~i;.-) ( .i=) ]vA-+, +. /0123456789 ( [; x: \ -u .Lii LE - VA I. '!JI Tfl ~

w~+c·t-~1-0ABCDEFGHIJKLMHO- ~ 1VWHYZ{~}$··S!:f- ... :rAA0~£~~EQ11t~~bM!:!QEgB§!Y~~H!;at·l!lt·eee··Dm·~~-><1=>JvA-~,+,/0123456789([;x:\-u,
61. I a I TIU'!'f r N·hw~tc1-t-~!-OA . . . "GHIJKLMl·IOPOF:STU\/Wln·z.(-t}$··1!1: :flll... J:llAA.F!Gt.!gEQt:!!~~bM!:!QE!:JE:§!Ylo::'.~HIO\';Dt·C14>·F1fHl-..·Dm.2i;.-) ( .i=)] vAt .... +. /01 :..':

9C(;x:\-a ... nLE_VA\o'DITa·Tf f.+, +. /0123456789 ( [; x: \ -a ... n (.)

'·I~0+cIa·tI-T-a+*1?-f0Ar9..C...DuEwF~GtHcIlJ-KtL-M-H+OlP-OORAS9TCUDYEWFXGYHZI{-JKtL}M$·l·~IOElFl·Q:ffl:lSlTlU.V.. ~WAWA0l"~Z£{-~t}g$E...Q·HE!I:~:f!llbl.M.. :!i::A!AQBE~£0!BHHl'!:§YH~!~~!~bxM!;:a!tQE·:ngF~,·;;e?eTaUV·'·!/Dlm.~·!~:~;a-t).H<I!~

··Dll·2~-) ( 1=) JvAf.+, + ./0123 . . . :9 ( ( ' x: \ -a ... n LE_ VA I 0IaITa*1F r .... tuw::.tc l-~~1.-0A9CC·EFGtUJKLMl·IOF·QRSTUVWln·z{-t}$1"·EI ! :flll ... :rAAE!~£~gEQ!:i1.;,11( LM· ·r

II: u~w~r~at·~···BB··Dll·~s;;-)<1 ~
F!;iU.!J!bM!:!QE:gB!i!!Y~l:!!HX;l;Dt·l!I·
c N·Bl:flll..,~RA~~£~!!;Eg~!J!b~!:!QE:
RSTUVWl<YZ{-t}$·"'1' :f-'-<:rnA8!£

·~+.+./0123456789((Px:\-a ... nLE_Vll.\o'OIT0·?rr .... ·uw::>tc~t--+1-0A1'CDEFGHIJKLMHOPQ~STUVWXTZ{-t}$~·e!~lll'-<~A~ ··om.;;i.i;. - ) ( ..!.=)] vAt.;., +. /0123456 789 ( [; x: \ -11 ... II l. E- Vil. I 0 I a I Ta* 1 Fr ..... UW::> tc 1-t--·1-0AE·CDEFGHI JK LMl-IOF·ar.:S"TlJVW:: 1 !~!!!u:r;at·O··aeR··Dl·~i;.-)<1=>JvAt+,+,/0123456789([;x:\-u ... nLE_Vil.1°'01Ta·?ff"'tuw~+c1-1-11-oA9cDEFGH1. !!~~b~!:!QE:QE:§!!:!Y!!!1J"(;at·l'14>·eea·oOl·;;i.~ ~) ( 1=) JvA;w!!+, +. /0123456789 ( (; x: \ -u ... fl LE_ VA I 0 I a I Ta· ?Fr"'* uw.:i t· H--

:C CDEFGHIJKLMHOPORSTUVWXYZ{~
N+uw~+c1-r~!-OA9CDEFGHIJKLM

l:sl:Tfu- .v..w:s:o:R·zA{B-~t}£$R.g.,E·QS~:!:Jfl!l!lb"M':LrlAQAEE!0~B£~Q~gEyQ~U~!uJr!!;6aMtl·!DOf·'·:et;e!eB·§·!YDYm!.H~I;ra;t-·)C1<·1·=e>8EJ1v·A·;Dwl·!;!.+l,i;+;,-/>0<1J2:::3c 4>5Jv67A8-9+(·(+;,x/:0\1-2a3...4n5L6E7_8V9il<.1[·;'

011 x:'

a r ... 1 _VA\. I I Ta·TF +uw~+c 1-1-~l " " DEFGHIJKLMNOF·ORSTUVWN'fZ{~}$··EI: :flll~:rRAe!£R~F..:~·::!I.,J!!bM!:!QEgB!H!:!~~!.H!liat·l!le1>·eea··Dm.;;ir;-) ( 1=) ]vAt-· , + · /(

6789([;x:\-a ... nLE_VA\o'DITe ~ ... ·uw~tc1-t-~!-OA9CDEFGHIJKLMHOPORSTUVWXYZ{-t}$··1!1!:f- :rRAel~Qg(§U!!:l!!bM!:!QE0B§!YY!!!HI;at·O··aBH~*om.~~

]vA~+,+./0123456789([;x:\-

_VA\o'01Te*Tff.,.uw::>tcl-~1l-0A9CDEFGHIJKLMHOPORSTUVWl<YZ{-t}$··Bl!lll~~RAE!t£Q~EQ!:i!~!bM!:!QE:t;!B§!YY~UI~~·

c -llB··Dll·~~-) ( i=) JvA;w!!+, +. 10 ....
CRli;I!!Y;~E~l!HUJ!~!:alt!·b~O!·:·!QeFB:E~llf·l·;~D!lY·~!~!sf;!;;a-t
....... a! :flll'-<:rnA0!£R~EQ!H~lK..·.,,~!:!Q OPOF::STUVWH'l"Z{-t}$ ...·S: :flll ...:r RA ""
Ill OABCDEFGHIJKLMHOPOf;:STUVWln· ~
r 1f N·uw~tc4-t--+!-OA9CDEFGHIJ

;6789 ( [ . x: \-a .Lii LE_ VA I 0IaITa*1F r Ntuw:itcl-1--+l-OA9CDEFGtUdKLMl·IOPOF:STUVWlrfZ{-t}$··B: :flll~:rAA0~£Qg[Qlj! ~!'=

·]EvBA··;Dwll!·!;+;i,+~-,)/0(1i:2::3)

456789 JvA;il+,

([Jx: +. /0

\1-2a3...4n5L6E7~V8A9l(·r';DxI:T\a-·uTf.!r.fNll·Eu_wV~A+Ic01-IatI-T...a!*-1OFA9rC..D..E. uFwG:H~ItJcKlL-~M-H+O!P-QORASl'TCUDVEWFXGYtZU{JK-LtM}l$l·O·FB·O!R:SfTl\lJl\~,

r; a r ..... Ylo::'.~LlIO\';at·O··eee··Dm.2r.; ·· ) ( 1=) JvA-+, +. /0123456789 ( x: \ - ' " _.VA I u I I TIH ?r uwc~tc: ... ~ ... !-OA9CC·EFGHI

"':~U!~!bM!:!QEt;!B !!Y~!!!HIO\';Dt·Oe1>·eEJE1~·Dm.~~ - ) ( .~"") ] vAt+, +. 101 """' 789 ( r; x : \-a ... fl LE - 176 \ 0 I a I Ta·T Fr .... uw:· tc

v" ··El: :flll... :rAAA.~£~gE~!::!h!!ibM!:!Q[!:JE;l!1!!:!~!!1HI;at·r.14>·aea·oDl·2~ - ) ;;; vA-+, +. /0123456789 ( [; x: \ -11 ... n LE_ Vt:. I 0 I

·PORSTUVWH.fZ{-t}$··B: :flll"':rAQ0~£1:!fl;EQ!::!!~!bM!:!Q[gE;§!!:!lo::'.~1.n::;at·

1e1uom.;;i~ - ) ( i=) JvAt+, +. /0123456789 ( [;

A. , .a.J. ... nLE_VA\o'DITS·?rr ... ·uw~+c~
3456789 ( [; x :\-a ... n LE - VA\ 0 Ia

Ar1'.C...D. UEWF::G> tHcIJlK-tL--M+lH-OOAP9OCRDSTEUFGVHWIXJKYLZM{-lt·}I$O.P..O·Sr.l:Sf-T'U-V<:Wrn:-A:a-1~·£zR{f-tl};$E..Q. !~E:I::!!:f~ll!lb...M:rL. lA

.!=) ]vA;,.!+, +. /0123456789 ( (; x ·A n LE_ QA I 0IaITa·1F r ·tuw~tc:l-l-·+1.-0A£·CC·EFGHI dKL.MMOf'·ORSTUVWl:

g!E!Q:t!.~g~!L:lli!iblMiLlaQ·[·!o:·J·Be§e!eY·Y·~DUmI;·a~t~·-C)1<e11=>>·]eveA1,1·.·iD..m. .,+, $··El! :f-~:i:RA9!H:'.!;!g[Qt.!h!!b~!:!QEt;!B!HYY~U'.!

D··eBB··Dll·;;ii;.- ) ( i=)] vAt+, + "'
O[g!!;§!Y~!!!!SI!liat·et··eea·oDll·
l :Icll A0~£~gE§Ul!:llibM!:!QE0B!i!IY~!!H!
{-i}h·B :f-lo.::r~~e!£~g(g!:i!~!!b

N· 3456 789 ( [; x: \ -u ... n LE - VA I 0 I a I .,·IH?, r Nt uw.:i t<. I-~-+.~ -<)A(·CI'tEF'"GI I

llOPOF:S TIJVWl("f:;.".{-t}$··EI I :flll"":r. AA6~£!;!gf::Q!::! !

i:::c) JvAt+, +. /0123456789 ( [; x: \ -11 .... fl l. E_VA\. I[] I .,·<H ?Fr

<( uw:·1 t

-¢Ar·C[·EFGtUJKLMl·IOPQR:STUVWl:-1·::::{-t}$·~EI:

Cl>·eBB··Dlll·;;i~ - ) ( 1 .:. ) JvAt·'·, ·I·. /01234:::i6789 ( [; x: \ -u .._n L E._ V 6 1 0 l ·· ~........ uw J t·- 1-1-1.!.-0AEtCDEFGHI .Jl(LMllOr ORS

E:l!!!YY~;J!;;;at·O··eea··Dm·~~ - ) ( J. ..::) ]vA/·- '+. /0123456789 ( [

a _Qi!. I u I I Ta* ?Fr Ntuw::>tc:l-t-~1-0AC·Cl·EF"

LMHOPOR.TlJVWA'IZ{-t}$ ...·B!:flll\

£~gEQ!::!!!:l!b~LlQE9B!!YY~;JI;;;at·C1<1>·aDR··am.~~-)<J~>JvAt-.

89([;x:\-u ... nle_VA\o'DIT0*?frN·uw

·-tl-OA 9 CC·EFGH I JK LMllOPORSTUV . . . -t}$ ... ~EI: :flll'-<:r" AtHH;.i;t~EQ!::!!~!ibMUQ[gE;§ !!J~~1-L(;at.flr.14>·BIHl··Dm

At+, .... /() 123456789 ( [; x: \ ·-11 ... fl Le - VI>

:-rlU 1 f [ "'t UW::> tc 4+-+l-OA£·CC·EFG

MllOF'·ar.-s TUVWl: f Z{-t}$·4EI I :flll'-<:r fl A6!~£!;!f:[<;!l.!;t !:!.!< b!:H.IQ[[H''§!YYW1_D

·oDm·~~ - ) <i'"- >J vAt.._, +, /01:~345678'~

a \-a ... n LE - VA I 0 I I Ta* 1 Fr .... UW::> "''" H--tl.-OA£·CC·EF'"GH I JK LMllOr·a1;·5 TIJVWlCf Z{-t}$··1!1: fill~ :c llA~f:·i;' pc [91_1!~~ !!.b":!t!Q[~1E:§!YY~1..,!;at·0<1>·a1rn··Dlll·~~ ·· ) ( ..! - ) ] vi\#

0123456789([;x:\-U~flle_Vil.l·'DIT0~?fr .... tuw::>tcl-~-t!-OAI<CDEFGHidKLMHOPQ~STUVw::TZ{~}$··El!:flll ... :r.11AA~£Q~(gU!~!ib~LlQE!:J~§!YY~UI;at·~<1>·eDll··

c-)<!=>JvA;w!!+,+,/0123456789([;x:\-u ... nLE-Vil.\u'DITa*?Fr .... tuw::>tc4-~4!-0AEtCDEFGllIJKLMHOPQfl:ST\JVWXYZ{~}$··B:flll ... :r.11A6~£QgE§!::!!~!ibM!:!Q[g~§!Y

Dt·O··eee·· 0 m·~i;.-)<!=>JvA;,.!+,+.I0123456789([;x:\-u ... nLE_va1u'DIT0·1rrNtuw~tc·~4!-0ABCDErG1-tIJKLMH0PaRsTuvwxYz{~}t~·E1:flll'-<:r.nA9~£~gc

LM!:!Q[gB~!~Y!!HIO\';Dt·O··eee··Dll·~~-)<i=>Jv~+,+,/0123456789([;x:\-uinle_vil.1·'DITID*?Fr .... tuw~tc·~-t!-OAflCDEFGHIJKLMHDPaRsTuvwxT2{-t}$·

-znAE!!£~~[g!:;!!!:l!ibM!:!QEQE:§!YY~HI;at·0<1>·eee··Olll·;;i~-)<1=>JvAt+,+,/0123456789([;x:\-uinLE_Vt>.\u'OIT0*?Fr ... tuw::>tc·~-tl-OA~CDEFGliIJKLMHOr

l<YZ{-t}$··S!:f-~:s:AA0!£~~EQU!~!bMLlQegB~I!:!Y~LlI~at·O··eee·~Dm.;;i~-)<!=t]vA¢+,+,/0123456789([;x:\-uinLE_Vil.\· 1 01Ta*?ffHtUwJtc:l-~-tl-OABC

APL SIG

Chairman (RSTS) Larry LeBlanc Teletype Corp. Elk Grove, IL 60007
Library Coordinator Susan Abercrombie Ventrex Laboratories Portland, ME 041 03
Newsletter Editor(RT, TSX) Douglas Bohrer Bohrer and Company Wilmette, IL60091
Symposia Coordinator(RSX) Bob Awde Jr. General Mills Inc. Minneapolis, MN 55427

Symposia Assistant Bob Van Keuren UserWare International, Inc. Escondido, CA 92025

Standards Representative

Dan Esbensen

Touch Technologies

Escondido, CA 92025

·

VAX APL (Contact:) OPEN

European Contact (TOPS) Jean-Pierre Barasz BARTS 75008 Paris, France

Digital Counterpart Dave Quigley Digital Equipment Corporation Nashua, NH 03062

APL-i

-- - -

I
I

I
I

I
I ARTIFICIAL

I
I

I
II INTELLIGENCE
I

I
I
I
I

I
I

I
I

I
I

I
I

I
I

I
I

I

I

[g

I
I

L_ - I I DECUS -- - -

t

ARTIFICIAL INTELLIGENCE SIC

Chairperson

PSS Scheduling

Cheryl Jalbert

Tom Viana

JCC

Granville, OH

Store & Buttons

Sally Townsend

Ass't Chairman

Inst. Defense Analysis

Don Rosenthal

Alexandria, VA

Space Telescope Science Inst.

Baltimore, MD

Quality Control Chair Dick Ciera

·

Symposium Coordinator

Harris Corp.

David Slater

Palm Bay, FL

Institute for Defense Analysis

Alexandria, VA

Quality Control

Carol Guyermelli

Ass't Symposium Coordinator

Session Note Editor Greg Parkinson Cognitive Systems Inc.

Site Coordinator, Anaheim Chris Goodard

New Haven, CT

Newsletter Editor Terry Shannon Digital Review Boston, MA 02109

Volunteer Coordinator, Anaheim Peter MacDonough Tractor Inc. California, MD

Members-at-Large George Humfeld

Newsletter Publisher Bob Zeek Pfizer Inc. Groton, CT

Matt Matthews IV
Evaluation Research Corp. King George, VA

Membership Coordinator Pamela Vavra KMS Fusion Inc. Ann Arbor, MI

DEC Counterpart Art Beane Digital Equipment Corporation Hudson, MA

Al-i

(THE (LINKED LIST))

THE NEWSLETTER OF THE DECUS ARTIFICIAL INTELLIGENCE SPECIAL INTEREST GROUP

Vol.2 No. 1

February 1986

FROM THE EDITOR

Welcome to the first 1986 issue of (THE (LINKED LIST)). The AISIG
newsletter has been absent from the past three issues of THE DECUS SIGs NEWSLETTERS for a number of reasons, but primarily because of
my recent job change and relocation to Boston. If you have ideas, suggestions or articles to submit to (THE (LINKED LIST)), you can
contact me at either of the addresses listed below:

work:

Digital Review 160 State Street 6th Floor Boston, MA 02109 (617) 367-7190

Home: 15 Vancouver Street #201 Boston, MA 02115

- Terry C. Shannon

FROM THE CHAIR
Join the celebration! Come gather 'round for tales of Anaheim.
First, briefly, our history: During the Spring 1985 symposium in New Orleans, the AI working groups of three DECUS SIGs assembled to discuss AI's place within DECUS. The result of this meeting was positive - we voted to begin the process of becoming a formal DECUS Special Interest Group. During the summer, we were awarded Special Interest Committee (SIC) status, the SIG Council's new training and testing stage for fledgling SIGs. Beginning in September, before we'd even finished clarifying our SIC status, we began to get responses to (The (Linked List)). By mid-October, we knew we had a good core leadership group and we'd adopted SIC/SIG operating procedures. Sessions and PSSes were scheduled for Anaheim. We'd begun to collect session notes. Just for fun, we'd chosen a mascot and even had an artist's drawing of our new friend. Before we'd left New Orleans we'd started scrambling to build a good SIG. The payoff came in Anaheim.
The session notes were an early clue that the Anaheim symposium was going to be a great week for us. Pam Vavra, Terry Shannon, and I had badgered speakers all fall for their session notes. Terry had written his notes and an important addition. Pam had formatted all the notes and designed the cover. We made the "bold" decision to produce 300 copies. Chris had them duplicated and bound. One look told me we had a winner, and the contents were even better. They sold out rapidly. We'll make 400 copies of the Dallas session notes.
Our mascot is a creature with an appealing smile called an A-i, after the
Al-1

only sound that it makes. More information on the A-i (Bradypus Tridactylus to purists) will be presented in an upcoming issue of this newsletter; in the meantime you can refer to the cover story in the January 1986 edition of International Wildlife magazine.
Sally Townsend, our "shopkeeper," made a variety of clever buttons using the A-i. They were in more limited supply than our session notes, but we'll try to have more for Dallas.
On Saturday December 7, before the Fall 1985 symposium got underway, DEC counterpart Art Beane and I opened the AISIC suite and sat there talking and planning while we waited for Art's promised AI VAXstation to materialize. During the wait, we accepted delivery of the hardware earmarked for our "suitemates" - APL, Languages and Tools and UNISIG. Our shared facilities provided us with a large parlor and a separate "machine room" and proved to be an immensely successful combination. We'll share again in Dallas.
The suite was open, generally, from 8:30 in the morning until well after midnight. We had numerous meetings there, and, once the AI VAXstation arrived, nonstop demos and software discussions. Our speakers were available to answer questions and debate discuss issues, as were representatives from DEC's AITC (Artificial Intelligence Technical center) and related areas. We collected new SIC members, drafted new leadership and even did our sewing in the suite when the A-i patches for our polo shirts finally arrived. (Who needs an alligator?)
Sunday, we offered three PSSes: Introduction to AI, LISP, and OPS5. visited all three and was pleased with the comments that I heard. For Dallas, by popular request, we will offer these three plus one that serves as a follow-on to the introduction. Complete details on each PSS will be provided in the March issue of (THE (LINKED LIST)).
All week, we had a very positive reception for our sessions. We had to close the doors on three of them because the fire marshall didn't seem to approve of people hanging from the chandaliers to hear our speakers. We repeated those three and had sellout crowds for the encore performances. I hope that we will be able to share content from a number of the sessions with you through this newsletter.
By Wednesday, we were definitely receiving rave reviews. Wednesday morning, I met with our mentor and review committee. They had been appointed by the SIG Council to watch over us for the duration of our SIC status. Their input has been very important to our success. SIC status had been expected to last for up to three symposia. Exactly one symposium after we voted to request SIC status, Bill Brindley, Chairman of our Review Committee, recommended that SIG Council schedule a vote on our SIG status.
Friday morning, I left the SIG Council meeting and arrived at the conclusion of Terry Shannon's last session in time to begin the closing session. My announcement that SIG Council had voted that we shall have SIG status was met by cheers. Other DECUS units may yet vote on our status, but when and which is unclear. Since our position is strong, I do not anticipate any problems.
The rest of Friday was a similar joy. We had a good discussion in the closing session about what things people want to see added to what we're doing, and I took the opportunity to offer some much deserved honors.
Sally Townsend and I had conspired to produce a special thank you. Sally
Al-2

had buttons made featuring our mascot and the words "A-:I Honors, Anaheim 85." I'd asked for three .. Having come up with this concept, I had given myself the difficult job of allocating them. Pam Vavra, our new Symposia Rep, who has assisted with many of the pieces of getting us started, Chris Goddard, our new Membership Coordinator and Suite Coordinator for Anaheim, who has also picked up pieces as necessaary, and Don Rosenthal, Vice Chair, who has done many important things for the SIG, each deserve special recognition. Every member of the Steering Committee deserves great thanks for a job well done.
The buttons I saved for the people who served as lightning rods for the formation of the group. Dave Slater has been Chair of the AI Working Group of the VAX SIG since the Spring 1984 Symposium in Cincinatti, and has worked to generate interest in AI within DECUS. Terry Shannon began writing (The (Linked List)) before we even became a SIC. He has also given some of our most successful sessions and tirelessly offers more and more. Art Beane was in Cincinatti, too. Art offered the sessions that got everything started and has continued to offer sessions and respond to our calls for assistance. Art has already made significant contributions as our DEC Counterpart and as a part of our Steering Committee. It was to these last three that I gave A-i Honors this time. It is my goal to offer one A-i Honors in Dallas.
After the Closing, Chris ran for the ice cream cake that he'd ordered with our A-i on top. Everyone from the Closing was invited to the suite and we had a party. That evening, L&T and UNISIG helped us put on another party. Our mentor, Larry Jasmann, came to this one and I presented him with one of our A-i shirts as a way of saying thank you for all the guidance.
I've glossed over the technical content here to share the news with you. we're off to an exciting start and we have a great group. However, it takes a number of people to do a really good job of running a SIG. We need more input; and, as we grow, we will need even more. Write Chris or I if you would like to participate as a member or as part of the leadership. Join us in Dallas and share your views with us through the newsletter.
- Cheryl Jalbert
FEATURE ARTICLE
LISP and OPSS have received considerable attention within our new SIG, so we felt we should give equal time to PROLOG adherents. The following article gives a brief, novice level introduction to PROLOG.
PROLOG: PROGRAMMING IN LOGIC
Until about 10 years ago, LISP, John McCarthy's 1957-vintage LISt Processing language was the only significant symbolic data manipulation language available for AI or knowledge-based applications. 1972 brought the first incarnation of PROLOG, a nonalgorithmic, logic-oriented programming language that dispenses with DO-FOR, WHILE and GOTO and implements simplified rules of predicate calculus. This article examines the history of PROLOG, discusses what it is and how it works, suggests why the Japanese chose PROLOG for their Fifth Generation project and analyzes the great LISP vs. PROLOG debate.
Al-3

A BRIEF HISTORY OF PROLOG
PROLOG's roots can be traced to the University of Montreal, where a group of computer scientists was formed in 1965 to develop a French to English language translation program. Some five years later, a Frenchman named Alain Colmerauer joined the Canadian researchers. Although their efforts were not entirely successful, the translation program represented the first large scale use of symbolic logic to manipulate data. When the translation project drew to an abortive conclusion, Colmerauer returned to the University of Marseilles, taking with him the symbolic data manipulation and logic programming techniques he had developed and used in Canada. He referred to this collection of programming techniques as "System Q," and used it as a springboard to the development of a new computer language.
By 1972, System Q had evolved into a logic oriented programming language and interpreter which Colmerauer's wife named PROLOG, an acronym for PROgramming in LOGic. Implemented in ALGOL-W by the French Groupe D' Intelligence Artificialle, this early PROLOG remained in the domain of academia. In its primitive versions, PROLOG lacked the capability to perform arithmetic calculations and was supported with very few diagnostics. Little more was done with the language until 1974 when Robert Kowalski, a researcher at the University of London's Imperial College, formalized the concepts of logic programming and created a "reason" for PROLOG.
Shortly thereafter, personnel at the Department of Artificial Intelligence in Edinburgh, Scotland discovered the new language and began to use and improve upon it. Under the supervision of Dr. David Warren, the Edinburgh team added diagnostics, arithmetic capability and an improved user interface to PROLOG. Their efforts resulted in a specification for the language, often referred to as "Edinburgh syntax," and ultimately in the development of the fastest and most efficient PROLOG implementation.
until the end of the decade, interest in PROLOG was concentrated in the European AI community at locations like Edinburgh, London and Marseilles as well as at the Institute for Coordination of Computer Techniques, or SZKI, in Budapest, Hungary. Hungarian computer scientists recognized the value of PROLOG for business and industrial as well as AI applications, so the language gained a significant following in that country. Outside of Europe, the Electrotechnical Laboratory in Tokyo was one of the few research centers to show interest in PROLOG. The involvement of this facility undoubtedly had an impact on the Japanese decision to make PROLOG the language of choice for their Fifth Generation computer program.
PROGRAMMING IN PROLOG
on an elementary level, a PROLOG program consists of problem description instead of the steps that must be taken to solve a problem. using a conventional computer language, a programmer defines the algorithms necessary to solve a problem, and the sequence in which the algorithms are executed. A PROLOG programmer writes a program by defining the problem at hand in terms of facts, relationships and rules, allowing the PROLOG interpreter to define the problem-solving algorithm. In essence, what the programmer does is make assertions
Al-4

-

-

(which tell PROLOG what is true) and allow the interpreter to draw its own conclusions. Programming in PROLOG is a three step process in which a programmer:
1. Defines facts about objects and their relationships
2. Defines the rules that apply to the objects and their relationships 3. Asks questions about the objects and their relationships.

PROLOG uses the concepts of predicate calculus to represent and manipulate information or knowledge. Objects and the relationships between them, are represented as clauses that either may be true or false, then evaluated by an inference mechanism that relies on logic. Through its control mechanism, PROLOG can infer new facts from the ones with which you have provided it.

FACTS

Facts are represented in PROLOG by clauses whose grammar and syntax are similar to the rules that govern the English language. For example, the fact that a person named Michael lives in a town called Solvay may be expressed in English as:

Michael lives in Solvay.

The same fact, expressed as a PROLOG clause, takes the form:

lives in(michael,solvay).

-

A

A

I

I

I . . . . . argument 2

I

I . . . . . . . . . . . . argument 1

I ····················· predicate

When facts are entered into a PROLOG database, the name of each predicate and object must begin with a lower case letter. The predicate is written first, followed by objects which are separated by commas and enclosed in parentheses. Finally, each fact must be terminated with a period.
If a PROLOG database contains a single clause, the interpreter can only parrot back information or answer a question based on the facts contained in that clause. Additional facts and rules must be asserted before the interpreter can deal with more complicated questions. Anything that can't be proven true is considered false by PROLOG - the interpreter will respond "no" to any question that isn't supported by an assertion in the program's database, whether or not the answer actually is false.

VARIABLES
PROLOG uses variables to represent those classes of objects which have not been or can not be named explicitly. In the English language, we use terms like "someone,· "everything" and "all" to represent variable data. In PROLOG, symbols that begin with a capital letter
Al-5

serve the same purpose. When the interpreter is asKed a question that contains a variable, it searches through the program database to find an object that matches the question. This process, known a~ "pattern matching," is one of the most powerful features of PROLOG.
For example, if you wanted to assert the fact that Michael likes a certain class of objects without specifying every conceivable object within that class, you could do so by defining the variable ·x· as something that Michael likes. Each object equated with the variable "X" would then be recognized by PROLOG as something that Michael likes, as follows:
likes(michael,X). females(X). golf(X). steak(X). richard(X). cats(X}.
A SIMPLE EXAMPLE
The following example demonstrates how facts, rules, and questions are used to create, qualify, and query a PROLOG database.
The database listed below asserts several facts in PROLOG notation. In English, these facts are:
Two individuals named Michael and Erin like cats; Two individuals named Amanda and Erin are female; Amanda and Erin live with Michael; and Amanda is younger than Erin.
In PROLOG notation, the same facts are expressed as: likes(michael,cats}. female(amanda}. female(erin}. likes(erin,cats}. lives with(michael,amanda}. lives-with(michael,erin}. younger_than(erin,amanda).
To ask PROLOG what Michael likes, you could enter:
?- likes(michael,X}.
PROLOG will search through its database and attempt to find facts or rules that match the question. When it finds the fact "likes(michael,cats}," it responds with:
X=cats.
This example aerely returns a fact that has been established by a clause in the database. By adding rules to the database, it's possible to utilize PROLOG'S inf~rence mechanism to perform more sophisticated queries.
Al-6

PROLOG rules can be used to express general statements about objects and their relationships. Each rule consists of two parts, the head and the body, which are separated by the symbol ":-." To assert the fact that Michael likes any female who likes cats, you could enter the following rule _into the program database:
likes(michael,X):- female(X), likes(X,cats).
This rule states that Michael likes any female who likes cats. If this rule is added to the database and PROLOG is asked who Michael likes, the interpreter searches for a female who likes cats:
?- likes(michael,X).
Instead of responding with a single fact as it did in the previous example, PROLOG attempts to answer the question by initiating a depth-first search. The interpreter starts at the beginning of the database and begins to evaluate its facts sequentially. When the interpreter finds an object in the database that matches the variable "female(X)," the first goal is satisfied or instantiated. (In this case, the fact "female(amanda)· matches the variable.) PROLOG notes the goal's location with a place marker and continues its depth-first search by scanning subsequent facts in the database in an attempt to satisfy the second goal. If the interpreter is able to match the variable "likes(X,cats)· with an object in the database, the second goal is satisfied and an answer is displayed.
In this example, the second goal cannot be satisfied. Although Amanda is female, the database contains no information to prove the assertion that Amanda likes cats. At this point, PROLOG will backtrack and attempt to resatisfy the first goal by searching the database for a second object that matches the variable "female(X).· During its initial search, PROLOG started at the beginning of the database. For each subsequent attempt, the interpreter starts its search from the location of the first satisfied goal.
Thus, PROLOG backtracks to the fact directly beneath "female(amanda)" and searches for a second occurrence of "female(X).· When the interpreter finds "female(erin),· it assigns a place marker to this fact and again attempts to satisfy the second goal. The fact "likes(erin,cats)· instantiates the second goal of the rule, so PROLOG answers the question by displaying:
X=erin.
Nowhere in the database is it stated explicitly that Michael likes Erin. Instead, PROLOG is able to arrive at this conclusion by drawing an inference from the facts that Erin is female and Erin likes cats.
Adding A Second Rule
Assume that Michael has a younger sister named Amanda. Based on the absence of supporting information, PROLOG would respond "no· to a query about Michael's siblings, as follows:
?- sister_of(michael,X). no
PROLOG cannot prove this assertion because its database does not contain a fact that matches the question "Who is a sister of Michael?"
Al~

However, w_e could define a sister of Michael as "a female who lives with Micbael and.who is yc;iunger than Erin" by adding the rule listed below to the PROLOG database:
sister of(michael,X):femaleTX),lives_with(michael,X),younger_than(erin,X).
If we were to pose the "sister_of" question to the interpreter again, it would instantiate all three variables in the rule with the object ·amanda," and respond with:
X=amanda.
Again, the database does not contain a fact or rule that tells PROLOG that Amanda is Michael's sister. As in the previous example, PROLOG uses the rules of logic to infer this fact from the other facts that have been stated.
PROLOG SEMANTICS
PROLOG supports two distinct programming styles: declarative and procedural. Procedural programming requires you to define and code a specific algorithm that explicitly directs the computer to perform each step necessary to the solution of a problem. This is the method used to write programs in traditional programming languages. Declarative programming works very differently. Instead of telling the computer how to solve a problem, you define the problem to the computer in terms of logical facts and relationships, and allow the computer to come up with a solution.
There are two reasons for the inclusion of a procedural component in PROLOG. First, input and output operations require the use of techniques that are not based in logic. Therefore, the code responsible for implementing I/0 in PROLOG is of necessity procedural. Second, a program composed entirely of declarative statements would contain a knowledge base filled with statements about what is true. PROLOG'S inference strategy could make deductions based on these statements, but it would do so very inefficiently. The availability of procedural features in PROLOG enables a programmer to tell the interpreter how to deal with the information in the knowledge base and in what order to resolve clauses or declarative statements.
APPROPRIATE APPLICATIONS
Although originally developed for language translation purposes, the characteristics of PROLOG make it suitable for a variety of applications, including natural language processing, relational databases, parallel processing, and expert system development.
o Natural Language Processing
PROLOG's syntax allows the rules of a natural language grammar to be expressed as English language statements, making it suitable for writing natural language processors or front ends. PROLOG automatically will parse an English language sentence and apply the appropriate rules to represent the meaning of the sentence.
A~

---

-

No other programming language shares this capability with PROLOG; for example, a FORTRAN programmer would have to develop and write a parser and analyzer to accomplish what PROLOG does by default.
o Relational Databases
A PROLOG program is analogous to a relational database in that it is made up of facts and rules which describe the relationships between facts. In many cases, a relational database can be implemented in PROLOG without the need to include a query facility to access the database and return information from it. The readability and English-like syntax of PROLOG statements often precludes the need to develop a front end that converts English requests into a form that is acceptable to the database.
o Parallel Processing
PROLOG does not use the assignment statement, one of the stumbling blocks to parallel processing. Conventional programming languages use assignment statements to establish values and store them in specific memory locations. If two independent programs attempted to reference or modify the same memory location at the same time, a system error or crash would result. Because PROLOG dispenses with the assignment statement, it lends itself to parallel processing applications.
o Expert System Implementation
Finally, PROLOG is particularly appropriate for expert system implementation because it is able to explain the logical steps it went through to derive an answer to a problem. This built-in capability eliminates the need to design and write an explanation facility for a PROLOG-based expert system.
ORIENTAL INFLUENCE
PROLOG owes much of its recent rise in popularity to the fact that it has been designated as the kernel language for the Japanese Fifth Generation computer project. Japan based its decision on the fact that PROLOG is well suited to symbolic data manipulation and does not require the serial architecture of a Von Neumann computer. These capabilities make PROLOG a natural choice for the parallel architectures of Fifth Generation knowledge information processors.
However, the use of PROLOG as a kernel language should not be regarded as a Japanese endorsement of PROLOG as the standard programming language of the Fifth Generation. Contrary to the claims of several vendors and trade journal articles, the Japanese intend to use PROLOG as a knowledge representation and manipulation paradigm, not as the specific language in which knowledge-based programs will be written.
Perhaps taking a cue from our government's choice of ADA as the name for its standardized higher level programming language, the Japanese have dubbed their version of PROLOG "Himiko,· the name of a famous woman in Japanese history. This implementation was used to write the operating system for the personal sequential inference (PSI) machine developed during the first phase of the Fifth Generation, and an
Al-9

enhanced version will be used to control the parallel inference

m~chines now under development.

,

PROLOG vs. LISP

LISP is an American language. It was invented and enhanced in this country and its various dialects and implementations have attracted a great following among American AI researchers. Several American firms manufacture "LISP machines,· processors that are optimized for LISP programming and execution. Because PROLOG was developed and refined outside of the United States, it often is viewed as a foreign, unproven language, especially by LISP adherents. Nationalism aside, almost anything that can be done in LISP can be done equally well in PROLOG, and vice versa. The best language for a given application depends primarily on the specific needs of that application.

One of the arguments against PROLOG is based on its apparent ease of use. In order to perform even basic operations in LISP, you must have a reasonably good understanding of the language and how it manipulates information. On a superficial level, PROLOG is much easier to work with. Its built-in inference strategy enables even a novice to do impressive things with very little effort or presupposed knowledge. After some initial investigation, you'll discover that PROLOG'S inference mechanism gives no indication of how it accomplishes what it does. When you begin to use PROLOG to develop real world applications, you'll find that a familiarity with the internal workings of the language is essential.

The present unavailability of "PROLOG machines,· custom processors designed for efficient PROLOG execution, is often cited as a drawback by LISP devotees. Although several prototype PSI machines have been developed as a result of the Japanese Fifth Generation program, the high performance LISP machines from companies like LMI, Symbolics and xerox currently have no PROLOG equivalents. However, this situation may change in the near future. A fast, efficient PROLOG interpreter
for LISP Machine Inc.'s Lambda processor has been written by AI researchers at the University of Uppsala in Sweden, and a VLSI-based PROLOG compiler is under development at Syracuse University in
Syracuse, New York.

standardization also must be considered. Although numerous dialects of LISP are available, an industry-wide effort to develop a de facto
LISP has resulted in the adoption of Common LISP. No formal industry-wide PROLOG standard has yet been established; there are compatibility problems that must be resolved before PROLOG can enjoy widespread use as a general purpose, transportable programming language.

Finally, the backtracking strategy inherent in PROLOG'S control

mechanism allows for error. As discussed earlier, if a rule selected

by the program does not lead to a conclusion, the program backtracks

to a decision point and selects an alternative rule. Reliance on this

single control mechanism makes it difficult to limit searches by

determining the most likely paths to pursue. Although statements in a

PROLOG program can occur in any sequence because the interpreter

evaluates each statement independently, the depth-first search

strategy Jlllkes an unstructured PROLOG program easy prey to the

combinatorial explosion. The most efficient way to organize a PROLOG

program is to structure it so that specific searches are conducted

prior to generalized searches.

Al-10

WHAT TO LOOK FOR IN A PROLOG INTERPRETER
PROLOG interpreters tailored to a variety of computers and operating systems are available at prices ranging from less than fifty dollars to several thousand dollars. If your primary goal is to learn more about the language or experiment with its capabilities, a PC-based PROLOG interpreter should satisfy your needs at a very moderate cost. If you plan to use PROLOG for real world applications, you'll need the facilities offered by more powerful versions of the language. These include a compiler for increased speed and performance, a built-in editor, and virtual memory management capabilities.
Although a formal PROLOG standard remains ~n elusive goal, most experts consider Edinburgh Syntax to be a de facto standard for the language. Edinburgh Syntax is defined by the DEC-10 PROLOG compiler and interpreter developed by AI researchers at the University of Edinburgh and is described fully in "Programming In PROLOG" by W.F. Clocksin and c.s. Mellish. A compatible superset of Edinburgh Syntax is likely to form the core of a future PROLOG standard, so it's important that the PROLOG you select conforms with the conventions set forth in this book.
EPILOG
PROLOG is an efficient, powerful language that's well suited to logic programming applications. The built-in inference strategy of the language makes it fun to work with, and its logical basis ensures that you'll learn the principles of predicate logic while you learn how to manipulate symbols instead of numbers. Furthermore, PROLOG's unique nonalgorithmic approach to problem solving will be a key element of ~rogramming languages and techniques of the future, making it worth your while to obtain a basic understanding of the language and how it works. PROLOG may not be a programming panacea, but it provides a good environment for database manipulation, expert system prototyping, natural language processing and other aspects of knowledge-based programming. If you want to learn more about symbolic programming and the concepts behind expert systems and AI applications, gaining some experience with PROLOG is a good way to start.
<-o->
OPS5 NEWS
WHO'S IN CONTROL HERE?
By Don Rosenthal, AISIC Vice Chair
One of the biggest points of confusion for new OPS programmers is the use of the built-in control strategies. Henry Ford once offered autos for sale in ·any color a customer desired, as long as it was black." OPS is not quite as restrictive in the choice of strategies, it offers two: Lex and Mea. However Lex can be accurately considered a subset
Al-11
..

of Mea.
What are control strategies? Let's answer this question before tackling the subtleties of Lex and Mea. An important characteristic of OPS5 and its direct predecessors is that it's a pure "object-level" (or "domain-level") programming language. This is considered by many to be its most attractive feature; others spell that adjective a bit differently, however. What this means is that there are no control constructs in the language: no loops, no branches, not even an implied sequencing of its basic structure - the rule.
The intent of a control-free language is to allow the programmer to deal solely with solving the problem at hand, in this case, to write rules that pertain only to the solution of the problem, with no programming overhead. The programmer writes the rules, and the "most appropriate" rule at any point during the execution of the program selects itself and fires. Obviously, there must be some mechanism for this selection, but it is imbedded within the OPS5 interpreter. This mechanism is called the control strategy. Its operation is successfully hidden from the user, with the single exception that a choice can be made between Lex and Mea. To make an intelligent choice as to which strategy to use involves understanding the selection mechanism, but it's really not as obscure as some people make it out to be (I promise ··· ). Here goes:
o Important fact #1:
OPS5 operates in a small loop, termed variously the "Recognize-Act" cycle, or the "Match-Select-Execute" loop.
o Important fact #2:
During the match phase of the cycle, ALL rules.whose IF clauses successfully match the present state of the data (which in "working memory") are copied into the "conflict set".
o Important fact #3:
when- the conflict set has collected all the successfully matched rules, one is selected by the chosen control strategy. If the conflict set is empty, however, the program halts.
o Important fact #4:
During the execute phase, the THEN clauses of the selected rule are executed. These usually modify working memory so that when the match phase is re-entered, a new conflict set is generated.
Let's now investigate the selection phase more closely. The conflict set is made up of instantiated rules. These instantiations have the following structure. First comes the name of the rule. Then the time-tag of the working memory element ("wme") matched by each IF clause. What's a time-tag? It's really simple, although the name is a bit misleading. When a piece of data enters working memory, it is assigned a number. These numbers are assigned consecutively and in increasing order. Thus, a wme with a ·higher number than
Al-12

-

-

another wme has entered working memory more· recently. When a working
memory element is removed from working memory, its time-tag is retired.
The only trickiness is that when a wme is modified, it is given a new time tag (it actually is a "new" piece of data after all).

It is the time-tags that form provide the most important information

for the selection process, but I'm getting ahead of myself. Let's

look at Lex in detail. It has only 4 steps.

· ·~ ·

Step #1: Remove any instantiated rules that have fired before.
Rules can match many combinations of working memory elements, but any exact combination of matches may only be fired once. Realize that the "most appropriate" instantiation might easily become a one-rule infinite loop otherwise.
Step #2: Find the instantiation that matches the most recent set of working memory elements.
This is a simple matter of comparing time-tags. If any IF clause of any single instantiation matches a working memory element with a time tag higher than that of any other instantiation, that rule is selected, and we need not bother with the following steps.
What if there is a tie? If more than one instantiation matches to the highest time-tag of any rule in the conflict set, consider only that subset of rules, and look at their next most recent time-tag. If any one instantiation in this subset has a second most recent time tag greater than the second most recent time tag of all others, select that instantiation, else, continue to the third, fourth, etc, most recent time tag as needed.
Step #3: If any instantiations were tied all the way through step #2, make a decision based on how specific the IF clauses of those instantiations are.
Rules can match the same working memory elements, but in different ways. That is, an IF clause of one rule might look for a disease symptom, such as "fever" regardless of how high the fever was, and another might look for fever greater than 100 degrees. They both would match a working memory element representing a fever of 102 degrees, but the latter clause would be considered more specific.
Step #4: Finally, if no there were no tie-breakers due to recency or specificity, arbitrarily choose one of the tied instantiations.
Lex is a subset of Mea, as I said above, and Mea adds only one more step, between #1 and #2 above:
Mea Step #1.5: Look only at the time-tag of the working memory element matching the first clause of each instantiation.
If one is more recent than all the others, select that instantiation. Otherwise, continue as in Lex.
With that under our belts, the only point left to explore is when to use Mea and when to use Lex. Some would tell you, "Always use Mea". Not I. Stay tuned for next month's topic, "The Great Lex and Mea Controversy", or, One Man against the World."
Ai-13

<-o->
BOOK REVIEW
Programming Expert Systems In OPS5: An Introduction To Rule-Based Programming
By Brownston, Farrell, Kant and Martin Addison-Wesley Publishing, 1985 471 pages
Writing a book about OPS5 is not as easy as it might appear. A familiarity with classical programming techniques is usually all the background a programmer needs to learn a new programming language such as C or PASCAL. The underlying philosophy of subroutines, function calls and sequential execution is already established, so all the newcomer has to do is master the syntax of the new language.
such is not the case with OPS5, a rule-based programming language that requires a new approach to programming and problem solving. As OPS5 novices soon discover, the language requires a different mindset: merely learning the syntax of OPS5 does not make you a capable production system programmer. You must understand how to develop rule-based systems and how to execute rule-based programs; activities that require you to think in terms of OPS5 rules or productions. Thus, the subtitle of the book is critical to the mastery of OPS5.
Realizing that most readers have only classical programming backgrounds, the authors first describe the basic philosophy of production system programming, then explain the ins and outs of the OPS5 language itself. The book's organization and structure make it an appropriate academic textbook, even though the exercises at the end of each chapter seem to have been added as an afterthought. The text is conveniently divided into three parts. Part One is a concise view of the nature of production systems along with a discussion of when to use them. Although the authors write in a clear and understandable style, the complexity of the subject is such that you may have to read this section several times before you have a firm grasp of the material it presents.
Part Two describes the use and syntax of OPS5 in great detail. This section includes a complete programming example and notes on programming style. Program development and organization are discussed at length, and an entire chapter is devoted to advanced OPS5 programming techniques. On the debit side, I was surprised to see that the section provided very little information about program maintenance. A production system requires non-standard maintenance techniques and this book should have covered them thoroughly.
The last section of the book discusses popular production system philosophies and provides an account of the various production system architectures and common system features. The last chapter of the book is devoted to an overview of about a dozen expert system tools related to production system tools.
Although it isn't a treatise on artificial intelligence, the book uses an in-depth study of OPS5 to present a general view of a specific area of AI research, making it more than a typical programmer's guide. I
Ai-14

struggled with the anemic OPS5 documentation supplied by DEC for about two months before I got an advance copy of the first five chapters of this textbook, and reading this material was like turning on a light in a dark room; Despite one minor reservation about the chapter exercises, I feel that this book is a must for OPS5 programmers. - Reviewed by Chris Goddard, DECUS AI SIG That's it for the February issue of (THE (LINKED LIST)). Our March issue will feature a review of the Fall 1985 Symposium, a preview of AISIG sessions and activities scheduled for the Spring 1986 Symposium, a review of Golden Common LISP, and information on our four presyrnposium seminars.
Al-15

[Ql
DECUS
BUSINESS APPLICATIONS

BUSINESS APPLICATIONS SIC STEERING COMMITTEE

Chairman Stuart Lewis Douglas Furniture Bedford Park, IL

CL SIG Liaison Becky Burkes Financial Insurance Consultants Covington, LA

Symposium Coordinator Steve Simek IRT Corporation San Diego, CA

OMS SIG Liaison Joe Sciuto Army Research Institute Alexandria, VA

Asst Symposium Coordinator

Members-at-Large

·

Bobbie Wiley

Robert D. Lazenby

CEI Perry Nuclear Power Plant

Dixie Beer Dist., Inc.

Euclid, OH

Louisville, KY

LRP and Marketing Coordinator Arnold I. Epstein D-M Computer Consultants Rolling Meadows, IL
Marketing Asst George Dyer Gallaudet College Washington, DC
Communications Representative OPEN
Newsletter Editor Thomas Byrne L Karp and Sons Elk Grove Village, IL

Robert Kayne Gal laudet College Washington, DC
Ray Evanson Paragon Data Systems Winona, MN
Digital Counterparts Sue Yarger Digital Equipment Corporation Merrimack, NH
Ray Arsenault Digital Equipment Corporation Merrimack, NH
SIC Mentor Bill Brindley Networks SIG Chair

Session Notes Editor Raymond Swartz Goodyear Tire and Rubber Co. Akron, OH
Library Representative David Hittner Projects Unlimited Dayton, OH

SIC Review Committee Larry Jasmann Leslie Maltz Ted Bear Jeff Killeen

BA-i

-

COMMERCIAL LANGUAGES SIG

Chairman Jim Wilson Pfizer Inc. QC Div. Terre Haute, IN
Symposium Coordinator Ray Strackbein Palm Desert, CA
Library Coordinator Philip Hunt System Industries Milpitas, CA
Session Note Editor Bob Van Keuren Userware International, Inc. Escondido, CA
Newsletter Editor Ted A. Bear Ramtek Santa Clara, CA
Ass't Newsletter Editors Beverly Wei borne LaPorte, IN
Kevin Cullen VITA-Mix Corp. Holmstead Falls, OH
Daniel Cook Userware International, Inc. Escondido, CA
Basic Working Group Members Mark Hartman Jadtec Computer Group Orange, CA
Rocky Hayden UserWare International Inc. Escondido, CA
Bill Tabor Computer Productss Pompano Beach, FL

Cobol Working Group Members Keith Batzel Crowe, Chizek & Co. South Bend, IN
Mary Anne Feerick Greyhound Temporary Personnel Lyndhurs~ NJ
Bill Leroy The Software House, Inc. Atlanta, GA
Herbert J. Matthews IV ManTech International Corp. Alexandria, VA
Kenneth Shay Melvin Simon & Associates Indianapolis, IN
Jim Welborne Crowe Chizek & Co. South Bend, IN
DIBOL Working Group Members Neil Baldridge CompuShare Lubbock, TX
Becky Burkes Financial Insurance Consultant Covington, LA
Colin Chambers Software Ireland Rep. Inc. Portola Valley, CA
Mark Derrick WAAY-TV Huntsville, AL
Gary AP. Kohls Milwaukee, WI
Ken Lidster Disc Sacramento, CA
Kenneth M. Schilling MCBA Montrose, CA
Marty Schultz Omtool Inc. Tewksbury, MA

CL-i

._

David L Wyse Professional Business Software Dayton, OH
Marty Zergiebel The Software Gallery Brookfield, CT
RPG Working Group Members Keith Batzel Crowe Chizek & Co. South Bend, IN
Ted Bear Ramtek Santa Clara, CA
Digital Counterparts Tom Harris Nashua, NH
Jim Totten Nashua, NH

Joe Mulvey Nashua, NH
Shirley Ann Stern Nashua, NH
Standards Representatives BASIC Dan Esbensen Touch Technologies, Inc. Escondido, CA
COBOL Bruce Gaarder Macalester College St Paul, MN
DIBOL Eli Szklanka TEC Newton, MA

CL-ii
-

M.D.HubbardSP.ring (ompaRY, Inc.

ESTABLISHED 1905

MANUFACTURERS OF
<?;c~.;1J~~l?.>~.11?.> ~~J"r ~l?lii1·.1J)IJ®% ~~1IJl)IJ~ \YP.t.%'i!J~F,t,% W/12~%1;1J l;::~r:'.J!t.!)l,1%IJ~l)IJ ~~
WJIJF,t.t~ Fr%F,ttl)1J% %T~11?111)11~

313 ~ 628-2528

BOX 425
~:>)'.F,~F,l:I?.· M l_C t;l11!%.!)i!J
48051

Nov. 19, 1985

Mr. Ted Bear c/o RamTec 2211 Lawson Ln. Santa Clara, CA 95050
Dear Ted,
Would you please ask your membership if anyone has access to a reference manual for:
C 0 S 300 Multi Terminal System (Mts) or
Multi Terminal Dibol For use on a PDP-B}E or DDS 340, etc. We have the software but need the manual.
Thank you for your help in this matter.
Very truly yours, M. D. HUBBARD SPRING CO., INC.
c?u~ C. D. Hubbard 3/sw hf

CL-1

·,,
1

Ii.-- -
I I I I
! I
I I I I I I I I I I I
~---

- - - --- -=i
[Q]·! DECUS
I

I I

I I

DAARC

j

I I I I I I I I I I
-· - - - - --'I

t

DAARC

Chairman James Deck Inland Steel Research Lab East Chicago, IN

Hardware & Interfacing Peter Clout Los Alamos National Lab Los Alamos, NM

Symposium Coordinator Mack Overton FDA Chicago, IL

Math Statistics &Analysis Herbert J. Gould C.C.F.A. University of Illinois Med Center Chicago, IL

Newsletter Editor Ellen Reilly William H. Rorer Ft. Washington, PA

Process Control - Industrial Automation Bill Tippie

·

Kinetic Systems Corp.

Lockport, IL

DEC Counterpart Nancy Kilty Digital Equipment Corporation Marlboro, MA

RS-1 George Winkler CPC International Argo IL

DAR-i

WINTER DOLDRUMS THIS IS A GOOD TIME OF THE YEAR TO TAKE OUT PAST ISSUES OF THE DECUS NEWSLETTER AND REALLY READ THE ARTICLES. IN THE PAST YOU MAY HAVE JUST READ THE INFORMATION FROM YOUR PARTICULAR SIG. IT 1 S NOW A GOOD CHANCE TO PICK UP ON ALL THOSE LITTLE INSIGHTS THAT SOMEONE TOOK THE TIME TO SHARE WITH OTHERS. THE NEXT PAGE HAS ANOTHER BIT OF INFORMATION THAT COULD BE USEFUL TO YOU. HAPPY READING! DAARC EDITOR
DAR-1

1

At DECUS in Anaheim, I learned some things about MicroPower/RT that may be useful.

1. Use VBGEXE to run MPP instead of R. To do this. set V to be the command for VBGEXE by typing:

V:==R VBGEXE A

Then use ,3_ command strinq of the form:

V MPP OBJFIL/switches PASFIL

For a larae test program. R takes 4:58 while V

takes 2:28. I vow never to call VBGEXE the vegetable executive again.

·

2. To convert a MicroPower MIM file to a file that
resembles a SAV file for PROM burning. use the SPLIT program to remove the first two blocks. To do this, type:

SPLIT ,FILNAM.SAV=FILNAM.MIM/B:2

This will work if ROM memory is in one contiguous section. Dump the MIM file to check to see if this is the case. If the first block of the MIM file is all zero. except for the first line of the dump, then ROM is in one complete section.

Of course. since VBGEXE and SPLIT are unsupported. then DEC will not support the suggestions made here.

John T. Davies III Thermo Electron Instruments 524 Alpha Drive
Pittsburgh, PA 15238-2912 <412) 963-0903

DAR-2

DMS SIG
-
JOIN THE WISE

Data Management Systems SIG Steering Committee February 1, 1986
SIG Chairman: Joseph F. Sciuto Army Research Institute Alexandria, VA (202) 274-9420
Comptroller: Alan Schultz Land Bank National DP Center Omaha, NE (402) 397-5040
Symposium Coordinator: Keith Hare JCC Granville, OH ( 614) 587-0157
Symposium Coordinator: Barbara Mann TRW Redondo Beach, CA ( 213) 532-2211
Communications Committee Representative/ Newsletter Editor:
J. G. Russell Poisson SEED Software Corporation Alexandria, VA (800) 428-9400
Session Note Editor: Mark Morgan Farm Credit Banks Springfield, MA ( 413) 732-9721
Membership Coordinator: VACANT
MIS Working Group Coordinator (Past SIG Chairman): Steve Pacheco Ship Analytics North Stonington, CT (203) 535-3092
MIS Working Group (Past SIG Chairman):
DMS-i

Sandy Krueger Key Financial Systems, Inc. Pine Brook, NJ (201) 299-6600
Working Group Coordinator/ Database Working Group:
Jim Perkins PSC, Inc. Shelburne, VT (802) 863-8825
Forms Working Group: Debbie Kennedy Land Bank National DP Center Omaha, NE (402) 397-5040
Non-Digital Working Group: Doug Dickey GTE Government Systems Rockville, MD (301) 294..:9400
RMS Working Group Coordinator: Allen Jay Bennett Lear Siegler Apistan Grand Rapids, MI (616) 451-6429

Pre-Symposium Seminar Coorrlinator/ Black Book:
David B. Turner Korn/Kerry International Los Angeles, CA (408) 945-9600
ANSI Standards Coordinator: Herman "Spence" Spencer Army Research Institute Alexandria, VA (202) 294-9420
Member-At-Large:
Larry w. Hicks
Relational Database Services Kernersville, NC (919) 996-4882
Member-At-Large: Richard Arndt Cognos Corporation Houston, TX (713) 690-1105
AI SIC Liaison: David Slater Institute for Defense Analysis Alexandria, VA (703) 845-2200
Datatrieve Liaison: John Schutt J. R. Simplot Company Boise, ID ( 208) 336-2110
DEC Counterpart: Wendy Herman Digital Equipment Corporation Nashua, NH (603) 881-2494

OMS-ii

-

--

Contributions

Contributions to the newsletter can be sent to either of the following addresses:

Editor, DMS SIG Newsletter c/o DECUS U.S. Chapter 219 Boston Post Road, BP02 Marlboro, MA 01752

Russ Poisson DMS SIG Newsletter Editor SEED Software Corporation 2121 Eisenhower Avenue Alexandria, VA 22314

Letters and articles for publication are requested from members of the SIG. They may include helpful hints, inquiries to other users, reports on SIG business, summaries of SPR's submitted to DEC, etc. Machine readable input is highly desirable. Submitters should keep in mind the DECUS policy on commercialism.

Documentation Set Winners

At the recent DECUS Symposium in Anaheim, California, complete documentation sets for DEC data management products were awarded to lucky DMS SIG Campground visitors:

Winners

Documentation Set

John P. Williams USDA-FAS-IAS
Washington, DC

DBMS

Terry Leclair

CDD

Cons ilium

Mountain View, CA

Cathy Leonard

FMS

Telic Corp

Rockville, MD

Steve Thomas

DTR

VIA Metro Transit

San Antonio, TX

Steven Myerow Texcel Systems, Inc. Wayland, MA

ACMS

Tom Kelly Berkshire Medical Center Pittsfield, MA
Robert Dependahl Santa Barbara City College Santa Barbara, CA
Bhadra K. Patel Hughes Aircraft Co. Fullerton, CA

TDMS FMS-ll. RDB/VMS
DMS-1

Coming Features
-------------------------------------------------
Later issues of this newsletter will feature articles on:
Working Groups: How they assist the DMS SIG in solving User problems.
Working Group Progress Reports from the following working groups:
Database Working Group Forms Working Group Non-Digital Working Group RMS Working Group
A written report on DEC's Response to "Wish-List" Items submitted at the DMS SIG Campground at the Fall '85 Symposia.
SIG Chairman's Report on Plans for Spring '86 Symposia in Dallas.
A critical review: "Is DEC's RDB a fully functional relational DBMS?".
'Relational vs CODASYL vs Hybrid' : a critical look at functionality in the real world of production data processing.
"True Confessions of an RDB Novice/Is This an Undocumented Feature?" How RDB reacts to a delete request of a non-existent record.
Calling All Hands
-----------------------------------------
DMS SIG is in need of a Membership Coordinator. If you are interested in this leadership position within the DMS SIG, please call the DMS SIG CHAIRMAN Joseph F. Sciuto at (202) 274-9420.
Volunteers Needed - Volunteers are needed to participate in user panels, chair sessions, and help in the DMS SIG campground at the Spring '86 DECUS Symposia. volunteers should call the DMS SIG Symposia Coordinator Keith Hare at (614) 587-0157.
-------------------------------------------------
DEC sends out conflicting signals on FMS and TDMS
------------------------------------------------Not so long ago, DEC released TDMS as the heir-apparent to the niche carved out by its form package, FMS. Users at that time had to consider whether to jump on the TDMS bandwagon or stick with
DMS-2

'
FMS, a product that DEC seemingly was abandoning. Since that time, new releases of FMS have enhanced and maintained the product while continued development of TDMS has lagged far behind. What gives? What plans does DEC have to enhance TDMS? Will FMS continue to be supported? Stay tuned for DEC's response. A HOOT FROM THE EDITOR
Russ Poisson, SEED Software Corporation Starting a newsletter for a user group interested in the very broad topic of data management is indeed a difficult task. The task is further complicated by the proliferation of "technical" newsletters and the need to provide a new and fresh direction to those interested in data management. I realize that such an undertaking will require overcoming a considerable amount of negative momentum. With this in mind, I invite all DECUS members to send any articles, helpful hints, technical discussions, cartoons or other material deemed suitable for publication in this newsletter. In particular, I challenge DMS SIG Steering Committee to provide the necessary leadership required to accomplish this goal. The DMS SIG exists to provide communication in three ways: user to user, DEC to user, and user to DEC. Ladies and gentlemen, its time to get going! If you want a successful newsletter, lets forget the euphoria of Disneyland and our overblown status as "ribboned" symposia attendees and start cranking out some articles. I hope to hear from you all soon.
Thank you. Russ
DMS-3

The Wombat
EXAMINER
"Increases the Circulation of Anyone in America"

Volume 7

Number 6

To
Baggage C. lairn

DATATRIEVE Special Interest Group - Officers

12-23-85

SIG Co-Chairmen

Larry Jasmann U. S. Coast Guard

10067 Marshall Pond Rd. Burke, VA 22015

Joe H. Gallagher Research Medical Center 2316 East Meyer Blvd. Kansas City, MO 64132

202-426-2344

Communications Committee Rep. Editor Production Editor Artist

Elaine McWilliams Boeing Company

P. 0. Box 24346 M/S 9c55 Seattle, WA 98124

Donld Stern

Warner Lambert Company 10 Webster Road

Milford, CT 06460

Steve Cordiviola Kentucky Geological Survey 311 Breckinridge Hall Lexington, KY 40506

Bart Z. Lederman

2572 E. 22nd St.

Brooklyn, NY 11235

206-773-0102 203-878-9351 606-257-5863 212-250-2300

Symposia

Symposia Committee Rep. Chris Wool

E.I. duPont Eng. Dept.

Symposia Assitant

Diane Pinney

Computer Sciences Corp.

Pre-Symposia Seminars Dana Schwartz

Symposium Notes

Elaine McWilliams Boeing Company

Louviers Bldg. 443 Inyokern Road 15719 Millbrook Lane P.O. Box 24346 M/S 9c55

Wilmington, DE 19898 Ridgecrest, CA 93555 Laurel, MD 20707 Seattle, WA 98124

302-366-4610 619-446-6585x284 301-859-6277 206-773-0102

Product Development

Development Coordinator Bart Z. Lederman

2572 E. 22nd St.

Brooklyn, NY 11235

212-250-2300

0
. ~
:0

New Product Focal Point Diane Pinney

Computer Science Corp. 443 Inyokern Road

Ridgecrest, CA 93555

Digital Counterpart Andy Schneider Digital Equipment Corp. 110 SpitBrook ZK02-2/N59 Naushua, NH 03062

619-446-6585x284

Library Committee Rep. Volunteer Coordinator Campground Special Effects Special Consultant

Gerri Williams Gerri Wi 11 i ams Bert Roseberry Alex L. Lamb Phil Naecker

Computer Science Corp. Computer Science Corp. U. S. Coast Guard
U. s. Army
J MMontgomery Engineers

443 Inyokern Road 443 Inyokern Road 500 Camp Street 32 Pearce Ave 250 N. Madison Ave

Ridgecrest, Ca 93555 Ridgecrest, Ca 93555 New Orleans, LA 70130 Eatontown, NJ 07724 Pasadena, CA 91101

619-446-6585x285 619-446-6585x285 504-589-4934 201-532-3318x1843 818-796-9141

RSX &P/OS
VMS VMS VMS VMS VMS VMS VMS

Bart Z. Lederman Joe Kelly Larry Jasmann James Swanger Chris Wool Dick Azzi Chris Hines Bert Roseberry

DATATRIEVE Masters List

WymAn Gordon Co. U. S. Coast Guard
G. D. Searle &Co.
E. I. duPont, Engineering Dept. Motorola SPS American Board of Family Practice U. S. Coast Guard

2572 E. 22nd Street Worchester Road 10067 Marshall Pond Rd. 4901 Searle Parkway Louviers Bldg. Box 2953 MS: P116 2228 Younge Drive 500 Camp Street

Brooklyn, NY 11235 North Grafton, MA 01536 Burke, VA 20015 Skokie, IL 60077 Wilmington, DE 19898 Phoenix, AZ 85062 Lexington, KY 40505 New Orleans, LA 70130

10-28-85
212-250-2300 617-839-4411x5480 202-426-2344 312-982-7430 302-366-4610 602-244-4316 606-269-5626 504-589-4934

-

-

Contributions

Contributions for the newsletter can be sent to either of the following addresses:

Editor, DATATRIEVE Newsletter c/o DECUS U.S. Chapter Company 219 Boston Post Road, BP02
Marlboro, MA 01752

Donald E. Stern, Jr

Warner

Lambert

10 Webster Road

Milford, CT 06460

Letters and articles for publication are requested from members of the SIG. They may include helpful hints, inquiries to other users, reports on SIG business, summaries of SPRs submitted to Digital or other information for members of the DATATRIEVE SIG. Machine readable input is highly desirable and machine-to-machine transfer of material is preferred, but most anything legible will be considered. However, this newsletter is not a forum for job and/or head hunting, nor is commercialism appropriate.

Table of Contents

DECUS U. S. Chapter SIGs Newsletter, Wombat Examiner,

Volume 1, Number 6, Volume 7, Number 6

February 1987

2

Products Status

3

Chairman's Corner

4

From the Editor's Pen

4 Message from DTR/4GL Communications Rep

5 News OF THE SIG

7 Coverting Decimal UICs to Octal UICs

8 Wombat Magic

13 DATATRIEVE Wishlist, Fall 1985

20 Nostalgia Bit

About the Cover

The section cover for this issue of the Wombat Examiner was drawn by Bart Lederman. Bart explains that the Wombat is exhausted after attending the Fall Symposium. After reading this issue, you will be keenly

DTR-1

aware that a lot happened at Anaheim and the Wombat is entitled to some R and R. This issue, although published 2 months after the symposia, is being produced upon the immediate return of the volunteers.

DTR/4GL Product List

As a service to our readers, we are creating a new feature for the newsletter which will appear at least after each symposium. The following is the first of the series which attempts to provide readers current information with regard to the availability and other relevant information relating to products served by the DTR/4GL SIG.

Product Number

Version Dates

Announce/Ship Operating System

VAX Datatrieve DATATRIEVE 11

3.3 3.2 3.0*
3.1

11/85 12/85 5/85 10/85
8/84

Pro DATATRIEVE
DATATRIEVE 20 DECReporter VAX Team Data VAX Rally

1.0
2.0 1. O*
1. 0
1. 0

12/85 1/85
12/84 12/84
9/84 11/85 *** ***

VMS 4.2 4.0 3.x
RSTS 9.0 RSX 4.1 RSX+ 2.1 Micro RSX 1.1 VMS 4. 0/RSX 1. 0 Micro RSTS 1.0
P/OS 2.0
VMS 4.2
VMS/Rdb
VMS/Rdb

Editor's note:

*

unsupported

*** pre-announcement at 12/85 DECUS

If anyone has additional information to enhance this chart, or note an error, or can fill in the blanks, please let us know. This chart will only be as good as the information which is provided to us.

DTR-2

Chairman's Corner Joe H. Gallagher, Research Medical Center, Kansas City, MO

Larry Jasmann and the rest of the SIG Steering Committee persuaded me to take over as Chair of the DATATRIEVE SIG. I will take over the full responsibilities of the Chair at the beginning of the 1986 Spring Symposium in Dallas. Until then, I will be helping Larry out with some of the duties of the Chair. My first assignment is to write this "Chairman's Corner" for the newsletter; Larry was fortunate enough to get two weeks vacation right after the 1985 Fall Symposium in Anaheim. So ... here goes.

The 1985 Fall Symposium in Anaheim was a successful one. The attendance did not exceed that of the 1984 Fall Symposium (also in Anaheim), but it was more than the 1985 Spring Symposium in New Orleans. The Symposium was a financial success because very careful, almost austere, cost containment measures were put in place. The financial status of DECUS is in much better shape, and it appears that no further budget cutbacks will be required for the rest of the 1986 fiscal year.

The big news of the Symposium, at least from the point of view of the DATATRIEVE/Fourth Generation Languages SIG, was the "Pre-Announcement" of Digital's new 4GL products VAX Rally and VAX TEAMDATA. A "PreAnnounced" product means that you can not get any information in writing from Digital about the products because there is still a chance that the product names could change due to trade mark registration. TEAMDATA is for non-computer knowledgeable end-users and interacts with Digital's relational database management system providing graphics, spreadsheet, and automatic generation of default forms and reports. It is a database tool which can fit easily into the All-in-1 environment. On the other hand, Rally is an application generator which is designed to be used by computer knowledgeable end-users such as business system analysts, information center workers, and data processing professionals. Both products will increase worker productivity several times over the productivity of DATATRIEVE. We are all excited about the new products. Several full technical sessions and a pre-symposium seminar are planned for the
Dallas Symposium.

Those of you who have been reading the newsletter faithfully will

realize that the SIG is changing its name to DATATRIEVE/4GL and expand-

ing its mission to provide a DECUS focal point for these two new pro-

ducts and other 4GL's. In addition, the DTR/4GL SIG also be the home

for the recently announced product DECreporter. A presentation on the

capabilities DECreporter was given by Peter Savage at the Anaheim sym-

posium. For those of you that are familiar with DATATRIEVE, DECreporter

can optionally be linked with VAX DATATRIEVE to provide a menu driven

front end which generates DATATRIEVE code to produce reports. Alterna-

tively, it can be used as a standalone product to produce reports on

data contained in standard RMS files.

It is a tool that will be very

popular with non-computer knowledgeable end users.

There are several changes in the SIG Steering Committee. With me moving to the SIG Chair, Don Stern and Steve Cordiviola will be taking

DTR-3

over the Newsletter. Please submit articles for the newsletter to Don Stern. Gerri Williams will be taking over as the Library Committee Representative. Gerri will continue as Volunteer Coordinator.
The time till the next Symposium in Dallas, which will be the 25th Anniversary of DECUS, is very short. The Spring Symposium is about one month earlier than normal. So make your plans now.
Joe H. Gallagher, SIG Chair Elect
From the Editor's Pen
Donald E. Stern, Jr., Warner Lambert Company, Milford, CT
As you may have noticed, the editor's pen is being guided by a different hand. Joe Gallagher has been elected to the position of DTR/4GL SIG Chair. He will fully assume the responsibilities of the post at the start of the Dallas Symposium. Until then, however, he will be assisting the current Chair, Larry Jasmann. Because of this, Joe is stepping down as the Editor of the DTR/4GL Newsletter. During his tenure as Newsletter Editor, Joe has made substantial contributions to the Newsletter in terms quality and content. Please join me in extending thanks to Joe for the fine job he has done and best wishes for success in his new position. Together with Steve Cordiviola, the Production Editor, we will try to fill the rather substantial void created by this move.
In order to contain the production cost of the newsletter and avoid the need to increase its price, the newsletter will be produced in a "two up landscape mode." In this way, the content of the newsletters can be maintained at a lower cost. The readership is urged to make comments and suggestions regarding the new format.
Finally, since the production of the Newsletter is totally voluntary, the quality of its content is directly related to the participation of its readership. Please consider writing an article, tech note, etc.
Message from DTR/4GL Communications Committee Representative
Congratulations to Joe Gallagher
Joe Gallagher was elected DTR/4GL SIG Chair Elect at the DTR/4GL Steering Committee meeting held in Anaheim during symposia. Joe has been a key member of the SIG serving on the Communications Committee and as Newsletter Editor. The knowledge and dedication he brings into this new position will assure continued success for the SIG in the coming years.
DTR-4

--

-

Our current SIG Chair, Larry Jasmann, will continue in his roll
until the Spring Symposium in Dallas. Along with his continued support to the SIG, Larry plans to participate in other areas of DECUS Leadership.

The DTR/4GL SIG would like to thank you, Larry, for the excellent leadership you have provided to the SIG the past three years and we wish you success in your new activities.

We have a new Newsletter Editor. Actually, we have TWO new News-

letter Editors. Don Stern and Steve Cordiviola have been named as co-

editors of the Wombat Examiner.

They will be working together to put

out the same high quality newsletter that Joe Gallagher has done in the

past. Like Joe, though, they will be expecting a little help from us.

If you will submit an article (or articles) for publication in the

Wombat Examiner, we'll publish them. We ask that they be:

- Technically accurate

- The subject be DATATRIEVE or a 4GL Product

- The article(s) may not violate DECUS commercialism policies.

If you have any questions about article publication, you can
contact me, Steve, Don or Joe Gallagher and we'll be happy to answer any questions.

A lot of really exciting things happened in Anaheim at Symposia. We are looking forward to Dallas and an even more successful and productive symposium. In the meantime, DTR/4GL SIG wishes all of you the best in the new year and we hope to see you all at Dallas in the Spring.

Elaine V. Mcwilliams Communications Committee Rep

News of the SIG
At a SIG Steering Committee meeting on December 10 during the 1985 Fall DECUS Symposium, new bylaws and operating procedures were approved. These new bylaws were also approved on December 13 by the SIG Council and will be taken to the Management Council for final approval. It is expected that these new bylaws will be approved during the January conference call meeting of the Management Council. A copy of the bylaws should appear in the March issue of the newsletter.
Also at the SIG Steering Committee meeting on December 10, Joe H. Gallagher was elected to be the next SIG Chair. Larry Jasmann, the current SIG chair, and Joe will be attending SIG Council activities together until the beginning of the Spring 1986 Symposium in Dallas at which time Joe will take over all of the responsibilities of the Chair. Joe will step down as Editor of the newsletter and take over some of the

DTR-5

duties of the Chairperson, such as the planning for the 1987 DECUS budget, immediately.
Don Stern and Steve Cordiviola will take over the newsletter activities. Don will concentrate on editorial policy and newsletter content and Steve will do the newsletter production. Of course, Bart Lederman will continue to provide the Wombat Examiner artwork.
On December 11, during the Wombat Magic Session at the 1985 Fall DECUS Symposium, Joe Gallagher was inducted into the DATATRIEVE Greybeards.
Andy Schneider (DATATRIEVE SIG Digital Counterpart) and Shirley Schneider (DMS SIG Digital Counterpart on maternity leave) are the proud parents of a baby boy. Eric William arrived October 29, 1985 weighing 10 pounds and 4 ounces. Mother and baby doing well, but those who have talked to Andy are not sure if the new daddy is going to make it.
Dan Dietterich, principle architect of VAX-DATATRIEVE and Greybeard inductee in May 1983 and Joan Hilton (long time SIG Steering Committee member and Greybeard inductee also in May 1983) were recently married.
Wayne Allen Jones (Greybeard inductee in December 1982 and the documentation specialist who started the tradition of good VAX-DATATRIEVE doc sets) is now in Digital's Terminals and Printers Engineering Program Office. His job is to try to get the software engineers to plan for and take advantage of new features in future Digital terminals.
Dave Norby (one of the founders of the DATATRIEVE SIG and Greybeard inductee in May 1982 ) has moved from G. D. Searle to Recycled Paper Products. Good luck to Dave in his new job.

Converting Decimal UICs to Octal UICs
Bert Roseberry Eighth Coast Guard (dt) 500 Camp Street New Orleans, LA 70130

( 504) 589-4934

I read with great interest Don Stern's article (Wombat Examiner Volume 7, Number 2, October 1985) that had in it the record definition of the User Authorization File. While working on my own applications, I was bothered by the fact that the member number and the group number for the UIC were decimal values rather than Octal.
I wanted something that looked like a UIC in the form [group, member] for my application. One possible route would be to add a function to DATATRIEVE that converts decimal numbers to their octal representation ( I wonder why the developers included the function FN$HEX but not FN$0CTAL? ), however, due to things such as having layered products to relink if I "customized" DATATRIEVE, I decided against this.
Delving into the deep recesses of my books on partial differential equations and other obscure subjects I came up with nothing. I decided to visit one of the many fine establishments in the French Quarter and after a few drinks, it came to me and I hastily wrote down the following procedure on a napkin.

DTR-6

Whenever you want an output for the UIC that looks like a UIC, first execute this procedure and then use the computed by variable UIC.
For example:
DTR> READY UAFV4 SHARED DTR> :!NIT UIC DTR> FOR UAFV4 PRINT USERNAME(-), UIC(-)

Alabaster [300,100]

Cities

[300,200]

Dream

[277,001]

DTR>

DEFINE PROCEDURE INIT_UIC
This is ONLY good for converting octal numbers up through 511 although there is no reason why it could not be expanded to convert even higher numbers.
Get the "ggg" part of [ggg,rnrnrn]
DECLARE Gl COMPUTED BY FN$MOD(GRP,8) . DECLARE GSUBl COMPUTED BY GRP - Gl . DECLARE G2 COMPUTED BY FN$MOD(GSUB1, 64) / 8
DECLARE GSUB2 COMPUTED BY GSUBl - (G2 * 8)
DECLARE G3 COMPUTED BY GSUB2 / 64 .
Get the "rnrnrn" part of [ggg,rnrnrn]
DECLARE Ml COMPUTED BY FN$MOD(MEM,8) . DECLARE MSUBl COMPUTED BY MEM - Ml . DECLARE M2 COMPUTED BY FN$MOD(MSUB1, 64) / 8.
DECLARE MSUB2 COMPUTED BY MSUBl - (M2 * 8)
DECLARE M3 COMPUTED BY MSUB2 / 64
Put it together in one six place number
DECLARE UT COMPUTED BY Ml + (10 * M2) + (100 * M3) + (1000 * Gl) + (10000 * G2) + (100000 * G3)
Format it properly
DECLARE UIC COMPUTED BY FORMAT(UT) USING "["999,999"]" .
END-PROCEDURE

DTR-7

Wombat Magic - Part 1 1985 Fall DECUS Symposium Disneyland Hotel, Anaheim California
Session Chair: Bert Roseberry, U.S. Coast Guard, New Orleans, LA Session Editor: Donald E. Stern, Jr., Warner Lambert, Milford, CT

As usual, the Wombat Magic session at Anaheim drew Wombat Wizards

from across the country.

There, a great deal of powerful magic was

presented. (Magic is anything which might be interesting to other

DATATRIEVE users.) The content of the session will be shared with the

readership in several parts. An effort will be made to group the magic

by functionality rather than preserve the exact chronological order of

... the session. Where appropriate, the presenter's comments are quoted
(" ").

Wayne Jones, Digital Eqipment Corp. How to Find Your Way Around the Disneyland Hotel

"I've been facinated, and finally understood after the third time being here, what the algorithm was for finding your way to your room. When I applied it today, for the first time, it didn't work because I got confused .·. but never mind."

DEFINE DOMAIN ROOMS USING ROOMS REC ON ROOMS.DAT;

DEFINE RECORD ROOMS REC USING -

01 ROOMS.

-

03 NAME PIC X(20).

03 ROOM PIC X(4).

DECLARE ROOM_NUM PIC XX COMPUTED BY FN$STR_EXTRACT(ROOM,3,2).

DECLARE TOWER NAME PIC X(6) COMPUTED BY CHOICE ROOM NUM <-34 THEN "MARINA" ROOM-NUM BT 34 AND 67 THEN "SIERRA" ROOM-NUM > 67 THEN "BONITA"
END CHOICE.

DECLARE BONITA_FINDER COMPUTED BY FN$STR_EXTRACT(ROOM,l,2).

READY ROOMS

FIND ROOMS WITH

REPORT CURRENT

PRINT NAME,

CHOICE

BONITA FINDER="57" THEN "BONITA"

ELSE

-

TOWER NAME

END CHOICE,

(FORMAT(FN$STR EXTRACT(ROOM,1,1)) USING 9 +

FORMAT(FN$STR EXTRACT(ROOM,2,1)) USING 9)

("FLOOR"/"NUMBER"), ROOM NUM

END_REPORT;

-

DTR-8

-

-

SUM 1 BY TOWER_NAME and the result is:

NAME
DON STERN BERT ROSEBERRY DTR/4GL CAMPGROUND LARRY JASMANN

MARINA BONITA BONITA BONITA

ll-Dec-1985 Page 1

ROOM NUM
8 11 11 11

FLOOR NUMBER
21 97 98 99

TOWER NAME
BONITA MARINA

TOTAL
3 1

TOTAL 4

Denis Haskin, Clark University Formatting a Social Security Number
"I'm a little ashamed, this one actually does something ... For you expert DATATRIEVE people this is going to be nothing, believe me, but I got excited enough about it when I hit on it that I literally ran around the machine room a couple of times. Basically, we have a company giving us a software package and it's written in BASIC so I don't touch it at all. Luckily, they stored all of the record definitions in the CDD, which is great because they gave us a horrible report writer which we threw back in their face and promptly doing all our own report right out of DATATRIEVE. Our users, in fact, even like it. They stored the social security number, for the students or applicants or whatever, as a longword."

03 SS NUMBER USAGE LONG.

"What you want to do is to print it out in a normal format, i.e. 003-63-8199." Tried using (FORMAT SS NUM USING XXX-XX-XXXX). What's it do? Takes out the leading zeros; 363-81-99
"No problem, use the numeric edit string with keeps in leading zeros. (FORMAT SS_NUM USING 999-99-9999).
"DATATRIEVE is smarter than you are; it's numeric and you can't have two negative signs; 000 3638199

DTR-9

"This had me stumped, literally for a week. What you do is use a FORMAT inside another FORMAT and it comes out right:"

(FORMAT (FORMAT SS NUM USING 999999999) USING XXX-XX-XXXX)

The result: 003-63-8199

Les Hulse, The Gillette Company Another Way to Format Social Security Number

"In deference to my other Massachusettes collegue from Clark College,

I'd like to point out a slightly different way of doing something. Take

that social security number and stick any edit string character you want

inside the string in double quotes.

It is literally printed in that

position and is ignored for the edit string character.

03 SS_NUM PIC 9(9) EDIT STRING 999"-"99"-"9999.

. "This even works with date string and those things and you can get some 'wierd' things by bypassing pieces of the date."
Phil Naecker, Consultant Outputting Negative Numbers for Accountants
"The problem with the EDIT STRING paren's is that it leaves the paren's very far out at the limits- of the field you are defining. So if you define a field with an edit string (Z(9)), it means that you want a field with up to nine digits and, if its negative, enclosed in paren's. Well, sometimes accountants are very picky about this and they don't want parentheses way out there where they might miss them five whole character spaces away. What they'd like to see is the parentheses immediatly around the value. Once again we go to CHOICE, which is the way 'real programmers' work in DATATRIEVE and you compute the value."
DECLARE VALUE USAGE LONG EDIT_STRING IS (Z(9)).
DECLARE STRING COMPUTED BY CHOICE VALUE GE 0 THEN VALUE
ELSE " ( " I IVALUE I I" )"
END CHOICE.

[Ed. example:

VALUE ; -50 PRINT VALUE, STRING

VALUE

STRING

50)

(-50)

DTR-10

[Ed. enhancement

DECLARE ED STRING COMPUTED BY CHOICE
VALUE GE 0 THEN VALUE
ELSE " (" 11 FN$NINT(FN$ABS(VALUE)) I I")"
END_CHOICE.

DTR> PRINT VALUE, STRING, ED_STRING

VALUE

STRING

ED STRING

50)

(-50)

( 50)

Kathy Wrobe1, DEC Telephone Support Prompting for a Sort Key (Presented by Phil Naecker)
! ! ! ! ! ! ! ! ! ! ! ! ! 3rd Prize Winner ! ! ! ! ! ! ! ! ? ! ! ! !
"This one is submitted by Kathy Wrobel who works in the Telephone Support Center. Many of you may have talked to Kathy. Kathy tells me that if she wins then I get a kiss. So, if you've seen Kathy, you know that this is a very serious bribe time and I want all the judges to give me their wish lists. Yet another computed by but this one's with sorts."
DECLARE SORT_FIELD PIC X(lO).
DECLARE SORT KEY COMPUTED BY CHOICE SORT FIELD CONT "RI" THEN RIG SORT-FIELD CONT "LO" THEN LOA

ELSE "" END CHOICE.
FOR YACHTS SORTED BY SORT_KEY PRINT RIG, LOA, PRICE
FIND (heaven forbid) YACHTS SORTED BY SORT KEY also works.
"Does anyone know what you can't do?"
FOR YACHTS MODIFY USING SORT KEY="New Name" does not work; DATATRIEVE returns the following message:
Cannot assign to a virtual field.
Bob Hoover, HLP Inc. Maintaining Dictionary Elements in a Captive Account
"My magic is about having users that you try to keep captive inside a menu and you really don't want them to get to the DATATRIEVE prompt, they're a little dangerous. What I've done is design a routine which brings up a maintenance menu. Now a maintenance menu is not too tough if you got a table and its a domain table but what do you do if you see a menu something like this.
DTR-11

Maintenance Menu
1. Edit TABLE 1 2. Edit TABLE-2 3. Edit TABLE-3 4. Edit JUNK Table
F FINISHED

There are three or four <dictionary> tables and the only way to maintain the tables is to give a user access to the table. How do get to the table with an EDIT, keeping them captive? It actually a very simple trick or piece of magic."

DECLARE OPTION PIC X.

WHILE OPTION NE "F" BEGIN

(display the menu)

OPTION= *."Option"

CHOICE

OPTION "l" THEN PRINT FN$SPAWN("DTR EDIT TABLE l") ON NL: OPTION 11211 THEN PRINT FN$SPAWN("DTR EDIT TABLE=2") ON NL:

END CHOICE END -

[Editor's note: To use this magic you must first include the FN$SPAWN function; it is not currently supplied standard with DATATRIEVE]

Phi1 Naecker, Consultant Solution to READY *."Domain"

"Everybody wants to ready a domain 'on the fly' and decide which domain

to ready 'on the fly'.

The problem is you can't 'IF something THEN

READY this ELSE READY that' but, as pointed out earlier, you can create

logicals 'on the fly' inside an IF or a CHOICE and you can ready a do-

main via a logical. So ... "

DECLARE WHICH DOMAIN PIC X(32).

WHICH DOMAIN= *."Which one on list"

CHOICE

WHICH DOMAIN CONT "A" THEN

-FN$CREATE LOG("PSEUDO","DOMAIN A")

WHICH DOMAIN CONT "YAC" THEN

-

-FN$CREATE_LOG("PSEUDO","YACHTS")

END CHOICE READY PSEUDO

DTR-12

-

-

"If your a really slick DATATRIEVEr, you'll place the smallest unique

string after the CONTAINING and, by using CONTAINING instead of EQUALS,

it will do case translation so whether you type in lower case or upper

case you'll get exactly what you want.

You'll also include a list in

the 'which domain' prompt to let users know which domains can be read-

ied."

>>>>>>>>>>>>> More magic to come in future issues >>>>>>>>>>>>>>>>>

Datatrieve Wishlist, Fall 1985 Symposia, Anaheim, Ca Bart Z. Lederman, Wishlist Coordinator

The wishlist is an informal method of making the user needs known

to the DEC DATATRIEVE developers.

Users submit their requests during

the DECUS symposia. On Thursday afternoon the items are organized and

given to the developer: in this instance we were fortunate in having

Suellen Harris, VAX-DTR developer, and Bill Opalka, DTR-11 Software

Engineer, present to cover all areas of DATATRIEVE. Readers should note

that these are informal responses, and cannot be taken as commitments by

DEC; however, in the past many suggestions have made it into the pro-

duct. Readers should also note that anything marked Editor's note is my

opinion, not DEC's nor DECUS's.

In a few cases, a solution or work-

around is presented to the problem.

1. In DTR sort order, have the hyphen ("-") take precedence over blanks and the plus sign ("+"). This would help in sorting numbers in alphanu-
meric strings.

Comment:

This has to be answered by the Sort people. There is little likelyhood we could change the default without upsetting all current users.

2. The report writer default of 60 lines/page should actually be 60 lines/page and not 61 lines/page. (DTR-11)
Comment: This is a bug fix, a patch will be available shortly in an update.

3. When the report writer prints lists, it does not keep track of the number of lines for a page break (it will complete the list before the page break). Have it page break, complete the list, then page break again with headers. (Editor's note: this item has appeared before for DTR-11).
Comment: We will look into this.

4. We MUST have more pool space regardless of how it is done (I-and-D space, mapping, re.sident libraries)!!! (Editor's note: this item has appeared many times before for DTR-11).

DTR-13

Comment:

We are aware of this problem.

We are looking into these

options. We cannot, however, discount the people who have

DTR running on machines that do not support I-and-D and Su-

pervisor mode (11/34, 11/23, 11/24, Micro-11 and PR0-350, and

other older machines.)

5. There were a number of requests for improved graphics, such as adding titles to plots, Tektronix 4014 family and other new device support, delimiter lines on graphs, and new PLOTS, which were perceived by DEC to be different aspects of a single problem and were addressed as
such.

Comment:

Datatrieve provides certain plots with certain capabilities, but it's not a graphics package per-se. It is not our goal to expand the capabilities of the current plots or the current plot language. You can use DECGraph for some of the requested options like titles on graphs. As to new devices and new plot languages other than ReGIS, we are currently investigating that possibility.

6. There were also several questions about editing on the VAX, which DEC felt could be treated as one item. They included: How about journaling for the editor a la EDT? Versions are nice, but sometimes you spend a long edit session making the last version obsolete and lose it when your process dies; and, we need the capability to select the editor used with DTR. This is important to avoid training users in multiple editors, and would gain performance.
Comment: We are currently investigating the editing capabilities in DTR and will consider this at the same time.

7. Wild cards for dictionary items. DMU provides some capability but something more like DCL would be nice. (Editor's note: this has appeared before as, for example, SHOW FA* which would show all items starting with the letters "FA", for listing selected sets of items.)

Comment:

This is still on our wish list but is not one of our highest priority items. In any case, it has to be done by the COD group, and we will take back the suggestion to them.

8. Add to the record definition an "ERROR MESSAGE" qualifier so a spe-
cific message will be output if a storage Or validation error occurs on
that field.
10 FIELD 1 PIC X QUERY HEADER IS "field" ERROR MESSAGE-IS "No hyphens".
Comment: This is an interesting new suggestion, we will add it to the wish list. (VAX. Not likely in DTR-11.)

9. I have laser printers and use DTR to create custom forms. I need to be able to specify where the report header and page number appear on the report.

DTR-14

Comment:

You can do this now by suppressing the report header and page

number and doing your own.

(Editor's note: try looking at

some of the Wombat Magic sessions transcribed in the Wombat

Examiner.)

10. I'd like LOCK WAIT to take effect on CDD node locks.

Editor's note:

During the closing session, it was suggested that this CDD option can be implemented by assigning the logical CDD$WAIT to "YES". I have found that an explanation of this is included in the CDD installation manual.

11. Add FN$SPAWN("text'") where "text" is a DCL command or command file. Yes, you can add this yourself but it is so useful it ought to be standard. (Editor's note: the ability to spawn command lines in DTR-11 on those systems that support it would be mighty useful.)

Comment:

This has been suggested before, we will take a serious look at it due to the number of requests (VAX). Functions are currently on the wish list for DTR-11.

12. Expand DROP to allow an RSE.
Comment: Interesting suggestion, will add it to the wish list (VAX). Not likely for DTR-11.

13. Can DTR/Rdb COMMIT be expanded to commit a relation name only?
Comment: Rdb doesn't support it, they must do it first. We will take this back to the Rdb people.

14. Allow COMPUTED BY fields in VIEWS.

They would be created from

fields extracted for the view. (Editor's note: without having to have

the COMPUTED_BY in the source domains.)

Comment:

Interesting; without looking at the code we can't tell how hard it is. We will look at it when we get back (VAX). Nice thing to do, but not likely in DTR-11

15. COMMAND LINE EDITING (be able to store and retrieve the previous 20 (or N) commands.

Comment:

Not very high on priority list: VMS only gives us the ability to retrieve the last command (VAX). Not likely within
DTR-11.

16. I would like a copy facility where I can copy procedures from one dictionary to another.

DTR-15

Comment:

You can do this now with DMU COPY or DATATRIEVE EXTRACT. (Editor's note: the general consensus was that this was either a training or perception problem on the part of the
user, or that the wording of the request didn't actually represent what the user intended to do.)

17. Change the default on READY from EXCLUSIVE to SHARED. Please! Better yet, make the default mode on READY an option for the system manager during installation. (Editor's note: this has appeared at least once before.)

Comment:

Fairly high on the priority list now. We can't change defaults (that would create problems for existing customers), but it may be possible as an option.

18. Would like the ability to specify STABLE sort option.

Comment:

We looked into this, and determined that it might be a performance problem. We will look again, but not at a very high priority.

19. Would like to be able to include an RSE for the first domain in a CROSS:

FOR ALL A WITH Fl = 7 CROSS B OVER Kl

instead of running off a collection. May be in a compound statement:

FIND ALL X IN A WITH Fl = 7 FOR ALL X CROSS B OVER Kl.

Comment:

Interesting, but we don't know how "doable" it is. We will look at it.

20. Would like a way to concatenate collections. (Submitted twice).
FIND A IN Dl WITH Kl = 5 FIND B IN D2 WITH K2 GT 10 (merge A and B into C)
This would use keys to retrieve A and B. It could also do OUTER JOIN and UNION operations.
Comment: Good suggestion, but probably won't be done in DTR (VAX). Nice idea, but unlikely in DTR-11 due to pool considerations.

21. Please provide a way to let DTR recognize record I/O files as sequential files. READY for modify if possible, not ready write (no deletes).

Comment:

Additional input needed from submittor.

(Editor's note:

this was intended primarily for DTR-11, and as it recognizes

most RMS files, the nature of the problem could not be deter-

mined.)

DTR-16

-

---

22. Allow FIND and SELECT in REPEAT and BEGIN-END blocks. (Editor's note: has appeared before.)

Comment: Architecturally impossible in DTR:

it would have to inter-

pret every single line, which would degrade performance.

23. Allow the option of printing headings for each record in a FOR statement not just one heading at the top. This should be an option.
Comment: This can be done now with:
FOR domain PRINT "headers", SKIP, field(-)
or a similar construction. Remember to suppress the headers on the field as shown.

24. Make EDIT more compatible with EDT. (Has appeared before in one form or another, and is placed separately here as this request is intended for DTR-11.)
Comment: This is on our wish list.

25. Allow a method to delete output files during procedures. we would like to be able to prompt the user, "This file already exists ··· do you want to delete it (or supersede it)? (Editor's note: in some cases you can do this by re-issuing the DEFINE DOMAIN command with the appropriate qualifier to supersede, but you cannot delete a file from within DTR.)
Comment: This is a problem for DTR-11 specifically on RSTS/E. We will give this consideration in any future release.

26. Allow a method to see non-printable characters when checking files. Operators confuse the STORE and MODIFY defaults. They will sometimes enter a tab when they want a field left blank on a STORE the way they have to on a modify. This results in a TAB being stored in the file. I would like to see this confusion end.

comment:

I don't think there is anything we can do to make non-printing characters visible. We will look into preventing these characters from being stored. During the session, it was suggested that a VALID IF clause could be added to the record definition making TAB -and other unwanted characters invalid (field VALID_IF NOT CONTAINING "<TAB>", etc.).

27. Why doesn't the SUM command use the default edit-string specified in the record definitions for printing the amounts? It's a real hassle having to specify an edit-string for each field used in the SUM report.
The rounding used is not useful.

Comment:

DTR scales up the edit-string to prevent overflows: it can't tell ahead of time if the summed data will fit into the default edit string.

DTR-17

28. "SUGGESTION": I suggest a separate session or BOF meeting to inform users about upcoming changes, new features, problems, or whatever in new/upcoming releases of COD and DTR so that we don't have to sit through INTROS, Tutorials, or other basic information sessions since this information tends to be supplied at the end of these types of sessions.
Comment: Nice idea. We will consider this for the next symposia.

29. Would like to use the DTR-11 call interface without having DECNet. Comment: This is on our wish list, and we are looking into this.

30. Put $$MSG and related symbols needed for the call interface in a DATATRIEVE symbol library.
Comment: This is probably a user error due to not having DECNet on the system: DECNet is currently required for remote DTR-11.

31. Please add support of accessing lists by indexing (i.e., indexing into lists). we have lists that are 1000 long, and find the retrieval time for a specific record in the list too long since lists are accesses sequentially.

Comment:

It's been suggested before, and is very difficult to do.

There have been magic sessions published in the Wombat

Examiner to do things like this.

If you have a list this

long, maybe you need to normalize your data. (Editor's note:

the reaction of the audience supported the recommendation

that there are better ways ·to handle data than lists this

long.)

32. Is it possible to add "conditional ready" to DTR? (Be able to ready domains inside an IF-THEN-ELSE statement?)

Comment:

Not likely. Some magic to ready using a logical name giving some dynamic capability has been published. (Editor's note: I believe another example is due soon from the Anaheim Wombat
Magic session.)

33. Provide "official" DTR analysis of ACCOUNTING.DAT: this is a very useful tool for system management.
Comment: We are working with VMS to provide a solution. The current format of this file is not readable by DTR.

34. We would like a better interface with TOMS including request library.
Comment: There are no plans to enhance DTR in the forms area.

DTR-18

35. How about DTR on the Rainbow?

Comment:

Not under development at this time. We will take the suggestion back to the product managers.

36. We would like the ability to cross a domain over multiple domains OVER 2 or more different fields. Currently we are allowed only one OVER clause.

Comment:

Architecturally difficult to do, and provides users with more ways to get in trouble. (Editor's note: I have solved similar problems by using a VIEW to tie two of the domains together, which may be done with more then one field. The third domain can CROSS over the view.)

37. I would like the ability to form a summarized collection, which could then be sorted and printed with report writer. I want the ability to produce a summary on one field, but report sorted on the totaled fields. For example: summarize salesman detail sales records by sales amount, but then report the summary sorted in descending order of total sales to show the salesman with the most sales first. (Editor's note: there was a similar suggestion on the last wish list.)

Comment:

We will add this to the wish list. As a work around, try writing the sums into a temporary file, then report it sorted in the desired order.

38. would like to perform an Outer Join. (Editor's note: has appeared many times before.)
Comment: This is probably not something we are going to do in DTR.

39. Provide "if member", "if owner", "if empty" boolean expressions for DBMS.
Comment: Will add it to the list, not very high priority.

40. Need a way to suppress either the first or last (or both) form feeds in report writer.
Comment: Has suggested before, is on the wish list, not very high priority.

DTR-19

Editor's Note: This is a copy of the cover from the original WOMBAT EXAMINER, Vol. 1, No. 1, July 1979. It is reprinted here as a bit of nostalgia.

-@qT1,-H-~:E:fi.\:W\../O/~M2. 1Bj1A!"i.(41,f'S7l~:~'"f'f"i"?=l.!".· cA

@-----·--··~·-·
_D:~TPR~.\/~2~-W~:ill~~les

. . . '· .. r~ .'ilr~ ~:;~~~r;· f· ~ ~ · - '" D~ · ~

--~-~:"~'j e~ ~ .~ -

·· ·

l·

- :,, 1,

...

@c~lrb~UrruDrl0iu~l£1~j Lmr n~//J/;J\ fW\\flJ@@

00 fE~[E& ~JE il J

·~~~~~~~~~~~~~AGEIS

Wombat Attac!ts
Programmer
pa50 87
I~IN Tax Error-
IRS Confused Pr· 40
CTR Flushes Input ,,aee 42
Flood in New Orleans
par· 49
Yacht l1lysteriously

s:;G:~::
111:a:::ss
a::s~2
s::aGCS
HllS5!1!1ll
SB!llll::Sllll
SIH11SUS
s1n1111ira11
USll!!!I
snaas

1
'il!lt 1S!lli:SB1 llllll1'11S!l51
u:=sa~ncu
ll:SlS:t!Sl::S!S:Ol!:t
lSllllGlllll!l'C":Sll!l1
1111~a::a11aaoa:1
S:S!:11ll C!l!SllSI
lll!l!l!l!l!!ll:SS:S!lf S:SISllDllG!lllCB:Sf s1:::;ii111s111111s1
SllH!lS!l\!!IG:S!l!lt
:ncasausa::ss
H!ll5GSlllHIH llll:SllllUSHll I asa!ISSll!ICllllllllll I !l:SllGllaBOlla&SSllSll:Sll!lll

Erased

AA

pare 127 AAAA

AAAAAA

Programmer Kills A...AAAA

Sex-Crazed Wombat ::::::::A

~$

AA

A AAI

A

AAAAAAA

AAAAAAAAlil

AA:::::::::::AAAAAAAAA~:::::::::

par· 931 AAAAAAAAAAAA A AAA"'A

AAAAAAAAAAAAAAAAAAAAAAAAI

---------'

AAAAA.,.AA<><'·AAAAA

AAAAAAAAAAAAAAAAAAAAI

AAAAAAAAAAA.:.<I
~-~~~~~- E:~

·ooim~i

AAAAAAl-o><:lAAA
"·I'"''""""" C't'J79. o&cus th· ........, ..... , .......11.... lftl... ......,. " ' ..... . . . , _.... 11... .... _ ,.. " · .......... , ..................
··1" ,.,US·th"' DtCUS .,,.i..,11,,.u- lh· MICltPI .-..11..

99 BB 8 SB
888888
u a a

AAA AAA

<IAHAI

AA AAA

Al>AAI

AAA<IAA . . AAAI

AAA·u·AA""'""'

AAAAAPAAAA-'>AI

AAAAAAAAAAAAI

IW!'t·-.t_..... ol 11-. ........,., ...... 11-1·I01e, DI CVS.
o..,.... r.,....,..._ r."''"'"'"'·- ,.,... ,.... -.............._
- .,.,.,_,,........., lur .Jlitel·t 01 inlt· ...<tteufl ............
'"the rhOC'u·nnl"ll.

DTR-20

-

-

[Q]
DECUS

l

Chairman Robert A. Shive, Jr. Millsaps College Jackson, MS

EDUSIG
PSS Coordinator VAX Systems SIG Liaison Donald C. Fuhr Tuskegee Institute Tuskegee Institute, AL

Symposium Coordinator Sue Bates Northwestern Michigan College Traverse City, MI

Administrative Applications Coordinator Dave Cothrun Taft College Taft, CA

Communications Committee Representative Robert W. Mccarley Millsaps College Jackson, MS

Courseware Coordinator Mary Jae Reed Off Comp Based Instruction Newark, DE

Newsletter Editor Fred Bell Taft College Taft, CA

DEC Counterpart Gary Finerty Digital Equipment Corporation Marlboro, MA

EDlJ..i

- - Cl r-

-

- - DECUS

I

I

I

I

I

I

GRAPHICS

I

I

I

I
I

r--- - .. -·

I
I
I
LI _

-

I

I
I

-

-I

I

---I Ill

Chairman William Kramer University of Delaware Newark, DE
Symposium Coordinator Bijoy Misra Smithsonian Institution Cambridge, MA
Newsletter Editor Michael P. Anton Houston, TX
Session Note Editor Mike McPherson Michigan State University East Lansing, MI
Standards Coordinator Jim Flatten Ames Lab Ames, IA

GRAPHICS
Library Committee James M. Turner Saber Technology San Jose, CA
DEC Counterpart Susan Usilton Digital Equipment Corporation Nashua, NH
Information Officer Mike York Boeing Computer Services Seattle, WA
Human Interface Working Group Coordinator Tom Owens Graphics Research Center Baltimore, MD
Engineering Working Group Coordinator Dana Smith Wilmington, DE

GRA-i

"'' '

,

, ,

Cl
DECUS
,,,

---------- - - ;....

·-

-

-

HMS
-- -

-

--·

Chairman VAX SIG Liaison Thomas J. Provost MIT/LNS Bates Linac Facility Middletown, MA

HMS
Pre-Symposium Seminar Coordinator Mike Allen Lawrence Livermore National Labs Livermore, CA

Product Planning Coordinator George Hamma Synergistic Technology Cupertino, CA

TOEM (Chips% Boards) Jack J. Peterson Horizon Data Systems Richmond, VA

Symposium Seminar Coordinator Mike Allen Lawrence Livermore National Labs Livermore, CA

HHK(Hardware Hints& Kinks) Wayne Kesling Monsanto Research Corp. Miamisburg, OH

Communications Coordinator John G. Hayes Information Systems - S. Central Bell Birmingham, AL

UNIBUS Hardware Ron Bogue LIV Aerospace & Defense Co. Dallas, TX

Publications Coordinator (Editor) Bill K. Walker Monsanto Research Corp. Miamisburg, OH

Performance Measurement Coordinator William Wallace 600 W. Washington St Peoria, IL

Session Notes DAARC SIG Liaison
Bill Tippie Kinetic Systems Corp. Lockport, IL
Standards Coordinator CAMAC Working Group Coordinator
Peter Clout Los Alamos National Lab Los Alamos, NM
LUG Coordinator Gregg Giesler Los Alamos Science Lab Los Alamos, NM

CAMAC Coordinator Peter Clout Los Alamos National Lab Los Alamos, NM
CSS Coordinator Pratap Gohel E.I. Dupont Ingleside, TX
Networks SIG Liaison Sandra Traylor Target Systems Yorba Linda, CA

HMS-i

VAX SIG Liaison Dave Schmidt 5100 Centre Avenue Pittsburgh, PA
DAARC SIG Liaison Bill Tippie Kinetic Systems Corp. Lockport, IL
UNISIG SIG Liaison Jim Livingston 1 Results Way Cupertino, CA
SITE SIG Liaison Emily Kitchen AH. Robbins Co. Richmond, VA
RT-11 SIG Liaison Gary Sallee Sallee Software Consulting Yorba Linda, CA
RSX SIG Liaison Hans Jung Associated Press New York, NY
Members-At-Large Mike Rembis American Dade Costa Mesa, CA
Hans Dahlke Richland, WA
Jim Cutler EDS Tower, 26533 Evergreen Southfield, MI

DEC Counterparts Terminals Nina Abramson Digital Equipment Corporation Maynard, MA
TOEM (Chips & Boards) Art Bigler Digital Equipment Corporation Marlboro, MA
Diagnostic George D. Cooke Digital Equipment Corporation Maynard, MA
Storage Marilyn Fedele Digital Equipment Corporation Maynard, MA
MSD (Micro Systems Developmen~ Roy Rodgers Digital Equipment Corporation Maynard, MA
Printer Products Frank Orlando Digital Equipment Corporation Maynard, MA
DECUS Europe Liaison Hans Zoller

HMS-ii
-

THE
DEVlAS
LETTER
The DeVIAS Letter Issue 35 February 1986
Curley's Corner: News from the Chairman Letter from the Editor

IAS SIG Steering Committee

Chairman Bob Curley Division of Medical Physics University of Pennsylvania Philadelphia, PA
WHIMS Commissioner Kathleen Anderson Eaton Information Management Systems Division Hampton, VA
Library Coordinator Bob Schuldt INCO Inc. McLean, VA
RSX Liaison Ray French Boeing Computer Services Seattle, WA
Member-at-Large Doug Reno Abbott Laboratories North Chicago, IL
DEC Counterpart Mike Reilly Digital Equipment Corp. Maynard, MA

Symposium Coordinator
Skip Stanfield USAF Washington, DC

Librarian Mike Robitaille
Grumman - CTEC, Inc. McLean, VA

DeVIAS Letter Editor

·

John Roman

McDonnell Douglas - Dept. N436

600 McDonnell Blvd.

Hazelwood, MO 63042

Member-at-Large
Kerry Wyckoff LDS Church Salt Lake City, UT

DEC Counterpart 'I'im Leisman Digital Equipment Corp. Stow, MA

DEC Counterpart
Bob Mack Digital Equipment Corp. Landover, MD

Division of Medical Physics Department of Radiation Therapy University of Pennsylvania Room 410 - 133 South 36th Street Philadelphia, Pennsylvania 19104-3246 29 December 1985
Dear IAS Enthusiast,
Another Symposium is finished. This one was different and I can not verbalize the strangeness. Other people mentioned it too. I would like to hear your opinion, you who where there. Overall it was good for IAS and good for DECUS in general.
The IAS attendance was about the same as New Orleans, but quieter. Those who came didn't talk much. The Q~ <Technical Forum) was pretty dull, it seems as if most of our questions have been answered already. I read some of my SPRs and put everyone to sleep. Michael Reilly and Alison Nylander were amazing (as we have come to expect) with the breadth and depth of their knowledge of IAS. A new member of the panel in the Technical Forum was Ed Milhomme. He is the person at DEC Telephone Support you are most likely to talk to. His discussion of telephone support, and especially the differences in his perception from that of Norm Booth (IAS Product Manager), was helpful. It was a nice opportunity to meet the familiar voice on the other end of the telephone. I am glad that you could come Ed, I appreciated your presence.
The pre-symposium seminar on VAX MACRO for MACR0-11 programmers was successful. Mike Reilly and Kerry Wyckoff CLDS Church, Salt Lake City) were the principal lecturers and I gave a small introduction. It was not as popular as I had expected, but we got good reviews. Thanks to the lecturers and the attendees. Since I feel the "MACR0-11" connection hampered our attendance, we are offering a seminar in Dallas called "Introduction to VAX. MACRO" being taught by Kerry Wyckoff and John Roman (our editor, McDonnell-Douglas, St. Louis). And we are again offering our popular seminar of previous symposia, "Introduction to MACR0-11". This time it will be taught by Bob Agnew <Beaver College, Glenside, PA> and Mike Garcia <Digital Equipment, Maynard). Bob has taken part in a previous seminar and Mike has given some great presentations at previous symposia.
The last of our offerings for Dallas will be an introduction to the C language. Mike Reilly and Alison Nylander will teach it. It is a venture into a new area for the SIG, but it is done with the permission of the Languages and Tools SIG, who provide the focus for C in DECUS.
There were several good technical sessions during the Symposium. We will try to get some of that information into the newsletter. There are audio tapes available through DECUS of most of the IAS sessions, but I haven't tried them to see how useful they are. Some comments from someone who has would be appreciated.
IAS-1

i
We have a new 'counterpart' for the SIG. This is a position held by someone from Digital who is interested in helping the SIG and is invited by the SIG to that position. We have had one counterpart since the formation of the SIG, Tim Leisman, who was the IAS Product Manager at the time. Tim has held that position since his· appointment and will continue. The new position is a result of some internal changes within Digital and the amazing amount of support and help that we've received from Bob Mack of the Government Systems Group. I have invited Bob to become an 'official' Counterpart of the IAS SIG, and both he and his management have just agreed. Welcome Bob!
We also have two new people on the steering committee, Kerry Wyckoff and Doug Reno (Abbott Laboratories, North Chicago, IL>. Both of these men have extensive experience in IAS, RSX and VMS and will contribute some of their effort to administering the SIG. Thank you both for responding favorably to my request that you join in.
An interesting gentleman from Digital, Tim Moffitt, came with Bob Mack. We got to swapping tales of the 'old days' and morsels of PDP-11 trivia. One thing led to another and I think that he's going to do a column for the newsletter on PDP-11 Trivia. You may contribute. An example from Tim: "DEC made one disk controller that did 18 bit data transfers on the Unibus. What was it, where was it used, and what lines were used to transmit the two high-order data bits?" "The answer is the RKll-D controller for the RK05 disk drives. The 18·-bi t version was used in conjunction with the PDP-11/10 to interface "high speed" disk drives to a variant of the PDP-15 known as the Unichannel-15. There were only a few hundred sold, but they worked well. The high order data bits used the PA and PB lines on the Unibus." "Some people will consider this a trick question as many RHll's do essentially the same thing, but RHll's are Massbus controllers, not disk controllers."
The DECUS Management Council has appointed a task force on "Commercialism". I volunteered and was appointed the SIG Council representative. I've heard many of you say, "This kind of thing shouldn't be in the Exhibit Area!" and "They shouldn't permit that in the newsletters!" I have too. Now is the time to generalize and write a policy. Share your ideas with me. It is harder to do than I thought. You needn't be formal, just put pencil to paper. For example, "What do you think of the articles in the PC SIG Newsletter that had the prices 'whited out'?" "Should other companies be invited to the Exhibit Area?" "Did you like the article in the DAARC Newsletter for January that looked very much like an advertisement?"
Do you like the unified format of the newsletters? Or did you like the separate issues better? A post card: ."The new format is better/worse" to me at P.O. Box 322, Flourtown, PA 19031 would be helpful. Thanks.
When all is said about the Symposium, and thanks offered to the
IAS-2

speakers who spent the time preparing their session to share their experience, and I get through talking about the pre-symposium seminars, it is very important to remember the invisible job of Symposium Coordinator for the SIG. For us that is Skip Stanfield (USAF, Washington). He collects all the papers that are spontaneously submitted in response to the Call for Participation. Then he tries to cajole people to give sessions that he thinks would be valuable. Then the SIG business sessions. Much of this work is done in the background at the symposia - getting ready for the next one while everyone is engrossed in this one! Then there is a lot of work on DCS ( the DECUS e-mail system) to make sure the details are completed - who needs an overhead projector, who needs a slide projector, how many seats and who's going to chair the session, etc. Then, there are several days in Marlboro, Massachusetts when the actual scheduling takes place with the Symposia Representatives of the other SIGs. The actual rooms and time slots are assigned in a process that I just don't understand! Skip has done this job quietly and well and is doing it again for Dallas - Thanks, Skip - it wouldn't happen for IAS without you. Thanks to each of you who have participated in the IAS SIG activities for the past year. May you continue to do so, Happy New Year, Bob Curley
IAS-3

Letter from the Editor

I received exactly zero <as in no> entries for the "Find the Hidden Feature" contest. This was quite disapointing. Is there no one out there playing with IAS? I am sure Mike and Alison
would be glad to keep the contest open longer if anyone has any entries.

In the next couple of months Decus will be holding elections for

the Board of Directors. For those of you unfamiliar with the

Decus hierarchy, the Board is the group which sets policy for the

society. If you are unhappy (or happy) with the way the society is being run, this is your chance to put in your say. In other

·

words, please vote.

Earlier this year we arranged to get some Cross pens made with an IAS logo, which would be given to contributors to the DeVIAS Letter. These are chrome pens with an IAS logo (reminiscent of the circular pin with red border) on the clip. The pens were made and shipped to Decus Central by Cross. Decus Central
shipped them UPS to Bob Curley's PO box. Since UPS and the USPS do not talk, the pens have been lost in shipment. We hope that they will be located by the time that you read this, so that we
can honor those who contribute to the DeVIAS Letter.

Speaking of contributions, you will have noticed that this issue
and the previous are slim. The newsletter only has material if you contribute. So please jot down your comments, feelings, or anything that moves you and send them to me at:

John Roman McDonnell Douglas Corp - Dept. N436
600 McDonnell Blvd. Hazelwood, Missouri 63042

IAS-4

"LEVERAGE"

[Q]

DECUS

{J
LANGUAGES AND TOOLS SIG

LANGUAGES & TOOLS

Chairperson Katherine Hornback Lear Siegler, Inc. Grand Rapids, Ml
Vice Chairperson Barbara Chase Hughes Aircraft Company Los Angeles, CA
Symposium Coordinator J.R. Westmoreland Utah Power and Light Midvale, UT
Asst Symp. Coordinator-Campground/Suite
Melody Westmoreland Midvale, UT
Session Chair Coordinator Earl S. Cory Eaton Information Management Westlake Village, CA
Newsletter Editor Alan L Folsom, Jr. Fischer & Porter Co. Warminster, PA
Session Note Editor Mark Katz GTE Government Systems Needham, MA
Tape Librarian Dave Martin Hughes Aircraft Co. Los Angeles, CA

Standards Coordinator FORTRAN Coordinator
JayW. Wiley Bechtel Power Corp. Norwalk, CA
DEC Counterpart PDP-11 Joe Mulvey Digital Equipment Corp. Nashua, NH
VAX William Segal Digital Equipment Corp. Nashua, NH
UNIX Coordinator Rod Creason, Jr. Sacramento, CA
MODULA II Coordinator Jack R Davis Philips Home Interactive Systems Knoxville, TN .
Ada Coordinator Bob Gable Lear Siegler Grand Rapids, Ml
Wishlist Coordinator Alan Rizzuto EMC Controls, Inc. Cockeysville, MD
PASCAL Coordinator Derek R. Smith Wilmington, DE

GAPSIG Standards Coordinator Jim Flatten Ames Lab Ames, IA

RSTS Coordinator George Stuart Ogden - Weber/AVG Ogden, UT

l.&T-i

Methods Coordinator PSS Committee Rep.
PatVanMunn Measurex, Inc. Cupertino, CA
TeX Coordinator Large System Liaison Store Coordinator
Sam Whidden American Mathematical Society Providenc, R. I.
CMS/MMS Coordinator Edgar Whipple Lawrence Berkeley Lab. Berkeley, CA
RT-11 Coordinator Michelle C. Wong Sacramento, CA
OMS Liaison Keith Hare (Home) Granville, OH
Al SIG Liaison Don Rosenthal Space Telescope Science Inst. Baltimore, MD

CL SIG Liaison Jim Wilson Pfizer Inc. Terre Haute, IN
VAX/VMS Liaison Louise A Wholey Measurex Corp. Cupertino, CA
DEC Personnel Coordinator Howard Holcombe Medford, NJ
EX-Chairman James W. Livingston, Jr. Measurex Corp. Cupertino, CA
Member-At-Large Shava Nerad Telematic Systems Cambridge, MA
RSX Liaison Committee Anthony E. Scandora, Jr. Argonne National Laboratory Argonne, IL

l.&T-ii

-

~ ----

~
DECUS
DIGITAL EQUIPMENT COMPUTER USERS SOCIETY
-
The Newsletter of the Large Systems SIG

SIG Chairperson Leslie Maltz Stevens Institute of Tech. Hoboken, NJ

LARGE SYSTEMS
Networks Coordinator Richard Janick Abbott Laboratories Abbott Park, IL

Symposium Coordinator Robert C. McQueen Stevens Institute of Technology Hoboken, NJ

Systems Software Coordinator Betsy Ramsey American Mathematical Society Providence, RI

Newsletter Editor Michael Joy First Church of Christ, Scientist Boston, MA

Special Projects Coordinator Osman Ahmad Assoc., of American Railroads Chicago, IL

Menu Coordinator Charles R.T. Bacon National Institutes of Health Bethesda, MD

Special Projects Coordinator F. Berkeley Shands Emerson Electric Co. St. Louis, MO

Hardware Coordinator Clive Dawson MCC Austin, TX
Languages Coordinator David Edwards DPEX, Inc. Fremont, CA
TOPS-20 Coordinator Pete Gavin University of Texas at Austin Austin, TX

DEC Counterparts Dave Braithwaite Digital Equipment Corporation Marlboro, MA
Jack Buckley Digital Equipment Corporation Marlboro, MA
Reed Powell Digital Equipment Corporation Marlboro, MA

LS-i

Chairperson's Article
Now that the Fall Symposium is a thing of the past, it would probably be worthwhile to share some observations with those of you who could/did not attend. Some of these observations are what could be called readings of the pulse of those who attended, and others are specific items that might be of importance to all.
It has been two and a half years since that fateful day when we all heard that Jupiter was not to be. That means that we are roughly halfway through the promised five years of active development for our thirty-six bit systems. During the past 2 1/2 years we have all had time to figure out what course we are planning to take as our systems age. For some SIG members, the decision has been to keep their systems running as long as electrons flow. Others have started to acquire VAX systems as suggested by DEC. Still others have chosen to integrate, but not with DEC products. In any case, the emotional component of the decision seems to be mellowing. Fewer emotionally-charged comments are being made at symposia, although the needs of each segment of the community still need to be heard. We think our SIG continues to be a viable forum for each such segment, and our activities will be oriented toward meeting the needs of each group.
We will not give up supporting traditional activities for those sites who have chosen to stay with their 10s and 20s. There is still much that this group will need in the way of features in final releases, as well as commitment and delivery of adequate levels of hardware and software support. Similarly, we will support activities and services to meet the needs of those SIG members who have opted to introduce VAX systems, particularly oriented around the high end products. We know that a substantial number of you have chosen this path, and have expressed common needs based on our high end environment. Beginning with the Spring Symposium in Dallas we will begin to attempt to address some of these issues.
To summarize some of the comments made by Rich Whitman at the Product Panel session, I'll list some of the specific topics.
LCG Support:
There has been no slippage of LCG trained engineers for hardware support. LCG engineers are being trained on 8600's. Multi-year contracts for support are being written.
Training courses for customers are continuing. There will be 6-7 courses per quarter.
KL to 8600 Trade-in Offer: Only LCG customers are eligible. Trade-in is for a KL model B cpu with 512 KW and an RP06. Allowance is $90,000 credit on an 8600, with return of the KL six months after delivery of the 8600. 1 KL cpu trade-in per 8600 cpu. VMS, VAX FORTRAN, and VAX COBOL licenses are included.
LS-1

1
Unbundled TOPS Licenses: TOPS licenses will be available for sites with at least one existing license. This will enable existing sites to run TOPS on non-DEC processors. No support will be provided on non-DEC systems. Sources are included. Non-educational license costs are $80,000 for the first license; $40,000 thereafter. Educational license costs are $40,000 for each license. Based on the results of our Menu (published previously), the following directions for VMS were noted as needs of our community:
Operator capabilities Tape handling improvements Security oriented features
Commercial requirements D.o.D. needs Data integrity Journaling Checkpointing On a fun note, our VAXBUSTER shirts were a terrific hit in Anaheim. Every single shirt was sold, with most sold the first day. We expect to have a special item in the DECOS Store in Dallas, so plan to get yours. See you after the snows. -----Leslie Maltz
L~2

From the Editor
Well, I hope everyone enjoyed Anaheim. I know I loved everything except the cold weather. I didn't plan on temperatures in the 40s and 50s for sunny Southern California. I'm sure that Dallas will be warmer! Speaking of Dallas, please give us your menu items as soon as possible so we'll have a full list before the Dallas symposium. Be sure to read the article entitled "YOUR INPUT" which appears in this same newsletter.
Back to Anaheim for a minute. During the Question and Answer period at the opening Large Systems session, the one topic which came up more than any other was the DECsysteml0/20 field service support level. There were numerous comments about problems not fixed for days, of parts shortages, and the like. If there is a general problem, or even a few isolated cases, they should be addressed. One way that can be done is by sending your comments to the newsletter for publishing, or just a problem tally. If you have recently had a field service problem, jot down what happened and send us your report. We will compile a list of problems and let the SIG members know the results via the newsletter. The list will also be shared with DEC so that can know the extent of the problems and directly address the issues. If there are concerns other than field service problems let us about them too. Address your letters to the editor at the address listed below.
Recently, we received a copy of the European 10/20 SIG menu items for 1985. It seemed like it might be interesting to compare the top ten items from Europe compared to the U.S. menu. Here are the results: European Menu
1. Create a GALAXY-like environment for VMS 2. Archiving facility for VMS 3. Continue TOPS enhancements 4. Include temporary NI for the KL/8600 trade-in offer 5. Extend the KL/8600 trade-in offer to other parts of the system 6. Offer VMS courses for those with TOPS backgrounds 7. Extend the KL/8600 trade-in offer beyond July 1986 8. License TOPS for third party hardware at a reasonable price 9. Shorten the delivery time for TOPS and VMS manuals 10. Reduce cost of ownership on multi-system sites--especially soft-
ware U.S. ~~l. Create a GALAXY-like environment for VMS
2. Support a foreign tape utility for VMS 3. Create a COMND JSYS equivalent as part of VMS 4. Provide time stamps in VMS batch log files 5. Improve tape/disk management in VMS 6. When TOPS-20 development ends, provide~.all sources to customers 7. Implement COMPIL-class commands in VMS 8. Extend the KL/8600 trade-in offer beyond July 1986 9. Implement a TOPS-20-like CLI for VMS 10. Continue providing TOPS training courses. Note that the first item in both lists was the same. Most of the items in the European list appeared in the top 20 or so items in the U.S. list showing a relatively high correspondence between the two menus.
LS-3

l
I
0on't forget to send in your questions to Doctor TOPS! The good Doctor will soon be out of questions to respond to so write soon. Here's where to address any questions or comments:
Michael D. Joy, Editor The First Church of Christ, Scientist Christian Science Center A41 Boston, MA 02115

Your Input

DEC Needs User Input on TOPS Enhancements

We are now two and a half years into the final five year development period for TOPS-10/20. DEC has just released a major new version of both operating systems: TOPS-10 V7.03 and TOPS-20 V6.1. They are now in the planning stage for the next releases. Given the traditional
life cycle for new versions, it is a fair guess that the next release of TOPS-10 and TOPS-20 will also be the last.

DEC is now planning what features they intend to implement in the next release of TOPS-10 and TOPS-20, so the time is right for us to make our "wish lists" known. This may be our last chance to get all those little features we've been thinking about over the years into TOPS.

The Large Systems menu (wish list) is usually compiled from suggestions users make at the fall and spring DECUS symposia. We know that many of you cannot attend the symposia. Because it is so important to get our requests concerning the next TOPS releases to DEC, we'd like to start collecting menu items early this year, and ask everyone, including those who cannot attend the spring symposium, to participate.

If you have enhancements or fixes you'd like to see in the next release of TOPS-10 or TOPS-20, write or call Betsy Ramsey at

American Mathematic~! Society P.O. Box 6248 Providence, RI 02940 401-272-9500 x295

She will record your suggestions, and pass them on to Chuck Bacon, who is the Large Systems SIG Menu Coordinator. Chuck will be putting together the full menu. With your help, we hope to be able to mail the menu to all members of the Large Systems SIG for voting very soon after the spring DECUS.

DEC takes a strong interest in our menu, and responds directly to the top items. Please make your needs known.

-----Betsy Ramsey

LS-4

Alternative Strategies

NEWS RELEASE
FIRST CUSTOMER INSTALLATION OF SC-30M* November 18, 1985
SAN FRANCISCO, CA--Systems Concepts, Inc. today announced the first customer installation of its SC-30M computer system at the LOTS Computer Facility, Stanford University.

The SC-30M is a high-performance 36-bit computer system which is user-program-compatible with Digital F.quipment Corp. DECsystem-10** and DECSYSTEM-20** products. Using software enhancements from Systems Concepts, the SC-30M can run the TOPS-10** and TOPS-20** operating systems with full user-mode compatibility.

The LOTS facility is Stanford's academic computer center, providing the computer support for instruction and for unsponsored research. Ralph E. Gorin, Di rector of LOTS1r saidr "The SC-30M is an important augmentation to our interactive capacity.·
In its current configuration, the SC-30M system at LOTS uses an IBM*** 3380 disk storage module, with its associated control unit, for on-line data storage, and an IBM magnetic tape subsystem for backup and interchange purposes. To communicate with user terminals, the SC-30M employs the widely-used TCP/IP protocol on an Ethernet**** network. According to Peter R. Samson, Director of Marketing for Systems Concepts, "This installation demonstrates some of the major strengths of the SC-30M system: standard interfaces, higher performance, and program compatibility~·

* SC-30M is a trademark of Systems Concepts, Inc.

** DECsystem-lOr DECSYSTEM-20, TOPS-lOr and TOPS-20 are

trademarks of Digital F.quipment Corp.

*** IBM is a trademark of International Business Machines

Corp.

**** Ethernet is a trademark of Xerox Corp.

LS-5

Doctor TOPS
Dear Dr. Tops: I would like to allow selected users to change their UIC
codes so that they can better share files. However, I don't want any bimbo to have SETUIC privs. Can you PLEASE help me?
Positive Paronoia
Dear PP, I highly recomend that you investigate ACL's for your VAX. If you
don't have 4.x, get it. Changing the UIC code on the VAX can lead to many headaches, mainly because the VMS developers never thought ahead when they wrote the code. Among other things this will break is PDP-11 compatibility mode (The VAX AME product, VAXRSXll}. I will provide this super hack to you with MANY WORDS OF WARNING; Under 4.0 of VMS, this will CRASH YOUR VAX.
I disown this hack
Dr. Tops
! Command file for UGROUP.EXE which changes the left half of the UIC
USER [abcd,efgh]
$ current_uic = f$user(} $ if Pl .eqs. "" then inquire Pl "New UIC or GROUP?" $ if Pl .eqs. "" then Pl = current_uic $ request_uic = Pl $ run sys:ugroup $ P2 = f$user (} $ Pl = f$directory(} $ write sys$output ·"#6#3", Pl, P2 $ write sys$output "#6#4", Pl, P2
$ comp setuic.mar,ugroup.for $ link/notrace_back ugroup,setuic,sys:sys.stb $ copy ugroup.exe sys$sysroot: [hacks] $ wv sys:ugroup.exe $ r sys:install
sys:ugroup/replace $! sys:ugroup/priv=(cmkrnl,bypass} $ purge sys: $ purge $ exit
LS-6

program ugroup

c

c

this program changes the left half of the UIC word for each user

c

c

a list of valid left half words (16 bits, for V4.0) is kept

c

in sys:ugroup.dat by right half of the uic

c

c

format of the file ·····

c

c

UIC_Right_half ,list of possible left halves, with commas

c

c

000020,000020,000001,000100

c

c

Note the 16 bit OCTAL format!!!!!

c

c

c

USER [ABCD,EFGH]

c

USER name

c

c

c

symbols used:

c

current_uic - UIC before changes

c

request_uic - UIC after changes or group ID

c

* Note: only left half changes

c

implicit integer (a-z)

character*32 myuic,newuic

character*32 group_names(35),Group_uic(35)

include '($SSDEF)'

c

data group_names/

1 'Other' ,'Other','Other' ,'Other,'Other',

1 'Other','Other','Other','Other,'Other',

1 'Other','Other','Other','Other,'Other',

1 'Other','Other','Other','Other,'Other',

1 'Other','Other','Other' ,'Other,'Other',

1 'Other','Other','Other','Other,'Other',

1 'Other' ,'Other' ,'Other' ,'Other,'Other'/

c

data group_uic/

1 I [1,4]·1 r I [20,100] Ir I [100,100] Ir I [101,100] Ir I [102,100] Ir

2 I [10 3 r 10 0] I r I [104r10 0] I r I [105r10 0] I f I [106 r 10 0] I r I [107 r 10 0] I r

3 I [110,100] Ir I [111,100] Ir I [112,100] Ir I [113,100] Ir I [114,100] Ir

4 I [115,100] Ir I [116,100] Ir I [117,100] Ir I [120,100] Ir I [121,100] Ir

5 I [122,100] Ir I [123,100] Ir I [124,100] Ir I [125,100] Ir I [377,100] Ir

6 I [126,100] Ir I [127,100] Ir I [130,100] Ir I [131,100] Ir I [132,100] Ir

7 I [133,100] I, I [134,100] I, I [135,100] I, I [136,100] I, I [137 ,100] I I

c

c

open the data file

c

open(unit=l,name='sys:ugroup.dat',readonly,shared,

1 status=' old' ,err=900)

c

c

get my current UIC

c

iret=lib$get_symbol('current_uic' ,myuic)

LS-7

if (iret.ne.ss$_normal)goto 800

t
c

c

get requested UIC

c

iret=lib$get_symbol('request_uic',newuic)

if (iret.ne.ss$_normal)goto 800

c

c

check for group name before [xxx,yyy]

c if(newuic(l:l) .eq.' [') goto 2

c

c

lookup name in table

c call lcuc(newuic)

c

do 3 igc=l,35 if (newuic.eq.group_names(igc)) then

newuic=group_uic(igc) goto 2 endif

3

continue

c

c

Uic is not correct

c type *,newuic, ' is not recognised'

stop

c

2

continue

c

c

convert to integers

c call uic2int(oldgrp,oldusr,myuic)

call uic2int(newgrp,newusr,newuic)

c

c

find oldusr in sys:ugroup.dat

c call finduser(oldusr,newgrp,ok) if (ok .ne. ss$_normal) goto 1000 uic=newgrp*2**16+oldusr call setuic(uic) call exit

900

continue

type *,' Unable to find UIC file'

stop

800

continue

type *,' DCL symbols not available'

stop

1000

continue if(ok .eq. -1) type*,' Current UIC not on file' if(ok .eq. -2) type*,' Error reading UIC file'

if(ok .eq. -3) type*,' Not a valid UIC' stop end

c

c

routine to make integers from ascii

c

subroutine change(number,chars) character*(*) chars
c

c

input is in octal

c

LS-8

number=O

length=len(chars)

do 20 i=l,length

j=ichar(chars(i:i))-ichar('O')

number=number*8+j

20

continue

return

end

c

c

subroutine to convert character uic into numbers

c

subroutine uic2int(usr,grp,string)

implicit integer(a-z)

character*(*) string

c

c

isolate fields of uic [AAAA,BBBB]

c

gl=2 !left group

g2=2 !Right group

ul=32 !left user u2=32 !right user

c

c

check for leading "["

c

if (string (1: 1) ·eq. ' [ ' ) goto 9

type*,' Error: no leading bracket in UIC' stop

9

continue

c

c c

' scan for II n

do 10 g2=2,32

if(string(g2:g2).eq.',') goto 11

!stop on comma

10

continue

type*,' Error: no comma in UIC'

stop

11

continue

c

c

scan for right "]"

c

g2=g2-l

!skip over comma

ul=g2+2

!sam ting

do 12 u2=ul,32

!scan it all

if(string(u2:u2).eq.']') goto 13

12

continue

type*,' Error: no ending bracket in UIC'

stop

13

continue

u2=u2-l

!back up over"]"

c

c

convert into a real number

c

LS-9

call change(usr,string(gl:g2))

l

call change(grp,string(ul:u2))

return

end

c

c

subroutine to locate and verify a new UIC group

c

given user #

c

subroutine finduser(olduser,newgroup,error)

implicit integer (a-z)

integer clist(lO)

include '($SSDEF)'

c

c

assume ok

c

error = ss$_normal

c

c

read the file until uicgroup is found, or # too big or eof

·

c

do 30 i=l,200

read(l,100,end=200,err=20l)clist

100

format(l0(o6,lx))

if(clist(l).eq.olduser) goto 400

!found it

30

continue

c

c

here on error

c

200

continue

error = -1

!eof

return

201

continue

error = -2

!you lose

return

400

continue

c

c

search for new uic group

c

do 401 i=2,10

if((clist(i) .eq. newgroup) .and. (clist(i) .ne. 0)) return

401

continue

error = -3

return

end

c

c

routine to convert lower case into upper case

c

subroutine lcuc(string)

character*(*) string

character*! k

i=len(string)

do 10 j=l,i

k=string(j:j)

if((k.ge.'a').and.(k.le.'z')) then

string(j:j)=char(ichar(k)-(ichar('a')-ichar('A')))

end if

10

continue

11

continue

return

end

LS-10

; ;
;
;
; .
I
.;.
I I
; .
I
;
10$:
.
I
. ;
I

.title setuic set user UIC based on user # .subtitle Dr. TOPS @VMSLand Center

.ident /1-001/

this routine changes the user UIC string Beware, this breaks AME products (PDP-11 compatibility)

requires CMKRNL priv to function

input: longword UIC

output: the changed Pl and system space user UIC

.library $jibdef $pcbdef

/sys$library:lib.rnlb/ ;JIB symbols

.psect _lib_code, pic,usr,con,rel,lcl,shr,exe,rd,nowrt

starting address of procedure
.entry setuic, AM<r3,r4,r5,r8>
movl @4(ap),r8 $CMKRNL_S routin=writeuser ret

;put UIC into R8 ;enter kernel mode ;thats all folks

kernel mode routine

.entry movl movl movl ret

writeuser,O ctl$gl_pcb,r0 r8,pcb$l_uic(r0)
#1,rO

.end

;save nothing ;move pcb addr into rO ;save uic in memory
;return success ;thats all

LS-11

·

,.

''

,, .._,,

""'

"''"""''""""'"'"

, , , ..................... , ..... i. ... , ... , .., , , , , _ , , '

"'"""""-'-"""""'''"'"'""""·"""-·--"···--·······'·""'"'"'"'"

····.

'"·'''"

,,,,,'

MUMPS

MUMPS SIG STEERING COMMITTEE

Chairman Mark Berryman Plessey Peripheral Systems Irvine, CA

VAX Liaison Coyett A.J. Dese VA DM&S Verification & Dev. Ctr. San Francisco, CA

Symposium Coordinator Chris Richardson Computer Sciences Corp. Ridgecrest, CA
Communications Rep. Mark Hyde Advanced Computing Services DeWitt, NY

Digital Counterparts Beatrice Walther Digital Equipment Corp. Marlboro, MA
Diane Brown Digital Equipment Corporation Marlboro, MA

Newsletter Editor Janet Berryman Plessey Systems, Inc. Irvine, Ca

Ml\IP-i

t

Bill Brindley Chairman Nava1Security Group Command (202) 282-0527

Sandy Traylor Symposia Coordinator Target Systems, Inc. (714) 921-0112

Jim Ebright

Bi 11 Hancock

Communications Coordinator

Techno1ogy/

Software Results Corporation

Standards Coordinator

(614) 421-2094

(214) 495-7353

·

Vickie Hancock Newsletter Editor (214) 495-7353

Carol Greenfield DEC Counterpart Digital Equipment Corporation

The Networks Special Interest Group (SIG) is one of 25 SIG's within in Digital Equipment Computer User's Society (DECUS). The main purpose of the Networks SIG is to promulgate information concerning the use, development, and standardization of network products that function or involve Digital Equipment Corporation systems. Addltional functions of the SIG include the coordination and scheduling of symposia sessions, providing methods for free-flow communications, publication of the Networks SIG newsletter NETWords, participation in domestic and international standards committees, input to Digital for new products and corrections to existing products, promotion of working groups for special network needs and topics, and many, many other functions.
The Networks SIG Steering Committee invites you to participate in the Networks SIG. There are many ways that you can help the Networks SIG. Some of those include chairing sessions at symposium, participation in the various Networks SIG working groups, participation in special research projects, and others. If you are interested in devoting your time and expertise, contact any of the steering committee members.
DECUS is run entirely by volunteer leadership. Help us make DECUS and the Networks SIG better - take an active part in your SIGI

NTW-3

NETWords Cover
Networks sIGSteenng Comm1 ttee.
Index The Ed1 tor's Cobwebb
V1ck1e Hancockl NETwords Editor Nat1 ve Mode ETHERNET Commun1 cat1 ons
Thomas A. Turano & Roman P1nsky, DEC Pay Now or Pay Later: Network Design & Analys1s
6111 Hancock, Consultant

NTW-1 NTW-3 NTW-4 NTW-5
NTW-6
NTW-28

NTW-4

a )filiGl 11a.i aw11llSJ ~aJUl~GJtiltJJ
r1
!
Welcome back, to those who went, from Anahetm! I stncerely hope that you did not get as cold as I out there. I was fortunate enough, however, to purchase a n1ce, warm, Mtckey Mouse jacket, so I managed to survive. warm Caltfornta, phooey! In th1s tssue we have an enltghtening art1cle on how to use Ethernet tn a nattve manner Cw1thout DECnet) ut111z1ng the OIO interface on VMS and P/OS. For those of you thtnktng about using the Ethernet as strictly a data transfer method, thts may be for you. We also have an article from Bill Hancock on the bastes of network design and analysts for you folks out there thtnktng about getttng tnto networks. We had a lot of quest1ons about that at Anahetm, so 6111 whtpped out hts pen Cor, should I say, Mac), and put together some thoughts for you to enjoy. It's hard to be11eve, but Dallas ts rtght around the corner! As a result, we w111 be putttng together a special anntversary tssue of NETWords, complete w1th useless (and useful) trivia and who knows what else. Your contrtbuttons are destred and we need them FAST. Any 1tem(s) you would ltke to contribute are welcome, so get out that pen and WRITE NOW!! See you next 1ssue!!
NTW-5

Native Mode ETHERNET Communications Thomas Turano Roman Pinsky
Laboratory Data Products Digital Equipment Corporation
Marlborough, Massachusetts

Introduction

Recently we were involved in testing a remote processor which responded to ASCII commands sent over the ETHERNET. This processor did not use DECnet. To simplify our testing procedures, we constrGcted an interactive interface which allowed a user to type a command at a terminal on a host computer and have tha~ ommana transmitted to the remote processor. The remor e p ::-c...::ess;) r's ASCII response to the command was then delivered to the ~ser's terminal on the host computer.

It was necessary to test the remote processor from both a VAX and a PRO host, so an interactive interface was built for both the VMS and the POS operating systems. Because the remote processor did not use DECnet, communications using the ETHERNET meant that QIO requests were necessary. QIO requests are not as straightforward as DECnet calls, and we felt that it might be beneficial for the readers of NETWORDS to examine how VMS and POS use QIO requests to communicate over the ETHERNET. For the purposes of this article, we have taken the POS and VMS interactive interfaces and modified them to communicate with each other rather than with a remote processor. In doing so, we hope that the mechanisms by which native mode communications over the ETHERNET can be accomplished will become clearer.

A synchronous communications protocol was used in this

application.

That is, the host node always initiated

communications by transmitting a command, and always received a

reply from the remote node before sending another command. In

the example in this article, the VAX node is the initiator of

the communications with the PRO. The synchronous protocol is

used in an attempt to maintain data integrity.

Communications protocols in general are complicated schemes for maintaining a link between computers and detecting when a link has been broken. If an established protocol (such as DECnet) is not used, it is the responsibility of the programs which are conversing to detect a communications failure and take appropriate action.

When the communications are synchronous, the initiator of the conversation can detect the loss of data. If the reply message from the remote node is lost (for example, due to multiple collisions on the ETHERNET), the initiator will timeout for failing to receive a reply to its command. If the communications protocol were asynchronous, a more complicated

NTW-6

scheme would be required to detect the loss of a message, since either node could have sent a message at any time. This article is meant to demonstrate the method by which systems can access the ETHERNET using QIO requests; a discussion of communications protocols is well beyond its scope.
ETHERNET Overview
The ETHERNET transmits data as datagrams. Each datagram consists of a 46- to 1500-byte message preceded by a header and followed by a trailer. The header of the datagram is made up of:
o an eight-byte preamble
o a six-byte destination address
o a six-byte source address
o a two-byte protocol code
The trailer consists of a four-byte cyclic redundancy check (CRC) field that is used to determine if the data was corrupted during transmission. The preamble and the CRC fields are inserted/removed by the hardware prior to transmission/upon reception of the message.
Each node on the ETHERNET has a unique address which is used in the header. Each node listens to the ETHERNET. When a node determines that a datagram has its address as the destination address, the node checks the CRC portion of the message. If the CRC shows the message is undamaged, the message is passed to the user.
When a node wishes to transmit a message, it first listens to the ETHERNET. If no other node is transmitting, the node can begin to transmit. If two or more nodes begin to transmit simultaneously, a collision occurs, and all the transmitting nodes immediately cease transmitting. A random amount of time is then allowed to lapse before each node again attempts to transmit.
At any given time, more than one user on one node may wish to communicate with more than one user on a second node. There must be a means of determining which user on a receiving node a given datagram is sent to. The protocol code portion of the datagram accomplishes this "demultiplexing" of datagrams. Each node on the ETHERNET creates a table of protocol type-destination address pairs, and only one user on that node can use an address pair at any given time.
For example, if user A on node ALPHA using protocol type 01 establishes a connection with node BETA, then user B on node ALPHA is not allowed to establish a connection with node BETA using protocol type 01. User B has to use another protocol
NT~7

type. Protocol types have been assigned under license by XEROX to the various manufacturers of ETHERNET products. Digital Equipment Corporation has been assigned a block of protocol types for its various products (for example, DECnet, LAT), and has in turn reserved the protocol type 60-06 (HEX) for its users who wish to use native mode ETHERNET communications. This is the protocol type that the example programs use.

VMS NODE

The ETHERNET program on the VMS node consists of three

routines, each of which is made up of several modules. The main

program is a FORTRAN routine called NATIVEMODE, which contains

two FORTRAN modules.

The first is a function called

DEV TRANSLATE, and the second a subroutine called TRANSACT.

DEV-TRANSLATE converts the logical device assignment given to

the receiving node to its ETHERNET physical address. TRANSACT

is the subroutine which controls the I/O to the ETHERNET.

A group of three FORTRAN functions make up the EIO routine. The first of these functions, ETHERNET ATTACH, is called directly by the main program NATIVEMODE. It assigns a channel to and sets the characteristics of the ETHERNET device. The other two FORTRAN functions perform the QIO requests to WRITE/READ to/from the ETHERNET. These two functions are called by the subroutine TRANSACT.

Finally, there is a MACRO routine ESET, called by ETHERNET ATTACH, which actually sets the ETHERNET device parameters. This routine was written in MACRO because the parameters can be easily assigned to the parameter block using assembly language.

The calltree for the VMS side of the application is:

NTW-8

NATIVEMODE (FORTRAN)
[MAIN PROGRAM]
I
+---------------+---------------+

DEV TRANSLATE

TRANSACT

TFORTRAN)

(FORTRAN)

[located in NATIVEMODE] [located in NATIVEMODE]

I

ETHERNET ATTACH

+-------+-------+

(FORTRAN)

[located in EIO]

ETHERNET WRITE

ETHERNET READ

(FORTRANT

(FORTRAN)

[located in EIO] [located in EIO]

ESET

I MACRO)

Calltree for the VMS Program NATIVEMODE

The programs are listed in the following order, NATIVEMODE.FOR, EIO.FOR, and ESET.MAR. Also note that the programs which follow are documented in line.

NATIVEMODE.FOR

c
C Program NATIVEMODE:
C Link with EIO,ESET C Edits:
c

interface over an ETHERNET link

IMPLICIT INTEGER (A-Z)

PARAMETER MAXLEN = 1518

CHARACTER*l CARRIAGE RETURN

DATA CARRIAGE RETURN/l3/

CHARACTER*l cmd(maxlen)

CHARACTER*l reply(maxlen)

CHARACTER*40 device

! dev name (TTnn or XEnn)

CHARACTER*256 errmes

array to hold error messages

BYTE unit address(6)

INTEGER dev length

length of device name

INTEGER syschan

system channel for ethernet link

INTEGER i

INTEGER cmdlen

length of data being transmitted

INTEGER cmd lun

INTEGER msglen

NTW-9

INTEGER replylen INTEGER status

length of reply being received

LOGICAL dev translate EXTERNAL dev translate

INTEGER ethernet attach

EXTERNAL ethernet attach
c c c

cmd lun = 20

OPEN (unit=cmd lun, FILE='SYS$INPUT:' ,STATUS='UNKNOWN',

1 RECL=MAXLEN)

OPEN (unit=6, FILE='SYS$0UTPUT:' ,STATUS='UNKNOWN')
c

C Set up for comm with remo~e node

C Parse logical NET$DEV if not defined inform user and exit
c

IF (dev translate ( 'NETSDEV' ,device,dev length,

1
c

unit address)) GO T0-2

C Advise user what is going on
c

WRITE(6,988)

988

FORMAT(/,' Before running NATIVEMODE, you must assign the',

1

logical NET$DEV to indicate',/,

1

which ETHERNET device YOU want to talk to ',

1

For ETHERNET links, you must issue the command:',//

1

$ASSIGN XEnn:aaaaaaaaaaaa NET$DEV' ,//,

1

where nn is the DEUNA/DEQNA controller and unit, and

1

' aa. . . is the' , I,

1

hexadecimal ethernet address of the DECNA in the '

1

'SYSTEM unit. For',/,

1

' example, to connect to the SYSTEM at address '

1

'0100A2010020 on the',/,

1

' ETHERNET controller XEAO:, use XEA0:0100A2010020.' ,/

CALL EXIT
c

C Announcement
c

2

ESCAPE = 27

WRITE (6,986) ESCAPE

986

FORMAT(/,' ',Al,'#6LNATIVEMODE ETHERNET example',//,

1
c

' For HELP, type "?" at command prompt.')

C Attach ETHERNET device link

C Inform the user that the link is attached if successful

C otherwise inform the user of the error and exit
c

status = ethernet attach(device,unit address,syschan)

IF (.NOT. status)-GO TO 9

WRITE(6,989) device,unit address

989

FORMAT(/,' [ETHERNET link' ,A<dev length>,6Z2.2,' Attached]')

GO TO 10

NTW-10

9

CALL sys$getmsg(%VAL(status),msglen,errmes,,)

WRITE(6,996) errmes

' I

996

FORMAT(' ?NATIVEMODE-F-OUTFAIL, Attach Failed',/,

1

' ',A<msglen>)

CALL EXIT
c

C Command Loop - print prompt

C Then read the input from the terminal
c

10

WRITE(6,999)

999

FORMAT(/,' Transmit: ',$)

cmdpos = 1

11

READ(cmd lun,98,END=900) (CMD(I),I=cmdpos,MAXLEN)

98

FORMAT(<MAXLEN>Al)

c

c Determine length of command typed starting from

c the end and moving back

c

cmdlen = maxlen

15

IF ( cmd ( cmd 1 en ) . NE . ' ' ) GO TO 2 0

cmdlen = cmdlen - 1

IF (cmdlen .GT. 0) GO TO 15
c

C If continuation marker, continue getting command
c

20

cmdpos = crndlen

c

C Empty commands are echoed, but ignored
c

IF (cmdlen .EQ. 0) GO TO 10
c

C Call TRANSACT subroutine to process the message
c

CALL TRANSACT (syschan,

1

unit address,crndlen,crnd,

2
c

maxlen,reply,replylen)

C Display the reply
c

WRITE(6,95) (reply(i),i=l,replylen)

95

FORMAT(' Receive: ',70Al,40(/,10X,70Al))

GO TO 10

900

CALL EXIT

END
c

C**********************************************************
c

LOGICAL FUNCTION dev translate (logical,device,

1

- dev_length,ethernet_address)

c
C Args
c

INCLUDE I ($IODEF)' INCLUDE '($SSDEF)'

NTW-11

CHARACTER logical *(*)

CHARACTER*l device(40)

CHARACTER*l hchar

! hex character from address

CHARACTER*l phy device$C(l00)

CHARACTER*lOO phy device

INTEGER dev length

INTEGER enet addr index !temps for parsing hex NI address

INTEGER phy_dev_length

INTEGER scan

INTEGER*2 hbyte

Accumulator for hex byte

INTEGER*2 nibble

place for arithmetic on hex char

INTEGER*4 status

BYTE acmode

access mode for user logical

BYTE ethernet address{6)

BYTE hbyte$B -

to copy byte from accumulated hex

BYTE log table

logical table where NETSDEV found

BYTE phy=device$B(l00>
c

C Equivalence arrays

c

EQUIVALENCE (phy device,phy device$C,phy device$B)

EQUIVALENCE (hbyte,hbyte$B)-

EQUIVALENCE (nibble,hchar)

INTEGER*4 SYS$TRNLOG
c

C Translate the logical device

C Assume failure
c

dev translate = .FALSE. status = SYS$TRNLOG(logical,phy dev length,

1

phy device,Iog table,acmode,%VAL(0))

IF (status .NE. SS$ NORMAL) RETURN-

. c
C Glean NET device (physical device up through " "
c

scan = 0

10

scan = scan + l

device(scan) = phy device$C(scan)

dev length = scan -

IF Tdevice(scan) .EQ. ':') GO TO 20

IF (scan .EQ. phy dev length) GO TO 900

GO TO 10

--

c

C If anything remains, it must be ethernet address (12 characters)
c

20

IF (scan .EQ. phy dev length) GO TO 900

IF ((phy_dev length - scan) .NE. 12) RETURN
c

C Convert data from hex
c scan = scan + 1

point to first hex character

DO 100 enet addr index = 1,6

loop through NI address

hbyte = 0

! init this hex byte, and accumulate ..

DO 50 np = 1,2

hbyte = hbyte * 16

NTW-12

nibble = 0

! clear high byte of NIBBLE

hchar = phy device$C(scan) ! load char in low

c

byte of NIBBLE

IF ( ( . NOT. ( (he ha r . GE. ' 0 ' ) · AND.

l

(he ha r . LE. ' 9' ) ) ) . AND.

l

(.NOT.((hchar .GE. 'A') .AND.

1

( he ha r · LE. ' F ' ) ) ) ) RETURN

IF ((hchar .GE. '0') .AND. (hchar .LE. '9'))

l

hbyte = hbyte + (nibble - 48)

IF ((hchar .GE. 'A') .AND. (hchar .LE. 'F'))

l

hbyte = hbyte + (nibble - 55)

scan = scan + 1

50

CONTINUE

ethernet address(enet addr index) hbyte$B

100

CONTINUE

900

dev translate = .TRUE.

RETURN

END
c

C*********************************************************************
c

SUBROUTINE transact (syschan, drop,

1

cmdlen, cmd,

2

replysize, reply, replylen)

INCLUDE '($IODEF) I INCLUDE I ($SSDEF) I

PARAMETER r efn = 1 PARAMETER e-efn = 2

INTEGER cmdlen INTEGER replylen INTEGER replysize INTEGER status INTEGER syschan INTEGER wlen INTEGER msglen INTEGER*2 r iosb(4) INTEGER*2 e-iosb(4) CHARACTER*l-cmd(*) CHARACTER*l reply(*) CHARACTER*256 errmes

INTEGER ethernet post read EXTERNAL ethernet post read

c
C Post
c

INTEGER ethernet write EXTERNAL ethernet write
read FIRST
CALL SYS$CLREF(%VAL(r efn)) status = ethernet_post read l

(r_efn,

syschan, reply, replysize, r

iosb)

NTW-13

IF (.NOT. status) GO TO 950
c

C Write the command
c

15

IF (cmdlen .EQ. 0) GO TO 35

Just post input

wlen = cmdlen

status = ethernet write (syschan, drop, cmd, wlen)

IF (.NOT. status)-GO TO 930
c

C Read the reply
c

35

CALL SYS$WAITFR(%VAL(r efn))

status = r iosb(l)

replylen =-r iosb(2)

IF (.NOT. status) GO TO 940

RETURN
c

C Error
c

930

CALL sys$getmsg(%VAL(status),msglen,errmes,,)

WRITE(6,99) errmes

99

FORMAT(' ?NATIVEMODE-F-OUTFAIL, Output QIO Failed',/,

1

' ',A<msglen>)

CALL EXIT

940

CALL sys$getmsg(%VAL(status) ,msglen,errmes,,)

WRITE(6,98) errmes

98

FORMAT(' ?NATIVEMODE-F-INFAIL, Reply READ Operation Failed',/,

1

' ' , A<msg len>)

CALL EXIT

950

CALL sys$getmsg(%VAL(status) ,msglen,errmes,,)

WRITE(6,991) errmes

991

FORMAT(' ?NATIVEMODE-F-READFAIL, READ QIO Failed',/,

1

' ',A<msglen>)

CALL EXIT

END

NTW-14

1

EIO.FOR

INTEGER FUNCTION ethernet attach (dev,address,syschan)

INTEGER eset

INTEGER status

Status returned

INTEGER syschan

Channel to the driver

CHARACTER dev *(*)

Device name

BYTE address(6)

EXTERNAL eset

Module ESET.MAR

INTEGER SYS$ASSIGN

EXTERNAL SYS$ASSIGN
c

C Assign a channel to the device
c

status= SYS$ASSIGN(dev,syschan,,)

IF (.NOT.status) GO TO 990

! On error return error

c

C Set the characteristics using the channel
c

status = eset(syschan,address)
c

C Return the status
c

990

ethernet attach = status

RETURN

END
c

C******************************************************************
c

INTEGER FUNCTION ethernet write (syschan,drop,buffer,length)

INCLUDE I ($IODEF)' INCLUDE '($SSDEF)'

INTEGER length

Length of the buffer

INTEGER status

Status of the call

INTEGER syschan

System channel

CHARACTER buffer *(*)

Transmit buffer

BYTE drop(6)

INTEGER SYS$QIOW

INTEGER*2 IOSB(4)
c

C QIO to write virtual block over the ETHERNET
c

ethernet write = SYS$QIOW(,%VAL(syschan),

1

%VAL(I0$ WRITEVBLK), %REF(IOSB),,,

2

%REF(buffer), %VAL( length),, ,%REF(drop),)

RETURN

END
c

C*********************************************************************
c

INTEGER FUNCTION ethernet_post_read (efn,syschan,buffer,size,iosb)

IMPLICIT INTEGER (A-Z)

NTW-15

INCLUDE I ($IODEF)' INCLUDE '($SSDEF)'

INTEGER efn INTEGER size INTEGER status INTEGER syschan INTEGER*2 IOSB(4) CHARACTER buffer *(*)

Event flag Size of buffer to be received Call return status System channel I/0 status block Buffer to receive message

INTEGER SYS$QIO
c

C Byte definitions for the received message
c

BYTE RECPAR(l6l
c

Info about packet and sender
(1-6) = receiver ethernet address
(7-12) = sender ethernet address
(13-14) = protocol type
(15-16) = pad field

C QIO for read virtual block
c

ethernet post read = SYS$QIO(%VAL(EFN) ,%VAL(syschan),

1

-

- %VAL(IO$ READVBLK), %REF(IOSB),,,

2

%REF(buffer), %VAL(size),,,%REF(RECPAR),)

RETURN

END

NTW-16

1
ESET.MAR

.LIBRARY /SYS$LIBRARY:LIB.MLB/

$IODEF $NMADEF $XMDEF
NMA$C- LINPR- CLR = 2
Program constants

VAX I/O definitions VAX definitions VAX Conf ig calls
Symbol not defined VMS V3.

bufsiz nbuf f maxbuf protyp

= 1500 2
= 1500 = "X0660

Ethernet buffer size Number preallocated buffers Maximum buffer size protocol type 0660 HEX

Header size values in bytes

preamble

= 8

dest address

= 6

src address

= 6

protocol

= 2

.PSECT RWDATA,PIC,NOEXE,LONG
, .

wtext: .ASCID 'WRITE' rtext: .ASCID 'READ'

PROMPTS

, .
parblk:

.WORD .LONG .WORD .LONG .WORD .LONG .WORD .LONG .WORD .LONG .WORD .LONG .WORD .LONG .WORD .LONG .WORD .LONG .WORD .LONG .WORD

NMA$C PCLI BUS buf siz NMA$C PCLI BFN nbuf f- -
NMA$C PCLI BSZ maxbuf -
NMA$C PCLI PRM NMA$C-STATE OFF NMA$C-PCLI MLT NMA$C-STATE OFF NMA$C-PCLI PAD NMA$C-STATE ON NMA$C-PCLI EKO NMA$C-STATE OFF NMA$C-PCLI OCH NMA$C-STATE OFF NMA$C-PCLI CRC NMA$C-STATE ON pNrMoAty$Cp- -PCLI - PTY
NMA$C- PCLI - CON

;BUFFER SIZE
;/PORT
;Number of buffs
; value = nbuf f
;Buffer size
; value = maxbuf f
;Promiscuous mode
; value = disabled
;Multicast address state
; value = disabled
;Pad short buffers
; value = padding enabled
;Echo mode
; value = noecho
;Data chaining
value = no chaining
;Generate CRC
; value = hardware CRC
;Protocol type
; value = protyp
;Controller mode

NTW-17

.LONG NMA$C LINCN NOR

.WORD NMA$C-PCLI ACC

.LONG NMA$C-ACC LIM

.WORD NMA$C-PCLl DES

.WORD PB40-PB30 -

PB30: .WORD NMA$C LINMC SET

uni tad: .BLKB 6

-

PB40:

pblen=.-parblk

pbdesc: .LONG

pblen

pbaddr: .ADDRESS

parblk

, value = normal
;Protocol access ; value = limited ;Shared protl dest addr ; length parm block following ;Modifier word ;6 Byte dest ETHERNET address
;Length of parameter block ;Descriptor points to pararn bl

eiosb:: .BLKQ 1 buflen: .LONG 0

; Status

;Set ETHERNET parameters ;From FORTRAN:
BYTE address(6) Filled in with destination address INTEGER syschan ! Filled in with system channel from SYS$ASSIGN INTEGER status ! to receive routine status

status = ESET(syschan,address)

.PSECT CODE,PIC,EXE

.ENTRY ESET,AM<>

MOVL #512,buflen

MOVL 8(AP),R3

;Copy ADDRESS

MOVB

(R3)+,unitad+O

MOVB

(R3)+,unitad+l

MOVB

(R3)+,unitad+2

MOVB

(R3)+,unitad+3

MOVB

(R3)+,unitad+4

MOVB

(R3)+,unitad+5

Set the mode function

$QIOW_S
RET .END

FUNC =#<IO$ SETMODE!IO$M CTRL!I0$M STARTUP>,-

CHAN @4 (AP), -

-

-

IOSB eiosb,-
P2 = #pbdesc

NTW-18

t
POS NODE

NATIVE is the main FORTRAN program running on the POS node. This program makes calls to the MACRO program SUBLNK, which contains the entry points to set the characteristics of the ETHERNET device, and send and receive messages. The POS QIO
requests called in the MACRO routines are collectively called DLX. In all, five DLX functions must be used:

0 IO.XOP - Open the line

0 IO.XSC - Set the line characteristics

0 IO.XRC - Receive a me.ssage

0 IO.XMT - Transmit a message

·

0 IO.XCL - Close the line

The IO.XOP request opens the line and assigns a network logical unit number to the ETHERNET device. The IO.XSC sets the device characteristics for the ETHERNET device. A receive request (IO.XRC) must be issued prior to issuing any transmit request. This is necessary because the PRO might not be able to post a transmit request and issue a receive request before the other system has replied to the transmitted message. Because of this, the receive request is issued with an event flag. When the event flag is triggered, the receive is completed. The transmit QIO request is designated IO.XMT, and can be issued once a read is posted. Upon completion of the program, the connection should be closed with the QIO call IO.XCL.
The calltree for the POS program is:

NATIVE (FORTRAN)
[main program]
I SUBLNK (MACRO)
[subroutine] +-------+-------+
SETLNK RDLNK WRTLNK {entry points}

Calltree for the POS program NATIVE

The FORTRAN routine NATIVE is listed next, followed immediately by the MACRO routine SUBLNK.

NTW-19

PROGRAM NATIVE IMPLICIT integer (A-Z)

c c

INTEGER setlnk,recmsg,sndmsg external macro routines
c

C

ASCII values

c

CHARACTER*80

cmd

command sent

CHARACTER*80

reply

reply received

INTEGER isb(2)

I/O status block

c

C

Define the constants

c

succes = 0
unit = 0
netlun = l ief lg = 2 replen = 80

event flag for completion of QIO read reply length can be changed

c

C

assign netlun NXO: (ETHERNET DECNA controller)

c

c

CALL asnlun(netlun, 'NX' ,unit,idsw)

if (idsw .lt. 0) stop 'error assign lun'
c

c

C Set the ETHERNET driver characteristics and open line
c

CALL setlnk(netlun)

IF (status .LT. succes) GOTO 200

C Post read first

5

status= recmsg(reply,replen,netlun,isb,ieflg)

C Read the message to be sent

WRITE(5,9)

READ(5,10)(cmd(i:i),i=l,80)

IF ( cmd ( 1 : 1) · EQ. ' E' . OR. cmd ( 1 : 1) · EQ. ' E ' ) GOTO 10 0

9

FORMAT(/,' Transmit: ',$)

10

FORMAT (80al)

C Transmit message

C Determine length of command typed

cmdlen = 80

15

I F ( cmd ( cmd le n : cmd 1en ) . NE · ' ' ) GOTO 2 0

cmdlen = cmdlen - 1

IF (cmdlen.gt.0) GOTO 15

20

status = sndmsg(cmd,cmdlen,netlun)

NTW-20

IF (status .LT. succes) GOTO 200

call waitfr(ieflg)

wait for event

IF (status .LT. succes) GOTO 200

WRITE(5,21) (reply(i:i),i=l,isb(2)) GOTO 5

display message

100

CONTINUE

21

FORMAT (' ' ' Receive: ',<isb(2)>Al)

CALL exit

200

WRITE(5,22) status

22

FORMAT(x,' QIO status return is: ',lI)

CALL EXIT

END

.SBTTL MACROS and Data Definitions
System directives
.MCALL DLXDF$ .MCALL EPMDF$,EXIT$S .MCALL QIO$S,QIOW$S .MCALL WTSE$S DLXDF$ EPMDF$

Constants

cc.app = 3140

Protocol (60-06)

Data storage

.PSECT data

nwsb: .BLKW 2

; Network status block

device:.ASCII /CNA-0/ ; Device name

devl = .-device ; Device name length

.EVEN

netlun: .word

chrbuf:

.WORD . WORD .WORD .WORD .WORD

device characteristics buffer

CC.DST 10 .
0
0 CC.APP

Characteristics type Number of bytes of characteristics data Output data byte count Characteristics status Protocol type

NTW-21

.WORD LF$PAD .WORD 0

LF$PAD padding required protocol flag to turn LF$PAD off

protocol-destination address pair in HEX

This sets up the protocol-destination pair as in a table.

destination address

.BYTE 10

08

.BYTE 0

00

.BYTE 53

2B

.BYTE 0

00

.BYTE 7

07

.BYTE 47

27

chrl = .-chrbuf

source address

.BYTE 252

.BYTE 0

.BYTE 04

.BYTE 0

.BYTE 312

.BYTE 34

chrl = .-chrbuf

.SBTTL Main Routine .PSECT setlnk
setlnk::

open line

MOV

@2(R5),netlun

QIOW$S TSTB BMI

#IO.XOP,netlun,,,#nwsb,,<#device,#devl,#0>

nwsb

Test the return status

Serr

Branch on error to fail set status, else

check status

setchr: set characteristics

$err: setok:

QIOW$S TSTB BMI
CMP BEQ
MOV JMP

#IO.XSC,netlun,,,#nwsb,,<#chrbuf,#chrl>

nwsb

; Test the return status

Serr

; Branch on error to fail set status, else

check status

#CS.SUC,chrbuf +6; Check characteristics status word

setok ; If OK avoid the error handling

nwsb,RO f ini

; return status of QIO first word

NTW-22

fini:

MOV

chrbuf+6,RO

RETURN .END

t
return characteristic status word

. RDLNK
,
.SBTTL MACROS and Data Definitions
., System directives
. ,
.MCALL DLXDF$ .MCALL EPMDF$,EXIT$S .MCALL QIO$S,QIOW$S .MCALL WTSE$S DLXDF$ EPMDF$

. Constants
,

.

cc.app = 3140

I

; Protocol (60-06)

.PSECT data

nwsb: .blkw 2

recbuf:.word; receive buffer

recbl: .word ; Length of buffer

netlun:.word; netlun

.ief lg: . word

. I
'

-----------------------------------------------------

.

Receive characteristics buffer

r' ecchr:

.WORD CC.DAD ; Read destination address parm

.WORD 6

Input data byte count

.WORD 0

Output data byte count

.WORD 0

; Characteristics status

.WORD 0

ETHERNET address

.WORD 0

.WORD 0

.WORD CC.ADR

source address parameter

.WORD 6

Input data byte count

.WORD 0

Output data byte count

.WORD 0

Characteristics status

.WORD 0

ETHERNET address

.WORD 0

.WORD 0

.WORD CC.PRO ; Protocol type parameter

.WORD 2

Input data byte count

.WORD 0

Output data byte count

.WORD 0

Characteristics status

.WORD 0

; Protocol type

NTW-23

reel = .-recchr

.PSECT recmsg

recmsg::

MOV

2(R5),recbuf

address of buffer to receive message

MOV

@4(R5),recbl

value buffer length

MOV

@6(R5),netlun

value of NETLUN

MOV

8.(R5),nwsb

I/0 status block 2 word

first is a status,second is a length of the message

MOV

@10.(R5),ieflg ; event flag to be wait on in FORTRAN

program

QIO$s

#IO.XRC,netlun,ieflg, ,nwsb,,<recbuf,recbl,#recchr,#recl>

done: MOV $dsw,RO

; return status directive word

RETURN

.END

.
'

Wrtlnk MACRO subroutine

.SBTTL MACROs and Data Definitions

System directives

.MCALL DLXDF$ .MCALL EPMDF$,EXIT$S .MCALL QIO$S,QIOW$S .MCALL WTSE$S DLXDF$ EPMDF$

Constants

cc.app = 3140 ; Protocol (60-06)

Data storage

nwsb:

.PSECT data .BLKW 2
.EVEN

Network status block

. Buffer space
x' mtbuf: .word xmtbl: .word netlun; .word

buffer address buff er length net log unit number

Transmit characteristics buffer

senchr: .WORD .WORD

CC.ADR ; Set ETHERNET address for transmit

6

; Length of address

NTW-24

t

.WORD 0 .WORD 0

Size of data output Characteristics status

.
e' thdst:

.BYTE .BYTE .BYTE .BYTE .BYTE .BYTE

destination address in HEX and Octal
252 0 04 0 312 34

protocol type

protyp: .WORD .WORD .WORD .WORD .WORD senl =

CC.PRO Set protocol type

2

Length of protocol data

0

Size of data output

0

Characteristics status

CC.APP Protocol type

.-senchr; Length of the transmit char buffer

'. ---------------------------------------------------

.PSECT sndmsg

sndmsg::

MOV

2(R5),xmtbuf

MOV

@4(R5),xmtbl

MOV

@6(R5),netlun

address of xmtbuf value of xmtbl value of netlun

sf ail: done:

QIOW$S CMP BNE MOV
Jmp

#IO.XTM,netlun,#1,,#nwsb,,<xmtbuf,xmtbl,#senchr,#senl>

#CS.SUC,$dsw

Compare the status word and success

sfail

If unsuccessful go to error handle

nwsb,RO

return I/O status of completion QIO

done

done

MOV

$dsw,RO

return status directive word

RETURN .END

NTW-25

.. . .. ..... - - - -- _, __ __ ... ... ................. ...... '. ' '"''"'" .,, .........,"'·"'·'....""'''"""'"'' """' '"""' "''' , ,, "'' .,,., ""' ,,.,,,,,, ., , """' '"" '"'"'"'"'' ,,, ~,

...

........~... __..__................__................................. _,,_,,, ~................. .. .......-~ ,, . ., ,._,,.,.,,

,,.. _,...,. " ............... _., .., ...............

POS requires two additional files to task-build an application on the PRO. The first is the ODL file which contains the linkage relationships between the components of the program.
NATIVE.ODL
.ROOT native-sublnk-OTSROT-RMSROT,OTSALL @LB:[l,5]PROF77 @LB:[l,5]RMSRLX
.END

The second file is the command file NATIVE.CMD, which tells the OS which LUNs to assign to which devices. The priority switch /PR:O must be included. Failure to do this causes the OS to return the error condition indicating insufficient privilege.
NATIVE.CMD
native/fp/pr:O,native/-sp=native/mp ASG=TI: 5 ASG=NKO:l ASG=DW1:2 GBLDEF=TT$LUN:5 GBLDEF=MS$LUN:6 GBLDEF=WC$LUN:O oldfile - newfile services GBLDEF=HL$LUN:O help GBLDEF=MN$LUN:O menu GBLDEF=TT$EFN:l system event flag terminal I/0 CLSTR=PROF77,POSRES,RMSRES:RO II

To build this application on the PRO, the main routine NATIVE is first compiled using the command:
FOR/LIST native

Then, the MACRO routine SUBLNK is assembled using the command:
MACRO/LIS/OBJ [l,5]netlib/LIB,[directory]sublnk

Finally, the objects are linked using the Program Application Builder:
RUN $PAB PAB>@NATIVE.CMD

Using the Communications Routines

NTW-26

Both the VMS and POS programs assume that the other node's program is running before transmitting a message. The VMS program, NATIVEMODE, also requires that the POS node it is to communicate with is identified. Before running NATIVEMODE, the DCL command ASSIGN must be issued to assign the logical NET$DEV to the address of the POS node with which NATIVEMODE is to connect. From DCL, issue the command:
$ASSIGN XEnn:aaaaaaaaaaaa NET$DEV where nn is the ETHERNET controller on the host system, and aa ... is the hexadecimal ETHERNET address of the POS node. For example, to connect to the POS node at address 0100A2010020 on the ETHERNET to which the controller XEAO: is connected, use: $ASSIGN XEA0:0100A2010020 NET$DEV The use of logicals allows the NATIVEMODE program to connect to different POS nodes simply by reassigning the logical designation NET$DEV.
Conclusions Native mode ETHERNET provides a simple means of communicating across the ETHERNET without using the DECnet protocol. Although the development of a protocol requires extensive work, there are applications which might benefit from such an effort. The use of QIO requests on the VMS system and DLX requests on the POS system provides a straightforward means of accomplishing native mode ETHERNET communications. The demonstration programs shown should provide the reader with a sufficient template to use DLX/QIO requests for ETHERNET communications in both the POS and VMS systems.
Acknowledgments The authors would like to express their appreciation to Bob Lordi who wrote the original version of the VAX program and Jenny Simich and Susan Brown who expended a great amount of effort in turning our engineering notes into this article.
NTW-27

- ....................... ............................. .·..~-----··-~·----··-·-···-···· "··-···-""···-···~···-"

' '""'"""'""'"'-·-·---·---··-······-···---···--····~---"-·····

'91111¥ er ,., t..ter: llltvert Dalt· ... A·1t81·
1111 lllacect. CSP 2510 llmste· La. S.rl·... Taa 75040 ( 214) 495-1353

·NIN, w don't need to wste our ttme enelvztna tM netwrlc conft9uratton. All w lmlld to do vea bug the hlrdwre ve lmlld end 1 DEC.t ltce·. DEC.t 1a 1nsta111d ever~here, so 1·m
sure that w ma tM rt9ht cbotce. After en, tt vorb for ever11tne else, does'nt tt?·
Right.
-We theught about dotng 1 thorough deston. We even looked into using ·me consultants to help ·, but tM corporate tua thDught that tt Wll Wiited ti· end tM comulants cost too much. Fnnlcl1, I'm a ltttle concerned; I've never a.en involved withe netwrlc before:
Nlcetrv.
·1 thtnt that ve11 do It ouraelvea. Netwrt design can't be thlt much more different thin eppHcettone programming. Beltdel, I\le a.en in computer ICience fore long tt me end I cen l·rn
1nuthtna out of1boot,·111 Just oet ·me boot, read up on tt, ind deaton the netwrt:
Hedicl Thi···'· 90nM diet
Whit tDU hM JUlt read en ect·l statements that I hM hid the per.nel pl·ure of helrt na for tM exc· of rm GDina through the proper motions to design a netvorlc. YuckIFor time of gou vho read this 1nd hid 1n experience of deJ· vu, read on. This 1rttcle Is about netvort desl9n
end enelpt1 - vhlt tt t1, vhv gou need it, end vhlt hlppene tf gou don't do it.
Nltvort desl9n end 1nelpt111 ·term w networkl na tvpes applv to tM bale nthDds ··erv to PROPERLY design· netvorlc. Aproperlv geMnted netwrlc design can provide· compenv vith the fo11WI ng benefttl:
· Proper enelpts ofextsttna equipment for netwrlc tnsta11atton oUlt Of reqUlrements for netvortc 1nste11atton o Proper conft9uratton of netwrk cempo·ntt for optimum colt llYinp oAnetwrlc topologg thlt is flext ble end edapteble oCornet selection of netwrk hardware for the network function oCorrect ·lectton of netvort aoftwre for tM netwrk function o Documentation Of tM network for future enhancements end modlftcat1ons ot119ntton peth 1nto future network technoleotes vtthout n-desl9n oA1011 netwrt ltfe-cvcle (reductna tM costs of potential replecement) o Interconnect pethl end methods for multiple network architectures oU.r ··lpt1 end conft9uratton of netvork neourcea for optimel u.

NTW-28

1
o Netvork me11g9ment plan end methDdo'logv to reduce doYntime end ellw for maximum use of IYllleble reaoun:ea o Expstettons for performance, nliebilttv,.·nd usebtlttg oOptimal prognmmlng environment for netwrk(ed) eppHCltio· oTntntng needs for programmen, usen,and netvort meA1119n o Recurrtngexpeneeforecattngend budgettng methadt o Netvork support needs (prognmming, management, user support) otJae of nta.nttcal mode11ng tools to a.1p tnsun ta. sucess ofta. netwrlc dllt9n end topologv oOpttmel design to prevent netwrlc congestion, q·uetno delav, and proper placement of routtng end management reaoun:a on ta. netwrk
so, for 111 IGU vould-be network c1est1nen, tete a a.rd look at ta. above ltst and ten IGUntlf
that IGUr Mtvork deli9n encom...-. ell the above t11ues end needs. And for thole of IGU about to embark on the netwrlc tnll, ale 18Untlf tf VDU hive edeq.telv ensvend this list of ttems. If gou have, super I If gou have Mt, IGU have'nt properlg destgned 1GUr netvort.
Netvorlc dest9n ts much mon ta.n ordering the perts and pteces from 1 vendor. It ts much more
tlmn tM auggestio· tM veldJr vtws VDU for confhJuntion of VDUr netwrt. Al a potential user
of netwrlc components, VDU hive tM final declaton on ang netwrlc conft9untion and· matter vhlt ta. vendDr tells IGU to buv, ta. ft nal dec1ston to buv nsts upon IGUr shoulders. Whit thlt meen1, folb, i1 that if the Mtvorle cloeln't worle 11 promoted to management, VDU cen blame the vendor, but the ultimete penon nspomible ts gou, the penon vho recommended to management the netvorlc components to bu1. And, tf IGU think for one llCOnd that the smiling vendor across tM ·le from 'JOU it 91ring to recom·nd ·me otMr veldJr thin hhneelf for tour network, veu are etther natve or vou have been Hstentng to too much vendor hvpe ("We'n Mt here to mete ··Y - w·n hen to be VDUr frtendt·). SO, nmember, the person that will catch the blame from VDUr compenv tn tM end t· Mt tM vendDr - it'· toul So, if veu wnt to truat veur vendDr, Qnet. Penonallu, ta.n an tev people Ivould consider queltfted netvort desttnen and vou can
bet that vou ere Mt 98111 to 91t 1CC111 to tMm from· vendor for free. Remember, VDU tit vhat
VoU pe9for.
The ftnt ltep of netwrt dllttn it identification ofthe need for · netwrt. While thlt mev ·m obvious, fw compentes stt dovn and spend ·me time lGQicallv defining the rwons for fllltlntng · netwrlc. Going through this exercf· tells IGU whither or Mt e llllwrk fs nee111arv to eccompltsh the dlltnd function or vMtMr there it a more .t-effecttve method to ·lve ta. problem at a.nd. IWI·'*' to delltn 1 netvort for alarQe ftnanctal companu one ttme end lfter looktng over the needs verv ceretunv, I told them that thev didn't need· network. M ftnt, the meR1g1ment of the compeng thought tblt I ws nuts ba· their vendor hid a..n a.mmertng on them for months thlt the1 needed 1 netvort. Thl1 stmP11 toot it for QOSpel thlt
tMv needed one end event·llv tM vendor tDt to the upper meR1g1ment end convinced tt.m that
theu needed 1 netvorlc to ·lve their ·problems: I WI called tn baUlt the customer dtdn1 know envthlng about netwrktng end dfd not 111¥1 the ultimete confide· fn the veldJr's efforts to find tM ·rt9ht· tolutton, "91nll· of vblt the vendDr tolutto· vere. After wrlctng on tM project for three web.. Ifound that the methodolOOV adopted bV the compenu·s management for dlstrtbutt ng workload end the reporting hienrch9 in¥01ved ws functtontng verv well and there wsl· t..nSS out-flwofvort toott.r compengenttttes. Whit this meent wstblt 95Sof the vorlc betng dDne tn the respecttve branches staljld within the branch and did Mt nqut n corpo,.. intervention to Q1t wort eccompltalled. Al·, all wort VII dDne fne rwoneble menmr and plectng a computer tn the middle of the pepervort effort vould dD Mthlng but slw things
NTW-29

'"'"'-""""'"' """ "'"~" -·····--,.-·-·-·H-.o·M···-··-·-·-·--.......----.........~-. . . . .-...............,,.,,.,~..,.. """'"'""""'"-"""""'"'"-'"""""''"'"'"""'""""""""'"'-"" ····· . . . . ._""""'""""'..._,.,,_,,.._~-" -"·~-·-·-··0000-"""'"""'
d!Nn (Qll, vtrvt·, computen ere not 11wp better). I wnt l.:lc to the custo·r"a
·Dlll·nt end explet· ell of thts to tt.m end ta.v tmmedletelv celled ta. vendor end dennded en explellltton. The vendor told them I""' wrong end pr oceedlll to do the o· thing thlt 1 vendor should never do - cut d!Nn tt. competition. stnce I VII their ·competition,· it VII obYlous to tt.m thlt I"" trvtng to deprive them of1 1111 end theu felt thlt thev wre right end I W11 wrong. Now I""' ...a11 spent another tw web (et the catomer·s request) thoroughlv docu·nttng tt. leek of need for the network and 1111 ftghttng ··of the trntto·l claims of the vendDr (I ·kid the vendDr oa whv 1t VII thlt theg wre pushtng the net.tort ao herd when
the customer didn't need tt; thltr 1nwer VII ·Bice·:). At the end, tM vendor l.:lced off thltr
clllma · ta. vendor t.I not do· 1 thorough (or even partial) job of looting et the customer·s .-.1111 hDv the custonr collluclld bust nesa. T.. vendor Im · tdel ·to whit the customer·s plans wn for the next ftal veer nor did the vendor bother to look tnto the budgetlrv constn1nts that the customer WI under. All the vendor cared about WI attng the 11le - no matter hDY much the custonr did not need it or hoY much it cost.
The entt re hlssle could hive been Mlded If the customer Im thought, careful v, about whv thev ·needed· 1 netwrlc. IRlteld~ the customer VII hllYllg tnfluenced bv the vendor"· 11111 tactics end GDt wept up tnthe buutng frenzu that usuell uaccompanies 1 treat anu 11les of .tvorlcs. Alao, the cuetonr should hive loobd tint to the compenv business plan - it vtll tell veu whither · .twrlc t1 ·1111rv to achieve the buetn111 goel1 ofthe compenv or not, bllecl upon expected artet penetntton, arovth factors, profttebtlttv requirements, 1111 peraon·l requtrennts. So, rule number one ts melce sure thlt VDU need 1 .tvorlc - don't QD out end bug om due to unj usttfted 1nter·l pressure, verar pr111ure, or .-r pressure (ges, w 111 vish
thlt w hid a netvort Just 11Ice compenv xd!Nn the street).
After 1 need for 1 netvork hit been esttbltahlld, rule number tvo tn network desttn ts applied: whit ts tt suppoeed to do 1111 hDv much is tt going to cost?
Whit tt ts suppoaed to do tt 1 matter of detlnl ng, verv cerefullu, vhlt functto·11tv ta. netvork t1 to offer. If tt t1 electronic men, file trenlfer, or tlllc-to-tlllc communicettone, oreet, but WRITE IT DOWNIAlao, keep the blle functio·Htv of the network cl·r, consiae, and simple. Too anv QDOd tntenttom Qet shot d!Nn beCI· the blle retto·l· WI too complex for technical penonml to undentend, much 1· the meA191ment penonml who hive to approve end budoet for tt. Remember that gour compeng's ···nt ts the stanlng euthorltu for technical pure'- 1111 direction,, l"fJIJllnll· of whit VDU hive been told. If thev cen"t undentllll whit the .-. are,, veu can bet thlt thev v111 be ·n thin a little eppnhemrive about i nstellt ng
technoloav thev do not undentllll. I once told · compenu thlt a network does notht na end then
explained thlt tf tt did engthing et ell, thev 1hould be oled. Setting expectettoa t1 verv important and this is eccompltst.I bg carefullv defining the netvork functio·lttv.
So fer, tdenttftcetton of need end identtftcetton of functto·Htv hive been defined. NoY corn11 the problem of cost. Networks ere just ltlce sustems in menu wus: thev hive ·life cucle, thev requtre periodic upgrading ·Ill expansion, there ere recurring costs such es softvare end hll'Mn rneinte·nce, telco aervtce, packet aervices, modems,, etc., thev requtre penonml to ···nt 1111 rne1 ntet nthe netvork components, softvare mev need to be developed · there mev be costs for softvere engineering or eppltcettom proaremming, etc... The point t1 this: if VDU thtnk that beCI· network components are less expensive then a otven sptem, thtnk .an.
The ovenn cost ofaervtces 1111 expenston vtn shiv that over 1 period ofti·, the netvork ·v
turn out to be the most costlv portten of veur ovenll computing plan. Whg? Stmple. Netwrb,
for 111 the htoh-tech bruhlhl theu hive oenented, ere verv expensive to tnsten end oper*
NTW-30

1
over e period of time beceU88 theg ere ·11rvtce-intensive: Whet this refers to is the feet thet networks require the use of vendor services more than a tvptcel computer sustem might due to their inherent complexitv end leek of 1 Yide undemanding of network technologv bg users, progremmers, and managers. Netwrb are used for communications and communications serv1ces are expens1ve. Yes, netwrb cen save a compenv a lot of monev If THEY ARE USED CONSISTENTLY AND PROPERLY. The Sid tiring is thet Yithout proper design, neither consistencg or proper use of a net'iOrlc is achieved bg most netwrlc users. To illustrate hlN expenses can creep up on gou, here are some things that affect the cost of netwrlcing:
oCost of hard\llre components (modems, cebling, channel tnterfaces, controllers, cabi netrv, protocol converters, 1i ne conditioners, protocol analgzers, time domain reflectometers, frequencv spectrum analvzers, breakout boxes, btt error rate testers, multiplexers, packet assembler /disassembler boxes, trefftc anal gzers response ti me anal vzers, phone set tester, line testers, manual and automatic witching units, autodtalers, protocol stmulators, converters, data encrgption equipment, auto call beet units, data compression units, junction penels, 1t ne drivers, protocol converters, repeaters, bridges, voice frequencv testers, front-end procestors, servers, and manv others)
oCost of sonwre components (netwrlc1 no architecture pectages (such
IS DECnet, S~, TCP/IP, end others), protocol emulators, protocol converston, data compression, data analvsis, netwrlc management, netwrt troublesboottng, netwrlc stattsttcs, netwrt secur1tg, netwrk applications (such IS electronic mail, distributed data baae applications, office sgstems, etc...), operating sptem interfacing softvareI etc...) o Cost of operational services (leased-line cost, building conduit space costs, peclcet-Nitch netwrk hookups, peclcet-Nitcbed network lcilopaclcet charges, equipment leases, cable installation end add-ons, earth station channel charges, transponder channel charges, dial- up charges (dlvttal serv1ce), dial-up charges (analog serv1ce), service surcharges for exceeding pre-agreed usage levels of shared services, general equipment maintenance, softvare maintenance, ptclcup/deliverv end destination charges, line conditioning, per-call maintenance, per-call consulting services, administrative charges, etc .. .) o Cost of consulting (netwrk design, data collection, data reduction and analvsis, net'iOrlc topologv, traffic matrix, routing matrix, performance models, app11cettons destQn, app11cettons programmtng, queueing delag enalgsts, netwrk technologg ISS888ment, netwrk implementation, network installation, network management, netwrk user training, netwrlc progremmer training, network manager tretning, network project management, network troubleshooting and fault finding, netwrlc enhancements and add-ons, netYork Interconnect des1Qn and implementation, interconnect training, netwrk planning, netwrk facilities survev, and manv more) oCOst of replacement due to 1mproper 1ntt1a1 destgn (all of the above plus the original cost to implement the current netwrk)
NTW-31

- - · - - · _ --- ____ .._ __ __ - __ .... .......,, -....-....~.................____,........

........................ _.,_,,

_ --, _ .... ... .. ,,........., ...... ,. , ............... ,, ""'·""" "'"'""'"_, ,,,.,. .. ........

............. ,_, ,_____,_,,_,,.,

Whtie tht1 mag look ltb en extensive ltst, tt t1n't. That means that then en plent, of other costs that can come out of nwhere that wre not expected or not properlu planned for. You meu look et thla ltst end ·· to IJOUraelf thet IJOU don't need 111 the stuff listed 1bo¥e. Thta ·· be tr·, but I feel thet with the influx of netvork technDlogg end the price of the hlnlwn droPP1na, uou vtn ftnd uounelf1nvo1Yld 1n netvort1na 1n the · r future 1f uou ere not elrtldu involved. This el· means that elthltugh IJOU mag nDt ··me ofthe equipment end components Hated eboYe, vhet's to ·IJ thet uou will nDt later on tn IJOUr current compeng or in ·me other computtng 11fe? Bg the wu, for ell uou MicroVAX 11 bU'8rs out there, do gou hltnestl utht nk that IJOU can dD withltut en Ethernet betveen them for too long? Ditltel dDeen't thtnk ·· For all IJOU compentes buvlna 11¥ ll's end nDt thtnt1ng about netvort1ng them, dream on. Menu compentes thet Idlll vith ere just now starttng to· the problem of purchlstng MY ll's. It's nDt the cost of the hlnlwre or the functtoneltt' (vhtch are superb, b· the ..,.,) - its the distributed management, support, end 1ogtst1cs costs thlt t111 uou.
NIN thet w lwve tdenttfted 1 Med for 1 netwrk, ve knw vhet it is supposed to do, end ve knw that there ere a lot of thtngs thet can etrect the cost, the next thtng to do ts rule number three of netvork deai9n: the lite aurve,.
The atte aunev ta nDt e trivtel thtng. Site aunep involve the canful exemtnetton of compenv flctltttea, building erchtttctun, pho· flctlttiea (tf IJOU are using pho· ltnea), extattng computer hint.tare end sottwre components, mmtneuon of extst1ng contracts (to see 1f some
elreed' CO¥er the needs for the network), power fectlttta, HYAC fectltties, wi rewp and vi n
centers, electromagnetic interference possibilities, radio freq·nclJ interference possibilities, 111etu 1asues, ·urttg 1ssues, building vtrtng end ftre codes, electr1ca1 codes, recept1on end 1htpP1ng fectlttta, building ntntenence capebtlttta, on-lite or vendor metntenence capebtltttes, end other related items. Whtle this mllJ tntttellu ·m to be nDt neceaseru, consider vhet happened to 1 friend of mtne vhen he WIS designing the cable laVout for 1 larve electric compen,. He carefullg IMllUnd t.. cable length needa end Uled ·building diagram Given to him bu the c.to·r a the bests for leuout of the vi re plan. Whit he did not know WIS that he WIS using en old plan end thet meng of the wlls end virewp hid changed. Al 1 result, he planned wire runs dlrectlg through the wmen's restroom, vhlch WIS not on the building diagnm. fortunetelg, stnce 1 proper stte tunev tnvolves the c.tomer, softwre, hint.tare, ·les, ·rvice, end other ·lected per.n·l, the mia-l·Vout of the vtre plen vea caught befon the
plan ws ft neltzed end corrections wre made. Site survep tnvolve menu people end require quite 1 btt oftime to properl'J l·V out the netwrk tn the envtronment t nwhich it "'111 function end to t·un thet 111 the ·p111J1ra· 1n vhere t..v1n auppoeed to be vhen thev an 1uppoeed to
be there to 1naure 1 smooth tnsta11et1on of the netvort.
Rule number four ts the beslc netwrk design, date collection/nductton, end date 1nelpts. Netvork del1Qn, a I se1d before, 1s not a stmple a throwing the vtre dlNn, hoot1ng tt up, end toatng ·me Mftwn on the mechl·. Netvork delt9n t1 · ICtence thet hie 9rwn quite complicated · more end more sophtsttceted netwrb hive evolved. Anetvork desioner starts out bg acttwlgand eggnsstvelvtnvestigattng 111 the needs, vents, hopes, and aptnttons for the netwrk thlt 1compang viahel to implement. He then tabs the just1ftcatto· thet e compeng hie vrttten up., the functtone11tu statement, end ti· atte survelJ end tdenttftes mtastng perts end pieces necn11r, to the network desi9n. folloving collection of date to .ttlfg the perts end
pieces thet en mtatng, the designer sets out to tnvestt911t the proper tvpe of technD109· thet the companu requl res now end to achieve thet r future Q081s for the netvork. lsolet1on of the
proper techno109v ta a critical step tn ·ltd netvork deat9n. Bv providing elternettve technologies, the netvork destoner can Clive the customer e fev aood opt1ons bu vhtch to

NTW-32

t
implement t· Mtwrk, vhtch cen result in time end cost SIYinge 11 wll 11 reducing t· risk of 1 single netwrk technologg ceustng netwrk failures due to flws.. bugs.. or other problems. Once 1 aeries of techmlogtes 111¥1 ·n defined, tt. dest9ner tt.n uses mett.mlticel modeling teols (manual end computer-bleed) to figure out date flov ratios, problbiltttea of error, queueing delep., Interconnect problems., least-cost netwrk topoloatcel leuout., routing paths., redundlncu pethl, end menu ·re nece111ru items eaeentiel to aoltd network dest9n. Tim mdeled date ts collected and reduced to nmnlntful flCtl end ft9urea about t· des19n end compared to netwrlc requl rements dictated bV t· customer. If the results tit the requlrements vindlni, the netwrk deat9n being enelped meu lie .tul int· cuetomer't eRYtronment (pnwlded it meets phptcel needs, support needs., etc.). This pncess ta repeated for everu reeeonable netwrk· technol09u until 111 t· potential technologies ere completelv modeled. following t· modeling of netwrk date, 1 ftnanct1l 1nelpts is done to determine hov much t· network ta 91ring to cost to Implement., start-up, metntetn., end expend. Thts la another exhaustive enalpta thlt requires thought on the future of t· network 11 wn 11 epplvt ng pncttcel experience vtth the theorettcel network model. Ffnallu, an 1191SSment analysts ts perform.I to identifu netvorb thlt ere ·moat· useful (cl.at to the desired functtonamv> end ieest· useful (on the right track, but not cl...t to the deal red combtnation of price/performance/... of uee, etc...). Once en of these items hM been done, the netwrk designer takes the results beck to the site surveu teem alll wries vtth them to iron out enu perttculer problems vtth t· netwrlc dest9ns 11 wll 11 ·lp i·lete vhich deat9n beet suits t· needs oft· cuetomer.
Another document the network dest9ner vtll t'ptcallv generate i1 one *fintng penonnel needs and operational considerations. Thts document tvptcalhJ describes the tupe of penonnel
nece.rv to get the Job do· end vhlt lctnd of penon·l vtn be necesserv for the ·v-to-dlv
tupport oft· Mtwrlc end tts related componentt. In addition tot· beee penonnel needt, 1
breelcdovn of costt ng for such penonnel might also be t ncl uded.
Once a particular netwrk deat9n hit ·n identified bg t· netwrk deai9ner and t· site survev teem, · formal design document la drifted vhtch documents the ntto·le for the destan. a description of the components, e network topologv, a vtring diegrem, expansion capabilities,
expected life cvcle, applications support eRYtronment (and r-bte descriptions, if applicable),
netwrk maneaement environment, potential problems, dlta throughput anelpta, testing and veriftcetton pncedura, identifiCltion of Mtwrk inatelletton ret0urca, en implementation timetable, penon·l end tretntng needs.. cost analusts.. end rtsb. The formal desion document ta the blckbone to the network design 1111 aerves 11 1 9utdelt ne for implementation 1111 expansion. Follovtng generation oft· deat9n document, a preeentltion is al· cneted for t· cuetomer's management so thlt ell perttes Involved thoroughl v understand vhlt t· network loob 1tIce, vhat it ts capable of doing, what resources are required, hov long it vtll take to implement tt and hov much it vill cost to fmplement, support, end maintain.
Bv nov veu hive problblv reelized that t·re ta not 1 .twrk in piece, vet, end still t·re hive been quite a fe'i people Involved end an obvious amount of vork his been done. Whv oo throuoh
ell thta 9rief just for 1 netwrlc?
TM anaver 1s 11mple end vet complex (the utn end VIAD of netwrb): proper bustMll
procedure and reduction of potenttel risks. I hid a management friend of mt ne come up to me once and 11ked me vhv ell of thta ws lllCIS9lrv for the ·Ice of installing a Yin, some controllers, end some sottwre. I told htm thlt It ls Hice plegtng the stock market. There ere people vho buv ·
stock llecauee tt ioots· toOd; thev mev not hM qualified the prospect, but thev hive a toOd feeling about tt, so thev buv the stock. Thia ts the ·out felr eppr.h. Sometimes tt vorb,
NTW-33

, - - - - - - - - - - · - - .. ,,,-,..........,.,,

aomettm11 it dolln't, but studies have proven thlt tt doll not wrlc more often thin not (about

78Sfltlures).Granted, tMreereaomethlt ·mto lcnw lw to ueethegut feel ·PP"*hver,

reed·· wll 1111 are wr, pd et tt, butt'- people ere wr, few 1111 fir betwen. T,. .colll t,pe tr.,

to plet ta. steclc nrbt on their wn. ra.., reed up on tt for 1vhtle,

enelpia wrk on

Qlven atoclc tupes, end proceed to uee 1 dlacount broker to Invest thetr moneu tn atocb thlt the'

·lect. Thta ·PP"*h ta ua·llv not suceSlful for 1wrt long timed· to the long leerntng curve

necemrlJ to plelJ t· stm:lc 919· 1111 t· wd to vetch stocb over 1 prettlJ fltr piece If tia.

The aelf-brolcer stock plever ts ··ll· dlsmell1 profttable et ftrst end me1 Improve later on 1f

· doll not Git fruetreted 1111 quit ft rst. TM tlri rd t.,pe If steck ple'8r ta t,. ht9h-rl1k optione

pleuer. Thts t'pe C1n be 111mbler tgpe end CIA nice 1 lctntng or GO buet tn · ntter of····

Opttom pleuers 111¥1 to r111lg understelll tlm nrlcet to pl11 wll 1111 profit. Tim fourth t1pe ts

ta. steck plever thlt . . a broker to Invest Iris monev in stecb in hepes thlt tlm broker can

ptclc tlm right stocb end melce the right decisions to generate 1 proftt for the atoclc plauer. Thts

ts aomwhlt attn to using aconsultant: there ere wr'J, ver, pd stock brokers, but there ere a

lot of mediocre or paor stm:t brokers vhe ere not overlu cautious Yith their customer·s

111¥1Stnntt 1111 C1n ruin potenttellu reaoneble dells. The ftnel t'Jpe of stock plever ts one vho

1· 1 atoclc expert end CIA pl·'J tlm 91n himeelf vtth confidence d· to lri· in-depth 1111 expert

understanding of tlm stack merbt. I then told mu friend thlt most people ere veru l·ru about

pl1..,tng t,. stocb bt t,.maelws. Iaked Mm lw nn, options pl1vers he knew and how nmnv

expert steck plavers Im knev. He answnd thlt hi didn't lcniN anv. Most people interested in the

stack market tru to ft nd 1 QOOd broker end the amount the1 PIU the broker ts wrth tt for the

lower risk thlv ere taking, the lack of need to become 1 ·9uru· in the stock nrlcet methodologv,

not to mention t · reduction in time thlt it takes to monitor their investment.

WMn looking et network design and ··1pis, the nt n nriatalce thlt menv companies nice is
that theu ·PP"*h 1 netwrk tn the seme manner that theu mtoht ·PP"*h the self-broker methodolOQv. Nothing could be wrse. Hetwrb hive some flt rl v·rious restrictions on them that nnv aptems do not as wll as the feet thlt there are nn1 more sptems ·experts· thin
there ere netwrk ·experts· due to the complexttu of netvork design es vell es the leek of
91neral netvork desi9n educetton end information. Host sptems hive training end documentt available for learning the hovs and vhp of sptems hlnlvlre and softvare. Hetwrb,
unrortunatel1, ere subject to the vh1ms of multiple t1pes of sptems trQtng to talk to one
another, freq·ntl1 on differing technolOQ'J, end talces on dimensions thlt most sptems never
hive to wrru about. Compound thlt vtth 1 aevere leek of QDOd, clear ueer documentation, technolOQI tnforlllltion, and design documentation, netvork desi9ners capable of designing superior networb ere fev end far betveen end ue·llv relv on hllYV experience end leerning netvorkt ng ,he hlrd veg:

If IOU have been scared to death about netwrlc dest9n end ··l'Jlis es· result of redng thts treatise, QOOCI! It also means thlt VDU mev nw realtze thlt the proper desl9n of· net.tort ts critical to nlcing the network cost effective over the long run· wll ·understanding thlt juet beceuee ueu 111¥1 sharp sustems people, the1,1 me' not be able to desion 1 netwrk properludue to leek of tnforlllltion end experience. Ustng consultants tn the net.tort desiQn phase can help
drasticall1 reduce the risk factor of the netwrk and 1 pd consultant can tell VDU vhat hi can do end vhlt gou can do. Th1s vtll seve moneu 1n the short end long term es ven es provide IOU a
aoltd netvork desi9n. Wlrile it is true that VDU can desi9n VDUr network VDUrself, it is not necessarll v true that the netwrlc Yill survive over the long haul nor cen VDU feel comfortable
thlt 1t Yill perform es expected 1f VDU hive not done a performance anelvsts before the netwrt 1s t n plece. One of mv partners calla network Mtgn the ·frem-011 Principle,· named after the
Fram-on commerctels on TY vhere 1 greesu mechanic ts shoving off a blovn engtne end ·us

NTW-34

1
"You cen PIV me DIN# or PIV me Jeter.· Netwrlct en much the 11me. Proper netwrt desi9n cen 11ve a ton of momu do'.'n the road and ts cost-effective up-front tf done correctlg. If uou are
penng-Yiae and dollar-foolish# gou will# indeed# end up pevf nv 11fer. The next tt me uou loot at destgnt nv a netwrt for uour compeng or uour friend. ao dovn the 1tst
of benefits at the be9ining of thit article end est ljOUnelf if ljOU he¥e received 111 of them. If not# gou mag hive misaed aomethi ng aonwhen. If gou cen cllimthlt gou hive them all# gou hive
benefttted from a good netwrk des19n and can expect veers of cost-effective aervfce from gour
netwrt.
NTW-35

1

OFFICE AUTOMATION SIG STEERING COMMITTEE

Chairman Katherine' Kif Trimm Pivotal, Inc. Tucson, AZ

ALL-IN-1 Working Group Leon E. Ottley Evans and Sutherland Salt Lake City, UT

Vice Chairman Ralph Bradshaw Johnson and Johnson Raritan, NJ

Symposia Assistant Sal Gianni Northeast Utilities Hartford, CT

Communications Committee Representative E. Catherine Ditamore ARA Services Philadelphia, PA
Symposium Coordinator Mitch Brown Gen Rad, Inc. Waltham, MA

Store Coordinator Mike Jackson Air Force Operational Test and Evaluation Center Kirtland AFB, NM
Personal Computer SIG Liaison Cheryl Johnson Grinnell College Grinnell, IA

Special Projects Gene LeClair HO Dept. of Army Washington, DC

Networks SIG Liaison Gene Leclair HQ Dept. of Army Washington, DC

BOF Coordinator Ray Kaplan University of Arizona Tucson, AZ

DECUS Europe OA SIG Andreas Verbay Telinco AG Spiegelstrasse 20

Newsletter Editor Therese LeBlanc Wheeling, IL
Library Bob Hassinger Liberty Mutual Research Center Hopkington, MA
Tape Copy Coordinator Randall Buck Columbia Savings Irvine, CA

Digital Counterparts Les Agigian Digital Equipment Corporation Merrimack, NH
Geof Bock Digital Equipment Corporation Merrimack, NH
Session Notes Martha Rudkin GM F Robotics Troy, Ml

OA-i

FROM THE EDITOR
Welcome to an exciting new year of sharing information through the OA SIG Newsletter. The OA SIG Steering Committee has been growing and the Fall Symposium in Anaheim, CA marked the several changes and additions to our ranks. The new list of committee members, and the positions they hold is on page OA-i. One of the changes you will notice is that I have volunteered (or was I volunteered?) as the Newsletter Editor fdr the OA SIG, but I need your help! Our newsletter is the place for you to share technical information, software fixes, customization ideas and a host of other information regarding Off ice Automation with each other. So why not send me something to publish? Send your submissions to me at:
Therese LeBlanc 275 London Wheeling, IL 60090 (312) 459-1784 Please follow these simple guidelines when submitting material: - Make sure the information is clearly, darkly printed - Check your spelling ··· please - If you send multiple pages, number them - Include your name, address and phone number so I can contact you if I have any questions
Wishing you all health, happiness and success in 1986.
('Jj~
OA-1

1
NEXT OA SIG CHAIR NAMED Katherine "Kit" Trimm was named Off ice Automation SIG Chair Elect at the OA SIG Managment meeting held December 8, 1985. Kit has been a key member of the OA SIG Steering Committee and Symposium Coordination team for the past two years. She has demonstrated her leadership and organizational skills in all phases of Symposia support, particularly in preparing, scheduling and running the OA sessions. Founder and current OA SIG Chair Thomas Orlowski, will continue in his roll as Chair until the Spring Symposium in Dallas. He will then provide ongoing support to the SIG Steering Committee. The members of the OA SIG would like to thank Tom for his vision and persistance in founding the SIG, and for the excellent leadership he has provided them with for the past three years. As Chair Elect Kit will be working closely with Tom for the next four months developing her knowledge of this position and preparing for the Spring Symposium. We congratulate Kit and wish her continued success as a DECOS leader.
OA-2

NOTES FROM THE FALL SYMPOSIUM
From the opening Roadmap session Monday morning to the Wrapup Friday afternoon, the attendance and participation in the OA SIG symposium sessions was outstanding.
We had five full days of sessions cove~ing a variety of topics: OA concepts, new products, system management, message router, communications, work stations, user panels, VTX and much more. The user presentations were excellent and we had several highly technical sessions which were well received.
Strong involvement by our DEC counterparts helped make two of the week's highlights possible; the OA Question & Answer session, and the OA Wishlist (things users would like to see done or added to DEC products).
We're not certain, but we may have broken a record at the Q&A session on Wednesday evening. We had close to 20 DEC representatives in the same room for two hours! Eleven"Of them were the official 'answer' panel and another six or seven were in the audience to help out if needed. The best part of all this was that they were there to listen and respond to user questions.
The OA Wishlist session on Friday morning began with DEC representatives responding to the wishlist items presented to them last May in New Orleans (a reprint of those responses will appear in the February newsletter). A steady stream of new wishes gave DEC reps. another list to take home with them and respond to at the Spring Symposium.
There were also many informal Birds Of a Feather (BOF) meetings held by OA users with similar interests and concerns. The Executive Track day (on Thursday) for senior management helped to provide high level management from many different companies with the dynamic concepts of Office Automation and some real life case studies.
This is just a sampling of the sessions and activities sponsored by the Off ice Automation SIG in Anaheim. Our SIG is growing and evolving at a rapid pace and we look forward to more exciting programs at the next symposium. We invite each of you to attend and participate in the Spring Symposium, April 28 - May 2, in Dallas Texas.
OA-3

mALL-IN-1111
NEWSLETTER December 1985 DECUS Edition
0
)>
~
mamaama .

First Printing, December 1985

Copyright (c) 1985 by Digital Equipment Corporation. All Rights Reserved

The information in this document is subject to change without notice arid should not be construed as a c0111Ditment by Digital Equipment Corporation. Digital Equipment Corporation assumes no
responsibility tor any errors that may appear in this document.

The following are trademarks of Digital Equipment Corporation.

mamaama·
ALL-Ill-1 DATATRIEVE
DEC DEcmail DEcmate DECnet DECspell DECsystem-LO

DECsystem-20
DECtalk DECUS
DECVriter DIBOL MASS BUS
PDP P/OS Professional Rainbow

RSTS RSX UNIBUS
VAX
VMS
VT
Work Processor WPS-PLUS

-

-

CONTENTS
The DECUS 1985 ALL-IN-1 Newsletter l ALL-IN-1 Release Notes 3 Sending Mail to VMSmail Recipients 5 VAX/VMS 4.2 Mail Fetcher 6 Converting DECmail Messages to ALL-IN-1 7 Upgrading ALL-IN-1 from VAX/VMS Version 3.n to
VAX/VMS Version 4.n 8 Time Management 9 Performance Management 11
0
)>
&.

The DECUS 1985 ALL-IN-1 Newsletter This is ·the ALL-IN-1 Newsletter for DECUS 1985. It tells you about tuning ALL-IN-1 to improve performance and how to best use and manage your ALL-IN-1 Version 2 system.
Do You Nead Support In Running ALL-IN-1 version 2?
DIGITAL offers a variety of services that can make it easier to run ALL-IN-1 Version 2 systems.
l Startup Services Startup Service Packages are available to get ALL-IN-1 operational and accelerate your productive use of ALL-IN-1.
2 Software Product Service Agreements
* DECsupport Service is the most comprehensive level of
service, offering critical problem on-site assistance and scheduled preventative maintenance. You receive telephone support that gives you timely answers and solves most software problems. In addition, you get revised versions of the software and documentation, and system newsletters or dispatches.
* BASIC Service is ideal for customers who have a staff whose
experience and expertise enables them to analyze and communicate a software problem to DIGITAL remote support centres. You receive telephone support that gives you timely answers and solves most software problems. In addition, you get revised versions of the software and documentation, and system newsletters and dispatches.
* Self-Maintenance Service is designed for customers who
require revised versions of the software and documentation from DIGITAL. In addition, you get system newsletters or dispatches and may submit software performance questions.
A variety of service options may be added to an existing Software Product Service Agreement, such as service for multiple-like systems.

3 Training From Educational Services To ensure customer success with DIGITAL products, Educational Services sells training for the installation, maintenance and/or management of DIGITAL software. The training available for ALL-IN-1 users is:
* ALL-IN-l Version l to Version 2 Migration Planning and
Training
* ALL-IN-l version 2 User Update Training
* ALL-IN-1 Version 2 system Manager Training
If you need these or any other services, please call your DIGITAL Account Manager.
0
)>
c,

4 ALL-IN-l Release Notes

What do you use your ALL-IN-1 Release Notes for? Do you ···

l. Use them when you install ALL-IN-l ? 2. Refer to them when you have a problem with ALL-IN-1?

nI I

3. Pass on relevant information in them to your users?

1-1

You ticked every box, of course!

You didn't?

Why not read through them? As well as giving you extra information for when you install ALL-lN-1, they contain extra information about the day-to-day running of ALL-lN-1 that is not
found in any other documentation.

Sections 4 and 5 describe late changes to ALL-lN-l, particularly aspects of ALL-lN-1 that changed after the documentation was
typeset, and details about the use and management of ALL-IN-1 version 2 that you should be aware of.

ln Section 4 you will find information on the day-to-day running of ALL-lN-1, for instance Electronic Messaging, printing, using the Scratch Pad and Time Management.

Section.5 gives information about the optional products that can be used with ALL-lN-1, for instance, DATATRIEVE and WPS-PLUS/ALL-IN-1.

Some of the information in sections 4 and 5 is for you, the system manager, but there is other information which your users will need to know.

For instance, in section 4 there is a descr.!ption of how to subtract from the result of a calculation. The guide describes
where to place the equals sign in the chain of calculations.
For example: Instead of entering 562 * 25 = 1450 - 50 = ···· enter 562 * 25 - 50 = ····

ln Section 4 you will also find an addition to the ALL-IN-1
documentation concerning WPS and EDT which DECmate users should know about. It tells you that if you transfer a document from a DECmate using CX (character transfer) to ALL-IN-1 on VMS Version 4.0 or later, the transferred document may lose some characters. To avoid this, users should change their VMS terminal set-up by cutting the command $ SET TERMINAL /HOSTSYNC into their LOGIN.COM
'le.

-

---

So, make good use of your Release Notes.
Pass useful information on to your users to save them from unnecessary problems.
And next time you have a problem with ALL-IN-1, have a look through your Release Notes. They might have the answer to the problem.

5 Sending Mail to VMSmail Recipients

Do all the systems to which you send mail, have Message Router and the Message Router VMSmail Gateway (MRGATE) installed?

If not, you may be having problems sending ALL-IN-1 mail to VMSmail recipients.

If Message Router and MRGATE are not installed on every system in the network, use the address format:

TO: username @nodename @MRGATE @gateway_node

where gateway node is the name of the node that is running MRGATE, and can be omitted if it is the local node name.

The address format given in the ALL-IN-1 documentation is:

TO: username @MRGATE @nodename

0
)> ~

This format is the correct way to address mail to VMSmail recipients only if every system in the network to which you send VMS mail has Message Router and MRGATE installed.

6 VAX/VMS 4.2 Mail Fetcher

If you are running VAX/VMS version 4.2 on your system, the Electronic Messaging fetching routine will not finish if a mail
message containing an attachment is received by the Fetcher from a remote system. The fetching routine has the process name of
"Al Fetcher· and is queued as a batch job called OAMTIMAIL. This problem causes excessive use of CPU time.

Workaround: If you see that the batch job OAMTIMAIL is running continuously, stop the Fetcher using the DCL command STOP "process name·. You can then use the RF option in the Electronic Messaging System Management menu in ALL-IN-1 to interactively fetch the message. The batch job OAMTIMAIL will start again when another message is received.

This problem·is fixed in ALL-IN-1 Version 2.1.

7 Converting DECmail Messages To ALL-IN-1
o Converting DECmail messages to ALL-IN-1 takes approximately 40 minutes for 100 memos. The more memos there are, the longer it takes to transfer each memo. Therefore it is advisable to ask users to delete any unwanted memos before transferring DECmail accounts to ALL-IN-1.
o Even if only one account from a save file is being transferred into ALL-IN-1, all the accounts in the save file are transferred, and the unwanted ones are later deleted by ALL-IN-1. For this reason, it is recommended that you do not put too many accounts into one save file.
o The conversion program runs as a batch job. Do not run the conversion program in a batch queue which has time limits set.
If a conversion for a user fails, you must complete the following steps before attempting the conversion again:
1 Log into the ALL-IN-1 system manager's VMS account (or the account where the conversion was initiated) and run ALL-IN-1. Delete the folder called Decmail Conversion, if it exists.
2 Log into the user's ALL-IN-1 account and run ALL-IN-1. Delete the folder called Odm Master, if it exists. Enter ti following ALL-IN-1 command while in the user's account:
<CAB GET_PENDING "DMCONV","WASTEBASKET"
In ALL-IN-1 Version 2.1 these tasks will be done automatically,
Converting DECmail messages to ALL-IN-1 is described in the ALL-IN-1 Installation Guide. The ALL-IN-1 Release Notes contain additional information--ui'it you should read when converting DECmail messages to ALL-IN-1.

8 Upgrading ALL-IN-l Vers_ion 2 .s from VAX/VMS Version
3.n to VAX/VMS Version 4.n 4.n
If you are, or have been, running ALL-IN-l Version 2.e on VHS version 3.n, then ALL-IN-l's indexed data files will have a Prolog o.f l. If you upgrade to Version 4 .n of VHS, you must convert the indexed data files to Prolog 3 to allow ALL-IN-1 to access the files correctly.
You can see the Prolog of a file using the DCL command DIRECTORY/FULL.
When you have upgraded your VAX/VMS system to Version 4.n, carry out the following procedure to convert the relevant ALL-IN-1 files to Prolog 3:

$ SET DEFAULT OA$DATA $ CONVERT/PROLOG·3/FDL=OA$LIB:NETWORK.FDL NETWORK.DAT NETWORK.OAT $ PURGE NETWORK.OAT $ CONVERT/PROLOG·3/FDL·OA$LIB:ATTENDEE.FDL ATTENDEE.DAT ATTENDEE.OAT
$ PURGE ATTENDEE.DAT $ CONVERT/PROLOG·3/FDL·OA$LIB:MEETING.FDL MEETING.DAT MEETING.DAT
$ PURGE MEETING.OAT

and for each. ALL-IN-1 user:

0
)>
00

$ SET DEFAULT <user's ALL-IN-1 directory> $ CONVERT/PROLOG·3/FDL·OA$LIB:DOCDB.FDL DOCOB.OAT DOCDB.DAT $ PURGE DOCDB.DAT

$ CONVERT/PROLOG·3/FDL·OA$LIB:ACTITEM.FDL ACTITEM.DAT ACTITEM.DAT

$ PURGE ACTITEM.DAT

9 Time Management
You should be aware of the following attributes of Time Management which are not described in your Release Notes. These are all corrected in ALL-IN-l version 2.l.
o When an apostrophe (') is typed in the meeting location or description field,-the meeting is scheduled but when an attendee tries to read the message they will cause an access violation.
Solution: Do not enter an apostrophe ('I in these fields.
o Someone whose ALL-IN-1 user name contains a comma can delete a meeting that he or she schedules, but attendees cannot delete the meeting from their calendars.
Solution: If possible, avoid creating user accounts with names containing commas.
o When the Advanced Calendar (AC) option on the Reminders (REI menu is used, the file ACTITEM.DAT is left open if a date without any reminders scheduled is selected.- Eventually the limit for the number of files that may be left open is reached and an error message is displayed.
Solution: Exit from ALL-IN-1 when the open file limit is reached. ALL-IN-1 closes all open files when this is done. You can then enter ALL-IN-l again.
o If you send a meeting notice to an attendee who has the same name as yourself but is on another node, you will never receive the attendee's reply.
Solution: If possible, create user accounts with names that are as unique as possible, for example FTSMITH instead of SMITH.
o If you send a meeting notice to an attendee whose User Profile language is different from yours, the meeting will not be scheduled.
Solution: Under development.
o When scheduling a meeting, ALL-IN-1 does not find all of the attendee's free time and sometimes states that attendees are free when they are not.
Solution: Under development.

-

-

o Time Management does not find all conflicting meetings and appointments.
Solution: None currently available.
10 Performance Management
Your ALL-IN-1 system must be carefully managed to maintain a consistently high level of performance. Effective performance management of your ALL-IN-1 system involves:
o Reviewing the hardware and software configuration
o Reviewing and monitoring system performance and workload
o Tuning VMS
o Keeping the ALL-IN-1 File Cabinet and Electronic Messaging system well maintained
These four activities are essential for maintaining good performance and avoiding performance problems.
There is a complete discussion of ALL-IN-1 performance management in the ALL-IN-1 Performance Management Guide. A summary of the key issues is given below:

10.1 System Set-up

0

)>

It is important that your system has adequate hardware resources

cb

to meet its workload. Make sure your system been configured according to DIGITAL recommendations for processor power and

memory size particularly as your system requirements change, for

instance, when the number of users increases.

Review the user working set parameters (WSDEF, WSQUOTA and WSEXTENT) in the system authorization file.

When ALL-IN-1 is installed on your system, you will almost certainly need to increase the size of your PAGE and SWAP files and you will probably need to allocate secondary PAGE and SWAP
files to different disk devices. Refer to your ALL-IN-1 Performance Management Guide for further details.

10.2 Monitoring and Reviewing the System
Monitoring system behavior and usage is the most important aspect of performance management. A good understanding of the performance characteristics of your system gives you a starting point for system tuning and performance troubleshooting and provides you with the information needed to plan ahead and avoid problems.

It is recommended that you:
o Monitor system resource usage on a daily basis and keep summary records of day-to-day resource usage in these areas: Average and peak processor load Avearge and peak page fault rates Average and peak disk 1/0 traffic for each disk device

The VMS supplied MONITOR utility provides the facilities to do this.

o Periodically review memory usage characteristics, particular!y:
Paged and non-paged pool usage against availability
Request packet (SRP, !RP and LRP) usage against availability
PAGE and SWAP file space in use

The DCL SHOW MEMORY command provides this information.

o Run process level accounting on a daily basis to keep track of which users or groups of users are using system resources. Summary statistics on a user-by-user basis should be kept for
analyzing trends which can be used to assist with growth prediction.

Refer to the VAX/VMS Accounting Utility Reference Manual for

details of how to use the ACCOUNTING utilLty.

~~~

10. 3 Tuning VMS
There are a small number of VMS SYSGEN parameters which should be checked and, if necessary, adjusted to get the best out of your ALL-IN-1 system. The most important SYSGEN parameters to review are:

NPAGEDYN and NPAGEVIR PAGEDYN LRPCOUNT and LRPCOUNTV SRPCOUNT and SRPCOUNTV IRPCOUNT and IRPCOUNTV MPW HILIMIT MPW-LOLIMIT MPW-THRESH MPW:WAITLIM
Please refer to the following additional sources of information:
o ALL-IN-l Performance Management Guide
o .9.!!!!!! ~ VAX/VHS Performance Management
o VAX/VMS System Generation Utility Reference Manual

You should not adjust any VMS system parameters unless you know exactly what you are doing and why. It is easy to degrade the
performance of any VHS system by careless or uninformed adjustment of system tuning parameters. Only make changes to the system if you have an informed reason for doing so.

If you are unfamiliar with VAX/VHS performance characteristics

and the effects of the SYSGEN parameters listed above, contact

your DIGITAL Account Manager.

0

~......
0

10.4 Housekeeping and Maintenance

10.4.l File Cabinet Reorganization

From time to time, the ALL-IN-1 File Cabinet must be reorganized using the File Cabinet Reorganization option. How frequently you reorganize the File Cabinet varies from system to system depending on the workload. It is recommended that you reorganize
at least once each week, but it may be necessary to do it more frequently if you notice that performance is becoming degraded.

The most visible indication that the performance of the File Cabinet has been degraded is the response time to perform File Cabinet access operations such as:

0 Selecting a document 0 Deleting a document 0 Creating and editing a document 0 Sending mail messages 0 Indexing the file cabinet
19.4.2 File Cabinet Index OA$DATA:DAF.DAT is an indexed file that holds reference data on every document in the File Cabinet. It can grow very rapidly and thereby degrade system performance. It is important to make sure that unwanted documents are deleted when they are no longer required.
If a user keeps a large number of unwanted files in the File Cabinet, it can degrade system performance. Encourage your users to delete unwanted documents regularly. In particular, Electronic Messaging can lead to large numbers of documents being kept in the File Cabinet unnecessarily.
19.4.3 Housekeeping the Electronic Mail System The ALL-IN-1 Electronic Messaging system maintains two log files defined by the logical names OA$MTI_LOG and OASHTI_ERR.
o OA$MTI LOG keeps a record of each mail message sent on the system7
o OA$HTI ERR keeps a record of any error messages caused by sending and receiving mail messages to and from remote addressees.
As these files increase in size, it takes longer to append new records to them and the speed at which mail is sent is degraded. It is recommended that you periodically close, archive and replace these files to prevent them from becoming too big.
10.4.4 Removing Unused Facilities If you customize ALL-IN-l, you may have forms and scripts that you do not use. You can save memory and improve performance by removing unwanted forms and scripts from the installed memory shareable libraries, OAFORM.FLB and AlTXL. Refer to Chapters 15 and 16 of the ALL-IN-1 Application Programmer's Reference for details.

-

-

DECUS
PERSONAL COMPUTER SIG NEWSLETTER
-

PERS~L COMPUTER SIG STEERING CIJ't'IITTEE

Chairman Barbara Maaskant UT Health Science Center 7703 Floyd Curl Drive
t~~ 2~n~~~~~g5p< 78284
Symposia Coordinator Rick Eliopoulis 5258 Vickie Drive
r~~ 9~i~~g! 7~7 92109
DECmate Working Group Chairman Cheryl Johnson Grinnell College P. O. Box 805
~~l~)e~1G-1~70 50112-0810
Pro Working Group Chairman Thomas R. Hintz U. of Florida IFAS Computer Network, 1022 McCarty Hall Gainesvillei FL 32611 (904) 392-5 81
Rainbow Working Group Chairman Lynn Jarrett Union Tribune Pub. Co. P. O. Box 191
f~~9~i~g~!3~1 ~;f~~O)
Newsletter Editor Caroline M. Mack 9007 Mears Street
~~b~~a~~0~40 ~2031
National LUG Organization Rep Pierre Hahn (acting) SUNY HSC-Tl0-02808101 Stony Brooki NY 11794 ( 516) 444-1<162

Library Comm. Rep/PC Librarian Kurt Reisler Hadron, Inc. 9990 Lee Highway Fairfaxi VA 11030 ( 703) <159-6100
PC/RSX Liason Peter Flack ~~mg~t~~xsf~~3§es Corp. ~~~8~rch Triangle Park, N ( 919) 541-4669
PC/Graphics Liason Dr. Khin Maung Yin Kent State University 1411 Clarindon-Troy Road
~~r~)n95~~14~~ 201
Pre-Symposia Session Coordinato Frederick G. Howard Eastman Kodak Company 901 Elmgrove Road D345-L
~~f~~s~~4!5~1 14650
Session Notes Edjtor Alan Bruns Allied Electronics 401 E. 8th Street
~gr~>w~~~~~4~ 76102
Members-at-Large Rockey Salwinski UT Health Science Center 7703 Floyd Curl Drive
t~~ 2~n~~~~~35rx 70204
Jim Christine SPSS, Inc. 1815 S. Cuyler Berwyni IL 60402 (312) ;;129-3580
~~;ai~eN!~r~~~r Labs
Div 8352
z~Y~)m~~~!2~3 94s50
Michael Bowers University of California Animal Science Department
~~Y~!·7~-6i~~16

PC-i

Digital Counterparts

DECmate: Ron Gemma Digital Equipment Corp.

PRO:

John E. Bennett ~[3i!~c~8uipment Corp. 146 Main Street Maynard, MA 01754-2571

Rainbow:

Ke~ant~rJinfa~

Holman Equipment

Corp.

30 Porter Road

\

Littleton, MA 01460

PC-ii

-

--

RSTS

RSTS

Chairman Charles Mustain Stark County School System Louisville, OH

Vice SIG Chairman Wish Lists & Tape Copy Coordinator
Philip Hunt System Industries Milpitas, CA

Symposium Coordinator Scott W. Pandorf Kittie's Home Furnishings Indianapolis, IN
Assistant Symposium Coordinator Wef Fleischman Software Techniques Cypress, CA

EDUSIG Liaison George Wyncott Purdue University Computing Center W. Lafayette, IN
4
RSTS Product Planning Coordinator Errol E. Ethier Shrewsbury, MA

Newsletter Editor Open

Library Representative Susan Abercrombie Ventrex Laboratories Inc. Portland, ME

DEC Counterpart Joel Arker Digital Equipment Corporation Merrimack, NH

I

Pre-Symposium Seminar Coordinator

Bruce Gaarder

Macalester College

St. Paul, MN

Wish Lists Coordinator Neal E. Goldsmith Software Techniques, Inc. Cypress, CA

Members-At-Large Ed Beadel Instructional Computer Center Oswego, NY
Scott Daily Great Lakes Chemical Corp. W. Lafayette, IN
Mark Gilmore Cal State University Long Beach, CA
Mark Hartman Jadtec Computer Group Orange, CA
J~ff Killeen Information Design & Management Hopedale, MA
Newton J. Munson Rochester Institute of Technology Rochester, NY

RST-i

RSX
MULTI-TASKER
[Q]
DECUS

i

Chairman Dan Eisner Perkin-Elmer Corp. Garden Grove, CA
Vice-Chairperson Elizabeth Bailey Tennessee Valley Authority Muscle Shoals, AL
Symposium Coordinator Rick Sharpe Toledo Edison Toledo, OH
Pre-Symposium Seminar Coordinator · Hans Jung Associated Press New York, NY
Communications Committee Representative Allen Bennett Lear Siegler Rapistan Grand Rapids, MI
Newsletter Editor Dominic J. DiNollo Loral Electronics Yonkers, NY
Store Coordinator Bob Freeborn Savin Corporation Binghamton, NY
Session Note Editor Burt Janz Northern Telecom Inc. Concord, NH
Librarian Glenn Everhart Mt Holly, NJ
Campground Coordinator Jerry Ethington Prolifix Inc. Frankfort, KY
DEC Counterparts Tim Martin Digital Equipment Corporation Maynard, MA
Dick Day Digital Equipment Corporation Nashua, NH
Bruce Webster Digital Equipment Corporation Nashua, NH
Working Group Coordinator Ed Cetron Center for Biomedical Design Salt Lake City, UT

RSX
Working Group Chair Evan Kudlajev Philadelphia Electric Co. Philadelphia, PA
RSX Group Chair Software Clinic Coard. Roy S. Maull U.S. Air Force Offutt AFB, NE
Software Clinic Coordinator Bruce Zielinski RCA Moorestown, NJ
Volunteer Coordinator Gary Maxwell U.S. Geological Survey Menlo Park, CA
Multi-Processors Working Group Coordinator Bruce Mitchell Machine Intelligence & Indus. Magic Hudson, WI
Networks Working Group Coordinator Mark Podany Case Western Reserve University Cleveland, OH
SRO Working Group Coordinator Bob Turkelson Goddard Space Flight Center Greenbelt, MD
Accounting & Performance Working Group Coard Denny Walthers Amencan McGaw Irvine, CA
Menu Coordinator Ed Cetron Center for Biomedical Design Salt Lake City, UT
Members-At-Large Jim McGlinchey Warrenton, PA
Jim Neeland Hughes Research Labs. Malibu, CA
Anthony E. Scandora, Jr. Argonne National Laboratory Argonne, IL
Ralph Stamerjohn Creve Coeur, MO
Jim Hopp Carleton Financial Comp. South Bend, IN
RSX-i

I I THE .l.a.1"ke·· DECUS
11111111111111111111111111111111111 RT-11 SIG NEWSLETTERll II 111111111111111111111111111111

'b'\

~~OJ\>

FILEX cs\

llAtoiv

()~.r

PIP LD

s~s~c

PJJ

hlJl
Q~~

Q'

t.~o~
1'Ec0

PAT

~
D~

DlW

i,ll\ll

~
§0
~

8Jlcco111

v~+

~ n\JMF
'b~~
~OJlc

~~i
I llllp
~o~~

SLP
~o

¢S"E't

\~1)

~

XM

Jsw llELp

Chairman John T. Rasted JTR Associates Meriden, CT

RT SIG Steering Committee
MACRO Contact Nick Bourgeois NAB Software Services, Inc. Albuquerque, NM

Symposium Coordinator Ned Rhodes Software Systems Group Rockville, MD
Communications Committee Representative FMSContact
Susan Rasted Software Dynamics, INc. Wallingford, CT

TECO Contact Product Planning Contact
John Crowell Crowell Ltd. Los Alamos, NM
DECNET Contact Ken Demers Adaptive Automation New Haven, CT

Newsletter Editor COBOL Contact
Bill Leroy The Software House, Inc. Atlanta, GA

UNIX Contact Wish List Contact
Bradford Lubell LA. Heart Lab Los Angeles, CA

Pre-Symposium Seminar Coordinator Suite Manager
Bruce D. Sidlinger Sid linger Computer Corp. San Antonio, TX
Standards Coordinator Kenneth L Aydlett Teledyne Hastings-Raydist Hampton, VA

RT-11 Hardware Contact Carl Lowenstein University of Calif., San Diego San Diego, CA
TSXContact C Contact
Jack Peterson Horizon Data Systems Richmond, VA

-Digital Counterpart Diana L Miller Digital Equipment Corporation Maynard, MA
Tape Copy Generation Contact Ralston Barnard Sandia Laboratories Albuquerque, NM
APL Contact Doug Bohrer Bohrer& Company Wilmette, IL

Library Contact Tape Copy Distribution
Tom Shinal General Scientific Corp. Rockville, MD
BASIC Contact Ed Stevens EMDAlnc. Pasadena, CA
CAMAC Contact J.W. Tippee Kinetic Systems Inc. Lockport, IL
RT-i

Personal Computer Contact LUG Contact
William K Walker Monsanto Research Corp. Miamisburg, OH

FORTRAN Contact RUNOFF Contact
Robert Walraven Multiware, Inc. Davis, CA

RT-ii
-

--~

Cl
DECUS
/\
1' '\
;' \\
,,/'SITE'\
\\
- - - -·

t

Chairman David Hunt Lawrence Livermore National Lab Livermore, CA

SITE
Librarian Larry W. Hicks Relational Database Services Kernersville, NC

Symposium Coordinator Michael Weaver OJCS/JAD/TSD Washington, DC

Hardware Management Emily Kitchen A.H. Robins Co. Richmond, VA

Communications Committee Representative

Staff Management

·

Terry C. Shannon

Adam Zavitski

Digital Review

Tulsa, OK

160 State Street

6th Floor Boston, MA 021 09

Members-At-Large George Hilton

Compucard International

Newsletter Editor

Stanford, CT

Gregory N. Brooks Washington University Beh. Res. Lab St Louis, MO

Debbie Boole Texas Instruments Dallas, TX

LUG Coordinator Doug Bickford UVM Academic Computing Center Burlington, VT
Session Note Editor Gary Bremer Emerson Electric Co.
St. Lou is, M 0
HMS SIG Liaison Jim Corrigan Tl Research Richardson, TX

DEC Counterparts Rogers Bent Digital Equipment Corporation Stow, MA
Lil Holloway Digital Equipment Corporation Bedford, MA
Susan Porada Digital Equipment Corporation Marlboro, MA
Gary Siftar Digital Equipment Corporation Tulsa, OK

Assistant Librarian Timothy Frazer Specialized Bicycle Components Morgan Hill, CA

SIT-i

.... __.. .. __________ __ - __ ,

,.~,.,.,.

, ,,,,_., ,.,

. ,______,_ _,

"'· "'· '""' ,···"-~''"''"''

-

DECUS

UISIG Chair Kurt L Raisler Hadron Inc. 9990 Lee Highway Fairfax, VA 22030 703-359-61 00
UNISIG Symposia Coordinator Stephen M. Lazarus Ford Aerospace Palo Alto, CA 94303 41 5-852-4203
UNISIG Newsletter Co-editor James W. Livingston, Jr. Measurex Corporation 1 Results Way Cupertino CA 95014 408-255-1 500 X4468
UNISIG Newsletter Co-editor Bruce A. Bergman 2235 Meyers Avenue Escondido, CA 92025-1070 619-741-8825
UNISIG Administrative Daemon Dorothy Geiger 49 Showers Drive, #451 Mountain View, CA 94040 41 5-948-1 003

1
UNISIG
UNISIG Tape Librarian Carl Lowenstein Marine Physical Laboratory Scripps Institute of Oceanography, P-004 LaJolla, CA 92093 619-294-3678

UNISIG Usenet Liason

Joe Kelsey

John Fluke Mfg. Co, Inc.

~O.BoxC9090,M/S223B

·

Everet~ WA 98206

206-356-5933

UNISIG Standards Coordinator Jeff Gilliam National Semiconductor 2900 Semiconductor Drive, MS C2303 Santa Clara, CA 95051 408-721-3801

UNISIG Minister Without Portfolio Norman Wilson Bell Laboratories, 2C-529 600 Mountain Avenue Murray Hill, NJ 07974 201-582-2842

UNISIG DEC Counterpart Roseann Maclean DEC, MD02-1/H10 Continental Blvd. Merrimack, NH 03054 603-884-5 702

UNl-i

NEWSLETTER OF THE VAX SYSTEMS SIG

Editor's Workfile · · · · · · · · · · · · · · · VAX-3

Enhancing the VAXTPU EDT Keypad Emulator · · · · VAX-4

Spring 1986 System Improvement Requests · · · VAX-18

Digital Responds to the Fall 1985 SIR Ballot · VAX-39

FALL 1985 SIR BALLOT RESULTS · ·

· · ·

VAX-44

VAX System SIG Committee List

· · · · · · VAX-57

INPUT/OUTPUT · · · · · · · · · · · · · · · · · VAX-60

Forms at the End

INPUT/OUTPUT Submission Form · · · · · · · · · System Improvement Request Submission Form VAX Systems SIG Spring 1986 SIR Ballot · ·

OU-3 OU-5 OU-7

-

PAGESWAPPER - February 1986 - Volume 7 Number 7
General material for publication in the Pageswapper should be sent {US mail only -~ no "express" services please) to:
Larry Kilgallen, PAGESWAPPER Editor Box 81, MIT Station Cambridge, MA 02139-0901 USA
Preferea~e is given to material submitted as machine-readable text (best is Runoff source) · Line length should not exceed 64 characters. Please do not submit program source, as that is better distributed on the VAX SIG tape.
Change of address, r~ports of non-receipt, and other circulation correspondence should be sent to:
DECUS U.S. Chapter \ttention: Publications Department 149 Northboro Road {BP02) 1arlborough, MA 01752 JSA
Only if discrepancies of the mailing system are reported can they be analyzed and corrected.

PAGESWAPPER - February 1986 - Volume 7 Number 7 Editor's Workfile
Editor's Workfile
by Larry Kilgallen, Pageswapper Editor
DOD Security Rating for VMS -
Product Evaluation Bulletin number CSC-PB-01-85 dated October 28, 1985 states that the US government security evaluation of VAX/VMS Version 4.2 for the C2 class is scheduled for completion "by the end of the second quarter of FY1986". I think that means the end of March, but I am sure those to whom this matters already have good information as to how US government fiscal years run.
DEC Electronic Store update -
on December 6, to my great surprise, I received something I had ordered from the Electronic Store {I had been invoiced for it in August). With that as a model, I am hoping to receive my July order of Pascal {invoiced in November) sometime in the next three months.

VAX-2

VAX-3

-

-

PAGESWAPPER - February 1986 - Volume 7 Number 7 Enhancing the VAXTPU EDT Keypad Emulator

Enhancing the VAXTPU EDT Keypad Emulator

by Michael L. Penix
and Richard D. Piccard

Kalamazoo College Kalamazoo, Michigan
December 1, 1985

Abstract

We report the development of customizations to

the VAXTPU EDT Keypad emulator that closely

parallel those reported in the past for EDT

itself:

word

processing

enhancements,

multi-buffer operations, etc. In addition, the

reported customizations include dual-window

operation and overstrike mode text entry. We

discuss the choices made in coding, some basic

techniques for debugging with TPU, and several

portions of the code itself. This article, the

code, and a companion article describing the

customized environment are being submitted for

inclusion in the VAX SIG Symposium tape for the

December, 1985 DECUS Symposium.

Introduction
VMS Version 4.2 includes the new VAXTPU Text Processing Utility, together with two user interfaces, EVE (the Extensible VAX Editor) and the EDT Keypad Emulator. For those users who have been working with "plain-vanilla" EDT, the latter is likely to prove quite adequate, requires very little re-learning, and will therefore be chosen on the basis of its far superior performance: in one benchmark it finished in half the elapsed time while consuming CPU time at one quarter the rate that "real EDT" consumed it. For those of us, however, who have customized EDT with extensive EDTINI.EDT files, and especially for managers who have provided standard EDTINI.EDT files to new users, the choice is not immediately obvious. Our experience at Kalamazoo College should prove quite encouraging to others, since we made the transition in about a week, for over 95% of our usage, and we had extensive EDTINI.EDT files in place for all of our users. This paper discusses the choices made in coding the enhancement
VAX-4

PAGESWAPPER - February 1986 - Volume 7 Number 7 Enhancing the VAXTPU EDT Keypad Emulator
files, the techniques that proved effective for us in making the transition, and several portions of the TPU code itself. Listing 1 is the EDTINI.EDT file we started with. As can be seen, we have a variety of commands, one making EDT even more pleasant to work with for programmers by selecting alternate delimiters for "WORD" motion and deletion commands, and many enhancing EDT for word processing (defining keys for sentence and paragraph motions, for example). This file had evolved from one presented several years ago in The DEC Professional.

Choices

TPU provides two layers of enhancement, "section" and "command"

files. Section files are pre-compiled, and therefore should be

chosen for the stable bulk of the enhancements.

The

DIGITAL-supplied section file for the EDT Keypad Emulator is

SYS$LIBRARY:EDTSECINI. (The filename extension is .TPU for the

source code and .GBL for the binary code; the default when used

by TPU as a section file is .GBL and when used as a command file

is .TPU.) TPU looks for a section file in SYS$LIBRARY: named

TPUSECINI.GBL unless the command line includes a /NOSECTION or a

/SECTION=filename option.

Command files are read-in and

compiled at edit session startup, and should therefore be kept

short and used for the volatile portion of the enhancements.

TPU looks for a command file named TPUINI.TPU in the current

default directory, unless the command line includes a

/COMMAND=filename option, or a /NOCOMMAND option. (If you

specify /NOSECTION/NOCOMMAND, then the only action possible is

to exit by CTRL/Y.) A simple method to put a section file to

work is to define a DCL symbol by a line such as the following

at some point in a login command file:

$ ED*IT :== EDIT/TPU/SECTION=filename

Since no /COMMAND option is specified, it will search the
current default directory, as mentioned above, for TPUINI.TPU. Although our ultimate goal was of course the creation of a custom section file, we worked for quite a while with a (rapidly growing!) command file. The time to turn the nascent section file into a real one is when the start-up delay becomes irritating, or when you are far enough along that you want others to start trying to use the product of your efforts. we will discuss below the modifications needed to change a working command file into a working section file. The most reasonable items to leave in the command file are the two items most likely to be modified by individuals: the word wrap margin and the first tab size. These should be initialized in the section file, also, so that new converts need not have a copy of TPUINI.TPU in their directories. In order to assist ambitious

VAX-5

PAGESWAPPER - February 1986 - Volume 7 Number 7 Enhancing the VAXTPU EDT Keypad Emulator
users by providing examples, a few stable routines and key definitions should also be placed in the version of TPUINI.TPU that is made available for users to copy.
Techniques
Probably the key technique to rapid implementation is the prompt switching over to the partly customized editor as soon as possible. As you work with it to implement further changes or to refine those already in place, the lack of a customization you are used to in real EDT will act as a goad to keep working. It will also ensure that you implement the most important (i.e., heavily used) features first. We have followed the method discribed in the VAXTPU Users Guide for creating new section files layered on top of existing ones. In particular, our file "KAZSECINI" is layered on their "EDTSECINI". During the early development phase, then, we dealt with our code as a command file and used theirs as the section file. Later on, the "old" portion of our code, together with their code, served as section file and the "new" portion of our code served as command file or was the file being edited. The advantages of layering deserve some discussion: we can use their code when it serves our purpose and replace it if we want to. The design of TPU as a programming language includes named procedures as well as local and global variables, and DIGITAL's code in EDTSECINI.TPU is carefu~ to start the names of all procedures and global variables with "edt$", so by observing reasonable naming conventions we can keep track of which portions of our code are vulnerable to changes in theirs. We chose to name all of our procedures and global variables with names starting "KAZ$". During the first development phase, when all customizations are in the form of a command file, the structure is as shown in Fig. 1: procedure declarations and code, followed by key definitions to implement those procedures, and finally assignment statements initializing the global variables. During this phase the file is used as the command file, either by naming it TPUINI.TPU or by defining a symbol for DCL that includes specific designation of the command file. In the later phase, when the initial customizations are in the form of a section file, the structure is as shown in Fig. 2: first, a procedure named TPU$LOCAL !NIT (see below), second, all the other procedure declarations- and code, third, a procedure (in our case named KAZ$DEFINE KEYS) that, as you might suspect from its name, includes all of the key definitions, and finally, the commands to SAVE the current context in a named file and to QUIT. The filename given should be different, either in directory or extension or both, from the current production section file. The DIGITAL file EDTSECINI ends with a call to TPU$LOCAL !NIT, as well as including an empty definition of that procedure: By including a procedure
VAX-6

PAGESWAPPER - February 1986 - Volume 7 Number 7 Enhancing the VAXTPU EDT Keypad Emulator

with that name in our file, we replace their empty one. This procedure includes initialization of our global variables, re-initialization of some of the EDT$ global variables (changing the default first tab size and word wrapping margin, for example), and a call to our procedure KAZ$DEFINE KEYS. Although the following sequence may seem cumbersome in wrTting, it works well in practice. The main problem is the obscurity of the error messages that TPU provides, a traditional problem with the
first release of any compiler which is compounded here by the limited size of the message buffer and the consequent default terseness of those messages. It is therefore essential to maintain efficiency by incremental enhancements, checking each new procedure and key definition as you go along. As few changes as possible should be made at one time! For the sake of discussion, assume that these logical names have been defined: WORK: for the device and directory containing the evolving section file, and GOOD: for the device and directory containing the section file and standard command file most recently released for public use. Several DCL symbols are useful, as well; the following lines were included in the author's LOGIN.COM:

$ NEWTPU :== EDIT/TPU/SECTION=SYS$LIBRARY:EDTSECINI-

/COMMAND=WORK:KAZSECINI

$!

$ NED

:== EDIT/TPU/SECTION=SYS$LOGIN:KAZSECINI.NEW-

/COMMAND=GOOD:TPUINI

$!

$ WED

:== EDIT/TPU/SECTION=SYS$LOGIN:KAZSECINI.GOOD-

/COMMAND=GOOD:TPUINI

These definitions were used with a SAVE command that specified the new binary file as SYS$LOGIN:KAZSECINI.NEW. Thus, each time we thought the code was correct, we gave the command NEWTPU and watched to see if any error messages were displayed. If all seemed well, then we used the command NED to use the new editor and tried out the modified or newly introduced routines. If all was well, we RENAMED the .NEW file to .GOOD, thereby setting aside a working enhancement. At the same time a copy of the source code was set aside with a suitably distinctive name in WORK:. From then on routine editing was done with the command WED, using those working enhancements. As each round of enhancement is completed, WORK:KAZSECINI.TPU is copied to GOOD:* and SYSLOGIN:KAZSECINI.GOOD is copied to GOOD:*.NEW. Then the protection of GOOD:KAZSECINI.NEW is set correctly and finally GOOD:KAZSECINI.NEW is RENAMED to *.GBL, thereby replacing the one in use. If there is a mistake in the code (even as simple as a missing ";" termination for a statement), the only message usually visible is "compilation aborted at line l." In order to debug at all efficiently, we took the advice offered us by the Customer Support Center and used the following command sequence from the "TPU Command: " prompt elicited by <PFl> + <KP7>:
VAX-9

PAGESWAPPER - February 1986 - Volume 7 Number 7 Enhancing the VAXTPU EDT Keypad Emulator

SET (INFORMATIONAL,ON)
COMPILE(CURRENT~BUFFER)

and then, if errors are reported, type CTRL/Z and at the "*"

prompt, "= message", to inspect the message buffer (our code

includes a less clumsy way to switch buffers, <PFl> + Bl. If

the buffer being compiled includes routines with names the same

as any already in place (from DIGITAL's EDTSECINI, or the local

customizations, or previous compilations during the same edit

session) , an informational message that the old procedure was

replaced will be generated. Since the message buffer is limited

in size, the unit being compiled should ordinarily be limited to

as few procedures as possible. For enhancements, our routine is

to write the new procedure and the key-binding command in a

separate file, compiling and re-compiling as we go. When it

seems logically complete and generates no compiler errors, we

cut it out of that buffer and paste it into the growing section

in the main buffer, placing it at the end of the regular

procedure declarations and finally cutting and pasting the

key-binding statement into the procedure KAZ$DEFINE KEYS. In

the case of a flawed procedure that we seek to correct, once the

full file is in place, we create a separate file with the

suspect procedure as its only contents. Then we edit that file.

After

modifying

it

we

give

the

TPU

command

"COMPILE(MAIN BUFFER)", and then (if no compiler errors were

generated) select an alternate buffer and include text from a

file known to elicit the misbehavior whose correction we seek.

Because the revised procedure has the standard name, the

compilation of the main buffer re-defined the procedure that

will be executed upon typing of the standard key sequence bound

to that procedure.

Code

Search Patterns

A search pattern may be as simple as the string being sought itself, or it may include TPU builtins and operators to describe that string. In search patterns the symbol '&' is the CONCATENATION operator. Thus the pattern defined by
'a' & 'b' _& 'c'
is identical to that defined by 'abc'. The symbol 'I' is the OR
or ALTERNATION operator. Thus the pattern defined by
'a' I 'A'
VAX-111

PAGESWAPPER - February 1986 - Volume 7 Number 7 Enhancing the VAXTPU EDT Keypad Emulator

will be matched by any a, regardless of the case. These two symbols may be used to form more complex search patterns. The pattern

('a'l'A') _& ('b'l'B')

will match any sequence 'ab' regardless of the case of either

letter. The VAXTPU Reference Manual, section 2.8.4, "Modes of

Searching", discusses incremental and seek searching. The

latter is the default because it is more efficient if it will

produce the desired result. They differ on the handling of

alternate parts of the pattern. This will matter only if there

may be more than one location in the buffer that matches the

pattern.

Seek searching essentially "multiplies out" the

pattern, like the distributive law of algebra, producing a set

of pure concatenation possibilities. A search is then

performed, through to the end of the buffer for each of those

possibilities in turn.

The overall search terminates

successfully upon encountering of the first instance of any of

these possibilities. Thus, an earlier instance of a later

possibility will be skipped over by a seek mode search if there

is any instance of the earlier possibility. Incremental mode

searching, on the other hand, will terminate with a successful

match at the first instance of a string matching ~ of the

possiblities. Any alternation that is enclosed in parentheses

and preceded by a concatenation will be searched using the

incremental mode. This is why we have on occasion started our

patterns with the string ''&.

Bug Work-arounds

With help from William White of the Colorado Customer Support

Center, we have implemented a work-around for a bug in the FILL

command. The problem manifests itself whenever the beginning of

the SELECTED region is at the start of or within a word that

ends beyond the margin for wrapping. The result of executing

the FILL command under these circumstances is that a line break

is inserted at the start of the select region, whether it is

beyond the margin for wrapping or not, and whether it is in the

middle of a word or not! The concept of the work-around is

simply to ensure that the beginning of the SELECT region is

moved to the start of the line before executing the FILL

command. The work-around is implemented by copying DIGITAL's

procedure EDT$PRESERVE BLANKS(flag), creating a procedure named

KAZ$FIND BEG OF LINE(b-mark),

and

then

modifying

EDT$PRESERVE-BLANKS, by adding a call to KAZ$FIND BEG OF LINE,

at the third line of the main sequence of the code, just-prior

to

the

call

to

EDT$SKIP LEADING SPACES(b mark).

KAZ$FIND_BEG_OF_LINE moves b_mark from Tts origTnal location to

VAX-11

PAGESWAPPER - February 1986 - Volume 7 Number 7 Enhancing the VAXTPU EDT Keypad Emulator
the beginning of the line that it had been in.

Replacement Customizations

The following procedures are among those that implemented equivalent functions to those that we already had in place through EDTINI.EDT.

Word Delimiter Changes

PROCEDURE KAZ$SWAP DELIM The procedure KAZ$SWAP DELIM allows the

user to toggle back and forth between two sets-of characters to

be taken as the delimiters between words. The two sets are

optimized for word processing and for programming. The word

delimiters in word processing are a space, a tab, a form-feed, a

line-feed, a carriage return, and a vertical tab. The word

delimiters for programming include all the above as well as the

characters "/<>[]{},.:*&!;+-=()\I"' which constitute most of the

"algebraic punctuation" that is used in FORTRAN, DCL, and PASCAL

programs. DIGITAL's code includes a global variable EDT$X WORD

that is the set of characters used to identify word breaks.- We

maintain a variable called KAZ$WORD DELIM with the value of

either 'text' or 'program' to indicate the current editing

context:

word

processing or programming.

Procedure

KAZ$SWAP DELIM uses an if-then-else statement to determine the

current -editing context from the variable KAZ$WORD DELIM and

then toggles the two variables, EDT$X WORD and KAZ$WORD DELIM.

For instance, if upon entering this procedure KAZ$WORD DELIM has

the value 'text', then the old context is word processTng. The

programming delimiters are assigned to EDT$X WORD and the value

'program' is assigned to KAZ$WORD DELIM, indicating the new

editing context.

-

Word Processing Conveniences

DEFINE KEY ('READ FILE (''STANDARD.RNO'')' 1 KEY NAME('R',SHIFT KEY), "Insert a copy of the file STANDARD.RNO.");
VAX-12

-

PAGESWAPPER - February 1986 - Volume 7 Number 7 Enhancing the VAXTPU EDT Keypad Emulator

This defines <PFl> + R to include a file named 'STANDARD.RNO' on

the lines preceding the line containing the current position of

the cursor. This filename results from the routine usage of

this

command

to include a user's standard RUNOFF

initializations. Obviously, any sort of contents could be

maintained in that file. This definition can be easily modified

to include any frequently used file into the current editing

buffer by substituting the appropriate name for STANDARD.RNO.

Logical name assignments would provide yet another mechanism for

generalizing the use of this command. PROCEDURE KAZ$GET OUT

This procedure eliminates the following command sequence:

"CTRL/Z + EXIT + <RETURN>". This command sequence does a normal

exit out of TPU, saves the current buffer under the filename

that was used at the starting of the editing session and deletes

the journal file. We have chosen <PFl> + CTRL/Z to cause the

execution

of this procedure.

The

first

line,

"write file(main buffer)", writes out the main buffer. The

second-line, "set(no write,main buffer ,on) 11 , indicates that upon

the termination of the editing session the main buffer is not to

be written out, since we just performed that function in the

previous line. The last line, "exit", simply tells TPU that the

editing session is to be terminated and the journal file is to

be deleted. The TPU command "quit" would have worked equally

well here because we took care of writing out the buffer

ourselves. KAZ$FILL PARAG This permits an entire paragraph to

be re-filled at once. We take real EDT's default definition of

a paragraph: a block of text bounded by a line containing no

characters, or by the beginning or end of the buffer. The right

margin used is the same as the current EDT "wrap" emulation.

The cursor is returned to the original location in the buffer.

The entire operation is performed without ongoing screen

updating. Our procedure to move to the beginning of the current

paragraph is used to establish the start of the range to be

filled. Then a search is conducted forwards for the end of the

paragraph. If it fails, the paragraph ends at the end of the

buffer. If it succeeds, we move back one character to avoid

swallowing the blank line between paragraphs.

The word

separators used for the fill operation are the current word

delimiters, EDT$X WORD. KAZ$END SENT First a short discussion

on the search- command is warranted. Search uses three

parameters: the first parameter is the search pattern. The

second parameter is the direction of the search. The third

parameter is a qualifier on the search. In this proceedure the

direction is always FORWARD and .the qualifier is always EXACT.

The search command, as used in this procedure, returns the range

of the first exact pattern match that is forward of the cursor

position. The returned range will be 0 if the pattern was not

found. In KAZ$END SENT, the search command is used three times.

The first search looks for the end-of-sentence delimiters that

are defined by the search pattern KAZ$SENT DELIM. one character

string that will match that pattern is ". - .. , a period followed

by a space character. The initialization of KAZ$END SENT will

be described later. In this procedure, if the pattern is not

VAX-13

PAGESWAPPER - February 1986 - Volume 7 Number 7 Enhancing the VAXTPU EDT Keypad Emulator
found, i.e., the search range returned to end sent range was 0, then the procedure is exited. If the pattern Ts found, then the cursor is positioned to the beginning of the delimiter. The second search looks for either a space character or the end of the line. The cursor is then positioned to the beginning of that pattern if it was found (thereby skipping over the printing characters of the sentence delimiter) or the procedure is exited. The third search looks for either line begin or the first non-space character (thereby finding the beginning of the next sentence). If the next sentence is found, the cursor is positioned there, otherwise the procedure is exited. KAZ$SENT DELIM is initialized in procedure TPU$LOCAL INIT. The search pattern consists of the concatenation of the empty string (to force incremental searching) with two alternations: first, the punctuation, '.', '?', or '!',and second the conclusion which may include a "concealing" character such as '] ', '}', ') ', or 1111 , and terminates with a space or line end. The second alternation is rather extended, since the- various combinations of concealment and termination are all explicitly given. This implementation is significantly more versatile than true EDT's +SEN and -SEN commands, since those do not recognize any "concealed" sentences.
New and Wonderful Options
KAZ$WINDOWS This procedure permits selection of single· or double-window editing. After interactively specifying the number of windows, the user is asked for the name of the second buffer. If the buffer is new, the user is asked for the name of the file to edit and whether that file should be written to disk upon exit. The windows and buffers are established and mapped, and keys are suitably re-defined for moving between buffers. Global variables are established containing the names of the first and second windows and buffers. In normal usage, before executing KAZ$WINDOWS, we define PFl + M to execute a procedure that moves the cursor to the main buffer and map that buffer to the main window. That procedure was created by copying the
support routine for the EDT line mode "= buffer" command from
page 22 of EDTSECINI, and then specializing it to go for the main buffer. In normal usage, before executing KAZ$WINDOWS, we define PFl + B to execute a procedure (even more closely modeled
on the "= buffer" support from EDTSECINI) that prompts for the
name of the buffer, moves the cursor to it, and maps it to the main window. Thus, those keys are routinely used to return to the main buffer or to shift to a named buffer. KAZ$WINDOWS restores these definitions whenever single-window editing is specified. When dual-window operation is to commence, PF 1 + M is defined to move to the first (upper) window, and PFl + B is defined to move to the second (lower) window. We have defined
VAX-14

PAGESWAPPER - February 1986 - Volume 7 Number 7 Enhancing the VAXTPU EDT Keypad Emulator
PFl + <UP ARROW> to jump back a screen, and PFl + <DOWN ARROR> to jump forward a screen. This is implemented using a global variable, KAZ$WINDOWSIZE, whose value is initialized to 21 for single-window editing and is set to 10 for dual-window editing. The action of the screen jump command is thereby adjusted to avoid either overlap or skipped lines as one moves through a buffer. The sizes of the windows are adjusted appropriately to allow for status lines at the bottom of each window, clarifying the boundary between them. The scrolling limits are set so that a reasonable amount of context is presented before and after the cursor, while still permitting some range of motion without stimulating excessive output to the terminal. KAZ$0VERSTRIKE This procedure is used to swap between the overstrike and insert modes using one key definition rather than using a key definition for each mode. The procedure KAZ$0VERSTRIKE uses a global variable called KAZ$ENTRY MODE to indicate the current editing context. This allows the defined key to take on a dual function depending on which 'state' the variable KAZ$ENTRY MODE is in. For example: if KAZ$ENTRY MODE is 'insert', the current editing context is insert mode and the procedure should switch into overstrike mode. In the procedure an if statement implements the above logic; if the mode is not 'insert' then the else clause is executed to switch to 'insert' mode. The commands
SET(OVERSTRIKE, CURRENT BUFFER); and SET(INSERT, CURRENT~BUFFER);
switch the current editing context of the current buffer to overstrike and insert respectively. After the editing context is set, then the variable KAZ$ENTRY MODE is updated to 'overstrike' or 'insert', respectively. -Conclusion The VAX Text Processing Utility has certainly demonstrated its utility! It provides virtually the full functionality of the EDT Keypad environment, and can be readily enhanced both in ways that EDT can and in ways that EDT cannot. While providing this superb editing capability, it consumes significantly less CPU time than EDT itself to do the same job. Thus users see a more friendly system that responds faster, too. Acknowledgement We wish to express our thanks to the staff of the Customer Support Center in Colorado Springs, several of whom have provided quite useful suggestions. The file EDTSECINI.TPU provided with VMS 4.2 contained many useful examples. In fact, some portions of the code we used were simply copied from there and modified slightly. A variety of useful examples from the VAXTPU Users Guide have also found their way into our code. The users of Kalamazoo College's Educational Computing VAX system tolerated being forced from EDT onto an early version of the customizations reported here, and have survived the various stages of refinement or brutalization it has gone through since, so to them we owe especial thanks.
VAX-15

PAGESWAPPER - February 1986 - Volume 7 Number 7 Enhancing the VAXTPU EDT Keypad Emulator

Enhancing VAXTPU EDT

M.L. Penix and R.D. Piccard

Procedure

Endprocedure

l

Key-definitions

I

I

Assignment statements

I

Figure 1: TPU Command File Organization

VAX-16

-

-

PAGESWAPPER - February 1986 - Volume 7 Number 7 Enhancing the VAXTPU EDT Keypad Emulator

Enhancing VAXTPU EDT

M.L. Penix and R.D. Piccard

I

Procedure TPU$LOCAL_INIT

I

]

other procedures

I

I

Procedure KAZ$DEFINE_KEYS

I

I SAVE ~YS$LOGIN: fi~e~ame-.NEW-1 QUIT

Figure 2: TPU Section File Organization

PAGESWAPPER - February 1986 - Volume 7 Number 7 Spring 1986 System Improvement Requests
Spring 1986 System Improvement Requests
*** VOTE *** VOTE *** VOTE *** VOTE *** VOTE *** VOTE *** *** VOTE *** VOTE *** VOTE *** VOTE *** VOTE *** VOTE *** *** VOTE *** VOTE *** VOTE *** VOTE *** VOTE *** VOTE ***
Gary L. Grebus
HOLD ITI DON'T PUT THIS OFF! THE DEADLINE IS APRIL 1. You have an opinion about what is right or wrong with VAX. Here is your chance to influence the directions of future DEC development. The VAX Systems SIG System Improvement Request (SIR) program is an important method for the VAX user community to provide input to Digital. Your opinion is important, and every ballot adds to the influence of the SIR program.
On the following pages, you will find the current collection of System Improvement Requests. Please take the time to review these SIR's and assess their effect on your use of VAX's. Then indicate your preferences as described below. THE NEW, SIMPLIFIED BALLOT FORM APPEARS THE "QUESTIONNAIRE" SECTION OF THIS NEWSLETTER. Also, please fill out the questionnaire portion of the ballot. This information is important to DEC, as it points out which requests are important to a particular segment of the VAX community.
The returns from this ballot will be totalled, and Digital will provide a formal response to the 10 items which receive the most votes. The results and DEC's responses will be given at the VAX SYSTEM SIG SYSTEM IMPROVEMENT REQUESTS session of the Spring 1986 DECUS Symposium in Dallas. At the same session, we also hope to have an update on the status of past top-10 items.

VAX-17

VAX-18

PAGESWAPPER - February 1986 - Volume 7 Number 7 Spring 1986 System Improvement Requests
Instructions For Voting The ballot form contains two sections, a "support" section and an "oppose" section. To indicate your support for an SIR, enter its number in the "support" section of the ballot. You may list from zero to fifteen SIR's in this section. To indicate your opposition to an SIR you consider detrimental, enter its number in the "oppose" section. You may list from zero to five SIR's in this section. Please return your ballot IMMEDIATELY. The very tight schedule before the Dallas Symposium makes this a tough ballot to do. To allow time for DEC to respond, BALLOTS RECEIVED AFTER APRIL 1 MAY NOT BE COUNTED. Any ballot not specifying a DECUS membership number will not be counted. Only one ballot per member will be accepted. SIG members who have voted in past ballots may notice a radical change in the method of voting on this ballot. This is an experiment to (hopefully) make it less time-consuming to participate in the SIR ballot. The continued decline in the number of ballots returned has prompted such changes. Your comments are welcomed.
Finding the Ballot As with all "forms" in the combined newsletter package, the ballot may be found at the back of the entire volume you are now reading on the QU· pages. Nominally it goes in alphabetic order by SIGs, putting VAX at the end, but there have been exceptions.
VAX-19

PAGESWAPPER - February 1986 - Volume 7 Number 7 Spring 1986 System Improvement Requests

VMS Internals

SIR: S86-l

Abstract:

Provide routines for accessing the DECnet

configuration

Description: There should be some way of obtaining information about the current configuration of the network: which nodes are available, number of hops, next hop to node, etc.
through runtime calls. The only currently available method is to direct the output of SHOW NETWORK to a file and parse the file.

SIR: S86-2

Abstract: Provide system wide event flag clusters.

Description: UIC group based event flags cause considerable inconvenience when an existing event-flag based application must be expanded to serve users in multiple UIC groups. It
should be possible to create and manipulate system-wide common event flag clusters. Use of this feature should be
controlled by a privilege or quota independent of existing controls on system-wide resources.

SIR: S86-3

Abstract:

Provide better support for hardcopy terminals

through SMG routines.

Description: In release 4.e of VMS, the TERMTABLE entries for DEC hardcopy terminals' do not contain all of the applicable escape sequences for the devices. For instance, many hardcopy terminals support automatic underlining and boldfacing, similar to the DEC CRT's. Even if local modifications are made to the TERMTABLE entries, the SMG routines do not use the additional information (say when SMG$SNAPSHOT is called) · It would be nice to support the VT100 line drawing character set (or that kind of line drawing) when the device supports it.

SIR: S86-4

Abstract: Allow DUMP files to be moved off the system disk.

Description: A cluster of fully configured 8600's sharing the

system generates a need for most of the disk to be

dedicated to system DUMP files.

Recently announced

increases in memory size make this problem worse. The

current mechanism of combining dump and paging files is

unacceptable, since a shared system disk cannot tolerate

VAX-20

-

-

PAGESWAPPER - February 1986 - Volume 7 Number 7 Spring 1986 System Improvement Requests

the 1/0 load generated by a large page file.

SIR: S86-5

Abstract: Support TCP/IP on VMS.

Description: The TCP/IP protocol is probably the most widely supported protocol for networking among workstations and mid-sized computers. It is frequently necessary to connect VAX's into such a mixed-vendor network. The TCP/IP protocol should be supported under VMS to allow such connections.

SIR: S86-6

Abstract: Provide for wildcard $GETDVI.

Description: The $GETDVI service should provide a wildcard facility similar to that available with the other $GETxxx services. There is currently no acceptable way to find out
the device configuration of a system. This is particularly true since VMS now has many devices which dynamically appear and disappear (virtual terminals, MSCP disks, etc).
In a VAXcluster, this facility should ideally be able to show all devices connected to the cluster, including
node-local devices.

SIR: S86-7

Abstract: Eliminate the necessity for trailing commas in system service argument lists.

Description: Even when one or more arguments at the end of a system service argument list are optional, it is still necessary (according to the system services manual) to include trailing commas in the system service call. (This is unlike the run-time library routines, where it is not necessary to include the commas.) This is annoying, and error prone. Could this be changed?

SIR: S86-8

Abstract: Provide a terminal attribute to request filtering of BELL characters.

Description:

It would be useful to provide a terminal

attribute which supressed sending of the BELL character to

the terminal. Having many terminals beeping in a small

area can be distracting. Ideally, it should be possible to

specify an alternate sequence to be sent in place of the

BELL so that CRT's for example could display some visual

equivalent.

VAX-21

PAGESWAPPER - February 1986 - Volume 7 Number 7 Spring 1986 System Improvement Requests

SIR: S86-9

Abstract: Allow a privileged user the ability to link one terminal to another.

Description: VMS should support a facility which would allow a privileged user to link his or her terminal to another terminal. This link would at minimum allow the privileged user to issue commands as if they were typed from the other keyboard. This capability would be useful to "cleanup" whatever was running on the remote terminal before its process was deleted. Ideally, the facility should also allow the privileged user to see all output directed to the target terminal. This would allow for fully interactive
"hand-holding" or consulting for user problems.

SIR: S86-10

Abstract: Provide a facility to list the VMS timer queue.

Description: VMS should provide a service and a DCL command to list the entries in the timer queue. Appropriate privilege (e.g. WORLD) would be needed to list other users' queue entries. This would be useful to verify that periodic tasks were correctly scheduled, or that an idle process was in fact waiting for a timed event.

SIR: S86-ll

Abstract: CREATE/DIR should set owner protection to RWED, not only RWE.

Description: A VAX directory file cannot be deleted until all

files have been removed from it. Therefore, it is not a

hazard to have OWNER:DELETE access to the file as it was in

earlier versions of VMS. The CREATE/DIRECTORY command

should, by default, grant OWNER:DELETE access.

This

simplifies cleanup of files and directories, since an extra

step (protection-change on only directories) is avoided.

SIR: S86-12

Abstract: VMS.

Provide a supported virtual memory disk driver for

Description: VMS should provide a supported device driver which implements a disk using pages of virtual memory. Optionally, some or all of the virtual disk could be locked into physical memory. Such a facility could provide very fast access for frequently used files. Note that this facility is orthogonal to any file system or RMS caches -the benefit would apply for any access method or file structure, even simple sequential, text files. suitable

VAX-22

PAGESWAPPER - February 1986 - volume 7 Number 7 Spring 1986 System Improvement Requests

privileges and quotas should be required to create and destroy such a device (the scope seems similar to permanent mailboxes). The falling prices of semiconductor memory make this facility attractive when short access times are
vital.

SIR: S86-13

Abstract:

SYSGEN should flag autoconfigured devices in

SHOW/CONFIG.

Description: It would be potentially useful if the SYSGEN SHOW/CONFIG command could indicate if a device was autoconfigured.

SIR: S86-14

Abstract: All utilities should use a standard format for printable output.

Description: Printable output generated by VAX utilities and compilers comes in a great variety of record formats and carriage control conventions. A particularly awkward convention is the use of embedded ASCII control characters to generate multiple print lines from a single record. There appears to be no standard for this or any other mechanism. As a result it is very difficult to print "printable" output on non-DEC printers or transmit it through heterogeneous networks. Digital should document a standard record format and carriage control convention and modify all facilities to conform to this convention. As a alternative, Digital should provide a utility which converts all currently used formats into a standard format. It seems that this functionality currently exists, distributed between the print symbiont, device driver, and
"DEC standard" printers.

SIR: S86·15

Abstract:

Proposed changes to SMG$READ STRING and

SMG$READ_COMPOSED_LINE screen management routTnes.

Description:

When

using

the

SMG$READ STRING

and

SMG$READ COMPOSED LINE screen management routTnes, when the

display-id argument is included, there is a restriction

that the cursor for the virtual display associated with the

routine(s) must be in column 1, and also that this virtual

displays to its right. It would be very useful if these

restrictions did not exist.

VAX-23

PAGESWAPPER - February 1986 - Volume 7 Number 7 Spring 1986 System Improvement Requests

SIR: S86-16

Abstract: Provide a call interface that parallels the DCL show queue functionality.

Description: The interface to the symbiont manager is useful as long as you already have information (i.e., the job i.d.). There should be a call interface that permits an application to "look up" what jobs are in the queue(s).

SIR: 586-17

Abstract: The VMS source kit should be cheaper.

Description: We need to have parts of the source kit available

for SEARCHing to quickly find out how VMS does certain

things. We are a DEC OEM and third-party supplier; we have

a non-disclosure agreement for a new type of hardware for

which we will be building compatible products with DEC's

cooperation and assistance. Unfortunately this cooperation

and assistance does not extend to helping us to write the

system software (device drivers) which are necessary to use

our product. $25,000 seems excessive for the source kit;

it seems designed to discourage people from buying it (it

certainly has discouraged us) rather than as a reasonable

price based on the cost of production and support (since

DEC doesn't support it, or anyone's use of it). I

understand that DEC does not want versions of VMS to

proliferate the way Unix systems have. This could be

addressed by leaving out something that was necessary (or

very, very, very helpful) to actually use the kit to build

a system. The system and module build command procedures

come to mind. A price of $5,000 would surely result in

more than five times as many sales of the source kit as DEC

currently gets.

Thus the suggestion makes sense

financially.

From a philosophy standpoint it makes sense too. DEC has

been successful partly because it has been relatively easy

for third-party suppliers to get information on how to do

things that complement DEC hardware and software, filling

market niches that DEC is too big or too slow to respond to

and thereby enabling sales of DEC systems to customers who

would otherwise have to look· elsewhere.

It seems

unreasonable for DEC not to follow this philosophy in VMS,

their flagship operating system and the system they are

trying to sell to almost everyone. To say "you can look at

the microfiche" is not responsive; it's hard to issue a

SEARCH command to a fiche reader. To "market" a source kit

that costs more than the low-end configuration of the

MicroVAX II, which will surely put VMS into more sites than

all the other VAXes to date combined, seems to be

completely contrary to DEC's (former?) way of doing

VAX-24

-

-

PAGESWAPPER - February 1986 - Volume 7 Number 7 Spring 1986 System Improvement Requests

business.

SIR: S86-18

Abstract: Make SWAPPER multi-threaded.

Description: Given increasingly large VAX systems with lots of memory and disks it appears as if SWAPPER could become a
bottleneck when performing large writes of working sets and modified pages. It would be nice if SWAPPER could format writes to all of the disks it accesses in parallel.

SIR: S86-19

Abstract: Add description of file to header.

Description:

Long file names aren't good for elaborate

descriptions of files because you have to type them. What

if

$SET FILE file/DESCRIPTION="text"

could put up to 80 or 90 chars in the headers, which could

be displayed by:

$DIR/DESCRIP

or

$DIR/FULL

This facility should also be available via RMS and QIO

interfaces. Ideally, the description would be copied along

with things like record attribute when you $COPY, $EDIT,

etc. perhaps by having it appear in an XAB.

SIR: S86-20

Abstract: Support a PRINTABLE attribute on files

Description:

Binary-type files can do awful things to

terminals and printers when PRINTed or TYPEd. An attribute

which would cause the commands to reject such files unless

overridden would save many confused and frightened users.

Modifying just compilers and the linker as a first step

would probably eliminate 90% of the problem.

This item appeared as a past top-10 SIR in which DEC proposed an alternate solution in which the printing software would make an empirical decision about the printability of a file it was given. However, this solution seems increasing difficult to implement given the proliferation of "intelligent" printing devices.

SIR: S86-21

VAX-25

PAGESWAPPER - February 1986 - Volume 7 Number 7 Spring 1986 System Improvement Requests

Abstract: Proposed improvement to RMS user control block run time macros

Description:

The RMS control block run time macros,

$fab store, $nam store, $rab store, and $xabxxx store have

a number of options which allow one to set various RMS

attributes (such as fop-cbt, for contiguous best try, in

the $fab store macro). There is, however, no way to turn

these attributes off using these macros. (one has to use

symbolic offsets, such as fab$1 fop and fab$v cbt,

instead). It would be convenient if-each store macro had a

clear, or unset, form of its on/off attributes (such as

fop=nocbt in the $fab_store macro).

SIR: S86-22

Abstract: Support a per-user logical name table

Description: Extend the logical name table system to provide
user-level (not group-level) tables which remain after a process goes away. They should behave much as group tables do but should be unique to a full UIC. An appropriate privilege (USERNAM?) may be required since this would entail the use of system resources.

SIR: S86-23

Abstract: Better program control of output to sys$error is needed, especially for detached processes.

Description: In detached processes it is desirable to merge the sys$output and sys$error files. The ways/orders in
which they are opened causes difficulties. For example, two files appear when one is desired. A possible solution is to give user programs control over where error output is
to appear, e.g., traceback output. There is no control over how a process opens sys$error.

DCL and Utilities
SIR: S86-24
Abstract: Increase the 255 byte limit on foreign command lines.
Description: User commands that utilize the foreign command interface to get argument data may now exceed the 255 byte limit that is enforced with VMS 4.0. This is now a problem since the limit was not enforced in VMS v3.x software and longer arguments were working and are now not. Also the
VAX-26

PAGESWAPPER - February 1986 - Volume 7 Number 7 Spring 1986 System Improvement Requests

expansion of file names and extensions to 39 characters adds to the need for longer argument strings.
SIR: S86-25
Abstract: Enhancements to the VMS MAIL facility.
Description: There are several enhancements to mail that would generally increase the ease of use and functionality of mail:
1. Include the subject of the mail message in the broadcast message mail sends to logged in users.
2. In captive accounts which run from controlled command procedures some way to prevent users from using the spawn capability in mail is needed. This facility might also be useful elsewhere, restricting the subprocess count is not a solution since the running application may need to create a subprocess.
3. The ability to delete more than one message at a time would be desireable. I.E. DELETE 1:10 to remove message l thru 10 or DELETE 1,3,5,7 to remove messages 1, 3, 5, and 7.
4. Some form of search facility on the mail folders to aid in finding specific entries is needed. This could be restricted to the folder names or extended as far as searching thru the actual messages themselves. The syntax and command capabilities in the VMS SEARCH command are an excellent example.
5. When using the @FILESPEC method of sending mail to many people it is very desireable to have the option to specify that the detailed list expansion be included in the message in some form. This will allow a newly added member of the list to see who comprises the list. Additionally the number of redundantly forwarded mail messages could be reduced.
SIR: S86-26
Abstract: Show open files for a process.

Description:

It is frequently necessary to attempt to

determine the files that a specified process has open.

With many devices on a system this can be a time consuming

exercise to search through all of them. A more desireable

method would be some form of show command, possibly SHOW

FILES/PROCESS=pid or SHOW PROCESS/ID=PID/FILES

VAX-27

PAGESWAPPER - February 1986 - Volume 7 Number 7 Spring 1986 System Improvement Requests
SIR: S86-27
Abstract: SHOW PROCESS/CONT is inadequate for large images.
Description: When watching large processes with SHOW PROCESS/CONTINUOUS the actual memory that is in use by the process is not shown by the fixed window. Some form of window specification where the user declares the memory range to be shown or some form of automatic selection of the window address is needed.
SIR: S86-28
Abstract: Add restarting to DIRECTORY command.
Description: Some mechanism is needed for either specifying a start point for the command or a restart from last file shown if interrupted by a control c. For example, DIRECTORY/FROM=oldprog would start at-the first file entry that in the normal sort. order came after oldprog. Additionally a /UNTIL=stoptext would be very useful. With both features management of large directories would be very easy. It is understood that subdirectories are a more efficient way of organizing files, however this is not always possible.
SIR: 586-29
Abstract: Enhance DCL command recall.
Description: Additional desirable features in the command line recall facility:
1. When a command is recalled from the saved commands, move it to the top of the stack and erase it from the position it occupied. This eliminates loosing the oldest command. This also changes the recall facility to remember the last 20 unique commands.
2. Allow some method of specifying the number of commands to store.
3. Allow a method of ignoring short commands that are less than a specified length.
SIR: S86-30
Abstract: SHOW SYSTEM display should have the old form of UIC numbers.
VAX-28

-

-

PAGESWAPPER - February 1986 - Volume 7 Number 7 Spring 1986 System Improvement Requests

Description: The enhanced version of SHOW SYSTEM maps UIC entries into named entries. Some method of getting the old
UIC entry back is needed. Possibly SHOW SYSTEM/OLD would display the numeric UIC entries only, UIC entries that are not of the old numeric form would not be displayable by this command.

SIR: 586-31

Abstract: Enhanced DCl substitution and parsing capabilities.

Description: DCL would be more useful to advanced and expert users if the following concepts were implemented.

1. Direct substitution of parameters in DCL commands.

2. Multiple command entries on one DCL line.

For example: BUILD:==MACRO/LIST APl !LINK/MAP APl

BUILD FOO expands to MACRO/LIST FOO
LINK/MAP FOO The syntax shown is only for the purposes of writing an example.

SIR: S86-32

Abstract: Enhance the DEASSIGN command.

Description:

In many cases a simple enhancement to the

DEASSIGN command would simplify writing command procedures

and increase clarity and execution speed.

For example DEASSIGN LNAME1,LNAME2,LNAME3 would deassign all three logical names and is easier to write than.

DEASSIGN LNAMEl DEASSIGN LNAME2 DEASSIGN LNAME3 This general ability to restart the DCL command for more than one action would be useful in as many places as possible such as:
CLOSE LNAME1,LNAME2,LNAME3 REWIND LNAME1,LNAME2,LNAME3 etc.

VAXClusters

VAX-29

PAGESWAPPER - February 1986 - Volume 7 Number 7 Spring 1986 System Improvement Requests

SIR: S86-33

Abstract:

Provide a feature to keep system times on a

VAXcluster synchronized.

Description: It is extremely important for the time-of-day to be consistent across all nodes in a VAXcluster. Often, applications involve cooperating processes on several nodes. Without synchronized times, it becomes extremely difficult to consistently handle any operation which requires timestamping. Even coordinated processing of accounting or performance data is impossible without coordinated times. Manual synchronization impossible to do if high accuracy is required.

SIR: S86-34

Abstract:

Provide support for cluster-wide print queues

spooled via a device.

Description: In single node systems, it is possible to declare a printer device as spooled so that files written to the
device are printed without the necessity of using a PRINT command. Applications are written to take advantage of
this behavior. In a cluster, this mechanism no longer works, since the device will not be present on every node
of the cluster. A mechanism is needed which provides a "dummy" alias for the printer, which appears on every
system. Defining a logical name to include a DECnet nodename (e.g. DEFINE LP NODE:LPA0:) is not acceptable
since username and account information might not be the same for the DECnet server process.

SIR: S86-35

Abstract: Provide cluster-wide system management tools.

Description: Digital stresses that a VAXcluster should be managed as a single domain. To do this, the standard VMS system management tools need to be expanded to work cluster-wide. Cluster-wide ACCOUNTING and and cluster-wide MONITOR are two examples.

SIR: S86-36

Abstract: Provide a capability similar to the NCP TELL to pass DCL commands to other nodes on a cluster.

Description: It is frequently necessary to execute the same, or similar, commands on more than one node of a cluster. This is typically a command that has just been put in SYSTARTUP.COM, for example an INSTALL command, which is needed before the next reboot. We are currently using

VAX-30

PAGESWAPPER - February 1986 - Volume 7 Number 7 Spring 1986 System Improvement Requests
DECNET and batch jobs which are slow and inconvenient. What is needed is DCL TELL for use on a cluster.
SIR: S86-37
Abstract: Provide high-speed task to task communication on a
cluster using scs, not DECNET.
Description: Some applications need to get large amounts of data (100-300 Kbytes) from one node to another as fast as possible. At present, this can only be done using a shared file or DECNET transfers - neither of which is fast enough. The bandwidth of the CI is fast enough. What is required is the ability to do 'block' mode transfers via the CI. A simple device driver interfacing to SCS would suffice.
Security
SIR: S86-38
Abstract: Mechanism needed that allows one user to grant other users access to a file only via a user-defined image.
Description: Non-privileged users sometimes need to give other non-privileged users controlled access to data files through a program. Through this facility any user would be able to control who could access his data files and what kind of access they may have. In the current system, in order to allow another user to add a record to a file, that user must be given WRITE access to that file, which means he could alter existing data or delete records from the file.
Presently this requires the system manager to install the program with privilege, which is both an administrative nuisance and a security problem, as the privileged image would also have access to other system data files as well as the intended files. This mechanism should be under user control, i.e., the user should be able to determine which images could access a file. For example, the UIC of the image and data file could be required to match before access would be permitted. This could be accomplished by an option on the compiler or linker when the image was being created. It could also be implemented by allowing the system manager to install an image with a particular identifier. Then the user could set up the access control list for that file to permit access by that Identifier. This would be less flexible but would permit a user to allow access from images other than his own, e.g., a data base manager. This capability could also be provided by
VAX-31

PAGESWAPPER - February 1986 - Volume 7 Number 7 Spring 1986 System Improvement Requests
file passwords, since the passwords could be imbedded in the programs that were intended to have access to the files; however, file passwords would be difficult to administer and prone to disclosure.
SIR: S86-39
Abstract: Implement mandatory security controls in VMS.
Description: Many VAX systems are being operated by government agencies or contractors and either are processing or need to process classified data. Mandatory security controls are needed in VMS to support such classified processing. An operating system that could be evaluated by the National Computer Security Center at the Bl level or higher would encourage more VAXes to be used for classified processing and make system management much easier for those already doing classified processing on existing systems. The system manager should be able to specify a security level for each user account using the AUTHORIZE utility. When a file is created, it should be given the security level of the creating process, and any subsequent access to the file should be controlled in accordance with the mandatory security policies. If a file is edited or copied, it should retain it's classification. A utility should be provided to allow a person with a special (SECURITY) privilege to change the classification of a file.
SIR: S86-40
Abstract: End-to-end encryption of logical connections within DECnet-VAX.
Description: The assumption made by DECnet that all nodes and communications paths are trustworthy is not viable in many environments. End-to-end encryption of the data portion of network packets is required in these environments to assure that eavesdropping is fruitless, both in Local Area Networks (broadcast) and Wide Area Networks (multi-hop). This encryption should be implemented so as to be transparent to the application programmer and user, i.e., the mechanism should be located in the NSP (or OSI session) layer. New encryption keys should be generated for each logical connection between cooperating, encryption-capable processors. (Some nodes will not be capable of encryption and should be allowed to participate in the network without performing encryption.) Intermediate nodes should not be required to participate in, or be knowledgable of, the key distribution/management or the encryption process. The DES algorithm should be utilized in the near term but should be readily replaced as NBS standards change. Provisions should be made for encryption hardware to boost performance where necessary.
VAX-32

-

-

PAGESWAPPER - February 1986 - Volume 7 Number 7 Spring 1986 System Improvement Requests

SIR: S86-41

Abstract: DECnet-VAX Node Authentication

Description:

In both Local Area and Wide Area Network

environments, a malicious node can readily assume the

identity of another node. Node passwords are inadequate

protection, are easily circumvented, and are applicable

only to adjacent nodes on point-to-point links.

An

encryption based node authentication mechanism is required

(perhaps using the RSA algorithm).

This improved

authentication mechanism should provide the (local) node

manager with a high degree of certainty that a remote node

is who/what it claims to be.

The authentication mechanism should also be immune to eavesdropping by intermediate routing nodes. After this capability is developed within DECnet-VAX, it will also be needed in other DECnet implementations, so that routers and PC workstations can take advantage of enhanced security in their communications with VAX systems.

SIR: S86-42

Abstract: Record attempted usernames on login failures.

Description: An OPTION is needed that permits the system
manager to record login failures in more detail, including the ATTEMPTED USERNAME, terminal name, and time, even if the username is invalid. This would help the system manager to assess whether login failures are the result of
penetration attempts, noisy lines, or just merely a user who is having difficulty. The system manager would be responsible for protecting the accounting file appropriately to prevent the disclosure of passwords.

This capability must be an OPTION, as large numbers of system managers have indicated a strong need for this capability, and many others have expressed an equally strong concern that passwords might appear in their accounting files. Both groups of person have valid arguments and should be given a choice in the recording of login failure information.

SIR: S86-43

Absti;act: Security alarm messages to a file.

Description: Add an option to the Access Control Entries (ACE's) that specifies a file into which security alarms
for that file/directory are written. This would allow a user to review security alarms for his own files, rather than depending on the system manager to perform the

VAX-33

PAGESWAPPER ~ February 1986 - Volume 7 Number 7 Spring 1986 System Improvement Requests
auditing. Of course, security alarms requested by the system manager via the SET AUDIT command should be written to the system-wide security log.
SIR: S86-44
Abstract: Prevent users from re-using passwords.
Description: When passwords expire, users can change them to some other password such as XXXXXX, and can then immediately change them back to the original password. A mechanism is needed to prevent users from re-using old passwords. This might be implemented via a MINIMUM password lifetime or by maintaining a list of "n" previous passwords for each user.
SIR: S86-45
Abstract: Control access to printers through ACL's.
Description: ACL's are needed to control the usage of print devices, print queues, and batch queues. The UIC-based protections are now available on queues, but ACL's are not, so the system manager does not have sufficient granularity in granting access to the system queues and print devices. ACL's can be placed on physical devices, but they only control the ability of users to allocate the devices and do not control their ability to use shared devices such as printers. This is undesirable in cases where the user is expected to use some shared devices and not others.
SIR: S86-46
Abstract: ACL's are ignored for images installed open and header resident.
Description: In some cases, the system manager may wish to control the use of images (such as compilers and the linker) through ACL's, but would still like to take advantages of the efficiencies of installing the images OPEN and/or HEADER RESIDENT. In VMS 4.2, ACL's applied to these images are- ignored, even though UIC protection is enforced. Full ACL protection should be included.
SIR: S86-47
Abstract: Make password validation a user-callable service.
Description: Username/password validation should be made a user-callable system service or run-time library routine. Such a routine should one-way encrypt the password, open the UAF, read the record for the specified username, and return a status indicating whether the username/password
VAX-34

PAGESWAPPER - February 1986 - Volume 7 Number 7 Spring 1986 System Improvement Requests
pair is valid. For security reasons this service should only be available to users holding system privileges, e.g. SYSPRV. Such a capability would be useful for applications requiring users to log into shared or captive accounts, which would then need to further validate the individual users.
SIR: S86-48
Abstract: Allow OPER to override LOGINS=0 only if it is a DEFAULT privilege.
Description: It is useful to give OPER privilege to certain users, so that they can control print and batch queues. However, granting OPER as an AUTHORIZED privilege also allows that user to login even when logins are disabled. VMS should check the DEFAULT privileges (not the AUTHORIZED privileges) for an account when determining whether or not to allows that user to override disabled logins.
SIR: S86-49
Abstract: Asynchronous data security erase on file deletion.
Description: The data security erase occurs on file deletion when the disk volume or an individual file is set to /ERASE ON DELETE. If the file is large, this erasure can take -a -long time. The erasure should be performed asynchronously to the user process, so that a performance degradation is not seen by interactive users.
~ Languages and Tools
SIR: S86-50
Abstract: Allow EDT to set tabs in any column.
Description: Currently, only the first tab stop in EDT can be changed. The rest are in multiples of 8 (16, 24, etc.). A user should be able to tab to any column. This feature is useful when entering data that is not in every 8th column.
SIR: S86-51
Abstract: Provide windowing capability in EDT.
VAX-35

PAGESWAPPER - February 1986 ~ Volume 7 Number 7 Spring 1986 System Improvement Requests
Description: A window capability in EDT would be useful, so that several portions of a file could be viewed and editted, It should also be possible to view and edit multiple files,
SIR: S86~52
Abstract: Provide column editting capability in EDT.
Description: It would be useful to easily insert, delete, or swap columns of text in EDT. Currently, these operations are quite awkward, compared to inserting, deleting, or swapping rows of text. It would also be useful if the column number of the current cursor position could be displayed.
SIR: S86-53
Abstract: Provide a SPAWN command in EDT.
Description: It would be useful to SPAWN from an editting session so that mail could be read, that status of batch jobs could be examined, etc.
SIR: S86-54
Abstract: Provide insert and overwrite modes in EDT.
Description: It would be useful if both insert and overwrite modes were available, and toggling between them would be easy. Overwrite mode would be especially useful in editting formatted files.
SIR: S86"55
Abstract: Provide depth-level numbers on Fo_rtran listings.
Description: It would greatly aid debugging programs, if the Fortran listing would include the depth level of DO loops and the depth level of nested IF's. The level number could be printed on the left margin of the listing, to the right of source code line number and sequence number.
SIR: S86-56
Abstract: Provide a qualifier on the Fortran compiler that would make all integer and real variables and constants use 64-bit fields.

VAX-36

-

-

PAGESWAPPER - February 1986 - Volume 7 Number 7 Spring 1986 System Improvement Requests

Description: A qualifier on the Fortran compiler is needed that would make all real variables and constants double precision, and all integer variables and constants occupy
64 bits. This qualifier would also cause functions to return a 64-bit quantity, unless otherwise specified. The IMPLICIT statement is not adequate, since constants are not affected.

SIR: S86-57

Abstract: Provide more support for structure variables in Fortran.

Description: It would be convenient to have an aggregate constant feature that could be used to initialize the fields in an aggregate assignment statement. It would also be convenient if aggregate fields could be specified in formatted I/O statements.

SIR: S86-58

Abstract: Provide a DO UNTIL construction in Fortran.

Description: A DO UNTIL construction is needed in Fortran. There are occasions when a DO UNTIL is simpler to use than a DO WHILE, and cleaner code will result.

SIR: S86~59

Abstract: Provide a qualifier on the linker that would force inclusion of all modules in the library.

Description: It would be useful if the linker could be directed to include all modules in a library, when building an executable program. This feature is useful when there are common routine names in libraries that are used to build an executable, and you need to be sure that all
modules from a particular library are used.

SIR: S86-60

Abstract: Provide source line debugging in MACRO.

Description:

The debugger does not always effectively

translate offsets and other symbolic information. Source

line debugging would remedy this problem. Source line

debugging would be useful for programs that make extensive

use of macros. The capability to STEP and SET BREAK points

according to source lines would also be useful.

VAX-37

PAGESWAPPER - February 1986 - Volume 7 Number 7 Spring 1986 System Improvement Requests SIR: S86-61 Abstract: Provide LSE Support for VAX MACRO. Description: The Language-Sensitive Editor should support VAX
MACRO. Support would include a /DIAGNOSTICS qualifier on the MACRO command, assembling from within LSE, and templates for the commonly used system services. SIR: S86-62 Abstract: Provide a word count in the RUNOFF output log. Description: It would be useful to know how many words are in a document that RUNOFF processes. This number could be included on the output log file, along with the number of pages. This word count would not include section headings, chapter headings, etc.
VAX-38

PAGESWAPPER - February 1986 - Volume 7 Number 7 Digital Responds to the Fall 1985 SIR Ballot

Digital Responds to the Fall 1985 SIR Ballot

Gary Grebus
SIR Coordinator and
Richard Merewood VMS Engineering

At the Anaheim Symposium, Digital responded to the VAX SIG's most recent system Improvement Request ballot. The
ballot was originally published in the September issue of the Pageswapper. Only 172 ballots were returned, a disappointing decrease in participation by the SIG membership. A complete summary of the ballot appeared in last month's Pageswapper. Below is a summary of the top 10 items along with with Digital's responses, as presented by Richard Merewood of the VMS Engineering group.

SIR F85-ll

Position: 1

Points: 847

Abstract: Provide a means to perform an in-place compression of a disk.

Response: While the importance of on-line compression is obvious in retrospect, this is a new request for us in that it has never appeared so prominently in past SIR ballots. We do not have any current plans to build such a facility.
However, we understand its importance and we understand that it will increase as time goes on.

There are a number of difficult problems to deal with, including coordinating ongoing file activity with the compression process, and solving the performance problem on large disks (since disk reorganization is inherently an
n-squared order problem).

We will investigate this for future VMS development.

(Note: comments offered from the audience at the symposium

session suggested that support of ongoing file activity was

not a requirement, particularly in

an

initial

implementation.)

SIR: F85-55 Position: 2 Points: 588

VAX .. 39

PAGESWAPPER - February 1986 - Volume 7 Number 7 Digital Responds to the Fall 1985 SIR Ballot
Abstract: Enhance the SHOW command of AUTHORIZE. Specific suggestions included the ability to show a particular item across a group of users, selection of records by the contents of various items, and better support for wildcarding UIC's.
Response: It has been recognized that the user friendliness of the VMS AUTHORIZE utility falls short of requirements, and therefore a major re-work is being planned.
These suggestions are good ones and they will certainly be considered.
SIR: F85-06 Position: 3 Points: 494
Abstract: This is actually a layered software specific improvement request and is not within the realm of the operating system to address.
However, we agree that the ability to support running multiple versions of layered products in a given environment would be an attractive enhancement to the VAX/VMS system family. As noted in the SIR, many dependencies such as images, shareable libraries, DCL tables, etc. must be considered as well as any enhanced or revised features in a product that would preclude an existing or new function in that product.
Other ramifications that make the implementation of this SIR complex are VAXclusters and the various flavors of clustered environments that might exist in a customer environment (such as complex database locking scenarios on both common and non-common disks throughout the cluster). These pose resource allocation and file/record access considerations. A new release of a product could introduce advance features incompatible with databases jointly accessed with an older version of the product.
Additionally, product validation, test complexity, and ensuring system compatibility grows rapidly in order to ensure continued quality in each product.
There are ways of accomplishing this to some extent with today's products by the use of alternate system roots, if you system environment is flexible enough to allow this. These alternate roots, however, must reside on alternate system disks and cannot be an alternate root on a common system disk.
VAX Datatrieve accomplishes this by allowing a unique suffix per additional version (at the installer's request).
In summary, we agree that this is an attractive and useful
VAX-40
-

PAGESWAPPER - February 1986 - Volume 7 Number 7 Digital Responds to the Fall 1985 SIR Ballot
feature to add and would consider implementing it on a product by product basis as the design and implementation of each allows.
SIR: F85-27 Position: 4 Points: 477
Abstract: Enhance DELETE command behavior so that when a version number was omitted, the command would be interpreted as ";*/CONFIRM" (as is done in RSX-11.)
Response: Historically, when the VMS DELETE command was pla'nned, it did parallel the behavior of the RSX DELETE command; it originally gave an error message when the ";" was omitted. The RSX version was changed after the VMS command was implemented.
Any inconvenience to the user of the DELETE command caused by the accidental omission of a file version specification is easily minimized by the use of the command recall feature of DCL.
SIR: F85-42 Position: 5 Points: 471
Abstract: Enhance network support in BACKUP. Particularly, support a remote magnetic tape server, rudimentary DECnet capability for standalone BACKUP, and the ability to boot stand-alone BACKUP over Ethernet.
Response: a) Remote BACKUP Server: This is an interesting and useful idea. We will consider it for a future VMS release. While there are some dependencies involved in building such a facility, we do not see any insurmountable problems.
b) Rudimentary DECnet capability for stand-alone BACKUP: Unfortunately, there is no such thing as a rudimentary DECnet capability. DECnet/VAX consists of a considerable number of components, all of which must be present and functioning before any level of DECnet capability is available. Also, the operation of DECnet requires the presence of DCL, RMS, and the file system, non of which are currently present in stand-alone BACKUP. To provide DECnet support in stand~alone BACKUP would require expanding stand-alone BACKUP to incorporate most of the full VMS kernel.
c) Boot stand·alone BACKUP over Ethernet: Because the Kernel that stand-alone BACKUP runs on is simply a VMS executi've, this amounts to booting the VMS executive and a single~task system over the Ethernet. This is obviously a rather complex job.
We feel that the solutions b) and c) are sufficiently complex and costly that it is unlikely that they will be
VAX-'41

PAGESWAPPER - February 1986 ~ Volume 7 Number 7 Digital Responds to the Fall 1985 SIR Ballot

implemented. However, we are looking at alternatives to improving system installation and maintenance in the Ethernet environment.

SIR: F85-ll4 Position: 6 Points: 375

Abstract: Provide enhanced CPU usage reports in MONITOR, particularly breakdown of kernel mode time by system component, and breakdown of per-user CPU time by access
mode.

Response: This is a good idea because it eliminates a lot of the guess work that's involved in determining the culprit in a system performance problem.

However, implementation of this type of collection requires many hooks to be placed in the executive and some analysis work to make sure that these hooks do not create new
performance problems.

At this point we have not researched any aspect of this feature and have no plans to do so in the immediate future. But, because the information is highly beneficial, it may be a candidate for a future release.

In the meantime, information of this kind can be obtained using the performance analysis products VAX SPM and PCA.

SIR: F85-49 Position: 7 Points: 371

Abstract: Provide a screen editor for AUTHORIZE

Response: Again, it has been recognized that the user friendliness of the VMS AUTHORIZE utility falls short of requirements, and therefore a major re-work is being planned.

This request, or something very similar, is also being given active consideration.

SIR: F85-l8 Position: 8 Points: 364

Abstract: Add a class based scheduler to VMS

Response: We also feel that a class-based scheduling capability

is very important, and believe that it is applicable for

both single-node and cluster configurations. This is

particularly

true

in

large timesharing service

environments. We also noted with interest that this

particular request has risen from 16th to 8th place in the

ballot.

Note however, that its implementation requires major and

VAX-42

PAGESWAPPER - February 1986 - Volume 7 Number 7 Digital Responds to the Fall 1985 SIR Ballot

extensive work in the executive and could therefore only be shipped in a major release.

Although preliminary research has taken place, this work is not included in the modifications expected to be completed prior to the next rebuild of the executive. Therefore, it will be some time before this feature is available.

SIR: F85-24

Position: 9

Points: 330

Abstract: Add an automatic closing option to DCL file opens so that when a procedure aborts for some reason, all files it
opened would be closed.

Result: We currently don't plan on implementing the file closing feature that is requested because A) it would require several design changes in DCL's file processing, and b) an easy work around exists which will provide the
functionality required.

The context that is saved whenever DCL opens up a file contains neither the procedure level at which the file was opened, which is irrelevant to an opened file, or the
logical name associated with the file.

As a work around, you can specify exit handlers that are activated by either by an error condition or control-Y, by using the ON command. By use of the "/NOLOG" qualifier on the CLOSE command, you can suppress the error message generated by trying to close a file that wasn't yet opened
at the time of the error.

SIR: F85-36

Position: 10

Points: 326

Abstract: Provide delivery tracking for VMS MAIL, including support in a network configuration.

Response: Receiving the "MAIL>" prompt back is actually instantaneous notification that the message is in the mail file of the receiver. If MRGATE (part of the ALL·IN-1 product) is being used, say to get VMS MAIL to an ALL-IN-1 system then return of the "MAIL>" prompt means that the message is in control of the Message Router for delivery.

The ability to inform a sender when a message is actually read is a very contentious issue since many individuals would consider this to be an unacceptable invasion of privacy. Thus, there are no plans to implement such a feature in VMS MAIL.

DIGITAL is currently investigating producing an enhanced VMS MAIL product that has directory services and an interface directly into the Message Router for store and

VAX·43

PAGESWAPPER - February 1986 - Volume 7 Number 7 Digital Responds to the Fall 1985 SIR Ballot
forward capability. Also, the Message Router will probably have a message trace capability in the future.
FALL 1985 SIR BALLOT RESULTS
Gary Grebus SIR Coordinator Those of you who managed to find the Fall SIR Ballot in the September Pageswapper were hopefully pleased with its contents. I think it contained a very interesting collection of requests involving many substantial issues. However, it appears that the confusion and overwhelming size of the first combined newsletter may have prevented some SIG members from finding the ballot. In fact, the largest distribution of the SIR ballot yielded the POOREST return ever, with only 172 ballots returned. The summary of this voting appears below. Digital's response to the top 10 requests overall will be presented at the Fall 1985 DECUS Symposium in Anaheim. Interpreting the SIR Ballot Results The results of the System Improvement Request ballot are show on the following pages. All of the reports have the same one page format. Following the report title is the number of ballots counted for that report. The number shown ·on the "All Users" report is the total number of ballots which were returned. The SIR's are listed on the page in order of points received, from highest to lowest. The entry for each SIR begins with the SIR number (from the ballot), a brief description, and the total number of points received by that SIR. Next are listed the number of ballots which assigned positive and negative points points to the SIR. These numbers are expressed as a percentage of the total number of ballots represented on the report. Finally, the mean number of points assigned and the standard deviation of the points are show.
VAX-44
-

PAGESWAPPER - February 1986 - Volume 7 Number 7 FALL 1985 SIR BALLOT RESULTS

THE TOP 45 SIR's AS RANKED BY ALL USERS

Total ballots in this category:

172

Fall 1985 Ballot

SIR

SIR

Nr.

Description

11 Support in-place disk compression 55 Enhance AUTHOR! ZE SHOW command
6 Multiple versions of layered products 27 Enhance DELETE command behavior 42 Enhance network support in BACKUP
4 Enhance CPU usage reports in MONITOR 49 Provide screen editor for AUTHORIZE 18 Add class-based scheduler to VMS 24 Add automatic file close for DCL 36 Add delivery tracking to MAIL 34 Add match 1 imi t to SEARCH 10 Allow INSTALL with priority and UIC 28 Modify behavior of PURGE command 6 7 Enhance EDT search command 46 Add some DCL to S/A BACKUP environ
8 Provide a SYSGEN DISCONNECT 17 Support standard print-file format 50 Add /INTERACTIVE and /IMAGE to SHOW SYS 19 Provide for extended error info 20 Add keyword search to HELP 45 Provide time estimates for BACKUP 33 Utility for setting file attributes 37 Add wildcard send to MAIL
5 Enhance the ALLOCATE command 2 Provide a quota on buffered I/O RATE 48 Add manual recover mode for BACKUP 30 Modify treatment of SET VERIFY 41 Add field support to DCL READ 56 Log one process stopping another
38 Provide callable interface to MAIL 44 Volume init parameters to S/A BACKUP 62 Support descending keys in RMS 21 Add /NOIMAGE debugging option to OCL
15 Provide TCP/IP support 59 Support pr inters on term servers 14 Alter the priority boost mechanism 57 support pcint/batch job dependency 63 Provide VMS definitions for all langs. 40 Better SET TERM/INQUIRE with VT220 22 Allow DCL procedures in libraries 39 Add /NOADVANCE to DCL WRITE 6111 Add tape AVR and label security 47 Fix S/A BACKUP on write-protected disk 23 Provide a DCL optimizer
74 Add DECnet End-to-end encryption

Total Pts
847 588 4H 477
~l
TI5 371 H4 330 326 325 n2 297 297 H6 H6
~6
286 266 H2 H9 239 238 232 230 223 221 ll0 208 201 U2 U4 U4 U2 170 lU U3 U2 161 161 160 158
l"
146 129

Pct of Ballots Pos Pts
59. 9 48 .8 41.9
39.0 33. l 35. 5 33. l 30.8 31.4 29. l 30. 2 29. l 33. 7 24 .4 25.0 26. 2 27. 3 27 .9 26. 7 26. 2 22. 7 20. 9 26. 2 21.5 19.2 19. 8 22. 7 21.5 21. 5 18. 6 20 .9 15. 7 17 .4 12. 8
14 .o
16. 9 14. 0 12. 2 16 .9
14 .o
17 .4 11.6
14 .o
16. 3 9.9

Pct of Ballots Neg Pts
o.·
0 ··
o. 6
l. 7
o.o o.o o··
l. 2 0.6 0.6
0 .o
0.6 2. 3
...0.6
0 ··
o.o
0 .o
0 .6 0.6 0 .0 0.0 l. 7
o .e
l. 7 0.0 l. 7 0.6
o0 ..o·
0.6
o.o
0.6
...0. 6
o. 0
1.2
o. 6
0. 6 1.2
o. 6
0 .0
o. 6
2. 3 0 .0

Avg Pts Given
8.22 7. 00 6. 77 6 .81 8. 26 6.15 6. 51 6.62 6.00 6. 39 6. 25 6. 31 4. 79 6.91 6. 88 6. 58 6. 09 5. 96 5.66 5 .48 6. 38 6. 64 4 .96 6. 27 6. 39 6. 56 5.26 5. 79 5.62 6.28 5.19 6 .Bl 5 .61 7. 48 7 .08 5.29 6. 79 7. 36 5. 37 6.19 5.16 7. 90 6.16 4.56 7. 59

VAX-45

Std Dev of Pts
2.7078 2. 8999 3.6573 3. 5684 2.3109 3 .1190 2. 7654 4 .1522 3. 3884 3.4472 3.3599 3.6742 3.6581 3. 9989 2.8885 2. 9961 2. 9769 3.11111132 3.9081 3. 8629 3.2169 2. 8998 3.5667 2.9781 4.0798 2.9969 4. 6068 3.9192 2.8901 2.6789 2. 9518 3.3286 4 .1607 3. 9413 3.0205 3.6805 2. 9632 3.7613 4.4138 4.4544 4.0996 2. 9182 3. 6134 5.6622 2.6939

PAGESWAPPER - February 1986 - Volume 7 Number 7 FALL 1985 SIR BALLOT RESULTS

THE TOP 45 SIR 1 s AS RANKED BY BUSINESS EDP USERS

Total ballots in this category:

53

Fall 1985 Ballot

SIR

SIR

Nr.

Description

Total Pts

Pct of Ballots Pos Pts

Pct Of Ballots Neg Pts

Avg Pts Given

11 Support in-place disk compression

297

64. 2

0.0

55 Enhance AUTHOR! ZE SHOW command 42 Enhance network support in BACKUP

159

43. 4

0.0

157

34. 0

0 .o

6 Multiple versions of layered products

155

37. 7

0.0

36 Add delivery tracking to MAIL 27 Enhance DELETE command behavior 34 Add match limit to SEARCH

143

35. 8

0.0

137

34 .o

1.9

133

39 .6

o. 0

4 Enhance CPU usage reports in MONITOR 18 Add class-based scheduler to VHS 49 Provide screen editor for AUTHORIZE 67 Enhance EDT search command

133

41. 5

0.0

132

34 .Ill

0 .o

123

32 .1

0 .o

114

24. 5

o. 0

24 Add automatic file close for DCL

109

32.1

0.0

56 Log one process stopping another 46 Add some OCL to S/A BACKUP environ

104

28. 3

0.0

104

24. 5

o. 0

5111 Add /INTERACTIVE and /IMAGE to SHOW SYS

102

26. 4

0.0

57 Support print/batch job dependency

101

28. 3

o. 0

3111 Modify treatment of SET VERIFY

92

24. 5

0.0

20 Add keyword search to HELP

84

28. 3

0.0

28 Modify behavior of PURGE command 41 Add field support to DCL READ

83

30. 2

l. 9

81

24. 5

o.o

4111 Better SET TERM/INQUIRE with VT220

78

24. 5

1.9

59 Support printers on term servers

77

18.9

0. 0

33 Utility for setting file attributes

77

17 .0

0.0

5 Enhance the ALLOCATE command

75

22. 6

0.0

62 support descending keys in RMS

74

2111. 8

0 .0

38 Provide callable interface to MAIL 48 Add manual recover mode for BACKUP
1 Retain control of a MOUNT'ed device

73

17 .0

0. 0

72

15. l

o. 0

69

18 .9

o. 0

44 Volume init parameters to S/A BACKUP 39 Add /NOADVANCE to DCL WRITE

69

20. 8

0. 0

68

20. 8

0 .o

2 Provide a quota on buffered I/0 RATE

64

17 .0

0.0

66 Editors must avoid simultaneous update 19 Provide for extended error info

64

18.9

0.0

64

26. 4

o··

21 Add /NOIMAGE debugging option to DCL 8 Provide a SYSGEN DISCONNECT
47 Fix S/A BACKUP on write-protected disk

63

18 .9

0. 0

59

18 .9

o. 0

55

15.1

o. 0

63 Provide VMS definitions for all langs. 10 Allow INSTALL with priority and UIC 53 Support restricted DCL environments 60 Add tape AVR and label security

55

13. 2

0.0

53

17 .0

o. 0

52

11. 3

o. 0

52

11. 3

o. 0

72 Allow image-controlled file access 75 Improve node authentication in DECnet

51

13 .2

0.0

50

9. 4

o.o

37 Add wildcard send to MAIL 45 Provide time estimates for BACKUP

47

15. l

l. 9

46

13. 2

o.o

7 support "keyboard" filters

46

13. 2

0.0

8. 74 6.91 8. 72 7. 75 7. 53 7. 21 6. 33 6. 05
7. 33 7 .24 8. 77 6.41 6.93
8 .oo
7. 29 6. 73 7. 08 5. 60 4. 88 6. 23 5. 57 7. 70 8.56
6.25 6. 73 8 .11 9. 00 6. 90 6. 27 6.18 7 .11 6. 411J 4. 57 6. 30 5.90 6. 88 7 .86 5. 89 8. 67 8. 67 7. 29
10 .oo
5. 22
6. 57 6. 57

VAX-46

Std Dev of Pts
2.4533 3. 0288 2.0809 2.8631 2.9130 3. 7502 3. 3665 3.3163 2. 7865 2.6108 2.4205 3.3365 3. 2834 2.7689 3.3381 2.8900 3. 4269 3.0190 3. 4074 2. 7127 5.6120 3.0930 2.9627 2.6671 3. 2586 2.0883 2.1381 3.0714 2.9357 3.3412 2.8916 2. 7162 2. 7376 2.6687 3 .0714 3. 4821 2.8536 3.2575 2.4221 2 .1602 3 .14 72 0.01110111 4.3525 3. 3594 3.4572

PAGESWAPPER ... February 1986 - Volume 7 Number 7 FALL 1985 SIR BALLOT RESULTS

THE TOP 45 SIR' s AS RANKED BY SOFTWARE DEVELOPERS

Total ballots in this category:

128

Fall 1985 Ballot

SIR

SIR

Nr.

Description

11 Support in-place disk compression SS Enhance AUTHORIZE SHOW command
6 Multiple versions of layered products 42 Enhance network support in BACKUP 18 Add class-based scheduler to VMS 27 Enhance DELETE command behavior
4 Enhance CPU usage reports in MONITOR
49 Provide screen editor for AUTHORIZE
19 Allow INSTALL with priority and UIC 36 Add delivery tracking to MAIL 24 Add automatic file close for DCL 34 Add match limit to SEARCH
B Provide a SYSGEN DISCONNECT 46 Add some DCL to S/A BACKUP environ 67 Enhance EDT search command 17 Support standard print-file format 28 Modify behavior of PURGE command 4S Provide time estimates for BACKUP 33 Utility for setting file attributes 39 Modify treatment of SET VERIFY 19 Provide for extended error info
S9 Add /INTERACTIVE and /IMAGE to SHOW SYS
37 Add wildcard send to HAIL 29 Add keyword search to HELP
2 Provide a quota on buffered I/O RATE 62 support descending keys in RMS
s Enhance the ALLOCATE command 41 Add field support to DCL READ 48 Add manual recover mode for BACKUP
38 Provide callable interface to MAIL 21 Add /NOIMAGE debugging option to DCL S6 Log one process stopping another 63 Provide VMS definitions for all langs.
44 Volume init parameters to S/A BACKUP
47 Fix S/A BACKUP on write-protected disk 23 Provide a DCL optimizer 14 Alter the priority boost mechanism lS Provide TCP/IP support S7 Support print/batch job dependency S9 Support printers on term servers
3S DIFFERENCE should support C comments 7 Support "keyboard" filters
49 Better SET TERM/INQUIRE with VT229 61 Support segmented keys of mixed type 66 Editors must avoid simultaneous update

Total Pts
629 414 369 3S4 31S 397 298 282 267 2S8 247 243 223 222 222 21S 289 294 199 194 188 188 178 174 174 162 1S8 1S7 1S6 lSS 141 13S 133 131 131 127 121 119 189 186 184 182 192 lH
97

Pct of Ballots Pos Pts
69.2 46. l 42.2 32.9 33.6 32.8 37 .s 33.6 32.9 39.S 38.S 29. 7 2S.9 24.2 2S.8 27 .3 33.6 24.2 23.4 2S.8 24.2 2S.8 26.6 24. 2 19.S 17. 2 19.S 21.l 18 .e 18.9 18.8 18.8 13. 3 18.8 lS.6 16.4 16.4 11. 7 12.S 13. 3 12.S 14. l 14. l 18.2 lS.6

Pct of Ballots
Neg Pts ,
9.9
9.8 9.8 9.8
9.8 2.3
9.9 9.9
9.8 9. 8 8.9 8.9 8.8 9.9 9.8 9.8 3.1 8.8 8.lf 8.8 e.8
8.9 1.6 8.8
2.3 8.9 8.8 8.8 9.8 9.8
8.8 8.8 9.8 8.8
8.8 1.6 1.6 8.8 8.8
9.8 8.8 8.8 9.8 8.8 2. 3

Avg Pts Given
8.17 7 .82 6. 71 8.63 7 .16 6·82 6.21 6.S6 6. 36 6.4S 6. 33 6. 39 6.97 7 .16 6.S3 6.14 4.4S 6.S8 6.63 S.71 s.63 S.4S 4.94 S.44 6.21 7. 36 6. 32 S.61 6. 78 6.74 S.88 S.87 7 .39 S.24 6.SS s.s2 S.26 6.88 6.81 6.24 6.S8 S.37 S.37 7 .69 4.22

VAX-47

Std Dev of Pts
2.8971 2. 9S87 3.8S22 2.9827 3.7938 3. 8981 3.1SS3 2. 89S6 3. 7923 3.S379 3. 8464 3.373S 3.9S31 3.Hll 4.2913 3.1168 3. 8SS8 3. 3144 2. 9998 3.6887 4. 2786 2. 9S98 3.48S4 4 .1963 4. 3662 3. l 78S 3 .14S4 4. 3148 2. 87SS 2. S97S 4. S23S 2.943S 3. 9S77 3 .1791 2. 7818 4.971S 4 .1S84 4. 3348 3 .1669 3.8317 3.366S 3 .1397 S.1778 3.1469 4. S821

PAGESWAPPER - February 1986 - Volume 7 Number 7 FALL 1985 SIR BALLOT RESULTS

THE TOP 45 SIR 1 S AS RANKED BY EDUCATIONAL USERS

Total ballots in this category:

22

Fall 1985 Ballot

SIR

SIR

Nr.

Description

Total Pts

Pct of Ballots Pos Pts

Pct of Ballots Neg Pts

Avg Pts Given

11 Support in-place disk compression
SS Enhance AUTHORIZE SHOW command 6 Multiple versions of layered products
19 Provide for extended error info Si Add /INTERACTIVE and /IMAGE to SHOW SYS 27 Enhance DELETE command behavior lS Provide TCP/IP support 18 Allow INSTALL with priority and UIC
24 Add automatic file close for DCL 2 Provide a quota on buffered I/O RATE
28 Modify behavior of PURGE command
44 Volume init parameters to S/A BACKUP 23 Provide a DCL optimizer 49 Provide screen editor for AUTHORIZE
42 Enhance network support in BACKUP 14 Alter the priority boost mechanism 41 Add field support to DCL READ 39 Add /NOADVANCE to DCL WRITE 22 Allow DCL procedures in libraries
17 Support standard print ... file format 28 Add keyword search to HELP 36 Add delivery tracking to MAIL 46 Add some DCL to S/A BACKUP environ
9 Propagate file ERASE attribute 8 Provide a SYSGEN DISCONNECT S3 support restricted DCL environments 48 Add manual recover mode for BACKUP 34 Add match 1 imi t to SEARCH
4 Enhance CPU usage reports in MONITOR 16 Add l!'ILE ID to $GETQUI S6. Log one Process stopping another
37 Add wildcard send to MAIL S9 Support printers on term servers 63 Provide VMS definitions for all langs. S4 "Unbundle" the CAPTIVE login flag 7S Improve node authentication in DECnet
39 Modify treatment of SET VERIFY 7 Support "keyboard" filters
43 Enhance ACCOUNTING summary report 69 Add tape AVR and label security 67 Enhance EDT search command 3S DIFFERENCE should support C comments 49 Better SET TERM/INQUIRE with V'l'22fl 32 Increase LIB$GET FOREIGN buffer 68 Keep EDT select i'egion active

122

63.6

1.9

89

S8.8

8.9

78

S9.9

9.9

74

S4.S

9.9

72

S9.9

9.9

64

4S. s

4.S

S4

31.8

9.9

Sl

36.4

9.9

Si

4S. s

9.9

49

31.8

9.9

49

4S.S

9.9

48

31.8

9.9

47

36.4

·· s

46

27.3

8.9

43

22. 7

9.8

41

31.8

9.9

48

27 .3

8.8

39

31.8

9.9

38

22. 7

4.S

38

22. 7

8.9

37

36.4

8.9

37

27 .3

4.S

37

27. 3

9.8

36

27 .3

8.8

34

22. 7

9.8

31

18.2

8.8

31

27 .3

9.8

39

27 .3

9.8

39

36.4

9.0

28

22. 7

8.8

2S

27 .3

8.8

24

22. 7

4. s

24

13.6

9.8

24

13.6

8.9

23

13.6

4.S

23

13.6

9.9

22

18.2

9.9

21

22. 7

4.S

21

18.2

9.9

29

9.1

9.9

18

9.1

8.9

16

13.6

8.8

lS

13.6

8.9

lS

9.1

8.9

14

13.6

9.8

8.71 7 .27 7.99 6.17 6. SS S.82 7. 71 6.38 S.99
7 .99 4.99
6.86 S.22
7 .67 8.69 S.86 6.67 S.57 6. 33 7 .68 4.63 S.29 6.17 6.98
6.88 7. 7S S.17 S.99 3. 7S S.68
4.17 4.89 8.99 8.89
s. 7S 7 .67 s.sg
3.S9 S.2S 18.89 9.99 S.33 S.89 7 .S8 4.67

VAX-48

Std Dev of Pts
2.9913 3.9361 3. S342 3. 32S7 2. 88S8 4. 9763 3.9461 3. 92S6 2. 7487 3. 78S9 2. 7264 3. 9237 s. 9S3S 3.9111 2.1999 3.9237 2. S828 2. S728 4. 7618 3.361S 2.44S8 4. 8892 3 .188S 3. 2249 2.9496 3. 3848 3. 3116 2.6977 l.S811 3.8471 1.3292 S.S8S7 3.4641 3.4641 s. 6789 4.941S 3.3166 3.8341 9.S989 9.HH 1.4142 4.841S 3.9899 3.S3SS 2.8868

-

-

PAGESWAPPER - February 1986 - Volume 7 Number 7 FALL 1985 SIR BALLOT RESULTS

THE TOP 45 SIR's AS RANKED BY COMPUTER SCI. RESEARCHERS

Total ballots in this category:

12

Fall 1985 Ballot

SIR

SIR

Nr.

Description

Total Pts

Pct of Ballots
POS Pts

Pct of Ballots
Neg Pts

Avg Pts Given

Std Dev of Pts

11 Support in-place disk compression 6 Multiple versions of layered products
19 Provide for extended error info 8 Provide a SYSGEN DISCONNECT 2 Provide a quota on buffered I/O RATE
10 Allow INSTALL with priority and UIC 63 Provide VMS definitions for all langs. 27 Enhance DELETE command behavior
4 Enhance CPU usage reports in MONITOR 36 Add delivery tracking to MAIL
42 Enhance network support in BACKUP 55 Enhance AUTHORIZE SHOW command 54 "Unbundle" the CAPTIVE log in flag 21 Add /NOIMAGE debugging option to DCL 28 Modify behavior of PURGE command 23 Provide a DCL optimizer 14 Alter the priority boost mechanism
7 Support "keyboard" filters 15 Provide TCP/IP support 66 Editors must avoid simultaneous update 17 support standard print-file format 33 Utility for setting file attributes 44 Volume ini t parameters to S/A BACKUP 46 Add some DCL to S/A BACKUP environ 18 Add class-based scheduler to VMS
SUI Add /INTERACTIVE and /IMAGE to SHOW SYS 75 Improve node authentication in DECnet 67 Enhance EDT search command 58 Enhance handling of TAB's in SORT 59 Support printers on term servers 6UI Add tape AVR and label security 61 Support segmented keys of mixed type 62 Support descending keys in RMS
49 Provide screen editor for AUTHORIZE 45 Provide time estimates for BACKUP 34 Add match limit to SEARCH
78 Unnumbered FORMAT statements in FORTRAN 74 Add DECnet End .. to-end encryption 47 Fix S/A BACKUP on write-protected disk 41 Add field support to DCL READ 37 Add wildcard send to MAIL 38 Provide callable interface to MAIL
39 Add /NOADVANCE to DCL WRITE 35 Dil!'FERENCE should support C comments
5 Enhance the ALLOCATE command

6UI

58. 3

e.UI

48

58.8

8.8

47

58.8

8.8

45

u. 7

8.8

4e

33.3

Ul.9

35

33.3

8.8

34

33.3

8.8

33

33.3

8.8

32

41. 7

8.8

31

33.3

8.8

38

33.3

8.8

24

33.3

8.9

24

25.9

8.8

23

33.3

U1.ra

28

25.9

8.8

28

16. 7

8.8

28

16. 7

8.8

18

25.8

8.8

18

25.8

8.3

16

16. 7

8.8

15

16. 7

8.8

15

16. 7

8.8

15

16.7

8.8

15

16.7

U1.ra

l4

16. 7

8.8

l4

16. 7

8.8

13

16. 1

0.8

ll

16. 7

8.8

l8

16. 1

0.0

l8

8.3

0.0

l8

8.3

0.0

18

8.3

8.8

11'1

8. 3

"·"

l8

16. 7

8.8

l8

8.3

8.8

l8

8.3

8.8

18

8.3

8.8

l8

8.3

8.8

l8

8.3

8.8

9

16.7

8.8

8

16.7

8.8

8

16.7

8.8

8

8.3

8.8

8

16.7

8.8

7

16.7

8.8

8. 57 8.liHiJ 7 .83
9.88 18.88
8. 75
8.59 8.25 6.48
7. 75 7. 58 6.88 8.88 5. 75 6.67 18.88 18.88 6.88 4.58 8.88 7 .58 7 .58 7 .58 7 .58 7 .88 7 .88 6. 58 5. 58 5.88 18.88 18.88 lUl.9UI
10.ee
5.88 18.88 18.88
18.88 18.88 18.88
4.58 4.88 4.88 8.88
4.88 3.58

2.4398 2. 4495 3. 3714 2. 2361 8.8888 2. 5888 3. 8888 3. 5888 2. 5188 2.6388 2. 8868 2. 7888 3. 4641 2. 9861 2. 8868 8.8888 8.9888 4.8888 7 .1414 2. 8284 3. 5355 3. 5355 3.5355 3. 5355 4. 2426
2. 8284 4. 9497 8. 7871 8.8888 8.8888 8.1818 8. 1888
"8·.8"8""8"8
8. 8888 8.8888 8.8888 8.8888
8.8888 8. 7871 l.4142 l.4142 8.8888 l.4142 8. 7871

VAX-49

PAGESWAPPER - February 1986 - Volume 7 Number 7 FALL 1985 SIR BALLOT RESULTS

THE TOP 45 SIR's AS RANKED BY DATA ACQ./CTRL USERS

Total ballots in this category:

44

Fall 1985 Ballot

SIR

SIR

Nr.

Description

Total Pts

Pct of Ballots Pas Pts

Pct of Ballots Neg Pts

Avg Pts Given

11 Support in-place disk compression 55 Enhance AUTHORIZE SHOW command 42 Enhance network support in BACKUP 49 Provide screen editor for AUTHORIZE 27 Enhance DELETE command behavior
8 Provide a SYSGEN DISCONNECT 18 Add class-based scheduler to VMS 19 Allow INSTALL with priority and UIC 28 Modify behavior of PURGE command 4 6 Add some DCL to S/A BACKUP env i ran
2 Provide a quota on buffered I/0 RATE 34 Add match 1 imi t to SEARCH 19 Provide for extended error info
6 Multiple versions of layered products 59 Support pr inters on term servers 45 Provide time estimates for BACKUP 24 Add automatic file close for DCL
4 Enhance CPU usage reports in MONITOR 36 Add delivery tracking to MAIL 21 Add /NOIMAGE debugging option to DCL 33 Utility for setting file attributes 38 Provide callable interface to MAIL 61 Support segmented keys of mixed type 44 Volume init parameters to S/A BACKUP 62 Support descending keys in RMS 63 Provide VHS definitions for all langs. 48 Add manual recover mode for BACKUP 17 Support standard print-file format 67 Enhance EDT aearch command
66 Editors must avoid simultaneous update 14 Alter the priority boost mechanism 15 Provide TCP/IP support 47 Fix S/A BACKUP on write-protected disk 26 Provide a "catch symbol" for DCL 29 Add keyword search to HELP 74 Add DECnet End-to-end encryption
SUI Add /INTERACTIVE and /IMAGE to SHOW SYS 57 support print/batch job dependency 41 Add field support to DCL READ 23 Provide a DCL optimizer 38 Modify treatment of SET VERIFY 65 Enhance MACRO support in DEBUG 53 Support restricted DCL environments 75 Improve node authentication in DECnet
32 Increase LIB$GET_FOREIGN buffer

243

63.6

8.8

158

52.3

8.8

146

48.9

8.8

189

36.4

8.8

181

34.l

2.3

96

27.3

8.8

96

31.8

8.8

96

36.4

8.8

93

43.2

4.5

98

27.3

0.8

86

29.5

2.3

84

31.8

8.8

82

31.8

8.8

82

36,4

2.3

7l

22. 7

8.8

78

22. 7

8.8

68

22.7

8.8

67

27.3

8.8

66

22.1

8.8

65

25.11

8.8

65

25.8

8.8

64

28.5

8.8

63

15.9

8.8

62

31.8

2.3

61

18.2

8.8

58

13.6

8.8

57

28.5

8.8

56

28.5

8.8

55

28.5

8.8

49

18.2

4.5

48

28.5

4.5

47

15.9

2.3

46

13.6

Ul.ra

46

15.9

8.8

45

28.5

8.8

45

13.6

B.8

4l

28.5

8.8

48

15.9

8.8

36

13.6

8.8

36

15.9

2.3

36

15.9

8.8

35

15.9

8.8

35

ll.4

0.8

35

9.l

8.8

34

ll.4

8.8

8.68
6.52 8.ll 6.81 6.31 8.88 6.86 6.88 4.43 7. 58 6.14
6.88 5.86 4.82 7.18 7.81 6.88 5.58
6.68 5.91 5.91 7.ll 9.88 4.13 7.63 9.67 6. 33 6.22 6.ll 4.98
4.36 5.88 7 .67
6.57 5.88 7 .58 4.56
5.71 6.88 4.58 5.14 5.88 7.18 8. 75 6.88

VAX-59

Std Dev of Pts
2. 4845 3 .1823 l.9863 2. 3443 3.5538 2.4863 3. 7181 2. 7889 3.4579 2.6112 3. 9973 3.5734 3.3936 4. 7281 2.9981 3.6515 3.5214 3. 8588 3. 8355 2.8794 2.5867 2.5712 2.6458 3 .1593 3.6621 8.8165 2. 7839 2 .9987 2. 9768 4. 3321 4. 7597 5.5484 2.3381 3. 4572 3. 9378 2. 7386 3.3953 3.4983 3. 2249 4. 3895 2. 8536 2. 9439 2.9155 2.5888 2. 7749

PAGESWAPPER - February 1986 - Volume 7 Number 7 FALL 1985 SIR BALLOT RESULTS

THE TOP 45 SIR'S AS RANKED BY CAD/CAM USERS

Total ballots in this category:

2B

Fall 1985 Ballot

SIR

SIR

Nr.

Description

Total Pts

Pct of Ballots Pos Pts

Pct of Ballots Neg Pts

Avg Pts Given

6 Multiple versions of layered products

111

S3.6

0.0

11 Support in-place disk compression

111

50. 0

0. 0

42 Enhance network support in BACKUP

103

42.9

0.0

SS Enhance AUTHORIZE SHOW command

99

50.0

0.0

28 Modify behavior of PURGE command

73

42.9

0.0

67 Enhance EDT search command

6S

35.7

3.6

4 Enhance CPU usage reports in MONITOR

64

35.7

0.0

36 Add delivery tracking to MAIL

51

42.9

0.0

27 Enhance DELETE command behavior

S9

32.1

0.0

10 Allow INSTALL with priority and UIC

SB

35.7

0.0

15 Provide TCP/IP support

SB

32.1

3.6

8 Provide a SYSGEN DISCONNECT

S6

32.1

0.0

49 Provide screen editor for AUTHORIZE

S6

32.1

0.0

18 Add class-based scheduler to VMS

S3

35.7

0.0

46 Add some DCL to S/A BACKUP environ

46

25.0

0.0

44 Volume init parameters to S/A BACKUP

42

28.6

0.0

38 Provide callable interface to MAIL

40

2B.6

0.0

59 Support printers on term servers

39

17.9

0.0

48 Add manual recover mode for BACKUP

39

21.4

0.0

40 Better SET TERM/INQUIRE with VT220

37

2B.6

0.0

63 Provide VMS definitions for all langs.

3S

14.3

0.0

34 Add match limit to SEARCH

34

28.6

0.0

58 Enhance handling of TAB' s in SORT

34

2S.0

0.0

5 Enhance the ALLOCATE command

34

21.4

0.0

30 Modify treatment of SET VERIFY

34

25.0

3.6

S0 Add /INTERACTIVE and /IMAGE to SHOW SYS

34

21.4

0.0

17 Support standard print-file format

33

28.6

0.0

20 Add keyword search to HELP

32

25.0

3.6

24 Add automatic file close for DCL

32

28.6

0.0

74 Add DECnet End-to-end encryption

30

14.3

0.0

60 Add tape AVR and label security

2B

10.7

0.0

2 Provide a quota on buffered I/O RATE

27

17.9

0.0

72 Allow image-controlled file access

27

14.3

0.0

4 7 Fix S/A BACKUP on write-protected disk

27

14.3

0.0

41 Add field support to DCL READ

2S

17.9

3.6

37 Add wildcard send to MAIL

2S

21.4

0.0

19 Provide for extended error info

24

17.9

3.6

1 Retain control of a MOUNT'ed device

21

UL7

0.0

14 Alter the priority boost mechanism

21

21.4

0.0

75 Improve node authentication in DECnet

20

7. l

0. 0

33 Utility for setting file attributes

19

14.3

0.0

56 Log one process stopping another

19

14.3

0.0

43 Enhance ACCOUNTING summary report

lB

14.3

0.0

7 Support "keyboard" filters

lB

14.3

0.0

45 Provide time estimates for BACKUP

lB

17.9

0.0

7. 40 7. 93 8. 58 7. 07 6. 08 5. 91 6. 40
5.08 6. 56 5 .80
5. 80 6. 22
6. 22 5. 30 6. 57 5. 25
s. 00
7 .80 6. 50 4. 63 8. 75 4. 25
4. B6 5.67 4. 25
5. 67 4 .13 4. 00 4. 00 7. 50
9. 33 5 .40 6. 75 6. 75 4 .17 4 .17 4. 00 7. 00 3. 50 10.00 4. 7S 4. 75
4. S0 4. 50 3 .60

VAX-51

Std Dev of Pts
3.6410 3. 3619 1.9752 2.9733 3. 6794 6. 07 38 3.6271 3.6794 3.2830 2.6162 5.0288 2.9907 2.4889 3.3015 2. 7603 2.0529 2.2039 2.5884 2.5884 3.6621 2.5000 3.1510 2. 7343 2.8752 4.7734 3.2042 2.1671 6. 2335 2.8284 2.8868 1.1547 2.5100 3.3040 2. 7538 7.8592 3.S449 7.8994 2. 6458 1. 3784 0.0000 3.8622 3.7749 4. 0415 2.5166 1. Sl66

PAGESWAPPER - February 1986 - Volume 7 Number 7 FALL 1985 SIR BALLOT RESULTS

THE TOP 45 SIR'S AS RANKED BY SERVICE BUREAU OPERATORS

Total ballots in this category:

12

Fall 1985 Ballot

SIR

SIR

Nr.

Description

Total Pts

Pct of Ballots Pos Pts

Pct of Ballots Neg Pts

Avg Pts Given

11 Support in-place disk compression 6 7 Enhance EDT search command 27 Enhance DELETE command behavior 57 Support print/batch job dependency 55 Enhance AUTHORIZE SHOW command 37 Add wildcard send to MAIL
6 Multiple versions of layered products
56 Log one process stopping another 42 Enhance network support in BACKUP 18 Add class-based scheduler to VMS
4 Enhance CPU usage reports in MONITOR 34 Add match limit to SEARCH
8 Provide a SYSGEN DISCONNECT 46 Add some DCL to S/A BACKUP environ 36 Add delivery tracking to MAIL
5 Enhance the ALLOCATE command 50 Add /INTERACTIVE and /IMAGE to SHOW SYS 72 Allow image-controlled file access 60 Add tape AVR and label security 66 Editors must avoid simultaneous update 28 Modify behavior of PURGE command 19 Provide for extended error info
23 Provide a DCL optimizer 38 Provide callable interface to MAIL 22 Allow DCL procedures in libraries 53 Support restricted DCL environments 20 Add keyword search to HELP 39 Add /NOADVANCE to DCL WRITE 45 Provide time estimates for BACKUP 40 Better SET TERM/INQUIRE with VT220
63 Provide VMS definitions for all langs. 1 Retain control of a MOUNT'ed device
25 Enhance CTRL-T capability 3 Provide for parsing a privilege string
62 Support descending keys in RMS 24 Add automatic file close for DCL
9 Propagate file ERASE attribute 59 Support printers on term servers 12 Enhance use of swapping to page files 52 Enhance SHUTDOWN procedure
2 Provide a quota on buffered 1/0 RATE 29 Improve /CONFIRM qualifier 47 Fix S/A BACKUP on write-=-protected disk 48 Add manual recover mode for BACKUP 74 Add DECnet End-to-end encryption

4B

S0.0

0. 0

46

41. 7

0. 0

37

50 .0

0. 0

34

41. 7

0.0

33

41. 7

0. 0

30

33. 3

0. 0

2B

33. 3

0. 0

27

33. 3

0. 0

26

25 .0

0. 0

2S

33. 3

0 .0

2S

33. 3

0. 0

2S

33. 3

0. 0

22

33. 3

0. 0

22

25.0

0.0

21

25.0

0.0

20

25 .0

0. 0

20

16. 7

0 .0

20

16. 7

0 ··

19

25. 0

0. 0

19

33. 3

0. 0

lB

25. 0

0. 0

lB

33. 3

0 .0

17

16. 7

0 .0

17

16. 7

0. 0

16

25.0

0. 0

16

25 .0

0. 0

16

25 .0

0 .0

lS

16. 7

0. 0

lS

16. 7

0.0

lS

16. 7

0.0

14

16. 7

0. 0

14

16. 7

0 .0

13

16. 7

0. 0

12

25 .0

0. 0

12

33. 3

0.0

11

25 .0

0. 0

11

25 .0

0 .0

10

B. 3

0.0

10

B. 3

0.0

10

16. 7

0.0

10

B. 3

0 .0

10

B. 3

0.0

10

B. 3

0 .0

10

B. 3

0. 0

10

B. 3

0.0

8 .00 9. 20 6.17 6. 80 6 .60 7. 50
7. 00 6. 75 8. 67 6. 25
6. 2S 6. 25
s. S0
7. 33 7. 00 6.67 10. 00 10 .00 6. 33 4. 75 6 .00 4. 50 B. s0 8. 50 5. 33 5. 33 5. 33 7. S0 7. S0 7. 50 7. 00 7 .00
6. S0 4. 00 3. 00 3. 67 3. 67 10. 00 10. 00
5. 1trn
10. 00 10. 00 10.00 Hl.00
10. 00

VAX-52

Std Dev of Pts
3.1623 1.7889 3.0605 3.1145 3. 2094 3.3166 2.1602 3.9476 2.3094 2.6300 4. 5000 2.9861 3.3166 2.5166 2.64SB 3.0551 0. 0000 0.0000 4. 0415 1. B930 3.6056 0. 5774 2.1213 2.1213 0.5773 4.1633 0. S773 3.5355 3.5355 3.S3SS 4.2426 4.2426 4.9497 1.0000 1.4142 1. 5275 1. 5275 0.0000 0.0000 0.0000 0. 0000 0.0000 0. 0000 0. 0000 0.0000

-

-

PAGESWAPPER - February 1986 - Volume 7 Number 7 FALL 1985 SIR BALLOT RESULTS

THE TOP 45 SIR' s AS RANKED BY HARDWARE DEVELOPERS

Total ballots in this category:

21

Fall 1985 Ballot

SIR

SIR

Nr.

Description

Total Pts

Pct of Ballots Pos Pts

Pct of Ballots Neg Pts

Avg Pts Given

HJ Allow INSTALL with priority and UIC 6 Multiple versions of layered products
42 Enhance network support in BACKUP 11 Support in-place disk compression 46 Add some DCL to S/A BACKUP environ 55 Enhance AUTHORIZE SHOW command 49 Provide screen editor for AUTHORIZE 18 Add class-based scheduler to VMS 21 Add /NOIMAGE debugging option to DCL 28 Modify behavior of PURGE command 63 Provide VMS detinitions for all langs.
4 Enhance CPU usage reports in MONITOR 24 Add automatic file close for DCL 17 Support standard print-file format 36 Add delivery tracking to MAIL 27 Enhance DELETE command behavior 14 Alter the priority boost mechanism 20 Add keyword search to HELP 67 Enhance EDT search command 74 Add DECnet End-to-end encryption 50" Add /INTERACTIVE and /IMAGE to SHOW SYS 35 DIFFERENCE should support C comments 66 Editors must avoid simultaneous update 38 Provide callable interface to MAIL 19 Provide for extended error info 37 Add wildcard send to MAIL 41 Add field support to DCL READ
5 Enhance the ALLOCATE command 1 Retain control of a MOUNT'ed device 2 Provide a quota on buffered 1/0 RATE 59 Support printers on term servers 72 Allow image-controlled file access 8 Provide a SYSGEN DISCONNECT 56 Log one process stopping another
75 Improve node authentication in DECnet 58 Enhance handling of TAB' s in SORT 33 Utility for setting file attributes 62 Support descending keys in RMS
64 Add /D LINES support to VAX C 39 Modify-treatment of SET VERIFY
29 Improve /CONFIRM qualifier 23 Provide a DCL optimizer
7 Support "keyboard" filters 45 Provide time estimates for BACKUP 68 Keep EDT select region active

Bl

47 ,6

0,0

75

52.4

0.0

75

42.9

9.0

65

47.6

0.0

64

42.9

0.0

64

42.9

0.0

51

42.9

0.0

4B

2B.6

4.B

46

2B,6

0.0

46

42,9

0,0

46

23.B

0.0

43

33,3

0.0

43

33.3

0.0

41

3B.l

0.0

40

33.3

0.0

40

2B.6

0.0

3B

2B.6

0.0

35

23.B

0.0

35

2B,6

0,0

35

19.0

0.0

34

33.3

0.0

32

2B.6

0.0

32

2B.6

0.0

30

23.B

0.0

29

23.B

0.0

29

33.3

0.0

28

19.0

9.0

27

19,0

0,0

26

14.3

0.0

25

14.3

0.0

25

14.3

0.0

23

14.3

"·"

21

23.B

0.0

20

9.5

0.0

20

9.5

0,0

19

23.B

111.0

lB

23.B

0.0

17

9,5

0.0

15

9.5

0.0

15

14.3

4.B

14

19.0

4.B

14

19.0

0.0

13

14.3

0.0

13

14.3

0,0

13

9.5

0.0

B.10 6.B2 8. 33 6. 50 7 .11 7 .11 5.67 6.B6 7 .67 5.11 9. 20
6.14 6.14 5.13 5. 71 6.67 6. 33 1 .01i 5. B3 B. 75 4. B6 5.33 5.33 6.00 5.B0 4.14 7 .00' 6. 75 B. 67 8. 33
B. 33 7 .67 4 .20 10 .00 10 .00 3.B0
3.60 B. 50 7 .50 3. 75 2. B0 3. 50 4. 33
4. 33 6. 50

VAX-53

Std Dev of Pts
2. 469B 3. 5726 2. 2913 3.B944 2.848111 2.B4B0 2. 5981 5.4903 2.65B3 2.6667 l.7BB9 3. 2367 2.7946 2.4749 2.Bll5 3. 7771 4.0332 4. 2426 3.3116 2. 5000 2.1931 3. BB16 2. 5820 2. 5495 3.1937 2.1931 3. 5590 4.2720 2.3094 2.BB6B 2.BB6B 4.0415 3. 3466 0. 0000 0. 0000 1.7889 1.6733 2.1213 3.5355 6. 7515 4.6043 2.3B05 2. 5166 4.9329 4.9497

PAGESWAPPER - February 1986 - Volume 7 Number 7 FALL 1985 SIR BALLOT RESULTS

THE TOP 45 SIR'S AS RANKED BY SCIENTIFIC/ENGINEERING USERS

Total ballots in this category:

99

Fall 1985 Ballot

SIR

SIR

Nr.

Description

Total Pts

Pct of Ballots Pos Pts

Pct of Ballots Neg Pts

Avg Pts Given

Std Dev of Pts

11 Support in-place disk compression

472

5B,6

0.0

55 Enhance AUTHORIZE SHOW command

328

49.5

Ill.Qi

27 -Enhance DELETE command behavior

281

41it.4

1.0

42 Enhance network support in BACKUP

277

35.4

0.0

6 Multiple versions of layered products

230

3B.4

1.0

49 Provide screen editor for AUTHORIZE

226

35.4

0.0

17 Support standard print-file format

209

33.3

Ill.Ill

24 Add automatic file close for DCL

207

31.3

0.0

8 Provide a SYSGEN DISCONNECT

203

31.3

0.0

28 Modify behavior of PURGE command

19B

30.4

2,0

18 Add class!.based scheduler to VMS

19B

30.3

2.0

46 Add some DCL to S/A BACKUP environ

196

27.3

0,0

10 Allow INSTALL with priority and UIC

193

31.3

1.0

45 Provide time estimates for BACKUP

1B9

27.3

0.0

4 Enhance CPU usage reports in MONITOR

1B6

30.3

0.0

34 Add match 1 imi t to SEARCH

161

26,3

0,0

19 Provide for extended error info

159

26.3

1.0

48 Add manual recover mode for BACKUP

149

23.2

0.0

33 Utility for setting file attributes

147

25.3

0.111

37 Add wildcard send to MAIL

145

28.3

0".0

20 Add keyword search to HELP

13B

23.2

1.0

5 Enhance the ALLOCATE command

137

22.2

0,0

2 Provide a quota on buffered 1/0 RATE

136

21.2

3.0

30 Modify treatment of SET VERIFY

133

24.2

2.0

15 Provide TCP/IP support

132

lB,2

1.0

67 Enhance EDT search command

131

21.2

1.0

36 Add delivery tracking to MAIL

125

24.2

111.e

50 Add /INTERACTIVE and /IMAGE to SHOW SYS

115

22.2

0.0

44 Volume init parameters to S/A BACKUP

114

23. 2

1.0

47 Fix S/A BACKUP on write-protected disk

10B

15.2

0.0

38 Provide callable interface to MAIL

100

lB.2

0.0

41 Add field support to DCL READ

87

17.2

1.0

63 Provide VMS definitions fo·r all langs.

B4

11.l

1.0

35 DIFFERENCE should support C comments

B3

15.2

0.0

14 Alter the priority boost mechanism

Bl

lB.2

2.0

21 Add /NOIMAGE debugging option to DCL

B0

16.2

1.0

39 Add /NOADVANCE to DCL WRITE

79

16.2

1.0

49 Better SET TERM/INQUIRE with VT2211l

7B

16.2

0.0

7 Support 11 keyboard 11 filters

77

14.l

0.0

22 Allow DCL procedures in libraries

76

11.l

1.0

60 Add tape AVR and label security

75

10.l

0.0

62 Support descending keys in RMS

75

12.l

0.0

9 Propagate file ERASE attribute

73

16.2

0.0

74 Add DECnet End-to-end encryption

71

10.l

0.0

59 Support printers on term servers

69

11.1

0.0

B.14 6.69 6.85 7 .91 5. 90 6. 46 6. 33 6,6B
6.55
4.95 6.19 7 .26 6.03 7 .00 6, 20
6.19 5. B9 6. 4B 5.88 5. lB 5. 75 6. 23 5.67 5.12
6.95 5.95 5.21 5. 23 4. 75 7. 20 5. 56 4 .83 7 ,00
5. 53 4. 05 4. 71
4. 65 4. BB 5. 50 6. 33 7 .50 6.25 4.56 7, 10 6. 27

2. 793B 2. 74 78 3. 2059 2.4177 4.0183
2. 6717 2.9333
3. 0701 2. 964 7 3 .1619 4. 9019 2,639B 3.8895
3. 0000 3.0332 3.4412 4.4B36 2,9675 2.6932 2 .6674 4.5612 3. 0B50 4. 46B9 4. B442 4,1563
4.7256 3. 256B 2.7243 2.6744 2. 67B0 2. 3066 4.6935 4. 3901 3.5429
3. 5314 4. 7666 4,B211
2. 9411 3. 0064 5.B205 3. 3417 3.6213 2.5025
2. 5144 2. 9357

VAX-54

PAGESWAPPER - February 1986 - Volume 7 Number 7 FALL 1985 SIR BALLOT RESULTS

THE TOP 45 SIR' s AS RANKED BY OFFICE AUTOMATION USERS

Total ballots in this category:

SB

Fall 1985 Ballot

SIR

SIR

Nr.

Description

Total Pts

Pct of Ballots Pos Pts

Pct of
Ballots Neg Pts

Avg Pts Given

11 support in-Place disk compression
SS Enhance AUTHORIZE SHOW command 42 Enhance network support in BACKUP 27 Enhance DELETE command behavior
6 Multiple versions of layered products
49 P;-ovide screen editor for AUTHORIZE
24 Add automatic file close for DCL
28 Modify behavior of PURGE command 18 Add class-based scheduler to VHS 67 Enhance EDT search command
36 Add delivery tracking to MAIL
34 Add match limit to SEARCH 8 Provide a SYSGEN DISCONNECT
46 Add some OCL to S/A BACKUP environ 63 Provide VHS definitions for all langs. l 7 Support standard print~file format
3B Provide callable interface to MAIL 47 Fix S/A BACKUP on write ... protected disk
21 Add keyword search to HELP
s Enhance the ALLOCATE command 48 Add manual recover mode for BACKUP 48 Better SET TERM/INQUIRE with VT2211
33 Utility for setting file attributes 37 Add wildcard send to HAIL 19 Provide for extended error info 41 Add field support to DCL READ
44 Volume init parameters to S/A BACKUP 21 Add /NOIMAGE debugging option to DCL
4 Enhance CPU usage reports in MONITOR 72 Allow image-controlled file access
74 Add DECnet End·to ..end encryption
S3 Support restricted DCL environments 4S Provide time estimates for BACKUP
lS Provide TCP/IP support l8 Allow INSTALL with priority and UIC S6 Log one process stopping another S9 Support pr inters on term servers 3S DIFFERENCE should support C comments 62 Support descending keys in RMS S7 support pr int/batch job dependency
7 Support "keyboard" filters l Retain control of a HOUNT'ed device 7S Improve node authentication in DECnet 22 Allow OCL procedures in libraries 31 Modify treatment Of SET VERIFY

231

SB.B

e.0

178

s6.e

e.8

141

36.8

8.0

136

48.8

2.0

128

36.8

a.a

l2a

36.a

a.a

111

42.a

a.a

118

42.8

2.8

189

34.8

a.8

181

3a.8

8.0

96

34.8

8.8

93

38.8

8.e

BS

28.8

B3

26.8

Bl

22.1

Bl

28.1

...1.8
8.e 8.8

80

24.8

8.e

B8

24.S

I.I

78

26.8

8.8

76

28.e

8.8

76

24.8

0.a

76

28.a

0.e

7S

22.0

1.8

72

32.0

78

26.1

6B

2a.8

67

24.9

...···2.0
0.1

67

28.o

8.1

65

24.8

a.e

6S

16.8

8.a

6S

16.8

8.8

63

lB.8

8.e

63

22.8

8.0

62

lB.I

2.8

61

28.1

8.0

6·

22.8

8.e

61

14.1

8.e

SS

14.1

8.1

SS

18.8

8.a

SS

18.1

8.8

S4

lB .8

0.8

S3

16.8

0.1

S3

12.1

8.8

S2

16.a

8.8

49

22.0

a.8

7 .93 6. 36 7 .83 6.48 7.11 6.67
s. 29 S.88 6.41 6. 73 S.6S 6.20 6.87 6.3B 7 .36 s. 79 6.67 6.67 6.08 S.43 6.33 S.43 6.82 4.24 s. 3B 6.Ba 5.58 6. 71 S.42 B.13 B.13 7.88
s. 73 6.28 6. ll S.4S 8.S7 7 .86 6.11 6.11 6.08 6.63 8.83 6.S8 4.4S

VAX-55

Std Dev of Pts
2.6313 3.9818 2. 382S 3. 41S8 3.2879 3.Ba98 3. Bl9a 3. 8SSl 3. 46S2 3. 2616 3. 7239 3. 7834 3.2691 2.9388 2.6S61 3.1929 2.2293 3. 82Sl 3.ISSl 2. 6B8B 2. 982S ).S673 2.6H7 2. 9692 3. 3798 2. 8216
2~6443
3.6833 3.1176 2.9881 2. SB77 3. 3166 2. 969S s. 24Sl 3.2472 3.416S 2.439B 3.6711 3.2S7S 3.8S96 3. S3SS 3.2923 2.8S77 2. 72SS 2. S442

PAGESWAPPER - February 1986 - Volume 7 Number 7 FALL 1985 SIR BALLOT RESULTS

THE TOP 45 SIR' s AS RANKED BY TELECOMMUNICATIONS USERS

Total ballots in this category:

23

Fall 198S Ballot

SIR

SIR

Nr.

Description

Total Pts

Pct of Ballots Pos Pts

Pct of
Ballots Neg Pts

Avg Pts Given

11 Support in-place disk compression 6 Multiple versions of layered products
42 Enhance network support in BACKUP SS Enhance AUTHORIZE SHOW command
4 Enhance CPU usage reports in MONITOR 8 Provide a SYSGEN DISCONNECT 19 Provide for extended error info 28 Add keyword search to HELP 28 Modify behavior of PURGE command 67 Enhance EDT search command 33 Utility for setting file attributes 44 Volume init parameters to S/A BACKUP l0 Allow INSTALL with priority and UIC 48 Add manual recover mode for BACKUP 49 Provide screen editor for AUTHORIZE 36 Add delivery tracking to MAIL 47 Fix S/A BACKUP on write·protected disk 24 Add automatic file close for OCL 2 Provide a quota on buffered I/O RATE 27 Enhance DELETE command behavior lB Add class-based scheduler to VMS 48 Better SET TERM/INQUIRE with VT2211 3S DIFFERENCE should support C comments s Enhance the ALLOCATE command
37 Add wildcard send to HAIL 63 Provide VMS definitions for all langs. 73 Implement government classifications 62 Support descending keys in RMS l4 Alter the priority boost mechanism 38 Provide callable interface to MAIL 21 Add /NOIMAGE debugging option to OCL 61 Support segmented keys of mixed type 38 Modify treatment of SET VERIJ!'Y 41 Add field support to DCL READ 34 Add match limit to SEARCH 31 SET PROTECTION for logical name tables SI Add /INTERACTIVE and /IMAGE to SHOW SYS
7 Support "keyboard" filters
l 7 Support standard print... file format 39 Add /NOADVANCE to CCL WRITE 61 Add tape AVR and label security 22 Allow DCL procedures in libraries
9 Propagate file ERASE attribute S9 Support printers on term servers
64 Add /D_LINES support to VAX c

84

47 .8

a.a

77

43.S

8.1

76

39.l

8.8

69

47 .8

a.a

63

39.l

8.a

S9

39.l

8.a

sa

34.8

a.8

46

38.4

8.8

4S

34.8

4.3

4S

26.l

8.8

43

26. l

8.8

43

38.4

1.8

4l

38.4

8.a

41

26.l

a.a

40

21. 7

8.8

39

21. 7

a.a

39

21. 7

8.8

39

38.4

8.8

3S

21. 7

4.3

3S

38.4

8.8

33

3a.4

8.8

33

31.4

a.a

33 32

1371·.4'

8.8 1.8

31

26.l

38

13.a

38

13.a

1··.8·
8.8

2B

17 .4

8.8

28

21. 7

a.8

27

21. 7

8.8

27

17.4

8.8

2S

13.8

2S

17 .4

2S

13.8

···o.8
1.e

2S

13.8

a.e

2S

13.8

8.e

23

13.1

8.8

22

13.8

8.a

21

21. 7

1.8

21

13.8

e.a

21

13.8

8.8

21

13.a

1.8

2·

17 .4

8.1

21

B. 7

1.1

19

B. 7

4.3

7.64 7. 1a 8.44 6. 27 7.88 6.S6 6.2S
6.S7 S.IB 7.S8 7.17
6.14 S.B6 6.B3
a.ea
7.88 7.88 S.S7 s.B3 S.88 4.71 4.71 B.2S 4.S7 s.11 18.88 ll.88
7.18 S.68
S.48 6. 7S B.33 6.2S 8.33 8.33 B.33 7.67 7.33
4.2a 7.H 7.18 7.88 s.80 18.80 6.33

VAX-56

Std Dev of Pta
3.8421 2.94SB 2.3Sll 3.2277 3.3S41 3.4681 3. 6936 3. 3894 4. 8927 3. 7283 3.3714 2. 7343 2 .1931 3.B687 2. 73B6 3. 8987 3.1937 3. 3894 s. 7a67 3.1891 2.4976 3.8617 3.5888 l.912, 3. l2S2 a.8888 a.1111 3. 5S98 2.SlH 3.6469 3. 7749 2.BB6B 4. 3493 2.886B 2.886B 2. BB6B 3. 2146 4. 6lBB 3.7114 3 .61S6 3.61S6 l.8088 3.SS98 a.1881 6.3Slf9

-

-

PAGESWAPPER - February 1986 - Volume 7 Number 7 VAX System SIG Committee List
VAX System SIG Committee List
As of October 28, 1985
Osman K. Ahmad - TOPS-VAX Association of American Railroads Technical Center, Research and Test Department 3140 South Federal Street Chicago, IL 60616
Joe Angelico - Assistant Symposium Coordinator US Coast Guard CCGDB(DT) Hale Boggs Federal Building 51110 Camp Street, New Orleans, LA 70130
Elizabeth Bailey - Volunteer Coordinator 222 CEB Tennessee Valley Authority Muscle Shoals, AL 35660
June Baker - Planning Computer Sciences Corporation 6565 Arlington Boulevard Falls Church, VA 22046
Joe L. Bingham - Librarian Mantech International 232111 Mill Road Alexandria, VA 22314
Bob Boyd - Commercial GE Microelectronics Center MS 2P-1114 Post Off ice Box 1341119 Research Triangle Park, NC 27709
C. Douglas Brown - Security Sandia Labs Division 2644 P.O. Box 581110 Albuquerque, NM 87185
Jack Cundiff - Assistant Symposium Coordinator Horry-Georgetown Post Off ice Box 1966 Conway, SC 29526
Tom Danforth - Handout Editor Woods Hole Oceanographic Institute Woods Hole, MA 02543
VAX-57

PAGESWAPPER - February 1986 - Volume 7 Number 7 VAX System SIG Committee List

Jim Downward - Migration and Host Development, VAXintosh KMS Fusion Incorporated 3941 Research Park Drive Ann Arbor MI 48106

Jane Furze - Campground 3830 West Cochise Phoenix, AZ 85064

Dennis Frayne - Real Time/Process Control McDonnell Douglas 5301 Bolsa Avenue Huntington Beach, CA 92646

Carl E. Friedberg - Internals In House Systems 165 William Street
New York, NY 10038

Don Golden - Publications Coordinator
c/o Shell Development Company, Westhollow Research Center Post Office Box 13480 Houston, TX 77001

D-2132

Gary Grebus · System Improvement Request Battelle Columbis Labs Room 11·6011 505 King Avenue Columbus, OH 43201-2693

B. Hancock - Network Dimension Data Systems, Incorporated 2510 Limestone Lane Garland, TX 7504111
Jeffrey s. Jalbert ~ Historian J cc
Post Office Box 381 Granville, OH 43023 614-587-0157

Ken Johnson - VAXcluster Working Group Meridian Technology Corporation Post Office Box 211106 St. Louis, MO 63011

Ray Kaplan - VAXeln Pivotal Incorporated 6892 East Dorado Court Ticson, AZ 85715

VAX-58

PAGESWAPPER · February 1986 ~ Volume 7 Number 7 VAX System SIG Committee List
Lawrence J. Kilgallen · Newsletter Editor Box 81, MIT Station Cambridge, MA 02139-0901
Margaret Knox - Chair Computation Center University of Texas Austin, Texas 78712
Ross w. Miller - Vice Chair and Working Group Coordinator Online Data Processing, Inc. N 637 Hamilton Spokane, WA 99202
Eugene Pal - Multiprocessor US Army CAORA (ATOR-CAT-CJ Fort Leavenworth, KA
Thomas Provost - Hardware MIT/LNS Bates Linac Facility Post Office Box 846 Middleton, MA 01949
Susan Rehse - System Management Lockheed Missiles 3251 Hanover Street Palo Alto, CA 94301-1187
Bob Robbins - Advisor Array Computer Consultants 5364 Woodvale Drive Sarasota, FL 33582
Larry Robertson - Real Time/Process Control Bear Computer Systems Inc. 5651 Case Avenue North Hollywood, CA
David Schmidt - LUG Coordinator Management Sciences Associates 5100 Centre Avenue Pittsburgh, PA 15232
Al Siegel - Advisor Battelle Memorial Institute 505 King Avenue Columbus, OH 43201-2693
D. Slater - Artificial Intelligence Institute for Defense Analysis 1801 North Beavregard Street Alexandria, VA 22314
VAX·59

PAGESWAPPER - February 1986 ~ Volume 7 Number 7 INPUT/OUTPUT
INPUT/OUTPUT
A SIG Information Interchange A form for INPUT/OUTPUT submissions is available at the back of the issue.

INPUT/OUTPUT 480

Caption: VI for VMS? wordstar for VMS?

Message:

Does anyone know where I can get a VI·like editor for VMS without buying a layered UNIX? I would also like to find a Wordstar lookalike for VMS without buying a hardware/software solution.

Contact:

Greg Collver Josephine County Schools 706 NW A Street Grants Pass, OR 97526 Telephone (503) 476·7721

Date:

December 12, 1985

INPUT/OUTPUT 481

Caption: YACC, LEX and LINT for MicroVAX under VMS

Message: We are looking for versions of the UNIX utilities YACC, LEX and LINT that will run on a DEC MicroVAX I
under VMS 4.1 with DEC c.

Contact:

w. E. Wilson Nuclear Radiation Center Washington State University Pullman, WA 99164-1300 Telephone (509) 335-8317

Date:

December 16, 1985

VAX-60
-

PAGESWAPPER - February 1986 - Volume 7 Number 7 INPUT/OUTPUT

INPUT/OUTPUT 482

Caption: Program to read IBM·PC floppy disks on a MicroVAX I

Message: Contact:

We desire to be able to read 5-1/4" floppy disks generated on an IBM-PC on the RX50 drive of a MicroVAX I. The July 1985 issue of the Pageswapper (I/O 431} indicated that Allison Hamilton in Canada had written a FORTRAN program that would perform this function. I wrote to Mr. Hamilton but did not receive a reply.
w. E. Wilson
Nuclear Radiation Center Washington State University Pullman, WA 99164-1300 Telephone (509} 335-8317

Date:

December 16, 1985

INPUT/OUTPUT 483

Caption: Dialing out on the VAX using a DF112 Modem

Message:

I wrote a Macro program which under VMS 3.7 would successfully dial out and connect our VAX to remote locations. Now under VMS 4.1 the program no longer works. Has the QIO function or related functions changed or is the problem in the terminal line set up?

Contact:

Tim Barrett Chalet Susse International, Incorporated Chalet Drive Wilton, NH 03086 Telephone (603} 654~2000 ext 276

Date:

December 24, 1985

VAX~61

J

[Q]
OECUS
LIBRARY
-

DECUS PROGRAM LIBRARY
NEW LIBRARY PROGRAMS AVAILABLE FOR THE PDP..11 COMPUTER FAMILY
DECUS ORDER NO: 11-813 Title: PEP: A Peptide Sequencing Program, Version:June 1985
Author. Charles Hamm, National Institute of Environmental Health, Research Triangle Park, NC, Operating System: RSX-11 M V4.1 C, Source Language: FORTRAN 77, Memory Required: 19KW, Other Software Required FORTRAN 77 compiler or resident FCS library
Abstract This program is intended to help researchers find possible constructs of peptides given the mass spectrum as generated by a fast-atom bombardment (FAB) tandem mass spectrometer and the suspected composition of the peptide. The program compares all permutations of a given combination of amino acids forming a peptide to the spectrum of the actual peptide. The comparsion is made by mathematically breaking each permutation at each of its possible cleavage points and counting the number of ion fragments that have a corresponding mass in the spectrum list. Only the permutations that have the highest number of matched fragments are considered candidates for the actual peptide and are listed in an output file.
Documentation on magnetic media Media (Service Charge Code): Floppy Diskette(KA),600' Magtape(MA), Format Fl LES-11
NEW LIBRARY PROGRAMS AVAILABLE FOR THE PDP..11 COMPUTER FAMILY

A rounding routine is included to round each value to the nearest cent
Documentation on magnetic media Media (Service Charge Code): Floppy Diskette (KA), 600' Magtape (MA), Format RT-11
DECUS ORDER NO: 11-815 Title: DPRINT, Version:V1 .6, December 1984
Author. Ed Mills, HarrisSemiconductorCorp., Melbourne, FL Operating System: TSX, RT, Source Language: PASCAL Other Software Required: OMSl-PASCAL (if recompilation is required); RT-11 MACRO language, Special Hardware Required: LA-1 00 printer or LA-1 00 compatible; VT-100 or compatible terminal with terminal attributes.
Abstract DPRI NT is a PASCAL program written to control DEC LA-100 printers. It allows the user to enter one or more file names and set the print parameters (i.e. letter/draft quality; margins; font etc.), as heorshedesires. It is very user-friendly and performs error-checking/ recovery. It was written for a DEC PDP 11 /23 under the TSX operating system, although it should run under RT11 as well. The user fills out a print menu and exits. The print control characters are seen, followed by the queued files. Lastly, the printer default parameters are reset. Contro~characters within the text change the printer parameters as they normallly would when sent to a printer.
Release Notes are included with each order.
Restrictions: The software is designed to run underTSX or RT-11 only. Since the package makes MACR0-11 calls, it will not run under RSX without modifications.
Documentation on magnetic media Media (Service Charge Code): Floppy Diskette(KA),600' Magtape(MA), Format RT-11

DECUS ORDER NO: 11-814
Title: LOANS. Verslon:V1 .o, October 1985
Author. James H. Norman, US Army, White Sands Missile Range, NM, Operating System: RSX-11 M V3.2, RT11 V4.0, VAX/VMS V4.0, Source !-anguage: FORTRAN IV Memory Required: 1450 KW
Abstract LOANS is a program to compute a repayment schedule of a loan. The user inputs the loan amoun~ the interest rate, and the length of the loan.
The program then computes the monthly paymen~ the amount applied to the principal, the amount of interest paid and the loan balance. The output is a disk file which contains a table of the Orabove values. The total interest paid on the loan is written at the end of the table. The file may be listed on a terminal or printed on a line printer.

NEW LIBRARY PROGRAMS AVAILABLE FOR THE DECSYSTEM-20 FAMILY OF COMPUTERS
DECUS ORDER NO: 20-SP-10 Title: Symposium Tape from DECSYSTEM-20 SIG, Spring 1985, New Orleans, Version: Spring 1985
Author. Various, Submitted By: Steve Attaya, Wiener
Enterprises, Harahan, LA, Operating System: TOPS-20 V5.1 Source Language: MACR0-1 0
Abstract The TOPS-20 Symposium Tape from Spring 1985 (New Orleans) contains JKILLR, SETERM and N NFT mods from Eastman Kodak; terminal control, wide directory display, and file searching utilities from Computer Sciences Corporation; a set of MACRO macros

LIB-1

with sample programs and DUMCPY, a DUMPER tape copying facility, a user mode COMND% JSYS simulator forTOPS-10/20 from SOHIO Petroleum; TAPSAV, a usermode replacement for DUMPER and WPSIM, a lowoverhead, sophisticated word-processing editor from Wesleyan University; MSG DAE, a genera~purpose IPCF message handler and LPTSPL patches for TTY lines from American Mathematical Society.
No guarantees are made as to the completeness, usability, or quality of the programs on this tape; and the material has not been checked or verified
Complete sources not included Documentation on magnetic media, Media(Service Charge Code): 2400' Magtape (PS)
REVISIONS TO LIBRARY PROGRAMS
DECUS ORDER NO: PR0-143 Title: RT on P/OS. Version: V2A, October 1985
Author. Chester Wilson, Charleville, Australia, Operating System: RT-11 V5, Source Language: MACR0-11, Other Software Required: RT-11 distribution Special Hardware Required: Professional-350
Abstract RT on P/OS allows a PR0-350 to run RT-11 from a contiguous file on a portion of the hard disk set up for P/OS. The" DC" handler is actually a modified" DW' handler, with an ability to allow the user to specify a "device" size and offset position within the hard disk.
The distribution is provided on a DZ( RX50) disk with instructions for mating with a foreground/background or virtual memory monitor from the RT-11 distribution kit
Documentation on magnetic media Media (Service Charge Code): 5 1/4" Floppy Diskette (JA), Format RT11
DECUS ORDER NO: VAX-129 Title: FORTRAN Programming Tools, Version:Vll.O, September 1985
Author. Arthur E. Ragosta, US Army, Moffett Field, CA, Operating System: VAX/VMS V4.0, Source Language: DCL FORTRAN 77, MACR0-32, Memory Required: Varies
Abstract The FORTRAN ProgrammingToolsareaseries of tools used to support the development and maintenance of FORTRAN source codes. Included are a debugging aid, source code maintenance aids, print utilities, a CPU time monitoring program, a NAMELISTlike package, and a library of useful, wel~documented routines. These tools assist in reducing development

time and encouraging high quality programs. Although intended for FORTRAN users, some of the tools can be used on data files or other programming languages.
Release Notes are distributed with each order.
Note: UsesVMSVersion4.0 BRKTHRU System Service.
Changes and Improvements: Major bug repairs were in the BUGO UT system and in several routines in MER LIB. Major enhancements are utility to assist transfer of files across card-oriented communications systems and inclusion of uninitialized variable checking and global variable cross-reference in the BUGOUT system. All of the PASCAL programs from previous versions were replaced with FORTRAN programs to enhance coherence and efficiency of package.
Complete sources are not included Documentation on magnetic media Media (Service Charge Code): 600' Magtape (MA), Format VAX/ANSI (Blocked at2048)
DECUS PROGRAM LIBRARY CHANGES
DECUS Program Library CHANGES: · For DECUS Order Number V-SP-3, Symposium
Tape from the VAX SIG, Spring, 1980 Chicago, the Catalog lists the format as VAX/ANSI (Blocked at 2048). This is incorrect, it should read RMSBCK Format · For the revision to DEC US Order Number11-SP-46, PORTACALC, please add the media, Manual (EA).

LIB-2

-

HOW TO SUBMIT TO A SPECIFIC SECTION OF THE NEWSLETTER
The following is a listing of the Newsletter Editors with their addresses and phone numbers. All submissions to the newsletter should be submitted directly to the appropriate Editor.

ARTIFICIAL INTELLIGENCE Terry Shannon 160 State Street Boston, MA 02109 (617) 367-7190
BUSINESS APPLICATIONS Thomas Byrne L Karp& Sons 1301 Estes Elk Grove, IL60007 (312) 593-5705

LARGE SYSTEMS Michael Joy 1st Church of Christ Scientist Boston, MA 02115 (617) 262-2300 x3903
NETWORKS Vicki Hancock 2510 Limestone Lane Garland, TX 75040 (214) 495-7353

DATA MANAGEMENT SYSTEMS Russ Poisson Seed Software Corp. 2121 Eisenhower Avenue Alexandria, VA 22314 (703) 783-4944
DAARC Ellen Reilly William H. Rorer 500 Virginia Drive Ft Washington, PA 19034 (215) 628-6547

PERSONAL COMPUTER Caroline Mack 6415 Adelphi Road University Park, MD 20782 (301) 927-01 OB
RSX Dominic DiNollo Loral Electronics Engineering Computer Center Ridge Hill Yonkers, NY 10710 (914) 968-2500 x2210

GRAPHICS APPLICATION Michael Anton P.O. Box 591293 Houston, TX 77259-1293 (713) 928-4838
IAS John Ross Roman McDonnell Douglas 600 McDonnell Blvd. Hazelwood, MO 63042 (314) 234-0984

SITE MANAGEMENT & TRAINING Gregory Brooks Washington University Behavior Research Lab. 1420 Gratton St. St Louis, MO 631 04 (314) 241-7600 x257
VAX SYSTEMS Larry Kilgallen c/O DECUS Office 219 Boston Post Road. (B P02) Marlboro, MA 01752

HOW-i

APL Doug Bohrer Bohrer& Company 903 Ridge Road, Suite 3 Wilmette, IL60091 (312) 251-9449
COMMERCIAL LANGUAGES Ted Bear RAMTEK 2211 Lawson Lane Santa Clara, CA 95950 (408) 988-2211
DATATRIEVE Joe H. Gallagher Cleveland Clinic Foundation 9500 Euclid Avenue Cleveland, OH 44106 (216) 444-2551
EDUSIG Fred Bell Taft College 29 Emmons Park Drive P.O. Box 1437 Taft, CA 93268 (805) 763-4282
HMS William Walker Monsanto Research Corp. P.O. Box 32 A-152 Miamisburg, OH 45342 (513) 865-3557
LANGUAGES & TOOLS Alan Folsom Jr. Fischer & Porter Company E. County Line Road Warminster, PA 18974 (215) 674-7154

MUMPS Janet Berryman 2405 N. Bush Santa Ana, CA 92706 (714) 953-1025
OFFICE AUTOMATION Margaret Drake Univ. of TX Health Science Ctr. 7703 Floyd Curl Drive San Antonio, TX 78284 (512) 691-6105
RSTS Bill Hobbs ComManD. Inc. 6535 E. 82 nd St., Suite 102 Indianapolis, IN 46250 (317) 842-5320
RT Bill Leroy The Software House, Inc. 470 E. Paces Ferry Road Park NE 1020 P.O. Box 52661 Atlanta, GA 30355 (404) 231-1484
UNISIG William Toth Harvard-Smithsonian Ctr. for Astrophysics 60 Garden Street P353 Cambridge, MA 02138 (617) 495-7181
Bruce Bergman UserWare International 2235 Meyer Avenue Escondido, CA 92025-1070 (619) 741-8825

HOW-ii

J

SUBMITTING ARTICLES TO THE HMS SIG NEWSLETTER

The purpose of the HMS SIG Newsletter is to serve as a forum to share information related to DEC hardware with the members of the SIG. As such, the existence of the newsletter is entirely dependent on your contributions. If you have an HHK item, a better or safer way to do something, product news, a tutorial article of general interest, etc., we are interested in publishing it in the newsletter. It is intended that the HMS SIG Newsletter be published at least
four times a year.

There are several ways to submit material for the newsletter:

o The Hardware Submission Form in the back of the newsletter can be used for brief items <there is
not enough room if you have a lot to say).

o You can send me camera-ready hard-copy <this saves me a lot of typing).

o I will accept submissions on floppys. I can handle RX50's or 8" diskettes <either density, single or double sided>. I prefer RT-11 format, if possible, but I can probably handle RSX or VMS stuff somehow. I will return your diskette(s), of course.

o Those of you that have access to DCS can send things to username WALKER. I check DCS daily.

o I am also on CompuServe as "Bill Walker 71066,24".

In any event. if you have anything to submit, send it! If it is a mess, but I can read it, I will get it in the newsletter somehow. Finally, if you have any question about submitting material, call me. My telephone number is listed below.

Contributions can be sent to:

HMS Editor

DEC US

OR

BP02

249 Northboro Road

Marlboro, MA 01752

William K. Walker Monsanto Research Corp.
P.O. Box 32 A-152
Miamisburg, OH 45342 (513) 865-3557

If you need to get something to me quickly, send it to my work address.

HOW-1

Cl
DECUS

DECUS SUBSCRIPTION SERVICE
SIGs NEWSLETTERS U.S. CHAPTER MEMBERS ONLY

As a member of DEC US U.S. Chapter, you are entitled to contribute and subscribe to the DECUS monthly publication, SIGs Newsletters. You also have the opportunity to subscribe to the Symposia Proceedings which are a compilation of the reports from various speakers at the U.S. National DECUS Symposia.
· No Purchase Orders will be accepted · The order form below must be used as an invoice. · All checks must be made payable to DECUS. · All orders MUST be paid in full. · No refunds will be made. · The address provided below will be used for all DECUS mailings; i.e. Membership, Subscription
Service and Symposia. · SI Gs Newsletters Price is for a one-year subscriptiE>n beginning the month following receipt of
payment.

Name _ _ _ _ _ _ _ _ _ _ _ _ _ DECUS Member No. _ _ _ _ _ _ _ _ _ __ Company _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
Address _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __

City _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ State _ _ _ _ _ _ Zip _ _ _ __ Phone _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __

Subscription Service Offering

Qty.

SIGs Newsletters Spring '85 Proceedings (SPS) Unavailable Fall '85 Proceedings (FAS) Spring '86 Proceedings (SP6) Fall '86 Proceedings (FA6)

TOTAL COST OF SUBSCRIPTION

Unit Price
$35.00 12.00 12.00 12.00 12.00

Total
$_ _ _ _ _ __

D MASTERCARD D VISA D DINERS CLUB/CARTE BLANCHE· _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Exp. Date_ _ _ _ _ _ _ _ _ _ _ _ __
I understand that there will be no refunds even if I decide to cancel my subscription. Signature: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __

FOR DIGITAL EMPLOYEES ONLY
Badge Ne. _ _ _ _ _ _ _ _ _ CC: _ _ _ __ CC Mgr. Name _ _ _ _ _ _ _ _ _ _ _ _ _ __ CC Mgr.Signature _ _ _ _ _ _ _ _ _ _ _ _ __

FOR DECUS OFFICE ONLY
Check No. _ _ _ _ _ __ Bank No. _ _ _ _ _ _ __ Amount$ _ _ _ _ _ _ __

Subscription Service, DECUS (BP02), 219 Boston Post Rd, Marlboro, MA 01752 (617) 480-3418.
HOW-3

j

DECUS U.S.CHAPTER APPLICATION FOR MEMBERSHIP

D New Membership D Update to current membership profile Current DEC US Member. # - - - - - - - - -
NOTE: PLEASE PRINT CLEARLY OR TYPE! PLEASE PROVIDE A COMPLETE MAILING ADDRESS, INCLUDE ZIP CODE IN ACCORDANCE WITH POSTAL REGULATIONS FOR YOUR LOCALITY.
ARE YOU AN EMPLOYEE OF DIGITAL EQUIPMENT CORPORATION? 0 YES 0 NO

(first)

(Middle lntial)

(Last/Family Name)

Companv·~-----------------------------------

Add ress~·-----------------------------------~

City/Town: _ _ _ _ _ _ _ _ _ _ _ _ _ _ State: _ _ _ _ _ _ _ _ _ _ _ _ _ Zip: _ _ _ __

Telephone: Home (

Work

HOW DID YOU LEARN ABOUT DECUS7 Please check applicable item.

1 D ANOTHER DECUS MEMBER 2 D SYMPOSIA 8 D DECUS CHAPTER OFFICE 10 D DIGITAL STORE

4 D DIGITAL SALES 5 D HARDWARE PACKAGE
6 D SOFTWAREPACKAGE
12 D ADVERTISING

13 D LOCAL USER GROUP 14 D SPECIAL INTEREST GROUP
7 D SOFTWARE DESPATCH (DIGITAL Newsletter)

DO YOU WISH TO BE INCLUDED IN MAILINGS CONDUCTED BY DIGITAL (for Marketing purpoaea etc.?) D Permission D Refusal
TYPE OF DIGITAL HARDWARE USED: Please check those applicable to you.

20 D DECMATE 82 D DECsystem-10 83 D DECSYSTEM-20

52 D LSl-11 3 D PDP-8 FAMILY
50 D PDP-11 FAMILY

21 D PROFESSIONAL 22 D RAINBOW 54 D VAX FAMILY

5 D WPS-8 51 D WPS-11

MAJOR OPERATING SYSTEMS? LANGUAGES USED: Please check those applicable to you

1 D ADA 2 D ALGOL 5 D APL 7 D BASIC 17 D BLISS
19 D c
22 D COBOL

26 D CORAL-66
28 D cos
34 D DATATRIEVE 35 D DBMS 38 D DECnet 43 D DIBOL 45 D DOS-11

47 D FOCAL 48 D FORTRAN 51 D GAMMA 110 D IAS 53 D IQL 58 D MACRO 65 D MUMPS

67 D OS/8 68 D PASCAL 72 D PL-11 92 D RPG 81 D RSTS/E 83 D RSX 91 D RMS

109 D RT-11 97 D TECO 70 D TOPS-10 71 D TOPS-20
104 D VMS 107 D WPS-8

HOW-5

TYPE OF BUSINESS (ENVIRONMENT}/COMPUTER APPLICATIONS Please check that which best describes your business/application

21 D ACCOUNTANCY 7 D BANK
64 D .BUSINESS/COMMERCIAL 74 D BUSINESS/INFORMATION SYSTEMS 57 D CHEMISTRY 54 D CLINICAL LABORATORY 63 D COMPUTATION 11 D CONSUMER ELECTRONICS 18 D CONSULTANT 72 D DATA ACQUISITION 52 D DATA COMMUNICATIONS 13 D DATA PROCESSING SERVICES 71 D DATA REDUCTION 17 D DIGITAL EMPLOYEE-ENGINEERING 15 D DIGITAL EMPLOYEE-MARKETING 16 D DIGITAL EMPLOYEE-SERVICE GROUP 60 D EDUCATIONAL ADMINISTRATION

1 D EDUCATION/PRIMARY

73 D NUMERICAL CONTROL

2 D EDUCATION/SECONDARY

68 D OEM-COMMERCIAL

61 D EDUCATION-TECH NOLOGY 78 D OEM·TECHNICAL

3 D EDUCATION/UNIVERSITY

56 D PHYSICAL SCIENCES

67 D ENGINEERING

20 D RESEARCH/DEVELOPMENT

65 D FINANCE/ACCOUNTING

10 D RETAIL

77 D GOVERNMENT

76 D SOFTWARE DEVELOPMENT

75 D GRAPHICS

53 D TELECOMMUNICATIONS

4 D HOSPITAL

19 D TELEPHONE/UTILITIES

62 D INDUSTRIAL

51 D TIMESHARING

55 D LABORATORY/SCIENTIFIC

80 D TRAINING/INSTRUCTION

14 D LIBRARY

66 D TYPESETTING/PUBLICATION

I

58 D LIFE SCIENCES

70 D MANUFACTURING

79 D MARKETING

59 D MEDICAL RESEARCH

6 D MILITARY INSTALLATION

SPECIAL INTEREST GROUP (SI Gs) ENROLLMENT I wish to participate in the following DECUS U.S. Chapter Special Interest Groups.

33 D APL SIG 2 D COMMERCIAL LANGUAGES 6 D DATA MGMT.SYS. 5 D DATATRIEVE 7 D BUSINESS APPL 8 D EDUSIG
10 D GRAPHICS APPL

11 D HARDWARE AND MICRO 35 D IAS 31 D DAARC( LABS) 27 D LARGE SYSTEMS 16 D LANG. AND TOOLS 14 D MUMPS 15 D NETWORKS 34 D OFFICE AUTOMATION

36 D PERSONAL COMPUTER 18 D RSTS/E 17 D RSX 19 D RT-11 32 D SITE MGMT.& TANG 21 D UNISIG 26 D VAX SYSTEMS

JOB TITLE/POSITION · Please check:

1 D CORPORATE STAFF 2 D DIVISION OR DEPARTMENT STAFF 3 D SYSTEMS ANALYSIS 4 D APPLICATIONS PROGRAMMING 5 D SYSTEMS ANALYSIS/PROGRAMMING 6 D OPERATING SYSTEM PROGRAMMING 7 D DATABASE ADMINISTRATION 8 D DATA COMMUNICATIONS/TELECOMMUNICATIONS 9 D COMPUTER OPERATIONS 10 D PRODUCTION CONTROL

101 D CORPORATE DIRECTOR OF DP/MIS 102 D ADMINISTRATIVE ASSISTANT 103 D TECHNICAL ASSISTANT 104 D SERVICES COORDINATOR 105 D MANAGER 106 D ANALYST 107 D PROGRAMMER 108 D DATABASE MANAGER 109 D DATABASE ADMINISTRATOR 110 D MANAGER OF DP OPERATIONS

CITIZEN OF UNITED STATES OF AMERICA? D Yes D No Country_·- - - - - - - - - - - - - - - Date: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
Signature:-----------------

Forward To:

DECUS U.S. CHAPTER, MEMBERSHIP PROCESSING GROUP 219 BOSTON POST ROAD MARLBORO, MA 01752, USA PHONE: (617) 480-3418

HOW-6

DRTRBBRm
DATAGRAMS are short messages, comments, requests, or answers that are published 1n NETwords. Please fill 1n the sections below and send the DATAGRAM to:
V1 ck1 e Hancock NETWords Ed1 tor
251 o L1mestone Ln.
Garland.. Tx. 7504b

Your Name: Address:
Telephone:

If th1s is a reply toe previous DATAGRAM.. what ·7 _

Signature:-------------- Date: __

-

QU-1

Vickie Hancock
N:&TWords Editor
2 5 1O Limestone Ln.
Garland, Tx. 75040
Fold Here

t
Place Stamp Here 1j

PAGESWAPPER - February 1986 - Volume 7 Number 7 INPUT/OUTPUT Submission Form
INPUT/OUTPUT Submission Form
A SIG Information Interchange Please reprint in the next issue of the Pageswapper If this is a reply to a previous I/O, which number? Caption: Message:

Contact: Name Address

Telephone

Signature

Date

Mail this form to: Larry Kilgallen, PAGESWAPPER Editor Box 81, MIT Station, Cambridge, MA 02139-0901, USA

QU-3

J
PAGESWAPPER · February 1986 · Volume 7 Number 7 VAX Systems-SIG Spring 1986 SIR Ballot

',

Tear out or photocopy reverse to vote on SIRs

'

Gary L. Grebus Battelle Columbus Division Room 11-6011 505 King Avenue Columbus, Ohio 43201·2693 USA

PAGESWAPPER - February 1986 - Volume 7 Number 7 System Improvement Request Submission Form

System Improvement Request Submission Fonn

Submittor: Address:

Firm: Phone:

Page 1 of

How to write an SIR: Describe the capability you would like to see available on VAX systems. Be as specific as possible. Please don't assume we know how it's done on the XYZ system. Justify why the capability would be useful and give an example of its use. If you wish, suggest a possible implementation of your request.
Abstract (Please limit to four lines):

Description and examples (use additional pages if required)

QU-5

PAGESWAPPER · February 1986 - Volume 7 Number 7 System Improvement Request Submission Form
Tear out or photocopy reverse to submit an SIR
Gary L. Grebus Battelle Columbus Division Room 11·6011 505 King Avenue Columbus, Ohio 43201~2693 USA

PAGESWAPPER - February 1986 - Volume 7 Number 7 VAX Systems SIG Spring 1986 SIR Ballot
VAX System SIG Spring 1986 SIR Ballot

DECUS membership number

(six digits)

Our site uses the following VAX models (check all that apply)

8600

11/782

11/780,11/785

11/730,11/725

--"MicroVAX

11/750

We use VAX's in the following applications (Check all that apply)

Business EDP Education Data Acquisition/Control~~ Service Bureau Scientific/Engineering Telecommunications
Other

Software Development

Computer Science Research

CAD/CAM

--

Hardware Development

Off ice Automation

~~

I support the following as the most important System Improvement Requests. (List from zero to fifteen SIR's):

SIR Number:

----------

----=------- _.., _______ _ ---.-.-. --.-' --

----------

-__-_-_-_-_--...-_-_~_

-~--------
----------

__ ..... 1;;_.._ ..... _
----"'-------

I oppose the following SIR's as detrimental. (List from zero to five SIR'S):

SIR Number:

--------.'"9.- ---------- ---~------

Mail to:
Gary L. Grebus Battelle Columbus Division Room 11·6011 505 King Avenue Columbus, OH 43201
To be counted, you ballot must be received by April 1.

QU-7

j
PAGESWAPPER · February 1986 ~ Volume 7 Number 7 VAX Systems SIG Spring 1986 SIR Ballot
Tear out or photocopy reverse to vote on SIRs
Gary L. Grebus Battelle Columbus Division Room ll-6fi!ll 5fi!5 King Avenue Columbus, Ohio 432fi!l·2693 USA

Printed in the U.S.A.

"The Following are Trademarks of Digital Equipment Corporation"

ALL-IN-1 DEC DECnet DECmate DECsystem-10 DECSYSTEM-20 DECUS DECwriter DIBOL

Digital logo EduSystem IAS MASS BUS PDP PDT P/OS Professional Rainbow

RSTS RSX RT UNIBUS VAX VMS VT Work Processor

Copyright 11 DECUS and Digital Equipment Corporation 1985 All Rights Reserved

The information in this document is subject to change without notice and should not be construed as a commitment by Digital Equipment Corporation or DECUS. Digital Equipment Corporation and DECUS assume no responsibility for any errors that may appear in this document.
POLICY NOTICE TO ALL ATTENDEES OR CONTRIBUTORS "DECUS PRESENTATIONS, PUBLICATIONS, PROGRAMS, OR ANY OTHER PRODUCT WILL NOT CONTAIN TECHNICAL DATA/INFORMATION THAT IS PROPRIETARY, CLASSIFIED UNDER U.S. GOVERNED BY THE U.S. DEPARTMENT OF STATE'S INTERNATIONAL TRAFFIC IN ARMS REGULATIONS (ITAR)."
DECUS and Digital Equipment Corporation make no representation that in the interconnection of products in the manner described herein will not infringe on any existing or future patent rights nor do the descriptions contained herein imply the granting of licenses to utilize any software so described or to make, use or sell equipment constructed in accordance with these descriptions.
It is assumed that all articles submitted to the editor of this newsletter are with the authors' permission to publish in any DECUS publication. The articles are the responsibility of the authors and, therefore, DECUS, Digital Equipment Corporation, and the editor assume no responsibility of liability for articles or information appearing in the document. The views herein expressed are those of the authors and do not necessarily express the views of DECUS or Digital Equipment Corporation.
Ada is a trademark of the U.S. Government, XEROX is a trademark of Xerox Corporation, IB M, PROFFS are trademarks of International Business Machines Corporation, UNIX is a trademark of AT&T Bell Laboratories, CP/M, PLJI aretademarks of Digital Research, Inc., MS-DOS is a trademark of Microsoft Corporation, TSXPLUS is a trademark of S&H Computer Systems, Inc.

------------------------·
STATUS CHANGE
Please notify us immediately to guarantee continuing receipt of DECUS literature. Allow up to six weeks for change to take effect.
) Change of Address ) Please Delete My Membership Record
(I Do Not Wish To Remain A Member) DECUS Membership No: Name:_ Company: Address: ______________
---------- -------- -- -· .. - - -
State/Country: Zip/Postal Code: __________ _

Mail to: DECUS- Attn: Subscription Service 219 Boston Post Road, BP02 Marlboro, Massachusetts 01752 USA

!~ P"3.OC83D~Cc~D. ~~Ill!1l_,6>x~-·
~ogi!2:::;;3
= ":<-::r.$1>-lll
c:~-·CCiDi-ogIl:l ;·
~-or:....~- -<O

I I
I I

c C'6 iii'~~ c;;· -

en~-

--?·

0 _:J

c.
CD

0C:

:gJ_

m
C~ "

I I

I

~-----------------------~

:~::::. .o. ."-f\)0m0 l>coG>o rJJ Oc::Dl->lecn CDenren 0-lmc JJooro
Pzcen
~-U-uO l>O~JJ
o.......e-n1m2--1u
-~...O.JJoJ-z10 _)>oO~emn
-~o-CuJm D--JulCOm-J<J
en
0
()
m
~

~[O]


Acrobat 11.0.23 Paper Capture Plug-in