ML20050A645

From kanterella
Jump to navigation Jump to search
Summarizes 810508 Insp Tour of Nih Computer Tape Library Facility
ML20050A645
Person / Time
Issue date: 05/14/1981
From: Consoli A
NRC OFFICE OF ADMINISTRATION (ADM)
To: Anne Frost
NRC OFFICE OF ADMINISTRATION (ADM)
Shared Package
ML20050A634 List:
References
FOIA-81-409 NUDOCS 8204010532
Download: ML20050A645 (2)


Text

-

vr m+

%W

~

,e g=

  • tog UfJITED STATES o

!\\

. 4,%

NUCLEAR REGULATORY COMMISSION f.

,i W A$m NGT O N. D. C. 20L55 Ik '.... /

8 May 14, 1981 MEMORANDUM FOR: Asa R. Frost, Jr., Chief, MSB/ADPS THRU:

Virgil H. Curry, MSB/ADPS /

FROM:

Armand Consoli, MSB/ADPS

SUBJECT:

E %.JATION OF THE filH TAPE LIBRARY FACILITY d

An inspection tour for purposes of evaluating the filH Computer Tape Library facility was made on Friday, May 8, 1981.

The tour was conducted by f1RC atter..ees Mr. Joseph flaughton, Chief of the Computer Center operations.

were B. Badini, J. Burton, K. Shields, and A. Consoli of MPA and B. Brown of Security Division.

The tape library, used to store approximately 70 thousand computer tape reels, is located within the same room as the computers.

There are at least one thousand telephone lines that terminate in the computer facility, most are for dial-up terminals, and some are dedicated lines for other terminals (directly connected). There are approximately one thousand active users on-line at any given time, out of a total of eight thousand registered users.

There is no "off-site" storage location currently used to store "back-up" tapes and disk packs on a frequent basis (e.g. Once a week).

Every six months filH does send tape copies of the systems software to another location off-site, to meet the requirement for an off-site storage facility in the event of a disaster.

There are no automatic fire suppressant systems such as sprinklers, Halon or Carbon Dioxide types installed anywhere within the computer facility.

Mr. Haughton states that since the fire department is located in the same building as the computers, there is ample protection available.

Smoke and heat detectors are located throughout the facility and their locations are identified by colored symbols on the ceiling.

Only authorized personnel with proper identification badges are permitted

-access to the computer facility and operations center.

NIH has a reciprical agreement, at least "on paper" with the Parklawn Computer Facility of the Health and Human Services Department. The agreement is to r

However, provide the backup capability for about 40 percent of the NIH systems.

neither agency has actually made ' test runs" to determine the systems compatabil-ity and suitability for backup purposes and whether any modifications are needed, j

f illH routinely makes backup copies of the "Public" Disk Packs every Tuesday and l

g4 32 011204 l

SHEARER 81-409 PDR

i

.. ~,

4

.Asa R. frost, Jr. May 14, 1981 Thursday, onto tapes which are stored on-site in the Computer Center Tape Library.

j ADPS/NRC takes backup copies of program libraries of existing systems on a regularly scheduled basis. The copy tapes are stored on-site within the same 4

tape facility.

Mr. Haughton's philosophy is that the user is the one to determine the priority of his systems and which are absolutely essential.

It is up to the user manage-ment as to whether or not provisions and precautions should be taken to provide needed backup, and not NIH's responsibility.

4 An " access control" system is being installed in the computer center to restrict access to the output distribution boxes in which work for the user is placed for pick up.

This system will provide a closed storage area for each user protected by a door which slides open upon the insertion of a magnetic card into a slot provided for this purpose.

IBM Mass Storage Devices, IBM Tape Cartridge Systems Model Number 3850 are being phased in,to replace the number of computer tape reels; in use and also reduce the tape handling required during regular operation.

i l

There are no special provisions made to provide for security and privacy pro-i tection of the data, other than the protection provided by passwords and software.

within the operating system.

No contingency plans have been established as yet, nor are any planned for the 4

i future.

i 7MCY Armand Consoli, MSB/ADPS 4

1

'1 J

t a

i r

,~

- _, _ ~