ML20043B696

From kanterella
Jump to navigation Jump to search
ITS News,Spring 1990,Vol 6,Number 2
ML20043B696
Person / Time
Issue date: 05/01/1990
From:
NRC OFFICE OF INFORMATION RESOURCES MANAGEMENT (IRM)
To:
References
NUREG-BR-0056, NUREG-BR-0056-V06-N2, NUREG-BR-56, NUREG-BR-56-V6-N2, NUDOCS 9005310151
Download: ML20043B696 (16)


Text

fi p

E-h SPRING 1990 L

"ums Vol. 6, No. 2 a

o E

= 1 M

NUREG/BR 0056 L

'mD

[

EW l

t I

information Technology

/'"'

U.S. Nuclear DMslon of information I

f' Services Support Center

(

Regulatory and Training Laboratory Commission Office of Personnel i

should have an introduction and L

overview containing the name, location,and type of processing the gj.,,.

facility performs; the name/ title of -

the person making the important decisions in case of a contingency;

)

/ / ~.-

and the conditions under which the -

I k,

contingency plan should be imple-mented. The location of the backup 9') A c~ M k e

facility,and location of the backup g/

tapes should also be included,along e

i

/

j

?

with a list of runtime, computer

\\d

/-

processing unit (CPU) require-g t*

/

ments,and disk space requirements.

j}

h

\\

9' Also there should be a list of all staff s

U g

g g~

who will perform administrative t

e e

functions and be directly involved in s~

the contingency plan should a 1

disaster occur. This list should I

include duties, work and home 1

telephones.

j DON'T BE A GAMBLER, WR/TE A CONTINGENCY PLAN /.

Maintenance and testing should also be a priority. Procedures should be developed and established for The importance of

"""8 ""d *"'"'"' "' "8 "'""-

Contingency Planning ByData Gordon,IRhi THE lSSUE AT HAND FTS 2000 -

2 Because the dependence on comput. Securitymeasures are employed to New Learning center oim 2

ers and on the data processed by prevent and detect accidentalor i

them has continued to grow,it has intentional disclosure, modification,

" *P" C d' R****

~3 becomeincreasinglyimportant to destruction of data or loss of the Ninehasg Costs 4

plan to prevent loss of their availa-means of processing data. Contin.

NUDOCS News

.5 li!

bility. Only a fewyears ago it was gency plans,on the other hand, Supercomputing at 1 net,-

6 reasonable to consider a recourse to should be designed to reduce to aa codes ord Standards?

7 manualoperations when automatic acceptable level of consequence, any IRM conducts Suncy.

7 data processing (ADP) systems loss of ADP resources or capability.

Sign on With SINET 8

became unavailable. Today, there in Training tab News 9

are few situations in which it is even The contingency plan should RADDECAY 10 possible to revert to manual proc-provide the framework for preparing esses. Thus, contingency plans are the contingency procedures. The Software Qualityand Reliability S e na a

. 11 necessary to minimize the damage plan should have descriptive caused by unexpected and undesir-information and appendices that c mputerSecurity 11 able occurrences in and about the contain the procedures to be carried t'PtoP Computers.

.12 ADP facilities, out in the event of an emergency.

wizards in computer 11istory.

13 For example,the contingency plan IE Tech Notes 14 9005310151 900501 PDR NUREO

.BR-0056 R PDR _

l; L

4.;.;

,.., ' -,,.. i' ;.

u;..-.e,-a..

...a 4,.,-

Testing procedures should provide contingencyis imperative. ' A

- FTS 2000 At Your the following capabilities:

contingency plan can be written for large mainframe systems or small Service PC based systems. A plan does not By 7bm Baldesi,IRAf

  • Ensure adequacy and efficiency of have to be elaborate; however,it the pgan should contain some of the items "I can't get through.The lines are
  • Demonstrate compatibility of mentioned above,as well as backup busy."

hardware and software systems and storage procedures sufficient to e Demonstrate the adequacy of the secure the data in an emergency "The line is noisy."

database backup situation. For a large system there should be some discussion about "I can't hear very well.The quality e Demonstrate the ability to storing disks that hneimportant of theline is ir*"

recover backup files and software information on them.
  • Demonstrate the adequacy of All of you who have used the support arrangements Some of the contingency plans that FederalTelephone System have o Ensure that key personnel are presently being revised are experienced these problems at one understand their assigned duties Payroll /lFMIS, Personnel,The time or another. The new Federal Incident Response Center,and the Telecommunications System (FTS) during emergencies.

P-634 computer room. Just think,if 2000 should relieve these difficul-there were no written procedures,or ties.

According to the Office of Manage-a plan for contingency for the ment and Budget (OMB) circular A.

PayrollSystem dering pay period The FN 2000is a state of the art 130, no matter how large or how week and a disaster such as a major telecommunications system pro-small a system may be,a plan for fire occurred? Just think about vided by the General Services goingwithout a paycheck or having Administration,through a contract your paycheck delayed because awarded to American Telephone ITS NEWS CREDITS b ckmp pr cedms me n t wrluen and Telegraph (AT&T)and U.S.

and vital records destroyed. There Sprint. he contract was awarded would be a lot of unhappy faces for AT&T to provide services to The trS NEWS is a quarterly publication

-around the NRCl 60% of the Federal agencies and US providing informadon or interest to users or computer technology at the NRC. It is Sprint to provide services to 40% of producM tiy the starr or the NRC Infor-For assistancein preparing a the Federal agencies.The FN 2000 matica Technology scivices support contingency plan or a security plan, network is a fiber optic terrestrial Center and Training laboratory in contact Louis Grosman at 492 5019 network providing connectivity to 18 conjunction with the NRC's Omcc of or Data Gordon at 492 9974.

FTS 2000 service nodes throughout the Continental United States. The ten-year contract will provide for We welcome questions and comments.

NRC,s Individualized instatiation, maintenance, and Please contact thc l'!3 starr by:

Learning Cenier Opens management of the FTS 2000 Phone:492-8309 network by the respective vendors.

Mail or in Petson: MNBB-8720 By Carolyn Bassin, OP The old FTS was only a long lana Cobb,lRM/r13n The NRC's newIndividualized distance telephone network with the ExecuWe Editor Learning Center (LLC) opened on ability to transmit voice and low February 26,1990. The ILC offers a speed data over analog circuitry.

leslie Wassel GS/USDA Managing Editor variety of programs. Employees may The new FTS 2000is digitalin now choose self-study options for design and is a telecommunications Electronic Format and Layout training,and schedule time when system with many capabilities, Janet Thot Thompson. IRMK13B trainingis needed. Acopyof the Design consultation current course catalog was distrib-Along with the voicelong distance uted to all employees or may be service, the FTS 2000 network lilustrations by NRC Automated Graphics requested from the ILC at 492-4514.

Switched Voice Service (SVS)will Section. John Orban allow data transmission supporting Come by and use this new training up to 4800 kilobits per second Photographs by Dan Dehn facility. The ILCislocated at the (kbps)as compared to 2400 kbps on Training Complexin the Woodmont the old FTS (increases the speed of contributors to regular items are:

Building,Bethesda. Forinforma-the network). Other services S. Bachrach. K. Beckman, P. DeH, D.

tion call Carolyn Bassin on 492-available with the FTS 2000 are lluyer, M. King, E. Robinson, J.Schnapper,and K VanDuser.

8526.

Switched Data Services (SDS),

Dedicated Transmission Service (DTS), Video Transmf on Service l

i ITS HEWS Page 2 s

c (VTS), Packet Switched Service -

Releases (PSS), and Switched Digital Inte.

Packet Switched Senice is used for grated Services (SDIS).

the transmission of data in packet Needed For form. FTS 2000 PSS is based ca the FTS 2000 Services international standard of X.25. PSS Scie:1tific Switched Data Senice is a dial up

[n"n7t Computer Codes to an o

s i I, service for use of high speed data usefulin sending date when there

&ParMWf J

transfer from workstations, host are gaps ofidle transmission time Under a contract between the NRC computers, PCs, data terminals, and between locations. An ideal appli.

slow scan video from one Service cation for PSS is Electronic Mail.

and the National Energy Software Deliver'; Point (SDP) to another.

Center (NESC) at the Argonne Authorization Codes and Call

. Switched Digital Integrated Service National Laboratory (ANL)..

Screening are features available with combines allof the services and Argonne, Illinois, the NESC serves the SDS.

features associated with F13 2000 the NRC as a repository and a distribution center for the NRC on the same access line, The objec.

f :=-

Dedicated Transmission Service tive of SDIS is to minimize costs and scientific computer codes.

allows selected telephone or data

- service disruption associated with In order for a code to be distributed terminals to be connected directly to integration to more modern tech-l telephones or data terminals at nology as it becomes available. Its by the NESC,the sponsoringNRC l

another FTS 2000 location. This impact is to provide improved division director must sign a release line is always available for both end quality and greater transmission form specifying any restrictions.

users to pass information. Three speeds.

This release form is mandatory for types of DTS are available with-NRC codes at NESC. Most frc.

DTS:' Dedicated Analog, Dedicated FTS 2000 is a reality, Headquarters quently, however, codes are submit-Digital,and Dedicated T1 (digital and allof the Regions will be on this ted to the Center by an NRC circuitry that carries 1544 kbps). To new network by June 1,1990. As all contractor without an acceptable use DTS, both originating and of the Federal agencies change over, release form, making it very difficult terminating ends must request the users of the system should experi, to find the NRC person who is service.

ence better quality of senice and responsible for the code and who very few busy conditions from the can provide this release information.

Video Transmission Service offers network. As the NRC begins to both compressed and wide band utilize the senices and features of Tte purpose of this section is three-video teleconferencing to FI'S 2000 the FTS 2000,information will be f Id: First, to list by acronym those subscribers. It is similar to the disseminated by the IRM staff.

codes that are missing the necessary current video teleconferencing used release form in the hope that today by the NRC. As with the if you have any questions about thlt someone will recognize the code as DTS,all members in the video service, please callTom Baldest on his or her responsibilityt Second, to teleconference must be on. net users 492-7121.

list by acronym those codes for of the FTS 2000, which requests are pending and have not yet been submitted to the -

AT&T: FTS2000 Network Architecture

,; f;fglg',,f,*o'g*,'he d

code,any new releases available j

s..a from the NESC.

if you have any information about any of the codes on the following j

o.wn I

two lists, or if you wish to send a cm.o.

k"*,"j, code to the NESC or receive a code, please call Pat Bell on 492-3491.

w., u,ine o,,,,

w..mean oc

*'ema Releases are needed for the follow-x.n... cny ing codes:

t.. ane..

s einy,i.m COMPARE H2/ IMPLICIT L

l ESTONE

a. oa.-

MESORAD1.4 ORINC The connectivity to the 18 FTS 2000 service nodes across the U.S.

ORSMAC l-ITS NEWS Page 3

l SWRT.NnC Reducing NIH-

^

S M^b Timesharing Computer

- Both releases and code packages are. COSTS needed for the following codes:

ByLou Grosman,1RM -

CADET WE NEED YOUR HELP!

CONTAIN -

EXPAC The cost to the NRCof timesharing and can be accessed as ca lly as GASPARll at the NationalInstitutes of Health when it was stored on the public MIGRAT-(NIH) Computer Center's facility is pack.

NEFTRAN-expected to exceed $4 million for FY90. Accordingly,it is appropriate NRCleases the private packs from SPARC t emphasize the ways that NRC NIH at a flat monthly rate, equiva.

STCP usen can cut c sts incurred at NIH.

lent to S.003 per track per day, VANESA The following suggestions should be whereas public pack storage costs mp mentcOy usen of tWH NRC W per trad per day, in The follmiaEcodes have recentiY computer facility:

FY89, public pack storage ac-been releasej:

counted for more than 10% of all

1. Use the NIH DISCOUNT service NIH timesharing costs. This COMMIX-1AR/P: Cray X MP-to realize s gnificant cost reductions percentage could increase during jee "

when runningbatchjobs DIS-FY90 unless private packs are better r

lent,th e e sion sace o s a m rate utWzed.

tangular or cylindrical) analyses of reduction for alljobs started 8 le ase m

1 fluid between the hours of 5:00 p.m.and

3. Scratch unneeded data sets. Both -

g 9

8:00 a.m. Monday through Friday

' private and public pack storage structures, and allday on weekends. To request should be reviewed to determine the DISCOUNT facility include a which data sets are nolonger COMMIX 1B: DEC VAX11 -

needed. Dese can be deleted, designed to perform steady state er PDISCOUNT resultingin cost savings, transient, single-phase, three-

~ dimensional analysis of Guid flow statement after the JOB statement

4. Save lightly-used data sets on with heat transfer, along with any other control other media. Data sets can be statements or include DISCOUNT dumped to tape at NIH,or down-

-PLOTNFIT: PC used for as an operand in a WYLBUR RUN loaded to floppy diskettes using a

- plotting and fitting curves to or RETRIEVEcommand or aTSO PC. Please contact the NIH Pro-measured or observed data for both LISTOFFor SUBMITcommand.

grammer Assistance Liaison (PAL) extrapolation and interpolation.

Any job containing a FDISCOUNT Unit at 496-5525,or the IRM HELP statement will automatically be held line,492-HELP,if you need assis-RASCAL 1.3:. PC Radiological for execution until the next discount

tance, Assessment Svatem for Conse-period begins.

quence Analysis--a new dose IRM will move IRM developed 1

assessment system for use during

2. Store data sets on NRC private systems to private packs. Develop-

- responses to emergencies, disk packs (a disk pack is a group of ers of other systems are responsible removable tiered hard disks),

for moving their own systems;IRM Ndad designated NRC001 through will provide assistance upon request.

2 l

nt e

NRC004,instead of using the NIH The importance of using private Heat' public disk packs,i.e., FILE 01 packs instead of public packs cannot through FILE 99. Data sets cur-be overemphasized. In a year when DM mQs rently stored on public packs can be we must dealwith tight budget con-S/ c c 1I s at casily m ved to private packs using straints, any savings that can be transfer in concrete subI'ected to WYLBUR. Simply log on to realized must be realized.

high heating rates.

WYLBUR,callin the existing data set,and type SAVE AS (DATA SET For additionalinformation on NAME) ON NRC001. Then, scratch reducing the cost of timesharing the dataset on the public pack.The services, please contact Herb file is now saved on the private pack Parcover at 492-8699.

ITS NEWS Page 4

I i.

L 1

l i

,maasasas m m a

. ama em - mm ; em aus9mm aar inn amr um mar ima samasus-ens aus sem nas aus sum uns - um. -

333 m a a m m

W E.-

' ^

am== D NUCLEAR DOCUMENTS i

RWMWWW SYSTEM NEWSLETTER l

\\.

l New Data Fields choosing to search the data field and reports, annualcompany financial pressing the F2 function key at reports, monthly operating reports, Available in "Value."

annuai operating reports, semi-annualoperating reports,and NUDOCS/AD-Example Search: Input "GL-8910" weekly information reports.

in the Reference Number field and With the implementation of "GLN"in the Reference Number The Related Date Category is used l

q NUDOCS/AD, five new data fields Category to locate Genericletter in conjunction with the Related have been introduced to provide 89-10.

Date to identify the type of date 4

more searchable data and to make beingscarched. Alistingof Related data field selection caster.The new The Related Date field captures Dates is accessible on line by data fields are the Reference dates of significant importance to a choosinf, to search the data field and Number, Reference Number document. Specifically, Related then pressing the F2 function key at Category, Related Date, Related Dates are docket dates on public "Value."

Date Category, and Domain.

Example Search: Input "880830" in The Reference Number field was the Related Date field,"EVD"in created to climinate user confusion the Related Date Category, and in determining which fields contain 8 % an "05000275"in the Docket Number which numbers in the predecessor experienced User Of Deld to locate all documents that system, numbers related to a the Old NUDOCS?-

related to the August 30,1988 event l

document were captured in as many at Diablo Canyon Unit L f

as five different fields. This new field contains all numbers related to The Domain field is used to identify a document, including project Sign up for the specific document subsets within the Ex serienced User document data base. NUDOCS/AD numbers, license numbers, report numbers, and tracking numbers.

NL, DOCS /AD trainin9 Domains are ASLBP hearing i

The Reference Number was con-and learn how to transcripts on Seabrook,congres.

. structed by combining data from the efficiently use this sional correspondence, high level Document Identification Number, system. This enhanced -

waste management documents, the Contract Number, the Other system can serve your licensee event reports, and NUREG Document Identification Number, requirements. Learn abstracts. The Domains constain the Formal Report Number,and how searches have only documents that have full text Generic Letter numbers from the been made easier to on-line (or abstracts for NUREGs).

Searching by the Domain field will Office Tracking System of Perform. Learn how to narrow the range of a search to one NUDOCS. Any number that has use Direct Access.

been previously stored in one of category of documents.

these fields can now be searched for in the Reference Number field.

Example Search: Enter "HLWR" in the Domain field and The Reference Number Category is "LINEHAN,J.J." in the Author used in conjunction with the comments and legal proceeding Name field to find all high level Reference Number to narrow the documentation; event dates; the waste management full text docu-scope of a search by reference type.

exercise date from emergency ments authored by John J. Linehan.

Reference Number Categories exercise scenarios; inspection include IRN (inspection report dates from safety inspections For further information on the new numbers), INN (Information Notice (NRC Form 591); the last day of data fields available in NUDOCS/

numbers),GLN (Generic Letter a performance period from AD,or assistance in using these numbers), CN (contract numbers),

contractor performance evalu-fields, please call the NUDOCS and FRCN (Federal Register ations; and the last day of the HOTLINE,492 8603.

citation numbers). A complete table reporting period from periodic of categories is available on line by environmental monitoring ITS NEWS Page 5 l

m P

I less than 16 seconds on the INEL C'

CRAY, SYTrK cgtn y ff3n ;

20/220 Advantages Of CRAY um.

d. fEto i 2d/22%

Operating System vutN*

The CRAY computer uses a UNIX

/

J aRioce operatirig system. This system has icsroo two advantages for a personlearning Nsc suns L_

^'8 J 60A J gyg

,sg7,E%

to use the CRAY computer:(1) h 2

many of the commands are Verv

/

J I

similar to DOS,so that the user can j SUN 3 l_

n

~

UO NSC

- - - - -O^

,yp,m Qg C5 oo s

A4oo transfer some knowledge about IBM enAv SUN 3 BR oGE go, g

- j csroo i

@ personal computer operating x MP/24 teoA y

h SUN 3 BRIDGE g SYTEK systems to the CRAY; and (2)

DISKS csroo.

20/22o o e'YTESg

'60 5 UNIX is the operating system of.

fyh choice for local area networks and v

for use on more powerful personal Access Configuration to CRAY X MP/24 System computers (i.e., the SUN worksta-tions). Therefore, time spent Supercomputing At INEL g a c ^a ; g % y,o v

By bE Ford, NMSS other computers. An introductory course entltled,'" Learning to Use -

Supercomputingis the term used to water table)onlywater is free to the CRAY,"is offered period-describe the most powerfulcomput-move through the soil or rock.

ically by IRM at the l'IS Training ers in use today. At the Idaho Therefore modeling the movement Lab. One-on.one briefings and National Engineering Laboratory of water and any contaminants assistance can be arranged.

(INEL), the CRAY X-MP/24 movingwith thewater in the computer combines high-speed unsaturated zone requires more For more information on code scalar and vector processingwith -

complex models than similar optimization or CRAY training, multiple processors, large and fast -

saturated flow codes. The more contact Emily Robinson,492-3490; memories, and high performance -

complex codes take longer to run,s9 for CRAY access information, input-output. The result is excep-using the fast speed of the CRAY is contact Sharon Root,492 0256.

tionalspeed and high overallsystem an advantage.

throughput.

Editor's Nose: Members of EG4a Geosciences In addition to the CRAY com, uodcung Team a firstplacefor shcir paper Supercomputers are used to simu-puter'sinherently faster speed the foe NNYN describ d late and model actual physical CRAY has the ability to do parallel co,,,pu,,7,,iodchtig smdy, doric on die INEl, phenomena. Scientists and engi-processmg. This means that the m y of vaporprobterru in radioactive aarte nects are finding that computer computer can execute independent duposah neauthorstatedchar simulations are usually the best and calculations simultaneously, result.

" onty the large memory and rerrudable sometimes the onlyway ing in quicker run speeds. Therefore comF"'d'ioa8Perd ofshe NYhar a#omed '

to test hypotheses, when faster speeds are needed, the

' "}g d"

  • C fy computer code is modified to take 4

NMSS Uses The INEL advantage of parallel processing.

CRAY

  • 8 'YP* I'" dIII

'I " IS ' 33 d vectorir.ation. When a code is com-The Hydrologic Transport Section piled on the CRAY computer,some SuggeSilOMS7 vectorization is done by the com-of the Division of High Level Comments 7 Waste, NMSS, uses the 'INEL Piler. However,if that is not,

CRAY computer to conduct two-di-sufficient, additional optimization is mensional modeling of ground water accomplished by code modification.

QUeSilonS.9 flow and contaminant movement An unsaturated ground water flow above the water table. Ground code was optimtzed by staff at EG&G Idaho, Inc, under contract to water flow above the water table takes place under unsaturated the NRC, using the INEL CRAY.

ITS News Editor conditions where both air and water After optimization, test runs that took 20 minutes on the NRC Data 492-8309 flow through the soil or rock,while in saturated conditions (below the General MV/8000 computer took

. ITS NEWS Page 6

y p

"The Codes And Standards Section?

IRM Conducts l've Never Heard Of That!"

Employee i

By smayaouinson,inu Opinion Survey "What are Codes and Standards?"

puter securityin accordance with By Steve Scott, IRM Federal regulations. For example, This is a question which is asked agency systems must adhere to in January, the Office ofInforma-almost daily of the staffin the Codes contingency planning requirements, tion Resources Management (IRM) and Standards Section (CSS) of the These plans should be in writing and conducted a survey among randomly :

Information Technology Services approved by NilC management, selected employees in Headquarters Branch, DISS/lRM.

(See articlein this issue.)

and the Regional Offices. The objectives of the smvey were to 1

4 in August,1989,IRM reorganized Closely related to computer security determine:whether IRM is making 1

and formed a new section under the - is the controlof access codes to employees aware of the many and

[

direction of Louis Grosman. The timesharing facilities,such as the varied services it provides; whether i

section's name arose from the fact National Institutes of Health (NIH), these scruces are adequate and

{

that the word " code," implying Idaho National Engineering Labora-being used;and, how the services j

computer code or computer pro-tory (INEL), and Oak Ridge Na-e uld be improved.

gram, appears many times in the tionalLaboratory(ORNL). Access functional description of this to these systems is controlled The selected participants were asked l

section. Activities such as computer through CSS. Access requests are to answer questions baed on their security (data protection), software submitted to CSS, reviewed and present position and expeiences.

quality, and software documenta-when approved, forwarded to the The survey questionnaire was divided into three areas: demo-tion, must comply with a set of.

specific facility, Federal standards. The new Codes graphicinformation,communica-and Standards Section is now NRC program offices develop or tion and policies, and specific responsible for these functions.

contract for development of services. After each specific service, scientific computer codes that are space was pmvided for comments This section is a composite of many used to analyze licensing regula, and suggestions, diverse functions that include the tions, research, protection of the en-following:

vironment,and other subjects Participants were randomly selected j

related to agency health and safety from each office, including the j

-

  • Providing all aspects of computer problems. IRM creates policy and Regions and resident inspectors.

security and computer access procedures regarding necessary About 600 questionnaires were control; standards, quality, and use of these rtiled out. The rmrn response j

  • 1mplementgng computer stan-codes on NRC-accessible computer se impressive. More than 300 da s and quality assuranc systems. New or modified codes are (50%) responded,which willallow submitted to the National Energy IRM to gain some insight to deter-

. l' E # "'

Software Center (NESC) and distri-mineif we need to modify our j

  • Supporting scientific users on bution is managed by the Codes and efforts or expand efforts in different j

mainframes, minicomputers, and Standards Section.

areas.

microcomputer (note: other microcomputer support is This section serves as liaison IRM has contracted with a private p

managed by the ITS Section);

between the ITS Training Lab and firm to analyze the results. A report Preparing scientific computer the Office of Personnel (OP). In of the findings and IRM's recom-code conversion and implementa. this role, CSS evaluates and mon,

mendations will be provided to the i

Office of the Executive Director for b

tion; tors agency ADP training,coordi-nating technical resources with OP Operations and a summary of the

  • Distributing scientific computer to assure that courses are developed key findings will be published in the e da; next edition of the ITS News.

to accommodate the agency's

  • Providing support, resource coor-training requirements. Some recent dination,and technical direction examples of this liaison are the IRM appreciates the responses and to computer training; NUDOCS/AD courses and the comments from everyone who Wordperfect Advanced Features.

participated in the survey.

  • Preparing the agency wide computer information newsletter (ITS NEWS) quarterly.

As you can see, this is a section of many and varied responsibilities, all included in an organizational unit, CSS is responsible for implementing " Codes and Standards."

policies and procedures for com-ITS NEWS Page 7 q

SIGN ON m 'emma J O E EEL E umassammares munumk e aar---

""W""

unmaskimme ammmmmmen amma M

MM M WITH umut EB T

9BBB IEEL___

W W

W

11 L Regions Use SINET in-through RITSCARD. The major data in SINET, has a new HELP fea-spection Planning System benefit of R' MARD is that as ture. By selecting the HELP option soon as the time that applies to an on any of the screens,you can view Early last year the Master inspection inspection is entered,it is immedi-information about that screen.

Planning System (MIPS) was imple.

ately validated and recorded against Some of the help screens have mented as a part of the Shared In.

the appropriate inspection plan.

multiple pages. You can scroll from formation Network (SINET). MIPS The immediate availability of these page to page by selecting the was designed to provide a central data allows the regional staff to number of the HELP page that you NRC repository of planned and compare the actual hours match wish to view on the right side of the accomplished inspection activity against the plan. The main HELP screen. For generalinforma-which is consistent, accurate and RITSCARD menu allows the user tion or assistance with EXSIS call timely for each operating commer.

to choose a data entry screen for John Beatty at 492-4164.

cial reactor. MIPS provides an easy either an Inspection Staff input to use, menu driven system which Report (ISIR) or other Staff input allows continual access to planning Reports (SIR). RITSCARD PC Print Feature Aval!able and historical data. The Regions traming for regional and headquar-For 50.72s In SINET input the plans, based on inspection ters staff was conducted at Head.

Program Guidance, assessment of li-quarters in November.

A new addition to the SINET Query censee performance and input from system has been implementeo: the program offices. This system allows

._._ Event Notification Operations the staff to tailor inspection plans.

Officer Support System (OOSS).

Just a few of the data items that help This system replaces the one that the staff plan the inspections are a Call today and get your was on one of the NRC Operations Centa Data Geneal wmputas list of inspection procedures for copy of PROCOMM until the end of 1989. Data for each plant, schedules for performing the procedures and the lead inspec-Installed. See how events (Immediate Notification Re-qulCkly you Can print quirements for Nuclear Power tor.

Event Notification on Reactors,which are usually referred The original implementation of to as ens or 50.723), reported since MIPS used an interface to record your own printer!

February,1985 and all new events actual hours expended on inspection will be in SINET. Events can be activities in the Master Inspection viewed either by event number or Plan. The difficulty with this for a range of dates. A new feature, approach was that the RITS (Regu-PCPRINT, allows printingof a latory Information Tracking System) RITSCARD data is stored within formatted report of the selected data entry system was separate from SINET, residing on the NIH events on the users own PC printer.

the MIPS and the Regional offices mainframe and is accessed using a The PROCOMM PLUS teleco-had to wait several weeks or more modem or the asynchronous mmunications package must be for the RITS hours to be matched network server, Autodial Network installed on the PC for this feature against the plan. The solution to System (ANS), via the to work and it is currently available this problem is RITSCARD (acro.

CROSSTALK XVI telecommunica-only for the OOSS option. How-nym for RITS time CARD entry).

tions package (or IBM 3270 cluster ever, now that a method of printing controller connection). If other reports from SINET on the PC Actual Inspection Hours telecommunications packages are to printer is available, IRM is investi-Now Captured in SINET be used, or for general information gating further uses of this feature.

or assistance with RITSCARD call Watch this column for future news The new RITSCARD system was Jack Schnapper at 492-4092.

on PC printitig. For general information or assistance with the implemented in December,1989 and is used for all RITS recordable On-Line Help Feature OOSS, call wil Madison at 492-time entries. The new system fully Added To EXSIS 7781. For generalinformation or assistance with the PCPRINT replaces the old one in that all RITS time entries (not just those interfac-The Executive Shared Information feature, call Jack Schnapper at 492-4092.

ing with MIPS) are recorded System (EXSIS),which draws on ITS NEWS Page 8

=_m i

M Lyy LAB NEWS NUDOCS/AD Training database of approximaiety 10,000 course developer, Ms. Teri Flynn, records to learn how to use this met with Janet Thot Thompson, g pgy ggO major system upgrade most effi-IRM/ITSB, to discover tiie style Users of the NUDOCS/ Advanced ciently.

guidelines developed by the Auto-Design (AD) System are taking mated Graphics and Visual Commu-advantage of two new courses at the The Number IS nications Section, IRM/ITSB for f

Prep nnE onts, graphics, and ITS 12b. In March, the Lab began

"*10'0001 training prior users of the NUDOCS viewgraphs.

and DCS Systems who need to trans-On February 23, ten NRC Head-Memben of the Office of Research's fer their skills to the new /AD quarters students participated in a System.

unique ITS Lab class. Office of Per-Mimcoinputer Usen Group also sonnel representaines James met with the course developer to A primary goal of"NUDOCS/AD McDermott and Peter J. Goldman discuss their work products and then i

for Experienced NUDOCS Users" announced to the surprised provided multiple samples of is to train users to conduct their own Wordperfect class members that documents needing the graphics

-i Subject / Field / Boolean searches they were members of the ITS Lib's capabilities of Wordperfect.

Karen VanDuser of the Technical using the /AD System's menus. Par-

"10,000 Club." With that class ticipants also learn to use the new presentation, more than 10,000 Support Section, IRM/lTSB pro-Browse Documents feature. This individuals have received hands-on vided a typeover document for TV l

allows users quickly to retrieve training since the ITS Lab opened in graphics at White Flint to be included in the course materials, document data records with only a 1984.

accession number, issue date, or For the Enhanced Document document type code.

Participants in this record making Features course, David Meyer, Chief group were:

After lunch, participants are ready of the Regulatory Publications Branch, ADM/DFIPS arid several to utilize Direct Access Mode to Bolling, Vicki ( AEOD) embers of his staff met with course scarch and display documents.

McAllister, Marlene K. (NRR)

Many students have commented that Case, Michael (NRR) developer Arenda Holladay to describe the standard formats for Direct Access Mode reminds them Singh, Rabindra (NRR) of using the dot prompt in dBase ill Cutchin IV, James (OCM/TR) longer documents such as Inspection Plus to issue direct commands. The Stone, James C. (NRR)

Reports and dratt NUREGS class concludes with a demonstra-Jabbour, Kahtan N. (NRR) r utinely generated by many NRC tion of data download of records to Tondi, Dominic (NRR) offices. This group also pro ided a aPC.

Lipuma, Anthony (010) wealth of longer document products Wang, Alan B. (NRR) as c utse samples.

In April, the second course in the

  • ^""""d""'"*'"'F"S NUDOCS/AD curriculum became Wordperfect 5.0 available. This course,"NUDOCS/

course is built around these samples.

AD for New Users,"is designed for Curriculum Expands During the training day, participants students without prior experience edit a typical Inspection Report to Wordperfect 5.0 users can now include automatically generated on NUDOCS or DCS. The day begins with an explanation of register for a full program of end-features such as Tables of Contents concepts of data retrieval from auto, user training. The two newest and Figures. Participants also learn mated databases and an introduc.

modules in the curriculum are:

to produce an index, internal tion to basic search techniques.

references, foot notes, endnotes, and

. Wordperfect 5.0: Fonts, tables created using the column fea-Students then get extensive hands.

on experience conducting searches Graphics, and Viewgraphs ture.

l on the menu driven NUDOCS/AD

  • Wordperfect 5.0: Enhanced For more information about the System and also using the Browse Document Features Documents feature.

complete Wordperfect 5D curricu-The content of these two newest lum, consult the ITS Training Lab raodules was the result of an Announcement or call the Lab at in both courses, students use the i

NUDOCS/AD Demonstration extensive training needs (issessment.

a92.a7aa.

l For the first course, the 1IS Lab ITS NEWS Page 9

O A nngf% AV Tbc Region til technical staff has copics without any restrictions.

IntM w wa wrM i found RADDECAY beneficialasa RSICis a Specialize 4 Information quick reference duringemergency Analysis Center (SIAC),as defined Usedin nrenarednes, amusm in dnuna-in euuneniDOE orde ci3=

Ing decay of radioactive products Octot er 1987)on Scientific and Realon lil and radia*-nut m of the various Technicai Comnuier Sofiware i

radionuclidesim'olved. Another (STCS);i.e., a POE program office byDarreyG'. Ilicdeman, Region 111 useful purpose of RADDECAY is sponsored facility that collects, assessment of radiation exposure evaluates, announces, and provides Health physicists ano nuclear due to lost or stolen radioactive softwarc in a specialized subject engineers are quite familiar with the sources. Recently a midwest area. P31C supplied Public Domain Chart of the Nuclides. This chart university reported a lost radioactive software is authorized for installa-consists of extensive data regarding neptunium 238 scaled source of 2-tion on the PC under NRC Manual kn "ba" $

microcuries. The last indication that Chapter 0904 04. Other useful

>f l

s en the source was stillin their inven.

public domain programs designed and nuclides listed are stable (not tory was approximately 10 years ago.

for use by engineers,physicise,and A quick check with RADDECAY scientists are availabic from:

o afr ti f sec nd ny showed that neptunium 238 has a thousands of years. The Chart of halflife of 2,117 days ($.8 years)

Radiation Shielding information center the Nuclides lists thousands of which means that the source was OMNt.,$unding 6025 individualelements and nuchdes; still radioactive and would be for a WH Stop m2 however,due to its radioactive long time. Ten halflives is usually U' '*" "#

components, only several hundred considered sufficient time for the ra.

radionuclides are ofinterest to the dionuclide to decay for the radiation Myw ananyquedonsa wt health physicists and nuclear engi-from the source to be considered "C""'

DEN, please cau Danel inconse9uential. Subse9uently the

% iedeman, on IM 8 388-5616.

source was I cated in a different Questions regarding the availability A scientific program called RAD.

storage safe located in another part of scientific computer programs DECAY is now available through tk campus.

should be addressed to Pat Bell, the Radiation Shiciding Information i M,62@l.

Center (RSIC) at Oak Ridpc RSIC has granted permission to all National Laboratories. RADDE-users of RADDECAY to make CAY is a program designed for use on a IBM PC with DOS 2.1 or equivalent. The program consists of threc $ 1/4' floppy disks that can be 1

portable PC such as a Compaq 286

'[*h,9l loaded on to a hard disk or used in a

~

I which is used on some inspections.

f RADDECAY displays radioactive

/

k 9r[gh/f*Mo*

fj AAD decay information for 497 common A

T radionuclides. It provides data on I

the half life, radioactive daughters,

',e.

w nuclides, probabilities per decay,

]N g; P

and decay product energies for g

RE6IEICIIO alpha, beta, positron, electron, X-

[

i PERSONNH.c ray, and photon radiations.

The development of the sof twr.<

F l

1 was a coordinated effort RSI" < + x 1

j original source of the data. Grove y gL,.

l g

a.-

, it i

Engineeringof Rockville, Maryland e f is the originator of the microcom.

puter formatted files. Grove Enginecting proviJes energy and h

s 4}

g electricity-related engineering and management consulting services to i

utilities, industrial and maritime 3

N organizations, and to the U.S. Navy, x

N Dick Bowers of the Perry Nuclear 3

Plant provided the decay algorithm.

ITS NEWS Page 10 e.

s., Jh.> er g

1 Software Quality

/

w#

wf m v My' l

and Reliability 4 @AwMphMF Tn.

a Seminars gp gg-IRM is sponsoring monthly semr j

kg' o

k j

nars at OWFN on Software Quality N

M;.9!(

9,-

~ 3 9 c

S.

1 and Reliability. Expert speakers 4

-3 g

from government and industry are M N N.-8 %..

W' p Y

  1. ]M 8%

w M y$ g g gh ky of'

  • h

(,,

invited to speak on related topics.

c On April 2.. Jack Adams, AT&T i

NWNQQ]gh. #4 f f v' th Bell Laboratories, spoke about 4 - "

Software Reliability and larry M

Jackson, Government Service

  1. hyp gn "

Q

)

Administration, discussed the topic, J..

I_

. ' j'7 4.. y

'D,

(

" Software Wellness Checklist."

,g g

4,,,,.. k E

'3',

3.

qd' ' * -

a p,.

a We invite you to attend these

.Q -

g" *f -

.g y

informative sessions. The next V

V # % '

V ( '

l Contact Emily Robinson at 'e* l } for future seminar dates De a your syst m lock the keyboard with a keylock or a password? Passworf 'otection and Locking Feature: 2 Model 30 VS 30/286 in Layman's Language & Dara cordm c Connectivity: A term used to There has been a lot of concern system uses this information to describe the wide variety of com-about the keviock and pawword a'utomatically record the date and munications functions. It is the features in the new IBM Personal time of your system. Set password connecting or networkinf System'2 (PS/2) r niel 30 2M The feature allows the user to restrict the together of computers via oider system PS:. (odel 30 has a use of the system by unauthori/ed electronic transmission (telecom-keviock feature located on the right persons. Three passwords are munication). This networkinE hand side of the PC which has to be available on the system: a power-on allows users to access files, to locred and unlocked with a key. In password, network server mode, and share data, nn.1 to Are periph-order & use the keyboard, the a keyboard password. Users do not cral equipment. such as prmters-keviock shouW be in tne unlock have to set passwords to use the An mmple of connectr/ity is a position (key pointing dowu) After system, but using passwords helps PC asceumg a mainframe-use, the PC Lethv;k st;ould be put in protect the information stored in through a so,ftware package such tt.e lock paition (key pointing up) the system. as Ck OSSTALK. An example is the SINFY system w bich resides The Codes and Standards Section, Setting a power-on password helps on the NJH facility and NRC j ITSB1RM has axeived calls prevent unauthori/cd persons from users (Regional ofuces end ! concerning the ability to use the using the system. You can use any Headquarters) are em nected via keyboard of the Model 30 256 after combination of characters ( A to Z netuks. A Local ^rea Network ke' is in the locked position. Don't and 0 to 4) for the power-on pass-v (LAN/ is another example of worn, the lock is not broken! To word, but the password can contain connecovit)- rt mt dy this problem, the IBM no more than seven characters. model 30 2% has a "so (cature" fot Once the power-en password is set, FJe Server or Server: a doice pas >words. The keykick feature on thc pr. sword prompt is displayed u3ed to control LAN actoity. this modelis jut t to kick the cover. cah time the svMem is turned on. The file server manages file shar-It does not loct the kerbeard To use ;ne svuem, type the correct ing, sysWm security, coordirsale passwoul and press the li,nter key. station to station communka-The " set feature" on the IBM Model The password is not displayed when tions, controls sharcable disk 30 3y, allows the user to set the typed if the password is typed drives, printers, and other periph-date, time, interrri pewot ds and correctly, an OK is displayed. If the eral equipment that is connected the keyboard spc ed. Sct date and password n typed incoricctly, the to the Local Area Network. time feature stm the current date password prompt with an X over it and time in the syuem unit. The is dnplayed if the password is not ITS NEWS Page 11 J s Software Quality r' A 'p and Reliability +2.. # Seminars { IRM is sponsoring monthly semi- '.I s f ^ s, 4 1 'p~ 'l.1 nars at OWFN on Software Quality = ,l 1 J+ s-and Reliability. Expert speakers )- ( %w from government and industry are wj,.. g%i M,3 g ; '. * ', invited to speal: on related topics. W .1 On April 24, Jack Adams, AT&T ..J ^ Bell Laboratories, spoke about ~ ~ Software Reliability and I.arry 8 g g* M,, j% Jackson, Government Service ) Administration, discussed the topic, ~^ ( " Software Wellness Checklist." N, ,) j We invite you to attend these j ,1.. e 7 h,s M %,. 7 informative sessions. The next 4 ,_.s O< session is scheduled for May 22. l s Contact Emily Robinson at I 4 2(,, or future seminar dates Does your system lock the keyboard with a keylock or a pessword? Password Protection and Locking i Feature: PS/2 Model 30 VS 30/286 In Layman's Language IF Dara Gordon,IRM Connectivity: A term used to There has been a lot of mncern system uses this information to describe the wide variety of com* about the keylock and password automatically record the date and munications functions. it is the features in the new IBM Personal time of your system. Set password connecting or networkinf System /2 (PS/2) model 30 2M. The feature allows the user to restrict the together of computers via older system PS/2 Model 30 has a use of the system by unauthorized electronic transmission (telecom-keylock feature h>cated on the right persons. Three passwords are munication). This networking hand side of the PC which has to be available on the system: a power-on allows users to access files, to locked and unlocked with a key. In password, network server mode, and j nhare data, and to share periph-order to use the keyboard, the a keyboard password. Users do not eral equipment, such as printers, keylock should be in the unk>ck have to set passwords to use the I An example of connectivity is a position (key pointing down). After system, but using passwords helps PC accessing a mainframe, use, the PC keylock should be put in protect the information stored in through a software package such the lock position (key pointing up). the system. as CROSSTALK. An example is the SINET system which resides The Codes and Standards Section, Setting a power-on password helps on the NIH facility and NRC ITSB/lRM has received calls prevent unauthorized persons from users (Regional offices and concerning the ability to use the using the system. You can use any Headquarters) are connected via keyboard of the Model 30 2M after combination of characters (A to Z networks. A local Arca Network key is in the h>cked position. Don't and 0 to 9) for the power on pass-(LAN)is another example of worry, the kick is not broken! To word, but the password can contain l connectivity, remedy this problem, the IBM no more than seven characters. model 30 2M has a " set feature" for Once the power-on password is set, File Server or Server: a device passwords. The keylock feature on the password prompt is displayed l used to control LAN activity. this model is just to lock the cover. cach time the system is turned on. The file server manages file shar-11 does not kick the keyboard. To use the system, type the correct ing, system security, cooroinate password and press the Enter key. station to station communica. The " set feature" on the IBM Model The password is not displayed when tions, controls sharcable disk 30 2M allows the user to set the typed. If the password is typed i drives, printers, and other periph-date, time, internal passwords, and correctly, an OK is displayed, if the cral equipment that is connected the keyboard speed. Set date and panword is typed incorrectly, the l to the Local Area Network. time feature stores the current date password prompt with an X over it l and time in the system unit. The is displayed. If the password is not ITS NEWS Page 11 typed mrrectly after three tries, turn Rewon ll Uses bMes off the system unit, wait 5 seconds, r P and then turn it on and try again. On inspections ik Samh Lann Region H If the user forgets the power-on Tassword,it can be reset by moving a Versatile laptop computers helped comments incorporated before the umper (a circuit that allows the me to meet communication and re-team disbanded. This seemed to be user to transmit one instruction to porting requirements. compatible with both the ob}cctive another)inside the system unit-of prompt communications with in January,1988,Ilill Regan, Chief NRC management and with carly To set a power-on password: of the Human Factors Assessment notification in detail to the utility of

1. Insert the Starter Diskette into Branch, NRR, requested that EOP inadequacies.

drive A and turn on the system unit. Region 11 assist in putting together a

2. Select Set features from the main program to inspect the quality of However, from past experience we menu.

Emergency Operating Procedures realized that the handwriting of

3. Sclect Set passwortis.

(EOPs) at a sampling of the nation's many of us would seriously impair

4. Select Set pwer on password and nuclear reactor f acilities, I was our ability to review and comment follow the instructions of the screen, asked to participate. In order to cach other's inspection findings. I provide NRC management with estimated, basc4 on past experiences To change a power-on password:

timely yet accurat.: information, I with team inspections, that this suggested early in the development would take a minimum of six days of

1. Turn on the system unit.
2. When the pas' sword prompt is of the program that inspection full time effort to produce a clean

'. Jorts should be issued to the draft. The cican draft had to be a e displayed, type your current pass-beensecs. b would have the document that the team leader and word and then press the key located added advantage of instituting im-all team members approved. This almvc the right Alt key. mediate conectWe actions Ig also anticipated the full-time service

3. 'lype your new password (no more weaknesses. The problem this of a typist. It seemed apparent to than seven characters) and then created was that reports such as this me at that point the use of a laptop press the IMter key.

often take weeks or even months to computer might weil alleviate some publish. The reason for this is that of these problems. We immediately To remove a power-on password: multidisciplinary inspection teams began using one laptop, then more, I. Turn on the system unit. are pencrally composed of persons until currently, we use up to one

2. When the password prompt is from widely' separated work loca-laptop per two inspectors.

displayed, type your current pass-tions. This made it apparent that word,inen press the key located the technical content of the report As a result of this laptop computer above the right Alt, the "?/" key. needed to be written, reviewed and usage,we now are able to present to

3. Press the I?nter key.

To reset the passwotd: gj ,M ( ). Remove the system unit cover gQ4 ,r W;4 A using the information in your users i manual on " Cover Removal." 1 R

2. If an adapter is installed in the kd bottom expansion slot, temporarily m

j ji remove the adapter for casier access i i P to the password reset jumper. This

-=

b $ f'

  • is found under " Adapter Installa.

tion"in the users manaut.

3. Locate jumper on system board.

y @f rn,g

4. Follow the instructions on set W

g1 y power-on password again. If you have any questions concerning password installation for the new IBM Model 30 286, or if you have a , k. computer security question, contact k/ 4 leuis H. Grosman at 492-5019, or 7 '- g[, Dara Gordon at 492 9974. gg ) Walt Schwink, NRR, demonstrates how easy it is to slide a laptop into a briefcase and carry it wherever you go. ITS NEWS Page 12 ls L the utility personnel an oral descrip-familiar with Wordperfect. Others r tion in detailof preciselywhat the members are only familiar with N findings of the inspection are as seen DisplayWrite 2,3,4, or Wordstar. by the team. In return, this has Of course,it is necessary to arrive at .m* g[ggggg ln encouraged the utility to communi-a mmmon software earlyin the cate more freely their reaction to the course of the inspection. Even then, Computer findings, to ask for clarifications, margin problems between machines History and to note inaccuracies in the de-occur. scription. The oral description is / \\] generally of quite high quality for Use of the laptops has enabled us to two primary reasons. First, the complete all of the technical presentation can be made from a material for an inspection report, team agreed upon document which come to a team consensus, re-review Seymour Cray, innovative inventor has been thoroughly reviewed and areas if necessary and communicate of the CRAY supercomputers, has discussed by the team. Secondly, these findings and assessments to faced the issues of speed and size having the materialin hard copy the lleensec,all before the exit with technicalimagination that provides an opportunity for the meeting. This has had a very boggles the average mind. Speed team leader to discuss in detail, the positive effcet on the status of and size have always been intrinsi-precise wording of any difficult areas EOps, cally linked with the technology of ) with other regional management the moment. Faster switches, prior to the utility's presentation, microchips,and smaller and smaller 1:d&r'sNose: 7henssyrwrcasaha w mmponents packed more densely to Other benefits account for the use of o/8hc dacavadiNiisia evwimced by usas reduce the distance a signal must laptops during inspections, such as:

    • T*ia8 4*"""""in
  • mien *"va'a travel have been the name of the
  • "d vocarms =A=w em**=mt <md i

game. Unfortunatel *,such dense

1. Facilitating report compilation.

Eb""",# ""',#,7,*,"y(('#%g packing caused heatfng problems. u Arumentcua&w wp w.aandedr, A+/wi Cray solved these problems by

2. Improving the consistency of Ahm auf wapeklaa h ehe nX Nr:HT,in Creative cooling technology: first by reports, reducing the number of man *Bam baana** maufanh and haut*a suspending electronic components hours required to generate a report, in a bath ofliquid helium;later by and has enabled inspectors to Gw o/* nu*#wsns'atiedenu =*h immersing the computer circuitry in produce inspection findings in a
  • /ashwnurginchangen41<na 7hh inert fluorocarbon liquid.

clearer and more concise manner. I'd*"8 madafwa na'at a dament <= a micnunyuir **h a medrnremingw/tum Cray's single purpose in life is to

3. Enabling inspectors to carry with rackar de/auhrd m 10r ch (ric8 0Pc,4/r*

keep building the fastest computer u them a less bulky and larger amount k"wndia she <dd ermida davsl and nuwing available. He turns down many of reference material used during an 8h' da""a' m sht IN 3520 m*kh is 12 invitations to speak, refuses to talk inspection without the hardships of ri8ch (cli8' 0Pel 8<raue she sht o/shc ored to journalists,and enpapes in no transporting large volumes of paper. ch"ac'a chansa. m do

  • mayn a#*

trivialitics. His silence is character-ances 7hhrnekm can be ceily owerane by istic of his quiet reclusive manner. Not all difficulties have been ti%sa 12puchprint driwr m ahemicro-When he has something to say, he resolved with using laptop comput-r*T'a"m'd nerming*AawracAag will say it;when he has a new t crs for inspections,even after two (WwdPe/n'A computer to show the world, he will years of urage and refinement. A show it. significant number of inspectors are l'h i"v= man' 8ha'8hc damen'cnas* be 4i not facile with computer keyboards. a*w o/= hine dfarnca ("*na"vuaa This requires that those more able w $320)m shar nce m/aaNc domena provide some assistance. This As hm bren ruunhedintmha tis Nem, problem will go awayin time in the TechnicaINo'es. shar we 4/Iarnees in shrx natural course of events; at icast for 'ao nwachiar *A=w 0Pa nams m

  • Training Makes those inspectors who are willing to 45amcf 68wra8ata lhhlWa>HW People Learn put the time into training and who and Wadfalect o5a Nwk wien8ati<= **ile gg have the requisite self discipline.

8hc 5520k msd wica8cd 7har di5arnca kad e incanpatibilitin m*h mhanced &a-Some oIthe residual problems etc mm'/ca'ura mch as boldins, undalmins and gg yEy y yy more related to the machines than /<mairs 7hrtrsawagsionsecall to the operators. One minor /w adaancr and continua mpuNnh aints/w Wordperfect 5,0 problem lics at the interface be-mehshevau/ao/deunamberaren Modules 3 and 4 tween the two categories. Currently, whewrm*"vam" at the ITS Lab. we find that most team members are ITS NEWS Page 13 'b _- = _-reir NOTES E c This sect 6on of the newsletter provides

7. The screen will display 10 choices, tipo and technical informat6on of interest At the prompt: Enter number of cool day place, preferably in a floppy diskette file.

to NRC computer ueers if you have any Conversion desired quee16ons regarding 'TechNotes* or if you wish to contribute en item. contact Do not cat, drink,or smoke where the ITs support Centers: for PC and NIH Type: 1 (to select Wordperfect to microcomputers and diskelles are hems, call 492-4100 or 492-0353; tot another format) INEL. Hems, call 492 3490 and for DG being use<l. Cigarette ashes or 8 [*k*v*i$l$t n ow' 3EY d' P8. The screen willdisplay 7 choices. spilled drink could make the data At the prompt:" Enter number of unreadable. n output file format desired" Personal Computers Do not touch exposed magnetic surfaces of the diskette. Finger. lype: 1 (to select Revisabic Form. Text (IBhi DCA Format)). prints may prevent the computer inun reading the data. Wordperfect 5.0 To $$',i{\\*yp'j;"fCS> Do not leave diskettes outside of ' P Revisable form Text their protective dust covers or in a (These directions are not for dusty area. Dust can scratch the 1 c: EXIT ^ surface of the diskettes, tendering Pr ss the < ENTER > key to return them unreadabic. Net r) to Wordperfect.

1. Invoke Wordperfect.

Finally, remember that the most

2. Press the 1 I key while depressing common cause of data loss is g gggItg are accidental crasure or overwTiting by the CTRL key (CTRL + F1).

the PC user. Therefore, be sure to While floppy diskettes are a rea, sonably reliable storage medium, use write-protect tabs (self stick t OS:0 they can be damaged by careless use. tabs) that may be used to cover the Observation of a few simple precau-notch on the side of a 51/4" diskette pn mp C:] OC tions will minimize the chance of or move the write protect slot, T)ic: CONVERT damaging the data stored on your bottom left, to the open position on P h ENTER > k the 31/2" diskette. This prevents the dj3kegies, 5. e screen will disp 1ay computer from writing on disk. But Name ofinput File? Do not write on diskettes with a ball most importantly -. BACK UP YOUR DATA FILES !!!! point pen as this could scratch them 'lype: A: FILENAME. EXT and cause a loss of data. A soft tip Press the < ENTER > key, permanent pen is recommended. Where A:FILEN AME,EXTis the Do not expose diskettes to an drive (specify,if other than the de-D k'rdP n c c nt c na ct le surface of the diskettes. If the Memory in the Cray X MP was diskettes are placed under a ringing increased to 16 million words in

6. The Screen will display telephone, too close to the diskette October. Maximum process limits Name of Output File?

drives,or near an audio speaker, the have been revised upward and magnetism may crase or damage the priority levels assigned. Type: A:Fil.ENAMF.RIT data. The ITS has recently received Press the < ENTER > key. calls from users who have unfortu-Due to requests for information on nately experienced this, tape handling, the January INEL Where A: FILEN AME.RFTis the Exchange provided three pages of drive (specify,if other than the de-Do not expose diskettes to extreme how to information for users, fault drive) and the name you wish temperatures pg., leave them in a to use for the converted document, hot car, on an office wmdow sill,or Sw tching between directories? Try You should always use the.RFT on a radiator). Store diskettes in a using the commands, PUSilD and extension for the output file name. ITS NEWS Page 14 ET TECH EE NOTES .. + n. POPD as alternates to CD for UNIX MICrosoft FORTRAN may be terminated by the NRC users. computer operations contractors The Microsoft FORTRAN com-without prior or post notice to the Caution:do not create a script file piler, version 4.1 contains an editor

user, that inadvertently calls itself...it will useful for revising programs be.

multiply and cause problems like a tween compiler trials. Whenever a Users of Nill tapes should send

virus, file is edited, using this software, the them directly to NIH. Tapes must old file (same name)is stored to the be properly labelled using green A new debugger called CDBX is an subdirectory named DELETED NIH-supplied tape labels. User interactive, symbolic, source level under the current active directory.

tapes will be returned from NIH to utility to be used with a variety of The DELETED subdirectory is hid. P 634,at which time the compulcr languages and compilers. den and unknown to users unless operator there will call to notify the one reads the fine print of page 62 user of the return. The user can For more information or copics of and 111 115 in the Microsoft Editor then either pick up the tapes or ask documentation on the above items, Users Oulde. One user discovered it the operator to mail the tapes to call Emily Robinson, IRM,492-because he was having a space them. 3490. problem and used the DOS command CHKDSK/V which Ouestions regarding output distri-New Standard reveals all directories / files including bution should be directed to the op-hidden ones. The DELETED direc. crators or to the IRM HELP line. INEL has adopted Wordperfect as tory takes up a lot of space,if the Numbers to call are: the standard word processor for all user has a lot of files that he/she Phillips 492 7713 i IBM PC's at INEL Previously, they edits often. The user is allowed to OWFN 492 0885 used MULTIMATE,which was not manage these files by using com. IRM HELP 492 HELP. distributed at NRC cxcept by special mands given on pages 114115. order. (Note: this technote suggested by NilI support, call: Owen Rothberg, RES) PAL 496-5525 New Codes Available At INEL NIH BOX DEUVERY PolNT SASSYS.1 LMFBR systems analysis code, from Argonne, Output Distribution For 136 NuS-007 analyzes the behavior of the shut-NIH Computer Jobs 279 W 417 down heat removal system and a 280 MNBB,7th Floor wide range of transients. Users of the NIH Computer Center 701 P 634 should review the list of output 720 p.634 1-TRACR3D,from Los Alamos, boxes and remote job entry (RJE) 721 WFN 2 018 solves equations of transient two. locations at right to insure that phase flow and multi component reports produced at NIH will bc Rjt LOCATION transport in certain types of porous directed to the appropriate uscr R14 P-634 media. location. R33 R1 R75 R 11 DIFFUSE 83, from Sandia,calcu-Users are also reminded of the fol-R24 R lll lates one-dimensional diffusion and lowing: R74 R-IV trapping of atoms in a material R175 R IV (dialup) under certain given conditions, Remotes 14 and 276 are laser R32 RV solving the partial differential printers using small paper. Both R174 W 434 equations using the DASSL code. facilitics have line limits of 15,000 R276 WFN 2-G 18 i lines per job. Larger jobs must be R285 MNBB Basement if you are interested in using any of routed central (printed at NIH). (Ops Center) these codes, call FTS 583 9349. Jobs exceeding the remote line limit ITS NEWS Po9e 16 I ..--......--...m...., l l 1 NUCLEAR REGULAT RO YCOMMISSION l l l l l ITS SUPPORT CENTER FACluTIES TRAINING LABORATORY FACILITY l l l I* cation: 3rd Fk.or Woodmont Building g g laations: 8120 Woodmont Awoue, l Phillips Itullding, Rm P-358 One White Illnt North,3C-12 Bethesda,MD 20814 l l 7920 Norfolk Avenu:, 11555 Rockvilla Pike, l liethesda,MD 20814 Rakville,MD 20852 Phone: (I'l3) or(301)4924144 Mallatop:W 306 g l laboratory Hoora: 7:30 a m. 4:30 p.m. M F l Phemet l l (l'15)ot (301)4924160 (I'15)or (301)492 0353 Class Hears: 8:30 a.m. - 3:30 p.m. g g g g Center llomst l ~ 7.30 a.m. 4:15 p.mI M-F l %ree classrooms for formal ADP training including one equipped g g with eight IllM XTs, one with eight IBM PCs with liardcards, and l one with PS/2 Model 30 286. "Handoon" instruction in the une of l Servk m l User Aulstance (Teleplume & Walk in).I!quipment and Software micmminputers and timesharing systema. l l for Trial Use, Demomtratums, Techt ical Library, and Computer / g Wlabased Tutorials. Support Center Project Manager, Phyllis Note: %e Training Laboratory L operated by the Graduate School, USDA under contreet and managed by the Office of Penonnel, to l l Smith; AMCl Project Manager, Derrkk Schreiner. g provide training in end user computing for the NRC statt Technical l guidance is prtwided by IRM. NRC Project Manager, Carolyn g l Bassin; OS/VSDA Training Manager, Kathy Beckman. l l l l NRC END-USER COMPUTING SERVICES DIRECTORY l l l l l l g liardswre AcquhltionTpgrade and Softeare Acquisittent Data General and INEL User S.pport: g Uppeade Dawn Oliver, P-530,4924219 Pat Bell,3C 16,492-3491 l Emily Robinson,3C 14,492 3490 l l liardware Imtallation, Reh. cation and Maintenance: l SIN C llotline: 4924222 g. Microcomputer Maws: Karen VanDuser, P 500,492 8310 g Word processon: Bcth DeWoody.P 500,4924832 NUDOCS tlotline: 492 8603 l l Other ADP liquipment: Beth DeWoody,P 500,4924832 l Saltwere Installation: Jennifer Talbert, P 500,4924317 Data General Systerns Problenu: g M.intainence: Yolanda Stokes,P.500,492 4572 Judy Secherman, P412,492 9687 g l 8 'ADP Coordinators must Initiate this action. g Computer Room: Phillips 492 7713 l White 11 int 492-0885 T.nectronic Records Support: l g l Computer Securllyt Louis Grosman, MNilll-8720,492 5019 l l Graphics Support: Janet Dot %ompson,20 40,492 0215 g Data Communkatiom Prohkms. Modems and Data Lines: lirian Brownell, P.500,492 7927 Commercial Database Support: Eileen Chen,160,4924501 l l g Modem and Data 1.ine Acquisillon: Scientific Code Distribution.NFSC: Pat Bell,3C 16,492 "L491 g Stan Wood, P426,402 7723 Shared Information Network (SINIT) Development: l Timesharing AeteAIDs: Ilerb Parcover, MNB114720,4924699 Dick llartfield, P 712,4924328 l l l User Support for liardware/Sorteare (PC & N111): Systems Developmect and Modification: l I'15 Support Center, Philhps Bldg., P 358,4924160 Bill Usilton, P-712,4924322 l One White Ilint North,3C 12,492 0353 l Scheduling for ITS Training 1mbointory g g Kathy Beckman,W 306,4924744 -l l n.- s .a