ML20125D289

From kanterella
Jump to navigation Jump to search
ITS News.Fall 1992.Volume 8,Number 3
ML20125D289
Person / Time
Issue date: 11/01/1992
From:
NRC OFFICE OF INFORMATION RESOURCES MANAGEMENT (IRM)
To:
References
NUREG-BR-0056, NUREG-BR-0056-V08-N3, NUREG-BR-56, NUREG-BR-56-V8-N3, NUDOCS 9212150083
Download: ML20125D289 (16)


Text

_. _

in555tW1 1 i t 017 US N C-OtM4 DIV FOIA E PU SC i r s o o n -Nuo r r,"L I C A " I ON S t' '11 WAhMIhr,T00 DC F S55 E umunnummmusammusammma FALL 1992 usuu h- Vol. 8, No.3 M NUREG/BR-0056 usus information Technology Services Training l2boratory rh &

U.S. Nuclear ofnce of Information Reguhtory k.,.." Commission Tae Dangers 03 Software Piracy 2

by Ken Wasch. Executive Director A ' ' product quality and customer service in an Software Publishers Assoctation m,* '

industry in which the United States is still

~

.~ ~ the dominant player. These revenue f' losses have motivated the software ggy ,}/

industry to fight back.

O~'  !

Software is developed by publishers who rely upon steady sales, not only to survive, but to improve their products and to invest a jY , .

b' ,

for the future. The creative teams who

' , -C' develop software-programmers, writers, s graphic artists, and others--also desewe

{o 9g s M+

  1. fair compensation for their efforts.

Without the protection given by our g!

i , h, --s.R

. . 'i .

copyright laws, they would be unable to

\

p

[ } Tc:

N produce the valuable programs that have become so important in our daily hves:

W- educational software that teaches us much

! h- "

needed skills; business software that allows us to save time, effort, and money, thereby making us more competitive; and The personal computer has become an because they sacrifice the long-term entertainment and personal productivity integral facet of every day activities in benefits oflegitimate software sofWare that enhances our leisure time.

most offices. Computers, more ownership, and they risk a valuable specifically the software that Computer piracy is different from copymg business asset, the integrity of their empowers them, are responsible for other recorded media, such as videotapes nformation system.

everything from agency and compact discs, because there is no correspondence to financial Computer software is protected under degradation in the quality of the copy.

management, graphic presentations, the Federal Copyright Law. It states, The computer industry is the only industry and scientific code computations. " Users may not make a copy of a that empowers the end user to become a piece of software for any other manufacturing subsidiary. Trust and Unfortunately, all too often computer .

reason than as an archival backup responsibility is placed in the hands of the users put themselves and their

. without permission of the copyright computer user, A computer program organizations at risk by making illegal holder." la the past, the costs of this copied over and over again s,ill work copies of the software they use to problem have been high. In 1990 exactly like the original. A program that manage their activities. Called llegal copying cost the PC software took years to develop can be copied in a

" piracy" in the computer mdustry, this ,

industry $2.4 billion in the United few seconds. And although software is theft ofintellectual property is a States and over $10 billion

{

expensive to develop, almost any PC can violation of the Federal Copyright worldwide in lost revenue. These be used to generate a cheap copy.

Law. Software pirates hurt themselves numbers represent crucial revenue as well as others through their actions that could be invested to improve (conimued on Page 2. "Aracy")

9212150083 921101 PDR NUREG

-BR-OOS6 R PDR

("Arao"commedfrom page 1) trim costs. Another user may feel I that "everyone else is doing it" and Why should a computer user be not wish to be the exception. Finally, THE ISSUE AT HAND concerned about complying with other users believe that piracy software copy-ight laws? First and "doesn't hurt anyone" or "isn't foremost, computer piracy is illegal, really etealing." Rey are all wrong.

ne twgers otsonwm naey ...._ .i and there are stiff penalties for breaking the law. Companies and Many people do not realize that the IRht S uctine Odice to NRR Compktes copyright law applies to Men - 3 individuals who break the law can be organizations, both profit and non- ne bitsetchnt Connechon s penalized as much as 5100,000 for every instance of sonware copyright pmfit, as well as to individuals. More Buiang 4ency PC symer ow %r, s vichc. ion. Also valuable benefits and more businesses have written policies against illegal duplication of ^"#"'*

  • 8*"" G'"f*"" " "6 accrue for becoming sonware legal. ,

By using original versions of software. But compliance does not NRC Artificial tuelhgence User Group .. . 7 computer software, users receive stop when a business person leaves n,,, wa, _ 7 upgrade notifications,usually at his or herjob. Employees may face e m uneninow. 8 discounted prices. They are also OScQlinary action if they make extra COP'" of the company's software for PKZIPTn>jan Akrt - ..._.. 10 investing in the quality assurance and reliabilityof the product. legal use at huic~ or on additional rtSTmining Ihry Nas- _ 11 compliance means that the business computers in the office. A good rule to remember is that NRC must have mTummeswst.ons and Answus _ u relationship does not end when the one authorized copy of a software IM Review . ,_ .13 buyer walks out of the store. Full documentation, technical suppon, program for every computer upon and product change notices await the which it is run.

rightful owner of computer sonware. .

Because the software industry is The user also enjoys efficient .....

rehtively new, and copying is easy, business functions owing to productive employees, fully

  • " E#*b ** * ' "" * ## I the laws goveming personal computer operational computer systems, and ITS NEWS CREDITS sonware use or choose to ignore the virus protection.

Computer piracy comes in many reeponsible for understanding and .

forms. Software counterfeitingis adhering to the copyright law. ;g , o _g ,

the illegal duphcation and sale of tuhadog at the NRC. It is prmfuced by Business owners can take the the statrorthe NRC infornution Tuhnoi.

copyrighted software in a fotm nitiative to make sonware ogy services Traininglaboatory in designed to make it appear conjunction w' h the NRC's othe of compliance an integral part of their legitimate. Hard disk loading takes Personnel.

daily procedures.

place when computer dealers or consultants load unauthorized copies Starting in October 1991, NRC

    • "'* 4"* "" * """*""

of computer software onto the hard computer security personnel began picase sontaci the ITs start by:

disks of personal computers, onen as random and unannounced checks of an incentive for the buyer to NRC personal computers for the PhonN2 8M9 purchase from that particular person. Mawn ren amBN2 presence of unauthorized software.

Electronic bulletin board services Any PC found to contain IIerbert Parcover,IRhth may offer the illegal opportunity to unauthorized sof1 ware is reported to th uthe raitor download copied software, using a the manager of the office to which it telephone modem Finally,the practice of copying sonware within is assigned with a request for '[* *[,$

t ,

explanation and software removal.

companies for use in the home or NRC microcomputers are to be used Alvin tilunt, IRAi!TSB office or of " sharing" software for official business only. Design Consultation among friends is all too common. Employees who intentionally misuse mustrations and Concepts by NRC NRC propeity (including computer Autornated Graphics Section This last type of piracy accounts for resources) may be subject to Contributon to regular items are:

over half the total revenues lost by . .

disciplinary action. r,t noinws, w%tison. E. Robinwn, P.

the mdustry. He reasons for piracy 3,,13, c, ycng differ widely. A business person REMEMBER DONTCOPYTHAT may copy one piece of software to FLOPPY! E ITS NEWS Page 2

IRM Satellite Office to NRR Completes Mission by Elaine Toro. NRR Chbf, OANDB, served collaterally management; coordination of PC Goals as the Chief of the Satellite installation and maintenance; RITS The IRM Satellite Office to NRR Operations in IRM, and Kathryn management; AUTOS task (SON) was established in July 1991 Greene was selected to sen'e as Chief management for NRR office as a 1-year pilot program to provide of the SON. Ms. Greene led a six. implementation; coordination of dtreet specialized services to the member team composed of two telecommunications; and NRR staff. IRM's goals were to persons from NRR, three from IRM, coordination of PC and software demonstrate the feasibility of tne and one from the Office of acquisition.

" satellite" concept as an approach to Personnel. One member of SON improving the timeliness and quality stated,' the SON was truly a team ofIRM support and senices. efrort. When co-workers were on Accomplishments leave or a task had to be done, others The SON provided support in the would pitch in to make sure we got g 7

Organization the job done.

also contributed information to ADP Organizationally, the SON was The SON performed the following Repons and to two NRR senior functions: coordination of NRR management meetings. An placed within the Division of Computer and Telecommunications office ADP; LAN administration; automated system, developed for the Services, Office Automation and coordination of 5520 word SON's intemal use to track PC processing; hardware and software installations, hardware and software Network Development Branch (OANDB). Guy Wright, Branch inventory control; data entry (continued on Page ( "SatcLa"j G

y . Q. '4 s

n e, 4 i r -

9 f di h

V .

.c - ' ,

, ~~ [ , , .

q >

$ f V" Mit f_f

. s ,

gji .

%~

~i Front Row: Cynthia Dekle, Kathryn Greene, Jennifer Dumont.

Back Row: Patty llenderson, Lana Cobb, Eileen Lo, Tom Sheffer.

ITS NEWS Page 3

("Saicthte" continuedfrom page 3) identify and man ge the workflow processing 260 microcomputer generated by NRR and to keep upgrades (NRC Fonn 530). Rese requisitions, configuration accurate statistics for the contractors' requests were tracked to ensure their me.nagement, and telecommunication equipment requests is being used by Md hely completion. He SON assisted '

NRR staff assigned to carryon these the NRR staffin identifying specific Between August 1991 and June needs for computer communications functions that SON established. 1992, the SON coordinated the and other ADP capabilities:

installation of 350 new PCs and 65 The SON added over 100 users to the ,

reassigned PCs for NRR techmeal ne satellite concept proved effective existing NRR LAN and made staff. He SON conducted repeated in that SON attained the goals IRM notable engineering improvements t inspections ofindividual and NRR established, ne SON dem-the network, it improved reliability workstations to verify the 350 onstrated that it was a feasible and a of the NRR LAN by reconfiguring recipient names and locations. practical approach toimproving the the NRR file servers and adding timeliness and quality of!RM support more user rings to provide load he SON improved RITS and service to a large and significant balancing. Two additional file (Regulatory Infornution Tracking segment ofIRM's total customer servers were installed for the WISP System) coordination and the RITS base. Sevemt letters ofcommendation and EDIT applications and we data editing process. All quarterly were received from NRR managers state-of-the-art file servers t aced RITS edits for licensee fee billing recognizing the quality of service that older unreliable equipment. The were completed on schedule, and they received. Rese are a testament to system backup was improved by the timely RITS data were made this unit's success, installation of a " hot spare" file available for use at NRR's server and expanded tape backup unit. Regulatory Information Conference. The IRM SON pilot ended on July 24, 1992. Most of the duties performed NRR experienced two 5520 system by the SON staff were assumed by a failures within 2 days last year and, new organization within NRR. IRM each time, SON restored the affected Orcrall, lhls pastyear kept the SON LAN Administrator at systems to service in less than 12 has been a rcWarding OWFN to become the IRM hours with no loss of documents or cxperience and Isvc gained representative for all LANs at this profiles. As of May 1992, the SON managed the conversion of RR M OP sWf usW So innch inore kn0W/cdge to the SON returned to their approximately 700 documents from

respective offices and the rest of the the 5520 system to Wordperfect 5.1 -

IRM staff returned to their original and also assisted in the manual conversion of 20 documents for the o de new AUTOS users. The SON flere are some typical comments Gat As of mid July 1992;400 NRR users c ntinued training new ::ecretaries, I heard from the SON staff-were connected to the AUTOS and completed recabling of 5520 netw rk, and plans call for systems for 23 secretarial locations.

converting the remaining non- My awareness and understanding of ne SON completed the 1991 iRM AUTu LAN users to the AUTOS NRR'sfimetica and computer needs hardwara and software inventory envirtament by tl e end of - were increaf,cd Working with NRR review well ahead of schedule. De September 1992. He AUTOS LAN on a daily basis gave me an review was systematically planned to also includes the 31 Standard appreciation ofwhat they were minimize disruption to the 800 NRR. Review Plan (SRP) computers that doing.

employees. Throughout the year, the use the Text Retneval System. His SON recorded and reported ADP large project is expected to be Working in the SON har been a great hardware and sot 1 ware moves among completed, as planned, by September "Periencefor me. It has allowed me NRR staff. On seven occasions, 1992. He SON was instrumental in the aperime ofworking closely boxes filled with sor1 ware were facilitating the information flow with IBM to get a better retumed to IRM for possible between NRR and IRM for this understanding ofthefimcrios and reassignment elsewhere in the important project. - Procedures ofthe dgerent sections agency. that make up 110f. I've been able to During the past year, the SON was meet a los cfpeople in both IRM and With the establishment af the SON, responsible for coordinating 50 NRR NRR that 1 *ve only heard abo"t.

initiatives were developed for quality telecommunications services Overall, this past year has been a assurance oversight of data entry requests; 1I special orders that rewarding experience andI've contractor staffs. He SON included placement of 69 special gained so much more knowledge developed data entry ~ quest forms to computers (including SRPs); and for about the ADP norld. as ITS NEWS Page 4

The SoftSwitch Connection by ll>ne Afiller. IRhl With the implementation of the without having to leave the LAN to document can be converted at a Agency Upgrade of Technology for access the IBM 5520. time, this feature allows for the Othee Systems (AUTOS) project, conversion of many documents issues dealing with connectivity (i.e., Document Transfer: his feature is from the IBM 5520 to Wordperfect.

document transfer and e-mail an extension of electrome mail. PC/ Conversion coordinators have been LAN users sending e-mail to an IBM ass gned in each office to oversee capabthties) between the IBM 5520 and the LAN have been voiced 5520 user are able to attach one this procedure. .y W rdPerfect file to their message, e, Thanks to a product called "SoftSwitch," those concerns can be This attached file is then conserted Thousands of documents have by the Mail Handling System (MHS_) already been converted using the laid to rest. SoftSwitch enables users in the different environments to into IBM 5520 format and delivered SoftSwitch facility. Once allIBM to the IBM 5520 user. IBM 5520 5520 functions have been replaced communicate with each other.

users are able to send an IBM 5520 by AUTOS LAN applications, he SoftSwitch capabilities are as document to a PC/LAN user. His SoftSwitch will have served its follows- fue is also converted by the MHS to purpose and will no longer be a Wordperfect format and delivered needed. E Eleceronic Mail (e-mail). IBM to the PC/LAN user.

5520 users are able to send IBM Forjimher in)brmation anJior 5520 e-mail messages to LAN PC Document Conversion / Migration. assistance please call the Network uwrs, and LAN PC users are able to Unlike the document transfer Control Center at 49v1 UTOS 001-send e-mail to IBM 5520 users feature of e-mail, where only one 492-8867).

Building Agency PC Systems for the Future by George M A1athews, IRAI The adsent of Local Area personal computer power by large major vendors, e g., Borland(dB ASE Networks (L ANs) to the NRC factors with each new processor chip IV and Paradox), Microsof's processing environment through the release. Today's PC equipment FoxPro, Computer Associates success of the Agency Upg ade of takes on new levels of capability Nantucket Clipper, and Easel Corp 's Technology for Office thought not achievable only months EASEL Software.

Sysicms(AUTOS) has created an ago. He software operating system A market leader, which can not be abundant interest in data sharing and environments and the attendant application software development ign red,is Microsoft WINDOWS multiuser appheations, NRC Othces tools frequently change dramatically, 3.x. The Information Technology are no longer satisfied with single-Services Training Laboratory courses user, standalone PC applications that thereby challenging us to seek new and better ways to provide client n w include classes in WINDOWS produce reports, essentiallv in batch for NRC clients interested in using mode. NRC clients are now moving service at the NRC.

this software.

toward real-time, online, graphical SDB is committed to providing presentation systems that can be Each of the above-mentioned application systems that will employ shared by several ofEce stafTs vendors has a target date for release new technology to deliver desktop simultaneously, of their des elopers tools that will pwer to NRC workstations. In addition to completing cun itly prepare applications to execute in the The Office ofInformation Resources WINDOWS environment bringing Management's Systems requested applications, we are also examining new software application with them all of the advantages of Development Branch (SDB) is tasked development tools that can be Micros (Us product, such as better with providmg applications considered as " Network memory management, disk caching, development support to expanding Compliant," not simply " Network pnnter support, network agency needs in an ever-changing technical environment. He nature of Aware." Currently, we are hardware improvements multiply reviewing apphcation tools of the (Contmued on Page 6 "Ruddmg")

ITS NEWS Page 5

CBuilding"coraimtedfrom page 5) referred to as " Client Server" gytfflcjgl technology. His arrangement compatibility, multiprocessing, removes the application (J ; from lntelllgenCe the nie server environment and multithreaded applications support, a places therr' on a server machine, Conference common graphical user interface, attached to 'te network, but by Les Izmcaster, RES automatic mouse support for point dedicated to supporting calls lbr and Elaine Toro, NRR and click operation, and DOS session service via a common request management, controls, and language known as "SQL" or protection. Demonstrations of these Standard Query Language. All of the The Seventh Annual Goddard packages reveal some very exciting new development tools can suppon Conference on Space Applications of possibilities for the look and SQL, which means that our future Artificial Intelligence was held in operability of future applications at processing environment will provide hiay at Goddard Space Flight Center, NRC. some relief to the potential issues Greenbelt, hiaryland. Les Lancaster, surrounding Gle-server saturation. RES, and Elaine Toro, NRR, were Netwotk apphcations are curTently among those present for the exchange installed and executed from the file An additional feature of Client of ideas, techniques, and experiences servers supporting the AUTOS Server systems is the splitting of among the researchers and

~'

networks. Dese servers were placed applications into two parts; one part practitioners of Artificial Intelligence specifically to control network installed on the workstation and the throughout the space industry.

functioning and to support other installed on the Client Server Wordperfect Office features such as machine supporting inter. Pre-confer mee tutonals were held on e-hiail, event scheduling, operability over the network. This the topics of Probabilistic Reasoning calendaring, and WP 5.1. Placing approach is specifically preferred as and Genetic Algonthms in addition applications on the network file the power of the workstation is to a day-long workshop on Fuzzy servers is expedient but not employed and not placed LOS IC-necessanly considered the best completely on the server machine Dr. Lawrence Davis taught he approach, particularly if those itself, vastly improving multiuser Genetic Algorithms (G A) tutorial.

apph.ations require the product application performance from the lie s author of the applications.

software to also be resident on the client's perspective. Working LAN to interpret each line of code onented textbook: "liandbook of closely with the Office Automation Genetic Algorithms", published by written m the application. Sonware and Network Development Branch Van Nostrand Reinhold in 1991, arid of this type requires much more and the Tclecommunications he is associated with Tica Associates, processor overhead and can unduly Branch, SDB will examine and Cambridge, hiassachusetts.

burden the file server to the point of implement this technology on potentiallyjeopardizing designed applications that require this type of he techniques that were developed network performance. network support. for G A have four basic elements: a chromosome, a creator, an SDB currently uses the Clipper 5.x With the rapidly changing evaluator, and a generator.

language to build applications for applications environment, SDB has Examples of problems were NRC clients. Clipper language can sought to use the resources of demonstrated that are solved by be compiled and linked to execute as technical experts to keep NRC using G A coupled directly with an .EXE executable file. His means applications as close to state-of the-Fuzzy functions. GA are stochastic, that the resultant appheation will art as possible. Technological and they can be used in load to the executing PC and run research groups have been much faster in the DOS environment, opt mization problems and in contracted to provide technical machine-learning problems. The avoiding some of the overhead guidance and inter-governmental issues. While this improves the M h s @ pwerful, and it communications that will be critical can be easily adapted, hybridized, situation, it does not completely in our decision-making process for and improved, as know! edge about solve it. future planning of our applications the problem to be solved becomes direction for NRC. n . .

SDB is examining a new technology available. G A is replacing Neural that may solve the problems of file Ifyou have any questions atout this Networks as a better method.

server saturation. An emerging article, please contact George M.

technology aimed at the solution is Mathews on (Kl)4&4415. W""#"'0""Y"E' ,]

ITS NEWS Page 6

r

("il"continuedfrom page 6) John Klinberg, Director of the through systems that understand Goddard Space Flight Center, gave engineen. He said that the the opening remarks. We leamed understanding must be

! Dr. John lemmer taught the .

Probabihstic Reasoning tutorial. He that Fuzzy Logic ir cunently used in communicated and trusted. he is associated with CTA, Inc., Rome, more than 2,000 applications and system must figure out what is New York. lie is conducting that it is very useful for discovenng happening in an engineer's knowledge in databases. Dr. Zadeh vocabulary. Documentation is very research with essual Models which originally coined the famous term important, because machines operate is a technique < t estimating the (Fuzzy Logic)in 1965. Severalof using descriptions. Communications parameters of a distribution the speakers noted that this logic has skills are vital; what is happening underiytng incomplete knowledge.

He discussed the aspects of been around a long time and it is should be verbalized and doc-now necessary to make a paradigm umented without using equations. N reasoning using logic and shift. Dat is, we need to reexamme probabihty. He compared some of Conference proceedings andfurther the methods of performing logical how things are done when applying Fuzzy Logic. For example, how do i'$marion are availablefrom Les reasoning such as fuzzy logic, Lancaster. RES, (301) 492-3969, and conditional probability logic, and the sys' ns operate in a degraded mode.

if we follow the advice provided by Elaine Toro. IVRR. (301) 504-1389 Dempster-Shafer theory. He one of Dr. Zadeh's famous quotes:

discussed vanous methods that used Bayesian inference for doing "It's expensive to be totally pubabilinic reasoning. Various precise " then we should also take net work models were also discussed, the advice offered by Fuzzy Logic COmputerWizards such as Bayes Nets, Tnangulated Workshop Chainnan, Joeseph hiica. by Emily Robinson IRM Nets, Innuence Diagrams, and He closed the workshop with the words: "Go out and fuzzify the Although Jay Forrester is a less well-Causal Models, and examples of world." known computer technology inventor each were given.

than many, his discovery of coinci-Dr. Randall Davis, professor of dent current random access core We were fortunate to hear the Father of Fuzzy Logic, Lotfi Zadeh, give Computer Science at MIT, was a memore made him a major figure on the keynote address that provided an keynote speaker at the Artificial the computer scene after World War oserwhelming influence over the Intelhgence Conference. Dr. Dasis 11. He found himself caught up in entire Fuzzy Logic Workshop. Dr. has published widely on expert whirlwind projects to run aircraft Zadeh is a professor in the Computer systems, serves on the editorial board simulators and to automate the Science Division at the University of of the ArtificialIntelligence Journal, aiming of missiles. Eventually he Cahforma, Berkley. In addition, six and was the co-founder of Applied contnbuted to computer projects that other speakers gave excellent talks Expert Systems. He talked about involved modelling and analyzing the on Fuzzy Logic applications. Dr. buihitng an engmeer's assistant human social system. 5 NRC Artificial Intelligence User Group by Les Lancaster. RES The NRC Artificial Intelligence User Group (AIUG) (RS AS) being developed for the lacident Response Center met at the NRC White Flint buildmg on May 5,1992. Dr. By INEL and the University of Maryland. This is an Mohammed Modarres, visiting Professor from the online expert system used to monitor the state of a plant University of Maryland who is spending his sabbatical and its sa fety functiens during an incident.

at NRC/RES, gave an excellent talk on using Expert Systems in safety applications. His talk included dnscussion on how Expert Systems are developed and ifyou wouldlike tojoin AIUG or obtain more information how they are used in real-time and or!ine. H e specifically or hate any questions about the group. please call Les talked about the Reactor Safety Aoseisment System l ancaster at (301) 492-3969.

ITS NEWS page 7

m a mi = m r. ,

maa mm - - - - - a - m-

.a # $ @ d h UN L. V V V unum u . m aa ae m ElWI EE EE = W NUCLEAR DOCUMENTS a W w w w WN SYSTEM NEWSLet iER N U JOCS Document Docurnent Management Branch ow llave you ever wondered where 6e y,4ow sheet identifying which Information Distribution System documents come from that are on puaon of the document contains the (RIDS) codes; 4) processing the reclear Documents System proprietaryinformation. In prie.f.ntion; 5) encodmg; 6) RIDS (NUDOCS)? His article addition, wh6 proprietary fornviabel production; 7) discusses where these documerns information is microfilmed, it is reproduction and distribution of originate, how they flow through filmed in a separate microfiche reproduced copies; 8) text the NUDOCS process, and the series that is not available to the processing; 9) micrographic s,10) different processing steps involved publis Safeguardsinfonnation that database update; and 11) reports m placing a document in s received for NUDOCS processing generation. nese activities are NUDOCS. is handled with the highest level of performed by the DCD stafflocated He NUDOCS database contains care. IRM's Document Control in the One White Flint North both NRC and externally generated Desk (DCD) staff maintains control Building and the NUDOCS of that portion of the submittal that contractor staff at either the One documents. Guidance for contains the safeguards information, White Flint North Building or at the determining which documents are and forwards the cos er letter NUDOCS Contractor's off-site to be forwarded to the IRhi s Document Management 14 ranch for through the NUDOCS process. The far 'lity located in liethesda, NUDOCS processing is provided in letter is used to create the NUDOCS Maryland.

NRC Manual Chapter 0232' data record Once the Regulatory information System (RIDS)

' Placement of Documentation in the NRC Document Control distnbution sheet and label are poduced, tha DCD staff reproduces Docurnent Receipt at S18' #*' " P"## EY I"U documeia. wesignated for the appropriate number of copies of White Flint processing through NUDOCS must each document to meet the NRC be provided to 'he Document distribution needs. ne ecpies are distributed in accordmee with Control Desk (DCD) located on the appropriate for cap are and appr priate NRC ManualChapters P1 level of OWFN (Mail Stop processing througii NUDOCS.

OWFN pl 37). Some documents g mn ng the aansminal of Rey assign a RIDS distribution f safeguards information. While the have been designated for full text code to each document. His code processing in NUDOCS. In some e m euer is sent through the is used to determine to whom the NUDOCS process, microfilmed, and cases, r.n electronic copy is document will be distributed and at made publicly available, that received in addition te the paper what priority level. Normal RIDS P "0 ' "*" I copy to facihtate full text processing provides distribution to contains safeguards information is the NRC staff within two days of handled only by NRC staff and is receipt, w hereas the accelerated Some documents, such as those not microfilmed.

distribution process we call RIDS' containing proprietary or ADDS provides same-day The NUDOCS process includes the safeguards information, require follow ng activ ties: 1) document distribution. Documents are then special handling. Proprietary rece t; 2) document sort; 3) routed to the NUDOCS contractor information is flagged with a assignment of Regulatory f amf.,s on page 9, .yppocS j ITS NEWS Page 8

(M in c o nmmelpsnfwe N documents are retutned to the DCD are counted and logged in. Once for forwardmg to the appropriate received, the RIDS / ADDS staf f for funher processmg fihng location (i c Central Tdes, documents are routed to the lhe NUDOCS contractor staff sort ker onal s Offices). Document Distribution and Contre' the documents based on the RIDS Document preparation (Doc prep) rue types of NRC staff generated area to be prepared fot filnung codes auigned and whether the docurnents are designated for doc urnents are externally or induuon in NUDOCS as full text All other documents are routed to internally generated. The and are generally recened in the contractor's encoding teams In de 'uments are then date stamped

'I"""*C I"""at, a s w eH a s m the Encoding area, all RIDS ami wunted Those document with a RIDS' ADDS code (same day P W"PE 'n elecuonic subnunal doemnents are erdered ihm the n a docmnent fue teither ASCl! or system, and a QC reuew is datobutmn) are processed at Winte onWerinn that is sent to the pdfonned to compare the I hnt The remunmg dos uments are D ua the mnc 6 5520 syuem mfonnatmn in the digital rewrd to souted to the contractor's of f site or on a Coppy dakette in order for that on the paper copy document huatmn for wntmued processmg the Die to be pmcessed, a paper Af ter encodmg the RIDS wpy of the docurnent inust either documents are routed to the Doc at ompany the electronic submittal Prep area Document Processing at or be forwarded to the DCD in White Filnt accordance with estabhshed procedures At White Flint, the The NUDOCS contractor stalf at paper copy document is encoded, a Contractor Document Whoe I hot treate a NUDOCS data quality control check is performed; Preparation (DOC PREP) rewrd for each document wnh a and the electrome copy is checked RIDS / ADDS distnhutmn code. The against the paper copy to assure it is  !" D "C PP'"II d"C" * ""

(including the RIDS / ADDS from NUDOCS data entry precess cornplete. Ilectronic Gles are e are prepared for asugns a unique 10 digit accession consolidated in the event the

'"'" *I"E h"P ' N " I" number (ANOJ for each :ecord .is it document consists of multiple files temoving staples, attachmg RIDS n encoded The ANP 'eflects the All ASCll files me conserted to sheets and labels, and sorting y ear, rnonth, day, ane :,equential WordPerfcct, and renamed with the documents Some documents may number for the record created for focument's ANO The diskette and require special handling due to that date For example, paper copy of the document are os erstre pages (pages larger than 9206050001' is the first record encoded on June 5,1992. routed to the Contractor's off site 8.5" x 11"). These documents are location for text processmg and Hagged and toured to the Apenure Af ter each data record Ib created, it 6hning Caid processing area to be Olmed leten es a quahty control (OC) on aperture cards From Doc piep, check agamst the paper copy documents are routed to doc ument to assule the information Micrographics is y author name, subject, date, Document Processing at docket number) has been accurately the Contractor's Off Site captured A RIDS / ADDS sheet Location Contractor Micrograph.ics wntaining the ANO, date, docket, a Int of copy recipients, and other RIDS documents (those not Processing mfonnation is generated, and requinng same-day distribution) are All documents processed in attiched to the document A label routed to the contractor's off site NUDOCS are micro 61med which indicates the ANO and 61ing location to hegm the NUDOCS (including enclosures, exhibits, and mfonnation is placed on each process. The RIDS / ADDS attachments'). Ilowever, for encoded document = Documents are documents are forwarded to the off.

Safegu rds information the then reproduced and distnbuted to site contractor location for each recipient listed on the RIDSI micronlm and text processing only, miemMm acu4 c(m@s of filming the transnuttal letter only, ADDS sheet. Following since they have already been not the sensitive enclosure.

datnbution, the ongmal of each encoded, reproduced, and document is sent to the contractor's dutnbuted to the staff. All Publicly available dacuments, non-off.ute location for text processing Documents routed for off-site pubhcly as adable documents, and (if appropnate) and microfilming processing are received in the After filming is completed, the Document Receipt area, where they (Connnsw,1 on pa ge Jrl "M !DOCT)

!!S NEWS Page 9

FAUDum mamedpom pacc 9/ Text Processing is of poor scanning quality and was not provided on an accompanying Certain i fpes of documents such as diskette. All full text processing prepnetary (PROP) documents are LIC" see Es ent Reports (LERs), occurs prior to microfilming.

filmed on three separate sets of mierofiche. After filming, a QC NRC Information Notices, As the full text becomes available check of the film image is performed. Bulletins, Generic Letters, through one of the aboce methods, and the t mofiche is then duphcated Regulatory Guides, and the Code of it is edited by the Text Processing m preparation for distribution. All federal Regulations have been Team to ensure that it accurately three sets of microfiche are provided designated for full text processing.

reflects the information provided in to the NRC stalf at each NUDOCS Rese types of documents are the paper copy document. This Work Station, both in lleadquarters available on hne as full text in team is also responsible for and the Regional Of1 ices. Four sets NUDOCS When available,the full producing abstracts for AEOD of the pubhcly available microfiche text for the documents is produced reports, emergency plans and are provided to the NRC Public from floppy diskettes.

procedures, PNOs, inspection Document Room and a set to each of reports, OL amendment Some of the above hsted documents the local Pubhc Document Rooms. applications, legal documents, DOE types are externally generated documents and, generally, are not documents of over 100 pages, and Document pages that are over 8 t/2 received in electronic format. As a other documents. When the editing X l 1", such as engmeenng drawmgs, resuh, the full text for LERs and and abstracting process is are famed on aperture card 3 After a specified liigh Level Waste completed, the text is up-loaded to quahty check of the fiim image, sa sets Rep sit ry(llLWR) documents NUDOCS.

oraperture cards are producod and dutribued to designated NUDOCS must be produced through a scanning process. Ah? (/HfJfion5 'egarding A,UDOC,$,,

Wark Statmns in lie arters As tilming is completed documents are

  1. ' *# *F" I" routed back to Doc Prep t Ac re-compiled for return to the White rhnt occurs when the onginal document (301)492 7334. m D

PKZIPTrojan Alert kIouis Grosman. IRM NRC Computer Security has been Inc. has indicated it will never issue a DOS TYPE command. If the file that informed that two bogus versions of versica 2.01 or 2.2 of PKZIP. prints on the screen is a short batch the gwpular archiving utility PKZIP file with commands such as DEL for PC.IX1S and MS DOS machines Acc rding to PKWARE Inc. the C:P *, or DEL C:\DOSV,*, you are being cirelated on several tegus 2.f;l is a hacked version of have the bogus file.

Buhetin Board Services (BBSs) PKZIP 1S3 Alpha. While this around the country %e two bogus version does not intentionaily do any if you should happen to see these versions of PKZIP are: 2 01 damage,it is alpha level software, files on DBSs please contact the (PKZ201. ZIP and PKZ201 EXEi, and and may have serious bugs which sysop of that BBS immediately, and 2 2 (PPJPV221Pand PKZIPV2 EXE) could affect its perfonnance, ask to have the files removed. If you if you have downloaded any of these h,.ve downloaded one of these files, e i pus v rsion 2.2 is a simple make a copy, notify NRC Computer tileA da not attempt to use them, if batch file that anempts to erase >w Secunty(301-492 5019),and then these files are used,,sou risk the g  ; g g CS and C:\ DOS directories If your delete the tiles from your hard disk.

hard disk has been erased by tlus PKWARE inc has also asked to be program, you may be able to recover informed of any occurrenees of these it using the hard disk undelete utihties files and can be reached at, At the current time, the released version such as those in Nonon Utilities, or of PKZ.lP is version 1.10. A new PCTools. Do not do anything that Voice: 414-35&S699 BBS: 414 354- {

s ersion of PKZIP is expected to tv might create or expand a file on your 86'10 FAX: 414 35&8559 released in the next few months its hard disk until you have "undeleted" version numter was planned to be 2.00, the files, as you may overcite the or by mail: i but nuy be increased to a number deleted files and destroy them. To PKWARE Inc. '

greater than 22 to pn vent confusion examine a file to see ifit is version 9026 N. Deerwwd Drive wnh the bogus versions PKWARE 2.2, type it to the screen with the Brown Deer, W1. 53223 IIS NEWS Pqe 10

iiiii mum ar -=-

TRAINING uns -N D p

AI amma sums w .

lN respects and Perspective T5 Training Laboratory The past year has changed the way We offer half-day courses in many For The Wordperfect User many people work at the NRC. advanced subjects. IIalf-day AUTOS, the Agency Upgrade of classes permit users to more easily New courses have been developed.

All of them are for the Wordperfect Technology for Office Systems,is break away from their normal work puttmg the use of personal computers schedule to give some time to advanced user; Wordperfect Basics and Wordperfect Intermediate are (PCs) within the reach of all its training. Dese half-day sessions employees. nrough local area are particularly useful when the prerequisites. In addition, a pre test networks (LANs), people now send subject matter is demanding. for self-evaluation bas been designed their messages via e mail instead of Treating the subject in smaller and is available from the Lab to assist "sneater net," and exchange segments gives the individual w ho you in assessing your readiness for documents througn the Group is training the opportunity to retum these advanced courses.

Directory on the LAN. He advent *o his or her own work space to g,d4 he %'M W of networked based information practice these new skills before Documents, Parts I and II.

exchange has created the demand returning for another 3-hour Two half-day courses comprise this for-- segment of related material.

comprehensive presentation of good e More word processing classes. We has e developed advanced mini. word processing techniques. We courses in lotus and Wordperfect have used "Large Documents" to e More courses on networks, mean a document several pages in Macros to enable you to enhance your PC skills, Two of these entries length that requires organizational e Mote coarses on DOS, and elements such as contents, index, nto the mini-course arena are " DOS 5.0 Features and Func' ions," and different styles of page numbering, e Just plain more-

" Taming Your Law Printer," the headers, footers and foot / endnotes.

course that shows ytuow to make (Comtimwd on pay 12 " Lab")

GROWTH full use of your Laser !!s and Laser As the sophistication ef PC usen;has grown and tteir needs have changed, ne lab offers new class hours for ' -

t'r TIS Training lateratory (Lab) has haif-day courses. Moming classes trsponded. Our course offerings have now meet from 8:30 to 11:30 am. g been expanded. We now are training Aftemoon classes meet from 1:00 to 2 -::-

over 400 individuals nonthly at 4:00 p.m. An Express Shuttle now g r D

headquaners and in the regions in lesves Woodmont at 4:15 p.m. and U e specific computer programs. Because arrives at White Flint at 4:30 pm. I{ -

the lab is limited to eight perons a ._ -__ _

class, and three classrooms total, the facility is heavily scheduled. Besides New Courses Announced b' three AUTOS LAN courses, wr have The ITS Training 121 oratory has -

alled more class otTertngs in the Basic implemented an aggressive program __._ _ _ _ _ . [

and Intermediate Wordperfect classes of course development to meet the =h j to asist you. We have des eloped new growing needs of NRC employees. M- I DOS courses for those who want to gain more insight into how the A number of new courses have been added to the curriculum and can be s

g

(

d computer's operating system works. found m the ITS lab Announcements. _ .at_. --- y ITS Nr.WS Page 11

(" Lab" continuedfrom page i1) graphics are used in many ways at NRC, this mune teaches how to use Part I deals with the table of contents, liarvard Graphics, lotus, and True or False inserting " smart codes" to control ,

ordPerfect graphicsin your text flow (line and page breaks),

. %,ordPerfect documents to headers, footers, and page numbering Training ofTen the time and the emphasize the written word. Special techniques. platf rm for launching users dm MpMdN presented, and the Equation editor t ward efficient, disaster proof Pan 11 teaches document assembly, independence. ----

the Style feature, footnotcvendnotes, will be introduced his course and employing graphic lines, establishing other " sister" classes will be replacing the " Fonts & Graphics It's nearly impossible in the a base font and emtellishing it, and ,

reactive, time-limited context of a usmg advanced page layout Course "

support call to teach. --

In addition to those courses, the ITS Users who haven't learned their

% orking Smarter With LegsI Lab will be presenting two new organization's E2 ming Documents. His course willN s liarvard Graphics courses using the conventions may develop habits follow through for the special necds upgraded 3 0 versica ofliarvard that are incompatible with their ofindividuals charged with preparing Graphics. colleagues' and wreak havoc with data management. --

legal documents for the NRC. It will address documents requiring legal paragraph numbenng, rpeciallegal Introducing liarvard Graphics 3.0 Training can point out shoncuts charac ters, and legal dictionaries. will present the construction of and tips that users aren't likely to charts and introduce the variety of find out from documentation. ----

ne " Working Smaner with Large available charts. ney will provide Documents" courses replace the good " housekeeping" advice and Tmining is the best way to teach

" Enhanced Documents" course teach how to use the NRC templates more eflicient storage techniques.

previously offered in the liarvard Graphics " Gallery."

Untrained users have a tendency Merging for Office Productnity Adsanced liarsard Graphics The Merge feature in Wordperfect is Features course emphasis will be in training classes, miscon-gras ely under-utilized his course directed to the Draw and Annotate ceptions about the appropriate offers opportunities for creating fe3tures of Harvard Graphics 3 0. planned use of the sofIware can be mailmg lists for rep;titive letters, Macros, data calculation, and addressed up front. ----

envelopes, and labels, planning screenshow features -all new contingencies for conditional text in features- will be presente('- Twenty percent of an organ-a document, and learning good ization's users make 80% of calls design techniques. for support. - - - -

, Editin ^ ne twenty percent of an File and Document Management Probably the most imponant lesson to Tools . /

/h organization's users making 80%

of these calls account for those be learned about computing is how to  % who were never sucessfully store and retrieve your data. This 3f M. TMl trained. ----

course teaches concepts of file management and document control, oc bmd E h6 "*,L . Omim

  • Colleagues that know a system using the features available in _.

bnlliantly often do a miserable Wordperfect. It's a " nitty-gritty" MIRROR job explaining it.

p@h-jd course guaranteed to make hfe easier. ~M MBOB O $ imtn WSJ llelpless users stay helpless. ----

Making Your Point with Graphics While the ITS Lab has taught a

" Fonts & Graphics" course for some AdJirional courses are being plarmed time, this course is brand new --both as/ will be announced in the near m concept and material. Because future. m ((Answers: ALL TRUE)j MS NEWS Page 12

Meet Eduardo M. ,

Cunningham

's Ed Cunningham is the Program {

Analyst at the IT S Training '

.$ @ j Laboratory (Labh Wlule Ed is most I adh [ g]

often seen asessing and correcting j pi '

I ,'

hardware and software problems that occur dunng the normal teaching day ,

[ Ott ( w at the lab, his major responsibihties are accomplished behind the scenes ggg4@b ,i gr.asGT k e j

Besides bemg the ITS software / -

hardware " Super Sleuth" ,k"y], {, ,_,.. ,

(*#' [% ,

troubleshooting the various problerns s that occur in the trair,ing -

Mtk MYc , t '

?

A environment- Ed also is charged with supervising the database of all

' Q' - ~

N stuJents trained at the 115 lab, / w .' 'i; ensunng the accuracy of the student _

transcripts, statistical analysis, and the registration process.

'lhose of you who have attended ,

tmining lately will recall the -

~" 4 Automated Computer Evaluation

( ACE) system that has replaced a several-generations-old form Graduate School. 'lhis LAN training

"# f rego further computer previously used. Ed created the o program teaches how to prepate PC's education ' Ed tumed instead to ACE program that asks evaluathe ume g chology and camed with the vanous components requurd questmns at the end of the trainmg c mputer world nearly for connectivity. The concentrated s

class. The answers are then 1M ne f the "really good ones," LAN trairung program is designed to collected and analyzed to produce a pirpare individuals for LAN admin-but later, when the University of clear measure of the effectiveness of hiaryland installed a dial up system istration duties by hand. von instruction the training experience and the in Novell Netware, OS/2, Ethernet, for e mputer students Ed realized he perfonnance of the instructor. could take computer instruction Token-Rtng and ARCNET systems.

Ed does not we hinuelf as a " techie," without going to the punchcard room.

lie signed up to take the Computer in his spare time, Ed contmues to though he certainly qualifies. Asked pursue his interest in assisting people what he sees as the most satisfying Sciences curriculum and immediately realized how easy computer teaming u ho wish to use the computer for aspect of the computer profession, personalobjectives lie writes could be. "You could enter, sase, Ed's answer is working with people interactive programs and gives w ho wish to use computers, edit and execate commands and see the results befort your eyes (instead generously of himself to assist a especially if computers can save time vanety of computer users. Worthy and effort in their personallives "I of waiting for the printout)"

f speci i n te is his work with enjoy creating programs, especially Eduardo Cunningham has come a disabled college students and area interactive programs, but it is of citizens who want and need computer I ng way from that first introduction secondary imponance " to DOS-based micros lie esentually skills to enhance their daily activities.

Asked how he got into the computer honed his skills as a Teaching Ed works for the USD A Graduate training business, I'd says, "I took Assistant with the University of School as one of the NRC's full-ttme my first computer course at the Maryland and the UDC external on-site staff at the NRC's ITS computer sciences courses at Walter Training Laboratory. The ITS University of Maryland in Basic, it Reed Army Medical Center. Just Laboratory is managed by the Office ran on a UNIVAC via punched recently, he has successfully of Personnel, funded and technically cards I got very discouraged with completed the LAN Administration supported by the Office of the punchcard-&-wait-for-output certificate program at the USDA Information Resources Management a system of computer leaming and ITS NEWS Page 13

iiiiii,ar

=-

- TECH O M naammL N "T" umas mamm w l Q DOS destroyed or os erwritten by the Personal Computers Drtete. If you hase not saved The hard drive on my PC was anything to disk, the chances are Q FORMNITED by mistake, excellent canthat an UNDELETE utihty something be done? such as those by Nodon Utihties or Quest. ions and ' Peroois win recover me rde(sr Answers A (lhe r-<-*

DOS format utihty Assistance with this problem can be

. d emecreates me l1S .o,,

FAT) w hich will keep track of Center llotline.

We asked the iTS Support Center the contents and sequence of each llotline Staff to look at the questions disk sector used by files on the hard callers were asking over the period to disk. Without this information, it is identify some of the cornmon areas not possible to access the information of concem. in document, spreadsber or database Wordperfect 5.1 fdes 1here are two pntnary data in the following you will see many of recovery programs that perform an the answers to ths questions asked. UNFORM AT operation: NORTON  ! tumed off my PC without Utilities, and PCTools. Generally, saving my document in although not always, they are able to Wordperfect. Is there some recover information from the original way to keep from losing my work?

FAT file and recreate individual rdet Lotus 1-2 3 Assistance with this problem can be A Wordperfect 51 has an obtained through the ITS Support /g automatic backup feature that What do I do when 1 receive a Center llotline. is normally set from 15-30 minutes. What ever document or Q "WORKSilEET REVISION IS OUT OF FILE work you type in is recorded into the DATE" enor message from within file WP{WP).BKl during each LOTUS 12-3 (version 101) from a Files on the hard drive of my backup interval. This file can be spreadsheet fde that I received in the PC were deleted by mistake; renamed or copied befetc restarting mail? can something be done? Wordperfect again. Remember, it is only a timed " snap shot" of what This generally happens when 'lhe name of each fde on a disk you were working when the PC was i

the FILE FORM AT of the is stored in the DOS file tumed off. This file may not have worksheet is created by a allocation table (FAT) and captured everything you entered or version of LOTUS l 2-3 that is more points to the location on the disk for changed in the document.

recent that what you are using. In each file's beginning address. The this case the worksheet file was DOS delete command marks the first created in LOTUS 12-3 version 3.0 letter of each delete file with a which is two (2) version releases question mark (?) symbol that newer that version 2 01. The way to cannot be accessed or displayed by ANS Connection to soh e the problem is retrieve this other application programs such as NUDOCS worksheet file back into LOTUS 1 Wordperfect, Lotus, or DOS. If 3 version 3.0 and then save the prompt action is taken, the g gg worksheet in the version 2.01 format. information on the disk may be not the Autodial Network System (ANS), we no longer are able

'Ilis sntiim of the nemietter provWs tips and tahnicalinformation ofinternt to NitC computer users. If you have any questions regarding 'Technotes" or if you wbh to contribute an item, cnntact the lTS Support Centers: fur it and Nillitems, call 504-3490 and for DG ltems, call 492-M91. You may also drop by and rhtt in OWTN 3 C12. (Contmud on page D, *TcW) 11S NEWS Page 14

(~ln W' nmtmedpvmjuge H)

INEL by Emily Robinson. IRAi

'lhe ts o most common communications software programs used by NRC ate Log in Problems 7 m Afaun-cennpuru Netwods and Conprencing Systems Crosstalk XVI nnd Smattenn 400.

lioth of these programs are set to . Make sure caps lock key is OFF. Worldwide, by John S. Quarterman, work with a modem and require . User ID and password must be published by Digital Press in 1989, communications addressing entered in lower case. describes the prototype of a new statements (example ATDT 28388) c mmunicationsinfrastructure that

. Check password expiration date.

to accomplish " dialing" and in 1992 is already becorning as connection to the NUDOCS system

  • "*"'**I ""'P'"P' Y pervasive as the international A change to ANS requires a telephone system.
  • Still having problems, call conespondmg change in these The first part of this book dermes sonware programs (No dialing (208)526 9949.

background material such as prefix / phone number, the speed must pr t e is and gateways, for readers be 9600 bps).13y calhng the ITS New Phone Numbers who are not familiar with the Support Center llotline, you can rnetanetwork world of connected obtam the addressing statements if your phone number and,or computers. It includes a 20 year (also called parameters) to access exchange changed in April when FTS history of netw orking, the intrinsic NUDOCS or request a sof%are adopted the stand.ud long distance limitations that affect networking, technician to change them 10-d$tt code,please notifyINEL and the standards ofinteroperabihty CompWer Registration at (208)$26 that have grown out of this 9949, and ga e y ur correct 10-digit conceptual phenomenon -a mind DID you know that:

phone number boggling wonder of Wordperfect interconnections that has settled in to stay and become this decade's You can pnnt part of a page by the """-

UNICOS Version 6,1,5 use of the Wordperfect block text (F12 or ALT F4). Steps:(1) Select he book goes ( n to the real meat his new version of the CRAY the portion of the text you want t f the subject in defining all the operating system was installed in print,(2) press F12 (illock On) and major networks in the United States June. Users should consult release use the arrow key to go to the end of notices located in the user directory: / and abroad in addition to rubnets the block of desired text;(3) then and their conferencing systems in usr/ local / releases for changes to the press (Shift F7) and answer 'Y' to the ge graphical and technical terms.

operating system, file commands, and "Pnnt block?" question. It has copious references and access FORTRAN interface.

information.

hi'i'" hi 8Y ' * **"d'd "

COMPUTER VIRUS ! of-a-kind book for those who are ff developing local- and wide-area network connections, for those who 7 ( f want to explore networks, or u ho

\

/ HATE \ f' want to leam more about them.

SHOTS ! - .C4 Take a look at this new book in the p- NRC library.

1 000 CHI DON'T

~

$ 9' &, 1 MAKE YOUR PC

4) HAVE TO GET A SH011 Q GUARD AGAINST f-d COMPUTER VMUSES i Send suggestions for future N~ d articles to:

g #

d L j

' it e a.g Herbert Parcover, Editor "P,N %" v MNB13 Room 7602

, E CD'"h- Q w -

301 492-8699 I'I ifhQ%p ';

ITS NEWS page 15

i NUCLEAR REGULATORY COMMISSION Computer Services Directory ITS NEWS COMMUNICATIONS TRAINING LABORATORY FACILITY llert*ert Portover htNDB, km 7602 (301)4924 % 9 locaton: 3rd floor, Woodmont DudJmg, W-306 8100 Woodmont Asenue ITS SUPPORT CENTER FACILITIES Beo.esJa, hio 20814 locations: l' hone: (301) 492-4744 Philips lluilding, Rm l'-358 One White I' lint North,3C-12 1 almratory llours: 7.30 a m. - 4:30 p.m. M-F 7920 NorfMk Avenue 11555 Rockville pac Class llours: B:30 a m. - 3:30 p m Full Day Clauen Bethesda, h1D 20S14 Rockville, MD 20852 8.30 - 11:30 a.m. - IIalf-day M$rning Classes Phone: 1:00 - 4:00 p.m. - Italf-day Afternoon Classes (301) 492-4100 (301) 504 2353 SmM (300 4924 57 Three classrooms for formal ADP training providing " hands-on" Center lleurs: ins'ruction in the use of microcomputers and timesharing FitCnil.

7.30 a m - 4:15 p m. M F Note: The Training Laboratory is operated by the GraJunte Scrisces: School /USDA under contract, and inanarcJ by the Office of Marocomputer assistance (Telephone & Walk-in), Pers nnel, to provide training in enJ~ user computing for the Demonstrations, ADP Technical Library, and Computer /%deo. NRC staff. Technical guidance is proviJed l'y IRM. NRC bascJ Tutorials. P'"Jeet Manager, Carolyn Bassin; GS/USDA Traimng Managcr, Mary llolmes.

NRC END USER COMPUTING SERVICES Microtomputer liardware/ Software Acquisition, Upgrades: AtTI'OS IIelphne: 5041517 Please contact your local ADP Coordinator to initiate this action IRh1 llotline: 492-4160 Dawn Obser, P-530,492 4836 1.AN llutline: 492-4243 Microcomputer, Word Processor, other ADP Relocation: NUDOCS llotline: 492-8603 Please contact your loctd ADP Coordmator to initiate this action. SINI:T llutline: 492-4222 OWI N 492-4832, Phillips 492-4160 'Ielecomm llelp Desk: 492-4666 Microcomputer liardware Installation and Maintainente: Data General Sptems Problena:

OWTN 504 2353, Phillips 492-4160 Judy Secherman, P 600,492-9687 ay ses, c Earr w, 8 08 t were u e i ,9 17 Word l'rocessor, Other ADP Maintainence: 13ntronics Records Support:

Please contact your loe-1 ADP Coordinator to initiate this action. Brenda Shelton, MNBBM714,492 8132 Beth DeWoody, P 508,492 4832 Automated Graphics Support: Al Blunt,20 4G, 504-2216 Modem and Data Line l'roblems: P-810,492-4666 N id Da S C n, P-160,492 8501 Modem and Data line Acquisition:

Stan Wood, P-626,492 7723 Sdentific Code lbtribution:llerbert Parcoser, MNBB, Rm 7602 492-8699 Computer Room: Phillips 492-7713 White Flint 504 2885 Shared Information Network (SIN 1:T) Deselopment:

. Wil Madtwn, P-810B,492 7781 is Grom: a, thBB-7602,492 5019 #*"}' '

Timesharing Access / Ilk: Spteuw Ibel pment and Modification:

licrb Parcoser, MNBB-7602,492-8699 D'M Usilton, P-712. 492-8322 Dick Hartfield, P-712,492-4328 AUIOS Program: James Schaeffer, P-532,492-9332 George Mathews, P-712,492-4744 Data General and INF.L User Support:

Emily Robinwn,3C-14,504-3490 Scheduling for llS Training I ahoratory Eduardo Cunningham, W-306,492-4744 Post this Computer Services Directory for ready reference.

emunamme'hummi.

,