ML20006E439

From kanterella
Jump to navigation Jump to search
ITS News,Winter 1990,Vol 6,Number 1
ML20006E439
Person / Time
Issue date: 02/01/1990
From:
NRC OFFICE OF INFORMATION RESOURCES MANAGEMENT (IRM)
To:
References
NUREG-BR-0056, NUREG-BR-0056-V06-N1, NUREG-BR-56, NUREG-BR-56-V6-N1, NUDOCS 9002230153
Download: ML20006E439 (16)


Text

_................

E gh WINTER 1990 Vol. 6, No.1 7

g NUREG/BR 0056 s am D

'W information Technology U.S. Nuclear D***"d'"'*""*"

Services Support Center M ': Regulatory and Training Laboratory Commission

[

ITS Lab Celebrates x

ITS Sup sort Fifth Anniversary L

Center N arks

>,un,w,

.ns nai,a,a""

Fifth Year!

In this issue, we celebrate the fifth by Lana Cobb, IRM anniversary of end user training at the ITS Training Laboratory. More than On January 10,1990, IRM cele-9,(KK) course completions have been brated the fifth year of the l'I$

recorded. NRC students have Support Center facility at the completed hands-on microcom-NRC. The original ITS puter trainir.g either at the li'S Support Center was lab's permanent Headquar-designed to be a com-ters training site or in courses piementary tacility to conducted on site at the the ITS Tr'aining Lab.

Regions.

W' In 1985, the Training "N'

Lab provided struc-In the Beginning j

tured hands on micro-1 cornputer software 4

The l'IS lab opened to its 5

training and the ITS first NRC microcomputer

(#

Support Center students on October 15, 1

provided technical 1984. The initial training j

v, support for computer facility, located on the f'rst users in mainframes, floor of the Woodmont N

l minicumputers, Building, had one "x

(

and microcompu-g F.

ters. Today, the classroom with

.Ma

.e k,

%d ll eight IBM /PCs tj 113 Iraining c

Il Q

~. M (s<r as is na W gl Laboratory Q

provides nands-

'f h

l on training for sof t-f)@' ', -

ware pactues and agency accessiiile applica-tions. The Information Technology Services Branch D'

(ITSB; provides access to mini-

~

computers, microcomputers and mainframes; user support for packages running on these machine environments; guidance in the area of security; technical f

oversight of training; user p

support in developing better g

visual presentation of data (graphics); and maintenance of all three machine environments.

900??DO1 W %Oi'O1 du same Cene t'r h PDR NURIG B P --()O S 6 R Fl*

m

_. - - - _ - - - _ _ _ - - _ _ _ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ~ - - - - -

- ~

n EEI (contur<dfon ris robpg i; mont Building. The lab is now an THE ISSUE AT HAND integral part of the NRC Training (dual floppy drives) and two other Complex, w hich includes the NRC Responds to Prompt clawrooms for demonstrations and Individualind Learning Center (sec

=

Payment Act..

user group meetings.

article in this issue) and classroom i

I"#'* I"' "

d' ""NI I

NUDOCS News *

"6 By the end of 1984,249 course technical, supervisory, and secretar-User Groups.

.7 completions had been recorded at ial skills training.

Computer Viruses and Personal the new NRC facility in an 8-course Computers..

.g curriculum which included: Intro.

Trends

(

duction to End User Computing at Practice Safe Computing.

.9 NRC, PC-DOS, int rod uctory First, the ITS Lab experienced Wizards in Computer History 9 courses in dBase ill and LOTUS 1-substantial increases in overall ITS Training Lab News.

.10 2 3, a BASIC programming course, enrollments both in 1988 and 1989, word processing with Displa) Write reversing the decline in enrollments PC Parallel Proccuing Arrived 3, and data communications via experienced in 1986 and 1987. (The in Research.

.11 CROSSTALK.1984 also took ITS term "overall enrollment" refers to New inct idualized Learning Lab instructors to Regions 111 and an employee who completes an ITS Center.

.12 IV to conduct Displa> Write 2 Utb course, either at Headquarters Do You Equate ' Security' Only training.

or on-site in an NRC Regional With ' Classified"!.

.12 f acility.) The figure below illustrates Five Years Later the overall enrollment trends during ITS Tech Notes..

.13 the Lal6 five.vear history.

Training services at the !TS Lab have expanded dramatically since Second, Regional requests for on-198A During these five years, the site training are burgeoning. This curriculum has grown from eight to major trend accelerate 4 training ITS NEWS CREDITS 20 courses. All three classrooms are dehvery to the Regions.

. now equipped with microcomputers, The rI3 N1:WS u a quancrty pubhcation making 24 workstations available for Third, demand for individual prtmding mformation of interrat to uncts hands-on. training-courses has changed over the five I

of nimputer technokigy at the NRC. It is years between 1984-1989. The most produced by the sinn,,f the NRC Infor-The facility has also changed heavily subscribed course has been

$",'l,"",'n'a' $",[

,',',[,l" 1ocation. In July 1989, the Training

" Introduction to End-User Cor.iput-i ing at NRC for Novices," with 1,825 1 ab facility moved to the newly conjunction wah the NRC's Oma of Personnel rcnovated third floor of the Wood-student enrollments. However, this We weinime questions and comments.

Pleanc contact the i15 stalt ty

{

Headquarters and Regional Phen -

Staff Enrollments sw e, m Pc,,en P.

l 1984-1989 lana Cobb. IRstTT311

)

liaccutive I Anor Students Iohe Waucl. GWSDA F - - - ~ ~ - -

~ ~~ -

7 hianaging lxinor Woo ' I 4

F.lectrome Fortnai and layout m4 i

__ m1 y__

K m

.1

_. \\ 4.gjg _ M Janet hot-Thompson. IRM TIsti mq,

a" g

Design Consultation 1

L

j lit trations by NRC Automated Graplucs '
)

Photograpia by Dan Dehn m

was sees w

toes isso O

O Contributon to regular items arc.

i R Abm, S llachrach, k fledman.

P. licll. Y llodge, D lluyer.11. Kennedy b,eme E

%,n, F.. Robmnon, and K VanDuset

_a ITS NEW8 Page 2

E s4 g-

)7 d

Ng (Continued psms.%qqpas coeurpg 1) toe 5 Trainin Courses sackground of The Concept 1984 1 89 in the early 1980's, the role of the data processing professional began to change from a docr to a facilita-tor. Instead of doing the projects intro Novices for a user, the data }irocessing staff 1 25 could help the users do for them-selves.

This car. cept of end user assistance developed in response to theimpact of new technologies and the advent of microcomputers and mote "1o

-=- -i which occurred in the late 1970 s.

advanced programming languages

.a u.c:2 t

(

]fW

'**i Decreasing hardware costs and w?

increasingly powerful machines 457 topcther with " user-friendly" software made it possible and cost i

effective for users to develop their

'l N-DOS Fundamentale 502 own application and to retrieve data inuo I,otus 12 3 from existing data bases. This could est now be accomplished with de-creased Automated Data Processing (ADP) development staff involve-course is less in demand now slace A training analysis of NRR's Work, ment. The employec would nec4 to the base group of end users at the lord Information and Seneduling be trained and assisted, thus the idea agency has become computer Program (WISP)is underway.

of an a dual functioning facility: the literate through training and follow.

1% Training Lab and the ITS Replacement o the 5520 with Local Support Center.

on experience. " Introduction to r

dBase 111 Plus" ranks second in Arca Networks (LANs)will present overall demand, with 1,036 compic-another major training opportutaily in the Fallof1983,a proposal for an "NRC ADP Information Technol-tions. Interestingly, as seen in the at the agency. Classroom 390 will be pic chart above, " Wordperfect 5.0:

configured as a local Arca Network ogy Center" was ridopted and The Basics" ranks Elfth overall after to support LAN training.

preparations were made to apply the only nine months on the ITS Lab concepts of er.d user computing at r,chedule.

Allin all, the next few years at the NRC and prepare for the wave of ITS lab promise to be as challeng.

the future. The ADP professionals Future Directions ing and productive as the first five!

began to learn micrommputer products. A list of packages dete -

With the o ning of NRC's indi-ruined to be " user friendly" on vidualized rning Cerner, NRC m crocomputers, minimmputers em loyees will be able to select their Ideas, Articles,

  • laik7nTdictio'nis"u"PP0rfio tra ning from two formats:instruc-P tor led and self study. Look for Comments 7 ud users began. At this time there

(

coordination between the Lab and were only two microcomputers in P

the Learning Center's curricula to the agency.

We,d like 10 enhance cach NRC employee's training opportunitics.

hear from you.

During the course of the past five years, the concepts of end-user PC-to-mainframe connectivity computing and related support seruces have been enhanced and training will be a major growth area in instructor-led classes. Two new ITS News Editor fine-tuned to their present stetc. In courses are stated to accompany the P-808 or 492-8309 1%, the me of contractors for the implementation of Nuclear Docu-support of microcomputer related questions was initiated. With the ments System / Advanced Design.

t.

ITS NEWS Page 3

occupancy of the White Flint software and data communication Over five years ago, the original staff

=

Building, an additional user anis-lines and modems are also donc at and managers believed that the tanz center was established. In 1988, the users site. The section maintains macept of end user computing and the Oraphics Senice Section joined literature on commercialsoftware.

their responsibilities to provide this branch and provided assistance training and assistancewould have a enabling end-users to communicate The Codes and Standards Section, significant impact on the agency, data visuaHy through the use of louis Orosman, Chief, provides They were right! This concept is microcomputer products. Addi-advice, guidance and assistance in all active today as welook to the future tional minicomputer types and aspect of ADP security. nis section in this information age.

products were added for access by provides control for access to NRC j

agency end users,includingIBM computer systems (accessinitials The Future of the ITS 9370s and PROFS. Today the and accounts control) for in-house ByJoyer Amenta,IRM information center mncept is and time share computing facilitics carried out by both the staff and used at the NRC. The scientific The Information Technology mntractors.

end user communityis provided Center's mission is to help employ-technical support by this section, in-ces bccome self sufficient computer What is Happening cluding accessing mdes through the. users and effectively use the com-N National Energy Software Center, puter in the workplace,whether the e

By hn W' nam)RM Technicalsupport of thein information is office based and Training Laboratoryis also per, accessed through a local area In August 1989, services related to formed by this section, network,or resident in a mainframe the support of the end user comput, located across the country and ing effort,with the exception of accessed through a modem or wide microcomputing hardware and area network. In either case, the software acquisition,was placed in in staff facilitates the transition from batch data processing to ITSB. The functions of I'fSB are

/

W // CODf/ DUO interactive processing, from central.

implemented by four sectionn Auto-mated Graphics; lnformation f0 eXDand the l'ed ="f*"a di'"**d resources and systems,and from Technology Support; Codes and Standards;and Computer Senices.

depth and breadth suPPorangafew==ricxin base David Dicht is the Branch Chief for OfautOmated

  • '*""""d'""'""*"Y""'"*'

IBB.

software to supporting powerful, Systems.

multifunctien, high icvel, user e

fr.iendly software.

%c Automated Graphics Section, Janet Thot Thompson, Chief,is responsible for developing, remm.

By1993,every employee who can mending and impicmentitig a p-profitably use a microcomputer will proved agency. wide goals, ob cc.

have one. Over the next three years, tives, policies, guidelines, and staff will have access to word-E ##

"E' procedures for design and graphics The Computer Senices Section' services throughout the NRC.

Rashida Alam, Chief,Provides tional resources, analy'tical tools and Assistance to the end user in the 8YSICm8 PNEI8m*IDE 8" PCI8' automated administrative resources area of graphic analysis, design' tionalsupport senices for NRC cither locally or via networks. IRM advice,and support is provided minimmputers and mainframe will continue to expand the depth Visualcommunications standards, mmpen (Data Generals, IBM and breadth of automated systems to i

consultation and visual enhance-perf rmer ticalfunctionsinsupport ment and imaging are provided for

'cu a

s I d a tains supported software.

the various NRC mini and main.

Master inrpection P'lanning Svstem fram mmper hardware,and and the Workload Informatio'n and The Information Technology ass c ated peripherals,such as the Scheduling Program for NRR, the Support Section, Karen VanDuser data stomge devices, telemmmuni-Executive Shared Infortuation Chief, prov! des installation, mainte-as cypmen, remote job entry System for the Commissioners and and technicalsupport for nance'ction microcomputer and wo a

ns, and remote printen.

senior staff,the Daily Plant Status produ h au System for AEOD,and develop office automation equipment (5520s -

ha E li i P o id -

administrative support systems for and Displaywriters). The section is technical mnsulting to ADP usen smoother internal NRC operations.

responsible for providing installa-and mntmeton regarding the The ITS will play a greater role in tions and technical support (hot-

    • P*

8C C5 8" PNP 8fY assuring user self-sufficiency in line,and walk in senice) for appHcctions software runnmg on learning new systems, accessing data supported commercial software.

these machines.

Troubleshooting of hardware, bases and in managing their comput-ing environment.

NRC Resnonds To 9 ensure that vendors supplying Other reports show pending in-r-

pids and services to the NRC are voices that must be paid by a certain Prompt Payment paid in a predictable and timely date or they will be subject to manner. Invoices which are overdur interest penalties.

Act automaticaiiy have the interesi by Dan Schwanz,IRM penalty included when payment is The setond major function is the generated by the Division of Ac-generation of Form 292s," Voucher Want to pay interest penalties on munting and Finance in the Office Transmittal for Review and Ap-your own overdue bills? Well, of the Controller. Likewise,in-provat Prior To Payrr.ent". Typing neither does the NRC! Did you voices eligible for dismunts have the of this form is time-consuming and know that the Division of Contrat..

discount amounts deducted when subject to errors. Computer and Property Management (DCPM) paid by the discount date. The data generation of this form will apec4 up receives almost 5,000 bills under flow diagram illustrates the adminis-the payment cycle.

NRC contracts annually? These tretive processes related to invoice bills are for everything from payments.

A third function is to provide NRC-mmputers to engineering support, wide access to invoice status infor-from software support to cleaning Basically, the INVTS provides four mation foi Project Officers, Con-support. Since everyone including major functions. The first function tract Administrators, and other the NRC must pay an interest is currently in production and the appropriate staff. This will help to penalty for late payments, can you othere will be implemented in the keep everyone informed in a timely Imagine the extra costs involved for future. De first function provides a manner.

overdue invoice payments? Fortu-powerful reporting capability. The nately, the NRC has a new tool to most important reports show The fourth function is an invoice assist with paying invoices on time.

overdue invoices by responsible analysis sub-system. This function it is the new INVOICE TRACK-Project Officer and Contract will enable the Contract Administra-ING SYSTEM (INV13).

Administrator. For example,one tion Branch to identify patterns of report shows the basic information late invoice payments in order to INVTS was developed by IRM in about a Project Officer in the report take wrrective action and anticipate response to Public Law 100-4%,

title followed by a detailed list of problems.

which amended the Prompt Pay-overdue invoice information. A ment Act. The Act now requires similar report is produced for The INV13 is yielding unplanned agencies to pay invoices within thirty Contract Administrators. These benefits 100. The system provides days (climinating the fif teen day reports are distributed to the appro-another check to prevent duplicate grace period previously allowed).

priate Proicci Officers, Contract invoice payments, and can be t. sed The INVTS system tracks invoices Administrators, and managers to to provide cost information. For from initial reccipt to final payment expedite handling of these invoices.

cxample, the system was recently queried to calculate costs for maintenance of the White Flint INVOICE TRACKING SYS. TEM ONVTS) ggS.

om um

.=

The INVTS System is a multi-user system that can be accessed by the

_g e

m m

~

~.

1 4 7 ""' '

through dialup lines. The system k[/

o i

uses IBM 3270 terminal emulation x

features to provide the user full

~ "~

O screen capabilities. It executes at l

y *.*

N the NIH time-sharing facility on the

~ ~ '

[._--

.c!-

IBM 370S090 computers. The data

= 3_." s __ _ ff_"-

is maintained using IBM's DB2 Data

~

s.

,8

h. M Base Management System. Pro-o o

/

r...

.f grams that access, manipulate, and

~~

report on the data are writter. in

~

y,,

PL1 and Query Management

.....m Facility. The INvl3 was put into i

production in September,1989.

,C.

n

-p

,J.

For more information or questions, i

I contact Dan Schwartz on 492-7065 or Tim Hagan on 492-48(n INVTS diagram showing the flow of data throughout the system.

US NEWS Page 5 K

g iiiii iiiiii iiiiii ammmmmi,

.Hiii=ik nn as as sus aur9mm sur e aar e amr a as uma amm em aus em uma ame== umm -

BWWWWW 2 M

M EEBB

~

us==N NUCLEAR DOCUMENTS WWWWW SYSTEM NEWSLETTER

~

AEOD Now Importing Ocnc Trager of AEOD/ROAB Gene estimates that using the data NUDOCS Records into realized that most of the LER data download feature willsave AEOD WAMS clements were already being cap-at least one-half a pers(m-year The NUDOCS data download tM y OCS,and mum k annua 4 Hyou are interated in input directly into the WAMS this system or have questions, call

^

database. Using the NUDOCS data Ocne Trager on 492-44%.

rt li n c

e ER "C'#**'* #

""U "

ir formation into the Work Assign.

reduces the chances for error,"in ment Management System The NUDOCS Hot Line (WAMS). AEOD processes about addition, this helps ensure all LERs Staff r

ved by the NRC are wahated.

3,(KO LERs cach year, so use of this Probably every NUDOCS user has feature has saved time and effort.

called the NUDOCS Ilot Line to Once the remrds are downkiaded, The Division of Safety Programs is they are importe4 into WAMS, ask a question or resolve a problem.

responsible for analyr.ing and which is a dBASE 111 language But how many users can remember evaluating operating events de-program developed using Clipper.

the names of the people who WAMS generates LER mver sheets provided assistance from the other scribed in LERs, determining the safety significance of the events, and containing the intormation from end of the telephor'c7 Here is an deciding whethen action is necessary NUDOCS, along with space for the opportunity fgr NUDOCS users to become famihar with the Hot Line reviewing enginects to include Prior to the availability of NUDOCS

      • E data download capability, all classifications, findings, and com-necessary LER information had to ments. After the review process, the De NUDOCS Hot Line staffis be entered into the AEOD com-result ng data is added to WAMS far comprised of Pat Exum, Sally Palko, puter manually. The data included fe

[t John Knabic, Ocorge Russ, and the docket number, LER number, pr s.

he r

WAMS/NUDOCS information may Darlene Huyer. AH members of the report date, event date, and descrip-tion. The problems with this be used later for input to NRC Hot Line star are employees of the inspections, systematic assessments NUDOCS indexing department.

manual method of record rocessing Each member has extensive knowl-included errors introduce during of licensee performance, or Com-missioner site visits.

edge and experience in the proce=

manual data entry, and manual dures for encoding technical nuclear tracking of review status.

industry-related documents. The five-member Hot Line staff has a mmbined experience of over 34 D

years on the NUDOCS project.

f l li The Hot Line staff has other i

s 4

responsibilitics in addition to their Hot Line dutics. Ms. Exum and Ms.

%g.

Palko are supervisors of indexing A

teams. Mr. Knable and Mr. Russ b =

conduct quality control on the l;

yF indexed data records. Ms. Huyer provides training to NUDOCS j

j wp g

n users.

'N888' 8

7

%, s_

f in addition to extensive indexing h-

-4 1 ?

knowledge, each member of the Hot g-gymMWYe :gg y,;;

a.. [j 4 gT Line staff has received cross-training j7 in the other NUDOCS departments 7ay.? (

ss 5Af..r ' ; "

fj?{

f/h

~

y j g %.7" (micrographici, computer opera-

..1c,.

tions, document distribution and

~

J control). The staff has alsa received Gene Trager, AEOD, importing NUDOCS records into the Work Assignment Manage-instruction in Klecommunications, ment System (WAMS) in order to incrosse emclency and reduce the chance for error.

ITS NEWS Page 8

hardware, and software configura-of Westinghouse, Babcock and 480 pixels), mouse, and HP Laserjet tion. This extensive training is Wilcox, and General Electric printer, using an optimizing NDP necessary to prepare the Hot Line Nuclear Steam System Supplier FORTRAN 386 mmpiler with staff to answer the wide variety of designs used in industry.

HALO 88 graphics primitives that questions posed by NUDOCS users.

can be invoked from the FOR.

The program can plot and display on TRAN program. Plans are to use The Hot Line stafihas been trainee four windows as many as 24 parame-the program at the NRC Technical to assist the user community in all ters simultaneously. The program Training Center and Orcrations aspects of NUDOCS usage. They can be interrupted at any time to Center. Other staff members might answer questions ranging from change plant setpoints, transient use it by obtaining the appropriate choosing the best scarch for the scenario, or scales. A matrix upgrade equipment.

desired results to how to conduct a associated with cPch graph shows data download. They resolve such the status of various pieces of plant TPUG is planning more frequent problema as why a user is having equipment. Help screens are also programs of article reviews and difficulty in accessing the system.

availanic to the user at any point in discussions of codes used to solve Assistance is given with ad hoc the program. One of Stan's goals is problems in chemical engineering, reports, or the staff will produce a to make the program extremely user health physics, and physics. We are report to meet the user's needs. The friendly, especially in preparing also planning to invite speakers.

staff is available trom 8:(K) u.m. to input files, so that users can concen-Those interested in participating are 5:00 p.m. Monday through Friday.

trate on the reactor being simulated encouraged to mntact Vern Hodge, The Hot Line number is 492-8603.

instead of programming details.

492 1169.

Another LPDR Joins User Another feature of the program is Community its mimicking capability. Plan views

'j Artificial Intelligence fe"jrP i hown on Another local Public Document r

t,, c ed t

Room (LPDR), William Carlson to show the changing levels and User Group Library at the University of Toledo' phases of water in the various pans The ArtificialIntelligence User has joined the network of NUDOCS Ithe loop. This real time or slowed Group ( AIUG) meets approxi-users. NUDOCS is accessed to down visual aid hdps the Wewa mately monthly to pursue topics of assist patrons in h>cating informa-undastand if un mrabinoids or tion on the Davis Besse Nuclear interest. For some time now,we steam pockets edst in the reactor have been working on building an Power Plant. There are now seven head or locations bwa than the expert system to aid people in filling LPDR s using NUDOCS.

pressurizer for particular reactor out travel claims. We have devel-i condit ons.

oped a set of rules to support k) cal travel, learning a lot about mechani-

_ The feature that distinguishes this cal reasoning in the process.

User Groups program from other plant simula-tors is the proof-testing it has gone in the Fall, we met to discuss the through with respect to real everds subject of neural nets and mnnec-TPUG Meets and tests in p nts. For example, tion machines, and held a meeting this program accurately reproduces on developing an expert system aid When the Techm, cal Programming results of several Department of in the export license processing area.

Users Group (TPUG) met on Energy programs (LOIT, Senuscale, October 17,1989. Dr. Stan Fabic, Otis, FIST), the TMI 2 accident, the Our meetings are usually lively and AEOD, demonstrated the nuclear Ginna steam generator tube rupture nformative. We recognize we are power plant transient analyrer event, and other measured plant not all experts in this field, and we program he has been developing for transients.

try to keep the meetings interesting the NRC. His program calculates to alllevels of knowledge.

solutions to nine conservation The program requires machine equations at each of up to 70 fluid capabilities beyond the average Future meetings will continue to nodes and the radial heat conduc-workstation at NRC. For example, develop the travel expert system and tion equations in up to 50" heat it requires more than 3 MB of RAM discuss topics of interest to the slabs,"in real time and at each time (whereas most NRC machines have members.

step. The nodes are arranged to only MO KB) in conjunction with model the primary system, including software called " DOS extender."

Those interested should contact Bill reactor core, steam generators, Stan is developing this program on a Kennedy on 4921723 or mail stop pressurizer, steam lines, and some Compaq 386'20 machine with a OWFN 17G21.

considerstion of the balance of Weitek 1167 math coprocessor, plant. Stan has several plants standard VG A color monitor (640 x modeled by the code, representative iTS NEWS Page 7

e f

l Memo: Oomputer Viruses and Personal Computers By Sandra Bogenholm, CSSO DOE Cersterfor Computer Security e

w'**%pwa aas malgl*fa* "7 Computer Virus

      • d L'a""dag oma rav Guidelines

^1**Y'*****b*'k"P '* 'ki"8 Alema Naiknet Labwehry 5,

Copyof application software;never Cggygg,Eg" Protection from viralinfection run directly from the distribution Augueuseo. NRC hee Re own and includes knowing your software disk. If you have problCms With your goe#pree whleh should be ed to, sources and limitingsources 80 disk, mm utCT,or a virus,you Can

.,E*m'Yc*A**ENn'kd in commercialones whenever possible.

reinstall t c software after the

" ' " " * ~

with perateenen from eener Karison 11 alao includes Ihniting access to problem is corrected.

yout computer and its media.

Recovery from infection is facili.

Never boot your system with the As a personalcompulcr user,you tated by having backups of the original operating system diskettes, are responsible for certain data operating system, application Make backup copics before you protection functions on your PC or workstation system that are handled programs,and data files and byyour install the system software,and use keeping several previous backups so them for intallatica. Write.protec.

automatically by the system manager that you are sure you can go back to and store the original diskettes 1. 2 of a mainframe system. These a point before theinfection to safelocation. Subsequently, boot functions include providing physical from the hard disk or from your security for the system and media, backup topics. Also, ncycr add data providing adequate backup for all or programs to the originalsystem software and data, ensuring that

.y

~

diskettes, onlyinformation appropriate to the i

authorized levels of classification

%P D

Unauthorized Software and categoryis stored or processed

~',

I Do not bring ANY unauthorized on your system,and ensuring that gr b

code (software)into theworkplace -

. Infected software is not run on your j

.j

[

especitJJysoftware downloaded computer.

j f

from public bulletin boards. Be suspicious of any software or Recently,many viruses (or related software media supplied by friends.

code) have been infecting mmputer itis recommended that softwarc be systems around the laboratory. A virus is a "ricif. propagating Trojan purchased through normal procure-ment channels or that it be reviews!

horse, composed of a mission reconstruct the system and data.

by knowledgeable programming /

component,a trigger component, Finally, knowing your system and security personnel.

and a self propagating component.,

runningvirus detection programs Avirus can cause a number of benign or serious problems--

helps you monitor yoursystem to Software Development ensure contumination free files and Assign sensitive t#!warc develop.

anything from a message on the system.

ment tasks to trustcl persons,or screen to data alteration, data loss, subject allsoftware to independent etc.

Preventative and revic* before it is installed. use a The most likely entry point for a Damage Control two-person rule for software and hardware design,implementatiot.,

i virus is at the microcomputer level.

Measures icsting, and review. Better yet, From thereit can spread to other micro or mainframe computers to Make frequent data file backups and encourage the use of good software which the microcomputer is net, store the diskettes or other media in engineering practices and hold I

worked or with which you share a safe lxation (ideally in a different design reviews codewalk throughs' media. As a PC user,you are our office and building from your etc. Keep development and produc-tion isolated from cach other, most important line of defense computer). Files that would be against a mstly and embarrassing difficult or time-consuming to

. virusinfection. By keepingyour recreate should be backed up most gpecgg;c g,,,,,

y system and media free from viralin, often. Practice recovering your files When you initially installyour fcction,you protect not only from the backups. There are operating system software (DOS or

' yourself but also users with whom commercialsoftware programs that MS. DOS users), examine the COMMAND.COM flic. Write 2

you sharc files, included are some can quickly back up your hard disk.

)

M midtM guidelines to help you minimize the Save the backup diskette sets of

g pg; likelihood of a virus infection, critical or hard to replace files for at diagnose the presence of a virus,and least a year unless they become ine COMMAND.COM to see if any h

de tihve 4

respond in the event of an infection.

obsolete before then.

{

its NEWS Pope 8 m

F occurred. Such changes may mean Dl8gnosing the p y g gggg g $ gfg that a virus has corrupted the file.

Presence Of 8 Virus If you note unexplainable changes, Ompt34

. rebuild DOS with the "SYS" The best way to detect the prescue command.

of a computer virus is to be as By Lou Grosman,IRM famihar as porsible with the way Check any multluser system to -

your wmputer runs in daily c pera.

The date of activation of the ensure that 611 anonyrnous, debug, tion, in addition,look for the dealer r,crvice,and other general following indications of syste n con.

Columbus Day Virus has come and user identifiers, passwords,and famination:

gone and &cre me no reponed j

acmunts are disabled.'Diese should cases ofinfection within the NRC.

f also be checked after cach oper.it-Program or data files mysteriously However,this does not mean that ing system upgrade.

disappear. Unusual messages appear NRC PCs areimmune to a viral on the screen. Some viruses oven attack. Routine use of good com-Write Protection and File Incking announce that your system has been puting practices can reduce the if your operating system supports infeeled. An unusual number of pro-likelihood of contracting and locking files to prevent changes, set gram or system crashes oi print spreading any virus,and can mini-that protection ca all files you erron occur. Sudden, unexplainable mire the effects if one does strike, seldom change. Although a virus reductions in system memory or disk can get round this, many have not space occur. Your computer seems been written to anticipate locked to run more slowly thin normal.

Good computing practices include:

files so some protection is by taking this precaution. provided Program loads take longer than normal. An unusualLumber cf disk L Making frequent backups of your accesses occur. Disk drive access data, and keepit)g several versions.

When you obtain new software, lights corne on for no apparent write protect the distribution disk reason. An executab!c file, particu.

2. Using only NRC issued software, or tape before making a backup or larly COMMAND. COM, changes working copy or installing the in size. Unexplainable hidden files
3. Using carc when exchanging data software on your hard. disk. Just appear. IBM PC DOS V4 9 has between computers, particulati'v inserting a disk in an infected three hidden files, carlier versions when telecommunicating or ex-system can be enough to corrupt have two. But be aware that some the diskette. In fact,it is always a application software does create changing files, by floppy disk.

good idea to use write protected legitimate hidden files, disks unless you knowyou will need

4. Avoiding the duplication or to write to a disk.

WlZ8Fds In Computer mpying of prgram files. If program g8 files nual be duplicated, keep user Applications and data can be kept files (those generated by use of on write-protected removable Sixty-five years after Charles vendor software) and program files media (cartridge drives or floppics)

Babbage pioneered the luca that (vendor software)on separate and inserted into a workstation only tables could be calculated by flappy diskettes, when needed.

machinery, Alan Turing, a British scientist, wrote bis Miscellaneous famous paper which launched

5. t arning about your computer Test every unknown program theemi puterage %h!!ca and the software }'ou use. Be i

l before system wide release (pref-student at Princeton in 1936,he able to distinguist tetween nnrme crably on an isolated system). Use said,"The Math Department and abnormalsystem activity.

password securityif available. Re-here comes fully up to m3 cxpec-port any unauthorized use ofyour tations". At the time such Additionalinformation on com-system. Make it a practice to power notable mathematicians as Von puter viruses can be obtained from down your microcomputer over-Neumann, Courant, and Einstein Louis Grosman on 492 5019,or night,and do not leave diskettes in were teaching there. Turing pre-from the ITS Support Centers at the disk drives overnight. You may dicted that within 50 years White Flint (3Cl2) and the Phillips wish to installa locking device on someone would build a machine Building (P408). The ITS Support the power switch to prevent un-that worked like the brab. He Centers can be reached at 492-0353 authorized access to your computer.

Imagined input with punched or 492-4160*

l Havei,tandard recovery procedures paper tape and other particulars in place. Nowis a good time to that eventually came into being develop a contingency plan.

after his death in 1954. By 1980, the field of artificialintelligence was busylearning about the l

brain by using the computer.

l ITS NEWS Page 9 I,

_u

- __= _

1 i: v.iir LAB NEWS

,.....~

Third Computer Regional Training:

R i

l-Classroom Opens Focus On Wordperfect lWordPer ect raining j,

The ITS Lab has opened its third NRCs Regional Offices are finding microcomputer traming classroom.

that Wordperfect 5.0 trainingis Realon -

  1. Studtr!ta The new training room is equipped their current highest priority. Since O RI'

=41 with cight IBM PS/2 Model30286 Wordperfect training was added to student workstations. Each work-the1131.abcurriculumin April, Ril

,803 station has a color monitor and 1989,113 Lab trainers have con-SmarTeam 2400 baud modem. Two ducted Wordperfect classes at four Rlli,

0*

llewlett Packard 1.ascrJet 11 printers of the five Regionalsites for a total support the eight won kstations via a - of 174 students. The table on the RIV;,

31.

y print share device instalial byIRM/

right shows the number of students OANDB.

trained in cach region.

-RV.

22a

  • P6anned in FY to Initially, courses in graphics, Wordperfect 5.0, and mainframe 1990 Mainframe connectivity such as "SINET: Query Curriculum EXpandin9 mation and Scheduling Program System," "SINET: OnLine Oucry,"

(WISP),and Shared Information and NUDOCS/AD training will be

' Raining end users to accessinfor*

Network (SINET) For more offered in the new classroom.

mation stored on NRCs many nformation on individual courses, Eventually, this room will be mainframe systems continues to call the 113 Lab at 492-4744.

configured on a kical area network cxpand at the ITS Lab. In 1990, (LAN)and will be the site of LAN users willbe able to come to the Lab Watch for New trnining for instruction in querying and Wordperfect Courses reporting data from three main.

With the addition of this third

'u lear

>cu en s e

The ils Lab is cursently developing kstatot ai 1e a the Il (NUDOCS/AD), Workload Infor-two new classes to add to its Lab for hands on training.

Wordperfect 5.0 curriculum in Spring,1990:

n l

~ ~T Wordperfect 5.0 Graphics Features

==

0 Wordperfect 5.0 Advanced Text Features t

(l j j 4-f i Students in the new Graphics gh:s ji j.

c f Features course willlearn how to

{iy A r

. 4.r

I produce documentswhich integrate u

?

graphics (for example,a lotus 12-3 p"

1.g ~

-1

~ 'E graphic) into their text. text / graphic M

~

slides for TV graphics at White m...

% d Flint, and compicx tables with multi-7-

d fS'g y- ] '

line entries.

g.'f N %.~ -

94; j [

Students who complete the new t

.n

?"

Advanced Text Features course will QO p; Kj' h.9, [,

be able to ercate these work prod-Jf#

r.4 T 6 ~

g r

94 g' uct.c multipage documents contain-p,',

ing an autcmatically generated table

+

A q.

y-2

,'y of contents, table of figures, and
E & c 4

61 i index; documents with footnotes /

endnotes and numbered paragraphs, The ITS Training Lab's newest classroom equipped with eight PS/2 workstations.

a style template for a memorandum, and a password protected document.

ITS NEWS Page 10 A

c PC ParalleI mpmecuor at 33 MHz. Each micro-be started and allowed to run over processor has SMB of dedicated the weckend. Work can also be 1

Processing memory. A problem running on one controlled from another kicatiom A

t Ai CPU can be independent of the With remote mntrol software the arriVeu in other CPU or linked so as to PCPPS functions as an extension to ReSeafd exchange data. This is musiderably the host computer. I have a different from the operation of Northgate 386 mmputer and By Ralph Landry, RES mmputers scch as the Sun Worksta-modem at home, initiating work on tion. The Sun machines do not the PCPPS has been a simple matter A Small Business, Innovative actually run two programs simulta-by the Northgate-PCPPS link. A Research 6BIR) grant has devel-neously. The Sun uses a technique single phone call attaches to the oped truly surprising capability in a known as time slicing to appear to PCPPS, executes the program, and new, microcomputer-based parallel run two programs at the same time, stores the data file for use at the rocessing mmputer. The Office of in reality only one is executing at a office.

uclear Regulatory Research (RES) given point in time. All others are has several methods at its disposal waiting for their turn to use the While the hRC funded the develop-

  • *E *'"*'

ch th Ei n u a t and other hand, has the ability to have alone in using the machines. Four of university contracts. A lener known

    • E*E'"** '""" E " 0#h own the macMnes have ken purchawd Iype of contract is that of the SBIR.

dedicated microprocessors with by the New York Power Authority Congress has mandated that federal their own dedicated memory. This (NYPA), two by Carolina Power and J

agencies with research budgets makes the programs run a great deal Light, one by Pennsylvania Power greater than $1(K)M spend a portion faster and makes the computer and Light, one by St'onc and Web.

of thcar budget supporting SBlR much more useful for office needs.

ster and one by Columbia Univer-I work. I,wo years ago RES received Wy. Recently'the IAEA in Vienna, I

a proposal from Risk Management The PCPPS computers we have are Austria contracted to purchase four Associates (RMA) to develop a PC.

capable of running virtually any of the computers. Export licensing based parallel processing system code that will run on a mainframe in that case must be worked out (PCPPS). Ocorge Marino m computer. The difference is the since the Department of State has appointed the Program Manager' t me the codes take to run. A typical classified the microprocessors used the development phase wi.s funded RELAP5 run will take ten times and some of the codes as having and a prototype PCPr>S machine longer to run on the microcomputer strategic use, delivered. This computer is capable than it takes to run on a Cray XM/P.

of running codes such e RELAP5, The cost differential is even greater.

The utility owners are quick to point CON'I AlN, CORCON, ti.e Source Rather than spending hundreds of out that one purpose in having the Term Code Package, and other dollars per hour of timesharing computers is to support their traditional mainframe codes along sersice on the Cray, we now only response to the Individual Plant with all standard microcompute.

need to pay the cost of electricity, Examinath effort. NYPA has

software, cents per kilowatt-hour, after the reduced the hcensing department's initial cost of the PCPPS.

mainframe costs to zero since his past Spring, RAiA submitted a receiving the four PCPPSs. That proposal for Phase 11 of the original The run time requirements are not includes having run over 1(K) contract. Under Phase 11 the NRC reauv a disadvantage over the transient cases on the PCPPS to would receive four additional com-mairiframe. No one has direct examine success criteria.

puters with further enhancements access to a mainframe since the time and a larger set of computer codes.

must be shared among many users.

Where do we go from here? The The four machines hase been Computer runs are submitted and hope of some of us involved in use delivered and are assigned to Jim their results returned the nent day.

of the machines is to start providing Johnson, Ralph Landry, Ed Throm, Thus, for all practical purposes the analytical support to the programs and George Marino, the Program PCPPS computer will give the same within RES. We now have the Manager for the contract.

code calculations turn around as the capability to do so with the new PC E"W# E*'#'* "E ** E""

The mmputer uses two separate' and as this capability is recognized, miniaturized central Iirocessing Long code calculations can be RES can increase its support to units, or Ci,Us, and three coproces-started on the secondary CPU while other NRC offices.

sors. The motherboard uses the the front CPU is used for WordPer-Intel 80386, with 80387 and Weitek fect, or another application. Proh-For additional information, you may coprocessors running at 25 MHz. A lems can be started 'acfore leavina call Ralph Landry,492-3735'or secondary board as mstalled using for the day and the results reviedd George Marino, Project Manager, t 5 the next morning. Or, problems can on 492 38%.

hill dt it f C ITS NEWS Page 11 b

1%

u mh. i.i.

a.,

,a..

i Do You Equate

' Security' Only 4,

With ' Class 41ed'?

l<

%m &&g

& : $i 4.

By Emily Rcans<m, TPM g.s

,a h

m y

hf.4@h[ h g gg On Ncwemer % the designated g

P b

s.#

\\

WINb day for government agencice to

,, m

h. Md/ y/

' g ). b( 13 etnphasize computer Wurity ef y,

g r

awareness, videos were shown in kp',3$(4~

%, W Phillips lobby, P-1106, OWFN-3B9 fl13 fl/ ' ' %

ggyG and on TV monitors throughout V

y j

OWFN during the ich hout y

R s,%,,A x

J r f!

period. ITSB staff were available in s

M' Rv (jh

. ' ]'"

both Phillps and White Flint qqfq%hM q.

buildings to distribute awareness s

y g/'

/

materials and answer questions, d

.. dh a;RN$[bd[Djp@a The response was less than expected e

Henry Rubin, OP, demonstratin0 one of the new self-peoed leeming stallone in the to the agency-wide yellow announce.

Lenning Comer. This video worketetton is one c4 eeveral that wlN be evehable ment. IBB reports that many employees said they didn't partici-pate because they do not use A New individualized Learninn Center c assif ed data n their PC's or main-a frames. This may indicate that NRC By Carolyn Bassin, OP computer users now equate "secu-II'Y" U"I *ith " classified" If this is I..

In early 19%, the Omcc of Person-

3. Replace classroom training, which the case, it is important to correct nel will open a new Agency-wide may not be available when you need training facility. It's an Individual-it or does not meet your specific this mncept h emphastr.ing that ired Learning Center where staff needs.

mmpu er seru y gates to will have greater access to training pr tection of pur valuaNe data,,

o through self instructional pro-Many new programs are already hat if your unclassified, priority document was destroyed? What if grams. The Learning Center is co-purchased for the Learning Center.

pu lost pu datah tliat M located with the in Laboratory on They offer training in end-user weeks or months to create, or what the third door of the Woodmont microcomputing, managerial skills, if yourlab ri osly-developed Lotus Building.

project management skills, secrete-spreadshect was corrupted?

ial techniques, interpersonal Using the learning Center means relationships, and site-access It only takes a simpic mistake, an not having to wait for a formal refresher. The new Learning Center nnoccat keystroke by a coworket, a training class to meet some of your is developing and will acquire new needs. Computer-based, interactive programs to meet the needs of P

g; g.

game-playing fn.end to create errors computerMdco disc, and audio /

NRC's training mission.

video programs will allow you to in y ur PC file or to destroy your

  1. 8 'C

'E *b control choice and pace of learning.

The Learning Center has its own They are easy to use, interactive, and space large enough for fourteen cfficient ways of learning.

study stationL The area is set up 1 Employees turn up at the IE S

on Cemers with sad facen

)

I I

provice the services and support l

I ! l i because their valuable diskette or Self-study courses are being inte-needed to use the facility's materials I'

their hard disk is somehow cor grated into the Agency's current and equipment. It is a pleaant and classroom curricula, so that pro-quiet space, free from office distrac-mM h %m f%'a h

.h Practice safe computing.

1 grams in the Learning Center will be tions.

l available to help you:

I When the Learning Center opens, h;

1. Take advantage of greater oppor-come by and take advantage of this Watch for the tunities for personal development.

new approach and opportunity to more directly and quickly meet your Pg9 g

2. Supplement pur classroom training and development needs.

IndlVlduallZed training with additional instruction For additional information, call Learning Center prior to and after class.

Carolyn Bassin,4924526.

ITS NEWS Page 12

E_m m

R wir NOTES

~

This section of the neweietwr provides needs to hyphenate a word at the where words such as "and/or"or tape and technical inforrnation of interest end of a line.

"cither/or" would be broken, to NRC computer users, ff you have any IIhtEc'o riYut anOoN*

%c hyphen acts as though it were

%c deletable soft return is inserted the ITs support Centers: for PC and NIH just another character, ifit appears by WordPerIcet if the line contains home, cou 492 41so or sea. ossa; tot in a ward that needs to be broken at no spaces. WordPerIcet willsimply home osS $4 the end of a line, Wordperfect will continue the text on the next line.

y leo op by and vlelt in P.a06 or OWFN 3C12.

prompt you for another hyphen.

Wordperfect: Format ne soft hyphen can be inserted ChanNe8 and Footnote betwecn the syllables of a word,and Personal Computers will appear in the printed document if you add footnotes to your docu.

only if it occurs as the last character ment and then change your d"'" *"" ' '"* '8'" I "'" " " d "'

Wordperfect

line spacing,er any other item that On screen Template ne dash is a combination of two affects the overalllayout of the Wordperfect Corporation includes a types of hyphen that ensures that it document,your footnotes will retain template with each package of will not be broken ifit appears at the original format characteristics software. This template belongs on the end of a Hnc. Words separated and will not appear the wayyou wish the keyboard,where it provides a by hard spaces will always behave as them to. In order to allow the reference for the function Leys and though they were one word.

footnotes to adjust to the new assorted special WordPerfcct keys.

format,you need to make your

%c template is a big help, but it's

%c invisible soft return allows you changes as follows:

casy to lose. Fortunately,you can to specify where WordPerfcct breaks access the built in Wordperfect a line, rather thar. allowing the

1. Retrieve your %,ordPctfect template by doing the following:

program to do it. nis is useful document.

1. Press (F3] twice.

Wordperfect Hyphens and eturns n p teserc!c b p sin Type Key to Press Effect Hidden Code (Silli'Tl + 1 PRINT SCREEN].

Make certain your printer is turned on ar.;lis on line.

Hard Hyphen Hyphen Regular hyphen

[-]

3. Pressing the [ SPACE ilAR]

Hyphen Home, hyphon Wordperfect treate 2 i returns you to the document Krcen.

hyphenated word as a single word WOydPerfGCil NVDhens S*'lHyP en CTRLA Hyphon inserte e hyphon Highlighted.

l h

t=

sr which appears when and Returna

. w ed oreske at the end of a line Sevetal kinds of hyphens, dashes and oesh Home, hyphen' Keeps two hyphens

-[-)

carrtage returns are available in hyPhon together WorJPerfect. Each has a slightl"

}

different effect on your document, 1 Hard space Home, space Koops two worde

[]

but they All1ook alike on the together

~

document rcreen. Use Reveal CMes (Fil or ALT + F3) to see the NIer, lovleible Home, Enwr Inserte line break

[ISrt) cDees.

soft Return without hyphenating Deletable (none)

Forces a line break

[DSrt)

%c hard hyphen funcGor.s as a soft Rsturn without hyphenating breaking point when Wordperfect ITS NEWS Pope 13 E____________

M A

f f

MT

=l vir NOTES if you have marked any text with the Press 3 if you want to delete the

2. Press [SIIIFT]+[F8] to access Block command. If you haven't, blocked text entirely. This can also the Format Menu.

Wordperfect offers to mark text for be acromplished merdy by blocking f

you, by displaying this line at the text and pressing the DELETE key.

j

3. Select Option 3 (Document).

bottom of the document screen:

(Remember, the FI key allows you his will allowyou to tell WordPer.

to restore accidentally deleted feet Nw to format th!s particular Move: 1 sordonce; 2 Peregraph; 3 Page; material.)

docem.nt whole.

4 Meneve: o

4. Select Option 2 (Initial Codes).

Since WordPerfecc can only

  • guess,

Press 4 if you want the blocked text t be attached to the end of a The current settings will be dis-as to what text you mean, allowing it document. Wordperfect willask for to mark text for you can cause klayed on a screen similar to the eveal Codes screen (Fil or pm cms r cument has the name of the file to which you wish to attach the block. Type the ALT + F3 key combination).

Tc urns er for, h ol wing Ec name and p ess the ENTER key.

5. Press [SilitT]+[r8]. The E*#* " '* "# * * * **

hiew Handouts Are Format Menu will reappear.

1. Use the Block command (F12 or Available

^ # }

6. Select Option 1 (Line Format).

o an Wate' The ITS Support Center has added Any changes trade to these items three new handouts to the list of since you defined your footnotes must be made here as well.

2. Press the CTRL and F4 keys publications available at the ITS simultaneously. Wordperfect Support Centers. These new
7. Press [F7] three times to return # *E "
  • E * "E
  • ""# 8 the bottom of the document screen:

to the document screen, (1)" Cursor Movement in WordPerfeet 5.0" Move: 1 Block; 2 Tabular Colornn; 3 Rec.

l Some peopic prefer to make all gengie: o l.

matter of habit. However,it should

3. Press 1 or H for Block WordPer.

between DisplayWrite 4 and their format changes this way as a (2)" Comparison of Function Keys I

be noted that this proctdare makes Acct responds by displaying this line Wordperfect 5.0" i

global changes that affect the entire at the bottom of the document document. Format changes that screen:

(3)"letus 12-3 Date Time.

i i

l affect only a few lines or paragraphs Filename Macro" should be placed in the document 1 Move; 2 Copy; 3 Dele; 4 Append:0 itself.

4. Press i if you wish to remove the Previously listed handouts-(refer to -

blocked text and move it elsewhere Fall ITS News) and the three cited Wordperfect: Moving in the document. He blocked text "8

3u 2 41 or and Copying Text will disappear and Wordperfect will invite you to move the cursor to the 492-03 3. You ma7 also stop by Like all word processing software, point where you want the blocked P-808 in the Phillips Building or Om 3Cl-Wordperfect allows you to man!pu-text to BEGIN and press the late portions of text move them.

ENTER key.

copy them, and so forth. This is ac.

complished with the Move key Press 2 if you want the blocked text i

(CTRL + F4).

to remain where it is, but you wish it also to appear elsewhere in the It is important to mark the desired document. The bkicked text will text with the lilock command (F12 stay where it is,and Wordperfect or ALT +F4) DEFORE pressing the willimite you to move the cursor in Copy key (CTRL + F4). This is the point where you want the copy because when the Copy key is of the blocked text to BEGIN and pressed, Wordperfect checks to see press the ENTER key, i

ITS NEWS Page 14 m

1 vir NOTES

=

z

~

uv :.... ~.

c a.

~

How Much Are You New Accounting VT100 Emulation if y u are an NIH user and wanno Program keep track of exactly where and how Data General MV/HCKK) users now your dollars are being sper' at NIH Now every user on the CRAY have the capability of using VTi(K) computer center, now you csn find machine can use the "dcost" utility Emulation when logging onto the that out interactively by actessing to see daily costs for file storage system via CROSSTALK or com-your billing data through Project charges. He user should be in the munications other than Smarterm.

Accounting System Online (PAS username directory in order to The VTI(K) Emulation will permit ONLINE). Easy to use, PAS capture allinformation about ub-the use of SED (including screen ONLINE enables users and account directories, but a specit'ic directory editing), Query, and PRESENT sponsors to display or print billing may be named. Syntax and details software. Detailcd instruuions may information for either the previous may be accessed from the on.line be obtained by signing onto the full month, the current month-to-manua pages, specifying the Data General and typing the date, or a single day, by using a DCOST command command:11El.P 'VT100.

series of simpic DB2 Qacry Man-agemen. Facility (QMF) procc-dures. Anyone with registered Programmer's

~ ~

account and initials aial an aPPro-NIH priate equipment to acccas the NIH Timesaver computer facility can use PAS

=

The "make" utility can simplify the ONLINE. Security is assured by dis-task of generating and maintaining Help Reduce Costs piaying oniy the dua ihai the user or

"""W"E###*

object files and executable programs in an effort to redace costs at NIH, on the C, RAY. This can save a "CC' all users are requested to move any considerable amount of time and datasets that are on the NIH file All users are encauraged to use PAS money for medium to large FOR-packs to the NRC private packs.

ONLINE and ke(p track of the TRAN nrograms. The utility ercates The use of NRC private packs will a makelile which is well. comme..ted expenses incurred at NIH. br permit NRC to save 32% of the cost information about how to use PnS and can be edited by the program-of storing the data. For the names mer. See details in the November ONLINE, plcase contact NIH com-of the NRC private packs and puter center,s technical note issue of "INEL Exchange," or access assistance in moving your datasets, Interface # 152 of August 25,1989, information from the on line n.an-please call John inchte at 492-4090 r call NIH PAL Unit at 4%5525 nal pages on the CdAT, specifying or David Barrow at 492-8303.

the 1 MG EN command.

or Mike King at 492-4974.

s

=

ITS NEWS Page 15 h-T___

.m

- - a

.a - -.,

l l

T NUCLEAR REGUt.ATORY COMMISSION I

i I

.l 1

1 ITS SUPPORT CENTER FACluTIES TRAINING L.ABORATORY FACluTY I

I I

B g,c.g.,,

1meneen.

3rd floor Woodmont Building g

8120 Woodmont Avenue, PhBilga Building, Roarn P408 One While Finnt North,3C 12 Bethesda,MD 20814 l

l 7920 Norfolk Avenue, 11555 Rociville Pike, l

g Bethesda,MD 20814 Rockville,MD %*$2 Phame: (ITS)cr(301)492-4744 Mountap:W 306 g

Phone:

' " Ai Hours: 7:30 a.m. 4.30 p.m. M-F l

  • l l

(l'I3)or (301)4924160 (1 !3)or(301)492 0353 l

Class Hears: 8;30 a.m. 3.30 p.m.

g g

Cenier floon:

l 7;30 a.m. 4:15 p.m. M F l

Drie claanrooms for formal ADP training including one equipped I

with eight IBM XTt,, one with eight IBM PCs with Hardcards, and l

gm l'.

or.e with PS/2 Model 30 2A6. " Hands on" instruction in the une of l

.l Uncr Assistance (Tclephone & Walk in), Equipment and Sof tware microcomputers and timcahating systems.

g I. for Trial Unc, Demonatratk ns.TechnicalIJbrary, Tours plus Note: De Training laboratory is operated tiy the Ornduate School, l

ComputerNideo.taned Tutorials. Support Center Project l

Manager, Karen VanDuner; AMCl Pitject Manager, Derrick USDA under contract and managed tiy the Office of Personnel, to l

1 Schreinct, pnwide training in end vaer computing for the NRC staff. Technical g guidance is petwided tiy IRM. NRC Project Manager,Cartdyn

=

4 l

Ilannin; OS/USDA Training Manager, Kathy lleckman.

l

-1 I

l l

I I

NRC END-USER COMPUTING SERVICES DIRECTORY l

l l

l Ilardware AcquisilloavUpgrade and Sottoare Acquinitionaf SINI?T Houlne: 492 4222 l

Upgradet Dawn Oliver, P-530,4924219 NUDOCS Hotlines 4924603 l

g' Hardware Instaliallon, Relocation and Malatenance Data Generni Systemas Problenant a

Judy Secherman, P412,492 9687 8

l Microcomputers: Karen McElyca,P 500,492 et906 Word processors: Ileth DeWoody,P-500,4924832 l

l Other ADP 1'quipment: Beth DeWoody.P 500,4924832 IBM PROFfvE. Mall Support: Sharon Root,P408,492-4093 g

Software Installation: Jennifer Thlbert, P-500,4924317 l

Iktronle Records Support:

l Computer Rootm Phillips 492-7713 Brende Shelton, MNiill 7714,4924132 l

'g White flint 492 0885 g

Graphka Support: Janet hot %ompson,20-40,492 0215

-l Computer Securityt Louis Orosman,P408,492 5019 l

l Comuneettal Detshame Support: Eileen Chen,160,4924501 l

Data Communications Probkn. Moden. and Data IJaes:

l g

IlrianIlrun cil,P 500,492 7927 Scienutic Code Dintribution NESC: Pat Bell,3C 16,492 3491 l

Modem and Data 1.Ine Acquisition:

Shared Informanon Network (SINIT) Developonent:

l g

Stan Wood,MNBil4703,492 7723 Fran Goldberg, P 712,492-4978 g

l Tinwaharing Accese/IDm: Mike King. P408,492-4974 Syneeins Development and Modification:

l PC & Niil User Support:

g

- ITS Support Center, Phillips Bldg., P-80R,4924160 Scisedullrig for ITS Treint.is laboratory e

l One White TNnt North,3C 12,492 0353 Kathy Bechman,W 306,4924744 l

Data Genetal and IN1'1, Uner Support:

l l

Pat Bell,3C-16,492 3491 l

'l Emily Robinson,3C-14,492 3490 l

Go amm e-ame uma mes==.m mem m. men mas aim ens.ms aus amm see.e ens.- m. ens amm man sum.m.=

.m amm aus mas num amm el

. ITS NEWS Page 16

.t A'

- l

'