Home

The CYBER 845: First Month`s Use

image

Contents

1. I lt lt EAR teh tt 2 I ee ye ht eee eee t es t t ty ort tt m ettet tt eee ss Movit I eee EE TERY on wt 9th ts t t t Ment ul T LO EEE PED ctr vv Mene I emt eh he E tt t tt s v Mes tL 20 1 htm gt sete str t m tts vss cerent tI N 1 wes ote o ht hx Mere hw 1 8 lt lt 86 eset 4 4 4 464255 5555 stent Met TD te he vit EEE HEE TESS EEE HH ott 55555555555555555 tse Seer a EEE EEE SSS EOE e ese 655555555555555555 v Mer 0 1 5555555555555555 5 55555555 55555555 4 SSSSSSSSS bd 9 11 12 13 14 15 16 18 19 SRUS CPTIME MS PRUS MT PRUS JOBS SYSTEM 8767 2005 24004 2804 250 BATCH 87981 40844 65666 4694 1994 SUBMIT EXPORT 4150 1632 9511 82 645 SUPIO o TELEX 21415 9223 48105 o 2315 MSORT
2. a a A a Ex T 7 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 o 1 2 3 MACHINE CA PERIOD FROM FRIDAY 07 14 19 84 01 27 TO SATURDAY 03 14 27 84 01 28 CPU UTILIZATION INCLUDING SUBSYSTEMS AND CPU MONITOR SYSTEM UTILIZATION M CHARACTER INDICATES MAXIMUM COLUMN FOR IUS GRAPH MAX MIN 100 1 1 M ef 1 6 Meee wf 1 Meveve oF 1 Meveve I 1 80 1 gt s gt y Met I oe ween ees Messe wt R I vh tw n wee Messes I 1 ses 44 st sss 1 4 ocv see sse tetrotv ctt tl Meeceteeer 1 eee sse vese ttt Wee corti sss Mawes wen N 6O I vyse wss tet vh n stt cv Mee to T 9 rtt tw ho etur t m wee etetttt ssi m t eee I te atr hh ete wee etsttttt eee eae veseve Meevoseve u tee hh heh RU restesse rst kt v rer Meet T I tere ed wera eres wee ee ee irte oc vo M we ru I I Hew tt hw et t eee et th tvi th ee ost vMesw r4 L AOL eee hh Ro t nh hh
3. Access CYBER CA 10 30 376 5730 Equipment Purchase Information 376 8153 2120 CDS teas E CEU 376 5706 Experimental Engineering VO 373 4596 MERITSS ME 10 30 cps 376 7730 Graphics Software 376 5592 120 CPs 376 7120 HELP line enero ense e tex 376 5592 VAX VMS VA autobaud 376 9770 9 a m 5 p m Monday Friday Budgets i eo ER ees 373 2521 HOURS line recorded message 373 4927 Computer Aided Instruction 376 2975 Information Experimental Engineering 373 4360 Computer Hours recorded message 373 4927 Information Lauderdale 373 4912 Computer Store 373 4877 Instructional Labs 376 2703 Consulting Instructional Services 373 7745 HELP line 376 5592 Lauderdale Computer Room 373 4940 9 a m 5 p m Monday Friday Lauderdale Services 373 4995 Business Data Products 376 1761 Lauderdale Services Manager 373 7538 1 3 p m Monday Friday Lauderdale Users Room 373 4921 Statistics Packages 376 5062 MECC Liaison 373 7745 1
4. Briefly M77 2 5 still has the follow ing deliberate input output viola tions mentioned in the September article For more detailed explana tions of these please refer to that article Conversion errors for floating point fields with width W 8 or greater produces E w 1 w 7 output rather than all stars Special cYBER floating and integer point values infinite R indefi nite 1 not normalized zero 0 and integer greater than 2 48 X are put out with that March 1984 single character rather than fol lowing the field specifications Use of the single 0 for zero values allows negative signed zero valued fields to differentiate between zero values and those with no significant digits for the given field 77 does not allow repeated list directed string or complex input data to extend over more than one record 77 always produces digit rounded in the d 1 place when E fields are produced under Gw d fields specifiers and 1P or greater scaling is in effect Non zero P scaling is reduced or raised if this would allow a floating point number to be out put rather than giving an error field of all stars Finally the FORCE STORES FS param eter is required on the M77 control statement if any FORTRAN entities are known by two or more names usually due to EQUIVALENCE state ments In addition to the correction of the final errors found in the valida ti
5. CRAY 2330 863 4278 70 1218 TOTALS 124646 54569 151566 7650 6422 ILLEGAL Table 2 CA Use January 27 1984 18 March 1984 Computer Crime Will Be Prosecuted 609 88 COMPUTER DAMAGE Subdivision 1 Whoever does any of the following is guilty of computer damage and may be sentenced as provided in subdivision 2 a Intentionally and without authorization damages or destroys any com puter computer system computer network computer software or any other property specifically defined in section 609 87 subdivision 6 b Intentionally and without authorization and with intent to injure or de fraud alters any computer computer system computer network computer software or any other property specifically defined in section 609 87 subdi vision 6 Subdivision 2 Whoever commits computer damage may be sentenced as follows a To imprisonment for not more than ten years or to payment of a fine of not more than 50 000 or both if the damage destruction or alteration results in a loss in excess of 2500 to the owner his agent or lessee b To imprisonment for not more than five years or to payment of a fine of not more than 5000 or both if the damage destruction or alteration re sults in a loss of more than 500 but not more than 2500 to the owner his agent or lessee or c In all other cases to imprisonment for not more than 90 days or to payment of a fine of not more than 500
6. dem will be used You need a place to plug the cable into the microcomputer Mo dems 65 232 serial devices and so you need an RS 232 port on your microcomputer Not all microcom puters are created equal some don t come with serial ports as standard equipment If your micro does not already have an RS 232 port you will have to buy one 24 Your shopping list for hardware consists of a 1200 or 300 baud modem a cable to connect the modem to the microcomputer an RS 232 serial port on the mi crocomputer Once you have acquired the neces sary hardware you stil need a communications program to take advantage of it The software Communications software makes your microcomputer emulate a ter minal This means that the commu nications program takes characters you type at the keyboard and sends them out the serial port to the modem Characters which ar rive at the serial port from the mo dem are displayed on the screen Some programs are designed to communicate with almost any other computer General purpose pro grams such as Crosstalk Intercom PC Talk Visi Term ASCOM and a host of others require you to spec ify how the characters it will be handling are packaged You specify the package for charac ters by specifying the communica tion parameters data bits stop bits and parity To communicate with our CYBER or VAX computers spec ify seven data bits one stop bit and EVE
7. or both 609 89 COMPUTER THEFT Subdivision 1 Whoever does any of the following is guilty of computer theft and may be sentenced as provided in subdivision 2 a Intentionally and without authorization or claim of right accesses or causes to be accessed any computer computer system computer network or any part thereof for the purpose of obtaining services or property or b intentionally and without claim of right and with intent to perma nently deprive the owner of possession takes transfers conceals or retains possession of any computer computer system or any computer software or data contained in a computer computer system or computer network Subdivision 2 Anyone who commits computer theft may be sentenced as follows a To imprisonment for not more than ten years or to payment of a fine of not more than 50 000 or both if the loss to the owner his agent or lessee is in excess of 2500 or b To imprisonment for not more than five years or to payment of a fine of not more than 5000 or both if the loss to the owner his agent or les see is more than 500 but not more than 2500 or c In all other cases to imprisonment for not more than 90 days or to payment of a fine of not more than 500 or both Exhibit 1 Current Minnesota Computer Laws Everyone is aware of the adven tures of comic strip mini hackers the Hollywood version of hacking in films like War Games and the newspaper reports of young ent
8. 376 5592 March 1984 User log in to the system lindo LINDO UC 26 JAN 82 max 2x st 4x 3y 10 3x 5y lt 12 end look ROW all MAX 2X 3Y SUBJECT TO 2 4X 3Y 10 3 3X 5Y lt 12 END go LP OPTIMUM FOUND STEP OBJECTIVE FUNCTION VALUE 1 7 45454545 VARIABLE VALUE REDUCED COST X 1 272727 0 000000 Y 1 636364 0 000000 ROW SLACK OR SURPLUS DUAL PRICES 2 0 000000 090909 3 0 000000 545455 NO ITERATIONS 2 DO RANGE SENSITIVITY ANALYSIS no quit Exhibit 2 A sample LINDO session Utility Programs CRAY CATALOG On January 22 we modified the Cray Applications Library CATALOG program to correctly put out record names CYBER DRESS In December we modified the cv BER DRESS program which makes up MODIFY OPLs and UPDATE OLDPLS from source programs to increase field length to the proper size if it is too small Telenet News Because of upcoming changes at UCC all Telenet users should use the address 61224 20 starting im mediately This replaces the need for different addresses such as 61224 10 when you access MERITSS or 61224 1 61224 2 61224 a or 61224 b The only address you should use starting immediately is 61224 20 The system will then prompt you to type in the name of the machine you wish to access If you have any questions please call our HELP line 376 5592 23 Microcosm HOW TO GET YOUR MICRO TO
9. Direc tory or more information about EDUNET contact Vicky Walsh the University of Minnesota s EDUNET li aison at the University Computer Center 227 Experimental Engineer ing call 373 4360 to leave a mes sage or call 373 5780 Grants for Research BILINGUAL EDUCATION The Bilingual Education Demonstra tion Projects Program awards grants to local education agencies LEAs higher education institutions in con junction with LEAs and reservation based Indian schools for demonstra tion projects illustrating approaches to bilingual education Projects that use instructional technology will re ceive 35 percent of the program s funds in fiscal 1984 For more in formation contact Luis Catarineau Office of Bilingual Education and Minority Language Affairs Department of Education 400 Maryland Avenue SW Washington DC 20202 202 447 9227 Liddiard from 17 640 character blocks MT PSRUS to 5120 character records and JOBS number entering from each system Note that since these are chargeable resource units this does not include the total MS PRUs trans ferred during interactive and batch job rolling In addition CDC CYBER systems have been very effective in delivering CPU power to the user rather than using it on system tasks This is clear from the four to five percent total CPTIME used for SYSTEM compared to the TOTALS for all users The SRU ratio for SYSTEM to TOTALS is seven to ten percent d
10. ME systems to correct a LOAD state ment problem WRITEUP TSP now has full lines and revised printing of subscripts and superscripts MATLAB MATRIX INSTRUCTIONAL PACKAGE We recently installed the MATLAB package on the CYBER ME and CA systems This interactive program serves as a convenient laboratory for computations that involve ma trices It was developed by Profes sor Cleve Moler of the University of New Mexico with support from the National Science Foundation and the Department of Energy MATLAB provides easy access to the well known matrix software de veloped for the LINPACK and EISPACK projects The workspace is only 5000 words because of the instruc tional nature of the package For MATLAB documentation see WRITEUP MATLAB a 60 page upper case user s manual A HELP com mand is available and summarizes the other commands With a mini mum field length of 70000B the command MATLAB begins execution of the program Exhibit 1 shows a sample MATLAB session It defines a matrix A and a right hand side vector B and solves the problem AX B for the un known vector X User inputs are in lower case after the question mark prompt character If you have further questions about MATLAB call our HELP line 376 5592 Mike Frisch LINDO LINEAR PROGRAMMING PACKAGE We recently installed the LINDO Linear Interactive aNd Discrete Optimizer package on the CYBER CA and ME systems This interactive linear qu
11. control point to users when the SUPIO package is deleted at the end of winter quarter The SRU totals are broken down into CPTIME in seconds MS PRUS Liddiard to 25 17 LOS CCE M EAI ER REESE mene PET OES REST SOROS ND t i H i D H i 1 H MACHINE CA PERIOD FROM FRIDAY 07 00 00 84 01 27 TO SATURDAY 02 59 30 84 01 28 INDICATES MIMINUM DURING A PERTO o ONDI CA RIO INDICATES MAXIMUM OURING A P o M CHARACTER INDICATES MAXIMUM C CNLUMN FOR THIS GRAPH Bere 10 o mo nmuzcz DA 7 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 1 2 LARGE JOB AVERAGE OWM RESPONSE TIME TIME MEASURED FROM CARRIAGE RETURN UNTIL JOB ROLLIN BEGINS LARGE JOB FIELD EENGTHE gt 55 K IN Set I I I I M 1 R I M 1 E I M 1 5 2 1 M I P I M I 1 N I M gt 1 5 M gt 1 E 1 1 1 I M i T I M 1 M 1 E I M M I I 1 I M 1 M I I 1 S I M 1 1 Me 1 1 0 61 Mee I N I Meeve x 1 D 1 t 5 1 ov wert etn I 1 wee ow Mes w 1 0 10 8000 5 2000055 4 55 194006000751 AA 000000 0000
12. sup porting 2780 3780 terminals and emulators RBF is described in the Remote Batch Facility Version 1 Reference Manual CDC publication 60499600 revision K and in CRAY News COS CFT UPGRADE MARCH 18 UCC will upgrade our CRAY 1 to COS 1 12 bugfix 1 and 1 11 bugfix 1 on Sunday March 18 An extensive article on this upgrade appeared in the February Newslet ter For additional information and any changes that may have oc curred since that time see WRITEUP CRAYCHG 20 we encourage you to use it SUPIO will be removed from operation on March 17 the end of winter quar ter Current SUPIO users will be given new RBF user numbers to re place their SUPIO site codes New users who want to use their own remote batch terminals should con tact our accounting department 373 2521 for an RBF account number One very important note over the years we have extended the UT200 protocol that SUPIO and the locally written UT200 terminal emu lator used for communication This included features such as upper and lower case printing RBF does not support any of these extended fea tures it strictly adheres to the orig inal UT200 protocol If you depend on these features you must convert your emulators to ignore them or convert to a protocol that supports upper and lower case printing such as HASP If you need assistance call our HELP line 376 5592 The RBF phone numbers are listed in Exhibit 1 Terminal
13. 1 M 1 Iw 1 X v The CYBER 845 First Month s Use Because UCC has a stable environ ment it has been a number of months since we last reported use and response time graphs on our research CYBERs With the installa tion of the CYBER 170 845 as a sin gle system to replace the batch cv BER 825 CB and interactive CYBER 730 CA it seems appropriate to review the first month System reli ability and hardware stability have been very good The only loss was of a single module in the cache memory that fast but invisible to the user memory between central memory and the operating regis ters In the last several years total user SRUs on the research CYBERs have steadily decreased The peak use was 1 573 777 sRus delivered to users in June 1980 using the BER 74 and CYBER 172 The maxi mum use for the combined CYBER 74 and CYBER 170 730 systems was in March 1982 when 1 394 084 SRUs were delivered Since the in stallation of the CRAY 1 in late 1981 we have expected research CYBER use to decrease as users with large resource needs switched to the cost effective CRAY But the CYBER 170 845 achieved new maximum of 1 587 319 5805 delivered to users in its first month of operation During the first four days of February CYBER use has dropped back to previous daily to tals We expect the CYBER 845 to eas
14. 2 p m Monday Friday Newsletter Subscription 373 4912 Data Bases ox emen ned Vete 376 1761 Permanent File Restoration 376 5605 10 11 a m Monday Friday Professional Services Division PSD 376 1764 Microcomputers 376 4276 Project Assistance 376 1764 10 12 a m and 2 4 p m Monday Friday Reference Room 373 7744 Non Numeric Computing 376 2944 Remote Batch RJE Services 376 2703 1 3 p m Monday Friday Short Courses 376 8806 TELL A GRAF DISSPLA 376 2663 Shuttle Bus Service 376 3068 1 3 p m Tuesday Thursday System Status recorded message 373 4927 Contract Programming 376 1764 Tape Librarian see Lauderdale Services Data Base Applications 376 1764 Text Processing Services 376 2943 EDUNET Liaison eee nette 373 5780 User ACCOUN e Epp Y acepte 373 4548 Engineering Services 376 1023 376 8153 OPERATING HOURS CYBER CA Low rate CRAY CR MERITSS ME VAX VA M F 7 a m 4 a m 8 p m 4 a m 7 a m midnight 7 45a m 1 30a m 8 a m 6 a m Sat 4 a m 5 15 p m 4 a m 5 15 p m 7 a m 5 p m 7 45 a m 1 30 24 hours Sun 4 p m 1 a m 4 p m 1 a m 4 p m mid
15. COMMUNICATE WITH OUR COMPUTERS Lately the UCC Microcomputer HELP line has received an inordi nately large number of calls on the same subject how can get my micro to communicate with the BERS The answer is that you need some hardware and some software Here are the details The hardware Communicating with UCC s CYBER or VAX computers usually means com municating over phone lines To connect your computer to the phone system you will need a MO DEM Modems are devices that translate the signals used by your microcomputer into audio tones which can be sent over phone lines Modems used over voice grade phone lines operate at either 1200 baud or 300 baud If you plan on buying a 1200 baud mo dem be certain the modem uses the Bell 212 protocol The protocol the modem uses for translating your microcomputer s signals into audio tones is important because there are two incompatible protocols for use at 1200 baud We use the Bell 212 protocol If you buy a 1200 baud modem that uses the Bell 202 protocol it won t work with our computers Not surprisingly you have to connect the modem to your micro computer This means you need a cable to make the connection Not all cables are created equal The cable you use to connect your printer to your micro may not work with your modem It is a very good idea to get the cable for the modem from the same place you buy the modem and to specify with which microcomputer the mo
16. N parity There are other settings for communications param eters that work but seven data bits one stop bit and even parity seems to be the choice available on nearly all communications pack ages You must also specify your modem s baud rate 1200 or 300 baud The ucc Micro group maintains a communications package called COM that is optimized to talk to our mainframes CYBER and VAX Because COM is designed to com municate with the CYBER and the VAX you need not specify any communications parameters except baud rate You can also use COM to transfer disk files from your mi crocomputer to and from our main frames Many of the general purpose communications programs can also be used to transfer disk files to and our mainframe computers But since a general purpose program does not know what kind of com March 1984 puter it is talking to you must give the program some hints about how to send or receive a file When you send a file to the CYBERs the first step is to put the CYBER into record everything I send you mode You do this by typing the TEXT command On the vAX the equiva lent command is CREATE Once the host computer is recording you tell the micro to list out the serial port the file you are sending After the file has been sent you tell the host computer to stop recording by typing a control c for the CYBER or a control z for the Capturing information from the mainframe w
17. Notes NEW RESEARCH CLUSTER We have installed our fourth public research cluster in 130 Experimen tal Engineering The room is open during regular consulting hours 10 a m to 4 p m and 7 to 9 p m Monday through Friday Although the door is locked at all other times you may use the terminal cluster by asking the input output room staff in 131 Experimental to unlock it The station is open from 8 a m to midnight Monday through Friday from 8 a m to 4 p m Saturday and from 4 p m to midnight Sunday The terminal 3 3 2400 baud HASP 612 376 5880 4800 baud HASP 612 3 Exhibit 1 RBF phone numbers WATCH YOUR ASTERISKS Due to a CYBER system change ef fective March 18 you can no longer use asterisks as non separa tors on procedure calls In any procedure calls that include aster isks in parameters you must en close the parameter in dollar signs For example you must change BEGIN STAT XYZ to BEGIN STAT XYZ See WRITEUP CHANGE for more in formation cluster is available during all these hours This cluster contains three vT 100 terminals One is equipped with graphics that allow it to emulate a series 401X Tektronix terminal All three are part of a network that allows you to access either the CA or the VAX system at 9600 baud Our other clusters are located in 69 Physics 25 Blegen and 14 Folwell WRITEUP LABS includes lab hours and related information We charge an ad
18. adratic and integer pro gramming system is designed to be 22 User log in to the system matlab lt MATLAB gt VERSION OF 03 19 82 HELP IS AVAILABLE lt gt 2 3 4 5 6 3 6 0 1 3 4 5 4 atan 1 1 3000 8000 1 3000 8000 3 1416 2 6732 1 9463 0268 lt gt 2 exit TOTAL FLOPS ADIOS Exhibit 1 A sample MATLAB program useful to a wide range of users It was developed by Professor Linus Schrage of the University of Chi cago LINDO can solve small to medium size problems within a fixed work space Documentation is the User s Manual for LINDO published by the Scientific Press 670 Gilman Street Palo Alto California 94301 415 322 5221 You can examine a non circulating copy in the UCC Reference Room 140 Experimental Engineering A HELP command is available and summarizes the other commands The command LINDO begins execution of the program 3 1416 7 8 0 gt Exhibit 2 shows a sample LINDO session It solves a two variable two constraint linear programming problem User inputs are in lower case after the question mark prompt character We have also created a special version of LINDO that has an op tional FORTRAN interface Chapter 11 of the LINDO User s Manual provides some further information about this FORTRAN interface The command to execute this special version is LINDOUS filename where filename is the name of a file that must conta
19. ditional 1 55 connect hour for use of these terminals to offset the cost of establishing and maintaining the clusters March 1984 76 5842 Programming Languages M77 VERSION 2 5 In our previous report UCC News letter September 1983 on M77 ver sion 2 4 FORTRAN compiler valida tion we stated that m77 had five uncorrected validation errors Only one remains in M77 version 2 5 which you can access with the control statement FUTURE M77 This future version will replace ver sion 2 4 on March 18 M77 still requires that files other than or in addition to the standard INPUT TAPES INPUT OUTPUT TAPE6 OUTPUT must be on the PRO GRAM statment since M77 does not open files dynamically In addition the maximum record length for any FORMATTED OPEN statement in a pro gram must be specified at least once in the PROGRAM statement in the form file maximum record length The following validation errors in version 2 4 have been corrected in version 2 5 Lower bound expressions i e more than a simple name or constant in adjustable dimen sions are now correctly com puted Character expressions concatena tions are allowed in the vo for mat position or FMT specifier Substringed concatenation ele ments are allowed in vO lists and or as actual arguments e Adjustable dimension array names may be in the ENTRY statement dummy argument lists that occur after the adjustable dimension declaration
20. he Micro HELP line 376 4276 IMS Journal SIR USERS GROUP This month s meeting of the sIR Us ers Group will be held at 3 30 p m Wednesday March 21 in 128 Management Economics on the west bank of the Minneapolis campus The EDUNET Connection The University of Minnesota is a member of and a supplier for EDU NET an international computing network for colleges universities research organizations and not for profit companies Through EDUNET you can access a vast selection of computer assisted instructional materials ex tensive data bases and advanced research hardware and software These resources can be accessed with almost any portable or non portable printing or non printing computer terminal microcomputers and word processors with commu nications capabilities A guide to EDUNET called the Resource Directory lists programs and services available through EDUNET in these subject areas agriculture and agricultural eco nomics business and economics chemistry computer assisted instruction data base management and infor mation retrieval systems electronic mail and conferencing engineering English graphics home economics and food sci ence life sciences mathematics and mathematical programming modeling and simulation psychology and education sociology political science and history statistics text processing and editing For a copy of the Resource
21. ily handle the current load and to be able to handle a 25 percent increase with no degradation in re sponse time Tables of active interactive termi nals large job 755 000 octal re sponse time in seconds and CPU use are given for Thursday January 19 and Friday January 27 On each day about 125 000 sRU units March 1984 MACHINE CA PERIOD FROM THURSDAY ACT INDICATES MIMINUM DURIN M 06 36 00 84 01 19 TO FRIDAY IIME SHARING TERMINALS PERIOD INI 02 22 47 84 01 20 ATES MAXIMUM DURING A PERIOD CHARACTER INDICATES MAXIMUM COLUMN FOR THIS GRAPH MAX 122 MIN o 11 t 13 Ze mozosomn 01 2 14 MACHINE CA PERIOD FROM THURSDAY 4 15 LARGE JOB AVE TIME MEASURED FROM CARR LARG MAX 21 x22 tI ROLLIN BEGINS OG 52 41 84 01 19 TO FRIDAY 02 54 38 81 01 20 CPU UTILIZATION INCLUDING SUBSYSTEMS AND CPU MONITOR SYSTEM UTICIZATI SYSTEM FOR THIS GRAPH o Table 1 CA Use January 19 1984 of use were generated and over 100 simultaneous interactive users were active at 3 p m The 845 provides response times under half a second during 95 percent of the day but at certain times 10 11 30 a m and 1 30 4 30 p m it may slow to two second response dur ing a 12 minute period Our sys tems group hopes to alleviate this congestion by fine tuning the sys tem and by returning a PPU and
22. in the relocata ble code for the USER and NEWIP March 1984 subroutines previously compiled by the FIN compiler When you enter the LINDO USER command LINDO calls the routine USER NEWIP is used only for integer programming problems If you don t provide a NEWIP routine a non fatal UNSATIS FIED EXTERNAL loader message ap pears but you can ignore this if you don t use integer programming Direct further questions about LINDO to our HELP line 376 5592 Mike Frisch NEW EDITION OF IMSL We will replace the international Mathematical and Statistical Library IMSL version 9 0 with version 9 1 on all CYBER systems March 20 1984 You can access IMSL as a user library with the control state ment FETCH IMSL V compiler name where compiler name is MNF FTN FTN5 M77 or Pascal A machine retrievable writeup is available on the CYBERs To obtain an index of this writeup execute the control statement WRITEUP IMSL The following is a list of changes to individual routines in IMSL edi tion 9 1 Old routine is adequate but com putations are affected in some cases Errors in source code cor rected GTDDU LSVG1 LSVG2 MDBIN MDCHN MMLIND USHHST USWCV USWFV Old routine is not adequate in some cases Errors in source code corrected 5 2 DVCPS MDBETA MDTNF RSMITZ GGAMR IQHSE MMBSIR NAFRE SSRBLK 2 31 If you encounter any problems when you use IMSL call our HELP line
23. n exhibiting some error messages in version 2 4 we were surprised several times as we made the vali dation suite For example after di agnosing several source statements that began with digits i e thinking that M77 was compiling data M77 was supposed to put out the error message NO MORE ERROR MESSAGES but did not do so since the mech anism to turn off all error messages was evoked before this last mes sage was issued In a number of cases trying to get a specific error message from M77 made the com piler give up on a mode error We have corrected all these mode error cases have rewritten the IMPLICIT statement to allow CHARACTER lengths to be constant expressions have made the END statement exe cutable i e it may have a useful label on itself and are producing better execution code for certain constant subscript references to ad justable dimensions We want to thank those who re ported M77 bugs to us since your information and source decks were put to good use in producing the latest version We hope this is another step forward in the produc tion of a robust standard conform ing error diagnosing FORTRAN com piler that helps you produce results for your problems quickly and ac curately Janet Eberhart and Lawrence Liddiard 21 H t t 1 H f P t F f f Math amp Statistics Packages TSP CHANGES On January 25 we modified the CYBER TSP program on the CA and
24. night 4 p m midnight 24 hours PUBLIC LABS TWIN CITIES CAMPUS Location Batch Interactive Micro Location Batch Interactive Micro East Bank West Bank BlegH 25 160 X X BlegH 90 X CentH X BlegH 140 X ComH X MdbH X DiehlH 270 207 X OMWL 2 X EltH 121 125 X SocSci 167 X EItH N640 X FolH 14 14a X X X LindH 26 X X St Paul MechE 308 X Physics 69 BaH X SanfH X ClaOff 125 X X TerrH X VincH 4 X WaLib 204 X Research cluster access to CYBER CA and VAX VMS X in interactive column indicates access to MERITSS March 1984 27 i i i LR Contents The CYBER 845 First Month s Use Computer Crime Will Be Prosecuted CRAY News COS CFT UPGRADE MARCH 18 CYBER Notes SUPIO DISAPPEARS MARCH 17 WATCH YOUR 5 Terminal Notes NEW RESEARCH 5 Programming Languages M77 VERSION 2 5 Math amp Statistics Packages TSP CHANGES ob Sees hib need aces MATLAB MATRIX INSTRUCTIONAL PACKAGE LINDO LINEAR PROGRAMMING PACKAGE NEW EDITION OF 5 Utility Programs CRAY CYBER DRESS irse Michael M Skow Acting Director The UCC Newsletter is published monthly by the University Computer Center Deadline for articles is the 10th of the month preceding publication deadline for short announcements is the 15th The Newsletter is edited and c
25. oded for typesetting at the Computer Center then typeset on a Linotron 202 and printed at the University of Minnesota s Printing and Graphics Arts Department 28 Telenet 23 Microcosm HOW TO GET YOUR MICRO TO COMMUNICATE WITH OUR 5 24 U OF M MICRO USERS GROUP 25 IMS Journal SIR USERS 25 The Edunet Connection 25 Grants for Research BILINGUAL EDUCATION 25 Computer Store COMPUTER PAPER FOR PRINTERS 26 All Systems Bulletins HOLIDAY HOURS 26 The Classifieds FOR SALE rotes es 26 Comments suggestions articles and announcements should be directed to the editor 227 Experimental Engineering 612 376 1491 The University of Minnesota adheres to the principle that all persons should have equal opportunity and access to facilities in any phase of University activity without regard to race creed color sex national origin or handicap Copyright 1984 University of Minnesota Permission to copy is hereby granted provided that proper acknowledgement is given Nonprofit Org U S Postage PAID Minneapolis Mn Permit No 155 RSITY ARCHIVES 55 n WALTER LIB lt ArY UNIVERSITY OF MINNESOTA EAST BANK 117 PLEASANT STREET SE MINNEAPOL IS March 1984
26. on suite the 415 error messages produced during compilation were completely tested in version 2 5 This testing consisted of a 415 sub program validation suite in which each subprogram isolated a specific error message for the different source language conditions that produce that error This validation suite then allowed us to produce an accurate error message writeup and handout that explains and pro vides examples for each M77 error message This writeup is called M77ERRM The messages are listed in alphabetical order and all varia ble names have been moved from the beginning to the end of the message That is messages have been changed from CAUTION name NOT SET to CAUTION NOT SET ABOVE name Many messages have been reworded especially if more con cise terminology existed in the ANS FORTRAN standard Thus M77 uses ASSIGNMENT for REPLACEMENT STATE MENT LABEL for STATEMENT NUMBER ADJUSTABLE DIMENSION for VARIABLE DIMENSION and OPTION for PARAME TER A review of the ANS FORTRAN standard produced additional M77 non standard error messages for source usage that did not conform to the standard In a number of cases where M77 produced two or more different messages for the same error condition error mes sages were deleted or subsumed into the best message We have added new messages that we think should help you but they may sur prise you when you first try the new version Although we expected difficulty i
27. orks in an analogous fashion You put the microcomputer into record mode tell the main frame to list the file and when the file transfer is complete turn off record mode The advantage of using COM over a package such as PC Talk or CrossTalk is that COM automatically issues commands to enter record mode and list files Fitting the pieces together To make sure you end up with a system that works it is crucial that you actually try the hardware and software you plan to use Some communications programs will only work with specific modems or se rial interface cards For information about hardware and software that the micro group has tested call the Micro HELP line 376 4276 10 a m to noon and 2 to 4 p m Monday through Friday or stop in at the Micro Research Lab 125 Shepherd Labs during HELP line hours Mark McCahill U OF M MICRO USERS GROUP Our March meeting will be at 3 15 p m Thursday March 8 in 133 Physics Cathy Interdonato of Sen sor Based Systems Metafile will dis cuss this data base manager On Thursday April 12 Gary Johnson will discuss and demon strate LOTUS 1 2 3 This meeting will take place at 3 15 p m in 125 Science Classroom Building May Dale Archibald editor of the monthly Computer User will speak on how to choose telecommunications software Hear March 1984 him on Thursday May 10 3 15 p m in 555 Diehl Hall For more information about any of these programs call t
28. re preneurs breaking into various com puter systems around the country At the same time we must re member that hacking can be a crime The State of Minnesota has laws on the books concerning computer damage and computer theft For your information we in March 1984 clude them here in Exhibit 1 Just as it is illegal to steal some one s wallet or checkbook it is il legal to steal a user number Just as it is illegal to break into a home or a store it is illegal to break into a computer system Computers provide us with useful tools and pleasant diversions But as in any job or game rules exist by which everyone must abide If you break the law you will be prosecuted 19 ATAN ARTE EE EARE E A M WRITEUP RBF RBF is currently operational and CYBER Notes SUPIO DISAPPEARS MARCH 17 2400 baud UT200 4800 baud UT200 612 376 5959 612 376 5864 SUPIO a UCC written program from the early 1970s has provided the University with user operated re mote job entry RJE terminals But the two terminals that SUPIO sup ports UuNIVAC 1004s and Control Data UT200s have been or are being removed We are replacing them with HASP workstations Thus after many years of faithful service SUPIO will retire Its replacement is RBF Remote Batch Faciity a Control Data product RBF supports HASP multi leaving workstations and emulators and UT200 terminals and emulators We are currently looking into
29. ue to the large MT PRUs required for incremental dumping of user files for backup Lawrence A Liddiard 25 deste uel 5 i t i Computer Store COMPUTER PAPER FOR PRINTERS Are you tired of carrying around heavy boxes of computer paper Do you like to use microcompu ters but every time you arrive at your favorite micro lab the printers are out of paper We have an easy solution for you your own paper supply in a convenient portable amount The ucc Computer Store now has 9 1 2 by 11 inch tractor feed paper with disaperf laser edges available in shrink wrapped pack ages of 250 sheets This superb pa per was previously sold only by the box 2650 sheets Both are available at the Store You can purchase items from the Computer Store with your user ac count number a departmental jour nal voucher cash or check The Store located in 20 Experimental Engineering 373 4877 is open from 9 a m to 4 30 p m Monday through Thursday and from 9 a m to 3 p m Friday All Systems Bulletins HOLIDAY HOURS UCC will maintain its normal oper ating schedule on Monday March 19 an official University holiday at the Twin Cities campuses The Classifieds FOR SALE Noise isolation and protective cover for any dot matrix printer with ac cesory text stand New 125 jour nal voucher or cash 373 3137 26 March 1984 PHONE NUMBERS

Download Pdf Manuals

image

Related Search

Related Contents

Ville de Libourne  Critical Capabilities for Mobile BI  Naza for Multi-Rotor User Manual  HT-IDE3000 User's Guide  Viewing - Maretron  Epson PictureMate Deluxe Viewer Edition Compact Photo Printer Start Here Card  Inno Slide 2100  CX109 4-1/2” METAL CUTTING BAND SAW WITH  Manuel d`instruction  Manuale Utente IONIC NRG per APRILIA RSV4  

Copyright © All rights reserved.
Failed to retrieve file