***************** General Technical Terms Used Locally ********************* This information was collected to fill specific mission related local requirements for local personnel to provide practical, working definitions of technical terms used locally and to provide a collection/distribution media for ATE/CAE information not elsewhere recorded. No attempt has been made to exhaustively define terms beyond the level required for current local use. Any other application of this information is beyond its intended scope and is entirely at the user's risk. Working definitions imply judgment calls. These are the personal, private, professional opinions of the editor and in no way reflect an endorsement or condemnation by any official body. Factual information is believed accurate and to the extent practical has been verified. As is obvious from the diversity of styles, this is a compilation of Engineering Notes, clipped published materials and training materials used primarily for the training of COOP Students and New-Hire Engineers/Techs. Portions of this material range back more than ten years and must be viewed with some caution (the "half-life" of technical information is about 4 years). Errors and candidates for inclusion should be mailed to the system manager (root). Be Patient. This is strictly a "Burn-Out" task worked on in time otherwise not productively usable. This information exists for training purposes. This file exists for testing purposes...when printed out to check for transmission errors, dropped bits, printer/printer driver or link mal- functions, a successfully produced hardcopy can be handed on as a training aid...an equivalent in "The Quick Brown Fox" is scrap paper. ---------------------------------------------------------------------------- * * Copyrighted to the Public Domain. Unlimited Distribution Authorized. * * User Assumes All Risks/Liabilities. * ---------------------------------------------------------------------------- -A- >A Law. A weighted scale applied to audio signals on telephone circuits to more accurately reflect "loudness". One of two widely used weighting scales, the other being "mu Law" or "u Law". A scale related to the latter is the u255 scale, a weighting scale popular in Europe. +ABC. Atanasoff-Berry Computer. Established by the Courts (1973) to be the first successful digital computer DESIGN, this machine could solve a system of 29 linear equations in 29 unknowns to an accuracy of 15 decimal places (more than 48 bits). Designed in 1939 and developed into Proof-of-Concept phase on a $5K budget (the MARK I began w/ $1 Million), the ABC included such advanced concepts as DRAM, binary ALU and logic circuits rather than the pulse-train/counter (Tabulator) technology of ENIAC. A two man project, ABC's designer was John V. Atanasoff, a professor at Iowa State University (Ames, Ia). Clifford Berry, a graduate student, performed the actual fabri- cation, the results of which survive in newspaper photos published at the time. Letters exchanged w/ ENIAC's John Mauchy (and a visit in 1941) trans- planted much of ABC's innovation into ENIAC. Atanasoff did not seek patents on his work, but Mauchy did. Granted in 1964, invalidated in 1973, these patents could have seriously inhibited the explosive growth of the microcom- puter. ---> An historical note: Special purpose electronic computers popped up in several places around 1940, including Germany. Except for the proposals sent to the German Army, little remains of the "Z" computers built in Berlin. There is evidence that a general purpose electronic digital computer was demonstrated to the German Air Force (they didn't want it) prior to the 1943 bomb attacks that destroyed it and its creators. Atanasoff joined the Naval Research Laboratory (NRL) Washington, DC. Judging by his testimony during the UNIVAC trial, it appears his "oversight" in protecting his invention was his way of placing his work into the Public Domain without interference from the War Dept. >Absolute Filter. A dry paper filter capable of trapping particles as small as tobacco smoke. Used in disk drives. >Ack/Nack. A protocol in which the return of one of two special characters indicates the acceptance or rejection of a block of data. >ACM. Association for Computing Machinery. A worldwide organization of Computer Scientists, Engineers and Technologists resembling the IEEE Computer Society. Largest of its kind, ACM yearly awards the "Turing Award" for outstanding contributions to the state of the art in Computers. >Acoustic Coupler. A method of coupling modem tones to/from a telephone hand- set without an electrical interconnection. Now largely displaced by Modular RJ-11 plugs and FCC registeration. >A/D. Analog to Digital Converter. A class of devices that convert an input signal into a numeric representation. Ranges from very precise (but slow) DC systems called "Digital Voltmeters" (DVM) to very fast (but low precision) units called "Flash Converters", including some interesting variations such as the Tektronix Transient Digitizer, which uses a scan conversion (oscillo- graphic) technique. The basic trade-off is speed vs precision. Higher speeds allow the tracking of faster input signals. Many innovative varia- tions exist. Most units are ranked by bits of precision, e.g., a "12 Bit A/D Converter". >Ada. A general purpose DOD language designed by committee and written (in large part) by the French firm Honeywell-Bull. The Ada project grew from a study showing maintenance to be the dominant lifecycle cost factor for soft- ware (which is true). Developed via competitive run-off through an evolving series of performance specifications, Ada jelled about the time Pascal's influence peaked (before actual use disclosed its labor intensive nature). Clearly a superset of Pascal, Ada proved to be even more laborious to use. Part of this comes from the inclusion of "Bells and Whistles" necessary to make a single language be all things to all people. Ada has effectively banned the creation of tools ala 'C' or Fortran substituting a closed set of "approved" tools. An elaborate scheme of safeguards has been designed to protect the programmer from errors (and himself). These have blown compiler implementations out of shape, making them very large, slow and expensive. DOD plans to "validate" compilers via an "exhaustive" suite of tests and refuses to authorize subsets of the language. Eminent Computer Scientists (including the winner of the 1982 ACM Tunning Award who helped design the Ada language) seriously doubt it will ever be successfully debugged. Ada in- cludes constructs supporting real-time applications (such as weapons control), a role for which it is poorly suited due to the high overhead associated w/ its highly modular design (See Context Switching). As the first validated compilers came on-line (1984), DOD backed away from its universal Ada mandate imposed earlier. There is a very real possibility that Ada will end up like ATLAS and previous DOD "Universal Languages" (JOVIAL, CMS2, etc.) which are confined to a narrow range of strictly military appli- cations. There is also the possibility that DOD has spent $150 Million on a language too expensive even for it to use. ---> Update 90: ---------- The Score Sheet on Ada ----------------------- 1. Ada was Benchmarked against COBOL. COBOL won. 2. Ada failed to win Industry converts. Fortran & C dominate. 3. Ada failed to win University Support. CS Students are told, "Forget Ada". 4. Ada Libraries & Programming Environments are Vaporware. 5. Full Ada Compilers are Slow and Expensive: $4K for a PC vs $99 for C. 6. Ada Executables are Large & Slow. 4-6 times more so than C. 7. Ada is NOT FIPS-151 (Posix) Compliant. NASA & NIST Document this in Depth. 8. Ada FY-91 R&D Funding was Zeroed. ($100 Million was requested). 9. Ada's "Test Case" FAA Air-Traffic system is 5 years late & $7 Billion over budget. IBM is prime contractor. 10.Congress imposed (1991) an Ada-Only Mandate, but added a "Where Cost Effective" clause, which negates the Mandate (See Below). Ada advocates have clearly overstated the cost saving Ada can deliver and understated costs associated w/ its use. Whether a Posix version will be produced in the Commercial Market is doubtful. Ada is currently being bantered about as a "Born Again" Object-Oriented Language, which it is not. The inability to comply with Posix and the resounding success of C/C++ represent Ada's greatest threats. DOD mandate to the contrary, Posix/GOSIP standards have real teeth and firm Congressional backing. Barred from its "FediCare" market, out-done and out-gunned by C/C++, Ada is in Serious Danger of following its namesake to an early grave: +Ada. Augusta Ada Gordon (1816-1851), Countess of Lovelace. Daughter of Lord Byron, club-footed Poet Laureate of England and all around scoundrel whose amorous adventures in real life surpass those of the fictional Don Juan. Reflecting the interests of Lord Byron's wife, the former Anabelle Milbanke (a titled lady in her own right and the daughter of a high govern- mental official comparable to our Attorney General), Ada displayed talent in mathematics and ended up associated with Babbage during the period when he used his Difference Engine to construct mathematical tables. Ada is said to have coded some of the algorithms used, thereby making her the world's first computer programmer. Jack Cooper of NAVMAT renamed DOD-1 (the new standard language) "Ada" in her honor in 1979. That may prove more appropriate than originally intended. There is a mystery surrounding the parentage of Ada and the terms of Lord Byron's separation from his wife (they were never divorced). It is known that a furious scandal broke out about the time Ada was born, a scandal serious enough to drive Lord Byron from England for the rest of his life. It is also known that he had a long term affair with his half sister, Augusta Leigh, from which at least one child (Medora) was born (July, 1813). This was one of the factors (the death of his mother being another) leading to his marriage to Lady Milbanke. Given Ada's first name (not a likely choice under the circumstances) and that the official records were (and remain) sealed by the Crown, some authorities conclude that Ada was the illegitimate offspring of long term incestuous inbreeding, a charge also leveled at the language that bears her name. >ADCCP. Advanced Data Communications Control Procedure. ANSI's HDLC. (See HDLC & SDLC). >ADP. Automated Data Processing. The old terms for IRM, Information Resource Management. The Realm of Computer Science. >ADPE. Automated Data Processing Equipment. >ALGOL. A variable star of the second magnitude in the constellation Perse- us. An 'Also Ran' language (ALGOL-60) specifically designed to optimize the performance of its compiler via manually inserted cues. The intent was to improve language transportability by making its compiler easier (less expen- sive) to write. (See Also 'Systems, Evolution of'). Notable for the estab- lishment of 'Structure Programming' constructs (IF-THEN-ELSE, CASE, etc.). Taproot of Pascal, 'C' and Ada. Product of a 1958 ACM effort better known in Europe than here. Never popular outside the university environment due to the labor intensive nature of its complex syntax. >AKA. Also Known As. An Alias. >Algorithm. Originally a mathematical formula or process. Now a method to accomplish some specific task. >Algorithmic Pattern Generation. The on-line real time generation of stimu- lus/response test vectors in support of functional testing. Widely used in RAM testers. Hindered by the need for very fast CPUs and simplistic pattern algorithms. >Alphageometric. Any scheme of describing pictures using alphanumeric (text) characters. Implies a vector/picture element approach ala RMDraw rather than a dot pattern approach ala PC-Paint. >Alphanumeric. Consisting of both text (A-Z) and numeric (0-9) characters. Implies the ability to handle (as a minimum) the 64 character subset of ASCII. >ALU. Arithmetic Logic Unit. The computational section of a computer. >A.M. Amplitude Modulation. An analog technique which impresses information onto a carrier signal by varying its signal strength (amplitude). Often combined with PSK in modems. See QAM. >Analog. Said of information. The information content of a signal is con- tained in the waveshape itself. Since there is no basic predictability in an analog signal, noise and distortion cannot be readily separated from the original waveform. >Analog Computer. A collection of very high gain amplifiers, called "Opera- tional Amplifiers" or "Op Amps" run under high degenerative (negative) feed- back. Excellent for modeling processes involving integration or differen- tials, suffers from temperature drift and component shifts due to aging. Generally considered obsolete. +Analog Computer, History of. Ignoring some early navigational aids (See Also Stonehenge), the first analog computer was "Napier's Bones". So named for John Napier(1550-1617), Laird of Merchiston, a Scottish mathematician who discovered Natural (base 'e') logarithms. His "Bones" were sticks of wood marked off in logarithmic scales. Calculations were made by arranging them so that physical distances (representing the numeric values) were mechanical- ly added or subtracted. Mechanical calculators spun off an interesting gender of electromechanical analog computers called "Difference Analyzers", much used by Naval Fire Control systems throughout WWII (and still used by the USS New Jersey in her main battery (16 inch) gun directors). These reached their peak of development in the late 1930's under Vannevar Bush (1890-1974) who set down the principles by which all modern analog computers operate. D.B.Parkinson and C.A.Lovell of Bell Labs developed the first suc- cessful electronic analog computer and immediately applied it to the Mk 9 Anti-Aircraft gun director (1940). Directly competitive with digital comput- ers through the 1950's, analog computers were widely used to model mechanical systems and to solve problems involving integral and differential calculus. For a time, the advancements in solid state electronics more greatly benefit- ed analog computers than digital computers, providing Operational Amplifiers of such precision as to be called "Computing Amplifiers". The increasing power, decreasing cost and evolving techniques of numerical analysis associ- ated with digital computers spelled the phase out of analog machines as serious research tools by the middle 1960's (EK saw one of the last such machines at U of Ia). Analog computer techniques, however, continue to serve diverse roles in instrumenta- tion, automation and control systems. >ANSI. American National Standards Institute. The USA's Representative to ISO. IEEE, EIA, and NBS all recommend statards to ANSI. >Anti-Aliasing. A filtering process by which false responses are removed. Aliasing arises when a signal is sampled below its Nyquist Rate. Sometimes this is done intentionally (as in Sampling Scopes). Radio and TV a process called "Super Hetrodyne" ( aliasing), but may experience "ghosts" (TV) or "birdies" (Radio) from "Out-of-Band" signals. Failure to recongnize a spurious response (they often appear quite genuine) can be embarrassing. Consider how the FBI must have felt when they discovered that the "Lady in Red" had fingered the wrong man. Supposedly shot dead, Dillenger sent Christmas greetings from Argentina for decades thereafter. (Source: A Great-Grandniece working here). >APL. A Programming Language. Title of a book by Dr. Kenneth Inverson (Wiley,1962) describing a form of mathematical shorthand useful for solving problems involving arrays, vectors and field theory. An IBM computer lan- guage (1965). Very Powerful. Highly obtuse. Virtually unreadable. Requires a special character set. Reads right to left (backwards). Has a small (but avid) body of users. >Archive. A file which is made up of the contents of other files. Usually some utility program such as Unix's "ar" tool is used to create and maintain archives which, generally, are data compressed for more compact storage. >ARQ. Automatic Retransmission Request. Specifically, the code word in a link protocol scheme requesting retransmission of a busted data block (origi- nated by BiSync). Generically, any scheme to correct bit errors in a serial data stream by segmenting traffic into "Data Blocks" protected by a BCC which, if found in error, triggers an automatic discard/retransmit cycle. Used by BiSync, SNA, DECNET, packet switched nets and some LANs. As BER climbs, effective channel throughput falls, becoming effectively zero at about 1/100 BER (about the noise level of a Dialup Telephone line). See Also Forward Error Correction. >Array Processor. A small peripheral computer specifically designed to do matrix math and/or DSP algorithms (e.g. FFT) very rapidly. >Artifact. An image, voltage, reading, etc. left over from a previous test run. Unless cleared away, these can cause puzzling failures which really aren't. >Aspect Ratio. The ratio of the height to width for an object, character or plotting universe. When the aspect ratio of the universe in which a figure is plotted differs significantly from that of the universe in which it was created, circles become flattened, labels drift out of alignment and the whole image seems to be "stretched" out of shape. >Assembly Language. The native binary code for the computer under discussion converted one-to-one to (usually) 3 letter representations called "mnemonics". Typically 10 times harder to write than a high level language like Fortran. Virtually unmaintainable. Difficult to Debug. Fast. Re- quires tools such as assemblers, linkers, monitors and debugging aids. Minimal use advised. >Asynchronous. Said of data communications processes. Also called "Start/ Stop". A scheme to control the build up of timing error by resynchronizing the distant end each character cycle using character framing bits called "Start" and "Stop" bits. Originally a teletype technique, it is still used widely. >ASCII. American Standard Code for Information Interchange. An 8 bit code in which 7 bits are defined. By tradition, the 8th bit is used for parity checking during telecommunications. Seven level ASCII has 128 characters, 96 of which are printable. Six level ASCII has only upper case characters, 64 of which are printable. Four level ACSII is 8-4-2-1 BCD. ANSI Standard X3.4-1977 (Revised 1983). Also ISO-STD-646 and CCITT Alphabet No. 5. >ARPANET. Advanced Research Projects Agency Network. Operational 1969. The first successful packet switch network. Now old and difficult to expand/maintain. Split c1985 into MILNET (Also called DDN) for DOD and ARPA- NET for everyone else. Based on TCP/IP. MILNET is accessible thru a gateway in DP via Sytek. >ASIC. Application Specific Integrated Circuit. The "Now" name for "Semi- Custom" ICs. ASICs are designed much like PCBs in the jelly-bean chip era, i.e., the "DIPs" are now "Standard Cells" and the printed wiring is now the metallization. Avoiding pinouts increases speed, improves reliability and simplifies designs. On the down side, ASICs are a repairman's nightmare since, by definition, they are non-standard (and probably unavailable down- stream). >ATE. Automatic Test Equipment. A machine used to test electronic parts/ assemblies. Consists of: A Test Head (to mount "Fixtures"), a pool of re- sources (stimulus/response instrumentation, power sources, etc), a switch matrix and a controller. (Absence of the switch matrix implies a single purpose "Test Set"; ATE implies general purpose applications). System re- sources are generally shared and usually are not stand-alone boxes (the "Rack-and-Stack" ATE being an exception), although discrete instruments may be incorporated (as VS-5 on the 3270 ATE incorporates an HP-2961 DPS). ATE implies a system level integration that normally includes a "Test Language". ATE may be small ("Bench-Top"), but usually is big, frequently weighing several tons (3 for the L260) and costing multiple Millions of dollars. +ATE Programs. ATE represents one extreme of the software envelope. Classi- cal Data Processing (DP) and Real-Time Environments (RTE) form the other two. In DP applications, the focus is inward toward the CPU w/ data structure being the predominant program design factor. DP programs should be highly modular w/ very simple control structures. RTE encompasses data communica- tions and other like situations in which the focus is outward from the CPU. Programs and control structures are very simple to insure adequate speed in servicing "interrupts". An RTE system does not have a "program flow"; it has a game plan for responding to "tickles" from the outside world. ATE is so unlike both of these that a strong argument can be made that an ATE program is not computer software at all. In ATE, data structures are trivial, pro- gram flow is linear and control structures are complex. The CPU exists as a "window" through which the programmer fiddles with the instrumentation there- by performing the intended tests. ATE programming is the programming of testing resources, not computers. Under "Store-and-Test" operation (the most common approach), the test situation is set up and the computer is placed in a WAIT state until the measurements have been taken. The computer is too slow to participate; it is a witness, nothing more. >ATLAS. Abbreviated Test Language for Avionic Systems. A DOD "Standard" ATE language hyped as THE answer to ATE program portability. Actual ATE program transportability involves these seven factors: 1. Hardware Capabilities --> Can't Use What's Not There. 2. Machine Configuration --> Wiring Must Match. 3. Fixturing --> Must Get to DUT. 4. Operator Interface --> Instructions/Options/Intended Use. 5. Data Collection/Presentation/Formatting/Storage. 6. Operating System --> Type/Version. 7. Language --> Syntax/Structure/Flow. ATLAS addresses only Language. Successful within the framework of NAVAIR's VAST (Versatile Avionics Shop Tester), which controls the remaining six factors, ATLAS became IEEE-461-1976 by changing 'Avionics' to 'All' in the acronym. Card Image oriented. Strong in constructs which set up instrumen- tation prior to test execution, but weak in hardware specific constructs necessary to perform the actual test. Compiled. Lacks interactive and User Friendly constructs and is severely limited in the data analysis area. ---> Update 89: A new version, C/ATLAS is IEEE-716-89. It adds the statement constructs of the "C" language but none of the compactness, power or flexi- bility while retaining the user hostile unnatural card-image syntax of previ- ous ATLAS implementations. Avoid. >AUTODIN. A worldwide secure message switch system designed and operated by Western Union, leased to DOD. Now outdated. >Automatic Program Generator. A class of programs that write made to order programs. Good results have been obtained in limited range applications, e.g., report writers for DBMS systems. Locally, S.E.T.U.P. generates up to 80% of the text for 3270 ATE test programs (done primarily to enforce a standardized format). Despite claims to the contrary, machine written pro- grams always have more overhead, take longer to execute and are frequently less easily maintained than regular (custom) software. Still, a semiskilled user may well obtain acceptable results quickly with little effort from an APG package. >AUTOVON. A worldwide voice network operated by DOD to support its opera- tions. >awk. A Unix Filter that is a line/field oriented pattern match/action language resembling pseudo-code. Awk programs are very short, usually a few lines, and frequently perform almost magical text transformations. Created in 1977 by Alfred Aho, Peter Weinberger and Brian Kernighan (co-authored of "C") and significantly expanded as nwak ("new awk") in 1985. While AT&T maintains otherwise, insiders report awk originated with Kernighan's frustra- tions in updating his telephone listings file using "C", hence the "Quick-N- Dirty" syntax and powerful search/action language which blends the "regular expressions" of the Shell into "C" itself. Absolutely magic. Highly Recom- mended. -B- +Babbage, Charles. (1792-1872) Inventor of the locomotive "Cowcatcher" and one of several mathematicians instrumental in bringing about the adoption of the 'd' notation in Calculus. A professor of mathematics at Cambridge. Designer of a successful hand operated integer computer he called a "Differ- ence Engine" (1822), which he used to calculate a number of math tables used widely. Over the years, he planned an enhanced version of his machine and spent some 23,000 pounds (6,000 of which was his own money) attempting to build it. By the time he abandoned that project in favor of his ultimate dream machine, the "Analytical Engine" (1833), he had exhausted both his governmental and personal resources. To finance this new venture, he used the Difference Engine in a scheme to handicap horse races, a matter that went well enough at the start and then went broke in a flurry of increasingly desperate bets. The Analytical Engine, a binary computer capable to doing decimal math, was never built. Later analysis of his design disclosed it to be surprisingly advanced, featuring about 15Kb of mechanical RAM, punched card input and stored control programs with the ability to alter execution based on computed results. Perhaps too intricate to have been fabricated given the technology of the time, the Analytical Engine, Babbage himself and binary computers in general fell under a cloud as a result of his racing venture that lasted over a hundred years. Revived by Howard Aiken of Harvard who approached IBM in 1936, the Analytical Engine got a million dollar new lease on life. The war, however, demanded immediate results and the actual machine, the Mark I was much changed having dropped many of Babbage's innova- tive concepts. The "Advanced Difference Engine" was successfully fabricated by a Swede (for which he was Knighted) and demonstrated at the Paris World's Fair (for which the Effel Tower was built). Sold to an observatory in New York state, it served many years before ending up on display at the Smithso- nian. >Backup. The process of making a copy of all or part of the file system in order to preserve it should a system crash occur (usually due to a power failure, hardware error, etc.). This is a highly recommended practice. >Balanced line. A data transmission method in which both wires of a twist pair are driven (out of phase). Provides significant advantages over Common Mode Noise, which is induced equally on both wires. >Bank Switching. A method of extending the addressing range of a CPU to cover larger memory areas. Based on a "base address register", bank switch- ing breaks RAM into "Pages" of RAM (often in 64K chunks). >Bar Code. A scheme for representing alphanumeric data in the form of thick and thin bars. Popular formats including "3 of 9" and UPCs used on grocer- ies. Read with either a handheld photo-optical wand or a fixed "scanner". >BaseBand. Said of LANs. A digital technique in which the data is sent as DC pulses on a transmission line. The sharp edges of the digital signals result in sidebands splashed over a wide spectrum. Used on twisted pair or coax. Sometimes on fiber optic cables. Example: Ethernet. >BASIC. Beginner's All-Purpose Symbolic Instruction Code. Introduced in 1962 as a means of teaching FORTRAN. Quickly overran FORTRAN as the widest used language. First officially recognized as ANSI Minimal BASIC developed at Dartmouth College in 1974. Never popular, Dartmouth BASIC did much to further the feeling that BASIC is a toy. MicroSoft BASIC appeared first on the TRS-80 Level II computer and later on CP/M to become a defacto standard. A fully featured BASIC, MicroSoft put BASIC back into the serious language category. Hewlett-Packard's "Rocky Mountain" BASIC extended the reach of the language by theft from APL, PL/1, ALGOL, Pascal and Fortran. Extended slightly, this is the ANSI BASIC-89 standard. Usually interpretive, sometimes compiled. Line oriented. Easy to learn and use. Very powerful. ---> Update 90: Released 1 Jan 90, PowerBasic 2.0 represents the first of the ANSI/ISO compliant PC Basics. Gone are the Line Numbers and need for GOTOs that marred previous versions. It looks like Pascal without the silly semicolons, reads like Basic and runs like wildfire. The IDE (Integrated Development Environment) resembles Turbo-C. The compiler rips 30,000+ lines/ minute and the code is nearly as compact as C and nearly as fast (particularly doing Strings). There is a trend in ATE machines away from Pascal (which proved overly modular) back to Basic. You can do more, faster in Basic than any other language. The ultimate combination, Basic w/ calls to C, isn't here yet. Stay Tuned. >Batch. An antique style of computer operation in which jobs are submitted (often on punch cards), run and returned w/o user interaction ala a laundry service. Worthless in this form, Batch survives as an option on some time- share systems (normally a lower cost option) whereby the user queues his job to run at a lower priority w/o interaction. The user may then sign off and pick up the results later. Often used for simulation tasks once the obvious errors have been smoked out of the model as such computational intensive tasks have long run times and produce little output of note until near the very end. >Batch Stream. A file containing pseudo-keyboard entries. When activated the file carries out some useful task. Used by DEC, Univac, and others. Called ".BAT" files on IBM-PC clones. >Baud. The signaling rate on a communications path. Unless some bit com- pression technique like Quadrature Shift PSK is used, the baud rate and bits/second rate are equal. Named after the inventor of TTY, Baudot. >Baudot. A 5 bit TTY code once widely used by DOD. Baudot machines are easily identified by the presence of keys marked [LETTERS] and [FIGURES] and the absence of conventional typewriter shift keys (Baudot code does not support Lower case text) on the keyboard. +Baudot, Jean. ( ) Officer of the French Telegraph Service and inventor of the first practical printing telegraph machine (Teletype) and the code by which it ran (which was named in his honor). Demonstrated in 1875 and officially adopted in 1877, Baudot TTY is the basis of the worldwide TELEX network. >BCC. Block Check Character. A character or group of characters added as a tag to a recorded or transmitted block of text to detect bit errors. May be a tally of the binary values of the bytes (usually modulo 2^16) [a 'Check Sum'], an LRC or a CRC tag. Check sums are used on the HP-9845 system. SRM and X.25 use a CRC scheme. Nine track tape uses an LRC scheme. >BCD. Binary Coded Decimal. A 4 bit representation of the numbers 0-9. Several forms exist, although 8-4-2-1 BCD predominates as it is a subset of ASCII (4 level ASCII). >Beam Penetration. A method of producing multiple colors from a conventional CRT by double coating the faceplate w/ phosphors of different colors. Low energy beams excite only the inner layer. High energy beams excite both by "penetrating" through the inner layer. By varying the energy of the writing beam, several distinct colors can be obtained. Never really popular, this type of CRT is sometimes found on oscilloscopes or monitors used on test gear. >Bed-of-Nails Tester. One of four types of common ATE (the others being: Bare Board, Edge Card and Chip testers) characterized by a physically large test head fitted w/ vacuum pull-downs and many Pogo-Pin "Nails" that probe the underside of a populated circuit board to allow "In-Cicuit" testing. BON testers use hefty drivers of modest speed to "Overdrive" circuit nodes on the DUT thereby performing the tests. Contrast this high current, high capaci- tance, low speed environment to the high speed backplane emulation of the Edge Card tester or the super low capacitance, high speed, low noise circuit board emulation of the Chip tester. >Benchmarks. Originally, targets from a rifle fired on a "bench rest" (a set of clamps). In modern computerese, the process of testing different machines and software products against common, meaningful standards. As in all forms of testing, this is more "art" than science. There is much disagreement about what constitutes a valid performance test. The "Whetstone" (See Same) tests have fallen into disrespect since the basic premise that everyone would be running Pascal has proven false. Now there are "Dhrystones" and many others. As RISC machines spread in use, performance measures other than MIPS or FLOPS (See Both) are sorely needed, hence the effort currently being expended. >BER. Bit Error Rate. Number of bit errors/Number of bits sent. >Bernoulli Box. A flexible disk drive having the form factor and handling characteristics of a (hard cartridge) flexible disk, but the operating char- acteristics of a Winchester. Spun at hard disk rates (3,600 rpm), the flexi- ble media is stabilized by a "Bernoulli Plate", a flat surface having a vent near the hub. As air accelerates radially outward, a low pressure area forms creating an air bearing. The head is mounted in a simple slot without need of gimbals or springs. The disk "dimples" around the head, which protrudes slightly below the plate. Any disturbance of this aerodynamic balance causes the flexible media to fall away from the head resulting in (at most) a "soft" (recoverable) error. A very good idea, Bernoulli Boxes suffer from poor marketing, no standardization and greedy vendors who insist on pricing them like removable Winchesters. Recommended. >Bias. A Preloaded parametric offset. In Class A amplifiers, the voltage or current used to establish the quiescent point. In analog tape recorders, a high frequency signal used to "chop" the audio to avoid magnetic saturation (hence the need for a different setting for "Chromium Oxide" tapes). In Statistics, the tendency of sample data to converge on a value different from the natural average of the population at large. >BIOS. Basic Input/Output System. In CP/M. the section containing the hardware specific (device drivers) part of the operating system. This is the portion that must be "patched" (customized) when CP/M is installed or when a new peripheral is added. IBM introduced the PC with a ROM BIOS that, until 1983, stumped imitators. Phoenix Technology reverse engineered the ROM, wrote a detailed functional spec. and employed a "clean team" (who had never seen an IBM PC before) to independently write a functional equivalent. Well done (IBM declined to sue), Phoenix ROMs power all PC clones. >bis. A terms appended to by Standards Committees to indicate a second (usually preexisting) option. For example, CCITT calls RS-232 "V.22bis". You may also encounter a "ter" (3rd option) suffix. >BiStable Storage Tube. A 1968 technology popularized by Tektronix in the 4010 family of CRT terminals. Information is stored on the face of the tube by backing the phosphor with a photosensitive semiconductor. Writing is done using a high power electron beam that punches through to light the phosphor. A swarm of low power electrons from a pair of flood guns maintains the image by passing through the "switched ON" photoconductor directly behind written areas. Graphics without large system overhead is a major advantage of this technique. However, the whole screen must be erased and rewritten to change anything, a factor that has caused this technology to phase out in favor of the familiar TV type of raster scanned display. A type of Direct View Stor- age Tubes (DVST). See Also Storage Tube. >BiSync. What everyone else calls what IBM calls BSC, Binary Synchronous Communications. A 1969 IBM standard widely used. A byte-oriented protocol. Basically half duplex. Uses Ack/Nack flags. A "line block" is 80 characters which is also the size of an IBM card. Performs badly on long links. Satel- lite shots have killed BiSync for long haul work. >Bit. BInary digiT. A number w/ 2 values (0/1). The smallest part of a Byte or computer Word. Bits are usually Binary Weighted (assigned powers of Two). >Bit Bucket. A place to send unwanted bits/bytes/text. Frequently called "null" or "/dev/null" ("NUL:" on DOS). A WOM. >BITE. Built-In Test Equipment. >Bit-Mapped Graphics. A method of creating images made up of dots (pixels), each of which has a unique location in RAM assigned to it. >Bit-Oriented Protocol. A data link control game plan for serial bit streams. Six "1's" represents a flag pattern. The sender pads with a "0" whenever 5 "1's" occur in the data itself to avoid an accidental flag. >Black Box. A generic dummy functional block. May be Hardware or Software. >Block. A badly abused term. As originally intended, a Block is the small- est amount of data that can be read from or written to a mass storage device. The smallest "real" Block is on physical "record" (usually a disk sector). As Buffers got bigger, it became common to read/write several records at a crack ("Track Buffering" and the like), a "Block" being the size of the buffers used. To complicate matters, IBM, DEC and Unix frequently speak in terms of "Standard Blocks" (512 bytes under Unix) even when the actual read/write "chunk" is two or four times larger. See Also Cluster. >BOOT. Bootstrap. The process of loading the operating system into a soft- loaded computer. Also used to begin fresh after a system crash. >bpi. Bits per inch. Information density indicator for magnetic media. >Break. Originally, the physical opening of the electrical circuit (which caused the distant TTY machine to "Run Open" generating enough noise to alert the operator). Now considered to be the sending of a continuous "Space" (the "start" pulse in asynchronous transmissions) for approximately 200 msec to gain the attention of the distant end. >Bridge. A black box found in LANs. May link together sections of baseband LANs (which usually don't branch well). In broadband LANs, serves to link modems operating on different bands. >BroadBand. Said of LANS. An analog technique in which RF modems are used to send digital signals on a broadband media, usually coax. More complex than baseband, but benefits from cable TV technology. Example: Sytek System 20. >BSD. Berkley Software Distribution. The current (1988) other "flavor" of Unix (See Also SVID) known for its "C-Shell" and elegant Mail system (now a part of System V as "mailx"). Strongly DEC VAX oriented, BSD 4.3 is the last VAX release. Apparently DEC and Berkley had a falling out over 4.3's memory manager SNAFU that significantly slowed system performance. Whatever happened, the "fire went out" at Berkley, leaving OSF to carry the BSD torch. >Bubble Memory. A 1977 digital storage technology based on circulating magnetic domains in a thin film magnetic media. Viewed under polarized light, these magnetic domains resemble bubbles in a moving fluid, hence the name. Never Popular. Non-volatile. >Bubble Sort. The simplest (and least efficient) of several Minimum Memory sorting algorithms (the best being the Shell Sort). Much greater speed is possible using the "Heap Sort" or "Quick Sort" algorithms. Both require more RAM, coding complexity and startup overhead than Minimum Memory sorts. For general use, the Shell Sort is Recommended. >Bug. A mistake. Specifically, a mistake in software, the removal of which is called "DeBugging". Historically, the term predates software by several centuries, being in common usage in the time of Shakespeare (a letter refer- ring to "bugs" in a manuscript survives). The association w/ computers originated w/ Adm Grace Hopper (USN, ret.), the Navy's grand old Lady of software (she wrote COBOL). While working on the Harvard Mark I computing engine during WWII, a program malfunction was labo- riously isolated to a stuck signal relay (used for RAM) which had jammed on a crushed moth. Carefully removed, this "bug" was taped into the operations log w/ the notation "Found bug in program, removed same." (This original "Program Bug" is on display at the Naval Museum, NWL Dahlgren). >Buffer. A holding tank for data. Often used to handle speed differences. >Buzz Word. A bit of technical jargon (or pseudo-jargon) used to "Jazz Up" a conversation, presentation, etc. to appear "High Tech". Actually a form of Noise, "Buzz Words" obscure what is being said (which is often the intent). Avoid. Also, Avoid those who Use. >Byte. Originally, the amount of data that could be fetched from memory in a single read cycle. Now considered to be 8 bits by common usage. -C- >C. Formally introduced in 1978, 'C' was written by Dennis Richie of Bell Labs as a rewrite of Brian Kernighan's 'B' Language, a condensation of BCPL (Basic Combined Programming Language), itself a cutdown of CPL (Combined Programming Language), an abbreviated extract of ALGOL-60. Terse. 'C' assumes the user to be a competent professional and provides tools (and the ability to create tools) of sweeping scope w/ few restrictions and fewer safe-guards. For example, the use of pointers (a potent and sometimes deadly technique) is encouraged. Specifically designed for systems work (the trans- port of Unix being its first task), 'C' functions as a 'Portable Assembly Language' providing bit manipulation and arithmetic constructs not usually found outside mnemonic assemblers. Not really a high level language compara- ble to Fortran, 'C' can serve reasonably well as a 'Moderate Level' language if supported by a Library of hardware specific routines. 'C' compilers are small, fast and relatively easily written. ('C' has only about 30 Keywords in the entire language). 'C' object code is generally compact and comparable to hand generated assembly. AKA ANSI C-89. >C++. An Object-Oriented Language by Bjarne Stroustrop (1987) usually imple- mented as a PreProcessor to ordinary C. Apparently this was the intent of the Author as the double-plus notation in C means "Post Incremented." See Also OOL. >Cache. A French word meaning "To Hide". A virtual memory technique used to trick the CPU into believing that all its RAM is very fast. Less elaborate than disk based Virtual Memory methods (which may be employed simultaneously as well). Depending on the programs run, may produce dramatic speed gains. Found in high performance systems. >CAD. Computer-Aided Design. Specifically, the partial automation of the draftsman's art. Now includes (more or less) most of a draftsman's task area including bill of materials, layout, stress analysis, etc.. Originally mechanical, now extended into various phases of electronic design including PC board layout and chip design. >CAE. Computer-Aided Engineering. Everything an engineer or technician does with a computer. >CAI. Computer Aided Instruction. The use of computers in a teaching envi- ronment as teaching aides, programmed learning engines and as teacher substitutes, particularly in mathematical or language instruction and in situations involving repetitive tasks. >Calculator. Strictly speaking, a machine that performs computations serial- ly, each computation cycle being specifically initiated by a human operator. This distinction is very poorly delimited as highly interactive computers resemble calculators and very smart calculators (such as pocket sliderules) resemble computers. +Calculators, History of. The abacus is basically a scratch RAM for a human doing mental mathematics as it has no computational power itself. The slide- rule is a logarithmic engine using numeric values converted into scaler distances which are mechanically added or subtracted. The first mechanical adding machine was designed by Pascal (1642). Gottfried von Leibniz (1646- 1716) improved the design into a "Four Banger" which he fabricated in 1694. Babbage's Difference Engine was his only successful design. Despite spend- ing some $75K in the process, his improved model never got off the drawing board. Dropping that, he began work in 1833 on his dream machine, the Ana- lytical Engine, considered the most intricate calculator ever designed. The familiar keyboard style adding machine was patented by Felts in 1885 and immediately improved by William Burroughs (1855-1898) into the first commer- cially successful calculator. Burroughs went on to expand this into book- keeping machines for business users. Tabulating machines based on the punch card were invented by Hollorith in 1889, just in time for the 1890 census. This technology founded IBM in 1911. Although mechanical calculators improved greatly with the addition of elec- tric power, the technology peaked in the middle 30's in Naval Gun Fire Con- trol systems such as those on the Iowa Class Battleships. The last major calculator development was the IBM sponsored Harvard Mark I Computing Engine (completed in 1944). After that IBM's attention turned to electronic calculators such as the model 602 and 603 introduced in 1946. IBM's last large scale calculator (technically it was a computer) was the model 650 Selective Sequence Electronic Calculator, which used a rotating drum memory to "punch its own buttons". This machine was widely used for scientific work throughout the 1950's. The last specific calculator of major importance was the HP-35, which banished the sliderule and sparked the microcomputer revolution. ---> A Footnote: Smithsonian Researchers, starting from an off-hand reference in a letter to Ben Franklin, tracked down proof positive that Pascal was at least a Century Late in Inventing the Mechanical Calculator. From a descrip- tion in Vatican Archives, a Working Model of a Polish "Four-Banger" was uilt in 1957. The Inventor perished in the Black Plague that swept Europe in the 15th Century, Cheating Him of Just Recognition. (It Figures). >CALS. Computer-Aided Logistics Support. Another massive DBMS from the fine folks who brought you TISS (Tester Independent Software System), ATLAS and ADA. CALS is a CS's idea of how technical information should be handled. Like TISS, CALS is not likely to be practical in our lifetimes, but good things will fall out from the effort, among them is EDI. >CAM. Computer-Aided Manufacturing. A catch-all term that encompasses elements of CAD/CAE and numerically controlled (NC) machines plus the inven- tory/cost accounting and scheduling aspects of manufacturing. >Capstan. The component of most tape recorders that acts (with the aid of a pinch wheel) to pull the tape over the record head at a constant speed and tension. Because capstan drives are unidirectional and constant speed, digital tape drives must "declutch" the capstan (usually be releasing the pinch wheel) during fast forward, rewind and search cycles. One major advan- tage of the 3M cartridge design is that no capstan is required. >CASE. Computer-Aided Software Engineering. Whatever that is. >Cast. The process of converting a data from one TYPE to another. Some Languages (such as BASIC) do it transparently. Others, such as "C" do so during Assignments (A = B causes the data in B to become the data TYPE of A), but perform "Type Checking" elsewhere. ADA prohibits automatic Casting, which makes it labor intensive and Programmer Hostile. >CCITT. Consultative Committee for International Telephone and Telegraph. A standards body dealing primarily with telephone and data communications. They originate the 'X.' and 'V.' standards such as 'X.25'. >CD-ROM. The same optical "Compact Disk" media as the musical versions (including the same players) except that the binary information "burned" in is digital data instead of digitized audio. An "Album" sized CD-ROM holds 550 Mb (equal to a stack of 360K Floppies over 12 ft high) and currently (1989) costs less than $2.00 (qty of 100). >Centronix. A defacto standard parallel protocol for printers using TTL Levels, strobes and flags. Pin 1 is Data Strobe, a negative edge occurring 50 uS after data appears on Pins 2-9 (D0-D7 POS True) and lasting at least 1.2 uS. The printer signals acceptance w/ a 100 nS pulse. Data Valid ends 10 uS later. This gives a nominal throughput of about 10 Kb/sec. Pin 11 is the BUSY line and is sometimes used for level shift handshaking. Pins 12/13/31/32 are flags. Pins 19-30 are data grounds. The remaining pins are (Officially) Unused, but may provide Power (+5 V) or other signaling. Al- though Centronix officially uses a 36 Pin "Blue Ribbon" connector, it is not unusual to find Centronix ports implemented on PCs as DB-25 connectors, the type also used for RS-232 Serial Ports. An idle Centronix port has a TTL High (+5 V) on Pin 1. An idle RS-232 port has a NEG voltage on either Pin 2 or Pin 3. See RS-232-C. >Character-Oriented Protocols. Data Link game plans using "Reserved Charac- ters" to pass control signals back and forth. Examples: BiSync, DECNET and Kermit. >Chip. A semiconductor device. So named for the fragments broken from the fabrication die ("Wafer") prior to final assembly. See Semiconductor. >Circular Buffer. A buffer which automatically "wraps around" so that it performs as a circular queue. The fill pointer always advances, the empty pointer chases to catch up. Found in Terminal Emulators. >Cluster. The smallest amount of data that can be read/written to a DOS disk (2048 bytes on Hard drives). See "Block". Also, a group of PCs or Worksta- tions, usually networked around a File Server. >CMOS. Complementary Metal-Oxide Semiconductors. A MOS microcircuit tech- nology combining NMOS and PMOS devices on the same chip. Like MOS, CMOS is a low power, high impedance technology w/ very low (microwatt range) static power draw and a resistive output characteristic. More difficult to design and fabricate, CMOS has traditionally been used for low power, low speed applications. During switching, CMOS is subject to an "overlap" during which both FETs in the Totem Pole are conducting thereby drawing a pulse of power. Careful matching of the N-Channel and P-Channel devices (a non-trivial task) reduces overlap allowing faster operation. So called "Dynamic" CMOS is about three times faster than TTL w/ fabrication densities similar to NMOS. CMOS is subject to the same ESD hazards as MOS. If input levels swing beyond the power rails, the on-chip device isolation (always a problem) is subject to a destructive breakdown called "Latchup". --> Tektronix 3270 ATE User: DO NOT punch the button on the TSCU while testing CMOS parts. In their finite wisdom, Tektronix designers "Crow Bar" the power supplies. This assures that Vcc will drop faster than the Pin- Electronics Drivers resulting in a "Smoke Test" via Latchup. There is nothing anyone can do to avoid blasting the DUT once the button is pressed. >Coax. Coaxial Cable. A type of cable in which a central conductor is suspended equidistant from a cylindrical shield sharing the same axis. A quiet, wide band media used by many high frequency or high speed processes including TV, radio, and some LANs. >COBOL. Common Business Oriented Language. The one of the first high level languages. Developed by DOD (1956), but popularized by IBM. Intended to allow nonprogrammers (managers) to read and understand the programs. A dinosaur. Very difficult to write, upgrade or use. Rather like a Model-T Ford, refuses to die. American business is estimated to have a 200 Billion dollar investment in COBOL programs (1986). >Codec. Coder/Decoder. The opposite of a modem. Converts analog signals into digital form for transmission. >Command Interpreter. See "Shell". >COMMON. A pool of variables held in a fenced off area that may be passed from program to program as a block. In general, COMMON variables do not initialize and must be cleared before use. Originated in Fortran, adopted by BASIC. >Compiler. A program that reads a source code file of and writes an object code file. This operation is usually followed by a Linking process which generates the executable program. Compilers allow the use of Named Con- stants, Macros and Header Files, all features that greatly simplify program- ming and improve readability. Recent advances in "Integrated Environments" ala Turbo Pascal & Quick C have jumped Compilers back into the Mainstream. >Composite Video. A TV style signal containing blanking and sync pulses. >Computer. (1646) A person adept at doing mathematics mentally (hence, the "er" ending). Now a digital machine having these four distinct features: A processor (CPU). A memory. An Arithmetic Logic Unit (ALU). An input/output (I/O) device or port. Example: a pocket calculator. >Computer Programming. The art of causing a computer to do something useful. Implies that unwanted behavior is avoided. Consists of these distinct steps (as a minimum): 1. Defining the Problem to be Solved. --> What You Really Want. 2. Outlining the Solution. --> What is Acceptable. 3. Selecting Methods (Algorithms). --> How You Will Do It. 4. Coding. --> Telling The Computer. 5. DeBugging. --> Getting It Right. 6. Testing. --> Proving It Works. 7. Documentation. --> For You & The User. 8. Maintenance. --> Upgrades & Fixes. >Computer Science. The profession dealing with the use of computers to process large quantities of information composed of many jobs, each done slowly, with the intent of maximizing the utilization of a shared, central- ized resource. With its inward focus and basically batch orientation, CS represents only one approach to computer use (other equally valid approaches include ATE, Data Communications and Real Time Environments). Within the limited confines of its definition, CS approaches a true science in that software situations are "knowable" and human error is the greatest source of software reliability problems. The only purely software profession with full academic status, CS's aristocratic attitude (we are considered "Hackers") has placed them outside the mainstream of computer evolution/innovation. >Concatenate. To splice together. Said of Text Strings or Files. >Concentrator. Strictly speaking, any kind of mux. By common use, a statis- tical mux. >Context Switching. System overhead associated w/ the establishment, manage- ment and collapsing of local environments in systems/languages allowing use of local variables (BASIC-89, Pascal, Ada, Etc.). A non-trivial matter. >Contiguous. Said of Disk Files in block sequential order start to finish. Some systems such as Unix intentionally splatter files across the physical disk. Others, such as TEKTEST require executable (.TST) files to be block- sequential to simplify loading. Such systems may be recognized by the presence of a "CUP" or "PACK" command which is used to gather together frag- ments of unused space. >Control Characters. "Invisible" bytes intended to control a printer/CRT, exercise Flow Control or control data links (See Character Oriented Proto- cols). ASCII provides 32 control codes as the first 32 defined bytes. Some of these, like carriage return and line feed, are well known and universally accepted. Others, such as DC1/DC3 for XON/XOFF, have developed a standard meaning by common usage. One of ASCII's strengths has been the mechanism provided for multicharacter control sequences via the "Escape" character, these being called "Escape Codes". Until recently, there was no standardiza- tion of escape codes even among products from the same vendor. See X3.64. >Co-Processor. Originally, a slave CPU. Now a processor specifically de- signed for a single task, such as graphics controller. Implies a secondary role to the main CPU but business on a more coequal status than a slave CPU. >Copy Protected. A "Polish Pistol" which prevents the paying customer from making backup copies of over-priced buggy software. Hard disks have hung a (well deserved) bad name on all copy guards. Never effective, Copy Protection has launched many ventures including "Disk Doctor", "Lock Smith" and a news- letter for Commodore 64 "Safecrackers", a hacker subculture complete w/ clubs, conventions and bulletin boards dedicated to the challenge of these "electronic cross-word puzzles". >Copyright. A legal monopoly granted authors by Congress (generally for 75 years w/ option to renew) to encourage them to publish original works. An interesting twist is that a "Work of the United States Government" may not be Copyrighted. Section 105 of the Copyright Act of 1976 (17 U.S.C. 105) places anything "prepared by an officer or employee of the United States Government as part of that person's official duties" in the Public Domain. >CORE. SIGGRAPH CORE. A graphics standard competing w/ GKS (See GKS). >Core. Originally, magnetic core memory, the main memory of a computer (made up of tiny ferrite doughnuts ("cores") strung on a wire matrix). Now gener- ally used to refer to a computer's real memory (as opposed to Virtual Memory) regardless of whether ferrite magnetic core RAM is actually used. True core RAM is, in general, slow (725 nS cycle) due both to the current levels used and the need to rewrite RAM locations after a read cycle (destructive read). Magnetic core RAM does not "forget" when the power is removed ("NonVolatile"). Bulky. Expensive. >Correlation. The verification process by which two (ATE) environments are matched within the limits of experimental (observation) error. The method used locally is called the "Gold Standard" method under which a known good device is run on each machine, the results being compared factoring in the precision of the instruments used. Once so verified, test results can be directly compared without "Fudge Factors". >CP/M. Control Program for MicroComputers. The world's first PC-DOS. This good idea and $500 founded Digital Research in 1975 (Corporate head quarters was a remodeled tool shed in the back yard). Six years later, DRI grossed $26 million and signed up IBM, DEC, and Hewlett-Packard. Now an industry-wide defacto standard. CP/M has been displaced by DOS and is cur- rently (1989) of fading importance. >CPS. Characters Per Second. >CPU. Central Processing Unit. The "engine" of a computer system. >Crash. The unexpected shutdown of a program or system. >CRC. Cyclic Redundancy Code (or Checking). A scheme to detect the presence of a bit error in a serial bit stream. Based on the mathematical division of binary polynomial, the CRC is the remainder after the division process. This value is tagged on at the end of a data block by the sender. The receiver can verify that no error has occurred by performing the same division process and comparing the results w/ the tag. If they match, there is a very high probability (> 99%) that the data is good. Popularized originally by hard disk designers, CRC is a good idea that lends itself easily to a hardware implementation using shift registers and feedback. Used almost anywhere blocks of data are sent serially (BiSync, Tape Drives, Disk Drives, Packet Networks. . and Kermit). >Cross-Talk. The "Spillover" of one channel's signal into another. >Crowbar. To rapidly discharge a power source through a low impedance to ground thereby sharply ramping it and any attached decoupling capacitors to zero volts in "zero" time. So named for the practice of discharging B+ (plate) power supplies w/ a screw driver, metal rod or "Idiot Stick" prior to maintenance or adjustment of electron tube circuits. Once a design feature in laboratory power sources, crowbar style current "latches" have been dis- placed by "Fold-Over", a smooth transition from voltage control to current limiting. ---> Tektronix ATE Users Note: The HP-6129 DVS (VS5) uses a Crowbar Current Latch which is potentially lethal to CMOS. Also, the "Panic STOP" button on the TSCU Crowbars all power supplies, a proven method to "Smoke Test" CMOS. >CRT. Cathode Ray Tube. The "TV" screen used in many computers and termi- nals. >Crystal. A piece of piezoelectric material (usually quartz) cut, polished and mounted so that it can mechanically vibrate when excited by an electric signal. Used as a "balance wheel" in digital watches. Usually used to pro- duce a stable, accurate frequency (as in radios) or time period (computer clocks), crystals are sometimes used to build very narrow, high quality filters for instrument use. Sometimes used as mechanical actuators as is done in Drop On Demand Ink Jet printers. >CSMA/CD. Carrier Sensing Multiple Access w/ Collision Detection. A method of controlling access to a LAN for coequal stations. Based on the old party line gab session "Listen Before you Talk" protocol. Most effective on short, high speed links. Superior to Token Passing in that it is self restarting in case of a noise burst. Access is statistically distributed, so time depend- ent traffic such as digital voice is not supportable. Claimed to overload and "Block" under high traffic loads, real world systems have consistently survived all overload attempts. Apparently the processing overhead in the nodes provides a safety margin such that 4 retrys is the longest wait time ever actually observed. Used by Ethernet and Sytek System 20. ---> Update 89: The debate over LAN protocols has cooled somewhat since experience disclosed that statistical effects of buffering at the LAN nodes (called "Queuing Theory") predominates over LAN access effects by 100:1. CSMA works best when many nodes "chat" among themselves, each exchanging modest amounts of traffic. Tokens work best when a few nodes swap large blocks of traffic. CSMA works best close in (echo-back intervals are short compared to packet length). Tokens work best where data blocks are long and handoffs are few. CSMA is robust with respect to noise, Tokens are not. CSMA LANs are peer- equal and decentralized (usually an advantage). Tokens allow levels of traffic priority but require centralized administrative support. CSMA's chokes when everybody needs to talk at once, Tokens when everybody gets "chatty" (Many short exchanges). Both respond positively to algorithmic "tweaks". Neither is clearly superior to the other in general use. CSMA LANs are inherently heterogeneous (only the nodes actually exchanging traffic need be fully compatible). Token LANs are inherently homogeneous (everybody plays or nobody plays). Both respond well to standards such as Ethernet and MAP (respectively). Generally, a multi-vendor network is easier to implement w/ CSMA. Token LANs tend to "Plug & Play" right out of the box, but risk obsolesce if standards change. >Current Loop. A method of data transmission over a metallic wire path in which the presence of current flow is considered to be a "One" (Mark) and the absence of current flow is a "Zero" (Space). Originally 60 ma for TTY (130V), modern versions are usually 20 ma (12V) or 6 ma (5V). Revived by the availability of modern photo-isolators, current loop is frequently used for long wire runs in high noise areas. >Cycle Stealing. A method of interleaving a memory access task w/ normal CPU operations using idle intervals when the CPU is decoding instructions and making computations. Also used to describe a similar scheme where clock cycles are stolen by inserting Wait States into the CPU's operating cycle so as to free up memory access cycles for some other task (such as DMA). -D- >D/A. Digital to Analog Converter. The logical inverse of an A/D Converter. A class of devices that convert numbers into voltage representations. Basi- cally the same precision/speed trade-off applies as w/ A/D converters. Units range from powerful/precise (but slow) Digital Voltage Sources (DVSs) to video rate devices used in TV work. >DAT. Digital Audio Tape. Compact Disk (CD/CD-ROM) technology done on helically scanned 1/4 inch tape cartridges resembling 3-M "Mini-Cartridges". Easily capable of holding 2 Gb, DATs (as currently marketed) contain a "Feature" to prevent duplication of tapes/CDs, a bad idea. So flawed, DATs may be over-run by removable Read/Write optical disks. >Data. A collection of information. Strictly speaking, "data" is the plural form of "datum" (a "Data Element), making the phrase "Data are processed" correct. However, the phrase "A collection of" is singular, making "data" as commonly used singular: "Data was collected". So data "is" processed in the technical sense and "are" published in the strictest sense. Such is Jargon. >Data Acquisition System. An ATE system w/o stimulus capability. >Data Base. A collection of information. Implies storage in files on tape or disk. Small databases tend to be relational while modest to large ones tend to be tree structured. While they may be thought of as a large collec- tion of index (3x5) cards, databases are most effective where maintenance is via Transaction Processing and information extraction is via Report Writers. If a key or pointer scheme can be used, databases can be much more efficient than "barefoot" methods. Databases tend to be like alligators, cute and manageable when small, but they eat dogs and small children if allowed to grow. >Data Driven. A machine or program controlled by the data it processes. Specifically, a machine that can reconfigure itself on the fly to optimize throughput. The first such machine being the Navy's Enhanced Modular Signal Processor (EMSP). >Data Encryption. Any method for encoding information in order to protect sensitive or proprietary data. There is no "perfect" scheme except one, the "Write Once Pad", which is an "Off-Line" technique. Given enough time and resources, anything less can be "cracked." On the other hand, Louis XIV's "Great Cypher" held off determined professionals for more than a century, long enough that the messages it protected were useless (except as historical footnotes). >Datagram. A class of service on packet switched networks roughly equivalent to a postcard (no reply required). Used by many LANs including Ethernet. >Data Link. An end-to-end data path including the originator and the receiv- er of the traffic. Implies flow control. >Data Set. Telco jargon for a Modem. >db. Decibels. A logarithmic scale reflective of the response of the human ear to sound energy. Usually referenced to 1mW @ 600 ohms (dbm) in telephone work. On this scale, -60 dbm is undetectable by virtually everyone. >DBMS. Data Base Management System. A computer-aided card file. >DCE. Data Communications Equipment. What the RS-232-C folks call a Modem. Modems are supposed to use FEMALE plugs and send on pin 3. >DeBugging. The process of program purification. AKA Software Testing. >DeFacto Standard. Something so Good or so Common that other similar products are compared against it. Functionally equivalent to a formal stand- ard. Set up by forces in the marketplace. Examples: Selectric Keyboards, MicroSoft BASIC, Centronix Interfaces, WordStar... >Delimiter. A separator in a data list (often a comma). >Demand Paged. Said of Virtual Memory systems. Any of several methods under which physical RAM is divided into sections ("Pages") and swapped to/from disk in response to "Page Fault" interrupts generated by a "Memory Manager". (See Virtual Memory, Operation of). Demand Paging operates w/o regard to RAM contents. Other memory management methods work on a "JOB" basis swapping entire tasks in/out (See Rollout) very much as Console operators did in the early days. A variation on the latter theme swaps in/out of "Virtual Ma- chines" (a user's entire environment), an IBM technique. >DES. Data Encryption System. An NBS standard algorithm for data encryp- tion. Suspected of being "cooked" so that NSA can easily "break" it. The NSA insisted on a 56 bit key word which fits the algorithm poorly (it was de- signed for a 128 bit key). AKA ANSI X3.92-1981 >Dial-Back. A simple, effective access control scheme based on the "Don't Call Us, We'll Call You" principle. A user initiates a session by calling a "tickler" line, keying in a code number (usually with his touch tone phone) and hanging up. The computer crosses the code number to an authorized tele- phone number and calls the user, who then logs on normally. Very good, but not perfect ("Call Forwarding" fools it). >Digital. Said of information. The information is coded as the presence or absence of some voltage, charge or the like at some specified location at some specified time. In the case of serial transmission, digital information can be "regenerated" (reshaped and retimed) without affecting the information content of the signal, a distinct advantage. >Digital Filter. A composite analog/digital/analog device emulating a purely analog function (filtering). One of the first widely used applications of DSP (See Same), digital filters have been enthusiastically accepted by the tele- communications industry for equalizers and line conditioners, applica- tions where the additional hardware cost is offset by the advantages of long erm stability and freedom from thermal drift (the "filter" is really an algorithm which neither ages nor drifts). >Digitizer. The graphical inverse of a plotter. A plotter takes numbers and makes pictures. A digitizer takes pictures and makes numbers. >DIN. Deutches Institute fur Normung. The German equivalent of ANSI. >DIP. Dual In-line Package. The common "Bug" form factor for IC's. >Directory. A file (or set of files) containing a table of contents for a mass storage system (or portion thereof). During media initialization, at least one Directory file is established. Systems such as TEKTEST and CP/M do all their business in a single "Catalog-style" Directory. RSX, VMS, Unix and DOS call their catalog an "I-node" file, the exclusive property of the Operating System. Users interface w/ the I-node file via a set of files ("Directories") which map I-nodes to User names. Some systems (notably Unix) allow I-nodes to be "linked" to several different User names, each equally valid. Only the first access of a file is by name. Once the System has traversed the "Path" through chained subdirectories, it has the "I-node" number. From that point on, the System works with the I-node file, treating it as an old- fashioned "Flat" catalog. >Disk Cache. A variation of Track Buffering under which a several Blocks are read into RAM w/ the hope that future READs will "Hit" on data in the Buffer. Depending on the Application, dramatic speed increases (up to 10x) are com- mon. When WRITEs are involved, Cache can be risky as the File may be cor- rupted if power is lost before the Buffer is written to Physical Disk. If the Hardware does not support a Power-Fail Routine (and PCs don't), it is standard practice to "Write Thru Cache", i.e., to update the Buffer and immediately write it to Physical Disk. This trades WRITE speed for better Reliability. >Disk Pac. A removable hard (flying head) disk with its protective enclo- sure. A single disk (platter) assembly is usually called a "cartridge". Implies a stack of platters in one assembly. >Distortion. The corruption of a signal by noise and degradation so that the waveshape is altered. In digital signals, measured in "%". 35% is generally considered a practical maximum. May be removed by "regeneration" which reshapes and retimes the signal. >DMA. Direct Memory Access. A high speed transfer technique in which the CPU hands control over to a DMA controller and then goes to sleep. The DMA controller performs the transfer at the highest possible rate and then wakes up the CPU. >Document Processing. The creation, editing, printing and storage of inte- grated text/graphics documents as a single, logical unit. >Dongle. A software locking device plugged into an RS-232 port on a PC which, when tickled, reports out a magic number, phrase, etc. that identifies the user as being authorized to operate the installed product. Better than the old "Master Floppy", but still a bad idea. Avoid. >DOS. By common usage, MS-DOS for Intel 80x86 processors ala IBM PC/XT/AT. >Dot Matrix. Literally a rectangular group of dots. Usually applied to a printing/display technique in which the dots are treated as pixels from which characters (usually text) are constructed. Popular formats: 5x7,7x9,9x12. >DRAM. Dynamic RAM. A complex analog device emulating a digital bit storage matrix. Information is stored as minute charges on minuscule capacitors which must be read and rewritten (Refreshed) at intervals to account for charge loss due to bleed off (leakage). Introduced by IBM in 1971. >Drive. As is "Tape Drive" or "Disk Drive". The peripheral subsystem (with controller) using the media mentioned. >Driver. An interface routine used to control ("drive") a peripheral device. >Drop. A Telco term for a subscriber's telephone line/telephone set (origi- nally a wire "dropped" from a telephone pole to his house). Adopted by ADP to mean a terminal on a master/slave party line (See Multi-Drop). >Drop Out. A temporary, sharp reduction is signal level as if the channel hit a pothole. >Drum Plotter. A type of graphics plotter that moves the paper to provide one axis of motion and moves the pen to provide the other. Originally the paper was attached to a large drum rather like in a FAX machine. Later the paper (often with pin feed edges) was fed over a smaller drum as in a type- writer. HP's pinch wheel design eliminates the drum and substitutes an air bearing. >DSP. Digital Signal Processing. A rapidly evolving analog specialty using digital computers both for analysis and analog device emulation (See Digital Filters). See FFT. >DTE. Data Terminal Equipment. What RS-232-C folks call your terminal. Terminals are supposed to have MALE plugs and send on pin 2. >Dump. A large quantity of information, frequently unsorted, printed or displayed. >DUT. Device Under Test. >Dynamic. Said of devices and processes, particularly RAMs (See DRAM). A device or process which can not be halted and restarted without loss of informa- tion or function. For example, a CRT must be continuously repainted (Refreshed) or the image fades. >Dynamic Range, ATE. The range in which valid measurements can be made, which is basically, the range between the Noise Floor and the largest signal measurable. -E- >EBCDIC. Extended Binary Coded Decimal Interchange Code. Any of several IBM 8 bit codes originally developed for punched card Tabulators. Later used as a scheme to enforce incompatibility. Never popular in data communications (except in BiSync) as it lacks a parity bit. >Echo. The process of returning (usually from a host computer) text sent out as a visual verification of circuit operation. AKA Echoplex. >ECMA. European Computer Manufacturing Association. The EC equivalent of ANSI. >EDAC. Error Detection And Correction. See Also Hamming Code and Forward Error Correction. >EDI. Electronic Document Interchange. That portion of the CALS effort dealing with the exchange of technical documents, drawings, etc. needed to specify a part/module/system. Since EDI parallels a similar ISO effort and the ANSI PDIS (Parts Design Information System) effort, EDI will probably be (at least partly) successful. EDI's use of SGML, however, is unwise. >EISA. Extended Industry Standard Architecture. The "Gang-of-Nine" (led by Compaq) answer to IBM's MicroChannel Architecture (MCA). EISA is based on a 32 bit "AT" style bus/board arrangement much favored by "drop-in" board vendors. MCA, on the other hand, uses a smaller card w/ surface mounted devices and a complex distributed control scheme intended to discourage reverse engineered clones (it worked). EISA is also about 65% faster than MCA (33 vs 20 Mhz). EISA is recommended. MCA is not. >Embedded Servo. Said of hard disk systems. A positive head positioning system based on control ("servo") tracks permanently recorded on the disk at fabrication. Allows closer track spacing. When multiplexed with normal data tracks, the servo tracks are said to be "embedded". Implies a high perform- ance head positioner (See Voice Coil Actuator). >EMI. Electromagnetic Interference. >Emulate. A $5.00 word for "Acts Like". +ENIAC. Electronic Numerical Integrator And Calculator. The world's first (unclassified) electronic computer. Started by the US Army at U of Pa (1943). Completed 1946. A huge machine, ENIAC weighed 30 tons, contained 18,000 tubes plus 1500 relays (for RAM) and burned 130 KW of power (enough energy to melt its weight in ice each hour). Throughput was about 0.005 MIPS. ENIAC originally was programmed via plug boards, i.e., it had to be rewired for each problem. The designers of ENIAC spun off into their own company to build and market the UNIVersal Automatic Computer (UNIVAC I). Shortly after their first sale (to the US Census Bureau), Rand Corporation bought them out. Later Sperry did likewise to Rand. UNIVAC was the first commercially sold mainframe and remains one of IBM's more successful rivals. See Also ABC. >ENQ/ACK. Enquire/Acknowledge. A master/slave character-oriented protocol used by Hewlett-Packard and few others. Under this scheme, the Host tells the terminal (slave) to send using the ENQ character (^E). The slave sends a data block (if it has one to send) ending w/ an ACK character (^F). When the Host sends, it streams out a data block ending with an ENQ. The slave an- swers w/ an ACK when it can accept more data. This is a "Block Mode" proto- col well suited for transaction processing and polled-multi-drop links. It can not "Flow Control" ala X-ON/X-OFF once a terminal has been enabled to transmit. Likewise, a terminal can not transmit unless it receives an ENQ. HP-3000's rep as a nasty interconnect problem is mostly the ENQ/ACK protocol. >EOF. End Of File. CP/M & DOS used a ^Z. Unix uses ^D, but does not post it into the file. >EOT. End of Tape. Usually marked by a shiny metallic sticker or a hole punched through the tape itself. Also "End of Text" (^D in ASCII). >Ergonomics. A $5.00 word for "Human Factors". Is concerned primarily with physical layouts. >Escape Codes. See ASCII and X3.64. >ESD. Electrostatic Discharge. Specifically, static charges that build up on people and components during normal shipping/handling and assembly/repair of circuit boards. Any time the relative humidity is below 35%, simple acts like blowing dust off a circuit board or running your fingers through your hair can create voltages lethal to MOS/CMOS microcircuits. Liberal use of anti-static spray ("Downy" Fabric Softener in water), "Leashes" (grounded wrist bands) and modified work methods are required. Inattention produces the gaping craters on photomicrographs of blown microcircuit (the Silicon was literally blasted away). >Exception Handling. The new "Uptown" name for ON ERROR trapping. >Expert Systems. An almost trivial form of artificial intelligence (AI) based on the analytical methods of one or more human experts (wired into software). Already a proven technology in geology and medicine, this is a growth industry. --> Update 88: Still a "Buzz Word", Expert Systems have acquired a rep for poor performance, or as one analyst put it: "They just don't work." That may be a bit harsh since the failure is human: The inability to reduce to rules processes of the human mind and the inability of human "Knowledge Engineers" to accurately evaluate and capture "expert" analytical processes. Generally, an Expert System does well what humans do badly (repetitive, mechanical processes within a limited knowledge environment (such as photo- recon analysis)) and badly when the experience base (learning curve) is large and the information to be processed is incomplete, contradictory or flawed. Good Expert Systems, like experts themselves, are hard to find. -F- >Fall Back. Degraded operating modes designed into a system to allow contin- ued operation in the event of equipment failure. AKA Graceful Degradation. >Fault Coverage. A tally of detectable "Stuck-At" faults divided by the total number possible, generally given as a percentage: "95% Fault Coverage." Now a questionable gauge of a functional pattern's effectiveness as increas- ing part complexity has led to use of "Functional Descriptions" such as HDL which, when compiled, produce a "Works Like" gate-level simulator model, sizable portions of which may bear little or no resemblance to the design/structure of the real- world chip/module. >Fault Group. The smallest subset of replaceable parts that a given test method can identify as containing a specific fault. At the system level, these boards/ modules are replaced as a group to quickly restore system operation. Never as precise as predicted, fault isolation test methods assume a single (or disjoint) fault situation, which often is overly optimis- tic. Large fault groups increase the removal/return of working parts and increase support costs. Small fault groups may demand greater resolution than the test method can actually provide leaving the user on his own with little or no guidance. >FAX. Facsimile. A scheme for sending pictures (originally photographs, the so called "wire photos" found in newspapers) via telephone using a rotating drum and a screw arrangement to scan the image. Now used for business corre- spondence and weather maps. >FDDI. Fiber Data Distribution Interface. An evolving 100 Mbs fiber-optic LAN standard. Uses a Dual-ring Token Passing layout that allows up to 500 nodes spread over 60 miles w/ separations up to one mile. By this defini- tion, FDDI is a WAN standard. ANSI X3T9.5-1986 (Draft) >FEC. See Forward Error Correction. >Feedback. A recirculation of a portion of the output energy of a system back into the input port (sometimes unintentionally). One of the analog engineer's most powerful tools, feedback forms the basis of the Analog Com- puter. Depending on the phase of the energy recirculated, feedback may tend to destabilize the system (causing oscillation) or to reinforce stability and reduce distortion at the expense of circuit gain (so called "Negative" feed- back). >FEM. Finite Element Modeling. See Finite Element Analysis. >FET. Field Effect Transistor. A voltage activated, high impedance device similar to the Vacuum Tube in operation. Carriers enter the active channel via a "Source", are flow-controlled by a "Gate" electrode and exit through a "Drain". The carrier may be either electrons (N-Channel) or holes (P- Chan- nel). The channel itself may be "Normal ON" (Depletion Mode) or "Normal OFF" (Enhancement Mode). The Gate may be insulated via an oxide layer (IGFET) or be a reversed biased PN junction (JFET). Discrete FETs find applications in Satellite Dishes and power controllers. FETs also form the basis of "Analog Switches" (w/ ON/OFF ratios of 10^5 being common). IGFETs form the basis of MOS and CMOS microcircuit technology. >FFT. Fast Fourier Transform. A special case of the general Discrete Fouri- er Transform (DFT) in which the number of data points taken is a natural power of two (usually 256 or 1024). The Fourier Transform is an implementa- tion of the Fourier Series, a mathematical technique for representing any waveform as the sum of pure sine wave signals of specific amplitude, frequen- cy and phase. The output of an FFT transformation is said to be in the "Frequency Domain", a particularly useful format. FFTs may be used for analysis much as a Spectrum Analyzer is used or as part of a DSP algorithm. The Inverse Fourier Transform (IFT) exists. >Fiber Optics. Specifically, the hair thin optical waveguides ("Light Pipes") used to transmit visible or infrared light. Now includes the light sources, detectors, cables, connectors, splices, etc. A viable alternative to coax (See Coax), which is installed and handled in much the same manner. Wideband. Immune to EMI, ground loops, Tempest. Difficult to "wire tap" without detection. Recommended. >FIFO. First In/First Out. A Queue. >File. A stream of bytes stored somewhere under some name. >File System. The supporting data structures, directory structure, and associated files that reside on one or more mass storage volumes. Although a File may be of any length, File Systems frequently allocate storage space in "Blocks" or "Clusters" involving .5K-2K byte areas. Thus, a DOS .BAT file of 20 bytes "fills" a 2,048 byte "Cluster" on a PC-AT's hard disk. (1,024 bytes on most Unix machines). >File Locking. A necessary feature on a shared resource system which pro- vides protection against two users attempting to modify the same file at the same time. Prior to a write cycle, the user must compete for and obtain control of the file (i.e. "lock" it). On completion of the update, the file is released ("unlocked") allowing others to compete for the right to write. >Filter. A process which accepts text from stdin and writes to Stdout. Implies a non-interactive process. See Also Pipes and Stdio. >Finite Element Analysis. A technique for simulating the bending, deforma- tion and stress characteristics of mechanical parts and assemblies. Based on a solution to the classical paper folding problem, this method distributes points (nodes) throughout the object to be analyzed, joining them into a web of triangles (suggested by the folds in a sheet of paper). By computing the forces, displacement and stresses at each node, the response of the overall object is predicted. May be adapted to other situations such as Thermal Analysis (the study of heat flow). Useful. Tends to require large comput- ers. Developed originally under US Navy contract. >FIPS. Federal Information Processing Standards. Once the predominant computer standards (1960's era), FIPS have faded to "me, too" status in recent years. Generated for DOD by NBS, FIPS are supposed to direct the thrust of Government computer specifications. With the rise of Posix and GOSIP, both performance standards, FIPS may enjoy a rebirth. >Firmware. Software "burned" into ROM. >Fixture. The physical and electrical interface between the ATE and the device under test. >Flatbed Plotter. A type of graphics plotter in which the paper is attached to a flat platen and a pen is moved across the stationary paper to construct the image. >Flip-Flop. A single bit static memory cell (2 stable states). Also called a "Latch". After a long search, IBM patented a "Tri-Flop" (3 stable states), which proved to be a flop. >Floating Decimal. A variation of Floating Point Math (See Below) in which the round-off error is controlled such that base ten (decimal) fractions compute precisely. This allows direct comparison of computed REAL numbers and the use of the language directly for business purposes. Part of the ANSI BASIC-83 standard. The lack of being a major flaw in Fortran, Pascal, C and ADA. >Floating Gate. The insulated electrode suspended between a "normal" gate electrode and the active FET channel in a UV-PROM. Applying a long, slow high voltage pulse to the normal gate "burns" in a permanent charge on this insulated electrode. Exposure to Ultra-Violet light "rubs out" this charge, allowing the PROM to be reprogrammed. The "burn" process depends on quantum mechanical "Tunneling" to trap electrons on the Floating Gate. The UV light generates hole-electron pairs in the oxide insulating layer allowing leakage across a barrier that otherwise would retain the trap charge for as long as ten years. >Floating Point. Any of several schemes for representing decimal numbers as the product of two raised to a power and a normalized fractional number. Originating w/ Fortran, floating point spelled the end for the analog comput- er and for numerous other schemes for doing decimal math via BCD techniques as was done in mechanical calculators. The scheme used in Fortran IV was long a defacto standard and worked like this: The sign of the decimal number is separated into a flag bit and the number itself made positive. The number is then "normalized" by taking the LOG base two, keeping only the integer portion of the LOG and adding one to it. The decimal number is then divided by two raised to that power (via shifts right/left). The resulting number is a fraction ranging in value between .5 and 1.0 (i.e., the highest bit is always one). To avoid using a sign bit in the powers value (the "exponent"), the value 128 is added (so called "Excess 200" notation as 128 is '200' in the Octal system) so that exponent values range from -127 to +127 (about 10^+38) for an 8 bit representation (an "octet"). DEC (and IEEE) assemble this information for storage in the following order: The sign bit is the MSB of the first word. The exponent octet follows. The first bit of the frac- tion (which is always a one) is dropped ("hidden") and the rest of the frac- tion tagged on behind the exponent octet. The combination is then divided into words for storage. For single precision REAL numbers, the fractional part is 23 bits long making the combination to be 32 bits in length (so called "32 bit Floating Point"). Since it is not possible to determine the difference between zero and a number exactly equal to one half (due to the "hidden" bit), zero is defined as a combination having no bits set, a good choice since testing the first 16 bit word of the combination as an integer can establish both the sign of the decimal number and that it is nonzero, a convenience. Obviously manipulating floating point numbers is complicated, but most processors (such as the PDP-11) include floating point constructs in their instruction set (to facilitate handling Fortran) so that most of the real labor is accomplished in microcode (which is fast). Even so, floating point math is the slowest arithmetic operation of an ALU. Hardware Floating Point has long been used to "accelerate" program execution by carrying out the rules of floating point computations in specially designed hardware which can easily accomplish a 6-8 times speed gain over straight microcode. Be aware that variations do exist both in the size of the exponent/fraction bit split and in the order of assembly for storage (IBM, for example, places the exponent octet first to allow manipulation via byte level memory fetches). >Flexible Disk. A popular mass storage scheme using a circular sheet of the same material used in making magnetic recording tape (held inside a padded envelope). First found (1973) in the 8 inch IBM 3740 format (single sided, single density), floppy disks now cover a range from 8 inch to sub 4 inch and to quad density (double sided, double density). Except for the original IBM format, there are no standards. Recording/playback involve a rubbing contact that wears both the head and the rotating media. >FLOPS. Floating Point Operations per second. A measure of computer system speed. FLOPS are more important to scientific users than MIPS. >Flow Chart. One way of detailing program logic. Limited information densi- ty. Frequently sprawling out beyond comprehension. Useful for individual algorithms, but not for large processes. >Flow Control. The management of telecommunications link traffic so that none is lost. See X-ON/X-OFF and ENQ/ACK. >Flush. To force a buffer to dump its contents. Implies that the informa- tion is not lost. >FM. Frequency Modulation. A method of impressing information on a carrier signal by changing (slightly) the frequency of the carrier wave. This re- sults in a wideband "splash" of sidebands. Used in flexible disk systems in both the basic (FM) and modified (MFM) forms. >FORTH. A "roll your own" language which consists of segments of executable assembly language separated by headers. Each header has a "KeyWord" and a link pointer which points beyond the end of the assembly language segment (at the next KeyWord). Involves a discipline for passing values via stacks. Originally created by N.More to control a telescope at Kitts Peak, Az. Uses RPN for mathematics. Tagged as "The Unfinished Language" by users. Fast. Easily customized. Threaded. Powerful. Potentially deadly. >FORTRAN. Formula Translator. A language introduced in 1954, first run in 1956 (on an IBM 704) . Currently available in two major versions, FORTRAN-66 (introduced in 1966) and FORTRAN -77 (introduced in 1977). The latter bor- rows freely from BASIC, e.g., includes string variables. Compiled. Card image oriented. Batch. Fast. Very powerful for situations involving numeric data handled in array form. Has a particularly powerful construct ('CALL') for accessing either previously compiled subprograms or assembly language object code w/ parameter passing. File manipulation capability in -66 limit- ed. Uses LUNs. Frustrating to write and upgrade. Antique. However, there is more Fortran Code in operation world-wide than all other languages com- bined (estimated to be 83% of all Code in 1987). Continues to evolve and improve w/ the -89 version. The language of choice by Private Industry. >Forward Error Correction. Any of more than 50 schemes for detecting/fixing bit errors in a serial data stream w/o ARQ (retransmission of busted data blocks). All depend on algorithmic pre/post processing and the inclusion of "redundant" bits in the data stream (trading channel throughput for noise tolerance). Low speed data generally uses "Convolution" techniques (bits are compared to previously sent bits in a sliding window). There is a trade-off between channel throughput and the amount of processing involved (more extra bits, less processing needed for the same noise tolerance). Generally modest processing requirements, low delays (in terms of bit intervals), low storage requirements and good burst error removal (5-6 bits typical) but high channel throughput loss (expressed as effective/raw throughput) w/ 3/4 to 1/2 being typical. Some Convolution schemes are: Viterbi, Feedback, Sequential and Trellis Coding. High speed data (>100Mbs) suffers more from burst errors and usually uses "Block Coding", a technique originated to improve the performance of Disk Drives, which can reconstruct bursts up to 512 bits long. Longer delay times (at least twice the block length), higher processing and storage requirements but lower throughput reduction (15/16 to 7/8 being typical). The Reed-Solo- mon technique is a Block Coding scheme. Moderate speed data may use a varia- tion of Convolution called "Interleaving" in which the transmitted order of bits is rearranged (thereby "splattering" long error bursts), trading in- creased storage/delay requirements for simplified processing. FEC dramatically improves a "Dirty" channel such as a Dialup Telephone line (where error rates of 1/100 are not unusual) making it a high quality link (BERs of 1/1E5 or better). Most cost effective where BERs are high (where ARQ works poorly). Basically a link technique, FEC is transparent to the data handled, which may employ ARQ as well. Impressive. Witnessed a demo at AGA Hawaii where an experimental IBM rig printed error-free data through noise that completely masked the modem tones. >Four Wire. A telephone channel split so that one pair carries the send conversation and another pair carries the receive conversation. Better suited for high quality services such as high speed data. +Fourier, Jean. (1768-1830) A French mathematician and Physicist who, in the course of his work investigating heat flow, had the nerve to expand complex mathematical expressions into an infinite summation (series) of pure sine waves of specified phase and amplitude. The publication of this tech- nique set off a firestorm of debate which lasted more than a hundred years, finally being laid to rest in 1933 when a definitive body of proofs and conditions were published. By that time, experimenters had firmly estab- lished the validity of the technique in describing all manner of waveforms, especially those associated w/ electronics and acoustics. See Also FFT. >4GL. Fourth Generation Language. Whatever that is. APGs are generally hyped as being 4GLs, but fail outside very narrow range of (usually DBMS) applications. OOLs such as C++ are considered 4GLs. ATLAS is trying to pass itself off as a 4GL, which is patently ridiculous. >Free List. A map of unused data blocks on a disk system. As files are created, space is removed from the Free List. As files are deleted, their area is added to the Free List for reuse. >Freeware. Software (usually of trivial commercial value) provided to the General Public at No Cost "As Is" w/o warrantee or support. Usually Copy- righted to prevent Resale for Profit, Freeware may legally be duplicated, distributed and used so long as the Copyright Notice remains attached. Sometimes of surprising quality/utility. Kermit is Freeware. >FSK. Frequency Shift Keyed. Data transmission via a modem that shifts between two distinct tones (a Mark and a Space) as the bit stream shifts between Ones and Zeros. Used for low speed modems (Bell 103 types) up to about 300 baud. >FTAM. File Transfer Access and Management. An ISO Network applications level protocol comparable to FTP in TCP/IP. AKA ISO 8571. >Full Duplex. Send or Receive any time both ways. >Future Shock. An observable human response to the accelerating rate of change brought about by the knowledge explosion. The sum total of human knowledge has doubled over each of these intervals: 1200-1600-1750-1850-1903-1948-1956-1961-1965-1968-1971--> Every Odd Year Since. Although the growth rate has stabilized recently (due to limits in the rate of information flow), the impact to everyday life is just now catching up. -G- >Gate. The smallest circuit element capable of performing a binary math function. Complex circuits are often discussed in terms of their "equivalent gate count". >Gateway. Said of a type of "black box" found in LANs. A special form of bridge that interconnects two (usually non-compatible) LANs. May include passwords or other such security measures. According to ISO, a device that interconnects two LANs by passing through everything it hears is a "Repeater" (contains OSI layers 1 & 2 only). If the device can perform address discrimination ("Routing"), it is called a "Bridge" (contains layers 1 - 3). If the device also performs protocol conversion, it is a "Gateway" (contains layers 1 - 4). >GCR. Group Code Recording. A 1971 technique to increase the information density on magnetic tape from 1,600 to 6,250 bpi. Basically an FEC technique similar to those used in Telecommunications. First used on the IBM 3420 Series tape drives, GCR is currently generating interest in the computer community at large primarily due to development of high performance "Short Column" tape drives. GCR does not use "Read-After-Write" making the us of known good ("Certified") tapes mandatory. >Gender Mender. Also called a "Goof Plug". A pair of RS-232 connectors wired back to back so as to interconnect two devices/cables using the same gender of connector (both males or both females). >GKS. Graphics Kernel System. A standard covering graphics software, lan- guage interfaces and the like originated in Germany by the Deutches Institute fur Normung (DIN), the German equivalent of ANSI. >Glitch. Originally, an unwanted pulse of short duration that causes mis- chief in digital logic circuits. Now used much as the older term "gremlin" to signify an unknown cause factor. >Gold Module. A rigorously tested, known good device to which all others are compared. AKA Correlation Module. >GOSIP. Government Open Systems Interface Profile. An NBS effort to inte- grate the ISO OSI model (for communications) and the SVID (for User inter- face). A good idea being done by some very good people (they also originated Posix) and a very good name, too. It is expected to become VERY widely used, which isn't surprising as nothing spreads like GOSIP. GOSIP will become a FIPS. >GPIB. General Purpose Interface (or Instrument) Bus. See IEEE-488. >Graphics. Literally pictures. Specifically, diagrams, mathematical curves, and CRT images. May be in vector form (line drawings) or raster form (dot patterns). >Graphics Tablet. A small, flat area which can detect the location and motion of a stylus. Originally intended for use as a graphics digitizer, now often used as a joystick replacement. >Gray Code. A BCD code with the property of having only one bit changing as the digits are counted up or down. Useful for optical encoders. >Guard. A Faraday shield wrapped around and insulated from an instrument such as a DVM. Most effective when extended to the point of measurement (where it joins w/ the Lo measurement lead), a guard should NEVER be left floating. If precision is not required, connect it to the Lo terminal at the instrument. >GUI. Graphics User Interface. A Visually Flashy Icon-Oriented pixel-level Windowing method generally associated w/ Apple's MacIntosh (the "Look & Feel" of which came from the failed Xerox "Star" Workstation). OS/2 & MS-Windows are GUIs. User Friendly, GUIs tend to be Programmer Hostile, CPU intensities and RAM Hogs. Unix (and Turbo C) do text Windowing ala "curses", a much faster technique. X-Windows is also a GUI. -H- >Hacker. According to Webster: "(1620) A person unskilled or inexperienced in a particular activity." In the early 1970's, Data Processing profession- als hung this handle on "non-believers" (non-Computer Scientists), particu- larly those associated with microcomputer programming. ---> Question: Now that Micros are Mainstream (and Mainframes Aren't), what do we (the Majority) call the CS diehards? (Read Quoted Text Above). >Half-Duplex. Either Send or Receive (not both) at any one time. Awkward due to turn-around problems. >Hamming Code. One of a class of "Lossless" Codes having the property of finding/fixing single bit errors within a coded data word. Widely used in EDAC RAM, especially w/ systems having 32 bit (or larger) data words as the required overhead decreases w/ increasing word size (8 bits needs 4 extra bits, 16 needs 5 but 32 needs only 6). Hamming EDAC is easily accomplished in gate level hardware. Another "Lossless" Code is the "Golay" Code some- times used in communications as an elementary form of FEC. >Handshake. An exchange of signals (flags and strobes) between a sender and a receiver that control the flow of information. Implies a byte by byte positive control scheme. Implies use of metallic wires. Example: GPIB. Update 88 ---> Software Handshaking is a logical extension of the hardware form (above). A "Handshake" differs from a "Semaphore" or "Flag" in that it can pass significant information between participants, not just a "True/False" or numeric value. Some Handshake schemes are quite elaborate. The term predates computers by about a thousand years, being used by the Mason's Guild since the Middle Ages. Most fraternities (including the Mason- ic F&AM) continue the tradition of an identifying "grip". Formal rules define the meaning of the signals exchanged, i.e., a "Protocol" is involved. >Hard Disk. A mass memory system for computers based on a rigid aluminum platter coated with a polished ferrite above which is suspended a read/write head bucking aerodynamic lift against strong springs to achieve a very narrow gap (about 1/30 the thickness of a human hair). Under normal conditions, no actual contact occurs (See "Head Crash"). Nonvolatile. Fragile while in operation and subject to contamination due to dust and tobacco smoke (See "Winchester Disk"). Faster than flexible disks. Many variations including multiplatter stacks & high performance controllers. Information density of disk systems has doubled every three years for the past decade with no end in sight. AKA Spinning Storage, Spindle or simply "Disk". The keystone of modern large computers providing the basis of their performance and the primary limitation to their actual throughput. (See DOS). +Hard Disk, History of. The aerodynamically suspended (flying) head predates disk technology by nearly a decade having been developed w/ the magnetic drum which first appeared on the IBM 650 in 1948. Attempts to build a drum memory w/ a single movable head encountered serious manufacturing problems associat- ed w/ holding ultra-precise surface tolerances on a curved surface. Surface smoothing technology for flat surfaces was a well developed art and designers envisioned a flat "drum" rather like a phonograph record w/ the head on a pivoted "tone arm". Underestimating the stresses involved, the first prototype flew apart w/ explosive force injuring several bystanders. Rebels in a basement workshop revived the project (which was officially canceled) producing a much beefed up version successfully demonstrating the breakthrough nature of disk technology. First marketed in 1957 for the IBM 305 system as a 50 platter stack of 24 inch disks holding about 5 Mb (50,000 "Punch Cards"). These early disks used hydraulic actuators for head positioners controlling them w/ solenoid valves driven by thyratron tubes. Tracks were defined by mechanical detents similar to TABs on a manual typewriter. Used until the middle 1960's when solid state controllers and stepping motors appeared. Head positioners were of the "Open Loop" type until 1971 when IBM intro- duced "Servo Tracks" (Closed Loop) system using permanently recorded "guide" tracks on one surface to control head positioning. Doing so signifi- cantly improved thermal tracking allowing more tracks and removable disk packs. Conventional Flying Heads are called "Ramp Loaded" or "Dynamically Loaded" since the heads are physically retracted until the disk spins up. An IBM project named "Winchester" (its goal of 30 Mb on 30 track suggested the 30-30 rifle). What resulted was something new: A sealed Hard Disk w/ a lubricated surface (to allow the heads to "Soft Land" and park on power down). Marketed in 1973 in as 14 inch format, Winchester drives established themselves as being of unusually high capacity, high reliability and exceptionally durable. IBM's "Piccolo" project brought an 8 inch Winchester design to market in 1979, plus non-IBM vendors brought forth similar OEM versions targeted at microcomputers. For the general public, this was the first "Winchester" drive. Coming on the heels of the floppy disk revolution , this catapulted micros into the serious machine category in the business/scientific world. The 5.25 inch Winchester appeared in 1980 (from Seagate) targeted specifical- ly at micros. A large part of the success of hard disk technology is associated w/ the high degree of intelligence embodied in the disk controller. Our Traditional expections are based on IBM's "Merlin" controller which was the subject of a long, bitter and costly lawsuit involving the theft of trade secrets. Regard- less of the merits of the case (IBM eventually won) the effect was to migrate information about Merlin into the public domain allowing hard disks vendors to build on a proven design. Disks have maintained an astounding growth rate in information density averaging a three-fold increase every three years for over a decade. Each time a physical limit has been reached, disk technology has stepped aside and bypassed it. Current trends (6/84) are to non-ferrite coatings either plated or sputtered onto the aluminum substrate. Improved information coding/ processing and pre-amps on the head assemblies has enabled use of smaller signals, smaller head/surface gaps, smaller (thin film) heads and overall higher information densities within the track itself. Improved positioners, closed loop servos, embedded servo tracks and like techniques reduce the "guard band" space between tracks allowing more tracks/surface. From the beginning, Hard drives depended on synchronous (3,600 rmp) motors. Locked to the 60 Hz line frequency (which is carefully controlled by power companies to allow load-sharing), Hard Disks experience a "Rotational Laten- cy" of about 16 mS. Track buffering helps, but access times under 10 mS are rare. Where cost is no object (but performance is), broadsiding bits (on separate surfaces) allows megabyte/s data burst rates, but do nothing about rotational delays. Lap-tops w/ hard drives have no power line to lock to. At first they used a simple 60 Hz inverter and a conventional Hard Drive, a power hungry combi- nation. Improved controls allowed DC driven Hard Drives which, it turns out, aren't necessarily driven at 3,600 rpm. PC Hard Drives w/ 4,800 (even 6,000) rpm rates are marketed. Reflecting the new reality of Computers, IBM is delivering a Mainframe Hard Drive spun at 4,200 rpm, providing 40% faster access (loudly hyped as a "Breakthrough"). >Hard Error. An error introduced in data that is not correctable. An error caused by a hardware failure. >Hard Reset. A "Warm Boot". >Hard Sectored. Said of flexible disks. The dividing lines for the pie- shaped segments ("sectors") of the disk are marked by holes punched in the media, i.e., the dividing lines are "Hard." The opposite (and more common) situation is the "Soft Sectored" disk which uses timing to set the sector boundaries based on a single timing hole punched in the media. >Hardware Floating Point. AKA Floating Point Accelerator (FPA) or "Math Co- Processor". A coprocessor running in parallel with the main CPU. Floating point instructions are recognized and executed in hardware. Since hardware is faster than software, the speed gain is dramatic. >Hardware Handshake. AKA EIA Handshake. The control of data flow on a serial (RS-232) link by level shifts on mutually agreed on pins. Despite the "EIA" handle, there is no standard. Almost universal use of UARTs (which include a level controlled gate on the output and a "Buffer Full" flag on the input) has established a defacto operating standard ala X-ON/X-OFF using flag pins. DEC seems to favor using RTS/CTS. Other use DTR/RSR. Other combina- tions (including use of pin 19) exist. Interestingly, a true RS-232-C port (as is found on many mini's) will not hardware handshake and can not be made to do so. ---> Update 89: EIA RS-232-D legalizes RTS/CTS hardware handshake. >Hash. Said of Pointer Routines. A class of algorithms that speed list searches by computing a starting point based on the entry text itself. The effect is to "splatter" entries across a data list. Often used in disk directory systems. So named for the "hash" made of the original text. >Head Crash. Said of hard disk systems. The most feared failure mode. Nearly always results in data loss. May completely destroy the recording media. Caused by loss of the roughly one micron wide gap between the sta- tionary head and the rapidly revolving disk. Nearly always caused by dirt particularly tobacco smoke. >Headend. The frequency shifting unit found in a Mid-split broadband LAN. May include monitoring/testing equipment. Usually located at some central- ized point. A single point of failure for broadband LANs. >Hen & Piglets. A simple multitasking scheme based on a monitor program (the "Hen") which is called at intervals by each of the executing programs (the "Pig- lets") so that system resources can be shared. Easily accomplished inside a normal program, this scheme has no protection against a task going Whole Hog. >Heuristic. Any "U-Drive" scheme of problem solving that doesn't solve the problem, but helps you do it yourself (assuming you know how). Popular w/ Logic Simulators ala LASAR, TEGIS and LOGOS. >Hex. Hexadecimal. A scheme for representing all combinations of 4 bits by the numbers 0-9 and letters A-F. >Hierarchical Directory. A directory (or file system) structure in which each directory may contain other directories as well as files. +High Level Languages, History of. Languages tend to "Fuzz" into being over a significant period of time, perhaps as long as a decade (in the case of Pascal), although some spring into being very quickly (like Prolog). The intent here is to profile the overlap and cross-pollination of evolving languages. 1954 Fortran I Announced (First HLL). 1956 Fortran I Released (on an IBM 704). 1958 ACM initiates ALGOL effort. 1959 DOD initiates COBOL effort. 1960 ALGOL-60 Released. 1961 COBOL-61 Released. (First widely used version). 1962 Fortran IV Released. BASIC Introduced (at Dartmouth). SNOBOL Released by IBM. 1965 PL/1 Released. APL Released. BASIC Released. c1965 LISP Introduced. 1966 ANSI Fortran-66 Standard. 1968 ANSI ALGOL-68 Standard. 1971 Pascal Introduced as a Teaching Tool. 'C' Development Starts. Prolog (an AI Language) Released. 1974 ANSI Minimal BASIC Standard. ("Tiny BASIC") 1975 'C' published in Bell System Journal. 1976 HP Introduces 'Rocky Mountain' BASIC on 9845A. MicroSoft Introduces 'MicroSoft' BASIC on MITS Altair. DOD-1 (Ada) Project Begins. 1977 ANSI Fortran-77 Standard. ANSI MUMPS-77 Standard. FORTH-77 Released. 1978 'C' Released w/ Unix. ANSI ATLAS-78 ATE Language Released. 1979 DOD-1 Standard Frozen. Renamed 'Ada'. USCD Pascal Released. (First widely used version). FORTH-79 Released. 1980 Smalltalk-80 from Xerox. IEEE ATLAS-81 Upgrade. 1983 Modula-2 Released. ANSI Pascal-83 Released. 1984 First Ada Compilers Validated. (Language effectively Released). 1985 C/ATLAS-85 Released. 1987 ISO BASIC (the Full Language) via ECMA. C++ (An Object Oriented Language) Published. 1988 Ada Fails NASA/DOD Posix Tests. NBS Tasked to "Fix" it. 1989 ANSI 'C' Language Standard & Standard Libraries. ANSI BASIC-89 Standard. (First Full US Standard .. 25 Years Late). ANSI Fortran-89 Standard. >HITS. Hierarchical Integrated Test Simulator. A yet-to-be successful Navy project to create a mixed mode gate/functional level simulator. Originally intended to allow on-the-fly switches between model types. Based on LOGOS, an excellent behavioral simulator. Slow. >Hollerith. The name of a type of field in Fortran IV used to simulate a text handling capability. Frustrating to use. +Hollerith, Herman. ( ) An engineer working for the US Census Bureau generally credited w/ the invention of the punch card once widely used in data processing. The punched card actually predates him by almost 100 years, having been in wide spread use controlling power looms since England adopted the design of Joseph Jacquard (1752-1834) around 1810. (The Jacquard Loom was an improvement of a 1750 design for a silk weaving machine con- trolled by a punched paper roll similar to that used in a player piano. Technically successful, it resulted in labor revolts). Although Babbage proposed to use punched cards to control his Analytical Engine, Hollerith is unquestionably the first to apply them successfully to data processing. Hollerith's cards were the size of dollar bills (which were somewhat larger then). His machines were used in the 1890 Census with good success. In 1911, the company that became IBM picked up the idea as the basis of an array of bookkeeping and tabulating machines. The punch card sorter was patented in 1925 and the format for the common 80 column card was frozen in 1928, 18 years before the first electronic data processing machine used them. >Host. Where your program is running. +HP-9845, Significance of. It was supposed to be a business machine. It was the High Water mark for ROM-based machines. As one HP-UX instructor put it, "The 9845 was a Real Machine Designed by Real Engineers to do Real Work." It cost $20-40K, not something to invest in lightly. It came to Market the same year as DEC's VAX-11/780 (1976-1985). US production ended in 1987 w/ German production continuing into the 1990s. They obviously did something right. It was called "Qwert" after its built-in Full ASCII Keyboard. Powered by dual 16 bit (custom) CPUs, it had 62K of DRAM, Dual DC-100 MiniCartridge Drives, a built-in 12 inch CRT w/ "EGA" Graphics, a Built-in Thermal Printer and 4 I/O slots. "Galleon" (HP-9845B) (1977) added two more bits to RAM Ad- dressing registers and featured 187K of RAM expandable to 1 Mb. (4 "Qwert"s to the "Galleon"). As a Business machine, it flopped. As a result, the Loveland, Colorado, Calculator Division was disbanded. What they had built was a CAE Workstation. It was User Friendly (See Same) to the extent that crashed programs could be "patched" and "UnCrashed" without losing Data or ReStarting. Its Language came to be known as "Rocky Mountain Basic", a polyglot of Basic, Fortran, ALGOL, PL/I and APL, that featured BCD math (no Round-Off Error). (Unlike IEEE Floating Point, BCD can tally a hundred pennies and get exactly $1.00 every time). David Pick, a former HP employee, spun off and marketed the PICK Operating System (See Same) in the late 70's using a very power dialect of Basic that features BCD Math. Its use is so widespread in Europe that ECMA insisted ISO issue a Full Basic Standard that reads like a Rocky Mountain Basic Program- mer's Guide. Bill Gates Cooped at HP, founded MicroSoft and fielded MS-Basic (later BASICA & GW-Basic) so similar to Rocky Mountain Basic that he felt it wise to adopt DEC's "LEFT$/MID$/RIGHT$" string handling to avoid a lawsuit (Pick did likewise). Meanwhile, HP lost the road map. "Dawn" (HP-9000/520) was supposed to be a "Super 9845". It was pathetic. When the 9845 was built, Engineers did both the hardware and the software, balancing each against the strengths and weaknesses of the other. The resulting system was a lot of little things done right so that the combination was much more powerful than the modest power of either suggests. Not until HP's "Precision Architecture" did com- puter hardware & software designers actually work together again. (Dawn's thermal printer has a hardware Top of Form sensor which reads index holes in the special paper to generate a signal the Software ignores. Sad.) Rocky Mountain Basic lost BCD Math w/ the introduction of the 9000 Series (1984). For a long while, HP tried to "Leverage" Basic Users into Pascal (which is clearly inferior). They now show renewed interest in Basic (running under Unix). The first Fully ISO compliant PC Basic is Power-Basic 2.0 (1/90), an upgrade to Borland's Turbo-Basic. 9845 BCD Basic lives again on the PC. Some of Loveland's Engineers moved to Corvalus, Washington where they created the HP-85 (which "creamed" the 9825 instrument controller, an $8K box) and the 7470 pinchwheel pen plotter (called "Sweet Lips"). Loveland always took the honors for Imaginative Project Titles. At the End, Corporate wanted a "Galleon" Knock-off. Graphics was stripped from the CRT (Project "Stark"), a cheaper "Magnetic Actuation Detection" keyboard was designed (buyers rejected "chicklet" keys) and one CPU was ripped out. They named their Swan Song, Project "Raven" ("Quote the Raven, 'Nevermore'.") HP-9835 ("Stark-Raven-MAD") bombed. +Human. A biologically based single user, multi-tasking, multi-processor highly pipelined parallel processing portable real-time system. Optimized for pattern recognition, Voice I/O and adaptation to changing requirements. Slow. Electro-Chemically powered. Cache RAM plus 20 minute buffer backed up by pointer-drive Lifetime main RAM. Foreground processing requires periodic suspension for buffer flush/maintenance ("sleep"). Background associative (subconscious) processes run continuously as bookkeeping, error detection and non-indexed information retriever (Foreground often loses pointers). Pro- grammed to make errors, evaluate actions against a knowledge-based "value system", and "Learn". Superior to solid-state CPUs in situations requiring complex pattern recognition or adaptive response to unstructured situations involving contradictory and/or incomplete information, but inferior for repetitious, monotonous tasks. Output must always be viewed with suspicion as units are assembled by unskilled labor from available materials. Deliv- ered in two basic models up & running w/ a Lifetime warranty. >Hybrid IC. A composite circuit technology based on conductors silk screened onto a ceramic substrate and fired ala pottery after which components are mounted (including monolithic IC's). The resulting circuit is usually her- metically sealed, often w/ a "bathtub" style metal cap. Never really popu- lar, hybrid IC technology hangs onto various niches in analog (and some digital) applications which, for one reason or another, do not lend them- selves to monolithic technologies. -I- +IBM, History of. International Business Machines never wanted to build Computers. Fact. Circumstances forced them to do so to Protect their Business Machine Market Share. Along the Way they Invented Virtually Every- thing we Associate w/ Computers, including so much Jargon that "IBM" appears in this Document No Less than 150 Times. A direct Descendent of Hollerith's Punch Card Tabulators (used in the 1890 Census), IBM began in 1911 as the "Computing-Tabulating-Recording" Company. Unfortunately, a Rival (also a Census Bureau Spin-off) was doing quite well selling Business Users Punch Card Systems. Pushed to near Bankruptcy, CTR bet everything on a New Reader/Printer introduced in 1912. The Read/Printer allowed CTR to sell a "Total Business Solution" (At a Premium Price). This hard-won lesson has carried them through two World Wars, the Great Depression and Countless Shifts in Technology. They Also learned that Technology was their "Edge" in the "Business of Business". Though their Rival survived to become Rand, then Remminton-Rand, later Sperry-Rand, Sperry-Univac and finally UniSys, it never seriously threatened CTR/IBM again. CTR expanded into Typewriters (electrified in 1935), Tabulators (in direct competition w/ Burroughs) and all manner of Punch Card machines. The Multi- Bin Card Sorter introduced in 1925 allowed Punch Cards to be Used as a Data Base, a significant breakthrough. The same year CTR opened a sales office in Canada and changed its Name to "International Business Machines." The famous "IBM Card" appeared in 1928, just in Time for the Bottom to Fall Out of the Stock Market. IBM, unable to sell its machines, went into the Data Processing Business, seeking contracts from various Government and Research Organizations that badly needed Computational "Bang/Buck". Out of this experience came a new generation High Speed Tabulator/Calculator called "Comptometers". IBM didn't want to be (and didn't stay) in the Data Processing Business, but learned a valuable lesson: Speed Sells. Against this backdrop, Atkins approached IBM in 1936 for funding to build an Electo-Mechanical version of Babbage's Dream Machine, the Analytical Engine (See Mark I). He got a Million Dollars & IBM got the Patents. As it turned out, this was the High Water Mark of Tabulator Technology. ENIAC proved Electronics works Better than Gears & Relays (Bell Labs built an all Relay Computer w/ 9,000 Telephone style Relays. It proved ten times slower and less reliable than ENIAC's 18,000 vacuum tubes). IBM built and sold several Electron Calculator designs (notably the 650 in the early 50's) but did not follow the ENIAC-EDVAC-UNIVAC "Serial" design route for Comput- ers. (In a "Serial" Computer, trains of pulses are shuttled around like so many boxcars. The Major advantage is that Delay Lines (usually iron tubes filled w/ liquid mercury) can serve as RAM). In a Shrewd Business move, IBM took on the enormous SAGE Air Defense project, gaining access to MIT's "Whirlwind" Technology. This was a 16 bit "Parallel" Design in which Words moved along bit-parallel (as in all Modern CPUs). When IBM unleashed the 701 on the Business World (1953), they were in the Business Computer Business to Stay. Early Machines were $20 Million Monsters needing Enormous Amounts of Energy, Air Conditioning and Manpower. IBM had to Bootstrap an Entire Industry Up from Point Zero and Make a Profit doing it (No Small Feat). They Already had an Installed Base of Punch card Users. These were "Leveraged" into the world of "Automated Data Processing" (ADP). To Offset the Crushing Cost of Computers, IBM Leased Machines. As they became obsolete, they were donated to Schools. The Schools responded w/ a Steady Stream of Computer Science graduates firmly grounded in IBM methods. To Businessmen, IBM provided a "Total Support" package that, more often than not, included an On-Site Maintenance Team. It was expensive, but IBM suc- cessfully justified that expense in hard-nosed business terms. It worked. ---> An Aside: The Mainframe Environment. Technical Users find Mainframes to be User Hostile, Slow, Expensive and Crude. But Technical Users are not (and Never were) the Focus of Mainframes. It is a Different World. Mainframes Applications Focus Inward, optimizing Hardware/Software to Maximize the Throughput of the CPU. Basically, Mainframes do Many Jobs, Each done Slowly, to Minimize Disk Access Bottlenecks. Emphasis is on Accountability, Audit Trails and Crash Recoverability. Loss of Data is the Ultimate Sin. Almost by Definition, Mainframes are "One-of-a-Kind" Installations. No two are Alike and the Sum Total of Any Model Sold is surprisingly Small. Each Installation has a Sizable Support Staff and All Sites are Highly Customized for their Specific Application. "Patches", "Updates" and "Fixes" are a way of Life. Mainframe Software is Usually Written to Order. The "Beta Site" is the Customer's Machine. GSA's 1986 report on Mainframe Software Reliability is Sobering: Only 2% of the Software the Government Purchases Worked as Expected on Initial Delivery. An Additional 3% was Fully Acceptable after Minor Touch Ups. 19% required Substantial Rework to be Fully Acceptable. 37% Required Major ReWrite/ReDesign to be Usable even in Part. 39% did Not Work at All and Could Not Be Made to Work. This is a Defect Rate of 95%!! Sad. Mainframes are Essentially Batch Machines. Time Share is Possible, but not Effective Unless a "Front-End Processor" (FEP) is used to handle the "Chatter" & queue up Tasks ala RJE. IBM generally splits their Systems into "Virtual Machines", each the size of a Middle 60's CPU (today's PC-AT). Each "VM" Session Thinks it is a Complete CPU with Total Control of All Hardware/ Peripherals. This Allows Divergent Operating Systems to Co-Exist on the Same Mainframe (which is what AIX hopes to do). Because of their Inability to Standardize (and OEM encouragement), Main- frames are "Closed Systems". Choosing a Mainframe OEM is a lot like Getting Married. It is a Long Term Relationship, sometimes a stormy one, with Rewards, Costs and Obligations. Switching Mainframe OEMs is a lot like a Messy Divorce; Not sometime done casually. This "FUD Factor" (Fear, Uncertanty & Doubt) tends to "Lock In" Users. --- IBM has had its Disasters, too. In 1964, They switched to the 360/370 Family of machines across the board. They bet the Ranch on OS/360, a Software project Larger and more Complex than Anything Ever Done Before. Iron shipped on time; software was late. Very late. 18 months late. After 9 months of schedule slips, IBM was in very real danger of bankruptcy (a closely guarded secret at the time). Management was apalled to discover that the entire OS/360 project was a shambles. It was "Kill and/or Cure" time. Coding was halted. Planning documents were created and many, many design hours expended before the next line of code was written. Nearly everything previously done was scrapped. Before Management intervention, the emphasis was on programmer output (they expected 20 lines of working code per person per hour). But nobody was minding the store, so nothing worked together. Shambles. Guided by the planning documents and rigorously tested against design specs, OS/360 slowly evolved over the next 9 months. After delivery (and a long sigh of relief), IBM published a book on their experiences noting that, counting planning, documentation and testing, the actual productivity of each programmer turned out to be 1/10th of a line of working code per person per DAY! OS/360 proved to be a Quality Product well worth the wait. Along the Way, IBM Invented Walk-Throughs and all the Documentation/Planning and Validation Checks Now Embodied in MIL-STD-1696. They also created the pastel blue color scheme that has earned them the "Big Blue" and "Ice Blue Monster" handles. IBM learned Another Valuable Lesson: Don't Handle the Bytes that Feed You. Another Hard Learned Lesson was that Users don't Tolerate Desktop Hardware that Breaks. Since IBM generally provides On-Site Service, Reliability was never an issue in Mainframes (They were Designed for Maintainability). After three Abortive attempts to Field a Desktop Machine ala CP/M (they bought them all back), IBM turned loose one of their "Enterprise Groups" w/ only One Guideline: Do It Cheap. So they took Off-the-Shelf Technology, bought PC-DOS from MicroSoft and Enticed a Mob of Third Party Hardware/Software Developers to Invest Their Own Money in After Market Add-ons/Drop-ins. They Announced the IBM PC in 1981. It clobbered CP/M, CP/M-86, Apple DOS, Apple III, Osborne, TRS-80 and the Ill-advised DEC Rainbow. "PC" came to mean "IBM PC", a Defacto Standard. To Software Developers, the PC was an "Open System" (IBM wasn't Interested in Spread-Sheets or Adventure Games). However, Iron was another Matter. The BIOS resides in Copyrighted ROM. IBM moved quickly against "Clone" OEMs. Business Users bought IBM PCs by the Truck Load. In 1983, Phoenix Technology "cracked" PC ROM BIOS by Using a "Clean Team" to "Reinvent" a functional equivalent. They invited IBM to sue (They Didn't) and offered Customers "Litigation Insurance" (through Lloyd's of London). The "Clone Wars" were On! And PCjr was Dead Meat. Crippled by Design (128K RAM Max and a single floppy drive), the "Peanut" was a toy costing more than a "Real" 640K Clone. IBM scrapped them by the Truck Load. Another Lesson: Name Alone can't sell a Turkey. In trying to do the PC "On the Cheap", IBM accidentally created an Open System. This was (from their standpoint) a Major Error. Generally, IBM protects its Price Premium behind a wall of Proprietary Standards which are NEVER revealed to Outsiders. "Plug Compatible" OEMs always had to wrestle w/ untangling Product Specific features from what comprised IBM's real Stand- ards. And if those OEMs did too good a job, IBM just changed the Standards. Hard Ball. The Above practice (plus a Couple of Attempts to Run Roughshod Over ISO) caused EC to bar IBM from Access to the European Common Market. US State Department Intervention struck a Compromise: IBM agrees to Formally Publish All Inhouse Standards "within a reasonable time of product introduction." EC agreed, but stipulated that "a reasonable time" was no more than Two Years. (Which is why IBM just Release the MCA Standard). IBM learned Another Lesson: Standards in Europe have Teeth. We, the Technical Users, view OS/2-PS/2 as a Major Mistake. Actually IBM got exactly what it wanted: A Closed System, Proprietary Hardware, No Clones. They had hoped for More Third Party Software, but really intended the PS/2 to be an SAA Network Node running Applications on Remote Mainframes, so it didn't Really Matter. OS/2-PS/2 turned out to be less "Gee Whiz" than expected, but they will Sell to IBM's "Captive" Business Users. Still, OS/2-PS/2 did NOT establish a Defacto Standard. IBM really hoped it would. When MicroSoft jazzed up MS-Windows too much, IBM moved quickly to prevent a DOS-based OS/2 Rival. (After Bill Gates returned from the "Woodshed", MS-Window froze for two years). OS/2-PS/2 has hurt IBM's Image. Of the Fortune 500 Companies, 59% Feel IBM has Lost its Ability to Mandate Standards. The "Captive Market" is getting Restless. DEC has launched a Major Move into IBM's Private Preserve (Business), leveraging its DECnet Connectivity into formerly "True Blue" Data Processing Centers. (IBM's Token Rings and AIX "Open Systems" remain mostly Vaporware). How serious this has become can judged by a Major Shift in IBM's "Total Support" Policy: They Now Repair/Maintain ALL On-Site hardware, "Ice Blue" or not. With a (1988) Sales Volume of $60 Billion, IBM is far from another 1912 "Squeaker". It is 5 Times the Size of DEC, its Closest Rival. On the other hand, Mainframes have clearly Peaked. IBM's current tactics of Promises, Minimal Compliance w/ Standards, and Limited Connectivity may "Fence In" current Business Users, but New "Marriage Partners" with open checkbooks and a willingness to "Trust Me" may be scarce. Even Business is Becoming a Buyer's Market. Still, the Business of IBM is Business, and They are Very Good at It. ---- And That is Precisely the Point. We are Outside IBM's Focus because Business Applications are Classical Computer Science and almost Nothing we do is. IBM Builds Very Good Iron, Solid Software and Does Very Good Work. They have maintained a Price Premium for "Total Business Solutions" for 7 Decades. They Must be doing Something Right. However, Misapplying Business Solutions to Technical Problems can be Very Expensive. (It doesn't Work Well, either). >Icon. A pictorial representation. Implies the ability to move it as a single entity ala Smalltalk or LOGO. >Idiot Stick. A short (2-4 foot) broomstick w/ a grounded hook on the end used to "Crowbar" high voltage capacitors in high power vacuum tube installa- tions such as AM radio stations and "Shaker Tables" (as are "over the hill" behind Bldg 38). AKA a "Crowbar". +Idiot Stick. A railroad switchman's tool consisting of a 4 foot broomstick w/ a wire hook on the end. Used to align the links in Link & Pin Couplers (now displaced by an automatic design invented by a long forgotten black man). Never really practical, hence the name, this tool served better as a weapon. Many a Hobo has been "Hit with an Idiot Stick." >IEEE. Institute of Electrical and Electronic Engineers. A professional organization of engineers by and for managers. Significant primarily for the technical forums sponsored and the standards produced by its Technical Com- mittees. >IEEE-488. A slightly modified version of the HP-IB system designed by Hewlett-Packard. Also called the "General Purpose Interface Bus" (GPIB). Used primarily to interface test equipment, particularly bench top gear. >IEEE-696. AKA S-100 Bus AKA Altair Bus. An updated version of the 100 pin bus structure popularized by the MITS Altair computer. Originated because MITS got a good price on 100 pin edge card connectors. Claimed to be a standard sufficiently exhaustive as to allow multivendor systems on a plug in and go basis. Some problems. Remarkably successful. >IEEE-802.X. A group of LAN standards. 802.3 is CSMA/CD superset of Ether- net, w/ both Baseband and Broadband versions. 802.4 is Token Bus ala MAP. 802.5 is a Token Ring. The initial squabbling, sponsored in part by IBM, has settled down, but much remains to be done. >IGES. Initial Graphics Exchange System. An all ASCII (Verbose) format for the interchange of CAD information. With over 135 element types (at last count)and hundreds of options, IGES transfers are anything but transparent (Labels get lost a lot). No one implements the entire element/option set so 100% transfers between unlike systems are rare. ANSI Y14.26 M-1987 (V 3.0) is identical to NBSIR 86-3359, April 1986. >Incremental Compiler. A compiler that preserves the line by line nature of the original source code so that patches can be made by recompiling only the changed lines. >Information Hiding. A method of top-down modular programming which "hides" hardware/process specific details from the upper "Management" levels. Always more code and overhead (read lower performance) than optimal, this scheme tends to restrict platform dependencies to a few simple modules, an advantage in porting to new iron. Widely used commercially, which is why Posix (which replaces those "few" modules with "sockets") ports are so easy. >Inode. Internal Node (Number). The slot Number in a Disk's Catalog File containing the location, size, date of creation/update and any attributes (such as access permissions) associated with a data file. Notice the File's Name is missing. Names are kept in data files called "Directories" which are created, manipulated and altered by Users. Users do not have access to the Inode File. When you create a File, the Name you specify is "linked" to an Inode which, in effect, is the "Real" name of the File. When you ERASE a File, the Name/Inode linkage is broken. When Inodes are "Orphaned" (have no links) their disk blocks are placed in the Free List and they become available for Reuse. DOS allows only a single "link" per Inode. Unix, VMS, RSX and many other Systems allow multiple links (called "aliases"). On Ginger "Mail", "email" and "mailx" all point to the same file and are functionally equivalent. Some programs ("ls" on Unix for one) react to the name you used to call them. "ls", "lsx" and "lsf" all produce DIR listings using the "ls" program, but "lsx" and "lsf" act as if you had set the "/X" or "/F" switch, respec- tively. DOS shows signs of heading that way, too, as Version 3.X passes the program's name as argv[0] (for "C" Users), something not very useful unless multiple links are allowed. >Instruction Set. The collection of binary tokens that make up the list of legal commands for a particular processor (CPU). During execution, these tokens are expanded into microcode (usually a sequence of such words) that control the various gates, registers, etc. to do something useful. In gener- al, the larger the token, the more options allowed, i.e., the "richer" the instruction set. >Interface. The boundary between two entities. A fence across which is passed information and control signals. May be hardware or software. >Interlaced. A scanning scheme popularized by TV to minimize flicker by repainting the CRT in two passes interleaving odd and even lines. Superior for the display of motion, interlaced systems are poorly suited for computer displays due to "frame jitter" and are rarely used for serious work. >Interleave Factor. A number which determines the order in which sectors on a mass storage medium are accessed. It can be optimized to make data re- trieval more efficient. >Interoperability. The ability to network machines of varying origin, con- figuration and vintage so that they work together as expected. Possible "Real Soon Now". (Single Vendor Solutions don't count). >Interrupt. An event demanding immediate attention, like a doorbell or a telephone ringing. A process which responds to an external stimulus is said to be "interrupt driven". >Interpreter. A portion of the operating system that creates object code one line at a time from source code just prior to execution. There is no object file. Easy to change and debug. Fast edit cycles. Supports TRACE opera- tions. Slow to execute. BASIC is usually interpretive. See also "Parser". >I/O. Input/Output. Moving information into and out of the CPU. >I/O Redirection. A mechanism provided by the DOS/Unix shells for changing the source of data for standard input and/or the destination of data for standard output and standard error. See Pipes. >ISDN. Integrated Services Digital Network. A Telco digital/digital voice network underwhelming in all aspects except cost. Currently (1988) being test-marketed in Atlanta. By-Pass technologies such as VSAT (Very Small Aperture Terminals for Satellites), fiber optics, point-to-point microwave and even Sytek on Cable TV are keeping the cap on Telco's greed. >ISO. International Standards Organization. A world-wide standards body. ANSI is the USA representative. Recently noted for the GPIB standard and the Open Systems Interconnect model (See same) which ended the IBM Antitrust suit. >ISO Network. A suite of protocols ala TCP/IP. Based at the lower levels (OSI layers 3 & 4) on the protocols which Xerox published following the failure of X-TEN. Mail (X.400) barrows heavily from the (unpublished) Xerox "Courier" protocol from XNS resulting in a dynamite package. FTAM handles file transfers and VTP handles virtual terminal access. Of these three application level protocols, only X.400 is being delivered (June 88). FTAM is "Real Soon Now" and VTP is vaporware. NBS has been mandated by Congress to assist in the transition of Government Users (primarily DOD) to ISO. Considering the TCP/IP installed base, a successful port of X.400, FTAM and VTP could set up another RS-449/RS-232 situation. >IRM. Information Resource Management. The new "Buzz" for ADP. Computer Scientists, by virtue of IBM's creation of the field and continuing support, are the mouthpiece of the Mainframe Mindset. So long and so loud have they blasted their particular brand of bovine dust that the Public in general (and Congress in particular) believes their's is the only valid viewpoint. As a result, knee-jerk jerks have saddled everyone with regulations that demand Risk & Threat studies for Pocket Calculators, consideration of Halgon Fire Suppression for Laptops and lenghty studies (in triplicate) for LaserJet printers (lest we compete w/ NAVPUBs). It isn't that Congress doesn't know we, the Users, exist. They don't even Suspect. Not a Clue. -J- >JAN. Joint Army/Navy. A designator indicating the part so marked has met rigid standards for fabrication and performance. >Jargon. The technical terminology of a particular group. AKA "Computerese" The familiarity with which is popularly termed "Computer Literacy". >JCL. Job Control Language. The crude beginnings of an operating system in the days of Batch processing. Job control allows users to selectively stop (suspend) the execution of processes and continue (resume) their execution at a later point, to move processes into background and to set (or reset) execu- tion priority. >Johnson Code. An unweighed BCD code easily generated w/ a shift register recirculated through an inverter. Once popularly used in electronic coun- ters, now found primarily in digital wristwatches. AKA Shift-Counter Code. >Joy Stick. A small, erect lever resembling the control stick of an air- plane. Used as a cursor control scheme. Popularized by video games. -K- >K. Usually 10^3 (1,000). When discussing data, 2^10 (1024). Thus, 64K is really 65,536 bits. In the same vein, a memory "Meg" is KxK (1,048,576). >Kermit. A Public Domain file transfer program/protocol created by Frank da Cruz of Columbia University. The character-oriented protocol is prized for its ability to work with all kinds of hardware/software/ops systems from micros to Crays and the solid EDAC scheme that tolerates noisy phone lines. The Kermit program is surprisingly sophisticated including such features as "Sliding Windows" for Satellite Shots and on-the-fly data compression. "Kermit" is a marvelous name derived from old Celtic meaning "Free from the Restraints of Society" with the implications of wandering like a gypsy. ("Hermits" shun society and stay put). "Kermit, the Frog" is a Jim Henderson muppet true to the tradition. Likewise, the da Cruz's creation honors the tradition, but he confesses that it's name was taken from a Muppet poster. "Kermit" is a muppet trademark and is used by permission. >Kernel. The operating system executable code responsible for managing the computer's resources, such as allocating memory, creating processes, and scheduling programs for execution. Loaded at Bootup, the Kernel stays RAM resident at all times. ISRs (Interrupt Service Routines), device drivers and the like comprise most of the Kernel code. Generally invisible to Users, Programmers access the Kernel via "System Calls". Much of SVID is the func- tional spec for the Unix Kernel. >Keypunch. Originally, a machine designed to punch rectangular holes in a pasteboard card. Now, the act of entering information into a computer via a keyboard. +Kilroy. A civilian employee of the Brooklyn Navy Yard, Kilroy was a welding inspector assigned to Liberty (cargo) Ship production during WW II. Since he worked Graveyard shift, his crews rarely saw him although his chalk marks outlined rework for the day shift. Acceptance sign-off included a small reminder that a nosy bald little man was Overseeing their work. Finding that, the welders packed up and moved on leaving the pipefitters and mechan- ics to pounder the source of this moonlight graffiti. Soon ___ Kilroy began to find his little man chalked on all sorts of /_ _ \ tanks, bombs and war goods. The French underground adopt- | o o ~| ed him as a means of taunting the Nazis, who left us ---uuu----U-----uuu--- a thick file on an Allied Agent who signed his Work: Kilroy Was Here. >Kludge. A jury-rigged lash-up that works. Both a slam and a left-handed compliment to German General von Kludge who, in the days following D-Day, fought a brilliant delaying campaign w/ a rag-tag collection of old-timers and boys using available resources, often in unusual and innovative ways. -L- >LAN. Local Area Network. A network serving the data communications needs of a limited area. The larger LANs are classified as "MetroNets" and cover a 50 mile radius. The trade off is throughput vs distance so very short sys- tems can have very high data exchange rates (EtherNet uses 10Mbaud) while MetroNets usually run about 135Kbaud/channel (as does CenterNET locally). >LASAR. Logic Automatic Stimulus And Response. Originated on Navy contract, D-2 LASAR was first marketed by DigiTest as D-4 LASAR which became a defacto standard for logic simulators. Based on Bell Labs "D" algorithm (A-C didn't work), LASAR handles circuits as NAND gate equivalents using the "D" madmouse in a maze method to discover the test vectors required. DigiTest was pur- chased by Teradyne who moved LASAR to a VAX-11/780 calling it D5 LASAR. LASAR version 6 drops the "D" mouse, which has become less effective in dealing with modern bus- oriented circuits. Powerful. Expensive to use. More expensive not to. >LASER. Light Amplification by Stimulated Emission of Radiation. A light source produced by "quantum pumping" the electrons of a gaseous, liquid or solid media into an elevated energy state. Electrons drop from this excited state to an intermediate level, giving up a photon of light in the process. On dropping into the lowest energy state (giving up a photon of heat), the electron is "pumped" back to the highest state by an external energy input usually light or current flow. By using mirrors, light rays are bounced through the media encouraging transitions to the intermediate state. In so doing, the light ray is "amplified" into a very strong beam of phase coherent light having a very narrow beam width and virtually no beam spread. >LASER Printer. Basically a Xerox machine in which the image is either drawn on the drum in the manner of a super speed pen plotter or scanned on as a high density TV image (or a combination of both) using a (usually) gas LASER as a light source. Very expensive due to the optics used. Produces a "copy" for an original. Very fast (tens of pages per minute continuously). >Learn. In digital functional testing, the creation of Test Vectors (See Same) by capturing responses from a known good "Gold Standard" device running on an ATE system under stimulus from stimulus vectors. Frequently used in testing ROMs, this technique produces valid results IF these conditions are met: 1. The device does not Race. 2. The stimulus vectors adequately exercise the device. 3. The "known good" device actually is (a non-trivial problem). >Letter Quality. Said of printed material. The highest quality indication used for typed/printed text. The defacto standard is the IBM Selectric using a carbon ribbon. Generally considered to be at least 1200x1200 dpi equiva- lent. >LIFO. Last in/First Out. A stack. >Light Pen. A stylus containing a photodiode. As the electron beam writing on a CRT passes by, an interrupt is generated. From this indication the system can determine the location on the CRT to which the Light Pen is point- ing. Used as a cursor control scheme. Never popular due to the need to cover the area of interest with the photo detector. >Line Printer. A printer that lays text on paper a line at a time. Implies speed. >Linear. Said of circuits or devices. Analog (as opposed to digital). >LISP. LISt Processing language. A product of John McCarthy's work in the middle 60's on non-numeric languages. Particularly well suited to symbol manipulation, tree searchable, problem solving and (especially) list process- ing. Used almost exclusively by the Artificial Intelligence (AI) community. Developed at MIT. Arithmetic operations are handled in RPN. Some experts predict LISP will absorb and displace FORTH as memory size becomes less of a system constraint. >Little Language. The Command Set for a Tools that is, in effect, a Special Purpose programming language. Examples are GW-Basic's DRAW command and "awk" under Unix. >Local Variables. Variable names that are independent from all other varia- bles of the same name in different program segments. Implies that the varia- ble table is created as the program segment is entered and collapsed on leaving, i.e., the variables "forget" previous values. Improperly implement- ed in Pascal. 'C' does it right and also provides a "static" local variable that retains its value between function calls. >LOGO. A teaching language for children. Features heavy graphics with a "Turtle". Some versions use "Sprite" graphics, icons that can be moved as a single unit. >Look-and-Feel. Probably the worst can of Worms the US Patent Office set loose in the 1980's. Apple Patented the "Look & Feel" of the MacIntosh GUI, suing MicroSoft, IBM and others for Icon infringement. The 1990's opens w/ Apple being sued by Xerox whose Ill-Fated "Star" system (developed at Palo Alto Research Center (PARC)) originated Icon GUIs, Mice & Smalltalk. At the very least Apple's Patent Should be Invalid due to Prior Art, even if they did Steal it Fair & Square. >LPM. Lines per minute. >LRC. Longitudinal Redundancy Check. A scheme for detection of bit errors in a block of transmitted or recorded data based on a vertical parity check, i.e., the Least Significant Bit (LSB) of the LRC byte is the parity bit for all LSBs in the block and so forth to the Most Significant Bit (MSB). This scheme is normally combined w/ a byte-wise parity check so that the data block is stitched together both horizontally and vertically w/ parity checks, making an undetected bit error unlikely. AKA Vertical Redundancy Check (VRC). >LSB. Least Significant Bit. >LU6.2. An IBM "Peer-Equal" SNA protocol which nearly became an ISO standard (until somebody noticed it requires at least one Mainframe node). Avoid. >LUN. Logical Unit Number. A Fortran construct that allows peripherals or files to be assigned at RUN time. -M- >Macro. A prefix meaning "Long" or "Large". Also, an assembly language subsection specified to the assembler by name. A like feature of certain Compilers (notably 'C'). >Mainframe. Originally, a large computer of the type installed in classical computer centers. Now any computer mounted in an equipment rack and accessed via terminals. Implies speed, although the performance available to any one user may be disappointing. +Mainframes, History of. The era of Mainframe Computers as the dominant digital technology has spanned 4 decades of continuous evolution. The beginning is marked w/ the sale of UNIVAC I (1950) and the end w/ IBM's 10,000 Job Roll-Back in Mainframe Production divisions (about 5% of its US Workforce) at the close of 1989. Dates are fuzzy except where specific announcements make sharp breakpoints: Decade Zero (1940-1949) ---> Homebrew. Birth. 1940 ABC demonstrated. (News Photos published 15 Jan 40). 1943 ENIAC begun. "Z-Machine" (a General Purpose CPU) Proposed to German War Staff. 1944 Colossis I in Use by England's Project Ultra "Code-Crackers". Harvard Mark I Completed. 1945 von Neumann Proposes to Store Programs in RAM, a Radical Concept. 1946 ENIAC & Bell Labs Relay Calculator Completed. 1948 IBM's Ultimate Calculator (SSEC) on display in Manhattan. Cambridge EDSAC, First Stored Program (von Neumann) CPU. 1949 MIT invents Magnetic Core RAM (using a Pill Mold). Decade One (1950-1959) ---> Vacuum Tubes. Infancy. 1950 First commercially sold mainframe. (UNIVAC I). 1952 Mnemonic Assembly Language (IBM 650). 1953 First Commercial "Parallel" CPU, IBM 701 w/ Williams Tube RAM. 1954 Texas Instruments Invents the Silicon Junction Transistor 1955 Magnetic Core RAM on IBM 705. (Total of 19 Built). Survey Reports 88 Mainframes in Use in US. 1956 Fortran I (First HLL) Operational (on IBM 704) 1957 Flying Head Disk (5 Mb) on IBM 305 w/ RAMAC DOS 1958 Texas Instruments/Fairchild Invent the IC. Survey Reports 103 Mainframes in Use in US. 1959 IBM Controls 90% of the Mainframe Market. Switch-Over to Solid State Begins (Late 1959). Decade Two (1960-1969) --> Transistors. The World Discovers Computers. 1961 Time Share Introduced w/ DEC's PDP-1 DOD develops COBOL-61 (and IBM popularizes it). Survey Reports 222 Mainframes in Use in US. c1962 Virtual Memory DOS. 1963 ASCII Published by ANSI Total US ADP/ADPE Market tops $1,000,000,000. 1964 IBM System 360 Establishes Upward Compatible Hardware/Software. DEC introduces the PDP-8 and coins the term "Minicomputer" ENIAC/Univac Basic CPU Patents Granted. Honeywell Sues. Survey Reports 334 Mainframes in Use in US. c1965 DTL Logic replaces discrete transistors. Finite Element Analysis Developed (First CAD). 1965 Brooks Act mandates ADPE Oversight for US Government CPUs. c1966 Operating Systems standard on all Mainframes 1969 Cache RAM. BiSync Introduced. Justice Dept. Begins IBM AntiTrust Suit. IBM Controls 90% of the Mainframe Market. Decade Three (1970-1979) --> ICs. Mainframes Change the World. 1971 1 Kb DRAM. IBM releases TSO (Time Share Option) for S-360/370 Family. c1971 TTL SSI Begins to Displace DTL. c1972 ECL ICs Appear in CPU/ALU Sections. 1973 System Network Architecture (SNA) Announced. ENIAC/Univac CPU Patents Declared Invalid. Winchester Disk Drive (14 Inch) Technology. c1973 TTL MSI Phase-in Starts. 1974 INTEL 8080 Marks Start of MOS LSI. 1975 US Buyers Spent 78% of Their Computer Budgets on Mainframes. 1976 DEC VAX-11/780 Super-Minicomputer. 1978 CRAY-1 Super Computer. c1979 USSR abandons Trinary Technology, Seeks Western Binary Machines. Decade Four (1980-1989) --> Open Systems. The World Changes. 1981 IBM PC Announced. 1982 SNA Commits to Full ISO Open System Interconnect Compatibility. IBM AntiTrust Suit Folds. IBM Controls 70% of the Mainframe Market. 1985 IBM switches focus from Batch to Transaction Processing. 1986 SVID published. Unix begins to gain momentum. IBM Starts "Trimming" its Workforce. (Except Mainframe Divisions). 1987 EC Forces IBM to Publish Internal Standards. CRAY Research switches to Unix. Ditto Data General. X-Windows from MIT for Unix. 1988 Sperry-Univac combines w/ Burroughs to form UniSys. DEC fails Posix & loses $4.3 Billion Open System Mini Bid. US Buyers Spent Only 35% of Their Computer Budgets on Mainframes. 1989 DEC buys MIPS, HP buys Apollo. DEC promises full ISO/Posix/GOSIP compliance. IBM, Amdahl labor to port AIX (Unix) to large Mainframes. IBM trims 10,000 jobs from Mainframe Manufacturing, a first. IBM Controls 70% of the Mainframe Market, 60% of which is Export. Decade Five (1990-1999) --> Connectivity. The World Changes Mainframes. 1990 IBM's 3390 Disk Introduced (First Micro to Mainframe Migration). ---> Update 89: As this Decade draws to a close, the Era of Dominate Main- frames has clearly passed. We have witnessed a technology born in the 1940's grow thru adolescence into middle age. Computer Literacy, once reserved for the "Learned Few", is now taught in Grade Schools. The Mainframe CPU of the Middle 60's now resides on desktops, operates on NiCads & totes home in a shoulder bag. Or to put it another way, if Automobiles had Kept Pace w/ Computers, Your Next New Car would Cost About $5.00, get a Quarter Million Miles to the Gallon & be Garaged in a Shoe Box. When WAL-MART stocks Floppies and B.Dalton Booksellers peddle Software, You Know the Mystic is Gone. Mainframes are not dead. They will survive as DBMS Engines, Compute Nodes and Payroll/Inventory Platforms. They have become, like the railroads, haulers of "heavy freight"; still vital, but not a mainstream technology. >Manchester Coding. A digital signaling technique used to simulate an analog signal with a data stream. Used by IEEE-802.3 BaseBand LANs (Ethernet). +Mark I. The Harvard Mark I Computing Engine. Begun in 1936 as an elec- tromechanical implementation of Babbage's Analytical Engine by Howard Aiken. Funded by a Million dollar grant from IBM, design started in 1937 w/ con- struction beginning in 1939. Taken over by the US Navy during WWII, it was much altered in the rush to produce immediate results for BURORD (now NAVSEA). About 51 feet in length, containing some 12,000 telephone style signal relays and controlling a total of 78 mechanical calculators, the Mark I ended up being called an "Automatic Sequence Controlled Calculator" (ASCC). Completed in 1944. Programmed via plug boards and fed data via TTY punched tape, ASCC's throughput was about 3 FLOPS. Altogether, four versions of the basic design were built, but only the first is significant as its success was soon over-shadowed by the much faster ENIAC. The ASCC represents the apex of electromechanical computer design which, while not reaching the fullest measure of Babbage's dream, did much to establish the validity of the binary approach he proposed. >MCA. MicroChannel Architecture. IBM's Proprietary 32-Bit, 20 Mhz Bus scheme for its PS/2 PCs. Specifically designed to be incompatible w/ previous PC/XT/AT boards (the PC-AT bus became very popular as the "ISA" Industry Standard Architecture), MCA "features" a much smaller form factor and less than half the available power of ISA boards making use of surface mounted devices and ASICs nearly manitory. This, plus the distributed control scheme used complicates Reverse Engineering thereby inhibiting "clones". IBM really expected MCA to become an instant hit, so much so that its licensing requirements include a "royalty" penalty for previously produced PC clones. Underwhelmed by the response and pressed by the "Gang of Nine" who developed the half again faster (and fully backward compatible) EISA Bus, IBM waived the "penalty" to certain vendors, amoung them NCR and Tandy. However, even the purchase of a full license does not unlock PS/2's "Chastity Belt". MCA intimately interacts w/ IBM still closely guarded ROM BIOS making full compatibility nearly impossible, as Iomega, Tandy, NCR, Hayes and even OS/2 co-conspirator Intel have painfully discovered (May 90). Avoid. >Metacharacters. "Wild Cards." Characters that have special meaning to the operating system. These are generally "transformed" (hence the "meta" han- dle) by character expansion, matching, etc. Strictly "FM" (Flash Magic), meta- characters speed tasks (and blunders). Unix probably has the richest set of such critters, actually several sets including those used by the Shell and "Regular Expressions" used fully or in part by the various Tools. Strictly speaking, DOS has none (the "*" and "?" are passed unchanged), but various languages (and most Tools) simulate Command Line Expansion ala Unix giving DOS a limited functional equivalent. >MIB. Multi-Interconnect Board. A fancy name for a multilayer PC board. Also, MLB. >Micro Code. Originally, machine language. Strictly speaking, the coding in which the instruction set of a processor (CPU) is written, i.e., the "true" machine language of the CPU. Sometimes used to describe assembly language object code. More correctly applied to the coding used in Writable Control Store CPU's. +Microcomputer, History of. Indirectly, the HP-35 Pocket Calculator (the first "electronic sliderule") sparked the microcomputer revolution. In the scramble to bring out competing models, a Japanese firm named 'Busicom' approached INTEL with a multichip design they wanted reduced to three chips, a ROM, a RAM and a processor. Although the product itself was dropped, INTEL marketed the processor chip as the 4004 in 1971, a modest success that found its way into most of the bank time/temperature signs of the era. Almost immediately, an 8 bit ver- sion, the 8008 was brought out. It wound up in traffic light controllers and many other tasks, but users pointed out limitations in the design which, after all, was still pretty much a calculator chip. INTEL brought forth the 8080 (the first fully featured microprocessor) in 1974. The "Experts" predicted a total lifecycle run of about 10,000 chips, not enough to break even. (The 8080 was in production more than a decade w/ no estimate on the number produced worldwide (including in the USSR)). Meanwhile, HP was successfully exploiting its calculator technology in the 9800 series desktop machines (introduced in 1971) and DEC was planning a small machine later marketed as the LSI-11. The MITS Altair was the first commercially successful machine based on the 8080 (introduced in 1974, MITS had 10,000 units installed by 1976). While hardware hackers tried to master the S-100 bus, Commodore carefully prepared a move into the home computer market with their "PET" (Personal Electronic Translator), a machine that looks very much like a baby HP-9845, which they showed around in the Spring of 1977. While they were doing market research and shopping for financing, Tandy decided to poach with the TRS-80. Intended as a quick in/grab/out move, 2,000 units were built in the first run of which it was hoped that 1,800 could be sold by Christmas (1977) given a multimedia blitz of hard sell advertising. That carefully planned blitz got derailed in midflight as the middle of the second week found Tandy sold out and back ordered to the tune of some 50,000 units. Deciding to stay in the market, Tandy built a modern facility in Ft. Wayne, Indiana, which is still in production. The PET came (and went) and Tandy chose to coast instead of exploiting its commanding initial lead (at one point more TRS-80's had been sold than all other computers ever built from Day One combined). Apple IIs came in Summer 1977 and (facing tough Tandy) evolved an "Open System" approach featuring drop-in third party upgrades and software. The Explosion of Microcomputer Technology was Fueled by a Pent Up Passion for Computer Use that Mainframes (even Minis) couldn't (or wouldn't) fill. It was more than a "Revolution", it was a Revolt: Decade One (1971 - 1979) ---> "Silicon Valley" hatches a RAM Scam. 1971 Intel 4004/8008 Microprocessors Introduced. IBM Introduces 1 Kb DRAM. 1973 IBM Introduces the "Floppy Disk" (8" SDSS 3740 Format). 1974 Intel 8080 MicroProcessor. Altair 8800 Microcomputer w/ S-100 Bus. 1975 BYTE, first microcomputer magazine. "Kansas City" Cassette Standard allows Software Publishing. CP/M Introduced. 1976 5.25" Floppy Drive Introduced. HP-9845A "Qwert" Introduced. Apple I Kits built in Steve Job's Garage. Bill Gates Founds MicroSoft. Altair has an Installed Base of 10,000 Units. 1977 Apple II Introduced. Tandy sells 52,000 TRS-80s within 10 days of Introduction. 1978 Apple DOS. TRS-80 Model II w/ MicroSoft Basic in ROM. 1979 VisiCalc (First Spreadsheet) on Apple II. 8" Winchesters Introduced. Osborne I "Totable" CP/M Portable. More TRS-80's Built & Sold than All Others CPUs to Date. Decade Two (1980 - 1989) ---> The Gathering Swarm. 1980 Shugart 5.25" Hard Drive w/ (future) SCSI Interface 1981 IBM PC (8088 w/ CGA Graphics). Osborne Folds. CP/M Fades. 1982 DEC Rainbow (a Closed System) Sails & Fails. Apple III (100% DOA Closed System) Fails. 1983 Phoenix Technology "Cracks" IBM's Copyrighted ROM BIOS. Clone Wars begin. IBM PCjr "Peanut" Bombs Big. PC-XT w/ 8086 & 5 Mb Hard Drive Introduced. One New Microcomputer Introduced for Each Business Day this Year. 1984 MacIntosh introduces Apple's GUI. 1985 PC-AT w/ 286 & EGA Graphics. Clone Wars Peak. 1986 Grid Introduces the "Laptop" Computer. MS-Windows GUI Released. 1987 PS/2 w/ VGA Graphics & MCA Bus. (A "Closed" System) Intel 386 Microprocessor. 1988 IBM introduces OS/2, the last significant Closed OS. 386 Laptops w/ VGA LCDs & 100 Mb Hard Drives. 1989 PS/2 486 Introduced. Open System EISA-386 PCs Appear. OS/2 "Presentation Manager" GUI Released. Decade Three (1990 - 2000) ---> Micros Go Mainstream. 1990 IBM's 3390 Disk Introduced (First Micro to Mainframe Migration). MS-Windows 3.0 ships. First widely accepted PC GUI. In the beginning, there were Hackers and they begat Micros, actually just High Tech Toys. VisiCalc was the first Really Significant Thing Micros did that Mainframes didn't. Business Users began to buy Micros, which caused IBM to join in. This encouraged Users to invest in hardware & software creating Market Energy that reached Critical Mass in the Middle 1980's. Mainframe Power on Desktops migrated Mainframe jobs away from Data Processing Centers. And an odd thing happened: The Cutting Edge passed from Mainframes to Micros. As Mainframes end their era on Domination, Micros begin theirs. LANs, Connectivity, Applications Portability and Information Mobility move Center Stage as these are the concerns of Micro Users, i.e., these are the Issues of the 90's. >Microprober. An analytical tool used in the failure analysis of microcircuits which physically "probes" the surface of the (delidded) chip using finely sharpened wires so as to measure voltages/signals and exercise portions of the chip's circuitry. Now almost obsolete due to decreasing feature size of chip topography. As one user termed it: "It's getting to be like trying to stab a matchbook cover with a telephone pole on the end of a crane." >Mid-Split. Said of LANs. A broadband technique in which the radio spectrum available on the coaxial cable is split into two bands separated by a blank space in the "middle" of the bandwidth, usually centered on the commercial FM/TV band which is often "piggy-backed" down the coax system. The low band is used by modems at the user's port to transmit outbound traffic. These signals are collected, amplified, band-shifted, and rebroadcast by the sys- tem's "Headend" unit onto the upper band. >Minicomputer. A term coined (1964) to describe the DEC PDP-8 computer, which became the defacto standard for small machines right down to the flash- ing lights and row of switches along the front panel bottom. A "mini" is smaller than a Mainframe, larger than a "micro" and pretty near impossible to define. >MIPS. Million Instructions/Second. A Crude measure of CPU power. With the advent of RISC machines, MIPS has become a Buzz word of the first magnitude (A normal (CISC) instruction often encompasses several RISC state- ments). An attempt to "Clarify" the situation by referencing "VAX-780" MIPS (a common practice w/ DEC) has been further complicated by the fact that the VAX-780 is not (as commonly accepted) a 1 MIPS machine. Tests by IBM (and others) place its performance at about 0.47 "Real" MIPS, whatever that means. >MIS. Management Information System. See DBMS. >Modem. Modulator/Demodulator. A box that converts a digital bit stream to analog tones for transmission. >Modular Programming. A style in which subsections of the programs are compart- mentalized into distinct units ("Modules") with defined interfaces. Superior for test and debug. May result in additional overhead, especially a profusion of flags. Generally a good idea as it assists Software Mainte- nance. See Also Context Switching. >MODULA-2. A second language by N.Wirst, the author of Pascal, which is more complete and better thought out. Originally intended to be a new class of hardware/software combination running on a machine specifically optimized for its highly modular design (and so demonstrated c1982). Impressive in that form, Modula-2 has dropped most of its innovative enhancements in order to serve as a transportable general purpose language. As currently marketed (1984) Modula-2 is basically an "Extended" Pascal. >Monti Carlo. An analysis technique applied to situations too complex to be solved using generalized mathematical methods. A numerical analysis approach in which a random number generator drives a model to produce a spectrum of specific solutions which, taken as a whole, profile the response of the complex system. >MOS. Metal-Oxide Semiconductor. The tap-root technology of the microcom- puter revolution. Based on Insulated Gate Field-Effect Transistors (IGFETs), MOS comes in two "flavors", P-Channel (PMOS) and N-Channel (NMOS). PMOS has been almost totally replaced by NMOS as it is inherently faster. A low power/high impedance technology, MOS is subject to static (ESD) charge dam- age. Special handling/shipping precautions are required. See Also CMOS. >Motherboard. The main PCB into which other boards/assemblies plug. >Mount. Originally, the physical swapping of 9-Track mag tapes, the process disk users generally call ""loading". After spinning up the disk, the oper- ating system is informed of its presence by executing a "Mount". Once "Mounted", the new disk is a transparent part of the directory tree until it is "UnMounted", spun down and removed. Failure to "UnMount" before removal can fatally damage the removable disk, the directory system it was mounted into or both. >Mouse. A hand held pointing device used as a joy stick replacement. A current fad. Effective, but requires an uncluttered space close to the CRT, a luxury. >MSB. Most Significant Bit. >MS-DOS. MicroSoft Disk Operating System. A defacto standard for 80x86 family Microcomputers. Originally marketed in August 1980 by Seattle Comput- ers as 'QDOS' ("Quick & Dirty" Operating System) as a temporary operating system for their new computer until CP/M-86 became available. (Called "Q&D" because it was a minimal CP/M Knock-Off representing only 2 manmonths of effort). Sold to MicroSoft in July 1981 where it was adapted to the IBM PC (IBM calls it 'PC-DOS'). Later versions (3.x notably) have become very Unix-like featuring I/O Redirection and "Pipes". >Multi-Drop. A Polled Master/Slave scheme in which multiple terminals- minals share a common channel, twist pair or Coax. The effect is that of a mux due to the Master/Slave environment (terminals listen or speak only when addressed). Implies block mode (usually line at a time) transmission. Slow. >Multi-Layer. Said of Printed Circuit boards. A composite board built up of thin layers of insulation alternating with patterns of metallic conductors. Expensive. Allows high density circuitry. Difficult to repair. Intercon- nects between layers remain a problem area. >Multi-Tasking. The ability to run more than one application program at a time. Essentially a time share concept, except that only one user is in- volved. >Multi-Wire. A small run technology competitive with Multi-Layer. A general purpose PCB is customized by small wires routed and welded in place by a computer controlled machine. An insulating coating is applied to fix the wires in place for handling. Said to provide the flexibility of Wire Wrap (See Same) and the compactness of Multi-Layer with better circuit character- istic than either. >MUMPS. Massachusetts General Hospital Utility MultiProgramming System. A general purpose interactive language developed in the 1960's. MUMPS contains a powerful set of string handling constructs, a pattern matching facility and timing functions, all of which support highly interactive (conversational) programs. Designed for time shared minicomputers, MUMPS is more an operating environment than a language. Among the features of this environment is a hierarchical data base shared among users via file transparent commands. ANSI standard XII.1-1977. >Mux. A multiplexer. A device to support more than one channel on a communi- ca- tions path. May use time slicing (digital information) <"Time Division Multiplexing"> or Frequency division multiplexing (analog information), a technique which divides the path's available bandwidth into slots rather like is done in broadcast radio and TV. -N- >N. A prefix indicating an inverted output. >NAND. A logic gate implementing the Boolean 'AND' function followed by an inversion (a 'NOT' function). The basic digital logic primitive from which all others can be created. The "Gate" referenced when discussing circuit size in terms of "Equivalent Gate Count". >Nanosecond. The time required for light to travel from the top of this page to the bottom. A pulse on a wire will travel roughly the width of this page. >Native Code. Machine executable binary specific to the CPU under discus- sion. >NBS. National Bureau of Standards. Former name of NIST. >NCC. Numerical Control Code. AKA EIA Code. An 8 bit alphanumeric code used in punched tapes for numerically controlled manufacturing machines (tools). Popular because, unlike ASCII, the tape reads the same whether loaded correctly or upside down (reversing the tape reader results in correct text), a positive feature when dealing with unskilled users. Used by the TI-553 ATE. >Near Real Time. The ability of a system to respond to monitored conditions fast enough to control the monitored process. Example: Automotive computers. >Negative Resistance. A region on the conduction curve of certain devices in which the current flow decreases as voltage increases. Neon lamps, tunnel diodes, magnetic amplifiers and other "parametric" amplifiers (MASERs, etc) can have a region of negative resistance. Such devices can be used as ampli- fiers, oscillators, bistable switches or memory elements. Normal amplifiers operated under high positive feedback likewise display negative resistance, i.e., they will oscillate. >New-Line. An End-of-Line marker. By tradition, a LineFeed (called by both Unix and DOS "\n"). DOS, being a spin-off of CP/M uses the CR-LF combination in its text files (making them directly printable). If a file is opened in "Text" mode (the default), CR-LF couplets are converted to "NewLine" markers automatically. >Nibble. Also Nybble. A group of 4 bits. Half a byte. >Nine Track Tape. A magnetic tape format popular in 800 bpi and 1600 bpi densities. Characters are printed across the tape width-wise. Resembles punched paper tape except that a 9th bit has been added (for parity). A GCR (Group Coded Recording) technique extends 9-Track to 6250 bpi, but the Read- After-Write capability is lost making automatic skip-over of bad areas and tolerance of dirty or damaged media impossible, hence the need to "certify" 6250 bpi tapes. >NIST. National Institute of Standards and Technology. The new Handle for the old NBS (National Bureau of Standards). >NLQ. Near Letter Quality. Said of printed material. See Letter Quality. >No-Break. Said of power sources. Capable of switching from commercial power to an alternate source (batteries, generators, etc.) without loss of the power waveform. See UPS. >Noise Floor. The level at which a signal's identity becomes masked by noise. Viewed on a Spectrum Analyzer, system noise appears as a band of random noise spikes ("grass") along the lower edge of the display. The average upper edge of this region is termed the "Noise Floor" for a system and represents the smallest measurable signal (See Dynamic Range). >NonVolatile. Said of digital memory media. Does not "forget" when power removed. Examples: Disks, Tape, Bubbles. >NRZ. Non-Return to Zero. A coding method used on some data tape recorders. Pulses in alternate directions signify successive ones while no pulse signi- fies a zero bit. An NRZ pulse train has a 'DC' component making it unsuit- able for many applications. NRZ is the default coding for 800 bpi 9-Track Tapes. >NTSC. National Television Standards Committee [Standard]. "Normal" (US) Color TV signals. Basically a black & white image into which color subcarri- er sidebands have been interleaved. A "color burst" on the "back porch" of the blanking signal synchronizes the receiver allowing recovery of the color information. Invented by RCA. >Null Modem. Under RS-232 it is assumed that devices will connect to a modem, not directly to each other. A pair of modem connectors cross-wired to simulate two back to back modems. -O- >Object Code. The collection of binary numbers produced by a compiler oper- ating on a source code file. The native language of the machines. Also called "machine language". >Object-Oriented Graphics. Graphical images made up from "special charac- ters" (dot patterns) that are handled and printed like normal text. A quick and dirty scheme to get game graphics. Popular with small machines and often call "Sprites". >OOL. Object-Oriented Language. Any of several languages (notably C++ and Smalltalk) that allow grouping of data into named "Records" or "Structures" that can have additional "handles" (called "Attributes") by which they can be sorted, manipulated and selected. +OOL, What's a. Consider the Object-Oriented Language (OOL) named "Dry Goods" that runs on the platform "SuperMarket." Your mission, if you choose to accept it, is to select a single member of the data type "Chicken Noodle" of the Class "Soup." The data type "Chicken Noodle" contains three data elements ("Broth", "Noodles" and (by some reports) "Chicken"), but we won't get into that. We know that the item we seek has a label affixed to it on which are listed a number of "Attributes" including the vendor's name, "Campbell's." We also know that it has "Inherited" the Attribute of the generic SubClass, "Canned Goods", which tells us we can skip bagged and boxed items such as Potatoes Chips and Corn Flakes. The Stockboys have arranged merchandise according to label Attributes, placing "Fruit Juices" and "Vegetables" in different areas than the Class we seek ("Soup") even though they haven't actually sampled the contents (data elements) in any of the "Objects" on the shelf. OOLs let you do that. Once we have found the Class "Soup", we still have to sort on label At- tributes to isolate the SubClass "Chicken", which includes "Chicken Gumbo", "Chunky Chicken" and "Chicken Noodle." The concept of "Classes" and "Sub- Classes" in OOLs is a bit messy as to which is which (kind of depends on your viewpoint). It gets worse. Consider that the "Instant Soup" SubClass contains the data type "Chicken Noodle" w/ the same three data elements inside ("Broth has the value, "Dried") which also belongs to the Class "Soup." The "Instant Soup" SubClass isn't a member of the SubClass "Canned Goods" (it is in the SubClass "Boxed"). OOL Class/SubClass breakdowns tend to be a "Top-Down" arrangement, but exceptions are allowed. A sort on "Noodles" and "Campbell's" gets us to the correct location on the shelf and we can select one of the data objects of type "Chicken Noodle" (preferably one without the Attribute "Dent"). To Recap, OOLs fix "Attribute Labels" to data structures. These may be used in sorting, grouping and selecting processes. In addition, data struc- tures may "Inherit" implied Attributes from Class/SubClass(s) they are mem- bers of. Class/SubClass links are usually (but not always) layered like Directories. OOLs also associate Attributes w/ processes operators ("Methods"). For example, the Method "CAN-OPENER" operates on the SubClass "Canned Goods" but not on the SubClass "Boxes." Methods don't have implied (inherited) Attributes like data objects, but they can have "Virtual Functions" (which makes them "Polymorphic"). For example, the Method "OPEN_CAN" assumes the function of "CAN-OPENER" with the SubClass "Soup", the function "CHURCH-KEY" with "Fruit Juice" and "POP-TOP" with "Canned Soda." In other words, it alters its operation (Method) based on the Attributes of the data object being processed. >OCR. Optical Character Reader. The logical inverse of a printer. Takes text and makes a data stream. Physically resembles a small office copier. Becoming popular in office automation. >Octal. A scheme for representing all combinations of 3 bits by the numbers 0-7. Also, a radix 8 number system. Favored by DEC. Weird to use. >Octet. Officially defined as a collection of 8 bits by the standards making bodies. (The term "byte" is actually ambiguous. See Same). >OEM. Original Equipment Manufacturer. A vendor who purchases parts and subassemblies and manufactures a system. An OEM may volume purchase periph- erals (usually at a discount) and remarket them under his own logo. An OEM who works at the "Box" level is called a "System's Integrator." >OpAmp. Operational Amplifier. A linear amplifier having a very high open loop gain intended to be run under high (99% or greater) negative feedback. Used in filters, integrators and many other analog circuits including analog computers. >Open System. Any Computer Operating System meeting these criteria: 1. The System adheres to well-defined specifications which are available to all comers at little (or no) cost. 2. The above Specification is actively supported by several independent competing vendors. 3. The above Specification/Standards are not controlled by a single (or small group of) companies. 4. The above Specification/Standards are Hardware independent. Source: UnixWorld 11/89 pg 192. >Open Systems Interconnect Model. A theoretical ideal description of a seven layer "cake" which, if everyone plays and no-one cheats, will allow anyone to interface to and communicate with anyone else. Perhaps overly complex, it is a good, honest try: ---- Layer --- --- Function Performed --- examples 7. Applications layer ---> User's Program (Pac Man or Whatever). Kermit 6. Presentation layer ---> The "System" as the User Sees It. POSIX/GOSIP 5. Session layer --------> Log-on/Log-off and Passwords. 4. Transport layer ------> Packetizing/Addressing, encryption & File Systems 3. Network layer --------> Routing and CRC checking/ARQ servicing. DECnet 2. Data Link layer ------> Flow control and Handshaking. X-ON/X-OFF 1. Physical layer -------> Interface to a metallic or fiber path. RS-232C Pushed by the International Standards Organization, IEEE, ANSI and Uncle Sam. >Operating System. The "Chain of Command" for a computer system. >Optical Disk. A mass storage technology based on "burns" made on a disk shaped media using a strong light source, usually a LASER, and read off optically. Usually packaged to emulate a magnetic flying head disk subsystem. Super high storage capacity, but usually a write-once situation (erasable units have been demonstrated). Media is relatively inexpensive and physical- ly rugged, although some forms deteriorate w/ age. Useful for archival storage and bulk data transport. >OS/2. The Single User, Multi-Tasking Operating System of the IBM PS/2. Features an icon driven "Presentation Manager" ala Mac (Apple sued), multi- tasking and networking. Comparable in size to Xenix (which tests 13+ times faster), OS/2 is fat, slow, and late. Generally considered a failure as a stand-alone system, MicroSoft and IBM are betting heavily on networking in IBM's office automation scheme (featuring a central mainframe, naturally). The failure of MS-Windows, which early gained the reputation as a disk-blaster, is directly traceable to OS/2 (MicroSoft emulated a PS/2 in MS-Windows and did it badly). OS/2 might have succeeded had VGA's memory access been better. As it is, DOS applications running under OS/2 suffer a 3-1 speed penalty during screen access, something clearly visible (and annoying) to Users. Alternatives such as DESQview offer better performance at lower cost. AIX, Xenix and other Unix ports offer more features, tools and networking alternatives. Realistically, OS/2 must be viewed as an attempt to recapture the business PC user, IBM's traditional focus. While IBM has committed AIX to full Posix/ Gosip compliance, OS/2 is (and apparently will remain) a "closed" system. Avoid. ---> Update May 90: MicroSoft Announces the Next Release OS/2 will be Posix Compliant w/ GOSIP to Follow. ---> Update August 91: IBM & MicroSoft split (IBM owns OS/2 outright now). The above Release has been renamed "MS-Windows NT" (New Technology) and remains Vaporware. Meanwhile, IBM & Apple made up and plan a jointly developed Operating System for PS/2. Where does that leave OS/2 Users? IBM says, "Trust Me!". Avoid. >OSI. See Open Systems Interconnect Model. >Originate/Answer. Said of modems. A designation reflecting the frequency assignments of the send and receive tones. >Overhead. The difference between the potential throughput of a system and the actual throughput. >Overlay. A (usually plastic) "Cheat-Sheet" for a Key Pad that fits over or around application defined keys. Also, a technique for memory management. See paging. -P- >Packet. A collection of data bits enclosed in one or more framing flags. Conceptually equivalent to an envelope. It has an address, usually a return address, and a CRC tag to detect damage. The "letter" is the data bytes that comprise the message. Used by Kermit, X-Modem, X.25, EtherNet, TCP/IP, DECNet and Sytek Boxes. >PAD. Packet Assembler/Disassembler. A protocol converter for an X.25 port on a Public Data Network (PDN). >Pad. In telecommunications. A level dropping network (may be fixed or variable) used to adjust signal levels. Implies impedance matching. Adjust- able pads may be named after the form of the network used, e.g., "T-Pads" or "L-Pads". >Padding. The inclusion of null characters in a text stream to allow mechan- ical printers time to perform line feeds and carriage returns. >Page Fault. The name of the Interrupt generated by a Memory Manager when information needed is not RAM resident. See Virtual Memory, Operation of. >Paging. Also called "overlaying". A method of fitting a large program into a small memory space by segmenting the program and controlling the loading so that the system believes the program is held completely in memory. >PAL. Said of TV signals. Phase-encoded Alternate Line. A color TV system popular in Europe and Japan. >Parasitic. A "Stray Effect" that (maybe) can be influenced, but not con- trolled. A hardware problem. Software Parasitic are called "Antics". >Parity. The property of being either odd or even. Specifically the tally of the "1" bits in a byte is either odd or even. Forced by setting or clear- ing a bit (the 8th bit in ASCII). Less effective when noise bursts can span several bits, Parity checking is only 60% effective at 1200 baud and is now little used in telecommunications. >Parse. Literally "to cut". A process popularized by BASIC (HP first and then Microsoft) in which the user's input source text is ripped apart, syntax checked and then converted to Tokens for storage. Basically, this is the first pass of a two pass translator. >PASCAL. A highly hyped language created in 1971 by N.Wirst as an alterna- tive to ALGOL-60, a language widely used to teach 'Structured Programming' concepts. Designed as a teaching aid, Pascal early gained many advanced concepts such as Modular Programming constructs and portability via Transla- tor/Pseudo-Code techniques. (The intermediate 'p-Code' was said to be the native code of the "Ideal Pascal Engine", apparently to justify calling the Translator a "Compiler". See Also 'Systems, Evolution of'). In demonstrat- ing compiler design/optimization, Pascal revived the labor intensive scheme of manually inserted cues used by ALGOL-60. Widely taught as a 'Pseudo- Language' (See Same), an application for which it is well suited. As origi- nally released, Pascal lacked many elementary concepts necessary for practi- cal use. For example, it did not implement the "Mathematical Hierarchy" of operators (algebraic equations did not give expected results) and had virtu- ally no I/O structure. This led to a host of "Extensions" negating one of Pascal's strongest selling points, portability. These "Growing Pains" re- flect that the language was not well thought out as a general purpose tool ala Fortran. (See Also Modula-2). The influence of Pascal on Fortran-77 and BASIC-87 is clearly evident. Professional enthusiasm for Pascal cooled somewhat when staffing requirements proved 6-8 times greater than for Fortran IV (Itself a difficult language). AKA ANSI/IEEE-770X3.97-1983 ---> Update 90: Turbo Pascal is leading a wave of Renewed Interest in the Language as an Object-Oriented Language (OOL) alternative to C++. +Pascal, Blaze. A French mathematician (1623-1662) notable as the inventor of the first mechanical adding machine (1641). Pascal's brilliant career spanned 14 years, ending abruptly in 1654 w/ a "Religious Experience" which drove him into seclusion and obscurity. The rapid rise and sudden decline of Pascal curiously parallels that of the language named in his honor 3 cen- turies later. >PC. Personal Computer. A workstation used by a single user. By popular usage, the IBM PC/XT/AT (80x86) family (including clones) running MS-DOS. >PCB. Printed Circuit Board. Also: PC board. >PCM. Pulse Code Modulation. A digital technique for time division multi- plexing. Used by T-1 CXR systems. >p-Code. PseudoCode. An intermediate between source code and executable machine language which may either be interpreted or compiled to native code. +PDP-X. Programmable Data Processor. The backbone of Digital Equipment Corporation (DEC) since the introduction of the PDP-1 in 1961. Modestly successful through several models until the solidly successful PDP-8, the machine for which the term 'Minicomputer' was coined. A 12 bit machine originally offered w/ 1.5 Kb of magnetic core, paper tape reader/punch and a slick open reel magnetic tape drive (1 inch tape). Adopted enthusiastically by scientific users and ATE OEMs, the PDP-8 became the engine of many diverse systems, including the one that filmed the space battle for STAR WARS. So much a defacto standard that early microcomputers copied the blinking lights and row of switches on the front panel, the PDP-8 evolved into the PDP-11 series in 1971. The PDP-11 standardized on the 16 bit word which allowed it to directly address 64 Kb of RAM (as opposed to 4 Kb on the PDP-8). Using a two bit extension, the PDP-11 hardware memory manager handles up to 256 Kb of RAM arranged in 64 Kb pages. The lower 8 Kb of RAM is fenced off into a "Monitor" (Kernel) area, with the lowest 512 bytes being specifically re- served for pointers (See Pointer Driven). The upper 8 Kb of each page is mapped to the UNIBUS, an asynchronous extensible bus that allows the computer to be intimately involved with peripheral devices, a real advantage to ATE OEMs who make great use of this capability. This leaves the user 56 Kb of space to work in (48 Kb in the lowest page, which the 3270 uses as Fore- ground/BG0). The hidden 8 Kb of RAM at the upper edge of each page is re- served for system use (buffers, pointers, scratch area, etc.). The powerful handshaking scheme of the UNIBUS provides both the largest measure of the system's power as an ATE engine and the primary limitation to its speed (throughput). By modern standards, the PDP-11 series is very slow (0.2 MIPS). An examination of the Motorola 68000 microprocessor shows that is was specifically designed to facilitate the migration of applications from PDP-11 systems, a tribute to the success of the series. >Peripheral. Said of computer devices. Not part of the main system. Usual- ly in a standalone box. Implies that the system can function without the device. >Pick. An operating system which is quietly doing for business users what Unix is doing for technical users. Includes a Relational Data Base (See Same ). Created by David Pick, this system is (as of 1988) used by 80% of the business computer users in Europe. The Pick OS had an installed base of 100,000 systems worldwide by 1986, 40% of which were on PCs. >PILOT. Programmed Inquiry Learning Or Teaching. A language created at University of California (San Francisco) for Computer-Aided Instruction (CAI) users (teachers, primarily) who needed to develop/test CAI dialogue programs w/o becoming computer programming experts. First of its kind. >Pink Poly. A (pink) plastic used to prevent the build up of static charges on ESD sensitive devices (such as CMOS) during storage and handling. While Pink Poly will bleed off accumulating static voltage, it can not protect against an ESD Zap from an outside source (such as an ungrounded hand). A variation using a sandwich around a metallic inner layer can provide such protection, but is more expensive and less widely used. >PIP. Peripheral Interface Program. A name coined by DEC for a collection of file handling utilities callable from RSX. Includes the capability to copy, rename, delete, etc. files on mass storage. Also, a CP/M utility of similar function. >Pipe. A method of redirecting the output text stream of one program into the input port of another. DOS, which is not multitasking, uses scratch files which are created/collapsed transparently. Unix uses I/O buffers, firing up/suspending program execution as they fill and empty. By tradition, the "Pipe" symbol is a vertical bar <|>. >Pipeline. A hardware technique to increase the throughput of a CPU by anticipating the next instruction to be executed and fetching it from main memory to a queue in high speed local memory. >Pixel. Picture Element. The smallest addressable portion of an image. A dot. >PL/1. Also PL/I. A structured language written by IBM (released 1965) as an effort to combine the best features of Fortran IV, ALGOL-60 and COBOL. Hobbled early by unreliable compilers, PL/1 failed to displace other estab- lished languages, primarily due to its complex syntax. Widely taught but little used, PL/I has a small, avid following ala APL. A variation, PL/C was written at Cornell University. >PLOT-10. A Graphics Defacto Standard set down by Tektronix for the 4010 Bistable Storage Tube terminals. Based on a universe 1024 by 780 pixels with the origin in the upper left corner. Being replaced by GKS. >Pointer. An address that literally "points" to something of interest. >Pointer Driven. Said of operating systems. A style of operation based on a set of pointers, usually located in the first 512 byte "page" of core (so called "Low Core"). The location of these pointers is fixed and will not change from software revision to revision. The pointers themselves, however, may change value in order to point at "Dispatch Tables" (lists of secondary pointers) or interrupt service routines which are located elsewhere. A powerful technique. Nearly all modern operating systems use at least some ariation of the idea which significantly improves maintainability by allow- ing the option to slide, expand, delete or relocate tables and routines without impacting the overall system. >Poll. A "Sound-Off" prompt from the Master in a Master/Slave situation. >Port. A place where information enters or leaves a system. An interface. >Posix. An IEEE evolving standard describing the interface between an appli- ca- tion program and the operating system (machine) on which it runs. The intent is to establish a "3-Point Hitch" for software. As with farm imple- ments, the standard hitch will allow your "New Holland" bale-stacker to attach to your John Deere tractor, draw power from it and be controlled by it, even though one is painted bright red and the other Lincoln green (those OEMs don't much like each other, either). A good idea. Possible. Probably Practical. AKA IEEE-1003.1-1988 AKA FIPS 151. See also: SVID. >Postscript. A Printer Language popularized by AppleTalk laser printers. Claimed to be a Page Description Language, Postscript is actually a Font Language that is little more than FORTH macros. Effective for fonts and simple graphics, Postscript's performance is dismal elsewhere. For example, a pixel dump of an AutoCAD drawing formatted by PageMaker (a Desktop Publish- ing defacto standard page layout utility) that normally prints in 2 minutes, 40 seconds as straight dot patterns requires over 32 minutes under Post- script. (Source: BYTE 8/88 pg. 172). >POTS. Plain Old Telephone Service. A Telco Term. >Printed Circuit. Originally, a circuit silk screened onto an insulating base using metallic (usually silver) paint. Later, a copper clad phenolic board taped with a "resist" tape and etched to remove excess (untaped) areas. This technique is still used by hobbyists. Generally, a circuit board made by exposing a copper clad fiberglass ("epoxy") board which has been coated with a "photoresist" to a negative of the desired circuit layout. After developing, the unexposed areas are etched away chemically. Holes for compo- nent mounting are drilled and the entire circuit board is tin plated in preparation for soldering. May be followed by a plating process to deposit gold on connector fingers or to "plate through" interconnect holes, especial- ly in double sided or multilayer boards. With the advent of automatic board stuffers and wave soldering machines, PCBs have become the standard construc- tion format for digital equipment. >Process Control. The use of computers in closed loop mode to monitor and regulate some (usually chemical or mechanical) process. Implies Near Real Time Response. Example: Automobile Engine Computers. >Program. A sequence of instructions to the computer in some form (binary or text) that, ultimately, winds up as executable binary that causes the machine to do something (hopefully) useful. >PROM. See EPROM. >Prompt. Character(s) output to the CRT to indicate completion of a Command Cycle and that the system is ready for another command. Usually a dollar sign <$> ("Sharp" <#> Unix Super-Users). Controlled by "Environment" varia- bles, Prompts are User selectable (set PS1 & PS2 for Unix or PROMPT for DOS). ---> An Historical Note: The traditional "$" prompt came from IBM's use of that symbol on JCL cards to signal the system to print those on the opera- tor's console when the job deck (of punched cards) was loaded. The operator then manually adjusted the CPU as required. Later, JCL cards routed to the system "Monitor", the administration program that evolved into the Kernel. As CRTs displaced punched cards, the Kernel prompted users to enter JCL commands by starting the line with the (then) familiar "$" symbol, signifying the system was ready for another JCL command. >Proportional Spacing. A printing technique first found in office use via the IBM Executive Typewriter. Under this scheme, the width of the character cell varies with the character printed so that the finished text looks very Professional". Often done in software and frequently combined with right margin justification (so called "micro justification"). Publishers use a variation based on letter groups called "Kernning", a techniques that im- proves the appearance but complicates OCR recognition. >Protocol. A game plan to control the flow of data over an information link. May use shifts in voltage levels on physical wires (handshake). May involve the exchange of "reserved" characters (Character-Oriented Protocols). May involve the exchange of "flag patterns" (Bit-Oriented Protocols). >Protocol Converter. A "black box" that interconnects two devices (or data links) that play by different game plans (protocols). >PS/2. A "Less Than Successful" IBM product line notable primarily as a MilePost in the History of Computers. PS/2 was IBM Corporate's vision of how the PC market should be (incompatible hardware/software, no upgrade path and no third party competition). It also marks IBM's first serious failure at establishing a defacto standard. IBM rushed the PS/2 to market two years before its operating system was available (OS/2 remains largely Vaporware), a common practice in Mainframes. A modest machine at best, PS/2 is a slow, costly "closed" system in an era of fast, inexpensive "open" systems. Hobbled by dismal VGA Graphics Mode performance, PS/2's flashy GUI is unacceptably slow. EISA PC-AT "Super- Clones" consistently deliver better "Bang/Buck" w/ PC-AT board compatibility and multi-vendor after-market upgrades. Stung by loss of PC market share, IBM specifically designed PS/2 to be incompatible w/ existing PC products. Expecting that OS/2's VGA GUI and MCA's superior bus thoroughput would generate instant demand, IBM imposed a crushing licensing requirement: Payment of Royalties on all PC products previously produced. The response was UnderWhelming. At least they achieved one Objective: There are No Clones. >Pseudo. A Prefix meaning "False" or "Not what it seems", but in the positive sense. (More there than meets the eye). See Also Quasi. Consider this legend of the Old West: The Wells-Fargo Overland Stage was the only link between far-flung mining settlements, cow towns and outposts before the Rails came in the late 1880's. Hands down champion of all Stage drivers was a short, heavy-set teamster named John Smith. Fearless in storm, Indian attack, prairrie fire or hold-up, the Wells-Fargo Museum proudly displays letters from passengers who owe their lives to Smith. The famous outlaw, Sugarfoot, fell to Smith's shotgun blast. As the Old West faded, Smith retired to the Black Hill's last rowdy boomtowm, Deadwood. Remembered as the toughest man ever to handle a six horse rig, Smith's origin, identity and reasons for seeking the rigors of frontier life remain unknown. She is buried in the Odd Fellows Cemetery at Deadwood, having been a member in good standing for many years. (Source: Old Farmer's Almanac) >Pseudo-Code. An intermediate language used to assist program design prior to coding into the target language. Pascal is an excellent Pseudo-Code language, which is why it gained such wide recognition before conversion into an actual computer language. AKA Program Design Language. >Pseudo Random. Said of signals, numbers or bit patterns. Apparently ran- dom, but actually predictable once the generating algorithm (the "key") and the starting point (the "seed") are known. >PSK. Phase Shift Keyed. Data is transmitted as shifts in the phase of a single tone. Phase shifts produce a burst of sideband frequencies which can be detected and used to set/reset a flip-flop to recover the original data stream. More sensitive to noise than FSK. Used in high speed modems such as the Bell 212A types (1200 baud). >Public Domain. A legal term meaning the item in question can be accessed, copied and used by anyone without payment under the Copyright Law. Congress has placed the copyrights for all Government publications (including soft- ware) in the Public Domain. Individuals may likewise do so by including the phase, "Copyrighted to the Public Domain" in their publication. Generally, the author specifies a limited transfer of rights as in the case of Kermit which states that the program can not be sold for profit and must include the Copyright Notice. >Public Key System. A class of link encryption schemes based on the property of certain mathematical operations which are readily computed forward but nearly impossible to reverse. Under this concept, two keys are used, one which is handed out ("Public") and the other which is held in private. Information to be sent is encrypted using the public key. Only the holder of the private key can decrypt the information. Superior to the DES (See same) method. >Punched Tape. A paper or mylar ribbon into which are punched holes in patterns that, when read across the width of the tape, represent alphanumeric characters. ASCII is the most common code used. Baudot code (5 levels) is still used for some TTY work. The NCC or EIA code is used for numerically controlled machines like the TI-553 ATE. Punched tape may be read either mechanically using pins or via a photo-optical reader, the latter requiring "Chad" tape (the holes being fully punched out). Until standards evolved for magnetic tape, punched tape was the preferred media of exchange for programs and data with nearly all minicomputers including at least a tape reader. Many early ATE machines were either driven from punched tape or punched out their readings on punched tape (for later printing on a TTY machine). For many years, it was common practice to boot up computers from punched tape. Pity those who forgot the magic sequence of instructions to get the tape to load (or who lost their boot tape to a carnivorous reader). >Pushdown stack. See "stack". >Push/Pop. The process of placing ("pushing") or removing ("popping") a piece of information to/from a stack. Includes updating the stack pointer. -Q- >QAM. Quadrature Amplitude Modulation. A scheme to encode 3 bits/baud by combining 4 state Phase Shift Keyed (PSK) w/ 2 state Amplitude Modulation (AM) to produce 8 distinct signaling states. Since the two modulators inter- act, some states are less easily detected, a problem if S/N deteriorates. Some implementations (See V.32) skip those states accepting a 5:1 bit/baud ratio (instead of 8:1) gaining noise tolerance in the trade. >Quadrature Shift Keyed. A PSK technique with 4 distinct states. Allows doubling up of data bits so that bps is twice the signaling rate (baud rate). >Queue. A waiting line. Service is on a first in, first served basis. A LIFO. >QWERTY. The first 6 keys of a standard typewriter keyboard layout. Invented by Christopher Sholes as part of the first practical typewriter (1868), a design using gravity-return keys which were prone to jam if operated too fast. His innovative solution was the QWERTY layout. Specifically designed to slow a typist doing business typing, this layout dominates while others of demonstrated superiority (most notedly the Dvorak layout) are ignored. The 53 ASCII keyset is now considered the defacto standard compliment of keys while the IBM Selectric is the defacto standard for key size, shape and placement. >Quasi. A prefix meaning "False", with the connotation of being "Less than meets the eye" with the implication that this falsehood will be exposed in time, e.g., the Quasi-Stable state of a One-Shot. Consider this Tale of the Old West: South of Albuquerque, New Mexico, is a well watered area of wooded hills, farms and ranches that figured in a bitter range war, the "Lincoln County War", that spawned the legend of "Billy, The Kid" who (it is said) killed 20 men before his 21st birthday. Sheriff Pat Garrant's posse tracked Billy to a farm house where a gunfight occured. The hasty midnight burial that followed contrasts sharply with the more usual display of vanquished shootists (as was done at Northfield, Mn) leading to rumors that the wrong man was killed. However, the reward was collected and "The Kid" was never again seen in New Mexico. In 1989, a petition was filed in Texas seeking the posthumous pardon of "Brushy Bill" Williams (who died in 1963) under the amenesty that settled the Lincoln County War citing his invovlement in that conflict as "William (Billy, The Kid) Bounty". (Source: Unsolved Mysteries, an NBC-TV Series) -R- >Race. An undesirable (hopefully) temporary oscillation in a digital device that results in an unpredictable output state. Generally caused by timing problems in hardware. Test vectors must be padded w/ extra steps to avoid causing races (i.e., be "de-raced") otherwise the vector set is worthless. One of LASAR's great strengths is its ability to flag (and remove) race conditions from generated test vectors. >Radix. The base of a number system. The value of the multiplier applied to the 'Tens' position in '10'. In common numbers, the base is ten. Binary (base 2), Octal (base 8) and Hexadecimal (base 16) are also popular. >Radix-50. An alphanumeric bit compression scheme originated by DEC to reduce the storage requirements of file names, etc. The letters 'A-Z' are assigned sequential bit values in a 4 bit nybble starting at value one. Value 27 is assigned to '$' and value 28 is assigned to '.' . Values 30-39 are assigned to the digits '0-9'. Since the nybbles range in value from 0-39 (zero is a space), three of them can be packed into a 16 bit word by offsetting the leading nybble by 1600 and the second nybble by 40, then summing the three nybbles, i.e., the nybbles are treated as if they belonged to a Base 40 number system. DEC refers to this as 'Radix-50 Packing' since the value '40' in common (base 10) numbers is '50' in the Octal number sys- tem. >Rails. Also Power Rails. Viewed on a free triggering scope, a digital pulse train resembles a railroad track viewed from the air. The "rails" are the static high and static low (Vcc and ground) levels of the signal. By extension, "Power Rails" are the Vcc and Ground distribution busses. >RAM. Random Access Memory. By tradition, the main read/write memory of a computer. +RAM, History of. Throughout the history of calculators, tabulators and computers, the limiting factor to performance has always been memory. Bab- bage designed mechanical RAM much too intricate to be fabricated in his time (tabulators and adding machines came close). Mark I and ENIAC used relays as RAM. ABC demonstrated a refreshed capacitive drum memory. EDVAC, UNIVAC I and other "Serial" computers of that era used acoustic delay lines (mercury- filled steel tubes were popular) for main RAM. The first IBM computer (the model 650) used a magnetic drum. The first IBM mainframe used the "Williams Tube", an electrostatic true random access memory built in England. RCA never got their version to fly. The first really successful RAM spun out of the MIT "Whirlwind" project: Ferrite Core RAM. Slow, bulky and expensive by today's standards, Core RAM put computers reliably to work. Semiconductor RAM started to make inroads as "Scratchpad" RAM and fast cache for disks long before IBM invented MOS DRAM in 1971. There is a rumor to the effect that microprocessors began as a dodge to sell more RAM chips (probably not all that untrue). The explosive growth of microcomputers, MOS RAM and microproc- essors is certainly interrelated. DRAM has maintained an astounding four- fold capacity increase every three years for almost two decades. Static RAM isn't far behind. >RATFOR. Rational Fortran. A popular pre-compiler for Fortran which pro- vides features not supported in Fortran itself and patches for some of For- tran's more serious faults. Written by Brian Kernighan (1975). Another popular pre-compiler is WATFOR (or WATFIVE). >Read After Write. A technique that verifies that information written to memory, tape or disk exactly matches the data driving the writing process by performing a read process and comparing the result to the original data. Widely used on 9-Track drives at 800/1600 bpi. If a drive writes "Extended Record Gaps", it is doing transparent Read-After-Write. >Real Soon Now. The fourth Great Lie. The others are: "The Check is in the Mail", "I'll respect you in the Morning" and "I'm from the Government, I'm here to Help you." RSN is the delivery date for Vaporware. >Real Time Clock. A Time of Day clock not referenced to the CPU timing source. >Record. The smallest addressable part of a Random Access File. Also, the smallest physical division of a file (called a "Physical Record"). See Sector. >Recursive. Said of Subroutines. The ability of code to call itself without clashing variables or losing the way back. Implies that a local environment complete with pointer preservation and local variables is established when the subroutine is CALLed. >Recycle. To power down a system and then power it back up. Doing so clears many kinds of "Hang Ups". >REDUCE. The background language of the Tektronix 3270 ATE. As the name implies, the vendor was thinking in terms of a data reduction language, not a fully featured general purpose language (which it clearly is not). Basically TEKTEST w/o the Test Table constructs, REDUCE is loosely based on Fortran w/ some cosmetic changes. String handling capability is simulated using integer arrays as text buffers. Several constructs such as the LOOP statement show a middle ground between Fortran and BASIC. Both REDUCE and TEKTEST mimic Fortran's ability to call assembly language modules and pass parameters to them. Much of the patching to both languages is accomplished via this route. REDUCE and TEKTEST both use a TRANslator to compile the source files into tokens for execution via an interpreter. See Also TEKTEST and related TEKTEST topics. >ReEntrant. Said of Subroutines. The same code can be used simultaneously by more than one program or program segment. Example: SIN(X) is ReEntrant. >Refresh. The process of regenerating information in a dynamic system. For CRTs, that involves repainting the image. For DRAMs, that involves reading and rewriting the bit storage capacitors. >Regular Expressions. Unix allows its Tools to use a rich assortment of "WildCards" (See MetaCharacters), particularly for pattern matching Tools such as "fgrep" (which DOS calls "FIND"). These WildCards and the rules for combining and using them have come to be known as "Regular Expressions". Some Tools extend or vary these, but most abide by (more or less) one of the these three "flavors": Full, Limited and Tagged, used by "awk", "grep" and "sed", respectively. Regular Expressions are also used by the Shell, providing much of its "Magic". >Relational. Said of Data Bases. A scheme handling stored information as a large array (as opposed to a branching tree). Neither the exact form nor the method of recall are fixed, a distinct advantage. Useful for small data bases. Popular on microcomputers. dBASE II is a defacto standard. >Relay. An Electo-mechanical device composed of a Coil, an Armature and one or more pairs of contacts. These electrically actuated switches were first used to "Relay" telegraph signals from one circuit to another (hence the name). Very large Relays are called "Contactors" and are used to switch heavy loads such as mulit-horse motors. Tiny relays called "reed relays" actuate w/ milliwatts of power to control signals in electronic gear. Prized for their high ON/OFF ratios (milliohms vs Megohms), mechanical relays are found in ATE machine's "Analog Switch Matrix" and as signal and power control switches. "Hot Switching" signal relays can burn the gold coating off contacts resulting in intermittent operation. Mercury-wetted relays are position sensitive, but renew their contacts via capillary action from a pool of liquid mercury with each actuation. Such relays are used in Power Supplies and where contact bounce can not be toler- ated. >Reload. The process of restoring the computer to operation after a fatal system crash. Uses Backup Files. Always involves the loss of information. >Report Generators. Originally, the output portion of a data base system. Now extended to 'Report Generation Languages' which are useful for formatting output from all manner of applications programs, thereby simplifying their design and improving the user's control over the output obtained. >Reverse Engineering. The art of starting with a product and unraveling how it was made. May involve the production of documentation and other software to support fabrication of replicas. Reverse Engineering is not of itself illegal, (nearly all manufacturers do it) but neither does it bypass the copyright and patent laws. A carbon copy of a competitor's product is an invitation to a lengthy court battle, but the inclusion of a "significant" improvement is usually an adequate defense. >RGB. Said of Video signals. A scheme using separate cables for the Red, Green and Blue video information. Popular for high resolution monitors. >RISC. Reduced Instruction Set Computers. A new class of machines based on an IBM case study. A misnomer. Running counter to conventional wisdom that the way to increase the "Power" of a computer is to "enrichen" its instruc- tion set, (See Word Length), RISC computers use many more internal CPU regis- ters (512 vs 16) to reduce the rate of data shuffling to/from RAM. This increased register complement requires more bits in each token to address (9 vs 4), hence the "Reduced Instruction Set" (fewer options). Properly manipu- lated, these extra registers can result in significant speed gains in certain applications. >RJE. Remote Job Entry (Batch). >Roll Out. The process of off loading RAM to storage (originally tape stor- age) to free up space for a higher priority task. >Roll-Over. Said of keyboards. The ability to differentiate, decode and store bursts of keystrokes. Spoken of in terms of the number of keystrokes which can be handled in a burst, usually '2-Key Rollover' or 'N-Key Roll- over', the latter being best for fast typists ('N' is usually about 10, not that that makes a practical difference). >ROM. Read-Only Memory. >root. The highest level of a hierarchical directory. so named because such directories resemble branching trees. Normally the base (root) directory has no name and is designated by "/" (MS-DOS uses "\" to protect the guilty). Also, on Unix systems, the Super-User (generally the system administrator) is named "root" by default. >RPN. Reverse Polish Notation. A scheme favored by HP for programmable calculators. Characterized by the entry of the data before specifying the operation to be performed. A bit weird to use. >RS-232-C. The most successful Electronics Standard ever. Established by the Electronics Industries Association (EIA). Specifies signal levels and pin-outs but does not specify the 25 pin Type "D" connector commonly associ- ated with RS-232-C cables. Now considered dated due to its unbalanced sig- nals, wide voltage swings and limited distance (50 feet). However, this is still the most specified interface standard. AKA X.20BIS. ---> Technical aspects of: An RS-232-C port is generally implemented using a 12V Swing around Ground. Drivers source thru 300 ohms and receivers load w/ 1.5K. That gives about 10ma of signal current and about 100mw of punch. Being bipolar, the waveshape is resistant to RC effects. As can be seen, ample hysteresis and noise margin were factored in: -------------------- Must Withstant 25V Continuously --------------------- Five Volts .............. Lowest Transmitted Space ..................... 2 Volts of Noise Margin Min. Three Volts -------------- Receiver Reports a Space --------------------- 3 Volts Hysteresis ZERO Volts +++++++++++++++ GROUND (Data Ground) +++++++++++++++++++++++++ 3 Volts Hysteresis - Three Volts ------------- Receiver Reports a Mark ---------------------- 2 Volts of Noise Margin Min. - Five Volts ............. Lowest Transmitted Mark ...................... -------------------- Must Withstant -25V Continuously -------------------- Designed to work w/ TTY machines and endure the hazards of the time, any line can be connected to any line without harm; hacking is legal & safe. RS-232's 50 foot limitation must have been an inside joke. 9600 baud links running more than 3 miles on telephone twist pair are running on Center as you read this (and have been for a decade). The choice of Negative True for Data Signals (others are Positive True) reflects the TTY current loop practices of the time which used positive ground, keying the negative line. Other choices, especially the obscure DTE/DCE notation, make RS-232 interconnections a high frustration experience. Actually, a true RS-232 port (as some Mini's provide) is nearly worthless for anything but a real modem. (RS-232 is a modem standard). TTY used only 3 wires: Send, Receive and Data Ground. Data Ground is always Pin 7 (DB-25) or Pin 5 (DB-9). The other two end up on Pins 2 & 3, but which is which is seldom sure. This is how it is SUPPOSED to be: DB-25 Pin Signal Name BD-9 Pin 1 Shield Ground 2 ! Outgoing Data Signal 3 3 ? Incoming Data Signal 2 4 ! RTS Flow Flag 7 5 ? CTS Flow Flag 8 6 ? DSR Are-You-There Flag 6 7 Data Ground 5 8 ? CXR Detect Flag 1 9 Reserved 10 Reserved 11 Printer Flow Flag (??) 12 Secondary Channel DSR Flag 13 Secondary CTS 14 Secondary Channel Outflow 15 Send Clock (Sync) 16 Secondary Channel Inflow 17 Receive Clock (Sync) 18 UnAssigned 19 Secondary RTS. Ptr Flow Flag (??) 20 ! DTR I-Am-Here Flag 4 21 CXR Strength Flag 22 ? My Phone is Ringing Flag 9 23 Data Rate Selector 24 External Clock (Sync) 25 UnAssinged/Computer Busy Flag As I said, a Modem Standard. Until approval of RS-232-D (out for vote now), neither the DB-25 or DB-9 connectors are actually specified, though tradition is strong. Also in the -D revision is legalization of RTS/CTS "Hardware Handshaking", a long popular -C violation. ---> Tips: Try 3 wire first. Just connect the grounds & pins 2/3 so voltage appears on both. If nothing happens, loop pins 4-5 and 6-8-20 at each end. Nearly everyone sticks to the "Great Eight" signal lines (those w/ ! or ?) except for printer OEMs who hide their flow control flags in odd places. Get the 3 wire rig to work first & then probe around watching for a flag output. Don't forget RTS/CTS is popular (Pins 4-5 & 5-4 wired thru). Null Modems are: (2-3 3-2 4-5 5-4 6,8-20 20-6,8). No Magic. >RS-422. A 5 volt balanced line standard for data circuits. A good stand- ard. Good to 4,000 feet. >RS-423. A 5 volt unbalanced line standard intended to replace RS-232-C, which uses 12 volts. Not significantly better (except for the elimination of two power supplies). Response has been cool as RS-232-C remains hot. >RS-449. The least successful interface standard ever. Supposed to replace the RS-232-C standard, the public response has been underwhelming. Primary problem: A 37 pin type "DB" connector AND a secondary 9 pin connector. Too many wires for too little gain. Avoid. >RTE. Real-Time Environment. One "Pole" of Computer System orientation (DP & ATE are the other two). RTE encompasses data communications and other like situations in which the focus is outward from the CPU. Programs and control structures are very simple to insure adequate speed in servicing "interrupts". An RTE system does not have a "program flow"; it has a game plan for responding to "tickles" from the outside world. Internally elegant, RTE systems are inherently User hostile, difficult to program and nondeter- ministic (they are unpredictable). A common misapplication is "Rack-N-Stack" ATE where RTE produces great specs, high labor costs and dismal performance. >Run-Time Module. A small "Trailer Hitch" program (usually an interpreter) that must be present at execution time. Painful. -S- >SAA. IBM's new name for SNA. >SAS. Statistical-Analysis System. A statistical language (and supporting utility programs) developed at North Carolina State University in the late 1960's. Made public in 1972, the language resembles PL/1. SAS was specific to IBM S370 mainframes until 1982 when a VAX-11/780 version was released. Resembles APL in that it allows powerful array/file manipulations (in this case statistical analysis functions) w/ compact notations. Features an internal "Standard" data format allowing ready transportation of data among SAS programs, a distinct advantage. >Scattergram. A shotgun approach used on packet switch network to insure vital traffic gets through. The sender passes duplicate messages to all attached nodes. The receiver gathers in the wandering packets, reassembles the message and discards duplicates. Useful when messages are short but of great value. In current use by the Airline reservation industry. >Scheduler. Part of a multitasking (or multiuser) system's kernel, that part which determines which tasks will run in what order. Among the scheduler's tasks is the allocation of system resources and the resolution of conflicts, including crash recovery (system self preservation). >Scratch Pad. An area of main RAM set aside for use as a temporary storage area for calculations or processes. >Script. A Command (BATch) File under Unix or DOS which can be used alone or in combination w/ other Tools to perform some useful Task. Under Unix such Files are called "Shell Scripts". >Scroll. The smooth rolling up/down of CRT text as if the text were written on a papyrus scroll. >SCSI. Small Computer Systems Interface. The "Scuzzy" disk interface was developed in the late 1970's by Shugart (who called it "SASI"). Originally limited to 8 bit data paths and 1.5 Mbps burst rates, new versions w/ 16/32 bit paths and 40 Mbps burst rates are out for ANSI vote as a formal standard. Originally considered a "toy computer" interface, SCSI is now the exclusive disk interface for Apple, NeXT and SUN Workstations. Recommended. >Sector. The pie-shaped physical area which, together with concentric "Tracks" defines the location of "chucks" of information on a disk system. See "Hard Sectored" (used by RK05 and RL02 Drives) and "Soft Sectored" (used by everything else). >Self Modifying Code. A powerful and very dangerous programming technique in which the program rewrites itself on the fly. Impossible to maintain or trouble-shoot. Avoid. >Semiconductor. Any material more conductive than an insulator and less so than a metal. By common usage, the crystalline forms of Germanium, Silicon and certain other compounds (GaAs, for example) used in making electronic devices, particularly diodes, transistors and microcircuits. +Semiconductor, Mechanics of. Crystal sets based on Galena crystals predate vacuum tube radios by a decade. It was long suspected that there was "magic" in those crystals, but it wasn't until 1954 that it was understood that the real magic was the crystal itself. Those early devices were piezoelectric, depending on electric fields created by the bending of the crystal around a "cat's whisker". They worked, but no one really understood why. A crystal is an electrical thing made of "bonds" (shared electrons) forming a rigid "lattice" which is mostly empty space (a vacuum). Electrons can migrate through the lattice being handed from bond to bond or wander in the empty space within the crystalline structure. All crystals use both methods, more or less. If the "more" is with the free electrons, the material is an "N" type. If the lattice route predominates, it is a "P" type. (If they are equally active, it is called "Intrinsic", which is the "I" in "PIN" diodes.) The PN junction is the active area for all bipolar devices. An intense thermally powered electric field forms in that thin interface. For Silicon, it amounts to about .6V and is very real (and easily measured). This "con- tact" potential" is manipulated to cause bipolar devices to do useful things. For example, adding to the field prevents current flow while subtracting from it causes heavy conduction, i.e., the PN junction is a "diode". Semiconductors are thermally powered. At low temperatures, they get kind of "stiff" because few electrons get shaken out of their bonds to wander around. On the other hand, at high temperatures the crystal vibrates so hard that orderly conduction is impossible and the device experiences "thermal run-away", which is why we test devices at both extremes. Bipolar transistors are actually back-to-back diodes. The "Collector's" PN junction's electric field is enhanced by VCC preventing normal current flow. The "Emitter's" PN junction carries the signal current "injected" into the "Base". The Base has one problem: It leaks!! For every electron of signal current, over a hundred drift clean thru into the Collector. Part of the problem is that the Base is very thin. Part of it is that the signal is operating in the opposite conduction mode and it takes time to switch horses. And there is very little time. So each signal electron generates a hundred fold response in the Collector circuit. We call that "problem" amplifica- tion. Devices that use both of the crystal's conduction modes are called "Bipo- lar". That class includes all diodes and most transistors. FETs use a di- rectly induced electric field to control flow so only one conduction mode is used (The other is strongly inhibited). This is the technology used in DRAMs, CPUs and other MOS or CMOS parts. Even they depend on PN junctions for isolation, so they also get tested at temperature extremes. >Servo. A closed loop control system which monitors the output to regulate itself. A special case of feedback systems. Implies that the loop contains items displaying inertia (mass or thermal mass or the like), a factor which complicates the control situation. Example: Home heating systems. >Server. A fully slaved operating mode under which the machine expects to interact with another machine. Implies a controlling program in the other machine such that the linked pair respond as one. Example: Kermit. >SGML. Standard Generalized Markup Language. A book-binder's manual system of embedded formatting commands resembling Unix's "troff" (Totally Ridiculous Output File Formatter), a command language for Photo Typesetters. User hostile, labor/hardware intensive. GSA has refused to impose SGML on Con- tractors/Government Users as CALS has loudly demanded. A Turkey. Avoid. >Shadow Mask. A component in conventional color CRTs. A kind of "knothole" through which the three electron guns peek to light their individual color dots. A variation called a "slot mask" uses color stripes instead of dots. Sony's "Trinitron" resembles the slot mask scheme except that only one elec- tron gun is used and a control grid is substituted for the mask. >Shelfware. Software that resides where the name implies. >Shadow RAM. Semiconductor RAM backed by EEROM which automatically "burns" an image of the data in the normal RAM in the case of power down (or power failure) and restores it at power up, i.e., the combination is nonvolatile. Expensive. AKA NOVRAM. See Also EEROM. >Shareware. Software distributed freely at no cost which asks users to "donate" a token amount directly to the author. Often of surprisingly good quality, Shareware is usually authored by professionals who are contractually inhibited from private "For Profit" ventures. >Shell. The name DOS/Unix gives to its command-line processors. Far more than a JCL, Shells provide a rich command set complete enough to be consid- ered a programming language (Unix Shell Programs are called "Scripts"). Contrast this to DEC's MCR which provide just enough to allow the user to "light up" an application program. System V provides the "Bourne Shell" with its familiar "$" prompt. BSD provides the "C Shell" with a "%" prompt. The "Korn Shell" (No Joke!) is an attempt to combine the best of both. Other systems have borrowed the idea from Unix, notably MS-DOS. Shells are so named because they "wrap" around the actual physical system presenting a User interface independent of actual implementation. See Also SVID and Posix. >Shell Script. Any Unix Tool written in the "Batch" programming language of the Shell. DOS has a similar (severely limited) capability w/ its ".BAT" files. >Shmoo Plots. A scatter diagram showing the interaction of two parameter on (Pass/Fail) test results. The resulting "Blob" is said to resemble the "Smoo" character from Al Capp's "Little Abner" comic strip. (Shmooes look like a cross between a marshmallow and a bowling pin (w/ eyes). They are lovable, eatable and said to taste like anything desired.) >Sidetone. The portion of a telephone conversation fed back into the receiv- er to allow the user to "hear" himself speak. >SIGGRAPH. Special Interest Group in computer GRAPHics, a ACM working group best known for the CORE graphics standard (1979). >Signature Analysis. An application of CRC techniques to digital circuit testing (the CRC tag being the "signature" in this case). Useful as a quick verification of proper circuit operation, SA is less useful in fault isola- tion once a mismatch is found. Used primarily as a field maintenance tool to localize the fault to a replaceable assembly. >Simplex. Data transmission in only one direction. Occasionally used in a loop configuration of tty stations. Obsolete. >Silicon. Second most abundant element in the earth's crust, Silicon (Si) is found in its pure oxide form in North Carolina's white silica sand which has long been prized for the excellent glass it makes, its absorbent qualities and (lately) for its low Boron content. Elemental Silicon is made by the electro-decomposition of fused (melted) silica sand. "Pulled" from the melt as a long rod-like single crystal, Silicon is blue- grey with a metallic luster. Zone Refining sweeps dissolved impurities to the rod's end which is discarded. To be useful for microcircuits, Silicon must be almost atomically pure. If Silicon atoms were grains of wheat, one kernel of corn in a train of boxcars a mile long is grounds for rejection. Cut into 4 inch diameter "wafers" and polished to a mirror finish, raw silicon is converted into microcircuits through a series of photochemical processes. Functionally tested w/ a "Prober", defective microcircuits are marked w/ ink dots. The wafer is then scribed w/ a diamond stylus and shat- tered into "chips" which are sorted, bonded into DIP packages (or what- ever). Gold wires are ultrasonically welded to "bonding pads" on the chip and the "lid" is put on, completing fabrication. See Also Semiconductor. >Silicon Valley. A concentration of Hi-Tech industries which grew up between Santa Clara and San Jose, California starting in the middle 70's. Still a "Boom Town" environment, this region (roughly centered on Mountain View) was featured in the "James Bond" 007 Adventure "A View to a Kill". Dallas has a (smaller) similar region that grew up around Texas Instruments which is called "Silicon Gulch". >SIMM. Single In-line Memory Modules. A Chip Carrier Format for Lower Density Memory Chips Used in Anticipation of Plug-Compatible High Density DIP Availability. >SLIP. A Public Domain Serial Link (RS-232C) Internet Protocol (SLIP) for TCP/IP systems. Originated by 3COM, defined by RFC 1055 and included in all BSDs since 4.2. PC versions are generally part of some other package (generally TCP/IP). A public domain stand-alone version (KA9Q) was written by Phil Karns. MIT wrote SLFP (Serial Line Framing Protocol), a variation of SLIP used widely on campus (including U of Michigan). Slick. >Smalltalk. A computer language (actually a software environment) developed by Xerox Palo Alto, representing a decade of continuous work. First appear- ing as a major product in the ill-fated "STAR" system, Smalltalk forms the basis of most of Apple's recent magic, i.e., overlapping windows, detailed graphics, icons and the "mouse" cursor controller. The current version is Smalltalk-80 (the third major revision). Best example is the MacIntosh. >S/N. Signal to Noise. The ratio of useful energy (the "signal") to noise. Usually given in db. >SNA. System Network Architecture. An IBM Master/Slave environment using a large mainframe computer as the Master Controller. Uses SDLC, a superset of ANSI HDLC. Probably the best modern master/slave scheme, SNA has become a defacto standard and is widely used, especially as an upgrade for the older BiSync systems. Spiffed up a bit, IBM now calls it "SAA". >SNOBOL. An "Also-Ran" language which, like PL/1 and APL, has a small, devoted following. Particularly well suited for string manipulations, SNOBOL features strong pattern matching constructs. The last widely distributed version is Snobol IV. >SneakerNet. The exchange of information via compatible Floppies physically interchanged among a small group of (local) Users. To be successful, this "Hoof-Powered" LAN must deal w/ most LAN issues (format, access, security, integrity, updating, etc.). So named for the tennis shoes favored by Bit- Heads. >Soft Error. An error that can be corrected automatically without causing a system fault. In RAMs, an error caused by an alpha particle hit. >Soft Sectored. Said of flexible disks. See Hard Sectored. >Software. The actual computer language statements or binary codes resulting that cause the computer to do something useful. Also called "code". The only thing "soft" about software is the name. Everything else is hard. >Software Maintenance. The process of "patching" and upgrading (to reflect improvements or changes) existing computer code. Typically costs 5 times the cost of the original development cost over the program's life cycle. Also, a programmer is 7 times more likely to introduce a bug during maintenance than during the original development effort. (Source: IBM) >Software Testing. The art of proving that the bugs remaining are smarter than the people attempting to eradicate them. >Source Code. The human readable statements written in some computer lan- guage that comprise a program. >Spindle. >Spinning Storage. A Hard Disk. >Splatter. CrossTalk. >SPOOL. (1962) Simultaneous Peripheral Operation On-Line. Now a rather sophisticated scheme for sharing printers/plotters by using special files which capture the program's output and hold it until serviced by a "Spooler" which dumps it onto the shared resource. >Stack. A pile. An item placed on a stack is "pushed". An item removed from a stack is "popped". Operation is on a first in, last out basis. >Stacking. Said of High Performance Hard Drives. Broadsiding Bits onto Multiple heads (surfaces) to Improve Throughput. Risky (crash one head & lose the whole works). Effective. Expensive (and probably Worth it). >Stagger. A scheme to reduce the average rotational latency in disk systems. If logically sequential disk blocks are arranged in physically sequential order, the next disk block will already have begun to pass beneath the read/write head before the system is ready to access it, i.e., one complete revolution is lost. By physically offsetting logically sequential blocks, the system gets ready to access the next logical block just as the beginning of that block approaches the read/write head. Staggering is established during disk initialization and, properly done, can significantly improve system throughput. AKA Interleaving. >Standards. They are a blessing and a curse. At best, Standards provide a framework for vendors to hang their enhancements (and Users, their hopes). At worst, Standards stifle innovation (are too rigid) or allow so many "legal" options as to be worthless (IGES). "Might" doesn't make "Right" but it does make (defacto) Standards. Centro- nix Printer interfaces, EGA/VGA and VHS are examples. IBM is so powerful that EC made formal publication of IBM's internal standards (as AT&T does) a condition of business license renewal. These market-driven standards fill immediate needs but tend to address limited situations that fade in impor- tance with time (CP/M). Industry associations set Standards for their members (and by extension, the rest of us). Among these are ASTM, IEEE and EIA, the latter holding the honors for the most successful (RS-232) and the least successful (RS-449) Standards. Formalization can give a defacto standard's creator a significant advantage, which is why formal standards tend to punish independent innova- tors. Courts have held Industry Associations (ASTM, specifically) liable for anticompetitive formal standards. (You must agree to license all comers at a "reasonable fee" (HP's one-time charge is $250 for IEEE-488 rights).) When vested interests attempt to victimize the User, the Standards making process can break down. The current mess in Graphics resulted from a long tradition of "locking in" Users through intentionally incompatible print/CRT graphics formats. No one (or few) formats generated enough market share to become defacto standards. Competing Standards bodies have proposed an array of ineffective "Standards", none of which dominates. Unless some new tech- nology (such as X-Windows) can drive an effective Standard, we must look to ISO or Japan for a solution. GPIB and Ethernet became entangled in turf battles in IEEE committees and "round-ended" ANSI via Europe (thru ECMA & ISO) to become US Standards (IEEE-488 and IEEE-802.3, respectively) The real power of Standards is their ability to define markets, procure- ments and sales. EC's ability to restrict access to the European Common Market has put real teeth in ISO standards (as IBM discovered). FIPS like- wise define Government markets. DEC learned a $4.3 Billion Posix lesson involving FIPS-151 and the AF Office Automation contract (AFCAC-251). (DEC bought MIPS, joined OSF and loudly supports Unix, Posix, Gosip and ISO). Military Standards, like vendor's Proprietary Standards, tend to define "Products" ala DECnet, SAA or SEM. TCP/IP is an example of a MIL-Spec that has migrated well beyond its intended application (ARPANET) to define a fast growing market segment. Until the EC crackdown, IBM played the Proprietary Standards game with a vengeance, changing its internal standards at will to gain market advantage. In an increasingly buyer's market, closed standards (DECnet) are being cracked open (ISO compliant) and open standards (Unix, TCP/IP) are on a roll. The only constant is change. Standards, good and bad, provide structure in an otherwise fluid world. Standardization is never complete, timely or exhaustive. Anyone who tells you otherwise is a liar and anyone who believes him is a fool. Standards are a high stacks crap-shoot. Guess right and the world comes to you (Unix). Guess wrong and it gets very lonely (ATLAS). >stderr. Standard Error. The Unix/DOS pipe used for error messages. By default, stderr prints to the user's terminal but may be redirected using the &2> (Unix Shell) syntax. Unlike stdin/stdout, DOS does not redirect stderr. >stdin. Standard Input. The Unix/DOS InFlow Pipe for program input. By default, the User's keyboard. May be redirected using the '<' {Squirts IN} symbol or a Pipe '|'. >stdout. Standard Output. The Unix/DOS OutFlow Pipe for program text. By default, the User's CRT. Often redirected using the '>' {Squirts TO} symbol or a Pipe. Under Unix, stdout is File Descriptor 1, so "&2>1" redirects stderr into the stdout Pipe. Pipes and Stdio are now commonplace even under MS-DOS. See Also Pipes and Filters. >Start/Stop. Asynchronous serial data transmission ala teletype. Original- ly, a mechanical rotary switch clutched in by a "Step" signal built up the serial bit stream which included a "Space" as the first bit to trigger the clutch of the distant machine's selector mechanism that decoded the data. The last bit (the "Stop" bit) was originally twice as long to allow time for the mechanical parts to coast to a stop. The receiver is resynchronized each character cycle eliminating timing error build up. AKA Asynchronous. >Statistical Mux. A multiplexer that depends on the statistical (bursty) nature of terminal communications to time slice a single high speed channel among several users. Nearly always an X.25 link. >Stepping Motor. A multiphase AC (actually pulsed DC) motor intentionally designed to "cog". Strong permanent magnets establish zero energy "rest" positions. Properly pulsed, the motor will advance the shaft a specified number of degrees for each pulse, making it an ideal actuator for a digital control system. Widely used in printers, floppy drives and some (cheap) hard disks. Frequently combined with cogged belts, screw drives or band actuators. +Stonehenge. The most spectacular and best known of some half dozen similar sites in the British Isles, Northern Europe and North America (most notably, the "Great Medicine Wheel" in Wyoming). Modern computer analysis proves these structures to be fully functional analog computers (the earliest com- puters yet found) designed to predict the occurrence of solar and lunar eclipses, events of great importance in primitive religions. Stonehenge is located in a latitude where the principle alignments form a nearly perfect right angle (93 degrees), apparently a matter of considerable importance considering the labor lavished on the site. Writings predating the Roman conquest of Britain mention a people who accurately predicted eclipses, indicating active operation of these sites into historical times. Claimed by the Druids, Stonehenge predates them (and they exhibit no indication of understanding its design or operation) making it likely that whoever built these sites were dispersed by the Romans and displaced by the Celts from whom the Druids descended. >Storage Tube. A variation of oscilloscope technology in which the trace from a (usually) single-shot event is captured and temporarily stored on the face of the CRT. This is accomplished by using an insulated wire mesh behind the CRT face plate. The image is "painted" onto the mesh using a high power "writing" beam which discharges the mesh wherever it is touched. Low energy "Flood Guns" sustain the glowing phosphor image by passing through the mesh along the trace of the Writing beam. Limited to small CRT's as the mesh becomes fragile as the size increases. Another type of Storage Tube is the Tektronix BiStable Storage Tube, which uses a different principle. >Store And Forward. A service of PDN's. Traffic is held in the system temporarily until a channel can be opened to the addressee. >Store-And-Test. A popular form of functional testing in which the device to be tested is exercised by bursts of (stored) test patterns at a high rates ("Fast Functional Testing") to simulate actual operating conditions. The key to this method is the test pattern set (See Vector Set) which both stimulates the device and predicts its response thereby allowing fast Go/No Go test decisions. >Streaming. Said of tape. A method of rapidly recording large amounts of serial data on magnetic tape using a narrow head which is stepped downward each time the tape (usually in a cartridge format) reverses at the EOT marks. Popular for backing up disk systems, especially Winchesters. Also, a failure mode for LAN nodes (won't shut up). >Streams. Originally, the serial flow of information within a Pipe. Later extended beyond "Named Pipes" to "Named Streams" (The flowing information as opposed to the channel that contains it). This led to redirection by name rather than by file (origin/destination) or channel (pipe or port) and the management of the information flow directly, with the machine handling the necessary pipefitting. >String. Literally a "string" of text characters (originally handled as a block without regard to content or context). A type of variable popularized by BASIC. >Strong Type Checking. A feature of certain languages which forces data types to be disjoint. For example, the number '1' (an INTEGER) and '1.0' (a REAL (Floating Point) number) are computed/handled/stored in totally differ- ent ways. A bother. This situation exists because of the complex manipula- tions involved in dealing w/ Floating Point Numbers. INTEGER math (which operates within the confines of the CPU's basic word length) runs as much as 100 times faster. Fortran originated this split personality, but provided no scheme to enforce "Type" separation, an oversight that leads to many obscure errors. ALGOL-60 corrected this by a rigid type-checking scheme. Be aware that many useful real world tasks require violation of data types. >Structured Programming. A concept created to eliminate "GOTO's". Impracti- cal. Originated the 'IF-THEN-ELSE' and 'CASE' constructs and "Pretty Print" now widely used. >Stuck-Ats. A class of digital circuit faults which may be represented as hard shorts to either VCC or ground. This class of faults, which can be modeled mathematically, can be detected using test vectors generated by logic simulators ala LASAR. While the detection of a "Stuck-At" condition is proof positive of circuit failure, the converse is a matter of some debate. At the bottom line, Stuck-Ats are detectable and, therefore, useful. >Super User. A "privileged" user who has the power to read any file, kill any process, change any parameter or reconfigure the operating system. Im- plies a System Administration role. The Unix Super User is named "root". >SVID. System V Interface Definition. A remarkable multi-volume document that details exactly which commands are required and how they must interact in order for the overall package to qualify as "System V Unix Compatible". As has been demonstrated w/ earlier versions (Minix, Version 7), it is possible to (painfully) write a SVID conforming system without a single line of AT&T code. NBS is working on a non-AT&T version of SVID which will become a FIPS. See Also BSD and Posix. >Swap. Disk Swap. The process of posting one segment of RAM to disk and replacing it with another from disk. A common process in a Virtual Memory style of operation. Slow. >Swap Block. A small (usually circular) adapter (which may fit atop a gener- al purpose test fixture) containing the mounting connector for the device to be tested and interconnect wiring to the ATE's test head (or general purpose fixture). >Sweet-Spot. That portion of an ATE machine's performance envelope where error is insignificant. Testing in this region approaches a "Science". ATE machines are normally operated well outside this region pressing their per- formance envelope. Testing there is an "Art". Readings become "representa- tions" of the real world and everything must be viewed with respect to meas- urement uncertainties, distortion and offsets. The superior stability and repeatability of ATE machines allows "Correlation", the validation of obser- vations against accurately known benchmarks. +System, Evolution of. In the beginning, there was no alternative to working in machine language, which at the time was of such low level that today it would be called 'Microcode' (See Same.) _______________ ______________ | | | | | File of | ------------\ | The Physical | Example: | Numeric Data | ------------/ | Machine | TI-553 ATE |_______________| |______________| Systems c1950 (ENIAC, EDSAC, UNIVAC I) The introduction of the IBM 650, which was essentially a "Four Banger" using a rotating drum as a temporary memory (I/O was via punch cards) brought something new, a utility program called an "Assembler". This widely used scientific machine set the standard for form, format and syntax for what has come to be called "Mnemonic Assembly Language". _____________ _______________ _______________ | Source | | Binary | | The | | Text | ----------\ | Object |------\ | Physical | | File | ----------/ | Code |------/ | Machine | |_____________| Assembler |_______File____| |_______________| Systems c1953 (IBM 650 & All Assembly Languages) In 1954, IBM created an enhanced assembler capable of handling text in a more human oriented manner. They called this utility a "Compiler" and the first language to use it was Fortran. Like nearly all assemblers, the For- tran compiler made two passes through the source file and produced machine executable object code. Since assemblers then in use allowed "Macros" (See Same), Fortran included the capability to reference previously compiled (or assembled) subroutines from a library. This capability proved to be one of the real strengths of the language and has contributed strongly to its wide spread use. Prior to run time, these sections were fetched into the object file by a "Linker" (although some compilers include the Linker as the compil- er's last operation). These principles have remained virtually unchanged since. _____________ _______________ _______________ | Source | | | | The | | Text | ----------\ | Object |------\ | Physical | | File | ----------/ | Code |------/ | Machine | |_____________| Compiler |______File_____| |_______________| Systems c1954 (Fortran & All Compiled Languages) One of the problems with a Fortran style compiler is that the object code is specific to one physical machine. To assist in transporting Fortran programs, a library of standard subroutine programs evolved into which hard- ware specific code was grouped. In time these became known as "Drivers" since most of them related directly to some peripheral device (such as a printer). The system manager could add or change a physical peripheral by rewriting only the driver subroutine, a major advantage. Still, the object code for an IBM mainframe will not run on a UNIVAC or a VAX, so separate compilers must be written for each machine, an expensive bother. A 1960 experimental language, ALGOL-60, addressed the high cost of software by designing a language to fit the compiler. The resulting compilers were much easier to write (making transportability better), ran faster and pro- duced code much like hand generated assembly. Unfortunately, the manually inserted cues necessary to optimize the compiler resulted in a labor inten- sive syntax. Recently, ALGOL-60 spinoffs (Pascal, Ada and 'C') have revived this idea. Of these, only 'C' (which was designed as an alternative to mnemonic assembly language) posts a net labor savings over available alterna- tives. Compilers evolved other ways, too. One of these is the optimizing compil- er. Most compiler designs process source text one line at a time, generating whatever object code is required plus a certain amount of overhead code. Compiler generated machine language resembles a series of loops departing from and returning to the "idle" machine state. Assembly language, which is fully incremental, is usually more compact and faster. An optimizing compil- er removes (or prevents the generation of) much of the overhead code associ- ted with coming to and departing from the idle state, i.e., an optimizing compiler's object code is much more incremental and much more like hand generated assembly code. Incremental compilers progressed the opposite direction toward code com- pletely line (or card image) oriented. The intent was to reduce program development cost and compiling costs by allowing the user to alter his pro- gram on a line by line basis, recompiling only those cards (lines) that had been changed. _____________ _______________ _______________ | Source | | Binary | | The | | Text | ----------\ | Object |------\ | Physical | | File | ----------/ | Code |------/ | Machine | |_____________| Interpreter |_____Buffer____| |_______________| Systems c1962 (Dartmouth BASIC, LISP & Most Interpretive Languages) It was a short step from the incremental compiler to the source code inter- preter which dispenses with the object code file completely. This idea evolved around 1962 and was incorporated into BASIC, a language emerging at the time. Early BASICs had a fixed number of variables and no array capabil- ity. This was quickly solved using an 'Allocator' to mark out RAM space. Interpreters have the ability to support debug features such as TRACE and provide the user the option to easily repair a program. This highly interac- tive and User Friendly nature of interpreters has its price, speed. _____________ _______________ _______________ | Source | | Binary | Inter- | The | | Text | ----------\ | Pseudo- |-------\ | Physical | | File | ----------/ | Code |-------/ | Machine | |_____________| Translator |_____File______| preter |_______________| Systems c1971 (Tektronix 3270 ATE & Pascal) One solution to this situation is to use a "PseudoCode" (See p-Code). This technique is used by the Tektronix 3270 ATE which uses a "Translator" and calls p-Code files type . Made up of partly digested source text, reformatted into what amounts to assembly macro calls ("Tokens") and point- ers, they are expanded into executable machine language by an interpreter at run time (IP3270.RUN in the case of TEKTEST). The use of p-Code allows a single compiler (translator) to service target machines which are greatly different in design and construction. Only the interpreter is machine spe- cific, and it tends to be very small (typically only about 2-4Kb). The price paid is increased run-time overhead, which is why some implementations use a true compiler on p-Code files to create "native object code" (executable machine language). _____________ _______________ _______________ | Source | Parser | Binary | Inter- | The | | Text | /---------\ | Tokens |------\ | Physical | | Entry/ | \---------/ | In |------/ | Machine | |_____Display_| DeParser |_____RAM_______| preter |_______________| Systems c1976 (HP Rocky Mountain & MicroSoft BASIC) MicroSoft BASICA and the HP9845 use a modification of the source code interpreter patterned after the p-Code/translator approach. The "Translator" is combined with the source program text editor to form a "Parser", which does syntax checking and source text to binary token conversion as the text is entered into the machine for storage. Internally, the source text does not exist. To allow program listing and editing, a "DeParser" reconstructs the original source text as needed. Combined with an Allocator, the result- ing system has the power of a compiled language, the User Friendliness of an interpreter and the speed of a Translator based system. The HP-9000 substitutes a variation of the native code compiler for the interpreter used in the HP9845. The first time a line of code is accessed, it is compiled into native code and stashed in scratch RAM. The next time the system accesses that line, a pointer points at the already compiled object code thereby avoiding the performance penalty commonly associated with an interpretive system. If RAM is exhausted, all compiled object code is dumped, and all jump pointers reset. The effect is to keep only the current- ly executing object code in RAM unless sufficient RAM exists to keep it all. Given a fast processor, this technique provides the blinding speed of conven- tional compiled object code and the User Friendliness of an interpreter. Paralleling the evolution of languages and language systems (compilers, etc.), was the evolution of the Operating System itself. The IBM 650 had no "Operating System". It simply read in punch cards, performed the indicated operations and punched out the results (which is why most consider it to be a "Calculator".. UNIVAC I introduced the System Operator's Console from which the System Manager could allocate RAM, assign peripherals and direct program execution. The CPU still did not run continuously (the Console operator had to set/reset the program counter and run/halt the CPU as required), but the basis for an operating system was being laid as a good Console man could significantly improve system throughput by juggling several jobs in RAM so as to avoid "Dead Time" while operators swapped tape reels. As systems became more complex, the Console operator became an observer. The messages programmers included on the top of each deck (designated w/ a '$' punched as the first character on the card so that it would print at the System Console Terminal) containing information about which peripherals were needed, how much RAM was required and how much time to allow (all factors the Console operator needed to plan system work flow) became a standardized syntax called a "Job Control Language" (JCL). A "Monitor" program now read the JCL cards and, using allocation algorithms, managed the actual system work flow. Although the term would be coined later, these Operating Systems were by nature "Multi-Tasking". The driving force behind Mainframe Operating Systems was the need to spread the enormous cost of centralized hardware over many tasks. Minicomputers began in another direction as a result of a 1961 National Institute of Health (NIH) contract that used a DEC PDP-1 (Serial Number One, as a matter of fact) to service several terminals from one CPU (Time Share). In the systems that evolved from this root, the "Monitor" (as the Tektronix 3270 ATE still calls it) program became self-sufficient. JCL became "System Commands" entered at the "System Prompt", '$'. The few tasks the System Manager needed to accom- plish were handled from an ordinary terminal (designated as "Console") via a "Super User" mode which granted "Privilege" to perform global actions (such as SYSCUP). Mainframes were (and remain) IBM's ballpark to the point that one frequent- ly chose to limit transportability to protect a market niche. Besides, the cost of rewriting compilers was an insignificant part of overall system cost. Not so w/ minicomputers and a number of solutions evolved, including transla- tors, cross-assemblers (assemblers creating native code for a different ("Target") machine) and "Universal" Operating Systems such as Unix and Pick. Microcomputers began (and primarily remain) single user systems. Many have integrated hardware and software to a degree found in no other class of machine, intending to be "Appliances" which can be operated by anyone regard- less of background or training. The driving cost in micros has been software and it is no surprise that the Operating Systems that have evolved (CP/M, MS-DOS, SMALLTALK, etc.) are targeted at reducing the cost of creating, transporting and supporting applications programs. Superior as Graphics Workstations, Micros have fueled the drive for practical LANs and clusters to interlink themselves with other Micros and Mainframes to reduce the overall cost of ownership and enhance throughput. Unix represents a divergent approach in which the "System" is really a loose collection of executable files, each calling the next in sort of a distributed state machine. The logical extension of this is the so-called "Stateless" system currently evolving for distributed multi-processor ma- chines, particularly those of the "Cray-lett" class, >System Second. Also called a "Standard Billing Unit (SBU)." A measure of the amount of "computer power" used by your job (on a time shared system). To maximize the rate of SBU generation, time share systems are specifically designed to execute many jobs, each done slowly to avoid the I/O bottle-neck problem and to maximize profits. A good idea for the computer center. Only the user gets screwed. >Synchronous. Said of data communications processes. A transmission tech- nique in which the location of each bit is determined strictly on the basis of time. More susceptible to noise than asynchronous operation. Almost always used in high speed applications. Used by Bisync and UTS-200 mode 4. >Sysgen. The process of building up a customized operating system. >Sytek. A proprietary broadband Metro-Net known locally as "CenterNet." Based on groups of 20 135 Kbaud CSMA/CD channels, Sytek operates on the "Mid-Split" principle under which all traffic is funneled into a frequency shifter (the "Headend") and rebroadcast to all drops. The cable plant is standard CATV w/ bidirectional amplifier/splitters. Operationally, Sytek functions as a tele- phone system for terminals (virtual circuits), for which it is well suited. PC's press its limitations quickly as maximum throughput on any port is about 4.3 Kbaud. The single best feature is the solid per- formance EDAC provides. The greatest flaw is the remote programming "feature" which can not be disabled. -T- >T1. An AT&T Standard for 1.544 Mb/s digital data stream channels. Set up in 1962, only recently of interest to end users. A subset has been proposed, the "Computer to PBX Interface" (CPI) which divides a T1 into 24 64 Kb/s channels. >Table Driven. A variation of the Data Driven program in which a generalized control program is guided by cues stored in a "Table" (usually a file or an array), often the same table used to generate and interpret user menus. Table driven programs have the advantage of being easily modified/ upgraded (merely change the table), but typically execute slower and involve much more overhead than normal programs. Such programs are an implementation of "Decision Tables", a software design tool based on an array of situations and designated responses. >Tape. By common use: Magnetic Recording Tape. A nonvolatile media composed of a magnetic material (usually ferrite) bonded to a plastic ribbon (often mylar). Includes a lubricant to control head wear. US Patented in 1942 (actually invented by BSR in NAZI Germany in 1934) , the original paper backing proved too fragile. Used widely as a media for audio signals (voice, music, etc.) following WWII. Developed as a mass storage media for computers by IBM (replacing wire recorders, an older technology). Tape has grown up with computers and remains the media of choice for archival storage and bulk data transfer. See Nine Track. >Tape, Cartridge. Specifically, the 3M format. A plastic enclosed dual reel tape package using an elastic drive belt running on the back side of the reels. A single drive wheel powers the combination which inherently provides constant tape speed and tension. Most popular in the minicartridge format used in the HP terminals and desktop computers (9845/HP-85). The original quarter inch cartridge is enjoying renewed popularity as a Winchester backup media (See Streaming). >Tape, Cassette. Specifically, the Phillips format originated for portable audio recorders. Marginal for digital use, but widely used in the home computer market. Elaborate dual servo hub drives and better materials have allowed this format to serve in industrial applications despite inherent speed/tensioning problems. >Tape, 8 Track. A half inch continuous loop format created for automotive audio applications by Bill Lear, best known for his "Lear Jet" Executive aircraft. The 8 Track format is poorly suited to digital work (although the Teradyne L115 uses them) but has influenced other designs, notably the Wafer Drive and tape streamers, almost all of which use a incrementally positioned head similar to the 8 Track scheme. See Streaming. >tar. Tape Archiving program. An old (but good) Unix Tool designed for backups using 9-Track (Read-After-Write) tape. Frequently displaced by "cpio", "tar" lives on as a universal "squeezing" method widely used by software distributors. >TCP/IP. Transmission Control Protocol/Internet Protocol. A DOD developed Public Domain suite of 5 protocols c1970 for ARPANET (Now DDN). Although 15 years old, TCP and IP (the lower levels) compare very favorably w/ their ISO counterparts. The other 3 (applications level) protocols are definitely dated: SMTF vs X.400 (Mail), FTP vs FTAM (File Transfer) and Telnet vs VTP (Virtual Terminal Access). Mandated for DOD phase-out by Congress, TCP/IP has an installed base that is expanding at $500M/year w/ 1990 projections seeing a $1.3 Billion market. Delays in availability of ISO equivalents (X.400 is to ship in late 88 w/ FTAM "Real Soon Now". VTP is still vapor- ware.) leave no alternative for near term users. NBS has been tasked by Congress to smooth the transition to ISO, a non-trivial task they are taking seriously. >TEKTEST. The Test Table programming language of the Tektronix 3270 ATE. A superset of REDUCE. Also, the name of the Operating System (c1971) of the 3270 ATE. >TEKTEST, System. The operating system for the PDP-11/3X in the Tektronix 3270 ATE system. Created by gutting a standard DEC operating system c1971 of its Emulator Traps (EMTs) and substituting others hardware specific to the 32XX ATEs. A quick and dirty way to get a system on line, this put Tektronix in the operating system business, a place where it has neither the expertise nor the manpower to effectively be. One of the reasons Tektronix needed a special operating system is the curiously bottlenecked interface on the Test Table, an 8 bit path routed through a data multiplexer originally designed to operate from punched paper tape. >Teletype. Also "TTY". A mechanical typewriter operated via a Current Loop using a serial Start/Stop data stream. Usually rated in Words/Minute (5 characters/word w/ one space). Originally Baudot (5 level) code, now most use ASCII (8 level). A 100 WPM machine operates at 110 baud (2 stop bits) Obsolete. Noisy. Slow. Expensive. Hard to maintain. >TELEX. A worldwide teleprinter dial network using Baudot Code (See Same) teletype machines. A similar service (TWX) offered by Western Union using ASCII machines has largely displaced TELEX in the US. The two networks are interlinked. >TEMPEST. The unintentional radiation of information bearing EMI. >Terminal Emulation. The process by which one machine pretends to be a "dumb" terminal operated by a human so as to interface with another (usually remote) machine. This is a "Real Realtime" interactive process which is very difficult for most operating systems. (Most machines assume the rest of the world is their "peripheral"). Most language (like BASIC or Pascal) are Line-Oriented. Assembler (and "C") are character-oriented. Terminal Emula- tion is a mix since not all lines (prompts, for example) are terminated with an EOL marker, a fact that will "hang" a Line-Oriented environment such as the Unix Shell Script language. >Texas Instruments 553 ATE. An SSI to MSI tester c1968. Designed to be driven via punched tape read by a high speed optical reader using NCC (EIA) code. Later retrofitted in some installations w/ a Texas Instruments model 960 computer, a relatively crude machine designed for business applications. The TI-553 is programmed in a mnemonic machine language (a mixture of text and numbers) which executes directly in hardware. Fully incremental. Recon- figurable via wiring on the test head adapter and on an "Undersocket Card", a technique that greatly expands both its versatility and the difficulty in understanding its programs. >Threading. A powerful Programming technique often abused. The basis of the power of FORTH and the reason for the bad press of the "GOTO" construct. Unless controlled (as in FORTH), threading "stitches" together a program into a single unit which can not be repaired or changed. Thou Shalt Not Thread Thy Code. >Throughput. The "bottom line" rate of data processing. transfer, etc. >Time Share. A style of operation under which a large central computer is "shared" among many users via a time slicing scheme. Invented in 1961 under a National Institute of Health (NIH) contract on a DEC PDP-1 miniconputer (Serial Number One, as a matter of fact). Justifiable today only when the task is primarily a telecommunication task. Low performance. High cost. Frustrating. Very user unfriendly. >Time Slicing. The most popular method of implementing Time Shared opera- tions. Each User is allocated slivers of the CPU's time based on interrupts generated by a Real Time Clock and some sort of priority scheme (to determine who gets the next Time Slice). See Also Transaction Processing. +Think. What humans do that machines don't. Human thought is a combination of analysis, synthesis and association with a healthy measure of wired in error. This latter factor accounts for new and unexpected associations which are then analyzed against criteria to determine if the errant response is a "goof" or a "Flash of Genius." Although the conscious mind "forgets" (loses pointers), the subconscious mind (a kind of ever-running background task) never does. Slower, this subsystem works strictly by association, sorting through all experiences and memories putting together facts. Unlike the conscious mind, the subconscious mind is seldom wrong (although the situation passed to it by the conscious mind may contain bad data). This "smarter" mind functions even while asleep, so the advice to "Sleep on it" is valid. Humans temper their thought processes with a "value system", a kind of "calibration" gained through experience. Even if human thought is computer- ized (and it can be), the problem will be one of trust. Right now computers are deterministic (they do what they are told, no more, no less). Making a machine non-deterministic (making it mimic human thought ala "Fuzzy Logic" or whatever) requires the user to validate all its output (conclusions). The power to think and/or learn implies the right to make mistakes. Is there an application for a machine that makes mistakes? >Token. Specifically, the binary output of a Translator or Parser that is later expanded into native machine language by an interpreter prior to execu- tion. >Token Passing. An IBM scheme for controlling access to LANs based on a special packet (the "Token") which empowers the holder to transmit (all others listen.) Favored by ADP types due to the resemblance of Polled Multi- drop. Simple enough to explain, the protocol in practice is a nightmare due to the inability of the LAN to handle noise. Requires a mainframe at one node to serve as Master. IBM claims to hold the basic international patent on Token passing LANs, one of the conditions of which is to defend the patent against all challenges. The international patent is held by Swedish inventor Olof Soderblom. Avoid. >Tool. A small program written to do one thing well. Intended to be (and usually is) piped "Tinker-Toy" style w/ other Tools for use Barefoot or in Command Files called "Scripts". A good Tool will tell you its function and Syntax if you enter its Name alone (or followed by a Question Mark). >Transaction Processing. A style of time share operation based on the as- sumption that most User tasks ("Transactions") are very short, simple and quickly accomplished. Any running task is allowed to be interrupted by a new task which is then allowed to run until it is either completed, suspended (awaiting disk access usually) or interrupted. If suspended, the task is assigned a priority and the interrupted task restarted. Each time a task is suspended, its priority is examined and may be adjusted downward according to some algorithm based on total run time. The effect is to give Users very quick responses for trivial tasks and to fade lengthy tasks into what amounts to background execution automatically. Since this scheme breaks down for computationally intensive tasks (which rarely get suspended), Transaction Processing is used primarily w/ DBMS operations. A variation of "Hen & Piglets", this system includes an abort timer to prevent any task from going "Whole Hog". +Transistor, History of. Strictly speaking, the term "Transistor" covers the generic class of solid state devices capable of performing linear signal amplification (even though the circuit may use that device as a switch). Most mark the start of transistors with the 1948 invention of the bipolar point contact transistor by John Bardeen, Walter Brattain and William Shock- ley (for which they received the 1954 Nobel Prize), but solid state amplifi- ers predate them by almost 20 years. Julius Lilienfeld (1883-1963) applied for patents on Thin Film FET devices in 1926 and twice in 1928 (being granted one in 1929). Bell Labs went to some trouble to discredit his work in defending their own (later) JFET patents. Since Oskar Heil successfully patented a similar FET design in England in 1935, there is little doubt that Lilienfeld's work was valid, although neither his nor Heil's devices reached commercial status. Bell's work resulted in the JFET (1952 by Shockley). Silicon MOS FETs were invented by Hofstein and Heiman working at RCA in 1962, just a little late to avoid the tragic loss of a generation of engineer- ing talent well versed in working in a high impedance, voltage controlled environment. Much has been made of the generosity of Bell Labs in licensing transistor technology so widely and so reasonably from early on. In actual fact, the Bell system desperately needed practical solid state devices and the original design, little more than a lump of Germanium w/ two sharpened wires poked into it, wasn't even close. By throwing their invention out upon the waters of industry-wide innova- tion, they gained rapid access to the device they needed, the silicon junction transistor invented by Texas Instruments in 1954. The dividend was doubled when TI (and Fairchild) invented the integrated circuit in 1958. (Strictly speaking, TI was first. However, TI and Fairchild actually solved different aspects of the same problem and cross-licensing was required to produce a practical IC design, hence most credit them jointly for the invention). >Translator. A stand alone version of a parser. Functions like a compiler except that the object file consists of binary tokens which must be expanded by an interpreter prior to execution. Used by the Tektronix 3270 ATE. >Transmission Line. Said of signal paths (usually metallic). A path that appears to be a infinite in length (no reflected energy). Physical wires, when terminated in the characteristic impedance of the line, emulate a resis- tor of that value. Coaxial cable, a popular transmission line, is normally discussed in terms of the value of that resistance, e.g., "75 ohm" line is used for TV and "50 ohm" line is used for CB. Twist pair requires a 125 ohm terminator. >Trap. An interrupt generated from software. One way for an applications program in a multiuser system to access shared resources (such as disks or the floating point accelerator) safely. >Trojan Horse. An attack on system security based on a program that appears harmless, but which contains a "Trapdoor" through which mischief can be done. Aside from the original, the most famous example of this probably was the "Jesse James" who operated in the Kentucky/Indiana area following the Civil War. Actually a Pinkerton agent named "Charlie Biglow", this Trojan Horse led many James associates (including the Younger Brothers in the Northfield, Mn raid) into ambush, jail or worse. Known as "Frank Dalton", the real "Jesse James" was in retirement having accomplished the real-life Robin Hood task of rescuing his kin's farms from the bank/railroad power axis that ran roughshod West from St. Louis. Protected by these kinfolk, Jesse never ventured further East that Merimac Caverns or North beyond Red Oak, Iowa where he staged the first successful robbery of a moving train. The way to deal with a Trojan Horse is to expose it and "kill" it so that it can do no further harm. In the case of Charlie Biglow, Bob Ford did the honors on both counts. Apparently a dead ringer, Biglow ran afoul of a password scheme used by the core of the James gang (the remainder were hired help). Jesse had ridden w/ Quantrill and considered the fight against the bank/railroad carpetbaggers to be a continuation of the Civil War (which it was) and ran his show accordingly. Once exposed, Biglow provided a means to "Kill Jesse James" permanently. Enlisting the aid of the Governor (who ran on a "Law & Order" ticket) to the tune of $50,000, Jesse got a full pardon, a one-way ticket to South America, and a rousing send off (the news- paper photo shows him as the second pallbearer on the right leaving the church). Biglow got blasted and buried in Jesse's Mother's front yard, a gravesite guarded to her dying day. Bob Ford got a fair trial and a quick pardon. The year was 1882. Exposing and "Killing" a Trojan Horse is only the first part of the task. It WILL happen again unless firm measures are taken to close the security breach. Often off-the-record handling of the offender (as was done w/ Pinker- ton) is enough. An aware user's group is the best security. Reformed of- fenders very often are the most effective system guardians. When Jesse James surfaced in Lawton, Ok at age 100, he had spent most of his 65 years of exile as a lawman. Sometimes a cowhand, sometimes caught up in Gold Rush fever that swept him to places like Cripple Crick and Tombstone, he worked most often as a deputy sheriff. While Oklahoma was the "Indian Territory", he was a deputy US Marshal there, ending up in Texas as a Ranger. Before his death at 103, Jesse revealed the above details and met w/ the last of the James gang (two remained). He is buried near Ft. Worth in a plot reserved for retired Texas Rangers, marked by a CSA headstone: Jesse Woodson James 1847-1951. (Source: UPI) >TSR. Terminate and Stay Resident. Under MS-DOS, small programs may "park" in scratch RAM and be "lit up" later using a keyboard escape sequence that suspends main program execution. Handy, but limited by interactions & RAM availability. >TTY. Teletype. >Tunneling. The curious mechanism that allows certain electrons to vanish on one side of a very thin insulator and reappear on the other as if they had passed "under" the barrier. Actually, they pass through it. Quantum mechan- ics allows very small objects (electrons) to shift between matter and pure electromagnetic energy. In other words, they "shine" through the barrier. The band of transparency is very narrow and is related to the energy content (electron-volts) of the electron, the angle of approach and the thickness of the insulator. Tunnel diodes were briefly popular in the early 1960's as parametric (negative resistance) amplifiers and oscillators. UV-PROMs use this mechanism to charge their Floating Gates during "Burning". >Turn-Key. Said of systems. Packaged systems (usually custom) which the end user can operate without understanding the inner workings, rather like an automobile, i.e., turn the key and it starts. >Twist Pair. Literally two insulated wires twisted together. A quick, dirty and surprisingly good transmission line having a characteristic impedance of about 125 ohms. Frequently overwrapped with a shield. Frequently better than coax for data transmission. -U- >UART. Universal Asynchronous Receiver/Transmitter. A chip that performs byte- to-serial bit-stream conversions. Found in RS-232 "Serial" port hard- ware. If the chip also supports "Synchronous" bit-streams, it is called a "USART". >UCSD Pascal. An early (c1979) microcomputer implementation of Pascal writ- ten by Kenneth Bowles of the University of California at San Diego. A defac- to standard even though seriously flawed. AKA "Scud" Pascal. >Unix. An operating system created by Bell Labs licensed to Universities and Software Vendors ("Wholesale"). Considered the best modern operating system for scientific/technical users, although the almost cryptic syntax of its "Shell" commands is intimidating (the Bell Labs Cheat Sheet is 14 pages long!). Basically a conventional multitasking/multiuser implementation, Unix extends "System Commands" into a powerful JCL (via a terminal command inter- preter called the "Shell") featuring "Pipes". A Pipe is a one way data path to a file or another executing program (sort of a "LUN"). The user has the option to "Pipefit" together small programs as building blocks, even though they may be in completely different languages. Unix is coded in 'C' for portability and is supplied w/ a 'C' compiler (a language well suited for building Tools) plus a "Toolbox" w/ 200+ canned utility programs (including a Word Processor). Criticized as requiring large amounts of core (RAM) and disk space, Unix supporting several users, each running highly "Piped" programs, can quickly bring a system to its knees "Tool-Thrashing" (swapping temporari- ly inactive programs to/from disk). Unix imposes no file structure or lock- ing mechanism (both being commonly added enhancements), does not support Virtual Memory (or Cache) and can not support interrupt driven applications (such as ATE). AT&T Unix and Berkley Unix (which supports demand paged Virtual Memory ala DEC VAX-11/780) are currently the two major variants. +Unix, History of. The name 'Unix' was coined by Ken Thompson of Bell Labs for a (then) single user system home brewed for a cast-off PDP-7 to host the game 'SPACE TRAVEL' after it loaded down a GE Multics system (c1968). Written in assembly language, Unix evolved into a useful tool. Transported to a PDP-11/35 in 1972, Unix Version 2 (still in assembly) introduced "Pipes" and multiple users. An immediate hit, Unix migrated to other PDP-11 systems throughout Bell Labs. Unix Version 5 coded in 'C' (a kind of "Portable Assembly Language") appeared in 1975 and spread into the university environ- ment. By the time Unix was formally licensed (as Version 7 in 1978), over 600 sites were already up and running. Barred from retail sales, Bell li- censed universities and software houses who added "Extensions" and remarketed it as "XENIX", "HP-UX" or whatever. After the breakup of 'Ma Bell', AT&T decided to continue the policy of "Wholesale Only" licensing hoping that Unix will become a formal standard. ---> Update 89: Sun & AT&T were working hard on SVR6, a "closed" version of Unix when an odd thing happened: AT&T pulled down the largest open systems contract ever (est. 4.3 Giga-Bucks). Posix and SVID compatible, these AFCAC-251 systems promise to catapult Unix into high orbit ala Zenith's Z- 248's. Now AT&T is offering to license the trademark "Unix" to vendors meeting the SVID regardless of whether AT&T code was used (licensed). Mean- while back at the ranch, IBM & Amdahl are working furiously to port AIX to IBM mainframes, HP bought Apollo (thereby gaining early access to the load- sharing algorithm set to become and ANSI/ISO standard) and Sun is making tent pegs out of DEC who bought MIPS (for Unix RISC Desktops). UnixWorld's edi- tors point out that no vendor has fielded a new OS since the IBM OS-2 Turkey (new iron ports Unix). The appearance of WordPerfect Ads in UnixWorld press- es the real point: Unix has arrived. +Unix, What's a. Until Unix, it was generally accepted that an Operating System exists primarily to manage system resources and to load application programs. If that's all you want, then Unix is as good as any. Talk w/ a "True Believer", however, and you quickly get the impression that Unix is almost a Religous Experience, something profoundly different from anything you have ever experienced. It is and it isn't. For perhaps the majority of Computer Users, Unix isn't worth the bother. Just load my WordPerfect & get out of my life! For the few who know what they want to do and seek only to be allowed to do it, Unix is the Ultimate Trip. If you are a Tool Maker/User, if you understand where you are going and if you are willing to leap off the edge of sanity and safety into the freewheeling world of pure power, to sail or fail by your own wits, Unix is akin to soaring unfettered into a cloudless sky. There are no limits. There are no rules. Pure Power. Heavy Duty!! The key here is the concept of Tools and their Use. Unix, the system, is merely the playing field. You, the User, select from hundreds of Tools (Ginger has more than a thousand on-line), link them together ("Pipefit" them) and turn them loose on your task a few or many at a time. Which Tools, how they are combined and how they are applied are completely up to you. So long as your task is accomplished, that must have been a "Right Way" to do it. There are many, many "Right Ways". Unix considers a "Good Tool" something that does one job well. Since this is kind of a judgement call, there are several tools that do similar things and many others that do likewise as a sideline to something else. That's where the business of knowing what you want to accomplish comes in. Beginners use (and abuse) only a few Tools. Learn more Tools, have more Power. It never ends. Unix isn't so much a "Thing" as a rough philosophy of how to do work using computers. Since Tools are written by different people at different times with more or less talent and success (after all, even YOU can write them), there are wide variations in syntax, action and safeguards. A "Tradition" and a few sets of "Regular Expressions" are about all you can count on. Some Tools are "Little Languages" like "awk" which, in a few statements, can perform almost magical transformations on your data files. Mastering these takes time. Perhaps the greatest contribution Unix has made is the vast pool of Unix Users who have migrated onto "Normal" systems and, finding them lacking, have back-doored pipes, Tools and the ability to use them into such diverse nitches as MS-DOS, VAX VMS and even some IBM Mainframe environments. With this has come the "Open" idea that counters the long entrenched OEM concept of "Closed", User Hostile environments intentionally made incompatible w/ everyone else. The "Brave New World" may well be AIX, Mach or some undiscovered Operating System we haven't dreamed up yet. Whatever it is, it will feel very familar to Unix Users because not one new OS NOT based on Unix has made significant market penitration since IBM's failed OS/2. GOSIP/Posix merely document what Buyers have decided: Unix has Arrived. >UPS. Uninterruptable Power Source. A Rectifier-Inverter combination w/ energy storage (usually NiCad or Gel-Cell Batteries) that provides some sever- al minutes of "Ride Through" power. Used in Computer applications where power loss might result in grave damage (as in DBMS engines & File Servers). In these applications, UPS "No-Break" power allows orderly system shutdown. >User Friendly. A buzz phrase with a basis in fact. A user generally views a machine as "friendly" if: 1. It performs (and fails) as expected. 2. It plays "Fair" (no "Gotcha's"). 3. It allows a change of mind (a "Deselect" function). 4. It is tolerant of human errors (without catastrophic results). 5. It keeps the user informed of what's going on. 6. It keeps the user firmly in control at all times. 7. It responds quickly (ideally in 1.5 seconds or less). >uucp. Unix-to-Unix Copy Program. Part of Unix "Flash Magic", uucp is a deamon subsystem which can call other Unix machines (via LAN or dial lines), log in (with passwords), exchange Mail, files and programs, and log out without human intervention. A real Mother Bear to set up, uucp runs slick as glass, in effect making Unix machine quasi-networked. Among its many magic tricks is a router that can store-and-forward traffic for remote machine (even though no direct connection exists locally). The basis of UserNet. Recommended. Note: the "Nutshell" books are the key, don't even think about setting up uucp without them. -V- >V.32. A CCITT standard for "SuperModems" capable of running 9.6Kbps on Dialup Telephone lines. Calls for 4/5 coded Trellis FEC w/ 5 state QAM Full Duplex at 2.4Kbaud (12Kbps raw throughput). >Vacuum-Column. Said of magnetic tape drives. A mechanical tape buffering technology based on "Vacuum Columns", enclosed square pipe-like boxes open on one end into which tape from the reels is sucked by negative pressure. Man- aged photoelectrically, these temporary storage areas allow very high tape speeds (up to 200 inches/second (ips)) w/ abrupt speed changes/reversals. The physical inertia of the tape reels requires some form of buffering, the three most common types being swing arm (mechanical) used up to 45 ips, short column (vacuum) used up to 125 ips and long column up to 200 ips. Recent advances in short column design allow rates to 200 ips resulting in a more compact form factor. Some observers expect the long column to fade out as a result. >Vacuum Tube. A depletion-mode N-Channel FET using vacuum as the semiconduc- tor. >Vaporware. Undelivered promises, usually highly hyped. See "Real Soon Now". +VAX-X. Virtual Address Extended. A family of mini/micro-computers from DEC sharing a common operating system (VMS) and file structure. Seriously over- priced and under-powered, the VAX line is robust in hardware and strongly supported in software. Blessed with one of the strongest networking schemes going (DECnet), the VAX line is pressing IBM in an area where IBM outfoxed itself, connectivity. Although DEC claims a "compatibility mode" exists, the VAX line broke sharply w/ the PDP family leaving many users high & dry. >Vcc. The Main Power Source for a Solid State circuit. The "cc" stands for "Collector Common", a left-over from the discrete transistor days. The Tube equivalent was "B+", a left-over from the days of out-houses and Atwater- Kents. ---> The "B" battery provided plate circuit voltage and was pretty stiff (90V). The "A" battery was 3-6V used to light the filaments. It was made up of "A" cells about the size of beer cans. These found their way into hand cranked telephones ("Talk" battery), electric fence chargers and the ignition of the Ford model "T". The latter two applications fostered a quad-pac called a "Hot Shot" which most farm suppliers still stock. The "C" battery provided the fixed tube bias used at the time (cathode bias came much later). "C" cells are popular today. In the late 1940's, RCA produced a portable tube radio that used an "ABC" battery combination. The "B" section was made by stacking 10 9V subsections. When transistor radios came along, these were sold as "B Cells", an unwise designation since dropped. >VDI. Virtual Device Interface. See GKS. >VDM. Virtual Device MetaFile. A proposed extension to the GKS VDI standard that defines a file format for "picture" files so that archiving and trans- port can be supported in a multivendor environment. >VDT. Video Display Terminal. >Vector Display. Basically a fast oscilloscope used for high resolution CAD graphics. Information is written randomly onto the screen as line segments ("vectors"). Superior to raster scan displays as there are no "jaggies" in diagonal lines. Expensive. Subject to flicker as image complexity increases. >Vector Set. Binary test patterns used to test microcircuits. A "test vector" is one kind of test pattern consisting of a "stimulus" section and a "response" section. A group of "vectors" comprises a "vector set". >VHSIC. Very High Speed Integrated Circuits. A variation of VLSI with the emphasis on throughput (speed). Also, a formal US Navy program to develop VHSIC devices in cooperation with industry (IBM, Sperry-Univac, etc.). >Virtual Circuit. A port to port link on a LAN emulating a metallic wire path. >Virtual Memory. A trick to "fool" a computer into believing its disk system is part of a huge RAM area. Basically a trade of workspace size for speed. >Virtual Memory, Operation of. Virtual Memory interposes a "Memory Manager" (a hardware device) that redirects memory fetches to one of several "Page" areas in physical RAM via address offset registers. If the fetch is from the Page last referenced, virtually no delay occurs. Otherwise the Memory Manag- er must search for the referenced Page and the CPU is placed in a WAIT state. If the needed page is not in physical RAM, the Memory Manager generates a "Page Fault" interrupt which calls a service routine to fetch it in from disk. There are two serious problems to be addressed. The first deals with selecting which Page will be replaced. A random selection is easiest. Cache Managers (who work to/from slower physical RAM) often use this method as it has little overhead and the penalty for guessing wrong (so called "Page Thrashing") is small. Disk Virtual Managers normally use a smarter method called "Least Recently Used" (LRU). Under LRU, the Memory Manager's registers are arranged in a circular queue. During a Page search, a pointer sweeps forward until the proper Page is found. If the pointer wraps (passes its starting position), a disk swap is needed. A "USED" bit (set each time a Page is accessed) is examined and cleared. The first Page found w/o the "USED" bit set is replaced. That brings up the other problem. If a Page has been altered in RAM, it must be written back to disk. Under LRU, this is indicated by a "Dirty" bit (set during a write operation) checked during a Page swap. Most LRU systems have a background writeback routine so no Page remains Dirty long. Some systems (such as SRM) use "Write Through" (the Page goes "Busy" and writes immediately to disk), a safer but higher overhead scheme less likely to catch the disk in an indeterminate state during a system/power failure. Most disk "Track Buffering" schemes (a form of Virtual Memory also) use Write Through. >Virus. A small bit of binary meanness that sneaks into a system attached to an executable file. Once active, it replicates destructively. Almost exclu- sively a PC problem, virus attacks depend on permissive computer coupling which allows casual copying of programs of uncertain origin. Like bad gaso- line, the cure is to flush the tank (disk), refill with product of known good quality and exercise care in future acquisitions. Although subject to damage by viruses, data, text, batch and source code files can not spread the infec- tion and may be freely exchanged. Likewise, commercially distributed exe- cutable are generally safe. >VMS. Virtual Memory System. The Operating System of the DEC VAX line of computers. An excellent applications environment, VMS features a strong hierarchical (layered) directory system. Apparently a near optimum CISC implementation, RISC versions have proven disappointing and have not been marketed. Currently (7/91) Not POSIX (FIPS-151) Compliant. >Voice Coil Actuator. A high performance head positioner used in flying head disk systems. Similar in construction to a speaker coil in a Hi-Fi "Woofer", hence the name. Expensive. >VU. Voice Unit. A unit of measure on a ballistically weighted milliwatt meter (0 VU in 600 ohms under a steady state signal is equal to 0 dbm) that is roughly reflective of "loudness" to the human ear. -W- >Warm Start. A partial reboot of a system that, essentially, reloads the terminal monitor so that the user can converse with the system after a "crash". >Whetstone. A standardized test of overall computer system performance. Said to reflect the actual performance doing real world tasks. Written by the National Physical Laboratory (England's version of NBS) based on an analysis of 1000 ALGOL-60 programs, the 'Whetstone Instruction' is really an average of 1000 language constructs arrange in a loop, one interaction of which is considered to be "1K Whetstones", the accepted basic unit measure- ment. For example, a VAX-11/780 does about 1,133K B1D Whetstones/second . (By comparison, the VAX is also rated at about .25 MFLOPS). See Also: Benchmarks >White Noise. Random audio energy distributed evenly across the band of interest. Sounds like a "Hiss". Useful for filter testing. The maximum energy signal that a channel can carry. High speed data is intentionally coded to resemble white noise to improve the S/N ratio. AKA Gaussian Noise. >White Space. As defined by ANSI-C, a Space, Tab, Vertical Tab, NewLine or FormFeed, i.e., items that might delimit Text Words. >Widget. Defined by X-Windows as a "Window Gadget", a gadget being an inge- nious contrivance (per Webster's). Widgets are the building blocks from which "Windows" are made, i.e., the borders, scroll bars, banners, etc. that we have come to associate with the X-Look. >Winchester. A hard disk technology based on lubricated recording surfaces on which the heads alight as the disk spins down. Originally the "code" name for an IBM project to develop a 30 Mb disk using 30 tracks (hence, a 30-30 which suggested the famous Winchester rifle), the first commercial product was a "40-40", but the name stuck. Usually found in a fixed (non-replace- able) sealed cartridge which has been assembled under clean room conditions (may include an absolute filter internally). This sealed assembly is virtual- ly immune to environmental contamination, making the Winchester disk popular for office/ laboratory/home installations. Fast. >Windows. Any of several multi-tasking methods (among them the Unix X-Win- dows from MIT) that allows running programs to share the User's CRT, general- ly by overlapping like sheets of paper ala Smalltalk (ala MacIntosh). Win- dows are visually flashy. Windows requires that each program must maintain a refresh image of its own output (a non-trivial task). More frustrating, Windowing systems impose strict boundaries on participating programs so that, while the User sees multiple processes, the processes themselves are unaware (and can not be made to be aware) of each other. The strong bias of Windows toward pixel-oriented techniques limits satisfactory operating to single-user Workstations. >WOM. Write-Only Memory. Logical inverse of a ROM. A Bit Bucket. >Word Length. The number of bits in the basic instruction for the CPU. Often multiples of 8 bits (a byte), although early machines used odd lengths. In general, the longer the word length the "richer" the instruction set and the more"powerful" the processor. An 8 bit machine can directly address 64Kb of RAM. A 16 bit machine can directly address 4.2 Gb of RAM. Beyond 16 bits, the extra measure of "power" comes from the ability to "multiplex" operations into a few complex instructions and thereby cut down the fetch rate from main RAM. >WORM. Write-Once, Read-Many. Any of several Optical Disk technologies that can be "burned" in the field. Once written, the information is more or less permanent. Also called a "CR-PROM". >Worm. A class of stand-alone synthetic "Lifeforms" that may inhabit a multi- user/multi-tasking DOS-based system. Perhaps the best known is the MIT "Cookie Monster" that appears on terminals at odd intervals demanding that the user type the word "COOKIE". Once "fed", it "goes away". This particular critter was well done, having the ability to alter its form to avoid detection. It also displays a "survival" instinct of sorts. Unlike a Virus, Worms are always intentionally inserted into a system, sometimes by a remote user, often thru a security loophole. ----> Update 89: The ARPANET "Virus" that crashed 6,000 BSD nodes was actual a (poorly written) Worm intended to create a directory of ARPANET nodes via a "chain letter" scheme. BSD 4.3 was distributed w/ (at least) two security "holes" which (when artfully accessed) allowed the Worm to Mail itself into a node and gain "life" to reproduce. The author made a Rookie error (he allowed child processes to replicate) in his rush to get the Worm inserted before updates closed the vital loopholes. Though this was a "hacked" job, the author has a PHD from Harvard and was working on another at Cornell. (His father is Head Computer Security Honcho at NSA). A much more serious matter is CHAOS (yes, like in "Get Smart"), a German computer group w/ ties to Eastern Europe. ---> Update 90: Guilty. Being Appealed. Also, the whole story of the "Hanover Hacker" has been published ("The Cuckoo's Egg") telling how a Berkley grad student, (Cliff Stoll) while tracking down a puzzling 75 cent billing error, discovered an ARPANET hacker who roamed freely through DOD/NASA systems while the FBI, CIA, NSA (etc) laughed. Entrapped by the "Shower Head Scam", the intruder turned out to be Marcus Hendick, friend of a "crack-head" who sold information to the KGB. Only the West Germans took the Berkley Hippy Hacker seriously. Exposed, the KGB burned their bridges (an empty gasoline can was found in the woods near the coke-user's body). Please Report Security Breaches. I don't think anyone thinks it's funny anymore. The book is Recommended Reading. >WPM. Words/Minute. A standard word consists of 5 characters and one space (the same as in typing class). A 100 WPM typist outputs 10 cps. >Writable Control Store. A small, special purpose RAM into which user writ- ten extensions to the CPU's instruction set can be posted. Such extensions are powerful, fast and difficult to write. Found in high performance CPUs. Little used unless raw speed in required. Proposed by M.V.Wilkes in 1951. >Write Protect. A means of rendering a media read-only. >Write Ring. A ring shaped plastic tab which must be fitted into the groove on the back of a nine-track tape reel in order to record on the tape. >WYSIWYG. "Whizzy-Wig" is short for the "Laugh-In" Punch Line: "What You See Is What You Get" (c1970). Now serious Jargon for CRT environments that accurately reflect the layout/look of the completed hardcopy (document, drawing, whatever). WYSIWYG is User Friendly, which is why WordPerfect is so popular and "nroff" (and CALS) is not. -X- >X. A client/server protocol which allows a destop terminal (see X-Terminal below) to conduct several sessions with differnt hosts at the same time. >X.25. The CCITT standard for user terminals into a Public Data Network. A packet switched technique, X.25 allows multiple users to share the same data stream. Rarely encountered at the User level, X.25 frequently is found inside (and on the links between) Statistical Muxes since X.25 is, by nature, a "Stat Mux" process. >X3.64. An ANSI standard for Terminal Control (Escape Code) functions. Basically the defacto standard DEC VT-100 emulation slightly expanded. >X.400 MHS. The ISO LAN answer to TCP/IP's "Email" protocol. Designed by CCITT, X.400 is currently being viewed as an "Envelope" for ordinary Files, a task it does well. Unlike Email, X.400 is also a fully featured Page De- scription Language, a feature expected to be used widely in Europe. >XENIX. A trademark of MicroSoft for its version of Unix. Announced in 1980, XENIX is generally considered the Defacto Standard Unix implementation for microcomputers. See Also Unix. >Xerography. A photoreproduction technology based on a photosensitive drum (or belt) which is exposed to light reflected from the text to be copied. Wherever light falls on the drum, the static charge sprayed on before expo- sure bleeds off. The drum is then washed over with a dry (or liquid) toner which adheres to charged (dark) areas. A controlled porosity paper is passed by the drum and the toner image transfers. The image is then fixed, usually by heat. >X-ON/X-OFF. A flow control protocol based on unprintable control charac- ters, generally DC1 & DC3 (^Q and ^S). By popular use, the sender halts transmission on when an X-OFF signal is received. When the receiving end has cleared out its buffer and can take more data, an X-ON signal is sent. Originally intended to control the punched tape reader on a TTY machine, X- ON/X-OFF became popular with the almost universal use of USARTs in serial interfaces. Simple and effective, X-ON/X-OFF is a common option in both hardware and software, particularly w/ terminal emulators ala Kermit. >X-Terminal. An X-Windows compliant subsystem having .5-8 Mb of RAM and powerful CPU(s) that off-load the location/sizing/hiding actions from the host via a "client-server" convention. In this case, the terminal is the "server" (traffic cop) and the host's application programs are the "clients", each of which believes it has a full screen X-Window to play in. Since most of the really bit intensive actions (shuffling windows, Zooms and Pops) are local to the X-Terminal, comm link loading is much lower. Acceptable per- formance on 9600 baud modems has been demonstrated. -Y- >YAM. "Yet Another Modem." A Public Domain modem control program. -Z- >Zener. The uncontrolled avalanche flow of current across a reverse biased PN junction. Once through a transition zone (called a "knee"), voltage remains constant over a wide current range. Unless externally limited, current will increase until the device thermally self-distructs. Widely used as voltage references, spike suppressors and signal clippers, zeners also find application in hardware random number generators (an A/D tracks zener noise). >Zmodem. A 1986 public domain protocol from TELNET written by Chuck Fosberg, the author of Ymodem (an extension of Ward Christen's Xmodem). Zmodem is a redevelopment using some of the ideas (but not the techniques) of its name- sakes. Zmodem is designed to press the throughput limits of a quiet, high quality path (915 cps on a 9600 baud link), nearly 3 times better than Ker- mit. Zmodem provides "Fall Backs" to Ymodem and Xmodem protocols at some performance penalty.