ML20079R814

From kanterella
Jump to navigation Jump to search
ITS News.Winter 1994.Volume 9,Number 2
ML20079R814
Person / Time
Issue date: 02/01/1994
From:
NRC OFFICE OF INFORMATION RESOURCES MANAGEMENT (IRM)
To:
References
NUREG-BR-0056, NUREG-BR-0056-V09-N2, NUREG-BR-56, NUREG-BR-56-V9-N2, NUDOCS 9402150227
Download: ML20079R814 (12)


Text

{{#Wiki_filter:- - - - - - - - - E musumusumus - WINTER 1994 h~ M M Vol. 9, No.2 y NUREG/BR-0056 M W Information Technology /'* h U.S. Nuclear Office of Information Services Training Laboratory [ Regulatory Resources Management i Onice f Personnel Commission i i a j The New IRM Customer Su3 port Center j By Debbie Runion. IRM y Several years ago, the NRC had one ,. ~* Orfice ofInforn.aon Resources 4 l Management (IRM) hotline to provide i operational support for the IRM f,'y ~~ y" 4 computer and information resources /, f environment. This hotline provided operational support to the agency and j s helped resolve microcomputer, R 7. f' telecommunications, and application [ questions and prob l ems. Havir.g this V (- one hotline to provide support was 3 1 O 1' l sufficient when the agency only had a 4. i few computers, and did not have the ~" ~ l complex information resources [ z. .q.g, environment to support as it has today. e: - W 7 7 There was a time when the IRM hotline w~ received only ten calls a day for service and there was no need for a sophisticated centralized tracking Pictured from left to right in the front row are the IRM CSC staff members: system to document problems and to Chuck Fitzgerald, Jim Schaeffer, Debby Jonas, Marty Kerrigan, and Gerald j l ensure problem resolution. At that Cranford. Back row,left to right are: Moe Levin, Jim Shields, Mike l time, providing support wasn't Deleonibus, Mike llutchenson, Jim Schessler, and Debbie Runion. difficult; however, things began to change. In the early days, most of us at the systems in order to provide support. agency were using the IBM 5520 for Providing support to this environment word processing and became increasingly complex. As a c mmunicati ns. Thue wm no result of the rapid growth in technology i Toprovideimproved q local or wide area networks, and very and the evolution of the local and wide serviec, tre at IRM knelf few specialized applications. As area networks, as well as the ice had to make changes technological enhanu ments grew development of specialized software "EY*# " A' in the IVu}' SVe Svere mformation resources environment one agency hotline to multiple hotlines. 4 providingservice. In also grew, and the level of effort ocecinber oftastyear, ice required to support it changed To meet the increasing demand for dramatically. This ever changing support, mdividual IRM support groups began to develop a strateAy environment began to consist of a started their own hotlines to support to irnprore custorner myriad of hardware and software each unique environment. Each group j serriCC. components which required an indepth knowledge of numerous (Continued on Page 2, " Support") 9402150227 940201 PDR NUREO BR-005b'R PDR

(" Support" Continuedfrom page 1) customer satisfaction, We knew that we needed to focus our limited began to utilize its own tracking res urces on providing improved THE ISSUE AT HAND system. Although each of the support service, and not on having personnel The New IRM Customer Suppon Center... I groups worked very hard to support m each IRM mpport group expending g wg pggg its agency users, the complexity and rn uren answering mu@ va u increasing diverse environment made hotlines. Services must and could be A Whole New Apprtsch to Editing.. .3 consolidated' it more difficult to proside such Protect Your Personal Computer from service. Many users were confused As a result ofour study, an approach U""*'n ed Users.. .5 about which hotline to call for was developed for improving Maintam g Secunty While Processing service. The level of coordination to customer service. Multiple hotlines Unct ss fied Safeguards infonnanon using resolve problems became were to be consolidated and a single W reperfxt. .5 increasingly difficult with the advent point ofcontact provided for the INEL Tech Notes.. .6 of these multiple hotlines, each with customer. We wanted to provide "a NIH C mpoier Secunty Urgraded. 6 its unique tracking system. As a one-stop-shop" concept, and to utilize Color Them "Govemment Green" .7 result, customer sen ice was not a centralized service request tracking Ihnid:ng a Case for Backmg Up Your Data 8 l always prompt. system to document service calls, and

  • h*" Y " D ""* d
  • 0-

~9 To provide improved service, we at coordinate problem resolution among Recogning AcNesement _ . 10 IRM knew we had to make changes the IRM support grogs. N'* L'h'*TY B '8 - II I in the way we were providing service. In September of this year, a contract Pmtect Sensitive Data on the Autostan.. I1 The torus Connection.. . Il in December oflast year, we began to was awarded to Global Management develop a strategy to improve Systems Inc., and I-Net, Inc., to customer senice. Fir:t, we looked at estabUsh an IRM Customer Support i our own environment to determine Center (CSC). On November 1,1993, what services were required to the CSC began operations. The CSC l enhance support and improve senice. serves as the SINC..E POINT OF We solicited recommendations from CONTACT 10 assist you in resolving l our customers, and from our staff-all your computer, ITS NEWS CREDITS We determined that we needed to telecommunications, network, improve our response time and minicomputer, mainframe, i communications with our customers application, and other IRM-related The ITS NEWS is a pubhcation providing l in order to resolve problems quickly informanon ofinterest to users ofcomputer and efficiently, and to ensure (Continuedon Page 3. " Support") technology at the NRC. It is produced by the stafTof the NRC information Technology Services Traming Laboratory l in conjuncton with the NRC's Office of Persmnel. We welcome questions and comments and articles Old Support Numhers Your One-stop. Help Sourts Please contact the iTS starrby: ) Phone:492-8699 Mau Hn Perse: MNano2 492-4357 (PC Help) Herben Parcover,IRM 492-4160 (IRM) Executive Editor (301) 492-1234 Graduate School.'USDA 492-4222 (SDB) Publication Coordinat;orr Alvin Blunt, IRM 492-4666 (Telecom) Design Consultation g) Inustrations and Concepts by NRC Automated Graphn Services Section 504-2353 (PC 1lelp OWFN) C ntnbutors to regular items are: M. Ikilmes, W. Maden. E Robinxm, P. Smith, C. MemII. } ITS NEWS page 2

=. 1~3"e" ~ co""""'"/"" '" Macros inWord Perfect 6.0: t support questions and problems. You win no ionger have to ngure out AWhole New Approach to Ed..iting which hotline to call for service 1 by John N. Ridgely, RES You will now have only ONE phone 4 i number to call. The following IRM There are many changes between difficult. To enter a command or I "hotlines" were consolidated: Word Perfect 5.x and Word Perfect text, insert a new line and enter the 492-8867 (AUTOS) 6.0. Many of these changes are command. The note in 5.x to bring 492-4357 (PC Help) p sitive, but some are negative. For up the command list (Ctrl-PgUp) 492-4160 (lRM) example, the keyboards that were does not appear anywhere on the 492-4222 (SDB) created in 5.x will not work with 6.0, screen or in the Help facility, but it is 492-4666 (Telecom) neither can they be converted with still there. After selecting a 492-8603 (NUDOCS) the Macro Convert utility command, if additional information is 504-2353 (PC Help OWFN) (MCV.EXE). To move the keyboard needed you are immediately placed over to 6.0, each of the macros must into the edit line to input the The CSC serves as the primary customer interface for first-line nformation (an example follows). problem analysis, problem resolution, After completing the changes, referral, follow-up, status monitoring, " nsert" the command. If you are Many 0[these changes are famiiiar with the command syntax. and verification of problem resolution with the customer. In addition, a Posit &c, but Some are vou can enter the command one character at a time. (Remember m centralized service ticket tracking negaln e. 5.x if you did this the resuit wouid be i system is utilized to record and track your prnblems to ensure they are text and not recognized as a resolved quickly and efficiently. We command.) For exampic,if you want anticipate that the CSC will process a hard retum, you would type be saved out of the keyboard, "HardReturn" (without the quotation over 2,000 service calls per month. converted to the 6_0 format, and marks). Make are that each I The CSC staff, located in P-370, can retrieved in a new keyboard. That is command or action is on a separate l be contacted by calling n t too bad, but wait, there is more. line! Some of the macros will not convert! (301)492-1234 The only choice is to recreate those Not all commands in 6.0 require the Monday through Friday between 6:30 cms in 6.0 and then retrieve them same syntax as was used in 5.x. For a.m. and 6 p.m. You may als into the new keyboard. example,if you wanted to type Dear contact the CSC staff by E-mail Fred:" in 5.x, that is exactly what you in Word Perfect 5.x, the macros would type (without the quotation directed to "CSC." a could be edited in the " macro editor." marks). In 6.0 you would type: This editor displayed a small window " Type ("

Dear Fred:

")"(u1111 the " where the macro was displayed and style quotation marks). Now let's say you could insert macro commands that you want the program to pause ] from a pop--up menu activated by and let you enter the name. In 5.x the Ctrl-PgUp keys or using the you would type: Ctrl-V sequence. Each line ~ UNIX ~ represented a iine of actions to be oear <sT^TUS PROMPTIEnter i taken by the macro in a document addressee's Name-{ PAUSE }: Training (i.e. ended with an { Enter}) or { Enter) i Coming SOOn wrapped to the next line based on the lf you were to edit the macro and to the ITS Lab! )th n t$e box' 6.0 EXACTLY as provided, the Enter Word Perfect 6.0. Recording a macro would end up looking like this: Watch for macro is the same as in 5.x. Editing ann 0llncementS. the macro however. is 9uite difficuit. Type (" Dear STATUSPROMPT The macro is edited m a document (En,e, address,s Name) -) PAUSE format. Each action is on a separate line; which can make reading a line of text with embedded commands (Conunued on page 4. " Macros" ITS NEWS Page 3

4 7 (" Macros" contmuedfrom page 3) as follows. I NRC AIUG i Type (" Dear ") By Les Lancaster, RES llardRetum STATUSPROMPT(" Enter Since April 1993, the NRC Artificial Iw_c errors have been committed. addressee's Name") Intelligence User Group (AIUG) has First the first line contains Lhren actions. It should be written as DI*Io,, been meeting every second Tuesday at the NRC One White Flint North follows: PAUSE building. The members collect a brief Type (" Dear ") HardReturn summary ofeach meeting and combine them in a single PC file. During these STATUSPROMPT(Enter addressee's Nowhere could I Snd this meetings we have discussed various Al Name) documented. There may be other topics such as virtual reality, NRC Al commands that also require the training, the Inference Corporation's Type (,,,) quotation marks. case-based reasoning development tool, PAUSE The key may be if the macro will not expert systems, the IT Strategic Plan HardReturn compile but results in the error (including lively discussions by Ray ")cxpected" and with the selection of lloffmann and Louise WolfTofIRM/ s The second error, which prompted the edit key leaves you m the middle SPTAS), and the AIUG Action Plan. In this article m the first place, is an of the field; try placing quotation keeping with the Action Plan, we are undocumented " feature.' Word marks around the text. choosing a simple NRC pilot project to Perfect 6.0 allows two difTerent demonstrate an expert system types of arguments for the One of the macros in 5.x set up the application. STATUSPROMPT command. There document for labels (LABEL. WPM). is the variable and text arguments. In 6.0, this is completely done If you would like tojoin AIUG, or Simply put, the macro insert menu without the use of a macro, in learn more about AIUG, obtain rne. (Ctrl-PgUp) defaults to assuming addition, existing label definitions information, or ask any questio :s, that the argument is a variable. Text can be edited, copied, and new ones please call Les Lancaster on (301) arguments Ic11girs quotation marks, added. This is one of the many great 492-3969. m r enhancements in version 6.0! a PROTECT FROM MISUSE, MODIFICATION OR LOSS P h ' C v% n,,_,, lNA! ou Are The O Y l l Key To are ha att my - l,

  • NRC Computer data gone* I orby Security have bia% pages!

Q,*h Did someone get m*: C my fJes) m Y~ 1,f 12= = ml5} l ~ E . se,3 4 m pg. ~~ g%, - .-n

%m.
  • l i) l^-

l %3c - ff w m =, x / f _/ ly ~ +. ' y e._ r, - - g ~J;, ~~ 'l l I t N_ N_ / ,$Y ' }%gh G /-,

  • g "Y

g ss.Q h f ITS NEWS Page 4 ~

ProtectYour Personal Computer From Maintaining Security Unauthorized Users While Processing By Louis H. Grosman, IRM Safeguards Are you concerned about system or power-on password unauthorized individuals using your prevents unauthorized individuals Information Using personal computer (PC) after you from usmg your system. have lef1 for the day or over the Wordperfect weekend? PC users have reported The other password option usually findmg files on their PCs unrelated to available is the keyboard password. By Louis H. Grosman, IRM This feature allows YOU to lock and work, indicating that unauthorized individuals apparently used the unlock-your keyboard without turn-NRC policy (NUREG/BR-0168) machines for personal purposes. ing off your system. If you lock the stipulates the use of removable media keyboard you can leave your system (diskette or Bernoulli box) when This problem can be easily remedied unattended while it is powered on and processing Unclassified Safeguards by using the password options still protect it from unauthorized use. Inforrnation (SGI). available on the newer PCs (such as the NEC PowerMate) at the NRC. To determine if these features are When processing SGI, save the SGI Many of the newer PC systems available for your PC, and how to use file often and only to removable j support a " System Password" them, refer to the PC User's Guide media (diskette or Bernoulli box), (power-on) and a " Keyboard that came with your system. never to a fixed disk. Change the Password." Remember, always log off and location of the Wordperfect (WP) backup your PC when not in use, backup file with the Location of Files The system or power-on password especially at the end of the business feature < Shift-F1,6> from the fixed protects your data by allowing your day. disk to the directory of the removable system to boot only after YOU enter a password. After you set your initial If you have any questions concerning 1 password, a password prompt appears this subject or any other computer each time you power-on your system. secunty matter, contact Louis H. TheseprecautionsS/rouldbe if the password is entered incorrectly, Gmsman at (301)492 5019. se unplententedas 500H as your system does not boot. Setting a possible. } media that you are using to procers and store the SGI data. ( 3 If you are processing SGI using Wordperfect (WP), you will need to g specify a special DOS command line i switch when starting WP. This I switch will ensure that any overflow t files created by WP are placed on the ]4 removable media with your document instead of being placed in the WP directory on the j J microcomputer's fixed disk. The l general format for this DOS command line switch is /d-j I drive \\ directory. Assuming that the removable media is in the "A:" drive and WP is installed in the directory 6-j (Continued on Page 6. "Secunty") ~ ITS NEWS Page 5

rsecuriry continuesicompage3>

g3gg, 49 9 "C:\\wp51," start WP with the path Emily Robinson,1RAI Security Upgraded statement switch and the oserflow drive switch directing the system to New Software ByHerbert Af Parcover,IRAf use the removable media:

INEL Software support (208-526-Effective January 241994, all users c:\\wp51\\wp /ps=a:\\ /d-a:\\ 9340) can assist users in obtaining of the NationalInstitutes of Health and or accessing new software (NIH) Computer Center are now To verify that this procedure is packages. New software which may registered automatically to the implemented correctly, you will see be ofinterest to NRC users: Resource Access Control Facility on the WP opening screen " Note: WP (RACF). If your initialis already system is using A:\\." The overflow CCC-617/QBF-simulates radiation registered to RACF, your password files can be recognized by the dose rates around a vehicle or ship will not change. If you are not extension TVI and TV2. WP erases that is loading containers of radiation registered to RACF, your password the overflow files when you quit the sources. will be set to your current keyword. program normally. However, the file CCC-586/REPRisK - models contents remain on the hard disk,in What does this mean to the average the erased file space, until that space transport of radionuclides from NIH computer user? You will have is reallocated and can be easily up sitory thmugh the environment to the ability to expand your RACF retrieved by anyone familiar with the exp sedhumanpopulanons. " password" from the 3 characters in DOS UNDELETE command. If WP TOOLPACKl - software tools for y ur curren eyw up to 8 is not terminated normally,if the FORTRAN 77. " "#"' tem h mosdmponandy, machine locks up, or power is lost, you wd. l have to change your the overflow files remain intact on Simplify File Ddumps " password" every 6 months. Ifyou the hard disk until WP is restarted. are one of the very few who currently The CRAY provides a utility called have the same initial with different These precautions should be "udmp"which simplifies file account numbers (WDCl, WDC2), implement-ed as soon as possible. If migration from disk to magnetic tape. you will be assigned a single RACF you find that you need help in doing so, It can also be used to recover files password for all ofyour initial / contact the IRM Customer Support from tapes written via the old account combinations. Center at(30l) 492-1234, or E-mail "tbackup" utility. "CSC" to request assistance a, Programmers should change to this necessary a An updated UNICOs 6.0 file system RACF environment. Users who has been installed on the CRAY and submit JCL that is stored in online will reduce time needed for file data sets need to make changes. Data system operations. sets should be RACF-protected with a Universal Access (UACC)on NONE, New! Renew Accounts j b statemems should specify Project rather than User, ittals, and every m HdOWS Be sure to renew your INEL account data set containing JCL should be promptly when you receive your identified before action is taken. Advanced nyou have aer seesees,picase contact Herbert WSe -Q M. Parcover at ]gy 1g (301) 492-8699.m This new course begins ~ ~S 3 February 25th. gg % m,3u gr/_,f j km. Call theITS lab to book your seat. Tr (Using Windows 3.1 is [ ) J er t the prerequisite) ITS training ITs NEWS Page 6

",m=- TRAINING .E nar LAB NEWS ColorThem " Government Green" The Environmental Protection standards for printers are set based on guidelines effective October 1993. Agency (EPA) has fostered the printer speed. Printers with speeds of Because the US Govemment is the concept of energy-saving computers 8-14 pages per minute, for instance, largest buyer of computer equipment capable of saving up to 75 percent of are required to enter the low-power in the world, President Clinton's their energy use - the so-called state of 30 less watts of power when Executive Order will accelerate the " green machines." Brian Johnson, an inactive for 30 minutes. trend to energy-efficient, EPA employee, was directed to environmentally responsible conduct a study to determine the Many companies expect to convert computers. By the year 2000, these amount of energy PCs actually used. most of their product lines and " green machines" will save 26 billion The results astounded everyone at qualify for the Energy Star log kilowatt-hours of electricity annually, EPA. The researchers found that vcithin the next couple of years - at no enough electricity to power Maine, office equipment is the fastest additional cost to consumers. Under New Hampshire, and Vermont, save growing consumer of electricity in the Energy 5+ar program, EPA ratepayers nearly 52 billion in annual the commercial sector. Computer promotes the energy efficiency of electncity bills, eliminate the need for systems alone consume as much as 5 these products, permits the Energy ten coal fired power plants, reduce percent of all commercial electncity. Star logo to be displayed on the emissions of the primary greenhouse Furthennore, that figure is expected products, and provides pubhc gas, carbon dioxide, by 20 million to double in the next seven years. recognition of public sersice for tons, the equivalent of 5 million corporate partners m Energy Star. automobiles, and reduce emissions of Since manufacturers were already EPA does not endorse any particular 140,000 tons of sulfur dioxide and handling power consumption company or its products. 75,000 tons of nitrogen oxides, the problems with power-down technology on battery-operated Mandatory Compliance by two pollutants most responsible for acid rain. laptops, Johnson reasoned that EPA Agencies Ordered could and should convince Under Presidential Executive Order Effective October 1993, "all agencies manufacturers to apply those same 12845 published in the Federal must be in compliance with the techniques to desktop models. EPA Remter on April 23,1993, all President's Directive provided that did, of course, blitzing manufacturers government agencies are directed to Energy Star units are commercially with information on energy savings, purchase only PCs, monitors, and available and meet the agencies' c avincing them to build energy-printers that comply with Energy Star performance needs. a efficient systems capable of entering a low-power state when the unit is inactive. In the process EPA's Energy Star program was born. Over 170 U.S. computer companies, accounting for 70 percent of U.S. sales of desktop computers, and 90 percent of the laser printer market, are now participating in EPA's Energy Star Program and building systems that meet the EPA's standards for energy-reduction. Those standards require that monitors and CPUs must be able to power down to no more than 30 watts of EPA POLLUTION PREVENTER power when they are not in use. The ITS NEWS Page 7

Building a Case for Backing UpYour Data Who among us has not heard the would take 16:06 minutes to format. Two new features give you waming: Back up your hard disk! complete. (In reality,it took 17:34 alternative choices for appending to Only when the realization ofloss hits, minutes because a phone call your backup without having to nm do the dire consequer ces of not interrupted the diskette exchange-the full backup all over again. having done this simple house-The clock keeps ticking whether you cleaning chore come crashing into are actually participating in the From Backup Type, select focus. process or out to lunch.) Because the Differential Backup to collect a backup is compressed (unless you backup of all files that are new or ^ If you are feeling confident because change the default to non-altered since the date of the full the network backs up files every compressed), the backup uses fewer backup. A Differential Backup will night, be forewarned. The network diskettes, too. During backup, on always refer back to the last FULL only backs up the network data, not screen feedback gives you the backup anJ will write files dated your personal C drive. You can lose estimated time, number of Gles, and from that time forward to the backup data from hardware failure. Hard ratio of compression. disk. You do not need to keep old drives do crash - even yours! differential Gles. Each time a new ,7 j Using the Backup command has differential file is written, it makes Further causes for concern always presided the advantages of the pres ious version somewhat quicker copying, copying large files redundant. When the size of your You can accidentally overwrite at 9 n mu , and selective differential file begins to get large, i important files that required hours of "I' ^ you will want to run a full backup hard work to produce, it is possible y u enj y all thow benefits plus data again to replace the current backup i when in Wordperfect to overwrite a compressmn and speed of file by naming a new document a gie name you have already used on incremental Backups will backup all another file. When prompted Making it Happen new and revised materials from the "Replacefilename? (Y/N)", you date of the full backup the first time it answer yes without thinking because Having established how easily and b Th% h di Mg you are so used to saying yes to cf fective a full backup can be under a from the date of the int " replace." this newl program, there still remams incicmentalbackup. This type of the discipline to perform a backup on "E '* " # An even casier way to overwrite a a regular basis In past versions of files all the time and you need to see file: Use the Copy or XCopy DOS, you could " append" to a u hat a document s contents were command at the DOS prompt. DOS backup to have it include files created eme e neremental will copy files from one place t or changed since the last backup by backups build on each other. another, overwriting files of the same adding parameters (la /d:date of last name without even giving a warning backupt With MSBACKUP, having How Does MSBACKUP that the file is about to be replaced. chosen to run a full backup, you will Know What,s NewlEdited? i At least Wordperfect wams you! want to add new data to the infonnation aheady saved in backup Each time MSBACKUP runs, it DOS 6.0 to the writes a file called a catalog that Rescue! stores the backed-up disk's structure: Now there is a cure for backup the names, sizes and attributes of the directories and fic!ds that were apathy, anu cause to celebrate, selected, the total number of files, the because DOS 6.0's new MSBACKUP command may just total size of the backup, the name of entice you to reconsider and employ the setup file that was used to select the drives and files good PC backup habits. The to be backed, and j MSBACKUP utility comes with new the date the graphical screens, easy to select menu l backup was made. MSBACKUP choices, and speed you wouldn't believe possible. On a 486 class PC, gives the catalog a unique name

  • I during an actual backup, the program that helps you identify the backup's estimated a full backup of 129 MB of

[ contents. data on a 200 MB hard drive (616 files) from the C drive to the A dris e, (Conunued on page 10. "Backsp ") ITS NEWS Page 8

DOSFundamentals provides tiles, when to use the P drive (" Backup"Continuedfrompage 9) instructions in backing up files and when to use S & Riit also Say on September 30,1993, a full using copy and xcepy commands teaches LAN access to all backup was run twice on the C and (See sidebar for XCOPY drives; and explains how the D drives. Could you decode the instructions) AUTOS Network Control Using Your AUTOSIANwill help Center backs up data. following file name? e you understand differences in the . AUTOS & WP OFF/CE: Saving/ CD30930B.FUL LAN disk structure including - archiving messages and default! where to save sensitive material, appropriate Aiccs for thesc . The first two letters describe the where and when to save group activities a drives backed up in this set. (If only one drive was backed up, the first two letters would be the [ same. i.e., CC.) WhenYou Don't have DOS 6.0... . The next five digits are the date: last digit of year, two digits of If you don't use DOS 6.0, there are several other means of backing up files, month, two digits of day of the And, please do plan on backing up on a regular basis. month. j . The 8th letter counts the number XCOPY is one effective method. It allows the copying of files that have 1 of backups run in a day. In this been written to disk since the last copy, and those written to disk on or after case, two backups w cre run, a specified date. It is not as powerful as MSBACKUP and is best used hence "B." when you want to copy subdirectories that occupy less then the space available on your diskette. The extension clearly states the fun XCOPY/M backup; otherwise the extension would be either dif orinc. The switch /M copies is similar to the incremental Backup feature. It copies source 9es that have not been backed up since they were modified. The catalog file is stored on the The next time the command is used, those files will not be copied unless defaalt drive of your hard disk, they have been modified. ready for use the next time you run a backup or require a lost or XCOPY /D:date corrupted Die be restored. The switch /D, followed by a colon and date,looks at the date stamp DOS To Learn More gives a tile when it is written to disk (saved, not copied or moved), and For additionalinformation on DOS copies files dated on or af ter the specified date. The format for date 6.0 and MSBACKUP, including depends on the country setting. The US setting is mm/dd'yy. how to restore backed up files, attend the DOS Advanced XCOPY sourceIdestination]l/MllD:dateJ Commands class offered at the ITS /M Training Lab. DOS Fundamentals copies source files with archive attribute, then sets it off and some experience with DO3 is /D:date copies files written to disk on er after supplied date I These switches may be used in addition to /S, w hich copies subdirectories necessary for this class. and the files in them, and /E which copies empty subdirectories. Ifyou do not have DOS 6.0, you EXAMPLES: need to know more about alternative means of backing up XCOPY A: B: /S /E your data. All the following classes will help, au protect your important Copies all the files and subdirectories (including any cmpty subdirectories) work: from the disk in drive A to the disk in drive B:

  • Files a pocument uanagement XCOPY A: B: /D:01/18/93 /S teaches how to backup all your data (notjust your Wordperfect In this example, only files on the disk in drive A that were written on or documents) using the after 01/18/93 are copied to the disk in drive B. All files from A: will be j

Wordperfect List function. You copied, including those in subdirectories. The subdirectories will be will learn how to copy, rename, created on B: if they don't already exist. j move, and delete files. j ITS NEWS Page 9

RecognizingAchievement The full suite of Wordperfect [ / courses presented at the ITS Training Laboratory cos ers just 1B O/lO/d O 4 about every function and feature in the Wordperfect, version 5.1, program. Our objective in We are pleased to acknowledge g, those NRC employees who have presenting this series of Wordperfect succeeded and received the ITS courses is to encourage mastery of the advanced features of Wordperfect Training Laboratory's Wordperfect Certificate of Achievement to date, y Those features give the user a real l advantage in the work place as he or she moves quickly and effortlessly ) through tasks, and develops effective, creative, attractive documents. Francine Randolph(2/2/93) Unte Cheh (07/22/93) Beyond the Basics and Intermediate Kim Lee (2/2/93) Sophia Mickens (07/23/93) courses, some 70 specific subjects arc ) addressed in the advanced courses. Dianna Papini(3/18/93) Tillie Maria Welch (07/23/93) Taken together they represent 33 hours of instruction. If you take to Theresa M. Mayberry(3/l8/93) Lotte Mechner(07/27/93) heart the ITS Training Lab recommendation and practice using Ardenia Lewis (3/29/93) Lisa Berlinger-Koenick(08/12/93) the new features, add at Icast another two hours of practice for every hour John Ridgely(4/27/93) Rose Zotto(09/09/93) ofinstruction. E Given the amount of time and efTort necessary to master all of the skills Lois Showkeir(5/10/93) Karen B. Jackson (10/06/93) presented in the advanced Wordperfect classes, it is appropriate Connie Kendrick (05/12/93) Annie Bennette (10/25/93) that the ITS Training Lab recognize those who have completed all th Patricia Wilson (05/27/93) Betty Doutt (11/03/93) Wordperfect courses. Thomas Murphy (05/27/93) Linda Mitchell(11/09/93) The following rules govern the G. Paul Bollwerk (05/27/93) Edythe L, Becker(11/23/93) Certificate of Achiesement Program:

1. All participants must have completed Wordperfect: The Basics Sandra Franklin (06/22/93)

Deloris Lewis (12/03/93) and WordPerfectintermediate They are prerequisites for advanced Linda Lewis (06/23/93) Noble Green (12/22/93) training. Lee Berry (06/30/93) Robert Pettis(01/06/94)

2. It is the responsibility of the person taking the courses to notify the ITS Thomas Dunning (07/06/93)

Elaine Raphael (01/06/94) Lah of completion of all courses. The ITS Training Lab will confirm the Theresa Botkin (07/15/93) Mary L. Tenaglia (01/11/94) completion when the certificate is requested. Wendy D'Souza(07/21/93) Your name goes here!

3. No advanced classes may be j

waived and all prerequisites for ] (Continued on page 11, (Achievement ") ITS NEWS Page 10 bl mis

l Ach '""'#"'" ' """""dI" a r

  • The Lotus Connection courses must be honored.

Participants must preregister and complete alllisted classes. It was through complete frustration I've told my story, ifyou have a

4. This program does not give that the idea of a LOTUS Users' problem printing in LOTUS, you'll at continuing education credits (CEUs).

Group was born. I'd print my least have a starting point for where spreadsheets, and watch in horror as to look for the problem. That's the

5. There is no particular order in one printed on top of the other. I was idea behind the LOTUS Users Group.

which the courses must be taken convinced that little gremlins attacked We share information, tips, and tricks. except where a prerequisite exists. my printer! I checked with the ITS We learn from each other in a relaxed Courses that must be completed t hotline. Their suggestion was to atmosphere conducive to learning. achieve the Certificate of " after I pressed "go." It Achievement: Taming The Laserjet didn't work. The LAN folks tried, So comejoin us if you're interested but to no avail. in sharing information and learning Printer, IVorking Smarter IVith Large more about setup strings, how to Documents. Parts land ll AterginE Now this was ridiculous! My import a LOTUS spreadsheet into a For OJ/ ice Productivio, Making Four spreadsheets printed ok before we got Wordperfect document, or any other Point IVith Graphics. File & our new printer. I asked myself, LOTUS topic you'd like to discuss. Document Management.. Columns & "what's wrong with this picture? The LOTUS Users' Group meets Tables,iVordPerfect Tables & Something about the new printer, twice monthly, once in Bethesda, and Spreadsheets, and IVordPerfect perhaps? Yes,it is the setup string!" once in White Flint. Please callllyne Macros. Extra credit option: I checked my printer's manual, Miller (492-7295) or send an e-mail Working Smarter ifith legal looked at the setup strings in my to "lSM" for more information. Documents. spreadsheets, and found that what worked for the old printer did not The user groups, whetherfor LOTUS Contact the ITS Training Lab at work with the new printer. I changed or Wordperfect. are not intended to 492-4744 for additional the setup string and haven't had a take the place ofthe classes offered at information. problem since. the US Training Laboratory. Lotus classes are offered which address The point of this confession is that we many of theproblems Lotus users all learn in different ways. Now that experience. Communication gums will be I interested in the following new books available from the NRC Main Library. Protect Sensitive f 3 "A Guide to the TCP/IP Protocol Data on the Autos / HELP!!!!! Suite"by Wilder, Artech House Lan When your computer, This book includes information about the Internet Society and provides an Some users have need to protect printer Or modem d0eS 1 example of typical requirements and sensitive unclassified data being not Work properly.... connections. transmitted from one site to another i in an approved manner. Remember " Writing Disaster Recovery Plans for that e-mail messages are currently Telecommunications Networks and encrypted on the AUTOS LAN, but When you feellike LANs" by Wrobel, Artech House attached files are not, unless you use Screaming...... Wordperfect Office Mail send This book discusses the purpose for options for encryption. These call the HELP desk. disaster recovery plans (remember features are explained along with the World Trade Building) and all other guidelines in the easy reference issues associated with deseloping a card NUREG/BR-0168. To obtain gp y cost-effective proposal for this card, call NUREG copies 492-emergencies of all kinds. 7333, or contact Computer Security j on 492-5019 or 504-33 i L i ITS NEWS Page 11

] NUCLEAR REGULATORY COMMISSION 3 Computer Services Directory e TRAINING LABORATORY FACILITY NRC END-USER COMPUTING CONTACTS s Location: 3rd Floor, Woodmont Building, W-306 ITS News Communications: 8120 Woodmont Avenue 11erbert Parcover, MNBB, Rm 7602, (301) 492-8699 Bethesda, MD 20814 Computer Security: Louis Grosman, MNBB-7602, Phone: (30l) 492-4744 (301) 492-5019 Laboratory llours: 7:30 a.m. - 4:30 p.m. M-F Timesharing Access / ids: Herb Parcover, MNBB-7602, (30l) 492-8699 Class llours: Records Support: Brenda J. Shelton, MNBB-7714, Full Day Classes: 8:30 a.m. - 3:30 p.m. (301) 492-8132 Half-day Morning Classes: 8:30 - 11:30 a.m. Automated Graphics Support: Al Blunt,2G-40, llalf-day Afternoon Classes: 1:00 - 4:00 p.m. (301) 504-2216 l i Services: Commercial Database Support: Eileen Chen, P-160, Three classrooms for formal ADP training providing (301) 492-8501 " hands-on" instruction in the use of microcomputers and Scientific Code Distribution: lierbert Parcover, timesharing systems. MNBB, Rm 7602,(301) 492-8699 ) Note: The Training Laboratory is operated by the Systems Development and Modification: Graduate School /USDA under contract, and managed by Bill Usilton, P-712, (301) 492-8322 (Mainframe) the Office of Personnel, to provide training in end-user Dick Hartfield, P-712, (301) 492-1328 (Mainframe) j computing for the NRC staff. Technical guidance is George Mathews, P-712, (301) 492-4744 (PC) provided by IRM. NRC Project Manager, Carolyn Scheduling for ITS Training Laboratory Bassin; GS/USDA Training Manager, Mary Holmes. Eduardo Cunningham, W-306,492-4744 1 1RM CUSTOMER SUPPORT CENTER Your single point of contact to report all proHems concerning computers, telecommunications, network, minicomputers, mainframes and applications or questions about IRM-related services.

v. m -A a c ~

I= 1VMMM SINET u w u> < a PC Maintenance xsa zw w o m :o ut i OOg Data General Z Application Support a -4 wou l IBM 9370 $m rYn Local Area Network = + x mu mu - UNIX oc 1 PC Relocation and Installation mr-EXSIS y* Telecommunication Services a A h Voice Mail - o a a ~ S b$ FOR 1RM CUSTOMER SUPPORT DIAL: (301) 492-1234 a mc. n w un Post this Computer Directory for Future Reference. ~ - -}}