ML20245E742

From kanterella
Jump to navigation Jump to search
ITS News,Summer 1987,Vol 3,Number 3
ML20245E742
Person / Time
Issue date: 08/01/1987
From:
NRC OFFICE OF ADMINISTRATION & RESOURCES MANAGEMENT (ARM)
To:
References
NUREG-BR-0056, NUREG-BR-0056-V03-N3, NUREG-BR-56, NUREG-BR-56-V3-N3, NUDOCS 8908110347
Download: ML20245E742 (15)


Text

.

g-Volume 3, Number 3 Summer 1987 gas e

suL -

M M

NUREG/BR-0056 E

E assn i

9 7 y Information Technology f

N U.S. Nuclear Ej$'ga ygg;8 ten Services Support Center Regula and Training Laboratory

\\,,,..- Comm, tory ission R,7,clnd data. This article is for

/

gggn NRC computer user.

d8

What Happens

  1. ored my g,ve I 8 e8 7 Sputer tem-0 d7 g files rov 8 inals were " dumb," incapa-here My ble of storing significant t

e Ys amounts of data, and they so W

isi k oW ll were directly connected to Y go I ne # n host computers, through e

pa o

ure esan gc I

dedicated circuits. To-Y possW0g7 e9 pot 0

an pa g

w day, however, technology a

Y go I ter cgups has given us " intelligent" roVose? e gcure glar l

terminals, with signifi-in a on a ant storage capabilit1es, f$

0 and dial-up telephone con-

]

y?

re (the 0

O nectaon.

j gm be g

Y roPut.

These advances also have made it possible to pene-trate the logical security of a host computer through a teminal.

gggy

" Lack of awareness and Depending on the capabili-y concern among computer t1ee of a tereinal, it can users, which /eads to pro-be used to trap dsta seat Vg U

b/ ems of neg/ect, such as to a host computer, which YOU ARE THE KEY users giving their compromises identification passwords away, not securing their PCs at the Emily Robi.ason end of the day and, in THE ISSUE AT HAND general, not knowing or sm spothght.

A caring about good com-In a recent Government A" #"$ A'#'Il#'

Comvuter Nggg, interview, personnel at the National Perenal Focus: Joyce Amenta.

.4 Computer Security Center Computer security is im-stNET Update.

.6 (NCSC) (part of the Na-portant to everyone, not ITs hning ub sm

.8 tional Security Agency) just those involved with described the sinrle classified or sensitive Ns New st #w hn#ng ub.

.9 greateat *1ecurity problem information. All tbose PC User Group Updates.

.10 facing government agency who use a computer must Documeni control svetem.

.11 information systems like know good security prac-w tes.

a2 this:

tices to protect their own 8908110347 870gb1 PDR NUREG BR-DO5b R PDR

y

~'

cad c thentic:tia pr:ces-suddenly find th:t vitc1 s:s, s:ch cs c: cess p:rc-material in y:ur PC or meters. A terminal can ITS NEWS Credits mainframe has been de-also atore the phone num-The ITS NEWS is a cuarterty atroyed. To be safe don' ber and access codes in publication providino informat>on use unauthorized software communication software, 7,'c'n"fo*g'yl,"g,'*un'C. Es" pr'o.

you could be sorry.

opening the door to fraud, duced by the staff of the NRC in-

' '* On"c n*[e"r"ano"fra$ En'9Communications sof tware malicious mischief, and Supp n

disclosure of valuable Laboratory n conjunction with the encourages users to de-NRC's Office of Personnel data, because a perpetra-tor need only access the Your articles, ideas, questions procedures, allowing them network.

E,d * **',",$,f,'m*ofnNS to access another system

,o y staff by:

by entering a single Com-Perhaps you remember the Phone: 492-4160 mand. Such profiles and movie " War Games," in Mad or in Person:

procedurcs may contain th m

s Beg.

which two teenagers broke other system's access into an Air Force missile-Gerald Paulsen. ARM /ITSB codes, as well as the Execute Em launch computer by using a user's password. While modem and a computer pro.

Souglas Vickery. USDAiGS these proCdures seem Con-gram that searched tele-Managing Eh Venient,Lt-r 2ke it pos-phone exchanges for compu.

Patricia RathNn, OP/WASI sible for unauthorized ters. When the progran persons to gain access to found a carrier signal, it John Voglewede, ARM /ITSB the system.

recorded the number and log-on banner.

Kathy Beckman. USDA,GS The NRC Division of Secur-Director, ITS Training Lab ity prohibits the inclu-r,

/.

  • $"RC sion of user IDS Sud pass-pe <

r t Section vords a communicaticus 1 /#_

profiles and system log-ot S'd procedures. Users should M'

eliminate such "conven-O M

- Ii informatica across the ient" features and enter

/

I nation and around the the information manually, b

world. When you leave ID response to the comput-8 h

your modem and PC turned er,s prompts.

i

/'1 on, you are inviting some-q one to penctrate NRC Anyone can access files l~

)

equipment or associated stored in an unattended

~

host systems.

hard disk macbine. This wowe srs mr notan covenwar -

may allow disclosure, mis-Another source of danger use, or destruction of Unfortunately, this type comes from software that files. Files containing of program iL availeble on is in the public domain.

valuable or sensitive in-many bulletin boards. In As in the French spy formation should not be the movie, the break-in thriller " Software," com-kept on hard disks but accidental'ay caused a puter " viruses" can be should be copied to disk-nuclear emergency. For built into a program ettes which are then kept many viewers, the poten-stored on a disk in a way locked in a safe place.

tial for problems caused that enables them to "in-by the " hacker" seemed fect" other programs and As an added precauticn to,

more frightening than the destroy them. Some sophi-prevent the loss of storec !

nuclear incident because sticated programs can even data, all computer users-this potential seemed much attack every piece of PC, 5520, or mainframe-more real.

sof tware in a PC or con-should regularly create nected mainframe. Thus, duplicate disks to serve Modems and networks have if you use an unauthorized as file backups. This i

made it possible to send software package, you may will give extra protectior I

2

Congressional miQ Misuse of a terminalcan occur when an unauthorized Correspondence

.\\

p person uses a terminal or when an authorzed person Soon to be on-Line uses a terminalin an unauthonzed manner.

Such misuse threatens both the integrity and the privacy of Gerald Paulsen data stored at the terminal and can cometimes com-promise the actual operation of the terminal.

The Congressional Affaira office now maintains hard-copy files of all against accidental, or Back-up yaur PC data on correspondence between the deliberate, erasure of disks and store them in NRC and the members and material.

a eecure area away from staff of the Senate and the terminal.

House of Representatives.

,, g g,

computer systems are vul-Back-up your mainframe When a request for infor-nerable to a variety of data on magnetic tape.

,,ggy,.ic received from a external and internal E

threats unless you take

  • Use file passwords or a r er d to steps to protect them.

other access controls determine whether the sub-on mainframe files. D ject was addressed pre-not post these on your viously and what responue How Can i Help to desk, calendar, or

"" "*a

Keep My Data Safe?

other obvious spote.

cmPuteqaseddatabase

  • Do not disclose the
  • Do not use unauthorized "E#*"***

telephone number, con-software.

nect procedures, your spondence now being devel-Ped will store the full O

password, or account If you suspect your PC text of documents elec-number for any host has been compromised by tronically. Usere will be computer to anyone.

an unauthorized user, able to retrieve earlier f

discover any correspondence using terms

  • Do not let an7one else misuse or abuse of com-f d*

h*

f th*

use your password or puter systems, call NRC documenta, and they will your account

  • Security, Lou Grosman, be able to scan the re-extension X7-4251.

trieved document text on-r Unethical user line very quickly.

behavior causes Notify your account

'"'di"*'

  • i""*di***17 The system will also be breaches of security...

if you no longer re-able to produce periodic quire access to a host reports summarizing Con-system.

gressional correspondence

  • Never use another per-son's passwcrd cr ac-activity. Searches and
  • Read NRC Manual Chapter reports can be pre-defined cm 0904-3, Appendix 2301*

or produced by the user as and the NRC Security and when needed.

  • Do not create profiles Newletter. Address any or procedures contain-questi s on computer The system will be devel-ing user passwords,
  • I
  • ***~

OPed on software called user ids, or system 81 "

88C"rit78 **-

INQUIRE, which provides dn tension 7-4251.

the capability to store and retrieve the full text

  • Do not leave your un-f docunents. (See ITS 80, protected PC, espec-paal ially a PC XT, in an NRC PCs, 5520 systems, and FEEE f.EL1P.E EZ.)

w#

auto-answer mode, or NRC-accessible host sys-with the modem enabled, tems have a fitsi J,ing of.

The text can be searched, TURN IT OFF.

defense-YOU, the user. m using Boolean logic com-3

Chaim:n of 7:ria s ts-bin tions of words. Fur-Person:I Focus:

staal technicci symposie, ther definition of the Joyce Amenta and on the Steering Com-search criteria is pos-mittee of the National sible with the use of me ta was rec atly Computer Conference.

y proximity searches, which appointed Deputy Director i

allow for the selection of for Information Resources y'*

documents containing words Management (IRM) for the achelor s degree from located within a specified fft f administration George Washington Univer-number of words of each and Resources Management.

sity and a master's degree She is responsible for in Public Administration en ralized tufomati" from American University.

In cddition, descriptive resarces including com-She holds the Certificate data fields will be added puter and telecommn ica-in Data Processing, and a to eacn document record to ti s services, infoma-private pilot's license.

enhance the retrieval tion management systems, capability. Included will document systems, records We asked Ms. Amenta to be data items such as date management, and library give us her views on end-received, sender, document services.

user computing and a peek type, document number, at the future of computer-etc.

based technology at NRC.

Here are some of her com-Using INQUIRE, the user can also download the re-Q.

ust what is end-user

~

suits of a search to a e*

computtug7 microcomputer or select h

A. End-user computing is portions of the retrieved an inclusive term used to data, reformat it, and print it in the fem of a h

j describe a variety of ap-report.

i plications such as micro-computers, word process-ffy,*;*

,M.

ing, electronic mail, d'g@h

.j

{

document storage and re-All correspondence with trieval, graphics, and Congressional offices, Joyce henta desktop publishing.

from 1985 on, and all ques-tions and answers related Before her appointment to to hearings will be in-this position at NRC, she Q. What are its benefits cluded in the data base.

was Director of the De-to the program profes-siona17 The data base will be made partment of Transportation available to all NRC em-(DOT) Computer Center, A. The benefits include:

ployees who have a need to and, earlier, Chief of the Information Technology Improved quality of use its contents.

Division in the Office of o

Information Systems and work ranging from re-duced time and effort Telecommunication Policy Math-Tech, Inc. will de.

at DOT. She has also held required to generate and review documents, velop the sof tware, pro-Positions with the United to more informed and cesses, and documentation States Senate Committee on for the system. A proto-Rules and Administration, rapid decisionmaking.

type version of the data the Department of Com-base is planned to be merce, the Census Bureau, available for testing by and Info matics, Inc.

processing n eds.

AuEust 1*

Ms. Amenta served as Cost savings through Vice-Chairman of the Wash-o For further information ington, D.C. Chapter of the elimination of contact Gerald Paulsen.

the Association for Com-labor-intensive proce-dures in areas where extension 2-8309. a puting Machinery, as i

4

cutocction was not respond to nuclear in-user training, ratio of cost-effective in the cidents and accidents.

number of machines to

==

past.

o Implement systems to The /RM Staff Microcomputers are attrac-track issues as requir-W/// [OCUS more tive to the program pro-ed by the Commission, 00 OOOUCE'#idO fessional as a means to Congress, NRC manage-decentra// Zed reduce frustration with ment, and the public.

systems.....

responsiveness of large End-user computing is a centralized data process-t ol which can play a ff g

ing facilities and short-rt in accomp s i

age of technical person-

{ajor g

nel, to provide easy ac-

  • ferent user requirements, stives.

cess to user friendly data base integrity, and Q. What are the principal electronic records trans-l Progrem profess /Ona/S responsibilities and con-nb ween !

,the r

tributions of program pro-

{8j have the Opportunity to fessionals and the IRM P

USB new teChnO/OgieS...

statf to end-user comput-Q. What are some of the ing?

technological advances software, to handle trad:,.-

that will have a major tional management support A. Program professionals impact on computer use?

needs, to control informa-have the opportunity to tion, and to enhance de-use new technologies to A. The end-user computing cisionmaking.

improve the way they do hardva e trend of incress-their jobs and a responsi-ed processing capability Q. How do IRM's initia-bility to take advantage a d mem a

over p c tives relate to end-user of those. opportunities.

cation of this trend is Program professional must that users will perceive a A. IRM's principal initia-realize that their needs need to acquire never tives are to:

for end-user computing technology for fear that resources are not justifi-ea es mme-o Extend the availability cation to duplicate agency of information tech-systems, if their needs cology resources to can be met with existing support growing demands gr planned agency capabil-IRM and users will have to for information on ities.

f new technology to re-The role of ADP profes-quirements, the life-cycle sionals will continue t o Consolidate multiple cost of current invest-document control sys.

change. The IRM staf' ment, and the value of tems and enhance the will focus more on enhanced capabilities.

centralized system to agency-wide decentralized Regardless of these consi-provide full-text re-systems, establishing d m ti m, d u asig trieval within the con-policy for procuring and hardware costs will tend text of appropriate managing end-user g

delivery of informstron resources, and integrating power in the bands of to the public.

diverse technologies t I

r hn of um.

meet the demands for o Centralize computing improved information man-Lowering communication,

resources where appro-agement.

costs are making distri-priate.

Problems IRM faces with buted processing networks feasible and will make o Improve and maintain respect to end-user com-communications within NRC the NRC Operations Cen-puting include compatibil-faster and easier.

ter to allow NRC to ity standards, adequate tcononvoge te 5

w SINET UPDATE

.. ~.

Fran Goldberg O

Now that work has begun in gr4s PILOT " COMMAND CENTER IDMS earnest on the'first Safe" V

Y

'JEI'dQE"^

IN p ia e

Ef4 Tris \\

D^T ^*^65 u^'*8^5E w

can give ITS readers a V

preview of the types of C/

y,,,

data that will be avail-

omi,

^ " * " " " '

^= =

able from the shared SINET g gif

[

[

data bases. Figure 1 pro-v k

vides an overvicw of how 6

P 7

SINET is expected to serve both the technical and MES's' m

V executive-level user.

' C "'

'

  • g"*

The initial machine-read-able sources of data for (Research reactors will to senior NRC managers added later, so that US SINET are shewn on the through the EISIS applica-left side of Figure 1.

tion (see IJS, News, String will eventually contaic These include the Licensee complete information oc 1987).

Event Report (LER) data all docket 50 f acilitic base from Oak Ridge Na-Both the technical staf f tional Laboratory (ORNL),

and executive-level users Included in the UNIT dt Systematic Assessment of of the SINET data bases base will be basic deo Licensee Performance will access the data from scriptive and design 4 (SALP) data stored in PCs. The ITS will provide (such as plant locatis dBASE files from the Re-training and assistance in and design type), nam @

gions, Event Notification u8ing SINET through the key NRC employees ass @

data from the NRC Opera-ITS Training Lab and Sup-ated with the plant (o tions Center computer, and p rt Center. Watch for as the NRR Project Mas power plant data currently more information on SINET and the Resident InspG stored on the computer training in upcoming is-tor), infomation on g system at the National sues r; ITS NEWS.

perfomance (SALP and Institutes of Health. All formance Indicators),

of these data files will daily operating data c be converted, restructur-lected by the NRC Opeg ed, r.nd loaded into

,,S/ NET to provide tions Center via its d SINET's " UNIT" and " EVENT" access to telephone poll, and m3 6ata bases.

integrated UN/T and ly operating and outas EVENT data bases

datareportedbythei censees in their montD Once loaded into SINET, operating reports.

the data will be available for direct access by the The EVENT data base e technical staff for on-line searching and ad hoc Figures 2 and 3 show the initially contain in6 reporting. In addition, types of data that will be tion on all LERs suba stored in the UNIT and since 1984 and Event extracts of the data will fications (all evente EVENT data bases, respect-be transferred in summary ively. The UNIT data base ported under 10 CFR 3 form to the Pilot execu-vill initially contain and other events reps tive information data information about all li-to the NRC Operation bases. There the informa-ter) since 1985. Ae tion will be accessible censed power reactors.

6

Figura 2 o Di8Pisy tha evcnt dz-SINET UNIT DATABASE scriptions for ev:nts iw.in.2cm,*, c. 3 cetm2<.izi that were received by the Operations Center last week for GE boil-ae ing water reactors 5

(BWRs).

l d'=

j u._

l 7,e e

o Dieplay the name of the

.. d 4

plant and eenior resi-m a.~.~

~

,a". O,

E,,,,

dent inspector for all

^

u-UNIT plants in Region 1 with v-p SALP input due in the m,,,,,,

next 3 montha.

!.' **2.

l"".'*".",*

{ olC" y,g When vill SINET be avail-l T,=," }

i o.-==

l u

T'.TJ" j

able for use by the staf f ?

b$55.ht $!$l=:1: 1., !! E *'

$!OE---

Phase I of SINET is sched-ED uled to be completed by September of this year.

ing process will link each user vill be able to get The design of phase II LER with its associated meaningful responses to vill overlap the imple-Event Notification and such requests as:

mentation of phase I.

The assign them a single event scope and associated number so that users can schedule for phase II have Display the event de-easily access all informa-o not yet been fully defin-tion concerning an event.

scriptions for those Plans call for adding events that occurred in ed, but additional data related to the UNIT and other types of event re-1985 at Calvert ':liffs, EVENT data bases is ports, including Construc-including information tion Deficiency Reports from both LERs and expected to be available (under 10 CFR 50.55e) and events reported to the to users by early next 10 CFR Part 21 data, as NRC Operations Center.

year. a well as information on events reported in Prelim-r,ao,. 3 inary Notifict.tions and SINET EVENT DATABASE j

}

Morning Reports from the Regions.

Because most of the data EVENT included in SINET already

'5" 7

exists in various computer j \\s'N systems such as the ones

/

.N i

~

shown on the lef t side of

/

'g

'N, 4

Figure 1, one might well

/

\\

's

,\\-

I c=~'==/~~~l I~t~~~l I~~a~1~~~l I-~,~'~l, j

\\

ask what advantage there i

is in transferring all u.-.

!, oas c." -

)

a-

".,,, ',,l,; eg, i

i i

ii this information to SINET.

g j

,j,=,,,,

j,,,,D*';*;~,,',,, l li,=..4.,i, l l The short answer to this i

L_ P"

L

___j L__L"_" _J t j

question is the single ll' 'O::'.

'""'~

it" C'

it:

'O ~

]

~ ^ ~ ~ ~ ' " " ~

~ ~ ' ~ ~ '

' ~ ' *

  • yd word-int egration. For 1~

the first time, NRC users tii?1 br.ve access to au g --

n

}'

integrated set of data on d

all licensed nuclear power

[~~~ "l m

. n plants. In concrete

~

h-terms, this means that the i

7 4

NRC.lTS TRAINING CALENDAR AUGUST 1987 3

4 dB ASE 111 PLUS 5

6 7

USER GROUP INTRO TO 1:30 W 102 INTRO TO INTRO TO NOVICES

" *... ". = ".. ".. "

NOVICES NOVICES PART1 INTRO TO PART1 PART 2 NOVICES PART 2 10 IUOOPCE O ?C h 1

I4 DISPLAYWRITE 3 PART1 PART 2 PART 1 I

p PART 2 INTRO FOR INTRO FOR INTRO FOR MANAGERS MANAGERS MANAGERS PARE 1 PART 2 PART 3 117 DISPLAYWRITE 3 DISPLAYWRITE 3 dB EIt US dB SEII US PART 1 PART 2 PART 1 PART 2 INTRO TO INTRO TO INTRO TO

,NTRO TO COMMUNICATIONS LOTUS 1-2 3 LOTUS 12-3 PC-DOS AND CROSSTALK PART1 PART 2 124 25 ggRF0 26 0

DISPLAYWRITE 3 DISPLAYWRITE 3 INTRO TO 1:30. W402 PART1 PART 2 dBASE lil PLUS

'*...*=*.......*..........*.*...............

PART 1 INTRO TO INTRO TO INTRO TO dBASE 111 PLUS COMMUNICATIONS PC-DOS PART 2 AND CROSSTALK DISPLAYWRITE 3 PART 1 INTRO TO dBASE Ill PLUS PART 1 EPTEMBER 1987 1 dBASE lit PLUS 2

INTRO TO 3

INTRO TO 4

USER GROUP LOTUS 12-3 LOTUS 12 3

...... 1;33,W.3.....

PART1 PART 2 DISPLAYWRITE 3

...surrrrrrrews.e...

'" f4[f[*db'S'e'iii" COMESPCISONS INTWDg ATE E

iN PLUS - PART 2 AND CROSSTALK 17 8

INTnO TO 9

10 11 DISP A ITE 3 DISP ITE 3 HOLIDAY GRAPHICS USING SIGN-MASTER 6 CHART MASTER 1.... PROGRAMMING IN 14 NTRO TO 15 INTRO TO l16 INTRO TO 17 INTRO TO 18 PROGRAMMING IN NOVICES NOVICES dBASE Ill PLUS dBASE Ill PLUS

.....P.A.R.T. 1................PA R T 2.................P A R T 1.......................P. ART 2........

INTERMEDIATE INTERMEDIATE DISPLAYWRITE 4 DISPLAYWRITE 4 LOTUS 1-2-3 LOTUS 1-2-3 PART 1 PART 2 PART 1 PART 2 121 iNTnO TO 22 INTRO TO 23 INTFsO TO 24 INTRO TO 25 LOTUS 1-2-3 LOTUS 1-2-3 PROGRAMMING IN PROGRAMMING IN dBAgl dBA i PLUS

.....................................................jPLUS PART 1 PART 2 INTERMEDIATE DISPLAYWRITE 4 DISPLAYWRITE 4 DISPLAYWRITE 4 PC-DOS UPGRADE WORKSHOP PART1 PART 2 128 29 30 AIUSER INTERMEDIATE GROUP 1:30, W-102 LOTUS 1-2-3 PART 1 INTERMEDIATE LOTUS 12-3 PART 2

l hard disk mrnegem:nt, with a focus on effective use AINING r s ><ir ct ries-l i

l M

QQ Those who have recently B

Em#

I 1 %#

acquired an IBM XT or who feel the need for review-NEW ITS Lab training class hours ing DOS commands are espe-are 8:30 A.M. to 3:15 P.M.

ci=127 encour*8ed to e=-

roll in these courses.

DisplayWrite 4 training will be 5520/Di oi owriter

      • "i"^"""'"'

available in September. Check the training calendar for dates.

word processing on both Self paced training for WHAT'S NEW AT 5520 and DisplayWriter Caluornia for introdue-terminals is avaziable THE LAB tory classes in both LOTUS every day at the ITS Lab.

1-2-3 and dPASE III Plus.

Using easy-to-follow ma-Patn.. cia Rathbun terials and a simulator (a Kathy Beckman Those interested in ar-desktop teaching machine),

Have Course, Will Travel!

ranging for regional students proceed at their training classes should own rate through a series Two ITS Lab instructors contact Patricia Rathbun, of 10 to 20 minute les-have taken NRC end-user Chief, Workforce Analysis, sons. They learn basic micrococputar training "on Systems and Information, word processing func-the road."

492-8275.

tions-text creation, editing, and printing-In February, Norman Stan-Preview of New Courses which they can use immedi-back went to Region III ately on the 5520 or Dis-in Glenn Ellyn, Illinois Two new one-day courses playWriter terminals in to conduct two sessions of are being offered at the their offices.

" Introduction to End-User ITS Training Laboratory.

Computing for Novices" for They are:

The length of time needed 40 Region III staff mem-to complete these self-bers from the Division of o Introduction to PC-DOS study courses varies with Rescurce Management and both the individual and Administration.

o Inter =ediate PC-DOS the type of course. On Commands the average, students In late May, Arenda Holla-should allow 9 hours1.041667e-4 days <br />0.0025 hours <br />1.488095e-5 weeks <br />3.4245e-6 months <br /> of day presented two one-day The introductory PC-DOS ITS Lab time to master the courses in Region II in class is designed to fa-5520 course and 15 hours1.736111e-4 days <br />0.00417 hours <br />2.480159e-5 weeks <br />5.7075e-6 months <br /> Atlanta. On May 28, she miliarize participants for the DisplayWriter trained 16 resident site with basic PC-DOS com-course.

secretaries. On May 29, mands-DIR, COPY, FORMAT, she conducted hands-on RENAME, and ERASE.

To sign up for this train-training for 20 members of ing, contact your Training the technical staff of the The Intermediate PC-DOS Coordinator for a 5520/

Operator Licensing and Commands Course covers DisplayWriter nomination Operational Programs see-more advanced commancis form. Then call the ITS tions of the Division of such as COMP and DISKCOMP Lab at extension 2-4744 to Reactor Safety.

(fpr comparing file and schedule time for your disks) and SORT, FIND, and t raining. Four simulator Other plans call for a MORE (the filter com-work stations are avail-late summer ITS visit to mands). In particular, able esch day between 8 am Region V in Walnut Creek, this course emphasizes and 4 pm. m 9

dBASE 111 USER s rev2re to a y ne who is PC USER GROUP interested.

GROUP MEETINGS Al Serkiz 1:30 prn, Training Lab To obtain more information about this group, call 3III K'8D8d7 the gr up The NRC dMSE III USERS' dBASE:

First Tuesday GROUP provides a way for each month all levels of dBASE users at the NRC to share ideas Al:

Last Tuesday and programming techni-Odd # Months ques. To become a member, call Garrie Williams, ex-FORTRAN: Last Tuesday PC FORTRAN USER tension 2-4472.

Even # Months GROUP At the April 1987 meeting, Harold VanderMolen Third Artificial Inte111-the group enjoyed two pre-sentations. The first 8**

  • Satellite Sympo-The April 28 meeting of dealt with how to make the sium.,, sponsored by Texas the PC FORTRAN User Group Instruments, dBASE III Plus report featured a presentation by generator perform more Kaz Campe on downloading effectively by useing The roundtable brought FORTRAN programs from the dBASE commands during in-together several well-MV-8000 for use on a PC.

known experts in AI who The downloading and recom-put to set up reports.

discussed the latest de-This was followed by a piling of existing pro-discussion led by Harold velopments in knowledge-grams to run on a PC is Scott on menu-driven pro-based systems, natural one of the major advanta-grams and programming language processing, rapid ges of the FORTRAN lan-techniques for project prototyping, and the inte-guage, because only miner tracking used by RES gration of AI into conven-

,9g f g g

g std f.

ti nal systems. In addi-hhae tion to the panel discus-able product.

We have more recently re-sions, several AI case ceived a variety of sug-histories were explored, Discussion within the gested discussion topics and live questions from group is also continuing from group members that selected locations were on the capabilities of range from explaining dif-answered.

more advanced PC FORTRAN ferences between dBASE III-compilers that are now and dBASE III Plus, to LAN Also, Gerry Tomlin of RES being marketed. Use of Packs. Time permitting, attended an AI Conference these advanced compilers Garrie Williams and I will in Long Beach, California, will make downloading and try to organize presenta-April 21-24 He attended tran fer of even very l

tions on the submitted an all-day symposium on sophisticated FORTRAN pro-topics. As usual, volun-expert systems as well as grams possible.

teers are needed! Anyone meetings on various as-who can help should con-pects of AI including ap-The FORTRAN User Group tact Garrie or me.

plications. A large num-allows members to learn ber of AI firms exhibited from presentations, share Al User Group hardware and software.

ideas, and discuss prob-Numerous expert systems lems. Members range from

{

Lee Lancaster applications on work sta-the very experienced to j

Gerry Tomlin tions and microcomputers the novice. All interest-were demonstrated. Gerry ed persons are welcome.

On April 8th, several mem-picked tp a demonstration To become a member and re-bers of the group attended disk on a PC-based, highly ceive the group's mail-a televised four-hour sem-rated expert system called ings, call Harold Vander-inar entitled: "An AI Pro-First Class. He will be Molen, the group chair, on ductivity Ror.sdtable - The happy to demonstrate the extension 2-7389.

10

I 1

M..amr ma w

l

.a sus M

L E

EM

== N DOCUMENT CONTROL I

M WW SYSTEM NEWSLETTER INDEX 11 -

Category. Thus, E415 is af ter entering AE in the OFFICE TRACKING the 15th report for 1984 Office field, the user under the subject of En-will get the requested gineering evaluations.

information. The user The Document Control System (DCS) is currently will not have to have any special knowledge of AEOD being upgraded to allow codes or DCS terminology.

greater flexibility and After the user pages Microfiche copies of all enhance user friendliness.

through the table, calling AEOD technical reports up the actual report will be only seconds away is quite simple. Using from the user's finger-One change already avail-Search 11, the user puts

tips, able to users is an addi-AE in the Office field and tion to Search 11. This the four-digit code in search, previously called the Task field, and press-Task No., is now called es ENTER. The report If you have problems, help Office Tracking Systems.

should then appear on the is just a phone call away.

A table listing all Office screen.

Ted Cintula, extension of Analysis and Evaluation 2-4434, is the contact for of Operational Data (AEOD) questions about AEOD-technical reports can be related reports. Ques-obtained through this tions on DCS-related mat-search.

ters can be directed to the if0TLINE, extension Document Control 2-8603, which is staffed Search 11 combines tw S Stem HOTLINE from 7am to spm (EST).

Y data elements--Office and John Skoczlas, extension Task--with a docket number 2-9926, is the DCS Project end a date range. For the Officer; he is the contact table listing AEOD re-for questions involving ports, only Office and X2-8603 DCS enhancements. Don Task are necessary. When Lanham, extension 2-2805, a user enters AE in the is the contact for pro-Office field and

"?" HELP blems related to the DCS in the Task field, the stations.

first page of the listing vill appear on the screen.

The Task entry is a four-DCS training is given digit code created by This new Office Tracking twice monthly. Informa-AEOD. Generally, the code search will be more user tion on training is avail-begins with a letter, fol-friendly than the present able by dialing extension loved by three numerals.

system. Even though pre-2-9074..

The letter is the subject 1987 AEOD reports have designator. The first been available through numeral is the year the Search 8, no listing of report was issued. The all reports was access-last two are a series ible. Now, by placing 11st2ng for the subject

"?" HELP in the Task field 11 c>

l l

l si in7 NOTES 1

This section of the news-Misplaced Manuals MYDIR contains programs letter provides tips and and data. The commands in technical information of As a result of various MYBAT. BAT would be interest to NRC micro-and reorganizations and moves, mainframe computer users.

many PC, printer, and ECHO OFF If you have any questions modem manuals did not end PATH C:\\DBASE regarding the Tech Notes up in the same spot as the CD\\MYDIR or if you wish to contri-equipment they explain.

DBASE MAIN bute an item for publica-If you have any manuals CD\\

tion, contact the ITS for equipment that does PATH; Support Center on exten-not reside in your office ECB0 ON sion 2-4160.

or vicinity, please send them to ITS, P-808, for The PATH; command in this redistribution. Other example resets the search users will be grateful!

path to null. Typing just PATH with no parameters PERSONAL COMPUTERS will display the current DOS PATH Command path setting.

Ending your Software In order for s user to access data bases created dBASE Report Generator for different applications in separate subdirector-The dBASE report generator Remember when you have ies, it is often necessary can meet most of your re-finished using a software to develop a batch file to port needs and eliminate package, don't just turn access the data / program the need for a lot of pro-off your machine. First directory and the vendor gramming.

exit the software you are software directory.

using and return to DOS.

If you fail to do so, you In setting up a batch One important feature of could lose your data. If file, many users will find the report generator that your software " locks up" they need to use the PATH helps in format 2ng repotts and will not respond to command to access programs is its ability to display any commands, try pressing that reside in the vendor one field over another by CTRL + BREAK or CTRL +Z to softw3re directory. The the use of a semi-colon, free the software. If you PATH command causes DOF to such as cannot free the software, search the specified di-remove any disks (except rectories for files not FIELD 1+';'+ FIELD 2 DOS in the A drive, for a found in the current di-PC) before performing a rectory. In the example This will display the con-warm boot (CTRL + ALT, then below, a batch file called tents of FIELD 2 underneath DEL) or cold boot (turning MYEAT. BAT has been devel-FIELD 1.

dBASE only prints your machine off and on).

oped. It automatically 28 columns per page, but If you still have trouble, executes from the C root this technique permits you call the ITS Support directory a user applica-to display more than 28 Center for help, extension tion called MAIN in a sub-data fields 2n a report.

2-4160.

directory called MYDIR.

12

M M TECH

-- G NOTES

~

l l

Another feature of the the command displayed ABC is a good way to learn report generator is its using the same method as WLBUR or OS JCL, or just ability to display compu-with MODIFY.

Instead of to become more familiar ted fields.

If, for exam-the ALTERST prompt, a with r.dvanced WLBUR com-ple, a field must be mul-colon (:) is used for mands. Any user who has a tiplied by 0.06 and the prompting for alterations.

WLBUR account / initial set product added to another When a carriage return may sign on and take any field, this calculation (ENTER) is entered in re-one of the ABC courses.

could be displayed in a sponse to the colon column by (FIELD 1 *.06) +

prompt, the command is FIELD 2.

More complex executed.

To take a course, a user formulas can also be need only sign on to developed.

. Retrying is not limited to WLBUR and type the com-the last command entered.

mand ENTER ABC. A user It is good to remember By including an ordinal accessing the ABC system that virtually any legal number (i.e., IST, 2ND, for the first time will be dBASE function may be used 3RD, 4TH, STB) following assigned a student-ID and in the fields of a report.

RETRY, any of the last given a general introduc-five commands can be r.e-tion to the use of the ABC tried. If a command other system.

than the last ec:. mand is MAINFRAME COMPUTERS retried, it is then made The following courses are the most recent command available on the ABC executed in the list of system: Computer Literacy, NIH c mands. The SET RETRY Innoduction to Program command can be used to Logic, Introduction to Job aatematically retry a com-Control Language, Intro-mand that ended with an duction to WLBUR, WLBUR WLBUR RETRY Command error. The SET NO RETRY SET Commands and PROFILE, reverts back to the de-Document Formatting with How often have you made a fault, which issues the WLBUR, and Multiple Act-typographical error and error message for commands ive Files.

had to retype an entire issued in error, and then command?

Or, how many prompts for the next com-For help or more informa-times have you retyped a mand. SHOW RETRY vill tion about the ABC system, command in order to re-display which mode of call the ITS Support issue the same comma"4 operation is in effect.

Center, extension 2-4160.

with only minor modifica-tions?

WLBUR Profiles ABC Courses W LBUR has a facility that After signing on to allows the user to retry The NIH Computer Facility WLLUR, most users find it any of the last five com-provides interactive on-necessary to issue one or mands entered. The RETRY line training for WLBUR more SET commands, such as command (with no options) users. This training is SET VOLUME, SET UPPER, or lists the last command called Independent Train-SET LENGTH, or to enter a issued sud gives the user ing Assisted By Computer long command each time the opportunity to modify or just ABC for short.

they log-on.

13

= _ _

s.

47 NOTES WLBUR can automatically up, you can! WYLBUR lets NIH Mainframe Access issue any comand at sign you create your own com-on through a mechanism mand s.

To use the NIH computer called the " profile" fac-facility you must have an ility. This facility re-Let's say that you had to Account and Initial pair, duces the amount of typing run a report by typing in which have an associated necessary to sign on, the command EXECUTE FROM keyword.

which makes it possible

&AAAAIII.SIGNIFICANT.EVEN-The Account is a four-for a user to sign on T. REPORT ON CAT several digit code that is used by faster and with les s times a day. You could the computer center to chance of error.

use the WLBUR SET COMMAND keep track of the computer to create your own com-This facility is equiva-mand. To type just the m m ces you use. Your acc m is Wed etMy.

lent to an autoexec batch word REPORT to run the Many PeoP e can share the l

file on a PC.

To use the above command, you would same ace m t code.

profile facility, all a type the following: SET user has to do ia collect COMMA!!D REPORT: EXECUTE gg the commands into a file FROM &AAAAIII.SIGNIFICANT.

digit code that identifies that is normally issued EVENT. REPORT ON CAT. Now you as an individual com-each time a user signs on every time you wanted t puter uset.

and issue the SET PROFILE run your repert, you would command. The SET PROFILE just type the command RE-The keyword is the pass-command creates a data set PORT. This command stays word by which the computer under the user s account in effect until the ses-reconizes you as the and initials called sion is ended, and a CLEAR rightful owner of the ac-

@WLBUR. PROFILE. This is COMMAND REPORT or a CLEAR count and initial pair.

the data set that a user COMMANDS is issued. To You should not tell anyone would use to modify his or make a command permanent, your keyword, and it is a her profile.

you would place the com-good idea to < hange your mand in your WLBUR For more information or PROFILE (see the Tech note keyword periodically. You may do this by typing the help on WLBUR profiles on WLBUR profiles in this WLBUR command SET KEY-refer to the WLBUR refer-issue). To see all th ence manuals available at user-defined commands ?

WORD, or you may submit a in batch job using the NIH the ITS Support Center or your session, you would KEYSET program.

ask an ITS consultant, type the command SE0W extension 2-4160.

COMMANDS.

To gain access to the NIH mainframe computer, you WLBUR User-Defined For more information on must complete NRC FORM 380. Questions on this Commands defining your own commands refer to the WLBUR com-form should be directed to How often do you find mand procedure manual Mike King, extension yourself typing in a 1cng (available at the ITS Sup-2-8304. For other infor-frequently used, WYLBUR port Center) or call the mation about the NIH com-command, wishing you could Support Center for help, Puter facility, call the shorten it? Well cheer extension 2-4160.

ITS Support Center, exten-sion 2-4160.

14

i suum -

1 W

E-M M

l M

mens N

~

DISSPLA Version 9.0 ed by CDC. User programs error message on the Retires should now call version 5.

screen. DO NOT TURN OFF THE TERMINAL.

l NIH retired DISSPLA ver-sion 9.0 on June ~20, 1987.

Using UPDATE?

l Any attempt to edit a PL Communication Software Any DISSPLA program that (UPDATE Old 1) without Allows PC to Emulate P

uses DISSPLA 9.0 data files that begin with using UPDATE is hazard-VT100 Terminal NIII. DIS 90 must be relinked us to the health of your file. If you do not know CONNECT communication to run. These data files the format of an UPDATE software for accessing disappeared when version 9.0 was retired. Users file, use the program INEL allows your PC to who have not relinked ITEMIZE to test record emulate a VT100 terminal, their DISSPLA version 9.0 types. UPLR indicates a and use FSE (all features) programs in version 10.0 random PL; if the first and error-free file trans-should do so immediately.

record is CHECKA4, the fer. For more informa-file is a sequential PL.

tion, call Emily Robinson, extension 2-8316.

For more information, re-Large program PLs run fer to NIH INTERFACE num-faster if they are in ran-ber 137 available at the dom format, and UPDATE directives can be listed ITS Support Center, Data General in any order.

IMSL (Problem Solving Software System for Math-

. Expiration Date Warnings ematical and Statistical INEL FORTRAN Programming), ver-INEL users now get a warn-sion 9 has been available NOS Operating System on ing about their passvord on the DG MV8000. Version The CYBER 176 Upgraded expiration date each time 10 is now ready and will they log-on.

INEL sends be installed this summer.

NOS Operating System on renewal forms to users 6 the CYBER 176 was upgraded weeks before their pass-to release 644 on May 16.

words expire.

As a result, certain pro-given any special direc-grams, may have to be re-tions via LOG 1N messages linked. New manuals are Terminal Lockups During available in the ITS Sup-Log-on SP ete. The new version l

C port Center library.

Terminals may lock-up is generally easier to use but some programs which during incorrect log-ons used version 9 vill need SORT / MERGE Version 4 and repeated attempts to t be re-compiled under Obsolete enter a password. If you version 10 in order to encounter such problems, SORT / MERGE version 4 is call ITS, extension execute properly, obsolete and not support-2-4160, and describe the 15